Publications

Export 434 results:
Journal Article
A. Fanni, Giacinto, G., Marchesi, M., e Serri, A., «Tabu search coupled with deterministic strategies for the optimal design of MRI devices», Int. J. of Applied Electromagnetics and Mechanics, vol 10, pagg 21-31, 1999.
G. Fumera, Roli, F., e Serrau, A., «A Theoretical Analysis of Bagging as a Linear Combination of Classifiers», IEEE Transactions on Pattern Analysis and Machine Intelligence, vol 30, pagg 1293-1299, 2008. (895.49 KB)
G. Fumera e Roli, F., «A Theoretical and Experimental Analysis of Linear Combiners for Multiple Classifier Systems», IEEE Transactions on Pattern Analysis and Machine Intelligence, vol 27, pagg 942-956, 2005. (887.92 KB)
J. Galbally e Satta, R., «Three-dimensional and two-and-a-half- dimensional face recognition spoofing using three-dimensional printed models», IET Biometrics, vol 5, n° 2, 2016. (1.33 MB)
I. Pillai, Fumera, G., e Roli, F., «Threshold optimisation for multi-label classifiers», Pattern Recognition, vol 46, n° 7, 2013. (445.97 KB)
D. Maiorca, Biggio, B., e Giacinto, G., «Towards Adversarial Malware Detection: Lessons Learned from PDF-based Attacks», ACM Computing Surveys, vol 52, n° 4, 2019. (1.21 MB)
M. Ahmed, Didaci, L., Fumera, G., Roli, F., e Lavi, B., «Using Diversity for Classifier Ensemble Pruning: An Empirical Investigation», Theoretical and Applied Informatics, In Press.
B. Biggio e Roli, F., «Wild Patterns: Ten Years After the Rise of Adversarial Machine Learning», Pattern Recognition, vol 84, pagg 317-331, 2018. (3.76 MB)
A. Demontis, Melis, M., Biggio, B., Maiorca, D., Arp, D., Rieck, K., Corona, I., Giacinto, G., e Roli, F., «Yes, Machine Learning Can Be More Secure! A Case Study on Android Malware Detection», IEEE Trans. Dependable and Secure Computing, vol 16, n° 4, pagg 711-724, 2019. (3.61 MB)
Magazine Article
B. Biggio, Fumera, G., Pillai, I., Roli, F., e Satta, R., «Evading SpamAssassin with obfuscated text images», Virus Bulletin, n° 11-2007, 2007. (689 KB)
Report
J. Hoffmann, Rytilahti, T., Maiorca, D., Winandy, M., Giacinto, G., e Holz, T., «Evaluating Analysis Tools for Android Apps: Status Quo and Robustness Against Obfuscation», Horst Görtz Institut for IT Security (Ruhr-University Bochum), Technical Report TR-HGI-2016-003, 2016. (519.16 KB)
Thesis
A. Rattani, «Adaptive Biometric System based on Template Update Procedures», University of Cagliari, Cagliari (Italy), 2010.
G. Fumera, «Advanced Methods for Pattern Recognition with the Reject Option», Cagliari (Italy), 2002.
B. Biggio, «Adversarial Pattern Classification», University of Cagliari, Cagliari (Italy), 2010. (2.65 MB)
D. Maiorca, «Design and Implementation of Robust Systems for Secure Malware Detection (Ph.D. Thesis)», University of Cagliari, Italy, Cagliari, 2016. (5.34 MB)
I. Corona, «Detection of Web-based attacks», University of Cagliari, Cagliari (Italy), 2010.
R. Satta, «Dissimilarity-based people re-identification and search for intelligent video surveillance», University of Cagliari, Cagliari (Italy), 2013. (7.08 MB)
L. Didaci, «Dynamic Classifier Selection», Cagliari (Italy), 2005.

Pages