Fabio Roli

Orcid: 0000-0003-4103-9190

Affiliations:
  • University of Cagliari, Italy


According to our database1, Fabio Roli authored at least 336 papers between 1992 and 2025.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Awards

IEEE Fellow

IEEE Fellow 2012, "For contributions to multiple classifier systems".

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2025
HO-FMN: Hyperparameter optimization for fast minimum-norm attacks.
Neurocomputing, 2025

2024
Toward Effective Traffic Sign Detection via Two-Stage Fusion Neural Networks.
IEEE Trans. Intell. Transp. Syst., August, 2024

3D Face Reconstruction: The Road to Forensics.
ACM Comput. Surv., March, 2024

Machine Learning Security Against Data Poisoning: Are We There Yet?
Computer, March, 2024

Nebula: Self-Attention for Dynamic Malware Analysis.
IEEE Trans. Inf. Forensics Secur., 2024

Adversarial mimicry attacks against image splicing forensics: An approach for jointly hiding manipulations and creating false detections.
Pattern Recognit. Lett., 2024

Texture and artifact decomposition for improving generalization in deep-learning-based deepfake detection.
Eng. Appl. Artif. Intell., 2024

On the Robustness of Adversarial Training Against Uncertainty Attacks.
CoRR, 2024

Adversarial Pruning: A Survey and Benchmark of Pruning Methods for Adversarial Robustness.
CoRR, 2024

Sonic: Fast and Transferable Data Poisoning on Clustering Algorithms.
CoRR, 2024

Over-parameterization and Adversarial Robustness in Neural Networks: An Overview and Empirical Analysis.
CoRR, 2024

A New Formulation for Zeroth-Order Optimization of Adversarial EXEmples in Malware Detection.
CoRR, 2024

SLIFER: Investigating Performance and Robustness of Malware Detection Pipelines.
CoRR, 2024

Updating Windows Malware Detectors: Balancing Robustness and Regression against Adversarial EXEmples.
CoRR, 2024

AttackBench: Evaluating Gradient-based Attacks for Adversarial Examples.
CoRR, 2024

Living-off-The-Land Reverse-Shell Detection by Informed Data Augmentation.
CoRR, 2024

Robustness-Congruent Adversarial Training for Secure Machine Learning Model Updates.
CoRR, 2024

Serial fusion of multi-modal biometric systems.
CoRR, 2024

2023
Hardening RGB-D object recognition systems against adversarial patch attacks.
Inf. Sci., December, 2023

Wooden spoon crack detection by prior knowledge-enriched deep convolutional network.
Eng. Appl. Artif. Intell., November, 2023

Dropout injection at test time for post hoc uncertainty quantification in neural networks.
Inf. Sci., October, 2023

Attention-Based Adversarial Robust Distillation in Radio Signal Classifications for Low-Power IoT Devices.
IEEE Internet Things J., February, 2023

Towards realistic fingerprint presentation attacks: The ScreenSpoof method.
Pattern Recognit. Lett., 2023

ImageNet-Patch: A dataset for benchmarking machine learning robustness against adversarial patches.
Pattern Recognit., 2023

Stateful detection of adversarial reprogramming.
Inf. Sci., 2023

Why adversarial reprogramming works, when it fails, and how to tell the difference.
Inf. Sci., 2023

Wild Patterns Reloaded: A Survey of Machine Learning Security against Training Data Poisoning.
ACM Comput. Surv., 2023

BAARD: Blocking Adversarial Examples by Testing for Applicability, Reliability and Decidability.
Proceedings of the Advances in Knowledge Discovery and Data Mining, 2023

Cybersecurity and AI: The PRALab Research Experience.
Proceedings of the Italia Intelligenza Artificiale, 2023

Trustworthy AI in Video Surveillance: The IMMAGINA Project.
Proceedings of the Italia Intelligenza Artificiale, 2023

AI Security and Safety: The PRALab Research Experience.
Proceedings of the Italia Intelligenza Artificiale, 2023

Evaluation of Robustness Metrics for Defense of Machine Learning Systems.
Proceedings of the International Conference on Military Communications and Information Systems, 2023

BLUES: Before-reLU-EStimates Bayesian Inference for Crowd Counting.
Proceedings of the Image Analysis and Processing - ICIAP 2023, 2023

Minimizing Energy Consumption of Deep Learning Models by Energy-Aware Training.
Proceedings of the Image Analysis and Processing - ICIAP 2023, 2023

Generalized Deepfake Detection Algorithm Based on Inconsistency Between Inner and Outer Faces.
Proceedings of the Image Analysis and Processing - ICIAP 2023 Workshops, 2023

Adversarial Attacks Against Uncertainty Quantification.
Proceedings of the IEEE/CVF International Conference on Computer Vision, 2023

2022
A Hybrid Training-Time and Run-Time Defense Against Adversarial Attacks in Modulation Classification.
IEEE Wirel. Commun. Lett., 2022

Domain Knowledge Alleviates Adversarial Attacks in Multi-Label Classifiers.
IEEE Trans. Pattern Anal. Mach. Intell., 2022

Do gradient-based explanations tell anything about adversarial robustness to android malware?
Int. J. Mach. Learn. Cybern., 2022

EEG personal recognition based on 'qualified majority' over signal patches.
IET Biom., 2022

Practical Attacks on Machine Learning: A Case Study on Adversarial Windows Malware.
IEEE Secur. Priv., 2022

A Survey on Reinforcement Learning Security with Application to Autonomous Driving.
CoRR, 2022

