Results 51 to 60 of about 4,892 (195)

Face anti‐spoofing from the perspective of data sampling

open access: yesElectronics Letters, 2023
Without deploying face anti‐spoofing countermeasures, face recognition systems can be spoofed by presenting a printed photo, a video, or a silicon mask of a genuine user.
Usman Muhammad, Mourad Oussalah
doaj   +1 more source

A Probability‐Aware AI Framework for Reliable Anti‐Jamming Communication

open access: yesCAAI Transactions on Intelligence Technology, Volume 11, Issue 2, Page 349-366, April 2026.
ABSTRACT Adversarial jamming attacks have increased on communication systems, causing distortion and threatening transmissions. Typical attacks rely on traditional, well‐defined cryptographic protocols and frequency‐hopping techniques. Nevertheless, these techniques become vulnerable when facing intelligent jammers.
Tawfeeq Shawly, Ahmed A. Alsheikhy
wiley   +1 more source

Face anti-spoofing with joint spoofing medium detection and eye blinking analysis [PDF]

open access: yesКомпьютерная оптика, 2019
Modern biometric systems based on face recognition demonstrate high recognition quality, but they are vulnerable to face presentation attacks, such as photo or replay attack.
Mikhail Nikitin   +2 more
doaj   +1 more source

A Study on Replay Attack and Anti-Spoofing for Automatic Speaker Verification

open access: yes, 2017
For practical automatic speaker verification (ASV) systems, replay attack poses a true risk. By replaying a pre-recorded speech signal of the genuine speaker, ASV systems tend to be easily fooled.
Chen, Yixiang   +3 more
core   +1 more source

MLDAS: Machine Learning Dynamic Algorithm Selection for Software‐Defined Networking Security

open access: yesConcurrency and Computation: Practice and Experience, Volume 38, Issue 5, March 2026.
ABSTRACT Network security is a critical concern in the digital landscape of today, with users demanding secure browsing experiences and protection of their personal data. This study explores the dynamic integration of Machine Learning (ML) algorithms with Software‐Defined Networking (SDN) controllers to enhance network security through adaptive ...
Pablo Benlloch   +3 more
wiley   +1 more source

Visible/Infrared face spoofing detection using texture descriptors [PDF]

open access: yesMATEC Web of Conferences, 2019
With extensive applications of face recognition technologies, face anti-spoofing played an important role and has drawn a great attention in the security systems. This study represents a multi-spectral face anti-spoofing method working with both visible (
Mohamed Shaimaa   +2 more
doaj   +1 more source

Data‐Based Detection of Antagonistic Agents in a Robot Swarm Solving a Dynamic Coverage Task

open access: yesInternational Journal of Mechanical System Dynamics, Volume 6, Issue 1, Page 22-32, March 2026.
ABSTRACT Robot swarms can be deployed as moving surveillance systems, for instance, as mobile anti‐poaching systems for monitoring wildlife and detecting poaching activities. Since poachers have an interest in evading detection, robots are at risk of being hijacked and manipulated to behave antagonistically, for example, to prevent the correct ...
Ingeborg Wenger   +2 more
wiley   +1 more source

Authentication of Satellite Navigation Signals by Wiretap Coding and Artificial Noise

open access: yes, 2018
In order to combat the spoofing of global navigation satellite system (GNSS) signals we propose a novel approach for satellite signal authentication based on information-theoretic security.
Formaggio, Francesco, Tomasin, Stefano
core   +1 more source

Materials and System Design for Self‐Decision Bioelectronic Systems

open access: yesAdvanced Materials, Volume 38, Issue 9, 12 February 2026.
This review highlights how self‐decision bioelectronic systems integrate sensing, computation, and therapy into autonomous, closed‐loop platforms that continuously monitor and treat diseases, marking a major step toward intelligent, self‐regulating healthcare technologies.
Qiankun Zeng   +9 more
wiley   +1 more source

LivDet in Action - Fingerprint Liveness Detection Competition 2019

open access: yes, 2019
The International Fingerprint liveness Detection Competition (LivDet) is an open and well-acknowledged meeting point of academies and private companies that deal with the problem of distinguishing images coming from reproductions of fingerprints made of ...
Bazzoni, Carlotta   +7 more
core   +1 more source

Home - About - Disclaimer - Privacy