Skip to main content

Showing 1–7 of 7 results for author: Piras, G

Searching in archive cs. Search in all archives.
.
  1. arXiv:2410.21952  [pdf, other

    cs.LG

    On the Robustness of Adversarial Training Against Uncertainty Attacks

    Authors: Emanuele Ledda, Giovanni Scodeller, Daniele Angioni, Giorgio Piras, Antonio Emanuele CinĂ , Giorgio Fumera, Battista Biggio, Fabio Roli

    Abstract: In learning problems, the noise inherent to the task at hand hinders the possibility to infer without a certain degree of uncertainty. Quantifying this uncertainty, regardless of its wide use, assumes high relevance for security-sensitive applications. Within these scenarios, it becomes fundamental to guarantee good (i.e., trustworthy) uncertainty measures, which downstream modules can securely em… ▽ More

    Submitted 27 May, 2025; v1 submitted 29 October, 2024; originally announced October 2024.

  2. Adversarial Pruning: A Survey and Benchmark of Pruning Methods for Adversarial Robustness

    Authors: Giorgio Piras, Maura Pintor, Ambra Demontis, Battista Biggio, Giorgio Giacinto, Fabio Roli

    Abstract: Recent work has proposed neural network pruning techniques to reduce the size of a network while preserving robustness against adversarial examples, i.e., well-crafted inputs inducing a misclassification. These methods, which we refer to as adversarial pruning methods, involve complex and articulated designs, making it difficult to analyze the differences and establish a fair and accurate comparis… ▽ More

    Submitted 30 May, 2025; v1 submitted 2 September, 2024; originally announced September 2024.

    Comments: Accepted at Pattern Recognition

  3. HO-FMN: Hyperparameter Optimization for Fast Minimum-Norm Attacks

    Authors: Raffaele Mura, Giuseppe Floris, Luca Scionis, Giorgio Piras, Maura Pintor, Ambra Demontis, Giorgio Giacinto, Battista Biggio, Fabio Roli

    Abstract: Gradient-based attacks are a primary tool to evaluate robustness of machine-learning models. However, many attacks tend to provide overly-optimistic evaluations as they use fixed loss functions, optimizers, step-size schedulers, and default hyperparameters. In this work, we tackle these limitations by proposing a parametric variation of the well-known fast minimum-norm attack algorithm, whose loss… ▽ More

    Submitted 6 June, 2025; v1 submitted 11 July, 2024; originally announced July 2024.

    Comments: Accepted at Neurocomputing

  4. Improving Fast Minimum-Norm Attacks with Hyperparameter Optimization

    Authors: Giuseppe Floris, Raffaele Mura, Luca Scionis, Giorgio Piras, Maura Pintor, Ambra Demontis, Battista Biggio

    Abstract: Evaluating the adversarial robustness of machine learning models using gradient-based attacks is challenging. In this work, we show that hyperparameter optimization can improve fast minimum-norm attacks by automating the selection of the loss function, the optimizer and the step-size scheduler, along with the corresponding hyperparameters. Our extensive evaluation involving several robust models d… ▽ More

    Submitted 12 October, 2023; originally announced October 2023.

    Comments: Accepted at ESANN23

  5. arXiv:2310.08073  [pdf, other

    cs.LG cs.CV

    Samples on Thin Ice: Re-Evaluating Adversarial Pruning of Neural Networks

    Authors: Giorgio Piras, Maura Pintor, Ambra Demontis, Battista Biggio

    Abstract: Neural network pruning has shown to be an effective technique for reducing the network size, trading desirable properties like generalization and robustness to adversarial attacks for higher sparsity. Recent work has claimed that adversarial pruning methods can produce sparse networks while also preserving robustness to adversarial examples. In this work, we first re-evaluate three state-of-the-ar… ▽ More

    Submitted 12 October, 2023; originally announced October 2023.

  6. arXiv:2309.10586  [pdf, other

    cs.CV cs.CR cs.LG

    Adversarial Attacks Against Uncertainty Quantification

    Authors: Emanuele Ledda, Daniele Angioni, Giorgio Piras, Giorgio Fumera, Battista Biggio, Fabio Roli

    Abstract: Machine-learning models can be fooled by adversarial examples, i.e., carefully-crafted input perturbations that force models to output wrong predictions. While uncertainty quantification has been recently proposed to detect adversarial inputs, under the assumption that such attacks exhibit a higher prediction uncertainty than pristine data, it has been shown that adaptive attacks specifically aime… ▽ More

    Submitted 19 September, 2023; originally announced September 2023.

  7. arXiv:2208.05285  [pdf, other

    cs.CR cs.LG

    Explaining Machine Learning DGA Detectors from DNS Traffic Data

    Authors: Giorgio Piras, Maura Pintor, Luca Demetrio, Battista Biggio

    Abstract: One of the most common causes of lack of continuity of online systems stems from a widely popular Cyber Attack known as Distributed Denial of Service (DDoS), in which a network of infected devices (botnet) gets exploited to flood the computational capacity of services through the commands of an attacker. This attack is made by leveraging the Domain Name System (DNS) technology through Domain Gener… ▽ More

    Submitted 10 August, 2022; originally announced August 2022.