Export 434 results:
A. Demontis, Melis, M., Biggio, B., Fumera, G., e Roli, F., «Super-sparse Learning in Similarity Spaces», IEEE Computational Intelligence Magazine, vol 11, n° 4, pagg 36-45, 2016. (555.22 KB)
J. Galbally e Satta, R., «Three-dimensional and two-and-a-half- dimensional face recognition spoofing using three-dimensional printed models», IET Biometrics, vol 5, n° 2, 2016. (1.33 MB)
D. M. Freeman, Jain, S., Duermuth, M., Biggio, B., e Giacinto, G., «Who Are You? A Statistical Approach to Measuring User Authenticity», in Proc. 23rd Annual Network & Distributed System Security Symposium (NDSS), 2016. (764.14 KB)
M. Melis, Demontis, A., Biggio, B., Brown, G., Fumera, G., e Roli, F., «Is Deep Learning Safe for Robot Vision? Adversarial Examples against the iCub Humanoid», in ICCV 2017 Workshop on Vision in Practice on Autonomous Robots (ViPAR), Venice, Italy, 2017, vol 2017 IEEE International Conference on Computer Vision Workshops (ICCVW), pagg 751-759. (3.16 MB)
P. Piredda, Ariu, D., Biggio, B., Corona, I., Piras, L., Giacinto, G., e Roli, F., «Deepsquatting: Learning-based Typosquatting Detection at Deeper Domain Levels», in 16th International Conference of the Italian Association for Artificial Intelligence (AI*IA 2017), 2017, vol 10640 of LNCS, pagg 347-358. (1.21 MB)
I. Corona, Biggio, B., Contini, M., Piras, L., Corda, R., Mereu, M., Mureddu, G., Ariu, D., e Roli, F., «DeltaPhish: Detecting Phishing Webpages in Compromised Websites», 22nd European Symposium on Research in Computer Security (ESORICS), vol 10492. Springer International Publishing, Norway, September 11-15, 2017, pagg 370–388, 2017. (4.13 MB)
I. Pillai, Fumera, G., e Roli, F., «Designing multi-label classifiers that maximize F measures: state of the art», Pattern Recognition, vol 61, 2017. (452.28 KB)
D. Maiorca, Russu, P., Corona, I., Biggio, B., e Giacinto, G., «Detection of Malicious Scripting Code through Discriminant and Adversary-Aware API Analysis», in 1st Italian Conference on CyberSecurity (ITASEC), 2017, vol 1816, pagg 96-105. (371.53 KB)
A. Demontis, Biggio, B., Fumera, G., Giacinto, G., e Roli, F., «Infinity-norm Support Vector Machines against Adversarial Label Contamination», 1st Italian Conference on CyberSecurity (ITASEC). Venice, Italy , pagg 106-115, 2017. (504.93 KB)
L. Piras e Giacinto, G., «Information Fusion in Content Based Image Retrieval: A Comprehensive Overview», Information Fusion, vol 37, pagg 50-60, 2017. (734.6 KB)
D. - T. Dang-Nguyen, Piras, L., Giacinto, G., Boato, G., e De Natale, F. G. B., «Multimodal Retrieval with Diversification and Relevance Feedback for Tourist Attraction Images», ACM Transactions on Multimedia Computing, Communications, and Applications, vol 13, n° 4, 2017. (5.94 MB)
L. Zhou, Piras, L., Rieger, M., Boato, G., Dang-Nguyen, D. - T., e Gurrin, C., «Organizer Team at ImageCLEFlifelog 2017: Baseline Approaches for Lifelog Retrieval and Summarization», in CLEF working notes, CEUR, Dublin, 2017, vol 1866. (220.99 KB)
B. Ionescu, Müller, H., Villegas, M., Arenas, H., Boato, G., Dang-Nguyen, D. - T., Cid, Y. Dicente, Eickhoff, C., de Herrera, A. García Se, Gurrin, C., Islam, B., Kovalev, V., Liauchuk, V., Mothe, J., Piras, L., Riegler, M., e Schwall, I., «Overview of ImageCLEF 2017: Information extraction from images», in CLEF 2017 Proceedings, Dublin, Ireland, 2017, pagg 315-337.
