Publications

Export 135 results:
Filters: Author is Giorgio Giacinto  [Clear All Filters]
Journal Article
R. Perdisci, Ariu, D., e Giacinto, G., «Scalable Fine-Grained Behavioral Clustering of HTTP-Based Malware», Computer Networks - Special Issue on Botnet Activity: Analysis, Detection and Shutdown, vol 57, pagg 487-500, 2013. (797.8 KB)
G. Giacinto, Roli, F., e Fumera, G., «Selection of image classifiers», Electronics Letters, vol 36, pagg 420-422, 2000.
D. Maiorca, Ariu, D., Corona, I., Aresu, M., e Giacinto, G., «Stealth Attacks: An Extended Insight into the Obfuscation Effects on Android Malware», Computers And Security (Elsevier), vol 51 (June), pagg 16-31, 2015. (413.99 KB)
L. Didaci, Giacinto, G., Roli, F., e Marcialis, G. L., «A study on the performances of Dynamic Classifier Selection based on Local Accuracy Estimation», Pattern Recognition, vol 38, pagg 2188-2191, 2005.
L. Piras e Giacinto, G., «Synthetic Pattern Generation for Imbalanced Learning in Image Retrieval», Pattern Recognition Letters, vol 33, pag 7, 2012. (236.64 KB)
E. Costamagna, Fanni, A., e Giacinto, G., «A Tabu Search algorithm for the optimisation of telecommunication networks», European Journal of Operational Research, vol 106, pagg 357-372, 1998.
A. Fanni, Giacinto, G., Marchesi, M., e Serri, A., «Tabu search coupled with deterministic strategies for the optimal design of MRI devices», Int. J. of Applied Electromagnetics and Mechanics, vol 10, pagg 21-31, 1999.
D. Maiorca, Biggio, B., e Giacinto, G., «Towards Adversarial Malware Detection: Lessons Learned from PDF-based Attacks», ACM Computing Surveys, vol 52, n° 4, 2019. (1.21 MB)
A. Demontis, Melis, M., Biggio, B., Maiorca, D., Arp, D., Rieck, K., Corona, I., Giacinto, G., e Roli, F., «Yes, Machine Learning Can Be More Secure! A Case Study on Android Malware Detection», IEEE Trans. Dependable and Secure Computing, vol 16, n° 4, pagg 711-724, 2019. (3.61 MB)
Report
J. Hoffmann, Rytilahti, T., Maiorca, D., Winandy, M., Giacinto, G., e Holz, T., «Evaluating Analysis Tools for Android Apps: Status Quo and Robustness Against Obfuscation», Horst Görtz Institut for IT Security (Ruhr-University Bochum), Technical Report TR-HGI-2016-003, 2016. (519.16 KB)

Pages