BIGGIO, BATTISTA
 Distribuzione geografica
Continente #
EU - Europa 166.821
NA - Nord America 8.587
AS - Asia 5.980
SA - Sud America 809
AF - Africa 112
OC - Oceania 84
Continente sconosciuto - Info sul continente non disponibili 9
Totale 182.402
Nazione #
IT - Italia 163.351
US - Stati Uniti d'America 8.382
CN - Cina 1.808
TW - Taiwan 1.546
SG - Singapore 1.452
NL - Olanda 1.087
BR - Brasile 667
SE - Svezia 613
UA - Ucraina 437
DE - Germania 410
HK - Hong Kong 302
GB - Regno Unito 242
VN - Vietnam 226
FI - Finlandia 169
FR - Francia 148
CA - Canada 143
KR - Corea 135
IN - India 97
JP - Giappone 80
AU - Australia 69
AR - Argentina 53
BE - Belgio 53
AT - Austria 52
BD - Bangladesh 49
MX - Messico 48
ES - Italia 45
RU - Federazione Russa 43
ID - Indonesia 37
TR - Turchia 33
EC - Ecuador 32
PK - Pakistan 31
CI - Costa d'Avorio 30
ZA - Sudafrica 27
PL - Polonia 24
IR - Iran 23
CZ - Repubblica Ceca 20
PT - Portogallo 20
IL - Israele 19
IQ - Iraq 19
SA - Arabia Saudita 17
CH - Svizzera 15
NZ - Nuova Zelanda 15
IE - Irlanda 14
GR - Grecia 13
AE - Emirati Arabi Uniti 12
LT - Lituania 12
CO - Colombia 11
DZ - Algeria 11
MA - Marocco 11
NO - Norvegia 11
RO - Romania 11
VE - Venezuela 11
MY - Malesia 10
PH - Filippine 10
AZ - Azerbaigian 9
CL - Cile 9
EU - Europa 9
UZ - Uzbekistan 9
UY - Uruguay 8
JO - Giordania 7
TN - Tunisia 7
DK - Danimarca 6
EG - Egitto 6
KE - Kenya 6
PE - Perù 6
BO - Bolivia 5
KG - Kirghizistan 5
LK - Sri Lanka 5
PY - Paraguay 5
TH - Thailandia 5
YE - Yemen 5
AM - Armenia 4
BG - Bulgaria 4
CY - Cipro 4
PS - Palestinian Territory 4
AL - Albania 3
DO - Repubblica Dominicana 3
EE - Estonia 3
JM - Giamaica 3
KZ - Kazakistan 3
OM - Oman 3
PA - Panama 3
TT - Trinidad e Tobago 3
AO - Angola 2
BA - Bosnia-Erzegovina 2
HU - Ungheria 2
LI - Liechtenstein 2
MD - Moldavia 2
MN - Mongolia 2
NA - Namibia 2
QA - Qatar 2
RS - Serbia 2
SN - Senegal 2
SY - Repubblica araba siriana 2
UG - Uganda 2
BW - Botswana 1
CG - Congo 1
GY - Guiana 1
HN - Honduras 1
IM - Isola di Man 1
Totale 182.387
Città #
Cagliari 158.422
Uta 4.062
Taipei 1.518
Amsterdam 1.066
Ashburn 885
Fairfield 822
Singapore 733
Chandler 607
Woodbridge 596
Dallas 507
Houston 427
Boardman 420
Beijing 363
Ann Arbor 358
Nyköping 337
Seattle 319
Wilmington 312
Cambridge 271
Hong Kong 234
Jacksonville 221
Los Angeles 186
Dearborn 161
Hefei 161
Shanghai 161
Santa Clara 139
Nanjing 92
Boston 90
The Dalles 90
Seoul 89
Ho Chi Minh City 78
Helsinki 74
Redwood City 72
Buffalo 68
Munich 63
São Paulo 62
San Diego 58
Milan 57
Guangzhou 56
Hangzhou 55
Tokyo 52
Xi'an 52
New York 49
Rome 49
Council Bluffs 46
London 41
Sassari 41
Redondo Beach 40
Hanoi 37
Chicago 36
Ottawa 36
Shenyang 36
Brussels 31
Nanchang 31
Rio de Janeiro 31
Columbus 30
Dong Ket 30
Frankfurt am Main 30
Changsha 28
Sestu 28
Abidjan 27
Toronto 27
Denver 25
Montreal 25
Genoa 24
Hebei 24
Washington 24
Melbourne 23
Atlanta 22
Zhengzhou 22
Brooklyn 20
Jinan 20
Mountain View 20
Tianjin 20
Vienna 20
Nuremberg 19
Brisbane 18
Jiaxing 18
Norwalk 18
San Francisco 18
Wuhan 18
Belo Horizonte 17
Lviv 17
Namur 17
Saarbrücken 17
Johannesburg 16
Lappeenranta 16
Ankara 15
Manchester 15
Ningbo 14
Porto Alegre 14
Quito 14
Chennai 13
Curitiba 13
Dhaka 13
Düsseldorf 13
Genova 13
Paris 13
Turku 13
Warsaw 13
Brasília 12
Totale 175.786
Nome #
Explaining vulnerabilities of deep learning to adversarial malware binaries 5.079
Fast image classification with reduced multiclass support vector machines 3.489
Deepsquatting: Learning-based typosquatting detection at deeper domain levels 3.039
Yes, Machine Learning Can Be More Secure! A Case Study on Android Malware Detection 2.993
Detecting Misuse of Google Cloud Messaging in Android Badware 2.912
Adversarial biometric recognition: a review on biometric system security from the adversarial machine-learning perspective 2.814
Adversarial Malware Binaries: Evading Deep Learning for Malware Detection in Executables 2.802
Infinity-norm support vector machines against adversarial label contamination 2.792
Poisoning behavioral malware clustering 2.757
Statistical meta-analysis of presentation attacks for secure multibiometric systems 2.728
Explaining black-box android malware detection 2.721
Who are you? A statistical approach to measuring user authenticity 2.693
Secure Kernel Machines against Evasion Attacks 2.647
Optimization and deployment of CNNs at the Edge: The ALOHA experience 2.607
One-and-a-half-class multiple classifier systems for secure learning against evasion attacks at test time 2.550
Super-Sparse Learning in Similarity Spaces 2.546
Multimodal Anti-spoofing in Biometric Recognition Systems 2.519
DeltaPhish: Detecting phishing webpages in compromised websites 2.515
Evasion attacks against machine learning at test time 2.293
Detection of malicious scripting code through discriminant and adversary-aware API analysis 2.263
ALOHA: An architectural-aware framework for deep learning at the edge 2.262
Poisoning attacks against support vector machines 2.244
Towards adversarial malware detection: lessons learned from PDF-based attacks 2.227
Towards poisoning of deep learning algorithms with back-gradient optimization 2.225
Anti-spoofing: Multimodal 2.188
Deep neural rejection against adversarial examples 2.167
Sparse support faces 2.148
Why Do Adversarial Attacks Transfer? Explaining Transferability of Evasion and Poisoning Attacks 2.131
Randomized Prediction Games for Adversarial Machine Learning 2.124
Wild patterns: ten years after the rise of adversarial machine learning 2.020
A survey and experimental evaluation of image spam filtering techniques 2.008
null 1.989
Data-driven Journal Meta-ranking in Business and Management 1.873
Is data clustering in adversarial settings secure? 1.863
null 1.859
null 1.823
Wild Patterns Reloaded: A Survey of Machine Learning Security against Training Data Poisoning 1.811
null 1.757
Digital Investigation of PDF Files: Unveiling Traces of Embedded Malware 1.742
Pattern recognition systems under attack: design issues and research challenges 1.726
Deep Learning and Security Workshop 2019 1.717
Security evaluation of pattern classifiers under attack 1.685
Architecture-aware design and implementation of CNN algorithms for embedded inference: The ALOHA project 1.672
Is feature selection secure against training data poisoning? 1.658
Adversarial detection of Flash Malware: limitations and Open issues 1.658
null 1.583
Manipulating Machine Learning: Poisoning Attacks and Countermeasures for Regression Learning 1.526
Pattern recognition systems under attack 1.383
Towards quality assurance of software product lines with adversarial configurations 1.369
null 1.355
Functionality-preserving black-box optimization of adversarial windows malware 1.333
Cybersecurity and AI: The PRALab Research Experience 1.322
Why adversarial reprogramming works, when it fails, and how to tell the difference 1.313
Poisoning Attacks on Algorithmic Fairness 1.275
Adversarial EXEmples: A Survey and Experimental Evaluation of Practical Attacks on Machine Learning for Windows Malware Detection 1.236
Explaining Machine Learning DGA Detectors from DNS Traffic Data 1.221
Support vector machines under adversarial label contamination 1.212
Societal issues in machine learning: When learning from data is not enough 1.210
null 1.196
Samples on Thin Ice: Re-evaluating Adversarial Pruning of Neural Networks 1.188
On Learning and Recognition of Secure Patterns 1.083
Super-Sparse regression for fast age estimation from faces at test time 1.043
Poster: Attacking malware classifiers by crafting gradient-attacks that preserve functionality 1.033
Empirical assessment of generating adversarial configurations for software product lines 979
Robustness of Multi-modal Biometric Systems under Realistic Spoof Attacks against All Traits 970
Chairs’ introduction and welcome to AISec 2018 966
Do gradient-based explanations tell anything about adversarial robustness to android malware? 959
Detecting adversarial examples through nonlinear dimensionality reduction 945
Robust Machine Learning for Malware Detection over Time 926
AI Security and Safety: The PRALab Research Experience 925
Multiple Classifier Systems for Robust Classifier Design in Adversarial Environments 925
null 914
Security of Pattern recognition in adversarial environments 911
Chairs' introduction and welcome to AISEC 2019 908
Toward Effective Traffic Sign Detection via Two-Stage Fusion Neural Networks 892
null 882
The hammer and the nut: is bilevel optimization really needed to poison linear classifiers? 878
Learning sparse kernel machines with biometric similarity functions for identity recognition 865
null 772
Multiple classifier systems under attack 763
Minimizing Energy Consumption of Deep Learning Models by Energy-Aware Training 759
Hardening RGB-D object recognition systems against adversarial patch attacks 752
Poisoning attacks to compromise face templates 743
Towards learning trustworthily, automatically, and with guarantees on graphs: an overview 733
Adversarial Machine Learning: Attacks From Laboratories to the Real World 731
null 708
Is Deep Learning Safe for Robot Vision? Adversarial Examples against the iCub Humanoid 686
Security of pattern recognition systems in adversarial environments 686
Poisoning adaptive biometric systems 684
Wild patterns: Ten years after the rise of adversarial machine learning half-day tutorial 677
Detecting Attacks Against Deep Reinforcement Learning for Autonomous Driving 673
Preface 668
Poisoning attacks on cyber attack detectors for industrial control systems 662
null 661
FADER: Fast Adversarial Example Rejection 660
Improving Fast Minimum-Norm Attacks with Hyperparameter Optimization 644
Fast minimum-norm adversarial attacks through adaptive norm constraints 639
Tessellation-Filtering ReLU Neural Networks 635
Security Evaluation of Support Vector Machines in Adversarial Environments 628
ImageNet-Patch: a dataset for benchmarking machine learning robustness against adversarial patches 619
Totale 157.245
Categoria #
all - tutte 235.927
article - articoli 0
book - libri 0
conference - conferenze 0
curatela - curatele 0
other - altro 0
patent - brevetti 0
selected - selezionate 0
volume - volumi 0
Totale 235.927


Totale Lug Ago Sett Ott Nov Dic Gen Feb Mar Apr Mag Giu
2020/202114.359 0 0 0 0 0 3.451 3.352 1.925 795 1.410 2.030 1.396
2021/202210.527 990 698 412 544 828 832 629 377 1.046 1.293 1.306 1.572
2022/202315.678 1.433 2.168 1.897 1.290 1.446 1.537 740 1.039 1.000 1.031 1.339 758
2023/202420.391 741 635 663 1.209 2.285 4.352 3.034 1.262 920 1.455 1.996 1.839
2024/202545.889 10.988 11.969 4.322 7.245 2.287 2.870 3.044 287 375 1.436 433 633
2025/20264.998 1.061 697 1.216 980 928 116 0 0 0 0 0 0
Totale 183.187