Battista Biggio
AttackBench: Evaluating Gradient-based Attacks for Adversarial Examples
2025-01-01 Cinà, Antonio Emanuele; Rony, Jérôme; Pintor, Maura; Demetrio, Luca; Demontis, Ambra; Biggio, Battista; Ayed, Ismail Ben; Roli, Fabio
Understanding Regression in Continual Learning for Malware Detection
2025-01-01 Ghiani, Daniele; Angioni, Daniele; Sotgiu, Angelo; Pintor, Maura; Biggio, Battista
An Experimental Analysis of Semi-supervised Learning for Malware Detection
2025-01-01 Minnei, Luca; Piras, Giorgio; Sotgiu, Angelo; Pintor, Maura; Demontis, Ambra; Maiorca, Davide; Biggio, Battista
Adversarial pruning: A survey and benchmark of pruning methods for adversarial robustness
2025-01-01 Piras, Giorgio; Pintor, Maura; Demontis, Ambra; Biggio, Battista; Giacinto, Giorgio; Roli, Fabio
ModSec-Learn: Boosting ModSecurity with Machine Learning
2025-01-01 Scano, Christian; Floris, Giuseppe; Montaruli, Biagio; Demetrio, Luca; Valenza, Andrea; Compagna, Luca; Ariu, Davide; Piras, Luca; Balzarotti, Davide; Biggio, Battista
SLIFER: Investigating performance and robustness of malware detection pipelines
2025-01-01 Ponte, Andrea; Trizna, Dmitrijs; Demetrio, Luca; Biggio, Battista; Ogbu, Ivan Tesfai; Roli, Fabio
Robustness-Congruent Adversarial Training for Secure Machine Learning Model Updates
2025-01-01 Angioni, Daniele; Demetrio, Luca; Pintor, Maura; Oneto, Luca; Anguita, Davide; Biggio, Battista; Roli, Fabio
HO-FMN: Hyperparameter optimization for fast minimum-norm attacks
2025-01-01 Mura, Raffaele; Floris, Giuseppe; Scionis, Luca; Piras, Giorgio; Pintor, Maura; Demontis, Ambra; Giacinto, Giorgio; Biggio, Battista; Roli, Fabio
Energy-latency attacks via sponge poisoning
2025-01-01 Cinà, Antonio Emanuele; Demontis, Ambra; Biggio, Battista; Roli, Fabio; Pelillo, Marcello
Toward Effective Traffic Sign Detection via Two-Stage Fusion Neural Networks
2024-01-01 Li, Zhishan; Chen, Hongxu; Biggio, Battista; He, Yifan; Cai, Haoran; Roli, Fabio; Xie, Lei
When your AI becomes a target: AI security incidents and best practices
2024-01-01 Grosse, Kathrin; Bieringer, Lukas; Besold, Tarek R.; Biggio, Battista; Alahi, Alexandre
Nebula: Self-Attention for Dynamic Malware Analysis
2024-01-01 Trizna, Dmitrijs; Demetrio, Luca; Biggio, Battista; Roli, Fabio
Machine learning in computer security is difficult to fix
2024-01-01 Biggio, Battista
Machine Learning Security Against Data Poisoning: Are We There Yet?
2024-01-01 Cinà, Antonio Emanuele; Grosse, Kathrin; Demontis, Ambra; Biggio, Battista; Roli, Fabio; Pelillo, Marcello
Rethinking data augmentation for adversarial robustness
2024-01-01 Eghbal-zadeh, Hamid; Zellinger, Werner; Pintor, Maura; Grosse, Kathrin; Koutini, Khaled; Moser, Bernhard A.; Biggio, Battista; Widmer, Gerhard
Backdoor Learning Curves: Explaining Backdoor Poisoning Beyond Influence Functions
2024-01-01 Cinà, A. E.; Grosse, K.; Vascon, S.; Demontis, A.; Biggio, B.; Roli, F.; Pelillo, M.
