Zum Hauptinhalt springen

Showing 1–22 of 22 results for author: Pintor, M

Searching in archive cs. Search in all archives.
.
  1. arXiv:2407.08806  [pdf, other

    cs.LG

    HO-FMN: Hyperparameter Optimization for Fast Minimum-Norm Attacks

    Authors: Raffaele Mura, Giuseppe Floris, Luca Scionis, Giorgio Piras, Maura Pintor, Ambra Demontis, Giorgio Giacinto, Battista Biggio, Fabio Roli

    Abstract: Gradient-based attacks are a primary tool to evaluate robustness of machine-learning models. However, many attacks tend to provide overly-optimistic evaluations as they use fixed loss functions, optimizers, step-size schedulers, and default hyperparameters. In this work, we tackle these limitations by proposing a parametric variation of the well-known fast minimum-norm attack algorithm, whose loss… ▽ More

    Submitted 11 July, 2024; originally announced July 2024.

  2. arXiv:2406.10090  [pdf, other

    cs.LG

    Over-parameterization and Adversarial Robustness in Neural Networks: An Overview and Empirical Analysis

    Authors: Zhang Chen, Luca Demetrio, Srishti Gupta, Xiaoyi Feng, Zhaoqiang Xia, Antonio Emanuele Cinà, Maura Pintor, Luca Oneto, Ambra Demontis, Battista Biggio, Fabio Roli

    Abstract: Thanks to their extensive capacity, over-parameterized neural networks exhibit superior predictive capabilities and generalization. However, having a large parameter space is considered one of the main suspects of the neural networks' vulnerability to adversarial example -- input samples crafted ad-hoc to induce a desired misclassification. Relevant literature has claimed contradictory remarks in… ▽ More

    Submitted 14 June, 2024; originally announced June 2024.

    MSC Class: 68T10 ACM Class: I.5

  3. arXiv:2404.19460  [pdf, other

    cs.LG cs.CR cs.CV

    AttackBench: Evaluating Gradient-based Attacks for Adversarial Examples

    Authors: Antonio Emanuele Cinà, Jérôme Rony, Maura Pintor, Luca Demetrio, Ambra Demontis, Battista Biggio, Ismail Ben Ayed, Fabio Roli

    Abstract: Adversarial examples are typically optimized with gradient-based attacks. While novel attacks are continuously proposed, each is shown to outperform its predecessors using different experimental setups, hyperparameter settings, and number of forward and backward calls to the target models. This provides overly-optimistic and even biased evaluations that may unfairly favor one particular attack ove… ▽ More

    Submitted 30 April, 2024; originally announced April 2024.

    Comments: https://attackbench.github.io

  4. arXiv:2402.17390  [pdf, other

    cs.LG cs.CR

    Robustness-Congruent Adversarial Training for Secure Machine Learning Model Updates

    Authors: Daniele Angioni, Luca Demetrio, Maura Pintor, Luca Oneto, Davide Anguita, Battista Biggio, Fabio Roli

    Abstract: Machine-learning models demand for periodic updates to improve their average accuracy, exploiting novel architectures and additional data. However, a newly-updated model may commit mistakes that the previous model did not make. Such misclassifications are referred to as negative flips, and experienced by users as a regression of performance. In this work, we show that this problem also affects rob… ▽ More

    Submitted 27 February, 2024; originally announced February 2024.

  5. arXiv:2402.01879  [pdf, other

    cs.LG cs.CR cs.CV

    $σ$-zero: Gradient-based Optimization of $\ell_0$-norm Adversarial Examples

    Authors: Antonio Emanuele Cinà, Francesco Villani, Maura Pintor, Lea Schönherr, Battista Biggio, Marcello Pelillo

    Abstract: Evaluating the adversarial robustness of deep networks to gradient-based attacks is challenging. While most attacks consider $\ell_2$- and $\ell_\infty$-norm constraints to craft input perturbations, only a few investigate sparse $\ell_1$- and $\ell_0$-norm attacks. In particular, $\ell_0$-norm attacks remain the least studied due to the inherent complexity of optimizing over a non-convex and non-… ▽ More

    Submitted 2 February, 2024; originally announced February 2024.

    Comments: Code available at https://github.com/Cinofix/sigma-zero-adversarial-attack

  6. Improving Fast Minimum-Norm Attacks with Hyperparameter Optimization

    Authors: Giuseppe Floris, Raffaele Mura, Luca Scionis, Giorgio Piras, Maura Pintor, Ambra Demontis, Battista Biggio

    Abstract: Evaluating the adversarial robustness of machine learning models using gradient-based attacks is challenging. In this work, we show that hyperparameter optimization can improve fast minimum-norm attacks by automating the selection of the loss function, the optimizer and the step-size scheduler, along with the corresponding hyperparameters. Our extensive evaluation involving several robust models d… ▽ More

    Submitted 12 October, 2023; originally announced October 2023.

    Comments: Accepted at ESANN23

  7. arXiv:2310.08073  [pdf, other

    cs.LG cs.CV

    Samples on Thin Ice: Re-Evaluating Adversarial Pruning of Neural Networks

    Authors: Giorgio Piras, Maura Pintor, Ambra Demontis, Battista Biggio

    Abstract: Neural network pruning has shown to be an effective technique for reducing the network size, trading desirable properties like generalization and robustness to adversarial attacks for higher sparsity. Recent work has claimed that adversarial pruning methods can produce sparse networks while also preserving robustness to adversarial examples. In this work, we first re-evaluate three state-of-the-ar… ▽ More

    Submitted 12 October, 2023; originally announced October 2023.

  8. Raze to the Ground: Query-Efficient Adversarial HTML Attacks on Machine-Learning Phishing Webpage Detectors

    Authors: Biagio Montaruli, Luca Demetrio, Maura Pintor, Luca Compagna, Davide Balzarotti, Battista Biggio

    Abstract: Machine-learning phishing webpage detectors (ML-PWD) have been shown to suffer from adversarial manipulations of the HTML code of the input webpage. Nevertheless, the attacks recently proposed have demonstrated limited effectiveness due to their lack of optimizing the usage of the adopted manipulations, and they focus solely on specific elements of the HTML code. In this work, we overcome these li… ▽ More

    Submitted 13 October, 2023; v1 submitted 4 October, 2023; originally announced October 2023.

    Comments: Proceedings of the 16th ACM Workshop on Artificial Intelligence and Security (AISec '23), November 30, 2023, Copenhagen, Denmark

  9. arXiv:2307.00368  [pdf, other

    cs.LG cs.AI cs.CV

    Minimizing Energy Consumption of Deep Learning Models by Energy-Aware Training

    Authors: Dario Lazzaro, Antonio Emanuele Cinà, Maura Pintor, Ambra Demontis, Battista Biggio, Fabio Roli, Marcello Pelillo

    Abstract: Deep learning models undergo a significant increase in the number of parameters they possess, leading to the execution of a larger number of operations during inference. This expansion significantly contributes to higher energy consumption and prediction latency. In this work, we propose EAT, a gradient-based algorithm that aims to reduce energy consumption during model training. To this end, we l… ▽ More

    Submitted 1 July, 2023; originally announced July 2023.

    Comments: 12 pages, 3 figures. Paper accepted at the 22nd International Conference on Image Analysis and Processing (ICIAP) 2023

  10. arXiv:2212.06123  [pdf, other

    cs.LG cs.RO

    A Survey on Reinforcement Learning Security with Application to Autonomous Driving

    Authors: Ambra Demontis, Maura Pintor, Luca Demetrio, Kathrin Grosse, Hsiao-Ying Lin, Chengfang Fang, Battista Biggio, Fabio Roli

    Abstract: Reinforcement learning allows machines to learn from their own experience. Nowadays, it is used in safety-critical applications, such as autonomous driving, despite being vulnerable to attacks carefully crafted to either prevent that the reinforcement learning algorithm learns an effective and reliable policy, or to induce the trained agent to make a wrong decision. The literature about the securi… ▽ More

    Submitted 12 December, 2022; originally announced December 2022.

  11. arXiv:2211.02885  [pdf, other

    cs.GT

    Stateful Detection of Adversarial Reprogramming

    Authors: Yang Zheng, Xiaoyi Feng, Zhaoqiang Xia, Xiaoyue Jiang, Maura Pintor, Ambra Demontis, Battista Biggio, Fabio Roli

    Abstract: Adversarial reprogramming allows stealing computational resources by repurposing machine learning models to perform a different task chosen by the attacker. For example, a model trained to recognize images of animals can be reprogrammed to recognize medical images by embedding an adversarial program in the images provided as inputs. This attack can be perpetrated even if the target model is a blac… ▽ More

    Submitted 5 November, 2022; originally announced November 2022.

  12. arXiv:2208.05285  [pdf, other

    cs.CR cs.LG

    Explaining Machine Learning DGA Detectors from DNS Traffic Data

    Authors: Giorgio Piras, Maura Pintor, Luca Demetrio, Battista Biggio

    Abstract: One of the most common causes of lack of continuity of online systems stems from a widely popular Cyber Attack known as Distributed Denial of Service (DDoS), in which a network of infected devices (botnet) gets exploited to flood the computational capacity of services through the commands of an attacker. This attack is made by leveraging the Domain Name System (DNS) technology through Domain Gener… ▽ More

    Submitted 10 August, 2022; originally announced August 2022.

  13. arXiv:2208.04838  [pdf, ps, other

    cs.CR

    Robust Machine Learning for Malware Detection over Time

    Authors: Daniele Angioni, Luca Demetrio, Maura Pintor, Battista Biggio

    Abstract: The presence and persistence of Android malware is an on-going threat that plagues this information era, and machine learning technologies are now extensively used to deploy more effective detectors that can block the majority of these malicious programs. However, these algorithms have not been developed to pursue the natural evolution of malware, and their performances significantly degrade over… ▽ More

    Submitted 9 August, 2022; originally announced August 2022.

  14. arXiv:2203.04412  [pdf, other

    cs.CR cs.CV cs.LG

    ImageNet-Patch: A Dataset for Benchmarking Machine Learning Robustness against Adversarial Patches

    Authors: Maura Pintor, Daniele Angioni, Angelo Sotgiu, Luca Demetrio, Ambra Demontis, Battista Biggio, Fabio Roli

    Abstract: Adversarial patches are optimized contiguous pixel blocks in an input image that cause a machine-learning model to misclassify it. However, their optimization is computationally demanding, and requires careful hyperparameter tuning, potentially leading to suboptimal robustness evaluations. To overcome these issues, we propose ImageNet-Patch, a dataset to benchmark machine-learning models against a… ▽ More

    Submitted 7 March, 2022; originally announced March 2022.

  15. arXiv:2111.11056  [pdf, other

    cs.CV cs.CR cs.LG

    Evaluating Adversarial Attacks on ImageNet: A Reality Check on Misclassification Classes

    Authors: Utku Ozbulak, Maura Pintor, Arnout Van Messem, Wesley De Neve

    Abstract: Although ImageNet was initially proposed as a dataset for performance benchmarking in the domain of computer vision, it also enabled a variety of other research efforts. Adversarial machine learning is one such research effort, employing deceptive inputs to fool models in making wrong predictions. To evaluate attacks and defenses in the field of adversarial machine learning, ImageNet remains one o… ▽ More

    Submitted 22 November, 2021; originally announced November 2021.

    Comments: Accepted for publication in 35th Conference on Neural Information Processing Systems (NeurIPS 2021), Workshop on ImageNet: Past,Present, and Future

  16. arXiv:2108.11673  [pdf, other

    cs.LG

    Why Adversarial Reprogramming Works, When It Fails, and How to Tell the Difference

    Authors: Yang Zheng, Xiaoyi Feng, Zhaoqiang Xia, Xiaoyue Jiang, Ambra Demontis, Maura Pintor, Battista Biggio, Fabio Roli

    Abstract: Adversarial reprogramming allows repurposing a machine-learning model to perform a different task. For example, a model trained to recognize animals can be reprogrammed to recognize digits by embedding an adversarial program in the digit images provided as input. Recent work has shown that adversarial reprogramming may not only be used to abuse machine-learning models provided as a service, but al… ▽ More

    Submitted 11 March, 2023; v1 submitted 26 August, 2021; originally announced August 2021.

  17. arXiv:2106.09947  [pdf, other

    cs.LG cs.CR cs.CV

    Indicators of Attack Failure: Debugging and Improving Optimization of Adversarial Examples

    Authors: Maura Pintor, Luca Demetrio, Angelo Sotgiu, Ambra Demontis, Nicholas Carlini, Battista Biggio, Fabio Roli

    Abstract: Evaluating robustness of machine-learning models to adversarial examples is a challenging problem. Many defenses have been shown to provide a false sense of robustness by causing gradient-based attacks to fail, and they have been broken under more rigorous evaluations. Although guidelines and best practices have been suggested to improve current adversarial robustness evaluations, the lack of auto… ▽ More

    Submitted 11 October, 2022; v1 submitted 18 June, 2021; originally announced June 2021.

    Comments: Accepted at NeurIPS 2022

  18. arXiv:2102.12827  [pdf, other

    cs.LG cs.CV

    Fast Minimum-norm Adversarial Attacks through Adaptive Norm Constraints

    Authors: Maura Pintor, Fabio Roli, Wieland Brendel, Battista Biggio

    Abstract: Evaluating adversarial robustness amounts to finding the minimum perturbation needed to have an input sample misclassified. The inherent complexity of the underlying optimization requires current gradient-based attacks to be carefully tuned, initialized, and possibly executed for many computationally-demanding iterations, even if specialized to a given perturbation model. In this work, we overcome… ▽ More

    Submitted 19 November, 2021; v1 submitted 25 February, 2021; originally announced February 2021.

    Comments: Accepted at NeurIPS'21

  19. arXiv:2010.06407  [pdf, other

    cs.CV

    Detecting Anomalies from Video-Sequences: a Novel Descriptor

    Authors: Giulia Orrù, Davide Ghiani, Maura Pintor, Gian Luca Marcialis, Fabio Roli

    Abstract: We present a novel descriptor for crowd behavior analysis and anomaly detection. The goal is to measure by appropriate patterns the speed of formation and disintegration of groups in the crowd. This descriptor is inspired by the concept of one-dimensional local binary patterns: in our case, such patterns depend on the number of group observed in a time window. An appropriate measurement unit, name… ▽ More

    Submitted 17 October, 2020; v1 submitted 13 October, 2020; originally announced October 2020.

    Comments: Accepted for the 25th International Conference on Pattern Recognition (ICPR 2020)

  20. arXiv:1912.10013  [pdf, other

    cs.LG cs.CR cs.CV cs.GT stat.ML

    secml: A Python Library for Secure and Explainable Machine Learning

    Authors: Maura Pintor, Luca Demetrio, Angelo Sotgiu, Marco Melis, Ambra Demontis, Battista Biggio

    Abstract: We present \texttt{secml}, an open-source Python library for secure and explainable machine learning. It implements the most popular attacks against machine learning, including test-time evasion attacks to generate adversarial examples against deep neural networks and training-time poisoning attacks against support vector machines and many other algorithms. These attacks enable evaluating the secu… ▽ More

    Submitted 13 May, 2022; v1 submitted 20 December, 2019; originally announced December 2019.

    Comments: Accepted for publication to SoftwareX. Published version can be found at: https://doi.org/10.1016/j.softx.2022.101095

    Journal ref: SoftwareX 18 (2022)

  21. arXiv:1809.02861  [pdf, other

    cs.LG cs.CR stat.ML

    Why Do Adversarial Attacks Transfer? Explaining Transferability of Evasion and Poisoning Attacks

    Authors: Ambra Demontis, Marco Melis, Maura Pintor, Matthew Jagielski, Battista Biggio, Alina Oprea, Cristina Nita-Rotaru, Fabio Roli

    Abstract: Transferability captures the ability of an attack against a machine-learning model to be effective against a different, potentially unknown, model. Empirical evidence for transferability has been shown in previous work, but the underlying reasons why an attack transfers or not are not yet well understood. In this paper, we present a comprehensive analysis aimed to investigate the transferability o… ▽ More

    Submitted 13 June, 2019; v1 submitted 8 September, 2018; originally announced September 2018.

    MSC Class: 68T10; 68T45

  22. arXiv:1706.01657  [pdf, other

    cs.RO cs.SC

    Symbolic Multibody Methods for Real-Time Simulation of Railway Vehicles

    Authors: Javier Ros, Aitor Plaza, Xabier Iriarte, Jesús María Pintor

    Abstract: In this work, recently developed state-of-the-art symbolic multibody methods are tested to accurately model a complex railway vehicle. The model is generated using a symbolic implementation of the principle of the virtual power. Creep forces are modeled using a direct symbolic implementation of the standard linear Kalker model. No simplifications, as base parameter reduction, partial-linearization… ▽ More

    Submitted 6 June, 2017; originally announced June 2017.

    Comments: 26 pages, 14 figures

    MSC Class: 70E55; 70E18