Results 11 to 20 of about 89 (83)

Face De-spoofing: Anti-spoofing via Noise Modeling [PDF]

open access: yes, 2018
To appear in ECCV 2018.
Jourabloo, Amin   +2 more
openaire   +2 more sources

On the Optimal Selection of Mel‐Frequency Cepstral Coefficients for Voice Deepfake Detection

open access: yesExpert Systems, Volume 43, Issue 5, May 2026.
ABSTRACT The continuous evolution of techniques for generating manipulated audio, known as voice deepfakes, and the widespread availability of tools that produce convincing forgeries have created an urgent need for reliable detection methods. This work considers the dimensionality of Mel‐Frequency Cepstral Coefficients (MFCCs) as a core design variable
Sergio A. Falcón‐López   +3 more
wiley   +1 more source

The Case of Fleeting Orders and Flickering Quotes

open access: yesJournal of Futures Markets, Volume 46, Issue 4, Page 629-652, April 2026.
ABSTRACT The literature controversially discusses the ambiguous motives and driving forces behind quickly cancelled limit orders (fleeting orders), which are characteristic of high‐frequency markets. In particular, manipulative and dysfunctional characteristics are feared. We analyze top‐of‐book fleeting orders—so‐called flickering quotes—and show with
Markus Ulze   +2 more
wiley   +1 more source

MLDAS: Machine Learning Dynamic Algorithm Selection for Software‐Defined Networking Security

open access: yesConcurrency and Computation: Practice and Experience, Volume 38, Issue 5, March 2026.
ABSTRACT Network security is a critical concern in the digital landscape of today, with users demanding secure browsing experiences and protection of their personal data. This study explores the dynamic integration of Machine Learning (ML) algorithms with Software‐Defined Networking (SDN) controllers to enhance network security through adaptive ...
Pablo Benlloch   +3 more
wiley   +1 more source

Tomtit‐Raven Evolutionary Selector‐Reinforced Attention‐Driven: A High‐Performance and Computationally Efficient Cyber Threat Detection Framework for Smart Grids

open access: yesEnergy Science &Engineering, Volume 14, Issue 3, Page 1431-1455, March 2026.
Overview of the proposed work. ABSTRACT Identifying cyber threats maintains the security and operational stability of smart grid systems because they experience escalating attacks that endanger both operating data reliability and system stability and electricity grid performance.
Priya R. Karpaga   +3 more
wiley   +1 more source

A Hybrid Encryption Framework for Secure and Real‐Time Vehicular Communications

open access: yesSECURITY AND PRIVACY, Volume 9, Issue 2, March/April 2026.
ABSTRACT The rapid expansion of Vehicular Ad Hoc Networks (VANETs) has amplified concerns regarding data security, integrity, and privacy. This paper presents SECURIDE, a Secure Intelligent Data Exchange for Connected Vehicles that provides a comprehensive encryption–decryption framework for safeguarding multimedia data and communication channels in ...
Muhammad Usama, Muhammad Usman Hadi
wiley   +1 more source

Materials and System Design for Self‐Decision Bioelectronic Systems

open access: yesAdvanced Materials, Volume 38, Issue 9, 12 February 2026.
This review highlights how self‐decision bioelectronic systems integrate sensing, computation, and therapy into autonomous, closed‐loop platforms that continuously monitor and treat diseases, marking a major step toward intelligent, self‐regulating healthcare technologies.
Qiankun Zeng   +9 more
wiley   +1 more source

Terahertz Waveform‐Selective Antenna Using a Patch Structure Loaded with Nonlinear Circuits

open access: yesAdvanced Photonics Research, Volume 7, Issue 2, February 2026.
A waveform‐selective antenna that integrates the functions of waveform selectivity, electromagnetic shielding, and EM wave radiation has been proposed. By integrating different nonlinear circuits and selecting appropriate component values, the antenna can achieve high reflection of either a pulse wave or a continuous wave, while allowing the other ...
Zeting Li, Kai‐Da Xu, Pin Wen
wiley   +1 more source

Active digital spoof plasmonics [PDF]

open access: yesNational Science Review, 2019
Abstract Digital coding and digital modulation are the foundation of modern information science. The combination of digital technology with metamaterials provides a powerful scheme for spatial and temporal controls of electromagnetic waves. Such a technique, however, has thus far been limited to the control of free-space light.
Zhang, Hao Chi   +6 more
openaire   +2 more sources

Protocol‐Agnostic Meta Key Distribution for Encrypted Wireless Communications Enabled by Space‐Time‐Coding Metasurface

open access: yesAdvanced Science, Volume 13, Issue 7, 3 February 2026.
This paper presents a programmable metasurface‐based Meta Key Distribution (MKD) system for secure, protocol‐independent key exchange in indoor wireless settings. By embedding entropy into the wireless channel, it enables lightweight, compatible cryptographic key generation.
Xinyu Li   +7 more
wiley   +1 more source

Home - About - Disclaimer - Privacy