Sciweavers

24 search results - page 1 / 5
» Understanding the security and robustness of SIFT
Sort
View
MM
2010
ACM
146views Multimedia» more  MM 2010»
13 years 4 months ago
Understanding the security and robustness of SIFT
Many content-based retrieval systems (CBIRS) describe images using the SIFT local features because of their very robust recognition capabilities. While SIFT features proved to cop...
Thanh-Toan Do, Ewa Kijak, Teddy Furon, Laurent Ams...
ACIVS
2006
Springer
13 years 8 months ago
Context-Based Scene Recognition Using Bayesian Networks with Scale-Invariant Feature Transform
Scene understanding is an important problem in intelligent robotics. Since visual information is uncertain due to several reasons, we need a novel method that has robustness to the...
Seung-Bin Im, Sung-Bae Cho
IMC
2009
ACM
13 years 11 months ago
ANTIDOTE: understanding and defending against poisoning of anomaly detectors
Statistical machine learning techniques have recently garnered increased popularity as a means to improve network design and security. For intrusion detection, such methods build ...
Benjamin I. P. Rubinstein, Blaine Nelson, Ling Hua...
CVIU
2010
429views more  CVIU 2010»
13 years 4 months ago
Cascade of descriptors to detect and track objects across any network of cameras
Most multi-camera systems assume a well structured environment to detect and track objects across cameras. Cameras need to be fixed and calibrated, or only objects within a traini...
Alexandre Alahi, Pierre Vandergheynst, Michel Bier...
MA
2001
Springer
98views Communications» more  MA 2001»
13 years 9 months ago
On the Robustness of Some Cryptographic Protocols for Mobile Agent Protection
Mobile agent security is still a young discipline and most naturally, the focus up to the time of writing was on inventing new cryptographic protocols for securing various aspects ...
Volker Roth