G. Fumera, Marcialis, G. L., Biggio, B., Roli, F., e Schuckers, S. C.,
«Multimodal Anti-Spoofing in Biometric Recognition Systems», in
Handbook of Biometric Anti-Spoofing,
S. Marcel, Nixon, M., e Li, S. Z. Springer, 2014, pagg 165-184.
(155.83 KB) L. Piras e Giacinto, G.,
«Open issues on codebook generation in Image Classification tasks», in
10th International Conference Machine Learning and Data Mining (MLDM), St. Petersburg, Russia, 2014, pagg 328-342.
(229.92 KB) B. Biggio, Fumera, G., e Roli, F.,
«Pattern Recognition Systems under Attack: Design Issues and Research Challenges»,
Int'l J. Patt. Recogn. Artif. Intell., vol 28, n° 7, pag 1460002, 2014.
(1.41 MB) B. Biggio, Rieck, K., Ariu, D., Wressnegger, C., Corona, I., Giacinto, G., e Roli, F.,
«Poisoning Behavioral Malware Clustering», in
AISec'14: Proceedings of the 2014 ACM Workshop on Artificial Intelligence and Security, co-located with CCS '14, Scottsdale, Arizona, USA, 2014, pagg 27-36.
(375.58 KB) B. Biggio, Rota Bulò, S., Pillai, I., Mura, M., Zemene Mequanint, E., Pelillo, M., e Roli, F.,
«Poisoning complete-linkage hierarchical clustering», in
Joint IAPR Int'l Workshop on Structural, Syntactic, and Statistical Pattern Recognition (LNCS), Joensuu, Finland, 2014, vol 8621, pagg 42-52.
(388.31 KB) D. - T. Dang-Nguyen, Piras, L., Giacinto, G., Boato, G., e De Natale, F. G. B.,
«Retrieval of Diverse Images by Pre-filtering and Hierarchical Clustering», in
MediaEval (Online Working Notes), Barcelona; Spain, 2014, vol 1263.
(221.52 KB) B. Biggio, Fumera, G., e Roli, F.,
«Security evaluation of pattern classifiers under attack»,
IEEE Transactions on Knowledge and Data Engineering, vol 26, n° 4, pagg 984-996, 2014.
(1.35 MB) B. Biggio, Corona, I., Nelson, B., Rubinstein, B. I. P., Maiorca, D., Fumera, G., Giacinto, G., e Roli, F.,
«Security Evaluation of Support Vector Machines in Adversarial Environments», in
Support Vector Machines Applications,
Y. Ma e Guo, G. Springer International Publishing, 2014, pagg 105-153.
(687.1 KB) R. Wong, Poh, N., e Marcialis, G. L.,
«Toward an attack-sensitive tamper-resistant biometric recognition with a symmetric matcher: A fingerprint case study», in
IEEE Symposium on Computational Intelligence in Biometrics and Identity Management (CIBIM), Dec., 9-11, 2014, Orlando (Florida), 2014, pagg 175-180.
(1.32 MB) R. Satta e Stirparo, P.,
«On the usage of Sensor Pattern Noise for Picture-to-Identity linking through social network accounts», in
9th International Conference on Computer Vision Theory and Applications (VISAPP 2014), Lisbon, Portugal, 2014.
(340.78 KB)