ROLI, FABIO
 Distribuzione geografica
Continente #
EU - Europa 3.643
Totale 3.643
Nazione #
IT - Italia 3.643
Totale 3.643
Città #
Genoa 1.212
Genova 1.158
Vado Ligure 658
Rapallo 579
Bordighera 36
Totale 3.643
Nome #
A hybrid system for two-dimensional image recognition 120
An extension of the Jeffreys-Matusita Distance to Multiclass Cases for Feature Selection 100
Supervised learning of descriptions for image recognition purposes 98
Classification of Multisensor Remote-Sensing Images by Structured Neural Networks 97
Structured Neural Networks for Signal Classification 97
A Learning System For The Generation Of Conceptual Descriptions For Workpiece Recognition PurposesProceedings.14 Annual Conference of Industrial Electronics Society 94
Experimental comparison of neural networks for the classification of multisensor remote-sensing images 93
An experimental comparison of neural and statistical non-parametric algorithms for supervised classification of remote-sensing images 92
A Parallel Network of Modified 1-NN and k-NN Classifiers – Application to Remote Sensing Image Classification 88
Intelligent control of signal processing algorithms in communications 86
Explaining Vulnerabilities of Deep Learning to Adversarial Malware Binaries 61
Adversarial EXEmples: A Survey and Experimental Evaluation of Practical Attacks on Machine Learning for Windows Malware Detection 46
Multiple Classifier Systems for Robust Classifier Design in Adversarial Environments 44
F-measure optimisation in multi-label classifiers 41
ImageNet-Patch: A dataset for benchmarking machine learning robustness against adversarial patches 32
Adversarial attacks against intrusion detection systems: Taxonomy, solutions and open issues 32
Adaptive ensembles for face recognition in changing video surveillance environments 30
Adversarial Detection of Flash Malware: Limitations and Open Issues 29
Analysis of unsupervised template update in biometric recognition systems 26
Review of the Fingerprint Liveness Detection (LivDet) competition series: 2009 to 2015 26
Do gradient-based explanations tell anything about adversarial robustness to android malware? 24
The Hammer and the Nut: Is Bilevel Optimization Really Needed to Poison Linear Classifiers? 24
Domain Knowledge Alleviates Adversarial Attacks in Multi-Label Classifiers 24
Fingerprint Presentation Attacks Detection based on the User-Specific Effect 23
Exploiting the golden ratio on human faces for head-pose estimation 23
Alarm clustering for intrusion detection systems in computer networks 22
Explaining black-box android malware detection 22
Why Do Adversarial Attacks Transfer? Explaining Transferability of Evasion and Poisoning Attacks 22
Security evaluation of biometric authentication systems under real spoofing attacks 22
Using Co-training and Self-training in Semi-Supervised Multiple Classifier Systems 22
Adversarial Malware Binaries: Evading Deep Learning for Malware Detection in Executables 21
Adversarial Feature Selection Against Evasion Attacks 21
Gesture modelling and recognition by integrating declarative models and pattern recognition algorithms 21
Wild patterns: ten years after the rise of adversarial machine learning 21
A novel classification-selection approach for the self updating of template-based face recognition systems 20
Functionality-Preserving Black-Box Optimization of Adversarial Windows Malware 20
A parameter randomization approach for constructing classifier ensembles 20
Statistical meta-analysis of presentation attacks for secure multibiometric systems 20
DeltaPhish: Detecting phishing webpages in compromised websites 20
Machine Learning Security Against Data Poisoning: Are We There Yet? 19
Analysis of error-reject trade-off in linearly combined multiple classifiers 19
Deepsquatting: Learning-based typosquatting detection at deeper domain levels 19
Knowledge-Based Segmentation for the Identification of Pathologies in MR Images 19
Is Deep Learning Safe for Robot Vision? Adversarial Examples against the iCub Humanoid 19
Infinity-norm support vector machines against adversarial label contamination 19
One-and-a-half-class multiple classifier systems for secure learning against evasion attacks at test time 19
Robustness Analysis of Likelihood Ratio Score Fusion Rule for Multimodal Biometric Systems under Spoof Attacks 19
Stock market prediction by a mixture of genetic-neural experts 19
Why template self-update should work in biometric authentication systems? 19
Super-Sparse Learning in Similarity Spaces 19
EEG personal recognition based on ‘qualified majority’ over signal patches 18
Towards quality assurance of software product lines with adversarial configurations 18
Bayesian relevance feedback for content-based image retrieval 18
Deep neural rejection against adversarial examples 17
Face anti-spoofing via hybrid convolutional neural network 17
Are spoofs from latent fingerprints a real threat for the best state-of-art liveness detectors? 17
Information fusion for computer security: State of the art and open issues 17
A multi-modal dataset, protocol and tools for adaptive biometric systems: A benchmarking study 17
Neural shape codes for 3D model retrieval 17
Apprendimento Automatico di modelli per il Riconoscimento di Immagini 17
An approach to the automatic design of multiple classifier systems 16
A survey and experimental evaluation of image spam filtering techniques 16
Error rejection in linearly combined multiple classifiers 16
Adversarial biometric recognition: a review on biometric system security from the adversarial machine-learning perspective 16
Analysis of co-training algorithm with very small training sets 15
Adaptive query shifting for content-based image retrieval 15
Towards poisoning of deep learning algorithms with back-gradient optimization 15
Super-Sparse regression for fast age estimation from faces at test time 15
Statistical and neural classifiers: an integrated approach to design (Advances in Pattern Recognition Series) 15
Atti del Convegno su "Il Telerilevamento ed i Sistemi Informativi Territoriali nella Gestione delle Risorse Ambientali", Trento, Italia, 27 Ottobre 1994 15
Detecting Anomalies from Video-Sequences: a Novel Descriptor 15
Instance-based relevance feedback in image retrieval using dissimilarity spaces 15
Complexity of Data Subsets Generated by the Random Subspace Method: an Experimental Investigation 15
Nebula: Self-Attention for Dynamic Malware Analysis 14
Application of neural networks and statistical pattern recognition algorithms to earthquake risk evaluation 14
A note on core research issues for statistical pattern recognition RID F-3169-2010 14
Adaptive appearance model tracking for still-to-video face recognition 14
Analysis of Linear and Order Statistics Combiners for Fusion of Imbalanced Classifiers 14
Fast image classification with reduced multiclass support vector machines 14
Design of robust classifiers for adversarial environments 14
Exploiting Dissimilarity Representations for Person Re-identification 14
Practical Attacks on Machine Learning: A Case Study on Adversarial Windows Malware 13
Texture and artifact decomposition for improving generalization in deep-learning-based deepfake detection 13
Fingerprint recognition with embedded presentation attacks detection: are we ready? 13
Review of fingerprint presentation attack detection competitions 13
Editorial of the Special Issue on Multi-instance Learning in Pattern Recognition and Vision 13
Randomized Prediction Games for Adversarial Machine Learning 13
Cybersecurity and AI: The PRALab Research Experience 12
Dropout Injection at Test Time for Post Hoc Uncertainty Quantification in Neural Networks 12
Security evaluation of pattern classifiers under attack 12
Fusion of LDA and PCA for Face Recognition 12
A multi-stage approach for fast person re-identification 12
Poisoning attacks to compromise face templates 12
A score decidability index for dynamic score combination 12
Support vector machines for remote-sensing image classification 12
Information fusion in computer security 12
On Reducing the Effect of Covariate Factors in Gait Recognition: a Classifier Ensemble Method 12
Fingerprint liveness detection using local texture features 12
A Hybrid Training-Time and Run-Time Defense Against Adversarial Attacks in Modulation Classification 11
Adversarial mimicry attacks against image splicing forensics: An approach for jointly hiding manipulations and creating false detections 11
Totale 2.669
Categoria #
all - tutte 40.384
article - articoli 19.651
book - libri 85
conference - conferenze 17.848
curatela - curatele 28
other - altro 722
patent - brevetti 0
selected - selezionate 0
volume - volumi 2.050
Totale 80.768


Totale Lug Ago Sett Ott Nov Dic Gen Feb Mar Apr Mag Giu
2019/2020270 0 0 0 17 26 39 43 21 29 48 38 9
2020/202168 3 12 3 2 8 7 0 5 8 8 5 7
2021/2022565 1 6 2 18 3 13 12 35 4 15 186 270
2022/2023858 135 34 24 63 109 140 3 53 166 6 101 24
2023/20241.181 42 82 14 106 84 163 166 138 66 62 52 206
2024/2025696 66 506 77 47 0 0 0 0 0 0 0 0
Totale 4.046