Suchergebnisse - "attack detection algorithm"

  • Treffer 1 - 17 von 17
Treffer weiter einschränken
  1. 1

    Relaxed Co-Design of Attack Detection and Set-Membership Estimation for T-S Fuzzy Systems Subject to Malicious Attacks von Du, Mengni, Xie, Xiangpeng, Wang, Hui, Xia, Jianwei, Chadli, Mohammed

    ISSN: 1063-6706, 1941-0034
    Veröffentlicht: New York IEEE 01.05.2024
    Veröffentlicht in IEEE transactions on fuzzy systems (01.05.2024)
    “… (UBB) noise subject to malicious attacks via the set-membership estimation and a switching multimode high-order free-weighting matrix (SMHFM) method …”
    Volltext
    Journal Article
  2. 2

    Presentation Attack Detection Algorithms for Finger Vein Biometrics: A Comprehensive Study von Raghavendra, R., Busch, Christoph

    Veröffentlicht: IEEE 01.11.2015
    “… Finger vein biometric systems have shown a vulnerability to presentation attacks (or direct attack or spoof attack). The presentation attacks have raised …”
    Volltext
    Tagungsbericht
  3. 3

    Resilient Synchronization of Neural Networks Under DoS Attacks and Communication Delays via Event-Triggered Impulsive Control von Bao, Yuangui, Zhao, Dan, Sun, Jiayue, Wen, Guanghui, Yang, Tao

    ISSN: 2168-2216, 2168-2232
    Veröffentlicht: New York IEEE 01.01.2024
    “… (DoS) attacks and communication delays. Specifically, an attack detection algorithm constructed based upon the acknowledgment (ACK …”
    Volltext
    Journal Article
  4. 4

    Are Morphed Periocular Iris Images a Threat to Iris Recognition? von Tapia, Juan E., Gonzalez, Sebastian, Benalcazar, Daniel, Busch, Christoph

    ISSN: 1556-6013, 1556-6021
    Veröffentlicht: IEEE 2025
    “… : random selection and similar pupil radius size selection. A vulnerability analysis and a Single Morphing Attack Detection algorithm were also explored …”
    Volltext
    Journal Article
  5. 5

    SWAPPED! Digital face presentation attack detection via weighted local magnitude pattern von Agarwal, Akshay, Singh, Richa, Vatsa, Mayank, Noore, Afzel

    ISSN: 2474-9699
    Veröffentlicht: IEEE 01.10.2017
    “… The database contains bonafide face videos and face swapped videos of multiple subjects. Baseline face recognition experiments using commercial system shows over 90 …”
    Volltext
    Tagungsbericht
  6. 6

    Quickest Bayesian and non-Bayesian detection of false data injection attack in remote state estimation von Gupta, Akanshu, Sikdar, Abhinava, Chattopadhyay, Arpan

    ISSN: 2331-8422
    Veröffentlicht: Ithaca Cornell University Library, arXiv.org 16.01.2022
    Veröffentlicht in arXiv.org (16.01.2022)
    “… ), in order to minimize the expected detection delay subject to a false alarm constraint, with the state …”
    Volltext
    Paper
  7. 7

    Attack detection of nonlinear distributed control systems von Zhang, Xu, Lu, Yang, Zhu, Minghui

    ISSN: 2378-5861
    Veröffentlicht: AACC 01.07.2020
    Veröffentlicht in Proceedings of the American Control Conference (01.07.2020)
    “… In the proposed attack detection algorithm, the inverse system of each mode aims to estimate system states and attack vectors when the corresponding mode is input-output decoupled …”
    Volltext
    Tagungsbericht
  8. 8

    Detection of Cyber Attacks on Leader-Following Multi-Agent Systems von Mousavinejad, Eman, Ge, Xiaohua, Han, Qing-Long, Yang, Fuwen, Vlacic, Ljubo

    ISSN: 2577-1647
    Veröffentlicht: IEEE 01.10.2019
    “… An effective distributed attack detection algorithm is firstly developed for each follower such that the attack can be identified at the time of its occurrence …”
    Volltext
    Tagungsbericht
  9. 9

    On the Feasibility of Creating Iris Periocular Morphed Images von Tapia, Juan E, Gonzalez, Sebastian, Benalcazar, Daniel, Busch, Christoph

