Sfoglia per Autore
On the Role of Explainable Machine Learning for Secure Smart Vehicles
2020-01-01 Scalas, Michele; Giacinto, Giorgio
Convolutional neural networks for relevance feedback in content based image retrieval: a content based image retrieval system that exploits convolutional neural networks both for feature extraction and for relevance feedback
2020-01-01 Putzu, Lorenzo; Piras, Luca; Giacinto, Giorgio
Detection of Intrusions and Malware, and Vulnerability Assessment
2019-01-01 Perdisci, Roberto; Maurice, Iclémentine; Giacinto, Giorgio; Almgren, Magnus
On the effectiveness of system API-related information for Android ransomware detection
2019-01-01 Scalas, Michele; Maiorca, Davide; Mercaldo, Francesco; Visaggio, Corrado Aaron; Martinelli, Fabio; Giacinto, Giorgio
Automotive cybersecurity: Foundations for next-generation vehicles
2019-01-01 Scalas, M.; Giacinto, G.
PowerDrive: Accurate De-obfuscation and Analysis of PowerShell Malware
2019-01-01 UGARTE ARZAC, Denis; Maiorca, Davide; Cara, Fabrizio; Giacinto, Giorgio
Towards adversarial malware detection: lessons learned from PDF-based attacks
2019-01-01 Maiorca, D.; Biggio, B.; Giacinto, G.
Yes, Machine Learning Can Be More Secure! A Case Study on Android Malware Detection
2019-01-01 Demontis, Ambra; Melis, Marco; Biggio, Battista; Maiorca, Davide; Arp, Daniel; Rieck, Konrad; Corona, Igino; Giacinto, Giorgio; Roli, Fabio
Ten years of relevance score for content based image retrieval
2018-01-01 Putzu, Lorenzo; Piras, Luca; Giacinto, Giorgio
Adversarial Malware Binaries: Evading Deep Learning for Malware Detection in Executables
2018-01-01 Kolosnjaji, Bojan; Demontis, Ambra; Biggio, Battista; Maiorca, Davide; Giacinto, Giorgio; Eckert, Claudia; Roli, Fabio
Explaining black-box android malware detection
2018-01-01 Melis, Marco; Maiorca, Davide; Biggio, Battista; Giacinto, Giorgio; Roli, Fabio
Infinity-norm support vector machines against adversarial label contamination
2017-01-01 Demontis, Ambra; Biggio, Battista; Fumera, Giorgio; Giacinto, Giorgio; Roli, Fabio
DroidSieve: Fast and accurate classification of obfuscated android malware
2017-01-01 Suarez Tangil, Guillermo; Dash, Santanu Kumar; Ahmadi, Mansour; Kinder, Johannes; Giacinto, Giorgio; Cavallaro, Lorenzo
IntelliAV: Toward the feasibility of building intelligent anti-malware on Android devices
2017-01-01 Ahmadi, Mansour; Sotgiu, Angelo; Giacinto, Giorgio
Detection of malicious scripting code through discriminant and adversary-aware API analysis
2017-01-01 Maiorca, Davide; Russu, Paolo; Corona, Igino; Biggio, Battista; Giacinto, Giorgio
Deepsquatting: Learning-based typosquatting detection at deeper domain levels
2017-01-01 Piredda, Paolo; Ariu, Davide; Biggio, Battista; Corona, Igino; Piras, Luca; Giacinto, Giorgio; Roli, Fabio
Multimodal retrieval with diversification and relevance feedback for tourist attraction images
2017-01-01 Dang Nguyen, Duc Tien; Piras, Luca; Giacinto, Giorgio; Boato, Giulia; De Natale, Francesco GB
R-PackDroid: API package-based characterization and detection of mobile ransomware
2017-01-01 Maiorca, Davide; Mercaldo, Francesco; Giacinto, Giorgio; Visaggio, Corrado Aaron; Martinelli, Fabio
Information fusion in content based image retrieval: A comprehensive overview
2017-01-01 Piras, Luca; Giacinto, Giorgio
Novel Feature Extraction, Selection and Fusion for Effective Malware Family Classification
2016-01-01 Ahmadi, Mansour; Ulyanov, D; Semenov, S; Trofimov, M; Giacinto, Giorgio
Titolo | Data di pubblicazione | Autore(i) | Rivista | Editore |
---|---|---|---|---|
On the Role of Explainable Machine Learning for Secure Smart Vehicles | 1-gen-2020 | Scalas, Michele; Giacinto, Giorgio | - | IEEE (Institute of Electrical and Electronics Engineers) |
Convolutional neural networks for relevance feedback in content based image retrieval: a content based image retrieval system that exploits convolutional neural networks both for feature extraction and for relevance feedback | 1-gen-2020 | Putzu, Lorenzo; Piras, Luca; Giacinto, Giorgio | MULTIMEDIA TOOLS AND APPLICATIONS | - |
