Fabio Roli
Orcid: 0000-0003-4103-9190Affiliations:
- University of Cagliari, Italy
According to our database1,
Fabio Roli
authored at least 336 papers
between 1992 and 2025.
Collaborative distances:
Collaborative distances:
Awards
IEEE Fellow
IEEE Fellow 2012, "For contributions to multiple classifier systems".
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
Online presence:
-
on orcid.org
On csauthors.net:
Bibliography
2025
Neurocomputing, 2025
2024
IEEE Trans. Intell. Transp. Syst., August, 2024
Computer, March, 2024
IEEE Trans. Inf. Forensics Secur., 2024
Adversarial mimicry attacks against image splicing forensics: An approach for jointly hiding manipulations and creating false detections.
Pattern Recognit. Lett., 2024
Texture and artifact decomposition for improving generalization in deep-learning-based deepfake detection.
Eng. Appl. Artif. Intell., 2024
Adversarial Pruning: A Survey and Benchmark of Pruning Methods for Adversarial Robustness.
CoRR, 2024
Over-parameterization and Adversarial Robustness in Neural Networks: An Overview and Empirical Analysis.
CoRR, 2024
A New Formulation for Zeroth-Order Optimization of Adversarial EXEmples in Malware Detection.
CoRR, 2024
CoRR, 2024
Updating Windows Malware Detectors: Balancing Robustness and Regression against Adversarial EXEmples.
CoRR, 2024
CoRR, 2024
CoRR, 2024
2023
Inf. Sci., December, 2023
Eng. Appl. Artif. Intell., November, 2023
Dropout injection at test time for post hoc uncertainty quantification in neural networks.
Inf. Sci., October, 2023
Attention-Based Adversarial Robust Distillation in Radio Signal Classifications for Low-Power IoT Devices.
IEEE Internet Things J., February, 2023
Pattern Recognit. Lett., 2023
ImageNet-Patch: A dataset for benchmarking machine learning robustness against adversarial patches.
Pattern Recognit., 2023
Inf. Sci., 2023
Wild Patterns Reloaded: A Survey of Machine Learning Security against Training Data Poisoning.
ACM Comput. Surv., 2023
BAARD: Blocking Adversarial Examples by Testing for Applicability, Reliability and Decidability.
Proceedings of the Advances in Knowledge Discovery and Data Mining, 2023
Proceedings of the Italia Intelligenza Artificiale, 2023
Proceedings of the Italia Intelligenza Artificiale, 2023
Proceedings of the Italia Intelligenza Artificiale, 2023
Proceedings of the International Conference on Military Communications and Information Systems, 2023
Proceedings of the Image Analysis and Processing - ICIAP 2023, 2023
Proceedings of the Image Analysis and Processing - ICIAP 2023, 2023
Generalized Deepfake Detection Algorithm Based on Inconsistency Between Inner and Outer Faces.
Proceedings of the Image Analysis and Processing - ICIAP 2023 Workshops, 2023
Proceedings of the IEEE/CVF International Conference on Computer Vision, 2023
2022
A Hybrid Training-Time and Run-Time Defense Against Adversarial Attacks in Modulation Classification.
IEEE Wirel. Commun. Lett., 2022
IEEE Trans. Pattern Anal. Mach. Intell., 2022
Do gradient-based explanations tell anything about adversarial robustness to android malware?
Int. J. Mach. Learn. Cybern., 2022
IET Biom., 2022
IEEE Secur. Priv., 2022
CoRR, 2022
Indicators of Attack Failure: Debugging and Improving Optimization of Adversarial Examples.
Proceedings of the Advances in Neural Information Processing Systems 35: Annual Conference on Neural Information Processing Systems 2022, 2022
Proceedings of the Image Analysis and Processing - ICIAP 2022, 2022
Proceedings of the Image Analysis and Processing - ICIAP 2022, 2022
2021
IEEE Wirel. Commun. Lett., 2021
Adversarial EXEmples: A Survey and Experimental Evaluation of Practical Attacks on Machine Learning for Windows Malware Detection.
