default search action
Giorgio Giacinto
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
showing all ?? records
2020 – today
- 2025
- [j42]Raffaele Mura, Giuseppe Floris, Luca Scionis, Giorgio Piras, Maura Pintor, Ambra Demontis, Giorgio Giacinto, Battista Biggio, Fabio Roli:
HO-FMN: Hyperparameter optimization for fast minimum-norm attacks. Neurocomputing 616: 128918 (2025) - 2024
- [j41]Diego Soi, Alessandro Sanna, Davide Maiorca, Giorgio Giacinto:
Enhancing android malware detection explainability through function call graph APIs. J. Inf. Secur. Appl. 80: 103691 (2024) - [j40]Alessandro Sanna, Fabrizio Cara, Davide Maiorca, Giorgio Giacinto:
Oblivion: an open-source system for large-scale analysis of macro-based office malware. J. Comput. Virol. Hacking Tech. 20(4): 783-802 (2024) - [c97]Emmanuele Massidda, Lorenzo Pisu, Davide Maiorca, Giorgio Giacinto:
Bringing Binary Exploitation at Port 80: Understanding C Vulnerabilities in WebAssembly. SECRYPT 2024: 552-559 - [c96]Lorenzo Binosi, Pietro Mazzini, Alessandro Sanna, Michele Carminati, Giorgio Giacinto, Riccardo Lazzeretti, Stefano Zanero, Mario Polino, Emilio Coppa, Davide Maiorca:
Do You Trust Your Device? Open Challenges in IoT Security Analysis. SECRYPT 2024: 568-575 - [i20]Lorenzo Pisu, Davide Maiorca, Giorgio Giacinto:
A Survey of the Overlooked Dangers of Template Engines. CoRR abs/2405.01118 (2024) - [i19]Silvia Lucia Sanna, Diego Soi, Davide Maiorca, Giorgio Fumera, Giorgio Giacinto:
A Risk Estimation Study of Native Code Vulnerabilities in Android Applications. CoRR abs/2406.02011 (2024) - [i18]Raffaele Mura, Giuseppe Floris, Luca Scionis, Giorgio Piras, Maura Pintor, Ambra Demontis, Giorgio Giacinto, Battista Biggio, Fabio Roli:
HO-FMN: Hyperparameter Optimization for Fast Minimum-Norm Attacks. CoRR abs/2407.08806 (2024) - [i17]Giorgio Piras, Maura Pintor, Ambra Demontis, Battista Biggio, Giorgio Giacinto, Fabio Roli:
Adversarial Pruning: A Survey and Benchmark of Pruning Methods for Adversarial Robustness. CoRR abs/2409.01249 (2024) - 2023
- [j39]Francesco Bergadano, Giorgio Giacinto:
Special Issue "AI for Cybersecurity: Robust Models for Authentication, Threat and Anomaly Detection". Algorithms 16(7): 327 (2023) - [c95]Bruno Pala, Lorenzo Pisu, Silvia Lucia Sanna, Davide Maiorca, Giorgio Giacinto:
A Targeted Assessment of Cross-Site Scripting Detection Tools. ITASEC 2023 - [i16]Diego Soi, Davide Maiorca, Giorgio Giacinto, Harel Berger:
Can you See me? On the Visibility of NOPs against Android Malware Detectors. CoRR abs/2312.17356 (2023) - 2022
- [j38]Marco Melis, Michele Scalas, Ambra Demontis, Davide Maiorca, Battista Biggio, Giorgio Giacinto, Fabio Roli:
Do gradient-based explanations tell anything about adversarial robustness to android malware? Int. J. Mach. Learn. Cybern. 13(1): 217-232 (2022) - [c94]Francesco Meloni, Alessandro Sanna, Davide Maiorca, Giorgio Giacinto:
