نتایج جستجو برای: anti spoofing

تعداد نتایج: 365614  

2013
D. McPherson

The Source Address Validation Improvement (SAVI) effort aims to complement ingress filtering with finer-grained, standardized IP source address validation. This document describes threats enabled by IP source address spoofing both in the global and finer-grained context, describes currently available solutions and challenges, and provides a starting point analysis for finer-grained (host granul...

2013
D. McPherson

The Source Address Validation Improvement (SAVI) effort aims to complement ingress filtering with finer-grained, standardized IP source address validation. This document describes threats enabled by IP source address spoofing both in the global and finer-grained context, describes currently available solutions and challenges, and provides a starting point analysis for finer-grained (host granul...

Journal: : 2021

Introduction/purpose: The paper provides a review of recent research in the field GPS and ADS-B spoofing. Systems that rely on satellite positioning technology can be targeted by spoofing order to generate incorrect positioning/timing, which is accomplished inserting false signals into "victim's" receiver. Attackers try insert information systems that, for example, provide navigation airplanes ...

Journal: :IEEE Trans. Information Forensics and Security 2015
Aleksandr Sizov Elie el Khoury Tomi Kinnunen Zhizheng Wu Sébastien Marcel

Any biometric recognizer is vulnerable to spoofing attacks and hence voice biometric, also called automatic speaker verification (ASV), is no exception; replay, synthesis and conversion attacks all provoke false acceptances unless countermeasures are used. We focus on voice conversion (VC) attacks considered as one of the most challenging for modern recognition systems. To detect spoofing, most...

2016
Kaavya Sriskandaraja Vidhyasaharan Sethu Phu Ngoc Le Eliathamby Ambikairajah

A speaker verification system should include effective precautions against malicious spoofing attacks, and although some initial countermeasures have been recently proposed, this remains a challenging research problem. This paper investigates discrimination between spoofed and genuine speech, as a function of frequency bands, across the speech bandwidth. Findings from our investigation inform s...

Journal: :Lecture Notes in Computer Science 2022

Face anti-spoofing (FAS) approaches based on unsupervised domain adaption (UDA) have drawn growing attention due to promising performances for target scenarios. Most existing UDA FAS methods typically fit the trained models via aligning distribution of semantic high-level features. However, insufficient supervision unlabeled domains and neglect low-level feature alignment degrade methods. To ad...

Journal: :Journal of Information Hiding and Privacy Protection 2020

Journal: :Proceedings of the AAAI Conference on Artificial Intelligence 2020

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید