BARNI, MAURO
 Distribuzione geografica
Continente #
NA - Nord America 18.220
EU - Europa 12.824
AS - Asia 7.993
SA - Sud America 1.418
AF - Africa 348
OC - Oceania 33
Continente sconosciuto - Info sul continente non disponibili 18
Totale 40.854
Nazione #
US - Stati Uniti d'America 18.003
GB - Regno Unito 3.642
CN - Cina 2.994
RU - Federazione Russa 2.372
SG - Singapore 2.264
IE - Irlanda 1.721
BR - Brasile 1.192
UA - Ucraina 1.107
DE - Germania 957
FR - Francia 794
SE - Svezia 774
IT - Italia 744
HK - Hong Kong 672
VN - Vietnam 571
KR - Corea 505
FI - Finlandia 338
IN - India 213
TR - Turchia 211
ZA - Sudafrica 147
BD - Bangladesh 104
AR - Argentina 99
CA - Canada 96
JP - Giappone 72
MX - Messico 66
NL - Olanda 66
IQ - Iraq 65
BE - Belgio 47
PK - Pakistan 47
PL - Polonia 43
ES - Italia 42
MA - Marocco 38
ID - Indonesia 37
KE - Kenya 37
EC - Ecuador 36
CI - Costa d'Avorio 32
AU - Australia 31
UZ - Uzbekistan 30
AT - Austria 28
SA - Arabia Saudita 28
CL - Cile 27
TN - Tunisia 26
IR - Iran 25
VE - Venezuela 24
NG - Nigeria 22
JO - Giordania 20
CZ - Repubblica Ceca 19
TW - Taiwan 18
MY - Malesia 17
GR - Grecia 16
CO - Colombia 14
HU - Ungheria 14
PH - Filippine 14
IL - Israele 13
NP - Nepal 13
DZ - Algeria 12
EU - Europa 12
RO - Romania 12
AE - Emirati Arabi Uniti 11
CH - Svizzera 11
DO - Repubblica Dominicana 10
LT - Lituania 10
PY - Paraguay 10
ET - Etiopia 9
CR - Costa Rica 8
DK - Danimarca 8
EG - Egitto 8
LU - Lussemburgo 8
JM - Giamaica 7
KG - Kirghizistan 7
NO - Norvegia 7
PE - Perù 7
TT - Trinidad e Tobago 7
KZ - Kazakistan 6
LB - Libano 6
RS - Serbia 6
AL - Albania 5
HN - Honduras 5
UY - Uruguay 5
AO - Angola 4
BG - Bulgaria 4
BH - Bahrain 4
HR - Croazia 4
KW - Kuwait 4
SK - Slovacchia (Repubblica Slovacca) 4
AZ - Azerbaigian 3
BA - Bosnia-Erzegovina 3
BO - Bolivia 3
EE - Estonia 3
MD - Moldavia 3
NI - Nicaragua 3
PA - Panama 3
PT - Portogallo 3
SN - Senegal 3
XK - ???statistics.table.value.countryCode.XK??? 3
AM - Armenia 2
BB - Barbados 2
BQ - ???statistics.table.value.countryCode.BQ??? 2
BY - Bielorussia 2
GE - Georgia 2
GT - Guatemala 2
Totale 40.810
Città #
Southend 3.271
Fairfield 2.314
Dallas 1.879
Dublin 1.688
Ashburn 1.293
Singapore 1.198
Chandler 1.100
Woodbridge 1.014
Houston 894
Jacksonville 871
Seattle 842
Wilmington 837
Cambridge 782
Moscow 664
Beijing 643
Hefei 618
Hong Kong 613
Ann Arbor 604
Santa Clara 543
Menlo Park 501
Seoul 489
Princeton 324
San Jose 299
Nanjing 284
The Dalles 284
Los Angeles 220
Lauterbourg 204
Ho Chi Minh City 175
Siena 169
Izmir 161
Boardman 160
San Mateo 155
San Diego 153
Hanoi 149
Johannesburg 127
Buffalo 124
Helsinki 111
Council Bluffs 99
Nanchang 95
São Paulo 82
Florence 74
Shenyang 73
London 72
Bengaluru 69
New York 69
Dearborn 68
Chicago 67
Columbus 67
Tianjin 62
Hebei 60
Milan 52
Kunming 48
Shanghai 48
Redondo Beach 47
Jiaxing 46
Munich 45
Changsha 44
Orem 44
Tokyo 43
Düsseldorf 41
Brussels 38
Rome 38
Jinan 36
Rio de Janeiro 36
Guangzhou 35
San Francisco 35
Toronto 35
Norwalk 34
Abidjan 32
Warsaw 32
Frankfurt am Main 31
Turku 31
Zhengzhou 30
Belo Horizonte 29
Amsterdam 27
Tashkent 27
Dong Ket 26
Hangzhou 26
Brooklyn 25
Baghdad 24
Montreal 24
Da Nang 23
Lappeenranta 23
Chennai 22
Abuja 21
Dhaka 21
Vienna 21
Manchester 20
Salt Lake City 20
Amman 19
Fremont 19
Ningbo 19
Redwood City 19
Brasília 18
Campinas 18
North Bergen 18
Atlanta 17
Boston 17
Nuremberg 17
Philadelphia 17
Totale 28.192
Nome #
A message passing approach for decision fusion in adversarial multi-sensor networks 395
A Message Passing Approach for Decision Fusion of Hidden-Markov Observations in the presence of Synchronized Attacks 337
A Game-Theoretic framework for optimum decision fusion in the presence of Byzantines 332
Information Fusion in Distributed Sensor Networks with Byzantines 313
Aligned and non-aligned double JPEG detection using convolutional neural networks 294
A New Watermarking Scheme Based on Antipodal Binary Dirty Paper Coding 284
Decision Fusion with Unbalanced Priors under Synchronized Byzantine Attacks: A Message-Passing Approach 279
Optimum decision fusion in cognitive wireless sensor networks with unknown users location 276
A general framework for robust watermarking security 262
Decision fusion with corrupted reports in multi-sensor networks: A game-theoretic approach 261
Consensus algorithm with censored data for distributed detection with corrupted measurements: A game-theoretic approach 255
A new decoder for the optimum recovery of nonadditive watermarks 254
Adversary-aware, data-driven detection of double JPEG compression: how to make counter-forensics harder 253
Fuzzy clustering of textured SAR images based on a fractal dimension feature 245
A Forensic Tool for Investigating Image Forgeries 244
Second-order Statistics Analysis to Cope with Contrast Enhancement Counter-Forensics 244
A full reference quality metric for geometrically distorted images 243
A Siamese Based System for City Verification 241
Error resilient transmission of H. 263 video for mobile communications 240
Comparative analysis of H.263 resilience techniques for H.223-based video transmission over slow-fading channels 240
Anonymous subject identification and privacy information management in video surveillance 237
A DCT-domain system for robust image watermarking 236
A Universal Attack Against Histogram-Based Image Forensics 234
Improving wavelet-based merging of panchromatic and multispectral images by contextual information 233
Unequal error protection for H.263 video over indoor DECT channel 233
Procedimento di marcatura anticontraffazione di prodotti a stampa e relativo sistema” inventori 230
Improved group-of-block synchronization for robust transmission of H.263 video over slow-fading channels 230
Higher-order, adversary-aware, double JPEG-detection via selected training on attacked samples 230
Watermarking techniques for electronic delivery of remote sensing images 229
A game theoretic approach to source identification with known statistics 227
Threat models and games for adversarial multimedia forensics 227
A DWT-based technique for spatio-frequency masking of digital signatures 225
A fuzzy approach to deal with uncertainty in image forensics 225
Exploiting the distributed source coding paradigm for low-complexity compression of hyperspectral images 223
A fast algorithm for 1-norm vector median filtering 220
Informed watermarking by means of orthogonal and quasi-orthogonal dirty paper coding 220
A New Backdoor Attack in CNNS by Training Set Corruption Without Label Poisoning 219
Detection and Localization of GAN Manipulated Multi-spectral Satellite Images 218
A robust fuzzy clustering algorithm for the classification of remote sensing images 217
Low-complexity and error-resilient hyperspectral image compression based on distributed source coding 216
Rational dither modulation: a high-rate data-hiding method invariant to gain attacks 215
Performance assessment of voice and video transmission in a simulated UMTS environment 215
Improving wireless video communication without feedback information 215
Digital watermarking of 3D meshes 214
Universal Counterforensics of Multiple Compressed JPEG Images 213
An information-theoretic analysis of dirty paper coding for informed audio watermarking 212
Detection of double AVC/HEVC encoding 212
Unsupervised fusion for forgery localization exploiting background information 212
A new star constellation matching algorithm for satellite attitude determination 210
Star-Configuration Searching for Satellite Attitude Computation 210
Video Integrity Verification and GOP Size Estimation Via Generalized Variation of Prediction Footprint 210
Low-complexity predictive lossy compression of hyperspectral and ultraspectral images 209
Privacy-preserving fingercode authentication 209
Compressive hyperspectral imaging using progressive total variation 209
Adversarial multimedia forensics: Overview and challenges ahead 209
Watermark embedding: hiding a signal within a cover image 208
Audio Informed Watermarking by means of Dirty Trellis Codes 208
A CycleGAN Watermarking Method for Ownership Verification 207
A Dempster-Shafer frame work for decision fusion in image forensics 206
Visuohaptic Discrimination of 3D Gross Shape 205
Smart Detection of Line-Search Oracle Attacks 205
Privacy preserving ECG quality evaluation 205
Trellis-coded rational Dither Modulation for digital watermarking 204
On the Transferability of Adversarial Examples against CNN-based Image Forensics 201
Star-configuration searching for satellite attitude computation 200
Are you threatening me? Towards smart detectors in watermarking 199
A GPU-accelerated algorithm for copy move detection in large-scale satellite images 198
Progressive compressed sensing and reconstruction of multidimensional signals using hybrid transform/prediction sparsity model 198
Watermarked 3D Mesh Quality Assessment 197
CNN-Based adversarial embedding for image steganography 197
Adversarial CNN Training Under JPEG Laundering Attacks: a Game-Theoretic Approach 197
A universal technique to hide traces of histogram-based manipulations 197
A Privacy-compliant Fingerprint Recognition System Based on Homomorphic Encryption and Fingercode Templates 196
Watermarking techniques for electronic delivery of remote sensing images 196
An overview on video forensics 195
Error-Resilient and Low-Complexity Onboard Lossless Compression of Hyperspectral Images by Means of Distributed Source Coding 194
Detection games under fully active adversaries 194
Detection Games with a Fully Active Attacker 192
A vector median deblurring filter for color image restoration 191
Colour-based detection of defects on chicken meat 191
Watermark embedding and recovery in the presence of C-LPCD de-synchronization attacks 191
Piecewise function approximation with private data 190
The Security Margin: a Measure of Source Distinguishability under Adversarial Conditions 189
Source distinguishability under corrupted training 186
Source distinguishability under distortion-limited attack: an optimal transport perspective 186
General function evaluation in a STPC setting via piecewise linear approximation 184
Adversarial source identification game with corrupted training 184
Improving the security of image manipulation detection through one-and-a-half-class multiple classification 184
Secure evaluation of private linear branching programs with medical applications 183
Comments on "A possibilistic approach to clustering" 183
Countering anti-forensics by means of data fusion 181
Coping with the enemy: advances in adversary-aware signal processing 180
On the effectiveness of local warping against sift-based copy-move detection 180
Document and Image Compression 179
Stochastic Image Warping for Improved Watermark Desynchronization 179
GAN generation of synthetic multispectral satellite images 178
The Watchful Forensic Analyst: Multi-Clue Information Fusion with Background Knowledge 177
A Multimedia Forensic Tool for Investigating Image Forgery 177
Adversarial examples for reply attacks against CNN-based face recognition with anti-spoofing capability 177
A One-Class Classifier for the Detection of GAN Manipulated Multi-Spectral Satellite Images 176
Totale 21.820
Categoria #
all - tutte 125.917
article - articoli 0
book - libri 0
conference - conferenze 0
curatela - curatele 0
other - altro 0
patent - brevetti 0
selected - selezionate 0
volume - volumi 0
Totale 125.917


Totale Lug Ago Sett Ott Nov Dic Gen Feb Mar Apr Mag Giu
2020/2021905 0 0 0 0 0 0 0 0 0 329 299 277
2021/20222.698 196 436 206 118 116 103 196 86 157 317 254 513
2022/20233.830 234 240 448 579 407 773 51 343 446 64 175 70
2023/20242.399 121 74 182 111 86 594 833 73 21 63 54 187
2024/20255.539 110 370 339 275 474 390 223 374 344 314 639 1.687
2025/202610.899 1.090 2.036 1.475 1.244 1.973 388 1.330 379 349 635 0 0
Totale 41.230