Stop the war!
Остановите войну!
for scientists:
default search action
Search dblp for Publications
export results for "toc:db/journals/tifs/tifs13.bht:"
@article{DBLP:journals/tifs/0003YMY18, author = {Xiaoyong Li and Jie Yuan and Huadong Ma and Wenbin Yao}, title = {Fast and Parallel Trust Computing Scheme Based on Big Data Analysis for Collaboration Cloud Service}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {13}, number = {8}, pages = {1917--1931}, year = {2018}, url = {https://doi.org/10.1109/TIFS.2018.2806925}, doi = {10.1109/TIFS.2018.2806925}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/0003YMY18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/AhmadianJ18, author = {Zahra Ahmadian and Sadegh Jamshidpour}, title = {Linear Subspace Cryptanalysis of Harn's Secret Sharing-Based Group Authentication Scheme}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {13}, number = {2}, pages = {502--510}, year = {2018}, url = {https://doi.org/10.1109/TIFS.2017.2757454}, doi = {10.1109/TIFS.2017.2757454}, timestamp = {Thu, 06 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/AhmadianJ18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/AkcayKWB18, author = {Samet Akcay and Mikolaj E. Kundegorski and Chris G. Willcocks and Toby P. Breckon}, title = {Using Deep Convolutional Neural Network Architectures for Object Classification and Detection Within X-Ray Baggage Security Imagery}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {13}, number = {9}, pages = {2203--2215}, year = {2018}, url = {https://doi.org/10.1109/TIFS.2018.2812196}, doi = {10.1109/TIFS.2018.2812196}, timestamp = {Thu, 06 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/AkcayKWB18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/AkhavanM18, author = {Amir Akhavan and Mohammad H. Moradi}, title = {Detection of Concealed Information Using Multichannel Discriminative Dictionary and Spatial Filter Learning}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {13}, number = {10}, pages = {2616--2627}, year = {2018}, url = {https://doi.org/10.1109/TIFS.2018.2825940}, doi = {10.1109/TIFS.2018.2825940}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tifs/AkhavanM18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/Al-NahariGAAY18, author = {Azzam Al{-}Nahari and Giovanni Geraci and Mukarram Al{-}jamali and Mohamed Hossam Ahmed and Nan Yang}, title = {Beamforming With Artificial Noise for Secure {MISOME} Cognitive Radio Transmissions}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {13}, number = {8}, pages = {1875--1889}, year = {2018}, url = {https://doi.org/10.1109/TIFS.2018.2797055}, doi = {10.1109/TIFS.2018.2797055}, timestamp = {Thu, 06 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/Al-NahariGAAY18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/AlmohriWE18, author = {Hussain M. J. Almohri and Layne T. Watson and David Evans}, title = {Misery Digraphs: Delaying Intrusion Attacks in Obscure Clouds}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {13}, number = {6}, pages = {1361--1375}, year = {2018}, url = {https://doi.org/10.1109/TIFS.2017.2779436}, doi = {10.1109/TIFS.2017.2779436}, timestamp = {Thu, 06 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/AlmohriWE18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/AlmudhahkaNH18, author = {Nawaf Yousef Almudhahka and Mark S. Nixon and Jonathon S. Hare}, title = {Semantic Face Signatures: Recognizing and Retrieving Faces by Verbal Descriptions}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {13}, number = {3}, pages = {706--716}, year = {2018}, url = {https://doi.org/10.1109/TIFS.2017.2765519}, doi = {10.1109/TIFS.2017.2765519}, timestamp = {Thu, 06 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/AlmudhahkaNH18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/AmeliHYEY18, author = {Amir Ameli and Ali Hooshyar and Ameen Hassan Yazdavar and Ehab F. El{-}Saadany and Amr M. Youssef}, title = {Attack Detection for Load Frequency Control Systems Using Stochastic Unknown Input Estimators}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {13}, number = {10}, pages = {2575--2590}, year = {2018}, url = {https://doi.org/10.1109/TIFS.2018.2824253}, doi = {10.1109/TIFS.2018.2824253}, timestamp = {Thu, 06 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/AmeliHYEY18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/AminantoCTYK18, author = {Muhamad Erza Aminanto and Rakyong Choi and Harry Chandra Tanuwidjaja and Paul D. Yoo and Kwangjo Kim}, title = {Deep Abstraction and Weighted Feature Selection for Wi-Fi Impersonation Detection}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {13}, number = {3}, pages = {621--636}, year = {2018}, url = {https://doi.org/10.1109/TIFS.2017.2762828}, doi = {10.1109/TIFS.2017.2762828}, timestamp = {Thu, 06 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/AminantoCTYK18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/AonghusaL18, author = {Pol Mac Aonghusa and Douglas J. Leith}, title = {Plausible Deniability in Web Search - From Detection to Assessment}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {13}, number = {4}, pages = {874--887}, year = {2018}, url = {https://doi.org/10.1109/TIFS.2017.2769025}, doi = {10.1109/TIFS.2017.2769025}, timestamp = {Thu, 06 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/AonghusaL18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/Artigas18, author = {Marc S{\'{a}}nchez Artigas}, title = {Enhancing Tree-Based {ORAM} Using Batched Request Reordering}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {13}, number = {3}, pages = {590--604}, year = {2018}, url = {https://doi.org/10.1109/TIFS.2017.2762824}, doi = {10.1109/TIFS.2017.2762824}, timestamp = {Tue, 16 Aug 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/Artigas18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/BayarS18, author = {Belhassen Bayar and Matthew C. Stamm}, title = {Constrained Convolutional Neural Networks: {A} New Approach Towards General Purpose Image Manipulation Detection}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {13}, number = {11}, pages = {2691--2706}, year = {2018}, url = {https://doi.org/10.1109/TIFS.2018.2825953}, doi = {10.1109/TIFS.2018.2825953}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tifs/BayarS18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/BayatW18, author = {Farhang Bayat and Shuangqing Wei}, title = {Non-Adaptive Sequential Detection of Active Edge-Wise Disjoint Subgraphs Under Privacy Constraints}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {13}, number = {7}, pages = {1615--1625}, year = {2018}, url = {https://doi.org/10.1109/TIFS.2018.2790937}, doi = {10.1109/TIFS.2018.2790937}, timestamp = {Thu, 06 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/BayatW18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/Best-RowdenJ18, author = {Lacey Best{-}Rowden and Anil K. Jain}, title = {Learning Face Image Quality From Human Assessments}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {13}, number = {12}, pages = {3064--3077}, year = {2018}, url = {https://doi.org/10.1109/TIFS.2018.2799585}, doi = {10.1109/TIFS.2018.2799585}, timestamp = {Thu, 06 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/Best-RowdenJ18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/BiesmansBRPV18, author = {Wouter Biesmans and Josep Balasch and Alfredo Rial and Bart Preneel and Ingrid Verbauwhede}, title = {Private Mobile Pay-TV From Priced Oblivious Transfer}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {13}, number = {2}, pages = {280--291}, year = {2018}, url = {https://doi.org/10.1109/TIFS.2017.2746058}, doi = {10.1109/TIFS.2017.2746058}, timestamp = {Thu, 06 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/BiesmansBRPV18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/BocheD18, author = {Holger Boche and Christian Deppe}, title = {Secure Identification for Wiretap Channels; Robustness, Super-Additivity and Continuity}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {13}, number = {7}, pages = {1641--1655}, year = {2018}, url = {https://doi.org/10.1109/TIFS.2018.2797004}, doi = {10.1109/TIFS.2018.2797004}, timestamp = {Thu, 06 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/BocheD18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/BoroumandF18, author = {Mehdi Boroumand and Jessica J. Fridrich}, title = {Applications of Explicit Non-Linear Feature Maps in Steganalysis}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {13}, number = {4}, pages = {823--833}, year = {2018}, url = {https://doi.org/10.1109/TIFS.2017.2766580}, doi = {10.1109/TIFS.2017.2766580}, timestamp = {Thu, 06 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/BoroumandF18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/BuL18, author = {Kai Bu and Yingjiu Li}, title = {Every Step You Take, I'll Be Watching You: Practical StepAuth-Entication of {RFID} Paths}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {13}, number = {4}, pages = {834--849}, year = {2018}, url = {https://doi.org/10.1109/TIFS.2017.2768022}, doi = {10.1109/TIFS.2017.2768022}, timestamp = {Thu, 06 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/BuL18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/BurmesterMO18, author = {Mike Burmester and Jorge Munilla and Andr{\'{e}}s Ortiz}, title = {Comments on "Unreconciled Collisions Uncover Cloning Attacks in Anonymous {RFID} Systems"}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {13}, number = {11}, pages = {2929--2931}, year = {2018}, url = {https://doi.org/10.1109/TIFS.2018.2834876}, doi = {10.1109/TIFS.2018.2834876}, timestamp = {Thu, 28 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/BurmesterMO18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/CalderoniPM18, author = {Luca Calderoni and Paolo Palmieri and Dario Maio}, title = {Probabilistic Properties of the Spatial Bloom Filters and Their Relevance to Cryptographic Protocols}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {13}, number = {7}, pages = {1710--1721}, year = {2018}, url = {https://doi.org/10.1109/TIFS.2018.2799486}, doi = {10.1109/TIFS.2018.2799486}, timestamp = {Thu, 06 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/CalderoniPM18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/Campisi18, author = {Patrizio Campisi}, title = {Editorial}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {13}, number = {1}, pages = {5}, year = {2018}, url = {https://doi.org/10.1109/TIFS.2017.2788318}, doi = {10.1109/TIFS.2017.2788318}, timestamp = {Thu, 06 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/Campisi18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/Campomanes-Alvarez18, author = {Carmen Campomanes{-}{\'{A}}lvarez and Rub{\'{e}}n Martos{-}Fern{\'{a}}ndez and Caroline Wilkinson and {\'{O}}scar Ib{\'{a}}{\~{n}}ez and Oscar Cord{\'{o}}n}, title = {Modeling Skull-Face Anatomical/Morphological Correspondence for Craniofacial Superimposition-Based Identification}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {13}, number = {6}, pages = {1481--1494}, year = {2018}, url = {https://doi.org/10.1109/TIFS.2018.2791434}, doi = {10.1109/TIFS.2018.2791434}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/Campomanes-Alvarez18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/CaoCWY18, author = {Kuo Cao and Yueming Cai and Yongpeng Wu and Weiwei Yang}, title = {Secure Communication for Amplify-and-Forward Relay Networks With Finite Alphabet Input}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {13}, number = {9}, pages = {2269--2278}, year = {2018}, url = {https://doi.org/10.1109/TIFS.2018.2818065}, doi = {10.1109/TIFS.2018.2818065}, timestamp = {Thu, 29 Sep 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/CaoCWY18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/ChanLCYZWH18, author = {Patrick P. K. Chan and Weiwen Liu and Danni Chen and Daniel S. Yeung and Fei Zhang and Xizhao Wang and Chien{-}Chang Hsu}, title = {Face Liveness Detection Using a Flash Against 2D Spoofing Attack}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {13}, number = {2}, pages = {521--534}, year = {2018}, url = {https://doi.org/10.1109/TIFS.2017.2758748}, doi = {10.1109/TIFS.2017.2758748}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/ChanLCYZWH18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/ChenHLZ18, author = {Dong{-}Hua Chen and Yu{-}Cheng He and Xiaodan Lin and Rui Zhao}, title = {Both Worst-Case and Chance-Constrained Robust Secure {SWIPT} in {MISO} Interference Channels}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {13}, number = {2}, pages = {306--317}, year = {2018}, url = {https://doi.org/10.1109/TIFS.2017.2746063}, doi = {10.1109/TIFS.2017.2746063}, timestamp = {Thu, 06 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/ChenHLZ18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/ChenKV18, author = {Yanling Chen and Onur Ozan Koyluoglu and A. J. Han Vinck}, title = {Collective Secrecy Over the K-Transmitter Multiple Access Channel}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {13}, number = {9}, pages = {2279--2293}, year = {2018}, url = {https://doi.org/10.1109/TIFS.2018.2818067}, doi = {10.1109/TIFS.2018.2818067}, timestamp = {Thu, 06 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/ChenKV18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/ChenWLCMLDWQ18, author = {Fei Chen and Donghong Wang and Ronghua Li and Jianyong Chen and Zhong Ming and Alex X. Liu and Huayi Duan and Cong Wang and Jing Qin}, title = {Secure Hashing-Based Verifiable Pattern Matching}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {13}, number = {11}, pages = {2677--2690}, year = {2018}, url = {https://doi.org/10.1109/TIFS.2018.2825141}, doi = {10.1109/TIFS.2018.2825141}, timestamp = {Thu, 06 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/ChenWLCMLDWQ18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/ChenWZCDA18, author = {Jing Chen and Chiheng Wang and Ziming Zhao and Kai Chen and Ruiying Du and Gail{-}Joon Ahn}, title = {Uncovering the Face of Android Ransomware: Characterization and Real-Time Detection}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {13}, number = {5}, pages = {1286--1300}, year = {2018}, url = {https://doi.org/10.1109/TIFS.2017.2787905}, doi = {10.1109/TIFS.2017.2787905}, timestamp = {Thu, 06 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/ChenWZCDA18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/ChengFY18, author = {Yuqiao Cheng and Zhengxin Fu and Bin Yu}, title = {Improved Visual Secret Sharing Scheme for {QR} Code Applications}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {13}, number = {9}, pages = {2393--2403}, year = {2018}, url = {https://doi.org/10.1109/TIFS.2018.2819125}, doi = {10.1109/TIFS.2018.2819125}, timestamp = {Thu, 06 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/ChengFY18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/ChhetriFF18, author = {Sujit Rokka Chhetri and Sina Faezi and Mohammad Abdullah Al Faruque}, title = {Information Leakage-Aware Computer-Aided Cyber-Physical Manufacturing}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {13}, number = {9}, pages = {2333--2344}, year = {2018}, url = {https://doi.org/10.1109/TIFS.2018.2818659}, doi = {10.1109/TIFS.2018.2818659}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/ChhetriFF18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/ChoiJJP018, author = {Wonsuk Choi and Kyungho Joo and Hyo Jin Jo and Moon Chan Park and Dong Hoon Lee}, title = {VoltageIDS: Low-Level Communication Characteristics for Automotive Intrusion Detection System}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {13}, number = {8}, pages = {2114--2129}, year = {2018}, url = {https://doi.org/10.1109/TIFS.2018.2812149}, doi = {10.1109/TIFS.2018.2812149}, timestamp = {Thu, 06 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/ChoiJJP018.