Publications

Export 437 results:
A B C D E F G H I J K L M N O P Q R S T U V W X Y Z 
P
B. Biggio, Nelson, B., e Laskov, P., «Poisoning attacks against support vector machines», in 29th Int'l Conf. on Machine Learning (ICML), 2012, pagg 1807–1814. (452.94 KB)
D. Solans, Biggio, B., e Castillo, C., «Poisoning Attacks on Algorithmic Fairness», in ECML PKDD, In Press.
B. Biggio, Didaci, L., Fumera, G., e Roli, F., «Poisoning attacks to compromise face templates», in 6th IAPR Int'l Conf. on Biometrics (ICB), Madrid, Spain, 2013. (844.61 KB)
B. Biggio, Rieck, K., Ariu, D., Wressnegger, C., Corona, I., Giacinto, G., e Roli, F., «Poisoning Behavioral Malware Clustering», in AISec'14: Proceedings of the 2014 ACM Workshop on Artificial Intelligence and Security, co-located with CCS '14, Scottsdale, Arizona, USA, 2014, pagg 27-36. (375.58 KB)
B. Biggio, Rota Bulò, S., Pillai, I., Mura, M., Zemene Mequanint, E., Pelillo, M., e Roli, F., «Poisoning complete-linkage hierarchical clustering», in Joint IAPR Int'l Workshop on Structural, Syntactic, and Statistical Pattern Recognition (LNCS), Joensuu, Finland, 2014, vol 8621, pagg 42-52. (388.31 KB)
R. Labaca-Castro, Biggio, B., e Rodosek, G. Dreo, «Poster: Attacking Malware Classifiers by Crafting Gradient-Attacks That Preserve Functionality», in Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications Security, New York, NY, USA, 2019, pagg 2565–2567.
P. Coli, Marcialis, G. L., e Roli, F., «Power spectrum-based fingerprint vitality detection», in IEEE Workshop on Automatic Identification Advanced Technologies AutoID 2007, 2007, pagg 169-173.
D. Ugarte, Maiorca, D., Cara, F., e Giacinto, G., «PowerDrive: Accurate De-Obfuscation and Analysis of PowerShell Malware», 16th Conference on Detection of Intrusions and Malware & Vulnerability Assessment (DIMVA). Springer, Gothenburg, Sweden, pagg 240-259, 2019. (352.39 KB)
L. Piras, Tronci, R., Murgia, G., e Giacinto, G., «The PRA and AmILAB at ImageCLEF 2012 Photo Flickr Annotation Task», in CLEF (Online Working Notes/Labs/Workshop), Rome, 2012. (540.05 KB)
I. Sanchez, Satta, R., Nai-Fovino, I., Baldini, G., Steri, G., Shaw, D., e Ciardulli, A., «Privacy leakages in Smart Home Wireless Technologies», in 2014 IEEE International Carnahan Conference on Security Technology, Rome, Italy, 2014. (329.97 KB)
C. Gurrin, Schoeffmann, K., Joho, H., Dang-Nguyen, D. - T., Riegler, M., e Piras, L., «Proceedings of the 2018 {ACM} Workshop on The Lifelog Search Challenge, LSC@ICMR 2018, Yokohama, Japan, June 11, 2018». {ACM}, 2018.
C. Gurrin, Schöffmann, K., Joho, H., Dang-Nguyen, D. - T., Riegler, M., e Piras, L., «Proceedings of the {ACM} Workshop on Lifelog Search Challenge, LSC@ICMR 2019, Ottawa, ON, Canada, 10 June 2019». ACM, 2019.
G. B. Benciolini, Roli, F., e Wilkinson, G., Proceedings of the workshop "Il Telerilevamento ed i Sistemi Informativi Territoriali nella Gestione delle Risorse Ambientali". Trento, Italy: , 1994.
R. Soleymani, Granger, E., e Fumera, G., «Progressive Boosting for Class Imbalance and Its Application to Face Re-Identification», Expert Systems With Applications, vol 101, pag 21, 2018. (1.11 MB)
Q
G. Giacinto e Roli, F., «Query Shifting Based on Bayesian Decision Theory for Content-Based Image Retrieval», in oint IAPR Int. Workshops on Syntactical and Structural Pattern Recognition and Statistical Pattern Recognition (S+SSPR 2002), 2002, vol 2396, pagg 607-616.
R
S. Rota Bulò, Biggio, B., Pillai, I., Pelillo, M., e Roli, F., «Randomized Prediction Games for Adversarial Machine Learning», IEEE Transactions on Neural Networks and Learning Systems, vol 28, n° 11, pagg 2466-2478, 2017. (1.52 MB) (256.21 KB)
R. Satta, Pala, F., Fumera, G., e Roli, F., «Real-time Appearance-based Person Re-identification over Multiple KinectTM Cameras», in 8th International Conference on Computer Vision Theory and Applications (VISAPP 2013), Barcelona, Spain, 2013. (974.71 KB)
Y. Guan, Li, C. - T., e Roli, F., «On Reducing the Effect of Covariate Factors in Gait Recognition: a Classifier Ensemble Method», IEEE Transactions on Pattern Analysis and Machine Intelligence, In Press. (311.43 KB) (151.4 KB)
G. Fumera, Roli, F., e Giacinto, G., «Reject Option with Multiple Thresholds», Pattern Recognition, vol 33, pagg 2099-2101, 2000.
B. Freni, Marcialis, G. L., e Roli, F., «Replacement algorithms for fingerprint template update», in 5th International Conference on Image Analysis and Recognition (ICIAR 2008), 2008, vol 5112, pagg 884-893.
D. - T. Dang-Nguyen, Piras, L., Giacinto, G., Boato, G., e De Natale, F. G. B., «Retrieval of Diverse Images by Pre-filtering and Hierarchical Clustering», in MediaEval (Online Working Notes), Barcelona; Spain, 2014, vol 1263. (221.52 KB)
L. Ghiani, Yambay, D. A., Mura, V., Marcialis, G. L., Roli, F., e Schuckers, S. A., «Review of the Fingerprint Liveness Detection (LivDet) competition series: 2009 to 2015», Image and Vision Computing, pag -, 2016.
Z. Akhtar, Fumera, G., Marcialis, G. L., e Roli, F., «Robustness analysis of likelihood ratio score fusion rule for multi-modal biometric systems under spoof attacks», in 45th IEEE Int’l Carnahan Conference on Security Technology (ICCST) , Barcelona, Spain, 2011, pagg 237-244. (812.36 KB)
Z. Akhtar, Fumera, G., Marcialis, G. L., e Roli, F., «Robustness Evaluation of Biometric Systems under Spoof Attacks», in 16th Int’l Conference on Image Analysis and Processing (ICIAP), Ravenna, Italy, 2011, pagg 159-168. (220.73 KB)
T. Hupperich, Maiorca, D., Kührer, M., Holz, T., e Giacinto, G., «On the Robustness of Mobile Device Fingerprinting», in 31st Annual Computer Security and Applications Conference (ACSAC 2015), 7-10th December 2015, Los Angeles, USA, 2015, pagg 191-200. (301.87 KB)

Pages