


default search action
IEEE Transactions on Information Forensics and Security, Volume 14
Volume 14, Number 1, January 2019
- Yanyang Yan

, Wenqi Ren
, Xiaochun Cao:
Recolored Image Detection via a Deep Discriminative Model. 5-17 - Chan Dai Truyen Thai, Jemin Lee

, Jay Prakash, Tony Q. S. Quek
:
Secret Group-Key Generation at Physical Layer for Multi-Antenna Mesh Topology. 18-33 - Ajay Kumar

:
Toward More Accurate Matching of Contactless Palmprint Images Under Less Constrained Environments. 34-47 - Lei Xu

, Chunxiao Jiang
, Nengqiang He
, Zhu Han, Abderrahim Benslimane:
Trust-Based Collaborative Privacy Management in Online Social Networks. 48-60 - Konstantinos Koufos

, Carl P. Dettmann:
Boundaries as an Enhancement Technique for Physical Layer Security. 61-74 - Rui Zhao, Chuan Yue

, Qi Han:
Sensor-Based Mobile Web Cross-Site Input Inference Attacks and Defenses. 75-89 - Wenming Yang

, Zhiquan Chen
, Chuan Qin, Qingmin Liao:
$\alpha$ -Trimmed Weber Representation and Cross Section Asymmetrical Coding for Human Identification Using Finger Images. 90-101 - Yiwei He

, Junping Zhang
, Hongming Shan
, Liang Wang:
Multi-Task GANs for View-Specific Feature Learning in Gait Recognition. 102-113 - Wenjian Luo

, Yamin Hu
, Hao Jiang, Junteng Wang
:
Authentication by Encrypted Negative Password. 114-128 - Shihao Yan

, Biao He
, Xiangyun Zhou
, Yirui Cong
, A. Lee Swindlehurst
:
Delay-Intolerant Covert Communications With Either Fixed or Random Transmit Power. 129-140 - Heecheol Yang

, Jungwoo Lee
:
Secure Distributed Computing With Straggling Servers Using Polynomial Codes. 141-150 - João Neves

, Hugo Proença
:
"A Leopard Cannot Change Its Spots": Improving Face Recognition Using 3D-Based Caricatures. 151-161 - Kisong Lee

, Jun-Pyo Hong
, Hyun-Ho Choi
, Tony Q. S. Quek
:
Wireless-Powered Two-Way Relaying Protocols for Optimizing Physical Layer Security. 162-174 - Jinho Choi

:
A Coding Approach With Key-Channel Randomization for Physical-Layer Authentication. 175-185 - Hamzeh Ghasemzadeh

:
Multi-Layer Architecture for Efficient Steganalysis of UnderMp3Cover in Multi-Encoder Scenario. 186-195 - Lu Zhou

, Suguo Du, Haojin Zhu
, Cailian Chen
, Kaoru Ota
, Mianxiong Dong
:
Location Privacy in Usage-Based Automotive Insurance: Attacks and Countermeasures. 196-211 - Xuanxuan Tang

, Yueming Cai
, Yansha Deng
, Yuzhen Huang
, Wendong Yang
, Weiwei Yang
:
Energy-Constrained SWIPT Networks: Enhancing Physical Layer Security With FD Self-Jamming. 212-222 - Taeho Jung

, Xiang-Yang Li
, Wenchao Huang
, Zhongying Qiao
, Jianwei Qian
, Linlin Chen, Junze Han
, Jiahui Hou
:
AccountTrade: Accountability Against Dishonest Big Data Buyers and Sellers. 223-234 - Wenjing Zhang, Ming Li

, Ravi Tandon
, Hui Li:
Online Location Trace Privacy: An Information Theoretic Approach. 235-250 - Shicheng Yang

, Le Zhang, Lianghua He, Ying Wen
:
Sparse Low-Rank Component-Based Representation for Face Recognition With Low-Quality Images. 251-261 - Bin Dai

, Yuan Luo
:
An Improved Feedback Coding Scheme for the Wire-Tap Channel. 262-271
Volume 14, Number 2, February 2019
- Adi Hajj-Ahmad

, Chau-Wai Wong
, Steven Gambino, Qiang Zhu
, Miao Yu
, Min Wu
:
Factors Affecting ENF Capture in Audio. 277-288 - Faraz Ahmad Khan

, Fouad Khelifi
, Muhammad Atif Tahir
, Ahmed Bouridane
:
Dissimilarity Gaussian Mixture Models for Efficient Offline Handwritten Text-Independent Identification Using SIFT and RootSIFT Descriptors. 289-303 - Ravichandran Subramanian

, Sudeep Sarkar
:
Evaluation of Algorithms for Orientation Invariant Inertial Gait Matching. 304-318 - Libing Wu

, Jing Wang
, Kim-Kwang Raymond Choo
, Debiao He
:
Secure Key Agreement and Key Protection for Mobile Device User Authentication. 319-330 - Wenting Shen, Jing Qin, Jia Yu

, Rong Hao, Jiankun Hu
:
Enabling Identity-Based Integrity Auditing and Data Sharing With Sensitive Information Hiding for Secure Cloud Storage. 331-346 - Kaveh Shamsi, Travis Meade, Meng Li

, David Z. Pan
, Yier Jin
:
On the Approximation Resiliency of Logic Locking and IC Camouflaging Schemes. 347-359 - Rig Das

, Emanuela Piciucco
, Emanuele Maiorana
, Patrizio Campisi
:
Convolutional Neural Network for Finger-Vein-Based Biometric Identification. 360-373 - Qian Wang

, Jing Huang, Yanjiao Chen
, Cong Wang
, Fu Xiao
, Xiangyang Luo:
PROST: Privacy-Preserving and Truthful Online Double Auction for Spectrum Allocation. 374-386 - Dongyang Xu

, Pinyi Ren
, James A. Ritcey:
Independence-Checking Coding for OFDM Channel Training Authentication: Protocol Design, Security, Stability, and Tradeoff Analysis. 387-402 - Nhan Duy Truong

, Jing Yan Haw
, Syed Muhamad Assad, Ping Koy Lam
, Omid Kavehei
:
Machine Learning Cryptanalysis of a Quantum Random Number Generator. 403-414 - Ben Nassi

