Results 41 to 50 of about 4,892 (195)
Risk Assessment of Autonomous Vehicles Using Bayesian Defense Graphs
Recent developments have made autonomous vehicles (AVs) closer to hitting our roads. However, their security is still a major concern among drivers as well as manufacturers.
Behfarnia, Ali, Eslami, Ali
core +1 more source
Overview of satellite nav spoofing and anti-spoofing techniques
In recent years, satellite navigation systems have witnessed widespread adoption across diverse fields, including military surveillance, precision agriculture, traffic monitoring, resource exploration, and disaster assessment. However, navigation signals
Cheng Lu +8 more
doaj +1 more source
How far did we get in face spoofing detection?
The growing use of control access systems based on face recognition shed light over the need for even more accurate systems to detect face spoofing attacks.
Oliveira, Luciano +3 more
core +2 more sources
Audio-replay attack detection countermeasures
This paper presents the Speech Technology Center (STC) replay attack detection systems proposed for Automatic Speaker Verification Spoofing and Countermeasures Challenge 2017.
Kozlov, Alexander +5 more
core +1 more source
ABSTRACT Personal autonomous vehicles can sense their surrounding environment, plan their route, and drive with little or no involvement of human drivers. Despite the latest technological advancements and the hopeful announcements made by leading entrepreneurs, to date no personal vehicle is approved for road circulation in a “fully” or “semi ...
Xingshuai Dong +13 more
wiley +1 more source
Learning to Generate Posters of Scientific Papers
Researchers often summarize their work in the form of posters. Posters provide a coherent and efficient way to convey core ideas from scientific papers.
Fu, Yanwei +4 more
core +1 more source
Biometric presentation attack detection is gaining increasing attention. Users of mobile devices find it more convenient to unlock their smart applications with finger, face or iris recognition instead of passwords.
El-Din, Yomna Safaa +2 more
core +1 more source
Surveillance Face Anti-Spoofing
Face Anti-spoofing (FAS) is essential to secure face recognition systems from various physical attacks. However, recent research generally focuses on short-distance applications (i.e., phone unlocking) while lacking consideration of long-distance scenes (i.e., surveillance security checks). In order to promote relevant research and fill this gap in the
Hao Fang +7 more
openaire +3 more sources
On the Optimal Selection of Mel‐Frequency Cepstral Coefficients for Voice Deepfake Detection
ABSTRACT The continuous evolution of techniques for generating manipulated audio, known as voice deepfakes, and the widespread availability of tools that produce convincing forgeries have created an urgent need for reliable detection methods. This work considers the dimensionality of Mel‐Frequency Cepstral Coefficients (MFCCs) as a core design variable
Sergio A. Falcón‐López +3 more
wiley +1 more source
Currently, unsupervised anti-spoofing methods suffer from low accuracy and susceptibility to irrelevant factors. In order to solve these problems, this paper analyzes the contribution of different fingertip tissue structures to anti-spoofing tasks and ...
Zhanqing Li +4 more
doaj +1 more source

