Giorgio Giacinto

Orcid: 0000-0002-5759-3017

According to our database1, Giorgio Giacinto authored at least 148 papers between 1997 and 2025.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2025
HO-FMN: Hyperparameter optimization for fast minimum-norm attacks.
Neurocomputing, 2025

2024
Oblivion: an open-source system for large-scale analysis of macro-based office malware.
J. Comput. Virol. Hacking Tech., November, 2024

Enhancing android malware detection explainability through function call graph APIs.
J. Inf. Secur. Appl., February, 2024

Adversarial Pruning: A Survey and Benchmark of Pruning Methods for Adversarial Robustness.
CoRR, 2024

A Risk Estimation Study of Native Code Vulnerabilities in Android Applications.
CoRR, 2024

A Survey of the Overlooked Dangers of Template Engines.
CoRR, 2024

Bringing Binary Exploitation at Port 80: Understanding C Vulnerabilities in WebAssembly.
Proceedings of the 21st International Conference on Security and Cryptography, 2024

Do You Trust Your Device? Open Challenges in IoT Security Analysis.
Proceedings of the 21st International Conference on Security and Cryptography, 2024

2023
Special Issue "AI for Cybersecurity: Robust Models for Authentication, Threat and Anomaly Detection".
Algorithms, July, 2023

Can you See me? On the Visibility of NOPs against Android Malware Detectors.
CoRR, 2023

A Targeted Assessment of Cross-Site Scripting Detection Tools.
Proceedings of the Italian Conference on Cyber Security (ITASEC 2023), 2023

2022
Do gradient-based explanations tell anything about adversarial robustness to android malware?
Int. J. Mach. Learn. Cybern., 2022

A Longitudinal Study of Cryptographic API: A Decade of Android Malware.
Proceedings of the 19th International Conference on Security and Cryptography, 2022

Explaining the Use of Cryptographic API in Android Malware.
Proceedings of the E-Business and Telecommunications - 19th International Conference, 2022

Reach Me if You Can: On Native Vulnerability Reachability in Android Apps.
Proceedings of the Computer Security - ESORICS 2022, 2022

Extended Abstract: Effective Call Graph Fingerprinting for the Analysis and Classification of Windows Malware.
Proceedings of the Detection of Intrusions and Malware, and Vulnerability Assessment, 2022

2021
PowerDecode: A PowerShell Script Decoder Dedicated to Malware Analysis.
Proceedings of the Italian Conference on Cybersecurity, 2021

2020
Convolutional neural networks for relevance feedback in content based image retrieval.
Multim. Tools Appl., 2020

On the Feasibility of Adversarial Sample Creation Using the Android System API.
Inf., 2020

Adversarial Detection of Flash Malware: Limitations and Open Issues.
Comput. Secur., 2020

Explanation-Driven Characterization of Android Ransomware.
Proceedings of the Pattern Recognition. ICPR International Workshops and Challenges, 2020

Defensive Programming for Smart Home Cybersecurity.
Proceedings of the IEEE European Symposium on Security and Privacy Workshops, 2020

2019
Yes, Machine Learning Can Be More Secure! A Case Study on Android Malware Detection.
IEEE Trans. Dependable Secur. Comput., 2019

Towards Adversarial Malware Detection: Lessons Learned from PDF-based Attacks.
ACM Comput. Surv., 2019

Automotive Cybersecurity: Foundations for Next-Generation Vehicles.
CoRR, 2019

On the effectiveness of system API-related information for Android ransomware detection.
Comput. Secur., 2019

PowerDrive: Accurate De-obfuscation and Analysis of PowerShell Malware.
Proceedings of the Detection of Intrusions and Malware, and Vulnerability Assessment, 2019

2018
Towards Robust Detection of Adversarial Infection Vectors: Lessons Learned in PDF Malware.
CoRR, 2018

R-PackDroid: Practical On-Device Detection of Android Ransomware.
CoRR, 2018

IntelliAV: Building an Effective On-Device Android Malware Detector.
CoRR, 2018

Ten Years of Relevance Score for Content Based Image Retrieval.
Proceedings of the Machine Learning and Data Mining in Pattern Recognition, 2018

