Publications

Export 404 results:
2017
B. Biggio, Fumera, G., Marcialis, G. L., e Roli, F., «Statistical Meta-Analysis of Presentation Attacks for Secure Multibiometric Systems», IEEE Transactions on Pattern Analysis and Machine Intelligence, vol 39, n° 3, pagg 561-575, 2017. (5.7 MB)
L. Muñoz-González, Biggio, B., Demontis, A., Paudice, A., Wongrassamee, V., Lupu, E. C., e Roli, F., «Towards Poisoning of Deep Learning Algorithms with Back-gradient Optimization», in 10th ACM Workshop on Artificial Intelligence and Security, 2017, pagg 27-38.
2016
M. A. A. Dewan, Granger, E., Marcialis, G. L., Sabourin, R., e Roli, F., «Adaptive Appearance Model Tracking for Still-to-Video Face Recognition», Pattern Recognition, vol 49, n° 1, 2016. (6.51 MB)
F. Zhang, Chan, P. P. K., Biggio, B., Yeung, D. S., e Roli, F., «Adversarial Feature Selection Against Evasion Attacks», IEEE Transactions on Cybernetics, vol 46, n° 3, pagg 766-777, 2016. (2.12 MB)
R. Soleymani, Granger, E., e Fumera, G., «Classifier Ensembles with Trajectory Under-Sampling for Face Re-Identification», in 5th International Conference on Pattern Recognition Applications and Methods (ICPRAM 2016), Rome, Italy, 2016, vol 1, pagg 97-108.
M. Mauri, Mulas, A., e Ariu, D., «The Dark Side of Open Data», 2nd International Workshop on Knowledge Discovery on the WEB (KDWEB). Cagliari, 2016. (124.62 KB) (1.33 MB)
D. Maiorca, «Design and Implementation of Robust Systems for Secure Malware Detection (Ph.D. Thesis)», University of Cagliari, Italy, Cagliari, 2016. (5.34 MB)
M. Ahmadi, Biggio, B., Arzt, S., Ariu, D., e Giacinto, G., «Detecting Misuse of Google Cloud Messaging in Android Badware», in 6th Workshop on Security and Privacy in Smartphones and Mobile Devices (SPSM), Vienna, Austria, 2016, pagg 103-112. (626.38 KB)
S. Kumar Dash, Suarez-Tangil, G., Khan, S., Tam, K., Ahmadi, M., Kinder, J., e Cavallaro, L., «DroidScribe: Classifying Android Malware Based on Runtime Behavior», in Mobile Security Technologies (MoST 2016), 2016. (571.22 KB)
J. Hoffmann, Rytilahti, T., Maiorca, D., Winandy, M., Giacinto, G., e Holz, T., «Evaluating Analysis Tools for Android Apps: Status Quo and Robustness Against Obfuscation», Horst Görtz Institut for IT Security (Ruhr-University Bochum), Technical Report TR-HGI-2016-003, 2016. (519.16 KB)
J. Hoffmann, Rytilahti, T., Maiorca, D., Winandy, M., Giacinto, G., e Holz, T., «Evaluating Analysis Tools for Android Apps: Status Quo and Robustness against Obfuscation», Proceedings of the 6th ACM Conference on Data and Application Security and Privacy (CODASPY 2016, 09-11 March, 2016). 2016. (726.65 KB)
M. Villegas, Müller, H., de Herrera, A. García Se, Schaer, R., Bromuri, S., Gilbert, A., Piras, L., Wang, J., Yan, F., Ramisa, A., Dellandrea, E., Gaizauskas, R., Puigcerver, K. Mikolajczy, Toselli, A. H., Sánchez, J. - A., e Vidal, E., «General Overview of ImageCLEF at the CLEF 2016 Labs», in Lecture Notes in Computer Science, Springer International Publishing, 2016. (1.07 MB)
I. Rida, Jiang, X., e Marcialis, G. L., «Human Body Part Selection by Group Lasso of Motion for Model-Free Gait Recognition», IEEE Signal Processing Letters, vol 23, n° 1, 2016. (692.14 KB)
D. - T. Dang-Nguyen, Piras, L., Riegler, M., Gurrin, C., Boato, G., e Halvorsen, P., «ImageCLEF 2017 LifeLog task», in Challenges in Machine Learning: Gaming and Education (CiML - NIPS 2016 workshop), Barcelona, Spain, 2016. (80.25 KB)
B. Biggio, «Machine Learning under Attack: Vulnerability Exploitation and Security Measures (Invited Keynote at IH&MMSec '16)», in 4th ACM Workshop on Information Hiding & Multimedia Security, Vigo, Spain, 2016, pagg 1-2. (138.98 KB)
A. Crobe, Demuru, M., Didaci, L., Marcialis, G. L., e Fraschini, M., «Minimum spanning tree and K-Core decomposition as measure of subject-specific EEG traits», Biomedical Physics and Engineering Express, vol 1, n° 2, pag 017001, 2016. (802.39 KB)
M. Ahmadi, Ulyanov, D., Semenov, S., Trofimov, M., e Giacinto, G., «Novel Feature Extraction, Selection and Fusion for Effective Malware Family Classification», in Proceedings of the Sixth ACM on Conference on Data and Application Security and Privacy, 2016, pagg 183–194. (6.49 MB)
A. Gilbert, Piras, L., Wang, J., Yan, F., Ramisa, A., Dellandrea, E., Gaizauskas, R., Villegas, M., e Mikolajczyk, K., «Overview of the ImageCLEF 2016 Scalable Concept Image Annotation Task», in CLEF2016, 2016. (2.47 MB)
M. Contini, Corona, I., Mulas, A., Giacinto, G., e Ariu, D., «Pharmaguard WebApp: an application for the detection of illegal online pharmacies», 2nd International Workshop on Knowledge Discovery on the WEB (KDWEB). Cagliari, 2016. (120.57 KB)
L. Ghiani, Yambay, D. A., Mura, V., Marcialis, G. L., Roli, F., e Schuckers, S. A., «Review of the Fingerprint Liveness Detection (LivDet) competition series: 2009 to 2015», Image and Vision Computing, pag -, 2016.
P. Russu, Demontis, A., Biggio, B., Fumera, G., e Roli, F., «Secure Kernel Machines against Evasion Attacks», in 9th ACM Workshop on Artificial Intelligence and Security, Vienna, Austria, 2016, pagg 59-69. (686.41 KB)
A. Demontis, Russu, P., Biggio, B., Fumera, G., e Roli, F., «On Security and Sparsity of Linear Classifiers for Adversarial Settings», in Joint IAPR Int'l Workshop on Structural, Syntactic, and Statistical Pattern Recognition, Merida, Mexico, 2016, vol 10029 of LNCS, pagg 322-332. (425.68 KB)
A. Demontis, Melis, M., Biggio, B., Fumera, G., e Roli, F., «Super-sparse Learning in Similarity Spaces», IEEE Computational Intelligence Magazine, vol 11, n° 4, pagg 36-45, 2016. (555.22 KB)
J. Galbally e Satta, R., «Three-dimensional and two-and-a-half- dimensional face recognition spoofing using three-dimensional printed models», IET Biometrics, vol 5, n° 2, 2016. (1.33 MB)
D. M. Freeman, Jain, S., Duermuth, M., Biggio, B., e Giacinto, G., «Who Are You? A Statistical Approach to Measuring User Authenticity», in Proc. 23rd Annual Network & Distributed System Security Symposium (NDSS), 2016. (764.14 KB)

Pages