Nome |
# |
A parameter randomization approach for constructing classifier ensembles, file e2f56ed6-8394-3eaf-e053-3a05fe0a5d97
|
461
|
F-measure curves: a tool to visualize classifier performance under imbalance, file e2f56ed9-8bc6-3eaf-e053-3a05fe0a5d97
|
348
|
Adversarial biometric recognition: a review on biometric system security from the adversarial machine-learning perspective, file e2f56eda-d130-3eaf-e053-3a05fe0a5d97
|
260
|
An empirical evaluation of nuclei segmentation from H&E images in a real application scenario, file e2f56eda-2a82-3eaf-e053-3a05fe0a5d97
|
182
|
Using diversity for classifier ensemble pruning: an empirical investigation, file e2f56ed7-42a9-3eaf-e053-3a05fe0a5d97
|
174
|
Investigating Synthetic Data Sets for Crowd Counting in Cross-scene Scenarios, file e2f56ed9-5102-3eaf-e053-3a05fe0a5d97
|
161
|
Infinity-norm support vector machines against adversarial label contamination, file e2f56ed6-816f-3eaf-e053-3a05fe0a5d97
|
146
|
An Empirical Evaluation of Cross-scene Crowd Counting Performance, file e2f56ed9-ae6f-3eaf-e053-3a05fe0a5d97
|
133
|
A wireless sensors network for monitoring the Carasau bread manufacturing process, file e2f56ed9-2553-3eaf-e053-3a05fe0a5d97
|
124
|
Designing multi-label classifiers that maximize F measures: state of the art, file e2f56eda-bba5-3eaf-e053-3a05fe0a5d97
|
117
|
Microwave Imaging of the Neck by Means of Artificial Neural Networks for Tumor Detection, file e2f56eda-724c-3eaf-e053-3a05fe0a5d97
|
87
|
A Robust SVM Color-Based Food Segmentation Algorithm for the Production Process of a Traditional Carasau Bread, file e2f56eda-8fdf-3eaf-e053-3a05fe0a5d97
|
81
|
Scene-specific crowd counting using synthetic training images, file c75f7b8e-65f6-430f-a292-258d00f00370
|
56
|
DEICTIC: a compositional and declarative gesture description based on hidden markov models, file e2f56eda-b842-3eaf-e053-3a05fe0a5d97
|
44
|
Statistical meta-analysis of presentation attacks for secure multibiometric systems, file e2f56eda-b87d-3eaf-e053-3a05fe0a5d97
|
43
|
An extended sparse classification framework for domain adaptation in video surveillance, file e2f56eda-0929-3eaf-e053-3a05fe0a5d97
|
38
|
Progressive Boosting for Class Imbalance and its Application to Face Re-Identification, file 571a2794-6cda-4154-ad1e-77452cf8dbcf
|
30
|
Deep neural rejection against adversarial examples, file cdc5054c-9798-4e8c-8c06-c6b96385864c
|
22
|
Is feature selection secure against training data poisoning?, file e2f56ed9-2de4-3eaf-e053-3a05fe0a5d97
|
21
|
null, file e2f56ed3-b8ea-3eaf-e053-3a05fe0a5d97
|
13
|
Designing multi-label classifiers that maximize F measures: state of the art, file e2f56eda-aa4f-3eaf-e053-3a05fe0a5d97
|
9
|
Adversarial biometric recognition: a review on biometric system security from the adversarial machine-learning perspective, file e2f56ed5-d947-3eaf-e053-3a05fe0a5d97
|
8
|
Human-in-the-Loop Person Re-Identification as a Defence Against Adversarial Attacks, file d780331f-99fb-4d55-a718-1563b433b1f8
|
7
|
null, file e2f56ed3-a49e-3eaf-e053-3a05fe0a5d97
|
7
|
Multimodal Person ReIdentification Using RGB-D Cameras, file e2f56ed3-a36d-3eaf-e053-3a05fe0a5d97
|
6
|
Yet Another Cybersecurity Roadmapping Methodology, file e2f56ed4-a380-3eaf-e053-3a05fe0a5d97
|
6
|
Statistical meta-analysis of presentation attacks for secure multibiometric systems, file e2f56ed6-8f9e-3eaf-e053-3a05fe0a5d97
|
6
|
null, file e2f56ed3-a49f-3eaf-e053-3a05fe0a5d97
|
5
|
null, file e2f56ed3-a4a2-3eaf-e053-3a05fe0a5d97
|
5
|
Security evaluation of pattern classifiers under attack, file e2f56ed3-a9e6-3eaf-e053-3a05fe0a5d97
|
5
|
null, file e2f56ed3-c632-3eaf-e053-3a05fe0a5d97
|
5
|
An empirical investigation on the use of diversity for creation of classifier ensembles, file e2f56ed4-5461-3eaf-e053-3a05fe0a5d97
|
5
|
null, file e2f56ed4-5475-3eaf-e053-3a05fe0a5d97
|
5
|
A (Cyber)ROAD to the Future: A Methodology for Building Cybersecurity Research Roadmaps, file e2f56ed5-c5cd-3eaf-e053-3a05fe0a5d97
|
5
|
F-measure curves: a tool to visualize classifier performance under imbalance, file e2f56ed9-b77b-3eaf-e053-3a05fe0a5d97
|
5
|
Multimodal Person ReIdentification Using RGB-D Cameras, file e2f56ed3-a36e-3eaf-e053-3a05fe0a5d97
|
4
|
null, file e2f56ed3-a4a0-3eaf-e053-3a05fe0a5d97
|
4
|
Fast image classification with reduced multiclass support vector machines, file e2f56ed4-bce2-3eaf-e053-3a05fe0a5d97
|
4
|
Super-Sparse Learning in Similarity Spaces, file e2f56ed5-af54-3eaf-e053-3a05fe0a5d97
|
4
|
Super-Sparse Learning in Similarity Spaces, file e2f56ed5-b129-3eaf-e053-3a05fe0a5d97
|
4
|
Gesture modelling and recognition by integrating declarative models and pattern recognition algorithms, file e2f56ed7-0125-3eaf-e053-3a05fe0a5d97
|
4
|
DEICTIC: a compositional and declarative gesture description based on hidden markov models, file e2f56ed7-f6af-3eaf-e053-3a05fe0a5d97
|
4
|
Initial Experimental Tests of an ANN-Based Microwave Imaging Technique for Neck Diagnostics, file e5eefdbf-090e-4823-a295-27f8cf0025a4
|
4
|
Human-in-the-loop cross-domain person re-identification, file 57d0dedb-08c1-411a-ad2b-62e92dc16888
|
3
|
On the Evaluation of Video-Based Crowd Counting Models, file 67c64545-93fc-4ae6-8302-24ea082174aa
|
3
|
null, file e2f56ed3-9dc0-3eaf-e053-3a05fe0a5d97
|
3
|
null, file e2f56ed3-a852-3eaf-e053-3a05fe0a5d97
|
3
|
null, file e2f56ed3-a854-3eaf-e053-3a05fe0a5d97
|
3
|
Pattern recognition systems under attack: design issues and research challenges, file e2f56ed3-bd5d-3eaf-e053-3a05fe0a5d97
|
3
|
null, file e2f56ed3-c39c-3eaf-e053-3a05fe0a5d97
|
3
|
null, file e2f56ed3-c633-3eaf-e053-3a05fe0a5d97
|
3
|
null, file e2f56ed3-e03d-3eaf-e053-3a05fe0a5d97
|
3
|
Learning Relational Concepts at Different Levels of Granularity, file e2f56ed4-e2aa-3eaf-e053-3a05fe0a5d97
|
3
|
Secure Kernel Machines against Evasion Attacks, file e2f56ed5-b7fd-3eaf-e053-3a05fe0a5d97
|
3
|
null, file e2f56ed7-1816-3eaf-e053-3a05fe0a5d97
|
3
|
Multi-Stage Ranking Approach for Fast Person Re-Identification, file e2f56ed7-4ec3-3eaf-e053-3a05fe0a5d97
|
3
|
On the Effectiveness of Synthetic Data Sets for Training Person Re-identification Models, file 2df1e4b6-fe85-42c8-a228-7b96f30feb0a
|
2
|
null, file e2f56ed3-801a-3eaf-e053-3a05fe0a5d97
|
2
|
null, file e2f56ed3-8a23-3eaf-e053-3a05fe0a5d97
|
2
|
null, file e2f56ed3-9718-3eaf-e053-3a05fe0a5d97
|
2
|
Fast person re-identification based on dissimilarity representations, file e2f56ed3-a9f4-3eaf-e053-3a05fe0a5d97
|
2
|
Learning sparse kernel machines with biometric similarity functions for identity recognition, file e2f56ed3-bf81-3eaf-e053-3a05fe0a5d97
|
2
|
Learning sparse kernel machines with biometric similarity functions for identity recognition, file e2f56ed3-bf82-3eaf-e053-3a05fe0a5d97
|
2
|
Learning sparse kernel machines with biometric similarity functions for identity recognition, file e2f56ed3-bf83-3eaf-e053-3a05fe0a5d97
|
2
|
Robustness Analysis of Likelihood Ratio Score Fusion Rule for Multimodal Biometric Systems under Spoof Attacks, file e2f56ed3-c286-3eaf-e053-3a05fe0a5d97
|
2
|
null, file e2f56ed5-65bc-3eaf-e053-3a05fe0a5d97
|
2
|
null, file e2f56ed5-df04-3eaf-e053-3a05fe0a5d97
|
2
|
A multi-stage approach for fast person re-identification, file e2f56ed6-826c-3eaf-e053-3a05fe0a5d97
|
2
|
Testing Different Learning Strategies on a Simple Connectionist Model of Numerical Fact Retrieval, file e2f56ed8-b530-3eaf-e053-3a05fe0a5d97
|
2
|
Microwave Tomography of the Neck with ANNs: Preliminary Results with Simplified Numerical Phantoms, file e2f56eda-502e-3eaf-e053-3a05fe0a5d97
|
2
|
Online domain adaptation for person Re-identification with a human in the loop, file e2f56eda-ce40-3eaf-e053-3a05fe0a5d97
|
2
|
BLUES: Before-reLU-EStimates Bayesian Inference for Crowd Counting, file 3d22282e-fbff-4811-b3b0-5cb49ab4dbe5
|
1
|
Dropout injection at test time for post hoc uncertainty quantification in neural networks, file 40b2abb5-751c-422b-a963-367d6193bf84
|
1
|
Initial Experimental Tests of an ANN-Based Microwave Imaging Technique for Neck Diagnostics, file 4d2d861b-2337-4cb1-9378-4f8760ce7ba6
|
1
|
null, file 654e57a4-14f0-4fea-8ee5-00c0885d8ee8
|
1
|
Automatic Myelofibrosis Grading from Silver-Stained Images, file 7825bb22-77d4-4418-80ee-264eac0e8fcb
|
1
|
Specialise to Generalise: The Person Re-identification Case, file 79dd618f-0847-4b1a-bc34-c0714ad1c615
|
1
|
A Microwave Imaging Technique Based on Artificial Neural Networks for Neck Tumors Detection, file 7b030a99-1665-4754-8f9e-f7456c10537d
|
1
|
Adversarial Attacks Against Uncertainty Quantification, file 895e53cd-2a74-4664-bd61-697fdb484250
|
1
|
Adversarial Attacks Against Uncertainty Quantification, file 91b9480f-bf92-4599-a7d7-897dedf9f4a1
|
1
|
Robustness of Multi-modal Biometric Systems under Realistic Spoof Attacks against All Traits, file e2f56ed3-8928-3eaf-e053-3a05fe0a5d97
|
1
|
Fast person re-identification based on dissimilarity representations, file e2f56ed3-a217-3eaf-e053-3a05fe0a5d97
|
1
|
A theoretical and experimental analysis of linear combiners for multiple classifier systems, file e2f56ed3-a224-3eaf-e053-3a05fe0a5d97
|
1
|
Multimodal Anti-spoofing in Biometric Recognition Systems, file e2f56ed3-a69e-3eaf-e053-3a05fe0a5d97
|
1
|
null, file e2f56ed3-a855-3eaf-e053-3a05fe0a5d97
|
1
|
null, file e2f56ed3-a8e4-3eaf-e053-3a05fe0a5d97
|
1
|
Training SpamAssassin with Active Semi-supervised Learning, file e2f56ed3-aae8-3eaf-e053-3a05fe0a5d97
|
1
|
Multi-label classification with a reject option, file e2f56ed3-ae07-3eaf-e053-3a05fe0a5d97
|
1
|
Multi-label classification with a reject option, file e2f56ed3-ae08-3eaf-e053-3a05fe0a5d97
|
1
|
null, file e2f56ed3-ae9b-3eaf-e053-3a05fe0a5d97
|
1
|
Threshold optimisation for multi-label classifiers, file e2f56ed3-b0d8-3eaf-e053-3a05fe0a5d97
|
1
|
Threshold optimisation for multi-label classifiers, file e2f56ed3-b0d9-3eaf-e053-3a05fe0a5d97
|
1
|
A survey and experimental evaluation of image spam filtering techniques, file e2f56ed3-b887-3eaf-e053-3a05fe0a5d97
|
1
|
A survey and experimental evaluation of image spam filtering techniques, file e2f56ed3-b888-3eaf-e053-3a05fe0a5d97
|
1
|
Classifier selection approaches for multi-label problems, file e2f56ed3-badc-3eaf-e053-3a05fe0a5d97
|
1
|
Classifier selection approaches for multi-label problems, file e2f56ed3-badd-3eaf-e053-3a05fe0a5d97
|
1
|
Pattern recognition systems under attack, file e2f56ed3-c2a3-3eaf-e053-3a05fe0a5d97
|
1
|
Pattern recognition systems under attack, file e2f56ed3-c2a5-3eaf-e053-3a05fe0a5d97
|
1
|
Pattern recognition systems under attack, file e2f56ed3-c2a6-3eaf-e053-3a05fe0a5d97
|
1
|
Evaluation of multimodal biometric score fusion rules under spoof attacks, file e2f56ed3-c61b-3eaf-e053-3a05fe0a5d97
|
1
|
Totale |
2.760 |