default search action
Giorgio Giacinto
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j41]Diego Soi, Alessandro Sanna, Davide Maiorca, Giorgio Giacinto:
Enhancing android malware detection explainability through function call graph APIs. J. Inf. Secur. Appl. 80: 103691 (2024) - [j40]Alessandro Sanna, Fabrizio Cara, Davide Maiorca, Giorgio Giacinto:
Oblivion: an open-source system for large-scale analysis of macro-based office malware. J. Comput. Virol. Hacking Tech. 20(4): 783-802 (2024) - [c97]Emmanuele Massidda, Lorenzo Pisu, Davide Maiorca, Giorgio Giacinto:
Bringing Binary Exploitation at Port 80: Understanding C Vulnerabilities in WebAssembly. SECRYPT 2024: 552-559 - [c96]Lorenzo Binosi, Pietro Mazzini, Alessandro Sanna, Michele Carminati, Giorgio Giacinto, Riccardo Lazzeretti, Stefano Zanero, Mario Polino, Emilio Coppa, Davide Maiorca:
Do You Trust Your Device? Open Challenges in IoT Security Analysis. SECRYPT 2024: 568-575 - [i20]Lorenzo Pisu, Davide Maiorca, Giorgio Giacinto:
A Survey of the Overlooked Dangers of Template Engines. CoRR abs/2405.01118 (2024) - [i19]Silvia Lucia Sanna, Diego Soi, Davide Maiorca, Giorgio Fumera, Giorgio Giacinto:
A Risk Estimation Study of Native Code Vulnerabilities in Android Applications. CoRR abs/2406.02011 (2024) - [i18]Raffaele Mura, Giuseppe Floris, Luca Scionis, Giorgio Piras, Maura Pintor, Ambra Demontis, Giorgio Giacinto, Battista Biggio, Fabio Roli:
HO-FMN: Hyperparameter Optimization for Fast Minimum-Norm Attacks. CoRR abs/2407.08806 (2024) - [i17]Giorgio Piras, Maura Pintor, Ambra Demontis, Battista Biggio, Giorgio Giacinto, Fabio Roli:
Adversarial Pruning: A Survey and Benchmark of Pruning Methods for Adversarial Robustness. CoRR abs/2409.01249 (2024) - 2023
- [j39]Francesco Bergadano, Giorgio Giacinto:
Special Issue "AI for Cybersecurity: Robust Models for Authentication, Threat and Anomaly Detection". Algorithms 16(7): 327 (2023) - [c95]Bruno Pala, Lorenzo Pisu, Silvia Lucia Sanna, Davide Maiorca, Giorgio Giacinto:
A Targeted Assessment of Cross-Site Scripting Detection Tools. ITASEC 2023 - [i16]Diego Soi, Davide Maiorca, Giorgio Giacinto, Harel Berger:
Can you See me? On the Visibility of NOPs against Android Malware Detectors. CoRR abs/2312.17356 (2023) - 2022
- [j38]Marco Melis, Michele Scalas, Ambra Demontis, Davide Maiorca, Battista Biggio, Giorgio Giacinto, Fabio Roli:
Do gradient-based explanations tell anything about adversarial robustness to android malware? Int. J. Mach. Learn. Cybern. 13(1): 217-232 (2022) - [c94]Francesco Meloni, Alessandro Sanna, Davide Maiorca, Giorgio Giacinto:
Extended Abstract: Effective Call Graph Fingerprinting for the Analysis and Classification of Windows Malware. DIMVA 2022: 42-52 - [c93]Luca Borzacchiello, Emilio Coppa, Davide Maiorca, Andrea Columbu, Camil Demetrescu, Giorgio Giacinto:
Reach Me if You Can: On Native Vulnerability Reachability in Android Apps. ESORICS (3) 2022: 701-722 - [c92]Adam Janovsky, Davide Maiorca, Dominik Macko, Vashek Matyas, Giorgio Giacinto:
Explaining the Use of Cryptographic API in Android Malware. ICSBT/SECRYPT (Revised Selected Papers) 2022: 69-97 - [c91]Adam Janovsky, Davide Maiorca, Dominik Macko, Vashek Matyas, Giorgio Giacinto:
A Longitudinal Study of Cryptographic API: A Decade of Android Malware. SECRYPT 2022: 121-133 - [e2]Lorenzo Cavallaro, Daniel Gruss, Giancarlo Pellegrino, Giorgio Giacinto:
