


Остановите войну!
for scientists:


default search action
IEEE Transactions on Information Forensics and Security, Volume 17
Volume 17, 2022
- Aslí Bay
, Zekeriya Erkin
, Jaap-Henk Hoepman, Simona Samardjiska, Jelle Vos
:
Practical Multi-Party Private Set Intersection Protocols. 1-15 - Ehsan Nekouei
, Mohammad Pirani
, Henrik Sandberg
, Karl Henrik Johansson
:
A Randomized Filtering Strategy Against Inference Attacks on Active Steering Control Systems. 16-27 - Guohou Shan
, Boxin Zhao, James R. Clavin, Haibin Zhang, Sisi Duan
:
Poligraph: Intrusion-Tolerant and Distributed Fake News Detection System. 28-41 - Juan E. Tapia
, Sebastian Gonzalez, Christoph Busch
:
Iris Liveness Detection Using a Cascade of Dedicated Deep Learning Networks. 42-52 - Mohammad Ragheb, Sayed Mostafa Safavi Hemami, Ali Kuhestani
, Derrick Wing Kwan Ng
, Lajos Hanzo
:
On the Physical Layer Security of Untrusted Millimeter Wave Relaying Networks: A Stochastic Geometry Approach. 53-68 - Yang Liu
, Zhuo Ma
, Ximeng Liu
, Siqi Ma, Kui Ren
:
Privacy-Preserving Object Detection for Medical Images With Faster R-CNN. 69-84 - Uppalapati Somalatha
, Parthajit Mohapatra
:
Role of Shared Key for Secure Communication Over 2-User Gaussian Z-Interference Channel. 85-98 - Yuanyu Zhang
, Yulong Shen
, Xiaohong Jiang
, Shoji Kasahara
:
Secure Millimeter-Wave Ad Hoc Communications Using Physical Layer Security. 99-114 - Dongming Wu
, Mang Ye
, Gaojie Lin, Xin Gao
, Jianbing Shen
:
Person Re-Identification by Context-Aware Part Attention and Multi-Head Collaborative Learning. 115-126 - Vítor Albiero
, Kai Zhang, Michael C. King, Kevin W. Bowyer
:
Gendered Differences in Face Recognition Accuracy Explained by Hairstyles, Makeup, and Facial Morphology. 127-137 - Yunpei Jia
, Jie Zhang
, Shiguang Shan
:
Dual-Branch Meta-Learning Network With Distribution Alignment for Face Anti-Spoofing. 138-151 - Jungang Yang
, Liyao Xiang
, Ruidong Chen, Weiting Li
, Baochun Li
:
Differential Privacy for Tensor-Valued Queries. 152-164 - Amirreza Zamani
, Tobias J. Oechtering
, Mikael Skoglund
:
Data Disclosure With Non-Zero Leakage and Non-Invertible Leakage Matrix. 165-179 - Linghui Zhou
, Tobias J. Oechtering
, Mikael Skoglund
:
Fundamental Limits-Achieving Polar Code Designs for Biometric Identification and Authentication. 180-195 - Steven A. Grosz
, Joshua J. Engelsma
, Eryun Liu
, Anil K. Jain
:
C2CL: Contact to Contactless Fingerprint Matching. 196-210 - Guyue Li
, Chen Sun
, Wei Xu
, Marco Di Renzo
, Aiqun Hu
:
On Maximizing the Sum Secret Key Rate for Reconfigurable Intelligent Surface-Assisted Multiuser Systems. 211-225 - Yuanrong Xu
, Yao Lu
, Fanglin Chen
, Guangming Lu
, David Zhang
:
High Resolution Fingerprint Retrieval Based on Pore Indexing and Graph Comparison. 226-236 - Xiaoning Liu
, Bang Wu, Xingliang Yuan
, Xun Yi
:
Leia: A Lightweight Cryptographic Neural Network Inference System at the Edge. 237-252 - Yimeng Ge
, Jiancun Fan
:
Robust Secure Beamforming for Intelligent Reflecting Surface Assisted Full-Duplex MISO Systems. 253-264 - Cristiano Gratton
, Naveen K. D. Venkategowda
, Reza Arablouei
, Stefan Werner
:
Privacy-Preserved Distributed Learning With Zeroth-Order Optimization. 265-279 - Saeedreza Shehnepoor
, Roberto Togneri
, Wei Liu
, Mohammed Bennamoun
:
ScoreGAN: A Fraud Review Detector Based on Regulated GAN With Data Augmentation. 280-291 - Rossano Gaeta
:
On the Impact of Pollution Attacks on Coding-Based Distributed Storage Systems. 292-302 - Wenqi Wei
, Ling Liu:
Gradient Leakage Attack Resilient Deep Learning. 303-316 - Yafang Yang
, Lei Zhang
, Yunlei Zhao
, Kim-Kwang Raymond Choo
, Yan Zhang
:
Privacy-Preserving Aggregation-Authentication Scheme for Safety Warning System in Fog-Cloud Based VANET. 317-331 - Ángeles Vázquez-Castro
:
Asymptotically Guaranteed Anti-Jamming Spread Spectrum Random Access Without Pre-Shared Secret. 332-343 - Jianyang Gu
, Weihua Chen
, Hao Luo
, Fan Wang
, Hao Li
, Wei Jiang
, Weijie Mao
:
Multi-View Evolutionary Training for Unsupervised Domain Adaptive Person Re-Identification. 344-356 - Mahdi Khosravy
, Kazuaki Nakamura
, Yuki Hirose, Naoko Nitta, Noboru Babaguchi:
Model Inversion Attack by Integration of Deep Generative Models: Privacy-Sensitive Face Generation From a Face Recognition System. 357-372 - Benoît Bonnet
, Teddy Furon
, Patrick Bas
:
Generating Adversarial Images in Quantized Domains. 373-385 - Mang Ye
, Cuiqun Chen
, Jianbing Shen
, Ling Shao
:
Dynamic Tri-Level Relation Mining With Attentive Graph for Visible Infrared Re-Identification. 386-398 - Jiucheng Xie
, Chi-Man Pun
, Kin-Man Lam:
Implicit and Explicit Feature Purification for Age-Invariant Facial Representation Learning. 399-412 - Bingyao Yu
, Jiwen Lu
, Xiu Li
, Jie Zhou
:
Salience-Aware Face Presentation Attack Detection via Deep Reinforcement Learning. 413-427 - Amanda Cristina Davi Resende, Davis Railsback, Rafael Dowsley
, Anderson C. A. Nascimento
, Diego F. Aranha
:
Fast Privacy-Preserving Text Classification Based on Secure Multiparty Computation. 428-442 - Haiwei Wu
, Jiantao Zhou
, Jinyu Tian
, Jun Liu
, Yu Qiao
:
Robust Image Forgery Detection Against Transmission Over Online Social Networks. 443-456 - Mingliang Chen
, Xin Liao
, Min Wu
:
PulseEdit: Editing Physiological Signals in Facial Videos for Privacy Protection. 457-471 - Tian Li
, Huaqun Wang
, Debiao He
, Jia Yu
:
Synchronized Provable Data Possession Based on Blockchain for Digital Twin. 472-485 - Qi Li
, Xinhao Deng
, Zhuotao Liu
, Yuan Yang, Xiaoyue Zou
, Qian Wang
, Mingwei Xu
, Jianping Wu:
Dynamic Network Security Function Enforcement via Joint Flow and Function Scheduling. 486-499 - Yukai Wang, Chunlei Peng
, Decheng Liu
, Nannan Wang
, Xinbo Gao
:
ForgeryNIR: Deep Face Forgery and Detection in Near-Infrared Scenario. 500-515 - Mingyang Zhang, Yang Xiao
, Fu Xiong, Shuai Li, Zhiguo Cao
, Zhiwen Fang
, Joey Tianyi Zhou
:
Person Re-Identification With Hierarchical Discriminative Spatial Aggregation. 516-530 - Zhihai Yang
, Qindong Sun
, Zhaoli Liu:
