Results 31 to 40 of about 37,470 (199)
Spoof Diarization: "What Spoofed When" in Partially Spoofed Audio
This paper defines Spoof Diarization as a novel task in the Partial Spoof (PS) scenario. It aims to determine what spoofed when, which includes not only locating spoof regions but also clustering them according to different spoofing methods. As a pioneering study in spoof diarization, we focus on defining the task, establishing evaluation metrics, and ...
Zhang, Lin +6 more
openaire +2 more sources
Development status and challenges of anti-spoofing technology of GNSS/INS integrated navigation
The threat of spoofing interference has posed a severe challenge to the security application of Global Navigation Satellite System (GNSS). It is particularly urgent and critical to carry out in-depth defense research on spoofing interference.
Lei Wang +11 more
doaj +1 more source
Anti-spoofing Methods for Automatic SpeakerVerification System
Growing interest in automatic speaker verification (ASV)systems has lead to significant quality improvement of spoofing attackson them. Many research works confirm that despite the low equal er-ror rate (EER) ASV systems are still vulnerable to spoofing ...
Lavrentyeva, Galina +2 more
core +1 more source
An autonomous GNSS anti-spoofing technique [PDF]
open3siIn recent years, the problem of Position, Navigation and Timing (PNT) resiliency has received significant attention due to an increasing awareness on threats and the vulnerability of the current GNSS signals.
Christian Wullems +2 more
core +1 more source
Foundations of GNSS Spoofing Detection and Mitigation with Distributed GNSS SDR Receiver [PDF]
GNSS spoofing is an intentional and malicious action aimed at degrading and suppressing GNSS Positioning, Navigation, and Timing (PNT) services. Since it affects data and information segment of GNSS, it is considered a GNSS information (cyber-) security ...
Mia Filic
doaj +1 more source
Visual/Inertial/GNSS Integrated Navigation System under GNSS Spoofing Attack
Visual/Inertial/GNSS (VIG) integrated navigation and positioning systems are widely used in unmanned vehicles and other systems. This VIG system is vulnerable to of GNSS spoofing attacks.
Nianzu Gu, Fei Xing, Zheng You
doaj +1 more source
On Disentangling Spoof Trace for Generic Face Anti-spoofing [PDF]
Prior studies show that the key to face anti-spoofing lies in the subtle image pattern, termed "spoof trace", e.g., color distortion, 3D mask edge, Moire pattern, and many others. Designing a generic anti-spoofing model to estimate those spoof traces can improve not only the generalization of the spoof detection, but also the interpretability of the ...
Liu, Yaojie +2 more
openaire +2 more sources
How far did we get in face spoofing detection?
The growing use of control access systems based on face recognition shed light over the need for even more accurate systems to detect face spoofing attacks.
Oliveira, Luciano +3 more
core +2 more sources
Global navigation satellite system (GNSS) is widely recognised to be vulnerable to spoofing attacks. A sophisticated form of GNSS spoofing, termed distributed spoofing, transmits each spoofing signal through dedicated antennas.
Minghan Zhong +3 more
doaj +1 more source
Investigasi Email Spoofing dengan Metode Digital Forensics Research Workshop (DFRWS)
Email spoofing merupakan kegiatan melakukan manipulasi data pada header email. Serangan yang paling terkenal dari email spoofing adalah serangan phishing, Tujuan dilakukan penelitian ini adalah untuk memberi wawasan tentang cara kerja melakukan ...
Andri Lesmana Suryana +2 more
doaj +1 more source

