Results 51 to 60 of about 45,521 (247)
A New GNSS Spoofing Detection Method Using Two Antennas
The security of global navigation satellite system (GNSS) has attracted a lot of attention recently. The spoofing detection method using multi-antenna array is one of the most efficient spoofing detection methods due to its unique geometry space. However,
Jiajia Chen +3 more
doaj +1 more source
Spoofer-to-Target Association in Multi-Spoofer Multi-Target Scenario for Stealthy GPS Spoofing
Global navigation satellite system (GNSS) based navigation is omnipresent in today’s world, providing position, velocity, and time (PVT) information with inexpensive GPS receivers.
Bethi Pardhasaradhi +2 more
doaj +1 more source
Combinatorial Bounds and Characterizations of Splitting Authentication Codes
We present several generalizations of results for splitting authentication codes by studying the aspect of multi-fold security. As the two primary results, we prove a combinatorial lower bound on the number of encoding rules and a combinatorial ...
B Du +26 more
core +1 more source
Abstract Graph neural networks (GNNs) have revolutionised the processing of information by facilitating the transmission of messages between graph nodes. Graph neural networks operate on graph‐structured data, which makes them suitable for a wide variety of computer vision problems, such as link prediction, node classification, and graph classification.
Amit Sharma +4 more
wiley +1 more source
A GPS-Adaptive Spoofing Detection Method for the Small UAV Cluster
The small UAV (unmanned aerial vehicle) cluster has become an important trend in the development of UAVs because it has the advantages of being unmanned, having a small size and low cost, and ability to complete many collaborative tasks.
Lianxiao Meng +3 more
doaj +1 more source
Information Theoretic Authentication and Secrecy Codes in the Splitting Model
In the splitting model, information theoretic authentication codes allow non-deterministic encoding, that is, several messages can be used to communicate a particular plaintext.
Huber, Michael
core +1 more source
Materials and System Design for Self‐Decision Bioelectronic Systems
This review highlights how self‐decision bioelectronic systems integrate sensing, computation, and therapy into autonomous, closed‐loop platforms that continuously monitor and treat diseases, marking a major step toward intelligent, self‐regulating healthcare technologies.
Qiankun Zeng +9 more
wiley +1 more source
Face De-spoofing: Anti-spoofing via Noise Modeling [PDF]
To appear in ECCV 2018.
Jourabloo, Amin +2 more
openaire +2 more sources
This paper presents a programmable metasurface‐based Meta Key Distribution (MKD) system for secure, protocol‐independent key exchange in indoor wireless settings. By embedding entropy into the wireless channel, it enables lightweight, compatible cryptographic key generation.
Xinyu Li +7 more
wiley +1 more source
Modern AI systems can now synthesize coherent multimedia experiences, generating video and audio directly from text prompts. These unified frameworks represent a rapid shift toward controllable and synchronized content creation. From early neural architectures to transformer and diffusion paradigms, this paper contextualizes the ongoing evolution of ...
Charles Ding, Rohan Bhowmik
wiley +1 more source

