Search Results - "Attack detection algorithm"
-
1
Relaxed Co-Design of Attack Detection and Set-Membership Estimation for T-S Fuzzy Systems Subject to Malicious Attacks
ISSN: 1063-6706, 1941-0034Published: New York IEEE 01.05.2024Published in IEEE transactions on fuzzy systems (01.05.2024)“… (UBB) noise subject to malicious attacks via the set-membership estimation and a switching multimode high-order free-weighting matrix (SMHFM) method…”
Get full text
Journal Article -
2
Presentation Attack Detection Algorithms for Finger Vein Biometrics: A Comprehensive Study
Published: IEEE 01.11.2015Published in 2015 11th International Conference on Signal-Image Technology & Internet-Based Systems (SITIS) (01.11.2015)“…Finger vein biometric systems have shown a vulnerability to presentation attacks (or direct attack or spoof attack). The presentation attacks have raised…”
Get full text
Conference Proceeding -
3
Resilient Synchronization of Neural Networks Under DoS Attacks and Communication Delays via Event-Triggered Impulsive Control
ISSN: 2168-2216, 2168-2232Published: New York IEEE 01.01.2024Published in IEEE transactions on systems, man, and cybernetics. Systems (01.01.2024)“… (DoS) attacks and communication delays. Specifically, an attack detection algorithm constructed based upon the acknowledgment (ACK…”
Get full text
Journal Article -
4
Are Morphed Periocular Iris Images a Threat to Iris Recognition?
ISSN: 1556-6013, 1556-6021Published: IEEE 2025Published in IEEE transactions on information forensics and security (2025)“…: random selection and similar pupil radius size selection. A vulnerability analysis and a Single Morphing Attack Detection algorithm were also explored…”
Get full text
Journal Article -
5
SWAPPED! Digital face presentation attack detection via weighted local magnitude pattern
ISSN: 2474-9699Published: IEEE 01.10.2017Published in 2017 IEEE International Joint Conference on Biometrics (IJCB) (01.10.2017)“… The database contains bonafide face videos and face swapped videos of multiple subjects. Baseline face recognition experiments using commercial system shows over 90…”
Get full text
Conference Proceeding -
6
Quickest Bayesian and non-Bayesian detection of false data injection attack in remote state estimation
ISSN: 2331-8422Published: Ithaca Cornell University Library, arXiv.org 16.01.2022Published in arXiv.org (16.01.2022)“…), in order to minimize the expected detection delay subject to a false alarm constraint, with the state…”
Get full text
Paper -
7
Attack detection of nonlinear distributed control systems
ISSN: 2378-5861Published: AACC 01.07.2020Published in Proceedings of the American Control Conference (01.07.2020)“… In the proposed attack detection algorithm, the inverse system of each mode aims to estimate system states and attack vectors when the corresponding mode is input-output decoupled…”
Get full text
Conference Proceeding -
8
Detection of Cyber Attacks on Leader-Following Multi-Agent Systems
ISSN: 2577-1647Published: IEEE 01.10.2019Published in IECON 2019 - 45th Annual Conference of the IEEE Industrial Electronics Society (01.10.2019)“… An effective distributed attack detection algorithm is firstly developed for each follower such that the attack can be identified at the time of its occurrence…”
Get full text
Conference Proceeding -
9
On the Feasibility of Creating Iris Periocular Morphed Images
ISSN: 2331-8422Published: Ithaca Cornell University Library, arXiv.org 24.08.2024Published in arXiv.org (24.08.2024)“…: random selection and similar radius size selection. A vulnerability analysis and a Single Morphing Attack Detection algorithm were also explored…”
Get full text
Paper -
10
Enhanced Resilient Sensor Attack Detection Using Fusion Interval and Measurement History
Published: IEEE 01.09.2018Published in 2018 International Conference on Hardware Software Codesign and System Synthesis (CODES ISSS) (01.09.2018)“… To address this problem, we take the system dynamics model into account, and propose a novel sensor attack detection algorithm based on historical measurements and fusion intervals…”
Get full text
Conference Proceeding -
11
Enhanced resilient sensor attack detection using fusion interval and measurement history
ISBN: 9781538655627, 1538655624Published: Piscataway, NJ, USA IEEE Press 30.09.2018Published in Proceedings of the International Conference on Hardware/Software Codesign and System Synthesis (30.09.2018)“… To address this problem, we take the system dynamics model into account, and propose a novel sensor attack detection algorithm based on historical measurements and fusion intervals…”
Get full text
Conference Proceeding -
12
Security of Distributed Parameter Cyber-Physical Systems: Cyber-Attack Detection in Linear Parabolic PDEs
ISSN: 2331-8422Published: Ithaca Cornell University Library, arXiv.org 30.07.2021Published in arXiv.org (30.07.2021)“… Next, we develop a design framework for cyber-attack detection algorithms based on output…”
Get full text
Paper -
13
Secure Reinforcement Learning and the Detection of Man-in-the-Middle Attacks
ISBN: 9798379918354Published: ProQuest Dissertations & Theses 01.01.2023“… We then propose simple attack detection algorithms to detect such MITM attacks without for two different system models…”
Get full text
Dissertation -
14
Pulse-based Features for Face Presentation Attack Detection
ISSN: 2474-9699Published: IEEE 01.10.2018Published in IEEE International Conference on Biometrics, Theory, Applications and Systems (01.10.2018)“…). Recent studies show that the pulse signal provides information on the liveness of a subject…”
Get full text
Conference Proceeding -
15
Face Presentation Attack with Latex Masks in Multispectral Videos
ISSN: 2160-7516Published: IEEE 01.07.2017Published in IEEE Computer Society Conference on Computer Vision and Pattern Recognition workshops (01.07.2017)“… We also present the performance of existing presentation attack detection algorithms on the proposed MLFP database…”
Get full text
Conference Proceeding -
16
Unconstrained visible spectrum iris with textured contact lens variations: Database and benchmarking
ISSN: 2474-9699Published: IEEE 01.10.2017Published in 2017 IEEE International Joint Conference on Biometrics (IJCB) (01.10.2017)“… This has elevated the importance of efficient presentation attack detection algorithms, particularly in security based critical applications…”
Get full text
Conference Proceeding -
17
in-Car Biometrics (iCarB) Datasets for Driver Recognition: Face, Fingerprint, and Voice
ISSN: 2331-8422Published: Ithaca Cornell University Library, arXiv.org 26.11.2024Published in arXiv.org (26.11.2024)“…We present three biometric datasets (iCarB-Face, iCarB-Fingerprint, iCarB-Voice) containing face videos, fingerprint images, and voice samples, collected…”
Get full text
Paper

