Detection of an anomalous cluster in a network
E Arias-Castro, EJ Candes, A Durand - The Annals of Statistics, 2011 - JSTOR
We consider the problem of detecting whether or not, in a given sensor network, there is a
cluster of sensors which exhibit an" unusual behavior." Formally, suppose we are given a set …
cluster of sensors which exhibit an" unusual behavior." Formally, suppose we are given a set …
A 3D teacher for car detection in aerial images
S Kluckner, G Pacher, H Grabner… - 2007 IEEE 11th …, 2007 - ieeexplore.ieee.org
This paper demonstrates how to reduce the hand labeling effort considerably by 3D
information in an object detection task. In particular, we demonstrate how an efficient car …
information in an object detection task. In particular, we demonstrate how an efficient car …
Exact asymptotics for the scan statistic and fast alternatives
J Sharpnack, E Arias-Castro - 2016 - projecteuclid.org
We consider the problem of detecting a rectangle of activation in a grid of sensors in d-
dimensions with noisy measurements. This has applications to massive surveillance …
dimensions with noisy measurements. This has applications to massive surveillance …
Σ-Δ Background Subtraction and the Zipf Law
A Manzanera - Progress in Pattern Recognition, Image Analysis and …, 2007 - Springer
The Σ-Δ background estimation is a simple non linear method of background subtraction
based on comparison and elementary increment/decrement. We propose here some …
based on comparison and elementary increment/decrement. We propose here some …
Use of power law models in detecting region of interest
Y Caron, P Makris, N Vincent - Pattern recognition, 2007 - Elsevier
In this paper, we shall address the issue of semantic extraction of different regions of
interest. The proposed approach is based on statistical methods and models inspired from …
interest. The proposed approach is based on statistical methods and models inspired from …
Color anomaly detection and suggestion for wilderness search and rescue
BS Morse, D Thornton, MA Goodrich - … of the seventh annual ACM/IEEE …, 2012 - dl.acm.org
In wilderness search and rescue, objects not native or typical to a scene may provide clues
that indicate the recent presence of the missing person. This paper presents the results of …
that indicate the recent presence of the missing person. This paper presents the results of …
A new feature extraction scheme in wavelet transform for stego image classification
In steganalysis, there exist a good number of feature extraction techniques; the most
commonly used feature extraction technique is based on the Discrete Wavelet Transform …
commonly used feature extraction technique is based on the Discrete Wavelet Transform …
The power laws: Zipf and inverse Zipf for automated segmentation and classification of masses within mammograms
Breast cancer is becoming the leading form of cancer among women worldwide, indeed,
there are no effective ways to prevent this disease at present, therefore, it's early screening …
there are no effective ways to prevent this disease at present, therefore, it's early screening …
Multiscale scanning with nuisance parameters
We develop a multiscale scanning method to find anomalies in ad-dimensional random field
in the presence of nuisance parameters. This covers the common situation that either the …
in the presence of nuisance parameters. This covers the common situation that either the …
Recovering block-structured activations using compressive measurements
We consider the problems of detection and localization of a contiguous block of weak
activation in a large matrix, from a small number of noisy, possibly adaptive, compressive …
activation in a large matrix, from a small number of noisy, possibly adaptive, compressive …