Skip to main content

Showing 1–22 of 22 results for author: Melis, M

.
  1. arXiv:2406.19327  [pdf, other

    gr-qc hep-th

    Spectroscopy of magnetized black holes and topological stars

    Authors: Alexandru Dima, Marco Melis, Paolo Pani

    Abstract: We study the linear response of four dimensional magnetized black holes and regular topological stars arising from dimensional compactification of Einstein-Maxwell theory in five dimensions. We consider both radial and nonradial perturbations and study the stability of these solutions, both in the frequency and in the time domain. Due to the presence of magnetic fluxes in the background, axial (i.… ▽ More

    Submitted 27 June, 2024; originally announced June 2024.

    Comments: 23 pages, 11 figures

  2. Gauge-invariant coefficients in perturbative quantum gravity

    Authors: Fiorenzo Bastianelli, Roberto Bonezzi, Marco Melis

    Abstract: Heat kernel methods are useful for studying properties of quantum gravity. We recompute here the first three heat kernel coefficients in perturbative quantum gravity with cosmological constant to ascertain which ones are correctly reported in the literature. They correspond to the counterterms needed to renormalize the one-loop effective action in four dimensions. They may be evaluated at arbitrar… ▽ More

    Submitted 27 June, 2022; originally announced June 2022.

    Comments: 14 pages

  3. DEIS: Dependability Engineering Innovation for Industrial CPS

    Authors: Erik Armengaud, Georg Macher, Alexander Massoner, Sebastian Frager, Rasmus Adler, Daniel Schneider, Simone Longo, Massimiliano Melis, Riccardo Groppo, Federica Villa, Padraig OLeary, Kevin Bambury, Finnegan Anita, Marc Zeller, Kai Hoefig, Yiannis Papadopoulos, Richard Hawkins, Tim Kelly

    Abstract: The open and cooperative nature of Cyber-Physical Systems (CPS) poses new challenges in assuring dependability. The DEIS project (Dependability Engineering Innovation for automotive CPS. This project has received funding from the European Union's Horizon 2020 research and innovation programme under grant agreement No 732242, see http://www.deis-project.eu) addresses these challenges by develo**… ▽ More

    Submitted 3 June, 2021; originally announced June 2021.

  4. arXiv:2010.09119  [pdf, other

    cs.LG

    FADER: Fast Adversarial Example Rejection

    Authors: Francesco Crecchi, Marco Melis, Angelo Sotgiu, Davide Bacciu, Battista Biggio

    Abstract: Deep neural networks are vulnerable to adversarial examples, i.e., carefully-crafted inputs that mislead classification at test time. Recent defenses have been shown to improve adversarial robustness by detecting anomalous deviations from legitimate training samples at different layer representations - a behavior normally exhibited by adversarial attacks. Despite technical differences, all aforeme… ▽ More

    Submitted 18 October, 2020; originally announced October 2020.

    Comments: Submitted as a Neurocomputing journal paper

  5. arXiv:2005.01452  [pdf, other

    cs.LG cs.CR stat.ML

    Do Gradient-based Explanations Tell Anything About Adversarial Robustness to Android Malware?

    Authors: Marco Melis, Michele Scalas, Ambra Demontis, Davide Maiorca, Battista Biggio, Giorgio Giacinto, Fabio Roli

    Abstract: While machine-learning algorithms have demonstrated a strong ability in detecting Android malware, they can be evaded by sparse evasion attacks crafted by injecting a small set of fake components, e.g., permissions and system calls, without compromising intrusive functionality. Previous work has shown that, to improve robustness against such attacks, learning algorithms should avoid overemphasizin… ▽ More

    Submitted 27 May, 2021; v1 submitted 4 May, 2020; originally announced May 2020.

  6. arXiv:1912.10013  [pdf, other

    cs.LG cs.CR cs.CV cs.GT stat.ML

    secml: A Python Library for Secure and Explainable Machine Learning

    Authors: Maura Pintor, Luca Demetrio, Angelo Sotgiu, Marco Melis, Ambra Demontis, Battista Biggio

    Abstract: We present \texttt{secml}, an open-source Python library for secure and explainable machine learning. It implements the most popular attacks against machine learning, including test-time evasion attacks to generate adversarial examples against deep neural networks and training-time poisoning attacks against support vector machines and many other algorithms. These attacks enable evaluating the secu… ▽ More

    Submitted 13 May, 2022; v1 submitted 20 December, 2019; originally announced December 2019.

    Comments: Accepted for publication to SoftwareX. Published version can be found at: https://doi.org/10.1016/j.softx.2022.101095

    Journal ref: SoftwareX 18 (2022)

  7. arXiv:1910.00470  [pdf, other

    cs.CV cs.LG

    Deep Neural Rejection against Adversarial Examples

    Authors: Angelo Sotgiu, Ambra Demontis, Marco Melis, Battista Biggio, Giorgio Fumera, Xiaoyi Feng, Fabio Roli

    Abstract: Despite the impressive performances reported by deep neural networks in different application domains, they remain largely vulnerable to adversarial examples, i.e., input samples that are carefully perturbed to cause misclassification at test time. In this work, we propose a deep neural rejection mechanism to detect adversarial examples, based on the idea of rejecting samples that exhibit anomalou… ▽ More

    Submitted 17 April, 2020; v1 submitted 1 October, 2019; originally announced October 2019.

    MSC Class: 68T45

  8. arXiv:1809.02861  [pdf, other

    cs.LG cs.CR stat.ML

    Why Do Adversarial Attacks Transfer? Explaining Transferability of Evasion and Poisoning Attacks

    Authors: Ambra Demontis, Marco Melis, Maura Pintor, Matthew Jagielski, Battista Biggio, Alina Oprea, Cristina Nita-Rotaru, Fabio Roli

    Abstract: Transferability captures the ability of an attack against a machine-learning model to be effective against a different, potentially unknown, model. Empirical evidence for transferability has been shown in previous work, but the underlying reasons why an attack transfers or not are not yet well understood. In this paper, we present a comprehensive analysis aimed to investigate the transferability o… ▽ More

    Submitted 13 June, 2019; v1 submitted 8 September, 2018; originally announced September 2018.

    MSC Class: 68T10; 68T45

  9. arXiv:1803.03544  [pdf, other

    cs.LG cs.CR stat.ML

    Explaining Black-box Android Malware Detection

    Authors: Marco Melis, Davide Maiorca, Battista Biggio, Giorgio Giacinto, Fabio Roli

    Abstract: Machine-learning models have been recently used for detecting malicious Android applications, reporting impressive performances on benchmark datasets, even when trained only on features statically extracted from the application, such as system calls and permissions. However, recent findings have highlighted the fragility of such in-vitro evaluations with benchmark datasets, showing that very few c… ▽ More

    Submitted 29 October, 2018; v1 submitted 9 March, 2018; originally announced March 2018.

    Comments: Published on the Proceedings of 26th European Signal Processing Conference (EUSIPCO '18)

  10. arXiv:1712.06131  [pdf, other

    cs.CV cs.LG

    Super-sparse Learning in Similarity Spaces

    Authors: Ambra Demontis, Marco Melis, Battista Biggio, Giorgio Fumera, Fabio Roli

    Abstract: In several applications, input samples are more naturally represented in terms of similarities between each other, rather than in terms of feature vectors. In these settings, machine-learning algorithms can become very computationally demanding, as they may require matching the test samples against a very large set of reference prototypes. To mitigate this issue, different approaches have been dev… ▽ More

    Submitted 17 December, 2017; originally announced December 2017.

    ACM Class: I.2.6; I.4; I.5

    Journal ref: IEEE Computational Intell. Mag., 11(4):36-45, Nov 2016

  11. arXiv:1708.06939  [pdf, other

    cs.LG cs.RO stat.ML

    Is Deep Learning Safe for Robot Vision? Adversarial Examples against the iCub Humanoid

    Authors: Marco Melis, Ambra Demontis, Battista Biggio, Gavin Brown, Giorgio Fumera, Fabio Roli

    Abstract: Deep neural networks have been widely adopted in recent years, exhibiting impressive performances in several application domains. It has however been shown that they can be fooled by adversarial examples, i.e., images altered by a barely-perceivable adversarial noise, carefully crafted to mislead classification. In this work, we aim to evaluate the extent to which robot-vision systems embodying de… ▽ More

    Submitted 23 August, 2017; originally announced August 2017.

    Comments: Accepted for publication at the ICCV 2017 Workshop on Vision in Practice on Autonomous Robots (ViPAR)

  12. arXiv:1704.08996  [pdf, other

    cs.CR

    Yes, Machine Learning Can Be More Secure! A Case Study on Android Malware Detection

    Authors: Ambra Demontis, Marco Melis, Battista Biggio, Davide Maiorca, Daniel Arp, Konrad Rieck, Igino Corona, Giorgio Giacinto, Fabio Roli

    Abstract: To cope with the increasing variability and sophistication of modern attacks, machine learning has been widely adopted as a statistically-sound tool for malware detection. However, its security against well-crafted attacks has not only been recently questioned, but it has been shown that machine learning exhibits inherent vulnerabilities that can be exploited to evade detection at test time. In ot… ▽ More

    Submitted 28 April, 2017; originally announced April 2017.

    Comments: Accepted for publication on IEEE Transactions on Dependable and Secure Computing

  13. arXiv:0908.1030  [pdf, other

    quant-ph

    Entanglement entropy of a simple quantum system

    Authors: Maurizio Melis

    Abstract: We propose a simple approach to the calculation of the entanglement entropy of a spherically symmetric quantum system composed of two separate regions. We consider bound states of the system described by a wave function that is scale invariant and vanishes exponentially at infinity. Our result is in accordance with the holographic bound on entropy and shows that entanglement entropy scales with th… ▽ More

    Submitted 8 February, 2019; v1 submitted 7 August, 2009; originally announced August 2009.

    Comments: 11 pages

  14. Holographic entanglement entropy of the BTZ black hole

    Authors: M. Cadoni, M. Melis

    Abstract: We investigate quantum entanglement of gravitational configurations in 3D AdS gravity using the AdS/CFT correspondence. We derive explicit formulas for the holographic entanglement entropy (EE) of the BTZ black hole, conical singularities and regularized AdS$_{3}$. The leading term in the large temperature expansion of the holographic EE of the BTZ black hole reproduces exactly its Bekenstein-Ha… ▽ More

    Submitted 22 July, 2009; v1 submitted 9 July, 2009; originally announced July 2009.

    Comments: We added the comparison of some of our results with previous results for the quantum entropy of a scalar in the Euclidean BTZ background. Two more references have been also added

    Journal ref: Found.Phys.40:638-657,2010

  15. arXiv:0812.3362  [pdf, ps, other

    hep-th

    Microscopic entropy of black holes and AdS_2 quantum gravity

    Authors: Mariano Cadoni, Maurizio Melis, Paolo Pani

    Abstract: Quantum gravity (QG) on two-dimensional anti-de Sitter spacetime (AdS_2) takes always the form of a chiral conformal field theory (CFT). However, the actual content of the CFT, and in particular its central charge, depends on the background values of the dilaton and Maxwell field. We review the main features of AdS_2 QG with linear dilaton and of AdS_2 QG with constant dilaton and Maxwell field.… ▽ More

    Submitted 17 December, 2008; originally announced December 2008.

    Comments: Talk given at the conference: Black Holes in General Relativity and String Theory, August 24-30 2008, Veli Losinj,Croatia

    Journal ref: PoS BHsGRandStrings2008:032,2008

  16. Microscopic entropy of the charged BTZ black hole

    Authors: M. Cadoni, M. Melis, M. R. Setare

    Abstract: The charged BTZ black hole is characterized by a power-law curvature singularity generated by the electric charge of the hole. The curvature singularity produces ln r terms in the asymptotic expansion of the gravitational field and divergent contributions to the boundary terms. We show that these boundary deformations can be generated by the action of the conformal group in two dimensions and th… ▽ More

    Submitted 16 October, 2007; originally announced October 2007.

    Comments: 9 pages, no figures

    Journal ref: Class.Quant.Grav.25:195022,2008

  17. Black hole solutions of dimensionally reduced Einstein-Gauss-Bonnet gravity with a cosmological constant

    Authors: M. Melis, S. Mignemi

    Abstract: We study the phase space of the spherically symmetric solutions of the system obtained from the dimensional reduction of the six-dimensional Einstein-Gauss-Bonnet action with a cosmological constant. We show that all the physical solutions have anti-de Sitter asymptotic behavior.

    Submitted 29 September, 2006; originally announced September 2006.

    Comments: 13 pages, plain TeX

    Journal ref: Phys.Rev.D75:024042,2007

  18. Global properties of charged dilatonic Gauss-Bonnet black holes

    Authors: M. Melis, S. Mignemi

    Abstract: We study the phase space of the spherically symmetric solutions of Einstein-Maxwell-Gauss-Bonnet system nonminimally coupled to a scalar field and prove the existence of solutions with unusual asymptotics in addition to asymptotically flat ones. We also find new dyonic solutions of dilatonic Einstein-Maxwell theory.

    Submitted 22 December, 2005; originally announced December 2005.

    Comments: 10 pages, plain TeX

    Journal ref: Phys.Rev. D73 (2006) 083010

  19. Global properties of dilatonic Gauss-Bonnet black holes

    Authors: M. Melis, S. Mignemi

    Abstract: We study the phase space of the spherically symmetric solutions of Einstein Gauss-Bonnet system nonminimally coupled to a scalar field and show that in four dimensions the only regular black hole solutions are asymptotically flat

    Submitted 31 March, 2005; v1 submitted 27 January, 2005; originally announced January 2005.

    Comments: 12 pages, plain TeX; v.2: phase space is described in more detail

    Journal ref: Class.Quant.Grav. 22 (2005) 3169-3180

  20. Two-dimensional static black holes with pointlike sources

    Authors: M. Melis, S. Mignemi

    Abstract: We study the static black hole solutions of generalized two-dimensional dilaton-gravity theories generated by pointlike mass sources, in the hypothesis that the matter is conformally coupled. We also discuss the motion of test particles. Due to conformal coupling, these follow the geodesics of a metric obtained by rescaling the canonical metric with the dilaton.

    Submitted 3 March, 2005; v1 submitted 29 November, 2004; originally announced November 2004.

    Comments: 11 pages, 2 figures, LaTeX. v.2: an error in the sign of the energy-momentum tensor has been corrected; the solutions are slightly modified

    Journal ref: Gen.Rel.Grav. 37 (2005) 1313-1322

  21. Glueball production in radiative J/psi, Upsilon decays

    Authors: M. Melis, F. Murgia, J. Parisi

    Abstract: Using a bound-state model of weakly bound gluons for glueballs made of two gluons and a natural generalization of the perturbative QCD formalism for exclusive hadronic processes, we present results for glueball production in radiative J/psi, Upsilon decays into several possible glueball states, including L \not= 0 ones. We perform a detailed phenomenological analysis, presenting results for the… ▽ More

    Submitted 7 April, 2004; originally announced April 2004.

    Comments: RevTeX4, 26 pages, 11 eps figures

    Journal ref: Phys.Rev. D70 (2004) 034021

  22. Mass corrections in $J/ψ\to B\bar B$ decay and the role of distribution amplitudes

    Authors: Francesco Murgia, Maurizio Melis

    Abstract: We consider mass correction effects on the polar angular distribution of a baryon--antibaryon pair created in the chain decay process $e^-e^+ \to J/ψ\to B\bar B$, generalizing a previous analysis of Carimalo. We show the relevance of the features of the baryon distribution amplitudes and estimate the electromagnetic corrections to the QCD results.

    Submitted 1 December, 1994; originally announced December 1994.

    Comments: 26 pages + 3 figures, REVTEX 3.0, figures appended as uuencoded, tar-compressed postscript file

    Report number: INFNCA-TH-94-2

    Journal ref: Phys.Rev. D51 (1995) 3487-3500