Publications

Export 432 results:
A B C D E F G H I J K L M N O P Q R S T U V W X Y Z 
C
I. Corona, Tronci, R., e Giacinto, G., «SuStorID: A Multiple Classifier System for the Protection of Web Services», in International Conference on Pattern Recognition (ICPR 2012), Tsukuba International Congress Center, Tsukuba Science City, JAPAN, 2012, pagg 2375-2378. (286.16 KB)
I. Corona, Giacinto, G., e Roli, F., «Intrusion detection in computer systems as a pattern recognition task in adversarial environment: a critical review», in Workshop on Neural Information Processing Systems (NIPS), Whistler, British Columbia, Canada, 2007.
I. Corona, Giacinto, G., Mazzariello, C., Roli, F., e Sansone, C., «Information fusion for computer security: State of the art and open issues», Information Fusion, vol 10, pagg 274-284, 2009.
I. Corona, Contini, M., Ariu, D., Giacinto, G., Roli, F., Lund, M., e Marinelli, G., «PharmaGuard: Automatic Identification of Illegal Search-Indexed Online Pharmacies», IEEE International Conference on Cybernetics - Special session Cybersecurity (CYBERSEC). IEEE, Gdynia, Poland , pagg 324 - 329, 2015. (1.44 MB) (3.4 MB)
I. Corona, Giacinto, G., e Roli, F., «Intrusion Detection in Computer Systems using Multiple Classifer Systems», in Supervised and Unsupervised Ensemble Methods and Their Applications, O. Okun and G. Valentini., Springer-Verlag, Berlin/Heidelberg, 2008, pagg 91-114.
I. Corona, Giacinto, G., e Roli, F., «Adversarial Attacks against Intrusion Detection Systems: Taxonomy, Solutions and Open Issues», Information Sciences, vol 239, 2013. (1.49 MB)
M. Contini, Corona, I., Mulas, A., Giacinto, G., e Ariu, D., «Pharmaguard WebApp: an application for the detection of illegal online pharmacies», 2nd International Workshop on Knowledge Discovery on the WEB (KDWEB). Cagliari, 2016. (120.57 KB)
P. Coli, Marcialis, G. L., e Roli, F., «Power spectrum-based fingerprint vitality detection», in IEEE Workshop on Automatic Identification Advanced Technologies AutoID 2007, 2007, pagg 169-173.
P. Coli, «Vitality detection in personal authentication systems using fingerprints», Cagliari (Italy), 2008.
P. Coli, Marcialis, G. L., e Roli, F., «Analysis and selection of features for the fingerprint vitality detection», in Joint IAPR Int. Workshop. on Structural and Syntactical Pattern Recognition and Statistical Techniques in Pattern Recognition S+SSPR06, 2006, vol 4109, pagg 907-915.
P. Coli, Marcialis, G. L., e Roli, F., «Fingerprint silicon replicas: static and dynamic features for vitality detection using an optical capture device», International Journal of Image and Graphics, vol 8, pagg 495-512, 2008.
P. Coli, Marcialis, G. L., e Roli, F., «Vitality detection from fingerprint images: a critical survey», in 2nd International Conference on Biometrics ICB 2007, Seoul (South Korea), 2007, vol 4642, pagg 722-731.
M. Mohan Chakka, Anjos, A., Marcel, S., Tronci, R., Muntoni, D., Fadda, G., Pili, M., Sirena, N., Murgia, G., Ristori, M., e Roli, F., «Competition on Counter Measures to 2-D Facial Spoofing Attacks», in International Joint Conference on Biometrics (IJCB 2011), 2011.
A. Carcangiu, Spano, L. Davide, Fumera, G., e Roli, F., «DEICTIC: a Compositional and Declarative Gesture Description based on Hidden Markov Model», International Journal of Human-Computer Studies, vol 122, pag 20, 2019. (1.69 MB)
B
L. Bruzzone, Roli, F., e Serpico, S. B., «An extension of the Jeffreys-Matusita distance to multiclass cases for feature selection», IEEE Transactions on Geoscience and Remote Sensing, vol 33, pagg 1318-1321, 1995.
L. Bruzzone, Conese, C., Maselli, F., e Roli, F., «Multisource classification of complex rural areas by statistical and neural-network approaches», Int. Journal on Photogrammetric Engineering and Remote Sensing (PE&RS), vol 63, pagg 523-533, 1997.
B. Biggio, Fumera, G., e Roli, F., «Learning Sparse Kernel Machines with Biometric Similarity Functions for Identity Recognition», in IEEE 5th International Conference on Biometrics: Theory, Applications and Systems (BTAS 2012), Washington DC (USA), 2012, pagg 325 -330. (336.11 KB)
B. Biggio, Fumera, G., Pillai, I., e Roli, F., «Image Spam Filtering by Content Obscuring Detection», in Fourth Conference on Email and Anti-Spam (CEAS 2007), Microsoft Research Silicon Valley, Mountain View, California, 2007. (486.14 KB)
B. Biggio e Roli, F., «Wild Patterns: Ten Years After the Rise of Adversarial Machine Learning», Pattern Recognition, vol 84, pagg 317-331, 2018. (3.76 MB)
B. Biggio, Fumera, G., e Roli, F., «Security evaluation of pattern classifiers under attack», IEEE Transactions on Knowledge and Data Engineering, vol 26, n° 4, pagg 984-996, 2014. (1.35 MB)
B. Biggio, Akhtar, Z., Fumera, G., Marcialis, G. L., e Roli, F., «Security evaluation of biometric authentication systems under real spoofing attacks», IET Biometrics, vol 1, n° 1, pagg 11-24, 2012. (3.21 MB)
B. Biggio, Pillai, I., Rota Bulò, S., Ariu, D., Pelillo, M., e Roli, F., «Is Data Clustering in Adversarial Settings Secure?», in AISec'13: Proceedings of the 2013 ACM Workshop on Artificial Intelligence and Security, Berlin, 2013, pagg 87-98. (300.52 KB)
B. Biggio, Fumera, G., Pillai, I., e Roli, F., «Image Spam Filtering Using Visual Information», in 14th Int. Conf. on Image Analysis and Processing (ICIAP 2007), Modena, Italy, 2007, pagg 105–110. (173.32 KB)
B. Biggio, Corona, I., Fumera, G., Giacinto, G., e Roli, F., «Bagging classifiers for fighting poisoning attacks in adversarial classification tasks», in Multiple Classifier Systems (MCS 2011), 2011, vol 6713, pagg 350-359. (231.43 KB)
B. Biggio, Fumera, G., e Roli, F., «Multiple Classifier Systems for Robust Classifier Design in Adversarial Environments», Journal of Machine Learning and Cybernetics, vol 1, pagg 27–41, 2010. (844.91 KB)

Pages