BARNI, MAURO
 Distribuzione geografica
Continente #
NA - Nord America 17.455
EU - Europa 12.364
AS - Asia 6.770
SA - Sud America 1.262
AF - Africa 149
OC - Oceania 28
Continente sconosciuto - Info sul continente non disponibili 18
Totale 38.046
Nazione #
US - Stati Uniti d'America 17.291
GB - Regno Unito 3.593
CN - Cina 2.750
RU - Federazione Russa 2.360
SG - Singapore 1.949
IE - Irlanda 1.717
BR - Brasile 1.105
UA - Ucraina 1.101
DE - Germania 919
SE - Svezia 773
IT - Italia 698
HK - Hong Kong 570
FR - Francia 569
KR - Corea 505
FI - Finlandia 310
VN - Vietnam 222
TR - Turchia 201
IN - India 174
AR - Argentina 86
CA - Canada 78
BD - Bangladesh 73
JP - Giappone 66
NL - Olanda 52
MX - Messico 47
BE - Belgio 44
IQ - Iraq 42
ES - Italia 39
PL - Polonia 36
ZA - Sudafrica 33
CI - Costa d'Avorio 31
ID - Indonesia 29
MA - Marocco 28
PK - Pakistan 28
AT - Austria 26
AU - Australia 26
EC - Ecuador 25
IR - Iran 25
UZ - Uzbekistan 25
SA - Arabia Saudita 20
TN - Tunisia 20
CZ - Repubblica Ceca 19
GR - Grecia 15
VE - Venezuela 14
HU - Ungheria 13
TW - Taiwan 13
EU - Europa 12
IL - Israele 12
JO - Giordania 11
RO - Romania 11
KE - Kenya 10
AE - Emirati Arabi Uniti 9
PY - Paraguay 9
DK - Danimarca 8
LU - Lussemburgo 8
CH - Svizzera 7
CO - Colombia 7
LT - Lituania 7
NO - Norvegia 7
DO - Repubblica Dominicana 6
JM - Giamaica 6
CL - Cile 5
KG - Kirghizistan 5
LB - Libano 5
MY - Malesia 5
PE - Perù 5
RS - Serbia 5
TT - Trinidad e Tobago 5
UY - Uruguay 5
BG - Bulgaria 4
CR - Costa Rica 4
DZ - Algeria 4
EG - Egitto 4
HN - Honduras 4
AO - Angola 3
BA - Bosnia-Erzegovina 3
BH - Bahrain 3
EE - Estonia 3
ET - Etiopia 3
HR - Croazia 3
KW - Kuwait 3
KZ - Kazakistan 3
NP - Nepal 3
PA - Panama 3
SN - Senegal 3
XK - ???statistics.table.value.countryCode.XK??? 3
AL - Albania 2
AM - Armenia 2
AZ - Azerbaigian 2
BB - Barbados 2
BQ - ???statistics.table.value.countryCode.BQ??? 2
GE - Georgia 2
GT - Guatemala 2
IM - Isola di Man 2
IS - Islanda 2
KH - Cambogia 2
MD - Moldavia 2
NZ - Nuova Zelanda 2
PH - Filippine 2
QA - Qatar 2
SK - Slovacchia (Repubblica Slovacca) 2
Totale 38.016
Città #
Southend 3.271
Fairfield 2.314
Dallas 1.874
Dublin 1.686
Ashburn 1.230
Chandler 1.100
Singapore 1.051
Woodbridge 1.014
Houston 893
Jacksonville 870
Seattle 841
Wilmington 837
Cambridge 782
Moscow 663
Beijing 638
Ann Arbor 604
Hong Kong 538
Santa Clara 533
Hefei 518
Menlo Park 501
Seoul 489
Princeton 324
Nanjing 284
Los Angeles 181
Siena 169
Izmir 161
Boardman 158
San Mateo 155
San Diego 152
The Dalles 135
Buffalo 120
Helsinki 102
Nanchang 95
Council Bluffs 81
São Paulo 77
Shenyang 73
Ho Chi Minh City 70
Bengaluru 68
Dearborn 68
Columbus 67
Florence 67
London 65
Tianjin 62
Chicago 60
Hebei 60
New York 58
Kunming 48
Milan 47
Redondo Beach 47
Shanghai 47
Jiaxing 46
Changsha 44
Hanoi 44
Düsseldorf 41
Munich 40
Tokyo 38
Brussels 36
Jinan 36
Guangzhou 35
Norwalk 34
San Francisco 33
Rio de Janeiro 32
Rome 32
Abidjan 31
Zhengzhou 30
Warsaw 29
Toronto 28
Belo Horizonte 26
Dong Ket 26
Hangzhou 26
Brooklyn 25
Lappeenranta 23
Tashkent 23
Montreal 21
Orem 21
Fremont 19
Ningbo 19
Redwood City 19
Salt Lake City 19
San Jose 19
Vienna 19
Amsterdam 18
Brasília 18
Boston 17
Johannesburg 17
Atlanta 16
Campinas 16
Central 16
Chennai 16
Denver 16
Falls Church 16
North Bergen 16
Philadelphia 16
Dhaka 15
Edinburgh 15
Phoenix 15
Porto Alegre 14
Taizhou 14
Budapest 13
Charlotte 13
Totale 26.559
Nome #
A message passing approach for decision fusion in adversarial multi-sensor networks 377
A Message Passing Approach for Decision Fusion of Hidden-Markov Observations in the presence of Synchronized Attacks 317
A Game-Theoretic framework for optimum decision fusion in the presence of Byzantines 312
Information Fusion in Distributed Sensor Networks with Byzantines 289
Aligned and non-aligned double JPEG detection using convolutional neural networks 283
Decision Fusion with Unbalanced Priors under Synchronized Byzantine Attacks: A Message-Passing Approach 267
Optimum decision fusion in cognitive wireless sensor networks with unknown users location 265
A New Watermarking Scheme Based on Antipodal Binary Dirty Paper Coding 254
A general framework for robust watermarking security 253
Decision fusion with corrupted reports in multi-sensor networks: A game-theoretic approach 249
A new decoder for the optimum recovery of nonadditive watermarks 244
Consensus algorithm with censored data for distributed detection with corrupted measurements: A game-theoretic approach 238
Error resilient transmission of H. 263 video for mobile communications 236
Adversary-aware, data-driven detection of double JPEG compression: how to make counter-forensics harder 236
A full reference quality metric for geometrically distorted images 234
Fuzzy clustering of textured SAR images based on a fractal dimension feature 234
Second-order Statistics Analysis to Cope with Contrast Enhancement Counter-Forensics 229
Anonymous subject identification and privacy information management in video surveillance 229
A Forensic Tool for Investigating Image Forgeries 228
Comparative analysis of H.263 resilience techniques for H.223-based video transmission over slow-fading channels 227
Unequal error protection for H.263 video over indoor DECT channel 223
A DCT-domain system for robust image watermarking 222
Improved group-of-block synchronization for robust transmission of H.263 video over slow-fading channels 222
Threat models and games for adversarial multimedia forensics 222
Improving wavelet-based merging of panchromatic and multispectral images by contextual information 222
Procedimento di marcatura anticontraffazione di prodotti a stampa e relativo sistema” inventori 221
A Siamese Based System for City Verification 219
Watermarking techniques for electronic delivery of remote sensing images 219
Higher-order, adversary-aware, double JPEG-detection via selected training on attacked samples 216
A game theoretic approach to source identification with known statistics 215
Informed watermarking by means of orthogonal and quasi-orthogonal dirty paper coding 210
A robust fuzzy clustering algorithm for the classification of remote sensing images 210
Exploiting the distributed source coding paradigm for low-complexity compression of hyperspectral images 210
A fast algorithm for 1-norm vector median filtering 209
A Universal Attack Against Histogram-Based Image Forensics 209
Performance assessment of voice and video transmission in a simulated UMTS environment 208
Detection of double AVC/HEVC encoding 207
Improving wireless video communication without feedback information 206
Unsupervised fusion for forgery localization exploiting background information 206
A fuzzy approach to deal with uncertainty in image forensics 205
Universal Counterforensics of Multiple Compressed JPEG Images 203
Low-complexity and error-resilient hyperspectral image compression based on distributed source coding 202
Privacy-preserving fingercode authentication 202
An information-theoretic analysis of dirty paper coding for informed audio watermarking 201
Low-complexity predictive lossy compression of hyperspectral and ultraspectral images 201
A new star constellation matching algorithm for satellite attitude determination 201
Rational dither modulation: a high-rate data-hiding method invariant to gain attacks 201
Watermark embedding: hiding a signal within a cover image 200
Digital watermarking of 3D meshes 200
A Dempster-Shafer frame work for decision fusion in image forensics 198
Visuohaptic Discrimination of 3D Gross Shape 197
Smart Detection of Line-Search Oracle Attacks 197
Star-Configuration Searching for Satellite Attitude Computation 197
Compressive hyperspectral imaging using progressive total variation 197
Detection and Localization of GAN Manipulated Multi-spectral Satellite Images 196
A New Backdoor Attack in CNNS by Training Set Corruption Without Label Poisoning 196
Adversarial multimedia forensics: Overview and challenges ahead 195
A DWT-based technique for spatio-frequency masking of digital signatures 194
Star-configuration searching for satellite attitude computation 193
Audio Informed Watermarking by means of Dirty Trellis Codes 192
Privacy preserving ECG quality evaluation 192
Video Integrity Verification and GOP Size Estimation Via Generalized Variation of Prediction Footprint 192
Watermarked 3D Mesh Quality Assessment 191
A Privacy-compliant Fingerprint Recognition System Based on Homomorphic Encryption and Fingercode Templates 190
On the Transferability of Adversarial Examples against CNN-based Image Forensics 189
Watermarking techniques for electronic delivery of remote sensing images 186
Detection games under fully active adversaries 186
Watermark embedding and recovery in the presence of C-LPCD de-synchronization attacks 185
Progressive compressed sensing and reconstruction of multidimensional signals using hybrid transform/prediction sparsity model 185
Error-Resilient and Low-Complexity Onboard Lossless Compression of Hyperspectral Images by Means of Distributed Source Coding 184
Trellis-coded rational Dither Modulation for digital watermarking 184
Are you threatening me? Towards smart detectors in watermarking 184
Detection Games with a Fully Active Attacker 184
Piecewise function approximation with private data 183
A vector median deblurring filter for color image restoration 182
CNN-Based adversarial embedding for image steganography 182
An overview on video forensics 181
Adversarial CNN Training Under JPEG Laundering Attacks: a Game-Theoretic Approach 181
A universal technique to hide traces of histogram-based manipulations 181
Source distinguishability under corrupted training 180
Secure evaluation of private linear branching programs with medical applications 177
General function evaluation in a STPC setting via piecewise linear approximation 177
Source distinguishability under distortion-limited attack: an optimal transport perspective 176
A CycleGAN Watermarking Method for Ownership Verification 175
Coping with the enemy: advances in adversary-aware signal processing 174
A GPU-accelerated algorithm for copy move detection in large-scale satellite images 173
The Security Margin: a Measure of Source Distinguishability under Adversarial Conditions 173
The Watchful Forensic Analyst: Multi-Clue Information Fusion with Background Knowledge 172
Comments on "A possibilistic approach to clustering" 172
On the effectiveness of local warping against sift-based copy-move detection 172
Improving the security of image manipulation detection through one-and-a-half-class multiple classification 171
Stochastic Image Warping for Improved Watermark Desynchronization 170
Adversarial source identification game with corrupted training 170
Document and Image Compression 167
Colour-based detection of defects on chicken meat 167
Improved wavelet-based watermarking through pixel-wise masking 166
Multiple parenting phylogeny relationships in digital images 166
Scene inspection in complex heterogeneous environments by means of knowledge-maps 165
GAN generation of synthetic multispectral satellite images 165
The Effectiveness of the Meta-Detection for Countering Oracle Attacks in Watermarking 165
Totale 20.560
Categoria #
all - tutte 120.794
article - articoli 0
book - libri 0
conference - conferenze 0
curatela - curatele 0
other - altro 0
patent - brevetti 0
selected - selezionate 0
volume - volumi 0
Totale 120.794


Totale Lug Ago Sett Ott Nov Dic Gen Feb Mar Apr Mag Giu
2020/20212.635 0 0 0 0 0 508 179 662 381 329 299 277
2021/20222.698 196 436 206 118 116 103 196 86 157 317 254 513
2022/20233.830 234 240 448 579 407 773 51 343 446 64 175 70
2023/20242.399 121 74 182 111 86 594 833 73 21 63 54 187
2024/20255.539 110 370 339 275 474 390 223 374 344 314 639 1.687
2025/20268.091 1.090 2.036 1.475 1.244 1.973 273 0 0 0 0 0 0
Totale 38.422