Publications

Export 80 results:
Filters: Author is Battista Biggio  [Clear All Filters]
Conference Paper
B. Biggio, Machine Learning under Attack: Vulnerability Exploitation and Security Measures (Invited Keynote at IH&MMSec '16), in 4th ACM Workshop on Information Hiding & Multimedia Security, Vigo, Spain, 2016, pp. 1-2. (138.98 KB)
B. Biggio, Fumera, G., and Roli, F., Learning Sparse Kernel Machines with Biometric Similarity Functions for Identity Recognition, in IEEE 5th International Conference on Biometrics: Theory, Applications and Systems (BTAS 2012), Washington DC (USA), 2012, pp. 325 -330. (336.11 KB)
B. Biggio, On Learning and Recognition of Secure Patterns (Invited keynote at AISec '14), in AISec'14: Proceedings of the 2014 ACM Workshop on Artificial Intelligence and Security, co-located with CCS '14, Scottsdale, Arizona, USA, 2014, pp. 1-2. (110.67 KB)
B. Biggio, Fumera, G., Pillai, I., and Roli, F., Improving Image Spam Filtering Using Image Text Features, in Fifth Conference on Email and Anti-Spam (CEAS 2008), Mountain View, CA, USA, 2008. (154.27 KB)
B. Biggio, Fumera, G., Pillai, I., and Roli, F., Image Spam Filtering Using Visual Information, in 14th Int. Conf. on Image Analysis and Processing (ICIAP 2007), Modena, Italy, 2007, pp. 105–110. (173.32 KB)
G. Fumera, Pillai, I., Roli, F., and Biggio, B., Image spam filtering using textual and visual information, in MIT Spam Conference 2007, Cambridge, MA, USA, 2007. (513.42 KB)
F. Roli, Biggio, B., Fumera, G., Pillai, I., and Satta, R., Image Spam Filtering by Detection of Adversarial Obfuscated Text, in NIPS Workshop on Machine Learning in Adversarial Environments for Computer Security, Whistler, British Columbia, Canada, 2007. (361.97 KB)
B. Biggio, Fumera, G., Pillai, I., and Roli, F., Image Spam Filtering by Content Obscuring Detection, in Fourth Conference on Email and Anti-Spam (CEAS 2007), Microsoft Research Silicon Valley, Mountain View, California, 2007. (486.14 KB)
H. Xiao, Biggio, B., Brown, G., Fumera, G., Eckert, C., and Roli, F., Is Feature Selection Secure against Training Data Poisoning?, in 32nd Int'l Conf. on Machine Learning (ICML) - JMLR W&CP, 2015, vol. 32, pp. 1689-1698. (1.54 MB)
M. Melis, Piras, L., Biggio, B., Giacinto, G., Fumera, G., and Roli, F., Fast Image Classification with Reduced Multiclass Support Vector Machines, in 18th Int'l Conf. on Image Analysis and Processing, Genova, Italy, 2015, vol. Image Analysis and Processing (ICIAP 2015), pp. 78-88. (829.37 KB)
L. Demetrio, Biggio, B., Lagorio, G., Roli, F., and Armando, A., Explaining Vulnerabilities of Deep Learning to Adversarial Malware Binaries, in 3rd Italian Conference on Cyber Security, ITASEC 2019, Pisa, Italy, 2019, vol. 2315. (801.85 KB)
M. Melis, Maiorca, D., Biggio, B., Giacinto, G., and Roli, F., Explaining Black-box Android Malware Detection, in 26th European Signal Processing Conference (EUSIPCO '18), Rome, Italy, 2018, pp. 524-528. (431.78 KB)
B. Biggio, Corona, I., Maiorca, D., Nelson, B., Srndic, N., Laskov, P., Giacinto, G., and Roli, F., Evasion attacks against machine learning at test time, in European Conference on Machine Learning and Principles and Practice of Knowledge Discovery in Databases (ECML PKDD), 2013, vol. 8190, pp. 387-402. (473.78 KB)
B. Biggio, Fumera, G., and Roli, F., Evade Hard Multiple Classifier Systems, in Workshop on Supervised and Unsupervised Ensemble Methods and Their Applications (SUEMA 2008), Patras, Greece, 2008. (185.01 KB)
D. Maiorca, Russu, P., Corona, I., Biggio, B., and Giacinto, G., Detection of Malicious Scripting Code through Discriminant and Adversary-Aware API Analysis, in 1st Italian Conference on CyberSecurity (ITASEC), 2017, vol. 1816, pp. 96-105. (371.53 KB)
M. Ahmadi, Biggio, B., Arzt, S., Ariu, D., and Giacinto, G., Detecting Misuse of Google Cloud Messaging in Android Badware, in 6th Workshop on Security and Privacy in Smartphones and Mobile Devices (SPSM), Vienna, Austria, 2016, pp. 103-112. (626.38 KB)
F. Crecchi, Bacciu, D., and Biggio, B., Detecting Adversarial Examples through Nonlinear Dimensionality Reduction, in 27th European Symposium on Artificial Neural Networks, Computational Intelligence and Machine Learning - ESANN '19, 2019, pp. 483-488. (552.39 KB)
B. Biggio, Fumera, G., and Roli, F., Design of Robust Classifiers for Adversarial Environments, in IEEE International Conference on Systems, Man, and Cybernetics (SMC 2011), Anchorage, Alaska, USA, 2011, pp. 977–982. (328.68 KB)
P. Piredda, Ariu, D., Biggio, B., Corona, I., Piras, L., Giacinto, G., and Roli, F., Deepsquatting: Learning-based Typosquatting Detection at Deeper Domain Levels, in 16th International Conference of the Italian Association for Artificial Intelligence (AI*IA 2017), 2017, vol. 10640 of LNCS, pp. 347-358. (1.21 MB)
M. Melis, Demontis, A., Biggio, B., Brown, G., Fumera, G., and Roli, F., Is Deep Learning Safe for Robot Vision? Adversarial Examples against the iCub Humanoid, in ICCV 2017 Workshop on Vision in Practice on Autonomous Robots (ViPAR), Venice, Italy, 2017, vol. 2017 IEEE International Conference on Computer Vision Workshops (ICCVW), pp. 751-759. (3.16 MB)
B. Biggio, Pillai, I., Rota Bulò, S., Ariu, D., Pelillo, M., and Roli, F., Is Data Clustering in Adversarial Settings Secure?, in AISec'13: Proceedings of the 2013 ACM Workshop on Artificial Intelligence and Security, Berlin, 2013, pp. 87-98. (300.52 KB)
B. Biggio, Fumera, G., and Roli, F., Bayesian Analysis of Linear Combiners, in 7th Int. Workshop on Multiple Classifier Systems (MCS 2007), Prague, Czech Republic, 2007, vol. 4472, pp. 292-301. (149.24 KB)
B. Biggio, Corona, I., Fumera, G., Giacinto, G., and Roli, F., Bagging classifiers for fighting poisoning attacks in adversarial classification tasks, in Multiple Classifier Systems (MCS 2011), 2011, vol. 6713, pp. 350-359. (231.43 KB)
B. Biggio, Fumera, G., and Roli, F., Adversarial Pattern Classification Using Multiple Classifiers and Randomisation, in 12th Joint IAPR International Workshop on Structural and Syntactic Pattern Recognition (SSPR 2008), Orlando, Florida, USA, 2008. (395.38 KB)
B. Kolosnjaji, Demontis, A., Biggio, B., Maiorca, D., Giacinto, G., Eckert, C., and Roli, F., Adversarial Malware Binaries: Evading Deep Learning for Malware Detection in Executables, in 2018 26th European Signal Processing Conference (EUSIPCO), Rome, 2018, pp. 533-537. (674.62 KB)

Pages