نتایج جستجو برای: anti spoofing

تعداد نتایج: 365614  

Journal: :International Journal of Image, Graphics and Signal Processing 2019

Journal: :Proceedings of the ... AAAI Conference on Artificial Intelligence 2023

Along with the widespread use of face recognition systems, their vulnerability has become highlighted. While existing anti-spoofing methods can be generalized between attack types, generic solutions are still challenging due to diversity spoof characteristics. Recently, trace disentanglement framework shown great potential for coping both seen and unseen scenarios, but performance is largely re...

Journal: :IEEE Transactions on Information Forensics and Security 2021

Inspired by the philosophy employed human beings to determine whether a presented face example is genuine or not, i.e., glance at globally first and then carefully observe local regions gain more discriminative information, for anti-spoofing problem, we propose novel framework based on Convolutional Neural Network (CNN) Recurrent (RNN). In particular, model behavior of exploring face-spoofing-r...

Journal: :Speech Communication 2015
Zhizheng Wu Nicholas W. D. Evans Tomi Kinnunen Junichi Yamagishi Federico Alegre Haizhou Li

While biometric authentication has advanced significantly in recent years, evidence shows the technology can be susceptible to malicious spoofing attacks. The research community has responded with dedicated countermeasures which aim to detect and deflect such attacks. Even if the literature shows that they can be effective, the problem is far from being solved; biometric systems remain vulnerab...

2012
Simar Preet Singh A Raman Maini

The Domain Name System (DNS) is a hierarchical naming system that is built on a distributed database for computers, services, or any other resource connected to the Internet or a private network. It translates the domain names meaningful to humans into the numerical identifiers associated with the networking equipment for the purpose of locating and addressing these devices worldwide [1]. The j...

Journal: :J. Inform. and Commun. Convergence Engineering 2014
Jung-Ha Kang Yang Sun Lee Jae Young Kim Eun-Gi Kim

Although the Internet protocol (IP) has become widely successful, it has led to many security issues. Many of these security issues are related to illegal host access. An address resolution protocol (ARP) spoofing attack is another security issue related to an illegal host access. This paper deals with the prevention of these ARP spoofing attacks. ARP provides dynamic mapping between two differ...

2012
Alok Pandey

Counter Measures to Combat Misuses of MAC Address Spoofing Techniques Alok Pandey Sr. Systems Manager, Birla Institute of Technology (Mesra), Jaipur Campus, Jaipur, Rajasthan, India Email: [email protected] Dr. Jatinderkumar R. Saini Associate Professor & I/C Director, Narmada College of Computer Application, Bharuch, Gujarat, India Email: [email protected] -----------------------...

2017
Xintong Wang Michael P. Wellman

We present an agent-based model of manipulating prices in financial markets through spoofing : submitting spurious orders to mislead traders who observe the order book. Built around the standard limit-order mechanism, our model captures a complex market environment with combined private and common values, the latter represented by noisy observations upon a dynamic fundamental time series. We co...

Journal: :IEEE Access 2021

Face Anti-spoofing (FAS) is a challenging problem due to complex serving scenarios and diverse face presentation attack patterns. Especially when captured images are low-resolution, blurry, coming from different domains, the performance of FAS will degrade significantly. The existing multi-modal datasets rarely pay attention cross-domain problems under deployment scenarios, which not conducive ...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید