ROLI, FABIO
 Distribuzione geografica
Continente #
EU - Europa 4.624
Totale 4.624
Nazione #
IT - Italia 4.624
Totale 4.624
Città #
Vado Ligure 1.639
Genoa 1.212
Genova 1.158
Rapallo 579
Bordighera 36
Totale 4.624
Nome #
A hybrid system for two-dimensional image recognition 124
An extension of the Jeffreys-Matusita Distance to Multiclass Cases for Feature Selection 107
Supervised learning of descriptions for image recognition purposes 102
Classification of Multisensor Remote-Sensing Images by Structured Neural Networks 101
An experimental comparison of neural and statistical non-parametric algorithms for supervised classification of remote-sensing images 101
Structured Neural Networks for Signal Classification 101
A Learning System For The Generation Of Conceptual Descriptions For Workpiece Recognition PurposesProceedings.14 Annual Conference of Industrial Electronics Society 98
Experimental comparison of neural networks for the classification of multisensor remote-sensing images 97
A Parallel Network of Modified 1-NN and k-NN Classifiers – Application to Remote Sensing Image Classification 91
Intelligent control of signal processing algorithms in communications 89
Explaining Vulnerabilities of Deep Learning to Adversarial Malware Binaries 64
Multiple Classifier Systems for Robust Classifier Design in Adversarial Environments 53
Adversarial EXEmples: A Survey and Experimental Evaluation of Practical Attacks on Machine Learning for Windows Malware Detection 53
F-measure optimisation in multi-label classifiers 47
On Reducing the Effect of Covariate Factors in Gait Recognition: a Classifier Ensemble Method 40
ImageNet-Patch: A dataset for benchmarking machine learning robustness against adversarial patches 37
Adversarial Detection of Flash Malware: Limitations and Open Issues 36
Adaptive ensembles for face recognition in changing video surveillance environments 35
Adversarial attacks against intrusion detection systems: Taxonomy, solutions and open issues 35
Domain Knowledge Alleviates Adversarial Attacks in Multi-Label Classifiers 32
Analysis of unsupervised template update in biometric recognition systems 30
Review of the Fingerprint Liveness Detection (LivDet) competition series: 2009 to 2015 30
The Hammer and the Nut: Is Bilevel Optimization Really Needed to Poison Linear Classifiers? 30
Do gradient-based explanations tell anything about adversarial robustness to android malware? 28
Wild patterns: ten years after the rise of adversarial machine learning 28
Why Do Adversarial Attacks Transfer? Explaining Transferability of Evasion and Poisoning Attacks 27
Fingerprint Presentation Attacks Detection based on the User-Specific Effect 27
Security evaluation of biometric authentication systems under real spoofing attacks 27
Explaining black-box android malware detection 26
Adversarial Feature Selection Against Evasion Attacks 26
Statistical meta-analysis of presentation attacks for secure multibiometric systems 26
Exploiting the golden ratio on human faces for head-pose estimation 26
Machine Learning Security Against Data Poisoning: Are We There Yet? 25
Alarm clustering for intrusion detection systems in computer networks 25
Analysis of error-reject trade-off in linearly combined multiple classifiers 25
A parameter randomization approach for constructing classifier ensembles 25
Infinity-norm support vector machines against adversarial label contamination 25
Using Co-training and Self-training in Semi-Supervised Multiple Classifier Systems 25
A novel classification-selection approach for the self updating of template-based face recognition systems 24
Deepsquatting: Learning-based typosquatting detection at deeper domain levels 24
Adversarial Malware Binaries: Evading Deep Learning for Malware Detection in Executables 24
Is Deep Learning Safe for Robot Vision? Adversarial Examples against the iCub Humanoid 24
Stock market prediction by a mixture of genetic-neural experts 24
Gesture modelling and recognition by integrating declarative models and pattern recognition algorithms 24
Why template self-update should work in biometric authentication systems? 24
Super-Sparse Learning in Similarity Spaces 24
Hardening RGB-D object recognition systems against adversarial patch attacks 23
Application of neural networks and statistical pattern recognition algorithms to earthquake risk evaluation 23
Deep neural rejection against adversarial examples 23
Functionality-Preserving Black-Box Optimization of Adversarial Windows Malware 23
An empirical investigation on the use of diversity for creation of classifier ensembles 23
Are spoofs from latent fingerprints a real threat for the best state-of-art liveness detectors? 23
DeltaPhish: Detecting phishing webpages in compromised websites 23
Nebula: Self-Attention for Dynamic Malware Analysis 22
Analysis of co-training algorithm with very small training sets 22
Knowledge-Based Segmentation for the Identification of Pathologies in MR Images 22
One-and-a-half-class multiple classifier systems for secure learning against evasion attacks at test time 22
Robustness Analysis of Likelihood Ratio Score Fusion Rule for Multimodal Biometric Systems under Spoof Attacks 22
A multi-modal dataset, protocol and tools for adaptive biometric systems: A benchmarking study 22
Instance-based relevance feedback in image retrieval using dissimilarity spaces 22
Complexity of Data Subsets Generated by the Random Subspace Method: an Experimental Investigation 22
EEG personal recognition based on ‘qualified majority’ over signal patches 21
Detecting Anomalies from Video-Sequences: a Novel Descriptor 21
Towards quality assurance of software product lines with adversarial configurations 21
A survey and experimental evaluation of image spam filtering techniques 21
Neural shape codes for 3D model retrieval 21
Bayesian relevance feedback for content-based image retrieval 21
Adaptive query shifting for content-based image retrieval 20
Super-Sparse regression for fast age estimation from faces at test time 20
Face anti-spoofing via hybrid convolutional neural network 20
Information fusion for computer security: State of the art and open issues 20
Apprendimento Automatico di modelli per il Riconoscimento di Immagini 20
An approach to the automatic design of multiple classifier systems 19
Wild patterns: Ten years after the rise of adversarial machine learning half-day tutorial 19
Towards poisoning of deep learning algorithms with back-gradient optimization 19
Atti del Convegno su "Il Telerilevamento ed i Sistemi Informativi Territoriali nella Gestione delle Risorse Ambientali", Trento, Italia, 27 Ottobre 1994 19
Error rejection in linearly combined multiple classifiers 19
Adversarial biometric recognition: a review on biometric system security from the adversarial machine-learning perspective 19
Evasion attacks against machine learning at test time 18
Experimental Results on Multi-modal Deepfake Detection 18
A note on core research issues for statistical pattern recognition RID F-3169-2010 18
Fingerprint recognition with embedded presentation attacks detection: are we ready? 18
Adaptive appearance model tracking for still-to-video face recognition 18
Statistical and neural classifiers: an integrated approach to design (Advances in Pattern Recognition Series) 18
Fast image classification with reduced multiclass support vector machines 18
Exploiting Dissimilarity Representations for Person Re-identification 18
Practical Attacks on Machine Learning: A Case Study on Adversarial Windows Malware 17
Texture and artifact decomposition for improving generalization in deep-learning-based deepfake detection 17
Multiple Classifier Systems 17
A multi-stage approach for fast person re-identification 17
Analysis of Linear and Order Statistics Combiners for Fusion of Imbalanced Classifiers 17
Multisensor image recognition by neural networks with understandable behavior 17
Randomized Prediction Games for Adversarial Machine Learning 17
Designing multi-label classifiers that maximize F measures: State of the art 17
Dropout Injection at Test Time for Post Hoc Uncertainty Quantification in Neural Networks 16
Deltaphish: Detecting phishing webpages in compromised websites 16
Security evaluation of pattern classifiers under attack 16
Review of fingerprint presentation attack detection competitions 16
Design of robust classifiers for adversarial environments 16
Fusion of LDA and PCA for Face Recognition 15
Totale 3.168
Categoria #
all - tutte 43.369
article - articoli 20.798
book - libri 111
conference - conferenze 19.255
curatela - curatele 32
other - altro 896
patent - brevetti 0
selected - selezionate 0
volume - volumi 2.277
Totale 86.738


Totale Lug Ago Sett Ott Nov Dic Gen Feb Mar Apr Mag Giu
2019/2020227 0 0 0 0 0 39 43 21 29 48 38 9
2020/202168 3 12 3 2 8 7 0 5 8 8 5 7
2021/2022565 1 6 2 18 3 13 12 35 4 15 186 270
2022/2023858 135 34 24 63 109 140 3 53 166 6 101 24
2023/20241.181 42 82 14 106 84 163 166 138 66 62 52 206
2024/20251.682 66 506 77 97 679 257 0 0 0 0 0 0
Totale 5.032