![Loading...](https://link.springer.com/static/c4a417b97a76cc2980e3c25e2271af3129e08bbe/images/pdf-preview/spacer.gif)
-
Article
Open AccessOptimizing Crowd Counting in Dense Environments Through Curriculum Learning Training Strategy
Counting individuals in highly crowded environments, characterized by thousands of people, has garnered significant attention in recent years, due to the high number of vertical markets wherein such algorithms...
-
Article
Open AccessIdentity, Gender, Age, and Emotion Recognition from Speaker Voice with Multi-task Deep Networks for Cognitive Robotics
This paper presents a study on the use of multi-task neural networks (MTNs) for voice-based soft biometrics recognition, e.g., gender, age, and emotion, in social robots. MTNs enable efficient analysis of audi...
-
Article
Open AccessDegramnet: effective audio analysis based on a fully learnable time–frequency representation
Current state-of-the-art audio analysis algorithms based on deep learning rely on hand-crafted Spectrogram-like audio representations, that are more compact than descriptors obtained from the raw waveform; the...
-
Article
Open AccessA deep learning based system for handwashing procedure evaluation
Hand washing preparation can be considered as one of the main strategies for reducing the risk of surgical site contamination and thus the infections risks. Within this context, in this paper we propose an emb...
-
Article
Open AccessFew-shot re-identification of the speaker by social robots
Nowadays advanced machine learning, computer vision, audio analysis and natural language understanding systems can be widely used for improving the perceptive and reasoning capabilities of the social robots. I...
-
Chapter and Conference Paper
Highly Crowd Detection and Counting Based on Curriculum Learning
Highly crowd counting is a rapidly growing field, driven by the increasing demand for accurate and real-time crowd monitoring. Within this context, in this paper we formulate the problem in terms of point dete...
-
Chapter
Machine Learning Methodologies for Preventing Malware Obfuscation
Malware is a serious threat in a world where IoT devices are becoming more and more pervasive; indeed, every day new and more sophisticated malware can rely on an attack surface that grows together with the nu...
-
Article
Open AccessEffective training of convolutional neural networks for age estimation based on knowledge distillation
Age estimation from face images can be profitably employed in several applications, ranging from digital signage to social robotics, from business intelligence to access control. Only in recent years, the adve...
-
Chapter and Conference Paper
A Robust and Efficient Overhead People Counting System for Retail Applications
Counting people with overhead cameras is a feature that is increasingly required by the retail market, for surveillance and business intelligence. However, despite the great advances in modern neural networks,...
-
Chapter and Conference Paper
Imitation Learning for Autonomous Vehicle Driving: How Does the Representation Matter?
Autonomous vehicle driving is gaining ground, by receiving increasing attention from the academic and industrial communities. Despite this considerable effort, there is a lack of a systematic and fair analysis...
-
Article
Open AccessGender recognition in the wild: a robustness evaluation over corrupted images
In the era of deep learning, the methods for gender recognition from face images achieve remarkable performance over most of the standard datasets. However, the common experimental analyses do not take into ac...
-
Article
DENet: a deep architecture for audio surveillance applications
In the last years, a big interest of both the scientific community and the market has been devoted to the design of audio surveillance systems, able to analyse the audio stream and to identify events of intere...
-
Chapter and Conference Paper
Performance Assessment of Face Analysis Algorithms with Occluded Faces
In retail environments, it is important to acquire information about customers entering in a selling area, by counting them, but also by understanding stable traits (such as gender, age, or ethnicity) and temp...
-
Article
An effective real time gender recognition system for smart cameras
In recent years we have assisted to a growing interest for embedded vision, due to the availability of low cost hardware systems, effective for energy consumption, flexible for their size at the cost of limite...
-
Article
An intelligent flying system for automatic detection of faults in photovoltaic plants
For several years, fault diagnosis of photovoltaic (PV) plants has been manually performed by the human operator by a visual inspection or automatically, by evaluating electrical measures collected by sensors ...
-
Chapter and Conference Paper
MIVIABot: A Cognitive Robot for Smart Museum
Cognitive robots are robots provided with artificial intelligence capabilities, able to properly interact with people and with the objects in an a priori unknown environment, using advanced artificial intellig...
-
Chapter and Conference Paper
Detecting Sounds of Interest in Roads with Deep Networks
Monitoring of public and private places is of great importance for security of people and is usually done by means of surveillance cameras
-
Chapter and Conference Paper
A Challenging Voice Dataset for Robotic Applications in Noisy Environments
Artificial Intelligence plays a fundamental role in the speech-based interaction between humans and machines in cognitive robotic systems. This is particularly true when dealing with very crowded environments,...
-
Chapter and Conference Paper
A System for Controlling How Carefully Surgeons Are Cleaning Their Hands
In this paper, we propose a method for the automatic compliance eva...
-
Chapter and Conference Paper
The VF3-Light Subgraph Isomorphism Algorithm: When Doing Less Is More Effective
We have recently intoduced VF3, a general-purpose subgraph isomorphism algorithm that has demonstrated to be very effective on several datasets, especially on very large and very dense graphs.