Restrictive Voting Technique for Faces Spoofing Attack.
Mahmoud OmaraMahmoud FayezHeba KhalidSaid GhoniemyPublished in: Int. J. Commun. Networks Inf. Secur. (2023)
Keyphrases
- ddos attacks
- face identification
- face recognition
- face images
- attack detection
- countermeasures
- human faces
- voting method
- voting schemes
- malicious attacks
- face verification
- special case
- key exchange protocol
- data sets
- denial of service attacks
- weighted voting
- social choice
- dos attacks
- line drawings
- intrusion detection
- principal component analysis
- information systems