Extended Abstract: Effective Call Graph Fingerprinting for the Analysis and Classification of Windows Malware. DIMVA 2022: 42-52 - [c93]Luca Borzacchiello, Emilio Coppa, Davide Maiorca, Andrea Columbu, Camil Demetrescu, Giorgio Giacinto:
Reach Me if You Can: On Native Vulnerability Reachability in Android Apps. ESORICS (3) 2022: 701-722 - [c92]Adam Janovsky, Davide Maiorca, Dominik Macko, Vashek Matyas, Giorgio Giacinto:
Explaining the Use of Cryptographic API in Android Malware. ICSBT/SECRYPT (Revised Selected Papers) 2022: 69-97 - [c91]Adam Janovsky, Davide Maiorca, Dominik Macko, Vashek Matyas, Giorgio Giacinto:
A Longitudinal Study of Cryptographic API: A Decade of Android Malware. SECRYPT 2022: 121-133 - [e2]Lorenzo Cavallaro, Daniel Gruss, Giancarlo Pellegrino, Giorgio Giacinto:
Detection of Intrusions and Malware, and Vulnerability Assessment - 19th International Conference, DIMVA 2022, Cagliari, Italy, June 29 - July 1, 2022, Proceedings. Lecture Notes in Computer Science 13358, Springer 2022, ISBN 978-3-031-09483-5 [contents] - [i15]Adam Janovsky, Davide Maiorca, Dominik Macko, Vashek Matyas, Giorgio Giacinto:
A Longitudinal Study of Cryptographic API - a Decade of Android Malware. CoRR abs/2205.05573 (2022) - 2021
- [c90]Giuseppe Mario Malandrone, Giovanni Virdis, Giorgio Giacinto, Davide Maiorca:
PowerDecode: A PowerShell Script Decoder Dedicated to Malware Analysis. ITASEC 2021: 219-232 - 2020
- [j37]Davide Maiorca, Ambra Demontis, Battista Biggio, Fabio Roli, Giorgio Giacinto:
Adversarial Detection of Flash Malware: Limitations and Open Issues. Comput. Secur. 96: 101901 (2020) - [j36]Fabrizio Cara, Michele Scalas, Giorgio Giacinto, Davide Maiorca:
On the Feasibility of Adversarial Sample Creation Using the Android System API. Inf. 11(9): 433 (2020) - [j35]Lorenzo Putzu, Luca Piras, Giorgio Giacinto:
Convolutional neural networks for relevance feedback in content based image retrieval. Multim. Tools Appl. 79(37-38): 26995-27021 (2020) - [c89]Maria Teresa Rossi, Renan Greca, Ludovico Iovino, Giorgio Giacinto, Antonia Bertolino:
Defensive Programming for Smart Home Cybersecurity. EuroS&P Workshops 2020: 600-605 - [c88]Michele Scalas, Konrad Rieck, Giorgio Giacinto:
Explanation-Driven Characterization of Android Ransomware. ICPR Workshops (3) 2020: 228-242 - [i14]Marco Melis, Michele Scalas, Ambra Demontis, Davide Maiorca, Battista Biggio, Giorgio Giacinto, Fabio Roli:
Do Gradient-based Explanations Tell Anything About Adversarial Robustness to Android Malware? CoRR abs/2005.01452 (2020)
2010 – 2019
- 2019
- [j34]Michele Scalas, Davide Maiorca, Francesco Mercaldo, Corrado Aaron Visaggio, Fabio Martinelli, Giorgio Giacinto:
On the effectiveness of system API-related information for Android ransomware detection. Comput. Secur. 86: 168-182 (2019) - [j33]Davide Maiorca, Battista Biggio, Giorgio Giacinto:
Towards Adversarial Malware Detection: Lessons Learned from PDF-based Attacks. ACM Comput. Surv. 52(4): 78:1-78:36 (2019) - [j32]Ambra Demontis, Marco Melis, Battista Biggio, Davide Maiorca, Daniel Arp, Konrad Rieck, Igino Corona, Giorgio Giacinto, Fabio Roli:
Yes, Machine Learning Can Be More Secure! A Case Study on Android Malware Detection. IEEE Trans. Dependable Secur. Comput. 16(4): 711-724 (2019) - [c87]Denis Ugarte, Davide Maiorca, Fabrizio Cara, Giorgio Giacinto:
PowerDrive: Accurate De-obfuscation and Analysis of PowerShell Malware. DIMVA 2019: 240-259 - [e1]Roberto Perdisci, Clémentine Maurice, Giorgio Giacinto, Magnus Almgren:
Detection of Intrusions and Malware, and Vulnerability Assessment - 16th International Conference, DIMVA 2019, Gothenburg, Sweden, June 19-20, 2019, Proceedings. Lecture Notes in Computer Science 11543, Springer 2019, ISBN 978-3-030-22037-2 [contents] - [i13]Denis Ugarte, Davide Maiorca, Fabrizio Cara, Giorgio Giacinto:
PowerDrive: Accurate De-Obfuscation and Analysis of PowerShell Malware. CoRR abs/1904.10270 (2019) - [i12]Michele Scalas, Giorgio Giacinto:
Automotive Cybersecurity: Foundations for Next-Generation Vehicles. CoRR abs/1910.01037 (2019) - 2018
- [c86]Marco Melis, Davide Maiorca, Battista Biggio, Giorgio Giacinto, Fabio Roli:
Explaining Black-box Android Malware Detection. EUSIPCO 2018: 524-528 - [c85]Bojan Kolosnjaji, Ambra Demontis, Battista Biggio, Davide Maiorca, Giorgio Giacinto, Claudia Eckert, Fabio Roli:
Adversarial Malware Binaries: Evading Deep Learning for Malware Detection in Executables. EUSIPCO 2018: 533-537 - [c84]Lorenzo Putzu, Luca Piras, Giorgio Giacinto:
Ten Years of Relevance Score for Content Based Image Retrieval. MLDM (2) 2018: 117-131 - [i11]Mansour Ahmadi, Angelo Sotgiu, Giorgio Giacinto:
IntelliAV: Building an Effective On-Device Android Malware Detector. CoRR abs/1802.01185 (2018) - [i10]Marco Melis, Davide Maiorca, Battista Biggio, Giorgio Giacinto, Fabio Roli:
Explaining Black-box Android Malware Detection. CoRR abs/1803.03544 (2018) - [i9]Bojan Kolosnjaji, Ambra Demontis, Battista Biggio, Davide Maiorca, Giorgio Giacinto, Claudia Eckert, Fabio Roli:
Adversarial Malware Binaries: Evading Deep Learning for Malware Detection in Executables. CoRR abs/1803.04173 (2018) - [i8]Michele Scalas, Davide Maiorca, Francesco Mercaldo, Corrado Aaron Visaggio, Fabio Martinelli, Giorgio Giacinto:
R-PackDroid: Practical On-Device Detection of Android Ransomware. CoRR abs/1805.09563 (2018) - [i7]Davide Maiorca, Battista Biggio, Giorgio Giacinto:
Towards Robust Detection of Adversarial Infection Vectors: Lessons Learned in PDF Malware. CoRR abs/1811.00830 (2018) - [i6]Battista Biggio, Konrad Rieck, Davide Ariu, Christian Wressnegger, Igino Corona, Giorgio Giacinto, Fabio Roli:
Poisoning Behavioral Malware Clustering. CoRR abs/1811.09985 (2018) - 2017
- [j31]Luca Piras, Giorgio Giacinto:
Information fusion in content based image retrieval: A comprehensive overview. Inf. Fusion 37: 50-60 (2017) - [j30]Duc-Tien Dang-Nguyen, Luca Piras, Giorgio Giacinto, Giulia Boato, Francesco G. B. De Natale:
