TONDI, BENEDETTA
 Distribuzione geografica
Continente #
NA - Nord America 4.692
EU - Europa 3.999
AS - Asia 2.119
SA - Sud America 425
AF - Africa 59
OC - Oceania 6
Continente sconosciuto - Info sul continente non disponibili 4
Totale 11.304
Nazione #
US - Stati Uniti d'America 4.625
GB - Regno Unito 1.176
RU - Federazione Russa 1.010
CN - Cina 734
SG - Singapore 683
IE - Irlanda 546
IT - Italia 392
BR - Brasile 377
SE - Svezia 200
HK - Hong Kong 197
UA - Ucraina 173
DE - Germania 161
FR - Francia 146
KR - Corea 143
VN - Vietnam 83
TR - Turchia 73
FI - Finlandia 69
IN - India 67
CA - Canada 35
NL - Olanda 29
AR - Argentina 27
CI - Costa d'Avorio 25
BD - Bangladesh 22
BE - Belgio 20
MX - Messico 19
PL - Polonia 19
IR - Iran 17
JP - Giappone 15
ID - Indonesia 14
AT - Austria 13
ES - Italia 12
IL - Israele 11
IQ - Iraq 11
EC - Ecuador 8
MA - Marocco 8
UZ - Uzbekistan 8
ZA - Sudafrica 8
GR - Grecia 7
PK - Pakistan 7
TN - Tunisia 7
CZ - Repubblica Ceca 6
AU - Australia 5
JO - Giordania 5
AE - Emirati Arabi Uniti 4
KE - Kenya 4
LB - Libano 4
PY - Paraguay 4
SA - Arabia Saudita 4
TW - Taiwan 4
VE - Venezuela 4
CH - Svizzera 3
EU - Europa 3
LT - Lituania 3
NO - Norvegia 3
TT - Trinidad e Tobago 3
AM - Armenia 2
AO - Angola 2
BA - Bosnia-Erzegovina 2
BH - Bahrain 2
CO - Colombia 2
CR - Costa Rica 2
DK - Danimarca 2
DO - Repubblica Dominicana 2
HN - Honduras 2
JM - Giamaica 2
KZ - Kazakistan 2
AL - Albania 1
BG - Bulgaria 1
BN - Brunei Darussalam 1
BS - Bahamas 1
CL - Cile 1
DZ - Algeria 1
EE - Estonia 1
EG - Egitto 1
GE - Georgia 1
HU - Ungheria 1
IS - Islanda 1
LU - Lussemburgo 1
MU - Mauritius 1
MY - Malesia 1
MZ - Mozambico 1
NI - Nicaragua 1
NZ - Nuova Zelanda 1
OM - Oman 1
PE - Perù 1
PH - Filippine 1
PS - Palestinian Territory 1
QA - Qatar 1
SI - Slovenia 1
SL - Sierra Leone 1
UY - Uruguay 1
XK - ???statistics.table.value.countryCode.XK??? 1
Totale 11.304
Città #
Southend 1.104
Dallas 670
Fairfield 549
Dublin 532
Singapore 376
Ashburn 331
Chandler 303
Moscow 280
Woodbridge 260
Santa Clara 222
Beijing 207
Seattle 203
Wilmington 202
Houston 194
Cambridge 191
Hong Kong 187
Seoul 142
Hefei 140
Jacksonville 140
Ann Arbor 117
Princeton 97
Siena 71
Los Angeles 66
Izmir 60
Florence 46
Dearborn 38
Helsinki 36
Boardman 35
Menlo Park 35
The Dalles 33
Nanjing 32
Ho Chi Minh City 31
San Mateo 31
Chicago 29
San Diego 29
Buffalo 26
Munich 26
New York 26
Abidjan 25
London 24
Shanghai 24
São Paulo 24
Council Bluffs 23
Milan 22
Bengaluru 21
Columbus 21
Redondo Beach 21
Rome 21
Brussels 17
Nanchang 16
Hanoi 15
North Bergen 14
Warsaw 14
Hebei 13
Salt Lake City 13
Belo Horizonte 12
Changsha 12
Fremont 12
Guangzhou 12
San Francisco 12
Udine 12
Vienna 12
Zhengzhou 12
Chennai 11
Genoa 11
Piscataway 11
Shenyang 11
Toronto 11
Amsterdam 10
Jinan 10
Rio de Janeiro 10
Tokyo 10
Brooklyn 9
St Petersburg 9
Isfahan 8
Orem 8
Tashkent 8
Atlanta 7
Dong Ket 7
Elk Grove Village 7
Fuzhou 7
Hangzhou 7
Lappeenranta 7
Montreal 7
Norwalk 7
Tianjin 7
Turku 7
Boston 6
Castellammare di Stabia 6
Mexico City 6
Prato 6
Stockholm 6
Tampa 6
Wuhan 6
Amman 5
Ankara 5
Campinas 5
Contagem 5
Curitiba 5
Denver 5
Totale 7.800
Nome #
A message passing approach for decision fusion in adversarial multi-sensor networks 376
A Message Passing Approach for Decision Fusion of Hidden-Markov Observations in the presence of Synchronized Attacks 315
A Game-Theoretic framework for optimum decision fusion in the presence of Byzantines 311
Information Fusion in Distributed Sensor Networks with Byzantines 288
Aligned and non-aligned double JPEG detection using convolutional neural networks 283
Decision Fusion with Unbalanced Priors under Synchronized Byzantine Attacks: A Message-Passing Approach 263
Decision fusion with corrupted reports in multi-sensor networks: A game-theoretic approach 249
Adversary-aware, data-driven detection of double JPEG compression: how to make counter-forensics harder 236
Consensus algorithm with censored data for distributed detection with corrupted measurements: A game-theoretic approach 235
Threat models and games for adversarial multimedia forensics 221
A Siamese Based System for City Verification 216
Higher-order, adversary-aware, double JPEG-detection via selected training on attacked samples 213
A Universal Attack Against Histogram-Based Image Forensics 209
Universal Counterforensics of Multiple Compressed JPEG Images 202
Smart Detection of Line-Search Oracle Attacks 196
A New Backdoor Attack in CNNS by Training Set Corruption Without Label Poisoning 196
Adversarial multimedia forensics: Overview and challenges ahead 195
On the Transferability of Adversarial Examples against CNN-based Image Forensics 188
Detection games under fully active adversaries 186
Are you threatening me? Towards smart detectors in watermarking 184
Detection Games with a Fully Active Attacker 183
Adversarial CNN Training Under JPEG Laundering Attacks: a Game-Theoretic Approach 181
Source distinguishability under corrupted training 180
A universal technique to hide traces of histogram-based manipulations 180
Source distinguishability under distortion-limited attack: an optimal transport perspective 176
A CycleGAN Watermarking Method for Ownership Verification 174
The Security Margin: a Measure of Source Distinguishability under Adversarial Conditions 173
Improving the security of image manipulation detection through one-and-a-half-class multiple classification 171
Adversarial source identification game with corrupted training 170
A GPU-accelerated algorithm for copy move detection in large-scale satellite images 168
GAN generation of synthetic multispectral satellite images 165
The Effectiveness of the Meta-Detection for Countering Oracle Attacks in Watermarking 165
An improved statistic for the pooled triangle test against PRNU-Copy Attack 164
Optimum forensic and counter-forensic strategies for source identification with training data 161
Secure detection of image manipulation by means of random feature selection 161
Detection of adaptive histogram equalization robust against JPEG compression 157
A siamese-based verification system for open-set architecture attribution of synthetic images 154
Countering the pooled triangle test for PRNU-based camera identification 154
Luminance-based video backdoor attack against anti-spoofing rebroadcast detection 150
Adversarial examples for reply attacks against CNN-based face recognition with anti-spoofing capability 150
Multiple-Observation Hypothesis Testing under Adversarial Conditions 148
CNN-based detection of generic contrast adjustment with JPEG post-processing 147
The Source Identification Game: An Information-Theoretic Perspective 144
Robust and Large-Payload DNN Watermarking via Fixed, Distribution-Optimized, Weights 144
Binary Hypothesis Testing Game with Training Data 143
Primary Quantization Matrix Estimation of Double Compressed JPEG Images via CNN 143
A gradient-based pixel-domain attack against SVM detection of global image manipulations 143
Detecting Deepfake Videos in Data Scarcity Conditions by Means of Video Coding Features 141
Effectiveness of random deep feature selection for securing image manipulation detectors against adversarial examples 139
A Master Key backdoor for universal impersonation attack against DNN-based face verification 139
An Architecture for the detection of GAN-generated Flood Images with Localization Capabilities 128
Semiotic-Based Construction of a Large Emotional Image Dataset with Neutral Samples 126
Enhancing Synthetic Generated-Images Detection through Post-Hoc Calibration 118
Which Country is This Picture From? New Data and Methods For Dnn-Based Country Recognition 117
A Temporal Chrominance Trigger for Clean-Label Backdoor Attack Against Anti-Spoof Rebroadcast Detection 116
Just Dance: detection of human body reenactment fake videos 115
Universal Detection of Backdoor Attacks via Density-Based Clustering and Centroids Analysis 110
An Overview on the Generation and Detection of Synthetic and Manipulated Satellite Images 102
An Eyes-Based Siamese Neural Network for the Detection of GAN-Generated Face Images 102
Generation of synthetic generative adversarial network-based multispectral satellite images with improved sharpness 100
An Overview of Backdoor Attacks Against Deep Neural Networks and Possible Defences 90
Manipulation and generation of synthetic satellite images using deep learning models 88
Boosting CNN-based primary quantization matrix estimation of double JPEG images via a classification-like architecture 87
Spread-Transform Dither Modulation Watermarking of Deep Neural Network 82
Challenging the Adversarial Robustness of DNNs Based on Error-Correcting Output Codes 81
Image Splicing Detection, Localization and Attribution via JPEG Primary Quantization Matrix Estimation and Clustering 80
Copy Move Source-Target Disambiguation through Multi-Branch CNNs 79
Pixel-domain Adversarial Examples Against CNN-based Manipulation Detectors 77
CNN-based steganalysis and parametric adversarial embedding:A game-theoretic framework 77
Wide Flat Minimum Watermarking for Robust Ownership Verification of GANs 73
Constructing An Intrinsically Robust Steganalyzer via Learning Neighboring Feature Relationships and Self-adversarial Adjustment 52
Totale 11.530
Categoria #
all - tutte 37.518
article - articoli 0
book - libri 0
conference - conferenze 0
curatela - curatele 0
other - altro 0
patent - brevetti 0
selected - selezionate 0
volume - volumi 0
Totale 37.518


Totale Lug Ago Sett Ott Nov Dic Gen Feb Mar Apr Mag Giu
2020/2021851 0 0 0 0 0 167 63 211 92 142 89 87
2021/2022877 54 115 50 36 66 43 75 27 72 98 74 167
2022/2023940 61 109 125 136 72 176 17 70 94 20 39 21
2023/2024948 34 30 65 66 54 216 305 32 4 20 33 89
2024/20252.132 50 135 130 105 204 198 131 117 119 161 251 531
2025/20263.000 363 651 575 569 813 29 0 0 0 0 0 0
Totale 11.530