نتایج جستجو برای: anti spoofing

تعداد نتایج: 365614  

Journal: :IEEE transactions on biometrics, behavior, and identity science 2021

The ASVspoof initiative was conceived to spearhead research in anti-spoofing for automatic speaker verification (ASV). This paper describes the third a series of bi-annual challenges: 2019. With challenge database and protocols being described elsewhere, focus this is on results top performing single ensemble system submissions from 62 teams, all which out-perform two baseline systems, often by...

Journal: :IEEE Transactions on Cognitive and Developmental Systems 2021

2014
Beulah Shekhar

The openness of wireless networks enables adversaries to deception as other devices. Spoofing attacks are vulnerable in wireless network, which are allowed the many form of attacks in the network. Wireless spoofing attacks are effortless to start and can extensively impact the performance of networks. A physical property coupled with each node is proposed which uses spatial information, hard to...

2013
Pita Jarupunphol Wipawan Buathong

Visa 3-D Secure is an e-payment system based on the integration of SSL/TLS with the three-domain architecture. It employs cryptographic techniques to secure communication links among participants in e-commerce transactions and also provides credit card verification via Visa Secure Server. Although several security vulnerabilities can be addressed, spoofing attacks are still effective and can be...

2010
Toby Ehrenkranz Jun Li Patrick D. McDaniel

An innate deficiency of the Internet is its susceptibility to IP spoofing. Whereas a router uses a forwarding table to determine where it should send a packet, previous research has found that a router can similarly employ an incoming table to verify where a packet should come from, thereby detecting IP spoofing. Based on a previous protocol for building incoming tables, SAVE, this paper introd...

Journal: :CoRR 2016
Aanjhan Ranganathan Hildur Ólafsdóttir Srdjan Capkun

Global Positioning System (GPS) is used ubiquitously in a wide variety of applications ranging from navigation and tracking to modern smart grids and communication networks. However, it has been demonstrated that modern GPS receivers are vulnerable to signal spoofing attacks. For example, today it is possible to change the course of a ship or force a drone to land in an hostile area by simply s...

2014
Mark L. Psiaki Brady W. O'Hanlon Jahshan A. Bhatti Kyle D. Wesson Todd E. Humphreys

A method is developed to detect GNSS spoofing by processing beat carrier-phase measurements from a pair of antennas in a CDGPS-type calculation. This system Copyright © 2014 by Mark L. Psiaki, Brady W. O'Hanlon, Steven P. Powell, Jahshan A. Bhatti, Kyle D. Wesson, Todd E. Humphreys, & Andrew Schofield. All rights reserved. Preprint from ION GNSS+ 2014 detects spoofing attacks that are resistant...

Journal: :IEEE Transactions on Information Forensics and Security 2023

Detecting 3D mask attacks to a face recognition system is challenging. Although genuine faces and masks show significantly different remote photoplethysmography (rPPG) signals, rPPG-based anti-spoofing methods often suffer from performance degradation due unstable alignment in the video sequence weak rPPG signals. To enhance signal motion-robust way, landmark-anchored stitching method proposed ...

Journal: :CoRR 2017
Luiz Souza Mauricio Pamplona Segundo Luciano Oliveira João Papa

The growing use of control access systems based on face recognition shed light over the need for even more accurate systems to detect face spoofing attacks. In this paper, an extensive analysis on face spoofing detection works published in the last decade is presented. The analyzed works are categorized by their fundamental parts, i.e., descriptors and classifiers. This structured survey also b...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید