Publications

Export 44 results:
Filters: First Letter Of Title is E  [Clear All Filters]
2022
R. Delussu, Putzu, L., and Fumera, G., On the Effectiveness of Synthetic Data Sets for Training Person Re-identification Models, in Proceedings - International Conference on Pattern Recognition, 2022, vol. 2022-August, pp. 1208 – 1214.
E. Ledda, Putzu, L., Delussu, R., Fumera, G., and Roli, F., On the Evaluation of Video-Based Crowd Counting Models, Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), vol. 13233 LNCS. pp. 301 – 311, 2022.
A. Sotgiu, Pintor, M., and Biggio, B., Explainability-Based Debugging of Machine Learning for Vulnerability Discovery, in Proc. 17th International Conference on Availability, Reliability and Security, New York, NY, USA, 2022.
F. Meloni, Sanna, A., Maiorca, D., and Giacinto, G., Extended Abstract: Effective Call Graph Fingerprinting for the Analysis and Classification of Windows Malware, 19th Conference on Detection of Intrusions and Malware & Vulnerability Assessment (DIMVA). pp. 42-52, 2022. (328.32 KB)
2020
R. Delussu, Putzu, L., and Fumera, G., An Empirical Evaluation of Cross-scene Crowd Counting Performance, in Proceedings of the 15th International Joint Conference on Computer Vision, Imaging and Computer Graphics Theory and Applications - VISAPP, Valletta - Malta, 2020, vol. 4, pp. 373-380. (527.29 KB)
L. Putzu and Fumera, G., An empirical evaluation of nuclei segmentation from H&E images in a real application scenario, Applied Sciences (Switzerland), vol. 10, pp. 1-15, 2020.
2018
M. Melis, Maiorca, D., Biggio, B., Giacinto, G., and Roli, F., Explaining Black-box Android Malware Detection, in 26th European Signal Processing Conference (EUSIPCO '18), Rome, Italy, 2018, pp. 524-528. (431.78 KB)
2016
J. Hoffmann, Rytilahti, T., Maiorca, D., Winandy, M., Giacinto, G., and Holz, T., Evaluating Analysis Tools for Android Apps: Status Quo and Robustness Against Obfuscation, Horst Görtz Institut for IT Security (Ruhr-University Bochum), Technical Report TR-HGI-2016-003, 2016. (519.16 KB)
J. Hoffmann, Rytilahti, T., Maiorca, D., Winandy, M., Giacinto, G., and Holz, T., Evaluating Analysis Tools for Android Apps: Status Quo and Robustness against Obfuscation, Proceedings of the 6th ACM Conference on Data and Application Security and Privacy (CODASPY 2016, 09-11 March, 2016). 2016. (726.65 KB)
2015
M. Fraschini, Hillebrand, A., Demuru, M., Didaci, L., and Marcialis, G. L., An EEG-based biometric system using eigenvector centrality in resting state brain activity, IEEE Signal Processing Letters, vol. 22, no. 6, 2015. (522.35 KB)
M. A. O. Ahmed, Didaci, L., Fumera, G., and Roli, F., An Empirical Investigation on the Use of Diversity for Creation of Classifier Ensembles, in Multiple Classifier Systems, 2015, vol. 9132, pp. 206-219. (216.76 KB)
D. Maiorca, Ariu, D., Corona, I., and Giacinto, G., An Evasion Resilient Approach to the Detection of Malicious PDF Files, in Information Systems Security and Privacy (Communication in Computer and Information Science), vol. 576, Springer, 2015, pp. 68-85. (503.11 KB)
2014
C. Pagano, Granger, E., Sabourin, R., Rattani, A., Marcialis, G. L., and Roli, F., Efficient Adaptive Face Recognition Systems Based on Capture Conditions, Proc. of , in IEEE Workshop on Computational Intelligence in Biometrics and Identity Management (CIBIM 2014), 2014. (574.39 KB)
2013
G. L. Marcialis, Didaci, L., and Roli, F., Estimating the serial combination's performance from that of individual base classifiers, in IAPR 17th Int. Conf. on Image Analysis and Processing (ICIAP 2013), 2013, vol. Springer LNCS 8156, pp. 622-631. (210.77 KB)
B. Biggio, Corona, I., Maiorca, D., Nelson, B., Srndic, N., Laskov, P., Giacinto, G., and Roli, F., Evasion attacks against machine learning at test time, in European Conference on Machine Learning and Principles and Practice of Knowledge Discovery in Databases (ECML PKDD), 2013, vol. 8190, pp. 387-402. (473.78 KB)
G. Fadda, Marcialis, G. L., Roli, F., and Ghiani, L., Exploiting the Golden Ratio on Human Faces for Head-Pose Estimation, in IAPR 17th Int. Conf. on Image Analysis and Processing (ICIAP 2013), Napoli (Italy), 2013, vol. Springer LNCS 8156, pp. 280-289. (546.25 KB)
2012
R. Perdisci, Corona, I., and Giacinto, G., Early Detection of Malicious Flux Networks via Large-Scale Passive DNS Traffic Analysis, IEEE Transactions on Dependable and Secure Computing, vol. 9, pp. 714-726, 2012. (1.37 MB)
C. - T. Li and Satta, R., Empirical Investigation into the Correlation between Vignetting Effect and the Quality of Sensor Pattern Noise, IET Computer Vision, vol. 6, no. 6, pp. 560-566, 2012.
L. Piras, Giacinto, G., and Paredes, R., Enhancing image retrieval by an Exploration-Exploitation approach, in 8th International Conference Machine Learning and Data Mining (MLDM), Berlin, 2012, vol. 7376, pp. 355-365. (307.57 KB)
Z. Akhtar, Fumera, G., Marcialis, G. L., and Roli, F., Evaluation of Multimodal Biometric Score Fusion Rules under Spoof Attacks, in 5th IAPR Int’l Conference on Biometrics (ICB), New Delhi, India, 2012, pp. 402-407. (612.37 KB)
Z. Akhtar, Fumera, G., Marcialis, G. L., and Roli, F., Evaluation of serial and parallel multibiometric systems under spoofing attacks, in 5th IEEE Int'l Conference on Biometrics: Theory, Applications and Systems (BTAS), Washington DC, USA, 2012, vol. . (573.02 KB)

Pages