Zobrazeno 1 - 10
of 44
pro vyhledávání: '"Anton Konev"'
Publikováno v:
Journal of Communications Software and Systems, Vol 15, Iss 3, Pp 254-261 (2019)
Handwritten signatures are used in authentication systems as a universal biometric identifier. Signature authenticity verification requires building and training a classifier. This paper describes a new approach to the verification of handwritten sig
Externí odkaz:
https://doaj.org/article/4131b108ac674e128fe99acfcaf8617e
Autor:
Pavel Laptev, Sergey Litovkin, Sergey Davydenko, Anton Konev, Evgeny Kostyuchenko, Alexander Shelupanov
Publikováno v:
Future Internet, Vol 14, Iss 3, p 88 (2022)
This paper compares neural networks, specifically Unet, MobileNetV2, VGG16 and YOLOv4-tiny, for image segmentation as part of a study aimed at finding an optimal solution for price tag data analysis. The neural networks considered were trained on an
Externí odkaz:
https://doaj.org/article/2065ae89a04644c1874683919caf095d
Publikováno v:
Symmetry, Vol 14, Iss 3, p 549 (2022)
Information security is one of the most important attributes of distributed systems that often operate on unreliable networks. Enabling security features during the development of a distributed system requires the careful analysis of potential attack
Externí odkaz:
https://doaj.org/article/661deb9fb6e24d37bd79e76e0060cf9f
Publikováno v:
Computers, Vol 11, Iss 3, p 47 (2022)
A promising approach to overcome the various shortcomings of password systems is the use of biometric authentication, in particular the use of electroencephalogram (EEG) data. In this paper, we propose a subject-independent learning method for EEG-ba
Externí odkaz:
https://doaj.org/article/c44b5ef16e7c476ea2e21634ef13e46f
Publikováno v:
Information, Vol 13, Iss 2, p 77 (2022)
Machine learning algorithms based on neural networks are vulnerable to adversarial attacks. The use of attacks against authentication systems greatly reduces the accuracy of such a system, despite the complexity of generating a competitive example. A
Externí odkaz:
https://doaj.org/article/cc0f59abaf4844b19db7cd3093dec6ef
Publikováno v:
Data, Vol 7, Iss 2, p 22 (2022)
Almost all industrial internet of things (IIoT) attacks happen at the data transmission layer according to a majority of the sources. In IIoT, different machine learning (ML) and deep learning (DL) techniques are used for building the intrusion detec
Externí odkaz:
https://doaj.org/article/440392091cbb4a04b362e31a4b675fd6
Publikováno v:
Future Internet, Vol 13, Iss 12, p 321 (2021)
The determining factor in the accelerated pace of informatization is the increase in the speed and reliability of data transmission networks. In this regard, new and existing standards are developed and modernized. A lot of organizations are constant
Externí odkaz:
https://doaj.org/article/18427bdd29364983a6a81a57b60e8971
Publikováno v:
Computers, Vol 10, Iss 12, p 162 (2021)
In recent years, a lot of IoT devices, wireless sensors, and smart things contain information that must be transmitted to the server for further processing. Due to the distance between devices, battery power, and the possibility of sudden device fail
Externí odkaz:
https://doaj.org/article/750647ee732648a8bf9c442b65b07ba3
Publikováno v:
Risks, Vol 9, Iss 7, p 133 (2021)
The need to assess the risks of the trustworthiness of counterparties is increasing every year. The identification of increasing cases of unfair behavior among counterparties only confirms the relevance of this topic. The existing work in the field o
Externí odkaz:
https://doaj.org/article/4db81f97c190405db18dc705ddfd2920
Publikováno v:
Information, Vol 12, Iss 1, p 19 (2021)
Modern facial recognition algorithms make it possible to identify system users by their appearance with a high level of accuracy. In such cases, an image of the user’s face is converted to parameters that later are used in a recognition process. On
Externí odkaz:
https://doaj.org/article/91205c783d6b4e4b965f21c081f6550b