AI Security and Safety: The PRALab Research Experience
2023-01-01 Demontis, Ambra; Pintor, Maura; Demetrio, Luca; Sotgiu, Angelo; Angioni, Daniele; Piras, Giorgio; Gupta, Srishti; Biggio, Battista; Roli, Fabio
Improving Fast Minimum-Norm Attacks with Hyperparameter Optimization
2023-01-01 Floris, Giuseppe; Mura, Raffaele; Scionis, Luca; Piras, Giorgio; Pintor, Maura; Demontis, Ambra; Biggio, Battista
Samples on Thin Ice: Re-evaluating Adversarial Pruning of Neural Networks
2023-01-01 Piras, Giorgio; Pintor, Maura; Demontis, Ambra; Biggio, Battista
Minimizing Energy Consumption of Deep Learning Models by Energy-Aware Training
2023-01-01 Lazzaro, Dario; Cinà, Antonio Emanuele; Pintor, Maura; Demontis, Ambra; Biggio, Battista; Roli, Fabio; Pelillo, Marcello
Cybersecurity and AI: The PRALab Research Experience
2023-01-01 Pintor, Maura; Orru, Giulia; Maiorca, Davide; Demontis, Ambra; Demetrio, Luca; Marcialis, GIAN LUCA; Biggio, Battista; Roli, Fabio
The Threat of Offensive AI to Organizations
2023-01-01 Mirsky, Y.; Demontis, A.; Kotak, J.; Shankar, R.; Gelei, D.; Yang, L.; Zhang, X.; Pintor, M.; Lee, W.; Elovici, Y.; Biggio, B.
Raze to the ground: query-efficient adversarial HTML attacks on machine-learning phishing webpage detectors
2023-01-01 Montaruli, Biagio; Demetrio, Luca; Pintor, Maura; Compagna, Luca; Balzarotti, Davide; Biggio, Battista
Hardening RGB-D object recognition systems against adversarial patch attacks
2023-01-01 Zheng, Yang; Demetrio, Luca; Cinà, Antonio Emanuele; Feng, Xiaoyi; Xia, Zhaoqiang; Jiang, Xiaoyue; Demontis, Ambra; Biggio, Battista; Roli, Fabio
Stateful detection of adversarial reprogramming
2023-01-01 Zheng, Yang; Feng, Xiaoyi; Xia, Zhaoqiang; Jiang, Xiaoyue; Pintor, Maura; Demontis, Ambra; Biggio, Battista; Roli, Fabio
Why adversarial reprogramming works, when it fails, and how to tell the difference
2023-01-01 Zheng, Yang; Feng, Xiaoyi; Xia, Zhaoqiang; Jiang, Xiaoyue; Demontis, Ambra; Pintor, Maura; Biggio, Battista; Roli, Fabio
Phantom Sponges: Exploiting Non-Maximum Suppression to Attack Deep Object Detectors
2023-01-01 Shapira, Avishag; Zolfi, Alon; Demetrio, Luca; Biggio, Battista; Shabtai, Asaf
Adversarial Attacks Against Uncertainty Quantification
2023-01-01 Ledda, Emanuele; Angioni, Daniele; Piras, Giorgio; Fumera, Giorgio; Biggio, Battista; Roli, Fabio
Machine Learning Security in Industry: A Quantitative Survey
2023-01-01 Grosse, Kathrin; Bieringer, Lukas; Besold, Tarek R.; Biggio, Battista; Krombholz, Katharina
Wild Patterns Reloaded: A Survey of Machine Learning Security against Training Data Poisoning
2023-01-01 Emanuele Cinà, Antonio; Grosse, Kathrin; Demontis, Ambra; Vascon, Sebastiano; Zellinger, Werner; Moser, Bernhard A.; Oprea, Alina; Biggio, Battista; Pelillo, Marcello; Roli, Fabio
Detecting Attacks Against Deep Reinforcement Learning for Autonomous Driving
2023-01-01 Pintor, Maura; Demetrio, Luca; Sotgiu, Angelo; Lin, HSIAO-YING; Fang, Chengfang; Demontis, Ambra; Biggio, Battista
ImageNet-Patch: a dataset for benchmarking machine learning robustness against adversarial patches
2023-01-01 Pintor, Maura; Angioni, Daniele; Sotgiu, Angelo; Demetrio, Luca; Demontis, Ambra; Biggio, Battista; Roli, Fabio
Explaining Machine Learning DGA Detectors from DNS Traffic Data
2022-01-01 Piras, Giorgio; Pintor, Maura; Demetrio, Luca; Biggio, Battista
Industrial practitioners' mental models of adversarial machine learning
2022-01-01 Bieringer, L.; Grosse, K.; Backes, M.; Biggio, B.; Krombholz, K.
Practical Evaluation of Poisoning Attacks on Online Anomaly Detectors in Industrial Control Systems
2022-01-01 Kravchik, M.; Demetrio, L.; Biggio, B.; Shabtai, A.
