Results 11 to 20 of about 89 (83)
Face De-spoofing: Anti-spoofing via Noise Modeling [PDF]
To appear in ECCV 2018.
Jourabloo, Amin +2 more
openaire +2 more sources
On the Optimal Selection of Mel‐Frequency Cepstral Coefficients for Voice Deepfake Detection
ABSTRACT The continuous evolution of techniques for generating manipulated audio, known as voice deepfakes, and the widespread availability of tools that produce convincing forgeries have created an urgent need for reliable detection methods. This work considers the dimensionality of Mel‐Frequency Cepstral Coefficients (MFCCs) as a core design variable
Sergio A. Falcón‐López +3 more
wiley +1 more source
The Case of Fleeting Orders and Flickering Quotes
ABSTRACT The literature controversially discusses the ambiguous motives and driving forces behind quickly cancelled limit orders (fleeting orders), which are characteristic of high‐frequency markets. In particular, manipulative and dysfunctional characteristics are feared. We analyze top‐of‐book fleeting orders—so‐called flickering quotes—and show with
Markus Ulze +2 more
wiley +1 more source
MLDAS: Machine Learning Dynamic Algorithm Selection for Software‐Defined Networking Security
ABSTRACT Network security is a critical concern in the digital landscape of today, with users demanding secure browsing experiences and protection of their personal data. This study explores the dynamic integration of Machine Learning (ML) algorithms with Software‐Defined Networking (SDN) controllers to enhance network security through adaptive ...
Pablo Benlloch +3 more
wiley +1 more source
Overview of the proposed work. ABSTRACT Identifying cyber threats maintains the security and operational stability of smart grid systems because they experience escalating attacks that endanger both operating data reliability and system stability and electricity grid performance.
Priya R. Karpaga +3 more
wiley +1 more source
A Hybrid Encryption Framework for Secure and Real‐Time Vehicular Communications
ABSTRACT The rapid expansion of Vehicular Ad Hoc Networks (VANETs) has amplified concerns regarding data security, integrity, and privacy. This paper presents SECURIDE, a Secure Intelligent Data Exchange for Connected Vehicles that provides a comprehensive encryption–decryption framework for safeguarding multimedia data and communication channels in ...
Muhammad Usama, Muhammad Usman Hadi
wiley +1 more source
Materials and System Design for Self‐Decision Bioelectronic Systems
This review highlights how self‐decision bioelectronic systems integrate sensing, computation, and therapy into autonomous, closed‐loop platforms that continuously monitor and treat diseases, marking a major step toward intelligent, self‐regulating healthcare technologies.
Qiankun Zeng +9 more
wiley +1 more source
Terahertz Waveform‐Selective Antenna Using a Patch Structure Loaded with Nonlinear Circuits
A waveform‐selective antenna that integrates the functions of waveform selectivity, electromagnetic shielding, and EM wave radiation has been proposed. By integrating different nonlinear circuits and selecting appropriate component values, the antenna can achieve high reflection of either a pulse wave or a continuous wave, while allowing the other ...
Zeting Li, Kai‐Da Xu, Pin Wen
wiley +1 more source
Active digital spoof plasmonics [PDF]
Abstract Digital coding and digital modulation are the foundation of modern information science. The combination of digital technology with metamaterials provides a powerful scheme for spatial and temporal controls of electromagnetic waves. Such a technique, however, has thus far been limited to the control of free-space light.
Zhang, Hao Chi +6 more
openaire +2 more sources
This paper presents a programmable metasurface‐based Meta Key Distribution (MKD) system for secure, protocol‐independent key exchange in indoor wireless settings. By embedding entropy into the wireless channel, it enables lightweight, compatible cryptographic key generation.
Xinyu Li +7 more
wiley +1 more source

