Publications

Export 141 results:
Filters: Author is Giorgio Giacinto  [Clear All Filters]
A B C D E F G H I J K L M N O P Q R S T U V W X Y Z 
I
I. Corona, Giacinto, G., Mazzariello, C., Roli, F., and Sansone, C., Information fusion for computer security: State of the art and open issues, Information Fusion, vol. 10, pp. 274-284, 2009.
R. Tronci, Giacinto, G., and Roli, F., Index Driven Combination of Multiple Biometric Experts for AUC Maximisation, in 7th International Workshop on Multiple Classifiers Systems MCS 2007, Prague (Czech Republic), 2007, vol. 4472, pp. 357-366.
R. Tronci, Murgia, G., Pili, M., Piras, L., and Giacinto, G., ImageHunter: a Novel Tool for Relevance Feedback in Content Based Image Retrieval, in New Challenges in Distributed Information Filtering and Retrieval. DART 2011: Revised and Invited Papers, C. Lai, Semeraro, G., and Vargiu, E. Springer, 2013. (1.98 MB)
R. Tronci, Murgia, G., Pili, M., Piras, L., and Giacinto, G., ImageHunter: a novel tool for Relevance Feedback in Content Based Image Retrieval, in 5th International Workshop on New Challenges in Distributed Information Filtering and Retrieval (DART), Palermo, Italy, 2011. (1.31 MB)
R. Tronci, Piras, L., Murgia, G., and Giacinto, G., Image Hunter at ImageCLEF 2012 Personal Photo Retrieval Task, in CLEF (Online Working Notes/Labs/Workshop), Rome, 2012. (2.78 MB)
H
D. - T. Dang-Nguyen, Piras, L., Giacinto, G., Boato, G., and De Natale, F. G. B., A Hybrid Approach for Retrieving Diverse Social Images of Landmarks, in IEEE International Conference on Multimedia & Expo (ICME), Torino, 2015. (1.16 MB)
I. Corona, Ariu, D., and Giacinto, G., HMM-Web: a framework for the detection of attacks against Web applications, in IEEE ICC 2009, Dresden, Germany, 2009. (391.14 KB)
D. Ariu, Tronci, R., and Giacinto, G., HMMpayl: An Intrusion Detection System Based On Hidden Markov Models, Computers & Security, vol. 30, pp. 221 - 241, 2011. (1.88 MB)
D. Ariu and Giacinto, G., HMMPayl: an application of HMM to the analysis of the HTTP Payload, in Workshop on Applications of Pattern Analysis, 2010. (273.18 KB)
F
G. Giacinto, Roli, F., and Didaci, L., Fusion of multiple classifiers for intrusion detection in computer networks, Pattern Recognition Letters, vol. 24, pp. 1795-1803, 2003.
F. Cara, Scalas, M., Giacinto, G., and Maiorca, D., On the Feasibility of Adversarial Sample Creation Using the Android System API, Information, no. 11(9): 433, 2020. (1.26 MB)
M. Melis, Piras, L., Biggio, B., Giacinto, G., Fumera, G., and Roli, F., Fast Image Classification with Reduced Multiclass Support Vector Machines, in 18th Int'l Conf. on Image Analysis and Processing, Genova, Italy, 2015, vol. Image Analysis and Processing (ICIAP 2015), pp. 78-88. (829.37 KB)
E
F. Meloni, Sanna, A., Maiorca, D., and Giacinto, G., Extended Abstract: Effective Call Graph Fingerprinting for the Analysis and Classification of Windows Malware, 19th Conference on Detection of Intrusions and Malware & Vulnerability Assessment (DIMVA). pp. 42-52, 2022. (328.32 KB)
M. Melis, Maiorca, D., Biggio, B., Giacinto, G., and Roli, F., Explaining Black-box Android Malware Detection, in 26th European Signal Processing Conference (EUSIPCO '18), Rome, Italy, 2018, pp. 524-528. (431.78 KB)
D. Maiorca, Ariu, D., Corona, I., and Giacinto, G., An Evasion Resilient Approach to the Detection of Malicious PDF Files, in Information Systems Security and Privacy (Communication in Computer and Information Science), vol. 576, Springer, 2015, pp. 68-85. (503.11 KB)
B. Biggio, Corona, I., Maiorca, D., Nelson, B., Srndic, N., Laskov, P., Giacinto, G., and Roli, F., Evasion attacks against machine learning at test time, in European Conference on Machine Learning and Principles and Practice of Knowledge Discovery in Databases (ECML PKDD), 2013, vol. 8190, pp. 387-402. (473.78 KB)
J. Hoffmann, Rytilahti, T., Maiorca, D., Winandy, M., Giacinto, G., and Holz, T., Evaluating Analysis Tools for Android Apps: Status Quo and Robustness Against Obfuscation, Horst Görtz Institut for IT Security (Ruhr-University Bochum), Technical Report TR-HGI-2016-003, 2016. (519.16 KB)
J. Hoffmann, Rytilahti, T., Maiorca, D., Winandy, M., Giacinto, G., and Holz, T., Evaluating Analysis Tools for Android Apps: Status Quo and Robustness against Obfuscation, Proceedings of the 6th ACM Conference on Data and Application Security and Privacy (CODASPY 2016, 09-11 March, 2016). 2016. (726.65 KB)
G. Giacinto and Roli, F., Ensembles of Neural Networks for Soft Classification of Remote Sensing Images, in European Symposium on Intelligent Techniques, Bari, Italy, 1997, pp. 166-170.
L. Didaci, Giacinto, G., and Roli, F., Ensemble Learning for Intrusion Detection in Computer Networks, in AI*IA, Workshop on "Apprendimento automatico: metodi e applicazioni", Siena, Italy, 2002.
L. Piras, Giacinto, G., and Paredes, R., Enhancing image retrieval by an Exploration-Exploitation approach, in 8th International Conference Machine Learning and Data Mining (MLDM), Berlin, 2012, vol. 7376, pp. 355-365. (307.57 KB)
M. Scalas, Maiorca, D., Mercaldo, F., Visaggio, C. Aaron, Martinelli, F., and Giacinto, G., On the Effectiveness of System API-Related Information for Android Ransomware Detection, Computers and Security, vol. 86, pp. 162-182, 2019. (706.92 KB)
R. Perdisci, Corona, I., and Giacinto, G., Early Detection of Malicious Flux Networks via Large-Scale Passive DNS Traffic Analysis, IEEE Transactions on Dependable and Secure Computing, vol. 9, pp. 714-726, 2012. (1.37 MB)
D
R. Tronci, Giacinto, G., and Roli, F., Dynamic Score Selection for Fusion of Multiple Biometric Matchers, in 14th IEEE International Conference on Image Analysis and Processing ICIAP 2007, Modena, Italy, 2007, pp. 15-20.
R. Tronci, Giacinto, G., and Roli, F., Dynamic score combination of binary experts, in 19th International Conference on Pattern Recognition (ICPR 2008), Tampa (Florida, USA), 2008.

Pages