-
1
-
-
84878115018
-
A survey of image spamming and filtering techniques
-
Attar, A., Rad, R.M., Atani, R.E.: A survey of image spamming and filtering techniques. Artif. Intell. Rev. 40(1), 71-105 (2013)
-
(2013)
Artif. Intell. Rev.
, vol.40
, Issue.1
, pp. 71-105
-
-
Attar, A.1
Rad, R.M.2
Atani, R.E.3
-
2
-
-
33845989821
-
Can machine learning be secure?
-
ACM, NY
-
Barreno, M., Nelson, B., Sears, R., Joseph, A.D., Tygar, J.D.: Can machine learning be secure? In: Proc. of the 2006 ACM Symp. on Information, Computer and Comm. Sec., pp. 16-25. ACM, NY (2006)
-
(2006)
Proc. of the 2006 ACM Symp. on Information, Computer and Comm. Sec.
, pp. 16-25
-
-
Barreno, M.1
Nelson, B.2
Sears, R.3
Joseph, A.D.4
Tygar, J.D.5
-
3
-
-
84866671111
-
Security evaluation of biometric authentication systems under real spoofing attacks
-
Biggio, B., Akhtar, Z., Fumera, G., Marcialis, G.L., Roli, F.: Security evaluation of biometric authentication systems under real spoofing attacks. IET Biometrics 1(1), 11-24 (2012)
-
(2012)
IET Biometrics
, vol.1
, Issue.1
, pp. 11-24
-
-
Biggio, B.1
Akhtar, Z.2
Fumera, G.3
Marcialis, G.L.4
Roli, F.5
-
4
-
-
84887437820
-
Poisoning attacks to compromise face templates
-
Biggio, B., Didaci, L., Fumera, G., Roli, F.: Poisoning attacks to compromise face templates. In: 6th IAPR Int'l Conf. on Biometrics, pp. 1-7 (2013)
-
(2013)
6th IAPR Int'l Conf. on Biometrics
, pp. 1-7
-
-
Biggio, B.1
Didaci, L.2
Fumera, G.3
Roli, F.4
-
5
-
-
79956346771
-
A survey and experimental evaluation of image spam filtering techniques
-
Biggio, B., Fumera, G., Pillai, I., Roli, F.: A survey and experimental evaluation of image spam filtering techniques. Pattern Rec. Letters 32(10), 1436-1446 (2011)
-
(2011)
Pattern Rec. Letters
, vol.32
, Issue.10
, pp. 1436-1446
-
-
Biggio, B.1
Fumera, G.2
Pillai, I.3
Roli, F.4
-
6
-
-
84886467730
-
Security evaluation of pattern classifiers under attack
-
preprints
-
Biggio, B., Fumera, G., Roli, F.: Security evaluation of pattern classifiers under attack. IEEE Trans. on Knowledge and Data Engineering 99(preprints), 1 (2013)
-
(2013)
IEEE Trans. on Knowledge and Data Engineering
, vol.99
, pp. 1
-
-
Biggio, B.1
Fumera, G.2
Roli, F.3
-
7
-
-
84868094889
-
Poisoning adaptive biometric systems
-
Gimel'farb, G., Hancock, E., Imiya, A., Kuijper, A., Kudo, M., Omachi, S., Windeatt, T., Yamada, K. (eds.) SSPR&SPR 2012. Springer, Heidelberg
-
Biggio, B., Fumera, G., Roli, F., Didaci, L.: Poisoning adaptive biometric systems. In: Gimel'farb, G., Hancock, E., Imiya, A., Kuijper, A., Kudo, M., Omachi, S., Windeatt, T., Yamada, K. (eds.) SSPR&SPR 2012. LNCS, vol. 7626, pp. 417-425. Springer, Heidelberg (2012)
-
(2012)
LNCS
, vol.7626
, pp. 417-425
-
-
Biggio, B.1
Fumera, G.2
Roli, F.3
Didaci, L.4
-
8
-
-
84888997884
-
Is data clustering in adversarial settings secure?
-
Biggio, B., Pillai, I., Rota Bulò, S., Ariu, D., Pelillo, M., Roli, F.: Is data clustering in adversarial settings secure? In: Proc. of the 2013 Artificial Intelligence and Security Workshop (2013)
-
Proc. of the 2013 Artificial Intelligence and Security Workshop (2013)
-
-
Biggio, B.1
Pillai, I.2
Rota Bulò, S.3
Ariu, D.4
Pelillo, M.5
Roli, F.6
-
10
-
-
80955143573
-
Adversarial machine learning
-
Huang, L., Joseph, A.D., Nelson, B., Rubinstein, B., Tygar, J.D.: Adversarial machine learning. In: 4th ACM Workshop on Artificial Intelligence and Security (AISec 2011), Chicago, IL, USA, pp. 43-57 (2011)
-
(2011)
4th ACM Workshop on Artificial Intelligence and Security (AISec 2011), Chicago, IL, USA
, pp. 43-57
-
-
Huang, L.1
Joseph, A.D.2
Nelson, B.3
Rubinstein, B.4
Tygar, J.D.5
|