Publications

Export 109 results:
Filters: First Letter Of Last Name is B  [Clear All Filters]
2019
D. Maiorca and Biggio, B., Digital Investigation of PDF Files: Unveiling Traces of Embedded Malware, IEEE Security and Privacy: Special Issue on Digital Forensics, vol. 17, no. 1, pp. 63-71, 2019. (838.95 KB)
L. Demetrio, Biggio, B., Lagorio, G., Roli, F., and Armando, A., Explaining Vulnerabilities of Deep Learning to Adversarial Malware Binaries, in 3rd Italian Conference on Cyber Security, ITASEC 2019, Pisa, Italy, 2019, vol. 2315.
B. Ionescu, Müller, H., Péteri, R., Dang-Nguyen, D. - T., Piras, L., Riegler, M., Tran, M. - T., Lux, M., Gurrin, C., Cid, Y. Dicente, Liauchuk, V., Kovalev, V., Ben Abacha, A., Hasan, S. A., Datla, V. V., Liu, J., Demner-Fushman, D., Pelka, O., Friedrich, C. M., Chamberlain, J., Clark, A., de Herrera, A. García Se, García, N., Kavallieratou, E., del-Blanco, C. Roberto, Cuevas, C., Vasilopoulos, N., and Karampidis, K., ImageCLEF 2019: Multimedia Retrieval in Lifelogging, Medical, Nature, and Security Applications, in Advances in Information Retrieval - 41st European Conference on IR Research, ECIR 2019, Cologne, Germany, April 14-18, 2019, Proceedings, Part {II}, 2019, pp. 301–308.
B. Ionescu, Müller, H., Péteri, R., Cid, Y. Dicente, Liauchuk, V., Kovalev, V., Klimuk, D., Tarasau, A., Ben Abacha, A., Hasan, S. A., Datla, V. V., Liu, J., Demner-Fushman, D., Dang-Nguyen, D. - T., Piras, L., Riegler, M., Tran, M. - T., Lux, M., Gurrin, C., Pelka, O., Friedrich, C. M., de Herrera, A. García Se, García, N., Kavallieratou, E., del-Blanco, C. Roberto, Cuevas, C., Vasilopoulos, N., Karampidis, K., Chamberlain, J., Clark, A., and Campello, A., ImageCLEF 2019: Multimedia Retrieval in Medicine, Lifelogging, Security and Nature, in Experimental IR Meets Multilinguality, Multimodality, and Interaction - 10th International Conference of the CLEF Association, CLEF 2019, Lugano, Switzerland, September 9-12, 2019, Proceedings, 2019, pp. 358–386. (323.96 KB)
M. Melis, Demontis, A., Pintor, M., Sotgiu, A., and Biggio, B., secml: A Python Library for Secure and Explainable Machine Learning. 2019. (1.1 MB)
D. Maiorca, Biggio, B., and Giacinto, G., Towards Adversarial Malware Detection: Lessons Learned from PDF-based Attacks, ACM Computing Surveys, vol. 52, no. 4, 2019. (1.21 MB)
A. Demontis, Melis, M., Pintor, M., Jagielski, M., Biggio, B., Oprea, A., Nita-Rotaru, C., and Roli, F., Why Do Adversarial Attacks Transfer? Explaining Transferability of Evasion and Poisoning Attacks, in 28th Usenix Security Symposium, Santa Clara, California, USA, 2019, vol. 28th {USENIX} Security Symposium ({USENIX} Security 19), p. 321--338. (1.09 MB)
A. Demontis, Melis, M., Biggio, B., Maiorca, D., Arp, D., Rieck, K., Corona, I., Giacinto, G., and Roli, F., Yes, Machine Learning Can Be More Secure! A Case Study on Android Malware Detection, IEEE Trans. Dependable and Secure Computing, vol. 16, no. 4, pp. 711-724, 2019. (3.61 MB)
2018
B. Kolosnjaji, Demontis, A., Biggio, B., Maiorca, D., Giacinto, G., Eckert, C., and Roli, F., Adversarial Malware Binaries: Evading Deep Learning for Malware Detection in Executables, in 2018 26th European Signal Processing Conference (EUSIPCO), Rome, 2018, pp. 533-537. (674.62 KB)
M. Melis, Maiorca, D., Biggio, B., Giacinto, G., and Roli, F., Explaining Black-box Android Malware Detection, in 26th European Signal Processing Conference (EUSIPCO '18), Rome, Italy, 2018, pp. 524-528. (431.78 KB)