Multimodal Retrieval with Diversification and Relevance Feedback for Tourist Attraction Images. ACM Trans. Multim. Comput. Commun. Appl. 13(4): 49:1-49:24 (2017) - [c83]Paolo Piredda, Davide Ariu, Battista Biggio, Igino Corona, Luca Piras, Giorgio Giacinto, Fabio Roli:
Deepsquatting: Learning-Based Typosquatting Detection at Deeper Domain Levels. AI*IA 2017: 347-358 - [c82]Mansour Ahmadi, Angelo Sotgiu, Giorgio Giacinto:
IntelliAV: Toward the Feasibility of Building Intelligent Anti-malware on Android Devices. CD-MAKE 2017: 137-154 - [c81]Guillermo Suarez-Tangil, Santanu Kumar Dash, Mansour Ahmadi, Johannes Kinder, Giorgio Giacinto, Lorenzo Cavallaro:
DroidSieve: Fast and Accurate Classification of Obfuscated Android Malware. CODASPY 2017: 309-320 - [c80]Davide Maiorca, Paolo Russu, Igino Corona, Battista Biggio, Giorgio Giacinto:
Detection of Malicious Scripting Code Through Discriminant and Adversary-Aware API Analysis. ITASEC 2017: 96-105 - [c79]Ambra Demontis, Battista Biggio, Giorgio Fumera, Giorgio Giacinto, Fabio Roli:
Infinity-Norm Support Vector Machines Against Adversarial Label Contamination. ITASEC 2017: 106-115 - [c78]Davide Maiorca, Francesco Mercaldo, Giorgio Giacinto, Corrado Aaron Visaggio, Fabio Martinelli:
R-PackDroid: API package-based characterization and detection of mobile ransomware. SAC 2017: 1718-1723 - [i5]Ambra Demontis, Marco Melis, Battista Biggio, Davide Maiorca, Daniel Arp, Konrad Rieck, Igino Corona, Giorgio Giacinto, Fabio Roli:
Yes, Machine Learning Can Be More Secure! A Case Study on Android Malware Detection. CoRR abs/1704.08996 (2017) - [i4]Battista Biggio, Igino Corona, Davide Maiorca, Blaine Nelson, Nedim Srndic, Pavel Laskov, Giorgio Giacinto, Fabio Roli:
Evasion Attacks against Machine Learning at Test Time. CoRR abs/1708.06131 (2017) - [i3]Davide Maiorca, Battista Biggio, Maria Elena Chiappe, Giorgio Giacinto:
Adversarial Detection of Flash Malware: Limitations and Open Issues. CoRR abs/1710.10225 (2017) - 2016
- [c77]Mansour Ahmadi, Battista Biggio, Steven Arzt, Davide Ariu, Giorgio Giacinto:
Detecting Misuse of Google Cloud Messaging in Android Badware. SPSM@CCS 2016: 103-112 - [c76]Johannes Hoffmann, Teemu Rytilahti, Davide Maiorca, Marcel Winandy, Giorgio Giacinto, Thorsten Holz:
Evaluating Analysis Tools for Android Apps: Status Quo and Robustness Against Obfuscation. CODASPY 2016: 139-141 - [c75]Mansour Ahmadi, Dmitry Ulyanov, Stanislav Semenov, Mikhail Trofimov, Giorgio Giacinto:
Novel Feature Extraction, Selection and Fusion for Effective Malware Family Classification. CODASPY 2016: 183-194 - [c74]Matteo Contini, Igino Corona, Alessio Mulas, Giorgio Giacinto, Davide Ariu:
Pharmaguard WebApp: An Application for the Detection of Illegal Online Pharmacies. KDWeb 2016 - [c73]David Freeman, Sakshi Jain, Markus Dürmuth, Battista Biggio, Giorgio Giacinto:
Who Are You? A Statistical Approach to Measuring User Authenticity. NDSS 2016 - 2015
- [j29]Davide Maiorca, Davide Ariu, Igino Corona, Marco Aresu, Giorgio Giacinto:
Stealth attacks: An extended insight into the obfuscation effects on Android malware. Comput. Secur. 51: 16-31 (2015) - [j28]Davide Ariu, Igino Corona, Roberto Tronci, Giorgio Giacinto:
Machine Learning in Security Applications. Trans. Mach. Learn. Data Min. 8(1): 3-39 (2015) - [j27]Giorgio Giacinto:
Editorial. Trans. Mach. Learn. Data Min. 8(2): 59-60 (2015) - [j26]Masoud Narouei, Mansour Ahmadi, Giorgio Giacinto, Hassan Takabi, Ashkan Sami:
DLLMiner: structural mining for malware detection. Secur. Commun. Networks 8(18): 3311-3322 (2015) - [c72]Jart Armin, Bryn Thompson, Davide Ariu, Giorgio Giacinto, Fabio Roli, Piotr Kijewski:
2020 Cybercrime Economic Costs: No Measure No Solution. ARES 2015: 701-710 - [c71]Davide Ariu, Luca Didaci, Giorgio Fumera, Enrico Frumento, Federica Freschi, Giorgio Giacinto, Fabio Roli:
Yet Another Cybersecurity Roadmapping Methodology. ARES 2015: 719-726 - [c70]Thomas Hupperich, Davide Maiorca, Marc Kührer, Thorsten Holz, Giorgio Giacinto:
On the Robustness of Mobile Device Fingerprinting: Can Mobile Users Escape Modern Web-Tracking Mechanisms? ACSAC 2015: 191-200 - [c69]Igino Corona, Matteo Contini, Davide Ariu, Giorgio Giacinto, Fabio Roli, Michael Lund, Giorgio Marinelli:
PharmaGuard: Automatic identification of illegal search-indexed online pharmacies. CYBCONF 2015: 324-329 - [c68]Marco Melis, Luca Piras, Battista Biggio, Giorgio Giacinto, Giorgio Fumera, Fabio Roli:
Fast Image Classification with Reduced Multiclass Support Vector Machines. ICIAP (2) 2015: 78-88 - [c67]Davide Maiorca, Davide Ariu, Igino Corona, Giorgio Giacinto:
A Structural and Content-based Approach for a Precise and Robust Detection of Malicious PDF Files. ICISSP 2015: 27-36 - [c66]Davide Maiorca, Davide Ariu, Igino Corona, Giorgio Giacinto:
An Evasion Resilient Approach to the Detection of Malicious PDF Files. ICISSP (Revised Selected Papers) 2015: 68-85 - [c65]Duc-Tien Dang-Nguyen, Luca Piras, Giorgio Giacinto, Giulia Boato, Francesco G. B. De Natale:
A hybrid approach for retrieving diverse social images of landmarks. ICME 2015: 1-6 - [c64]Luca Piras, Deiv Furcas, Giorgio Giacinto:
User-driven Nearest Neighbour Exploration of Image Archives. ICPRAM (1) 2015: 181-189 - [c63]Marco Aresu, Davide Ariu, Mansour Ahmadi, Davide Maiorca, Giorgio Giacinto:
Clustering android malware families by http traffic. MALWARE 2015: 128-135 - [c62]Battista Biggio, Igino Corona, Zhi-Min He, Patrick P. K. Chan, Giorgio Giacinto, Daniel S. Yeung, Fabio Roli:
One-and-a-Half-Class Multiple Classifier Systems for Secure Learning Against Evasion Attacks at Test Time. MCS 2015: 168-180 - [c61]Duc-Tien Dang-Nguyen, Giulia Boato, Francesco G. B. De Natale, Luca Piras, Giorgio Giacinto, Franco Tuveri, Manuela Angioni:
Multimodal-based Diversified Summarization in Social Image Retrieval. MediaEval 2015 - [i2]Mansour Ahmadi, Giorgio Giacinto, Dmitry Ulyanov, Stanislav Semenov, Mikhail Trofimov:
Novel feature extraction, selection and fusion for effective malware family classification. CoRR abs/1511.04317 (2015) - 2014
