期刊文献+
共找到4篇文章
< 1 >
每页显示 20 50 100
GNSS spoofing detection for single antenna receivers via CNR variation monitoring
1
作者 LIAO Maoyou LYU Xu +1 位作者 MENG Ziyang YOU Zheng 《Journal of Systems Engineering and Electronics》 SCIE CSCD 2024年第5期1276-1286,共11页
In this paper,a method for spoofing detection based on the variation of the signal’s carrier-to-noise ratio(CNR)is proposed.This method leverages the directionality of the antenna to induce varying gain changes in th... In this paper,a method for spoofing detection based on the variation of the signal’s carrier-to-noise ratio(CNR)is proposed.This method leverages the directionality of the antenna to induce varying gain changes in the signals across different incident directions,resulting in distinct CNR variations for each signal.A model is developed to calculate the variation value of the signal CNR based on the antenna gain pattern.This model enables the differentiation of the variation values of the CNR for authentic satellite signals and spoofing signals,thereby facilitating spoofing detection.The proposed method is capable of detecting spoofing signals with power and CNR similar to those of authentic satellite signals.The accuracy of the signal CNR variation value calculation model and the effectiveness of the spoofing detection method are verified through a series of experiments.In addition,the proposed spoofing detection method works not only for a single spoofing source but also for distributed spoofing sources. 展开更多
关键词 spoofing detection global navigation satellite system(GNSS) variation of carrier-to-noise ratio(CNR) antenna directionality
下载PDF
GNSS spoofing detection based on uncultivated wolf pack algorithm 被引量:3
2
作者 孙闽红 邵章义 +1 位作者 包建荣 余旭涛 《Journal of Southeast University(English Edition)》 EI CAS 2017年第1期1-4,共4页
In order to solve the problem that the global navigation satellite system(GNSS) receivers can hardly detect the GNSS spoofing when they are deceived by a spoofer,a model-based approach for the identification of the ... In order to solve the problem that the global navigation satellite system(GNSS) receivers can hardly detect the GNSS spoofing when they are deceived by a spoofer,a model-based approach for the identification of the GNSS spoofing is proposed.First,a Hammerstein model is applied to model the spoofer/GNSS transmitter and the wireless channel.Then,a novel method based on the uncultivated wolf pack algorithm(UWPA) is proposed to estimate the model parameters.Taking the estimated model parameters as a feature vector,the identification of the spoofing is realized by comparing the Euclidean distance between the feature vectors.Simulations verify the effectiveness and the robustness of the proposed method.The results show that,compared with the other identification algorithms,such as least square(LS),the iterative method and the bat-inspired algorithm(BA),although the UWPA has a little more time-eomplexity than the LS and the BA algorithm,it has better estimation precision of the model parameters and higher identification rate of the GNSS spoofing,even for relative low signal-to-noise ratios. 展开更多
关键词 global navigation satellite system(GNSS) spoofing detection system identification uncultivated wolf pack algorithm
下载PDF
Modified Cepstral Feature for Speech Anti-spoofing
3
作者 何明瑞 ZAIDI Syed Faham Ali +3 位作者 田娩鑫 单志勇 江政儒 徐珑婷 《Journal of Donghua University(English Edition)》 CAS 2023年第2期193-201,共9页
The hidden danger of the automatic speaker verification(ASV)system is various spoofed speeches.These threats can be classified into two categories,namely logical access(LA)and physical access(PA).To improve identifica... The hidden danger of the automatic speaker verification(ASV)system is various spoofed speeches.These threats can be classified into two categories,namely logical access(LA)and physical access(PA).To improve identification capability of spoofed speech detection,this paper considers the research on features.Firstly,following the idea of modifying the constant-Q-based features,this work considered adding variance or mean to the constant-Q-based cepstral domain to obtain good performance.Secondly,linear frequency cepstral coefficients(LFCCs)performed comparably with constant-Q-based features.Finally,we proposed linear frequency variance-based cepstral coefficients(LVCCs)and linear frequency mean-based cepstral coefficients(LMCCs)for identification of speech spoofing.LVCCs and LMCCs could be attained by adding the frame variance or the mean to the log magnitude spectrum based on LFCC features.The proposed novel features were evaluated on ASVspoof 2019 datase.The experimental results show that compared with known hand-crafted features,LVCCs and LMCCs are more effective in resisting spoofed speech attack. 展开更多
关键词 spoofed speech detection log magnitude spectrum linear frequency cepstral coefficient(LFCC) hand-crafted feature
下载PDF
Face Anti-Spoofing with Unknown Attacks:A Comprehensive Feature Extraction and Representation Perspective
4
作者 Li-Min Li Bin-Wu Wang +3 位作者 Xu Wang Peng-Kun Wang Yu-Dong Zhang Yang Wang 《Journal of Computer Science & Technology》 SCIE EI CSCD 2024年第4期827-840,共14页
Face anti-spoofing aims at detecting whether the input is a real photo of a user(living)or a fake(spoofing)image.As new types of attacks keep emerging,the detection of unknown attacks,known as Zero-Shot Face Anti-Spoo... Face anti-spoofing aims at detecting whether the input is a real photo of a user(living)or a fake(spoofing)image.As new types of attacks keep emerging,the detection of unknown attacks,known as Zero-Shot Face Anti-Spoofing(ZSFA),has become increasingly important in both academia and industry.Existing ZSFA methods mainly focus on extracting discriminative features between spoofing and living faces.However,the nature of the spoofing faces is to trick anti-spoofing systems by mimicking the livings,therefore the deceptive features between the known attacks and the livings,which have been ignored by existing ZSFA methods,are essential to comprehensively represent the livings.Therefore,existing ZSFA models are incapable of learning the complete representations of living faces and thus fall short of effectively detecting newly emerged attacks.To tackle this problem,we propose an innovative method that effectively captures both the deceptive and discriminative features distinguishing between genuine and spoofing faces.Our method consists of two main components:a two-against-all training strategy and a semantic autoencoder.The two-against-all training strategy is employed to separate deceptive and discriminative features.To address the subsequent invalidation issue of categorical functions and the dominance disequilibrium issue among different dimensions of features after importing deceptive features,we introduce a modified semantic autoencoder.This autoencoder is designed to map all extracted features to a semantic space,thereby achieving a balance in the dominance of each feature dimension.We combine our method with the feature extraction model ResNet50,and experimental results show that the trained ResNet50 model simultaneously achieves a feasible detection of unknown attacks and comparably accurate detection of known spoofing.Experimental results confirm the superiority and effectiveness of our proposed method in identifying the living with the interference of both known and unknown spoofing types. 展开更多
关键词 face anti-spoofing spoof detection zero-shot learning convolutional neural network deep learning
原文传递
上一页 1 下一页 到第
使用帮助 返回顶部