Publications
“Diversified Sensitivity based Undersampling for Imbalance Classification Problems”, IEEE Transactions on Cybernetics, In Press.
(1.91 MB)
, 
“On Reducing the Effect of Covariate Factors in Gait Recognition: a Classifier Ensemble Method”, IEEE Transactions on Pattern Analysis and Machine Intelligence, In Press.
(311.43 KB)
(151.4 KB)
, 

“Scene-specific Crowd Counting Using Synthetic Training Images”, Pattern Recognition, In Press.
(3.14 MB)
, 
“Do Gradient-Based Explanations Tell Anything About Adversarial Robustness to Android Malware?”, International Journal of Machine Learning and Cybernetics, vol. 13, pp. 217-232, 2022.
(1.2 MB)
, 
“Explainability-Based Debugging of Machine Learning for Vulnerability Discovery”, in Proc. 17th International Conference on Availability, Reliability and Security, New York, NY, USA, 2022.
, “Extended Abstract: Effective Call Graph Fingerprinting for the Analysis and Classification of Windows Malware”, 19th Conference on Detection of Intrusions and Malware & Vulnerability Assessment (DIMVA). pp. 42-52, 2022.
(328.32 KB)
, 
“FADER: Fast adversarial example rejection”, Neurocomputing, vol. 470, pp. 257-268, 2022.
, “A Longitudinal Study of Cryptographic API: A Decade of Android Malware”, 19th International Conference on Security and Cryptography (SECRYPT). pp. 121-133, 2022.
(251.06 KB)
, 
“Reach Me if You Can: On Native Vulnerability Reachability in Android Apps”, 27th European Symposium on Research in Computer Security (ESORICS). 2022.
(979.51 KB)
, 
“secml: A Python Library for Secure and Explainable Machine Learning”, SoftwareX, 2022.
, “Towards learning trustworthily, automatically, and with guarantees on graphs: An overview”, Neurocomputing, vol. 493, pp. 217-243, 2022.
, “Adversarial EXEmples: A Survey and Experimental Evaluation of Practical Attacks on Machine Learning for Windows Malware Detection”, ACM Trans. Priv. Secur., vol. 24, 2021.
, “Adversarial Machine Learning: Attacks From Laboratories to the Real World”, Computer, vol. 54, pp. 56-60, 2021.
, “Automatic Myelofibrosis Grading from Silver-Stained Images”, in Computer Analysis of Images and Patterns, Cham, 2021, pp. 195–205.
, “On the Effectiveness of Leukocytes Classification Methods in a Real Application Scenario”, AI, vol. 2, pp. 394–412, 2021.
, “Empirical Assessment of Generating Adversarial Configurations for Software Product Lines”, Empirical Software Engineering, vol. 26, no. 6, 2021.
(1.29 MB)
, 
“Fast Minimum-norm Adversarial Attacks through Adaptive Norm Constraints”, in NeurIPS, 2021.
, “Functionality-Preserving Black-Box Optimization of Adversarial Windows Malware”, IEEE Transactions on Information Forensics and Security, vol. 16, pp. 3469-3478, 2021.
, “The Hammer and the Nut: Is Bilevel Optimization Really Needed to Poison Linear Classifiers?”, in International Joint Conference on Neural Networks, (IJCNN) 2021, Shenzhen, China, 2021, pp. 1–8.
, “How Realistic Should Synthetic Images Be for Training Crowd Counting Models?”, in Computer Analysis of Images and Patterns, Cham, 2021, pp. 46–56.
, “Invariant Moments, Textural and Deep Features for Diagnostic MR and CT Image Retrieval”, in Computer Analysis of Images and Patterns, Cham, 2021, pp. 287–297.
, “Poisoning Attacks on Algorithmic Fairness”, in Machine Learning and Knowledge Discovery in Databases (ECML PKDD 2020), 2021, p. 162--177.
(1.05 MB)
, 
“Poisoning Attacks on Cyber Attack Detectors for Industrial Control Systems”, in Proceedings of the 36th Annual ACM Symposium on Applied Computing, New York, NY, USA, 2021, pp. 116–125.
, “PowerDecode: A PowerShell Script Decoder Dedicated to Malware Analysis”, 5th Italian Conference on CyberSecurity (ITASEC). 2021.
(982.03 KB)
, 
“Adversarial Detection of Flash Malware: Limitations and Open Issues”, Computers & Security, vol. 96, 2020.
(1.08 MB)
, 