Utterance-Style-Dependent Speaker Verification Using Emotional Embedding with Pretrained Models. [PDF]
Pham Hoang L +4 more
europepmc +1 more source
AI-enabled cybersecurity framework for future 5G wireless infrastructures. [PDF]
Alam A, Umer A, Ullah I, Alsayat A.
europepmc +1 more source
WAWA: Wavelet Analysis-Based Watermarking Authentication for GNSS Civil Signal with Immediate Symbol-Level Verification. [PDF]
Tang X, Tang X, Lin H, Wu Y, Sun G.
europepmc +1 more source
GNSS Interference Identification Driven by Eye Pattern Features: ICOA-CNN-ResNet-BiLSTM Optimized Deep Learning Architecture. [PDF]
Wu C, Ji Y, Sun X.
europepmc +1 more source
DeepSpoofNet: a framework for securing UAVs against GPS spoofing attacks. [PDF]
Badar AUR +6 more
europepmc +1 more source
Dataset of SCADA traffic captures from a medical waste incinerator with injected cyberattacks. [PDF]
Al-Duwairi B +3 more
europepmc +1 more source
Related searches:
Analysis of spoof surface plasmons in spoof-insulator-spoof waveguides
Journal of Electromagnetic Waves and Applications, 2016AbstractHerein, we present a detailed analysis of the propagation of surface waves along spoof-insulator-spoof (SIS) waveguides. Analytical dispersion equations are derived for the geometry under investigation, in view of the presence of the semiconductor and transparent conducting oxide (TCO) corrugations.
Mikhail A. Kats +4 more
openaire +2 more sources
Spoof Trace Disentanglement for Generic Face Anti-Spoofing
IEEE Transactions on Pattern Analysis and Machine Intelligence, 2022Prior studies show that the key to face anti-spoofing lies in the subtle image patterns, termed "spoof trace," e.g., color distortion, 3D mask edge, and Moiré pattern. Spoof detection rooted on those spoof traces can improve not only the model's generalization but also the interpretability.
Yaojie, Liu, Xiaoming, Liu
openaire +2 more sources

