Publications

Export 420 results:
A B C D E F G H I J K L M N O P Q R S T U V W X Y Z 
H
M. Haindl, Kittler, J., and Roli, F., Multiple Classifier Systems, vol. 4472. Springer, 2007, p. 524.
J. Hoffmann, Rytilahti, T., Maiorca, D., Winandy, M., Giacinto, G., and Holz, T., Evaluating Analysis Tools for Android Apps: Status Quo and Robustness against Obfuscation, Proceedings of the 6th ACM Conference on Data and Application Security and Privacy (CODASPY 2016, 09-11 March, 2016). 2016. (726.65 KB)
J. Hoffmann, Rytilahti, T., Maiorca, D., Winandy, M., Giacinto, G., and Holz, T., Evaluating Analysis Tools for Android Apps: Status Quo and Robustness Against Obfuscation, Horst Görtz Institut for IT Security (Ruhr-University Bochum), Technical Report TR-HGI-2016-003, 2016. (519.16 KB)
T. Hupperich, Maiorca, D., Kührer, M., Holz, T., and Giacinto, G., On the Robustness of Mobile Device Fingerprinting, in 31st Annual Computer Security and Applications Conference (ACSAC 2015), 7-10th December 2015, Los Angeles, USA, 2015, pp. 191-200. (301.87 KB)
K
J. Kittler and Roli, F., Multiple Classifier Systems, vol. 1857. Springer-Verlag, 2000.
J. Kittler and Roli, F., Multiple Classifier Systems, vol. 2096. Springer-Verlag, 2001.
B. Kolosnjaji, Demontis, A., Biggio, B., Maiorca, D., Giacinto, G., Eckert, C., and Roli, F., Adversarial Malware Binaries: Evading Deep Learning for Malware Detection in Executables, in 2018 26th European Signal Processing Conference (EUSIPCO), Rome, 2018, pp. 533-537. (674.62 KB)
L. Kuncheva, Roli, F., Marcialis, G. L., and Shipp, C., Complexity of Data Subsets Generated by the Random Subspace Method: an Experimental Investigation, in 2nd International Workshop on Multiple Classifier Systems (MCS 2001), 2001, vol. 2096, pp. 349-358.
L
B. Lavi, Fumera, G., and Roli, F., A Multi-Stage Ranking Approach for Fast Person Re-Identification, IET Computer Vision, In Press. (1.07 MB)
C. - T. Li and Satta, R., Empirical Investigation into the Correlation between Vignetting Effect and the Quality of Sensor Pattern Noise, IET Computer Vision, vol. 6, no. 6, pp. 560-566, 2012.
C. - T. Li and Satta, R., On the Location-Dependent Quality of the Sensor Pattern Noise and Its Implication in Multimedia Forensics, in 4th International Conference on Imaging for Crime Detection and Prevention (ICDP 2011), London, United Kingdom, 2011. (399.99 KB)
C. Lobrano, Tronci, R., Giacinto, G., and Roli, F., Dynamic Linear Combination of Two-Class Classifiers, in Lecture Notes in Computer Science, 2010, vol. 6218, pp. 473-482.
C. Lobrano, Tronci, R., Giacinto, G., and Roli, F., A Score Decidability Index for Dynamic Score Combination, in Pattern Recognition, International Conference on, Los Alamitos, CA, USA, 2010, pp. 69-72.
M
D. Maiorca, Biggio, B., and Giacinto, G., Towards Adversarial Malware Detection: Lessons Learned from PDF-based Attacks, ACM Computing Surveys, In Press. (1.21 MB)
D. Maiorca, Ariu, D., Corona, I., Aresu, M., and Giacinto, G., Stealth Attacks: An Extended Insight into the Obfuscation Effects on Android Malware, Computers And Security (Elsevier), vol. 51 (June), pp. 16-31, 2015. (413.99 KB)
D. Maiorca, Giacinto, G., and Corona, I., A Pattern Recognition System for Malicious PDF Files Detection, in MLDM - International Conference on Machine Learning and Data Mining, Berlin, 2012, vol. 7376, pp. 510-524. (1.74 MB)
D. Maiorca, Ariu, D., Corona, I., and Giacinto, G., A Structural and Content-Based Approach for a Precise and Robust Detection of Malicious PDF Files, Proceedings of the 1st International Conference on Information Systems Security and Privacy (ICISSP 2015, 9-11th February 2015, Angers, France). pp. 27-36, 2015. (267.78 KB)
D. Maiorca, Corona, I., and Giacinto, G., Looking at the Bag is not Enough to Find the Bomb: an Evasion of Structural Methods for Malicious PDF Files Detection, in 8th ACM Symposium on Information, Computer and Communications Security (ASIACCS 2013), Hangzhou, China, 2013. (2.12 MB)

Pages