Stop the war!
Остановите войну!
for scientists:
default search action
Search dblp for Publications
export results for "toc:db/journals/tifs/tifs15.bht:"
@article{DBLP:journals/tifs/000120, author = {Hailong Zhang}, title = {On the Exact Relationship Between the Success Rate of Template Attack and Different Parameters}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {15}, pages = {681--694}, year = {2020}, url = {https://doi.org/10.1109/TIFS.2019.2928506}, doi = {10.1109/TIFS.2019.2928506}, timestamp = {Thu, 06 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/000120.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/0001NT020, author = {Kai Cao and Dinh{-}Luan Nguyen and Cori Tymoszek and Anil K. Jain}, title = {End-to-End Latent Fingerprint Search}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {15}, pages = {880--894}, year = {2020}, url = {https://doi.org/10.1109/TIFS.2019.2930487}, doi = {10.1109/TIFS.2019.2930487}, timestamp = {Thu, 06 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/0001NT020.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/0001SMS020, author = {Dan Lin and Douglas Steiert and Joshua Morris and Anna Cinzia Squicciarini and Jianping Fan}, title = {{REMIND:} Risk Estimation Mechanism for Images in Network Distribution}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {15}, pages = {539--552}, year = {2020}, url = {https://doi.org/10.1109/TIFS.2019.2924853}, doi = {10.1109/TIFS.2019.2924853}, timestamp = {Thu, 06 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/0001SMS020.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/0002LWW0N0020, author = {Xiao Chen and Chaoran Li and Derui Wang and Sheng Wen and Jun Zhang and Surya Nepal and Yang Xiang and Kui Ren}, title = {Android {HIV:} {A} Study of Repackaging Malware for Evading Machine-Learning Detection}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {15}, pages = {987--1001}, year = {2020}, url = {https://doi.org/10.1109/TIFS.2019.2932228}, doi = {10.1109/TIFS.2019.2932228}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/0002LWW0N0020.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/0003FLB20, author = {Na Wang and Junsong Fu and Jian Li and Bharat K. Bhargava}, title = {Source-Location Privacy Protection Based on Anonymity Cloud in Wireless Sensor Networks}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {15}, pages = {100--114}, year = {2020}, url = {https://doi.org/10.1109/TIFS.2019.2919388}, doi = {10.1109/TIFS.2019.2919388}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/0003FLB20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/0004F0LZX20, author = {Xin Yuan and Zhiyong Feng and Wei Ni and Ren Ping Liu and J. Andrew Zhang and Wenjun Xu}, title = {Secrecy Performance of Terrestrial Radio Links Under Collaborative Aerial Eavesdropping}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {15}, pages = {604--619}, year = {2020}, url = {https://doi.org/10.1109/TIFS.2019.2922353}, doi = {10.1109/TIFS.2019.2922353}, timestamp = {Thu, 15 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/0004F0LZX20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/0004T20, author = {Meng Sun and Wee Peng Tay}, title = {Decentralized Detection With Robust Information Privacy Protection}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {15}, pages = {85--99}, year = {2020}, url = {https://doi.org/10.1109/TIFS.2019.2916650}, doi = {10.1109/TIFS.2019.2916650}, timestamp = {Thu, 06 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/0004T20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/0004T20a, author = {Meng Sun and Wee Peng Tay}, title = {On the Relationship Between Inference and Data Privacy in Decentralized IoT Networks}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {15}, pages = {852--866}, year = {2020}, url = {https://doi.org/10.1109/TIFS.2019.2929446}, doi = {10.1109/TIFS.2019.2929446}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/0004T20a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/0017LL20, author = {Qiang Li and Chao Li and Jingran Lin}, title = {Constant Modulus Secure Beamforming for Multicast Massive {MIMO} Wiretap Channels}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {15}, pages = {264--275}, year = {2020}, url = {https://doi.org/10.1109/TIFS.2019.2916687}, doi = {10.1109/TIFS.2019.2916687}, timestamp = {Thu, 06 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/0017LL20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/AbdullahiWL20, author = {Sani M. Abdullahi and Hongxia Wang and Tao Li}, title = {Fractal Coding-Based Robust and Alignment-Free Fingerprint Image Hashing}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {15}, pages = {2587--2601}, year = {2020}, url = {https://doi.org/10.1109/TIFS.2020.2971142}, doi = {10.1109/TIFS.2020.2971142}, timestamp = {Wed, 20 Mar 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tifs/AbdullahiWL20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/AbhishekTLS20, author = {Nalam Venkata Abhishek and Anshoo Tandon and Teng Joon Lim and Biplab Sikdar}, title = {A GLRT-Based Mechanism for Detecting Relay Misbehavior in Clustered IoT Networks}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {15}, pages = {435--446}, year = {2020}, url = {https://doi.org/10.1109/TIFS.2019.2922262}, doi = {10.1109/TIFS.2019.2922262}, timestamp = {Tue, 18 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/AbhishekTLS20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/AdakCLB20, author = {Chandranath Adak and Bidyut B. Chaudhuri and Chin{-}Teng Lin and Michael Blumenstein}, title = {Intra-Variable Handwriting Inspection Reinforced With Idiosyncrasy Analysis}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {15}, pages = {3567--3579}, year = {2020}, url = {https://doi.org/10.1109/TIFS.2020.2991833}, doi = {10.1109/TIFS.2020.2991833}, timestamp = {Thu, 06 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/AdakCLB20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/AddessoCMM20, author = {Paolo Addesso and Michele Cirillo and Mario Di Mauro and Vincenzo Matta}, title = {ADVoIP: Adversarial Detection of Encrypted and Concealed VoIP}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {15}, pages = {943--958}, year = {2020}, url = {https://doi.org/10.1109/TIFS.2019.2922398}, doi = {10.1109/TIFS.2019.2922398}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/AddessoCMM20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/AghaieM20, author = {Anita Aghaie and Amir Moradi}, title = {{TI-PUF:} Toward Side-Channel Resistant Physical Unclonable Functions}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {15}, pages = {3470--3481}, year = {2020}, url = {https://doi.org/10.1109/TIFS.2020.2986887}, doi = {10.1109/TIFS.2020.2986887}, timestamp = {Mon, 26 Oct 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tifs/AghaieM20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/AhmadC020, author = {Fawad Ahmad and Lee{-}Ming Cheng and Asif Khan}, title = {Lightweight and Privacy-Preserving Template Generation for Palm-Vein-Based Human Recognition}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {15}, pages = {184--194}, year = {2020}, url = {https://doi.org/10.1109/TIFS.2019.2917156}, doi = {10.1109/TIFS.2019.2917156}, timestamp = {Thu, 06 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/AhmadC020.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/Al-KadiMTC20, author = {Osama Al{-}Kadi and Nour Moustafa and Benjamin P. Turnbull and Kim{-}Kwang Raymond Choo}, title = {An Ontological Graph Identification Method for Improving Localization of {IP} Prefix Hijacking in Network Systems}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {15}, pages = {1164--1174}, year = {2020}, url = {https://doi.org/10.1109/TIFS.2019.2936975}, doi = {10.1109/TIFS.2019.2936975}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/Al-KadiMTC20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/AlageliIAACC20, author = {Mahmoud Alageli and A{\"{\i}}ssa Ikhlef and Fahad Alsifiany and Mohammed A. M. Abdullah and Gaojie Chen and Jonathon A. Chambers}, title = {Optimal Downlink Transmission for Cell-Free {SWIPT} Massive {MIMO} Systems With Active Eavesdropping}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {15}, pages = {1983--1998}, year = {2020}, url = {https://doi.org/10.1109/TIFS.2019.2954748}, doi = {10.1109/TIFS.2019.2954748}, timestamp = {Thu, 06 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/AlageliIAACC20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/AldaghriM20, author = {Nasser Aldaghri and Hessam Mahdavifar}, title = {Physical Layer Secret Key Generation in Static Environments}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {15}, pages = {2692--2705}, year = {2020}, url = {https://doi.org/10.1109/TIFS.2020.2974621}, doi = {10.1109/TIFS.2020.2974621}, timestamp = {Thu, 06 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/AldaghriM20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/AlhanahnahYBZTS20, author = {Mohannad Alhanahnah and Qiben Yan and Hamid Bagheri and Hao Zhou and Yutaka Tsutano and Witawas Srisa{-}an and Xiapu Luo}, title = {{DINA:} Detecting Hidden Android Inter-App Communication in Dynamic Loaded Code}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {15}, pages = {2782--2797}, year = {2020}, url = {https://doi.org/10.1109/TIFS.2020.2976556}, doi = {10.1109/TIFS.2020.2976556}, timestamp = {Thu, 06 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/AlhanahnahYBZTS20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/AliasgariSK20, author = {Malihe Aliasgari and Osvaldo Simeone and J{\"{o}}rg Kliewer}, title = {Private and Secure Distributed Matrix Multiplication With Flexible Communication Load}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {15}, pages = {2722--2734}, year = {2020}, url = {https://doi.org/10.1109/TIFS.2020.2972166}, doi = {10.1109/TIFS.2020.2972166}, timestamp = {Thu, 06 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/AliasgariSK20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/Alipour-FanidDW20, author = {Amir Alipour{-}Fanid and Monireh Dabaghchian and Ning Wang and Pu Wang and Liang Zhao and Kai Zeng}, title = {Machine Learning-Based Delay-Aware {UAV} Detection and Operation Mode Identification Over Encrypted Wi-Fi Traffic}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {15}, pages = {2346--2360}, year = {2020}, url = {https://doi.org/10.1109/TIFS.2019.2959899}, doi = {10.1109/TIFS.2019.2959899}, timestamp = {Sun, 22 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/Alipour-FanidDW20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/AlmohriW020, author = {Hussain M. J. Almohri and Layne T. Watson and David Evans}, title = {Predictability of {IP} Address Allocations for Cloud Computing Platforms}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {15}, pages = {500--511}, year = {2020}, url = {https://doi.org/10.1109/TIFS.2019.2924555}, doi = {10.1109/TIFS.2019.2924555}, timestamp = {Thu, 06 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/AlmohriW020.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/AlmohriWE20, author = {Hussain M. J. Almohri and Layne T. Watson and David Evans}, title = {An Attack-Resilient Architecture for the Internet of Things}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {15}, pages = {3940--3954}, year = {2020}, url = {https://doi.org/10.1109/TIFS.2020.2994777}, doi = {10.1109/TIFS.2020.2994777}, timestamp = {Thu, 06 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/AlmohriWE20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/AlrabaeeDW20, author = {Saed Alrabaee and Mourad Debbabi and Lingyu Wang}, title = {{CPA:} Accurate Cross-Platform Binary Authorship Characterization Using {LDA}}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {15}, pages = {3051--3066}, year = {2020}, url = {https://doi.org/10.1109/TIFS.2020.2980190}, doi = {10.1109/TIFS.2020.2980190}, timestamp = {Thu, 06 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/AlrabaeeDW20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/AltinisikTS20, author = {Enes Altinisik and Kasim Tasdemir and Husrev Taha Sencar}, title = {Mitigation of {H.264} and {H.265} Video Compression for Reliable {PRNU} Estimation}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {15}, pages = {1557--1571}, year = {2020}, url = {https://doi.org/10.1109/TIFS.2019.2945190}, doi = {10.1109/TIFS.2019.2945190}, timestamp = {Mon, 26 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/AltinisikTS20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/AmeliHEY20, author = {Amir Ameli and Ali Hooshyar and Ehab F. El{-}Saadany and Amr M. Youssef}, title = {An Intrusion Detection Method for Line Current Differential Relays}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {15}, pages = {329--344}, year = {2020}, url = {https://doi.org/10.1109/TIFS.2019.2916331}, doi = {10.1109/TIFS.2019.2916331}, timestamp = {Thu, 06 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/AmeliHEY20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/AmeliSKES20, author = {Amir Ameli and Khaled A. Saleh and Aram Kirakosyan and Ehab F. El{-}Saadany and Magdy M. A. Salama}, title = {An Intrusion Detection Method for Line Current Differential Relays in Medium-Voltage {DC} Microgrids}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {15}, pages = {3580--3594}, year = {2020}, url = {https://doi.org/10.1109/TIFS.2020.2991892}, doi = {10.1109/TIFS.2020.2991892}, timestamp = {Thu, 06 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/AmeliSKES20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/ArafaSVP20, author = {Ahmed Arafa and Wonjae Shin and Mojtaba Vaezi and H. Vincent Poor}, title = {Secure Relaying in Non-Orthogonal Multiple Access: Trusted and Untrusted Scenarios}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {15}, pages = {210--222}, year = {2020}, url = {https://doi.org/10.1109/TIFS.2019.2911162}, doi = {10.1109/TIFS.2019.2911162}, timestamp = {Tue, 11 May 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/ArafaSVP20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/AroraPC20, author = {Anshul Arora and Sateesh Kumar Peddoju and Mauro Conti}, title = {PermPair: Android Malware Detection Using Permission Pairs}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {15}, pages = {1968--1982}, year = {2020}, url = {https://doi.org/10.1109/TIFS.2019.2950134}, doi = {10.1109/TIFS.2019.2950134}, timestamp = {Thu, 06 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/AroraPC20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/AvvaruZP20, author = {S. V. Sandeep Avvaru and Ziqing Zeng and Keshab K. Parhi}, title = {Homogeneous and Heterogeneous Feed-Forward {XOR} Physical Unclonable Functions}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {15}, pages = {2485--2498}, year = {2020}, url = {https://doi.org/10.1109/TIFS.2020.2968113}, doi = {10.1109/TIFS.2020.2968113}, timestamp = {Thu, 06 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/AvvaruZP20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/BacisVFPRS20, author = {Enrico Bacis and Sabrina De Capitani di Vimercati and Sara Foresti and Stefano Paraboschi and Marco Rosa and Pierangela Samarati}, title = {Securing Resources in Decentralized Cloud Storage}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {15}, pages = {286--298}, year = {2020}, url = {https://doi.org/10.1109/TIFS.2019.2916673}, doi = {10.1109/TIFS.2019.2916673}, timestamp = {Thu, 06 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/BacisVFPRS20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/BagHSR20, author = {Samiran Bag and Feng Hao and Siamak F. Shahandashti and Indranil Ghosh Ray}, title = {{SEAL:} Sealed-Bid Auction Without Auctioneers}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {15}, pages = {2042--2052}, year = {2020}, url = {https://doi.org/10.1109/TIFS.2019.2955793}, doi = {10.1109/TIFS.2019.2955793}, timestamp = {Mon, 12 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/BagHSR20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/BagheriS20, author = {Sima Bagheri and Alireza Shameli{-}Sendi}, title = {Dynamic Firewall Decomposition and Composition in the Cloud}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {15}, pages = {3526--3539}, year = {2020}, url = {https://doi.org/10.1109/TIFS.2020.2990786}, doi = {10.1109/TIFS.2020.2990786}, timestamp = {Fri, 11 Nov 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tifs/BagheriS20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/BajardMSZ20, author = {Jean{-}Claude Bajard and Paulo Martins and Leonel Sousa and Vincent Zucca}, title = {Improving the Efficiency of {SVM} Classification With {FHE}}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {15}, pages = {1709--1722}, year = {2020}, url = {https://doi.org/10.1109/TIFS.2019.2946097}, doi = {10.1109/TIFS.2019.2946097}, timestamp = {Mon, 20 Sep 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/BajardMSZ20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/BalakrishnanGBW20, author = {Sarankumar Balakrishnan and Shreya Gupta and Arupjyoti Bhuyan and Pu Wang and Dimitrios Koutsonikolas and Zhi Sun}, title = {Physical Layer Identification Based on Spatial-Temporal Beam Features for Millimeter-Wave Wireless Networks}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {15}, pages = {1831--1845}, year = {2020}, url = {https://doi.org/10.1109/TIFS.2019.2948283}, doi = {10.1109/TIFS.2019.2948283}, timestamp = {Thu, 06 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/BalakrishnanGBW20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/BasuHGK20, author = {Kanad Basu and Suha Sabi Hussain and Ujjwal Gupta and Ramesh Karri}, title = {{COPPTCHA:} {COPPA} Tracking by Checking Hardware-Level Activity}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {15}, pages = {3213--3226}, year = {2020}, url = {https://doi.org/10.1109/TIFS.2020.2983287}, doi = {10.1109/TIFS.2020.2983287}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/BasuHGK20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/BasuKKK20, author = {Kanad Basu and Prashanth Krishnamurthy and Farshad Khorrami and Ramesh Karri}, title = {A Theoretical Study of Hardware Performance Counters-Based Malware Detection}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {15}, pages = {512--525}, year = {2020}, url = {https://doi.org/10.1109/TIFS.2019.2924549}, doi = {10.1109/TIFS.2019.2924549}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/BasuKKK20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/BaurBSP20, author = {Sebastian Baur and Holger Boche and Rafael F. Schaefer and H. Vincent Poor}, title = {Secure Storage Capacity Under Rate Constraints - Continuity and Super Activation}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {15}, pages = {959--970}, year = {2020}, url = {https://doi.org/10.1109/TIFS.2019.2929945}, doi = {10.1109/TIFS.2019.2929945}, timestamp = {Sun, 22 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/BaurBSP20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/BesserLJJ20, author = {Karl{-}Ludwig Besser and Pin{-}Hsun Lin and Carsten R. Janda and Eduard A. Jorswieck}, title = {Wiretap Code Design by Neural Network Autoencoders}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {15}, pages = {3374--3386}, year = {2020}, url = {https://doi.org/10.1109/TIFS.2019.2945619}, doi = {10.1109/TIFS.2019.2945619}, timestamp = {Thu, 06 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/BesserLJJ20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/BocheSP20, author = {Holger Boche and Rafael F. Schaefer and H. Vincent Poor}, title = {Secure Communication and Identification Systems - Effective Performance Evaluation on Turing Machines}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {15}, pages = {1013--1025}, year = {2020}, url = {https://doi.org/10.1109/TIFS.2019.2932226}, doi = {10.1109/TIFS.2019.2932226}, timestamp = {Thu, 06 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/BocheSP20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/BorealeCV20, author = {Michele Boreale and Fabio Corradi and Cecilia Viscardi}, title = {Relative Privacy Threats and Learning From Anonymized Data}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {15}, pages = {1379--1393}, year = {2020}, url = {https://doi.org/10.1109/TIFS.2019.2937640}, doi = {10.1109/TIFS.2019.2937640}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/BorealeCV20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/BoudagdigueBKL20, author = {Chaimae Boudagdigue and Abderrahim Benslimane and Abdellatif Kobbane and Jiajia Liu}, title = {Trust Management in Industrial Internet of Things}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {15}, pages = {3667--3682}, year = {2020}, url = {https://doi.org/10.1109/TIFS.2020.2997179}, doi = {10.1109/TIFS.2020.2997179}, timestamp = {Tue, 21 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tifs/BoudagdigueBKL20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/BreierJHB20, author = {Jakub Breier and Dirmanto Jap and Xiaolu Hou and Shivam Bhasin}, title = {On Side Channel Vulnerabilities of Bit Permutations in Cryptographic Algorithms}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {15}, pages = {1072--1085}, year = {2020}, url = {https://doi.org/10.1109/TIFS.2019.2932230}, doi = {10.1109/TIFS.2019.2932230}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/BreierJHB20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/BuninGPSCP20, author = {Alexander Bunin and Ziv Goldfeld and Haim H. Permuter and Shlomo Shamai Shitz and Paul Cuff and Pablo Piantanida}, title = {Key and Message Semantic-Security Over State-Dependent Channels}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {15}, pages = {1541--1556}, year = {2020}, url = {https://doi.org/10.1109/TIFS.2018.2853108}, doi = {10.1109/TIFS.2018.2853108}, timestamp = {Mon, 20 Sep 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/BuninGPSCP20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/ButoraF20, author = {Jan Butora and Jessica J. Fridrich}, title = {Reverse {JPEG} Compatibility Attack}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {15}, pages = {1444--1454}, year = {2020}, url = {https://doi.org/10.1109/TIFS.2019.2940904}, doi = {10.1109/TIFS.2019.2940904}, timestamp = {Thu, 06 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/ButoraF20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/CaoO20, author = {Phuong Le Cao and Tobias J. Oechtering}, title = {Optimal Transmit Strategies for Gaussian {MISO} Wiretap Channels}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {15}, pages = {829--838}, year = {2020}, url = {https://doi.org/10.1109/TIFS.2019.2929474}, doi = {10.1109/TIFS.2019.2929474}, timestamp = {Thu, 06 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/CaoO20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/CaoWDLTG20, author = {Kunrui Cao and Buhong Wang and Haiyang Ding and Tengyao Li and Jiwei Tian and Fengkui Gong}, title = {Secure Transmission Designs for {NOMA} Systems Against Internal and External Eavesdropping}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {15}, pages = {2930--2943}, year = {2020}, url = {https://doi.org/10.1109/TIFS.2020.2980202}, doi = {10.1109/TIFS.2020.2980202}, timestamp = {Thu, 06 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/CaoWDLTG20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/CassiersS20, author = {Ga{\"{e}}tan Cassiers and Fran{\c{c}}ois{-}Xavier Standaert}, title = {Trivially and Efficiently Composing Masked Gadgets With Probe Isolating Non-Interference}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {15}, pages = {2542--2555}, year = {2020}, url = {https://doi.org/10.1109/TIFS.2020.2971153}, doi = {10.1109/TIFS.2020.2971153}, timestamp = {Thu, 06 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/CassiersS20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/ChangGHM20, author = {Donghoon Chang and Surabhi Garg and Munawar Hasan and Sweta Mishra}, title = {Cancelable Multi-Biometric Approach Using Fuzzy Extractor and Novel Bit-Wise Encryption}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {15}, pages = {3152--3167}, year = {2020}, url = {https://doi.org/10.1109/TIFS.2020.2983250}, doi = {10.1109/TIFS.2020.2983250}, timestamp = {Sun, 22 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/ChangGHM20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/ChenHLCRL20, author = {Haonan Chen and Guosheng Hu and Zhen Lei and Yaowu Chen and Neil Martin Robertson and Stan Z. Li}, title = {Attention-Based Two-Stream Convolutional Networks for Face Spoofing Detection}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {15}, pages = {578--593}, year = {2020}, url = {https://doi.org/10.1109/TIFS.2019.2922241}, doi = {10.1109/TIFS.2019.2922241}, timestamp = {Mon, 30 Oct 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tifs/ChenHLCRL20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/ChenLFHC20, author = {Changsheng Chen and Mulin Li and Anselmo Ferreira and Jiwu Huang and Rizhao Cai}, title = {A Copy-Proof Scheme Based on the Spectral and Spatial Barcoding Channel Models}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {15}, pages = {1056--1071}, year = {2020}, url = {https://doi.org/10.1109/TIFS.2019.2934861}, doi = {10.1109/TIFS.2019.2934861}, timestamp = {Thu, 06 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/ChenLFHC20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/ChenTZ20, author = {Juntao Chen and Corinne Touati and Quanyan Zhu}, title = {A Dynamic Game Approach to Strategic Design of Secure and Resilient Infrastructure Network}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {15}, pages = {462--474}, year = {2020}, url = {https://doi.org/10.1109/TIFS.2019.2924130}, doi = {10.1109/TIFS.2019.2924130}, timestamp = {Thu, 06 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/ChenTZ20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/ChoY20, author = {Wonwoo Cho and Nam Yul Yu}, title = {Secure and Efficient Compressed Sensing-Based Encryption With Sparse Matrices}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {15}, pages = {1999--2011}, year = {2020}, url = {https://doi.org/10.1109/TIFS.2019.2953383}, doi = {10.1109/TIFS.2019.2953383}, timestamp = {Sun, 22 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/ChoY20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/ChongEB20, author = {Penny Chong and Yuval Elovici and Alexander Binder}, title = {User Authentication Based on Mouse Dynamics Using Deep Neural Networks: {A} Comprehensive Study}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {15}, pages = {1086--1101}, year = {2020}, url = {https://doi.org/10.1109/TIFS.2019.2930429}, doi = {10.1109/TIFS.2019.2930429}, timestamp = {Thu, 06 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/ChongEB20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/ChowdhuryR20, author = {Anurag Chowdhury and Arun Ross}, title = {Fusing {MFCC} and {LPC} Features Using 1D Triplet {CNN} for Speaker Recognition in Severely Degraded Audio Signals}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {15}, pages = {1616--1629}, year = {2020}, url = {https://doi.org/10.1109/TIFS.2019.2941773}, doi = {10.1109/TIFS.2019.2941773}, timestamp = {Mon, 20 Sep 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/ChowdhuryR20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/CominettiS20, author = {Eduardo Lopes Cominetti and Marcos A. Simpl{\'{\i}}cio Jr.}, title = {Fast Additive Partially Homomorphic Encryption From the Approximate Common Divisor Problem}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {15}, pages = {2988--2998}, year = {2020}, url = {https://doi.org/10.1109/TIFS.2020.2981239}, doi = {10.1109/TIFS.2020.2981239}, timestamp = {Sun, 22 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/CominettiS20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/CozzolinoV20, author = {Davide Cozzolino and Luisa Verdoliva}, title = {Noiseprint: {A} CNN-Based Camera Model Fingerprint}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {15}, pages = {144--159}, year = {2020}, url = {https://doi.org/10.1109/TIFS.2019.2916364}, doi = {10.1109/TIFS.2019.2916364}, timestamp = {Sat, 05 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/CozzolinoV20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/CuiWWNY20, author = {Hui Cui and Zhiguo Wan and Xinlei Wei and Surya Nepal and Xun Yi}, title = {Pay as You Decrypt: Decryption Outsourcing for Functional Encryption Using Blockchain}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {15}, pages = {3227--3238}, year = {2020}, url = {https://doi.org/10.1109/TIFS.2020.2973864}, doi = {10.1109/TIFS.2020.2973864}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/CuiWWNY20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/CuiZZZL20, author = {Jie Cui and Xiaoyu Zhang and Hong Zhong and Jing Zhang and Lu Liu}, title = {Extensible Conditional Privacy Protection Authentication Scheme for Secure Vehicular Networks in a Multi-Cloud Environment}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {15}, pages = {1654--1667}, year = {2020}, url = {https://doi.org/10.1109/TIFS.2019.2946933}, doi = {10.1109/TIFS.2019.2946933}, timestamp = {Mon, 20 Sep 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/CuiZZZL20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/DEliaCPC20, author = {Daniele Cono D'Elia and Emilio Coppa and Federico Palmaro and Lorenzo Cavallaro}, title = {On the Dissection of Evasive Malware}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {15}, pages = {2750--2765}, year = {2020}, url = {https://doi.org/10.1109/TIFS.2020.2976559}, doi = {10.1109/TIFS.2020.2976559}, timestamp = {Thu, 06 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/DEliaCPC20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/DaiDCCZ020, author = {Weiqi Dai and Chunkai Dai and Kim{-}Kwang Raymond Choo and Changze Cui and Deqing Zou and Hai Jin}, title = {{SDTE:} {A} Secure Blockchain-Based Data Trading Ecosystem}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {15}, pages = {725--737}, year = {2020}, url = {https://doi.org/10.1109/TIFS.2019.2928256}, doi = {10.1109/TIFS.2019.2928256}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/DaiDCCZ020.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/DarsenaGIV20, author = {Donatella Darsena and Giacinto Gelli and Ivan Iudice and Francesco Verde}, title = {Design and Performance Analysis of Channel Estimators Under Pilot Spoofing Attacks in Multiple-Antenna Systems}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {15}, pages = {3255--3269}, year = {2020}, url = {https://doi.org/10.1109/TIFS.2020.2985548}, doi = {10.1109/TIFS.2020.2985548}, timestamp = {Thu, 06 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/DarsenaGIV20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/DeeradaPRA20, author = {Chonlatid Deerada and Krisada Phromsuthirak and Arucha Rungchokanun and Vutipong Areekul}, title = {Progressive Focusing Algorithm for Reliable Pose Estimation of Latent Fingerprints}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {15}, pages = {1232--1247}, year = {2020}, url = {https://doi.org/10.1109/TIFS.2019.2934865}, doi = {10.1109/TIFS.2019.2934865}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/DeeradaPRA20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/DengQWGDWZ20, author = {Hua Deng and Zheng Qin and Qianhong Wu and Zhenyu Guan and Robert H. Deng and Yujue Wang and Yunya Zhou}, title = {Identity-Based Encryption Transformation for Flexible Sharing of Encrypted Data in Public Cloud}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {15}, pages = {3168--3180}, year = {2020}, url = {https://doi.org/10.1109/TIFS.2020.2985532}, doi = {10.1109/TIFS.2020.2985532}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/DengQWGDWZ20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/DiazFRG20, author = {Mois{\'{e}}s D{\'{\i}}az and Miguel A. Ferrer and Soodamani Ramalingam and Richard M. Guest}, title = {Investigating the Common Authorship of Signatures by Off-Line Automatic Signature Verification Without the Use of Reference Signatures}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {15}, pages = {487--499}, year = {2020}, url = {https://doi.org/10.1109/TIFS.2019.2924195}, doi = {10.1109/TIFS.2019.2924195}, timestamp = {Thu, 06 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/DiazFRG20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/DinL20, author = {Fawad Ud Din and Fabrice Labeau}, title = {In-Band Full-Duplex Discriminatory Channel Estimation Using {MMSE}}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {15}, pages = {3283--3292}, year = {2020}, url = {https://doi.org/10.1109/TIFS.2020.2986885}, doi = {10.1109/TIFS.2020.2986885}, timestamp = {Thu, 06 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/DinL20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/DingF20, author = {Ni Ding and Farhad Farokhi}, title = {Developing Non-Stochastic Privacy-Preserving Policies Using Agglomerative Clustering}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {15}, pages = {3911--3923}, year = {2020}, url = {https://doi.org/10.1109/TIFS.2020.3002479}, doi = {10.1109/TIFS.2020.3002479}, timestamp = {Thu, 06 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/DingF20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/DingQWQYB20, author = {Tao Ding and Ming Qu and Xiong Wu and Boyu Qin and Yongheng Yang and Frede Blaabjerg}, title = {Defense Strategy for Resilient Shipboard Power Systems Considering Sequential Attacks}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {15}, pages = {3443--3453}, year = {2020}, url = {https://doi.org/10.1109/TIFS.2019.2960657}, doi = {10.1109/TIFS.2019.2960657}, timestamp = {Sat, 05 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/DingQWQYB20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/DuHW20, author = {Lingshuang Du and Haifeng Hu and Yongbo Wu}, title = {Cycle Age-Adversarial Model Based on Identity Preserving Network and Transfer Learning for Cross-Age Face Recognition}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {15}, pages = {2241--2252}, year = {2020}, url = {https://doi.org/10.1109/TIFS.2019.2960585}, doi = {10.1109/TIFS.2019.2960585}, timestamp = {Thu, 06 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/DuHW20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/DushkuRCMR20, author = {Edlira Dushku and Md Masoom Rabbani and Mauro Conti and Luigi V. Mancini and Silvio Ranise}, title = {{SARA:} Secure Asynchronous Remote Attestation for IoT Systems}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {15}, pages = {3123--3136}, year = {2020}, url = {https://doi.org/10.1109/TIFS.2020.2983282}, doi = {10.1109/TIFS.2020.2983282}, timestamp = {Thu, 06 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/DushkuRCMR20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/DuttaC20, author = {Hridoy Sankar Dutta and Tanmoy Chakraborty}, title = {Blackmarket-Driven Collusion Among Retweeters-Analysis, Detection, and Characterization}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {15}, pages = {1935--1944}, year = {2020}, url = {https://doi.org/10.1109/TIFS.2019.2953331}, doi = {10.1109/TIFS.2019.2953331}, timestamp = {Thu, 06 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/DuttaC20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/DuttaDAC20, author = {Hridoy Sankar Dutta and Vishal Raj Dutta and Aditya Adhikary and Tanmoy Chakraborty}, title = {HawkesEye: Detecting Fake Retweeters Using Hawkes Process and Topic Modeling}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {15}, pages = {2667--2678}, year = {2020}, url = {https://doi.org/10.1109/TIFS.2020.2970601}, doi = {10.1109/TIFS.2020.2970601}, timestamp = {Wed, 15 Dec 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tifs/DuttaDAC20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/ErozanHBAT20, author = {Ahmet Turan Erozan and Michael Hefenbrock and Michael Beigl and Jasmin Aghassi{-}Hagmann and Mehdi Baradaran Tahoori}, title = {Reverse Engineering of Printed Electronics Circuits: From Imaging to Netlist Extraction}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {15}, pages = {475--486}, year = {2020}, url = {https://doi.org/10.1109/TIFS.2019.2922237}, doi = {10.1109/TIFS.2019.2922237}, timestamp = {Thu, 06 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/ErozanHBAT20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/EsmaeilpourCK20, author = {Mohammad Esmaeilpour and Patrick Cardinal and Alessandro Lameiras Koerich}, title = {A Robust Approach for Securing Audio Classification Against Adversarial Attacks}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {15}, pages = {2147--2159}, year = {2020}, url = {https://doi.org/10.1109/TIFS.2019.2956591}, doi = {10.1109/TIFS.2019.2956591}, timestamp = {Thu, 06 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/EsmaeilpourCK20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/FanHZHCL20, author = {Chun{-}I Fan and Jheng{-}Jia Huang and Min{-}Zhe Zhong and Ruei{-}Hau Hsu and Wen{-}Tsuen Chen and Jemin Lee}, title = {ReHand: Secure Region-Based Fast Handover With User Anonymity for Small Cell Networks in Mobile Communications}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {15}, pages = {927--942}, year = {2020}, url = {https://doi.org/10.1109/TIFS.2019.2931076}, doi = {10.1109/TIFS.2019.2931076}, timestamp = {Thu, 06 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/FanHZHCL20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/FengCLJX20, author = {Jingyi Feng and Hua Chen and Yang Li and Zhipeng Jiao and Wei Xi}, title = {A Framework for Evaluation and Analysis on Infection Countermeasures Against Fault Attacks}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {15}, pages = {391--406}, year = {2020}, url = {https://doi.org/10.1109/TIFS.2019.2903653}, doi = {10.1109/TIFS.2019.2903653}, timestamp = {Tue, 21 Feb 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tifs/FengCLJX20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/FengHLWC20, author = {Qi Feng and Debiao He and Zhe Liu and Huaqun Wang and Kim{-}Kwang Raymond Choo}, title = {SecureNLP: {A} System for Multi-Party Privacy-Preserving Natural Language Processing}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {15}, pages = {3709--3721}, year = {2020}, url = {https://doi.org/10.1109/TIFS.2020.2997134}, doi = {10.1109/TIFS.2020.2997134}, timestamp = {Thu, 06 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/FengHLWC20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/FlowersBH20, author = {Bryse Flowers and R. Michael Buehrer and William C. Headley}, title = {Evaluating Adversarial Evasion Attacks in the Context of Wireless Communications}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {15}, pages = {1102--1113}, year = {2020}, url = {https://doi.org/10.1109/TIFS.2019.2934069}, doi = {10.1109/TIFS.2019.2934069}, timestamp = {Thu, 06 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/FlowersBH20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/FormbyB20, author = {David Formby and Raheem Beyah}, title = {Temporal Execution Behavior for Host Anomaly Detection in Programmable Logic Controllers}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {15}, pages = {1455--1469}, year = {2020}, url = {https://doi.org/10.1109/TIFS.2019.2940890}, doi = {10.1109/TIFS.2019.2940890}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/FormbyB20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/FroelicherTSH20, author = {David Froelicher and Juan Ram{\'{o}}n Troncoso{-}Pastoriza and Joao Sa Sousa and Jean{-}Pierre Hubaux}, title = {Drynx: Decentralized, Secure, Verifiable System for Statistical Queries and Machine Learning on Distributed Datasets}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {15}, pages = {3035--3050}, year = {2020}, url = {https://doi.org/10.1109/TIFS.2020.2976612}, doi = {10.1109/TIFS.2020.2976612}, timestamp = {Wed, 15 Dec 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tifs/FroelicherTSH20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/GangwalC20, author = {Ankit Gangwal and Mauro Conti}, title = {Cryptomining Cannot Change Its Spots: Detecting Covert Cryptomining Using Magnetic Side-Channel}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {15}, pages = {1630--1639}, year = {2020}, url = {https://doi.org/10.1109/TIFS.2019.2945171}, doi = {10.1109/TIFS.2019.2945171}, timestamp = {Tue, 16 Aug 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/GangwalC20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/GeorgeMGNAM20, author = {Anjith George and Zohreh Mostaani and David Geissenbuhler and Olegs Nikisins and Andr{\'{e}} Anjos and S{\'{e}}bastien Marcel}, title = {Biometric Face Presentation Attack Detection With Multi-Channel Convolutional Neural Network}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {15}, pages = {42--55}, year = {2020}, url = {https://doi.org/10.1109/TIFS.2019.2916652}, doi = {10.1109/TIFS.2019.2916652}, timestamp = {Wed, 07 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tifs/GeorgeMGNAM20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/GhammamKLA20, author = {Loubna Ghammam and Koray Karabina and Patrick Lacharme and Kevin Atighehchi}, title = {A Cryptanalysis of Two Cancelable Biometric Schemes Based on Index-of-Max Hashing}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {15}, pages = {2869--2880}, year = {2020}, url = {https://doi.org/10.1109/TIFS.2020.2977533}, doi = {10.1109/TIFS.2020.2977533}, timestamp = {Thu, 06 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/GhammamKLA20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/GokAA20, author = {Gokhan Gok and Yasar Kemal Alp and Orhan Arikan}, title = {A New Method for Specific Emitter Identification With Results on Real Radar Measurements}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {15}, pages = {3335--3346}, year = {2020}, url = {https://doi.org/10.1109/TIFS.2020.2988558}, doi = {10.1109/TIFS.2020.2988558}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/GokAA20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/GongXL20, author = {Jialiang Gong and Xiaodong Xu and Yingke Lei}, title = {Unsupervised Specific Emitter Identification Method Using Radio-Frequency Fingerprint Embedded InfoGAN}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {15}, pages = {2898--2913}, year = {2020}, url = {https://doi.org/10.1109/TIFS.2020.2978620}, doi = {10.1109/TIFS.2020.2978620}, timestamp = {Fri, 06 Aug 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/GongXL20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/GrecoPSV20, author = {Antonio Greco and Nicolai Petkov and Alessia Saggese and Mario Vento}, title = {AReN: {A} Deep Learning Approach for Sound Event Recognition Using a Brain Inspired Representation}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {15}, pages = {3610--3624}, year = {2020}, url = {https://doi.org/10.1109/TIFS.2020.2994740}, doi = {10.1109/TIFS.2020.2994740}, timestamp = {Fri, 28 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/GrecoPSV20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/GuCXLV20, author = {Zhifang Gu and He Henry Chen and Pingping Xu and Yonghui Li and Branka Vucetic}, title = {Physical Layer Authentication for Non-Coherent Massive SIMO-Enabled Industrial IoT Communications}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {15}, pages = {3722--3733}, year = {2020}, url = {https://doi.org/10.1109/TIFS.2020.2998947}, doi = {10.1109/TIFS.2020.2998947}, timestamp = {Thu, 06 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/GuCXLV20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/GuerriniDL20, author = {Fabrizio Guerrini and Marco Dalai and Riccardo Leonardi}, title = {Minimal Information Exchange for Secure Image Hash-Based Geometric Transformations Estimation}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {15}, pages = {3482--3496}, year = {2020}, url = {https://doi.org/10.1109/TIFS.2020.2990793}, doi = {10.1109/TIFS.2020.2990793}, timestamp = {Thu, 06 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/GuerriniDL20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/GuoQGZLJW20, author = {Wei Guo and Su{-}Juan Qin and Fei Gao and Hua Zhang and Wenmin Li and Zhengping Jin and Qiaoyan Wen}, title = {Comments on "Provable Multicopy Dynamic Data Possession in Cloud Computing Systems"}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {15}, pages = {2584--2586}, year = {2020}, url = {https://doi.org/10.1109/TIFS.2020.2970591}, doi = {10.1109/TIFS.2020.2970591}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/GuoQGZLJW20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/GuoXLY20, author = {Shangwei Guo and Tao Xiang and Xiaoguo Li and Ying Yang}, title = {{PEID:} {A} Perceptually Encrypted Image Database for Visual Security Evaluation}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {15}, pages = {1151--1163}, year = {2020}, url = {https://doi.org/10.1109/TIFS.2019.2935415}, doi = {10.1109/TIFS.2019.2935415}, timestamp = {Wed, 10 Jan 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tifs/GuoXLY20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/GuoZT20, author = {Tao Guo and Ruida Zhou and Chao Tian}, title = {On the Information Leakage in Private Information Retrieval Systems}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {15}, pages = {2999--3012}, year = {2020}, url = {https://doi.org/10.1109/TIFS.2020.2981282}, doi = {10.1109/TIFS.2020.2981282}, timestamp = {Fri, 23 Oct 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/GuoZT20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/GuriZBE20, author = {Mordechai Guri and Boris Zadov and Dima Bykhovsky and Yuval Elovici}, title = {PowerHammer: Exfiltrating Data From Air-Gapped Computers Through Power Lines}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {15}, pages = {1879--1890}, year = {2020}, url = {https://doi.org/10.1109/TIFS.2019.2952257}, doi = {10.1109/TIFS.2019.2952257}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/GuriZBE20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/GuriZE20, author = {Mordechai Guri and Boris Zadov and Yuval Elovici}, title = {{ODINI:} Escaping Sensitive Data From Faraday-Caged, Air-Gapped Computers via Magnetic Fields}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {15}, pages = {1190--1203}, year = {2020}, url = {https://doi.org/10.1109/TIFS.2019.2938404}, doi = {10.1109/TIFS.2019.2938404}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/GuriZE20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/HaddadCMC20, author = {Sahar Haddad and Gouenou Coatrieux and Alexandre Moreau{-}Gaudry and Michel Cozic}, title = {Joint Watermarking-Encryption-JPEG-LS for Medical Image Reliability Control in Encrypted and Compressed Domains}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {15}, pages = {2556--2569}, year = {2020}, url = {https://doi.org/10.1109/TIFS.2020.2972159}, doi = {10.1109/TIFS.2020.2972159}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/HaddadCMC20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/HafemannSO20, author = {Luiz G. Hafemann and Robert Sabourin and Luiz S. Oliveira}, title = {Meta-Learning for Fast Classifier Adaptation to New Users of Signature Verification Systems}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {15}, pages = {1735--1745}, year = {2020}, url = {https://doi.org/10.1109/TIFS.2019.2949425}, doi = {10.1109/TIFS.2019.2949425}, timestamp = {Mon, 20 Sep 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/HafemannSO20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/HanCSTWW20, author = {Jinguang Han and Liqun Chen and Steve A. Schneider and Helen Treharne and Stephan Wesemeyer and Nick Wilson}, title = {Anonymous Single Sign-On With Proxy Re-Verification}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {15}, pages = {223--236}, year = {2020}, url = {https://doi.org/10.1109/TIFS.2019.2919926}, doi = {10.1109/TIFS.2019.2919926}, timestamp = {Sun, 06 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/HanCSTWW20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/HanSX20, author = {Qian Han and V. S. Subrahmanian and Yanhai Xiong}, title = {Android Malware Detection via (Somewhat) Robust Irreversible Feature Transformations}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {15}, pages = {3511--3525}, year = {2020}, url = {https://doi.org/10.1109/TIFS.2020.2975932}, doi = {10.1109/TIFS.2020.2975932}, timestamp = {Tue, 21 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tifs/HanSX20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/HanXHC20, author = {Yunxia Han and Chunxiang Xu and Debiao He and Kefei Chen}, title = {On the Security of a Key Agreement and Key Protection Scheme}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {15}, pages = {3293--3294}, year = {2020}, url = {https://doi.org/10.1109/TIFS.2020.2986881}, doi = {10.1109/TIFS.2020.2986881}, timestamp = {Thu, 06 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/HanXHC20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/HayashiV20, author = {Masahito Hayashi and {\'{A}}ngeles V{\'{a}}zquez{-}Castro}, title = {Physical Layer Security Protocol for Poisson Channels for Passive Man-in-the-Middle Attack}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {15}, pages = {2295--2305}, year = {2020}, url = {https://doi.org/10.1109/TIFS.2019.2963771}, doi = {10.1109/TIFS.2019.2963771}, timestamp = {Tue, 28 Jun 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/HayashiV20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/HeBLCGR20, author = {Anxiao He and Kai Bu and Yucong Li and Eikoh Chida and Qianping Gu and Kui Ren}, title = {Atomos: Constant-Size Path Validation Proof}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {15}, pages = {3832--3847}, year = {2020}, url = {https://doi.org/10.1109/TIFS.2020.3001669}, doi = {10.1109/TIFS.2020.3001669}, timestamp = {Thu, 06 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/HeBLCGR20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/HeC20, author = {Wenguang He and Zhanchuan Cai}, title = {An Insight Into Pixel Value Ordering Prediction-Based Prediction-Error Expansion}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {15}, pages = {3859--3871}, year = {2020}, url = {https://doi.org/10.1109/TIFS.2020.3002377}, doi = {10.1109/TIFS.2020.3002377}, timestamp = {Thu, 06 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/HeC20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/HeCT20, author = {Junhui He and Junxi Chen and Shaohua Tang}, title = {Reversible Data Hiding in {JPEG} Images Based on Negative Influence Models}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {15}, pages = {2121--2133}, year = {2020}, url = {https://doi.org/10.1109/TIFS.2019.2958758}, doi = {10.1109/TIFS.2019.2958758}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/HeCT20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/HeLSJS20, author = {Ji He and Jia Liu and Yulong Shen and Xiaohong Jiang and Norio Shiratori}, title = {Link Selection for Security-QoS Tradeoffs in Buffer-Aided Relaying Networks}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {15}, pages = {1347--1362}, year = {2020}, url = {https://doi.org/10.1109/TIFS.2019.2939738}, doi = {10.1109/TIFS.2019.2939738}, timestamp = {Wed, 18 Aug 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/HeLSJS20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/HeS20, author = {Sheng He and Lambert Schomaker}, title = {FragNet: Writer Identification Using Deep Fragment Networks}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {15}, pages = {3013--3022}, year = {2020}, url = {https://doi.org/10.1109/TIFS.2020.2981236}, doi = {10.1109/TIFS.2020.2981236}, timestamp = {Mon, 26 Oct 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tifs/HeS20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/HeW20, author = {Boxiang He and Fanggang Wang}, title = {Cooperative Specific Emitter Identification via Multiple Distorted Receivers}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {15}, pages = {3791--3806}, year = {2020}, url = {https://doi.org/10.1109/TIFS.2020.3001721}, doi = {10.1109/TIFS.2020.3001721}, timestamp = {Thu, 06 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/HeW20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/HongJGH20, author = {Yuanquan Hong and Xiaojun Jing and Hui Gao and Yuan He}, title = {Fixed Region Beamforming Using Frequency Diverse Subarray for Secure mmWave Wireless Communications}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {15}, pages = {2706--2721}, year = {2020}, url = {https://doi.org/10.1109/TIFS.2020.2969576}, doi = {10.1109/TIFS.2020.2969576}, timestamp = {Fri, 16 Sep 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/HongJGH20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/HristeaT20, author = {Cristian Hristea and Ferucio Laurentiu Tiplea}, title = {Privacy of Stateful {RFID} Systems With Constant Tag Identifiers}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {15}, pages = {1920--1934}, year = {2020}, url = {https://doi.org/10.1109/TIFS.2019.2953398}, doi = {10.1109/TIFS.2019.2953398}, timestamp = {Thu, 06 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/HristeaT20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/HsiaoSC20, author = {Shun{-}Wen Hsiao and Yeali S. Sun and Meng Chang Chen}, title = {Hardware-Assisted {MMU} Redirection for In-Guest Monitoring and {API} Profiling}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {15}, pages = {2402--2416}, year = {2020}, url = {https://doi.org/10.1109/TIFS.2020.2969514}, doi = {10.1109/TIFS.2020.2969514}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/HsiaoSC20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/HuWCMB20, author = {Qin Hu and Shengling Wang and Xiuzhen Cheng and Liran Ma and Rongfang Bie}, title = {Solving the Crowdsourcing Dilemma Using the Zero-Determinant Strategies}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {15}, pages = {1778--1789}, year = {2020}, url = {https://doi.org/10.1109/TIFS.2019.2949440}, doi = {10.1109/TIFS.2019.2949440}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/HuWCMB20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/HuXCMFZY20, author = {Guilei Hu and Yang Xiao and Zhiguo Cao and Lubin Meng and Zhiwen Fang and Joey Tianyi Zhou and Junsong Yuan}, title = {Towards Real-Time Eyeblink Detection in the Wild: Dataset, Theory and Practices}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {15}, pages = {2194--2208}, year = {2020}, url = {https://doi.org/10.1109/TIFS.2019.2959978}, doi = {10.1109/TIFS.2019.2959978}, timestamp = {Tue, 25 May 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/HuXCMFZY20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/HuaZ20, author = {Guang Hua and Haijian Zhang}, title = {{ENF} Signal Enhancement in Audio Recordings}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {15}, pages = {1868--1878}, year = {2020}, url = {https://doi.org/10.1109/TIFS.2019.2952264}, doi = {10.1109/TIFS.2019.2952264}, timestamp = {Thu, 10 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/HuaZ20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/HuangH20, author = {Kai Huang and Yun He}, title = {Trigger Identification Using Difference-Amplified Controllability and Dynamic Transition Probability for Hardware Trojan Detection}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {15}, pages = {3387--3400}, year = {2020}, url = {https://doi.org/10.1109/TIFS.2019.2946044}, doi = {10.1109/TIFS.2019.2946044}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/HuangH20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/HuangHGCG20, author = {Zonghao Huang and Rui Hu and Yuanxiong Guo and Eric Chan{-}Tin and Yanmin Gong}, title = {{DP-ADMM:} ADMM-Based Distributed Learning With Differential Privacy}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {15}, pages = {1002--1012}, year = {2020}, url = {https://doi.org/10.1109/TIFS.2019.2931068}, doi = {10.1109/TIFS.2019.2931068}, timestamp = {Wed, 11 May 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/HuangHGCG20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/HuangLBH20, author = {Yuankun Huang and Bin Li and Mauro Barni and Jiwu Huang}, title = {Identification of VoIP Speech With Multiple Domain Deep Features}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {15}, pages = {2253--2267}, year = {2020}, url = {https://doi.org/10.1109/TIFS.2019.2960635}, doi = {10.1109/TIFS.2019.2960635}, timestamp = {Thu, 06 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/HuangLBH20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/IbrahimLSCK20, author = {Mohamed Ibrahim and Tung{-}Che Liang and Kristin Scott and Krishnendu Chakrabarty and Ramesh Karri}, title = {Molecular Barcoding as a Defense Against Benchtop Biochemical Attacks on {DNA} Fingerprinting and Information Forensics}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {15}, pages = {3595--3609}, year = {2020}, url = {https://doi.org/10.1109/TIFS.2020.2994742}, doi = {10.1109/TIFS.2020.2994742}, timestamp = {Thu, 06 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/IbrahimLSCK20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/ImJL20, author = {Jong{-}Hyuk Im and Seong{-}Yun Jeon and Mun{-}Kyu Lee}, title = {Practical Privacy-Preserving Face Authentication for Smartphones Secure Against Malicious Clients}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {15}, pages = {2386--2401}, year = {2020}, url = {https://doi.org/10.1109/TIFS.2020.2969513}, doi = {10.1109/TIFS.2020.2969513}, timestamp = {Thu, 06 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/ImJL20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/JatiGCSC20, author = {Arpan Jati and Naina Gupta and Anupam Chattopadhyay and Somitra Kumar Sanadhya and Donghoon Chang}, title = {Threshold Implementations of {\textless}tt{\textgreater}GIFT{\textless}/tt{\textgreater}: {A} Trade-Off Analysis}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {15}, pages = {2110--2120}, year = {2020}, url = {https://doi.org/10.1109/TIFS.2019.2957974}, doi = {10.1109/TIFS.2019.2957974}, timestamp = {Thu, 06 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/JatiGCSC20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/JiangXS0H20, author = {Xinghao Jiang and Qiang Xu and Tanfeng Sun and Bin Li and Peisong He}, title = {Detection of {HEVC} Double Compression With the Same Coding Parameters Based on Analysis of Intra Coding Quality Degradation Process}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {15}, pages = {250--263}, year = {2020}, url = {https://doi.org/10.1109/TIFS.2019.2918085}, doi = {10.1109/TIFS.2019.2918085}, timestamp = {Thu, 06 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/JiangXS0H20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/JoshiK20, author = {Sharad Joshi and Nitin Khanna}, title = {Source Printer Classification Using Printer Specific Local Texture Descriptor}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {15}, pages = {160--171}, year = {2020}, url = {https://doi.org/10.1109/TIFS.2019.2919869}, doi = {10.1109/TIFS.2019.2919869}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/JoshiK20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/KangLH20, author = {Jin Sung Kang and Yuri A. Lawryshyn and Dimitrios Hatzinakos}, title = {Neural Network Architecture and Transient Evoked Otoacoustic Emission {(TEOAE)} Biometrics for Identification and Verification}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {15}, pages = {1858--1867}, year = {2020}, url = {https://doi.org/10.1109/TIFS.2019.2951310}, doi = {10.1109/TIFS.2019.2951310}, timestamp = {Thu, 02 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tifs/KangLH20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/KangLLD20, author = {Wenxiong Kang and Hongda Liu and Wei Luo and Feiqi Deng}, title = {Study of a Full-View 3D Finger Vein Verification Technique}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {15}, pages = {1175--1189}, year = {2020}, url = {https://doi.org/10.1109/TIFS.2019.2928507}, doi = {10.1109/TIFS.2019.2928507}, timestamp = {Sat, 09 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/KangLLD20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/KangS0F20, author = {Jian Kang and Douglas Steiert and Dan Lin and Yanjie Fu}, title = {MoveWithMe: Location Privacy Preservation for Smartphone Users}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {15}, pages = {711--724}, year = {2020}, url = {https://doi.org/10.1109/TIFS.2019.2928205}, doi = {10.1109/TIFS.2019.2928205}, timestamp = {Thu, 06 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/KangS0F20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/KangYGPS20, author = {Heedo Kang and Vinod Yegneswaran and Shalini Ghosh and Phillip A. Porras and Seungwon Shin}, title = {Automated Permission Model Generation for Securing {SDN} Control-Plane}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {15}, pages = {1668--1682}, year = {2020}, url = {https://doi.org/10.1109/TIFS.2019.2946928}, doi = {10.1109/TIFS.2019.2946928}, timestamp = {Tue, 16 Aug 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/KangYGPS20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/KarimiTC20, author = {Ali Karimi and Abbas Taherpour and Danijela Cabric}, title = {Smart Traffic-Aware Primary User Emulation Attack and Its Impact on Secondary User Throughput Under Rayleigh Flat Fading Channel}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {15}, pages = {66--80}, year = {2020}, url = {https://doi.org/10.1109/TIFS.2019.2911168}, doi = {10.1109/TIFS.2019.2911168}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/KarimiTC20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/KimLOJ20, author = {Miran Kim and Junghye Lee and Lucila Ohno{-}Machado and Xiaoqian Jiang}, title = {Secure and Differentially Private Logistic Regression for Horizontally Distributed Data}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {15}, pages = {695--710}, year = {2020}, url = {https://doi.org/10.1109/TIFS.2019.2925496}, doi = {10.1109/TIFS.2019.2925496}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/KimLOJ20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/KimS20, author = {Kwang{-}Yul Kim and Yoan Shin}, title = {Analysis on Cross-Correlation Coefficient for Survivability of Chirp Spread Spectrum Systems}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {15}, pages = {1959--1967}, year = {2020}, url = {https://doi.org/10.1109/TIFS.2019.2953332}, doi = {10.1109/TIFS.2019.2953332}, timestamp = {Thu, 06 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/KimS20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/KimYL20, author = {Minchul Kim and Heecheol Yang and Jungwoo Lee}, title = {Private Coded Matrix Multiplication}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {15}, pages = {1434--1443}, year = {2020}, url = {https://doi.org/10.1109/TIFS.2019.2940895}, doi = {10.1109/TIFS.2019.2940895}, timestamp = {Wed, 26 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/KimYL20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/KokulFSRP20, author = {Thanikasalam Kokul and Clinton Fookes and Sridha Sridharan and Amirthalingam Ramanan and Amalka Pinidiyaarachchi}, title = {Target-Specific Siamese Attention Network for Real-Time Object Tracking}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {15}, pages = {1276--1289}, year = {2020}, url = {https://doi.org/10.1109/TIFS.2019.2935871}, doi = {10.1109/TIFS.2019.2935871}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/KokulFSRP20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/KrishnamurthyKK20, author = {Prashanth Krishnamurthy and Ramesh Karri and Farshad Khorrami}, title = {Anomaly Detection in Real-Time Multi-Threaded Processes Using Hardware Performance Counters}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {15}, pages = {666--680}, year = {2020}, url = {https://doi.org/10.1109/TIFS.2019.2923577}, doi = {10.1109/TIFS.2019.2923577}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/KrishnamurthyKK20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/KurtY020, author = {Mehmet Necip Kurt and Yasin Yilmaz and Xiaodong Wang}, title = {Secure Distributed Dynamic State Estimation in Wide-Area Smart Grids}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {15}, pages = {800--815}, year = {2020}, url = {https://doi.org/10.1109/TIFS.2019.2928207}, doi = {10.1109/TIFS.2019.2928207}, timestamp = {Thu, 06 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/KurtY020.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/KuzuPMC20, author = {Ridvan Salih Kuzu and Emanuela Piciucco and Emanuele Maiorana and Patrizio Campisi}, title = {On-the-Fly Finger-Vein-Based Biometric Recognition Using Deep Neural Networks}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {15}, pages = {2641--2654}, year = {2020}, url = {https://doi.org/10.1109/TIFS.2020.2971144}, doi = {10.1109/TIFS.2020.2971144}, timestamp = {Thu, 06 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/KuzuPMC20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/KwonKYC20, author = {Hyun Kwon and Yongchul Kim and Hyunsoo Yoon and Daeseon Choi}, title = {Selective Audio Adversarial Example in Evasion Attack on Speech Recognition System}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {15}, pages = {526--538}, year = {2020}, url = {https://doi.org/10.1109/TIFS.2019.2925452}, doi = {10.1109/TIFS.2019.2925452}, timestamp = {Thu, 06 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/KwonKYC20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/KwonNLHH20, author = {Hyunsoo Kwon and Hyunjae Nam and Sangtae Lee and Changhee Hahn and Junbeom Hur}, title = {(In-)Security of Cookies in {HTTPS:} Cookie Theft by Removing Cookie Flags}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {15}, pages = {1204--1215}, year = {2020}, url = {https://doi.org/10.1109/TIFS.2019.2938416}, doi = {10.1109/TIFS.2019.2938416}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/KwonNLHH20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/LSSBC20, author = {Navaneet K. L. and Ravi Kiran Sarvadevabhatla and Shashank Shekhar and R. Venkatesh Babu and Anirban Chakraborty}, title = {Operator-in-the-Loop Deep Sequential Multi-Camera Feature Fusion for Person Re-Identification}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {15}, pages = {2375--2385}, year = {2020}, url = {https://doi.org/10.1109/TIFS.2019.2957701}, doi = {10.1109/TIFS.2019.2957701}, timestamp = {Tue, 25 Jul 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/LSSBC20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/LaiZJ20, author = {Songxuan Lai and Yecheng Zhu and Lianwen Jin}, title = {Encoding Pathlet and {SIFT} Features With Bagged {VLAD} for Historical Writer Identification}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {15}, pages = {3553--3566}, year = {2020}, url = {https://doi.org/10.1109/TIFS.2020.2991880}, doi = {10.1109/TIFS.2020.2991880}, timestamp = {Thu, 06 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/LaiZJ20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/LanRCC20, author = {Xiaolong Lan and Juanjuan Ren and Qingchun Chen and Lin Cai}, title = {Achievable Secrecy Rate Region for Buffer-Aided Multiuser {MISO} Systems}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {15}, pages = {3311--3324}, year = {2020}, url = {https://doi.org/10.1109/TIFS.2020.2988567}, doi = {10.1109/TIFS.2020.2988567}, timestamp = {Mon, 03 Jan 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tifs/LanRCC20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/LeeLC20, author = {Kisong Lee and Jin{-}Taek Lim and Hyun{-}Ho Choi}, title = {Impact of Outdated {CSI} on the Secrecy Performance of Wireless-Powered Untrusted Relay Networks}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {15}, pages = {1423--1433}, year = {2020}, url = {https://doi.org/10.1109/TIFS.2019.2940906}, doi = {10.1109/TIFS.2019.2940906}, timestamp = {Thu, 06 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/LeeLC20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/LejbolleNKM20, author = {Aske R. Lejb{\o}lle and Kamal Nasrollahi and Benjamin Krogh and Thomas B. Moeslund}, title = {Person Re-Identification Using Spatial and Layer-Wise Attention}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {15}, pages = {1216--1231}, year = {2020}, url = {https://doi.org/10.1109/TIFS.2019.2938870}, doi = {10.1109/TIFS.2019.2938870}, timestamp = {Sat, 05 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/LejbolleNKM20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/LetafatiKB20, author = {Mehdi Letafati and Ali Kuhestani and Hamid Behroozi}, title = {Three-Hop Untrusted Relay Networks With Hardware Imperfections and Channel Estimation Errors for Internet of Things}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {15}, pages = {2856--2868}, year = {2020}, url = {https://doi.org/10.1109/TIFS.2020.2978627}, doi = {10.1109/TIFS.2020.2978627}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/LetafatiKB20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/Li020, author = {Quanzhong Li and Liang Yang}, title = {Beamforming for Cooperative Secure Transmission in Cognitive Two-Way Relay Networks}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {15}, pages = {130--143}, year = {2020}, url = {https://doi.org/10.1109/TIFS.2019.2918431}, doi = {10.1109/TIFS.2019.2918431}, timestamp = {Thu, 06 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/Li020.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/LiL20, author = {Deqiang Li and Qianmu Li}, title = {Adversarial Deep Ensemble: Evasion Attacks and Defenses for Malware Detection}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {15}, pages = {3886--3900}, year = {2020}, url = {https://doi.org/10.1109/TIFS.2020.3003571}, doi = {10.1109/TIFS.2020.3003571}, timestamp = {Thu, 06 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/LiL20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/LiLL20, author = {Xiong Li and Shanpeng Liu and Rongxing Lu}, title = {Comments on "A Public Auditing Protocol With Novel Dynamic Structure for Cloud Data"}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {15}, pages = {2881--2883}, year = {2020}, url = {https://doi.org/10.1109/TIFS.2020.2978592}, doi = {10.1109/TIFS.2020.2978592}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/LiLL20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/LiPST20, author = {Jing Li and Yuangang Pan and Yulei Sui and Ivor W. Tsang}, title = {Secure Metric Learning via Differential Pairwise Privacy}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {15}, pages = {3640--3652}, year = {2020}, url = {https://doi.org/10.1109/TIFS.2020.2997183}, doi = {10.1109/TIFS.2020.2997183}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/LiPST20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/LiTWLH20, author = {Zhihang Li and Xu Tang and Xiang Wu and Jingtuo Liu and Ran He}, title = {Progressively Refined Face Detection Through Semantics-Enriched Representation Learning}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {15}, pages = {1394--1406}, year = {2020}, url = {https://doi.org/10.1109/TIFS.2019.2941800}, doi = {10.1109/TIFS.2019.2941800}, timestamp = {Fri, 26 Jan 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tifs/LiTWLH20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/LiXFWZ20, author = {Xinyu Li and Jing Xu and Xiong Fan and Yuchen Wang and Zhenfeng Zhang}, title = {Puncturable Signatures and Applications in Proof-of-Stake Blockchain Protocols}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {15}, pages = {3872--3885}, year = {2020}, url = {https://doi.org/10.1109/TIFS.2020.3001738}, doi = {10.1109/TIFS.2020.3001738}, timestamp = {Tue, 04 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/LiXFWZ20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/LiXWYYH20, author = {Shaohua Li and Kaiping Xue and David S. L. Wei and Hao Yue and Nenghai Yu and Peilin Hong}, title = {SecGrid: {A} Secure and Efficient SGX-Enabled Smart Grid System With Rich Functionalities}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {15}, pages = {1318--1330}, year = {2020}, url = {https://doi.org/10.1109/TIFS.2019.2938875}, doi = {10.1109/TIFS.2019.2938875}, timestamp = {Thu, 21 Dec 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tifs/LiXWYYH20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/LiY0AZ020, author = {Donghe Li and Qingyu Yang and Wei Yu and Dou An and Yang Zhang and Wei Zhao}, title = {Towards Differential Privacy-Based Online Double Auction for Smart Grid}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {15}, pages = {971--986}, year = {2020}, url = {https://doi.org/10.1109/TIFS.2019.2932911}, doi = {10.1109/TIFS.2019.2932911}, timestamp = {Thu, 06 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/LiY0AZ020.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/Liang0L20, author = {Yuan Liang and Jian Ren and Tongtong Li}, title = {Secure {OFDM} System Design and Capacity Analysis Under Disguised Jamming}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {15}, pages = {738--752}, year = {2020}, url = {https://doi.org/10.1109/TIFS.2019.2929449}, doi = {10.1109/TIFS.2019.2929449}, timestamp = {Thu, 06 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/Liang0L20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/LiangL20, author = {Yuan Liang and Tongtong Li}, title = {On the Discreteness of the Worst Jamming Distribution for {SP-OFDM}}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {15}, pages = {2884--2897}, year = {2020}, url = {https://doi.org/10.1109/TIFS.2020.2978616}, doi = {10.1109/TIFS.2020.2978616}, timestamp = {Thu, 06 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/LiangL20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/LiangLCJXY20, author = {Hongliang Liang and Mingyu Li and Yixiu Chen and Lin Jiang and Zhuosi Xie and Tianqi Yang}, title = {Establishing Trusted {I/O} Paths for {SGX} Client Systems With Aurora}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {15}, pages = {1589--1600}, year = {2020}, url = {https://doi.org/10.1109/TIFS.2019.2945621}, doi = {10.1109/TIFS.2019.2945621}, timestamp = {Wed, 22 Jun 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/LiangLCJXY20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/LimPXC20, author = {Hoon Wei Lim and Geong Sen Poh and Jia Xu and Varsha Chittawar}, title = {\emph{PrivateLink}: Privacy-Preserving Integration and Sharing of Datasets}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {15}, pages = {564--577}, year = {2020}, url = {https://doi.org/10.1109/TIFS.2019.2924201}, doi = {10.1109/TIFS.2019.2924201}, timestamp = {Thu, 06 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/LimPXC20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/LimSJ20, author = {Sehee Lim and Byungkyu Song and Seong{-}Ook Jung}, title = {Highly Independent MTJ-Based {PUF} System Using Diode-Connected Transistor and Two-Step Postprocessing for Improved Response Stability}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {15}, pages = {2798--2807}, year = {2020}, url = {https://doi.org/10.1109/TIFS.2020.2976623}, doi = {10.1109/TIFS.2020.2976623}, timestamp = {Thu, 06 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/LimSJ20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/LimcharoenKN20, author = {Piya Limcharoen and Nirattaya Khamsemanan and Cholwich Nattee}, title = {View-Independent Gait Recognition Using Joint Replacement Coordinates (JRCs) and Convolutional Neural Network}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {15}, pages = {3430--3442}, year = {2020}, url = {https://doi.org/10.1109/TIFS.2020.2985535}, doi = {10.1109/TIFS.2020.2985535}, timestamp = {Mon, 03 Jan 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tifs/LimcharoenKN20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/LinHHKC20, author = {Chao Lin and Debiao He and Xinyi Huang and Muhammad Khurram Khan and Kim{-}Kwang Raymond Choo}, title = {{DCAP:} {A} Secure and Efficient Decentralized Conditional Anonymous Payment System Based on Blockchain}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {15}, pages = {2440--2452}, year = {2020}, url = {https://doi.org/10.1109/TIFS.2020.2969565}, doi = {10.1109/TIFS.2020.2969565}, timestamp = {Thu, 24 Feb 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tifs/LinHHKC20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/LiuCLSQ20, author = {Lin Liu and Rongmao Chen and Ximeng Liu and Jinshu Su and Linbo Qiao}, title = {Towards Practical Privacy-Preserving Decision Tree Training and Evaluation in the Cloud}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {15}, pages = {2914--2929}, year = {2020}, url = {https://doi.org/10.1109/TIFS.2020.2980192}, doi = {10.1109/TIFS.2020.2980192}, timestamp = {Sun, 21 Jan 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tifs/LiuCLSQ20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/LiuGYK20, author = {Xiaofeng Liu and Zhenhua Guo and Jane You and B. V. K. Vijaya Kumar}, title = {Dependency-Aware Attention Control for Image Set-Based Face Recognition}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {15}, pages = {1501--1512}, year = {2020}, url = {https://doi.org/10.1109/TIFS.2019.2938418}, doi = {10.1109/TIFS.2019.2938418}, timestamp = {Mon, 20 Sep 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/LiuGYK20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/LiuK20, author = {Xudong Liu and Sang Wu Kim}, title = {Harnessing Node Multiplicity for Detecting and Mitigating False Data in Wireless Relay Networks}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {15}, pages = {3067--3078}, year = {2020}, url = {https://doi.org/10.1109/TIFS.2020.2980199}, doi = {10.1109/TIFS.2020.2980199}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/LiuK20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/LiuLH20, author = {Xiang Liu and Teng Joon Lim and Jie Huang}, title = {Optimal Byzantine Attacker Identification Based on Game Theory in Network Coding Enabled Wireless Ad Hoc Networks}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {15}, pages = {2570--2583}, year = {2020}, url = {https://doi.org/10.1109/TIFS.2020.2972129}, doi = {10.1109/TIFS.2020.2972129}, timestamp = {Thu, 19 Jan 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tifs/LiuLH20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/LiuLLS20, author = {Rang Liu and Ming Li and Qian Liu and A. Lee Swindlehurst}, title = {Secure Symbol-Level Precoding in {MU-MISO} Wiretap Systems}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {15}, pages = {3359--3373}, year = {2020}, url = {https://doi.org/10.1109/TIFS.2020.2988127}, doi = {10.1109/TIFS.2020.2988127}, timestamp = {Sun, 12 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tifs/LiuLLS20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/LiuLSZL20, author = {Yang Liu and Ting Liu and Hong Sun and Kehuan Zhang and Pengfei Liu}, title = {Hidden Electricity Theft by Exploiting Multiple-Pricing Scheme in Smart Grids}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {15}, pages = {2453--2468}, year = {2020}, url = {https://doi.org/10.1109/TIFS.2020.2965276}, doi = {10.1109/TIFS.2020.2965276}, timestamp = {Thu, 06 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/LiuLSZL20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/MaJZTP20, author = {Fei Ma and Xiao{-}Yuan Jing and Xiao Zhu and Zhenmin Tang and Zhiping Peng}, title = {True-Color and Grayscale Video Person Re-Identification}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {15}, pages = {115--129}, year = {2020}, url = {https://doi.org/10.1109/TIFS.2019.2917160}, doi = {10.1109/TIFS.2019.2917160}, timestamp = {Mon, 26 Oct 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tifs/MaJZTP20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/MandelliBVT20, author = {Sara Mandelli and Paolo Bestagini and Luisa Verdoliva and Stefano Tubaro}, title = {Facing Device Attribution Problem for Stabilized Video Sequences}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {15}, pages = {14--27}, year = {2020}, url = {https://doi.org/10.1109/TIFS.2019.2918644}, doi = {10.1109/TIFS.2019.2918644}, timestamp = {Thu, 06 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/MandelliBVT20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/MaternRS20, author = {Falko Matern and Christian Riess and Marc Stamminger}, title = {Gradient-Based Illumination Description for Image Forgery Detection}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {15}, pages = {1303--1317}, year = {2020}, url = {https://doi.org/10.1109/TIFS.2019.2935913}, doi = {10.1109/TIFS.2019.2935913}, timestamp = {Thu, 06 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/MaternRS20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/MatkowskiCK20, author = {Wojciech Michal Matkowski and Tingting Chai and Adams Wai{-}Kin Kong}, title = {Palmprint Recognition in Uncontrolled and Uncooperative Environment}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {15}, pages = {1601--1615}, year = {2020}, url = {https://doi.org/10.1109/TIFS.2019.2945183}, doi = {10.1109/TIFS.2019.2945183}, timestamp = {Tue, 26 Jan 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tifs/MatkowskiCK20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/MayerS20, author = {Owen Mayer and Matthew C. Stamm}, title = {Forensic Similarity for Digital Images}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {15}, pages = {1331--1346}, year = {2020}, url = {https://doi.org/10.1109/TIFS.2019.2924552}, doi = {10.1109/TIFS.2019.2924552}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/MayerS20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/MingZCLYZ20, author = {Jingdian Ming and Yongbin Zhou and Wei Cheng and Huizhong Li and Guang Yang and Qian Zhang}, title = {Mind the Balance: Revealing the Vulnerabilities in Low Entropy Masking Schemes}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {15}, pages = {3694--3708}, year = {2020}, url = {https://doi.org/10.1109/TIFS.2020.2994775}, doi = {10.1109/TIFS.2020.2994775}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/MingZCLYZ20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/MirandaKBGK20, author = {Christian Miranda and Georges Kaddoum and Elias Bou{-}Harb and Sahil Garg and Kuljeet Kaur}, title = {A Collaborative Security Framework for Software-Defined Wireless Sensor Networks}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {15}, pages = {2602--2615}, year = {2020}, url = {https://doi.org/10.1109/TIFS.2020.2973875}, doi = {10.1109/TIFS.2020.2973875}, timestamp = {Tue, 16 Aug 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/MirandaKBGK20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/MutanganaT20, author = {Jean de Dieu Mutangana and Ravi Tandon}, title = {Blind {MIMO} Cooperative Jamming: Secrecy via {ISI} Heterogeneity Without {CSIT}}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {15}, pages = {447--461}, year = {2020}, url = {https://doi.org/10.1109/TIFS.2019.2923340}, doi = {10.1109/TIFS.2019.2923340}, timestamp = {Thu, 06 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/MutanganaT20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/NaghizadehL20, author = {Parinaz Naghizadeh and Mingyan Liu}, title = {Using Private and Public Assessments in Security Information Sharing Agreements}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {15}, pages = {1801--1814}, year = {2020}, url = {https://doi.org/10.1109/TIFS.2019.2950125}, doi = {10.1109/TIFS.2019.2950125}, timestamp = {Thu, 06 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/NaghizadehL20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/NathBBR20, author = {Atul Prasad Deb Nath and Srivalli Boddupalli and Swarup Bhunia and Sandip Ray}, title = {Resilient System-on-Chip Designs With NoC Fabrics}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {15}, pages = {2808--2823}, year = {2020}, url = {https://doi.org/10.1109/TIFS.2020.2977534}, doi = {10.1109/TIFS.2020.2977534}, timestamp = {Thu, 06 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/NathBBR20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/Nieto20, author = {Ana Nieto}, title = {Becoming {JUDAS:} Correlating Users and Devices During a Digital Investigation}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {15}, pages = {3325--3334}, year = {2020}, url = {https://doi.org/10.1109/TIFS.2020.2988602}, doi = {10.1109/TIFS.2020.2988602}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/Nieto20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/OsorioAO20, author = {Diana Pamela Moya Osorio and Hirley Alves and Edgar Eduardo Benitez Olivo}, title = {On the Secrecy Performance and Power Allocation in Relaying Networks With Untrusted Relay in the Partial Secrecy Regime}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {15}, pages = {2268--2281}, year = {2020}, url = {https://doi.org/10.1109/TIFS.2019.2959920}, doi = {10.1109/TIFS.2019.2959920}, timestamp = {Thu, 06 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/OsorioAO20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/PalaniswamyCFP20, author = {Basker Palaniswamy and Seyit Camtepe and Ernest Foo and Josef Pieprzyk}, title = {An Efficient Authentication Scheme for Intra-Vehicular Controller Area Network}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {15}, pages = {3107--3122}, year = {2020}, url = {https://doi.org/10.1109/TIFS.2020.2983285}, doi = {10.1109/TIFS.2020.2983285}, timestamp = {Thu, 06 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/PalaniswamyCFP20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/PangCWL20, author = {Meng Pang and Yiu{-}Ming Cheung and Binghui Wang and Jian Lou}, title = {Synergistic Generic Learning for Face Recognition From a Contaminated Single Sample per Person}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {15}, pages = {195--209}, year = {2020}, url = {https://doi.org/10.1109/TIFS.2019.2919950}, doi = {10.1109/TIFS.2019.2919950}, timestamp = {Thu, 03 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/PangCWL20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/PapadamouGXSZCT20, author = {Kostantinos Papadamou and Steven Gevers and Christos Xenakis and Michael Sirivianos and Savvas Zannettou and Bogdan Chifor and Sorin Teican and George Gugulea and Alberto Caponi and Annamaria Recupero and Claudio Pisa and Giuseppe Bianchi}, title = {Killing the Password and Preserving Privacy With Device-Centric and Attribute-Based Authentication}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {15}, pages = {2183--2193}, year = {2020}, url = {https://doi.org/10.1109/TIFS.2019.2958763}, doi = {10.1109/TIFS.2019.2958763}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/PapadamouGXSZCT20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/PengW0G20, author = {Chunlei Peng and Nannan Wang and Jie Li and Xinbo Gao}, title = {Face Sketch Synthesis in the Wild via Deep Patch Representation-Based Probabilistic Graphical Model}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {15}, pages = {172--183}, year = {2020}, url = {https://doi.org/10.1109/TIFS.2019.2916633}, doi = {10.1109/TIFS.2019.2916633}, timestamp = {Mon, 20 Sep 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/PengW0G20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/PintoGFCPR20, author = {Allan da Silva Pinto and Siome Goldenstein and Alexandre M. Ferreira and Tiago J. Carvalho and H{\'{e}}lio Pedrini and Anderson Rocha}, title = {Leveraging Shape, Reflectance and Albedo From Shading for Face Presentation Attack Detection}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {15}, pages = {3347--3358}, year = {2020}, url = {https://doi.org/10.1109/TIFS.2020.2988168}, doi = {10.1109/TIFS.2020.2988168}, timestamp = {Fri, 24 Feb 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tifs/PintoGFCPR20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/PraseedT20, author = {Amit Praseed and P. Santhi Thilagam}, title = {Multiplexed Asymmetric Attacks: Next-Generation DDoS on {HTTP/2} Servers}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {15}, pages = {1790--1800}, year = {2020}, url = {https://doi.org/10.1109/TIFS.2019.2950121}, doi = {10.1109/TIFS.2019.2950121}, timestamp = {Thu, 06 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/PraseedT20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/QinLWLGG20, author = {Tao Qin and Zhaoli Liu and Pinghui Wang and Shancang Li and Xiaohong Guan and Lixin Gao}, title = {Symmetry Degree Measurement and its Applications to Anomaly Detection}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {15}, pages = {1040--1055}, year = {2020}, url = {https://doi.org/10.1109/TIFS.2019.2933731}, doi = {10.1109/TIFS.2019.2933731}, timestamp = {Mon, 29 Jan 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tifs/QinLWLGG20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/RassouliG20, author = {Borzoo Rassouli and Deniz G{\"{u}}nd{\"{u}}z}, title = {Optimal Utility-Privacy Trade-Off With Total Variation Distance as a Privacy Measure}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {15}, pages = {594--603}, year = {2020}, url = {https://doi.org/10.1109/TIFS.2019.2903658}, doi = {10.1109/TIFS.2019.2903658}, timestamp = {Thu, 06 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/RassouliG20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/RassouliRG20, author = {Borzoo Rassouli and Fernando E. Rosas and Deniz G{\"{u}}nd{\"{u}}z}, title = {Data Disclosure Under Perfect Sample Privacy}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {15}, pages = {2012--2025}, year = {2020}, url = {https://doi.org/10.1109/TIFS.2019.2954652}, doi = {10.1109/TIFS.2019.2954652}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/RassouliRG20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/RavivK20, author = {Netanel Raviv and David A. Karpuk}, title = {Private Polynomial Computation From Lagrange Encoding}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {15}, pages = {553--563}, year = {2020}, url = {https://doi.org/10.1109/TIFS.2019.2925723}, doi = {10.1109/TIFS.2019.2925723}, timestamp = {Thu, 06 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/RavivK20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/RenLGZL20, author = {Chuan{-}Xian Ren and Bo{-}Hua Liang and Pengfei Ge and Yiming Zhai and Zhen Lei}, title = {Domain Adaptive Person Re-Identification via Camera Style Generation and Label Propagation}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {15}, pages = {1290--1302}, year = {2020}, url = {https://doi.org/10.1109/TIFS.2019.2939750}, doi = {10.1109/TIFS.2019.2939750}, timestamp = {Sun, 12 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tifs/RenLGZL20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/SahaJRCBM20, author = {Sayandeep Saha and Dirmanto Jap and Debapriya Basu Roy and Avik Chakraborty and Shivam Bhasin and Debdeep Mukhopadhyay}, title = {A Framework to Counter Statistical Ineffective Fault Analysis of Block Ciphers Using Domain Transformation and Error Correction}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {15}, pages = {1905--1919}, year = {2020}, url = {https://doi.org/10.1109/TIFS.2019.2952262}, doi = {10.1109/TIFS.2019.2952262}, timestamp = {Sun, 22 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/SahaJRCBM20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/SalamatianHBCM20, author = {Salman Salamatian and Wasim Huleihel and Ahmad Beirami and Asaf Cohen and Muriel M{\'{e}}dard}, title = {Centralized vs Decentralized Targeted Brute-Force Attacks: Guessing With Side-Information}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {15}, pages = {3749--3759}, year = {2020}, url = {https://doi.org/10.1109/TIFS.2020.2998949}, doi = {10.1109/TIFS.2020.2998949}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/SalamatianHBCM20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/SaxenaCCC20, author = {Neetesh Saxena and Mauro Conti and Kim{-}Kwang Raymond Choo and Narendra S. Chaudhari}, title = {{BAS-VAS:} {A} Novel Secure Protocol for Value Added Service Delivery to Mobile Devices}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {15}, pages = {1470--1485}, year = {2020}, url = {https://doi.org/10.1109/TIFS.2019.2940908}, doi = {10.1109/TIFS.2019.2940908}, timestamp = {Thu, 21 Jan 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tifs/SaxenaCCC20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/ScherhagRMB20, author = {Ulrich Scherhag and Christian Rathgeb and Johannes Merkle and Christoph Busch}, title = {Deep Face Representations for Differential Morphing Attack Detection}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {15}, pages = {3625--3639}, year = {2020}, url = {https://doi.org/10.1109/TIFS.2020.2994750}, doi = {10.1109/TIFS.2020.2994750}, timestamp = {Thu, 27 Jul 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/ScherhagRMB20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/SehaH20, author = {Sherif Nagib Abbas Seha and Dimitrios Hatzinakos}, title = {EEG-Based Human Recognition Using Steady-State AEPs and Subject-Unique Spatial Filters}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {15}, pages = {3901--3910}, year = {2020}, url = {https://doi.org/10.1109/TIFS.2020.3001729}, doi = {10.1109/TIFS.2020.3001729}, timestamp = {Thu, 06 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/SehaH20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/ShamsabadiGHC20, author = {Ali Shahin Shamsabadi and Adri{\`{a}} Gasc{\'{o}}n and Hamed Haddadi and Andrea Cavallaro}, title = {PrivEdge: From Local to Distributed Private Training and Prediction}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {15}, pages = {3819--3831}, year = {2020}, url = {https://doi.org/10.1109/TIFS.2020.2988132}, doi = {10.1109/TIFS.2020.2988132}, timestamp = {Thu, 06 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/ShamsabadiGHC20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/ShaoCZW20, author = {Guo{-}lin Shao and Xingshu Chen and Xuemei Zeng and Lina Wang}, title = {Deep Learning Hierarchical Representation From Heterogeneous Flow-Level Communication Data}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {15}, pages = {1525--1540}, year = {2020}, url = {https://doi.org/10.1109/TIFS.2019.2943236}, doi = {10.1109/TIFS.2019.2943236}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/ShaoCZW20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/SharifzadehAS20, author = {Mehdi Sharifzadeh and Mohammed Aloraini and Dan Schonfeld}, title = {Adaptive Batch Size Image Merging Steganography and Quantized Gaussian Image Steganography}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {15}, pages = {867--879}, year = {2020}, url = {https://doi.org/10.1109/TIFS.2019.2929441}, doi = {10.1109/TIFS.2019.2929441}, timestamp = {Thu, 06 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/SharifzadehAS20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/ShenXXXZ20, author = {Zhexian Shen and Kui Xu and Xiaochen Xia and Wei Xie and Dongmei Zhang}, title = {Spatial Sparsity Based Secure Transmission Strategy for Massive {MIMO} Systems Against Simultaneous Jamming and Eavesdropping}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {15}, pages = {3760--3774}, year = {2020}, url = {https://doi.org/10.1109/TIFS.2020.3002386}, doi = {10.1109/TIFS.2020.3002386}, timestamp = {Wed, 22 Jun 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/ShenXXXZ20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/Shim20, author = {Kyung{-}Ah Shim}, title = {Comments on "Revocable and Scalable Certificateless Remote Authentication Protocol With Anonymity for Wireless Body Area Networks"}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {15}, pages = {81--82}, year = {2020}, url = {https://doi.org/10.1109/TIFS.2018.2871761}, doi = {10.1109/TIFS.2018.2871761}, timestamp = {Thu, 06 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/Shim20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/ShimK20, author = {Kyung{-}Ah Shim and Namhun Koo}, title = {Algebraic Fault Analysis of {UOV} and Rainbow With the Leakage of Random Vinegar Values}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {15}, pages = {2429--2439}, year = {2020}, url = {https://doi.org/10.1109/TIFS.2020.2969555}, doi = {10.1109/TIFS.2020.2969555}, timestamp = {Fri, 09 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/ShimK20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/SiabiB20, author = {Babak Siabi and Mehdi Berenjkoub}, title = {Comments on "Unconditionally Secure, Universally Composable Privacy Preserving Linear Algebra"}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {15}, pages = {83--84}, year = {2020}, url = {https://doi.org/10.1109/TIFS.2019.2912068}, doi = {10.1109/TIFS.2019.2912068}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/SiabiB20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/SironeS20, author = {Deepak Sirone and Pramod Subramanyan}, title = {Functional Analysis Attacks on Logic Locking}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {15}, pages = {2514--2527}, year = {2020}, url = {https://doi.org/10.1109/TIFS.2020.2968183}, doi = {10.1109/TIFS.2020.2968183}, timestamp = {Thu, 06 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/SironeS20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/SoltaniGTH20, author = {Ramin Soltani and Dennis Goeckel and Don Towsley and Amir Houmansadr}, title = {Fundamental Limits of Invisible Flow Fingerprinting}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {15}, pages = {345--360}, year = {2020}, url = {https://doi.org/10.1109/TIFS.2019.2919870}, doi = {10.1109/TIFS.2019.2919870}, timestamp = {Thu, 06 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/SoltaniGTH20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/Song00SLJG20, author = {Bo Song and Xu Wang and Wei Ni and Yurong Song and Ren Ping Liu and Guoping Jiang and Y. Jay Guo}, title = {Reliability Analysis of Large-Scale Adaptive Weighted Networks}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {15}, pages = {651--665}, year = {2020}, url = {https://doi.org/10.1109/TIFS.2019.2926193}, doi = {10.1109/TIFS.2019.2926193}, timestamp = {Thu, 06 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/Song00SLJG20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/SongLWL20, author = {Haina Song and Tao Luo and Xun Wang and Jianfeng Li}, title = {Multiple Sensitive Values-Oriented Personalized Privacy Preservation Based on Randomized Response}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {15}, pages = {2209--2224}, year = {2020}, url = {https://doi.org/10.1109/TIFS.2019.2959911}, doi = {10.1109/TIFS.2019.2959911}, timestamp = {Tue, 29 Dec 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tifs/SongLWL20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/SongWT20, author = {Yang Song and Chong Xiao Wang and Wee Peng Tay}, title = {Compressive Privacy for a Linear Dynamical System}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {15}, pages = {895--910}, year = {2020}, url = {https://doi.org/10.1109/TIFS.2019.2930366}, doi = {10.1109/TIFS.2019.2930366}, timestamp = {Fri, 29 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/SongWT20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/Suarez-TangilEP20, author = {Guillermo Suarez{-}Tangil and Matthew Edwards and Claudia Peersman and Gianluca Stringhini and Awais Rashid and Monica T. Whitty}, title = {Automatically Dismantling Online Dating Fraud}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {15}, pages = {1128--1137}, year = {2020}, url = {https://doi.org/10.1109/TIFS.2019.2930479}, doi = {10.1109/TIFS.2019.2930479}, timestamp = {Fri, 09 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/Suarez-TangilEP20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/SubramaniHANM20, author = {Kiruba Sankaran Subramani and Noha M. Helal and Angelos Antonopoulos and Aria Nosratinia and Yiorgos Makris}, title = {Amplitude-Modulating Analog/RF Hardware Trojans in Wireless Networks: Risks and Remedies}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {15}, pages = {3497--3510}, year = {2020}, url = {https://doi.org/10.1109/TIFS.2020.2990792}, doi = {10.1109/TIFS.2020.2990792}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/SubramaniHANM20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/SunCTF20, author = {Liang Sun and Lu Cao and Zhiyao Tang and Yong Feng}, title = {Artificial-Noise-Aided Secure Multi-User Multi-Antenna Transmission With Quantized {CSIT:} {A} Comprehensive Design and Analysis}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {15}, pages = {3734--3748}, year = {2020}, url = {https://doi.org/10.1109/TIFS.2020.2998942}, doi = {10.1109/TIFS.2020.2998942}, timestamp = {Thu, 06 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/SunCTF20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/SunLCD20, author = {Yi Sun and Qian Liu and Xingyuan Chen and Xuehui Du}, title = {An Adaptive Authenticated Data Structure With Privacy-Preserving for Big Data Stream in Cloud}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {15}, pages = {3295--3310}, year = {2020}, url = {https://doi.org/10.1109/TIFS.2020.2986879}, doi = {10.1109/TIFS.2020.2986879}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/SunLCD20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/SunSCHK20, author = {Wenyun Sun and Yu Song and Changsheng Chen and Jiwu Huang and Alex C. Kot}, title = {Face Spoofing Detection Based on Local Ternary Label Supervision in Fully Convolutional Networks}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {15}, pages = {3181--3196}, year = {2020}, url = {https://doi.org/10.1109/TIFS.2020.2985530}, doi = {10.1109/TIFS.2020.2985530}, timestamp = {Thu, 06 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/SunSCHK20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/SunTSST20, author = {Yunlian Sun and Jinhui Tang and Xiangbo Shu and Zhenan Sun and Massimo Tistarelli}, title = {Facial Age Synthesis With Label Distribution-Guided Generative Adversarial Network}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {15}, pages = {2679--2691}, year = {2020}, url = {https://doi.org/10.1109/TIFS.2020.2975921}, doi = {10.1109/TIFS.2020.2975921}, timestamp = {Tue, 08 Mar 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tifs/SunTSST20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/SunTST20, author = {Yunlian Sun and Jinhui Tang and Zhenan Sun and Massimo Tistarelli}, title = {Facial Age and Expression Synthesis Using Ordinal Ranking Adversarial Networks}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {15}, pages = {2960--2972}, year = {2020}, url = {https://doi.org/10.1109/TIFS.2020.2980792}, doi = {10.1109/TIFS.2020.2980792}, timestamp = {Tue, 08 Mar 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tifs/SunTST20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/TahmasbiB20, author = {Mehrdad Tahmasbi and Matthieu R. Bloch}, title = {Covert Secret Key Generation With an Active Warden}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {15}, pages = {1026--1039}, year = {2020}, url = {https://doi.org/10.1109/TIFS.2019.2932906}, doi = {10.1109/TIFS.2019.2932906}, timestamp = {Thu, 06 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/TahmasbiB20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/TajeddineWH20, author = {Razane Tajeddine and Antonia Wachter{-}Zeh and Camilla Hollanti}, title = {Private Information Retrieval Over Random Linear Networks}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {15}, pages = {790--799}, year = {2020}, url = {https://doi.org/10.1109/TIFS.2019.2928483}, doi = {10.1109/TIFS.2019.2928483}, timestamp = {Thu, 06 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/TajeddineWH20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/TanK20, author = {Hanzhuo Tan and Ajay Kumar}, title = {Towards More Accurate Contactless Fingerprint Minutiae Extraction and Pose-Invariant Matching}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {15}, pages = {3924--3937}, year = {2020}, url = {https://doi.org/10.1109/TIFS.2020.3001732}, doi = {10.1109/TIFS.2020.3001732}, timestamp = {Thu, 06 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/TanK20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/TanLWX20, author = {Xinrui Tan and Hongjia Li and Liming Wang and Zhen Xu}, title = {Comments on "Dropping Activation Outputs with Localized First-Layer Deep Network for Enhancing User Privacy and Data Security"}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {15}, pages = {3938--3939}, year = {2020}, url = {https://doi.org/10.1109/TIFS.2020.2988156}, doi = {10.1109/TIFS.2020.2988156}, timestamp = {Sun, 31 Dec 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tifs/TanLWX20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/TaspinarMM20, author = {Samet Taspinar and Manoranjan Mohanty and Nasir D. Memon}, title = {Camera Fingerprint Extraction via Spatial Domain Averaged Frames}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {15}, pages = {3270--3282}, year = {2020}, url = {https://doi.org/10.1109/TIFS.2020.2985544}, doi = {10.1109/TIFS.2020.2985544}, timestamp = {Thu, 06 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/TaspinarMM20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/TestaBM20, author = {Matteo Testa and Tiziano Bianchi and Enrico Magli}, title = {Secrecy Analysis of Finite-Precision Compressive Cryptosystems}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {15}, pages = {1--13}, year = {2020}, url = {https://doi.org/10.1109/TIFS.2019.2918089}, doi = {10.1109/TIFS.2019.2918089}, timestamp = {Thu, 06 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/TestaBM20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/TolosanaGBO20, author = {Ruben Tolosana and Marta Gomez{-}Barrero and Christoph Busch and Javier Ortega{-}Garcia}, title = {Biometric Presentation Attack Detection: Beyond the Visible Spectrum}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {15}, pages = {1261--1275}, year = {2020}, url = {https://doi.org/10.1109/TIFS.2019.2934867}, doi = {10.1109/TIFS.2019.2934867}, timestamp = {Mon, 06 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tifs/TolosanaGBO20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/TolosanaVFO20, author = {Ruben Tolosana and Rub{\'{e}}n Vera{-}Rodr{\'{\i}}guez and Julian Fi{\'{e}}rrez and Javier Ortega{-}Garcia}, title = {BioTouchPass2: Touchscreen Password Biometrics Using Time-Aligned Recurrent Neural Networks}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {15}, pages = {2616--2628}, year = {2020}, url = {https://doi.org/10.1109/TIFS.2020.2973832}, doi = {10.1109/TIFS.2020.2973832}, timestamp = {Mon, 06 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tifs/TolosanaVFO20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/TruongSLG20, author = {Nguyen Binh Truong and Kai Sun and Gyu Myoung Lee and Yike Guo}, title = {GDPR-Compliant Personal Data Management: {A} Blockchain-Based Solution}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {15}, pages = {1746--1761}, year = {2020}, url = {https://doi.org/10.1109/TIFS.2019.2948287}, doi = {10.1109/TIFS.2019.2948287}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/TruongSLG20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/TsengW20, author = {Bo{-}Wei Tseng and Pei{-}Yuan Wu}, title = {Compressive Privacy Generative Adversarial Network}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {15}, pages = {2499--2513}, year = {2020}, url = {https://doi.org/10.1109/TIFS.2020.2968188}, doi = {10.1109/TIFS.2020.2968188}, timestamp = {Thu, 06 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/TsengW20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/TuLGMGZ20, author = {Chenyang Tu and Zeyi Liu and Neng Gao and Cunqing Ma and Jingquan Ge and Lingchen Zhang}, title = {{MACM:} How to Reduce the Multi-Round {SCA} to the Single-Round Attack on the Feistel-SP Networks}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {15}, pages = {3079--3092}, year = {2020}, url = {https://doi.org/10.1109/TIFS.2019.2959910}, doi = {10.1109/TIFS.2019.2959910}, timestamp = {Thu, 06 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/TuLGMGZ20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/UzunS20, author = {Erkam Uzun and H{\"{u}}srev T. Sencar}, title = {Jpg\emph{Scraper}: An Advanced Carver for {JPEG} Files}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {15}, pages = {1846--1857}, year = {2020}, url = {https://doi.org/10.1109/TIFS.2019.2953382}, doi = {10.1109/TIFS.2019.2953382}, timestamp = {Thu, 06 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/UzunS20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/Vazquez-PadinFS20, author = {David V{\'{a}}zquez{-}Pad{\'{\i}}n and Marco Fontani and Dasara Shullani and Fernando P{\'{e}}rez{-}Gonz{\'{a}}lez and Alessandro Piva and Mauro Barni}, title = {Video Integrity Verification and {GOP} Size Estimation Via Generalized Variation of Prediction Footprint}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {15}, pages = {1815--1830}, year = {2020}, url = {https://doi.org/10.1109/TIFS.2019.2951313}, doi = {10.1109/TIFS.2019.2951313}, timestamp = {Thu, 06 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/Vazquez-PadinFS20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/WaliaJBS20, author = {Gurjit Singh Walia and Gaurav Jain and Nipun Bansal and Kuldeep Singh}, title = {Adaptive Weighted Graph Approach to Generate Multimodal Cancelable Biometric Templates}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {15}, pages = {1945--1958}, year = {2020}, url = {https://doi.org/10.1109/TIFS.2019.2954779}, doi = {10.1109/TIFS.2019.2954779}, timestamp = {Fri, 16 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/WaliaJBS20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/WangB20, author = {Zisheng Wang and Rick S. Blum}, title = {A Statistical Learning-Based Algorithm for Topology Verification in Natural Gas Networks Based on Noisy Sensor Measurements}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {15}, pages = {3653--3666}, year = {2020}, url = {https://doi.org/10.1109/TIFS.2020.2998943}, doi = {10.1109/TIFS.2020.2998943}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/WangB20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/WangCWM20, author = {Xu An Wang and Kim{-}Kwang Raymond Choo and Jian Weng and Jianfeng Ma}, title = {Comments on "Publicly Verifiable Computation of Polynomials Over Outsourced Data With Multiple Sources"}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {15}, pages = {1586--1588}, year = {2020}, url = {https://doi.org/10.1109/TIFS.2019.2936971}, doi = {10.1109/TIFS.2019.2936971}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tifs/WangCWM20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/WangG20, author = {Qiangchang Wang and Guodong Guo}, title = {{LS-CNN:} Characterizing Local Patches at Multiple Scales for Face Recognition}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {15}, pages = {1640--1653}, year = {2020}, url = {https://doi.org/10.1109/TIFS.2019.2946938}, doi = {10.1109/TIFS.2019.2946938}, timestamp = {Mon, 20 Sep 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/WangG20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/WangJADZ20, author = {Ning Wang and Long Jiao and Amir Alipour{-}Fanid and Monireh Dabaghchian and Kai Zeng}, title = {Pilot Contamination Attack Detection for {NOMA} in 5G mm-Wave Massive {MIMO} Networks}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {15}, pages = {1363--1378}, year = {2020}, url = {https://doi.org/10.1109/TIFS.2019.2939742}, doi = {10.1109/TIFS.2019.2939742}, timestamp = {Mon, 26 Oct 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tifs/WangJADZ20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/WangLZZW20, author = {Qian Wang and Zixi Li and Qin Zou and Lingchen Zhao and Song Wang}, title = {Deep Domain Adaptation With Differential Privacy}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {15}, pages = {3093--3106}, year = {2020}, url = {https://doi.org/10.1109/TIFS.2020.2983254}, doi = {10.1109/TIFS.2020.2983254}, timestamp = {Thu, 06 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/WangLZZW20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/WangM0020, author = {Dongxia Wang and Tim Muller and Jie Zhang and Yang Liu}, title = {Information Theoretical Analysis of Unfair Rating Attacks Under Subjectivity}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {15}, pages = {816--828}, year = {2020}, url = {https://doi.org/10.1109/TIFS.2019.2929678}, doi = {10.1109/TIFS.2019.2929678}, timestamp = {Fri, 17 Dec 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tifs/WangM0020.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/WangMWHS20, author = {Caiyong Wang and Jawad Muhammad and Yunlong Wang and Zhaofeng He and Zhenan Sun}, title = {Towards Complete and Accurate Iris Segmentation Using Deep Multi-Task Attention Network for Non-Cooperative Iris Recognition}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {15}, pages = {2944--2959}, year = {2020}, url = {https://doi.org/10.1109/TIFS.2020.2980791}, doi = {10.1109/TIFS.2020.2980791}, timestamp = {Thu, 06 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/WangMWHS20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/WangSS20, author = {Guoqing Wang and Changming Sun and Arcot Sowmya}, title = {Multi-Weighted Co-Occurrence Descriptor Encoding for Vein Recognition}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {15}, pages = {375--390}, year = {2020}, url = {https://doi.org/10.1109/TIFS.2019.2922331}, doi = {10.1109/TIFS.2019.2922331}, timestamp = {Mon, 22 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tifs/WangSS20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/WangSS20a, author = {Guoqing Wang and Changming Sun and Arcot Sowmya}, title = {Learning a Compact Vein Discrimination Model With GANerated Samples}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {15}, pages = {635--650}, year = {2020}, url = {https://doi.org/10.1109/TIFS.2019.2924553}, doi = {10.1109/TIFS.2019.2924553}, timestamp = {Mon, 22 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tifs/WangSS20a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/WangYWDG20, author = {Wei{-}Che Wang and Yair Yona and Yizhang Wu and Suhas N. Diggavi and Puneet Gupta}, title = {{SLATE:} {A} Secure Lightweight Entity Authentication Hardware Primitive}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {15}, pages = {276--285}, year = {2020}, url = {https://doi.org/10.1109/TIFS.2019.2919393}, doi = {10.1109/TIFS.2019.2919393}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/WangYWDG20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/WangZLYY20, author = {Yaofei Wang and Weiming Zhang and Weixiang Li and Xinzhi Yu and Nenghai Yu}, title = {Non-Additive Cost Functions for Color Image Steganography Based on Inter-Channel Correlations and Differences}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {15}, pages = {2081--2095}, year = {2020}, url = {https://doi.org/10.1109/TIFS.2019.2956590}, doi = {10.1109/TIFS.2019.2956590}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/WangZLYY20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/WangZYLHM20, author = {Leye Wang and Daqing Zhang and Dingqi Yang and Brian Y. Lim and Xiao Han and Xiaojuan Ma}, title = {Sparse Mobile Crowdsensing With Differential and Distortion Location Privacy}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {15}, pages = {2735--2749}, year = {2020}, url = {https://doi.org/10.1109/TIFS.2020.2975925}, doi = {10.1109/TIFS.2020.2975925}, timestamp = {Thu, 06 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/WangZYLHM20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/WeiJLCW20, author = {Chengkun Wei and Shouling Ji and Changchang Liu and Wenzhi Chen and Ting Wang}, title = {AsgLDP: Collecting and Generating Decentralized Attributed Graphs With Local Differential Privacy}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {15}, pages = {3239--3254}, year = {2020}, url = {https://doi.org/10.1109/TIFS.2020.2985524}, doi = {10.1109/TIFS.2020.2985524}, timestamp = {Thu, 06 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/WeiJLCW20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/WeiLDMYFJQP20, author = {Kang Wei and Jun Li and Ming Ding and Chuan Ma and Howard H. Yang and Farhad Farokhi and Shi Jin and Tony Q. S. Quek and H. Vincent Poor}, title = {Federated Learning With Differential Privacy: Algorithms and Performance Analysis}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {15}, pages = {3454--3469}, year = {2020}, url = {https://doi.org/10.1109/TIFS.2020.2988575}, doi = {10.1109/TIFS.2020.2988575}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tifs/WeiLDMYFJQP20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/WenLFQZJ20, author = {Wanli Wen and Chenxi Liu and Yaru Fu and Tony Q. S. Quek and Fu{-}Chun Zheng and Shi Jin}, title = {Enhancing Physical Layer Security of Random Caching in Large-Scale Multi-Antenna Heterogeneous Wireless Networks}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {15}, pages = {2840--2855}, year = {2020}, url = {https://doi.org/10.1109/TIFS.2020.2976961}, doi = {10.1109/TIFS.2020.2976961}, timestamp = {Mon, 15 May 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/WenLFQZJ20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/WuCLF20, author = {Junqi Wu and Bolin Chen and Weiqi Luo and Yanmei Fang}, title = {Audio Steganography Based on Iterative Adversarial Attacks Against Convolutional Neural Networks}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {15}, pages = {2282--2294}, year = {2020}, url = {https://doi.org/10.1109/TIFS.2019.2963764}, doi = {10.1109/TIFS.2019.2963764}, timestamp = {Tue, 18 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/WuCLF20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/WuWLJ20, author = {Chengwei Wu and Ligang Wu and Jianxing Liu and Zhong{-}Ping Jiang}, title = {Active Defense-Based Resilient Sliding Mode Control Under Denial-of-Service Attacks}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {15}, pages = {237--249}, year = {2020}, url = {https://doi.org/10.1109/TIFS.2019.2917373}, doi = {10.1109/TIFS.2019.2917373}, timestamp = {Wed, 13 Mar 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tifs/WuWLJ20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/WuYZC20, author = {Renyong Wu and Chao Yuan and Ning Zhang and Kim{-}Kwang Raymond Choo}, title = {A Two-Dimensional Vectorized Secure Transmission Scheme for Wireless Communications}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {15}, pages = {2336--2345}, year = {2020}, url = {https://doi.org/10.1109/TIFS.2019.2954742}, doi = {10.1109/TIFS.2019.2954742}, timestamp = {Thu, 06 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/WuYZC20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/WuYZCW20, author = {Libing Wu and Jingxiao Yang and Man Zhou and Yanjiao Chen and Qian Wang}, title = {{LVID:} {A} Multimodal Biometrics Authentication System on Smartphones}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {15}, pages = {1572--1585}, year = {2020}, url = {https://doi.org/10.1109/TIFS.2019.2944058}, doi = {10.1109/TIFS.2019.2944058}, timestamp = {Mon, 01 May 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/WuYZCW20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/Xia0020, author = {Xiaofang Xia and Yang Xiao and Wei Liang}, title = {{SAI:} {A} Suspicion Assessment-Based Inspection Algorithm to Detect Malicious Users in Smart Grid}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {15}, pages = {361--374}, year = {2020}, url = {https://doi.org/10.1109/TIFS.2019.2921232}, doi = {10.1109/TIFS.2019.2921232}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/Xia0020.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/XiaZLWX20, author = {Min Xia and Xu Zhang and Wan'an Liu and Liguo Weng and Yiqing Xu}, title = {Multi-Stage Feature Constraints Learning for Age Estimation}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {15}, pages = {2417--2428}, year = {2020}, url = {https://doi.org/10.1109/TIFS.2020.2969552}, doi = {10.1109/TIFS.2020.2969552}, timestamp = {Mon, 06 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tifs/XiaZLWX20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/XiangYCDS20, author = {Zhongwu Xiang and Weiwei Yang and Yueming Cai and Zhiguo Ding and Yi Song}, title = {Secure Transmission Design in {HARQ} Assisted Cognitive {NOMA} Networks}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {15}, pages = {2528--2541}, year = {2020}, url = {https://doi.org/10.1109/TIFS.2020.2968176}, doi = {10.1109/TIFS.2020.2968176}, timestamp = {Fri, 29 Jul 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/XiangYCDS20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/XiangYPCSZ20, author = {Zhongwu Xiang and Weiwei Yang and Gaofeng Pan and Yueming Cai and Yi Song and Yulong Zou}, title = {Secure Transmission in HARQ-Assisted Non-Orthogonal Multiple Access Networks}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {15}, pages = {2171--2182}, year = {2020}, url = {https://doi.org/10.1109/TIFS.2019.2955792}, doi = {10.1109/TIFS.2019.2955792}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/XiangYPCSZ20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/XieHW20, author = {Shangyu Xie and Yuan Hong and Peng{-}Jun Wan}, title = {Pairing: Privately Balancing Multiparty Real-Time Supply and Demand on the Power Grid}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {15}, pages = {1114--1127}, year = {2020}, url = {https://doi.org/10.1109/TIFS.2019.2933732}, doi = {10.1109/TIFS.2019.2933732}, timestamp = {Thu, 06 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/XieHW20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/XieP20, author = {Jiucheng Xie and Chi{-}Man Pun}, title = {Deep and Ordinal Ensemble Learning for Human Age Estimation From Facial Images}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {15}, pages = {2361--2374}, year = {2020}, url = {https://doi.org/10.1109/TIFS.2020.2965298}, doi = {10.1109/TIFS.2020.2965298}, timestamp = {Thu, 06 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/XieP20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/XiongSKS20, author = {Wenjie Xiong and Andr{\'{e}} Schaller and Stefan Katzenbeisser and Jakub Szefer}, title = {Software Protection Using Dynamic PUFs}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {15}, pages = {2053--2068}, year = {2020}, url = {https://doi.org/10.1109/TIFS.2019.2955788}, doi = {10.1109/TIFS.2019.2955788}, timestamp = {Tue, 16 Aug 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/XiongSKS20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/XuLL0L20, author = {Guowen Xu and Hongwei Li and Sen Liu and Kan Yang and Xiaodong Lin}, title = {VerifyNet: Secure and Verifiable Federated Learning}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {15}, pages = {911--926}, year = {2020}, url = {https://doi.org/10.1109/TIFS.2019.2929409}, doi = {10.1109/TIFS.2019.2929409}, timestamp = {Fri, 18 Nov 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tifs/XuLL0L20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/XuLZCT20, author = {Lingling Xu and Wanhua Li and Fangguo Zhang and Rong Cheng and Shaohua Tang}, title = {Authorized Keyword Searches on Public Key Encrypted Data With Time Controlled Keyword Privacy}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {15}, pages = {2096--2109}, year = {2020}, url = {https://doi.org/10.1109/TIFS.2019.2957691}, doi = {10.1109/TIFS.2019.2957691}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/XuLZCT20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/XuSD20, author = {Congyuan Xu and Jizhong Shen and Xin Du}, title = {A Method of Few-Shot Network Intrusion Detection Based on Meta-Learning Framework}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {15}, pages = {3540--3552}, year = {2020}, url = {https://doi.org/10.1109/TIFS.2020.2991876}, doi = {10.1109/TIFS.2020.2991876}, timestamp = {Thu, 06 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/XuSD20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/XuSL20, author = {Qichao Xu and Zhou Su and Rongxing Lu}, title = {Game Theory and Reinforcement Learning Based Secure Edge Caching in Mobile Social Networks}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {15}, pages = {3415--3429}, year = {2020}, url = {https://doi.org/10.1109/TIFS.2020.2980823}, doi = {10.1109/TIFS.2020.2980823}, timestamp = {Thu, 06 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/XuSL20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/XueVHS20, author = {Wanli Xue and Dinusha Vatsalan and Wen Hu and Aruna Seneviratne}, title = {Sequence Data Matching and Beyond: New Privacy-Preserving Primitives Based on Bloom Filters}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {15}, pages = {2973--2987}, year = {2020}, url = {https://doi.org/10.1109/TIFS.2020.2980835}, doi = {10.1109/TIFS.2020.2980835}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/XueVHS20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/YanLLS20, author = {Xuehu Yan and Yuliang Lu and Lintao Liu and Xianhua Song}, title = {Reversible Image Secret Sharing}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {15}, pages = {3848--3858}, year = {2020}, url = {https://doi.org/10.1109/TIFS.2020.3001735}, doi = {10.1109/TIFS.2020.3001735}, timestamp = {Thu, 27 Jul 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/YanLLS20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/YangDL20, author = {Jichen Yang and Rohan Kumar Das and Haizhou Li}, title = {Significance of Subband Features for Synthetic Speech Detection}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {15}, pages = {2160--2170}, year = {2020}, url = {https://doi.org/10.1109/TIFS.2019.2956589}, doi = {10.1109/TIFS.2019.2956589}, timestamp = {Thu, 06 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/YangDL20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/YangLYALC20, author = {Xiao Yang and Wang Fat Lau and Qingqing Ye and Man Ho Au and Joseph K. Liu and Jacob Cheng}, title = {Practical Escrow Protocol for Bitcoin}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {15}, pages = {3023--3034}, year = {2020}, url = {https://doi.org/10.1109/TIFS.2020.2976607}, doi = {10.1109/TIFS.2020.2976607}, timestamp = {Thu, 06 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/YangLYALC20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/YangRHKS20, author = {Jianhua Yang and Danyang Ruan and Jiwu Huang and Xiangui Kang and Yun{-}Qing Shi}, title = {An Embedding Cost Learning Framework Using {GAN}}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {15}, pages = {839--851}, year = {2020}, url = {https://doi.org/10.1109/TIFS.2019.2922229}, doi = {10.1109/TIFS.2019.2922229}, timestamp = {Thu, 06 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/YangRHKS20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/YangSZZJ20, author = {Zhihai Yang and Qindong Sun and Yaling Zhang and Lei Zhu and Wenjiang Ji}, title = {Inference of Suspicious Co-Visitation and Co-Rating Behaviors and Abnormality Forensics for Recommender Systems}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {15}, pages = {2766--2781}, year = {2020}, url = {https://doi.org/10.1109/TIFS.2020.2977023}, doi = {10.1109/TIFS.2020.2977023}, timestamp = {Fri, 29 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/YangSZZJ20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/YangWWSG20, author = {Meng Yang and Wei Wen and Xing Wang and Linlin Shen and Guangwei Gao}, title = {Adaptive Convolution Local and Global Learning for Class-Level Joint Representation of Facial Recognition With a Single Sample Per Data Subject}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {15}, pages = {2469--2484}, year = {2020}, url = {https://doi.org/10.1109/TIFS.2020.2965301}, doi = {10.1109/TIFS.2020.2965301}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/YangWWSG20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/YankovOSCF20, author = {Metodi P. Yankov and Martin Aastrup Olsen and Mikkel B. Stegmann and S{\o}ren Skovgaard Christensen and S{\o}ren Forchhammer}, title = {Fingerprint Entropy and Identification Capacity Estimation Based on Pixel-Level Generative Modelling}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {15}, pages = {56--65}, year = {2020}, url = {https://doi.org/10.1109/TIFS.2019.2916406}, doi = {10.1109/TIFS.2019.2916406}, timestamp = {Thu, 06 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/YankovOSCF20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/YaoJDW20, author = {Chengtang Yao and Yunde Jia and Huijun Di and Yuwei Wu}, title = {Face Spoofing Detection Using Relativity Representation on Riemannian Manifold}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {15}, pages = {3683--3693}, year = {2020}, url = {https://doi.org/10.1109/TIFS.2020.2998956}, doi = {10.1109/TIFS.2020.2998956}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/YaoJDW20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/YasuiKFE20, author = {Tatsuya Yasui and Minoru Kuribayashi and Nobuo Funabiki and Isao Echizen}, title = {Near-Optimal Detection for Binary Tardos Code by Estimating Collusion Strategy}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {15}, pages = {2069--2080}, year = {2020}, url = {https://doi.org/10.1109/TIFS.2019.2956587}, doi = {10.1109/TIFS.2019.2956587}, timestamp = {Thu, 06 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/YasuiKFE20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/YeL0Y20, author = {Mang Ye and Xiangyuan Lan and Zheng Wang and Pong C. Yuen}, title = {Bi-Directional Center-Constrained Top-Ranking for Visible Thermal Person Re-Identification}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {15}, pages = {407--419}, year = {2020}, url = {https://doi.org/10.1109/TIFS.2019.2921454}, doi = {10.1109/TIFS.2019.2921454}, timestamp = {Thu, 06 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/YeL0Y20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/YeY20, author = {Mang Ye and Pong C. Yuen}, title = {PurifyNet: {A} Robust Person Re-Identification Model With Noisy Labels}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {15}, pages = {2655--2666}, year = {2020}, url = {https://doi.org/10.1109/TIFS.2020.2970590}, doi = {10.1109/TIFS.2020.2970590}, timestamp = {Thu, 06 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/YeY20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/YilmazPZ20, author = {Baki Berkay Yilmaz and Milos Prvulovic and Alenka G. Zajic}, title = {Electromagnetic Side Channel Information Leakage Created by Execution of Series of Instructions in a Computer Processor}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {15}, pages = {776--789}, year = {2020}, url = {https://doi.org/10.1109/TIFS.2019.2929018}, doi = {10.1109/TIFS.2019.2929018}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/YilmazPZ20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/YilmazSZP20, author = {Baki Berkay Yilmaz and Nader Sehatbakhsh and Alenka G. Zajic and Milos Prvulovic}, title = {Communication Model and Capacity Limits of Covert Channels Created by Software Activities}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {15}, pages = {1891--1904}, year = {2020}, url = {https://doi.org/10.1109/TIFS.2019.2952265}, doi = {10.1109/TIFS.2019.2952265}, timestamp = {Tue, 16 Aug 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/YilmazSZP20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/Yin0H20, author = {Xuefei Yin and Yanming Zhu and Jiankun Hu}, title = {Contactless Fingerprint Recognition Based on Global Minutia Topology and Loose Genetic Algorithm}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {15}, pages = {28--41}, year = {2020}, url = {https://doi.org/10.1109/TIFS.2019.2918083}, doi = {10.1109/TIFS.2019.2918083}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/Yin0H20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/Yuan000020, author = {Dong Yuan and Qi Li and Guoliang Li and Qian Wang and Kui Ren}, title = {PriRadar: {A} Privacy-Preserving Framework for Spatial Crowdsourcing}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {15}, pages = {299--314}, year = {2020}, url = {https://doi.org/10.1109/TIFS.2019.2913232}, doi = {10.1109/TIFS.2019.2913232}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/Yuan000020.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/YunHWZZZ20, author = {Xiaochun Yun and Ji Huang and Yipeng Wang and Tianning Zang and Yuan Zhou and Yongzheng Zhang}, title = {Khaos: An Adversarial Neural Network {DGA} With High Anti-Detection Ability}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {15}, pages = {2225--2240}, year = {2020}, url = {https://doi.org/10.1109/TIFS.2019.2960647}, doi = {10.1109/TIFS.2019.2960647}, timestamp = {Thu, 06 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/YunHWZZZ20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/ZewailY20, author = {Ahmed A. Zewail and Aylin Yener}, title = {Device-to-Device Secure Coded Caching}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {15}, pages = {1513--1524}, year = {2020}, url = {https://doi.org/10.1109/TIFS.2019.2940885}, doi = {10.1109/TIFS.2019.2940885}, timestamp = {Mon, 20 Sep 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/ZewailY20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/ZhaiWR20, author = {Liming Zhai and Lina Wang and Yanzhen Ren}, title = {Universal Detection of Video Steganography in Multiple Domains Based on the Consistency of Motion Vectors}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {15}, pages = {1762--1777}, year = {2020}, url = {https://doi.org/10.1109/TIFS.2019.2949428}, doi = {10.1109/TIFS.2019.2949428}, timestamp = {Fri, 15 Dec 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tifs/ZhaiWR20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/ZhangDYCC20, author = {Zhenyong Zhang and Ruilong Deng and David K. Y. Yau and Peng Cheng and Jiming Chen}, title = {Analysis of Moving Target Defense Against False Data Injection Attacks on Power Grid}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {15}, pages = {2320--2335}, year = {2020}, url = {https://doi.org/10.1109/TIFS.2019.2928624}, doi = {10.1109/TIFS.2019.2928624}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/ZhangDYCC20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/ZhangDYZR20, author = {Fan Zhang and Xiaofei Dong and Bolin Yang and Yajin Zhou and Kui Ren}, title = {A Systematic Evaluation of Wavelet-Based Attack Framework on Random Delay Countermeasures}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {15}, pages = {1407--1422}, year = {2020}, url = {https://doi.org/10.1109/TIFS.2019.2941774}, doi = {10.1109/TIFS.2019.2941774}, timestamp = {Thu, 06 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/ZhangDYZR20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/ZhangG20, author = {Yuqiao Zhang and Ujjwal Guin}, title = {End-to-End Traceability of ICs in Component Supply Chain for Fighting Against Recycling}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {15}, pages = {767--775}, year = {2020}, url = {https://doi.org/10.1109/TIFS.2019.2928493}, doi = {10.1109/TIFS.2019.2928493}, timestamp = {Thu, 06 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/ZhangG20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/ZhangKL20, author = {Xueru Zhang and Mohammad Mahdi Khalili and Mingyan Liu}, title = {Recycled {ADMM:} Improving the Privacy and Accuracy of Distributed Algorithms}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {15}, pages = {1723--1734}, year = {2020}, url = {https://doi.org/10.1109/TIFS.2019.2947867}, doi = {10.1109/TIFS.2019.2947867}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/ZhangKL20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/ZhangLQG20, author = {Tong Zhang and Xiaolong Li and Wenfa Qi and Zongming Guo}, title = {Location-Based {PVO} and Adaptive Pairwise Modification for Efficient Reversible Data Hiding}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {15}, pages = {2306--2319}, year = {2020}, url = {https://doi.org/10.1109/TIFS.2019.2963766}, doi = {10.1109/TIFS.2019.2963766}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/ZhangLQG20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/ZhangSPZNTZ20, author = {Yanxin Zhang and Yulei Sui and Shirui Pan and Zheng Zheng and Baodi Ning and Ivor W. Tsang and Wanlei Zhou}, title = {Familial Clustering for Weakly-Labeled Android Malware Using Hybrid Representation Learning}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {15}, pages = {3401--3414}, year = {2020}, url = {https://doi.org/10.1109/TIFS.2019.2947861}, doi = {10.1109/TIFS.2019.2947861}, timestamp = {Thu, 21 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/ZhangSPZNTZ20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/ZhangXHWZJ20, author = {Yubao Zhang and Jidong Xiao and Shuai Hao and Haining Wang and Sencun Zhu and Sushil Jajodia}, title = {Understanding the Manipulation on Recommender Systems through Web Injection}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {15}, pages = {3807--3818}, year = {2020}, url = {https://doi.org/10.1109/TIFS.2019.2954737}, doi = {10.1109/TIFS.2019.2954737}, timestamp = {Mon, 10 Jan 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tifs/ZhangXHWZJ20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/ZhangXYXZ20, author = {Yushu Zhang and Xiangli Xiao and Lu{-}Xing Yang and Yong Xiang and Sheng Zhong}, title = {Secure and Efficient Outsourcing of PCA-Based Face Recognition}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {15}, pages = {1683--1695}, year = {2020}, url = {https://doi.org/10.1109/TIFS.2019.2947872}, doi = {10.1109/TIFS.2019.2947872}, timestamp = {Wed, 02 Feb 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tifs/ZhangXYXZ20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/ZhangZ20, author = {Rui Zhang and Quanyan Zhu}, title = {{\textless}tt{\textgreater}FlipIn{\textless}/tt{\textgreater}: {A} Game-Theoretic Cyber Insurance Framework for Incentive-Compatible Cyber Risk Management of Internet of Things}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {15}, pages = {2026--2041}, year = {2020}, url = {https://doi.org/10.1109/TIFS.2019.2955891}, doi = {10.1109/TIFS.2019.2955891}, timestamp = {Thu, 06 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/ZhangZ20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/ZhangZLL20, author = {Ru Zhang and Feng Zhu and Jianyi Liu and Gongshen Liu}, title = {Depth-Wise Separable Convolutions and Multi-Level Pooling for an Efficient Spatial CNN-Based Steganalysis}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {15}, pages = {1138--1150}, year = {2020}, url = {https://doi.org/10.1109/TIFS.2019.2936913}, doi = {10.1109/TIFS.2019.2936913}, timestamp = {Thu, 06 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/ZhangZLL20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/Zhao0ZQ020, author = {Pu Zhao and Jia Yu and Hanlin Zhang and Zhan Qin and Cong Wang}, title = {How to Securely Outsource Finding the Min-Cut of Undirected Edge-Weighted Graphs}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {15}, pages = {315--328}, year = {2020}, url = {https://doi.org/10.1109/TIFS.2019.2922277}, doi = {10.1109/TIFS.2019.2922277}, timestamp = {Tue, 28 Mar 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/Zhao0ZQ020.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/ZhaoLSJS20, author = {Shuangrui Zhao and Jia Liu and Yulong Shen and Xiaohong Jiang and Norio Shiratori}, title = {Secure Beamforming for Full-Duplex {MIMO} Two-Way Untrusted Relay Systems}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {15}, pages = {3775--3790}, year = {2020}, url = {https://doi.org/10.1109/TIFS.2020.3001733}, doi = {10.1109/TIFS.2020.3001733}, timestamp = {Wed, 18 Aug 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/ZhaoLSJS20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/ZhaoWZZC20, author = {Lingchen Zhao and Qian Wang and Qin Zou and Yan Zhang and Yanjiao Chen}, title = {Privacy-Preserving Collaborative Deep Learning With Unreliable Participants}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {15}, pages = {1486--1500}, year = {2020}, url = {https://doi.org/10.1109/TIFS.2019.2939713}, doi = {10.1109/TIFS.2019.2939713}, timestamp = {Mon, 20 Sep 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/ZhaoWZZC20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/Zheng0C20, author = {Yue Zheng and Yuan Cao and Chip{-}Hong Chang}, title = {A PUF-Based Data-Device Hash for Tampered Image Detection and Source Camera Identification}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {15}, pages = {620--634}, year = {2020}, url = {https://doi.org/10.1109/TIFS.2019.2926777}, doi = {10.1109/TIFS.2019.2926777}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/Zheng0C20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/ZhengH20, author = {Huadi Zheng and Haibo Hu}, title = {{MISSILE:} {A} System of Mobile Inertial Sensor-Based Sensitive Indoor Location Eavesdropping}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {15}, pages = {3137--3151}, year = {2020}, url = {https://doi.org/10.1109/TIFS.2019.2944034}, doi = {10.1109/TIFS.2019.2944034}, timestamp = {Sat, 05 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/ZhengH20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/ZhengZSCC20, author = {Yue Zheng and Xiaojin Zhao and Takashi Sato and Yuan Cao and Chip{-}Hong Chang}, title = {Ed-PUF: Event-Driven Physical Unclonable Function for Camera Authentication in Reactive Monitoring System}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {15}, pages = {2824--2839}, year = {2020}, url = {https://doi.org/10.1109/TIFS.2020.2977597}, doi = {10.1109/TIFS.2020.2977597}, timestamp = {Thu, 06 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/ZhengZSCC20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/ZhongP20, author = {Jun{-}Liu Zhong and Chi{-}Man Pun}, title = {An End-to-End Dense-InceptionNet for Image Copy-Move Forgery Detection}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {15}, pages = {2134--2146}, year = {2020}, url = {https://doi.org/10.1109/TIFS.2019.2957693}, doi = {10.1109/TIFS.2019.2957693}, timestamp = {Tue, 07 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tifs/ZhongP20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/Zhou20, author = {Lin Zhou}, title = {Multiple Private Key Generation for Continuous Memoryless Sources With a Helper}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {15}, pages = {2629--2640}, year = {2020}, url = {https://doi.org/10.1109/TIFS.2020.2973865}, doi = {10.1109/TIFS.2020.2973865}, timestamp = {Thu, 06 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/Zhou20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/ZhouCQD020, author = {Jun Zhou and Zhenfu Cao and Zhan Qin and Xiaolei Dong and Kui Ren}, title = {{LPPA:} Lightweight Privacy-Preserving Authentication From Efficient Multi-Key Secure Outsourced Computation for Location-Based Services in VANETs}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {15}, pages = {420--434}, year = {2020}, url = {https://doi.org/10.1109/TIFS.2019.2923156}, doi = {10.1109/TIFS.2019.2923156}, timestamp = {Thu, 23 Jun 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/ZhouCQD020.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/ZhuMLYLJ20, author = {Shuangyi Zhu and Yuan Ma and Xusheng Li and Jing Yang and Jingqiang Lin and Jiwu Jing}, title = {On the Analysis and Improvement of Min-Entropy Estimation on Time-Varying Data}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {15}, pages = {1696--1708}, year = {2020}, url = {https://doi.org/10.1109/TIFS.2019.2947871}, doi = {10.1109/TIFS.2019.2947871}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/ZhuMLYLJ20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/ZhuYQT20, author = {Jinbao Zhu and Qifa Yan and Chao Qi and Xiaohu Tang}, title = {A New Capacity-Achieving Private Information Retrieval Scheme With (Almost) Optimal File Length for Coded Servers}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {15}, pages = {1248--1260}, year = {2020}, url = {https://doi.org/10.1109/TIFS.2019.2937634}, doi = {10.1109/TIFS.2019.2937634}, timestamp = {Mon, 26 Oct 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tifs/ZhuYQT20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/ZiGCL20, author = {Yang Zi and Haichang Gao and Zhouhang Cheng and Yi Liu}, title = {An End-to-End Attack on Text CAPTCHAs}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {15}, pages = {753--766}, year = {2020}, url = {https://doi.org/10.1109/TIFS.2019.2928622}, doi = {10.1109/TIFS.2019.2928622}, timestamp = {Thu, 06 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/ZiGCL20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/ZouWWZL20, author = {Qin Zou and Yanling Wang and Qian Wang and Yi Zhao and Qingquan Li}, title = {Deep Learning-Based Gait Recognition Using Smartphones in the Wild}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {15}, pages = {3197--3212}, year = {2020}, url = {https://doi.org/10.1109/TIFS.2020.2985628}, doi = {10.1109/TIFS.2020.2985628}, timestamp = {Sun, 06 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/ZouWWZL20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.