Export 389 results:
I. Pillai, Fumera, G., e Roli, F., «F -Measure Optimisation in Multi-label Classifiers», in 22nd IEEE International Conference on Pattern Recognition, ICPR 2014, Stockholm, Sweden, 2014, pagg 3452 - 3456. (287.72 KB)
B. Biggio, «On Learning and Recognition of Secure Patterns (Invited keynote at AISec '14)», in AISec'14: Proceedings of the 2014 ACM Workshop on Artificial Intelligence and Security, co-located with CCS '14, Scottsdale, Arizona, USA, 2014, pagg 1-2. (110.67 KB)
I. Corona, Maiorca, D., Ariu, D., e Giacinto, G., «Lux0R: Detection of Malicious PDF-embedded JavaScript code through Discriminant Analysis of API References», in AISec'14: Proceedings of the 2014 ACM Workshop on Artificial Intelligence and Security, co-located with CCS '14, Scottdale, Arizona, USA, 2014. (455.14 KB)
G. Fumera, Marcialis, G. L., Biggio, B., Roli, F., e Schuckers, S. C., «Multimodal Anti-Spoofing in Biometric Recognition Systems», in Handbook of Biometric Anti-Spoofing, S. Marcel, Nixon, M., e Li, S. Z. Springer, 2014, pagg 165-184. (155.83 KB)
G. L. Marcialis, Roli, F., e Fadda, G., «A Novel Method for Head Pose Estimation based on the ``Vitruvian Man''», International Journal of Machine Learning and Cybernetics, vol 5, n° 1, 2014. (1.06 MB)
L. Piras e Giacinto, G., «Open issues on codebook generation in Image Classification tasks», in 10th International Conference Machine Learning and Data Mining (MLDM), St. Petersburg, Russia, 2014, pagg 328-342. (229.92 KB)
B. Biggio, Fumera, G., e Roli, F., «Pattern Recognition Systems under Attack: Design Issues and Research Challenges», Int'l J. Patt. Recogn. Artif. Intell., vol 28, n° 7, pag 1460002, 2014. (1.41 MB)
R. Satta, Pala, F., Fumera, G., e Roli, F., «People search with textual queries about clothing appearance attributes», in Person Re‐Identification, Advances in Computer Vision and Pattern Recognition, S. Gong, Cristani, M., Yan, S., e Loy, C. Change Springer, 2014. (1.07 MB)
B. Biggio, Rieck, K., Ariu, D., Wressnegger, C., Corona, I., Giacinto, G., e Roli, F., «Poisoning Behavioral Malware Clustering», in AISec'14: Proceedings of the 2014 ACM Workshop on Artificial Intelligence and Security, co-located with CCS '14, Scottsdale, Arizona, USA, 2014, pagg 27-36. (375.58 KB)
B. Biggio, Rota Bulò, S., Pillai, I., Mura, M., Zemene Mequanint, E., Pelillo, M., e Roli, F., «Poisoning complete-linkage hierarchical clustering», in Joint IAPR Int'l Workshop on Structural, Syntactic, and Statistical Pattern Recognition (LNCS), Joensuu, Finland, 2014, vol 8621, pagg 42-52. (388.31 KB)
I. Sanchez, Satta, R., Nai-Fovino, I., Baldini, G., Steri, G., Shaw, D., e Ciardulli, A., «Privacy leakages in Smart Home Wireless Technologies», in 2014 IEEE International Carnahan Conference on Security Technology, Rome, Italy, 2014. (329.97 KB)
D. - T. Dang-Nguyen, Piras, L., Giacinto, G., Boato, G., e De Natale, F. G. B., «Retrieval of Diverse Images by Pre-filtering and Hierarchical Clustering», in MediaEval (Online Working Notes), Barcelona; Spain, 2014, vol 1263. (221.52 KB)
B. Biggio, Fumera, G., e Roli, F., «Security evaluation of pattern classifiers under attack», IEEE Transactions on Knowledge and Data Engineering, vol 26, n° 4, pagg 984-996, 2014. (1.35 MB)
B. Biggio, Corona, I., Nelson, B., Rubinstein, B. I. P., Maiorca, D., Fumera, G., Giacinto, G., e Roli, F., «Security Evaluation of Support Vector Machines in Adversarial Environments», in Support Vector Machines Applications, Y. Ma e Guo, G. Springer International Publishing, 2014, pagg 105-153. (687.1 KB)
R. Wong, Poh, N., e Marcialis, G. L., «Toward an attack-sensitive tamper-resistant biometric recognition with a symmetric matcher: A fingerprint case study», in IEEE Symposium on Computational Intelligence in Biometrics and Identity Management (CIBIM), Dec., 9-11, 2014, Orlando (Florida), 2014, pagg 175-180. (1.32 MB)
R. Satta e Stirparo, P., «On the usage of Sensor Pattern Noise for Picture-to-Identity linking through social network accounts», in 9th International Conference on Computer Vision Theory and Applications (VISAPP 2014), Lisbon, Portugal, 2014. (340.78 KB)
I. Corona, Giacinto, G., e Roli, F., «Adversarial Attacks against Intrusion Detection Systems: Taxonomy, Solutions and Open Issues», Information Sciences, vol 239, 2013. (1.49 MB)
R. Satta, «Appearance Descriptors for Person Re-identification: a Comprehensive Review». 2013. (3.44 MB)
A. Rattani, Marcialis, G. L., e Roli, F., «Biometric System Adaptation by Self-update and Graph-based techniques», Journal of Visual Languages and Computing, Elsevier, 2013.
Y. Guan, Wei, X., Li, C. - T., Marcialis, G. L., Roli, F., e Tistarelli, M., «Combining Gait and Face for Tackling the Elapsed Time Challenges», in IEEE 6th International Conference on Biometrics: Theory, Applications, and Systems (BTAS 2013), Washington DC (USA), 2013, pagg 1-8. (663.7 KB)
M. A. A. Dewan, Granger, E., Sabourin, R., Roli, F., e Marcialis, G. L., «A comparison of adaptive appearance methods for tracking faces in video surveillance», in 5th International Conference on Imaging for Crime Detection and Prevention (ICDP-13), 2013.
B. Biggio, Pillai, I., Rota Bulò, S., Ariu, D., Pelillo, M., e Roli, F., «Is Data Clustering in Adversarial Settings Secure?», in AISec'13: Proceedings of the 2013 ACM Workshop on Artificial Intelligence and Security, Berlin, 2013, pagg 87-98. (300.52 KB)
R. Satta, «Dissimilarity-based people re-identification and search for intelligent video surveillance», University of Cagliari, Cagliari (Italy), 2013. (7.08 MB)
L. Didaci, Fumera, G., e Roli, F., «Diversity in classifier ensembles: fertile concept or dead end?», in 11th Int. Workshop on Multiple Classifier Systems, Nanjing, China, 2013, vol 7872. (241.27 KB) (163.54 KB)
L. Piras, Tronci, R., e Giacinto, G., «Diversity in ensembles of codebooks for visual concept detection», in 17th Int. Conference on Image Analysis and Processing (ICIAP), Naples, Italy, 2013. (303.73 KB)