Publications

Export 44 results:
Filters: First Letter Of Title is E  [Clear All Filters]
2022
R. Delussu, Putzu, L., e Fumera, G., «On the Effectiveness of Synthetic Data Sets for Training Person Re-identification Models», in Proceedings - International Conference on Pattern Recognition, 2022, vol 2022-August, pagg 1208 – 1214.
E. Ledda, Putzu, L., Delussu, R., Fumera, G., e Roli, F., «On the Evaluation of Video-Based Crowd Counting Models», Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), vol 13233 LNCS. pagg 301 – 311, 2022.
A. Sotgiu, Pintor, M., e Biggio, B., «Explainability-Based Debugging of Machine Learning for Vulnerability Discovery», in Proc. 17th International Conference on Availability, Reliability and Security, New York, NY, USA, 2022.
F. Meloni, Sanna, A., Maiorca, D., e Giacinto, G., «Extended Abstract: Effective Call Graph Fingerprinting for the Analysis and Classification of Windows Malware», 19th Conference on Detection of Intrusions and Malware & Vulnerability Assessment (DIMVA). pagg 42-52, 2022. (328.32 KB)
2020
R. Delussu, Putzu, L., e Fumera, G., «An Empirical Evaluation of Cross-scene Crowd Counting Performance», in Proceedings of the 15th International Joint Conference on Computer Vision, Imaging and Computer Graphics Theory and Applications - VISAPP, Valletta - Malta, 2020, vol 4, pagg 373-380. (527.29 KB)
L. Putzu e Fumera, G., «An empirical evaluation of nuclei segmentation from H&E images in a real application scenario», Applied Sciences (Switzerland), vol 10, pagg 1-15, 2020.
2018
M. Melis, Maiorca, D., Biggio, B., Giacinto, G., e Roli, F., «Explaining Black-box Android Malware Detection», in 26th European Signal Processing Conference (EUSIPCO '18), Rome, Italy, 2018, pagg 524-528. (431.78 KB)
2016
J. Hoffmann, Rytilahti, T., Maiorca, D., Winandy, M., Giacinto, G., e Holz, T., «Evaluating Analysis Tools for Android Apps: Status Quo and Robustness Against Obfuscation», Horst Görtz Institut for IT Security (Ruhr-University Bochum), Technical Report TR-HGI-2016-003, 2016. (519.16 KB)
J. Hoffmann, Rytilahti, T., Maiorca, D., Winandy, M., Giacinto, G., e Holz, T., «Evaluating Analysis Tools for Android Apps: Status Quo and Robustness against Obfuscation», Proceedings of the 6th ACM Conference on Data and Application Security and Privacy (CODASPY 2016, 09-11 March, 2016). 2016. (726.65 KB)
2015
M. Fraschini, Hillebrand, A., Demuru, M., Didaci, L., e Marcialis, G. L., «An EEG-based biometric system using eigenvector centrality in resting state brain activity», IEEE Signal Processing Letters, vol 22, n° 6, 2015. (522.35 KB)
M. A. O. Ahmed, Didaci, L., Fumera, G., e Roli, F., «An Empirical Investigation on the Use of Diversity for Creation of Classifier Ensembles», in Multiple Classifier Systems, 2015, vol 9132, pagg 206-219. (216.76 KB)
D. Maiorca, Ariu, D., Corona, I., e Giacinto, G., «An Evasion Resilient Approach to the Detection of Malicious PDF Files», in Information Systems Security and Privacy (Communication in Computer and Information Science), vol 576, Springer, 2015, pagg 68-85. (503.11 KB)
2014
C. Pagano, Granger, E., Sabourin, R., Rattani, A., Marcialis, G. L., e Roli, F., «Efficient Adaptive Face Recognition Systems Based on Capture Conditions, Proc. of », in IEEE Workshop on Computational Intelligence in Biometrics and Identity Management (CIBIM 2014), 2014. (574.39 KB)
2013
G. L. Marcialis, Didaci, L., e Roli, F., «Estimating the serial combination's performance from that of individual base classifiers», in IAPR 17th Int. Conf. on Image Analysis and Processing (ICIAP 2013), 2013, vol Springer LNCS 8156, pagg 622-631. (210.77 KB)
B. Biggio, Corona, I., Maiorca, D., Nelson, B., Srndic, N., Laskov, P., Giacinto, G., e Roli, F., «Evasion attacks against machine learning at test time», in European Conference on Machine Learning and Principles and Practice of Knowledge Discovery in Databases (ECML PKDD), 2013, vol 8190, pagg 387-402. (473.78 KB)
G. Fadda, Marcialis, G. L., Roli, F., e Ghiani, L., «Exploiting the Golden Ratio on Human Faces for Head-Pose Estimation», in IAPR 17th Int. Conf. on Image Analysis and Processing (ICIAP 2013), Napoli (Italy), 2013, vol Springer LNCS 8156, pagg 280-289. (546.25 KB)
2012
R. Perdisci, Corona, I., e Giacinto, G., «Early Detection of Malicious Flux Networks via Large-Scale Passive DNS Traffic Analysis», IEEE Transactions on Dependable and Secure Computing, vol 9, pagg 714-726, 2012. (1.37 MB)
C. - T. Li e Satta, R., «Empirical Investigation into the Correlation between Vignetting Effect and the Quality of Sensor Pattern Noise», IET Computer Vision, vol 6, n° 6, pagg 560-566, 2012.
L. Piras, Giacinto, G., e Paredes, R., «Enhancing image retrieval by an Exploration-Exploitation approach», in 8th International Conference Machine Learning and Data Mining (MLDM), Berlin, 2012, vol 7376, pagg 355-365. (307.57 KB)
Z. Akhtar, Fumera, G., Marcialis, G. L., e Roli, F., «Evaluation of Multimodal Biometric Score Fusion Rules under Spoof Attacks», in 5th IAPR Int’l Conference on Biometrics (ICB), New Delhi, India, 2012, pagg 402-407. (612.37 KB)
Z. Akhtar, Fumera, G., Marcialis, G. L., e Roli, F., «Evaluation of serial and parallel multibiometric systems under spoofing attacks», in 5th IEEE Int'l Conference on Biometrics: Theory, Applications and Systems (BTAS), Washington DC, USA, 2012, vol . (573.02 KB)

Pages