Search

Your search keyword '"A, Biggio"' showing total 5,057 results

Search Constraints

Start Over You searched for: Author "A, Biggio" Remove constraint Author: "A, Biggio"
5,057 results on '"A, Biggio"'

Search Results

1. On the Robustness of Adversarial Training Against Uncertainty Attacks

2. Bilinear Sequence Regression: A Model for Learning from Long Sequences of High-dimensional Tokens

3. Formal Operational Performance: Epochal and Sociocultural Differences in the First Level of Secondary School Students in Argentina

4. Adversarial Pruning: A Survey and Benchmark of Pruning Methods for Adversarial Robustness

5. Sonic: Fast and Transferable Data Poisoning on Clustering Algorithms

6. Counting in Small Transformers: The Delicate Interplay between Attention and Feed-Forward Layers

7. HO-FMN: Hyperparameter Optimization for Fast Minimum-Norm Attacks

9. ModSec-Learn: Boosting ModSecurity with Machine Learning

10. Over-parameterization and Adversarial Robustness in Neural Networks: An Overview and Empirical Analysis

11. SLIFER: Investigating Performance and Robustness of Malware Detection Pipelines

12. Certified Adversarial Robustness of Machine Learning-based Malware Detectors via (De)Randomized Smoothing

13. AttackBench: Evaluating Gradient-based Attacks for Adversarial Examples

14. Robust Synthetic Data-Driven Detection of Living-Off-the-Land Reverse Shells

15. Robustness-Congruent Adversarial Training for Secure Machine Learning Model Updates

16. $\sigma$-zero: Gradient-based Optimization of $\ell_0$-norm Adversarial Examples

17. Should you hold onto the treadmill handrails or not? Cortical evidence at different walking speeds

18. Harnessing Synthetic Datasets: The Role of Shape Bias in Deep Neural Network Generalization

19. Improving Fast Minimum-Norm Attacks with Hyperparameter Optimization

20. Samples on Thin Ice: Re-Evaluating Adversarial Pruning of Neural Networks

21. Raze to the Ground: Query-Efficient Adversarial HTML Attacks on Machine-Learning Phishing Webpage Detectors

23. Nebula: Self-Attention for Dynamic Malware Analysis

24. Adversarial Attacks Against Uncertainty Quantification

25. Hardening RGB-D Object Recognition Systems against Adversarial Patch Attacks

26. ModSec-AdvLearn: Countering Adversarial SQL Injections with Robust Machine Learning

27. Accelerating galaxy dynamical modeling using a neural network for joint lensing and kinematics analyses

28. Minimizing Energy Consumption of Deep Learning Models by Energy-Aware Training

30. Gemtelligence: Accelerating Gemstone classification with Deep Learning

31. Dynamic Context Pruning for Efficient and Interpretable Autoregressive Transformers

32. Uncertainty Quantification in Machine Learning for Engineering Design and Health Prognostics: A Tutorial

33. Type-II Majoron Dark Matter

34. Controllable Neural Symbolic Regression

35. An SDE for Modeling SAM: Theory and Insights

36. A Survey on Reinforcement Learning Security with Application to Autonomous Driving

37. Cosmology from Galaxy Redshift Surveys with PointNet

38. Stateful Detection of Adversarial Reprogramming

39. Modeling lens potentials with continuous neural fields in galaxy-scale strong lenses

41. The Southern Center for Maternal Health Equity (SCMHE): a multisector multifaceted community-based approach to reduce disparities in maternal morbidity and mortality in the Gulf South

42. Explaining Machine Learning DGA Detectors from DNS Traffic Data

43. Robust Machine Learning for Malware Detection over Time

44. Practical Attacks on Machine Learning: A Case Study on Adversarial Windows Malware

45. Machine Learning Security in Industry: A Quantitative Survey

48. Fast emulation of two-point angular statistics for photometric galaxy surveys

49. Signal Propagation in Transformers: Theoretical Perspectives and the Role of Rank Collapse

50. Dynaformer: A Deep Learning Model for Ageing-aware Battery Discharge Prediction

Catalog

Books, media, physical & digital resources