Results 21 to 30 of about 4,892 (195)
An autonomous GNSS anti-spoofing technique [PDF]
open3siIn recent years, the problem of Position, Navigation and Timing (PNT) resiliency has received significant attention due to an increasing awareness on threats and the vulnerability of the current GNSS signals.
Christian Wullems +2 more
core +1 more source
Automatic speaker verification (ASV) is an emerging biometric verification technique with more and more applications. However, both verification accuracy and anti-spoofing should be considered carefully before putting ASV into practice, where anti ...
Jiakang Li +3 more
doaj +1 more source
GNSS Spoofing Suppression Based on Multi-Satellite and Multi-Channel Array Processing
The endless spoofing interference affects the credibility of the navigation system seriously. In order to suppress the forward spoofing which is more threatening to military signals in GNSS, this paper proposes a spoofing suppression algorithm based on ...
Shaojie Ni +6 more
doaj +1 more source
A GPS Spoofing Generator Using an Open Sourced Vector Tracking-Based Receiver
Spoofing can seriously threaten the use of the Global Positioning System (GPS) in critical applications such as positioning and navigation of autonomous vehicles.
Qian Meng +4 more
doaj +1 more source
NovAtel has recently leveraged its expertise in both receiver design and anti-jam technology to develop solutions for space- and weight-constrained applications in challenged GNSS environments.
Ali Broumandan, Sandy Kennedy
doaj +1 more source
New threat to global transport. GNSS Receiver Spoofing [PDF]
Transport and logistics in XXI century relies on the several technical systems for assuring safe and reliable operations. One of widely used systems are satellite positioning systems, used to monitoring transport means and cargo itself.
Maciej Gucma
doaj +1 more source
Self-Attention and MLP Auxiliary Convolution for Face Anti-Spoofing
Face features, as the most widely adopted and essential biometric characteristic in identity verification and recognition, play a crucial role in ensuring security.
Hanqing Gu +4 more
doaj +1 more source
As a structural interference, spoofing is difficult to detect by the target receiver while the advent of a repeater makes the implementation of spoofing much easier.
Yanbing Guo, Lingjuan Miao, Xi Zhang
doaj +1 more source
GPS Spoofing Detection Method for Small UAVs Using 1D Convolution Neural Network
The navigation of small unmanned aerial vehicles (UAVs), such as quadcopters, significantly relies on the global positioning system (GPS); however, UAVs are vulnerable to GPS spoofing attacks.
Young-Hwa Sung +3 more
doaj +1 more source
The GPS Assimilator: a Method for Upgrading Existing GPS User Equipment to Improve Accuracy, Robustness, and Resistance to Spoofing [PDF]
Preprint of the 2010 ION GNSS Conference Portland, OR, September 21–24, 2010A conceptual method is presented for upgrading existing GPS user equipment, without requiring hardware or software modifications to the equipment, to improve the equipment’s ...
Bhatti, Jahshan +2 more
core +2 more sources

