Alert button
Picture for Giorgio Giacinto

Giorgio Giacinto

Alert button

Do Gradient-based Explanations Tell Anything About Adversarial Robustness to Android Malware?

Add code
Bookmark button
Alert button
May 04, 2020
Marco Melis, Michele Scalas, Ambra Demontis, Davide Maiorca, Battista Biggio, Giorgio Giacinto, Fabio Roli

Figure 1 for Do Gradient-based Explanations Tell Anything About Adversarial Robustness to Android Malware?
Figure 2 for Do Gradient-based Explanations Tell Anything About Adversarial Robustness to Android Malware?
Figure 3 for Do Gradient-based Explanations Tell Anything About Adversarial Robustness to Android Malware?
Figure 4 for Do Gradient-based Explanations Tell Anything About Adversarial Robustness to Android Malware?
Viaarxiv icon

Poisoning Behavioral Malware Clustering

Add code
Bookmark button
Alert button
Nov 25, 2018
Battista Biggio, Konrad Rieck, Davide Ariu, Christian Wressnegger, Igino Corona, Giorgio Giacinto, Fabio Roli

Figure 1 for Poisoning Behavioral Malware Clustering
Figure 2 for Poisoning Behavioral Malware Clustering
Figure 3 for Poisoning Behavioral Malware Clustering
Figure 4 for Poisoning Behavioral Malware Clustering
Viaarxiv icon

Explaining Black-box Android Malware Detection

Add code
Bookmark button
Alert button
Oct 29, 2018
Marco Melis, Davide Maiorca, Battista Biggio, Giorgio Giacinto, Fabio Roli

Figure 1 for Explaining Black-box Android Malware Detection
Figure 2 for Explaining Black-box Android Malware Detection
Figure 3 for Explaining Black-box Android Malware Detection
Figure 4 for Explaining Black-box Android Malware Detection
Viaarxiv icon

Evasion Attacks against Machine Learning at Test Time

Add code
Bookmark button
Alert button
Aug 21, 2017
Battista Biggio, Igino Corona, Davide Maiorca, Blaine Nelson, Nedim Srndic, Pavel Laskov, Giorgio Giacinto, Fabio Roli

Figure 1 for Evasion Attacks against Machine Learning at Test Time
Figure 2 for Evasion Attacks against Machine Learning at Test Time
Figure 3 for Evasion Attacks against Machine Learning at Test Time
Figure 4 for Evasion Attacks against Machine Learning at Test Time
Viaarxiv icon

Novel Feature Extraction, Selection and Fusion for Effective Malware Family Classification

Add code
Bookmark button
Alert button
Mar 10, 2016
Mansour Ahmadi, Dmitry Ulyanov, Stanislav Semenov, Mikhail Trofimov, Giorgio Giacinto

Figure 1 for Novel Feature Extraction, Selection and Fusion for Effective Malware Family Classification
Figure 2 for Novel Feature Extraction, Selection and Fusion for Effective Malware Family Classification
Figure 3 for Novel Feature Extraction, Selection and Fusion for Effective Malware Family Classification
Figure 4 for Novel Feature Extraction, Selection and Fusion for Effective Malware Family Classification
Viaarxiv icon

Security Evaluation of Support Vector Machines in Adversarial Environments

Add code
Bookmark button
Alert button
Jan 30, 2014
Battista Biggio, Igino Corona, Blaine Nelson, Benjamin I. P. Rubinstein, Davide Maiorca, Giorgio Fumera, Giorgio Giacinto, and Fabio Roli

Figure 1 for Security Evaluation of Support Vector Machines in Adversarial Environments
Figure 2 for Security Evaluation of Support Vector Machines in Adversarial Environments
Figure 3 for Security Evaluation of Support Vector Machines in Adversarial Environments
Figure 4 for Security Evaluation of Support Vector Machines in Adversarial Environments
Viaarxiv icon