Publications

Export 426 results:
A B C D E F G H I J K L M N O P Q R S T U V W X Y Z 
B
B. Biggio, Fumera, G., Pillai, I., and Roli, F., A survey and experimental evaluation of image spam filtering techniques, Pattern Recognition Letters, vol. 32, pp. 1436 - 1446, 2011. (2.12 MB)
B. Biggio, Melis, M., Fumera, G., and Roli, F., Sparse Support Faces, in Int'l Conf. on Biometrics (ICB), 2015, pp. 208-213. (702.84 KB)
B. Biggio, Nelson, B., and Laskov, P., Poisoning attacks against support vector machines, in 29th Int'l Conf. on Machine Learning (ICML), 2012, pp. 1807–1814. (452.94 KB)
B. Biggio, Akhtar, Z., Fumera, G., Marcialis, G. L., and Roli, F., Robustness of multi-modal biometric verification systems under realistic spoofing attacks, in Int’l Joint Conference on Biometrics (IJCB), Washington DC, USA, 2011. (2.25 MB)
B. Biggio, Fumera, G., and Roli, F., Adversarial Pattern Classification Using Multiple Classifiers and Randomisation, in 12th Joint IAPR International Workshop on Structural and Syntactic Pattern Recognition (SSPR 2008), Orlando, Florida, USA, 2008. (395.38 KB)
B. Biggio, Didaci, L., Fumera, G., and Roli, F., Poisoning attacks to compromise face templates, in 6th IAPR Int'l Conf. on Biometrics (ICB), Madrid, Spain, 2013. (844.61 KB)
B. Biggio, Machine Learning under Attack: Vulnerability Exploitation and Security Measures (Invited Keynote at IH&MMSec '16), in 4th ACM Workshop on Information Hiding & Multimedia Security, Vigo, Spain, 2016, pp. 1-2. (138.98 KB)
B. Biggio, Rieck, K., Ariu, D., Wressnegger, C., Corona, I., Giacinto, G., and Roli, F., Poisoning Behavioral Malware Clustering, in AISec'14: Proceedings of the 2014 ACM Workshop on Artificial Intelligence and Security, co-located with CCS '14, Scottsdale, Arizona, USA, 2014, pp. 27-36. (375.58 KB)
B. Biggio, Fumera, G., and Roli, F., Multiple Classifier Systems for Adversarial Classification Tasks, in 8th Int. Workshop on Multiple Classifier Systems (MCS 2009), Reykjavik, Iceland, 2009, vol. 5519, pp. 132-141. (459.88 KB)
B. Biggio, Nelson, B., and Laskov, P., Support Vector Machines Under Adversarial Label Noise, in Journal of Machine Learning Research - Proc. 3rd Asian Conference on Machine Learning (ACML 2011), Taoyuan, Taiwan, 2011, vol. 20, pp. 97-112. (533.74 KB)
B. Biggio, Fumera, G., and Roli, F., Learning Sparse Kernel Machines with Biometric Similarity Functions for Identity Recognition, in IEEE 5th International Conference on Biometrics: Theory, Applications and Systems (BTAS 2012), Washington DC (USA), 2012, pp. 325 -330. (336.11 KB)
B. Biggio, Fumera, G., Pillai, I., and Roli, F., Image Spam Filtering by Content Obscuring Detection, in Fourth Conference on Email and Anti-Spam (CEAS 2007), Microsoft Research Silicon Valley, Mountain View, California, 2007. (486.14 KB)
B. Biggio and Roli, F., Wild Patterns: Ten Years After the Rise of Adversarial Machine Learning, Pattern Recognition, vol. 84, pp. 317-331, 2018. (3.76 MB)
B. Biggio, Fumera, G., and Roli, F., Security evaluation of pattern classifiers under attack, IEEE Transactions on Knowledge and Data Engineering, vol. 26, no. 4, pp. 984-996, 2014. (1.35 MB)
B. Biggio, Akhtar, Z., Fumera, G., Marcialis, G. L., and Roli, F., Security evaluation of biometric authentication systems under real spoofing attacks, IET Biometrics, vol. 1, no. 1, pp. 11-24, 2012. (3.21 MB)
B. Biggio, Pillai, I., Rota Bulò, S., Ariu, D., Pelillo, M., and Roli, F., Is Data Clustering in Adversarial Settings Secure?, in AISec'13: Proceedings of the 2013 ACM Workshop on Artificial Intelligence and Security, Berlin, 2013, pp. 87-98. (300.52 KB)
L. Bruzzone, Conese, C., Maselli, F., and Roli, F., Multisource classification of complex rural areas by statistical and neural-network approaches, Int. Journal on Photogrammetric Engineering and Remote Sensing (PE&RS), vol. 63, pp. 523-533, 1997.
L. Bruzzone, Roli, F., and Serpico, S. B., An extension of the Jeffreys-Matusita distance to multiclass cases for feature selection, IEEE Transactions on Geoscience and Remote Sensing, vol. 33, pp. 1318-1321, 1995.
C
A. Carcangiu, Spano, L. Davide, Fumera, G., and Roli, F., DEICTIC: a Compositional and Declarative Gesture Description based on Hidden Markov Model, International Journal of Human-Computer Studies, In Press.
M. Mohan Chakka, Anjos, A., Marcel, S., Tronci, R., Muntoni, D., Fadda, G., Pili, M., Sirena, N., Murgia, G., Ristori, M., and Roli, F., Competition on Counter Measures to 2-D Facial Spoofing Attacks, in International Joint Conference on Biometrics (IJCB 2011), 2011.
P. Coli, Vitality detection in personal authentication systems using fingerprints, Cagliari (Italy), 2008.
P. Coli, Marcialis, G. L., and Roli, F., Analysis and selection of features for the fingerprint vitality detection, in Joint IAPR Int. Workshop. on Structural and Syntactical Pattern Recognition and Statistical Techniques in Pattern Recognition S+SSPR06, 2006, vol. 4109, pp. 907-915.
P. Coli, Marcialis, G. L., and Roli, F., Fingerprint silicon replicas: static and dynamic features for vitality detection using an optical capture device, International Journal of Image and Graphics, vol. 8, pp. 495-512, 2008.
P. Coli, Marcialis, G. L., and Roli, F., Vitality detection from fingerprint images: a critical survey, in 2nd International Conference on Biometrics ICB 2007, Seoul (South Korea), 2007, vol. 4642, pp. 722-731.
P. Coli, Marcialis, G. L., and Roli, F., Power spectrum-based fingerprint vitality detection, in IEEE Workshop on Automatic Identification Advanced Technologies AutoID 2007, 2007, pp. 169-173.

Pages