Results 81 to 90 of about 23,142 (187)

GNSS Spoofing Detection Based on Unsynchronized Double-Antenna Measurements

open access: yesIEEE Access, 2018
Global navigation satellite systems are now threatened by spoofing attacks. The double-antenna countermeasure is one of the most robust spoofing detection techniques.
Fei Wang, Hong Li, Mingquan Lu
doaj   +1 more source

Completed local binary pattern based speech anti-spoofing

open access: yesDianxin kexue, 2021
In view of the fact that the disguised speech detection algorithm based on local binary pattern (LBP) is not effective in detecting the spoofing attack from voice conversion, an anti-spoofing method based on completed local binary pattern (CLBP) was ...
Jian XU   +5 more
doaj   +2 more sources

Spoof Surface Plasmon Polaritons in Terahertz Integrated Circuits

open access: yesAdvanced Photonics Research, Volume 7, Issue 5, May 2026.
Terahertz integrated circuits (THz ICs) face challenges from wavelength‐scale dimensions and parasitic effects. Spoof surface plasmon polaritons (SSPPs) provide strong confinement and enhanced near fields, enabling novel transmission and modulation mechanisms.
Xuanru Zhang, Ze Kai Wang, Tie Jun Cui
wiley   +1 more source

Enhancing Cloud‐Based Healthcare Security With Quantum‐Secure HealthChain: A Quantum Computing and Blockchain Integrated Framework

open access: yesHealth Science Reports, Volume 9, Issue 5, May 2026.
ABSTRACT Background and Aims Rising quantum hazards and flaws in conventional encryption make cloud‐based healthcare data security harder. Quantum‐Secure HealthChain, a new architecture using blockchain and quantum computing, improves medical data security, patient privacy, and data fidelity. Methods To prevent quantum attacks, the proposed system uses
Rajesh Bose   +6 more
wiley   +1 more source

A Blockchain‐Less Traceability System for Agriculture Using DAG, IPFS, and Serverless Deployments

open access: yesInternational Journal of Network Management, Volume 36, Issue 3, May/June 2026.
ABSTRACT Ensuring transparency and integrity in agricultural data management is a critical challenge as the sector increasingly relies on advanced technologies. The primary problem is maintaining data traceability and security throughout the supply chain.
Antonio Villafranca   +6 more
wiley   +1 more source

Why Autonomous Vehicles Are Not Ready Yet: A Multi‐Disciplinary Review of Problems, Attempted Solutions, and Future Directions

open access: yesJournal of Field Robotics, Volume 43, Issue 3, Page 2254-2341, May 2026.
ABSTRACT Personal autonomous vehicles can sense their surrounding environment, plan their route, and drive with little or no involvement of human drivers. Despite the latest technological advancements and the hopeful announcements made by leading entrepreneurs, to date no personal vehicle is approved for road circulation in a “fully” or “semi ...
Xingshuai Dong   +13 more
wiley   +1 more source

On the Optimal Selection of Mel‐Frequency Cepstral Coefficients for Voice Deepfake Detection

open access: yesExpert Systems, Volume 43, Issue 5, May 2026.
ABSTRACT The continuous evolution of techniques for generating manipulated audio, known as voice deepfakes, and the widespread availability of tools that produce convincing forgeries have created an urgent need for reliable detection methods. This work considers the dimensionality of Mel‐Frequency Cepstral Coefficients (MFCCs) as a core design variable
Sergio A. Falcón‐López   +3 more
wiley   +1 more source

Generalized Spoof Detection and Incremental Algorithm Recognition for Spoofing Voice

open access: yes, 2022
Abstract Highly deceptive deep-fake technologies have caused much controversy, e.g., artificial intelligence-based software can automatically generate nude photos and deep-fake images of Obama, Putin, and other political figures. This brings considerable threats to both individuals and society.
Jinlin Guo, Zuxing Zhao
openaire   +1 more source

Ruthenium Nanoparticle‐On‐Cavity Refractory Thermoplasmonics for Broadband and Spectral‐Selective Solar Photothermal Conversion

open access: yesAdvanced Photonics Research, Volume 7, Issue 4, April 2026.
We identify ruthenium as a refractory plasmonic material exhibiting dual ENZ optical topological transitions and dual plasmonic resonances spanning from visible to infrared region with high imaginary permittivity. We establish a nanoparticle‐on‐cavity (NPoC) resonance mode and realize a NPoC selective solar absorber using cost‐effective additive ...
Zhequn Huang   +4 more
wiley   +1 more source

ARP Spoof Detection and Mitigation

open access: yes, 2023
Wireless Local Area Networks (WLANs) have become ubiquitous in modern connectivity landscapes, offering convenience and flexibility. However, they also introduce vulnerabilities, including Address Resolution Protocol (ARP) spoofing attacks, which exploit the inherent characteristics of WLANs to compromise network security. The proposed method begins by
Prema Arokiya Mary G   +3 more
openaire   +2 more sources

Home - About - Disclaimer - Privacy