Practical Attacks on Machine Learning: A Case Study on Adversarial Windows Malware
2022-01-01 Demetrio, L; Biggio, B; Roli, F
secml: Secure and explainable machine learning in Python
2022-01-01 Pintor, Maura; Demetrio, Luca; Sotgiu, Angelo; Melis, Marco; Demontis, Ambra; Biggio, Battista
Robust Machine Learning for Malware Detection over Time
2022-01-01 Angioni, Daniele; Demetrio, Luca; Pintor, Maura; Biggio, Battista
Towards learning trustworthily, automatically, and with guarantees on graphs: an overview
2022-01-01 Oneto, Luca; Navarin, Nicoló; Biggio, Battista; Errica, Federico; Micheli, Alessio; Scarselli, Franco; Bianchini, Monica; Demetrio, Luca; Bongini, Pietro; Tacchella, Armando; Sperduti, Alessandro
Explainability-based Debugging of Machine Learning for Vulnerability Discovery
2022-01-01 Sotgiu, Angelo; Pintor, Maura; Biggio, Battista
Do gradient-based explanations tell anything about adversarial robustness to android malware?
2022-01-01 Melis, M.; Scalas, M.; Demontis, A.; Maiorca, D.; Biggio, B.; Giacinto, G.; Roli, F.
Indicators of Attack Failure: Debugging and Improving Optimization of Adversarial Examples
2022-01-01 Pintor, Maura; Demetrio, Luca; Sotgiu, Angelo; Demontis, Ambra; Carlini, Nicholas; Biggio, Battista; Roli, Fabio
Tessellation-Filtering ReLU Neural Networks
2022-01-01 Moser, Bernhard A.; Lewandowski, Michal; Kargaran, Somayeh; Zellinger, Werner; Biggio, Battista; Koutschan, Christoph
Domain Knowledge Alleviates Adversarial Attacks in Multi-Label Classifiers
2022-01-01 Melacci, S.; Ciravegna, G.; Sotgiu, A.; Demontis, A.; Biggio, B.; Gori, M.; Roli, F.
Backdoor smoothing: Demystifying backdoor attacks on deep neural networks
2022-01-01 Grosse, K; Lee, Ts; Biggio, B; Park, Y; Backes, M; Molloy, I
FADER: Fast Adversarial Example Rejection
2022-01-01 Crecchi, Francesco; Melis, Marco; Sotgiu, Angelo; Bacciu, Davide; Biggio, Battista
Complex Data: Learning Trustworthily, Automatically, and with Guarantees
2021-01-01 Oneto, L.; Navarin, N.; Biggio, B.; Errica, F.; Micheli, A.; Scarselli, F.; Bianchini, M.; Sperduti, A.
Poisoning attacks on cyber attack detectors for industrial control systems
2021-01-01 Kravchik, Moshe; Biggio, Battista; Shabtai, Asaf
Empirical assessment of generating adversarial configurations for software product lines
2021-01-01 Temple, P.; Perrouin, G.; Acher, M.; Biggio, B.; Jezequel, J. -M.; Roli, F.
Slope: A First-order Approach for Measuring Gradient Obfuscation
2021-01-01 Pintor, M.; Demetrio, L.; Manca, G.; Biggio, B.; Roli, F.
