BIGGIO, BATTISTA
 Distribuzione geografica
Continente #
EU - Europa 160.649
NA - Nord America 6.631
AS - Asia 3.269
SA - Sud America 67
OC - Oceania 59
AF - Africa 39
Continente sconosciuto - Info sul continente non disponibili 9
Totale 170.723
Nazione #
IT - Italia 158.870
US - Stati Uniti d'America 6.526
TW - Taiwan 1.531
CN - Cina 946
SE - Svezia 492
UA - Ucraina 408
SG - Singapore 325
DE - Germania 280
GB - Regno Unito 166
HK - Hong Kong 146
FI - Finlandia 136
CA - Canada 94
FR - Francia 69
IN - India 55
BR - Brasile 51
AU - Australia 50
BE - Belgio 50
JP - Giappone 48
KR - Corea 47
VN - Vietnam 39
CI - Costa d'Avorio 27
RU - Federazione Russa 25
AT - Austria 22
PK - Pakistan 18
CZ - Repubblica Ceca 17
NL - Olanda 16
PT - Portogallo 16
IL - Israele 15
IR - Iran 14
CH - Svizzera 13
TR - Turchia 13
ES - Italia 12
MX - Messico 10
EU - Europa 9
GR - Grecia 9
MY - Malesia 9
NO - Norvegia 9
NZ - Nuova Zelanda 9
SA - Arabia Saudita 9
AE - Emirati Arabi Uniti 8
IE - Irlanda 8
RO - Romania 8
EC - Ecuador 6
IQ - Iraq 6
BD - Bangladesh 5
DK - Danimarca 5
PL - Polonia 5
TH - Thailandia 5
YE - Yemen 5
ID - Indonesia 4
PH - Filippine 4
AR - Argentina 3
CO - Colombia 3
LK - Sri Lanka 3
LT - Lituania 3
ZA - Sudafrica 3
AM - Armenia 2
DZ - Algeria 2
EE - Estonia 2
HU - Ungheria 2
JO - Giordania 2
LI - Liechtenstein 2
MN - Mongolia 2
QA - Qatar 2
SY - Repubblica araba siriana 2
TN - Tunisia 2
UG - Uganda 2
UY - Uruguay 2
AL - Albania 1
AZ - Azerbaigian 1
BG - Bulgaria 1
CG - Congo 1
CL - Cile 1
DO - Repubblica Dominicana 1
EG - Egitto 1
IS - Islanda 1
LB - Libano 1
OM - Oman 1
PE - Perù 1
PS - Palestinian Territory 1
SC - Seychelles 1
SK - Slovacchia (Repubblica Slovacca) 1
Totale 170.723
Città #
Cagliari 154.193
Uta 4.039
Taipei 1.507
Fairfield 822
Chandler 607
Woodbridge 596
Ashburn 490
Houston 419
Boardman 418
Ann Arbor 358
Nyköping 337
Seattle 314
Wilmington 312
Cambridge 271
Jacksonville 221
Dearborn 161
Shanghai 155
Singapore 151
Santa Clara 122
Beijing 111
Hong Kong 95
Nanjing 92
Boston 80
Redwood City 72
Helsinki 65
San Diego 58
Los Angeles 51
Guangzhou 45
Xi'an 41
Ottawa 36
Shenyang 36
Rome 33
London 31
Nanchang 31
Dong Ket 30
Brussels 29
Hangzhou 28
Sassari 28
Sestu 28
Abidjan 26
Changsha 25
Hebei 24
Mountain View 20
Tokyo 20
Zhengzhou 20
Milan 19
Chicago 18
Jinan 18
Norwalk 18
Washington 18
Jiaxing 17
Namur 17
Seoul 17
Brisbane 16
Toronto 16
Munich 15
Wuhan 15
Melbourne 14
New York 14
Genova 13
Tianjin 13
Frankfurt am Main 12
Genoa 12
Ningbo 12
Selargius 12
Assèmini 11
Atlanta 11
Hefei 11
Porto 11
Pune 11
Redmond 11
Saarbrücken 11
Xian 11
Chongqing 10
Kunming 10
Quartucciu 10
Shenzhen 10
Council Bluffs 8
Fremont 8
Hanover 8
Islamabad 8
Vienna 8
Wuxi 8
Dammam 7
Falls Church 7
Stillwater 7
Torino 7
Aachen 6
Abu Dhabi 6
Alghero 6
Ankara 6
Bengaluru 6
Central 6
Chicoutimi 6
Dortmund 6
Ecatepec De Morelos 6
Indiana 6
Kai Yi Wan 6
Madrid 6
Monserrato 6
Totale 167.236
Nome #
Explaining vulnerabilities of deep learning to adversarial malware binaries 4.979
Fast image classification with reduced multiclass support vector machines 3.409
Deepsquatting: Learning-based typosquatting detection at deeper domain levels 2.959
Yes, Machine Learning Can Be More Secure! A Case Study on Android Malware Detection 2.877
Detecting Misuse of Google Cloud Messaging in Android Badware 2.841
Adversarial Malware Binaries: Evading Deep Learning for Malware Detection in Executables 2.741
Adversarial biometric recognition: a review on biometric system security from the adversarial machine-learning perspective 2.732
Infinity-norm support vector machines against adversarial label contamination 2.716
Poisoning behavioral malware clustering 2.699
Explaining black-box android malware detection 2.641
Statistical meta-analysis of presentation attacks for secure multibiometric systems 2.622
Who are you? A statistical approach to measuring user authenticity 2.622
Secure Kernel Machines against Evasion Attacks 2.560
Optimization and deployment of CNNs at the Edge: The ALOHA experience 2.510
Super-Sparse Learning in Similarity Spaces 2.477
One-and-a-half-class multiple classifier systems for secure learning against evasion attacks at test time 2.464
Multimodal Anti-spoofing in Biometric Recognition Systems 2.458
DeltaPhish: Detecting phishing webpages in compromised websites 2.429
ALOHA: An architectural-aware framework for deep learning at the edge 2.208
Evasion attacks against machine learning at test time 2.203
Detection of malicious scripting code through discriminant and adversary-aware API analysis 2.192
Poisoning attacks against support vector machines 2.176
Towards adversarial malware detection: lessons learned from PDF-based attacks 2.150
Towards poisoning of deep learning algorithms with back-gradient optimization 2.148
Anti-spoofing: Multimodal 2.124
Sparse support faces 2.072
Deep neural rejection against adversarial examples 2.061
Randomized Prediction Games for Adversarial Machine Learning 2.060
Why Do Adversarial Attacks Transfer? Explaining Transferability of Evasion and Poisoning Attacks 2.039
null 1.989
Wild patterns: ten years after the rise of adversarial machine learning 1.929
null 1.859
null 1.823
Data-driven Journal Meta-ranking in Business and Management 1.822
Is data clustering in adversarial settings secure? 1.793
null 1.757
Wild Patterns Reloaded: A Survey of Machine Learning Security against Training Data Poisoning 1.724
Deep Learning and Security Workshop 2019 1.687
Digital Investigation of PDF Files: Unveiling Traces of Embedded Malware 1.672
Pattern recognition systems under attack: design issues and research challenges 1.644
Security evaluation of pattern classifiers under attack 1.634
Is feature selection secure against training data poisoning? 1.607
Architecture-aware design and implementation of CNN algorithms for embedded inference: The ALOHA project 1.602
null 1.588
null 1.583
Manipulating Machine Learning: Poisoning Attacks and Countermeasures for Regression Learning 1.494
null 1.355
Pattern recognition systems under attack 1.333
Towards quality assurance of software product lines with adversarial configurations 1.321
Functionality-Preserving Black-Box Optimization of Adversarial Windows Malware 1.237
Poisoning Attacks on Algorithmic Fairness 1.216
Why adversarial reprogramming works, when it fails, and how to tell the difference 1.212
null 1.196
Cybersecurity and AI: The PRALab Research Experience 1.176
Societal issues in machine learning: When learning from data is not enough 1.159
Adversarial EXEmples: A Survey and Experimental Evaluation of Practical Attacks on Machine Learning for Windows Malware Detection 1.154
Support vector machines under adversarial label contamination 1.147
Explaining Machine Learning DGA Detectors from DNS Traffic Data 1.130
