Face anti‐spoofing from the perspective of data sampling
Without deploying face anti‐spoofing countermeasures, face recognition systems can be spoofed by presenting a printed photo, a video, or a silicon mask of a genuine user.
Usman Muhammad, Mourad Oussalah
doaj +1 more source
A Probability‐Aware AI Framework for Reliable Anti‐Jamming Communication
ABSTRACT Adversarial jamming attacks have increased on communication systems, causing distortion and threatening transmissions. Typical attacks rely on traditional, well‐defined cryptographic protocols and frequency‐hopping techniques. Nevertheless, these techniques become vulnerable when facing intelligent jammers.
Tawfeeq Shawly, Ahmed A. Alsheikhy
wiley +1 more source
Face anti-spoofing with joint spoofing medium detection and eye blinking analysis [PDF]
Modern biometric systems based on face recognition demonstrate high recognition quality, but they are vulnerable to face presentation attacks, such as photo or replay attack.
Mikhail Nikitin +2 more
doaj +1 more source
A Study on Replay Attack and Anti-Spoofing for Automatic Speaker Verification
For practical automatic speaker verification (ASV) systems, replay attack poses a true risk. By replaying a pre-recorded speech signal of the genuine speaker, ASV systems tend to be easily fooled.
Chen, Yixiang +3 more
core +1 more source
MLDAS: Machine Learning Dynamic Algorithm Selection for Software‐Defined Networking Security
ABSTRACT Network security is a critical concern in the digital landscape of today, with users demanding secure browsing experiences and protection of their personal data. This study explores the dynamic integration of Machine Learning (ML) algorithms with Software‐Defined Networking (SDN) controllers to enhance network security through adaptive ...
Pablo Benlloch +3 more
wiley +1 more source
Visible/Infrared face spoofing detection using texture descriptors [PDF]
With extensive applications of face recognition technologies, face anti-spoofing played an important role and has drawn a great attention in the security systems. This study represents a multi-spectral face anti-spoofing method working with both visible (
Mohamed Shaimaa +2 more
doaj +1 more source
Data‐Based Detection of Antagonistic Agents in a Robot Swarm Solving a Dynamic Coverage Task
ABSTRACT Robot swarms can be deployed as moving surveillance systems, for instance, as mobile anti‐poaching systems for monitoring wildlife and detecting poaching activities. Since poachers have an interest in evading detection, robots are at risk of being hijacked and manipulated to behave antagonistically, for example, to prevent the correct ...
Ingeborg Wenger +2 more
wiley +1 more source
Authentication of Satellite Navigation Signals by Wiretap Coding and Artificial Noise
In order to combat the spoofing of global navigation satellite system (GNSS) signals we propose a novel approach for satellite signal authentication based on information-theoretic security.
Formaggio, Francesco, Tomasin, Stefano
core +1 more source
Materials and System Design for Self‐Decision Bioelectronic Systems
This review highlights how self‐decision bioelectronic systems integrate sensing, computation, and therapy into autonomous, closed‐loop platforms that continuously monitor and treat diseases, marking a major step toward intelligent, self‐regulating healthcare technologies.
Qiankun Zeng +9 more
wiley +1 more source
LivDet in Action - Fingerprint Liveness Detection Competition 2019
The International Fingerprint liveness Detection Competition (LivDet) is an open and well-acknowledged meeting point of academies and private companies that deal with the problem of distinguishing images coming from reproductions of fingerprints made of ...
Bazzoni, Carlotta +7 more
core +1 more source

