Sciweavers

271 search results - page 37 / 55
» Automatic analysis of malware behavior using machine learnin...
Sort
View
EXPERT
2010
145views more  EXPERT 2010»
13 years 6 months ago
Interaction Analysis with a Bayesian Trajectory Model
Human behavior recognition is one of the most important and challenging objectives performed by intelligent vision systems. Several issues must be faced in this domain ranging fro...
Alessio Dore, Carlo S. Regazzoni
ICASSP
2009
IEEE
14 years 3 months ago
Cultural style based music classification of audio signals
Music classification based on cultural style is useful for music analysis and has potential applications in retrieval and recommendation systems. In this paper, we present the fir...
Yuxiang Liu, Qiaoliang Xiang, Ye Wang, Lianhong Ca...
RAID
2009
Springer
14 years 3 months ago
Protecting a Moving Target: Addressing Web Application Concept Drift
Because of the ad hoc nature of web applications, intrusion detection systems that leverage machine learning techniques are particularly well-suited for protecting websites. The re...
Federico Maggi, William K. Robertson, Christopher ...
GECCO
2008
Springer
261views Optimization» more  GECCO 2008»
13 years 10 months ago
SSNNS -: a suite of tools to explore spiking neural networks
We are interested in engineering smart machines that enable backtracking of emergent behaviors. Our SSNNS simulator consists of hand-picked tools to explore spiking neural network...
Heike Sichtig, J. David Schaffer, Craig B. Laramee
ACCV
2010
Springer
13 years 5 months ago
Stream-based Active Unusual Event Detection
We present a new active learning approach to incorporate human feedback for on-line unusual event detection. In contrast to most existing unsupervised methods that perform passiv...
Chen Change Loy, Tao Xiang, Shaogang Gong