High assurance systems used in avionics, medical implants, and cryptographic devices often rely on a small trusted base of hardware and software to manage the rest of the system. ...
Mohit Tiwari, Jason Oberg, Xun Li 0001, Jonathan V...
Given the facial points extracted from an image of a face in an arbitrary pose, the goal of facial-point-based headpose normalization is to obtain the corresponding facial points ...
Since web applications are easily accessible, and often store a large amount of sensitive user information, they are a common target for attackers. In particular, attacks that foc...
Muath Alkhalaf, Shauvik Roy Choudhary, Mattia Fazz...
Abstract. Processing on encrypted data is a subject of rich investigation. Several new and exotic encryption schemes, supporting a diverse set of features, have been developed for ...
We present a shape-based algorithm for detecting and
recognizing non-rigid objects from natural images. The existing
literature in this domain often cannot model the objects
ver...
Xiang Bai, Xinggang Wang, Longin Jan Latecki, Weny...