Publications

Export 407 results:
2014
R. Satta, Pala, F., Fumera, G., e Roli, F., «People search with textual queries about clothing appearance attributes», in Person Re‐Identification, Advances in Computer Vision and Pattern Recognition, S. Gong, Cristani, M., Yan, S., e Loy, C. Change Springer, 2014. (1.07 MB)
B. Biggio, Rieck, K., Ariu, D., Wressnegger, C., Corona, I., Giacinto, G., e Roli, F., «Poisoning Behavioral Malware Clustering», in AISec'14: Proceedings of the 2014 ACM Workshop on Artificial Intelligence and Security, co-located with CCS '14, Scottsdale, Arizona, USA, 2014, pagg 27-36. (375.58 KB)
B. Biggio, Rota Bulò, S., Pillai, I., Mura, M., Zemene Mequanint, E., Pelillo, M., e Roli, F., «Poisoning complete-linkage hierarchical clustering», in Joint IAPR Int'l Workshop on Structural, Syntactic, and Statistical Pattern Recognition (LNCS), Joensuu, Finland, 2014, vol 8621, pagg 42-52. (388.31 KB)
I. Sanchez, Satta, R., Nai-Fovino, I., Baldini, G., Steri, G., Shaw, D., e Ciardulli, A., «Privacy leakages in Smart Home Wireless Technologies», in 2014 IEEE International Carnahan Conference on Security Technology, Rome, Italy, 2014. (329.97 KB)
D. - T. Dang-Nguyen, Piras, L., Giacinto, G., Boato, G., e De Natale, F. G. B., «Retrieval of Diverse Images by Pre-filtering and Hierarchical Clustering», in MediaEval (Online Working Notes), Barcelona; Spain, 2014, vol 1263. (221.52 KB)
B. Biggio, Fumera, G., e Roli, F., «Security evaluation of pattern classifiers under attack», IEEE Transactions on Knowledge and Data Engineering, vol 26, n° 4, pagg 984-996, 2014. (1.35 MB)
B. Biggio, Corona, I., Nelson, B., Rubinstein, B. I. P., Maiorca, D., Fumera, G., Giacinto, G., e Roli, F., «Security Evaluation of Support Vector Machines in Adversarial Environments», in Support Vector Machines Applications, Y. Ma e Guo, G. Springer International Publishing, 2014, pagg 105-153. (687.1 KB)
R. Wong, Poh, N., e Marcialis, G. L., «Toward an attack-sensitive tamper-resistant biometric recognition with a symmetric matcher: A fingerprint case study», in IEEE Symposium on Computational Intelligence in Biometrics and Identity Management (CIBIM), Dec., 9-11, 2014, Orlando (Florida), 2014, pagg 175-180. (1.32 MB)
R. Satta e Stirparo, P., «On the usage of Sensor Pattern Noise for Picture-to-Identity linking through social network accounts», in 9th International Conference on Computer Vision Theory and Applications (VISAPP 2014), Lisbon, Portugal, 2014. (340.78 KB)
2013
I. Corona, Giacinto, G., e Roli, F., «Adversarial Attacks against Intrusion Detection Systems: Taxonomy, Solutions and Open Issues», Information Sciences, vol 239, 2013. (1.49 MB)
R. Satta, «Appearance Descriptors for Person Re-identification: a Comprehensive Review». 2013. (3.44 MB)
A. Rattani, Marcialis, G. L., e Roli, F., «Biometric System Adaptation by Self-update and Graph-based techniques», Journal of Visual Languages and Computing, Elsevier, 2013.
Y. Guan, Wei, X., Li, C. - T., Marcialis, G. L., Roli, F., e Tistarelli, M., «Combining Gait and Face for Tackling the Elapsed Time Challenges», in IEEE 6th International Conference on Biometrics: Theory, Applications, and Systems (BTAS 2013), Washington DC (USA), 2013, pagg 1-8. (663.7 KB)
M. A. A. Dewan, Granger, E., Sabourin, R., Roli, F., e Marcialis, G. L., «A comparison of adaptive appearance methods for tracking faces in video surveillance», in 5th International Conference on Imaging for Crime Detection and Prevention (ICDP-13), 2013.
B. Biggio, Pillai, I., Rota Bulò, S., Ariu, D., Pelillo, M., e Roli, F., «Is Data Clustering in Adversarial Settings Secure?», in AISec'13: Proceedings of the 2013 ACM Workshop on Artificial Intelligence and Security, Berlin, 2013, pagg 87-98. (300.52 KB)
R. Satta, «Dissimilarity-based people re-identification and search for intelligent video surveillance», University of Cagliari, Cagliari (Italy), 2013. (7.08 MB)
L. Didaci, Fumera, G., e Roli, F., «Diversity in classifier ensembles: fertile concept or dead end?», in 11th Int. Workshop on Multiple Classifier Systems, Nanjing, China, 2013, vol 7872. (241.27 KB) (163.54 KB)
L. Piras, Tronci, R., e Giacinto, G., «Diversity in ensembles of codebooks for visual concept detection», in 17th Int. Conference on Image Analysis and Processing (ICIAP), Naples, Italy, 2013. (303.73 KB)
G. L. Marcialis, Didaci, L., e Roli, F., «Estimating the serial combination's performance from that of individual base classifiers», in IAPR 17th Int. Conf. on Image Analysis and Processing (ICIAP 2013), 2013, vol Springer LNCS 8156, pagg 622-631. (210.77 KB)
B. Biggio, Corona, I., Maiorca, D., Nelson, B., Srndic, N., Laskov, P., Giacinto, G., e Roli, F., «Evasion attacks against machine learning at test time», in European Conference on Machine Learning and Principles and Practice of Knowledge Discovery in Databases (ECML PKDD), 2013, vol 8190, pagg 387-402. (473.78 KB)
G. Fadda, Marcialis, G. L., Roli, F., e Ghiani, L., «Exploiting the Golden Ratio on Human Faces for Head-Pose Estimation», in IAPR 17th Int. Conf. on Image Analysis and Processing (ICIAP 2013), Napoli (Italy), 2013, vol Springer LNCS 8156, pagg 280-289. (546.25 KB)
L. Ghiani, Hadid, A., Marcialis, G. L., e Roli, F., «Fingerprint liveness detection using Binarized Statistical Image Features», in IEEE 6th International Conference on Biometrics: Theory, Applications, and Systems, (BTAS 2013), Washington DC (USA), 2013. (615.3 KB)
R. Tronci, Murgia, G., Pili, M., Piras, L., e Giacinto, G., «ImageHunter: a Novel Tool for Relevance Feedback in Content Based Image Retrieval», in New Challenges in Distributed Information Filtering and Retrieval. DART 2011: Revised and Invited Papers, C. Lai, Semeraro, G., e Vargiu, E. Springer, 2013. (1.98 MB)
L. Ghiani, Yambay, D., Mura, V., Tocco, S., Marcialis, G. L., Roli, F., e Schuckers, S., «LivDet 2013 – Fingerprint Liveness Detection Competition», in IAPR/IEEE 6th Int. Conf. on Biometrics (ICB 2013), Madrid (Spain), 2013. (755.98 KB)
D. Maiorca, Corona, I., e Giacinto, G., «Looking at the Bag is not Enough to Find the Bomb: an Evasion of Structural Methods for Malicious PDF Files Detection», in 8th ACM Symposium on Information, Computer and Communications Security (ASIACCS 2013), Hangzhou, China, 2013. (2.12 MB)

Pages