Fabio Roli
Machine Learning Security Against Data Poisoning: Are We There Yet?
2024-01-01 Cinà, Antonio Emanuele; Grosse, Kathrin; Demontis, Ambra; Biggio, Battista; Roli, Fabio; Pelillo, Marcello
Nebula: Self-Attention for Dynamic Malware Analysis
2024-01-01 Trizna, Dmitrijs; Demetrio, Luca; Biggio, Battista; Roli, Fabio
Texture and artifact decomposition for improving generalization in deep-learning-based deepfake detection
2024-01-01 Gao, Jie; Micheletto, Marco; Orru', Giulia; Concas, Sara; Feng, Xiaoyi; Marcialis, Gian Luca; Roli, Fabio
Generalized Deepfake Detection Algorithm Based on Inconsistency Between Inner and Outer Faces
2024-01-01 Gao, Jie; Concas, Sara; Orru', Giulia; Feng, Xiaoyi; Marcialis, Gian Luca; Roli, Fabio
Toward Effective Traffic Sign Detection via Two-Stage Fusion Neural Networks
2024-01-01 Li, Zhishan; Chen, Hongxu; Biggio, Battista; He, Yifan; Cai, Haoran; Roli, Fabio; Xie, Lei
Cybersecurity and AI: The PRALab Research Experience
2023-01-01 Pintor, Maura; Orru, Giulia; Maiorca, Davide; Demontis, Ambra; Demetrio, Luca; Marcialis, GIAN LUCA; Biggio, Battista; Roli, Fabio
Minimizing Energy Consumption of Deep Learning Models by Energy-Aware Training
2023-01-01 Lazzaro, Dario; Cinà, Antonio Emanuele; Pintor, Maura; Demontis, Ambra; Biggio, Battista; Roli, Fabio; Pelillo, Marcello
AI Security and Safety: The PRALab Research Experience
2023-01-01 Demontis, Ambra; Pintor, Maura; Demetrio, Luca; Sotgiu, Angelo; Angioni, Daniele; Piras, Giorgio; Gupta, Srishti; Biggio, Battista; Roli, Fabio
Hardening RGB-D object recognition systems against adversarial patch attacks
2023-01-01 Zheng, Yang; Demetrio, Luca; Cinà, Antonio Emanuele; Feng, Xiaoyi; Xia, Zhaoqiang; Jiang, Xiaoyue; Demontis, Ambra; Biggio, Battista; Roli, Fabio
3D Face Reconstruction: the Road to Forensics
2023-01-01 Cava, Simone Maurizio La; Orru', Giulia; Drahansky, Martin; Marcialis, Gian Luca; Roli, Fabio
Stateful detection of adversarial reprogramming
2023-01-01 Zheng, Yang; Feng, Xiaoyi; Xia, Zhaoqiang; Jiang, Xiaoyue; Pintor, Maura; Demontis, Ambra; Biggio, Battista; Roli, Fabio
Wild Patterns Reloaded: A Survey of Machine Learning Security against Training Data Poisoning
2023-01-01 Emanuele Cinà, Antonio; Grosse, Kathrin; Demontis, Ambra; Vascon, Sebastiano; Zellinger, Werner; Moser, Bernhard A.; Oprea, Alina; Biggio, Battista; Pelillo, Marcello; Roli, Fabio
ImageNet-Patch: A Dataset for Benchmarking Machine Learning Robustness against Adversarial Patches
2023-01-01 Pintor, Maura; Angioni, Daniele; Sotgiu, Angelo; Demetrio, Luca; Demontis, Ambra; Biggio, Battista; Roli, Fabio
Why adversarial reprogramming works, when it fails, and how to tell the difference
2023-01-01 Zheng, Yang; Feng, Xiaoyi; Xia, Zhaoqiang; Jiang, Xiaoyue; Demontis, Ambra; Pintor, Maura; Biggio, Battista; Roli, Fabio
BLUES: Before-reLU-EStimates Bayesian Inference for Crowd Counting
2023-01-01 Ledda, E.; Delussu, R.; Putzu, L.; Fumera, G.; Roli, F.
Dropout injection at test time for post hoc uncertainty quantification in neural networks
2023-01-01 Ledda, E; Fumera, G; Roli, F
Adversarial Attacks Against Uncertainty Quantification
2023-01-01 Ledda, Emanuele; Angioni, Daniele; Piras, Giorgio; Fumera, Giorgio; Biggio, Battista; Roli, Fabio
Practical Attacks on Machine Learning: A Case Study on Adversarial Windows Malware
2022-01-01 Demetrio, L; Biggio, B; Roli, F
Analysis of Score-Level Fusion Rules for Deepfake Detection
2022-01-01 Concas, S; La Cava, Sm; Orru', G; Cuccu, C; Gao, J; Feng, Xy; Marcialis, Gl; Roli, F
Experimental Results on Multi-modal Deepfake Detection
2022-01-01 Concas, S.; Gao, J.; Cuccu, C.; Orru', G.; Feng, X.; Marcialis, G. L.; Puglisi, G.; Roli, F.
Domain Knowledge Alleviates Adversarial Attacks in Multi-Label Classifiers
2022-01-01 Melacci, S.; Ciravegna, G.; Sotgiu, A.; Demontis, A.; Biggio, B.; Gori, M.; Roli, F.
Indicators of Attack Failure: Debugging and Improving Optimization of Adversarial Examples
2022-01-01 Pintor, Maura; Demetrio, Luca; Sotgiu, Angelo; Demontis, Ambra; Carlini, Nicholas; Biggio, Battista; Roli, Fabio
Do gradient-based explanations tell anything about adversarial robustness to android malware?
2022-01-01 Melis, M.; Scalas, M.; Demontis, A.; Maiorca, D.; Biggio, B.; Giacinto, G.; Roli, F.
Attention-Based Adversarial Robust Distillation in Radio Signal Classifications for Low-Power IoT Devices
2022-01-01 Zhang, Lu; Lambotharan, Sangarapillai; Zheng, Gan; Liao, Guisheng; Assadhan, Basil; Roli, Fabio
Towards realistic fingerprint presentation attacks: The ScreenSpoof method
2022-01-01 Casula, Roberto; Micheletto, Marco; Orru', Giulia; Marcialis, Gian Luca; Roli, Fabio
On the Evaluation of Video-Based Crowd Counting Models
2022-01-01 Ledda, E.; Putzu, L.; Delussu, R.; Fumera, G.; Roli, F.
Online domain adaptation for person Re-identification with a human in the loop
2021-01-01 Delussu, R.; Putzu, L.; Fumera, G.; Roli, F.
Empirical assessment of generating adversarial configurations for software product lines
2021-01-01 Temple, P.; Perrouin, G.; Acher, M.; Biggio, B.; Jezequel, J. -M.; Roli, F.
Fast minimum-norm adversarial attacks through adaptive norm constraints
2021-01-01 Pintor, Maura; Roli, Fabio; Brendel, Wieland; Biggio, Battista
The hammer and the nut: is bilevel optimization really needed to poison linear classifiers?
2021-01-01 Cina, A. E.; Vascon, S.; Demontis, A.; Biggio, B.; Roli, F.; Pelillo, M.
Are spoofs from latent fingerprints a real threat for the best state-of-art liveness detectors?
2021-01-01 Casula, R.; Orru', G.; Angioni, D.; Feng, X.; Marcialis, G. L.; Roli, F.
Adversarial EXEmples: A Survey and Experimental Evaluation of Practical Attacks on Machine Learning for Windows Malware Detection
2021-01-01 Demetrio, L.; Coull, S. E.; Biggio, B.; Lagorio, G.; Armando, A.; Roli, F.
Detecting Anomalies from Video-Sequences: a Novel Descriptor
2021-01-01 Orru', G.; Ghiani, D.; Pintor, M.; Marcialis, G. L.; Roli, F.
Fingerprint recognition with embedded presentation attacks detection: are we ready?
2021-01-01 Micheletto, M.; Marcialis, G. L.; Orru', G.; Roli, F.
Functionality-Preserving Black-Box Optimization of Adversarial Windows Malware
2021-01-01 Demetrio, Luca; Biggio, Battista; Lagorio, Giovanni; Roli, Fabio; Armando, Alessandro
EEG personal recognition based on ‘qualified majority’ over signal patches
2021-01-01 Panzino, Andrea; Orru', Giulia; Marcialis, GIAN LUCA; Roli, Fabio
Slope: A First-order Approach for Measuring Gradient Obfuscation
2021-01-01 Pintor, M.; Demetrio, L.; Manca, G.; Biggio, B.; Roli, F.
