Publications

Export 65 results:
Filters: First Letter Of Last Name is A  [Clear All Filters]
In Press
G. Suarez-Tangil, Dash, S. Kumar, Ahmadi, M., Kinder, J., Giacinto, G., and Cavallaro, L., DroidSieve: Fast and Accurate Classification of Obfuscated Android Malware, in Proceedings of the Seventh {ACM} Conference on Data and Application Security and Privacy, {CODASPY} 2017, In Press. (478.59 KB)
M. Ahmed, Didaci, L., Fumera, G., Roli, F., and Lavi, B., Using Diversity for Classifier Ensemble Pruning: An Empirical Investigation, Theoretical and Applied Informatics, In Press.
2019
L. Demetrio, Biggio, B., Lagorio, G., Roli, F., and Armando, A., Explaining Vulnerabilities of Deep Learning to Adversarial Malware Binaries, in 3rd Italian Conference on Cyber Security, ITASEC 2019, Pisa, Italy, 2019, vol. 2315.
A. Demontis, Melis, M., Biggio, B., Maiorca, D., Arp, D., Rieck, K., Corona, I., Giacinto, G., and Roli, F., Yes, Machine Learning Can Be More Secure! A Case Study on Android Malware Detection, IEEE Trans. Dependable and Secure Computing, vol. 16, no. 4, pp. 711-724, 2019. (3.61 MB)
2018
B. Ionescu, Müller, H., Villegas, M., de Herrera, A. García Se, Eickhoff, C., Andrearczyk, V., Cid, Y. Dicente, Liauchuk, V., Kovalev, V., Hasan, S. A., Ling, Y., Farri, O., Liu, J., Lungren, M., Dang-Nguyen, D. - T., Piras, L., Riegler, M., Zhou, L., Lux, M., and Gurrin, C., Overview of ImageCLEF 2018: Challenges, Datasets and Evaluation, in Experimental {IR} Meets Multilinguality, Multimodality, and Interaction - 9th International Conference of the {CLEF} Association, {CLEF} 2018, Avignon, France, September 10-14, 2018, Proceedings, 2018, pp. 309–334.
2017
P. Piredda, Ariu, D., Biggio, B., Corona, I., Piras, L., Giacinto, G., and Roli, F., Deepsquatting: Learning-based Typosquatting Detection at Deeper Domain Levels, in 16th International Conference of the Italian Association for Artificial Intelligence (AI*IA 2017), 2017, vol. 10640 of LNCS, pp. 347-358. (1.21 MB)
I. Corona, Biggio, B., Contini, M., Piras, L., Corda, R., Mereu, M., Mureddu, G., Ariu, D., and Roli, F., DeltaPhish: Detecting Phishing Webpages in Compromised Websites, 22nd European Symposium on Research in Computer Security (ESORICS), vol. 10492. Springer International Publishing, Norway, September 11-15, 2017, pp. 370–388, 2017. (4.13 MB)
B. Ionescu, Müller, H., Villegas, M., Arenas, H., Boato, G., Dang-Nguyen, D. - T., Cid, Y. Dicente, Eickhoff, C., de Herrera, A. García Se, Gurrin, C., Islam, B., Kovalev, V., Liauchuk, V., Mothe, J., Piras, L., Riegler, M., and Schwall, I., Overview of ImageCLEF 2017: Information extraction from images, in CLEF 2017 Proceedings, Dublin, Ireland, 2017, pp. 315-337.
