Articles with "recognition systems" as a keyword



Photo by sxy_selia from unsplash

Pattern-Based Recognition Systems: Overcoming the Problem of Mixtures.

Sign Up to like & get
recommendations!
Published in 2020 at "Analytical chemistry"

DOI: 10.1021/acs.analchem.0c04062

Abstract: The transformative potential of pattern-based sensing techniques is often hampered by their difficulty in dealing with mixtures of analytes, a drawback that severely limits the applications of this sensing approach (the "problem of mixtures"). We… read more here.

Keywords: pattern based; based recognition; systems overcoming; recognition systems ... See more keywords
Photo by chrisjoelcampbell from unsplash

Face Recognition Systems Under Morphing Attacks: A Survey

Sign Up to like & get
recommendations!
Published in 2019 at "IEEE Access"

DOI: 10.1109/access.2019.2899367

Abstract: Recently, researchers found that the intended generalizability of (deep) face recognition systems increases their vulnerability against attacks. In particular, the attacks based on morphed face images pose a severe security risk to face recognition systems.… read more here.

Keywords: systems morphing; face; face recognition; recognition systems ... See more keywords
Photo by historyhd from unsplash

Deep Investigation of the Recent Advances in Dialectal Arabic Speech Recognition

Sign Up to like & get
recommendations!
Published in 2022 at "IEEE Access"

DOI: 10.1109/access.2022.3177191

Abstract: Speech recognition systems play an important role in human–machine interactions. Many systems exist for Arabic speech, however, there are limited systems for dialectal Arabic speech. The Arabic language comprises many properties, some of which are… read more here.

Keywords: speech; dialectal arabic; arabic speech; speech recognition ... See more keywords
Photo from wikipedia

IoT-Based Biometric Recognition Systems in Education for Identity Verification Services: Quality Assessment Approach

Sign Up to like & get
recommendations!
Published in 2023 at "IEEE Access"

DOI: 10.1109/access.2023.3253024

Abstract: Traditional identity verification of students based on the human proctoring approach can cause a scam identity verification and ineffective processing time, particularly among vast groups of students. Most student identification cards outdated personal information. Several… read more here.

Keywords: biometric recognition; identity verification; recognition systems; verification ... See more keywords
Photo from wikipedia

Improving Emotion Recognition Systems by Exploiting the Spatial Information of EEG Sensors

Sign Up to like & get
recommendations!
Published in 2023 at "IEEE Access"

DOI: 10.1109/access.2023.3268233

Abstract: Electroencephalography (EEG)-based emotion recognition is gaining increasing importance due to its potential applications in various scientific fields, ranging from psychophysiology to neuromarketing. A number of approaches have been proposed that use machine learning (ML) technology… read more here.

Keywords: recognition; improving emotion; eeg; emotion recognition ... See more keywords
Photo by midwestiscool from unsplash

Inconspicuous Adversarial Patches for Fooling Image Recognition Systems on Mobile Devices

Sign Up to like & get
recommendations!
Published in 2021 at "IEEE Internet of Things Journal"

DOI: 10.1109/jiot.2021.3124815

Abstract: Deep learning based image recognition systems have been widely deployed on mobile devices in today's world. In recent studies, however, deep learning models are shown vulnerable to adversarial examples. One variant of adversarial examples, called… read more here.

Keywords: inconspicuous adversarial; adversarial patches; recognition systems; image ... See more keywords
Photo by paipai90 from unsplash

IS-WARS: Intelligent and Stealthy Adversarial Attack to Wi-Fi-Based Human Activity Recognition Systems

Sign Up to like & get
recommendations!
Published in 2022 at "IEEE Transactions on Dependable and Secure Computing"

DOI: 10.1109/tdsc.2021.3110480

Abstract: The non-intrusive human activity recognition has been envisioned as a key enabler for many emerging applications requiring interactions between humans and computing systems. To accurately recognize different human behaviors, ubiquitous wireless signals are widely adopted,… read more here.

Keywords: recognition; human activity; adversarial attack; based human ... See more keywords
Photo by pichler_sebastian from unsplash

Remote Perception Attacks against Camera-based Object Recognition Systems and Countermeasures

Sign Up to like & get
recommendations!
Published in 2023 at "ACM Transactions on Cyber-Physical Systems"

DOI: 10.1145/3596221

Abstract: In vision-based object recognition systems imaging sensors perceive the environment and then objects are detected and classified for decision-making purposes; e.g., to maneuver an automated vehicle around an obstacle or to raise alarms for intruders… read more here.

Keywords: based object; camera based; object recognition; perception ... See more keywords