Publications

Export 141 results:
Filters: Author is Giorgio Giacinto  [Clear All Filters]
2015
M. Aresu, Ariu, D., Ahmadi, M., Maiorca, D., e Giacinto, G., «Clustering Android Malware Families by Http Traffic», in 10h International Conference on Malicious and Unwanted Software (MALCON 2015), October 20-22th 2015, Fajardo, Puerto Rico, USA, 2015. (168.36 KB)
M. Narouei, Ahmadi, M., Giacinto, G., Takabi, H., e Sami, A., «DLLMiner: structural mining for malware detection», Security and Communication Networks, 2015. (731.78 KB)
D. Maiorca, Ariu, D., Corona, I., e Giacinto, G., «An Evasion Resilient Approach to the Detection of Malicious PDF Files», in Information Systems Security and Privacy (Communication in Computer and Information Science), vol 576, Springer, 2015, pagg 68-85. (503.11 KB)
M. Melis, Piras, L., Biggio, B., Giacinto, G., Fumera, G., e Roli, F., «Fast Image Classification with Reduced Multiclass Support Vector Machines», in 18th Int'l Conf. on Image Analysis and Processing, Genova, Italy, 2015, vol Image Analysis and Processing (ICIAP 2015), pagg 78-88. (829.37 KB)
D. - T. Dang-Nguyen, Piras, L., Giacinto, G., Boato, G., e De Natale, F. G. B., «A Hybrid Approach for Retrieving Diverse Social Images of Landmarks», in IEEE International Conference on Multimedia & Expo (ICME), Torino, 2015. (1.16 MB)
D. Ariu, Corona, I., Tronci, R., e Giacinto, G., «Machine Learning in Security Applications», Trans. Mach. Learn. Data Min., vol 8, pagg 3-39, 2015.
D. - T. Dang-Nguyen, Boato, G., De Natale, F. G. B., Piras, L., Giacinto, G., Tuveri, F., e Angioni, M., «Multimodal-based Diversified Summarization in Social Image Retrieval», in Working Notes Proceedings of the MediaEval 2015 Workshop, Wurzen, Germany, September 14-15, 2015., 2015. (755.79 KB)
B. Biggio, Corona, I., He, Z. - M., Chan, P. P. K., Giacinto, G., Yeung, D. S., e Roli, F., «One-and-a-half-class Multiple Classifier Systems for Secure Learning against Evasion Attacks at Test Time», in Int'l Workshop on Multiple Classifier Systems (MCS), 2015, vol 9132, pagg 168-180. (467.23 KB)
I. Corona, Contini, M., Ariu, D., Giacinto, G., Roli, F., Lund, M., e Marinelli, G., «PharmaGuard: Automatic Identification of Illegal Search-Indexed Online Pharmacies», IEEE International Conference on Cybernetics - Special session Cybersecurity (CYBERSEC). IEEE, Gdynia, Poland , pagg 324 - 329, 2015. (1.44 MB) (3.4 MB)
T. Hupperich, Maiorca, D., Kührer, M., Holz, T., e Giacinto, G., «On the Robustness of Mobile Device Fingerprinting», in 31st Annual Computer Security and Applications Conference (ACSAC 2015), 7-10th December 2015, Los Angeles, USA, 2015, pagg 191-200. (301.87 KB)
D. Maiorca, Ariu, D., Corona, I., Aresu, M., e Giacinto, G., «Stealth Attacks: An Extended Insight into the Obfuscation Effects on Android Malware», Computers And Security (Elsevier), vol 51 (June), pagg 16-31, 2015. (413.99 KB)
D. Maiorca, Ariu, D., Corona, I., e Giacinto, G., «A Structural and Content-Based Approach for a Precise and Robust Detection of Malicious PDF Files», Proceedings of the 1st International Conference on Information Systems Security and Privacy (ICISSP 2015, 9-11th February 2015, Angers, France). pagg 27-36, 2015. (267.78 KB)
L. Piras, Furcas, D., e Giacinto, G., «User-driven Nearest-Neighbour Exploration of Image Archives», in 4th International Conference on Pattern Recognition Applications and Methods (ICPRAM), Lisbon, Portugal, 2015, pagg 181 - 189. (376.55 KB)
D. Ariu, Didaci, L., Fumera, G., Frumento, E., Freschi, F., e Giacinto, G., «Yet Another Cybersecurity Roadmapping Methodology», in First International Workshop on Future Scenarios for Cybercrime and Cyber-terrorism, co-located with the 10th International Conference on Availability, Reliability and Security (ARES), 2015. (1.34 MB)
2014
I. Corona, Maiorca, D., Ariu, D., e Giacinto, G., «Lux0R: Detection of Malicious PDF-embedded JavaScript code through Discriminant Analysis of API References», in AISec'14: Proceedings of the 2014 ACM Workshop on Artificial Intelligence and Security, co-located with CCS '14, Scottdale, Arizona, USA, 2014. (455.14 KB)
L. Piras e Giacinto, G., «Open issues on codebook generation in Image Classification tasks», in 10th International Conference Machine Learning and Data Mining (MLDM), St. Petersburg, Russia, 2014, pagg 328-342. (229.92 KB)
B. Biggio, Rieck, K., Ariu, D., Wressnegger, C., Corona, I., Giacinto, G., e Roli, F., «Poisoning Behavioral Malware Clustering», in AISec'14: Proceedings of the 2014 ACM Workshop on Artificial Intelligence and Security, co-located with CCS '14, Scottsdale, Arizona, USA, 2014, pagg 27-36. (375.58 KB)
D. - T. Dang-Nguyen, Piras, L., Giacinto, G., Boato, G., e De Natale, F. G. B., «Retrieval of Diverse Images by Pre-filtering and Hierarchical Clustering», in MediaEval (Online Working Notes), Barcelona; Spain, 2014, vol 1263. (221.52 KB)
B. Biggio, Corona, I., Nelson, B., Rubinstein, B. I. P., Maiorca, D., Fumera, G., Giacinto, G., e Roli, F., «Security Evaluation of Support Vector Machines in Adversarial Environments», in Support Vector Machines Applications, Y. Ma e Guo, G. Springer International Publishing, 2014, pagg 105-153. (687.1 KB)
2013
I. Corona, Giacinto, G., e Roli, F., «Adversarial Attacks against Intrusion Detection Systems: Taxonomy, Solutions and Open Issues», Information Sciences, vol 239, 2013. (1.49 MB)
L. Piras, Tronci, R., e Giacinto, G., «Diversity in ensembles of codebooks for visual concept detection», in 17th Int. Conference on Image Analysis and Processing (ICIAP), Naples, Italy, 2013. (303.73 KB)
B. Biggio, Corona, I., Maiorca, D., Nelson, B., Srndic, N., Laskov, P., Giacinto, G., e Roli, F., «Evasion attacks against machine learning at test time», in European Conference on Machine Learning and Principles and Practice of Knowledge Discovery in Databases (ECML PKDD), 2013, vol 8190, pagg 387-402. (473.78 KB)
R. Tronci, Murgia, G., Pili, M., Piras, L., e Giacinto, G., «ImageHunter: a Novel Tool for Relevance Feedback in Content Based Image Retrieval», in New Challenges in Distributed Information Filtering and Retrieval. DART 2011: Revised and Invited Papers, C. Lai, Semeraro, G., e Vargiu, E. Springer, 2013. (1.98 MB)
D. Maiorca, Corona, I., e Giacinto, G., «Looking at the Bag is not Enough to Find the Bomb: an Evasion of Structural Methods for Malicious PDF Files Detection», in 8th ACM Symposium on Information, Computer and Communications Security (ASIACCS 2013), Hangzhou, China, 2013. (2.12 MB)
L. Piras, Giacinto, G., e Paredes, R., «Passive-Aggressive Online Learning for Relevance Feedback in Content Based Image Retrieval», in 2nd International Conference on Pattern Recognition Applications and Methods (ICPRAM), Barcelona, Spain, 2013. (138.32 KB)

Pages