Sciweavers

65 search results - page 2 / 13
» Multiple Classifier Systems under Attack
Sort
View
GLOBECOM
2009
IEEE
13 years 11 months ago
Detecting Identity Spoofs in IEEE 802.11e Wireless Networks
Abstract--Wireless networks are vulnerable to identity spoofing attacks, where an attacker can forge the MAC address of his wireless device to assume the identity of another victim...
Gayathri Chandrasekaran, John-Austen Francisco, Vi...
IEEEHPCS
2010
13 years 6 months ago
An efficient method for face recognition under illumination variations
An efficient method for face recognition which is robust under illumination variations is proposed. The proposed method achieves the illumination invariants based on the reflectan...
A. Nabatchian, E. Abdel-Raheem, M. Ahmadi
ISCC
2006
IEEE
127views Communications» more  ISCC 2006»
14 years 1 months ago
Aggregating Distributed Sensor Data for Network Intrusion Detection
Distributed network intrusion detection systems which incorporate tens, hundreds, even thousands, of sensors are becoming increasing popular. Managing and presenting the informati...
John C. McEachen, Cheng Kah Wai, Vonda L. Olsavsky
KDD
2002
ACM
164views Data Mining» more  KDD 2002»
14 years 7 months ago
Meta-classification: Combining Multimodal Classifiers
Combining multiple classifiers is of particular interest in multimedia applications. Each modality in multimedia data can be analyzed individually, and combining multiple pieces of...
Wei-Hao Lin, Alexander G. Hauptmann
ICC
2008
IEEE
118views Communications» more  ICC 2008»
14 years 1 months ago
A Principal Components Analysis-Based Robust DDoS Defense System
—One of the major threats to cyber security is the Distributed Denial-of-Service (DDoS) attack. In our previous projects, PacketScore, ALPi, and other statistical filtering-based...
Huizhong Sun, Yan Zhaung, H. Jonathan Chao