C
C. Cusano, Satta, R., e Santini, S.,
«Unsupervised Classemes», in
2012 ECCV Workshop on Information Fusion in Computer Vision for Concept Recognition (IFCVCR 2012), Firenze (Italy), 2012.
(259.36 KB) A. Crobe, Demuru, M., Didaci, L., Marcialis, G. L., e Fraschini, M.,
«Minimum spanning tree and K-Core decomposition as measure of subject-specific EEG traits»,
Biomedical Physics and Engineering Express, vol 1, n° 2, pag 017001, 2016.
(802.39 KB) F. Crecchi, Bacciu, D., e Biggio, B.,
«Detecting Adversarial Examples through Nonlinear Dimensionality Reduction», in
27th European Symposium on Artificial Neural Networks, Computational Intelligence and Machine Learning - ESANN '19, 2019, pagg 483-488.
(552.39 KB) F. Crecchi, Melis, M., Sotgiu, A., Bacciu, D., e Biggio, B.,
«FADER: Fast adversarial example rejection»,
Neurocomputing, vol 470, pagg 257-268, 2022.
I. Corona,
«Detection of Web-based attacks», University of Cagliari, Cagliari (Italy), 2010.
I. Corona, Giacinto, G., e Roli, F.,
«Intrusion detection in computer systems as a pattern recognition task in adversarial environment: a critical review», in
Workshop on Neural Information Processing Systems (NIPS), Whistler, British Columbia, Canada, 2007.
I. Corona, Tronci, R., e Giacinto, G.,
«SuStorID: A Multiple Classifier System for the Protection of Web Services», in
International Conference on Pattern Recognition (ICPR 2012), Tsukuba International Congress Center, Tsukuba Science City, JAPAN, 2012, pagg 2375-2378.
(286.16 KB) I. Corona, Giacinto, G., e Roli, F.,
«Intrusion Detection in Computer Systems using Multiple Classifer Systems», in
Supervised and Unsupervised Ensemble Methods and Their Applications, O. Okun and G. Valentini., Springer-Verlag, Berlin/Heidelberg, 2008, pagg 91-114.
I. Corona, Contini, M., Ariu, D., Giacinto, G., Roli, F., Lund, M., e Marinelli, G.,
«PharmaGuard: Automatic Identification of Illegal Search-Indexed Online Pharmacies»,
IEEE International Conference on Cybernetics - Special session Cybersecurity (CYBERSEC). IEEE, Gdynia, Poland , pagg 324 - 329, 2015.
(1.44 MB)
(3.4 MB) I. Corona e Giacinto, G.,
«Detection of server side web attacks», in
Workshop on Applications of Pattern Analysis, Cumberland Lodge, London, UK, 2010.
(308.33 KB) I. Corona, Maiorca, D., Ariu, D., e Giacinto, G.,
«Lux0R: Detection of Malicious PDF-embedded JavaScript code through Discriminant Analysis of API References», in
AISec'14: Proceedings of the 2014 ACM Workshop on Artificial Intelligence and Security, co-located with CCS '14, Scottdale, Arizona, USA, 2014.
(455.14 KB) I. Corona, Biggio, B., Contini, M., Piras, L., Corda, R., Mereu, M., Mureddu, G., Ariu, D., e Roli, F.,
«DeltaPhish: Detecting Phishing Webpages in Compromised Websites»,
22nd European Symposium on Research in Computer Security (ESORICS), vol 10492. Springer International Publishing, Norway, September 11-15, 2017, pagg 370–388, 2017.
(4.13 MB) I. Corona, Giacinto, G., Mazzariello, C., Roli, F., e Sansone, C.,
«Information fusion for computer security: State of the art and open issues»,
Information Fusion, vol 10, pagg 274-284, 2009.
M. Contini, Corona, I., Mulas, A., Giacinto, G., e Ariu, D.,
«Pharmaguard WebApp: an application for the detection of illegal online pharmacies»,
2nd International Workshop on Knowledge Discovery on the WEB (KDWEB). Cagliari, 2016.
(120.57 KB) P. Coli, Marcialis, G. L., e Roli, F.,
«Power spectrum-based fingerprint vitality detection», in
IEEE Workshop on Automatic Identification Advanced Technologies AutoID 2007, 2007, pagg 169-173.
P. Coli, Marcialis, G. L., e Roli, F.,
«Analysis and selection of features for the fingerprint vitality detection», in
Joint IAPR Int. Workshop. on Structural and Syntactical Pattern Recognition and Statistical Techniques in Pattern Recognition S+SSPR06, 2006, vol 4109, pagg 907-915.
P. Coli, Marcialis, G. L., e Roli, F.,
«Vitality detection from fingerprint images: a critical survey», in
2nd International Conference on Biometrics ICB 2007, Seoul (South Korea), 2007, vol 4642, pagg 722-731.
A. Emanuele Cinà, Vascon, S., Demontis, A., Biggio, B., Roli, F., e Pelillo, M.,
«The Hammer and the Nut: Is Bilevel Optimization Really Needed to Poison Linear Classifiers?», in
International Joint Conference on Neural Networks, (IJCNN) 2021, Shenzhen, China, 2021, pagg 1–8.
M. Mohan Chakka, Anjos, A., Marcel, S., Tronci, R., Muntoni, D., Fadda, G., Pili, M., Sirena, N., Murgia, G., Ristori, M., e Roli, F.,
«Competition on Counter Measures to 2-D Facial Spoofing Attacks», in
International Joint Conference on Biometrics (IJCB 2011), 2011.