Conference Paper
B. Biggio, Fumera, G., Pillai, I., e Roli, F.,
«Image Spam Filtering by Content Obscuring Detection», in
Fourth Conference on Email and Anti-Spam (CEAS 2007), Microsoft Research Silicon Valley, Mountain View, California, 2007.
(486.14 KB) F. Roli, Biggio, B., Fumera, G., Pillai, I., e Satta, R.,
«Image Spam Filtering by Detection of Adversarial Obfuscated Text», in
NIPS Workshop on Machine Learning in Adversarial Environments for Computer Security, Whistler, British Columbia, Canada, 2007.
(361.97 KB) G. Fumera, Pillai, I., Roli, F., e Biggio, B.,
«Image spam filtering using textual and visual information», in
MIT Spam Conference 2007, Cambridge, MA, USA, 2007.
(513.42 KB) B. Biggio, Fumera, G., Pillai, I., e Roli, F.,
«Image Spam Filtering Using Visual Information», in
14th Int. Conf. on Image Analysis and Processing (ICIAP 2007), Modena, Italy, 2007, pagg 105–110.
(173.32 KB) B. Biggio, Fumera, G., Pillai, I., e Roli, F.,
«Improving Image Spam Filtering Using Image Text Features», in
Fifth Conference on Email and Anti-Spam (CEAS 2008), Mountain View, CA, USA, 2008.
(154.27 KB) B. Biggio,
«On Learning and Recognition of Secure Patterns (Invited keynote at AISec '14)», in
AISec'14: Proceedings of the 2014 ACM Workshop on Artificial Intelligence and Security, co-located with CCS '14, Scottsdale, Arizona, USA, 2014, pagg 1-2.
(110.67 KB) B. Biggio, Fumera, G., e Roli, F.,
«Learning Sparse Kernel Machines with Biometric Similarity Functions for Identity Recognition», in
IEEE 5th International Conference on Biometrics: Theory, Applications and Systems (BTAS 2012), Washington DC (USA), 2012, pagg 325 -330.
(336.11 KB) M. Jagielski, Oprea, A., Biggio, B., Liu, C., Nita-Rotaru, C., e Li, B.,
«Manipulating Machine Learning: Poisoning Attacks and Countermeasures for Regression Learning», in
39th IEEE Symposium on Security and Privacy, 2018.
(1.02 MB) B. Nelson, Biggio, B., e Laskov, P.,
«Microbagging Estimators: An Ensemble Approach to Distance-weighted Classifiers», in
Journal of Machine Learning Research - Proc. 3rd Asian Conference on Machine Learning (ACML 2011), Taoyuan, Taiwan, 2011, vol 20, pagg 63-79.
(481.46 KB) B. Biggio, Fumera, G., e Roli, F.,
«Multiple Classifier Systems for Adversarial Classification Tasks», in
8th Int. Workshop on Multiple Classifier Systems (MCS 2009), Reykjavik, Iceland, 2009, vol 5519, pagg 132-141.
(459.88 KB) B. Biggio, Fumera, G., e Roli, F.,
«Multiple Classifier Systems under Attack», in
9th Int. Workshop on Multiple Classifier Systems (MCS 2010), Cairo, Egypt, 2010, vol 5997, pagg 74–83.
(231.42 KB) B. Biggio, Corona, I., He, Z. - M., Chan, P. P. K., Giacinto, G., Yeung, D. S., e Roli, F.,
«One-and-a-half-class Multiple Classifier Systems for Secure Learning against Evasion Attacks at Test Time», in
Int'l Workshop on Multiple Classifier Systems (MCS), 2015, vol 9132, pagg 168-180.
(467.23 KB) F. Roli, Biggio, B., e Fumera, G.,
«Pattern Recognition Systems Under Attack», in
Progress in Pattern Recognition, Image Analysis, Computer Vision, and Applications, Proc. of the 18th Iberoamerican Congress on Pattern Recognition (CIARP 2013), LNCS, Havana, Cuba, 2013, vol 8258, pagg 1-8.
(314.35 KB) B. Biggio, Fumera, G., Roli, F., e Didaci, L.,
«Poisoning adaptive biometric systems», in
9th Int'l Workshop on Statistical Techniques in Pattern Recognition (SPR 2012), 2012, vol 7626, pagg 417-425.
(637.79 KB) B. Biggio, Nelson, B., e Laskov, P.,
«Poisoning attacks against support vector machines», in
29th Int'l Conf. on Machine Learning (ICML), 2012, pagg 1807–1814.
(452.94 KB) D. Solans, Biggio, B., e Castillo, C.,
«Poisoning Attacks on Algorithmic Fairness», in
Machine Learning and Knowledge Discovery in Databases (ECML PKDD 2020), 2021, pag 162--177.
(1.05 MB) M. Kravchik, Biggio, B., e Shabtai, A.,
«Poisoning Attacks on Cyber Attack Detectors for Industrial Control Systems», in
Proceedings of the 36th Annual ACM Symposium on Applied Computing, New York, NY, USA, 2021, pagg 116–125.
B. Biggio, Didaci, L., Fumera, G., e Roli, F.,
«Poisoning attacks to compromise face templates», in
6th IAPR Int'l Conf. on Biometrics (ICB), Madrid, Spain, 2013.
(844.61 KB) B. Biggio, Rieck, K., Ariu, D., Wressnegger, C., Corona, I., Giacinto, G., e Roli, F.,
«Poisoning Behavioral Malware Clustering», in
AISec'14: Proceedings of the 2014 ACM Workshop on Artificial Intelligence and Security, co-located with CCS '14, Scottsdale, Arizona, USA, 2014, pagg 27-36.
(375.58 KB) B. Biggio, Rota Bulò, S., Pillai, I., Mura, M., Zemene Mequanint, E., Pelillo, M., e Roli, F.,
«Poisoning complete-linkage hierarchical clustering», in
Joint IAPR Int'l Workshop on Structural, Syntactic, and Statistical Pattern Recognition (LNCS), Joensuu, Finland, 2014, vol 8621, pagg 42-52.
(388.31 KB) R. Labaca-Castro, Biggio, B., e Rodosek, G. Dreo,
«Poster: Attacking Malware Classifiers by Crafting Gradient-Attacks That Preserve Functionality», in
Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications Security, New York, NY, USA, 2019, pagg 2565–2567.
Z. Akhtar, Biggio, B., Fumera, G., e Marcialis, G. L.,
«Robustness of Multi-modal Biometric Systems under Realistic Spoof Attacks against All Traits», in
IEEE Workshop on Biometric Measurements and Systems for Security and Medical Applications (BioMS), Milan, Italy, 2011, pagg 5-10.
(954 KB) B. Biggio, Akhtar, Z., Fumera, G., Marcialis, G. L., e Roli, F.,
«Robustness of multi-modal biometric verification systems under realistic spoofing attacks», in
Int’l Joint Conference on Biometrics (IJCB), Washington DC, USA, 2011.
(2.25 MB) P. Russu, Demontis, A., Biggio, B., Fumera, G., e Roli, F.,
«Secure Kernel Machines against Evasion Attacks», in
9th ACM Workshop on Artificial Intelligence and Security, Vienna, Austria, 2016, pagg 59-69.
(686.41 KB)