Publications

Export 140 results:
Filters: Author is Giorgio Giacinto  [Clear All Filters]
2011
B. Biggio, Corona, I., Fumera, G., Giacinto, G., and Roli, F., Bagging classifiers for fighting poisoning attacks in adversarial classification tasks, in Multiple Classifier Systems (MCS 2011), 2011, vol. 6713, pp. 350-359. (231.43 KB)
L. Piras and Giacinto, G., Dissimilarity representation in multi-feature spaces for image retrieval, in 16th Int. Conference on Image Analysis and Processing (ICIAP), Ravenna, Italy, 2011. (252.22 KB)
D. Ariu, Tronci, R., and Giacinto, G., HMMpayl: An Intrusion Detection System Based On Hidden Markov Models, Computers & Security, vol. 30, pp. 221 - 241, 2011. (1.88 MB)
R. Tronci, Murgia, G., Pili, M., Piras, L., and Giacinto, G., ImageHunter: a novel tool for Relevance Feedback in Content Based Image Retrieval, in 5th International Workshop on New Challenges in Distributed Information Filtering and Retrieval (DART), Palermo, Italy, 2011. (1.31 MB)
D. Ariu, Giacinto, G., and Roli, F., Machine Learning in Computer Forensics (and the Lessons Learned from Machine Learning in Computer Security), in AISec 2011: 4th ACM Workshop on Artificial Intelligence and Security, Chicago, IL, USA, 2011. (379.05 KB)
D. Ariu and Giacinto, G., A modular architecture for the analysis of HTTP payloads based on Multiple Classifiers, in 10th Int. Workshop on Multiple Classifier Systems (MCS 2011), Naples, Italy, 2011. (244.9 KB)
R. Tronci, Piras, L., Falqui, L., and Giacinto, G., A study on the evaluation of relevance feedback in multi-tagged image datasets, in 7th IEEE International Workshop on Multimedia Information Processing and Retrieval, California, USA, 2011. (259.03 KB)
2012
R. Perdisci, Corona, I., and Giacinto, G., Early Detection of Malicious Flux Networks via Large-Scale Passive DNS Traffic Analysis, IEEE Transactions on Dependable and Secure Computing, vol. 9, pp. 714-726, 2012. (1.37 MB)
L. Piras, Giacinto, G., and Paredes, R., Enhancing image retrieval by an Exploration-Exploitation approach, in 8th International Conference Machine Learning and Data Mining (MLDM), Berlin, 2012, vol. 7376, pp. 355-365. (307.57 KB)
R. Tronci, Piras, L., Murgia, G., and Giacinto, G., Image Hunter at ImageCLEF 2012 Personal Photo Retrieval Task, in CLEF (Online Working Notes/Labs/Workshop), Rome, 2012. (2.78 MB)
D. Maiorca, Giacinto, G., and Corona, I., A Pattern Recognition System for Malicious PDF Files Detection, in MLDM - International Conference on Machine Learning and Data Mining, Berlin, 2012, vol. 7376, pp. 510-524. (1.74 MB)
R. Tronci, Piras, L., and Giacinto, G., Performance Evaluation of Relevance Feedback for Image Retrieval by “Real-World” Multi-Tagged Image Datasets, International Journal of Multimedia Data Engineering and Management (IJMDEM), vol. 3, p. 16, 2012. (357.99 KB)
L. Piras, Tronci, R., Murgia, G., and Giacinto, G., The PRA and AmILAB at ImageCLEF 2012 Photo Flickr Annotation Task, in CLEF (Online Working Notes/Labs/Workshop), Rome, 2012. (540.05 KB)
I. Corona, Tronci, R., and Giacinto, G., SuStorID: A Multiple Classifier System for the Protection of Web Services, in International Conference on Pattern Recognition (ICPR 2012), Tsukuba International Congress Center, Tsukuba Science City, JAPAN, 2012, pp. 2375-2378. (286.16 KB)
L. Piras and Giacinto, G., Synthetic Pattern Generation for Imbalanced Learning in Image Retrieval, Pattern Recognition Letters, vol. 33, p. 7, 2012. (236.64 KB)
2013
I. Corona, Giacinto, G., and Roli, F., Adversarial Attacks against Intrusion Detection Systems: Taxonomy, Solutions and Open Issues, Information Sciences, vol. 239, 2013. (1.49 MB)
L. Piras, Tronci, R., and Giacinto, G., Diversity in ensembles of codebooks for visual concept detection, in 17th Int. Conference on Image Analysis and Processing (ICIAP), Naples, Italy, 2013. (303.73 KB)
B. Biggio, Corona, I., Maiorca, D., Nelson, B., Srndic, N., Laskov, P., Giacinto, G., and Roli, F., Evasion attacks against machine learning at test time, in European Conference on Machine Learning and Principles and Practice of Knowledge Discovery in Databases (ECML PKDD), 2013, vol. 8190, pp. 387-402. (473.78 KB)
R. Tronci, Murgia, G., Pili, M., Piras, L., and Giacinto, G., ImageHunter: a Novel Tool for Relevance Feedback in Content Based Image Retrieval, in New Challenges in Distributed Information Filtering and Retrieval. DART 2011: Revised and Invited Papers, C. Lai, Semeraro, G., and Vargiu, E. Springer, 2013. (1.98 MB)
D. Maiorca, Corona, I., and Giacinto, G., Looking at the Bag is not Enough to Find the Bomb: an Evasion of Structural Methods for Malicious PDF Files Detection, in 8th ACM Symposium on Information, Computer and Communications Security (ASIACCS 2013), Hangzhou, China, 2013. (2.12 MB)
L. Piras, Giacinto, G., and Paredes, R., Passive-Aggressive Online Learning for Relevance Feedback in Content Based Image Retrieval, in 2nd International Conference on Pattern Recognition Applications and Methods (ICPRAM), Barcelona, Spain, 2013. (138.32 KB)
R. Perdisci, Ariu, D., and Giacinto, G., Scalable Fine-Grained Behavioral Clustering of HTTP-Based Malware, Computer Networks - Special Issue on Botnet Activity: Analysis, Detection and Shutdown, vol. 57, pp. 487-500, 2013. (797.8 KB)
2014
I. Corona, Maiorca, D., Ariu, D., and Giacinto, G., Lux0R: Detection of Malicious PDF-embedded JavaScript code through Discriminant Analysis of API References, in AISec'14: Proceedings of the 2014 ACM Workshop on Artificial Intelligence and Security, co-located with CCS '14, Scottdale, Arizona, USA, 2014. (455.14 KB)
L. Piras and Giacinto, G., Open issues on codebook generation in Image Classification tasks, in 10th International Conference Machine Learning and Data Mining (MLDM), St. Petersburg, Russia, 2014, pp. 328-342. (229.92 KB)
B. Biggio, Rieck, K., Ariu, D., Wressnegger, C., Corona, I., Giacinto, G., and Roli, F., Poisoning Behavioral Malware Clustering, in AISec'14: Proceedings of the 2014 ACM Workshop on Artificial Intelligence and Security, co-located with CCS '14, Scottsdale, Arizona, USA, 2014, pp. 27-36. (375.58 KB)

Pages