Detection

Results: 16932



#Item
431

authors, title Elaheh Raisi and Bert Huang. Cyberbullying Detection with Weakly Supervised Machine  Xiaowei Chen and John Lui. A Unified Framework to Estimate Global and Local Graphlet Counts 

Add to Reading List

Source URL: asonam.cpsc.ucalgary.ca

- Date: 2017-06-10 08:04:02
    432

    MUSE™ MANAGED CYBER SECURITY INNOVATION PINPOINT THREAT DETECTION REAL-TIME ATTACK MITIGATION

    Add to Reading List

    Source URL: www.ecitele.com

    - Date: 2018-01-02 03:42:11
      433

      Online Deception Detection Refueled by Real World Data Collection Wenlin Yao, Zeyu Dai, Ruihong Huang, James Caverlee Department of Computer Science and Engineering Texas A&M University {wenlinyao, jzdaizeyu, huangrh, ca

      Add to Reading List

      Source URL: faculty.cse.tamu.edu

      - Date: 2017-08-02 14:38:32
        434

        Inverted Residuals and Linear Bottlenecks: Mobile Networks for Classification, Detection and Segmentation arXiv:1801.04381v2 [cs.CV] 16 JanMark Sandler

        Add to Reading List

        Source URL: arxiv.org

        - Date: 2018-04-03 20:08:55
          435

          Web Browser History Detection as a Real-World Privacy Threat Artur Janc1 and Lukasz Olejnik2 ,

          Add to Reading List

          Source URL: lukaszolejnik.com

          - Date: 2016-01-15 12:38:22
            436

            TURNITIN.COM AT OU The University of Oklahoma subscribes to the digital plagiarism detection service Turnitin.com. Faculty users have found the program and its generated originality reports to be

            Add to Reading List

            Source URL: integrity.ou.edu

            - Date: 2017-09-18 09:21:43
              437

              Describing the Scene as a Whole: Joint Object Detection, Scene Classification and Semantic Segmentation Jian Yao TTI Chicago Sanja Fidler

              Add to Reading List

              Source URL: ttic.uchicago.edu

              - Date: 2012-07-10 14:29:21
                438

                Fenror7 reduces the average internal threat detection time from months to hours Network based solution By using a game changing approach to lateral movement detection, Fenror7 provides near

                Add to Reading List

                Source URL: www.fenror7.com

                - Date: 2018-03-27 15:40:46
                  439

                  The iNaturalist Species Classification and Detection Dataset - Supplementary Material Grant Van Horn1 Oisin Mac Aodha1 Alex Shepard4 Hartwig Adam2 1

                  Add to Reading List

                  Source URL: vision.cornell.edu

                  - Date: 2018-03-28 14:41:29
                    440

                    Cross-domain gender detection in Twitter? Mohsen Sayyadiharikandeh1?? , Giovanni Luca Ciampaglia2 , and Alessandro Flammini1,2 1 Indiana University, School of Informatics and Computing,

                    Add to Reading List

                    Source URL: glciampaglia.com

                    - Date: 2018-03-31 17:50:14
                      UPDATE