Get my own profile
Public access
View all39 articles
5 articles
available
not available
Based on funding mandates
Co-authors
- Mauro BarniProfessor, University of SienaVerified email at dii.unisi.it
- Ehsan NowrooziSMIEEE, Senior Lecturer in Cyber Security, University of Greenwich, UKVerified email at ieee.org
- Andrea Costanzoinformation Engineering PhDVerified email at diism.unisi.it
- Andrea AbrardoProfessore Associato presso il Dipartimento di Ingegneria dell'Informazione Università di SienaVerified email at dii.unisi.it
- Paolo BestaginiPolitecnico di MilanoVerified email at polimi.it
- Yao Zhao, 赵耀Beijing Jiaotong UniversityVerified email at bjtu.edu.cn
- Marco FontaniForensics Director - Amped SoftwareVerified email at ampedsoftware.com
- Zhipeng ChenPhd research scholar, Beijing Jiaotong UniversityVerified email at bjtu.edu.cn
- Fernando Pérez-GonzálezProfessor, atlanTTic Research Center, University of Vigo - SpainVerified email at gts.uvigo.es
- Luca BondiResearch Scientist, Bosch USAVerified email at us.bosch.com
- Marco MagginiProfessor of Computer Science, University of SienaVerified email at unisi.it
- Nicolò BonettiniReality Defender Inc.Verified email at realitydefender.com
- Pedro Comesaña AlfaroSignal Processing in Communications Group (GPSC), atlanTTic Research Center, University of VigoVerified email at gts.tsc.uvigo.es
- Neri MerhavProfessor of Electrical Engineering, Technion, Israel.Verified email at ee.technion.ac.il
- Riccardo LazzerettiSapienza University of RomeVerified email at diag.uniroma1.it
- Zhe ChenUT Southwestern Medical CenterVerified email at utsouthwestern.edu
Follow
Benedetta Tondi
Department of Information Engineering of the University of Siena
Verified email at unisi.it - Homepage