Export 70 results:
Filters: Author is Battista Biggio  [Clear All Filters]
A B C D E F G H I J K L M N O P Q R S T U V W X Y Z 
B. Biggio, Fumera, G., Russu, P., Didaci, L., e Roli, F., «Adversarial Biometric Recognition: A Review on Biometric System Security from the Adversarial Machine Learning Perspective», IEEE Signal Processing Magazine, vol 32, n° 5, pagg 31-41, 2015. (751.08 KB)
F. Zhang, Chan, P. P. K., Biggio, B., Yeung, D. S., e Roli, F., «Adversarial Feature Selection Against Evasion Attacks», IEEE Transactions on Cybernetics, vol 46, n° 3, pagg 766-777, 2016. (2.12 MB)
B. Kolosnjaji, Demontis, A., Biggio, B., Maiorca, D., Giacinto, G., Eckert, C., e Roli, F., «Adversarial Malware Binaries: Evading Deep Learning for Malware Detection in Executables», in 2018 26th European Signal Processing Conference (EUSIPCO), Rome, 2018, pagg 533-537. (674.62 KB)
B. Biggio, «Adversarial Pattern Classification», University of Cagliari, Cagliari (Italy), 2010. (2.65 MB)
B. Biggio, Fumera, G., e Roli, F., «Adversarial Pattern Classification Using Multiple Classifiers and Randomisation», in 12th Joint IAPR International Workshop on Structural and Syntactic Pattern Recognition (SSPR 2008), Orlando, Florida, USA, 2008. (395.38 KB)
G. L. Marcialis, Fumera, G., e Biggio, B., «Anti-spoofing: Multimodal», in Encyclopedia of Biometrics, S. Z. Li e Jain, A. K. Springer US, 2014, pagg 1-4.
B. Biggio, Corona, I., Fumera, G., Giacinto, G., e Roli, F., «Bagging classifiers for fighting poisoning attacks in adversarial classification tasks», in Multiple Classifier Systems (MCS 2011), 2011, vol 6713, pagg 350-359. (231.43 KB)
B. Biggio, Fumera, G., e Roli, F., «Bayesian Analysis of Linear Combiners», in 7th Int. Workshop on Multiple Classifier Systems (MCS 2007), Prague, Czech Republic, 2007, vol 4472, pagg 292-301. (149.24 KB)
B. Biggio, Fumera, G., e Roli, F., «Bayesian Linear Combination of Neural Networks», in Innovations in Neural Information Paradigms and Applications, vol 247, M. Bianchini, Maggini, M., Scarselli, F., e Jain, L. C. Springer Berlin / Heidelberg, 2009, pagg 201-230. (435.32 KB)
B. Biggio, Pillai, I., Rota Bulò, S., Ariu, D., Pelillo, M., e Roli, F., «Is Data Clustering in Adversarial Settings Secure?», in AISec'13: Proceedings of the 2013 ACM Workshop on Artificial Intelligence and Security, Berlin, 2013, pagg 87-98. (300.52 KB)
G. Ennas, Biggio, B., e Di Guardo, M. Chiara, «Data-driven Journal Meta-ranking in Business and Management», Scientometrics, pagg 1-19, 2015. (896.37 KB)
M. Melis, Demontis, A., Biggio, B., Brown, G., Fumera, G., e Roli, F., «Is Deep Learning Safe for Robot Vision? Adversarial Examples against the iCub Humanoid», in ICCV 2017 Workshop on Vision in Practice on Autonomous Robots (ViPAR), Venice, Italy, 2017, vol 2017 IEEE International Conference on Computer Vision Workshops (ICCVW), pagg 751-759. (3.16 MB)
P. Piredda, Ariu, D., Biggio, B., Corona, I., Piras, L., Giacinto, G., e Roli, F., «Deepsquatting: Learning-based Typosquatting Detection at Deeper Domain Levels», in 16th International Conference of the Italian Association for Artificial Intelligence (AI*IA 2017), 2017, vol 10640 of LNCS, pagg 347-358. (1.21 MB)
I. Corona, Biggio, B., Contini, M., Piras, L., Corda, R., Mereu, M., Mureddu, G., Ariu, D., e Roli, F., «DeltaPhish: Detecting Phishing Webpages in Compromised Websites», 22nd European Symposium on Research in Computer Security (ESORICS), vol 10492. Springer International Publishing, Norway, September 11-15, 2017, pagg 370–388, 2017. (4.13 MB)
B. Biggio, Fumera, G., e Roli, F., «Design of Robust Classifiers for Adversarial Environments», in IEEE International Conference on Systems, Man, and Cybernetics (SMC 2011), Anchorage, Alaska, USA, 2011, pagg 977–982. (328.68 KB)
M. Ahmadi, Biggio, B., Arzt, S., Ariu, D., e Giacinto, G., «Detecting Misuse of Google Cloud Messaging in Android Badware», in 6th Workshop on Security and Privacy in Smartphones and Mobile Devices (SPSM), Vienna, Austria, 2016, pagg 103-112. (626.38 KB)
D. Maiorca, Russu, P., Corona, I., Biggio, B., e Giacinto, G., «Detection of Malicious Scripting Code through Discriminant and Adversary-Aware API Analysis», in 1st Italian Conference on CyberSecurity (ITASEC), 2017, vol 1816, pagg 96-105. (371.53 KB)
D. Maiorca e Biggio, B., «Digital Investigation of PDF Files: Unveiling Traces of Embedded Malware», IEEE Security and Privacy: Special Issue on Digital Forensics, In Press. (838.95 KB)
B. Biggio, Fumera, G., e Roli, F., «Evade Hard Multiple Classifier Systems», in Supervised and Unsupervised Ensemble Methods and Their Applications, vol 245, O. Okun e Valentini, G. Springer Berlin / Heidelberg, 2009, pagg 15-38. (562.89 KB)
B. Biggio, Fumera, G., e Roli, F., «Evade Hard Multiple Classifier Systems», in Workshop on Supervised and Unsupervised Ensemble Methods and Their Applications (SUEMA 2008), Patras, Greece, 2008. (185.01 KB)
B. Biggio, Fumera, G., Pillai, I., Roli, F., e Satta, R., «Evading SpamAssassin with obfuscated text images», Virus Bulletin, n° 11-2007, 2007. (689 KB)
B. Biggio, Corona, I., Maiorca, D., Nelson, B., Srndic, N., Laskov, P., Giacinto, G., e Roli, F., «Evasion attacks against machine learning at test time», in European Conference on Machine Learning and Principles and Practice of Knowledge Discovery in Databases (ECML PKDD), 2013, vol 8190, pagg 387-402. (473.78 KB)
M. Melis, Maiorca, D., Biggio, B., Giacinto, G., e Roli, F., «Explaining Black-box Android Malware Detection», in 26th European Signal Processing Conference (EUSIPCO '18), Rome, Italy, 2018, pagg 524-528. (431.78 KB)
L. Demetrio, Biggio, B., Lagorio, G., Roli, F., e Armando, A., «Explaining Vulnerabilities of Deep Learning to Adversarial Malware Binaries», in ITASEC, In Press.
M. Melis, Piras, L., Biggio, B., Giacinto, G., Fumera, G., e Roli, F., «Fast Image Classification with Reduced Multiclass Support Vector Machines», in 18th Int'l Conf. on Image Analysis and Processing, Genova, Italy, 2015, vol Image Analysis and Processing (ICIAP 2015), pagg 78-88. (829.37 KB)