Publications

Export 140 results:
Filters: Author is Giorgio Giacinto  [Clear All Filters]
2014
D. - T. Dang-Nguyen, Piras, L., Giacinto, G., Boato, G., and De Natale, F. G. B., Retrieval of Diverse Images by Pre-filtering and Hierarchical Clustering, in MediaEval (Online Working Notes), Barcelona; Spain, 2014, vol. 1263. (221.52 KB)
B. Biggio, Corona, I., Nelson, B., Rubinstein, B. I. P., Maiorca, D., Fumera, G., Giacinto, G., and Roli, F., Security Evaluation of Support Vector Machines in Adversarial Environments, in Support Vector Machines Applications, Y. Ma and Guo, G. Springer International Publishing, 2014, pp. 105-153. (687.1 KB)
2015
J. Armin, Thompson, B., Kijewski, P., Ariu, D., Giacinto, G., and Roli, F., 2020 Cybercrime Economic Costs: No measure No solution, in First International Workshop on Future Scenarios for Cybercrime and Cyber-terrorism, co-located with the 10th International Conference on Availability, Reliability and Security (ARES), 2015. (526.44 KB)
M. Aresu, Ariu, D., Ahmadi, M., Maiorca, D., and Giacinto, G., Clustering Android Malware Families by Http Traffic, in 10h International Conference on Malicious and Unwanted Software (MALCON 2015), October 20-22th 2015, Fajardo, Puerto Rico, USA, 2015. (168.36 KB)
M. Narouei, Ahmadi, M., Giacinto, G., Takabi, H., and Sami, A., DLLMiner: structural mining for malware detection, Security and Communication Networks, 2015. (731.78 KB)
D. Maiorca, Ariu, D., Corona, I., and Giacinto, G., An Evasion Resilient Approach to the Detection of Malicious PDF Files, in Information Systems Security and Privacy (Communication in Computer and Information Science), vol. 576, Springer, 2015, pp. 68-85. (503.11 KB)
M. Melis, Piras, L., Biggio, B., Giacinto, G., Fumera, G., and Roli, F., Fast Image Classification with Reduced Multiclass Support Vector Machines, in 18th Int'l Conf. on Image Analysis and Processing, Genova, Italy, 2015, vol. Image Analysis and Processing (ICIAP 2015), pp. 78-88. (829.37 KB)
D. - T. Dang-Nguyen, Piras, L., Giacinto, G., Boato, G., and De Natale, F. G. B., A Hybrid Approach for Retrieving Diverse Social Images of Landmarks, in IEEE International Conference on Multimedia & Expo (ICME), Torino, 2015. (1.16 MB)
D. Ariu, Corona, I., Tronci, R., and Giacinto, G., Machine Learning in Security Applications, Trans. Mach. Learn. Data Min., vol. 8, pp. 3-39, 2015.
D. - T. Dang-Nguyen, Boato, G., De Natale, F. G. B., Piras, L., Giacinto, G., Tuveri, F., and Angioni, M., Multimodal-based Diversified Summarization in Social Image Retrieval, in Working Notes Proceedings of the MediaEval 2015 Workshop, Wurzen, Germany, September 14-15, 2015., 2015. (755.79 KB)
B. Biggio, Corona, I., He, Z. - M., Chan, P. P. K., Giacinto, G., Yeung, D. S., and Roli, F., One-and-a-half-class Multiple Classifier Systems for Secure Learning against Evasion Attacks at Test Time, in Int'l Workshop on Multiple Classifier Systems (MCS), 2015, vol. 9132, pp. 168-180. (467.23 KB)
I. Corona, Contini, M., Ariu, D., Giacinto, G., Roli, F., Lund, M., and Marinelli, G., PharmaGuard: Automatic Identification of Illegal Search-Indexed Online Pharmacies, IEEE International Conference on Cybernetics - Special session Cybersecurity (CYBERSEC). IEEE, Gdynia, Poland , pp. 324 - 329, 2015. (1.44 MB) (3.4 MB)
T. Hupperich, Maiorca, D., Kührer, M., Holz, T., and Giacinto, G., On the Robustness of Mobile Device Fingerprinting, in 31st Annual Computer Security and Applications Conference (ACSAC 2015), 7-10th December 2015, Los Angeles, USA, 2015, pp. 191-200. (301.87 KB)
D. Maiorca, Ariu, D., Corona, I., Aresu, M., and Giacinto, G., Stealth Attacks: An Extended Insight into the Obfuscation Effects on Android Malware, Computers And Security (Elsevier), vol. 51 (June), pp. 16-31, 2015. (413.99 KB)
D. Maiorca, Ariu, D., Corona, I., and Giacinto, G., A Structural and Content-Based Approach for a Precise and Robust Detection of Malicious PDF Files, Proceedings of the 1st International Conference on Information Systems Security and Privacy (ICISSP 2015, 9-11th February 2015, Angers, France). pp. 27-36, 2015. (267.78 KB)
L. Piras, Furcas, D., and Giacinto, G., User-driven Nearest-Neighbour Exploration of Image Archives, in 4th International Conference on Pattern Recognition Applications and Methods (ICPRAM), Lisbon, Portugal, 2015, pp. 181 - 189. (376.55 KB)
D. Ariu, Didaci, L., Fumera, G., Frumento, E., Freschi, F., and Giacinto, G., Yet Another Cybersecurity Roadmapping Methodology, in First International Workshop on Future Scenarios for Cybercrime and Cyber-terrorism, co-located with the 10th International Conference on Availability, Reliability and Security (ARES), 2015. (1.34 MB)
2016
M. Ahmadi, Biggio, B., Arzt, S., Ariu, D., and Giacinto, G., Detecting Misuse of Google Cloud Messaging in Android Badware, in 6th Workshop on Security and Privacy in Smartphones and Mobile Devices (SPSM), Vienna, Austria, 2016, pp. 103-112. (626.38 KB)
J. Hoffmann, Rytilahti, T., Maiorca, D., Winandy, M., Giacinto, G., and Holz, T., Evaluating Analysis Tools for Android Apps: Status Quo and Robustness against Obfuscation, Proceedings of the 6th ACM Conference on Data and Application Security and Privacy (CODASPY 2016, 09-11 March, 2016). 2016. (726.65 KB)
J. Hoffmann, Rytilahti, T., Maiorca, D., Winandy, M., Giacinto, G., and Holz, T., Evaluating Analysis Tools for Android Apps: Status Quo and Robustness Against Obfuscation, Horst Görtz Institut for IT Security (Ruhr-University Bochum), Technical Report TR-HGI-2016-003, 2016. (519.16 KB)
M. Ahmadi, Ulyanov, D., Semenov, S., Trofimov, M., and Giacinto, G., Novel Feature Extraction, Selection and Fusion for Effective Malware Family Classification, in Proceedings of the Sixth ACM on Conference on Data and Application Security and Privacy, 2016, pp. 183–194. (6.49 MB)
M. Contini, Corona, I., Mulas, A., Giacinto, G., and Ariu, D., Pharmaguard WebApp: an application for the detection of illegal online pharmacies, 2nd International Workshop on Knowledge Discovery on the WEB (KDWEB). Cagliari, 2016. (120.57 KB)
D. M. Freeman, Jain, S., Duermuth, M., Biggio, B., and Giacinto, G., Who Are You? A Statistical Approach to Measuring User Authenticity, in Proc. 23rd Annual Network & Distributed System Security Symposium (NDSS), 2016. (764.14 KB)
2017
P. Piredda, Ariu, D., Biggio, B., Corona, I., Piras, L., Giacinto, G., and Roli, F., Deepsquatting: Learning-based Typosquatting Detection at Deeper Domain Levels, in 16th International Conference of the Italian Association for Artificial Intelligence (AI*IA 2017), 2017, vol. 10640 of LNCS, pp. 347-358. (1.21 MB)
D. Maiorca, Russu, P., Corona, I., Biggio, B., and Giacinto, G., Detection of Malicious Scripting Code through Discriminant and Adversary-Aware API Analysis, in 1st Italian Conference on CyberSecurity (ITASEC), 2017, vol. 1816, pp. 96-105. (371.53 KB)

Pages