Yes, Machine Learning Can Be More Secure! A Case Study on Android Malware Detection
2019-01-01 Demontis, Ambra; Melis, Marco; Biggio, Battista; Maiorca, Davide; Arp, Daniel; Rieck, Konrad; Corona, Igino; Giacinto, Giorgio; Roli, Fabio
Detecting adversarial examples through nonlinear dimensionality reduction
2019-01-01 Crecchi, F.; Bacciu, D.; Biggio, B.
Towards quality assurance of software product lines with adversarial configurations
2019-01-01 Temple, P.; Acher, M.; Perrouin, G.; Biggio, B.; Jezequel, J. -M.; Roli, F.
Towards adversarial malware detection: lessons learned from PDF-based attacks
2019-01-01 Maiorca, D.; Biggio, B.; Giacinto, G.
Poster: Attacking malware classifiers by crafting gradient-attacks that preserve functionality
2019-01-01 Labaca-Castro, R.; Biggio, B.; Rodosek, G. D.
Why Do Adversarial Attacks Transfer? Explaining Transferability of Evasion and Poisoning Attacks
2019-01-01 Demontis, Ambra; Melis, Marco; Pintor, Maura; Jagielski, Matthew; Biggio, Battista; Oprea, Alina; Nita-Rotaru, Cristina; Roli, Fabio
Optimization and deployment of CNNs at the Edge: The ALOHA experience
2019-01-01 Meloni, P.; Loi, D.; Busia, P.; Deriu, G.; Pimentel, A. D.; Sapra, D.; Stefanov, T.; Minakova, S.; Conti, F.; Benini, L.; Pintor, M.; Biggio, B.; Moser, B.; Shepelev, N.; Fragoulis, N.; Theodorakopoulos, I.; Masin, M.; Palumbo, F.
Societal issues in machine learning: When learning from data is not enough
2019-01-01 Bacciu, D.; Biggio, B.; Lisboa, P. J. G.; Martin, J. D.; Oneto, L.; Vellido, A.
Digital Investigation of PDF Files: Unveiling Traces of Embedded Malware
2019-01-01 Maiorca, Davide; Biggio, Battista
Chairs' introduction and welcome to AISEC 2019
2019-01-01 Afroz, S.; Biggio, B.; Carlini, N.; Elovici, Y.; Shabtai, A.
Explaining black-box android malware detection
2018-01-01 Melis, Marco; Maiorca, Davide; Biggio, Battista; Giacinto, Giorgio; Roli, Fabio
ALOHA: An architectural-aware framework for deep learning at the edge
2018-01-01 Meloni, P.; Loi, D.; Deriu, G.; Ripolles, O.; Solans, D.; Pimentel, A. D.; Sapra, D.; Pintor, Maura; Biggio, B.; Moser, B.; Shepeleva, N.; Stefanov, T.; Minakova, S.; Conti, F.; Benini, L.; Fragoulis, N.; Theodorakopoulos, I.; Masin, M.; Palumbo, F.
Wild patterns: ten years after the rise of adversarial machine learning
2018-01-01 Biggio, Battista; Roli, Fabio
Is Deep Learning Safe for Robot Vision? Adversarial Examples against the iCub Humanoid
2018-01-01 Melis, Marco; Demontis, Ambra; Biggio, Battista; Brown, Gavin; Fumera, Giorgio; Roli, Fabio
Adversarial Malware Binaries: Evading Deep Learning for Malware Detection in Executables
2018-01-01 Kolosnjaji, Bojan; Demontis, Ambra; Biggio, Battista; Maiorca, Davide; Giacinto, Giorgio; Eckert, Claudia; Roli, Fabio
Preface
2018-01-01 Bai, X.; Hancock, E. R.; Ho, T. K.; Wilson, R. C.; Biggio, B.; Robles-Kelly, A.
Chairs’ introduction and welcome to AISec 2018
2018-01-01 Afroz, S.; Biggio, B.; Elovici, Y.; Freeman, D.; Shabtai, A.
Manipulating Machine Learning: Poisoning Attacks and Countermeasures for Regression Learning
2018-01-01 Jagielski, M.; Oprea, A.; Biggio, B.; Liu, C.; Nita-Rotaru, C.; Li, B.
Architecture-aware design and implementation of CNN algorithms for embedded inference: The ALOHA project
2018-01-01 Meloni, P.; Loi, D.; Deriu, G.; Pimentel, A. D.; Saprat, D.; Pintor, M.; Biggio, B.; Ripolles, O.; Solans, D.; Conti, F.; Benini, L.; Stefanov, T.; Minakova, S.; Moser, B.; Shepeleva, N.; Masin, M.; Palumbo, F.; Fragoulis, N.; Theodorakopoulos, I.
Infinity-norm support vector machines against adversarial label contamination
2017-01-01 Demontis, Ambra; Biggio, Battista; Fumera, Giorgio; Giacinto, Giorgio; Roli, Fabio
Detection of malicious scripting code through discriminant and adversary-aware API analysis
2017-01-01 Maiorca, Davide; Russu, Paolo; Corona, Igino; Biggio, Battista; Giacinto, Giorgio
Statistical meta-analysis of presentation attacks for secure multibiometric systems
2017-01-01 Biggio, Battista; Fumera, Giorgio; Marcialis, GIAN LUCA; Roli, Fabio
Chairs' introduction and welcome to AISec 2017
2017-01-01 Biggio, B.; Freeman, D. M.; Miller, B.; Sinha, A.
Randomized Prediction Games for Adversarial Machine Learning
2017-01-01 Rota Bulò, S; Biggio, Battista; Pillai, Ignazio; Pelillo, M; Roli, Fabio
Deepsquatting: Learning-based typosquatting detection at deeper domain levels
2017-01-01 Piredda, Paolo; Ariu, Davide; Biggio, Battista; Corona, Igino; Piras, Luca; Giacinto, Giorgio; Roli, Fabio
Towards poisoning of deep learning algorithms with back-gradient optimization
2017-01-01 Muñoz-González, Luis; Biggio, Battista; Demontis, Ambra; Paudice, Andrea; Wongrassamee, Vasin; Lupu, Emil C.; Roli, Fabio
DeltaPhish: Detecting phishing webpages in compromised websites
2017-01-01 Corona, Igino; Biggio, Battista; Contini, Matteo; Piras, Luca; Corda, Roberto; Mereu, Mauro; Mureddu, Guido; Ariu, Davide; Roli, Fabio
Detecting Misuse of Google Cloud Messaging in Android Badware
2016-01-01 Ahmadi, Mansour; Biggio, Battista; Arzt, S; Ariu, Davide; Giacinto, Giorgio
Secure Kernel Machines against Evasion Attacks
2016-01-01 Russu, Paolo; Demontis, Ambra; Biggio, Battista; Fumera, Giorgio; Roli, Fabio
Super-Sparse Learning in Similarity Spaces
2016-01-01 Demontis, Ambra; Melis, Marco; Biggio, Battista; Fumera, Giorgio; Roli, Fabio
On security and sparsity of linear classifiers for adversarial settings
2016-01-01 Demontis, Ambra; Russu, Paolo; Biggio, Battista; Fumera, Giorgio; Roli, Fabio
Who are you? A statistical approach to measuring user authenticity
2016-01-01 Jain, S; Mandell Freeman, M; Biggio, Battista; Duermuth, M; Giacinto, Giorgio
Adversarial Feature Selection Against Evasion Attacks
2016-01-01 Zhang, F; Chan, Ppk; Biggio, Battista; Yeung, Ds; Roli, Fabio
Preface
2016-01-01 Robles-Kelly, A.; Loog, M.; Biggio, B.; Escolano, F.; Wilson, R.
Anti-spoofing: Multimodal
2015-01-01 Marcialis, GIAN LUCA; Biggio, Battista; Fumera, Giorgio
One-and-a-half-class multiple classifier systems for secure learning against evasion attacks at test time
2015-01-01 Biggio, Battista; Corona, Igino; He, Z. M.; Chan P., P; Giacinto, Giorgio; Yeung D., S; Roli, Fabio
Fast image classification with reduced multiclass support vector machines
2015-01-01 Melis, Marco; Piras, Luca; Biggio, Battista; Giacinto, Giorgio; Fumera, Giorgio; Roli, Fabio
Sparse support faces
2015-01-01 Biggio, Battista; Melis, Marco; Fumera, Giorgio; Roli, Fabio
Super-Sparse regression for fast age estimation from faces at test time
2015-01-01 Demontis, Ambra; Biggio, Battista; Fumera, Giorgio; Roli, Fabio
Is feature selection secure against training data poisoning?
2015-01-01 Xiao, Huang; Biggio, Battista; Brown, Gavin; Fumera, Giorgio; Eckert, Claudia; Roli, Fabio
Data-driven Journal Meta-ranking in Business and Management
2015-01-01 Ennas, Gianfranco; Biggio, Battista; DI GUARDO, MARIA CHIARA
Adversarial biometric recognition: a review on biometric system security from the adversarial machine-learning perspective
2015-01-01 Biggio, Battista; Fumera, Giorgio; Russu, Paolo; Didaci, Luca; Roli, Fabio
Support vector machines under adversarial label contamination
2015-01-01 Xiao, H; Biggio, Battista; Nelson, B; Xiao, H; Eckert, C; Roli, Fabio
Multimodal Anti-spoofing in Biometric Recognition Systems
2014-01-01 Fumera, Giorgio; Marcialis, GIAN LUCA; Biggio, Battista; Roli, Fabio; Schuckers, S.
Pattern recognition systems under attack: design issues and research challenges
2014-01-01 Biggio, Battista; Fumera, Giorgio; Roli, Fabio
Security Evaluation of Support Vector Machines in Adversarial Environments
2014-01-01 Biggio, Battista; Corona, Igino; Nelson, BLAINE ALAN; Rubinstein, Bip; Maiorca, Davide; Fumera, Giorgio; Giacinto, Giorgio; Roli, Fabio
On Learning and Recognition of Secure Patterns
2014-01-01 Biggio, Battista
Poisoning complete-linkage hierarchical clustering
2014-01-01 Biggio, Battista; Rota Bulò, S; Pillai, I; Mura, M; Mequanint E., Z; Pelillo, M; Roli, Fabio
Poisoning behavioral malware clustering
2014-01-01 Biggio, Battista; Rieck, K; Ariu, Davide; Wressnegger, C; Corona, Igino; Giacinto, Giorgio; Roli, Fabio
Security evaluation of pattern classifiers under attack
2014-01-01 Biggio, Battista; Fumera, Giorgio; Roli, Fabio
Titolo | Data di pubblicazione | Autore(i) | Rivista | Editore |
---|---|---|---|---|
Yes, Machine Learning Can Be More Secure! A Case Study on Android Malware Detection | 1-gen-2019 | Demontis, Ambra; Melis, Marco; Biggio, Battista; Maiorca, Davide; Arp, Daniel; Rieck, Konrad; Corona, Igino; Giacinto, Giorgio; Roli, Fabio | IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING | - |
Detecting adversarial examples through nonlinear dimensionality reduction | 1-gen-2019 | Crecchi, F.; Bacciu, D.; Biggio, B. | - | ESANN (i6doc.com) |
Towards quality assurance of software product lines with adversarial configurations | 1-gen-2019 | Temple, P.; Acher, M.; Perrouin, G.; Biggio, B.; Jezequel, J. -M.; Roli, F. | - | Association for Computing Machinery |
Towards adversarial malware detection: lessons learned from PDF-based attacks | 1-gen-2019 | Maiorca, D.; Biggio, B.; Giacinto, G. | ACM COMPUTING SURVEYS | - |
Poster: Attacking malware classifiers by crafting gradient-attacks that preserve functionality | 1-gen-2019 | Labaca-Castro, R.; Biggio, B.; Rodosek, G. D. | - | Association for Computing Machinery |
Why Do Adversarial Attacks Transfer? Explaining Transferability of Evasion and Poisoning Attacks | 1-gen-2019 | Demontis, Ambra; Melis, Marco; Pintor, Maura; Jagielski, Matthew; Biggio, Battista; Oprea, Alina; Nita-Rotaru, Cristina; Roli, Fabio | - | USENIX Association |
Optimization and deployment of CNNs at the Edge: The ALOHA experience | 1-gen-2019 | Meloni, P.; Loi, D.; Busia, P.; Deriu, G.; Pimentel, A. D.; Sapra, D.; Stefanov, T.; Minakova, S.; Conti, F.; Benini, L.; Pintor, M.; Biggio, B.; Moser, B.; Shepelev, N.; Fragoulis, N.; Theodorakopoulos, I.; Masin, M.; Palumbo, F. | - | Association for Computing Machinery, Inc |
Societal issues in machine learning: When learning from data is not enough | 1-gen-2019 | Bacciu, D.; Biggio, B.; Lisboa, P. J. G.; Martin, J. D.; Oneto, L.; Vellido, A. | - | ESANN (i6doc.com) |
Digital Investigation of PDF Files: Unveiling Traces of Embedded Malware | 1-gen-2019 | Maiorca, Davide; Biggio, Battista | IEEE SECURITY & PRIVACY | - |
Chairs' introduction and welcome to AISEC 2019 | 1-gen-2019 | Afroz, S.; Biggio, B.; Carlini, N.; Elovici, Y.; Shabtai, A. | - | - |
Explaining black-box android malware detection | 1-gen-2018 | Melis, Marco; Maiorca, Davide; Biggio, Battista; Giacinto, Giorgio; Roli, Fabio | - | IEEE, Institute of Electrical and Electronics Engineers |
ALOHA: An architectural-aware framework for deep learning at the edge | 1-gen-2018 | Meloni, P.; Loi, D.; Deriu, G.; Ripolles, O.; Solans, D.; Pimentel, A. D.; Sapra, D.; Pintor, Maura; Biggio, B.; Moser, B.; Shepeleva, N.; Stefanov, T.; Minakova, S.; Conti, F.; Benini, L.; Fragoulis, N.; Theodorakopoulos, I.; Masin, M.; Palumbo, F. | - | Association for Computing Machinery |
Wild patterns: ten years after the rise of adversarial machine learning | 1-gen-2018 | Biggio, Battista; Roli, Fabio | PATTERN RECOGNITION | - |
Is Deep Learning Safe for Robot Vision? Adversarial Examples against the iCub Humanoid | 1-gen-2018 | Melis, Marco; Demontis, Ambra; Biggio, Battista; Brown, Gavin; Fumera, Giorgio; Roli, Fabio | - | IEEE (Institute of Electrical and Electronics Engineers) |
Adversarial Malware Binaries: Evading Deep Learning for Malware Detection in Executables | 1-gen-2018 | Kolosnjaji, Bojan; Demontis, Ambra; Biggio, Battista; Maiorca, Davide; Giacinto, Giorgio; Eckert, Claudia; Roli, Fabio | - | IEEE (Institute of Electrical and Electronics Engineers) |
Preface | 1-gen-2018 | Bai, X.; Hancock, E. R.; Ho, T. K.; Wilson, R. C.; Biggio, B.; Robles-Kelly, A. | - | - |
Chairs’ introduction and welcome to AISec 2018 | 1-gen-2018 | Afroz, S.; Biggio, B.; Elovici, Y.; Freeman, D.; Shabtai, A. | - | - |
Manipulating Machine Learning: Poisoning Attacks and Countermeasures for Regression Learning | 1-gen-2018 | Jagielski, M.; Oprea, A.; Biggio, B.; Liu, C.; Nita-Rotaru, C.; Li, B. | - | IEEE, Institute of Electrical and Electronics Engineers |
Architecture-aware design and implementation of CNN algorithms for embedded inference: The ALOHA project | 1-gen-2018 | Meloni, P.; Loi, D.; Deriu, G.; Pimentel, A. D.; Saprat, D.; Pintor, M.; Biggio, B.; Ripolles, O.; Solans, D.; Conti, F.; Benini, L.; Stefanov, T.; Minakova, S.; Moser, B.; Shepeleva, N.; Masin, M.; Palumbo, F.; Fragoulis, N.; Theodorakopoulos, I. | - | Institute of Electrical and Electronics Engineers Inc. |
Infinity-norm support vector machines against adversarial label contamination | 1-gen-2017 | Demontis, Ambra; Biggio, Battista; Fumera, Giorgio; Giacinto, Giorgio; Roli, Fabio | - | CEUR-WS |
Detection of malicious scripting code through discriminant and adversary-aware API analysis | 1-gen-2017 | Maiorca, Davide; Russu, Paolo; Corona, Igino; Biggio, Battista; Giacinto, Giorgio | - | CEUR-WS |
Statistical meta-analysis of presentation attacks for secure multibiometric systems | 1-gen-2017 | Biggio, Battista; Fumera, Giorgio; Marcialis, GIAN LUCA; Roli, Fabio | IEEE TRANSACTIONS ON PATTERN ANALYSIS AND MACHINE INTELLIGENCE | - |
Chairs' introduction and welcome to AISec 2017 | 1-gen-2017 | Biggio, B.; Freeman, D. M.; Miller, B.; Sinha, A. | - | - |
Randomized Prediction Games for Adversarial Machine Learning | 1-gen-2017 | Rota Bulò, S; Biggio, Battista; Pillai, Ignazio; Pelillo, M; Roli, Fabio | IEEE TRANSACTIONS ON NEURAL NETWORKS AND LEARNING SYSTEMS | - |
Deepsquatting: Learning-based typosquatting detection at deeper domain levels | 1-gen-2017 | Piredda, Paolo; Ariu, Davide; Biggio, Battista; Corona, Igino; Piras, Luca; Giacinto, Giorgio; Roli, Fabio | - | Springer |
Towards poisoning of deep learning algorithms with back-gradient optimization | 1-gen-2017 | Muñoz-González, Luis; Biggio, Battista; Demontis, Ambra; Paudice, Andrea; Wongrassamee, Vasin; Lupu, Emil C.; Roli, Fabio | - | Association for Computing Machinery |
DeltaPhish: Detecting phishing webpages in compromised websites | 1-gen-2017 | Corona, Igino; Biggio, Battista; Contini, Matteo; Piras, Luca; Corda, Roberto; Mereu, Mauro; Mureddu, Guido; Ariu, Davide; Roli, Fabio | - | Springer |
Detecting Misuse of Google Cloud Messaging in Android Badware | 1-gen-2016 | Ahmadi, Mansour; Biggio, Battista; Arzt, S; Ariu, Davide; Giacinto, Giorgio | - | ACM (Association for Computing Machinery) |
Secure Kernel Machines against Evasion Attacks | 1-gen-2016 | Russu, Paolo; Demontis, Ambra; Biggio, Battista; Fumera, Giorgio; Roli, Fabio | - | Association for Computing Machinery |
Super-Sparse Learning in Similarity Spaces | 1-gen-2016 | Demontis, Ambra; Melis, Marco; Biggio, Battista; Fumera, Giorgio; Roli, Fabio | IEEE COMPUTATIONAL INTELLIGENCE MAGAZINE | - |
On security and sparsity of linear classifiers for adversarial settings | 1-gen-2016 | Demontis, Ambra; Russu, Paolo; Biggio, Battista; Fumera, Giorgio; Roli, Fabio | - | Springer |
Who are you? A statistical approach to measuring user authenticity | 1-gen-2016 | Jain, S; Mandell Freeman, M; Biggio, Battista; Duermuth, M; Giacinto, Giorgio | - | The Internet Society |
Adversarial Feature Selection Against Evasion Attacks | 1-gen-2016 | Zhang, F; Chan, Ppk; Biggio, Battista; Yeung, Ds; Roli, Fabio | IEEE TRANSACTIONS ON CYBERNETICS | - |
Preface | 1-gen-2016 | Robles-Kelly, A.; Loog, M.; Biggio, B.; Escolano, F.; Wilson, R. | - | - |
Anti-spoofing: Multimodal | 1-gen-2015 | Marcialis, GIAN LUCA; Biggio, Battista; Fumera, Giorgio | - | Springer US |
One-and-a-half-class multiple classifier systems for secure learning against evasion attacks at test time | 1-gen-2015 | Biggio, Battista; Corona, Igino; He, Z. M.; Chan P., P; Giacinto, Giorgio; Yeung D., S; Roli, Fabio | - | Springer Verlag |
Fast image classification with reduced multiclass support vector machines | 1-gen-2015 | Melis, Marco; Piras, Luca; Biggio, Battista; Giacinto, Giorgio; Fumera, Giorgio; Roli, Fabio | - | Springer |
Sparse support faces | 1-gen-2015 | Biggio, Battista; Melis, Marco; Fumera, Giorgio; Roli, Fabio | - | Institute of Electrical and Electronics Engineers Inc. |
Super-Sparse regression for fast age estimation from faces at test time | 1-gen-2015 | Demontis, Ambra; Biggio, Battista; Fumera, Giorgio; Roli, Fabio | LECTURE NOTES IN COMPUTER SCIENCE | Springer Verlag |
Is feature selection secure against training data poisoning? | 1-gen-2015 | Xiao, Huang; Biggio, Battista; Brown, Gavin; Fumera, Giorgio; Eckert, Claudia; Roli, Fabio | - | International Machine Learning Society (IMLS) |
Data-driven Journal Meta-ranking in Business and Management | 1-gen-2015 | Ennas, Gianfranco; Biggio, Battista; DI GUARDO, MARIA CHIARA | SCIENTOMETRICS | - |
Adversarial biometric recognition: a review on biometric system security from the adversarial machine-learning perspective | 1-gen-2015 | Biggio, Battista; Fumera, Giorgio; Russu, Paolo; Didaci, Luca; Roli, Fabio | IEEE SIGNAL PROCESSING MAGAZINE | - |
Support vector machines under adversarial label contamination | 1-gen-2015 | Xiao, H; Biggio, Battista; Nelson, B; Xiao, H; Eckert, C; Roli, Fabio | NEUROCOMPUTING | - |
Multimodal Anti-spoofing in Biometric Recognition Systems | 1-gen-2014 | Fumera, Giorgio; Marcialis, GIAN LUCA; Biggio, Battista; Roli, Fabio; Schuckers, S. | - | Springer-Verlag London Ltd |
Pattern recognition systems under attack: design issues and research challenges | 1-gen-2014 | Biggio, Battista; Fumera, Giorgio; Roli, Fabio | INTERNATIONAL JOURNAL OF PATTERN RECOGNITION AND ARTIFICIAL INTELLIGENCE | - |
Security Evaluation of Support Vector Machines in Adversarial Environments | 1-gen-2014 | Biggio, Battista; Corona, Igino; Nelson, BLAINE ALAN; Rubinstein, Bip; Maiorca, Davide; Fumera, Giorgio; Giacinto, Giorgio; Roli, Fabio | - | Springer International Publishing |
On Learning and Recognition of Secure Patterns | 1-gen-2014 | Biggio, Battista | - | ACM |
Poisoning complete-linkage hierarchical clustering | 1-gen-2014 | Biggio, Battista; Rota Bulò, S; Pillai, I; Mura, M; Mequanint E., Z; Pelillo, M; Roli, Fabio | LECTURE NOTES IN COMPUTER SCIENCE | © Springer-Verlag Berlin Heidelberg |
Poisoning behavioral malware clustering | 1-gen-2014 | Biggio, Battista; Rieck, K; Ariu, Davide; Wressnegger, C; Corona, Igino; Giacinto, Giorgio; Roli, Fabio | - | ACM |
Security evaluation of pattern classifiers under attack | 1-gen-2014 | Biggio, Battista; Fumera, Giorgio; Roli, Fabio | IEEE TRANSACTIONS ON KNOWLEDGE AND DATA ENGINEERING | - |
Legenda icone
- file ad accesso aperto
- file disponibili sulla rete interna
- file disponibili agli utenti autorizzati
- file disponibili solo agli amministratori
- file sotto embargo
- nessun file disponibile