Publications

Export 389 results:
Submitted
S. Raudys, Fumera, G., Raudys, A., and Roli, F., Sample size issues in trainable fusion rules and in best classifier selection, IEEE Transactions on Pattern Analysis and Machine Intelligence, Submitted.
In Press
I. Pillai, Fumera, G., and Roli, F., Designing multi-label classifiers that maximize F measures: state of the art, Pattern Recognition, In Press.
W. W. Y. Ng, Hu, J., Yeung, D., Yin, S., and Roli, F., Diversified Sensitivity based Undersampling for Imbalance Classification Problems, IEEE Transactions on Cybernetics, In Press. (1.91 MB)
G. Suarez-Tangil, Dash, S. Kumar, Ahmadi, M., Kinder, J., Giacinto, G., and Cavallaro, L., DroidSieve: Fast and Accurate Classification of Obfuscated Android Malware, in Proceedings of the Seventh {ACM} Conference on Data and Application Security and Privacy, {CODASPY} 2017, In Press. (478.59 KB)
R. Soleymani, Granger, E., and Fumera, G., Loss Factors for Learning Boosting Ensembles from Imbalanced Data, in 23rd International Conference on Pattern Recognition (ICPR 2016), Cancún, Mexico, In Press.
S. Rota Bulò, Biggio, B., Pillai, I., Pelillo, M., and Roli, F., Randomized Prediction Games for Adversarial Machine Learning, IEEE Transactions on Neural Networks and Learning Systems, vol. PP, pp. 1-13, In Press. (1.52 MB) (256.21 KB)
Y. Guan, Li, C. - T., and Roli, F., On Reducing the Effect of Covariate Factors in Gait Recognition: a Classifier Ensemble Method, IEEE Transactions on Pattern Analysis and Machine Intelligence, In Press. (311.43 KB) (151.4 KB)
D. Maiorca, Mercaldo, F., Giacinto, G., Visaggio, A., and Martinelli, F., R-PackDroid: API Package-Based Characterization and Detection of Mobile Ransomware, in ACM Symposium on Applied Computing (SAC 2017 - Acceptance Rate 15.7%), In Press. (272.44 KB)
J. Galbally and Satta, R., Three-dimensional and two-and-a-half- dimensional face recognition spoofing using three-dimensional printed models, IET Biometrics, In Press. (1.33 MB)
2017
D. Maiorca, Russu, P., Corona, I., Biggio, B., and Giacinto, G., Detection of Malicious Scripting Code through Discriminant and Adversary-Aware API Analysis, in 1st Italian Conference on CyberSecurity (ITASEC), 2017, vol. 1816, pp. 96-105. (371.53 KB)
A. Demontis, Biggio, B., Fumera, G., Giacinto, G., and Roli, F., Infinity-norm Support Vector Machines against Adversarial Label Contamination, 1st Italian Conference on CyberSecurity (ITASEC). Venice, Italy , pp. 106-115, 2017.
L. Piras and Giacinto, G., Information Fusion in Content Based Image Retrieval: A Comprehensive Overview, Information Fusion, vol. 37, pp. 50-60, 2017. (734.6 KB)
B. Biggio, Fumera, G., Marcialis, G. L., and Roli, F., Statistical Meta-Analysis of Presentation Attacks for Secure Multibiometric Systems, IEEE Transactions on Pattern Analysis and Machine Intelligence, vol. 39, no. 3, pp. 561-575, 2017. (5.7 MB)
2016
M. A. A. Dewan, Granger, E., Marcialis, G. L., Sabourin, R., and Roli, F., Adaptive Appearance Model Tracking for Still-to-Video Face Recognition, Pattern Recognition, vol. 49, no. 1, 2016. (6.51 MB)
F. Zhang, Chan, P. P. K., Biggio, B., Yeung, D. S., and Roli, F., Adversarial Feature Selection Against Evasion Attacks, IEEE Transactions on Cybernetics, vol. 46, no. 3, pp. 766-777, 2016. (2.12 MB)
R. Soleymani, Granger, E., and Fumera, G., Classifier Ensembles with Trajectory Under-Sampling for Face Re-Identification, in 5th International Conference on Pattern Recognition Applications and Methods (ICPRAM 2016), Rome, Italy, 2016, vol. 1, pp. 97-108.
M. Mauri, Mulas, A., and Ariu, D., The Dark Side of Open Data, 2nd International Workshop on Knowledge Discovery on the WEB (KDWEB). Cagliari, 2016. (124.62 KB) (1.33 MB)
D. Maiorca, Design and Implementation of Robust Systems for Secure Malware Detection (Ph.D. Thesis), University of Cagliari, Italy, Cagliari, 2016. (5.34 MB)
M. Ahmadi, Biggio, B., Arzt, S., Ariu, D., and Giacinto, G., Detecting Misuse of Google Cloud Messaging in Android Badware, in 6th Workshop on Security and Privacy in Smartphones and Mobile Devices (SPSM), Vienna, Austria, 2016, pp. 103-112. (626.38 KB)
S. Kumar Dash, Suarez-Tangil, G., Khan, S., Tam, K., Ahmadi, M., Kinder, J., and Cavallaro, L., DroidScribe: Classifying Android Malware Based on Runtime Behavior, in Mobile Security Technologies (MoST 2016), 2016. (571.22 KB)
J. Hoffmann, Rytilahti, T., Maiorca, D., Winandy, M., Giacinto, G., and Holz, T., Evaluating Analysis Tools for Android Apps: Status Quo and Robustness Against Obfuscation, Horst Görtz Institut for IT Security (Ruhr-University Bochum), Technical Report TR-HGI-2016-003, 2016. (519.16 KB)
J. Hoffmann, Rytilahti, T., Maiorca, D., Winandy, M., Giacinto, G., and Holz, T., Evaluating Analysis Tools for Android Apps: Status Quo and Robustness against Obfuscation, Proceedings of the 6th ACM Conference on Data and Application Security and Privacy (CODASPY 2016, 09-11 March, 2016). 2016. (726.65 KB)
M. Villegas, Müller, H., de Herrera, A. García Se, Schaer, R., Bromuri, S., Gilbert, A., Piras, L., Wang, J., Yan, F., Ramisa, A., Dellandrea, E., Gaizauskas, R., Puigcerver, K. Mikolajczy, Toselli, A. H., Sánchez, J. - A., and Vidal, E., General Overview of ImageCLEF at the CLEF 2016 Labs, in Lecture Notes in Computer Science, Springer International Publishing, 2016. (1.07 MB)
I. Rida, Jiang, X., and Marcialis, G. L., Human Body Part Selection by Group Lasso of Motion for Model-Free Gait Recognition, IEEE Signal Processing Letters, vol. 23, no. 1, 2016. (692.14 KB)
D. - T. Dang-Nguyen, Piras, L., Riegler, M., Gurrin, C., Boato, G., and Halvorsen, P., ImageCLEF 2017 LifeLog task, in Challenges in Machine Learning: Gaming and Education (CiML - NIPS 2016 workshop), Barcelona, Spain, 2016. (80.25 KB)

Pages