Export 437 results:
Journal Article
B. Biggio, Fumera, G., Pillai, I., e Roli, F., «A survey and experimental evaluation of image spam filtering techniques», Pattern Recognition Letters, vol 32, pagg 1436 - 1446, 2011. (2.12 MB)
L. Piras e Giacinto, G., «Synthetic Pattern Generation for Imbalanced Learning in Image Retrieval», Pattern Recognition Letters, vol 33, pag 7, 2012. (236.64 KB)
E. Costamagna, Fanni, A., e Giacinto, G., «A Tabu Search algorithm for the optimisation of telecommunication networks», European Journal of Operational Research, vol 106, pagg 357-372, 1998.
A. Fanni, Giacinto, G., Marchesi, M., e Serri, A., «Tabu search coupled with deterministic strategies for the optimal design of MRI devices», Int. J. of Applied Electromagnetics and Mechanics, vol 10, pagg 21-31, 1999.
G. Fumera, Roli, F., e Serrau, A., «A Theoretical Analysis of Bagging as a Linear Combination of Classifiers», IEEE Transactions on Pattern Analysis and Machine Intelligence, vol 30, pagg 1293-1299, 2008. (895.49 KB)
G. Fumera e Roli, F., «A Theoretical and Experimental Analysis of Linear Combiners for Multiple Classifier Systems», IEEE Transactions on Pattern Analysis and Machine Intelligence, vol 27, pagg 942-956, 2005. (887.92 KB)
J. Galbally e Satta, R., «Three-dimensional and two-and-a-half- dimensional face recognition spoofing using three-dimensional printed models», IET Biometrics, vol 5, n° 2, 2016. (1.33 MB)
I. Pillai, Fumera, G., e Roli, F., «Threshold optimisation for multi-label classifiers», Pattern Recognition, vol 46, n° 7, 2013. (445.97 KB)
D. Maiorca, Biggio, B., e Giacinto, G., «Towards Adversarial Malware Detection: Lessons Learned from PDF-based Attacks», ACM Computing Surveys, vol 52, n° 4, 2019. (1.21 MB)
M. Ahmed, Didaci, L., Fumera, G., Roli, F., e Lavi, B., «Using Diversity for Classifier Ensemble Pruning: An Empirical Investigation», Theoretical and Applied Informatics, vol 29, n° 1&2, pagg 25-39, 2017.
B. Biggio e Roli, F., «Wild Patterns: Ten Years After the Rise of Adversarial Machine Learning», Pattern Recognition, vol 84, pagg 317-331, 2018. (3.76 MB)
A. Demontis, Melis, M., Biggio, B., Maiorca, D., Arp, D., Rieck, K., Corona, I., Giacinto, G., e Roli, F., «Yes, Machine Learning Can Be More Secure! A Case Study on Android Malware Detection», IEEE Trans. Dependable and Secure Computing, vol 16, n° 4, pagg 711-724, 2019. (3.61 MB)
Magazine Article
B. Biggio, Fumera, G., Pillai, I., Roli, F., e Satta, R., «Evading SpamAssassin with obfuscated text images», Virus Bulletin, n° 11-2007, 2007. (689 KB)
J. Hoffmann, Rytilahti, T., Maiorca, D., Winandy, M., Giacinto, G., e Holz, T., «Evaluating Analysis Tools for Android Apps: Status Quo and Robustness Against Obfuscation», Horst Görtz Institut for IT Security (Ruhr-University Bochum), Technical Report TR-HGI-2016-003, 2016. (519.16 KB)