Publications

Export 135 results:
Filters: Author is Giorgio Giacinto  [Clear All Filters]
A B C D E F G H I J K L M N O P Q R S T U V W X Y Z 
T
A. Fanni, Giacinto, G., Marchesi, M., e Serri, A., «Tabu search coupled with deterministic strategies for the optimal design of MRI devices», Int. J. of Applied Electromagnetics and Mechanics, vol 10, pagg 21-31, 1999.
L. Putzu, Piras, L., e Giacinto, G., «Ten years of Relevance Score for Content Based Image Retrieval», in 14th International Conference Machine Learning and Data Mining (MLDM), New York, 2018, vol 10935.
G. Giacinto e Roli, F., «A theoretical framework for dynamic classifier selection», in 15th International Conference on Pattern Recognition, Barcelona, Spain, 2000, vol 2, pagg 8-11.
D. Maiorca, Biggio, B., e Giacinto, G., «Towards Adversarial Malware Detection: Lessons Learned from PDF-based Attacks», ACM Computing Surveys, In Press. (1.21 MB)
U
L. Piras e Giacinto, G., «Unbalanced learning in Content-Based Image Classification and Retrieval», in IEEE International Conference on Multimedia & Expo (ICME), Singapore, 2010. (177.33 KB)
G. Giacinto, Roli, F., e Fumera, G., «Unsupervised Learning of Neural Network Ensembles for Image Classification», in IEEE-INNS-ENNS International Joint Conference on Neural Networks (IJCNN 2000), Como, Italy, 2000, vol III, pagg 155-159.
L. Piras, Furcas, D., e Giacinto, G., «User-driven Nearest-Neighbour Exploration of Image Archives», in 4th International Conference on Pattern Recognition Applications and Methods (ICPRAM), Lisbon, Portugal, 2015, pagg 181 - 189. (376.55 KB)
W
D. M. Freeman, Jain, S., Duermuth, M., Biggio, B., e Giacinto, G., «Who Are You? A Statistical Approach to Measuring User Authenticity», in Proc. 23rd Annual Network & Distributed System Security Symposium (NDSS), 2016. (764.14 KB)
Y
A. Demontis, Melis, M., Biggio, B., Maiorca, D., Arp, D., Rieck, K., Corona, I., Giacinto, G., e Roli, F., «Yes, Machine Learning Can Be More Secure! A Case Study on Android Malware Detection», IEEE Trans. Dependable and Secure Computing, vol 16, n° 4, pagg 711-724, 2019. (3.61 MB)
D. Ariu, Didaci, L., Fumera, G., Frumento, E., Freschi, F., e Giacinto, G., «Yet Another Cybersecurity Roadmapping Methodology», in First International Workshop on Future Scenarios for Cybercrime and Cyber-terrorism, co-located with the 10th International Conference on Availability, Reliability and Security (ARES), 2015. (1.34 MB)

Pages