Publications
«Diversified Sensitivity based Undersampling for Imbalance Classification Problems», IEEE Transactions on Cybernetics, In Press.
(1.91 MB)
, 
«On Reducing the Effect of Covariate Factors in Gait Recognition: a Classifier Ensemble Method», IEEE Transactions on Pattern Analysis and Machine Intelligence, In Press.
(311.43 KB)
(151.4 KB)
, 

«On The Potential of Image Moments for Medical Diagnosis», Journal of Imaging, vol 9, 2023.
, «Do Gradient-Based Explanations Tell Anything About Adversarial Robustness to Android Malware?», International Journal of Machine Learning and Cybernetics, vol 13, pagg 217-232, 2022.
(1.2 MB)
, 
«On the Effectiveness of Synthetic Data Sets for Training Person Re-identification Models», in Proceedings - International Conference on Pattern Recognition, 2022, vol 2022-August, pagg 1208 – 1214.
, «On the Evaluation of Video-Based Crowd Counting Models», Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), vol 13233 LNCS. pagg 301 – 311, 2022.
, «Explainability-Based Debugging of Machine Learning for Vulnerability Discovery», in Proc. 17th International Conference on Availability, Reliability and Security, New York, NY, USA, 2022.
, «Extended Abstract: Effective Call Graph Fingerprinting for the Analysis and Classification of Windows Malware», 19th Conference on Detection of Intrusions and Malware & Vulnerability Assessment (DIMVA). pagg 42-52, 2022.
(328.32 KB)
, 
«FADER: Fast adversarial example rejection», Neurocomputing, vol 470, pagg 257-268, 2022.
, «A Longitudinal Study of Cryptographic API: A Decade of Android Malware», 19th International Conference on Security and Cryptography (SECRYPT). pagg 121-133, 2022.
(251.06 KB)
, 
«Reach Me if You Can: On Native Vulnerability Reachability in Android Apps», 27th European Symposium on Research in Computer Security (ESORICS). 2022.
(979.51 KB)
, 
«On the Reliability of CNNs in Clinical Practice: A Computer-Aided Diagnosis System Case Study», Applied Sciences (Switzerland), vol 12, 2022.
, «Scene-specific Crowd Counting Using Synthetic Training Images», Pattern Recognition, vol 124, 2022.
(3.14 MB)
, 
«secml: A Python Library for Secure and Explainable Machine Learning», SoftwareX, 2022.
, «Special Issue on Image Processing Techniques for Biomedical Applications», Applied Sciences (Switzerland), vol 12, 2022.
, «Towards learning trustworthily, automatically, and with guarantees on graphs: An overview», Neurocomputing, vol 493, pagg 217-243, 2022.
, «Adversarial EXEmples: A Survey and Experimental Evaluation of Practical Attacks on Machine Learning for Windows Malware Detection», ACM Trans. Priv. Secur., vol 24, 2021.
, «Adversarial Machine Learning: Attacks From Laboratories to the Real World», Computer, vol 54, pagg 56-60, 2021.
, «Automatic Myelofibrosis Grading from Silver-Stained Images», in Computer Analysis of Images and Patterns, Cham, 2021, pagg 195–205.
, «On the Effectiveness of Leukocytes Classification Methods in a Real Application Scenario», AI, vol 2, pagg 394–412, 2021.
, «Empirical Assessment of Generating Adversarial Configurations for Software Product Lines», Empirical Software Engineering, vol 26, n° 6, 2021.
(1.29 MB)
, 
«Fast Minimum-norm Adversarial Attacks through Adaptive Norm Constraints», in NeurIPS, 2021.
, «Functionality-Preserving Black-Box Optimization of Adversarial Windows Malware», IEEE Transactions on Information Forensics and Security, vol 16, pagg 3469-3478, 2021.
, «The Hammer and the Nut: Is Bilevel Optimization Really Needed to Poison Linear Classifiers?», in International Joint Conference on Neural Networks, (IJCNN) 2021, Shenzhen, China, 2021, pagg 1–8.
, «How Realistic Should Synthetic Images Be for Training Crowd Counting Models?», in Computer Analysis of Images and Patterns, Cham, 2021, pagg 46–56.
,