Mostra risultati da 1 a 20 di 156
successivo >
Titolo Data di pubblicazione Autore(i) Rivista Editore
Explanation-Driven Characterization of Android Ransomware 2021 Scalas, Michele; Rieck, Konrad; Giacinto, Giorgio
Do gradient-based explanations tell anything about adversarial robustness to android malware? 2021 Melis, M.; Scalas, M.; Demontis, A.; Maiorca, D.; Biggio, B.; Giacinto, G.; Roli, F. INTERNATIONAL JOURNAL OF MACHINE LEARNING AND CYBERNETICS
Convolutional neural networks for relevance feedback in content based image retrieval: a content based image retrieval system that exploits convolutional neural networks both for feature extraction and for relevance feedback 2020 Putzu, Lorenzo; Piras, Luca; Giacinto, Giorgio MULTIMEDIA TOOLS AND APPLICATIONS
Defensive Programming for Smart Home Cybersecurity 2020 Rossi, Maria Teresa; Greca, Renan; Iovino, Ludovico; Giacinto, Giorgio; Bertoli, Antonia IEEE (Institute of Electrical and Electronics Engineers)
On the Feasibility of Adversarial Sample Creation Using the Android System API 2020 Cara, Fabrizio; Scalas, Michele; Giacinto, Giorgio; Maiorca, Davide INFORMATION
Adversarial Detection of Flash Malware: Limitations and Open Issues 2020 Maiorca, D.; Demontis, A.; Biggio, B.; Roli, F.; Giacinto, G. COMPUTERS & SECURITY
On the Role of Explainable Machine Learning for Secure Smart Vehicles 2020 Scalas, Michele; Giacinto, Giorgio IEEE (Institute of Electrical and Electronics Engineers)
Yes, Machine Learning Can Be More Secure! A Case Study on Android Malware Detection 2019 Demontis, Ambra; Melis, Marco; Biggio, Battista; Maiorca, Davide; Arp, Daniel; Rieck, Konrad; Cor...ona, Igino; Giacinto, Giorgio; Roli, Fabio IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING
On the effectiveness of system API-related information for Android ransomware detection 2019 Scalas, Michele; Maiorca, Davide; Mercaldo, Francesco; Visaggio, Corrado Aaron; Martinelli, Fabio...; Giacinto, Giorgio COMPUTERS & SECURITY
PowerDrive: Accurate De-obfuscation and Analysis of PowerShell Malware 2019 Ugarte, Denis; Maiorca, Davide; Cara, Fabrizio; Giacinto, Giorgio Springer
Detection of Intrusions and Malware, and Vulnerability Assessment 2019 Perdisci, Roberto; Maurice, iClémentine; Giacinto, Giorgio; Almgren, Magnus Springer
Automotive cybersecurity: Foundations for next-generation vehicles 2019 Scalas, M.; Giacinto, G. IEEE (Institute of Electrical and Electronics Engineers)
Towards adversarial malware detection: lessons learned from PDF-based attacks 2019 Maiorca, D.; Biggio, B.; Giacinto, G. ACM COMPUTING SURVEYS
Ten years of relevance score for content based image retrieval 2018 Putzu, Lorenzo; Piras, Luca; Giacinto, Giorgio Springer Verlag
Explaining black-box android malware detection 2018 Melis, Marco; Maiorca, Davide; Biggio, Battista; Giacinto, Giorgio; Roli, Fabio IEEE, Institute of Electrical and Electronics Engineers
Adversarial Malware Binaries: Evading Deep Learning for Malware Detection in Executables 2018 Kolosnjaji, Bojan; Demontis, Ambra; Biggio, Battista; Maiorca, Davide; Giacinto, Giorgio; Eckert,... Claudia; Roli, Fabio IEEE (Institute of Electrical and Electronics Engineers)
Deepsquatting: Learning-based typosquatting detection at deeper domain levels 2017 Piredda, Paolo; Ariu, Davide; Biggio, Battista; Corona, Igino; Piras, Luca; Giacinto, Giorgio;, Fabio Springer
R-PackDroid: API package-based characterization and detection of mobile ransomware 2017 Maiorca, Davide; Mercaldo, Francesco; Giacinto, Giorgio; Visaggio, Corrado Aaron; Martinelli, Fabio ACM
Multimodal retrieval with diversification and relevance feedback for tourist attraction images 2017 Dang Nguyen, Duc Tien; Piras, Luca; Giacinto, Giorgio; Boato, Giulia; De Natale, Francesco GB ACM TRANSACTIONS ON MULTIMEDIA COMPUTING, COMMUNICATIONS AND APPLICATIONS
Detection of malicious scripting code through discriminant and adversary-aware API analysis 2017 Maiorca, Davide; Russu, Paolo; Corona, Igino; Biggio, Battista; Giacinto, Giorgio CEUR-WS

Questionario e social

Condividi su: