Publications

Export 484 results:
A B C D E F G H I J K L M N O P Q R S T U V W X Y Z 
C
P. Coli, Marcialis, G. L., and Roli, F., Analysis and selection of features for the fingerprint vitality detection, in Joint IAPR Int. Workshop. on Structural and Syntactical Pattern Recognition and Statistical Techniques in Pattern Recognition S+SSPR06, 2006, vol. 4109, pp. 907-915.
P. Coli, Marcialis, G. L., and Roli, F., Vitality detection from fingerprint images: a critical survey, in 2nd International Conference on Biometrics ICB 2007, Seoul (South Korea), 2007, vol. 4642, pp. 722-731.
P. Coli, Marcialis, G. L., and Roli, F., Fingerprint silicon replicas: static and dynamic features for vitality detection using an optical capture device, International Journal of Image and Graphics, vol. 8, pp. 495-512, 2008.
M. Contini, Corona, I., Mulas, A., Giacinto, G., and Ariu, D., Pharmaguard WebApp: an application for the detection of illegal online pharmacies, 2nd International Workshop on Knowledge Discovery on the WEB (KDWEB). Cagliari, 2016. (120.57 KB)
I. Corona, Detection of Web-based attacks, University of Cagliari, Cagliari (Italy), 2010.
I. Corona, Giacinto, G., and Roli, F., Intrusion Detection in Computer Systems using Multiple Classifer Systems, in Supervised and Unsupervised Ensemble Methods and Their Applications, O. Okun and G. Valentini., Springer-Verlag, Berlin/Heidelberg, 2008, pp. 91-114.
I. Corona, Giacinto, G., and Roli, F., Adversarial Attacks against Intrusion Detection Systems: Taxonomy, Solutions and Open Issues, Information Sciences, vol. 239, 2013. (1.49 MB)
I. Corona, Ariu, D., and Giacinto, G., HMM-Web: a framework for the detection of attacks against Web applications, in IEEE ICC 2009, Dresden, Germany, 2009. (391.14 KB)
I. Corona and Giacinto, G., Detection of server side web attacks, in Workshop on Applications of Pattern Analysis, Cumberland Lodge, London, UK, 2010. (308.33 KB)
I. Corona, Biggio, B., Contini, M., Piras, L., Corda, R., Mereu, M., Mureddu, G., Ariu, D., and Roli, F., DeltaPhish: Detecting Phishing Webpages in Compromised Websites, 22nd European Symposium on Research in Computer Security (ESORICS), vol. 10492. Springer International Publishing, Norway, September 11-15, 2017, pp. 370–388, 2017. (4.13 MB)
I. Corona, Giacinto, G., and Roli, F., Intrusion detection in computer systems as a pattern recognition task in adversarial environment: a critical review, in Workshop on Neural Information Processing Systems (NIPS), Whistler, British Columbia, Canada, 2007.
I. Corona, Tronci, R., and Giacinto, G., SuStorID: A Multiple Classifier System for the Protection of Web Services, in International Conference on Pattern Recognition (ICPR 2012), Tsukuba International Congress Center, Tsukuba Science City, JAPAN, 2012, pp. 2375-2378. (286.16 KB)
I. Corona, Giacinto, G., Mazzariello, C., Roli, F., and Sansone, C., Information fusion for computer security: State of the art and open issues, Information Fusion, vol. 10, pp. 274-284, 2009.
I. Corona, Contini, M., Ariu, D., Giacinto, G., Roli, F., Lund, M., and Marinelli, G., PharmaGuard: Automatic Identification of Illegal Search-Indexed Online Pharmacies, IEEE International Conference on Cybernetics - Special session Cybersecurity (CYBERSEC). IEEE, Gdynia, Poland , pp. 324 - 329, 2015. (1.44 MB) (3.4 MB)
I. Corona, Maiorca, D., Ariu, D., and Giacinto, G., Lux0R: Detection of Malicious PDF-embedded JavaScript code through Discriminant Analysis of API References, in AISec'14: Proceedings of the 2014 ACM Workshop on Artificial Intelligence and Security, co-located with CCS '14, Scottdale, Arizona, USA, 2014. (455.14 KB)
E. Costamagna, Fanni, A., and Giacinto, G., A simulated annealing algorithm for the optimization of communication network, in Int. Symp. on Signals, Systems and Electronics (ISSSE '95), 1995, pp. 405-408.
E. Costamagna, Fanni, A., and Giacinto, G., A Tabu Search algorithm for the optimisation of telecommunication networks, European Journal of Operational Research, vol. 106, pp. 357-372, 1998.
F. Crecchi, Melis, M., Sotgiu, A., Bacciu, D., and Biggio, B., FADER: Fast adversarial example rejection, Neurocomputing, vol. 470, pp. 257-268, 2022.
F. Crecchi, Bacciu, D., and Biggio, B., Detecting Adversarial Examples through Nonlinear Dimensionality Reduction, in 27th European Symposium on Artificial Neural Networks, Computational Intelligence and Machine Learning - ESANN '19, 2019, pp. 483-488. (552.39 KB)
A. Crobe, Demuru, M., Didaci, L., Marcialis, G. L., and Fraschini, M., Minimum spanning tree and K-Core decomposition as measure of subject-specific EEG traits, Biomedical Physics and Engineering Express, vol. 1, no. 2, p. 017001, 2016. (802.39 KB)
C. Cusano, Satta, R., and Santini, S., Unsupervised Classemes, in 2012 ECCV Workshop on Information Fusion in Computer Vision for Concept Recognition (IFCVCR 2012), Firenze (Italy), 2012. (259.36 KB)
D
D. - T. Dang-Nguyen, Piras, L., Giacinto, G., Boato, G., and De Natale, F. G. B., Retrieval of Diverse Images by Pre-filtering and Hierarchical Clustering, in MediaEval (Online Working Notes), Barcelona; Spain, 2014, vol. 1263. (221.52 KB)
D. - T. Dang-Nguyen, Boato, G., De Natale, F. G. B., Piras, L., Giacinto, G., Tuveri, F., and Angioni, M., Multimodal-based Diversified Summarization in Social Image Retrieval, in Working Notes Proceedings of the MediaEval 2015 Workshop, Wurzen, Germany, September 14-15, 2015., 2015. (755.79 KB)
D. - T. Dang-Nguyen, Piras, L., Giacinto, G., Boato, G., and De Natale, F. G. B., Multimodal Retrieval with Diversification and Relevance Feedback for Tourist Attraction Images, ACM Transactions on Multimedia Computing, Communications, and Applications, vol. 13, no. 4, 2017. (5.94 MB)
D. - T. Dang-Nguyen, Piras, L., Riegler, M., Zhou, L., Lux, M., Tran, M. - T., Le, T. - K., Ninh, V. - T., and Gurrin, C., Overview of ImageCLEFlifelog 2019: Solve My Life Puzzle and Lifelog Moment Retrieval, in Working Notes of {CLEF} 2019 - Conference and Labs of the Evaluation Forum, Lugano, Switzerland, September 9-12, 2019., 2019. (4.58 MB)

Pages