Publications
«Diversified Sensitivity based Undersampling for Imbalance Classification Problems», IEEE Transactions on Cybernetics, In Press.
(1.91 MB)
, 
«DroidSieve: Fast and Accurate Classification of Obfuscated Android Malware», in Proceedings of the Seventh {ACM} Conference on Data and Application Security and Privacy, {CODASPY} 2017, In Press.
(478.59 KB)
, 
«Empirical Assessment of Generating Adversarial Configurations for Software Product Lines», Empirical Software Engineering, In Press.
, «Poisoning Attacks on Algorithmic Fairness», in ECML PKDD, In Press.
, «On Reducing the Effect of Covariate Factors in Gait Recognition: a Classifier Ensemble Method», IEEE Transactions on Pattern Analysis and Machine Intelligence, In Press.
(311.43 KB)
(151.4 KB)
, 

«Adversarial Detection of Flash Malware: Limitations and Open Issues», Computers & Security, vol 96, 2020.
(1.08 MB)
, 
«Deep Neural Rejection against Adversarial Examples», EURASIP Journal on Information Security, vol 5, 2020.
, «An Empirical Evaluation of Cross-scene Crowd Counting Performance», in Proceedings of the 15th International Joint Conference on Computer Vision, Imaging and Computer Graphics Theory and Applications - VISAPP, Valletta - Malta, 2020, vol 4, pagg 373-380.
(527.29 KB)
, 
«On the Feasibility of Adversarial Sample Creation Using the Android System API», Information, n° 11(9): 433, 2020.
(1.26 MB)
, 
«F-Measure Curves: A Tool to Visualize Classifier Performance Under Imbalance», Pattern Recognition, vol 100, pag 107146, 2020.
(3.15 MB)
, 
«Investigating Synthetic Data Sets for Crowd Counting in Cross-scene Scenarios», in Proceedings of the 15th International Joint Conference on Computer Vision, Imaging and Computer Graphics Theory and Applications VISAPP 2020, Valletta - Malta, 2020, vol 4, pagg 365-372.
(4.23 MB)
, 
«Comparing Approaches to Interactive Lifelog Search at the Lifelog Search Challenge (LSC2018)», ITE Transactions on Media Technology and Applications, vol 7, pagg 46-59, 2019.
(4.7 MB)
, 
«DEICTIC: a Compositional and Declarative Gesture Description based on Hidden Markov Model», International Journal of Human-Computer Studies, vol 122, pag 20, 2019.
(1.69 MB)
, 
«Detecting Adversarial Examples through Nonlinear Dimensionality Reduction», in 27th European Symposium on Artificial Neural Networks, Computational Intelligence and Machine Learning - ESANN '19, 2019, pagg 483-488.
(552.39 KB)
, 
«Digital Investigation of PDF Files: Unveiling Traces of Embedded Malware», IEEE Security and Privacy: Special Issue on Digital Forensics, vol 17, n° 1, pagg 63-71, 2019.
(838.95 KB)
, 
«On the Effectiveness of System API-Related Information for Android Ransomware Detection», Computers and Security, vol 86, pagg 162-182, 2019.
(706.92 KB)
, 
«Explaining Vulnerabilities of Deep Learning to Adversarial Malware Binaries», in 3rd Italian Conference on Cyber Security, ITASEC 2019, Pisa, Italy, 2019, vol 2315.
(801.85 KB)
, 
«Image Retrieval Evaluation in Specific Domains», in Information Retrieval Evaluation in a Changing World - Lessons Learned from 20 Years of CLEF, 2019, pagg 275–305.
(202.36 KB)
, 
«ImageCLEF 2019: Multimedia Retrieval in Lifelogging, Medical, Nature, and Security Applications», in Advances in Information Retrieval - 41st European Conference on IR Research, ECIR 2019, Cologne, Germany, April 14-18, 2019, Proceedings, Part {II}, 2019, pagg 301–308.
, «ImageCLEF 2019: Multimedia Retrieval in Medicine, Lifelogging, Security and Nature», in Experimental IR Meets Multilinguality, Multimodality, and Interaction - 10th International Conference of the CLEF Association, CLEF 2019, Lugano, Switzerland, September 9-12, 2019, Proceedings, 2019, pagg 358–386.
(323.96 KB)
, 
«LIFER 2.0: Discovering Personal Lifelog Insights using an Interactive Lifelog Retrieval System», in Working Notes of {CLEF} 2019 - Conference and Labs of the Evaluation Forum, Lugano, Switzerland, September 9-12, 2019., 2019.
(1.56 MB)
, 
«Overview of ImageCLEFlifelog 2019: Solve My Life Puzzle and Lifelog Moment Retrieval», in Working Notes of {CLEF} 2019 - Conference and Labs of the Evaluation Forum, Lugano, Switzerland, September 9-12, 2019., 2019.
(4.58 MB)
, 
«Poster: Attacking Malware Classifiers by Crafting Gradient-Attacks That Preserve Functionality», in Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications Security, New York, NY, USA, 2019, pagg 2565–2567.
, «PowerDrive: Accurate De-Obfuscation and Analysis of PowerShell Malware», 16th Conference on Detection of Intrusions and Malware & Vulnerability Assessment (DIMVA). Springer, Gothenburg, Sweden, pagg 240-259, 2019.
(352.39 KB)
, , 