Suchergebnisse - "attack detection algorithm"
-
1
Relaxed Co-Design of Attack Detection and Set-Membership Estimation for T-S Fuzzy Systems Subject to Malicious Attacks
ISSN: 1063-6706, 1941-0034Veröffentlicht: New York IEEE 01.05.2024Veröffentlicht in IEEE transactions on fuzzy systems (01.05.2024)“… (UBB) noise subject to malicious attacks via the set-membership estimation and a switching multimode high-order free-weighting matrix (SMHFM) method …”
Volltext
Journal Article -
2
Presentation Attack Detection Algorithms for Finger Vein Biometrics: A Comprehensive Study
Veröffentlicht: IEEE 01.11.2015Veröffentlicht in 2015 11th International Conference on Signal-Image Technology & Internet-Based Systems (SITIS) (01.11.2015)“… Finger vein biometric systems have shown a vulnerability to presentation attacks (or direct attack or spoof attack). The presentation attacks have raised …”
Volltext
Tagungsbericht -
3
Resilient Synchronization of Neural Networks Under DoS Attacks and Communication Delays via Event-Triggered Impulsive Control
ISSN: 2168-2216, 2168-2232Veröffentlicht: New York IEEE 01.01.2024Veröffentlicht in IEEE transactions on systems, man, and cybernetics. Systems (01.01.2024)“… (DoS) attacks and communication delays. Specifically, an attack detection algorithm constructed based upon the acknowledgment (ACK …”
Volltext
Journal Article -
4
Are Morphed Periocular Iris Images a Threat to Iris Recognition?
ISSN: 1556-6013, 1556-6021Veröffentlicht: IEEE 2025Veröffentlicht in IEEE transactions on information forensics and security (2025)“… : random selection and similar pupil radius size selection. A vulnerability analysis and a Single Morphing Attack Detection algorithm were also explored …”
Volltext
Journal Article -
5
SWAPPED! Digital face presentation attack detection via weighted local magnitude pattern
ISSN: 2474-9699Veröffentlicht: IEEE 01.10.2017Veröffentlicht in 2017 IEEE International Joint Conference on Biometrics (IJCB) (01.10.2017)“… The database contains bonafide face videos and face swapped videos of multiple subjects. Baseline face recognition experiments using commercial system shows over 90 …”
Volltext
Tagungsbericht -
6
Quickest Bayesian and non-Bayesian detection of false data injection attack in remote state estimation
ISSN: 2331-8422Veröffentlicht: Ithaca Cornell University Library, arXiv.org 16.01.2022Veröffentlicht in arXiv.org (16.01.2022)“… ), in order to minimize the expected detection delay subject to a false alarm constraint, with the state …”
Volltext
Paper -
7
Attack detection of nonlinear distributed control systems
ISSN: 2378-5861Veröffentlicht: AACC 01.07.2020Veröffentlicht in Proceedings of the American Control Conference (01.07.2020)“… In the proposed attack detection algorithm, the inverse system of each mode aims to estimate system states and attack vectors when the corresponding mode is input-output decoupled …”
Volltext
Tagungsbericht -
8
Detection of Cyber Attacks on Leader-Following Multi-Agent Systems
ISSN: 2577-1647Veröffentlicht: IEEE 01.10.2019Veröffentlicht in IECON 2019 - 45th Annual Conference of the IEEE Industrial Electronics Society (01.10.2019)“… An effective distributed attack detection algorithm is firstly developed for each follower such that the attack can be identified at the time of its occurrence …”
Volltext
Tagungsbericht -
9
On the Feasibility of Creating Iris Periocular Morphed Images
ISSN: 2331-8422Veröffentlicht: Ithaca Cornell University Library, arXiv.org 24.08.2024Veröffentlicht in arXiv.org (24.08.2024)“… : random selection and similar radius size selection. A vulnerability analysis and a Single Morphing Attack Detection algorithm were also explored …”
Volltext
Paper -
10
Enhanced Resilient Sensor Attack Detection Using Fusion Interval and Measurement History
Veröffentlicht: IEEE 01.09.2018Veröffentlicht in 2018 International Conference on Hardware Software Codesign and System Synthesis (CODES ISSS) (01.09.2018)“… To address this problem, we take the system dynamics model into account, and propose a novel sensor attack detection algorithm based on historical measurements and fusion intervals …”
Volltext
Tagungsbericht -
11
Enhanced resilient sensor attack detection using fusion interval and measurement history
ISBN: 9781538655627, 1538655624Veröffentlicht: Piscataway, NJ, USA IEEE Press 30.09.2018Veröffentlicht in Proceedings of the International Conference on Hardware/Software Codesign and System Synthesis (30.09.2018)“… To address this problem, we take the system dynamics model into account, and propose a novel sensor attack detection algorithm based on historical measurements and fusion intervals …”
Volltext
Tagungsbericht -
12
Security of Distributed Parameter Cyber-Physical Systems: Cyber-Attack Detection in Linear Parabolic PDEs
ISSN: 2331-8422Veröffentlicht: Ithaca Cornell University Library, arXiv.org 30.07.2021Veröffentlicht in arXiv.org (30.07.2021)“… Next, we develop a design framework for cyber-attack detection algorithms based on output …”
Volltext
Paper -
13
Secure Reinforcement Learning and the Detection of Man-in-the-Middle Attacks
ISBN: 9798379918354Veröffentlicht: ProQuest Dissertations & Theses 01.01.2023“… We then propose simple attack detection algorithms to detect such MITM attacks without for two different system models …”
Volltext
Dissertation -
14
Pulse-based Features for Face Presentation Attack Detection
ISSN: 2474-9699Veröffentlicht: IEEE 01.10.2018Veröffentlicht in IEEE International Conference on Biometrics, Theory, Applications and Systems (01.10.2018)“… ). Recent studies show that the pulse signal provides information on the liveness of a subject …”
Volltext
Tagungsbericht -
15
Face Presentation Attack with Latex Masks in Multispectral Videos
ISSN: 2160-7516Veröffentlicht: IEEE 01.07.2017Veröffentlicht in IEEE Computer Society Conference on Computer Vision and Pattern Recognition workshops (01.07.2017)“… We also present the performance of existing presentation attack detection algorithms on the proposed MLFP database …”
Volltext
Tagungsbericht -
16
Unconstrained visible spectrum iris with textured contact lens variations: Database and benchmarking
ISSN: 2474-9699Veröffentlicht: IEEE 01.10.2017Veröffentlicht in 2017 IEEE International Joint Conference on Biometrics (IJCB) (01.10.2017)“… This has elevated the importance of efficient presentation attack detection algorithms, particularly in security based critical applications …”
Volltext
Tagungsbericht -
17
in-Car Biometrics (iCarB) Datasets for Driver Recognition: Face, Fingerprint, and Voice
ISSN: 2331-8422Veröffentlicht: Ithaca Cornell University Library, arXiv.org 26.11.2024Veröffentlicht in arXiv.org (26.11.2024)“… We present three biometric datasets (iCarB-Face, iCarB-Fingerprint, iCarB-Voice) containing face videos, fingerprint images, and voice samples, collected …”
Volltext
Paper

