Author:
Biggio Battista,Fumera Giorgio,Roli Fabio,Didaci Luca
Publisher
Springer Berlin Heidelberg
Reference11 articles.
1. Barreno, M., Nelson, B., Sears, R., Joseph, A.D., Tygar, J.D.: Can machine learning be secure? In: Proc. Symp. on Information, Computer and Comm. Sec. (ASIACCS), pp. 16–25. ACM (2006)
2. Biggio, B., Akhtar, Z., Fumera, G., Marcialis, G.L., Roli, F.: Security evaluation of biometric authentication systems under real spoofing attacks. IET Biometrics 1(1), 11–24 (2012)
3. Jiang, X., Ser, W.: Online fingerprint template improvement. IEEE Trans. Pattern Analysis and Machine Intell. 24(8), 1121–1126 (2002)
4. Kloft, M., Laskov, P.: Online anomaly detection under adversarial impact. In: Proc. 13th Int’l Conf. on AI and Statistics (AISTATS), pp. 405–412 (2010)
5. Laskov, P., Lippmann, R.: Machine learning in adversarial environments. Machine Learning 81, 115–119 (2010)
Cited by
34 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献