Publications

Export 87 results:
Filters: Author is Battista Biggio  [Clear All Filters]
A B C D E F G H I J K L M N O P Q R S T U V W X Y Z 
I
B. Biggio, Fumera, G., Pillai, I., e Roli, F., «Image Spam Filtering by Content Obscuring Detection», in Fourth Conference on Email and Anti-Spam (CEAS 2007), Microsoft Research Silicon Valley, Mountain View, California, 2007. (486.14 KB)
H
A. Emanuele Cinà, Vascon, S., Demontis, A., Biggio, B., Roli, F., e Pelillo, M., «The Hammer and the Nut: Is Bilevel Optimization Really Needed to Poison Linear Classifiers?», in International Joint Conference on Neural Networks, (IJCNN) 2021, Shenzhen, China, 2021, pagg 1–8.
F
L. Demetrio, Biggio, B., Lagorio, G., Roli, F., e Armando, A., «Functionality-Preserving Black-Box Optimization of Adversarial Windows Malware», IEEE Transactions on Information Forensics and Security, vol 16, pagg 3469-3478, 2021.
H. Xiao, Biggio, B., Brown, G., Fumera, G., Eckert, C., e Roli, F., «Is Feature Selection Secure against Training Data Poisoning?», in 32nd Int'l Conf. on Machine Learning (ICML) - JMLR W&CP, 2015, vol 32, pagg 1689-1698. (1.54 MB)
M. Pintor, Roli, F., Brendel, W., e Biggio, B., «Fast Minimum-norm Adversarial Attacks through Adaptive Norm Constraints», in NeurIPS, 2021.
M. Melis, Piras, L., Biggio, B., Giacinto, G., Fumera, G., e Roli, F., «Fast Image Classification with Reduced Multiclass Support Vector Machines», in 18th Int'l Conf. on Image Analysis and Processing, Genova, Italy, 2015, vol Image Analysis and Processing (ICIAP 2015), pagg 78-88. (829.37 KB)
F. Crecchi, Melis, M., Sotgiu, A., Bacciu, D., e Biggio, B., «FADER: Fast adversarial example rejection», Neurocomputing, vol 470, pagg 257-268, 2022.
E
L. Demetrio, Biggio, B., Lagorio, G., Roli, F., e Armando, A., «Explaining Vulnerabilities of Deep Learning to Adversarial Malware Binaries», in 3rd Italian Conference on Cyber Security, ITASEC 2019, Pisa, Italy, 2019, vol 2315. (801.85 KB)
M. Melis, Maiorca, D., Biggio, B., Giacinto, G., e Roli, F., «Explaining Black-box Android Malware Detection», in 26th European Signal Processing Conference (EUSIPCO '18), Rome, Italy, 2018, pagg 524-528. (431.78 KB)
B. Biggio, Corona, I., Maiorca, D., Nelson, B., Srndic, N., Laskov, P., Giacinto, G., e Roli, F., «Evasion attacks against machine learning at test time», in European Conference on Machine Learning and Principles and Practice of Knowledge Discovery in Databases (ECML PKDD), 2013, vol 8190, pagg 387-402. (473.78 KB)
B. Biggio, Fumera, G., Pillai, I., Roli, F., e Satta, R., «Evading SpamAssassin with obfuscated text images», Virus Bulletin, n° 11-2007, 2007. (689 KB)
B. Biggio, Fumera, G., e Roli, F., «Evade Hard Multiple Classifier Systems», in Workshop on Supervised and Unsupervised Ensemble Methods and Their Applications (SUEMA 2008), Patras, Greece, 2008. (185.01 KB)
B. Biggio, Fumera, G., e Roli, F., «Evade Hard Multiple Classifier Systems», in Supervised and Unsupervised Ensemble Methods and Their Applications, vol 245, O. Okun e Valentini, G. Springer Berlin / Heidelberg, 2009, pagg 15-38. (562.89 KB)
P. Temple, Perrouin, G., Acher, M., Biggio, B., Jézéquel, J. - M., e Roli, F., «Empirical Assessment of Generating Adversarial Configurations for Software Product Lines», Empirical Software Engineering, vol 26, n° 6, 2021. (1.29 MB)
D
D. Maiorca e Biggio, B., «Digital Investigation of PDF Files: Unveiling Traces of Embedded Malware», IEEE Security and Privacy: Special Issue on Digital Forensics, vol 17, n° 1, pagg 63-71, 2019. (838.95 KB)
D. Maiorca, Russu, P., Corona, I., Biggio, B., e Giacinto, G., «Detection of Malicious Scripting Code through Discriminant and Adversary-Aware API Analysis», in 1st Italian Conference on CyberSecurity (ITASEC), 2017, vol 1816, pagg 96-105. (371.53 KB)
M. Ahmadi, Biggio, B., Arzt, S., Ariu, D., e Giacinto, G., «Detecting Misuse of Google Cloud Messaging in Android Badware», in 6th Workshop on Security and Privacy in Smartphones and Mobile Devices (SPSM), Vienna, Austria, 2016, pagg 103-112. (626.38 KB)
F. Crecchi, Bacciu, D., e Biggio, B., «Detecting Adversarial Examples through Nonlinear Dimensionality Reduction», in 27th European Symposium on Artificial Neural Networks, Computational Intelligence and Machine Learning - ESANN '19, 2019, pagg 483-488. (552.39 KB)
B. Biggio, Fumera, G., e Roli, F., «Design of Robust Classifiers for Adversarial Environments», in IEEE International Conference on Systems, Man, and Cybernetics (SMC 2011), Anchorage, Alaska, USA, 2011, pagg 977–982. (328.68 KB)
I. Corona, Biggio, B., Contini, M., Piras, L., Corda, R., Mereu, M., Mureddu, G., Ariu, D., e Roli, F., «DeltaPhish: Detecting Phishing Webpages in Compromised Websites», 22nd European Symposium on Research in Computer Security (ESORICS), vol 10492. Springer International Publishing, Norway, September 11-15, 2017, pagg 370–388, 2017. (4.13 MB)
P. Piredda, Ariu, D., Biggio, B., Corona, I., Piras, L., Giacinto, G., e Roli, F., «Deepsquatting: Learning-based Typosquatting Detection at Deeper Domain Levels», in 16th International Conference of the Italian Association for Artificial Intelligence (AI*IA 2017), 2017, vol 10640 of LNCS, pagg 347-358. (1.21 MB)
A. Sotgiu, Demontis, A., Melis, M., Biggio, B., Fumera, G., Feng, X., e Roli, F., «Deep Neural Rejection against Adversarial Examples», EURASIP Journal on Information Security, vol 5, 2020.
M. Melis, Demontis, A., Biggio, B., Brown, G., Fumera, G., e Roli, F., «Is Deep Learning Safe for Robot Vision? Adversarial Examples against the iCub Humanoid», in ICCV 2017 Workshop on Vision in Practice on Autonomous Robots (ViPAR), Venice, Italy, 2017, vol 2017 IEEE International Conference on Computer Vision Workshops (ICCVW), pagg 751-759. (3.16 MB)
G. Ennas, Biggio, B., e Di Guardo, M. Chiara, «Data-driven Journal Meta-ranking in Business and Management», Scientometrics, pagg 1-19, 2015. (896.37 KB)
B. Biggio, Pillai, I., Rota Bulò, S., Ariu, D., Pelillo, M., e Roli, F., «Is Data Clustering in Adversarial Settings Secure?», in AISec'13: Proceedings of the 2013 ACM Workshop on Artificial Intelligence and Security, Berlin, 2013, pagg 87-98. (300.52 KB)

Pages