Maura Pintor
Maura Pintor
PhD Student
Verified email at unica.it
Title
Cited by
Cited by
Year
Why do adversarial attacks transfer? explaining transferability of evasion and poisoning attacks
A Demontis, M Melis, M Pintor, M Jagielski, B Biggio, A Oprea, ...
28th {USENIX} Security Symposium ({USENIX} Security 19), 321-338, 2019
552019
On the Intriguing Connections of Regularization, Input Gradients and Transferability of Evasion and Poisoning Attacks. CoRR abs/1809.02861 (2018)
A Demontis, M Melis, M Pintor, M Jagielski, B Biggio, A Oprea, ...
arXiv preprint arXiv:1809.02861, 2018
72018
ALOHA: an architectural-aware framework for deep learning at the edge
P Meloni, D Loi, G Deriu, AD Pimentel, D Sapra, B Moser, N Shepeleva, ...
Proceedings of the Workshop on INTelligent Embedded Systems Architectures …, 2018
62018
Be right Beach: A social IoT system for sustainable tourism based on beach overcrowding avoidance
R Girau, E Ferrara, M Pintor, M Sole, D Giusto
2018 IEEE International Conference on Internet of Things (iThings) and IEEE …, 2018
42018
secml: A Python Library for Secure and Explainable Machine Learning
M Melis, A Demontis, M Pintor, A Sotgiu, B Biggio
arXiv preprint arXiv:1912.10013, 2019
32019
Optimization and deployment of CNNs at the edge: the ALOHA experience
P Meloni, D Loi, P Busia, G Deriu, AD Pimentel, D Sapra, T Stefanov, ...
Proceedings of the 16th ACM International Conference on Computing Frontiers …, 2019
22019
Detecting Anomalies from Video-Sequences: a Novel Descriptor
G Orrų, D Ghiani, M Pintor, GL Marcialis, F Roli
arXiv preprint arXiv:2010.06407, 2020
2020
Attacking machine learning for fun and profit (with the authors of SecML)(Ep. 80)
M Melis, A Demontis, M Pintor, B Biggio
The system can't perform the operation now. Try again later.
Articles 1–8