Giorgio Giacinto
Orcid: 0000-0002-5759-3017
According to our database1,
Giorgio Giacinto
authored at least 148 papers
between 1997 and 2025.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
Online presence:
-
on orcid.org
-
on dl.acm.org
On csauthors.net:
Bibliography
2025
Neurocomputing, 2025
2024
Oblivion: an open-source system for large-scale analysis of macro-based office malware.
J. Comput. Virol. Hacking Tech., November, 2024
J. Inf. Secur. Appl., February, 2024
Adversarial Pruning: A Survey and Benchmark of Pruning Methods for Adversarial Robustness.
CoRR, 2024
CoRR, 2024
Bringing Binary Exploitation at Port 80: Understanding C Vulnerabilities in WebAssembly.
Proceedings of the 21st International Conference on Security and Cryptography, 2024
Proceedings of the 21st International Conference on Security and Cryptography, 2024
2023
Special Issue "AI for Cybersecurity: Robust Models for Authentication, Threat and Anomaly Detection".
Algorithms, July, 2023
CoRR, 2023
Proceedings of the Italian Conference on Cyber Security (ITASEC 2023), 2023
2022
Do gradient-based explanations tell anything about adversarial robustness to android malware?
Int. J. Mach. Learn. Cybern., 2022
Proceedings of the 19th International Conference on Security and Cryptography, 2022
Proceedings of the E-Business and Telecommunications - 19th International Conference, 2022
Proceedings of the Computer Security - ESORICS 2022, 2022
Extended Abstract: Effective Call Graph Fingerprinting for the Analysis and Classification of Windows Malware.
Proceedings of the Detection of Intrusions and Malware, and Vulnerability Assessment, 2022
2021
Proceedings of the Italian Conference on Cybersecurity, 2021
2020
Convolutional neural networks for relevance feedback in content based image retrieval.
Multim. Tools Appl., 2020
Inf., 2020
Comput. Secur., 2020
Proceedings of the Pattern Recognition. ICPR International Workshops and Challenges, 2020
Proceedings of the IEEE European Symposium on Security and Privacy Workshops, 2020
2019
IEEE Trans. Dependable Secur. Comput., 2019
ACM Comput. Surv., 2019
On the effectiveness of system API-related information for Android ransomware detection.
Comput. Secur., 2019
Proceedings of the Detection of Intrusions and Malware, and Vulnerability Assessment, 2019
2018
Towards Robust Detection of Adversarial Infection Vectors: Lessons Learned in PDF Malware.
CoRR, 2018
Proceedings of the Machine Learning and Data Mining in Pattern Recognition, 2018
Proceedings of the 26th European Signal Processing Conference, 2018
Adversarial Malware Binaries: Evading Deep Learning for Malware Detection in Executables.
Proceedings of the 26th European Signal Processing Conference, 2018
2017
Multimodal Retrieval with Diversification and Relevance Feedback for Tourist Attraction Images.
ACM Trans. Multim. Comput. Commun. Appl., 2017
Inf. Fusion, 2017
Proceedings of the Symposium on Applied Computing, 2017
Detection of Malicious Scripting Code Through Discriminant and Adversary-Aware API Analysis.
Proceedings of the First Italian Conference on Cybersecurity (ITASEC17), 2017
Proceedings of the First Italian Conference on Cybersecurity (ITASEC17), 2017
Proceedings of the Seventh ACM Conference on Data and Application Security and Privacy, 2017
IntelliAV: Toward the Feasibility of Building Intelligent Anti-malware on Android Devices.
Proceedings of the Machine Learning and Knowledge Extraction, 2017
Proceedings of the AI*IA 2017 Advances in Artificial Intelligence, 2017
2016
Proceedings of the 23rd Annual Network and Distributed System Security Symposium, 2016
Proceedings of the 2nd International Workshop on Knowledge Discovery on the WEB, 2016
Evaluating Analysis Tools for Android Apps: Status Quo and Robustness Against Obfuscation.
Proceedings of the Sixth ACM on Conference on Data and Application Security and Privacy, 2016
Novel Feature Extraction, Selection and Fusion for Effective Malware Family Classification.
Proceedings of the Sixth ACM on Conference on Data and Application Security and Privacy, 2016
Proceedings of the 6th Workshop on Security and Privacy in Smartphones and Mobile Devices, 2016
2015
Stealth attacks: An extended insight into the obfuscation effects on Android malware.
Comput. Secur., 2015
Proceedings of the Working Notes Proceedings of the MediaEval 2015 Workshop, 2015
One-and-a-Half-Class Multiple Classifier Systems for Secure Learning Against Evasion Attacks at Test Time.
Proceedings of the Multiple Classifier Systems - 12th International Workshop, 2015
Proceedings of the 10th International Conference on Malicious and Unwanted Software, 2015
User-driven Nearest Neighbour Exploration of Image Archives.
Proceedings of the ICPRAM 2015, 2015
Proceedings of the 2015 IEEE International Conference on Multimedia and Expo, 2015
Proceedings of the Information Systems Security and Privacy, 2015
A Structural and Content-based Approach for a Precise and Robust Detection of Malicious PDF Files.
Proceedings of the ICISSP 2015, 2015
Proceedings of the Image Analysis and Processing - ICIAP 2015, 2015
Proceedings of the 2nd IEEE International Conference on Cybernetics, 2015
On the Robustness of Mobile Device Fingerprinting: Can Mobile Users Escape Modern Web-Tracking Mechanisms?
Proceedings of the 31st Annual Computer Security Applications Conference, 2015
Proceedings of the 10th International Conference on Availability, Reliability and Security, 2015
Proceedings of the 10th International Conference on Availability, Reliability and Security, 2015
2014
CoRR, 2014
Proceedings of the Machine Learning and Data Mining in Pattern Recognition, 2014
Proceedings of the Working Notes Proceedings of the MediaEval 2014 Workshop, 2014
Lux0R: Detection of Malicious PDF-embedded JavaScript code through Discriminant Analysis of API References.
Proceedings of the 2014 Workshop on Artificial Intelligent and Security Workshop, 2014
Proceedings of the 2014 Workshop on Artificial Intelligent and Security Workshop, 2014
2013
Adversarial attacks against intrusion detection systems: Taxonomy, solutions and open issues.
Inf. Sci., 2013
Comput. Networks, 2013
Proceedings of the Machine Learning and Knowledge Discovery in Databases, 2013
Passive-aggressive Online Learning for Relevance Feedback in Content based Image Retrieval.
Proceedings of the ICPRAM 2013, 2013
Proceedings of the Image Analysis and Processing - ICIAP 2013, 2013
Looking at the bag is not enough to find the bomb: an evasion of structural methods for malicious PDF files detection.
Proceedings of the 8th ACM Symposium on Information, Computer and Communications Security, 2013
2012
Early Detection of Malicious Flux Networks via Large-Scale Passive DNS Traffic Analysis.
IEEE Trans. Dependable Secur. Comput., 2012
Pattern Recognit. Lett., 2012
Performance Evaluation of Relevance Feedback for Image Retrieval by "Real-World" Multi-Tagged Image Datasets.
Int. J. Multim. Data Eng. Manag., 2012
Proceedings of the Machine Learning and Data Mining in Pattern Recognition, 2012
Proceedings of the Machine Learning and Data Mining in Pattern Recognition, 2012
Proceedings of the 21st International Conference on Pattern Recognition, 2012
Proceedings of the CLEF 2012 Evaluation Labs and Workshop, 2012
Proceedings of the CLEF 2012 Evaluation Labs and Workshop, 2012
2011
Trans. Mach. Learn. Data Min., 2011
Inf. Fusion, 2011
Comput. Secur., 2011
Bagging Classifiers for Fighting Poisoning Attacks in Adversarial Classification Tasks.
Proceedings of the Multiple Classifier Systems - 10th International Workshop, 2011
A Modular Architecture for the Analysis of HTTP Payloads Based on Multiple Classifiers.
Proceedings of the Multiple Classifier Systems - 10th International Workshop, 2011
Proceedings of the 2011 IEEE International Symposium on Multimedia, 2011
Proceedings of the Image Analysis and Processing - ICIAP 2011, 2011
Machine learning in computer forensics (and the lessons learned from machine learning in computer security).
Proceedings of the 4th ACM Workshop on Security and Artificial Intelligence, 2011
Proceedings of the 5th International Workshop on New Challenges in Distributed Information Filtering and Retrieval, 2011
2010
Proceedings of the First Workshop on Applications of Pattern Analysis, 2010
Proceedings of the First Workshop on Applications of Pattern Analysis, 2010
Proceedings of the 11th International Workshop on Image Analysis for Multimedia Interactive Services, 2010
Proceedings of the Structural, 2010
Proceedings of the Advances in Data Mining. Applications and Theoretical Aspects, 2010
Proceedings of the 20th International Conference on Pattern Recognition, 2010
Proceedings of the 2010 IEEE International Conference on Multimedia and Expo, 2010
2009
Inf. Fusion, 2009
Eng. Appl. Artif. Intell., 2009
Comput. Networks, 2009
Neighborhood-based feature weighting for relevance feedback in content-based retrieval.
