Publications

Export 35 results:
Filters: First Letter Of Title is P  [Clear All Filters]
2021
D. Solans, Biggio, B., and Castillo, C., Poisoning Attacks on Algorithmic Fairness, in Machine Learning and Knowledge Discovery in Databases (ECML PKDD 2020), 2021, p. 162--177. (1.05 MB)
M. Kravchik, Biggio, B., and Shabtai, A., Poisoning Attacks on Cyber Attack Detectors for Industrial Control Systems, in Proceedings of the 36th Annual ACM Symposium on Applied Computing, New York, NY, USA, 2021, pp. 116–125.
G. Malandrone, Virdis, G., Maiorca, D., and Giacinto, G., PowerDecode: A PowerShell Script Decoder Dedicated to Malware Analysis, 5th Italian Conference on CyberSecurity (ITASEC). 2021. (982.03 KB)
2019
R. Labaca-Castro, Biggio, B., and Rodosek, G. Dreo, Poster: Attacking Malware Classifiers by Crafting Gradient-Attacks That Preserve Functionality, in Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications Security, New York, NY, USA, 2019, pp. 2565–2567.
D. Ugarte, Maiorca, D., Cara, F., and Giacinto, G., PowerDrive: Accurate De-Obfuscation and Analysis of PowerShell Malware, 16th Conference on Detection of Intrusions and Malware & Vulnerability Assessment (DIMVA). Springer, Gothenburg, Sweden, pp. 240-259, 2019. (352.39 KB)
C. Gurrin, Schöffmann, K., Joho, H., Dang-Nguyen, D. - T., Riegler, M., and Piras, L., Proceedings of the {ACM} Workshop on Lifelog Search Challenge, LSC@ICMR 2019, Ottawa, ON, Canada, 10 June 2019. ACM, 2019.
2016
A. Loddo, Di Ruberto, C., and Putzu, L., Peripheral blood image analysis, in VISIGRAPP 2016 - Proceedings of the 11th Joint Conference on Computer Vision, Imaging and Computer Graphics Theory and Applications - Doctoral Consortium, 2016, pp. 15 – 23.
M. Contini, Corona, I., Mulas, A., Giacinto, G., and Ariu, D., Pharmaguard WebApp: an application for the detection of illegal online pharmacies, 2nd International Workshop on Knowledge Discovery on the WEB (KDWEB). Cagliari, 2016. (120.57 KB)
2015
I. Corona, Contini, M., Ariu, D., Giacinto, G., Roli, F., Lund, M., and Marinelli, G., PharmaGuard: Automatic Identification of Illegal Search-Indexed Online Pharmacies, IEEE International Conference on Cybernetics - Special session Cybersecurity (CYBERSEC). IEEE, Gdynia, Poland , pp. 324 - 329, 2015. (1.44 MB) (3.4 MB)
2014
B. Biggio, Fumera, G., and Roli, F., Pattern Recognition Systems under Attack: Design Issues and Research Challenges, Int'l J. Patt. Recogn. Artif. Intell., vol. 28, no. 7, p. 1460002, 2014. (1.41 MB)
R. Satta, Pala, F., Fumera, G., and Roli, F., People search with textual queries about clothing appearance attributes, in Person Re‐Identification, Advances in Computer Vision and Pattern Recognition, S. Gong, Cristani, M., Yan, S., and Loy, C. Change Springer, 2014. (1.07 MB)
B. Biggio, Rieck, K., Ariu, D., Wressnegger, C., Corona, I., Giacinto, G., and Roli, F., Poisoning Behavioral Malware Clustering, in AISec'14: Proceedings of the 2014 ACM Workshop on Artificial Intelligence and Security, co-located with CCS '14, Scottsdale, Arizona, USA, 2014, pp. 27-36. (375.58 KB)
B. Biggio, Rota Bulò, S., Pillai, I., Mura, M., Zemene Mequanint, E., Pelillo, M., and Roli, F., Poisoning complete-linkage hierarchical clustering, in Joint IAPR Int'l Workshop on Structural, Syntactic, and Statistical Pattern Recognition (LNCS), Joensuu, Finland, 2014, vol. 8621, pp. 42-52. (388.31 KB)
I. Sanchez, Satta, R., Nai-Fovino, I., Baldini, G., Steri, G., Shaw, D., and Ciardulli, A., Privacy leakages in Smart Home Wireless Technologies, in 2014 IEEE International Carnahan Conference on Security Technology, Rome, Italy, 2014. (329.97 KB)
2013
L. Piras, Giacinto, G., and Paredes, R., Passive-Aggressive Online Learning for Relevance Feedback in Content Based Image Retrieval, in 2nd International Conference on Pattern Recognition Applications and Methods (ICPRAM), Barcelona, Spain, 2013. (138.32 KB)
F. Roli, Biggio, B., and Fumera, G., Pattern Recognition Systems Under Attack, in Progress in Pattern Recognition, Image Analysis, Computer Vision, and Applications, Proc. of the 18th Iberoamerican Congress on Pattern Recognition (CIARP 2013), LNCS, Havana, Cuba, 2013, vol. 8258, pp. 1-8. (314.35 KB)
R. Satta and Stirparo, P., Picture-to-Identity linking of social network accounts based on Sensor Pattern Noise, in 5th International Conference on Imaging for Crime Detection and Prevention (ICDP 2013), London, United Kingdom, 2013. (348.28 KB)
B. Biggio, Didaci, L., Fumera, G., and Roli, F., Poisoning attacks to compromise face templates, in 6th IAPR Int'l Conf. on Biometrics (ICB), Madrid, Spain, 2013. (844.61 KB)
2012
D. Maiorca, Giacinto, G., and Corona, I., A Pattern Recognition System for Malicious PDF Files Detection, in MLDM - International Conference on Machine Learning and Data Mining, Berlin, 2012, vol. 7376, pp. 510-524. (1.74 MB)
R. Tronci, Piras, L., and Giacinto, G., Performance Evaluation of Relevance Feedback for Image Retrieval by “Real-World” Multi-Tagged Image Datasets, International Journal of Multimedia Data Engineering and Management (IJMDEM), vol. 3, p. 16, 2012. (357.99 KB)
B. Biggio, Fumera, G., Roli, F., and Didaci, L., Poisoning adaptive biometric systems, in 9th Int'l Workshop on Statistical Techniques in Pattern Recognition (SPR 2012), 2012, vol. 7626, pp. 417-425. (637.79 KB)

Pages