Export 417 results:
A B C D E F G H I J K L M N O P Q R S T U V W X Y Z 
M. Melis, Demontis, A., Biggio, B., Brown, G., Fumera, G., e Roli, F., «Is Deep Learning Safe for Robot Vision? Adversarial Examples against the iCub Humanoid», in ICCV 2017 Workshop on Vision in Practice on Autonomous Robots (ViPAR), Venice, Italy, 2017, vol 2017 IEEE International Conference on Computer Vision Workshops (ICCVW), pagg 751-759. (3.16 MB)
P. Piredda, Ariu, D., Biggio, B., Corona, I., Piras, L., Giacinto, G., e Roli, F., «Deepsquatting: Learning-based Typosquatting Detection at Deeper Domain Levels», in 16th International Conference of the Italian Association for Artificial Intelligence (AI*IA 2017), 2017, vol 10640 of LNCS, pagg 347-358. (1.21 MB)
A. Carcangiu, Spano, L. Davide, Fumera, G., e Roli, F., «DEICTIC: a Compositional and Declarative Gesture Description based on Hidden Markov Model», International Journal of Human-Computer Studies, In Press.
I. Corona, Biggio, B., Contini, M., Piras, L., Corda, R., Mereu, M., Mureddu, G., Ariu, D., e Roli, F., «DeltaPhish: Detecting Phishing Webpages in Compromised Websites», 22nd European Symposium on Research in Computer Security (ESORICS), vol 10492. Springer International Publishing, Norway, September 11-15, 2017, pagg 370–388, 2017. (4.13 MB)
D. Maiorca, «Design and Implementation of Robust Systems for Secure Malware Detection (Ph.D. Thesis)», University of Cagliari, Italy, Cagliari, 2016. (5.34 MB)
G. Giacinto, Roli, F., e Fumera, G., «Design of effective multiple classifier systems by clustering of classifiers», in 15th Int. Conference on Pattern Recognition (ICPR 2000), Barcelona, Spain, 2000, vol 2, pagg 160-163.
G. Giacinto e Roli, F., «Design of effective neural network ensembles for image classification», Image and Vision Computing Journal, vol 19, pagg 697-705, 2001.
F. Roli e Giacinto, G., «Design of Multiple Classifier Systems», in Hybrid Methods in Pattern Recognition, B. ;A. H. Kandel World Scientific Publishing, 2002.
B. Biggio, Fumera, G., e Roli, F., «Design of Robust Classifiers for Adversarial Environments», in IEEE International Conference on Systems, Man, and Cybernetics (SMC 2011), Anchorage, Alaska, USA, 2011, pagg 977–982. (328.68 KB)
I. Pillai, Fumera, G., e Roli, F., «Designing multi-label classifiers that maximize F measures: state of the art», Pattern Recognition, vol 61, 2017.
R. Tronci, Giacinto, G., e Roli, F., «Designing multiple biometric systems: measures of ensemble effectiveness», Engineering Applications of Artificial Intelligence, vol 22, pagg 66-78, 2009.
F. Crecchi, Bacciu, D., e Biggio, B., «Detecting Adversarial Examples through Nonlinear Dimensionality Reduction», in ESANN '19, In Press.
G. L. Foresti, Giacinto, G., e Roli, F., «Detecting Dangerous Behaviors of Mobile Objects in Parking Areas», in Multisensor Surveillance Systems: The Fusion Perspective, R. G. L. C. Foresti e Varshney, P. Kluwer Academic Publishers, 2003, pagg 199-211.
G. L. Foresti, Giacinto, G., e Roli, F., «Detecting Dangerous Behaviours of Mobile Objects in Parking Areas», in 2nd European Workshop on Advanced Video-based Surveillance Systems (AVBS2001), London, United Kingdom, 2001.
R. Perdisci, Corona, I., Dagon, D., e Lee, W., «Detecting Malicious Flux Service Networks through Passive Analysis of Recursive DNS Traces», in Annual Computer Security Applications Conference (ACSAC), Honolulu, Hawaii, USA, 2009. (206.97 KB)
M. Ahmadi, Biggio, B., Arzt, S., Ariu, D., e Giacinto, G., «Detecting Misuse of Google Cloud Messaging in Android Badware», in 6th Workshop on Security and Privacy in Smartphones and Mobile Devices (SPSM), Vienna, Austria, 2016, pagg 103-112. (626.38 KB)
I. Sanchez, Satta, R., Giuliani, R., e Baldini, G., «Detection of DECT identity spoofing through Radio Frequency fingerprinting», in 38th International Convention on Information and Communication Technology, Electronics and Microelectronics (MIPRO 2015), Opatija, Croatia, 2015. (778.81 KB)
D. Maiorca, Russu, P., Corona, I., Biggio, B., e Giacinto, G., «Detection of Malicious Scripting Code through Discriminant and Adversary-Aware API Analysis», in 1st Italian Conference on CyberSecurity (ITASEC), 2017, vol 1816, pagg 96-105. (371.53 KB)
I. Corona e Giacinto, G., «Detection of server side web attacks», in Workshop on Applications of Pattern Analysis, Cumberland Lodge, London, UK, 2010. (308.33 KB)
I. Corona, «Detection of Web-based attacks», University of Cagliari, Cagliari (Italy), 2010.
D. Maiorca e Biggio, B., «Digital Investigation of PDF Files: Unveiling Traces of Embedded Malware», IEEE Security and Privacy: Special Issue on Digital Forensics, vol 17, n° 1, pagg 63-71, 2019. (838.95 KB)
L. Piras e Giacinto, G., «Dissimilarity representation in multi-feature spaces for image retrieval», in 16th Int. Conference on Image Analysis and Processing (ICIAP), Ravenna, Italy, 2011. (252.22 KB)
G. Giacinto e Roli, F., «Dissimilarity Representation of Images for Relevance Feedback in Content-Based Image Retrieval», in Machine Learning and Data Mining in Pattern Recognition (MLDM 2003), Leipzig, Germany, 2003, vol 2734, pagg 202-214.
R. Satta, «Dissimilarity-based people re-identification and search for intelligent video surveillance», University of Cagliari, Cagliari (Italy), 2013. (7.08 MB)
W. W. Y. Ng, Hu, J., Yeung, D., Yin, S., e Roli, F., «Diversified Sensitivity based Undersampling for Imbalance Classification Problems», IEEE Transactions on Cybernetics, In Press. (1.91 MB)