Publications

Export 98 results:
Filters: First Letter Of Last Name is S  [Clear All Filters]
In Press
G. Suarez-Tangil, Dash, S. Kumar, Ahmadi, M., Kinder, J., Giacinto, G., and Cavallaro, L., DroidSieve: Fast and Accurate Classification of Obfuscated Android Malware, in Proceedings of the Seventh {ACM} Conference on Data and Application Security and Privacy, {CODASPY} 2017, In Press. (478.59 KB)
R. Soleymani, Granger, E., and Fumera, G., F-Measure Curves: A Tool to Visualize Classifier Performance Under Imbalance, Pattern Recognition, In Press.
2017
I. Corona, Biggio, B., Contini, M., Piras, L., Corda, R., Mereu, M., Mureddu, G., Ariu, D., and Roli, F., DeltaPhish: Detecting Phishing Webpages in Compromised Websites, 22nd European Symposium on Research in Computer Security (ESORICS), vol. 10492. Springer International Publishing, Norway, September 11-15, 2017, pp. 370–388, 2017. (4.13 MB)
B. Ionescu, Müller, H., Villegas, M., Arenas, H., Boato, G., Dang-Nguyen, D. - T., Cid, Y. Dicente, Eickhoff, C., de Herrera, A. García Se, Gurrin, C., Islam, B., Kovalev, V., Liauchuk, V., Mothe, J., Piras, L., Riegler, M., and Schwall, I., Overview of ImageCLEF 2017: Information extraction from images, in CLEF 2017 Proceedings, Dublin, Ireland, 2017, pp. 315-337.
E. Santucci, Didaci, L., Fumera, G., and Roli, F., A Parameter Randomization Approach for Constructing Classifier Ensembles, Pattern Recognition, vol. 69, pp. 1-13, 2017. (448.73 KB)
2016
M. A. A. Dewan, Granger, E., Marcialis, G. L., Sabourin, R., and Roli, F., Adaptive Appearance Model Tracking for Still-to-Video Face Recognition, Pattern Recognition, vol. 49, no. 1, 2016. (6.51 MB)
R. Soleymani, Granger, E., and Fumera, G., Classifier Ensembles with Trajectory Under-Sampling for Face Re-Identification, in 5th International Conference on Pattern Recognition Applications and Methods (ICPRAM 2016), Rome, Italy, 2016, vol. 1, pp. 97-108. (556.82 KB)
S. Kumar Dash, Suarez-Tangil, G., Khan, S., Tam, K., Ahmadi, M., Kinder, J., and Cavallaro, L., DroidScribe: Classifying Android Malware Based on Runtime Behavior, in Mobile Security Technologies (MoST 2016), 2016. (571.22 KB)
M. Villegas, Müller, H., de Herrera, A. García Se, Schaer, R., Bromuri, S., Gilbert, A., Piras, L., Wang, J., Yan, F., Ramisa, A., Dellandrea, E., Gaizauskas, R., Puigcerver, K. Mikolajczy, Toselli, A. H., Sánchez, J. - A., and Vidal, E., General Overview of ImageCLEF at the CLEF 2016 Labs, in Lecture Notes in Computer Science, Springer International Publishing, 2016. (1.07 MB)
M. Villegas, Müller, H., de Herrera, A. García Se, Schaer, R., Bromuri, S., Gilbert, A., Piras, L., Wang, J., Yan, F., Ramisa, A., Dellandrea, E., Gaizauskas, R., Puigcerver, K. Mikolajczy, Toselli, A. H., Sánchez, J. - A., and Vidal, E., General Overview of ImageCLEF at the CLEF 2016 Labs, in Lecture Notes in Computer Science, Springer International Publishing, 2016. (1.07 MB)
R. Soleymani, Granger, E., and Fumera, G., Loss Factors for Learning Boosting Ensembles from Imbalanced Data, in 23rd International Conference on Pattern Recognition (ICPR 2016), Cancún, Mexico, 2016. (435.44 KB)
M. Ahmadi, Ulyanov, D., Semenov, S., Trofimov, M., and Giacinto, G., Novel Feature Extraction, Selection and Fusion for Effective Malware Family Classification, in Proceedings of the Sixth ACM on Conference on Data and Application Security and Privacy, 2016, pp. 183–194. (6.49 MB)
L. Ghiani, Yambay, D. A., Mura, V., Marcialis, G. L., Roli, F., and Schuckers, S. A., Review of the Fingerprint Liveness Detection (LivDet) competition series: 2009 to 2015, Image and Vision Computing, p. -, 2016.
J. Galbally and Satta, R., Three-dimensional and two-and-a-half- dimensional face recognition spoofing using three-dimensional printed models, IET Biometrics, vol. 5, no. 2, 2016. (1.33 MB)
2015
I. Sanchez, Satta, R., Giuliani, R., and Baldini, G., Detection of DECT identity spoofing through Radio Frequency fingerprinting, in 38th International Convention on Information and Communication Technology, Electronics and Microelectronics (MIPRO 2015), Opatija, Croatia, 2015. (778.81 KB)
I. Sanchez, Satta, R., Giuliani, R., and Baldini, G., Detection of DECT identity spoofing through Radio Frequency fingerprinting, in 38th International Convention on Information and Communication Technology, Electronics and Microelectronics (MIPRO 2015), Opatija, Croatia, 2015. (778.81 KB)

Pages