Results 61 to 70 of about 45,521 (247)

PIANO: Proximity-based User Authentication on Voice-Powered Internet-of-Things Devices

open access: yes, 2017
Voice is envisioned to be a popular way for humans to interact with Internet-of-Things (IoT) devices. We propose a proximity-based user authentication method (called PIANO) for access control on such voice-powered IoT devices.
Bao, Xuan   +7 more
core   +1 more source

Mitigation of ADS-B Spoofing Attack Impact on Departure Sequencing Through Modulated Synchronous Taxiing Approach [PDF]

open access: gold, 2023
Mohd Ruzeiny Bin Kamaruzzaman   +3 more
openalex   +1 more source

Design and Fabrication of Capacitive Mems Actuator Array on Spoof‐Surface‐Plasmon‐Polariton Waveguide for Active Microwave Modulation

open access: yesAdvanced Photonics Research, Volume 7, Issue 1, January 2026.
a) Schematic of the SSPP waveguide integrated with SRR metamaterial and MEMS actuator arrays with electric field confinement in the gap below the microbridge. b) Cross‐section of the MEMS actuator consists of a buried lead line and a microbridge at different deflection positions. c) The notch band in the microwave transmission characteristic shifts due
Van Minh Nguyen, Yoshiaki Kanamori
wiley   +1 more source

Spoofing Attack Results Determination in Code Domain Using a Spoofing Process Equation

open access: yesSensors, 2019
When a user receiver is tracking an authentic signal, a spoofing signal can be transmitted to the user antenna. The question is under what conditions does the tracking point of the receiver move from the authentic signal to the spoofing signal?
Beomju Shin   +5 more
doaj   +1 more source

Ultrathin Broadband Terahertz Metamaterial Absorber Based on Multimode Spoof Localized Surface Plasmon Resonators

open access: yesAdvanced Photonics Research, Volume 7, Issue 1, January 2026.
This work presents an ultrathin terahertz metamaterial absorber that achieves broadband and polarization‐insensitive performance through multimode spoof‐plasmon resonances and tunable indium tin oxide loss engineering. The absorber offers near‐Rozanov‐limit thickness and optical transparency, enabling integration into compact and multifunctional THz ...
Jinlin Mu   +8 more
wiley   +1 more source

How far did we get in face spoofing detection?

open access: yes, 2018
The growing use of control access systems based on face recognition shed light over the need for even more accurate systems to detect face spoofing attacks.
Oliveira, Luciano   +3 more
core   +2 more sources

Time‐Domain Near‐Field Scanning Microscopy of Terahertz Metasurfaces

open access: yesAdvanced Photonics Research, Volume 7, Issue 1, January 2026.
Time‐domain near‐field scanning terahertz microscopy provides direct access to subwavelength electromagnetic fields on metasurfaces. By combining controlled polarization excitation with nanoscale probing, this technique enables quantitative visualization of localized hotspots, surface‐wave propagation, and wavefront manipulation, offering a powerful ...
Ruxue Wei, Soren Petersen, Weili Zhang
wiley   +1 more source

Detection of Induced GNSS Spoofing Using S-Curve-Bias

open access: yesSensors, 2019
In Global Navigation Satellite System (GNSS), a spoofing attack consists of forged signals which possibly cause the attacked receivers to deduce a false position, a false clock, or both.
Wenyi Wang   +3 more
doaj   +1 more source

Cover Feature: Design and Fabrication of Capacitive Mems Actuator Array on Spoof‐Surface‐Plasmon‐Polariton Waveguide for Active Microwave Modulation (Adv. Photonics Res. 1/2026)

open access: yesAdvanced Photonics Research, Volume 7, Issue 1, January 2026.
Capacitive Mems Actuator Arrays In their Research Article (10.1002/adpr.202500228), Van Minh Nguyen, Yoshiaki Kanamori, and co‐workers present a SSPP waveguide integrated with SRR metamaterial and MEMS actuator arrays with electric field confinement in the gap below the micro‐bridge.
Van Minh Nguyen, Yoshiaki Kanamori
wiley   +1 more source

Advanced GNSS Spoofing Detection: Aggregated Correlation Residue Likelihood Analysis

open access: yesRemote Sensing
Compared to conventional spoofing, emerging spoofing attacks pose a heightened threat to security applications within the global navigation satellite system (GNSS) due to their subtly designed signal structures.
Ning Ji   +3 more
doaj   +1 more source

Home - About - Disclaimer - Privacy