Publications
“Poisoning complete-linkage hierarchical clustering”, in Joint IAPR Int'l Workshop on Structural, Syntactic, and Statistical Pattern Recognition (LNCS), Joensuu, Finland, 2014, vol. 8621, pp. 42-52.
(388.31 KB)
, 
“Privacy leakages in Smart Home Wireless Technologies”, in 2014 IEEE International Carnahan Conference on Security Technology, Rome, Italy, 2014.
(329.97 KB)
, 
“Retrieval of Diverse Images by Pre-filtering and Hierarchical Clustering”, in MediaEval (Online Working Notes), Barcelona; Spain, 2014, vol. 1263.
(221.52 KB)
, 
“Security evaluation of pattern classifiers under attack”, IEEE Transactions on Knowledge and Data Engineering, vol. 26, no. 4, pp. 984-996, 2014.
(1.35 MB)
, 
“Security Evaluation of Support Vector Machines in Adversarial Environments”, in Support Vector Machines Applications, Springer International Publishing, 2014, pp. 105-153.
(687.1 KB)
, 
“Toward an attack-sensitive tamper-resistant biometric recognition with a symmetric matcher: A fingerprint case study”, in IEEE Symposium on Computational Intelligence in Biometrics and Identity Management (CIBIM), Dec., 9-11, 2014, Orlando (Florida), 2014, pp. 175-180.
(1.32 MB)
, 
“On the usage of Sensor Pattern Noise for Picture-to-Identity linking through social network accounts”, in 9th International Conference on Computer Vision Theory and Applications (VISAPP 2014), Lisbon, Portugal, 2014.
(340.78 KB)
, 
“Adversarial Attacks against Intrusion Detection Systems: Taxonomy, Solutions and Open Issues”, Information Sciences, vol. 239, 2013.
(1.49 MB)
, , 
“Biometric System Adaptation by Self-update and Graph-based techniques”, Journal of Visual Languages and Computing, Elsevier, 2013.
, “Combining Gait and Face for Tackling the Elapsed Time Challenges”, in IEEE 6th International Conference on Biometrics: Theory, Applications, and Systems (BTAS 2013), Washington DC (USA), 2013, pp. 1-8.
(663.7 KB)
, 
“A comparison of adaptive appearance methods for tracking faces in video surveillance”, in 5th International Conference on Imaging for Crime Detection and Prevention (ICDP-13), 2013.
, “Is Data Clustering in Adversarial Settings Secure?”, in AISec'13: Proceedings of the 2013 ACM Workshop on Artificial Intelligence and Security, Berlin, 2013, pp. 87-98.
(300.52 KB)
, 
“Dissimilarity-based people re-identification and search for intelligent video surveillance”, University of Cagliari, Cagliari (Italy), 2013.
(7.08 MB)
, 
“Diversity in classifier ensembles: fertile concept or dead end?”, in 11th Int. Workshop on Multiple Classifier Systems, Nanjing, China, 2013, vol. 7872.
(241.27 KB)
(163.54 KB)
, 

“Diversity in ensembles of codebooks for visual concept detection”, in 17th Int. Conference on Image Analysis and Processing (ICIAP), Naples, Italy, 2013.
(303.73 KB)
, 
“Estimating the serial combination's performance from that of individual base classifiers”, in IAPR 17th Int. Conf. on Image Analysis and Processing (ICIAP 2013), 2013, vol. Springer LNCS 8156, pp. 622-631.
(210.77 KB)
, 
“Evasion attacks against machine learning at test time”, in European Conference on Machine Learning and Principles and Practice of Knowledge Discovery in Databases (ECML PKDD), 2013, vol. 8190, pp. 387-402.
(473.78 KB)
, 
“Exploiting the Golden Ratio on Human Faces for Head-Pose Estimation”, in IAPR 17th Int. Conf. on Image Analysis and Processing (ICIAP 2013), Napoli (Italy), 2013, vol. Springer LNCS 8156, pp. 280-289.
(546.25 KB)
, 
“Fingerprint liveness detection using Binarized Statistical Image Features”, in IEEE 6th International Conference on Biometrics: Theory, Applications, and Systems, (BTAS 2013), Washington DC (USA), 2013.
(615.3 KB)
, 
“ImageHunter: a Novel Tool for Relevance Feedback in Content Based Image Retrieval”, in New Challenges in Distributed Information Filtering and Retrieval. DART 2011: Revised and Invited Papers, Springer, 2013.
(1.98 MB)
, 
“LivDet 2013 – Fingerprint Liveness Detection Competition”, in IAPR/IEEE 6th Int. Conf. on Biometrics (ICB 2013), Madrid (Spain), 2013.
(755.98 KB)
, 
“Looking at the Bag is not Enough to Find the Bomb: an Evasion of Structural Methods for Malicious PDF Files Detection”, in 8th ACM Symposium on Information, Computer and Communications Security (ASIACCS 2013), Hangzhou, China, 2013.
(2.12 MB)
, 
“Multi-label classification with a reject option”, Pattern Recognition, vol. 46, no. 8, 2013.
(280.71 KB)
, 
“A multi-modal dataset, protocol and tools for adaptive biometric systems: A benchmarking study”, International Journal of Biometrics, vol. 5, no. 3/4, 2013.
(968.88 KB)
, 