Titolo | Data di pubblicazione | Autore(i) | Rivista | Editore |
---|---|---|---|---|
AttackBench: Evaluating Gradient-based Attacks for Adversarial Examples | 1-gen-2025 | Cinà, Antonio Emanuele; Rony, Jérôme; Pintor, Maura; Demetrio, Luca; Demontis, Ambra; Biggio, Battista; Ayed, Ismail Ben; Roli, Fabio | - | - |
Understanding Regression in Continual Learning for Malware Detection | 1-gen-2025 | Ghiani, Daniele; Angioni, Daniele; Sotgiu, Angelo; Pintor, Maura; Biggio, Battista | - | CEUR |
An Experimental Analysis of Semi-supervised Learning for Malware Detection | 1-gen-2025 | Minnei, Luca; Piras, Giorgio; Sotgiu, Angelo; Pintor, Maura; Demontis, Ambra; Maiorca, Davide; Biggio, Battista | - | - |
Adversarial pruning: A survey and benchmark of pruning methods for adversarial robustness | 1-gen-2025 | Piras, Giorgio; Pintor, Maura; Demontis, Ambra; Biggio, Battista; Giacinto, Giorgio; Roli, Fabio | PATTERN RECOGNITION | - |
ModSec-Learn: Boosting ModSecurity with Machine Learning | 1-gen-2025 | Scano, Christian; Floris, Giuseppe; Montaruli, Biagio; Demetrio, Luca; Valenza, Andrea; Compagna, Luca; Ariu, Davide; Piras, Luca; Balzarotti, Davide; Biggio, Battista | - | Springer, Cham |
SLIFER: Investigating performance and robustness of malware detection pipelines | 1-gen-2025 | Ponte, Andrea; Trizna, Dmitrijs; Demetrio, Luca; Biggio, Battista; Ogbu, Ivan Tesfai; Roli, Fabio | COMPUTERS & SECURITY | - |
Robustness-Congruent Adversarial Training for Secure Machine Learning Model Updates | 1-gen-2025 | Angioni, Daniele; Demetrio, Luca; Pintor, Maura; Oneto, Luca; Anguita, Davide; Biggio, Battista; Roli, Fabio | IEEE TRANSACTIONS ON PATTERN ANALYSIS AND MACHINE INTELLIGENCE | - |
HO-FMN: Hyperparameter optimization for fast minimum-norm attacks | 1-gen-2025 | Mura, Raffaele; Floris, Giuseppe; Scionis, Luca; Piras, Giorgio; Pintor, Maura; Demontis, Ambra; Giacinto, Giorgio; Biggio, Battista; Roli, Fabio | NEUROCOMPUTING | - |
Energy-latency attacks via sponge poisoning | 1-gen-2025 | Cinà, Antonio Emanuele; Demontis, Ambra; Biggio, Battista; Roli, Fabio; Pelillo, Marcello | INFORMATION SCIENCES | - |
Toward Effective Traffic Sign Detection via Two-Stage Fusion Neural Networks | 1-gen-2024 | Li, Zhishan; Chen, Hongxu; Biggio, Battista; He, Yifan; Cai, Haoran; Roli, Fabio; Xie, Lei | IEEE TRANSACTIONS ON INTELLIGENT TRANSPORTATION SYSTEMS | - |
When your AI becomes a target: AI security incidents and best practices | 1-gen-2024 | Grosse, Kathrin; Bieringer, Lukas; Besold, Tarek R.; Biggio, Battista; Alahi, Alexandre | - | AAAI Press |
Nebula: Self-Attention for Dynamic Malware Analysis | 1-gen-2024 | Trizna, Dmitrijs; Demetrio, Luca; Biggio, Battista; Roli, Fabio | IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY | - |
Machine learning in computer security is difficult to fix | 1-gen-2024 | Biggio, Battista | COMMUNICATIONS OF THE ACM | - |
Machine Learning Security Against Data Poisoning: Are We There Yet? | 1-gen-2024 | Cinà, Antonio Emanuele; Grosse, Kathrin; Demontis, Ambra; Biggio, Battista; Roli, Fabio; Pelillo, Marcello | COMPUTER | - |
Rethinking data augmentation for adversarial robustness | 1-gen-2024 | Eghbal-zadeh, Hamid; Zellinger, Werner; Pintor, Maura; Grosse, Kathrin; Koutini, Khaled; Moser, Bernhard A.; Biggio, Battista; Widmer, Gerhard | INFORMATION SCIENCES | - |
Backdoor Learning Curves: Explaining Backdoor Poisoning Beyond Influence Functions | 1-gen-2024 | Cinà, A. E.; Grosse, K.; Vascon, S.; Demontis, A.; Biggio, B.; Roli, F.; Pelillo, M. | INTERNATIONAL JOURNAL OF MACHINE LEARNING AND CYBERNETICS | - |
