Folgen
Fabio Roli
Fabio Roli
Professor, University of Genova, Italy
Bestätigte E-Mail-Adresse bei unige.it - Startseite
Titel
Zitiert von
Zitiert von
Jahr
Evasion attacks against machine learning at test time
B Biggio, I Corona, D Maiorca, B Nelson, N Šrndić, P Laskov, G Giacinto, ...
Machine Learning and Knowledge Discovery in Databases: European Conference …, 2013
12642013
Wild patterns: Ten years after the rise of adversarial machine learning
B Biggio, F Roli
Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications …, 2018
11112018
Design of effective neural network ensembles for image classification purposes
G Giacinto, F Roli
Image and Vision Computing 19 (9-10), 699-707, 2001
6012001
Security evaluation of pattern classifiers under attack
B Biggio, G Fumera, F Roli
IEEE transactions on knowledge and data engineering 26 (4), 984-996, 2013
4882013
Methods for designing multiple classifier systems
F Roli, G Giacinto, G Vernazza
Multiple Classifier Systems: Second International Workshop, MCS 2001 …, 2001
468*2001
Towards poisoning of deep learning algorithms with back-gradient optimization
L Muñoz-González, B Biggio, A Demontis, A Paudice, V Wongrassamee, ...
Proceedings of the 10th ACM workshop on artificial intelligence and security …, 2017
4622017
Is feature selection secure against training data poisoning?
H Xiao, B Biggio, G Brown, G Fumera, C Eckert, F Roli
international conference on machine learning, 1689-1698, 2015
3972015
A theoretical and experimental analysis of linear combiners for multiple classifier systems
G Fumera, F Roli
IEEE transactions on pattern analysis and machine intelligence 27 (6), 942-956, 2005
3912005
Dynamic classifier selection based on multiple classifier behaviour
G Giacinto, F Roli
Pattern Recognition 34 (9), 1879-1882, 2001
3322001
Fusion of multiple classifiers for intrusion detection in computer networks
G Giacinto, F Roli, L Didaci
Pattern recognition letters 24 (12), 1795-1803, 2003
2942003
Adversarial malware binaries: Evading deep learning for malware detection in executables
B Kolosnjaji, A Demontis, B Biggio, D Maiorca, G Giacinto, C Eckert, ...
2018 26th European signal processing conference (EUSIPCO), 533-537, 2018
2812018
Intrusion detection in computer networks by a modular ensemble of one-class classifiers
G Giacinto, R Perdisci, M Del Rio, F Roli
Information Fusion 9 (1), 69-82, 2008
2782008
An approach to the automatic design of multiple classifier systems
G Giacinto, F Roli
Pattern recognition letters 22 (1), 25-33, 2001
2682001
Yes, machine learning can be more secure! a case study on android malware detection
A Demontis, M Melis, B Biggio, D Maiorca, D Arp, K Rieck, I Corona, ...
IEEE transactions on dependable and secure computing 16 (4), 711-724, 2017
2632017
Reject option with multiple thresholds
G Fumera, F Roli, G Giacinto
Pattern recognition 33 (12), 2099-2101, 2000
2342000
An extension of the Jeffreys-Matusita distance to multiclass cases for feature selection
L Bruzzone, F Roli, SB Serpico
IEEE Transactions on Geoscience and Remote Sensing 33 (6), 1318-1321, 1995
2341995
Why do adversarial attacks transfer? explaining transferability of evasion and poisoning attacks
A Demontis, M Melis, M Pintor, J Matthew, B Biggio, O Alina, NR Cristina, ...
28th USENIX security symposium, 321-338, 2019
2292019
First international fingerprint liveness detection competition—LivDet 2009
GL Marcialis, A Lewicke, B Tan, P Coli, D Grimberg, A Congiu, A Tidu, ...
Image Analysis and Processing–ICIAP 2009: 15th International Conference …, 2009
2292009
Spam filtering based on the analysis of text information embedded into images.
G Fumera, I Pillai, F Roli
Journal of Machine Learning Research 7 (12), 2006
2292006
Support vector machines under adversarial label contamination
H Xiao, B Biggio, B Nelson, H Xiao, C Eckert, F Roli
Neurocomputing 160, 53-62, 2015
2172015
Das System kann den Vorgang jetzt nicht ausführen. Versuchen Sie es später erneut.
Artikel 1–20