Publications

Export 135 results:
Filters: Author is Giorgio Giacinto  [Clear All Filters]
A B C D E F G H I J K L M N O P Q R S T U V W X Y Z 
Y
D. Ariu, Didaci, L., Fumera, G., Frumento, E., Freschi, F., e Giacinto, G., «Yet Another Cybersecurity Roadmapping Methodology», in First International Workshop on Future Scenarios for Cybercrime and Cyber-terrorism, co-located with the 10th International Conference on Availability, Reliability and Security (ARES), 2015. (1.34 MB)
A. Demontis, Melis, M., Biggio, B., Maiorca, D., Arp, D., Rieck, K., Corona, I., Giacinto, G., e Roli, F., «Yes, Machine Learning Can Be More Secure! A Case Study on Android Malware Detection», IEEE Trans. Dependable and Secure Computing, vol 16, n° 4, pagg 711-724, 2019. (3.61 MB)
W
D. M. Freeman, Jain, S., Duermuth, M., Biggio, B., e Giacinto, G., «Who Are You? A Statistical Approach to Measuring User Authenticity», in Proc. 23rd Annual Network & Distributed System Security Symposium (NDSS), 2016. (764.14 KB)
U
L. Piras, Furcas, D., e Giacinto, G., «User-driven Nearest-Neighbour Exploration of Image Archives», in 4th International Conference on Pattern Recognition Applications and Methods (ICPRAM), Lisbon, Portugal, 2015, pagg 181 - 189. (376.55 KB)
G. Giacinto, Roli, F., e Fumera, G., «Unsupervised Learning of Neural Network Ensembles for Image Classification», in IEEE-INNS-ENNS International Joint Conference on Neural Networks (IJCNN 2000), Como, Italy, 2000, vol III, pagg 155-159.
L. Piras e Giacinto, G., «Unbalanced learning in Content-Based Image Classification and Retrieval», in IEEE International Conference on Multimedia & Expo (ICME), Singapore, 2010. (177.33 KB)
T
D. Maiorca, Biggio, B., e Giacinto, G., «Towards Adversarial Malware Detection: Lessons Learned from PDF-based Attacks», ACM Computing Surveys, vol 52, n° 4, 2019. (1.21 MB)
G. Giacinto e Roli, F., «A theoretical framework for dynamic classifier selection», in 15th International Conference on Pattern Recognition, Barcelona, Spain, 2000, vol 2, pagg 8-11.
L. Putzu, Piras, L., e Giacinto, G., «Ten years of Relevance Score for Content Based Image Retrieval», in 14th International Conference Machine Learning and Data Mining (MLDM), New York, 2018, vol 10935.
A. Fanni, Giacinto, G., Marchesi, M., e Serri, A., «Tabu search coupled with deterministic strategies for the optimal design of MRI devices», Int. J. of Applied Electromagnetics and Mechanics, vol 10, pagg 21-31, 1999.
E. Costamagna, Fanni, A., e Giacinto, G., «A Tabu Search algorithm for the optimisation of telecommunication networks», European Journal of Operational Research, vol 106, pagg 357-372, 1998.
S
L. Piras e Giacinto, G., «Synthetic Pattern Generation for Imbalanced Learning in Image Retrieval», Pattern Recognition Letters, vol 33, pag 7, 2012. (236.64 KB)
I. Corona, Tronci, R., e Giacinto, G., «SuStorID: A Multiple Classifier System for the Protection of Web Services», in International Conference on Pattern Recognition (ICPR 2012), Tsukuba International Congress Center, Tsukuba Science City, JAPAN, 2012, pagg 2375-2378. (286.16 KB)
A. Montali, Giacinto, G., Migliaccio, M., e Gambardella, A., «Supervised Pattern Classification Techniques for Oil Spill Classification in SAR Images: Preliminary Results», in SEASAR2006 Workshop, ESA-ESRIN, Frascati, Italy, 2006, pagg 23-26.
L. Didaci, Giacinto, G., Roli, F., e Marcialis, G. L., «A study on the performances of Dynamic Classifier Selection based on Local Accuracy Estimation», Pattern Recognition, vol 38, pagg 2188-2191, 2005.
R. Tronci, Piras, L., Falqui, L., e Giacinto, G., «A study on the evaluation of relevance feedback in multi-tagged image datasets», in 7th IEEE International Workshop on Multimedia Information Processing and Retrieval, California, USA, 2011. (259.03 KB)
D. Maiorca, Ariu, D., Corona, I., e Giacinto, G., «A Structural and Content-Based Approach for a Precise and Robust Detection of Malicious PDF Files», Proceedings of the 1st International Conference on Information Systems Security and Privacy (ICISSP 2015, 9-11th February 2015, Angers, France). pagg 27-36, 2015. (267.78 KB)
D. Maiorca, Ariu, D., Corona, I., Aresu, M., e Giacinto, G., «Stealth Attacks: An Extended Insight into the Obfuscation Effects on Android Malware», Computers And Security (Elsevier), vol 51 (June), pagg 16-31, 2015. (413.99 KB)
E. Costamagna, Fanni, A., e Giacinto, G., «A simulated annealing algorithm for the optimization of communication network», in Int. Symp. on Signals, Systems and Electronics (ISSSE '95), 1995, pagg 405-408.
D. Ariu, Giacinto, G., e Perdisci, R., «Sensing attacks in Computers Network with Hidden Markov Models», in Machine Learning and Data Mining in Pattern Recognition, MLDM 2007, Leipzig, 2007, vol 4571, pagg 449-463. (315.94 KB)
G. Giacinto, Roli, F., e Fumera, G., «Selection of image classifiers», Electronics Letters, vol 36, pagg 420-422, 2000.
R. Tronci, Giacinto, G., e Roli, F., «Selection of experts for the design of multiple biometric systems», in Machine Learning and Data Mining in Pattern Recognition, MLDM 2007, Leipzig, 2007, vol 4571, pagg 795-809.
G. Giacinto, Roli, F., e Fumera, G., «Selection of classifiers based on multiple classifier behaviour», in Joint IAPR Int. Workshops on Syntactical and Structural Pattern Recognition and Statistical Pattern Recognition (S+SSPR 2000), Alicante, Spain, 2000, vol 1876, pagg 87-93.
B. Biggio, Corona, I., Nelson, B., Rubinstein, B. I. P., Maiorca, D., Fumera, G., Giacinto, G., e Roli, F., «Security Evaluation of Support Vector Machines in Adversarial Environments», in Support Vector Machines Applications, Y. Ma e Guo, G. Springer International Publishing, 2014, pagg 105-153. (687.1 KB)
G. Giacinto, Roli, F., e Tronci, R., «Score Selection Techniques for Fingerprint Multi-modal Biometric Authentication», in 13th International Conference on Image Analysis and Processing (ICIAP 2005), Cagliari (Italy), 2005, vol 3617, pagg 1018-1025.

Pages