Conference Paper
B. Biggio, Fumera, G., Roli, F., e Didaci, L.,
«Poisoning adaptive biometric systems», in
9th Int'l Workshop on Statistical Techniques in Pattern Recognition (SPR 2012), 2012, vol 7626, pagg 417-425.
(637.79 KB) F. Roli, Biggio, B., e Fumera, G.,
«Pattern Recognition Systems Under Attack», in
Progress in Pattern Recognition, Image Analysis, Computer Vision, and Applications, Proc. of the 18th Iberoamerican Congress on Pattern Recognition (CIARP 2013), LNCS, Havana, Cuba, 2013, vol 8258, pagg 1-8.
(314.35 KB) B. Biggio, Corona, I., He, Z. - M., Chan, P. P. K., Giacinto, G., Yeung, D. S., e Roli, F.,
«One-and-a-half-class Multiple Classifier Systems for Secure Learning against Evasion Attacks at Test Time», in
Int'l Workshop on Multiple Classifier Systems (MCS), 2015, vol 9132, pagg 168-180.
(467.23 KB) B. Biggio, Fumera, G., e Roli, F.,
«Multiple Classifier Systems under Attack», in
9th Int. Workshop on Multiple Classifier Systems (MCS 2010), Cairo, Egypt, 2010, vol 5997, pagg 74–83.
(231.42 KB) B. Biggio, Fumera, G., e Roli, F.,
«Multiple Classifier Systems for Adversarial Classification Tasks», in
8th Int. Workshop on Multiple Classifier Systems (MCS 2009), Reykjavik, Iceland, 2009, vol 5519, pagg 132-141.
(459.88 KB) B. Nelson, Biggio, B., e Laskov, P.,
«Microbagging Estimators: An Ensemble Approach to Distance-weighted Classifiers», in
Journal of Machine Learning Research - Proc. 3rd Asian Conference on Machine Learning (ACML 2011), Taoyuan, Taiwan, 2011, vol 20, pagg 63-79.
(481.46 KB) M. Jagielski, Oprea, A., Biggio, B., Liu, C., Nita-Rotaru, C., e Li, B.,
«Manipulating Machine Learning: Poisoning Attacks and Countermeasures for Regression Learning», in
39th IEEE Symposium on Security and Privacy, 2018.
(1.02 MB) B. Biggio, Fumera, G., e Roli, F.,
«Learning Sparse Kernel Machines with Biometric Similarity Functions for Identity Recognition», in
IEEE 5th International Conference on Biometrics: Theory, Applications and Systems (BTAS 2012), Washington DC (USA), 2012, pagg 325 -330.
(336.11 KB) B. Biggio,
«On Learning and Recognition of Secure Patterns (Invited keynote at AISec '14)», in
AISec'14: Proceedings of the 2014 ACM Workshop on Artificial Intelligence and Security, co-located with CCS '14, Scottsdale, Arizona, USA, 2014, pagg 1-2.
(110.67 KB) B. Biggio, Fumera, G., Pillai, I., e Roli, F.,
«Improving Image Spam Filtering Using Image Text Features», in
Fifth Conference on Email and Anti-Spam (CEAS 2008), Mountain View, CA, USA, 2008.
(154.27 KB) B. Biggio, Fumera, G., Pillai, I., e Roli, F.,
«Image Spam Filtering Using Visual Information», in
14th Int. Conf. on Image Analysis and Processing (ICIAP 2007), Modena, Italy, 2007, pagg 105–110.
(173.32 KB) G. Fumera, Pillai, I., Roli, F., e Biggio, B.,
«Image spam filtering using textual and visual information», in
MIT Spam Conference 2007, Cambridge, MA, USA, 2007.
(513.42 KB) F. Roli, Biggio, B., Fumera, G., Pillai, I., e Satta, R.,
«Image Spam Filtering by Detection of Adversarial Obfuscated Text», in
NIPS Workshop on Machine Learning in Adversarial Environments for Computer Security, Whistler, British Columbia, Canada, 2007.
(361.97 KB) B. Biggio, Fumera, G., Pillai, I., e Roli, F.,
«Image Spam Filtering by Content Obscuring Detection», in
Fourth Conference on Email and Anti-Spam (CEAS 2007), Microsoft Research Silicon Valley, Mountain View, California, 2007.
(486.14 KB) A. Emanuele Cinà, Vascon, S., Demontis, A., Biggio, B., Roli, F., e Pelillo, M.,
«The Hammer and the Nut: Is Bilevel Optimization Really Needed to Poison Linear Classifiers?», in
International Joint Conference on Neural Networks, (IJCNN) 2021, Shenzhen, China, 2021, pagg 1–8.
H. Xiao, Biggio, B., Brown, G., Fumera, G., Eckert, C., e Roli, F.,
«Is Feature Selection Secure against Training Data Poisoning?», in
32nd Int'l Conf. on Machine Learning (ICML) - JMLR W&CP, 2015, vol 32, pagg 1689-1698.
(1.54 MB) M. Melis, Piras, L., Biggio, B., Giacinto, G., Fumera, G., e Roli, F.,
«Fast Image Classification with Reduced Multiclass Support Vector Machines», in
18th Int'l Conf. on Image Analysis and Processing, Genova, Italy, 2015, vol Image Analysis and Processing (ICIAP 2015), pagg 78-88.
(829.37 KB) L. Demetrio, Biggio, B., Lagorio, G., Roli, F., e Armando, A.,
«Explaining Vulnerabilities of Deep Learning to Adversarial Malware Binaries», in
3rd Italian Conference on Cyber Security, ITASEC 2019, Pisa, Italy, 2019, vol 2315.
(801.85 KB) M. Melis, Maiorca, D., Biggio, B., Giacinto, G., e Roli, F.,
«Explaining Black-box Android Malware Detection», in
26th European Signal Processing Conference (EUSIPCO '18), Rome, Italy, 2018, pagg 524-528.
(431.78 KB) A. Sotgiu, Pintor, M., e Biggio, B.,
«Explainability-Based Debugging of Machine Learning for Vulnerability Discovery», in
Proc. 17th International Conference on Availability, Reliability and Security, New York, NY, USA, 2022.
B. Biggio, Corona, I., Maiorca, D., Nelson, B., Srndic, N., Laskov, P., Giacinto, G., e Roli, F.,
«Evasion attacks against machine learning at test time», in
European Conference on Machine Learning and Principles and Practice of Knowledge Discovery in Databases (ECML PKDD), 2013, vol 8190, pagg 387-402.
(473.78 KB) B. Biggio, Fumera, G., e Roli, F.,
«Evade Hard Multiple Classifier Systems», in
Workshop on Supervised and Unsupervised Ensemble Methods and Their Applications (SUEMA 2008), Patras, Greece, 2008.
(185.01 KB) D. Maiorca, Russu, P., Corona, I., Biggio, B., e Giacinto, G.,
«Detection of Malicious Scripting Code through Discriminant and Adversary-Aware API Analysis», in
1st Italian Conference on CyberSecurity (ITASEC), 2017, vol 1816, pagg 96-105.
(371.53 KB)