We investigate a family of poisoning attacks against Support Vector Machines (SVM). Such attacks inject specially crafted training data that increase…
Reconstructing the 3D shape of an object from a set of images is a classical problem in Computer Vision. Photometric stereo is one of the possible ap…
Fingerprint Liveness detection, or presentation attacks detection (PAD), that is, the ability of detecting if a fingerprint submitted to an electroni…
Learning-based pattern classifiers, including deep networks, have demonstrated impressive performance in several application domains, ranging from co…
Internet of Things (IoT) technologies are pervading different application domains by relying on sensing and actuating devices that share, process and…
Slotted Aloha-based Random Access (RA) techniques have recently regained attention in light of the use of Interference Cancellation (IC) as a mean to…
In security-sensitive applications, the success of machine learning depends on a thorough vetting of their resistance to adversarial data. In one per…
Temporary work is an employment situation useful and suitable in all occasions in which business needs to adjust more easily and quickly to workload …
During the past two years, Flash malware has become one of the most insidious threats to detect, with almost 600 critical vulnerabilities targeting A…
The inherent properties of specific physical systems can be used as metaphors for investigation of the behavior of complex networks. This insight has…
The increasing attention to environmental issues is forcing the implementation of novel energy models based on renewable sources, fundamentally chang…
Recent work has shown that deep-learning algorithms for malware detection are also susceptible to adversarial examples, i.e., carefully-crafted pertu…
Recently a new Random Access technique based on Aloha and using Interference Cancellation (IC) named Sliding Window Contention Resolution Diversity S…
Pattern recognition applications often suffer from skewed data distributions between classes, which may vary during operations w.r.t. the design data…
Machine-learning techniques are widely used in security-related applications, like spam and malware detection. However, in such settings, they have b…
We present AdversariaLib, an open-source python library for the security evaluation of machine learning (ML) against carefully-targeted attacks. It s…
Similar to other industries, the software engineering domain is plagued by psychological diseases such as burnout, which lead developers to lose inte…
In this paper consensus in second-order multi-agent systems with a non-periodic sampled-data exchange among agents is investigated. The sampling is r…
Deep convolutional neural networks (CNNs) obtain outstanding results in tasks that require human-level understanding of data, like image or speech re…
Machine-learning methods have already been exploited as useful tools for detecting malicious executable files. They leverage data retrieved from malw…
By signing up you accept our content policy
Already have an account? Sign in
No a member yet? Create an account