Export 434 results:
Journal Article
A. Fanni, Giacinto, G., Marchesi, M., and Serri, A., Tabu search coupled with deterministic strategies for the optimal design of MRI devices, Int. J. of Applied Electromagnetics and Mechanics, vol. 10, pp. 21-31, 1999.
G. Fumera, Roli, F., and Serrau, A., A Theoretical Analysis of Bagging as a Linear Combination of Classifiers, IEEE Transactions on Pattern Analysis and Machine Intelligence, vol. 30, pp. 1293-1299, 2008. (895.49 KB)
G. Fumera and Roli, F., A Theoretical and Experimental Analysis of Linear Combiners for Multiple Classifier Systems, IEEE Transactions on Pattern Analysis and Machine Intelligence, vol. 27, pp. 942-956, 2005. (887.92 KB)
J. Galbally and Satta, R., Three-dimensional and two-and-a-half- dimensional face recognition spoofing using three-dimensional printed models, IET Biometrics, vol. 5, no. 2, 2016. (1.33 MB)
I. Pillai, Fumera, G., and Roli, F., Threshold optimisation for multi-label classifiers, Pattern Recognition, vol. 46, no. 7, 2013. (445.97 KB)
D. Maiorca, Biggio, B., and Giacinto, G., Towards Adversarial Malware Detection: Lessons Learned from PDF-based Attacks, ACM Computing Surveys, vol. 52, no. 4, 2019. (1.21 MB)
M. Ahmed, Didaci, L., Fumera, G., Roli, F., and Lavi, B., Using Diversity for Classifier Ensemble Pruning: An Empirical Investigation, Theoretical and Applied Informatics, In Press.
B. Biggio and Roli, F., Wild Patterns: Ten Years After the Rise of Adversarial Machine Learning, Pattern Recognition, vol. 84, pp. 317-331, 2018. (3.76 MB)
A. Demontis, Melis, M., Biggio, B., Maiorca, D., Arp, D., Rieck, K., Corona, I., Giacinto, G., and Roli, F., Yes, Machine Learning Can Be More Secure! A Case Study on Android Malware Detection, IEEE Trans. Dependable and Secure Computing, vol. 16, no. 4, pp. 711-724, 2019. (3.61 MB)
Magazine Article
B. Biggio, Fumera, G., Pillai, I., Roli, F., and Satta, R., Evading SpamAssassin with obfuscated text images, Virus Bulletin, no. 11-2007, 2007. (689 KB)
J. Hoffmann, Rytilahti, T., Maiorca, D., Winandy, M., Giacinto, G., and Holz, T., Evaluating Analysis Tools for Android Apps: Status Quo and Robustness Against Obfuscation, Horst Görtz Institut for IT Security (Ruhr-University Bochum), Technical Report TR-HGI-2016-003, 2016. (519.16 KB)