M. Jagielski, Oprea, A., Biggio, B., Liu, C., Nita-Rotaru, C., and Li, B., Manipulating Machine Learning: Poisoning Attacks and Countermeasures for Regression Learning, in 39th IEEE Symposium on Security and Privacy, 2018. (1.02 MB)
B. Biggio and Roli, F., Wild Patterns: Ten Years After the Rise of Adversarial Machine Learning, Pattern Recognition, vol. 84, pp. 317-331, 2018. (3.76 MB)
2017
M. Melis, Demontis, A., Biggio, B., Brown, G., Fumera, G., and Roli, F., Is Deep Learning Safe for Robot Vision? Adversarial Examples against the iCub Humanoid, in ICCV 2017 Workshop on Vision in Practice on Autonomous Robots (ViPAR), Venice, Italy, 2017, vol. 2017 IEEE International Conference on Computer Vision Workshops (ICCVW), pp. 751-759. (3.16 MB)
M. Melis, Demontis, A., Biggio, B., Brown, G., Fumera, G., and Roli, F., Is Deep Learning Safe for Robot Vision? Adversarial Examples against the iCub Humanoid, in ICCV 2017 Workshop on Vision in Practice on Autonomous Robots (ViPAR), Venice, Italy, 2017, vol. 2017 IEEE International Conference on Computer Vision Workshops (ICCVW), pp. 751-759. (3.16 MB)
P. Piredda, Ariu, D., Biggio, B., Corona, I., Piras, L., Giacinto, G., and Roli, F., Deepsquatting: Learning-based Typosquatting Detection at Deeper Domain Levels, in 16th International Conference of the Italian Association for Artificial Intelligence (AI*IA 2017), 2017, vol. 10640 of LNCS, pp. 347-358. (1.21 MB)
I. Corona, Biggio, B., Contini, M., Piras, L., Corda, R., Mereu, M., Mureddu, G., Ariu, D., and Roli, F., DeltaPhish: Detecting Phishing Webpages in Compromised Websites, 22nd European Symposium on Research in Computer Security (ESORICS), vol. 10492. Springer International Publishing, Norway, September 11-15, 2017, pp. 370–388, 2017. (4.13 MB)
D. Maiorca, Russu, P., Corona, I., Biggio, B., and Giacinto, G., Detection of Malicious Scripting Code through Discriminant and Adversary-Aware API Analysis, in 1st Italian Conference on CyberSecurity (ITASEC), 2017, vol. 1816, pp. 96-105. (371.53 KB)
A. Demontis, Biggio, B., Fumera, G., Giacinto, G., and Roli, F., Infinity-norm Support Vector Machines against Adversarial Label Contamination, 1st Italian Conference on CyberSecurity (ITASEC). Venice, Italy , pp. 106-115, 2017.
D. - T. Dang-Nguyen, Piras, L., Giacinto, G., Boato, G., and De Natale, F. G. B., Multimodal Retrieval with Diversification and Relevance Feedback for Tourist Attraction Images, ACM Transactions on Multimedia Computing, Communications, and Applications, vol. 13, no. 4, 2017. (5.94 MB)
L. Zhou, Piras, L., Rieger, M., Boato, G., Dang-Nguyen, D. - T., and Gurrin, C., Organizer Team at ImageCLEFlifelog 2017: Baseline Approaches for Lifelog Retrieval and Summarization, in CLEF working notes, CEUR, Dublin, 2017, vol. 1866. (220.99 KB)
B. Ionescu, Müller, H., Villegas, M., Arenas, H., Boato, G., Dang-Nguyen, D. - T., Cid, Y. Dicente, Eickhoff, C., de Herrera, A. García Se, Gurrin, C., Islam, B., Kovalev, V., Liauchuk, V., Mothe, J., Piras, L., Riegler, M., and Schwall, I., Overview of ImageCLEF 2017: Information extraction from images, in CLEF 2017 Proceedings, Dublin, Ireland, 2017, pp. 315-337.
D. - T. Dang-Nguyen, Piras, L., Riegler, M., Boato, G., Zhou, L., and Gurrin, C., Overview of ImageCLEFlifelog 2017: Lifelog Retrieval and Summarization, in CLEF2017 Working Notes, Dublin, Ireland, 2017, vol. 1866. (1.7 MB)
S. Rota Bulò, Biggio, B., Pillai, I., Pelillo, M., and Roli, F., Randomized Prediction Games for Adversarial Machine Learning, IEEE Transactions on Neural Networks and Learning Systems, vol. 28, no. 11, pp. 2466-2478, 2017. (1.52 MB) (256.21 KB)

Pages