Alert button
Picture for Fabio Roli

Fabio Roli

Alert button

Living-off-The-Land Reverse-Shell Detection by Informed Data Augmentation

Add code
Bookmark button
Alert button
Feb 28, 2024
Dmitrijs Trizna, Luca Demetrio, Battista Biggio, Fabio Roli

Viaarxiv icon

Robustness-Congruent Adversarial Training for Secure Machine Learning Model Updates

Add code
Bookmark button
Alert button
Feb 27, 2024
Daniele Angioni, Luca Demetrio, Maura Pintor, Luca Oneto, Davide Anguita, Battista Biggio, Fabio Roli

Viaarxiv icon

Serial fusion of multi-modal biometric systems

Add code
Bookmark button
Alert button
Jan 24, 2024
Gian Luca Marcialis, Paolo Mastinu, Fabio Roli

Viaarxiv icon

3D Face Reconstruction: the Road to Forensics

Add code
Bookmark button
Alert button
Sep 20, 2023
Simone Maurizio La Cava, Giulia Orrù, Martin Drahansky, Gian Luca Marcialis, Fabio Roli

Figure 1 for 3D Face Reconstruction: the Road to Forensics
Figure 2 for 3D Face Reconstruction: the Road to Forensics
Figure 3 for 3D Face Reconstruction: the Road to Forensics
Figure 4 for 3D Face Reconstruction: the Road to Forensics
Viaarxiv icon

Adversarial Attacks Against Uncertainty Quantification

Add code
Bookmark button
Alert button
Sep 19, 2023
Emanuele Ledda, Daniele Angioni, Giorgio Piras, Giorgio Fumera, Battista Biggio, Fabio Roli

Viaarxiv icon

Hardening RGB-D Object Recognition Systems against Adversarial Patch Attacks

Add code
Bookmark button
Alert button
Sep 13, 2023
Yang Zheng, Luca Demetrio, Antonio Emanuele Cinà, Xiaoyi Feng, Zhaoqiang Xia, Xiaoyue Jiang, Ambra Demontis, Battista Biggio, Fabio Roli

Figure 1 for Hardening RGB-D Object Recognition Systems against Adversarial Patch Attacks
Figure 2 for Hardening RGB-D Object Recognition Systems against Adversarial Patch Attacks
Figure 3 for Hardening RGB-D Object Recognition Systems against Adversarial Patch Attacks
Figure 4 for Hardening RGB-D Object Recognition Systems against Adversarial Patch Attacks
Viaarxiv icon

Minimizing Energy Consumption of Deep Learning Models by Energy-Aware Training

Add code
Bookmark button
Alert button
Jul 01, 2023
Dario Lazzaro, Antonio Emanuele Cinà, Maura Pintor, Ambra Demontis, Battista Biggio, Fabio Roli, Marcello Pelillo

Figure 1 for Minimizing Energy Consumption of Deep Learning Models by Energy-Aware Training
Figure 2 for Minimizing Energy Consumption of Deep Learning Models by Energy-Aware Training
Figure 3 for Minimizing Energy Consumption of Deep Learning Models by Energy-Aware Training
Figure 4 for Minimizing Energy Consumption of Deep Learning Models by Energy-Aware Training
Viaarxiv icon

Dropout Injection at Test Time for Post Hoc Uncertainty Quantification in Neural Networks

Add code
Bookmark button
Alert button
Feb 06, 2023
Emanuele Ledda, Giorgio Fumera, Fabio Roli

Figure 1 for Dropout Injection at Test Time for Post Hoc Uncertainty Quantification in Neural Networks
Figure 2 for Dropout Injection at Test Time for Post Hoc Uncertainty Quantification in Neural Networks
Figure 3 for Dropout Injection at Test Time for Post Hoc Uncertainty Quantification in Neural Networks
Figure 4 for Dropout Injection at Test Time for Post Hoc Uncertainty Quantification in Neural Networks
Viaarxiv icon

A Survey on Reinforcement Learning Security with Application to Autonomous Driving

Add code
Bookmark button
Alert button
Dec 12, 2022
Ambra Demontis, Maura Pintor, Luca Demetrio, Kathrin Grosse, Hsiao-Ying Lin, Chengfang Fang, Battista Biggio, Fabio Roli

Figure 1 for A Survey on Reinforcement Learning Security with Application to Autonomous Driving
Figure 2 for A Survey on Reinforcement Learning Security with Application to Autonomous Driving
Figure 3 for A Survey on Reinforcement Learning Security with Application to Autonomous Driving
Figure 4 for A Survey on Reinforcement Learning Security with Application to Autonomous Driving
Viaarxiv icon

Practical Attacks on Machine Learning: A Case Study on Adversarial Windows Malware

Add code
Bookmark button
Alert button
Jul 12, 2022
Luca Demetrio, Battista Biggio, Fabio Roli

Figure 1 for Practical Attacks on Machine Learning: A Case Study on Adversarial Windows Malware
Figure 2 for Practical Attacks on Machine Learning: A Case Study on Adversarial Windows Malware
Figure 3 for Practical Attacks on Machine Learning: A Case Study on Adversarial Windows Malware
Figure 4 for Practical Attacks on Machine Learning: A Case Study on Adversarial Windows Malware
Viaarxiv icon