Recent Microsoft security bulletins show that kernel vulnerabilities are becoming more and more important security threats. Despite the pretty extensive security mitigations many ...
We address the problem of multi-person tracking in a complex scene from a single camera. Although trackletassociation methods have shown impressive results in several challenging ...
Fingerprint scanners have unique patterns that can be used to distinguish one scanner from another one. The pattern, which we call scanner pattern, stems from the variability of d...
Consecutive corrupted MBs or slice errors are commonly seen in modern video transmission systems. Temporal error concealment is an effective approach to reduce the impact of error...
Hai Gao, Jo Yew Tham, Wei Siong Lee, Kwong Huang G...
This paper introduces a method of enhancing an unattended ground sensor (UGS) system’s classification capability of humans via seismic signatures while subsequently discriminati...