Filters
total: 427
filtered: 304
Search results for: PRESENTATION ATTACK DETECTIONS
-
Deep learning techniques for biometric security: A systematic review of presentation attack detection systems
PublicationBiometric technology, including finger vein, fingerprint, iris, and face recognition, is widely used to enhance security in various devices. In the past decade, significant progress has been made in improving biometric sys- tems, thanks to advancements in deep convolutional neural networks (DCNN) and computer vision (CV), along with large-scale training datasets. However, these systems have become targets of various attacks, with...
-
Finger Vein Presentation Attack Detection Method Using a Hybridized Gray-Level Co-Occurrence Matrix Feature with Light-Gradient Boosting Machine Model
PublicationPresentation Attack Detection (PAD) is crucial in biometric finger vein recognition. The susceptibility of these systems to forged finger vein images is a significant challenge. Existing approaches to mitigate presentation attacks have computational complexity limitations and limited data availability. This study proposed a novel method for identifying presentation attacks in finger vein biometric systems. We have used optimal...
-
Musical Instrument Identification Using Deep Learning Approach
PublicationThe work aims to propose a novel approach for automatically identifying all instruments present in an audio excerpt using sets of individual convolutional neural networks (CNNs) per tested instrument. The paper starts with a review of tasks related to musical instrument identification. It focuses on tasks performed, input type, algorithms employed, and metrics used. The paper starts with the background presentation, i.e., metadata...
-
High frequency oscillations are associated with cognitive processing in human recognition memory
PublicationHigh frequency oscillations are associated with normal brain function, but also increasingly recognized as potential biomarkers of the epileptogenic brain. Their role in human cognition has been predominantly studied in classical gamma frequencies (30-100 Hz), which reflect neuronal network coordination involved in attention, learning and memory. Invasive brain recordings in animals and humans demonstrate that physiological oscillations...
-
Adversarial attack algorithm for traffic sign recognition
PublicationDeep learning suffers from the threat of adversarial attacks, and its defense methods have become a research hotspot. In all applications of deep learning, intelligent driving is an important and promising one, facing serious threat of adversarial attack in the meanwhile. To address the adversarial attack, this paper takes the traffic sign recognition as a typical object, for it is the core function of intelligent driving. Considering...
-
Cancer immune escape: the role of antigen presentation machinery
PublicationThe mechanisms of antigen processing and presentation play a crucial role in the recognition and targeting of cancer cells by the immune system. Cancer cells can evade the immune system by downregulating or losing the expression of the proteins recognized by the immune cells as antigens, creating an immunosuppressive microenvironment, and altering their ability to process and present antigens. This review focuses on the mechanisms...
-
Immunizing the Hillcast Method against the Known-Plaintext Attack using Periodic Key Exchange
PublicationThis paper considers a Joint Fingerprinting and Decryption method, called Hillcast, for the copyright protection and traitor tracing in case of Video on Demand services. Because the method is based on the Hill cipher, it is vulnerable to a known-plaintext attack. The goal of this paper is to present an efficient periodic key exchange mechanism to make this method secure without compromising its scalability, imperceptibility or...
-
High-Power Jamming Attack Mitigation Techniques in Spectrally-Spatially Flexible Optical Networks
PublicationThis work presents efficient connection provisioning techniques mitigating high-power jamming attacks in spectrally-spatially flexible optical networks (SS-FONs) utilizing multicore fibers. High-power jamming attacks are modeled based on their impact on the lightpaths’ quality of transmission (QoT) through inter-core crosstalk. Based on a desired threshold on a lightpath’s QoT, the modulation format used, the length of the path,...
-
Modeling a Traffic Remapping Attack Game in a Multi-hop Ad Hoc Network
PublicationIn multi-hop ad hoc networks, selfish nodes may unduly acquire high quality of service (QoS) by assigning higher priority to source packets and lower priority to transit packets. Such traffic remapping attacks (TRAs) are cheap to launch, impossible to prevent, hard to detect, and harmful to non-selfish nodes. While studied mostly in single-hop wireless network settings, TRAs have resisted analysis in multi-hop settings. In this paper...
