Publications

Export 426 results:
2011
Z. Akhtar, Fumera, G., Marcialis, G. L., and Roli, F., Robustness Evaluation of Biometric Systems under Spoof Attacks, in 16th Int’l Conference on Image Analysis and Processing (ICIAP), Ravenna, Italy, 2011, pp. 159-168. (220.73 KB)
Z. Akhtar, Biggio, B., Fumera, G., and Marcialis, G. L., Robustness of Multi-modal Biometric Systems under Realistic Spoof Attacks against All Traits, in IEEE Workshop on Biometric Measurements and Systems for Security and Medical Applications (BioMS), Milan, Italy, 2011, pp. 5-10. (954 KB)
B. Biggio, Akhtar, Z., Fumera, G., Marcialis, G. L., and Roli, F., Robustness of multi-modal biometric verification systems under realistic spoofing attacks, in Int’l Joint Conference on Biometrics (IJCB), Washington DC, USA, 2011. (2.25 MB)
A. Rattani, Marcialis, G. L., and Roli, F., Self Adaptive Systems: An Experimental Analysis of the Performance Over Time, in In Proc. of IEEE Workshop on Computational Intelligence in Biometrics and Identity Management (CIBIM'11) - A Special Session on Adaptive Biometric Systems, Paris (France), 2011, pp. 36 - 43.
R. Tronci, Piras, L., Falqui, L., and Giacinto, G., A study on the evaluation of relevance feedback in multi-tagged image datasets, in 7th IEEE International Workshop on Multimedia Information Processing and Retrieval, California, USA, 2011. (259.03 KB)
B. Biggio, Nelson, B., and Laskov, P., Support Vector Machines Under Adversarial Label Noise, in Journal of Machine Learning Research - Proc. 3rd Asian Conference on Machine Learning (ACML 2011), Taoyuan, Taiwan, 2011, vol. 20, pp. 97-112. (533.74 KB)
B. Biggio, Fumera, G., Pillai, I., and Roli, F., A survey and experimental evaluation of image spam filtering techniques, Pattern Recognition Letters, vol. 32, pp. 1436 - 1446, 2011. (2.12 MB)
A. Rattani, Marcialis, G. L., and Roli, F., Temporal Analysis of Biometric Template Update Procedures in Uncontrolled Environment, in International Conference on Image Analysis and Processing (ICIAP'11), Ravenna, Italy, Ravenna (Italy), 2011.
B. Nelson, Biggio, B., and Laskov, P., Understanding the Risk Factors of Learning in Adversarial Environments, in 4th ACM Workshop on Artificial Intelligence and Security (AISec 2011), Chicago, IL, USA, 2011, pp. 87–92. (132.42 KB)
2012
A. Rattani, Marcialis, G. L., and Roli, F., Adaptive Multibiometric Systems: Conceptual Representation and Performance Evaluation Over Time, in Handbook on Multibiometrics Systems: Modern Approach to Identity Verification, D. Ranjan Kisku, Gupta, P., and Tistarelli, M. VDM - Lambert Academic Publishing, 2012, pp. 120 -143.
R. Tronci, Murgia, G., Pili, M., Ristori, M., Sirena, N., and Roli, F., The Ambient Intelligence Laboratory of the Sardegna DistrICT. 2012.
L. Didaci, Fumera, G., and Roli, F., Analysis of Co-training Algorithm with Very Small Training Sets, in Structural, Syntactic, and Statistical Pattern Recognition, 2012, vol. 7626, pp. 719-726.
R. Satta, Fumera, G., and Roli, F., Appearance-based People Recognition by Local Dissimilarity Representations, in 14th ACM Workshop on Multimedia and Security, Coventry, United Kingdom, 2012. (441.39 KB)
P. Forner, Karlgren, J., and Womser-Hacker, C., CLEF 2012 Evaluation Labs and Workshop, Online Working Notes, Rome, Italy, September 17-20, 2012. 2012.
N. Poh, Rattani, A., and Roli, F., A Critical Analysis of Adaptive Biometric Systems, IET Biometrics, 2012.
A. Rattani, Marcialis, G. L., Granger, E., and Roli, F., A Dual-staged Classification-Selection Approach for Automated Update of Biometric Templates, in International Conference on Pattern Recognition (ICPR), Tsukuba Science City, JAPAN, 2012.
R. Perdisci, Corona, I., and Giacinto, G., Early Detection of Malicious Flux Networks via Large-Scale Passive DNS Traffic Analysis, IEEE Transactions on Dependable and Secure Computing, vol. 9, pp. 714-726, 2012. (1.37 MB)
C. - T. Li and Satta, R., Empirical Investigation into the Correlation between Vignetting Effect and the Quality of Sensor Pattern Noise, IET Computer Vision, vol. 6, no. 6, pp. 560-566, 2012.
L. Piras, Giacinto, G., and Paredes, R., Enhancing image retrieval by an Exploration-Exploitation approach, in 8th International Conference Machine Learning and Data Mining (MLDM), Berlin, 2012, vol. 7376, pp. 355-365. (307.57 KB)
Z. Akhtar, Fumera, G., Marcialis, G. L., and Roli, F., Evaluation of Multimodal Biometric Score Fusion Rules under Spoof Attacks, in 5th IAPR Int’l Conference on Biometrics (ICB), New Delhi, India, 2012, pp. 402-407. (612.37 KB)
Z. Akhtar, Fumera, G., Marcialis, G. L., and Roli, F., Evaluation of serial and parallel multibiometric systems under spoofing attacks, in 5th IEEE Int'l Conference on Biometrics: Theory, Applications and Systems (BTAS), Washington DC, USA, 2012, vol. . (573.02 KB)
L. Ghiani, Denti, P., and Marcialis, G. L., Experimental results on fingerprint liveness detection, in Proceedings of the 7th international conference on Articulated Motion and Deformable Objects (AMDO 2012), Andratx (Mallorca, Spain), 2012. (595.48 KB)
L. Ghiani, Marcialis, G. L., and Roli, F., Experimental results on the feature-level fusion of multiple fingerprint liveness detection algorithms, in Proceedings of the on Multimedia and security, Coventry (UK), 2012. (940.07 KB)
R. Satta, Fumera, G., and Roli, F., Fast Appearance-based Person Re-identification and Retrieval Using Dissimilarity Representations, in Convegno Gruppo Italiano Ricercatori in Pattern Recognition (GIRPR), 2012. (945.6 KB)
R. Satta, Fumera, G., and Roli, F., Fast Person Re-Identification Based on Dissimilarity Representations, Pattern Recognition Letters, Special Issue on Novel Pattern Recognition-Based Methods for Reidentification in Biometric Context, vol. 33, pp. 1838-1848, 2012. (976.57 KB)

Pages