Export 141 results:
Filters: Author is Giorgio Giacinto  [Clear All Filters]
A B C D E F G H I J K L M N O P Q R S T U V W X Y Z 
M. Aresu, Ariu, D., Ahmadi, M., Maiorca, D., and Giacinto, G., Clustering Android Malware Families by Http Traffic, in 10h International Conference on Malicious and Unwanted Software (MALCON 2015), October 20-22th 2015, Fajardo, Puerto Rico, USA, 2015. (168.36 KB)
F. Roli, Giacinto, G., and Serpico, S. B., Classifier Fusion for Multisensor Image Recognition, in Image and Signal Processing for Remote Sensing VI, 2001, Sebastiano B. Serpico., vol. 4170, pp. 103-110.
G. Giacinto and Roli, F., Bayesian Relevance Feedback for Content-Based Image Retrieval, Pattern Recognition, vol. 37, pp. 1499-1508, 2004.
B. Biggio, Corona, I., Fumera, G., Giacinto, G., and Roli, F., Bagging classifiers for fighting poisoning attacks in adversarial classification tasks, in Multiple Classifier Systems (MCS 2011), 2011, vol. 6713, pp. 350-359. (231.43 KB)
G. Giacinto and Roli, F., Automatic Design of Multiple Classifier Systems by Unsupervised Learning, in 1st Int. Workshop on Machine Learning and Data Mining in Pattern Recognition, 1999, vol. 1715, pp. 131-143.
R. Paolucci, Coli, P., and Giacinto, G., Assessment of seismic site effects in 2-D alluvial valleys using neural networks, Earthquake Spectra, vol. 16, pp. 661-680, 2000.
G. Giacinto and Roli, F., An Approach to the Automatic Design of Multiple Classifier Systems, Pattern Recognition Letters, vol. 22, pp. 25-33, 2001.
G. Giacinto, Paolucci, R., and Roli, F., Application of Neural Networks and Statistical Pattern Recognition Algorithms to Earthquake Risk Evaluations, Pattern Recognition Letters, vol. 18, pp. 1353-1362, 1997.
R. Perdisci, Giacinto, G., and Roli, F., Alarm clustering for intrusion detection systems in computer networks, Engineering Applications of Artificial Intelligence, vol. 19, pp. 429-438, 2006.
G. Giacinto, Perdisci, R., and Roli, F., Alarm Clustering for Intrusion Detection Systems in Computer Networks, in Machine Learning and Data Mining in Pattern Recognition (MLDM 2005), Leipzig, Germany, 2005, vol. 3587, pp. 184-193.
B. Kolosnjaji, Demontis, A., Biggio, B., Maiorca, D., Giacinto, G., Eckert, C., and Roli, F., Adversarial Malware Binaries: Evading Deep Learning for Malware Detection in Executables, in 2018 26th European Signal Processing Conference (EUSIPCO), Rome, 2018, pp. 533-537. (674.62 KB)
D. Maiorca, Demontis, A., Biggio, B., Roli, F., and Giacinto, G., Adversarial Detection of Flash Malware: Limitations and Open Issues, Computers & Security, vol. 96, 2020. (1.08 MB)
I. Corona, Giacinto, G., and Roli, F., Adversarial Attacks against Intrusion Detection Systems: Taxonomy, Solutions and Open Issues, Information Sciences, vol. 239, 2013. (1.49 MB)
G. Giacinto and Roli, F., Adaptive Selection Of Image Classifiers, in 9th International Conference on Image Analysis and Processing, Florence, Italy, 1997, pp. 38-45.
G. Giacinto, Roli, F., and Fumera, G., Adaptive Query Shifting for Content-Based Image Retrieval, in Int. Workshop on Machine Learning and Data Mining in Pattern Recognition (MLDM’01), 2001, vol. 2123, pp. 337-346.
J. Armin, Thompson, B., Kijewski, P., Ariu, D., Giacinto, G., and Roli, F., 2020 Cybercrime Economic Costs: No measure No solution, in First International Workshop on Future Scenarios for Cybercrime and Cyber-terrorism, co-located with the 10th International Conference on Availability, Reliability and Security (ARES), 2015. (526.44 KB)