Sciweavers

53 search results - page 10 / 11
» Manipulation Robustness of Collaborative Filtering
Sort
View
ICIP
2002
IEEE
14 years 9 months ago
Semi-fragile image authentication using generic wavelet domain features and ECC
In this paper we present a generic content-based solution targeting at authenticating image in a semi-fragile way, which integrates watermarking-based approach with signature-base...
Qibin Sun, Shih-Fu Chang
TIFS
2008
179views more  TIFS 2008»
13 years 7 months ago
Blind Identification of Source Cell-Phone Model
The various image-processing stages in a digital camera pipeline leave telltale footprints, which can be exploited as forensic signatures. These footprints consist of pixel defects...
Oya Çeliktutan, Bülent Sankur, Ismail ...
ML
2010
ACM
138views Machine Learning» more  ML 2010»
13 years 2 months ago
Mining adversarial patterns via regularized loss minimization
Traditional classification methods assume that the training and the test data arise from the same underlying distribution. However, in several adversarial settings, the test set is...
Wei Liu, Sanjay Chawla
CHI
2008
ACM
14 years 7 months ago
PeerChooser: visual interactive recommendation
Collaborative filtering (CF) has been successfully deployed over the years to compute predictions on items based on a user's correlation with a set of peers. The black-box na...
Barry Smyth, Brynjar Gretarsson, John O'Donovan, S...
CORR
2008
Springer
133views Education» more  CORR 2008»
13 years 7 months ago
Emergence of Spontaneous Order Through Neighborhood Formation in Peer-to-Peer Recommender Systems
The advent of the Semantic Web necessitates paradigm shifts away from centralized client/server architectures towards decentralization and peer-to-peer computation, making the exi...
Ernesto Diaz-Aviles, Lars Schmidt-Thieme, Cai-Nico...