Publications

Export 420 results:
Journal Article
G. Giacinto, Roli, F., and Fumera, G., Selection of image classifiers, Electronics Letters, vol. 36, pp. 420-422, 2000.
R. Satta and Ciardulli, A., Sensor pattern noise and image similarity for picture-to-identity linking, IET Computer Vision, vol. 6, no. 5, 2015. (1.55 MB)
G. Fumera, Pillai, I., and Roli, F., Spam filtering based on the analysis of text information embedded into images, Journal of Machine Learning Research (special issue on Machine Learning in Computer Security), vol. 7, pp. 2699-2720, 2006.
B. Biggio, Fumera, G., Marcialis, G. L., and Roli, F., Statistical Meta-Analysis of Presentation Attacks for Secure Multibiometric Systems, IEEE Transactions on Pattern Analysis and Machine Intelligence, vol. 39, no. 3, pp. 561-575, 2017. (5.7 MB)
D. Maiorca, Ariu, D., Corona, I., Aresu, M., and Giacinto, G., Stealth Attacks: An Extended Insight into the Obfuscation Effects on Android Malware, Computers And Security (Elsevier), vol. 51 (June), pp. 16-31, 2015. (413.99 KB)
L. Didaci, Giacinto, G., Roli, F., and Marcialis, G. L., A study on the performances of Dynamic Classifier Selection based on Local Accuracy Estimation, Pattern Recognition, vol. 38, pp. 2188-2191, 2005.
A. Demontis, Melis, M., Biggio, B., Fumera, G., and Roli, F., Super-sparse Learning in Similarity Spaces, IEEE Computational Intelligence Magazine, vol. 11, no. 4, pp. 36-45, 2016. (555.22 KB)
P. Pellegretti, Roli, F., Serpico, S. B., and Vernazza, G., Supervised learning of descriptions for image recognition purposes, IEEE Transactions on Pattern Analysis and Machine Intelligence, vol. 16, pp. 92-98, 1994.
H. Xiao, Biggio, B., Nelson, B., Xiao, H., Eckert, C., and Roli, F., Support Vector Machines under Adversarial Label Contamination, Neurocomputing, Special Issue on Advances in Learning with Label Noise, vol. 160, pp. 53-62, 2015. (2.8 MB)
B. Biggio, Fumera, G., Pillai, I., and Roli, F., A survey and experimental evaluation of image spam filtering techniques, Pattern Recognition Letters, vol. 32, pp. 1436 - 1446, 2011. (2.12 MB)
L. Piras and Giacinto, G., Synthetic Pattern Generation for Imbalanced Learning in Image Retrieval, Pattern Recognition Letters, vol. 33, p. 7, 2012. (236.64 KB)
E. Costamagna, Fanni, A., and Giacinto, G., A Tabu Search algorithm for the optimisation of telecommunication networks, European Journal of Operational Research, vol. 106, pp. 357-372, 1998.
A. Fanni, Giacinto, G., Marchesi, M., and Serri, A., Tabu search coupled with deterministic strategies for the optimal design of MRI devices, Int. J. of Applied Electromagnetics and Mechanics, vol. 10, pp. 21-31, 1999.
G. Fumera, Roli, F., and Serrau, A., A Theoretical Analysis of Bagging as a Linear Combination of Classifiers, IEEE Transactions on Pattern Analysis and Machine Intelligence, vol. 30, pp. 1293-1299, 2008. (895.49 KB)
G. Fumera and Roli, F., A Theoretical and Experimental Analysis of Linear Combiners for Multiple Classifier Systems, IEEE Transactions on Pattern Analysis and Machine Intelligence, vol. 27, pp. 942-956, 2005. (887.92 KB)
J. Galbally and Satta, R., Three-dimensional and two-and-a-half- dimensional face recognition spoofing using three-dimensional printed models, IET Biometrics, vol. 5, no. 2, 2016. (1.33 MB)
I. Pillai, Fumera, G., and Roli, F., Threshold optimisation for multi-label classifiers, Pattern Recognition, vol. 46, no. 7, 2013. (445.97 KB)
D. Maiorca, Biggio, B., and Giacinto, G., Towards Adversarial Malware Detection: Lessons Learned from PDF-based Attacks, ACM Computing Surveys, vol. 52, no. 4, 2019. (1.21 MB)
M. Ahmed, Didaci, L., Fumera, G., Roli, F., and Lavi, B., Using Diversity for Classifier Ensemble Pruning: An Empirical Investigation, Theoretical and Applied Informatics, In Press.
B. Biggio and Roli, F., Wild Patterns: Ten Years After the Rise of Adversarial Machine Learning, Pattern Recognition, vol. 84, pp. 317-331, 2018. (3.76 MB)
A. Demontis, Melis, M., Biggio, B., Maiorca, D., Arp, D., Rieck, K., Corona, I., Giacinto, G., and Roli, F., Yes, Machine Learning Can Be More Secure! A Case Study on Android Malware Detection, IEEE Trans. Dependable and Secure Computing, vol. 16, no. 4, pp. 711-724, 2019. (3.61 MB)
Magazine Article
B. Biggio, Fumera, G., Pillai, I., Roli, F., and Satta, R., Evading SpamAssassin with obfuscated text images, Virus Bulletin, no. 11-2007, 2007. (689 KB)

Pages