


default search action
IEEE Transactions on Information Forensics and Security, Volume 9
Volume 9, Number 1, January 2014
- Xixiang Lv, Yi Mu, Hui Li:

Non-Interactive Key Establishment for Bundle Security Protocol of Space DTNs. 5-13 - Zhenhua Chai, Zhenan Sun, Heydi Mendez Vazquez

, Ran He, Tieniu Tan:
Gabor Ordinal Measures for Face Recognition. 14-26 - Junjie Zhang, Roberto Perdisci

, Wenke Lee, Xiapu Luo
, Unum Sarfraz:
Building a Scalable System for Stealthy P2P-Botnet Detection. 27-38 - Jiantao Zhou, Xianming Liu, Oscar C. Au, Yuan Yan Tang:

Designing an Efficient Image Encryption-Then-Compression System via Prediction Error Clustering and Random Permutation. 39-50 - Jiwen Lu

, Gang Wang, Pierre Moulin:
Human Identity and Gender Recognition From Gait Sequences With Arbitrary Walking Directions. 51-61 - Pablo David Gutiérrez, Miguel Lastra

, Francisco Herrera, José Manuel Benítez
:
A High Performance Fingerprint Matching System for Large Databases Based on GPU. 62-71 - Junghwan Rhee, Ryan D. Riley

, Zhiqiang Lin
, Xuxian Jiang, Dongyan Xu:
Data-Centric OS Kernel Malware Characterization. 72-87 - Kai-Hui Lee, Pei-Ling Chiu:

Digital Image Sharing by Diverse Image Media. 88-98 - Vaibhav Rastogi, Yan Chen, Xuxian Jiang:

Catch Me If You Can: Evaluating Android Anti-Malware Against Transformation Attacks. 99-108 - Chia-Mu Yu, Guo-Kai Ni, Ing-Yi Chen, Erol Gelenbe

, Sy-Yen Kuo
:
Top-$k$ Query Result Completeness Verification in Tiered Sensor Networks. 109-124 - Andrew Chi-Chih Yao, Yunlei Zhao:

Privacy-Preserving Authenticated Key-Exchange Over Internet. 125-140
Volume 9, Number 2, February 2014
- Peng Xu, Zhiguo Ding, Xuchu Dai, Kin K. Leung:

A General Framework of Wiretap Channel With Helping Interference and State Information. 182-195 - Zhiyong Shan, Xin Wang:

Growing Grapes in Your Computer to Defend Against Malware. 196-207 - Hong Liu, Huansheng Ning

, Yan Zhang, Qingxu Xiong, Laurence T. Yang:
Role-Dependent Privacy Preservation for Secure V2G Networks in the Smart Grid. 208-220 - Steffen Schulz, Vijay Varadharajan

, Ahmad-Reza Sadeghi:
The Silence of the LANs: Efficient Leakage Resilience for IPsec VPNs. 221-232 - Xin Liu, Yiu-ming Cheung

:
Learning Multi-Boosted HMMs for Lip-Password Based Speaker Verification. 233-246 - Lifeng Wang, Nan (Jonas) Yang

, Maged Elkashlan, Phee Lep Yeoh
, Jinhong Yuan
:
Physical Layer Security of Maximal Ratio Combining in Two-Wave With Diffuse Power Fading Channels. 247-258 - Takao Murakami, Kenta Takahashi, Kanta Matsuura

:
Toward Optimal Fusion Algorithms With Security Against Wolves and Lambs in Biometrics. 259-271 - Ning Wang, Ning Zhang, T. Aaron Gulliver:

Cooperative Key Agreement for Wireless Networking: Key Rates and Practical Protocol Design. 272-284 - Jeffrey R. Paone, Patrick J. Flynn, P. Jonathon Phillips, Kevin W. Bowyer

, Richard W. Vorder Bruegge, Patrick Grother, George W. Quinn, Matthew T. Pruitt, Jason M. Grant
:
Double Trouble: Differentiating Identical Twins by Face Recognition. 285-295 - Muhammad Qasim Ali, Ehab Al-Shaer, Taghrid Samak:

Firewall Policy Reconnaissance: Techniques and Analysis. 296-308 - Bing Zeng, Jeff Siu-Kei Au-Yeung

, Shuyuan Zhu
, Moncef Gabbouj
:
Perceptual Encryption of H.264 Videos: Embedding Sign-Flips Into the Integer-Based Transforms. 309-320 - Mohamad Badra, Sherali Zeadally:

Design and Performance Analysis of a Virtual Ring Architecture for Smart Grid Privacy. 321-329
Volume 9, Number 3, March 2014
- C.-C. Jay Kuo

:
Editorial. 337-338 - Yajuan Tang, Xiapu Luo

, Qing Hui, Rocky K. C. Chang
:
Modeling the Vulnerability of Feedback-Control Based Internet Services to Low-Rate DoS Attacks. 339-353 - Erik Matlin, Motilal Agrawal, David Stoker:

Non-Invasive Recognition of Poorly Resolved Integrated Circuit Elements. 354-363 - Pietro Lovato, Manuele Bicego, Cristina Segalin

, Alessandro Perina, Nicu Sebe
, Marco Cristani:
Faved! Biometrics: Tell Me Which Image You Like and I'll Tell You Who You Are. 364-374 - Reza Soosahabi, Mort Naraghi-Pour, Dmitri D. Perkins

, Magdy A. Bayoumi:
Optimal Probabilistic Encryption for Secure Detection in Wireless Sensor Networks. 375-385 - Taha A. Khalaf

, Sang Wu Kim, Alaa E. Abdel-Hakim
:
Tradeoff Between Reliability and Security in Multiple Access Relay Networks Under Falsified Data Injection Attack. 386-396 - Javier Franco-Contreras

, Gouenou Coatrieux, Frédéric Cuppens, Nora Cuppens-Boulahia, Christian Roux:
Robust Lossless Watermarking of Relational Databases Based on Circular Histogram Modulation. 397-410 - Michael Arnold, Xiao-Ming Chen, Peter G. Baum, Ulrich Gries, Gwenaël J. Doërr

:
A Phase-Based Audio Watermarking System Robust to Acoustic Path Propagation. 411-425 - Erfan Soltanmohammadi, Mort Naraghi-Pour:

Nonparametric Density Estimation, Hypotheses Testing, and Sensor Classification in Centralized Detection. 426-435 - Bingyang Liu, Jun Bi

, Athanasios V. Vasilakos
:
Toward Incentivizing Anti-Spoofing Deployment. 436-450 - Jun Yan, Haibo He, Yan Sun:

Integrated Security Analysis on Cascading Failure in Complex Networks. 451-463 - Pedro Tome-Gonzalez, Julian Fiérrez, Rubén Vera-Rodríguez

, Mark S. Nixon
:
Soft Biometrics and Their Application in Person Recognition at a Distance. 464-475 - Heng Zhou, Lauren M. Huie, Lifeng Lai:

Secret Key Generation in the Two-Way Relay Channel With Active Attackers. 476-488 - Haojun Wu, Yong Wang, Jiwu Huang:

Identification of Electronic Disguised Voices. 489-500 - Jun-Yong Zhu

, Wei-Shi Zheng, Jian-Huang Lai, Stan Z. Li:
Matching NIR Face to VIS Face Using Transduction. 501-514 - Gang Cao, Yao Zhao, Rongrong Ni, Xuelong Li

:
Contrast Enhancement-Based Forensics in Digital Images. 515-525 - Xiangqian Wu, Youbao Tang, Wei Bu:

Offline Text-Independent Writer Identification Based on Scale Invariant Feature Transform. 526-536
Volume 9, Number 4, April 2014
- Zhuo Wei, Yongdong Wu, Robert H. Deng

, Xuhua Ding
:
A Hybrid Scheme for Authenticating Scalable Video Codestreams. 543-553 - Giovanni Chierchia, Giovanni Poggi, Carlo Sansone

, Luisa Verdoliva:
A Bayesian-MRF Approach for PRNU-Based Image Forgery Detection. 554-567 - Napa Sae-Bae, Nasir D. Memon

, Katherine Isbister, Kowsar Ahmed:
Multitouch Gesture-Based Authentication. 568-582 - Makkena Purnachandra Rao, A. N. Rajagopalan

, Guna Seetharaman:
Harnessing Motion Blur to Unveil Splicing. 583-595 - Dawen Xu

