Search

Your search keyword '"Biggio, Battista"' showing total 541 results

Search Constraints

Start Over You searched for: Author "Biggio, Battista" Remove constraint Author: "Biggio, Battista"
541 results on '"Biggio, Battista"'

Search Results

1. Adversarial Pruning: A Survey and Benchmark of Pruning Methods for Adversarial Robustness

2. Sonic: Fast and Transferable Data Poisoning on Clustering Algorithms

3. HO-FMN: Hyperparameter Optimization for Fast Minimum-Norm Attacks

4. ModSec-Learn: Boosting ModSecurity with Machine Learning

5. Over-parameterization and Adversarial Robustness in Neural Networks: An Overview and Empirical Analysis

6. SLIFER: Investigating Performance and Robustness of Malware Detection Pipelines

7. Certified Adversarial Robustness of Machine Learning-based Malware Detectors via (De)Randomized Smoothing

8. AttackBench: Evaluating Gradient-based Attacks for Adversarial Examples

10. Living-off-The-Land Reverse-Shell Detection by Informed Data Augmentation

11. Robustness-Congruent Adversarial Training for Secure Machine Learning Model Updates

12. $\sigma$-zero: Gradient-based Optimization of $\ell_0$-norm Adversarial Examples

13. Improving Fast Minimum-Norm Attacks with Hyperparameter Optimization

14. Samples on Thin Ice: Re-Evaluating Adversarial Pruning of Neural Networks

15. Raze to the Ground: Query-Efficient Adversarial HTML Attacks on Machine-Learning Phishing Webpage Detectors

16. Nebula: Self-Attention for Dynamic Malware Analysis

17. Adversarial Attacks Against Uncertainty Quantification

18. Hardening RGB-D Object Recognition Systems against Adversarial Patch Attacks

19. Adversarial ModSecurity: Countering Adversarial SQL Injections with Robust Machine Learning

20. Minimizing Energy Consumption of Deep Learning Models by Energy-Aware Training

21. A Survey on Reinforcement Learning Security with Application to Autonomous Driving

22. Stateful Detection of Adversarial Reprogramming

23. Explaining Machine Learning DGA Detectors from DNS Traffic Data

24. Robust Machine Learning for Malware Detection over Time

25. Practical Attacks on Machine Learning: A Case Study on Adversarial Windows Malware

26. Machine Learning Security in Industry: A Quantitative Survey

27. Support Vector Machines under Adversarial Label Contamination

28. Phantom Sponges: Exploiting Non-Maximum Suppression to Attack Deep Object Detectors

29. Wild Patterns Reloaded: A Survey of Machine Learning Security against Training Data Poisoning

30. Machine Learning Security against Data Poisoning: Are We There Yet?

31. Energy-Latency Attacks via Sponge Poisoning

32. ImageNet-Patch: A Dataset for Benchmarking Machine Learning Robustness against Adversarial Patches

33. Why Adversarial Reprogramming Works, When It Fails, and How to Tell the Difference

34. The Threat of Offensive AI to Organizations

35. Indicators of Attack Failure: Debugging and Improving Optimization of Adversarial Examples

36. Backdoor Learning Curves: Explaining Backdoor Poisoning Beyond Influence Functions

37. Mental Models of Adversarial Machine Learning

38. secml-malware: Pentesting Windows Malware Classifiers with Adversarial EXEmples in Python

39. The Hammer and the Nut: Is Bilevel Optimization Really Needed to Poison Linear Classifiers?

40. Fast Minimum-norm Adversarial Attacks through Adaptive Norm Constraints

41. Poisoning Attacks on Cyber Attack Detectors for Industrial Control Systems

43. FADER: Fast Adversarial Example Rejection

44. Adversarial EXEmples: A Survey and Experimental Evaluation of Practical Attacks on Machine Learning for Windows Malware Detection

45. Backdoor Smoothing: Demystifying Backdoor Attacks on Deep Neural Networks

46. Domain Knowledge Alleviates Adversarial Attacks in Multi-Label Classifiers

47. Adversarial Feature Selection against Evasion Attacks

48. Do Gradient-based Explanations Tell Anything About Adversarial Robustness to Android Malware?

49. Poisoning Attacks on Algorithmic Fairness

50. Functionality-preserving Black-box Optimization of Adversarial Windows Malware

Catalog

Books, media, physical & digital resources