Publications

Export 426 results:
A B C D E F G H I J K L M N O P Q R S T U V W X Y Z 
B
G. B. Benciolini, Roli, F., e Wilkinson, G., Proceedings of the workshop "Il Telerilevamento ed i Sistemi Informativi Territoriali nella Gestione delle Risorse Ambientali". Trento, Italy: , 1994.
J. Atli Benediktsson, Kittler, J., e Roli, F., Multiple Classifier Systems, vol 5519. Reykjavik, Iceland: Springer, 2009, pag 540.
B. Biggio, Akhtar, Z., Fumera, G., Marcialis, G. L., e Roli, F., «Robustness of multi-modal biometric verification systems under realistic spoofing attacks», in Int’l Joint Conference on Biometrics (IJCB), Washington DC, USA, 2011. (2.25 MB)
B. Biggio, Didaci, L., Fumera, G., e Roli, F., «Poisoning attacks to compromise face templates», in 6th IAPR Int'l Conf. on Biometrics (ICB), Madrid, Spain, 2013. (844.61 KB)
B. Biggio, Melis, M., Fumera, G., e Roli, F., «Sparse Support Faces», in Int'l Conf. on Biometrics (ICB), 2015, pagg 208-213. (702.84 KB)
B. Biggio, Fumera, G., e Roli, F., «Adversarial Pattern Classification Using Multiple Classifiers and Randomisation», in 12th Joint IAPR International Workshop on Structural and Syntactic Pattern Recognition (SSPR 2008), Orlando, Florida, USA, 2008. (395.38 KB)
B. Biggio, Nelson, B., e Laskov, P., «Support Vector Machines Under Adversarial Label Noise», in Journal of Machine Learning Research - Proc. 3rd Asian Conference on Machine Learning (ACML 2011), Taoyuan, Taiwan, 2011, vol 20, pagg 97-112. (533.74 KB)
B. Biggio, «Machine Learning under Attack: Vulnerability Exploitation and Security Measures (Invited Keynote at IH&MMSec '16)», in 4th ACM Workshop on Information Hiding & Multimedia Security, Vigo, Spain, 2016, pagg 1-2. (138.98 KB)
B. Biggio, Fumera, G., e Roli, F., «Learning Sparse Kernel Machines with Biometric Similarity Functions for Identity Recognition», in IEEE 5th International Conference on Biometrics: Theory, Applications and Systems (BTAS 2012), Washington DC (USA), 2012, pagg 325 -330. (336.11 KB)
B. Biggio, Rieck, K., Ariu, D., Wressnegger, C., Corona, I., Giacinto, G., e Roli, F., «Poisoning Behavioral Malware Clustering», in AISec'14: Proceedings of the 2014 ACM Workshop on Artificial Intelligence and Security, co-located with CCS '14, Scottsdale, Arizona, USA, 2014, pagg 27-36. (375.58 KB)
B. Biggio, Fumera, G., e Roli, F., «Multiple Classifier Systems for Adversarial Classification Tasks», in 8th Int. Workshop on Multiple Classifier Systems (MCS 2009), Reykjavik, Iceland, 2009, vol 5519, pagg 132-141. (459.88 KB)
B. Biggio, Fumera, G., e Roli, F., «Security evaluation of pattern classifiers under attack», IEEE Transactions on Knowledge and Data Engineering, vol 26, n° 4, pagg 984-996, 2014. (1.35 MB)
B. Biggio, Akhtar, Z., Fumera, G., Marcialis, G. L., e Roli, F., «Security evaluation of biometric authentication systems under real spoofing attacks», IET Biometrics, vol 1, n° 1, pagg 11-24, 2012. (3.21 MB)
B. Biggio, Fumera, G., Pillai, I., e Roli, F., «Image Spam Filtering by Content Obscuring Detection», in Fourth Conference on Email and Anti-Spam (CEAS 2007), Microsoft Research Silicon Valley, Mountain View, California, 2007. (486.14 KB)
B. Biggio e Roli, F., «Wild Patterns: Ten Years After the Rise of Adversarial Machine Learning», Pattern Recognition, vol 84, pagg 317-331, 2018. (3.76 MB)
B. Biggio, Fumera, G., e Roli, F., «Multiple Classifier Systems for Robust Classifier Design in Adversarial Environments», Journal of Machine Learning and Cybernetics, vol 1, pagg 27–41, 2010. (844.91 KB)
B. Biggio, Corona, I., Fumera, G., Giacinto, G., e Roli, F., «Bagging classifiers for fighting poisoning attacks in adversarial classification tasks», in Multiple Classifier Systems (MCS 2011), 2011, vol 6713, pagg 350-359. (231.43 KB)
B. Biggio, Pillai, I., Rota Bulò, S., Ariu, D., Pelillo, M., e Roli, F., «Is Data Clustering in Adversarial Settings Secure?», in AISec'13: Proceedings of the 2013 ACM Workshop on Artificial Intelligence and Security, Berlin, 2013, pagg 87-98. (300.52 KB)
B. Biggio, Fumera, G., Pillai, I., e Roli, F., «Image Spam Filtering Using Visual Information», in 14th Int. Conf. on Image Analysis and Processing (ICIAP 2007), Modena, Italy, 2007, pagg 105–110. (173.32 KB)
B. Biggio, Fumera, G., e Roli, F., «Evade Hard Multiple Classifier Systems», in Supervised and Unsupervised Ensemble Methods and Their Applications, vol 245, O. Okun e Valentini, G. Springer Berlin / Heidelberg, 2009, pagg 15-38. (562.89 KB)
B. Biggio, Fumera, G., Pillai, I., e Roli, F., «Improving Image Spam Filtering Using Image Text Features», in Fifth Conference on Email and Anti-Spam (CEAS 2008), Mountain View, CA, USA, 2008. (154.27 KB)
B. Biggio, Fumera, G., e Roli, F., «Multiple Classifier Systems under Attack», in 9th Int. Workshop on Multiple Classifier Systems (MCS 2010), Cairo, Egypt, 2010, vol 5997, pagg 74–83. (231.42 KB)
B. Biggio, Corona, I., Nelson, B., Rubinstein, B. I. P., Maiorca, D., Fumera, G., Giacinto, G., e Roli, F., «Security Evaluation of Support Vector Machines in Adversarial Environments», in Support Vector Machines Applications, Y. Ma e Guo, G. Springer International Publishing, 2014, pagg 105-153. (687.1 KB)
B. Biggio, Fumera, G., Marcialis, G. L., e Roli, F., «Security of pattern recognition systems in adversarial environments». 2012. (235.41 KB)

Pages