asteroza + detection   227

Helping autonomous vehicles see around corners | MIT News
More like understanding shadows as a precursor of objects behind blind corners
autonomous  vehicle  navigation  shadow  detection  blind  corner  predicition  dep  machine  learning  vision 
18 days ago by asteroza
News < News > KAIST
Using smartphone mics to detect object (properties) for object recognition
microphone  gyro  object  detection  smartphone  app  software 
6 weeks ago by asteroza
iBorderCtrl? No! | iBorderCtrl.no
So the EU is considering a highly invasive border control scheme for Schengen access, likely resulting in an app visitors need to download to their phone. Also an "AI" interview, using the high quality of phone camera to monitor facial flushing/bloodflow/heartbeat detection to do some lie detection during the "interview" with the avatar.
EU  europe  border  control  schengen  access  AI  avatar  interview  lie  detection  smartphone  app 
march 2019 by asteroza
Computational periscopy with an ordinary digital camera | Nature
pinspeck inverse camera obscura can show what an image is based on the shadows it sends
computational  photography  hidden  image  detection  camera 
february 2019 by asteroza
Yandex.Images: search for images on the internet, search by image
Yandex image search is surprisingly powerful, with unreal facial recognition matching, and place detection even when using OC
OSINT  Yandex  image  search  reverse  facial  recognition  mapping  recon  location  detection 
december 2018 by asteroza
emailprivacytester.com/
test your client to see how much it leaks. Notably, that google will fetch gmail images on access, so access IP is hidden, but access (thus meta data) itself is not...
email  privacy  leakage  check  test  service  tracker  detection 
december 2018 by asteroza
Hypersurfaces
Using a vibration sensor SoC with custom neural nets loaded for the specific surface it is paired to, you can turn a object/surface into a touchscreen of sorts. Notable is the NN is pretrained and loaded onto the SoC, so touch detection is done offline.
deep  machine  learning  vibration  detection  model  touch  interface  HCI  UI  hypersurface  surface  sensor  HID  hardware  electronics  devices 
november 2018 by asteroza
Ball Aerospace - OAWL- wind LIDAR
New compact wind LIDAR with long range, which in theory would allow a high altitude balloon to detect favorable wind directions and change altitude to maneuver, becoming effectively stationary.
wind  detection  LIDAR  DARPA  high  altitude  maneuvering  geostationary  stratellite  balloon 
november 2018 by asteroza
Facial recognition used to analyze students' classroom behaviors - People's Daily Online
So, if this was genuinely detecting disinterest and confusion emotions, then this would be a effective means of improving education methods and teacher styles via direct feedback, but since this is also being used for surveillance as well...
china  AI  facial  expression  machine  computer  vision  emotion  detection  recognition  education  learning  school  management  surveillance 
may 2018 by asteroza
hegusung/AVSignSeek: Tool written in python3 to determine where the AV signature is located in a binary/payload
Tool to sniff out exactly where in a zip file antivirus is pattern matching, which can be useful to do some bit twiddling to evade detection
antivirus  signature  range  detection  script  python  security  hacking  pentesting 
may 2018 by asteroza
Technology - Project VIC
PhotoDNA lives here, but the core image fuzzy hashing algorithm code isn't open source?
PhotoDNA  fuzzy  hashing  picture  image  photo  duplicate  detection 
april 2018 by asteroza
iqdb
So some imageboard sites use this for near-dupe detection, though not as powerful as PhotoDNA in practice?
opensource  software  image  comparison  fuzzy  hashing  duplicate  detection  picture  photo 
april 2018 by asteroza
Web Application and User protection | Sqreen
Trying to run stuff in the browser to detect if human
WAF  browser  DDoS  security  script  human  detection 
march 2018 by asteroza
stealth/7350natter: Middle box checker
Simple tool to compare traceroute ICMP TTL's with TCP connects. Substantial variation/latency would likely indicate something is interfering.
middlebox  interception  detection  hacking  security  pentesting  opensource  software  DPI 
march 2018 by asteroza
Reveal - Image Verification Assistant
Note facebook and twitter do some image recompression/tweaking so you may get false positives from images hosted there
image  picture  photo  tampering  detection  EXIF  metadata  analysis 
january 2018 by asteroza
Reveal - Image Verification Assistant
Note facebook and twitter do some image recompression/tweaking so you may get false positives from images hosted there
image  picture  photo  tampering  detection  EXIF  metadata  analysis 
january 2018 by asteroza
« earlier      
per page:    204080120160

related tags

2.0  2G  3D  3G  802.11  access  accesspoint  account  accountability  accuracy  Acidus  acoustic  action  active  activism  AD  addon  address  agent  AI  ajax  alarm  alert  alexa  algorithm  alteration  alternative  altitude  amazon  analysis  analytics  android  anemia  annotation  anomaly  anonwhois  anonwhois.org  anonymity  anonymous  antenna  anti-face-detection  antiantivirus  antidebugging  antiforensics  antikeylogger  antispam  antispyware  antisurveillance  antivirus  AP  API  app  appliance  application  APT  AR  arm  armband  array  art  articles  artifact  asterisk  asteroid  Astrium  astroturfing  ATA  attack  audio  audit  auditing  auto  autoencoder  automated  automation  autonomous  autorun  avatar  avoidance  azure  badge  balloon  bandwidth  BASE  based  bayesian  beacon  bed  behavioral  behvior  benchmark  BHTG  bilirubin  biology  biometric  biometrics  biomimicry  blacklist  BLDC  blind  block  blocking  blueteam  bluetooth  boobytrap  border  botnet  BR  brick  bricking  Bro  browser  BrowserHawk  BrowserHawkToGo  brushless  bug  BurpSuite  bypass  call  CAM  camera  camoflage  camouflage  canary  canarytoken  cancer  capture  card  cat  catcher  CATT  CCTV  cell  cellphone  Celluon  certificate  change  channel  chat  check  checker  chemistry  china  chip  ClamAV  classification  client  clock  cloud  cloudflare  CMOS  CMS  color  commodification  communication  communications  comparison  compression  compromise  computational  computer  computing  configuration  connection  constellation  content  contraction  control  controller  convergence  conversation  cookie  copy  corner  corruption  counter  counterfeit  counterfeiting  counterintelligence  countersurveillance  coverage  CPU  crawler  credential  credit  CRM  crowdsourcing  CrowdStrike  cryptography  crystal  currency  customization  CV  CVdazzle  CVE  daemons  DAF  Damballa  DARPA  data  dazzle  DC  DDoS  deauthorization  debian  debugger  debugging  deep  defense  deflection  delete  Delicious  Dell  demo  density  dep  detection  detector  development  device  devices  DFIR  diagnostics  diff  differential  Digimarc  digital  directory  discourse  disinformation  disk  distance  distributed  distro  DLL  DLP  DLR  DNS  domain  DOUBLEPULSAR  download  DPI  drive  driven  driver  dumping  duplicate  dynamic  earth  echospatial  EDR  EDS  education  EEPROM  EFF  egress  elastic  electric  electronics  ELSA  email  emerging  emotion  empire  emulator  encapsulation  encryption  endpoint  engine  environment  EPS  error  ESNA  EsnaTech  etch  ethernet  EU  EURion  europe  evaluation  evasion  event  evoMouse  exchange  executable  exfiltration  EXIF  exploit  expression  extension  external  extrusion  eye  face  facial  failed  fake  far  fashion  fature  feature  field  file  filetype:pdf  film  filter  finance  FinFisher  finger  fingernail  fingerprint  fingerprinting  firewall  firmware  fitting  fixed  flash  floor  FMC  foam  follower  forensic  forensics  fovea  framework  fraud  free  frequency  frontend  FTDI  fuel  fuzzer  fuzzing  fuzzy  gamma  Garuda  gateway  geiger  geolocation  georgiatech  geostationary  gesture  github  glass  glasshole  google  GPS  GPU  graphics  growl  GSM  guide  gwt  gyro  hack  hacking  HackingTeam  hand  handler  handsfree  hard  hardware  hashing  HCI  header  headphone  health  HID  hidden  HIDS  high  HIPS  HLBR  Hogwash  hole  holographic  honeytoken  hook  host  hostbased  howto  html  HTTP  HTTPS  human  humor  hunting  hypersurface  hypothes.is  ID  IDS  illusion  IM  image  IME  implant  IMSI  incident  inductance  information  infosec  injection  insertion  inspection  install  instant  instrument  integration  intel  intelligence  intensity  interaction  intercept  interception  interface  internet  interview  intrusion  investigation  invisible  IoC  iOS  IP  IP-PBX  iPhone  ipoque  ipp2p  IPPBX  IPS  iptables  IR  jammer  japan  java  javascript  journalism  jpeg  jpegqualtiy  JPG  jQuery  Judge  kali  kerberos  kernel  keyboard  kittydar  LAC  LAN  language  laser  lateral  launcher  laundering  layout  leak  leakage  learning  level  library  LIDAR  LIDS  lie  light  link  linux  list  listeningpost  live  local  localization  location  locator  log  logging  logic  login  logon  longe  loss  low  lowtech  mac  machine  macro  magnet  magnetic  magnetoreception  makeup  maltego  malware  management  maneuvering  manipulation  mapping  marketing  materials  mbira  ME  media  media:document  medicine  memory  message  metadata  metasploit  meterpreter  Method  methods  mic  microphone  microscope  microsoft  microsot  middlebox  military  misdirection  MIT  MitM  mobile  mode  model  moderation  module  money  monitor  monitoring  motion  moultitouch  mouse  movement  movie  MPEG  multi  muscle  musical  Myo  MySQL  name  NAT  navigation  NEO  NEOshield  netflow  network  networking  NetworkMiner  neural  news  NIDS  Niels  NLP  NMS  noise  NSA  obfuscation  object  OCR  office  Office-LinX  OMCD  online  Open  opencv  opensource  OPSEC  optical  organization  OS  OSINT  OSSEC  OSX  outlier  p2p  PAC  packer  packet  palm  PAM  pam_abl  pancreatic  parameter  passive  passport  password  path  pattern  payload  PCI  PCIe  peak  peer  penetration  pensource  pentest  pentesting  perception  performance  permanent  persistent  phased  phishing  photo  PhotoDNA  photography  photonic  photoshop  picture  pipeline  platform  plugin  PoC  police  polymorphic  position  posture  power  powershell  predator  predicition  presence  prevention  privacy  probabilistic  process  processing  profiling  programming  proof-of-concept  propaganda  protection  protest  Provos  proximity  proxy  psychology  public  pump  python  PyTorch  QoS  query  radar  radiation  rails  range  ranging  ransomware  RCS  reading  realtime  recognition  recon  recovery  redteam  reference  registration  registry  remote  reognition  reporting  request  research  reset  resonance  response  reverse  review  RF  rogue  rootkit  RoR  rotor  router  ruby  rule  ruleset  SaaS  sample  scan  scanner  scanning  schengen  school  science  sclera  Scrawlr  script  scripting  SDR  search  secure  security  seeder  self  selfie  sense  sensor  sensorless  sentiment  sentinel  SENTINEL.DLL  SentryGun  serial  server  service  services  setup  sflow  Sguil  shadertoy  shadow  shaping  shared  sidechannel  SIEM  sigma  signature  site  size  skew  skimmer  skype  sleep  smartphone  Snorby  snort  social  sociometric  softbank  software  sound  sourcecode  space  spam  spambot  specific  speech  speed  spherical  splunk  spoofer  spoofing  spray  SQL  Squert  SS7  ssh  SSL  stack  stacktrace  stalking  start  startup  static  statistical  steganography  stegbreak  stingray  stitching  Stochastic  stratellite  streaming  supercookie  sureveillance  surface  Suricata  surveillance  SwitchVox  sysadmin  system  talos  tampering  tap  Tebocam  technique  Technologies  technology  temperature  tensorflow  test  tester  testing  text  theft  thin  THOR  threat  time  time-of-flight  timestamp  timing  tips  TLD  TLS  token  toolkits  tools  top  tor  touch  tower  trace  TrackEngine  tracker  tracking  traffic  transaction  transform  translation  traversal  triangulation  tricks  trigger  tripwire  TTL  tunnel  tunneler  tutorial  twitter  typosquatting  uART  ubuntu  UI  UID  unicorn  unified  union  unusual  update  URL  usage  USB  user  username  utilities  utilties  UTM  UX  vagrant  variable  VBA  vehicle  vein  vendor  version  vibration  video  virtual  virtualization  virus  vision  visualization  VM  VMware  voice  VoIP  volatility  voltage  volume  vsentinel  vulnerability  WAF  wallpaper  watermark  waveform  wavelength  WDATP  wearable  web  webcam  webdev  webGL  webpage  webshell  website  WEF  WEFFLES  whitebox  whois  wideband  wifi  wind  windows  WinHTTP  WinInet  winpatrol  wireless  wlan  WMI  XDR  XOR  Xplico  xray  Yandex  YARA  YAWCAM  YOLO  Zozzle 

Copy this bookmark:



description:


tags: