— We present a hybrid data mining approach to detect malicious executables. In this approach we identify important features of the malicious and benign executables. These feature...
Mohammad M. Masud, Latifur Khan, Bhavani M. Thurai...
Mars probes send back to Earth enormous amount of data. Automating the analysis of this data and its interpretation represents a challenging test of significant benefit to the doma...
Tomasz F. Stepinski, Soumya Ghosh, Ricardo Vilalta
Table is a commonly used presentation scheme, especially for describing relational information. However, table understanding remains an open problem. In this paper, we consider th...
Spam e-mail with advertisement text embedded in images presents a great challenge to anti-spam filters. In this paper, we present a fast method to detect image-based spam e-mail. U...
Analyzing human gait has become popular in computer vision. So far, however, contributions to this topic almost exclusively considered the problem of person identification. In th...
Christian Bauckhage, John K. Tsotsos, Frank E. Bun...