Energy-Latency Attacks via Sponge Poisoning.
CoRR, 2022

Indicators of Attack Failure: Debugging and Improving Optimization of Adversarial Examples.
Proceedings of the Advances in Neural Information Processing Systems 35: Annual Conference on Neural Information Processing Systems 2022, 2022

On the Evaluation of Video-Based Crowd Counting Models.
Proceedings of the Image Analysis and Processing - ICIAP 2022, 2022

Experimental Results on Multi-modal Deepfake Detection.
Proceedings of the Image Analysis and Processing - ICIAP 2022, 2022

2021
Countermeasures Against Adversarial Examples in Radio Signal Classification.
IEEE Wirel. Commun. Lett., 2021

Adversarial EXEmples: A Survey and Experimental Evaluation of Practical Attacks on Machine Learning for Windows Malware Detection.
ACM Trans. Priv. Secur., 2021

Fingerprint Recognition With Embedded Presentation Attacks Detection: Are We Ready?
IEEE Trans. Inf. Forensics Secur., 2021

Functionality-Preserving Black-Box Optimization of Adversarial Windows Malware.
IEEE Trans. Inf. Forensics Secur., 2021

Empirical assessment of generating adversarial configurations for software product lines.
Empir. Softw. Eng., 2021

Can machines learn to see without visual databases?
CoRR, 2021

Indicators of Attack Failure: Debugging and Improving Optimization of Adversarial Examples.
CoRR, 2021

Backdoor Learning Curves: Explaining Backdoor Poisoning Beyond Influence Functions.
CoRR, 2021

Intriguing Usage of Applicability Domain: Lessons from Cheminformatics Applied to Adversarial Learning.
CoRR, 2021

Fast Minimum-norm Adversarial Attacks through Adaptive Norm Constraints.
Proceedings of the Advances in Neural Information Processing Systems 34: Annual Conference on Neural Information Processing Systems 2021, 2021

The Hammer and the Nut: Is Bilevel Optimization Really Needed to Poison Linear Classifiers?
Proceedings of the International Joint Conference on Neural Networks, 2021

A Neural Rejection System Against Universal Adversarial Perturbations in Radio Signal Classification.
Proceedings of the IEEE Global Communications Conference, 2021

Slope: A First-order Approach for Measuring Gradient Obfuscation.
Proceedings of the 29th European Symposium on Artificial Neural Networks, 2021

2020
A novel classification-selection approach for the self updating of template-based face recognition systems.
Pattern Recognit., 2020

CompactNet: learning a compact space for face presentation attack detection.
Neurocomputing, 2020

Infrared and visible image fusion using a shallow CNN and structural similarity constraint.
IET Image Process., 2020

3D face mask presentation attack detection based on intrinsic image analysis.
IET Biom., 2020

Deep neural rejection against adversarial examples.
EURASIP J. Inf. Secur., 2020

Can Domain Knowledge Alleviate Adversarial Attacks in Multi-Label Classifiers?
CoRR, 2020

Efficient Black-box Optimization of Adversarial Windows Malware with Constrained Manipulations.
CoRR, 2020

Adversarial Detection of Flash Malware: Limitations and Open Issues.
Comput. Secur., 2020

Detecting Anomalies from Video-Sequences: a Novel Descriptor.
Proceedings of the 25th International Conference on Pattern Recognition, 2020

Online Domain Adaptation for Person Re-Identification with a Human in the Loop.
Proceedings of the 25th International Conference on Pattern Recognition, 2020

Are spoofs from latent fingerprints a real threat for the best state-of-art liveness detectors?
Proceedings of the 25th International Conference on Pattern Recognition, 2020

2019
Review of Fingerprint Presentation Attack Detection Competitions.
Proceedings of the Handbook of Biometric Anti-Spoofing, 2019

Yes, Machine Learning Can Be More Secure! A Case Study on Android Malware Detection.
IEEE Trans. Dependable Secur. Comput., 2019

DEICTIC: A compositional and declarative gesture description based on hidden markov models.
Int. J. Hum. Comput. Stud., 2019

Why Do Adversarial Attacks Transfer? Explaining Transferability of Evasion and Poisoning Attacks.
Proceedings of the 28th USENIX Security Symposium, 2019

Towards quality assurance of software product lines with adversarial configurations.
Proceedings of the 23rd International Systems and Software Product Line Conference, 2019

Explaining Vulnerabilities of Deep Learning to Adversarial Malware Binaries.
Proceedings of the Third Italian Conference on Cyber Security, 2019

2018
Wild patterns: Ten years after the rise of adversarial machine learning.
Pattern Recognit., 2018

Multi-stage ranking approach for fast person re-identification.
IET Comput. Vis., 2018

Face Presentation Attack Detection in Learned Color-liked Space.
CoRR, 2018

On the Intriguing Connections of Regularization, Input Gradients and Transferability of Evasion and Poisoning Attacks.
CoRR, 2018

Towards Adversarial Configurations for Software Product Lines.
CoRR, 2018

An experimental investigation on self adaptive facial recognition algorithms using a long time span data set.
Proceedings of the Eighth International Conference on Image Processing Theory, 2018

Explaining Black-box Android Malware Detection.
Proceedings of the 26th European Signal Processing Conference, 2018

Adversarial Malware Binaries: Evading Deep Learning for Malware Detection in Executables.
Proceedings of the 26th European Signal Processing Conference, 2018

2017
Randomized Prediction Games for Adversarial Machine Learning.
IEEE Trans. Neural Networks Learn. Syst., 2017

Editorial of the Special Issue on Multi-instance Learning in Pattern Recognition and Vision.
Pattern Recognit., 2017