, Rangding Wang, Yun Q. Shi:
Data Hiding in Encrypted H.264/AVC Video Streams by Codeword Substitution. 596-606 - Hans Georg Schaathun:

Attacks on Kuribayashi's Fingerprinting Scheme. 607-609 - Minoru Kuribayashi

:
Simplified MAP Detector for Binary Fingerprinting Code Embedded by Spread Spectrum Watermarking Scheme. 610-623 - Chunxiao Cai, Yueming Cai, Xiangyun Zhou

, Weiwei Yang, Wendong Yang:
When Does Relay Transmission Give a More Secure Connection in Wireless Ad Hoc Networks? 624-632 - Mahmoud M. Elmesalawy

, Mostafa M. Eissa
:
New Forensic ENF Reference Database for Media Recording Authentication Based on Harmony Search Technique Using GIS and Wide Area Frequency Measurements. 633-644 - Lin Ding

, Chenhui Jin, Jie Guan, Qiuyan Wang:
Cryptanalysis of Lightweight WG-8 Stream Cipher. 645-652 - Roberto De Prisco

, Alfredo De Santis
:
On the Relation of Random Grid and Deterministic Visual Cryptography. 653-665 - Han Su, Adams Wai-Kin Kong:

A Study on Low Resolution Androgenic Hair Patterns for Criminal and Victim Identification. 666-680 - Sankardas Roy, Mauro Conti

, Sanjeev Setia, Sushil Jajodia
:
Secure Data Aggregation in Wireless Sensor Networks: Filtering out the Attacker's Impact. 681-694 - Mun-Kyu Lee:

Security Notions and Advanced Method for Human Shoulder-Surfing Resistant PIN-Entry. 695-708 - Bogdan Carbunar, Mahmudur Rahman, Jaime Ballesteros, Naphtali Rishe

, Athanasios V. Vasilakos
:
${\rm PROFIL}_{R}$: Toward Preserving Privacy and Functionality in Geosocial Networks. 709-718 - Gaojie Chen, Zhao Tian, Yu Gong, Zhi Chen, Jonathon A. Chambers:

Max-Ratio Relay Selection in Secure Buffer-Aided Cooperative Wireless Networks. 719-729
Volume 9, Number 5, May 2014
- Keren Wang, Hong Zhao, Hongxia Wang:

Video Steganalysis Against Motion Vector-Based Steganography by Adding or Subtracting One Motion Vector Value. 741-751 - Jan Kodovský, Jessica J. Fridrich:

Effect of Image Downsampling on Steganographic Security. 752-762 - Fuchun Guo

, Yi Mu, Willy Susilo
, Duncan S. Wong, Vijay Varadharajan
:
CP-ABE With Constant-Size Keys for Lightweight Devices. 763-771 - Ahmed Alahmadi, Mai Abdelhakim

, Jian Ren, Tongtong Li:
Defense Against Primary User Emulation Attacks in Cognitive Radio Networks Using Advanced Encryption Standard. 772-781 - Patrizio Campisi, Daria La Rocca

:
Brain waves for automatic biometric-based user recognition. 782-800 - Chia-Hua Lin

, Shang-Ho Tsai, Yuan-Pei Lin:
Secure Transmission Using MIMO Precoding. 801-813 - Linjie Guo, Jiangqun Ni, Yun-Qing Shi:

Uniform Embedding for Efficient JPEG Steganography. 814-825 - Nesli Erdogmus, Jean-Luc Dugelay

:
3D Assisted Face Recognition: Dealing With Expression Variations. 826-838 - Joan Enric Barceló-Lladó, Antoni Morell

, Gonzalo Seco-Granados
:
Amplify-and-Forward Compressed Sensing as a Physical-Layer Secrecy Solution in Wireless Sensor Networks. 839-850 - Daksha Yadav

, Naman Kohli
, James S. Doyle Jr., Richa Singh
, Mayank Vatsa
, Kevin W. Bowyer
:
Unraveling the Effect of Textured Contact Lenses on Iris Recognition. 851-862 - Rubén Heras Evangelio, Michael Pätzold, Ivo Keller, Thomas Sikora:

Adaptively Splitted GMM With Feedback Improvement for the Task of Background Subtraction. 863-874 - Boris Skoric, Niels de Vreede:

The Spammed Code Offset Method. 875-884
Volume 9, Number 6, June 2014
- Bin B. Zhu, Jeff Yan, Guanbo Bao, Maowei Yang, Ning Xu:

Captcha as Graphical Passwords - A New Security Primitive Based on Hard AI Problems. 891-904 - Farzad Farhadzadeh, Sviatoslav Voloshynovskiy

:
Active Content Fingerpriting. 905-920 - Le Zhang, Zhi-Hui Kong, Chip-Hong Chang

, Alessandro Cabrini, Guido Torelli:
Exploiting Process Variations and Programming Sensitivity of Phase Change Memory for Reconfigurable Physical Unclonable Functions. 921-932 - Napa Sae-Bae, Nasir D. Memon

:
Online Signature Verification on Mobile Devices. 933-947 - Pinghui Wang, Xiaohong Guan, Junzhou Zhao, Jing Tao, Tao Qin:

A New Sketch Method for Measuring Host Connection Degree Distribution. 948-960 - Saravanan Sundaresan, Robin Doss

, Selwyn Piramuthu, Wanlei Zhou
:
A Robust Grouping Proof Protocol for RFID EPC C1G2 Tags. 961-975 - Neil Zhenqiang Gong, Mario Frank, Prateek Mittal:

SybilBelief: A Semi-Supervised Learning Approach for Structure-Based Sybil Detection. 976-987 - Tian Wang, Hichem Snoussi:

Detection of Abnormal Visual Events via Global Optical Flow Orientation Histogram. 988-998 - Shize Guo, Xinjie Zhao, Fan Zhang, Tao Wang, Zhijie Jerry Shi, François-Xavier Standaert

, Chujiao Ma:
Exploiting the Incomplete Diffusion Feature: A Specialized Analytical Side-Channel Attack Against the AES and Its Application to Microcontroller Implementations. 999-1014 - Bashar A. Rajoub, Reyer Zwiggelaar:

Thermal Facial Analysis for Deception Detection. 1015-1023 - Shaoquan Jiang:

Keyless Authentication in a Noisy Model. 1024-1033
Volume 9, Number 7, July 2014
- Guang Hua

, Jonathan Goh, Vrizlynn L. L. Thing:
A Dynamic Matching Algorithm for Audio Timestamp Identification Using the ENF Criterion. 1045-1055 - Himanshu S. Bhatt, Richa Singh

, Mayank Vatsa
:
On Recognizing Faces in Videos Using Clustering-Based Re-Ranking and Fusion. 1056-1068 - Jingtang Luo, Xiaolong Yang, Jin Wang, Jie Xu, Jian Sun, Keping Long:

On a Mathematical Model for Low-Rate Shrew DDoS. 1069-1083 - Nesli Erdogmus, Sébastien Marcel

:
Spoofing Face Recognition With 3D Masks. 1084-1097 - Fuchun Guo

, Yi Mu, Willy Susilo
:
Subset Membership Encryption and Its Applications to Oblivious Transfer. 1098-1107 - Matthieu Urvoy, Dalila Goudia, Florent Autrusseau

:
Perceptual DFT Watermarking With Improved Detection and Robustness to Geometrical Distortions. 1108-1119 - Pengfei Zhu, Wangmeng Zuo, Lei Zhang

, Simon Chi-Keung Shiu
, David Zhang
:
Image Set-Based Collaborative Representation for Face Recognition. 1120-1132 - David Irakiza, Md. Enamul Karim, Vir V. Phoha

:
A Non-Interactive Dual Channel Continuous Traffic Authentication Protocol. 1133-1140 - Igor Bilogrevic, Murtuza Jadliwala, Vishal Joneja, Kübra Kalkan, Jean-Pierre Hubaux, Imad Aad:

Privacy-Preserving Optimal Meeting Location Determination on Mobile Devices. 1141-1156 - Neetesh Saxena

, Narendra S. Chaudhari
:
EasySMS: A Protocol for End-to-End Secure Transmission of SMS. 1157-1168 - Haibin Yan, Jiwen Lu

, Weihong Deng
, Xiuzhuang Zhou:
Discriminative Multimetric Learning for Kinship Verification. 1169-1178 - Wencheng Yang, Jiankun Hu

