Publications

Export 408 results:
2013
D. Maiorca, Corona, I., e Giacinto, G., «Looking at the Bag is not Enough to Find the Bomb: an Evasion of Structural Methods for Malicious PDF Files Detection», in 8th ACM Symposium on Information, Computer and Communications Security (ASIACCS 2013), Hangzhou, China, 2013. (2.12 MB)
D. Ariu, Corona, I., Tronci, R., e Giacinto, G., «Machine Learning in Security Applications», in Machine Learning, Software Engineering and Standardization, P. Perner ibai-publishing, 2013.
I. Pillai, Fumera, G., e Roli, F., «Multi-label classification with a reject option», Pattern Recognition, vol 46, n° 8, 2013. (280.71 KB)
A. Rattani, Marcialis, G. L., e Roli, F., «A multi-modal dataset, protocol and tools for adaptive biometric systems: A benchmarking study», International Journal of Biometrics, vol 5, n° 3/4, 2013. (968.88 KB)
G. L. Marcialis, Roli, F., e Didaci, L., «Multimodal fingerprint verification by score-level fusion: an experimental investigation», Journal of Intelligent and Fuzzy Systems, vol 24, 2013.
L. Piras, Giacinto, G., e Paredes, R., «Passive-Aggressive Online Learning for Relevance Feedback in Content Based Image Retrieval», in 2nd International Conference on Pattern Recognition Applications and Methods (ICPRAM), Barcelona, Spain, 2013. (138.32 KB)
F. Roli, Biggio, B., e Fumera, G., «Pattern Recognition Systems Under Attack», in Progress in Pattern Recognition, Image Analysis, Computer Vision, and Applications, Proc. of the 18th Iberoamerican Congress on Pattern Recognition (CIARP 2013), LNCS, Havana, Cuba, 2013, vol 8258, pagg 1-8. (314.35 KB)
R. Satta e Stirparo, P., «Picture-to-Identity linking of social network accounts based on Sensor Pattern Noise», in 5th International Conference on Imaging for Crime Detection and Prevention (ICDP 2013), London, United Kingdom, 2013. (348.28 KB)
B. Biggio, Didaci, L., Fumera, G., e Roli, F., «Poisoning attacks to compromise face templates», in 6th IAPR Int'l Conf. on Biometrics (ICB), Madrid, Spain, 2013. (844.61 KB)
R. Satta, Pala, F., Fumera, G., e Roli, F., «Real-time Appearance-based Person Re-identification over Multiple KinectTM Cameras», in 8th International Conference on Computer Vision Theory and Applications (VISAPP 2013), Barcelona, Spain, 2013. (974.71 KB)
R. Perdisci, Ariu, D., e Giacinto, G., «Scalable Fine-Grained Behavioral Clustering of HTTP-Based Malware», Computer Networks - Special Issue on Botnet Activity: Analysis, Detection and Shutdown, vol 57, pagg 487-500, 2013. (797.8 KB)
I. Pillai, Fumera, G., e Roli, F., «Threshold optimisation for multi-label classifiers», Pattern Recognition, vol 46, n° 7, 2013. (445.97 KB)
2012
A. Rattani, Marcialis, G. L., e Roli, F., «Adaptive Multibiometric Systems: Conceptual Representation and Performance Evaluation Over Time», in Handbook on Multibiometrics Systems: Modern Approach to Identity Verification, D. Ranjan Kisku, Gupta, P., e Tistarelli, M. VDM - Lambert Academic Publishing, 2012, pagg 120 -143.
R. Tronci, Murgia, G., Pili, M., Ristori, M., Sirena, N., e Roli, F., «The Ambient Intelligence Laboratory of the Sardegna DistrICT». 2012.
L. Didaci, Fumera, G., e Roli, F., «Analysis of Co-training Algorithm with Very Small Training Sets», in Structural, Syntactic, and Statistical Pattern Recognition, 2012, vol 7626, pagg 719-726.
R. Satta, Fumera, G., e Roli, F., «Appearance-based People Recognition by Local Dissimilarity Representations», in 14th ACM Workshop on Multimedia and Security, Coventry, United Kingdom, 2012. (441.39 KB)
P. Forner, Karlgren, J., e Womser-Hacker, C., «CLEF 2012 Evaluation Labs and Workshop, Online Working Notes, Rome, Italy, September 17-20, 2012». 2012.
N. Poh, Rattani, A., e Roli, F., «A Critical Analysis of Adaptive Biometric Systems», IET Biometrics, 2012.
A. Rattani, Marcialis, G. L., Granger, E., e Roli, F., «A Dual-staged Classification-Selection Approach for Automated Update of Biometric Templates», in International Conference on Pattern Recognition (ICPR), Tsukuba Science City, JAPAN, 2012.
R. Perdisci, Corona, I., e Giacinto, G., «Early Detection of Malicious Flux Networks via Large-Scale Passive DNS Traffic Analysis», IEEE Transactions on Dependable and Secure Computing, vol 9, pagg 714-726, 2012. (1.37 MB)
C. - T. Li e Satta, R., «Empirical Investigation into the Correlation between Vignetting Effect and the Quality of Sensor Pattern Noise», IET Computer Vision, vol 6, n° 6, pagg 560-566, 2012.
L. Piras, Giacinto, G., e Paredes, R., «Enhancing image retrieval by an Exploration-Exploitation approach», in 8th International Conference Machine Learning and Data Mining (MLDM), Berlin, 2012, vol 7376, pagg 355-365. (307.57 KB)
Z. Akhtar, Fumera, G., Marcialis, G. L., e Roli, F., «Evaluation of Multimodal Biometric Score Fusion Rules under Spoof Attacks», in 5th IAPR Int’l Conference on Biometrics (ICB), New Delhi, India, 2012, pagg 402-407. (612.37 KB)
Z. Akhtar, Fumera, G., Marcialis, G. L., e Roli, F., «Evaluation of serial and parallel multibiometric systems under spoofing attacks», in 5th IEEE Int'l Conference on Biometrics: Theory, Applications and Systems (BTAS), Washington DC, USA, 2012, vol . (573.02 KB)
L. Ghiani, Denti, P., e Marcialis, G. L., «Experimental results on fingerprint liveness detection», in Proceedings of the 7th international conference on Articulated Motion and Deformable Objects (AMDO 2012), Andratx (Mallorca, Spain), 2012. (595.48 KB)

Pages