Publications

Export 399 results:
2015
L. Piras, Furcas, D., e Giacinto, G., «User-driven Nearest-Neighbour Exploration of Image Archives», in 4th International Conference on Pattern Recognition Applications and Methods (ICPRAM), Lisbon, Portugal, 2015, pagg 181 - 189. (376.55 KB)
M. A. A. Dewan, Granger, E., Sabourin, R., Marcialis, G. L., e Roli, F., «Video Face Recognition From A Single Still Image Using an Adaptive Appearance Model Tracker», in IEEE Symposium Series on Computational Intelligence: IEEE Symposium on Computational Intelligence in Biometrics and Identity Management (CIBIM 2015), 2015, pagg 192-202. (533.82 KB)
D. Ariu, Didaci, L., Fumera, G., Frumento, E., Freschi, F., e Giacinto, G., «Yet Another Cybersecurity Roadmapping Methodology», in First International Workshop on Future Scenarios for Cybercrime and Cyber-terrorism, co-located with the 10th International Conference on Availability, Reliability and Security (ARES), 2015. (1.34 MB)
2014
C. Pagano, Granger, E., Sabourin, R., Marcialis, G. L., e Roli, F., «Adaptive Classification for Person Re-Identification Driven by Change Detection», in 3rd Int. Conf. on Pattern Recognition Applications and Methods (ICPRAM 2014), 2014. (316.11 KB)
C. Pagano, Granger, E., Sabourin, R., Marcialis, G. L., e Roli, F., «Adaptive Ensembles for Face Recognition in Changing Video Surveillance Environments», Information Sciences, vol 206, 2014. (3.17 MB)
L. Didaci, Marcialis, G. L., e Roli, F., «Analysis of unsupervised template update in biometric recognition systems», Pattern Recognition Letters, vol 37, n° 1, 2014. (1.37 MB)
G. L. Marcialis, Fumera, G., e Biggio, B., «Anti-spoofing: Multimodal», in Encyclopedia of Biometrics, S. Z. Li e Jain, A. K. Springer US, 2014, pagg 1-4.
R. Satta, Galbally, J., e Beslay, L., «Children Gender Recognition Under Unconstrained Conditions Based on Contextual Information», in 22nd IEEE International Conference on Pattern Recognition, ICPR 2014, Stockholm, Sweden, 2014. (272.46 KB)
C. Pagano, Granger, E., Sabourin, R., Marcialis, G. L., e Roli, F., «Dynamic weighted fusion of adaptive classifier ensembles based on changing data streams, In: Gayar N.E., Schwenker F., Suen C.Y, , , pp», in 6th IAPR TC3 International Workshop on Artificial Neural Networks for Pattern Recognition (ANNPR 2014), 2014, vol Springer LNAI 8774, pagg 105-116. (1.89 MB)
C. Pagano, Granger, E., Sabourin, R., Rattani, A., Marcialis, G. L., e Roli, F., «Efficient Adaptive Face Recognition Systems Based on Capture Conditions, Proc. of », in IEEE Workshop on Computational Intelligence in Biometrics and Identity Management (CIBIM 2014), 2014. (574.39 KB)
I. Pillai, Fumera, G., e Roli, F., «F -Measure Optimisation in Multi-label Classifiers», in 22nd IEEE International Conference on Pattern Recognition, ICPR 2014, Stockholm, Sweden, 2014, pagg 3452 - 3456. (287.72 KB)
B. Biggio, «On Learning and Recognition of Secure Patterns (Invited keynote at AISec '14)», in AISec'14: Proceedings of the 2014 ACM Workshop on Artificial Intelligence and Security, co-located with CCS '14, Scottsdale, Arizona, USA, 2014, pagg 1-2. (110.67 KB)
