Search Results - "Attack detection algorithm"

  • Showing 1 - 17 results of 17
Refine Results
  1. 1

    Relaxed Co-Design of Attack Detection and Set-Membership Estimation for T-S Fuzzy Systems Subject to Malicious Attacks by Du, Mengni, Xie, Xiangpeng, Wang, Hui, Xia, Jianwei, Chadli, Mohammed

    ISSN: 1063-6706, 1941-0034
    Published: New York IEEE 01.05.2024
    Published in IEEE transactions on fuzzy systems (01.05.2024)
    “… (UBB) noise subject to malicious attacks via the set-membership estimation and a switching multimode high-order free-weighting matrix (SMHFM) method…”
    Get full text
    Journal Article
  2. 2

    Presentation Attack Detection Algorithms for Finger Vein Biometrics: A Comprehensive Study by Raghavendra, R., Busch, Christoph

    Published: IEEE 01.11.2015
    “…Finger vein biometric systems have shown a vulnerability to presentation attacks (or direct attack or spoof attack). The presentation attacks have raised…”
    Get full text
    Conference Proceeding
  3. 3

    Resilient Synchronization of Neural Networks Under DoS Attacks and Communication Delays via Event-Triggered Impulsive Control by Bao, Yuangui, Zhao, Dan, Sun, Jiayue, Wen, Guanghui, Yang, Tao

    ISSN: 2168-2216, 2168-2232
    Published: New York IEEE 01.01.2024
    “… (DoS) attacks and communication delays. Specifically, an attack detection algorithm constructed based upon the acknowledgment (ACK…”
    Get full text
    Journal Article
  4. 4

    Are Morphed Periocular Iris Images a Threat to Iris Recognition? by Tapia, Juan E., Gonzalez, Sebastian, Benalcazar, Daniel, Busch, Christoph

    ISSN: 1556-6013, 1556-6021
    Published: IEEE 2025
    “…: random selection and similar pupil radius size selection. A vulnerability analysis and a Single Morphing Attack Detection algorithm were also explored…”
    Get full text
    Journal Article
  5. 5

    SWAPPED! Digital face presentation attack detection via weighted local magnitude pattern by Agarwal, Akshay, Singh, Richa, Vatsa, Mayank, Noore, Afzel

    ISSN: 2474-9699
    Published: IEEE 01.10.2017
    “… The database contains bonafide face videos and face swapped videos of multiple subjects. Baseline face recognition experiments using commercial system shows over 90…”
    Get full text
    Conference Proceeding
  6. 6

    Quickest Bayesian and non-Bayesian detection of false data injection attack in remote state estimation by Gupta, Akanshu, Sikdar, Abhinava, Chattopadhyay, Arpan

    ISSN: 2331-8422
    Published: Ithaca Cornell University Library, arXiv.org 16.01.2022
    Published in arXiv.org (16.01.2022)
    “…), in order to minimize the expected detection delay subject to a false alarm constraint, with the state…”
    Get full text
    Paper
  7. 7

    Attack detection of nonlinear distributed control systems by Zhang, Xu, Lu, Yang, Zhu, Minghui

    ISSN: 2378-5861
    Published: AACC 01.07.2020
    “… In the proposed attack detection algorithm, the inverse system of each mode aims to estimate system states and attack vectors when the corresponding mode is input-output decoupled…”
    Get full text
    Conference Proceeding
  8. 8

    Detection of Cyber Attacks on Leader-Following Multi-Agent Systems by Mousavinejad, Eman, Ge, Xiaohua, Han, Qing-Long, Yang, Fuwen, Vlacic, Ljubo

    ISSN: 2577-1647
    Published: IEEE 01.10.2019
    “… An effective distributed attack detection algorithm is firstly developed for each follower such that the attack can be identified at the time of its occurrence…”
    Get full text
    Conference Proceeding
  9. 9

    On the Feasibility of Creating Iris Periocular Morphed Images by Tapia, Juan E, Gonzalez, Sebastian, Benalcazar, Daniel, Busch, Christoph

