Publications

Export 426 results:
A B C D E F G H I J K L M N O P Q R S T U V W X Y Z 
P
I. Sanchez, Satta, R., Nai-Fovino, I., Baldini, G., Steri, G., Shaw, D., e Ciardulli, A., «Privacy leakages in Smart Home Wireless Technologies», in 2014 IEEE International Carnahan Conference on Security Technology, Rome, Italy, 2014. (329.97 KB)
L. Piras, Tronci, R., Murgia, G., e Giacinto, G., «The PRA and AmILAB at ImageCLEF 2012 Photo Flickr Annotation Task», in CLEF (Online Working Notes/Labs/Workshop), Rome, 2012. (540.05 KB)
D. Ugarte, Maiorca, D., Cara, F., e Giacinto, G., «PowerDrive: Accurate De-Obfuscation and Analysis of PowerShell Malware», 16th Conference on Detection of Intrusions and Malware & Vulnerability Assessment (DIMVA). Springer, Gothenburg, Sweden, pagg 240-259, 2019. (352.39 KB)
P. Coli, Marcialis, G. L., e Roli, F., «Power spectrum-based fingerprint vitality detection», in IEEE Workshop on Automatic Identification Advanced Technologies AutoID 2007, 2007, pagg 169-173.
B. Biggio, Rota Bulò, S., Pillai, I., Mura, M., Zemene Mequanint, E., Pelillo, M., e Roli, F., «Poisoning complete-linkage hierarchical clustering», in Joint IAPR Int'l Workshop on Structural, Syntactic, and Statistical Pattern Recognition (LNCS), Joensuu, Finland, 2014, vol 8621, pagg 42-52. (388.31 KB)
B. Biggio, Rieck, K., Ariu, D., Wressnegger, C., Corona, I., Giacinto, G., e Roli, F., «Poisoning Behavioral Malware Clustering», in AISec'14: Proceedings of the 2014 ACM Workshop on Artificial Intelligence and Security, co-located with CCS '14, Scottsdale, Arizona, USA, 2014, pagg 27-36. (375.58 KB)
B. Biggio, Didaci, L., Fumera, G., e Roli, F., «Poisoning attacks to compromise face templates», in 6th IAPR Int'l Conf. on Biometrics (ICB), Madrid, Spain, 2013. (844.61 KB)
B. Biggio, Nelson, B., e Laskov, P., «Poisoning attacks against support vector machines», in 29th Int'l Conf. on Machine Learning (ICML), 2012, pagg 1807–1814. (452.94 KB)
B. Biggio, Fumera, G., Roli, F., e Didaci, L., «Poisoning adaptive biometric systems», in 9th Int'l Workshop on Statistical Techniques in Pattern Recognition (SPR 2012), 2012, vol 7626, pagg 417-425. (637.79 KB)
R. Satta e Stirparo, P., «Picture-to-Identity linking of social network accounts based on Sensor Pattern Noise», in 5th International Conference on Imaging for Crime Detection and Prevention (ICDP 2013), London, United Kingdom, 2013. (348.28 KB)
M. Contini, Corona, I., Mulas, A., Giacinto, G., e Ariu, D., «Pharmaguard WebApp: an application for the detection of illegal online pharmacies», 2nd International Workshop on Knowledge Discovery on the WEB (KDWEB). Cagliari, 2016. (120.57 KB)
I. Corona, Contini, M., Ariu, D., Giacinto, G., Roli, F., Lund, M., e Marinelli, G., «PharmaGuard: Automatic Identification of Illegal Search-Indexed Online Pharmacies», IEEE International Conference on Cybernetics - Special session Cybersecurity (CYBERSEC). IEEE, Gdynia, Poland , pagg 324 - 329, 2015. (1.44 MB) (3.4 MB)
G. L. Marcialis, Roli, F., e Didaci, L., «Personal identity verification by serial fusion of fingerprint and face matchers», Pattern Recognition, vol 42, pagg 2807-2817, 2009.
F. Alonso, Roli, F., Marcialis, G. L., Fierrez, J., e Ortega, J., «Performance of fingerprint quality measures depending on sensor technology», Journal of Electronic Imaging, vol 17, 2008.
R. Tronci, Piras, L., e Giacinto, G., «Performance Evaluation of Relevance Feedback for Image Retrieval by “Real-World” Multi-Tagged Image Datasets», International Journal of Multimedia Data Engineering and Management (IJMDEM), vol 3, pag 16, 2012. (357.99 KB)
G. Fumera e Roli, F., «Performance Analysis and Comparison of Linear Combiners for Classifier Fusion», in Structural, Syntactic, and Statistical Pattern Recognition, Joint IAPR International Workshops SSPR 2002 and SPR 2002, 2002, vol 2396, pagg 424-432.
G. L. Marcialis e Roli, F., «Perceptron-based fusion of multiple fingerprint matchers», in First International Workshop on Artificial Neural Networks in Pattern Recognition (ANNPR03), Firenze (Italy), 2003, pagg 92-99.
R. Satta, Pala, F., Fumera, G., e Roli, F., «People search with textual queries about clothing appearance attributes», in Person Re‐Identification, Advances in Computer Vision and Pattern Recognition, S. Gong, Cristani, M., Yan, S., e Loy, C. Change Springer, 2014. (1.07 MB)
B. Biggio, Fumera, G., e Roli, F., «Pattern Recognition Systems under Attack: Design Issues and Research Challenges», Int'l J. Patt. Recogn. Artif. Intell., vol 28, n° 7, pag 1460002, 2014. (1.41 MB)
F. Roli, Biggio, B., e Fumera, G., «Pattern Recognition Systems Under Attack», in Progress in Pattern Recognition, Image Analysis, Computer Vision, and Applications, Proc. of the 18th Iberoamerican Congress on Pattern Recognition (CIARP 2013), LNCS, Havana, Cuba, 2013, vol 8258, pagg 1-8. (314.35 KB)
D. Maiorca, Giacinto, G., e Corona, I., «A Pattern Recognition System for Malicious PDF Files Detection», in MLDM - International Conference on Machine Learning and Data Mining, Berlin, 2012, vol 7376, pagg 510-524. (1.74 MB)
F. Roli e Giacinto, G., «Pattern Recognition for Intrusion Detection in Computer Networks», in Pattern Recognition and String Matching, D. Chen e Cheng, X. Kluwer Academic Publishers, 2002.
L. Piras, Giacinto, G., e Paredes, R., «Passive-Aggressive Online Learning for Relevance Feedback in Content Based Image Retrieval», in 2nd International Conference on Pattern Recognition Applications and Methods (ICPRAM), Barcelona, Spain, 2013. (138.32 KB)
E. Santucci, Didaci, L., Fumera, G., e Roli, F., «A Parameter Randomization Approach for Constructing Classifier Ensembles», Pattern Recognition, vol 69, pagg 1-13, 2017. (448.73 KB)
A. Jozwik, Serpico, S. B., e Roli, F., «A parallel network of modified 1-NN and k-NN classifiers - Application to remote sensing image classification», Pattern Recognition Letters, vol 19, pagg 57-62, 1998.

Pages