Picture for Battista Biggio

Battista Biggio

University of Cagliari

SAGE-5GC: Security-Aware Guidelines for Evaluating Anomaly Detection in the 5G Core Network

Add code
Feb 03, 2026
Viaarxiv icon

Out-of-Distribution Detection for Continual Learning: Design Principles and Benchmarking

Add code
Dec 16, 2025
Figure 1 for Out-of-Distribution Detection for Continual Learning: Design Principles and Benchmarking
Figure 2 for Out-of-Distribution Detection for Continual Learning: Design Principles and Benchmarking
Figure 3 for Out-of-Distribution Detection for Continual Learning: Design Principles and Benchmarking
Figure 4 for Out-of-Distribution Detection for Continual Learning: Design Principles and Benchmarking
Viaarxiv icon

SOM Directions are Better than One: Multi-Directional Refusal Suppression in Language Models

Add code
Nov 13, 2025
Viaarxiv icon

Exploiting Edge Features for Transferable Adversarial Attacks in Distributed Machine Learning

Add code
Jul 09, 2025
Figure 1 for Exploiting Edge Features for Transferable Adversarial Attacks in Distributed Machine Learning
Figure 2 for Exploiting Edge Features for Transferable Adversarial Attacks in Distributed Machine Learning
Figure 3 for Exploiting Edge Features for Transferable Adversarial Attacks in Distributed Machine Learning
Figure 4 for Exploiting Edge Features for Transferable Adversarial Attacks in Distributed Machine Learning
Viaarxiv icon

RAID: A Dataset for Testing the Adversarial Robustness of AI-Generated Image Detectors

Add code
Jun 09, 2025
Viaarxiv icon

Buffer-free Class-Incremental Learning with Out-of-Distribution Detection

Add code
May 29, 2025
Viaarxiv icon

On the Robustness of Adversarial Training Against Uncertainty Attacks

Add code
Oct 29, 2024
Figure 1 for On the Robustness of Adversarial Training Against Uncertainty Attacks
Figure 2 for On the Robustness of Adversarial Training Against Uncertainty Attacks
Figure 3 for On the Robustness of Adversarial Training Against Uncertainty Attacks
Figure 4 for On the Robustness of Adversarial Training Against Uncertainty Attacks
Viaarxiv icon

Adversarial Pruning: A Survey and Benchmark of Pruning Methods for Adversarial Robustness

Add code
Sep 02, 2024
Viaarxiv icon

Sonic: Fast and Transferable Data Poisoning on Clustering Algorithms

Add code
Aug 14, 2024
Figure 1 for Sonic: Fast and Transferable Data Poisoning on Clustering Algorithms
Figure 2 for Sonic: Fast and Transferable Data Poisoning on Clustering Algorithms
Figure 3 for Sonic: Fast and Transferable Data Poisoning on Clustering Algorithms
Figure 4 for Sonic: Fast and Transferable Data Poisoning on Clustering Algorithms
Viaarxiv icon

HO-FMN: Hyperparameter Optimization for Fast Minimum-Norm Attacks

Add code
Jul 11, 2024
Figure 1 for HO-FMN: Hyperparameter Optimization for Fast Minimum-Norm Attacks
Figure 2 for HO-FMN: Hyperparameter Optimization for Fast Minimum-Norm Attacks
Figure 3 for HO-FMN: Hyperparameter Optimization for Fast Minimum-Norm Attacks
Figure 4 for HO-FMN: Hyperparameter Optimization for Fast Minimum-Norm Attacks
Viaarxiv icon