B. Biggio, Rota Bulò, S., Pillai, I., Mura, M., Zemene Mequanint, E., Pelillo, M., and Roli, F.,
“Poisoning complete-linkage hierarchical clustering”, in
Joint IAPR Int'l Workshop on Structural, Syntactic, and Statistical Pattern Recognition (LNCS), Joensuu, Finland, 2014, vol. 8621, pp. 42-52.
(388.31 KB) D. - T. Dang-Nguyen, Piras, L., Giacinto, G., Boato, G., and De Natale, F. G. B.,
“Retrieval of Diverse Images by Pre-filtering and Hierarchical Clustering”, in
MediaEval (Online Working Notes), Barcelona; Spain, 2014, vol. 1263.
(221.52 KB) B. Biggio, Fumera, G., and Roli, F.,
“Security evaluation of pattern classifiers under attack”,
IEEE Transactions on Knowledge and Data Engineering, vol. 26, no. 4, pp. 984-996, 2014.
(1.35 MB) B. Biggio, Corona, I., Nelson, B., Rubinstein, B. I. P., Maiorca, D., Fumera, G., Giacinto, G., and Roli, F.,
“Security Evaluation of Support Vector Machines in Adversarial Environments”, in
Support Vector Machines Applications,
Y. Ma and Guo, G. Springer International Publishing, 2014, pp. 105-153.
(687.1 KB) R. Wong, Poh, N., and Marcialis, G. L.,
“Toward an attack-sensitive tamper-resistant biometric recognition with a symmetric matcher: A fingerprint case study”, in
IEEE Symposium on Computational Intelligence in Biometrics and Identity Management (CIBIM), Dec., 9-11, 2014, Orlando (Florida), 2014, pp. 175-180.
(1.32 MB) R. Satta and Stirparo, P.,
“On the usage of Sensor Pattern Noise for Picture-to-Identity linking through social network accounts”, in
9th International Conference on Computer Vision Theory and Applications (VISAPP 2014), Lisbon, Portugal, 2014.
(340.78 KB)