Publications

Export 434 results:
A B C D E F G H I J K L M N O P Q R S T U V W X Y Z 
P
B. Biggio, Rieck, K., Ariu, D., Wressnegger, C., Corona, I., Giacinto, G., and Roli, F., Poisoning Behavioral Malware Clustering, in AISec'14: Proceedings of the 2014 ACM Workshop on Artificial Intelligence and Security, co-located with CCS '14, Scottsdale, Arizona, USA, 2014, pp. 27-36. (375.58 KB)
B. Biggio, Rota Bulò, S., Pillai, I., Mura, M., Zemene Mequanint, E., Pelillo, M., and Roli, F., Poisoning complete-linkage hierarchical clustering, in Joint IAPR Int'l Workshop on Structural, Syntactic, and Statistical Pattern Recognition (LNCS), Joensuu, Finland, 2014, vol. 8621, pp. 42-52. (388.31 KB)
R. Labaca-Castro, Biggio, B., and Rodosek, G. Dreo, Poster: Attacking Malware Classifiers by Crafting Gradient-Attacks That Preserve Functionality, in Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications Security, New York, NY, USA, 2019, pp. 2565–2567.
P. Coli, Marcialis, G. L., and Roli, F., Power spectrum-based fingerprint vitality detection, in IEEE Workshop on Automatic Identification Advanced Technologies AutoID 2007, 2007, pp. 169-173.
D. Ugarte, Maiorca, D., Cara, F., and Giacinto, G., PowerDrive: Accurate De-Obfuscation and Analysis of PowerShell Malware, 16th Conference on Detection of Intrusions and Malware & Vulnerability Assessment (DIMVA). Springer, Gothenburg, Sweden, pp. 240-259, 2019. (352.39 KB)
L. Piras, Tronci, R., Murgia, G., and Giacinto, G., The PRA and AmILAB at ImageCLEF 2012 Photo Flickr Annotation Task, in CLEF (Online Working Notes/Labs/Workshop), Rome, 2012. (540.05 KB)
I. Sanchez, Satta, R., Nai-Fovino, I., Baldini, G., Steri, G., Shaw, D., and Ciardulli, A., Privacy leakages in Smart Home Wireless Technologies, in 2014 IEEE International Carnahan Conference on Security Technology, Rome, Italy, 2014. (329.97 KB)
C. Gurrin, Schoeffmann, K., Joho, H., Dang-Nguyen, D. - T., Riegler, M., and Piras, L., Proceedings of the 2018 {ACM} Workshop on The Lifelog Search Challenge, LSC@ICMR 2018, Yokohama, Japan, June 11, 2018. {ACM}, 2018.
C. Gurrin, Schöffmann, K., Joho, H., Dang-Nguyen, D. - T., Riegler, M., and Piras, L., Proceedings of the {ACM} Workshop on Lifelog Search Challenge, LSC@ICMR 2019, Ottawa, ON, Canada, 10 June 2019. ACM, 2019.
G. B. Benciolini, Roli, F., and Wilkinson, G., Proceedings of the workshop "Il Telerilevamento ed i Sistemi Informativi Territoriali nella Gestione delle Risorse Ambientali". Trento, Italy: , 1994.
R. Soleymani, Granger, E., and Fumera, G., Progressive Boosting for Class Imbalance and Its Application to Face Re-Identification, Expert Systems With Applications, vol. 101, p. 21, 2018. (1.11 MB)
Q
G. Giacinto and Roli, F., Query Shifting Based on Bayesian Decision Theory for Content-Based Image Retrieval, in oint IAPR Int. Workshops on Syntactical and Structural Pattern Recognition and Statistical Pattern Recognition (S+SSPR 2002), 2002, vol. 2396, pp. 607-616.
R
S. Rota Bulò, Biggio, B., Pillai, I., Pelillo, M., and Roli, F., Randomized Prediction Games for Adversarial Machine Learning, IEEE Transactions on Neural Networks and Learning Systems, vol. 28, no. 11, pp. 2466-2478, 2017. (1.52 MB) (256.21 KB)
R. Satta, Pala, F., Fumera, G., and Roli, F., Real-time Appearance-based Person Re-identification over Multiple KinectTM Cameras, in 8th International Conference on Computer Vision Theory and Applications (VISAPP 2013), Barcelona, Spain, 2013. (974.71 KB)
Y. Guan, Li, C. - T., and Roli, F., On Reducing the Effect of Covariate Factors in Gait Recognition: a Classifier Ensemble Method, IEEE Transactions on Pattern Analysis and Machine Intelligence, In Press. (311.43 KB) (151.4 KB)
G. Fumera, Roli, F., and Giacinto, G., Reject Option with Multiple Thresholds, Pattern Recognition, vol. 33, pp. 2099-2101, 2000.
B. Freni, Marcialis, G. L., and Roli, F., Replacement algorithms for fingerprint template update, in 5th International Conference on Image Analysis and Recognition (ICIAR 2008), 2008, vol. 5112, pp. 884-893.
D. - T. Dang-Nguyen, Piras, L., Giacinto, G., Boato, G., and De Natale, F. G. B., Retrieval of Diverse Images by Pre-filtering and Hierarchical Clustering, in MediaEval (Online Working Notes), Barcelona; Spain, 2014, vol. 1263. (221.52 KB)
L. Ghiani, Yambay, D. A., Mura, V., Marcialis, G. L., Roli, F., and Schuckers, S. A., Review of the Fingerprint Liveness Detection (LivDet) competition series: 2009 to 2015, Image and Vision Computing, p. -, 2016.
Z. Akhtar, Fumera, G., Marcialis, G. L., and Roli, F., Robustness analysis of likelihood ratio score fusion rule for multi-modal biometric systems under spoof attacks, in 45th IEEE Int’l Carnahan Conference on Security Technology (ICCST) , Barcelona, Spain, 2011, pp. 237-244. (812.36 KB)
Z. Akhtar, Fumera, G., Marcialis, G. L., and Roli, F., Robustness Evaluation of Biometric Systems under Spoof Attacks, in 16th Int’l Conference on Image Analysis and Processing (ICIAP), Ravenna, Italy, 2011, pp. 159-168. (220.73 KB)
T. Hupperich, Maiorca, D., Kührer, M., Holz, T., and Giacinto, G., On the Robustness of Mobile Device Fingerprinting, in 31st Annual Computer Security and Applications Conference (ACSAC 2015), 7-10th December 2015, Los Angeles, USA, 2015, pp. 191-200. (301.87 KB)
Z. Akhtar, Biggio, B., Fumera, G., and Marcialis, G. L., Robustness of Multi-modal Biometric Systems under Realistic Spoof Attacks against All Traits, in IEEE Workshop on Biometric Measurements and Systems for Security and Medical Applications (BioMS), Milan, Italy, 2011, pp. 5-10. (954 KB)
B. Biggio, Akhtar, Z., Fumera, G., Marcialis, G. L., and Roli, F., Robustness of multi-modal biometric verification systems under realistic spoofing attacks, in Int’l Joint Conference on Biometrics (IJCB), Washington DC, USA, 2011. (2.25 MB)
D. Maiorca, Mercaldo, F., Giacinto, G., Visaggio, A., and Martinelli, F., R-PackDroid: API Package-Based Characterization and Detection of Mobile Ransomware, in ACM Symposium on Applied Computing (SAC 2017 - Acceptance Rate 15.7%), 2017, pp. 1718-1723. (272.44 KB)

Pages