Results 31 to 40 of about 23,142 (187)
Speech frame selection for spoofing detection with an application to partially spoofed audio-data [PDF]
In this paper, we introduce a frame selection strategy for improved detection of spoofed speech. A countermeasure (CM) system typically uses a Gaussian mixture model (GMM) based classifier for computing the log-likelihood scores. The average log-likelihood ratio for all speech frames of a test utterance is calculated as the score for the decision ...
A. Kishore Kumar +4 more
openaire +2 more sources
An autonomous GNSS anti-spoofing technique [PDF]
open3siIn recent years, the problem of Position, Navigation and Timing (PNT) resiliency has received significant attention due to an increasing awareness on threats and the vulnerability of the current GNSS signals.
Christian Wullems +2 more
core +1 more source
Satellite Navigation Spoofing Interference Detection and Direction Finding Based on Array Antenna
Satellite navigation signals are feeble when they reach the ground, so they are vulnerable to attacks from outside interference signals. By emitting spoofing interference signals similar to real satellite signals, spoofing interference can make receivers
Huiyun Yang +4 more
doaj +1 more source
Source Tracing: Detecting Voice Spoofing
Accepted by APSIPA ...
Tinglong Zhu +3 more
openaire +2 more sources
Detection of Spoofing Websites
{"references": ["R. Gowri, V Karamchand Gandhi, M. Suriakala (2017), \"An efficient algorithm to identify phishing sites using url domain features\", Int. J. of Adv. Res. in Com. Sci., Volume 8, Issue 7, pp. 508\u2013510, DOI: 10.26483/ijarcs.v8i7.4309", "U. Naresh, U. Vidya Sagar, C.V.
Kallur, Shanta +4 more
openaire +2 more sources
Synthetic spoofing speech detection method based on center-symmetric local binary pattern
In view of the fact that the local binary pattern (LBP) based speech spoofing detection method has low detection accuracy when detecting synthetic speech, a spoofing speech detection method based on center-symmetric local binary pattern (CSLBP) was ...
Jia XU +5 more
doaj +2 more sources
A Testbed for Developing and Evaluating GNSS Signal Authentication Techniques [PDF]
An experimental testbed has been created for developing and evaluating Global Navigation Satellite System (GNSS) signal authentication techniques.
Bhatti, Jahshan A. +3 more
core +1 more source
Visual spoofing in content-based spam detection [PDF]
Although the problem of spam classification seems to be solved, there are still vulnerabilities in the current spam filters that could be easily exploited. We present one such vulnerability, in which one could replace some characters with corresponding characters from a different alphabet.
Mark Sokolov +2 more
openaire +2 more sources
A GPS-Adaptive Spoofing Detection Method for the Small UAV Cluster
The small UAV (unmanned aerial vehicle) cluster has become an important trend in the development of UAVs because it has the advantages of being unmanned, having a small size and low cost, and ability to complete many collaborative tasks.
Lianxiao Meng +3 more
doaj +1 more source
The Texas Spoofing Test Battery: Toward a Standard for Evaluating GPS Signal Authentication Techniques [PDF]
A battery of recorded spoofing scenarios has been compiled for evaluating civil Global Positioning System (GPS) signal authentication techniques. The battery can be considered the data component of an evolving standard meant to define the notion of ...
Bhatti, Jahshan A. +3 more
core +1 more source

