Publications

Export 133 results:
Filters: Author is Giorgio Giacinto  [Clear All Filters]
Conference Paper
D. Maiorca, Giacinto, G., e Corona, I., «A Pattern Recognition System for Malicious PDF Files Detection», in MLDM - International Conference on Machine Learning and Data Mining, Berlin, 2012, vol 7376, pagg 510-524. (1.74 MB)
B. Biggio, Rieck, K., Ariu, D., Wressnegger, C., Corona, I., Giacinto, G., e Roli, F., «Poisoning Behavioral Malware Clustering», in AISec'14: Proceedings of the 2014 ACM Workshop on Artificial Intelligence and Security, co-located with CCS '14, Scottsdale, Arizona, USA, 2014, pagg 27-36. (375.58 KB)
L. Piras, Tronci, R., Murgia, G., e Giacinto, G., «The PRA and AmILAB at ImageCLEF 2012 Photo Flickr Annotation Task», in CLEF (Online Working Notes/Labs/Workshop), Rome, 2012. (540.05 KB)
G. Giacinto e Roli, F., «Query Shifting Based on Bayesian Decision Theory for Content-Based Image Retrieval», in oint IAPR Int. Workshops on Syntactical and Structural Pattern Recognition and Statistical Pattern Recognition (S+SSPR 2002), 2002, vol 2396, pagg 607-616.
D. - T. Dang-Nguyen, Piras, L., Giacinto, G., Boato, G., e De Natale, F. G. B., «Retrieval of Diverse Images by Pre-filtering and Hierarchical Clustering», in MediaEval (Online Working Notes), Barcelona; Spain, 2014, vol 1263. (221.52 KB)
T. Hupperich, Maiorca, D., Kührer, M., Holz, T., e Giacinto, G., «On the Robustness of Mobile Device Fingerprinting», in 31st Annual Computer Security and Applications Conference (ACSAC 2015), 7-10th December 2015, Los Angeles, USA, 2015, pagg 191-200. (301.87 KB)
D. Maiorca, Mercaldo, F., Giacinto, G., Visaggio, A., e Martinelli, F., «R-PackDroid: API Package-Based Characterization and Detection of Mobile Ransomware», in ACM Symposium on Applied Computing (SAC 2017 - Acceptance Rate 15.7%), 2017, pagg 1718-1723. (272.44 KB)
C. Lobrano, Tronci, R., Giacinto, G., e Roli, F., «A Score Decidability Index for Dynamic Score Combination», in Pattern Recognition, International Conference on, Los Alamitos, CA, USA, 2010, pagg 69-72.
G. Giacinto, Roli, F., e Tronci, R., «Score Selection Techniques for Fingerprint Multi-modal Biometric Authentication», in 13th International Conference on Image Analysis and Processing (ICIAP 2005), Cagliari (Italy), 2005, vol 3617, pagg 1018-1025.
G. Giacinto, Roli, F., e Fumera, G., «Selection of classifiers based on multiple classifier behaviour», in Joint IAPR Int. Workshops on Syntactical and Structural Pattern Recognition and Statistical Pattern Recognition (S+SSPR 2000), Alicante, Spain, 2000, vol 1876, pagg 87-93.
R. Tronci, Giacinto, G., e Roli, F., «Selection of experts for the design of multiple biometric systems», in Machine Learning and Data Mining in Pattern Recognition, MLDM 2007, Leipzig, 2007, vol 4571, pagg 795-809.
D. Ariu, Giacinto, G., e Perdisci, R., «Sensing attacks in Computers Network with Hidden Markov Models», in Machine Learning and Data Mining in Pattern Recognition, MLDM 2007, Leipzig, 2007, vol 4571, pagg 449-463. (315.94 KB)
E. Costamagna, Fanni, A., e Giacinto, G., «A simulated annealing algorithm for the optimization of communication network», in Int. Symp. on Signals, Systems and Electronics (ISSSE '95), 1995, pagg 405-408.
R. Tronci, Piras, L., Falqui, L., e Giacinto, G., «A study on the evaluation of relevance feedback in multi-tagged image datasets», in 7th IEEE International Workshop on Multimedia Information Processing and Retrieval, California, USA, 2011. (259.03 KB)
A. Montali, Giacinto, G., Migliaccio, M., e Gambardella, A., «Supervised Pattern Classification Techniques for Oil Spill Classification in SAR Images: Preliminary Results», in SEASAR2006 Workshop, ESA-ESRIN, Frascati, Italy, 2006, pagg 23-26.
I. Corona, Tronci, R., e Giacinto, G., «SuStorID: A Multiple Classifier System for the Protection of Web Services», in International Conference on Pattern Recognition (ICPR 2012), Tsukuba International Congress Center, Tsukuba Science City, JAPAN, 2012, pagg 2375-2378. (286.16 KB)
L. Putzu, Piras, L., e Giacinto, G., «Ten years of Relevance Score for Content Based Image Retrieval», in 14th International Conference Machine Learning and Data Mining (MLDM), New York, 2018, vol 10935.
G. Giacinto e Roli, F., «A theoretical framework for dynamic classifier selection», in 15th International Conference on Pattern Recognition, Barcelona, Spain, 2000, vol 2, pagg 8-11.
L. Piras e Giacinto, G., «Unbalanced learning in Content-Based Image Classification and Retrieval», in IEEE International Conference on Multimedia & Expo (ICME), Singapore, 2010. (177.33 KB)
G. Giacinto, Roli, F., e Fumera, G., «Unsupervised Learning of Neural Network Ensembles for Image Classification», in IEEE-INNS-ENNS International Joint Conference on Neural Networks (IJCNN 2000), Como, Italy, 2000, vol III, pagg 155-159.
L. Piras, Furcas, D., e Giacinto, G., «User-driven Nearest-Neighbour Exploration of Image Archives», in 4th International Conference on Pattern Recognition Applications and Methods (ICPRAM), Lisbon, Portugal, 2015, pagg 181 - 189. (376.55 KB)
D. M. Freeman, Jain, S., Duermuth, M., Biggio, B., e Giacinto, G., «Who Are You? A Statistical Approach to Measuring User Authenticity», in Proc. 23rd Annual Network & Distributed System Security Symposium (NDSS), 2016. (764.14 KB)
D. Ariu, Didaci, L., Fumera, G., Frumento, E., Freschi, F., e Giacinto, G., «Yet Another Cybersecurity Roadmapping Methodology», in First International Workshop on Future Scenarios for Cybercrime and Cyber-terrorism, co-located with the 10th International Conference on Availability, Reliability and Security (ARES), 2015. (1.34 MB)
Conference Proceedings
J. Hoffmann, Rytilahti, T., Maiorca, D., Winandy, M., Giacinto, G., e Holz, T., «Evaluating Analysis Tools for Android Apps: Status Quo and Robustness against Obfuscation», Proceedings of the 6th ACM Conference on Data and Application Security and Privacy (CODASPY 2016, 09-11 March, 2016). 2016. (726.65 KB)
I. Corona, Contini, M., Ariu, D., Giacinto, G., Roli, F., Lund, M., e Marinelli, G., «PharmaGuard: Automatic Identification of Illegal Search-Indexed Online Pharmacies», IEEE International Conference on Cybernetics - Special session Cybersecurity (CYBERSEC). IEEE, Gdynia, Poland , pagg 324 - 329, 2015. (1.44 MB) (3.4 MB)

Pages