Sign Up to like & get
recommendations!
1
Published in 2018 at "GPS Solutions"
DOI: 10.1007/s10291-017-0693-7
Abstract: Abstract Security exposure in satellite navigation has become a real threat in the face of increasing complexity of the electromagnetic environment. We propose a low-complexity authenticity verification technique by establishing a new model for signal…
read more here.
Keywords:
signal quality;
method;
spoofing detection;
model ... See more keywords
Photo from wikipedia
Sign Up to like & get
recommendations!
0
Published in 2019 at "GPS Solutions"
DOI: 10.1007/s10291-019-0868-5
Abstract: Recent years have witnessed the emergence of portable global navigation satellite spoofing devices. A variety of anti-spoofing techniques have been dedicated to detecting the presence of spoofing signals, most of which solely utilize either signal…
read more here.
Keywords:
detection;
gnss;
dual antenna;
method ... See more keywords
Sign Up to like & get
recommendations!
1
Published in 2022 at "IEEE Access"
DOI: 10.1109/access.2022.3186305
Abstract: The spoofing detection algorithm for a global navigation satellite system/inertial navigation system (GNSS/INS) integrated navigation system based on the innovation rate and robust estimation has extensive or invalid detection times, high missed detection rates, and…
read more here.
Keywords:
innovation rate;
gnss ins;
spoofing detection;
rate ... See more keywords
Photo from wikipedia
Sign Up to like & get
recommendations!
2
Published in 2023 at "IEEE Access"
DOI: 10.1109/access.2023.3262996
Abstract: Spoofing poses a serious security threat to the satellite navigation system. Most of the current spoofing detection methods are based on the information in the receiver-solving process. Applying the above spoofing detection algorithm on the…
read more here.
Keywords:
positioning solutions;
based positioning;
spoofing detection;
detection ... See more keywords
Sign Up to like & get
recommendations!
1
Published in 2017 at "IEEE Access"
DOI: 10.1109/btas.2017.8272685
Abstract: Face spoofing detection is commonly formulated as a two-class recognition problem where relevant features of both positive (real access) and negative samples (spoofing attempts) are utilized to train the system. However, the diversity of spoofing…
read more here.
Keywords:
detection;
class;
formulation;
spoofing detection ... See more keywords
Sign Up to like & get
recommendations!
1
Published in 2022 at "IEEE Internet of Things Journal"
DOI: 10.1109/jiot.2022.3155600
Abstract: With the rapid increase of smart devices in the Internet of Things, more and more visible light (VL) systems, e.g., VL communication (VLC) and VL sensing (VLS), are developed on the existing light fixtures to…
read more here.
Keywords:
orthogonal coding;
redundant orthogonal;
visible light;
spoofing detection ... See more keywords
Sign Up to like & get
recommendations!
1
Published in 2022 at "IEEE Internet of Things Journal"
DOI: 10.1109/jiot.2022.3195320
Abstract: Unmanned aerial vehicles (UAVs) are an emerging technology in the 5G-and-beyond systems with the promise of assisting cellular communications and supporting IoT deployment in remote and density areas. Safe and secure navigation is essential for…
read more here.
Keywords:
gps spoofing;
deep ensemble;
ensemble learning;
spoofing detection ... See more keywords
Sign Up to like & get
recommendations!
0
Published in 2018 at "IEEE Transactions on Neural Networks and Learning Systems"
DOI: 10.1109/tnnls.2017.2771947
Abstract: With the development of speech synthesis technology, automatic speaker verification (ASV) systems have encountered the serious challenge of spoofing attacks. In order to improve the security of ASV systems, many antispoofing countermeasures have been developed.…
read more here.
Keywords:
detection;
acoustic features;
hll;
method ... See more keywords
Photo from wikipedia
Sign Up to like & get
recommendations!
0
Published in 2019 at "Journal of Electronic Imaging"
DOI: 10.1117/1.jei.28.4.043024
Abstract: Abstract. In recent years, face recognition has rapidly developed in the field of smartphones and control systems. It has been used to unlock the telephone and face-payment applications. With such rapid development, more and more…
read more here.
Keywords:
belief network;
face;
face spoofing;
spoofing detection ... See more keywords
Sign Up to like & get
recommendations!
2
Published in 2022 at "Future Internet"
DOI: 10.3390/fi14020061
Abstract: The wide variety of services and applications that shall be supported by future wireless systems will lead to a high amount of sensitive data exchanged via radio, thus introducing a significant challenge for security. Moreover,…
read more here.
Keywords:
layer security;
physical layer;
machine learning;
spoofing detection ... See more keywords