Publications

Export 420 results:
A B C D E F G H I J K L M N O P Q R S T U V W X Y Z 
M
G. Fumera, Roli, F., and Vernazza, G., A Method for Error Rejection in Multiple Classifier Systems, in 11th International Conference on Image Analysis and Processing (ICIAP 2001), 2001, pp. 454-458.
D. Ariu, Corona, I., Giacinto, G., and Roli, F., McPAD and HMMWeb: two different approaches for the detection of attacks against Web applications, in Italian Workshop on Privacy and Security (PRISE), Rome, 2008. (309.2 KB)
R. Perdisci, Ariu, D., Fogla, P., Giacinto, G., and Lee, W., McPAD: A Multiple Classifier System for Accurate Payload-based Anomaly Detection, Computer Networks, vol. 53, pp. 864-881, 2009. (882.94 KB)
C. Ruiz, Arroyo, S., Krsteski, I., Dago, P., Sanchez, J., Perez-Freire, L., De Rosa, A., Fontani, M., Costanzo, A., Piva, A., Ariu, D., Piras, L., Ahumada, R., and Jerian, M., The maven project: Management and Authenticity Verification of multimedia contents, in Multimedia Expo Workshops (ICMEW), 2015 IEEE International Conference on, 2015, pp. 1-4. (194.87 KB)
A. Gambardella, Giacinto, G., and Migliaccio, M., On the Mathematical Formulation of the SAR Oil-Spill Observation Problem, in IEEE International Geoscience and Remote Sensing Symposium, 2008. IGARSS 2008, 2008, vol. 3, p. III -1382-III -1385.
M. Jagielski, Oprea, A., Biggio, B., Liu, C., Nita-Rotaru, C., and Li, B., Manipulating Machine Learning: Poisoning Attacks and Countermeasures for Regression Learning, in 39th IEEE Symposium on Security and Privacy, 2018. (1.02 MB)
B. Biggio, Machine Learning under Attack: Vulnerability Exploitation and Security Measures (Invited Keynote at IH&MMSec '16), in 4th ACM Workshop on Information Hiding & Multimedia Security, Vigo, Spain, 2016, pp. 1-2. (138.98 KB)
D. Ariu, Corona, I., Tronci, R., and Giacinto, G., Machine Learning in Security Applications, in Machine Learning, Software Engineering and Standardization, P. Perner ibai-publishing, 2013.
D. Ariu, Giacinto, G., and Roli, F., Machine Learning in Computer Forensics (and the Lessons Learned from Machine Learning in Computer Security), in AISec 2011: 4th ACM Workshop on Artificial Intelligence and Security, Chicago, IL, USA, 2011. (379.05 KB)
L
I. Corona, Maiorca, D., Ariu, D., and Giacinto, G., Lux0R: Detection of Malicious PDF-embedded JavaScript code through Discriminant Analysis of API References, in AISec'14: Proceedings of the 2014 ACM Workshop on Artificial Intelligence and Security, co-located with CCS '14, Scottdale, Arizona, USA, 2014. (455.14 KB)
R. Soleymani, Granger, E., and Fumera, G., Loss Factors for Learning Boosting Ensembles from Imbalanced Data, in 23rd International Conference on Pattern Recognition (ICPR 2016), Cancún, Mexico, In Press.
D. Maiorca, Corona, I., and Giacinto, G., Looking at the Bag is not Enough to Find the Bomb: an Evasion of Structural Methods for Malicious PDF Files Detection, in 8th ACM Symposium on Information, Computer and Communications Security (ASIACCS 2013), Hangzhou, China, 2013. (2.12 MB)
C. - T. Li and Satta, R., On the Location-Dependent Quality of the Sensor Pattern Noise and Its Implication in Multimedia Forensics, in 4th International Conference on Imaging for Crime Detection and Prevention (ICDP 2011), London, United Kingdom, 2011. (399.99 KB)
G. L. Marcialis, Roli, F., and Schuckers, S., Liveness Detection Competition 2009, Biometric Technology Today, vol. 17, no. 3, 2009.
V. Mura, Yambay, D., Ghiani, L., Marcialis, G. L., Schuckers, S., and Roli, F., LivDet 2015 – Fingerprint Liveness Detection Competition 2015, in 7th IEEE Int. Conference on Biometrics: Technology, Applications and Systems (BTAS 2015), 2015. (178.26 KB)
L. Ghiani, Yambay, D., Mura, V., Tocco, S., Marcialis, G. L., Roli, F., and Schuckers, S., LivDet 2013 – Fingerprint Liveness Detection Competition, in IAPR/IEEE 6th Int. Conf. on Biometrics (ICB 2013), Madrid (Spain), 2013. (755.98 KB)
D. Yambay, Ghiani, L., Denti, P., Marcialis, G. L., Roli, F., and Schuckers, S., LivDet 2011 – Fingerprint Liveness Detection Competition 2011, in 5th IAPR/IEEE Int. Conf. on Biometrics (ICB 2012), New Delhi (India), 2012. (1.31 MB)
F. Roli, Linear Combiners for Fusion of Pattern Classifiers, 2002.
G. Fumera and Roli, F., Linear Combiners for Classifier Fusion: Some Theoretical and Experimental Results, in 4th Int. Workshop on Multiple Classifier Systems (MCS 2003), Guildford, UK, 2003, vol. 2709, pp. 74-83.
B. Biggio, Fumera, G., and Roli, F., Learning Sparse Kernel Machines with Biometric Similarity Functions for Identity Recognition, in IEEE 5th International Conference on Biometrics: Theory, Applications and Systems (BTAS 2012), Washington DC (USA), 2012, pp. 325 -330. (336.11 KB)
B. Biggio, On Learning and Recognition of Secure Patterns (Invited keynote at AISec '14), in AISec'14: Proceedings of the 2014 ACM Workshop on Artificial Intelligence and Security, co-located with CCS '14, Scottsdale, Arizona, USA, 2014, pp. 1-2. (110.67 KB)
G. L. Marcialis, Ghiani, L., Vetter, K., Morgeneier, D., and Roli, F., Large Scale Experiments on Fingerprint Liveness Detection, in Joint IAPR Int. Work. on Structural and Statistical Pattern Recognition (SPR & SSPR 2012), Hiroshima (Japan), 2012. (452.46 KB)
F. Roli and Serpico, S. B., Land-cover classification in remote-sensing images using structured neural networks, Int. Journal of EARSel Advances in Remote Sensing, vol. 4, pp. 107-115, 1995.
K
F. Roli, Fontana, F., Pellegretti, P., and Dambra, C., Knowledge-Based Control in Multisensor Image Processing and Recognition, Optical Engineering Journal, vol. 32, pp. 1153-1166, 1993.
L. Piras and Giacinto, G., K-Nearest Neighbors Directed Synthetic Images Injection, in 11th International Workshop on Image Analysis for Multimedia Interactive Services (WIAMIS), Desenzano del Garda, Italy, 2010. (167.12 KB)

Pages