Results 51 to 60 of about 45,521 (247)

A New GNSS Spoofing Detection Method Using Two Antennas

open access: yesIEEE Access, 2020
The security of global navigation satellite system (GNSS) has attracted a lot of attention recently. The spoofing detection method using multi-antenna array is one of the most efficient spoofing detection methods due to its unique geometry space. However,
Jiajia Chen   +3 more
doaj   +1 more source

Spoofer-to-Target Association in Multi-Spoofer Multi-Target Scenario for Stealthy GPS Spoofing

open access: yesIEEE Access, 2021
Global navigation satellite system (GNSS) based navigation is omnipresent in today’s world, providing position, velocity, and time (PVT) information with inexpensive GPS receivers.
Bethi Pardhasaradhi   +2 more
doaj   +1 more source

Combinatorial Bounds and Characterizations of Splitting Authentication Codes

open access: yes, 2010
We present several generalizations of results for splitting authentication codes by studying the aspect of multi-fold security. As the two primary results, we prove a combinatorial lower bound on the number of encoding rules and a combinatorial ...
B Du   +26 more
core   +1 more source

Image and video analysis using graph neural network for Internet of Medical Things and computer vision applications

open access: yesCAAI Transactions on Intelligence Technology, EarlyView.
Abstract Graph neural networks (GNNs) have revolutionised the processing of information by facilitating the transmission of messages between graph nodes. Graph neural networks operate on graph‐structured data, which makes them suitable for a wide variety of computer vision problems, such as link prediction, node classification, and graph classification.
Amit Sharma   +4 more
wiley   +1 more source

A GPS-Adaptive Spoofing Detection Method for the Small UAV Cluster

open access: yesDrones, 2023
The small UAV (unmanned aerial vehicle) cluster has become an important trend in the development of UAVs because it has the advantages of being unmanned, having a small size and low cost, and ability to complete many collaborative tasks.
Lianxiao Meng   +3 more
doaj   +1 more source

Information Theoretic Authentication and Secrecy Codes in the Splitting Model

open access: yes, 2011
In the splitting model, information theoretic authentication codes allow non-deterministic encoding, that is, several messages can be used to communicate a particular plaintext.
Huber, Michael
core   +1 more source

Materials and System Design for Self‐Decision Bioelectronic Systems

open access: yesAdvanced Materials, Volume 38, Issue 9, 12 February 2026.
This review highlights how self‐decision bioelectronic systems integrate sensing, computation, and therapy into autonomous, closed‐loop platforms that continuously monitor and treat diseases, marking a major step toward intelligent, self‐regulating healthcare technologies.
Qiankun Zeng   +9 more
wiley   +1 more source

Face De-spoofing: Anti-spoofing via Noise Modeling [PDF]

open access: yes, 2018
To appear in ECCV 2018.
Jourabloo, Amin   +2 more
openaire   +2 more sources

Protocol‐Agnostic Meta Key Distribution for Encrypted Wireless Communications Enabled by Space‐Time‐Coding Metasurface

open access: yesAdvanced Science, Volume 13, Issue 7, 3 February 2026.
This paper presents a programmable metasurface‐based Meta Key Distribution (MKD) system for secure, protocol‐independent key exchange in indoor wireless settings. By embedding entropy into the wireless channel, it enables lightweight, compatible cryptographic key generation.
Xinyu Li   +7 more
wiley   +1 more source

Artificial Intelligence in Multimedia Content Generation: A Review of Audio and Video Synthesis Techniques

open access: yesJournal of the Society for Information Display, Volume 34, Issue 2, Page 49-67, February 2026.
Modern AI systems can now synthesize coherent multimedia experiences, generating video and audio directly from text prompts. These unified frameworks represent a rapid shift toward controllable and synchronized content creation. From early neural architectures to transformer and diffusion paradigms, this paper contextualizes the ongoing evolution of ...
Charles Ding, Rohan Bhowmik
wiley   +1 more source

Home - About - Disclaimer - Privacy