Get my own profile
Public access
View all40 articles
5 articles
available
not available
Based on funding mandates
Co-authors
Mauro BarniProfessor, University of SienaVerified email at dii.unisi.it
Ehsan NowrooziSMIEEE, Senior Lecturer in Cyber Security, University of Greenwich, UKVerified email at ieee.org
Andrea Costanzoinformation Engineering PhDVerified email at diism.unisi.it
Andrea AbrardoProfessore Associato presso il Dipartimento di Ingegneria dell'Informazione Università di SienaVerified email at dii.unisi.it
Paolo BestaginiPolitecnico di MilanoVerified email at polimi.it
Yao Zhao, 赵耀Beijing Jiaotong UniversityVerified email at bjtu.edu.cn
Marco FontaniForensics Director - Amped SoftwareVerified email at ampedsoftware.com
Zhipeng ChenPhd research scholar, Beijing Jiaotong UniversityVerified email at bjtu.edu.cn
Fernando Pérez-GonzálezProfessor, atlanTTic Research Center, University of Vigo - SpainVerified email at gts.uvigo.es
Luca BondiResearch Scientist, Bosch USAVerified email at us.bosch.com
Marco MagginiProfessor of Computer Science, University of SienaVerified email at unisi.it
Nicolò BonettiniReality Defender Inc.Verified email at realitydefender.com
Pedro Comesaña AlfaroSignal Processing in Communications Group (GPSC), atlanTTic Research Center, University of VigoVerified email at gts.tsc.uvigo.es
Neri MerhavProfessor of Electrical Engineering, Technion, Israel.Verified email at ee.technion.ac.il
Riccardo LazzerettiSapienza University of RomeVerified email at diag.uniroma1.it
Zhe ChenUT Southwestern Medical CenterVerified email at utsouthwestern.edu
Follow
Benedetta Tondi
Department of Information Engineering of the University of Siena
Verified email at unisi.it - Homepage