: In this paper, we present algorithms for subgroup detection and demonstrated them with a real-time case study of USS Cole bombing terrorist network. The algorithms are demonstrat...
Nasrullah Memon, Uffe Kock Wiil, Abdul Rasool Qure...
Abstract—Vehicular Ad Hoc Network (VANET) can offer various services and benefits to users and thus deserves deployment effort. Attacking and misusing such network could cause d...
Jinyuan Sun, Chi Zhang, Yanchao Zhang, Yuguang Fan...
Data protection legislation was originally defined for a context where personal information is mostly stored on centralized servers with limited connectivity or openness to 3rd pa...
Tattoo images on human body have been routinely collected and used in law enforcement to assist in suspect and victim identification. However, the current practice of matching tat...
Anil K. Jain, Jung-Eun Lee, Rong Jin, Nicholas Gre...
Automatic face photo-sketch recognition has important applications to law enforcement. Recent research has focused on transforming photos and sketches into the same modality for m...