Publications

Export 389 results:
2016
B. Biggio, «Machine Learning under Attack: Vulnerability Exploitation and Security Measures (Invited Keynote at IH&MMSec '16)», in 4th ACM Workshop on Information Hiding & Multimedia Security, Vigo, Spain, 2016, pagg 1-2. (138.98 KB)
A. Crobe, Demuru, M., Didaci, L., Marcialis, G. L., e Fraschini, M., «Minimum spanning tree and K-Core decomposition as measure of subject-specific EEG traits», Biomedical Physics and Engineering Express, vol 1, n° 2, pag 017001, 2016. (802.39 KB)
M. Ahmadi, Ulyanov, D., Semenov, S., Trofimov, M., e Giacinto, G., «Novel Feature Extraction, Selection and Fusion for Effective Malware Family Classification», in Proceedings of the Sixth ACM on Conference on Data and Application Security and Privacy, 2016, pagg 183–194. (6.49 MB)
A. Gilbert, Piras, L., Wang, J., Yan, F., Ramisa, A., Dellandrea, E., Gaizauskas, R., Villegas, M., e Mikolajczyk, K., «Overview of the ImageCLEF 2016 Scalable Concept Image Annotation Task», in CLEF2016, 2016. (2.47 MB)
M. Contini, Corona, I., Mulas, A., Giacinto, G., e Ariu, D., «Pharmaguard WebApp: an application for the detection of illegal online pharmacies», 2nd International Workshop on Knowledge Discovery on the WEB (KDWEB). Cagliari, 2016. (120.57 KB)
L. Ghiani, Yambay, D. A., Mura, V., Marcialis, G. L., Roli, F., e Schuckers, S. A., «Review of the Fingerprint Liveness Detection (LivDet) competition series: 2009 to 2015», Image and Vision Computing, pag -, 2016.
P. Russu, Demontis, A., Biggio, B., Fumera, G., e Roli, F., «Secure Kernel Machines against Evasion Attacks», in 9th ACM Workshop on Artificial Intelligence and Security, Vienna, Austria, 2016, pagg 59-69. (686.41 KB)
A. Demontis, Russu, P., Biggio, B., Fumera, G., e Roli, F., «On Security and Sparsity of Linear Classifiers for Adversarial Settings», in Joint IAPR Int'l Workshop on Structural, Syntactic, and Statistical Pattern Recognition, Merida, Mexico, 2016, vol 10029 of LNCS, pagg 322-332. (425.68 KB)
A. Demontis, Melis, M., Biggio, B., Fumera, G., e Roli, F., «Super-sparse Learning in Similarity Spaces», IEEE Computational Intelligence Magazine, vol 11, n° 4, pagg 36-45, 2016. (555.22 KB)
D. M. Freeman, Jain, S., Duermuth, M., Biggio, B., e Giacinto, G., «Who Are You? A Statistical Approach to Measuring User Authenticity», in Proc. 23rd Annual Network & Distributed System Security Symposium (NDSS), 2016. (764.14 KB)
2015
J. Armin, Thompson, B., Kijewski, P., Ariu, D., Giacinto, G., e Roli, F., «2020 Cybercrime Economic Costs: No measure No solution», in First International Workshop on Future Scenarios for Cybercrime and Cyber-terrorism, co-located with the 10th International Conference on Availability, Reliability and Security (ARES), 2015. (526.44 KB)
B. Biggio, Fumera, G., Russu, P., Didaci, L., e Roli, F., «Adversarial Biometric Recognition: A Review on Biometric System Security from the Adversarial Machine Learning Perspective», IEEE Signal Processing Magazine, vol 32, n° 5, pagg 31-41, 2015. (751.08 KB)
P. Tuveri, Mura, V., Marcialis, G. L., e Roli, F., «A classification-selection approach for self updating of face verification systems under stringent storage and computational requirements», in 18th IAPR Int. Conf. on Image Analysis and Processing (ICIAP), 2015, vol 9280, pagg 540-550. (408.79 KB)
M. Aresu, Ariu, D., Ahmadi, M., Maiorca, D., e Giacinto, G., «Clustering Android Malware Families by Http Traffic», in 10h International Conference on Malicious and Unwanted Software (MALCON 2015), October 20-22th 2015, Fajardo, Puerto Rico, USA, 2015. (168.36 KB)
G. Ennas, Biggio, B., e Di Guardo, M. Chiara, «Data-driven Journal Meta-ranking in Business and Management», Scientometrics, pagg 1-19, 2015. (896.37 KB)
I. Sanchez, Satta, R., Giuliani, R., e Baldini, G., «Detection of DECT identity spoofing through Radio Frequency fingerprinting», in 38th International Convention on Information and Communication Technology, Electronics and Microelectronics (MIPRO 2015), Opatija, Croatia, 2015. (778.81 KB)
M. Narouei, Ahmadi, M., Giacinto, G., Takabi, H., e Sami, A., «DLLMiner: structural mining for malware detection», Security and Communication Networks, 2015. (731.78 KB)
M. Fraschini, Hillebrand, A., Demuru, M., Didaci, L., e Marcialis, G. L., «An EEG-based biometric system using eigenvector centrality in resting state brain activity», IEEE Signal Processing Letters, vol 22, n° 6, 2015. (522.35 KB)
M. A. O. Ahmed, Didaci, L., Fumera, G., e Roli, F., «An Empirical Investigation on the Use of Diversity for Creation of Classifier Ensembles», in Multiple Classifier Systems, 2015, vol 9132, pagg 206-219. (216.76 KB)
D. Maiorca, Ariu, D., Corona, I., e Giacinto, G., «An Evasion Resilient Approach to the Detection of Malicious PDF Files», in Information Systems Security and Privacy (Communication in Computer and Information Science), vol 576, Springer, 2015, pagg 68-85. (503.11 KB)
M. Melis, Piras, L., Biggio, B., Giacinto, G., Fumera, G., e Roli, F., «Fast Image Classification with Reduced Multiclass Support Vector Machines», in 18th Int'l Conf. on Image Analysis and Processing, Genova, Italy, 2015, vol Image Analysis and Processing (ICIAP 2015), pagg 78-88. (829.37 KB)
H. Xiao, Biggio, B., Brown, G., Fumera, G., Eckert, C., e Roli, F., «Is Feature Selection Secure against Training Data Poisoning?», in 32nd Int'l Conf. on Machine Learning (ICML) - JMLR W&CP, 2015, vol 32, pagg 1689-1698. (1.54 MB)
M. Villegas, Müller, H., Gilbert, A., Piras, L., Wang, J., Mikolajczyk, K., de Herrera, A. García Se, Bromuri, S., M. Amin, A., Mohammed, M. Kazi, Acar, B., Uskudarli, S., Marvasti, N. B., Aldana, J. F., e García, Mdel Mar Ro, «General Overview of ImageCLEF at CLEF2015 Labs», in Lecture Notes in Computer Science, Springer International Publishing, 2015. (786.29 KB) (705 bytes)
D. - T. Dang-Nguyen, Piras, L., Giacinto, G., Boato, G., e De Natale, F. G. B., «A Hybrid Approach for Retrieving Diverse Social Images of Landmarks», in IEEE International Conference on Multimedia & Expo (ICME), Torino, 2015. (1.16 MB)
I. Rida, Bouridane, A., e Marcialis, G. L., «Improved Human Gait Recognition», in 18th IAPR Int. Conf. on Image Analysis and Processing (ICIAP), 2015, vol 9280, pagg 119-129. (398.61 KB)

Pages