Publications

Export 434 results:
A B C D E F G H I J K L M N O P Q R S T U V W X Y Z 
A
Z. Akhtar, Fumera, G., Marcialis, G. L., e Roli, F., «Evaluation of serial and parallel multibiometric systems under spoofing attacks», in 5th IEEE Int'l Conference on Biometrics: Theory, Applications and Systems (BTAS), Washington DC, USA, 2012, vol . (573.02 KB)
Z. Akhtar, Fumera, G., Marcialis, G. L., e Roli, F., «Evaluation of Multimodal Biometric Score Fusion Rules under Spoof Attacks», in 5th IAPR Int’l Conference on Biometrics (ICB), New Delhi, India, 2012, pagg 402-407. (612.37 KB)
Z. Akhtar, «Security of Multimodal Biometric Systems against Spoof Attacks», University of Cagliari, Cagliari (Italy), 2012. (6.38 MB)
Z. Akhtar, Fumera, G., Marcialis, G. L., e Roli, F., «Robustness analysis of likelihood ratio score fusion rule for multi-modal biometric systems under spoof attacks», in 45th IEEE Int’l Carnahan Conference on Security Technology (ICCST) , Barcelona, Spain, 2011, pagg 237-244. (812.36 KB)
Z. Akhtar, Fumera, G., Marcialis, G. L., e Roli, F., «Robustness Evaluation of Biometric Systems under Spoof Attacks», in 16th Int’l Conference on Image Analysis and Processing (ICIAP), Ravenna, Italy, 2011, pagg 159-168. (220.73 KB)
M. Ahmed, Didaci, L., Fumera, G., Roli, F., e Lavi, B., «Using Diversity for Classifier Ensemble Pruning: An Empirical Investigation», Theoretical and Applied Informatics, vol 29, n° 1&2, pagg 25-39, 2017.
M. A. O. Ahmed, Didaci, L., Fumera, G., e Roli, F., «An Empirical Investigation on the Use of Diversity for Creation of Classifier Ensembles», in Multiple Classifier Systems, 2015, vol 9132, pagg 206-219. (216.76 KB)
M. Ahmadi, Biggio, B., Arzt, S., Ariu, D., e Giacinto, G., «Detecting Misuse of Google Cloud Messaging in Android Badware», in 6th Workshop on Security and Privacy in Smartphones and Mobile Devices (SPSM), Vienna, Austria, 2016, pagg 103-112. (626.38 KB)
M. Ahmadi, Ulyanov, D., Semenov, S., Trofimov, M., e Giacinto, G., «Novel Feature Extraction, Selection and Fusion for Effective Malware Family Classification», in Proceedings of the Sixth ACM on Conference on Data and Application Security and Privacy, 2016, pagg 183–194. (6.49 MB)

Pages