Publications

Export 428 results:
A B C D E F G H I J K L M N O P Q R S T U V W X Y Z 
D
M. Narouei, Ahmadi, M., Giacinto, G., Takabi, H., and Sami, A., DLLMiner: structural mining for malware detection, Security and Communication Networks, 2015. (731.78 KB)
L. Piras, Tronci, R., and Giacinto, G., Diversity in ensembles of codebooks for visual concept detection, in 17th Int. Conference on Image Analysis and Processing (ICIAP), Naples, Italy, 2013. (303.73 KB)
L. Didaci, Fumera, G., and Roli, F., Diversity in classifier ensembles: fertile concept or dead end?, in 11th Int. Workshop on Multiple Classifier Systems, Nanjing, China, 2013, vol. 7872. (241.27 KB) (163.54 KB)
W. W. Y. Ng, Hu, J., Yeung, D., Yin, S., and Roli, F., Diversified Sensitivity based Undersampling for Imbalance Classification Problems, IEEE Transactions on Cybernetics, In Press. (1.91 MB)
R. Satta, Dissimilarity-based people re-identification and search for intelligent video surveillance, University of Cagliari, Cagliari (Italy), 2013. (7.08 MB)
G. Giacinto and Roli, F., Dissimilarity Representation of Images for Relevance Feedback in Content-Based Image Retrieval, in Machine Learning and Data Mining in Pattern Recognition (MLDM 2003), Leipzig, Germany, 2003, vol. 2734, pp. 202-214.
L. Piras and Giacinto, G., Dissimilarity representation in multi-feature spaces for image retrieval, in 16th Int. Conference on Image Analysis and Processing (ICIAP), Ravenna, Italy, 2011. (252.22 KB)
D. Maiorca and Biggio, B., Digital Investigation of PDF Files: Unveiling Traces of Embedded Malware, IEEE Security and Privacy: Special Issue on Digital Forensics, vol. 17, no. 1, pp. 63-71, 2019. (838.95 KB)
I. Corona, Detection of Web-based attacks, University of Cagliari, Cagliari (Italy), 2010.
I. Corona and Giacinto, G., Detection of server side web attacks, in Workshop on Applications of Pattern Analysis, Cumberland Lodge, London, UK, 2010. (308.33 KB)
D. Maiorca, Russu, P., Corona, I., Biggio, B., and Giacinto, G., Detection of Malicious Scripting Code through Discriminant and Adversary-Aware API Analysis, in 1st Italian Conference on CyberSecurity (ITASEC), 2017, vol. 1816, pp. 96-105. (371.53 KB)
I. Sanchez, Satta, R., Giuliani, R., and Baldini, G., Detection of DECT identity spoofing through Radio Frequency fingerprinting, in 38th International Convention on Information and Communication Technology, Electronics and Microelectronics (MIPRO 2015), Opatija, Croatia, 2015. (778.81 KB)
M. Ahmadi, Biggio, B., Arzt, S., Ariu, D., and Giacinto, G., Detecting Misuse of Google Cloud Messaging in Android Badware, in 6th Workshop on Security and Privacy in Smartphones and Mobile Devices (SPSM), Vienna, Austria, 2016, pp. 103-112. (626.38 KB)
R. Perdisci, Corona, I., Dagon, D., and Lee, W., Detecting Malicious Flux Service Networks through Passive Analysis of Recursive DNS Traces, in Annual Computer Security Applications Conference (ACSAC), Honolulu, Hawaii, USA, 2009. (206.97 KB)
G. L. Foresti, Giacinto, G., and Roli, F., Detecting Dangerous Behaviours of Mobile Objects in Parking Areas, in 2nd European Workshop on Advanced Video-based Surveillance Systems (AVBS2001), London, United Kingdom, 2001.
G. L. Foresti, Giacinto, G., and Roli, F., Detecting Dangerous Behaviors of Mobile Objects in Parking Areas, in Multisensor Surveillance Systems: The Fusion Perspective, R. G. L. C. Foresti and Varshney, P. Kluwer Academic Publishers, 2003, pp. 199-211.
F. Crecchi, Bacciu, D., and Biggio, B., Detecting Adversarial Examples through Nonlinear Dimensionality Reduction, in ESANN '19, In Press.
R. Tronci, Giacinto, G., and Roli, F., Designing multiple biometric systems: measures of ensemble effectiveness, Engineering Applications of Artificial Intelligence, vol. 22, pp. 66-78, 2009.
I. Pillai, Fumera, G., and Roli, F., Designing multi-label classifiers that maximize F measures: state of the art, Pattern Recognition, vol. 61, 2017. (452.28 KB)
B. Biggio, Fumera, G., and Roli, F., Design of Robust Classifiers for Adversarial Environments, in IEEE International Conference on Systems, Man, and Cybernetics (SMC 2011), Anchorage, Alaska, USA, 2011, pp. 977–982. (328.68 KB)
F. Roli and Giacinto, G., Design of Multiple Classifier Systems, in Hybrid Methods in Pattern Recognition, B. ;A. H. Kandel World Scientific Publishing, 2002.
G. Giacinto and Roli, F., Design of effective neural network ensembles for image classification, Image and Vision Computing Journal, vol. 19, pp. 697-705, 2001.
G. Giacinto, Roli, F., and Fumera, G., Design of effective multiple classifier systems by clustering of classifiers, in 15th Int. Conference on Pattern Recognition (ICPR 2000), Barcelona, Spain, 2000, vol. 2, pp. 160-163.
D. Maiorca, Design and Implementation of Robust Systems for Secure Malware Detection (Ph.D. Thesis), University of Cagliari, Italy, Cagliari, 2016. (5.34 MB)
I. Corona, Biggio, B., Contini, M., Piras, L., Corda, R., Mereu, M., Mureddu, G., Ariu, D., and Roli, F., DeltaPhish: Detecting Phishing Webpages in Compromised Websites, 22nd European Symposium on Research in Computer Security (ESORICS), vol. 10492. Springer International Publishing, Norway, September 11-15, 2017, pp. 370–388, 2017. (4.13 MB)

Pages