Samples on Thin Ice: Re-evaluating Adversarial Pruning of Neural Networks 1.067
On Learning and Recognition of Secure Patterns 1.057
Poster: Attacking malware classifiers by crafting gradient-attacks that preserve functionality 1.000
Super-Sparse regression for fast age estimation from faces at test time 995
Chairs’ introduction and welcome to AISec 2018 935
null 914
Detecting adversarial examples through nonlinear dimensionality reduction 914
Robustness of Multi-modal Biometric Systems under Realistic Spoof Attacks against All Traits 911
Empirical assessment of generating adversarial configurations for software product lines 898
null 882
A survey and experimental evaluation of image spam filtering techniques 870
Multiple Classifier Systems for Robust Classifier Design in Adversarial Environments 869
Security of Pattern recognition in adversarial environments 862
Robust Machine Learning for Malware Detection over Time 854
Chairs' introduction and welcome to AISEC 2019 851
Do gradient-based explanations tell anything about adversarial robustness to android malware? 846
The hammer and the nut: is bilevel optimization really needed to poison linear classifiers? 820
Learning sparse kernel machines with biometric similarity functions for identity recognition 817
AI Security and Safety: The PRALab Research Experience 778
null 772
Toward Effective Traffic Sign Detection via Two-Stage Fusion Neural Networks 746
Multiple classifier systems under attack 714
null 708
Adversarial Machine Learning: Attacks From Laboratories to the Real World 704
Wild patterns: Ten years after the rise of adversarial machine learning half-day tutorial 677
Towards learning trustworthily, automatically, and with guarantees on graphs: an overview 671
null 661
Security of pattern recognition systems in adversarial environments 655
Hardening RGB-D object recognition systems against adversarial patch attacks 651
Poisoning attacks to compromise face templates 650
Minimizing Energy Consumption of Deep Learning Models by Energy-Aware Training 631
Is Deep Learning Safe for Robot Vision? Adversarial Examples against the iCub Humanoid 622
null 618
Poisoning adaptive biometric systems 615
Poisoning attacks on cyber attack detectors for industrial control systems 615
Preface 610
Fast minimum-norm adversarial attacks through adaptive norm constraints 585
Tessellation-Filtering ReLU Neural Networks 578
Support Vector Machines Under Adversarial Label Noise 575
Detecting Attacks Against Deep Reinforcement Learning for Autonomous Driving 571
FADER: Fast Adversarial Example Rejection 564
Preface 555
Totale 149.900
Categoria #
all - tutte 210.262
article - articoli 0
book - libri 0
conference - conferenze 0
curatela - curatele 0
other - altro 0
patent - brevetti 0
selected - selezionate 0
volume - volumi 0
Totale 210.262


Totale Lug Ago Sett Ott Nov Dic Gen Feb Mar Apr Mag Giu
2019/202013.791 0 0 0 0 0 6.057 3.645 811 656 870 628 1.124
2020/202137.828 1.422 1.163 1.831 11.293 7.760 3.451 3.352 1.925 795 1.410 2.030 1.396
2021/202210.527 990 698 412 544 828 832 629 377 1.046 1.293 1.306 1.572
2022/202315.678 1.433 2.168 1.897 1.290 1.446 1.537 740 1.039 1.000 1.031 1.339 758
2023/202420.391 741 635 663 1.209 2.285 4.352 3.034 1.262 920 1.455 1.996 1.839
2024/202539.080 10.988 11.969 4.322 7.245 2.287 2.269 0 0 0 0 0 0
Totale 171.380