L. Didaci, Fumera, G., e Roli, F.,
«Analysis of Co-training Algorithm with Very Small Training Sets», in
Structural, Syntactic, and Statistical Pattern Recognition, 2012, vol 7626, pagg 719-726.
Y. Guan, Wei, X., Li, C. - T., Marcialis, G. L., Roli, F., e Tistarelli, M.,
«Combining Gait and Face for Tackling the Elapsed Time Challenges», in
IEEE 6th International Conference on Biometrics: Theory, Applications, and Systems (BTAS 2013), Washington DC (USA), 2013, pagg 1-8.
(663.7 KB) J. Austin, Giacinto, G., Kanellopoulos, I., Lees, K., Roli, F., Vernazza, G., e Wilkinson, G.,
«The COMPARES Project: COnnectionist Methods for Preprocessing and Analysis of REmote Sensing data», in
9th International Conference on Image Analysis and Processing, 1997, vol 1311, pagg 765-772.
C. Lobrano, Tronci, R., Giacinto, G., e Roli, F.,
«Dynamic Linear Combination of Two-Class Classifiers», in
Lecture Notes in Computer Science, 2010, vol 6218, pagg 473-482.
C. Lobrano, Tronci, R., Giacinto, G., e Roli, F.,
«Dynamic Linear Combination of Two-Class Classifiers», in
Lecture Notes in Computer Science, 2010, vol 6218, pagg 473-482.
G. L. Marcialis e Roli, F.,
«High security fingerprint verification by perceptron-based fusion of multiple matchers», in
5th International Workshop on Multiple Classifiers Systems (MCS04), Cagliari (Italy), 2004, vol 3077, pagg 364-373.
G. Giacinto, Roli, F., e Didaci, L.,
«A Modular Multiple Classifier System for the Detection of Intrusions in Computer Networks», in
4th Int. Workshop on Multiple Classifier Systems (MCS 2003), Guildford, United Kingdom, 2003, vol 2709, pagg 346-355.
A. Gilbert, Piras, L., Wang, J., Yan, F., Dellandrea, E., Gaizauskas, R., Villegas, M., e Mikolajczyk, K.,
«Overview of the ImageCLEF 2015 Scalable Image Annotation, Localization and Sentence Generation task», in
CLEF2015 Working Notes, Toulouse, France, 2015.
(515.88 KB)
(581 bytes) B. Biggio, Fumera, G., Roli, F., e Didaci, L.,
«Poisoning adaptive biometric systems», in
9th Int'l Workshop on Statistical Techniques in Pattern Recognition (SPR 2012), 2012, vol 7626, pagg 417-425.
(637.79 KB) B. Biggio, Rieck, K., Ariu, D., Wressnegger, C., Corona, I., Giacinto, G., e Roli, F.,
«Poisoning Behavioral Malware Clustering», in
AISec'14: Proceedings of the 2014 ACM Workshop on Artificial Intelligence and Security, co-located with CCS '14, Scottsdale, Arizona, USA, 2014, pagg 27-36.
(375.58 KB) R. Wong, Poh, N., e Marcialis, G. L.,
«Toward an attack-sensitive tamper-resistant biometric recognition with a symmetric matcher: A fingerprint case study», in
IEEE Symposium on Computational Intelligence in Biometrics and Identity Management (CIBIM), Dec., 9-11, 2014, Orlando (Florida), 2014, pagg 175-180.
(1.32 MB)