Просмотр по теме "x-vector"
Отображаемые элементы 1-5 из 5
-
DEVELOPMENT OF SECURITY SYSTEMS USING DNN AND I & X-VECTOR CLASSIFIERS
(Eastern-European Journal of Enterprise Technologies, 2021)The widespread use of biometric systems entails increased interest from cybercriminals aimed at developing attacks to crack them. Thus, the development of biometric identification systems must be carried out taking into account protection against these attacks. The development of new methods and algorithms for identification based on the presentation of randomly ...2024-12-17 -
DEVELOPMENT OF SECURITY SYSTEMS USING DNN AND I & X-VECTOR CLASSIFIERS
(Eastern-European Journal of Enterprise Technologies, 2021)The widespread use of biometric systems entails increased interest from cybercriminals aimed at developing attacks to crack them. Thus, the development of biometric identification systems must be carried out taking into account protection against these attacks. The development of new methods and algorithms for identification based on the presentation of randomly ...2024-12-10 -
DEVELOPMENT OF SECURITY SYSTEMS USING DNN AND I & X-VECTOR CLASSIFIERS
(Eastern-European Journal of Enterprise Technologies, 2021)The widespread use of biometric systems entails increased interest from cybercriminals aimed at developing attacks to crack them. Thus, the development of biometric identification systems must be carried out taking into account protection against these attacks. The development of new methods and algorithms for identification based on the presentation of randomly generated key ...2024-09-20 -
DEVELOPMENT OF SECURITY SYSTEMS USING DNN AND I & X-VECTOR CLASSIFIERS
(Eastern-European Journal of Enterprise Technologies, 2021)The widespread use of biometric systems entails increased interest from cybercriminals aimed at developing attacks to crack them. Thus, the development of biometric identification systems must be carried out taking into account protection against these attacks. The development of new methods and algorithms for identification based on the presentation of randomly generated key ...2024-11-25
