Information & computer science publications
-
BLADE: An Attack-Agnostic Approach for Preventing Drive-By Malware Infections
The BLADE (Block All Drive-by download Exploits) system asserts that all executable files delivered through browser downloads must result from explicit user consent and transparently redirects every unconsented browser download…
-
First Incoherent Scatter Radar Observations of Ionospheric Heatingon the Second Electron Gyro-Harmonic
We report first results from a unique experiment performed at the HIPAS ionospheric modification facility in conjunction with the Poker Flat incoherent scatter radar in Alaska.
-
Active Botnet Probing to Identify Obscure Command and Control Channels
We consider the problem of identifying obscure chat-like botnet command and control (C & C) communications, which are indistinguishable from human-human communication using traditional signature-based techniques.
-
Gaussian Process Learning for Cyber-Attack Early Warning
We present a framework to estimate the relevance of each network with respect to each network. In particular, we model each attacker's relevance as a function over the networks.
-
Recognition and Volume Estimation of Food Intake Using a Mobile Device
We present a system that improves accuracy of food intake assessment using computer vision techniques.
-
Inside Risks: Reflections on Conficker
An insider's view of the analysis and implications of the Conficker conundrum.
-
Pedestrian Detection with Depth-Guided Structure Labeling
We propose a principled statistical approach for using 3D information and scene context to reduce the number of false positives in stereo based pedestrian detection.
-
Monocular Structure from Motion for Near to Long Ranges
This paper describes a sensing system for estimating range and detecting the shape of objects from a few meters to a few kilometers away.
-
An anticorrelation kernel for subsystem training in multiple classifier systems
We present a method for training support vector machine (SVM)-based classification systems for combination with other classification systems designed for the same task.
-
Document Logic: Risk Analysis of Business Processes Through Document Authenticity
Document Logic is a simple yet powerful framework to infer risks in business processes.
-
Action Exemplar Based Real-Time Action Detection
We propose a real-time action detection system based on a novel action representation and an effective learning method with a small training set. We represent actions with a new feature…
-
Real-Time Vehicle Detection for Highway Driving
We present a new multi-stage algorithm for car and truck detection from a moving vehicle. The algorithm performs a search for pertinent features in three dimensions, guided by a ground…