AI Security and Safety: The PRALab Research Experience | 1-gen-2023 | Demontis, Ambra; Pintor, Maura; Demetrio, Luca; Sotgiu, Angelo; Angioni, Daniele; Piras, Giorgio; Gupta, Srishti; Biggio, Battista; Roli, Fabio | - | CEUR-WS Team, Redaktion Sun SITE |
Improving Fast Minimum-Norm Attacks with Hyperparameter Optimization | 1-gen-2023 | Floris, Giuseppe; Mura, Raffaele; Scionis, Luca; Piras, Giorgio; Pintor, Maura; Demontis, Ambra; Biggio, Battista | - | Ciaco - i6doc.com |
Samples on Thin Ice: Re-evaluating Adversarial Pruning of Neural Networks | 1-gen-2023 | Piras, Giorgio; Pintor, Maura; Demontis, Ambra; Biggio, Battista | - | - |
Minimizing Energy Consumption of Deep Learning Models by Energy-Aware Training | 1-gen-2023 | Lazzaro, Dario; Cinà, Antonio Emanuele; Pintor, Maura; Demontis, Ambra; Biggio, Battista; Roli, Fabio; Pelillo, Marcello | - | - |
Cybersecurity and AI: The PRALab Research Experience | 1-gen-2023 | Pintor, Maura; Orru, Giulia; Maiorca, Davide; Demontis, Ambra; Demetrio, Luca; Marcialis, GIAN LUCA; Biggio, Battista; Roli, Fabio | - | CEUR-WS Team, Redaktion Sun SITE |
The Threat of Offensive AI to Organizations | 1-gen-2023 | Mirsky, Y.; Demontis, A.; Kotak, J.; Shankar, R.; Gelei, D.; Yang, L.; Zhang, X.; Pintor, M.; Lee, W.; Elovici, Y.; Biggio, B. | COMPUTERS & SECURITY | - |
Raze to the ground: query-efficient adversarial HTML attacks on machine-learning phishing webpage detectors | 1-gen-2023 | Montaruli, Biagio; Demetrio, Luca; Pintor, Maura; Compagna, Luca; Balzarotti, Davide; Biggio, Battista | - | Association for Computing Machinery |
Hardening RGB-D object recognition systems against adversarial patch attacks | 1-gen-2023 | Zheng, Yang; Demetrio, Luca; Cinà, Antonio Emanuele; Feng, Xiaoyi; Xia, Zhaoqiang; Jiang, Xiaoyue; Demontis, Ambra; Biggio, Battista; Roli, Fabio | INFORMATION SCIENCES | - |
Stateful detection of adversarial reprogramming | 1-gen-2023 | Zheng, Yang; Feng, Xiaoyi; Xia, Zhaoqiang; Jiang, Xiaoyue; Pintor, Maura; Demontis, Ambra; Biggio, Battista; Roli, Fabio | INFORMATION SCIENCES | - |
Why adversarial reprogramming works, when it fails, and how to tell the difference | 1-gen-2023 | Zheng, Yang; Feng, Xiaoyi; Xia, Zhaoqiang; Jiang, Xiaoyue; Demontis, Ambra; Pintor, Maura; Biggio, Battista; Roli, Fabio | INFORMATION SCIENCES | - |
Phantom Sponges: Exploiting Non-Maximum Suppression to Attack Deep Object Detectors | 1-gen-2023 | Shapira, Avishag; Zolfi, Alon; Demetrio, Luca; Biggio, Battista; Shabtai, Asaf | - | IEEE |
Adversarial Attacks Against Uncertainty Quantification | 1-gen-2023 | Ledda, Emanuele; Angioni, Daniele; Piras, Giorgio; Fumera, Giorgio; Biggio, Battista; Roli, Fabio | - | IEEE COMPUTER SOC |
Machine Learning Security in Industry: A Quantitative Survey | 1-gen-2023 | Grosse, Kathrin; Bieringer, Lukas; Besold, Tarek R.; Biggio, Battista; Krombholz, Katharina | IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY | - |
Wild Patterns Reloaded: A Survey of Machine Learning Security against Training Data Poisoning | 1-gen-2023 | Emanuele Cinà, Antonio; Grosse, Kathrin; Demontis, Ambra; Vascon, Sebastiano; Zellinger, Werner; Moser, Bernhard A.; Oprea, Alina; Biggio, Battista; Pelillo, Marcello; Roli, Fabio | ACM COMPUTING SURVEYS | - |
Detecting Attacks Against Deep Reinforcement Learning for Autonomous Driving | 1-gen-2023 | Pintor, Maura; Demetrio, Luca; Sotgiu, Angelo; Lin, HSIAO-YING; Fang, Chengfang; Demontis, Ambra; Biggio, Battista | - | - |
ImageNet-Patch: a dataset for benchmarking machine learning robustness against adversarial patches | 1-gen-2023 | Pintor, Maura; Angioni, Daniele; Sotgiu, Angelo; Demetrio, Luca; Demontis, Ambra; Biggio, Battista; Roli, Fabio | PATTERN RECOGNITION | - |
Explaining Machine Learning DGA Detectors from DNS Traffic Data | 1-gen-2022 | Piras, Giorgio; Pintor, Maura; Demetrio, Luca; Biggio, Battista | - | - |
