Publications

Export 439 results:
A B C D E F G H I J K L M N O P Q R S T U V W X Y Z 
P
R. Satta e Stirparo, P., «Picture-to-Identity linking of social network accounts based on Sensor Pattern Noise», in 5th International Conference on Imaging for Crime Detection and Prevention (ICDP 2013), London, United Kingdom, 2013. (348.28 KB)
B. Biggio, Fumera, G., Roli, F., e Didaci, L., «Poisoning adaptive biometric systems», in 9th Int'l Workshop on Statistical Techniques in Pattern Recognition (SPR 2012), 2012, vol 7626, pagg 417-425. (637.79 KB)
B. Biggio, Nelson, B., e Laskov, P., «Poisoning attacks against support vector machines», in 29th Int'l Conf. on Machine Learning (ICML), 2012, pagg 1807–1814. (452.94 KB)
D. Solans, Biggio, B., e Castillo, C., «Poisoning Attacks on Algorithmic Fairness», in Machine Learning and Knowledge Discovery in Databases (ECML PKDD 2020), 2021, pag 162--177. (1.05 MB)
B. Biggio, Didaci, L., Fumera, G., e Roli, F., «Poisoning attacks to compromise face templates», in 6th IAPR Int'l Conf. on Biometrics (ICB), Madrid, Spain, 2013. (844.61 KB)
B. Biggio, Rieck, K., Ariu, D., Wressnegger, C., Corona, I., Giacinto, G., e Roli, F., «Poisoning Behavioral Malware Clustering», in AISec'14: Proceedings of the 2014 ACM Workshop on Artificial Intelligence and Security, co-located with CCS '14, Scottsdale, Arizona, USA, 2014, pagg 27-36. (375.58 KB)
B. Biggio, Rota Bulò, S., Pillai, I., Mura, M., Zemene Mequanint, E., Pelillo, M., e Roli, F., «Poisoning complete-linkage hierarchical clustering», in Joint IAPR Int'l Workshop on Structural, Syntactic, and Statistical Pattern Recognition (LNCS), Joensuu, Finland, 2014, vol 8621, pagg 42-52. (388.31 KB)
R. Labaca-Castro, Biggio, B., e Rodosek, G. Dreo, «Poster: Attacking Malware Classifiers by Crafting Gradient-Attacks That Preserve Functionality», in Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications Security, New York, NY, USA, 2019, pagg 2565–2567.
P. Coli, Marcialis, G. L., e Roli, F., «Power spectrum-based fingerprint vitality detection», in IEEE Workshop on Automatic Identification Advanced Technologies AutoID 2007, 2007, pagg 169-173.
D. Ugarte, Maiorca, D., Cara, F., e Giacinto, G., «PowerDrive: Accurate De-Obfuscation and Analysis of PowerShell Malware», 16th Conference on Detection of Intrusions and Malware & Vulnerability Assessment (DIMVA). Springer, Gothenburg, Sweden, pagg 240-259, 2019. (352.39 KB)
L. Piras, Tronci, R., Murgia, G., e Giacinto, G., «The PRA and AmILAB at ImageCLEF 2012 Photo Flickr Annotation Task», in CLEF (Online Working Notes/Labs/Workshop), Rome, 2012. (540.05 KB)
I. Sanchez, Satta, R., Nai-Fovino, I., Baldini, G., Steri, G., Shaw, D., e Ciardulli, A., «Privacy leakages in Smart Home Wireless Technologies», in 2014 IEEE International Carnahan Conference on Security Technology, Rome, Italy, 2014. (329.97 KB)
C. Gurrin, Schoeffmann, K., Joho, H., Dang-Nguyen, D. - T., Riegler, M., e Piras, L., «Proceedings of the 2018 {ACM} Workshop on The Lifelog Search Challenge, LSC@ICMR 2018, Yokohama, Japan, June 11, 2018». {ACM}, 2018.
C. Gurrin, Schöffmann, K., Joho, H., Dang-Nguyen, D. - T., Riegler, M., e Piras, L., «Proceedings of the {ACM} Workshop on Lifelog Search Challenge, LSC@ICMR 2019, Ottawa, ON, Canada, 10 June 2019». ACM, 2019.
G. B. Benciolini, Roli, F., e Wilkinson, G., Proceedings of the workshop "Il Telerilevamento ed i Sistemi Informativi Territoriali nella Gestione delle Risorse Ambientali". Trento, Italy: , 1994.
R. Soleymani, Granger, E., e Fumera, G., «Progressive Boosting for Class Imbalance and Its Application to Face Re-Identification», Expert Systems With Applications, vol 101, pag 21, 2018. (1.11 MB)
Q
G. Giacinto e Roli, F., «Query Shifting Based on Bayesian Decision Theory for Content-Based Image Retrieval», in oint IAPR Int. Workshops on Syntactical and Structural Pattern Recognition and Statistical Pattern Recognition (S+SSPR 2002), 2002, vol 2396, pagg 607-616.
R
S. Rota Bulò, Biggio, B., Pillai, I., Pelillo, M., e Roli, F., «Randomized Prediction Games for Adversarial Machine Learning», IEEE Transactions on Neural Networks and Learning Systems, vol 28, n° 11, pagg 2466-2478, 2017. (1.52 MB) (256.21 KB)
R. Satta, Pala, F., Fumera, G., e Roli, F., «Real-time Appearance-based Person Re-identification over Multiple KinectTM Cameras», in 8th International Conference on Computer Vision Theory and Applications (VISAPP 2013), Barcelona, Spain, 2013. (974.71 KB)
Y. Guan, Li, C. - T., e Roli, F., «On Reducing the Effect of Covariate Factors in Gait Recognition: a Classifier Ensemble Method», IEEE Transactions on Pattern Analysis and Machine Intelligence, In Press. (311.43 KB) (151.4 KB)
G. Fumera, Roli, F., e Giacinto, G., «Reject Option with Multiple Thresholds», Pattern Recognition, vol 33, pagg 2099-2101, 2000.
B. Freni, Marcialis, G. L., e Roli, F., «Replacement algorithms for fingerprint template update», in 5th International Conference on Image Analysis and Recognition (ICIAR 2008), 2008, vol 5112, pagg 884-893.
D. - T. Dang-Nguyen, Piras, L., Giacinto, G., Boato, G., e De Natale, F. G. B., «Retrieval of Diverse Images by Pre-filtering and Hierarchical Clustering», in MediaEval (Online Working Notes), Barcelona; Spain, 2014, vol 1263. (221.52 KB)
L. Ghiani, Yambay, D. A., Mura, V., Marcialis, G. L., Roli, F., e Schuckers, S. A., «Review of the Fingerprint Liveness Detection (LivDet) competition series: 2009 to 2015», Image and Vision Computing, pag -, 2016.
Z. Akhtar, Fumera, G., Marcialis, G. L., e Roli, F., «Robustness analysis of likelihood ratio score fusion rule for multi-modal biometric systems under spoof attacks», in 45th IEEE Int’l Carnahan Conference on Security Technology (ICCST) , Barcelona, Spain, 2011, pagg 237-244. (812.36 KB)

Pages