Picture for Fabio Roli

Fabio Roli

Robust image classification with multi-modal large language models

Add code
Dec 13, 2024
Viaarxiv icon

On the Robustness of Adversarial Training Against Uncertainty Attacks

Add code
Oct 29, 2024
Viaarxiv icon

Adversarial Pruning: A Survey and Benchmark of Pruning Methods for Adversarial Robustness

Add code
Sep 02, 2024
Viaarxiv icon

Sonic: Fast and Transferable Data Poisoning on Clustering Algorithms

Add code
Aug 14, 2024
Figure 1 for Sonic: Fast and Transferable Data Poisoning on Clustering Algorithms
Figure 2 for Sonic: Fast and Transferable Data Poisoning on Clustering Algorithms
Figure 3 for Sonic: Fast and Transferable Data Poisoning on Clustering Algorithms
Figure 4 for Sonic: Fast and Transferable Data Poisoning on Clustering Algorithms
Viaarxiv icon

HO-FMN: Hyperparameter Optimization for Fast Minimum-Norm Attacks

Add code
Jul 11, 2024
Figure 1 for HO-FMN: Hyperparameter Optimization for Fast Minimum-Norm Attacks
Figure 2 for HO-FMN: Hyperparameter Optimization for Fast Minimum-Norm Attacks
Figure 3 for HO-FMN: Hyperparameter Optimization for Fast Minimum-Norm Attacks
Figure 4 for HO-FMN: Hyperparameter Optimization for Fast Minimum-Norm Attacks
Viaarxiv icon

A Hybrid Training-time and Run-time Defense Against Adversarial Attacks in Modulation Classification

Add code
Jul 09, 2024
Viaarxiv icon

Countermeasures Against Adversarial Examples in Radio Signal Classification

Add code
Jul 09, 2024
Viaarxiv icon

Over-parameterization and Adversarial Robustness in Neural Networks: An Overview and Empirical Analysis

Add code
Jun 14, 2024
Viaarxiv icon

SLIFER: Investigating Performance and Robustness of Malware Detection Pipelines

Add code
May 23, 2024
Figure 1 for SLIFER: Investigating Performance and Robustness of Malware Detection Pipelines
Figure 2 for SLIFER: Investigating Performance and Robustness of Malware Detection Pipelines
Figure 3 for SLIFER: Investigating Performance and Robustness of Malware Detection Pipelines
Figure 4 for SLIFER: Investigating Performance and Robustness of Malware Detection Pipelines
Viaarxiv icon

A New Formulation for Zeroth-Order Optimization of Adversarial EXEmples in Malware Detection

Add code
May 23, 2024
Figure 1 for A New Formulation for Zeroth-Order Optimization of Adversarial EXEmples in Malware Detection
Figure 2 for A New Formulation for Zeroth-Order Optimization of Adversarial EXEmples in Malware Detection
Figure 3 for A New Formulation for Zeroth-Order Optimization of Adversarial EXEmples in Malware Detection
Figure 4 for A New Formulation for Zeroth-Order Optimization of Adversarial EXEmples in Malware Detection
Viaarxiv icon