Publications

Export 140 results:
Filters: Author is Giorgio Giacinto  [Clear All Filters]
A B C D E F G H I J K L M N O P Q R S T U V W X Y Z 
E
B. Biggio, Corona, I., Maiorca, D., Nelson, B., Srndic, N., Laskov, P., Giacinto, G., and Roli, F., Evasion attacks against machine learning at test time, in European Conference on Machine Learning and Principles and Practice of Knowledge Discovery in Databases (ECML PKDD), 2013, vol. 8190, pp. 387-402. (473.78 KB)
D. Maiorca, Ariu, D., Corona, I., and Giacinto, G., An Evasion Resilient Approach to the Detection of Malicious PDF Files, in Information Systems Security and Privacy (Communication in Computer and Information Science), vol. 576, Springer, 2015, pp. 68-85. (503.11 KB)
M. Melis, Maiorca, D., Biggio, B., Giacinto, G., and Roli, F., Explaining Black-box Android Malware Detection, in 26th European Signal Processing Conference (EUSIPCO '18), Rome, Italy, 2018, pp. 524-528. (431.78 KB)
F. Meloni, Sanna, A., Maiorca, D., and Giacinto, G., Extended Abstract: Effective Call Graph Fingerprinting for the Analysis and Classification of Windows Malware, 19th Conference on Detection of Intrusions and Malware & Vulnerability Assessment (DIMVA). pp. 42-52, 2022. (328.32 KB)
F
M. Melis, Piras, L., Biggio, B., Giacinto, G., Fumera, G., and Roli, F., Fast Image Classification with Reduced Multiclass Support Vector Machines, in 18th Int'l Conf. on Image Analysis and Processing, Genova, Italy, 2015, vol. Image Analysis and Processing (ICIAP 2015), pp. 78-88. (829.37 KB)
F. Cara, Scalas, M., Giacinto, G., and Maiorca, D., On the Feasibility of Adversarial Sample Creation Using the Android System API, Information, no. 11(9): 433, 2020. (1.26 MB)
G. Giacinto, Roli, F., and Didaci, L., Fusion of multiple classifiers for intrusion detection in computer networks, Pattern Recognition Letters, vol. 24, pp. 1795-1803, 2003.
H
D. Ariu and Giacinto, G., HMMPayl: an application of HMM to the analysis of the HTTP Payload, in Workshop on Applications of Pattern Analysis, 2010. (273.18 KB)
D. Ariu, Tronci, R., and Giacinto, G., HMMpayl: An Intrusion Detection System Based On Hidden Markov Models, Computers & Security, vol. 30, pp. 221 - 241, 2011. (1.88 MB)
I. Corona, Ariu, D., and Giacinto, G., HMM-Web: a framework for the detection of attacks against Web applications, in IEEE ICC 2009, Dresden, Germany, 2009. (391.14 KB)
D. - T. Dang-Nguyen, Piras, L., Giacinto, G., Boato, G., and De Natale, F. G. B., A Hybrid Approach for Retrieving Diverse Social Images of Landmarks, in IEEE International Conference on Multimedia & Expo (ICME), Torino, 2015. (1.16 MB)
I
R. Tronci, Piras, L., Murgia, G., and Giacinto, G., Image Hunter at ImageCLEF 2012 Personal Photo Retrieval Task, in CLEF (Online Working Notes/Labs/Workshop), Rome, 2012. (2.78 MB)
R. Tronci, Murgia, G., Pili, M., Piras, L., and Giacinto, G., ImageHunter: a Novel Tool for Relevance Feedback in Content Based Image Retrieval, in New Challenges in Distributed Information Filtering and Retrieval. DART 2011: Revised and Invited Papers, C. Lai, Semeraro, G., and Vargiu, E. Springer, 2013. (1.98 MB)
R. Tronci, Murgia, G., Pili, M., Piras, L., and Giacinto, G., ImageHunter: a novel tool for Relevance Feedback in Content Based Image Retrieval, in 5th International Workshop on New Challenges in Distributed Information Filtering and Retrieval (DART), Palermo, Italy, 2011. (1.31 MB)
R. Tronci, Giacinto, G., and Roli, F., Index Driven Combination of Multiple Biometric Experts for AUC Maximisation, in 7th International Workshop on Multiple Classifiers Systems MCS 2007, Prague (Czech Republic), 2007, vol. 4472, pp. 357-366.
I. Corona, Giacinto, G., Mazzariello, C., Roli, F., and Sansone, C., Information fusion for computer security: State of the art and open issues, Information Fusion, vol. 10, pp. 274-284, 2009.
L. Piras and Giacinto, G., Information Fusion in Content Based Image Retrieval: A Comprehensive Overview, Information Fusion, vol. 37, pp. 50-60, 2017. (734.6 KB)
G. Giacinto and Roli, F., Instance-Based Relevance Feedback for Image Retrieval, in Advances in Neural Information Processing Systems (NIPS) 17, 2005, pp. 489-496.
G. Giacinto and Roli, F., Instance-Based Relevance Feedback in Image Retrieval using Dissimilarity Spaces, in Case-Based Reasoning for signals and images, P. Perner Springer, 2007.
G. Giacinto, Perdisci, R., Del Rio, M., and Roli, F., Intrusion detection in computer networks by a modular ensemble of one-class classifiers, Information Fusion, vol. 9, 2008.
G. Giacinto and Roli, F., Intrusion Detection in Computer Networks by Multiple Classifier Systems, in 16th International Conference on Pattern Recognition (ICPR 2002), Quebec City, Canada, 2002, vol. II, pp. 390-393.
I. Corona, Giacinto, G., and Roli, F., Intrusion detection in computer systems as a pattern recognition task in adversarial environment: a critical review, in Workshop on Neural Information Processing Systems (NIPS), Whistler, British Columbia, Canada, 2007.
I. Corona, Giacinto, G., and Roli, F., Intrusion Detection in Computer Systems using Multiple Classifer Systems, in Supervised and Unsupervised Ensemble Methods and Their Applications, O. Okun and G. Valentini., Springer-Verlag, Berlin/Heidelberg, 2008, pp. 91-114.
D. Ariu, Corona, I., Giacinto, G., Perdisci, R., and Roli, F., Intrusion Detection Systems based on anomaly detection techniques, in Italian Workshop on Privacy and Security (PRISE), Rome, 2007.
K
L. Piras and Giacinto, G., K-Nearest Neighbors Directed Synthetic Images Injection, in 11th International Workshop on Image Analysis for Multimedia Interactive Services (WIAMIS), Desenzano del Garda, Italy, 2010. (167.12 KB)

Pages