Results 21 to 30 of about 10,010 (275)
Goal-conflict detection based on temporal satisfiability checking [PDF]
Goal-oriented requirements engineering approaches propose capturing how a system should behave through the speci ca- tion of high-level goals, from which requirements can then be systematically derived. Goals may however admit subtle situations that make
Anton Ana I. +7 more
core +1 more source
Robustness evaluation of commercial liveness detection platform
Liveness detection technology has become an important application in daily life, and it is used in scenarios including mobile phone face unlock, face payment, and remote authentication.
WANG Pengcheng, ZHENG Haibin, ZOU Jianfei +2 more
doaj +3 more sources
Research on Iris Liveness Detection Algorithm Based on Convolutional Neural Network [PDF]
In view of iris liveness detection of feature extraction,this paper proposes an iris liveness detection algorithm based on deep Convolutional Neural Network(CNN).Three modes of iris regions including normalization,block normalization and cutting directly
LI Zhiming
doaj +1 more source
Interactive Liveness Detection Algorithm for VTM [PDF]
In order to improve the recognition rate and security of the Video Teller Machine(VTM) face recognition login system,an interactive liveness detection algorithm that combines improved blink detection,background detection and random combined action ...
MA Yuxi,TAN Li,DONG Xu,YU Chongchong
doaj +1 more source
Formal proofs for broadcast algorithms [PDF]
Standard distributed algorithmic solutions to recurring distributed problems are commonly specified and described informally. A proper understanding of these distributed algorithms that clarifies ambiguities requires formal descriptions.
Francalanza, Adrian, Zammit, Mandy
core +1 more source
Adversarial attacks on fingerprint liveness detection
Deep neural networks are vulnerable to adversarial samples, posing potential threats to the applications deployed with deep learning models in practical conditions.
Jianwei Fei +3 more
doaj +1 more source
Stop It, and Be Stubborn! [PDF]
A system is AG EF terminating, if and only if from every reachable state, a terminal state is reachable. This publication argues that it is beneficial for both catching non-progress errors and stubborn set state space reduction to try to make ...
Valmari, Antti
core +2 more sources
Iris biometric identification allows for contactless authentication, which helps to avoid the transmission of diseases like COVID-19. Biometric systems become unstable and hazardous due to spoofing attacks involving contact lenses, replayed video ...
Smita Khade +4 more
doaj +1 more source
Heap Reference Analysis Using Access Graphs [PDF]
Despite significant progress in the theory and practice of program analysis, analysing properties of heap data has not reached the same level of maturity as the analysis of static and stack data.
Amey Karkare +8 more
core +3 more sources
Uniform Local Binary Pattern for Fingerprint Liveness Detection in the Gaussian Pyramid
Fingerprint recognition schemas are widely used in our daily life, such as Door Security, Identification, and Phone Verification. However, the existing problem is that fingerprint recognition systems are easily tricked by fake fingerprints for ...
Yujia Jiang, Xin Liu
doaj +1 more source

