Sciweavers

ICASSP
2011
IEEE
12 years 8 months ago
An iterative strategy to approach corners using a new saliency measurement
In this paper we propose a novel corner detection algorithm using local adaptive thresholding and iterative approaching. First, a new metric is defined to measure the saliency of ...
Lihong Ma, Xingjun Tan, Jing Tian
ITIIS
2010
172views more  ITIIS 2010»
13 years 3 months ago
Combining Adaptive Filtering and IF Flows to Detect DDoS Attacks within a Router
Traffic matrix-based anomaly detection and DDoS attacks detection in networks are research focus in the network security and traffic measurement community. In this paper, firstly,...
Ruoyu Yan, Qinghua Zheng, Haifei Li
CONEXT
2008
ACM
13 years 6 months ago
Packet-dropping adversary identification for data plane security
Until recently, the design of packet dropping adversary identification protocols that are robust to both benign packet loss and malicious behavior has proven to be surprisingly el...
Xin Zhang, Abhishek Jain 0002, Adrian Perrig
INCDM
2010
Springer
159views Data Mining» more  INCDM 2010»
13 years 9 months ago
Semi-supervised Learning for False Alarm Reduction
Abstract. Intrusion Detection Systems (IDSs) which have been deployed in computer networks to detect a wide variety of attacks are suffering how to manage of a large number of tri...
Chien-Yi Chiu, Yuh-Jye Lee, Chien-Chung Chang, Wen...
CNSR
2006
IEEE
139views Communications» more  CNSR 2006»
13 years 11 months ago
Genetic Programming Based WiFi Data Link Layer Attack Detection
This paper presents a genetic programming based detection system for Data Link layer attacks on a WiFi network. We explore the use of two different fitness functions in order to ...
Patrick LaRoche, A. Nur Zincir-Heywood
IROS
2007
IEEE
162views Robotics» more  IROS 2007»
13 years 11 months ago
Genetic MRF model optimization for real-time victim detection in search and rescue
— One primary goal in rescue robotics is to deploy a team of robots for coordinated victim search after a disaster. This requires robots to perform subtasks, such as victim detec...
Alexander Kleiner, Rainer Kümmerle
IEEEARES
2008
IEEE
13 years 11 months ago
A Preliminary Investigation of Skype Traffic Classification Using a Minimalist Feature Set
In this work, AdaBoost and C4.5, are employed for classifying Skype direct (UDP and TCP) communications from traffic log files. Pre-processing is applied to the traffic data to ex...
Duffy Angevine, A. Nur Zincir-Heywood
ICPR
2008
IEEE
13 years 11 months ago
Human detection by searching in 3d space using camera and scene knowledge
Many existing human detection systems are based on sub-window classification, namely detection is done by enumerating rectangular sub-images in the 2D image space. Detection rate...
Yuan Li, Bo Wu, Ram Nevatia
ICPR
2002
IEEE
14 years 6 months ago
Integrated Approach of Multiple Face Detection for Video Surveillance
For applications such as video surveillance and human computer interface, we propose an efficiently integrated method to detect and track faces. Various visual cues are combined t...
Tae-Kyun Kim, Sung-Uk Lee, Jong Ha Lee, Seok-Cheol...
ICCV
1999
IEEE
14 years 7 months ago
Learning-based Object Detection in Cardiac MR Images
An automated method for left ventricle detection in MR cardiac images is presented. Ventricle detection is the rst step in a fully automated segmentation system used to compute vo...
Nicolae Duta, Anil K. Jain, Marie-Pierre Dubuisson...