Rootkits have become a growing concern in cyber-security. Typically, they exploit kernel vulnerabilities to gain root privileges of a system and conceal malware’s activities fro...
In order to reduce human efforts, there has been increasing interest in applying active learning for training text classifiers. This paper describes a straightforward active learni...
Zhao Xu, Kai Yu, Volker Tresp, Xiaowei Xu, Jizhi W...
When computer intrusions occur, one of the most costly, time-consuming, and human-intensive tasks is the analysis and recovery of the compromised system. At a time when the cost o...
Ashvin Goel, Wu-chang Feng, David Maier, Wu-chi Fe...
In this paper we extend a form of kernel ridge regression for data characterised by a heteroscedastic noise process (introduced in Foxall et al. [1]) in order to provide approxima...
Gavin C. Cawley, Nicola L. C. Talbot, Robert J. Fo...
—Recently, many object localization models have shown that incorporating contextual cues can greatly improve accuracy over using appearance features alone. Therefore, many of the...
Brian McFee, Carolina Galleguillos, Gert R. G. Lan...