![Loading...](https://link.springer.com/static/c4a417b97a76cc2980e3c25e2271af3129e08bbe/images/pdf-preview/spacer.gif)
-
Chapter and Conference Paper
Shape Prior is Not All You Need: Discovering Balance Between Texture and Shape Bias in CNN
As Convolutional Neural Network (CNN) trained under ImageNet is known to be biased in image texture rather than object shapes, recent works proposed that elevating shape awareness of the CNNs makes them simila...
-
Chapter and Conference Paper
Don’t Wait Until the Accident Happens: Few-Shot Classification Framework for Car Accident Inspection in a Real World
Car accident inspection is a binary classification task to recognize whether a given car image includes a damaged surface or not. While the prior studies utilized various computer vision algorithms under the f...
-
Chapter and Conference Paper
Unsupervised Driver Behavior Profiling Leveraging Recurrent Neural Networks
In the era of intelligent transportation, driver behavior profiling has become a beneficial technology as it provides knowledge regarding the driver’s aggressiveness. Previous approaches achieved promising dri...
-
Chapter and Conference Paper
Unsupervised Intrusion Detection System for Unmanned Aerial Vehicle with Less Labeling Effort
Along with the importance of safety, an IDS has become a significant task in the real world. Prior studies proposed various intrusion detection models for the UAV. Past rule-based approaches provided a concret...
-
Chapter and Conference Paper
Show Me Your Account: Detecting MMORPG Game Bot Leveraging Financial Analysis with LSTM
With the rapid growth of MMORPG market, game bot detection has become an essential task for maintaining stable in-game ecosystem. To classify bots from normal users, detection methods are proposed in both game...
-
Chapter and Conference Paper
A Multi-protocol Baseband Modem Processor for a Mobile RFID Reader
In RFID (Radio Frequency IDentification) systems, a tag reader communicates with tags, reads their identification codes, and accesses their related database through network infrastructure. There are many resea...