Sciweavers

6318 search results - page 145 / 1264
» Data Leakage Detection
Sort
View
KDD
2012
ACM
205views Data Mining» more  KDD 2012»
13 years 7 months ago
Intrusion as (anti)social communication: characterization and detection
A reasonable definition of intrusion is: entering a community to which one does not belong. This suggests that in a network, intrusion attempts may be detected by looking for com...
Qi Ding, Natallia Katenka, Paul Barford, Eric D. K...
ISI
2007
Springer
15 years 11 months ago
Detecting Anomalies in Graphs
Graph data represents relationships, connections, or affinities. Innocent relationships produce repeated, and so common, substructures in graph data. We present techniques for dis...
David B. Skillicorn
135
Voted
IVC
2002
185views more  IVC 2002»
15 years 4 months ago
Path detection in video surveillance
This paper addresses the problem of automatically extracting frequently used pedestrian pathways from video sequences of natural outdoor scenes. Path models are learnt from the ac...
Dimitrios Makris, Tim Ellis
CVPR
2012
IEEE
13 years 7 months ago
Max-margin early event detectors
The need for early detection of temporal events from sequential data arises in a wide spectrum of applications ranging from human-robot interaction to video security. While tempor...
Minh Hoai Nguyen, Fernando De la Torre
ICMCS
2005
IEEE
90views Multimedia» more  ICMCS 2005»
15 years 10 months ago
Integrating co-training and recognition for text detection
Training a good text detector requires a large amount of labeled data, which can be very expensive to obtain. Cotraining has been shown to be a powerful semi-supervised learning t...
Wen Wu, Datong Chen, Jie Yang