Publications

Export 389 results:
2011
Z. Akhtar, Fumera, G., Marcialis, G. L., e Roli, F., «Robustness Evaluation of Biometric Systems under Spoof Attacks», in 16th Int’l Conference on Image Analysis and Processing (ICIAP), Ravenna, Italy, 2011, pagg 159-168. (220.73 KB)
Z. Akhtar, Biggio, B., Fumera, G., e Marcialis, G. L., «Robustness of Multi-modal Biometric Systems under Realistic Spoof Attacks against All Traits», in IEEE Workshop on Biometric Measurements and Systems for Security and Medical Applications (BioMS), Milan, Italy, 2011, pagg 5-10. (954 KB)
B. Biggio, Akhtar, Z., Fumera, G., Marcialis, G. L., e Roli, F., «Robustness of multi-modal biometric verification systems under realistic spoofing attacks», in Int’l Joint Conference on Biometrics (IJCB), Washington DC, USA, 2011. (2.25 MB)
A. Rattani, Marcialis, G. L., e Roli, F., «Self Adaptive Systems: An Experimental Analysis of the Performance Over Time», in In Proc. of IEEE Workshop on Computational Intelligence in Biometrics and Identity Management (CIBIM'11) - A Special Session on Adaptive Biometric Systems, Paris (France), 2011, pagg 36 - 43.
R. Tronci, Piras, L., Falqui, L., e Giacinto, G., «A study on the evaluation of relevance feedback in multi-tagged image datasets», in 7th IEEE International Workshop on Multimedia Information Processing and Retrieval, California, USA, 2011. (259.03 KB)
B. Biggio, Nelson, B., e Laskov, P., «Support Vector Machines Under Adversarial Label Noise», in Journal of Machine Learning Research - Proc. 3rd Asian Conference on Machine Learning (ACML 2011), Taoyuan, Taiwan, 2011, vol 20, pagg 97-112. (533.74 KB)
B. Biggio, Fumera, G., Pillai, I., e Roli, F., «A survey and experimental evaluation of image spam filtering techniques», Pattern Recognition Letters, vol 32, pagg 1436 - 1446, 2011. (2.12 MB)
A. Rattani, Marcialis, G. L., e Roli, F., «Temporal Analysis of Biometric Template Update Procedures in Uncontrolled Environment», in International Conference on Image Analysis and Processing (ICIAP'11), Ravenna, Italy, Ravenna (Italy), 2011.
B. Nelson, Biggio, B., e Laskov, P., «Understanding the Risk Factors of Learning in Adversarial Environments», in 4th ACM Workshop on Artificial Intelligence and Security (AISec 2011), Chicago, IL, USA, 2011, pagg 87–92. (132.42 KB)
2010
A. Rattani, «Adaptive Biometric System based on Template Update Procedures», University of Cagliari, Cagliari (Italy), 2010.
F. Roli, Marcialis, G. L., e Coli, P., «An advanced image processing tool for latent fingerprint analysis and liveness assessment». 2010.
B. Biggio, «Adversarial Pattern Classification», University of Cagliari, Cagliari (Italy), 2010. (2.65 MB)
G. L. Marcialis, Roli, F., e Tidu, A., «Analysis of Fingerprint Pores for Vitality Detection», in Pattern Recognition (ICPR), 2010 20th International Conference on, Instanbul (Turkey), 2010.
I. Corona e Giacinto, G., «Detection of server side web attacks», in Workshop on Applications of Pattern Analysis, Cumberland Lodge, London, UK, 2010. (308.33 KB)
I. Corona, «Detection of Web-based attacks», University of Cagliari, Cagliari (Italy), 2010.
C. Lobrano, Tronci, R., Giacinto, G., e Roli, F., «Dynamic Linear Combination of Two-Class Classifiers», in Lecture Notes in Computer Science, 2010, vol 6218, pagg 473-482.
G. L. Marcialis, Roli, F., Coli, P., e Delogu, G., «A Fingerprint Forensic Tool for Criminal Investigations», in Handbook of Research on Computational Forensics, Digital Crime and Investigation: Methods and Solutions, C. - T. Li IGI Press, 2010, pagg 23-52.
D. Ariu e Giacinto, G., «HMMPayl: an application of HMM to the analysis of the HTTP Payload», in Workshop on Applications of Pattern Analysis, 2010. (273.18 KB)
D. Ariu, «Host and Network based Anomaly Detectors for HTTP Attacks», University of Cagliari, Cagliari (Italy), 2010. (5.95 MB)
L. Piras e Giacinto, G., «K-Nearest Neighbors Directed Synthetic Images Injection», in 11th International Workshop on Image Analysis for Multimedia Interactive Services (WIAMIS), Desenzano del Garda, Italy, 2010. (167.12 KB)
G. Giacinto, «Moving Targets - When Data Classes Depend on Subjective Judgement, or They Are Crafted by an Adversary to Mislead Pattern Analysis Algorithms - The Cases of Content Based Image Retrieval and Adversarial Classification», in Advances in Data Mining. Applications and Theoretical Aspects, vol LNCS 6171, P. Perner Springer-Verlag, 2010, pagg 1-16.
B. Biggio, Fumera, G., e Roli, F., «Multiple Classifier Systems for Robust Classifier Design in Adversarial Environments», Journal of Machine Learning and Cybernetics, vol 1, pagg 27–41, 2010. (844.91 KB)
B. Biggio, Fumera, G., e Roli, F., «Multiple Classifier Systems under Attack», in 9th Int. Workshop on Multiple Classifier Systems (MCS 2010), Cairo, Egypt, 2010, vol 5997, pagg 74–83. (231.42 KB)
C. Lobrano, Tronci, R., Giacinto, G., e Roli, F., «A Score Decidability Index for Dynamic Score Combination», in Pattern Recognition, International Conference on, Los Alamitos, CA, USA, 2010, pagg 69-72.
G. L. Marcialis, Mastinu, P., e Roli, F., «Serial fusion of multi-modal biometric systems», in Biometric Measurements and Systems for Security and Medical Applications (BIOMS), 2010 IEEE Workshop on, Taranto (Italy), 2010.

Pages