Publications

Export 90 results:
Filters: Author is Battista Biggio  [Clear All Filters]
A B C D E F G H I J K L M N O P Q R S T U V W X Y Z 
M
B. Biggio, Fumera, G., e Roli, F., «Multiple Classifier Systems for Adversarial Classification Tasks», in 8th Int. Workshop on Multiple Classifier Systems (MCS 2009), Reykjavik, Iceland, 2009, vol 5519, pagg 132-141. (459.88 KB)
B. Biggio, Fumera, G., e Roli, F., «Multiple Classifier Systems for Robust Classifier Design in Adversarial Environments», Journal of Machine Learning and Cybernetics, vol 1, pagg 27–41, 2010. (844.91 KB)
B. Biggio, Fumera, G., e Roli, F., «Multiple Classifier Systems under Attack», in 9th Int. Workshop on Multiple Classifier Systems (MCS 2010), Cairo, Egypt, 2010, vol 5997, pagg 74–83. (231.42 KB)
P
F. Roli, Biggio, B., e Fumera, G., «Pattern Recognition Systems Under Attack», in Progress in Pattern Recognition, Image Analysis, Computer Vision, and Applications, Proc. of the 18th Iberoamerican Congress on Pattern Recognition (CIARP 2013), LNCS, Havana, Cuba, 2013, vol 8258, pagg 1-8. (314.35 KB)
B. Biggio, Fumera, G., e Roli, F., «Pattern Recognition Systems under Attack: Design Issues and Research Challenges», Int'l J. Patt. Recogn. Artif. Intell., vol 28, n° 7, pag 1460002, 2014. (1.41 MB)
B. Biggio, Fumera, G., Roli, F., e Didaci, L., «Poisoning adaptive biometric systems», in 9th Int'l Workshop on Statistical Techniques in Pattern Recognition (SPR 2012), 2012, vol 7626, pagg 417-425. (637.79 KB)
B. Biggio, Nelson, B., e Laskov, P., «Poisoning attacks against support vector machines», in 29th Int'l Conf. on Machine Learning (ICML), 2012, pagg 1807–1814. (452.94 KB)
D. Solans, Biggio, B., e Castillo, C., «Poisoning Attacks on Algorithmic Fairness», in Machine Learning and Knowledge Discovery in Databases (ECML PKDD 2020), 2021, pag 162--177. (1.05 MB)
M. Kravchik, Biggio, B., e Shabtai, A., «Poisoning Attacks on Cyber Attack Detectors for Industrial Control Systems», in Proceedings of the 36th Annual ACM Symposium on Applied Computing, New York, NY, USA, 2021, pagg 116–125.
B. Biggio, Didaci, L., Fumera, G., e Roli, F., «Poisoning attacks to compromise face templates», in 6th IAPR Int'l Conf. on Biometrics (ICB), Madrid, Spain, 2013. (844.61 KB)
B. Biggio, Rieck, K., Ariu, D., Wressnegger, C., Corona, I., Giacinto, G., e Roli, F., «Poisoning Behavioral Malware Clustering», in AISec'14: Proceedings of the 2014 ACM Workshop on Artificial Intelligence and Security, co-located with CCS '14, Scottsdale, Arizona, USA, 2014, pagg 27-36. (375.58 KB)
B. Biggio, Rota Bulò, S., Pillai, I., Mura, M., Zemene Mequanint, E., Pelillo, M., e Roli, F., «Poisoning complete-linkage hierarchical clustering», in Joint IAPR Int'l Workshop on Structural, Syntactic, and Statistical Pattern Recognition (LNCS), Joensuu, Finland, 2014, vol 8621, pagg 42-52. (388.31 KB)
R. Labaca-Castro, Biggio, B., e Rodosek, G. Dreo, «Poster: Attacking Malware Classifiers by Crafting Gradient-Attacks That Preserve Functionality», in Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications Security, New York, NY, USA, 2019, pagg 2565–2567.
R
S. Rota Bulò, Biggio, B., Pillai, I., Pelillo, M., e Roli, F., «Randomized Prediction Games for Adversarial Machine Learning», IEEE Transactions on Neural Networks and Learning Systems, vol 28, n° 11, pagg 2466-2478, 2017. (1.52 MB) (256.21 KB)
Z. Akhtar, Biggio, B., Fumera, G., e Marcialis, G. L., «Robustness of Multi-modal Biometric Systems under Realistic Spoof Attacks against All Traits», in IEEE Workshop on Biometric Measurements and Systems for Security and Medical Applications (BioMS), Milan, Italy, 2011, pagg 5-10. (954 KB)
B. Biggio, Akhtar, Z., Fumera, G., Marcialis, G. L., e Roli, F., «Robustness of multi-modal biometric verification systems under realistic spoofing attacks», in Int’l Joint Conference on Biometrics (IJCB), Washington DC, USA, 2011. (2.25 MB)
S
M. Pintor, Demetrio, L., Sotgiu, A., Melis, M., Demontis, A., e Biggio, B., «secml: A Python Library for Secure and Explainable Machine Learning», SoftwareX, 2022.
P. Russu, Demontis, A., Biggio, B., Fumera, G., e Roli, F., «Secure Kernel Machines against Evasion Attacks», in 9th ACM Workshop on Artificial Intelligence and Security, Vienna, Austria, 2016, pagg 59-69. (686.41 KB)
A. Demontis, Russu, P., Biggio, B., Fumera, G., e Roli, F., «On Security and Sparsity of Linear Classifiers for Adversarial Settings», in Joint IAPR Int'l Workshop on Structural, Syntactic, and Statistical Pattern Recognition, Merida, Mexico, 2016, vol 10029 of LNCS, pagg 322-332. (425.68 KB)
B. Biggio, Akhtar, Z., Fumera, G., Marcialis, G. L., e Roli, F., «Security evaluation of biometric authentication systems under real spoofing attacks», IET Biometrics, vol 1, n° 1, pagg 11-24, 2012. (3.21 MB)
B. Biggio, Fumera, G., e Roli, F., «Security evaluation of pattern classifiers under attack», IEEE Transactions on Knowledge and Data Engineering, vol 26, n° 4, pagg 984-996, 2014. (1.35 MB)
B. Biggio, Corona, I., Nelson, B., Rubinstein, B. I. P., Maiorca, D., Fumera, G., Giacinto, G., e Roli, F., «Security Evaluation of Support Vector Machines in Adversarial Environments», in Support Vector Machines Applications, Y. Ma e Guo, G. Springer International Publishing, 2014, pagg 105-153. (687.1 KB)
B. Biggio, Fumera, G., Marcialis, G. L., e Roli, F., «Security of pattern recognition systems in adversarial environments». 2012. (235.41 KB)
B. Biggio, Melis, M., Fumera, G., e Roli, F., «Sparse Support Faces», in Int'l Conf. on Biometrics (ICB), 2015, pagg 208-213. (702.84 KB)

Pages