Publications

Export 434 results:
A B C D E F G H I J K L M N O P Q R S T U V W X Y Z 
C
I. Corona, Ariu, D., e Giacinto, G., «HMM-Web: a framework for the detection of attacks against Web applications», in IEEE ICC 2009, Dresden, Germany, 2009. (391.14 KB)
I. Corona, Tronci, R., e Giacinto, G., «SuStorID: A Multiple Classifier System for the Protection of Web Services», in International Conference on Pattern Recognition (ICPR 2012), Tsukuba International Congress Center, Tsukuba Science City, JAPAN, 2012, pagg 2375-2378. (286.16 KB)
I. Corona, Giacinto, G., Mazzariello, C., Roli, F., e Sansone, C., «Information fusion for computer security: State of the art and open issues», Information Fusion, vol 10, pagg 274-284, 2009.
I. Corona, Giacinto, G., e Roli, F., «Intrusion detection in computer systems as a pattern recognition task in adversarial environment: a critical review», in Workshop on Neural Information Processing Systems (NIPS), Whistler, British Columbia, Canada, 2007.
I. Corona, Contini, M., Ariu, D., Giacinto, G., Roli, F., Lund, M., e Marinelli, G., «PharmaGuard: Automatic Identification of Illegal Search-Indexed Online Pharmacies», IEEE International Conference on Cybernetics - Special session Cybersecurity (CYBERSEC). IEEE, Gdynia, Poland , pagg 324 - 329, 2015. (1.44 MB) (3.4 MB)
I. Corona, Giacinto, G., e Roli, F., «Intrusion Detection in Computer Systems using Multiple Classifer Systems», in Supervised and Unsupervised Ensemble Methods and Their Applications, O. Okun and G. Valentini., Springer-Verlag, Berlin/Heidelberg, 2008, pagg 91-114.
I. Corona, Giacinto, G., e Roli, F., «Adversarial Attacks against Intrusion Detection Systems: Taxonomy, Solutions and Open Issues», Information Sciences, vol 239, 2013. (1.49 MB)
I. Corona e Giacinto, G., «Detection of server side web attacks», in Workshop on Applications of Pattern Analysis, Cumberland Lodge, London, UK, 2010. (308.33 KB)
M. Contini, Corona, I., Mulas, A., Giacinto, G., e Ariu, D., «Pharmaguard WebApp: an application for the detection of illegal online pharmacies», 2nd International Workshop on Knowledge Discovery on the WEB (KDWEB). Cagliari, 2016. (120.57 KB)
P. Coli, Marcialis, G. L., e Roli, F., «Power spectrum-based fingerprint vitality detection», in IEEE Workshop on Automatic Identification Advanced Technologies AutoID 2007, 2007, pagg 169-173.
P. Coli, «Vitality detection in personal authentication systems using fingerprints», Cagliari (Italy), 2008.
P. Coli, Marcialis, G. L., e Roli, F., «Analysis and selection of features for the fingerprint vitality detection», in Joint IAPR Int. Workshop. on Structural and Syntactical Pattern Recognition and Statistical Techniques in Pattern Recognition S+SSPR06, 2006, vol 4109, pagg 907-915.
P. Coli, Marcialis, G. L., e Roli, F., «Fingerprint silicon replicas: static and dynamic features for vitality detection using an optical capture device», International Journal of Image and Graphics, vol 8, pagg 495-512, 2008.
P. Coli, Marcialis, G. L., e Roli, F., «Vitality detection from fingerprint images: a critical survey», in 2nd International Conference on Biometrics ICB 2007, Seoul (South Korea), 2007, vol 4642, pagg 722-731.
M. Mohan Chakka, Anjos, A., Marcel, S., Tronci, R., Muntoni, D., Fadda, G., Pili, M., Sirena, N., Murgia, G., Ristori, M., e Roli, F., «Competition on Counter Measures to 2-D Facial Spoofing Attacks», in International Joint Conference on Biometrics (IJCB 2011), 2011.
A. Carcangiu, Spano, L. Davide, Fumera, G., e Roli, F., «DEICTIC: a Compositional and Declarative Gesture Description based on Hidden Markov Model», International Journal of Human-Computer Studies, vol 122, pag 20, 2019. (1.69 MB)
B
L. Bruzzone, Roli, F., e Serpico, S. B., «An extension of the Jeffreys-Matusita distance to multiclass cases for feature selection», IEEE Transactions on Geoscience and Remote Sensing, vol 33, pagg 1318-1321, 1995.
L. Bruzzone, Conese, C., Maselli, F., e Roli, F., «Multisource classification of complex rural areas by statistical and neural-network approaches», Int. Journal on Photogrammetric Engineering and Remote Sensing (PE&RS), vol 63, pagg 523-533, 1997.
B. Biggio, Akhtar, Z., Fumera, G., Marcialis, G. L., e Roli, F., «Security evaluation of biometric authentication systems under real spoofing attacks», IET Biometrics, vol 1, n° 1, pagg 11-24, 2012. (3.21 MB)
B. Biggio, Pillai, I., Rota Bulò, S., Ariu, D., Pelillo, M., e Roli, F., «Is Data Clustering in Adversarial Settings Secure?», in AISec'13: Proceedings of the 2013 ACM Workshop on Artificial Intelligence and Security, Berlin, 2013, pagg 87-98. (300.52 KB)
B. Biggio, Corona, I., Fumera, G., Giacinto, G., e Roli, F., «Bagging classifiers for fighting poisoning attacks in adversarial classification tasks», in Multiple Classifier Systems (MCS 2011), 2011, vol 6713, pagg 350-359. (231.43 KB)
B. Biggio, Fumera, G., e Roli, F., «Multiple Classifier Systems for Robust Classifier Design in Adversarial Environments», Journal of Machine Learning and Cybernetics, vol 1, pagg 27–41, 2010. (844.91 KB)
B. Biggio, Fumera, G., Pillai, I., e Roli, F., «Image Spam Filtering Using Visual Information», in 14th Int. Conf. on Image Analysis and Processing (ICIAP 2007), Modena, Italy, 2007, pagg 105–110. (173.32 KB)
B. Biggio, Fumera, G., Pillai, I., e Roli, F., «Improving Image Spam Filtering Using Image Text Features», in Fifth Conference on Email and Anti-Spam (CEAS 2008), Mountain View, CA, USA, 2008. (154.27 KB)
B. Biggio, Corona, I., Nelson, B., Rubinstein, B. I. P., Maiorca, D., Fumera, G., Giacinto, G., e Roli, F., «Security Evaluation of Support Vector Machines in Adversarial Environments», in Support Vector Machines Applications, Y. Ma e Guo, G. Springer International Publishing, 2014, pagg 105-153. (687.1 KB)

Pages