Articles with "impersonation attack" as a keyword



Photo by anniespratt from unsplash

Security in Fog Computing: A Novel Technique to Tackle an Impersonation Attack

Sign Up to like & get
recommendations!
Published in 2018 at "IEEE Access"

DOI: 10.1109/access.2018.2884672

Abstract: Fog computing is an encouraging technology in the coming generation to pipeline the breach between cloud data centers and Internet of Things (IoT) devices. Fog computing is not a counterfeit for cloud computing but a… read more here.

Keywords: security; impersonation attack; fog; fog computing ... See more keywords
Photo from wikipedia

Analysis on Secure Triplet Loss

Sign Up to like & get
recommendations!
Published in 2022 at "IEEE Access"

DOI: 10.1109/access.2022.3225430

Abstract: Major improvements in biometric authentication have been made in recent years due to the advancements in deep learning. Through the use of a deep learning-based facial recognition model with metric learning, more discriminative facial features… read more here.

Keywords: secure triplet; triplet loss; impersonation attack;