Showing results 1 to 20 of 368
Title Issue Date Author(s) Journal Publisher
Domain Knowledge Alleviates Adversarial Attacks in Multi-Label Classifiers In press Melacci, S.; Ciravegna, G.; Sotgiu, A.; Demontis, A.; Biggio, B.; Gori, M.; Roli, F. IEEE TRANSACTIONS ON PATTERN ANALYSIS AND MACHINE INTELLIGENCE -
On the Evaluation of Video-Based Crowd Counting Models 1-Jan-2022 Ledda, E.; Putzu, L.; Delussu, R.; Fumera, G.; Roli, F. - -
Detecting Anomalies from Video-Sequences: a Novel Descriptor 1-Jan-2021 Orru', G.; Ghiani, D.; Pintor, M.; Marcialis, G. L.; Roli, F. - Institute of Electrical and Electronics Engineers
Functionality-Preserving Black-Box Optimization of Adversarial Windows Malware 1-Jan-2021 Demetrio, Luca; Biggio, Battista; Lagorio, Giovanni; Roli, Fabio; Armando, Alessandro IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY -
Do gradient-based explanations tell anything about adversarial robustness to android malware? 1-Jan-2021 Melis, M.; Scalas, M.; Demontis, A.; Maiorca, D.; Biggio, B.; Giacinto, G.; Roli, F. INTERNATIONAL JOURNAL OF MACHINE LEARNING AND CYBERNETICS -
Are spoofs from latent fingerprints a real threat for the best state-of-art liveness detectors? 1-Jan-2021 Casula, R.; Orru', G.; Angioni, D.; Feng, X.; Marcialis, G. L.; Roli, F. - Institute of Electrical and Electronics Engineers
Empirical assessment of generating adversarial configurations for software product lines 1-Jan-2021 Temple, P.; Perrouin, G.; Acher, M.; Biggio, B.; Jezequel, J. -M.; Roli, F. EMPIRICAL SOFTWARE ENGINEERING -
Adversarial EXEmples: A Survey and Experimental Evaluation of Practical Attacks on Machine Learning for Windows Malware Detection 1-Jan-2021 Demetrio, L.; Coull, S. E.; Biggio, B.; Lagorio, G.; Armando, A.; Roli, F. ACM TRANSACTIONS ON PRIVACY AND SECURITY -
The hammer and the nut: is bilevel optimization really needed to poison linear classifiers? 1-Jan-2021 Cina, A. E.; Vascon, S.; Demontis, A.; Biggio, B.; Roli, F.; Pelillo, M. - IEEE, Institute of Electrical and Electronics Engineers Inc.
Fingerprint recognition with embedded presentation attacks detection: are we ready? 1-Jan-2021 Micheletto, M.; Marcialis, G. L.; Orru', G.; Roli, F. IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY -
Online domain adaptation for person Re-identification with a human in the loop 1-Jan-2021 Delussu, R.; Putzu, L.; Fumera, G.; Roli, F. - Institute of Electrical and Electronics Engineers Inc.
EEG personal recognition based on ‘qualified majority’ over signal patches 1-Jan-2021 Panzino, Andrea; Orru', Giulia; Marcialis, GIAN LUCA; Roli, Fabio IET BIOMETRICS -
Adversarial Detection of Flash Malware: Limitations and Open Issues 1-Jan-2020 Maiorca, D.; Demontis, A.; Biggio, B.; Roli, F.; Giacinto, G. COMPUTERS & SECURITY -
A novel classification-selection approach for the self updating of template-based face recognition systems 1-Jan-2020 Orrù, Giulia; Marcialis, Gian Luca; Roli, Fabio PATTERN RECOGNITION -
Deep neural rejection against adversarial examples 1-Jan-2020 Sotgiu, Angelo; Demontis, Ambra; Melis, Marco; Biggio, Battista; Fumera, Giorgio; Feng, Xiaoyi; Roli, Fabio EURASIP JOURNAL ON MULTIMEDIA AND INFORMATION SECURITY -
Towards quality assurance of software product lines with adversarial configurations 1-Jan-2019 Temple, P.; Acher, M.; Perrouin, G.; Biggio, B.; Jezequel, J. -M.; Roli, F. - Association for Computing Machinery
An experimental investigation on self adaptive facial recognition algorithms using a long time span data set 1-Jan-2019 Orru', Giulia; Marcialis, GIAN LUCA; Roli, Fabio - IEEE (Institute of Electrical and Electronics Engineers)
DEICTIC: a compositional and declarative gesture description based on hidden markov models 1-Jan-2019 Carcangiu, Alessandro; Spano, Lucio Davide; Fumera, Giorgio; Roli, Fabio INTERNATIONAL JOURNAL OF HUMAN-COMPUTER STUDIES -
Why Do Adversarial Attacks Transfer? Explaining Transferability of Evasion and Poisoning Attacks 1-Jan-2019 Demontis, Ambra; Melis, Marco; Pintor, Maura; Jagielski, Matthew; Biggio, Battista; Oprea, Alina; Nita-Rotaru, Cristina; Roli, Fabio - USENIX Association
Yes, Machine Learning Can Be More Secure! A Case Study on Android Malware Detection 1-Jan-2019 Demontis, Ambra; Melis, Marco; Biggio, Battista; Maiorca, Davide; Arp, Daniel; Rieck, Konrad; Corona, Igino; Giacinto, Giorgio; Roli, Fabio IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING -
Showing results 1 to 20 of 368
Icon legend

  •  files available
  •  files available on intranet
  •  files available for authorized users
  •  files available for administrators
  •  files under embargo
  •  no files available

Questionnaire and social

Share on:
Impostazioni cookie