Publications

Export 439 results:
In Press
W. W. Y. Ng, Hu, J., Yeung, D., Yin, S., and Roli, F., Diversified Sensitivity based Undersampling for Imbalance Classification Problems, IEEE Transactions on Cybernetics, In Press. (1.91 MB)
G. Suarez-Tangil, Dash, S. Kumar, Ahmadi, M., Kinder, J., Giacinto, G., and Cavallaro, L., DroidSieve: Fast and Accurate Classification of Obfuscated Android Malware, in Proceedings of the Seventh {ACM} Conference on Data and Application Security and Privacy, {CODASPY} 2017, In Press. (478.59 KB)
Y. Guan, Li, C. - T., and Roli, F., On Reducing the Effect of Covariate Factors in Gait Recognition: a Classifier Ensemble Method, IEEE Transactions on Pattern Analysis and Machine Intelligence, In Press. (311.43 KB) (151.4 KB)
2021
H. - Y. Lin and Biggio, B., Adversarial Machine Learning: Attacks From Laboratories to the Real World, Computer, vol. 54, pp. 56-60, 2021.
P. Temple, Perrouin, G., Acher, M., Biggio, B., Jézéquel, J. - M., and Roli, F., Empirical Assessment of Generating Adversarial Configurations for Software Product Lines, Empirical Software Engineering, vol. 26, no. 6, 2021. (1.29 MB)
L. Demetrio, Biggio, B., Lagorio, G., Roli, F., and Armando, A., Functionality-Preserving Black-Box Optimization of Adversarial Windows Malware, IEEE Transactions on Information Forensics and Security, vol. 16, pp. 3469-3478, 2021.
D. Solans, Biggio, B., and Castillo, C., Poisoning Attacks on Algorithmic Fairness, in Machine Learning and Knowledge Discovery in Databases (ECML PKDD 2020), 2021, p. 162--177. (1.05 MB)
2020
D. Maiorca, Demontis, A., Biggio, B., Roli, F., and Giacinto, G., Adversarial Detection of Flash Malware: Limitations and Open Issues, Computers & Security, vol. 96, 2020. (1.08 MB)
A. Sotgiu, Demontis, A., Melis, M., Biggio, B., Fumera, G., Feng, X., and Roli, F., Deep Neural Rejection against Adversarial Examples, EURASIP Journal on Information Security, vol. 5, 2020.
R. Delussu, Putzu, L., and Fumera, G., An Empirical Evaluation of Cross-scene Crowd Counting Performance, in Proceedings of the 15th International Joint Conference on Computer Vision, Imaging and Computer Graphics Theory and Applications - VISAPP, Valletta - Malta, 2020, vol. 4, pp. 373-380. (527.29 KB)
F. Cara, Scalas, M., Giacinto, G., and Maiorca, D., On the Feasibility of Adversarial Sample Creation Using the Android System API, Information, no. 11(9): 433, 2020. (1.26 MB)
R. Soleymani, Granger, E., and Fumera, G., F-Measure Curves: A Tool to Visualize Classifier Performance Under Imbalance, Pattern Recognition, vol. 100, p. 107146, 2020. (3.15 MB)
R. Delussu, Putzu, L., and Fumera, G., Investigating Synthetic Data Sets for Crowd Counting in Cross-scene Scenarios, in Proceedings of the 15th International Joint Conference on Computer Vision, Imaging and Computer Graphics Theory and Applications VISAPP 2020, Valletta - Malta, 2020, vol. 4, pp. 365-372. (4.23 MB)
2019
C. Gurrin, Schoeffmann, K., Joho, H., Leibetseder, A., Zhou, L., Duane, A., Dang-Nguyen, D. - T., Riegler, M., Piras, L., Tran, M. - T., Lokoč, J., and Hürst, W., Comparing Approaches to Interactive Lifelog Search at the Lifelog Search Challenge (LSC2018), ITE Transactions on Media Technology and Applications, vol. 7, pp. 46-59, 2019. (4.7 MB)
A. Carcangiu, Spano, L. Davide, Fumera, G., and Roli, F., DEICTIC: a Compositional and Declarative Gesture Description based on Hidden Markov Model, International Journal of Human-Computer Studies, vol. 122, p. 20, 2019. (1.69 MB)
