Search

Your search keyword '"Biggio A"' showing total 5,020 results

Search Constraints

Start Over You searched for: Author "Biggio A" Remove constraint Author: "Biggio A"
5,020 results on '"Biggio A"'

Search Results

1. On the Robustness of Adversarial Training Against Uncertainty Attacks

2. Bilinear Sequence Regression: A Model for Learning from Long Sequences of High-dimensional Tokens

3. Adversarial Pruning: A Survey and Benchmark of Pruning Methods for Adversarial Robustness

4. Sonic: Fast and Transferable Data Poisoning on Clustering Algorithms

5. Formal Operational Performance: Epochal and Sociocultural Differences in the First Level of Secondary School Students in Argentina

6. Counting in Small Transformers: The Delicate Interplay between Attention and Feed-Forward Layers

7. HO-FMN: Hyperparameter Optimization for Fast Minimum-Norm Attacks

8. ModSec-Learn: Boosting ModSecurity with Machine Learning

9. Over-parameterization and Adversarial Robustness in Neural Networks: An Overview and Empirical Analysis

10. SLIFER: Investigating Performance and Robustness of Malware Detection Pipelines

11. Certified Adversarial Robustness of Machine Learning-based Malware Detectors via (De)Randomized Smoothing

12. AttackBench: Evaluating Gradient-based Attacks for Adversarial Examples

13. Robust Synthetic Data-Driven Detection of Living-Off-the-Land Reverse Shells

14. Robustness-Congruent Adversarial Training for Secure Machine Learning Model Updates

15. $\sigma$-zero: Gradient-based Optimization of $\ell_0$-norm Adversarial Examples

17. Harnessing Synthetic Datasets: The Role of Shape Bias in Deep Neural Network Generalization

19. Should you hold onto the treadmill handrails or not? Cortical evidence at different walking speeds

20. Improving Fast Minimum-Norm Attacks with Hyperparameter Optimization

21. Samples on Thin Ice: Re-Evaluating Adversarial Pruning of Neural Networks

22. Raze to the Ground: Query-Efficient Adversarial HTML Attacks on Machine-Learning Phishing Webpage Detectors

23. Nebula: Self-Attention for Dynamic Malware Analysis

24. Adversarial Attacks Against Uncertainty Quantification

25. Hardening RGB-D Object Recognition Systems against Adversarial Patch Attacks

26. ModSec-AdvLearn: Countering Adversarial SQL Injections with Robust Machine Learning

28. Accelerating galaxy dynamical modeling using a neural network for joint lensing and kinematics analyses

29. Minimizing Energy Consumption of Deep Learning Models by Energy-Aware Training

30. Gemtelligence: Accelerating Gemstone classification with Deep Learning

31. Dynamic Context Pruning for Efficient and Interpretable Autoregressive Transformers

32. Uncertainty Quantification in Machine Learning for Engineering Design and Health Prognostics: A Tutorial

33. Type-II Majoron Dark Matter

34. Controllable Neural Symbolic Regression

35. The Southern Center for Maternal Health Equity (SCMHE): a multisector multifaceted community-based approach to reduce disparities in maternal morbidity and mortality in the Gulf South

36. An SDE for Modeling SAM: Theory and Insights

37. A Survey on Reinforcement Learning Security with Application to Autonomous Driving

38. Cosmology from Galaxy Redshift Surveys with PointNet

39. Stateful Detection of Adversarial Reprogramming

40. Modeling lens potentials with continuous neural fields in galaxy-scale strong lenses

41. Explaining Machine Learning DGA Detectors from DNS Traffic Data

42. Robust Machine Learning for Malware Detection over Time

44. Reduction of peripersonal comfort space correlate with eating disorder symptoms in young adolescents: a network analysis approach

45. Practical Attacks on Machine Learning: A Case Study on Adversarial Windows Malware

46. Machine Learning Security in Industry: A Quantitative Survey

47. Fast emulation of two-point angular statistics for photometric galaxy surveys

48. Signal Propagation in Transformers: Theoretical Perspectives and the Role of Rank Collapse

49. Dynaformer: A Deep Learning Model for Ageing-aware Battery Discharge Prediction

50. Support Vector Machines under Adversarial Label Contamination

Catalog

Books, media, physical & digital resources