-
1
المؤلفون: Lu Zhang, Sangarapillai Lambotharan, Gan Zheng, Guisheng Liao, Basil AsSadhan, Fabio Roli
المصدر: IEEE Internet of Things Journal. 10:2646-2657
مصطلحات موضوعية: Computer Networks and Communications, Hardware and Architecture, Signal Processing, Computer Science Applications, Information Systems
الوصول الحر: https://explore.openaire.eu/search/publication?articleId=doi_________::327543863067cfbc88812df740cec6abTest
https://doi.org/10.1109/jiot.2022.3215188Test -
2A Hybrid Training-Time and Run-Time Defense Against Adversarial Attacks in Modulation Classification
المؤلفون: Lu Zhang, Sangarapillai Lambotharan, Gan Zheng, Guisheng Liao, Ambra Demontis, Fabio Roli
المصدر: IEEE Wireless Communications Letters. 11:1161-1165
مصطلحات موضوعية: Control and Systems Engineering, Electrical and Electronic Engineering
الوصول الحر: https://explore.openaire.eu/search/publication?articleId=doi_________::0d6c935ffdb83577dc07846a412892bfTest
https://doi.org/10.1109/lwc.2022.3159659Test -
3
المؤلفون: Gan Zheng, Sangarapillai Lambotharan, Lu Zhang, Basil AsSadhan, Fabio Roli
المصدر: IEEE Wireless Communications Letters. 10:1830-1834
مصطلحات موضوعية: Noise measurement, Computer science, Wireless network, business.industry, Deep learning, Transmitter, Machine learning, computer.software_genre, Adversarial system, symbols.namesake, Countermeasure, Control and Systems Engineering, Gaussian noise, symbols, Artificial intelligence, Electrical and Electronic Engineering, business, computer, Smoothing
الوصول الحر: https://explore.openaire.eu/search/publication?articleId=doi_________::be6ca349ff17a5484a692d0ded205a60Test
https://doi.org/10.1109/lwc.2021.3083099Test -
4
المؤلفون: Fabio Roli, Marco Micheletto, Gian Luca Marcialis, Giulia Orrù
المصدر: IEEE Transactions on Information Forensics and Security. 16:5338-5351
مصطلحات موضوعية: Spoofing, FOS: Computer and information sciences, Computer Science - Cryptography and Security, Computer Networks and Communications, Computer science, Computer Vision and Pattern Recognition (cs.CV), Computer Science - Computer Vision and Pattern Recognition, Fingerprint Verification Competition, Fingerprint recognition, Machine learning, computer.software_genre, Tools, Software, Need to know, Safety, Risk, Reliability and Quality, Probabilistic logic, business.industry, Biometrics, Error analysis, Instruments, Presentation attacks detection (PAD), Security, Terminology, Deep learning, Fingerprint (computing), NIST, Artificial intelligence, business, Cryptography and Security (cs.CR), computer
الوصول الحر: https://explore.openaire.eu/search/publication?articleId=doi_dedup___::dc5168c830f408ef8c280ec064822d7dTest
https://doi.org/10.1109/tifs.2021.3121201Test -
5
المؤلفون: Giorgio Fumera, Paolo Russu, Luca Didaci, Battista Biggio, Fabio Roli
المصدر: IEEE Signal Processing Magazine. 32:31-41
مصطلحات موضوعية: Spoofing attack, Exploit, Biometrics, Computer science, Applied Mathematics, Feature extraction, Behavioral science, Machine learning algorithms, Adversarial machine learning, Computer security, computer.software_genre, Adversarial system, Pattern recognition, Biometrics (access control), Security, Signal processing algorithms, Signal Processing, Pattern recognition (psychology), Electrical and Electronic Engineering, computer, Signature recognition
الوصول الحر: https://explore.openaire.eu/search/publication?articleId=doi_dedup___::abb385c29bd2c0d42e75ef8ebd1638aeTest
https://doi.org/10.1109/msp.2015.2426728Test -
6
المؤلفون: Battista Biggio, Giorgio Fumera, Fabio Roli
المصدر: IEEE Transactions on Knowledge and Data Engineering
مصطلحات موضوعية: FOS: Computer and information sciences, Computer Science - Cryptography and Security, Biometrics, robustness evaluation, business.industry, Computer science, Vulnerability, Pattern classification, security evaluation, adversarial classification, performance evaluation, Machine learning, computer.software_genre, Machine Learning (cs.LG), Computer Science Applications, Computer Science - Learning, Adversarial system, Computational Theory and Mathematics, Artificial intelligence, business, Cryptography and Security (cs.CR), computer, Classifier (UML), Information Systems
الوصول الحر: https://explore.openaire.eu/search/publication?articleId=doi_dedup___::4722af6f11c369b7882d441a1bfc0470Test
https://doi.org/10.1109/tkde.2013.57Test