Export Citations
Save this search
Please login to be able to save your searches and receive alerts for new content matching your search criteria.
- research-articleNovember 2024
Using LLM Embeddings with Similarity Search for Botnet TLS Certificate Detection
AISec '24: Proceedings of the 2024 Workshop on Artificial Intelligence and SecurityPages 173–183https://doi.org/10.1145/3689932.3694766Modern botnets leverage TLS encryption to mask C&C server communications. TLS certificates used by botnets could exhibit subtle characteristics that facilitate detection. In this paper we investigate whether text features from TLS certificates can be ...
- ArticleJuly 2023
A Robust Machine Learning Protocol for Prediction of Prostate Cancer Survival at Multiple Time-Horizons
AbstractProstate cancer is one of the leading causes of cancer death in men in Western societies. Predicting patients’ survival using clinical descriptors is important for stratification in the risk classes and selecting appropriate treatment. Current ...
- research-articleJanuary 2022
Little data is often enough for distance-based outlier detection
Procedia Computer Science (PROCS), Volume 200, Issue CPages 984–992https://doi.org/10.1016/j.procs.2022.01.297AbstractMany real-world use cases benefit from fast training and prediction times, and much research went into speeding up distance-based outlier detection methods to millions of data points. Contrary to popular belief, our findings suggest that little ...
- research-articleJune 2020
Microwave Doppler Radar Sensing System for Vital Sign Detection: From Evaluated Accuracy Models to the Intelligent System
ICDAR '20: Proceedings of the 2020 ACM Workshop on Intelligent Cross-Data Analysis and RetrievalPages 3–8https://doi.org/10.1145/3379174.3392317The development of microwave radar vital sign sensing system brings many benefits to mankind. This system can be used to detect the location of living people buried under debris. Other important applications of microwave radar sensor are smart home, ...
- posterJune 2019
How Gullible Are You?: Predicting Susceptibility to Fake News
WebSci '19: Proceedings of the 10th ACM Conference on Web SciencePages 287–288https://doi.org/10.1145/3292522.3326055In this research, we hypothesize that some social users are more gullible to fake news than others, and accordingly investigate on the susceptibility of users to fake news--i.e., how to identify susceptible users, what are their characteristics, and if ...
-
- research-articleJune 2019
Recognizing User-Defined Subsequences in Human Motion Data
ICMR '19: Proceedings of the 2019 on International Conference on Multimedia RetrievalPages 395–398https://doi.org/10.1145/3323873.3326922Motion capture technologies digitize human movements by tracking 3D positions of specific skeleton joints in time. Such spatio-temporal multimedia data have an enormous application potential in many fields, ranging from computer animation, through ...
- research-articleOctober 2018
An Audio-Visual Method for Room Boundary Estimation and Material Recognition
AVSU'18: Proceedings of the 2018 Workshop on Audio-Visual Scene Understanding for Immersive MultimediaPages 3–9https://doi.org/10.1145/3264869.3264876In applications such as virtual and augmented reality, a plausible and coherent audio-visual reproduction can be achieved by deeply understanding the reference scene acoustics. This requires knowledge of the scene geometry and related materials. In this ...
- research-articleOctober 2018
Exploring Diversified Similarity with Kundaha
- Lucio F. D. Santos,
- Gustavo Blanco,
- Daniel de Oliveira,
- Agma J. M. Traina,
- Caetano Traina Jr.,
- Marcos V. N. Bedo
CIKM '18: Proceedings of the 27th ACM International Conference on Information and Knowledge ManagementPages 1903–1906https://doi.org/10.1145/3269206.3269220Exploring large medical image sets by means of traditional similarity query criteria (e.g., neighborhood) can be fruitless if retrieved images are too similar among themselves. This demonstration introduces Kundaha, an exploration tool that assists ...
- research-articleAugust 2017
Automatic Application Identification from Billions of Files
KDD '17: Proceedings of the 23rd ACM SIGKDD International Conference on Knowledge Discovery and Data MiningPages 2021–2030https://doi.org/10.1145/3097983.3098196Understanding how to group a set of binary files into the piece of software they belong to is highly desirable for software profiling, malware detection, or enterprise audits, among many other applications. Unfortunately, it is also extremely challenging:...
- research-articleMay 2017
Analyze NYC Transportation to Mitigate Speeding and Explore New Business Models Using Machine Learning
ICCDA '17: Proceedings of the International Conference on Compute and Data AnalysisPages 75–80https://doi.org/10.1145/3093241.3093291Many cities have been releasing their traffic data for companies to do the data analytics for business and other purposes. In this paper, we propose different classification models to analyze the places that most of vehicles speed and the places that ...
- research-articleSeptember 2016
Analysis of Parallel Architectures for Network Intrusion Detection
RIIT '16: Proceedings of the 5th Annual Conference on Research in Information TechnologyPages 7–12https://doi.org/10.1145/2978178.2978182Intrusion detection systems need to be both accurate and fast. Speed is important especially when operating at the network level. Additionally, many intrusion detection systems rely on signature based detection approaches. However, machine learning can ...
- demonstrationNovember 2014
Automatic Pronunciation Assistance on Video
PIVP '14: Proceedings of the 1st International Workshop on Perception Inspired Video ProcessingPages 37–38https://doi.org/10.1145/2662996.2663014In this article we present a novel method that uses image and speech processing techniques to analyze video from a second language learner and provides speaker's pronunciation training. The pronunciation recommendation provided for the speaker will be ...
- demonstrationNovember 2014
Clairvoyant: An Early Prediction System For Video Hits
CIKM '14: Proceedings of the 23rd ACM International Conference on Conference on Information and Knowledge ManagementPages 2054–2056https://doi.org/10.1145/2661829.2661847Our slogan for the proposed Clairvoyant system is "with several clicks, the future is in your hand, the plan comes into your mind". Clairvoyant is to predict the future of new videos with only few data. The core function in the system is the novel ...
- ArticleNovember 2012
Comparative analysis of clustering algorithms applied to the classification of bugs
ICONIP'12: Proceedings of the 19th international conference on Neural Information Processing - Volume Part VPages 592–598https://doi.org/10.1007/978-3-642-34500-5_70This paper presents a study of clustering algorithms in bug classification for a company from a database that contains a description each bug. It is made a comparison these algorithms using a sample of the database of this company. Considering that the ...
- posterOctober 2011
RW.KNN: a proposed random walk KNN algorithm for multi-label classification
PIKM '11: Proceedings of the 4th workshop on Workshop for Ph.D. students in information & knowledge managementPages 87–90https://doi.org/10.1145/2065003.2065022Multi-label classification refers to the problem that predicts each single instance to be one or more labels in a set of associated labels. It is common in many real-world applications such as text categorization, functional genomics and semantic scene ...
- ArticleNovember 2010
An improved KNN based outlier detection algorithm for large datasets
ADMA'10: Proceedings of the 6th international conference on Advanced data mining and applications: Part IPages 585–592Outlier detection is becoming a hot issue in the field of data mining since outliers often contain useful information. In this paper, we propose an improved KNN based outlier detection algorithm which is fulfilled through two stage clustering. ...
- research-articleOctober 2010
"Copy and scale" method for doing time-localized M.I.R. estimation:: application to beat-tracking
MML '10: Proceedings of 3rd international workshop on Machine learning and musicPages 1–4https://doi.org/10.1145/1878003.1878005In this work we propose a "copy and scale" method based on the 1-NN paradigm to estimate time-localized parameters and apply it to the problem of beat-tracking. The 1-NN algorithm consists in assigning the information of the closest item of a pre-...
- research-articleJune 2010
Boosting spatial pruning: on optimal pruning of MBRs
SIGMOD '10: Proceedings of the 2010 ACM SIGMOD International Conference on Management of dataPages 39–50https://doi.org/10.1145/1807167.1807174Fast query processing of complex objects, e.g. spatial or uncertain objects, depends on efficient spatial pruning of objects' approximations, which are typically minimum bounding rectangles (MBRs). In this paper, we propose a novel effective and ...
Secure kNN computation on encrypted databases
SIGMOD '09: Proceedings of the 2009 ACM SIGMOD International Conference on Management of dataPages 139–152https://doi.org/10.1145/1559845.1559862Service providers like Google and Amazon are moving into the SaaS (Software as a Service) business. They turn their huge infrastructure into a cloud-computing environment and aggressively recruit businesses to run applications on their platforms. To ...
- ArticleDecember 2008
KNN Based Outlier Detection Algorithm in Large Dataset
ETTANDGRS '08: Proceedings of the 2008 International Workshop on Education Technology and Training & 2008 International Workshop on Geoscience and Remote Sensing - Volume 01Pages 611–613https://doi.org/10.1109/ETTandGRS.2008.306An outlier is the object which is very different from the rest of the dataset on some measure. Finding such exception has received much attention in the data mining field. In this paper, we propose a KNN based outlier detection algorithm which is ...