Results 31 to 40 of about 22,758 (191)
Fast Sequence Component Analysis for Attack Detection in Synchrophasor Networks [PDF]
Modern power systems have begun integrating synchrophasor technologies into part of daily operations. Given the amount of solutions offered and the maturity rate of application development it is not a matter of "if" but a matter of "when" in regards to ...
Barella, Richard +6 more
core +2 more sources
Pilot Spoofing Attack by Multiple Eavesdroppers
Accepted by IEEE Transaction on Wireless ...
Ke-Wen Huang +3 more
openaire +2 more sources
This paper presents a programmable metasurface‐based Meta Key Distribution (MKD) system for secure, protocol‐independent key exchange in indoor wireless settings. By embedding entropy into the wireless channel, it enables lightweight, compatible cryptographic key generation.
Xinyu Li +7 more
wiley +1 more source
Spatial spectrum approach for pilot spoofing attack detection in MIMO systems [PDF]
Lina Ning +4 more
openalex +1 more source
ABSTRACT Time and chronology form the invisible architecture upon which modern civilization depends, governing synchronization across markets, power grids, communication networks, transportation, and defense. Yet, this shared temporal framework, engineered through atomic clocks, satellites, and digital synchronization, faces growing vulnerabilities ...
Bilal M. Ayyub
wiley +1 more source
ADoPT: LiDAR Spoofing Attack Detection Based on Point-Level Temporal Consistency [PDF]
Minkyoung Cho +3 more
openalex +1 more source
ABSTRACT Unarguably, malware and their variants have metamorphosed into objects of attack and cyber warfare. These issues have directed research focus to modeling infrastructural settings and infection scenarios, analyzing propagation mechanisms, and conducting studies that highlight optimized remedial measures.
Chukwunonso Henry Nwokoye
wiley +1 more source
Spoofing Attack Augmentation: Can Differently-Trained Attack Models Improve Generalisation?
A reliable deepfake detector or spoofing countermeasure (CM) should be robust in the face of unpredictable spoofing attacks. To encourage the learning of more generaliseable artefacts, rather than those specific only to known attacks, CMs are usually exposed to a broad variety of different attacks during training.
Ge, Wanying +4 more
openaire +3 more sources
Robustness Analysis of Distributed CNN Model Training in Expression Recognition
Facial expression recognition is vital in pattern recognition and affective computing. With the advancement of deep learning, its performance has improved, yet challenges remain in nonlaboratory environments due to occlusion, poor lighting, and varying head poses.
Jun Li, Jun Wan
wiley +1 more source
Galileo and EGNOS as an asset for UTM safety and security [PDF]
GAUSS (Galileo-EGNOS as an Asset for UTM Safety and Security) is a H2020 project1 that aims at designing and developing high performance positioning systems for drones within the U-Space framework focusing on UAS (Unmanned Aircraft System) VLL (Very Low ...
Andrade-Cetto, Juan +7 more
core

