Publications

Export 135 results:
Filters: Author is Giorgio Giacinto  [Clear All Filters]
A B C D E F G H I J K L M N O P Q R S T U V W X Y Z 
E
D. Maiorca, Ariu, D., Corona, I., and Giacinto, G., An Evasion Resilient Approach to the Detection of Malicious PDF Files, in Information Systems Security and Privacy (Communication in Computer and Information Science), vol. 576, Springer, 2015, pp. 68-85. (503.11 KB)
M. Melis, Maiorca, D., Biggio, B., Giacinto, G., and Roli, F., Explaining Black-box Android Malware Detection, in 26th European Signal Processing Conference (EUSIPCO '18), Rome, Italy, 2018, pp. 524-528. (431.78 KB)
F
M. Melis, Piras, L., Biggio, B., Giacinto, G., Fumera, G., and Roli, F., Fast Image Classification with Reduced Multiclass Support Vector Machines, in 18th Int'l Conf. on Image Analysis and Processing, Genova, Italy, 2015, vol. Image Analysis and Processing (ICIAP 2015), pp. 78-88. (829.37 KB)
G. Giacinto, Roli, F., and Didaci, L., Fusion of multiple classifiers for intrusion detection in computer networks, Pattern Recognition Letters, vol. 24, pp. 1795-1803, 2003.
H
D. Ariu and Giacinto, G., HMMPayl: an application of HMM to the analysis of the HTTP Payload, in Workshop on Applications of Pattern Analysis, 2010. (273.18 KB)
D. Ariu, Tronci, R., and Giacinto, G., HMMpayl: An Intrusion Detection System Based On Hidden Markov Models, Computers & Security, vol. 30, pp. 221 - 241, 2011. (1.88 MB)
I. Corona, Ariu, D., and Giacinto, G., HMM-Web: a framework for the detection of attacks against Web applications, in IEEE ICC 2009, Dresden, Germany, 2009. (391.14 KB)
D. - T. Dang-Nguyen, Piras, L., Giacinto, G., Boato, G., and De Natale, F. G. B., A Hybrid Approach for Retrieving Diverse Social Images of Landmarks, in IEEE International Conference on Multimedia & Expo (ICME), Torino, 2015. (1.16 MB)
I
R. Tronci, Piras, L., Murgia, G., and Giacinto, G., Image Hunter at ImageCLEF 2012 Personal Photo Retrieval Task, in CLEF (Online Working Notes/Labs/Workshop), Rome, 2012. (2.78 MB)
R. Tronci, Murgia, G., Pili, M., Piras, L., and Giacinto, G., ImageHunter: a Novel Tool for Relevance Feedback in Content Based Image Retrieval, in New Challenges in Distributed Information Filtering and Retrieval. DART 2011: Revised and Invited Papers, C. Lai, Semeraro, G., and Vargiu, E. Springer, 2013. (1.98 MB)
R. Tronci, Murgia, G., Pili, M., Piras, L., and Giacinto, G., ImageHunter: a novel tool for Relevance Feedback in Content Based Image Retrieval, in 5th International Workshop on New Challenges in Distributed Information Filtering and Retrieval (DART), Palermo, Italy, 2011. (1.31 MB)
R. Tronci, Giacinto, G., and Roli, F., Index Driven Combination of Multiple Biometric Experts for AUC Maximisation, in 7th International Workshop on Multiple Classifiers Systems MCS 2007, Prague (Czech Republic), 2007, vol. 4472, pp. 357-366.
I. Corona, Giacinto, G., Mazzariello, C., Roli, F., and Sansone, C., Information fusion for computer security: State of the art and open issues, Information Fusion, vol. 10, pp. 274-284, 2009.
L. Piras and Giacinto, G., Information Fusion in Content Based Image Retrieval: A Comprehensive Overview, Information Fusion, vol. 37, pp. 50-60, 2017. (734.6 KB)
G. Giacinto and Roli, F., Instance-Based Relevance Feedback for Image Retrieval, in Advances in Neural Information Processing Systems (NIPS) 17, 2005, pp. 489-496.
G. Giacinto and Roli, F., Instance-Based Relevance Feedback in Image Retrieval using Dissimilarity Spaces, in Case-Based Reasoning for signals and images, P. Perner Springer, 2007.
G. Giacinto, Perdisci, R., Del Rio, M., and Roli, F., Intrusion detection in computer networks by a modular ensemble of one-class classifiers, Information Fusion, vol. 9, 2008.
G. Giacinto and Roli, F., Intrusion Detection in Computer Networks by Multiple Classifier Systems, in 16th International Conference on Pattern Recognition (ICPR 2002), Quebec City, Canada, 2002, vol. II, pp. 390-393.
I. Corona, Giacinto, G., and Roli, F., Intrusion detection in computer systems as a pattern recognition task in adversarial environment: a critical review, in Workshop on Neural Information Processing Systems (NIPS), Whistler, British Columbia, Canada, 2007.
I. Corona, Giacinto, G., and Roli, F., Intrusion Detection in Computer Systems using Multiple Classifer Systems, in Supervised and Unsupervised Ensemble Methods and Their Applications, O. Okun and G. Valentini., Springer-Verlag, Berlin/Heidelberg, 2008, pp. 91-114.
D. Ariu, Corona, I., Giacinto, G., Perdisci, R., and Roli, F., Intrusion Detection Systems based on anomaly detection techniques, in Italian Workshop on Privacy and Security (PRISE), Rome, 2007.
K
L. Piras and Giacinto, G., K-Nearest Neighbors Directed Synthetic Images Injection, in 11th International Workshop on Image Analysis for Multimedia Interactive Services (WIAMIS), Desenzano del Garda, Italy, 2010. (167.12 KB)
L
D. Maiorca, Corona, I., and Giacinto, G., Looking at the Bag is not Enough to Find the Bomb: an Evasion of Structural Methods for Malicious PDF Files Detection, in 8th ACM Symposium on Information, Computer and Communications Security (ASIACCS 2013), Hangzhou, China, 2013. (2.12 MB)
I. Corona, Maiorca, D., Ariu, D., and Giacinto, G., Lux0R: Detection of Malicious PDF-embedded JavaScript code through Discriminant Analysis of API References, in AISec'14: Proceedings of the 2014 ACM Workshop on Artificial Intelligence and Security, co-located with CCS '14, Scottdale, Arizona, USA, 2014. (455.14 KB)
M
D. Ariu, Giacinto, G., and Roli, F., Machine Learning in Computer Forensics (and the Lessons Learned from Machine Learning in Computer Security), in AISec 2011: 4th ACM Workshop on Artificial Intelligence and Security, Chicago, IL, USA, 2011. (379.05 KB)

Pages