Publications

Export 15 results:
Filters: First Letter Of Last Name is J  [Clear All Filters]
Book Chapter
G. L. Marcialis, Fumera, G., e Biggio, B., «Anti-spoofing: Multimodal», in Encyclopedia of Biometrics, S. Z. Li e Jain, A. K. Springer US, 2014, pagg 1-4.
B. Biggio, Fumera, G., e Roli, F., «Bayesian Linear Combination of Neural Networks», in Innovations in Neural Information Paradigms and Applications, vol 247, M. Bianchini, Maggini, M., Scarselli, F., e Jain, L. C. Springer Berlin / Heidelberg, 2009, pagg 201-230. (435.32 KB)
Conference Paper
G. L. Marcialis e Roli, F., «Fingerprint verification by decision-level fusion of optical and capacitive sensors», in International Workshop on Biometric Authentication (BioAW04), Prague (Czech Republic), 2004, vol 3087, pagg 307-317.
G. L. Marcialis e Roli, F., «Fusion of PCA and LDA for Face Verification», in Post-ECCV Workshop on Biometric Authentication (BIOMET02), Copenhagen (Denmark), 2002, vol 2359, pagg 30-37.
M. Jagielski, Oprea, A., Biggio, B., Liu, C., Nita-Rotaru, C., e Li, B., «Manipulating Machine Learning: Poisoning Attacks and Countermeasures for Regression Learning», in 39th IEEE Symposium on Security and Privacy, 2018. (1.02 MB)
C. Ruiz, Arroyo, S., Krsteski, I., Dago, P., Sanchez, J., Perez-Freire, L., De Rosa, A., Fontani, M., Costanzo, A., Piva, A., Ariu, D., Piras, L., Ahumada, R., e Jerian, M., «The maven project: Management and Authenticity Verification of multimedia contents», in Multimedia Expo Workshops (ICMEW), 2015 IEEE International Conference on, 2015, pagg 1-4. (194.87 KB)
P. Temple, Acher, M., Perrouin, G., Biggio, B., Jezequel, J. - M., e Roli, F., «Towards Quality Assurance of Software Product Lines with Adversarial Configurations», in Proceedings of the 23rd International Systems and Software Product Line Conference - Volume A, New York, NY, USA, 2019, pagg 277–288. (2.09 MB)
D. M. Freeman, Jain, S., Duermuth, M., Biggio, B., e Giacinto, G., «Who Are You? A Statistical Approach to Measuring User Authenticity», in Proc. 23rd Annual Network & Distributed System Security Symposium (NDSS), 2016. (764.14 KB)
A. Demontis, Melis, M., Pintor, M., Jagielski, M., Biggio, B., Oprea, A., Nita-Rotaru, C., e Roli, F., «Why Do Adversarial Attacks Transfer? Explaining Transferability of Evasion and Poisoning Attacks», in 28th Usenix Security Symposium, Santa Clara, California, USA, 2019, vol 28th {USENIX} Security Symposium ({USENIX} Security 19), pag 321--338. (1.09 MB)