ACM Trans. Priv. Secur., 2021
IEEE Trans. Inf. Forensics Secur., 2021
IEEE Trans. Inf. Forensics Secur., 2021
Empirical assessment of generating adversarial configurations for software product lines.
Empir. Softw. Eng., 2021
Indicators of Attack Failure: Debugging and Improving Optimization of Adversarial Examples.
CoRR, 2021
CoRR, 2021
Intriguing Usage of Applicability Domain: Lessons from Cheminformatics Applied to Adversarial Learning.
CoRR, 2021
Proceedings of the Advances in Neural Information Processing Systems 34: Annual Conference on Neural Information Processing Systems 2021, 2021
The Hammer and the Nut: Is Bilevel Optimization Really Needed to Poison Linear Classifiers?
Proceedings of the International Joint Conference on Neural Networks, 2021
A Neural Rejection System Against Universal Adversarial Perturbations in Radio Signal Classification.
Proceedings of the IEEE Global Communications Conference, 2021
Proceedings of the 29th European Symposium on Artificial Neural Networks, 2021
2020
A novel classification-selection approach for the self updating of template-based face recognition systems.
Pattern Recognit., 2020
Neurocomputing, 2020
Infrared and visible image fusion using a shallow CNN and structural similarity constraint.
IET Image Process., 2020
IET Biom., 2020
CoRR, 2020
Efficient Black-box Optimization of Adversarial Windows Malware with Constrained Manipulations.
CoRR, 2020
Comput. Secur., 2020
Proceedings of the 25th International Conference on Pattern Recognition, 2020
Proceedings of the 25th International Conference on Pattern Recognition, 2020
Are spoofs from latent fingerprints a real threat for the best state-of-art liveness detectors?
Proceedings of the 25th International Conference on Pattern Recognition, 2020
2019
Proceedings of the Handbook of Biometric Anti-Spoofing, 2019
IEEE Trans. Dependable Secur. Comput., 2019
DEICTIC: A compositional and declarative gesture description based on hidden markov models.
Int. J. Hum. Comput. Stud., 2019
Why Do Adversarial Attacks Transfer? Explaining Transferability of Evasion and Poisoning Attacks.
Proceedings of the 28th USENIX Security Symposium, 2019
Proceedings of the 23rd International Systems and Software Product Line Conference, 2019
Proceedings of the Third Italian Conference on Cyber Security, 2019
2018
Pattern Recognit., 2018
IET Comput. Vis., 2018
On the Intriguing Connections of Regularization, Input Gradients and Transferability of Evasion and Poisoning Attacks.
CoRR, 2018
An experimental investigation on self adaptive facial recognition algorithms using a long time span data set.
Proceedings of the Eighth International Conference on Image Processing Theory, 2018
Proceedings of the 26th European Signal Processing Conference, 2018
Adversarial Malware Binaries: Evading Deep Learning for Malware Detection in Executables.
Proceedings of the 26th European Signal Processing Conference, 2018
2017
IEEE Trans. Neural Networks Learn. Syst., 2017
Editorial of the Special Issue on Multi-instance Learning in Pattern Recognition and Vision.
Pattern Recognit., 2017
Pattern Recognit., 2017
Pattern Recognit., 2017
IEEE Trans. Pattern Anal. Mach. Intell., 2017
Learning extremely shared middle-level image representation for scene classification.
Knowl. Inf. Syst., 2017
Review of the Fingerprint Liveness Detection (LivDet) competition series: 2009 to 2015.
Image Vis. Comput., 2017
Proceedings of the First Italian Conference on Cybersecurity (ITASEC17), 2017
Gesture Modelling and Recognition by Integrating Declarative Models and Pattern Recognition Algorithms.
Proceedings of the Image Analysis and Processing - ICIAP 2017, 2017
Is Deep Learning Safe for Robot Vision? Adversarial Examples Against the iCub Humanoid.
