Publications

Export 484 results:
2014
B. Biggio, Fumera, G., and Roli, F., Pattern Recognition Systems under Attack: Design Issues and Research Challenges, Int'l J. Patt. Recogn. Artif. Intell., vol. 28, no. 7, p. 1460002, 2014. (1.41 MB)
R. Satta, Pala, F., Fumera, G., and Roli, F., People search with textual queries about clothing appearance attributes, in Person Re‐Identification, Advances in Computer Vision and Pattern Recognition, S. Gong, Cristani, M., Yan, S., and Loy, C. Change Springer, 2014. (1.07 MB)
B. Biggio, Rieck, K., Ariu, D., Wressnegger, C., Corona, I., Giacinto, G., and Roli, F., Poisoning Behavioral Malware Clustering, in AISec'14: Proceedings of the 2014 ACM Workshop on Artificial Intelligence and Security, co-located with CCS '14, Scottsdale, Arizona, USA, 2014, pp. 27-36. (375.58 KB)
B. Biggio, Rota Bulò, S., Pillai, I., Mura, M., Zemene Mequanint, E., Pelillo, M., and Roli, F., Poisoning complete-linkage hierarchical clustering, in Joint IAPR Int'l Workshop on Structural, Syntactic, and Statistical Pattern Recognition (LNCS), Joensuu, Finland, 2014, vol. 8621, pp. 42-52. (388.31 KB)
I. Sanchez, Satta, R., Nai-Fovino, I., Baldini, G., Steri, G., Shaw, D., and Ciardulli, A., Privacy leakages in Smart Home Wireless Technologies, in 2014 IEEE International Carnahan Conference on Security Technology, Rome, Italy, 2014. (329.97 KB)
D. - T. Dang-Nguyen, Piras, L., Giacinto, G., Boato, G., and De Natale, F. G. B., Retrieval of Diverse Images by Pre-filtering and Hierarchical Clustering, in MediaEval (Online Working Notes), Barcelona; Spain, 2014, vol. 1263. (221.52 KB)
B. Biggio, Fumera, G., and Roli, F., Security evaluation of pattern classifiers under attack, IEEE Transactions on Knowledge and Data Engineering, vol. 26, no. 4, pp. 984-996, 2014. (1.35 MB)
B. Biggio, Corona, I., Nelson, B., Rubinstein, B. I. P., Maiorca, D., Fumera, G., Giacinto, G., and Roli, F., Security Evaluation of Support Vector Machines in Adversarial Environments, in Support Vector Machines Applications, Y. Ma and Guo, G. Springer International Publishing, 2014, pp. 105-153. (687.1 KB)
R. Wong, Poh, N., and Marcialis, G. L., Toward an attack-sensitive tamper-resistant biometric recognition with a symmetric matcher: A fingerprint case study, in IEEE Symposium on Computational Intelligence in Biometrics and Identity Management (CIBIM), Dec., 9-11, 2014, Orlando (Florida), 2014, pp. 175-180. (1.32 MB)
R. Satta and Stirparo, P., On the usage of Sensor Pattern Noise for Picture-to-Identity linking through social network accounts, in 9th International Conference on Computer Vision Theory and Applications (VISAPP 2014), Lisbon, Portugal, 2014. (340.78 KB)
2013
I. Corona, Giacinto, G., and Roli, F., Adversarial Attacks against Intrusion Detection Systems: Taxonomy, Solutions and Open Issues, Information Sciences, vol. 239, 2013. (1.49 MB)
R. Satta, Appearance Descriptors for Person Re-identification: a Comprehensive Review. 2013. (3.44 MB)
A. Rattani, Marcialis, G. L., and Roli, F., Biometric System Adaptation by Self-update and Graph-based techniques, Journal of Visual Languages and Computing, Elsevier, 2013.
Y. Guan, Wei, X., Li, C. - T., Marcialis, G. L., Roli, F., and Tistarelli, M., Combining Gait and Face for Tackling the Elapsed Time Challenges, in IEEE 6th International Conference on Biometrics: Theory, Applications, and Systems (BTAS 2013), Washington DC (USA), 2013, pp. 1-8. (663.7 KB)
M. A. A. Dewan, Granger, E., Sabourin, R., Roli, F., and Marcialis, G. L., A comparison of adaptive appearance methods for tracking faces in video surveillance, in 5th International Conference on Imaging for Crime Detection and Prevention (ICDP-13), 2013.
B. Biggio, Pillai, I., Rota Bulò, S., Ariu, D., Pelillo, M., and Roli, F., Is Data Clustering in Adversarial Settings Secure?, in AISec'13: Proceedings of the 2013 ACM Workshop on Artificial Intelligence and Security, Berlin, 2013, pp. 87-98. (300.52 KB)
R. Satta, Dissimilarity-based people re-identification and search for intelligent video surveillance, University of Cagliari, Cagliari (Italy), 2013. (7.08 MB)
L. Didaci, Fumera, G., and Roli, F., Diversity in classifier ensembles: fertile concept or dead end?, in 11th Int. Workshop on Multiple Classifier Systems, Nanjing, China, 2013, vol. 7872. (241.27 KB) (163.54 KB)
L. Piras, Tronci, R., and Giacinto, G., Diversity in ensembles of codebooks for visual concept detection, in 17th Int. Conference on Image Analysis and Processing (ICIAP), Naples, Italy, 2013. (303.73 KB)
G. L. Marcialis, Didaci, L., and Roli, F., Estimating the serial combination's performance from that of individual base classifiers, in IAPR 17th Int. Conf. on Image Analysis and Processing (ICIAP 2013), 2013, vol. Springer LNCS 8156, pp. 622-631. (210.77 KB)
B. Biggio, Corona, I., Maiorca, D., Nelson, B., Srndic, N., Laskov, P., Giacinto, G., and Roli, F., Evasion attacks against machine learning at test time, in European Conference on Machine Learning and Principles and Practice of Knowledge Discovery in Databases (ECML PKDD), 2013, vol. 8190, pp. 387-402. (473.78 KB)
G. Fadda, Marcialis, G. L., Roli, F., and Ghiani, L., Exploiting the Golden Ratio on Human Faces for Head-Pose Estimation, in IAPR 17th Int. Conf. on Image Analysis and Processing (ICIAP 2013), Napoli (Italy), 2013, vol. Springer LNCS 8156, pp. 280-289. (546.25 KB)
L. Ghiani, Hadid, A., Marcialis, G. L., and Roli, F., Fingerprint liveness detection using Binarized Statistical Image Features, in IEEE 6th International Conference on Biometrics: Theory, Applications, and Systems, (BTAS 2013), Washington DC (USA), 2013. (615.3 KB)
R. Tronci, Murgia, G., Pili, M., Piras, L., and Giacinto, G., ImageHunter: a Novel Tool for Relevance Feedback in Content Based Image Retrieval, in New Challenges in Distributed Information Filtering and Retrieval. DART 2011: Revised and Invited Papers, C. Lai, Semeraro, G., and Vargiu, E. Springer, 2013. (1.98 MB)
L. Putzu and Di Ruberto, C., Investigation of different classification models to determine the presence of leukemia in peripheral blood image, in Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), 2013, vol. 8156 LNCS, pp. 612 – 621.

Pages