Remote code-injection attacks are one of the most frequently used attacking vectors in computer security. To detect and analyze injected code (often called shellcode), some researc...
Abstract. This paper presents a new feature selection method and an outliers detection algorithm. The presented method is based on using a genetic algorithm combined with a problem...
- Pulse-coupled neural network (PCNN) is different from traditional artificial neural networks, which can be applied in many fields, such as image processing. A crucial step in dev...
We present a distributed vision-based surveillance system. The system acquires and processes grey level images through one or multiple Camera Units monitoring certain area(s) via ...
Xiaojing Yuan, Zehang Sun, Yaakov L. Varol, George...