Domain Knowledge Alleviates Adversarial Attacks in Multi-Label Classifiers
In press Melacci, S.; Ciravegna, G.; Sotgiu, A.; Demontis, A.; Biggio, B.; Gori, M.; Roli, F.
Fingerprint recognition with embedded presentation attacks detection: are we ready?
2021-01-01 Micheletto, M.; Marcialis, G. L.; Orru', G.; Roli, F.
EEG personal recognition based on ‘qualified majority’ over signal patches
2021-01-01 Panzino, Andrea; Orru', Giulia; Marcialis, GIAN LUCA; Roli, Fabio
Detecting Anomalies from Video-Sequences: a Novel Descriptor
2021-01-01 Orru', G.; Ghiani, D.; Pintor, M.; Marcialis, G. L.; Roli, F.
Are spoofs from latent fingerprints a real threat for the best state-of-art liveness detectors?
2021-01-01 Casula, R.; Orru', G.; Angioni, D.; Feng, X.; Marcialis, G. L.; Roli, F.
Functionality-Preserving Black-Box Optimization of Adversarial Windows Malware
2021-01-01 Demetrio, Luca; Biggio, Battista; Lagorio, Giovanni; Roli, Fabio; Armando, Alessandro
Adversarial EXEmples: A Survey and Experimental Evaluation of Practical Attacks on Machine Learning for Windows Malware Detection
2021-01-01 Demetrio, L.; Coull, S. E.; Biggio, B.; Lagorio, G.; Armando, A.; Roli, F.
The hammer and the nut: is bilevel optimization really needed to poison linear classifiers?
2021-01-01 Cina, A. E.; Vascon, S.; Demontis, A.; Biggio, B.; Roli, F.; Pelillo, M.
Empirical assessment of generating adversarial configurations for software product lines
2021-01-01 Temple, P.; Perrouin, G.; Acher, M.; Biggio, B.; Jezequel, J. -M.; Roli, F.
Online domain adaptation for person Re-identification with a human in the loop
2021-01-01 Delussu, R.; Putzu, L.; Fumera, G.; Roli, F.
Do gradient-based explanations tell anything about adversarial robustness to android malware?
2021-01-01 Melis, M.; Scalas, M.; Demontis, A.; Maiorca, D.; Biggio, B.; Giacinto, G.; Roli, F.
A novel classification-selection approach for the self updating of template-based face recognition systems
2020-01-01 Orrù, Giulia; Marcialis, Gian Luca; Roli, Fabio
Adversarial Detection of Flash Malware: Limitations and Open Issues
2020-01-01 Maiorca, D.; Demontis, A.; Biggio, B.; Roli, F.; Giacinto, G.
Deep neural rejection against adversarial examples
2020-01-01 Sotgiu, Angelo; Demontis, Ambra; Melis, Marco; Biggio, Battista; Fumera, Giorgio; Feng, Xiaoyi; Roli, Fabio
Why Do Adversarial Attacks Transfer? Explaining Transferability of Evasion and Poisoning Attacks
2019-01-01 Demontis, Ambra; Melis, Marco; Pintor, Maura; Jagielski, Matthew; Biggio, Battista; Oprea, Alina; Nita-Rotaru, Cristina; Roli, Fabio
DEICTIC: a compositional and declarative gesture description based on hidden markov models
2019-01-01 Carcangiu, Alessandro; Spano, Lucio Davide; Fumera, Giorgio; Roli, Fabio
An experimental investigation on self adaptive facial recognition algorithms using a long time span data set
2019-01-01 Orru', Giulia; Marcialis, GIAN LUCA; Roli, Fabio
Review of fingerprint presentation attack detection competitions
2019-01-01 Yambay, David; Ghiani, Luca; Marcialis, Gian Luca; Roli, Fabio; Schuckers, Stephanie
Yes, Machine Learning Can Be More Secure! A Case Study on Android Malware Detection
2019-01-01 Demontis, Ambra; Melis, Marco; Biggio, Battista; Maiorca, Davide; Arp, Daniel; Rieck, Konrad; Corona, Igino; Giacinto, Giorgio; Roli, Fabio
Explaining vulnerabilities of deep learning to adversarial malware binaries
2019-01-01 Demetrio, Luca; Biggio, Battista; Lagorio, Giovanni; Roli, Fabio; Armando, Alessandro
Title | Issue Date | Author(s) | Journal | Publisher |
---|---|---|---|---|
Domain Knowledge Alleviates Adversarial Attacks in Multi-Label Classifiers | In press | Melacci, S.; Ciravegna, G.; Sotgiu, A.; Demontis, A.; Biggio, B.; Gori, M.; Roli, F. | IEEE TRANSACTIONS ON PATTERN ANALYSIS AND MACHINE INTELLIGENCE | - |
Fingerprint recognition with embedded presentation attacks detection: are we ready? | 1-Jan-2021 | Micheletto, M.; Marcialis, G. L.; Orru', G.; Roli, F. | IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY | - |
EEG personal recognition based on ‘qualified majority’ over signal patches | 1-Jan-2021 | Panzino, Andrea; Orru', Giulia; Marcialis, GIAN LUCA; Roli, Fabio | IET BIOMETRICS | - |
Detecting Anomalies from Video-Sequences: a Novel Descriptor | 1-Jan-2021 | Orru', G.; Ghiani, D.; Pintor, M.; Marcialis, G. L.; Roli, F. | - | Institute of Electrical and Electronics Engineers |
Are spoofs from latent fingerprints a real threat for the best state-of-art liveness detectors? | 1-Jan-2021 | Casula, R.; Orru', G.; Angioni, D.; Feng, X.; Marcialis, G. L.; Roli, F. | - | Institute of Electrical and Electronics Engineers |
Functionality-Preserving Black-Box Optimization of Adversarial Windows Malware | 1-Jan-2021 | Demetrio, Luca; Biggio, Battista; Lagorio, Giovanni; Roli, Fabio; Armando, Alessandro | IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY | - |
Adversarial EXEmples: A Survey and Experimental Evaluation of Practical Attacks on Machine Learning for Windows Malware Detection | 1-Jan-2021 | Demetrio, L.; Coull, S. E.; Biggio, B.; Lagorio, G.; Armando, A.; Roli, F. | ACM TRANSACTIONS ON PRIVACY AND SECURITY | - |
The hammer and the nut: is bilevel optimization really needed to poison linear classifiers? | 1-Jan-2021 | Cina, A. E.; Vascon, S.; Demontis, A.; Biggio, B.; Roli, F.; Pelillo, M. | - | IEEE, Institute of Electrical and Electronics Engineers Inc. |
Empirical assessment of generating adversarial configurations for software product lines | 1-Jan-2021 | Temple, P.; Perrouin, G.; Acher, M.; Biggio, B.; Jezequel, J. -M.; Roli, F. | EMPIRICAL SOFTWARE ENGINEERING | - |
Online domain adaptation for person Re-identification with a human in the loop | 1-Jan-2021 | Delussu, R.; Putzu, L.; Fumera, G.; Roli, F. | - | Institute of Electrical and Electronics Engineers Inc. |
Do gradient-based explanations tell anything about adversarial robustness to android malware? | 1-Jan-2021 | Melis, M.; Scalas, M.; Demontis, A.; Maiorca, D.; Biggio, B.; Giacinto, G.; Roli, F. | INTERNATIONAL JOURNAL OF MACHINE LEARNING AND CYBERNETICS | - |
A novel classification-selection approach for the self updating of template-based face recognition systems | 1-Jan-2020 | Orrù, Giulia; Marcialis, Gian Luca; Roli, Fabio | PATTERN RECOGNITION | - |
Adversarial Detection of Flash Malware: Limitations and Open Issues | 1-Jan-2020 | Maiorca, D.; Demontis, A.; Biggio, B.; Roli, F.; Giacinto, G. | COMPUTERS & SECURITY | - |
Deep neural rejection against adversarial examples | 1-Jan-2020 | Sotgiu, Angelo; Demontis, Ambra; Melis, Marco; Biggio, Battista; Fumera, Giorgio; Feng, Xiaoyi; Roli, Fabio | EURASIP JOURNAL ON MULTIMEDIA AND INFORMATION SECURITY | - |
Why Do Adversarial Attacks Transfer? Explaining Transferability of Evasion and Poisoning Attacks | 1-Jan-2019 | Demontis, Ambra; Melis, Marco; Pintor, Maura; Jagielski, Matthew; Biggio, Battista; Oprea, Alina; Nita-Rotaru, Cristina; Roli, Fabio | - | USENIX Association |
DEICTIC: a compositional and declarative gesture description based on hidden markov models | 1-Jan-2019 | Carcangiu, Alessandro; Spano, Lucio Davide; Fumera, Giorgio; Roli, Fabio | INTERNATIONAL JOURNAL OF HUMAN-COMPUTER STUDIES | - |
An experimental investigation on self adaptive facial recognition algorithms using a long time span data set | 1-Jan-2019 | Orru', Giulia; Marcialis, GIAN LUCA; Roli, Fabio | - | IEEE (Institute of Electrical and Electronics Engineers) |
Review of fingerprint presentation attack detection competitions | 1-Jan-2019 | Yambay, David; Ghiani, Luca; Marcialis, Gian Luca; Roli, Fabio; Schuckers, Stephanie | - | Springer London |
Yes, Machine Learning Can Be More Secure! A Case Study on Android Malware Detection | 1-Jan-2019 | Demontis, Ambra; Melis, Marco; Biggio, Battista; Maiorca, Davide; Arp, Daniel; Rieck, Konrad; Corona, Igino; Giacinto, Giorgio; Roli, Fabio | IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING | - |
Explaining vulnerabilities of deep learning to adversarial malware binaries | 1-Jan-2019 | Demetrio, Luca; Biggio, Battista; Lagorio, Giovanni; Roli, Fabio; Armando, Alessandro | - | - |
Legenda icone
- files available
- files available on intranet
- files available for authorized users
- files available for administrators
- files under embargo
- no files available