A Hybrid Training-Time and Run-Time Defense Against Adversarial Attacks in Modulation Classification | 1 | 0.37 | 2022 |
On the Evaluation of Video-Based Crowd Counting Models | 0 | 0.34 | 2022 |
Practical Attacks on Machine Learning: A Case Study on Adversarial Windows Malware | 0 | 0.34 | 2022 |
Do gradient-based explanations tell anything about adversarial robustness to android malware? | 1 | 0.35 | 2022 |
Fingerprint Recognition With Embedded Presentation Attacks Detection: Are We Ready? | 0 | 0.34 | 2021 |
3D face mask presentation attack detection based on intrinsic image analysis | 1 | 0.35 | 2019 |
On the Intriguing Connections of Regularization, Input Gradients and Transferability of Evasion and Poisoning Attacks. | 0 | 0.34 | 2018 |
Is Deep Learning Safe for Robot Vision? Adversarial Examples Against the iCub Humanoid | 7 | 0.42 | 2017 |
Designing multi-label classifiers that maximize F measures: State of the art. | 7 | 0.43 | 2017 |
A parameter randomization approach for constructing classifier ensembles. | 1 | 0.35 | 2017 |
Is Deep Learning Safe for Robot Vision? Adversarial Examples Against the iCub Humanoid. | 0 | 0.34 | 2017 |
Deltaphish: Detecting Phishing Webpages In Compromised Websites | 12 | 0.56 | 2017 |
Learning extremely shared middle-level image representation for scene classification. | 2 | 0.36 | 2017 |
Randomized Prediction Games for Adversarial Machine Learning. | 4 | 0.39 | 2017 |
Fingerprint presentation attacks detection based on the user-specific effect | 0 | 0.34 | 2017 |
Super-Sparse Learning in Similarity Spaces. | 0 | 0.34 | 2017 |
Towards Poisoning of Deep Learning Algorithms with Back-gradient Optimization. | 35 | 1.06 | 2017 |
Statistical Meta-Analysis of Presentation Attacks for Secure Multibiometric Systems. | 3 | 0.37 | 2017 |
Adaptive appearance model tracking for still-to-video face recognition | 15 | 0.62 | 2016 |
Secure Kernel Machines against Evasion Attacks. | 15 | 0.63 | 2016 |
User-specific effects in Fingerprint Presentation Attacks Detection: Insights for future research | 0 | 0.34 | 2016 |
A Multi-Stage Approach for Fast Person Re-identification. | 0 | 0.34 | 2016 |
Multi-modal Person Re-Identification Using RGB-D Cameras | 21 | 0.70 | 2016 |
Support vector machines under adversarial label contamination | 35 | 1.06 | 2015 |
Fast Image Classification With Reduced Multiclass Support Vector Machines | 1 | 0.35 | 2015 |
Adaptive Classification for Person Re-identification Driven by Change Detection | 1 | 0.35 | 2015 |
Is Feature Selection Secure against Training Data Poisoning? | 20 | 0.66 | 2015 |
Video Face Recognition From A Single Still Image Using an Adaptive Appearance Model Tracker | 0 | 0.34 | 2015 |
Security Evaluation of PatternClassifiers under Attack | 14 | 0.96 | 2014 |
Poisoning Complete-Linkage Hierarchical Clustering. | 13 | 0.67 | 2014 |
Pattern Recognition Systems Under Attack: Design Issues And Research Challenges | 27 | 1.97 | 2014 |
Analysis of unsupervised template update in biometric recognition systems | 5 | 0.46 | 2014 |
Multi-label classification with a reject option | 22 | 0.78 | 2013 |
The 2nd competition on counter measures to 2D face spoofing attacks. | 29 | 0.98 | 2013 |
Evasion Attacks against Machine Learning at Test Time. | 195 | 7.05 | 2013 |
Diversity in Classifier Ensembles: Fertile Concept or Dead End? | 11 | 0.50 | 2013 |
A comparison of adaptive appearance methods for tracking faces in video surveillance | 5 | 0.43 | 2013 |
Pattern Recognition Systems under Attack. | 7 | 0.47 | 2013 |
Real-time Appearance-based Person Re-identification Over Multiple KinectTM Cameras. | 16 | 0.66 | 2013 |
A Multi-Modal Dataset, Protocol And Tools For Adaptive Biometric Systems: A Benchmarking Study | 3 | 0.39 | 2013 |
Fast person re-identification based on dissimilarity representations | 26 | 1.00 | 2012 |
A dual-staged classification-selection approach for automated update of biometric templates. | 7 | 0.53 | 2012 |
Analysis of co-training algorithm with very small training sets | 13 | 0.63 | 2012 |
Evaluation of multimodal biometric score fusion rules under spoof attacks. | 1 | 0.42 | 2012 |
Appearance-based people recognition by local dissimilarity representations | 1 | 0.35 | 2012 |
Machine Learning Methods for Computer Security (Dagstuhl Perspectives Workshop 12371). | 6 | 0.53 | 2012 |
Fusion of radio and video localization for people tracking | 4 | 0.48 | 2011 |
Robustness evaluation of biometric systems under spoof attacks | 6 | 0.45 | 2011 |
Exploiting dissimilarity representations for person re-identification | 11 | 0.56 | 2011 |
Classifier selection approaches for multi-label problems | 0 | 0.34 | 2011 |