ROLI, FABIO
 Distribuzione geografica
Continente #
EU - Europa 347.148
NA - Nord America 28.809
AS - Asia 9.711
SA - Sud America 1.751
AF - Africa 161
OC - Oceania 81
Continente sconosciuto - Info sul continente non disponibili 25
Totale 387.686
Nazione #
IT - Italia 339.772
US - Stati Uniti d'America 28.482
CN - Cina 4.252
SG - Singapore 3.715
UA - Ucraina 2.163
SE - Svezia 1.560
BR - Brasile 1.481
NL - Olanda 1.100
DE - Germania 718
FI - Finlandia 582
GB - Regno Unito 539
VN - Vietnam 438
KR - Corea 248
CA - Canada 230
HK - Hong Kong 228
FR - Francia 226
IN - India 192
AR - Argentina 102
RU - Federazione Russa 91
BD - Bangladesh 85
BE - Belgio 77
AU - Australia 64
JP - Giappone 64
MX - Messico 64
ID - Indonesia 63
TR - Turchia 61
ES - Italia 60
EC - Ecuador 56
ZA - Sudafrica 48
TW - Taiwan 47
IQ - Iraq 45
AT - Austria 44
PK - Pakistan 41
IR - Iran 34
PL - Polonia 33
CO - Colombia 27
SA - Arabia Saudita 26
IE - Irlanda 24
PT - Portogallo 24
CI - Costa d'Avorio 22
EU - Europa 22
MA - Marocco 22
UZ - Uzbekistan 21
MY - Malesia 20
IL - Israele 19
CZ - Repubblica Ceca 18
UY - Uruguay 18
JO - Giordania 16
NZ - Nuova Zelanda 16
CH - Svizzera 15
CL - Cile 15
VE - Venezuela 15
PY - Paraguay 14
EG - Egitto 13
KE - Kenya 13
LT - Lituania 13
TN - Tunisia 13
DK - Danimarca 12
DZ - Algeria 12
GR - Grecia 12
PE - Perù 12
KZ - Kazakistan 11
PH - Filippine 11
RO - Romania 11
AZ - Azerbaigian 8
BO - Bolivia 8
JM - Giamaica 8
OM - Oman 8
BG - Bulgaria 7
RS - Serbia 7
TH - Thailandia 7
BY - Bielorussia 6
DO - Repubblica Dominicana 6
NO - Norvegia 6
PA - Panama 6
PS - Palestinian Territory 6
AE - Emirati Arabi Uniti 5
ET - Etiopia 5
LK - Sri Lanka 5
NP - Nepal 5
AL - Albania 4
AM - Armenia 4
KG - Kirghizistan 4
LB - Libano 4
SN - Senegal 4
BA - Bosnia-Erzegovina 3
BH - Bahrain 3
CR - Costa Rica 3
HU - Ungheria 3
IS - Islanda 3
MD - Moldavia 3
MN - Mongolia 3
SK - Slovacchia (Repubblica Slovacca) 3
A1 - Anonimo 2
AO - Angola 2
BB - Barbados 2
CY - Cipro 2
EE - Estonia 2
GT - Guatemala 2
GY - Guiana 2
Totale 387.653
Città #
Cagliari 329.774
Uta 8.631
Fairfield 3.493
Woodbridge 3.073
Ashburn 2.144
Houston 2.095
Chandler 1.931
Singapore 1.665
Ann Arbor 1.490
Seattle 1.380
Wilmington 1.335
Dallas 1.311
Boardman 1.227
Cambridge 1.205
Jacksonville 1.199
Amsterdam 1.065
Beijing 863
Nyköping 857
Dearborn 498
Nanjing 367
Los Angeles 358
Hefei 341
Boston 317
Shanghai 284
Santa Clara 253
Seoul 220
Buffalo 212
Helsinki 211
The Dalles 204
San Diego 174
Hong Kong 165
New York 165
Council Bluffs 150
Ho Chi Minh City 143
Guangzhou 137
Redwood City 136
São Paulo 132
Nanchang 130
Shenyang 127
Hebei 117
Milan 111
Hangzhou 105
Changsha 103
Mountain View 103
Columbus 98
Redondo Beach 88
Toronto 83
Tianjin 80
Jiaxing 78
Jinan 75
Hanoi 74
Sassari 73
Munich 68
London 63
Verona 58
Norwalk 56
Brussels 55
Rome 53
Zhengzhou 53
Atlanta 52
Ottawa 51
Washington 51
Auburn Hills 48
Rio de Janeiro 48
Chicago 47
Orange 45
Tokyo 40
Frankfurt am Main 37
San Jose 37
Belo Horizonte 36
Brooklyn 36
Indiana 35
Montreal 35
Ningbo 34
Pune 34
Brasília 31
Johannesburg 31
Wuhan 31
Haiphong 28
Kunming 28
Lviv 28
Phoenix 28
Porto Alegre 28
San Francisco 28
Nuremberg 27
Dong Ket 26
Quito 26
Denver 25
Xi'an 25
Curitiba 24
Warsaw 24
Genoa 23
Secaucus 23
Stockholm 23
Abidjan 21
Borås 21
Lappeenranta 21
Sestu 21
Tashkent 21
Genova 20
Totale 372.354
Nome #
Explaining vulnerabilities of deep learning to adversarial malware binaries 5.086
Analysis of unsupervised template update in biometric recognition systems 3.578
Multimodal fingerprint verification by score-level fusion: an experimental investigation 3.514
Fast image classification with reduced multiclass support vector machines 3.493
PharmaGuard: Automatic identification of illegal search-indexed online pharmacies 3.223
A (Cyber)ROAD to the Future: A Methodology for Building Cybersecurity Research Roadmaps 3.094
Deepsquatting: Learning-based typosquatting detection at deeper domain levels 3.043
Yet Another Cybersecurity Roadmapping Methodology 3.036
Yes, Machine Learning Can Be More Secure! A Case Study on Android Malware Detection 2.999
An empirical investigation on the use of diversity for creation of classifier ensembles 2.828
Review of fingerprint presentation attack detection competitions 2.828
An experimental investigation on self adaptive facial recognition algorithms using a long time span data set 2.823
Adversarial biometric recognition: a review on biometric system security from the adversarial machine-learning perspective 2.819
Adversarial Malware Binaries: Evading Deep Learning for Malware Detection in Executables 2.806
A parameter randomization approach for constructing classifier ensembles 2.796
Infinity-norm support vector machines against adversarial label contamination 2.794
Poisoning behavioral malware clustering 2.760
Statistical meta-analysis of presentation attacks for secure multibiometric systems 2.729
Explaining black-box android malware detection 2.726
Secure Kernel Machines against Evasion Attacks 2.649
Gesture modelling and recognition by integrating declarative models and pattern recognition algorithms 2.621
A multi-stage approach for fast person re-identification 2.592
One-and-a-half-class multiple classifier systems for secure learning against evasion attacks at test time 2.554
Super-Sparse Learning in Similarity Spaces 2.552
Multimodal Anti-spoofing in Biometric Recognition Systems 2.524
DeltaPhish: Detecting phishing webpages in compromised websites 2.518
2020 Cybercrime Economic Costs: No Measure No Solution 2.482
Evasion attacks against machine learning at test time 2.297
Designing multi-label classifiers that maximize F measures: state of the art 2.270
Fingerprint Presentation Attacks Detection based on the User-Specific Effect 2.233
Towards poisoning of deep learning algorithms with back-gradient optimization 2.225
DEICTIC: a compositional and declarative gesture description based on hidden markov models 2.211
Fingerprint liveness detection using local texture features 2.196
Deep neural rejection against adversarial examples 2.171
Sparse support faces 2.157
A novel classification-selection approach for the self updating of template-based face recognition systems 2.141
Why Do Adversarial Attacks Transfer? Explaining Transferability of Evasion and Poisoning Attacks 2.139
Multi-Stage Ranking Approach for Fast Person Re-Identification 2.132
Randomized Prediction Games for Adversarial Machine Learning 2.128
User-specific effects in Fingerprint Presentation Attacks Detection: Insights for future research 2.100
A classification-selection approach for self updating of face verification systems under stringent storage and computational requirements 2.074
Adversarial attacks against intrusion detection systems: Taxonomy, solutions and open issues 2.040
Wild patterns: ten years after the rise of adversarial machine learning 2.022
A survey and experimental evaluation of image spam filtering techniques 2.010
null 1.989
Multimodal Person ReIdentification Using RGB-D Cameras 1.974
Why template self-update should work in biometric authentication systems? 1.967
LivDet 2015 fingerprint liveness detection competition 2015 1.934
Is data clustering in adversarial settings secure? 1.866
null 1.859
Machine learning in computer forensics (and the lessons learned from machine learning in computer security) 1.830
null 1.823
Wild Patterns Reloaded: A Survey of Machine Learning Security against Training Data Poisoning 1.814
Adaptive appearance model tracking for still-to-video face recognition 1.793
null 1.757
Designing multiple biometric systems: Measures of ensemble effectiveness 1.750
Efficient Adaptive Face Recognition Systems Based on Capture Conditions 1.742
Pattern recognition systems under attack: design issues and research challenges 1.730
A novel method for head pose estimation based on the "Vitruvian Man" 1.703
null 1.700
Security evaluation of pattern classifiers under attack 1.689
Adversarial detection of Flash Malware: limitations and Open issues 1.660
Is feature selection secure against training data poisoning? 1.659
Context-Sensitive Self-Updating for Adaptive Face Recognition 1.655
null 1.632
null 1.629
null 1.592
null 1.583
Towards realistic fingerprint presentation attacks: The ScreenSpoof method 1.557
A score decidability index for dynamic score combination 1.545
Fusion of multiple classifiers for intrusion detection in computer networks 1.533
Video face recognition from a single still image using an adaptive appearance model tracker 1.499
Adaptive Classification for Person Re-Identification Driven by Change Detection 1.458
Pattern recognition systems under attack 1.384
Experimental Results on the Feature-level Fusion of Multiple Fingerprint Liveness Detection Algorithms 1.376
Towards quality assurance of software product lines with adversarial configurations 1.373
EEG personal recognition based on ‘qualified majority’ over signal patches 1.373
Dynamic weighted fusion of adaptive classifier ensembles based on changing data streams 1.361
null 1.355
Functionality-preserving black-box optimization of adversarial windows malware 1.340
Ensemble learning for Intrusion Detection in Computer Networks 1.330
Cybersecurity and AI: The PRALab Research Experience 1.326
Why adversarial reprogramming works, when it fails, and how to tell the difference 1.317
Learning extremely shared middle-level image representation for scene classification 1.314
Learning of multilabel classifiers 1.312
Fusion of multiple clues for photo-attack detection in face recognition systems 1.307
Pattern Recognition and Information Fusion for Ambient and Computer Network Security 1.299
Adaptive ensembles for face recognition in changing video surveillance environments 1.275
LivDet 2011 - Fingerprint Liveness Detection Competition 2011 1.259
Adversarial EXEmples: A Survey and Experimental Evaluation of Practical Attacks on Machine Learning for Windows Malware Detection 1.243
Support vector machines under adversarial label contamination 1.213
Fingerprint liveness detection by local phase quantization 1.204
Analysis of Score-Level Fusion Rules for Deepfake Detection 1.199
null 1.196
Editorial of the Special Issue on Multi-instance Learning in Pattern Recognition and Vision 1.178
null 1.175
null 1.169
Multi-label classification with a reject option 1.146
Real-time appearance-based person re-identification over multiple Kinect cameras 1.139
The Ambient Intelligence Laboratory of the Sardegna DistricICT 1.137
Totale 200.235
Categoria #
all - tutte 531.183
article - articoli 0
book - libri 0
conference - conferenze 0
curatela - curatele 0
other - altro 0
patent - brevetti 0
selected - selezionate 0
volume - volumi 0
Totale 531.183


Totale Lug Ago Sett Ott Nov Dic Gen Feb Mar Apr Mag Giu
2020/202133.961 0 0 0 0 0 9.226 8.418 4.567 1.736 3.583 3.513 2.918
2021/202222.548 2.143 1.691 1.115 1.083 1.839 1.743 1.451 911 2.189 2.393 2.658 3.332
2022/202333.805 3.045 4.278 3.878 3.120 3.095 3.273 1.418 3.974 1.971 1.776 2.446 1.531
2023/202437.404 1.693 1.488 1.695 2.289 3.909 5.976 5.213 2.538 1.657 3.445 3.877 3.624
2024/202578.518 13.950 17.704 9.067 12.239 4.537 7.476 8.251 643 821 1.778 892 1.160
2025/202610.082 1.441 1.045 2.961 1.859 1.539 1.237 0 0 0 0 0 0
Totale 389.018