Results 71 to 80 of about 10,579 (187)

Dodd-Frank and the Spoofing Prohibition in Commodities Markets [PDF]

open access: yes, 2017
The Dodd-Frank Act amended the Commodity Exchange Act and adopted an explicit prohibition regarding activity commonly known as spoofing in commodities markets.
Sar, Meric
core   +1 more source

Face spoofing detection based on colour distortions

open access: yesIET Biometrics, 2017
Securing face recognition systems against spoofing attacks have been recognised as a real challenge. Spoofing attacks are conducted by printing or displaying a digital acquisition of a capture subject (target user) in front of the sensor. These extra reproduction stages generate colour distortions between face artefacts and real faces.
Edmunds, Taiamiti, Caplier, Alice
openaire   +2 more sources

A Blockchain‐Less Traceability System for Agriculture Using DAG, IPFS, and Serverless Deployments

open access: yesInternational Journal of Network Management, Volume 36, Issue 3, May/June 2026.
ABSTRACT Ensuring transparency and integrity in agricultural data management is a critical challenge as the sector increasingly relies on advanced technologies. The primary problem is maintaining data traceability and security throughout the supply chain.
Antonio Villafranca   +6 more
wiley   +1 more source

Why Autonomous Vehicles Are Not Ready Yet: A Multi‐Disciplinary Review of Problems, Attempted Solutions, and Future Directions

open access: yesJournal of Field Robotics, Volume 43, Issue 3, Page 2254-2341, May 2026.
ABSTRACT Personal autonomous vehicles can sense their surrounding environment, plan their route, and drive with little or no involvement of human drivers. Despite the latest technological advancements and the hopeful announcements made by leading entrepreneurs, to date no personal vehicle is approved for road circulation in a “fully” or “semi ...
Xingshuai Dong   +13 more
wiley   +1 more source

Overview of satellite nav spoofing and anti-spoofing techniques

open access: yesFrontiers in Physics
In recent years, satellite navigation systems have witnessed widespread adoption across diverse fields, including military surveillance, precision agriculture, traffic monitoring, resource exploration, and disaster assessment. However, navigation signals
Cheng Lu   +8 more
doaj   +1 more source

On the Optimal Selection of Mel‐Frequency Cepstral Coefficients for Voice Deepfake Detection

open access: yesExpert Systems, Volume 43, Issue 5, May 2026.
ABSTRACT The continuous evolution of techniques for generating manipulated audio, known as voice deepfakes, and the widespread availability of tools that produce convincing forgeries have created an urgent need for reliable detection methods. This work considers the dimensionality of Mel‐Frequency Cepstral Coefficients (MFCCs) as a core design variable
Sergio A. Falcón‐López   +3 more
wiley   +1 more source

Deep Anomaly Detection for Generalized Face Anti-Spoofing [PDF]

open access: yes2019 IEEE/CVF Conference on Computer Vision and Pattern Recognition Workshops (CVPRW), 2019
Face recognition has achieved unprecedented results, surpassing human capabilities in certain scenarios. However, these automatic solutions are not ready for production because they can be easily fooled by simple identity impersonation attacks. And although much effort has been devoted to develop face anti-spoofing models, their generalization capacity
Pérez-Cabo, Daniel   +3 more
openaire   +2 more sources

Ruthenium Nanoparticle‐On‐Cavity Refractory Thermoplasmonics for Broadband and Spectral‐Selective Solar Photothermal Conversion

open access: yesAdvanced Photonics Research, Volume 7, Issue 4, April 2026.
We identify ruthenium as a refractory plasmonic material exhibiting dual ENZ optical topological transitions and dual plasmonic resonances spanning from visible to infrared region with high imaginary permittivity. We establish a nanoparticle‐on‐cavity (NPoC) resonance mode and realize a NPoC selective solar absorber using cost‐effective additive ...
Zhequn Huang   +4 more
wiley   +1 more source

Identification and Authentication Failures: Foundational Aspects of Strong Detection Mechanisms

open access: yesEngineering Reports, Volume 8, Issue 4, April 2026.
A review of recent techniques for detecting Identification and Authentication Failures in online platforms storing sensitive user data. Analyzed methods include biometric, hierarchical, blockchain, IoT‐based, EPICS, and VAP authentication systems. ABSTRACT Online platforms, such as e‐commerce and online apps, have become crucial in daily activities ...
Md. Maruf Hassan   +2 more
wiley   +1 more source

Advanced Techniques for Biometric Authentication: Leveraging Deep Learning and Explainable AI

open access: yesIEEE Access
Liveness face detection is essential for modern biometric systems, ensuring that input data is genuine and not derived from a false image or video. Liveness face detection in today’s biometric systems will ensure that input comes from a real, live
Smita Khairnar   +5 more
doaj   +1 more source

Home - About - Disclaimer - Privacy