Publications

Export 420 results:
2018
L. Putzu, Piras, L., e Giacinto, G., «Ten years of Relevance Score for Content Based Image Retrieval», in 14th International Conference Machine Learning and Data Mining (MLDM), New York, 2018, vol 10935.
B. Biggio e Roli, F., «Wild Patterns: Ten Years After the Rise of Adversarial Machine Learning», Pattern Recognition, vol 84, pagg 317-331, 2018. (3.76 MB)
2017
M. Melis, Demontis, A., Biggio, B., Brown, G., Fumera, G., e Roli, F., «Is Deep Learning Safe for Robot Vision? Adversarial Examples against the iCub Humanoid», in ICCV 2017 Workshop on Vision in Practice on Autonomous Robots (ViPAR), Venice, Italy, 2017, vol 2017 IEEE International Conference on Computer Vision Workshops (ICCVW), pagg 751-759. (3.16 MB)
P. Piredda, Ariu, D., Biggio, B., Corona, I., Piras, L., Giacinto, G., e Roli, F., «Deepsquatting: Learning-based Typosquatting Detection at Deeper Domain Levels», in 16th International Conference of the Italian Association for Artificial Intelligence (AI*IA 2017), 2017, vol 10640 of LNCS, pagg 347-358. (1.21 MB)
I. Corona, Biggio, B., Contini, M., Piras, L., Corda, R., Mereu, M., Mureddu, G., Ariu, D., e Roli, F., «DeltaPhish: Detecting Phishing Webpages in Compromised Websites», 22nd European Symposium on Research in Computer Security (ESORICS), vol 10492. Springer International Publishing, Norway, September 11-15, 2017, pagg 370–388, 2017. (4.13 MB)
I. Pillai, Fumera, G., e Roli, F., «Designing multi-label classifiers that maximize F measures: state of the art», Pattern Recognition, vol 61, 2017.
D. Maiorca, Russu, P., Corona, I., Biggio, B., e Giacinto, G., «Detection of Malicious Scripting Code through Discriminant and Adversary-Aware API Analysis», in 1st Italian Conference on CyberSecurity (ITASEC), 2017, vol 1816, pagg 96-105. (371.53 KB)
A. Demontis, Biggio, B., Fumera, G., Giacinto, G., e Roli, F., «Infinity-norm Support Vector Machines against Adversarial Label Contamination», 1st Italian Conference on CyberSecurity (ITASEC). Venice, Italy , pagg 106-115, 2017.
L. Piras e Giacinto, G., «Information Fusion in Content Based Image Retrieval: A Comprehensive Overview», Information Fusion, vol 37, pagg 50-60, 2017. (734.6 KB)
D. - T. Dang-Nguyen, Piras, L., Giacinto, G., Boato, G., e De Natale, F. G. B., «Multimodal Retrieval with Diversification and Relevance Feedback for Tourist Attraction Images», ACM Transactions on Multimedia Computing, Communications, and Applications, vol 13, n° 4, 2017. (5.94 MB)
L. Zhou, Piras, L., Rieger, M., Boato, G., Dang-Nguyen, D. - T., e Gurrin, C., «Organizer Team at ImageCLEFlifelog 2017: Baseline Approaches for Lifelog Retrieval and Summarization», in CLEF working notes, CEUR, Dublin, 2017, vol 1866. (220.99 KB)
B. Ionescu, Müller, H., Villegas, M., Arenas, H., Boato, G., Dang-Nguyen, D. - T., Cid, Y. Dicente, Eickhoff, C., de Herrera, A. García Se, Gurrin, C., Islam, B., Kovalev, V., Liauchuk, V., Mothe, J., Piras, L., Riegler, M., e Schwall, I., «Overview of ImageCLEF 2017: Information extraction from images», in CLEF 2017 Proceedings, Dublin, Ireland, 2017, pagg 315-337.
D. - T. Dang-Nguyen, Piras, L., Riegler, M., Boato, G., Zhou, L., e Gurrin, C., «Overview of ImageCLEFlifelog 2017: Lifelog Retrieval and Summarization», in CLEF2017 Working Notes, Dublin, Ireland, 2017, vol 1866. (1.7 MB)
E. Santucci, Didaci, L., Fumera, G., e Roli, F., «A Parameter Randomization Approach for Constructing Classifier Ensembles», Pattern Recognition, vol 69, pagg 1-13, 2017. (448.73 KB)
S. Rota Bulò, Biggio, B., Pillai, I., Pelillo, M., e Roli, F., «Randomized Prediction Games for Adversarial Machine Learning», IEEE Transactions on Neural Networks and Learning Systems, vol 28, n° 11, pagg 2466-2478, 2017. (1.52 MB) (256.21 KB)
D. Maiorca, Mercaldo, F., Giacinto, G., Visaggio, A., e Martinelli, F., «R-PackDroid: API Package-Based Characterization and Detection of Mobile Ransomware», in ACM Symposium on Applied Computing (SAC 2017 - Acceptance Rate 15.7%), 2017, pagg 1718-1723. (272.44 KB)
B. Biggio, Fumera, G., Marcialis, G. L., e Roli, F., «Statistical Meta-Analysis of Presentation Attacks for Secure Multibiometric Systems», IEEE Transactions on Pattern Analysis and Machine Intelligence, vol 39, n° 3, pagg 561-575, 2017. (5.7 MB)
L. Muñoz-González, Biggio, B., Demontis, A., Paudice, A., Wongrassamee, V., Lupu, E. C., e Roli, F., «Towards Poisoning of Deep Learning Algorithms with Back-gradient Optimization», in 10th ACM Workshop on Artificial Intelligence and Security, 2017, pagg 27-38.
2016
M. A. A. Dewan, Granger, E., Marcialis, G. L., Sabourin, R., e Roli, F., «Adaptive Appearance Model Tracking for Still-to-Video Face Recognition», Pattern Recognition, vol 49, n° 1, 2016. (6.51 MB)
F. Zhang, Chan, P. P. K., Biggio, B., Yeung, D. S., e Roli, F., «Adversarial Feature Selection Against Evasion Attacks», IEEE Transactions on Cybernetics, vol 46, n° 3, pagg 766-777, 2016. (2.12 MB)
R. Soleymani, Granger, E., e Fumera, G., «Classifier Ensembles with Trajectory Under-Sampling for Face Re-Identification», in 5th International Conference on Pattern Recognition Applications and Methods (ICPRAM 2016), Rome, Italy, 2016, vol 1, pagg 97-108.
M. Mauri, Mulas, A., e Ariu, D., «The Dark Side of Open Data», 2nd International Workshop on Knowledge Discovery on the WEB (KDWEB). Cagliari, 2016. (124.62 KB) (1.33 MB)
D. Maiorca, «Design and Implementation of Robust Systems for Secure Malware Detection (Ph.D. Thesis)», University of Cagliari, Italy, Cagliari, 2016. (5.34 MB)
M. Ahmadi, Biggio, B., Arzt, S., Ariu, D., e Giacinto, G., «Detecting Misuse of Google Cloud Messaging in Android Badware», in 6th Workshop on Security and Privacy in Smartphones and Mobile Devices (SPSM), Vienna, Austria, 2016, pagg 103-112. (626.38 KB)
S. Kumar Dash, Suarez-Tangil, G., Khan, S., Tam, K., Ahmadi, M., Kinder, J., e Cavallaro, L., «DroidScribe: Classifying Android Malware Based on Runtime Behavior», in Mobile Security Technologies (MoST 2016), 2016. (571.22 KB)

Pages