Picture for Davide Maiorca

Davide Maiorca

Exploring the Robustness of AI-Driven Tools in Digital Forensics: A Preliminary Study

Add code
Dec 02, 2024
Viaarxiv icon

Do Gradient-based Explanations Tell Anything About Adversarial Robustness to Android Malware?

Add code
May 04, 2020
Figure 1 for Do Gradient-based Explanations Tell Anything About Adversarial Robustness to Android Malware?
Figure 2 for Do Gradient-based Explanations Tell Anything About Adversarial Robustness to Android Malware?
Figure 3 for Do Gradient-based Explanations Tell Anything About Adversarial Robustness to Android Malware?
Figure 4 for Do Gradient-based Explanations Tell Anything About Adversarial Robustness to Android Malware?
Viaarxiv icon

Explaining Black-box Android Malware Detection

Add code
Oct 29, 2018
Figure 1 for Explaining Black-box Android Malware Detection
Figure 2 for Explaining Black-box Android Malware Detection
Figure 3 for Explaining Black-box Android Malware Detection
Figure 4 for Explaining Black-box Android Malware Detection
Viaarxiv icon

Evasion Attacks against Machine Learning at Test Time

Add code
Aug 21, 2017
Figure 1 for Evasion Attacks against Machine Learning at Test Time
Figure 2 for Evasion Attacks against Machine Learning at Test Time
Figure 3 for Evasion Attacks against Machine Learning at Test Time
Figure 4 for Evasion Attacks against Machine Learning at Test Time
Viaarxiv icon

AdversariaLib: An Open-source Library for the Security Evaluation of Machine Learning Algorithms Under Attack

Add code
Nov 15, 2016
Figure 1 for AdversariaLib: An Open-source Library for the Security Evaluation of Machine Learning Algorithms Under Attack
Figure 2 for AdversariaLib: An Open-source Library for the Security Evaluation of Machine Learning Algorithms Under Attack
Viaarxiv icon

Security Evaluation of Support Vector Machines in Adversarial Environments

Add code
Jan 30, 2014
Figure 1 for Security Evaluation of Support Vector Machines in Adversarial Environments
Figure 2 for Security Evaluation of Support Vector Machines in Adversarial Environments
Figure 3 for Security Evaluation of Support Vector Machines in Adversarial Environments
Figure 4 for Security Evaluation of Support Vector Machines in Adversarial Environments
Viaarxiv icon