B
B. Biggio, Rota Bulò, S., Pillai, I., Mura, M., Zemene Mequanint, E., Pelillo, M., and Roli, F.,
“Poisoning complete-linkage hierarchical clustering”, in
Joint IAPR Int'l Workshop on Structural, Syntactic, and Statistical Pattern Recognition (LNCS), Joensuu, Finland, 2014, vol. 8621, pp. 42-52.
(388.31 KB) B. Biggio,
“Adversarial Pattern Classification”, University of Cagliari, Cagliari (Italy), 2010.
(2.65 MB) B. Biggio, Fumera, G., Russu, P., Didaci, L., and Roli, F.,
“Adversarial Biometric Recognition: A Review on Biometric System Security from the Adversarial Machine Learning Perspective”,
IEEE Signal Processing Magazine, vol. 32, no. 5, pp. 31-41, 2015.
(751.08 KB) B. Biggio,
“On Learning and Recognition of Secure Patterns (Invited keynote at AISec '14)”, in
AISec'14: Proceedings of the 2014 ACM Workshop on Artificial Intelligence and Security, co-located with CCS '14, Scottsdale, Arizona, USA, 2014, pp. 1-2.
(110.67 KB) B. Biggio, Fumera, G., Pillai, I., and Roli, F.,
“A survey and experimental evaluation of image spam filtering techniques”,
Pattern Recognition Letters, vol. 32, pp. 1436 - 1446, 2011.
(2.12 MB) B. Biggio, Melis, M., Fumera, G., and Roli, F.,
“Sparse Support Faces”, in
Int'l Conf. on Biometrics (ICB), 2015, pp. 208-213.
(702.84 KB) B. Biggio, Nelson, B., and Laskov, P.,
“Poisoning attacks against support vector machines”, in
29th Int'l Conf. on Machine Learning (ICML), 2012, pp. 1807–1814.
(452.94 KB) B. Biggio, Didaci, L., Fumera, G., and Roli, F.,
“Poisoning attacks to compromise face templates”, in
6th IAPR Int'l Conf. on Biometrics (ICB), Madrid, Spain, 2013.
(844.61 KB) B. Biggio, Akhtar, Z., Fumera, G., Marcialis, G. L., and Roli, F.,
“Robustness of multi-modal biometric verification systems under realistic spoofing attacks”, in
Int’l Joint Conference on Biometrics (IJCB), Washington DC, USA, 2011.
(2.25 MB) B. Biggio, Fumera, G., and Roli, F.,
“Adversarial Pattern Classification Using Multiple Classifiers and Randomisation”, in
12th Joint IAPR International Workshop on Structural and Syntactic Pattern Recognition (SSPR 2008), Orlando, Florida, USA, 2008.
(395.38 KB) B. Biggio, Rieck, K., Ariu, D., Wressnegger, C., Corona, I., Giacinto, G., and Roli, F.,
“Poisoning Behavioral Malware Clustering”, in
AISec'14: Proceedings of the 2014 ACM Workshop on Artificial Intelligence and Security, co-located with CCS '14, Scottsdale, Arizona, USA, 2014, pp. 27-36.
(375.58 KB) B. Biggio, Fumera, G., and Roli, F.,
“Multiple Classifier Systems for Adversarial Classification Tasks”, in
8th Int. Workshop on Multiple Classifier Systems (MCS 2009), Reykjavik, Iceland, 2009, vol. 5519, pp. 132-141.
(459.88 KB) B. Biggio, Nelson, B., and Laskov, P.,
“Support Vector Machines Under Adversarial Label Noise”, in
Journal of Machine Learning Research - Proc. 3rd Asian Conference on Machine Learning (ACML 2011), Taoyuan, Taiwan, 2011, vol. 20, pp. 97-112.
(533.74 KB) B. Biggio, Fumera, G., and Roli, F.,
“Learning Sparse Kernel Machines with Biometric Similarity Functions for Identity Recognition”, in
IEEE 5th International Conference on Biometrics: Theory, Applications and Systems (BTAS 2012), Washington DC (USA), 2012, pp. 325 -330.
(336.11 KB) B. Biggio, Fumera, G., Pillai, I., and Roli, F.,
“Image Spam Filtering by Content Obscuring Detection”, in
Fourth Conference on Email and Anti-Spam (CEAS 2007), Microsoft Research Silicon Valley, Mountain View, California, 2007.
(486.14 KB) L. Borzacchiello, Coppa, E., Maiorca, D., Columbu, A., Demetrescu, C., and Giacinto, G.,
“Reach Me if You Can: On Native Vulnerability Reachability in Android Apps”,
27th European Symposium on Research in Computer Security (ESORICS). 2022.
(979.51 KB) L. Bruzzone, Conese, C., Maselli, F., and Roli, F.,
“Multisource classification of complex rural areas by statistical and neural-network approaches”,
Int. Journal on Photogrammetric Engineering and Remote Sensing (PE&RS), vol. 63, pp. 523-533, 1997.