A parameter randomization approach for constructing classifier ensembles.
Pattern Recognit., 2017

Designing multi-label classifiers that maximize F measures: State of the art.
Pattern Recognit., 2017

Statistical Meta-Analysis of Presentation Attacks for Secure Multibiometric Systems.
IEEE Trans. Pattern Anal. Mach. Intell., 2017

Learning extremely shared middle-level image representation for scene classification.
Knowl. Inf. Syst., 2017

Review of the Fingerprint Liveness Detection (LivDet) competition series: 2009 to 2015.
Image Vis. Comput., 2017

Fingerprint liveness detection using local texture features.
IET Biom., 2017

Security Evaluation of Pattern Classifiers under Attack.
CoRR, 2017

Infinity-Norm Support Vector Machines Against Adversarial Label Contamination.
Proceedings of the First Italian Conference on Cybersecurity (ITASEC17), 2017

Gesture Modelling and Recognition by Integrating Declarative Models and Pattern Recognition Algorithms.
Proceedings of the Image Analysis and Processing - ICIAP 2017, 2017

Is Deep Learning Safe for Robot Vision? Adversarial Examples Against the iCub Humanoid.
Proceedings of the 2017 IEEE International Conference on Computer Vision Workshops, 2017

Fingerprint presentation attacks detection based on the user-specific effect.
Proceedings of the 2017 IEEE International Joint Conference on Biometrics, 2017

DeltaPhish: Detecting Phishing Webpages in Compromised Websites.
Proceedings of the Computer Security - ESORICS 2017, 2017

Towards Poisoning of Deep Learning Algorithms with Back-gradient Optimization.
Proceedings of the 10th ACM Workshop on Artificial Intelligence and Security, 2017

Deepsquatting: Learning-Based Typosquatting Detection at Deeper Domain Levels.
Proceedings of the AI*IA 2017 Advances in Artificial Intelligence, 2017

2016
Adversarial Feature Selection Against Evasion Attacks.
IEEE Trans. Cybern., 2016

Multimodal Person Reidentification Using RGB-D Cameras.
IEEE Trans. Circuits Syst. Video Technol., 2016

Adaptive appearance model tracking for still-to-video face recognition.
Pattern Recognit., 2016

Super-Sparse Learning in Similarity Spaces.
IEEE Comput. Intell. Mag., 2016

A Multi-Stage Approach for Fast Person Re-identification.
Proceedings of the Structural, Syntactic, and Statistical Pattern Recognition, 2016

On Security and Sparsity of Linear Classifiers for Adversarial Settings.
Proceedings of the Structural, Syntactic, and Statistical Pattern Recognition, 2016

Adversarial Pattern Recognition.
Proceedings of the 5th International Conference on Pattern Recognition Applications and Methods, 2016

User-specific effects in Fingerprint Presentation Attacks Detection: Insights for future research.
Proceedings of the International Conference on Biometrics, 2016

Secure Kernel Machines against Evasion Attacks.
Proceedings of the 2016 ACM Workshop on Artificial Intelligence and Security, 2016

2015
Multiple Classifier Systems.
Proceedings of the Encyclopedia of Biometrics, Second Edition, 2015

Diversified Sensitivity-Based Undersampling for Imbalance Classification Problems.
IEEE Trans. Cybern., 2015

Adversarial Biometric Recognition : A review on biometric system security from the adversarial machine-learning perspective.
IEEE Signal Process. Mag., 2015

Neural shape codes for 3D model retrieval.
Pattern Recognit. Lett., 2015

On Reducing the Effect of Covariate Factors in Gait Recognition: A Classifier Ensemble Method.
IEEE Trans. Pattern Anal. Mach. Intell., 2015

Support vector machines under adversarial label contamination.
Neurocomputing, 2015

CyberROAD: Developing a Roadmap for Research in Cybercrime and Cyberterrorism.
ERCIM News, 2015

Video Face Recognition From A Single Still Image Using an Adaptive Appearance Model Tracker.
Proceedings of the IEEE Symposium Series on Computational Intelligence, 2015

Counter-forensics in machine learning based forgery detection.
Proceedings of the Media Watermarking, 2015

One-and-a-Half-Class Multiple Classifier Systems for Secure Learning Against Evasion Attacks at Test Time.
Proceedings of the Multiple Classifier Systems - 12th International Workshop, 2015

An Empirical Investigation on the Use of Diversity for Creation of Classifier Ensembles.
Proceedings of the Multiple Classifier Systems - 12th International Workshop, 2015

Adaptive Classification for Person Re-identification Driven by Change Detection.
Proceedings of the ICPRAM 2015, 2015

Is Feature Selection Secure against Training Data Poisoning?
Proceedings of the 32nd International Conference on Machine Learning, 2015

A Classification-Selection Approach for Self Updating of Face Verification Systems Under Stringent Storage and Computational Requirements.
Proceedings of the Image Analysis and Processing - ICIAP 2015, 2015

Fast Image Classification with Reduced Multiclass Support Vector Machines.
Proceedings of the Image Analysis and Processing - ICIAP 2015, 2015

Super-Sparse Regression for Fast Age Estimation from Faces at Test Time.
Proceedings of the Image Analysis and Processing - ICIAP 2015, 2015

Sparse support faces.
Proceedings of the International Conference on Biometrics, 2015

PharmaGuard: Automatic identification of illegal search-indexed online pharmacies.
Proceedings of the 2nd IEEE International Conference on Cybernetics, 2015

