Results 81 to 90 of about 37,470 (199)

Why Autonomous Vehicles Are Not Ready Yet: A Multi‐Disciplinary Review of Problems, Attempted Solutions, and Future Directions

open access: yesJournal of Field Robotics, Volume 43, Issue 3, Page 2254-2341, May 2026.
ABSTRACT Personal autonomous vehicles can sense their surrounding environment, plan their route, and drive with little or no involvement of human drivers. Despite the latest technological advancements and the hopeful announcements made by leading entrepreneurs, to date no personal vehicle is approved for road circulation in a “fully” or “semi ...
Xingshuai Dong   +13 more
wiley   +1 more source

On the Optimal Selection of Mel‐Frequency Cepstral Coefficients for Voice Deepfake Detection

open access: yesExpert Systems, Volume 43, Issue 5, May 2026.
ABSTRACT The continuous evolution of techniques for generating manipulated audio, known as voice deepfakes, and the widespread availability of tools that produce convincing forgeries have created an urgent need for reliable detection methods. This work considers the dimensionality of Mel‐Frequency Cepstral Coefficients (MFCCs) as a core design variable
Sergio A. Falcón‐López   +3 more
wiley   +1 more source

Random-Training-Assisted Pilot Spoofing Detection and Security Enhancement

open access: yesIEEE Access, 2017
The pilot spoofing attack is considered as an active eavesdropping activity launched by an adversary during the reverse channel training phase. By transmitting the same pilot signal as the legitimate user, the pilot spoofing attack is able to degrade the
Xiaowen Tian, Ming Li, Qian Liu
doaj   +1 more source

Ruthenium Nanoparticle‐On‐Cavity Refractory Thermoplasmonics for Broadband and Spectral‐Selective Solar Photothermal Conversion

open access: yesAdvanced Photonics Research, Volume 7, Issue 4, April 2026.
We identify ruthenium as a refractory plasmonic material exhibiting dual ENZ optical topological transitions and dual plasmonic resonances spanning from visible to infrared region with high imaginary permittivity. We establish a nanoparticle‐on‐cavity (NPoC) resonance mode and realize a NPoC selective solar absorber using cost‐effective additive ...
Zhequn Huang   +4 more
wiley   +1 more source

Identification and Authentication Failures: Foundational Aspects of Strong Detection Mechanisms

open access: yesEngineering Reports, Volume 8, Issue 4, April 2026.
A review of recent techniques for detecting Identification and Authentication Failures in online platforms storing sensitive user data. Analyzed methods include biometric, hierarchical, blockchain, IoT‐based, EPICS, and VAP authentication systems. ABSTRACT Online platforms, such as e‐commerce and online apps, have become crucial in daily activities ...
Md. Maruf Hassan   +2 more
wiley   +1 more source

Sparse Decomposition-Based Anti-Spoofing Framework for GNSS Receiver: Spoofing Detection, Classification, and Position Recovery

open access: yesRemote Sensing
Achieving reliable navigation is critical for GNSS receivers subject to spoofing attacks. Utilizing the inherent sparsity and inconsistency of spoofing signals, this paper proposes an anti-spoofing framework for GNSS receivers to detect, classify, and ...
Yuxin He, Xuebin Zhuang, Bing Xu
doaj   +1 more source

Access Control in Healthcare IoT: A Comprehensive Survey

open access: yesEngineering Reports, Volume 8, Issue 4, April 2026.
This survey analyses access control mechanisms in Healthcare IoT, reviewing traditional and emerging models, identifying security and privacy challenges, and highlighting open research issues. It provides a comparative perspective to support the design of secure, scalable, and patient‐centric healthcare IoT systems.
Aleena Nazir   +3 more
wiley   +1 more source

Impact Assessment of GNSS Spoofing Attacks on INS/GNSS Integrated Navigation System

open access: yesSensors, 2018
In the face of emerging Global Navigation Satellite System (GNSS) spoofing attacks, there is a need to give a comprehensive analysis on how the inertial navigation system (INS)/GNSS integrated navigation system responds to different kinds of spoofing ...
Yang Liu   +3 more
doaj   +1 more source

Two-Step Trajectory Spoofing Algorithm for Loosely Coupled GNSS/IMU and NIS Sequence Detection

open access: yesIEEE Access, 2019
Satellite navigation spoofing has become a central issue of jamming technology research because of its serious threat and ability to conceal itself. Increasingly, targets are equipped with more robust GNSS/IMU systems and normalized innovation squared ...
Yangjun Gao, Zhiwei Lv, Lundong Zhang
doaj   +1 more source

A Spoofing Detection and Direction-Finding Approach for Global Navigation Satellite System Signals Using Off-the-Shelf Anti-Jamming Antennas

open access: yesRemote Sensing
Global Navigation Satellite System (GNSS) spoofing induces the target receiver to obtain the wrong positioning and timing results, which is very harmful.
Ruimin Jin   +8 more
doaj   +1 more source

Home - About - Disclaimer - Privacy