Secure Trajectory Planning Against Undetectable Spoofing Attacks [PDF]
This paper studies, for the first time, the trajectory planning problem in adversarial environments, where the objective is to design the trajectory of a robot to reach a desired final state despite the unknown and arbitrary action of an attacker.
Bianchin, Gianluca +2 more
core +5 more sources
Spoofing Attack Results Determination in Code Domain Using a Spoofing Process Equation. [PDF]
When a user receiver is tracking an authentic signal, a spoofing signal can be transmitted to the user antenna. The question is under what conditions does the tracking point of the receiver move from the authentic signal to the spoofing signal? In this study, we develop a spoofing process equation (SPE) that can be used to calculate the tracking point ...
Shin B +5 more
europepmc +4 more sources
Launching Email Spoofing Attacks
To launch a spoofing attack with emails we need to have knowledge of the techniques to launch an email spoofing attack. Spoofing has been widely discussed in documents on the Internet. Email spoofing is termed as an attack on email users who are sent emails from email addresses that are fake or altered.
Kunal Pandove +2 more
openaire +2 more sources
Deep Learning-Based Location Spoofing Attack Detection and Time-of-Arrival Estimation through Power Received in IoT Networks. [PDF]
Aldosari W.
europepmc +3 more sources
Secure localization of land vehicles under GPS spoofing attack with decomposition Kalman filter. [PDF]
Zhao M, Han Z, Wang E, Liu J.
europepmc +3 more sources
Exploring Multi-Channel GPS Receivers for Detecting Spoofing Attacks on UAVs Using Machine Learning. [PDF]
Mouzai M +3 more
europepmc +3 more sources
Active eavesdropping via spoofing relay attack [PDF]
This paper studies a new active eavesdropping technique via the so-called spoofing relay attack, which could be launched by the eavesdropper to significantly enhance the information leakage rate from the source over conventional passive eaves-dropping.
Zeng, Yong, Zhang, Rui
openaire +2 more sources
Spoofing Attack Detection by Anomaly Detection [PDF]
Spoofing attacks on biometric systems can seriously compromise their practical utility. In this paper we focus on face spoofing detection. The majority of papers on spoofing attack detection formulate the problem as a two or multiclass learning task, attempting to separate normal accesses from samples of different types of spoofing attacks.
Fatemifar, Soroush +3 more
openaire +3 more sources
Improving Gait Biometrics under Spoofing Attacks [PDF]
Gait is a relatively new biometric modality which has a precious advantage over other modalities, such as iris and voice, in that it can be easily captured from a distance. While it has recently become a topic of great interest in biometric research, there has been little investigation into gait spoofing attacks where a person tries to imitate the ...
Hadid, Abdenour +3 more
openaire +4 more sources
Ensemble Machine Learning Models Utilizing a Hybrid Recursive Feature Elimination (RFE) Technique for Detecting GPS Spoofing Attacks Against Unmanned Aerial Vehicles. [PDF]
Al-Syouf R +3 more
europepmc +3 more sources

