C. Gurrin, Schoeffmann, K., Joho, H., Leibetseder, A., Zhou, L., Duane, A., Dang-Nguyen, D. - T., Riegler, M., Piras, L., Tran, M. - T., Lokoč, J., e Hürst, W.,
«Comparing Approaches to Interactive Lifelog Search at the Lifelog Search Challenge (LSC2018)»,
ITE Transactions on Media Technology and Applications, vol 7, pagg 46-59, 2019.
(4.7 MB) D. Maiorca e Biggio, B.,
«Digital Investigation of PDF Files: Unveiling Traces of Embedded Malware»,
IEEE Security and Privacy: Special Issue on Digital Forensics, vol 17, n° 1, pagg 63-71, 2019.
(838.95 KB) M. Melis, Scalas, M., Demontis, A., Maiorca, D., Biggio, B., Giacinto, G., e Roli, F.,
«Do Gradient-Based Explanations Tell Anything About Adversarial Robustness to Android Malware?»,
International Journal of Machine Learning and Cybernetics, vol 13, pagg 217-232, 2022.
(1.2 MB)