-
Presentation of HAL 2010 Program
PublicationPrzedstawiono zastosowany w projekcie HAL'2010 model przedniej ściany ludzkiego brzucha, opracowaną metodę wizualizacji odmy wraz z otworem przepuklinowym oraz opisano sposób określania zaopatrzenia w postaci siatki przepuklinowej i mocowań wraz z ich wizualizacją.
-
Cache service for maps presentation in distributed information data exchange system
PublicationThe paper presents the proposition of caches implementation for map presentation in distributed information data exchange system. The concept of cache service is described in the context of distributed information data exchange system elements which control and present on maps positions and other identification data of vessels and other suspicious objects on the territorial sea, sea-coast and the internal sea-waters. The proposed...
-
A game-theoretic study of CSMA/CA under a backoff attack
PublicationAnalizowany jest rozdział pasma realizowany przez protokół CSMA/CA w obecności anonimowych stacji egoistycznych, atakujących wykładniczy mechanizm odczekania. Przy założeniu ruchu nasycającego sieć pokazuje się, że powstaje w ten sposób niekooperacyjna gra o strukturze wypłat wieloosobowego dylematu więźnia. Wykorzystując własności macierzy wypłat zaproponowano strategię dla odpowiedniej gry wieloetapowej, zapewniającą asymptotyczne...
-
Playback Attack Detection: The Search for the Ultimate Set of Antispoof Features
PublicationAutomatic speaker verification systems are vulnerable to several kinds of spoofing attacks. Some of them can be quite simple – for example, the playback of an eavesdropped recording does not require any specialized equipment nor knowledge, but still may pose a serious threat for a biometric identification module built into an e-banking application. In this paper we follow the recent approach and convert recordings to images, assuming...
-
Solvability of a Markovian model of an IEEE 802.11 LANunder a backoff attack
PublicationPrzedstawiono ulepszony model jakościowy mechanizmu CSMA/CA dla bezprzewodowych sieci lokalnych z indywidualną konfiguracją okien rywalizacji. Sformułowano warunki dostateczne rozwiązywalności modelu oraz wykazano obecność bezwarunkowej motywacji do zmniejszania okien rywalizacji.
-
Performance of an ad-hoc 802.11 LAN under a backoff attack
PublicationSamowolna rekonfiguracja wartości okien rywalizacji w protokole MAC sieci bezprzewodowych 802.11 może prowadzić do niesprawiedliwego rozdziału dostępnego pasma transmisyjnego. Dla dużego obciążenia ruchowego sformułowano prosty model markowowski umożliwiający szybką symulację Monte Carlo dla oceny udziału w pasmie poszczególnych stacji sieci. Traktując otrzymane wielkości jako wypłaty w grze niekoalicyjnej przedstawiono niektóre...
-
Semantic Data Sharing and Presentation in Integrated Knowledge System
Publication -
The Role of Virtual Package Shapes in Digital Product Presentation
Publication -
VARIOUS PRESENTATION OF NOISE PERCEPTION IN BYDGOSZCZ GREEN AREAS
Publication -
Challenges in Reporting the COVID-19 Spread and its Presentation to the Society
Publication -
A random access protocol under backoff attack: performance and game-theoretic deterrent
PublicationPrzedstawiono metodę obrony przed atakiem na protokół CSMA/CA, opartą na generacji sekwencji zagłuszających z wykorzystaniem wzajemnej słyszalności stacji. Na podstawie analizy wypłat odpowiedniej gry w formie rozwiniętej pokazano możliwość osiągania punktu równowagi odpowiadającego standardowym ustawieniom protokołu.
-
Analysis of an Attenuator Artifact in an Experimental Attack by Gunn–Allison–Abbott Against the Kirchhoff-Law–Johnson-Noise (KLJN) Secure Key Exchange System
PublicationA recent paper by Gunn–Allison–Abbott (GAA) [L. J. Gunn et al., Scientific Reports 4 (2014) 6461] argued that the Kirchhoff-law–Johnson-noise (KLJN) secure key exchange system could experience a severe information leak. Here we refute their results and demonstrate that GAA’s arguments ensue from a serious design flaw in their system. Specifically, an attenuator broke the single Kirchhoff-loop into two coupled loops, which is an...
