Sciweavers

2327 search results - page 162 / 466
» Secure Image Filtering
Sort
View
ACSAC
2007
IEEE
15 years 4 months ago
Database Isolation and Filtering against Data Corruption Attacks
Various attacks (e.g., SQL injections) may corrupt data items in the database systems, which decreases the integrity level of the database. Intrusion detections systems are becomi...
Meng Yu, Wanyu Zang, Peng Liu
IWSEC
2007
Springer
15 years 4 months ago
Privacy-Preserving Eigentaste-Based Collaborative Filtering
With the evolution of e-commerce, privacy is becoming a major concern. Many e-companies employ collaborative filtering (CF) techniques to increase their sales by providing truthfu...
Ibrahim Yakut, Huseyin Polat
JCS
2010
135views more  JCS 2010»
14 years 9 months ago
New filtering approaches for phishing email
Phishing emails usually contain a message from a credible looking source requesting a user to click a link to a website where she/he is asked to enter a password or other confide...
André Bergholz, Jan De Beer, Sebastian Glah...
ERCIMDL
2000
Springer
246views Education» more  ERCIMDL 2000»
15 years 2 months ago
Automatic Web Rating: Filtering Obscene Content on the Web
We present a method to detect automatically pornographic content on the Web. Our method combines techniques from language engineering and image analysis within a machine-learning f...
Konstantinos Chandrinos, Ion Androutsopoulos, Geor...
ICCV
1995
IEEE
15 years 2 months ago
Steerable Wedge Filters
Steerable filters have been used to analyze local orientation patterns in imagery. Such filters are typically based on directional derivatives, whose symmetry produces orientati...
Eero P. Simoncelli, Hany Farid