Results 61 to 70 of about 22,758 (191)
Physical Layer Spoofing Against Eavesdropping Attacks
In this work, we propose a defense mechanism against an eavesdropper attack with the help of a spoofer node. The purpose of the legitimate transmitter is to send a confidential message without revealing it to the eavesdropper. The spoofer node aims at masking the transmission of the confidential message by emitting a falsifying signal.
Topal, Ozan Alp +6 more
openaire +2 more sources
Spoofing Attack on Ultrasonic Distance Sensors Using a Continuous Signal. [PDF]
Gluck T +4 more
europepmc +1 more source
A Review on fusion in Multimodal Biometric Spoofing Attack by Different Materials
Rohit Agarwal
openalex +1 more source
Robust Indoor Localization Methods Using Random Forest-Based Filter against MAC Spoofing Attack. [PDF]
Ko D, Choi SH, Ahn S, Choi YH.
europepmc +1 more source
Attacking CNN-based anti-spoofing face authentication in the physical domain [PDF]
Bowen Zhang +2 more
openalex +1 more source
An Effective Approach to Detect and Prevent ARP Spoofing Attacks on WLAN
Hiba Nasser, Mohammed Ali Hussain
openalex +1 more source
The 2nd competition on counter measures to 2D face spoofing attacks
Ivana Chingovska +34 more
openalex +2 more sources
Swap It Like Its Hot: Segmentation-based spoof attacks on eye-tracking images [PDF]
Anish S. Narkar, Brendan David-John
openalex +1 more source
The Impact of Spoofing Attacks in Connected Autonomous Vehicles under Traffic Congestion Conditions [PDF]
Zisis-Rafail Tzoannos +3 more
openalex +1 more source

