Showing results 1 to 50 of 156
next >
Title Issue Date Author(s) Journal Publisher
Explanation-Driven Characterization of Android Ransomware 2021 Scalas, Michele; Rieck, Konrad; Giacinto, Giorgio
Do gradient-based explanations tell anything about adversarial robustness to android malware? 2021 Melis, M.; Scalas, M.; Demontis, A.; Maiorca, D.; Biggio, B.; Giacinto, G.; Roli, F. INTERNATIONAL JOURNAL OF MACHINE LEARNING AND CYBERNETICS
Defensive Programming for Smart Home Cybersecurity 2020 Rossi, Maria Teresa; Greca, Renan; Iovino, Ludovico; Giacinto, Giorgio; Bertoli, Antonia IEEE (Institute of Electrical and Electronics Engineers)
On the Role of Explainable Machine Learning for Secure Smart Vehicles 2020 Scalas, Michele; Giacinto, Giorgio IEEE (Institute of Electrical and Electronics Engineers)
Adversarial Detection of Flash Malware: Limitations and Open Issues 2020 Maiorca, D.; Demontis, A.; Biggio, B.; Roli, F.; Giacinto, G. COMPUTERS & SECURITY
On the Feasibility of Adversarial Sample Creation Using the Android System API 2020 Cara, Fabrizio; Scalas, Michele; Giacinto, Giorgio; Maiorca, Davide INFORMATION
Convolutional neural networks for relevance feedback in content based image retrieval: a content based image retrieval system that exploits convolutional neural networks both for feature extraction and for relevance feedback 2020 Putzu, Lorenzo; Piras, Luca; Giacinto, Giorgio MULTIMEDIA TOOLS AND APPLICATIONS
Detection of Intrusions and Malware, and Vulnerability Assessment 2019 Perdisci, Roberto; Maurice, iClémentine; Giacinto, Giorgio; Almgren, Magnus Springer
PowerDrive: Accurate De-obfuscation and Analysis of PowerShell Malware 2019 Ugarte, Denis; Maiorca, Davide; Cara, Fabrizio; Giacinto, Giorgio Springer
Automotive cybersecurity: Foundations for next-generation vehicles 2019 Scalas, M.; Giacinto, G. IEEE (Institute of Electrical and Electronics Engineers)
On the effectiveness of system API-related information for Android ransomware detection 2019 Scalas, Michele; Maiorca, Davide; Mercaldo, Francesco; Visaggio, Corrado Aaron; Martinelli, Fabio...; Giacinto, Giorgio COMPUTERS & SECURITY
Yes, Machine Learning Can Be More Secure! A Case Study on Android Malware Detection 2019 Demontis, Ambra; Melis, Marco; Biggio, Battista; Maiorca, Davide; Arp, Daniel; Rieck, Konrad; Cor...ona, Igino; Giacinto, Giorgio; Roli, Fabio IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING
Towards adversarial malware detection: lessons learned from PDF-based attacks 2019 Maiorca, D.; Biggio, B.; Giacinto, G. ACM COMPUTING SURVEYS
Adversarial Malware Binaries: Evading Deep Learning for Malware Detection in Executables 2018 Kolosnjaji, Bojan; Demontis, Ambra; Biggio, Battista; Maiorca, Davide; Giacinto, Giorgio; Eckert,... Claudia; Roli, Fabio IEEE (Institute of Electrical and Electronics Engineers)
Ten years of relevance score for content based image retrieval 2018 Putzu, Lorenzo; Piras, Luca; Giacinto, Giorgio Springer Verlag
Explaining black-box android malware detection 2018 Melis, Marco; Maiorca, Davide; Biggio, Battista; Giacinto, Giorgio; Roli, Fabio IEEE, Institute of Electrical and Electronics Engineers
Infinity-norm support vector machines against adversarial label contamination 2017 Demontis, Ambra; Biggio, Battista; Fumera, Giorgio; Giacinto, Giorgio; Roli, Fabio CEUR-WS
Detection of malicious scripting code through discriminant and adversary-aware API analysis 2017 Maiorca, Davide; Russu, Paolo; Corona, Igino; Biggio, Battista; Giacinto, Giorgio CEUR-WS
Deepsquatting: Learning-based typosquatting detection at deeper domain levels 2017 Piredda, Paolo; Ariu, Davide; Biggio, Battista; Corona, Igino; Piras, Luca; Giacinto, Giorgio; Ro...li, Fabio Springer
IntelliAV: Toward the feasibility of building intelligent anti-malware on Android devices 2017 Ahmadi, Mansour; Sotgiu, Angelo; Giacinto, Giorgio Springer
Information fusion in content based image retrieval: A comprehensive overview 2017 Piras L; Giacinto G INFORMATION FUSION
DroidSieve: Fast and accurate classification of obfuscated android malware 2017 Suarez Tangil, Guillermo; Dash, Santanu Kumar; Ahmadi, Mansour; Kinder, Johannes; Giacinto, Giorg...io; Cavallaro, Lorenzo Association for Computing Machinery
R-PackDroid: API package-based characterization and detection of mobile ransomware 2017 Maiorca, Davide; Mercaldo, Francesco; Giacinto, Giorgio; Visaggio, Corrado Aaron; Martinelli, Fabio ACM
Multimodal retrieval with diversification and relevance feedback for tourist attraction images 2017 Dang Nguyen, Duc Tien; Piras, Luca; Giacinto, Giorgio; Boato, Giulia; De Natale, Francesco GB ACM TRANSACTIONS ON MULTIMEDIA COMPUTING, COMMUNICATIONS AND APPLICATIONS
Who are you? A statistical approach to measuring user authenticity 2016 Jain, S; Mandell Freeman, M; Biggio, Battista; Duermuth, M; Giacinto, Giorgio The Internet Society
Pharmaguard WebApp: An application for the detection of illegal online pharmacies 2016 Contini, Matteo; Corona, Igino; Mulas, Alessio; Giacinto, Giorgio; Ariu, Davide CEUR-WS
Evaluating Analysis Tools for Android Apps: Status Quo and Robustness Against Obfuscation 2016 Hoffmann J; Rytilahti T; Maiorca D; Winandy M; Giacinto G; Holz T ACM
A (Cyber)ROAD to the Future: A Methodology for Building Cybersecurity Research Roadmaps 2016 Ariu, Davide; Didaci, Luca; Fumera, Giorgio; Giacinto, Giorgio; Roli, Fabio; Frumento, Enrico; Fr...eschi, Federica Springer
Novel Feature Extraction, Selection and Fusion for Effective Malware Family Classification 2016 Ahmadi M; Ulyanov D; Semenov S; Trofimov M; Giacinto G ACM
Clustering android malware families by Http traffic 2016 Aresu, Marco; Ariu, Davide; Ahmadi, Mansour; Maiorca, Davide; Giacinto, Giorgio IEEE (Institute of Electrical and Electronics Engineers)
Detecting Misuse of Google Cloud Messaging in Android Badware 2016 Ahmadi, Mansour; Biggio, Battista; Arzt, S; Ariu, Davide; Giacinto, Giorgio ACM (Association for Computing Machinery)
A Structural and Content-Based Approach for a Precise and Robust Detection of Malicious PDF Files 2015 Maiorca, Davide; Ariu, Davide; Corona, Igino; Giacinto, Giorgio SciTePress
Multimodal-based Diversified Summarization in Social Image Retrieval 2015 Dang Nguyen, Duc Tien; Boato, G; De Natale F. G., B; Piras, Luca; Giacinto, Giorgio; Tuveri, F; A...ngioni, M.
Machine Learning in Security Applications 2015 Ariu D; Corona I; Tronci R; Giacinto G TRANSACTIONS ON MACHINE LEARNING AND DATA MINING
On the Robustness of Mobile Device Fingerprinting 2015 Hupperich, T; Maiorca, D; Kührer, M; Holz, T; Giacinto, G ACM
One-and-a-half-class multiple classifier systems for secure learning against evasion attacks at test time 2015 Biggio, Battista; Corona, Igino; He, Z. M.; Chan P., P; Giacinto, Giorgio; Yeung D., S; Roli, Fabio Springer Verlag
Fast image classification with reduced multiclass support vector machines 2015 Melis, Marco; Piras, Luca; Biggio, Battista; Giacinto, Giorgio; Fumera, Giorgio; Roli, Fabio Springer
Stealth attacks: An extended insight into the obfuscation effects on Android malware 2015 Maiorca D; Ariu D; Corona I; Aresu M; Giacinto G COMPUTERS & SECURITY
PharmaGuard: Automatic identification of illegal search-indexed online pharmacies 2015 Corona I; Contini M; Ariu D; Giacinto G; Roli F; Lund M; Marinelli G IEEE
User-driven Nearest-Neighbour Exploration of Image Archives 2015 Piras, Luca; Furcas, D; Giacinto, Giorgio
DLLMiner: structural mining for malware detection 2015 Narouei M; Ahmadi M; Giacinto G; Takabi H; Sami A SECURITY AND COMMUNICATION NETWORKS
A hybrid approach for retrieving diverse social images of landmarks 2015 Dang Nguyen D N; Piras L; Giacinto G; Boato G; De Natale F IEEE
Yet Another Cybersecurity Roadmapping Methodology 2015 Ariu, Davide; Didaci, Luca; Fumera, Giorgio; Frumento, E; Freschi, F; Giacinto, Giorgio; Roli, Fabio IEEE
An Evasion Resilient Approach to the Detection of Malicious PDF Files 2015 Maiorca D; Ariu D; Corona I; Giacinto G Springer
2020 Cybercrime Economic Costs: No Measure No Solution 2015 Armin, J; Thompson, B; Ariu, Davide; Giacinto, Giorgio; Roli, Fabio; Kijewski, P. IEEE (Institute of Electrical and Electronics Engineers)
Retrieval of Diverse Images by Pre-filtering and Hierarchical Clustering 2014 Dang-Nguyen D T; Piras L; Giacinto G; Boato G; De Natale F G B CEUR WORKSHOP PROCEEDINGS
Poisoning behavioral malware clustering 2014 Biggio, Battista; Rieck, K; Ariu, Davide; Wressnegger, C; Corona, Igino; Giacinto, Giorgio; Roli,... Fabio ACM
Open issues on codebook generation in image classification tasks 2014 Piras L; Giacinto G LECTURE NOTES IN COMPUTER SCIENCE Springer
Security Evaluation of Support Vector Machines in Adversarial Environments 2014 Biggio B; Corona I; Nelson BA; Rubinstein BIP; Maiorca D; Fumera G; Giacinto G; Roli F Springer International Publishing
Lux0R: Detection of Malicious PDF-embedded JavaScript code through Discriminant Analysis of API References 2014 Corona I; Maiorca D; Ariu D; Giacinto G ACM

Questionnaire and social

Share on: