Battista Biggio
Orcid: 0000-0001-7752-509XAffiliations:
- University of Cagliari, Italy
According to our database1,
Battista Biggio
authored at least 159 papers
between 2007 and 2025.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
Online presence:
-
on orcid.org
-
on dl.acm.org
On csauthors.net:
Bibliography
2025
Neurocomputing, 2025
2024
Commun. ACM, November, 2024
IEEE Trans. Intell. Transp. Syst., August, 2024
Computer, March, 2024
IEEE Trans. Inf. Forensics Secur., 2024
Adversarial Pruning: A Survey and Benchmark of Pruning Methods for Adversarial Robustness.
CoRR, 2024
Over-parameterization and Adversarial Robustness in Neural Networks: An Overview and Empirical Analysis.
CoRR, 2024
CoRR, 2024
Certified Adversarial Robustness of Machine Learning-based Malware Detectors via (De)Randomized Smoothing.
CoRR, 2024
CoRR, 2024
CoRR, 2024
CoRR, 2024
Proceedings of the Thirty-Eighth AAAI Conference on Artificial Intelligence, 2024
2023
Inf. Sci., December, 2023
IEEE Trans. Inf. Forensics Secur., 2023
ImageNet-Patch: A dataset for benchmarking machine learning robustness against adversarial patches.
Pattern Recognit., 2023
Inf. Sci., 2023
Wild Patterns Reloaded: A Survey of Machine Learning Security against Training Data Poisoning.
ACM Comput. Surv., 2023
Adversarial ModSecurity: Countering Adversarial SQL Injections with Robust Machine Learning.
CoRR, 2023
Proceedings of the IEEE/CVF Winter Conference on Applications of Computer Vision, 2023
Proceedings of the Italia Intelligenza Artificiale, 2023
Proceedings of the Italia Intelligenza Artificiale, 2023
Proceedings of the International Conference on Machine Learning and Cybernetics, 2023
Proceedings of the International Conference on Machine Learning and Cybernetics, 2023
Proceedings of the Image Analysis and Processing - ICIAP 2023, 2023
Proceedings of the IEEE/CVF International Conference on Computer Vision, 2023
Proceedings of the 31st European Symposium on Artificial Neural Networks, 2023
Towards Machine Learning Models that We Can Trust: Testing, Improving, and Explaining Robustness.
Proceedings of the 31st European Symposium on Artificial Neural Networks, 2023
Raze to the Ground: Query-Efficient Adversarial HTML Attacks on Machine-Learning Phishing Webpage Detectors.
Proceedings of the 16th ACM Workshop on Artificial Intelligence and Security, 2023
2022
IEEE Trans. Pattern Anal. Mach. Intell., 2022
Do gradient-based explanations tell anything about adversarial robustness to android malware?
Int. J. Mach. Learn. Cybern., 2022
Towards learning trustworthily, automatically, and with guarantees on graphs: An overview.
Neurocomputing, 2022
IEEE Secur. Priv., 2022
CoRR, 2022
Denial-of-Service Attack on Object Detection Model Using Universal Adversarial Perturbation.
CoRR, 2022
Practical Evaluation of Poisoning Attacks on Online Anomaly Detectors in Industrial Control Systems.
Comput. Secur., 2022
Comput. Secur., 2022
Proceedings of the Eighteenth Symposium on Usable Privacy and Security, 2022
Indicators of Attack Failure: Debugging and Improving Optimization of Adversarial Examples.
Proceedings of the Advances in Neural Information Processing Systems 35: Annual Conference on Neural Information Processing Systems 2022, 2022
Proceedings of the Italian Conference on Cybersecurity (ITASEC 2022), 2022
Proceedings of the Italian Conference on Cybersecurity (ITASEC 2022), 2022
Proceedings of the Thirty-First International Joint Conference on Artificial Intelligence, 2022
Proceedings of the ARES 2022: The 17th International Conference on Availability, Reliability and Security, Vienna,Austria, August 23, 2022
2021
Adversarial EXEmples: A Survey and Experimental Evaluation of Practical Attacks on Machine Learning for Windows Malware Detection.
ACM Trans. Priv. Secur., 2021
IEEE Trans. Inf. Forensics Secur., 2021
Empirical assessment of generating adversarial configurations for software product lines.
Empir. Softw. Eng., 2021
Indicators of Attack Failure: Debugging and Improving Optimization of Adversarial Examples.
CoRR, 2021
CoRR, 2021
secml-malware: A Python Library for Adversarial Robustness Evaluation of Windows Malware Classifiers.
CoRR, 2021
Computer, 2021
Proceedings of the SAC '21: The 36th ACM/SIGAPP Symposium on Applied Computing, 2021
Proceedings of the Advances in Neural Information Processing Systems 34: Annual Conference on Neural Information Processing Systems 2021, 2021
The Hammer and the Nut: Is Bilevel Optimization Really Needed to Poison Linear Classifiers?
Proceedings of the International Joint Conference on Neural Networks, 2021
Proceedings of the 29th European Symposium on Artificial Neural Networks, 2021
Proceedings of the 29th European Symposium on Artificial Neural Networks, 2021
Proceedings of the Database and Expert Systems Applications - DEXA 2021 Workshops, 2021
2020
CoRR, 2020
Efficient Black-box Optimization of Adversarial Windows Malware with Constrained Manipulations.
CoRR, 2020
Comput. Secur., 2020
Proceedings of the Machine Learning and Knowledge Discovery in Databases, 2020
2019
IEEE Trans. Dependable Secur. Comput., 2019
IEEE Secur. Priv., 2019
ACM Comput. Surv., 2019
CoRR, 2019
Why Do Adversarial Attacks Transfer? Explaining Transferability of Evasion and Poisoning Attacks.
Proceedings of the 28th USENIX Security Symposium, 2019
Proceedings of the 23rd International Systems and Software Product Line Conference, 2019
Proceedings of the Third Italian Conference on Cyber Security, 2019
Proceedings of the 27th European Symposium on Artificial Neural Networks, 2019
Proceedings of the 27th European Symposium on Artificial Neural Networks, 2019
Proceedings of the 16th ACM International Conference on Computing Frontiers, 2019
Poster: Attacking Malware Classifiers by Crafting Gradient-Attacks that Preserve Functionality.
Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications Security, 2019
Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications Security, 2019
2018
Pattern Recognit., 2018
Towards Robust Detection of Adversarial Infection Vectors: Lessons Learned in PDF Malware.
CoRR, 2018
On the Intriguing Connections of Regularization, Input Gradients and Transferability of Evasion and Poisoning Attacks.
CoRR, 2018
Manipulating Machine Learning: Poisoning Attacks and Countermeasures for Regression Learning.
Proceedings of the 2018 IEEE Symposium on Security and Privacy, 2018
Architecture-aware design and implementation of CNN algorithms for embedded inference: the ALOHA project.
Proceedings of the 30th International Conference on Microelectronics, 2018
Proceedings of the 26th European Signal Processing Conference, 2018
Adversarial Malware Binaries: Evading Deep Learning for Malware Detection in Executables.
Proceedings of the 26th European Signal Processing Conference, 2018
Proceedings of the Workshop on INTelligent Embedded Systems Architectures and Applications, 2018
Proceedings of the 11th ACM Workshop on Artificial Intelligence and Security, 2018
Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security, 2018
2017
IEEE Trans. Neural Networks Learn. Syst., 2017
IEEE Trans. Pattern Anal. Mach. Intell., 2017
Detection of Malicious Scripting Code Through Discriminant and Adversary-Aware API Analysis.
Proceedings of the First Italian Conference on Cybersecurity (ITASEC17), 2017
Proceedings of the First Italian Conference on Cybersecurity (ITASEC17), 2017
Is Deep Learning Safe for Robot Vision? Adversarial Examples Against the iCub Humanoid.
Proceedings of the 2017 IEEE International Conference on Computer Vision Workshops, 2017
Proceedings of the Computer Security - ESORICS 2017, 2017
Proceedings of the 10th ACM Workshop on Artificial Intelligence and Security, 2017
Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security, 2017
Proceedings of the AI*IA 2017 Advances in Artificial Intelligence, 2017
2016
AdversariaLib: An Open-source Library for the Security Evaluation of Machine Learning Algorithms Under Attack.
CoRR, 2016
Proceedings of the Structural, Syntactic, and Statistical Pattern Recognition, 2016
Proceedings of the 23rd Annual Network and Distributed System Security Symposium, 2016
Proceedings of the 4th ACM Workshop on Information Hiding and Multimedia Security, 2016
Proceedings of the 2016 ACM Workshop on Artificial Intelligence and Security, 2016
Proceedings of the 6th Workshop on Security and Privacy in Smartphones and Mobile Devices, 2016
2015
Proceedings of the Encyclopedia of Biometrics, Second Edition, 2015
Adversarial Biometric Recognition : A review on biometric system security from the adversarial machine-learning perspective.
IEEE Signal Process. Mag., 2015
One-and-a-Half-Class Multiple Classifier Systems for Secure Learning Against Evasion Attacks at Test Time.
Proceedings of the Multiple Classifier Systems - 12th International Workshop, 2015
Proceedings of the 32nd International Conference on Machine Learning, 2015
Proceedings of the Image Analysis and Processing - ICIAP 2015, 2015
Proceedings of the Image Analysis and Processing - ICIAP 2015, 2015
Proceedings of the International Conference on Biometrics, 2015
2014
Proceedings of the Handbook of Biometric Anti-Spoofing, 2014
IEEE Trans. Knowl. Data Eng., 2014
Int. J. Pattern Recognit. Artif. Intell., 2014
CoRR, 2014
Proceedings of the Structural, Syntactic, and Statistical Pattern Recognition, 2014
Proceedings of the 2014 Workshop on Artificial Intelligent and Security Workshop, 2014
Proceedings of the 2014 Workshop on Artificial Intelligent and Security Workshop, 2014
2013
Proceedings of the Machine Learning and Knowledge Discovery in Databases, 2013
Proceedings of the International Conference on Biometrics, 2013
Proceedings of the Progress in Pattern Recognition, Image Analysis, Computer Vision, and Applications, 2013
2012
IET Biom., 2012
Proceedings of the Structural, Syntactic, and Statistical Pattern Recognition, 2012
Proceedings of the 29th International Conference on Machine Learning, 2012
Learning sparse kernel machines with biometric similarity functions for identity recognition.
Proceedings of the IEEE Fifth International Conference on Biometrics: Theory, 2012
2011
Pattern Recognit. Lett., 2011
Proceedings of the 3rd Asian Conference on Machine Learning, 2011
Proceedings of the 3rd Asian Conference on Machine Learning, 2011
Proceedings of the IEEE International Conference on Systems, 2011
Bagging Classifiers for Fighting Poisoning Attacks in Adversarial Classification Tasks.
Proceedings of the Multiple Classifier Systems - 10th International Workshop, 2011
Robustness of multi-modal biometric verification systems under realistic spoofing attacks.
Proceedings of the 2011 IEEE International Joint Conference on Biometrics, 2011
Proceedings of the 4th ACM Workshop on Security and Artificial Intelligence, 2011
Robustness of multi-modal biometric systems under realistic spoof attacks against all traits.
Proceedings of the IEEE Workshop on Biometric Measurements and Systems for Security and Medical Applications, 2011
2010
Multiple classifier systems for robust classifier design in adversarial environments.
Int. J. Mach. Learn. Cybern., 2010
Proceedings of the Multiple Classifier Systems, 9th International Workshop, 2010
2009
Proceedings of the Applications of Supervised and Unsupervised Ensemble Methods, 2009
Proceedings of the Innovations in Neural Information Paradigms and Applications, 2009
Proceedings of the Multiple Classifier Systems, 8th International Workshop, 2009
2008
Proceedings of the Structural, 2008
Proceedings of the CEAS 2008, 2008
2007
Proceedings of the Multiple Classifier Systems, 7th International Workshop, 2007
Proceedings of the 14th International Conference on Image Analysis and Processing (ICIAP 2007), 2007
Proceedings of the CEAS 2007, 2007