Export 437 results:
A B C D E F G H I J K L M N O P Q R S T U V W X Y Z 
L. Didaci e Giacinto, G., «Dynamic Classifier Selection by Adaptive k-Nearest-Neighbourhood Rule», in 5th Int. Workshop on Multiple Classifier Systems (MCS 2004), 2004, vol 3077.
G. Giacinto e Roli, F., «Dynamic Classifier Selection Based on Multiple Classifier Behaviour», Pattern Recognition, vol 34, pagg 179-181, 2001.
G. Giacinto e Roli, F., «Dynamic Classifier Selection», in First Int. Workshop on Multiple Classifier Systems (MCS 2000), Cagliari, Italy, 2000, vol 1857, pagg 177-189.
L. Didaci, «Dynamic Classifier Selection», Cagliari (Italy), 2005.
A. Rattani, Marcialis, G. L., Granger, E., e Roli, F., «A Dual-staged Classification-Selection Approach for Automated Update of Biometric Templates», in International Conference on Pattern Recognition (ICPR), Tsukuba Science City, JAPAN, 2012.
G. Suarez-Tangil, Dash, S. Kumar, Ahmadi, M., Kinder, J., Giacinto, G., e Cavallaro, L., «DroidSieve: Fast and Accurate Classification of Obfuscated Android Malware», in Proceedings of the Seventh {ACM} Conference on Data and Application Security and Privacy, {CODASPY} 2017, In Press. (478.59 KB)
S. Kumar Dash, Suarez-Tangil, G., Khan, S., Tam, K., Ahmadi, M., Kinder, J., e Cavallaro, L., «DroidScribe: Classifying Android Malware Based on Runtime Behavior», in Mobile Security Technologies (MoST 2016), 2016. (571.22 KB)
M. Narouei, Ahmadi, M., Giacinto, G., Takabi, H., e Sami, A., «DLLMiner: structural mining for malware detection», Security and Communication Networks, 2015. (731.78 KB)
L. Piras, Tronci, R., e Giacinto, G., «Diversity in ensembles of codebooks for visual concept detection», in 17th Int. Conference on Image Analysis and Processing (ICIAP), Naples, Italy, 2013. (303.73 KB)
L. Didaci, Fumera, G., e Roli, F., «Diversity in classifier ensembles: fertile concept or dead end?», in 11th Int. Workshop on Multiple Classifier Systems, Nanjing, China, 2013, vol 7872. (241.27 KB) (163.54 KB)
W. W. Y. Ng, Hu, J., Yeung, D., Yin, S., e Roli, F., «Diversified Sensitivity based Undersampling for Imbalance Classification Problems», IEEE Transactions on Cybernetics, In Press. (1.91 MB)
R. Satta, «Dissimilarity-based people re-identification and search for intelligent video surveillance», University of Cagliari, Cagliari (Italy), 2013. (7.08 MB)
G. Giacinto e Roli, F., «Dissimilarity Representation of Images for Relevance Feedback in Content-Based Image Retrieval», in Machine Learning and Data Mining in Pattern Recognition (MLDM 2003), Leipzig, Germany, 2003, vol 2734, pagg 202-214.
L. Piras e Giacinto, G., «Dissimilarity representation in multi-feature spaces for image retrieval», in 16th Int. Conference on Image Analysis and Processing (ICIAP), Ravenna, Italy, 2011. (252.22 KB)
D. Maiorca e Biggio, B., «Digital Investigation of PDF Files: Unveiling Traces of Embedded Malware», IEEE Security and Privacy: Special Issue on Digital Forensics, vol 17, n° 1, pagg 63-71, 2019. (838.95 KB)
I. Corona, «Detection of Web-based attacks», University of Cagliari, Cagliari (Italy), 2010.
I. Corona e Giacinto, G., «Detection of server side web attacks», in Workshop on Applications of Pattern Analysis, Cumberland Lodge, London, UK, 2010. (308.33 KB)
D. Maiorca, Russu, P., Corona, I., Biggio, B., e Giacinto, G., «Detection of Malicious Scripting Code through Discriminant and Adversary-Aware API Analysis», in 1st Italian Conference on CyberSecurity (ITASEC), 2017, vol 1816, pagg 96-105. (371.53 KB)
I. Sanchez, Satta, R., Giuliani, R., e Baldini, G., «Detection of DECT identity spoofing through Radio Frequency fingerprinting», in 38th International Convention on Information and Communication Technology, Electronics and Microelectronics (MIPRO 2015), Opatija, Croatia, 2015. (778.81 KB)
M. Ahmadi, Biggio, B., Arzt, S., Ariu, D., e Giacinto, G., «Detecting Misuse of Google Cloud Messaging in Android Badware», in 6th Workshop on Security and Privacy in Smartphones and Mobile Devices (SPSM), Vienna, Austria, 2016, pagg 103-112. (626.38 KB)
R. Perdisci, Corona, I., Dagon, D., e Lee, W., «Detecting Malicious Flux Service Networks through Passive Analysis of Recursive DNS Traces», in Annual Computer Security Applications Conference (ACSAC), Honolulu, Hawaii, USA, 2009. (206.97 KB)
G. L. Foresti, Giacinto, G., e Roli, F., «Detecting Dangerous Behaviours of Mobile Objects in Parking Areas», in 2nd European Workshop on Advanced Video-based Surveillance Systems (AVBS2001), London, United Kingdom, 2001.
G. L. Foresti, Giacinto, G., e Roli, F., «Detecting Dangerous Behaviors of Mobile Objects in Parking Areas», in Multisensor Surveillance Systems: The Fusion Perspective, R. G. L. C. Foresti e Varshney, P. Kluwer Academic Publishers, 2003, pagg 199-211.
F. Crecchi, Bacciu, D., e Biggio, B., «Detecting Adversarial Examples through Nonlinear Dimensionality Reduction», in 27th European Symposium on Artificial Neural Networks, Computational Intelligence and Machine Learning - ESANN '19, 2019, pagg 483-488. (552.39 KB)
R. Tronci, Giacinto, G., e Roli, F., «Designing multiple biometric systems: measures of ensemble effectiveness», Engineering Applications of Artificial Intelligence, vol 22, pagg 66-78, 2009.