Follow
Giorgio Fumera
Title
Cited by
Cited by
Year
Security evaluation of pattern classifiers under attack
B Biggio, G Fumera, F Roli
IEEE transactions on knowledge and data engineering 26 (4), 984-996, 2013
5512013
Is feature selection secure against training data poisoning?
H Xiao, B Biggio, G Brown, G Fumera, C Eckert, F Roli
international conference on machine learning, 1689-1698, 2015
4862015
A theoretical and experimental analysis of linear combiners for multiple classifier systems
G Fumera, F Roli
IEEE transactions on pattern analysis and machine intelligence 27 (6), 942-956, 2005
4032005
Reject option with multiple thresholds
G Fumera, F Roli, G Giacinto
Pattern recognition 33 (12), 2099-2101, 2000
2442000
Multiple classifier systems for robust classifier design in adversarial environments
B Biggio, G Fumera, F Roli
International Journal of Machine Learning and Cybernetics 1, 27-41, 2010
2392010
Spam filtering based on the analysis of text information embedded into images.
G Fumera, I Pillai, F Roli
Journal of Machine Learning Research 7 (12), 2006
2392006
Support vector machines with embedded reject option
G Fumera, F Roli
Pattern Recognition with Support Vector Machines: First International …, 2002
2032002
Security evaluation of biometric authentication systems under real spoofing attacks
B Biggio, Z Akhtar, G Fumera, GL Marcialis, F Roli
IET biometrics 1 (1), 11-24, 2012
1732012
Design of effective multiple classifier systems by clustering of classifiers
G Giacinto, F Roli, G Fumera
Proceedings 15th International Conference on Pattern Recognition. ICPR-2000 …, 2000
1532000
Bagging classifiers for fighting poisoning attacks in adversarial classification tasks
B Biggio, I Corona, G Fumera, G Giacinto, F Roli
Multiple Classifier Systems: 10th International Workshop, MCS 2011, Naples …, 2011
1402011
Support vector machines for remote sensing image classification
F Roli, G Fumera
Image and signal processing for remote sensing VI 4170, 160-166, 2001
1382001
Security evaluation of support vector machines in adversarial environments
B Biggio, I Corona, B Nelson, BIP Rubinstein, D Maiorca, G Fumera, ...
Support vector machines applications, 105-153, 2014
1262014
A survey and experimental evaluation of image spam filtering techniques
B Biggio, G Fumera, I Pillai, F Roli
Pattern recognition letters 32 (10), 1436-1446, 2011
1252011
Multimodal person reidentification using RGB-D cameras
F Pala, R Satta, G Fumera, F Roli
IEEE Transactions on Circuits and Systems for Video Technology 26 (4), 788-799, 2016
1132016
Is deep learning safe for robot vision? adversarial examples against the icub humanoid
M Melis, A Demontis, B Biggio, G Brown, G Fumera, F Roli
Proceedings of the IEEE international conference on computer vision …, 2017
1122017
Adversarial biometric recognition: A review on biometric system security from the adversarial machine-learning perspective
B Biggio, G Fumera, P Russu, L Didaci, F Roli
IEEE Signal Processing Magazine 32 (5), 31-41, 2015
1122015
Pattern recognition systems under attack: Design issues and research challenges
B Biggio, G Fumera, F Roli
International Journal of Pattern Recognition and Artificial Intelligence 28 …, 2014
1102014
A theoretical analysis of bagging as a linear combination of classifiers
G Fumera, R Fabio, S Alessandra
IEEE Transactions on Pattern Analysis and Machine Intelligence 30 (7), 1293-1299, 2008
1002008
Adversarial pattern classification using multiple classifiers and randomisation
B Biggio, G Fumera, F Roli
Structural, Syntactic, and Statistical Pattern Recognition: Joint IAPR …, 2008
992008
Poisoning attacks to compromise face templates
B Biggio, L Didaci, G Fumera, F Roli
2013 international conference on biometrics (ICB), 1-7, 2013
982013
The system can't perform the operation now. Try again later.
Articles 1–20