Publications

Export 65 results:
Filters: First Letter Of Last Name is A  [Clear All Filters]
Book Chapter
D. Maiorca, Ariu, D., Corona, I., and Giacinto, G., An Evasion Resilient Approach to the Detection of Malicious PDF Files, in Information Systems Security and Privacy (Communication in Computer and Information Science), vol. 576, Springer, 2015, pp. 68-85. (503.11 KB)
M. Villegas, Müller, H., Gilbert, A., Piras, L., Wang, J., Mikolajczyk, K., de Herrera, A. García Se, Bromuri, S., M. Amin, A., Mohammed, M. Kazi, Acar, B., Uskudarli, S., Marvasti, N. B., Aldana, J. F., and García, Mdel Mar Ro, General Overview of ImageCLEF at CLEF2015 Labs, in Lecture Notes in Computer Science, Springer International Publishing, 2015. (786.29 KB) (705 bytes)
M. Villegas, Müller, H., Gilbert, A., Piras, L., Wang, J., Mikolajczyk, K., de Herrera, A. García Se, Bromuri, S., M. Amin, A., Mohammed, M. Kazi, Acar, B., Uskudarli, S., Marvasti, N. B., Aldana, J. F., and García, Mdel Mar Ro, General Overview of ImageCLEF at CLEF2015 Labs, in Lecture Notes in Computer Science, Springer International Publishing, 2015. (786.29 KB) (705 bytes)
M. Villegas, Müller, H., Gilbert, A., Piras, L., Wang, J., Mikolajczyk, K., de Herrera, A. García Se, Bromuri, S., M. Amin, A., Mohammed, M. Kazi, Acar, B., Uskudarli, S., Marvasti, N. B., Aldana, J. F., and García, Mdel Mar Ro, General Overview of ImageCLEF at CLEF2015 Labs, in Lecture Notes in Computer Science, Springer International Publishing, 2015. (786.29 KB) (705 bytes)
D. Ariu, Corona, I., Tronci, R., and Giacinto, G., Machine Learning in Security Applications, in Machine Learning, Software Engineering and Standardization, P. Perner ibai-publishing, 2013.
Conference Paper
J. Armin, Thompson, B., Kijewski, P., Ariu, D., Giacinto, G., and Roli, F., 2020 Cybercrime Economic Costs: No measure No solution, in First International Workshop on Future Scenarios for Cybercrime and Cyber-terrorism, co-located with the 10th International Conference on Availability, Reliability and Security (ARES), 2015. (526.44 KB)
J. Armin, Thompson, B., Kijewski, P., Ariu, D., Giacinto, G., and Roli, F., 2020 Cybercrime Economic Costs: No measure No solution, in First International Workshop on Future Scenarios for Cybercrime and Cyber-terrorism, co-located with the 10th International Conference on Availability, Reliability and Security (ARES), 2015. (526.44 KB)
M. Aresu, Ariu, D., Ahmadi, M., Maiorca, D., and Giacinto, G., Clustering Android Malware Families by Http Traffic, in 10h International Conference on Malicious and Unwanted Software (MALCON 2015), October 20-22th 2015, Fajardo, Puerto Rico, USA, 2015. (168.36 KB)
M. Aresu, Ariu, D., Ahmadi, M., Maiorca, D., and Giacinto, G., Clustering Android Malware Families by Http Traffic, in 10h International Conference on Malicious and Unwanted Software (MALCON 2015), October 20-22th 2015, Fajardo, Puerto Rico, USA, 2015. (168.36 KB)
M. Aresu, Ariu, D., Ahmadi, M., Maiorca, D., and Giacinto, G., Clustering Android Malware Families by Http Traffic, in 10h International Conference on Malicious and Unwanted Software (MALCON 2015), October 20-22th 2015, Fajardo, Puerto Rico, USA, 2015. (168.36 KB)
R. Tronci, Giacinto, G., and Roli, F., Combination of experts by classifiers in similarity score spaces, in Joint IAPR Int. Workshop on Structural and Syntactical Pattern Recognition and Statistical Techniques in Pattern Recognition S+SSPR08, Orlando (Florida, USA), 2008, vol. 5342, pp. 821-830.
J. Austin, Giacinto, G., Kanellopoulos, I., Lees, K., Roli, F., Vernazza, G., and Wilkinson, G., The COMPARES Project: COnnectionist Methods for Preprocessing and Analysis of REmote Sensing data, in 9th International Conference on Image Analysis and Processing, 1997, vol. 1311, pp. 765-772.