F. Crecchi, Bacciu, D., and Biggio, B., Detecting Adversarial Examples through Nonlinear Dimensionality Reduction, in 27th European Symposium on Artificial Neural Networks, Computational Intelligence and Machine Learning - ESANN '19, 2019, pp. 483-488. (552.39 KB)
D. Maiorca and Biggio, B., Digital Investigation of PDF Files: Unveiling Traces of Embedded Malware, IEEE Security and Privacy: Special Issue on Digital Forensics, vol. 17, no. 1, pp. 63-71, 2019. (838.95 KB)
M. Scalas, Maiorca, D., Mercaldo, F., Visaggio, C. Aaron, Martinelli, F., and Giacinto, G., On the Effectiveness of System API-Related Information for Android Ransomware Detection, Computers and Security, vol. 86, pp. 162-182, 2019. (706.92 KB)
L. Demetrio, Biggio, B., Lagorio, G., Roli, F., and Armando, A., Explaining Vulnerabilities of Deep Learning to Adversarial Malware Binaries, in 3rd Italian Conference on Cyber Security, ITASEC 2019, Pisa, Italy, 2019, vol. 2315. (801.85 KB)
L. Piras, Caputo, B., Dang-Nguyen, D. - T., Riegler, M., and Halvorsen, P., Image Retrieval Evaluation in Specific Domains, in Information Retrieval Evaluation in a Changing World - Lessons Learned from 20 Years of CLEF, 2019, pp. 275–305. (202.36 KB)
B. Ionescu, Müller, H., Péteri, R., Dang-Nguyen, D. - T., Piras, L., Riegler, M., Tran, M. - T., Lux, M., Gurrin, C., Cid, Y. Dicente, Liauchuk, V., Kovalev, V., Ben Abacha, A., Hasan, S. A., Datla, V. V., Liu, J., Demner-Fushman, D., Pelka, O., Friedrich, C. M., Chamberlain, J., Clark, A., de Herrera, A. García Se, García, N., Kavallieratou, E., del-Blanco, C. Roberto, Cuevas, C., Vasilopoulos, N., and Karampidis, K., ImageCLEF 2019: Multimedia Retrieval in Lifelogging, Medical, Nature, and Security Applications, in Advances in Information Retrieval - 41st European Conference on IR Research, ECIR 2019, Cologne, Germany, April 14-18, 2019, Proceedings, Part {II}, 2019, pp. 301–308.
B. Ionescu, Müller, H., Péteri, R., Cid, Y. Dicente, Liauchuk, V., Kovalev, V., Klimuk, D., Tarasau, A., Ben Abacha, A., Hasan, S. A., Datla, V. V., Liu, J., Demner-Fushman, D., Dang-Nguyen, D. - T., Piras, L., Riegler, M., Tran, M. - T., Lux, M., Gurrin, C., Pelka, O., Friedrich, C. M., de Herrera, A. García Se, García, N., Kavallieratou, E., del-Blanco, C. Roberto, Cuevas, C., Vasilopoulos, N., Karampidis, K., Chamberlain, J., Clark, A., and Campello, A., ImageCLEF 2019: Multimedia Retrieval in Medicine, Lifelogging, Security and Nature, in Experimental IR Meets Multilinguality, Multimodality, and Interaction - 10th International Conference of the CLEF Association, CLEF 2019, Lugano, Switzerland, September 9-12, 2019, Proceedings, 2019, pp. 358–386. (323.96 KB)
V. - T. Ninh, Le, T. - K., Zhou, L., Piras, L., Riegler, M., Lux, M., Tran, M. - T., Gurrin, C., and Dang-Nguyen, D. - T., LIFER 2.0: Discovering Personal Lifelog Insights using an Interactive Lifelog Retrieval System, in Working Notes of {CLEF} 2019 - Conference and Labs of the Evaluation Forum, Lugano, Switzerland, September 9-12, 2019., 2019. (1.56 MB)
D. - T. Dang-Nguyen, Piras, L., Riegler, M., Zhou, L., Lux, M., Tran, M. - T., Le, T. - K., Ninh, V. - T., and Gurrin, C., Overview of ImageCLEFlifelog 2019: Solve My Life Puzzle and Lifelog Moment Retrieval, in Working Notes of {CLEF} 2019 - Conference and Labs of the Evaluation Forum, Lugano, Switzerland, September 9-12, 2019., 2019. (4.58 MB)
R. Labaca-Castro, Biggio, B., and Rodosek, G. Dreo, Poster: Attacking Malware Classifiers by Crafting Gradient-Attacks That Preserve Functionality, in Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications Security, New York, NY, USA, 2019, pp. 2565–2567.

Pages