B
B. Biggio, Rieck, K., Ariu, D., Wressnegger, C., Corona, I., Giacinto, G., e Roli, F.,
«Poisoning Behavioral Malware Clustering», in
AISec'14: Proceedings of the 2014 ACM Workshop on Artificial Intelligence and Security, co-located with CCS '14, Scottsdale, Arizona, USA, 2014, pagg 27-36.
(375.58 KB) B. Biggio, Akhtar, Z., Fumera, G., Marcialis, G. L., e Roli, F.,
«Robustness of multi-modal biometric verification systems under realistic spoofing attacks», in
Int’l Joint Conference on Biometrics (IJCB), Washington DC, USA, 2011.
(2.25 MB) B. Biggio, Fumera, G., Pillai, I., e Roli, F.,
«Image Spam Filtering by Content Obscuring Detection», in
Fourth Conference on Email and Anti-Spam (CEAS 2007), Microsoft Research Silicon Valley, Mountain View, California, 2007.
(486.14 KB) B. Biggio, Nelson, B., e Laskov, P.,
«Support Vector Machines Under Adversarial Label Noise», in
Journal of Machine Learning Research - Proc. 3rd Asian Conference on Machine Learning (ACML 2011), Taoyuan, Taiwan, 2011, vol 20, pagg 97-112.
(533.74 KB) B. Biggio, Fumera, G., e Roli, F.,
«Learning Sparse Kernel Machines with Biometric Similarity Functions for Identity Recognition», in
IEEE 5th International Conference on Biometrics: Theory, Applications and Systems (BTAS 2012), Washington DC (USA), 2012, pagg 325 -330.
(336.11 KB) B. Biggio, Fumera, G., e Roli, F.,
«Security evaluation of pattern classifiers under attack»,
IEEE Transactions on Knowledge and Data Engineering, vol 26, n° 4, pagg 984-996, 2014.
(1.35 MB) B. Biggio, Pillai, I., Rota Bulò, S., Ariu, D., Pelillo, M., e Roli, F.,
«Is Data Clustering in Adversarial Settings Secure?», in
AISec'13: Proceedings of the 2013 ACM Workshop on Artificial Intelligence and Security, Berlin, 2013, pagg 87-98.
(300.52 KB) B. Biggio, Akhtar, Z., Fumera, G., Marcialis, G. L., e Roli, F.,
«Security evaluation of biometric authentication systems under real spoofing attacks»,
IET Biometrics, vol 1, n° 1, pagg 11-24, 2012.
(3.21 MB) B. Biggio, Fumera, G., Pillai, I., e Roli, F.,
«Image Spam Filtering Using Visual Information», in
14th Int. Conf. on Image Analysis and Processing (ICIAP 2007), Modena, Italy, 2007, pagg 105–110.
(173.32 KB) B. Biggio, Fumera, G., Pillai, I., e Roli, F.,
«Improving Image Spam Filtering Using Image Text Features», in
Fifth Conference on Email and Anti-Spam (CEAS 2008), Mountain View, CA, USA, 2008.
(154.27 KB) B. Biggio, Corona, I., Nelson, B., Rubinstein, B. I. P., Maiorca, D., Fumera, G., Giacinto, G., e Roli, F.,
«Security Evaluation of Support Vector Machines in Adversarial Environments», in
Support Vector Machines Applications,
Y. Ma e Guo, G. Springer International Publishing, 2014, pagg 105-153.
(687.1 KB) B. Biggio, Corona, I., Fumera, G., Giacinto, G., e Roli, F.,
«Bagging classifiers for fighting poisoning attacks in adversarial classification tasks», in
Multiple Classifier Systems (MCS 2011), 2011, vol 6713, pagg 350-359.
(231.43 KB) B. Biggio, Corona, I., Maiorca, D., Nelson, B., Srndic, N., Laskov, P., Giacinto, G., e Roli, F.,
«Evasion attacks against machine learning at test time», in
European Conference on Machine Learning and Principles and Practice of Knowledge Discovery in Databases (ECML PKDD), 2013, vol 8190, pagg 387-402.
(473.78 KB) L. Bruzzone, Conese, C., Maselli, F., e Roli, F.,
«Multisource classification of complex rural areas by statistical and neural-network approaches»,
Int. Journal on Photogrammetric Engineering and Remote Sensing (PE&RS), vol 63, pagg 523-533, 1997.