F. Alonso, Roli, F., Marcialis, G. L., Fierrez, J., and Ortega, J., Comparison of fingerprint quality measures using an optical and a capacitive sensor, in IEEE Conference on Biometrics: Theory, Applications and Systems (BTAS07), Washington DC (USA), 2007, pp. 1-6.
M. Mohan Chakka, Anjos, A., Marcel, S., Tronci, R., Muntoni, D., Fadda, G., Pili, M., Sirena, N., Murgia, G., Ristori, M., and Roli, F., Competition on Counter Measures to 2-D Facial Spoofing Attacks, in International Joint Conference on Biometrics (IJCB 2011), 2011.
B. Biggio, Pillai, I., Rota Bulò, S., Ariu, D., Pelillo, M., and Roli, F., Is Data Clustering in Adversarial Settings Secure?, in AISec'13: Proceedings of the 2013 ACM Workshop on Artificial Intelligence and Security, Berlin, 2013, pp. 87-98. (300.52 KB)
P. Piredda, Ariu, D., Biggio, B., Corona, I., Piras, L., Giacinto, G., and Roli, F., Deepsquatting: Learning-based Typosquatting Detection at Deeper Domain Levels, in 16th International Conference of the Italian Association for Artificial Intelligence (AI*IA 2017), 2017, vol. 10640 of LNCS, pp. 347-358. (1.21 MB)
M. Ahmadi, Biggio, B., Arzt, S., Ariu, D., and Giacinto, G., Detecting Misuse of Google Cloud Messaging in Android Badware, in 6th Workshop on Security and Privacy in Smartphones and Mobile Devices (SPSM), Vienna, Austria, 2016, pp. 103-112. (626.38 KB)
M. Ahmadi, Biggio, B., Arzt, S., Ariu, D., and Giacinto, G., Detecting Misuse of Google Cloud Messaging in Android Badware, in 6th Workshop on Security and Privacy in Smartphones and Mobile Devices (SPSM), Vienna, Austria, 2016, pp. 103-112. (626.38 KB)
M. Ahmadi, Biggio, B., Arzt, S., Ariu, D., and Giacinto, G., Detecting Misuse of Google Cloud Messaging in Android Badware, in 6th Workshop on Security and Privacy in Smartphones and Mobile Devices (SPSM), Vienna, Austria, 2016, pp. 103-112. (626.38 KB)
S. Kumar Dash, Suarez-Tangil, G., Khan, S., Tam, K., Ahmadi, M., Kinder, J., and Cavallaro, L., DroidScribe: Classifying Android Malware Based on Runtime Behavior, in Mobile Security Technologies (MoST 2016), 2016. (571.22 KB)
G. Suarez-Tangil, Dash, S. Kumar, Ahmadi, M., Kinder, J., Giacinto, G., and Cavallaro, L., DroidSieve: Fast and Accurate Classification of Obfuscated Android Malware, in Proceedings of the Seventh {ACM} Conference on Data and Application Security and Privacy, {CODASPY} 2017, In Press. (478.59 KB)
M. A. O. Ahmed, Didaci, L., Fumera, G., and Roli, F., An Empirical Investigation on the Use of Diversity for Creation of Classifier Ensembles, in Multiple Classifier Systems, 2015, vol. 9132, pp. 206-219. (216.76 KB)
Z. Akhtar, Fumera, G., Marcialis, G. L., and Roli, F., Evaluation of Multimodal Biometric Score Fusion Rules under Spoof Attacks, in 5th IAPR Int’l Conference on Biometrics (ICB), New Delhi, India, 2012, pp. 402-407. (612.37 KB)
Z. Akhtar, Fumera, G., Marcialis, G. L., and Roli, F., Evaluation of serial and parallel multibiometric systems under spoofing attacks, in 5th IEEE Int'l Conference on Biometrics: Theory, Applications and Systems (BTAS), Washington DC, USA, 2012, vol. . (573.02 KB)
L. Demetrio, Biggio, B., Lagorio, G., Roli, F., and Armando, A., Explaining Vulnerabilities of Deep Learning to Adversarial Malware Binaries, in 3rd Italian Conference on Cyber Security, ITASEC 2019, Pisa, Italy, 2019, vol. 2315.

Pages