default search action
Marco Melis
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2022
- [j8]Francesco Crecchi, Marco Melis, Angelo Sotgiu, Davide Bacciu, Battista Biggio:
FADER: Fast adversarial example rejection. Neurocomputing 470: 257-268 (2022) - [j7]Marco Melis, Michele Scalas, Ambra Demontis, Davide Maiorca, Battista Biggio, Giorgio Giacinto, Fabio Roli:
Do gradient-based explanations tell anything about adversarial robustness to android malware? Int. J. Mach. Learn. Cybern. 13(1): 217-232 (2022) - [j6]Maura Pintor, Luca Demetrio, Angelo Sotgiu, Marco Melis, Ambra Demontis, Battista Biggio:
secml: Secure and explainable machine learning in Python. SoftwareX 18: 101095 (2022) - [c10]Tiziana Fanni, Giuseppe Meloni, Marco Melis, Antonio Solinas, Maria Katiuscia Zedda:
The Multi-Sensor Gateway, a Unified Communication Scheme and Orchestration Actor for Heterogeneous Systems. CPS Summer School, PhD Workshop 2022 - 2020
- [j5]Angelo Sotgiu, Ambra Demontis, Marco Melis, Battista Biggio, Giorgio Fumera, Xiaoyi Feng, Fabio Roli:
Deep neural rejection against adversarial examples. EURASIP J. Inf. Secur. 2020: 5 (2020) - [i9]Marco Melis, Michele Scalas, Ambra Demontis, Davide Maiorca, Battista Biggio, Giorgio Giacinto, Fabio Roli:
Do Gradient-based Explanations Tell Anything About Adversarial Robustness to Android Malware? CoRR abs/2005.01452 (2020) - [i8]Francesco Crecchi, Marco Melis, Angelo Sotgiu, Davide Bacciu, Battista Biggio:
FADER: Fast Adversarial Example Rejection. CoRR abs/2010.09119 (2020)
2010 – 2019
- 2019
- [j4]Ambra Demontis, Marco Melis, Battista Biggio, Davide Maiorca, Daniel Arp, Konrad Rieck, Igino Corona, Giorgio Giacinto, Fabio Roli:
Yes, Machine Learning Can Be More Secure! A Case Study on Android Malware Detection. IEEE Trans. Dependable Secur. Comput. 16(4): 711-724 (2019) - [c9]Ambra Demontis, Marco Melis, Maura Pintor, Matthew Jagielski, Battista Biggio, Alina Oprea, Cristina Nita-Rotaru, Fabio Roli:
Why Do Adversarial Attacks Transfer? Explaining Transferability of Evasion and Poisoning Attacks. USENIX Security Symposium 2019: 321-338 - [i7]Angelo Sotgiu, Ambra Demontis, Marco Melis, Battista Biggio, Giorgio Fumera, Xiaoyi Feng, Fabio Roli:
Deep Neural Rejection against Adversarial Examples. CoRR abs/1910.00470 (2019) - [i6]Marco Melis, Ambra Demontis, Maura Pintor, Angelo Sotgiu, Battista Biggio:
secml: A Python Library for Secure and Explainable Machine Learning. CoRR abs/1912.10013 (2019) - 2018
- [c8]Marco Melis, Davide Maiorca, Battista Biggio, Giorgio Giacinto, Fabio Roli:
Explaining Black-box Android Malware Detection. EUSIPCO 2018: 524-528 - [i5]Marco Melis, Davide Maiorca, Battista Biggio, Giorgio Giacinto, Fabio Roli:
Explaining Black-box Android Malware Detection. CoRR abs/1803.03544 (2018) - [i4]Ambra Demontis, Marco Melis, Maura Pintor, Matthew Jagielski, Battista Biggio, Alina Oprea, Cristina Nita-Rotaru, Fabio Roli:
On the Intriguing Connections of Regularization, Input Gradients and Transferability of Evasion and Poisoning Attacks. CoRR abs/1809.02861 (2018) - 2017
- [c7]Marco Melis, Ambra Demontis, Battista Biggio, Gavin Brown, Giorgio Fumera, Fabio Roli:
Is Deep Learning Safe for Robot Vision? Adversarial Examples Against the iCub Humanoid. ICCV Workshops 2017: 751-759 - [i3]Ambra Demontis, Marco Melis, Battista Biggio, Davide Maiorca, Daniel Arp, Konrad Rieck, Igino Corona, Giorgio Giacinto, Fabio Roli:
Yes, Machine Learning Can Be More Secure! A Case Study on Android Malware Detection. CoRR abs/1704.08996 (2017) - [i2]Marco Melis, Ambra Demontis, Battista Biggio, Gavin Brown, Giorgio Fumera, Fabio Roli:
Is Deep Learning Safe for Robot Vision? Adversarial Examples against the iCub Humanoid. CoRR abs/1708.06939 (2017) - [i1]Ambra Demontis, Marco Melis, Battista Biggio, Giorgio Fumera, Fabio Roli:
Super-sparse Learning in Similarity Spaces. CoRR abs/1712.06131 (2017) - 2016
- [j3]Ambra Demontis, Marco Melis, Battista Biggio, Giorgio Fumera, Fabio Roli:
Super-Sparse Learning in Similarity Spaces. IEEE Comput. Intell. Mag. 11(4): 36-45 (2016) - 2015
- [c6]Battista Biggio, Marco Melis, Giorgio Fumera, Fabio Roli:
Sparse support faces. ICB 2015: 208-213 - [c5]Marco Melis, Luca Piras, Battista Biggio, Giorgio Giacinto, Giorgio Fumera, Fabio Roli:
Fast Image Classification with Reduced Multiclass Support Vector Machines. ICIAP (2) 2015: 78-88
2000 – 2009
- 2006
- [j2]Ivana Turnu, Marco Melis, Alessandra Cau, Alessio Setzu, Giulio Concas, Katiuscia Mannaro:
Modeling and simulation of open source development using an agile practice. J. Syst. Archit. 52(11): 610-618 (2006) - [j1]Marco Melis, Ivana Turnu, Alessandra Cau, Giulio Concas:
Evaluating the impact of test-first programming and pair programming through software process simulation. Softw. Process. Improv. Pract. 11(4): 345-360 (2006) - 2005
- [c4]Alessandra Cau, Giulio Concas, Marco Melis, Ivana Turnu:
Evaluate XP Effectiveness Using Simulation Modeling. XP 2005: 48-56 - 2004
- [c3]Martijn C. Schut, Michael Kentrop, Mark Leenaarts, Marco Melis, Ian Miller:
APPROACH: Decentralised Rotation Planning for Container Barges. ECAI 2004: 755-759 - [c2]Katiuscia Mannaro, Marco Melis, Michele Marchesi:
Empirical Analysis on the Satisfaction of IT Employees Comparing XP Practices with Other Software Development Methodologies. XP 2004: 166-174 - [c1]Marco Melis, Walter Ambu, Sandro Pinna, Katiuscia Mannaro:
Requirements of an ISO Compliant XP Tool. XP 2004: 266-269
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-04-25 05:39 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint