Publications

Export 6 results:
Filters: First Letter Of Title is W  [Clear All Filters]
2019
A. Demontis, Melis, M., Pintor, M., Jagielski, M., Biggio, B., Oprea, A., Nita-Rotaru, C., e Roli, F., «Why Do Adversarial Attacks Transfer? Explaining Transferability of Evasion and Poisoning Attacks», in 28th Usenix Security Symposium, Santa Clara, California, USA, 2019, vol 28th {USENIX} Security Symposium ({USENIX} Security 19), pag 321--338. (1.09 MB)
2018
S. Porcu, Loddo, A., Putzu, L., e Di Ruberto, C., «White blood cells counting via vector field convolution nuclei segmentation», in VISIGRAPP 2018 - Proceedings of the 13th International Joint Conference on Computer Vision, Imaging and Computer Graphics Theory and Applications, 2018, vol 4, pagg 227 – 234.
B. Biggio e Roli, F., «Wild Patterns: Ten Years After the Rise of Adversarial Machine Learning», Pattern Recognition, vol 84, pagg 317-331, 2018. (3.76 MB)
2016
D. M. Freeman, Jain, S., Duermuth, M., Biggio, B., e Giacinto, G., «Who Are You? A Statistical Approach to Measuring User Authenticity», in Proc. 23rd Annual Network & Distributed System Security Symposium (NDSS), 2016. (764.14 KB)
2013
L. Putzu e Di Ruberto, C., «White Blood Cells Identification and Classification from Leukemic Blood Image», in PROCEEDINGS IWBBIO 2013: INTERNATIONAL WORK-CONFERENCE ON BIOINFORMATICS AND BIOMEDICAL ENGINEERING, AV ANDALUCIA, 38, GRANADA, GRANADA 18014, SPAIN, 2013, pagg 99-106.
2012
G. L. Marcialis, Didaci, L., Pisano, A., Granger, E., e Roli, F., «Why template self-update should work in biometric authentication systems?», in Information Science, Signal Processing and their Applications (ISSPA), 2012 11th International Conference on, Montreal, QC, 2012.