IEEE Trans Pattern Anal Mach Intell
December 2022
The capacity of the heart to heal after a myocardial infarction is not enough to restore normal cardiac function. Fortunately, delivery of therapeutics such as stem cells, growth factors, exosomes and small interfering ribonucleic acid (siRNA), among other bioactive molecules, has been shown to enhance heart repair and improve cardiac function. Furthermore, new delivery systems for these therapeutic agents have enhanced their regenerative and cardioprotective potential.
View Article and Find Full Text PDFIEEE Trans Pattern Anal Mach Intell
March 2017
Prior work has shown that multibiometric systems are vulnerable to presentation attacks, assuming that their matching score distribution is identical to that of genuine users, without fabricating any fake trait. We have recently shown that this assumption is not representative of current fingerprint and face presentation attacks, leading one to overestimate the vulnerability of multibiometric systems, and to design less effective fusion rules. In this paper, we overcome these limitations by proposing a statistical meta-model of face and fingerprint presentation attacks that characterizes a wider family of fake score distributions, including distributions of known and, potentially, unknown attacks.
View Article and Find Full Text PDFIEEE Trans Neural Netw Learn Syst
November 2017
In spam and malware detection, attackers exploit randomization to obfuscate malicious data and increase their chances of evading detection at test time, e.g., malware code is typically obfuscated using random strings or byte sequences to hide known exploits.
View Article and Find Full Text PDFIEEE Trans Pattern Anal Mach Intell
July 2015
Robust human gait recognition is challenging because of the presence of covariate factors such as carrying condition, clothing, walking surface, etc. In this paper, we model the effect of covariates as an unknown partial feature corruption problem. Since the locations of corruptions may differ for different query gaits, relevant features may become irrelevant when walking condition changes.
View Article and Find Full Text PDFPattern recognition and machine learning techniques have been increasingly adopted in adversarial settings such as spam, intrusion, and malware detection, although their security against well-crafted attacks that aim to evade detection by manipulating data at test time has not yet been thoroughly assessed. While previous work has been mainly focused on devising adversary-aware classification algorithms to counter evasion attempts, only few authors have considered the impact of using reduced feature sets on classifier security against the same attacks. An interesting, preliminary result is that classifier security to evasion may be even worsened by the application of feature selection.
View Article and Find Full Text PDFIEEE Trans Cybern
November 2015
Undersampling is a widely adopted method to deal with imbalance pattern classification problems. Current methods mainly depend on either random resampling on the majority class or resampling at the decision boundary. Random-based undersampling fails to take into consideration informative samples in the data while resampling at the decision boundary is sensitive to class overlapping.
View Article and Find Full Text PDFIEEE Trans Pattern Anal Mach Intell
June 2005
In this paper, a theoretical and experimental analysis of linear combiners for multiple classifier systems is presented. Although linear combiners are the most frequently used combining rules, many important issues related to their operation for pattern classification tasks lack a theoretical basis. After a critical review of the framework developed in works by Tumer and Ghosh on which our analysis is based, we focus on the simplest and most widely used implementation of linear combiners, which consists of assigning a nonnegative weight to each individual classifier.
View Article and Find Full Text PDF