-
Clinical presentation of Y189C mutation of the NOTCH3 gene in the Polish family with CADASIL
Publication -
The Effects of Background Color, Shape and Dimensionality on Purchase Intentions in a Digital Product Presentation
Publication -
Clinical Presentation of Herpes Zoster in Immunocompetent and Immunocompromised Hospitalized Children Treated With Acyclovir
Publication -
Assessment of the histrionic self-presentation style: initial validation of the Polish version of the As-If-Scale
Publication -
The role of background color, interletter spacing, and font size on preferences in the digital presentation of a product
Publication -
Information presentation compatibility in a simple digital control panel design: eye-tracking study
Publication -
Integrated geodetic and hydrographic measurements of the yacht port for nautical charts and dynamic spatial presentation
Publication -
Experimental and numerical analysis of the pyrolysis dynamics of a single wood particle: presentation of the radiographic technique
PublicationPyrolysis is an oxygen-free process for the thermal decomposition of raw materials. The heat conduction and flow of pyrolysis products (i.e., the gas fraction and liquid vapour generated during pyrolysis) influence the process and products. In this work, the influence of the orientation of wooden particle fibres with respect to the direction of the heat source on the dynamics of the process was investigated, where there were two...
-
Forty‐two normomenstruating adolescents with Müllerian obstructive anomalies: Presentation, pitfalls in the dagnosis and surgical management
Publication -
Self-Presentation Strategies, Fear of Success and Anticipation of Future Success among University and High School Students
Publication -
Presentation of Novel Architecture for Diagnosis and Identifying Breast Cancer Location Based on Ultrasound Images Using Machine Learning
Publication -
Eye-Tracking Examination of the Anthropological Race, Gender and Verbal-Pictorial Relative Positions on Ergonomics of Visual Information Presentation
Publication -
Intrauterine growth retardation after laparoscopic Roux-en-Y gastric bypass — clinical presentation and literature review
Publication -
Graphical presentation of the power of energy losses and power developed in the elements of hydrostatic drive and control system. Part I. Rotational hydraulic motor speed series throttling control systems
PublicationZaproponowano i uzasadniono wykres przedstawiający kierunek wzrostu strumienia mocy narastającej od wału lub tłoczyska silnika hydraulicznego do wału pomopy, mocy narastającej w wyniku wymuszania przez moce strat energetycznych występujących w elementach układu i sterowania hydrostatycznego. Przedstawiono interpretację graficzną mocy strat energetycznych występujących w elementach układów, a także mocy rozwijanych przez te elementy....
-
Graphical presentation of the power of energy losses and power developed in the elements hydrostatic drive and control system. Part II. Rotational hydraulic motor speed parallel throtling control and volumetric control systems
PublicationPrzedstawiono interpretację graficzną mocy strat energetycznych występujących w elementach układów napędu i sterowania hydrostatycznego, a także mocy rozwijanych przez te elementy. Dokonano analizy układu indywidualnego ze sterowaniem dławieniowym równoległym prędkości silnika hydraulicznego obrotowego, układu indywidualnego ze sterowaniem objętościowym, pompą o zmiennej wydajności, prędkości silnika hydrailicznego obrotowego,...
-
Visually validated semi-automatic high-frequency oscillation detection aides the delineation of epileptogenic regions during intra-operative electrocorticography
PublicationOBJECTIVE: To test the utility of a novel semi-automated method for detecting, validating, and quantifying high-frequency oscillations (HFOs): ripples (80-200 Hz) and fast ripples (200-600 Hz) in intra-operative electrocorticography (ECoG) recordings. METHODS: Sixteen adult patients with temporal lobe epilepsy (TLE) had intra-operative ECoG recordings at the time of resection. The computer-annotated ECoG recordings were visually...
-
Automatic Detection of Nerves in Confocal Corneal Images with Orientation-Based Edge Merging
PublicationThe paper presents an algorithm for improving results of automatic nerve detections in confocal microscopy images of human corneal. The method is designed as a postprocessing step of regular detection. After the nerves are initially detected, the algorithms attempts to improve the results by filling unde-sired gaps between single nerves detections in order to correctly mark the entire nerve instead of only parts of it. This approach...
-
Contour Analysis of Bleeding Regions in Endoscopic Images
PublicationThis paper investigates the problem of detecting bleeding regions in images acquired from endoscopic examinations of gastrointestinal tract. The purpose is to identify the characteristic features of bleeding areas' contours in order to develop an accurate method for discriminating between true bleeding regions and missed detections, which could lead to a significant reduction of the false alarm rate of existing blood-detection...
-
Double-Blind Reputation vs. Intelligent Fake VIP Attacks in Cloud-Assisted Interactions
PublicationWe consider a generic model of Client-Server interactions in the presence of Sender and Relay, conceptual agents acting on behalf of Client and Server, respectively, and modeling cloud service providers in the envisaged "QoS as a Service paradigm". Client generates objects which Sender tags with demanded QoS level, whereas Relay assigns the QoS level to be provided at Server. To verify an object's right to a QoS level, Relay detects...
-
Instantaneous impedance monitoring of AA 7075 aluminum alloy corrosion in borate buffer with admixed chloride ions
PublicationThe study presents a research capabilities of Dynamic Electrochemical Impedance Spectroscopy (DEIS) as a tool used for instantaneous on-line monitoring of corrosion processes on the example of AA 7075 aluminum alloy. A borate buffer with admixed chloride ions in a quantity ranging from 0.05 to 25 mM was used to represent different types of corrosion attack. The surface of samples specimens was evaluated before and after the tests...
-
SafeCity – a GIS-based tool profiled for supporting decision making in urban development and infrastructure protection
PublicationThis paper presents a system for analysis of municipal Critical Infrastructures, which offers integrated tools for target analysis, hazard scenario simulations and spatial analysis within a remotely accessible Web-based Geographic Information System. The system has been applied to research conducted in the city of Gdansk with the aid of blast attack, chemical leakage and flood hazard scenarios, as well as a spatial density algorithm,...
-
Fake VIP Attacks and Their Mitigation via Double-Blind Reputation
PublicationIn a generic setting subsuming communication networks, resource sharing systems, and multi-agent communities, a client generates objects of various classes carrying class-dependent signatures, to which a server assigns class-dependent service quality. A Fake VIP attack consists in false declaration of a high class, with an awareness that detection of object signature at the server side is costly and so invoked reluctantly. We show...
-
Utilising IT-based systems in regatta management
PublicationThe development and increasing accessibility of new technologies has brought changes to the management of sailing regattas. Organisational and promotional difficulties faced by the organisers are now being tackled with software-based systems. This article considers various information technology (IT) systems, designed to support the organisation and presentation of sailing regattas and explores how they are perceived by regatta...
-
Real-time monitoring of volatiles and particles emitted from thermoplastic filaments during 3D printing
PublicationPresentation on the use of instrumental analytical techniques for the assessment of emission of volatiles and particulates during fdm 3d printing.
-
Corporate Restructuring. The directions of Legislative Changes
PublicationThe aim of the paper is the presentation of new legal regulations regarding corporate restructurization and challenges of their implementation to avoid the regulatory risk.
-
Informal model of the cooperation between the r&d institutions and it companies
PublicationThe purpose of this work is presentation of an informal cooperation model for innovation-oriented environment of R&D institutions and software development companies.
-
Wczesne wykrywanie spoofingu GNSS typu carry-off
PublicationW referacie przedstawiono klasyfikację ataków typu spoofing ukierunkowanych na odbiorniki satelitarnych systemów nawigacyjnych GNSS. W szczególności opisano zaawansowaną formę spoofingu w wariancie tzw. carry-off, polegającym na płynnym przejęciu kontroli nad blokami śledzenia sygnałów w zakłócanym odbiorniku. Sposób realizacji takiego ataku istotnie utrudnia jego wykrycie z użyciem metod dotychczas proponowanych w literaturze....
-
Test Execution Logging and Visualization Techniques
PublicationTraditionally, log traces of test cases ex ecution are stored in textual format and their analysis is done in a post- execution phase. Our approach bases on the concept of gr aphical presentation of te st execution which enables better analysis of log traces and also gives the opportunity to consider them on-line. In particular, we discuss the graphical symbols we chose, we pres ent the logging interface we defined a nd describe...
-
Selective jamming of OFDM transmission in NB-IoT radio interface
PublicationThe paper presents the concept of smart jamming, which involves selective interference aimed at critical components of the OFDM signal. Research verifying the feasibility of this type of electronic attack are described. A realized testbed for jamming real NB-IoT signals in a downlink is presented. The test results demonstrate the feasibility of realizing selective jamming and its greater effectiveness compared to barrage interference.