, Adi Shamir
, Yuval Elovici:
Xerox Day Vulnerability. 415-430 - Ryota Nakai, Shinya Sugiura

:
Physical Layer Security in Buffer-State-Based Max-Ratio Relay Selection Exploiting Broadcasting With Cooperative Beamforming and Jamming. 431-444 - Xiaofang Xia

, Yang Xiao
, Wei Liang:
ABSI: An Adaptive Binary Splitting Algorithm for Malicious Meter Inspection in Smart Grid. 445-458 - Yvonne Höller

, Arne C. Bathke, Andreas Uhl
:
Age, Sex, and Pathology Effects on Stability of Electroencephalographic Biometric Features Based on Measures of Interaction. 459-471 - Holger Boche, Christian Deppe

:
Secure Identification Under Passive Eavesdroppers and Active Jamming Attacks. 472-485 - Qingyou Yang, Kaiping Xue

, Jie Xu
, Jiajie Wang, Fenghua Li, Nenghai Yu:
AnFRA: Anonymous and Fast Roaming Authentication for Space Information Network. 486-497 - Mehmet Necip Kurt

, Yasin Yilmaz
, Xiaodong Wang
:
Real-Time Detection of Hybrid and Stealthy Cyber-Attacks in Smart Grid. 498-513 - Mohammad Reza Khalili Shoja

, George T. Amariucai
, Zhengdao Wang
, Shuangqing Wei
, Jing Deng
:
On the Secret Key Capacity of Sibling Hidden Markov Models. 514-524 - Saman Feghhi

, Douglas J. Leith
:
An Efficient Web Traffic Defence Against Timing-Analysis Attacks. 525-540 - Muhammad Umar Karim Khan

, Hyun Sang Park
, Chong-Min Kyung
:
Rejecting Motion Outliers for Efficient Crowd Anomaly Detection. 541-556
Volume 14, Number 3, March 2019
- Chunlei Zhang, Muaz Ahmad

, Yongqiang Wang
:
ADMM Based Privacy-Preserving Decentralized Optimization. 565-580 - Udit Satija

, Nikita Trivedi, Gagarin Biswal, Barathram Ramkumar:
Specific Emitter Identification Based on Variational Mode Decomposition and Spectral Features in Single Hop and Relaying Scenarios. 581-591 - Dongyang Xu

, Pinyi Ren
, James A. Ritcey:
Hierarchical 2-D Feature Coding for Secure Pilot Authentication in Multi-User Multi-Antenna OFDM Systems: A Reliability Bound Contraction Perspective. 592-607 - Luca Bondi

, Paolo Bestagini
, Fernando Pérez-González
, Stefano Tubaro:
Improving PRNU Compression Through Preprocessing, Quantization, and Coding. 608-620 - Zahra Mobini

, Mohammadali Mohammadi
, Chintha Tellambura
:
Wireless-Powered Full-Duplex Relay and Friendly Jamming for Secure Cooperative Communications. 621-634 - Massimo Iuliani

, Dasara Shullani
, Marco Fontani
, Saverio Meucci
, Alessandro Piva
:
A Video Forensic Framework for the Unsupervised Analysis of MP4-Like File Container. 635-645 - Yuqing Li

, Wenkuan Dai
, Jie Bai, Xiaoying Gan
, Jingchao Wang, Xinbing Wang
:
An Intelligence-Driven Security-Aware Defense Mechanism for Advanced Persistent Threats. 646-661 - Chenhao Lin

, Ajay Kumar
:
A CNN-Based Framework for Comparison of Contactless to Contact-Based Fingerprints. 662-676 - Junyang Bai

, Weiping Wang
, Yan Qin, Shigeng Zhang
, Jianxin Wang, Yi Pan
:
BridgeTaint: A Bi-Directional Dynamic Taint Tracking Method for JavaScript Bridges in Android Hybrid Applications. 677-692 - Chenyu Wang

, Bihuan Chen, Yang Liu
, Hongjun Wu
:
Layered Object-Oriented Programming: Advanced VTable Reuse Attacks on Binary-Level Defense. 693-708 - Harkeerat Kaur, Pritee Khanna

:
Random Distance Method for Generating Unimodal and Multimodal Cancelable Biometric Features. 709-719 - Zhe Liu

, Hwajeong Seo:
IoT-NUMS: Evaluating NUMS Elliptic Curve Cryptography for IoT Platforms. 720-729 - Attilio Fiandrotti

, Rossano Gaeta
, Marco Grangetto
:
Securing Network Coding Architectures Against Pollution Attacks With Band Codes. 730-742 - Emir Erdem

, Mehmet Tahir Sandikkaya
:
OTPaaS - One Time Password as a Service. 743-756 - Fania Mokhayeri

, Eric Granger
, Guillaume-Alexandre Bilodeau
:
Domain-Specific Face Synthesis for Video Face Recognition From a Single Sample Per Person. 757-772 - TaeGuen Kim, BooJoong Kang, Mina Rho, Sakir Sezer, Eul Gyu Im

:
A Multimodal Deep Learning Method for Android Malware Detection Using Various Features. 773-788 - Jianting Ning

, Jia Xu
, Kaitai Liang
, Fan Zhang
, Ee-Chien Chang
:
Passive Attacks Against Searchable Encryption. 789-802 - Peter Samarin

, Kerstin Lemke-Rust:
Detection of Counterfeit ICs Using Public Identification Sequences and Side-Channel Leakage. 803-813 - Lei Xue

, Chenxiong Qian, Hao Zhou
, Xiapu Luo
, Yajin Zhou, Yuru Shao, Alvin T. S. Chan:
NDroid: Toward Tracking Information Flows Across Multiple Android Contexts. 814-828
Volume 14, Number 4, April 2019
- Yuhong Liu

, Na Li:
Retrieving Hidden Friends: A Collusion Privacy Attack Against Online Friend Search Engine. 833-847 - Sanjay Karmakar

, Anirban Ghosh
:
Secrecy Capacity Region of Fading Binary Z Interference Channel With Statistical CSIT. 848-857 - Wenxiong Kang

, Yuting Lu, Dejian Li, Wei Jia:
From Noise to Feature: Exploiting Intensity Distribution as a Novel Soft Biometric Trait for Finger Vein Recognition. 858-869 - Guowen Xu

, Hongwei Li
, Yuanshun Dai, Kan Yang
, Xiaodong Lin
:
Enabling Efficient and Geometric Range Query With Access Control Over Encrypted Spatial Data. 870-885 - Sivaram Prasad Mudunuri

, Shashanka Venkataramanan, Soma Biswas
:
Dictionary Alignment With Re-Ranking for Low-Resolution NIR-VIS Face Recognition. 886-896 - Vijay Varadharajan

, Kallol Krishna Karmakar
, Udaya Kiran Tupakula
, Michael Hitchens
:
A Policy-Based Security Architecture for Software-Defined Networks. 897-912 - Qing Yang

, Ge Peng, Paolo Gasti
, Kiran S. Balagani
, Yantao Li
, Gang Zhou
:
MEG: Memory and Energy Efficient Garbled Circuit Evaluation on Smartphones. 913-922 - Rui Shao

, Xiangyuan Lan
, Pong C. Yuen
:
Joint Discriminative Learning of Deep Dynamic Textures for 3D Mask Face Anti-Spoofing. 923-938 - Changhai Ou

, Zhu Wang
, Degang Sun, Xinping Zhou:
Group Collision Attack. 939-953 - Sayandeep Saha

, Dirmanto Jap
, Sikhar Patranabis
, Debdeep Mukhopadhyay
, Shivam Bhasin
, Pallab Dasgupta
:
Automatic Characterization of Exploitable Faults: A Machine Learning Approach. 954-968 - Mohammed Adil Abbas

, Hojin Song, Jun-Pyo Hong
:
Opportunistic Scheduling for Average Secrecy Rate Enhancement in Fading Downlink Channel With Potential Eavesdroppers. 969-980 - Ángeles Vázquez-Castro

, Masahito Hayashi
:
Physical Layer Security for RF Satellite Channels in the Finite-Length Regime. 981-993 - Pierre-Francois Marteau

:
Sequence Covering for Efficient Host-Based Intrusion Detection. 994-1006 - Xing Hu

, Yingping Huang, Xiumin Gao, Lingkun Luo, Qianqian Duan:
Squirrel-Cage Local Binary Pattern and Its Application in Video Anomaly Detection. 1007-1022 - Ali Akbar Pammu

, Weng-Geng Ho, Ne Kyaw Zwa Lwin, Kwen-Siong Chong, Bah-Hwee Gwee
:
A High Throughput and Secure Authentication-Encryption AES-CCM Algorithm on Asynchronous Multicore Processor. 1023-1036 - Bogdan Groza

, Pal-Stefan Murvay
:
Efficient Intrusion Detection With Bloom Filtering in Controller Area Networks. 1037-1051 - Kejiang Chen

, Hang Zhou, Wenbo Zhou, Weiming Zhang
, Nenghai Yu:
Defining Cost Functions for Adaptive JPEG Steganography at the Microscale. 1052-1066 - Tengku Mohd Afendi Zulcaffle

, Fatih Kurugollu
, Danny Crookes
, Ahmed Bouridane, Mohsen Farid:
Frontal View Gait Recognition With Fusion of Depth Features From a Time of Flight Camera. 1067-1082 - Mirco Marchetti

, Dario Stabili
:
READ: Reverse Engineering of Automotive Data Frames. 1083-1097 - Zhuotao Liu

, Yuan Cao
, Min Zhu, Wei Ge:
Umbrella: Enabling ISPs to Offer Readily Deployable and Privacy-Preserving DDoS Prevention Services. 1098-1108 - Siarhei S. Zalivaka, Alexander A. Ivaniuk, Chip-Hong Chang

:
Reliable and Modeling Attack Resistant Authentication of Arbiter PUF in FPGA Implementation With Trinary Quadruple Response. 1109-1123
Volume 14, Number 5, May 2019
- Sofia Belikovetsky

, Yosef A. Solewicz
, Mark Yampolskiy
, Jinghui Toh, Yuval Elovici:
Digital Audio Signature for 3D Printing Integrity. 1127-1141 - Duo Li

, Xiao-Ping (Steven) Zhang
, Menghan Hu
, Guangtao Zhai
, Xiaokang Yang:
Physical Password Breaking via Thermal Sequence Analysis. 1142-1154 - Ankit Shah

, Rajesh Ganesan
, Sushil Jajodia
, Hasan Cam
:
Understanding Tradeoffs Between Throughput, Quality, and Cost of Alert Analysis in a CSOC. 1155-1170 - Zhenghui Liu

, Yuankun Huang
, Jiwu Huang
:
Patchwork-Based Audio Watermarking Robust Against De-Synchronization and Recapturing Attacks. 1171-1180 - Mehdi Boroumand

, Mo Chen, Jessica J. Fridrich:
Deep Residual Network for Steganalysis of Digital Images. 1181-1193 - Gurinder Singh

, Kulbir Singh
:
Counter JPEG Anti-Forensic Approach Based on the Second-Order Statistical Analysis. 1194-1209 - Lu Yang, Gongping Yang

, Xiaoming Xi
, Kun Su, Qing Chen, Yilong Yin
:
Finger Vein Code: From Indexing to Matching. 1210-1223 - Rick Fritschek

, Gerhard Wunder:
On the Gaussian Multiple Access Wiretap Channel and the Gaussian Wiretap Channel With a Helper: Achievable Schemes and Upper Bounds. 1224-1239 - Pramuditha Perera

, Vishal M. Patel
:
Face-Based Multiple User Active Authentication on Mobile Devices. 1240-1250 - Berk Akgun

, Marwan Krunz, Onur Ozan Koyluoglu:
Vulnerabilities of Massive MIMO Systems to Pilot Contamination Attacks. 1251-1263 - Kazuaki Nakamura

, Naoko Nitta, Noboru Babaguchi:
Encryption-Free Framework of Privacy-Preserving Image Recognition for Photo-Based Information Services. 1264-1279 - Zhongliang Yang

, Xiaoqing Guo
, Zi-Ming Chen
, Yongfeng Huang
, Yu-Jin Zhang
:
RNN-Stega: Linguistic Steganography Based on Recurrent Neural Networks. 1280-1295 - James Shey

, Justin A. Blanco
, T. Owens Walker
, Thomas W. Tedesso, Hau T. Ngo, Ryan N. Rakvic
, Kevin D. Fairbanks
:
Monitoring Device Current to Characterize Trim Operations of Solid-State Drives. 1296-1306 - Yuanman Li, Jiantao Zhou:

Fast and Effective Image Copy-Move Forgery Detection via Hierarchical Feature Point Matching. 1307-1322 - Shun-Chi Wu

, Peng-Tzu Chen, A. Lee Swindlehurst
, Pei-Lun Hung:
Cancelable Biometric Recognition With ECGs: Subspace-Based Approaches. 1323-1336 - Zhen Hong

, Rui Wang
, Shouling Ji, Raheem Beyah
:
Attacker Location Evaluation-Based Fake Source Scheduling for Source Location Privacy in Cyber-Physical Systems. 1337-1350 - Javier Galbally

, Rudolf Haraksim, Laurent Beslay:
A Study of Age and Ageing in Fingerprint Biometrics. 1351-1365 - Christina L. Ting

, Richard V. Field Jr.
, Andrew Fisher, Travis L. Bauer:
Compression Analytics for Classification and Anomaly Detection Within Network Communication. 1366-1376 - Vincent Y. F. Tan

, Si-Hyeon Lee
:
Time-Division is Optimal for Covert Communication Over Some Broadcast Channels. 1377-1389 - Tian Wang

, Meina Qiao, Zhiwei Lin, Ce Li, Hichem Snoussi, Zhe Liu
, Chang Choi
:
Generative Neural Networks for Anomaly Detection in Crowded Scenes. 1390-1399
Volume 14, Number 6, June 2019
- Han Fang

, Weiming Zhang
, Hang Zhou
, Hao Cui
, Nenghai Yu:
Screen-Shooting Resilient Watermarking. 1403-1418 - Andrey Kuehlkamp

, Allan da Silva Pinto
, Anderson Rocha
, Kevin W. Bowyer
, Adam Czajka
:
Ensemble of Multi-View Learning Classifiers for Cross-Domain Iris Presentation Attack Detection. 1419-1431 - Hannes Mareen

, Johan De Praeter
, Glenn Van Wallendael
, Peter Lambert
:
A Scalable Architecture for Uncompressed-Domain Watermarked Videos. 1432-1444 - Liran Lerman

, Olivier Markowitch:
Efficient Profiled Attacks on Masking Schemes. 1445-1454 - Haipeng Cai

, Na Meng, Barbara G. Ryder
, Danfeng Yao
:
DroidCat: Effective Android Malware Detection and Categorization via App-Level Profiling. 1455-1470 - Muhammad Ejaz Ahmed, Saeed Ullah

, Hyoungshick Kim
:
Statistical Application Fingerprinting for DDoS Attack Mitigation. 1471-1484 - Di Zhuang

, J. Morris Chang:
Enhanced PeerHunter: Detecting Peer-to-Peer Botnets Through Network-Flow Level Community Behavior Analysis. 1485-1500 - Mateusz Trokielewicz

, Adam Czajka
, Piotr Maciejewicz:
Iris Recognition After Death. 1501-1514 - Tatsuya Chuman

, Warit Sirichotedumrong
, Hitoshi Kiya
:
Encryption-Then-Compression Systems Using Grayscale-Based Image Encryption for JPEG Images. 1515-1525 - Iman Vakilinia

, Shamik Sengupta:
A Coalitional Cyber-Insurance Framework for a Common Platform. 1526-1538 - Lewis D. Griffin

, Matthew Caldwell
, Jerone T. A. Andrews, Helene Bohler
:
"Unexpected Item in the Bagging Area": Anomaly Detection in X-Ray Security Images. 1539-1553 - Prosanta Gope

, Biplab Sikdar
:
Lightweight and Privacy-Friendly Spatial Data Aggregation for Secure Power Supply and Demand Management in Smart Grids. 1554-1566 - Zuxing Li, Tobias J. Oechtering, Deniz Gündüz

:
Privacy Against a Hypothesis Testing Adversary. 1567-1581 - Jun Du, Erol Gelenbe, Chunxiao Jiang, Haijun Zhang, Yong Ren, H. Vincent Poor

:
Peer Prediction-Based Trustworthiness Evaluation and Trustworthy Service Rating in Social Networks. 1582-1594 - Zhenyu Ning, Fengwei Zhang

:
Hardware-Assisted Transparent Tracing and Debugging on ARM. 1595-1609 - Tinghan Yang, Rongqing Zhang

, Xiang Cheng, Liuqing Yang:
Secure Massive MIMO Under Imperfect CSI: Performance Analysis and Channel Prediction. 1610-1623 - Songxuan Lai, Lianwen Jin:

Recurrent Adaptation Networks for Online Signature Verification. 1624-1637 - Yisroel Mirsky, Naor Kalbo, Yuval Elovici, Asaf Shabtai:

Vesper: Using Echo Analysis to Detect Man-in-the-Middle Attacks in LANs. 1638-1653 - Jeffrey Pawlick, Juntao Chen, Quanyan Zhu:

iSTRICT: An Interdependent Strategic Trust Mechanism for the Cloud-Enabled Internet of Controlled Things. 1654-1669 - Youhong Feng, Shihao Yan

, Chenxi Liu, Zhen Yang, Nan Yang
:
Two-Stage Relay Selection for Enhancing Physical Layer Security in Non-Orthogonal Multiple Access. 1670-1683
Volume 14, Number 7, July 2019
- Shuangke Wu, Yanjiao Chen

, Qian Wang
, Minghui Li
, Cong Wang
, Xiangyang Luo
:
CReam: A Smart Contract Enabled Collusion-Resistant e-Auction. 1687-1701 - Hugo Proença

, João C. Neves
:
A Reminiscence of "Mastermind": Iris/Periocular Biometrics by "In-Set" CNN Iterative Analysis. 1702-1712 - Lu-Xing Yang

, Pengdeng Li, Yushu Zhang
, Xiaofan Yang
, Yong Xiang
, Wanlei Zhou
:
Effective Repair Strategy Against Advanced Persistent Threat: A Differential Game Approach. 1713-1728 - Jianwu Wan

, Yi Wang
:
Cost-Sensitive Label Propagation for Semi-Supervised Face Recognition. 1729-1743 - Thiago M. Paixão

, Maria C. S. Boeres, Cinthia O. A. Freitas
, Thiago Oliveira-Santos
:
Exploring Character Shapes for Unsupervised Reconstruction of Strip-Shredded Text Documents. 1744-1754 - Dawei Zhao

, Lianhai Wang, Zhen Wang
, Gaoxi Xiao
:
Virus Propagation and Patch Distribution in Multiplex Networks: Modeling, Analysis, and Optimal Allocation. 1755-1767 - Seong Tae Kim

, Yong Man Ro
:
Attended Relation Feature Representation of Facial Dynamics for Facial Authentication. 1768-1778 - Yujue Wang, Yong Ding

, Qianhong Wu
, Yongzhuang Wei, Bo Qin
, Huiyong Wang:
Privacy-Preserving Cloud-Based Road Condition Monitoring With Source Authentication in VANETs. 1779-1790 - Yuchuan Luo

, Xiaohua Jia
, Shaojing Fu
, Ming Xu:
pRide: Privacy-Preserving Ride Matching Over Road Networks for Online Ride-Hailing Service. 1791-1802 - Tiago de Freitas Pereira

, André Anjos
, Sébastien Marcel
:
Heterogeneous Face Recognition Using Domain Specific Units. 1803-1816 - Xiaoli Sun

, Weiwei Yang
, Yueming Cai
, Liwei Tao
, Yang Liu
, Yongming Huang
:
Secure Transmissions in Wireless Information and Power Transfer Millimeter-Wave Ultra-Dense Networks. 1817-1829 - Yaxing Chen

, Wenhai Sun
, Ning Zhang
, Qinghua Zheng, Wenjing Lou, Y. Thomas Hou
:
Towards Efficient Fine-Grained Access Control and Trustworthy Data Processing for Remote Monitoring Services in IoT. 1830-1842 - Zengzhen Zhao

, Qingxiao Guan, Hong Zhang
, Xianfeng Zhao
:
Improving the Robustness of Adaptive Steganographic Algorithms Based on Transport Channel Matching. 1843-1856 - Ankit Shah

, Rajesh Ganesan
, Sushil Jajodia
, Hasan Cam:
A Two-Step Approach to Optimal Selection of Alerts for Investigation in a CSOC. 1857-1870 - Jeffrey Pawlick

, Edward Colbert, Quanyan Zhu:
Modeling and Analysis of Leaky Deception Using Signaling Games With Evidence. 1871-1886 - Yansong Gao

, Yang Su, Lei Xu
, Damith Chinthana Ranasinghe:
Lightweight (Reverse) Fuzzy Extractor With Multiple Reference PUF Responses. 1887-1901 - Quoc-Tin Phan

, Giulia Boato
, Francesco G. B. De Natale
:
Accurate and Scalable Image Clustering Based on Sparse Representation of Camera Fingerprint. 1902-1916 - Yi Yu

, Feipeng Da
, Yifan Guo
:
Sparse ICP With Resampling and Denoising for 3D Face Verification. 1917-1927 - Cecilia Pasquini

, Rainer Böhme
:
Information-Theoretic Bounds for the Forensic Detection of Downscaled Signals. 1928-1943 - Guozhu Meng

, Matthew Patrick, Yinxing Xue
, Yang Liu
, Jie Zhang:
Securing Android App Markets via Modeling and Predicting Malware Spread Between Markets. 1944-1959
Volume 14, Number 8, August 2019
- Robin Richter

, Carsten Gottschlich, Lucas Mentch, Duy Hoang Thai, Stephan F. Huckemann:
Smudge Noise for Quality Estimation of Fingerprints and its Validation. 1963-1974 - Nour Moustafa

, Kim-Kwang Raymond Choo
, Ibrahim Radwan
, Seyit Camtepe
:
Outlier Dirichlet Mixture Mechanism: Adversarial Statistical Learning for Anomaly Detection in the Fog. 1975-1987 - Kamal Taha

, Paul D. Yoo
:
Shortlisting the Influential Members of Criminal Organizations and Identifying Their Important Communication Channels. 1988-1999 - Pei Li

, Loreto Prieto, Domingo Mery
, Patrick J. Flynn
:
On Low-Resolution Face Recognition in the Wild: Comparisons and New Techniques. 2000-2012 - Sebastian Baur

, Christian Deppe
, Holger Boche:
Secure Storage for Identification; Random Resources and Privacy Leakage. 2013-2027 - Jie Cao

, Yibo Hu, Bing Yu, Ran He
, Zhenan Sun
:
3D Aided Duet GANs for Multi-View Face Image Synthesis. 2028-2042 - Jeroen Delvaux

:
Machine-Learning Attacks on PolyPUFs, OB-PUFs, RPUFs, LHS-PUFs, and PUF-FSMs. 2043-2058 - Alessio Zappone

, Pin-Hsun Lin, Eduard A. Jorswieck
:
Secrecy Energy Efficiency for MIMO Single- and Multi-Cell Downlink Transmission With Confidential Messages. 2059-2073 - Weixuan Tang, Bin Li

, Shunquan Tan
, Mauro Barni
, Jiwu Huang
:
CNN-Based Adversarial Embedding for Image Steganography. 2074-2087 - Xiazhi Lai

, Lisheng Fan
, Xianfu Lei
, Jin Li, Nan Yang
, George K. Karagiannidis
:
Distributed Secure Switch-and-Stay Combining Over Correlated Fading Channels. 2088-2101 - Joseph Thompson

, Patrick J. Flynn
, Christopher Boehnen, Hector J. Santos-Villalobos
:
Assessing the Impact of Corneal Refraction and Iris Tissue Non-Planarity on Iris Recognition. 2102-2112 - Abubakar Sadiq Sani

, Dong Yuan, Wei Bao
, Zhao Yang Dong
, Branka Vucetic
, Elisa Bertino
:
Universally Composable Key Bootstrapping and Secure Communication Protocols for the Energy Internet. 2113-2127 - Willie K. Harrison

, Telmo R. Fernandes, Marco A. C. Gomes
, João P. Vilela:
Generating a Binary Symmetric Channel for Wiretap Codes. 2128-2138 - S. Sundeep Desai

, Manisha J. Nene
:
Node-Level Trust Evaluation in Wireless Sensor Networks. 2139-2152 - Luiz G. Hafemann

, Robert Sabourin
, Luiz S. Oliveira:
Characterizing and Evaluating Adversarial Examples for Offline Handwritten Signature Verification. 2153-2166 - Alexandre Bartel

, Jacques Klein
, Yves Le Traon
:
Musti: Dynamic Prevention of Invalid Object Initialization Attacks. 2167-2178 - José Camacho

, Gabriel Maciá-Fernández
, Noemí Marta Fuentes García
, Edoardo Saccenti
:
Semi-Supervised Multivariate Statistical Network Monitoring for Learning Security Threats. 2179-2189 - Meysam Mirzaee, Soroush Akhlaghi

:
Maximizing the Minimum Achievable Secrecy Rate for a Two-User Gaussian Weak Interference Channel. 2190-2202 - Michael Kiperberg

, Roee Leon, Amit Resh, Asaf Algawi, Nezer J. Zaidenberg
:
Hypervisor-Based Protection of Code. 2203-2216 - Xiaowei Yi

, Kun Yang, Xianfeng Zhao
, Yuntao Wang, Haibo Yu:
AHCM: Adaptive Huffman Code Mapping for Audio Steganography Based on Psychoacoustic Model. 2217-2231 - Masahiro Kaminaga, Toshinori Suzuki

, Masaharu Fukase
:
Determining the Optimal Random-Padding Size for Rabin Cryptosystems. 2232-2242
Volume 14, Number 9, September 2019
- Lei Li

, Zhaoqiang Xia
, Abdenour Hadid
, Xiaoyue Jiang, Haixi Zhang, Xiaoyi Feng:
Replayed Video Attack Detection Based on Motion Blur Analysis. 2246-2261 - Saffet Vatansever

, Ahmet Emir Dirik
, Nasir D. Memon
:
Analysis of Rolling Shutter Effect on ENF-Based Video Forensics. 2262-2275 - Lieneke Kusters

, Frans M. J. Willems
:
Secret-Key Capacity Regions for Multiple Enrollments With an SRAM-PUF. 2276-2287 - Salman Salamatian

, Wasim Huleihel, Ahmad Beirami
, Asaf Cohen
, Muriel Médard:
Why Botnets Work: Distributed Brute-Force Attacks Need No Synchronization. 2288-2299 - Xuhang Ying

, Sang Uk Sagong, Andrew Clark
, Linda Bushnell
, Radha Poovendran
:
Shape of the Cloak: Formal Analysis of Clock Skew-Based Intrusion Detection System in Controller Area Networks. 2300-2314 - Mengyuan Zhang

, Xavier de Carné de Carnavalet
, Lingyu Wang
, Ahmed Ragab
:
Large-Scale Empirical Study of Important Features Indicative of Discovered Vulnerabilities to Assess Application Security. 2315-2330 - Qi Yan, Rui Yang, Jiwu Huang

:
Robust Copy-Move Detection of Speech Recording Using Similarities of Pitch and Formant. 2331-2341 - Yanan Li

, Xuebin Ren
, Shusen Yang
, Xinyu Yang
:
Impact of Prior Knowledge and Data Correlation on Privacy Leakage: A Unified Analysis. 2342-2357 - Chugui Xu, Ju Ren

, Deyu Zhang
, Yaoxue Zhang
, Zhan Qin
, Kui Ren:
GANobfuscator: Mitigating Information Leakage Under GAN via Differential Privacy. 2358-2371 - Emre Durmus, Pawel Korus

, Nasir D. Memon
:
Every Shred Helps: Assembling Evidence From Orphaned JPEG Fragments. 2372-2386 - Shengbo Xu, Weiyang Xu

, Cunhua Pan
, Maged Elkashlan
:
Detection of Jamming Attack in Non-Coherent Massive SIMO Systems. 2387-2399 - Fei Peng

, Zi-Xing Lin
, Xiang Zhang
, Min Long:
Reversible Data Hiding in Encrypted 2D Vector Graphics Based on Reversible Mapping Model for Real Numbers. 2400-2411 - Muhammad Junaid Farooq

, Quanyan Zhu:
Modeling, Analysis, and Mitigation of Dynamic Botnet Formation in Wireless IoT Networks. 2412-2426 - Zezhi Wu

, Xingyuan Chen
, Zhi Yang, Xuehui Du:
Reducing Security Risks of Suspicious Data and Codes Through a Novel Dynamic Defense Model. 2427-2440 - Qi Yan, Rui Yang, Jiwu Huang

:
Detection of Speech Smoothing on Very Short Clips. 2441-2453 - Zhipeng Chen

, Benedetta Tondi
, Xiaolong Li
, Rongrong Ni, Yao Zhao
, Mauro Barni
:
Secure Detection of Image Manipulation by Means of Random Feature Selection. 2454-2469 - Tan N. Nguyen, Hoang Long Mai, Rémi Cogranne

, Guillaume Doyen, Wissam Mallouli, Luong Nguyen
, Moustapha El Aoun, Edgardo Montes de Oca
, Olivier Festor
:
Reliable Detection of Interest Flooding Attack in Real Deployment of Named Data Networking. 2470-2485 - Yitao Han

, Lingjie Duan
, Rui Zhang
:
Jamming-Assisted Eavesdropping Over Parallel Fading Channels. 2486-2499 - Jiucheng Xie

, Chi-Man Pun
:
Chronological Age Estimation Under the Guidance of Age-Related Facial Attributes. 2500-2511 - Wenming Yang

, Changqing Hui
, Zhiquan Chen
, Jing-Hao Xue
, Qingmin Liao:
FV-GAN: Finger Vein Representation Using Generative Adversarial Networks. 2512-2524
Volume 14, Number 10, October 2019
- Lee Friedman

