Publications

Export 15 results:
Filters: First Letter Of Last Name is J  [Clear All Filters]
A B C D E F G H I J K L M N O P Q R S T U V W X Y Z 
A
G. L. Marcialis, Fumera, G., e Biggio, B., «Anti-spoofing: Multimodal», in Encyclopedia of Biometrics, S. Z. Li e Jain, A. K. Springer US, 2014, pagg 1-4.
B
B. Biggio, Fumera, G., e Roli, F., «Bayesian Linear Combination of Neural Networks», in Innovations in Neural Information Paradigms and Applications, vol 247, M. Bianchini, Maggini, M., Scarselli, F., e Jain, L. C. Springer Berlin / Heidelberg, 2009, pagg 201-230. (435.32 KB)
F
G. L. Marcialis e Roli, F., «Fingerprint verification by decision-level fusion of optical and capacitive sensors», in International Workshop on Biometric Authentication (BioAW04), Prague (Czech Republic), 2004, vol 3087, pagg 307-317.
G. L. Marcialis e Roli, F., «Fusion of PCA and LDA for Face Verification», in Post-ECCV Workshop on Biometric Authentication (BIOMET02), Copenhagen (Denmark), 2002, vol 2359, pagg 30-37.
T
P. Temple, Acher, M., Perrouin, G., Biggio, B., Jezequel, J. - M., e Roli, F., «Towards Quality Assurance of Software Product Lines with Adversarial Configurations», in Proceedings of the 23rd International Systems and Software Product Line Conference - Volume A, New York, NY, USA, 2019, pagg 277–288. (2.09 MB)
W
D. M. Freeman, Jain, S., Duermuth, M., Biggio, B., e Giacinto, G., «Who Are You? A Statistical Approach to Measuring User Authenticity», in Proc. 23rd Annual Network & Distributed System Security Symposium (NDSS), 2016. (764.14 KB)
A. Demontis, Melis, M., Pintor, M., Jagielski, M., Biggio, B., Oprea, A., Nita-Rotaru, C., e Roli, F., «Why Do Adversarial Attacks Transfer? Explaining Transferability of Evasion and Poisoning Attacks», in 28th Usenix Security Symposium, Santa Clara, California, USA, 2019, vol 28th {USENIX} Security Symposium ({USENIX} Security 19), pag 321--338. (1.09 MB)