Results 71 to 80 of about 4,892 (195)
Robustness Analysis of Distributed CNN Model Training in Expression Recognition
Facial expression recognition is vital in pattern recognition and affective computing. With the advancement of deep learning, its performance has improved, yet challenges remain in nonlaboratory environments due to occlusion, poor lighting, and varying head poses.
Jun Li, Jun Wan
wiley +1 more source
Optical coherence tomography (OCT) offers high-resolution imaging of internal finger structures, making it attractive for fingerprint recognition. Anti-spoofing research in OCT includes both static and liveness anti-spoofing.
Yilong Zhang +8 more
doaj +1 more source
Unified Physical–Digital Face Attack Detection Challenge: A Review
Face antispoofing (FAS) technologies play a pivotal role in safeguarding face recognition (FR) systems against potential security loopholes. The biometric community has witnessed significant advancements lately, largely due to the exceptional performance of deep learning architectures and the abundance of substantial datasets.
Junze Zheng +12 more
wiley +1 more source
One-Class Learning Method Based on Live Correlation Loss for Face Anti-Spoofing
As biometric authentication systems are popularly used in various mobile devices, e.g., smart-phones and tablets, face anti-spoofing methods have been actively developed for the high-level security.
Seokjae Lim +4 more
doaj +1 more source
ABSTRACT With the rapid proliferation of unmanned aerial vehicles (UAVs) in the military, logistics and public safety sectors, the threat of illegal intrusion, information theft, and security breaches has increased. This paper provides a comprehensive review of recent developments in counter‐unmanned aerial vehicle (counter‐UAV) systems, focussing on ...
Lei Xing, Can Cui, Miao Wang, Chao Xu
wiley +1 more source
Tracking Loop Distortion of BDS‐3 B1C Signal in Spoofing Scenarios: An Experimental Analysis
This study established a feeder‐based BDS spoofing experimental platform and uses multi‐correlator tracking to systematically analyse the tracking loop distortion characteristics of BDS‐3 B1C signals under position and time spoofing, comparing differences between narrowband (NB) and wideband (WB) tracking modes.
Bo Jiao +4 more
wiley +1 more source
Towards a Secure Central Bank Digital Currency System: A Case Study of Tanzania
This study proposes a secure, context‐specific design for a Central Bank Digital Currency (CBDC) system for Tanzania, grounded in stakeholder input and empirical data. It identifies key adoption barriers in digital financial services, namely, security and privacy concerns and high transaction fees, and suggests how a well‐designed CBDC might address ...
Godbless Gibson Minja +2 more
wiley +1 more source
Calculation of the lower limit of the spoofing-signal ratio for a GNSS receiver-spoofer
A receiver-spoofer is one of the most covert global navigation satellite system (GNSS) spoofing attacks and can only be effectively detected by the combination of multiple anti-spoofing technologies.
Meng Zhou, Hong Li, Mingquan Lu
doaj +1 more source
Design and Fabrication of a Self‐Driven Air Purifying Bicycle With Real‐Time Monitoring System
This study presents a self‐powered air purifying bicycle that delivers real‐time filtered airflow based on environmental and physiological feedback, significantly reducing cyclist exposure to PM2.5 and VOCs while enhancing urban air quality through dual‐channel purification.
Manpreet Singh +3 more
wiley +1 more source
Topological Quasiparticles of Light: From Spin‐Orbit Coupling to Photonic Skyrmions
This review summarizes recent advances in photonic skyrmions, emphasizing the central role of spin–orbit coupling in their formation. The review discusses how spin–orbit interactions generate skyrmionic textures, examines modulation strategies for their dynamic control, and provides an overview of emerging directions and opportunities where these ...
Xinrui Lei, Qiwen Zhan
wiley +1 more source

