CINA', ANTONIO EMANUELE
CINA', ANTONIO EMANUELE
100023 - Dipartimento di Informatica, bioingegneria, robotica e ingegneria dei sistemi
$\sigma$-zero: Gradient-based Optimization of $\ell_0$-norm Adversarial Examples
2025-01-01 Cinà, Antonio Emanuele; Villani, Francesco; Pintor, Maura; Schönherr, Lea; Biggio, Battista; Pelillo, Marcello
A black-Box adversarial attack for poisoning clustering
2022-01-01 Cina, A. E.; Torcinovich, A.; Pelillo, M.
AttackBench: Evaluating Gradient-based Attacks for Adversarial Examples
2025-01-01 Cinà, Antonio Emanuele; Rony, Jérôme; Pintor, Maura; Demetrio, Luca; Demontis, Ambra; Biggio, Battista; Ayed, Ismail Ben; Roli, Fabio
Backdoor learning curves: explaining backdoor poisoning beyond influence functions
2024-01-01 Cinà, Antonio Emanuele; Grosse, Kathrin; Vascon, Sebastiano; Demontis, Ambra; Biggio, Battista; Roli, Fabio; Pelillo, Marcello
Computing the Capacity of Discrete Channels Using Vector Flows
2025-01-01 Beretta, Guglielmo; Chiarot, Giacomo; Cina', Antonio Emanuele; Pelillo, Marcello
Conning the Crypto Conman: End-to-End Analysis of Cryptocurrency-based Technical Support Scams
2024-01-01 Acharya, B.; Saad, M.; Cina, A. E.; Schonherr, L.; Nguyen, H. D.; Oest, A.; Vadrevu, P.; Holz, T.
Energy-latency attacks via sponge poisoning
2025-01-01 Cina', ANTONIO EMANUELE; Demontis, Ambra; Biggio, Battista; Roli, Fabio; Pelillo, Marcello
Evaluating the robustness of explainable AI in medical image recognition under natural and adversarial data corruption
2026-01-01 Repetto, S.; Maljkovic, I.; Lotto, M.; Cina, A. E.; Vascon, S.; Roli, F.
Exploring the Potential of LLMs for Code Deobfuscation
2025-01-01 Beste, David; Menguy, Grégoire; Hajipour, Hossein; Fritz, Mario; Cina', Antonio Emanuele; Bardin, Sébastien; Holz, Thorsten; Eisenhofer, Thorsten; Schönherr, Lea
Hardening RGB-D object recognition systems against adversarial patch attacks
2023-01-01 Zheng, Yang; Demetrio, Luca; Emanuele Cinà, Antonio; Feng, Xiaoyi; Xia, Zhaoqiang; Jiang, Xiaoyue; Demontis, Ambra; Biggio, Battista; Roli, Fabio
HORNET: Fast and minimal adversarial perturbations
2025-01-01 Wu, Jiaping; Cina', Antonio Emanuele; Villani, Francesco; Xia, Zhaoqiang; Demetrio, Luca; Oneto, Luca; Anguita, Davide; Roli, Fabio; Feng, Xiaoyi
Machine Learning Security Against Data Poisoning: Are We There Yet?
2024-01-01 Cina', ANTONIO EMANUELE; Grosse, Kathrin; Demontis, Ambra; Biggio, Battista; Roli, Fabio; Pelillo, Marcello
Minimizing Energy Consumption of Deep Learning Models by Energy-Aware Training
2023-01-01 Lazzaro, Dario; Cina', ANTONIO EMANUELE; Pintor, Maura; Demontis, Ambra; Biggio, Battista; Roli, Fabio; Pelillo, Marcello
On the robustness of adversarial training against uncertainty attacks
2026-01-01 Ledda, Emanuele; Scodeller, Giovanni; Angioni, Daniele; Piras, Giorgio; Cina', Antonio Emanuele; Fumera, Giorgio; Biggio, Battista; Roli, Fabio
Pirates of Charity: Exploring Donation-based Abuses in Social Media Platforms
2025-01-01 Acharya, Bhupendra; Lazzaro, Dario; Cina', Antonio Emanuele; Holz, Thorsten
Poison once, fool many: Practical poisoning attacks against text-to-image retrieval systems
2026-01-01 Lazzaro, D.; Mura, R.; Cina, A. E.; Laurita, G.; Vercelli, G.; Oneto, L.; Biggio, B.; Roli, F.
Robust image classification with multi-modal large language models
2025-01-01 Villani, Francesco; Maljkovic, Igor; Lazzaro, Dario; Sotgiu, Angelo; Cinà, Antonio Emanuele; Roli, Fabio
Sonic: Fast and transferable data poisoning on clustering algorithms
2026-01-01 Villani, Francesco; Lazzaro, Dario; Cina', Antonio Emanuele; Dell'Amico, Matteo; Biggio, Battista; Roli, Fabio
The Hammer and the Nut: Is Bilevel Optimization Really Needed to Poison Linear Classifiers?
2021-01-01 Cina, A. E.; Vascon, S.; Demontis, A.; Biggio, B.; Roli, F.; Pelillo, M.
The Imitation Game: Exploring Brand Impersonation Attacks on Social Media Platforms
2024-01-01 Acharya, Bhupendra; Lazzaro, Dario; Lopez-Morales, Efren; Oest, Adam; Saad, Muhammad; Cina', Antonio Emanuele; Schonerr, Lea
| Titolo | Data di pubblicazione | Autore(i) | File |
|---|---|---|---|
| $\sigma$-zero: Gradient-based Optimization of $\ell_0$-norm Adversarial Examples | 1-gen-2025 | Cinà, Antonio Emanuele; Villani, Francesco; Pintor, Maura; Schönherr, Lea; Biggio, Battista; Pelillo, Marcello | |
| A black-Box adversarial attack for poisoning clustering | 1-gen-2022 | Cina, A. E.; Torcinovich, A.; Pelillo, M. | |
| AttackBench: Evaluating Gradient-based Attacks for Adversarial Examples | 1-gen-2025 | Cinà, Antonio Emanuele; Rony, Jérôme; Pintor, Maura; Demetrio, Luca; Demontis, Ambra; Biggio, Battista; Ayed, Ismail Ben; Roli, Fabio | |
| Backdoor learning curves: explaining backdoor poisoning beyond influence functions | 1-gen-2024 | Cinà, Antonio Emanuele; Grosse, Kathrin; Vascon, Sebastiano; Demontis, Ambra; Biggio, Battista; Roli, Fabio; Pelillo, Marcello | |
| Computing the Capacity of Discrete Channels Using Vector Flows | 1-gen-2025 | Beretta, Guglielmo; Chiarot, Giacomo; Cina', Antonio Emanuele; Pelillo, Marcello | |
| Conning the Crypto Conman: End-to-End Analysis of Cryptocurrency-based Technical Support Scams | 1-gen-2024 | Acharya, B.; Saad, M.; Cina, A. E.; Schonherr, L.; Nguyen, H. D.; Oest, A.; Vadrevu, P.; Holz, T. | |
| Energy-latency attacks via sponge poisoning | 1-gen-2025 | Cina', ANTONIO EMANUELE; Demontis, Ambra; Biggio, Battista; Roli, Fabio; Pelillo, Marcello | |
| Evaluating the robustness of explainable AI in medical image recognition under natural and adversarial data corruption | 1-gen-2026 | Repetto, S.; Maljkovic, I.; Lotto, M.; Cina, A. E.; Vascon, S.; Roli, F. | |
| Exploring the Potential of LLMs for Code Deobfuscation | 1-gen-2025 | Beste, David; Menguy, Grégoire; Hajipour, Hossein; Fritz, Mario; Cina', Antonio Emanuele; Bardin, Sébastien; Holz, Thorsten; Eisenhofer, Thorsten; Schönherr, Lea | |
| Hardening RGB-D object recognition systems against adversarial patch attacks | 1-gen-2023 | Zheng, Yang; Demetrio, Luca; Emanuele Cinà, Antonio; Feng, Xiaoyi; Xia, Zhaoqiang; Jiang, Xiaoyue; Demontis, Ambra; Biggio, Battista; Roli, Fabio | |
| HORNET: Fast and minimal adversarial perturbations | 1-gen-2025 | Wu, Jiaping; Cina', Antonio Emanuele; Villani, Francesco; Xia, Zhaoqiang; Demetrio, Luca; Oneto, Luca; Anguita, Davide; Roli, Fabio; Feng, Xiaoyi | |
| Machine Learning Security Against Data Poisoning: Are We There Yet? | 1-gen-2024 | Cina', ANTONIO EMANUELE; Grosse, Kathrin; Demontis, Ambra; Biggio, Battista; Roli, Fabio; Pelillo, Marcello | |
| Minimizing Energy Consumption of Deep Learning Models by Energy-Aware Training | 1-gen-2023 | Lazzaro, Dario; Cina', ANTONIO EMANUELE; Pintor, Maura; Demontis, Ambra; Biggio, Battista; Roli, Fabio; Pelillo, Marcello | |
| On the robustness of adversarial training against uncertainty attacks | 1-gen-2026 | Ledda, Emanuele; Scodeller, Giovanni; Angioni, Daniele; Piras, Giorgio; Cina', Antonio Emanuele; Fumera, Giorgio; Biggio, Battista; Roli, Fabio | |
| Pirates of Charity: Exploring Donation-based Abuses in Social Media Platforms | 1-gen-2025 | Acharya, Bhupendra; Lazzaro, Dario; Cina', Antonio Emanuele; Holz, Thorsten | |
| Poison once, fool many: Practical poisoning attacks against text-to-image retrieval systems | 1-gen-2026 | Lazzaro, D.; Mura, R.; Cina, A. E.; Laurita, G.; Vercelli, G.; Oneto, L.; Biggio, B.; Roli, F. | |
| Robust image classification with multi-modal large language models | 1-gen-2025 | Villani, Francesco; Maljkovic, Igor; Lazzaro, Dario; Sotgiu, Angelo; Cinà, Antonio Emanuele; Roli, Fabio | |
| Sonic: Fast and transferable data poisoning on clustering algorithms | 1-gen-2026 | Villani, Francesco; Lazzaro, Dario; Cina', Antonio Emanuele; Dell'Amico, Matteo; Biggio, Battista; Roli, Fabio | |
| The Hammer and the Nut: Is Bilevel Optimization Really Needed to Poison Linear Classifiers? | 1-gen-2021 | Cina, A. E.; Vascon, S.; Demontis, A.; Biggio, B.; Roli, F.; Pelillo, M. | |
| The Imitation Game: Exploring Brand Impersonation Attacks on Social Media Platforms | 1-gen-2024 | Acharya, Bhupendra; Lazzaro, Dario; Lopez-Morales, Efren; Oest, Adam; Saad, Muhammad; Cina', Antonio Emanuele; Schonerr, Lea |