The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
The rapid development of Internet attack has posed severe threats to information security. Therefore, it's of great interest to both the Internet security companies and researchers to develop novel methods which are capable of protecting users against new threats. However, the sources of these network attack varies. Existing malware detectors and intrusion detectors mostly treat the web logs separately...
Recent years, online social networks (OSNs) are facing increasingly serious Sybil attack, which results in unexpected terrible impacts on social network services with illegal behaviors as manipulating online votes, publishing large amount of annoying advertises, etc. To detect Sybil account among ordinary users, several attributes and behavioral characteristics based detection algorithms were proposed,...
Security issues of text watermarking are greatly different from those of other multimedia watermarking, in terms of its specific requirements and characteristics of text watermarking. The security theory of text watermarking is proposed in this paper, and the following security topics are discussed: (i) the classification and application of text watermarking; (ii) the classification and analysis of...
In this paper, an improved clustering algorithm based Ant-Tree is used for recognition of certain kind of architectural symbols with prior knowledge in engineering drawings. Symbols are segmented from an AutoCAD format drawing and a vector of invariants based on pseudo-Zernike moments is calculated to represent the graphical feature of a symbol. A normalization method is used to make these moments...
In this paper, a multi-texture-model for water extraction based on remote sensing imagery is proposed. The model is applied to extract inland water (including wide river, lake and reservoir) from high-resolution panchromatic images. Firstly directional variance is used to find river regions, and then grain table is adopted to avoid noise including objects that have similar directional variance characteristic...
In this paper, a complete procedure is proposed to analyze and classify the texture of an image based Bayesian network classifiers. We apply this procedure in the residential areas detection. A simple case of Bayesian network called naive Bayes classifier is used to learn the positive and negative samples and to infer about the unknown regions. In this paper, each texture feature vector is labeled...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.