Login / Signup
Identifying the applied obfuscation method towards de-obfuscation.
Hayato Sagisaka
Haruaki Tamada
Published in:
ICIS (2016)
Keyphrases
</>
preprocessing
high accuracy
theoretical analysis
experimental evaluation
main contribution
support vector machine svm
clustering method
high precision
optimization method
evaluation method
cost function
prior knowledge
probabilistic model
pairwise
model selection
face recognition
synthetic data
mathematical model