Sciweavers

24 search results - page 1 / 5
» Understanding the security and robustness of SIFT
Sort
View
MM
2010
ACM
146views Multimedia» more  MM 2010»
14 years 10 months ago
Understanding the security and robustness of SIFT
Many content-based retrieval systems (CBIRS) describe images using the SIFT local features because of their very robust recognition capabilities. While SIFT features proved to cop...
Thanh-Toan Do, Ewa Kijak, Teddy Furon, Laurent Ams...
115
Voted
ACIVS
2006
Springer
15 years 2 months ago
Context-Based Scene Recognition Using Bayesian Networks with Scale-Invariant Feature Transform
Scene understanding is an important problem in intelligent robotics. Since visual information is uncertain due to several reasons, we need a novel method that has robustness to the...
Seung-Bin Im, Sung-Bae Cho
101
Voted
IMC
2009
ACM
15 years 4 months ago
ANTIDOTE: understanding and defending against poisoning of anomaly detectors
Statistical machine learning techniques have recently garnered increased popularity as a means to improve network design and security. For intrusion detection, such methods build ...
Benjamin I. P. Rubinstein, Blaine Nelson, Ling Hua...
110
Voted
CVIU
2010
429views more  CVIU 2010»
14 years 10 months ago
Cascade of descriptors to detect and track objects across any network of cameras
Most multi-camera systems assume a well structured environment to detect and track objects across cameras. Cameras need to be fixed and calibrated, or only objects within a traini...
Alexandre Alahi, Pierre Vandergheynst, Michel Bier...
78
Voted
MA
2001
Springer
98views Communications» more  MA 2001»
15 years 2 months ago
On the Robustness of Some Cryptographic Protocols for Mobile Agent Protection
Mobile agent security is still a young discipline and most naturally, the focus up to the time of writing was on inventing new cryptographic protocols for securing various aspects ...
Volker Roth