Publications

Export 437 results:
A B C D E F G H I J K L M N O P Q R S T U V W X Y Z 
U
L. Didaci e Roli, F., «Using Co-training and Self-training in Semi-Supervised Multiple Classifier Systems», in Statistical Techniques in Pattern Recognition, Hong Kong, China, 2006.
M. Ahmed, Didaci, L., Fumera, G., Roli, F., e Lavi, B., «Using Diversity for Classifier Ensemble Pruning: An Empirical Investigation», Theoretical and Applied Informatics, vol 29, n° 1&2, pagg 25-39, 2017.
V
G. L. Marcialis, Roli, F., Andronico, P., Multineddu, P., Coli, P., e Delogu, G., «Video Biometric Surveillance and Forensic Image Analysis», in First Workshop on Video Surveillance projects in Italy (VISIT 2008), Modena (Italy), 2008.
M. A. A. Dewan, Granger, E., Sabourin, R., Marcialis, G. L., e Roli, F., «Video Face Recognition From A Single Still Image Using an Adaptive Appearance Model Tracker», in IEEE Symposium Series on Computational Intelligence: IEEE Symposium on Computational Intelligence in Biometrics and Identity Management (CIBIM 2015), 2015, pagg 192-202. (533.82 KB)
P. Coli, Marcialis, G. L., e Roli, F., «Vitality detection from fingerprint images: a critical survey», in 2nd International Conference on Biometrics ICB 2007, Seoul (South Korea), 2007, vol 4642, pagg 722-731.
P. Coli, «Vitality detection in personal authentication systems using fingerprints», Cagliari (Italy), 2008.
W
D. M. Freeman, Jain, S., Duermuth, M., Biggio, B., e Giacinto, G., «Who Are You? A Statistical Approach to Measuring User Authenticity», in Proc. 23rd Annual Network & Distributed System Security Symposium (NDSS), 2016. (764.14 KB)
A. Demontis, Melis, M., Pintor, M., Jagielski, M., Biggio, B., Oprea, A., Nita-Rotaru, C., e Roli, F., «Why Do Adversarial Attacks Transfer? Explaining Transferability of Evasion and Poisoning Attacks», in 28th Usenix Security Symposium, Santa Clara, California, USA, 2019, vol 28th {USENIX} Security Symposium ({USENIX} Security 19), pag 321--338. (1.09 MB)
G. L. Marcialis, Didaci, L., Pisano, A., Granger, E., e Roli, F., «Why template self-update should work in biometric authentication systems?», in Information Science, Signal Processing and their Applications (ISSPA), 2012 11th International Conference on, Montreal, QC, 2012.
B. Biggio e Roli, F., «Wild Patterns: Ten Years After the Rise of Adversarial Machine Learning», Pattern Recognition, vol 84, pagg 317-331, 2018. (3.76 MB)
Y
A. Demontis, Melis, M., Biggio, B., Maiorca, D., Arp, D., Rieck, K., Corona, I., Giacinto, G., e Roli, F., «Yes, Machine Learning Can Be More Secure! A Case Study on Android Malware Detection», IEEE Trans. Dependable and Secure Computing, vol 16, n° 4, pagg 711-724, 2019. (3.61 MB)
D. Ariu, Didaci, L., Fumera, G., Frumento, E., Freschi, F., e Giacinto, G., «Yet Another Cybersecurity Roadmapping Methodology», in First International Workshop on Future Scenarios for Cybercrime and Cyber-terrorism, co-located with the 10th International Conference on Availability, Reliability and Security (ARES), 2015. (1.34 MB)

Pages