Export 484 results:
A B C D E F G H I J K L M N O P Q R S T U V W X Y Z 
A. Loddo, Putzu, L., Di Ruberto, C., and Fenu, G., A Computer-Aided System for Differential Count from Peripheral Blood Cell Images, in Proceedings - 12th International Conference on Signal Image Technology and Internet-Based Systems, SITIS 2016, 2017, pp. 112 – 118.
L. Putzu, Piras, L., and Giacinto, G., Convolutional neural networks for relevance feedback in content based image retrieval: A Content based image retrieval system that exploits convolutional neural networks both for feature extraction and for relevance feedback, Multimedia Tools and Applications, vol. 79, pp. 26995-27021, 2020.
G. Fumera and Roli, F., Cost-sensitive Learning in Support Vector Machines, in Workshop on Machine Learning, Methods and Applications, held in the context of the 8th Meeting of the Italian Association of Artificial Intelligence (AI*IA), Siena, Italy, 2002.
N. Poh, Rattani, A., and Roli, F., A Critical Analysis of Adaptive Biometric Systems, IET Biometrics, 2012.
M. Mauri, Mulas, A., and Ariu, D., The Dark Side of Open Data, 2nd International Workshop on Knowledge Discovery on the WEB (KDWEB). Cagliari, 2016. (124.62 KB) (1.33 MB)
B. Biggio, Pillai, I., Rota Bulò, S., Ariu, D., Pelillo, M., and Roli, F., Is Data Clustering in Adversarial Settings Secure?, in AISec'13: Proceedings of the 2013 ACM Workshop on Artificial Intelligence and Security, Berlin, 2013, pp. 87-98. (300.52 KB)
G. Ennas, Biggio, B., and Di Guardo, M. Chiara, Data-driven Journal Meta-ranking in Business and Management, Scientometrics, pp. 1-19, 2015. (896.37 KB)
G. L. Marcialis and Roli, F., Decision-level fusion of PCA and LDA-based face recognition algorithms, International Journal of Image and Graphics, vol. 6, pp. 293-311, 2006.
M. Melis, Demontis, A., Biggio, B., Brown, G., Fumera, G., and Roli, F., Is Deep Learning Safe for Robot Vision? Adversarial Examples against the iCub Humanoid, in ICCV 2017 Workshop on Vision in Practice on Autonomous Robots (ViPAR), Venice, Italy, 2017, vol. 2017 IEEE International Conference on Computer Vision Workshops (ICCVW), pp. 751-759. (3.16 MB)
A. Sotgiu, Demontis, A., Melis, M., Biggio, B., Fumera, G., Feng, X., and Roli, F., Deep Neural Rejection against Adversarial Examples, EURASIP Journal on Information Security, vol. 5, 2020.
P. Piredda, Ariu, D., Biggio, B., Corona, I., Piras, L., Giacinto, G., and Roli, F., Deepsquatting: Learning-based Typosquatting Detection at Deeper Domain Levels, in 16th International Conference of the Italian Association for Artificial Intelligence (AI*IA 2017), 2017, vol. 10640 of LNCS, pp. 347-358. (1.21 MB)
A. Carcangiu, Spano, L. Davide, Fumera, G., and Roli, F., DEICTIC: a Compositional and Declarative Gesture Description based on Hidden Markov Model, International Journal of Human-Computer Studies, vol. 122, p. 20, 2019. (1.69 MB)
I. Corona, Biggio, B., Contini, M., Piras, L., Corda, R., Mereu, M., Mureddu, G., Ariu, D., and Roli, F., DeltaPhish: Detecting Phishing Webpages in Compromised Websites, 22nd European Symposium on Research in Computer Security (ESORICS), vol. 10492. Springer International Publishing, Norway, September 11-15, 2017, pp. 370–388, 2017. (4.13 MB)
D. Maiorca, Design and Implementation of Robust Systems for Secure Malware Detection (Ph.D. Thesis), University of Cagliari, Italy, Cagliari, 2016. (5.34 MB)
G. Giacinto, Roli, F., and Fumera, G., Design of effective multiple classifier systems by clustering of classifiers, in 15th Int. Conference on Pattern Recognition (ICPR 2000), Barcelona, Spain, 2000, vol. 2, pp. 160-163.
G. Giacinto and Roli, F., Design of effective neural network ensembles for image classification, Image and Vision Computing Journal, vol. 19, pp. 697-705, 2001.
F. Roli and Giacinto, G., Design of Multiple Classifier Systems, in Hybrid Methods in Pattern Recognition, B. ;A. H. Kandel World Scientific Publishing, 2002.
B. Biggio, Fumera, G., and Roli, F., Design of Robust Classifiers for Adversarial Environments, in IEEE International Conference on Systems, Man, and Cybernetics (SMC 2011), Anchorage, Alaska, USA, 2011, pp. 977–982. (328.68 KB)
I. Pillai, Fumera, G., and Roli, F., Designing multi-label classifiers that maximize F measures: state of the art, Pattern Recognition, vol. 61, 2017. (452.28 KB)
R. Tronci, Giacinto, G., and Roli, F., Designing multiple biometric systems: measures of ensemble effectiveness, Engineering Applications of Artificial Intelligence, vol. 22, pp. 66-78, 2009.
F. Crecchi, Bacciu, D., and Biggio, B., Detecting Adversarial Examples through Nonlinear Dimensionality Reduction, in 27th European Symposium on Artificial Neural Networks, Computational Intelligence and Machine Learning - ESANN '19, 2019, pp. 483-488. (552.39 KB)
G. L. Foresti, Giacinto, G., and Roli, F., Detecting Dangerous Behaviors of Mobile Objects in Parking Areas, in Multisensor Surveillance Systems: The Fusion Perspective, R. G. L. C. Foresti and Varshney, P. Kluwer Academic Publishers, 2003, pp. 199-211.
G. L. Foresti, Giacinto, G., and Roli, F., Detecting Dangerous Behaviours of Mobile Objects in Parking Areas, in 2nd European Workshop on Advanced Video-based Surveillance Systems (AVBS2001), London, United Kingdom, 2001.
R. Perdisci, Corona, I., Dagon, D., and Lee, W., Detecting Malicious Flux Service Networks through Passive Analysis of Recursive DNS Traces, in Annual Computer Security Applications Conference (ACSAC), Honolulu, Hawaii, USA, 2009. (206.97 KB)
M. Ahmadi, Biggio, B., Arzt, S., Ariu, D., and Giacinto, G., Detecting Misuse of Google Cloud Messaging in Android Badware, in 6th Workshop on Security and Privacy in Smartphones and Mobile Devices (SPSM), Vienna, Austria, 2016, pp. 103-112. (626.38 KB)