Proceedings of the 10th Workshop on Image Analysis for Multimedia Interactive Services, 2009
Proceedings of the Machine Learning and Data Mining in Pattern Recognition, 2009
Proceedings of IEEE International Conference on Communications, 2009
2008
Proceedings of the Case-Based Reasoning on Images and Signals, 2008
Intrusion detection in computer networks by a modular ensemble of one-class classifiers.
Inf. Fusion, 2008
Proceedings of the Structural, 2008
Proceedings of the IEEE International Geoscience & Remote Sensing Symposium, 2008
Proceedings of the 19th International Conference on Pattern Recognition (ICPR 2008), 2008
2007
Proceedings of the Machine Learning and Data Mining in Pattern Recognition, 2007
Proceedings of the Machine Learning and Data Mining in Pattern Recognition, 2007
Proceedings of the Multiple Classifier Systems, 7th International Workshop, 2007
Proceedings of the 14th International Conference on Image Analysis and Processing (ICIAP 2007), 2007
Proceedings of the 6th ACM International Conference on Image and Video Retrieval, 2007
2006
Eng. Appl. Artif. Intell., 2006
2005
A study on the performances of dynamic classifier selection based on local accuracy estimation.
Pattern Recognit., 2005
Proceedings of the Image Analysis and Processing, 2005
Proceedings of the Image Analysis and Processing, 2005
2004
Pattern Recognit., 2004
Proceedings of the Advances in Neural Information Processing Systems 17 [Neural Information Processing Systems, 2004
Proceedings of the Multiple Classifier Systems, 5th International Workshop, 2004
Proceedings of the 17th International Conference on Pattern Recognition, 2004
2003
Pattern Recognit. Lett., 2003
Dissimilarity Representation of Images for Relevance Feedback in Content-Based Image Retrieval.
Proceedings of the Machine Learning and Data Mining in Pattern Recognition, 2003
A Modular Multiple Classifier System for the Detection of Intrusions in Computer Networks.
Proceedings of the Multiple Classifier Systems, 4th International Workshop, 2003
2002
Proceedings of the Structural, 2002
Proceedings of the 16th International Conference on Pattern Recognition, 2002
2001
Pattern Recognit. Lett., 2001
Pattern Recognit., 2001
Image Vis. Comput., 2001
Proceedings of the Machine Learning and Data Mining in Pattern Recognition, 2001
Proceedings of the Multiple Classifier Systems, Second International Workshop, 2001
2000
Combination of neural and statistical algorithms for supervised classification of remote-sensing image.
Pattern Recognit. Lett., 2000
Proceedings of the Advances in Pattern Recognition, Joint IAPR International Workshops SSPR 2000 and SPR 2000, [8th International Workshop on Structural and Syntactic Pattern Recognition, 3rd International Workshop on Statistical Techniques in Pattern Recognition], Alicante, Spain, August 30, 2000
Proceedings of the Advances in Pattern Recognition, Joint IAPR International Workshops SSPR 2000 and SPR 2000, [8th International Workshop on Structural and Syntactic Pattern Recognition, 3rd International Workshop on Statistical Techniques in Pattern Recognition], Alicante, Spain, August 30, 2000
Proceedings of the Multiple Classifier Systems, First International Workshop, 2000
Proceedings of the IEEE-INNS-ENNS International Joint Conference on Neural Networks, 2000
Proceedings of the 15th International Conference on Pattern Recognition, 2000
Proceedings of the 15th International Conference on Pattern Recognition, 2000
1999
Proceedings of the Machine Learning and Data Mining in Pattern Recognition, 1999
Proceedings of the 1oth International Conference on Image Analysis and Processing (ICIAP 1999), 1999
1998
Eur. J. Oper. Res., 1998
1997
Application of neural networks and statistical pattern recognition algorithms to earthquake risk evaluation.
Pattern Recognit. Lett., 1997
Proceedings of the Image Analysis and Processing, 9th International Conference, 1997
The COMPARES Project: COnnectionist Methods for Preprocessing and Analysis of REmote Sensing Data.
Proceedings of the Image Analysis and Processing, 9th International Conference, 1997