Battista Biggio
Battista Biggio
Assistant Professor at University of Cagliari, Co-Founder of Pluribus One
Email verificata su - Home page
TitoloCitata daAnno
Evasion attacks against machine learning at test time
B Biggio, I Corona, D Maiorca, B Nelson, N Šrndić, P Laskov, G Giacinto, ...
6th European Machine Learning and Data Mining Conference (ECML/PKDD), 2013
Poisoning attacks against support vector machines
B Biggio, B Nelson, P Laskov
Int'l Conference on Machine Learning (ICML), 2012
Security evaluation of pattern classifiers under attack
B Biggio, G Fumera, F Roli
IEEE Transactions on Knowledge and Data Engineering 26 (4), 984-996, 2014
Support Vector Machines Under Adversarial Label Noise
B Biggio, B Nelson, P Laskov
Journal of Machine Learning Research-Proceedings Track 20, 97-112, 2011
Multiple classifier systems for robust classifier design in adversarial environments
B Biggio, G Fumera, F Roli
International Journal of Machine Learning and Cybernetics 1 (1-4), 27-41, 2010
Security evaluation of biometric authentication systems under real spoofing attacks (2014 Premium Award for Best Paper in IET Biometrics)
B Biggio, Z Akhtar, G Fumera, GL Marcialis, F Roli
IET biometrics 1 (1), 11-24, 2012
Is Feature Selection Secure against Training Data Poisoning?
H Xiao, B Biggio, G Brown, G Fumera, C Eckert, F Roli
Int'l Conference on Machine Learning (ICML), 2015
Adversarial feature selection against evasion attacks
F Zhang, PPK Chan, B Biggio, DS Yeung, F Roli
IEEE Transactions on Cybernetics, 2015
Wild Patterns: Ten Years After the Rise of Adversarial Machine Learning
B Biggio, F Roli
Pattern Recognition, 2018
A survey and experimental evaluation of image spam filtering techniques
B Biggio, G Fumera, I Pillai, F Roli
Pattern Recognition Letters 32 (10), 1436-1446, 2011
Poisoning behavioral malware clustering
B Biggio, K Rieck, D Ariu, C Wressnegger, I Corona, G Giacinto, F Roli
Proceedings of the 2014 workshop on artificial intelligent and security …, 2014
Is data clustering in adversarial settings secure?
B Biggio, I Pillai, S Rota Bulò, D Ariu, M Pelillo, F Roli
Proceedings of the 2013 ACM workshop on Artificial intelligence and security …, 2013
Towards Poisoning of Deep Learning Algorithms with Back-gradient Optimization
L Muñoz-González, B Biggio, A Demontis, A Paudice, V Wongrassamee, ...
10th ACM Workshop on Artificial Intelligence & Security (AISec'17), 2017
Adversarial pattern classification using multiple classifiers and randomisation
B Biggio, G Fumera, F Roli
Joint IAPR International Workshops on Statistical Techniques in Pattern …, 2008
Image spam filtering using visual information
B Biggio, G Fumera, I Pillai, F Roli
14th International Conference on Image Analysis and Processing (ICIAP 2007 …, 2007
Support Vector Machines under Adversarial Label Contamination
H Xiao, B Biggio, B Nelson, H Xiao, C Eckert, F Roli
Neurocomputing, 2014
Pattern recognition systems under attack: Design issues and research challenges
B Biggio, G Fumera, F Roli
International Journal of Pattern Recognition and Artificial Intelligence 28 …, 2014
Bagging classifiers for fighting poisoning attacks in adversarial classification tasks
B Biggio, I Corona, G Fumera, G Giacinto, F Roli
International workshop on multiple classifier systems, 350-359, 2011
Image Spam Filtering by Content Obscuring Detection
B Biggio, G Fumera, I Pillai, F Roli
CEAS, 2007
Who are you? A statistical approach to measuring user authenticity
DM Freeman, S Jain, M Dürmuth, B Biggio, G Giacinto
Proc. 23rd Annual Network & Distributed System Security Symposium (NDSS), 2016
Il sistema al momento non può eseguire l'operazione. Riprova più tardi.
Articoli 1–20