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/ChoudaryK18, author = {Marios O. Choudary and Markus G. Kuhn}, title = {Efficient, Portable Template Attacks}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {13}, number = {2}, pages = {490--501}, year = {2018}, url = {https://doi.org/10.1109/TIFS.2017.2757440}, doi = {10.1109/TIFS.2017.2757440}, timestamp = {Thu, 06 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/ChoudaryK18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/ChuNC18, author = {Zheng Chu and Huan Xuan Nguyen and Giuseppe Caire}, title = {Game Theory-Based Resource Allocation for Secure {WPCN} Multiantenna Multicasting Systems}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {13}, number = {4}, pages = {926--939}, year = {2018}, url = {https://doi.org/10.1109/TIFS.2017.2774441}, doi = {10.1109/TIFS.2017.2774441}, timestamp = {Wed, 23 Mar 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tifs/ChuNC18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/ChughCJ18, author = {Tarang Chugh and Kai Cao and Anil K. Jain}, title = {Fingerprint Spoof Buster: Use of Minutiae-Centered Patches}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {13}, number = {9}, pages = {2190--2202}, year = {2018}, url = {https://doi.org/10.1109/TIFS.2018.2812193}, doi = {10.1109/TIFS.2018.2812193}, timestamp = {Thu, 06 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/ChughCJ18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/ChughCZTJ18, author = {Tarang Chugh and Kai Cao and Jiayu Zhou and Elham Tabassi and Anil K. Jain}, title = {Latent Fingerprint Value Prediction: Crowd-Based Learning}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {13}, number = {1}, pages = {20--34}, year = {2018}, url = {https://doi.org/10.1109/TIFS.2017.2721099}, doi = {10.1109/TIFS.2017.2721099}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/ChughCZTJ18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/CuiFLLZ18, author = {Zhe Cui and Jianjiang Feng and Shihao Li and Jiwen Lu and Jie Zhou}, title = {2-D Phase Demodulation for Deformable Fingerprint Registration}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {13}, number = {12}, pages = {3153--3165}, year = {2018}, url = {https://doi.org/10.1109/TIFS.2018.2841849}, doi = {10.1109/TIFS.2018.2841849}, timestamp = {Thu, 06 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/CuiFLLZ18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/DaiDPRSSS18, author = {Wei Dai and Yarkin Dor{\"{o}}z and Yuriy Polyakov and Kurt Rohloff and Hadi Sajjadpour and Erkay Savas and Berk Sunar}, title = {Implementation and Evaluation of a Lattice-Based Key-Policy {ABE} Scheme}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {13}, number = {5}, pages = {1169--1184}, year = {2018}, url = {https://doi.org/10.1109/TIFS.2017.2779427}, doi = {10.1109/TIFS.2017.2779427}, timestamp = {Thu, 06 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/DaiDPRSSS18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/DengGLG18, author = {Shuhua Deng and Xing Gao and Zebin Lu and Xieping Gao}, title = {Packet Injection Attack and Its Defense in Software-Defined Networks}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {13}, number = {3}, pages = {695--705}, year = {2018}, url = {https://doi.org/10.1109/TIFS.2017.2765506}, doi = {10.1109/TIFS.2017.2765506}, timestamp = {Tue, 16 Aug 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/DengGLG18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/DoBLR18, author = {Tan Tai Do and Emil Bj{\"{o}}rnson and Erik G. Larsson and Seyed Mohammad Razavizadeh}, title = {Jamming-Resistant Receivers for the Massive {MIMO} Uplink}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {13}, number = {1}, pages = {210--223}, year = {2018}, url = {https://doi.org/10.1109/TIFS.2017.2746007}, doi = {10.1109/TIFS.2017.2746007}, timestamp = {Mon, 04 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/DoBLR18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/DongWWG18, author = {Hao Dong and Chao Wu and Zhen Wei and Yike Guo}, title = {Dropping Activation Outputs With Localized First-Layer Deep Network for Enhancing User Privacy and Data Security}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {13}, number = {3}, pages = {662--670}, year = {2018}, url = {https://doi.org/10.1109/TIFS.2017.2763126}, doi = {10.1109/TIFS.2017.2763126}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/DongWWG18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/DuJCRP18, author = {Jun Du and Chunxiao Jiang and Kwang{-}Cheng Chen and Yong Ren and H. Vincent Poor}, title = {Community-Structured Evolutionary Game for Privacy Protection in Social Networks}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {13}, number = {3}, pages = {574--589}, year = {2018}, url = {https://doi.org/10.1109/TIFS.2017.2758756}, doi = {10.1109/TIFS.2017.2758756}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tifs/DuJCRP18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/DuSCCX18, author = {Pang Du and Zheyuan Sun and Huashan Chen and Jin{-}Hee Cho and Shouhuai Xu}, title = {Statistical Estimation of Malware Detection Metrics in the Absence of Ground Truth}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {13}, number = {12}, pages = {2965--2980}, year = {2018}, url = {https://doi.org/10.1109/TIFS.2018.2833292}, doi = {10.1109/TIFS.2018.2833292}, timestamp = {Thu, 06 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/DuSCCX18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/DuWHW18, author = {Minxin Du and Qian Wang and Meiqi He and Jian Weng}, title = {Privacy-Preserving Indexing and Query Processing for Secure Dynamic Cloud Storage}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {13}, number = {9}, pages = {2320--2332}, year = {2018}, url = {https://doi.org/10.1109/TIFS.2018.2818651}, doi = {10.1109/TIFS.2018.2818651}, timestamp = {Thu, 06 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/DuWHW18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/DuanLFZ18, author = {Yueqi Duan and Jiwen Lu and Jianjiang Feng and Jie Zhou}, title = {Topology Preserving Structural Matching for Automatic Partial Face Recognition}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {13}, number = {7}, pages = {1823--1837}, year = {2018}, url = {https://doi.org/10.1109/TIFS.2018.2804919}, doi = {10.1109/TIFS.2018.2804919}, timestamp = {Sat, 10 Sep 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/DuanLFZ18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/DuanLL18, author = {Mingxing Duan and Kenli Li and Keqin Li}, title = {An Ensemble {CNN2ELM} for Age Estimation}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {13}, number = {3}, pages = {758--772}, year = {2018}, url = {https://doi.org/10.1109/TIFS.2017.2766583}, doi = {10.1109/TIFS.2017.2766583}, timestamp = {Mon, 12 Oct 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/DuanLL18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/EngelsmaAJP18, author = {Joshua J. Engelsma and Sunpreet S. Arora and Anil K. Jain and Nicholas G. Paulter}, title = {Universal 3D Wearable Fingerprint Targets: Advancing Fingerprint Reader Evaluations}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {13}, number = {6}, pages = {1564--1578}, year = {2018}, url = {https://doi.org/10.1109/TIFS.2018.2797000}, doi = {10.1109/TIFS.2018.2797000}, timestamp = {Sat, 10 Sep 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/EngelsmaAJP18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/Fan0LCTZL18, author = {Ming Fan and Jun Liu and Xiapu Luo and Kai Chen and Zhenzhou Tian and Qinghua Zheng and Ting Liu}, title = {Android Malware Familial Classification and Representative Sample Selection via Frequent Subgraph Analysis}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {13}, number = {8}, pages = {1890--1905}, year = {2018}, url = {https://doi.org/10.1109/TIFS.2018.2806891}, doi = {10.1109/TIFS.2018.2806891}, timestamp = {Wed, 01 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tifs/Fan0LCTZL18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/FangXW18, author = {He Fang and Li Xu and Xianbin Wang}, title = {Coordinated Multiple-Relays Based Physical-Layer Security Improvement: {A} Single-Leader Multiple-Followers Stackelberg Game Scheme}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {13}, number = {1}, pages = {197--209}, year = {2018}, url = {https://doi.org/10.1109/TIFS.2017.2746001}, doi = {10.1109/TIFS.2017.2746001}, timestamp = {Thu, 06 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/FangXW18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/FazilA18, author = {Mohd Fazil and Muhammad Abulaish}, title = {A Hybrid Approach for Detecting Automated Spammers in Twitter}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {13}, number = {11}, pages = {2707--2719}, year = {2018}, url = {https://doi.org/10.1109/TIFS.2018.2825958}, doi = {10.1109/TIFS.2018.2825958}, timestamp = {Thu, 06 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/FazilA18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/FerraraFM18, author = {Matteo Ferrara and Annalisa Franco and Davide Maltoni}, title = {Face Demorphing}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {13}, number = {4}, pages = {1008--1017}, year = {2018}, url = {https://doi.org/10.1109/TIFS.2017.2777340}, doi = {10.1109/TIFS.2017.2777340}, timestamp = {Thu, 06 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/FerraraFM18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/FierrezPMGM18, author = {Julian Fi{\'{e}}rrez and Ada Pozo and Marcos Martinez{-}Diaz and Javier Galbally and Aythami Morales}, title = {Benchmarking Touchscreen Biometrics for Mobile Authentication}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {13}, number = {11}, pages = {2720--2733}, year = {2018}, url = {https://doi.org/10.1109/TIFS.2018.2833042}, doi = {10.1109/TIFS.2018.2833042}, timestamp = {Thu, 06 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/FierrezPMGM18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/FodorSD18, author = {G{\'{a}}bor Fodor and Peter Schelkens and Ann Dooms}, title = {Fingerprinting Codes Under the Weak Marking Assumption}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {13}, number = {6}, pages = {1495--1508}, year = {2018}, url = {https://doi.org/10.1109/TIFS.2017.2779112}, doi = {10.1109/TIFS.2017.2779112}, timestamp = {Mon, 11 Mar 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tifs/FodorSD18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/FuXSLX18, author = {Zhangjie Fu and Lili Xia and Xingming Sun and Alex X. Liu and Guowu Xie}, title = {Semantic-Aware Searching Over Encrypted Data for Cloud Computing}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {13}, number = {9}, pages = {2359--2371}, year = {2018}, url = {https://doi.org/10.1109/TIFS.2018.2819121}, doi = {10.1109/TIFS.2018.2819121}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/FuXSLX18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/GaleaF18, author = {Christian Galea and Reuben A. Farrugia}, title = {Matching Software-Generated Sketches to Face Photographs With a Very Deep CNN, Morphed Faces, and Transfer Learning}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {13}, number = {6}, pages = {1421--1431}, year = {2018}, url = {https://doi.org/10.1109/TIFS.2017.2788002}, doi = {10.1109/TIFS.2017.2788002}, timestamp = {Tue, 16 Aug 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/GaleaF18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/GhassamiK18, author = {AmirEmad Ghassami and Negar Kiyavash}, title = {A Covert Queueing Channel in {FCFS} Schedulers}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {13}, number = {6}, pages = {1551--1563}, year = {2018}, url = {https://doi.org/10.1109/TIFS.2018.2797953}, doi = {10.1109/TIFS.2018.2797953}, timestamp = {Sat, 10 Sep 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/GhassamiK18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/GiaconiGP18, author = {Giulio Giaconi and Deniz G{\"{u}}nd{\"{u}}z and H. Vincent Poor}, title = {Smart Meter Privacy With Renewable Energy and an Energy Storage Device}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {13}, number = {1}, pages = {129--142}, year = {2018}, url = {https://doi.org/10.1109/TIFS.2017.2744601}, doi = {10.1109/TIFS.2017.2744601}, timestamp = {Thu, 23 Jun 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/GiaconiGP18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/Gomez-BarreroGR18, author = {Marta Gomez{-}Barrero and Javier Galbally and Christian Rathgeb and Christoph Busch}, title = {General Framework to Evaluate Unlinkability in Biometric Template Protection Systems}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {13}, number = {6}, pages = {1406--1420}, year = {2018}, url = {https://doi.org/10.1109/TIFS.2017.2788000}, doi = {10.1109/TIFS.2017.2788000}, timestamp = {Tue, 05 Jan 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tifs/Gomez-BarreroGR18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/GongHSS18, author = {Xueqing Gong and Ping Hu and Kenneth W. Shum and Chi Wan Sung}, title = {A Zigzag-Decodable Ramp Secret Sharing Scheme}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {13}, number = {8}, pages = {1906--1916}, year = {2018}, url = {https://doi.org/10.1109/TIFS.2018.2806922}, doi = {10.1109/TIFS.2018.2806922}, timestamp = {Thu, 06 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/GongHSS18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/Gonzalez-SosaFV18, author = {Ester Gonzalez{-}Sosa and Julian Fi{\'{e}}rrez and Rub{\'{e}}n Vera{-}Rodr{\'{\i}}guez