Publications

Export 94 results:
Filters: First Letter Of Last Name is S  [Clear All Filters]
A B C D E F G H I J K L M N O P Q R S T U V W X Y Z 
B
B. Biggio, Corona, I., Fumera, G., Giacinto, G., e Roli, F., «Bagging classifiers for fighting poisoning attacks in adversarial classification tasks», in Multiple Classifier Systems (MCS 2011), 2011, vol 6713, pagg 350-359. (231.43 KB)
B. Biggio, Fumera, G., e Roli, F., «Bayesian Linear Combination of Neural Networks», in Innovations in Neural Information Paradigms and Applications, vol 247, M. Bianchini, Maggini, M., Scarselli, F., e Jain, L. C. Springer Berlin / Heidelberg, 2009, pagg 201-230. (435.32 KB)
C
R. Satta, Galbally, J., e Beslay, L., «Children Gender Recognition Under Unconstrained Conditions Based on Contextual Information», in 22nd IEEE International Conference on Pattern Recognition, ICPR 2014, Stockholm, Sweden, 2014. (272.46 KB)
S. B. Serpico e Roli, F., «Classification of multi-sensor remote- sensing images by structured neural networks», IEEE Transactions on Geoscience and Remote Sensing, vol 33, pagg 562-578, 1995.
R. Soleymani, Granger, E., e Fumera, G., «Classifier Ensembles with Trajectory Under-Sampling for Face Re-Identification», in 5th International Conference on Pattern Recognition Applications and Methods (ICPRAM 2016), Rome, Italy, 2016, vol 1, pagg 97-108.
F. Roli, Giacinto, G., e Serpico, S. B., «Classifier Fusion for Multisensor Image Recognition», in Image and Signal Processing for Remote Sensing VI, 2001, Sebastiano B. Serpico., vol 4170, pagg 103-110.
C. Gurrin, Schoeffmann, K., Joho, H., Leibetseder, A., Zhou, L., Duane, A., Dang-Nguyen, D. - T., Riegler, M., Piras, L., Tran, M. - T., Lokoč, J., e Hürst, W., «Comparing Approaches to Interactive Lifelog Search at the Lifelog Search Challenge (LSC2018)», ITE Transactions on Media Technology and Applications, vol 7, pagg 46-59, 2019. (4.7 MB)
M. A. A. Dewan, Granger, E., Sabourin, R., Roli, F., e Marcialis, G. L., «A comparison of adaptive appearance methods for tracking faces in video surveillance», in 5th International Conference on Imaging for Crime Detection and Prevention (ICDP-13), 2013.
M. Mohan Chakka, Anjos, A., Marcel, S., Tronci, R., Muntoni, D., Fadda, G., Pili, M., Sirena, N., Murgia, G., Ristori, M., e Roli, F., «Competition on Counter Measures to 2-D Facial Spoofing Attacks», in International Joint Conference on Biometrics (IJCB 2011), 2011.
L. Kuncheva, Roli, F., Marcialis, G. L., e Shipp, C., «Complexity of Data Subsets Generated by the Random Subspace Method: an Experimental Investigation», in 2nd International Workshop on Multiple Classifier Systems (MCS 2001), 2001, vol 2096, pagg 349-358.
D
A. Carcangiu, Spano, L. Davide, Fumera, G., e Roli, F., «DEICTIC: a Compositional and Declarative Gesture Description based on Hidden Markov Model», International Journal of Human-Computer Studies, In Press.
I. Corona, Biggio, B., Contini, M., Piras, L., Corda, R., Mereu, M., Mureddu, G., Ariu, D., e Roli, F., «DeltaPhish: Detecting Phishing Webpages in Compromised Websites», 22nd European Symposium on Research in Computer Security (ESORICS), vol 10492. Springer International Publishing, Norway, September 11-15, 2017, pagg 370–388, 2017. (4.13 MB)
I. Sanchez, Satta, R., Giuliani, R., e Baldini, G., «Detection of DECT identity spoofing through Radio Frequency fingerprinting», in 38th International Convention on Information and Communication Technology, Electronics and Microelectronics (MIPRO 2015), Opatija, Croatia, 2015. (778.81 KB)
I. Sanchez, Satta, R., Giuliani, R., e Baldini, G., «Detection of DECT identity spoofing through Radio Frequency fingerprinting», in 38th International Convention on Information and Communication Technology, Electronics and Microelectronics (MIPRO 2015), Opatija, Croatia, 2015. (778.81 KB)
I. Corona e Giacinto, G., «Detection of server side web attacks», in Workshop on Applications of Pattern Analysis, Cumberland Lodge, London, UK, 2010. (308.33 KB)
R. Satta, «Dissimilarity-based people re-identification and search for intelligent video surveillance», University of Cagliari, Cagliari (Italy), 2013. (7.08 MB)
M. Narouei, Ahmadi, M., Giacinto, G., Takabi, H., e Sami, A., «DLLMiner: structural mining for malware detection», Security and Communication Networks, 2015. (731.78 KB)
S. Kumar Dash, Suarez-Tangil, G., Khan, S., Tam, K., Ahmadi, M., Kinder, J., e Cavallaro, L., «DroidScribe: Classifying Android Malware Based on Runtime Behavior», in Mobile Security Technologies (MoST 2016), 2016. (571.22 KB)
G. Suarez-Tangil, Dash, S. Kumar, Ahmadi, M., Kinder, J., Giacinto, G., e Cavallaro, L., «DroidSieve: Fast and Accurate Classification of Obfuscated Android Malware», in Proceedings of the Seventh {ACM} Conference on Data and Application Security and Privacy, {CODASPY} 2017, In Press. (478.59 KB)

Pages