Battista Biggio

Mostra risultati da 1 a 50 di 96
successivo >
Titolo Data di pubblicazione Autore(i) Rivista Editore
FADER: Fast Adversarial Example Rejection Being printed Crecchi, Francesco; Melis, Marco; Sotgiu, Angelo; Bacciu, Davide; Biggio, Battista NEUROCOMPUTING
Empirical assessment of generating adversarial configurations for software product lines 2021 Temple, P.; Perrouin, G.; Acher, M.; Biggio, B.; Jezequel, J. -M.; Roli, F. EMPIRICAL SOFTWARE ENGINEERING
Poisoning attacks on cyber attack detectors for industrial control systems 2021 Kravchik, Moshe; Biggio, Battista; Shabtai, Asaf
Poisoning Attacks on Algorithmic Fairness 2021 Solans, D.; Biggio, B.; Castillo, C. Springer Science and Business Media Deutschland GmbH
Adversarial Machine Learning: Attacks From Laboratories to the Real World 2021 Lin, Hsiao-Ying; Biggio, Battista COMPUTER
Functionality-Preserving Black-Box Optimization of Adversarial Windows Malware 2021 Demetrio, Luca; Biggio, Battista; Lagorio, Giovanni; Roli, Fabio; Armando, Alessandro IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY
Adversarial EXEmples: A Survey and Experimental Evaluation of Practical Attacks on Machine Learning for Windows Malware Detection 2021 Demetrio, L.; Coull, S. E.; Biggio, B.; Lagorio, G.; Armando, A.; Roli, F. ACM TRANSACTIONS ON PRIVACY AND SECURITY
The Hammer and the Nut: Is Bilevel Optimization Really Needed to Poison Linear Classifiers? 2021 Cina, A. E.; Vascon, S.; Demontis, A.; Biggio, B.; Roli, F.; Pelillo, M. Institute of Electrical and Electronics Engineers Inc.
Do gradient-based explanations tell anything about adversarial robustness to android malware? 2021 Melis, M.; Scalas, M.; Demontis, A.; Maiorca, D.; Biggio, B.; Giacinto, G.; Roli, F. INTERNATIONAL JOURNAL OF MACHINE LEARNING AND CYBERNETICS
Adversarial Detection of Flash Malware: Limitations and Open Issues 2020 Maiorca, D.; Demontis, A.; Biggio, B.; Roli, F.; Giacinto, G. COMPUTERS & SECURITY
Deep neural rejection against adversarial examples 2020 SOTGIU, ANGELO; DEMONTIS, AMBRA; MELIS, MARCO; BIGGIO, BATTISTA; FUMERA, GIORGIO; Feng, Xiaoyi; R...OLI, FABIO EURASIP JOURNAL ON MULTIMEDIA AND INFORMATION SECURITY
Why Do Adversarial Attacks Transfer? Explaining Transferability of Evasion and Poisoning Attacks 2019 Demontis, Ambra; Melis, Marco; Pintor, Maura; Jagielski, Matthew; Biggio, Battista; Oprea, Alina;... Nita-Rotaru, Cristina; Roli, Fabio USENIX Association
Societal issues in machine learning: When learning from data is not enough 2019 Bacciu, D.; Biggio, B.; Lisboa, P. J. G.; Martin, J. D.; Oneto, L.; Vellido, A. ESANN (i6doc.com)
Chairs' introduction and welcome to AISEC 2019 2019 Afroz, S.; Biggio, B.; Carlini, N.; Elovici, Y.; Shabtai, A.
Detecting adversarial examples through nonlinear dimensionality reduction 2019 Crecchi, F.; Bacciu, D.; Biggio, B. ESANN (i6doc.com)
Digital Investigation of PDF Files: Unveiling Traces of Embedded Malware 2019 Maiorca, Davide; Biggio, Battista IEEE SECURITY & PRIVACY
Yes, Machine Learning Can Be More Secure! A Case Study on Android Malware Detection 2019 Demontis, Ambra; Melis, Marco; Biggio, Battista; Maiorca, Davide; Arp, Daniel; Rieck, Konrad; Cor...ona, Igino; Giacinto, Giorgio; Roli, Fabio IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING
Towards adversarial malware detection: lessons learned from PDF-based attacks 2019 Maiorca, D.; Biggio, B.; Giacinto, G. ACM COMPUTING SURVEYS
Optimization and deployment of CNNs at the Edge: The ALOHA experience 2019 Meloni, P.; Loi, D.; Busia, P.; Deriu, G.; Pimentel, A. D.; Sapra, D.; Stefanov, T.; Minakova, S....; Conti, F.; Benini, L.; Pintor, M.; Biggio, B.; Moser, B.; Shepelev, N.; Fragoulis, N.; Theodorakopoulos, I.; Masin, M.; Palumbo, F. Association for Computing Machinery, Inc
Deep Learning and Security Workshop 2019 2019 Rieck, K.; Biggio, B.; Vasiloglou, N.
Poster: Attacking malware classifiers by crafting gradient-attacks that preserve functionality 2019 Labaca-Castro, R.; Biggio, B.; Rodosek, G. D. Association for Computing Machinery
Towards quality assurance of software product lines with adversarial configurations 2019 Temple, P.; Acher, M.; Perrouin, G.; Biggio, B.; Jezequel, J. -M.; Roli, F. Association for Computing Machinery
Explaining vulnerabilities of deep learning to adversarial malware binaries 2019 Demetrio, Luca; Biggio, Battista; Lagorio, Giovanni; Roli, Fabio; Armando, Alessandro
Preface 2018 Bai, X.; Hancock, E. R.; Ho, T. K.; Wilson, R. C.; Biggio, B.; Robles-Kelly, A.
Chairs’ introduction and welcome to AISec 2018 2018 Afroz, S.; Biggio, B.; Elovici, Y.; Freeman, D.; Shabtai, A.
Is Deep Learning Safe for Robot Vision? Adversarial Examples against the iCub Humanoid 2018 Melis, Marco; Demontis, Ambra; Biggio, Battista; Brown, Gavin; Fumera, Giorgio; Roli, Fabio IEEE (Institute of Electrical and Electronics Engineers)
Adversarial Malware Binaries: Evading Deep Learning for Malware Detection in Executables 2018 Kolosnjaji, Bojan; Demontis, Ambra; Biggio, Battista; Maiorca, Davide; Giacinto, Giorgio; Eckert,... Claudia; Roli, Fabio IEEE (Institute of Electrical and Electronics Engineers)
Wild patterns: ten years after the rise of adversarial machine learning 2018 Biggio, Battista; Roli, Fabio PATTERN RECOGNITION
ALOHA: An architectural-aware framework for deep learning at the edge 2018 Meloni, P.; Loi, D.; Deriu, G.; Ripolles, O.; Solans, D.; Pimentel, A. D.; Sapra, D.; Pintor, Mau...ra; Biggio, B.; Moser, B.; Shepeleva, N.; Stefanov, T.; Minakova, S.; Conti, F.; Benini, L.; Fragoulis, N.; Theodorakopoulos, I.; Masin, M.; Palumbo, F. Association for Computing Machinery
Manipulating Machine Learning: Poisoning Attacks and Countermeasures for Regression Learning 2018 Jagielski, M.; Oprea, A.; Biggio, B.; Liu, C.; Nita-Rotaru, C.; Li, B. IEEE, Institute of Electrical and Electronics Engineers
Explaining black-box android malware detection 2018 Melis, Marco; Maiorca, Davide; Biggio, Battista; Giacinto, Giorgio; Roli, Fabio IEEE, Institute of Electrical and Electronics Engineers
Architecture-aware design and implementation of CNN algorithms for embedded inference: The ALOHA project 2018 Meloni, P.; Loi, D.; Deriu, G.; Pimentel, A. D.; Saprat, D.; Pintor, M.; Biggio, B.; Ripolles, O....; Solans, D.; Conti, F.; Benini, L.; Stefanov, T.; Minakova, S.; Moser, B.; Shepeleva, N.; Masin, M.; Palumbo, F.; Fragoulis, N.; Theodorakopoulos, I. Institute of Electrical and Electronics Engineers Inc.
