Export 446 results:
In Press
L. Putzu and Fumera, G., Automatic Myelofibrosis Grading from Silver-Stained Images, in The 19th International Conference on Computer Analysis of Images and Patterns (CAIP), In Press.
W. W. Y. Ng, Hu, J., Yeung, D., Yin, S., and Roli, F., Diversified Sensitivity based Undersampling for Imbalance Classification Problems, IEEE Transactions on Cybernetics, In Press. (1.91 MB)
G. Suarez-Tangil, Dash, S. Kumar, Ahmadi, M., Kinder, J., Giacinto, G., and Cavallaro, L., DroidSieve: Fast and Accurate Classification of Obfuscated Android Malware, in Proceedings of the Seventh {ACM} Conference on Data and Application Security and Privacy, {CODASPY} 2017, In Press. (478.59 KB)
E. Ledda, Putzu, L., Delussu, R., and Fumera, G., How realistic should synthetic images be for training crowd counting models?, in The 19th International Conference on Computer Analysis of Images and Patterns (CAIP), In Press. (6.51 MB)
L. Putzu, Loddo, A., and Di Ruberto, C., Invariant Moments, Textural and Deep features for Diagnostic MR and CT Image Retrieval, in The 19th International Conference on Computer Analysis of Images and Patterns (CAIP), In Press.
Y. Guan, Li, C. - T., and Roli, F., On Reducing the Effect of Covariate Factors in Gait Recognition: a Classifier Ensemble Method, IEEE Transactions on Pattern Analysis and Machine Intelligence, In Press. (311.43 KB) (151.4 KB)
H. - Y. Lin and Biggio, B., Adversarial Machine Learning: Attacks From Laboratories to the Real World, Computer, vol. 54, pp. 56-60, 2021.
P. Temple, Perrouin, G., Acher, M., Biggio, B., Jézéquel, J. - M., and Roli, F., Empirical Assessment of Generating Adversarial Configurations for Software Product Lines, Empirical Software Engineering, vol. 26, no. 6, 2021. (1.29 MB)
L. Demetrio, Biggio, B., Lagorio, G., Roli, F., and Armando, A., Functionality-Preserving Black-Box Optimization of Adversarial Windows Malware, IEEE Transactions on Information Forensics and Security, vol. 16, pp. 3469-3478, 2021.
D. Solans, Biggio, B., and Castillo, C., Poisoning Attacks on Algorithmic Fairness, in Machine Learning and Knowledge Discovery in Databases (ECML PKDD 2020), 2021, p. 162--177. (1.05 MB)
D. Maiorca, Demontis, A., Biggio, B., Roli, F., and Giacinto, G., Adversarial Detection of Flash Malware: Limitations and Open Issues, Computers & Security, vol. 96, 2020. (1.08 MB)
L. Putzu, Piras, L., and Giacinto, G., Convolutional neural networks for relevance feedback in content based image retrieval: A Content based image retrieval system that exploits convolutional neural networks both for feature extraction and for relevance feedback, Multimedia Tools and Applications, vol. 79, pp. 26995-27021, 2020.
A. Sotgiu, Demontis, A., Melis, M., Biggio, B., Fumera, G., Feng, X., and Roli, F., Deep Neural Rejection against Adversarial Examples, EURASIP Journal on Information Security, vol. 5, 2020.
C. Di Ruberto, Loddo, A., and Putzu, L., Detection of red and white blood cells from microscopic blood images using a region proposal approach, Computers in Biology and Medicine, vol. 116, 2020.
R. Delussu, Putzu, L., and Fumera, G., An Empirical Evaluation of Cross-scene Crowd Counting Performance, in Proceedings of the 15th International Joint Conference on Computer Vision, Imaging and Computer Graphics Theory and Applications - VISAPP, Valletta - Malta, 2020, vol. 4, pp. 373-380. (527.29 KB)
L. Putzu and Fumera, G., An empirical evaluation of nuclei segmentation from H&E images in a real application scenario, Applied Sciences (Switzerland), vol. 10, pp. 1-15, 2020.
F. Cara, Scalas, M., Giacinto, G., and Maiorca, D., On the Feasibility of Adversarial Sample Creation Using the Android System API, Information, no. 11(9): 433, 2020. (1.26 MB)
R. Soleymani, Granger, E., and Fumera, G., F-Measure Curves: A Tool to Visualize Classifier Performance Under Imbalance, Pattern Recognition, vol. 100, p. 107146, 2020. (3.15 MB)
R. Delussu, Putzu, L., and Fumera, G., Investigating Synthetic Data Sets for Crowd Counting in Cross-scene Scenarios, in Proceedings of the 15th International Joint Conference on Computer Vision, Imaging and Computer Graphics Theory and Applications VISAPP 2020, Valletta - Malta, 2020, vol. 4, pp. 365-372. (4.23 MB)
R. Delussu, Putzu, L., Fumera, G., and Roli, F., Online Domain Adaptation for Person Re-Identification with a Human in the Loop, in 25th International Conference on Pattern Recognition, {ICPR} 2020, Virtual Event / Milan, Italy, January 10-15, 2021, 2020, pp. 3829–3836. (770.02 KB)
C. Gurrin, Schoeffmann, K., Joho, H., Leibetseder, A., Zhou, L., Duane, A., Dang-Nguyen, D. - T., Riegler, M., Piras, L., Tran, M. - T., Lokoč, J., and Hürst, W., Comparing Approaches to Interactive Lifelog Search at the Lifelog Search Challenge (LSC2018), ITE Transactions on Media Technology and Applications, vol. 7, pp. 46-59, 2019. (4.7 MB)
A. Carcangiu, Spano, L. Davide, Fumera, G., and Roli, F., DEICTIC: a Compositional and Declarative Gesture Description based on Hidden Markov Model, International Journal of Human-Computer Studies, vol. 122, p. 20, 2019. (1.69 MB)
F. Crecchi, Bacciu, D., and Biggio, B., Detecting Adversarial Examples through Nonlinear Dimensionality Reduction, in 27th European Symposium on Artificial Neural Networks, Computational Intelligence and Machine Learning - ESANN '19, 2019, pp. 483-488. (552.39 KB)
D. Maiorca and Biggio, B., Digital Investigation of PDF Files: Unveiling Traces of Embedded Malware, IEEE Security and Privacy: Special Issue on Digital Forensics, vol. 17, no. 1, pp. 63-71, 2019. (838.95 KB)
M. Scalas, Maiorca, D., Mercaldo, F., Visaggio, C. Aaron, Martinelli, F., and Giacinto, G., On the Effectiveness of System API-Related Information for Android Ransomware Detection, Computers and Security, vol. 86, pp. 162-182, 2019. (706.92 KB)