and Fernando Alonso{-}Fernandez}, title = {Facial Soft Biometrics for Recognition in the Wild: Recent Works, Annotation, and {COTS} Evaluation}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {13}, number = {8}, pages = {2001--2014}, year = {2018}, url = {https://doi.org/10.1109/TIFS.2018.2807791}, doi = {10.1109/TIFS.2018.2807791}, timestamp = {Thu, 06 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/Gonzalez-SosaFV18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/GopeLQ18, author = {Prosanta Gope and Jemin Lee and Tony Q. S. Quek}, title = {Lightweight and Practical Anonymous Authentication Protocol for {RFID} Systems Using Physically Unclonable Functions}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {13}, number = {11}, pages = {2831--2843}, year = {2018}, url = {https://doi.org/10.1109/TIFS.2018.2832849}, doi = {10.1109/TIFS.2018.2832849}, timestamp = {Thu, 06 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/GopeLQ18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/GuFLZ18, author = {Shan Gu and Jianjiang Feng and Jiwen Lu and Jie Zhou}, title = {Efficient Rectification of Distorted Fingerprints}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {13}, number = {1}, pages = {156--169}, year = {2018}, url = {https://doi.org/10.1109/TIFS.2017.2745685}, doi = {10.1109/TIFS.2017.2745685}, timestamp = {Thu, 06 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/GuFLZ18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/GunasingheB18, author = {Hasini Gunasinghe and Elisa Bertino}, title = {PrivBioMTAuth: Privacy Preserving Biometrics-Based and User Centric Protocol for User Authentication From Mobile Phones}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {13}, number = {4}, pages = {1042--1057}, year = {2018}, url = {https://doi.org/10.1109/TIFS.2017.2777787}, doi = {10.1109/TIFS.2017.2777787}, timestamp = {Thu, 06 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/GunasingheB18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/GunluK18, author = {Onur G{\"{u}}nl{\"{u}} and Gerhard Kramer}, title = {Privacy, Secrecy, and Storage With Multiple Noisy Measurements of Identifiers}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {13}, number = {11}, pages = {2872--2883}, year = {2018}, url = {https://doi.org/10.1109/TIFS.2018.2834303}, doi = {10.1109/TIFS.2018.2834303}, timestamp = {Thu, 06 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/GunluK18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/GunluKSC18, author = {Onur G{\"{u}}nl{\"{u}} and Kittipong Kittichokechai and Rafael F. Schaefer and Giuseppe Caire}, title = {Controllable Identifier Measurements for Private Authentication With Secret Keys}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {13}, number = {8}, pages = {1945--1959}, year = {2018}, url = {https://doi.org/10.1109/TIFS.2018.2806937}, doi = {10.1109/TIFS.2018.2806937}, timestamp = {Thu, 06 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/GunluKSC18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/GuoCZW18, author = {Yuanfang Guo and Xiaochun Cao and Wei Zhang and Rui Wang}, title = {Fake Colorized Image Detection}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {13}, number = {8}, pages = {1932--1944}, year = {2018}, url = {https://doi.org/10.1109/TIFS.2018.2806926}, doi = {10.1109/TIFS.2018.2806926}, timestamp = {Sun, 12 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tifs/GuoCZW18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/HanES18, author = {Te Sun Han and Hiroyuki Endo and Masahide Sasaki}, title = {Wiretap Channels With One-Time State Information: Strong Secrecy}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {13}, number = {1}, pages = {224--236}, year = {2018}, url = {https://doi.org/10.1109/TIFS.2017.2746008}, doi = {10.1109/TIFS.2017.2746008}, timestamp = {Thu, 06 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/HanES18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/HaoMSD18, author = {Feng Hao and Roberto Metere and Siamak F. Shahandashti and Changyu Dong}, title = {Analyzing and Patching {SPEKE} in {ISO/IEC}}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {13}, number = {11}, pages = {2844--2855}, year = {2018}, url = {https://doi.org/10.1109/TIFS.2018.2832984}, doi = {10.1109/TIFS.2018.2832984}, timestamp = {Mon, 12 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/HaoMSD18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/HeJD18, author = {Xiaofan He and Richeng Jin and Huaiyu Dai}, title = {Leveraging Spatial Diversity for Privacy-Aware Location-Based Services in Mobile Networks}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {13}, number = {6}, pages = {1524--1534}, year = {2018}, url = {https://doi.org/10.1109/TIFS.2018.2797023}, doi = {10.1109/TIFS.2018.2797023}, timestamp = {Sat, 10 Sep 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/HeJD18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/HinarejosACFL18, author = {M. Francisca Hinarejos and Florina Almen{\'{a}}rez and Patricia Arias Cabarcos and Josep Llu{\'{\i}}s Ferrer{-}Gomila and Andr{\'{e}}s Mar{\'{\i}}n L{\'{o}}pez}, title = {RiskLaine: {A} Probabilistic Approach for Assessing Risk in Certificate-Based Security}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {13}, number = {8}, pages = {1975--1988}, year = {2018}, url = {https://doi.org/10.1109/TIFS.2018.2807788}, doi = {10.1109/TIFS.2018.2807788}, timestamp = {Wed, 07 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tifs/HinarejosACFL18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/HosseiniJ18, author = {Seyed Mohammad Hosseini and Amir Hossein Jahangir}, title = {An Effective Payload Attribution Scheme for Cybercriminal Detection Using Compressed Bitmap Index Tables and Traffic Downsampling}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {13}, number = {4}, pages = {850--860}, year = {2018}, url = {https://doi.org/10.1109/TIFS.2017.2769018}, doi = {10.1109/TIFS.2017.2769018}, timestamp = {Thu, 10 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/HosseiniJ18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/HouLJWZ18, author = {Jiahui Hou and Xiang{-}Yang Li and Taeho Jung and Yu Wang and Daren Zheng}, title = {{CASTLE:} Enhancing the Utility of Inequality Query Auditing Without Denial Threats}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {13}, number = {7}, pages = {1656--1669}, year = {2018}, url = {https://doi.org/10.1109/TIFS.2018.2797802}, doi = {10.1109/TIFS.2018.2797802}, timestamp = {Thu, 06 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/HouLJWZ18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/HouSH18, author = {Elizabeth Hou and Kumar Sricharan and Alfred O. Hero III}, title = {Latent Laplacian Maximum Entropy Discrimination for Detection of High-Utility Anomalies}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {13}, number = {6}, pages = {1446--1459}, year = {2018}, url = {https://doi.org/10.1109/TIFS.2018.2790580}, doi = {10.1109/TIFS.2018.2790580}, timestamp = {Thu, 06 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/HouSH18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/HsuLQC18, author = {Ruei{-}Hau Hsu and Jemin Lee and Tony Q. S. Quek and Jyh{-}Cheng Chen}, title = {{GRAAD:} Group Anonymous and Accountable {D2D} Communication in Mobile Networks}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {13}, number = {2}, pages = {449--464}, year = {2018}, url = {https://doi.org/10.1109/TIFS.2017.2756567}, doi = {10.1109/TIFS.2017.2756567}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tifs/HsuLQC18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/HuLWCD18, author = {Shengshan Hu and Minghui Li and Qian Wang and Sherman S. M. Chow and Minxin Du}, title = {Outsourced Biometric Identification With Privacy}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {13}, number = {10}, pages = {2448--2463}, year = {2018}, url = {https://doi.org/10.1109/TIFS.2018.2819128}, doi = {10.1109/TIFS.2018.2819128}, timestamp = {Thu, 06 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/HuLWCD18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/HuaTXZ18, author = {Jingyu Hua and Wei Tong and Fengyuan Xu and Sheng Zhong}, title = {A Geo-Indistinguishable Location Perturbation Mechanism for Location-Based Services Supporting Frequent Queries}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {13}, number = {5}, pages = {1155--1168}, year = {2018}, url = {https://doi.org/10.1109/TIFS.2017.2779402}, doi = {10.1109/TIFS.2017.2779402}, timestamp = {Thu, 09 Dec 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tifs/HuaTXZ18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/HuangBM18, author = {Yuanwen Huang and Swarup Bhunia and Prabhat Mishra}, title = {Scalable Test Generation for Trojan Detection Using Side Channel Analysis}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {13}, number = {11}, pages = {2746--2760}, year = {2018}, url = {https://doi.org/10.1109/TIFS.2018.2833059}, doi = {10.1109/TIFS.2018.2833059}, timestamp = {Thu, 06 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/HuangBM18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/HuangCZPL18, author = {Yonggang Huang and Longbing Cao and Jun Zhang and Lei Pan and Yuying Liu}, title = {Exploring Feature Coupling and Model Coupling for Image Source Identification}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {13}, number = {12}, pages = {3108--3121}, year = {2018}, url = {https://doi.org/10.1109/TIFS.2018.2838079}, doi = {10.1109/TIFS.2018.2838079}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/HuangCZPL18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/Hurley-SmithH18, author = {Darren Hurley{-}Smith and Julio C. Hernandez{-}Castro}, title = {Certifiably Biased: An In-Depth Analysis of a Common Criteria {EAL4+} Certified {TRNG}}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {13}, number = {4}, pages = {1031--1041}, year = {2018}, url = {https://doi.org/10.1109/TIFS.2017.2777342}, doi = {10.1109/TIFS.2017.2777342}, timestamp = {Mon, 08 Apr 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/Hurley-SmithH18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/IacovazziSFE18, author = {Alfonso Iacovazzi and Sanat Sarda and Daniel Frassinelli and Yuval Elovici}, title = {DropWat: An Invisible Network Flow Watermark for Data Exfiltration Traceback}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {13}, number = {5}, pages = {1139--1154}, year = {2018}, url = {https://doi.org/10.1109/TIFS.2017.2779113}, doi = {10.1109/TIFS.2017.2779113}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/IacovazziSFE18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/JhaSAV18, author = {Sadhana Jha and Shamik Sural and Vijayalakshmi Atluri and Jaideep Vaidya}, title = {Specification and Verification of Separation of Duty Constraints in Attribute-Based Access Control}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {13}, number = {4}, pages = {897--911}, year = {2018}, url = {https://doi.org/10.1109/TIFS.2017.2771492}, doi = {10.1109/TIFS.2017.2771492}, timestamp = {Mon, 26 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/JhaSAV18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/JiangHSXW18, author = {Xinghao Jiang and Peisong He and Tanfeng Sun and Feng Xie and Shilin Wang}, title = {Detection of Double Compression With the Same Coding Parameters Based on Quality Degradation Mechanism Analysis}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {13}, number = {1}, pages = {170--185}, year = {2018}, url = {https://doi.org/10.1109/TIFS.2017.2745687}, doi = {10.1109/TIFS.2017.2745687}, timestamp = {Thu, 06 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/JiangHSXW18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/JinHLKT18, author = {Zhe Jin and Jung Yeon Hwang and Yen{-}Lung Lai and Soohyung Kim and Andrew Beng Jin Teoh}, title = {Ranking-Based Locality Sensitive Hashing-Enabled Cancelable Biometrics: Index-of-Max Hashing}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {13}, number = {2}, pages = {393--407}, year = {2018}, url = {https://doi.org/10.1109/TIFS.2017.2753172}, doi = {10.1109/TIFS.2017.2753172}, timestamp = {Thu, 06 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/JinHLKT18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/JinZ18, author = {Rong Jin and Kai Zeng}, title = {Secure Inductive-Coupled Near Field Communication at Physical Layer}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {13}, number = {12}, pages = {3078--3093}, year = {2018}, url = {https://doi.org/10.1109/TIFS.2018.2832983}, doi = {10.1109/TIFS.2018.2832983}, timestamp = {Thu, 16 Dec 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tifs/JinZ18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/JoshiK18, author = {Sharad Joshi and Nitin Khanna}, title = {Single Classifier-Based Passive System for Source Printer Classification Using Local Texture Features}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {13}, number = {7}, pages = {1603--1614}, year = {2018}, url = {https://doi.org/10.1109/TIFS.2017.2779441}, doi = {10.1109/TIFS.2017.2779441}, timestamp = {Thu, 06 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/JoshiK18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/KabirAS18, author = {Waziha Kabir and M. Omair Ahmad and M. N. S. Swamy}, title = {Normalization and Weighting Techniques Based on Genuine-Impostor Score Fusion in Multi-Biometric Systems}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {13}, number = {8}, pages = {1989--2000}, year = {2018}, url = {https://doi.org/10.1109/TIFS.2018.2807790}, doi = {10.1109/TIFS.2018.2807790}, timestamp = {Thu, 06 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/KabirAS18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/KalantariSS18, author = {Kousha Kalantari and Lalitha Sankar and Anand D. Sarwate}, title = {Robust Privacy-Utility Tradeoffs Under Differential Privacy and Hamming Distortion}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {13}, number = {11}, pages = {2816--2830}, year = {2018}, url = {https://doi.org/10.1109/TIFS.2018.2831619}, doi = {10.1109/TIFS.2018.2831619}, timestamp = {Thu, 06 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/KalantariSS18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/KhaliliNL18, author = {Mohammad Mahdi Khalili and Parinaz Naghizadeh and Mingyan Liu}, title = {Designing Cyber Insurance Policies: The Role of Pre-Screening and Security Interdependence}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {13}, number = {9}, pages = {2226--2239}, year = {2018}, url = {https://doi.org/10.1109/TIFS.2018.2812205}, doi = {10.1109/TIFS.2018.2812205}, timestamp = {Thu, 06 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/KhaliliNL18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/KhamsemananNJ18, author = {Nirattaya Khamsemanan and Cholwich Nattee and Nitchan Jianwattanapaisarn}, title = {Human Identification From Freestyle Walks Using Posture-Based Gait Feature}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {13}, number = {1}, pages = {119--128}, year = {2018}, url = {https://doi.org/10.1109/TIFS.2017.2738611}, doi = {10.1109/TIFS.2017.2738611}, timestamp = {Thu, 06 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/KhamsemananNJ18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/KhandakerMW18, author = {Muhammad R. A. Khandaker and Christos Masouros and Kai{-}Kit Wong}, title = {Constructive Interference Based Secure Precoding: {A} New Dimension in Physical Layer Security}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {13}, number = {9}, pages = {2256--2268}, year = {2018}, url = {https://doi.org/10.1109/TIFS.2018.2815541}, doi = {10.1109/TIFS.2018.2815541}, timestamp = {Thu, 06 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/KhandakerMW18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/KimANYJBSRK18, author = {Jeeson Kim and Taimur Ahmed and Hussein Nili and Jiawei Yang and Doo Seok Jeong and Paul Beckett and Sharath Sriram and Damith Chinthana Ranasinghe and Omid Kavehei}, title = {A Physical Unclonable Function With Redox-Based Nanoionic Resistive Memory}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {13}, number = {2}, pages = {437--448}, year = {2018}, url = {https://doi.org/10.1109/TIFS.2017.2756562}, doi = {10.1109/TIFS.2017.2756562}, timestamp = {Fri, 09 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/KimANYJBSRK18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/KohoutP18, author = {Jan Kohout and Tom{\'{a}}s Pevn{\'{y}}}, title = {Network Traffic Fingerprinting Based on Approximated Kernel Two-Sample Test}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {13}, number = {3}, pages = {788--801}, year = {2018}, url = {https://doi.org/10.1109/TIFS.2017.2768018}, doi = {10.1109/TIFS.2017.2768018}, timestamp = {Sun, 25 Jul 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/KohoutP18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/KomeiliAH18, author = {Majid Komeili and Narges Armanfard and Dimitrios Hatzinakos}, title = {Liveness Detection and Automatic Template Updating Using Fusion of {ECG} and Fingerprint}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {13}, number = {7}, pages = {1810--1822}, year = {2018}, url = {https://doi.org/10.1109/TIFS.2018.2804890}, doi = {10.1109/TIFS.2018.2804890}, timestamp = {Sat, 10 Sep 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/KomeiliAH18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/KoteshwaraKP18, author = {Sandhya Koteshwara and Chris H. Kim and Keshab K. Parhi}, title = {Key-Based Dynamic Functional Obfuscation of Integrated Circuits Using Sequentially Triggered Mode-Based Design}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {13}, number = {1}, pages = {79--93}, year = {2018}, url = {https://doi.org/10.1109/TIFS.2017.2738600}, doi = {10.1109/TIFS.2017.2738600}, timestamp = {Thu, 06 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/KoteshwaraKP18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/KrishnamurthyKK18, author = {Prashanth Krishnamurthy and Farshad Khorrami and Ramesh Karri and David Paul{-}Pena and Hossein Salehghaffari}, title = {Process-Aware Covert Channels Using Physical Instrumentation in Cyber-Physical Systems}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {13}, number = {11}, pages = {2761--2771}, year = {2018}, url = {https://doi.org/10.1109/TIFS.2018.2833063}, doi = {10.1109/TIFS.2018.2833063}, timestamp = {Thu, 06 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/KrishnamurthyKK18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/KuhestaniMM18, author = {Ali Kuhestani and Abbas Mohammadi and Mohammadali Mohammadi}, title = {Joint Relay Selection and Power Allocation in Large-Scale {MIMO} Systems With Untrusted Relays and Passive Eavesdroppers}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {13}, number = {2}, pages = {341--355}, year = {2018}, url = {https://doi.org/10.1109/TIFS.2017.2750102}, doi = {10.1109/TIFS.2017.2750102}, timestamp = {Thu, 06 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/KuhestaniMM18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/KurtY018, author = {Mehmet Necip Kurt and Yasin Yilmaz and Xiaodong Wang}, title = {Distributed Quickest Detection of Cyber-Attacks in Smart Grid}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {13}, number = {8}, pages = {2015--2030}, year = {2018}, url = {https://doi.org/10.1109/TIFS.2018.2800908}, doi = {10.1109/TIFS.2018.2800908}, timestamp = {Thu, 06 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/KurtY018.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/LallieDB18, author = {Harjinder Singh Lallie and Kurt Debattista and Jay Bal}, title = {An Empirical Evaluation of the Effectiveness of Attack Graphs and Fault Trees in Cyber-Attack Perception}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {13}, number = {5}, pages = {1110--1122}, year = {2018}, url = {https://doi.org/10.1109/TIFS.2017.2771238}, doi = {10.1109/TIFS.2017.2771238}, timestamp = {Tue, 20 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/LallieDB18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/LashgariA18, author = {Sina Lashgari and Amir Salman Avestimehr}, title = {Secrecy DoF of Blind {MIMOME} Wiretap Channel With Delayed {CSIT}}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {13}, number = {2}, pages = {478--489}, year = {2018}, url = {https://doi.org/10.1109/TIFS.2017.2756602}, doi = {10.1109/TIFS.2017.2756602}, timestamp = {Thu, 06 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/LashgariA18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/LeeKK18, author = {Seungkwang Lee and Taesung Kim and Yousung Kang}, title = {A Masked White-Box Cryptographic Implementation for Protecting Against Differential Computation Analysis}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {13}, number = {10}, pages = {2602--2615}, year = {2018}, url = {https://doi.org/10.1109/TIFS.2018.2825939}, doi = {10.1109/TIFS.2018.2825939}, timestamp = {Tue, 16 Aug 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/LeeKK18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/LeeWKW18, author = {Si{-}Hyeon Lee and Ligong Wang and Ashish Khisti and Gregory W. Wornell}, title = {Covert Communication With Channel-State Information at the Transmitter}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {13}, number = {9}, pages = {2310--2319}, year = {2018}, url = {https://doi.org/10.1109/TIFS.2018.2818650}, doi = {10.1109/TIFS.2018.2818650}, timestamp = {Wed, 21 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/LeeWKW18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/LeeYDC018, author = {Po{-}Yen Lee and Chia{-}Mu Yu and Tooska Dargahi and Mauro Conti and Giuseppe Bianchi}, title = {MDSClone: Multidimensional Scaling Aided Clone Detection in Internet of Things}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {13}, number = {8}, pages = {2031--2046}, year = {2018}, url = {https://doi.org/10.1109/TIFS.2018.2805291}, doi = {10.1109/TIFS.2018.2805291}, timestamp = {Thu, 06 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/LeeYDC018.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/LiCPF18, author = {Lingxiang Li and Zhi Chen and Athina P. Petropulu and Jun Fang}, title = {Linear Precoder Design for an {MIMO} Gaussian Wiretap Channel With Full-Duplex Source and Destination Nodes}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {13}, number = {2}, pages = {421--436}, year = {2018}, url = {https://doi.org/10.1109/TIFS.2017.2756350}, doi = {10.1109/TIFS.2017.2756350}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/LiCPF18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/LiHWRJK18, author = {Haoliang Li and Peisong He and Shiqi Wang and Anderson Rocha and Xinghao Jiang and Alex C. Kot}, title = {Learning Generalized Deep Feature Representation for Face Anti-Spoofing}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {13}, number = {10}, pages = {2639--2652}, year = {2018}, url = {https://doi.org/10.1109/TIFS.2018.2825949}, doi = {10.1109/TIFS.2018.2825949}, timestamp = {Thu, 06 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/LiHWRJK18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/LiHY18, author = {Haoxi Li and Haifeng Hu and Chitung Yip}, title = {Age-Related Factor Guided Joint Task Modeling Convolutional Neural Network for Cross-Age Face Recognition}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {13}, number = {9}, pages = {2383--2392}, year = {2018}, url = {https://doi.org/10.1109/TIFS.2018.2819124}, doi = {10.1109/TIFS.2018.2819124}, timestamp = {Thu, 06 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/LiHY18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/LiLCWHK18, author = {Haoliang Li and Wen Li and Hong Cao and Shiqi Wang and Feiyue Huang and Alex C. Kot}, title = {Unsupervised Domain Adaptation for Face Anti-Spoofing}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {13}, number = {7}, pages = {1794--1809}, year = {2018}, url = {https://doi.org/10.1109/TIFS.2018.2801312}, doi = {10.1109/TIFS.2018.2801312}, timestamp = {Thu, 29 Sep 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/LiLCWHK18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/LiLZTZ18, author = {Bin Li and Zhongpeng Li and Shijun Zhou and Shunquan Tan and Xiaoling Zhang}, title = {New Steganalytic Features for Spatial Image Steganography Based on Derivative Filters and Threshold {LBP} Operator}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {13}, number = {5}, pages = {1242--1257}, year = {2018}, url = {https://doi.org/10.1109/TIFS.2017.2780805}, doi = {10.1109/TIFS.2017.2780805}, timestamp = {Thu, 06 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/LiLZTZ18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/LiM18, author = {Chen Li and Wenping Ma}, title = {Comments on "An Efficient Privacy-Preserving Outsourced Calculation Toolkit With Multiple Keys"}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {13}, number = {10}, pages = {2668--2669}, year = {2018}, url = {https://doi.org/10.1109/TIFS.2018.2825143}, doi = {10.1109/TIFS.2018.2825143}, timestamp = {Wed, 25 Aug 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/LiM18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/LiPMLZ18, author = {Zi Li and Qingqi Pei and Ian D. Markwood and Yao Liu and Haojin Zhu}, title = {Secret Key Establishment via {RSS} Trajectory Matching Between Wearable Devices}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {13}, number = {3}, pages = {802--817}, year = {2018}, url = {https://doi.org/10.1109/TIFS.2017.2768020}, doi = {10.1109/TIFS.2017.2768020}, timestamp = {Fri, 09 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/LiPMLZ18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/LiPMLZ18a, author = {Zi Li and Qingqi Pei and Ian D. Markwood and Yao Liu and Haojin Zhu}, title = {Corrections to "Secret Key Establishment via {RSS} Trajectory Matching Between Wearable Devices" [Mar 18 802-817]}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {13}, number = {6}, pages = {1595}, year = {2018}, url = {https://doi.org/10.1109/TIFS.2018.2790878}, doi = {10.1109/TIFS.2018.2790878}, timestamp = {Fri, 02 Sep 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/LiPMLZ18a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/LiTZM18, author = {Jinku Li and Xiaomeng Tong and Fengwei Zhang and Jianfeng Ma}, title = {Fine-CFI: Fine-Grained Control-Flow Integrity for Operating System Kernels}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {13}, number = {6}, pages = {1535--1550}, year = {2018}, url = {https://doi.org/10.1109/TIFS.2018.2797932}, doi = {10.1109/TIFS.2018.2797932}, timestamp = {Fri, 28 Apr 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/LiTZM18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/LiY18, author = {Quanzhong Li and Liang Yang}, title = {Artificial Noise Aided Secure Precoding for {MIMO} Untrusted Two-Way Relay Systems With Perfect and Imperfect Channel State Information}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {13}, number = {10}, pages = {2628--2638}, year = {2018}, url = {https://doi.org/10.1109/TIFS.2018.2825944}, doi = {10.1109/TIFS.2018.2825944}, timestamp = {Thu, 06 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/LiY18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/LiZLZYH18, author = {Yanxiong Li and Xue Zhang and Xianku Li and Yuhan Zhang and Ji{-}Chen Yang and Qianhua He}, title = {Mobile Phone Clustering From Speech Recordings Using Deep Representation and Spectral Clustering}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {13}, number = {4}, pages = {965--977}, year = {2018}, url = {https://doi.org/10.1109/TIFS.2017.2774505}, doi = {10.1109/TIFS.2017.2774505}, timestamp = {Thu, 06 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/LiZLZYH18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/LiaoSTC18, author = {Jiachun Liao and Lalitha Sankar and Vincent Y. F. Tan and Fl{\'{a}}vio du Pin Calmon}, title = {Hypothesis Testing Under Mutual Information Privacy Constraints in the High Privacy Regime}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {13}, number = {4}, pages = {1058--1071}, year = {2018}, url = {https://doi.org/10.1109/TIFS.2017.2779108}, doi = {10.1109/TIFS.2017.2779108}, timestamp = {Thu, 06 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/LiaoSTC18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/LiaskosI18, author = {Christos Liaskos and Sotiris Ioannidis}, title = {Network Topology Effects on the Detectability of Crossfire Attacks}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {13}, number = {7}, pages = {1682--1695}, year = {2018}, url = {https://doi.org/10.1109/TIFS.2018.2799425}, doi = {10.1109/TIFS.2018.2799425}, timestamp = {Thu, 06 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/LiaskosI18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/LinHW18, author = {Zinan Lin and Yongfeng Huang and Jilong Wang}, title = {{RNN-SM:} Fast Steganalysis of VoIP Streams Using Recurrent Neural Network}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {13}, number = {7}, pages = {1854--1868}, year = {2018}, url = {https://doi.org/10.1109/TIFS.2018.2806741}, doi = {10.1109/TIFS.2018.2806741}, timestamp = {Fri, 07 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/LinHW18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/LinLHSC18, author = {Shih{-}Chun Lin and Chien{-}Chi Liu and Min{-}Yen Hsieh and Shih{-}Tang Su and Wei{-}Ho Chung}, title = {Coded Quickest