Results 141 to 150 of about 23,142 (187)
Cybersecurity in Radio Frequency Technologies: A Scientometric and Systematic Review with Implications for IoT and Wireless Applications. [PDF]
Araújo PR +3 more
europepmc +1 more source
Some of the next articles are maybe not open access.
Related searches:
Related searches:
Detection of Spoofing Medium Contours for Face Anti-Spoofing
IEEE Transactions on Circuits and Systems for Video Technology, 2021Face anti-spoofing is an important step for secure face recognition. In this paper, we target on building a general classifier to detect the face images with spoofing medium contours (termed as SMCs for simplicity). To this end, we consider the task of face anti-spoofing as the detection of SMCs from the image.
Xun Zhu +4 more
openaire +1 more source
Proceedings of the IEEE, 2016
Global navigation satellite signals can be spoofed by false signals, but special receivers can provide defenses against such attacks. The development of good spoofing defenses requires an understanding of the possible attack modes of a spoofer and the properties of those modes that can be exploited for defense purposes.
Mark L. Psiaki, Todd E. Humphreys
openaire +1 more source
Global navigation satellite signals can be spoofed by false signals, but special receivers can provide defenses against such attacks. The development of good spoofing defenses requires an understanding of the possible attack modes of a spoofer and the properties of those modes that can be exploited for defense purposes.
Mark L. Psiaki, Todd E. Humphreys
openaire +1 more source
Research Progress of GNSS Spoofing and Spoofing Detection Technology
2019 IEEE 19th International Conference on Communication Technology (ICCT), 2019With the highly implement of global satellite navigation system, the security and reliability of GNSS applications have attracted much attention, which raise the research attention of spoofing and spoofing detection technology. Research on GNSS spoofing and spoofing detection technology can improve the ability of navigation receiver to resist spoofing ...
Junzhi Li 0002 +3 more
openaire +1 more source
Robust features for spoofing detection
2016 International Conference on Advances in Computing, Communications and Informatics (ICACCI), 2016It is very important to enhance the robustness of Automatic Speaker Verification (ASV) systems against spoofing attacks. One of the recent research efforts in this direction is to derive features that are robust against spoofed speech. In this work, we experiment with the use of Cosine Normalised Phase-based Cepstral Coefficients (CNPCC) as inputs to a
A. Sathya +5 more
openaire +1 more source
Spoofing Detection by Distortion of the Correlation Function
2020 IEEE/ION Position, Location and Navigation Symposium (PLANS), 2020Open service GNSS signals are vulnerable to a spoofing attack where counterfeit signals are transmitted to deliberately mislead a user receiver. When the spoofer tries to capture the receiver's tracking loops or pull them away from the genuine signals the correlation function becomes distorted or multiple correlation peaks are present.
Turner, Michael +3 more
openaire +1 more source