Countermeasures Against Adversarial Examples in Radio Signal Classification
2021-01-01 Zhang, Lu; Lambotharan, Sangarapillai; Zheng, Gan; Assadhan, Basil; Roli, Fabio
CompactNet: learning a compact space for face presentation attack detection
2020-01-01 Li, Lei; Xia, Zhaoqiang; Jiang, Xiaoyue; Roli, Fabio; Feng, Xiaoyi
Deep neural rejection against adversarial examples
2020-01-01 Sotgiu, Angelo; Demontis, Ambra; Melis, Marco; Biggio, Battista; Fumera, Giorgio; Feng, Xiaoyi; Roli, Fabio
Infrared and visible image fusion using a shallow CNN and structural similarity constraint
2020-01-01 Li, Lei; Xia, Zhaoqiang; Han, Huijian; He, Guiqing; Roli, Fabio; Feng, Xiaoyi
Adversarial Detection of Flash Malware: Limitations and Open Issues
2020-01-01 Maiorca, D.; Demontis, A.; Biggio, B.; Roli, F.; Giacinto, G.
A novel classification-selection approach for the self updating of template-based face recognition systems
2020-01-01 Orrù, Giulia; Marcialis, Gian Luca; Roli, Fabio
Explaining vulnerabilities of deep learning to adversarial malware binaries
2019-01-01 Demetrio, Luca; Biggio, Battista; Lagorio, Giovanni; Roli, Fabio; Armando, Alessandro
Review of fingerprint presentation attack detection competitions
2019-01-01 Yambay, David; Ghiani, Luca; Marcialis, Gian Luca; Roli, Fabio; Schuckers, Stephanie
DEICTIC: a compositional and declarative gesture description based on hidden markov models
2019-01-01 Carcangiu, Alessandro; Spano, Lucio Davide; Fumera, Giorgio; Roli, Fabio
Towards quality assurance of software product lines with adversarial configurations
2019-01-01 Temple, P.; Acher, M.; Perrouin, G.; Biggio, B.; Jezequel, J. -M.; Roli, F.
An experimental investigation on self adaptive facial recognition algorithms using a long time span data set
2019-01-01 Orru', Giulia; Marcialis, GIAN LUCA; Roli, Fabio
Why Do Adversarial Attacks Transfer? Explaining Transferability of Evasion and Poisoning Attacks
2019-01-01 Demontis, Ambra; Melis, Marco; Pintor, Maura; Jagielski, Matthew; Biggio, Battista; Oprea, Alina; Nita-Rotaru, Cristina; Roli, Fabio
Yes, Machine Learning Can Be More Secure! A Case Study on Android Malware Detection
2019-01-01 Demontis, Ambra; Melis, Marco; Biggio, Battista; Maiorca, Davide; Arp, Daniel; Rieck, Konrad; Corona, Igino; Giacinto, Giorgio; Roli, Fabio
Titolo | Data di pubblicazione | Autore(i) | Rivista | Editore |
---|---|---|---|---|
Machine Learning Security Against Data Poisoning: Are We There Yet? | 1-gen-2024 | Cinà, Antonio Emanuele; Grosse, Kathrin; Demontis, Ambra; Biggio, Battista; Roli, Fabio; Pelillo, Marcello | COMPUTER | - |
Nebula: Self-Attention for Dynamic Malware Analysis | 1-gen-2024 | Trizna, Dmitrijs; Demetrio, Luca; Biggio, Battista; Roli, Fabio | IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY | - |
Texture and artifact decomposition for improving generalization in deep-learning-based deepfake detection | 1-gen-2024 | Gao, Jie; Micheletto, Marco; Orru', Giulia; Concas, Sara; Feng, Xiaoyi; Marcialis, Gian Luca; Roli, Fabio | ENGINEERING APPLICATIONS OF ARTIFICIAL INTELLIGENCE | - |
Generalized Deepfake Detection Algorithm Based on Inconsistency Between Inner and Outer Faces | 1-gen-2024 | Gao, Jie; Concas, Sara; Orru', Giulia; Feng, Xiaoyi; Marcialis, Gian Luca; Roli, Fabio | - | - |