Proceedings of the 2017 IEEE International Conference on Computer Vision Workshops, 2017
Proceedings of the 2017 IEEE International Joint Conference on Biometrics, 2017
Proceedings of the Computer Security - ESORICS 2017, 2017
Proceedings of the 10th ACM Workshop on Artificial Intelligence and Security, 2017
Proceedings of the AI*IA 2017 Advances in Artificial Intelligence, 2017
2016
IEEE Trans. Circuits Syst. Video Technol., 2016
Pattern Recognit., 2016
Proceedings of the Structural, Syntactic, and Statistical Pattern Recognition, 2016
Proceedings of the Structural, Syntactic, and Statistical Pattern Recognition, 2016
Adversarial Pattern Recognition.
Proceedings of the 5th International Conference on Pattern Recognition Applications and Methods, 2016
User-specific effects in Fingerprint Presentation Attacks Detection: Insights for future research.
Proceedings of the International Conference on Biometrics, 2016
Proceedings of the 2016 ACM Workshop on Artificial Intelligence and Security, 2016
2015
Proceedings of the Encyclopedia of Biometrics, Second Edition, 2015
IEEE Trans. Cybern., 2015
Adversarial Biometric Recognition : A review on biometric system security from the adversarial machine-learning perspective.
IEEE Signal Process. Mag., 2015
On Reducing the Effect of Covariate Factors in Gait Recognition: A Classifier Ensemble Method.
IEEE Trans. Pattern Anal. Mach. Intell., 2015
ERCIM News, 2015
Video Face Recognition From A Single Still Image Using an Adaptive Appearance Model Tracker.
Proceedings of the IEEE Symposium Series on Computational Intelligence, 2015
Proceedings of the Media Watermarking, 2015
One-and-a-Half-Class Multiple Classifier Systems for Secure Learning Against Evasion Attacks at Test Time.
Proceedings of the Multiple Classifier Systems - 12th International Workshop, 2015
An Empirical Investigation on the Use of Diversity for Creation of Classifier Ensembles.
Proceedings of the Multiple Classifier Systems - 12th International Workshop, 2015
Adaptive Classification for Person Re-identification Driven by Change Detection.
Proceedings of the ICPRAM 2015, 2015
Proceedings of the 32nd International Conference on Machine Learning, 2015
A Classification-Selection Approach for Self Updating of Face Verification Systems Under Stringent Storage and Computational Requirements.
Proceedings of the Image Analysis and Processing - ICIAP 2015, 2015
Proceedings of the Image Analysis and Processing - ICIAP 2015, 2015
Proceedings of the Image Analysis and Processing - ICIAP 2015, 2015
Proceedings of the International Conference on Biometrics, 2015
Proceedings of the 2nd IEEE International Conference on Cybernetics, 2015
Proceedings of the IEEE 7th International Conference on Biometrics Theory, 2015
Proceedings of the 10th International Conference on Availability, Reliability and Security, 2015
Proceedings of the 10th International Conference on Availability, Reliability and Security, 2015
2014
Proceedings of the Person Re-Identification, 2014
Proceedings of the Handbook of Biometric Anti-Spoofing, 2014
IEEE Trans. Knowl. Data Eng., 2014
Pattern Recognit. Lett., 2014
Int. J. Mach. Learn. Cybern., 2014
Inf. Sci., 2014
Int. J. Pattern Recognit. Artif. Intell., 2014
CoRR, 2014
Proceedings of the Structural, Syntactic, and Statistical Pattern Recognition, 2014
Proceedings of the 22nd International Conference on Pattern Recognition, 2014
Proceedings of the 2014 IEEE International Conference on Image Processing, 2014
Proceedings of the 2014 IEEE Symposium on Computational Intelligence in Biometrics and Identity Management, 2014
Proceedings of the 2014 Workshop on Artificial Intelligent and Security Workshop, 2014
Dynamic Weighted Fusion of Adaptive Classifier Ensembles Based on Changing Data Streams.
Proceedings of the Artificial Neural Networks in Pattern Recognition, 2014
2013
J. Vis. Lang. Comput., 2013
Multimodal fingerprint verification by score-level fusion: An experimental investigation.
J. Intell. Fuzzy Syst., 2013
Adversarial attacks against intrusion detection systems: Taxonomy, solutions and open issues.
