Sfoglia per Autore
Functionality-Preserving Black-Box Optimization of Adversarial Windows Malware
2021-01-01 Demetrio, Luca; Biggio, Battista; Lagorio, Giovanni; Roli, Fabio; Armando, Alessandro
Fast minimum-norm adversarial attacks through adaptive norm constraints
2021-01-01 Pintor, Maura; Roli, Fabio; Brendel, Wieland; Biggio, Battista
Slope: A First-order Approach for Measuring Gradient Obfuscation
2021-01-01 Pintor, M.; Demetrio, L.; Manca, G.; Biggio, B.; Roli, F.
The hammer and the nut: is bilevel optimization really needed to poison linear classifiers?
2021-01-01 Cina, A. E.; Vascon, S.; Demontis, A.; Biggio, B.; Roli, F.; Pelillo, M.
Adversarial Machine Learning: Attacks From Laboratories to the Real World
2021-01-01 Lin, Hsiao-Ying; Biggio, Battista
Adversarial EXEmples: A Survey and Experimental Evaluation of Practical Attacks on Machine Learning for Windows Malware Detection
2021-01-01 Demetrio, L.; Coull, S. E.; Biggio, B.; Lagorio, G.; Armando, A.; Roli, F.
Empirical assessment of generating adversarial configurations for software product lines
2021-01-01 Temple, P.; Perrouin, G.; Acher, M.; Biggio, B.; Jezequel, J. -M.; Roli, F.
Complex Data: Learning Trustworthily, Automatically, and with Guarantees
2021-01-01 Oneto, L.; Navarin, N.; Biggio, B.; Errica, F.; Micheli, A.; Scarselli, F.; Bianchini, M.; Sperduti, A.
Deep neural rejection against adversarial examples
2020-01-01 Sotgiu, Angelo; Demontis, Ambra; Melis, Marco; Biggio, Battista; Fumera, Giorgio; Feng, Xiaoyi; Roli, Fabio
Adversarial Detection of Flash Malware: Limitations and Open Issues
2020-01-01 Maiorca, D.; Demontis, A.; Biggio, B.; Roli, F.; Giacinto, G.
Societal issues in machine learning: When learning from data is not enough
2019-01-01 Bacciu, D.; Biggio, B.; Lisboa, P. J. G.; Martin, J. D.; Oneto, L.; Vellido, A.
Chairs' introduction and welcome to AISEC 2019
2019-01-01 Afroz, S.; Biggio, B.; Carlini, N.; Elovici, Y.; Shabtai, A.
Explaining vulnerabilities of deep learning to adversarial malware binaries
2019-01-01 Demetrio, Luca; Biggio, Battista; Lagorio, Giovanni; Roli, Fabio; Armando, Alessandro
Why Do Adversarial Attacks Transfer? Explaining Transferability of Evasion and Poisoning Attacks
2019-01-01 Demontis, Ambra; Melis, Marco; Pintor, Maura; Jagielski, Matthew; Biggio, Battista; Oprea, Alina; Nita-Rotaru, Cristina; Roli, Fabio
Detecting adversarial examples through nonlinear dimensionality reduction
2019-01-01 Crecchi, F.; Bacciu, D.; Biggio, B.
Digital Investigation of PDF Files: Unveiling Traces of Embedded Malware
2019-01-01 Maiorca, Davide; Biggio, Battista
Deep Learning and Security Workshop 2019
2019-01-01 Rieck, K.; Biggio, B.; Vasiloglou, N.
Optimization and deployment of CNNs at the Edge: The ALOHA experience
2019-01-01 Meloni, P.; Loi, D.; Busia, P.; Deriu, G.; Pimentel, A. D.; Sapra, D.; Stefanov, T.; Minakova, S.; Conti, F.; Benini, L.; Pintor, M.; Biggio, B.; Moser, B.; Shepelev, N.; Fragoulis, N.; Theodorakopoulos, I.; Masin, M.; Palumbo, F.
Towards adversarial malware detection: lessons learned from PDF-based attacks
2019-01-01 Maiorca, D.; Biggio, B.; Giacinto, G.
Towards quality assurance of software product lines with adversarial configurations
2019-01-01 Temple, P.; Acher, M.; Perrouin, G.; Biggio, B.; Jezequel, J. -M.; Roli, F.
Titolo | Data di pubblicazione | Autore(i) | Rivista | Editore |
---|---|---|---|---|
Functionality-Preserving Black-Box Optimization of Adversarial Windows Malware | 1-gen-2021 | Demetrio, Luca; Biggio, Battista; Lagorio, Giovanni; Roli, Fabio; Armando, Alessandro | IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY | - |
Fast minimum-norm adversarial attacks through adaptive norm constraints | 1-gen-2021 | Pintor, Maura; Roli, Fabio; Brendel, Wieland; Biggio, Battista | - | - |
Slope: A First-order Approach for Measuring Gradient Obfuscation | 1-gen-2021 | Pintor, M.; Demetrio, L.; Manca, G.; Biggio, B.; Roli, F. | - | - |
The hammer and the nut: is bilevel optimization really needed to poison linear classifiers? | 1-gen-2021 | Cina, A. E.; Vascon, S.; Demontis, A.; Biggio, B.; Roli, F.; Pelillo, M. | - | IEEE, Institute of Electrical and Electronics Engineers |
Adversarial Machine Learning: Attacks From Laboratories to the Real World | 1-gen-2021 | Lin, Hsiao-Ying; Biggio, Battista | COMPUTER | - |
Adversarial EXEmples: A Survey and Experimental Evaluation of Practical Attacks on Machine Learning for Windows Malware Detection | 1-gen-2021 | Demetrio, L.; Coull, S. E.; Biggio, B.; Lagorio, G.; Armando, A.; Roli, F. | ACM TRANSACTIONS ON PRIVACY AND SECURITY | - |
Empirical assessment of generating adversarial configurations for software product lines | 1-gen-2021 | Temple, P.; Perrouin, G.; Acher, M.; Biggio, B.; Jezequel, J. -M.; Roli, F. | EMPIRICAL SOFTWARE ENGINEERING | - |
Complex Data: Learning Trustworthily, Automatically, and with Guarantees | 1-gen-2021 | Oneto, L.; Navarin, N.; Biggio, B.; Errica, F.; Micheli, A.; Scarselli, F.; Bianchini, M.; Sperduti, A. | - | - |
Deep neural rejection against adversarial examples | 1-gen-2020 | Sotgiu, Angelo; Demontis, Ambra; Melis, Marco; Biggio, Battista; Fumera, Giorgio; Feng, Xiaoyi; Roli, Fabio | EURASIP JOURNAL ON MULTIMEDIA AND INFORMATION SECURITY | - |
Adversarial Detection of Flash Malware: Limitations and Open Issues | 1-gen-2020 | Maiorca, D.; Demontis, A.; Biggio, B.; Roli, F.; Giacinto, G. | COMPUTERS & SECURITY | - |
Societal issues in machine learning: When learning from data is not enough | 1-gen-2019 | Bacciu, D.; Biggio, B.; Lisboa, P. J. G.; Martin, J. D.; Oneto, L.; Vellido, A. | - | ESANN (i6doc.com) |
Chairs' introduction and welcome to AISEC 2019 | 1-gen-2019 | Afroz, S.; Biggio, B.; Carlini, N.; Elovici, Y.; Shabtai, A. | - | - |
Explaining vulnerabilities of deep learning to adversarial malware binaries | 1-gen-2019 | Demetrio, Luca; Biggio, Battista; Lagorio, Giovanni; Roli, Fabio; Armando, Alessandro | - | - |
Why Do Adversarial Attacks Transfer? Explaining Transferability of Evasion and Poisoning Attacks | 1-gen-2019 | Demontis, Ambra; Melis, Marco; Pintor, Maura; Jagielski, Matthew; Biggio, Battista; Oprea, Alina; Nita-Rotaru, Cristina; Roli, Fabio | - | USENIX Association |
Detecting adversarial examples through nonlinear dimensionality reduction | 1-gen-2019 | Crecchi, F.; Bacciu, D.; Biggio, B. | - | ESANN (i6doc.com) |
Digital Investigation of PDF Files: Unveiling Traces of Embedded Malware | 1-gen-2019 | Maiorca, Davide; Biggio, Battista | IEEE SECURITY & PRIVACY | - |
Deep Learning and Security Workshop 2019 | 1-gen-2019 | Rieck, K.; Biggio, B.; Vasiloglou, N. | - | - |
Optimization and deployment of CNNs at the Edge: The ALOHA experience | 1-gen-2019 | Meloni, P.; Loi, D.; Busia, P.; Deriu, G.; Pimentel, A. D.; Sapra, D.; Stefanov, T.; Minakova, S.; Conti, F.; Benini, L.; Pintor, M.; Biggio, B.; Moser, B.; Shepelev, N.; Fragoulis, N.; Theodorakopoulos, I.; Masin, M.; Palumbo, F. | - | Association for Computing Machinery, Inc |
Towards adversarial malware detection: lessons learned from PDF-based attacks | 1-gen-2019 | Maiorca, D.; Biggio, B.; Giacinto, G. | ACM COMPUTING SURVEYS | - |
Towards quality assurance of software product lines with adversarial configurations | 1-gen-2019 | Temple, P.; Acher, M.; Perrouin, G.; Biggio, B.; Jezequel, J. -M.; Roli, F. | - | Association for Computing Machinery |
Legenda icone
- file ad accesso aperto
- file disponibili sulla rete interna
- file disponibili agli utenti autorizzati
- file disponibili solo agli amministratori
- file sotto embargo
- nessun file disponibile