SlideShare a Scribd company logo
  • Upload
  • Home
  • Explore
  • Login
  • Signup
SlideShare a Scribd company logo
  • Home
  • Explore
  • Upload
  • Login
  • Signup

We've updated our privacy policy. Click here to review the details. Tap here to review the details.

×
×
×
×
×
×
Pluribus One

Pluribus One

17 Followers
47 SlideShares 1 Clipboard 17 Followers 0 Followings
  • Unblock User Block User
47 SlideShares 1 Clipboard 17 Followers 0 Followings

Personal Information
Contact Details
Tags
adversarial machine learning adversarial classification adversarial learning machine learning poisoning attacks artificial intelligence computer security adversarial examples spam filtering biometrics deep neural networks deep learning adversarial classification multiple pluribus one image spam support vector machines systems classifier pattern recognition secure learning sparsity feature selection malware detection evasion attacks malware clustering multiple classifier systems horizon2020 textiles ai-textiles e-textiles smart textiles neural networks deepfakes security kernel methods security evaluation vulnerability assessment data clustering secure patterns l1 regularization 1.5-class classification face recognition sparse recognition support faces clustering algorithms secure machine learning adversarial clustering clustering obfuscation attacks unsupervised learning multimodal biometric systems; spoofing attacks; ro robust classifiers robustness evaluation pattern randomisation filtering spam image features text hidden markov web intrusion applications detection system models classiers
See more
Presentations (44)
See all
Icc2009
13 years ago • 383 Views
Multiple Classifier Systems for Adversarial Classification Tasks
13 years ago • 690 Views
HMM-Web: a framework for the detection of attacks against Web applications
13 years ago • 925 Views
Evade Hard Multiple Classifier Systems
13 years ago • 486 Views
Dynamic Score Combination: A supervised and unsupervised score combination method
13 years ago • 473 Views
Improving Image Spam Filtering Using Image Text Features
13 years ago • 719 Views
Adversarial Pattern Classification Using Multiple Classifiers and Randomisation
13 years ago • 1050 Views
Adversarial Pattern Classification
13 years ago • 185 Views
Wiamis2009 Pres
13 years ago • 237 Views
Adversarial Pattern Classification
13 years ago • 1614 Views
Ariu - Ph.D. Defense Slides
13 years ago • 622 Views
Rattani - Ph.D. Defense Slides
13 years ago • 951 Views
Corona - Ph.D. Defense Slides
13 years ago • 763 Views
Freni - Ph.D. Defense Slides
13 years ago • 507 Views
Multiple Classifier Systems under attack
12 years ago • 830 Views
Wiamis2010 Pres
12 years ago • 216 Views
Robustness of Multimodal Biometric Systems under Realistic Spoof Attacks against All Traits
11 years ago • 1089 Views
Ariu - Workshop on Multiple Classifier Systems 2011
11 years ago • 493 Views
Ariu - Workshop on Applications of Pattern Analysis
11 years ago • 328 Views
Ariu - Workshop on Multiple Classifier Systems - 2011
11 years ago • 420 Views
Ariu - Workshop on Artificial Intelligence and Security - 2011
11 years ago • 882 Views
Understanding the risk factors of learning in adversarial environments
11 years ago • 673 Views
Support Vector Machines Under Adversarial Label Noise (ACML 2011) - Battista Biggio
11 years ago • 1560 Views
Robustness of multimodal biometric verification systems under realistic spoofing attacks - G.L. Marcialis @ IJCB2011
11 years ago • 707 Views
Design of robust classifiers for adversarial environments - Systems, Man, and Cybernetics (SMC), 2011 IEEE International Conference on
11 years ago • 823 Views
Zahid Akhtar - Ph.D. Defense Slides
11 years ago • 4944 Views
Battista Biggio @ ICML2012: "Poisoning attacks against support vector machines"
10 years ago • 2125 Views
Battista Biggio @ ECML PKDD 2013 - Evasion attacks against machine learning at test time
9 years ago • 1727 Views
Battista Biggio @ AISec 2013 - Is Data Clustering in Adversarial Settings Secure?
9 years ago • 1205 Views
Battista Biggio @ S+SSPR2014, Joensuu, Finland -- Poisoning Complete-Linkage Hierarchical Clustering
8 years ago • 1134 Views
Documents (3)
Wiamis2010 poster
12 years ago • 210 Views
Ariu - Workshop on Applications of Pattern Analysis 2010 - Poster
11 years ago • 422 Views
Amilab IJCB 2011 Poster
11 years ago • 572 Views
  • Activity
  • About

Presentations (44)
See all
Icc2009
13 years ago • 383 Views
Multiple Classifier Systems for Adversarial Classification Tasks
13 years ago • 690 Views
HMM-Web: a framework for the detection of attacks against Web applications
13 years ago • 925 Views
Evade Hard Multiple Classifier Systems
13 years ago • 486 Views
Dynamic Score Combination: A supervised and unsupervised score combination method
13 years ago • 473 Views
Improving Image Spam Filtering Using Image Text Features
13 years ago • 719 Views
Adversarial Pattern Classification Using Multiple Classifiers and Randomisation
13 years ago • 1050 Views
Adversarial Pattern Classification
13 years ago • 185 Views
Wiamis2009 Pres
13 years ago • 237 Views
Adversarial Pattern Classification
13 years ago • 1614 Views
Ariu - Ph.D. Defense Slides
13 years ago • 622 Views
Rattani - Ph.D. Defense Slides
13 years ago • 951 Views
Corona - Ph.D. Defense Slides
13 years ago • 763 Views
Freni - Ph.D. Defense Slides
13 years ago • 507 Views
Multiple Classifier Systems under attack
12 years ago • 830 Views
Wiamis2010 Pres
12 years ago • 216 Views
Robustness of Multimodal Biometric Systems under Realistic Spoof Attacks against All Traits
11 years ago • 1089 Views
Ariu - Workshop on Multiple Classifier Systems 2011
11 years ago • 493 Views
Ariu - Workshop on Applications of Pattern Analysis
11 years ago • 328 Views
Ariu - Workshop on Multiple Classifier Systems - 2011
11 years ago • 420 Views
Ariu - Workshop on Artificial Intelligence and Security - 2011
11 years ago • 882 Views
Understanding the risk factors of learning in adversarial environments
11 years ago • 673 Views
Support Vector Machines Under Adversarial Label Noise (ACML 2011) - Battista Biggio
11 years ago • 1560 Views
Robustness of multimodal biometric verification systems under realistic spoofing attacks - G.L. Marcialis @ IJCB2011
11 years ago • 707 Views
Design of robust classifiers for adversarial environments - Systems, Man, and Cybernetics (SMC), 2011 IEEE International Conference on
11 years ago • 823 Views
Zahid Akhtar - Ph.D. Defense Slides
11 years ago • 4944 Views
Battista Biggio @ ICML2012: "Poisoning attacks against support vector machines"
10 years ago • 2125 Views
Battista Biggio @ ECML PKDD 2013 - Evasion attacks against machine learning at test time
9 years ago • 1727 Views
Battista Biggio @ AISec 2013 - Is Data Clustering in Adversarial Settings Secure?
9 years ago • 1205 Views
Battista Biggio @ S+SSPR2014, Joensuu, Finland -- Poisoning Complete-Linkage Hierarchical Clustering
8 years ago • 1134 Views
Documents (3)
Wiamis2010 poster
12 years ago • 210 Views
Ariu - Workshop on Applications of Pattern Analysis 2010 - Poster
11 years ago • 422 Views
Amilab IJCB 2011 Poster
11 years ago • 572 Views
Tags
adversarial machine learning adversarial classification adversarial learning machine learning poisoning attacks artificial intelligence computer security adversarial examples spam filtering biometrics deep neural networks deep learning adversarial classification multiple pluribus one image spam support vector machines systems classifier pattern recognition secure learning sparsity feature selection malware detection evasion attacks malware clustering multiple classifier systems horizon2020 textiles ai-textiles e-textiles smart textiles neural networks deepfakes security kernel methods security evaluation vulnerability assessment data clustering secure patterns l1 regularization 1.5-class classification face recognition sparse recognition support faces clustering algorithms secure machine learning adversarial clustering clustering obfuscation attacks unsupervised learning multimodal biometric systems; spoofing attacks; ro robust classifiers robustness evaluation pattern randomisation filtering spam image features text hidden markov web intrusion applications detection system models classiers
See more

Modal header

  • About
  • Support
  • Terms
  • Privacy
  • Copyright
  • Cookie Preferences
  • Do not sell or share my personal information
English
Current Language: English
Español
Português
Français
Deutsch

© 2023 SlideShare from Scribd

We've updated our privacy policy.

We’ve updated our privacy policy so that we are compliant with changing global privacy regulations and to provide you with insight into the limited ways in which we use your data.

You can read the details below. By accepting, you agree to the updated privacy policy.

Thank you!

View updated privacy policy
We've encountered a problem, please try again.