Classification With Applications in Bandwidth-Efficient Smart Grid Monitoring}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {13}, number = {12}, pages = {3122--3136}, year = {2018}, url = {https://doi.org/10.1109/TIFS.2018.2837658}, doi = {10.1109/TIFS.2018.2837658}, timestamp = {Thu, 06 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/LinLHSC18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/LinLYSW18, author = {Jingran Lin and Qiang Li and Jintai Yang and Huaizong Shao and Wen{-}Qin Wang}, title = {Physical-Layer Security for Proximal Legitimate User and Eavesdropper: {A} Frequency Diverse Array Beamforming Approach}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {13}, number = {3}, pages = {671--684}, year = {2018}, url = {https://doi.org/10.1109/TIFS.2017.2765500}, doi = {10.1109/TIFS.2017.2765500}, timestamp = {Thu, 27 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/LinLYSW18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/LinPL18, author = {Zi{-}Xing Lin and Fei Peng and Min Long}, title = {A Low-Distortion Reversible Watermarking for 2D Engineering Graphics Based on Region Nesting}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {13}, number = {9}, pages = {2372--2382}, year = {2018}, url = {https://doi.org/10.1109/TIFS.2018.2819122}, doi = {10.1109/TIFS.2018.2819122}, timestamp = {Thu, 06 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/LinPL18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/LiuLFZ18, author = {Hao Liu and Jiwen Lu and Jianjiang Feng and Jie Zhou}, title = {Label-Sensitive Deep Metric Learning for Facial Age Estimation}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {13}, number = {2}, pages = {292--305}, year = {2018}, url = {https://doi.org/10.1109/TIFS.2017.2746062}, doi = {10.1109/TIFS.2017.2746062}, timestamp = {Thu, 06 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/LiuLFZ18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/LiuYS18, author = {Jianhua Liu and Jiadi Yu and Shigen Shen}, title = {Energy-Efficient Two-Layer Cooperative Defense Scheme to Secure Sensor-Clouds}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {13}, number = {2}, pages = {408--420}, year = {2018}, url = {https://doi.org/10.1109/TIFS.2017.2756344}, doi = {10.1109/TIFS.2017.2756344}, timestamp = {Thu, 11 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tifs/LiuYS18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/LopezLBT18, author = {Juan Lopez Jr. and Nathan C. Liefer and Colin R. Busho and Michael A. Temple}, title = {Enhancing Critical Infrastructure and Key Resources {(CIKR)} Level-0 Physical Process Security Using Field Device Distinct Native Attribute Features}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {13}, number = {5}, pages = {1215--1229}, year = {2018}, url = {https://doi.org/10.1109/TIFS.2017.2779447}, doi = {10.1109/TIFS.2017.2779447}, timestamp = {Fri, 29 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/LopezLBT18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/LuXZLL18, author = {Jianfeng Lu and Yun Xin and Zhao Zhang and Xinwang Liu and Kenli Li}, title = {Game-Theoretic Design of Optimal Two-Sided Rating Protocols for Service Exchange Dilemma in Crowdsourcing}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {13}, number = {11}, pages = {2801--2815}, year = {2018}, url = {https://doi.org/10.1109/TIFS.2018.2834318}, doi = {10.1109/TIFS.2018.2834318}, timestamp = {Mon, 12 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tifs/LuXZLL18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/LuoAFW18, author = {Pei Luo and Konstantinos Athanasiou and Yunsi Fei and Thomas Wahl}, title = {Algebraic Fault Analysis of {SHA-3} Under Relaxed Fault Models}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {13}, number = {7}, pages = {1752--1761}, year = {2018}, url = {https://doi.org/10.1109/TIFS.2018.2790938}, doi = {10.1109/TIFS.2018.2790938}, timestamp = {Sat, 10 Sep 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/LuoAFW18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/LuoKH18, author = {Da Luo and Pawel Korus and Jiwu Huang}, title = {Band Energy Difference for Source Attribution in Audio Forensics}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {13}, number = {9}, pages = {2179--2189}, year = {2018}, url = {https://doi.org/10.1109/TIFS.2018.2812185}, doi = {10.1109/TIFS.2018.2812185}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/LuoKH18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/LuzMOSM18, author = {Eduardo Jos{\'{e}} da S. Luz and Gladston J. P. Moreira and Luiz S. Oliveira and William Robson Schwartz and David Menotti}, title = {Learning Deep Off-the-Person Heart Biometrics Representations}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {13}, number = {5}, pages = {1258--1270}, year = {2018}, url = {https://doi.org/10.1109/TIFS.2017.2784362}, doi = {10.1109/TIFS.2017.2784362}, timestamp = {Thu, 06 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/LuzMOSM18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/MaioranaC18, author = {Emanuele Maiorana and Patrizio Campisi}, title = {Longitudinal Evaluation of EEG-Based Biometric Recognition}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {13}, number = {5}, pages = {1123--1138}, year = {2018}, url = {https://doi.org/10.1109/TIFS.2017.2778010}, doi = {10.1109/TIFS.2017.2778010}, timestamp = {Thu, 06 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/MaioranaC18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/MajumdarMWJPWD18, author = {Suryadipta Majumdar and Taous Madi and Yushun Wang and Yosr Jarraya and Makan Pourzandi and Lingyu Wang and Mourad Debbabi}, title = {User-Level Runtime Security Auditing for the Cloud}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {13}, number = {5}, pages = {1185--1199}, year = {2018}, url = {https://doi.org/10.1109/TIFS.2017.2779444}, doi = {10.1109/TIFS.2017.2779444}, timestamp = {Thu, 06 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/MajumdarMWJPWD18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/MangiaPRS18, author = {Mauro Mangia and Fabio Pareschi and Riccardo Rovatti and Gianluca Setti}, title = {Low-Cost Security of IoT Sensor Nodes With Rakeness-Based Compressed Sensing: Statistical and Known-Plaintext Attacks}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {13}, number = {2}, pages = {327--340}, year = {2018}, url = {https://doi.org/10.1109/TIFS.2017.2749982}, doi = {10.1109/TIFS.2017.2749982}, timestamp = {Thu, 06 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/MangiaPRS18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/MattaMLF18, author = {Vincenzo Matta and Mario Di Mauro and Maurizio Longo and Alfonso Farina}, title = {Cyber-Threat Mitigation Exploiting the Birth-Death-Immigration Model}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {13}, number = {12}, pages = {3137--3152}, year = {2018}, url = {https://doi.org/10.1109/TIFS.2018.2838084}, doi = {10.1109/TIFS.2018.2838084}, timestamp = {Thu, 06 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/MattaMLF18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/MayerS18, author = {Owen Mayer and Matthew C. Stamm}, title = {Accurate and Efficient Image Forgery Detection Using Lateral Chromatic Aberration}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {13}, number = {7}, pages = {1762--1777}, year = {2018}, url = {https://doi.org/10.1109/TIFS.2018.2799421}, doi = {10.1109/TIFS.2018.2799421}, timestamp = {Sat, 10 Sep 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/MayerS18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/MekkawyYTXL18, author = {Tamer Mekkawy and Rugui Yao and Theodoros A. Tsiftsis and Fei Xu and Yanan Lu}, title = {Joint Beamforming Alignment With Suboptimal Power Allocation for a Two-Way Untrusted Relay Network}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {13}, number = {10}, pages = {2464--2474}, year = {2018}, url = {https://doi.org/10.1109/TIFS.2018.2819132}, doi = {10.1109/TIFS.2018.2819132}, timestamp = {Thu, 06 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/MekkawyYTXL18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/MiaoMHW18, author = {Meixia Miao and Jianfeng Ma and Xinyi Huang and Qian Wang}, title = {Efficient Verifiable Databases With Insertion/Deletion Operations From Delegating Polynomial Functions}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {13}, number = {2}, pages = {511--520}, year = {2018}, url = {https://doi.org/10.1109/TIFS.2017.2758746}, doi = {10.1109/TIFS.2017.2758746}, timestamp = {Mon, 25 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/MiaoMHW18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/MiehlingRT18, author = {Erik Miehling and Mohammad Rasouli and Demosthenis Teneketzis}, title = {A {POMDP} Approach to the Dynamic Defense of Large-Scale Cyber Networks}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {13}, number = {10}, pages = {2490--2505}, year = {2018}, url = {https://doi.org/10.1109/TIFS.2018.2819967}, doi = {10.1109/TIFS.2018.2819967}, timestamp = {Thu, 06 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/MiehlingRT18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/MohapatraPLQA18, author = {Parthajit Mohapatra and Nikolaos Pappas and Jemin Lee and Tony Q. S. Quek and Vangelis Angelakis}, title = {Secure Communications for the Two-User Broadcast Channel With Random Traffic}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {13}, number = {9}, pages = {2294--2309}, year = {2018}, url = {https://doi.org/10.1109/TIFS.2018.2818076}, doi = {10.1109/TIFS.2018.2818076}, timestamp = {Thu, 06 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/MohapatraPLQA18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/NadzinskiDAMSSS18, author = {Gorjan Nadzinski and Matej Dobrevski and Christopher Anderson and Peter V. E. McClintock and Aneta Stefanovska and Mile J. Stankovski and Tomislav Stankovski}, title = {Experimental Realization of the Coupling Function Secure Communications Protocol and Analysis of Its Noise Robustness}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {13}, number = {10}, pages = {2591--2601}, year = {2018}, url = {https://doi.org/10.1109/TIFS.2018.2825147}, doi = {10.1109/TIFS.2018.2825147}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/NadzinskiDAMSSS18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/NakamuraGM18, author = {Takashi Nakamura and Valentin Goverdovsky and Danilo P. Mandic}, title = {In-Ear {EEG} Biometrics for Feasible and Readily Collectable Real-World Person Authentication}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {13}, number = {3}, pages = {648--661}, year = {2018}, url = {https://doi.org/10.1109/TIFS.2017.2763124}, doi = {10.1109/TIFS.2017.2763124}, timestamp = {Thu, 06 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/NakamuraGM18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/NieLCCXY18, author = {Xiushan Nie and Xiaoyu Li and Yane Chai and Chaoran Cui and Xiaoming Xi and Yilong Yin}, title = {Robust Image Fingerprinting Based on Feature Point Relationship Mining}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {13}, number = {6}, pages = {1509--1523}, year = {2018}, url = {https://doi.org/10.1109/TIFS.2018.2790953}, doi = {10.1109/TIFS.2018.2790953}, timestamp = {Sat, 10 Sep 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/NieLCCXY18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/NingCDLMW18, author = {Jianting Ning and Zhenfu Cao and Xiaolei Dong and Kaitai Liang and Hui Ma and Lifei Wei}, title = {Auditable {\(\sigma\)}-Time Outsourced Attribute-Based Encryption for Access Control in Cloud Computing}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {13}, number = {1}, pages = {94--105}, year = {2018}, url = {https://doi.org/10.1109/TIFS.2017.2738601}, doi = {10.1109/TIFS.2017.2738601}, timestamp = {Sun, 22 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/NingCDLMW18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/PengWDT18, author = {Bo Peng and Wei Wang and Jing Dong and Tieniu Tan}, title = {Image Forensics Based on Planar Contact Constraints of 3D Objects}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {13}, number = {2}, pages = {377--392}, year = {2018}, url = {https://doi.org/10.1109/TIFS.2017.2752728}, doi = {10.1109/TIFS.2017.2752728}, timestamp = {Thu, 06 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/PengWDT18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/PerazzoneYSB18, author = {Jake B. Perazzone and Paul L. Yu and Brian M. Sadler and Rick S. Blum}, title = {Cryptographic Side-Channel Signaling and Authentication via Fingerprint Embedding}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {13}, number = {9}, pages = {2216--2225}, year = {2018}, url = {https://doi.org/10.1109/TIFS.2018.2812202}, doi = {10.1109/TIFS.2018.2812202}, timestamp = {Thu, 06 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/PerazzoneYSB18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/PereraP18, author = {Pramuditha Perera and Vishal M. Patel}, title = {Efficient and Low Latency Detection of Intruders in Mobile Active Authentication}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {13}, number = {6}, pages = {1392--1405}, year = {2018}, url = {https://doi.org/10.1109/TIFS.2017.2787995}, doi = {10.1109/TIFS.2017.2787995}, timestamp = {Thu, 04 May 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/PereraP18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/PhongAHWM18, author = {Le Trieu Phong and Yoshinori Aono and Takuya Hayashi and Lihua Wang and Shiho Moriai}, title = {Privacy-Preserving Deep Learning via Additively Homomorphic Encryption}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {13}, number = {5}, pages = {1333--1345}, year = {2018}, url = {https://doi.org/10.1109/TIFS.2017.2787987}, doi = {10.1109/TIFS.2017.2787987}, timestamp = {Thu, 06 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/PhongAHWM18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/PreishuberHKU18, author = {Mario Preishuber and Thomas H{\"{u}}tter and Stefan Katzenbeisser and Andreas Uhl}, title = {Depreciating Motivation and Empirical Security Analysis of Chaos-Based Image and Video Encryption}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {13}, number = {9}, pages = {2137--2150}, year = {2018}, url = {https://doi.org/10.1109/TIFS.2018.2812080}, doi = {10.1109/TIFS.2018.2812080}, timestamp = {Sat, 05 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/PreishuberHKU18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/ProencaN18, author = {Hugo Proen{\c{c}}a and Jo{\~{a}}o C. Neves}, title = {Deep-PRWIS: Periocular Recognition Without the Iris and Sclera Using Deep Learning Frameworks}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {13}, number = {4}, pages = {888--896}, year = {2018}, url = {https://doi.org/10.1109/TIFS.2017.2771230}, doi = {10.1109/TIFS.2017.2771230}, timestamp = {Mon, 08 Apr 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/ProencaN18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/PuteauxP18, author = {Pauline Puteaux and William Puech}, title = {An Efficient {MSB} Prediction-Based Method for High-Capacity Reversible Data Hiding in Encrypted Images}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {13}, number = {7}, pages = {1670--1681}, year = {2018}, url = {https://doi.org/10.1109/TIFS.2018.2799381}, doi = {10.1109/TIFS.2018.2799381}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/PuteauxP18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/QiuKTJH18, author = {Xinwei Qiu and Wenxiong Kang and Senping Tian and Wei Jia and Zhixing Huang}, title = {Finger Vein Presentation Attack Detection Using Total Variation Decomposition}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {13}, number = {2}, pages = {465--477}, year = {2018}, url = {https://doi.org/10.1109/TIFS.2017.2756598}, doi = {10.1109/TIFS.2017.2756598}, timestamp = {Thu, 06 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/QiuKTJH18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/QuanWYZ18, author = {Weize Quan and Kai Wang and Dong{-}Ming Yan and Xiaopeng Zhang}, title = {Distinguishing Between Natural and Computer-Generated Images Using Convolutional Neural Networks}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {13}, number = {11}, pages = {2772--2787}, year = {2018}, url = {https://doi.org/10.1109/TIFS.2018.2834147}, doi = {10.1109/TIFS.2018.2834147}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/QuanWYZ18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/RashidiFNVB18, author = {Bahman Rashidi and Carol J. Fung and Anh Nguyen and Tam Vu and Elisa Bertino}, title = {Android User Privacy Preserving Through Crowdsourcing}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {13}, number = {3}, pages = {773--787}, year = {2018}, url = {https://doi.org/10.1109/TIFS.2017.2767019}, doi = {10.1109/TIFS.2017.2767019}, timestamp = {Mon, 16 Aug 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/RashidiFNVB18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/RavindrakumarPK18, author = {Vaishakh Ravindrakumar and Parthasarathi Panda and Nikhil Karamchandani and Vinod M. Prabhakaran}, title = {Private Coded Caching}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {13}, number = {3}, pages = {685--694}, year = {2018}, url = {https://doi.org/10.1109/TIFS.2017.2765503}, doi = {10.1109/TIFS.2017.2765503}, timestamp = {Thu, 06 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/RavindrakumarPK18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/RenYYYYMY18, author = {Xuebin Ren and Chia{-}Mu Yu and Weiren Yu and Shusen Yang and Xinyu Yang and Julie A. McCann and Philip S. Yu}, title = {LoPub: High-Dimensional Crowdsourced Data Publication With Local Differential Privacy}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {13}, number = {9}, pages = {2151--2166}, year = {2018}, url = {https://doi.org/10.1109/TIFS.2018.2812146}, doi = {10.1109/TIFS.2018.2812146}, timestamp = {Thu, 06 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/RenYYYYMY18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/RitzdorfSKMGC18, author = {Hubert Ritzdorf and Claudio Soriente and Ghassan O. Karame and Srdjan Marinovic and Damian Gruber and Srdjan Capkun}, title = {Toward Shared Ownership in the Cloud}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {13}, number = {12}, pages = {3019--3034}, year = {2018}, url = {https://doi.org/10.1109/TIFS.2018.2837648}, doi = {10.1109/TIFS.2018.2837648}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tifs/RitzdorfSKMGC18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/SasakiW18, author = {Manami Sasaki and Yodai Watanabe}, title = {Visual Secret Sharing Schemes Encrypting Multiple Images}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {13}, number = {2}, pages = {356--365}, year = {2018}, url = {https://doi.org/10.1109/TIFS.2017.2750104}, doi = {10.1109/TIFS.2017.2750104}, timestamp = {Sun, 22 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/SasakiW18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/SchallerSSK18, author = {Andr{\'{e}} Schaller and Taras Stanko and Boris Skoric and Stefan Katzenbeisser}, title = {Eliminating Leakage in Reverse Fuzzy Extractors}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {13}, number = {4}, pages = {954--964}, year = {2018}, url = {https://doi.org/10.1109/TIFS.2017.2774500}, doi = {10.1109/TIFS.2017.2774500}, timestamp = {Thu, 06 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/SchallerSSK18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/SenAA18, author = {Sevil Sen and Emre Aydogan and Ahmet Ilhan Aysan}, title = {Coevolution of Mobile Malware and Anti-Malware}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {13}, number = {10}, pages = {2563--2574}, year = {2018}, url = {https://doi.org/10.1109/TIFS.2018.2824250}, doi = {10.1109/TIFS.2018.2824250}, timestamp = {Thu, 06 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/SenAA18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/Sepas-Moghaddam18, author = {Alireza Sepas{-}Moghaddam and Fernando Pereira and Paulo Lobato Correia}, title = {Light Field-Based Face Presentation Attack Detection: Reviewing, Benchmarking and One Step Further}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {13}, number = {7}, pages = {1696--1709}, year = {2018}, url = {https://doi.org/10.1109/TIFS.2018.2799427}, doi = {10.1109/TIFS.2018.2799427}, timestamp = {Thu, 06 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/Sepas-Moghaddam18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/ShenLCGM18, author = {Chao Shen and Yuanxun Li and Yufei Chen and Xiaohong Guan and Roy A. Maxion}, title = {Performance Analysis of Multi-Motion Sensor Behavior for Active Smartphone Authentication}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {13}, number = {1}, pages = {48--62}, year = {2018}, url = {https://doi.org/10.1109/TIFS.2017.2737969}, doi = {10.1109/TIFS.2017.2737969}, timestamp = {Tue, 29 Jun 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/ShenLCGM18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/ShenMZMDH18, author = {Meng Shen and Baoli Ma and Liehuang Zhu and Rashid Mijumbi and Xiaojiang Du and Jiankun Hu}, title = {Cloud-Based Approximate Constrained Shortest Distance Queries Over Encrypted Graphs With Privacy Protection}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {13}, number = {4}, pages = {940--953}, year = {2018}, url = {https://doi.org/10.1109/TIFS.2017.2774451}, doi = {10.1109/TIFS.2017.2774451}, timestamp = {Fri, 12 May 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/ShenMZMDH18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/ShenZCLS18, author = {Jian Shen and Tianqi Zhou and Xiaofeng Chen and Jin Li and Willy Susilo}, title = {Anonymous and Traceable Group Data Sharing in Cloud Computing}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {13}, number = {4}, pages = {912--925}, year = {2018}, url = {https://doi.org/10.1109/TIFS.2017.2774439}, doi = {10.1109/TIFS.2017.2774439}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/ShenZCLS18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/ShiOJ18, author = {Yichun Shi and Charles Otto and Anil K. Jain}, title = {Face Clustering: Representation and Pairwise Constraints}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {13}, number = {7}, pages = {1626--1640}, year = {2018}, url = {https://doi.org/10.1109/TIFS.2018.2796999}, doi = {10.1109/TIFS.2018.2796999}, timestamp = {Thu, 06 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/ShiOJ18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/ShoufanASD18, author = {Abdulhadi Shoufan and Haitham M. Al{-}Angari and Muhammad Faraz Afzal Sheikh and Ernesto Damiani}, title = {Drone Pilot Identification by Classifying Radio-Control Signals}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {13}, number = {10}, pages = {2439--2447}, year = {2018}, url = {https://doi.org/10.1109/TIFS.2018.2819126}, doi = {10.1109/TIFS.2018.2819126}, timestamp = {Thu, 06 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/ShoufanASD18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/SongFHKW18, author = {Xiaoning Song and Zhen{-}Hua Feng and Guosheng Hu and Josef Kittler and Xiao{-}Jun Wu}, title = {Dictionary Integration Using 3D Morphable Face Models for Pose-Invariant Collaborative-Representation-Based Classification}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {13}, number = {11}, pages = {2734--2745}, year = {2018}, url = {https://doi.org/10.1109/TIFS.2018.2833052}, doi = {10.1109/TIFS.2018.2833052}, timestamp = {Sat, 29 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/SongFHKW18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/SousaV18, author = {Jo{\~{a}}o S{\'{a}} Sousa and Jo{\~{a}}o P. Vilela}, title = {Uncoordinated Frequency Hopping for Wireless Secrecy Against Non-Degraded Eavesdroppers}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {13}, number = {1}, pages = {143--155}, year = {2018}, url = {https://doi.org/10.1109/TIFS.2017.2737963}, doi = {10.1109/TIFS.2017.2737963}, timestamp = {Thu, 06 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/SousaV18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/SuYZLD18, author = {Zhiyong Su and Ying Ye and Qi Zhang and Weiqing Li and Yuewei Dai}, title = {Robust 2D Engineering {CAD} Graphics Hashing for Joint Topology and Geometry Authentication via Covariance-Based Descriptors}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {13}, number = {4}, pages = {1018--1030}, year = {2018}, url = {https://doi.org/10.1109/TIFS.2017.2777341}, doi = {10.1109/TIFS.2017.2777341}, timestamp = {Thu, 06 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/SuYZLD18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/SunDLSY18, author = {Xiaoyan Sun and Jun Dai and Peng Liu and Anoop Singhal and John Yen}, title = {Using Bayesian Networks for Probabilistic Identification of Zero-Day Attack Paths}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {13}, number = {10}, pages = {2506--2521}, year = {2018}, url = {https://doi.org/10.1109/TIFS.2018.2821095}, doi = {10.1109/TIFS.2018.2821095}, timestamp = {Mon, 04 Jan 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tifs/SunDLSY18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/TangDZY018, author = {Zhuo Tang and Xiaofei Ding and Ying Zhong and Li Yang and Keqin Li}, title = {A Self-Adaptive Bell-LaPadula Model Based on Model Training With Historical Access Logs}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {13}, number = {8}, pages = {2047--2061}, year = {2018}, url = {https://doi.org/10.1109/TIFS.2018.2807793}, doi = {10.1109/TIFS.2018.2807793}, timestamp = {Thu, 14 Dec 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tifs/TangDZY018.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/TangGZLZW18, author = {Mengyun Tang and Haichang Gao and Yang Zhang and Yi Liu and Ping Zhang and Ping Wang}, title = {Research on Deep Learning Techniques in Breaking Text-Based Captchas and Designing Image-Based Captcha}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {13}, number = {10}, pages = {2522--2537}, year = {2018}, url = {https://doi.org/10.1109/TIFS.2018.2821096}, doi = {10.1109/TIFS.2018.2821096}, timestamp = {Sun, 12 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tifs/TangGZLZW18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/TangJT18, author = {Wenchang Tang and Feng Ji and Wee Peng Tay}, title = {Estimating Infection Sources in Networks Using Partial Timestamps}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {13}, number = {12}, pages = {3035--3049}, year = {2018}, url = {https://doi.org/10.1109/TIFS.2018.2837655}, doi = {10.1109/TIFS.2018.2837655}, timestamp = {Thu, 06 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/TangJT18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/TangKF18, author = {Lei Tang and Wenxiong Kang and Yuxun Fang}, title = {Information Divergence-Based Matching Strategy for Online Signature Verification}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {13}, number = {4}, pages = {861--873}, year = {2018}, url = {https://doi.org/10.1109/TIFS.2017.2769023}, doi = {10.1109/TIFS.2017.2769023}, timestamp = {Thu, 06 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/TangKF18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/TangWXWZPD18, author = {Ming Tang and Pengbo Wang and Xiaoqi Ma and Wenjie Chang and Huanguo Zhang and Guojun Peng and Jean{-}Luc Danger}, title = {An Efficient {SCA} Leakage Model Construction Method Under Predictable Evaluation}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {13}, number = {12}, pages = {3008--3018}, year = {2018}, url = {https://doi.org/10.1109/TIFS.2018.2837644}, doi = {10.1109/TIFS.2018.2837644}, timestamp = {Fri, 13 Aug 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/TangWXWZPD18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/TavangaranSPB18, author = {Nima Tavangaran and Rafael F. Schaefer and H. Vincent Poor and Holger Boche}, title = {Secret-Key Generation and Convexity of the Rate Region Using Infinite Compound Sources}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {13}, number = {8}, pages = {2075--2086}, year = {2018}, url = {https://doi.org/10.1109/TIFS.2018.2809680}, doi = {10.1109/TIFS.2018.2809680}, timestamp = {Thu, 06 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/TavangaranSPB18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/TaylorSCM18, author = {Vincent F. Taylor and Riccardo Spolaor and Mauro Conti and Ivan Martinovic}, title = {Robust Smartphone App Identification via Encrypted Network Traffic Analysis}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {13}, number = {1}, pages = {63--78}, year = {2018}, url = {https://doi.org/10.1109/TIFS.2017.2737970}, doi = {10.1109/TIFS.2017.2737970}, timestamp = {Sun, 12 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tifs/TaylorSCM18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/TreustSL18, author = {Ma{\"{e}}l Le Treust and Leszek Szczecinski and Fabrice Labeau}, title = {Rate Adaptation for Secure {HARQ} Protocols}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {13}, number = {12}, pages = {2981--2994}, year = {2018}, url = {https://doi.org/10.1109/TIFS.2018.2833799}, doi = {10.1109/TIFS.2018.2833799}, timestamp = {Thu, 06 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/TreustSL18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/TruongEEK18, author = {Anh Truong and