, Song Wang
:
A Delaunay Quadrangle-Based Fingerprint Authentication System With Template Protection Using Topology Code for Local Registration and Security Enhancement. 1179-1192 - Jae Hong Seo

, Keita Emura
:
Revocable Identity-Based Cryptosystem Revisited: Security Models and Constructions. 1193-1205
Volume 9, Number 8, August 2014
- Wei Fan, Kai Wang, François Cayre, Zhang Xiong:

JPEG Anti-Forensics With Improved Tradeoff Between Forensic Undetectability and Image Quality. 1211-1226 - Yang Wang, Willy Susilo

, Man Ho Au
, Guilin Wang:
Collusion-Resistance in Optimistic Fair Exchange. 1227-1239 - Huiming Wang, Feng Liu, Xiang-Gen Xia:

Joint Source-Relay Precoding and Power Allocation for Secure Amplify-and-Forward MIMO Relay Networks. 1240-1250 - Neil Zhenqiang Gong, Di Wang:

On the Security of Trustee-Based Social Authentications. 1251-1263 - Bin Li, Shunquan Tan, Ming Wang, Jiwu Huang:

Investigation on Cost Assignment in Spatial Image Steganography. 1264-1277 - Andrey Garnaev

, Melike Baykal-Gursoy
, H. Vincent Poor
:
Incorporating Attack-Type Uncertainty Into Network Protection. 1278-1287 - Ajay Kumar

:
Importance of Being Unique From Finger Dorsal Patterns: Exploring Minor Finger Knuckle Patterns in Verifying Human Identities. 1288-1298 - Fausto Galvan, Giovanni Puglisi, Arcangelo Ranieri Bruna

, Sebastiano Battiato
:
First Quantization Matrix Estimation From Double Compressed JPEG Images. 1299-1310 - Michail Tsikerdekis, Sherali Zeadally:

Multiple Account Identity Deception Detection in Social Media Using Nonverbal Behavior. 1311-1321 - Fuqing Duan, Yanchao Yang, Yan Li, Yun Tian, Ke Lu, Zhongke Wu, Mingquan Zhou:

Skull Identification via Correlation Measure Between Skull and Face Shape. 1322-1332
Volume 9, Number 9, September 2014
- Fernando Pérez-González

, Carmela Troncoso
, Simon Oya:
A Least Squares Approach to the Static Traffic Analysis of High-Latency Anonymous Communication Systems. 1341-1355 - Michael R. Clark, Kenneth M. Hopkinson:

Transferable Multiparty Computation With Applications to the Smart Grid. 1356-1366 - Hussein Moosavi

, Francis Minhthang Bui
:
A Game-Theoretic Framework for Robust Optimal Intrusion Detection in Wireless Sensor Networks. 1367-1379 - Andrea Abrardo, Mauro Barni:

A New Watermarking Scheme Based on Antipodal Binary Dirty Paper Coding. 1380-1393 - Kevin M. Carter, Nwokedi C. Idika, William W. Streilein:

Probabilistic Threat Propagation for Network Security. 1394-1405 - Shaoquan Jiang:

(Im)possibility of Deterministic Commitment Over a Discrete Memoryless Channel. 1406-1415 - Worapan Kusakunniran

:
Recognizing Gaits on Spatio-Temporal Feature Domain. 1416-1423 - Andrew D. Ker, Tomás Pevný

:
The Steganographer is the Outlier: Realistic Large-Scale Steganalysis. 1424-1435 - Stefano Berretti

, Pietro Pala
, Alberto Del Bimbo
:
Face Recognition by Super-Resolved 3D Models From Consumer Depth Cameras. 1436-1449 - Andrea Costanzo, Irene Amerini

, Roberto Caldelli
, Mauro Barni:
Forensic Analysis of SIFT Keypoint Removal and Injection. 1450-1464 - Seyyedeh Atefeh Musavi, Mehdi Kharrazi:

Back to Static Analysis for Kernel-Level Rootkit Detection. 1465-1476 - Yen-Wei Huang, Pierre Moulin:

On the Fingerprinting Capacity Games for Arbitrary Alphabets and Their Asymptotics. 1477-1490 - Xavier Rolland-Nevière, Gwenaël J. Doërr

, Pierre Alliez:
Triangle Surface Mesh Watermarking Based on a Constrained Optimization Framework. 1491-1501 - Md. Asikuzzaman

