Follow
Antonio Emanuele Cinà
Antonio Emanuele Cinà
Other namesAntonio Cinà
Assistant Professor @ University of Genoa
Verified email at unige.it - Homepage
Title
Cited by
Cited by
Year
Wild patterns reloaded: A survey of machine learning security against training data poisoning
AE Cinà, K Grosse, A Demontis, S Vascon, W Zellinger, BA Moser, ...
ACM Computing Surveys 55 (13s), 1-39, 2023
662023
A black-box adversarial attack for poisoning clustering
AE Cinà, A Torcinovich, M Pelillo
Pattern Recognition 122, 108306, 2022
412022
Machine learning security against data poisoning: Are we there yet?
AE Cinà, K Grosse, A Demontis, B Biggio, F Roli, M Pelillo
IEEE Computer 57 (Issue 3), 26 - 34, 2024
232024
Energy-latency attacks via sponge poisoning
AE Cinà, A Demontis, B Biggio, F Roli, M Pelillo
arXiv preprint arXiv:2203.08147, 2022
172022
The hammer and the nut: Is bilevel optimization really needed to poison linear classifiers?
AE Cinà, S Vascon, A Demontis, B Biggio, F Roli, M Pelillo
2021 International Joint Conference on Neural Networks (IJCNN), 1-8, 2021
142021
Backdoor learning curves: Explaining backdoor poisoning beyond influence functions
AE Cinà, K Grosse, S Vascon, A Demontis, B Biggio, F Roli, M Pelillo
arXiv preprint arXiv:2106.07214, 2021
122021
Minimizing energy consumption of deep learning models by energy-aware training
D Lazzaro, AE Cinà, M Pintor, A Demontis, B Biggio, F Roli, M Pelillo
International Conference on Image Analysis and Processing, 515-526, 2023
62023
On the Limitations of Model Stealing with Uncertainty Quantification Models
D Pape, S Däubener, T Eisenhofer, AE Cinà, L Schönherr
European Symposium on Artificial Neural Networks, Computational Intelligence …, 2023
22023
Security of Machine Learning (Dagstuhl Seminar 22281)
B Biggio, N Carlini, P Laskov, K Rieck, AE Cinà
Dagstuhl Reports 12 (7), 41--61, 2023
22023
Adversarial Machine Learning
AE Cinà
1
-zero: Gradient-based Optimization of -norm Adversarial Examples
AE Cinà, F Villani, M Pintor, L Schönherr, B Biggio, M Pelillo
arXiv preprint arXiv:2402.01879, 2024
2024
Conning the Crypto Conman: End-to-End Analysis of Cryptocurrency-based Technical Support Scams
B Acharya, M Saad, AE Cinà, L Schönherr, HD Nguyen, A Oest, ...
IEEE Symposium on Security and Privacy (S&P), 156-156, 2024
2024
Vector Flows and the Capacity of a Discrete Memoryless Channel
G Beretta, G Chiarot, AE Cinà, M Pelillo
arXiv preprint arXiv:2312.16472, 2023
2023
Hardening RGB-D object recognition systems against adversarial patch attacks
Y Zheng, L Demetrio, AE Cinà, X Feng, Z Xia, X Jiang, A Demontis, ...
Information Sciences 651, 119701, 2023
2023
Vulnerability of Machine Learning: A Study on Poisoning Attacks
AE Cina
Università Ca'Foscari Venezia, 2023
2023
On the Robustness of Clustering Algorithms to Adversarial Attacks
AE Cina
Università Ca'Foscari Venezia, 2019
2019
3.3 Where ML Security Is Broken and How to Fix It
AE Cinà, M Pintor
Security of Machine Learning, 47, 0
The system can't perform the operation now. Try again later.
Articles 1–17