GIACINTO, GIORGIO

GIACINTO, GIORGIO  

DIPARTIMENTO DI INGEGNERIA ELETTRICA ED ELETTRONICA  

Mostra records
Risultati 1 - 20 di 173 (tempo di esecuzione: 0.037 secondi).
Titolo Data di pubblicazione Autore(i) Rivista Editore
HO-FMN: Hyperparameter optimization for fast minimum-norm attacks 1-gen-2025 Mura, Raffaele; Floris, Giuseppe; Scionis, Luca; Piras, Giorgio; Pintor, Maura; Demontis, Ambra; Giacinto, Giorgio; Biggio, Battista; Roli, Fabio NEUROCOMPUTING -
A risk estimation study of native code vulnerabilities in Android applications 1-gen-2024 Sanna, S. L.; Soi, D.; Maiorca, D.; Fumera, G.; Giacinto, G. JOURNAL OF CYBERSECURITY -
Bringing Binary Exploitation at Port 80: Understanding C Vulnerabilities in WebAssembly 1-gen-2024 Massidda, Emmanuele; Pisu, Lorenzo; Maiorca, Davide; Giacinto, Giorgio - -
Do you Trust your Device? Open Challenges in IoT Security Analysis 1-gen-2024 Binosi, Lorenzo; Mazzini, Pietro; Sanna, Alessandro; Carminati, Michele; Giacinto, Giorgio; Lazzeretti, Riccardo; Zanero, Stefano; Polino, Mario; Coppa, Emilio; Maiorca, Davide - SciTePress - Science and and Technology Publications
Enhancing android malware detection explainability through function call graph APIs 1-gen-2024 Soi, Diego; Sanna, Alessandro; Maiorca, Davide; Giacinto, Giorgio JOURNAL OF INFORMATION SECURITY AND APPLICATIONS -
Oblivion: an open-source system for large-scale analysis of macro-based office malware 1-gen-2024 Sanna, Alessandro; Cara, Fabrizio; Maiorca, Davide; Giacinto, Giorgio JOURNAL OF COMPUTER VIROLOGY AND HACKING TECHNIQUES -
A Targeted Assessment of Cross-Site Scripting Detection Tools 1-gen-2023 Pala, Bruno; Pisu, Lorenzo; Sanna, SILVIA LUCIA; Maiorca, Davide; Giacinto, Giorgio - -
AI for Cybersecurity: Robust models for Authentication, Threat and Anomaly Detection 1-gen-2023 Bergadano, Francesco; Giacinto, Giorgio ALGORITHMS mdpi
Explaining the Use of Cryptographic API in Android Malware 1-gen-2023 Janovsky, Adam; Maiorca, Davide; Macko, Dominik; Matyas, Vashek; Giacinto, Giorgio - Springer
Improving malware detection with explainable machine learning 1-gen-2023 Scalas, Michele; Rieck, Konrad; Giacinto, Giorgio - Academic Press
Special Issue "AI for Cybersecurity: Robust Models for Authentication, Threat and Anomaly Detection" 1-gen-2023 Bergadano, F; Giacinto, G ALGORITHMS -
A Longitudinal Study of Cryptographic API: A Decade of Android Malware 1-gen-2022 Janovsky, A; Maiorca, D; Macko, D; Matyas, V; Giacinto, G - SCITEPRESS
Detection of Intrusions and Malware, and Vulnerability Assessment 1-gen-2022 Cavallaro, Lorenzo; Gruss, Daniel; Pellegrino, Giancarlo; Giacinto, Giorgio - Springer, Cham
Do gradient-based explanations tell anything about adversarial robustness to android malware? 1-gen-2022 Melis, M.; Scalas, M.; Demontis, A.; Maiorca, D.; Biggio, B.; Giacinto, G.; Roli, F. INTERNATIONAL JOURNAL OF MACHINE LEARNING AND CYBERNETICS -
Extended Abstract: Effective Call Graph Fingerprinting for the Analysis and Classification of Windows Malware 1-gen-2022 Meloni, Francesco; Sanna, Alessandro; Maiorca, Davide; Giacinto, Giorgio - Springer
Reach Me if You Can: On Native Vulnerability Reachability in Android Apps 1-gen-2022 Borzacchiello, Luca; Coppa, Emilio; Maiorca, Davide; Columbu, Andrea; Demetrescu, Camil; Giacinto, Giorgio - Springer
Reach Me if You Can: On Native Vulnerability Reachability in Android Apps 1-gen-2022 Borzacchiello, Luca; Coppa, Emilio; Maiorca, Davide; Columbu, Andrea; Demetrescu, Camil; Giacinto, Giorgio - -
Explanation-Driven Characterization of Android Ransomware 1-gen-2021 Scalas, Michele; Rieck, Konrad; Giacinto, Giorgio - -
PowerDecode: a PowerShell Script Decoder Dedicated to Malware Analysis 1-gen-2021 Mario Malandrone, Giuseppe; Virdis, Giovanni; Giacinto, Giorgio; Maiorca, Davide - CEUR-WS.org
Adversarial Detection of Flash Malware: Limitations and Open Issues 1-gen-2020 Maiorca, D.; Demontis, A.; Biggio, B.; Roli, F.; Giacinto, G. COMPUTERS & SECURITY -