UM

Browse/Search Results:  1-9 of 9 Help

Selected(0)Clear Items/Page:    Sort:
Robust PCA Using Matrix Factorization for Background/Foreground Separation Journal article
IEEE ACCESS, 2018,Volume: 6,Page: 18945-18953
Authors:  Wang, Shuqin;  Wang, Yongli;  Chen, Yongyong;  Pan, Peng;  Sun, Zhipeng;  He, Guoping
Favorite  |  View/Download:93/0  |  Submit date:2018/10/30
Background/foreground separation  matrix factorization  robust PCA  
Detecting Unmetered Taxi Rides from Trajectory Data Conference paper
Authors:  Zhou, Xibo;  Ding, Ye;  Peng, Fengchao;  Luo, Qiong;  Ni, Lionel M.;  Nie, JY;  Obradovic, Z;  Suzumura, T;  Ghosh, R;  Nambiar, R;  Wang, C;  Zang, H;  BaezaYates, R;  Hu, X;  Kepner, J;  Cuzzocrea, A;  Tang, J;  Toyoda, M
Favorite  |  View/Download:9/0  |  Submit date:2018/10/30
taxi fraud detection  trajectory  anomaly detection  
Fuzzy clustering based traffic pattern identification Conference paper
2016 IEEE International Conference on Fuzzy Systems, FUZZ-IEEE 2016, Vancouver, CANADA, JUL 24-29, 2016
Authors:  Li T.;  Chen L.;  Chen C.L.P.
Favorite  |  View/Download:1/0  |  Submit date:2019/02/11
A thermodynamics-inspired feature for anomaly detection on crowd motions in surveillance videos Journal article
Multimedia Tools and Applications, 2016,Volume: 75,Issue: 14,Page: 8799-8826
Authors:  Xinfeng Zhang;  Su Yang;  Yuan Yan Tang;  Weishan Zhang
Favorite  |  View/Download:5/0  |  Submit date:2019/02/11
Abnormal Event Detection  Anomaly Detection  Boltzmann Entropy  Collective Behavior  Crowd  
A novel item anomaly detection approach against shilling attacks in collaborative recommendation systems using the dynamic time interval segmentation technique Journal article
Information Sciences, 2015,Volume: 306,Page: 150-165
Authors:  Xia H.;  Fang B.;  Gao M.;  Ma H.;  Tang Y.;  Wen J.
Favorite  |  View/Download:0/0  |  Submit date:2019/02/11
Anomaly detection  Personalized recommendation  Skewness  Stability  Time interval  
Cyber security and privacy issues in smart grids Journal article
IEEE Communications Surveys and Tutorials, 2012,Volume: 14,Issue: 4,Page: 981
Authors:  Liu J.;  Xiao Y.;  Li S.;  Liang W.;  Chen C.L.P.
View  |  Adobe PDF(1244Kb)  |  Favorite  |  View/Download:220/6  |  Submit date:2018/10/30
Accountability  Ami  Privacy  Scada  Security  Smart Grid  
Multi-way association clustering analysis on adaptive real-time multicast data Conference paper
Communications in Computer and Information Science, Univ Macau, Macau, PEOPLES R CHINA, JUL 11-13, 2011
Authors:  Sheneela Naz;  Sohail Asghar;  Simon Fong;  Amir Qayyum
Favorite  |  View/Download:3/0  |  Submit date:2019/02/13
Association Rules  Clustering  Network Security  Real-time Multicast  
Modeling and detection of Camouflaging Worm Journal article
IEEE Transactions on Dependable and Secure Computing, 2011,Volume: 8,Issue: 3,Page: 377
Authors:  Yu W.;  Wang X.;  Calyam P.;  Xuan D.;  Zhao W.
Favorite  |  View/Download:2/0  |  Submit date:2018/10/30
anomaly detection  camouflage  Worm  
Self-disciplinary worms and countermeasures: Modeling and analysis Journal article
IEEE Transactions on Parallel and Distributed Systems, 2010,Volume: 21,Issue: 10,Page: 1501
Authors:  Yu W.;  Zhang N.;  Fu X.;  Zhao W.
Favorite  |  View/Download:6/0  |  Submit date:2018/10/30
anomaly detection  game theory  Worm