Alert button
Picture for Giorgio Fumera

Giorgio Fumera

Alert button

Adversarial Attacks Against Uncertainty Quantification

Add code
Bookmark button
Alert button
Sep 19, 2023
Emanuele Ledda, Daniele Angioni, Giorgio Piras, Giorgio Fumera, Battista Biggio, Fabio Roli

Viaarxiv icon

Dropout Injection at Test Time for Post Hoc Uncertainty Quantification in Neural Networks

Add code
Bookmark button
Alert button
Feb 06, 2023
Emanuele Ledda, Giorgio Fumera, Fabio Roli

Figure 1 for Dropout Injection at Test Time for Post Hoc Uncertainty Quantification in Neural Networks
Figure 2 for Dropout Injection at Test Time for Post Hoc Uncertainty Quantification in Neural Networks
Figure 3 for Dropout Injection at Test Time for Post Hoc Uncertainty Quantification in Neural Networks
Figure 4 for Dropout Injection at Test Time for Post Hoc Uncertainty Quantification in Neural Networks
Viaarxiv icon

Deep Neural Rejection against Adversarial Examples

Add code
Bookmark button
Alert button
Oct 01, 2019
Angelo Sotgiu, Ambra Demontis, Marco Melis, Battista Biggio, Giorgio Fumera, Xiaoyi Feng, Fabio Roli

Figure 1 for Deep Neural Rejection against Adversarial Examples
Figure 2 for Deep Neural Rejection against Adversarial Examples
Figure 3 for Deep Neural Rejection against Adversarial Examples
Figure 4 for Deep Neural Rejection against Adversarial Examples
Viaarxiv icon

Is feature selection secure against training data poisoning?

Add code
Bookmark button
Alert button
Apr 21, 2018
Huang Xiao, Battista Biggio, Gavin Brown, Giorgio Fumera, Claudia Eckert, Fabio Roli

Figure 1 for Is feature selection secure against training data poisoning?
Figure 2 for Is feature selection secure against training data poisoning?
Viaarxiv icon

Super-sparse Learning in Similarity Spaces

Add code
Bookmark button
Alert button
Dec 17, 2017
Ambra Demontis, Marco Melis, Battista Biggio, Giorgio Fumera, Fabio Roli

Figure 1 for Super-sparse Learning in Similarity Spaces
Figure 2 for Super-sparse Learning in Similarity Spaces
Figure 3 for Super-sparse Learning in Similarity Spaces
Figure 4 for Super-sparse Learning in Similarity Spaces
Viaarxiv icon

Is Deep Learning Safe for Robot Vision? Adversarial Examples against the iCub Humanoid

Add code
Bookmark button
Alert button
Aug 23, 2017
Marco Melis, Ambra Demontis, Battista Biggio, Gavin Brown, Giorgio Fumera, Fabio Roli

Figure 1 for Is Deep Learning Safe for Robot Vision? Adversarial Examples against the iCub Humanoid
Figure 2 for Is Deep Learning Safe for Robot Vision? Adversarial Examples against the iCub Humanoid
Figure 3 for Is Deep Learning Safe for Robot Vision? Adversarial Examples against the iCub Humanoid
Figure 4 for Is Deep Learning Safe for Robot Vision? Adversarial Examples against the iCub Humanoid
Viaarxiv icon

Progressive Boosting for Class Imbalance

Add code
Bookmark button
Alert button
Jun 05, 2017
Roghayeh Soleymani, Eric Granger, Giorgio Fumera

Figure 1 for Progressive Boosting for Class Imbalance
Figure 2 for Progressive Boosting for Class Imbalance
Figure 3 for Progressive Boosting for Class Imbalance
Figure 4 for Progressive Boosting for Class Imbalance
Viaarxiv icon

Statistical Meta-Analysis of Presentation Attacks for Secure Multibiometric Systems

Add code
Bookmark button
Alert button
Sep 06, 2016
Battista Biggio, Giorgio Fumera, Gian Luca Marcialis, Fabio Roli

Figure 1 for Statistical Meta-Analysis of Presentation Attacks for Secure Multibiometric Systems
Figure 2 for Statistical Meta-Analysis of Presentation Attacks for Secure Multibiometric Systems
Figure 3 for Statistical Meta-Analysis of Presentation Attacks for Secure Multibiometric Systems
Figure 4 for Statistical Meta-Analysis of Presentation Attacks for Secure Multibiometric Systems
Viaarxiv icon

Security Evaluation of Support Vector Machines in Adversarial Environments

Add code
Bookmark button
Alert button
Jan 30, 2014
Battista Biggio, Igino Corona, Blaine Nelson, Benjamin I. P. Rubinstein, Davide Maiorca, Giorgio Fumera, Giorgio Giacinto, and Fabio Roli

Figure 1 for Security Evaluation of Support Vector Machines in Adversarial Environments
Figure 2 for Security Evaluation of Support Vector Machines in Adversarial Environments
Figure 3 for Security Evaluation of Support Vector Machines in Adversarial Environments
Figure 4 for Security Evaluation of Support Vector Machines in Adversarial Environments
Viaarxiv icon

A Multiple Component Matching Framework for Person Re-Identification

Add code
Bookmark button
Alert button
Jun 23, 2011
Riccardo Satta, Giorgio Fumera, Fabio Roli, Marco Cristani, Vittorio Murino

Figure 1 for A Multiple Component Matching Framework for Person Re-Identification
Figure 2 for A Multiple Component Matching Framework for Person Re-Identification
Figure 3 for A Multiple Component Matching Framework for Person Re-Identification
Figure 4 for A Multiple Component Matching Framework for Person Re-Identification
Viaarxiv icon