BIGGIO, BATTISTA
 Distribuzione geografica
Continente #
EU - Europa 169.842
NA - Nord America 9.850
AS - Asia 8.060
SA - Sud America 975
AF - Africa 193
OC - Oceania 92
Continente sconosciuto - Info sul continente non disponibili 9
Totale 189.021
Nazione #
IT - Italia 165.952
US - Stati Uniti d'America 9.607
CN - Cina 2.266
SG - Singapore 2.170
TW - Taiwan 1.553
NL - Olanda 1.104
BR - Brasile 753
SE - Svezia 615
VN - Vietnam 570
HK - Hong Kong 507
DE - Germania 469
UA - Ucraina 442
FR - Francia 296
GB - Regno Unito 278
FI - Finlandia 246
IN - India 180
CA - Canada 159
KR - Corea 141
JP - Giappone 98
BD - Bangladesh 93
AU - Australia 76
AR - Argentina 72
MX - Messico 59
BE - Belgio 58
AT - Austria 54
ES - Italia 54
IQ - Iraq 52
TR - Turchia 51
ID - Indonesia 47
RU - Federazione Russa 47
PK - Pakistan 46
ZA - Sudafrica 44
EC - Ecuador 42
GR - Grecia 34
SA - Arabia Saudita 34
CI - Costa d'Avorio 32
PH - Filippine 32
CO - Colombia 30
PL - Polonia 28
IL - Israele 25
IR - Iran 25
VE - Venezuela 25
PT - Portogallo 23
MA - Marocco 21
CZ - Repubblica Ceca 20
TN - Tunisia 20
UZ - Uzbekistan 20
MY - Malesia 19
CH - Svizzera 18
DZ - Algeria 18
IE - Irlanda 18
AE - Emirati Arabi Uniti 16
AZ - Azerbaigian 16
NZ - Nuova Zelanda 16
JO - Giordania 15
KE - Kenya 15
CL - Cile 13
RO - Romania 13
LT - Lituania 12
NO - Norvegia 12
PY - Paraguay 11
EG - Egitto 10
OM - Oman 10
PE - Perù 10
EU - Europa 9
TH - Thailandia 9
UY - Uruguay 9
AL - Albania 8
BO - Bolivia 8
DK - Danimarca 8
KZ - Kazakistan 8
PS - Palestinian Territory 7
SC - Seychelles 7
ET - Etiopia 6
LK - Sri Lanka 6
NP - Nepal 6
RS - Serbia 6
AM - Armenia 5
CR - Costa Rica 5
DO - Repubblica Dominicana 5
JM - Giamaica 5
KG - Kirghizistan 5
YE - Yemen 5
BG - Bulgaria 4
CY - Cipro 4
NG - Nigeria 4
PA - Panama 4
SK - Slovacchia (Repubblica Slovacca) 4
EE - Estonia 3
HU - Ungheria 3
LB - Libano 3
QA - Qatar 3
SN - Senegal 3
SY - Repubblica araba siriana 3
TT - Trinidad e Tobago 3
AO - Angola 2
BA - Bosnia-Erzegovina 2
BW - Botswana 2
KH - Cambogia 2
KW - Kuwait 2
Totale 188.990
Città #
Cagliari 160.889
Uta 4.062
Taipei 1.521
Singapore 1.169
Amsterdam 1.077
Ashburn 1.034
Fairfield 822
San Jose 682
Chandler 607
Woodbridge 596
Dallas 503
Houston 430
Boardman 424
Hong Kong 399
Beijing 372
Ann Arbor 358
Nyköping 337
Seattle 321
Wilmington 312
Cambridge 271
Los Angeles 253
Jacksonville 222
Ho Chi Minh City 196
Shanghai 171
Dearborn 161
Hefei 159
Helsinki 150
Santa Clara 148
The Dalles 148
Hanoi 126
Lauterbourg 124
Nanjing 96
Boston 94
Seoul 88
Council Bluffs 86
New York 79
Buffalo 73
Guangzhou 72
Redwood City 72
São Paulo 69
Hangzhou 68
Tokyo 66
Milan 65
Munich 61
San Diego 58
Rome 55
Xi'an 53
Frankfurt am Main 50
London 46
Sassari 41
Chicago 39
Redondo Beach 39
Shenyang 38
Brussels 36
Ottawa 36
Rio de Janeiro 35
Changsha 32
Nanchang 31
Toronto 31
Columbus 30
Dong Ket 30
Abidjan 29
Genoa 28
Montreal 28
Sestu 28
Denver 27
Saarbrücken 27
Washington 26
Da Nang 25
Melbourne 25
Tianjin 25
Atlanta 24
Hebei 24
Johannesburg 24
Chennai 23
Orem 23
Shenzhen 23
Zhengzhou 23
Brooklyn 21
Jinan 21
Manchester 21
San Francisco 21
Baghdad 20
Brisbane 20
Dhaka 20
Haiphong 20
Mountain View 20
Nuremberg 20
Quito 20
Vienna 20
Tashkent 19
Thessaloniki 19
Wuhan 19
Jiaxing 18
Lappeenranta 18
Naples 18
Norwalk 18
Belo Horizonte 17
Namur 17
Paris 17
Totale 180.569
Nome #
Explaining vulnerabilities of deep learning to adversarial malware binaries 5.132
Fast image classification with reduced multiclass support vector machines 3.525
Deepsquatting: Learning-based typosquatting detection at deeper domain levels 3.094
Yes, Machine Learning Can Be More Secure! A Case Study on Android Malware Detection 3.045
Detecting Misuse of Google Cloud Messaging in Android Badware 2.946
Adversarial biometric recognition: a review on biometric system security from the adversarial machine-learning perspective 2.858
Infinity-norm support vector machines against adversarial label contamination 2.850
Adversarial Malware Binaries: Evading Deep Learning for Malware Detection in Executables 2.843
Poisoning behavioral malware clustering 2.786
Explaining black-box android malware detection 2.767
Statistical meta-analysis of presentation attacks for secure multibiometric systems 2.752
Who are you? A statistical approach to measuring user authenticity 2.733
Secure Kernel Machines against Evasion Attacks 2.708
Optimization and deployment of CNNs at the Edge: The ALOHA experience 2.654
Super-Sparse Learning in Similarity Spaces 2.599
One-and-a-half-class multiple classifier systems for secure learning against evasion attacks at test time 2.583
DeltaPhish: Detecting phishing webpages in compromised websites 2.575
Multimodal Anti-spoofing in Biometric Recognition Systems 2.561
Evasion attacks against machine learning at test time 2.322
Detection of malicious scripting code through discriminant and adversary-aware API analysis 2.314
ALOHA: An architectural-aware framework for deep learning at the edge 2.310
Poisoning attacks against support vector machines 2.292
Towards poisoning of deep learning algorithms with back-gradient optimization 2.273
Towards adversarial malware detection: lessons learned from PDF-based attacks 2.268
Anti-spoofing: Multimodal 2.236
Deep neural rejection against adversarial examples 2.200
Sparse support faces 2.177
Why Do Adversarial Attacks Transfer? Explaining Transferability of Evasion and Poisoning Attacks 2.171
Randomized Prediction Games for Adversarial Machine Learning 2.158
Wild patterns: ten years after the rise of adversarial machine learning 2.061
A survey and experimental evaluation of image spam filtering techniques 2.041
null 1.989
Is data clustering in adversarial settings secure? 1.904
Data-driven Journal Meta-ranking in Business and Management 1.897
Wild Patterns Reloaded: A Survey of Machine Learning Security against Training Data Poisoning 1.869
null 1.859
null 1.823
Digital Investigation of PDF Files: Unveiling Traces of Embedded Malware 1.783
Pattern recognition systems under attack: design issues and research challenges 1.768
null 1.757
Deep Learning and Security Workshop 2019 1.740
Architecture-aware design and implementation of CNN algorithms for embedded inference: The ALOHA project 1.720
Security evaluation of pattern classifiers under attack 1.715
Adversarial detection of Flash Malware: limitations and Open issues 1.704
Is feature selection secure against training data poisoning? 1.682
null 1.583
Manipulating Machine Learning: Poisoning Attacks and Countermeasures for Regression Learning 1.549
Towards quality assurance of software product lines with adversarial configurations 1.411
Pattern recognition systems under attack 1.408
Cybersecurity and AI: The PRALab Research Experience 1.397
Functionality-preserving black-box optimization of adversarial windows malware 1.379
Why adversarial reprogramming works, when it fails, and how to tell the difference 1.365
null 1.355
Poisoning Attacks on Algorithmic Fairness 1.322
Adversarial EXEmples: A Survey and Experimental Evaluation of Practical Attacks on Machine Learning for Windows Malware Detection 1.305
Explaining Machine Learning DGA Detectors from DNS Traffic Data 1.259
Samples on Thin Ice: Re-evaluating Adversarial Pruning of Neural Networks 1.251
Societal issues in machine learning: When learning from data is not enough 1.245
Support vector machines under adversarial label contamination 1.243
null 1.196
On Learning and Recognition of Secure Patterns 1.111
Super-Sparse regression for fast age estimation from faces at test time 1.066
Poster: Attacking malware classifiers by crafting gradient-attacks that preserve functionality 1.054
Empirical assessment of generating adversarial configurations for software product lines 1.014
AI Security and Safety: The PRALab Research Experience 1.013
Do gradient-based explanations tell anything about adversarial robustness to android malware? 1.013
Robustness of Multi-modal Biometric Systems under Realistic Spoof Attacks against All Traits 1.001
Chairs’ introduction and welcome to AISec 2018 986
Robust Machine Learning for Malware Detection over Time 974
Detecting adversarial examples through nonlinear dimensionality reduction 963
Security of Pattern recognition in adversarial environments 947
Multiple Classifier Systems for Robust Classifier Design in Adversarial Environments 942
Toward Effective Traffic Sign Detection via Two-Stage Fusion Neural Networks 933
Chairs' introduction and welcome to AISEC 2019 928
The hammer and the nut: is bilevel optimization really needed to poison linear classifiers? 917
null 914
null 882
Learning sparse kernel machines with biometric similarity functions for identity recognition 879
Hardening RGB-D object recognition systems against adversarial patch attacks 855
Minimizing Energy Consumption of Deep Learning Models by Energy-Aware Training 824
Multiple classifier systems under attack 787
Towards learning trustworthily, automatically, and with guarantees on graphs: an overview 776
Poisoning attacks to compromise face templates 775
null 772
Adversarial Machine Learning: Attacks From Laboratories to the Real World 764
Detecting Attacks Against Deep Reinforcement Learning for Autonomous Driving 728
Is Deep Learning Safe for Robot Vision? Adversarial Examples against the iCub Humanoid 725
Security of pattern recognition systems in adversarial environments 721
Poisoning adaptive biometric systems 713
null 708
FADER: Fast Adversarial Example Rejection 706
Improving Fast Minimum-Norm Attacks with Hyperparameter Optimization 704
ImageNet-Patch: a dataset for benchmarking machine learning robustness against adversarial patches 695
Preface 695
Poisoning attacks on cyber attack detectors for industrial control systems 685
Fast minimum-norm adversarial attacks through adaptive norm constraints 681
Wild patterns: Ten years after the rise of adversarial machine learning half-day tutorial 677
Security Evaluation of Support Vector Machines in Adversarial Environments 674
Tessellation-Filtering ReLU Neural Networks 663
null 661
Totale 160.838
Categoria #
all - tutte 245.989
article - articoli 0
book - libri 0
conference - conferenze 0
curatela - curatele 0
other - altro 0
patent - brevetti 0
selected - selezionate 0
volume - volumi 0
Totale 245.989


Totale Lug Ago Sett Ott Nov Dic Gen Feb Mar Apr Mag Giu
2020/20213.426 0 0 0 0 0 0 0 0 0 0 2.030 1.396
2021/202210.527 990 698 412 544 828 832 629 377 1.046 1.293 1.306 1.572
2022/202315.678 1.433 2.168 1.897 1.290 1.446 1.537 740 1.039 1.000 1.031 1.339 758
2023/202420.391 741 635 663 1.209 2.285 4.352 3.034 1.262 920 1.455 1.996 1.839
2024/202545.843 10.988 11.969 4.322 7.245 2.287 2.870 3.021 286 373 1.434 427 621
2025/202611.718 1.046 682 1.207 967 916 799 2.146 1.257 1.148 1.529 21 0
Totale 189.861