Dodd-Frank and the Spoofing Prohibition in Commodities Markets [PDF]
The Dodd-Frank Act amended the Commodity Exchange Act and adopted an explicit prohibition regarding activity commonly known as spoofing in commodities markets.
Sar, Meric
core +1 more source
Test-Time Domain Generalization for Face Anti-Spoofing [PDF]
Face Anti-Spoofing (FAS) is pivotal in safeguarding facial recognition systems against presentation attacks. While domain generalization (DG) methods have been developed to enhance FAS performance, they predominantly focus on learning domain-invariant ...
Qianyu Zhou +5 more
semanticscholar +1 more source
The Effectiveness of Depth Data in Liveness Face Authentication Using 3D Sensor Cameras
Even though biometric technology increases the security of systems that use it, they are prone to spoof attacks where attempts of fraudulent biometrics are used.
Ghazel Albakri, Sharifa Alghowinem
doaj +1 more source
A Survey for Deep Reinforcement Learning Based Network Intrusion Detection
This paper surveys deep reinforcement learning (DRL) for network intrusion detection, evaluating model efficiency, minority attack detection, and dataset imbalance. Findings show DRL achieves state‐of‐the‐art results on public datasets, sometimes surpassing traditional deep learning.
Wanrong Yang +3 more
wiley +1 more source
LivDet in Action - Fingerprint Liveness Detection Competition 2019
The International Fingerprint liveness Detection Competition (LivDet) is an open and well-acknowledged meeting point of academies and private companies that deal with the problem of distinguishing images coming from reproductions of fingerprints made of ...
Bazzoni, Carlotta +7 more
core +1 more source
Suppress and Rebalance: Towards Generalized Multi-Modal Face Anti-Spoofing [PDF]
Face Anti-Spoofing (FAS) is crucial for securing face recognition systems against presentation attacks. With ad-vancements in sensor manufacture and multi-modal learning techniques, many multi-modal FAS approaches have emerged.
Xun Lin +7 more
semanticscholar +1 more source
Disguised face liveness detection: an ensemble approach using deep features
Deep learning models have surpassed classic machine learning models in face anti-spoofing detection during the last decade. Most face-spoofing detection algorithms are biased toward a single presentation attack, failing to robustly detect multiple ...
Padmashree G., Karunakar A. K.
doaj +1 more source
A Novel Feature Descriptor for Face Anti-Spoofing Using Texture Based Method
In this paper we propose a novel approach for face anti-spoofing called Extended Division Directional Ternary Co-relation Pattern (EDDTCP). The EDDTCP encodes co-relation of ternary edges based on the centre pixel gray values with its immediate ...
Raghavendra R. J., Kunte R. Sanjeev
doaj +1 more source
Generating Pattern‐Based Datasets for Cyber Attack Detection Using Machine‐Learning Techniques
The aim of this work is to review the state of the art in the design, generation, and labeling of attack pattern datasets for training of detection systems based on machine learning. ABSTRACT This work aims to review the state of the art in the design, generation, and labeling of attack pattern datasets for the training of detection systems based on ...
Pedro Díaz García +4 more
wiley +1 more source
Large Language Models for Explainable Medical Text Summarization: A Systematic Literature Review
The graphical abstract highlights the three key aspects addressed in this review: the technical background of medical text summarization methods relevant to clinical decision support; the LLM background in providing context for its diagnosis and clinical significance; and clinical decision support with summarization and explainability in patient care ...
Aleka Melese Ayalew +3 more
wiley +1 more source

