Search

Your search keyword '"Giacinto, Giorgio"' showing total 345 results

Search Constraints

Start Over You searched for: Author "Giacinto, Giorgio" Remove constraint Author: "Giacinto, Giorgio"
345 results on '"Giacinto, Giorgio"'

Search Results

1. Exploring the Robustness of AI-Driven Tools in Digital Forensics: A Preliminary Study

2. Adversarial Pruning: A Survey and Benchmark of Pruning Methods for Adversarial Robustness

3. HO-FMN: Hyperparameter Optimization for Fast Minimum-Norm Attacks

4. A Risk Estimation Study of Native Code Vulnerabilities in Android Applications

5. A Survey of the Overlooked Dangers of Template Engines

7. Can you See me? On the Visibility of NOPs against Android Malware Detectors

8. A Longitudinal Study of Cryptographic API: a Decade of Android Malware

9. Do Gradient-based Explanations Tell Anything About Adversarial Robustness to Android Malware?

10. Explaining the Use of Cryptographic API in Android Malware

12. Extended Abstract: Effective Call Graph Fingerprinting for the Analysis and Classification of Windows Malware

13. Automotive Cybersecurity: Foundations for Next-Generation Vehicles

14. PowerDrive: Accurate De-Obfuscation and Analysis of PowerShell Malware

15. Reach Me if You Can: On Native Vulnerability Reachability in Android Apps

16. Poisoning Behavioral Malware Clustering

17. Towards Adversarial Malware Detection: Lessons Learned from PDF-based Attacks

18. On the Effectiveness of System API-Related Information for Android Ransomware Detection

19. Adversarial Malware Binaries: Evading Deep Learning for Malware Detection in Executables

20. Explaining Black-box Android Malware Detection

23. List of contributors

24. IntelliAV: Building an Effective On-Device Android Malware Detector

25. Adversarial Detection of Flash Malware: Limitations and Open Issues

26. Evasion Attacks against Machine Learning at Test Time

27. Yes, Machine Learning Can Be More Secure! A Case Study on Android Malware Detection

28. Explanation-Driven Characterization of Android Ransomware

30. Novel Feature Extraction, Selection and Fusion for Effective Malware Family Classification

33. Security Evaluation of Support Vector Machines in Adversarial Environments

36. Ten Years of Relevance Score for Content Based Image Retrieval

37. Deepsquatting: Learning-Based Typosquatting Detection at Deeper Domain Levels

38. IntelliAV: Toward the Feasibility of Building Intelligent Anti-malware on Android Devices

41. An Evasion Resilient Approach to the Detection of Malicious PDF Files

42. Fast Image Classification with Reduced Multiclass Support Vector Machines

43. One-and-a-Half-Class Multiple Classifier Systems for Secure Learning Against Evasion Attacks at Test Time

46. Open Issues on Codebook Generation in Image Classification Tasks

48. Diversity in Ensembles of Codebooks for Visual Concept Detection

49. Enhancing Image Retrieval by an Exploration-Exploitation Approach

50. A Pattern Recognition System for Malicious PDF Files Detection

Catalog

Books, media, physical & digital resources