Results 51 to 60 of about 7,700 (189)

Overview of satellite nav spoofing and anti-spoofing techniques

open access: yesFrontiers in Physics
In recent years, satellite navigation systems have witnessed widespread adoption across diverse fields, including military surveillance, precision agriculture, traffic monitoring, resource exploration, and disaster assessment. However, navigation signals
Cheng Lu   +8 more
doaj   +1 more source

Texture analysis using local ternary pattern for face anti-spoofing [PDF]

open access: yes, 2016
This paper proposes a new face anti-spoofing approach based on analysis of texture characteristics. Photo images are used for spoofing the face recognition and verification system.
Hanafi, Marsyita   +4 more
core  

A Probability‐Aware AI Framework for Reliable Anti‐Jamming Communication

open access: yesCAAI Transactions on Intelligence Technology, Volume 11, Issue 2, Page 349-366, April 2026.
ABSTRACT Adversarial jamming attacks have increased on communication systems, causing distortion and threatening transmissions. Typical attacks rely on traditional, well‐defined cryptographic protocols and frequency‐hopping techniques. Nevertheless, these techniques become vulnerable when facing intelligent jammers.
Tawfeeq Shawly, Ahmed A. Alsheikhy
wiley   +1 more source

Research on anti-spoofing method of face recognition based on semi-supervised learning

open access: yes智能科学与技术学报, 2021
It is a long-term challenge to identify the real and fake faces in the images.When the synthetic fake faces are very realistic, it is difficult for machines and even naked eyes to distinguish the real and fake ones.The supervised anti-spoofing method ...
Li LI   +3 more
doaj  

Enriching Facial Anti-Spoofing Datasets via an Effective Face Swapping Framework

open access: yesSensors, 2022
In the era of rapid development of the Internet of things, deep learning, and communication technologies, social media has become an indispensable element.
Jiachen Yang   +5 more
doaj   +1 more source

A Study on Replay Attack and Anti-Spoofing for Automatic Speaker Verification

open access: yes, 2017
For practical automatic speaker verification (ASV) systems, replay attack poses a true risk. By replaying a pre-recorded speech signal of the genuine speaker, ASV systems tend to be easily fooled.
Chen, Yixiang   +3 more
core   +1 more source

Latent Distribution Adjusting for Face Anti-Spoofing

open access: yesCoRR, 2023
With the development of deep learning, the field of face anti-spoofing (FAS) has witnessed great progress. FAS is usually considered a classification problem, where each class is assumed to contain a single cluster optimized by softmax loss. In practical deployment, one class can contain several local clusters, and a single-center is insufficient to ...
Qinghong Sun   +4 more
openaire   +2 more sources

MLDAS: Machine Learning Dynamic Algorithm Selection for Software‐Defined Networking Security

open access: yesConcurrency and Computation: Practice and Experience, Volume 38, Issue 5, March 2026.
ABSTRACT Network security is a critical concern in the digital landscape of today, with users demanding secure browsing experiences and protection of their personal data. This study explores the dynamic integration of Machine Learning (ML) algorithms with Software‐Defined Networking (SDN) controllers to enhance network security through adaptive ...
Pablo Benlloch   +3 more
wiley   +1 more source

Face Anti-spoofing Detection Based on Novel Encoder Convolutional Neural Network and Texture’s Grayscale Structural Information

open access: yesInternational Journal of Computational Intelligence Systems
The rise in popularity of face anti-spoofing is attributed to its crucial role in safeguarding face recognition systems. Perpetrators use either a photo or a video to execute a face-spoofing attack on the authentication system of an authorized user ...
Marwa Radad   +4 more
doaj   +1 more source

Integrating Fine-Grained Classification and Motion Relation Analysis for Face Anti-Spoofing

open access: yesIEEE Access
Face Anti-Spoofing (FAS) is the core technical means used to protect face recognition systems from face presentation attack. Facial movement is a commonly used cue in FAS.
Ziyang Cheng, Xiafen Zhang
doaj   +1 more source

Home - About - Disclaimer - Privacy