Publications

Export 140 results:
Filters: Author is Giorgio Giacinto  [Clear All Filters]
A B C D E F G H I J K L M N O P Q R S T U V W X Y Z 
P
D. Maiorca, Giacinto, G., and Corona, I., A Pattern Recognition System for Malicious PDF Files Detection, in MLDM - International Conference on Machine Learning and Data Mining, Berlin, 2012, vol. 7376, pp. 510-524. (1.74 MB)
R. Tronci, Piras, L., and Giacinto, G., Performance Evaluation of Relevance Feedback for Image Retrieval by “Real-World” Multi-Tagged Image Datasets, International Journal of Multimedia Data Engineering and Management (IJMDEM), vol. 3, p. 16, 2012. (357.99 KB)
I. Corona, Contini, M., Ariu, D., Giacinto, G., Roli, F., Lund, M., and Marinelli, G., PharmaGuard: Automatic Identification of Illegal Search-Indexed Online Pharmacies, IEEE International Conference on Cybernetics - Special session Cybersecurity (CYBERSEC). IEEE, Gdynia, Poland , pp. 324 - 329, 2015. (1.44 MB) (3.4 MB)
M. Contini, Corona, I., Mulas, A., Giacinto, G., and Ariu, D., Pharmaguard WebApp: an application for the detection of illegal online pharmacies, 2nd International Workshop on Knowledge Discovery on the WEB (KDWEB). Cagliari, 2016. (120.57 KB)
B. Biggio, Rieck, K., Ariu, D., Wressnegger, C., Corona, I., Giacinto, G., and Roli, F., Poisoning Behavioral Malware Clustering, in AISec'14: Proceedings of the 2014 ACM Workshop on Artificial Intelligence and Security, co-located with CCS '14, Scottsdale, Arizona, USA, 2014, pp. 27-36. (375.58 KB)
G. Malandrone, Virdis, G., Maiorca, D., and Giacinto, G., PowerDecode: A PowerShell Script Decoder Dedicated to Malware Analysis, 5th Italian Conference on CyberSecurity (ITASEC). 2021. (982.03 KB)
D. Ugarte, Maiorca, D., Cara, F., and Giacinto, G., PowerDrive: Accurate De-Obfuscation and Analysis of PowerShell Malware, 16th Conference on Detection of Intrusions and Malware & Vulnerability Assessment (DIMVA). Springer, Gothenburg, Sweden, pp. 240-259, 2019. (352.39 KB)
L. Piras, Tronci, R., Murgia, G., and Giacinto, G., The PRA and AmILAB at ImageCLEF 2012 Photo Flickr Annotation Task, in CLEF (Online Working Notes/Labs/Workshop), Rome, 2012. (540.05 KB)
Q
G. Giacinto and Roli, F., Query Shifting Based on Bayesian Decision Theory for Content-Based Image Retrieval, in oint IAPR Int. Workshops on Syntactical and Structural Pattern Recognition and Statistical Pattern Recognition (S+SSPR 2002), 2002, vol. 2396, pp. 607-616.
R
L. Borzacchiello, Coppa, E., Maiorca, D., Columbu, A., Demetrescu, C., and Giacinto, G., Reach Me if You Can: On Native Vulnerability Reachability in Android Apps, 27th European Symposium on Research in Computer Security (ESORICS). 2022. (979.51 KB)
G. Fumera, Roli, F., and Giacinto, G., Reject Option with Multiple Thresholds, Pattern Recognition, vol. 33, pp. 2099-2101, 2000.
D. - T. Dang-Nguyen, Piras, L., Giacinto, G., Boato, G., and De Natale, F. G. B., Retrieval of Diverse Images by Pre-filtering and Hierarchical Clustering, in MediaEval (Online Working Notes), Barcelona; Spain, 2014, vol. 1263. (221.52 KB)
T. Hupperich, Maiorca, D., Kührer, M., Holz, T., and Giacinto, G., On the Robustness of Mobile Device Fingerprinting, in 31st Annual Computer Security and Applications Conference (ACSAC 2015), 7-10th December 2015, Los Angeles, USA, 2015, pp. 191-200. (301.87 KB)
D. Maiorca, Mercaldo, F., Giacinto, G., Visaggio, A., and Martinelli, F., R-PackDroid: API Package-Based Characterization and Detection of Mobile Ransomware, in ACM Symposium on Applied Computing (SAC 2017 - Acceptance Rate 15.7%), 2017, pp. 1718-1723. (272.44 KB)
S
R. Perdisci, Ariu, D., and Giacinto, G., Scalable Fine-Grained Behavioral Clustering of HTTP-Based Malware, Computer Networks - Special Issue on Botnet Activity: Analysis, Detection and Shutdown, vol. 57, pp. 487-500, 2013. (797.8 KB)
C. Lobrano, Tronci, R., Giacinto, G., and Roli, F., A Score Decidability Index for Dynamic Score Combination, in Pattern Recognition, International Conference on, Los Alamitos, CA, USA, 2010, pp. 69-72.
G. Giacinto, Roli, F., and Tronci, R., Score Selection Techniques for Fingerprint Multi-modal Biometric Authentication, in 13th International Conference on Image Analysis and Processing (ICIAP 2005), Cagliari (Italy), 2005, vol. 3617, pp. 1018-1025.
B. Biggio, Corona, I., Nelson, B., Rubinstein, B. I. P., Maiorca, D., Fumera, G., Giacinto, G., and Roli, F., Security Evaluation of Support Vector Machines in Adversarial Environments, in Support Vector Machines Applications, Y. Ma and Guo, G. Springer International Publishing, 2014, pp. 105-153. (687.1 KB)
G. Giacinto, Roli, F., and Fumera, G., Selection of classifiers based on multiple classifier behaviour, in Joint IAPR Int. Workshops on Syntactical and Structural Pattern Recognition and Statistical Pattern Recognition (S+SSPR 2000), Alicante, Spain, 2000, vol. 1876, pp. 87-93.
R. Tronci, Giacinto, G., and Roli, F., Selection of experts for the design of multiple biometric systems, in Machine Learning and Data Mining in Pattern Recognition, MLDM 2007, Leipzig, 2007, vol. 4571, pp. 795-809.
G. Giacinto, Roli, F., and Fumera, G., Selection of image classifiers, Electronics Letters, vol. 36, pp. 420-422, 2000.
D. Ariu, Giacinto, G., and Perdisci, R., Sensing attacks in Computers Network with Hidden Markov Models, in Machine Learning and Data Mining in Pattern Recognition, MLDM 2007, Leipzig, 2007, vol. 4571, pp. 449-463. (315.94 KB)
E. Costamagna, Fanni, A., and Giacinto, G., A simulated annealing algorithm for the optimization of communication network, in Int. Symp. on Signals, Systems and Electronics (ISSSE '95), 1995, pp. 405-408.
D. Maiorca, Ariu, D., Corona, I., Aresu, M., and Giacinto, G., Stealth Attacks: An Extended Insight into the Obfuscation Effects on Android Malware, Computers And Security (Elsevier), vol. 51 (June), pp. 16-31, 2015. (413.99 KB)
D. Maiorca, Ariu, D., Corona, I., and Giacinto, G., A Structural and Content-Based Approach for a Precise and Robust Detection of Malicious PDF Files, Proceedings of the 1st International Conference on Information Systems Security and Privacy (ICISSP 2015, 9-11th February 2015, Angers, France). pp. 27-36, 2015. (267.78 KB)

Pages