Publications

Export 90 results:
Filters: Author is Battista Biggio  [Clear All Filters]
A B C D E F G H I J K L M N O P Q R S T U V W X Y Z 
M
B. Biggio, Fumera, G., and Roli, F., Multiple Classifier Systems for Adversarial Classification Tasks, in 8th Int. Workshop on Multiple Classifier Systems (MCS 2009), Reykjavik, Iceland, 2009, vol. 5519, pp. 132-141. (459.88 KB)
B. Biggio, Fumera, G., and Roli, F., Multiple Classifier Systems for Robust Classifier Design in Adversarial Environments, Journal of Machine Learning and Cybernetics, vol. 1, pp. 27–41, 2010. (844.91 KB)
B. Biggio, Fumera, G., and Roli, F., Multiple Classifier Systems under Attack, in 9th Int. Workshop on Multiple Classifier Systems (MCS 2010), Cairo, Egypt, 2010, vol. 5997, pp. 74–83. (231.42 KB)
P
F. Roli, Biggio, B., and Fumera, G., Pattern Recognition Systems Under Attack, in Progress in Pattern Recognition, Image Analysis, Computer Vision, and Applications, Proc. of the 18th Iberoamerican Congress on Pattern Recognition (CIARP 2013), LNCS, Havana, Cuba, 2013, vol. 8258, pp. 1-8. (314.35 KB)
B. Biggio, Fumera, G., and Roli, F., Pattern Recognition Systems under Attack: Design Issues and Research Challenges, Int'l J. Patt. Recogn. Artif. Intell., vol. 28, no. 7, p. 1460002, 2014. (1.41 MB)
B. Biggio, Fumera, G., Roli, F., and Didaci, L., Poisoning adaptive biometric systems, in 9th Int'l Workshop on Statistical Techniques in Pattern Recognition (SPR 2012), 2012, vol. 7626, pp. 417-425. (637.79 KB)
B. Biggio, Nelson, B., and Laskov, P., Poisoning attacks against support vector machines, in 29th Int'l Conf. on Machine Learning (ICML), 2012, pp. 1807–1814. (452.94 KB)
D. Solans, Biggio, B., and Castillo, C., Poisoning Attacks on Algorithmic Fairness, in Machine Learning and Knowledge Discovery in Databases (ECML PKDD 2020), 2021, p. 162--177. (1.05 MB)
M. Kravchik, Biggio, B., and Shabtai, A., Poisoning Attacks on Cyber Attack Detectors for Industrial Control Systems, in Proceedings of the 36th Annual ACM Symposium on Applied Computing, New York, NY, USA, 2021, pp. 116–125.
B. Biggio, Didaci, L., Fumera, G., and Roli, F., Poisoning attacks to compromise face templates, in 6th IAPR Int'l Conf. on Biometrics (ICB), Madrid, Spain, 2013. (844.61 KB)
B. Biggio, Rieck, K., Ariu, D., Wressnegger, C., Corona, I., Giacinto, G., and Roli, F., Poisoning Behavioral Malware Clustering, in AISec'14: Proceedings of the 2014 ACM Workshop on Artificial Intelligence and Security, co-located with CCS '14, Scottsdale, Arizona, USA, 2014, pp. 27-36. (375.58 KB)
B. Biggio, Rota Bulò, S., Pillai, I., Mura, M., Zemene Mequanint, E., Pelillo, M., and Roli, F., Poisoning complete-linkage hierarchical clustering, in Joint IAPR Int'l Workshop on Structural, Syntactic, and Statistical Pattern Recognition (LNCS), Joensuu, Finland, 2014, vol. 8621, pp. 42-52. (388.31 KB)
R. Labaca-Castro, Biggio, B., and Rodosek, G. Dreo, Poster: Attacking Malware Classifiers by Crafting Gradient-Attacks That Preserve Functionality, in Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications Security, New York, NY, USA, 2019, pp. 2565–2567.
R
S. Rota Bulò, Biggio, B., Pillai, I., Pelillo, M., and Roli, F., Randomized Prediction Games for Adversarial Machine Learning, IEEE Transactions on Neural Networks and Learning Systems, vol. 28, no. 11, pp. 2466-2478, 2017. (1.52 MB) (256.21 KB)
Z. Akhtar, Biggio, B., Fumera, G., and Marcialis, G. L., Robustness of Multi-modal Biometric Systems under Realistic Spoof Attacks against All Traits, in IEEE Workshop on Biometric Measurements and Systems for Security and Medical Applications (BioMS), Milan, Italy, 2011, pp. 5-10. (954 KB)
B. Biggio, Akhtar, Z., Fumera, G., Marcialis, G. L., and Roli, F., Robustness of multi-modal biometric verification systems under realistic spoofing attacks, in Int’l Joint Conference on Biometrics (IJCB), Washington DC, USA, 2011. (2.25 MB)
S
M. Pintor, Demetrio, L., Sotgiu, A., Melis, M., Demontis, A., and Biggio, B., secml: A Python Library for Secure and Explainable Machine Learning, SoftwareX, 2022.
P. Russu, Demontis, A., Biggio, B., Fumera, G., and Roli, F., Secure Kernel Machines against Evasion Attacks, in 9th ACM Workshop on Artificial Intelligence and Security, Vienna, Austria, 2016, pp. 59-69. (686.41 KB)
A. Demontis, Russu, P., Biggio, B., Fumera, G., and Roli, F., On Security and Sparsity of Linear Classifiers for Adversarial Settings, in Joint IAPR Int'l Workshop on Structural, Syntactic, and Statistical Pattern Recognition, Merida, Mexico, 2016, vol. 10029 of LNCS, pp. 322-332. (425.68 KB)
B. Biggio, Akhtar, Z., Fumera, G., Marcialis, G. L., and Roli, F., Security evaluation of biometric authentication systems under real spoofing attacks, IET Biometrics, vol. 1, no. 1, pp. 11-24, 2012. (3.21 MB)
B. Biggio, Fumera, G., and Roli, F., Security evaluation of pattern classifiers under attack, IEEE Transactions on Knowledge and Data Engineering, vol. 26, no. 4, pp. 984-996, 2014. (1.35 MB)
B. Biggio, Corona, I., Nelson, B., Rubinstein, B. I. P., Maiorca, D., Fumera, G., Giacinto, G., and Roli, F., Security Evaluation of Support Vector Machines in Adversarial Environments, in Support Vector Machines Applications, Y. Ma and Guo, G. Springer International Publishing, 2014, pp. 105-153. (687.1 KB)
B. Biggio, Fumera, G., Marcialis, G. L., and Roli, F., Security of pattern recognition systems in adversarial environments. 2012. (235.41 KB)
B. Biggio, Melis, M., Fumera, G., and Roli, F., Sparse Support Faces, in Int'l Conf. on Biometrics (ICB), 2015, pp. 208-213. (702.84 KB)

Pages