, Oleg V. Komogortsev:
Assessment of the Effectiveness of Seven Biometric Feature Normalization Techniques. 2528-2536 - Joey Tianyi Zhou

, Jiawei Du, Hongyuan Zhu, Xi Peng
, Yong Liu, Rick Siow Mong Goh:
AnomalyNet: An Anomaly Detection Network for Video Surveillance. 2537-2550 - Yaqi Liu

, Xiaobin Zhu, Xianfeng Zhao
, Yun Cao:
Adversarial Learning for Constrained Image Splicing Detection and Localization Based on Atrous Convolution. 2551-2566 - Farhad Farokhi

:
Development and Analysis of Deterministic Privacy-Preserving Policies Using Non- Stochastic Information Theory. 2567-2576 - Seokeon Choi

, Jonghee Kim
, Wonjun Kim
, Changick Kim
:
Skeleton-Based Gait Recognition via Robust Frame-Level Matching. 2577-2592 - Bin Qiu

, Mingliang Tao
, Ling Wang, Jian Xie
, Yuexian Wang
:
Multi-Beam Directional Modulation Synthesis Scheme Based on Frequency Diverse Array. 2593-2606 - Kai-Hsiang Hsu, Yu-Hsi Chiang, Hsu-Chun Hsiao

:
SafeChain: Securing Trigger-Action Programming From Attack Chains. 2607-2622 - Aleksander Essex

:
Secure Approximate String Matching for Privacy-Preserving Record Linkage. 2623-2632 - Sunghwan Cho

, Gaojie Chen
, Justin P. Coon
:
Enhancement of Physical Layer Security With Simultaneous Beamforming and Jamming for Visible Light Communication Systems. 2633-2648 - Yanzhen Ren

, Hanyi Yang, Hongxia Wu, Weiping Tu
, Lina Wang:
A Secure AMR Fixed Codebook Steganographic Scheme Based on Pulse Distribution Model. 2649-2661 - Ribhu Chopra

, Chandra R. Murthy
, Ramesh Annavajjala:
Physical Layer Security in Wireless Sensor Networks Using Distributed Co-Phasing. 2662-2675 - Min Jiang

, Guodong Guo
:
Body Weight Analysis From Human Body Images. 2676-2688 - Anna Engelmann

, Admela Jukan
:
Toward All-Optical Layered Encryption: A Feasibility Analysis of Optical Stream Cipher. 2689-2704 - Nguyen Binh Truong

, Gyu Myoung Lee
, Tai-Won Um
, Michael Mackay
:
Trust Evaluation Mechanism for User Recruitment in Mobile Crowd-Sensing in the Internet of Things. 2705-2719 - Kiruba Sankaran Subramani

, Angelos Antonopoulos
, Ahmed Attia Abotabl
, Aria Nosratinia
, Yiorgos Makris
:
Demonstrating and Mitigating the Risk of an FEC-Based Hardware Trojan in Wireless Networks. 2720-2734 - Jishen Zeng

, Shunquan Tan
, Guangqing Liu
, Bin Li
, Jiwu Huang
:
WISERNet: Wider Separate-Then-Reunion Network for Steganalysis of Color Images. 2735-2748 - Anyi Liu

, Huirong Fu, Yuan Hong
, Jigang Liu, Yingjiu Li
:
LiveForen: Ensuring Live Forensic Integrity in the Cloud. 2749-2764 - Saeed Ahmed

, Youngdoo Lee, Seung Ho Hyun
, Insoo Koo
:
Unsupervised Machine Learning-Based Detection of Covert Data Integrity Assault in Smart Grid Networks Utilizing Isolation Forest. 2765-2777 - Fangfei Yang

, Ming Tang
, Ozgur Sinanoglu
:
Stripped Functionality Logic Locking With Hamming Distance-Based Restore Unit (SFLL-hd) - Unlocked. 2778-2786 - Keerthi Suria Kumar Arumugam

, Matthieu R. Bloch
:
Embedding Covert Information in Broadcast Communications. 2787-2801
Volume 14, Number 11, November 2019
- Zhili Chen

, Tianjiao Ni
, Hong Zhong, Shun Zhang
, Jie Cui
:
Differentially Private Double Spectrum Auction With Approximate Social Welfare Maximization. 2805-2818 - Dhanushka Kudathanthirige

, Santosh Timilsina
, Gayan Amarasuriya Aruma Baduge
:
Secure Communication in Relay-Assisted Massive MIMO Downlink With Active Pilot Attacks. 2819-2833 - Enrique Argones-Rúa

, Aysajan Abidin
, Roel Peeters
, Jac Romme
:
Efficient and Privacy-Preserving Cryptographic Key Derivation From Continuous Sources. 2834-2847 - Onur Günlü

, Onurcan Iscan
, Vladimir Sidorenko
, Gerhard Kramer
:
Code Constructions for Physical Unclonable Functions and Biometric Secrecy Systems. 2848-2858 - Haoyu Ma

, Chunfu Jia
, Shijia Li
, Wantong Zheng
, Dinghao Wu
:
Xmark: Dynamic Software Watermarking Using Collatz Conjecture. 2859-2874 - Yuechi Jiang

, Frank H. F. Leung
:
Source Microphone Recognition Aided by a Kernel-Based Projection Method. 2875-2886 - Yuan Ma

, Tianyu Chen
, Jingqiang Lin, Jing Yang
, Jiwu Jing:
Entropy Estimation for ADC Sampling-Based True Random Number Generators. 2887-2900 - Mohammed Shayan

, Sukanta Bhattacharjee, Jack Tang
, Krishnendu Chakrabarty
, Ramesh Karri
:
Bio-Protocol Watermarking on Digital Microfluidic Biochips. 2901-2915 - Fran Casino

, Kim-Kwang Raymond Choo
, Constantinos Patsakis
:
HEDGE: Efficient Traffic Classification of Encrypted and Compressed Packets. 2916-2926 - Yingjie Xue, Kaiping Xue

, Na Gai, Jianan Hong, David S. L. Wei, Peilin Hong
:
An Attribute-Based Controlled Collaborative Access Control Scheme for Public Cloud Storage. 2927-2942 - Peipei Li

, Yibo Hu, Ran He
, Zhenan Sun
:
Global and Local Consistent Wavelet-Domain Age Synthesis. 2943-2957 - Juntao Chen

, Quanyan Zhu:
Interdependent Strategic Security Risk Management With Bounded Rationality in the Internet of Things. 2958-2971 - Debanjan Sadhya

, Balasubramanian Raman:
Generation of Cancelable Iris Templates via Randomized Bit Sampling. 2972-2986 - Zhongjie Ba

, Zhan Qin
, Xinwen Fu
, Kui Ren:
CIM: Camera in Motion for Smartphone Authentication. 2987-3002 - Le Trieu Phong

, Tran Thi Phuong
:
Privacy-Preserving Deep Learning via Weight Transmission. 3003-3015 - Eunsoo Park, Xuenan Cui, Thi Hai Binh Nguyen

, Hakil Kim
:
Presentation Attack Detection Using a Tiny Fully Convolutional Network. 3016-3025 - Jinchuan Tang

, Gaojie Chen
, Justin P. Coon
:
Secrecy Performance Analysis of Wireless Communications in the Presence of UAV Jammer and Randomly Located UAV Eavesdroppers. 3026-3041 - Bagus Santoso

, Yasutada Oohama:
Secrecy Amplification of Distributed Encrypted Sources With Correlated Keys Using Post-Encryption-Compression. 3042-3056 - Annushree Bablani

, Damodar Reddy Edla
, Diwakar Tripathi
, Shubham Dodia
, Sridhar Chintala
:
A Synergistic Concealed Information Test With Novel Approach for EEG Channel Selection and SVM Parameter Optimization. 3057-3068 - Weijia Wang

, Yu Yu
, François-Xavier Standaert
:
Provable Order Amplification for Code-Based Masking: How to Avoid Non-Linear Leakages Due to Masked Operations. 3069-3082
Volume 14, Number 12, December 2019
- Diksha Shukla

, Vir V. Phoha
:
Stealing Passwords by Observing Hands Movement. 3086-3101 - Sudip Vhaduri

, Christian Poellabauer
:
Multi-Modal Biometric-Based Implicit Authentication of Wearable Device Users. 3116-3125 - Jinyuan Chen

, Fan Li
:
Adding a Helper Can Totally Remove the Secrecy Constraints in a Two-User Interference Channel. 3126-3139 - Dexing Zhong

, Huikai Shao
, Xuefeng Du
:
A Hand-Based Multi-Biometrics via Deep Hashing Network and Biometric Graph Matching. 3140-3150 - Zhengmin Kong

, Shaoshi Yang
, Die Wang
, Lajos Hanzo
:
Robust Beamforming and Jamming for Enhancing the Physical Layer Security of Full Duplex Radios. 3151-3159 - Angelo Genovese

, Vincenzo Piuri
, Konstantinos N. Plataniotis
, Fabio Scotti
:
PalmNet: Gabor-PCA Convolutional Networks for Touchless Palmprint Recognition. 3160-3174 - Alejandro Calleja

, Juan Tapiador
, Juan Caballero:
The MalSource Dataset: Quantifying Complexity and Code Reuse in Malware Development. 3175-3190 - Lu Lv

, Fuhui Zhou
, Jian Chen
, Naofal Al-Dhahir:
Secure Cooperative Communications With an Untrusted Relay: A NOMA-Inspired Jamming and Relaying Approach. 3191-3205 - Hongze Zhao

, Yijun Wang
, Zhiduo Liu, Weihua Pei, Hongda Chen:
Individual Identification Based on Code-Modulated Visual-Evoked Potentials. 3206-3216 - Jose David Mireles

, Eric Ficke
, Jin-Hee Cho, Patrick M. Hurley, Shouhuai Xu
:
Metrics Towards Measuring Cyber Agility. 3217-3232 - Kuo Wang

, Ajay Kumar
:
Toward More Accurate Iris Recognition Using Dilated Residual Features. 3233-3245 - Xiang Li

, Yasushi Makihara, Chi Xu
, Yasushi Yagi
, Mingwu Ren:
Joint Intensity Transformer Network for Gait Recognition Robust Against Clothing and Carrying Status. 3102-3115 - Christian Kison

, Omar Mohamed Awad
, Marc Fyrbiak
, Christof Paar
:
Security Implications of Intentional Capacitive Crosstalk. 3246-3258 - Min Wang

, Heba El-Fiqi
, Jiankun Hu
, Hussein A. Abbass
:
Convolutional Neural Networks Using Dynamic Functional Connectivity for EEG-Based Person Identification in Diverse Human States. 3259-3272 - Richeng Jin

, Xiaofan He
, Huaiyu Dai
:
On the Security-Privacy Tradeoff in Collaborative Security: A Quantitative Information Flow Game Perspective. 3273-3286 - Muhammad Taqi Raza

, Songwu Lu, Mario Gerla:
vEPC-sec: Securing LTE Network Functions Virtualization on Public Cloud. 3287-3297 - Josep Domingo-Ferrer

, Jordi Soria-Comas
, Rafael Mulero-Vellido
:
Steered Microaggregation as a Unified Primitive to Anonymize Data Sets and Data Streams. 3298-3311 - Seyed Mohammad Hosseini

, Amir Hossein Jahangir
, Mehdi Kazemi:
Digesting Network Traffic for Forensic Investigation Using Digital Signal Processing Techniques. 3312-3321 - Yanwei Pang

, Jiale Cao
, Jian Wang, Jungong Han
:
JCS-Net: Joint Classification and Super-Resolution Network for Small-Scale Pedestrian Detection in Surveillance Images. 3322-3331 - Yu-Chi Chen

, Tsung-Hsuan Hung, Sung-Hsien Hsieh
, Chih-Wei Shiu
:
A New Reversible Data Hiding in Encrypted Image Based on Multi-Secret Sharing and Lightweight Cryptographic Algorithms. 3332-3343 - Xiaowei Li

, Dengqi Yang, Xing Zeng, Benhui Chen, Yuqing Zhang
:
Comments on "Provably Secure Dynamic Id-Based Anonymous Two-Factor Authenticated Key Exchange Protocol With Extended Security Model". 3344-3345

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














