Publications

Export 420 results:
A B C D E F G H I J K L M N O P Q R S T U V W X Y Z 
Y
D. Ariu, Didaci, L., Fumera, G., Frumento, E., Freschi, F., e Giacinto, G., «Yet Another Cybersecurity Roadmapping Methodology», in First International Workshop on Future Scenarios for Cybercrime and Cyber-terrorism, co-located with the 10th International Conference on Availability, Reliability and Security (ARES), 2015. (1.34 MB)
A. Demontis, Melis, M., Biggio, B., Maiorca, D., Arp, D., Rieck, K., Corona, I., Giacinto, G., e Roli, F., «Yes, Machine Learning Can Be More Secure! A Case Study on Android Malware Detection», IEEE Trans. Dependable and Secure Computing, vol 16, n° 4, pagg 711-724, 2019. (3.61 MB)
W
B. Biggio e Roli, F., «Wild Patterns: Ten Years After the Rise of Adversarial Machine Learning», Pattern Recognition, vol 84, pagg 317-331, 2018. (3.76 MB)
G. L. Marcialis, Didaci, L., Pisano, A., Granger, E., e Roli, F., «Why template self-update should work in biometric authentication systems?», in Information Science, Signal Processing and their Applications (ISSPA), 2012 11th International Conference on, Montreal, QC, 2012.
A. Demontis, Melis, M., Pintor, M., Jagielski, M., Biggio, B., Oprea, A., Nita-Rotaru, C., e Roli, F., «Why Do Adversarial Attacks Transfer? Explaining Transferability of Evasion and Poisoning Attacks», in 28th Usenix Security Symposium, Santa Clara, California, USA, 2019, vol 28th {USENIX} Security Symposium ({USENIX} Security 19), pag 321--338. (1.09 MB)
D. M. Freeman, Jain, S., Duermuth, M., Biggio, B., e Giacinto, G., «Who Are You? A Statistical Approach to Measuring User Authenticity», in Proc. 23rd Annual Network & Distributed System Security Symposium (NDSS), 2016. (764.14 KB)
V
P. Coli, «Vitality detection in personal authentication systems using fingerprints», Cagliari (Italy), 2008.
P. Coli, Marcialis, G. L., e Roli, F., «Vitality detection from fingerprint images: a critical survey», in 2nd International Conference on Biometrics ICB 2007, Seoul (South Korea), 2007, vol 4642, pagg 722-731.
M. A. A. Dewan, Granger, E., Sabourin, R., Marcialis, G. L., e Roli, F., «Video Face Recognition From A Single Still Image Using an Adaptive Appearance Model Tracker», in IEEE Symposium Series on Computational Intelligence: IEEE Symposium on Computational Intelligence in Biometrics and Identity Management (CIBIM 2015), 2015, pagg 192-202. (533.82 KB)
G. L. Marcialis, Roli, F., Andronico, P., Multineddu, P., Coli, P., e Delogu, G., «Video Biometric Surveillance and Forensic Image Analysis», in First Workshop on Video Surveillance projects in Italy (VISIT 2008), Modena (Italy), 2008.
U
M. Ahmed, Didaci, L., Fumera, G., Roli, F., e Lavi, B., «Using Diversity for Classifier Ensemble Pruning: An Empirical Investigation», Theoretical and Applied Informatics, In Press.
L. Didaci e Roli, F., «Using Co-training and Self-training in Semi-Supervised Multiple Classifier Systems», in Statistical Techniques in Pattern Recognition, Hong Kong, China, 2006.
L. Piras, Furcas, D., e Giacinto, G., «User-driven Nearest-Neighbour Exploration of Image Archives», in 4th International Conference on Pattern Recognition Applications and Methods (ICPRAM), Lisbon, Portugal, 2015, pagg 181 - 189. (376.55 KB)
R. Satta e Stirparo, P., «On the usage of Sensor Pattern Noise for Picture-to-Identity linking through social network accounts», in 9th International Conference on Computer Vision Theory and Applications (VISAPP 2014), Lisbon, Portugal, 2014. (340.78 KB)
G. Giacinto, Roli, F., e Fumera, G., «Unsupervised Learning of Neural Network Ensembles for Image Classification», in IEEE-INNS-ENNS International Joint Conference on Neural Networks (IJCNN 2000), Como, Italy, 2000, vol III, pagg 155-159.
C. Cusano, Satta, R., e Santini, S., «Unsupervised Classemes», in 2012 ECCV Workshop on Information Fusion in Computer Vision for Concept Recognition (IFCVCR 2012), Firenze (Italy), 2012. (259.36 KB)
B. Nelson, Biggio, B., e Laskov, P., «Understanding the Risk Factors of Learning in Adversarial Environments», in 4th ACM Workshop on Artificial Intelligence and Security (AISec 2011), Chicago, IL, USA, 2011, pagg 87–92. (132.42 KB)
L. Piras e Giacinto, G., «Unbalanced learning in Content-Based Image Classification and Retrieval», in IEEE International Conference on Multimedia & Expo (ICME), Singapore, 2010. (177.33 KB)
T
G. Fumera, Pillai, I., e Roli, F., «A Two-Stage Classifier with Reject Option for Text Categorisation», in 5th Int. Workshop on Statistical Techniques in Pattern Recognition (SPR 2004), Lisbon, Portugal, 2004, vol 3138, pagg 771-779. (151.61 KB)
J. - M. Xu, Fumera, G., Roli, F., e Zhou, Z. - H., «Training SpamAssassin with Active Semi-supervised Learning», in 6th Conference on Email and Anti-Spam (CEAS 2009), Mountain View, CA, USA, 2009.
L. Muñoz-González, Biggio, B., Demontis, A., Paudice, A., Wongrassamee, V., Lupu, E. C., e Roli, F., «Towards Poisoning of Deep Learning Algorithms with Back-gradient Optimization», in 10th ACM Workshop on Artificial Intelligence and Security, 2017, pagg 27-38.
D. Maiorca, Biggio, B., e Giacinto, G., «Towards Adversarial Malware Detection: Lessons Learned from PDF-based Attacks», ACM Computing Surveys, In Press. (1.21 MB)
R. Wong, Poh, N., e Marcialis, G. L., «Toward an attack-sensitive tamper-resistant biometric recognition with a symmetric matcher: A fingerprint case study», in IEEE Symposium on Computational Intelligence in Biometrics and Identity Management (CIBIM), Dec., 9-11, 2014, Orlando (Florida), 2014, pagg 175-180. (1.32 MB)
I. Pillai, Fumera, G., e Roli, F., «Threshold optimisation for multi-label classifiers», Pattern Recognition, vol 46, n° 7, 2013. (445.97 KB)
J. Galbally e Satta, R., «Three-dimensional and two-and-a-half- dimensional face recognition spoofing using three-dimensional printed models», IET Biometrics, vol 5, n° 2, 2016. (1.33 MB)

Pages