Giorgio Giacinto
Università degli Studi di Cagliari
H-index: 53
Europe-Italy
Top articles of Giorgio Giacinto
Title | Journal | Author(s) | Publication Date |
---|---|---|---|
Enhancing android malware detection explainability through function call graph APIs | Journal of Information Security and Applications | Diego Soi Alessandro Sanna Davide Maiorca Giorgio Giacinto | 2024/2/1 |
Improving malware detection with explainable machine learning | Michele Scalas Konrad Rieck Giorgio Giacinto | 2023/1/1 | |
Can you See me? On the Visibility of NOPs against Android Malware Detectors | arXiv preprint arXiv:2312.17356 | Diego Soi Davide Maiorca Giorgio Giacinto Harel Berger | 2023/12/28 |
AI Generated Music Using Speech Emotion Recognition | Roberto Murru Jonas Krug Tom Schmid Garri Steba Giorgio Giacinto | 2023/11/22 | |
Special Issue “AI for Cybersecurity: Robust Models for Authentication, Threat and Anomaly Detection” | Francesco Bergadano Giorgio Giacinto | 2023/7/7 | |
AI for Cybersecurity: Robust models for Authentication, Threat and Anomaly Detection | ALGORITHMS | Francesco Bergadano Giorgio Giacinto | 2023 |
A Targeted Assessment of Cross-Site Scripting Detection Tools | CEUR WORKSHOP PROCEEDINGS | Bruno Pala Lorenzo Pisu SILVIA LUCIA Sanna Davide Maiorca Giorgio Giacinto | 2023 |
A longitudinal study of cryptographic API: A decade of android malware | arXiv preprint arXiv:2205.05573 | Adam Janovsky Davide Maiorca Dominik Macko Vashek Matyas Giorgio Giacinto | 2022/5/11 |
Do gradient-based explanations tell anything about adversarial robustness to android malware? | Int’l Journal of Machine Learning and Cybernetics | Marco Melis Michele Scalas Ambra Demontis Davide Maiorca Battista Biggio | 2022 |
Reach Me if You Can: On Native Vulnerability Reachability in Android Apps | Luca Borzacchiello Emilio Coppa Davide Maiorca Andrea Columbu Camil Demetrescu | 2022/9/24 | |
Explaining the Use of Cryptographic API in Android Malware | Adam Janovsky Davide Maiorca Dominik Macko Vashek Matyas Giorgio Giacinto | 2022/7/11 | |
Detection of Intrusions and Malware, and Vulnerability Assessment: 19th International Conference, DIMVA 2022, Cagliari, Italy, June 29–July 1, 2022, Proceedings | Clémentine Maurice Leyla Bilge Gianluca Stringhini Nuno Neves | 2020 | |
Effective Call Graph Fingerprinting for the Analysis and Classification of Windows Malware | Francesco Meloni Alessandro Sanna Davide Maiorca Giorgio Giacinto | 2022/6/24 | |
Powerdecode: a powershell script decoder dedicated to malware analysis | Giuseppe Mario Malandrone Virdis Giovanni Giorgio Giacinto Davide Maiorca | 2021 | |
Explanation-driven characterization of android ransomware | Michele Scalas Konrad Rieck Giorgio Giacinto | 2021 | |
Convolutional neural networks for relevance feedback in content based image retrieval: A Content based image retrieval system that exploits convolutional neural networks both … | Multimedia Tools and Applications | Lorenzo Putzu Luca Piras Giorgio Giacinto | 2020/10 |
On the feasibility of adversarial sample creation using the android system api | Information | Fabrizio Cara Michele Scalas Giorgio Giacinto Davide Maiorca | 2020/9/10 |
Defensive Programming for Smart Home Cybersecurity | Maria Teresa Rossi Renan Greca Ludovico Iovino Giorgio Giacinto Antonia Bertoli | 2020/9/7 | |
Adversarial detection of flash malware: Limitations and open issues | Computers & Security | Davide Maiorca Ambra Demontis Battista Biggio Fabio Roli Giorgio Giacinto | 2020/5/26 |
On the role of explainable machine learning for secure smart vehicles | Michele Scalas Giorgio Giacinto | 2020/11/18 |