Davide Cavagnino

According to our database1, Davide Cavagnino authored at least 36 papers between 1997 and 2022.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2022
Lung nodules segmentation from CT with DeepHealth toolkit.
CoRR, 2022

Lung Nodules Segmentation with DeepHealth Toolkit.
Proceedings of the Image Analysis and Processing. ICIAP 2022 Workshops, 2022

2021
Correction to: Anomaly Detection Techniques in the Gaia Space Mission Data.
J. Signal Process. Syst., 2021

Anomaly Detection Techniques in the Gaia Space Mission Data.
J. Signal Process. Syst., 2021

NeuNAC: A novel fragile watermarking algorithm for integrity protection of neural networks.
Inf. Sci., 2021

2020
Reversible Fragile Watermarking for Multichannel Images with High Redundancy Channels.
Multim. Tools Appl., 2020

Delving in the loss landscape to embed robust watermarks into neural networks.
Proceedings of the 25th International Conference on Pattern Recognition, 2020

2019
A Deep Learning Approach to Anomaly Detection in the Gaia Space Mission Data.
Proceedings of the Advances in Computational Intelligence, 2019

2017
Image Fragile Watermarking through Quaternion Linear Transform in Secret Space.
J. Imaging, 2017

Alpha Channel Fragile Watermarking for Color Image Integrity Protection.
J. Imaging, 2017

2016
A modular framework for color image watermarking.
Signal Process., 2016

Global and local anomaly detectors for tumor segmentation in dynamic pet acquisitions.
Proceedings of the 2016 IEEE International Conference on Image Processing, 2016

2015
Fragile watermarking using Karhunen-Loève transform: the KLT-F approach.
Soft Comput., 2015

High capacity reversible data hiding and content protection for radiographic images.
Signal Process., 2015

SS-SVD: Spread spectrum data hiding scheme based on Singular Value Decomposition.
Proceedings of the International Symposium on Consumer Electronics, 2015

On the security of the schur-based watermarking schemes.
Proceedings of the 2015 IEEE International Conference on Digital Signal Processing, 2015

2014
Protecting the Content Integrity of Digital Imagery with Fidelity Preservation: An Improved Version.
ACM Trans. Multim. Comput. Commun. Appl., 2014

Automatic Selection of GA Parameters for Fragile Watermarking.
Proceedings of the Applications of Evolutionary Computation - 17th European Conference, 2014

2013
Weighted-Sum Fragile Watermarking in the Karhunen-Loève Domain.
Proceedings of the Security and Trust Management - 9th International Workshop, 2013

2011
Security analysis of SVD-based watermarking techniques.
Int. J. Multim. Intell. Secur., 2011

An Analysis of Associated Dividends in the DBM Algorithm for Division by Constants Using Multiplication.
Comput. J., 2011

Blind Watermarking of Color Images Using Karhunen-Loève Transform Keying.
Comput. J., 2011

KL-F: Karhunen-Loève based fragile watermarking.
Proceedings of the 5th International Conference on Network and System Security, 2011

2010
Discretization of 3D Models Using Voxel Elements of Different Shapes.
Proceedings of the 6th International Symposium on Computational Aesthetics in Graphics, 2010

2009
A Novel Block-based Watermarking Scheme Using the SVD Transform.
Algorithms, 2009

2008
Efficient Algorithms for Integer Division by Constants Using Multiplication.
Comput. J., 2008

2007
Secure Logging for Irrefutable Administration.
Int. J. Netw. Secur., 2007

2005
Dealing with packet loss in the Interactive Chained Stream Authentication protocol.
Comput. Secur., 2005

2004
Server-Based Access Verification.
Proceedings of the Electronic Government and Commerce: Design, Modeling, Analysis and Security, 2004

2002
Individual Authentication in Multiparty Communications.
Comput. Secur., 2002

2000
Use of IFS Codes for Learning 2D Isolated-Object Classification Systems.
Comput. Vis. Image Underst., 2000

Chained Stream Authentication.
Proceedings of the Selected Areas in Cryptography, 7th Annual International Workshop, 2000

Individual Single Source Authentication on the MBone.
Proceedings of the 2000 IEEE International Conference on Multimedia and Expo, 2000

1999
Issues in Multicast Security.
Proceedings of the Security Protocols, 1999

1998
XFF: A Simple Method to eXtract Fractural Features for 2D Object Recognition.
Proceedings of the Advances in Pattern Recognition, 1998

1997
Extraction of Discriminant Features from Image Fractal Encoding.
Proceedings of the AI*IA 97: Advances in Artificial Intelligence, 1997


  Loading...