Publications

Export 4 results:
Filters: First Letter Of Title is W  [Clear All Filters]
2012
G. L. Marcialis, Didaci, L., Pisano, A., Granger, E., and Roli, F., Why template self-update should work in biometric authentication systems?, in Information Science, Signal Processing and their Applications (ISSPA), 2012 11th International Conference on, Montreal, QC, 2012.
2016
D. M. Freeman, Jain, S., Duermuth, M., Biggio, B., and Giacinto, G., Who Are You? A Statistical Approach to Measuring User Authenticity, in Proc. 23rd Annual Network & Distributed System Security Symposium (NDSS), 2016. (764.14 KB)
2018
B. Biggio and Roli, F., Wild Patterns: Ten Years After the Rise of Adversarial Machine Learning, Pattern Recognition, vol. 84, pp. 317-331, 2018. (3.76 MB)
2019
A. Demontis, Melis, M., Pintor, M., Jagielski, M., Biggio, B., Oprea, A., Nita-Rotaru, C., and Roli, F., Why Do Adversarial Attacks Transfer? Explaining Transferability of Evasion and Poisoning Attacks, in 28th Usenix Security Symposium, Santa Clara, California, USA, 2019, vol. 28th {USENIX} Security Symposium ({USENIX} Security 19), p. 321--338. (1.09 MB)