Inf. Sci., 2013
A multi-modal dataset, protocol and tools for adaptive biometric systems: a benchmarking study.
Int. J. Biom., 2013
Real-time Appearance-based Person Re-identification Over Multiple KinectTM Cameras.
Proceedings of the VISAPP 2013, 2013
Proceedings of the Machine Learning and Knowledge Discovery in Databases, 2013
Proceedings of the Multiple Classifier Systems, 11th International Workshop, 2013
Estimating the Serial Combination's Performance from That of Individual Base Classifiers.
Proceedings of the Image Analysis and Processing - ICIAP 2013, 2013
Proceedings of the Image Analysis and Processing - ICIAP 2013, 2013
A comparison of adaptive appearance methods for tracking faces in video surveillance.
Proceedings of the 5th International Conference on Imaging for Crime Detection and Prevention, 2013
Proceedings of the International Conference on Biometrics, 2013
Proceedings of the International Conference on Biometrics, 2013
Proceedings of the International Conference on Biometrics, 2013
Proceedings of the Progress in Pattern Recognition, Image Analysis, Computer Vision, and Applications, 2013
Proceedings of the IEEE Sixth International Conference on Biometrics: Theory, 2013
Proceedings of the IEEE Sixth International Conference on Biometrics: Theory, 2013
2012
Pattern Recognit. Lett., 2012
Int. J. Digit. Crime Forensics, 2012
IET Biom., 2012
Machine Learning Methods for Computer Security (Dagstuhl Perspectives Workshop 12371).
Dagstuhl Reports, 2012
Proceedings of the Structural, Syntactic, and Statistical Pattern Recognition, 2012
Proceedings of the Structural, Syntactic, and Statistical Pattern Recognition, 2012
Proceedings of the Structural, Syntactic, and Statistical Pattern Recognition, 2012
Proceedings of the Multimedia and Security Workshop, 2012
Experimental results on the feature-level fusion of multiple fingerprint liveness detection algorithms.
Proceedings of the Multimedia and Security Workshop, 2012
Proceedings of the 11th International Conference on Information Science, 2012
Proceedings of the 11th International Conference on Information Science, 2012
A dual-staged classification-selection approach for automated update of biometric templates.
Proceedings of the 21st International Conference on Pattern Recognition, 2012
Proceedings of the 21st International Conference on Pattern Recognition, 2012
Proceedings of the 21st International Conference on Pattern Recognition, 2012
Proceedings of the 5th IAPR International Conference on Biometrics, 2012
Proceedings of the 5th IAPR International Conference on Biometrics, 2012
Proceedings of the Computer Vision - ECCV 2012. Workshops and Demonstrations, 2012
Learning sparse kernel machines with biometric similarity functions for identity recognition.
Proceedings of the IEEE Fifth International Conference on Biometrics: Theory, 2012
Proceedings of the IEEE Fifth International Conference on Biometrics: Theory, 2012
2011
Pattern Recognit. Lett., 2011
Proceedings of the IEEE International Conference on Systems, 2011
Proceedings of the Similarity-Based Pattern Recognition - First International Workshop, 2011
Proceedings of the Multiple Classifier Systems - 10th International Workshop, 2011
Bagging Classifiers for Fighting Poisoning Attacks in Adversarial Classification Tasks.
Proceedings of the Multiple Classifier Systems - 10th International Workshop, 2011
Proceedings of the Image Analysis and Processing - ICIAP 2011, 2011
Temporal Analysis of Biometric Template Update Procedures in Uncontrolled Environment.
Proceedings of the Image Analysis and Processing - ICIAP 2011, 2011
Proceedings of the Image Analysis and Processing - ICIAP 2011, 2011
Proceedings of the Image Analysis and Processing - ICIAP 2011, 2011
Proceedings of the Image Analysis and Processing - ICIAP 2011, 2011
Robustness analysis of likelihood ratio score fusion rule for multimodal biometric systems under spoof attacks.
