Sfoglia per Autore  

Opzioni
Mostrati risultati da 41 a 60 di 135
Titolo Data di pubblicazione Autore(i) Rivista Editore
Functionality-Preserving Black-Box Optimization of Adversarial Windows Malware 1-gen-2021 Demetrio, Luca; Biggio, Battista; Lagorio, Giovanni; Roli, Fabio; Armando, Alessandro IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY -
Fast minimum-norm adversarial attacks through adaptive norm constraints 1-gen-2021 Pintor, Maura; Roli, Fabio; Brendel, Wieland; Biggio, Battista - -
Slope: A First-order Approach for Measuring Gradient Obfuscation 1-gen-2021 Pintor, M.; Demetrio, L.; Manca, G.; Biggio, B.; Roli, F. - -
The hammer and the nut: is bilevel optimization really needed to poison linear classifiers? 1-gen-2021 Cina, A. E.; Vascon, S.; Demontis, A.; Biggio, B.; Roli, F.; Pelillo, M. - IEEE, Institute of Electrical and Electronics Engineers
Adversarial Machine Learning: Attacks From Laboratories to the Real World 1-gen-2021 Lin, Hsiao-Ying; Biggio, Battista COMPUTER -
Adversarial EXEmples: A Survey and Experimental Evaluation of Practical Attacks on Machine Learning for Windows Malware Detection 1-gen-2021 Demetrio, L.; Coull, S. E.; Biggio, B.; Lagorio, G.; Armando, A.; Roli, F. ACM TRANSACTIONS ON PRIVACY AND SECURITY -
Empirical assessment of generating adversarial configurations for software product lines 1-gen-2021 Temple, P.; Perrouin, G.; Acher, M.; Biggio, B.; Jezequel, J. -M.; Roli, F. EMPIRICAL SOFTWARE ENGINEERING -
Complex Data: Learning Trustworthily, Automatically, and with Guarantees 1-gen-2021 Oneto, L.; Navarin, N.; Biggio, B.; Errica, F.; Micheli, A.; Scarselli, F.; Bianchini, M.; Sperduti, A. - -
Deep neural rejection against adversarial examples 1-gen-2020 Sotgiu, Angelo; Demontis, Ambra; Melis, Marco; Biggio, Battista; Fumera, Giorgio; Feng, Xiaoyi; Roli, Fabio EURASIP JOURNAL ON MULTIMEDIA AND INFORMATION SECURITY -
Adversarial Detection of Flash Malware: Limitations and Open Issues 1-gen-2020 Maiorca, D.; Demontis, A.; Biggio, B.; Roli, F.; Giacinto, G. COMPUTERS & SECURITY -
Societal issues in machine learning: When learning from data is not enough 1-gen-2019 Bacciu, D.; Biggio, B.; Lisboa, P. J. G.; Martin, J. D.; Oneto, L.; Vellido, A. - ESANN (i6doc.com)
Chairs' introduction and welcome to AISEC 2019 1-gen-2019 Afroz, S.; Biggio, B.; Carlini, N.; Elovici, Y.; Shabtai, A. - -
Explaining vulnerabilities of deep learning to adversarial malware binaries 1-gen-2019 Demetrio, Luca; Biggio, Battista; Lagorio, Giovanni; Roli, Fabio; Armando, Alessandro - -
Why Do Adversarial Attacks Transfer? Explaining Transferability of Evasion and Poisoning Attacks 1-gen-2019 Demontis, Ambra; Melis, Marco; Pintor, Maura; Jagielski, Matthew; Biggio, Battista; Oprea, Alina; Nita-Rotaru, Cristina; Roli, Fabio - USENIX Association
Detecting adversarial examples through nonlinear dimensionality reduction 1-gen-2019 Crecchi, F.; Bacciu, D.; Biggio, B. - ESANN (i6doc.com)
Digital Investigation of PDF Files: Unveiling Traces of Embedded Malware 1-gen-2019 Maiorca, Davide; Biggio, Battista IEEE SECURITY & PRIVACY -
Deep Learning and Security Workshop 2019 1-gen-2019 Rieck, K.; Biggio, B.; Vasiloglou, N. - -
Optimization and deployment of CNNs at the Edge: The ALOHA experience 1-gen-2019 Meloni, P.; Loi, D.; Busia, P.; Deriu, G.; Pimentel, A. D.; Sapra, D.; Stefanov, T.; Minakova, S.; Conti, F.; Benini, L.; Pintor, M.; Biggio, B.; Moser, B.; Shepelev, N.; Fragoulis, N.; Theodorakopoulos, I.; Masin, M.; Palumbo, F. - Association for Computing Machinery, Inc
Towards adversarial malware detection: lessons learned from PDF-based attacks 1-gen-2019 Maiorca, D.; Biggio, B.; Giacinto, G. ACM COMPUTING SURVEYS -
Towards quality assurance of software product lines with adversarial configurations 1-gen-2019 Temple, P.; Acher, M.; Perrouin, G.; Biggio, B.; Jezequel, J. -M.; Roli, F. - Association for Computing Machinery
Mostrati risultati da 41 a 60 di 135
Legenda icone

  •  file ad accesso aperto
  •  file disponibili sulla rete interna
  •  file disponibili agli utenti autorizzati
  •  file disponibili solo agli amministratori
  •  file sotto embargo
  •  nessun file disponibile