Results 31 to 40 of about 23,142 (187)

Speech frame selection for spoofing detection with an application to partially spoofed audio-data [PDF]

open access: yesInternational Journal of Speech Technology, 2021
In this paper, we introduce a frame selection strategy for improved detection of spoofed speech. A countermeasure (CM) system typically uses a Gaussian mixture model (GMM) based classifier for computing the log-likelihood scores. The average log-likelihood ratio for all speech frames of a test utterance is calculated as the score for the decision ...
A. Kishore Kumar   +4 more
openaire   +2 more sources

An autonomous GNSS anti-spoofing technique [PDF]

open access: yes, 2016
open3siIn recent years, the problem of Position, Navigation and Timing (PNT) resiliency has received significant attention due to an increasing awareness on threats and the vulnerability of the current GNSS signals.
Christian Wullems   +2 more
core   +1 more source

Satellite Navigation Spoofing Interference Detection and Direction Finding Based on Array Antenna

open access: yesSensors, 2023
Satellite navigation signals are feeble when they reach the ground, so they are vulnerable to attacks from outside interference signals. By emitting spoofing interference signals similar to real satellite signals, spoofing interference can make receivers
Huiyun Yang   +4 more
doaj   +1 more source

Source Tracing: Detecting Voice Spoofing

open access: yes2022 Asia-Pacific Signal and Information Processing Association Annual Summit and Conference (APSIPA ASC), 2022
Accepted by APSIPA ...
Tinglong Zhu   +3 more
openaire   +2 more sources

Detection of Spoofing Websites

open access: yes, 2020
{"references": ["R. Gowri, V Karamchand Gandhi, M. Suriakala (2017), \"An efficient algorithm to identify phishing sites using url domain features\", Int. J. of Adv. Res. in Com. Sci., Volume 8, Issue 7, pp. 508\u2013510, DOI: 10.26483/ijarcs.v8i7.4309", "U. Naresh, U. Vidya Sagar, C.V.
Kallur, Shanta   +4 more
openaire   +2 more sources

Synthetic spoofing speech detection method based on center-symmetric local binary pattern

open access: yesDianxin kexue, 2023
In view of the fact that the local binary pattern (LBP) based speech spoofing detection method has low detection accuracy when detecting synthetic speech, a spoofing speech detection method based on center-symmetric local binary pattern (CSLBP) was ...
Jia XU   +5 more
doaj   +2 more sources

A Testbed for Developing and Evaluating GNSS Signal Authentication Techniques [PDF]

open access: yes, 2014
An experimental testbed has been created for developing and evaluating Global Navigation Satellite System (GNSS) signal authentication techniques.
Bhatti, Jahshan A.   +3 more
core   +1 more source

Visual spoofing in content-based spam detection [PDF]

open access: yes13th International Conference on Security of Information and Networks, 2020
Although the problem of spam classification seems to be solved, there are still vulnerabilities in the current spam filters that could be easily exploited. We present one such vulnerability, in which one could replace some characters with corresponding characters from a different alphabet.
Mark Sokolov   +2 more
openaire   +2 more sources

A GPS-Adaptive Spoofing Detection Method for the Small UAV Cluster

open access: yesDrones, 2023
The small UAV (unmanned aerial vehicle) cluster has become an important trend in the development of UAVs because it has the advantages of being unmanned, having a small size and low cost, and ability to complete many collaborative tasks.
Lianxiao Meng   +3 more
doaj   +1 more source

The Texas Spoofing Test Battery: Toward a Standard for Evaluating GPS Signal Authentication Techniques [PDF]

open access: yes, 2012
A battery of recorded spoofing scenarios has been compiled for evaluating civil Global Positioning System (GPS) signal authentication techniques. The battery can be considered the data component of an evolving standard meant to define the notion of ...
Bhatti, Jahshan A.   +3 more
core   +1 more source

Home - About - Disclaimer - Privacy