    ISSN: 2331-8422
    Published: Ithaca Cornell University Library, arXiv.org 24.08.2024
    Published in arXiv.org (24.08.2024)
    “…: random selection and similar radius size selection. A vulnerability analysis and a Single Morphing Attack Detection algorithm were also explored…”
    Get full text
    Paper
  10. 10

    Enhanced Resilient Sensor Attack Detection Using Fusion Interval and Measurement History by Yang, Kang, Wang, Rui, Jiang, Yu, Luo, Chenxia, Guan, Yong, Li, Xiaojuan, Shi, Zhiping

    Published: IEEE 01.09.2018
    “… To address this problem, we take the system dynamics model into account, and propose a novel sensor attack detection algorithm based on historical measurements and fusion intervals…”
    Get full text
    Conference Proceeding
  11. 11

    Enhanced resilient sensor attack detection using fusion interval and measurement history by Yang, Kang, Wang, Rui, Jiang, Yu, Luo, Chenxia, Guan, Yong, Li, Xiaojuan, Shi, Zhiping

    ISBN: 9781538655627, 1538655624
    Published: Piscataway, NJ, USA IEEE Press 30.09.2018
    “… To address this problem, we take the system dynamics model into account, and propose a novel sensor attack detection algorithm based on historical measurements and fusion intervals…”
    Get full text
    Conference Proceeding
  12. 12

    Security of Distributed Parameter Cyber-Physical Systems: Cyber-Attack Detection in Linear Parabolic PDEs by Roy, Tanushree, Dey, Satadru

    ISSN: 2331-8422
    Published: Ithaca Cornell University Library, arXiv.org 30.07.2021
    Published in arXiv.org (30.07.2021)
    “… Next, we develop a design framework for cyber-attack detection algorithms based on output…”
    Get full text
    Paper
  13. 13

    Secure Reinforcement Learning and the Detection of Man-in-the-Middle Attacks by Rani, Rishi

    ISBN: 9798379918354
    Published: ProQuest Dissertations & Theses 01.01.2023
    “… We then propose simple attack detection algorithms to detect such MITM attacks without for two different system models…”
    Get full text
    Dissertation
  14. 14

    Pulse-based Features for Face Presentation Attack Detection by Heusch, Guillaume, Marcel, Sebastien

    ISSN: 2474-9699
    Published: IEEE 01.10.2018
    “…). Recent studies show that the pulse signal provides information on the liveness of a subject…”
    Get full text
    Conference Proceeding
  15. 15

    Face Presentation Attack with Latex Masks in Multispectral Videos by Agarwal, Akshay, Yadav, Daksha, Kohli, Naman, Singh, Richa, Vatsa, Mayank, Noore, Afzel

    ISSN: 2160-7516
    Published: IEEE 01.07.2017
    “… We also present the performance of existing presentation attack detection algorithms on the proposed MLFP database…”
    Get full text
    Conference Proceeding
  16. 16

    Unconstrained visible spectrum iris with textured contact lens variations: Database and benchmarking by Yadav, Daksha, Kohli, Naman, Vatsa, Mayank, Singh, Richa, Noore, Afzel

    ISSN: 2474-9699
    Published: IEEE 01.10.2017
    “… This has elevated the importance of efficient presentation attack detection algorithms, particularly in security based critical applications…”
    Get full text
    Conference Proceeding
  17. 17

    in-Car Biometrics (iCarB) Datasets for Driver Recognition: Face, Fingerprint, and Voice by Hahn, Vedrana Krivokuca, Maceiras, Jeremy, Komaty, Alain, Abbet, Philip, Marcel, Sebastien

    ISSN: 2331-8422
    Published: Ithaca Cornell University Library, arXiv.org 26.11.2024
    Published in arXiv.org (26.11.2024)
    “…We present three biometric datasets (iCarB-Face, iCarB-Fingerprint, iCarB-Voice) containing face videos, fingerprint images, and voice samples, collected…”
    Get full text
    Paper