Results 81 to 90 of about 23,142 (187)
GNSS Spoofing Detection Based on Unsynchronized Double-Antenna Measurements
Global navigation satellite systems are now threatened by spoofing attacks. The double-antenna countermeasure is one of the most robust spoofing detection techniques.
Fei Wang, Hong Li, Mingquan Lu
doaj +1 more source
Completed local binary pattern based speech anti-spoofing
In view of the fact that the disguised speech detection algorithm based on local binary pattern (LBP) is not effective in detecting the spoofing attack from voice conversion, an anti-spoofing method based on completed local binary pattern (CLBP) was ...
Jian XU +5 more
doaj +2 more sources
Spoof Surface Plasmon Polaritons in Terahertz Integrated Circuits
Terahertz integrated circuits (THz ICs) face challenges from wavelength‐scale dimensions and parasitic effects. Spoof surface plasmon polaritons (SSPPs) provide strong confinement and enhanced near fields, enabling novel transmission and modulation mechanisms.
Xuanru Zhang, Ze Kai Wang, Tie Jun Cui
wiley +1 more source
ABSTRACT Background and Aims Rising quantum hazards and flaws in conventional encryption make cloud‐based healthcare data security harder. Quantum‐Secure HealthChain, a new architecture using blockchain and quantum computing, improves medical data security, patient privacy, and data fidelity. Methods To prevent quantum attacks, the proposed system uses
Rajesh Bose +6 more
wiley +1 more source
A Blockchain‐Less Traceability System for Agriculture Using DAG, IPFS, and Serverless Deployments
ABSTRACT Ensuring transparency and integrity in agricultural data management is a critical challenge as the sector increasingly relies on advanced technologies. The primary problem is maintaining data traceability and security throughout the supply chain.
Antonio Villafranca +6 more
wiley +1 more source
ABSTRACT Personal autonomous vehicles can sense their surrounding environment, plan their route, and drive with little or no involvement of human drivers. Despite the latest technological advancements and the hopeful announcements made by leading entrepreneurs, to date no personal vehicle is approved for road circulation in a “fully” or “semi ...
Xingshuai Dong +13 more
wiley +1 more source
On the Optimal Selection of Mel‐Frequency Cepstral Coefficients for Voice Deepfake Detection
ABSTRACT The continuous evolution of techniques for generating manipulated audio, known as voice deepfakes, and the widespread availability of tools that produce convincing forgeries have created an urgent need for reliable detection methods. This work considers the dimensionality of Mel‐Frequency Cepstral Coefficients (MFCCs) as a core design variable
Sergio A. Falcón‐López +3 more
wiley +1 more source
Generalized Spoof Detection and Incremental Algorithm Recognition for Spoofing Voice
Abstract Highly deceptive deep-fake technologies have caused much controversy, e.g., artificial intelligence-based software can automatically generate nude photos and deep-fake images of Obama, Putin, and other political figures. This brings considerable threats to both individuals and society.
Jinlin Guo, Zuxing Zhao
openaire +1 more source
We identify ruthenium as a refractory plasmonic material exhibiting dual ENZ optical topological transitions and dual plasmonic resonances spanning from visible to infrared region with high imaginary permittivity. We establish a nanoparticle‐on‐cavity (NPoC) resonance mode and realize a NPoC selective solar absorber using cost‐effective additive ...
Zhequn Huang +4 more
wiley +1 more source
ARP Spoof Detection and Mitigation
Wireless Local Area Networks (WLANs) have become ubiquitous in modern connectivity landscapes, offering convenience and flexibility. However, they also introduce vulnerabilities, including Address Resolution Protocol (ARP) spoofing attacks, which exploit the inherent characteristics of WLANs to compromise network security. The proposed method begins by
Prema Arokiya Mary G +3 more
openaire +2 more sources

