Recent research has identified significant vulnerabilities in recommender systems. Shilling attacks, in which attackers introduce biased ratings in order to influence future recom...
Sheng Zhang, Amit Chakrabarti, James Ford, Fillia ...
—This paper presents a new method for extracting object edges from range images obtained by a 3D range imaging sensor⎯the SwissRanger SR-3000. In range image preprocessing stag...
Anomaly detection in multivariate time series is an important data mining task with applications to ecosystem modeling, network traffic monitoring, medical diagnosis, and other d...
Christopher Potter, Haibin Cheng, Pang-Ning Tan, S...
— This paper proposes how to detect water level from a video signal for use of automatic river surveillance. The water level is recognized as a boundary line between the land reg...
Discovering non-trivial matching subsequences from two time series is very useful in synthesizing novel time series. This can be applied to applications such as motion synthesis wh...