Toward Effective Traffic Sign Detection via Two-Stage Fusion Neural Networks | 1-gen-2024 | Li, Zhishan; Chen, Hongxu; Biggio, Battista; He, Yifan; Cai, Haoran; Roli, Fabio; Xie, Lei | IEEE TRANSACTIONS ON INTELLIGENT TRANSPORTATION SYSTEMS | - |
Cybersecurity and AI: The PRALab Research Experience | 1-gen-2023 | Pintor, Maura; Orru, Giulia; Maiorca, Davide; Demontis, Ambra; Demetrio, Luca; Marcialis, GIAN LUCA; Biggio, Battista; Roli, Fabio | - | CEUR-WS Team, Redaktion Sun SITE |
Minimizing Energy Consumption of Deep Learning Models by Energy-Aware Training | 1-gen-2023 | Lazzaro, Dario; Cinà, Antonio Emanuele; Pintor, Maura; Demontis, Ambra; Biggio, Battista; Roli, Fabio; Pelillo, Marcello | - | - |
AI Security and Safety: The PRALab Research Experience | 1-gen-2023 | Demontis, Ambra; Pintor, Maura; Demetrio, Luca; Sotgiu, Angelo; Angioni, Daniele; Piras, Giorgio; Gupta, Srishti; Biggio, Battista; Roli, Fabio | - | CEUR-WS Team, Redaktion Sun SITE |
Hardening RGB-D object recognition systems against adversarial patch attacks | 1-gen-2023 | Zheng, Yang; Demetrio, Luca; Cinà, Antonio Emanuele; Feng, Xiaoyi; Xia, Zhaoqiang; Jiang, Xiaoyue; Demontis, Ambra; Biggio, Battista; Roli, Fabio | INFORMATION SCIENCES | - |
3D Face Reconstruction: the Road to Forensics | 1-gen-2023 | Cava, Simone Maurizio La; Orru', Giulia; Drahansky, Martin; Marcialis, Gian Luca; Roli, Fabio | ACM COMPUTING SURVEYS | - |
Stateful detection of adversarial reprogramming | 1-gen-2023 | Zheng, Yang; Feng, Xiaoyi; Xia, Zhaoqiang; Jiang, Xiaoyue; Pintor, Maura; Demontis, Ambra; Biggio, Battista; Roli, Fabio | INFORMATION SCIENCES | - |
Wild Patterns Reloaded: A Survey of Machine Learning Security against Training Data Poisoning | 1-gen-2023 | Emanuele Cinà, Antonio; Grosse, Kathrin; Demontis, Ambra; Vascon, Sebastiano; Zellinger, Werner; Moser, Bernhard A.; Oprea, Alina; Biggio, Battista; Pelillo, Marcello; Roli, Fabio | ACM COMPUTING SURVEYS | - |
ImageNet-Patch: A Dataset for Benchmarking Machine Learning Robustness against Adversarial Patches | 1-gen-2023 | Pintor, Maura; Angioni, Daniele; Sotgiu, Angelo; Demetrio, Luca; Demontis, Ambra; Biggio, Battista; Roli, Fabio | PATTERN RECOGNITION | - |
Why adversarial reprogramming works, when it fails, and how to tell the difference | 1-gen-2023 | Zheng, Yang; Feng, Xiaoyi; Xia, Zhaoqiang; Jiang, Xiaoyue; Demontis, Ambra; Pintor, Maura; Biggio, Battista; Roli, Fabio | INFORMATION SCIENCES | - |
BLUES: Before-reLU-EStimates Bayesian Inference for Crowd Counting | 1-gen-2023 | Ledda, E.; Delussu, R.; Putzu, L.; Fumera, G.; Roli, F. | - | - |
Dropout injection at test time for post hoc uncertainty quantification in neural networks | 1-gen-2023 | Ledda, E; Fumera, G; Roli, F | INFORMATION SCIENCES | - |
Adversarial Attacks Against Uncertainty Quantification | 1-gen-2023 | Ledda, Emanuele; Angioni, Daniele; Piras, Giorgio; Fumera, Giorgio; Biggio, Battista; Roli, Fabio | - | IEEE COMPUTER SOC |
Practical Attacks on Machine Learning: A Case Study on Adversarial Windows Malware | 1-gen-2022 | Demetrio, L; Biggio, B; Roli, F | IEEE SECURITY & PRIVACY | - |
Analysis of Score-Level Fusion Rules for Deepfake Detection | 1-gen-2022 | Concas, S; La Cava, Sm; Orru', G; Cuccu, C; Gao, J; Feng, Xy; Marcialis, Gl; Roli, F | APPLIED SCIENCES | - |
Experimental Results on Multi-modal Deepfake Detection | 1-gen-2022 | Concas, S.; Gao, J.; Cuccu, C.; Orru', G.; Feng, X.; Marcialis, G. L.; Puglisi, G.; Roli, F. | - | - |
