Showing results 1 to 20 of 160
Title Issue Date Author(s) Journal Publisher
Extended Abstract: Effective Call Graph Fingerprinting for the Analysis and Classification of Windows Malware 1-Jan-2022 Meloni, Francesco; Sanna, Alessandro; Maiorca, Davide; Giacinto, Giorgio - Springer, Cham
Detection of Intrusions and Malware, and Vulnerability Assessment 1-Jan-2022 Cavallaro, Lorenzo; Gruss, Daniel; Pellegrino, Giancarlo; Giacinto, Giorgio - Springer, Cham
Explanation-Driven Characterization of Android Ransomware 1-Jan-2021 Scalas, Michele; Rieck, Konrad; Giacinto, Giorgio - -
Do gradient-based explanations tell anything about adversarial robustness to android malware? 1-Jan-2021 Melis, M.; Scalas, M.; Demontis, A.; Maiorca, D.; Biggio, B.; Giacinto, G.; Roli, F. INTERNATIONAL JOURNAL OF MACHINE LEARNING AND CYBERNETICS -
Defensive Programming for Smart Home Cybersecurity 1-Jan-2020 Rossi, Maria Teresa; Greca, Renan; Iovino, Ludovico; Giacinto, Giorgio; Bertoli, Antonia - IEEE (Institute of Electrical and Electronics Engineers)
On the Feasibility of Adversarial Sample Creation Using the Android System API 1-Jan-2020 Cara, Fabrizio; Scalas, Michele; Giacinto, Giorgio; Maiorca, Davide INFORMATION -
Convolutional neural networks for relevance feedback in content based image retrieval: a content based image retrieval system that exploits convolutional neural networks both for feature extraction and for relevance feedback 1-Jan-2020 Putzu, Lorenzo; Piras, Luca; Giacinto, Giorgio MULTIMEDIA TOOLS AND APPLICATIONS -
Adversarial Detection of Flash Malware: Limitations and Open Issues 1-Jan-2020 Maiorca, D.; Demontis, A.; Biggio, B.; Roli, F.; Giacinto, G. COMPUTERS & SECURITY -
On the Role of Explainable Machine Learning for Secure Smart Vehicles 1-Jan-2020 Scalas, Michele; Giacinto, Giorgio - IEEE (Institute of Electrical and Electronics Engineers)
PowerDrive: Accurate De-obfuscation and Analysis of PowerShell Malware 1-Jan-2019 UGARTE ARZAC, Denis; Maiorca, Davide; Cara, Fabrizio; Giacinto, Giorgio - Springer
Towards adversarial malware detection: lessons learned from PDF-based attacks 1-Jan-2019 Maiorca, D.; Biggio, B.; Giacinto, G. ACM COMPUTING SURVEYS -
Yes, Machine Learning Can Be More Secure! A Case Study on Android Malware Detection 1-Jan-2019 Demontis, Ambra; Melis, Marco; Biggio, Battista; Maiorca, Davide; Arp, Daniel; Rieck, Konrad; Corona, Igino; Giacinto, Giorgio; Roli, Fabio IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING -
Automotive cybersecurity: Foundations for next-generation vehicles 1-Jan-2019 Scalas, M.; Giacinto, G. - IEEE (Institute of Electrical and Electronics Engineers)
On the effectiveness of system API-related information for Android ransomware detection 1-Jan-2019 Scalas, Michele; Maiorca, Davide; Mercaldo, Francesco; Visaggio, Corrado Aaron; Martinelli, Fabio; Giacinto, Giorgio COMPUTERS & SECURITY -
Detection of Intrusions and Malware, and Vulnerability Assessment 1-Jan-2019 Perdisci, Roberto; Maurice, Iclémentine; Giacinto, Giorgio; Almgren, Magnus - Springer
Explaining black-box android malware detection 1-Jan-2018 Melis, Marco; Maiorca, Davide; Biggio, Battista; Giacinto, Giorgio; Roli, Fabio - IEEE, Institute of Electrical and Electronics Engineers
Ten years of relevance score for content based image retrieval 1-Jan-2018 Putzu, Lorenzo; Piras, Luca; Giacinto, Giorgio - Springer Verlag
Adversarial Malware Binaries: Evading Deep Learning for Malware Detection in Executables 1-Jan-2018 Kolosnjaji, Bojan; Demontis, Ambra; Biggio, Battista; Maiorca, Davide; Giacinto, Giorgio; Eckert, Claudia; Roli, Fabio - IEEE (Institute of Electrical and Electronics Engineers)
Information fusion in content based image retrieval: A comprehensive overview 1-Jan-2017 Piras, Luca; Giacinto, Giorgio INFORMATION FUSION -
DroidSieve: Fast and accurate classification of obfuscated android malware 1-Jan-2017 Suarez Tangil, Guillermo; Dash, Santanu Kumar; Ahmadi, Mansour; Kinder, Johannes; Giacinto, Giorgio; Cavallaro, Lorenzo - Association for Computing Machinery
Showing results 1 to 20 of 160
Icon legend

  •  files available
  •  files available on intranet
  •  files available for authorized users
  •  files available for administrators
  •  files under embargo
  •  no files available

Questionnaire and social

Share on:
Impostazioni cookie