Results 41 to 50 of about 22,758 (191)

Introducing Learnable Gaussian Noise Into Defed for Enhanced Defense Against Adversarial Attacks in Fingerprint Liveness Detection

open access: yesIET Biometrics, Volume 2026, Issue 1, 2026.
Deep learning has significantly improved the performance of fingerprint liveness detection, while susceptibility to adversarial attacks remains a critical security challenge. Existing input transformation–based defense methods, including JPEG compression, total variance minimization (TVM), high‐level representation guided denoiser (HGD), and Defed, are
Shuifa Sun   +7 more
wiley   +1 more source

Conditional Synthetic Live and Spoof Fingerprint Generation

open access: yesIET Biometrics, Volume 2026, Issue 1, 2026.
Large fingerprint datasets, while important for training and evaluation, are time‐consuming and expensive to collect and require strict privacy measures. Researchers are exploring the use of synthetic fingerprint data to address these issues. This article presents a novel approach for generating synthetic fingerprint images (both spoof and live ...
Syed Konain Abbas   +8 more
wiley   +1 more source

Face Recognition Systems Under Spoofing Attacks [PDF]

open access: yes, 2016
In this chapter, we give an overview of spoofing attacks and spoofing countermeasures for face recognition systems , with a focus on visual spectrum systems (VIS) in 2D and 3D, as well as near-infrared (NIR) and multispectral systems . We cover the existing types of spoofing attacks and report on their success to bypass several state-of-the-art face ...
Ivana Chingovska   +3 more
openaire   +1 more source

Mitigation of ADS-B Spoofing Attack Impact on Departure Sequencing Through Modulated Synchronous Taxiing Approach [PDF]

open access: gold, 2023
Mohd Ruzeiny Bin Kamaruzzaman   +3 more
openalex   +1 more source

Unified Physical–Digital Face Attack Detection Challenge: A Review

open access: yesIET Biometrics, Volume 2026, Issue 1, 2026.
Face antispoofing (FAS) technologies play a pivotal role in safeguarding face recognition (FR) systems against potential security loopholes. The biometric community has witnessed significant advancements lately, largely due to the exceptional performance of deep learning architectures and the abundance of substantial datasets.
Junze Zheng   +12 more
wiley   +1 more source

Communication‐Security Co‐Design for Federated Learning in Grant‐Free NOMA IoT Networks

open access: yesIET Communications, Volume 20, Issue 1, January/December 2026.
This article presents SA‐PPO, a Security‐Aware Proximal Policy Optimisation framework for federated learning over grant‐free NOMA (non‐orthogonal multiple access) in IoT networks. By jointly optimising access control, resource allocation, and trust‐weighted aggregation using cross‐layer indicators, SA‐PPO enhances both communication reliability and ...
Emmanuel Atebawone   +5 more
wiley   +1 more source

Window Impulsive Consensus of Time‐Varying Multi‐Agent Systems Under Deception Attacks on Time Scales

open access: yesIET Control Theory &Applications, Volume 20, Issue 1, January/December 2026.
This paper investigates the security consensus of time‐varying multi‐agent systems (MASs) on time scales, introducing Bernoulli‐distributed random variables to model node attacks and their probabilities. By proposing a control method combining data sampling and time‐varying window impulses, it relaxes fixed impulsive timing constraints, reduces ...
Boling Zhou   +6 more
wiley   +1 more source

FACIAL VERIFICATION ALONG WITH SPOOF ATTACKS.

open access: yesInternational Journal of Advanced Research, 2017
Face biometrics assumes an essential part in different authentication applications.Yet, there is a design issues exists to ensure the genuine person along with its originality being alived.For the improvement of such kind of robust framework of face verification along with anitspoofing, the database should include three kinds of data i.e.Genuine, Fake ...
J. Sirisha Devi   +3 more
openaire   +1 more source

Design and Implementation of XGBoost‐Based Cyberattack Detection and Blockchain‐Enabled Charging Station

open access: yesDigital Twins and Applications, Volume 3, Issue 1, January/December 2026.
The charging station (CS) plays a crucial role in charging electric vehicles. Therefore, it is necessary to protect the CS from cyberattacks. This paper proposes an architecture for the security of the EV fleet during charging using the XGBoost model and Hyperledger Fabric to protect battery management systems (BMS) from cyberattacks.
Gaurav Kumar, Suresh Mikkili
wiley   +1 more source

Home - About - Disclaimer - Privacy