Export 203 results:
Filters: First Letter Of Last Name is G  [Clear All Filters]
A B C D E F G H I J K L M N O P Q R S T U V W X Y Z 
R. Tronci, Giacinto, G., and Roli, F., Combination of experts by classifiers in similarity score spaces, in Joint IAPR Int. Workshop on Structural and Syntactical Pattern Recognition and Statistical Techniques in Pattern Recognition S+SSPR08, Orlando (Florida, USA), 2008, vol. 5342, pp. 821-830.
G. Giacinto, Roli, F., and Bruzzone, L., Combination of Neural and Statistical Algorithms for Supervised Classification of Remote-Sensing Images, Pattern Recognition Letters, vol. 21, pp. 385-397, 2000.
Y. Guan, Wei, X., Li, C. - T., Marcialis, G. L., Roli, F., and Tistarelli, M., Combining Gait and Face for Tackling the Elapsed Time Challenges, in IEEE 6th International Conference on Biometrics: Theory, Applications, and Systems (BTAS 2013), Washington DC (USA), 2013, pp. 1-8. (663.7 KB)
J. Austin, Giacinto, G., Kanellopoulos, I., Lees, K., Roli, F., Vernazza, G., and Wilkinson, G., The COMPARES Project: COnnectionist Methods for Preprocessing and Analysis of REmote Sensing data, in 9th International Conference on Image Analysis and Processing, 1997, vol. 1311, pp. 765-772.
C. Gurrin, Schoeffmann, K., Joho, H., Leibetseder, A., Zhou, L., Duane, A., Dang-Nguyen, D. - T., Riegler, M., Piras, L., Tran, M. - T., Lokoč, J., and Hürst, W., Comparing Approaches to Interactive Lifelog Search at the Lifelog Search Challenge (LSC2018), ITE Transactions on Media Technology and Applications, vol. 7, pp. 46-59, 2019. (4.7 MB)
G. Giacinto, Roli, F., and Fumera, G., Comparison and Combination of Adaptive Query Shifting and Feature Relevance Learning for Content-Based Image Retrieval, in 11th International Conference on Image Analysis and Processing (ICIAP 2001), Palermo, Italy, 2001, pp. 422-427.
G. Giacinto, Roli, F., and Vernazza, G., Comparison and combination of statistical and Neural Network algorithms for remote-sensing image classification, in Neurocomputation in Remote Sensing Data Analysis, Springer-Verlag, 1997, pp. 117-124.
M. A. A. Dewan, Granger, E., Sabourin, R., Roli, F., and Marcialis, G. L., A comparison of adaptive appearance methods for tracking faces in video surveillance, in 5th International Conference on Imaging for Crime Detection and Prevention (ICDP-13), 2013.
P. Piredda, Ariu, D., Biggio, B., Corona, I., Piras, L., Giacinto, G., and Roli, F., Deepsquatting: Learning-based Typosquatting Detection at Deeper Domain Levels, in 16th International Conference of the Italian Association for Artificial Intelligence (AI*IA 2017), 2017, vol. 10640 of LNCS, pp. 347-358. (1.21 MB)
I. Corona, Biggio, B., Contini, M., Piras, L., Corda, R., Mereu, M., Mureddu, G., Ariu, D., and Roli, F., DeltaPhish: Detecting Phishing Webpages in Compromised Websites, 22nd European Symposium on Research in Computer Security (ESORICS), vol. 10492. Springer International Publishing, Norway, September 11-15, 2017, pp. 370–388, 2017. (4.13 MB)
G. Giacinto, Roli, F., and Fumera, G., Design of effective multiple classifier systems by clustering of classifiers, in 15th Int. Conference on Pattern Recognition (ICPR 2000), Barcelona, Spain, 2000, vol. 2, pp. 160-163.
G. Giacinto and Roli, F., Design of effective neural network ensembles for image classification, Image and Vision Computing Journal, vol. 19, pp. 697-705, 2001.
F. Roli and Giacinto, G., Design of Multiple Classifier Systems, in Hybrid Methods in Pattern Recognition, B. ;A. H. Kandel World Scientific Publishing, 2002.
R. Tronci, Giacinto, G., and Roli, F., Designing multiple biometric systems: measures of ensemble effectiveness, Engineering Applications of Artificial Intelligence, vol. 22, pp. 66-78, 2009.
G. L. Foresti, Giacinto, G., and Roli, F., Detecting Dangerous Behaviors of Mobile Objects in Parking Areas, in Multisensor Surveillance Systems: The Fusion Perspective, R. G. L. C. Foresti and Varshney, P. Kluwer Academic Publishers, 2003, pp. 199-211.
G. L. Foresti, Giacinto, G., and Roli, F., Detecting Dangerous Behaviours of Mobile Objects in Parking Areas, in 2nd European Workshop on Advanced Video-based Surveillance Systems (AVBS2001), London, United Kingdom, 2001.
M. Ahmadi, Biggio, B., Arzt, S., Ariu, D., and Giacinto, G., Detecting Misuse of Google Cloud Messaging in Android Badware, in 6th Workshop on Security and Privacy in Smartphones and Mobile Devices (SPSM), Vienna, Austria, 2016, pp. 103-112. (626.38 KB)
I. Sanchez, Satta, R., Giuliani, R., and Baldini, G., Detection of DECT identity spoofing through Radio Frequency fingerprinting, in 38th International Convention on Information and Communication Technology, Electronics and Microelectronics (MIPRO 2015), Opatija, Croatia, 2015. (778.81 KB)
D. Maiorca, Russu, P., Corona, I., Biggio, B., and Giacinto, G., Detection of Malicious Scripting Code through Discriminant and Adversary-Aware API Analysis, in 1st Italian Conference on CyberSecurity (ITASEC), 2017, vol. 1816, pp. 96-105. (371.53 KB)
I. Corona and Giacinto, G., Detection of server side web attacks, in Workshop on Applications of Pattern Analysis, Cumberland Lodge, London, UK, 2010. (308.33 KB)
L. Piras and Giacinto, G., Dissimilarity representation in multi-feature spaces for image retrieval, in 16th Int. Conference on Image Analysis and Processing (ICIAP), Ravenna, Italy, 2011. (252.22 KB)
G. Giacinto and Roli, F., Dissimilarity Representation of Images for Relevance Feedback in Content-Based Image Retrieval, in Machine Learning and Data Mining in Pattern Recognition (MLDM 2003), Leipzig, Germany, 2003, vol. 2734, pp. 202-214.
L. Piras, Tronci, R., and Giacinto, G., Diversity in ensembles of codebooks for visual concept detection, in 17th Int. Conference on Image Analysis and Processing (ICIAP), Naples, Italy, 2013. (303.73 KB)
M. Narouei, Ahmadi, M., Giacinto, G., Takabi, H., and Sami, A., DLLMiner: structural mining for malware detection, Security and Communication Networks, 2015. (731.78 KB)
G. Suarez-Tangil, Dash, S. Kumar, Ahmadi, M., Kinder, J., Giacinto, G., and Cavallaro, L., DroidSieve: Fast and Accurate Classification of Obfuscated Android Malware, in Proceedings of the Seventh {ACM} Conference on Data and Application Security and Privacy, {CODASPY} 2017, In Press. (478.59 KB)