CURRICULUM VITAE OF RUGGERO DONIDA LABATI January 31, 2014 1 Contact Information Ruggero Donida Labati Department of Computer Science Universit` a degli Studi di Milano Via Bramante 65 - 26013 Crema (CR), Italy Phone: +39 02 503 30088 Fax: +39 02 503 30010 email: [email protected] http://homes.di.unimi.it/donida 2 Education 2.1 Academia and school • February 26, 2013: Ph.D. degree in Computer Science, Universit` a degli Studi di Milano, Italy; thesis “Contactless Fingerprint Biometrics: Acquisition, Processing, and Privacy Protection”. Advisors: Prof. Vincenzo Piuri, Dr. Fabio Scotti • December 18, 2008: Master’s degree in Computer Science, Universit` a degli Studi di Milano, Italy; thesis “Adaptive algorithms for iris segmentation”. Advisor: Dr. Fabio Scotti • October 11, 2006: Bachelor’s degree in Computer Science, Universit` a degli Studi di Milano, Italy; thesis “Distributed software applications for email event notification in complex approval procedures”. Advisor: Prof. Massimo Lazzaroni 2.2 Participation in International Schools • “First Intellicis Training School”, Albena, Bulgaria, October 10-13, 2011, on the design of hardware and software methods for monitoring critical industrial and environmental scenarios • “International Computer Vision Summer School”, Ragusa, Italy, July 11-16, 2011, on algorithms and advanced techniques for image processing, with particular focus on computer vision and computer graphics applications • “International Summer School for Advanced Studies on Biometric Authentication: Forensics, Security and Remote Identification”, Alghero, Italy, June 7-11, 2010, on biometric systems and algorithms, with particular focus on advanced techniques for forensic analyses, remote biometric technologies, and less-constrained biometric systems 1 3 Positions • February 2013 - present: Research Assistant, Department of Computer Science, Universit` a degli Studi di Milano, Italy; research on signal/image processing and computational intelligence techniques for biometric systems and industrial and environmental applications • January 2010 - December 2012: Research Grant for Ph.D. Students, Computer Science Doctorate School (XXV cycle), Universit` a degli Studi di Milano, Italy, under the supervisor Prof. Vincenzo Piuri, cosupervisor Dr. Fabio Scotti • March - December 2009: Research Grant, Department of Information Technologies, Universit` a degli Studi di Milano, Italy; research on signal/image processing and computational intelligence techniques for biometric systems • June - November 2008: Software Developer, Harding-IT S.R.L., Crema, Italy; research activities, design, and implementation of micrometric laser measurement systems 4 Visit in international research centers March - June, 2014: Visit Michigan State University, Michigan, USA. The research activity, in collaboration with prof. Arun Ross, focuses on less-constrained biometric systems. 5 Research 5.1 Scientific research activity His research interests are signal/image processing and computational intelligent techniques for biometrics and industrial and environmental applications. In particular, his research activities have been focused on the following areas (citations refer to publications reported in the Section 9). 5.1.1 Less-constrained and privacy preserving biometric systems He has studied innovative algorithms, methods, and systems for verification, identification, and continuous authentication, based on hard and soft biometric characteristics, in particular for security applications. In this context, his research has been focused on: less-constrained and highly-usable acquisition methods, feature extraction and matching techniques robust to noise, and template encryption and privacy protection techniques. Specifically: • Contactless fingerprint recognition He has studied innovative algorithms for less-constrained fingerprint systems. Particular attention has been given to techniques for reconstructing and processing three-dimensional models for live recognition applications [IJ-1], [BC-3], [IC-3], [IC-8], [IC-9], [IC-11], [IC-15], [Th-1] and forensics [IC-6]. He has also designed algorithms and techniques for feature extraction and processing of touchless images captured by single camera systems [BC-3], [IC-5], [IC-15], [IC-19], [IC-20], [Th-1]. 