Security evaluation of pattern classifiers under attack B Biggio, G Fumera, F Roli IEEE transactions on knowledge and data engineering 26 (4), 984-996, 2014 | 516 | 2014 |
Is feature selection secure against training data poisoning? H Xiao, B Biggio, G Brown, G Fumera, C Eckert, F Roli International Conference on Machine Learning, 1689-1698, 2015 | 437 | 2015 |
A theoretical and experimental analysis of linear combiners for multiple classifier systems G Fumera, F Roli IEEE Transactions on Pattern Analysis and Machine Intelligence 27 (6), 942-956, 2005 | 394 | 2005 |
Reject option with multiple thresholds G Fumera, F Roli, G Giacinto Pattern recognition 33 (12), 2099-2101, 2000 | 239 | 2000 |
Spam filtering based on the analysis of text information embedded into images G Fumera, I Pillai, F Roli Journal of Machine Learning Research 7 (Dec), 2699-2720, 2006 | 232 | 2006 |
Multiple classifier systems for robust classifier design in adversarial environments B Biggio, G Fumera, F Roli International Journal of Machine Learning and Cybernetics 1 (1-4), 27-41, 2010 | 222 | 2010 |
Support vector machines with embedded reject option G Fumera, F Roli Pattern recognition with support vector machines, 811-919, 2002 | 183 | 2002 |
Security evaluation of biometric authentication systems under real spoofing attacks B Biggio, Z Akhtar, G Fumera, GL Marcialis, F Roli IET biometrics 1 (1), 11-24, 2012 | 168 | 2012 |
Design of effective multiple classifier systems by clustering of classifiers G Giacinto, F Roli, G Fumera Pattern Recognition, 2000. Proceedings. 15th International Conference on 2 …, 2000 | 150 | 2000 |
Support vector machines for remote-sensing image classification F Roli, G Fumera Proc. SPIE 4170, 160-166, 2001 | 135 | 2001 |
Bagging Classifiers for Fighting Poisoning Attacks in Adversarial Classification Tasks. B Biggio, I Corona, G Fumera, G Giacinto, F Roli MCS, 350-359, 2011 | 128 | 2011 |
Security evaluation of support vector machines in adversarial environments B Biggio, I Corona, B Nelson, BIP Rubinstein, D Maiorca, G Fumera, ... Support Vector Machines Applications, 105-153, 2014 | 120 | 2014 |
A survey and experimental evaluation of image spam filtering techniques B Biggio, G Fumera, I Pillai, F Roli Pattern Recognition Letters 32 (10), 1436-1446, 2011 | 117 | 2011 |
Pattern recognition systems under attack: Design issues and research challenges B Biggio, G Fumera, F Roli International Journal of Pattern Recognition and Artificial Intelligence 28 …, 2014 | 105 | 2014 |
Multimodal person reidentification using RGB-D cameras F Pala, R Satta, G Fumera, F Roli IEEE Transactions on Circuits and Systems for Video Technology 26 (4), 788-799, 2016 | 101 | 2016 |
A theoretical analysis of bagging as a linear combination of classifiers G Fumera, R Fabio, S Alessandra IEEE Transactions on Pattern Analysis and Machine Intelligence 30 (7), 1293-1299, 2008 | 97 | 2008 |
Adversarial biometric recognition: A review on biometric system security from the adversarial machine-learning perspective B Biggio, G Fumera, P Russu, L Didaci, F Roli IEEE Signal Processing Magazine 32 (5), 31-41, 2015 | 94 | 2015 |
Poisoning attacks to compromise face templates B Biggio, L Didaci, G Fumera, F Roli Biometrics (ICB), 2013 International Conference on, 1-7, 2013 | 94 | 2013 |
Adversarial pattern classification using multiple classifiers and randomisation B Biggio, G Fumera, F Roli Structural, Syntactic, and Statistical Pattern Recognition, 500-509, 2008 | 92 | 2008 |
An experimental comparison of classifier fusion rules for multimodal personal identity verification systems F Roli, J Kittler, G Fumera, D Muntoni Multiple Classifier Systems 2364, 325-335, 2002 | 90 | 2002 |