, Md. Jahangir Alam, Andrew J. Lambert
, Mark R. Pickering
:
Imperceptible and Robust Blind Video Watermarking Using Chrominance Embedding: A Set of Approaches in the DT CWT Domain. 1502-1517 - Chun-Wei Tan, Ajay Kumar:

Efficient and Accurate At-a-Distance Iris Recognition Using Geometric Key-Based Iris Encoding. 1518-1526
Volume 9, Number 10, October 2014
- Filipe de Oliveira Costa

, Marina A. Oikawa, Zanoni Dias, Siome Goldenstein, Anderson de Rezende Rocha:
Image Phylogeny Forests Reconstruction. 1533-1546 - Ning Zhang, Yali Zang

, Xin Yang, Xiaofei Jia, Jie Tian:
Adaptive Orientation Model Fitting for Latent Overlapped Fingerprints Separation. 1547-1556 - Tiziano Bianchi

, Alessandro Piva
:
TTP-Free Asymmetric Fingerprinting Based on Client Side Embedding. 1557-1568 - Jianwu Wan

, Ming Yang, Yang Gao, Yin-Juan Chen:
Pairwise Costs in Semisupervised Discriminant Analysis for Face Recognition. 1569-1580 - Wen Zhou, Zhong Zhang:

Human Action Recognition With Multiple-Instance Markov Model. 1581-1591 - Xiaotian Wu, Wei Sun:

Extended Capabilities for XOR-Based Visual Cryptography. 1592-1605 - Honghai Yu, Pierre Moulin:

Regularized Adaboost Learning for Identification of Time-Varying Content. 1606-1616 - Seong Ho Chae, Wan Choi

, Jung Hoon Lee, Tony Q. S. Quek
:
Enhanced Secrecy in Stochastic Wireless Networks: Artificial Noise With Secrecy Protected Zone. 1617-1628 - Gaurav Goswami, Mayank Vatsa

, Richa Singh
:
RGB-D Face Recognition With Texture and Attribute Features. 1629-1640 - Siavash Ahmadi, Zahra Ahmadian, Javad Mohajeri, Mohammad Reza Aref:

Low-Data Complexity Biclique Cryptanalysis of Block Ciphers With Application to Piccolo and HIGHT. 1641-1652 - Wei Wang

, Jing Dong, Tieniu Tan:
Exploring DCT Coefficient Quantization Effects for Local Tampering Detection. 1653-1666 - Kaitai Liang

, Man Ho Au
, Joseph K. Liu
, Willy Susilo
, Duncan S. Wong, Guomin Yang
, Tran Viet Xuan Phuong, Qi Xie:
A DFA-Based Functional Proxy Re-Encryption Scheme for Secure Public Cloud Data Sharing. 1667-1680 - Qing Zhang, Yilong Yin, De-Chuan Zhan, Jingliang Peng:

A Novel Serial Multimodal Biometrics Framework Based on Semisupervised Learning Techniques. 1681-1694 - Yongkun Li, John C. S. Lui:

Friends or Foes: Distributed and Randomized Algorithms to Determine Dishonest Recommenders in Online Social Networks. 1695-1707 - Stefano Tomasin

, Nicola Laurenti:
Secure HARQ With Multiple Encoding Over Block Fading Channels: Channel Set Characterization and Outage Analysis. 1708-1719 - Rafael F. Schaefer

, Holger Boche:
Robust Broadcasting of Common and Confidential Messages Over Compound Channels: Strong Secrecy and Decoding Performance. 1720-1732 - Attila Altay Yavuz

:
An Efficient Real-Time Broadcast Authentication Scheme for Command and Control Messages. 1733-1742 - Ioannis Rigas, Oleg V. Komogortsev:

Biometric Recognition via Probabilistic Spatial Projection of Eye Movement Trajectories in Dynamic Visual Environments. 1743-1754
Volume 9, Number 11, November 2014
- Marco Baldi

, Franco Chiaraluce
, Nicola Laurenti, Stefano Tomasin
, Francesco Renna
:
Secrecy Transmission on Parallel Channels: Theoretical Limits and Performance of Practical Codes. 1765-1779 - Xi Zhao, Tao Feng, Weidong Shi, Ioannis A. Kakadiaris