2 • Less-constrained biometric systems He has studied innovative algorithms and methods for the reducing operating and environmental constraints imposed by conventional biometric systems. In particular, his research has been focused on iris recognition systems based on images captured in uncontrolled light condition, at a distance, and on the move [IJ-3], [BC-1], [IC-21], [IC-22], [Th-2], as well as on surveillance applications based on soft biometric characteristics [IC-7]. • Privacy in biometrics He has studied original algorithms and methods for privacy preserving biometric systems. Particular attention has been given to algorithms and biometric systems based on fingerprint characteristics and template protection strategies [BC-2], [IC-16], [IC-17], [IC-18]. • Continuous authentication He has studied original algorithms and methods for continuous authentication systems. In particular, his research has been focused on biometric systems based on one-dimensional physiological signals, such as electrocardiogram [IC-1] and plethysmograph [IC-2]. 5.1.2 Industrial and environmental informatics He has studied multidimensional signals processing methods, computational intelligence techniques, and adaptive systems for industrial and environmental applications, with specific reference to monitoring, measuring, three-dimensional reconstruction, and classification problems. Particular attention has been given to algorithms and systems for three-dimensional reconstruction based on multiple views, adaptive algorithms for feature extraction from images and threedimensional models, and artificial neural networks for modelling and classification. As study cases, he has worked on wood panel manufacturing, contactless volumetric measurements, classification of microscopic images, and wildfire monitoring systems in forests. In particular, his research has been focused on the following areas: • Industrial informatics He has studied innovative algorithms and methods for qualitative and quantitative analysis of material and manufacturing processes, based on signals, images, and three-dimensional models. In particular, he has developed original algorithms, computational intelligence techniques, and systems for monitoring the wood panel production with low environmental impact [IC4], estimating the object volume based on multiple-camera images [IC-10], classifying wood panels [IC-23], and analyzing blood sample images acquired using microscopes [IC-14]. • Environmental informatics He has studied original algorithms, computational intelligence methods, and simulation techniques for environmental monitoring systems. Particular attention has been given to systems for monitoring wildfires based on networks of low cost cameras [IJ-2], [IC-12], [IC-13]. 3 5.2 Participation to national and international research projects • ABC4EU “Automatic Border Control for Europe”, funded by the European Union under the VII Framework Program, to the study and implementation of novel automatic border control systems (2014-2017) • PRIN “Data-centric Genomic Computing (GENDATA 2020)”, funded by the Italian Ministry of Research (MIUR), to study and design of advanced technological solutions for innovative medical systems (2013-2016) • I-PAN “Innovative Poplar Low Density Structural Panel”, funded by the European Union under the VII Framework Program, to the study and implementation of novel techniques for the production of innovative wood panels with low environmental impact (2012-2015) • “Computational intelligence methods and signal processing techniques for the prediction of the electrical energy production in systems based on renewable energy”, funded by Edison SPA (2013) • PrimeLife “Privacy and Identity Management in Europe for Life”, funded by the European Union under the VII Framework Program, to the study and implementation of privacy-aware solutions (2008-2011) • “UNIMI per il Futuro - 5 per Mille, Sistemi Adattativi per il Monitoraggio Ambientale”, funded by Universit` a degli Studi di Milano, to the study and design of adaptive techniques for the detection of wildfires (2009-2010) • PRIN 2007 “PRIV-AWARE: Elaborazione di Segnali Cifrati per la Tutela della Privacy nel Trattamento di Informazioni Sensibili”)”, funded by the Italian Ministry of Research (MIUR), to the study and implementation of secure and privacy preserving biometric systems (20082010) 5.3 Industrial research and development From June to November 2008, he has worked for the company Harding-IT S.R.L., Crema, Italy, performing research activities, design and implementation of micrometric laser measurement systems. He has been involved in the study, design, experimentation, and implementation of advanced algorithms for processing signals acquired by different kinds of sensors in micrometric laser measurement machines, mainly designed for mechanic and advanced manufacturing (http://www.microplangroup.com/mpg/ENG/non-contact measure machines.html). In this context, he has worked on the following topics: • Algorithms for the automatic recognition of the geometrical characteristics of the measured pieces He has studied morphologic techniques to estimate the objects shapes, so as to allow for automatic calibrating the measurement system and automatic choosing the proper measurements that have to be performed for every section of the mechanical pieces (e.g. heights, diameters, or angles). 4 • Adaptive calibration algorithms He has studied adaptive techniques for automatic calibrating the measurement systems, by analyzing different portions of the mechanical pieces in order to reduce systematic errors and overcome possible bad placements of the measured objects caused by human operators. • Filtering algorithms for the data acquired by the laser sensor He has tested and implemented different kinds of filters for removing the noise injected in the acquired profiles by the measurement system, considering polar and Cartesian coordinates, and evaluating different operating conditions. • Development of advanced applications for the analysis of measurement systems He has implemented a software for the evaluation of the measurement systems uncertainty, cooperating with Prof. Giulio Barbato of Politecnico di Torino. 6 Awards and honors • Winner of a Research Assistant position at Department of Computer Science, Universit` a degli Studi di Milano, Italy (February 2013 - January 2014) • National scholarship for Ph.D. students at Universit` a degli Studi di Milano, Italy (January 2010 - December 2012) • Scholarship for a post-MS research period at Department of Computer Science, Universit` a degli Studi di Milano, Italy (March - December 2009) • In the context of the Master’s degree thesis Adaptive Algorithms for Iris Segmentation, he studied and implemented algorithms for segmenting iris images captured at high distance, on the move, and in uncontrolled light conditions. He contributed to the design and the implementation of an approach for segmenting iris images captured at high distance, on the move, and in uncontrolled light conditions. The approach was submitted to the international competition “NICE.I (Noisy Iris Challenge Evaluation)”, sponsored by Elsevier Science and organized by the Soft Computing and Image Analysis Group (SOCIA Lab), Department of Computer Science, University of Beira Interior, Portugal (http://nice1.di.ubi.pt). The approach was ranked in the top 8 (out of 97), which were invited to submit a paper on the techniques to the special issue on “Iris Images Segmentation” of the “Image and Vision Computing” journal. The paper was subject to regular rigorous review process and was accepted [IJ-3]. 5 7 Teaching and Seminars 7.1 Support to teaching activities [Art. 47, Regolamento Generale d’Ateneo] • Seminar lectures for the course Intelligent Systems of the master degree program in Computer Science, 20 hours (academic year 2013-2014) • Support to exams of the course Intelligent Systems of the master degree program in Computer Science, 15 hours (academic year 2013-2014) • Seminar lectures for the course Operating System I of the bachelor degree program in Computer Science, 10 hours (academic year 2012-2013) • Support to exams of the course Operating System I of the bachelor degree program in Computer Science, 10 hours (academic year 2012-2013) • Seminar lectures for the course Intelligent Systems for the Environmental Monitoring and Control of the master degree program in Computer Science, 20 hours (academic year 20112012) • Seminar lectures for the course Operating System of the bachelor degree program in Computer Science, 20 hours (academic year 2010-2011) 7.2 Educational seminars at the Universit` a degli Studi di Milano • “Realization of fuzzy systems in Matlab” for the course Intelligent systems of the master degree program in Computer Science (academic years 2013-2014, 2012-2013, 2011-2012, 2010-2011, 2009-2010) • “Development techniques in Matlab” for the course Intelligent systems of the master degree curriculum in Computer Science (academic years 2013-2014, 2012-2013, 2011-2012, 2010-2011) • “Realization of neural classifiers in Matlab” for the course Intelligent systems of the master degree curriculum in Computer Science (academic years 2013-2014, 2012-2013, 2011-2012) • “Implementation of evolutionary algorithms in Matlab” for the course Intelligent systems of the master degree curriculum in Computer Science (academic years 2013-2014, 2011-2012, 2010-2011, 2009-2010) • “Techniques for the implementation of biometric systems in Matlab” for the course Biometric Systems of the master degree curriculum in Computer Science (academic years 2013-2014, 2011-2012, 2010-2011, 2009-2010, 2008-2009) 7.3 Research seminars at Universit` a degli Studi di Milano • “Unconstrained Iris Recognition: Segmentation and Identification Techniques”, January 30, 2013 • “Privacy in Biometrics: A Privacy-compliant Fingerprint Recognition System”, January 22, 2013 • “Wildfire Detection and Simulation Using Image Processing Techniques”, January 17, 2013 • “Soft Biometrics: Weight Estimation from Frame Sequences of Walking Individuals”, January 9, 2013 6 7.4 Supervision of theses • Co-supervisor of several bachelor degree theses (programs in Computer Science and Security of Computer Systems and Networks of the Universit` a degli Studi di Milano) on biometric systems • Co-supervisor of one master degree thesis (program in Computer Science of Universit` a degli Studi di Milano) on three-dimensional biometric systems 8 Organization and Service Activities 8.1 Organizational activities in scientific associations • Secretary of the Italian Chapter of the IEEE Computational Intelligence Society (since April 2013) • Webmaster of the IEEE Systems Journal (since January 2013) • IEEE Member and member of the IEEE Computational Intelligence Society (since 2010) 8.2 Editorial activity He has been a reviewer for several international scientific conferences and workshops (including various sponsored by IEEE) and for the following international scientific journals: • Elsevier Pattern Recognition Letters • IEEE Systems Journal • Elsevier Signal Processing • IET Biometrics 8.3 8.3.1 Conference activities Organization of international scientific conferences • Program co-chair for the 2014 IEEE Workshop on Environmental Energy and Structural Monitoring Systems (IEEE EESMS 2014), Naples, Italy, September, 17-18, 2014 • Special session co-chair for the 2014 IEEE International Symposium on INnovations in Intelligent SysTems and Applications (IEEE INISTA 2014), Alberobello, Italy, June, 23-25, 2014 • Treasurer for the 2014 IEEE International Symposium on INnovations in Intelligent SysTems and Applications (IEEE INISTA 2014), Alberobello, Italy, June, 23-25, 2014 • Publication chair for the 2013 IEEE Workshop on Biometric Measurements and Systems for Security and Medical Applications (IEEE BioMS 2013), Napoli, Italy, September 9, 2013 • Local arrangement chair for the 2013 IEEE International Conference on Computational Intelligence and Virtual Environments for Measurement Systems and Applications (IEEE CIVEMSA 2013), Milan, Italy, July 15-17, 2013 7 • Publicity chair for the 2012 IEEE Workshop on Biometric Measurements and Systems for Security and Medical Applications (IEEE BioMS 2012), Salerno, Italy, September 14, 2012 • Publicity chair for the 2011 IEEE Workshop on Biometric Measurements and Systems for Security and Medical Applications (IEEE BioMS 2011), Milano, Italy, September 28, 2011 • Publicity chair for the 2010 IEEE Workshop on Biometric Measurements and Systems for Security and Medical Applications (IEEE BioMS 2010), Taranto, Italy, September 9, 2010 8.3.2 Member of technical program committee of conferences • XXI World Congress IMEKO, sponsored by the International Measurement Confederation (IMEKO), Prague, Czech Republic, August 30 - September 4, 2015 • 7th International Conference on Emerging Security Information, Systems and Technologies (SECURWARE 2014), with technical co-sponsor IARIA (International Academy, Reasearch, and Industry Association), Lisbon, Portugal, November 16-20, 2014 • 3rd International Conference on Advances in Computing, Communications & Informatics (ICACCI 2014), with technical co-sponsor IEEE, Delhi, India, September 24-27, 2014 • 10th International Conference on Artificial Intelligence Applications and Innovations Conference (AIAI 2014), Island of Rhodes, Grece, September 19-21, 2014 • 9th International Conference on Future Networks and Communications (FNC 2014), Niagara Falls, Ontario, Canada, August 17-20, 2014 • 2014 IEEE International Conference on Computational Intelligence and Virtual Environments for Measurement Systems and Applications (IEEE CIVEMSA 2014), Ottawa, Canada, May 5-7, 2014 • 2014 International Conference on Electronic Publishing and Information Technology (ICEPIT 2014), Bahrain, April 22-24, 2014 • 11th International Multi-Conference on Systems, Signals and Devices (SSD 2014), with technical co-sponsor IEEE, Castelldefels-Barcelona, Spain, February 11-14, 2014 • 10th IEEE International Conference on Autonomic and Trusted Computing (IEEE ATC 2013), Sorrento Peninsula, Italy, December 18-21, 2013 • 2013 IEEE International Conference on Smart Instrumentation, Measurement and Applications (IEEE ICSIMA 2013), Kuala Lumpur, Malaysia, November 26-27, 2013 • 4th IEEE International Symposium on Trust, Security and Privacy for Emerging Applications (IEEE TSP-13), Zhangjiajie, China, November 11-13, 2013 • 9th International Conference on Artificial Intelligence Applications and Innovations Conference (AIAI 2013), Paphos, Cyprus, September 30 - October 2, 2013 • 4th International Conference on Computer and Communication Technology (ICCT 2013),with technical co-sponsor IEEE, Allhabad, India, September 20-22, 2013 • 14th Conference on Engineering Applications of Neural Networks (EANN 2013), with technical co-sponsor Springer, Halkidiki, Greece, September 19-22, 2013 8 • 2013 IEEE Workshop on Biometric Measurements and Systems for Security and Medical Applications (IEEE BioMS 2013), Napoli, Italy, September 9, 2013 • 7th International Conference on Emerging Security Information, Systems and Technologies (SECURWARE 2013), with technical co-sponsor IARIA (International Academy, Reasearch, and Industry Association), Reykjav´ık, Iceland, August 25-31, 2013 • 2013 IEEE International Conference on Green Computing and Communications (IEEE GreenCom 2013), Barcelona, Spain, August 20-23, 2013 • 10th International Conference on Security and Cryptography (SECRYPT 2013), Barcelona, Spain, July 29-31, 2013 • 12th IEEE International Conference on Trust, Security and Privacy in Computing and Communications (IEEE TrustCom-13), Melbourne, Australia, July 16-18, 2013 • 2013 IEEE International Conference on Computational Intelligence and Virtual Environments for Measurement Systems and Applications (IEEE CIVEMSA 2013), Milan, Italy, July 15-17, 2013 • 3rd International Conference on Computer and Communication Technology (ICCT 2012), with technical co-sponsor IEEE Allhabad, India, November 23-25, 2012 • 13th Engineering Applications of Neural Networks / Artificial Intelligence Applications and Innovations (AIAI 2012), Halkidiki, Greece, September 27-30, 2012 • 2012 IEEE Workshop on Biometric Measurements and Systems for Security and Medical Applications (IEEE BioMS 2012), Salerno, Italy, September 14, 2012 • 6th International Conference on Emerging Security Information, Systems and Technologies (SECURWARE 2012), with technical co-sponsor IARIA (International Academy, Reasearch, and Industry Association), Rome, Italy, August 19-24, 2012. • 2012 IEEE International Conference on Computational Intelligence for Measurement Systems and Applications (IEEE CIMSA 2012), Tianjin, China, July 2-4, 2012 • 2012 IEEE International Conference on Virtual Environments, Human-Computer Interfaces and Measurement Systems (IEEE VECIMS 2012), Tianjin, China, July 2-4, 2012 • 12th IEEE International Conference on Trust, Security and Privacy in Computing and Communications (IEEE TrustCom-12), Liverpool, UK, June 25-27, 2012 • International Conference on Autonomous and Intelligent Systems (AIS 2012), Aveiro, Portugal, June 25-27, 2012 • 10th IEEE International Conference on Trust, Security and Privacy in Computing and Communications (IEEE TrustCom-11), Changsha, China, November 16-18, 2011 • 2011 IEEE International Conference on Computational Intelligence for Measurement Systems and Applications (IEEE CIMSA 2011), Ottawa, Canada, September 19-21, 2011 • 12th Engineering Applications of Neural Networks / Artificial Intelligence Applications and Innovations (AIAI 2011), Corfu, Greece, September 15-18, 2011 9 8.4 8.4.1 Participation to international conferences Presentation of papers to international conferences He presented the following papers of which he is a coauthor in international scientific conferences [7, 8, 10, 11, 13, 14, 17, 18, 19, 20, 21, 24, 25] 8.4.2 Attendance at international conferences • 2013 IEEE International Workshop on Information Forensics and Security (WIFS 2013), Guangzhou, China, November 18-21, 2013 • 2013 IEEE Workshop on Biometric Measurements and Systems for Security and Medical Applications (IEEE BioMS 2013), Napoli, Italy, September 9, 2013 • 2013 IEEE International Conference on Computational Intelligence and Virtual Environments for Measurement Systems and Applications (IEEE CIVEMSA 2013), Milan, Italy, July 15-17, 2013 • 2012 IEEE International Conference on Computational Intelligence for Measurement Systems and Applications (IEEE CIMSA 2012), Tianjin, China, July 2-4, 2013 • 2012 IEEE International Conference on Virtual Environments, Human-Computer Interfaces and Measurement Systems (IEEE VECIMS 2012), Tianjin, China, July 2-4, 2013 • 2011 IEEE Workshop on Biometric Measurements and Systems for Security and Medical Applications (IEEE BioMS 2011), Milan, Italy, September 28, 2011 • COST IntelliCIS Workshop 5, COST Action IC0806: Intelligent Monitoring, Control and Security of Critical Infrastructure Systems (IntelliCIS), Milan, Italy, September 27, 2011 • 2011 IEEE International Conference on Computational Intelligence for Measurement Systems and Applications (IEEE CIMSA 2011), Ottawa, Canada, September 19-21, 2011 • 2011 IEEE International Conference on Virtual Environments, Human-Computer Interfaces and Measurement Systems (IEEE VECIMS 2011), Ottawa, Canada, September 19-21, 2011 • 2011 IEEE International Conference on Image Processing (IEEE ICIP 2011), Brussels, Belgium, September 11-14, 2011 • 5th International Conference on Network and System Security (NSS 2011), Milan, Italy, September 6-8, 2011 • 2011 IEEE Symposium Series on Computational Intelligence (IEEE SSCI 2011), Paris, France, April 11-15, 2011 • 2010 IEEE Workshop on Biometric Measurements and Systems for Security and Medical Applications (IEEE BioMS 2010), Taranto, Italy, September 9, 2010 • 2010 IEEE International Conference on Computational Intelligence for Measurement Systems and Applications (IEEE CIMSA 2010), Taranto, Italy, September 6-8, 2010 • 2010 IEEE International Conference on Virtual Environments, Human-Computer Interfaces and Measurement Systems (IEEE VECIMS 2010), Taranto, Italy, September 6-8, 2010 10 9 Publications H-index: 8 (by Google Scholar , http://scholar.google.com/citations?user=74pn0mkAAAAJ) 9.1 Refereed Papers in International Journals [IJ-1] R. Donida Labati, A. Genovese, V. Piuri, and F. Scotti, “Touchless fingerprint biometrics: a survey on 2D and 3D technologies,” Journal of Internet Technology, 2014, Accepted. [IJ-2] R. Donida Labati, A. Genovese, V. Piuri, and F. Scotti, “Wildfire smoke detection using computational intelligence techniques enhanced with synthetic smoke plume generation,” IEEE Transactions on Systems, Man and Cybernetics: Systems, vol. 43, no. 4, pp. 1003– 1012, Jul. 2013. [IJ-3] R. Donida Labati and F. Scotti, “Noisy iris segmentation with boundary regularization and reflections removal,” Image and Vision Computing, Iris Images Segmentation Special Issue, vol. 28, no. 2, pp. 270–277, Feb. 2010. 