Sfoglia per Autore
On the Feasibility of Adversarial Sample Creation Using the Android System API
2020-01-01 Cara, Fabrizio; Scalas, Michele; Giacinto, Giorgio; Maiorca, Davide
Adversarial detection of Flash Malware: limitations and Open issues
2020-01-01 Maiorca, D.; Demontis, A.; Biggio, B.; Roli, F.; Giacinto, G.
Defensive Programming for Smart Home Cybersecurity
2020-01-01 Rossi, Maria Teresa; Greca, Renan; Iovino, Ludovico; Giacinto, Giorgio; Bertoli, Antonia
Convolutional neural networks for relevance feedback in content based image retrieval: a content based image retrieval system that exploits convolutional neural networks both for feature extraction and for relevance feedback
2020-01-01 Putzu, Lorenzo; Piras, Luca; Giacinto, Giorgio
On the effectiveness of system API-related information for Android ransomware detection
2019-01-01 Scalas, Michele; Maiorca, Davide; Mercaldo, Francesco; Visaggio, Corrado Aaron; Martinelli, Fabio; Giacinto, Giorgio
Towards adversarial malware detection: lessons learned from PDF-based attacks
2019-01-01 Maiorca, D.; Biggio, B.; Giacinto, G.
Automotive cybersecurity: Foundations for next-generation vehicles
2019-01-01 Scalas, M.; Giacinto, G.
Detection of Intrusions and Malware, and Vulnerability Assessment
2019-01-01 Perdisci, Roberto; Maurice, Iclémentine; Giacinto, Giorgio; Almgren, Magnus
PowerDrive: Accurate De-obfuscation and Analysis of PowerShell Malware
2019-01-01 UGARTE ARZAC, Denis; Maiorca, Davide; Cara, Fabrizio; Giacinto, Giorgio
Yes, Machine Learning Can Be More Secure! A Case Study on Android Malware Detection
2019-01-01 Demontis, Ambra; Melis, Marco; Biggio, Battista; Maiorca, Davide; Arp, Daniel; Rieck, Konrad; Corona, Igino; Giacinto, Giorgio; Roli, Fabio
Explaining black-box android malware detection
2018-01-01 Melis, Marco; Maiorca, Davide; Biggio, Battista; Giacinto, Giorgio; Roli, Fabio
Ten years of relevance score for content based image retrieval
2018-01-01 Putzu, Lorenzo; Piras, Luca; Giacinto, Giorgio
Adversarial Malware Binaries: Evading Deep Learning for Malware Detection in Executables
2018-01-01 Kolosnjaji, Bojan; Demontis, Ambra; Biggio, Battista; Maiorca, Davide; Giacinto, Giorgio; Eckert, Claudia; Roli, Fabio
R-PackDroid: API package-based characterization and detection of mobile ransomware
2017-01-01 Maiorca, Davide; Mercaldo, Francesco; Giacinto, Giorgio; Visaggio, Corrado Aaron; Martinelli, Fabio
Deepsquatting: Learning-based typosquatting detection at deeper domain levels
2017-01-01 Piredda, Paolo; Ariu, Davide; Biggio, Battista; Corona, Igino; Piras, Luca; Giacinto, Giorgio; Roli, Fabio
DroidSieve: Fast and accurate classification of obfuscated android malware
2017-01-01 Suarez Tangil, Guillermo; Dash, Santanu Kumar; Ahmadi, Mansour; Kinder, Johannes; Giacinto, Giorgio; Cavallaro, Lorenzo
Infinity-norm support vector machines against adversarial label contamination
2017-01-01 Demontis, Ambra; Biggio, Battista; Fumera, Giorgio; Giacinto, Giorgio; Roli, Fabio
Detection of malicious scripting code through discriminant and adversary-aware API analysis
2017-01-01 Maiorca, Davide; Russu, Paolo; Corona, Igino; Biggio, Battista; Giacinto, Giorgio
Information fusion in content based image retrieval: A comprehensive overview
2017-01-01 Piras, Luca; Giacinto, Giorgio
IntelliAV: Toward the feasibility of building intelligent anti-malware on Android devices
2017-01-01 Ahmadi, Mansour; Sotgiu, Angelo; Giacinto, Giorgio
Titolo | Data di pubblicazione | Autore(i) | Rivista | Editore |
---|---|---|---|---|
On the Feasibility of Adversarial Sample Creation Using the Android System API | 1-gen-2020 | Cara, Fabrizio; Scalas, Michele; Giacinto, Giorgio; Maiorca, Davide | INFORMATION | - |
Adversarial detection of Flash Malware: limitations and Open issues | 1-gen-2020 | Maiorca, D.; Demontis, A.; Biggio, B.; Roli, F.; Giacinto, G. | COMPUTERS & SECURITY | - |
Defensive Programming for Smart Home Cybersecurity | 1-gen-2020 | Rossi, Maria Teresa; Greca, Renan; Iovino, Ludovico; Giacinto, Giorgio; Bertoli, Antonia | - | IEEE (Institute of Electrical and Electronics Engineers) |
Convolutional neural networks for relevance feedback in content based image retrieval: a content based image retrieval system that exploits convolutional neural networks both for feature extraction and for relevance feedback | 1-gen-2020 | Putzu, Lorenzo; Piras, Luca; Giacinto, Giorgio | MULTIMEDIA TOOLS AND APPLICATIONS | - |
On the effectiveness of system API-related information for Android ransomware detection | 1-gen-2019 | Scalas, Michele; Maiorca, Davide; Mercaldo, Francesco; Visaggio, Corrado Aaron; Martinelli, Fabio; Giacinto, Giorgio | COMPUTERS & SECURITY | - |
Towards adversarial malware detection: lessons learned from PDF-based attacks | 1-gen-2019 | Maiorca, D.; Biggio, B.; Giacinto, G. | ACM COMPUTING SURVEYS | - |
Automotive cybersecurity: Foundations for next-generation vehicles | 1-gen-2019 | Scalas, M.; Giacinto, G. | - | IEEE (Institute of Electrical and Electronics Engineers) |
Detection of Intrusions and Malware, and Vulnerability Assessment | 1-gen-2019 | Perdisci, Roberto; Maurice, Iclémentine; Giacinto, Giorgio; Almgren, Magnus | - | Springer |
PowerDrive: Accurate De-obfuscation and Analysis of PowerShell Malware | 1-gen-2019 | UGARTE ARZAC, Denis; Maiorca, Davide; Cara, Fabrizio; Giacinto, Giorgio | - | Springer |
Yes, Machine Learning Can Be More Secure! A Case Study on Android Malware Detection | 1-gen-2019 | Demontis, Ambra; Melis, Marco; Biggio, Battista; Maiorca, Davide; Arp, Daniel; Rieck, Konrad; Corona, Igino; Giacinto, Giorgio; Roli, Fabio | IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING | - |
Explaining black-box android malware detection | 1-gen-2018 | Melis, Marco; Maiorca, Davide; Biggio, Battista; Giacinto, Giorgio; Roli, Fabio | - | IEEE, Institute of Electrical and Electronics Engineers |
Ten years of relevance score for content based image retrieval | 1-gen-2018 | Putzu, Lorenzo; Piras, Luca; Giacinto, Giorgio | - | Springer Verlag |
Adversarial Malware Binaries: Evading Deep Learning for Malware Detection in Executables | 1-gen-2018 | Kolosnjaji, Bojan; Demontis, Ambra; Biggio, Battista; Maiorca, Davide; Giacinto, Giorgio; Eckert, Claudia; Roli, Fabio | - | IEEE (Institute of Electrical and Electronics Engineers) |
R-PackDroid: API package-based characterization and detection of mobile ransomware | 1-gen-2017 | Maiorca, Davide; Mercaldo, Francesco; Giacinto, Giorgio; Visaggio, Corrado Aaron; Martinelli, Fabio | - | ACM |
Deepsquatting: Learning-based typosquatting detection at deeper domain levels | 1-gen-2017 | Piredda, Paolo; Ariu, Davide; Biggio, Battista; Corona, Igino; Piras, Luca; Giacinto, Giorgio; Roli, Fabio | - | Springer |
DroidSieve: Fast and accurate classification of obfuscated android malware | 1-gen-2017 | Suarez Tangil, Guillermo; Dash, Santanu Kumar; Ahmadi, Mansour; Kinder, Johannes; Giacinto, Giorgio; Cavallaro, Lorenzo | - | Association for Computing Machinery |
Infinity-norm support vector machines against adversarial label contamination | 1-gen-2017 | Demontis, Ambra; Biggio, Battista; Fumera, Giorgio; Giacinto, Giorgio; Roli, Fabio | - | CEUR-WS |
Detection of malicious scripting code through discriminant and adversary-aware API analysis | 1-gen-2017 | Maiorca, Davide; Russu, Paolo; Corona, Igino; Biggio, Battista; Giacinto, Giorgio | - | CEUR-WS |
Information fusion in content based image retrieval: A comprehensive overview | 1-gen-2017 | Piras, Luca; Giacinto, Giorgio | INFORMATION FUSION | - |
IntelliAV: Toward the feasibility of building intelligent anti-malware on Android devices | 1-gen-2017 | Ahmadi, Mansour; Sotgiu, Angelo; Giacinto, Giorgio | - | Springer |
Legenda icone
- file ad accesso aperto
- file disponibili sulla rete interna
- file disponibili agli utenti autorizzati
- file disponibili solo agli amministratori
- file sotto embargo
- nessun file disponibile