Context Exploitation in Intelligence, Surveillance, and Reconnaissance for Detection Algorithms | IEEE Conference Publication | IEEE Xplore