ROLI, FABIO
 Distribuzione geografica
Continente #
EU - Europa 8.585
AS - Asia 78
SA - Sud America 39
NA - Nord America 6
AF - Africa 2
Totale 8.710
Nazione #
IT - Italia 8.581
CN - Cina 34
SG - Singapore 32
BR - Brasile 31
VN - Vietnam 10
AR - Argentina 5
US - Stati Uniti d'America 5
CO - Colombia 3
BG - Bulgaria 1
DZ - Algeria 1
EG - Egitto 1
FR - Francia 1
ID - Indonesia 1
KW - Kuwait 1
MX - Messico 1
RO - Romania 1
UA - Ucraina 1
Totale 8.710
Città #
Genoa 5.051
Vado Ligure 1.743
Genova 1.158
Rapallo 579
Bordighera 36
Beijing 17
San Giuliano Terme 12
Singapore 8
Ho Chi Minh City 4
Ashburn 2
Des Moines 2
Hanoi 2
Hải Dương 2
Rio de Janeiro 2
São Paulo 2
Trezzano sul Naviglio 2
Aiud 1
Anápolis 1
Brasília 1
Braço do Norte 1
Burzaco 1
Campinas 1
Campo Grande 1
Caxias do Sul 1
Conceição do Coité 1
Dom Basílio 1
Fortaleza 1
General Rodríguez 1
Guarulhos 1
Guaçuí 1
José C. Paz 1
Kuwait City 1
Lagoa Santa 1
Londrina 1
Long An 1
Los Angeles 1
Marília 1
Medellín 1
Momil 1
Mérida 1
Palmas 1
Paris 1
Salvador 1
Santa Cruz do Sul 1
Santa Luzia 1
Santo André 1
Sobral 1
Sofia 1
Sohag 1
Sorocaba 1
Subachoque 1
Sumaré 1
Surakarta 1
São Gonçalo 1
São João de Meriti 1
São Vicente 1
Sétif 1
Teresina 1
Videira 1
Villa Aberastain 1
Villa Ángela 1
Vinnytsia 1
Totale 8.668
Nome #
A hybrid system for two-dimensional image recognition 166
A Learning System For The Generation Of Conceptual Descriptions For Workpiece Recognition PurposesProceedings.14 Annual Conference of Industrial Electronics Society 137
An extension of the Jeffreys-Matusita Distance to Multiclass Cases for Feature Selection 117
An experimental comparison of neural and statistical non-parametric algorithms for supervised classification of remote-sensing images 114
Classification of Multisensor Remote-Sensing Images by Structured Neural Networks 113
Supervised learning of descriptions for image recognition purposes 113
Structured Neural Networks for Signal Classification 112
Explaining Vulnerabilities of Deep Learning to Adversarial Malware Binaries 112
Multiple Classifier Systems for Robust Classifier Design in Adversarial Environments 112
Intelligent control of signal processing algorithms in communications 107
Experimental comparison of neural networks for the classification of multisensor remote-sensing images 103
A Parallel Network of Modified 1-NN and k-NN Classifiers – Application to Remote Sensing Image Classification 100
Adversarial EXEmples: A Survey and Experimental Evaluation of Practical Attacks on Machine Learning for Windows Malware Detection 92
ImageNet-Patch: A dataset for benchmarking machine learning robustness against adversarial patches 74
Adversarial Detection of Flash Malware: Limitations and Open Issues 69
F-measure optimisation in multi-label classifiers 68
The Hammer and the Nut: Is Bilevel Optimization Really Needed to Poison Linear Classifiers? 63
On Reducing the Effect of Covariate Factors in Gait Recognition: a Classifier Ensemble Method 63
Deep neural rejection against adversarial examples 61
Adaptive ensembles for face recognition in changing video surveillance environments 60
Nebula: Self-Attention for Dynamic Malware Analysis 59
A parameter randomization approach for constructing classifier ensembles 54
A novel classification-selection approach for the self updating of template-based face recognition systems 53
3D Face Reconstruction: The Road to Forensics 53
Analysis of Score-Level Fusion Rules for Deepfake Detection 52
Deepsquatting: Learning-based typosquatting detection at deeper domain levels 52
Indicators of Attack Failure: Debugging and Improving Optimization of Adversarial Examples 51
Functionality-Preserving Black-Box Optimization of Adversarial Windows Malware 51
Hardening RGB-D object recognition systems against adversarial patch attacks 50
Security evaluation of biometric authentication systems under real spoofing attacks 50
Machine Learning Security Against Data Poisoning: Are We There Yet? 49
SLIFER: Investigating performance and robustness of malware detection pipelines 48
Fingerprint Presentation Attacks Detection based on the User-Specific Effect 48
Is Deep Learning Safe for Robot Vision? Adversarial Examples against the iCub Humanoid 47
Cybersecurity and AI: The PRALab Research Experience 46
Backdoor learning curves: explaining backdoor poisoning beyond influence functions 46
Review of the Fingerprint Liveness Detection (LivDet) competition series: 2009 to 2015 46
null 46
One-and-a-half-class multiple classifier systems for secure learning against evasion attacks at test time 45
Do gradient-based explanations tell anything about adversarial robustness to android malware? 45
Adversarial attacks against intrusion detection systems: Taxonomy, solutions and open issues 45
Robust image classification with multi-modal large language models 44
Analysis of unsupervised template update in biometric recognition systems 43
Adversarial Feature Selection Against Evasion Attacks 43
Are spoofs from latent fingerprints a real threat for the best state-of-art liveness detectors? 43
