Publications

Export 484 results:
2020
L. Putzu e Fumera, G., «An empirical evaluation of nuclei segmentation from H&E images in a real application scenario», Applied Sciences (Switzerland), vol 10, pagg 1-15, 2020.
F. Cara, Scalas, M., Giacinto, G., e Maiorca, D., «On the Feasibility of Adversarial Sample Creation Using the Android System API», Information, n° 11(9): 433, 2020. (1.26 MB)
R. Soleymani, Granger, E., e Fumera, G., «F-Measure Curves: A Tool to Visualize Classifier Performance Under Imbalance», Pattern Recognition, vol 100, pag 107146, 2020. (3.15 MB)
R. Delussu, Putzu, L., e Fumera, G., «Investigating Synthetic Data Sets for Crowd Counting in Cross-scene Scenarios», in Proceedings of the 15th International Joint Conference on Computer Vision, Imaging and Computer Graphics Theory and Applications VISAPP 2020, Valletta - Malta, 2020, vol 4, pagg 365-372. (4.23 MB)
R. Delussu, Putzu, L., Fumera, G., e Roli, F., «Online Domain Adaptation for Person Re-Identification with a Human in the Loop», in 25th International Conference on Pattern Recognition, {ICPR} 2020, Virtual Event / Milan, Italy, January 10-15, 2021, 2020, pagg 3829–3836. (770.02 KB)
2021
L. Demetrio, Coull, S. E., Biggio, B., Lagorio, G., Armando, A., e Roli, F., «Adversarial EXEmples: A Survey and Experimental Evaluation of Practical Attacks on Machine Learning for Windows Malware Detection», ACM Trans. Priv. Secur., vol 24, 2021.
H. - Y. Lin e Biggio, B., «Adversarial Machine Learning: Attacks From Laboratories to the Real World», Computer, vol 54, pagg 56-60, 2021.
L. Putzu, Untesco, M., e Fumera, G., «Automatic Myelofibrosis Grading from Silver-Stained Images», in Computer Analysis of Images and Patterns, Cham, 2021, pagg 195–205.
A. Loddo e Putzu, L., «On the Effectiveness of Leukocytes Classification Methods in a Real Application Scenario», AI, vol 2, pagg 394–412, 2021.
P. Temple, Perrouin, G., Acher, M., Biggio, B., Jézéquel, J. - M., e Roli, F., «Empirical Assessment of Generating Adversarial Configurations for Software Product Lines», Empirical Software Engineering, vol 26, n° 6, 2021. (1.29 MB)
M. Pintor, Roli, F., Brendel, W., e Biggio, B., «Fast Minimum-norm Adversarial Attacks through Adaptive Norm Constraints», in NeurIPS, 2021.
L. Demetrio, Biggio, B., Lagorio, G., Roli, F., e Armando, A., «Functionality-Preserving Black-Box Optimization of Adversarial Windows Malware», IEEE Transactions on Information Forensics and Security, vol 16, pagg 3469-3478, 2021.
A. Emanuele Cinà, Vascon, S., Demontis, A., Biggio, B., Roli, F., e Pelillo, M., «The Hammer and the Nut: Is Bilevel Optimization Really Needed to Poison Linear Classifiers?», in International Joint Conference on Neural Networks, (IJCNN) 2021, Shenzhen, China, 2021, pagg 1–8.
E. Ledda, Putzu, L., Delussu, R., Loddo, A., e Fumera, G., «How Realistic Should Synthetic Images Be for Training Crowd Counting Models?», in Computer Analysis of Images and Patterns, Cham, 2021, pagg 46–56.
L. Putzu, Loddo, A., e Di Ruberto, C., «Invariant Moments, Textural and Deep Features for Diagnostic MR and CT Image Retrieval», in Computer Analysis of Images and Patterns, Cham, 2021, pagg 287–297.
D. Solans, Biggio, B., e Castillo, C., «Poisoning Attacks on Algorithmic Fairness», in Machine Learning and Knowledge Discovery in Databases (ECML PKDD 2020), 2021, pag 162--177. (1.05 MB)
M. Kravchik, Biggio, B., e Shabtai, A., «Poisoning Attacks on Cyber Attack Detectors for Industrial Control Systems», in Proceedings of the 36th Annual ACM Symposium on Applied Computing, New York, NY, USA, 2021, pagg 116–125.
G. Malandrone, Virdis, G., Maiorca, D., e Giacinto, G., «PowerDecode: A PowerShell Script Decoder Dedicated to Malware Analysis», 5th Italian Conference on CyberSecurity (ITASEC). 2021. (982.03 KB)
2022
M. Melis, Scalas, M., Demontis, A., Maiorca, D., Biggio, B., Giacinto, G., e Roli, F., «Do Gradient-Based Explanations Tell Anything About Adversarial Robustness to Android Malware?», International Journal of Machine Learning and Cybernetics, vol 13, pagg 217-232, 2022. (1.2 MB)
R. Delussu, Putzu, L., e Fumera, G., «On the Effectiveness of Synthetic Data Sets for Training Person Re-identification Models», in Proceedings - International Conference on Pattern Recognition, 2022, vol 2022-August, pagg 1208 – 1214.
E. Ledda, Putzu, L., Delussu, R., Fumera, G., e Roli, F., «On the Evaluation of Video-Based Crowd Counting Models», Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), vol 13233 LNCS. pagg 301 – 311, 2022.
A. Sotgiu, Pintor, M., e Biggio, B., «Explainability-Based Debugging of Machine Learning for Vulnerability Discovery», in Proc. 17th International Conference on Availability, Reliability and Security, New York, NY, USA, 2022.
F. Meloni, Sanna, A., Maiorca, D., e Giacinto, G., «Extended Abstract: Effective Call Graph Fingerprinting for the Analysis and Classification of Windows Malware», 19th Conference on Detection of Intrusions and Malware & Vulnerability Assessment (DIMVA). pagg 42-52, 2022. (328.32 KB)
F. Crecchi, Melis, M., Sotgiu, A., Bacciu, D., e Biggio, B., «FADER: Fast adversarial example rejection», Neurocomputing, vol 470, pagg 257-268, 2022.
A. Janovsky, Maiorca, D., Marko, D., Matyas, V., e Giacinto, G., «A Longitudinal Study of Cryptographic API: A Decade of Android Malware», 19th International Conference on Security and Cryptography (SECRYPT). pagg 121-133, 2022. (251.06 KB)

Pages