Results 61 to 70 of about 4,892 (195)

Design and Fabrication of Capacitive Mems Actuator Array on Spoof‐Surface‐Plasmon‐Polariton Waveguide for Active Microwave Modulation

open access: yesAdvanced Photonics Research, Volume 7, Issue 1, January 2026.
a) Schematic of the SSPP waveguide integrated with SRR metamaterial and MEMS actuator arrays with electric field confinement in the gap below the microbridge. b) Cross‐section of the MEMS actuator consists of a buried lead line and a microbridge at different deflection positions. c) The notch band in the microwave transmission characteristic shifts due
Van Minh Nguyen, Yoshiaki Kanamori
wiley   +1 more source

Anti-Spoofing Authentication

open access: yesInternational Journal of Engineering and Advanced Technology, 2019
Biometrics, One Among the existing security authentication schemes, involves parts of body for identification, hence used in various fields. Due to the level of its simplicity fingerprint recognition remains popular. But the introduction of many technologies has made to lose its uniqueness by just taking a finger print scan, print it on special paper ...
V. Lalitha   +3 more
openaire   +1 more source

Face Anti-Spoofing with Human Material Perception [PDF]

open access: yes, 2020
Face anti-spoofing (FAS) plays a vital role in securing the face recognition systems from presentation attacks. Most existing FAS methods capture various cues (e.g., texture, depth and reflection) to distinguish the live faces from the spoofing faces.
Yu, Z. (Zitong)   +4 more
openaire   +3 more sources

Ultrathin Broadband Terahertz Metamaterial Absorber Based on Multimode Spoof Localized Surface Plasmon Resonators

open access: yesAdvanced Photonics Research, Volume 7, Issue 1, January 2026.
This work presents an ultrathin terahertz metamaterial absorber that achieves broadband and polarization‐insensitive performance through multimode spoof‐plasmon resonances and tunable indium tin oxide loss engineering. The absorber offers near‐Rozanov‐limit thickness and optical transparency, enabling integration into compact and multifunctional THz ...
Jinlin Mu   +8 more
wiley   +1 more source

Generative Domain Adaptation for Face Anti-Spoofing

open access: yes, 2022
Face anti-spoofing (FAS) approaches based on unsupervised domain adaption (UDA) have drawn growing attention due to promising performances for target scenarios. Most existing UDA FAS methods typically fit the trained models to the target domain via aligning the distribution of semantic high-level features. However, insufficient supervision of unlabeled
Qianyu Zhou 0001   +6 more
openaire   +2 more sources

Learning Meta Pattern for Face Anti-Spoofing

open access: yesIEEE Transactions on Information Forensics and Security, 2022
Accepted by IEEE Transactions on Information Forensics and Security (https://ieeexplore.ieee.org.remotexs.ntu.edu.sg/document/9732458) Source code available in https://github.com/RizhaoCai ...
Rizhao Cai   +5 more
openaire   +3 more sources

A Survey of SIR‐Based Differential Epidemic Models for Control and Security Against Malware Propagation in Computer Networks

open access: yesSECURITY AND PRIVACY, Volume 9, Issue 1, January/February 2026.
ABSTRACT Unarguably, malware and their variants have metamorphosed into objects of attack and cyber warfare. These issues have directed research focus to modeling infrastructural settings and infection scenarios, analyzing propagation mechanisms, and conducting studies that highlight optimized remedial measures.
Chukwunonso Henry Nwokoye
wiley   +1 more source

Texture analysis using local ternary pattern for face anti-spoofing [PDF]

open access: yes, 2016
This paper proposes a new face anti-spoofing approach based on analysis of texture characteristics. Photo images are used for spoofing the face recognition and verification system.
Hanafi, Marsyita   +4 more
core  

Face Spoofing Detection by Fusing Binocular Depth and Spatial Pyramid Coding Micro-Texture Features

open access: yes, 2017
Robust features are of vital importance to face spoofing detection, because various situations make feature space extremely complicated to partition. Thus in this paper, two novel and robust features for anti-spoofing are proposed.
Lin, Tianwei, Song, Xiao, Zhao, Xu
core   +1 more source

A Review on Face Anti-Spoofing

open access: yesIJITEE (International Journal of Information Technology and Electrical Engineering), 2021
The biometric system is a security technology that uses information based on a living person's characteristics to verify or recognize the identity, such as facial recognition. Face recognition has numerous applications in the real world, such as access control and surveillance. But face recognition has a security issue of spoofing. A face anti-spoofing,
Perdana, Rizky Naufal   +2 more
openaire   +3 more sources

Home - About - Disclaimer - Privacy