Publications

Export 90 results:
Filters: Author is Battista Biggio  [Clear All Filters]
Conference Paper
B. Biggio, Fumera, G., Pillai, I., and Roli, F., Image Spam Filtering by Content Obscuring Detection, in Fourth Conference on Email and Anti-Spam (CEAS 2007), Microsoft Research Silicon Valley, Mountain View, California, 2007. (486.14 KB)
F. Roli, Biggio, B., Fumera, G., Pillai, I., and Satta, R., Image Spam Filtering by Detection of Adversarial Obfuscated Text, in NIPS Workshop on Machine Learning in Adversarial Environments for Computer Security, Whistler, British Columbia, Canada, 2007. (361.97 KB)
G. Fumera, Pillai, I., Roli, F., and Biggio, B., Image spam filtering using textual and visual information, in MIT Spam Conference 2007, Cambridge, MA, USA, 2007. (513.42 KB)
B. Biggio, Fumera, G., Pillai, I., and Roli, F., Image Spam Filtering Using Visual Information, in 14th Int. Conf. on Image Analysis and Processing (ICIAP 2007), Modena, Italy, 2007, pp. 105–110. (173.32 KB)
B. Biggio, Fumera, G., Pillai, I., and Roli, F., Improving Image Spam Filtering Using Image Text Features, in Fifth Conference on Email and Anti-Spam (CEAS 2008), Mountain View, CA, USA, 2008. (154.27 KB)
B. Biggio, On Learning and Recognition of Secure Patterns (Invited keynote at AISec '14), in AISec'14: Proceedings of the 2014 ACM Workshop on Artificial Intelligence and Security, co-located with CCS '14, Scottsdale, Arizona, USA, 2014, pp. 1-2. (110.67 KB)
B. Biggio, Fumera, G., and Roli, F., Learning Sparse Kernel Machines with Biometric Similarity Functions for Identity Recognition, in IEEE 5th International Conference on Biometrics: Theory, Applications and Systems (BTAS 2012), Washington DC (USA), 2012, pp. 325 -330. (336.11 KB)
B. Biggio, Machine Learning under Attack: Vulnerability Exploitation and Security Measures (Invited Keynote at IH&MMSec '16), in 4th ACM Workshop on Information Hiding & Multimedia Security, Vigo, Spain, 2016, pp. 1-2. (138.98 KB)
M. Jagielski, Oprea, A., Biggio, B., Liu, C., Nita-Rotaru, C., and Li, B., Manipulating Machine Learning: Poisoning Attacks and Countermeasures for Regression Learning, in 39th IEEE Symposium on Security and Privacy, 2018. (1.02 MB)
B. Nelson, Biggio, B., and Laskov, P., Microbagging Estimators: An Ensemble Approach to Distance-weighted Classifiers, in Journal of Machine Learning Research - Proc. 3rd Asian Conference on Machine Learning (ACML 2011), Taoyuan, Taiwan, 2011, vol. 20, pp. 63-79. (481.46 KB)
B. Biggio, Fumera, G., and Roli, F., Multiple Classifier Systems for Adversarial Classification Tasks, in 8th Int. Workshop on Multiple Classifier Systems (MCS 2009), Reykjavik, Iceland, 2009, vol. 5519, pp. 132-141. (459.88 KB)
B. Biggio, Fumera, G., and Roli, F., Multiple Classifier Systems under Attack, in 9th Int. Workshop on Multiple Classifier Systems (MCS 2010), Cairo, Egypt, 2010, vol. 5997, pp. 74–83. (231.42 KB)
B. Biggio, Corona, I., He, Z. - M., Chan, P. P. K., Giacinto, G., Yeung, D. S., and Roli, F., One-and-a-half-class Multiple Classifier Systems for Secure Learning against Evasion Attacks at Test Time, in Int'l Workshop on Multiple Classifier Systems (MCS), 2015, vol. 9132, pp. 168-180. (467.23 KB)
F. Roli, Biggio, B., and Fumera, G., Pattern Recognition Systems Under Attack, in Progress in Pattern Recognition, Image Analysis, Computer Vision, and Applications, Proc. of the 18th Iberoamerican Congress on Pattern Recognition (CIARP 2013), LNCS, Havana, Cuba, 2013, vol. 8258, pp. 1-8. (314.35 KB)
B. Biggio, Fumera, G., Roli, F., and Didaci, L., Poisoning adaptive biometric systems, in 9th Int'l Workshop on Statistical Techniques in Pattern Recognition (SPR 2012), 2012, vol. 7626, pp. 417-425. (637.79 KB)
B. Biggio, Nelson, B., and Laskov, P., Poisoning attacks against support vector machines, in 29th Int'l Conf. on Machine Learning (ICML), 2012, pp. 1807–1814. (452.94 KB)
D. Solans, Biggio, B., and Castillo, C., Poisoning Attacks on Algorithmic Fairness, in Machine Learning and Knowledge Discovery in Databases (ECML PKDD 2020), 2021, p. 162--177. (1.05 MB)
M. Kravchik, Biggio, B., and Shabtai, A., Poisoning Attacks on Cyber Attack Detectors for Industrial Control Systems, in Proceedings of the 36th Annual ACM Symposium on Applied Computing, New York, NY, USA, 2021, pp. 116–125.
B. Biggio, Didaci, L., Fumera, G., and Roli, F., Poisoning attacks to compromise face templates, in 6th IAPR Int'l Conf. on Biometrics (ICB), Madrid, Spain, 2013. (844.61 KB)
B. Biggio, Rieck, K., Ariu, D., Wressnegger, C., Corona, I., Giacinto, G., and Roli, F., Poisoning Behavioral Malware Clustering, in AISec'14: Proceedings of the 2014 ACM Workshop on Artificial Intelligence and Security, co-located with CCS '14, Scottsdale, Arizona, USA, 2014, pp. 27-36. (375.58 KB)
B. Biggio, Rota Bulò, S., Pillai, I., Mura, M., Zemene Mequanint, E., Pelillo, M., and Roli, F., Poisoning complete-linkage hierarchical clustering, in Joint IAPR Int'l Workshop on Structural, Syntactic, and Statistical Pattern Recognition (LNCS), Joensuu, Finland, 2014, vol. 8621, pp. 42-52. (388.31 KB)
R. Labaca-Castro, Biggio, B., and Rodosek, G. Dreo, Poster: Attacking Malware Classifiers by Crafting Gradient-Attacks That Preserve Functionality, in Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications Security, New York, NY, USA, 2019, pp. 2565–2567.
Z. Akhtar, Biggio, B., Fumera, G., and Marcialis, G. L., Robustness of Multi-modal Biometric Systems under Realistic Spoof Attacks against All Traits, in IEEE Workshop on Biometric Measurements and Systems for Security and Medical Applications (BioMS), Milan, Italy, 2011, pp. 5-10. (954 KB)
B. Biggio, Akhtar, Z., Fumera, G., Marcialis, G. L., and Roli, F., Robustness of multi-modal biometric verification systems under realistic spoofing attacks, in Int’l Joint Conference on Biometrics (IJCB), Washington DC, USA, 2011. (2.25 MB)
P. Russu, Demontis, A., Biggio, B., Fumera, G., and Roli, F., Secure Kernel Machines against Evasion Attacks, in 9th ACM Workshop on Artificial Intelligence and Security, Vienna, Austria, 2016, pp. 59-69. (686.41 KB)

Pages