Publications

Export 434 results:
2018
B. Ionescu, Müller, H., Villegas, M., de Herrera, A. García Se, Eickhoff, C., Andrearczyk, V., Cid, Y. Dicente, Liauchuk, V., Kovalev, V., Hasan, S. A., Ling, Y., Farri, O., Liu, J., Lungren, M., Dang-Nguyen, D. - T., Piras, L., Riegler, M., Zhou, L., Lux, M., and Gurrin, C., Overview of ImageCLEF 2018: Challenges, Datasets and Evaluation, in Experimental {IR} Meets Multilinguality, Multimodality, and Interaction - 9th International Conference of the {CLEF} Association, {CLEF} 2018, Avignon, France, September 10-14, 2018, Proceedings, 2018, pp. 309–334.
D. - T. Dang-Nguyen, Piras, L., Riegler, M., Zhou, L., Lux, M., and Gurrin, C., Overview of ImageCLEFlifelog 2018: Daily Living Understanding and Lifelog Moment Retrieval, in Working Notes of {CLEF} 2018 - Conference and Labs of the Evaluation Forum, Avignon, France, September 10-14, 2018., 2018. (2.01 MB)
C. Gurrin, Schoeffmann, K., Joho, H., Dang-Nguyen, D. - T., Riegler, M., and Piras, L., Proceedings of the 2018 {ACM} Workshop on The Lifelog Search Challenge, LSC@ICMR 2018, Yokohama, Japan, June 11, 2018. {ACM}, 2018.
R. Soleymani, Granger, E., and Fumera, G., Progressive Boosting for Class Imbalance and Its Application to Face Re-Identification, Expert Systems With Applications, vol. 101, p. 21, 2018. (1.11 MB)
L. Putzu, Piras, L., and Giacinto, G., Ten years of Relevance Score for Content Based Image Retrieval, in 14th International Conference Machine Learning and Data Mining (MLDM), New York, 2018, vol. 10935.
B. Biggio and Roli, F., Wild Patterns: Ten Years After the Rise of Adversarial Machine Learning, Pattern Recognition, vol. 84, pp. 317-331, 2018. (3.76 MB)
2019
C. Gurrin, Schoeffmann, K., Joho, H., Leibetseder, A., Zhou, L., Duane, A., Dang-Nguyen, D. - T., Riegler, M., Piras, L., Tran, M. - T., Lokoč, J., and Hürst, W., Comparing Approaches to Interactive Lifelog Search at the Lifelog Search Challenge (LSC2018), ITE Transactions on Media Technology and Applications, vol. 7, pp. 46-59, 2019. (4.7 MB)
A. Carcangiu, Spano, L. Davide, Fumera, G., and Roli, F., DEICTIC: a Compositional and Declarative Gesture Description based on Hidden Markov Model, International Journal of Human-Computer Studies, vol. 122, p. 20, 2019. (1.69 MB)
F. Crecchi, Bacciu, D., and Biggio, B., Detecting Adversarial Examples through Nonlinear Dimensionality Reduction, in 27th European Symposium on Artificial Neural Networks, Computational Intelligence and Machine Learning - ESANN '19, 2019, pp. 483-488. (552.39 KB)
D. Maiorca and Biggio, B., Digital Investigation of PDF Files: Unveiling Traces of Embedded Malware, IEEE Security and Privacy: Special Issue on Digital Forensics, vol. 17, no. 1, pp. 63-71, 2019. (838.95 KB)
M. Scalas, Maiorca, D., Mercaldo, F., Visaggio, C. Aaron, Martinelli, F., and Giacinto, G., On the Effectiveness of System API-Related Information for Android Ransomware Detection, Computers and Security, vol. 86, pp. 162-182, 2019. (706.92 KB)
L. Demetrio, Biggio, B., Lagorio, G., Roli, F., and Armando, A., Explaining Vulnerabilities of Deep Learning to Adversarial Malware Binaries, in 3rd Italian Conference on Cyber Security, ITASEC 2019, Pisa, Italy, 2019, vol. 2315. (801.85 KB)
L. Piras, Caputo, B., Dang-Nguyen, D. - T., Riegler, M., and Halvorsen, P., Image Retrieval Evaluation in Specific Domains, in Information Retrieval Evaluation in a Changing World - Lessons Learned from 20 Years of CLEF, 2019, pp. 275–305. (202.36 KB)
B. Ionescu, Müller, H., Péteri, R., Dang-Nguyen, D. - T., Piras, L., Riegler, M., Tran, M. - T., Lux, M., Gurrin, C., Cid, Y. Dicente, Liauchuk, V., Kovalev, V., Ben Abacha, A., Hasan, S. A., Datla, V. V., Liu, J., Demner-Fushman, D., Pelka, O., Friedrich, C. M., Chamberlain, J., Clark, A., de Herrera, A. García Se, García, N., Kavallieratou, E., del-Blanco, C. Roberto, Cuevas, C., Vasilopoulos, N., and Karampidis, K., ImageCLEF 2019: Multimedia Retrieval in Lifelogging, Medical, Nature, and Security Applications, in Advances in Information Retrieval - 41st European Conference on IR Research, ECIR 2019, Cologne, Germany, April 14-18, 2019, Proceedings, Part {II}, 2019, pp. 301–308.
B. Ionescu, Müller, H., Péteri, R., Cid, Y. Dicente, Liauchuk, V., Kovalev, V., Klimuk, D., Tarasau, A., Ben Abacha, A., Hasan, S. A., Datla, V. V., Liu, J., Demner-Fushman, D., Dang-Nguyen, D. - T., Piras, L., Riegler, M., Tran, M. - T., Lux, M., Gurrin, C., Pelka, O., Friedrich, C. M., de Herrera, A. García Se, García, N., Kavallieratou, E., del-Blanco, C. Roberto, Cuevas, C., Vasilopoulos, N., Karampidis, K., Chamberlain, J., Clark, A., and Campello, A., ImageCLEF 2019: Multimedia Retrieval in Medicine, Lifelogging, Security and Nature, in Experimental IR Meets Multilinguality, Multimodality, and Interaction - 10th International Conference of the CLEF Association, CLEF 2019, Lugano, Switzerland, September 9-12, 2019, Proceedings, 2019, pp. 358–386. (323.96 KB)
V. - T. Ninh, Le, T. - K., Zhou, L., Piras, L., Riegler, M., Lux, M., Tran, M. - T., Gurrin, C., and Dang-Nguyen, D. - T., LIFER 2.0: Discovering Personal Lifelog Insights using an Interactive Lifelog Retrieval System, in Working Notes of {CLEF} 2019 - Conference and Labs of the Evaluation Forum, Lugano, Switzerland, September 9-12, 2019., 2019. (1.56 MB)
D. - T. Dang-Nguyen, Piras, L., Riegler, M., Zhou, L., Lux, M., Tran, M. - T., Le, T. - K., Ninh, V. - T., and Gurrin, C., Overview of ImageCLEFlifelog 2019: Solve My Life Puzzle and Lifelog Moment Retrieval, in Working Notes of {CLEF} 2019 - Conference and Labs of the Evaluation Forum, Lugano, Switzerland, September 9-12, 2019., 2019. (4.58 MB)
R. Labaca-Castro, Biggio, B., and Rodosek, G. Dreo, Poster: Attacking Malware Classifiers by Crafting Gradient-Attacks That Preserve Functionality, in Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications Security, New York, NY, USA, 2019, pp. 2565–2567.
D. Ugarte, Maiorca, D., Cara, F., and Giacinto, G., PowerDrive: Accurate De-Obfuscation and Analysis of PowerShell Malware, 16th Conference on Detection of Intrusions and Malware & Vulnerability Assessment (DIMVA). Springer, Gothenburg, Sweden, pp. 240-259, 2019. (352.39 KB)
C. Gurrin, Schöffmann, K., Joho, H., Dang-Nguyen, D. - T., Riegler, M., and Piras, L., Proceedings of the {ACM} Workshop on Lifelog Search Challenge, LSC@ICMR 2019, Ottawa, ON, Canada, 10 June 2019. ACM, 2019.
M. Melis, Demontis, A., Pintor, M., Sotgiu, A., and Biggio, B., secml: A Python Library for Secure and Explainable Machine Learning. 2019. (1.1 MB)
D. Maiorca, Biggio, B., and Giacinto, G., Towards Adversarial Malware Detection: Lessons Learned from PDF-based Attacks, ACM Computing Surveys, vol. 52, no. 4, 2019. (1.21 MB)
P. Temple, Acher, M., Perrouin, G., Biggio, B., Jezequel, J. - M., and Roli, F., Towards Quality Assurance of Software Product Lines with Adversarial Configurations, in Proceedings of the 23rd International Systems and Software Product Line Conference - Volume A, New York, NY, USA, 2019, pp. 277–288. (2.09 MB)
A. Demontis, Melis, M., Pintor, M., Jagielski, M., Biggio, B., Oprea, A., Nita-Rotaru, C., and Roli, F., Why Do Adversarial Attacks Transfer? Explaining Transferability of Evasion and Poisoning Attacks, in 28th Usenix Security Symposium, Santa Clara, California, USA, 2019, vol. 28th {USENIX} Security Symposium ({USENIX} Security 19), p. 321--338. (1.09 MB)
A. Demontis, Melis, M., Biggio, B., Maiorca, D., Arp, D., Rieck, K., Corona, I., Giacinto, G., and Roli, F., Yes, Machine Learning Can Be More Secure! A Case Study on Android Malware Detection, IEEE Trans. Dependable and Secure Computing, vol. 16, no. 4, pp. 711-724, 2019. (3.61 MB)

Pages