Detection of Intrusions and Malware, and Vulnerability Assessment - 19th International Conference, DIMVA 2022, Cagliari, Italy, June 29 - July 1, 2022, Proceedings. Lecture Notes in Computer Science 13358, Springer 2022, ISBN 978-3-031-09483-5 [contents] - [i15]Adam Janovsky, Davide Maiorca, Dominik Macko, Vashek Matyas, Giorgio Giacinto:
A Longitudinal Study of Cryptographic API - a Decade of Android Malware. CoRR abs/2205.05573 (2022) - 2021
- [c90]Giuseppe Mario Malandrone, Giovanni Virdis, Giorgio Giacinto, Davide Maiorca:
PowerDecode: A PowerShell Script Decoder Dedicated to Malware Analysis. ITASEC 2021: 219-232 - 2020
- [j37]Davide Maiorca, Ambra Demontis, Battista Biggio, Fabio Roli, Giorgio Giacinto:
Adversarial Detection of Flash Malware: Limitations and Open Issues. Comput. Secur. 96: 101901 (2020) - [j36]Fabrizio Cara, Michele Scalas, Giorgio Giacinto, Davide Maiorca:
On the Feasibility of Adversarial Sample Creation Using the Android System API. Inf. 11(9): 433 (2020) - [j35]Lorenzo Putzu, Luca Piras, Giorgio Giacinto:
Convolutional neural networks for relevance feedback in content based image retrieval. Multim. Tools Appl. 79(37-38): 26995-27021 (2020) - [c89]Maria Teresa Rossi, Renan Greca, Ludovico Iovino, Giorgio Giacinto, Antonia Bertolino:
Defensive Programming for Smart Home Cybersecurity. EuroS&P Workshops 2020: 600-605 - [c88]Michele Scalas, Konrad Rieck, Giorgio Giacinto:
Explanation-Driven Characterization of Android Ransomware. ICPR Workshops (3) 2020: 228-242 - [i14]Marco Melis, Michele Scalas, Ambra Demontis, Davide Maiorca, Battista Biggio, Giorgio Giacinto, Fabio Roli:
Do Gradient-based Explanations Tell Anything About Adversarial Robustness to Android Malware? CoRR abs/2005.01452 (2020)
2010 – 2019
- 2019
- [j34]Michele Scalas, Davide Maiorca, Francesco Mercaldo, Corrado Aaron Visaggio, Fabio Martinelli, Giorgio Giacinto:
On the effectiveness of system API-related information for Android ransomware detection. Comput. Secur. 86: 168-182 (2019) - [j33]Davide Maiorca, Battista Biggio, Giorgio Giacinto:
Towards Adversarial Malware Detection: Lessons Learned from PDF-based Attacks. ACM Comput. Surv. 52(4): 78:1-78:36 (2019) - [j32]Ambra Demontis, Marco Melis, Battista Biggio, Davide Maiorca, Daniel Arp, Konrad Rieck, Igino Corona, Giorgio Giacinto, Fabio Roli:
Yes, Machine Learning Can Be More Secure! A Case Study on Android Malware Detection. IEEE Trans. Dependable Secur. Comput. 16(4): 711-724 (2019) - [c87]Denis Ugarte, Davide Maiorca, Fabrizio Cara, Giorgio Giacinto:
PowerDrive: Accurate De-obfuscation and Analysis of PowerShell Malware. DIMVA 2019: 240-259 - [e1]Roberto Perdisci, Clémentine Maurice, Giorgio Giacinto, Magnus Almgren:
Detection of Intrusions and Malware, and Vulnerability Assessment - 16th International Conference, DIMVA 2019, Gothenburg, Sweden, June 19-20, 2019, Proceedings. Lecture Notes in Computer Science 11543, Springer 2019, ISBN 978-3-030-22037-2 [contents] - [i13]Denis Ugarte, Davide Maiorca, Fabrizio Cara, Giorgio Giacinto:
PowerDrive: Accurate De-Obfuscation and Analysis of PowerShell Malware. CoRR abs/1904.10270 (2019) - [i12]Michele Scalas, Giorgio Giacinto:
Automotive Cybersecurity: Foundations for Next-Generation Vehicles. CoRR abs/1910.01037 (2019) - 2018
- [c86]Marco Melis, Davide Maiorca, Battista Biggio, Giorgio Giacinto, Fabio Roli:
Explaining Black-box Android Malware Detection. EUSIPCO 2018: 524-528 - [c85]Bojan Kolosnjaji, Ambra Demontis, Battista Biggio, Davide Maiorca, Giorgio Giacinto, Claudia Eckert, Fabio Roli:
Adversarial Malware Binaries: Evading Deep Learning for Malware Detection in Executables. EUSIPCO 2018: 533-537 - [c84]Lorenzo Putzu, Luca Piras, Giorgio Giacinto:
Ten Years of Relevance Score for Content Based Image Retrieval. MLDM (2) 2018: 117-131 - [i11]Mansour Ahmadi, Angelo Sotgiu, Giorgio Giacinto:
IntelliAV: Building an Effective On-Device Android Malware Detector. CoRR abs/1802.01185 (2018) - [i10]Marco Melis, Davide Maiorca, Battista Biggio, Giorgio Giacinto, Fabio Roli:
Explaining Black-box Android Malware Detection. CoRR abs/1803.03544 (2018) - [i9]Bojan Kolosnjaji, Ambra Demontis, Battista Biggio, Davide Maiorca, Giorgio Giacinto, Claudia Eckert, Fabio Roli:
Adversarial Malware Binaries: Evading Deep Learning for Malware Detection in Executables. CoRR abs/1803.04173 (2018) - [i8]Michele Scalas, Davide Maiorca, Francesco Mercaldo, Corrado Aaron Visaggio, Fabio Martinelli, Giorgio Giacinto:
R-PackDroid: Practical On-Device Detection of Android Ransomware. CoRR abs/1805.09563 (2018) - [i7]Davide Maiorca, Battista Biggio, Giorgio Giacinto:
Towards Robust Detection of Adversarial Infection Vectors: Lessons Learned in PDF Malware. CoRR abs/1811.00830 (2018) - [i6]Battista Biggio, Konrad Rieck, Davide Ariu, Christian Wressnegger, Igino Corona, Giorgio Giacinto, Fabio Roli:
Poisoning Behavioral Malware Clustering. CoRR abs/1811.09985 (2018) - 2017
- [j31]Luca Piras, Giorgio Giacinto:
Information fusion in content based image retrieval: A comprehensive overview. Inf. Fusion 37: 50-60 (2017) - [j30]Duc-Tien Dang-Nguyen, Luca Piras, Giorgio Giacinto, Giulia Boato, Francesco G. B. De Natale:
Multimodal Retrieval with Diversification and Relevance Feedback for Tourist Attraction Images. ACM Trans. Multim. Comput. Commun. Appl. 13(4): 49:1-49:24 (2017) - [c83]Paolo Piredda, Davide Ariu, Battista Biggio, Igino Corona, Luca Piras, Giorgio Giacinto, Fabio Roli:
Deepsquatting: Learning-Based Typosquatting Detection at Deeper Domain Levels. AI*IA 2017: 347-358 - [c82]Mansour Ahmadi, Angelo Sotgiu, Giorgio Giacinto:
IntelliAV: Toward the Feasibility of Building Intelligent Anti-malware on Android Devices. CD-MAKE 2017: 137-154 - [c81]Guillermo Suarez-Tangil, Santanu Kumar Dash, Mansour Ahmadi, Johannes Kinder, Giorgio Giacinto, Lorenzo Cavallaro:
DroidSieve: Fast and Accurate Classification of Obfuscated Android Malware. CODASPY 2017: 309-320 - [c80]Davide Maiorca, Paolo Russu, Igino Corona, Battista Biggio, Giorgio Giacinto:
Detection of Malicious Scripting Code Through Discriminant and Adversary-Aware API Analysis. ITASEC 2017: 96-105 - [c79]Ambra Demontis, Battista Biggio, Giorgio Fumera, Giorgio Giacinto, Fabio Roli:
Infinity-Norm Support Vector Machines Against Adversarial Label Contamination. ITASEC 2017: 106-115 - [c78]Davide Maiorca, Francesco Mercaldo, Giorgio Giacinto, Corrado Aaron Visaggio, Fabio Martinelli:
R-PackDroid: API package-based characterization and detection of mobile ransomware. SAC 2017: 1718-1723 - [i5]Ambra Demontis, Marco Melis, Battista Biggio, Davide Maiorca, Daniel Arp, Konrad Rieck, Igino Corona, Giorgio Giacinto, Fabio Roli:
Yes, Machine Learning Can Be More Secure! A Case Study on Android Malware Detection. CoRR abs/1704.08996 (2017) - [i4]Battista Biggio, Igino Corona, Davide Maiorca, Blaine Nelson, Nedim Srndic, Pavel Laskov, Giorgio Giacinto, Fabio Roli:
Evasion Attacks against Machine Learning at Test Time. CoRR abs/1708.06131 (2017) - [i3]Davide Maiorca, Battista Biggio, Maria Elena Chiappe, Giorgio Giacinto:
Adversarial Detection of Flash Malware: Limitations and Open Issues. CoRR abs/1710.10225 (2017) - 2016
- [c77]Mansour Ahmadi, Battista Biggio, Steven Arzt, Davide Ariu, Giorgio Giacinto:
Detecting Misuse of Google Cloud Messaging in Android Badware. SPSM@CCS 2016: 103-112 - [c76]Johannes Hoffmann, Teemu Rytilahti, Davide Maiorca, Marcel Winandy, Giorgio Giacinto, Thorsten Holz:
Evaluating Analysis Tools for Android Apps: Status Quo and Robustness Against Obfuscation. CODASPY 2016: 139-141 - [c75]Mansour Ahmadi, Dmitry Ulyanov, Stanislav Semenov, Mikhail Trofimov, Giorgio Giacinto:
Novel Feature Extraction, Selection and Fusion for Effective Malware Family Classification. CODASPY 2016: 183-194 - [c74]Matteo Contini, Igino Corona, Alessio Mulas, Giorgio Giacinto, Davide Ariu:
Pharmaguard WebApp: An Application for the Detection of Illegal Online Pharmacies. KDWeb 2016 - [c73]David Freeman, Sakshi Jain, Markus Dürmuth, Battista Biggio, Giorgio Giacinto:
Who Are You? A Statistical Approach to Measuring User Authenticity. NDSS 2016 - 2015
- [j29]Davide Maiorca, Davide Ariu, Igino Corona, Marco Aresu, Giorgio Giacinto:
Stealth attacks: An extended insight into the obfuscation effects on Android malware. Comput. Secur. 51: 16-31 (2015) - [j28]Davide Ariu, Igino Corona, Roberto Tronci, Giorgio Giacinto:
Machine Learning in Security Applications. Trans. Mach. Learn. Data Min. 8(1): 3-39 (2015) - [j27]Giorgio Giacinto:
Editorial. Trans. Mach. Learn. Data Min. 8(2): 59-60 (2015) - [j26]Masoud Narouei, Mansour Ahmadi, Giorgio Giacinto, Hassan Takabi, Ashkan Sami:
DLLMiner: structural mining for malware detection. Secur. Commun. Networks 8(18): 3311-3322 (2015) - [c72]Jart Armin, Bryn Thompson, Davide Ariu, Giorgio Giacinto, Fabio Roli, Piotr Kijewski:
2020 Cybercrime Economic Costs: No Measure No Solution. ARES 2015: 701-710 - [c71]Davide Ariu, Luca Didaci, Giorgio Fumera, Enrico Frumento, Federica Freschi, Giorgio Giacinto, Fabio Roli:
Yet Another Cybersecurity Roadmapping Methodology. ARES 2015: 719-726 - [c70]Thomas Hupperich, Davide Maiorca, Marc Kührer, Thorsten Holz, Giorgio Giacinto:
On the Robustness of Mobile Device Fingerprinting: Can Mobile Users Escape Modern Web-Tracking Mechanisms? ACSAC 2015: 191-200 - [c69]Igino Corona, Matteo Contini, Davide Ariu, Giorgio Giacinto, Fabio Roli, Michael Lund, Giorgio Marinelli:
PharmaGuard: Automatic identification of illegal search-indexed online pharmacies. CYBCONF 2015: 324-329 - [c68]Marco Melis, Luca Piras, Battista Biggio, Giorgio Giacinto, Giorgio Fumera, Fabio Roli:
Fast Image Classification with Reduced Multiclass Support Vector Machines. ICIAP (2) 2015: 78-88 - [c67]Davide Maiorca, Davide Ariu, Igino Corona, Giorgio Giacinto:
A Structural and Content-based Approach for a Precise and Robust Detection of Malicious PDF Files. ICISSP 2015: 27-36 - [c66]Davide Maiorca, Davide Ariu, Igino Corona, Giorgio Giacinto:
An Evasion Resilient Approach to the Detection of Malicious PDF Files. ICISSP (Revised Selected Papers) 2015: 68-85 - [c65]Duc-Tien Dang-Nguyen, Luca Piras, Giorgio Giacinto, Giulia Boato, Francesco G. B. De Natale:
A hybrid approach for retrieving diverse social images of landmarks. ICME 2015: 1-6 - [c64]Luca Piras, Deiv Furcas, Giorgio Giacinto:
User-driven Nearest Neighbour Exploration of Image Archives. ICPRAM (1) 2015: 181-189 - [c63]Marco Aresu, Davide Ariu, Mansour Ahmadi, Davide Maiorca, Giorgio Giacinto:
Clustering android malware families by http traffic. MALWARE 2015: 128-135 - [c62]Battista Biggio, Igino Corona, Zhi-Min He, Patrick P. K. Chan, Giorgio Giacinto, Daniel S. Yeung, Fabio Roli:
One-and-a-Half-Class Multiple Classifier Systems for Secure Learning Against Evasion Attacks at Test Time. MCS 2015: 168-180 - [c61]Duc-Tien Dang-Nguyen, Giulia Boato, Francesco G. B. De Natale, Luca Piras, Giorgio Giacinto, Franco Tuveri, Manuela Angioni:
Multimodal-based Diversified Summarization in Social Image Retrieval. MediaEval 2015 - [i2]Mansour Ahmadi, Giorgio Giacinto, Dmitry Ulyanov, Stanislav Semenov, Mikhail Trofimov:
Novel feature extraction, selection and fusion for effective malware family classification. CoRR abs/1511.04317 (2015) - 2014
- [c60]Battista Biggio, Konrad Rieck, Davide Ariu, Christian Wressnegger, Igino Corona, Giorgio Giacinto, Fabio Roli:
Poisoning behavioral malware clustering. AISec@CCS 2014: 27-36 - [c59]Igino Corona, Davide Maiorca, Davide Ariu, Giorgio Giacinto:
Lux0R: Detection of Malicious PDF-embedded JavaScript code through Discriminant Analysis of API References. AISec@CCS 2014: 47-57 - [c58]Duc-Tien Dang-Nguyen, Luca Piras, Giorgio Giacinto, Giulia Boato, Francesco G. B. De Natale:
Retrieval of Diverse Images by Pre-filtering and Hierarchical Clustering. MediaEval 2014 - [c57]Luca Piras, Giorgio Giacinto:
Open Issues on Codebook Generation in Image Classification Tasks. MLDM 2014: 328-342 - [i1]Battista Biggio, Igino Corona, Blaine Nelson, Benjamin I. P. Rubinstein, Davide Maiorca, Giorgio Fumera, Giorgio Giacinto, Fabio Roli:
Security Evaluation of Support Vector Machines in Adversarial Environments. CoRR abs/1401.7727 (2014) - 2013
- [j25]Roberto Perdisci, Davide Ariu, Giorgio Giacinto:
Scalable fine-grained behavioral clustering of HTTP-based malware. Comput. Networks 57(2): 487-500 (2013) - [j24]Igino Corona, Giorgio Giacinto, Fabio Roli:
Adversarial attacks against intrusion detection systems: Taxonomy, solutions and open issues. Inf. Sci. 239: 201-225 (2013) - [c56]Davide Maiorca, Igino Corona, Giorgio Giacinto:
Looking at the bag is not enough to find the bomb: an evasion of structural methods for malicious PDF files detection. AsiaCCS 2013: 119-130 - [c55]Luca Piras, Roberto Tronci, Giorgio Giacinto:
Diversity in Ensembles of Codebooks for Visual Concept Detection. ICIAP (2) 2013: 399-408 - [c54]Luca Piras, Giorgio Giacinto, Roberto Paredes:
Passive-aggressive Online Learning for Relevance Feedback in Content based Image Retrieval. ICPRAM 2013: 182-187 - [c53]Battista Biggio, Igino Corona, Davide Maiorca, Blaine Nelson, Nedim Srndic, Pavel Laskov, Giorgio Giacinto, Fabio Roli:
Evasion Attacks against Machine Learning at Test Time. ECML/PKDD (3) 2013: 387-402 - 2012
- [j23]Roberto Tronci, Luca Piras, Giorgio Giacinto:
Performance Evaluation of Relevance Feedback for Image Retrieval by "Real-World" Multi-Tagged Image Datasets. Int. J. Multim. Data Eng. Manag. 3(1): 1-16 (2012) - [j22]Luca Piras, Giorgio Giacinto:
Synthetic pattern generation for imbalanced learning in image retrieval. Pattern Recognit. Lett. 33(16): 2198-2205 (2012) - [j21]Roberto Perdisci, Igino Corona, Giorgio Giacinto:
Early Detection of Malicious Flux Networks via Large-Scale Passive DNS Traffic Analysis. IEEE Trans. Dependable Secur. Comput. 9(5): 714-726 (2012) - [c52]Luca Piras, Roberto Tronci, Gabriele Murgia, Giorgio Giacinto:
The PRA and AmILAB at ImageCLEF 2012 Photo Flickr Annotation Task. CLEF (Online Working Notes/Labs/Workshop) 2012 - [c51]Roberto Tronci, Luca Piras, Gabriele Murgia, Giorgio Giacinto:
Image Hunter at ImageCLEF 2012 Personal Photo Retrieval Task. CLEF (Online Working Notes/Labs/Workshop) 2012 - [c50]Igino Corona, Roberto Tronci, Giorgio Giacinto:
SuStorID: A multiple classifier system for the protection of web services. ICPR 2012: 2375-2378 - [c49]Luca Piras, Giorgio Giacinto, Roberto Paredes:
Enhancing Image Retrieval by an Exploration-Exploitation Approach. MLDM 2012: 355-365 - [c48]Davide Maiorca, Giorgio Giacinto, Igino Corona:
A Pattern Recognition System for Malicious PDF Files Detection. MLDM 2012: 510-524 - 2011
- [j20]Davide Ariu, Roberto Tronci, Giorgio Giacinto:
HMMPayl: An intrusion detection system based on Hidden Markov Models. Comput. Secur. 30(4): 221-241 (2011) - [j19]Giorgio Giacinto, Belur V. Dasarathy:
Machine learning for computer security: A guide to prospective authors. Inf. Fusion 12(3): 238-239 (2011) - [j18]Giorgio Giacinto:
Moving Targets in Computer Security and Multimedia Retrieval. Trans. Mach. Learn. Data Min. 4(1): 30-52 (2011) - [c47]Roberto Tronci, Gabriele Murgia, Maurizio Pili, Luca Piras, Giorgio Giacinto:
ImageHunter: a Novel Tool for Relevance Feedback in Content Based Image Retrieval. DART@AI*IA 2011 - [c46]Roberto Tronci, Gabriele Murgia, Maurizio Pili, Luca Piras, Giorgio Giacinto:
ImageHunter: A Novel Tool for Relevance Feedback in Content Based Image Retrieval. DART@AI*IA (Revised and Invited Papers) 2011: 53-70 - [c45]Davide Ariu, Giorgio Giacinto, Fabio Roli:
Machine learning in computer forensics (and the lessons learned from machine learning in computer security). AISec 2011: 99-104 - [c44]Luca Piras, Giorgio Giacinto:
Dissimilarity Representation in Multi-feature Spaces for Image Retrieval. ICIAP (1) 2011: 139-148 - [c43]Roberto Tronci, Luisa Falqui, Luca Piras, Giorgio Giacinto:
A Study on the Evaluation of Relevance Feedback in Multi-tagged Image Datasets. ISM 2011: 452-457 - [c42]Davide Ariu, Giorgio Giacinto:
A Modular Architecture for the Analysis of HTTP Payloads Based on Multiple Classifiers. MCS 2011: 330-339 - [c41]Battista Biggio, Igino Corona, Giorgio Fumera, Giorgio Giacinto, Fabio Roli:
Bagging Classifiers for Fighting Poisoning Attacks in Adversarial Classification Tasks. MCS 2011: 350-359 - 2010
- [j17]Attilio Gambardella, Giorgio Giacinto, Maurizio Migliaccio, Andrea Montali:
One-class classification for oil spill detection. Pattern Anal. Appl. 13(3): 349-366 (2010) - [c40]Luca Piras, Giorgio Giacinto:
Unbalanced learning in content-based image classification and retrieval. ICME 2010: 36-41 - [c39]Carlo Lobrano, Roberto Tronci, Giorgio Giacinto, Fabio Roli:
A Score Decidability Index for Dynamic Score Combination. ICPR 2010: 69-72 - [c38]Giorgio Giacinto:
Moving Targets. ICDM 2010: 1-16 - [c37]Carlo Lobrano, Roberto Tronci, Giorgio Giacinto, Fabio Roli:
Dynamic Linear Combination of Two-Class Classifiers. SSPR/SPR 2010: 473-482 - [c36]Luca Piras, Giorgio Giacinto:
K-Nearest Neighbors directed synthetic images injection. WIAMIS 2010: 1-4 - [c35]Davide Ariu, Giorgio Giacinto:
HMMPayl: an application of HMM to the analysis of the HTTP Payload. WAPA 2010: 81-87 - [c34]Igino Corona, Giorgio Giacinto:
Detection of Server-side Web Attacks. WAPA 2010: 160-166
2000 – 2009
- 2009
- [j16]Roberto Perdisci, Davide Ariu, Prahlad Fogla, Giorgio Giacinto, Wenke Lee:
McPAD: A multiple classifier system for accurate payload-based anomaly detection. Comput. Networks 53(6): 864-881 (2009) - [j15]Roberto Tronci, Giorgio Giacinto, Fabio Roli:
Designing multiple biometric systems: Measures of ensemble effectiveness. Eng. Appl. Artif. Intell. 22(1): 66-78 (2009) - [j14]Giorgio Giacinto, Fabio Roli, Carlo Sansone:
Information fusion in computer security. Inf. Fusion 10(4): 272-273 (2009) - [j13]Igino Corona, Giorgio Giacinto, Claudio Mazzariello, Fabio Roli, Carlo Sansone:
Information fusion for computer security: State of the art and open issues. Inf. Fusion 10(4): 274-284 (2009) - [c33]Igino Corona, Davide Ariu, Giorgio Giacinto:
HMM-Web: A Framework for the Detection of Attacks Against Web Applications. ICC 2009: 1-6 - [c32]Roberto Tronci, Giorgio Giacinto, Fabio Roli:
Dynamic Score Combination: A Supervised and Unsupervised Score Combination Method. MLDM 2009: 163-177 - [c31]Luca Piras, Giorgio Giacinto:
Neighborhood-based feature weighting for relevance feedback in content-based retrieval. WIAMIS 2009: 238-241 - 2008
- [j12]Giorgio Giacinto, Roberto Perdisci, Mauro Del Rio, Fabio Roli:
Intrusion detection in computer networks by a modular ensemble of one-class classifiers. Inf. Fusion 9(1): 69-82 (2008) - [c30]Roberto Tronci, Giorgio Giacinto, Fabio Roli:
Dynamic score combination of binary experts. ICPR 2008: 1-4 - [c29]Attilio Gambardella, Giorgio Giacinto, Maurizio Migliaccio:
On the Mathematical Formulation of the SAR Oil-Spill Observation Problem. IGARSS (3) 2008: 1382-1385 - [c28]Roberto Tronci, Giorgio Giacinto, Fabio Roli:
Combination of Experts by Classifiers in Similarity Score Spaces. SSPR/SPR 2008: 821-830 - [p1]Giorgio Giacinto, Fabio Roli:
Instance-Based Relevance Feedback in Image Retrieval Using Dissimilarity Spaces. Case-Based Reasoning on Images and Signals 2008: 419-436 - 2007
- [c27]Giorgio Giacinto:
A nearest-neighbor approach to relevance feedback in content based image retrieval. CIVR 2007: 456-463 - [c26]Roberto Tronci, Giorgio Giacinto, Fabio Roli:
Dynamic Score Selection for Fusion of Multiple Biometric Matchers. ICIAP 2007: 15-22 - [c25]Roberto Tronci, Giorgio Giacinto, Fabio Roli:
Index Driven Combination of Multiple Biometric Experts for AUC Maximisation. MCS 2007: 357-366 - [c24]Davide Ariu, Giorgio Giacinto, Roberto Perdisci:
Sensing Attacks in Computers Networks with Hidden Markov Models. MLDM 2007: 449-463 - [c23]Roberto Tronci, Giorgio Giacinto, Fabio Roli:
Selection of Experts for the Design of Multiple Biometric Systems. MLDM 2007: 795-809 - 2006
- [j11]Roberto Perdisci, Giorgio Giacinto, Fabio Roli:
Alarm clustering for intrusion detection systems in computer networks. Eng. Appl. Artif. Intell. 19(4): 429-438 (2006) - 2005
- [j10]Luca Didaci, Giorgio Giacinto, Fabio Roli, Gian Luca Marcialis:
A study on the performances of dynamic classifier selection based on local accuracy estimation. Pattern Recognit. 38(11): 2188-2191 (2005) - [c22]Giorgio Giacinto, Roberto Perdisci, Fabio Roli:
Network Intrusion Detection by Combining One-Class Classifiers. ICIAP 2005: 58-65 - [c21]Giorgio Giacinto, Fabio Roli, Roberto Tronci:
Score Selection Techniques for Fingerprint Multi-modal Biometric Authentication. ICIAP 2005: 1018-1025 - [c20]Giorgio Giacinto, Roberto Perdisci, Fabio Roli:
Alarm Clustering for Intrusion Detection Systems in Computer Networks. MLDM 2005: 184-193 - 2004
- [j9]Giorgio Giacinto, Fabio Roli:
Bayesian relevance feedback for content-based image retrieval. Pattern Recognit. 37(7): 1499-1508 (2004) - [c19]Giorgio Giacinto, Fabio Roli:
Nearest-Prototype Relevance Feedback for Content Based Image Retrieval. ICPR (2) 2004: 989-992 - [c18]Luca Didaci, Giorgio Giacinto:
Dynamic Classifier Selection by Adaptive k-Nearest-Neighbourhood Rule. Multiple Classifier Systems 2004: 174-183 - [c17]Giorgio Giacinto, Fabio Roli:
Instance-Based Relevance Feedback for Image Retrieval. NIPS 2004: 489-496 - 2003
- [j8]Giorgio Giacinto, Fabio Roli, Luca Didaci:
Fusion of multiple classifiers for intrusion detection in computer networks. Pattern Recognit. Lett. 24(12): 1795-1803 (2003) - [c16]Giorgio Giacinto, Fabio Roli, Luca Didaci:
A Modular Multiple Classifier System for the Detection of Intrusions in Computer Networks. Multiple Classifier Systems 2003: 346-355 - [c15]Giorgio Giacinto, Fabio Roli:
Dissimilarity Representation of Images for Relevance Feedback in Content-Based Image Retrieval. MLDM 2003: 202-214 - 2002
- [c14]Giorgio Giacinto, Fabio Roli:
Intrusion Detection in Computer Networks by Multiple Classifier Systems. ICPR (2) 2002: 390-393 - [c13]Giorgio Giacinto, Fabio Roli:
Query Shifting Based on Bayesian Decision Theory for Content-Based Image Retrieval. SSPR/SPR 2002: 607-616 - 2001
- [j7]Giorgio Giacinto, Fabio Roli:
Design of effective neural network ensembles for image classification purposes. Image Vis. Comput. 19(9-10): 699-707 (2001) - [j6]Giorgio Giacinto, Fabio Roli:
Dynamic classifier selection based on multiple classifier behaviour. Pattern Recognit. 34(9): 1879-1881 (2001) - [j5]Giorgio Giacinto, Fabio Roli:
An approach to the automatic design of multiple classifier systems. Pattern Recognit. Lett. 22(1): 25-33 (2001) - [c12]Fabio Roli, Giorgio Giacinto, Gianni Vernazza:
Methods for Designing Multiple Classifier Systems. Multiple Classifier Systems 2001: 78-87 - [c11]Giorgio Giacinto, Fabio Roli, Giorgio Fumera:
Adaptive Query Shifting for Content-Based Image Retrieval. MLDM 2001: 337-346 - 2000
- [j4]Giorgio Fumera, Fabio Roli, Giorgio Giacinto:
Reject option with multiple thresholds. Pattern Recognit. 33(12): 2099-2101 (2000) - [j3]Giorgio Giacinto, Fabio Roli, Lorenzo Bruzzone:
Combination of neural and statistical algorithms for supervised classification of remote-sensing image. Pattern Recognit. Lett. 21(5): 385-397 (2000) - [c10]Giorgio Giacinto, Fabio Roli:
A Theoretical Framework for Dynamic Classifier Selection. ICPR 2000: 2008-2011 - [c9]Giorgio Giacinto, Fabio Roli, Giorgio Fumera:
Design of Effective Multiple Classifier Systems by Clustering of Classifiers. ICPR 2000: 2160-2163 - [c8]Giorgio Giacinto, Fabio Roli, Giorgio Fumera:
Unsupervised Learning of Neural Network Ensembles for Image Classification. IJCNN (3) 2000: 155-162 - [c7]Giorgio Giacinto, Fabio Roli:
Dynamic Classifier Selection. Multiple Classifier Systems 2000: 177-189 - [c6]Giorgio Giacinto, Fabio Roli, Giorgio Fumera:
Selection of Classifiers Based on Multiple Classifier Behaviour. SSPR/SPR 2000: 87-93 - [c5]Giorgio Fumera, Fabio Roli, Giorgio Giacinto:
Multiple Reject Thresholds for Improving Classification Reliability. SSPR/SPR 2000: 863-871
1990 – 1999
- 1999
- [c4]Giorgio Giacinto, Fabio Roli:
Methods for Dynamic Classifier Selection. ICIAP 1999: 659-664 - [c3]Giorgio Giacinto, Fabio Roli:
Automatic Design of Multiple Classifier Systems by Unsupervised Learning. MLDM 1999: 131-143 - 1998
- [j2]Eugenio Costamagna, Alessandra Fanni, Giorgio Giacinto:
A Tabu Search algorithm for the optimisation of telecommunication networks. Eur. J. Oper. Res. 106(2-3): 357-372 (1998) - 1997
- [j1]Giorgio Giacinto, R. Paolucci, Fabio Roli:
Application of neural networks and statistical pattern recognition algorithms to earthquake risk evaluation. Pattern Recognit. Lett. 18(11-13): 1353-1362 (1997) - [c2]Giorgio Giacinto, Fabio Roli:
Adaptive Selection of Image Classifiers. ICIAP (1) 1997: 38-45 - [c1]Jim Austin, Giorgio Giacinto, I. Kanellopoulos, Ken Lees, Fabio Roli, Gianni Vernazza, G. Wilkinson:
The COMPARES Project: COnnectionist Methods for Preprocessing and Analysis of REmote Sensing Data. ICIAP (2) 1997: 765-772
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-11-07 21:31 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint