Publications

Export 31 results:
Filters: First Letter Of Title is P  [Clear All Filters]
Book Chapter
F. Roli and Giacinto, G., Pattern Recognition for Intrusion Detection in Computer Networks, in Pattern Recognition and String Matching, D. Chen and Cheng, X. Kluwer Academic Publishers, 2002.
R. Satta, Pala, F., Fumera, G., and Roli, F., People search with textual queries about clothing appearance attributes, in Person Re‐Identification, Advances in Computer Vision and Pattern Recognition, S. Gong, Cristani, M., Yan, S., and Loy, C. Change Springer, 2014. (1.07 MB)
Conference Paper
L. Piras, Giacinto, G., and Paredes, R., Passive-Aggressive Online Learning for Relevance Feedback in Content Based Image Retrieval, in 2nd International Conference on Pattern Recognition Applications and Methods (ICPRAM), Barcelona, Spain, 2013. (138.32 KB)
D. Maiorca, Giacinto, G., and Corona, I., A Pattern Recognition System for Malicious PDF Files Detection, in MLDM - International Conference on Machine Learning and Data Mining, Berlin, 2012, vol. 7376, pp. 510-524. (1.74 MB)
F. Roli, Biggio, B., and Fumera, G., Pattern Recognition Systems Under Attack, in Progress in Pattern Recognition, Image Analysis, Computer Vision, and Applications, Proc. of the 18th Iberoamerican Congress on Pattern Recognition (CIARP 2013), LNCS, Havana, Cuba, 2013, vol. 8258, pp. 1-8. (314.35 KB)
G. L. Marcialis and Roli, F., Perceptron-based fusion of multiple fingerprint matchers, in First International Workshop on Artificial Neural Networks in Pattern Recognition (ANNPR03), Firenze (Italy), 2003, pp. 92-99.
G. Fumera and Roli, F., Performance Analysis and Comparison of Linear Combiners for Classifier Fusion, in Structural, Syntactic, and Statistical Pattern Recognition, Joint IAPR International Workshops SSPR 2002 and SPR 2002, 2002, vol. 2396, pp. 424-432.
R. Satta and Stirparo, P., Picture-to-Identity linking of social network accounts based on Sensor Pattern Noise, in 5th International Conference on Imaging for Crime Detection and Prevention (ICDP 2013), London, United Kingdom, 2013. (348.28 KB)
B. Biggio, Fumera, G., Roli, F., and Didaci, L., Poisoning adaptive biometric systems, in 9th Int'l Workshop on Statistical Techniques in Pattern Recognition (SPR 2012), 2012, vol. 7626, pp. 417-425. (637.79 KB)
B. Biggio, Nelson, B., and Laskov, P., Poisoning attacks against support vector machines, in 29th Int'l Conf. on Machine Learning (ICML), 2012, pp. 1807–1814. (452.94 KB)
D. Solans, Biggio, B., and Castillo, C., Poisoning Attacks on Algorithmic Fairness, in ECML PKDD, In Press.
B. Biggio, Didaci, L., Fumera, G., and Roli, F., Poisoning attacks to compromise face templates, in 6th IAPR Int'l Conf. on Biometrics (ICB), Madrid, Spain, 2013. (844.61 KB)
B. Biggio, Rieck, K., Ariu, D., Wressnegger, C., Corona, I., Giacinto, G., and Roli, F., Poisoning Behavioral Malware Clustering, in AISec'14: Proceedings of the 2014 ACM Workshop on Artificial Intelligence and Security, co-located with CCS '14, Scottsdale, Arizona, USA, 2014, pp. 27-36. (375.58 KB)
B. Biggio, Rota Bulò, S., Pillai, I., Mura, M., Zemene Mequanint, E., Pelillo, M., and Roli, F., Poisoning complete-linkage hierarchical clustering, in Joint IAPR Int'l Workshop on Structural, Syntactic, and Statistical Pattern Recognition (LNCS), Joensuu, Finland, 2014, vol. 8621, pp. 42-52. (388.31 KB)
R. Labaca-Castro, Biggio, B., and Rodosek, G. Dreo, Poster: Attacking Malware Classifiers by Crafting Gradient-Attacks That Preserve Functionality, in Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications Security, New York, NY, USA, 2019, pp. 2565–2567.
P. Coli, Marcialis, G. L., and Roli, F., Power spectrum-based fingerprint vitality detection, in IEEE Workshop on Automatic Identification Advanced Technologies AutoID 2007, 2007, pp. 169-173.
L. Piras, Tronci, R., Murgia, G., and Giacinto, G., The PRA and AmILAB at ImageCLEF 2012 Photo Flickr Annotation Task, in CLEF (Online Working Notes/Labs/Workshop), Rome, 2012. (540.05 KB)
I. Sanchez, Satta, R., Nai-Fovino, I., Baldini, G., Steri, G., Shaw, D., and Ciardulli, A., Privacy leakages in Smart Home Wireless Technologies, in 2014 IEEE International Carnahan Conference on Security Technology, Rome, Italy, 2014. (329.97 KB)

Pages