HEVC double compression detection under different bitrates based on TU partition type
HEVC double compression detection under different bitrates based on TU partition type During the process of authenticating the integrity of digital videos, double compression is an important evidence. High-efficiency video…
Efficient single image dehazing by modifying the dark channel prior
Efficient single image dehazing by modifying the dark channel prior Outdoor images can be degraded due to the particles in the air that absorb and scatter light. The produced degradation…
Estimation of gait normality index based on point clouds through deep auto-encoder
Estimation of gait normality index based on point clouds through deep auto-encoder This paper proposes a method estimating an index that indicates human gait normality based on a sequence of…
A novel camera path planning algorithm for real-time video stabilization
A novel camera path planning algorithm for real-time video stabilization In video stabilization, a steady camera path plan is as important as accurate camera motion prediction. While several camera path…
Reconstruction for block-based compressive sensing of image with reweighted double sparse constraint
Reconstruction for block-based compressive sensing of image with reweighted double sparse constraint Block compressive sensing reduces the computational complexity by dividing the image into multiple patches for processing, but the…
Searching for safety: crime prevention in the era of Google
Searching for safety: crime prevention in the era of Google This research investigated the association between Internet searches and property crime levels in the United States. States with the highest…
Automatically identifying the function and intent of posts in underground forums
Automatically identifying the function and intent of posts in underground forums The automatic classification of posts from hacking-related online forums is of potential value for the understanding of user behaviour…
Correction to: Towards a ‘smart’ cost–benefit tool: using machine learning to predict the costs of criminal justice policy interventions
Correction to: Towards a ‘smart’ cost–benefit tool: using machine learning to predict the costs of criminal justice policy interventions The original version of the article contained an error in the…
To the moon: defining and detecting cryptocurrency pump-and-dumps
To the moon: defining and detecting cryptocurrency pump-and-dumps Pump-and-dump schemes are fraudulent price manipulations through the spread of misinformation and have been around in economic settings since at least the…
Under and over the surface: a comparison of the use of leaked account credentials in the Dark and Surface Web
Under and over the surface: a comparison of the use of leaked account credentials in the Dark and Surface Web The world has seen a dramatic increase in cybercrime, in…
Don’t shoot the messenger! A criminological and computer science perspective on coordinated vulnerability disclosure
Don’t shoot the messenger! A criminological and computer science perspective on coordinated vulnerability disclosure In the computer science field coordinated vulnerability disclosure is a well-known practice for finding flaws in…
Hate is in the air! But where? Introducing an algorithm to detect hate speech in digital microenvironments
Hate is in the air! But where? Introducing an algorithm to detect hate speech in digital microenvironments With the objective of facilitating and reducing analysis tasks undergone by law enforcement…