Explore
Featured
Recent
Articles
Topics
Login
Upload
Featured
Recent
Articles
Topics
Login
Upload
Search Results for 'Detection-Based'
Detection-Based published presentations and documents on DocSlides.
Enhancing Security Using Mobile Based Anomaly Detection in Cellular Mobile Networks
by bitsy
Authors. Bo Sun, Fei Yu, Kui Wu, Yang Xiao, and Vi...
Building Survivable Systems based on Intrusion Detection an
by sherrill-nordquist
Paper by: T. Bowen. Presented by: Tiyseer Al Homa...
SAS Deep Learning Object Detection, Keypoint Detection
by udeline
Xindian. Long. 2018.09. Outline. Introduction. Ob...
ICP Detection Limits Detection Limit (DL) or
by paige
Limit of Detection (LOD). The detection limit is t...
Face Detection CSE 576 Face detection
by molly
State-of-the-art face detection demo. (Courtesy . ...
Pool Leak Detection Albuquerque
by Albuquerque
ABQ Leak Locator brings years of systems engineeri...
Leak Detection Albuquerque Nm
by Albuquerque
we have evolved the process and methodology of le...
Gradiometers for UXO Gradiometers for UXO Detection Detection Alan Cameron GSE Rentals Traditional Detection Traditional Detection Methods Methods Pulse Induced Metal Detector Towed Magnetometer Pu
by olivia-moreira
02nT Faster cycle rates Up to 10Hz Longer range de...
Anomaly detection of large scale distributed storage system based on machine learning
by violet
Institute of High Energy Physics, CAS. Wang Lu (Lu...
Using deep machine learning to conduct object-based identification and motion detection on safeguar
by daniella
Yonggang Cui. 1. , Zoe N. Gastelum. 2. , Ray Ren. ...
Anomaly Detection Lecture
by finley
14. . World-Leading Research with Real-World Impa...
Anomaly Detection Some slides taken or adapted from:
by catherine
“Anomaly Detection: A Tutorial”. Arindam. . B...
Danger Zone Detection Beyond the Mirrors
by yoshiko-marsland
Presenter: Dave McDonald. Rosco Vision Systems. A...
Real-Time RAT-based APT Detection
by tawny-fly
Our Focus. Victim. Attacker. Malicious. Web. Expl...
Trends in Circumventing Web-Malware Detection
by giovanna-bartolotta
UTSA. Moheeb Abu Rajab, Lucas Ballard, Nav Jagpal...
An Unbiased Distance-based Outlier Detection Approach for H
by test
DASFAA 2011. By. Hoang Vu Nguyen, . Vivekanand. ...
CS548 Spring 2015 Anomaly Detection Showcase
by danika-pritchard
Anomaly-based . Network Intrusion . Detection (A-...
Detection of Underground Utility Pole Base for Distribution Transmission Network Based on TEM Meth
by skylar
Hongfa. Ding, Zhou He, Xiao Fang, Dandi Zhang, . ...
Anomalous Database Transaction Detection
by iris
By. Harshith Reddy . Sarabudla. Anomaly detection ...
Self-Detection of Abnormal Event Sequences
by samantha
Project Lead: . Farokh. . Bastani. , I-Ling Yen, ...
Data Mining Anomaly/Outlier Detection
by cheryl-pisano
Lecture Notes for Chapter 10. Introduction to Dat...
Lecture 14 Intrusion Detection
by tatyana-admore
modified from slides of . Lawrie. Brown. Classes...
Traffic Signal Detection
by myesha-ticknor
Mahmoud. . Abdallah. Daniel . Eiland. The detect...
Object Detection based on Segment Masks
by ellena-manuel
Facebook AI Research. Wenchi. Ma. Data: 11/04/20...
Event Detection Using an Attention-Based Tracker
by olivia-moreira
22 . Outubro. 2007. . Universidade. Federal do...
Automatic Detection of Spamming and Phishing
by conchita-marotz
Kallol Dey. Rahul. . Mitra. Shubham. . Gautam. ...
Traffic Signal Detection
by danika-pritchard
Mahmoud. . Abdallah. Daniel . Eiland. The detect...
Radio Tomographic Imaging for Fall Detection
by kittie-lecroy
Cameron . Fleming, Daniel Lazar, Christine Weston...
Vision-Based Finger Detection
by sherrill-nordquist
and Its Applications. . 基於電腦視覺之手...
Intrusion Detection
by min-jolicoeur
Intruders. Classes (from [ANDE80]:. two most publ...
Event Detection Using an Attention-Based Tracker
by alida-meadow
Workshop on Performance Evaluation of Tracking Sy...
Multiple quadrilateral detection for projector-camera syste
by alexa-scheidler
applications. The 10th IEEE Conference on Industr...
Privacy-Preserving and Truthful Detection of Packet Droppin
by conchita-marotz
Abstract. Link error and malicious packet droppin...
On the Node Clone Detection
by kittie-lecroy
inWireless. Sensor Networks. Abstract. Wireless s...
Anomalous Payload Based Worm Detection
by yoshiko-marsland
Ke Wang, Gabriela Cretu, Salvatore Stolfo. Comput...
Software-Based Online Detection
by cheryl-pisano
of Hardware . Defects:. Mechanisms, Architectura....
Software-Based Online Detection
by lois-ondreau
of Hardware . Defects:. Mechanisms, Architectura....
Distance-Based Outlier Detection: Consolidation and Renewed
by karlyn-bohler
Gustavo Henrique Orair. Federal University of . ...
CMCD: Count Matrix based Code Clone Detection
by trish-goza
Yang Yuan and Yao . Guo. Key . Laboratory of High...
Distance-Based Outlier Detection: Consolidation and Renewed
by tatyana-admore
Gustavo Henrique Orair. Federal University of . ...
Load More...