Phantom-CSI Attacks against Wireless Liveness Detection
Abstract
References
Index Terms
- Phantom-CSI Attacks against Wireless Liveness Detection
Recommendations
Unraveling robustness of deep face anti-spoofing models against pixel attacks
AbstractIn the last few decades, deep-learning-based face verification and recognition systems have had enormous success in solving complex security problems. However, it has been recently shown that such efficient frameworks are vulnerable to face-...
Innovative Teaching and Learning Experiences in Network Attacks and Defense
CIS '12: Proceedings of the 2012 Eighth International Conference on Computational Intelligence and SecurityNetwork attacks and defense, as a core lesson in the field of the information security, introduce a kind of educational method called situational teaching which separate attacking roles as well as defending ones apart dividing this course into 12 ...
Mimicry Attacks on Smartphone Keystroke Authentication
Keystroke behaviour-based authentication employs the unique typing behaviour of users to authenticate them. Recent such proposals for virtual keyboards on smartphones employ diverse temporal, contact, and spatial features to achieve over 95% accuracy. ...
Comments
Please enable JavaScript to view thecomments powered by Disqus.Information & Contributors
Information
Published In
Publisher
Association for Computing Machinery
New York, NY, United States
Publication History
Check for updates
Author Tags
Qualifiers
- Research-article
- Research
- Refereed limited
Funding Sources
Conference
Acceptance Rates
Contributors
Other Metrics
Bibliometrics & Citations
Bibliometrics
Article Metrics
- 0Total Citations
- 373Total Downloads
- Downloads (Last 12 months)373
- Downloads (Last 6 weeks)53
Other Metrics
Citations
View Options
View options
View or Download as a PDF file.
PDFeReader
View online with eReader.
eReaderHTML Format
View this article in HTML Format.
HTML FormatGet Access
Login options
Check if you have access through your login credentials or your institution to get full access on this article.
Sign in