D. - T. Dang-Nguyen, Piras, L., Riegler, M., Boato, G., Zhou, L., e Gurrin, C., «Overview of ImageCLEFlifelog 2017: Lifelog Retrieval and Summarization», in CLEF2017 Working Notes, Dublin, Ireland, 2017, vol 1866. (1.7 MB)
E. Santucci, Didaci, L., Fumera, G., e Roli, F., «A Parameter Randomization Approach for Constructing Classifier Ensembles», Pattern Recognition, vol 69, pagg 1-13, 2017. (448.73 KB)
S. Rota Bulò, Biggio, B., Pillai, I., Pelillo, M., e Roli, F., «Randomized Prediction Games for Adversarial Machine Learning», IEEE Transactions on Neural Networks and Learning Systems, vol 28, n° 11, pagg 2466-2478, 2017. (1.52 MB) (256.21 KB)
D. Maiorca, Mercaldo, F., Giacinto, G., Visaggio, A., e Martinelli, F., «R-PackDroid: API Package-Based Characterization and Detection of Mobile Ransomware», in ACM Symposium on Applied Computing (SAC 2017 - Acceptance Rate 15.7%), 2017, pagg 1718-1723. (272.44 KB)
B. Biggio, Fumera, G., Marcialis, G. L., e Roli, F., «Statistical Meta-Analysis of Presentation Attacks for Secure Multibiometric Systems», IEEE Transactions on Pattern Analysis and Machine Intelligence, vol 39, n° 3, pagg 561-575, 2017. (5.7 MB)
L. Muñoz-González, Biggio, B., Demontis, A., Paudice, A., Wongrassamee, V., Lupu, E. C., e Roli, F., «Towards Poisoning of Deep Learning Algorithms with Back-gradient Optimization», in 10th ACM Workshop on Artificial Intelligence and Security, 2017, pagg 27-38. (4.08 MB)
M. Ahmed, Didaci, L., Fumera, G., Roli, F., e Lavi, B., «Using Diversity for Classifier Ensemble Pruning: An Empirical Investigation», Theoretical and Applied Informatics, vol 29, n° 1&2, pagg 25-39, 2017.
B. Kolosnjaji, Demontis, A., Biggio, B., Maiorca, D., Giacinto, G., Eckert, C., e Roli, F., «Adversarial Malware Binaries: Evading Deep Learning for Malware Detection in Executables», in 2018 26th European Signal Processing Conference (EUSIPCO), Rome, 2018, pagg 533-537. (674.62 KB)
M. Melis, Maiorca, D., Biggio, B., Giacinto, G., e Roli, F., «Explaining Black-box Android Malware Detection», in 26th European Signal Processing Conference (EUSIPCO '18), Rome, Italy, 2018, pagg 524-528. (431.78 KB)
R. Soleymani, Granger, E., e Fumera, G., «F-Measure Curves for Visualizing Classifier Performance with Imbalanced Data», in 8th IAPR TC3 Workshop on Artificial Neural Networks in Pattern Recognition (ANNPR 2018), Siena, 2018. (413.21 KB)
L. Zhou, Piras, L., Riegler, M., Lux, M., Dang-Nguyen, D. - T., e Gurrin, C., «An Interactive Lifelog Retrieval System for Activities of Daily Living Understanding», in Working Notes of {CLEF} 2018 - Conference and Labs of the Evaluation Forum, Avignon, France, September 10-14, 2018., 2018.
M. Jagielski, Oprea, A., Biggio, B., Liu, C., Nita-Rotaru, C., e Li, B., «Manipulating Machine Learning: Poisoning Attacks and Countermeasures for Regression Learning», in 39th IEEE Symposium on Security and Privacy, 2018. (1.02 MB)