Malicious software in form of Internet worms, computer viruses, and Trojan horses poses a major threat to the security of networked systems. The diversity and amount of its variant...
Konrad Rieck, Thorsten Holz, Carsten Willems, Patr...
We propose a novel adaptive technique for detecting moving shadows and distinguishing them from moving objects in video sequences. Most methods for detecting shadows work in a stat...
Abstract. We present a novel approach to detect and classify rare behaviours which are visually subtle and occur sparsely in the presence of overwhelming typical behaviours. We tre...
Jian Li, Timothy M. Hospedales, Shaogang Gong, Tao...
We pose the recognition problem as data association. In this setting, a novel object is explained solely in terms of a small set of exemplar objects to which it is visually simila...
We describe a directed bilinear model that learns higherorder groupings among features of natural images. The model represents images in terms of two sets of latent variables: one...
Jack Culpepper, Jascha Sohl-Dickstein, Bruno Olaha...