Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Electronic Voting by Means of Digital Terrestrial Television: The Infrastructure, Security Issues and a Real Test-Bed., , , , and . I3E, volume 305 of IFIP, page 13-25. Springer, (2009)Integration between Digital Terrestrial Television and Internet by Means of a DVB-MHP Web Browser., , , , , and . WEBIST, page 323-328. INSTICC Press, (2009)Coping with local geometric attacks by means of optic-flow-based resynchronization for robust watermarking., , , and . Security, Steganography, and Watermarking of Multimedia Contents, volume 5681 of Proceedings of SPIE, page 164-174. SPIE, (2005)Trustworthiness in social networks.. University of Florence, Italy, (2016)Exploiting CNN Layer Activations to Improve Adversarial Image Classification., , , , and . ICIP, page 2289-2293. IEEE, (2019)Splicing forgeries localization through the use of first digit features., , , and . WIFS, page 143-148. IEEE, (2014)Adversarial Examples Detection in Features Distance Spaces., , , , and . ECCV Workshops (2), volume 11130 of Lecture Notes in Computer Science, page 313-327. Springer, (2018)Smartphone Fingerprinting Combining Features of On-Board Sensors., , , , and . IEEE Trans. Inf. Forensics Secur., 12 (10): 2457-2466 (2017)Adversarial image detection in deep neural networks., , , , and . Multim. Tools Appl., 78 (3): 2815-2835 (2019)