I. Pillai, Fumera, G., and Roli, F.,
“F -Measure Optimisation in Multi-label Classifiers”, in
22nd IEEE International Conference on Pattern Recognition, ICPR 2014, Stockholm, Sweden, 2014, pp. 3452 - 3456.
(287.72 KB) B. Biggio,
“On Learning and Recognition of Secure Patterns (Invited keynote at AISec '14)”, in
AISec'14: Proceedings of the 2014 ACM Workshop on Artificial Intelligence and Security, co-located with CCS '14, Scottsdale, Arizona, USA, 2014, pp. 1-2.
(110.67 KB) I. Corona, Maiorca, D., Ariu, D., and Giacinto, G.,
“Lux0R: Detection of Malicious PDF-embedded JavaScript code through Discriminant Analysis of API References”, in
AISec'14: Proceedings of the 2014 ACM Workshop on Artificial Intelligence and Security, co-located with CCS '14, Scottdale, Arizona, USA, 2014.
(455.14 KB) G. Fumera, Marcialis, G. L., Biggio, B., Roli, F., and Schuckers, S. C.,
“Multimodal Anti-Spoofing in Biometric Recognition Systems”, in
Handbook of Biometric Anti-Spoofing,
S. Marcel, Nixon, M., and Li, S. Z. Springer, 2014, pp. 165-184.
(155.83 KB) L. Piras and Giacinto, G.,
“Open issues on codebook generation in Image Classification tasks”, in
10th International Conference Machine Learning and Data Mining (MLDM), St. Petersburg, Russia, 2014, pp. 328-342.
(229.92 KB) B. Biggio, Fumera, G., and Roli, F.,
“Pattern Recognition Systems under Attack: Design Issues and Research Challenges”,
Int'l J. Patt. Recogn. Artif. Intell., vol. 28, no. 7, p. 1460002, 2014.
(1.41 MB) B. Biggio, Rieck, K., Ariu, D., Wressnegger, C., Corona, I., Giacinto, G., and Roli, F.,
“Poisoning Behavioral Malware Clustering”, in
AISec'14: Proceedings of the 2014 ACM Workshop on Artificial Intelligence and Security, co-located with CCS '14, Scottsdale, Arizona, USA, 2014, pp. 27-36.
(375.58 KB) B. Biggio, Rota Bulò, S., Pillai, I., Mura, M., Zemene Mequanint, E., Pelillo, M., and Roli, F.,
“Poisoning complete-linkage hierarchical clustering”, in
Joint IAPR Int'l Workshop on Structural, Syntactic, and Statistical Pattern Recognition (LNCS), Joensuu, Finland, 2014, vol. 8621, pp. 42-52.
(388.31 KB) D. - T. Dang-Nguyen, Piras, L., Giacinto, G., Boato, G., and De Natale, F. G. B.,
“Retrieval of Diverse Images by Pre-filtering and Hierarchical Clustering”, in
MediaEval (Online Working Notes), Barcelona; Spain, 2014, vol. 1263.
(221.52 KB) B. Biggio, Fumera, G., and Roli, F.,
“Security evaluation of pattern classifiers under attack”,
IEEE Transactions on Knowledge and Data Engineering, vol. 26, no. 4, pp. 984-996, 2014.
(1.35 MB) B. Biggio, Corona, I., Nelson, B., Rubinstein, B. I. P., Maiorca, D., Fumera, G., Giacinto, G., and Roli, F.,
“Security Evaluation of Support Vector Machines in Adversarial Environments”, in
Support Vector Machines Applications,
Y. Ma and Guo, G. Springer International Publishing, 2014, pp. 105-153.
(687.1 KB) R. Wong, Poh, N., and Marcialis, G. L.,
“Toward an attack-sensitive tamper-resistant biometric recognition with a symmetric matcher: A fingerprint case study”, in
IEEE Symposium on Computational Intelligence in Biometrics and Identity Management (CIBIM), Dec., 9-11, 2014, Orlando (Florida), 2014, pp. 175-180.
(1.32 MB) R. Satta and Stirparo, P.,
“On the usage of Sensor Pattern Noise for Picture-to-Identity linking through social network accounts”, in
9th International Conference on Computer Vision Theory and Applications (VISAPP 2014), Lisbon, Portugal, 2014.
(340.78 KB)