Results 91 to 100 of about 45,521 (247)

Spatial spectrum approach for pilot spoofing attack detection in MIMO systems [PDF]

open access: diamond, 2021
Lina Ning   +4 more
openalex   +1 more source

A Combined Antijamming and Antispoofing Algorithm for GPS Arrays

open access: yesInternational Journal of Antennas and Propagation, 2019
The Global Positioning System (GPS), with its accurate positioning and timing information, has become a commonly used navigation instrument for many applications. However, it is susceptible to intentional interference such as jamming and spoofing.
Qiong Yang   +3 more
doaj   +1 more source

Spoofing Detection Algorithm Based on Pseudorange Differences

open access: yesSensors, 2018
Intentional spoofing interference can cause damage to the navigation terminal and threaten the security of a global navigation satellite system (GNSS).
Ke Liu   +4 more
doaj   +1 more source

Improve the Security of GNSS Receivers Through Spoofing Mitigation

open access: yesIEEE Access, 2017
Spoofing attacks are one of the most dangerous threats for the application of the global navigation satellite system (GNSS), especially for autonomous driving and unmanned aerial vehicles.
Shuai Han   +3 more
doaj   +1 more source

Face Spoofing Detection Using Local Graph Structure [PDF]

open access: gold, 2014
Housam Khalifa Bashier   +4 more
openalex   +1 more source

Rawboost: A Raw Data Boosting and Augmentation Method Applied to Automatic Speaker Verification Anti-Spoofing [PDF]

open access: green, 2022
Hemlata Tak   +4 more
openalex   +1 more source

ADoPT: LiDAR Spoofing Attack Detection Based on Point-Level Temporal Consistency [PDF]

open access: green, 2023
Minkyoung Cho   +3 more
openalex   +1 more source

Toward Improving Synthetic Audio Spoofing Detection Robustness via Meta-Learning and Disentangled Training With Adversarial Examples

open access: yesIEEE Access
Advances in automatic speaker verification (ASV) promote research into the formulation of spoofing detection systems for real-world applications. The performance of ASV systems can be degraded severely by multiple types of spoofing attacks, namely ...
Zhenyu Wang, John H. L. Hansen
doaj   +1 more source

Home - About - Disclaimer - Privacy