    ISSN: 2331-8422
    Veröffentlicht: Ithaca Cornell University Library, arXiv.org 24.08.2024
    Veröffentlicht in arXiv.org (24.08.2024)
    “… : random selection and similar radius size selection. A vulnerability analysis and a Single Morphing Attack Detection algorithm were also explored …”
    Volltext
    Paper
  10. 10

    Enhanced Resilient Sensor Attack Detection Using Fusion Interval and Measurement History von Yang, Kang, Wang, Rui, Jiang, Yu, Luo, Chenxia, Guan, Yong, Li, Xiaojuan, Shi, Zhiping

    Veröffentlicht: IEEE 01.09.2018
    “… To address this problem, we take the system dynamics model into account, and propose a novel sensor attack detection algorithm based on historical measurements and fusion intervals …”
    Volltext
    Tagungsbericht
  11. 11

    Enhanced resilient sensor attack detection using fusion interval and measurement history von Yang, Kang, Wang, Rui, Jiang, Yu, Luo, Chenxia, Guan, Yong, Li, Xiaojuan, Shi, Zhiping

    ISBN: 9781538655627, 1538655624
    Veröffentlicht: Piscataway, NJ, USA IEEE Press 30.09.2018
    “… To address this problem, we take the system dynamics model into account, and propose a novel sensor attack detection algorithm based on historical measurements and fusion intervals …”
    Volltext
    Tagungsbericht
  12. 12

    Security of Distributed Parameter Cyber-Physical Systems: Cyber-Attack Detection in Linear Parabolic PDEs von Roy, Tanushree, Dey, Satadru

    ISSN: 2331-8422
    Veröffentlicht: Ithaca Cornell University Library, arXiv.org 30.07.2021
    Veröffentlicht in arXiv.org (30.07.2021)
    “… Next, we develop a design framework for cyber-attack detection algorithms based on output …”
    Volltext
    Paper
  13. 13

    Secure Reinforcement Learning and the Detection of Man-in-the-Middle Attacks von Rani, Rishi

    ISBN: 9798379918354
    Veröffentlicht: ProQuest Dissertations & Theses 01.01.2023
    “… We then propose simple attack detection algorithms to detect such MITM attacks without for two different system models …”
    Volltext
    Dissertation
  14. 14

    Pulse-based Features for Face Presentation Attack Detection von Heusch, Guillaume, Marcel, Sebastien

    ISSN: 2474-9699
    Veröffentlicht: IEEE 01.10.2018
    “… ). Recent studies show that the pulse signal provides information on the liveness of a subject …”
    Volltext
    Tagungsbericht
  15. 15

    Face Presentation Attack with Latex Masks in Multispectral Videos von Agarwal, Akshay, Yadav, Daksha, Kohli, Naman, Singh, Richa, Vatsa, Mayank, Noore, Afzel

    ISSN: 2160-7516
    Veröffentlicht: IEEE 01.07.2017
    “… We also present the performance of existing presentation attack detection algorithms on the proposed MLFP database …”
    Volltext
    Tagungsbericht
  16. 16

    Unconstrained visible spectrum iris with textured contact lens variations: Database and benchmarking von Yadav, Daksha, Kohli, Naman, Vatsa, Mayank, Singh, Richa, Noore, Afzel

    ISSN: 2474-9699
    Veröffentlicht: IEEE 01.10.2017
    “… This has elevated the importance of efficient presentation attack detection algorithms, particularly in security based critical applications …”
    Volltext
    Tagungsbericht
  17. 17

    in-Car Biometrics (iCarB) Datasets for Driver Recognition: Face, Fingerprint, and Voice von Hahn, Vedrana Krivokuca, Maceiras, Jeremy, Komaty, Alain, Abbet, Philip, Marcel, Sebastien

    ISSN: 2331-8422
    Veröffentlicht: Ithaca Cornell University Library, arXiv.org 26.11.2024
    Veröffentlicht in arXiv.org (26.11.2024)
    “… We present three biometric datasets (iCarB-Face, iCarB-Fingerprint, iCarB-Voice) containing face videos, fingerprint images, and voice samples, collected …”
    Volltext
    Paper