Publications

Export 140 results:
Filters: Author is Giorgio Giacinto  [Clear All Filters]
Report
J. Hoffmann, Rytilahti, T., Maiorca, D., Winandy, M., Giacinto, G., e Holz, T., «Evaluating Analysis Tools for Android Apps: Status Quo and Robustness Against Obfuscation», Horst Görtz Institut for IT Security (Ruhr-University Bochum), Technical Report TR-HGI-2016-003, 2016. (519.16 KB)
Journal Article
A. Demontis, Melis, M., Biggio, B., Maiorca, D., Arp, D., Rieck, K., Corona, I., Giacinto, G., e Roli, F., «Yes, Machine Learning Can Be More Secure! A Case Study on Android Malware Detection», IEEE Trans. Dependable and Secure Computing, vol 16, n° 4, pagg 711-724, 2019. (3.61 MB)
D. Maiorca, Biggio, B., e Giacinto, G., «Towards Adversarial Malware Detection: Lessons Learned from PDF-based Attacks», ACM Computing Surveys, vol 52, n° 4, 2019. (1.21 MB)
A. Fanni, Giacinto, G., Marchesi, M., e Serri, A., «Tabu search coupled with deterministic strategies for the optimal design of MRI devices», Int. J. of Applied Electromagnetics and Mechanics, vol 10, pagg 21-31, 1999.
E. Costamagna, Fanni, A., e Giacinto, G., «A Tabu Search algorithm for the optimisation of telecommunication networks», European Journal of Operational Research, vol 106, pagg 357-372, 1998.
L. Piras e Giacinto, G., «Synthetic Pattern Generation for Imbalanced Learning in Image Retrieval», Pattern Recognition Letters, vol 33, pag 7, 2012. (236.64 KB)
L. Didaci, Giacinto, G., Roli, F., e Marcialis, G. L., «A study on the performances of Dynamic Classifier Selection based on Local Accuracy Estimation», Pattern Recognition, vol 38, pagg 2188-2191, 2005.
D. Maiorca, Ariu, D., Corona, I., Aresu, M., e Giacinto, G., «Stealth Attacks: An Extended Insight into the Obfuscation Effects on Android Malware», Computers And Security (Elsevier), vol 51 (June), pagg 16-31, 2015. (413.99 KB)
G. Giacinto, Roli, F., e Fumera, G., «Selection of image classifiers», Electronics Letters, vol 36, pagg 420-422, 2000.
R. Perdisci, Ariu, D., e Giacinto, G., «Scalable Fine-Grained Behavioral Clustering of HTTP-Based Malware», Computer Networks - Special Issue on Botnet Activity: Analysis, Detection and Shutdown, vol 57, pagg 487-500, 2013. (797.8 KB)
G. Fumera, Roli, F., e Giacinto, G., «Reject Option with Multiple Thresholds», Pattern Recognition, vol 33, pagg 2099-2101, 2000.
R. Tronci, Piras, L., e Giacinto, G., «Performance Evaluation of Relevance Feedback for Image Retrieval by “Real-World” Multi-Tagged Image Datasets», International Journal of Multimedia Data Engineering and Management (IJMDEM), vol 3, pag 16, 2012. (357.99 KB)
A. Gambardella, Giacinto, G., Migliaccio, M., e Montali, A., «One-class classification for oil spill detection», Pattern Analysis and Applications, 2009.
R. Perdisci, Ariu, D., Fogla, P., Giacinto, G., e Lee, W., «McPAD: A Multiple Classifier System for Accurate Payload-based Anomaly Detection», Computer Networks, vol 53, pagg 864-881, 2009. (882.94 KB)
D. Ariu, Corona, I., Tronci, R., e Giacinto, G., «Machine Learning in Security Applications», Trans. Mach. Learn. Data Min., vol 8, pagg 3-39, 2015.
G. Giacinto, Perdisci, R., Del Rio, M., e Roli, F., «Intrusion detection in computer networks by a modular ensemble of one-class classifiers», Information Fusion, vol 9, 2008.
L. Piras e Giacinto, G., «Information Fusion in Content Based Image Retrieval: A Comprehensive Overview», Information Fusion, vol 37, pagg 50-60, 2017. (734.6 KB)
I. Corona, Giacinto, G., Mazzariello, C., Roli, F., e Sansone, C., «Information fusion for computer security: State of the art and open issues», Information Fusion, vol 10, pagg 274-284, 2009.
D. Ariu, Tronci, R., e Giacinto, G., «HMMpayl: An Intrusion Detection System Based On Hidden Markov Models», Computers & Security, vol 30, pagg 221 - 241, 2011. (1.88 MB)
G. Giacinto, Roli, F., e Didaci, L., «Fusion of multiple classifiers for intrusion detection in computer networks», Pattern Recognition Letters, vol 24, pagg 1795-1803, 2003.
F. Cara, Scalas, M., Giacinto, G., e Maiorca, D., «On the Feasibility of Adversarial Sample Creation Using the Android System API», Information, n° 11(9): 433, 2020. (1.26 MB)
M. Scalas, Maiorca, D., Mercaldo, F., Visaggio, C. Aaron, Martinelli, F., e Giacinto, G., «On the Effectiveness of System API-Related Information for Android Ransomware Detection», Computers and Security, vol 86, pagg 162-182, 2019. (706.92 KB)
R. Perdisci, Corona, I., e Giacinto, G., «Early Detection of Malicious Flux Networks via Large-Scale Passive DNS Traffic Analysis», IEEE Transactions on Dependable and Secure Computing, vol 9, pagg 714-726, 2012. (1.37 MB)
G. Giacinto e Roli, F., «Dynamic Classifier Selection Based on Multiple Classifier Behaviour», Pattern Recognition, vol 34, pagg 179-181, 2001.
M. Melis, Scalas, M., Demontis, A., Maiorca, D., Biggio, B., Giacinto, G., e Roli, F., «Do Gradient-Based Explanations Tell Anything About Adversarial Robustness to Android Malware?», International Journal of Machine Learning and Cybernetics, vol 13, pagg 217-232, 2022. (1.2 MB)

Pages