Results 51 to 60 of about 7,700 (189)
Overview of satellite nav spoofing and anti-spoofing techniques
In recent years, satellite navigation systems have witnessed widespread adoption across diverse fields, including military surveillance, precision agriculture, traffic monitoring, resource exploration, and disaster assessment. However, navigation signals
Cheng Lu +8 more
doaj +1 more source
Texture analysis using local ternary pattern for face anti-spoofing [PDF]
This paper proposes a new face anti-spoofing approach based on analysis of texture characteristics. Photo images are used for spoofing the face recognition and verification system.
Hanafi, Marsyita +4 more
core
A Probability‐Aware AI Framework for Reliable Anti‐Jamming Communication
ABSTRACT Adversarial jamming attacks have increased on communication systems, causing distortion and threatening transmissions. Typical attacks rely on traditional, well‐defined cryptographic protocols and frequency‐hopping techniques. Nevertheless, these techniques become vulnerable when facing intelligent jammers.
Tawfeeq Shawly, Ahmed A. Alsheikhy
wiley +1 more source
Research on anti-spoofing method of face recognition based on semi-supervised learning
It is a long-term challenge to identify the real and fake faces in the images.When the synthetic fake faces are very realistic, it is difficult for machines and even naked eyes to distinguish the real and fake ones.The supervised anti-spoofing method ...
Li LI +3 more
doaj
Enriching Facial Anti-Spoofing Datasets via an Effective Face Swapping Framework
In the era of rapid development of the Internet of things, deep learning, and communication technologies, social media has become an indispensable element.
Jiachen Yang +5 more
doaj +1 more source
A Study on Replay Attack and Anti-Spoofing for Automatic Speaker Verification
For practical automatic speaker verification (ASV) systems, replay attack poses a true risk. By replaying a pre-recorded speech signal of the genuine speaker, ASV systems tend to be easily fooled.
Chen, Yixiang +3 more
core +1 more source
Latent Distribution Adjusting for Face Anti-Spoofing
With the development of deep learning, the field of face anti-spoofing (FAS) has witnessed great progress. FAS is usually considered a classification problem, where each class is assumed to contain a single cluster optimized by softmax loss. In practical deployment, one class can contain several local clusters, and a single-center is insufficient to ...
Qinghong Sun +4 more
openaire +2 more sources
MLDAS: Machine Learning Dynamic Algorithm Selection for Software‐Defined Networking Security
ABSTRACT Network security is a critical concern in the digital landscape of today, with users demanding secure browsing experiences and protection of their personal data. This study explores the dynamic integration of Machine Learning (ML) algorithms with Software‐Defined Networking (SDN) controllers to enhance network security through adaptive ...
Pablo Benlloch +3 more
wiley +1 more source
The rise in popularity of face anti-spoofing is attributed to its crucial role in safeguarding face recognition systems. Perpetrators use either a photo or a video to execute a face-spoofing attack on the authentication system of an authorized user ...
Marwa Radad +4 more
doaj +1 more source
Integrating Fine-Grained Classification and Motion Relation Analysis for Face Anti-Spoofing
Face Anti-Spoofing (FAS) is the core technical means used to protect face recognition systems from face presentation attack. Facial movement is a commonly used cue in FAS.
Ziyang Cheng, Xiafen Zhang
doaj +1 more source

