Publications

Export 140 results:
Filters: Author is Giorgio Giacinto  [Clear All Filters]
A B C D E F G H I J K L M N O P Q R S T U V W X Y Z 
I
R. Tronci, Giacinto, G., e Roli, F., «Index Driven Combination of Multiple Biometric Experts for AUC Maximisation», in 7th International Workshop on Multiple Classifiers Systems MCS 2007, Prague (Czech Republic), 2007, vol 4472, pagg 357-366.
R. Tronci, Murgia, G., Pili, M., Piras, L., e Giacinto, G., «ImageHunter: a novel tool for Relevance Feedback in Content Based Image Retrieval», in 5th International Workshop on New Challenges in Distributed Information Filtering and Retrieval (DART), Palermo, Italy, 2011. (1.31 MB)
R. Tronci, Murgia, G., Pili, M., Piras, L., e Giacinto, G., «ImageHunter: a Novel Tool for Relevance Feedback in Content Based Image Retrieval», in New Challenges in Distributed Information Filtering and Retrieval. DART 2011: Revised and Invited Papers, C. Lai, Semeraro, G., e Vargiu, E. Springer, 2013. (1.98 MB)
R. Tronci, Piras, L., Murgia, G., e Giacinto, G., «Image Hunter at ImageCLEF 2012 Personal Photo Retrieval Task», in CLEF (Online Working Notes/Labs/Workshop), Rome, 2012. (2.78 MB)
H
D. - T. Dang-Nguyen, Piras, L., Giacinto, G., Boato, G., e De Natale, F. G. B., «A Hybrid Approach for Retrieving Diverse Social Images of Landmarks», in IEEE International Conference on Multimedia & Expo (ICME), Torino, 2015. (1.16 MB)
I. Corona, Ariu, D., e Giacinto, G., «HMM-Web: a framework for the detection of attacks against Web applications», in IEEE ICC 2009, Dresden, Germany, 2009. (391.14 KB)
D. Ariu, Tronci, R., e Giacinto, G., «HMMpayl: An Intrusion Detection System Based On Hidden Markov Models», Computers & Security, vol 30, pagg 221 - 241, 2011. (1.88 MB)
D. Ariu e Giacinto, G., «HMMPayl: an application of HMM to the analysis of the HTTP Payload», in Workshop on Applications of Pattern Analysis, 2010. (273.18 KB)
F
G. Giacinto, Roli, F., e Didaci, L., «Fusion of multiple classifiers for intrusion detection in computer networks», Pattern Recognition Letters, vol 24, pagg 1795-1803, 2003.
F. Cara, Scalas, M., Giacinto, G., e Maiorca, D., «On the Feasibility of Adversarial Sample Creation Using the Android System API», Information, n° 11(9): 433, 2020. (1.26 MB)
M. Melis, Piras, L., Biggio, B., Giacinto, G., Fumera, G., e Roli, F., «Fast Image Classification with Reduced Multiclass Support Vector Machines», in 18th Int'l Conf. on Image Analysis and Processing, Genova, Italy, 2015, vol Image Analysis and Processing (ICIAP 2015), pagg 78-88. (829.37 KB)
E
F. Meloni, Sanna, A., Maiorca, D., e Giacinto, G., «Extended Abstract: Effective Call Graph Fingerprinting for the Analysis and Classification of Windows Malware», 19th Conference on Detection of Intrusions and Malware & Vulnerability Assessment (DIMVA). pagg 42-52, 2022. (328.32 KB)
M. Melis, Maiorca, D., Biggio, B., Giacinto, G., e Roli, F., «Explaining Black-box Android Malware Detection», in 26th European Signal Processing Conference (EUSIPCO '18), Rome, Italy, 2018, pagg 524-528. (431.78 KB)
D. Maiorca, Ariu, D., Corona, I., e Giacinto, G., «An Evasion Resilient Approach to the Detection of Malicious PDF Files», in Information Systems Security and Privacy (Communication in Computer and Information Science), vol 576, Springer, 2015, pagg 68-85. (503.11 KB)
B. Biggio, Corona, I., Maiorca, D., Nelson, B., Srndic, N., Laskov, P., Giacinto, G., e Roli, F., «Evasion attacks against machine learning at test time», in European Conference on Machine Learning and Principles and Practice of Knowledge Discovery in Databases (ECML PKDD), 2013, vol 8190, pagg 387-402. (473.78 KB)
J. Hoffmann, Rytilahti, T., Maiorca, D., Winandy, M., Giacinto, G., e Holz, T., «Evaluating Analysis Tools for Android Apps: Status Quo and Robustness against Obfuscation», Proceedings of the 6th ACM Conference on Data and Application Security and Privacy (CODASPY 2016, 09-11 March, 2016). 2016. (726.65 KB)
J. Hoffmann, Rytilahti, T., Maiorca, D., Winandy, M., Giacinto, G., e Holz, T., «Evaluating Analysis Tools for Android Apps: Status Quo and Robustness Against Obfuscation», Horst Görtz Institut for IT Security (Ruhr-University Bochum), Technical Report TR-HGI-2016-003, 2016. (519.16 KB)
G. Giacinto e Roli, F., «Ensembles of Neural Networks for Soft Classification of Remote Sensing Images», in European Symposium on Intelligent Techniques, Bari, Italy, 1997, pagg 166-170.
L. Didaci, Giacinto, G., e Roli, F., «Ensemble Learning for Intrusion Detection in Computer Networks», in AI*IA, Workshop on "Apprendimento automatico: metodi e applicazioni", Siena, Italy, 2002.
L. Piras, Giacinto, G., e Paredes, R., «Enhancing image retrieval by an Exploration-Exploitation approach», in 8th International Conference Machine Learning and Data Mining (MLDM), Berlin, 2012, vol 7376, pagg 355-365. (307.57 KB)
M. Scalas, Maiorca, D., Mercaldo, F., Visaggio, C. Aaron, Martinelli, F., e Giacinto, G., «On the Effectiveness of System API-Related Information for Android Ransomware Detection», Computers and Security, vol 86, pagg 162-182, 2019. (706.92 KB)
R. Perdisci, Corona, I., e Giacinto, G., «Early Detection of Malicious Flux Networks via Large-Scale Passive DNS Traffic Analysis», IEEE Transactions on Dependable and Secure Computing, vol 9, pagg 714-726, 2012. (1.37 MB)
D
R. Tronci, Giacinto, G., e Roli, F., «Dynamic Score Selection for Fusion of Multiple Biometric Matchers», in 14th IEEE International Conference on Image Analysis and Processing ICIAP 2007, Modena, Italy, 2007, pagg 15-20.
R. Tronci, Giacinto, G., e Roli, F., «Dynamic score combination of binary experts», in 19th International Conference on Pattern Recognition (ICPR 2008), Tampa (Florida, USA), 2008.
R. Tronci, Giacinto, G., e Roli, F., «Dynamic Score Combination: A Supervised and Unsupervised Score Combination Method», in Machine Learning and Data Mining in Pattern Recognition (MLDM 2009), Leipzig, Germany, 2009, vol 5632, pagg 163-177.

Pages