Results 61 to 70 of about 45,521 (247)
PIANO: Proximity-based User Authentication on Voice-Powered Internet-of-Things Devices
Voice is envisioned to be a popular way for humans to interact with Internet-of-Things (IoT) devices. We propose a proximity-based user authentication method (called PIANO) for access control on such voice-powered IoT devices.
Bao, Xuan +7 more
core +1 more source
Mitigation of ADS-B Spoofing Attack Impact on Departure Sequencing Through Modulated Synchronous Taxiing Approach [PDF]
Mohd Ruzeiny Bin Kamaruzzaman +3 more
openalex +1 more source
a) Schematic of the SSPP waveguide integrated with SRR metamaterial and MEMS actuator arrays with electric field confinement in the gap below the microbridge. b) Cross‐section of the MEMS actuator consists of a buried lead line and a microbridge at different deflection positions. c) The notch band in the microwave transmission characteristic shifts due
Van Minh Nguyen, Yoshiaki Kanamori
wiley +1 more source
Spoofing Attack Results Determination in Code Domain Using a Spoofing Process Equation
When a user receiver is tracking an authentic signal, a spoofing signal can be transmitted to the user antenna. The question is under what conditions does the tracking point of the receiver move from the authentic signal to the spoofing signal?
Beomju Shin +5 more
doaj +1 more source
This work presents an ultrathin terahertz metamaterial absorber that achieves broadband and polarization‐insensitive performance through multimode spoof‐plasmon resonances and tunable indium tin oxide loss engineering. The absorber offers near‐Rozanov‐limit thickness and optical transparency, enabling integration into compact and multifunctional THz ...
Jinlin Mu +8 more
wiley +1 more source
How far did we get in face spoofing detection?
The growing use of control access systems based on face recognition shed light over the need for even more accurate systems to detect face spoofing attacks.
Oliveira, Luciano +3 more
core +2 more sources
Time‐Domain Near‐Field Scanning Microscopy of Terahertz Metasurfaces
Time‐domain near‐field scanning terahertz microscopy provides direct access to subwavelength electromagnetic fields on metasurfaces. By combining controlled polarization excitation with nanoscale probing, this technique enables quantitative visualization of localized hotspots, surface‐wave propagation, and wavefront manipulation, offering a powerful ...
Ruxue Wei, Soren Petersen, Weili Zhang
wiley +1 more source
Detection of Induced GNSS Spoofing Using S-Curve-Bias
In Global Navigation Satellite System (GNSS), a spoofing attack consists of forged signals which possibly cause the attacked receivers to deduce a false position, a false clock, or both.
Wenyi Wang +3 more
doaj +1 more source
Capacitive Mems Actuator Arrays In their Research Article (10.1002/adpr.202500228), Van Minh Nguyen, Yoshiaki Kanamori, and co‐workers present a SSPP waveguide integrated with SRR metamaterial and MEMS actuator arrays with electric field confinement in the gap below the micro‐bridge.
Van Minh Nguyen, Yoshiaki Kanamori
wiley +1 more source
Advanced GNSS Spoofing Detection: Aggregated Correlation Residue Likelihood Analysis
Compared to conventional spoofing, emerging spoofing attacks pose a heightened threat to security applications within the global navigation satellite system (GNSS) due to their subtly designed signal structures.
Ning Ji +3 more
doaj +1 more source

