Skip to search form
Skip to main content
Skip to account menu
Semantic Scholar
Semantic Scholar's Logo
Search 218,261,199 papers from all fields of science
Search
Sign In
Create Free Account
Spoofing attack
Known as:
Email forging
, GPS spoofing
, Spoof attack
Expand
In the context of network security, a spoofing attack is a situation in which one person or program successfully masquerades as another by falsifying…
Expand
Wikipedia
(opens in a new tab)
Create Alert
Alert
Related topics
Related topics
50 relations
ARP spoofing
Adversary (cryptography)
Anti-spam techniques
Authentication
Expand
Papers overview
Semantic Scholar uses AI to extract papers important to this topic.
Highly Cited
2015
Highly Cited
2015
An Energy-Ratio-Based Approach for Detecting Pilot Spoofing Attack in Multiple-Antenna Systems
Qi Xiong
,
Ying-Chang Liang
,
K. H. Li
,
Yi Gong
IEEE Transactions on Information Forensics and…
2015
Corpus ID: 18223088
The pilot spoofing attack is one kind of active eavesdropping conducted by a malicious user during the channel estimation phase…
Expand
Highly Cited
2014
Highly Cited
2014
Biometrics Evaluation Under Spoofing Attacks
Ivana Chingovska
,
André Anjos
,
S. Marcel
IEEE Transactions on Information Forensics and…
2014
Corpus ID: 15501332
While more accurate and reliable than ever, the trustworthiness of biometric verification systems is compromised by the emergence…
Expand
Highly Cited
2013
Highly Cited
2013
Computationally Efficient Face Spoofing Detection with Motion Magnification
Samarth Bharadwaj
,
Tejas I. Dhamecha
,
Mayank Vatsa
,
Richa Singh
IEEE Conference on Computer Vision and Pattern…
2013
Corpus ID: 914545
For a robust face biometric system, a reliable anti-spoofing approach must be deployed to circumvent the print and replay attacks…
Expand
Highly Cited
2013
Highly Cited
2013
Spoofing in 2D face recognition with 3D masks and anti-spoofing with Kinect
N. Erdogmus
,
S. Marcel
International Conference on Biometrics: Theory…
2013
Corpus ID: 5686768
The problem of detecting face spoofing attacks (presentation attacks) has recently gained a well-deserved popularity. Mainly…
Expand
Highly Cited
2013
Highly Cited
2013
Detection and Localization of Multiple Spoofing Attackers in Wireless Networks
Jie Yang
,
Yingying Chen
,
W. Trappe
,
Jerry Q. Cheng
IEEE Transactions on Parallel and Distributed…
2013
Corpus ID: 885497
Wireless spoofing attacks are easy to launch and can significantly impact the performance of networks. Although the identity of a…
Expand
Highly Cited
2013
Highly Cited
2013
Complementary countermeasures for detecting scenic face spoofing attacks
Jukka Komulainen
,
A. Hadid
,
M. Pietikäinen
,
André Anjos
,
S. Marcel
International Conference on Biometrics
2013
Corpus ID: 2582839
The face recognition community has finally started paying more attention to the long-neglected problem of spoofing attacks. The…
Expand
Highly Cited
2012
Highly Cited
2012
LBP − T OP based countermeasure against face spoofing attacks
Tiago de Freitas Pereira
,
André Anjos
,
J. M. D. Martino
,
S´ebastien Marcel
2012
Corpus ID: 854745
. User authentication is an important step to protect information and in this field face biometrics is advantageous. Face…
Expand
Highly Cited
2009
Highly Cited
2009
Receiver-Autonomous Spoofing Detection: Experimental Results of a Multi-Antenna Receiver Defense against a Portable Civil GPS Spoofer
P. Montgomery
,
T. Humphreys
,
B. Ledvina
2009
Corpus ID: 42959597
In this work we demonstrate the use of a dual antenna receiver that employs a receiver-autonomous angle-ofarrival spoofing…
Expand
Highly Cited
2008
Highly Cited
2008
Detecting 802.11 MAC Layer Spoofing Using Received Signal Strength
Yong Sheng
,
Keren Tan
,
Guanling Chen
,
D. Kotz
,
A. Campbell
IEEE INFOCOM - The 27th Conference on Computer…
2008
Corpus ID: 10268684
MAC addresses can be easily spoofed in 802.11 wireless LANs. An adversary can exploit this vulnerability to launch a large number…
Expand
Highly Cited
2007
Highly Cited
2007
Detecting and Localizing Wireless Spoofing Attacks
Yingying Chen
,
W. Trappe
,
R. Martin
Annual IEEE Communications Society Conference on…
2007
Corpus ID: 641264
Wireless networks are vulnerable to spoofing attacks, which allows for many other forms of attacks on the networks. Although the…
Expand
By clicking accept or continuing to use the site, you agree to the terms outlined in our
Privacy Policy
(opens in a new tab)
,
Terms of Service
(opens in a new tab)
, and
Dataset License
(opens in a new tab)
ACCEPT & CONTINUE