BIGGIO, BATTISTA
 Distribuzione geografica
Continente #
EU - Europa 150.086
NA - Nord America 6.450
AS - Asia 3.127
OC - Oceania 56
AF - Africa 36
SA - Sud America 28
Continente sconosciuto - Info sul continente non disponibili 9
Totale 159.792
Nazione #
IT - Italia 148.391
US - Stati Uniti d'America 6.347
TW - Taiwan 1.531
CN - Cina 915
SE - Svezia 486
UA - Ucraina 408
DE - Germania 247
SG - Singapore 238
GB - Regno Unito 159
HK - Hong Kong 143
FI - Finlandia 130
CA - Canada 93
FR - Francia 66
IN - India 55
AU - Australia 49
BE - Belgio 47
JP - Giappone 44
KR - Corea 42
VN - Vietnam 37
CI - Costa d'Avorio 27
RU - Federazione Russa 23
AT - Austria 19
PK - Pakistan 17
CZ - Repubblica Ceca 16
BR - Brasile 15
IL - Israele 15
IR - Iran 14
TR - Turchia 13
CH - Svizzera 12
NL - Olanda 12
PT - Portogallo 12
ES - Italia 10
MX - Messico 10
EU - Europa 9
MY - Malesia 9
NO - Norvegia 9
SA - Arabia Saudita 9
RO - Romania 8
AE - Emirati Arabi Uniti 7
GR - Grecia 7
IE - Irlanda 7
NZ - Nuova Zelanda 7
IQ - Iraq 5
PL - Polonia 5
YE - Yemen 5
DK - Danimarca 4
EC - Ecuador 4
ID - Indonesia 4
PH - Filippine 4
TH - Thailandia 4
BD - Bangladesh 3
CO - Colombia 3
LK - Sri Lanka 3
ZA - Sudafrica 3
AM - Armenia 2
AR - Argentina 2
DZ - Algeria 2
HU - Ungheria 2
MN - Mongolia 2
QA - Qatar 2
SY - Repubblica araba siriana 2
UG - Uganda 2
UY - Uruguay 2
BG - Bulgaria 1
CL - Cile 1
EE - Estonia 1
EG - Egitto 1
IS - Islanda 1
JO - Giordania 1
LB - Libano 1
LI - Liechtenstein 1
LT - Lituania 1
PE - Perù 1
SC - Seychelles 1
SK - Slovacchia (Repubblica Slovacca) 1
Totale 159.792
Città #
Cagliari 144.924
Uta 2.876
Taipei 1.507
Fairfield 822
Chandler 607
Woodbridge 596
Ashburn 481
Houston 419
Boardman 417
Ann Arbor 358
Nyköping 337
Seattle 314
Wilmington 312
Cambridge 271
Jacksonville 221
Dearborn 161
Shanghai 155
Beijing 111
Singapore 107
Hong Kong 94
Nanjing 92
Boston 80
Redwood City 72
Helsinki 63
San Diego 58
Los Angeles 48
Guangzhou 44
Xi'an 40
Shenyang 36
Ottawa 35
Rome 33
Nanchang 31
Dong Ket 30
London 29
Sestu 28
Abidjan 26
Brussels 26
Changsha 25
Sassari 25
Hangzhou 24
Hebei 24
Mountain View 20
Zhengzhou 20
Tokyo 19
Chicago 18
Jinan 18
Norwalk 18
Washington 18
Jiaxing 17
Namur 17
Brisbane 16
Seoul 16
Toronto 16
Milan 15
Melbourne 14
Wuhan 14
Genova 13
New York 13
Tianjin 13
Genoa 12
Ningbo 12
Assèmini 11
Atlanta 11
Hefei 11
Pune 11
Redmond 11
Selargius 11
Xian 11
Chongqing 10
Frankfurt am Main 10
Kunming 10
Quartucciu 10
Shenzhen 10
Saarbrücken 9
Council Bluffs 8
Fremont 8
Hanover 8
Dammam 7
Falls Church 7
Islamabad 7
Porto 7
Stillwater 7
Torino 7
Vienna 7
Abu Dhabi 6
Alghero 6
Ankara 6
Bengaluru 6
Central 6
Chicoutimi 6
Dortmund 6
Ecatepec De Morelos 6
Indiana 6
Kai Yi Wan 6
Monserrato 6
Paris 6
Pavia 6
Saint Petersburg 6
Verona 6
Amsterdam 5
Totale 156.582
Nome #
Fast image classification with reduced multiclass support vector machines 3.290
Deepsquatting: Learning-based typosquatting detection at deeper domain levels 2.887
Yes, Machine Learning Can Be More Secure! A Case Study on Android Malware Detection 2.782
Detecting Misuse of Google Cloud Messaging in Android Badware 2.776
Adversarial Malware Binaries: Evading Deep Learning for Malware Detection in Executables 2.661
Poisoning behavioral malware clustering 2.651
Adversarial biometric recognition: a review on biometric system security from the adversarial machine-learning perspective 2.639
Infinity-norm support vector machines against adversarial label contamination 2.620
Who are you? A statistical approach to measuring user authenticity 2.573
Explaining black-box android malware detection 2.540
Statistical meta-analysis of presentation attacks for secure multibiometric systems 2.508
Secure Kernel Machines against Evasion Attacks 2.476
Optimization and deployment of CNNs at the Edge: The ALOHA experience 2.448
Super-Sparse Learning in Similarity Spaces 2.406
Multimodal Anti-spoofing in Biometric Recognition Systems 2.403
One-and-a-half-class multiple classifier systems for secure learning against evasion attacks at test time 2.394
DeltaPhish: Detecting phishing webpages in compromised websites 2.352
Poisoning attacks against support vector machines 2.151
Detection of malicious scripting code through discriminant and adversary-aware API analysis 2.143
ALOHA: An architectural-aware framework for deep learning at the edge 2.139
Evasion attacks against machine learning at test time 2.125
Towards poisoning of deep learning algorithms with back-gradient optimization 2.070
Towards adversarial malware detection: lessons learned from PDF-based attacks 2.069
Anti-spoofing: Multimodal 2.036
Randomized Prediction Games for Adversarial Machine Learning 1.990
null 1.989
Deep neural rejection against adversarial examples 1.978
Sparse support faces 1.965
Why Do Adversarial Attacks Transfer? Explaining Transferability of Evasion and Poisoning Attacks 1.945
Explaining vulnerabilities of deep learning to adversarial malware binaries 1.901
Wild patterns: ten years after the rise of adversarial machine learning 1.863
null 1.859
null 1.823
Data-driven Journal Meta-ranking in Business and Management 1.785
null 1.757
Is data clustering in adversarial settings secure? 1.735
Wild Patterns Reloaded: A Survey of Machine Learning Security against Training Data Poisoning 1.651
Deep Learning and Security Workshop 2019 1.640
Digital Investigation of PDF Files: Unveiling Traces of Embedded Malware 1.606
Pattern recognition systems under attack: design issues and research challenges 1.595
Security evaluation of pattern classifiers under attack 1.589
null 1.583
Is feature selection secure against training data poisoning? 1.549
Architecture-aware design and implementation of CNN algorithms for embedded inference: The ALOHA project 1.525
Adversarial Detection of Flash Malware: Limitations and Open Issues 1.514
Manipulating Machine Learning: Poisoning Attacks and Countermeasures for Regression Learning 1.442
null 1.355
Pattern recognition systems under attack 1.299
Towards quality assurance of software product lines with adversarial configurations 1.263
null 1.196
Poisoning Attacks on Algorithmic Fairness 1.154
Societal issues in machine learning: When learning from data is not enough 1.121
Why adversarial reprogramming works, when it fails, and how to tell the difference 1.109
Functionality-Preserving Black-Box Optimization of Adversarial Windows Malware 1.106
Support vector machines under adversarial label contamination 1.090
Explaining Machine Learning DGA Detectors from DNS Traffic Data 1.060
Cybersecurity and AI: The PRALab Research Experience 1.045
On Learning and Recognition of Secure Patterns 1.036
Adversarial EXEmples: A Survey and Experimental Evaluation of Practical Attacks on Machine Learning for Windows Malware Detection 1.036
Samples on Thin Ice: Re-evaluating Adversarial Pruning of Neural Networks 997
Poster: Attacking malware classifiers by crafting gradient-attacks that preserve functionality 955
Super-Sparse regression for fast age estimation from faces at test time 938
null 914
Chairs’ introduction and welcome to AISec 2018 906
null 882
Detecting adversarial examples through nonlinear dimensionality reduction 881
Robustness of Multi-modal Biometric Systems under Realistic Spoof Attacks against All Traits 879
Multiple Classifier Systems for Robust Classifier Design in Adversarial Environments 831
Security of Pattern recognition in adversarial environments 829
A survey and experimental evaluation of image spam filtering techniques 829
Empirical assessment of generating adversarial configurations for software product lines 826
Chairs' introduction and welcome to AISEC 2019 816
Robust Machine Learning for Malware Detection over Time 798
Learning sparse kernel machines with biometric similarity functions for identity recognition 782
null 772
The hammer and the nut: is bilevel optimization really needed to poison linear classifiers? 749
Do gradient-based explanations tell anything about adversarial robustness to android malware? 743
null 708
Multiple classifier systems under attack 684
Wild patterns: Ten years after the rise of adversarial machine learning half-day tutorial 677
Toward Effective Traffic Sign Detection via Two-Stage Fusion Neural Networks 672
AI Security and Safety: The PRALab Research Experience 668
Adversarial Machine Learning: Attacks From Laboratories to the Real World 665
null 661
null 618
Towards learning trustworthily, automatically, and with guarantees on graphs: an overview 611
Security of pattern recognition systems in adversarial environments 604
Hardening RGB-D object recognition systems against adversarial patch attacks 593
Poisoning attacks to compromise face templates 578
Poisoning adaptive biometric systems 568
Preface 568
Poisoning attacks on cyber attack detectors for industrial control systems 567
Minimizing Energy Consumption of Deep Learning Models by Energy-Aware Training 562
Support Vector Machines Under Adversarial Label Noise 559
Understanding the Risk Factors of Learning in Adversarial Environments 544
Is Deep Learning Safe for Robot Vision? Adversarial Examples against the iCub Humanoid 542
null 538
Tessellation-Filtering ReLU Neural Networks 528
Evading SpamAssassin with obfuscated text images 527
Fast minimum-norm adversarial attacks through adaptive norm constraints 525
Totale 141.387
Categoria #
all - tutte 195.771
article - articoli 0
book - libri 0
conference - conferenze 0
curatela - curatele 0
other - altro 0
patent - brevetti 0
selected - selezionate 0
volume - volumi 0
Totale 195.771


Totale Lug Ago Sett Ott Nov Dic Gen Feb Mar Apr Mag Giu
2019/202021.906 0 0 0 679 7.436 6.057 3.645 811 656 870 628 1.124
2020/202137.828 1.422 1.163 1.831 11.293 7.760 3.451 3.352 1.925 795 1.410 2.030 1.396
2021/202210.527 990 698 412 544 828 832 629 377 1.046 1.293 1.306 1.572
2022/202315.678 1.433 2.168 1.897 1.290 1.446 1.537 740 1.039 1.000 1.031 1.339 758
2023/202420.391 741 635 663 1.209 2.285 4.352 3.034 1.262 920 1.455 1.996 1.839
2024/202528.126 10.988 11.969 4.322 847 0 0 0 0 0 0 0 0
Totale 160.426