- [c60]Battista Biggio, Konrad Rieck, Davide Ariu, Christian Wressnegger, Igino Corona, Giorgio Giacinto, Fabio Roli:
Poisoning behavioral malware clustering. AISec@CCS 2014: 27-36 - [c59]Igino Corona, Davide Maiorca, Davide Ariu, Giorgio Giacinto:
Lux0R: Detection of Malicious PDF-embedded JavaScript code through Discriminant Analysis of API References. AISec@CCS 2014: 47-57 - [c58]Duc-Tien Dang-Nguyen, Luca Piras, Giorgio Giacinto, Giulia Boato, Francesco G. B. De Natale:
Retrieval of Diverse Images by Pre-filtering and Hierarchical Clustering. MediaEval 2014 - [c57]Luca Piras, Giorgio Giacinto:
Open Issues on Codebook Generation in Image Classification Tasks. MLDM 2014: 328-342 - [i1]Battista Biggio, Igino Corona, Blaine Nelson, Benjamin I. P. Rubinstein, Davide Maiorca, Giorgio Fumera, Giorgio Giacinto, Fabio Roli:
Security Evaluation of Support Vector Machines in Adversarial Environments. CoRR abs/1401.7727 (2014) - 2013
- [j25]Roberto Perdisci, Davide Ariu, Giorgio Giacinto:
Scalable fine-grained behavioral clustering of HTTP-based malware. Comput. Networks 57(2): 487-500 (2013) - [j24]Igino Corona, Giorgio Giacinto, Fabio Roli:
Adversarial attacks against intrusion detection systems: Taxonomy, solutions and open issues. Inf. Sci. 239: 201-225 (2013) - [c56]Davide Maiorca, Igino Corona, Giorgio Giacinto:
Looking at the bag is not enough to find the bomb: an evasion of structural methods for malicious PDF files detection. AsiaCCS 2013: 119-130 - [c55]Luca Piras, Roberto Tronci, Giorgio Giacinto:
Diversity in Ensembles of Codebooks for Visual Concept Detection. ICIAP (2) 2013: 399-408 - [c54]Luca Piras, Giorgio Giacinto, Roberto Paredes:
Passive-aggressive Online Learning for Relevance Feedback in Content based Image Retrieval. ICPRAM 2013: 182-187 - [c53]Battista Biggio, Igino Corona, Davide Maiorca, Blaine Nelson, Nedim Srndic, Pavel Laskov, Giorgio Giacinto, Fabio Roli:
Evasion Attacks against Machine Learning at Test Time. ECML/PKDD (3) 2013: 387-402 - 2012
- [j23]Roberto Tronci, Luca Piras, Giorgio Giacinto:
Performance Evaluation of Relevance Feedback for Image Retrieval by "Real-World" Multi-Tagged Image Datasets. Int. J. Multim. Data Eng. Manag. 3(1): 1-16 (2012) - [j22]Luca Piras, Giorgio Giacinto:
Synthetic pattern generation for imbalanced learning in image retrieval. Pattern Recognit. Lett. 33(16): 2198-2205 (2012) - [j21]Roberto Perdisci, Igino Corona, Giorgio Giacinto:
Early Detection of Malicious Flux Networks via Large-Scale Passive DNS Traffic Analysis. IEEE Trans. Dependable Secur. Comput. 9(5): 714-726 (2012) - [c52]Luca Piras, Roberto Tronci, Gabriele Murgia, Giorgio Giacinto:
The PRA and AmILAB at ImageCLEF 2012 Photo Flickr Annotation Task. CLEF (Online Working Notes/Labs/Workshop) 2012 - [c51]Roberto Tronci, Luca Piras, Gabriele Murgia, Giorgio Giacinto:
Image Hunter at ImageCLEF 2012 Personal Photo Retrieval Task. CLEF (Online Working Notes/Labs/Workshop) 2012 - [c50]Igino Corona, Roberto Tronci, Giorgio Giacinto:
SuStorID: A multiple classifier system for the protection of web services. ICPR 2012: 2375-2378 - [c49]Luca Piras, Giorgio Giacinto, Roberto Paredes:
Enhancing Image Retrieval by an Exploration-Exploitation Approach. MLDM 2012: 355-365 - [c48]Davide Maiorca, Giorgio Giacinto, Igino Corona:
A Pattern Recognition System for Malicious PDF Files Detection. MLDM 2012: 510-524 - 2011
- [j20]Davide Ariu, Roberto Tronci, Giorgio Giacinto:
HMMPayl: An intrusion detection system based on Hidden Markov Models. Comput. Secur. 30(4): 221-241 (2011) - [j19]Giorgio Giacinto, Belur V. Dasarathy:
Machine learning for computer security: A guide to prospective authors. Inf. Fusion 12(3): 238-239 (2011) - [j18]Giorgio Giacinto:
Moving Targets in Computer Security and Multimedia Retrieval. Trans. Mach. Learn. Data Min. 4(1): 30-52 (2011) - [c47]Roberto Tronci, Gabriele Murgia, Maurizio Pili, Luca Piras, Giorgio Giacinto:
ImageHunter: a Novel Tool for Relevance Feedback in Content Based Image Retrieval. DART@AI*IA 2011 - [c46]Roberto Tronci, Gabriele Murgia, Maurizio Pili, Luca Piras, Giorgio Giacinto:
ImageHunter: A Novel Tool for Relevance Feedback in Content Based Image Retrieval. DART@AI*IA (Revised and Invited Papers) 2011: 53-70 - [c45]Davide Ariu, Giorgio Giacinto, Fabio Roli:
Machine learning in computer forensics (and the lessons learned from machine learning in computer security). AISec 2011: 99-104 - [c44]Luca Piras, Giorgio Giacinto:
Dissimilarity Representation in Multi-feature Spaces for Image Retrieval. ICIAP (1) 2011: 139-148 - [c43]Roberto Tronci, Luisa Falqui, Luca Piras, Giorgio Giacinto:
A Study on the Evaluation of Relevance Feedback in Multi-tagged Image Datasets. ISM 2011: 452-457 - [c42]Davide Ariu, Giorgio Giacinto:
A Modular Architecture for the Analysis of HTTP Payloads Based on Multiple Classifiers. MCS 2011: 330-339 - [c41]Battista Biggio, Igino Corona, Giorgio Fumera, Giorgio Giacinto, Fabio Roli:
Bagging Classifiers for Fighting Poisoning Attacks in Adversarial Classification Tasks. MCS 2011: 350-359 - 2010
- [j17]Attilio Gambardella, Giorgio Giacinto, Maurizio Migliaccio, Andrea Montali:
One-class classification for oil spill detection. Pattern Anal. Appl. 13(3): 349-366 (2010) - [c40]Luca Piras, Giorgio Giacinto:
Unbalanced learning in content-based image classification and retrieval. ICME 2010: 36-41 - [c39]Carlo Lobrano, Roberto Tronci, Giorgio Giacinto, Fabio Roli:
A Score Decidability Index for Dynamic Score Combination. ICPR 2010: 69-72 - [c38]Giorgio Giacinto:
Moving Targets. ICDM 2010: 1-16 - [c37]Carlo Lobrano, Roberto Tronci, Giorgio Giacinto, Fabio Roli:
Dynamic Linear Combination of Two-Class Classifiers. SSPR/SPR 2010: 473-482 - [c36]Luca Piras, Giorgio Giacinto:
K-Nearest Neighbors directed synthetic images injection. WIAMIS 2010: 1-4 - [c35]Davide Ariu, Giorgio Giacinto:
HMMPayl: an application of HMM to the analysis of the HTTP Payload. WAPA 2010: 81-87 - [c34]Igino Corona, Giorgio Giacinto:
Detection of Server-side Web Attacks. WAPA 2010: 160-166
2000 – 2009
- 2009
- [j16]