نتایج جستجو برای: anti spoofing

تعداد نتایج: 365614  

Journal: :Proceedings of the AAAI Conference on Artificial Intelligence 2020

2016
Merlin Livingston Nesli Erdogmus

Biometrics systems have significantly improved person identification and authentication, playing an important role in personal, national, and global security. However, these systems might be deceived (or “spoofed”).The recent advances in spoofing detection, current solutions often rely on S domain knowledge, specific biometric reading systems, and attack types. We assume a very limited knowledg...

2017
Bo Zhao Qinying Chen

The worldwide Pokémon Go fever has brought location spoofing into the public’s spotlight. Location spoofing is an intentional act to masquerade locational information to somewhere other than the actual location where a network communication takes place. In the realm of Cartography and GIScience, compared with well-studied spatial quality issues, our knowledge of location spoofing is still quite...

2015

Recently there have been wide interests in speaker verification for various applications. Although the reported equal error rate (EER) is relatively low, many evidences show that the present speaker verification technologies can be susceptible to malicious spoofing attacks. Inspired by the great success of deep learning in the automatic speech recognition, deep neural network (DNN) based approa...

2015
Nanxin Chen Yanmin Qian Heinrich Dinkel Bo Chen Kai Yu

Recently there have been wide interests in speaker verification for various applications. Although the reported equal error rate (EER) is relatively low, many evidences show that the present speaker verification technologies can be susceptible to malicious spoofing attacks. Inspired by the great success of deep learning in the automatic speech recognition, deep neural network (DNN) based approa...

2014
M. J. Correia A. Abad

Voice conversion (VC) techniques, which modify a speaker’s voice to sound like another’s, present a threat to automatic speaker verification (SV) systems. In this paper, we evaluate the vulnerability of a state-of-the-art SV system against a converted speech spoofing attack. To overcome the spoofing attack, we implement state-of-the-art converted speech detectors based on shortand long-term fea...

Journal: :CoRR 2016
Xiaowen Tian Ming Li Qian Liu

The pilot spoofing attack is considered as an active eavesdropping activity launched by an adversary during the reverse channel training phase. By transmitting the same pilot signal as the legitimate user, the pilot spoofing attack is able to degrade the quality of legitimate transmission and, more severely, facilitate eavesdropping. In an effort to detect the pilot spoofing attack and minimize...

2005
Steve Bauer

Forging, or ”spoofing,” the source addresses of IP packets provides malicious parties with anonymity and novel attack vectors. Spoofing-based attacks complicate network operator’s defense techniques; tracing spoofing remains a difficult and largely manual process. More sophisticated next generation distributed denial of service (DDoS) attacks may test filtering policies and adaptively attempt t...

2005
Girija Chetty

In this paper we show the potential of two new features as powerful anti-spoofing measures for face-voice person authentication systems. The features based on latent semantic analysis (LSA) and canonical correlation analysis (CCA), enhance the performance of the authentication system in terms of better anti-imposture abilities and guard against video replay attacks, which is a challenging type ...

Journal: :IEEE Sensors Journal 2022

Global navigation satellite system (GNSS) spoofing causes the victim receiver to deduce false positioning and timing data; this notably threatens navigational safety. Thus, anti-spoofing techniques that improve reliability of GNSS systems, for which interference detection is critical, are essential. Based on distortion tracking loop correlation function symmetry target caused by gradual adjustm...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید