TONDI, BENEDETTA
 Distribuzione geografica
Continente #
NA - Nord America 5.104
EU - Europa 4.211
AS - Asia 2.539
SA - Sud America 485
AF - Africa 167
OC - Oceania 9
Continente sconosciuto - Info sul continente non disponibili 4
Totale 12.519
Nazione #
US - Stati Uniti d'America 5.006
GB - Regno Unito 1.205
RU - Federazione Russa 1.019
CN - Cina 801
SG - Singapore 767
IE - Irlanda 548
IT - Italia 419
BR - Brasile 417
HK - Hong Kong 231
FR - Francia 223
VN - Vietnam 215
SE - Svezia 201
DE - Germania 182
UA - Ucraina 177
KR - Corea 144
FI - Finlandia 88
IN - India 86
TR - Turchia 78
ZA - Sudafrica 78
CA - Canada 49
BD - Bangladesh 40
AR - Argentina 32
NL - Olanda 32
MX - Messico 29
CI - Costa d'Avorio 25
PL - Polonia 25
BE - Belgio 22
IQ - Iraq 21
KE - Kenya 21
ID - Indonesia 19
JP - Giappone 18
IR - Iran 17
AT - Austria 15
PK - Pakistan 15
ES - Italia 13
MA - Marocco 13
EC - Ecuador 11
IL - Israele 11
JO - Giordania 10
UZ - Uzbekistan 10
TN - Tunisia 9
TW - Taiwan 9
AU - Australia 8
GR - Grecia 8
NG - Nigeria 8
CL - Cile 7
MY - Malesia 7
AE - Emirati Arabi Uniti 6
CZ - Repubblica Ceca 6
SA - Arabia Saudita 6
VE - Venezuela 6
CH - Svizzera 5
CR - Costa Rica 5
PH - Filippine 5
CO - Colombia 4
DZ - Algeria 4
LB - Libano 4
LT - Lituania 4
PY - Paraguay 4
TT - Trinidad e Tobago 4
DO - Repubblica Dominicana 3
EU - Europa 3
KZ - Kazakistan 3
NO - Norvegia 3
NP - Nepal 3
AM - Armenia 2
AO - Angola 2
BA - Bosnia-Erzegovina 2
BH - Bahrain 2
BY - Bielorussia 2
DK - Danimarca 2
EG - Egitto 2
ET - Etiopia 2
HN - Honduras 2
HU - Ungheria 2
JM - Giamaica 2
NI - Nicaragua 2
PE - Perù 2
TH - Thailandia 2
AL - Albania 1
BG - Bulgaria 1
BN - Brunei Darussalam 1
BO - Bolivia 1
BS - Bahamas 1
EE - Estonia 1
GE - Georgia 1
HR - Croazia 1
IS - Islanda 1
KG - Kirghizistan 1
LU - Lussemburgo 1
MN - Mongolia 1
MU - Mauritius 1
MZ - Mozambico 1
NZ - Nuova Zelanda 1
OM - Oman 1
PR - Porto Rico 1
PS - Palestinian Territory 1
PT - Portogallo 1
QA - Qatar 1
SI - Slovenia 1
Totale 12.516
Città #
Southend 1.104
Dallas 673
Fairfield 549
Dublin 533
Singapore 413
Ashburn 371
Chandler 303
Moscow 280
Woodbridge 260
Santa Clara 226
Beijing 210
Hong Kong 208
Seattle 204
Wilmington 202
Houston 195
Cambridge 191
San Jose 176
Hefei 159
Seoul 143
Jacksonville 141
Ann Arbor 117
Princeton 97
Los Angeles 94
Johannesburg 71
Siena 71
Ho Chi Minh City 70
The Dalles 70
Lauterbourg 61
Izmir 60
Hanoi 56
Florence 54
Boardman 38
Dearborn 38
Helsinki 37
Menlo Park 35
New York 34
Nanjing 32
Chicago 31
London 31
Munich 31
San Mateo 31
San Diego 30
Buffalo 29
Council Bluffs 27
São Paulo 26
Abidjan 25
Shanghai 25
Rome 24
Turku 24
Bengaluru 23
Milan 22
Orem 22
Columbus 21
Redondo Beach 21
Brussels 19
Nanchang 16
Warsaw 16
Toronto 15
Chennai 14
North Bergen 14
Salt Lake City 14
Vienna 14
Belo Horizonte 13
Hebei 13
Tokyo 13
Changsha 12
Fremont 12
Guangzhou 12
Rio de Janeiro 12
San Francisco 12
Udine 12
Zhengzhou 12
Da Nang 11
Genoa 11
Manchester 11
Piscataway 11
Shenyang 11
Amsterdam 10
Baghdad 10
Brooklyn 10
Frankfurt am Main 10
Jinan 10
St Petersburg 10
Amman 9
Montreal 9
Tashkent 9
Abuja 8
Atlanta 8
Isfahan 8
Mexico City 8
Nuremberg 8
Paris 8
Bologna 7
Dhaka 7
Dong Ket 7
Elk Grove Village 7
Fuzhou 7
Haiphong 7
Hangzhou 7
Lappeenranta 7
Totale 8.510
Nome #
A message passing approach for decision fusion in adversarial multi-sensor networks 397
A Message Passing Approach for Decision Fusion of Hidden-Markov Observations in the presence of Synchronized Attacks 338
A Game-Theoretic framework for optimum decision fusion in the presence of Byzantines 333
Information Fusion in Distributed Sensor Networks with Byzantines 313
Aligned and non-aligned double JPEG detection using convolutional neural networks 294
Decision Fusion with Unbalanced Priors under Synchronized Byzantine Attacks: A Message-Passing Approach 280
Decision fusion with corrupted reports in multi-sensor networks: A game-theoretic approach 262
Consensus algorithm with censored data for distributed detection with corrupted measurements: A game-theoretic approach 256
Adversary-aware, data-driven detection of double JPEG compression: how to make counter-forensics harder 254
A Siamese Based System for City Verification 243
A Universal Attack Against Histogram-Based Image Forensics 234
Higher-order, adversary-aware, double JPEG-detection via selected training on attacked samples 230
Threat models and games for adversarial multimedia forensics 227
A New Backdoor Attack in CNNS by Training Set Corruption Without Label Poisoning 219
Universal Counterforensics of Multiple Compressed JPEG Images 213
Adversarial multimedia forensics: Overview and challenges ahead 210
A CycleGAN Watermarking Method for Ownership Verification 208
Smart Detection of Line-Search Oracle Attacks 205
On the Transferability of Adversarial Examples against CNN-based Image Forensics 202
Are you threatening me? Towards smart detectors in watermarking 199
A GPU-accelerated algorithm for copy move detection in large-scale satellite images 198
Adversarial CNN Training Under JPEG Laundering Attacks: a Game-Theoretic Approach 197
A universal technique to hide traces of histogram-based manipulations 197
Detection games under fully active adversaries 195
Detection Games with a Fully Active Attacker 192
The Security Margin: a Measure of Source Distinguishability under Adversarial Conditions 190
Source distinguishability under distortion-limited attack: an optimal transport perspective 187
Source distinguishability under corrupted training 186
Adversarial source identification game with corrupted training 184
Improving the security of image manipulation detection through one-and-a-half-class multiple classification 184
GAN generation of synthetic multispectral satellite images 178
Adversarial examples for reply attacks against CNN-based face recognition with anti-spoofing capability 178
Secure detection of image manipulation by means of random feature selection 176
The Effectiveness of the Meta-Detection for Countering Oracle Attacks in Watermarking 172
An improved statistic for the pooled triangle test against PRNU-Copy Attack 170
A siamese-based verification system for open-set architecture attribution of synthetic images 169
Optimum forensic and counter-forensic strategies for source identification with training data 167
Semiotic-Based Construction of a Large Emotional Image Dataset with Neutral Samples 166
Multiple-Observation Hypothesis Testing under Adversarial Conditions 166
Detection of adaptive histogram equalization robust against JPEG compression 166
Robust and Large-Payload DNN Watermarking via Fixed, Distribution-Optimized, Weights 166
Detecting Deepfake Videos in Data Scarcity Conditions by Means of Video Coding Features 165
Countering the pooled triangle test for PRNU-based camera identification 162
Luminance-based video backdoor attack against anti-spoofing rebroadcast detection 161
A gradient-based pixel-domain attack against SVM detection of global image manipulations 161
CNN-based detection of generic contrast adjustment with JPEG post-processing 158
A Master Key backdoor for universal impersonation attack against DNN-based face verification 158
Primary Quantization Matrix Estimation of Double Compressed JPEG Images via CNN 154
Which Country is This Picture From? New Data and Methods For Dnn-Based Country Recognition 153
The Source Identification Game: An Information-Theoretic Perspective 153
Binary Hypothesis Testing Game with Training Data 151
Effectiveness of random deep feature selection for securing image manipulation detectors against adversarial examples 151
An Architecture for the detection of GAN-generated Flood Images with Localization Capabilities 150
Enhancing Synthetic Generated-Images Detection through Post-Hoc Calibration 146
Just Dance: detection of human body reenactment fake videos 142
A Temporal Chrominance Trigger for Clean-Label Backdoor Attack Against Anti-Spoof Rebroadcast Detection 132
An Overview on the Generation and Detection of Synthetic and Manipulated Satellite Images 132
An Eyes-Based Siamese Neural Network for the Detection of GAN-Generated Face Images 131
CNN-based steganalysis and parametric adversarial embedding:A game-theoretic framework 122
Universal Detection of Backdoor Attacks via Density-Based Clustering and Centroids Analysis 121
Generation of synthetic generative adversarial network-based multispectral satellite images with improved sharpness 114
Manipulation and generation of synthetic satellite images using deep learning models 111
Image Splicing Detection, Localization and Attribution via JPEG Primary Quantization Matrix Estimation and Clustering 101
Spread-Transform Dither Modulation Watermarking of Deep Neural Network 98
An Overview of Backdoor Attacks Against Deep Neural Networks and Possible Defences 98
Boosting CNN-based primary quantization matrix estimation of double JPEG images via a classification-like architecture 97
Wide Flat Minimum Watermarking for Robust Ownership Verification of GANs 89
Pixel-domain Adversarial Examples Against CNN-based Manipulation Detectors 88
Challenging the Adversarial Robustness of DNNs Based on Error-Correcting Output Codes 88
Copy Move Source-Target Disambiguation through Multi-Branch CNNs 83
Constructing An Intrinsically Robust Steganalyzer via Learning Neighboring Feature Relationships and Self-adversarial Adjustment 74
Totale 12.745
Categoria #
all - tutte 39.959
article - articoli 0
book - libri 0
conference - conferenze 0
curatela - curatele 0
other - altro 0
patent - brevetti 0
selected - selezionate 0
volume - volumi 0
Totale 39.959


Totale Lug Ago Sett Ott Nov Dic Gen Feb Mar Apr Mag Giu
2020/2021318 0 0 0 0 0 0 0 0 0 142 89 87
2021/2022877 54 115 50 36 66 43 75 27 72 98 74 167
2022/2023940 61 109 125 136 72 176 17 70 94 20 39 21
2023/2024948 34 30 65 66 54 216 305 32 4 20 33 89
2024/20252.132 50 135 130 105 204 198 131 117 119 161 251 531
2025/20264.215 363 651 575 569 813 136 534 160 142 272 0 0
Totale 12.745