Battista Biggio

Mostrati risultati da 1 a 50 di 132
Titolo Data di pubblicazione Autore(i) Rivista Editore
Toward Effective Traffic Sign Detection via Two-Stage Fusion Neural Networks 1-gen-2024 Li, Zhishan; Chen, Hongxu; Biggio, Battista; He, Yifan; Cai, Haoran; Roli, Fabio; Xie, Lei IEEE TRANSACTIONS ON INTELLIGENT TRANSPORTATION SYSTEMS -
When Your AI Becomes a Target: AI Security Incidents and Best Practices 1-gen-2024 Grosse, Kathrin; Bieringer, Lukas; Besold, Tarek R.; Biggio, Battista; Alahi, Alexandre - -
Rethinking data augmentation for adversarial robustness 1-gen-2024 Eghbal-zadeh, Hamid; Zellinger, Werner; Pintor, Maura; Grosse, Kathrin; Koutini, Khaled; Moser, Bernhard A.; Biggio, Battista; Widmer, Gerhard INFORMATION SCIENCES -
Machine Learning Security Against Data Poisoning: Are We There Yet? 1-gen-2024 Cinà, Antonio Emanuele; Grosse, Kathrin; Demontis, Ambra; Biggio, Battista; Roli, Fabio; Pelillo, Marcello COMPUTER -
Raze to the Ground: Query-Efficient Adversarial HTML Attacks on Machine-Learning Phishing Webpage Detectors 1-gen-2023 Montaruli, Biagio; Demetrio, Luca; Pintor, Maura; Compagna, Luca; Balzarotti, Davide; Biggio, Battista - ASSOC COMPUTING MACHINERY
Detecting Attacks Against Deep Reinforcement Learning for Autonomous Driving 1-gen-2023 Pintor, Maura; Demetrio, Luca; Sotgiu, Angelo; Lin, HSIAO-YING; Fang, Chengfang; Demontis, Ambra; Biggio, Battista - -
Hardening RGB-D object recognition systems against adversarial patch attacks 1-gen-2023 Zheng, Yang; Demetrio, Luca; Cinà, Antonio Emanuele; Feng, Xiaoyi; Xia, Zhaoqiang; Jiang, Xiaoyue; Demontis, Ambra; Biggio, Battista; Roli, Fabio INFORMATION SCIENCES -
Minimizing Energy Consumption of Deep Learning Models by Energy-Aware Training 1-gen-2023 Lazzaro, Dario; Cinà, Antonio Emanuele; Pintor, Maura; Demontis, Ambra; Biggio, Battista; Roli, Fabio; Pelillo, Marcello - -
ImageNet-Patch: A Dataset for Benchmarking Machine Learning Robustness against Adversarial Patches 1-gen-2023 Pintor, Maura; Angioni, Daniele; Sotgiu, Angelo; Demetrio, Luca; Demontis, Ambra; Biggio, Battista; Roli, Fabio PATTERN RECOGNITION -
Wild Patterns Reloaded: A Survey of Machine Learning Security against Training Data Poisoning 1-gen-2023 Emanuele Cinà, Antonio; Grosse, Kathrin; Demontis, Ambra; Vascon, Sebastiano; Zellinger, Werner; Moser, Bernhard A.; Oprea, Alina; Biggio, Battista; Pelillo, Marcello; Roli, Fabio ACM COMPUTING SURVEYS -
Machine Learning Security in Industry: A Quantitative Survey 1-gen-2023 Grosse, Kathrin; Bieringer, Lukas; Besold, Tarek R.; Biggio, Battista; Krombholz, Katharina IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY -
Phantom Sponges: Exploiting Non-Maximum Suppression to Attack Deep Object Detectors 1-gen-2023 Shapira, Avishag; Zolfi, Alon; Demetrio, Luca; Biggio, Battista; Shabtai, Asaf - IEEE
Improving Fast Minimum-Norm Attacks with Hyperparameter Optimization 1-gen-2023 Floris, Giuseppe; Mura, Raffaele; Scionis, Luca; Piras, Giorgio; Pintor, Maura; Demontis, Ambra; Biggio, Battista - Ciaco - i6doc.com
Cybersecurity and AI: The PRALab Research Experience 1-gen-2023 Pintor, Maura; Orru, Giulia; Maiorca, Davide; Demontis, Ambra; Demetrio, Luca; Marcialis, GIAN LUCA; Biggio, Battista; Roli, Fabio - CEUR-WS Team, Redaktion Sun SITE
Why adversarial reprogramming works, when it fails, and how to tell the difference 1-gen-2023 Zheng, Yang; Feng, Xiaoyi; Xia, Zhaoqiang; Jiang, Xiaoyue; Demontis, Ambra; Pintor, Maura; Biggio, Battista; Roli, Fabio INFORMATION SCIENCES -
Stateful detection of adversarial reprogramming 1-gen-2023 Zheng, Yang; Feng, Xiaoyi; Xia, Zhaoqiang; Jiang, Xiaoyue; Pintor, Maura; Demontis, Ambra; Biggio, Battista; Roli, Fabio INFORMATION SCIENCES -
The Threat of Offensive AI to Organizations 1-gen-2023 Mirsky, Y.; Demontis, A.; Kotak, J.; Shankar, R.; Gelei, D.; Yang, L.; Zhang, X.; Pintor, M.; Lee, W.; Elovici, Y.; Biggio, B. COMPUTERS & SECURITY -
Adversarial Attacks Against Uncertainty Quantification 1-gen-2023 Ledda, Emanuele; Angioni, Daniele; Piras, Giorgio; Fumera, Giorgio; Biggio, Battista; Roli, Fabio - IEEE COMPUTER SOC
AI Security and Safety: The PRALab Research Experience 1-gen-2023 Demontis, Ambra; Pintor, Maura; Demetrio, Luca; Sotgiu, Angelo; Angioni, Daniele; Piras, Giorgio; Gupta, Srishti; Biggio, Battista; Roli, Fabio - CEUR-WS Team, Redaktion Sun SITE
Samples on Thin Ice: Re-evaluating Adversarial Pruning of Neural Networks 1-gen-2023 Piras, Giorgio; Pintor, Maura; Demontis, Ambra; Biggio, Battista - -
Explainability-based Debugging of Machine Learning for Vulnerability Discovery 1-gen-2022 Sotgiu, Angelo; Pintor, Maura; Biggio, Battista - ACM, Association for Computing Machinery
Backdoor smoothing: Demystifying backdoor attacks on deep neural networks 1-gen-2022 Grosse, K; Lee, Ts; Biggio, B; Park, Y; Backes, M; Molloy, I COMPUTERS & SECURITY -
secml: Secure and explainable machine learning in Python 1-gen-2022 Pintor, Maura; Demetrio, Luca; Sotgiu, Angelo; Melis, Marco; Demontis, Ambra; Biggio, Battista SOFTWAREX -
Tessellation-Filtering ReLU Neural Networks 1-gen-2022 Moser, Bernhard A.; Lewandowski, Michal; Kargaran, Somayeh; Zellinger, Werner; Biggio, Battista; Koutschan, Christoph - -
Do gradient-based explanations tell anything about adversarial robustness to android malware? 1-gen-2022 Melis, M.; Scalas, M.; Demontis, A.; Maiorca, D.; Biggio, B.; Giacinto, G.; Roli, F. INTERNATIONAL JOURNAL OF MACHINE LEARNING AND CYBERNETICS -
Industrial practitioners' mental models of adversarial machine learning 1-gen-2022 Bieringer, L.; Grosse, K.; Backes, M.; Biggio, B.; Krombholz, K. - USENIX Association
Towards learning trustworthily, automatically, and with guarantees on graphs: an overview 1-gen-2022 Oneto, Luca; Navarin, Nicoló; Biggio, Battista; Errica, Federico; Micheli, Alessio; Scarselli, Franco; Bianchini, Monica; Demetrio, Luca; Bongini, Pietro; Tacchella, Armando; Sperduti, Alessandro NEUROCOMPUTING -
Robust Machine Learning for Malware Detection over Time 1-gen-2022 Angioni, Daniele; Demetrio, Luca; Pintor, Maura; Biggio, Battista - -
Domain Knowledge Alleviates Adversarial Attacks in Multi-Label Classifiers 1-gen-2022 Melacci, S.; Ciravegna, G.; Sotgiu, A.; Demontis, A.; Biggio, B.; Gori, M.; Roli, F. IEEE TRANSACTIONS ON PATTERN ANALYSIS AND MACHINE INTELLIGENCE -
FADER: Fast Adversarial Example Rejection 1-gen-2022 Crecchi, Francesco; Melis, Marco; Sotgiu, Angelo; Bacciu, Davide; Biggio, Battista NEUROCOMPUTING -
Practical Attacks on Machine Learning: A Case Study on Adversarial Windows Malware 1-gen-2022 Demetrio, L; Biggio, B; Roli, F IEEE SECURITY & PRIVACY -
Indicators of Attack Failure: Debugging and Improving Optimization of Adversarial Examples 1-gen-2022 Pintor, Maura; Demetrio, Luca; Sotgiu, Angelo; Demontis, Ambra; Carlini, Nicholas; Biggio, Battista; Roli, Fabio - Neural information processing systems foundation
Practical Evaluation of Poisoning Attacks on Online Anomaly Detectors in Industrial Control Systems 1-gen-2022 Kravchik, M.; Demetrio, L.; Biggio, B.; Shabtai, A. COMPUTERS & SECURITY -
Explaining Machine Learning DGA Detectors from DNS Traffic Data 1-gen-2022 Piras, Giorgio; Pintor, Maura; Demetrio, Luca; Biggio, Battista - -
Functionality-Preserving Black-Box Optimization of Adversarial Windows Malware 1-gen-2021 Demetrio, Luca; Biggio, Battista; Lagorio, Giovanni; Roli, Fabio; Armando, Alessandro IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY -
Empirical assessment of generating adversarial configurations for software product lines 1-gen-2021 Temple, P.; Perrouin, G.; Acher, M.; Biggio, B.; Jezequel, J. -M.; Roli, F. EMPIRICAL SOFTWARE ENGINEERING -
Poisoning Attacks on Algorithmic Fairness 1-gen-2021 Solans, D.; Biggio, B.; Castillo, C. - Springer Science and Business Media Deutschland GmbH
Fast minimum-norm adversarial attacks through adaptive norm constraints 1-gen-2021 Pintor, Maura; Roli, Fabio; Brendel, Wieland; Biggio, Battista - -
Poisoning attacks on cyber attack detectors for industrial control systems 1-gen-2021 Kravchik, Moshe; Biggio, Battista; Shabtai, Asaf - -
Slope: A First-order Approach for Measuring Gradient Obfuscation 1-gen-2021 Pintor, M.; Demetrio, L.; Manca, G.; Biggio, B.; Roli, F. - -
Complex Data: Learning Trustworthily, Automatically, and with Guarantees 1-gen-2021 Oneto, L.; Navarin, N.; Biggio, B.; Errica, F.; Micheli, A.; Scarselli, F.; Bianchini, M.; Sperduti, A. - -
Task-Specific Automation in Deep Learning Processes 1-gen-2021 Buchgeher, G.; Czech, G.; Ribeiro, A. S.; Kloihofer, W.; Meloni, P.; Busia, P.; Deriu, G.; Pintor, M.; Biggio, B.; Chesta, C.; Rinelli, L.; Solans, D.; Portela, M. - Springer Science and Business Media Deutschland GmbH
The hammer and the nut: is bilevel optimization really needed to poison linear classifiers? 1-gen-2021 Cina, A. E.; Vascon, S.; Demontis, A.; Biggio, B.; Roli, F.; Pelillo, M. - IEEE, Institute of Electrical and Electronics Engineers
Adversarial EXEmples: A Survey and Experimental Evaluation of Practical Attacks on Machine Learning for Windows Malware Detection 1-gen-2021 Demetrio, L.; Coull, S. E.; Biggio, B.; Lagorio, G.; Armando, A.; Roli, F. ACM TRANSACTIONS ON PRIVACY AND SECURITY -
Adversarial Machine Learning: Attacks From Laboratories to the Real World 1-gen-2021 Lin, Hsiao-Ying; Biggio, Battista COMPUTER -
Deep neural rejection against adversarial examples 1-gen-2020 Sotgiu, Angelo; Demontis, Ambra; Melis, Marco; Biggio, Battista; Fumera, Giorgio; Feng, Xiaoyi; Roli, Fabio EURASIP JOURNAL ON MULTIMEDIA AND INFORMATION SECURITY -
Adversarial Detection of Flash Malware: Limitations and Open Issues 1-gen-2020 Maiorca, D.; Demontis, A.; Biggio, B.; Roli, F.; Giacinto, G. COMPUTERS & SECURITY -
Chairs' introduction and welcome to AISEC 2019 1-gen-2019 Afroz, S.; Biggio, B.; Carlini, N.; Elovici, Y.; Shabtai, A. - -
Digital Investigation of PDF Files: Unveiling Traces of Embedded Malware 1-gen-2019 Maiorca, Davide; Biggio, Battista IEEE SECURITY & PRIVACY -
Yes, Machine Learning Can Be More Secure! A Case Study on Android Malware Detection 1-gen-2019 Demontis, Ambra; Melis, Marco; Biggio, Battista; Maiorca, Davide; Arp, Daniel; Rieck, Konrad; Corona, Igino; Giacinto, Giorgio; Roli, Fabio IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING -
Mostrati risultati da 1 a 50 di 132
Legenda icone

  •  file ad accesso aperto
  •  file disponibili sulla rete interna
  •  file disponibili agli utenti autorizzati
  •  file disponibili solo agli amministratori
  •  file sotto embargo
  •  nessun file disponibile

Questionario e social

Condividi su:
Impostazioni cookie