Results 21 to 30 of about 10,010 (275)

Goal-conflict detection based on temporal satisfiability checking [PDF]

open access: yes, 2016
Goal-oriented requirements engineering approaches propose capturing how a system should behave through the speci ca- tion of high-level goals, from which requirements can then be systematically derived. Goals may however admit subtle situations that make
Anton Ana I.   +7 more
core   +1 more source

Robustness evaluation of commercial liveness detection platform

open access: yes网络与信息安全学报, 2022
Liveness detection technology has become an important application in daily life, and it is used in scenarios including mobile phone face unlock, face payment, and remote authentication.
WANG Pengcheng, ZHENG Haibin, ZOU Jianfei   +2 more
doaj   +3 more sources

Research on Iris Liveness Detection Algorithm Based on Convolutional Neural Network [PDF]

open access: yesJisuanji gongcheng, 2016
In view of iris liveness detection of feature extraction,this paper proposes an iris liveness detection algorithm based on deep Convolutional Neural Network(CNN).Three modes of iris regions including normalization,block normalization and cutting directly
LI Zhiming
doaj   +1 more source

Interactive Liveness Detection Algorithm for VTM [PDF]

open access: yesJisuanji gongcheng, 2019
In order to improve the recognition rate and security of the Video Teller Machine(VTM) face recognition login system,an interactive liveness detection algorithm that combines improved blink detection,background detection and random combined action ...
MA Yuxi,TAN Li,DONG Xu,YU Chongchong
doaj   +1 more source

Formal proofs for broadcast algorithms [PDF]

open access: yes, 2014
Standard distributed algorithmic solutions to recurring distributed problems are commonly specified and described informally. A proper understanding of these distributed algorithms that clarifies ambiguities requires formal descriptions.
Francalanza, Adrian, Zammit, Mandy
core   +1 more source

Adversarial attacks on fingerprint liveness detection

open access: yesEURASIP Journal on Image and Video Processing, 2020
Deep neural networks are vulnerable to adversarial samples, posing potential threats to the applications deployed with deep learning models in practical conditions.
Jianwei Fei   +3 more
doaj   +1 more source

Stop It, and Be Stubborn! [PDF]

open access: yes, 2015
A system is AG EF terminating, if and only if from every reachable state, a terminal state is reachable. This publication argues that it is beneficial for both catching non-progress errors and stubborn set state space reduction to try to make ...
Valmari, Antti
core   +2 more sources

Detection of Iris Presentation Attacks Using Hybridization of Discrete Cosine Transform and Haar Transform With Machine Learning Classifiers and Ensembles

open access: yesIEEE Access, 2021
Iris biometric identification allows for contactless authentication, which helps to avoid the transmission of diseases like COVID-19. Biometric systems become unstable and hazardous due to spoofing attacks involving contact lenses, replayed video ...
Smita Khade   +4 more
doaj   +1 more source

Heap Reference Analysis Using Access Graphs [PDF]

open access: yes, 2007
Despite significant progress in the theory and practice of program analysis, analysing properties of heap data has not reached the same level of maturity as the analysis of static and stack data.
Amey Karkare   +8 more
core   +3 more sources

Uniform Local Binary Pattern for Fingerprint Liveness Detection in the Gaussian Pyramid

open access: yesJournal of Electrical and Computer Engineering, 2018
Fingerprint recognition schemas are widely used in our daily life, such as Door Security, Identification, and Phone Verification. However, the existing problem is that fingerprint recognition systems are easily tricked by fake fingerprints for ...
Yujia Jiang, Xin Liu
doaj   +1 more source

Home - About - Disclaimer - Privacy