Exploiting Dissimilarity Representations for Person Re-identification 43
Towards poisoning of deep learning algorithms with back-gradient optimization 42
Super-Sparse regression for fast age estimation from faces at test time 41
Why Do Adversarial Attacks Transfer? Explaining Transferability of Evasion and Poisoning Attacks 40
Gesture modelling and recognition by integrating declarative models and pattern recognition algorithms 39
Statistical meta-analysis of presentation attacks for secure multibiometric systems 39
Practical Attacks on Machine Learning: A Case Study on Adversarial Windows Malware 38
AttackBench: Evaluating Gradient-based Attacks for Adversarial Examples 38
Slope: A First-order Approach for Measuring Gradient Obfuscation 38
Wild patterns: Ten years after the rise of adversarial machine learning half-day tutorial 38
Explaining black-box android malware detection 38
Instance-based relevance feedback in image retrieval using dissimilarity spaces 38
Wild patterns: ten years after the rise of adversarial machine learning 38
Alarm clustering for intrusion detection systems in computer networks 37
Application of neural networks and statistical pattern recognition algorithms to earthquake risk evaluation 37
Analysis of error-reject trade-off in linearly combined multiple classifiers 37
Super-Sparse Learning in Similarity Spaces 37
Adversarial mimicry attacks against image splicing forensics: An approach for jointly hiding manipulations and creating false detections 36
Stock market prediction by a mixture of genetic-neural experts 36
DeltaPhish: Detecting phishing webpages in compromised websites 36
Neural shape codes for 3D model retrieval 36
Adversarial Attacks Against Uncertainty Quantification 35
Texture and artifact decomposition for improving generalization in deep-learning-based deepfake detection 35
AI Security and Safety: The PRALab Research Experience 35
EEG personal recognition based on ‘qualified majority’ over signal patches 35
An empirical investigation on the use of diversity for creation of classifier ensembles 35
Face anti-spoofing via hybrid convolutional neural network 35
Knowledge-Based Segmentation for the Identification of Pathologies in MR Images 35
Exploiting the golden ratio on human faces for head-pose estimation 35
Using Co-training and Self-training in Semi-Supervised Multiple Classifier Systems 35
Robustness Analysis of Likelihood Ratio Score Fusion Rule for Multimodal Biometric Systems under Spoof Attacks 34
Detecting Anomalies from Video-Sequences: a Novel Descriptor 34
Fingerprint recognition with embedded presentation attacks detection: are we ready? 33
Analysis of co-training algorithm with very small training sets 33
Fast image classification with reduced multiclass support vector machines 33
Why template self-update should work in biometric authentication systems? 33
Complexity of Data Subsets Generated by the Random Subspace Method: an Experimental Investigation 33
Adversarial biometric recognition: a review on biometric system security from the adversarial machine-learning perspective 33
Minimizing Energy Consumption of Deep Learning Models by Energy-Aware Training 32
A multi-modal dataset, protocol and tools for adaptive biometric systems: A benchmarking study 32
Towards quality assurance of software product lines with adversarial configurations 32
A survey and experimental evaluation of image spam filtering techniques 32
Bayesian relevance feedback for content-based image retrieval 32
Adaptive query shifting for content-based image retrieval 31
Competition on Counter Measures to 2-D Facial Spoofing Attacks 31
A Hybrid Training-Time and Run-Time Defense Against Adversarial Attacks in Modulation Classification 30
Security evaluation of pattern classifiers under attack 30
Multiple Classifier Systems 30
Adversarial Malware Binaries: Evading Deep Learning for Malware Detection in Executables 30
Infinity-norm support vector machines against adversarial label contamination 30
Error rejection in linearly combined multiple classifiers 30
An approach to the automatic design of multiple classifier systems 29
Statistical and neural classifiers: an integrated approach to design (Advances in Pattern Recognition Series) 29
Atti del Convegno su "Il Telerilevamento ed i Sistemi Informativi Territoriali nella Gestione delle Risorse Ambientali", Trento, Italia, 27 Ottobre 1994 29
Information fusion for computer security: State of the art and open issues 29
Totale 5.066
Categoria #
all - tutte 67.206
article - articoli 30.367
book - libri 233
conference - conferenze 30.952
curatela - curatele 78
other - altro 1.826
patent - brevetti 0
selected - selezionate 0
volume - volumi 3.750
Totale 134.412


Totale Lug Ago Sett Ott Nov Dic Gen Feb Mar Apr Mag Giu
2020/202148 0 0 0 0 8 7 0 5 8 8 5 7
2021/2022565 1 6 2 18 3 13 12 35 4 15 186 270
2022/2023858 135 34 24 63 109 140 3 53 166 6 101 24
2023/20241.180 42 82 14 106 84 163 166 137 66 62 52 206
2024/20253.740 66 505 77 97 678 487 286 266 220 202 256 600
2025/20262.056 827 181 502 530 16 0 0 0 0 0 0 0
Totale 9.145