Search dblp for Publications

export results for "toc:db/journals/tifs/tifs15.bht:"

 download as .bib file

@article{DBLP:journals/tifs/000120,
  author       = {Hailong Zhang},
  title        = {On the Exact Relationship Between the Success Rate of Template Attack
                  and Different Parameters},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {15},
  pages        = {681--694},
  year         = {2020},
  url          = {https://doi.org/10.1109/TIFS.2019.2928506},
  doi          = {10.1109/TIFS.2019.2928506},
  timestamp    = {Thu, 06 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/000120.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/0001NT020,
  author       = {Kai Cao and
                  Dinh{-}Luan Nguyen and
                  Cori Tymoszek and
                  Anil K. Jain},
  title        = {End-to-End Latent Fingerprint Search},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {15},
  pages        = {880--894},
  year         = {2020},
  url          = {https://doi.org/10.1109/TIFS.2019.2930487},
  doi          = {10.1109/TIFS.2019.2930487},
  timestamp    = {Thu, 06 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/0001NT020.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/0001SMS020,
  author       = {Dan Lin and
                  Douglas Steiert and
                  Joshua Morris and
                  Anna Cinzia Squicciarini and
                  Jianping Fan},
  title        = {{REMIND:} Risk Estimation Mechanism for Images in Network Distribution},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {15},
  pages        = {539--552},
  year         = {2020},
  url          = {https://doi.org/10.1109/TIFS.2019.2924853},
  doi          = {10.1109/TIFS.2019.2924853},
  timestamp    = {Thu, 06 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/0001SMS020.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/0002LWW0N0020,
  author       = {Xiao Chen and
                  Chaoran Li and
                  Derui Wang and
                  Sheng Wen and
                  Jun Zhang and
                  Surya Nepal and
                  Yang Xiang and
                  Kui Ren},
  title        = {Android {HIV:} {A} Study of Repackaging Malware for Evading Machine-Learning
                  Detection},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {15},
  pages        = {987--1001},
  year         = {2020},
  url          = {https://doi.org/10.1109/TIFS.2019.2932228},
  doi          = {10.1109/TIFS.2019.2932228},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/0002LWW0N0020.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/0003FLB20,
  author       = {Na Wang and
                  Junsong Fu and
                  Jian Li and
                  Bharat K. Bhargava},
  title        = {Source-Location Privacy Protection Based on Anonymity Cloud in Wireless
                  Sensor Networks},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {15},
  pages        = {100--114},
  year         = {2020},
  url          = {https://doi.org/10.1109/TIFS.2019.2919388},
  doi          = {10.1109/TIFS.2019.2919388},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/0003FLB20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/0004F0LZX20,
  author       = {Xin Yuan and
                  Zhiyong Feng and
                  Wei Ni and
                  Ren Ping Liu and
                  J. Andrew Zhang and
                  Wenjun Xu},
  title        = {Secrecy Performance of Terrestrial Radio Links Under Collaborative
                  Aerial Eavesdropping},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {15},
  pages        = {604--619},
  year         = {2020},
  url          = {https://doi.org/10.1109/TIFS.2019.2922353},
  doi          = {10.1109/TIFS.2019.2922353},
  timestamp    = {Thu, 15 Apr 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/0004F0LZX20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/0004T20,
  author       = {Meng Sun and
                  Wee Peng Tay},
  title        = {Decentralized Detection With Robust Information Privacy Protection},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {15},
  pages        = {85--99},
  year         = {2020},
  url          = {https://doi.org/10.1109/TIFS.2019.2916650},
  doi          = {10.1109/TIFS.2019.2916650},
  timestamp    = {Thu, 06 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/0004T20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/0004T20a,
  author       = {Meng Sun and
                  Wee Peng Tay},
  title        = {On the Relationship Between Inference and Data Privacy in Decentralized
                  IoT Networks},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {15},
  pages        = {852--866},
  year         = {2020},
  url          = {https://doi.org/10.1109/TIFS.2019.2929446},
  doi          = {10.1109/TIFS.2019.2929446},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/0004T20a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/0017LL20,
  author       = {Qiang Li and
                  Chao Li and
                  Jingran Lin},
  title        = {Constant Modulus Secure Beamforming for Multicast Massive {MIMO} Wiretap
                  Channels},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {15},
  pages        = {264--275},
  year         = {2020},
  url          = {https://doi.org/10.1109/TIFS.2019.2916687},
  doi          = {10.1109/TIFS.2019.2916687},
  timestamp    = {Thu, 06 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/0017LL20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/AbdullahiWL20,
  author       = {Sani M. Abdullahi and
                  Hongxia Wang and
                  Tao Li},
  title        = {Fractal Coding-Based Robust and Alignment-Free Fingerprint Image Hashing},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {15},
  pages        = {2587--2601},
  year         = {2020},
  url          = {https://doi.org/10.1109/TIFS.2020.2971142},
  doi          = {10.1109/TIFS.2020.2971142},
  timestamp    = {Wed, 20 Mar 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tifs/AbdullahiWL20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/AbhishekTLS20,
  author       = {Nalam Venkata Abhishek and
                  Anshoo Tandon and
                  Teng Joon Lim and
                  Biplab Sikdar},
  title        = {A GLRT-Based Mechanism for Detecting Relay Misbehavior in Clustered
                  IoT Networks},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {15},
  pages        = {435--446},
  year         = {2020},
  url          = {https://doi.org/10.1109/TIFS.2019.2922262},
  doi          = {10.1109/TIFS.2019.2922262},
  timestamp    = {Tue, 18 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/AbhishekTLS20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/AdakCLB20,
  author       = {Chandranath Adak and
                  Bidyut B. Chaudhuri and
                  Chin{-}Teng Lin and
                  Michael Blumenstein},
  title        = {Intra-Variable Handwriting Inspection Reinforced With Idiosyncrasy
                  Analysis},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {15},
  pages        = {3567--3579},
  year         = {2020},
  url          = {https://doi.org/10.1109/TIFS.2020.2991833},
  doi          = {10.1109/TIFS.2020.2991833},
  timestamp    = {Thu, 06 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/AdakCLB20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/AddessoCMM20,
  author       = {Paolo Addesso and
                  Michele Cirillo and
                  Mario Di Mauro and
                  Vincenzo Matta},
  title        = {ADVoIP: Adversarial Detection of Encrypted and Concealed VoIP},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {15},
  pages        = {943--958},
  year         = {2020},
  url          = {https://doi.org/10.1109/TIFS.2019.2922398},
  doi          = {10.1109/TIFS.2019.2922398},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/AddessoCMM20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/AghaieM20,
  author       = {Anita Aghaie and
                  Amir Moradi},
  title        = {{TI-PUF:} Toward Side-Channel Resistant Physical Unclonable Functions},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {15},
  pages        = {3470--3481},
  year         = {2020},
  url          = {https://doi.org/10.1109/TIFS.2020.2986887},
  doi          = {10.1109/TIFS.2020.2986887},
  timestamp    = {Mon, 26 Oct 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tifs/AghaieM20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/AhmadC020,
  author       = {Fawad Ahmad and
                  Lee{-}Ming Cheng and
                  Asif Khan},
  title        = {Lightweight and Privacy-Preserving Template Generation for Palm-Vein-Based
                  Human Recognition},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {15},
  pages        = {184--194},
  year         = {2020},
  url          = {https://doi.org/10.1109/TIFS.2019.2917156},
  doi          = {10.1109/TIFS.2019.2917156},
  timestamp    = {Thu, 06 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/AhmadC020.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/Al-KadiMTC20,
  author       = {Osama Al{-}Kadi and
                  Nour Moustafa and
                  Benjamin P. Turnbull and
                  Kim{-}Kwang Raymond Choo},
  title        = {An Ontological Graph Identification Method for Improving Localization
                  of {IP} Prefix Hijacking in Network Systems},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {15},
  pages        = {1164--1174},
  year         = {2020},
  url          = {https://doi.org/10.1109/TIFS.2019.2936975},
  doi          = {10.1109/TIFS.2019.2936975},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/Al-KadiMTC20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/AlageliIAACC20,
  author       = {Mahmoud Alageli and
                  A{\"{\i}}ssa Ikhlef and
                  Fahad Alsifiany and
                  Mohammed A. M. Abdullah and
                  Gaojie Chen and
                  Jonathon A. Chambers},
  title        = {Optimal Downlink Transmission for Cell-Free {SWIPT} Massive {MIMO}
                  Systems With Active Eavesdropping},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {15},
  pages        = {1983--1998},
  year         = {2020},
  url          = {https://doi.org/10.1109/TIFS.2019.2954748},
  doi          = {10.1109/TIFS.2019.2954748},
  timestamp    = {Thu, 06 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/AlageliIAACC20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/AldaghriM20,
  author       = {Nasser Aldaghri and
                  Hessam Mahdavifar},
  title        = {Physical Layer Secret Key Generation in Static Environments},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {15},
  pages        = {2692--2705},
  year         = {2020},
  url          = {https://doi.org/10.1109/TIFS.2020.2974621},
  doi          = {10.1109/TIFS.2020.2974621},
  timestamp    = {Thu, 06 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/AldaghriM20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/AlhanahnahYBZTS20,
  author       = {Mohannad Alhanahnah and
                  Qiben Yan and
                  Hamid Bagheri and
                  Hao Zhou and
                  Yutaka Tsutano and
                  Witawas Srisa{-}an and
                  Xiapu Luo},
  title        = {{DINA:} Detecting Hidden Android Inter-App Communication in Dynamic
                  Loaded Code},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {15},
  pages        = {2782--2797},
  year         = {2020},
  url          = {https://doi.org/10.1109/TIFS.2020.2976556},
  doi          = {10.1109/TIFS.2020.2976556},
  timestamp    = {Thu, 06 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/AlhanahnahYBZTS20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/AliasgariSK20,
  author       = {Malihe Aliasgari and
                  Osvaldo Simeone and
                  J{\"{o}}rg Kliewer},
  title        = {Private and Secure Distributed Matrix Multiplication With Flexible
                  Communication Load},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {15},
  pages        = {2722--2734},
  year         = {2020},
  url          = {https://doi.org/10.1109/TIFS.2020.2972166},
  doi          = {10.1109/TIFS.2020.2972166},
  timestamp    = {Thu, 06 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/AliasgariSK20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/Alipour-FanidDW20,
  author       = {Amir Alipour{-}Fanid and
                  Monireh Dabaghchian and
                  Ning Wang and
                  Pu Wang and
                  Liang Zhao and
                  Kai Zeng},
  title        = {Machine Learning-Based Delay-Aware {UAV} Detection and Operation Mode
                  Identification Over Encrypted Wi-Fi Traffic},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {15},
  pages        = {2346--2360},
  year         = {2020},
  url          = {https://doi.org/10.1109/TIFS.2019.2959899},
  doi          = {10.1109/TIFS.2019.2959899},
  timestamp    = {Sun, 22 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/Alipour-FanidDW20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/AlmohriW020,
  author       = {Hussain M. J. Almohri and
                  Layne T. Watson and
                  David Evans},
  title        = {Predictability of {IP} Address Allocations for Cloud Computing Platforms},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {15},
  pages        = {500--511},
  year         = {2020},
  url          = {https://doi.org/10.1109/TIFS.2019.2924555},
  doi          = {10.1109/TIFS.2019.2924555},
  timestamp    = {Thu, 06 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/AlmohriW020.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/AlmohriWE20,
  author       = {Hussain M. J. Almohri and
                  Layne T. Watson and
                  David Evans},
  title        = {An Attack-Resilient Architecture for the Internet of Things},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {15},
  pages        = {3940--3954},
  year         = {2020},
  url          = {https://doi.org/10.1109/TIFS.2020.2994777},
  doi          = {10.1109/TIFS.2020.2994777},
  timestamp    = {Thu, 06 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/AlmohriWE20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/AlrabaeeDW20,
  author       = {Saed Alrabaee and
                  Mourad Debbabi and
                  Lingyu Wang},
  title        = {{CPA:} Accurate Cross-Platform Binary Authorship Characterization
                  Using {LDA}},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {15},
  pages        = {3051--3066},
  year         = {2020},
  url          = {https://doi.org/10.1109/TIFS.2020.2980190},
  doi          = {10.1109/TIFS.2020.2980190},
  timestamp    = {Thu, 06 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/AlrabaeeDW20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/AltinisikTS20,
  author       = {Enes Altinisik and
                  Kasim Tasdemir and
                  Husrev Taha Sencar},
  title        = {Mitigation of {H.264} and {H.265} Video Compression for Reliable {PRNU}
                  Estimation},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {15},
  pages        = {1557--1571},
  year         = {2020},
  url          = {https://doi.org/10.1109/TIFS.2019.2945190},
  doi          = {10.1109/TIFS.2019.2945190},
  timestamp    = {Mon, 26 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/AltinisikTS20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/AmeliHEY20,
  author       = {Amir Ameli and
                  Ali Hooshyar and
                  Ehab F. El{-}Saadany and
                  Amr M. Youssef},
  title        = {An Intrusion Detection Method for Line Current Differential Relays},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {15},
  pages        = {329--344},
  year         = {2020},
  url          = {https://doi.org/10.1109/TIFS.2019.2916331},
  doi          = {10.1109/TIFS.2019.2916331},
  timestamp    = {Thu, 06 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/AmeliHEY20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/AmeliSKES20,
  author       = {Amir Ameli and
                  Khaled A. Saleh and
                  Aram Kirakosyan and
                  Ehab F. El{-}Saadany and
                  Magdy M. A. Salama},
  title        = {An Intrusion Detection Method for Line Current Differential Relays
                  in Medium-Voltage {DC} Microgrids},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {15},
  pages        = {3580--3594},
  year         = {2020},
  url          = {https://doi.org/10.1109/TIFS.2020.2991892},
  doi          = {10.1109/TIFS.2020.2991892},
  timestamp    = {Thu, 06 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/AmeliSKES20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/ArafaSVP20,
  author       = {Ahmed Arafa and
                  Wonjae Shin and
                  Mojtaba Vaezi and
                  H. Vincent Poor},
  title        = {Secure Relaying in Non-Orthogonal Multiple Access: Trusted and Untrusted
                  Scenarios},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {15},
  pages        = {210--222},
  year         = {2020},
  url          = {https://doi.org/10.1109/TIFS.2019.2911162},
  doi          = {10.1109/TIFS.2019.2911162},
  timestamp    = {Tue, 11 May 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/ArafaSVP20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/AroraPC20,
  author       = {Anshul Arora and
                  Sateesh Kumar Peddoju and
                  Mauro Conti},
  title        = {PermPair: Android Malware Detection Using Permission Pairs},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {15},
  pages        = {1968--1982},
  year         = {2020},
  url          = {https://doi.org/10.1109/TIFS.2019.2950134},
  doi          = {10.1109/TIFS.2019.2950134},
  timestamp    = {Thu, 06 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/AroraPC20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/AvvaruZP20,
  author       = {S. V. Sandeep Avvaru and
                  Ziqing Zeng and
                  Keshab K. Parhi},
  title        = {Homogeneous and Heterogeneous Feed-Forward {XOR} Physical Unclonable
                  Functions},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {15},
  pages        = {2485--2498},
  year         = {2020},
  url          = {https://doi.org/10.1109/TIFS.2020.2968113},
  doi          = {10.1109/TIFS.2020.2968113},
  timestamp    = {Thu, 06 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/AvvaruZP20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/BacisVFPRS20,
  author       = {Enrico Bacis and
                  Sabrina De Capitani di Vimercati and
                  Sara Foresti and
                  Stefano Paraboschi and
                  Marco Rosa and
                  Pierangela Samarati},
  title        = {Securing Resources in Decentralized Cloud Storage},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {15},
  pages        = {286--298},
  year         = {2020},
  url          = {https://doi.org/10.1109/TIFS.2019.2916673},
  doi          = {10.1109/TIFS.2019.2916673},
  timestamp    = {Thu, 06 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/BacisVFPRS20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/BagHSR20,
  author       = {Samiran Bag and
                  Feng Hao and
                  Siamak F. Shahandashti and
                  Indranil Ghosh Ray},
  title        = {{SEAL:} Sealed-Bid Auction Without Auctioneers},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {15},
  pages        = {2042--2052},
  year         = {2020},
  url          = {https://doi.org/10.1109/TIFS.2019.2955793},
  doi          = {10.1109/TIFS.2019.2955793},
  timestamp    = {Mon, 12 Apr 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/BagHSR20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/BagheriS20,
  author       = {Sima Bagheri and
                  Alireza Shameli{-}Sendi},
  title        = {Dynamic Firewall Decomposition and Composition in the Cloud},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {15},
  pages        = {3526--3539},
  year         = {2020},
  url          = {https://doi.org/10.1109/TIFS.2020.2990786},
  doi          = {10.1109/TIFS.2020.2990786},
  timestamp    = {Fri, 11 Nov 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tifs/BagheriS20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/BajardMSZ20,
  author       = {Jean{-}Claude Bajard and
                  Paulo Martins and
                  Leonel Sousa and
                  Vincent Zucca},
  title        = {Improving the Efficiency of {SVM} Classification With {FHE}},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {15},
  pages        = {1709--1722},
  year         = {2020},
  url          = {https://doi.org/10.1109/TIFS.2019.2946097},
  doi          = {10.1109/TIFS.2019.2946097},
  timestamp    = {Mon, 20 Sep 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/BajardMSZ20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/BalakrishnanGBW20,
  author       = {Sarankumar Balakrishnan and
                  Shreya Gupta and
                  Arupjyoti Bhuyan and
                  Pu Wang and
                  Dimitrios Koutsonikolas and
                  Zhi Sun},
  title        = {Physical Layer Identification Based on Spatial-Temporal Beam Features
                  for Millimeter-Wave Wireless Networks},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {15},
  pages        = {1831--1845},
  year         = {2020},
  url          = {https://doi.org/10.1109/TIFS.2019.2948283},
  doi          = {10.1109/TIFS.2019.2948283},
  timestamp    = {Thu, 06 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/BalakrishnanGBW20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/BasuHGK20,
  author       = {Kanad Basu and
                  Suha Sabi Hussain and
                  Ujjwal Gupta and
                  Ramesh Karri},
  title        = {{COPPTCHA:} {COPPA} Tracking by Checking Hardware-Level Activity},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {15},
  pages        = {3213--3226},
  year         = {2020},
  url          = {https://doi.org/10.1109/TIFS.2020.2983287},
  doi          = {10.1109/TIFS.2020.2983287},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/BasuHGK20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/BasuKKK20,
  author       = {Kanad Basu and
                  Prashanth Krishnamurthy and
                  Farshad Khorrami and
                  Ramesh Karri},
  title        = {A Theoretical Study of Hardware Performance Counters-Based Malware
                  Detection},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {15},
  pages        = {512--525},
  year         = {2020},
  url          = {https://doi.org/10.1109/TIFS.2019.2924549},
  doi          = {10.1109/TIFS.2019.2924549},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/BasuKKK20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/BaurBSP20,
  author       = {Sebastian Baur and
                  Holger Boche and
                  Rafael F. Schaefer and
                  H. Vincent Poor},
  title        = {Secure Storage Capacity Under Rate Constraints - Continuity and Super
                  Activation},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {15},
  pages        = {959--970},
  year         = {2020},
  url          = {https://doi.org/10.1109/TIFS.2019.2929945},
  doi          = {10.1109/TIFS.2019.2929945},
  timestamp    = {Sun, 22 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/BaurBSP20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/BesserLJJ20,
  author       = {Karl{-}Ludwig Besser and
                  Pin{-}Hsun Lin and
                  Carsten R. Janda and
                  Eduard A. Jorswieck},
  title        = {Wiretap Code Design by Neural Network Autoencoders},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {15},
  pages        = {3374--3386},
  year         = {2020},
  url          = {https://doi.org/10.1109/TIFS.2019.2945619},
  doi          = {10.1109/TIFS.2019.2945619},
  timestamp    = {Thu, 06 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/BesserLJJ20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/BocheSP20,
  author       = {Holger Boche and
                  Rafael F. Schaefer and
                  H. Vincent Poor},
  title        = {Secure Communication and Identification Systems - Effective Performance
                  Evaluation on Turing Machines},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {15},
  pages        = {1013--1025},
  year         = {2020},
  url          = {https://doi.org/10.1109/TIFS.2019.2932226},
  doi          = {10.1109/TIFS.2019.2932226},
  timestamp    = {Thu, 06 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/BocheSP20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/BorealeCV20,
  author       = {Michele Boreale and
                  Fabio Corradi and
                  Cecilia Viscardi},
  title        = {Relative Privacy Threats and Learning From Anonymized Data},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {15},
  pages        = {1379--1393},
  year         = {2020},
  url          = {https://doi.org/10.1109/TIFS.2019.2937640},
  doi          = {10.1109/TIFS.2019.2937640},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/BorealeCV20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/BoudagdigueBKL20,
  author       = {Chaimae Boudagdigue and
                  Abderrahim Benslimane and
                  Abdellatif Kobbane and
                  Jiajia Liu},
  title        = {Trust Management in Industrial Internet of Things},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {15},
  pages        = {3667--3682},
  year         = {2020},
  url          = {https://doi.org/10.1109/TIFS.2020.2997179},
  doi          = {10.1109/TIFS.2020.2997179},
  timestamp    = {Tue, 21 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tifs/BoudagdigueBKL20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/BreierJHB20,
  author       = {Jakub Breier and
                  Dirmanto Jap and
                  Xiaolu Hou and
                  Shivam Bhasin},
  title        = {On Side Channel Vulnerabilities of Bit Permutations in Cryptographic
                  Algorithms},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {15},
  pages        = {1072--1085},
  year         = {2020},
  url          = {https://doi.org/10.1109/TIFS.2019.2932230},
  doi          = {10.1109/TIFS.2019.2932230},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/BreierJHB20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/BuninGPSCP20,
  author       = {Alexander Bunin and
                  Ziv Goldfeld and
                  Haim H. Permuter and
                  Shlomo Shamai Shitz and
                  Paul Cuff and
                  Pablo Piantanida},
  title        = {Key and Message Semantic-Security Over State-Dependent Channels},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {15},
  pages        = {1541--1556},
  year         = {2020},
  url          = {https://doi.org/10.1109/TIFS.2018.2853108},
  doi          = {10.1109/TIFS.2018.2853108},
  timestamp    = {Mon, 20 Sep 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/BuninGPSCP20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/ButoraF20,
  author       = {Jan Butora and
                  Jessica J. Fridrich},
  title        = {Reverse {JPEG} Compatibility Attack},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {15},
  pages        = {1444--1454},
  year         = {2020},
  url          = {https://doi.org/10.1109/TIFS.2019.2940904},
  doi          = {10.1109/TIFS.2019.2940904},
  timestamp    = {Thu, 06 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/ButoraF20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/CaoO20,
  author       = {Phuong Le Cao and
                  Tobias J. Oechtering},
  title        = {Optimal Transmit Strategies for Gaussian {MISO} Wiretap Channels},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {15},
  pages        = {829--838},
  year         = {2020},
  url          = {https://doi.org/10.1109/TIFS.2019.2929474},
  doi          = {10.1109/TIFS.2019.2929474},
  timestamp    = {Thu, 06 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/CaoO20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/CaoWDLTG20,
  author       = {Kunrui Cao and
                  Buhong Wang and
                  Haiyang Ding and
                  Tengyao Li and
                  Jiwei Tian and
                  Fengkui Gong},
  title        = {Secure Transmission Designs for {NOMA} Systems Against Internal and
                  External Eavesdropping},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {15},
  pages        = {2930--2943},
  year         = {2020},
  url          = {https://doi.org/10.1109/TIFS.2020.2980202},
  doi          = {10.1109/TIFS.2020.2980202},
  timestamp    = {Thu, 06 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/CaoWDLTG20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/CassiersS20,
  author       = {Ga{\"{e}}tan Cassiers and
                  Fran{\c{c}}ois{-}Xavier Standaert},
  title        = {Trivially and Efficiently Composing Masked Gadgets With Probe Isolating
                  Non-Interference},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {15},
  pages        = {2542--2555},
  year         = {2020},
  url          = {https://doi.org/10.1109/TIFS.2020.2971153},
  doi          = {10.1109/TIFS.2020.2971153},
  timestamp    = {Thu, 06 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/CassiersS20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/ChangGHM20,
  author       = {Donghoon Chang and
                  Surabhi Garg and
                  Munawar Hasan and
                  Sweta Mishra},
  title        = {Cancelable Multi-Biometric Approach Using Fuzzy Extractor and Novel
                  Bit-Wise Encryption},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {15},
  pages        = {3152--3167},
  year         = {2020},
  url          = {https://doi.org/10.1109/TIFS.2020.2983250},
  doi          = {10.1109/TIFS.2020.2983250},
  timestamp    = {Sun, 22 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/ChangGHM20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/ChenHLCRL20,
  author       = {Haonan Chen and
                  Guosheng Hu and
                  Zhen Lei and
                  Yaowu Chen and
                  Neil Martin Robertson and
                  Stan Z. Li},
  title        = {Attention-Based Two-Stream Convolutional Networks for Face Spoofing
                  Detection},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {15},
  pages        = {578--593},
  year         = {2020},
  url          = {https://doi.org/10.1109/TIFS.2019.2922241},
  doi          = {10.1109/TIFS.2019.2922241},
  timestamp    = {Mon, 30 Oct 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tifs/ChenHLCRL20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/ChenLFHC20,
  author       = {Changsheng Chen and
                  Mulin Li and
                  Anselmo Ferreira and
                  Jiwu Huang and
                  Rizhao Cai},
  title        = {A Copy-Proof Scheme Based on the Spectral and Spatial Barcoding Channel
                  Models},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {15},
  pages        = {1056--1071},
  year         = {2020},
  url          = {https://doi.org/10.1109/TIFS.2019.2934861},
  doi          = {10.1109/TIFS.2019.2934861},
  timestamp    = {Thu, 06 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/ChenLFHC20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/ChenTZ20,
  author       = {Juntao Chen and
                  Corinne Touati and
                  Quanyan Zhu},
  title        = {A Dynamic Game Approach to Strategic Design of Secure and Resilient
                  Infrastructure Network},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {15},
  pages        = {462--474},
  year         = {2020},
  url          = {https://doi.org/10.1109/TIFS.2019.2924130},
  doi          = {10.1109/TIFS.2019.2924130},
  timestamp    = {Thu, 06 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/ChenTZ20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/ChoY20,
  author       = {Wonwoo Cho and
                  Nam Yul Yu},
  title        = {Secure and Efficient Compressed Sensing-Based Encryption With Sparse
                  Matrices},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {15},
  pages        = {1999--2011},
  year         = {2020},
  url          = {https://doi.org/10.1109/TIFS.2019.2953383},
  doi          = {10.1109/TIFS.2019.2953383},
  timestamp    = {Sun, 22 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/ChoY20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/ChongEB20,
  author       = {Penny Chong and
                  Yuval Elovici and
                  Alexander Binder},
  title        = {User Authentication Based on Mouse Dynamics Using Deep Neural Networks:
                  {A} Comprehensive Study},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {15},
  pages        = {1086--1101},
  year         = {2020},
  url          = {https://doi.org/10.1109/TIFS.2019.2930429},
  doi          = {10.1109/TIFS.2019.2930429},
  timestamp    = {Thu, 06 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/ChongEB20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/ChowdhuryR20,
  author       = {Anurag Chowdhury and
                  Arun Ross},
  title        = {Fusing {MFCC} and {LPC} Features Using 1D Triplet {CNN} for Speaker
                  Recognition in Severely Degraded Audio Signals},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {15},
  pages        = {1616--1629},
  year         = {2020},
  url          = {https://doi.org/10.1109/TIFS.2019.2941773},
  doi          = {10.1109/TIFS.2019.2941773},
  timestamp    = {Mon, 20 Sep 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/ChowdhuryR20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/CominettiS20,
  author       = {Eduardo Lopes Cominetti and
                  Marcos A. Simpl{\'{\i}}cio Jr.},
  title        = {Fast Additive Partially Homomorphic Encryption From the Approximate
                  Common Divisor Problem},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {15},
  pages        = {2988--2998},
  year         = {2020},
  url          = {https://doi.org/10.1109/TIFS.2020.2981239},
  doi          = {10.1109/TIFS.2020.2981239},
  timestamp    = {Sun, 22 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/CominettiS20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/CozzolinoV20,
  author       = {Davide Cozzolino and
                  Luisa Verdoliva},
  title        = {Noiseprint: {A} CNN-Based Camera Model Fingerprint},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {15},
  pages        = {144--159},
  year         = {2020},
  url          = {https://doi.org/10.1109/TIFS.2019.2916364},
  doi          = {10.1109/TIFS.2019.2916364},
  timestamp    = {Sat, 05 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/CozzolinoV20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/CuiWWNY20,
  author       = {Hui Cui and
                  Zhiguo Wan and
                  Xinlei Wei and
                  Surya Nepal and
                  Xun Yi},
  title        = {Pay as You Decrypt: Decryption Outsourcing for Functional Encryption
                  Using Blockchain},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {15},
  pages        = {3227--3238},
  year         = {2020},
  url          = {https://doi.org/10.1109/TIFS.2020.2973864},
  doi          = {10.1109/TIFS.2020.2973864},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/CuiWWNY20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/CuiZZZL20,
  author       = {Jie Cui and
                  Xiaoyu Zhang and
                  Hong Zhong and
                  Jing Zhang and
                  Lu Liu},
  title        = {Extensible Conditional Privacy Protection Authentication Scheme for
                  Secure Vehicular Networks in a Multi-Cloud Environment},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {15},
  pages        = {1654--1667},
  year         = {2020},
  url          = {https://doi.org/10.1109/TIFS.2019.2946933},
  doi          = {10.1109/TIFS.2019.2946933},
  timestamp    = {Mon, 20 Sep 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/CuiZZZL20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/DEliaCPC20,
  author       = {Daniele Cono D'Elia and
                  Emilio Coppa and
                  Federico Palmaro and
                  Lorenzo Cavallaro},
  title        = {On the Dissection of Evasive Malware},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {15},
  pages        = {2750--2765},
  year         = {2020},
  url          = {https://doi.org/10.1109/TIFS.2020.2976559},
  doi          = {10.1109/TIFS.2020.2976559},
  timestamp    = {Thu, 06 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/DEliaCPC20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/DaiDCCZ020,
  author       = {Weiqi Dai and
                  Chunkai Dai and
                  Kim{-}Kwang Raymond Choo and
                  Changze Cui and
                  Deqing Zou and
                  Hai Jin},
  title        = {{SDTE:} {A} Secure Blockchain-Based Data Trading Ecosystem},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {15},
  pages        = {725--737},
  year         = {2020},
  url          = {https://doi.org/10.1109/TIFS.2019.2928256},
  doi          = {10.1109/TIFS.2019.2928256},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/DaiDCCZ020.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/DarsenaGIV20,
  author       = {Donatella Darsena and
                  Giacinto Gelli and
                  Ivan Iudice and
                  Francesco Verde},
  title        = {Design and Performance Analysis of Channel Estimators Under Pilot
                  Spoofing Attacks in Multiple-Antenna Systems},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {15},
  pages        = {3255--3269},
  year         = {2020},
  url          = {https://doi.org/10.1109/TIFS.2020.2985548},
  doi          = {10.1109/TIFS.2020.2985548},
  timestamp    = {Thu, 06 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/DarsenaGIV20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/DeeradaPRA20,
  author       = {Chonlatid Deerada and
                  Krisada Phromsuthirak and
                  Arucha Rungchokanun and
                  Vutipong Areekul},
  title        = {Progressive Focusing Algorithm for Reliable Pose Estimation of Latent
                  Fingerprints},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {15},
  pages        = {1232--1247},
  year         = {2020},
  url          = {https://doi.org/10.1109/TIFS.2019.2934865},
  doi          = {10.1109/TIFS.2019.2934865},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/DeeradaPRA20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/DengQWGDWZ20,
  author       = {Hua Deng and
                  Zheng Qin and
                  Qianhong Wu and
                  Zhenyu Guan and
                  Robert H. Deng and
                  Yujue Wang and
                  Yunya Zhou},
  title        = {Identity-Based Encryption Transformation for Flexible Sharing of Encrypted
                  Data in Public Cloud},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {15},
  pages        = {3168--3180},
  year         = {2020},
  url          = {https://doi.org/10.1109/TIFS.2020.2985532},
  doi          = {10.1109/TIFS.2020.2985532},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/DengQWGDWZ20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/DiazFRG20,
  author       = {Mois{\'{e}}s D{\'{\i}}az and
                  Miguel A. Ferrer and
                  Soodamani Ramalingam and
                  Richard M. Guest},
  title        = {Investigating the Common Authorship of Signatures by Off-Line Automatic
                  Signature Verification Without the Use of Reference Signatures},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {15},
  pages        = {487--499},
  year         = {2020},
  url          = {https://doi.org/10.1109/TIFS.2019.2924195},
  doi          = {10.1109/TIFS.2019.2924195},
  timestamp    = {Thu, 06 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/DiazFRG20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/DinL20,
  author       = {Fawad Ud Din and
                  Fabrice Labeau},
  title        = {In-Band Full-Duplex Discriminatory Channel Estimation Using {MMSE}},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {15},
  pages        = {3283--3292},
  year         = {2020},
  url          = {https://doi.org/10.1109/TIFS.2020.2986885},
  doi          = {10.1109/TIFS.2020.2986885},
  timestamp    = {Thu, 06 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/DinL20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/DingF20,
  author       = {Ni Ding and
                  Farhad Farokhi},
  title        = {Developing Non-Stochastic Privacy-Preserving Policies Using Agglomerative
                  Clustering},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {15},
  pages        = {3911--3923},
  year         = {2020},
  url          = {https://doi.org/10.1109/TIFS.2020.3002479},
  doi          = {10.1109/TIFS.2020.3002479},
  timestamp    = {Thu, 06 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/DingF20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/DingQWQYB20,
  author       = {Tao Ding and
                  Ming Qu and
                  Xiong Wu and
                  Boyu Qin and
                  Yongheng Yang and
                  Frede Blaabjerg},
  title        = {Defense Strategy for Resilient Shipboard Power Systems Considering
                  Sequential Attacks},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {15},
  pages        = {3443--3453},
  year         = {2020},
  url          = {https://doi.org/10.1109/TIFS.2019.2960657},
  doi          = {10.1109/TIFS.2019.2960657},
  timestamp    = {Sat, 05 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/DingQWQYB20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/DuHW20,
  author       = {Lingshuang Du and
                  Haifeng Hu and
                  Yongbo Wu},
  title        = {Cycle Age-Adversarial Model Based on Identity Preserving Network and
                  Transfer Learning for Cross-Age Face Recognition},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {15},
  pages        = {2241--2252},
  year         = {2020},
  url          = {https://doi.org/10.1109/TIFS.2019.2960585},
  doi          = {10.1109/TIFS.2019.2960585},
  timestamp    = {Thu, 06 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/DuHW20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/DushkuRCMR20,
  author       = {Edlira Dushku and
                  Md Masoom Rabbani and
                  Mauro Conti and
                  Luigi V. Mancini and
                  Silvio Ranise},
  title        = {{SARA:} Secure Asynchronous Remote Attestation for IoT Systems},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {15},
  pages        = {3123--3136},
  year         = {2020},
  url          = {https://doi.org/10.1109/TIFS.2020.2983282},
  doi          = {10.1109/TIFS.2020.2983282},
  timestamp    = {Thu, 06 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/DushkuRCMR20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/DuttaC20,
  author       = {Hridoy Sankar Dutta and
                  Tanmoy Chakraborty},
  title        = {Blackmarket-Driven Collusion Among Retweeters-Analysis, Detection,
                  and Characterization},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {15},
  pages        = {1935--1944},
  year         = {2020},
  url          = {https://doi.org/10.1109/TIFS.2019.2953331},
  doi          = {10.1109/TIFS.2019.2953331},
  timestamp    = {Thu, 06 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/DuttaC20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/DuttaDAC20,
  author       = {Hridoy Sankar Dutta and
                  Vishal Raj Dutta and
                  Aditya Adhikary and
                  Tanmoy Chakraborty},
  title        = {HawkesEye: Detecting Fake Retweeters Using Hawkes Process and Topic
                  Modeling},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {15},
  pages        = {2667--2678},
  year         = {2020},
  url          = {https://doi.org/10.1109/TIFS.2020.2970601},
  doi          = {10.1109/TIFS.2020.2970601},
  timestamp    = {Wed, 15 Dec 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tifs/DuttaDAC20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/ErozanHBAT20,
  author       = {Ahmet Turan Erozan and
                  Michael Hefenbrock and
                  Michael Beigl and
                  Jasmin Aghassi{-}Hagmann and
                  Mehdi Baradaran Tahoori},
  title        = {Reverse Engineering of Printed Electronics Circuits: From Imaging
                  to Netlist Extraction},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {15},
  pages        = {475--486},
  year         = {2020},
  url          = {https://doi.org/10.1109/TIFS.2019.2922237},
  doi          = {10.1109/TIFS.2019.2922237},
  timestamp    = {Thu, 06 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/ErozanHBAT20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/EsmaeilpourCK20,
  author       = {Mohammad Esmaeilpour and
                  Patrick Cardinal and
                  Alessandro Lameiras Koerich},
  title        = {A Robust Approach for Securing Audio Classification Against Adversarial
                  Attacks},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {15},
  pages        = {2147--2159},
  year         = {2020},
  url          = {https://doi.org/10.1109/TIFS.2019.2956591},
  doi          = {10.1109/TIFS.2019.2956591},
  timestamp    = {Thu, 06 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/EsmaeilpourCK20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/FanHZHCL20,
  author       = {Chun{-}I Fan and
                  Jheng{-}Jia Huang and
                  Min{-}Zhe Zhong and
                  Ruei{-}Hau Hsu and
                  Wen{-}Tsuen Chen and
                  Jemin Lee},
  title        = {ReHand: Secure Region-Based Fast Handover With User Anonymity for
                  Small Cell Networks in Mobile Communications},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {15},
  pages        = {927--942},
  year         = {2020},
  url          = {https://doi.org/10.1109/TIFS.2019.2931076},
  doi          = {10.1109/TIFS.2019.2931076},
  timestamp    = {Thu, 06 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/FanHZHCL20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/FengCLJX20,
  author       = {Jingyi Feng and
                  Hua Chen and
                  Yang Li and
                  Zhipeng Jiao and
                  Wei Xi},
  title        = {A Framework for Evaluation and Analysis on Infection Countermeasures
                  Against Fault Attacks},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {15},
  pages        = {391--406},
  year         = {2020},
  url          = {https://doi.org/10.1109/TIFS.2019.2903653},
  doi          = {10.1109/TIFS.2019.2903653},
  timestamp    = {Tue, 21 Feb 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tifs/FengCLJX20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/FengHLWC20,
  author       = {Qi Feng and
                  Debiao He and
                  Zhe Liu and
                  Huaqun Wang and
                  Kim{-}Kwang Raymond Choo},
  title        = {SecureNLP: {A} System for Multi-Party Privacy-Preserving Natural Language
                  Processing},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {15},
  pages        = {3709--3721},
  year         = {2020},
  url          = {https://doi.org/10.1109/TIFS.2020.2997134},
  doi          = {10.1109/TIFS.2020.2997134},
  timestamp    = {Thu, 06 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/FengHLWC20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/FlowersBH20,
  author       = {Bryse Flowers and
                  R. Michael Buehrer and
                  William C. Headley},
  title        = {Evaluating Adversarial Evasion Attacks in the Context of Wireless
                  Communications},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {15},
  pages        = {1102--1113},
  year         = {2020},
  url          = {https://doi.org/10.1109/TIFS.2019.2934069},
  doi          = {10.1109/TIFS.2019.2934069},
  timestamp    = {Thu, 06 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/FlowersBH20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/FormbyB20,
  author       = {David Formby and
                  Raheem Beyah},
  title        = {Temporal Execution Behavior for Host Anomaly Detection in Programmable
                  Logic Controllers},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {15},
  pages        = {1455--1469},
  year         = {2020},
  url          = {https://doi.org/10.1109/TIFS.2019.2940890},
  doi          = {10.1109/TIFS.2019.2940890},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/FormbyB20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/FroelicherTSH20,
  author       = {David Froelicher and
                  Juan Ram{\'{o}}n Troncoso{-}Pastoriza and
                  Joao Sa Sousa and
                  Jean{-}Pierre Hubaux},
  title        = {Drynx: Decentralized, Secure, Verifiable System for Statistical Queries
                  and Machine Learning on Distributed Datasets},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {15},
  pages        = {3035--3050},
  year         = {2020},
  url          = {https://doi.org/10.1109/TIFS.2020.2976612},
  doi          = {10.1109/TIFS.2020.2976612},
  timestamp    = {Wed, 15 Dec 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tifs/FroelicherTSH20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/GangwalC20,
  author       = {Ankit Gangwal and
                  Mauro Conti},
  title        = {Cryptomining Cannot Change Its Spots: Detecting Covert Cryptomining
                  Using Magnetic Side-Channel},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {15},
  pages        = {1630--1639},
  year         = {2020},
  url          = {https://doi.org/10.1109/TIFS.2019.2945171},
  doi          = {10.1109/TIFS.2019.2945171},
  timestamp    = {Tue, 16 Aug 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/GangwalC20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/GeorgeMGNAM20,
  author       = {Anjith George and
                  Zohreh Mostaani and
                  David Geissenbuhler and
                  Olegs Nikisins and
                  Andr{\'{e}} Anjos and
                  S{\'{e}}bastien Marcel},
  title        = {Biometric Face Presentation Attack Detection With Multi-Channel Convolutional
                  Neural Network},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {15},
  pages        = {42--55},
  year         = {2020},
  url          = {https://doi.org/10.1109/TIFS.2019.2916652},
  doi          = {10.1109/TIFS.2019.2916652},
  timestamp    = {Wed, 07 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tifs/GeorgeMGNAM20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/GhammamKLA20,
  author       = {Loubna Ghammam and
                  Koray Karabina and
                  Patrick Lacharme and
                  Kevin Atighehchi},
  title        = {A Cryptanalysis of Two Cancelable Biometric Schemes Based on Index-of-Max
                  Hashing},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {15},
  pages        = {2869--2880},
  year         = {2020},
  url          = {https://doi.org/10.1109/TIFS.2020.2977533},
  doi          = {10.1109/TIFS.2020.2977533},
  timestamp    = {Thu, 06 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/GhammamKLA20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/GokAA20,
  author       = {Gokhan Gok and
                  Yasar Kemal Alp and
                  Orhan Arikan},
  title        = {A New Method for Specific Emitter Identification With Results on Real
                  Radar Measurements},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {15},
  pages        = {3335--3346},
  year         = {2020},
  url          = {https://doi.org/10.1109/TIFS.2020.2988558},
  doi          = {10.1109/TIFS.2020.2988558},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/GokAA20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/GongXL20,
  author       = {Jialiang Gong and
                  Xiaodong Xu and
                  Yingke Lei},
  title        = {Unsupervised Specific Emitter Identification Method Using Radio-Frequency
                  Fingerprint Embedded InfoGAN},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {15},
  pages        = {2898--2913},
  year         = {2020},
  url          = {https://doi.org/10.1109/TIFS.2020.2978620},
  doi          = {10.1109/TIFS.2020.2978620},
  timestamp    = {Fri, 06 Aug 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/GongXL20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/GrecoPSV20,
  author       = {Antonio Greco and
                  Nicolai Petkov and
                  Alessia Saggese and
                  Mario Vento},
  title        = {AReN: {A} Deep Learning Approach for Sound Event Recognition Using
                  a Brain Inspired Representation},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {15},
  pages        = {3610--3624},
  year         = {2020},
  url          = {https://doi.org/10.1109/TIFS.2020.2994740},
  doi          = {10.1109/TIFS.2020.2994740},
  timestamp    = {Fri, 28 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/GrecoPSV20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/GuCXLV20,
  author       = {Zhifang Gu and
                  He Henry Chen and
                  Pingping Xu and
                  Yonghui Li and
                  Branka Vucetic},
  title        = {Physical Layer Authentication for Non-Coherent Massive SIMO-Enabled
                  Industrial IoT Communications},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {15},
  pages        = {3722--3733},
  year         = {2020},
  url          = {https://doi.org/10.1109/TIFS.2020.2998947},
  doi          = {10.1109/TIFS.2020.2998947},
  timestamp    = {Thu, 06 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/GuCXLV20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/GuerriniDL20,
  author       = {Fabrizio Guerrini and
                  Marco Dalai and
                  Riccardo Leonardi},
  title        = {Minimal Information Exchange for Secure Image Hash-Based Geometric
                  Transformations Estimation},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {15},
  pages        = {3482--3496},
  year         = {2020},
  url          = {https://doi.org/10.1109/TIFS.2020.2990793},
  doi          = {10.1109/TIFS.2020.2990793},
  timestamp    = {Thu, 06 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/GuerriniDL20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/GuoQGZLJW20,
  author       = {Wei Guo and
                  Su{-}Juan Qin and
                  Fei Gao and
                  Hua Zhang and
                  Wenmin Li and
                  Zhengping Jin and
                  Qiaoyan Wen},
  title        = {Comments on "Provable Multicopy Dynamic Data Possession in Cloud Computing
                  Systems"},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {15},
  pages        = {2584--2586},
  year         = {2020},
  url          = {https://doi.org/10.1109/TIFS.2020.2970591},
  doi          = {10.1109/TIFS.2020.2970591},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/GuoQGZLJW20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/GuoXLY20,
  author       = {Shangwei Guo and
                  Tao Xiang and
                  Xiaoguo Li and
                  Ying Yang},
  title        = {{PEID:} {A} Perceptually Encrypted Image Database for Visual Security
                  Evaluation},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {15},
  pages        = {1151--1163},
  year         = {2020},
  url          = {https://doi.org/10.1109/TIFS.2019.2935415},
  doi          = {10.1109/TIFS.2019.2935415},
  timestamp    = {Wed, 10 Jan 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tifs/GuoXLY20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/GuoZT20,
  author       = {Tao Guo and
                  Ruida Zhou and
                  Chao Tian},
  title        = {On the Information Leakage in Private Information Retrieval Systems},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {15},
  pages        = {2999--3012},
  year         = {2020},
  url          = {https://doi.org/10.1109/TIFS.2020.2981282},
  doi          = {10.1109/TIFS.2020.2981282},
  timestamp    = {Fri, 23 Oct 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/GuoZT20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/GuriZBE20,
  author       = {Mordechai Guri and
                  Boris Zadov and
                  Dima Bykhovsky and
                  Yuval Elovici},
  title        = {PowerHammer: Exfiltrating Data From Air-Gapped Computers Through Power
                  Lines},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {15},
  pages        = {1879--1890},
  year         = {2020},
  url          = {https://doi.org/10.1109/TIFS.2019.2952257},
  doi          = {10.1109/TIFS.2019.2952257},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/GuriZBE20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/GuriZE20,
  author       = {Mordechai Guri and
                  Boris Zadov and
                  Yuval Elovici},
  title        = {{ODINI:} Escaping Sensitive Data From Faraday-Caged, Air-Gapped Computers
                  via Magnetic Fields},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {15},
  pages        = {1190--1203},
  year         = {2020},
  url          = {https://doi.org/10.1109/TIFS.2019.2938404},
  doi          = {10.1109/TIFS.2019.2938404},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/GuriZE20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/HaddadCMC20,
  author       = {Sahar Haddad and
                  Gouenou Coatrieux and
                  Alexandre Moreau{-}Gaudry and
                  Michel Cozic},
  title        = {Joint Watermarking-Encryption-JPEG-LS for Medical Image Reliability
                  Control in Encrypted and Compressed Domains},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {15},
  pages        = {2556--2569},
  year         = {2020},
  url          = {https://doi.org/10.1109/TIFS.2020.2972159},
  doi          = {10.1109/TIFS.2020.2972159},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/HaddadCMC20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/HafemannSO20,
  author       = {Luiz G. Hafemann and
                  Robert Sabourin and
                  Luiz S. Oliveira},
  title        = {Meta-Learning for Fast Classifier Adaptation to New Users of Signature
                  Verification Systems},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {15},
  pages        = {1735--1745},
  year         = {2020},
  url          = {https://doi.org/10.1109/TIFS.2019.2949425},
  doi          = {10.1109/TIFS.2019.2949425},
  timestamp    = {Mon, 20 Sep 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/HafemannSO20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/HanCSTWW20,
  author       = {Jinguang Han and
                  Liqun Chen and
                  Steve A. Schneider and
                  Helen Treharne and
                  Stephan Wesemeyer and
                  Nick Wilson},
  title        = {Anonymous Single Sign-On With Proxy Re-Verification},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {15},
  pages        = {223--236},
  year         = {2020},
  url          = {https://doi.org/10.1109/TIFS.2019.2919926},
  doi          = {10.1109/TIFS.2019.2919926},
  timestamp    = {Sun, 06 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/HanCSTWW20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/HanSX20,
  author       = {Qian Han and
                  V. S. Subrahmanian and
                  Yanhai Xiong},
  title        = {Android Malware Detection via (Somewhat) Robust Irreversible Feature
                  Transformations},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {15},
  pages        = {3511--3525},
  year         = {2020},
  url          = {https://doi.org/10.1109/TIFS.2020.2975932},
  doi          = {10.1109/TIFS.2020.2975932},
  timestamp    = {Tue, 21 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tifs/HanSX20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/HanXHC20,
  author       = {Yunxia Han and
                  Chunxiang Xu and
                  Debiao He and
                  Kefei Chen},
  title        = {On the Security of a Key Agreement and Key Protection Scheme},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {15},
  pages        = {3293--3294},
  year         = {2020},
  url          = {https://doi.org/10.1109/TIFS.2020.2986881},
  doi          = {10.1109/TIFS.2020.2986881},
  timestamp    = {Thu, 06 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/HanXHC20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/HayashiV20,
  author       = {Masahito Hayashi and
                  {\'{A}}ngeles V{\'{a}}zquez{-}Castro},
  title        = {Physical Layer Security Protocol for Poisson Channels for Passive
                  Man-in-the-Middle Attack},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {15},
  pages        = {2295--2305},
  year         = {2020},
  url          = {https://doi.org/10.1109/TIFS.2019.2963771},
  doi          = {10.1109/TIFS.2019.2963771},
  timestamp    = {Tue, 28 Jun 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/HayashiV20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/HeBLCGR20,
  author       = {Anxiao He and
                  Kai Bu and
                  Yucong Li and
                  Eikoh Chida and
                  Qianping Gu and
                  Kui Ren},
  title        = {Atomos: Constant-Size Path Validation Proof},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {15},
  pages        = {3832--3847},
  year         = {2020},
  url          = {https://doi.org/10.1109/TIFS.2020.3001669},
  doi          = {10.1109/TIFS.2020.3001669},
  timestamp    = {Thu, 06 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/HeBLCGR20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/HeC20,
  author       = {Wenguang He and
                  Zhanchuan Cai},
  title        = {An Insight Into Pixel Value Ordering Prediction-Based Prediction-Error
                  Expansion},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {15},
  pages        = {3859--3871},
  year         = {2020},
  url          = {https://doi.org/10.1109/TIFS.2020.3002377},
  doi          = {10.1109/TIFS.2020.3002377},
  timestamp    = {Thu, 06 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/HeC20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/HeCT20,
  author       = {Junhui He and
                  Junxi Chen and
                  Shaohua Tang},
  title        = {Reversible Data Hiding in {JPEG} Images Based on Negative Influence
                  Models},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {15},
  pages        = {2121--2133},
  year         = {2020},
  url          = {https://doi.org/10.1109/TIFS.2019.2958758},
  doi          = {10.1109/TIFS.2019.2958758},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/HeCT20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/HeLSJS20,
  author       = {Ji He and
                  Jia Liu and
                  Yulong Shen and
                  Xiaohong Jiang and
                  Norio Shiratori},
  title        = {Link Selection for Security-QoS Tradeoffs in Buffer-Aided Relaying
                  Networks},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {15},
  pages        = {1347--1362},
  year         = {2020},
  url          = {https://doi.org/10.1109/TIFS.2019.2939738},
  doi          = {10.1109/TIFS.2019.2939738},
  timestamp    = {Wed, 18 Aug 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/HeLSJS20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/HeS20,
  author       = {Sheng He and
                  Lambert Schomaker},
  title        = {FragNet: Writer Identification Using Deep Fragment Networks},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {15},
  pages        = {3013--3022},
  year         = {2020},
  url          = {https://doi.org/10.1109/TIFS.2020.2981236},
  doi          = {10.1109/TIFS.2020.2981236},
  timestamp    = {Mon, 26 Oct 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tifs/HeS20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/HeW20,
  author       = {Boxiang He and
                  Fanggang Wang},
  title        = {Cooperative Specific Emitter Identification via Multiple Distorted
                  Receivers},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {15},
  pages        = {3791--3806},
  year         = {2020},
  url          = {https://doi.org/10.1109/TIFS.2020.3001721},
  doi          = {10.1109/TIFS.2020.3001721},
  timestamp    = {Thu, 06 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/HeW20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/HongJGH20,
  author       = {Yuanquan Hong and
                  Xiaojun Jing and
                  Hui Gao and
                  Yuan He},
  title        = {Fixed Region Beamforming Using Frequency Diverse Subarray for Secure
                  mmWave Wireless Communications},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {15},
  pages        = {2706--2721},
  year         = {2020},
  url          = {https://doi.org/10.1109/TIFS.2020.2969576},
  doi          = {10.1109/TIFS.2020.2969576},
  timestamp    = {Fri, 16 Sep 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/HongJGH20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/HristeaT20,
  author       = {Cristian Hristea and
                  Ferucio Laurentiu Tiplea},
  title        = {Privacy of Stateful {RFID} Systems With Constant Tag Identifiers},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {15},
  pages        = {1920--1934},
  year         = {2020},
  url          = {https://doi.org/10.1109/TIFS.2019.2953398},
  doi          = {10.1109/TIFS.2019.2953398},
  timestamp    = {Thu, 06 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/HristeaT20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/HsiaoSC20,
  author       = {Shun{-}Wen Hsiao and
                  Yeali S. Sun and
                  Meng Chang Chen},
  title        = {Hardware-Assisted {MMU} Redirection for In-Guest Monitoring and {API}
                  Profiling},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {15},
  pages        = {2402--2416},
  year         = {2020},
  url          = {https://doi.org/10.1109/TIFS.2020.2969514},
  doi          = {10.1109/TIFS.2020.2969514},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/HsiaoSC20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/HuWCMB20,
  author       = {Qin Hu and
                  Shengling Wang and
                  Xiuzhen Cheng and
                  Liran Ma and
                  Rongfang Bie},
  title        = {Solving the Crowdsourcing Dilemma Using the Zero-Determinant Strategies},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {15},
  pages        = {1778--1789},
  year         = {2020},
  url          = {https://doi.org/10.1109/TIFS.2019.2949440},
  doi          = {10.1109/TIFS.2019.2949440},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/HuWCMB20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/HuXCMFZY20,
  author       = {Guilei Hu and
                  Yang Xiao and
                  Zhiguo Cao and
                  Lubin Meng and
                  Zhiwen Fang and
                  Joey Tianyi Zhou and
                  Junsong Yuan},
  title        = {Towards Real-Time Eyeblink Detection in the Wild: Dataset, Theory
                  and Practices},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {15},
  pages        = {2194--2208},
  year         = {2020},
  url          = {https://doi.org/10.1109/TIFS.2019.2959978},
  doi          = {10.1109/TIFS.2019.2959978},
  timestamp    = {Tue, 25 May 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/HuXCMFZY20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/HuaZ20,
  author       = {Guang Hua and
                  Haijian Zhang},
  title        = {{ENF} Signal Enhancement in Audio Recordings},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {15},
  pages        = {1868--1878},
  year         = {2020},
  url          = {https://doi.org/10.1109/TIFS.2019.2952264},
  doi          = {10.1109/TIFS.2019.2952264},
  timestamp    = {Thu, 10 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/HuaZ20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/HuangH20,
  author       = {Kai Huang and
                  Yun He},
  title        = {Trigger Identification Using Difference-Amplified Controllability
                  and Dynamic Transition Probability for Hardware Trojan Detection},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {15},
  pages        = {3387--3400},
  year         = {2020},
  url          = {https://doi.org/10.1109/TIFS.2019.2946044},
  doi          = {10.1109/TIFS.2019.2946044},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/HuangH20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/HuangHGCG20,
  author       = {Zonghao Huang and
                  Rui Hu and
                  Yuanxiong Guo and
                  Eric Chan{-}Tin and
                  Yanmin Gong},
  title        = {{DP-ADMM:} ADMM-Based Distributed Learning With Differential Privacy},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {15},
  pages        = {1002--1012},
  year         = {2020},
  url          = {https://doi.org/10.1109/TIFS.2019.2931068},
  doi          = {10.1109/TIFS.2019.2931068},
  timestamp    = {Wed, 11 May 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/HuangHGCG20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/HuangLBH20,
  author       = {Yuankun Huang and
                  Bin Li and
                  Mauro Barni and
                  Jiwu Huang},
  title        = {Identification of VoIP Speech With Multiple Domain Deep Features},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {15},
  pages        = {2253--2267},
  year         = {2020},
  url          = {https://doi.org/10.1109/TIFS.2019.2960635},
  doi          = {10.1109/TIFS.2019.2960635},
  timestamp    = {Thu, 06 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/HuangLBH20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/IbrahimLSCK20,
  author       = {Mohamed Ibrahim and
                  Tung{-}Che Liang and
                  Kristin Scott and
                  Krishnendu Chakrabarty and
                  Ramesh Karri},
  title        = {Molecular Barcoding as a Defense Against Benchtop Biochemical Attacks
                  on {DNA} Fingerprinting and Information Forensics},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {15},
  pages        = {3595--3609},
  year         = {2020},
  url          = {https://doi.org/10.1109/TIFS.2020.2994742},
  doi          = {10.1109/TIFS.2020.2994742},
  timestamp    = {Thu, 06 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/IbrahimLSCK20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/ImJL20,
  author       = {Jong{-}Hyuk Im and
                  Seong{-}Yun Jeon and
                  Mun{-}Kyu Lee},
  title        = {Practical Privacy-Preserving Face Authentication for Smartphones Secure
                  Against Malicious Clients},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {15},
  pages        = {2386--2401},
  year         = {2020},
  url          = {https://doi.org/10.1109/TIFS.2020.2969513},
  doi          = {10.1109/TIFS.2020.2969513},
  timestamp    = {Thu, 06 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/ImJL20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/JatiGCSC20,
  author       = {Arpan Jati and
                  Naina Gupta and
                  Anupam Chattopadhyay and
                  Somitra Kumar Sanadhya and
                  Donghoon Chang},
  title        = {Threshold Implementations of {\textless}tt{\textgreater}GIFT{\textless}/tt{\textgreater}:
                  {A} Trade-Off Analysis},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {15},
  pages        = {2110--2120},
  year         = {2020},
  url          = {https://doi.org/10.1109/TIFS.2019.2957974},
  doi          = {10.1109/TIFS.2019.2957974},
  timestamp    = {Thu, 06 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/JatiGCSC20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/JiangXS0H20,
  author       = {Xinghao Jiang and
                  Qiang Xu and
                  Tanfeng Sun and
                  Bin Li and
                  Peisong He},
  title        = {Detection of {HEVC} Double Compression With the Same Coding Parameters
                  Based on Analysis of Intra Coding Quality Degradation Process},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {15},
  pages        = {250--263},
  year         = {2020},
  url          = {https://doi.org/10.1109/TIFS.2019.2918085},
  doi          = {10.1109/TIFS.2019.2918085},
  timestamp    = {Thu, 06 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/JiangXS0H20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/JoshiK20,
  author       = {Sharad Joshi and
                  Nitin Khanna},
  title        = {Source Printer Classification Using Printer Specific Local Texture
                  Descriptor},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {15},
  pages        = {160--171},
  year         = {2020},
  url          = {https://doi.org/10.1109/TIFS.2019.2919869},
  doi          = {10.1109/TIFS.2019.2919869},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/JoshiK20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/KangLH20,
  author       = {Jin Sung Kang and
                  Yuri A. Lawryshyn and
                  Dimitrios Hatzinakos},
  title        = {Neural Network Architecture and Transient Evoked Otoacoustic Emission
                  {(TEOAE)} Biometrics for Identification and Verification},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {15},
  pages        = {1858--1867},
  year         = {2020},
  url          = {https://doi.org/10.1109/TIFS.2019.2951310},
  doi          = {10.1109/TIFS.2019.2951310},
  timestamp    = {Thu, 02 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tifs/KangLH20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/KangLLD20,
  author       = {Wenxiong Kang and
                  Hongda Liu and
                  Wei Luo and
                  Feiqi Deng},
  title        = {Study of a Full-View 3D Finger Vein Verification Technique},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {15},
  pages        = {1175--1189},
  year         = {2020},
  url          = {https://doi.org/10.1109/TIFS.2019.2928507},
  doi          = {10.1109/TIFS.2019.2928507},
  timestamp    = {Sat, 09 Apr 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/KangLLD20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/KangS0F20,
  author       = {Jian Kang and
                  Douglas Steiert and
                  Dan Lin and
                  Yanjie Fu},
  title        = {MoveWithMe: Location Privacy Preservation for Smartphone Users},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {15},
  pages        = {711--724},
  year         = {2020},
  url          = {https://doi.org/10.1109/TIFS.2019.2928205},
  doi          = {10.1109/TIFS.2019.2928205},
  timestamp    = {Thu, 06 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/KangS0F20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/KangYGPS20,
  author       = {Heedo Kang and
                  Vinod Yegneswaran and
                  Shalini Ghosh and
                  Phillip A. Porras and
                  Seungwon Shin},
  title        = {Automated Permission Model Generation for Securing {SDN} Control-Plane},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {15},
  pages        = {1668--1682},
  year         = {2020},
  url          = {https://doi.org/10.1109/TIFS.2019.2946928},
  doi          = {10.1109/TIFS.2019.2946928},
  timestamp    = {Tue, 16 Aug 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/KangYGPS20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/KarimiTC20,
  author       = {Ali Karimi and
                  Abbas Taherpour and
                  Danijela Cabric},
  title        = {Smart Traffic-Aware Primary User Emulation Attack and Its Impact on
                  Secondary User Throughput Under Rayleigh Flat Fading Channel},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {15},
  pages        = {66--80},
  year         = {2020},
  url          = {https://doi.org/10.1109/TIFS.2019.2911168},
  doi          = {10.1109/TIFS.2019.2911168},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/KarimiTC20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/KimLOJ20,
  author       = {Miran Kim and
                  Junghye Lee and
                  Lucila Ohno{-}Machado and
                  Xiaoqian Jiang},
  title        = {Secure and Differentially Private Logistic Regression for Horizontally
                  Distributed Data},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {15},
  pages        = {695--710},
  year         = {2020},
  url          = {https://doi.org/10.1109/TIFS.2019.2925496},
  doi          = {10.1109/TIFS.2019.2925496},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/KimLOJ20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/KimS20,
  author       = {Kwang{-}Yul Kim and
                  Yoan Shin},
  title        = {Analysis on Cross-Correlation Coefficient for Survivability of Chirp
                  Spread Spectrum Systems},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {15},
  pages        = {1959--1967},
  year         = {2020},
  url          = {https://doi.org/10.1109/TIFS.2019.2953332},
  doi          = {10.1109/TIFS.2019.2953332},
  timestamp    = {Thu, 06 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/KimS20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/KimYL20,
  author       = {Minchul Kim and
                  Heecheol Yang and
                  Jungwoo Lee},
  title        = {Private Coded Matrix Multiplication},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {15},
  pages        = {1434--1443},
  year         = {2020},
  url          = {https://doi.org/10.1109/TIFS.2019.2940895},
  doi          = {10.1109/TIFS.2019.2940895},
  timestamp    = {Wed, 26 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/KimYL20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/KokulFSRP20,
  author       = {Thanikasalam Kokul and
                  Clinton Fookes and
                  Sridha Sridharan and
                  Amirthalingam Ramanan and
                  Amalka Pinidiyaarachchi},
  title        = {Target-Specific Siamese Attention Network for Real-Time Object Tracking},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {15},
  pages        = {1276--1289},
  year         = {2020},
  url          = {https://doi.org/10.1109/TIFS.2019.2935871},
  doi          = {10.1109/TIFS.2019.2935871},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/KokulFSRP20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/KrishnamurthyKK20,
  author       = {Prashanth Krishnamurthy and
                  Ramesh Karri and
                  Farshad Khorrami},
  title        = {Anomaly Detection in Real-Time Multi-Threaded Processes Using Hardware
                  Performance Counters},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {15},
  pages        = {666--680},
  year         = {2020},
  url          = {https://doi.org/10.1109/TIFS.2019.2923577},
  doi          = {10.1109/TIFS.2019.2923577},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/KrishnamurthyKK20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/KurtY020,
  author       = {Mehmet Necip Kurt and
                  Yasin Yilmaz and
                  Xiaodong Wang},
  title        = {Secure Distributed Dynamic State Estimation in Wide-Area Smart Grids},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {15},
  pages        = {800--815},
  year         = {2020},
  url          = {https://doi.org/10.1109/TIFS.2019.2928207},
  doi          = {10.1109/TIFS.2019.2928207},
  timestamp    = {Thu, 06 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/KurtY020.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/KuzuPMC20,
  author       = {Ridvan Salih Kuzu and
                  Emanuela Piciucco and
                  Emanuele Maiorana and
                  Patrizio Campisi},
  title        = {On-the-Fly Finger-Vein-Based Biometric Recognition Using Deep Neural
                  Networks},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {15},
  pages        = {2641--2654},
  year         = {2020},
  url          = {https://doi.org/10.1109/TIFS.2020.2971144},
  doi          = {10.1109/TIFS.2020.2971144},
  timestamp    = {Thu, 06 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/KuzuPMC20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/KwonKYC20,
  author       = {Hyun Kwon and
                  Yongchul Kim and
                  Hyunsoo Yoon and
                  Daeseon Choi},
  title        = {Selective Audio Adversarial Example in Evasion Attack on Speech Recognition
                  System},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {15},
  pages        = {526--538},
  year         = {2020},
  url          = {https://doi.org/10.1109/TIFS.2019.2925452},
  doi          = {10.1109/TIFS.2019.2925452},
  timestamp    = {Thu, 06 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/KwonKYC20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/KwonNLHH20,
  author       = {Hyunsoo Kwon and
                  Hyunjae Nam and
                  Sangtae Lee and
                  Changhee Hahn and
                  Junbeom Hur},
  title        = {(In-)Security of Cookies in {HTTPS:} Cookie Theft by Removing Cookie
                  Flags},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {15},
  pages        = {1204--1215},
  year         = {2020},
  url          = {https://doi.org/10.1109/TIFS.2019.2938416},
  doi          = {10.1109/TIFS.2019.2938416},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/KwonNLHH20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/LSSBC20,
  author       = {Navaneet K. L. and
                  Ravi Kiran Sarvadevabhatla and
                  Shashank Shekhar and
                  R. Venkatesh Babu and
                  Anirban Chakraborty},
  title        = {Operator-in-the-Loop Deep Sequential Multi-Camera Feature Fusion for
                  Person Re-Identification},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {15},
  pages        = {2375--2385},
  year         = {2020},
  url          = {https://doi.org/10.1109/TIFS.2019.2957701},
  doi          = {10.1109/TIFS.2019.2957701},
  timestamp    = {Tue, 25 Jul 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/LSSBC20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/LaiZJ20,
  author       = {Songxuan Lai and
                  Yecheng Zhu and
                  Lianwen Jin},
  title        = {Encoding Pathlet and {SIFT} Features With Bagged {VLAD} for Historical
                  Writer Identification},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {15},
  pages        = {3553--3566},
  year         = {2020},
  url          = {https://doi.org/10.1109/TIFS.2020.2991880},
  doi          = {10.1109/TIFS.2020.2991880},
  timestamp    = {Thu, 06 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/LaiZJ20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/LanRCC20,
  author       = {Xiaolong Lan and
                  Juanjuan Ren and
                  Qingchun Chen and
                  Lin Cai},
  title        = {Achievable Secrecy Rate Region for Buffer-Aided Multiuser {MISO} Systems},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {15},
  pages        = {3311--3324},
  year         = {2020},
  url          = {https://doi.org/10.1109/TIFS.2020.2988567},
  doi          = {10.1109/TIFS.2020.2988567},
  timestamp    = {Mon, 03 Jan 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tifs/LanRCC20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/LeeLC20,
  author       = {Kisong Lee and
                  Jin{-}Taek Lim and
                  Hyun{-}Ho Choi},
  title        = {Impact of Outdated {CSI} on the Secrecy Performance of Wireless-Powered
                  Untrusted Relay Networks},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {15},
  pages        = {1423--1433},
  year         = {2020},
  url          = {https://doi.org/10.1109/TIFS.2019.2940906},
  doi          = {10.1109/TIFS.2019.2940906},
  timestamp    = {Thu, 06 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/LeeLC20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/LejbolleNKM20,
  author       = {Aske R. Lejb{\o}lle and
                  Kamal Nasrollahi and
                  Benjamin Krogh and
                  Thomas B. Moeslund},
  title        = {Person Re-Identification Using Spatial and Layer-Wise Attention},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {15},
  pages        = {1216--1231},
  year         = {2020},
  url          = {https://doi.org/10.1109/TIFS.2019.2938870},
  doi          = {10.1109/TIFS.2019.2938870},
  timestamp    = {Sat, 05 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/LejbolleNKM20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/LetafatiKB20,
  author       = {Mehdi Letafati and
                  Ali Kuhestani and
                  Hamid Behroozi},
  title        = {Three-Hop Untrusted Relay Networks With Hardware Imperfections and
                  Channel Estimation Errors for Internet of Things},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {15},
  pages        = {2856--2868},
  year         = {2020},
  url          = {https://doi.org/10.1109/TIFS.2020.2978627},
  doi          = {10.1109/TIFS.2020.2978627},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/LetafatiKB20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/Li020,
  author       = {Quanzhong Li and
                  Liang Yang},
  title        = {Beamforming for Cooperative Secure Transmission in Cognitive Two-Way
                  Relay Networks},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {15},
  pages        = {130--143},
  year         = {2020},
  url          = {https://doi.org/10.1109/TIFS.2019.2918431},
  doi          = {10.1109/TIFS.2019.2918431},
  timestamp    = {Thu, 06 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/Li020.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/LiL20,
  author       = {Deqiang Li and
                  Qianmu Li},
  title        = {Adversarial Deep Ensemble: Evasion Attacks and Defenses for Malware
                  Detection},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {15},
  pages        = {3886--3900},
  year         = {2020},
  url          = {https://doi.org/10.1109/TIFS.2020.3003571},
  doi          = {10.1109/TIFS.2020.3003571},
  timestamp    = {Thu, 06 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/LiL20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/LiLL20,
  author       = {Xiong Li and
                  Shanpeng Liu and
                  Rongxing Lu},
  title        = {Comments on "A Public Auditing Protocol With Novel Dynamic Structure
                  for Cloud Data"},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {15},
  pages        = {2881--2883},
  year         = {2020},
  url          = {https://doi.org/10.1109/TIFS.2020.2978592},
  doi          = {10.1109/TIFS.2020.2978592},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/LiLL20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/LiPST20,
  author       = {Jing Li and
                  Yuangang Pan and
                  Yulei Sui and
                  Ivor W. Tsang},
  title        = {Secure Metric Learning via Differential Pairwise Privacy},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {15},
  pages        = {3640--3652},
  year         = {2020},
  url          = {https://doi.org/10.1109/TIFS.2020.2997183},
  doi          = {10.1109/TIFS.2020.2997183},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/LiPST20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/LiTWLH20,
  author       = {Zhihang Li and
                  Xu Tang and
                  Xiang Wu and
                  Jingtuo Liu and
                  Ran He},
  title        = {Progressively Refined Face Detection Through Semantics-Enriched Representation
                  Learning},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {15},
  pages        = {1394--1406},
  year         = {2020},
  url          = {https://doi.org/10.1109/TIFS.2019.2941800},
  doi          = {10.1109/TIFS.2019.2941800},
  timestamp    = {Fri, 26 Jan 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tifs/LiTWLH20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/LiXFWZ20,
  author       = {Xinyu Li and
                  Jing Xu and
                  Xiong Fan and
                  Yuchen Wang and
                  Zhenfeng Zhang},
  title        = {Puncturable Signatures and Applications in Proof-of-Stake Blockchain
                  Protocols},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {15},
  pages        = {3872--3885},
  year         = {2020},
  url          = {https://doi.org/10.1109/TIFS.2020.3001738},
  doi          = {10.1109/TIFS.2020.3001738},
  timestamp    = {Tue, 04 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/LiXFWZ20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/LiXWYYH20,
  author       = {Shaohua Li and
                  Kaiping Xue and
                  David S. L. Wei and
                  Hao Yue and
                  Nenghai Yu and
                  Peilin Hong},
  title        = {SecGrid: {A} Secure and Efficient SGX-Enabled Smart Grid System With
                  Rich Functionalities},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {15},
  pages        = {1318--1330},
  year         = {2020},
  url          = {https://doi.org/10.1109/TIFS.2019.2938875},
  doi          = {10.1109/TIFS.2019.2938875},
  timestamp    = {Thu, 21 Dec 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tifs/LiXWYYH20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/LiY0AZ020,
  author       = {Donghe Li and
                  Qingyu Yang and
                  Wei Yu and
                  Dou An and
                  Yang Zhang and
                  Wei Zhao},
  title        = {Towards Differential Privacy-Based Online Double Auction for Smart
                  Grid},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {15},
  pages        = {971--986},
  year         = {2020},
  url          = {https://doi.org/10.1109/TIFS.2019.2932911},
  doi          = {10.1109/TIFS.2019.2932911},
  timestamp    = {Thu, 06 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/LiY0AZ020.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/Liang0L20,
  author       = {Yuan Liang and
                  Jian Ren and
                  Tongtong Li},
  title        = {Secure {OFDM} System Design and Capacity Analysis Under Disguised
                  Jamming},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {15},
  pages        = {738--752},
  year         = {2020},
  url          = {https://doi.org/10.1109/TIFS.2019.2929449},
  doi          = {10.1109/TIFS.2019.2929449},
  timestamp    = {Thu, 06 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/Liang0L20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/LiangL20,
  author       = {Yuan Liang and
                  Tongtong Li},
  title        = {On the Discreteness of the Worst Jamming Distribution for {SP-OFDM}},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {15},
  pages        = {2884--2897},
  year         = {2020},
  url          = {https://doi.org/10.1109/TIFS.2020.2978616},
  doi          = {10.1109/TIFS.2020.2978616},
  timestamp    = {Thu, 06 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/LiangL20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/LiangLCJXY20,
  author       = {Hongliang Liang and
                  Mingyu Li and
                  Yixiu Chen and
                  Lin Jiang and
                  Zhuosi Xie and
                  Tianqi Yang},
  title        = {Establishing Trusted {I/O} Paths for {SGX} Client Systems With Aurora},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {15},
  pages        = {1589--1600},
  year         = {2020},
  url          = {https://doi.org/10.1109/TIFS.2019.2945621},
  doi          = {10.1109/TIFS.2019.2945621},
  timestamp    = {Wed, 22 Jun 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/LiangLCJXY20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/LimPXC20,
  author       = {Hoon Wei Lim and
                  Geong Sen Poh and
                  Jia Xu and
                  Varsha Chittawar},
  title        = {\emph{PrivateLink}: Privacy-Preserving Integration and Sharing of
                  Datasets},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {15},
  pages        = {564--577},
  year         = {2020},
  url          = {https://doi.org/10.1109/TIFS.2019.2924201},
  doi          = {10.1109/TIFS.2019.2924201},
  timestamp    = {Thu, 06 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/LimPXC20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/LimSJ20,
  author       = {Sehee Lim and
                  Byungkyu Song and
                  Seong{-}Ook Jung},
  title        = {Highly Independent MTJ-Based {PUF} System Using Diode-Connected Transistor
                  and Two-Step Postprocessing for Improved Response Stability},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {15},
  pages        = {2798--2807},
  year         = {2020},
  url          = {https://doi.org/10.1109/TIFS.2020.2976623},
  doi          = {10.1109/TIFS.2020.2976623},
  timestamp    = {Thu, 06 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/LimSJ20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/LimcharoenKN20,
  author       = {Piya Limcharoen and
                  Nirattaya Khamsemanan and
                  Cholwich Nattee},
  title        = {View-Independent Gait Recognition Using Joint Replacement Coordinates
                  (JRCs) and Convolutional Neural Network},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {15},
  pages        = {3430--3442},
  year         = {2020},
  url          = {https://doi.org/10.1109/TIFS.2020.2985535},
  doi          = {10.1109/TIFS.2020.2985535},
  timestamp    = {Mon, 03 Jan 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tifs/LimcharoenKN20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/LinHHKC20,
  author       = {Chao Lin and
                  Debiao He and
                  Xinyi Huang and
                  Muhammad Khurram Khan and
                  Kim{-}Kwang Raymond Choo},
  title        = {{DCAP:} {A} Secure and Efficient Decentralized Conditional Anonymous
                  Payment System Based on Blockchain},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {15},
  pages        = {2440--2452},
  year         = {2020},
  url          = {https://doi.org/10.1109/TIFS.2020.2969565},
  doi          = {10.1109/TIFS.2020.2969565},
  timestamp    = {Thu, 24 Feb 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tifs/LinHHKC20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/LiuCLSQ20,
  author       = {Lin Liu and
                  Rongmao Chen and
                  Ximeng Liu and
                  Jinshu Su and
                  Linbo Qiao},
  title        = {Towards Practical Privacy-Preserving Decision Tree Training and Evaluation
                  in the Cloud},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {15},
  pages        = {2914--2929},
  year         = {2020},
  url          = {https://doi.org/10.1109/TIFS.2020.2980192},
  doi          = {10.1109/TIFS.2020.2980192},
  timestamp    = {Sun, 21 Jan 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tifs/LiuCLSQ20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/LiuGYK20,
  author       = {Xiaofeng Liu and
                  Zhenhua Guo and
                  Jane You and
                  B. V. K. Vijaya Kumar},
  title        = {Dependency-Aware Attention Control for Image Set-Based Face Recognition},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {15},
  pages        = {1501--1512},
  year         = {2020},
  url          = {https://doi.org/10.1109/TIFS.2019.2938418},
  doi          = {10.1109/TIFS.2019.2938418},
  timestamp    = {Mon, 20 Sep 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/LiuGYK20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/LiuK20,
  author       = {Xudong Liu and
                  Sang Wu Kim},
  title        = {Harnessing Node Multiplicity for Detecting and Mitigating False Data
                  in Wireless Relay Networks},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {15},
  pages        = {3067--3078},
  year         = {2020},
  url          = {https://doi.org/10.1109/TIFS.2020.2980199},
  doi          = {10.1109/TIFS.2020.2980199},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/LiuK20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/LiuLH20,
  author       = {Xiang Liu and
                  Teng Joon Lim and
                  Jie Huang},
  title        = {Optimal Byzantine Attacker Identification Based on Game Theory in
                  Network Coding Enabled Wireless Ad Hoc Networks},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {15},
  pages        = {2570--2583},
  year         = {2020},
  url          = {https://doi.org/10.1109/TIFS.2020.2972129},
  doi          = {10.1109/TIFS.2020.2972129},
  timestamp    = {Thu, 19 Jan 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tifs/LiuLH20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/LiuLLS20,
  author       = {Rang Liu and
                  Ming Li and
                  Qian Liu and
                  A. Lee Swindlehurst},
  title        = {Secure Symbol-Level Precoding in {MU-MISO} Wiretap Systems},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {15},
  pages        = {3359--3373},
  year         = {2020},
  url          = {https://doi.org/10.1109/TIFS.2020.2988127},
  doi          = {10.1109/TIFS.2020.2988127},
  timestamp    = {Sun, 12 Nov 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tifs/LiuLLS20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/LiuLSZL20,
  author       = {Yang Liu and
                  Ting Liu and
                  Hong Sun and
                  Kehuan Zhang and
                  Pengfei Liu},
  title        = {Hidden Electricity Theft by Exploiting Multiple-Pricing Scheme in
                  Smart Grids},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {15},
  pages        = {2453--2468},
  year         = {2020},
  url          = {https://doi.org/10.1109/TIFS.2020.2965276},
  doi          = {10.1109/TIFS.2020.2965276},
  timestamp    = {Thu, 06 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/LiuLSZL20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/MaJZTP20,
  author       = {Fei Ma and
                  Xiao{-}Yuan Jing and
                  Xiao Zhu and
                  Zhenmin Tang and
                  Zhiping Peng},
  title        = {True-Color and Grayscale Video Person Re-Identification},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {15},
  pages        = {115--129},
  year         = {2020},
  url          = {https://doi.org/10.1109/TIFS.2019.2917160},
  doi          = {10.1109/TIFS.2019.2917160},
  timestamp    = {Mon, 26 Oct 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tifs/MaJZTP20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/MandelliBVT20,
  author       = {Sara Mandelli and
                  Paolo Bestagini and
                  Luisa Verdoliva and
                  Stefano Tubaro},
  title        = {Facing Device Attribution Problem for Stabilized Video Sequences},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {15},
  pages        = {14--27},
  year         = {2020},
  url          = {https://doi.org/10.1109/TIFS.2019.2918644},
  doi          = {10.1109/TIFS.2019.2918644},
  timestamp    = {Thu, 06 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/MandelliBVT20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/MaternRS20,
  author       = {Falko Matern and
                  Christian Riess and
                  Marc Stamminger},
  title        = {Gradient-Based Illumination Description for Image Forgery Detection},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {15},
  pages        = {1303--1317},
  year         = {2020},
  url          = {https://doi.org/10.1109/TIFS.2019.2935913},
  doi          = {10.1109/TIFS.2019.2935913},
  timestamp    = {Thu, 06 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/MaternRS20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/MatkowskiCK20,
  author       = {Wojciech Michal Matkowski and
                  Tingting Chai and
                  Adams Wai{-}Kin Kong},
  title        = {Palmprint Recognition in Uncontrolled and Uncooperative Environment},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {15},
  pages        = {1601--1615},
  year         = {2020},
  url          = {https://doi.org/10.1109/TIFS.2019.2945183},
  doi          = {10.1109/TIFS.2019.2945183},
  timestamp    = {Tue, 26 Jan 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tifs/MatkowskiCK20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/MayerS20,
  author       = {Owen Mayer and
                  Matthew C. Stamm},
  title        = {Forensic Similarity for Digital Images},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {15},
  pages        = {1331--1346},
  year         = {2020},
  url          = {https://doi.org/10.1109/TIFS.2019.2924552},
  doi          = {10.1109/TIFS.2019.2924552},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/MayerS20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/MingZCLYZ20,
  author       = {Jingdian Ming and
                  Yongbin Zhou and
                  Wei Cheng and
                  Huizhong Li and
                  Guang Yang and
                  Qian Zhang},
  title        = {Mind the Balance: Revealing the Vulnerabilities in Low Entropy Masking
                  Schemes},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {15},
  pages        = {3694--3708},
  year         = {2020},
  url          = {https://doi.org/10.1109/TIFS.2020.2994775},
  doi          = {10.1109/TIFS.2020.2994775},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/MingZCLYZ20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/MirandaKBGK20,
  author       = {Christian Miranda and
                  Georges Kaddoum and
                  Elias Bou{-}Harb and
                  Sahil Garg and
                  Kuljeet Kaur},
  title        = {A Collaborative Security Framework for Software-Defined Wireless Sensor
                  Networks},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {15},
  pages        = {2602--2615},
  year         = {2020},
  url          = {https://doi.org/10.1109/TIFS.2020.2973875},
  doi          = {10.1109/TIFS.2020.2973875},
  timestamp    = {Tue, 16 Aug 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/MirandaKBGK20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/MutanganaT20,
  author       = {Jean de Dieu Mutangana and
                  Ravi Tandon},
  title        = {Blind {MIMO} Cooperative Jamming: Secrecy via {ISI} Heterogeneity
                  Without {CSIT}},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {15},
  pages        = {447--461},
  year         = {2020},
  url          = {https://doi.org/10.1109/TIFS.2019.2923340},
  doi          = {10.1109/TIFS.2019.2923340},
  timestamp    = {Thu, 06 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/MutanganaT20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/NaghizadehL20,
  author       = {Parinaz Naghizadeh and
                  Mingyan Liu},
  title        = {Using Private and Public Assessments in Security Information Sharing
                  Agreements},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {15},
  pages        = {1801--1814},
  year         = {2020},
  url          = {https://doi.org/10.1109/TIFS.2019.2950125},
  doi          = {10.1109/TIFS.2019.2950125},
  timestamp    = {Thu, 06 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/NaghizadehL20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/NathBBR20,
  author       = {Atul Prasad Deb Nath and
                  Srivalli Boddupalli and
                  Swarup Bhunia and
                  Sandip Ray},
  title        = {Resilient System-on-Chip Designs With NoC Fabrics},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {15},
  pages        = {2808--2823},
  year         = {2020},
  url          = {https://doi.org/10.1109/TIFS.2020.2977534},
  doi          = {10.1109/TIFS.2020.2977534},
  timestamp    = {Thu, 06 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/NathBBR20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/Nieto20,
  author       = {Ana Nieto},
  title        = {Becoming {JUDAS:} Correlating Users and Devices During a Digital Investigation},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {15},
  pages        = {3325--3334},
  year         = {2020},
  url          = {https://doi.org/10.1109/TIFS.2020.2988602},
  doi          = {10.1109/TIFS.2020.2988602},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/Nieto20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/OsorioAO20,
  author       = {Diana Pamela Moya Osorio and
                  Hirley Alves and
                  Edgar Eduardo Benitez Olivo},
  title        = {On the Secrecy Performance and Power Allocation in Relaying Networks
                  With Untrusted Relay in the Partial Secrecy Regime},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {15},
  pages        = {2268--2281},
  year         = {2020},
  url          = {https://doi.org/10.1109/TIFS.2019.2959920},
  doi          = {10.1109/TIFS.2019.2959920},
  timestamp    = {Thu, 06 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/OsorioAO20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/PalaniswamyCFP20,
  author       = {Basker Palaniswamy and
                  Seyit Camtepe and
                  Ernest Foo and
                  Josef Pieprzyk},
  title        = {An Efficient Authentication Scheme for Intra-Vehicular Controller
                  Area Network},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {15},
  pages        = {3107--3122},
  year         = {2020},
  url          = {https://doi.org/10.1109/TIFS.2020.2983285},
  doi          = {10.1109/TIFS.2020.2983285},
  timestamp    = {Thu, 06 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/PalaniswamyCFP20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/PangCWL20,
  author       = {Meng Pang and
                  Yiu{-}Ming Cheung and
                  Binghui Wang and
                  Jian Lou},
  title        = {Synergistic Generic Learning for Face Recognition From a Contaminated
                  Single Sample per Person},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {15},
  pages        = {195--209},
  year         = {2020},
  url          = {https://doi.org/10.1109/TIFS.2019.2919950},
  doi          = {10.1109/TIFS.2019.2919950},
  timestamp    = {Thu, 03 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/PangCWL20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/PapadamouGXSZCT20,
  author       = {Kostantinos Papadamou and
                  Steven Gevers and
                  Christos Xenakis and
                  Michael Sirivianos and
                  Savvas Zannettou and
                  Bogdan Chifor and
                  Sorin Teican and
                  George Gugulea and
                  Alberto Caponi and
                  Annamaria Recupero and
                  Claudio Pisa and
                  Giuseppe Bianchi},
  title        = {Killing the Password and Preserving Privacy With Device-Centric and
                  Attribute-Based Authentication},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {15},
  pages        = {2183--2193},
  year         = {2020},
  url          = {https://doi.org/10.1109/TIFS.2019.2958763},
  doi          = {10.1109/TIFS.2019.2958763},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/PapadamouGXSZCT20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/PengW0G20,
  author       = {Chunlei Peng and
                  Nannan Wang and
                  Jie Li and
                  Xinbo Gao},
  title        = {Face Sketch Synthesis in the Wild via Deep Patch Representation-Based
                  Probabilistic Graphical Model},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {15},
  pages        = {172--183},
  year         = {2020},
  url          = {https://doi.org/10.1109/TIFS.2019.2916633},
  doi          = {10.1109/TIFS.2019.2916633},
  timestamp    = {Mon, 20 Sep 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/PengW0G20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/PintoGFCPR20,
  author       = {Allan da Silva Pinto and
                  Siome Goldenstein and
                  Alexandre M. Ferreira and
                  Tiago J. Carvalho and
                  H{\'{e}}lio Pedrini and
                  Anderson Rocha},
  title        = {Leveraging Shape, Reflectance and Albedo From Shading for Face Presentation
                  Attack Detection},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {15},
  pages        = {3347--3358},
  year         = {2020},
  url          = {https://doi.org/10.1109/TIFS.2020.2988168},
  doi          = {10.1109/TIFS.2020.2988168},
  timestamp    = {Fri, 24 Feb 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tifs/PintoGFCPR20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/PraseedT20,
  author       = {Amit Praseed and
                  P. Santhi Thilagam},
  title        = {Multiplexed Asymmetric Attacks: Next-Generation DDoS on {HTTP/2} Servers},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {15},
  pages        = {1790--1800},
  year         = {2020},
  url          = {https://doi.org/10.1109/TIFS.2019.2950121},
  doi          = {10.1109/TIFS.2019.2950121},
  timestamp    = {Thu, 06 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/PraseedT20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/QinLWLGG20,
  author       = {Tao Qin and
                  Zhaoli Liu and
                  Pinghui Wang and
                  Shancang Li and
                  Xiaohong Guan and
                  Lixin Gao},
  title        = {Symmetry Degree Measurement and its Applications to Anomaly Detection},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {15},
  pages        = {1040--1055},
  year         = {2020},
  url          = {https://doi.org/10.1109/TIFS.2019.2933731},
  doi          = {10.1109/TIFS.2019.2933731},
  timestamp    = {Mon, 29 Jan 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tifs/QinLWLGG20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/RassouliG20,
  author       = {Borzoo Rassouli and
                  Deniz G{\"{u}}nd{\"{u}}z},
  title        = {Optimal Utility-Privacy Trade-Off With Total Variation Distance as
                  a Privacy Measure},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {15},
  pages        = {594--603},
  year         = {2020},
  url          = {https://doi.org/10.1109/TIFS.2019.2903658},
  doi          = {10.1109/TIFS.2019.2903658},
  timestamp    = {Thu, 06 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/RassouliG20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/RassouliRG20,
  author       = {Borzoo Rassouli and
                  Fernando E. Rosas and
                  Deniz G{\"{u}}nd{\"{u}}z},
  title        = {Data Disclosure Under Perfect Sample Privacy},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {15},
  pages        = {2012--2025},
  year         = {2020},
  url          = {https://doi.org/10.1109/TIFS.2019.2954652},
  doi          = {10.1109/TIFS.2019.2954652},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/RassouliRG20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/RavivK20,
  author       = {Netanel Raviv and
                  David A. Karpuk},
  title        = {Private Polynomial Computation From Lagrange Encoding},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {15},
  pages        = {553--563},
  year         = {2020},
  url          = {https://doi.org/10.1109/TIFS.2019.2925723},
  doi          = {10.1109/TIFS.2019.2925723},
  timestamp    = {Thu, 06 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/RavivK20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/RenLGZL20,
  author       = {Chuan{-}Xian Ren and
                  Bo{-}Hua Liang and
                  Pengfei Ge and
                  Yiming Zhai and
                  Zhen Lei},
  title        = {Domain Adaptive Person Re-Identification via Camera Style Generation
                  and Label Propagation},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {15},
  pages        = {1290--1302},
  year         = {2020},
  url          = {https://doi.org/10.1109/TIFS.2019.2939750},
  doi          = {10.1109/TIFS.2019.2939750},
  timestamp    = {Sun, 12 Nov 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tifs/RenLGZL20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/SahaJRCBM20,
  author       = {Sayandeep Saha and
                  Dirmanto Jap and
                  Debapriya Basu Roy and
                  Avik Chakraborty and
                  Shivam Bhasin and
                  Debdeep Mukhopadhyay},
  title        = {A Framework to Counter Statistical Ineffective Fault Analysis of Block
                  Ciphers Using Domain Transformation and Error Correction},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {15},
  pages        = {1905--1919},
  year         = {2020},
  url          = {https://doi.org/10.1109/TIFS.2019.2952262},
  doi          = {10.1109/TIFS.2019.2952262},
  timestamp    = {Sun, 22 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/SahaJRCBM20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/SalamatianHBCM20,
  author       = {Salman Salamatian and
                  Wasim Huleihel and
                  Ahmad Beirami and
                  Asaf Cohen and
                  Muriel M{\'{e}}dard},
  title        = {Centralized vs Decentralized Targeted Brute-Force Attacks: Guessing
                  With Side-Information},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {15},
  pages        = {3749--3759},
  year         = {2020},
  url          = {https://doi.org/10.1109/TIFS.2020.2998949},
  doi          = {10.1109/TIFS.2020.2998949},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/SalamatianHBCM20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/SaxenaCCC20,
  author       = {Neetesh Saxena and
                  Mauro Conti and
                  Kim{-}Kwang Raymond Choo and
                  Narendra S. Chaudhari},
  title        = {{BAS-VAS:} {A} Novel Secure Protocol for Value Added Service Delivery
                  to Mobile Devices},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {15},
  pages        = {1470--1485},
  year         = {2020},
  url          = {https://doi.org/10.1109/TIFS.2019.2940908},
  doi          = {10.1109/TIFS.2019.2940908},
  timestamp    = {Thu, 21 Jan 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tifs/SaxenaCCC20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/ScherhagRMB20,
  author       = {Ulrich Scherhag and
                  Christian Rathgeb and
                  Johannes Merkle and
                  Christoph Busch},
  title        = {Deep Face Representations for Differential Morphing Attack Detection},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {15},
  pages        = {3625--3639},
  year         = {2020},
  url          = {https://doi.org/10.1109/TIFS.2020.2994750},
  doi          = {10.1109/TIFS.2020.2994750},
  timestamp    = {Thu, 27 Jul 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/ScherhagRMB20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/SehaH20,
  author       = {Sherif Nagib Abbas Seha and
                  Dimitrios Hatzinakos},
  title        = {EEG-Based Human Recognition Using Steady-State AEPs and Subject-Unique
                  Spatial Filters},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {15},
  pages        = {3901--3910},
  year         = {2020},
  url          = {https://doi.org/10.1109/TIFS.2020.3001729},
  doi          = {10.1109/TIFS.2020.3001729},
  timestamp    = {Thu, 06 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/SehaH20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/ShamsabadiGHC20,
  author       = {Ali Shahin Shamsabadi and
                  Adri{\`{a}} Gasc{\'{o}}n and
                  Hamed Haddadi and
                  Andrea Cavallaro},
  title        = {PrivEdge: From Local to Distributed Private Training and Prediction},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {15},
  pages        = {3819--3831},
  year         = {2020},
  url          = {https://doi.org/10.1109/TIFS.2020.2988132},
  doi          = {10.1109/TIFS.2020.2988132},
  timestamp    = {Thu, 06 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/ShamsabadiGHC20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/ShaoCZW20,
  author       = {Guo{-}lin Shao and
                  Xingshu Chen and
                  Xuemei Zeng and
                  Lina Wang},
  title        = {Deep Learning Hierarchical Representation From Heterogeneous Flow-Level
                  Communication Data},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {15},
  pages        = {1525--1540},
  year         = {2020},
  url          = {https://doi.org/10.1109/TIFS.2019.2943236},
  doi          = {10.1109/TIFS.2019.2943236},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/ShaoCZW20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/SharifzadehAS20,
  author       = {Mehdi Sharifzadeh and
                  Mohammed Aloraini and
                  Dan Schonfeld},
  title        = {Adaptive Batch Size Image Merging Steganography and Quantized Gaussian
                  Image Steganography},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {15},
  pages        = {867--879},
  year         = {2020},
  url          = {https://doi.org/10.1109/TIFS.2019.2929441},
  doi          = {10.1109/TIFS.2019.2929441},
  timestamp    = {Thu, 06 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/SharifzadehAS20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/ShenXXXZ20,
  author       = {Zhexian Shen and
                  Kui Xu and
                  Xiaochen Xia and
                  Wei Xie and
                  Dongmei Zhang},
  title        = {Spatial Sparsity Based Secure Transmission Strategy for Massive {MIMO}
                  Systems Against Simultaneous Jamming and Eavesdropping},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {15},
  pages        = {3760--3774},
  year         = {2020},
  url          = {https://doi.org/10.1109/TIFS.2020.3002386},
  doi          = {10.1109/TIFS.2020.3002386},
  timestamp    = {Wed, 22 Jun 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/ShenXXXZ20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/Shim20,
  author       = {Kyung{-}Ah Shim},
  title        = {Comments on "Revocable and Scalable Certificateless Remote Authentication
                  Protocol With Anonymity for Wireless Body Area Networks"},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {15},
  pages        = {81--82},
  year         = {2020},
  url          = {https://doi.org/10.1109/TIFS.2018.2871761},
  doi          = {10.1109/TIFS.2018.2871761},
  timestamp    = {Thu, 06 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/Shim20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/ShimK20,
  author       = {Kyung{-}Ah Shim and
                  Namhun Koo},
  title        = {Algebraic Fault Analysis of {UOV} and Rainbow With the Leakage of
                  Random Vinegar Values},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {15},
  pages        = {2429--2439},
  year         = {2020},
  url          = {https://doi.org/10.1109/TIFS.2020.2969555},
  doi          = {10.1109/TIFS.2020.2969555},
  timestamp    = {Fri, 09 Apr 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/ShimK20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/SiabiB20,
  author       = {Babak Siabi and
                  Mehdi Berenjkoub},
  title        = {Comments on "Unconditionally Secure, Universally Composable Privacy
                  Preserving Linear Algebra"},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {15},
  pages        = {83--84},
  year         = {2020},
  url          = {https://doi.org/10.1109/TIFS.2019.2912068},
  doi          = {10.1109/TIFS.2019.2912068},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/SiabiB20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/SironeS20,
  author       = {Deepak Sirone and
                  Pramod Subramanyan},
  title        = {Functional Analysis Attacks on Logic Locking},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {15},
  pages        = {2514--2527},
  year         = {2020},
  url          = {https://doi.org/10.1109/TIFS.2020.2968183},
  doi          = {10.1109/TIFS.2020.2968183},
  timestamp    = {Thu, 06 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/SironeS20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/SoltaniGTH20,
  author       = {Ramin Soltani and
                  Dennis Goeckel and
                  Don Towsley and
                  Amir Houmansadr},
  title        = {Fundamental Limits of Invisible Flow Fingerprinting},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {15},
  pages        = {345--360},
  year         = {2020},
  url          = {https://doi.org/10.1109/TIFS.2019.2919870},
  doi          = {10.1109/TIFS.2019.2919870},
  timestamp    = {Thu, 06 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/SoltaniGTH20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/Song00SLJG20,
  author       = {Bo Song and
                  Xu Wang and
                  Wei Ni and
                  Yurong Song and
                  Ren Ping Liu and
                  Guoping Jiang and
                  Y. Jay Guo},
  title        = {Reliability Analysis of Large-Scale Adaptive Weighted Networks},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {15},
  pages        = {651--665},
  year         = {2020},
  url          = {https://doi.org/10.1109/TIFS.2019.2926193},
  doi          = {10.1109/TIFS.2019.2926193},
  timestamp    = {Thu, 06 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/Song00SLJG20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/SongLWL20,
  author       = {Haina Song and
                  Tao Luo and
                  Xun Wang and
                  Jianfeng Li},
  title        = {Multiple Sensitive Values-Oriented Personalized Privacy Preservation
                  Based on Randomized Response},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {15},
  pages        = {2209--2224},
  year         = {2020},
  url          = {https://doi.org/10.1109/TIFS.2019.2959911},
  doi          = {10.1109/TIFS.2019.2959911},
  timestamp    = {Tue, 29 Dec 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tifs/SongLWL20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/SongWT20,
  author       = {Yang Song and
                  Chong Xiao Wang and
                  Wee Peng Tay},
  title        = {Compressive Privacy for a Linear Dynamical System},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {15},
  pages        = {895--910},
  year         = {2020},
  url          = {https://doi.org/10.1109/TIFS.2019.2930366},
  doi          = {10.1109/TIFS.2019.2930366},
  timestamp    = {Fri, 29 Apr 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/SongWT20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/Suarez-TangilEP20,
  author       = {Guillermo Suarez{-}Tangil and
                  Matthew Edwards and
                  Claudia Peersman and
                  Gianluca Stringhini and
                  Awais Rashid and
                  Monica T. Whitty},
  title        = {Automatically Dismantling Online Dating Fraud},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {15},
  pages        = {1128--1137},
  year         = {2020},
  url          = {https://doi.org/10.1109/TIFS.2019.2930479},
  doi          = {10.1109/TIFS.2019.2930479},
  timestamp    = {Fri, 09 Apr 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/Suarez-TangilEP20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/SubramaniHANM20,
  author       = {Kiruba Sankaran Subramani and
                  Noha M. Helal and
                  Angelos Antonopoulos and
                  Aria Nosratinia and
                  Yiorgos Makris},
  title        = {Amplitude-Modulating Analog/RF Hardware Trojans in Wireless Networks:
                  Risks and Remedies},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {15},
  pages        = {3497--3510},
  year         = {2020},
  url          = {https://doi.org/10.1109/TIFS.2020.2990792},
  doi          = {10.1109/TIFS.2020.2990792},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/SubramaniHANM20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/SunCTF20,
  author       = {Liang Sun and
                  Lu Cao and
                  Zhiyao Tang and
                  Yong Feng},
  title        = {Artificial-Noise-Aided Secure Multi-User Multi-Antenna Transmission
                  With Quantized {CSIT:} {A} Comprehensive Design and Analysis},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {15},
  pages        = {3734--3748},
  year         = {2020},
  url          = {https://doi.org/10.1109/TIFS.2020.2998942},
  doi          = {10.1109/TIFS.2020.2998942},
  timestamp    = {Thu, 06 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/SunCTF20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/SunLCD20,
  author       = {Yi Sun and
                  Qian Liu and
                  Xingyuan Chen and
                  Xuehui Du},
  title        = {An Adaptive Authenticated Data Structure With Privacy-Preserving for
                  Big Data Stream in Cloud},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {15},
  pages        = {3295--3310},
  year         = {2020},
  url          = {https://doi.org/10.1109/TIFS.2020.2986879},
  doi          = {10.1109/TIFS.2020.2986879},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/SunLCD20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/SunSCHK20,
  author       = {Wenyun Sun and
                  Yu Song and
                  Changsheng Chen and
                  Jiwu Huang and
                  Alex C. Kot},
  title        = {Face Spoofing Detection Based on Local Ternary Label Supervision in
                  Fully Convolutional Networks},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {15},
  pages        = {3181--3196},
  year         = {2020},
  url          = {https://doi.org/10.1109/TIFS.2020.2985530},
  doi          = {10.1109/TIFS.2020.2985530},
  timestamp    = {Thu, 06 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/SunSCHK20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/SunTSST20,
  author       = {Yunlian Sun and
                  Jinhui Tang and
                  Xiangbo Shu and
                  Zhenan Sun and
                  Massimo Tistarelli},
  title        = {Facial Age Synthesis With Label Distribution-Guided Generative Adversarial
                  Network},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {15},
  pages        = {2679--2691},
  year         = {2020},
  url          = {https://doi.org/10.1109/TIFS.2020.2975921},
  doi          = {10.1109/TIFS.2020.2975921},
  timestamp    = {Tue, 08 Mar 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tifs/SunTSST20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/SunTST20,
  author       = {Yunlian Sun and
                  Jinhui Tang and
                  Zhenan Sun and
                  Massimo Tistarelli},
  title        = {Facial Age and Expression Synthesis Using Ordinal Ranking Adversarial
                  Networks},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {15},
  pages        = {2960--2972},
  year         = {2020},
  url          = {https://doi.org/10.1109/TIFS.2020.2980792},
  doi          = {10.1109/TIFS.2020.2980792},
  timestamp    = {Tue, 08 Mar 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tifs/SunTST20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/TahmasbiB20,
  author       = {Mehrdad Tahmasbi and
                  Matthieu R. Bloch},
  title        = {Covert Secret Key Generation With an Active Warden},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {15},
  pages        = {1026--1039},
  year         = {2020},
  url          = {https://doi.org/10.1109/TIFS.2019.2932906},
  doi          = {10.1109/TIFS.2019.2932906},
  timestamp    = {Thu, 06 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/TahmasbiB20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/TajeddineWH20,
  author       = {Razane Tajeddine and
                  Antonia Wachter{-}Zeh and
                  Camilla Hollanti},
  title        = {Private Information Retrieval Over Random Linear Networks},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {15},
  pages        = {790--799},
  year         = {2020},
  url          = {https://doi.org/10.1109/TIFS.2019.2928483},
  doi          = {10.1109/TIFS.2019.2928483},
  timestamp    = {Thu, 06 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/TajeddineWH20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/TanK20,
  author       = {Hanzhuo Tan and
                  Ajay Kumar},
  title        = {Towards More Accurate Contactless Fingerprint Minutiae Extraction
                  and Pose-Invariant Matching},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {15},
  pages        = {3924--3937},
  year         = {2020},
  url          = {https://doi.org/10.1109/TIFS.2020.3001732},
  doi          = {10.1109/TIFS.2020.3001732},
  timestamp    = {Thu, 06 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/TanK20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/TanLWX20,
  author       = {Xinrui Tan and
                  Hongjia Li and
                  Liming Wang and
                  Zhen Xu},
  title        = {Comments on "Dropping Activation Outputs with Localized First-Layer
                  Deep Network for Enhancing User Privacy and Data Security"},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {15},
  pages        = {3938--3939},
  year         = {2020},
  url          = {https://doi.org/10.1109/TIFS.2020.2988156},
  doi          = {10.1109/TIFS.2020.2988156},
  timestamp    = {Sun, 31 Dec 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tifs/TanLWX20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/TaspinarMM20,
  author       = {Samet Taspinar and
                  Manoranjan Mohanty and
                  Nasir D. Memon},
  title        = {Camera Fingerprint Extraction via Spatial Domain Averaged Frames},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {15},
  pages        = {3270--3282},
  year         = {2020},
  url          = {https://doi.org/10.1109/TIFS.2020.2985544},
  doi          = {10.1109/TIFS.2020.2985544},
  timestamp    = {Thu, 06 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/TaspinarMM20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/TestaBM20,
  author       = {Matteo Testa and
                  Tiziano Bianchi and
                  Enrico Magli},
  title        = {Secrecy Analysis of Finite-Precision Compressive Cryptosystems},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {15},
  pages        = {1--13},
  year         = {2020},
  url          = {https://doi.org/10.1109/TIFS.2019.2918089},
  doi          = {10.1109/TIFS.2019.2918089},
  timestamp    = {Thu, 06 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/TestaBM20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/TolosanaGBO20,
  author       = {Ruben Tolosana and
                  Marta Gomez{-}Barrero and
                  Christoph Busch and
                  Javier Ortega{-}Garcia},
  title        = {Biometric Presentation Attack Detection: Beyond the Visible Spectrum},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {15},
  pages        = {1261--1275},
  year         = {2020},
  url          = {https://doi.org/10.1109/TIFS.2019.2934867},
  doi          = {10.1109/TIFS.2019.2934867},
  timestamp    = {Mon, 06 Nov 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tifs/TolosanaGBO20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/TolosanaVFO20,
  author       = {Ruben Tolosana and
                  Rub{\'{e}}n Vera{-}Rodr{\'{\i}}guez and
                  Julian Fi{\'{e}}rrez and
                  Javier Ortega{-}Garcia},
  title        = {BioTouchPass2: Touchscreen Password Biometrics Using Time-Aligned
                  Recurrent Neural Networks},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {15},
  pages        = {2616--2628},
  year         = {2020},
  url          = {https://doi.org/10.1109/TIFS.2020.2973832},
  doi          = {10.1109/TIFS.2020.2973832},
  timestamp    = {Mon, 06 Nov 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tifs/TolosanaVFO20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/TruongSLG20,
  author       = {Nguyen Binh Truong and
                  Kai Sun and
                  Gyu Myoung Lee and
                  Yike Guo},
  title        = {GDPR-Compliant Personal Data Management: {A} Blockchain-Based Solution},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {15},
  pages        = {1746--1761},
  year         = {2020},
  url          = {https://doi.org/10.1109/TIFS.2019.2948287},
  doi          = {10.1109/TIFS.2019.2948287},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/TruongSLG20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/TsengW20,
  author       = {Bo{-}Wei Tseng and
                  Pei{-}Yuan Wu},
  title        = {Compressive Privacy Generative Adversarial Network},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {15},
  pages        = {2499--2513},
  year         = {2020},
  url          = {https://doi.org/10.1109/TIFS.2020.2968188},
  doi          = {10.1109/TIFS.2020.2968188},
  timestamp    = {Thu, 06 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/TsengW20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/TuLGMGZ20,
  author       = {Chenyang Tu and
                  Zeyi Liu and
                  Neng Gao and
                  Cunqing Ma and
                  Jingquan Ge and
                  Lingchen Zhang},
  title        = {{MACM:} How to Reduce the Multi-Round {SCA} to the Single-Round Attack
                  on the Feistel-SP Networks},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {15},
  pages        = {3079--3092},
  year         = {2020},
  url          = {https://doi.org/10.1109/TIFS.2019.2959910},
  doi          = {10.1109/TIFS.2019.2959910},
  timestamp    = {Thu, 06 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/TuLGMGZ20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/UzunS20,
  author       = {Erkam Uzun and
                  H{\"{u}}srev T. Sencar},
  title        = {Jpg\emph{Scraper}: An Advanced Carver for {JPEG} Files},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {15},
  pages        = {1846--1857},
  year         = {2020},
  url          = {https://doi.org/10.1109/TIFS.2019.2953382},
  doi          = {10.1109/TIFS.2019.2953382},
  timestamp    = {Thu, 06 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/UzunS20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/Vazquez-PadinFS20,
  author       = {David V{\'{a}}zquez{-}Pad{\'{\i}}n and
                  Marco Fontani and
                  Dasara Shullani and
                  Fernando P{\'{e}}rez{-}Gonz{\'{a}}lez and
                  Alessandro Piva and
                  Mauro Barni},
  title        = {Video Integrity Verification and {GOP} Size Estimation Via Generalized
                  Variation of Prediction Footprint},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {15},
  pages        = {1815--1830},
  year         = {2020},
  url          = {https://doi.org/10.1109/TIFS.2019.2951313},
  doi          = {10.1109/TIFS.2019.2951313},
  timestamp    = {Thu, 06 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/Vazquez-PadinFS20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/WaliaJBS20,
  author       = {Gurjit Singh Walia and
                  Gaurav Jain and
                  Nipun Bansal and
                  Kuldeep Singh},
  title        = {Adaptive Weighted Graph Approach to Generate Multimodal Cancelable
                  Biometric Templates},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {15},
  pages        = {1945--1958},
  year         = {2020},
  url          = {https://doi.org/10.1109/TIFS.2019.2954779},
  doi          = {10.1109/TIFS.2019.2954779},
  timestamp    = {Fri, 16 Apr 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/WaliaJBS20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/WangB20,
  author       = {Zisheng Wang and
                  Rick S. Blum},
  title        = {A Statistical Learning-Based Algorithm for Topology Verification in
                  Natural Gas Networks Based on Noisy Sensor Measurements},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {15},
  pages        = {3653--3666},
  year         = {2020},
  url          = {https://doi.org/10.1109/TIFS.2020.2998943},
  doi          = {10.1109/TIFS.2020.2998943},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/WangB20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/WangCWM20,
  author       = {Xu An Wang and
                  Kim{-}Kwang Raymond Choo and
                  Jian Weng and
                  Jianfeng Ma},
  title        = {Comments on "Publicly Verifiable Computation of Polynomials Over Outsourced
                  Data With Multiple Sources"},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {15},
  pages        = {1586--1588},
  year         = {2020},
  url          = {https://doi.org/10.1109/TIFS.2019.2936971},
  doi          = {10.1109/TIFS.2019.2936971},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tifs/WangCWM20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/WangG20,
  author       = {Qiangchang Wang and
                  Guodong Guo},
  title        = {{LS-CNN:} Characterizing Local Patches at Multiple Scales for Face
                  Recognition},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {15},
  pages        = {1640--1653},
  year         = {2020},
  url          = {https://doi.org/10.1109/TIFS.2019.2946938},
  doi          = {10.1109/TIFS.2019.2946938},
  timestamp    = {Mon, 20 Sep 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/WangG20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/WangJADZ20,
  author       = {Ning Wang and
                  Long Jiao and
                  Amir Alipour{-}Fanid and
                  Monireh Dabaghchian and
                  Kai Zeng},
  title        = {Pilot Contamination Attack Detection for {NOMA} in 5G mm-Wave Massive
                  {MIMO} Networks},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {15},
  pages        = {1363--1378},
  year         = {2020},
  url          = {https://doi.org/10.1109/TIFS.2019.2939742},
  doi          = {10.1109/TIFS.2019.2939742},
  timestamp    = {Mon, 26 Oct 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tifs/WangJADZ20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/WangLZZW20,
  author       = {Qian Wang and
                  Zixi Li and
                  Qin Zou and
                  Lingchen Zhao and
                  Song Wang},
  title        = {Deep Domain Adaptation With Differential Privacy},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {15},
  pages        = {3093--3106},
  year         = {2020},
  url          = {https://doi.org/10.1109/TIFS.2020.2983254},
  doi          = {10.1109/TIFS.2020.2983254},
  timestamp    = {Thu, 06 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/WangLZZW20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/WangM0020,
  author       = {Dongxia Wang and
                  Tim Muller and
                  Jie Zhang and
                  Yang Liu},
  title        = {Information Theoretical Analysis of Unfair Rating Attacks Under Subjectivity},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {15},
  pages        = {816--828},
  year         = {2020},
  url          = {https://doi.org/10.1109/TIFS.2019.2929678},
  doi          = {10.1109/TIFS.2019.2929678},
  timestamp    = {Fri, 17 Dec 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tifs/WangM0020.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/WangMWHS20,
  author       = {Caiyong Wang and
                  Jawad Muhammad and
                  Yunlong Wang and
                  Zhaofeng He and
                  Zhenan Sun},
  title        = {Towards Complete and Accurate Iris Segmentation Using Deep Multi-Task
                  Attention Network for Non-Cooperative Iris Recognition},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {15},
  pages        = {2944--2959},
  year         = {2020},
  url          = {https://doi.org/10.1109/TIFS.2020.2980791},
  doi          = {10.1109/TIFS.2020.2980791},
  timestamp    = {Thu, 06 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/WangMWHS20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/WangSS20,
  author       = {Guoqing Wang and
                  Changming Sun and
                  Arcot Sowmya},
  title        = {Multi-Weighted Co-Occurrence Descriptor Encoding for Vein Recognition},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {15},
  pages        = {375--390},
  year         = {2020},
  url          = {https://doi.org/10.1109/TIFS.2019.2922331},
  doi          = {10.1109/TIFS.2019.2922331},
  timestamp    = {Mon, 22 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tifs/WangSS20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/WangSS20a,
  author       = {Guoqing Wang and
                  Changming Sun and
                  Arcot Sowmya},
  title        = {Learning a Compact Vein Discrimination Model With GANerated Samples},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {15},
  pages        = {635--650},
  year         = {2020},
  url          = {https://doi.org/10.1109/TIFS.2019.2924553},
  doi          = {10.1109/TIFS.2019.2924553},
  timestamp    = {Mon, 22 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tifs/WangSS20a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/WangYWDG20,
  author       = {Wei{-}Che Wang and
                  Yair Yona and
                  Yizhang Wu and
                  Suhas N. Diggavi and
                  Puneet Gupta},
  title        = {{SLATE:} {A} Secure Lightweight Entity Authentication Hardware Primitive},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {15},
  pages        = {276--285},
  year         = {2020},
  url          = {https://doi.org/10.1109/TIFS.2019.2919393},
  doi          = {10.1109/TIFS.2019.2919393},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/WangYWDG20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/WangZLYY20,
  author       = {Yaofei Wang and
                  Weiming Zhang and
                  Weixiang Li and
                  Xinzhi Yu and
                  Nenghai Yu},
  title        = {Non-Additive Cost Functions for Color Image Steganography Based on
                  Inter-Channel Correlations and Differences},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {15},
  pages        = {2081--2095},
  year         = {2020},
  url          = {https://doi.org/10.1109/TIFS.2019.2956590},
  doi          = {10.1109/TIFS.2019.2956590},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/WangZLYY20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/WangZYLHM20,
  author       = {Leye Wang and
                  Daqing Zhang and
                  Dingqi Yang and
                  Brian Y. Lim and
                  Xiao Han and
                  Xiaojuan Ma},
  title        = {Sparse Mobile Crowdsensing With Differential and Distortion Location
                  Privacy},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {15},
  pages        = {2735--2749},
  year         = {2020},
  url          = {https://doi.org/10.1109/TIFS.2020.2975925},
  doi          = {10.1109/TIFS.2020.2975925},
  timestamp    = {Thu, 06 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/WangZYLHM20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/WeiJLCW20,
  author       = {Chengkun Wei and
                  Shouling Ji and
                  Changchang Liu and
                  Wenzhi Chen and
                  Ting Wang},
  title        = {AsgLDP: Collecting and Generating Decentralized Attributed Graphs
                  With Local Differential Privacy},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {15},
  pages        = {3239--3254},
  year         = {2020},
  url          = {https://doi.org/10.1109/TIFS.2020.2985524},
  doi          = {10.1109/TIFS.2020.2985524},
  timestamp    = {Thu, 06 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/WeiJLCW20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/WeiLDMYFJQP20,
  author       = {Kang Wei and
                  Jun Li and
                  Ming Ding and
                  Chuan Ma and
                  Howard H. Yang and
                  Farhad Farokhi and
                  Shi Jin and
                  Tony Q. S. Quek and
                  H. Vincent Poor},
  title        = {Federated Learning With Differential Privacy: Algorithms and Performance
                  Analysis},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {15},
  pages        = {3454--3469},
  year         = {2020},
  url          = {https://doi.org/10.1109/TIFS.2020.2988575},
  doi          = {10.1109/TIFS.2020.2988575},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tifs/WeiLDMYFJQP20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/WenLFQZJ20,
  author       = {Wanli Wen and
                  Chenxi Liu and
                  Yaru Fu and
                  Tony Q. S. Quek and
                  Fu{-}Chun Zheng and
                  Shi Jin},
  title        = {Enhancing Physical Layer Security of Random Caching in Large-Scale
                  Multi-Antenna Heterogeneous Wireless Networks},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {15},
  pages        = {2840--2855},
  year         = {2020},
  url          = {https://doi.org/10.1109/TIFS.2020.2976961},
  doi          = {10.1109/TIFS.2020.2976961},
  timestamp    = {Mon, 15 May 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/WenLFQZJ20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/WuCLF20,
  author       = {Junqi Wu and
                  Bolin Chen and
                  Weiqi Luo and
                  Yanmei Fang},
  title        = {Audio Steganography Based on Iterative Adversarial Attacks Against
                  Convolutional Neural Networks},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {15},
  pages        = {2282--2294},
  year         = {2020},
  url          = {https://doi.org/10.1109/TIFS.2019.2963764},
  doi          = {10.1109/TIFS.2019.2963764},
  timestamp    = {Tue, 18 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/WuCLF20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/WuWLJ20,
  author       = {Chengwei Wu and
                  Ligang Wu and
                  Jianxing Liu and
                  Zhong{-}Ping Jiang},
  title        = {Active Defense-Based Resilient Sliding Mode Control Under Denial-of-Service
                  Attacks},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {15},
  pages        = {237--249},
  year         = {2020},
  url          = {https://doi.org/10.1109/TIFS.2019.2917373},
  doi          = {10.1109/TIFS.2019.2917373},
  timestamp    = {Wed, 13 Mar 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tifs/WuWLJ20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/WuYZC20,
  author       = {Renyong Wu and
                  Chao Yuan and
                  Ning Zhang and
                  Kim{-}Kwang Raymond Choo},
  title        = {A Two-Dimensional Vectorized Secure Transmission Scheme for Wireless
                  Communications},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {15},
  pages        = {2336--2345},
  year         = {2020},
  url          = {https://doi.org/10.1109/TIFS.2019.2954742},
  doi          = {10.1109/TIFS.2019.2954742},
  timestamp    = {Thu, 06 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/WuYZC20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/WuYZCW20,
  author       = {Libing Wu and
                  Jingxiao Yang and
                  Man Zhou and
                  Yanjiao Chen and
                  Qian Wang},
  title        = {{LVID:} {A} Multimodal Biometrics Authentication System on Smartphones},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {15},
  pages        = {1572--1585},
  year         = {2020},
  url          = {https://doi.org/10.1109/TIFS.2019.2944058},
  doi          = {10.1109/TIFS.2019.2944058},
  timestamp    = {Mon, 01 May 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/WuYZCW20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/Xia0020,
  author       = {Xiaofang Xia and
                  Yang Xiao and
                  Wei Liang},
  title        = {{SAI:} {A} Suspicion Assessment-Based Inspection Algorithm to Detect
                  Malicious Users in Smart Grid},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {15},
  pages        = {361--374},
  year         = {2020},
  url          = {https://doi.org/10.1109/TIFS.2019.2921232},
  doi          = {10.1109/TIFS.2019.2921232},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/Xia0020.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/XiaZLWX20,
  author       = {Min Xia and
                  Xu Zhang and
                  Wan'an Liu and
                  Liguo Weng and
                  Yiqing Xu},
  title        = {Multi-Stage Feature Constraints Learning for Age Estimation},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {15},
  pages        = {2417--2428},
  year         = {2020},
  url          = {https://doi.org/10.1109/TIFS.2020.2969552},
  doi          = {10.1109/TIFS.2020.2969552},
  timestamp    = {Mon, 06 Nov 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tifs/XiaZLWX20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/XiangYCDS20,
  author       = {Zhongwu Xiang and
                  Weiwei Yang and
                  Yueming Cai and
                  Zhiguo Ding and
                  Yi Song},
  title        = {Secure Transmission Design in {HARQ} Assisted Cognitive {NOMA} Networks},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {15},
  pages        = {2528--2541},
  year         = {2020},
  url          = {https://doi.org/10.1109/TIFS.2020.2968176},
  doi          = {10.1109/TIFS.2020.2968176},
  timestamp    = {Fri, 29 Jul 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/XiangYCDS20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/XiangYPCSZ20,
  author       = {Zhongwu Xiang and
                  Weiwei Yang and
                  Gaofeng Pan and
                  Yueming Cai and
                  Yi Song and
                  Yulong Zou},
  title        = {Secure Transmission in HARQ-Assisted Non-Orthogonal Multiple Access
                  Networks},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {15},
  pages        = {2171--2182},
  year         = {2020},
  url          = {https://doi.org/10.1109/TIFS.2019.2955792},
  doi          = {10.1109/TIFS.2019.2955792},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/XiangYPCSZ20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/XieHW20,
  author       = {Shangyu Xie and
                  Yuan Hong and
                  Peng{-}Jun Wan},
  title        = {Pairing: Privately Balancing Multiparty Real-Time Supply and Demand
                  on the Power Grid},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {15},
  pages        = {1114--1127},
  year         = {2020},
  url          = {https://doi.org/10.1109/TIFS.2019.2933732},
  doi          = {10.1109/TIFS.2019.2933732},
  timestamp    = {Thu, 06 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/XieHW20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/XieP20,
  author       = {Jiucheng Xie and
                  Chi{-}Man Pun},
  title        = {Deep and Ordinal Ensemble Learning for Human Age Estimation From Facial
                  Images},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {15},
  pages        = {2361--2374},
  year         = {2020},
  url          = {https://doi.org/10.1109/TIFS.2020.2965298},
  doi          = {10.1109/TIFS.2020.2965298},
  timestamp    = {Thu, 06 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/XieP20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/XiongSKS20,
  author       = {Wenjie Xiong and
                  Andr{\'{e}} Schaller and
                  Stefan Katzenbeisser and
                  Jakub Szefer},
  title        = {Software Protection Using Dynamic PUFs},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {15},
  pages        = {2053--2068},
  year         = {2020},
  url          = {https://doi.org/10.1109/TIFS.2019.2955788},
  doi          = {10.1109/TIFS.2019.2955788},
  timestamp    = {Tue, 16 Aug 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/XiongSKS20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/XuLL0L20,
  author       = {Guowen Xu and
                  Hongwei Li and
                  Sen Liu and
                  Kan Yang and
                  Xiaodong Lin},
  title        = {VerifyNet: Secure and Verifiable Federated Learning},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {15},
  pages        = {911--926},
  year         = {2020},
  url          = {https://doi.org/10.1109/TIFS.2019.2929409},
  doi          = {10.1109/TIFS.2019.2929409},
  timestamp    = {Fri, 18 Nov 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tifs/XuLL0L20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/XuLZCT20,
  author       = {Lingling Xu and
                  Wanhua Li and
                  Fangguo Zhang and
                  Rong Cheng and
                  Shaohua Tang},
  title        = {Authorized Keyword Searches on Public Key Encrypted Data With Time
                  Controlled Keyword Privacy},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {15},
  pages        = {2096--2109},
  year         = {2020},
  url          = {https://doi.org/10.1109/TIFS.2019.2957691},
  doi          = {10.1109/TIFS.2019.2957691},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/XuLZCT20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/XuSD20,
  author       = {Congyuan Xu and
                  Jizhong Shen and
                  Xin Du},
  title        = {A Method of Few-Shot Network Intrusion Detection Based on Meta-Learning
                  Framework},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {15},
  pages        = {3540--3552},
  year         = {2020},
  url          = {https://doi.org/10.1109/TIFS.2020.2991876},
  doi          = {10.1109/TIFS.2020.2991876},
  timestamp    = {Thu, 06 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/XuSD20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/XuSL20,
  author       = {Qichao Xu and
                  Zhou Su and
                  Rongxing Lu},
  title        = {Game Theory and Reinforcement Learning Based Secure Edge Caching in
                  Mobile Social Networks},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {15},
  pages        = {3415--3429},
  year         = {2020},
  url          = {https://doi.org/10.1109/TIFS.2020.2980823},
  doi          = {10.1109/TIFS.2020.2980823},
  timestamp    = {Thu, 06 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/XuSL20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/XueVHS20,
  author       = {Wanli Xue and
                  Dinusha Vatsalan and
                  Wen Hu and
                  Aruna Seneviratne},
  title        = {Sequence Data Matching and Beyond: New Privacy-Preserving Primitives
                  Based on Bloom Filters},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {15},
  pages        = {2973--2987},
  year         = {2020},
  url          = {https://doi.org/10.1109/TIFS.2020.2980835},
  doi          = {10.1109/TIFS.2020.2980835},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/XueVHS20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/YanLLS20,
  author       = {Xuehu Yan and
                  Yuliang Lu and
                  Lintao Liu and
                  Xianhua Song},
  title        = {Reversible Image Secret Sharing},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {15},
  pages        = {3848--3858},
  year         = {2020},
  url          = {https://doi.org/10.1109/TIFS.2020.3001735},
  doi          = {10.1109/TIFS.2020.3001735},
  timestamp    = {Thu, 27 Jul 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/YanLLS20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/YangDL20,
  author       = {Jichen Yang and
                  Rohan Kumar Das and
                  Haizhou Li},
  title        = {Significance of Subband Features for Synthetic Speech Detection},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {15},
  pages        = {2160--2170},
  year         = {2020},
  url          = {https://doi.org/10.1109/TIFS.2019.2956589},
  doi          = {10.1109/TIFS.2019.2956589},
  timestamp    = {Thu, 06 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/YangDL20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/YangLYALC20,
  author       = {Xiao Yang and
                  Wang Fat Lau and
                  Qingqing Ye and
                  Man Ho Au and
                  Joseph K. Liu and
                  Jacob Cheng},
  title        = {Practical Escrow Protocol for Bitcoin},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {15},
  pages        = {3023--3034},
  year         = {2020},
  url          = {https://doi.org/10.1109/TIFS.2020.2976607},
  doi          = {10.1109/TIFS.2020.2976607},
  timestamp    = {Thu, 06 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/YangLYALC20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/YangRHKS20,
  author       = {Jianhua Yang and
                  Danyang Ruan and
                  Jiwu Huang and
                  Xiangui Kang and
                  Yun{-}Qing Shi},
  title        = {An Embedding Cost Learning Framework Using {GAN}},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {15},
  pages        = {839--851},
  year         = {2020},
  url          = {https://doi.org/10.1109/TIFS.2019.2922229},
  doi          = {10.1109/TIFS.2019.2922229},
  timestamp    = {Thu, 06 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/YangRHKS20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/YangSZZJ20,
  author       = {Zhihai Yang and
                  Qindong Sun and
                  Yaling Zhang and
                  Lei Zhu and
                  Wenjiang Ji},
  title        = {Inference of Suspicious Co-Visitation and Co-Rating Behaviors and
                  Abnormality Forensics for Recommender Systems},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {15},
  pages        = {2766--2781},
  year         = {2020},
  url          = {https://doi.org/10.1109/TIFS.2020.2977023},
  doi          = {10.1109/TIFS.2020.2977023},
  timestamp    = {Fri, 29 Apr 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/YangSZZJ20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/YangWWSG20,
  author       = {Meng Yang and
                  Wei Wen and
                  Xing Wang and
                  Linlin Shen and
                  Guangwei Gao},
  title        = {Adaptive Convolution Local and Global Learning for Class-Level Joint
                  Representation of Facial Recognition With a Single Sample Per Data
                  Subject},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {15},
  pages        = {2469--2484},
  year         = {2020},
  url          = {https://doi.org/10.1109/TIFS.2020.2965301},
  doi          = {10.1109/TIFS.2020.2965301},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/YangWWSG20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/YankovOSCF20,
  author       = {Metodi P. Yankov and
                  Martin Aastrup Olsen and
                  Mikkel B. Stegmann and
                  S{\o}ren Skovgaard Christensen and
                  S{\o}ren Forchhammer},
  title        = {Fingerprint Entropy and Identification Capacity Estimation Based on
                  Pixel-Level Generative Modelling},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {15},
  pages        = {56--65},
  year         = {2020},
  url          = {https://doi.org/10.1109/TIFS.2019.2916406},
  doi          = {10.1109/TIFS.2019.2916406},
  timestamp    = {Thu, 06 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/YankovOSCF20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/YaoJDW20,
  author       = {Chengtang Yao and
                  Yunde Jia and
                  Huijun Di and
                  Yuwei Wu},
  title        = {Face Spoofing Detection Using Relativity Representation on Riemannian
                  Manifold},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {15},
  pages        = {3683--3693},
  year         = {2020},
  url          = {https://doi.org/10.1109/TIFS.2020.2998956},
  doi          = {10.1109/TIFS.2020.2998956},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/YaoJDW20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/YasuiKFE20,
  author       = {Tatsuya Yasui and
                  Minoru Kuribayashi and
                  Nobuo Funabiki and
                  Isao Echizen},
  title        = {Near-Optimal Detection for Binary Tardos Code by Estimating Collusion
                  Strategy},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {15},
  pages        = {2069--2080},
  year         = {2020},
  url          = {https://doi.org/10.1109/TIFS.2019.2956587},
  doi          = {10.1109/TIFS.2019.2956587},
  timestamp    = {Thu, 06 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/YasuiKFE20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/YeL0Y20,
  author       = {Mang Ye and
                  Xiangyuan Lan and
                  Zheng Wang and
                  Pong C. Yuen},
  title        = {Bi-Directional Center-Constrained Top-Ranking for Visible Thermal
                  Person Re-Identification},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {15},
  pages        = {407--419},
  year         = {2020},
  url          = {https://doi.org/10.1109/TIFS.2019.2921454},
  doi          = {10.1109/TIFS.2019.2921454},
  timestamp    = {Thu, 06 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/YeL0Y20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/YeY20,
  author       = {Mang Ye and
                  Pong C. Yuen},
  title        = {PurifyNet: {A} Robust Person Re-Identification Model With Noisy Labels},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {15},
  pages        = {2655--2666},
  year         = {2020},
  url          = {https://doi.org/10.1109/TIFS.2020.2970590},
  doi          = {10.1109/TIFS.2020.2970590},
  timestamp    = {Thu, 06 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/YeY20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/YilmazPZ20,
  author       = {Baki Berkay Yilmaz and
                  Milos Prvulovic and
                  Alenka G. Zajic},
  title        = {Electromagnetic Side Channel Information Leakage Created by Execution
                  of Series of Instructions in a Computer Processor},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {15},
  pages        = {776--789},
  year         = {2020},
  url          = {https://doi.org/10.1109/TIFS.2019.2929018},
  doi          = {10.1109/TIFS.2019.2929018},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/YilmazPZ20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/YilmazSZP20,
  author       = {Baki Berkay Yilmaz and
                  Nader Sehatbakhsh and
                  Alenka G. Zajic and
                  Milos Prvulovic},
  title        = {Communication Model and Capacity Limits of Covert Channels Created
                  by Software Activities},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {15},
  pages        = {1891--1904},
  year         = {2020},
  url          = {https://doi.org/10.1109/TIFS.2019.2952265},
  doi          = {10.1109/TIFS.2019.2952265},
  timestamp    = {Tue, 16 Aug 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/YilmazSZP20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/Yin0H20,
  author       = {Xuefei Yin and
                  Yanming Zhu and
                  Jiankun Hu},
  title        = {Contactless Fingerprint Recognition Based on Global Minutia Topology
                  and Loose Genetic Algorithm},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {15},
  pages        = {28--41},
  year         = {2020},
  url          = {https://doi.org/10.1109/TIFS.2019.2918083},
  doi          = {10.1109/TIFS.2019.2918083},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/Yin0H20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/Yuan000020,
  author       = {Dong Yuan and
                  Qi Li and
                  Guoliang Li and
                  Qian Wang and
                  Kui Ren},
  title        = {PriRadar: {A} Privacy-Preserving Framework for Spatial Crowdsourcing},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {15},
  pages        = {299--314},
  year         = {2020},
  url          = {https://doi.org/10.1109/TIFS.2019.2913232},
  doi          = {10.1109/TIFS.2019.2913232},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/Yuan000020.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/YunHWZZZ20,
  author       = {Xiaochun Yun and
                  Ji Huang and
                  Yipeng Wang and
                  Tianning Zang and
                  Yuan Zhou and
                  Yongzheng Zhang},
  title        = {Khaos: An Adversarial Neural Network {DGA} With High Anti-Detection
                  Ability},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {15},
  pages        = {2225--2240},
  year         = {2020},
  url          = {https://doi.org/10.1109/TIFS.2019.2960647},
  doi          = {10.1109/TIFS.2019.2960647},
  timestamp    = {Thu, 06 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/YunHWZZZ20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/ZewailY20,
  author       = {Ahmed A. Zewail and
                  Aylin Yener},
  title        = {Device-to-Device Secure Coded Caching},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {15},
  pages        = {1513--1524},
  year         = {2020},
  url          = {https://doi.org/10.1109/TIFS.2019.2940885},
  doi          = {10.1109/TIFS.2019.2940885},
  timestamp    = {Mon, 20 Sep 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/ZewailY20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/ZhaiWR20,
  author       = {Liming Zhai and
                  Lina Wang and
                  Yanzhen Ren},
  title        = {Universal Detection of Video Steganography in Multiple Domains Based
                  on the Consistency of Motion Vectors},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {15},
  pages        = {1762--1777},
  year         = {2020},
  url          = {https://doi.org/10.1109/TIFS.2019.2949428},
  doi          = {10.1109/TIFS.2019.2949428},
  timestamp    = {Fri, 15 Dec 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tifs/ZhaiWR20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/ZhangDYCC20,
  author       = {Zhenyong Zhang and
                  Ruilong Deng and
                  David K. Y. Yau and
                  Peng Cheng and
                  Jiming Chen},
  title        = {Analysis of Moving Target Defense Against False Data Injection Attacks
                  on Power Grid},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {15},
  pages        = {2320--2335},
  year         = {2020},
  url          = {https://doi.org/10.1109/TIFS.2019.2928624},
  doi          = {10.1109/TIFS.2019.2928624},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/ZhangDYCC20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/ZhangDYZR20,
  author       = {Fan Zhang and
                  Xiaofei Dong and
                  Bolin Yang and
                  Yajin Zhou and
                  Kui Ren},
  title        = {A Systematic Evaluation of Wavelet-Based Attack Framework on Random
                  Delay Countermeasures},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {15},
  pages        = {1407--1422},
  year         = {2020},
  url          = {https://doi.org/10.1109/TIFS.2019.2941774},
  doi          = {10.1109/TIFS.2019.2941774},
  timestamp    = {Thu, 06 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/ZhangDYZR20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/ZhangG20,
  author       = {Yuqiao Zhang and
                  Ujjwal Guin},
  title        = {End-to-End Traceability of ICs in Component Supply Chain for Fighting
                  Against Recycling},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {15},
  pages        = {767--775},
  year         = {2020},
  url          = {https://doi.org/10.1109/TIFS.2019.2928493},
  doi          = {10.1109/TIFS.2019.2928493},
  timestamp    = {Thu, 06 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/ZhangG20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/ZhangKL20,
  author       = {Xueru Zhang and
                  Mohammad Mahdi Khalili and
                  Mingyan Liu},
  title        = {Recycled {ADMM:} Improving the Privacy and Accuracy of Distributed
                  Algorithms},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {15},
  pages        = {1723--1734},
  year         = {2020},
  url          = {https://doi.org/10.1109/TIFS.2019.2947867},
  doi          = {10.1109/TIFS.2019.2947867},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/ZhangKL20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/ZhangLQG20,
  author       = {Tong Zhang and
                  Xiaolong Li and
                  Wenfa Qi and
                  Zongming Guo},
  title        = {Location-Based {PVO} and Adaptive Pairwise Modification for Efficient
                  Reversible Data Hiding},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {15},
  pages        = {2306--2319},
  year         = {2020},
  url          = {https://doi.org/10.1109/TIFS.2019.2963766},
  doi          = {10.1109/TIFS.2019.2963766},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/ZhangLQG20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/ZhangSPZNTZ20,
  author       = {Yanxin Zhang and
                  Yulei Sui and
                  Shirui Pan and
                  Zheng Zheng and
                  Baodi Ning and
                  Ivor W. Tsang and
                  Wanlei Zhou},
  title        = {Familial Clustering for Weakly-Labeled Android Malware Using Hybrid
                  Representation Learning},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {15},
  pages        = {3401--3414},
  year         = {2020},
  url          = {https://doi.org/10.1109/TIFS.2019.2947861},
  doi          = {10.1109/TIFS.2019.2947861},
  timestamp    = {Thu, 21 Apr 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/ZhangSPZNTZ20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/ZhangXHWZJ20,
  author       = {Yubao Zhang and
                  Jidong Xiao and
                  Shuai Hao and
                  Haining Wang and
                  Sencun Zhu and
                  Sushil Jajodia},
  title        = {Understanding the Manipulation on Recommender Systems through Web
                  Injection},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {15},
  pages        = {3807--3818},
  year         = {2020},
  url          = {https://doi.org/10.1109/TIFS.2019.2954737},
  doi          = {10.1109/TIFS.2019.2954737},
  timestamp    = {Mon, 10 Jan 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tifs/ZhangXHWZJ20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/ZhangXYXZ20,
  author       = {Yushu Zhang and
                  Xiangli Xiao and
                  Lu{-}Xing Yang and
                  Yong Xiang and
                  Sheng Zhong},
  title        = {Secure and Efficient Outsourcing of PCA-Based Face Recognition},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {15},
  pages        = {1683--1695},
  year         = {2020},
  url          = {https://doi.org/10.1109/TIFS.2019.2947872},
  doi          = {10.1109/TIFS.2019.2947872},
  timestamp    = {Wed, 02 Feb 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tifs/ZhangXYXZ20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/ZhangZ20,
  author       = {Rui Zhang and
                  Quanyan Zhu},
  title        = {{\textless}tt{\textgreater}FlipIn{\textless}/tt{\textgreater}: {A}
                  Game-Theoretic Cyber Insurance Framework for Incentive-Compatible
                  Cyber Risk Management of Internet of Things},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {15},
  pages        = {2026--2041},
  year         = {2020},
  url          = {https://doi.org/10.1109/TIFS.2019.2955891},
  doi          = {10.1109/TIFS.2019.2955891},
  timestamp    = {Thu, 06 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/ZhangZ20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/ZhangZLL20,
  author       = {Ru Zhang and
                  Feng Zhu and
                  Jianyi Liu and
                  Gongshen Liu},
  title        = {Depth-Wise Separable Convolutions and Multi-Level Pooling for an Efficient
                  Spatial CNN-Based Steganalysis},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {15},
  pages        = {1138--1150},
  year         = {2020},
  url          = {https://doi.org/10.1109/TIFS.2019.2936913},
  doi          = {10.1109/TIFS.2019.2936913},
  timestamp    = {Thu, 06 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/ZhangZLL20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/Zhao0ZQ020,
  author       = {Pu Zhao and
                  Jia Yu and
                  Hanlin Zhang and
                  Zhan Qin and
                  Cong Wang},
  title        = {How to Securely Outsource Finding the Min-Cut of Undirected Edge-Weighted
                  Graphs},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {15},
  pages        = {315--328},
  year         = {2020},
  url          = {https://doi.org/10.1109/TIFS.2019.2922277},
  doi          = {10.1109/TIFS.2019.2922277},
  timestamp    = {Tue, 28 Mar 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/Zhao0ZQ020.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/ZhaoLSJS20,
  author       = {Shuangrui Zhao and
                  Jia Liu and
                  Yulong Shen and
                  Xiaohong Jiang and
                  Norio Shiratori},
  title        = {Secure Beamforming for Full-Duplex {MIMO} Two-Way Untrusted Relay
                  Systems},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {15},
  pages        = {3775--3790},
  year         = {2020},
  url          = {https://doi.org/10.1109/TIFS.2020.3001733},
  doi          = {10.1109/TIFS.2020.3001733},
  timestamp    = {Wed, 18 Aug 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/ZhaoLSJS20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/ZhaoWZZC20,
  author       = {Lingchen Zhao and
                  Qian Wang and
                  Qin Zou and
                  Yan Zhang and
                  Yanjiao Chen},
  title        = {Privacy-Preserving Collaborative Deep Learning With Unreliable Participants},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {15},
  pages        = {1486--1500},
  year         = {2020},
  url          = {https://doi.org/10.1109/TIFS.2019.2939713},
  doi          = {10.1109/TIFS.2019.2939713},
  timestamp    = {Mon, 20 Sep 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/ZhaoWZZC20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/Zheng0C20,
  author       = {Yue Zheng and
                  Yuan Cao and
                  Chip{-}Hong Chang},
  title        = {A PUF-Based Data-Device Hash for Tampered Image Detection and Source
                  Camera Identification},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {15},
  pages        = {620--634},
  year         = {2020},
  url          = {https://doi.org/10.1109/TIFS.2019.2926777},
  doi          = {10.1109/TIFS.2019.2926777},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/Zheng0C20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/ZhengH20,
  author       = {Huadi Zheng and
                  Haibo Hu},
  title        = {{MISSILE:} {A} System of Mobile Inertial Sensor-Based Sensitive Indoor
                  Location Eavesdropping},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {15},
  pages        = {3137--3151},
  year         = {2020},
  url          = {https://doi.org/10.1109/TIFS.2019.2944034},
  doi          = {10.1109/TIFS.2019.2944034},
  timestamp    = {Sat, 05 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/ZhengH20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/ZhengZSCC20,
  author       = {Yue Zheng and
                  Xiaojin Zhao and
                  Takashi Sato and
                  Yuan Cao and
                  Chip{-}Hong Chang},
  title        = {Ed-PUF: Event-Driven Physical Unclonable Function for Camera Authentication
                  in Reactive Monitoring System},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {15},
  pages        = {2824--2839},
  year         = {2020},
  url          = {https://doi.org/10.1109/TIFS.2020.2977597},
  doi          = {10.1109/TIFS.2020.2977597},
  timestamp    = {Thu, 06 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/ZhengZSCC20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/ZhongP20,
  author       = {Jun{-}Liu Zhong and
                  Chi{-}Man Pun},
  title        = {An End-to-End Dense-InceptionNet for Image Copy-Move Forgery Detection},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {15},
  pages        = {2134--2146},
  year         = {2020},
  url          = {https://doi.org/10.1109/TIFS.2019.2957693},
  doi          = {10.1109/TIFS.2019.2957693},
  timestamp    = {Tue, 07 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tifs/ZhongP20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/Zhou20,
  author       = {Lin Zhou},
  title        = {Multiple Private Key Generation for Continuous Memoryless Sources
                  With a Helper},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {15},
  pages        = {2629--2640},
  year         = {2020},
  url          = {https://doi.org/10.1109/TIFS.2020.2973865},
  doi          = {10.1109/TIFS.2020.2973865},
  timestamp    = {Thu, 06 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/Zhou20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/ZhouCQD020,
  author       = {Jun Zhou and
                  Zhenfu Cao and
                  Zhan Qin and
                  Xiaolei Dong and
                  Kui Ren},
  title        = {{LPPA:} Lightweight Privacy-Preserving Authentication From Efficient
                  Multi-Key Secure Outsourced Computation for Location-Based Services
                  in VANETs},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {15},
  pages        = {420--434},
  year         = {2020},
  url          = {https://doi.org/10.1109/TIFS.2019.2923156},
  doi          = {10.1109/TIFS.2019.2923156},
  timestamp    = {Thu, 23 Jun 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/ZhouCQD020.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/ZhuMLYLJ20,
  author       = {Shuangyi Zhu and
                  Yuan Ma and
                  Xusheng Li and
                  Jing Yang and
                  Jingqiang Lin and
                  Jiwu Jing},
  title        = {On the Analysis and Improvement of Min-Entropy Estimation on Time-Varying
                  Data},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {15},
  pages        = {1696--1708},
  year         = {2020},
  url          = {https://doi.org/10.1109/TIFS.2019.2947871},
  doi          = {10.1109/TIFS.2019.2947871},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/ZhuMLYLJ20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/ZhuYQT20,
  author       = {Jinbao Zhu and
                  Qifa Yan and
                  Chao Qi and
                  Xiaohu Tang},
  title        = {A New Capacity-Achieving Private Information Retrieval Scheme With
                  (Almost) Optimal File Length for Coded Servers},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {15},
  pages        = {1248--1260},
  year         = {2020},
  url          = {https://doi.org/10.1109/TIFS.2019.2937634},
  doi          = {10.1109/TIFS.2019.2937634},
  timestamp    = {Mon, 26 Oct 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tifs/ZhuYQT20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/ZiGCL20,
  author       = {Yang Zi and
                  Haichang Gao and
                  Zhouhang Cheng and
                  Yi Liu},
  title        = {An End-to-End Attack on Text CAPTCHAs},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {15},
  pages        = {753--766},
  year         = {2020},
  url          = {https://doi.org/10.1109/TIFS.2019.2928622},
  doi          = {10.1109/TIFS.2019.2928622},
  timestamp    = {Thu, 06 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/ZiGCL20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/ZouWWZL20,
  author       = {Qin Zou and
                  Yanling Wang and
                  Qian Wang and
                  Yi Zhao and
                  Qingquan Li},
  title        = {Deep Learning-Based Gait Recognition Using Smartphones in the Wild},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {15},
  pages        = {3197--3212},
  year         = {2020},
  url          = {https://doi.org/10.1109/TIFS.2020.2985628},
  doi          = {10.1109/TIFS.2020.2985628},
  timestamp    = {Sun, 06 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/ZouWWZL20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
a service of  Schloss Dagstuhl - Leibniz Center for Informatics