Results 41 to 50 of about 22,758 (191)
Deep learning has significantly improved the performance of fingerprint liveness detection, while susceptibility to adversarial attacks remains a critical security challenge. Existing input transformation–based defense methods, including JPEG compression, total variance minimization (TVM), high‐level representation guided denoiser (HGD), and Defed, are
Shuifa Sun +7 more
wiley +1 more source
Conditional Synthetic Live and Spoof Fingerprint Generation
Large fingerprint datasets, while important for training and evaluation, are time‐consuming and expensive to collect and require strict privacy measures. Researchers are exploring the use of synthetic fingerprint data to address these issues. This article presents a novel approach for generating synthetic fingerprint images (both spoof and live ...
Syed Konain Abbas +8 more
wiley +1 more source
Face Recognition Systems Under Spoofing Attacks [PDF]
In this chapter, we give an overview of spoofing attacks and spoofing countermeasures for face recognition systems , with a focus on visual spectrum systems (VIS) in 2D and 3D, as well as near-infrared (NIR) and multispectral systems . We cover the existing types of spoofing attacks and report on their success to bypass several state-of-the-art face ...
Ivana Chingovska +3 more
openaire +1 more source
Mitigation of ADS-B Spoofing Attack Impact on Departure Sequencing Through Modulated Synchronous Taxiing Approach [PDF]
Mohd Ruzeiny Bin Kamaruzzaman +3 more
openalex +1 more source
Unified Physical–Digital Face Attack Detection Challenge: A Review
Face antispoofing (FAS) technologies play a pivotal role in safeguarding face recognition (FR) systems against potential security loopholes. The biometric community has witnessed significant advancements lately, largely due to the exceptional performance of deep learning architectures and the abundance of substantial datasets.
Junze Zheng +12 more
wiley +1 more source
Communication‐Security Co‐Design for Federated Learning in Grant‐Free NOMA IoT Networks
This article presents SA‐PPO, a Security‐Aware Proximal Policy Optimisation framework for federated learning over grant‐free NOMA (non‐orthogonal multiple access) in IoT networks. By jointly optimising access control, resource allocation, and trust‐weighted aggregation using cross‐layer indicators, SA‐PPO enhances both communication reliability and ...
Emmanuel Atebawone +5 more
wiley +1 more source
This paper investigates the security consensus of time‐varying multi‐agent systems (MASs) on time scales, introducing Bernoulli‐distributed random variables to model node attacks and their probabilities. By proposing a control method combining data sampling and time‐varying window impulses, it relaxes fixed impulsive timing constraints, reduces ...
Boling Zhou +6 more
wiley +1 more source
FACIAL VERIFICATION ALONG WITH SPOOF ATTACKS.
Face biometrics assumes an essential part in different authentication applications.Yet, there is a design issues exists to ensure the genuine person along with its originality being alived.For the improvement of such kind of robust framework of face verification along with anitspoofing, the database should include three kinds of data i.e.Genuine, Fake ...
J. Sirisha Devi +3 more
openaire +1 more source
Signal Identification and Entrainment for Practical FMCW Radar Spoofing Attacks [PDF]
Andrew Graff, Todd E. Humphreys
openalex +1 more source
The charging station (CS) plays a crucial role in charging electric vehicles. Therefore, it is necessary to protect the CS from cyberattacks. This paper proposes an architecture for the security of the EV fleet during charging using the XGBoost model and Hyperledger Fabric to protect battery management systems (BMS) from cyberattacks.
Gaurav Kumar, Suresh Mikkili
wiley +1 more source