:
Mobile User Authentication Using Statistical Touch Dynamics Images. 1780-1789 - Zhen Xu, Cong Wang

, Kui Ren
, Lingyu Wang, Bingsheng Zhang
:
Proof-Carrying Cloud Computation: The Case of Convex Optimization. 1790-1803 - Mohsen Zareian, Hamid Reza Tohidypour:

A Novel Gain Invariant Quantization-Based Watermarking Approach. 1804-1813 - Chao Wang

, Huiming Wang:
On the Secrecy Throughput Maximization for MISO Cognitive Radio Network in Slow Fading Channels. 1814-1827 - Yuan Zhang, Min Yang, Zhemin Yang, Guofei Gu, Peng Ning, Binyu Zang:

Permission Use Analysis for Vetting Undesirable Behaviors in Android Apps. 1828-1842 - Pratik Chattopadhyay, Shamik Sural

, Jayanta Mukherjee:
Frontal Gait Recognition From Incomplete Sequences Using RGB-D Camera. 1843-1856 - Jiantao Zhou, Oscar C. Au, Guangtao Zhai, Yuan Yan Tang, Xianming Liu:

Scalable Compression of Stream Cipher Encrypted Images Through Context-Adaptive Sampling. 1857-1868 - Wei Wang, Xing Wang, Dawei Feng, Jiqiang Liu, Zhen Han, Xiangliang Zhang

:
Exploring Permission-Induced Risk in Android Applications for Malicious Application Detection. 1869-1882 - Yang Wang, Man Ho Allen Au

, Willy Susilo
:
Revisiting Optimistic Fair Exchange Based on Ring Signatures. 1883-1892 - Li Zhang, Chip-Hong Chang

:
A Pragmatic Per-Device Licensing Scheme for Hardware IP Cores on SRAM-Based FPGAs. 1893-1905 - Xiaobo Ma, Junjie Zhang, Jing Tao, Jianfeng Li, Jue Tian, Xiaohong Guan:

DNSRadar: Outsourcing Malicious Domain Detection Based on Distributed Cache-Footprints. 1906-1921 - Aythami Morales

, Raffaele Cappelli
, Miguel Angel Ferrer-Ballester
, Davide Maltoni:
Synthesis and Evaluation of High Resolution Hand-Prints. 1922-1932 - Jianquan Yang

, Jin Xie, Guopu Zhu
, Sam Kwong
, Yun-Qing Shi:
An Effective Method for Detecting Double JPEG Compression With the Same Quantization Matrix. 1933-1942 - Qiang Tang

:
Nothing is for Free: Security in Searching Shared and Encrypted Data. 1943-1952 - Yun-Fu Liu, Jing-Ming Guo, Chih-Hsien Hsia

, Sheng-Yao Su, Hua Lee:
Sample Space Dimensionality Refinement for Symmetrical Object Detection. 1953-1961 - Shigen Shen

, Hongjie Li, Risheng Han, Athanasios V. Vasilakos
, Yihan Wang, Qiying Cao
:
Differential Game-Based Strategies for Preventing Malware Propagation in Wireless Sensor Networks. 1962-1973 - Wenxiong Kang, Qiuxia Wu:

Contactless Palm Vein Recognition Using a Mutual Foreground-Based Local Binary Pattern. 1974-1985 - Jeremiah R. Barr

, Kevin W. Bowyer
, Patrick J. Flynn:
Framework for Active Clustering With Ensembles. 1986-2001 - Saeid Wahabi, Shahrzad Pouryayevali, Siddarth Hari, Dimitrios Hatzinakos:

On Evaluating ECG Biometric Systems: Session-Dependence and Body Posture. 2002-2013
Volume 9, Number 12, December 2014
- George Tzimiropoulos, Joan Alabort-i-Medina, Stefanos Zafeiriou, Maja Pantic:

Active Orientation Models for Face Alignment In-the-Wild. 2024-2034 - Xingjie Wei

, Chang-Tsun Li
, Zhen Lei, Dong Yi, Stan Z. Li:
Dynamic Image-to-Class Warping for Occluded Face Recognition. 2035-2050 - Yong Li, Jing Liu, Hanqing Lu, Songde Ma:

Learning Robust Face Representation With Classwise Block-Diagonal Structure. 2051-2062 - Massimo Tistarelli

