Protecting the integrity of software platforms, especially in unmanaged consumer computing systems is a difficult problem. Attackers may attempt to execute buffer overflow attacks ...
Raghunathan Srinivasan, Vivek Iyer, Amit Kanitkar,...
In this paper, we suggest a neural network signal detector using radial basis function (RBF) network. We employ this RBF Neural detector to detect the presence or absence of a know...
Dilip Gopichand Khairnar, S. N. Merchant, Uday B. ...
Abstract. This paper proposes a novel method to detect Furon’s asymmetric watermark by using a correlation detector that is mathematically tractable and simple. The performance o...
We propose a two stage detector consisting of a Subspace Detector (SD) followed by the Whitened Adaptive Beamformer Orthogonal Rejection Test (W-ABORT). The performance analysis sh...
Francesco Bandiera, Olivier Besson, Danilo Orlando...
This paper evaluates the performance of several popular corner detectors using two newly defined criteria. The majority of authors of published corner detectors have not used theo...