Zobrazeno 1 - 10
of 10
pro vyhledávání: '"Juston Moore"'
Publikováno v:
Algorithms, Technologies, and Applications for Multispectral and Hyperspectral Imaging XXVII.
In this work we utilize generative adversarial networks (GANs) to synthesize realistic transformations for remote sensing imagery in the multispectral domain. Despite the apparent perceptual realism of the transformed images at a first glance, we sho
Publikováno v:
ISI
As the attack surfaces of large enterprise networks grow, anomaly detection systems based on statistical user behavior analysis play a crucial role in identifying malicious activities. Previous work has shown that link prediction algorithms based on
Publikováno v:
AIPR
We compare the robustness of image classifiers based on state-of-the-art Deep Neural Networks (DNNs) with classifiers based on a model of cortical development using a single layer of sparse coding. The comparison is based on the ability of the two di
Autor:
Olena Tkachenko, Kurt B. Ferreira, Sean Blanchard, Elisabeth Baseman, Nathan DeBardeleben, Juston Moore, Vilas Sridharan, Taniya Siddiqua
Publikováno v:
DFT
As the scale of high performance computing facilities approaches the exascale era, gaining a detailed understanding of hardware failures becomes important. In particular, the extreme memory capacity of modern supercomputers means that data corruption
Publikováno v:
IEEE International Conference on Intelligence and Security Informatics
ISI
ISI
Anomaly detection systems are a promising tool to identify compromised user credentials and malicious insiders in enterprise networks. Most existing approaches for modelling user behaviour rely on either independent observations for each user or on p
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::0a0f92bffd83dc5188f72d3cb52b3cd2
http://hdl.handle.net/10044/1/42761
http://hdl.handle.net/10044/1/42761
Autor:
Brian Lynn, Brian Neil Levine, Janis Wolak, Marc Liberatore, George Bissias, Juston Moore, Hanna Wallach
Publikováno v:
Child abuseneglect. 52
We provide detailed measurement of the illegal trade in child exploitation material (CEM, also known as child pornography) from mid-2011 through 2014 on five popular peer-to-peer (P2P) file sharing networks. We characterize several observations: coun