Three Birds With One Stone: User Intention Understanding and Influential Neighbor Disclosure for Injection Attack Detection. 531-546 - Peipeng Yu
, Jianwei Fei
, Zhihua Xia
, Zhili Zhou
, Jian Weng
:
Improving Generalization by Commonality Learning in Face Forgery Detection. 547-558 - Kejun Chen, Orlando Arias, Qingxu Deng
, Daniela Oliveira
, Xiaolong Guo
, Yier Jin
:
FineDIFT: Fine-Grained Dynamic Information Flow Tracking for Data-Flow Integrity Using Coprocessor. 559-573 - Olivier Bronchain
, François Durvaux, Loïc Masure
, François-Xavier Standaert
:
Efficient Profiled Side-Channel Analysis of Masked Implementations, Extended. 574-584 - Linsen Song
, Wayne Wu, Chen Qian, Ran He, Chen Change Loy:
Everybody's Talkin': Let Me Talk as You Want. 585-598 - Pei Peng
, Emina Soljanin:
Covert, Low-Delay, Coded Message Passing in Mobile (IoT) Networks. 599-611 - Mary Scott
, Graham Cormode, Carsten Maple:
Aggregation and Transformation of Vector-Valued Messages in the Shuffle Model of Differential Privacy. 612-627 - Onur Dizdar
, Bruno Clerckx
:
Rate-Splitting Multiple Access for Communications and Jamming in Multi-Antenna Multi-Carrier Cognitive Radio Systems. 628-643 - Long Li
, Yu Luo, Jing Yang, Lina Pu
:
Reinforcement Learning Enabled Intelligent Energy Attack in Green IoT Networks. 644-658 - Jie Li
, Camilla Hollanti:
Private and Secure Distributed Matrix Multiplication Schemes for Replicated or MDS-Coded Servers. 659-669 - Moulik Choraria
, Arpan Chattopadhyay
, Urbashi Mitra
, Erik G. Ström
:
Design of False Data Injection Attack on Distributed Process Estimation. 670-683 - Prasanna Ravi
, Shivam Bhasin
, Sujoy Sinha Roy, Anupam Chattopadhyay
:
On Exploiting Message Leakage in (Few) NIST PQC Candidates for Practical Message Recovery Attacks. 684-699 - Rafael Salema Marques
, Haider M. Al-Khateeb
, Gregory Epiphaniou
, Carsten Maple
:
APIVADS: A Novel Privacy-Preserving Pivot Attack Detection Scheme Based on Statistical Pattern Recognition. 700-715 - Baoyao Yang
, Andy Jinhua Ma
, Pong C. Yuen
:
Revealing Task-Relevant Model Memorization for Source-Protected Unsupervised Domain Adaptation. 716-731 - Xiaozhen Lu
, Liang Xiao
, Guohang Niu, Xiangyang Ji
, Qian Wang
:
Safe Exploration in Wireless Security: A Safe Reinforcement Learning Algorithm With Hierarchical Structure. 732-743 - Nimisha Limaye
, Satwik Patnaik
, Ozgur Sinanoglu
:
Valkyrie: Vulnerability Assessment Tool and Attack for Provably-Secure Logic Locking Techniques. 744-759 - Guanxiong Shen
, Junqing Zhang
, Alan Marshall
, Joseph R. Cavallaro
:
Towards Scalable and Channel-Robust Radio Frequency Fingerprint Identification for LoRa. 774-787 - Xiaohui Chen
, Zhiyu Hao, Lun Li, Lei Cui
, Yiran Zhu, Zhenquan Ding, Yongji Liu
:
CruParamer: Learning on Parameter-Augmented API Sequences for Malware Detection. 788-803 - Yanbing Ren
, Xinghua Li
, Yinbin Miao
, Bin Luo
, Jian Weng
, Kim-Kwang Raymond Choo
, Robert H. Deng
:
Towards Privacy-Preserving Spatial Distribution Crowdsensing: A Game Theoretic Approach. 804-818 - Long Zhuo, Shunquan Tan
, Bin Li
, Jiwu Huang
:
Self-Adversarial Training Incorporating Forgery Attention for Image Forgery Localization. 819-834 - Yang Xiao
, Jianping Zeng
:
Dynamically Generate Password Policy via Zipf Distribution. 835-848 - Wenjing Zhang
, Bo Jiang
, Ming Li
, Xiaodong Lin
:
Privacy-Preserving Aggregate Mobility Data Release: An Information-Theoretic Deep Reinforcement Learning Approach. 849-864 - Rizhao Cai
, Zhi Li
, Renjie Wan
, Haoliang Li
, Yongjian Hu
, Alex C. Kot
:
Learning Meta Pattern for Face Anti-Spoofing. 1201-1213 - Yanbin Wang
, Haitao Xu
, Zhenhao Guo, Zhan Qin, Kui Ren
:
snWF: Website Fingerprinting Attack by Ensembling the Snapshot of Deep Learning. 1214-1226 - Jinhua Ma
, Shengmin Xu
, Jianting Ning
, Xinyi Huang
, Robert H. Deng
:
Redactable Blockchain in Decentralized Setting. 1227-1242 - Shengjie Chen
, Zhenhua Guo
, Xiu Li
, Dongliang Yang
:
Query2Set: Single-to-Multiple Partial Fingerprint Recognition Based on Attention Mechanism. 1243-1253 - Zhuo Wang
, Qiangchang Wang
, Weihong Deng
, Guodong Guo
:
Learning Multi-Granularity Temporal Characteristics for Face Anti-Spoofing. 1254-1269 - Jin Yang
, Qishui Zhong
, Kaibo Shi
, Shouming Zhong
:
Co-Design of Observer-Based Fault Detection Filter and Dynamic Event-Triggered Controller for Wind Power System Under Dual Alterable DoS Attacks. 1270-1284 - Sekhar Rajendran, Zhi Sun
:
RF Impairment Model-Based IoT Physical-Layer Identification for Enhanced Domain Generalization. 1285-1299 - Saba Asaad
, Yifei Wu, Ali Bereyhi
, Ralf R. Müller
, Rafael F. Schaefer
, H. Vincent Poor
:
Secure Active and Passive Beamforming in IRS-Aided MIMO Systems. 1300-1315 - Rafael Padilha
, Tawfiq Salem
, Scott Workman
, Fernanda A. Andaló
, Anderson Rocha
, Nathan Jacobs:
Content-Aware Detection of Temporal Metadata Manipulation. 1316-1327 - Rémi Cogranne
, Quentin Giboulot
, Patrick Bas
:
Efficient Steganography in JPEG Images by Minimizing Performance of Optimal Detector. 1328-1343 - Ziming Yang
, Jian Liang
, Chaoyou Fu
, Mandi Luo
, Xiaoyu Zhang
:
Heterogeneous Face Recognition via Face Synthesis With Identity-Attribute Disentanglement. 1344-1358 - Yang Yang
, Yanjiao Chen
, Fei Chen
, Jing Chen
:
An Efficient Identity-Based Provable Data Possession Protocol With Compressed Cloud Storage. 1359-1371 - Yulong Tian
, Fnu Suya, Fengyuan Xu, David Evans
:
Stealthy Backdoors as Compression Artifacts. 1372-1387 - Donghyun Yu
, Ruei-Hau Hsu
, Jemin Lee
, Sungjin Lee
:
EC-SVC: Secure CAN Bus In-Vehicle Communications With Fine-Grained Access Control Based on Edge Computing. 1388-1403 - Zhihao Shen
, Shun Li, Xi Zhao
, Jianhua Zou:
MMAuth: A Continuous Authentication Framework on Smartphones Using Multiple Modalities. 1450-1465 - Xinran Li
, Chuan Qin
, Zichi Wang
, Zhenxing Qian
, Xinpeng Zhang
:
Unified Performance Evaluation Method for Perceptual Image Hashing. 1404-1419 - Haixia Chen
, Xinyi Huang
, Jianting Ning
, Futai Zhang
, Chao Lin
:
VILS: A Verifiable Image Licensing System. 1420-1434 - Weipeng Hu
, Haifeng Hu
:
Domain-Private Factor Detachment Network for NIR-VIS Face Recognition. 1435-1449 - Dayong Ye
, Sheng Shen, Tianqing Zhu
, Bo Liu
, Wanlei Zhou:
One Parameter Defense - Defending Against Data Inference Attacks via Differential Privacy. 1466-1480 - Changjie Hu
, Quanzhong Li
, Qi Zhang
, Jiayin Qin:
Security Optimization for an AF MIMO Two-Way Relay-Assisted Cognitive Radio Nonorthogonal Multiple Access Networks With SWIPT. 1481-1496 - Rizka Widyarini Purwanto
, Arindam Pal
, Alan Blair
, Sanjay Jha
:
PhishSim: Aiding Phishing Website Detection With a Feature-Free Tool. 1497-1512 - Muyi Sun
, Jian Wang, Jian Liu, Jianshu Li, Tao Chen, Zhenan Sun
:
A Unified Framework for Biphasic Facial Age Translation With Noisy-Semantic Guided Generative Adversarial Networks. 1513-1527 - Jiayu Zhang, Min Li
, Min-Jian Zhao, Xiaoyu Ji
, Wenyuan Xu:
Multi-User Beam Training and Transmission Design for Covert Millimeter-Wave Communication. 1528-1543 - Meng Pang
, Binghui Wang
, Siyu Huang
, Yiu-Ming Cheung
, Bihan Wen
:
A Unified Framework for Bidirectional Prototype Learning From Contaminated Faces Across Heterogeneous Domains. 1544-1557 - Yongzhi Wang
, Xiaoyu Zhang
, Yao Wu, Yulong Shen
:
Enhancing Leakage Prevention for MapReduce. 1558-1572 - Xiao Yang
, Mengling Liu
, Man Ho Au
, Xiapu Luo
, Qingqing Ye
:
Efficient Verifiably Encrypted ECDSA-Like Signatures and Their Applications. 1573-1582 - Bin Dai
, Chong Li
, Yingbin Liang
, Zheng Ma
, Shlomo Shamai
:
Self-Secure Capacity-Achieving Feedback Schemes of Gaussian Multiple-Access Wiretap Channels With Degraded Message Sets. 1583-1596 - Peng Jiang
, Baoqi Qiu
, Liehuang Zhu
:
Report When Malicious: Deniable and Accountable Searchable Message-Moderation System. 1597-1609 - Linfeng Liu
, Zhiyuan Xi, Jiagao Wu
, Jia Xu
:
Noise-Based-Protection Message Dissemination Method for Insecure Opportunistic Underwater Sensor Networks. 1610-1623 - Wei Cheng
, Sylvain Guilley
, Jean-Luc Danger
:
Information Leakage in Code-Based Masking: A Systematic Evaluation by Higher-Order Attacks. 1624-1638 - Zhuoran Ma
, Jianfeng Ma
, Yinbin Miao
, Yingjiu Li
, Robert H. Deng
:
ShieldFL: Mitigating Model Poisoning Attacks in Privacy-Preserving Federated Learning. 1639-1654 - Xiuli Bi
, Chao Shuai
, Bo Liu
, Bin Xiao
, Weisheng Li
, Xinbo Gao
:
Privacy-Preserving Color Image Feature Extraction by Quaternion Discrete Orthogonal Moments. 1655-1668 - Mohammad Reza Nosouhi
, Keshav Sood
, Marthie Grobler
, Robin Doss
:
Towards Spoofing Resistant Next Generation IoT Networks. 1669-1683 - Alberto Cabri
, Francesco Masulli
, Stefano Rovetta
, Grazyna Suchacka
:
A Quantum-Inspired Classifier for Early Web Bot Detection. 1684-1697 - Saeid Sahraei
, Amir Salman Avestimehr, Ramy E. Ali
:
Info-Commit: Information-Theoretic Polynomial Commitment. 1698-1708 - Yanchu Li
, Lingguang Lei
, Yuewu Wang, Jiwu Jing, Quan Zhou:
TrustSAMP: Securing Streaming Music Against Multivector Attacks on ARM Platform. 1709-1724 - Yuwei Zeng
, Zhicheng Liu, Xunxun Chen, Tianning Zang:
Hidden Path: Understanding the Intermediary in Malicious Redirections. 1725-1740 - Chenqi Kong
, Baoliang Chen
, Haoliang Li
, Shiqi Wang
, Anderson Rocha
, Sam Kwong
:
Detect and Locate: Exposing Face Manipulation by Semantic- and Noise-Level Telltales. 1741-1756 - Amish Goel
, Pierre Moulin:
Fast Locally Optimal Detection of Targeted Universal Adversarial Perturbations. 1757-1770 - Kai Zhang
, Zhe Jiang
, Jianting Ning
, Xinyi Huang
:
Subversion-Resistant and Consistent Attribute-Based Keyword Search for Secure Cloud Storage. 1771-1784 - Mehmet Emre Gursoy
, Ling Liu, Ka Ho Chow
, Stacey Truex
, Wenqi Wei
:
An Adversarial Approach to Protocol Analysis and Selection in Local Differential Privacy. 1785-1799 - Sarah A. Obead
, Hsuan-Yin Lin
, Eirik Rosnes
, Jörg Kliewer
:
Private Polynomial Function Computation for Noncolluding Coded Databases. 1800-1813 - Yuanyuan Liu
, Jiacheng Geng
, Fanhua Shang
, Weixin An
, Hongying Liu
, Qi Zhu, Wei Feng
:
Laplacian Smoothing Stochastic ADMMs With Differential Privacy Guarantees. 1814-1826 - Yujin Huang
, Chunyang Chen
:
Smart App Attack: Hacking Deep Learning Models in Android Apps. 1827-1840 - Quentin Giboulot
, Patrick Bas
, Rémi Cogranne
:
Multivariate Side-Informed Gaussian Embedding Minimizing Statistical Detectability. 1841-1854 - Navid Vafaei
, Sara Zarei
, Nasour Bagheri
, Maria Eichlseder
, Robert Primas, Hadi Soleimany
:
Statistical Effective Fault Attacks: The Other Side of the Coin. 1855-1867 - Meiyan Xiao
, Hongbo Li, Qiong Huang
, Shui Yu
, Willy Susilo
:
Attribute-Based Hierarchical Access Control With Extendable Policy. 1868-1883 - Xiao Mei Zeng
, Qing Liu
, Jing Yun Tay, Chee Lip Gan
:
Selective Staining on Non-Volatile Memory Cells for Data Retrieval. 1884-1892 - Mahdi Soleymani
, Hessam Mahdavifar
, Amir Salman Avestimehr:
Analog Secret Sharing With Applications to Private Distributed Learning. 1893-1904 - Hao Zhou
, Geng Yang
, Hua Dai
, Guoxiu Liu:
PFLF: Privacy-Preserving Federated Learning Framework for Edge Computing. 1905-1918 - Meng Zhang
, Zhuorui Wu, Jun Yan
, Rongxing Lu
, Xiaohong Guan
:
Attack-Resilient Optimal PMU Placement via Reinforcement Learning Guided Tree Search in Smart Grids. 1919-1929 - Xiaoyu Zhang, Hong Zhong
, Chunyang Fan, Irina Bolodurina, Jie Cui
:
CBACS: A Privacy-Preserving and Efficient Cache-Based Access Control Scheme for Software Defined Vehicular Networks. 1930-1945 - Shuyi Li
, Ruijun Ma
, Lunke Fei
, Bob Zhang:
Learning Compact Multirepresentation Feature Descriptor for Finger-Vein Recognition. 1946-1958 - Jiayu Zhou
, Wenjie Ding
, Wen Yang
:
A Secure Encoding Mechanism Against Deception Attacks on Multisensor Remote State Estimation. 1959-1969 - Peter Kairouz, Jiachun Liao
, Chong Huang, Maunil Vyas, Monica Welfert
, Lalitha Sankar
:
Generating Fair Universal Representations Using Adversarial Models. 1970-1985 - Fajun Sun
, Selena He
, Xiaotong Zhang, Jun Zhang
, Qingan Li, Yanxiang He
:
A Fully Authenticated Diffie-Hellman Protocol and Its Application in WSNs. 1986-1999 - Zhenzhu Chen
, Shang Wang, Anmin Fu
,