Search

Your search keyword '"Biggio A"' showing total 199 results

Search Constraints

Start Over You searched for: Author "Biggio A" Remove constraint Author: "Biggio A" Publication Type Electronic Resources Remove constraint Publication Type: Electronic Resources
199 results on '"Biggio A"'

Search Results

1. Humanizing the law of cyber targeting : human dignity, cyber-attacks and the protection of the civilian population

2. Living-off-The-Land Reverse-Shell Detection by Informed Data Augmentation

3. Robustness-Congruent Adversarial Training for Secure Machine Learning Model Updates

4. $\sigma$-zero: Gradient-based Optimization of $\ell_0$-norm Adversarial Examples

5. SLIFER: Investigating Performance and Robustness of Malware Detection Pipelines

6. Certified Adversarial Robustness of Machine Learning-based Malware Detectors via (De)Randomized Smoothing

7. AttackBench: Evaluating Gradient-based Attacks for Adversarial Examples

8. Security of Machine Learning (Dagstuhl Seminar 22281)

9. Type-II Majoron Dark Matter

10. Accelerating galaxy dynamical modeling using a neural network for joint lensing and kinematics analyses

11. An SDE for Modeling SAM: Theory and Insights

12. Dynamic Context Pruning for Efficient and Interpretable Autoregressive Transformers

13. Uncertainty Quantification in Machine Learning for Engineering Design and Health Prognostics: A Tutorial

14. Controllable Neural Symbolic Regression

15. Harnessing Synthetic Datasets: The Role of Shape Bias in Deep Neural Network Generalization

16. Nebula: Self-Attention for Dynamic Malware Analysis

17. Samples on Thin Ice: Re-Evaluating Adversarial Pruning of Neural Networks

18. Improving Fast Minimum-Norm Attacks with Hyperparameter Optimization

19. Raze to the Ground: Query-Efficient Adversarial HTML Attacks on Machine-Learning Phishing Webpage Detectors

20. Adversarial Attacks Against Uncertainty Quantification

21. Hardening RGB-D Object Recognition Systems against Adversarial Patch Attacks

22. Adversarial ModSecurity: Countering Adversarial SQL Injections with Robust Machine Learning

23. Minimizing Energy Consumption of Deep Learning Models by Energy-Aware Training

24. Gemtelligence: Accelerating Gemstone classification with Deep Learning

25. Cosmology from Galaxy Redshift Surveys with PointNet

26. Universal Severe Acute Respiratory Syndrome Coronavirus 2 (SARS-CoV-2) Testing for Obstetric Inpatient Units Across the United States.

27. A Survey on Reinforcement Learning Security with Application to Autonomous Driving

28. Stateful Detection of Adversarial Reprogramming

29. Explaining Machine Learning DGA Detectors from DNS Traffic Data

30. Robust Machine Learning for Malware Detection over Time

31. Practical Attacks on Machine Learning: A Case Study on Adversarial Windows Malware

32. Machine Learning Security in Industry: A Quantitative Survey

33. Wild Patterns Reloaded: A Survey of Machine Learning Security against Training Data Poisoning

34. Machine Learning Security against Data Poisoning: Are We There Yet?

35. Energy-Latency Attacks via Sponge Poisoning

36. ImageNet-Patch: A Dataset for Benchmarking Machine Learning Robustness against Adversarial Patches

37. FIGARO: Generating Symbolic Music with Fine-Grained Artistic Control

38. On the effectiveness of Randomized Signatures as Reservoir for Learning Rough Dynamics

39. Modeling lens potentials with continuous neural fields in galaxy-scale strong lenses

40. Fast emulation of two-point angular statistics for photometric galaxy surveys

41. Signal Propagation in Transformers: Theoretical Perspectives and the Role of Rank Collapse

42. Dynaformer: A Deep Learning Model for Ageing-aware Battery Discharge Prediction

43. Support Vector Machines under Adversarial Label Contamination

44. Phantom Sponges: Exploiting Non-Maximum Suppression to Attack Deep Object Detectors

45. Time delay estimation in unresolved lensed quasars

46. Facemasks for Source Control: Testing Influenza Transfer to Bedside Tables

47. Semiotics of Distances in Virtual and Augmented Environments

48. Between Persuasion and Dissuasion: Narratological Meta-operativity in Augmented Experience Design

49. Why Adversarial Reprogramming Works, When It Fails, and How to Tell the Difference

50. The Threat of Offensive AI to Organizations

Catalog

Books, media, physical & digital resources