Showing results 51 to 100 of 156
next >   < previous 
Title Issue Date Author(s) Journal Publisher
Passive-Aggressive Online Learning for Relevance Feedback in Content Based Image Retrieval 2013 Piras L; Giacinto G; Paredes R SCITEPRESS SCIENCE AND TECHNOLOGY PUBLICATIONS
Machine Learning in Security Applications 2013 Ariu D; Corona I; Tronci R; Giacinto G ibai-publishing
Evasion attacks against machine learning at test time 2013 Biggio, Battista; Corona, Igino; Maiorca, Davide; Nelson, B; Srndic, N; Laskov, P; Giacinto, Gior...gio; Roli, Fabio Springer
Diversity in Ensembles of Codebooks for Visual Concept Detection 2013 Piras L; Tronci R; Giacinto G LECTURE NOTES IN COMPUTER SCIENCE Springer
Adversarial attacks against intrusion detection systems: Taxonomy, solutions and open issues 2013 Corona I; Giacinto G; Roli F INFORMATION SCIENCES
Scalable Fine-Grained Behavioral Clustering of HTTP-Based Malware 2013 Perdisci R; Ariu D; Giacinto G COMPUTER NETWORKS
Looking at the bag is not enough to find the bomb: an evasion of structural methods for malicious PDF files detection 2013 Maiorca D; Corona I; Giacinto G ACM
ImageHunter: A Novel Tool for Relevance Feedback in Content Based Image Retrieval 2013 Tronci R; Murgia G; Pili M; Piras L; Giacinto G STUDIES IN COMPUTATIONAL INTELLIGENCE
Image Hunter at ImageCLEF 2012 Personal Photo Retrieval Task 2012 Tronci R; Piras L; Murgia G; Giacinto G
The PRA and AmILAB at ImageCLEF 2012 Photo Flickr Annotation Task 2012 Piras L; Tronci R; Murgia G; Giacinto G
Performance Evaluation of Relevance Feedback for Image Retrieval by “Real-World” Multi-Tagged Image Datasets 2012 Tronci, Roberto; Piras, Luca; Giacinto, Giorgio INTERNATIONAL JOURNAL OF MULTIMEDIA DATA ENGINEERING & MANAGEMENT
SuStorID: A multiple classifier system for the protection of web services 2012 Corona I; Tronci R; Giacinto G IEEE
A Pattern Recognition System for Malicious PDF Files Detection 2012 Maiorca D; Giacinto G; Corona I Springer-Verlag
Synthetic pattern generation for imbalanced learning in image retrieval 2012 Piras L; Giacinto G PATTERN RECOGNITION LETTERS
Enhancing Image Retrieval by an Exploration-Exploitation Approach 2012 Piras L; Giacinto G; Paredes R LECTURE NOTES IN COMPUTER SCIENCE Springer
Early Detection of Malicious Flux Networks via Large-Scale Passive DNS Traffic Analysis 2012 Perdisci R; Corona I; Giacinto G IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING
Moving Targets in Computer Security and Multimedia Retrieval 2011 GIACINTO G TRANSACTIONS ON MACHINE LEARNING AND DATA MINING
ImageHunter: a Novel Tool for Relevance Feedback in Content Based Image Retrieval 2011 Tronci R; Murgia G; Pili M; Piras L; Giacinto G CEUR WORKSHOP PROCEEDINGS
Machine learning for computer security: A guide to prospective authors 2011 GIACINTO G; B.V. DASARATHY INFORMATION FUSION
Dissimilarity representation in multi-feature spaces for image retrieval 2011 Piras L; Giacinto G LECTURE NOTES IN COMPUTER SCIENCE Springer
HMMpayl: An Intrusion Detection System Based On Hidden Markov Models 2011 Ariu D; Tronci R; Giacinto G COMPUTERS & SECURITY
A modular architecture for the analysis of HTTP payloads based on Multiple Classifiers 2011 Ariu D; Giacinto G LECTURE NOTES IN COMPUTER SCIENCE Springer Verlag
Bagging classifiers for fighting poisoning attacks in adversarial classification tasks 2011 Biggio B; Corona I; Fumera G; Giacinto G; Roli F LECTURE NOTES IN COMPUTER SCIENCE Springer Verlag
A study on the evaluation of relevance feedback in multi-tagged image datasets 2011 Tronci R; Falqui L; Piras L; Giacinto G IEEE
Machine learning in computer forensics (and the lessons learned from machine learning in computer security) 2011 Ariu, Davide; Giacinto, Giorgio; Roli, Fabio ACM
K-Nearest Neighbors directed synthetic images injection 2010 Piras L; Giacinto G
HMMPayl: an application of HMM to the analysis of the HTTP Payload 2010 Ariu, Davide; Giacinto, Giorgio MIT Press
Detection of server side web attacks 2010 Corona, Igino; Giacinto, Giorgio MIT Press
A score decidability index for dynamic score combination 2010 Lobrano, C; Tronci, Roberto; Giacinto, Giorgio; Roli, Fabio IEEE-XPLORE
Moving targets - When Data Classes Depend on Subjective Judgement, or they are crafted by an Adversary to Mislead Pattern Analysis Algorithms. The case of Content-Based Multimedia Retrieval and Adversarial Classification 2010 Giacinto, Giorgio LECTURE NOTES IN COMPUTER SCIENCE Springer-Verlag
Unbalanced learning in content-based image classification and retrieval 2010 Piras L; Giacinto G
Dynamic Linear Combination of Two-Class Classifiers 2010 Lobrano C; Tronci R; Giacinto G; Roli F LECTURE NOTES IN COMPUTER SCIENCE Springer-Verlag Berlin Heidelberg.
One-class classification for oil spill detection 2010 A. GAMBARDELLA; GIACINTO G; M. MIGLIACCIO; A. MONTALI PATTERN ANALYSIS AND APPLICATIONS
HMM-Web: A Framework for the Detection of Attacks Against Web Applications 2009 Corona I; Ariu D; Giacinto G
Dynamic Score Combination: A Supervised and Unsupervised Score Combination Method 2009 Tronci R; Giacinto G; Roli F LECTURE NOTES IN COMPUTER SCIENCE Springer
Designing multiple biometric systems: Measures of ensemble effectiveness 2009 Tronci R; Giacinto G; Roli F ENGINEERING APPLICATIONS OF ARTIFICIAL INTELLIGENCE
Neighborhood-based feature weighting for relevance feedback in content-based retrieval 2009 Piras L; Giacinto G
Information fusion in computer security 2009 Giacinto, G; Roli, F; Sansone, C INFORMATION FUSION
McPAD: A multiple classifier system for accurate payload-based anomaly detection 2009 Perdisci, R; Ariu, Davide; Fogla, P; Giacinto, Giorgio; Lee, W. COMPUTER NETWORKS
Information fusion for computer security: State of the art and open issues 2009 Corona, Igino; Giacinto, Giorgio; Mazzariello, C; Roli, Fabio; Sansone, C. INFORMATION FUSION
McPAD and HMMWeb: two different approaches for the detection of attacks against Web applications 2008 Ariu D; CORONA I; Giacinto G; Roli F
Instance-based relevance feedback in image retrieval using dissimilarity spaces 2008 Giacinto, G; Roli, F. Springer Berlin
Intrusion Detection in Computer Systems using Multiple ClassifIer Systems 2008 Corona I; Giacinto G; Roli F STUDIES IN COMPUTATIONAL INTELLIGENCE Springer-Verlag
Combination of experts by classifiers in similarity score spaces 2008 TRONCI R; GIACINTO G; ROLI F LECTURE NOTES IN COMPUTER SCIENCE Springer-Verlag
Intrusion detection in computer networks by a modular ensemble of one-class classifiers 2008 Giacinto G; Perdisci R; Del Rio M; Roli F INFORMATION FUSION
Dynamic score combination of binary experts 2008 Tronci R; Giacinto G; Roli F IEEE-XPLORE
On the Mathematical Formulation of the Sar Oil-Spill Observation Problem 2008 A., Gambardella; Giacinto, Giorgio; M., Migliaccio
Intrusion Detection Systems based on anomaly detection techniques 2007 Ariu D; Corona I; Giacinto G; Perdisci R; Roli F
Intrusion Detection Systems based on anomaly detection techniques 2007 Ariu D; Corona I; Giacinto G; Roli F
Intrusion detection in computer systems as a pattern recognition task in adversarial environment: a critical review 2007 CORONA I; GIACINTO G; ROLI F

Questionnaire and social

Share on: