BARNI, MAURO
 Distribuzione geografica
Continente #
NA - Nord America 13.418
EU - Europa 10.281
AS - Asia 1.969
AF - Africa 38
OC - Oceania 23
Continente sconosciuto - Info sul continente non disponibili 14
SA - Sud America 12
Totale 25.755
Nazione #
US - Stati Uniti d'America 13.371
GB - Regno Unito 3.533
IE - Irlanda 1.726
CN - Cina 1.235
UA - Ucraina 1.099
DE - Germania 866
SE - Svezia 771
RU - Federazione Russa 709
IT - Italia 543
FR - Francia 529
SG - Singapore 346
FI - Finlandia 288
TR - Turchia 176
BE - Belgio 41
CA - Canada 41
JP - Giappone 41
IN - India 39
HK - Hong Kong 32
CI - Costa d'Avorio 31
VN - Vietnam 29
NL - Olanda 27
ES - Italia 24
AU - Australia 22
CZ - Repubblica Ceca 17
KR - Corea 17
AT - Austria 16
GR - Grecia 14
HU - Ungheria 13
EU - Europa 12
RO - Romania 11
BR - Brasile 9
ID - Indonesia 9
IL - Israele 9
DK - Danimarca 8
IR - Iran 8
LU - Lussemburgo 7
CH - Svizzera 5
NO - Norvegia 5
PL - Polonia 5
RS - Serbia 5
AE - Emirati Arabi Uniti 4
HR - Croazia 3
MY - Malesia 3
SA - Arabia Saudita 3
TW - Taiwan 3
AZ - Azerbaigian 2
BG - Bulgaria 2
BQ - ???statistics.table.value.countryCode.BQ??? 2
EE - Estonia 2
IM - Isola di Man 2
MD - Moldavia 2
UZ - Uzbekistan 2
ZA - Sudafrica 2
AM - Armenia 1
BA - Bosnia-Erzegovina 1
CL - Cile 1
DO - Repubblica Dominicana 1
DZ - Algeria 1
EC - Ecuador 1
EG - Egitto 1
GE - Georgia 1
GL - Groenlandia 1
IS - Islanda 1
JM - Giamaica 1
KG - Kirghizistan 1
KH - Cambogia 1
KW - Kuwait 1
KZ - Kazakistan 1
LA - Repubblica Popolare Democratica del Laos 1
LB - Libano 1
LT - Lituania 1
LV - Lettonia 1
MA - Marocco 1
ME - Montenegro 1
MS - Montserrat 1
MX - Messico 1
NZ - Nuova Zelanda 1
PA - Panama 1
PE - Perù 1
PH - Filippine 1
PK - Pakistan 1
PT - Portogallo 1
RW - Ruanda 1
SI - Slovenia 1
SK - Slovacchia (Repubblica Slovacca) 1
SL - Sierra Leone 1
TM - Turkmenistan 1
Totale 25.755
Città #
Southend 3.283
Fairfield 2.314
Dublin 1.694
Chandler 1.101
Ashburn 1.074
Woodbridge 1.016
Houston 886
Jacksonville 874
Wilmington 837
Seattle 835
Cambridge 782
Ann Arbor 606
Menlo Park 502
Princeton 326
Nanjing 285
Beijing 229
Singapore 225
Siena 168
Izmir 162
San Mateo 156
Boardman 155
San Diego 151
Helsinki 98
Nanchang 96
Moscow 80
Shenyang 71
Dearborn 68
Hebei 60
Tianjin 58
Jiaxing 47
Kunming 47
London 45
Florence 42
Düsseldorf 41
Changsha 40
Norwalk 35
Brussels 33
Jinan 32
Abidjan 31
Shanghai 29
San Francisco 28
Dong Ket 26
Zhengzhou 24
Guangzhou 23
Tokyo 22
Toronto 21
Fremont 19
Lappeenranta 19
Ningbo 19
Redwood City 19
Hangzhou 18
Central 16
Falls Church 16
Los Angeles 16
Milan 16
Edinburgh 15
Amsterdam 13
Budapest 13
Santa Clara 13
Vienna 13
Philadelphia 12
Taizhou 12
Udine 12
Chicago 11
Frankfurt am Main 11
Fuzhou 11
Indiana 11
Lanzhou 11
New York 11
Prague 11
Changchun 10
Málaga 10
Rome 10
Southwark 10
Minatomirai 9
Auburn Hills 8
Genoa 8
Hefei 8
Hong Kong 8
Hyderabad 8
New Bedfont 8
Sydney 8
Berlin 7
Columbus 7
Copenhagen 7
Hounslow 7
Kilburn 7
Paris 7
Tappahannock 7
Trento 7
Washington 7
Castellammare di Stabia 6
Istanbul 6
Luxembourg 6
Montreal 6
Prato 6
Prescot 6
Saronno 6
Wuhan 6
Acton 5
Totale 19.317
Nome #
A message passing approach for decision fusion in adversarial multi-sensor networks 269
Information Fusion in Distributed Sensor Networks with Byzantines 227
Optimum decision fusion in cognitive wireless sensor networks with unknown users location 219
Aligned and non-aligned double JPEG detection using convolutional neural networks 217
Unequal error protection for H.263 video over indoor DECT channel 198
A Game-Theoretic framework for optimum decision fusion in the presence of Byzantines 198
Fuzzy clustering of textured SAR images based on a fractal dimension feature 191
Comparative analysis of H.263 resilience techniques for H.223-based video transmission over slow-fading channels 191
Decision Fusion with Unbalanced Priors under Synchronized Byzantine Attacks: A Message-Passing Approach 189
Decision fusion with corrupted reports in multi-sensor networks: A game-theoretic approach 187
Error resilient transmission of H. 263 video for mobile communications 187
Improving wavelet-based merging of panchromatic and multispectral images by contextual information 185
Exploiting the distributed source coding paradigm for low-complexity compression of hyperspectral images 183
Performance assessment of voice and video transmission in a simulated UMTS environment 182
Threat models and games for adversarial multimedia forensics 181
Watermarking techniques for electronic delivery of remote sensing images 180
A Message Passing Approach for Decision Fusion of Hidden-Markov Observations in the presence of Synchronized Attacks 177
Anonymous subject identification and privacy information management in video surveillance 177
Procedimento di marcatura anticontraffazione di prodotti a stampa e relativo sistema” inventori 172
A New Watermarking Scheme Based on Antipodal Binary Dirty Paper Coding 168
Adversary-aware, data-driven detection of double JPEG compression: how to make counter-forensics harder 168
Detection of double AVC/HEVC encoding 167
Informed watermarking by means of orthogonal and quasi-orthogonal dirty paper coding 166
Improved group-of-block synchronization for robust transmission of H.263 video over slow-fading channels 166
Second-order Statistics Analysis to Cope with Contrast Enhancement Counter-Forensics 166
Improving wireless video communication without feedback information 166
Higher-order, adversary-aware, double JPEG-detection via selected training on attacked samples 165
Star-Configuration Searching for Satellite Attitude Computation 163
Consensus algorithm with censored data for distributed detection with corrupted measurements: A game-theoretic approach 162
Low-complexity and error-resilient hyperspectral image compression based on distributed source coding 160
Privacy-preserving fingercode authentication 160
Universal Counterforensics of Multiple Compressed JPEG Images 159
Unsupervised fusion for forgery localization exploiting background information 158
Privacy preserving ECG quality evaluation 157
Low-complexity predictive lossy compression of hyperspectral and ultraspectral images 155
Rational dither modulation: a high-rate data-hiding method invariant to gain attacks 154
Digital watermarking of 3D meshes 154
Trellis-coded rational Dither Modulation for digital watermarking 152
Watermark embedding and recovery in the presence of C-LPCD de-synchronization attacks 152
Visuohaptic Discrimination of 3D Gross Shape 149
Smart Detection of Line-Search Oracle Attacks 149
A Privacy-compliant Fingerprint Recognition System Based on Homomorphic Encryption and Fingercode Templates 147
A new decoder for the optimum recovery of nonadditive watermarks 147
Progressive compressed sensing and reconstruction of multidimensional signals using hybrid transform/prediction sparsity model 147
Watermark embedding: hiding a signal within a cover image 146
Star-configuration searching for satellite attitude computation 146
Watermarked 3D Mesh Quality Assessment 145
Source distinguishability under distortion-limited attack: an optimal transport perspective 145
Audio Informed Watermarking by means of Dirty Trellis Codes 144
Are you threatening me? Towards smart detectors in watermarking 144
Detection Games with a Fully Active Attacker 144
On the effectiveness of local warping against sift-based copy-move detection 143
Watermarking techniques for electronic delivery of remote sensing images 142
General function evaluation in a STPC setting via piecewise linear approximation 142
Source distinguishability under corrupted training 142
A Forensic Tool for Investigating Image Forgeries 141
Piecewise function approximation with private data 141
Error-Resilient and Low-Complexity Onboard Lossless Compression of Hyperspectral Images by Means of Distributed Source Coding 140
Compressive hyperspectral imaging using progressive total variation 140
A Universal Attack Against Histogram-Based Image Forensics 139
A DCT-domain system for robust image watermarking 137
Comments on "A possibilistic approach to clustering" 137
Detection games under fully active adversaries 137
The Effectiveness of the Meta-Detection for Countering Oracle Attacks in Watermarking 136
A robust fuzzy clustering algorithm for the classification of remote sensing images 133
Adversarial multimedia forensics: Overview and challenges ahead 133
Multiple parenting phylogeny relationships in digital images 132
Privacy Protection in Biometric-Based Recognition Systems: a marriage between cryptography and signal processing 132
On the Transferability of Adversarial Examples against CNN-based Image Forensics 131
A full reference quality metric for geometrically distorted images 130
Coping with the enemy: advances in adversary-aware signal processing 130
A general framework for robust watermarking security 129
Low-complexity lossy compression of hyperspectral images via informed quantization 129
Perceptibility of haptic digital watermarking of virtual textures 128
Countering the pooled triangle test for PRNU-based camera identification 127
An overview on video forensics 126
A quasi-Euclidean norm to speed up vector median filtering 126
Secure evaluation of private linear branching programs with medical applications 125
Fast vector median filter based on euclidean norm approximation 125
The Security Margin: a Measure of Source Distinguishability under Adversarial Conditions 125
Colour-based detection of defects on chicken meat 124
Parallel Implementation of GC-Based MPC Protocols in the Semi-Honest Setting 124
An information-theoretic analysis of dirty paper coding for informed audio watermarking 123
Scene inspection in complex heterogeneous environments by means of knowledge-maps 123
Effectiveness of exhaustive search and template matching against watermark desynchronization 123
CNN-Based adversarial embedding for image steganography 123
Optimum forensic and counter-forensic strategies for source identification with training data 122
A new star constellation matching algorithm for satellite attitude determination 121
A Dempster-Shafer frame work for decision fusion in image forensics 120
Watermarking of MPEG-4 video objects 120
Metodo e sistema di marchiatura o cosiddetto watermarking di immagini digitali 119
Attacking image classification based on Bag-of-Visual-Words 119
The Watchful Forensic Analyst: Multi-Clue Information Fusion with Background Knowledge 119
Countering anti-forensics by means of data fusion 119
Video Integrity Verification and GOP Size Estimation Via Generalized Variation of Prediction Footprint 119
Stochastic Image Warping for Improved Watermark Desynchronization 118
On the Implementation of the Discrete Fourier Transform in the Encrypted Domain 118
Adversarial CNN Training Under JPEG Laundering Attacks: a Game-Theoretic Approach 118
Secure detection of image manipulation by means of random feature selection 118
Document and Image Compression 117
Totale 14.966
Categoria #
all - tutte 85.572
article - articoli 0
book - libri 0
conference - conferenze 0
curatela - curatele 0
other - altro 0
patent - brevetti 0
selected - selezionate 0
volume - volumi 0
Totale 85.572


Totale Lug Ago Sett Ott Nov Dic Gen Feb Mar Apr Mag Giu
2019/20203.705 0 0 0 0 456 485 511 766 509 486 144 348
2020/20214.190 184 461 216 462 225 509 180 664 383 329 300 277
2021/20222.706 196 437 207 118 117 103 196 86 157 318 255 516
2022/20233.840 235 241 450 580 408 775 51 344 446 64 176 70
2023/20242.413 121 74 184 112 86 598 839 73 21 63 54 188
2024/20251.212 111 371 343 277 110 0 0 0 0 0 0 0
Totale 26.102