Publications

Export 434 results:
A B C D E F G H I J K L M N O P Q R S T U V W X Y Z 
D
A. Demontis, Melis, M., Biggio, B., Fumera, G., e Roli, F., «Super-sparse Learning in Similarity Spaces», IEEE Computational Intelligence Magazine, vol 11, n° 4, pagg 36-45, 2016. (555.22 KB)
A. Demontis, Melis, M., Biggio, B., Maiorca, D., Arp, D., Rieck, K., Corona, I., Giacinto, G., e Roli, F., «Yes, Machine Learning Can Be More Secure! A Case Study on Android Malware Detection», IEEE Trans. Dependable and Secure Computing, vol 16, n° 4, pagg 711-724, 2019. (3.61 MB)
A. Demontis, Melis, M., Pintor, M., Jagielski, M., Biggio, B., Oprea, A., Nita-Rotaru, C., e Roli, F., «Why Do Adversarial Attacks Transfer? Explaining Transferability of Evasion and Poisoning Attacks», in 28th Usenix Security Symposium, Santa Clara, California, USA, 2019, vol 28th {USENIX} Security Symposium ({USENIX} Security 19), pag 321--338. (1.09 MB)
A. Demontis, Russu, P., Biggio, B., Fumera, G., e Roli, F., «On Security and Sparsity of Linear Classifiers for Adversarial Settings», in Joint IAPR Int'l Workshop on Structural, Syntactic, and Statistical Pattern Recognition, Merida, Mexico, 2016, vol 10029 of LNCS, pagg 322-332. (425.68 KB)
A. Demontis, Biggio, B., Fumera, G., Giacinto, G., e Roli, F., «Infinity-norm Support Vector Machines against Adversarial Label Contamination», 1st Italian Conference on CyberSecurity (ITASEC). Venice, Italy , pagg 106-115, 2017. (504.93 KB)
L. Demetrio, Biggio, B., Lagorio, G., Roli, F., e Armando, A., «Explaining Vulnerabilities of Deep Learning to Adversarial Malware Binaries», in 3rd Italian Conference on Cyber Security, ITASEC 2019, Pisa, Italy, 2019, vol 2315. (801.85 KB)
R. Delussu, Putzu, L., e Fumera, G., «An Empirical Evaluation of Cross-scene Crowd Counting Performance», in Proceedings of the 15th International Joint Conference on Computer Vision, Imaging and Computer Graphics Theory and Applications - VISAPP, Valletta - Malta, 2020, vol 4, pagg 373-380. (527.29 KB)
R. Delussu, Putzu, L., e Fumera, G., «Investigating Synthetic Data Sets for Crowd Counting in Cross-scene Scenarios», in Proceedings of the 15th International Joint Conference on Computer Vision, Imaging and Computer Graphics Theory and Applications VISAPP 2020, Valletta - Malta, 2020, vol 4, pagg 365-372. (4.23 MB)
S. Kumar Dash, Suarez-Tangil, G., Khan, S., Tam, K., Ahmadi, M., Kinder, J., e Cavallaro, L., «DroidScribe: Classifying Android Malware Based on Runtime Behavior», in Mobile Security Technologies (MoST 2016), 2016. (571.22 KB)
D. - T. Dang-Nguyen, Piras, L., Riegler, M., Zhou, L., Lux, M., Tran, M. - T., Le, T. - K., Ninh, V. - T., e Gurrin, C., «Overview of ImageCLEFlifelog 2019: Solve My Life Puzzle and Lifelog Moment Retrieval», in Working Notes of {CLEF} 2019 - Conference and Labs of the Evaluation Forum, Lugano, Switzerland, September 9-12, 2019., 2019. (4.58 MB)
D. - T. Dang-Nguyen, Piras, L., Giacinto, G., Boato, G., e De Natale, F. G. B., «Retrieval of Diverse Images by Pre-filtering and Hierarchical Clustering», in MediaEval (Online Working Notes), Barcelona; Spain, 2014, vol 1263. (221.52 KB)
D. - T. Dang-Nguyen, Boato, G., De Natale, F. G. B., Piras, L., Giacinto, G., Tuveri, F., e Angioni, M., «Multimodal-based Diversified Summarization in Social Image Retrieval», in Working Notes Proceedings of the MediaEval 2015 Workshop, Wurzen, Germany, September 14-15, 2015., 2015. (755.79 KB)
D. - T. Dang-Nguyen, Piras, L., Giacinto, G., Boato, G., e De Natale, F. G. B., «A Hybrid Approach for Retrieving Diverse Social Images of Landmarks», in IEEE International Conference on Multimedia & Expo (ICME), Torino, 2015. (1.16 MB)
D. - T. Dang-Nguyen, Piras, L., Riegler, M., Zhou, L., Lux, M., e Gurrin, C., «Overview of ImageCLEFlifelog 2018: Daily Living Understanding and Lifelog Moment Retrieval», in Working Notes of {CLEF} 2018 - Conference and Labs of the Evaluation Forum, Avignon, France, September 10-14, 2018., 2018. (2.01 MB)
D. - T. Dang-Nguyen, Piras, L., Riegler, M., Boato, G., Zhou, L., e Gurrin, C., «Overview of ImageCLEFlifelog 2017: Lifelog Retrieval and Summarization», in CLEF2017 Working Notes, Dublin, Ireland, 2017, vol 1866. (1.7 MB)
D. - T. Dang-Nguyen, Piras, L., Riegler, M., Gurrin, C., Boato, G., e Halvorsen, P., «ImageCLEF 2017 LifeLog task», in Challenges in Machine Learning: Gaming and Education (CiML - NIPS 2016 workshop), Barcelona, Spain, 2016. (80.25 KB)
D. - T. Dang-Nguyen, Piras, L., Giacinto, G., Boato, G., e De Natale, F. G. B., «Multimodal Retrieval with Diversification and Relevance Feedback for Tourist Attraction Images», ACM Transactions on Multimedia Computing, Communications, and Applications, vol 13, n° 4, 2017. (5.94 MB)
C
C. Cusano, Satta, R., e Santini, S., «Unsupervised Classemes», in 2012 ECCV Workshop on Information Fusion in Computer Vision for Concept Recognition (IFCVCR 2012), Firenze (Italy), 2012. (259.36 KB)
A. Crobe, Demuru, M., Didaci, L., Marcialis, G. L., e Fraschini, M., «Minimum spanning tree and K-Core decomposition as measure of subject-specific EEG traits», Biomedical Physics and Engineering Express, vol 1, n° 2, pag 017001, 2016. (802.39 KB)
F. Crecchi, Bacciu, D., e Biggio, B., «Detecting Adversarial Examples through Nonlinear Dimensionality Reduction», in 27th European Symposium on Artificial Neural Networks, Computational Intelligence and Machine Learning - ESANN '19, 2019, pagg 483-488. (552.39 KB)
E. Costamagna, Fanni, A., e Giacinto, G., «A simulated annealing algorithm for the optimization of communication network», in Int. Symp. on Signals, Systems and Electronics (ISSSE '95), 1995, pagg 405-408.
E. Costamagna, Fanni, A., e Giacinto, G., «A Tabu Search algorithm for the optimisation of telecommunication networks», European Journal of Operational Research, vol 106, pagg 357-372, 1998.
I. Corona, Giacinto, G., Mazzariello, C., Roli, F., e Sansone, C., «Information fusion for computer security: State of the art and open issues», Information Fusion, vol 10, pagg 274-284, 2009.
I. Corona, Maiorca, D., Ariu, D., e Giacinto, G., «Lux0R: Detection of Malicious PDF-embedded JavaScript code through Discriminant Analysis of API References», in AISec'14: Proceedings of the 2014 ACM Workshop on Artificial Intelligence and Security, co-located with CCS '14, Scottdale, Arizona, USA, 2014. (455.14 KB)
I. Corona, Biggio, B., Contini, M., Piras, L., Corda, R., Mereu, M., Mureddu, G., Ariu, D., e Roli, F., «DeltaPhish: Detecting Phishing Webpages in Compromised Websites», 22nd European Symposium on Research in Computer Security (ESORICS), vol 10492. Springer International Publishing, Norway, September 11-15, 2017, pagg 370–388, 2017. (4.13 MB)

Pages