2016
M. Mauri, Mulas, A., and Ariu, D., The Dark Side of Open Data, 2nd International Workshop on Knowledge Discovery on the WEB (KDWEB). Cagliari, 2016. (124.62 KB) (1.33 MB)
M. Ahmadi, Biggio, B., Arzt, S., Ariu, D., and Giacinto, G., Detecting Misuse of Google Cloud Messaging in Android Badware, in 6th Workshop on Security and Privacy in Smartphones and Mobile Devices (SPSM), Vienna, Austria, 2016, pp. 103-112. (626.38 KB)
M. Ahmadi, Biggio, B., Arzt, S., Ariu, D., and Giacinto, G., Detecting Misuse of Google Cloud Messaging in Android Badware, in 6th Workshop on Security and Privacy in Smartphones and Mobile Devices (SPSM), Vienna, Austria, 2016, pp. 103-112. (626.38 KB)
M. Ahmadi, Biggio, B., Arzt, S., Ariu, D., and Giacinto, G., Detecting Misuse of Google Cloud Messaging in Android Badware, in 6th Workshop on Security and Privacy in Smartphones and Mobile Devices (SPSM), Vienna, Austria, 2016, pp. 103-112. (626.38 KB)
S. Kumar Dash, Suarez-Tangil, G., Khan, S., Tam, K., Ahmadi, M., Kinder, J., and Cavallaro, L., DroidScribe: Classifying Android Malware Based on Runtime Behavior, in Mobile Security Technologies (MoST 2016), 2016. (571.22 KB)
M. Ahmadi, Ulyanov, D., Semenov, S., Trofimov, M., and Giacinto, G., Novel Feature Extraction, Selection and Fusion for Effective Malware Family Classification, in Proceedings of the Sixth ACM on Conference on Data and Application Security and Privacy, 2016, pp. 183–194. (6.49 MB)
M. Contini, Corona, I., Mulas, A., Giacinto, G., and Ariu, D., Pharmaguard WebApp: an application for the detection of illegal online pharmacies, 2nd International Workshop on Knowledge Discovery on the WEB (KDWEB). Cagliari, 2016. (120.57 KB)
2015
J. Armin, Thompson, B., Kijewski, P., Ariu, D., Giacinto, G., and Roli, F., 2020 Cybercrime Economic Costs: No measure No solution, in First International Workshop on Future Scenarios for Cybercrime and Cyber-terrorism, co-located with the 10th International Conference on Availability, Reliability and Security (ARES), 2015. (526.44 KB)
J. Armin, Thompson, B., Kijewski, P., Ariu, D., Giacinto, G., and Roli, F., 2020 Cybercrime Economic Costs: No measure No solution, in First International Workshop on Future Scenarios for Cybercrime and Cyber-terrorism, co-located with the 10th International Conference on Availability, Reliability and Security (ARES), 2015. (526.44 KB)
M. Aresu, Ariu, D., Ahmadi, M., Maiorca, D., and Giacinto, G., Clustering Android Malware Families by Http Traffic, in 10h International Conference on Malicious and Unwanted Software (MALCON 2015), October 20-22th 2015, Fajardo, Puerto Rico, USA, 2015. (168.36 KB)
M. Aresu, Ariu, D., Ahmadi, M., Maiorca, D., and Giacinto, G., Clustering Android Malware Families by Http Traffic, in 10h International Conference on Malicious and Unwanted Software (MALCON 2015), October 20-22th 2015, Fajardo, Puerto Rico, USA, 2015. (168.36 KB)
M. Aresu, Ariu, D., Ahmadi, M., Maiorca, D., and Giacinto, G., Clustering Android Malware Families by Http Traffic, in 10h International Conference on Malicious and Unwanted Software (MALCON 2015), October 20-22th 2015, Fajardo, Puerto Rico, USA, 2015. (168.36 KB)
M. Narouei, Ahmadi, M., Giacinto, G., Takabi, H., and Sami, A., DLLMiner: structural mining for malware detection, Security and Communication Networks, 2015. (731.78 KB)
M. A. O. Ahmed, Didaci, L., Fumera, G., and Roli, F., An Empirical Investigation on the Use of Diversity for Creation of Classifier Ensembles, in Multiple Classifier Systems, 2015, vol. 9132, pp. 206-219. (216.76 KB)
D. Maiorca, Ariu, D., Corona, I., and Giacinto, G., An Evasion Resilient Approach to the Detection of Malicious PDF Files, in Information Systems Security and Privacy (Communication in Computer and Information Science), vol. 576, Springer, 2015, pp. 68-85. (503.11 KB)
M. Villegas, Müller, H., Gilbert, A., Piras, L., Wang, J., Mikolajczyk, K., de Herrera, A. García Se, Bromuri, S., M. Amin, A., Mohammed, M. Kazi, Acar, B., Uskudarli, S., Marvasti, N. B., Aldana, J. F., and García, Mdel Mar Ro, General Overview of ImageCLEF at CLEF2015 Labs, in Lecture Notes in Computer Science, Springer International Publishing, 2015. (786.29 KB) (705 bytes)
M. Villegas, Müller, H., Gilbert, A., Piras, L., Wang, J., Mikolajczyk, K., de Herrera, A. García Se, Bromuri, S., M. Amin, A., Mohammed, M. Kazi, Acar, B., Uskudarli, S., Marvasti, N. B., Aldana, J. F., and García, Mdel Mar Ro, General Overview of ImageCLEF at CLEF2015 Labs, in Lecture Notes in Computer Science, Springer International Publishing, 2015. (786.29 KB) (705 bytes)

Pages