Export 453 results:
Journal Article
G. Giacinto, Roli, F., e Bruzzone, L., «Combination of Neural and Statistical Algorithms for Supervised Classification of Remote-Sensing Images», Pattern Recognition Letters, vol 21, pagg 385-397, 2000.
S. B. Serpico e Roli, F., «Classification of multi-sensor remote- sensing images by structured neural networks», IEEE Transactions on Geoscience and Remote Sensing, vol 33, pagg 562-578, 1995.
A. Rattani, Marcialis, G. L., e Roli, F., «Biometric System Adaptation by Self-update and Graph-based techniques», Journal of Visual Languages and Computing, Elsevier, 2013.
G. Giacinto e Roli, F., «Bayesian Relevance Feedback for Content-Based Image Retrieval», Pattern Recognition, vol 37, pagg 1499-1508, 2004.
R. Paolucci, Coli, P., e Giacinto, G., «Assessment of seismic site effects in 2-D alluvial valleys using neural networks», Earthquake Spectra, vol 16, pagg 661-680, 2000.
G. Giacinto e Roli, F., «An Approach to the Automatic Design of Multiple Classifier Systems», Pattern Recognition Letters, vol 22, pagg 25-33, 2001.
G. Giacinto, Paolucci, R., e Roli, F., «Application of Neural Networks and Statistical Pattern Recognition Algorithms to Earthquake Risk Evaluations», Pattern Recognition Letters, vol 18, pagg 1353-1362, 1997.
L. Didaci, Marcialis, G. L., e Roli, F., «Analysis of unsupervised template update in biometric recognition systems», Pattern Recognition Letters, vol 37, n° 1, 2014. (1.37 MB)
G. Fumera e Roli, F., «Analysis of error-reject trade-off in linearly combined multiple classifiers», Pattern Recognition, vol 37, pagg 1245-1265, 2004.
R. Perdisci, Giacinto, G., e Roli, F., «Alarm clustering for intrusion detection systems in computer networks», Engineering Applications of Artificial Intelligence, vol 19, pagg 429-438, 2006.
F. Roli, «Adversarial Pattern Classification», 2009.
H. - Y. Lin e Biggio, B., «Adversarial Machine Learning: Attacks From Laboratories to the Real World», Computer, vol 54, pagg 56-60, 2021.
F. Zhang, Chan, P. P. K., Biggio, B., Yeung, D. S., e Roli, F., «Adversarial Feature Selection Against Evasion Attacks», IEEE Transactions on Cybernetics, vol 46, n° 3, pagg 766-777, 2016. (2.12 MB)
L. Demetrio, Coull, S. E., Biggio, B., Lagorio, G., Armando, A., e Roli, F., «Adversarial EXEmples: A Survey and Experimental Evaluation of Practical Attacks on Machine Learning for Windows Malware Detection», ACM Trans. Priv. Secur., vol 24, 2021.
D. Maiorca, Demontis, A., Biggio, B., Roli, F., e Giacinto, G., «Adversarial Detection of Flash Malware: Limitations and Open Issues», Computers & Security, vol 96, 2020. (1.08 MB)
B. Biggio, Fumera, G., Russu, P., Didaci, L., e Roli, F., «Adversarial Biometric Recognition: A Review on Biometric System Security from the Adversarial Machine Learning Perspective», IEEE Signal Processing Magazine, vol 32, n° 5, pagg 31-41, 2015. (751.08 KB)
I. Corona, Giacinto, G., e Roli, F., «Adversarial Attacks against Intrusion Detection Systems: Taxonomy, Solutions and Open Issues», Information Sciences, vol 239, 2013. (1.49 MB)
C. Pagano, Granger, E., Sabourin, R., Marcialis, G. L., e Roli, F., «Adaptive Ensembles for Face Recognition in Changing Video Surveillance Environments», Information Sciences, vol 206, 2014. (3.17 MB)
F. Roli, «Adaptive Biometric Systems», 2011.
M. A. A. Dewan, Granger, E., Marcialis, G. L., Sabourin, R., e Roli, F., «Adaptive Appearance Model Tracking for Still-to-Video Face Recognition», Pattern Recognition, vol 49, n° 1, 2016. (6.51 MB)
Conference Proceedings
D. Maiorca, Ariu, D., Corona, I., e Giacinto, G., «A Structural and Content-Based Approach for a Precise and Robust Detection of Malicious PDF Files», Proceedings of the 1st International Conference on Information Systems Security and Privacy (ICISSP 2015, 9-11th February 2015, Angers, France). pagg 27-36, 2015. (267.78 KB)
C. Gurrin, Schöffmann, K., Joho, H., Dang-Nguyen, D. - T., Riegler, M., e Piras, L., «Proceedings of the {ACM} Workshop on Lifelog Search Challenge, LSC@ICMR 2019, Ottawa, ON, Canada, 10 June 2019». ACM, 2019.
C. Gurrin, Schoeffmann, K., Joho, H., Dang-Nguyen, D. - T., Riegler, M., e Piras, L., «Proceedings of the 2018 {ACM} Workshop on The Lifelog Search Challenge, LSC@ICMR 2018, Yokohama, Japan, June 11, 2018». {ACM}, 2018.
D. Ugarte, Maiorca, D., Cara, F., e Giacinto, G., «PowerDrive: Accurate De-Obfuscation and Analysis of PowerShell Malware», 16th Conference on Detection of Intrusions and Malware & Vulnerability Assessment (DIMVA). Springer, Gothenburg, Sweden, pagg 240-259, 2019. (352.39 KB)
M. Contini, Corona, I., Mulas, A., Giacinto, G., e Ariu, D., «Pharmaguard WebApp: an application for the detection of illegal online pharmacies», 2nd International Workshop on Knowledge Discovery on the WEB (KDWEB). Cagliari, 2016. (120.57 KB)