S. Rasoul Etesami and Jalal Etesami and Negar Kiyavash}, title = {Optimal Attack Strategies Against Predictors - Learning From Expert Advice}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {13}, number = {1}, pages = {6--19}, year = {2018}, url = {https://doi.org/10.1109/TIFS.2017.2718488}, doi = {10.1109/TIFS.2017.2718488}, timestamp = {Mon, 02 Nov 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tifs/TruongEEK18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/ValsecchiDC18, author = {Andrea Valsecchi and Sergio Damas and Oscar Cord{\'{o}}n}, title = {A Robust and Efficient Method for Skull-Face Overlay in Computerized Craniofacial Superimposition}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {13}, number = {8}, pages = {1960--1974}, year = {2018}, url = {https://doi.org/10.1109/TIFS.2018.2806939}, doi = {10.1109/TIFS.2018.2806939}, timestamp = {Tue, 29 Dec 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tifs/ValsecchiDC18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/VenugopalS18, author = {Vivek Venugopal and Suresh Sundaram}, title = {Online Writer Identification With Sparse Coding-Based Descriptors}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {13}, number = {10}, pages = {2538--2552}, year = {2018}, url = {https://doi.org/10.1109/TIFS.2018.2823276}, doi = {10.1109/TIFS.2018.2823276}, timestamp = {Tue, 07 Sep 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/VenugopalS18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/WangFBZ18, author = {Na Wang and Junsong Fu and Bharat K. Bhargava and Jiwen Zeng}, title = {Efficient Retrieval Over Documents Encrypted by Attributes in Cloud Computing}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {13}, number = {10}, pages = {2653--2667}, year = {2018}, url = {https://doi.org/10.1109/TIFS.2018.2825952}, doi = {10.1109/TIFS.2018.2825952}, timestamp = {Thu, 06 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/WangFBZ18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/WangMLW18, author = {Chenxu Wang and TungNgai Miu and Xiapu Luo and Jinhe Wang}, title = {SkyShield: {A} Sketch-Based Defense System Against Application Layer DDoS Attacks}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {13}, number = {3}, pages = {559--573}, year = {2018}, url = {https://doi.org/10.1109/TIFS.2017.2758754}, doi = {10.1109/TIFS.2017.2758754}, timestamp = {Thu, 06 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/WangMLW18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/WangNZH18, author = {Chuntao Wang and Jiangqun Ni and Xinpeng Zhang and Qiong Huang}, title = {Efficient Compression of Encrypted Binary Images Using the Markov Random Field}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {13}, number = {5}, pages = {1271--1285}, year = {2018}, url = {https://doi.org/10.1109/TIFS.2017.2784379}, doi = {10.1109/TIFS.2017.2784379}, timestamp = {Wed, 20 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/WangNZH18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/WangQWAJ18, author = {Felix Wang and Tu{-}Thach Quach and Jason Wheeler and James B. Aimone and Conrad D. James}, title = {Sparse Coding for N-Gram Feature Extraction and Training for File Fragment Classification}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {13}, number = {10}, pages = {2553--2562}, year = {2018}, url = {https://doi.org/10.1109/TIFS.2018.2823697}, doi = {10.1109/TIFS.2018.2823697}, timestamp = {Tue, 29 Dec 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tifs/WangQWAJ18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/WangSJ18, author = {Yongzhi Wang and Yulong Shen and Xiaohong Jiang}, title = {Practical Verifiable Computation-A MapReduce Case Study}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {13}, number = {6}, pages = {1376--1391}, year = {2018}, url = {https://doi.org/10.1109/TIFS.2017.2787993}, doi = {10.1109/TIFS.2017.2787993}, timestamp = {Wed, 27 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/WangSJ18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/WangTLH18, author = {Haowei Wang and Xiaofeng Tao and Na Li and Zhu Han}, title = {Polar Coding for the Wiretap Channel With Shared Key}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {13}, number = {6}, pages = {1351--1360}, year = {2018}, url = {https://doi.org/10.1109/TIFS.2017.2774499}, doi = {10.1109/TIFS.2017.2774499}, timestamp = {Wed, 21 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tifs/WangTLH18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/WangTLL18, author = {Wei Wang and Kah Chan Teh and Kwok Hung Li and Sheng Luo}, title = {On the Impact of Adaptive Eavesdroppers in Multi-Antenna Cellular Networks}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {13}, number = {2}, pages = {269--279}, year = {2018}, url = {https://doi.org/10.1109/TIFS.2017.2746010}, doi = {10.1109/TIFS.2017.2746010}, timestamp = {Thu, 06 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/WangTLL18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/WangWZ18, author = {Jun Wang and Guoqing Wang and Mei Zhou}, title = {Bimodal Vein Data Mining via Cross-Selected-Domain Knowledge Transfer}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {13}, number = {3}, pages = {733--744}, year = {2018}, url = {https://doi.org/10.1109/TIFS.2017.2766039}, doi = {10.1109/TIFS.2017.2766039}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/WangWZ18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/WangYCYZC18, author = {Shanshan Wang and Qiben Yan and Zhenxiang Chen and Bo Yang and Chuan Zhao and Mauro Conti}, title = {Detecting Android Malware Leveraging Text Semantics of Network Flows}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {13}, number = {5}, pages = {1096--1109}, year = {2018}, url = {https://doi.org/10.1109/TIFS.2017.2771228}, doi = {10.1109/TIFS.2017.2771228}, timestamp = {Thu, 06 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/WangYCYZC18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/WangYDG18, author = {Wei{-}Che Wang and Yair Yona and Suhas N. Diggavi and Puneet Gupta}, title = {Design and Analysis of Stability-Guaranteed PUFs}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {13}, number = {4}, pages = {978--992}, year = {2018}, url = {https://doi.org/10.1109/TIFS.2017.2774761}, doi = {10.1109/TIFS.2017.2774761}, timestamp = {Thu, 28 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/WangYDG18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/WangYSLGG18, author = {Weijia Wang and Yu Yu and Fran{\c{c}}ois{-}Xavier Standaert and Junrong Liu and Zheng Guo and Dawu Gu}, title = {Ridge-Based {DPA:} Improvement of Differential Power Analysis For Nanoscale Chips}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {13}, number = {5}, pages = {1301--1316}, year = {2018}, url = {https://doi.org/10.1109/TIFS.2017.2787985}, doi = {10.1109/TIFS.2017.2787985}, timestamp = {Mon, 19 Sep 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/WangYSLGG18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/WangZZ18, author = {Baocang Wang and Yu Zhan and Zhili Zhang}, title = {Cryptanalysis of a Symmetric Fully Homomorphic Encryption Scheme}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {13}, number = {6}, pages = {1460--1467}, year = {2018}, url = {https://doi.org/10.1109/TIFS.2018.2790916}, doi = {10.1109/TIFS.2018.2790916}, timestamp = {Sun, 22 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/WangZZ18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/WildeGP18, author = {Florian Wilde and Berndt M. Gammel and Michael Pehl}, title = {Spatial Correlation Analysis on Physical Unclonable Functions}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {13}, number = {6}, pages = {1468--1480}, year = {2018}, url = {https://doi.org/10.1109/TIFS.2018.2791341}, doi = {10.1109/TIFS.2018.2791341}, timestamp = {Thu, 06 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/WildeGP18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/WuCZC18, author = {Yongdong Wu and Binbin Chen and Zhigang Zhao and Yao Cheng}, title = {Attack and Countermeasure on Interlock-Based Device Pairing Schemes}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {13}, number = {3}, pages = {745--757}, year = {2018}, url = {https://doi.org/10.1109/TIFS.2017.2766048}, doi = {10.1109/TIFS.2017.2766048}, timestamp = {Fri, 20 Jan 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tifs/WuCZC18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/WuHST18, author = {Xiang Wu and Ran He and Zhenan Sun and Tieniu Tan}, title = {A Light {CNN} for Deep Face Representation With Noisy Labels}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {13}, number = {11}, pages = {2884--2896}, year = {2018}, url = {https://doi.org/10.1109/TIFS.2018.2833032}, doi = {10.1109/TIFS.2018.2833032}, timestamp = {Fri, 26 Jan 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tifs/WuHST18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/WuW18, author = {Hao Wu and Wei Wang}, title = {A Game Theory Based Collaborative Security Detection Method for Internet of Things Systems}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {13}, number = {6}, pages = {1432--1445}, year = {2018}, url = {https://doi.org/10.1109/TIFS.2018.2790382}, doi = {10.1109/TIFS.2018.2790382}, timestamp = {Thu, 06 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/WuW18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/XiangJG18, author = {Weichen Xiang and Martin Johnston and St{\'{e}}phane Y. Le Goff}, title = {Low-Complexity Power Control and Energy Harvesting Algorithms for Wiretap Channels Employing Finite-Alphabet Input Schemes}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {13}, number = {2}, pages = {318--326}, year = {2018}, url = {https://doi.org/10.1109/TIFS.2017.2749161}, doi = {10.1109/TIFS.2017.2749161}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/XiangJG18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/XiaoLHDP18, author = {Liang Xiao and Yanda Li and Guoan Han and Huaiyu Dai and H. Vincent Poor}, title = {A Secure Mobile Crowdsensing Game With Deep Reinforcement Learning}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {13}, number = {1}, pages = {35--47}, year = {2018}, url = {https://doi.org/10.1109/TIFS.2017.2737968}, doi = {10.1109/TIFS.2017.2737968}, timestamp = {Thu, 23 Jun 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/XiaoLHDP18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/XieC18, author = {Ning Xie and Changsheng Chen}, title = {Slope Authentication at the Physical Layer}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {13}, number = {6}, pages = {1579--1594}, year = {2018}, url = {https://doi.org/10.1109/TIFS.2018.2797963}, doi = {10.1109/TIFS.2018.2797963}, timestamp = {Sun, 11 Sep 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/XieC18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/XuDD18, author = {Peng Xu and Zhiguo Ding and Xuchu Dai}, title = {Achievable Secrecy Rates for Relay-Eavesdropper Channel Based on the Application of Noisy Network Coding}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {13}, number = {7}, pages = {1736--1751}, year = {2018}, url = {https://doi.org/10.1109/TIFS.2018.2805601}, doi = {10.1109/TIFS.2018.2805601}, timestamp = {Thu, 06 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/XuDD18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/XuNPYL18, author = {Lei Xu and Arumugam Nallanathan and Xiaofei Pan and Jian Yang and Wenhe Liao}, title = {Security-Aware Resource Allocation With Delay Constraint for NOMA-Based Cognitive Radio Network}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {13}, number = {2}, pages = {366--376}, year = {2018}, url = {https://doi.org/10.1109/TIFS.2017.2750106}, doi = {10.1109/TIFS.2017.2750106}, timestamp = {Fri, 22 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/XuNPYL18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/XuRRW18, author = {Dongyang Xu and Pinyi Ren and James A. Ritcey and Yichen Wang}, title = {Code-Frequency Block Group Coding for Anti-Spoofing Pilot Authentication in Multi-Antenna {OFDM} Systems}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {13}, number = {7}, pages = {1778--1793}, year = {2018}, url = {https://doi.org/10.1109/TIFS.2018.2800696}, doi = {10.1109/TIFS.2018.2800696}, timestamp = {Sat, 10 Sep 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/XuRRW18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/XuSBX18, author = {Maochao Xu and Kristin M. Schweitzer and Raymond M. Bateman and Shouhuai Xu}, title = {Modeling and Predicting Cyber Hacking Breaches}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {13}, number = {11}, pages = {2856--2871}, year = {2018}, url = {https://doi.org/10.1109/TIFS.2018.2834227}, doi = {10.1109/TIFS.2018.2834227}, timestamp = {Thu, 06 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/XuSBX18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/XuYMD18, author = {Shengmin Xu and Guomin Yang and Yi Mu and Robert H. Deng}, title = {Secure Fine-Grained Access Control and Data Sharing for Dynamic Groups in the Cloud}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {13}, number = {8}, pages = {2101--2113}, year = {2018}, url = {https://doi.org/10.1109/TIFS.2018.2810065}, doi = {10.1109/TIFS.2018.2810065}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/XuYMD18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/XueCLHH18, author = {Kaiping Xue and Weikeng Chen and Wei Li and Jianan Hong and Peilin Hong}, title = {Combining Data Owner-Side and Cloud-Side Access Control for Encrypted Cloud Storage}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {13}, number = {8}, pages = {2062--2074}, year = {2018}, url = {https://doi.org/10.1109/TIFS.2018.2809679}, doi = {10.1109/TIFS.2018.2809679}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/XueCLHH18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/XueMLCMG18, author = {Lei Xue and Xiaobo Ma and Xiapu Luo and Edmond W. W. Chan and TungNgai Miu and Guofei Gu}, title = {LinkScope: Toward Detecting Target Link Flooding Attacks}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {13}, number = {10}, pages = {2423--2438}, year = {2018}, url = {https://doi.org/10.1109/TIFS.2018.2815555}, doi = {10.1109/TIFS.2018.2815555}, timestamp = {Thu, 06 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/XueMLCMG18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/YanZYAS18, author = {Shihao Yan and Xiangyun Zhou and Nan (Jonas) Yang and Thushara D. Abhayapala and A. Lee Swindlehurst}, title = {Secret Channel Training to Enhance Physical Layer Security With a Full-Duplex Receiver}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {13}, number = {11}, pages = {2788--2800}, year = {2018}, url = {https://doi.org/10.1109/TIFS.2018.2834301}, doi = {10.1109/TIFS.2018.2834301}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/YanZYAS18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/YangCWZ18, author = {Yuan Yang and Zhongmin Cai and Chunyan Wang and Junjie Zhang}, title = {Probabilistically Inferring Attack Ramifications Using Temporal Dependence Network}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {13}, number = {11}, pages = {2913--2928}, year = {2018}, url = {https://doi.org/10.1109/TIFS.2018.2833048}, doi = {10.1109/TIFS.2018.2833048}, timestamp = {Thu, 06 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/YangCWZ18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/YangJB18, author = {Shukun Yang and Shouling Ji and Raheem A. Beyah}, title = {{DPPG:} {A} Dynamic Password Policy Generation System}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {13}, number = {3}, pages = {545--558}, year = {2018}, url = {https://doi.org/10.1109/TIFS.2017.2737971}, doi = {10.1109/TIFS.2017.2737971}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/YangJB18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/YangSL18, author = {Heecheol Yang and Wonjae Shin and Jungwoo Lee}, title = {Private Information Retrieval for Secure Distributed Storage Systems}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {13}, number = {12}, pages = {2953--2964}, year = {2018}, url = {https://doi.org/10.1109/TIFS.2018.2833050}, doi = {10.1109/TIFS.2018.2833050}, timestamp = {Thu, 06 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/YangSL18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/YaoL18, author = {Yanqing Yao and Zhoujun Li}, title = {Differential Privacy With Bias-Control Limited Sources}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {13}, number = {5}, pages = {1230--1241}, year = {2018}, url = {https://doi.org/10.1109/TIFS.2017.2780802}, doi = {10.1109/TIFS.2017.2780802}, timestamp = {Tue, 16 Aug 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/YaoL18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/YilmazCPZ18, author = {Baki Berkay Yilmaz and Robert Locke Callan and Milos Prvulovic and Alenka G. Zajic}, title = {Capacity of the {EM} Covert/Side-Channel Created by the Execution of Instructions in a Processor}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {13}, number = {3}, pages = {605--620}, year = {2018}, url = {https://doi.org/10.1109/TIFS.2017.2762826}, doi = {10.1109/TIFS.2017.2762826}, timestamp = {Thu, 06 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/YilmazCPZ18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/Yu18, author = {Nam Yul Yu}, title = {Indistinguishability and Energy Sensitivity of Gaussian and Bernoulli Compressed Encryption}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {13}, number = {7}, pages = {1722--1735}, year = {2018}, url = {https://doi.org/10.1109/TIFS.2018.2800726}, doi = {10.1109/TIFS.2018.2800726}, timestamp = {Sun, 22 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/Yu18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/YuKJ18, author = {Heejung Yu and Taejoon Kim and Hamid Jafarkhani}, title = {Wireless Secure Communication With Beamforming and Jamming in Time-Varying Wiretap Channels}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {13}, number = {8}, pages = {2087--2100}, year = {2018}, url = {https://doi.org/10.1109/TIFS.2018.2809695}, doi = {10.1109/TIFS.2018.2809695}, timestamp = {Thu, 06 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/YuKJ18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/YuKZZLF18, author = {Jun Yu and Zhenzhong Kuang and Baopeng Zhang and Wei Zhang and Dan Lin and Jianping Fan}, title = {Leveraging Content Sensitiveness and User Trustworthiness to Recommend Fine-Grained Privacy Settings for Social Image Sharing}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {13}, number = {5}, pages = {1317--1332}, year = {2018}, url = {https://doi.org/10.1109/TIFS.2017.2787986}, doi = {10.1109/TIFS.2017.2787986}, timestamp = {Mon, 26 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/YuKZZLF18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/YuRC18, author = {Jiangshan Yu and Mark Ryan and Cas Cremers}, title = {{DECIM:} Detecting Endpoint Compromise In Messaging}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {13}, number = {1}, pages = {106--118}, year = {2018}, url = {https://doi.org/10.1109/TIFS.2017.2738609}, doi = {10.1109/TIFS.2017.2738609}, timestamp = {Sun, 12 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tifs/YuRC18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/ZapponeLJ18, author = {Alessio Zappone and Pin{-}Hsun Lin and Eduard A. Jorswieck}, title = {Optimal Energy-Efficient Design of Confidential Multiple-Antenna Systems}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {13}, number = {1}, pages = {237--252}, year = {2018}, url = {https://doi.org/10.1109/TIFS.2017.2746009}, doi = {10.1109/TIFS.2017.2746009}, timestamp = {Thu, 06 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/ZapponeLJ18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/ZeinstraVS18, author = {Chris G. Zeinstra and Raymond N. J. Veldhuis and Luuk J. Spreeuwers}, title = {Grid-Based Likelihood Ratio Classifiers for the Comparison of Facial Marks}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {13}, number = {1}, pages = {253--264}, year = {2018}, url = {https://doi.org/10.1109/TIFS.2017.2746013}, doi = {10.1109/TIFS.2017.2746013}, timestamp = {Thu, 06 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/ZeinstraVS18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/ZengTLH18, author = {Jishen Zeng and Shunquan Tan and Bin Li and Jiwu Huang}, title = {Large-Scale {JPEG} Image Steganalysis Using Hybrid Deep-Learning Framework}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {13}, number = {5}, pages = {1200--1214}, year = {2018}, url = {https://doi.org/10.1109/TIFS.2017.2779446}, doi = {10.1109/TIFS.2017.2779446}, timestamp = {Thu, 06 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/ZengTLH18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/ZhaNWLGNZ18, author = {Xuan Zha and Wei Ni and Xu Wang and Ren Ping Liu and Y. Jay Guo and Xinxin Niu and Kangfeng Zheng}, title = {The Impact of Link Duration on the Integrity of Distributed Mobile Networks}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {13}, number = {9}, pages = {2240--2255}, year = {2018}, url = {https://doi.org/10.1109/TIFS.2018.2812714}, doi = {10.1109/TIFS.2018.2812714}, timestamp = {Thu, 06 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/ZhaNWLGNZ18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/ZhangDWH18, author = {Linyuan Zhang and Guoru Ding and Qihui Wu and Zhu Han}, title = {Spectrum Sensing Under Spectrum Misuse Behaviors: {A} Multi-Hypothesis Test Perspective}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {13}, number = {4}, pages = {993--1007}, year = {2018}, url = {https://doi.org/10.1109/TIFS.2017.2774770}, doi = {10.1109/TIFS.2017.2774770}, timestamp = {Wed, 05 Jan 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tifs/ZhangDWH18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/ZhangHCZ18, author = {Zhikun Zhang and Shibo He and Jiming Chen and Junshan Zhang}, title = {{REAP:} An Efficient Incentive Mechanism for Reconciling Aggregation Accuracy and Individual Privacy in Crowdsensing}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {13}, number = {12}, pages = {2995--3007}, year = {2018}, url = {https://doi.org/10.1109/TIFS.2018.2834232}, doi = {10.1109/TIFS.2018.2834232}, timestamp = {Fri, 23 Jul 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/ZhangHCZ18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/ZhangHST18, author = {Shu Zhang and Ran He and Zhenan Sun and Tieniu Tan}, title = {DeMeshNet: Blind Face Inpainting for Deep MeshFace Verification}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {13}, number = {3}, pages = {637--647}, year = {2018}, url = {https://doi.org/10.1109/TIFS.2017.2763119}, doi = {10.1109/TIFS.2017.2763119}, timestamp = {Fri, 26 Jan 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tifs/ZhangHST18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/ZhangK18, author = {Xu Zhang and Edward W. Knightly}, title = {Pilot Distortion Attack and Zero-Startup-Cost Detection in Massive {MIMO} Network: From Analysis to Experiments}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {13}, number = {12}, pages = {3094--3107}, year = {2018}, url = {https://doi.org/10.1109/TIFS.2018.2837641}, doi = {10.1109/TIFS.2018.2837641}, timestamp = {Thu, 06 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/ZhangK18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/ZhangKZ18, author = {PeiYun Zhang and Yang Kong and MengChu Zhou}, title = {A Domain Partition-Based Trust Model for Unreliable Clouds}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {13}, number = {9}, pages = {2167--2178}, year = {2018}, url = {https://doi.org/10.1109/TIFS.2018.2812166}, doi = {10.1109/TIFS.2018.2812166}, timestamp = {Thu, 06 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/ZhangKZ18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/ZhangLSL18, author = {Hongwen Zhang and Qi Li and Zhenan Sun and Yunfan Liu}, title = {Combining Data-Driven and Model-Driven Methods for Robust Facial Landmark Detection}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {13}, number = {10}, pages = {2409--2422}, year = {2018}, url = {https://doi.org/10.1109/TIFS.2018.2800901}, doi = {10.1109/TIFS.2018.2800901}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/ZhangLSL18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/ZhangLST18, author = {Qi Zhang and Haiqing Li and Zhenan Sun and Tieniu Tan}, title = {Deep Feature Fusion for Iris and Periocular Biometrics on Mobile Devices}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {13}, number = {11}, pages = {2897--2912}, year = {2018}, url = {https://doi.org/10.1109/TIFS.2018.2833033}, doi = {10.1109/TIFS.2018.2833033}, timestamp = {Thu, 06 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/ZhangLST18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/ZhangZSLHJ18, author = {Ning Zhang and Ruide Zhang and Kun Sun and Wenjing Lou and Y. Thomas Hou and Sushil Jajodia}, title = {Memory Forensic Challenges Under Misused Architectural Features}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {13}, number = {9}, pages = {2345--2358}, year = {2018}, url = {https://doi.org/10.1109/TIFS.2018.2819119}, doi = {10.1109/TIFS.2018.2819119}, timestamp = {Thu, 11 May 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/ZhangZSLHJ18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/ZhaoK18, author = {Zijing Zhao and Ajay Kumar}, title = {Improving Periocular Recognition by Explicit Attention to Critical Regions in Deep Neural Network}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {13}, number = {12}, pages = {2937--2952}, year = {2018}, url = {https://doi.org/10.1109/TIFS.2018.2833018}, doi = {10.1109/TIFS.2018.2833018}, timestamp = {Thu, 29 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tifs/ZhaoK18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/ZhengDW18, author = {Yifeng Zheng and Huayi Duan and Cong Wang}, title = {Learning the Truth Privately and Confidently: Encrypted Confidence-Aware Truth Discovery in Mobile Crowdsensing}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {13}, number = {10}, pages = {2475--2489}, year = {2018}, url = {https://doi.org/10.1109/TIFS.2018.2819134}, doi = {10.1109/TIFS.2018.2819134}, timestamp = {Sun, 22 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/ZhengDW18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/ZhengLGCYW18, author = {Jing Zheng and Qi Li and Guofei Gu and Jiahao Cao and David K. Y. Yau and Jianping Wu}, title = {Realtime DDoS Defense Using {COTS} {SDN} Switches via Adaptive Correlation Analysis}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {13}, number = {7}, pages = {1838--1853}, year = {2018}, url = {https://doi.org/10.1109/TIFS.2018.2805600}, doi = {10.1109/TIFS.2018.2805600}, timestamp = {Sat, 10 Sep 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/ZhengLGCYW18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/Zhou18, author = {Caixue Zhou}, title = {Comments on "Light-Weight and Robust Security-Aware D2D-Assist Data Transmission Protocol for Mobile-Health Systems"}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {13}, number = {7}, pages = {1869--1870}, year = {2018}, url = {https://doi.org/10.1109/TIFS.2018.2799582}, doi = {10.1109/TIFS.2018.2799582}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/Zhou18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/ZhouR18, author = {Kai Zhou and Jian Ren}, title = {PassBio: Privacy-Preserving User-Centric Biometric Authentication}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {13}, number = {12}, pages = {3050--3063}, year = {2018}, url = {https://doi.org/10.1109/TIFS.2018.2838540}, doi = {10.1109/TIFS.2018.2838540}, timestamp = {Mon, 22 Jan 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tifs/ZhouR18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/ZhuJYZSZ18, author = {Xiaoke Zhu and Xiao{-}Yuan Jing and Xinge You and Wangmeng Zuo and Shiguang Shan and Wei{-}Shi Zheng}, title = {Image to Video Person Re-Identification by Learning Heterogeneous Dictionary Pair With Feature Projection Matrix}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {13}, number = {3}, pages = {717--732}, year = {2018}, url = {https://doi.org/10.1109/TIFS.2017.2765524}, doi = {10.1109/TIFS.2017.2765524}, timestamp = {Thu, 12 Jan 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tifs/ZhuJYZSZ18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/ZhuoZZZZ18, author = {Zhongliu Zhuo and Yang Zhang and Zhi{-}Li Zhang and Xiaosong Zhang and Jingzhong Zhang}, title = {Website Fingerprinting Attack on Anonymity Networks Based on Profile Hidden Markov Model}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {13}, number = {5}, pages = {1081--1095}, year = {2018}, url = {https://doi.org/10.1109/TIFS.2017.2762825}, doi = {10.1109/TIFS.2017.2762825}, timestamp = {Thu, 11 Aug 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/ZhuoZZZZ18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/ZuoSLWL18, author = {Cong Zuo and Jun Shao and Joseph K. Liu and Guiyi Wei and Yun Ling}, title = {Fine-Grained Two-Factor Protection Mechanism for Data Sharing in Cloud Storage}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {13}, number = {1}, pages = {186--196}, year = {2018}, url = {https://doi.org/10.1109/TIFS.2017.2746000}, doi = {10.1109/TIFS.2017.2746000}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/ZuoSLWL18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.