Publications

Export 136 results:
Filters: Author is Giorgio Giacinto  [Clear All Filters]
Journal Article
G. Giacinto, Roli, F., and Bruzzone, L., Combination of Neural and Statistical Algorithms for Supervised Classification of Remote-Sensing Images, Pattern Recognition Letters, vol. 21, pp. 385-397, 2000.
G. Giacinto and Roli, F., Bayesian Relevance Feedback for Content-Based Image Retrieval, Pattern Recognition, vol. 37, pp. 1499-1508, 2004.
R. Paolucci, Coli, P., and Giacinto, G., Assessment of seismic site effects in 2-D alluvial valleys using neural networks, Earthquake Spectra, vol. 16, pp. 661-680, 2000.
G. Giacinto and Roli, F., An Approach to the Automatic Design of Multiple Classifier Systems, Pattern Recognition Letters, vol. 22, pp. 25-33, 2001.
G. Giacinto, Paolucci, R., and Roli, F., Application of Neural Networks and Statistical Pattern Recognition Algorithms to Earthquake Risk Evaluations, Pattern Recognition Letters, vol. 18, pp. 1353-1362, 1997.
R. Perdisci, Giacinto, G., and Roli, F., Alarm clustering for intrusion detection systems in computer networks, Engineering Applications of Artificial Intelligence, vol. 19, pp. 429-438, 2006.
D. Maiorca, Demontis, A., Biggio, B., Roli, F., and Giacinto, G., Adversarial Detection of Flash Malware: Limitations and Open Issues, Computers & Security, vol. 96, 2020. (1.08 MB)
I. Corona, Giacinto, G., and Roli, F., Adversarial Attacks against Intrusion Detection Systems: Taxonomy, Solutions and Open Issues, Information Sciences, vol. 239, 2013. (1.49 MB)
Conference Proceedings
D. Maiorca, Ariu, D., Corona, I., and Giacinto, G., A Structural and Content-Based Approach for a Precise and Robust Detection of Malicious PDF Files, Proceedings of the 1st International Conference on Information Systems Security and Privacy (ICISSP 2015, 9-11th February 2015, Angers, France). pp. 27-36, 2015. (267.78 KB)
D. Ugarte, Maiorca, D., Cara, F., and Giacinto, G., PowerDrive: Accurate De-Obfuscation and Analysis of PowerShell Malware, 16th Conference on Detection of Intrusions and Malware & Vulnerability Assessment (DIMVA). Springer, Gothenburg, Sweden, pp. 240-259, 2019. (352.39 KB)
M. Contini, Corona, I., Mulas, A., Giacinto, G., and Ariu, D., Pharmaguard WebApp: an application for the detection of illegal online pharmacies, 2nd International Workshop on Knowledge Discovery on the WEB (KDWEB). Cagliari, 2016. (120.57 KB)
I. Corona, Contini, M., Ariu, D., Giacinto, G., Roli, F., Lund, M., and Marinelli, G., PharmaGuard: Automatic Identification of Illegal Search-Indexed Online Pharmacies, IEEE International Conference on Cybernetics - Special session Cybersecurity (CYBERSEC). IEEE, Gdynia, Poland , pp. 324 - 329, 2015. (1.44 MB) (3.4 MB)
J. Hoffmann, Rytilahti, T., Maiorca, D., Winandy, M., Giacinto, G., and Holz, T., Evaluating Analysis Tools for Android Apps: Status Quo and Robustness against Obfuscation, Proceedings of the 6th ACM Conference on Data and Application Security and Privacy (CODASPY 2016, 09-11 March, 2016). 2016. (726.65 KB)
Conference Paper
D. Ariu, Didaci, L., Fumera, G., Frumento, E., Freschi, F., and Giacinto, G., Yet Another Cybersecurity Roadmapping Methodology, in First International Workshop on Future Scenarios for Cybercrime and Cyber-terrorism, co-located with the 10th International Conference on Availability, Reliability and Security (ARES), 2015. (1.34 MB)
D. M. Freeman, Jain, S., Duermuth, M., Biggio, B., and Giacinto, G., Who Are You? A Statistical Approach to Measuring User Authenticity, in Proc. 23rd Annual Network & Distributed System Security Symposium (NDSS), 2016. (764.14 KB)
L. Piras, Furcas, D., and Giacinto, G., User-driven Nearest-Neighbour Exploration of Image Archives, in 4th International Conference on Pattern Recognition Applications and Methods (ICPRAM), Lisbon, Portugal, 2015, pp. 181 - 189. (376.55 KB)
G. Giacinto, Roli, F., and Fumera, G., Unsupervised Learning of Neural Network Ensembles for Image Classification, in IEEE-INNS-ENNS International Joint Conference on Neural Networks (IJCNN 2000), Como, Italy, 2000, vol. III, pp. 155-159.
L. Piras and Giacinto, G., Unbalanced learning in Content-Based Image Classification and Retrieval, in IEEE International Conference on Multimedia & Expo (ICME), Singapore, 2010. (177.33 KB)
G. Giacinto and Roli, F., A theoretical framework for dynamic classifier selection, in 15th International Conference on Pattern Recognition, Barcelona, Spain, 2000, vol. 2, pp. 8-11.
L. Putzu, Piras, L., and Giacinto, G., Ten years of Relevance Score for Content Based Image Retrieval, in 14th International Conference Machine Learning and Data Mining (MLDM), New York, 2018, vol. 10935.
I. Corona, Tronci, R., and Giacinto, G., SuStorID: A Multiple Classifier System for the Protection of Web Services, in International Conference on Pattern Recognition (ICPR 2012), Tsukuba International Congress Center, Tsukuba Science City, JAPAN, 2012, pp. 2375-2378. (286.16 KB)
A. Montali, Giacinto, G., Migliaccio, M., and Gambardella, A., Supervised Pattern Classification Techniques for Oil Spill Classification in SAR Images: Preliminary Results, in SEASAR2006 Workshop, ESA-ESRIN, Frascati, Italy, 2006, pp. 23-26.
R. Tronci, Piras, L., Falqui, L., and Giacinto, G., A study on the evaluation of relevance feedback in multi-tagged image datasets, in 7th IEEE International Workshop on Multimedia Information Processing and Retrieval, California, USA, 2011. (259.03 KB)
E. Costamagna, Fanni, A., and Giacinto, G., A simulated annealing algorithm for the optimization of communication network, in Int. Symp. on Signals, Systems and Electronics (ISSSE '95), 1995, pp. 405-408.
D. Ariu, Giacinto, G., and Perdisci, R., Sensing attacks in Computers Network with Hidden Markov Models, in Machine Learning and Data Mining in Pattern Recognition, MLDM 2007, Leipzig, 2007, vol. 4571, pp. 449-463. (315.94 KB)

Pages