Sfoglia per Autore

Mostrati risultati da 1 a 20 di 160
Titolo Data di pubblicazione Autore(i) Rivista Editore
Extended Abstract: Effective Call Graph Fingerprinting for the Analysis and Classification of Windows Malware 1-gen-2022 Meloni, Francesco; Sanna, Alessandro; Maiorca, Davide; Giacinto, Giorgio - Springer, Cham
Detection of Intrusions and Malware, and Vulnerability Assessment 1-gen-2022 Cavallaro, Lorenzo; Gruss, Daniel; Pellegrino, Giancarlo; Giacinto, Giorgio - Springer, Cham
Explanation-Driven Characterization of Android Ransomware 1-gen-2021 Scalas, Michele; Rieck, Konrad; Giacinto, Giorgio - -
Do gradient-based explanations tell anything about adversarial robustness to android malware? 1-gen-2021 Melis, M.; Scalas, M.; Demontis, A.; Maiorca, D.; Biggio, B.; Giacinto, G.; Roli, F. INTERNATIONAL JOURNAL OF MACHINE LEARNING AND CYBERNETICS -
On the Feasibility of Adversarial Sample Creation Using the Android System API 1-gen-2020 Cara, Fabrizio; Scalas, Michele; Giacinto, Giorgio; Maiorca, Davide INFORMATION -
Convolutional neural networks for relevance feedback in content based image retrieval: a content based image retrieval system that exploits convolutional neural networks both for feature extraction and for relevance feedback 1-gen-2020 Putzu, Lorenzo; Piras, Luca; Giacinto, Giorgio MULTIMEDIA TOOLS AND APPLICATIONS -
Adversarial Detection of Flash Malware: Limitations and Open Issues 1-gen-2020 Maiorca, D.; Demontis, A.; Biggio, B.; Roli, F.; Giacinto, G. COMPUTERS & SECURITY -
Defensive Programming for Smart Home Cybersecurity 1-gen-2020 Rossi, Maria Teresa; Greca, Renan; Iovino, Ludovico; Giacinto, Giorgio; Bertoli, Antonia - IEEE (Institute of Electrical and Electronics Engineers)
On the Role of Explainable Machine Learning for Secure Smart Vehicles 1-gen-2020 Scalas, Michele; Giacinto, Giorgio - IEEE (Institute of Electrical and Electronics Engineers)
Towards adversarial malware detection: lessons learned from PDF-based attacks 1-gen-2019 Maiorca, D.; Biggio, B.; Giacinto, G. ACM COMPUTING SURVEYS -
Yes, Machine Learning Can Be More Secure! A Case Study on Android Malware Detection 1-gen-2019 Demontis, Ambra; Melis, Marco; Biggio, Battista; Maiorca, Davide; Arp, Daniel; Rieck, Konrad; Corona, Igino; Giacinto, Giorgio; Roli, Fabio IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING -
On the effectiveness of system API-related information for Android ransomware detection 1-gen-2019 Scalas, Michele; Maiorca, Davide; Mercaldo, Francesco; Visaggio, Corrado Aaron; Martinelli, Fabio; Giacinto, Giorgio COMPUTERS & SECURITY -
Detection of Intrusions and Malware, and Vulnerability Assessment 1-gen-2019 Perdisci, Roberto; Maurice, Iclémentine; Giacinto, Giorgio; Almgren, Magnus - Springer
Automotive cybersecurity: Foundations for next-generation vehicles 1-gen-2019 Scalas, M.; Giacinto, G. - IEEE (Institute of Electrical and Electronics Engineers)
PowerDrive: Accurate De-obfuscation and Analysis of PowerShell Malware 1-gen-2019 UGARTE ARZAC, Denis; Maiorca, Davide; Cara, Fabrizio; Giacinto, Giorgio - Springer
Explaining black-box android malware detection 1-gen-2018 Melis, Marco; Maiorca, Davide; Biggio, Battista; Giacinto, Giorgio; Roli, Fabio - IEEE, Institute of Electrical and Electronics Engineers
Ten years of relevance score for content based image retrieval 1-gen-2018 Putzu, Lorenzo; Piras, Luca; Giacinto, Giorgio - Springer Verlag
Adversarial Malware Binaries: Evading Deep Learning for Malware Detection in Executables 1-gen-2018 Kolosnjaji, Bojan; Demontis, Ambra; Biggio, Battista; Maiorca, Davide; Giacinto, Giorgio; Eckert, Claudia; Roli, Fabio - IEEE (Institute of Electrical and Electronics Engineers)
Information fusion in content based image retrieval: A comprehensive overview 1-gen-2017 Piras, Luca; Giacinto, Giorgio INFORMATION FUSION -
DroidSieve: Fast and accurate classification of obfuscated android malware 1-gen-2017 Suarez Tangil, Guillermo; Dash, Santanu Kumar; Ahmadi, Mansour; Kinder, Johannes; Giacinto, Giorgio; Cavallaro, Lorenzo - Association for Computing Machinery
Mostrati risultati da 1 a 20 di 160
Legenda icone

  •  file ad accesso aperto
  •  file disponibili sulla rete interna
  •  file disponibili agli utenti autorizzati
  •  file disponibili solo agli amministratori
  •  file sotto embargo
  •  nessun file disponibile