Results 51 to 60 of about 23,142 (187)
Ion‐Gating Reservoir Computing for Preprocessing‐Free Speech Recognition from Throat Vibrations
This work presents a throat‐mounted mechanoelectric sensor integrated with an ion‐gel/graphene reservoir device for on‐device speech recognition. The system converts raw biomechanical vibrations into rich nonlinear current dynamics, enabling efficient classification through a simple linear readout. The approach highlights a compact and tunable physical‐
Daiki Nishioka +5 more
wiley +1 more source
A Cascade Face Spoofing Detector Based on Face Anti-Spoofing R-CNN and Improved Retinex LBP
In consideration of secure and convenient, face gains increasing attention in variety of fields during the past decades. Since human face is most accessible from our daily life and preserves the richest information, face based biometric systems are ...
Haonan Chen +3 more
doaj +1 more source
By manipulating current and voltage measurements, an assailant can induce unwanted relay action while attempting to avoid detection. Detecting advanced cyber intrusions in power protection environments requires specialised data analysis and anomaly detection methods.
Feras Alasali +6 more
wiley +1 more source
Characterization and detection of location spoofing attacks
With the proliferation of diverse wireless devices, there is an increasing concern about the security of location information which can be spoofed or disrupted by adversaries. This paper investigates the characterization and detection of location spoofing attacks, specifically those which are attempting to falsify (degrade) the position estimate ...
Jeong Heon Lee, R. Michael Buehrer
openaire +1 more source
ABSTRACT The integration of low Earth orbit (LEO) satellite constellations with commercial aircraft communication systems presents critical challenges in maintaining continuous connectivity during dynamic flight conditions. Current geostationary satellite systems suffer from high round‐trip latency (>$$ > $$ 500 ms) and inadequate coverage at high ...
Raúl Parada +4 more
wiley +1 more source
This paper addresses the vulnerability of Global Navigation Satellite Systems (GNSS) to spoofing signal attacks by proposing a spoofing detection method based on multi-parameter features and an optimized random forest algorithm.
Li Junzhi +6 more
doaj +1 more source
Authentication of Satellite Navigation Signals by Wiretap Coding and Artificial Noise
In order to combat the spoofing of global navigation satellite system (GNSS) signals we propose a novel approach for satellite signal authentication based on information-theoretic security.
Formaggio, Francesco, Tomasin, Stefano
core +1 more source
Generalized Spoof Detection and Incremental Algorithm Recognition for Voice Spoofing
Highly deceptive deepfake technologies have caused much controversy, e.g., artificial intelligence-based software can automatically generate nude photos and deepfake images of anyone. This brings considerable threats to both individuals and society. In addition to video and image forgery, audio forgery poses many hazards but lacks sufficient attention.
Jinlin Guo, Yancheng Zhao, Haoran Wang
openaire +2 more sources
A microstructured PVC‐based tribo‐electromagnetic nanogenerator (TEMNG) enables simultaneous harvesting of biomechanical and ambient electromagnetic energy. The hybrid device achieves high electrical outputs while supporting wearable sensing, gait monitoring, and self‐powered touch interfaces.
Ching‐Te Kuo +4 more
wiley +1 more source
Security of GPS/INS based On-road Location Tracking Systems
Location information is critical to a wide-variety of navigation and tracking applications. Today, GPS is the de-facto outdoor localization system but has been shown to be vulnerable to signal spoofing attacks.
Narain, Sashank +2 more
core +1 more source

