Publications

Export 135 results:
Filters: Author is Giorgio Giacinto  [Clear All Filters]
A B C D E F G H I J K L M N O P Q R S T U V W X Y Z 
D
G. L. Foresti, Giacinto, G., e Roli, F., «Detecting Dangerous Behaviors of Mobile Objects in Parking Areas», in Multisensor Surveillance Systems: The Fusion Perspective, R. G. L. C. Foresti e Varshney, P. Kluwer Academic Publishers, 2003, pagg 199-211.
G. L. Foresti, Giacinto, G., e Roli, F., «Detecting Dangerous Behaviours of Mobile Objects in Parking Areas», in 2nd European Workshop on Advanced Video-based Surveillance Systems (AVBS2001), London, United Kingdom, 2001.
M. Ahmadi, Biggio, B., Arzt, S., Ariu, D., e Giacinto, G., «Detecting Misuse of Google Cloud Messaging in Android Badware», in 6th Workshop on Security and Privacy in Smartphones and Mobile Devices (SPSM), Vienna, Austria, 2016, pagg 103-112. (626.38 KB)
D. Maiorca, Russu, P., Corona, I., Biggio, B., e Giacinto, G., «Detection of Malicious Scripting Code through Discriminant and Adversary-Aware API Analysis», in 1st Italian Conference on CyberSecurity (ITASEC), 2017, vol 1816, pagg 96-105. (371.53 KB)
I. Corona e Giacinto, G., «Detection of server side web attacks», in Workshop on Applications of Pattern Analysis, Cumberland Lodge, London, UK, 2010. (308.33 KB)
L. Piras e Giacinto, G., «Dissimilarity representation in multi-feature spaces for image retrieval», in 16th Int. Conference on Image Analysis and Processing (ICIAP), Ravenna, Italy, 2011. (252.22 KB)
G. Giacinto e Roli, F., «Dissimilarity Representation of Images for Relevance Feedback in Content-Based Image Retrieval», in Machine Learning and Data Mining in Pattern Recognition (MLDM 2003), Leipzig, Germany, 2003, vol 2734, pagg 202-214.
L. Piras, Tronci, R., e Giacinto, G., «Diversity in ensembles of codebooks for visual concept detection», in 17th Int. Conference on Image Analysis and Processing (ICIAP), Naples, Italy, 2013. (303.73 KB)
M. Narouei, Ahmadi, M., Giacinto, G., Takabi, H., e Sami, A., «DLLMiner: structural mining for malware detection», Security and Communication Networks, 2015. (731.78 KB)
G. Suarez-Tangil, Dash, S. Kumar, Ahmadi, M., Kinder, J., Giacinto, G., e Cavallaro, L., «DroidSieve: Fast and Accurate Classification of Obfuscated Android Malware», in Proceedings of the Seventh {ACM} Conference on Data and Application Security and Privacy, {CODASPY} 2017, In Press. (478.59 KB)
G. Giacinto e Roli, F., «Dynamic Classifier Selection», in First Int. Workshop on Multiple Classifier Systems (MCS 2000), Cagliari, Italy, 2000, vol 1857, pagg 177-189.
G. Giacinto e Roli, F., «Dynamic Classifier Selection Based on Multiple Classifier Behaviour», Pattern Recognition, vol 34, pagg 179-181, 2001.
L. Didaci e Giacinto, G., «Dynamic Classifier Selection by Adaptive k-Nearest-Neighbourhood Rule», in 5th Int. Workshop on Multiple Classifier Systems (MCS 2004), 2004, vol 3077.
C. Lobrano, Tronci, R., Giacinto, G., e Roli, F., «Dynamic Linear Combination of Two-Class Classifiers», in Lecture Notes in Computer Science, 2010, vol 6218, pagg 473-482.
R. Tronci, Giacinto, G., e Roli, F., «Dynamic Score Combination: A Supervised and Unsupervised Score Combination Method», in Machine Learning and Data Mining in Pattern Recognition (MLDM 2009), Leipzig, Germany, 2009, vol 5632, pagg 163-177.
R. Tronci, Giacinto, G., e Roli, F., «Dynamic score combination of binary experts», in 19th International Conference on Pattern Recognition (ICPR 2008), Tampa (Florida, USA), 2008.
R. Tronci, Giacinto, G., e Roli, F., «Dynamic Score Selection for Fusion of Multiple Biometric Matchers», in 14th IEEE International Conference on Image Analysis and Processing ICIAP 2007, Modena, Italy, 2007, pagg 15-20.
E
R. Perdisci, Corona, I., e Giacinto, G., «Early Detection of Malicious Flux Networks via Large-Scale Passive DNS Traffic Analysis», IEEE Transactions on Dependable and Secure Computing, vol 9, pagg 714-726, 2012. (1.37 MB)
M. Scalas, Maiorca, D., Mercaldo, F., Visaggio, C. Aaron, Martinelli, F., e Giacinto, G., «On the Effectiveness of System API-Related Information for Android Ransomware Detection», Computers and Security, vol 86, pagg 162-182, 2019. (706.92 KB)
L. Piras, Giacinto, G., e Paredes, R., «Enhancing image retrieval by an Exploration-Exploitation approach», in 8th International Conference Machine Learning and Data Mining (MLDM), Berlin, 2012, vol 7376, pagg 355-365. (307.57 KB)
L. Didaci, Giacinto, G., e Roli, F., «Ensemble Learning for Intrusion Detection in Computer Networks», in AI*IA, Workshop on "Apprendimento automatico: metodi e applicazioni", Siena, Italy, 2002.
G. Giacinto e Roli, F., «Ensembles of Neural Networks for Soft Classification of Remote Sensing Images», in European Symposium on Intelligent Techniques, Bari, Italy, 1997, pagg 166-170.
J. Hoffmann, Rytilahti, T., Maiorca, D., Winandy, M., Giacinto, G., e Holz, T., «Evaluating Analysis Tools for Android Apps: Status Quo and Robustness against Obfuscation», Proceedings of the 6th ACM Conference on Data and Application Security and Privacy (CODASPY 2016, 09-11 March, 2016). 2016. (726.65 KB)
J. Hoffmann, Rytilahti, T., Maiorca, D., Winandy, M., Giacinto, G., e Holz, T., «Evaluating Analysis Tools for Android Apps: Status Quo and Robustness Against Obfuscation», Horst Görtz Institut for IT Security (Ruhr-University Bochum), Technical Report TR-HGI-2016-003, 2016. (519.16 KB)
B. Biggio, Corona, I., Maiorca, D., Nelson, B., Srndic, N., Laskov, P., Giacinto, G., e Roli, F., «Evasion attacks against machine learning at test time», in European Conference on Machine Learning and Principles and Practice of Knowledge Discovery in Databases (ECML PKDD), 2013, vol 8190, pagg 387-402. (473.78 KB)

Pages