Export 437 results:
A B C D E F G H I J K L M N O P Q R S T U V W X Y Z 
M. Melis, Demontis, A., Biggio, B., Brown, G., Fumera, G., e Roli, F., «Is Deep Learning Safe for Robot Vision? Adversarial Examples against the iCub Humanoid», in ICCV 2017 Workshop on Vision in Practice on Autonomous Robots (ViPAR), Venice, Italy, 2017, vol 2017 IEEE International Conference on Computer Vision Workshops (ICCVW), pagg 751-759. (3.16 MB)
M. Melis, Demontis, A., Pintor, M., Sotgiu, A., e Biggio, B., «secml: A Python Library for Secure and Explainable Machine Learning». 2019. (1.1 MB)
M. Melis, Maiorca, D., Biggio, B., Giacinto, G., e Roli, F., «Explaining Black-box Android Malware Detection», in 26th European Signal Processing Conference (EUSIPCO '18), Rome, Italy, 2018, pagg 524-528. (431.78 KB)
A. Montali, Giacinto, G., Migliaccio, M., e Gambardella, A., «Supervised Pattern Classification Techniques for Oil Spill Classification in SAR Images: Preliminary Results», in SEASAR2006 Workshop, ESA-ESRIN, Frascati, Italy, 2006, pagg 23-26.
L. Muñoz-González, Biggio, B., Demontis, A., Paudice, A., Wongrassamee, V., Lupu, E. C., e Roli, F., «Towards Poisoning of Deep Learning Algorithms with Back-gradient Optimization», in 10th ACM Workshop on Artificial Intelligence and Security, 2017, pagg 27-38. (4.08 MB)
V. Mura, Yambay, D., Ghiani, L., Marcialis, G. L., Schuckers, S., e Roli, F., «LivDet 2015 – Fingerprint Liveness Detection Competition 2015», in 7th IEEE Int. Conference on Biometrics: Technology, Applications and Systems (BTAS 2015), 2015. (178.26 KB)
M. Narouei, Ahmadi, M., Giacinto, G., Takabi, H., e Sami, A., «DLLMiner: structural mining for malware detection», Security and Communication Networks, 2015. (731.78 KB)
B. Nelson, Biggio, B., e Laskov, P., «Microbagging Estimators: An Ensemble Approach to Distance-weighted Classifiers», in Journal of Machine Learning Research - Proc. 3rd Asian Conference on Machine Learning (ACML 2011), Taoyuan, Taiwan, 2011, vol 20, pagg 63-79. (481.46 KB)
B. Nelson, Biggio, B., e Laskov, P., «Understanding the Risk Factors of Learning in Adversarial Environments», in 4th ACM Workshop on Artificial Intelligence and Security (AISec 2011), Chicago, IL, USA, 2011, pagg 87–92. (132.42 KB)
W. W. Y. Ng, Hu, J., Yeung, D., Yin, S., e Roli, F., «Diversified Sensitivity based Undersampling for Imbalance Classification Problems», IEEE Transactions on Cybernetics, In Press. (1.91 MB)
V. - T. Ninh, Le, T. - K., Zhou, L., Piras, L., Riegler, M., Lux, M., Tran, M. - T., Gurrin, C., e Dang-Nguyen, D. - T., «LIFER 2.0: Discovering Personal Lifelog Insights using an Interactive Lifelog Retrieval System», in Working Notes of {CLEF} 2019 - Conference and Labs of the Evaluation Forum, Lugano, Switzerland, September 9-12, 2019., 2019. (1.56 MB)
C. Pagano, Granger, E., Sabourin, R., Marcialis, G. L., e Roli, F., «Dynamic weighted fusion of adaptive classifier ensembles based on changing data streams, In: Gayar N.E., Schwenker F., Suen C.Y, , , pp», in 6th IAPR TC3 International Workshop on Artificial Neural Networks for Pattern Recognition (ANNPR 2014), 2014, vol Springer LNAI 8774, pagg 105-116. (1.89 MB)
C. Pagano, Granger, E., Sabourin, R., Marcialis, G. L., e Roli, F., «Adaptive Ensembles for Face Recognition in Changing Video Surveillance Environments», Information Sciences, vol 206, 2014. (3.17 MB)
C. Pagano, Granger, E., Sabourin, R., Marcialis, G. L., e Roli, F., «Adaptive Classification for Person Re-Identification Driven by Change Detection», in 3rd Int. Conf. on Pattern Recognition Applications and Methods (ICPRAM 2014), 2014. (316.11 KB)
C. Pagano, Granger, E., Sabourin, R., Rattani, A., Marcialis, G. L., e Roli, F., «Efficient Adaptive Face Recognition Systems Based on Capture Conditions, Proc. of », in IEEE Workshop on Computational Intelligence in Biometrics and Identity Management (CIBIM 2014), 2014. (574.39 KB)
F. Pala, Satta, R., Fumera, G., e Roli, F., «Multi-modal Person Re-Identification Using RGB-D Cameras», IEEE Transactions on Circuits and Systems for Video Technology, 2015. (1.58 MB) (29.9 KB)
R. Paolucci, Coli, P., e Giacinto, G., «Assessment of seismic site effects in 2-D alluvial valleys using neural networks», Earthquake Spectra, vol 16, pagg 661-680, 2000.
P. Pellegretti, Roli, F., Serpico, S. B., e Vernazza, G., «Supervised learning of descriptions for image recognition purposes», IEEE Transactions on Pattern Analysis and Machine Intelligence, vol 16, pagg 92-98, 1994.
R. Perdisci, Corona, I., Dagon, D., e Lee, W., «Detecting Malicious Flux Service Networks through Passive Analysis of Recursive DNS Traces», in Annual Computer Security Applications Conference (ACSAC), Honolulu, Hawaii, USA, 2009. (206.97 KB)
R. Perdisci, Ariu, D., e Giacinto, G., «Scalable Fine-Grained Behavioral Clustering of HTTP-Based Malware», Computer Networks - Special Issue on Botnet Activity: Analysis, Detection and Shutdown, vol 57, pagg 487-500, 2013. (797.8 KB)
R. Perdisci, «Statistical Pattern Recognition Techniques for Intrusion Detection in Computer Networks. Challenges and Solutions.», Cagliari (Italy), 2007.
R. Perdisci, Corona, I., e Giacinto, G., «Early Detection of Malicious Flux Networks via Large-Scale Passive DNS Traffic Analysis», IEEE Transactions on Dependable and Secure Computing, vol 9, pagg 714-726, 2012. (1.37 MB)
R. Perdisci, Giacinto, G., e Roli, F., «Alarm clustering for intrusion detection systems in computer networks», Engineering Applications of Artificial Intelligence, vol 19, pagg 429-438, 2006.
R. Perdisci, Ariu, D., Fogla, P., Giacinto, G., e Lee, W., «McPAD: A Multiple Classifier System for Accurate Payload-based Anomaly Detection», Computer Networks, vol 53, pagg 864-881, 2009. (882.94 KB)