9.2 Chapters in Books [BC-1] R. Donida Labati, A. Genovese, V. Piuri, and F. Scotti, “Iris segmentation: state of the art and innovative methods,” in Cross Disciplinary Biometric Systems, ser. Intelligent Systems Reference Library, C. Liu and V. Mago, Eds., vol. 37, Springer, 2012, pp. 151–182. [BC-2] R. Donida Labati, V. Piuri, and F. Scotti, “Biometric privacy protection: guidelines and technologies,” in Communications in Computer and Information Science, M. S. Obaidat, J. Sevillano, and F. Joaquim, Eds., vol. 314, Springer, 2012, pp. 3–19. [BC-3] R. Donida Labati and F. Scotti, “Fingerprint,” in Encyclopedia of Cryptography and Security (2nd ed.) H. van Tilborg and S. Jajodia, Eds., Springer, 2011, pp. 460–465. 9.3 Refereed Papers in Proceedings of International Conference and Workshop [IC-1] R. Donida Labati, R. Sassi, and F. Scotti, “ECG biometric recognition: permanence analysis of QRS signals for 24 hours continuous authentication,” in Proc. of the IEEE International Workshop on Information Forensics and Security (WIFS 2013), Guangzhou, China, Nov. 2013. [IC-2] A. Bonissi, R. Donida Labati, L. Perico, R. Sassi, F. Scotti, and L. Sparagino, “A preliminary study on continuous authentication methods for photoplethysmographic biometrics,” in Proc. of the 2013 IEEE Workshop on Biometric Measurements and Systems for Security and Medical Applications (BioMS 2013), Napoli, Italy, Sep. 2013, pp. 28–33. [IC-3] R. Donida Labati, A. Genovese, V. Piuri, and F. Scotti, “Accurate 3D fingerprint virtual environment for biometric technology evaluations and experiment design,” in Proc. of the 2013 IEEE Int. Conf. on Computational Intelligence and Virtual Environments for Measurement Systems and Applications (CIVEMSA 2013), Milan, Italy, Jul. 2013, pp. 43– 48. [IC-4] R. Donida Labati, A. Genovese, V. Piuri, and F. Scotti, “A virtual environment for the simulation of 3D wood strands in multiple view systems for the particle size measurements,” in Proc. of the 2013 IEEE Int. Conf. on Computational Intelligence and Virtual Environments for Measurement Systems and Applications (CIVEMSA 2013), Milan, Italy, Jul. 2013, pp. 162–167. 11 [IC-5] R. Donida Labati, A. Genovese, V. Piuri, and F. Scotti, “Contactless fingerprint recognition: a neural approach for perspective and rotation effects reduction,” in Proc. of the IEEE Workshop on Computational Intelligence in Biometrics and Identity Management (CIBIM), Singapore, Singapore, Apr. 2013, pp. 22–30. [IC-6] R. Donida Labati, A. Genovese, V. Piuri, and F. Scotti, “Two-view contactless fingerprint acquisition systems: a case study for clay artworks,” in Proc. of the 2012 IEEE Workshop on Biometric Measurements and Systems for Security and Medical Applications (BioMS 2012), Salerno, Italy, Sep. 2012, pp. 1–8. [IC-7] R. Donida Labati, A. Genovese, V. Piuri, and F. Scotti, “Weight estimation from frame sequences using computational intelligence techniques,” in Proc. of the 2012 IEEE International Conference on Computational Intelligence for Measurement Systems and Applications (CIMSA 2012), Tianjin, China, Jul. 2012, pp. 29–34. [IC-8] R. Donida Labati, A. Genovese, V. Piuri, and F. Scotti, “Virtual environment for 3-D synthetic fingerprints,” in Proc. of the 2012 IEEE International Conference on Virtual Environments, Human-Computer Interfaces and Measurement Systems (VECIMS 2012), Tianjin, China, Jul. 2012, pp. 48–53. [IC-9] R. Donida Labati, A. Genovese, V. Piuri, and F. Scotti, “Quality measurement of unwrapped three-dimensional fingerprints: a neural networks approach,” in Proc. of the 2012 IEEE-INNS International Joint Conference on Neural Networks (IJCNN 2012), Brisbane, Australia, Jun. 2012, pp. 1123–1130. [IC-10] R. Donida Labati, A. Genovese, V. Piuri, and F. Scotti, “Low-cost volume estimation by two-view acquisitions: a computational intelligence approach,” in Proc. of the 2012 IEEE-INNS International Joint Conference on Neural Networks (IJCNN 2012), Brisbane, Australia, Jun. 2012, pp. 1092–1099. [IC-11] R. Donida Labati, A. Genovese, V. Piuri, and F. Scotti, “Fast 3-D fingertip reconstruction using a single two-view structured light acquisition,” in Proc. of the 2011 IEEE Workshop on Biometric