Results 51 to 60 of about 37,470 (199)
Audio-replay attack detection countermeasures
This paper presents the Speech Technology Center (STC) replay attack detection systems proposed for Automatic Speaker Verification Spoofing and Countermeasures Challenge 2017.
Kozlov, Alexander +5 more
core +1 more source
Advanced Hybrid Techniques for Cyberattack Detection and Defense in IoT Networks
ABSTRACT The Internet of Things (IoT) represents a vast network of devices connected to the Internet, making it easier for users to connect to modern technology. However, the complexity of these networks and the large volume of data pose significant challenges in protecting them from persistent cyberattacks, such as distributed denial‐of‐service (DDoS)
Zaed S. Mahdi +2 more
wiley +1 more source
PIANO: Proximity-based User Authentication on Voice-Powered Internet-of-Things Devices
Voice is envisioned to be a popular way for humans to interact with Internet-of-Things (IoT) devices. We propose a proximity-based user authentication method (called PIANO) for access control on such voice-powered IoT devices.
Bao, Xuan +7 more
core +1 more source
Abstract Graph neural networks (GNNs) have revolutionised the processing of information by facilitating the transmission of messages between graph nodes. Graph neural networks operate on graph‐structured data, which makes them suitable for a wide variety of computer vision problems, such as link prediction, node classification, and graph classification.
Amit Sharma +4 more
wiley +1 more source
Towards effective GNSS repeater spoofing: performance evaluation and power control
Global Navigation Satellite System (GNSS) repeater spoofing is an effective technique for countering threats posed by unmanned aerial vehicles (UAVs), particularly against authorized signals. However, ensuring the effectiveness of such spoofing remains a
Lixun Li +4 more
doaj +1 more source
A GNSS Spoofing Detection and Direction-Finding Method Based on Low-Cost Commercial Board Components
The Global Navigation Satellite System (GNSS) is vulnerable to deliberate spoofing signal attacks. Once the user wrongly locks on the spoofing signal, the wrong position, velocity, and time (PVT) information will be calculated, which will harm the user ...
Pengrui Mao +9 more
doaj +1 more source
Face De-spoofing: Anti-spoofing via Noise Modeling [PDF]
To appear in ECCV 2018.
Jourabloo, Amin +2 more
openaire +2 more sources
From the Ground to the Stars: The Vertical Politics of the EU Drone Wall and Airspace Defence
Abstract This research note analyses the European Commission's Defence Readiness Roadmap 2030 as a manifestation of a new spatial and technological logic of European defence: the vertical territorialisation of security. Moving beyond traditional perimeter‐based understandings of territorial defence, the Roadmap constructs a multi‐layered continuum ...
Justinas Lingevicius +2 more
wiley +1 more source
A GPS-Adaptive Spoofing Detection Method for the Small UAV Cluster
The small UAV (unmanned aerial vehicle) cluster has become an important trend in the development of UAVs because it has the advantages of being unmanned, having a small size and low cost, and ability to complete many collaborative tasks.
Lianxiao Meng +3 more
doaj +1 more source
Abstract Cyanobacteria are cosmopolitan, important components of biomass with a remarkable ability to synthesize a diverse array of bioactive compounds, some of which may have toxic effects on other organisms and ecosystems. In this study, filamentous cyanobacterial strains isolated predominantly from temperate European freshwaters (Aphanizomenon ...
Łukasz Wejnerowski +14 more
wiley +1 more source

