Results 51 to 60 of about 2,994,964 (187)

Texture analysis using local ternary pattern for face anti-spoofing [PDF]

open access: yes, 2016
This paper proposes a new face anti-spoofing approach based on analysis of texture characteristics. Photo images are used for spoofing the face recognition and verification system.
Hanafi, Marsyita   +4 more
core  

Learning to Generate Posters of Scientific Papers

open access: yes, 2016
Researchers often summarize their work in the form of posters. Posters provide a coherent and efficient way to convey core ideas from scientific papers.
Fu, Yanwei   +4 more
core   +1 more source

Anti Face Spoofing System

open access: yesINTERANTIONAL JOURNAL OF SCIENTIFIC RESEARCH IN ENGINEERING AND MANAGEMENT
Face spoofing, the act of using deceptive techniques such as printed photos or digital images to deceive facial recognition systems, poses a significant threat to the security of various applications, including biometric authentication and access control
Ijsrem Journal
semanticscholar   +1 more source

From the Ground to the Stars: The Vertical Politics of the EU Drone Wall and Airspace Defence

open access: yesJCMS: Journal of Common Market Studies, EarlyView.
Abstract This research note analyses the European Commission's Defence Readiness Roadmap 2030 as a manifestation of a new spatial and technological logic of European defence: the vertical territorialisation of security. Moving beyond traditional perimeter‐based understandings of territorial defence, the Roadmap constructs a multi‐layered continuum ...
Justinas Lingevicius   +2 more
wiley   +1 more source

Biometrics in ABC: counter-spoofing research [PDF]

open access: yes, 2013
Automated border control (ABC) is concerned with fast and secure processing for intelligence-led identification. The FastPass project aims to build a harmonised, modular reference system for future European ABC.
Chen, Lulu, Ferryman, James, Wei, Hong
core  

A Study on Replay Attack and Anti-Spoofing for Automatic Speaker Verification

open access: yes, 2017
For practical automatic speaker verification (ASV) systems, replay attack poses a true risk. By replaying a pre-recorded speech signal of the genuine speaker, ASV systems tend to be easily fooled.
Chen, Yixiang   +3 more
core   +1 more source

Effect of Facial Shape Information Reflected on Learned Features in Face Spoofing Detection

open access: yes網際網路技術學刊, 2022
Face recognition is a convenient and non-contact biometric method used widely for secure personal authentication. However, the face is an exposed body part, and face spoofing attacks, which compromise the security of systems that use face recognition ...
Su-Gyeong Yu Su-Gyeong Yu   +3 more
semanticscholar   +1 more source

Dominance and toxicity without lethality: Exploring biomass, cyanometabolites, and Daphnia responses across Cyanobacterial strains

open access: yesJournal of Phycology, EarlyView.
Abstract Cyanobacteria are cosmopolitan, important components of biomass with a remarkable ability to synthesize a diverse array of bioactive compounds, some of which may have toxic effects on other organisms and ecosystems. In this study, filamentous cyanobacterial strains isolated predominantly from temperate European freshwaters (Aphanizomenon ...
Łukasz Wejnerowski   +14 more
wiley   +1 more source

PIANO: Proximity-based User Authentication on Voice-Powered Internet-of-Things Devices

open access: yes, 2017
Voice is envisioned to be a popular way for humans to interact with Internet-of-Things (IoT) devices. We propose a proximity-based user authentication method (called PIANO) for access control on such voice-powered IoT devices.
Bao, Xuan   +7 more
core   +1 more source

Building centaur responders: is emergency management ready for artificial intelligence?

open access: yesDisasters, Volume 50, Issue 3, July 2026.
Abstract This article examines the preparedness of emergency management (EM) for addressing questions pertaining to artificial intelligence (AI), encompassing its benefits to EM missions, the potential biases, the societal impacts, and more. We pinpoint two key shortcomings in early EM research on AI: (i) insufficient discussion of both AI's history ...
Christopher Whyte   +1 more
wiley   +1 more source

Home - About - Disclaimer - Privacy