I. Corona, Maiorca, D., Ariu, D., e Giacinto, G., «Lux0R: Detection of Malicious PDF-embedded JavaScript code through Discriminant Analysis of API References», in AISec'14: Proceedings of the 2014 ACM Workshop on Artificial Intelligence and Security, co-located with CCS '14, Scottdale, Arizona, USA, 2014. (455.14 KB)
G. Fumera, Marcialis, G. L., Biggio, B., Roli, F., e Schuckers, S. C., «Multimodal Anti-Spoofing in Biometric Recognition Systems», in Handbook of Biometric Anti-Spoofing, S. Marcel, Nixon, M., e Li, S. Z. Springer, 2014, pagg 165-184. (155.83 KB)
G. L. Marcialis, Roli, F., e Fadda, G., «A Novel Method for Head Pose Estimation based on the ``Vitruvian Man''», International Journal of Machine Learning and Cybernetics, vol 5, n° 1, 2014. (1.06 MB)
L. Piras e Giacinto, G., «Open issues on codebook generation in Image Classification tasks», in 10th International Conference Machine Learning and Data Mining (MLDM), St. Petersburg, Russia, 2014, pagg 328-342. (229.92 KB)
B. Biggio, Fumera, G., e Roli, F., «Pattern Recognition Systems under Attack: Design Issues and Research Challenges», Int'l J. Patt. Recogn. Artif. Intell., vol 28, n° 7, pag 1460002, 2014. (1.41 MB)
R. Satta, Pala, F., Fumera, G., e Roli, F., «People search with textual queries about clothing appearance attributes», in Person Re‐Identification, Advances in Computer Vision and Pattern Recognition, S. Gong, Cristani, M., Yan, S., e Loy, C. Change Springer, 2014. (1.07 MB)
B. Biggio, Rieck, K., Ariu, D., Wressnegger, C., Corona, I., Giacinto, G., e Roli, F., «Poisoning Behavioral Malware Clustering», in AISec'14: Proceedings of the 2014 ACM Workshop on Artificial Intelligence and Security, co-located with CCS '14, Scottsdale, Arizona, USA, 2014, pagg 27-36. (375.58 KB)
B. Biggio, Rota Bulò, S., Pillai, I., Mura, M., Zemene Mequanint, E., Pelillo, M., e Roli, F., «Poisoning complete-linkage hierarchical clustering», in Joint IAPR Int'l Workshop on Structural, Syntactic, and Statistical Pattern Recognition (LNCS), Joensuu, Finland, 2014, vol 8621, pagg 42-52. (388.31 KB)
I. Sanchez, Satta, R., Nai-Fovino, I., Baldini, G., Steri, G., Shaw, D., e Ciardulli, A., «Privacy leakages in Smart Home Wireless Technologies», in 2014 IEEE International Carnahan Conference on Security Technology, Rome, Italy, 2014. (329.97 KB)
D. - T. Dang-Nguyen, Piras, L., Giacinto, G., Boato, G., e De Natale, F. G. B., «Retrieval of Diverse Images by Pre-filtering and Hierarchical Clustering», in MediaEval (Online Working Notes), Barcelona; Spain, 2014, vol 1263. (221.52 KB)
B. Biggio, Fumera, G., e Roli, F., «Security evaluation of pattern classifiers under attack», IEEE Transactions on Knowledge and Data Engineering, vol 26, n° 4, pagg 984-996, 2014. (1.35 MB)
B. Biggio, Corona, I., Nelson, B., Rubinstein, B. I. P., Maiorca, D., Fumera, G., Giacinto, G., e Roli, F., «Security Evaluation of Support Vector Machines in Adversarial Environments», in Support Vector Machines Applications, Y. Ma e Guo, G. Springer International Publishing, 2014, pagg 105-153. (687.1 KB)
R. Wong, Poh, N., e Marcialis, G. L., «Toward an attack-sensitive tamper-resistant biometric recognition with a symmetric matcher: A fingerprint case study», in IEEE Symposium on Computational Intelligence in Biometrics and Identity Management (CIBIM), Dec., 9-11, 2014, Orlando (Florida), 2014, pagg 175-180. (1.32 MB)

Pages