Industrial practitioners' mental models of adversarial machine learning | 1-gen-2022 | Bieringer, L.; Grosse, K.; Backes, M.; Biggio, B.; Krombholz, K. | - | USENIX Association |
Practical Evaluation of Poisoning Attacks on Online Anomaly Detectors in Industrial Control Systems | 1-gen-2022 | Kravchik, M.; Demetrio, L.; Biggio, B.; Shabtai, A. | COMPUTERS & SECURITY | - |
Practical Attacks on Machine Learning: A Case Study on Adversarial Windows Malware | 1-gen-2022 | Demetrio, L; Biggio, B; Roli, F | IEEE SECURITY & PRIVACY | - |
secml: Secure and explainable machine learning in Python | 1-gen-2022 | Pintor, Maura; Demetrio, Luca; Sotgiu, Angelo; Melis, Marco; Demontis, Ambra; Biggio, Battista | SOFTWAREX | - |
Robust Machine Learning for Malware Detection over Time | 1-gen-2022 | Angioni, Daniele; Demetrio, Luca; Pintor, Maura; Biggio, Battista | - | - |
Towards learning trustworthily, automatically, and with guarantees on graphs: an overview | 1-gen-2022 | Oneto, Luca; Navarin, Nicoló; Biggio, Battista; Errica, Federico; Micheli, Alessio; Scarselli, Franco; Bianchini, Monica; Demetrio, Luca; Bongini, Pietro; Tacchella, Armando; Sperduti, Alessandro | NEUROCOMPUTING | - |
Explainability-based Debugging of Machine Learning for Vulnerability Discovery | 1-gen-2022 | Sotgiu, Angelo; Pintor, Maura; Biggio, Battista | - | ACM, Association for Computing Machinery |
Do gradient-based explanations tell anything about adversarial robustness to android malware? | 1-gen-2022 | Melis, M.; Scalas, M.; Demontis, A.; Maiorca, D.; Biggio, B.; Giacinto, G.; Roli, F. | INTERNATIONAL JOURNAL OF MACHINE LEARNING AND CYBERNETICS | - |
Indicators of Attack Failure: Debugging and Improving Optimization of Adversarial Examples | 1-gen-2022 | Pintor, Maura; Demetrio, Luca; Sotgiu, Angelo; Demontis, Ambra; Carlini, Nicholas; Biggio, Battista; Roli, Fabio | - | Neural information processing systems foundation |
Tessellation-Filtering ReLU Neural Networks | 1-gen-2022 | Moser, Bernhard A.; Lewandowski, Michal; Kargaran, Somayeh; Zellinger, Werner; Biggio, Battista; Koutschan, Christoph | - | - |
Domain Knowledge Alleviates Adversarial Attacks in Multi-Label Classifiers | 1-gen-2022 | Melacci, S.; Ciravegna, G.; Sotgiu, A.; Demontis, A.; Biggio, B.; Gori, M.; Roli, F. | IEEE TRANSACTIONS ON PATTERN ANALYSIS AND MACHINE INTELLIGENCE | - |
Backdoor smoothing: Demystifying backdoor attacks on deep neural networks | 1-gen-2022 | Grosse, K; Lee, Ts; Biggio, B; Park, Y; Backes, M; Molloy, I | COMPUTERS & SECURITY | - |
FADER: Fast Adversarial Example Rejection | 1-gen-2022 | Crecchi, Francesco; Melis, Marco; Sotgiu, Angelo; Bacciu, Davide; Biggio, Battista | NEUROCOMPUTING | - |
Complex Data: Learning Trustworthily, Automatically, and with Guarantees | 1-gen-2021 | Oneto, L.; Navarin, N.; Biggio, B.; Errica, F.; Micheli, A.; Scarselli, F.; Bianchini, M.; Sperduti, A. | - | - |
Poisoning attacks on cyber attack detectors for industrial control systems | 1-gen-2021 | Kravchik, Moshe; Biggio, Battista; Shabtai, Asaf | - | - |
Empirical assessment of generating adversarial configurations for software product lines | 1-gen-2021 | Temple, P.; Perrouin, G.; Acher, M.; Biggio, B.; Jezequel, J. -M.; Roli, F. | EMPIRICAL SOFTWARE ENGINEERING | - |
Slope: A First-order Approach for Measuring Gradient Obfuscation | 1-gen-2021 | Pintor, M.; Demetrio, L.; Manca, G.; Biggio, B.; Roli, F. | - | - |
Legenda icone
- file ad accesso aperto
- file disponibili sulla rete interna
- file disponibili agli utenti autorizzati
- file disponibili solo agli amministratori
- file sotto embargo
- nessun file disponibile