Face Anti-Spoofing Based on Adaptive Channel Enhancement and Intra-Class Constraint. [PDF]
Li Y, Sun W, Li Z, Guo X.
europepmc +1 more source
Audio Deepfake Detection via a Fuzzy Dual-Path Time-Frequency Attention Network. [PDF]
Li J +6 more
europepmc +1 more source
CTDNN-Spoof: compact tiny deep learning architecture for detection and multi-label classification of GPS spoofing attacks in small UAVs. [PDF]
Almadhor A +5 more
europepmc +1 more source
End-to-end deep learning for smart maritime threat detection: an AE-CNN-LSTM-based approach. [PDF]
Anuja R, Annrose J.
europepmc +1 more source
From Vulnerability to Resilience: Securing Signal Transmission Against Jamming and Spoofing Attacks
Yang, Hanchao
openalex +1 more source
DNS-Sensor: A Sensor-Driven Architecture for Real-Time DNS Cache Poisoning Detection and Mitigation. [PDF]
Yu H +5 more
europepmc +1 more source
Multi-Agent Reinforcement Learning-Based Passenger Spoofing Attack on Mobility-as-a-Service
Kai-Fung Chu, Weisi Guo
openalex +2 more sources
Related searches:
Gait biometrics under spoofing attacks: an experimental investigation
Journal of Electronic Imaging, 2015Gait is a relatively biometric modality which has a precious advantage over other modalities, such as iris and voice, in that it can be easily captured from a distance. Although it has recently become a topic of great interest in biometric research, there has been little investigation into gait spoofing attacks where a person tries to imitate the ...
Hadid, Abdenour +5 more
openaire +2 more sources
Classification of Spoofing Attack Types
2018 European Navigation Conference (ENC), 2018All spoofer attacks have different requirements, impacts, success rates and objectives; therefore, to assess the threat and to develop appropriate counter measures, a clear classification is needed. Being aware of the different existing types of threats, allows an improved design of preventative measures to counter these attacks.
J. Rossouw van der Merwe +4 more
openaire +1 more source
Quickest detection of GPS spoofing attack
MILCOM 2012 - 2012 IEEE Military Communications Conference, 2012GPS is being increasingly used in critical infrastructures in modern society. Therefore, the reliability of GPS is extremely important. Recently, the vulnerability of GPS to a spoofing attack has been discussed in the literature. A malicious attacker may spoof a GPS receiver, causing it to provide incorrect navigation and timing information, which may ...
Zhenghao Zhang +3 more
openaire +1 more source

