Publications

Export 427 results:
Conference Paper
G. Giacinto, Roli, F., e Fumera, G., «Unsupervised Learning of Neural Network Ensembles for Image Classification», in IEEE-INNS-ENNS International Joint Conference on Neural Networks (IJCNN 2000), Como, Italy, 2000, vol III, pagg 155-159.
R. Satta e Stirparo, P., «On the usage of Sensor Pattern Noise for Picture-to-Identity linking through social network accounts», in 9th International Conference on Computer Vision Theory and Applications (VISAPP 2014), Lisbon, Portugal, 2014. (340.78 KB)
L. Piras, Furcas, D., e Giacinto, G., «User-driven Nearest-Neighbour Exploration of Image Archives», in 4th International Conference on Pattern Recognition Applications and Methods (ICPRAM), Lisbon, Portugal, 2015, pagg 181 - 189. (376.55 KB)
L. Didaci e Roli, F., «Using Co-training and Self-training in Semi-Supervised Multiple Classifier Systems», in Statistical Techniques in Pattern Recognition, Hong Kong, China, 2006.
G. L. Marcialis, Roli, F., Andronico, P., Multineddu, P., Coli, P., e Delogu, G., «Video Biometric Surveillance and Forensic Image Analysis», in First Workshop on Video Surveillance projects in Italy (VISIT 2008), Modena (Italy), 2008.
M. A. A. Dewan, Granger, E., Sabourin, R., Marcialis, G. L., e Roli, F., «Video Face Recognition From A Single Still Image Using an Adaptive Appearance Model Tracker», in IEEE Symposium Series on Computational Intelligence: IEEE Symposium on Computational Intelligence in Biometrics and Identity Management (CIBIM 2015), 2015, pagg 192-202. (533.82 KB)
P. Coli, Marcialis, G. L., e Roli, F., «Vitality detection from fingerprint images: a critical survey», in 2nd International Conference on Biometrics ICB 2007, Seoul (South Korea), 2007, vol 4642, pagg 722-731.
D. M. Freeman, Jain, S., Duermuth, M., Biggio, B., e Giacinto, G., «Who Are You? A Statistical Approach to Measuring User Authenticity», in Proc. 23rd Annual Network & Distributed System Security Symposium (NDSS), 2016. (764.14 KB)
A. Demontis, Melis, M., Pintor, M., Jagielski, M., Biggio, B., Oprea, A., Nita-Rotaru, C., e Roli, F., «Why Do Adversarial Attacks Transfer? Explaining Transferability of Evasion and Poisoning Attacks», in 28th Usenix Security Symposium, Santa Clara, California, USA, 2019, vol 28th {USENIX} Security Symposium ({USENIX} Security 19), pag 321--338. (1.09 MB)
G. L. Marcialis, Didaci, L., Pisano, A., Granger, E., e Roli, F., «Why template self-update should work in biometric authentication systems?», in Information Science, Signal Processing and their Applications (ISSPA), 2012 11th International Conference on, Montreal, QC, 2012.
D. Ariu, Didaci, L., Fumera, G., Frumento, E., Freschi, F., e Giacinto, G., «Yet Another Cybersecurity Roadmapping Methodology», in First International Workshop on Future Scenarios for Cybercrime and Cyber-terrorism, co-located with the 10th International Conference on Availability, Reliability and Security (ARES), 2015. (1.34 MB)
Conference Proceedings
P. Forner, Karlgren, J., e Womser-Hacker, C., «CLEF 2012 Evaluation Labs and Workshop, Online Working Notes, Rome, Italy, September 17-20, 2012». 2012.
M. Mauri, Mulas, A., e Ariu, D., «The Dark Side of Open Data», 2nd International Workshop on Knowledge Discovery on the WEB (KDWEB). Cagliari, 2016. (124.62 KB) (1.33 MB)
I. Corona, Biggio, B., Contini, M., Piras, L., Corda, R., Mereu, M., Mureddu, G., Ariu, D., e Roli, F., «DeltaPhish: Detecting Phishing Webpages in Compromised Websites», 22nd European Symposium on Research in Computer Security (ESORICS), vol 10492. Springer International Publishing, Norway, September 11-15, 2017, pagg 370–388, 2017. (4.13 MB)
J. Hoffmann, Rytilahti, T., Maiorca, D., Winandy, M., Giacinto, G., e Holz, T., «Evaluating Analysis Tools for Android Apps: Status Quo and Robustness against Obfuscation», Proceedings of the 6th ACM Conference on Data and Application Security and Privacy (CODASPY 2016, 09-11 March, 2016). 2016. (726.65 KB)
A. Demontis, Biggio, B., Fumera, G., Giacinto, G., e Roli, F., «Infinity-norm Support Vector Machines against Adversarial Label Contamination», 1st Italian Conference on CyberSecurity (ITASEC). Venice, Italy , pagg 106-115, 2017.
I. Corona, Contini, M., Ariu, D., Giacinto, G., Roli, F., Lund, M., e Marinelli, G., «PharmaGuard: Automatic Identification of Illegal Search-Indexed Online Pharmacies», IEEE International Conference on Cybernetics - Special session Cybersecurity (CYBERSEC). IEEE, Gdynia, Poland , pagg 324 - 329, 2015. (1.44 MB) (3.4 MB)
M. Contini, Corona, I., Mulas, A., Giacinto, G., e Ariu, D., «Pharmaguard WebApp: an application for the detection of illegal online pharmacies», 2nd International Workshop on Knowledge Discovery on the WEB (KDWEB). Cagliari, 2016. (120.57 KB)
D. Ugarte, Maiorca, D., Cara, F., e Giacinto, G., «PowerDrive: Accurate De-Obfuscation and Analysis of PowerShell Malware», 16th Conference on Detection of Intrusions and Malware & Vulnerability Assessment (DIMVA). Springer, Gothenburg, Sweden, pagg 240-259, 2019. (352.39 KB)
C. Gurrin, Schoeffmann, K., Joho, H., Dang-Nguyen, D. - T., Riegler, M., e Piras, L., «Proceedings of the 2018 {ACM} Workshop on The Lifelog Search Challenge, LSC@ICMR 2018, Yokohama, Japan, June 11, 2018». {ACM}, 2018.
C. Gurrin, Schöffmann, K., Joho, H., Dang-Nguyen, D. - T., Riegler, M., e Piras, L., «Proceedings of the {ACM} Workshop on Lifelog Search Challenge, LSC@ICMR 2019, Ottawa, ON, Canada, 10 June 2019». ACM, 2019.
D. Maiorca, Ariu, D., Corona, I., e Giacinto, G., «A Structural and Content-Based Approach for a Precise and Robust Detection of Malicious PDF Files», Proceedings of the 1st International Conference on Information Systems Security and Privacy (ICISSP 2015, 9-11th February 2015, Angers, France). pagg 27-36, 2015. (267.78 KB)

Pages