Publications

Export 140 results:
Filters: Author is Giorgio Giacinto  [Clear All Filters]
Conference Paper
G. Fumera, Roli, F., and Giacinto, G., Multiple Reject Thresholds for Improving Classification Reliability, in Joint IAPR Int. Workshops on Syntactical and Structural Pattern Recognition and Statistical Pattern Recognition (S+SSPR 2000), Alicante, Spain, 2000, vol. 1876, pp. 863-871.
D. - T. Dang-Nguyen, Boato, G., De Natale, F. G. B., Piras, L., Giacinto, G., Tuveri, F., and Angioni, M., Multimodal-based Diversified Summarization in Social Image Retrieval, in Working Notes Proceedings of the MediaEval 2015 Workshop, Wurzen, Germany, September 14-15, 2015., 2015. (755.79 KB)
G. Giacinto, Roli, F., and Didaci, L., A Modular Multiple Classifier System for the Detection of Intrusions in Computer Networks, in 4th Int. Workshop on Multiple Classifier Systems (MCS 2003), Guildford, United Kingdom, 2003, vol. 2709, pp. 346-355.
D. Ariu and Giacinto, G., A modular architecture for the analysis of HTTP payloads based on Multiple Classifiers, in 10th Int. Workshop on Multiple Classifier Systems (MCS 2011), Naples, Italy, 2011. (244.9 KB)
G. Giacinto and Roli, F., Methods for Dynamic Classifier Selection, in 10th International Conference on Image Analysis and Processing, Venice, Italy, 1999, pp. 659-664.
F. Roli, Giacinto, G., and Vernazza, G., Methods for Designing Multiple Classifier Systems, in 2nd Int. Workshop on Multiple Classifier Systems (MCS 2001), Cambridge, United Kingdom, 2001, vol. 2096, pp. 78-87.
D. Ariu, Corona, I., Giacinto, G., and Roli, F., McPAD and HMMWeb: two different approaches for the detection of attacks against Web applications, in Italian Workshop on Privacy and Security (PRISE), Rome, 2008. (309.2 KB)
A. Gambardella, Giacinto, G., and Migliaccio, M., On the Mathematical Formulation of the SAR Oil-Spill Observation Problem, in IEEE International Geoscience and Remote Sensing Symposium, 2008. IGARSS 2008, 2008, vol. 3, p. III -1382-III -1385.
D. Ariu, Giacinto, G., and Roli, F., Machine Learning in Computer Forensics (and the Lessons Learned from Machine Learning in Computer Security), in AISec 2011: 4th ACM Workshop on Artificial Intelligence and Security, Chicago, IL, USA, 2011. (379.05 KB)
I. Corona, Maiorca, D., Ariu, D., and Giacinto, G., Lux0R: Detection of Malicious PDF-embedded JavaScript code through Discriminant Analysis of API References, in AISec'14: Proceedings of the 2014 ACM Workshop on Artificial Intelligence and Security, co-located with CCS '14, Scottdale, Arizona, USA, 2014. (455.14 KB)
D. Maiorca, Corona, I., and Giacinto, G., Looking at the Bag is not Enough to Find the Bomb: an Evasion of Structural Methods for Malicious PDF Files Detection, in 8th ACM Symposium on Information, Computer and Communications Security (ASIACCS 2013), Hangzhou, China, 2013. (2.12 MB)
L. Piras and Giacinto, G., K-Nearest Neighbors Directed Synthetic Images Injection, in 11th International Workshop on Image Analysis for Multimedia Interactive Services (WIAMIS), Desenzano del Garda, Italy, 2010. (167.12 KB)
D. Ariu, Corona, I., Giacinto, G., Perdisci, R., and Roli, F., Intrusion Detection Systems based on anomaly detection techniques, in Italian Workshop on Privacy and Security (PRISE), Rome, 2007.
I. Corona, Giacinto, G., and Roli, F., Intrusion detection in computer systems as a pattern recognition task in adversarial environment: a critical review, in Workshop on Neural Information Processing Systems (NIPS), Whistler, British Columbia, Canada, 2007.
G. Giacinto and Roli, F., Intrusion Detection in Computer Networks by Multiple Classifier Systems, in 16th International Conference on Pattern Recognition (ICPR 2002), Quebec City, Canada, 2002, vol. II, pp. 390-393.
G. Giacinto and Roli, F., Instance-Based Relevance Feedback for Image Retrieval, in Advances in Neural Information Processing Systems (NIPS) 17, 2005, pp. 489-496.
R. Tronci, Giacinto, G., and Roli, F., Index Driven Combination of Multiple Biometric Experts for AUC Maximisation, in 7th International Workshop on Multiple Classifiers Systems MCS 2007, Prague (Czech Republic), 2007, vol. 4472, pp. 357-366.
R. Tronci, Murgia, G., Pili, M., Piras, L., and Giacinto, G., ImageHunter: a novel tool for Relevance Feedback in Content Based Image Retrieval, in 5th International Workshop on New Challenges in Distributed Information Filtering and Retrieval (DART), Palermo, Italy, 2011. (1.31 MB)
R. Tronci, Piras, L., Murgia, G., and Giacinto, G., Image Hunter at ImageCLEF 2012 Personal Photo Retrieval Task, in CLEF (Online Working Notes/Labs/Workshop), Rome, 2012. (2.78 MB)
D. - T. Dang-Nguyen, Piras, L., Giacinto, G., Boato, G., and De Natale, F. G. B., A Hybrid Approach for Retrieving Diverse Social Images of Landmarks, in IEEE International Conference on Multimedia & Expo (ICME), Torino, 2015. (1.16 MB)
I. Corona, Ariu, D., and Giacinto, G., HMM-Web: a framework for the detection of attacks against Web applications, in IEEE ICC 2009, Dresden, Germany, 2009. (391.14 KB)
D. Ariu and Giacinto, G., HMMPayl: an application of HMM to the analysis of the HTTP Payload, in Workshop on Applications of Pattern Analysis, 2010. (273.18 KB)
M. Melis, Piras, L., Biggio, B., Giacinto, G., Fumera, G., and Roli, F., Fast Image Classification with Reduced Multiclass Support Vector Machines, in 18th Int'l Conf. on Image Analysis and Processing, Genova, Italy, 2015, vol. Image Analysis and Processing (ICIAP 2015), pp. 78-88. (829.37 KB)
M. Melis, Maiorca, D., Biggio, B., Giacinto, G., and Roli, F., Explaining Black-box Android Malware Detection, in 26th European Signal Processing Conference (EUSIPCO '18), Rome, Italy, 2018, pp. 524-528. (431.78 KB)
B. Biggio, Corona, I., Maiorca, D., Nelson, B., Srndic, N., Laskov, P., Giacinto, G., and Roli, F., Evasion attacks against machine learning at test time, in European Conference on Machine Learning and Principles and Practice of Knowledge Discovery in Databases (ECML PKDD), 2013, vol. 8190, pp. 387-402. (473.78 KB)

Pages