Publications

Export 135 results:
Filters: Author is Giorgio Giacinto  [Clear All Filters]
A B C D E F G H I J K L M N O P Q R S T U V W X Y Z 
A
R. Paolucci, Coli, P., and Giacinto, G., Assessment of seismic site effects in 2-D alluvial valleys using neural networks, Earthquake Spectra, vol. 16, pp. 661-680, 2000.
G. Giacinto and Roli, F., An Approach to the Automatic Design of Multiple Classifier Systems, Pattern Recognition Letters, vol. 22, pp. 25-33, 2001.
G. Giacinto, Paolucci, R., and Roli, F., Application of Neural Networks and Statistical Pattern Recognition Algorithms to Earthquake Risk Evaluations, Pattern Recognition Letters, vol. 18, pp. 1353-1362, 1997.
R. Perdisci, Giacinto, G., and Roli, F., Alarm clustering for intrusion detection systems in computer networks, Engineering Applications of Artificial Intelligence, vol. 19, pp. 429-438, 2006.
G. Giacinto, Perdisci, R., and Roli, F., Alarm Clustering for Intrusion Detection Systems in Computer Networks, in Machine Learning and Data Mining in Pattern Recognition (MLDM 2005), Leipzig, Germany, 2005, vol. 3587, pp. 184-193.
B. Kolosnjaji, Demontis, A., Biggio, B., Maiorca, D., Giacinto, G., Eckert, C., and Roli, F., Adversarial Malware Binaries: Evading Deep Learning for Malware Detection in Executables, in 2018 26th European Signal Processing Conference (EUSIPCO), Rome, 2018, pp. 533-537. (674.62 KB)
I. Corona, Giacinto, G., and Roli, F., Adversarial Attacks against Intrusion Detection Systems: Taxonomy, Solutions and Open Issues, Information Sciences, vol. 239, 2013. (1.49 MB)
G. Giacinto and Roli, F., Adaptive Selection Of Image Classifiers, in 9th International Conference on Image Analysis and Processing, Florence, Italy, 1997, pp. 38-45.
G. Giacinto, Roli, F., and Fumera, G., Adaptive Query Shifting for Content-Based Image Retrieval, in Int. Workshop on Machine Learning and Data Mining in Pattern Recognition (MLDM’01), 2001, vol. 2123, pp. 337-346.
2
J. Armin, Thompson, B., Kijewski, P., Ariu, D., Giacinto, G., and Roli, F., 2020 Cybercrime Economic Costs: No measure No solution, in First International Workshop on Future Scenarios for Cybercrime and Cyber-terrorism, co-located with the 10th International Conference on Availability, Reliability and Security (ARES), 2015. (526.44 KB)

Pages