Conference Paper
A. Demontis, Melis, M., Pintor, M., Jagielski, M., Biggio, B., Oprea, A., Nita-Rotaru, C., e Roli, F.,
«Why Do Adversarial Attacks Transfer? Explaining Transferability of Evasion and Poisoning Attacks», in
28th Usenix Security Symposium, Santa Clara, California, USA, 2019, vol 28th {USENIX} Security Symposium ({USENIX} Security 19), pag 321--338.
(1.09 MB) D. M. Freeman, Jain, S., Duermuth, M., Biggio, B., e Giacinto, G.,
«Who Are You? A Statistical Approach to Measuring User Authenticity», in
Proc. 23rd Annual Network & Distributed System Security Symposium (NDSS), 2016.
(764.14 KB) B. Nelson, Biggio, B., e Laskov, P.,
«Understanding the Risk Factors of Learning in Adversarial Environments», in
4th ACM Workshop on Artificial Intelligence and Security (AISec 2011), Chicago, IL, USA, 2011, pagg 87–92.
(132.42 KB) P. Temple, Acher, M., Perrouin, G., Biggio, B., Jezequel, J. - M., e Roli, F.,
«Towards Quality Assurance of Software Product Lines with Adversarial Configurations», in
Proceedings of the 23rd International Systems and Software Product Line Conference - Volume A, New York, NY, USA, 2019, pagg 277–288.
(2.09 MB) L. Muñoz-González, Biggio, B., Demontis, A., Paudice, A., Wongrassamee, V., Lupu, E. C., e Roli, F.,
«Towards Poisoning of Deep Learning Algorithms with Back-gradient Optimization», in
10th ACM Workshop on Artificial Intelligence and Security, 2017, pagg 27-38.
(4.08 MB) B. Biggio, Nelson, B., e Laskov, P.,
«Support Vector Machines Under Adversarial Label Noise», in
Journal of Machine Learning Research - Proc. 3rd Asian Conference on Machine Learning (ACML 2011), Taoyuan, Taiwan, 2011, vol 20, pagg 97-112.
(533.74 KB) A. Demontis, Biggio, B., Fumera, G., e Roli, F.,
«Super-Sparse Regression for Fast Age Estimation From Faces at Test Time», in
18th Int'l Conf. on Image Analysis and Processing (ICIAP), Genova, Italy, 2015, vol Image Analysis and Processing (ICIAP 2015), pagg 551-562.
(678.7 KB) B. Biggio, Melis, M., Fumera, G., e Roli, F.,
«Sparse Support Faces», in
Int'l Conf. on Biometrics (ICB), 2015, pagg 208-213.
(702.84 KB) A. Demontis, Russu, P., Biggio, B., Fumera, G., e Roli, F.,
«On Security and Sparsity of Linear Classifiers for Adversarial Settings», in
Joint IAPR Int'l Workshop on Structural, Syntactic, and Statistical Pattern Recognition, Merida, Mexico, 2016, vol 10029 of LNCS, pagg 322-332.
(425.68 KB) P. Russu, Demontis, A., Biggio, B., Fumera, G., e Roli, F.,
«Secure Kernel Machines against Evasion Attacks», in
9th ACM Workshop on Artificial Intelligence and Security, Vienna, Austria, 2016, pagg 59-69.
(686.41 KB) B. Biggio, Akhtar, Z., Fumera, G., Marcialis, G. L., e Roli, F.,
«Robustness of multi-modal biometric verification systems under realistic spoofing attacks», in
Int’l Joint Conference on Biometrics (IJCB), Washington DC, USA, 2011.
(2.25 MB) Z. Akhtar, Biggio, B., Fumera, G., e Marcialis, G. L.,
«Robustness of Multi-modal Biometric Systems under Realistic Spoof Attacks against All Traits», in
IEEE Workshop on Biometric Measurements and Systems for Security and Medical Applications (BioMS), Milan, Italy, 2011, pagg 5-10.
(954 KB) R. Labaca-Castro, Biggio, B., e Rodosek, G. Dreo,
«Poster: Attacking Malware Classifiers by Crafting Gradient-Attacks That Preserve Functionality», in
Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications Security, New York, NY, USA, 2019, pagg 2565–2567.
B. Biggio, Rota Bulò, S., Pillai, I., Mura, M., Zemene Mequanint, E., Pelillo, M., e Roli, F.,
«Poisoning complete-linkage hierarchical clustering», in
Joint IAPR Int'l Workshop on Structural, Syntactic, and Statistical Pattern Recognition (LNCS), Joensuu, Finland, 2014, vol 8621, pagg 42-52.
(388.31 KB) B. Biggio, Rieck, K., Ariu, D., Wressnegger, C., Corona, I., Giacinto, G., e Roli, F.,
«Poisoning Behavioral Malware Clustering», in
AISec'14: Proceedings of the 2014 ACM Workshop on Artificial Intelligence and Security, co-located with CCS '14, Scottsdale, Arizona, USA, 2014, pagg 27-36.
(375.58 KB) B. Biggio, Didaci, L., Fumera, G., e Roli, F.,
«Poisoning attacks to compromise face templates», in
6th IAPR Int'l Conf. on Biometrics (ICB), Madrid, Spain, 2013.
(844.61 KB) M. Kravchik, Biggio, B., e Shabtai, A.,
«Poisoning Attacks on Cyber Attack Detectors for Industrial Control Systems», in
Proceedings of the 36th Annual ACM Symposium on Applied Computing, New York, NY, USA, 2021, pagg 116–125.
D. Solans, Biggio, B., e Castillo, C.,
«Poisoning Attacks on Algorithmic Fairness», in
Machine Learning and Knowledge Discovery in Databases (ECML PKDD 2020), 2021, pag 162--177.
(1.05 MB) B. Biggio, Nelson, B., e Laskov, P.,
«Poisoning attacks against support vector machines», in
29th Int'l Conf. on Machine Learning (ICML), 2012, pagg 1807–1814.
(452.94 KB)