Publications

Export 135 results:
Filters: Author is Giorgio Giacinto  [Clear All Filters]
Conference Paper
D. Maiorca, Giacinto, G., and Corona, I., A Pattern Recognition System for Malicious PDF Files Detection, in MLDM - International Conference on Machine Learning and Data Mining, Berlin, 2012, vol. 7376, pp. 510-524. (1.74 MB)
B. Biggio, Rieck, K., Ariu, D., Wressnegger, C., Corona, I., Giacinto, G., and Roli, F., Poisoning Behavioral Malware Clustering, in AISec'14: Proceedings of the 2014 ACM Workshop on Artificial Intelligence and Security, co-located with CCS '14, Scottsdale, Arizona, USA, 2014, pp. 27-36. (375.58 KB)
L. Piras, Tronci, R., Murgia, G., and Giacinto, G., The PRA and AmILAB at ImageCLEF 2012 Photo Flickr Annotation Task, in CLEF (Online Working Notes/Labs/Workshop), Rome, 2012. (540.05 KB)
G. Giacinto and Roli, F., Query Shifting Based on Bayesian Decision Theory for Content-Based Image Retrieval, in oint IAPR Int. Workshops on Syntactical and Structural Pattern Recognition and Statistical Pattern Recognition (S+SSPR 2002), 2002, vol. 2396, pp. 607-616.
D. - T. Dang-Nguyen, Piras, L., Giacinto, G., Boato, G., and De Natale, F. G. B., Retrieval of Diverse Images by Pre-filtering and Hierarchical Clustering, in MediaEval (Online Working Notes), Barcelona; Spain, 2014, vol. 1263. (221.52 KB)
T. Hupperich, Maiorca, D., Kührer, M., Holz, T., and Giacinto, G., On the Robustness of Mobile Device Fingerprinting, in 31st Annual Computer Security and Applications Conference (ACSAC 2015), 7-10th December 2015, Los Angeles, USA, 2015, pp. 191-200. (301.87 KB)
D. Maiorca, Mercaldo, F., Giacinto, G., Visaggio, A., and Martinelli, F., R-PackDroid: API Package-Based Characterization and Detection of Mobile Ransomware, in ACM Symposium on Applied Computing (SAC 2017 - Acceptance Rate 15.7%), 2017, pp. 1718-1723. (272.44 KB)
C. Lobrano, Tronci, R., Giacinto, G., and Roli, F., A Score Decidability Index for Dynamic Score Combination, in Pattern Recognition, International Conference on, Los Alamitos, CA, USA, 2010, pp. 69-72.
G. Giacinto, Roli, F., and Tronci, R., Score Selection Techniques for Fingerprint Multi-modal Biometric Authentication, in 13th International Conference on Image Analysis and Processing (ICIAP 2005), Cagliari (Italy), 2005, vol. 3617, pp. 1018-1025.
G. Giacinto, Roli, F., and Fumera, G., Selection of classifiers based on multiple classifier behaviour, in Joint IAPR Int. Workshops on Syntactical and Structural Pattern Recognition and Statistical Pattern Recognition (S+SSPR 2000), Alicante, Spain, 2000, vol. 1876, pp. 87-93.
R. Tronci, Giacinto, G., and Roli, F., Selection of experts for the design of multiple biometric systems, in Machine Learning and Data Mining in Pattern Recognition, MLDM 2007, Leipzig, 2007, vol. 4571, pp. 795-809.
D. Ariu, Giacinto, G., and Perdisci, R., Sensing attacks in Computers Network with Hidden Markov Models, in Machine Learning and Data Mining in Pattern Recognition, MLDM 2007, Leipzig, 2007, vol. 4571, pp. 449-463. (315.94 KB)
E. Costamagna, Fanni, A., and Giacinto, G., A simulated annealing algorithm for the optimization of communication network, in Int. Symp. on Signals, Systems and Electronics (ISSSE '95), 1995, pp. 405-408.
R. Tronci, Piras, L., Falqui, L., and Giacinto, G., A study on the evaluation of relevance feedback in multi-tagged image datasets, in 7th IEEE International Workshop on Multimedia Information Processing and Retrieval, California, USA, 2011. (259.03 KB)
A. Montali, Giacinto, G., Migliaccio, M., and Gambardella, A., Supervised Pattern Classification Techniques for Oil Spill Classification in SAR Images: Preliminary Results, in SEASAR2006 Workshop, ESA-ESRIN, Frascati, Italy, 2006, pp. 23-26.
I. Corona, Tronci, R., and Giacinto, G., SuStorID: A Multiple Classifier System for the Protection of Web Services, in International Conference on Pattern Recognition (ICPR 2012), Tsukuba International Congress Center, Tsukuba Science City, JAPAN, 2012, pp. 2375-2378. (286.16 KB)
L. Putzu, Piras, L., and Giacinto, G., Ten years of Relevance Score for Content Based Image Retrieval, in 14th International Conference Machine Learning and Data Mining (MLDM), New York, 2018, vol. 10935.
G. Giacinto and Roli, F., A theoretical framework for dynamic classifier selection, in 15th International Conference on Pattern Recognition, Barcelona, Spain, 2000, vol. 2, pp. 8-11.
L. Piras and Giacinto, G., Unbalanced learning in Content-Based Image Classification and Retrieval, in IEEE International Conference on Multimedia & Expo (ICME), Singapore, 2010. (177.33 KB)
G. Giacinto, Roli, F., and Fumera, G., Unsupervised Learning of Neural Network Ensembles for Image Classification, in IEEE-INNS-ENNS International Joint Conference on Neural Networks (IJCNN 2000), Como, Italy, 2000, vol. III, pp. 155-159.
L. Piras, Furcas, D., and Giacinto, G., User-driven Nearest-Neighbour Exploration of Image Archives, in 4th International Conference on Pattern Recognition Applications and Methods (ICPRAM), Lisbon, Portugal, 2015, pp. 181 - 189. (376.55 KB)
D. M. Freeman, Jain, S., Duermuth, M., Biggio, B., and Giacinto, G., Who Are You? A Statistical Approach to Measuring User Authenticity, in Proc. 23rd Annual Network & Distributed System Security Symposium (NDSS), 2016. (764.14 KB)
D. Ariu, Didaci, L., Fumera, G., Frumento, E., Freschi, F., and Giacinto, G., Yet Another Cybersecurity Roadmapping Methodology, in First International Workshop on Future Scenarios for Cybercrime and Cyber-terrorism, co-located with the 10th International Conference on Availability, Reliability and Security (ARES), 2015. (1.34 MB)
Conference Proceedings
J. Hoffmann, Rytilahti, T., Maiorca, D., Winandy, M., Giacinto, G., and Holz, T., Evaluating Analysis Tools for Android Apps: Status Quo and Robustness against Obfuscation, Proceedings of the 6th ACM Conference on Data and Application Security and Privacy (CODASPY 2016, 09-11 March, 2016). 2016. (726.65 KB)
I. Corona, Contini, M., Ariu, D., Giacinto, G., Roli, F., Lund, M., and Marinelli, G., PharmaGuard: Automatic Identification of Illegal Search-Indexed Online Pharmacies, IEEE International Conference on Cybernetics - Special session Cybersecurity (CYBERSEC). IEEE, Gdynia, Poland , pp. 324 - 329, 2015. (1.44 MB) (3.4 MB)

Pages