Sciweavers

24 search results - page 1 / 5
» Understanding the security and robustness of SIFT
Sort
View
MM
2010
ACM
146views Multimedia» more  MM 2010»
13 years 6 months ago
Understanding the security and robustness of SIFT
Many content-based retrieval systems (CBIRS) describe images using the SIFT local features because of their very robust recognition capabilities. While SIFT features proved to cop...
Thanh-Toan Do, Ewa Kijak, Teddy Furon, Laurent Ams...
ACIVS
2006
Springer
13 years 10 months ago
Context-Based Scene Recognition Using Bayesian Networks with Scale-Invariant Feature Transform
Scene understanding is an important problem in intelligent robotics. Since visual information is uncertain due to several reasons, we need a novel method that has robustness to the...
Seung-Bin Im, Sung-Bae Cho
IMC
2009
ACM
14 years 23 days ago
ANTIDOTE: understanding and defending against poisoning of anomaly detectors
Statistical machine learning techniques have recently garnered increased popularity as a means to improve network design and security. For intrusion detection, such methods build ...
Benjamin I. P. Rubinstein, Blaine Nelson, Ling Hua...
CVIU
2010
429views more  CVIU 2010»
13 years 6 months ago
Cascade of descriptors to detect and track objects across any network of cameras
Most multi-camera systems assume a well structured environment to detect and track objects across cameras. Cameras need to be fixed and calibrated, or only objects within a traini...
Alexandre Alahi, Pierre Vandergheynst, Michel Bier...
MA
2001
Springer
98views Communications» more  MA 2001»
13 years 10 months ago
On the Robustness of Some Cryptographic Protocols for Mobile Agent Protection
Mobile agent security is still a young discipline and most naturally, the focus up to the time of writing was on inventing new cryptographic protocols for securing various aspects ...
Volker Roth