Chairs' introduction and welcome to AISec 2017 2017 Biggio, B.; Freeman, D. M.; Miller, B.; Sinha, A.
DeltaPhish: Detecting phishing webpages in compromised websites 2017 Corona, Igino; Biggio, Battista; Contini, Matteo; Piras, Luca; Corda, Roberto; Mereu, Mauro; Mure...ddu, Guido; Ariu, Davide; Roli, Fabio Springer
Infinity-norm support vector machines against adversarial label contamination 2017 Demontis, Ambra; Biggio, Battista; Fumera, Giorgio; Giacinto, Giorgio; Roli, Fabio CEUR-WS
Detection of malicious scripting code through discriminant and adversary-aware API analysis 2017 Maiorca, Davide; Russu, Paolo; Corona, Igino; Biggio, Battista; Giacinto, Giorgio CEUR-WS
Towards poisoning of deep learning algorithms with back-gradient optimization 2017 Muñoz-González, Luis; Biggio, Battista; Demontis, Ambra; Paudice, Andrea; Wongrassamee, Vasin; ...Lupu, Emil C.; Roli, Fabio Association for Computing Machinery
Deepsquatting: Learning-based typosquatting detection at deeper domain levels 2017 Piredda, Paolo; Ariu, Davide; Biggio, Battista; Corona, Igino; Piras, Luca; Giacinto, Giorgio; Ro...li, Fabio Springer
Statistical meta-analysis of presentation attacks for secure multibiometric systems 2017 Biggio, B; Fumera, G; Marcialis, GL; Roli, F IEEE TRANSACTIONS ON PATTERN ANALYSIS AND MACHINE INTELLIGENCE
Randomized Prediction Games for Adversarial Machine Learning 2017 Rota Bulò, S; Biggio, Battista; Pillai, Ignazio; Pelillo, M; Roli, Fabio IEEE TRANSACTIONS ON NEURAL NETWORKS AND LEARNING SYSTEMS
Preface 2016 Robles-Kelly, A.; Loog, M.; Biggio, B.; Escolano, F.; Wilson, R.
Who are you? A statistical approach to measuring user authenticity 2016 Jain, S; Mandell Freeman, M; Biggio, Battista; Duermuth, M; Giacinto, Giorgio The Internet Society
On security and sparsity of linear classifiers for adversarial settings 2016 Demontis, Ambra; Russu, Paolo; Biggio, Battista; Fumera, Giorgio; Roli, Fabio Springer
Secure Kernel Machines against Evasion Attacks 2016 Russu, Paolo; Demontis, Ambra; Biggio, Battista; Fumera, Giorgio; Roli, Fabio Association for Computing Machinery
Adversarial Feature Selection Against Evasion Attacks 2016 Zhang F; Chan PPK; Biggio B; Yeung DS; Roli F IEEE TRANSACTIONS ON CYBERNETICS
Detecting Misuse of Google Cloud Messaging in Android Badware 2016 Ahmadi, Mansour; Biggio, Battista; Arzt, S; Ariu, Davide; Giacinto, Giorgio ACM (Association for Computing Machinery)
Super-Sparse Learning in Similarity Spaces 2016 Demontis, Ambra; Melis, Marco; Biggio, Battista; Fumera, Giorgio; Roli, Fabio IEEE COMPUTATIONAL INTELLIGENCE MAGAZINE
Is feature selection secure against training data poisoning? 2015 Xiao, Huang; BIGGIO, BATTISTA; Brown, Gavin; FUMERA, GIORGIO; Eckert, Claudia; ROLI, FABIO International Machine Learning Society (IMLS)
Anti-spoofing: Multimodal 2015 Marcialis, Gian Luca; Biggio, Battista; Fumera, Giorgio Springer US
Sparse support faces 2015 Biggio B; Melis M; Fumera G; Roli F Institute of Electrical and Electronics Engineers Inc.

Questionario e social

Condividi su: