Publications

Export 420 results:
A B C D E F G H I J K L M N O P Q R S T U V W X Y Z 
B
B. Biggio, Fumera, G., Marcialis, G. L., e Roli, F., «Security of pattern recognition systems in adversarial environments». 2012. (235.41 KB)
B. Biggio, Fumera, G., Pillai, I., e Roli, F., «A survey and experimental evaluation of image spam filtering techniques», Pattern Recognition Letters, vol 32, pagg 1436 - 1446, 2011. (2.12 MB)
B. Biggio, Corona, I., Maiorca, D., Nelson, B., Srndic, N., Laskov, P., Giacinto, G., e Roli, F., «Evasion attacks against machine learning at test time», in European Conference on Machine Learning and Principles and Practice of Knowledge Discovery in Databases (ECML PKDD), 2013, vol 8190, pagg 387-402. (473.78 KB)
B. Biggio, Nelson, B., e Laskov, P., «Poisoning attacks against support vector machines», in 29th Int'l Conf. on Machine Learning (ICML), 2012, pagg 1807–1814. (452.94 KB)
B. Biggio, Corona, I., He, Z. - M., Chan, P. P. K., Giacinto, G., Yeung, D. S., e Roli, F., «One-and-a-half-class Multiple Classifier Systems for Secure Learning against Evasion Attacks at Test Time», in Int'l Workshop on Multiple Classifier Systems (MCS), 2015, vol 9132, pagg 168-180. (467.23 KB)
B. Biggio, Fumera, G., Pillai, I., Roli, F., e Satta, R., «Evading SpamAssassin with obfuscated text images», Virus Bulletin, n° 11-2007, 2007. (689 KB)
B. Biggio, Akhtar, Z., Fumera, G., Marcialis, G. L., e Roli, F., «Robustness of multi-modal biometric verification systems under realistic spoofing attacks», in Int’l Joint Conference on Biometrics (IJCB), Washington DC, USA, 2011. (2.25 MB)
B. Biggio, Fumera, G., e Roli, F., «Evade Hard Multiple Classifier Systems», in Workshop on Supervised and Unsupervised Ensemble Methods and Their Applications (SUEMA 2008), Patras, Greece, 2008. (185.01 KB)
B. Biggio, Fumera, G., Marcialis, G. L., e Roli, F., «Statistical Meta-Analysis of Presentation Attacks for Secure Multibiometric Systems», IEEE Transactions on Pattern Analysis and Machine Intelligence, vol 39, n° 3, pagg 561-575, 2017. (5.7 MB)
B. Biggio, Didaci, L., Fumera, G., e Roli, F., «Poisoning attacks to compromise face templates», in 6th IAPR Int'l Conf. on Biometrics (ICB), Madrid, Spain, 2013. (844.61 KB)
B. Biggio, Fumera, G., e Roli, F., «Bayesian Analysis of Linear Combiners», in 7th Int. Workshop on Multiple Classifier Systems (MCS 2007), Prague, Czech Republic, 2007, vol 4472, pagg 292-301. (149.24 KB)
B. Biggio, Fumera, G., e Roli, F., «Pattern Recognition Systems under Attack: Design Issues and Research Challenges», Int'l J. Patt. Recogn. Artif. Intell., vol 28, n° 7, pag 1460002, 2014. (1.41 MB)
B. Biggio, Fumera, G., Russu, P., Didaci, L., e Roli, F., «Adversarial Biometric Recognition: A Review on Biometric System Security from the Adversarial Machine Learning Perspective», IEEE Signal Processing Magazine, vol 32, n° 5, pagg 31-41, 2015. (751.08 KB)
B. Biggio, Nelson, B., e Laskov, P., «Support Vector Machines Under Adversarial Label Noise», in Journal of Machine Learning Research - Proc. 3rd Asian Conference on Machine Learning (ACML 2011), Taoyuan, Taiwan, 2011, vol 20, pagg 97-112. (533.74 KB)
B. Biggio, Rota Bulò, S., Pillai, I., Mura, M., Zemene Mequanint, E., Pelillo, M., e Roli, F., «Poisoning complete-linkage hierarchical clustering», in Joint IAPR Int'l Workshop on Structural, Syntactic, and Statistical Pattern Recognition (LNCS), Joensuu, Finland, 2014, vol 8621, pagg 42-52. (388.31 KB)
B. Biggio, «Adversarial Pattern Classification», University of Cagliari, Cagliari (Italy), 2010. (2.65 MB)
L. Bruzzone, Roli, F., e Serpico, S. B., «An extension of the Jeffreys-Matusita distance to multiclass cases for feature selection», IEEE Transactions on Geoscience and Remote Sensing, vol 33, pagg 1318-1321, 1995.
L. Bruzzone, Conese, C., Maselli, F., e Roli, F., «Multisource classification of complex rural areas by statistical and neural-network approaches», Int. Journal on Photogrammetric Engineering and Remote Sensing (PE&RS), vol 63, pagg 523-533, 1997.
C
A. Carcangiu, Spano, L. Davide, Fumera, G., e Roli, F., «DEICTIC: a Compositional and Declarative Gesture Description based on Hidden Markov Model», International Journal of Human-Computer Studies, In Press.
M. Mohan Chakka, Anjos, A., Marcel, S., Tronci, R., Muntoni, D., Fadda, G., Pili, M., Sirena, N., Murgia, G., Ristori, M., e Roli, F., «Competition on Counter Measures to 2-D Facial Spoofing Attacks», in International Joint Conference on Biometrics (IJCB 2011), 2011.
P. Coli, Marcialis, G. L., e Roli, F., «Vitality detection from fingerprint images: a critical survey», in 2nd International Conference on Biometrics ICB 2007, Seoul (South Korea), 2007, vol 4642, pagg 722-731.
P. Coli, Marcialis, G. L., e Roli, F., «Power spectrum-based fingerprint vitality detection», in IEEE Workshop on Automatic Identification Advanced Technologies AutoID 2007, 2007, pagg 169-173.
P. Coli, «Vitality detection in personal authentication systems using fingerprints», Cagliari (Italy), 2008.
P. Coli, Marcialis, G. L., e Roli, F., «Fingerprint silicon replicas: static and dynamic features for vitality detection using an optical capture device», International Journal of Image and Graphics, vol 8, pagg 495-512, 2008.
P. Coli, Marcialis, G. L., e Roli, F., «Analysis and selection of features for the fingerprint vitality detection», in Joint IAPR Int. Workshop. on Structural and Syntactical Pattern Recognition and Statistical Techniques in Pattern Recognition S+SSPR06, 2006, vol 4109, pagg 907-915.

Pages