Publications

Export 35 results:
Filters: First Letter Of Title is P  [Clear All Filters]
2021
D. Solans, Biggio, B., e Castillo, C., «Poisoning Attacks on Algorithmic Fairness», in Machine Learning and Knowledge Discovery in Databases (ECML PKDD 2020), 2021, pag 162--177. (1.05 MB)
M. Kravchik, Biggio, B., e Shabtai, A., «Poisoning Attacks on Cyber Attack Detectors for Industrial Control Systems», in Proceedings of the 36th Annual ACM Symposium on Applied Computing, New York, NY, USA, 2021, pagg 116–125.
G. Malandrone, Virdis, G., Maiorca, D., e Giacinto, G., «PowerDecode: A PowerShell Script Decoder Dedicated to Malware Analysis», 5th Italian Conference on CyberSecurity (ITASEC). 2021. (982.03 KB)
2019
R. Labaca-Castro, Biggio, B., e Rodosek, G. Dreo, «Poster: Attacking Malware Classifiers by Crafting Gradient-Attacks That Preserve Functionality», in Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications Security, New York, NY, USA, 2019, pagg 2565–2567.
D. Ugarte, Maiorca, D., Cara, F., e Giacinto, G., «PowerDrive: Accurate De-Obfuscation and Analysis of PowerShell Malware», 16th Conference on Detection of Intrusions and Malware & Vulnerability Assessment (DIMVA). Springer, Gothenburg, Sweden, pagg 240-259, 2019. (352.39 KB)
C. Gurrin, Schöffmann, K., Joho, H., Dang-Nguyen, D. - T., Riegler, M., e Piras, L., «Proceedings of the {ACM} Workshop on Lifelog Search Challenge, LSC@ICMR 2019, Ottawa, ON, Canada, 10 June 2019». ACM, 2019.
2016
A. Loddo, Di Ruberto, C., e Putzu, L., «Peripheral blood image analysis», in VISIGRAPP 2016 - Proceedings of the 11th Joint Conference on Computer Vision, Imaging and Computer Graphics Theory and Applications - Doctoral Consortium, 2016, pagg 15 – 23.
M. Contini, Corona, I., Mulas, A., Giacinto, G., e Ariu, D., «Pharmaguard WebApp: an application for the detection of illegal online pharmacies», 2nd International Workshop on Knowledge Discovery on the WEB (KDWEB). Cagliari, 2016. (120.57 KB)
2015
I. Corona, Contini, M., Ariu, D., Giacinto, G., Roli, F., Lund, M., e Marinelli, G., «PharmaGuard: Automatic Identification of Illegal Search-Indexed Online Pharmacies», IEEE International Conference on Cybernetics - Special session Cybersecurity (CYBERSEC). IEEE, Gdynia, Poland , pagg 324 - 329, 2015. (1.44 MB) (3.4 MB)
2014
B. Biggio, Fumera, G., e Roli, F., «Pattern Recognition Systems under Attack: Design Issues and Research Challenges», Int'l J. Patt. Recogn. Artif. Intell., vol 28, n° 7, pag 1460002, 2014. (1.41 MB)
R. Satta, Pala, F., Fumera, G., e Roli, F., «People search with textual queries about clothing appearance attributes», in Person Re‐Identification, Advances in Computer Vision and Pattern Recognition, S. Gong, Cristani, M., Yan, S., e Loy, C. Change Springer, 2014. (1.07 MB)
B. Biggio, Rieck, K., Ariu, D., Wressnegger, C., Corona, I., Giacinto, G., e Roli, F., «Poisoning Behavioral Malware Clustering», in AISec'14: Proceedings of the 2014 ACM Workshop on Artificial Intelligence and Security, co-located with CCS '14, Scottsdale, Arizona, USA, 2014, pagg 27-36. (375.58 KB)
B. Biggio, Rota Bulò, S., Pillai, I., Mura, M., Zemene Mequanint, E., Pelillo, M., e Roli, F., «Poisoning complete-linkage hierarchical clustering», in Joint IAPR Int'l Workshop on Structural, Syntactic, and Statistical Pattern Recognition (LNCS), Joensuu, Finland, 2014, vol 8621, pagg 42-52. (388.31 KB)
I. Sanchez, Satta, R., Nai-Fovino, I., Baldini, G., Steri, G., Shaw, D., e Ciardulli, A., «Privacy leakages in Smart Home Wireless Technologies», in 2014 IEEE International Carnahan Conference on Security Technology, Rome, Italy, 2014. (329.97 KB)
2013
L. Piras, Giacinto, G., e Paredes, R., «Passive-Aggressive Online Learning for Relevance Feedback in Content Based Image Retrieval», in 2nd International Conference on Pattern Recognition Applications and Methods (ICPRAM), Barcelona, Spain, 2013. (138.32 KB)
F. Roli, Biggio, B., e Fumera, G., «Pattern Recognition Systems Under Attack», in Progress in Pattern Recognition, Image Analysis, Computer Vision, and Applications, Proc. of the 18th Iberoamerican Congress on Pattern Recognition (CIARP 2013), LNCS, Havana, Cuba, 2013, vol 8258, pagg 1-8. (314.35 KB)
R. Satta e Stirparo, P., «Picture-to-Identity linking of social network accounts based on Sensor Pattern Noise», in 5th International Conference on Imaging for Crime Detection and Prevention (ICDP 2013), London, United Kingdom, 2013. (348.28 KB)
B. Biggio, Didaci, L., Fumera, G., e Roli, F., «Poisoning attacks to compromise face templates», in 6th IAPR Int'l Conf. on Biometrics (ICB), Madrid, Spain, 2013. (844.61 KB)
2012
D. Maiorca, Giacinto, G., e Corona, I., «A Pattern Recognition System for Malicious PDF Files Detection», in MLDM - International Conference on Machine Learning and Data Mining, Berlin, 2012, vol 7376, pagg 510-524. (1.74 MB)
R. Tronci, Piras, L., e Giacinto, G., «Performance Evaluation of Relevance Feedback for Image Retrieval by “Real-World” Multi-Tagged Image Datasets», International Journal of Multimedia Data Engineering and Management (IJMDEM), vol 3, pag 16, 2012. (357.99 KB)
B. Biggio, Fumera, G., Roli, F., e Didaci, L., «Poisoning adaptive biometric systems», in 9th Int'l Workshop on Statistical Techniques in Pattern Recognition (SPR 2012), 2012, vol 7626, pagg 417-425. (637.79 KB)

Pages