Measurements and Systems for Security and Medical Applications (BioMS 2011), Milan, Italy, Sep. 2011, pp. 1–8. [IC-12] A. Genovese, R. Donida Labati, V. Piuri, and F. Scotti, “Wildfire smoke detection using computational intelligence techniques,” in Proc. of the IEEE 2011 International Conference on Computational Intelligence for Measurement Systems and Applications (CIMSA 2011), Ottawa, ON, Canada, Sep. 2011, pp. 1–6. [IC-13] A. Genovese, R. Donida Labati, V. Piuri, and F. Scotti, “Virtual environment for synthetic smoke clouds generation,” in Proc. of the 2011 IEEE International Conference on Virtual Environments, Human-Computer Interfaces and Measurement Systems (VECIMS 2011), Ottawa, Canada, Sep. 2011, pp. 1–6. [IC-14] R. Donida Labati, V. Piuri, and F. Scotti, “ALL-IDB: the acute lymphoblastic leukemia image database for image processing,” in Proc. of the 2011 IEEE International Conference on Image Processing (ICIP 2011), Brussels, Belgium, Sep. 2011, pp. 2045–2048. [IC-15] R. Donida Labati, V. Piuri, and F. Scotti, “A neural-based minutiae pair identification method for touchless fingeprint images,” in Prof. of the 2011 IEEE Workshop on Computational Intelligence in Biometrics and Identity Management (CIBIM 2011), Paris, France, Apr. 2011, pp. 96–102. 12 [IC-16] M. Barni, T. Bianchi, D. Catalano, M. D. Raimondo, R. Donida Labati, P. Failla, D. Fiore, R. Lazzeretti, V. Piuri, F. Scotti, and A. Piva, “A privacy-compliant fingerprint recognition system based on homomorphic encryption and fingercode templates,” in Proc. of the 2010 IEEE International Conference on Biometrics: Theory Applications and Systems (BTAS 2010), Washington, D.C., USA, Sep. 2010, pp. 1–7. [IC-17] M. Barni, T. Bianchi, D. Catalano, M. D. Raimondo, R. Donida Labati, P. Failla, D. Fiore, R. Lazzeretti, V. Piuri, F. Scotti, and A. Piva, “Privacy-preserving fingercode authentication,” in Proc. of the 2010 ACM Workshop on Multimedia and Security, New York, NY, USA, Sep. 2010, pp. 231–240. [IC-18] T. Bianchi, R. Donida Labati, V. Piuri, A. Piva, F. Scotti, and S. Turchi, “Implementing fingercode-based identity matching in the encrypted domain,” in Proc. of the 2010 IEEE Workshop on Biometric Measurements and Systems for Security and Medical Applications (BIOMS 2010), Taranto, Italy, Sep. 2010, pp. 15–21. [IC-19] R. Donida Labati, A. Genovese, V. Piuri, and F. Scotti, “Measurement of the principal singular point in contact and contactless fingerprint images by using computational intelligence techniques,” in Proc. of the 2010 IEEE International Conference on Computational Intelligence for Measurement Systems and Applications (CIMSA 2010), Taranto, Italy, Sep. 2010, pp. 18–23. [IC-20] R. Donida Labati, V. Piuri, and F. Scotti, “Neural-based quality measurement of fingerprint images in contactless biometric systems,” in Proc. of the 2010 IEEE-INNS International Joint Conference on Neural Networks (IJCNN 2010), Barcelona, Spain, Jul. 2010, pp. 1–8. [IC-21] R. Donida Labati, V. Piuri, and F. Scotti, “Agent-based image iris segmentation and multiple views boundary refining,” in Proc. of the 2009 IEEE International Conference on Biometrics: Theory, Applications and Systems (BTAS 2009), Washington, D.C., USA, Sep. 2009, pp. 1–7. [IC-22] R. Donida Labati, V. Piuri, and F. Scotti, “Neural-based iterative approach for iris detection in iris recognition systems,” in Proc. of the IEEE Symposium on Computational Intelligence for Security and Defence Applications (CISDA 2009), Ottawa, Canada, Jul. 2009, pp. 1–6. [IC-23] R. Donida Labati, V. Piuri, and F. Scotti, “A low-cost neural-based approach for wood types classification,” in Proc. of the 2009 IEEE International Conference on Computational Intelligence for Measurement Systems and Applications (CIMSA 2009), Hong Kong, China, May 2009, pp. 199–203. 9.4 Theses [Th-1] R. Donida Labati, Contactless Fingerprint Biometrics: Acquisition, Processing, and Privacy Protection. Ph.D. Thesis, Universita’ degli Studi di Milano, Mar. 2013. [Th-2] R. Donida Labati, Algoritmi Adattativi per la Segmentazione di Immagini Iridee (Adaptive Algorithms for the Segmentation of Iris Images). M.S. Thesis, Universita’ degli Studi di Milano, Dec. 2008. 13
© Copyright 2025 ExpyDoc