Domain Knowledge Alleviates Adversarial Attacks in Multi-Label Classifiers | 1-gen-2022 | Melacci, S.; Ciravegna, G.; Sotgiu, A.; Demontis, A.; Biggio, B.; Gori, M.; Roli, F. | IEEE TRANSACTIONS ON PATTERN ANALYSIS AND MACHINE INTELLIGENCE | - |
Indicators of Attack Failure: Debugging and Improving Optimization of Adversarial Examples | 1-gen-2022 | Pintor, Maura; Demetrio, Luca; Sotgiu, Angelo; Demontis, Ambra; Carlini, Nicholas; Biggio, Battista; Roli, Fabio | - | Neural information processing systems foundation |
Do gradient-based explanations tell anything about adversarial robustness to android malware? | 1-gen-2022 | Melis, M.; Scalas, M.; Demontis, A.; Maiorca, D.; Biggio, B.; Giacinto, G.; Roli, F. | INTERNATIONAL JOURNAL OF MACHINE LEARNING AND CYBERNETICS | - |
Attention-Based Adversarial Robust Distillation in Radio Signal Classifications for Low-Power IoT Devices | 1-gen-2022 | Zhang, Lu; Lambotharan, Sangarapillai; Zheng, Gan; Liao, Guisheng; Assadhan, Basil; Roli, Fabio | IEEE INTERNET OF THINGS JOURNAL | - |
Towards realistic fingerprint presentation attacks: The ScreenSpoof method | 1-gen-2022 | Casula, Roberto; Micheletto, Marco; Orru', Giulia; Marcialis, Gian Luca; Roli, Fabio | PATTERN RECOGNITION LETTERS | - |
On the Evaluation of Video-Based Crowd Counting Models | 1-gen-2022 | Ledda, E.; Putzu, L.; Delussu, R.; Fumera, G.; Roli, F. | - | - |
Online domain adaptation for person Re-identification with a human in the loop | 1-gen-2021 | Delussu, R.; Putzu, L.; Fumera, G.; Roli, F. | - | Institute of Electrical and Electronics Engineers Inc. |
Empirical assessment of generating adversarial configurations for software product lines | 1-gen-2021 | Temple, P.; Perrouin, G.; Acher, M.; Biggio, B.; Jezequel, J. -M.; Roli, F. | EMPIRICAL SOFTWARE ENGINEERING | - |
Fast minimum-norm adversarial attacks through adaptive norm constraints | 1-gen-2021 | Pintor, Maura; Roli, Fabio; Brendel, Wieland; Biggio, Battista | - | - |
The hammer and the nut: is bilevel optimization really needed to poison linear classifiers? | 1-gen-2021 | Cina, A. E.; Vascon, S.; Demontis, A.; Biggio, B.; Roli, F.; Pelillo, M. | - | IEEE, Institute of Electrical and Electronics Engineers |
Are spoofs from latent fingerprints a real threat for the best state-of-art liveness detectors? | 1-gen-2021 | Casula, R.; Orru', G.; Angioni, D.; Feng, X.; Marcialis, G. L.; Roli, F. | - | Institute of Electrical and Electronics Engineers |
Adversarial EXEmples: A Survey and Experimental Evaluation of Practical Attacks on Machine Learning for Windows Malware Detection | 1-gen-2021 | Demetrio, L.; Coull, S. E.; Biggio, B.; Lagorio, G.; Armando, A.; Roli, F. | ACM TRANSACTIONS ON PRIVACY AND SECURITY | - |
Detecting Anomalies from Video-Sequences: a Novel Descriptor | 1-gen-2021 | Orru', G.; Ghiani, D.; Pintor, M.; Marcialis, G. L.; Roli, F. | - | Institute of Electrical and Electronics Engineers |
Fingerprint recognition with embedded presentation attacks detection: are we ready? | 1-gen-2021 | Micheletto, M.; Marcialis, G. L.; Orru', G.; Roli, F. | IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY | - |
Functionality-Preserving Black-Box Optimization of Adversarial Windows Malware | 1-gen-2021 | Demetrio, Luca; Biggio, Battista; Lagorio, Giovanni; Roli, Fabio; Armando, Alessandro | IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY | - |
EEG personal recognition based on ‘qualified majority’ over signal patches | 1-gen-2021 | Panzino, Andrea; Orru', Giulia; Marcialis, GIAN LUCA; Roli, Fabio | IET BIOMETRICS | - |
Slope: A First-order Approach for Measuring Gradient Obfuscation | 1-gen-2021 | Pintor, M.; Demetrio, L.; Manca, G.; Biggio, B.; Roli, F. | - | - |
Countermeasures Against Adversarial Examples in Radio Signal Classification | 1-gen-2021 | Zhang, Lu; Lambotharan, Sangarapillai; Zheng, Gan; Assadhan, Basil; Roli, Fabio | IEEE WIRELESS COMMUNICATIONS LETTERS | - |
CompactNet: learning a compact space for face presentation attack detection | 1-gen-2020 | Li, Lei; Xia, Zhaoqiang; Jiang, Xiaoyue; Roli, Fabio; Feng, Xiaoyi | NEUROCOMPUTING | - |
Deep neural rejection against adversarial examples | 1-gen-2020 | Sotgiu, Angelo; Demontis, Ambra; Melis, Marco; Biggio, Battista; Fumera, Giorgio; Feng, Xiaoyi; Roli, Fabio | EURASIP JOURNAL ON MULTIMEDIA AND INFORMATION SECURITY | - |
Infrared and visible image fusion using a shallow CNN and structural similarity constraint | 1-gen-2020 | Li, Lei; Xia, Zhaoqiang; Han, Huijian; He, Guiqing; Roli, Fabio; Feng, Xiaoyi | IET IMAGE PROCESSING | - |
Adversarial Detection of Flash Malware: Limitations and Open Issues | 1-gen-2020 | Maiorca, D.; Demontis, A.; Biggio, B.; Roli, F.; Giacinto, G. | COMPUTERS & SECURITY | - |
A novel classification-selection approach for the self updating of template-based face recognition systems | 1-gen-2020 | Orrù, Giulia; Marcialis, Gian Luca; Roli, Fabio | PATTERN RECOGNITION | - |
Explaining vulnerabilities of deep learning to adversarial malware binaries | 1-gen-2019 | Demetrio, Luca; Biggio, Battista; Lagorio, Giovanni; Roli, Fabio; Armando, Alessandro | - | - |
Review of fingerprint presentation attack detection competitions | 1-gen-2019 | Yambay, David; Ghiani, Luca; Marcialis, Gian Luca; Roli, Fabio; Schuckers, Stephanie | - | Springer London |
DEICTIC: a compositional and declarative gesture description based on hidden markov models | 1-gen-2019 | Carcangiu, Alessandro; Spano, Lucio Davide; Fumera, Giorgio; Roli, Fabio | INTERNATIONAL JOURNAL OF HUMAN-COMPUTER STUDIES | - |
Towards quality assurance of software product lines with adversarial configurations | 1-gen-2019 | Temple, P.; Acher, M.; Perrouin, G.; Biggio, B.; Jezequel, J. -M.; Roli, F. | - | Association for Computing Machinery |
An experimental investigation on self adaptive facial recognition algorithms using a long time span data set | 1-gen-2019 | Orru', Giulia; Marcialis, GIAN LUCA; Roli, Fabio | - | IEEE (Institute of Electrical and Electronics Engineers) |
Why Do Adversarial Attacks Transfer? Explaining Transferability of Evasion and Poisoning Attacks | 1-gen-2019 | Demontis, Ambra; Melis, Marco; Pintor, Maura; Jagielski, Matthew; Biggio, Battista; Oprea, Alina; Nita-Rotaru, Cristina; Roli, Fabio | - | USENIX Association |
Yes, Machine Learning Can Be More Secure! A Case Study on Android Malware Detection | 1-gen-2019 | Demontis, Ambra; Melis, Marco; Biggio, Battista; Maiorca, Davide; Arp, Daniel; Rieck, Konrad; Corona, Igino; Giacinto, Giorgio; Roli, Fabio | IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING | - |
Legenda icone
- file ad accesso aperto
- file disponibili sulla rete interna
- file disponibili agli utenti autorizzati
- file disponibili solo agli amministratori
- file sotto embargo
- nessun file disponibile