LivDet 2015 fingerprint liveness detection competition 2015.
Proceedings of the IEEE 7th International Conference on Biometrics Theory, 2015

2020 Cybercrime Economic Costs: No Measure No Solution.
Proceedings of the 10th International Conference on Availability, Reliability and Security, 2015

Yet Another Cybersecurity Roadmapping Methodology.
Proceedings of the 10th International Conference on Availability, Reliability and Security, 2015

2014
People Search with Textual Queries About Clothing Appearance Attributes.
Proceedings of the Person Re-Identification, 2014

Multimodal Anti-spoofing in Biometric Recognition Systems.
Proceedings of the Handbook of Biometric Anti-Spoofing, 2014

Security Evaluation of PatternClassifiers under Attack.
IEEE Trans. Knowl. Data Eng., 2014

Analysis of unsupervised template update in biometric recognition systems.
Pattern Recognit. Lett., 2014

A novel method for head pose estimation based on the "Vitruvian Man".
Int. J. Mach. Learn. Cybern., 2014

Adaptive ensembles for face recognition in changing video surveillance environments.
Inf. Sci., 2014

Pattern Recognition Systems under Attack: Design Issues and Research Challenges.
Int. J. Pattern Recognit. Artif. Intell., 2014

Security Evaluation of Support Vector Machines in Adversarial Environments.
CoRR, 2014

Poisoning Complete-Linkage Hierarchical Clustering.
Proceedings of the Structural, Syntactic, and Statistical Pattern Recognition, 2014

Learning of Multilabel Classifiers.
Proceedings of the 22nd International Conference on Pattern Recognition, 2014

Attacking the triangle test in sensor-based camera identification.
Proceedings of the 2014 IEEE International Conference on Image Processing, 2014

Efficient adaptive face recognition systems based on capture conditions.
Proceedings of the 2014 IEEE Symposium on Computational Intelligence in Biometrics and Identity Management, 2014

Poisoning behavioral malware clustering.
Proceedings of the 2014 Workshop on Artificial Intelligent and Security Workshop, 2014

Dynamic Weighted Fusion of Adaptive Classifier Ensembles Based on Changing Data Streams.
Proceedings of the Artificial Neural Networks in Pattern Recognition, 2014

2013
Biometric system adaptation by self-update and graph-based techniques.
J. Vis. Lang. Comput., 2013

Multi-label classification with a reject option.
Pattern Recognit., 2013

Threshold optimisation for multi-label classifiers.
Pattern Recognit., 2013

Multimodal fingerprint verification by score-level fusion: An experimental investigation.
J. Intell. Fuzzy Syst., 2013

Adversarial attacks against intrusion detection systems: Taxonomy, solutions and open issues.
Inf. Sci., 2013

A multi-modal dataset, protocol and tools for adaptive biometric systems: a benchmarking study.
Int. J. Biom., 2013

Real-time Appearance-based Person Re-identification Over Multiple KinectTM Cameras.
Proceedings of the VISAPP 2013, 2013

Evasion Attacks against Machine Learning at Test Time.
Proceedings of the Machine Learning and Knowledge Discovery in Databases, 2013

Diversity in Classifier Ensembles: Fertile Concept or Dead End?
Proceedings of the Multiple Classifier Systems, 11th International Workshop, 2013

Estimating the Serial Combination's Performance from That of Individual Base Classifiers.
Proceedings of the Image Analysis and Processing - ICIAP 2013, 2013

Exploiting the Golden Ratio on Human Faces for Head-Pose Estimation.
Proceedings of the Image Analysis and Processing - ICIAP 2013, 2013

A comparison of adaptive appearance methods for tracking faces in video surveillance.
Proceedings of the 5th International Conference on Imaging for Crime Detection and Prevention, 2013

LivDet 2013 Fingerprint Liveness Detection Competition 2013.
Proceedings of the International Conference on Biometrics, 2013


Poisoning attacks to compromise face templates.
Proceedings of the International Conference on Biometrics, 2013

Pattern Recognition Systems under Attack.
Proceedings of the Progress in Pattern Recognition, Image Analysis, Computer Vision, and Applications, 2013

Is data clustering in adversarial settings secure?
Proceedings of the AISec'13, 2013

Combining gait and face for tackling the elapsed time challenges.
Proceedings of the IEEE Sixth International Conference on Biometrics: Theory, 2013

Fingerprint Liveness Detection using Binarized Statistical Image Features.
Proceedings of the IEEE Sixth International Conference on Biometrics: Theory, 2013

2012
Fast person re-identification based on dissimilarity representations.
Pattern Recognit. Lett., 2012

Fingerprint Liveness Detection Based on Fake Finger Characteristics.
Int. J. Digit. Crime Forensics, 2012

Critical analysis of adaptive biometric systems.
IET Biom., 2012

Security evaluation of biometric authentication systems under real spoofing attacks.
IET Biom., 2012

Machine Learning Methods for Computer Security (Dagstuhl Perspectives Workshop 12371).
Dagstuhl Reports, 2012

Large Scale Experiments on Fingerprint Liveness Detection.
Proceedings of the Structural, Syntactic, and Statistical Pattern Recognition, 2012

Analysis of Co-training Algorithm with Very Small Training Sets.
Proceedings of the Structural, Syntactic, and Statistical Pattern Recognition, 2012

Poisoning Adaptive Biometric Systems.
Proceedings of the Structural, Syntactic, and Statistical Pattern Recognition, 2012

Appearance-based people recognition by local dissimilarity representations.
Proceedings of the Multimedia and Security Workshop, 2012

Experimental results on the feature-level fusion of multiple fingerprint liveness detection algorithms.
Proceedings of the Multimedia and Security Workshop, 2012

Why template self-update should work in biometric authentication systems?
Proceedings of the 11th International Conference on Information Science, 2012

A Bayesian analysis of co-training algorithm with insufficient views.
Proceedings of the 11th International Conference on Information Science, 2012

A dual-staged classification-selection approach for automated update of biometric templates.
Proceedings of the 21st International Conference on Pattern Recognition, 2012

F-measure optimisation in multi-label classifiers.
Proceedings of the 21st International Conference on Pattern Recognition, 2012

Fingerprint liveness detection by local phase quantization.
Proceedings of the 21st International Conference on Pattern Recognition, 2012

LivDet 2011 - Fingerprint liveness detection competition 2011.
Proceedings of the 5th IAPR International Conference on Biometrics, 2012

Evaluation of multimodal biometric score fusion rules under spoof attacks.
Proceedings of the 5th IAPR International Conference on Biometrics, 2012

A General Method for Appearance-Based People Search Based on Textual Queries.
Proceedings of the Computer Vision - ECCV 2012. Workshops and Demonstrations, 2012

Learning sparse kernel machines with biometric similarity functions for identity recognition.
Proceedings of the IEEE Fifth International Conference on Biometrics: Theory, 2012

Evaluation of serial and parallel multibiometric systems under spoofing attacks.
Proceedings of the IEEE Fifth International Conference on Biometrics: Theory, 2012

2011
A survey and experimental evaluation of image spam filtering techniques.
Pattern Recognit. Lett., 2011

Design of robust classifiers for adversarial environments.
Proceedings of the IEEE International Conference on Systems, 2011

Exploiting Dissimilarity Representations for Person Re-identification.
Proceedings of the Similarity-Based Pattern Recognition - First International Workshop, 2011

Classifier Selection Approaches for Multi-label Problems.
Proceedings of the Multiple Classifier Systems - 10th International Workshop, 2011

Bagging Classifiers for Fighting Poisoning Attacks in Adversarial Classification Tasks.
Proceedings of the Multiple Classifier Systems - 10th International Workshop, 2011

A Multiple Component Matching Framework for Person Re-identification.
Proceedings of the Image Analysis and Processing - ICIAP 2011, 2011

Temporal Analysis of Biometric Template Update Procedures in Uncontrolled Environment.
Proceedings of the Image Analysis and Processing - ICIAP 2011, 2011

Exploiting Depth Information for Indoor-Outdoor Scene Classification.
Proceedings of the Image Analysis and Processing - ICIAP 2011, 2011

A Classification Approach with a Reject Option for Multi-label Problems.
Proceedings of the Image Analysis and Processing - ICIAP 2011, 2011

Robustness Evaluation of Biometric Systems under Spoof Attacks.
Proceedings of the Image Analysis and Processing - ICIAP 2011, 2011

Robustness analysis of likelihood ratio score fusion rule for multimodal biometric systems under spoof attacks.
Proceedings of the International Carnahan Conference on Security Technology, 2011

Fusion of multiple clues for photo-attack detection in face recognition systems.
Proceedings of the 2011 IEEE International Joint Conference on Biometrics, 2011


Robustness of multi-modal biometric verification systems under realistic spoofing attacks.
Proceedings of the 2011 IEEE International Joint Conference on Biometrics, 2011

Self adaptive systems: An experimental analysis of the performance over time.
Proceedings of the 2011 IEEE Workshop on Computational Intelligence in Biometrics and Identity Management, 2011

Machine learning in computer forensics (and the lessons learned from machine learning in computer security).
Proceedings of the 4th ACM Workshop on Security and Artificial Intelligence, 2011

Fusion of Radio and Video Localization for People Tracking.
Proceedings of the Ambient Intelligence, 2011

2010
A Fingerprint Forensic Tool for Criminal Investigations.
Proceedings of the Handbook of Research on Computational Forensics, 2010

Multiple classifier systems for robust classifier design in adversarial environments.
Int. J. Mach. Learn. Cybern., 2010

Dynamic Linear Combination of Two-Class Classifiers.
Proceedings of the Structural, 2010

Multiple Classifier Systems under Attack.
Proceedings of the Multiple Classifier Systems, 9th International Workshop, 2010

Analysis of Fingerprint Pores for Vitality Detection.
Proceedings of the 20th International Conference on Pattern Recognition, 2010

A Score Decidability Index for Dynamic Score Combination.
Proceedings of the 20th International Conference on Pattern Recognition, 2010

2009
Evade Hard Multiple Classifier Systems.
Proceedings of the Applications of Supervised and Unsupervised Ensemble Methods, 2009

Bayesian Linear Combination of Neural Networks.
Proceedings of the Innovations in Neural Information Paradigms and Applications, 2009

Multiple Classifier Systems.
Proceedings of the Encyclopedia of Biometrics, 2009

Group-specific face verification using soft biometrics.
J. Vis. Lang. Comput., 2009

Personal identity verification by serial fusion of fingerprint and face matchers.
Pattern Recognit., 2009

Information fusion in computer security.
Inf. Fusion, 2009

Information fusion for computer security: State of the art and open issues.
Inf. Fusion, 2009

Designing multiple biometric systems: Measures of ensemble effectiveness.
Eng. Appl. Artif. Intell., 2009

Dynamic Score Combination: A Supervised and Unsupervised Score Combination Method.
Proceedings of the Machine Learning and Data Mining in Pattern Recognition, 2009

