Security evaluation of pattern classifiers under attack B Biggio, G Fumera, F Roli IEEE transactions on knowledge and data engineering 26 (4), 984-996, 2013 | 578 | 2013 |
Is feature selection secure against training data poisoning? H Xiao, B Biggio, G Brown, G Fumera, C Eckert, F Roli international conference on machine learning, 1689-1698, 2015 | 530 | 2015 |
A theoretical and experimental analysis of linear combiners for multiple classifier systems G Fumera, F Roli IEEE transactions on pattern analysis and machine intelligence 27 (6), 942-956, 2005 | 410 | 2005 |
Reject option with multiple thresholds G Fumera, F Roli, G Giacinto Pattern recognition 33 (12), 2099-2101, 2000 | 255 | 2000 |
Multiple classifier systems for robust classifier design in adversarial environments B Biggio, G Fumera, F Roli International Journal of Machine Learning and Cybernetics 1, 27-41, 2010 | 243 | 2010 |
Spam filtering based on the analysis of text information embedded into images. G Fumera, I Pillai, F Roli Journal of Machine Learning Research 7 (12), 2006 | 242 | 2006 |
Support vector machines with embedded reject option G Fumera, F Roli Pattern Recognition with Support Vector Machines: First International …, 2002 | 218 | 2002 |
Security evaluation of biometric authentication systems under real spoofing attacks B Biggio, Z Akhtar, G Fumera, GL Marcialis, F Roli IET biometrics 1 (1), 11-24, 2012 | 180 | 2012 |
Bagging classifiers for fighting poisoning attacks in adversarial classification tasks B Biggio, I Corona, G Fumera, G Giacinto, F Roli Multiple Classifier Systems: 10th International Workshop, MCS 2011, Naples …, 2011 | 158 | 2011 |
Design of effective multiple classifier systems by clustering of classifiers G Giacinto, F Roli, G Fumera Proceedings 15th International Conference on Pattern Recognition. ICPR-2000 …, 2000 | 158 | 2000 |
Support vector machines for remote sensing image classification F Roli, G Fumera Image and signal processing for remote sensing VI 4170, 160-166, 2001 | 143 | 2001 |
Security evaluation of support vector machines in adversarial environments B Biggio, I Corona, B Nelson, BIP Rubinstein, D Maiorca, G Fumera, ... Support vector machines applications, 105-153, 2014 | 138 | 2014 |
A survey and experimental evaluation of image spam filtering techniques B Biggio, G Fumera, I Pillai, F Roli Pattern recognition letters 32 (10), 1436-1446, 2011 | 128 | 2011 |
Adversarial biometric recognition: A review on biometric system security from the adversarial machine-learning perspective B Biggio, G Fumera, P Russu, L Didaci, F Roli IEEE Signal Processing Magazine 32 (5), 31-41, 2015 | 125 | 2015 |
Is deep learning safe for robot vision? adversarial examples against the icub humanoid M Melis, A Demontis, B Biggio, G Brown, G Fumera, F Roli Proceedings of the IEEE international conference on computer vision …, 2017 | 122 | 2017 |
Pattern recognition systems under attack: Design issues and research challenges B Biggio, G Fumera, F Roli International Journal of Pattern Recognition and Artificial Intelligence 28 …, 2014 | 120 | 2014 |
Multimodal person reidentification using RGB-D cameras F Pala, R Satta, G Fumera, F Roli IEEE Transactions on Circuits and Systems for Video Technology 26 (4), 788-799, 2016 | 119 | 2016 |
Poisoning attacks to compromise face templates B Biggio, L Didaci, G Fumera, F Roli 2013 international conference on biometrics (ICB), 1-7, 2013 | 103 | 2013 |
A theoretical analysis of bagging as a linear combination of classifiers G Fumera, R Fabio, S Alessandra IEEE Transactions on Pattern Analysis and Machine Intelligence 30 (7), 1293-1299, 2008 | 103 | 2008 |
Adversarial pattern classification using multiple classifiers and randomisation B Biggio, G Fumera, F Roli Structural, Syntactic, and Statistical Pattern Recognition: Joint IAPR …, 2008 | 101 | 2008 |