Publications
“Diversified Sensitivity based Undersampling for Imbalance Classification Problems”, IEEE Transactions on Cybernetics, In Press.
(1.91 MB)
, 
“On Reducing the Effect of Covariate Factors in Gait Recognition: a Classifier Ensemble Method”, IEEE Transactions on Pattern Analysis and Machine Intelligence, In Press.
(311.43 KB)
(151.4 KB)
, 

“On The Potential of Image Moments for Medical Diagnosis”, Journal of Imaging, vol. 9, 2023.
, “Do Gradient-Based Explanations Tell Anything About Adversarial Robustness to Android Malware?”, International Journal of Machine Learning and Cybernetics, vol. 13, pp. 217-232, 2022.
(1.2 MB)
, 
“On the Effectiveness of Synthetic Data Sets for Training Person Re-identification Models”, in Proceedings - International Conference on Pattern Recognition, 2022, vol. 2022-August, pp. 1208 – 1214.
, “On the Evaluation of Video-Based Crowd Counting Models”, Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), vol. 13233 LNCS. pp. 301 – 311, 2022.
, “Explainability-Based Debugging of Machine Learning for Vulnerability Discovery”, in Proc. 17th International Conference on Availability, Reliability and Security, New York, NY, USA, 2022.
, “Extended Abstract: Effective Call Graph Fingerprinting for the Analysis and Classification of Windows Malware”, 19th Conference on Detection of Intrusions and Malware & Vulnerability Assessment (DIMVA). pp. 42-52, 2022.
(328.32 KB)
, 
“FADER: Fast adversarial example rejection”, Neurocomputing, vol. 470, pp. 257-268, 2022.
, “A Longitudinal Study of Cryptographic API: A Decade of Android Malware”, 19th International Conference on Security and Cryptography (SECRYPT). pp. 121-133, 2022.
(251.06 KB)
, 
“Reach Me if You Can: On Native Vulnerability Reachability in Android Apps”, 27th European Symposium on Research in Computer Security (ESORICS). 2022.
(979.51 KB)
, 
“On the Reliability of CNNs in Clinical Practice: A Computer-Aided Diagnosis System Case Study”, Applied Sciences (Switzerland), vol. 12, 2022.
, “Scene-specific Crowd Counting Using Synthetic Training Images”, Pattern Recognition, vol. 124, 2022.
(3.14 MB)
, 
“secml: A Python Library for Secure and Explainable Machine Learning”, SoftwareX, 2022.
, “Special Issue on Image Processing Techniques for Biomedical Applications”, Applied Sciences (Switzerland), vol. 12, 2022.
, “Towards learning trustworthily, automatically, and with guarantees on graphs: An overview”, Neurocomputing, vol. 493, pp. 217-243, 2022.
, “Adversarial EXEmples: A Survey and Experimental Evaluation of Practical Attacks on Machine Learning for Windows Malware Detection”, ACM Trans. Priv. Secur., vol. 24, 2021.
, “Adversarial Machine Learning: Attacks From Laboratories to the Real World”, Computer, vol. 54, pp. 56-60, 2021.
, “Automatic Myelofibrosis Grading from Silver-Stained Images”, in Computer Analysis of Images and Patterns, Cham, 2021, pp. 195–205.
, “On the Effectiveness of Leukocytes Classification Methods in a Real Application Scenario”, AI, vol. 2, pp. 394–412, 2021.
, “Empirical Assessment of Generating Adversarial Configurations for Software Product Lines”, Empirical Software Engineering, vol. 26, no. 6, 2021.
(1.29 MB)
, 
“Fast Minimum-norm Adversarial Attacks through Adaptive Norm Constraints”, in NeurIPS, 2021.
, “Functionality-Preserving Black-Box Optimization of Adversarial Windows Malware”, IEEE Transactions on Information Forensics and Security, vol. 16, pp. 3469-3478, 2021.
, “The Hammer and the Nut: Is Bilevel Optimization Really Needed to Poison Linear Classifiers?”, in International Joint Conference on Neural Networks, (IJCNN) 2021, Shenzhen, China, 2021, pp. 1–8.
, “How Realistic Should Synthetic Images Be for Training Crowd Counting Models?”, in Computer Analysis of Images and Patterns, Cham, 2021, pp. 46–56.
,