Publications

Export 135 results:
Filters: Author is Giorgio Giacinto  [Clear All Filters]
A B C D E F G H I J K L M N O P Q R S T U V W X Y Z 
A
R. Paolucci, Coli, P., e Giacinto, G., «Assessment of seismic site effects in 2-D alluvial valleys using neural networks», Earthquake Spectra, vol 16, pagg 661-680, 2000.
G. Giacinto e Roli, F., «An Approach to the Automatic Design of Multiple Classifier Systems», Pattern Recognition Letters, vol 22, pagg 25-33, 2001.
G. Giacinto, Paolucci, R., e Roli, F., «Application of Neural Networks and Statistical Pattern Recognition Algorithms to Earthquake Risk Evaluations», Pattern Recognition Letters, vol 18, pagg 1353-1362, 1997.
R. Perdisci, Giacinto, G., e Roli, F., «Alarm clustering for intrusion detection systems in computer networks», Engineering Applications of Artificial Intelligence, vol 19, pagg 429-438, 2006.
G. Giacinto, Perdisci, R., e Roli, F., «Alarm Clustering for Intrusion Detection Systems in Computer Networks», in Machine Learning and Data Mining in Pattern Recognition (MLDM 2005), Leipzig, Germany, 2005, vol 3587, pagg 184-193.
B. Kolosnjaji, Demontis, A., Biggio, B., Maiorca, D., Giacinto, G., Eckert, C., e Roli, F., «Adversarial Malware Binaries: Evading Deep Learning for Malware Detection in Executables», in 2018 26th European Signal Processing Conference (EUSIPCO), Rome, 2018, pagg 533-537. (674.62 KB)
I. Corona, Giacinto, G., e Roli, F., «Adversarial Attacks against Intrusion Detection Systems: Taxonomy, Solutions and Open Issues», Information Sciences, vol 239, 2013. (1.49 MB)
G. Giacinto e Roli, F., «Adaptive Selection Of Image Classifiers», in 9th International Conference on Image Analysis and Processing, Florence, Italy, 1997, pagg 38-45.
G. Giacinto, Roli, F., e Fumera, G., «Adaptive Query Shifting for Content-Based Image Retrieval», in Int. Workshop on Machine Learning and Data Mining in Pattern Recognition (MLDM’01), 2001, vol 2123, pagg 337-346.
2
J. Armin, Thompson, B., Kijewski, P., Ariu, D., Giacinto, G., e Roli, F., «2020 Cybercrime Economic Costs: No measure No solution», in First International Workshop on Future Scenarios for Cybercrime and Cyber-terrorism, co-located with the 10th International Conference on Availability, Reliability and Security (ARES), 2015. (526.44 KB)

Pages