Publications

Export 94 results:
Filters: First Letter Of Last Name is S  [Clear All Filters]
In Press
A. Carcangiu, Spano, L. Davide, Fumera, G., e Roli, F., «DEICTIC: a Compositional and Declarative Gesture Description based on Hidden Markov Model», International Journal of Human-Computer Studies, In Press.
G. Suarez-Tangil, Dash, S. Kumar, Ahmadi, M., Kinder, J., Giacinto, G., e Cavallaro, L., «DroidSieve: Fast and Accurate Classification of Obfuscated Android Malware», in Proceedings of the Seventh {ACM} Conference on Data and Application Security and Privacy, {CODASPY} 2017, In Press. (478.59 KB)
R. Soleymani, Granger, E., e Fumera, G., «Loss Factors for Learning Boosting Ensembles from Imbalanced Data», in 23rd International Conference on Pattern Recognition (ICPR 2016), Cancún, Mexico, In Press.
2017
I. Corona, Biggio, B., Contini, M., Piras, L., Corda, R., Mereu, M., Mureddu, G., Ariu, D., e Roli, F., «DeltaPhish: Detecting Phishing Webpages in Compromised Websites», 22nd European Symposium on Research in Computer Security (ESORICS), vol 10492. Springer International Publishing, Norway, September 11-15, 2017, pagg 370–388, 2017. (4.13 MB)
B. Ionescu, Müller, H., Villegas, M., Arenas, H., Boato, G., Dang-Nguyen, D. - T., Cid, Y. Dicente, Eickhoff, C., de Herrera, A. García Se, Gurrin, C., Islam, B., Kovalev, V., Liauchuk, V., Mothe, J., Piras, L., Riegler, M., e Schwall, I., «Overview of ImageCLEF 2017: Information extraction from images», in CLEF 2017 Proceedings, Dublin, Ireland, 2017, pagg 315-337.
E. Santucci, Didaci, L., Fumera, G., e Roli, F., «A Parameter Randomization Approach for Constructing Classifier Ensembles», Pattern Recognition, vol 69, pagg 1-13, 2017. (448.73 KB)
2016
M. A. A. Dewan, Granger, E., Marcialis, G. L., Sabourin, R., e Roli, F., «Adaptive Appearance Model Tracking for Still-to-Video Face Recognition», Pattern Recognition, vol 49, n° 1, 2016. (6.51 MB)
R. Soleymani, Granger, E., e Fumera, G., «Classifier Ensembles with Trajectory Under-Sampling for Face Re-Identification», in 5th International Conference on Pattern Recognition Applications and Methods (ICPRAM 2016), Rome, Italy, 2016, vol 1, pagg 97-108.
S. Kumar Dash, Suarez-Tangil, G., Khan, S., Tam, K., Ahmadi, M., Kinder, J., e Cavallaro, L., «DroidScribe: Classifying Android Malware Based on Runtime Behavior», in Mobile Security Technologies (MoST 2016), 2016. (571.22 KB)
M. Villegas, Müller, H., de Herrera, A. García Se, Schaer, R., Bromuri, S., Gilbert, A., Piras, L., Wang, J., Yan, F., Ramisa, A., Dellandrea, E., Gaizauskas, R., Puigcerver, K. Mikolajczy, Toselli, A. H., Sánchez, J. - A., e Vidal, E., «General Overview of ImageCLEF at the CLEF 2016 Labs», in Lecture Notes in Computer Science, Springer International Publishing, 2016. (1.07 MB)
M. Villegas, Müller, H., de Herrera, A. García Se, Schaer, R., Bromuri, S., Gilbert, A., Piras, L., Wang, J., Yan, F., Ramisa, A., Dellandrea, E., Gaizauskas, R., Puigcerver, K. Mikolajczy, Toselli, A. H., Sánchez, J. - A., e Vidal, E., «General Overview of ImageCLEF at the CLEF 2016 Labs», in Lecture Notes in Computer Science, Springer International Publishing, 2016. (1.07 MB)
M. Ahmadi, Ulyanov, D., Semenov, S., Trofimov, M., e Giacinto, G., «Novel Feature Extraction, Selection and Fusion for Effective Malware Family Classification», in Proceedings of the Sixth ACM on Conference on Data and Application Security and Privacy, 2016, pagg 183–194. (6.49 MB)
L. Ghiani, Yambay, D. A., Mura, V., Marcialis, G. L., Roli, F., e Schuckers, S. A., «Review of the Fingerprint Liveness Detection (LivDet) competition series: 2009 to 2015», Image and Vision Computing, pag -, 2016.
J. Galbally e Satta, R., «Three-dimensional and two-and-a-half- dimensional face recognition spoofing using three-dimensional printed models», IET Biometrics, vol 5, n° 2, 2016. (1.33 MB)
2015
I. Sanchez, Satta, R., Giuliani, R., e Baldini, G., «Detection of DECT identity spoofing through Radio Frequency fingerprinting», in 38th International Convention on Information and Communication Technology, Electronics and Microelectronics (MIPRO 2015), Opatija, Croatia, 2015. (778.81 KB)
I. Sanchez, Satta, R., Giuliani, R., e Baldini, G., «Detection of DECT identity spoofing through Radio Frequency fingerprinting», in 38th International Convention on Information and Communication Technology, Electronics and Microelectronics (MIPRO 2015), Opatija, Croatia, 2015. (778.81 KB)
M. Narouei, Ahmadi, M., Giacinto, G., Takabi, H., e Sami, A., «DLLMiner: structural mining for malware detection», Security and Communication Networks, 2015. (731.78 KB)
M. A. O. Ahmed, Didaci, L., Fumera, G., e Roli, F., «An Empirical Investigation on the Use of Diversity for Creation of Classifier Ensembles», in Multiple Classifier Systems, 2015, vol 9132, pagg 206-219. (216.76 KB)
V. Mura, Yambay, D., Ghiani, L., Marcialis, G. L., Schuckers, S., e Roli, F., «LivDet 2015 – Fingerprint Liveness Detection Competition 2015», in 7th IEEE Int. Conference on Biometrics: Technology, Applications and Systems (BTAS 2015), 2015. (178.26 KB)
C. Ruiz, Arroyo, S., Krsteski, I., Dago, P., Sanchez, J., Perez-Freire, L., De Rosa, A., Fontani, M., Costanzo, A., Piva, A., Ariu, D., Piras, L., Ahumada, R., e Jerian, M., «The maven project: Management and Authenticity Verification of multimedia contents», in Multimedia Expo Workshops (ICMEW), 2015 IEEE International Conference on, 2015, pagg 1-4. (194.87 KB)

Pages