Results 11 to 20 of about 574,096 (277)
More than 5.1 billion Bluetooth-enabled devices were shipped in the year 2022 and this trend is expected to exceed 7.1 billion by the year 2026. A large proportion of these devices are used in smart homes designed for older adults, to help them age in place.
Nandikotkur, Achyuth +2 more
openaire +1 more source
Unknown presentation attack detection against rational attackers [PDF]
Abstract Despite the impressive progress in the field of presentation attack detection and multimedia forensics over the last decade, these systems are still vulnerable to attacks in real‐life settings. Some of the challenges for the existing solutions are the detection of unknown attacks, the ability to perform in adversarial ...
Ali Khodabakhsh 0001, Zahid Akhtar
openaire +3 more sources
Spoofing Attack Detection by Anomaly Detection [PDF]
Spoofing attacks on biometric systems can seriously compromise their practical utility. In this paper we focus on face spoofing detection. The majority of papers on spoofing attack detection formulate the problem as a two or multiclass learning task, attempting to separate normal accesses from samples of different types of spoofing attacks.
Fatemifar, Soroush +3 more
openaire +3 more sources
On Scalable Attack Detection in the Network [PDF]
Current intrusion detection and prevention systems seek to detect a wide class of network intrusions (e.g., DoS attacks, worms, port scans)at network vantage points. Unfortunately, all the IDS systems we know of keep per-connection or per-flow state.
Ramana Rao Kompella +2 more
openaire +2 more sources
Sequential Detection of Replay Attacks
One of the most studied forms of attacks on the cyber-physical systems is the replay attack. The statistical similarities of the replay signal and the true observations make the replay attack difficult to detect. In this paper, we have addressed the problem of replay attack detection by adding watermarking to the control inputs and then performed ...
Arunava Naha +3 more
openaire +2 more sources
Detection of Iterative Adversarial Attacks via Counter Attack
AbstractDeep neural networks (DNNs) have proven to be powerful tools for processing unstructured data. However, for high-dimensional data, like images, they are inherently vulnerable to adversarial attacks. Small almost invisible perturbations added to the input can be used to fool DNNs.
Matthias Rottmann +4 more
openaire +4 more sources
A Survey in Presentation Attack and Presentation Attack Detection [PDF]
Biometric-based recognition has been replacing conventional recognition methods in security systems. Modern electronic devices such as smartphones and online services have been employing biometric systems because of their security, acceptability, and usability.
Anas Husseis +3 more
openaire +1 more source
Attacks Generation by Detecting Attack Surfaces
AbstractIn the development process of software and systems, one of the main challenges is to detect the existing attack surfaces and their exact related attacks. In this paper, we address the issue of generating attacks related to systems that are designed by using SysML activity diagrams.
Samir Ouchani, Gabriele Lenzini
openaire +2 more sources
LDoS attack detection method based on simple statistical features
Traditional low-rate denial of service (LDoS) attack detection methods were complex in feature extraction, high in computational cost, single in experimental data background settings, and outdated in attack scenarios, so it was difficult to meet the ...
Xueyuan DUAN, Yu FU, Kun WANG, Bin LI
doaj +2 more sources
Hybrid CNN and RNN-based shilling attack framework in social recommender networks [PDF]
INTRODUCTION: Recommender system is considered to be widely utilized in diversified domain for the purpose of effectively handling information overload.
Praveena Narayanan, Vivekanandan. K
doaj +1 more source

