Zobrazeno 1 - 10
of 22
pro vyhledávání: '"Biswas, Rubel"'
Autor:
Biswas, Rubel, Blanco-Medina, Pablo
Working with Child Sexual Exploitation Material (CSEM) in forensic applications might be benefited from the progress in automatic face recognition. However, discriminative parts of a face in CSEM, i.e., mostly the eyes, could be often occluded to dif
Externí odkaz:
http://arxiv.org/abs/2108.11821
Autor:
Biswas, Rubel, Blanco-Medina, Pablo
Perceptual image hashing methods are often applied in various objectives, such as image retrieval, finding duplicate or near-duplicate images, and finding similar images from large-scale image content. The main challenge in image hashing techniques i
Externí odkaz:
http://arxiv.org/abs/2108.11794
Autor:
Biswas, Rubel, Vasco-Carofilis, Roberto A., Fernandez, Eduardo Fidalgo, Martino, Francisco Jáñez, Medina, Pablo Blanco
The Tor darknet hosts different types of illegal content, which are monitored by cybersecurity agencies. However, manually classifying Tor content can be slow and error-prone. To support this task, we introduce Frequency-Dominant Neighborhood Structu
Externí odkaz:
http://arxiv.org/abs/2005.10090
Publikováno v:
In Image and Vision Computing September 2021 113
Publikováno v:
In Neurocomputing 28 March 2020 383:24-38
Autor:
Biswas, Rubel
192 p. Esta Tesis presenta nuevos métodos de reconocimiento de rostros para ayudar a las Fuerzas y Cuerpos de Seguridad del Estado (FCSE) a luchar contra la ciberdelincuencia.
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::ce8bcda677d17c4816f08ac2a769f5b2
https://doi.org/10.18002/10612/15046
https://doi.org/10.18002/10612/15046
Autor:
Biswas, Rubel, Chaves, Deisy, Jáñez-Martino, Francisco, Blanco-Medina, Pablo, Fidalgo, Eduardo, García-Olalla, Carlos, Azzopardi, George
Several image-based approaches for estimating the age of a person are available in computer vision literature. However, most of them perform poorly on minors and young adults, especially when the eyes are occluded. This type of occlusion is common in
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=od______1811::84a3256dd02eef80dcebe6539b9961e4
http://hdl.handle.net/10578/28631
http://hdl.handle.net/10578/28631
Publikováno v:
RUC. Repositorio da Universidade da Coruña
instname
instname
[Abstract] Identifying key content from a video is essential for many security applications such as motion/action detection, person re-identification and recognition. Moreover, summarizing the key information from Child Sexual Exploitation Materials,
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::ab0b96074de19b8ee6ba33bcbf3ff351
https://hdl.handle.net/2183/28353
https://hdl.handle.net/2183/28353
Publikováno v:
International Journal of Electrical & Computer Engineering (2088-8708); Oct2017, Vol. 7 Issue 5, p2530-2536, 7p
Publikováno v:
16th International Conference Computer & Information Technology; 2014, p338-344, 7p