Export 418 results:
A B C D E F G H I J K L M N O P Q R S T U V W X Y Z 
B. Biggio, Corona, I., He, Z. - M., Chan, P. P. K., Giacinto, G., Yeung, D. S., e Roli, F., «One-and-a-half-class Multiple Classifier Systems for Secure Learning against Evasion Attacks at Test Time», in Int'l Workshop on Multiple Classifier Systems (MCS), 2015, vol 9132, pagg 168-180. (467.23 KB)
B. Biggio, Fumera, G., Pillai, I., Roli, F., e Satta, R., «Evading SpamAssassin with obfuscated text images», Virus Bulletin, n° 11-2007, 2007. (689 KB)
B. Biggio, Fumera, G., e Roli, F., «Evade Hard Multiple Classifier Systems», in Workshop on Supervised and Unsupervised Ensemble Methods and Their Applications (SUEMA 2008), Patras, Greece, 2008. (185.01 KB)
B. Biggio, Fumera, G., Marcialis, G. L., e Roli, F., «Statistical Meta-Analysis of Presentation Attacks for Secure Multibiometric Systems», IEEE Transactions on Pattern Analysis and Machine Intelligence, vol 39, n° 3, pagg 561-575, 2017. (5.7 MB)
B. Biggio, Fumera, G., e Roli, F., «Bayesian Analysis of Linear Combiners», in 7th Int. Workshop on Multiple Classifier Systems (MCS 2007), Prague, Czech Republic, 2007, vol 4472, pagg 292-301. (149.24 KB)
B. Biggio, Fumera, G., Roli, F., e Didaci, L., «Poisoning adaptive biometric systems», in 9th Int'l Workshop on Statistical Techniques in Pattern Recognition (SPR 2012), 2012, vol 7626, pagg 417-425. (637.79 KB)
B. Biggio, Fumera, G., e Roli, F., «Pattern Recognition Systems under Attack: Design Issues and Research Challenges», Int'l J. Patt. Recogn. Artif. Intell., vol 28, n° 7, pag 1460002, 2014. (1.41 MB)
B. Biggio, Fumera, G., e Roli, F., «Bayesian Linear Combination of Neural Networks», in Innovations in Neural Information Paradigms and Applications, vol 247, M. Bianchini, Maggini, M., Scarselli, F., e Jain, L. C. Springer Berlin / Heidelberg, 2009, pagg 201-230. (435.32 KB)
B. Biggio, Fumera, G., e Roli, F., «Design of Robust Classifiers for Adversarial Environments», in IEEE International Conference on Systems, Man, and Cybernetics (SMC 2011), Anchorage, Alaska, USA, 2011, pagg 977–982. (328.68 KB)
B. Biggio, Fumera, G., Russu, P., Didaci, L., e Roli, F., «Adversarial Biometric Recognition: A Review on Biometric System Security from the Adversarial Machine Learning Perspective», IEEE Signal Processing Magazine, vol 32, n° 5, pagg 31-41, 2015. (751.08 KB)
B. Biggio, Rota Bulò, S., Pillai, I., Mura, M., Zemene Mequanint, E., Pelillo, M., e Roli, F., «Poisoning complete-linkage hierarchical clustering», in Joint IAPR Int'l Workshop on Structural, Syntactic, and Statistical Pattern Recognition (LNCS), Joensuu, Finland, 2014, vol 8621, pagg 42-52. (388.31 KB)
B. Biggio, «Adversarial Pattern Classification», University of Cagliari, Cagliari (Italy), 2010. (2.65 MB)
B. Biggio, «On Learning and Recognition of Secure Patterns (Invited keynote at AISec '14)», in AISec'14: Proceedings of the 2014 ACM Workshop on Artificial Intelligence and Security, co-located with CCS '14, Scottsdale, Arizona, USA, 2014, pagg 1-2. (110.67 KB)
B. Biggio, Fumera, G., Pillai, I., e Roli, F., «A survey and experimental evaluation of image spam filtering techniques», Pattern Recognition Letters, vol 32, pagg 1436 - 1446, 2011. (2.12 MB)
B. Biggio, Melis, M., Fumera, G., e Roli, F., «Sparse Support Faces», in Int'l Conf. on Biometrics (ICB), 2015, pagg 208-213. (702.84 KB)
B. Biggio, Nelson, B., e Laskov, P., «Poisoning attacks against support vector machines», in 29th Int'l Conf. on Machine Learning (ICML), 2012, pagg 1807–1814. (452.94 KB)
L. Bruzzone, Roli, F., e Serpico, S. B., «An extension of the Jeffreys-Matusita distance to multiclass cases for feature selection», IEEE Transactions on Geoscience and Remote Sensing, vol 33, pagg 1318-1321, 1995.
L. Bruzzone, Conese, C., Maselli, F., e Roli, F., «Multisource classification of complex rural areas by statistical and neural-network approaches», Int. Journal on Photogrammetric Engineering and Remote Sensing (PE&RS), vol 63, pagg 523-533, 1997.
A. Carcangiu, Spano, L. Davide, Fumera, G., e Roli, F., «DEICTIC: a Compositional and Declarative Gesture Description based on Hidden Markov Model», International Journal of Human-Computer Studies, In Press.
M. Mohan Chakka, Anjos, A., Marcel, S., Tronci, R., Muntoni, D., Fadda, G., Pili, M., Sirena, N., Murgia, G., Ristori, M., e Roli, F., «Competition on Counter Measures to 2-D Facial Spoofing Attacks», in International Joint Conference on Biometrics (IJCB 2011), 2011.
P. Coli, Marcialis, G. L., e Roli, F., «Vitality detection from fingerprint images: a critical survey», in 2nd International Conference on Biometrics ICB 2007, Seoul (South Korea), 2007, vol 4642, pagg 722-731.
P. Coli, Marcialis, G. L., e Roli, F., «Power spectrum-based fingerprint vitality detection», in IEEE Workshop on Automatic Identification Advanced Technologies AutoID 2007, 2007, pagg 169-173.
P. Coli, «Vitality detection in personal authentication systems using fingerprints», Cagliari (Italy), 2008.
P. Coli, Marcialis, G. L., e Roli, F., «Analysis and selection of features for the fingerprint vitality detection», in Joint IAPR Int. Workshop. on Structural and Syntactical Pattern Recognition and Statistical Techniques in Pattern Recognition S+SSPR06, 2006, vol 4109, pagg 907-915.
P. Coli, Marcialis, G. L., e Roli, F., «Fingerprint silicon replicas: static and dynamic features for vitality detection using an optical capture device», International Journal of Image and Graphics, vol 8, pagg 495-512, 2008.