Publications

Export 437 results:
Conference Paper
G. Giacinto e Roli, F., «Dissimilarity Representation of Images for Relevance Feedback in Content-Based Image Retrieval», in Machine Learning and Data Mining in Pattern Recognition (MLDM 2003), Leipzig, Germany, 2003, vol 2734, pagg 202-214.
L. Piras e Giacinto, G., «Dissimilarity representation in multi-feature spaces for image retrieval», in 16th Int. Conference on Image Analysis and Processing (ICIAP), Ravenna, Italy, 2011. (252.22 KB)
I. Corona e Giacinto, G., «Detection of server side web attacks», in Workshop on Applications of Pattern Analysis, Cumberland Lodge, London, UK, 2010. (308.33 KB)
D. Maiorca, Russu, P., Corona, I., Biggio, B., e Giacinto, G., «Detection of Malicious Scripting Code through Discriminant and Adversary-Aware API Analysis», in 1st Italian Conference on CyberSecurity (ITASEC), 2017, vol 1816, pagg 96-105. (371.53 KB)
I. Sanchez, Satta, R., Giuliani, R., e Baldini, G., «Detection of DECT identity spoofing through Radio Frequency fingerprinting», in 38th International Convention on Information and Communication Technology, Electronics and Microelectronics (MIPRO 2015), Opatija, Croatia, 2015. (778.81 KB)
M. Ahmadi, Biggio, B., Arzt, S., Ariu, D., e Giacinto, G., «Detecting Misuse of Google Cloud Messaging in Android Badware», in 6th Workshop on Security and Privacy in Smartphones and Mobile Devices (SPSM), Vienna, Austria, 2016, pagg 103-112. (626.38 KB)
R. Perdisci, Corona, I., Dagon, D., e Lee, W., «Detecting Malicious Flux Service Networks through Passive Analysis of Recursive DNS Traces», in Annual Computer Security Applications Conference (ACSAC), Honolulu, Hawaii, USA, 2009. (206.97 KB)
G. L. Foresti, Giacinto, G., e Roli, F., «Detecting Dangerous Behaviours of Mobile Objects in Parking Areas», in 2nd European Workshop on Advanced Video-based Surveillance Systems (AVBS2001), London, United Kingdom, 2001.
F. Crecchi, Bacciu, D., e Biggio, B., «Detecting Adversarial Examples through Nonlinear Dimensionality Reduction», in 27th European Symposium on Artificial Neural Networks, Computational Intelligence and Machine Learning - ESANN '19, 2019, pagg 483-488. (552.39 KB)
B. Biggio, Fumera, G., e Roli, F., «Design of Robust Classifiers for Adversarial Environments», in IEEE International Conference on Systems, Man, and Cybernetics (SMC 2011), Anchorage, Alaska, USA, 2011, pagg 977–982. (328.68 KB)
G. Giacinto, Roli, F., e Fumera, G., «Design of effective multiple classifier systems by clustering of classifiers», in 15th Int. Conference on Pattern Recognition (ICPR 2000), Barcelona, Spain, 2000, vol 2, pagg 160-163.
P. Piredda, Ariu, D., Biggio, B., Corona, I., Piras, L., Giacinto, G., e Roli, F., «Deepsquatting: Learning-based Typosquatting Detection at Deeper Domain Levels», in 16th International Conference of the Italian Association for Artificial Intelligence (AI*IA 2017), 2017, vol 10640 of LNCS, pagg 347-358. (1.21 MB)
M. Melis, Demontis, A., Biggio, B., Brown, G., Fumera, G., e Roli, F., «Is Deep Learning Safe for Robot Vision? Adversarial Examples against the iCub Humanoid», in ICCV 2017 Workshop on Vision in Practice on Autonomous Robots (ViPAR), Venice, Italy, 2017, vol 2017 IEEE International Conference on Computer Vision Workshops (ICCVW), pagg 751-759. (3.16 MB)
B. Biggio, Pillai, I., Rota Bulò, S., Ariu, D., Pelillo, M., e Roli, F., «Is Data Clustering in Adversarial Settings Secure?», in AISec'13: Proceedings of the 2013 ACM Workshop on Artificial Intelligence and Security, Berlin, 2013, pagg 87-98. (300.52 KB)
G. Fumera e Roli, F., «Cost-sensitive Learning in Support Vector Machines», in Workshop on Machine Learning, Methods and Applications, held in the context of the 8th Meeting of the Italian Association of Artificial Intelligence (AI*IA), Siena, Italy, 2002.
L. Kuncheva, Roli, F., Marcialis, G. L., e Shipp, C., «Complexity of Data Subsets Generated by the Random Subspace Method: an Experimental Investigation», in 2nd International Workshop on Multiple Classifier Systems (MCS 2001), 2001, vol 2096, pagg 349-358.
M. Mohan Chakka, Anjos, A., Marcel, S., Tronci, R., Muntoni, D., Fadda, G., Pili, M., Sirena, N., Murgia, G., Ristori, M., e Roli, F., «Competition on Counter Measures to 2-D Facial Spoofing Attacks», in International Joint Conference on Biometrics (IJCB 2011), 2011.
F. Alonso, Roli, F., Marcialis, G. L., Fierrez, J., e Ortega, J., «Comparison of fingerprint quality measures using an optical and a capacitive sensor», in IEEE Conference on Biometrics: Theory, Applications and Systems (BTAS07), Washington DC (USA), 2007, pagg 1-6.
M. A. A. Dewan, Granger, E., Sabourin, R., Roli, F., e Marcialis, G. L., «A comparison of adaptive appearance methods for tracking faces in video surveillance», in 5th International Conference on Imaging for Crime Detection and Prevention (ICDP-13), 2013.
G. Giacinto, Roli, F., e Fumera, G., «Comparison and Combination of Adaptive Query Shifting and Feature Relevance Learning for Content-Based Image Retrieval», in 11th International Conference on Image Analysis and Processing (ICIAP 2001), Palermo, Italy, 2001, pagg 422-427.
J. Austin, Giacinto, G., Kanellopoulos, I., Lees, K., Roli, F., Vernazza, G., e Wilkinson, G., «The COMPARES Project: COnnectionist Methods for Preprocessing and Analysis of REmote Sensing data», in 9th International Conference on Image Analysis and Processing, 1997, vol 1311, pagg 765-772.
Y. Guan, Wei, X., Li, C. - T., Marcialis, G. L., Roli, F., e Tistarelli, M., «Combining Gait and Face for Tackling the Elapsed Time Challenges», in IEEE 6th International Conference on Biometrics: Theory, Applications, and Systems (BTAS 2013), Washington DC (USA), 2013, pagg 1-8. (663.7 KB)
R. Tronci, Giacinto, G., e Roli, F., «Combination of experts by classifiers in similarity score spaces», in Joint IAPR Int. Workshop on Structural and Syntactical Pattern Recognition and Statistical Techniques in Pattern Recognition S+SSPR08, Orlando (Florida, USA), 2008, vol 5342, pagg 821-830.
M. Aresu, Ariu, D., Ahmadi, M., Maiorca, D., e Giacinto, G., «Clustering Android Malware Families by Http Traffic», in 10h International Conference on Malicious and Unwanted Software (MALCON 2015), October 20-22th 2015, Fajardo, Puerto Rico, USA, 2015. (168.36 KB)
P. Tuveri, Mura, V., Marcialis, G. L., e Roli, F., «A classification-selection approach for self updating of face verification systems under stringent storage and computational requirements», in 18th IAPR Int. Conf. on Image Analysis and Processing (ICIAP), 2015, vol 9280, pagg 540-550. (408.79 KB)

Pages