Semi-supervised Co-update of Multiple Matchers.
Proceedings of the Multiple Classifier Systems, 8th International Workshop, 2009

Multiple Classifier Systems for Adversarial Classification Tasks.
Proceedings of the Multiple Classifier Systems, 8th International Workshop, 2009

An Experimental Analysis of the Relationship between Biometric Template Update and the Doddington's Zoo: A Case Study in Face Verification.
Proceedings of the Image Analysis and Processing, 2009

First International Fingerprint Liveness Detection Competition - LivDet 2009.
Proceedings of the Image Analysis and Processing, 2009

Template Update Methods in Adaptive Biometric Systems: A Critical Review.
Proceedings of the Advances in Biometrics, Third International Conference, 2009

Challenges and Research Directions for Adaptive Biometric Recognition Systems.
Proceedings of the Advances in Biometrics, Third International Conference, 2009

Modelling FRR of Biometric Verification Systems Using the Template Co-update Algorithm.
Proceedings of the Advances in Biometrics, Third International Conference, 2009

2008
Instance-Based Relevance Feedback in Image Retrieval Using Dissimilarity Spaces.
Proceedings of the Case-Based Reasoning on Images and Signals, 2008

A Theoretical Analysis of Bagging as a Linear Combination of Classifiers.
IEEE Trans. Pattern Anal. Mach. Intell., 2008

Performance of fingerprint quality measures depending on sensor technology.
J. Electronic Imaging, 2008

Intrusion detection in computer networks by a modular ensemble of one-class classifiers.
Inf. Fusion, 2008

Fingerprint silicon Replicas: Static and Dynamic Features for Vitality Detection Using an Optical Capture Device.
Int. J. Image Graph., 2008

Combination of Experts by Classifiers in Similarity Score Spaces.
Proceedings of the Structural, 2008

Biometric Template Update: An Experimental Investigation on the Relationship between Update Errors and Performance Degradation in Face Verification.
Proceedings of the Structural, 2008

Template Selection by Editing Algorithms: A Case Study in Face Recognition.
Proceedings of the Structural, 2008

A Theoretical and Experimental Analysis of Template Co-update in Biometric Verification Systems.
Proceedings of the Structural, 2008

Adversarial Pattern Classification Using Multiple Classifiers and Randomisation.
Proceedings of the Structural, 2008

Dynamic score combination of binary experts.
Proceedings of the 19th International Conference on Pattern Recognition (ICPR 2008), 2008

Replacement Algorithms for Fingerprint Template Update.
Proceedings of the Image Analysis and Recognition, 5th International Conference, 2008

Capturing large intra-class variations of biometric data by template co-updating.
Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition, 2008

Improving Image Spam Filtering Using Image Text Features.
Proceedings of the CEAS 2008, 2008

Online and Offline Fingerprint Template Update Using Minutiae: An Experimental Comparison.
Proceedings of the Articulated Motion and Deformable Objects, 5th International Conference, 2008

2007
Graph-Based and Structural Methods for Fingerprint Classification.
Proceedings of the Applied Graph Theory in Computer Vision and Pattern Recognition, 2007

Selection of Experts for the Design of Multiple Biometric Systems.
Proceedings of the Machine Learning and Data Mining in Pattern Recognition, 2007

Ensemble Learning in Linearly Combined Classifiers Via Negative Correlation.
Proceedings of the Multiple Classifier Systems, 7th International Workshop, 2007

Index Driven Combination of Multiple Biometric Experts for AUC Maximisation.
Proceedings of the Multiple Classifier Systems, 7th International Workshop, 2007

Serial Fusion of Fingerprint and Face Matchers.
Proceedings of the Multiple Classifier Systems, 7th International Workshop, 2007

Bayesian Analysis of Linear Combiners.
Proceedings of the Multiple Classifier Systems, 7th International Workshop, 2007

Dynamic Score Selection for Fusion of Multiple Biometric Matchers.
Proceedings of the 14th International Conference on Image Analysis and Processing (ICIAP 2007), 2007

Score-level fusion of fingerprint and face matchers for personal verification under "stress" conditions.
Proceedings of the 14th International Conference on Image Analysis and Processing (ICIAP 2007), 2007

Image Spam Filtering Using Visual Information.
Proceedings of the 14th International Conference on Image Analysis and Processing (ICIAP 2007), 2007

Template Co-update in Multimodal Biometric Systems.
Proceedings of the Advances in Biometrics, International Conference, 2007

Vitality Detection from Fingerprint Images: A Critical Survey.
Proceedings of the Advances in Biometrics, International Conference, 2007

Image Spam Filtering by Content Obscuring Detection.
Proceedings of the CEAS 2007, 2007

Power spectrum-based fingerprint vitality detection.
Proceedings of the 2007 IEEE Workshop on Automatic Identification Advanced Technologies, 2007

2006
Spam Filtering Based On The Analysis Of Text Information Embedded Into Images.
J. Mach. Learn. Res., 2006

Decision-level Fusion of Pca and Lda-based Face Recognition Algorithms.
Int. J. Image Graph., 2006

Alarm clustering for intrusion detection systems in computer networks.
Eng. Appl. Artif. Intell., 2006

Semi-supervised PCA-Based Face Recognition Using Self-training.
Proceedings of the Structural, 2006

Using Co-training and Self-training in Semi-supervised Multiple Classifier Systems.
Proceedings of the Structural, 2006

Analysis and Selection of Features for the Fingerprint Vitality Detection.
Proceedings of the Structural, 2006

2005
Fusion of multiple fingerprint matchers by single-layer perceptron with class-separation loss function.
Pattern Recognit. Lett., 2005

