Publications

Export 484 results:
Conference Paper
G. Fumera e Roli, F., «Cost-sensitive Learning in Support Vector Machines», in Workshop on Machine Learning, Methods and Applications, held in the context of the 8th Meeting of the Italian Association of Artificial Intelligence (AI*IA), Siena, Italy, 2002.
B. Biggio, Pillai, I., Rota Bulò, S., Ariu, D., Pelillo, M., e Roli, F., «Is Data Clustering in Adversarial Settings Secure?», in AISec'13: Proceedings of the 2013 ACM Workshop on Artificial Intelligence and Security, Berlin, 2013, pagg 87-98. (300.52 KB)
M. Melis, Demontis, A., Biggio, B., Brown, G., Fumera, G., e Roli, F., «Is Deep Learning Safe for Robot Vision? Adversarial Examples against the iCub Humanoid», in ICCV 2017 Workshop on Vision in Practice on Autonomous Robots (ViPAR), Venice, Italy, 2017, vol 2017 IEEE International Conference on Computer Vision Workshops (ICCVW), pagg 751-759. (3.16 MB)
P. Piredda, Ariu, D., Biggio, B., Corona, I., Piras, L., Giacinto, G., e Roli, F., «Deepsquatting: Learning-based Typosquatting Detection at Deeper Domain Levels», in 16th International Conference of the Italian Association for Artificial Intelligence (AI*IA 2017), 2017, vol 10640 of LNCS, pagg 347-358. (1.21 MB)
G. Giacinto, Roli, F., e Fumera, G., «Design of effective multiple classifier systems by clustering of classifiers», in 15th Int. Conference on Pattern Recognition (ICPR 2000), Barcelona, Spain, 2000, vol 2, pagg 160-163.
B. Biggio, Fumera, G., e Roli, F., «Design of Robust Classifiers for Adversarial Environments», in IEEE International Conference on Systems, Man, and Cybernetics (SMC 2011), Anchorage, Alaska, USA, 2011, pagg 977–982. (328.68 KB)
F. Crecchi, Bacciu, D., e Biggio, B., «Detecting Adversarial Examples through Nonlinear Dimensionality Reduction», in 27th European Symposium on Artificial Neural Networks, Computational Intelligence and Machine Learning - ESANN '19, 2019, pagg 483-488. (552.39 KB)
G. L. Foresti, Giacinto, G., e Roli, F., «Detecting Dangerous Behaviours of Mobile Objects in Parking Areas», in 2nd European Workshop on Advanced Video-based Surveillance Systems (AVBS2001), London, United Kingdom, 2001.
R. Perdisci, Corona, I., Dagon, D., e Lee, W., «Detecting Malicious Flux Service Networks through Passive Analysis of Recursive DNS Traces», in Annual Computer Security Applications Conference (ACSAC), Honolulu, Hawaii, USA, 2009. (206.97 KB)
M. Ahmadi, Biggio, B., Arzt, S., Ariu, D., e Giacinto, G., «Detecting Misuse of Google Cloud Messaging in Android Badware», in 6th Workshop on Security and Privacy in Smartphones and Mobile Devices (SPSM), Vienna, Austria, 2016, pagg 103-112. (626.38 KB)
I. Sanchez, Satta, R., Giuliani, R., e Baldini, G., «Detection of DECT identity spoofing through Radio Frequency fingerprinting», in 38th International Convention on Information and Communication Technology, Electronics and Microelectronics (MIPRO 2015), Opatija, Croatia, 2015. (778.81 KB)
D. Maiorca, Russu, P., Corona, I., Biggio, B., e Giacinto, G., «Detection of Malicious Scripting Code through Discriminant and Adversary-Aware API Analysis», in 1st Italian Conference on CyberSecurity (ITASEC), 2017, vol 1816, pagg 96-105. (371.53 KB)
I. Corona e Giacinto, G., «Detection of server side web attacks», in Workshop on Applications of Pattern Analysis, Cumberland Lodge, London, UK, 2010. (308.33 KB)
L. Piras e Giacinto, G., «Dissimilarity representation in multi-feature spaces for image retrieval», in 16th Int. Conference on Image Analysis and Processing (ICIAP), Ravenna, Italy, 2011. (252.22 KB)
G. Giacinto e Roli, F., «Dissimilarity Representation of Images for Relevance Feedback in Content-Based Image Retrieval», in Machine Learning and Data Mining in Pattern Recognition (MLDM 2003), Leipzig, Germany, 2003, vol 2734, pagg 202-214.
L. Didaci, Fumera, G., e Roli, F., «Diversity in classifier ensembles: fertile concept or dead end?», in 11th Int. Workshop on Multiple Classifier Systems, Nanjing, China, 2013, vol 7872. (241.27 KB) (163.54 KB)
L. Piras, Tronci, R., e Giacinto, G., «Diversity in ensembles of codebooks for visual concept detection», in 17th Int. Conference on Image Analysis and Processing (ICIAP), Naples, Italy, 2013. (303.73 KB)
S. Kumar Dash, Suarez-Tangil, G., Khan, S., Tam, K., Ahmadi, M., Kinder, J., e Cavallaro, L., «DroidScribe: Classifying Android Malware Based on Runtime Behavior», in Mobile Security Technologies (MoST 2016), 2016. (571.22 KB)
G. Suarez-Tangil, Dash, S. Kumar, Ahmadi, M., Kinder, J., Giacinto, G., e Cavallaro, L., «DroidSieve: Fast and Accurate Classification of Obfuscated Android Malware», in Proceedings of the Seventh ACM on Conference on Data and Application Security and Privacy, New York, NY, USA, 2017, pagg 309–320.
A. Rattani, Marcialis, G. L., Granger, E., e Roli, F., «A Dual-staged Classification-Selection Approach for Automated Update of Biometric Templates», in International Conference on Pattern Recognition (ICPR), Tsukuba Science City, JAPAN, 2012.
G. Giacinto e Roli, F., «Dynamic Classifier Selection», in First Int. Workshop on Multiple Classifier Systems (MCS 2000), Cagliari, Italy, 2000, vol 1857, pagg 177-189.
L. Didaci e Giacinto, G., «Dynamic Classifier Selection by Adaptive k-Nearest-Neighbourhood Rule», in 5th Int. Workshop on Multiple Classifier Systems (MCS 2004), 2004, vol 3077.
C. Lobrano, Tronci, R., Giacinto, G., e Roli, F., «Dynamic Linear Combination of Two-Class Classifiers», in Lecture Notes in Computer Science, 2010, vol 6218, pagg 473-482.
R. Tronci, Giacinto, G., e Roli, F., «Dynamic Score Combination: A Supervised and Unsupervised Score Combination Method», in Machine Learning and Data Mining in Pattern Recognition (MLDM 2009), Leipzig, Germany, 2009, vol 5632, pagg 163-177.
R. Tronci, Giacinto, G., e Roli, F., «Dynamic score combination of binary experts», in 19th International Conference on Pattern Recognition (ICPR 2008), Tampa (Florida, USA), 2008.

Pages