Export 420 results:
Journal Article
B. Biggio and Roli, F., Wild Patterns: Ten Years After the Rise of Adversarial Machine Learning, Pattern Recognition, vol. 84, pp. 317-331, 2018. (3.76 MB)
M. Ahmed, Didaci, L., Fumera, G., Roli, F., and Lavi, B., Using Diversity for Classifier Ensemble Pruning: An Empirical Investigation, Theoretical and Applied Informatics, In Press.
D. Maiorca, Biggio, B., and Giacinto, G., Towards Adversarial Malware Detection: Lessons Learned from PDF-based Attacks, ACM Computing Surveys, In Press. (1.21 MB)
I. Pillai, Fumera, G., and Roli, F., Threshold optimisation for multi-label classifiers, Pattern Recognition, vol. 46, no. 7, 2013. (445.97 KB)
J. Galbally and Satta, R., Three-dimensional and two-and-a-half- dimensional face recognition spoofing using three-dimensional printed models, IET Biometrics, vol. 5, no. 2, 2016. (1.33 MB)
G. Fumera and Roli, F., A Theoretical and Experimental Analysis of Linear Combiners for Multiple Classifier Systems, IEEE Transactions on Pattern Analysis and Machine Intelligence, vol. 27, pp. 942-956, 2005. (887.92 KB)
G. Fumera, Roli, F., and Serrau, A., A Theoretical Analysis of Bagging as a Linear Combination of Classifiers, IEEE Transactions on Pattern Analysis and Machine Intelligence, vol. 30, pp. 1293-1299, 2008. (895.49 KB)
A. Fanni, Giacinto, G., Marchesi, M., and Serri, A., Tabu search coupled with deterministic strategies for the optimal design of MRI devices, Int. J. of Applied Electromagnetics and Mechanics, vol. 10, pp. 21-31, 1999.
E. Costamagna, Fanni, A., and Giacinto, G., A Tabu Search algorithm for the optimisation of telecommunication networks, European Journal of Operational Research, vol. 106, pp. 357-372, 1998.
L. Piras and Giacinto, G., Synthetic Pattern Generation for Imbalanced Learning in Image Retrieval, Pattern Recognition Letters, vol. 33, p. 7, 2012. (236.64 KB)
B. Biggio, Fumera, G., Pillai, I., and Roli, F., A survey and experimental evaluation of image spam filtering techniques, Pattern Recognition Letters, vol. 32, pp. 1436 - 1446, 2011. (2.12 MB)
H. Xiao, Biggio, B., Nelson, B., Xiao, H., Eckert, C., and Roli, F., Support Vector Machines under Adversarial Label Contamination, Neurocomputing, Special Issue on Advances in Learning with Label Noise, vol. 160, pp. 53-62, 2015. (2.8 MB)
P. Pellegretti, Roli, F., Serpico, S. B., and Vernazza, G., Supervised learning of descriptions for image recognition purposes, IEEE Transactions on Pattern Analysis and Machine Intelligence, vol. 16, pp. 92-98, 1994.
A. Demontis, Melis, M., Biggio, B., Fumera, G., and Roli, F., Super-sparse Learning in Similarity Spaces, IEEE Computational Intelligence Magazine, vol. 11, no. 4, pp. 36-45, 2016. (555.22 KB)
L. Didaci, Giacinto, G., Roli, F., and Marcialis, G. L., A study on the performances of Dynamic Classifier Selection based on Local Accuracy Estimation, Pattern Recognition, vol. 38, pp. 2188-2191, 2005.
D. Maiorca, Ariu, D., Corona, I., Aresu, M., and Giacinto, G., Stealth Attacks: An Extended Insight into the Obfuscation Effects on Android Malware, Computers And Security (Elsevier), vol. 51 (June), pp. 16-31, 2015. (413.99 KB)
B. Biggio, Fumera, G., Marcialis, G. L., and Roli, F., Statistical Meta-Analysis of Presentation Attacks for Secure Multibiometric Systems, IEEE Transactions on Pattern Analysis and Machine Intelligence, vol. 39, no. 3, pp. 561-575, 2017. (5.7 MB)
G. Fumera, Pillai, I., and Roli, F., Spam filtering based on the analysis of text information embedded into images, Journal of Machine Learning Research (special issue on Machine Learning in Computer Security), vol. 7, pp. 2699-2720, 2006.
R. Satta and Ciardulli, A., Sensor pattern noise and image similarity for picture-to-identity linking, IET Computer Vision, vol. 6, no. 5, 2015. (1.55 MB)
G. Giacinto, Roli, F., and Fumera, G., Selection of image classifiers, Electronics Letters, vol. 36, pp. 420-422, 2000.
B. Biggio, Fumera, G., and Roli, F., Security evaluation of pattern classifiers under attack, IEEE Transactions on Knowledge and Data Engineering, vol. 26, no. 4, pp. 984-996, 2014. (1.35 MB)
B. Biggio, Akhtar, Z., Fumera, G., Marcialis, G. L., and Roli, F., Security evaluation of biometric authentication systems under real spoofing attacks, IET Biometrics, vol. 1, no. 1, pp. 11-24, 2012. (3.21 MB)
R. Perdisci, Ariu, D., and Giacinto, G., Scalable Fine-Grained Behavioral Clustering of HTTP-Based Malware, Computer Networks - Special Issue on Botnet Activity: Analysis, Detection and Shutdown, vol. 57, pp. 487-500, 2013. (797.8 KB)
L. Ghiani, Yambay, D. A., Mura, V., Marcialis, G. L., Roli, F., and Schuckers, S. A., Review of the Fingerprint Liveness Detection (LivDet) competition series: 2009 to 2015, Image and Vision Computing, p. -, 2016.
G. Fumera, Roli, F., and Giacinto, G., Reject Option with Multiple Thresholds, Pattern Recognition, vol. 33, pp. 2099-2101, 2000.