L. Piras, Giacinto, G., and Paredes, R.,
“Passive-Aggressive Online Learning for Relevance Feedback in Content Based Image Retrieval”, in
2nd International Conference on Pattern Recognition Applications and Methods (ICPRAM), Barcelona, Spain, 2013.
(138.32 KB) D. Maiorca, Giacinto, G., and Corona, I.,
“A Pattern Recognition System for Malicious PDF Files Detection”, in
MLDM - International Conference on Machine Learning and Data Mining, Berlin, 2012, vol. 7376, pp. 510-524.
(1.74 MB) F. Roli, Biggio, B., and Fumera, G.,
“Pattern Recognition Systems Under Attack”, in
Progress in Pattern Recognition, Image Analysis, Computer Vision, and Applications, Proc. of the 18th Iberoamerican Congress on Pattern Recognition (CIARP 2013), LNCS, Havana, Cuba, 2013, vol. 8258, pp. 1-8.
(314.35 KB) G. L. Marcialis and Roli, F.,
“Perceptron-based fusion of multiple fingerprint matchers”, in
First International Workshop on Artificial Neural Networks in Pattern Recognition (ANNPR03), Firenze (Italy), 2003, pp. 92-99.
G. Fumera and Roli, F.,
“Performance Analysis and Comparison of Linear Combiners for Classifier Fusion”, in
Structural, Syntactic, and Statistical Pattern Recognition, Joint IAPR International Workshops SSPR 2002 and SPR 2002, 2002, vol. 2396, pp. 424-432.
R. Satta and Stirparo, P.,
“Picture-to-Identity linking of social network accounts based on Sensor Pattern Noise”, in
5th International Conference on Imaging for Crime Detection and Prevention (ICDP 2013), London, United Kingdom, 2013.
(348.28 KB) B. Biggio, Fumera, G., Roli, F., and Didaci, L.,
“Poisoning adaptive biometric systems”, in
9th Int'l Workshop on Statistical Techniques in Pattern Recognition (SPR 2012), 2012, vol. 7626, pp. 417-425.
(637.79 KB) B. Biggio, Rieck, K., Ariu, D., Wressnegger, C., Corona, I., Giacinto, G., and Roli, F.,
“Poisoning Behavioral Malware Clustering”, in
AISec'14: Proceedings of the 2014 ACM Workshop on Artificial Intelligence and Security, co-located with CCS '14, Scottsdale, Arizona, USA, 2014, pp. 27-36.
(375.58 KB) B. Biggio, Rota Bulò, S., Pillai, I., Mura, M., Zemene Mequanint, E., Pelillo, M., and Roli, F.,
“Poisoning complete-linkage hierarchical clustering”, in
Joint IAPR Int'l Workshop on Structural, Syntactic, and Statistical Pattern Recognition (LNCS), Joensuu, Finland, 2014, vol. 8621, pp. 42-52.
(388.31 KB) R. Labaca-Castro, Biggio, B., and Rodosek, G. Dreo,
“Poster: Attacking Malware Classifiers by Crafting Gradient-Attacks That Preserve Functionality”, in
Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications Security, New York, NY, USA, 2019, pp. 2565–2567.