Proceedings of the International Carnahan Conference on Security Technology, 2011
Proceedings of the 2011 IEEE International Joint Conference on Biometrics, 2011
Proceedings of the 2011 IEEE International Joint Conference on Biometrics, 2011
Robustness of multi-modal biometric verification systems under realistic spoofing attacks.
Proceedings of the 2011 IEEE International Joint Conference on Biometrics, 2011
Proceedings of the 2011 IEEE Workshop on Computational Intelligence in Biometrics and Identity Management, 2011
Machine learning in computer forensics (and the lessons learned from machine learning in computer security).
Proceedings of the 4th ACM Workshop on Security and Artificial Intelligence, 2011
Proceedings of the Ambient Intelligence, 2011
2010
Proceedings of the Handbook of Research on Computational Forensics, 2010
Multiple classifier systems for robust classifier design in adversarial environments.
Int. J. Mach. Learn. Cybern., 2010
Proceedings of the Structural, 2010
Proceedings of the Multiple Classifier Systems, 9th International Workshop, 2010
Proceedings of the 20th International Conference on Pattern Recognition, 2010
Proceedings of the 20th International Conference on Pattern Recognition, 2010
2009
Proceedings of the Applications of Supervised and Unsupervised Ensemble Methods, 2009
Proceedings of the Innovations in Neural Information Paradigms and Applications, 2009
Pattern Recognit., 2009
Inf. Fusion, 2009
Eng. Appl. Artif. Intell., 2009
Proceedings of the Machine Learning and Data Mining in Pattern Recognition, 2009
Proceedings of the Multiple Classifier Systems, 8th International Workshop, 2009
Proceedings of the Multiple Classifier Systems, 8th International Workshop, 2009
An Experimental Analysis of the Relationship between Biometric Template Update and the Doddington's Zoo: A Case Study in Face Verification.
Proceedings of the Image Analysis and Processing, 2009
Proceedings of the Image Analysis and Processing, 2009
Proceedings of the Advances in Biometrics, Third International Conference, 2009
Proceedings of the Advances in Biometrics, Third International Conference, 2009
Modelling FRR of Biometric Verification Systems Using the Template Co-update Algorithm.
Proceedings of the Advances in Biometrics, Third International Conference, 2009
2008
Proceedings of the Case-Based Reasoning on Images and Signals, 2008
IEEE Trans. Pattern Anal. Mach. Intell., 2008
J. Electronic Imaging, 2008
Intrusion detection in computer networks by a modular ensemble of one-class classifiers.
Inf. Fusion, 2008
Fingerprint silicon Replicas: Static and Dynamic Features for Vitality Detection Using an Optical Capture Device.
Int. J. Image Graph., 2008
Proceedings of the Structural, 2008
Biometric Template Update: An Experimental Investigation on the Relationship between Update Errors and Performance Degradation in Face Verification.
Proceedings of the Structural, 2008
Proceedings of the Structural, 2008
A Theoretical and Experimental Analysis of Template Co-update in Biometric Verification Systems.
Proceedings of the Structural, 2008
Proceedings of the Structural, 2008
Proceedings of the 19th International Conference on Pattern Recognition (ICPR 2008), 2008
Proceedings of the Image Analysis and Recognition, 5th International Conference, 2008
Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition, 2008
Proceedings of the CEAS 2008, 2008
Online and Offline Fingerprint Template Update Using Minutiae: An Experimental Comparison.
Proceedings of the Articulated Motion and Deformable Objects, 5th International Conference, 2008
2007
Proceedings of the Applied Graph Theory in Computer Vision and Pattern Recognition, 2007
Proceedings of the Machine Learning and Data Mining in Pattern Recognition, 2007
Proceedings of the Multiple Classifier Systems, 7th International Workshop, 2007
Proceedings of the Multiple Classifier Systems, 7th International Workshop, 2007
Proceedings of the Multiple Classifier Systems, 7th International Workshop, 2007
Proceedings of the Multiple Classifier Systems, 7th International Workshop, 2007
Proceedings of the 14th International Conference on Image Analysis and Processing (ICIAP 2007), 2007
Score-level fusion of fingerprint and face matchers for personal verification under "stress" conditions.
Proceedings of the 14th International Conference on Image Analysis and Processing (ICIAP 2007), 2007
Proceedings of the 14th International Conference on Image Analysis and Processing (ICIAP 2007), 2007
Proceedings of the Advances in Biometrics, International Conference, 2007
Proceedings of the Advances in Biometrics, International Conference, 2007
Proceedings of the CEAS 2007, 2007
Proceedings of the 2007 IEEE Workshop on Automatic Identification Advanced Technologies, 2007
2006
J. Mach. Learn. Res., 2006
Int. J. Image Graph., 2006
Eng. Appl. Artif. Intell., 2006
Proceedings of the Structural, 2006
Proceedings of the Structural, 2006
Proceedings of the Structural, 2006
2005
Fusion of multiple fingerprint matchers by single-layer perceptron with class-separation loss function.
Pattern Recognit. Lett., 2005
A study on the performances of dynamic classifier selection based on local accuracy estimation.
Pattern Recognit., 2005
A Theoretical and Experimental Analysis of Linear Combiners for Multiple Classifier Systems.
IEEE Trans. Pattern Anal. Mach. Intell., 2005
Proceedings of the Multiple Classifier Systems, 6th International Workshop, 2005
Dynamics of Variance Reduction in Bagging and Other Techniques Based on Randomisation.
Proceedings of the Multiple Classifier Systems, 6th International Workshop, 2005
Proceedings of the Image Analysis and Processing, 2005
Proceedings of the Image Analysis and Processing, 2005
Proceedings of the Graph-Based Representations in Pattern Recognition, 2005
2004
Pattern Recognit. Lett., 2004
Pattern Recognit., 2004
Pattern Recognit., 2004
Statistical and neural classifiers: an integrated approach to design (Advances in Pattern Recognition Series). By S.Raudys.
Pattern Anal. Appl., 2004
Proceedings of the Structural, 2004
Proceedings of the Advances in Neural Information Processing Systems 17 [Neural Information Processing Systems, 2004
High Security Fingerprint Verification by Perceptron-Based Fusion of Multiple Matchers.
Proceedings of the Multiple Classifier Systems, 5th International Workshop, 2004
Proceedings of the 17th International Conference on Pattern Recognition, 2004
Proceedings of the Biometric Authentication, 2004
2003
Pattern Recognit. Lett., 2003
Combining flat and structured representations for fingerprint classification with recursive neural networks and support vector machines.
Pattern Recognit., 2003
Dissimilarity Representation of Images for Relevance Feedback in Content-Based Image Retrieval.
Proceedings of the Machine Learning and Data Mining in Pattern Recognition, 2003
The Behavior Knowledge Space Fusion Method: Analysis of Generalization Error and Strategies for Performance Improvement.
Proceedings of the Multiple Classifier Systems, 4th International Workshop, 2003
A Modular Multiple Classifier System for the Detection of Intrusions in Computer Networks.
Proceedings of the Multiple Classifier Systems, 4th International Workshop, 2003
Proceedings of the Multiple Classifier Systems, 4th International Workshop, 2003
Proceedings of the 12th International Conference on Image Analysis and Processing (ICIAP 2003), 2003
Proceedings of the Audio-and Video-Based Biometrie Person Authentication, 2003
Proceedings of the Audio-and Video-Based Biometrie Person Authentication, 2003
2002
Pattern Recognit. Lett., 2002
Int. J. Pattern Recognit. Artif. Intell., 2002
Proceedings of the Pattern Recognition with Support Vector Machines, 2002
Proceedings of the Structural, 2002
Proceedings of the Structural, 2002
An Experimental Comparison of Fixed and Trained Fusion Rules for Crisp Classifier Outputs.
Proceedings of the Multiple Classifier Systems, Third International Workshop, 2002
An Experimental Comparison of Classifier Fusion Rules for Multimodal Personal Identity Verification Systems.
Proceedings of the Multiple Classifier Systems, Third International Workshop, 2002
Analysis of Linear and Order Statistics Combiners for Fusion of Imbalanced Classifiers.
Proceedings of the Multiple Classifier Systems, Third International Workshop, 2002
Proceedings of the Multiple Classifier Systems, Third International Workshop, 2002
Proceedings of the 16th International Conference on Pattern Recognition, 2002
Proceedings of the 16th International Conference on Pattern Recognition, 2002
Enhancing the performance of personal identity authentication systems by fusion of face verification experts.
Proceedings of the 2002 IEEE International Conference on Multimedia and Expo, 2002
Proceedings of the Biometric Authentication, 2002
2001
Pattern Recognit. Lett., 2001
Pattern Recognit., 2001
Image Vis. Comput., 2001
Proceedings of the Machine Learning and Data Mining in Pattern Recognition, 2001
Proceedings of the Multiple Classifier Systems, Second International Workshop, 2001
Complexity of Data Subsets Generated by the Random Subspace Method: An Experimental Investigation.
Proceedings of the Multiple Classifier Systems, Second International Workshop, 2001
Proceedings of the Multiple Classifier Systems, Second International Workshop, 2001
Proceedings of the 11th International Conference on Image Analysis and Processing (ICIAP 2001), 2001
Proceedings of the Audio- and Video-Based Biometric Person Authentication, 2001
Proceedings of the AI*IA 2001: Advances in Artificial Intelligence, 2001
2000
Combination of neural and statistical algorithms for supervised classification of remote-sensing image.
Pattern Recognit. Lett., 2000
Proceedings of the Advances in Pattern Recognition, Joint IAPR International Workshops SSPR 2000 and SPR 2000, [8th International Workshop on Structural and Syntactic Pattern Recognition, 3rd International Workshop on Statistical Techniques in Pattern Recognition], Alicante, Spain, August 30, 2000
Proceedings of the Advances in Pattern Recognition, Joint IAPR International Workshops SSPR 2000 and SPR 2000, [8th International Workshop on Structural and Syntactic Pattern Recognition, 3rd International Workshop on Statistical Techniques in Pattern Recognition], Alicante, Spain, August 30, 2000
Proceedings of the Multiple Classifier Systems, First International Workshop, 2000
Proceedings of the IEEE-INNS-ENNS International Joint Conference on Neural Networks, 2000
Proceedings of the 15th International Conference on Pattern Recognition, 2000
Proceedings of the 15th International Conference on Pattern Recognition, 2000
1999
Proceedings of the Machine Learning and Data Mining in Pattern Recognition, 1999
Proceedings of the 1oth International Conference on Image Analysis and Processing (ICIAP 1999), 1999
1998
A parallel network of modified 1-NN and k-NN classifiers - Application to remote-sensing image classification.
Pattern Recognit. Lett., 1998
1997
Application of neural networks and statistical pattern recognition algorithms to earthquake risk evaluation.
Pattern Recognit. Lett., 1997
Proceedings of the Image Analysis and Processing, 9th International Conference, 1997
The COMPARES Project: COnnectionist Methods for Preprocessing and Analysis of REmote Sensing Data.
Proceedings of the Image Analysis and Processing, 9th International Conference, 1997
1996
An experimental comparison of neural and statistical non-parametric algorithms for supervised classification of remote-sensing images.
Pattern Recognit. Lett., 1996
Int. J. Pattern Recognit. Artif. Intell., 1996
Classification of multisensor remote-sensing images by multiple structured neural networks.
Proceedings of the 13th International Conference on Pattern Recognition, 1996
Proceedings of the 8th European Signal Processing Conference, 1996
1995
IEEE Trans. Geosci. Remote. Sens., 1995
An extension of the Jeffreys-Matusita distance to multiclass cases for feature selection.
IEEE Trans. Geosci. Remote. Sens., 1995
Int. J. Pattern Recognit. Artif. Intell., 1995
Proceedings of the Image Analysis and Processing, 8th International Conference, 1995
1994
IEEE Trans. Pattern Anal. Mach. Intell., 1994
IEEE J. Sel. Areas Commun., 1994
1992
Proceedings of the 11th IAPR International Conference on Pattern Recognition, 1992
Proceedings of the 1992 IEEE International Conference on Acoustics, 1992