Embedded systems are being deployed as a part of critical infrastructures and are vulnerable to malicious attacks due to internet accessibility. Intrusion detection systems have b...
Tao Zhang, Xiaotong Zhuang, Santosh Pande, Wenke L...
Object detection and tracking has various application areas including intelligent transportation systems. We introduce an object detection and tracking approach that combines the ...
This paper presents real-time reconstruction of dynamic 3D avatar for interactive mixed reality. In computer graphics, one of the main goals is the combination of virtual scenes w...
Sang Yup Lee, Ig-Jae Kim, Sang Chul Ahn, Heedong K...
We present a data-driven, unsupervised method for unusual
scene detection from static webcams. Such time-lapse
data is usually captured with very low or varying framerate.
This ...
Michael D. Breitenstein, Helmut Grabner, Luc Van G...
We present a novel algorithm for detection of certain types of unusual events. The algorithm is based on multiple local monitors which collect low-level statistics. Each local moni...
Amit Adam, Ehud Rivlin, Ilan Shimshoni, David Rein...