David Slater

Orcid: 0000-0003-1809-5661

According to our database1, David Slater authored at least 36 papers between 1990 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
Synthetic Medical Imaging Generation with Generative Adversarial Networks For Plain Radiographs.
CoRR, 2024

2023
Using Evolutionary Model Discovery to Develop Robust Policies.
Proceedings of the Winter Simulation Conference, 2023

Benchmarking the Effect of Poisoning Defenses on the Security and Bias of Deep Learning Models.
Proceedings of the 2023 IEEE Security and Privacy Workshops (SPW), 2023

2021
Beacon-Based Remote Measurement of Social Behavior in ASD Clinical Trials: A Technical Feasibility Assessment.
Sensors, 2021

2019
Logical Segmentation of Source Code.
Proceedings of the 31st International Conference on Software Engineering and Knowledge Engineering, 2019

A Convolutional Neural Network for Language-Agnostic Source Code Summarization.
Proceedings of the 14th International Conference on Evaluation of Novel Approaches to Software Engineering, 2019

Robust keystroke transcription from the acoustic side-channel.
Proceedings of the 35th Annual Computer Security Applications Conference, 2019

2018
Simultaneous estimation of population receptive field and hemodynamic parameters from single point BOLD responses using Metropolis-Hastings sampling.
NeuroImage, 2018

A language-agnostic model for semantic source code labeling.
Proceedings of the 1st International Workshop on Machine Learning and Software Engineering in Symbiosis, 2018

2015
Malicious Behavior Detection using Windows Audit Logs.
Proceedings of the 8th ACM Workshop on Artificial Intelligence and Security, 2015

2013
Connectomic approaches before the connectome.
NeuroImage, 2013

2009
Evaluating the Vulnerability of Network Traffic Using Joint Security and Routing Analysis.
IEEE Trans. Dependable Secur. Comput., 2009

Tradeoffs between jamming resilience and communication efficiency in key establishment.
ACM SIGMOBILE Mob. Comput. Commun. Rev., 2009

A coding-theoretic approach for efficient message verification over insecure channels.
Proceedings of the Second ACM Conference on Wireless Network Security, 2009

2008
Linear programming models for jamming attacks on network traffic flows.
Proceedings of the 6th International Symposium on Modeling and Optimization in Mobile, 2008

Throughput optimization for multipath unicast routing under probabilistic jamming.
Proceedings of the IEEE 19th International Symposium on Personal, 2008

Vulnerability of Network Traffic under Node Capture Attacks Using Circuit Theoretic Analysis.
Proceedings of the INFOCOM 2008. 27th IEEE International Conference on Computer Communications, 2008

2001
The impact of viewing geometry on material discriminability in hyperspectral images.
IEEE Trans. Geosci. Remote. Sens., 2001

The Impact of Viewing Geometry on Vision Through the Atmosphere.
Proceedings of the Eighth International Conference On Computer Vision (ICCV-01), Vancouver, British Columbia, Canada, July 7-14, 2001, 2001

Physics-based Model Acquisition and Identification in Airborne Spectral Images.
Proceedings of the Eighth International Conference On Computer Vision (ICCV-01), Vancouver, British Columbia, Canada, July 7-14, 2001, 2001

1999
Models and methods for automated material identification in hyperspectral imagery acquired under unknown illumination and atmospheric conditions.
IEEE Trans. Geosci. Remote. Sens., 1999

Material Classification for 3D Objects in Aerial Hyperspectral Images.
Proceedings of the 1999 Conference on Computer Vision and Pattern Recognition (CVPR '99), 1999

Invariant Recognition in Hyperspectral Images.
Proceedings of the 1999 Conference on Computer Vision and Pattern Recognition (CVPR '99), 1999

1998
A novel use of color computer vision methods for the quantification of neurons in 3-D brain tissue samples.
Proceedings of the IEEE International Conference on Systems, Man and Cybernetics, 1998

What is the Spectral Dimensionality of Illumination Functions in Outdoor Scenes?
Proceedings of the 1998 Conference on Computer Vision and Pattern Recognition (CVPR '98), 1998

1997
Computing illumination-invariant descriptors of spatially filtered color image regions.
IEEE Trans. Image Process., 1997

The Illumination-Invariant Matching of Deterministic Local Structure in Color Images.
IEEE Trans. Pattern Anal. Mach. Intell., 1997

Object recognition using invariant profiles.
Proceedings of the 1997 Conference on Computer Vision and Pattern Recognition (CVPR '97), 1997

1996
The Illumination-Invariant Recognition of 3D Objects Using Local Color Invariants.
IEEE Trans. Pattern Anal. Mach. Intell., 1996

A machine vision system for the automated classification and counting of neurons in 3-D brain tissue samples.
Proceedings of ThirdIEEE Workshop on Applications of Computer Vision, 1996

Using a spectral reflectance model for the illumination-invariant recognition of local image structure.
Proceedings of the 1996 Conference on Computer Vision and Pattern Recognition (CVPR '96), 1996

1995
Illumination-Invariant Recognition of Local Color Distributions using Linear Models for Spectral Reflectance.
Proceedings of the 3rd Color and Imaging Conference, 1995

Combining Color and Geometric Information for the Illumination Invariant Recognition of 3D Objects.
Proceedings of the Procedings of the Fifth International Conference on Computer Vision (ICCV 95), 1995

1994
Using illumination invariant descriptors for recognition.
Proceedings of the Conference on Computer Vision and Pattern Recognition, 1994

1993
A system for real-time fire detection.
Proceedings of the Conference on Computer Vision and Pattern Recognition, 1993

1990
Measures for maintenance management: A case study.
J. Softw. Maintenance Res. Pract., 1990


  Loading...