Publications
«DeltaPhish: Detecting Phishing Webpages in Compromised Websites», 22nd European Symposium on Research in Computer Security (ESORICS), vol 10492. Springer International Publishing, Norway, September 11-15, 2017, pagg 370–388, 2017.
(4.13 MB)
, 
«Designing multi-label classifiers that maximize F measures: state of the art», Pattern Recognition, vol 61, 2017.
(452.28 KB)
, 
«Detection of Malicious Scripting Code through Discriminant and Adversary-Aware API Analysis», in 1st Italian Conference on CyberSecurity (ITASEC), 2017, vol 1816, pagg 96-105.
(371.53 KB)
, 
«DroidSieve: Fast and Accurate Classification of Obfuscated Android Malware», in Proceedings of the Seventh ACM on Conference on Data and Application Security and Privacy, New York, NY, USA, 2017, pagg 309–320.
, «Histological image analysis by invariant descriptors», Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), vol 10484 LNCS, pagg 345 – 356, 2017.
, «Infinity-norm Support Vector Machines against Adversarial Label Contamination», 1st Italian Conference on CyberSecurity (ITASEC). Venice, Italy , pagg 106-115, 2017.
(504.93 KB)
, 
«Information Fusion in Content Based Image Retrieval: A Comprehensive Overview», Information Fusion, vol 37, pagg 50-60, 2017.
(734.6 KB)
, 
«Multimodal Retrieval with Diversification and Relevance Feedback for Tourist Attraction Images», ACM Transactions on Multimedia Computing, Communications, and Applications, vol 13, n° 4, 2017.
(5.94 MB)
, 
«Organizer Team at ImageCLEFlifelog 2017: Baseline Approaches for Lifelog Retrieval and Summarization», in CLEF working notes, CEUR, Dublin, 2017, vol 1866.
(220.99 KB)
, 
«Overview of ImageCLEF 2017: Information extraction from images», in CLEF 2017 Proceedings, Dublin, Ireland, 2017, pagg 315-337.
, «Overview of ImageCLEFlifelog 2017: Lifelog Retrieval and Summarization», in CLEF2017 Working Notes, Dublin, Ireland, 2017, vol 1866.
(1.7 MB)
, 
«A Parameter Randomization Approach for Constructing Classifier Ensembles», Pattern Recognition, vol 69, pagg 1-13, 2017.
(448.73 KB)
, 
«Randomized Prediction Games for Adversarial Machine Learning», IEEE Transactions on Neural Networks and Learning Systems, vol 28, n° 11, pagg 2466-2478, 2017.
(1.52 MB)
(256.21 KB)
, 

«Rotation invariant co-occurrence matrix features», Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), vol 10484 LNCS, pagg 391 – 401, 2017.
, «R-PackDroid: API Package-Based Characterization and Detection of Mobile Ransomware», in ACM Symposium on Applied Computing (SAC 2017 - Acceptance Rate 15.7%), 2017, pagg 1718-1723.
(272.44 KB)
, 
«Statistical Meta-Analysis of Presentation Attacks for Secure Multibiometric Systems», IEEE Transactions on Pattern Analysis and Machine Intelligence, vol 39, n° 3, pagg 561-575, 2017.
(5.7 MB)
, 
«Towards Poisoning of Deep Learning Algorithms with Back-gradient Optimization», in 10th ACM Workshop on Artificial Intelligence and Security, 2017, pagg 27-38.
(4.08 MB)
, 
«Using Diversity for Classifier Ensemble Pruning: An Empirical Investigation», Theoretical and Applied Informatics, vol 29, n° 1&2, pagg 25-39, 2017.
, «Adaptive Appearance Model Tracking for Still-to-Video Face Recognition», Pattern Recognition, vol 49, n° 1, 2016.
(6.51 MB)
, 
«Adversarial Feature Selection Against Evasion Attacks», IEEE Transactions on Cybernetics, vol 46, n° 3, pagg 766-777, 2016.
(2.12 MB)
, 
«Classifier Ensembles with Trajectory Under-Sampling for Face Re-Identification», in 5th International Conference on Pattern Recognition Applications and Methods (ICPRAM 2016), Rome, Italy, 2016, vol 1, pagg 97-108.
(556.82 KB)
, 
«The Dark Side of Open Data», 2nd International Workshop on Knowledge Discovery on the WEB (KDWEB). Cagliari, 2016.
(124.62 KB)
(1.33 MB)
, 

«Design and Implementation of Robust Systems for Secure Malware Detection (Ph.D. Thesis)», University of Cagliari, Italy, Cagliari, 2016.
(5.34 MB)
, 
«Detecting Misuse of Google Cloud Messaging in Android Badware», in 6th Workshop on Security and Privacy in Smartphones and Mobile Devices (SPSM), Vienna, Austria, 2016, pagg 103-112.
(626.38 KB)
, 
«DroidScribe: Classifying Android Malware Based on Runtime Behavior», in Mobile Security Technologies (MoST 2016), 2016.
(571.22 KB)
, 