A study on the performances of dynamic classifier selection based on local accuracy estimation.
Pattern Recognit., 2005

A Theoretical and Experimental Analysis of Linear Combiners for Multiple Classifier Systems.
IEEE Trans. Pattern Anal. Mach. Intell., 2005

Semi-supervised Multiple Classifier Systems: Background and Research Directions.
Proceedings of the Multiple Classifier Systems, 6th International Workshop, 2005

Dynamics of Variance Reduction in Bagging and Other Techniques Based on Randomisation.
Proceedings of the Multiple Classifier Systems, 6th International Workshop, 2005

Score Selection Techniques for Fingerprint Multi-modal Biometric Authentication.
Proceedings of the Image Analysis and Processing, 2005

Network Intrusion Detection by Combining One-Class Classifiers.
Proceedings of the Image Analysis and Processing, 2005

An Experimental Comparison of Fingerprint Classification Methods Using Graphs.
Proceedings of the Graph-Based Representations in Pattern Recognition, 2005

2004
Fingerprint verification by fusion of optical and capacitive sensors.
Pattern Recognit. Lett., 2004

Bayesian relevance feedback for content-based image retrieval.
Pattern Recognit., 2004

Analysis of error-reject trade-off in linearly combined multiple classifiers.
Pattern Recognit., 2004

Statistical and neural classifiers: an integrated approach to design (Advances in Pattern Recognition Series). By S.Raudys.
Pattern Anal. Appl., 2004

Fusion of appearance-based face recognition algorithms.
Pattern Anal. Appl., 2004

Editorial.
Int. J. Pattern Recognit. Artif. Intell., 2004

A Two-Stage Classifier with Reject Option for Text Categorisation.
Proceedings of the Structural, 2004

Instance-Based Relevance Feedback for Image Retrieval.
Proceedings of the Advances in Neural Information Processing Systems 17 [Neural Information Processing Systems, 2004

High Security Fingerprint Verification by Perceptron-Based Fusion of Multiple Matchers.
Proceedings of the Multiple Classifier Systems, 5th International Workshop, 2004

Nearest-Prototype Relevance Feedback for Content Based Image Retrieval.
Proceedings of the 17th International Conference on Pattern Recognition, 2004

Fingerprint Verification by Decision-Level Fusion of Optical and Capacitive Sensors.
Proceedings of the Biometric Authentication, 2004

2003
Fusion of multiple classifiers for intrusion detection in computer networks.
Pattern Recognit. Lett., 2003

Combining flat and structured representations for fingerprint classification with recursive neural networks and support vector machines.
Pattern Recognit., 2003

Dissimilarity Representation of Images for Relevance Feedback in Content-Based Image Retrieval.
Proceedings of the Machine Learning and Data Mining in Pattern Recognition, 2003

The Behavior Knowledge Space Fusion Method: Analysis of Generalization Error and Strategies for Performance Improvement.
Proceedings of the Multiple Classifier Systems, 4th International Workshop, 2003

A Modular Multiple Classifier System for the Detection of Intrusions in Computer Networks.
Proceedings of the Multiple Classifier Systems, 4th International Workshop, 2003

Linear Combiners for Classifier Fusion: Some Theoretical and Experimental Results.
Proceedings of the Multiple Classifier Systems, 4th International Workshop, 2003

Classification with reject option in text categorisation systems.
Proceedings of the 12th International Conference on Image Analysis and Processing (ICIAP 2003), 2003

Fusion of Statistical and Structural Fingerprint Classifiers.
Proceedings of the Audio-and Video-Based Biometrie Person Authentication, 2003

Experimental Results on Fusion of Multiple Fingerprint Matchers.
Proceedings of the Audio-and Video-Based Biometrie Person Authentication, 2003

2002
A note on core research issues for statistical pattern recognition.
Pattern Recognit. Lett., 2002

Fusion of multiple classifiers.
Inf. Fusion, 2002

Stock Market Prediction by a Mixture of Genetic-Neural Experts.
Int. J. Pattern Recognit. Artif. Intell., 2002

Support Vector Machines with Embedded Reject Option.
Proceedings of the Pattern Recognition with Support Vector Machines, 2002

Query Shifting Based on Bayesian Decision Theory for Content-Based Image Retrieval.
Proceedings of the Structural, 2002

Performance Analysis and Comparison of Linear Combiners for Classifier Fusion.
Proceedings of the Structural, 2002

An Experimental Comparison of Fixed and Trained Fusion Rules for Crisp Classifier Outputs.
Proceedings of the Multiple Classifier Systems, Third International Workshop, 2002

An Experimental Comparison of Classifier Fusion Rules for Multimodal Personal Identity Verification Systems.
Proceedings of the Multiple Classifier Systems, Third International Workshop, 2002

Analysis of Linear and Order Statistics Combiners for Fusion of Imbalanced Classifiers.
Proceedings of the Multiple Classifier Systems, Third International Workshop, 2002

Decision Level Fusion of Intramodal Personal Identity Verification Experts.
Proceedings of the Multiple Classifier Systems, Third International Workshop, 2002

Analysis of Error-Reject Trade-off in Linearly Combined Classifiers.
Proceedings of the 16th International Conference on Pattern Recognition, 2002

Intrusion Detection in Computer Networks by Multiple Classifier Systems.
Proceedings of the 16th International Conference on Pattern Recognition, 2002

Enhancing the performance of personal identity authentication systems by fusion of face verification experts.
Proceedings of the 2002 IEEE International Conference on Multimedia and Expo, 2002

Fusion of LDA and PCA for Face Verification.
Proceedings of the Biometric Authentication, 2002

2001
An approach to the automatic design of multiple classifier systems.
Pattern Recognit. Lett., 2001

Dynamic classifier selection based on multiple classifier behaviour.
Pattern Recognit., 2001

Design of effective neural network ensembles for image classification purposes.
Image Vis. Comput., 2001

Adaptive Query Shifting for Content-Based Image Retrieval.
Proceedings of the Machine Learning and Data Mining in Pattern Recognition, 2001

Methods for Designing Multiple Classifier Systems.
Proceedings of the Multiple Classifier Systems, Second International Workshop, 2001

Complexity of Data Subsets Generated by the Random Subspace Method: An Experimental Investigation.
Proceedings of the Multiple Classifier Systems, Second International Workshop, 2001

Error Rejection in Linearly Combined Multiple Classifiers.
Proceedings of the Multiple Classifier Systems, Second International Workshop, 2001

A Method for Error Rejection in Multiple Classifier Systems.
Proceedings of the 11th International Conference on Image Analysis and Processing (ICIAP 2001), 2001

Fingerprint Classification by Combination of Flat and Structural Approaches.
Proceedings of the Audio- and Video-Based Biometric Person Authentication, 2001

A New Machine Learning Approach to Fingerprint Classification.
Proceedings of the AI*IA 2001: Advances in Artificial Intelligence, 2001

2000
Combination of neural and statistical algorithms for supervised classification of remote-sensing image.
Pattern Recognit. Lett., 2000

Reject option with multiple thresholds.
Pattern Recognit., 2000

Selection of Classifiers Based on Multiple Classifier Behaviour.
Proceedings of the Advances in Pattern Recognition, Joint IAPR International Workshops SSPR 2000 and SPR 2000, [8th International Workshop on Structural and Syntactic Pattern Recognition, 3rd International Workshop on Statistical Techniques in Pattern Recognition], Alicante, Spain, August 30, 2000

Multiple Reject Thresholds for Improving Classification Reliability.
Proceedings of the Advances in Pattern Recognition, Joint IAPR International Workshops SSPR 2000 and SPR 2000, [8th International Workshop on Structural and Syntactic Pattern Recognition, 3rd International Workshop on Statistical Techniques in Pattern Recognition], Alicante, Spain, August 30, 2000

Dynamic Classifier Selection.
Proceedings of the Multiple Classifier Systems, First International Workshop, 2000

Unsupervised Learning of Neural Network Ensembles for Image Classification.
Proceedings of the IEEE-INNS-ENNS International Joint Conference on Neural Networks, 2000

Design of Effective Multiple Classifier Systems by Clustering of Classifiers.
Proceedings of the 15th International Conference on Pattern Recognition, 2000

A Theoretical Framework for Dynamic Classifier Selection.
Proceedings of the 15th International Conference on Pattern Recognition, 2000

1999
Automatic Design of Multiple Classifier Systems by Unsupervised Learning.
Proceedings of the Machine Learning and Data Mining in Pattern Recognition, 1999

Methods for Dynamic Classifier Selection.
Proceedings of the 1oth International Conference on Image Analysis and Processing (ICIAP 1999), 1999

1998
Structured neural networks for signal classification.
Signal Process., 1998

A parallel network of modified 1-NN and k-NN classifiers - Application to remote-sensing image classification.
Pattern Recognit. Lett., 1998

1997
Application of neural networks and statistical pattern recognition algorithms to earthquake risk evaluation.
Pattern Recognit. Lett., 1997

Adaptive Selection of Image Classifiers.
Proceedings of the Image Analysis and Processing, 9th International Conference, 1997

The COMPARES Project: COnnectionist Methods for Preprocessing and Analysis of REmote Sensing Data.
Proceedings of the Image Analysis and Processing, 9th International Conference, 1997

1996
An experimental comparison of neural and statistical non-parametric algorithms for supervised classification of remote-sensing images.
Pattern Recognit. Lett., 1996

A hybrid system for two-dimensional image recognition.
Proc. IEEE, 1996

Multisensor Image Recognition by Neural Networks with Understandable Behavior.
Int. J. Pattern Recognit. Artif. Intell., 1996

Classification of multisensor remote-sensing images by multiple structured neural networks.
Proceedings of the 13th International Conference on Pattern Recognition, 1996

Classification of multispectral remote-sensing images by neural networks.
Proceedings of the 8th European Signal Processing Conference, 1996

1995
Classification of multisensor remote-sensing images by structured neural networks.
IEEE Trans. Geosci. Remote. Sens., 1995

An extension of the Jeffreys-Matusita distance to multiclass cases for feature selection.
IEEE Trans. Geosci. Remote. Sens., 1995

Image Recognition by Integration of Connectionist and Symbolic Approaches.
Int. J. Pattern Recognit. Artif. Intell., 1995

Crack Detection by a Measure of Texture Anisotropy.
Proceedings of the Image Analysis and Processing, 8th International Conference, 1995

1994
Supervised Learning of Descriptions for Image Recognition Purposes.
IEEE Trans. Pattern Anal. Mach. Intell., 1994

Intelligent control of signal processing algorithms in communications.
IEEE J. Sel. Areas Commun., 1994

1992
Automatic acquisition of visual models for image recognition.
Proceedings of the 11th IAPR International Conference on Pattern Recognition, 1992

A technique for defining the architecture and weights of a neural image classifier.
Proceedings of the 1992 IEEE International Conference on Acoustics, 1992


  Loading...