Picture for Giorgio Giacinto

Giorgio Giacinto

Adversarial Pruning: A Survey and Benchmark of Pruning Methods for Adversarial Robustness

Add code
Sep 02, 2024
Viaarxiv icon

HO-FMN: Hyperparameter Optimization for Fast Minimum-Norm Attacks

Add code
Jul 11, 2024
Viaarxiv icon

Do Gradient-based Explanations Tell Anything About Adversarial Robustness to Android Malware?

Add code
May 04, 2020
Figure 1 for Do Gradient-based Explanations Tell Anything About Adversarial Robustness to Android Malware?
Figure 2 for Do Gradient-based Explanations Tell Anything About Adversarial Robustness to Android Malware?
Figure 3 for Do Gradient-based Explanations Tell Anything About Adversarial Robustness to Android Malware?
Figure 4 for Do Gradient-based Explanations Tell Anything About Adversarial Robustness to Android Malware?
Viaarxiv icon

Poisoning Behavioral Malware Clustering

Add code
Nov 25, 2018
Figure 1 for Poisoning Behavioral Malware Clustering
Figure 2 for Poisoning Behavioral Malware Clustering
Figure 3 for Poisoning Behavioral Malware Clustering
Figure 4 for Poisoning Behavioral Malware Clustering
Viaarxiv icon

Explaining Black-box Android Malware Detection

Add code
Oct 29, 2018
Figure 1 for Explaining Black-box Android Malware Detection
Figure 2 for Explaining Black-box Android Malware Detection
Figure 3 for Explaining Black-box Android Malware Detection
Figure 4 for Explaining Black-box Android Malware Detection
Viaarxiv icon

Evasion Attacks against Machine Learning at Test Time

Add code
Aug 21, 2017
Figure 1 for Evasion Attacks against Machine Learning at Test Time
Figure 2 for Evasion Attacks against Machine Learning at Test Time
Figure 3 for Evasion Attacks against Machine Learning at Test Time
Figure 4 for Evasion Attacks against Machine Learning at Test Time
Viaarxiv icon

Novel Feature Extraction, Selection and Fusion for Effective Malware Family Classification

Add code
Mar 10, 2016
Figure 1 for Novel Feature Extraction, Selection and Fusion for Effective Malware Family Classification
Figure 2 for Novel Feature Extraction, Selection and Fusion for Effective Malware Family Classification
Figure 3 for Novel Feature Extraction, Selection and Fusion for Effective Malware Family Classification
Figure 4 for Novel Feature Extraction, Selection and Fusion for Effective Malware Family Classification
Viaarxiv icon

Security Evaluation of Support Vector Machines in Adversarial Environments

Add code
Jan 30, 2014
Figure 1 for Security Evaluation of Support Vector Machines in Adversarial Environments
Figure 2 for Security Evaluation of Support Vector Machines in Adversarial Environments
Figure 3 for Security Evaluation of Support Vector Machines in Adversarial Environments
Figure 4 for Security Evaluation of Support Vector Machines in Adversarial Environments
Viaarxiv icon