In this paper we demonstrate that it is possible in general to detect Windows-based malicious program behavior. Since S. Forrest et al. used the N-grams method to classify system ...
Xin Tang, Constantine N. Manikopoulos, Sotirios G....
- It has been shown that in human-robot interaction, the effectiveness of a robot varies inversely with the operator engagement in the task. Given the importance of maintaining opt...
We present a new scheme to robustly detect a type of human attentive behavior, which we call frequent change in focus of attention (FCFA), from video sequences. FCFA behavior can b...
While it is widely understood that criminal miscreants are subverting large numbers of Internet-connected computers (e.g., for bots, spyware, SPAM forwarding), it is less well app...
In this paper we introduce a novel method to detect and
localize abnormal behaviors in crowd videos using Social
Force model. For this purpose, a grid of particles is placed
ove...