Publications

Export 414 results:
2011
Z. Akhtar, Fumera, G., Marcialis, G. L., and Roli, F., Robustness Evaluation of Biometric Systems under Spoof Attacks, in 16th Int’l Conference on Image Analysis and Processing (ICIAP), Ravenna, Italy, 2011, pp. 159-168. (220.73 KB)
Z. Akhtar, Biggio, B., Fumera, G., and Marcialis, G. L., Robustness of Multi-modal Biometric Systems under Realistic Spoof Attacks against All Traits, in IEEE Workshop on Biometric Measurements and Systems for Security and Medical Applications (BioMS), Milan, Italy, 2011, pp. 5-10. (954 KB)
B. Biggio, Akhtar, Z., Fumera, G., Marcialis, G. L., and Roli, F., Robustness of multi-modal biometric verification systems under realistic spoofing attacks, in Int’l Joint Conference on Biometrics (IJCB), Washington DC, USA, 2011. (2.25 MB)
A. Rattani, Marcialis, G. L., and Roli, F., Self Adaptive Systems: An Experimental Analysis of the Performance Over Time, in In Proc. of IEEE Workshop on Computational Intelligence in Biometrics and Identity Management (CIBIM'11) - A Special Session on Adaptive Biometric Systems, Paris (France), 2011, pp. 36 - 43.
R. Tronci, Piras, L., Falqui, L., and Giacinto, G., A study on the evaluation of relevance feedback in multi-tagged image datasets, in 7th IEEE International Workshop on Multimedia Information Processing and Retrieval, California, USA, 2011. (259.03 KB)
B. Biggio, Nelson, B., and Laskov, P., Support Vector Machines Under Adversarial Label Noise, in Journal of Machine Learning Research - Proc. 3rd Asian Conference on Machine Learning (ACML 2011), Taoyuan, Taiwan, 2011, vol. 20, pp. 97-112. (533.74 KB)
B. Biggio, Fumera, G., Pillai, I., and Roli, F., A survey and experimental evaluation of image spam filtering techniques, Pattern Recognition Letters, vol. 32, pp. 1436 - 1446, 2011. (2.12 MB)
A. Rattani, Marcialis, G. L., and Roli, F., Temporal Analysis of Biometric Template Update Procedures in Uncontrolled Environment, in International Conference on Image Analysis and Processing (ICIAP'11), Ravenna, Italy, Ravenna (Italy), 2011.
B. Nelson, Biggio, B., and Laskov, P., Understanding the Risk Factors of Learning in Adversarial Environments, in 4th ACM Workshop on Artificial Intelligence and Security (AISec 2011), Chicago, IL, USA, 2011, pp. 87–92. (132.42 KB)
2010
A. Rattani, Adaptive Biometric System based on Template Update Procedures, University of Cagliari, Cagliari (Italy), 2010.
F. Roli, Marcialis, G. L., and Coli, P., An advanced image processing tool for latent fingerprint analysis and liveness assessment. 2010.
B. Biggio, Adversarial Pattern Classification, University of Cagliari, Cagliari (Italy), 2010. (2.65 MB)
G. L. Marcialis, Roli, F., and Tidu, A., Analysis of Fingerprint Pores for Vitality Detection, in Pattern Recognition (ICPR), 2010 20th International Conference on, Instanbul (Turkey), 2010.
I. Corona and Giacinto, G., Detection of server side web attacks, in Workshop on Applications of Pattern Analysis, Cumberland Lodge, London, UK, 2010. (308.33 KB)
I. Corona, Detection of Web-based attacks, University of Cagliari, Cagliari (Italy), 2010.
C. Lobrano, Tronci, R., Giacinto, G., and Roli, F., Dynamic Linear Combination of Two-Class Classifiers, in Lecture Notes in Computer Science, 2010, vol. 6218, pp. 473-482.
G. L. Marcialis, Roli, F., Coli, P., and Delogu, G., A Fingerprint Forensic Tool for Criminal Investigations, in Handbook of Research on Computational Forensics, Digital Crime and Investigation: Methods and Solutions, C. - T. Li IGI Press, 2010, pp. 23-52.
D. Ariu and Giacinto, G., HMMPayl: an application of HMM to the analysis of the HTTP Payload, in Workshop on Applications of Pattern Analysis, 2010. (273.18 KB)
D. Ariu, Host and Network based Anomaly Detectors for HTTP Attacks, University of Cagliari, Cagliari (Italy), 2010. (5.95 MB)
L. Piras and Giacinto, G., K-Nearest Neighbors Directed Synthetic Images Injection, in 11th International Workshop on Image Analysis for Multimedia Interactive Services (WIAMIS), Desenzano del Garda, Italy, 2010. (167.12 KB)
G. Giacinto, Moving Targets - When Data Classes Depend on Subjective Judgement, or They Are Crafted by an Adversary to Mislead Pattern Analysis Algorithms - The Cases of Content Based Image Retrieval and Adversarial Classification, in Advances in Data Mining. Applications and Theoretical Aspects, vol. LNCS 6171, P. Perner Springer-Verlag, 2010, pp. 1-16.
B. Biggio, Fumera, G., and Roli, F., Multiple Classifier Systems for Robust Classifier Design in Adversarial Environments, Journal of Machine Learning and Cybernetics, vol. 1, pp. 27–41, 2010. (844.91 KB)
B. Biggio, Fumera, G., and Roli, F., Multiple Classifier Systems under Attack, in 9th Int. Workshop on Multiple Classifier Systems (MCS 2010), Cairo, Egypt, 2010, vol. 5997, pp. 74–83. (231.42 KB)
C. Lobrano, Tronci, R., Giacinto, G., and Roli, F., A Score Decidability Index for Dynamic Score Combination, in Pattern Recognition, International Conference on, Los Alamitos, CA, USA, 2010, pp. 69-72.
G. L. Marcialis, Mastinu, P., and Roli, F., Serial fusion of multi-modal biometric systems, in Biometric Measurements and Systems for Security and Medical Applications (BIOMS), 2010 IEEE Workshop on, Taranto (Italy), 2010.

Pages