Detection of Intrusions and Malware, and Vulnerability Assessment | 1-gen-2019 | Perdisci, Roberto; Maurice, Iclémentine; Giacinto, Giorgio; Almgren, Magnus | - | Springer |
On the effectiveness of system API-related information for Android ransomware detection | 1-gen-2019 | Scalas, Michele; Maiorca, Davide; Mercaldo, Francesco; Visaggio, Corrado Aaron; Martinelli, Fabio; Giacinto, Giorgio | COMPUTERS & SECURITY | - |
Automotive cybersecurity: Foundations for next-generation vehicles | 1-gen-2019 | Scalas, M.; Giacinto, G. | - | IEEE (Institute of Electrical and Electronics Engineers) |
PowerDrive: Accurate De-obfuscation and Analysis of PowerShell Malware | 1-gen-2019 | UGARTE ARZAC, Denis; Maiorca, Davide; Cara, Fabrizio; Giacinto, Giorgio | - | Springer |
Towards adversarial malware detection: lessons learned from PDF-based attacks | 1-gen-2019 | Maiorca, D.; Biggio, B.; Giacinto, G. | ACM COMPUTING SURVEYS | - |
Yes, Machine Learning Can Be More Secure! A Case Study on Android Malware Detection | 1-gen-2019 | Demontis, Ambra; Melis, Marco; Biggio, Battista; Maiorca, Davide; Arp, Daniel; Rieck, Konrad; Corona, Igino; Giacinto, Giorgio; Roli, Fabio | IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING | - |
Ten years of relevance score for content based image retrieval | 1-gen-2018 | Putzu, Lorenzo; Piras, Luca; Giacinto, Giorgio | - | Springer Verlag |
Adversarial Malware Binaries: Evading Deep Learning for Malware Detection in Executables | 1-gen-2018 | Kolosnjaji, Bojan; Demontis, Ambra; Biggio, Battista; Maiorca, Davide; Giacinto, Giorgio; Eckert, Claudia; Roli, Fabio | - | IEEE (Institute of Electrical and Electronics Engineers) |
Explaining black-box android malware detection | 1-gen-2018 | Melis, Marco; Maiorca, Davide; Biggio, Battista; Giacinto, Giorgio; Roli, Fabio | - | IEEE, Institute of Electrical and Electronics Engineers |
Infinity-norm support vector machines against adversarial label contamination | 1-gen-2017 | Demontis, Ambra; Biggio, Battista; Fumera, Giorgio; Giacinto, Giorgio; Roli, Fabio | - | CEUR-WS |
DroidSieve: Fast and accurate classification of obfuscated android malware | 1-gen-2017 | Suarez Tangil, Guillermo; Dash, Santanu Kumar; Ahmadi, Mansour; Kinder, Johannes; Giacinto, Giorgio; Cavallaro, Lorenzo | - | Association for Computing Machinery |
IntelliAV: Toward the feasibility of building intelligent anti-malware on Android devices | 1-gen-2017 | Ahmadi, Mansour; Sotgiu, Angelo; Giacinto, Giorgio | - | Springer |
Detection of malicious scripting code through discriminant and adversary-aware API analysis | 1-gen-2017 | Maiorca, Davide; Russu, Paolo; Corona, Igino; Biggio, Battista; Giacinto, Giorgio | - | CEUR-WS |
Deepsquatting: Learning-based typosquatting detection at deeper domain levels | 1-gen-2017 | Piredda, Paolo; Ariu, Davide; Biggio, Battista; Corona, Igino; Piras, Luca; Giacinto, Giorgio; Roli, Fabio | - | Springer |
Multimodal retrieval with diversification and relevance feedback for tourist attraction images | 1-gen-2017 | Dang Nguyen, Duc Tien; Piras, Luca; Giacinto, Giorgio; Boato, Giulia; De Natale, Francesco GB | ACM TRANSACTIONS ON MULTIMEDIA COMPUTING, COMMUNICATIONS AND APPLICATIONS | - |
R-PackDroid: API package-based characterization and detection of mobile ransomware | 1-gen-2017 | Maiorca, Davide; Mercaldo, Francesco; Giacinto, Giorgio; Visaggio, Corrado Aaron; Martinelli, Fabio | - | ACM |
Information fusion in content based image retrieval: A comprehensive overview | 1-gen-2017 | Piras, Luca; Giacinto, Giorgio | INFORMATION FUSION | - |
Novel Feature Extraction, Selection and Fusion for Effective Malware Family Classification | 1-gen-2016 | Ahmadi, Mansour; Ulyanov, D; Semenov, S; Trofimov, M; Giacinto, Giorgio | - | ACM |
Legenda icone
- file ad accesso aperto
- file disponibili sulla rete interna
- file disponibili agli utenti autorizzati
- file disponibili solo agli amministratori
- file sotto embargo
- nessun file disponibile