Detection of an anomalous cluster in a network

E Arias-Castro, EJ Candes, A Durand - The Annals of Statistics, 2011 - JSTOR
We consider the problem of detecting whether or not, in a given sensor network, there is a
cluster of sensors which exhibit an" unusual behavior." Formally, suppose we are given a set …

A 3D teacher for car detection in aerial images

S Kluckner, G Pacher, H Grabner… - 2007 IEEE 11th …, 2007 - ieeexplore.ieee.org
This paper demonstrates how to reduce the hand labeling effort considerably by 3D
information in an object detection task. In particular, we demonstrate how an efficient car …

Exact asymptotics for the scan statistic and fast alternatives

J Sharpnack, E Arias-Castro - 2016 - projecteuclid.org
We consider the problem of detecting a rectangle of activation in a grid of sensors in d-
dimensions with noisy measurements. This has applications to massive surveillance …

Σ-Δ Background Subtraction and the Zipf Law

A Manzanera - Progress in Pattern Recognition, Image Analysis and …, 2007 - Springer
The Σ-Δ background estimation is a simple non linear method of background subtraction
based on comparison and elementary increment/decrement. We propose here some …

Use of power law models in detecting region of interest

Y Caron, P Makris, N Vincent - Pattern recognition, 2007 - Elsevier
In this paper, we shall address the issue of semantic extraction of different regions of
interest. The proposed approach is based on statistical methods and models inspired from …

Color anomaly detection and suggestion for wilderness search and rescue

BS Morse, D Thornton, MA Goodrich - … of the seventh annual ACM/IEEE …, 2012 - dl.acm.org
In wilderness search and rescue, objects not native or typical to a scene may provide clues
that indicate the recent presence of the missing person. This paper presents the results of …

A new feature extraction scheme in wavelet transform for stego image classification

L Laimeche, HF Merouani, S Mazouzi - Evolving Systems, 2018 - Springer
In steganalysis, there exist a good number of feature extraction techniques; the most
commonly used feature extraction technique is based on the Discrete Wavelet Transform …

The power laws: Zipf and inverse Zipf for automated segmentation and classification of masses within mammograms

M Hamoud, HF Merouani, L Laimeche - Evolving systems, 2015 - Springer
Breast cancer is becoming the leading form of cancer among women worldwide, indeed,
there are no effective ways to prevent this disease at present, therefore, it's early screening …

Multiscale scanning with nuisance parameters

C König, A Munk, F Werner - Journal of the Royal Statistical …, 2024 - academic.oup.com
We develop a multiscale scanning method to find anomalies in ad-dimensional random field
in the presence of nuisance parameters. This covers the common situation that either the …

Recovering block-structured activations using compressive measurements

S Balakrishnan, M Kolar, A Rinaldo, A Singh - arXiv preprint arXiv …, 2012 - arxiv.org
We consider the problems of detection and localization of a contiguous block of weak
activation in a large matrix, from a small number of noisy, possibly adaptive, compressive …