نتایج جستجو برای: anti spoofing
تعداد نتایج: 365614 فیلتر نتایج به سال:
Along with the widespread use of face recognition systems, their vulnerability has become highlighted. While existing anti-spoofing methods can be generalized between attack types, generic solutions are still challenging due to diversity spoof characteristics. Recently, trace disentanglement framework shown great potential for coping both seen and unseen scenarios, but performance is largely re...
Inspired by the philosophy employed human beings to determine whether a presented face example is genuine or not, i.e., glance at globally first and then carefully observe local regions gain more discriminative information, for anti-spoofing problem, we propose novel framework based on Convolutional Neural Network (CNN) Recurrent (RNN). In particular, model behavior of exploring face-spoofing-r...
While biometric authentication has advanced significantly in recent years, evidence shows the technology can be susceptible to malicious spoofing attacks. The research community has responded with dedicated countermeasures which aim to detect and deflect such attacks. Even if the literature shows that they can be effective, the problem is far from being solved; biometric systems remain vulnerab...
The Domain Name System (DNS) is a hierarchical naming system that is built on a distributed database for computers, services, or any other resource connected to the Internet or a private network. It translates the domain names meaningful to humans into the numerical identifiers associated with the networking equipment for the purpose of locating and addressing these devices worldwide [1]. The j...
Although the Internet protocol (IP) has become widely successful, it has led to many security issues. Many of these security issues are related to illegal host access. An address resolution protocol (ARP) spoofing attack is another security issue related to an illegal host access. This paper deals with the prevention of these ARP spoofing attacks. ARP provides dynamic mapping between two differ...
Counter Measures to Combat Misuses of MAC Address Spoofing Techniques Alok Pandey Sr. Systems Manager, Birla Institute of Technology (Mesra), Jaipur Campus, Jaipur, Rajasthan, India Email: [email protected] Dr. Jatinderkumar R. Saini Associate Professor & I/C Director, Narmada College of Computer Application, Bharuch, Gujarat, India Email: [email protected] -----------------------...
We present an agent-based model of manipulating prices in financial markets through spoofing : submitting spurious orders to mislead traders who observe the order book. Built around the standard limit-order mechanism, our model captures a complex market environment with combined private and common values, the latter represented by noisy observations upon a dynamic fundamental time series. We co...
Face Anti-spoofing (FAS) is a challenging problem due to complex serving scenarios and diverse face presentation attack patterns. Especially when captured images are low-resolution, blurry, coming from different domains, the performance of FAS will degrade significantly. The existing multi-modal datasets rarely pay attention cross-domain problems under deployment scenarios, which not conducive ...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید