Export 415 results:
A B C D E F G H I J K L M N O P Q R S T U V W X Y Z 
D. Yambay, Ghiani, L., Denti, P., Marcialis, G. L., Roli, F., e Schuckers, S., «LivDet 2011 – Fingerprint Liveness Detection Competition 2011», in 5th IAPR/IEEE Int. Conf. on Biometrics (ICB 2012), New Delhi (India), 2012. (1.31 MB)
L. Ghiani, Yambay, D., Mura, V., Tocco, S., Marcialis, G. L., Roli, F., e Schuckers, S., «LivDet 2013 – Fingerprint Liveness Detection Competition», in IAPR/IEEE 6th Int. Conf. on Biometrics (ICB 2013), Madrid (Spain), 2013. (755.98 KB)
V. Mura, Yambay, D., Ghiani, L., Marcialis, G. L., Schuckers, S., e Roli, F., «LivDet 2015 – Fingerprint Liveness Detection Competition 2015», in 7th IEEE Int. Conference on Biometrics: Technology, Applications and Systems (BTAS 2015), 2015. (178.26 KB)
G. L. Marcialis, Roli, F., e Schuckers, S., «Liveness Detection Competition 2009», Biometric Technology Today, vol 17, n° 3, 2009.
C. - T. Li e Satta, R., «On the Location-Dependent Quality of the Sensor Pattern Noise and Its Implication in Multimedia Forensics», in 4th International Conference on Imaging for Crime Detection and Prevention (ICDP 2011), London, United Kingdom, 2011. (399.99 KB)
D. Maiorca, Corona, I., e Giacinto, G., «Looking at the Bag is not Enough to Find the Bomb: an Evasion of Structural Methods for Malicious PDF Files Detection», in 8th ACM Symposium on Information, Computer and Communications Security (ASIACCS 2013), Hangzhou, China, 2013. (2.12 MB)
R. Soleymani, Granger, E., e Fumera, G., «Loss Factors for Learning Boosting Ensembles from Imbalanced Data», in 23rd International Conference on Pattern Recognition (ICPR 2016), Cancún, Mexico, In Press.
I. Corona, Maiorca, D., Ariu, D., e Giacinto, G., «Lux0R: Detection of Malicious PDF-embedded JavaScript code through Discriminant Analysis of API References», in AISec'14: Proceedings of the 2014 ACM Workshop on Artificial Intelligence and Security, co-located with CCS '14, Scottdale, Arizona, USA, 2014. (455.14 KB)
D. Ariu, Giacinto, G., e Roli, F., «Machine Learning in Computer Forensics (and the Lessons Learned from Machine Learning in Computer Security)», in AISec 2011: 4th ACM Workshop on Artificial Intelligence and Security, Chicago, IL, USA, 2011. (379.05 KB)
D. Ariu, Corona, I., Tronci, R., e Giacinto, G., «Machine Learning in Security Applications», in Machine Learning, Software Engineering and Standardization, P. Perner ibai-publishing, 2013.
B. Biggio, «Machine Learning under Attack: Vulnerability Exploitation and Security Measures (Invited Keynote at IH&MMSec '16)», in 4th ACM Workshop on Information Hiding & Multimedia Security, Vigo, Spain, 2016, pagg 1-2. (138.98 KB)
M. Jagielski, Oprea, A., Biggio, B., Liu, C., Nita-Rotaru, C., e Li, B., «Manipulating Machine Learning: Poisoning Attacks and Countermeasures for Regression Learning», in 39th IEEE Symposium on Security and Privacy, 2018. (1.02 MB)
A. Gambardella, Giacinto, G., e Migliaccio, M., «On the Mathematical Formulation of the SAR Oil-Spill Observation Problem», in IEEE International Geoscience and Remote Sensing Symposium, 2008. IGARSS 2008, 2008, vol 3, pag III -1382-III -1385.
C. Ruiz, Arroyo, S., Krsteski, I., Dago, P., Sanchez, J., Perez-Freire, L., De Rosa, A., Fontani, M., Costanzo, A., Piva, A., Ariu, D., Piras, L., Ahumada, R., e Jerian, M., «The maven project: Management and Authenticity Verification of multimedia contents», in Multimedia Expo Workshops (ICMEW), 2015 IEEE International Conference on, 2015, pagg 1-4. (194.87 KB)
R. Perdisci, Ariu, D., Fogla, P., Giacinto, G., e Lee, W., «McPAD: A Multiple Classifier System for Accurate Payload-based Anomaly Detection», Computer Networks, vol 53, pagg 864-881, 2009. (882.94 KB)
D. Ariu, Corona, I., Giacinto, G., e Roli, F., «McPAD and HMMWeb: two different approaches for the detection of attacks against Web applications», in Italian Workshop on Privacy and Security (PRISE), Rome, 2008. (309.2 KB)
G. Fumera, Roli, F., e Vernazza, G., «A Method for Error Rejection in Multiple Classifier Systems», in 11th International Conference on Image Analysis and Processing (ICIAP 2001), 2001, pagg 454-458.
F. Roli, Giacinto, G., e Vernazza, G., «Methods for Designing Multiple Classifier Systems», in 2nd Int. Workshop on Multiple Classifier Systems (MCS 2001), Cambridge, United Kingdom, 2001, vol 2096, pagg 78-87.
G. Giacinto e Roli, F., «Methods for Dynamic Classifier Selection», in 10th International Conference on Image Analysis and Processing, Venice, Italy, 1999, pagg 659-664.
B. Nelson, Biggio, B., e Laskov, P., «Microbagging Estimators: An Ensemble Approach to Distance-weighted Classifiers», in Journal of Machine Learning Research - Proc. 3rd Asian Conference on Machine Learning (ACML 2011), Taoyuan, Taiwan, 2011, vol 20, pagg 63-79. (481.46 KB)
A. Crobe, Demuru, M., Didaci, L., Marcialis, G. L., e Fraschini, M., «Minimum spanning tree and K-Core decomposition as measure of subject-specific EEG traits», Biomedical Physics and Engineering Express, vol 1, n° 2, pag 017001, 2016. (802.39 KB)
L. Didaci, Marcialis, G. L., e Roli, F., «Modelling FRR of biometric verification systems using the template co-update algorithm», in 3rd International Conference on Biometrics, Alghero (Italy), 2009, vol 5558, pagg 765-774.
D. Ariu e Giacinto, G., «A modular architecture for the analysis of HTTP payloads based on Multiple Classifiers», in 10th Int. Workshop on Multiple Classifier Systems (MCS 2011), Naples, Italy, 2011. (244.9 KB)
G. Giacinto, Roli, F., e Didaci, L., «A Modular Multiple Classifier System for the Detection of Intrusions in Computer Networks», in 4th Int. Workshop on Multiple Classifier Systems (MCS 2003), Guildford, United Kingdom, 2003, vol 2709, pagg 346-355.
G. Giacinto, «Moving Targets - When Data Classes Depend on Subjective Judgement, or They Are Crafted by an Adversary to Mislead Pattern Analysis Algorithms - The Cases of Content Based Image Retrieval and Adversarial Classification», in Advances in Data Mining. Applications and Theoretical Aspects, vol LNCS 6171, P. Perner Springer-Verlag, 2010, pagg 1-16.