Results 81 to 90 of about 45,521 (247)

Robustness Analysis of Distributed CNN Model Training in Expression Recognition

open access: yesIET Biometrics, Volume 2026, Issue 1, 2026.
Facial expression recognition is vital in pattern recognition and affective computing. With the advancement of deep learning, its performance has improved, yet challenges remain in nonlaboratory environments due to occlusion, poor lighting, and varying head poses.
Jun Li, Jun Wan
wiley   +1 more source

Sparse Decomposition-Based Anti-Spoofing Framework for GNSS Receiver: Spoofing Detection, Classification, and Position Recovery

open access: yesRemote Sensing
Achieving reliable navigation is critical for GNSS receivers subject to spoofing attacks. Utilizing the inherent sparsity and inconsistency of spoofing signals, this paper proposes an anti-spoofing framework for GNSS receivers to detect, classify, and ...
Yuxin He, Xuebin Zhuang, Bing Xu
doaj   +1 more source

Usability Evaluation of a Push‐Based Passwordless Authentication Model Using Public‐Key Cryptography

open access: yesIET Biometrics, Volume 2026, Issue 1, 2026.
Despite major advancements in the sphere of the public‐key authentication specifically in the instances of the newly established standards like WebAuthn and the FIDO2, the practical implementation of the passwordless login systems is still hindered by the usability factors, platform‐related requirements, and the very nature of the deployment process is
Ghulam Mustafa   +6 more
wiley   +1 more source

Introducing Learnable Gaussian Noise Into Defed for Enhanced Defense Against Adversarial Attacks in Fingerprint Liveness Detection

open access: yesIET Biometrics, Volume 2026, Issue 1, 2026.
Deep learning has significantly improved the performance of fingerprint liveness detection, while susceptibility to adversarial attacks remains a critical security challenge. Existing input transformation–based defense methods, including JPEG compression, total variance minimization (TVM), high‐level representation guided denoiser (HGD), and Defed, are
Shuifa Sun   +7 more
wiley   +1 more source

Conditional Synthetic Live and Spoof Fingerprint Generation

open access: yesIET Biometrics, Volume 2026, Issue 1, 2026.
Large fingerprint datasets, while important for training and evaluation, are time‐consuming and expensive to collect and require strict privacy measures. Researchers are exploring the use of synthetic fingerprint data to address these issues. This article presents a novel approach for generating synthetic fingerprint images (both spoof and live ...
Syed Konain Abbas   +8 more
wiley   +1 more source

Two-Step Trajectory Spoofing Algorithm for Loosely Coupled GNSS/IMU and NIS Sequence Detection

open access: yesIEEE Access, 2019
Satellite navigation spoofing has become a central issue of jamming technology research because of its serious threat and ability to conceal itself. Increasingly, targets are equipped with more robust GNSS/IMU systems and normalized innovation squared ...
Yangjun Gao, Zhiwei Lv, Lundong Zhang
doaj   +1 more source

A Spoofing Detection and Direction-Finding Approach for Global Navigation Satellite System Signals Using Off-the-Shelf Anti-Jamming Antennas

open access: yesRemote Sensing
Global Navigation Satellite System (GNSS) spoofing induces the target receiver to obtain the wrong positioning and timing results, which is very harmful.
Ruimin Jin   +8 more
doaj   +1 more source

Cyclically Disentangled Feature Translation for Face Anti-spoofing

open access: diamond, 2023
Haixiao Yue   +6 more
openalex   +2 more sources

Home - About - Disclaimer - Privacy