{"id":"https://openalex.org/W4238544449","doi":"https://doi.org/10.23919/icact.2018.8323646","title":"Selective fuzzy ensemble learner for cognitive detection of bio-identifiable modality spoofing in MCPS","display_name":"Selective fuzzy ensemble learner for cognitive detection of bio-identifiable modality spoofing in MCPS","publication_year":2018,"publication_date":"2018-02-01","ids":{"openalex":"https://openalex.org/W4238544449","doi":"https://doi.org/10.23919/icact.2018.8323646"},"language":"en","primary_location":{"id":"doi:10.23919/icact.2018.8323646","is_oa":false,"landing_page_url":"https://doi.org/10.23919/icact.2018.8323646","pdf_url":null,"source":{"id":"https://openalex.org/S4363608106","display_name":"2018 20th International Conference on Advanced Communication Technology (ICACT)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"conference"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2018 20th International Conference on Advanced Communication Technology (ICACT)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5077200778","display_name":"Nishat I Mowla","orcid":"https://orcid.org/0000-0002-3687-6755"},"institutions":[{"id":"https://openalex.org/I138925566","display_name":"Ewha Womans University","ror":"https://ror.org/053fp5c05","country_code":"KR","type":"education","lineage":["https://openalex.org/I138925566"]}],"countries":["KR"],"is_corresponding":true,"raw_author_name":"Nishat Mowla","raw_affiliation_strings":["Department of Computer Science and Engineering, Ewha Womans University, Seoul, Korea"],"affiliations":[{"raw_affiliation_string":"Department of Computer Science and Engineering, Ewha Womans University, Seoul, Korea","institution_ids":["https://openalex.org/I138925566"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5025644339","display_name":"Inshil Doh","orcid":"https://orcid.org/0000-0003-2814-2070"},"institutions":[{"id":"https://openalex.org/I138925566","display_name":"Ewha Womans University","ror":"https://ror.org/053fp5c05","country_code":"KR","type":"education","lineage":["https://openalex.org/I138925566"]}],"countries":["KR"],"is_corresponding":false,"raw_author_name":"Inshil Doh","raw_affiliation_strings":["Department of Computer Science and Engineering, Ewha Womans University, Seoul, Korea"],"affiliations":[{"raw_affiliation_string":"Department of Computer Science and Engineering, Ewha Womans University, Seoul, Korea","institution_ids":["https://openalex.org/I138925566"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5030248227","display_name":"Kijoon Chae","orcid":"https://orcid.org/0000-0002-6045-5192"},"institutions":[{"id":"https://openalex.org/I138925566","display_name":"Ewha Womans University","ror":"https://ror.org/053fp5c05","country_code":"KR","type":"education","lineage":["https://openalex.org/I138925566"]}],"countries":["KR"],"is_corresponding":false,"raw_author_name":"KiJoon Chae","raw_affiliation_strings":["Department of Cyber Security, Ewha Womans University, Seoul, Korea"],"affiliations":[{"raw_affiliation_string":"Department of Cyber Security, Ewha Womans University, Seoul, Korea","institution_ids":["https://openalex.org/I138925566"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5077200778"],"corresponding_institution_ids":["https://openalex.org/I138925566"],"apc_list":null,"apc_paid":null,"fwci":1.3802,"has_fulltext":false,"cited_by_count":9,"citation_normalized_percentile":{"value":0.84920635,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":90,"max":97},"biblio":{"volume":null,"issue":null,"first_page":"63","last_page":"67"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10828","display_name":"Biometric Identification and Security","score":0.9994999766349792,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10828","display_name":"Biometric Identification and Security","score":0.9994999766349792,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11800","display_name":"User Authentication and Security Systems","score":0.9936000108718872,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T13062","display_name":"Cognitive Computing and Networks","score":0.9570000171661377,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/spoofing-attack","display_name":"Spoofing attack","score":0.8139773011207581},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7504667043685913},{"id":"https://openalex.org/keywords/biometrics","display_name":"Biometrics","score":0.6706680655479431},{"id":"https://openalex.org/keywords/fingerprint","display_name":"Fingerprint (computing)","score":0.6178871393203735},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.5850976705551147},{"id":"https://openalex.org/keywords/liveness","display_name":"Liveness","score":0.560146689414978},{"id":"https://openalex.org/keywords/authentication","display_name":"Authentication (law)","score":0.5435317754745483},{"id":"https://openalex.org/keywords/modality","display_name":"Modality (human\u2013computer interaction)","score":0.5381684303283691},{"id":"https://openalex.org/keywords/machine-learning","display_name":"Machine learning","score":0.527850866317749},{"id":"https://openalex.org/keywords/adaboost","display_name":"AdaBoost","score":0.4783196449279785},{"id":"https://openalex.org/keywords/feature","display_name":"Feature (linguistics)","score":0.47601017355918884},{"id":"https://openalex.org/keywords/feature-extraction","display_name":"Feature extraction","score":0.4465588331222534},{"id":"https://openalex.org/keywords/process","display_name":"Process (computing)","score":0.42597270011901855},{"id":"https://openalex.org/keywords/pattern-recognition","display_name":"Pattern recognition (psychology)","score":0.3277880847454071},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.299064040184021},{"id":"https://openalex.org/keywords/support-vector-machine","display_name":"Support vector machine","score":0.16784924268722534}],"concepts":[{"id":"https://openalex.org/C167900197","wikidata":"https://www.wikidata.org/wiki/Q11081100","display_name":"Spoofing attack","level":2,"score":0.8139773011207581},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7504667043685913},{"id":"https://openalex.org/C184297639","wikidata":"https://www.wikidata.org/wiki/Q177765","display_name":"Biometrics","level":2,"score":0.6706680655479431},{"id":"https://openalex.org/C2777826928","wikidata":"https://www.wikidata.org/wiki/Q3745713","display_name":"Fingerprint (computing)","level":2,"score":0.6178871393203735},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.5850976705551147},{"id":"https://openalex.org/C15569618","wikidata":"https://www.wikidata.org/wiki/Q3561421","display_name":"Liveness","level":2,"score":0.560146689414978},{"id":"https://openalex.org/C148417208","wikidata":"https://www.wikidata.org/wiki/Q4825882","display_name":"Authentication (law)","level":2,"score":0.5435317754745483},{"id":"https://openalex.org/C2780226545","wikidata":"https://www.wikidata.org/wiki/Q6888030","display_name":"Modality (human\u2013computer interaction)","level":2,"score":0.5381684303283691},{"id":"https://openalex.org/C119857082","wikidata":"https://www.wikidata.org/wiki/Q2539","display_name":"Machine learning","level":1,"score":0.527850866317749},{"id":"https://openalex.org/C141404830","wikidata":"https://www.wikidata.org/wiki/Q2823869","display_name":"AdaBoost","level":3,"score":0.4783196449279785},{"id":"https://openalex.org/C2776401178","wikidata":"https://www.wikidata.org/wiki/Q12050496","display_name":"Feature (linguistics)","level":2,"score":0.47601017355918884},{"id":"https://openalex.org/C52622490","wikidata":"https://www.wikidata.org/wiki/Q1026626","display_name":"Feature extraction","level":2,"score":0.4465588331222534},{"id":"https://openalex.org/C98045186","wikidata":"https://www.wikidata.org/wiki/Q205663","display_name":"Process (computing)","level":2,"score":0.42597270011901855},{"id":"https://openalex.org/C153180895","wikidata":"https://www.wikidata.org/wiki/Q7148389","display_name":"Pattern recognition (psychology)","level":2,"score":0.3277880847454071},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.299064040184021},{"id":"https://openalex.org/C12267149","wikidata":"https://www.wikidata.org/wiki/Q282453","display_name":"Support vector machine","level":2,"score":0.16784924268722534},{"id":"https://openalex.org/C41895202","wikidata":"https://www.wikidata.org/wiki/Q8162","display_name":"Linguistics","level":1,"score":0.0},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.0},{"id":"https://openalex.org/C199360897","wikidata":"https://www.wikidata.org/wiki/Q9143","display_name":"Programming language","level":1,"score":0.0},{"id":"https://openalex.org/C138885662","wikidata":"https://www.wikidata.org/wiki/Q5891","display_name":"Philosophy","level":0,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.23919/icact.2018.8323646","is_oa":false,"landing_page_url":"https://doi.org/10.23919/icact.2018.8323646","pdf_url":null,"source":{"id":"https://openalex.org/S4363608106","display_name":"2018 20th International Conference on Advanced Communication Technology (ICACT)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"conference"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2018 20th International Conference on Advanced Communication Technology (ICACT)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[{"display_name":"Reduced inequalities","score":0.4300000071525574,"id":"https://metadata.un.org/sdg/10"}],"awards":[],"funders":[{"id":"https://openalex.org/F4320322120","display_name":"National Research Foundation of Korea","ror":"https://ror.org/013aysd81"}],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":14,"referenced_works":["https://openalex.org/W10697079","https://openalex.org/W1502160187","https://openalex.org/W1551947943","https://openalex.org/W1934184906","https://openalex.org/W1974019064","https://openalex.org/W2000889716","https://openalex.org/W2008159608","https://openalex.org/W2090826149","https://openalex.org/W2136975665","https://openalex.org/W2151270693","https://openalex.org/W2535485187","https://openalex.org/W6630005630","https://openalex.org/W6633150018","https://openalex.org/W6682293644"],"related_works":["https://openalex.org/W2533239677","https://openalex.org/W2140593870","https://openalex.org/W4389545061","https://openalex.org/W3126377002","https://openalex.org/W2903861076","https://openalex.org/W2604576816","https://openalex.org/W2729608596","https://openalex.org/W2913345013","https://openalex.org/W2900020547","https://openalex.org/W2020816142"],"abstract_inverted_index":{"Biometric":[0],"features":[1],"are":[2,27,37,52,67,82],"widely":[3],"used":[4,29,72,202],"for":[5,91,203],"user":[6],"authentication":[7,204],"and":[8,13,35,125,143,167,171],"equally":[9],"important":[10],"to":[11,84,122,140,174],"national":[12],"global":[14],"technology":[15],"systems.":[16,59],"Various":[17],"forms":[18],"of":[19,54,69,78,134,169,178],"biometric":[20,57],"features,":[21],"such":[22],"as":[23],"face,":[24],"iris,":[25],"fingerprint,":[26],"commonly":[28],"while":[30],"more":[31],"recently":[32],"palm,":[33],"vein":[34],"gait":[36],"also":[38,46],"getting":[39],"attention.":[40],"Simultaneously":[41],"various":[42],"spoofing":[43,74,197],"approaches":[44,149],"have":[45],"been":[47],"developed":[48],"over":[49],"time,":[50],"which":[51],"capable":[53],"failing":[55],"traditional":[56,79],"detection":[58,80,177,198],"Image":[60],"synthesis":[61],"with":[62,146,191],"play-doh,":[63],"gelatin,":[64],"ecoflex":[65],"etc.":[66],"some":[68],"the":[70,115,119,153,176],"ways":[71],"in":[73,114,205],"bio-identifiable":[75,179],"property.":[76],"Success":[77],"systems":[81],"related":[83],"custom":[85],"tailored":[86],"solutions":[87],"where":[88],"feature":[89,165],"engineering":[90],"each":[92],"attack":[93,108,116],"type":[94],"must":[95],"be":[96,123,201],"developed.":[97],"This":[98],"is":[99,184],"not":[100],"a":[101,111,128,156,192],"feasible":[102],"process":[103],"when":[104],"we":[105],"consider":[106],"countless":[107],"possibilities.":[109],"Also,":[110],"slight":[112],"change":[113],"can":[117,200],"cause":[118],"whole":[120],"system":[121],"redesigned":[124],"therefore":[126],"becomes":[127],"limiting":[129],"constraint.":[130],"The":[131],"recent":[132],"success":[133],"machine":[135],"learning":[136,148],"inspires":[137],"this":[138],"paper":[139,154],"explore":[141],"weak":[142,170],"strong":[144,172],"learners":[145,173],"ensemble":[147,158],"using":[150,162],"AdaBoost.":[151],"Therefore,":[152],"proposes":[155],"selective":[157],"fuzzy":[159],"learner":[160],"approach":[161],"Ada":[163],"Boost,":[164],"selection":[166],"combination":[168],"enhance":[175],"modality":[180,196],"spoofing.":[181],"Our":[182],"proposal":[183],"verified":[185],"on":[186,194],"real":[187],"dataset,":[188],"LiveDet":[189],"2015,":[190],"focus":[193],"fingerprint":[195],"that":[199],"Medical":[206],"Cyber":[207],"Physical":[208],"Systems":[209],"(MCPS).":[210]},"counts_by_year":[{"year":2025,"cited_by_count":3},{"year":2021,"cited_by_count":2},{"year":2019,"cited_by_count":3},{"year":2018,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
