Sciweavers

326 search results - page 29 / 66
» Testing malware detectors
Sort
View
PST
2008
13 years 10 months ago
Mimicry Attacks Demystified: What Can Attackers Do to Evade Detection?
Mimicry attacks have been the focus of detector research where the objective of the attacker is to generate an attack that evades detection while achieving the attacker's goa...
Hilmi Günes Kayacik, A. Nur Zincir-Heywood
TRECVID
2007
13 years 10 months ago
BUPT at TRECVID 2007: Shot Boundary Detection
In this paper we describe our methodologies and evaluation results for the shot boundary detection at TRECVID 2007. We submitted 10 runs results based on SVM classifiers and sever...
Zhi-Cheng Zhao, Xing Zeng, Tao Liu, An-Ni Cai
CVPR
2011
IEEE
13 years 5 months ago
Scalable Multi-class Object Detection
Scalability of object detectors with respect to the number of classes is a very important issue for applications where many object classes need to be detected. While combining sin...
Nima Razavi, Juergen Gall, Luc VanGool
BMVC
2010
13 years 4 months ago
Epipolar Constraints for Multiscale Matching
Many recent keypoint detectors associate a local scale (for multiscale detectors) or even a full affine frame (for affine-invariant detectors) to each detected keypoint. Although ...
Bill Triggs, Pashmina Bendale
ICIAR
2010
Springer
14 years 1 months ago
Adaptation of SIFT Features for Robust Face Recognition
Abstract. The Scale Invariant Feature Transform (SIFT) is an algorithm used to detect and describe scale-, translation- and rotation-invariant local features in images. The origina...
Janez Krizaj, Vitomir Struc, Nikola Pavesic