Name
Affiliation
Papers
FABIO ROLI
Univ. of Cagliari Dept. of Electrical and Electronic Eng Piazza d’Armi 09123 Italy
281
Collaborators
Citations 
PageRank 
319
4846
311.69
Referers 
Referees 
References 
7782
3365
3319
Search Limit
1001000
Title
Citations
PageRank
Year
A Hybrid Training-Time and Run-Time Defense Against Adversarial Attacks in Modulation Classification10.372022
On the Evaluation of Video-Based Crowd Counting Models00.342022
Practical Attacks on Machine Learning: A Case Study on Adversarial Windows Malware00.342022
Do gradient-based explanations tell anything about adversarial robustness to android malware?10.352022
Fingerprint Recognition With Embedded Presentation Attacks Detection: Are We Ready?00.342021
3D face mask presentation attack detection based on intrinsic image analysis10.352019
On the Intriguing Connections of Regularization, Input Gradients and Transferability of Evasion and Poisoning Attacks.00.342018
Is Deep Learning Safe for Robot Vision? Adversarial Examples Against the iCub Humanoid70.422017
Designing multi-label classifiers that maximize F measures: State of the art.70.432017
A parameter randomization approach for constructing classifier ensembles.10.352017
Is Deep Learning Safe for Robot Vision? Adversarial Examples Against the iCub Humanoid.00.342017
Deltaphish: Detecting Phishing Webpages In Compromised Websites120.562017
Learning extremely shared middle-level image representation for scene classification.20.362017
Randomized Prediction Games for Adversarial Machine Learning.40.392017
Fingerprint presentation attacks detection based on the user-specific effect00.342017
Super-Sparse Learning in Similarity Spaces.00.342017
Towards Poisoning of Deep Learning Algorithms with Back-gradient Optimization.351.062017
Statistical Meta-Analysis of Presentation Attacks for Secure Multibiometric Systems.30.372017
Adaptive appearance model tracking for still-to-video face recognition150.622016
Secure Kernel Machines against Evasion Attacks.150.632016
User-specific effects in Fingerprint Presentation Attacks Detection: Insights for future research00.342016
A Multi-Stage Approach for Fast Person Re-identification.00.342016
Multi-modal Person Re-Identification Using RGB-D Cameras210.702016
Support vector machines under adversarial label contamination351.062015
Fast Image Classification With Reduced Multiclass Support Vector Machines10.352015
Adaptive Classification for Person Re-identification Driven by Change Detection10.352015
Is Feature Selection Secure against Training Data Poisoning?200.662015
Video Face Recognition From A Single Still Image Using an Adaptive Appearance Model Tracker00.342015
Security Evaluation of PatternClassifiers under Attack140.962014
Poisoning Complete-Linkage Hierarchical Clustering.130.672014
Pattern Recognition Systems Under Attack: Design Issues And Research Challenges271.972014
Analysis of unsupervised template update in biometric recognition systems50.462014
Multi-label classification with a reject option220.782013
The 2nd competition on counter measures to 2D face spoofing attacks.290.982013
Evasion Attacks against Machine Learning at Test Time.1957.052013
Diversity in Classifier Ensembles: Fertile Concept or Dead End?110.502013
A comparison of adaptive appearance methods for tracking faces in video surveillance50.432013
Pattern Recognition Systems under Attack.70.472013
Real-time Appearance-based Person Re-identification Over Multiple KinectTM Cameras.160.662013
A Multi-Modal Dataset, Protocol And Tools For Adaptive Biometric Systems: A Benchmarking Study30.392013
Fast person re-identification based on dissimilarity representations261.002012
A dual-staged classification-selection approach for automated update of biometric templates.70.532012
Analysis of co-training algorithm with very small training sets130.632012
Evaluation of multimodal biometric score fusion rules under spoof attacks.10.422012
Appearance-based people recognition by local dissimilarity representations10.352012
Machine Learning Methods for Computer Security (Dagstuhl Perspectives Workshop 12371).60.532012
Fusion of radio and video localization for people tracking40.482011
Robustness evaluation of biometric systems under spoof attacks60.452011
Exploiting dissimilarity representations for person re-identification110.562011
Classifier selection approaches for multi-label problems00.342011
  • 1
  • 2