Explaining Black-box Android Malware Detection.
Proceedings of the 26th European Signal Processing Conference, 2018

Adversarial Malware Binaries: Evading Deep Learning for Malware Detection in Executables.
Proceedings of the 26th European Signal Processing Conference, 2018

2017
Multimodal Retrieval with Diversification and Relevance Feedback for Tourist Attraction Images.
ACM Trans. Multim. Comput. Commun. Appl., 2017

Information fusion in content based image retrieval: A comprehensive overview.
Inf. Fusion, 2017

Adversarial Detection of Flash Malware: Limitations and Open Issues.
CoRR, 2017

R-PackDroid: API package-based characterization and detection of mobile ransomware.
Proceedings of the Symposium on Applied Computing, 2017

Detection of Malicious Scripting Code Through Discriminant and Adversary-Aware API Analysis.
Proceedings of the First Italian Conference on Cybersecurity (ITASEC17), 2017

Infinity-Norm Support Vector Machines Against Adversarial Label Contamination.
Proceedings of the First Italian Conference on Cybersecurity (ITASEC17), 2017

DroidSieve: Fast and Accurate Classification of Obfuscated Android Malware.
Proceedings of the Seventh ACM Conference on Data and Application Security and Privacy, 2017

IntelliAV: Toward the Feasibility of Building Intelligent Anti-malware on Android Devices.
Proceedings of the Machine Learning and Knowledge Extraction, 2017

Deepsquatting: Learning-Based Typosquatting Detection at Deeper Domain Levels.
Proceedings of the AI*IA 2017 Advances in Artificial Intelligence, 2017

2016
Who Are You? A Statistical Approach to Measuring User Authenticity.
Proceedings of the 23rd Annual Network and Distributed System Security Symposium, 2016

Pharmaguard WebApp: An Application for the Detection of Illegal Online Pharmacies.
Proceedings of the 2nd International Workshop on Knowledge Discovery on the WEB, 2016

Evaluating Analysis Tools for Android Apps: Status Quo and Robustness Against Obfuscation.
Proceedings of the Sixth ACM on Conference on Data and Application Security and Privacy, 2016

Novel Feature Extraction, Selection and Fusion for Effective Malware Family Classification.
Proceedings of the Sixth ACM on Conference on Data and Application Security and Privacy, 2016

Detecting Misuse of Google Cloud Messaging in Android Badware.
Proceedings of the 6th Workshop on Security and Privacy in Smartphones and Mobile Devices, 2016

2015
DLLMiner: structural mining for malware detection.
Secur. Commun. Networks, 2015

Editorial.
Trans. Mach. Learn. Data Min., 2015

Machine Learning in Security Applications.
Trans. Mach. Learn. Data Min., 2015

Stealth attacks: An extended insight into the obfuscation effects on Android malware.
Comput. Secur., 2015

Multimodal-based Diversified Summarization in Social Image Retrieval.
Proceedings of the Working Notes Proceedings of the MediaEval 2015 Workshop, 2015

One-and-a-Half-Class Multiple Classifier Systems for Secure Learning Against Evasion Attacks at Test Time.
Proceedings of the Multiple Classifier Systems - 12th International Workshop, 2015

Clustering android malware families by http traffic.
Proceedings of the 10th International Conference on Malicious and Unwanted Software, 2015

User-driven Nearest Neighbour Exploration of Image Archives.
Proceedings of the ICPRAM 2015, 2015

A hybrid approach for retrieving diverse social images of landmarks.
Proceedings of the 2015 IEEE International Conference on Multimedia and Expo, 2015

An Evasion Resilient Approach to the Detection of Malicious PDF Files.
Proceedings of the Information Systems Security and Privacy, 2015

A Structural and Content-based Approach for a Precise and Robust Detection of Malicious PDF Files.
Proceedings of the ICISSP 2015, 2015

Fast Image Classification with Reduced Multiclass Support Vector Machines.
Proceedings of the Image Analysis and Processing - ICIAP 2015, 2015

PharmaGuard: Automatic identification of illegal search-indexed online pharmacies.
Proceedings of the 2nd IEEE International Conference on Cybernetics, 2015

On the Robustness of Mobile Device Fingerprinting: Can Mobile Users Escape Modern Web-Tracking Mechanisms?
Proceedings of the 31st Annual Computer Security Applications Conference, 2015

2020 Cybercrime Economic Costs: No Measure No Solution.
Proceedings of the 10th International Conference on Availability, Reliability and Security, 2015

Yet Another Cybersecurity Roadmapping Methodology.
Proceedings of the 10th International Conference on Availability, Reliability and Security, 2015

2014
Security Evaluation of Support Vector Machines in Adversarial Environments.
CoRR, 2014

Open Issues on Codebook Generation in Image Classification Tasks.
Proceedings of the Machine Learning and Data Mining in Pattern Recognition, 2014

Retrieval of Diverse Images by Pre-filtering and Hierarchical Clustering.
Proceedings of the Working Notes Proceedings of the MediaEval 2014 Workshop, 2014

Lux0R: Detection of Malicious PDF-embedded JavaScript code through Discriminant Analysis of API References.
Proceedings of the 2014 Workshop on Artificial Intelligent and Security Workshop, 2014

Poisoning behavioral malware clustering.
Proceedings of the 2014 Workshop on Artificial Intelligent and Security Workshop, 2014

2013
Adversarial attacks against intrusion detection systems: Taxonomy, solutions and open issues.
Inf. Sci., 2013

Scalable fine-grained behavioral clustering of HTTP-based malware.
Comput. Networks, 2013

Evasion Attacks against Machine Learning at Test Time.
Proceedings of the Machine Learning and Knowledge Discovery in Databases, 2013

Passive-aggressive Online Learning for Relevance Feedback in Content based Image Retrieval.
Proceedings of the ICPRAM 2013, 2013

Diversity in Ensembles of Codebooks for Visual Concept Detection.
Proceedings of the Image Analysis and Processing - ICIAP 2013, 2013

Looking at the bag is not enough to find the bomb: an evasion of structural methods for malicious PDF files detection.
Proceedings of the 8th ACM Symposium on Information, Computer and Communications Security, 2013

2012
Early Detection of Malicious Flux Networks via Large-Scale Passive DNS Traffic Analysis.
IEEE Trans. Dependable Secur. Comput., 2012

Synthetic pattern generation for imbalanced learning in image retrieval.
Pattern Recognit. Lett., 2012

Performance Evaluation of Relevance Feedback for Image Retrieval by "Real-World" Multi-Tagged Image Datasets.
Int. J. Multim. Data Eng. Manag., 2012

Enhancing Image Retrieval by an Exploration-Exploitation Approach.
Proceedings of the Machine Learning and Data Mining in Pattern Recognition, 2012

A Pattern Recognition System for Malicious PDF Files Detection.
Proceedings of the Machine Learning and Data Mining in Pattern Recognition, 2012

SuStorID: A multiple classifier system for the protection of web services.
Proceedings of the 21st International Conference on Pattern Recognition, 2012

Image Hunter at ImageCLEF 2012 Personal Photo Retrieval Task.
Proceedings of the CLEF 2012 Evaluation Labs and Workshop, 2012

The PRA and AmILAB at ImageCLEF 2012 Photo Flickr Annotation Task.
Proceedings of the CLEF 2012 Evaluation Labs and Workshop, 2012

2011
Moving Targets in Computer Security and Multimedia Retrieval.
Trans. Mach. Learn. Data Min., 2011

Machine learning for computer security: A guide to prospective authors.
Inf. Fusion, 2011

HMMPayl: An intrusion detection system based on Hidden Markov Models.
Comput. Secur., 2011

Bagging Classifiers for Fighting Poisoning Attacks in Adversarial Classification Tasks.
Proceedings of the Multiple Classifier Systems - 10th International Workshop, 2011

A Modular Architecture for the Analysis of HTTP Payloads Based on Multiple Classifiers.
Proceedings of the Multiple Classifier Systems - 10th International Workshop, 2011

A Study on the Evaluation of Relevance Feedback in Multi-tagged Image Datasets.
Proceedings of the 2011 IEEE International Symposium on Multimedia, 2011

Dissimilarity Representation in Multi-feature Spaces for Image Retrieval.
Proceedings of the Image Analysis and Processing - ICIAP 2011, 2011

Machine learning in computer forensics (and the lessons learned from machine learning in computer security).
Proceedings of the 4th ACM Workshop on Security and Artificial Intelligence, 2011

ImageHunter: a Novel Tool for Relevance Feedback in Content Based Image Retrieval.
Proceedings of the 5th International Workshop on New Challenges in Distributed Information Filtering and Retrieval, 2011

2010
One-class classification for oil spill detection.
Pattern Anal. Appl., 2010

Detection of Server-side Web Attacks.
Proceedings of the First Workshop on Applications of Pattern Analysis, 2010

HMMPayl: an application of HMM to the analysis of the HTTP Payload.
Proceedings of the First Workshop on Applications of Pattern Analysis, 2010

K-Nearest Neighbors directed synthetic images injection.
Proceedings of the 11th International Workshop on Image Analysis for Multimedia Interactive Services, 2010

Dynamic Linear Combination of Two-Class Classifiers.
Proceedings of the Structural, 2010

Moving Targets.
Proceedings of the Advances in Data Mining. Applications and Theoretical Aspects, 2010

A Score Decidability Index for Dynamic Score Combination.
Proceedings of the 20th International Conference on Pattern Recognition, 2010

Unbalanced learning in content-based image classification and retrieval.
Proceedings of the 2010 IEEE International Conference on Multimedia and Expo, 2010

2009
Information fusion in computer security.
Inf. Fusion, 2009

Information fusion for computer security: State of the art and open issues.
Inf. Fusion, 2009

Designing multiple biometric systems: Measures of ensemble effectiveness.
Eng. Appl. Artif. Intell., 2009

McPAD: A multiple classifier system for accurate payload-based anomaly detection.
Comput. Networks, 2009

Neighborhood-based feature weighting for relevance feedback in content-based retrieval.
Proceedings of the 10th Workshop on Image Analysis for Multimedia Interactive Services, 2009

Dynamic Score Combination: A Supervised and Unsupervised Score Combination Method.
Proceedings of the Machine Learning and Data Mining in Pattern Recognition, 2009

HMM-Web: A Framework for the Detection of Attacks Against Web Applications.
Proceedings of IEEE International Conference on Communications, 2009

2008
Instance-Based Relevance Feedback in Image Retrieval Using Dissimilarity Spaces.
Proceedings of the Case-Based Reasoning on Images and Signals, 2008

Intrusion detection in computer networks by a modular ensemble of one-class classifiers.
Inf. Fusion, 2008

Combination of Experts by Classifiers in Similarity Score Spaces.
Proceedings of the Structural, 2008

On the Mathematical Formulation of the SAR Oil-Spill Observation Problem.
Proceedings of the IEEE International Geoscience & Remote Sensing Symposium, 2008

Dynamic score combination of binary experts.
Proceedings of the 19th International Conference on Pattern Recognition (ICPR 2008), 2008

2007
Selection of Experts for the Design of Multiple Biometric Systems.
Proceedings of the Machine Learning and Data Mining in Pattern Recognition, 2007

Sensing Attacks in Computers Networks with Hidden Markov Models.
Proceedings of the Machine Learning and Data Mining in Pattern Recognition, 2007

Index Driven Combination of Multiple Biometric Experts for AUC Maximisation.
Proceedings of the Multiple Classifier Systems, 7th International Workshop, 2007

Dynamic Score Selection for Fusion of Multiple Biometric Matchers.
Proceedings of the 14th International Conference on Image Analysis and Processing (ICIAP 2007), 2007

A nearest-neighbor approach to relevance feedback in content based image retrieval.
Proceedings of the 6th ACM International Conference on Image and Video Retrieval, 2007

2006
Alarm clustering for intrusion detection systems in computer networks.
Eng. Appl. Artif. Intell., 2006

2005
A study on the performances of dynamic classifier selection based on local accuracy estimation.
Pattern Recognit., 2005

Score Selection Techniques for Fingerprint Multi-modal Biometric Authentication.
Proceedings of the Image Analysis and Processing, 2005

Network Intrusion Detection by Combining One-Class Classifiers.
Proceedings of the Image Analysis and Processing, 2005

2004
Bayesian relevance feedback for content-based image retrieval.
Pattern Recognit., 2004

Instance-Based Relevance Feedback for Image Retrieval.
Proceedings of the Advances in Neural Information Processing Systems 17 [Neural Information Processing Systems, 2004

Dynamic Classifier Selection by Adaptive k-Nearest-Neighbourhood Rule.
Proceedings of the Multiple Classifier Systems, 5th International Workshop, 2004

Nearest-Prototype Relevance Feedback for Content Based Image Retrieval.
Proceedings of the 17th International Conference on Pattern Recognition, 2004

2003
Fusion of multiple classifiers for intrusion detection in computer networks.
Pattern Recognit. Lett., 2003

Dissimilarity Representation of Images for Relevance Feedback in Content-Based Image Retrieval.
Proceedings of the Machine Learning and Data Mining in Pattern Recognition, 2003

A Modular Multiple Classifier System for the Detection of Intrusions in Computer Networks.
Proceedings of the Multiple Classifier Systems, 4th International Workshop, 2003

2002
Query Shifting Based on Bayesian Decision Theory for Content-Based Image Retrieval.
Proceedings of the Structural, 2002

Intrusion Detection in Computer Networks by Multiple Classifier Systems.
Proceedings of the 16th International Conference on Pattern Recognition, 2002

2001
An approach to the automatic design of multiple classifier systems.
Pattern Recognit. Lett., 2001

Dynamic classifier selection based on multiple classifier behaviour.
Pattern Recognit., 2001

Design of effective neural network ensembles for image classification purposes.
Image Vis. Comput., 2001

Adaptive Query Shifting for Content-Based Image Retrieval.
Proceedings of the Machine Learning and Data Mining in Pattern Recognition, 2001

Methods for Designing Multiple Classifier Systems.
Proceedings of the Multiple Classifier Systems, Second International Workshop, 2001

2000
Combination of neural and statistical algorithms for supervised classification of remote-sensing image.
Pattern Recognit. Lett., 2000

Reject option with multiple thresholds.
Pattern Recognit., 2000

Selection of Classifiers Based on Multiple Classifier Behaviour.
Proceedings of the Advances in Pattern Recognition, Joint IAPR International Workshops SSPR 2000 and SPR 2000, [8th International Workshop on Structural and Syntactic Pattern Recognition, 3rd International Workshop on Statistical Techniques in Pattern Recognition], Alicante, Spain, August 30, 2000

Multiple Reject Thresholds for Improving Classification Reliability.
Proceedings of the Advances in Pattern Recognition, Joint IAPR International Workshops SSPR 2000 and SPR 2000, [8th International Workshop on Structural and Syntactic Pattern Recognition, 3rd International Workshop on Statistical Techniques in Pattern Recognition], Alicante, Spain, August 30, 2000

Dynamic Classifier Selection.
Proceedings of the Multiple Classifier Systems, First International Workshop, 2000

Unsupervised Learning of Neural Network Ensembles for Image Classification.
Proceedings of the IEEE-INNS-ENNS International Joint Conference on Neural Networks, 2000

Design of Effective Multiple Classifier Systems by Clustering of Classifiers.
Proceedings of the 15th International Conference on Pattern Recognition, 2000

A Theoretical Framework for Dynamic Classifier Selection.
Proceedings of the 15th International Conference on Pattern Recognition, 2000

1999
Automatic Design of Multiple Classifier Systems by Unsupervised Learning.
Proceedings of the Machine Learning and Data Mining in Pattern Recognition, 1999

Methods for Dynamic Classifier Selection.
Proceedings of the 1oth International Conference on Image Analysis and Processing (ICIAP 1999), 1999

1998
A Tabu Search algorithm for the optimisation of telecommunication networks.
Eur. J. Oper. Res., 1998

1997
Application of neural networks and statistical pattern recognition algorithms to earthquake risk evaluation.
Pattern Recognit. Lett., 1997

Adaptive Selection of Image Classifiers.
Proceedings of the Image Analysis and Processing, 9th International Conference, 1997

The COMPARES Project: COnnectionist Methods for Preprocessing and Analysis of REmote Sensing Data.
Proceedings of the Image Analysis and Processing, 9th International Conference, 1997


  Loading...