TONDI, BENEDETTA
 Distribuzione geografica
Continente #
NA - Nord America 4.708
EU - Europa 4.009
AS - Asia 2.124
SA - Sud America 425
AF - Africa 60
OC - Oceania 6
Continente sconosciuto - Info sul continente non disponibili 4
Totale 11.336
Nazione #
US - Stati Uniti d'America 4.639
GB - Regno Unito 1.180
RU - Federazione Russa 1.010
CN - Cina 735
SG - Singapore 683
IE - Irlanda 546
IT - Italia 393
BR - Brasile 377
SE - Svezia 200
HK - Hong Kong 197
UA - Ucraina 173
DE - Germania 161
FR - Francia 151
KR - Corea 143
VN - Vietnam 85
TR - Turchia 73
FI - Finlandia 69
IN - India 68
CA - Canada 36
NL - Olanda 29
AR - Argentina 27
CI - Costa d'Avorio 25
BD - Bangladesh 23
BE - Belgio 20
MX - Messico 20
PL - Polonia 19
IR - Iran 17
JP - Giappone 15
ID - Indonesia 14
AT - Austria 13
ES - Italia 12
IL - Israele 11
IQ - Iraq 11
ZA - Sudafrica 9
EC - Ecuador 8
MA - Marocco 8
UZ - Uzbekistan 8
GR - Grecia 7
PK - Pakistan 7
TN - Tunisia 7
CZ - Repubblica Ceca 6
AU - Australia 5
JO - Giordania 5
AE - Emirati Arabi Uniti 4
KE - Kenya 4
LB - Libano 4
PY - Paraguay 4
SA - Arabia Saudita 4
TW - Taiwan 4
VE - Venezuela 4
CH - Svizzera 3
EU - Europa 3
LT - Lituania 3
NO - Norvegia 3
TT - Trinidad e Tobago 3
AM - Armenia 2
AO - Angola 2
BA - Bosnia-Erzegovina 2
BH - Bahrain 2
CO - Colombia 2
CR - Costa Rica 2
DK - Danimarca 2
DO - Repubblica Dominicana 2
HN - Honduras 2
JM - Giamaica 2
KZ - Kazakistan 2
AL - Albania 1
BG - Bulgaria 1
BN - Brunei Darussalam 1
BS - Bahamas 1
CL - Cile 1
DZ - Algeria 1
EE - Estonia 1
EG - Egitto 1
GE - Georgia 1
HU - Ungheria 1
IS - Islanda 1
LU - Lussemburgo 1
MU - Mauritius 1
MY - Malesia 1
MZ - Mozambico 1
NI - Nicaragua 1
NZ - Nuova Zelanda 1
OM - Oman 1
PE - Perù 1
PH - Filippine 1
PS - Palestinian Territory 1
QA - Qatar 1
SI - Slovenia 1
SL - Sierra Leone 1
UY - Uruguay 1
XK - ???statistics.table.value.countryCode.XK??? 1
Totale 11.336
Città #
Southend 1.104
Dallas 670
Fairfield 549
Dublin 532
Singapore 376
Ashburn 335
Chandler 303
Moscow 280
Woodbridge 260
Santa Clara 222
Beijing 207
Seattle 204
Wilmington 202
Houston 194
Cambridge 191
Hong Kong 187
Seoul 142
Hefei 140
Jacksonville 140
Ann Arbor 117
Princeton 97
Siena 71
Los Angeles 67
Izmir 60
Florence 47
Dearborn 38
Boardman 36
Helsinki 36
Menlo Park 35
The Dalles 33
Nanjing 32
Ho Chi Minh City 31
San Mateo 31
Chicago 29
San Diego 29
London 27
New York 27
Buffalo 26
Munich 26
Abidjan 25
Shanghai 24
São Paulo 24
Council Bluffs 23
Bengaluru 22
Milan 22
Columbus 21
Redondo Beach 21
Rome 21
Brussels 17
Hanoi 16
Nanchang 16
North Bergen 14
Warsaw 14
Hebei 13
Salt Lake City 13
Belo Horizonte 12
Changsha 12
Fremont 12
Guangzhou 12
San Francisco 12
Toronto 12
Udine 12
Vienna 12
Zhengzhou 12
Chennai 11
Genoa 11
Piscataway 11
Shenyang 11
Amsterdam 10
Jinan 10
Rio de Janeiro 10
Tokyo 10
Brooklyn 9
Orem 9
St Petersburg 9
Isfahan 8
Tashkent 8
Atlanta 7
Dong Ket 7
Elk Grove Village 7
Fuzhou 7
Hangzhou 7
Lappeenranta 7
Montreal 7
Norwalk 7
Tianjin 7
Turku 7
Boston 6
Castellammare di Stabia 6
Denver 6
Mexico City 6
Prato 6
Stockholm 6
Tampa 6
Wuhan 6
Amman 5
Ankara 5
Campinas 5
Contagem 5
Curitiba 5
Totale 7.817
Nome #
A message passing approach for decision fusion in adversarial multi-sensor networks 377
A Message Passing Approach for Decision Fusion of Hidden-Markov Observations in the presence of Synchronized Attacks 316
A Game-Theoretic framework for optimum decision fusion in the presence of Byzantines 312
Information Fusion in Distributed Sensor Networks with Byzantines 288
Aligned and non-aligned double JPEG detection using convolutional neural networks 283
Decision Fusion with Unbalanced Priors under Synchronized Byzantine Attacks: A Message-Passing Approach 264
Decision fusion with corrupted reports in multi-sensor networks: A game-theoretic approach 249
Adversary-aware, data-driven detection of double JPEG compression: how to make counter-forensics harder 236
Consensus algorithm with censored data for distributed detection with corrupted measurements: A game-theoretic approach 235
Threat models and games for adversarial multimedia forensics 221
A Siamese Based System for City Verification 219
Higher-order, adversary-aware, double JPEG-detection via selected training on attacked samples 213
A Universal Attack Against Histogram-Based Image Forensics 209
Universal Counterforensics of Multiple Compressed JPEG Images 203
Smart Detection of Line-Search Oracle Attacks 196
A New Backdoor Attack in CNNS by Training Set Corruption Without Label Poisoning 196
Adversarial multimedia forensics: Overview and challenges ahead 195
On the Transferability of Adversarial Examples against CNN-based Image Forensics 188
Detection games under fully active adversaries 186
Are you threatening me? Towards smart detectors in watermarking 184
Detection Games with a Fully Active Attacker 184
Adversarial CNN Training Under JPEG Laundering Attacks: a Game-Theoretic Approach 181
A universal technique to hide traces of histogram-based manipulations 181
Source distinguishability under corrupted training 180
Source distinguishability under distortion-limited attack: an optimal transport perspective 176
A CycleGAN Watermarking Method for Ownership Verification 175
The Security Margin: a Measure of Source Distinguishability under Adversarial Conditions 173
A GPU-accelerated algorithm for copy move detection in large-scale satellite images 172
Improving the security of image manipulation detection through one-and-a-half-class multiple classification 171
Adversarial source identification game with corrupted training 170
GAN generation of synthetic multispectral satellite images 165
The Effectiveness of the Meta-Detection for Countering Oracle Attacks in Watermarking 165
An improved statistic for the pooled triangle test against PRNU-Copy Attack 164
Optimum forensic and counter-forensic strategies for source identification with training data 161
Secure detection of image manipulation by means of random feature selection 161
Detection of adaptive histogram equalization robust against JPEG compression 157
A siamese-based verification system for open-set architecture attribution of synthetic images 154
Countering the pooled triangle test for PRNU-based camera identification 154
Luminance-based video backdoor attack against anti-spoofing rebroadcast detection 150
Adversarial examples for reply attacks against CNN-based face recognition with anti-spoofing capability 150
Multiple-Observation Hypothesis Testing under Adversarial Conditions 148
CNN-based detection of generic contrast adjustment with JPEG post-processing 147
Robust and Large-Payload DNN Watermarking via Fixed, Distribution-Optimized, Weights 145
Binary Hypothesis Testing Game with Training Data 144
The Source Identification Game: An Information-Theoretic Perspective 144
A gradient-based pixel-domain attack against SVM detection of global image manipulations 144
Primary Quantization Matrix Estimation of Double Compressed JPEG Images via CNN 143
Detecting Deepfake Videos in Data Scarcity Conditions by Means of Video Coding Features 142
Effectiveness of random deep feature selection for securing image manipulation detectors against adversarial examples 139
A Master Key backdoor for universal impersonation attack against DNN-based face verification 139
An Architecture for the detection of GAN-generated Flood Images with Localization Capabilities 129
Semiotic-Based Construction of a Large Emotional Image Dataset with Neutral Samples 128
Enhancing Synthetic Generated-Images Detection through Post-Hoc Calibration 120
Which Country is This Picture From? New Data and Methods For Dnn-Based Country Recognition 118
Just Dance: detection of human body reenactment fake videos 117
A Temporal Chrominance Trigger for Clean-Label Backdoor Attack Against Anti-Spoof Rebroadcast Detection 116
Universal Detection of Backdoor Attacks via Density-Based Clustering and Centroids Analysis 110
An Overview on the Generation and Detection of Synthetic and Manipulated Satellite Images 103
An Eyes-Based Siamese Neural Network for the Detection of GAN-Generated Face Images 103
Generation of synthetic generative adversarial network-based multispectral satellite images with improved sharpness 100
An Overview of Backdoor Attacks Against Deep Neural Networks and Possible Defences 90
Manipulation and generation of synthetic satellite images using deep learning models 89
Boosting CNN-based primary quantization matrix estimation of double JPEG images via a classification-like architecture 87
Spread-Transform Dither Modulation Watermarking of Deep Neural Network 82
Challenging the Adversarial Robustness of DNNs Based on Error-Correcting Output Codes 81
Image Splicing Detection, Localization and Attribution via JPEG Primary Quantization Matrix Estimation and Clustering 80
Copy Move Source-Target Disambiguation through Multi-Branch CNNs 79
Pixel-domain Adversarial Examples Against CNN-based Manipulation Detectors 77
CNN-based steganalysis and parametric adversarial embedding:A game-theoretic framework 77
Wide Flat Minimum Watermarking for Robust Ownership Verification of GANs 74
Constructing An Intrinsically Robust Steganalyzer via Learning Neighboring Feature Relationships and Self-adversarial Adjustment 53
Totale 11.562
Categoria #
all - tutte 37.659
article - articoli 0
book - libri 0
conference - conferenze 0
curatela - curatele 0
other - altro 0
patent - brevetti 0
selected - selezionate 0
volume - volumi 0
Totale 37.659


Totale Lug Ago Sett Ott Nov Dic Gen Feb Mar Apr Mag Giu
2020/2021851 0 0 0 0 0 167 63 211 92 142 89 87
2021/2022877 54 115 50 36 66 43 75 27 72 98 74 167
2022/2023940 61 109 125 136 72 176 17 70 94 20 39 21
2023/2024948 34 30 65 66 54 216 305 32 4 20 33 89
2024/20252.132 50 135 130 105 204 198 131 117 119 161 251 531
2025/20263.032 363 651 575 569 813 61 0 0 0 0 0 0
Totale 11.562