, Yunlian Sun, Norman Poh:
On the Use of Discriminative Cohort Score Normalization for Unconstrained Face Recognition. 2063-2075 - Yi-Chen Chen, Vishal M. Patel, Rama Chellappa, P. Jonathon Phillips:

Ambiguously Labeled Learning Using Dictionaries. 2076-2088 - Giovani Chiachia, Alexandre X. Falcão

, Nicolas Pinto, Anderson Rocha, David D. Cox:
Learning Person-Specific Representations From Faces in the Wild. 2089-2099 - Shervin Rahimzadeh Arashloo

, Josef Kittler:
Class-Specific Kernel Fusion of Multiple Descriptors for Face Verification Using Multiscale Binarised Statistical Image Features. 2100-2109 - Gee-Sern Hsu

, Yu-Lun Liu, Hsiao-Chia Peng, Po-Xun Wu:
RGB-D-Based Face Reconstruction and Recognition. 2110-2118 - Suriya Gunasekar, Joydeep Ghosh, Alan C. Bovik

:
Face Detection on Distorted Images Augmented by Perceptual Quality-Aware Features. 2119-2131 - Mehran Kafai, Le An, Bir Bhanu

:
Reference Face Graph for Face Recognition. 2132-2143 - Lacey Best-Rowden, Hu Han

, Charles Otto, Brendan Klare, Anil K. Jain:
Unconstrained Face Recognition: Identifying a Person of Interest From a Media Collection. 2144-2157 - Asem M. Ali

:
A 3D-Based Pose Invariant Face Recognition at a Distance Framework. 2158-2169 - Eran Eidinger, Roee Enbar, Tal Hassner:

Age and Gender Estimation of Unfiltered Faces. 2170-2179 - Gayathri Mahalingam

, Karl Ricanek Jr., A. Midori Albert:
Investigating the Periocular-Based Face Recognition Across Gender Transformation. 2180-2192 - Syed Taha Ali, Vijay Sivaraman, Diethelm Ostry, Gene Tsudik, Sanjay K. Jha

:
Securing First-Hop Data Provenance for Bodyworn Devices Using Wireless Link Fingerprints. 2193-2204 - Arik Vartanian, Asaf Shabtai:

TM-Score: A Misuseability Weight Measure for Textual Content. 2205-2219 - Yuan Cao, Chip-Hong Chang

, Shoushun Chen:
A Cluster-Based Distributed Active Current Sensing Circuit for Hardware Trojan Detection. 2220-2231 - Cong Liu, Hefei Ling, Fuhao Zou, Lingyu Yan, Yunfei Wang, Hui Feng

, Xinyu Ou:
Kernelized Neighborhood Preserving Hashing for Social-Network-Oriented Digital Fingerprints. 2232-2247 - Scott Klum, Hu Han

, Brendan Klare, Anil K. Jain:
The FaceSketchID System: Matching Facial Composites to Mugshots. 2248-2263 - Ivana Chingovska, André Rabello dos Anjos

, Sébastien Marcel
:
Biometrics Evaluation Under Spoofing Attacks. 2264-2276 - Ahmet Emir Dirik

, Hüsrev T. Sencar, Nasir D. Memon
:
Analysis of Seam-Carving-Based Anonymization of Images Against PRNU Noise Pattern-Based Source Attribution. 2277-2290 - Yuxi Liu, Dimitrios Hatzinakos:

Earprint: Transient Evoked Otoacoustic Emission for Biometrics. 2291-2301 - Jiangshan Yu

, Guilin Wang, Yi Mu, Wei Gao:
An Efficient Generic Framework for Three-Factor Authentication With Provably Secure Instantiation. 2302-2313 - Paulo Antonio Andrade Esquef

, José Antonio Apolinário
, Luiz W. P. Biscainho
:
Edit Detection in Speech Recordings via Instantaneous Electric Network Frequency Variations. 2314-2326 - Hu Xiong

:
Cost-Effective Scalable and Anonymous Certificateless Remote Authentication Protocol. 2327-2339 - Yihai Zhu, Jun Yan, Yufei Tang, Yan Lindsay Sun, Haibo He:

Resilience Analysis of Power Grids Under the Sequential Attack. 2340-2354

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














