Publications

Export 434 results:
A B C D E F G H I J K L M N O P Q R S T U V W X Y Z 
A
Z. Akhtar, «Security of Multimodal Biometric Systems against Spoof Attacks», University of Cagliari, Cagliari (Italy), 2012. (6.38 MB)
Z. Akhtar, Fumera, G., Marcialis, G. L., e Roli, F., «Robustness analysis of likelihood ratio score fusion rule for multi-modal biometric systems under spoof attacks», in 45th IEEE Int’l Carnahan Conference on Security Technology (ICCST) , Barcelona, Spain, 2011, pagg 237-244. (812.36 KB)
Z. Akhtar, Fumera, G., Marcialis, G. L., e Roli, F., «Robustness Evaluation of Biometric Systems under Spoof Attacks», in 16th Int’l Conference on Image Analysis and Processing (ICIAP), Ravenna, Italy, 2011, pagg 159-168. (220.73 KB)
Z. Akhtar, Biggio, B., Fumera, G., e Marcialis, G. L., «Robustness of Multi-modal Biometric Systems under Realistic Spoof Attacks against All Traits», in IEEE Workshop on Biometric Measurements and Systems for Security and Medical Applications (BioMS), Milan, Italy, 2011, pagg 5-10. (954 KB)
Z. Akhtar, Fumera, G., Marcialis, G. L., e Roli, F., «Evaluation of serial and parallel multibiometric systems under spoofing attacks», in 5th IEEE Int'l Conference on Biometrics: Theory, Applications and Systems (BTAS), Washington DC, USA, 2012, vol . (573.02 KB)
M. A. O. Ahmed, Didaci, L., Fumera, G., e Roli, F., «An Empirical Investigation on the Use of Diversity for Creation of Classifier Ensembles», in Multiple Classifier Systems, 2015, vol 9132, pagg 206-219. (216.76 KB)
M. Ahmed, Didaci, L., Fumera, G., Roli, F., e Lavi, B., «Using Diversity for Classifier Ensemble Pruning: An Empirical Investigation», Theoretical and Applied Informatics, In Press.
M. Ahmadi, Biggio, B., Arzt, S., Ariu, D., e Giacinto, G., «Detecting Misuse of Google Cloud Messaging in Android Badware», in 6th Workshop on Security and Privacy in Smartphones and Mobile Devices (SPSM), Vienna, Austria, 2016, pagg 103-112. (626.38 KB)
M. Ahmadi, Ulyanov, D., Semenov, S., Trofimov, M., e Giacinto, G., «Novel Feature Extraction, Selection and Fusion for Effective Malware Family Classification», in Proceedings of the Sixth ACM on Conference on Data and Application Security and Privacy, 2016, pagg 183–194. (6.49 MB)

Pages