Export 408 results:
B. Biggio, Fumera, G., Pillai, I., and Roli, F., A survey and experimental evaluation of image spam filtering techniques, Pattern Recognition Letters, vol. 32, pp. 1436 - 1446, 2011. (2.12 MB)
A. Rattani, Marcialis, G. L., and Roli, F., Temporal Analysis of Biometric Template Update Procedures in Uncontrolled Environment, in International Conference on Image Analysis and Processing (ICIAP'11), Ravenna, Italy, Ravenna (Italy), 2011.
B. Nelson, Biggio, B., and Laskov, P., Understanding the Risk Factors of Learning in Adversarial Environments, in 4th ACM Workshop on Artificial Intelligence and Security (AISec 2011), Chicago, IL, USA, 2011, pp. 87–92. (132.42 KB)
A. Rattani, Adaptive Biometric System based on Template Update Procedures, University of Cagliari, Cagliari (Italy), 2010.
F. Roli, Marcialis, G. L., and Coli, P., An advanced image processing tool for latent fingerprint analysis and liveness assessment. 2010.
B. Biggio, Adversarial Pattern Classification, University of Cagliari, Cagliari (Italy), 2010. (2.65 MB)
G. L. Marcialis, Roli, F., and Tidu, A., Analysis of Fingerprint Pores for Vitality Detection, in Pattern Recognition (ICPR), 2010 20th International Conference on, Instanbul (Turkey), 2010.
I. Corona and Giacinto, G., Detection of server side web attacks, in Workshop on Applications of Pattern Analysis, Cumberland Lodge, London, UK, 2010. (308.33 KB)
I. Corona, Detection of Web-based attacks, University of Cagliari, Cagliari (Italy), 2010.
C. Lobrano, Tronci, R., Giacinto, G., and Roli, F., Dynamic Linear Combination of Two-Class Classifiers, in Lecture Notes in Computer Science, 2010, vol. 6218, pp. 473-482.
G. L. Marcialis, Roli, F., Coli, P., and Delogu, G., A Fingerprint Forensic Tool for Criminal Investigations, in Handbook of Research on Computational Forensics, Digital Crime and Investigation: Methods and Solutions, C. - T. Li IGI Press, 2010, pp. 23-52.
D. Ariu and Giacinto, G., HMMPayl: an application of HMM to the analysis of the HTTP Payload, in Workshop on Applications of Pattern Analysis, 2010. (273.18 KB)
D. Ariu, Host and Network based Anomaly Detectors for HTTP Attacks, University of Cagliari, Cagliari (Italy), 2010. (5.95 MB)
L. Piras and Giacinto, G., K-Nearest Neighbors Directed Synthetic Images Injection, in 11th International Workshop on Image Analysis for Multimedia Interactive Services (WIAMIS), Desenzano del Garda, Italy, 2010. (167.12 KB)
G. Giacinto, Moving Targets - When Data Classes Depend on Subjective Judgement, or They Are Crafted by an Adversary to Mislead Pattern Analysis Algorithms - The Cases of Content Based Image Retrieval and Adversarial Classification, in Advances in Data Mining. Applications and Theoretical Aspects, vol. LNCS 6171, P. Perner Springer-Verlag, 2010, pp. 1-16.
B. Biggio, Fumera, G., and Roli, F., Multiple Classifier Systems for Robust Classifier Design in Adversarial Environments, Journal of Machine Learning and Cybernetics, vol. 1, pp. 27–41, 2010. (844.91 KB)
B. Biggio, Fumera, G., and Roli, F., Multiple Classifier Systems under Attack, in 9th Int. Workshop on Multiple Classifier Systems (MCS 2010), Cairo, Egypt, 2010, vol. 5997, pp. 74–83. (231.42 KB)
C. Lobrano, Tronci, R., Giacinto, G., and Roli, F., A Score Decidability Index for Dynamic Score Combination, in Pattern Recognition, International Conference on, Los Alamitos, CA, USA, 2010, pp. 69-72.
G. L. Marcialis, Mastinu, P., and Roli, F., Serial fusion of multi-modal biometric systems, in Biometric Measurements and Systems for Security and Medical Applications (BIOMS), 2010 IEEE Workshop on, Taranto (Italy), 2010.
B. Freni, Template Editing & Replacement: novel methods for Biometric Template Selection & Update, University of Cagliari, Cagliari (Italy), 2010.
L. Piras and Giacinto, G., Unbalanced learning in Content-Based Image Classification and Retrieval, in IEEE International Conference on Multimedia & Expo (ICME), Singapore, 2010. (177.33 KB)
F. Roli, Adversarial Pattern Classification, 2009.
B. Biggio, Fumera, G., and Roli, F., Bayesian Linear Combination of Neural Networks, in Innovations in Neural Information Paradigms and Applications, vol. 247, M. Bianchini, Maggini, M., Scarselli, F., and Jain, L. C. Springer Berlin / Heidelberg, 2009, pp. 201-230. (435.32 KB)
R. Tronci, Giacinto, G., and Roli, F., Designing multiple biometric systems: measures of ensemble effectiveness, Engineering Applications of Artificial Intelligence, vol. 22, pp. 66-78, 2009.
R. Perdisci, Corona, I., Dagon, D., and Lee, W., Detecting Malicious Flux Service Networks through Passive Analysis of Recursive DNS Traces, in Annual Computer Security Applications Conference (ACSAC), Honolulu, Hawaii, USA, 2009. (206.97 KB)