Publications

Export 141 results:
Filters: Author is Giorgio Giacinto  [Clear All Filters]
Journal Article
G. Giacinto, Perdisci, R., Del Rio, M., e Roli, F., «Intrusion detection in computer networks by a modular ensemble of one-class classifiers», Information Fusion, vol 9, 2008.
D. Ariu, Corona, I., Tronci, R., e Giacinto, G., «Machine Learning in Security Applications», Trans. Mach. Learn. Data Min., vol 8, pagg 3-39, 2015.
R. Perdisci, Ariu, D., Fogla, P., Giacinto, G., e Lee, W., «McPAD: A Multiple Classifier System for Accurate Payload-based Anomaly Detection», Computer Networks, vol 53, pagg 864-881, 2009. (882.94 KB)
A. Gambardella, Giacinto, G., Migliaccio, M., e Montali, A., «One-class classification for oil spill detection», Pattern Analysis and Applications, 2009.
R. Tronci, Piras, L., e Giacinto, G., «Performance Evaluation of Relevance Feedback for Image Retrieval by “Real-World” Multi-Tagged Image Datasets», International Journal of Multimedia Data Engineering and Management (IJMDEM), vol 3, pag 16, 2012. (357.99 KB)
G. Fumera, Roli, F., e Giacinto, G., «Reject Option with Multiple Thresholds», Pattern Recognition, vol 33, pagg 2099-2101, 2000.
R. Perdisci, Ariu, D., e Giacinto, G., «Scalable Fine-Grained Behavioral Clustering of HTTP-Based Malware», Computer Networks - Special Issue on Botnet Activity: Analysis, Detection and Shutdown, vol 57, pagg 487-500, 2013. (797.8 KB)
G. Giacinto, Roli, F., e Fumera, G., «Selection of image classifiers», Electronics Letters, vol 36, pagg 420-422, 2000.
D. Maiorca, Ariu, D., Corona, I., Aresu, M., e Giacinto, G., «Stealth Attacks: An Extended Insight into the Obfuscation Effects on Android Malware», Computers And Security (Elsevier), vol 51 (June), pagg 16-31, 2015. (413.99 KB)
L. Didaci, Giacinto, G., Roli, F., e Marcialis, G. L., «A study on the performances of Dynamic Classifier Selection based on Local Accuracy Estimation», Pattern Recognition, vol 38, pagg 2188-2191, 2005.
L. Piras e Giacinto, G., «Synthetic Pattern Generation for Imbalanced Learning in Image Retrieval», Pattern Recognition Letters, vol 33, pag 7, 2012. (236.64 KB)
E. Costamagna, Fanni, A., e Giacinto, G., «A Tabu Search algorithm for the optimisation of telecommunication networks», European Journal of Operational Research, vol 106, pagg 357-372, 1998.
A. Fanni, Giacinto, G., Marchesi, M., e Serri, A., «Tabu search coupled with deterministic strategies for the optimal design of MRI devices», Int. J. of Applied Electromagnetics and Mechanics, vol 10, pagg 21-31, 1999.
D. Maiorca, Biggio, B., e Giacinto, G., «Towards Adversarial Malware Detection: Lessons Learned from PDF-based Attacks», ACM Computing Surveys, vol 52, n° 4, 2019. (1.21 MB)
A. Demontis, Melis, M., Biggio, B., Maiorca, D., Arp, D., Rieck, K., Corona, I., Giacinto, G., e Roli, F., «Yes, Machine Learning Can Be More Secure! A Case Study on Android Malware Detection», IEEE Trans. Dependable and Secure Computing, vol 16, n° 4, pagg 711-724, 2019. (3.61 MB)
Report
J. Hoffmann, Rytilahti, T., Maiorca, D., Winandy, M., Giacinto, G., e Holz, T., «Evaluating Analysis Tools for Android Apps: Status Quo and Robustness Against Obfuscation», Horst Görtz Institut for IT Security (Ruhr-University Bochum), Technical Report TR-HGI-2016-003, 2016. (519.16 KB)

Pages