Publications

Export 98 results:
Filters: First Letter Of Last Name is S  [Clear All Filters]
A B C D E F G H I J K L M N O P Q R S T U V W X Y Z 
B
B. Biggio, Corona, I., Fumera, G., Giacinto, G., and Roli, F., Bagging classifiers for fighting poisoning attacks in adversarial classification tasks, in Multiple Classifier Systems (MCS 2011), 2011, vol. 6713, pp. 350-359. (231.43 KB)
B. Biggio, Fumera, G., and Roli, F., Bayesian Linear Combination of Neural Networks, in Innovations in Neural Information Paradigms and Applications, vol. 247, M. Bianchini, Maggini, M., Scarselli, F., and Jain, L. C. Springer Berlin / Heidelberg, 2009, pp. 201-230. (435.32 KB)
C
R. Satta, Galbally, J., and Beslay, L., Children Gender Recognition Under Unconstrained Conditions Based on Contextual Information, in 22nd IEEE International Conference on Pattern Recognition, ICPR 2014, Stockholm, Sweden, 2014. (272.46 KB)
S. B. Serpico and Roli, F., Classification of multi-sensor remote- sensing images by structured neural networks, IEEE Transactions on Geoscience and Remote Sensing, vol. 33, pp. 562-578, 1995.
R. Soleymani, Granger, E., and Fumera, G., Classifier Ensembles with Trajectory Under-Sampling for Face Re-Identification, in 5th International Conference on Pattern Recognition Applications and Methods (ICPRAM 2016), Rome, Italy, 2016, vol. 1, pp. 97-108. (556.82 KB)
F. Roli, Giacinto, G., and Serpico, S. B., Classifier Fusion for Multisensor Image Recognition, in Image and Signal Processing for Remote Sensing VI, 2001, Sebastiano B. Serpico., vol. 4170, pp. 103-110.
C. Gurrin, Schoeffmann, K., Joho, H., Leibetseder, A., Zhou, L., Duane, A., Dang-Nguyen, D. - T., Riegler, M., Piras, L., Tran, M. - T., Lokoč, J., and Hürst, W., Comparing Approaches to Interactive Lifelog Search at the Lifelog Search Challenge (LSC2018), ITE Transactions on Media Technology and Applications, vol. 7, pp. 46-59, 2019. (4.7 MB)
M. A. A. Dewan, Granger, E., Sabourin, R., Roli, F., and Marcialis, G. L., A comparison of adaptive appearance methods for tracking faces in video surveillance, in 5th International Conference on Imaging for Crime Detection and Prevention (ICDP-13), 2013.
M. Mohan Chakka, Anjos, A., Marcel, S., Tronci, R., Muntoni, D., Fadda, G., Pili, M., Sirena, N., Murgia, G., Ristori, M., and Roli, F., Competition on Counter Measures to 2-D Facial Spoofing Attacks, in International Joint Conference on Biometrics (IJCB 2011), 2011.
L. Kuncheva, Roli, F., Marcialis, G. L., and Shipp, C., Complexity of Data Subsets Generated by the Random Subspace Method: an Experimental Investigation, in 2nd International Workshop on Multiple Classifier Systems (MCS 2001), 2001, vol. 2096, pp. 349-358.
D
A. Sotgiu, Demontis, A., Melis, M., Biggio, B., Fumera, G., Feng, X., and Roli, F., Deep Neural Rejection against Adversarial Examples, EURASIP Journal on Information Security, vol. 5, 2020.
A. Carcangiu, Spano, L. Davide, Fumera, G., and Roli, F., DEICTIC: a Compositional and Declarative Gesture Description based on Hidden Markov Model, International Journal of Human-Computer Studies, vol. 122, p. 20, 2019. (1.69 MB)
I. Corona, Biggio, B., Contini, M., Piras, L., Corda, R., Mereu, M., Mureddu, G., Ariu, D., and Roli, F., DeltaPhish: Detecting Phishing Webpages in Compromised Websites, 22nd European Symposium on Research in Computer Security (ESORICS), vol. 10492. Springer International Publishing, Norway, September 11-15, 2017, pp. 370–388, 2017. (4.13 MB)
I. Sanchez, Satta, R., Giuliani, R., and Baldini, G., Detection of DECT identity spoofing through Radio Frequency fingerprinting, in 38th International Convention on Information and Communication Technology, Electronics and Microelectronics (MIPRO 2015), Opatija, Croatia, 2015. (778.81 KB)
I. Sanchez, Satta, R., Giuliani, R., and Baldini, G., Detection of DECT identity spoofing through Radio Frequency fingerprinting, in 38th International Convention on Information and Communication Technology, Electronics and Microelectronics (MIPRO 2015), Opatija, Croatia, 2015. (778.81 KB)
I. Corona and Giacinto, G., Detection of server side web attacks, in Workshop on Applications of Pattern Analysis, Cumberland Lodge, London, UK, 2010. (308.33 KB)
R. Satta, Dissimilarity-based people re-identification and search for intelligent video surveillance, University of Cagliari, Cagliari (Italy), 2013. (7.08 MB)
M. Narouei, Ahmadi, M., Giacinto, G., Takabi, H., and Sami, A., DLLMiner: structural mining for malware detection, Security and Communication Networks, 2015. (731.78 KB)
S. Kumar Dash, Suarez-Tangil, G., Khan, S., Tam, K., Ahmadi, M., Kinder, J., and Cavallaro, L., DroidScribe: Classifying Android Malware Based on Runtime Behavior, in Mobile Security Technologies (MoST 2016), 2016. (571.22 KB)

Pages