Publications

Export 90 results:
Filters: Author is Battista Biggio  [Clear All Filters]
A B C D E F G H I J K L M N O P Q R S T U V W X Y Z 
E
B. Biggio, Fumera, G., and Roli, F., Evade Hard Multiple Classifier Systems, in Supervised and Unsupervised Ensemble Methods and Their Applications, vol. 245, O. Okun and Valentini, G. Springer Berlin / Heidelberg, 2009, pp. 15-38. (562.89 KB)
B. Biggio, Fumera, G., and Roli, F., Evade Hard Multiple Classifier Systems, in Workshop on Supervised and Unsupervised Ensemble Methods and Their Applications (SUEMA 2008), Patras, Greece, 2008. (185.01 KB)
B. Biggio, Fumera, G., Pillai, I., Roli, F., and Satta, R., Evading SpamAssassin with obfuscated text images, Virus Bulletin, no. 11-2007, 2007. (689 KB)
B. Biggio, Corona, I., Maiorca, D., Nelson, B., Srndic, N., Laskov, P., Giacinto, G., and Roli, F., Evasion attacks against machine learning at test time, in European Conference on Machine Learning and Principles and Practice of Knowledge Discovery in Databases (ECML PKDD), 2013, vol. 8190, pp. 387-402. (473.78 KB)
A. Sotgiu, Pintor, M., and Biggio, B., Explainability-Based Debugging of Machine Learning for Vulnerability Discovery, in Proc. 17th International Conference on Availability, Reliability and Security, New York, NY, USA, 2022.
M. Melis, Maiorca, D., Biggio, B., Giacinto, G., and Roli, F., Explaining Black-box Android Malware Detection, in 26th European Signal Processing Conference (EUSIPCO '18), Rome, Italy, 2018, pp. 524-528. (431.78 KB)
L. Demetrio, Biggio, B., Lagorio, G., Roli, F., and Armando, A., Explaining Vulnerabilities of Deep Learning to Adversarial Malware Binaries, in 3rd Italian Conference on Cyber Security, ITASEC 2019, Pisa, Italy, 2019, vol. 2315. (801.85 KB)
F
F. Crecchi, Melis, M., Sotgiu, A., Bacciu, D., and Biggio, B., FADER: Fast adversarial example rejection, Neurocomputing, vol. 470, pp. 257-268, 2022.
M. Melis, Piras, L., Biggio, B., Giacinto, G., Fumera, G., and Roli, F., Fast Image Classification with Reduced Multiclass Support Vector Machines, in 18th Int'l Conf. on Image Analysis and Processing, Genova, Italy, 2015, vol. Image Analysis and Processing (ICIAP 2015), pp. 78-88. (829.37 KB)
M. Pintor, Roli, F., Brendel, W., and Biggio, B., Fast Minimum-norm Adversarial Attacks through Adaptive Norm Constraints, in NeurIPS, 2021.
H. Xiao, Biggio, B., Brown, G., Fumera, G., Eckert, C., and Roli, F., Is Feature Selection Secure against Training Data Poisoning?, in 32nd Int'l Conf. on Machine Learning (ICML) - JMLR W&CP, 2015, vol. 32, pp. 1689-1698. (1.54 MB)
L. Demetrio, Biggio, B., Lagorio, G., Roli, F., and Armando, A., Functionality-Preserving Black-Box Optimization of Adversarial Windows Malware, IEEE Transactions on Information Forensics and Security, vol. 16, pp. 3469-3478, 2021.
H
A. Emanuele Cinà, Vascon, S., Demontis, A., Biggio, B., Roli, F., and Pelillo, M., The Hammer and the Nut: Is Bilevel Optimization Really Needed to Poison Linear Classifiers?, in International Joint Conference on Neural Networks, (IJCNN) 2021, Shenzhen, China, 2021, pp. 1–8.
I
B. Biggio, Fumera, G., Pillai, I., and Roli, F., Image Spam Filtering by Content Obscuring Detection, in Fourth Conference on Email and Anti-Spam (CEAS 2007), Microsoft Research Silicon Valley, Mountain View, California, 2007. (486.14 KB)
F. Roli, Biggio, B., Fumera, G., Pillai, I., and Satta, R., Image Spam Filtering by Detection of Adversarial Obfuscated Text, in NIPS Workshop on Machine Learning in Adversarial Environments for Computer Security, Whistler, British Columbia, Canada, 2007. (361.97 KB)
G. Fumera, Pillai, I., Roli, F., and Biggio, B., Image spam filtering using textual and visual information, in MIT Spam Conference 2007, Cambridge, MA, USA, 2007. (513.42 KB)
B. Biggio, Fumera, G., Pillai, I., and Roli, F., Image Spam Filtering Using Visual Information, in 14th Int. Conf. on Image Analysis and Processing (ICIAP 2007), Modena, Italy, 2007, pp. 105–110. (173.32 KB)
B. Biggio, Fumera, G., Pillai, I., and Roli, F., Improving Image Spam Filtering Using Image Text Features, in Fifth Conference on Email and Anti-Spam (CEAS 2008), Mountain View, CA, USA, 2008. (154.27 KB)
A. Demontis, Biggio, B., Fumera, G., Giacinto, G., and Roli, F., Infinity-norm Support Vector Machines against Adversarial Label Contamination, 1st Italian Conference on CyberSecurity (ITASEC). Venice, Italy , pp. 106-115, 2017. (504.93 KB)
L
B. Biggio, On Learning and Recognition of Secure Patterns (Invited keynote at AISec '14), in AISec'14: Proceedings of the 2014 ACM Workshop on Artificial Intelligence and Security, co-located with CCS '14, Scottsdale, Arizona, USA, 2014, pp. 1-2. (110.67 KB)
B. Biggio, Fumera, G., and Roli, F., Learning Sparse Kernel Machines with Biometric Similarity Functions for Identity Recognition, in IEEE 5th International Conference on Biometrics: Theory, Applications and Systems (BTAS 2012), Washington DC (USA), 2012, pp. 325 -330. (336.11 KB)
M
B. Biggio, Machine Learning under Attack: Vulnerability Exploitation and Security Measures (Invited Keynote at IH&MMSec '16), in 4th ACM Workshop on Information Hiding & Multimedia Security, Vigo, Spain, 2016, pp. 1-2. (138.98 KB)
M. Jagielski, Oprea, A., Biggio, B., Liu, C., Nita-Rotaru, C., and Li, B., Manipulating Machine Learning: Poisoning Attacks and Countermeasures for Regression Learning, in 39th IEEE Symposium on Security and Privacy, 2018. (1.02 MB)
B. Nelson, Biggio, B., and Laskov, P., Microbagging Estimators: An Ensemble Approach to Distance-weighted Classifiers, in Journal of Machine Learning Research - Proc. 3rd Asian Conference on Machine Learning (ACML 2011), Taoyuan, Taiwan, 2011, vol. 20, pp. 63-79. (481.46 KB)
G. Fumera, Marcialis, G. L., Biggio, B., Roli, F., and Schuckers, S. C., Multimodal Anti-Spoofing in Biometric Recognition Systems, in Handbook of Biometric Anti-Spoofing, S. Marcel, Nixon, M., and Li, S. Z. Springer, 2014, pp. 165-184. (155.83 KB)

Pages