Search dblp for Publications

export results for "toc:db/journals/tifs/tifs13.bht:"

 download as .bib file

@article{DBLP:journals/tifs/0003YMY18,
  author       = {Xiaoyong Li and
                  Jie Yuan and
                  Huadong Ma and
                  Wenbin Yao},
  title        = {Fast and Parallel Trust Computing Scheme Based on Big Data Analysis
                  for Collaboration Cloud Service},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {13},
  number       = {8},
  pages        = {1917--1931},
  year         = {2018},
  url          = {https://doi.org/10.1109/TIFS.2018.2806925},
  doi          = {10.1109/TIFS.2018.2806925},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/0003YMY18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/AhmadianJ18,
  author       = {Zahra Ahmadian and
                  Sadegh Jamshidpour},
  title        = {Linear Subspace Cryptanalysis of Harn's Secret Sharing-Based Group
                  Authentication Scheme},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {13},
  number       = {2},
  pages        = {502--510},
  year         = {2018},
  url          = {https://doi.org/10.1109/TIFS.2017.2757454},
  doi          = {10.1109/TIFS.2017.2757454},
  timestamp    = {Thu, 06 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/AhmadianJ18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/AkcayKWB18,
  author       = {Samet Akcay and
                  Mikolaj E. Kundegorski and
                  Chris G. Willcocks and
                  Toby P. Breckon},
  title        = {Using Deep Convolutional Neural Network Architectures for Object Classification
                  and Detection Within X-Ray Baggage Security Imagery},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {13},
  number       = {9},
  pages        = {2203--2215},
  year         = {2018},
  url          = {https://doi.org/10.1109/TIFS.2018.2812196},
  doi          = {10.1109/TIFS.2018.2812196},
  timestamp    = {Thu, 06 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/AkcayKWB18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/AkhavanM18,
  author       = {Amir Akhavan and
                  Mohammad H. Moradi},
  title        = {Detection of Concealed Information Using Multichannel Discriminative
                  Dictionary and Spatial Filter Learning},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {13},
  number       = {10},
  pages        = {2616--2627},
  year         = {2018},
  url          = {https://doi.org/10.1109/TIFS.2018.2825940},
  doi          = {10.1109/TIFS.2018.2825940},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tifs/AkhavanM18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/Al-NahariGAAY18,
  author       = {Azzam Al{-}Nahari and
                  Giovanni Geraci and
                  Mukarram Al{-}jamali and
                  Mohamed Hossam Ahmed and
                  Nan Yang},
  title        = {Beamforming With Artificial Noise for Secure {MISOME} Cognitive Radio
                  Transmissions},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {13},
  number       = {8},
  pages        = {1875--1889},
  year         = {2018},
  url          = {https://doi.org/10.1109/TIFS.2018.2797055},
  doi          = {10.1109/TIFS.2018.2797055},
  timestamp    = {Thu, 06 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/Al-NahariGAAY18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/AlmohriWE18,
  author       = {Hussain M. J. Almohri and
                  Layne T. Watson and
                  David Evans},
  title        = {Misery Digraphs: Delaying Intrusion Attacks in Obscure Clouds},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {13},
  number       = {6},
  pages        = {1361--1375},
  year         = {2018},
  url          = {https://doi.org/10.1109/TIFS.2017.2779436},
  doi          = {10.1109/TIFS.2017.2779436},
  timestamp    = {Thu, 06 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/AlmohriWE18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/AlmudhahkaNH18,
  author       = {Nawaf Yousef Almudhahka and
                  Mark S. Nixon and
                  Jonathon S. Hare},
  title        = {Semantic Face Signatures: Recognizing and Retrieving Faces by Verbal
                  Descriptions},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {13},
  number       = {3},
  pages        = {706--716},
  year         = {2018},
  url          = {https://doi.org/10.1109/TIFS.2017.2765519},
  doi          = {10.1109/TIFS.2017.2765519},
  timestamp    = {Thu, 06 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/AlmudhahkaNH18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/AmeliHYEY18,
  author       = {Amir Ameli and
                  Ali Hooshyar and
                  Ameen Hassan Yazdavar and
                  Ehab F. El{-}Saadany and
                  Amr M. Youssef},
  title        = {Attack Detection for Load Frequency Control Systems Using Stochastic
                  Unknown Input Estimators},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {13},
  number       = {10},
  pages        = {2575--2590},
  year         = {2018},
  url          = {https://doi.org/10.1109/TIFS.2018.2824253},
  doi          = {10.1109/TIFS.2018.2824253},
  timestamp    = {Thu, 06 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/AmeliHYEY18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/AminantoCTYK18,
  author       = {Muhamad Erza Aminanto and
                  Rakyong Choi and
                  Harry Chandra Tanuwidjaja and
                  Paul D. Yoo and
                  Kwangjo Kim},
  title        = {Deep Abstraction and Weighted Feature Selection for Wi-Fi Impersonation
                  Detection},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {13},
  number       = {3},
  pages        = {621--636},
  year         = {2018},
  url          = {https://doi.org/10.1109/TIFS.2017.2762828},
  doi          = {10.1109/TIFS.2017.2762828},
  timestamp    = {Thu, 06 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/AminantoCTYK18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/AonghusaL18,
  author       = {Pol Mac Aonghusa and
                  Douglas J. Leith},
  title        = {Plausible Deniability in Web Search - From Detection to Assessment},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {13},
  number       = {4},
  pages        = {874--887},
  year         = {2018},
  url          = {https://doi.org/10.1109/TIFS.2017.2769025},
  doi          = {10.1109/TIFS.2017.2769025},
  timestamp    = {Thu, 06 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/AonghusaL18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/Artigas18,
  author       = {Marc S{\'{a}}nchez Artigas},
  title        = {Enhancing Tree-Based {ORAM} Using Batched Request Reordering},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {13},
  number       = {3},
  pages        = {590--604},
  year         = {2018},
  url          = {https://doi.org/10.1109/TIFS.2017.2762824},
  doi          = {10.1109/TIFS.2017.2762824},
  timestamp    = {Tue, 16 Aug 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/Artigas18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/BayarS18,
  author       = {Belhassen Bayar and
                  Matthew C. Stamm},
  title        = {Constrained Convolutional Neural Networks: {A} New Approach Towards
                  General Purpose Image Manipulation Detection},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {13},
  number       = {11},
  pages        = {2691--2706},
  year         = {2018},
  url          = {https://doi.org/10.1109/TIFS.2018.2825953},
  doi          = {10.1109/TIFS.2018.2825953},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tifs/BayarS18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/BayatW18,
  author       = {Farhang Bayat and
                  Shuangqing Wei},
  title        = {Non-Adaptive Sequential Detection of Active Edge-Wise Disjoint Subgraphs
                  Under Privacy Constraints},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {13},
  number       = {7},
  pages        = {1615--1625},
  year         = {2018},
  url          = {https://doi.org/10.1109/TIFS.2018.2790937},
  doi          = {10.1109/TIFS.2018.2790937},
  timestamp    = {Thu, 06 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/BayatW18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/Best-RowdenJ18,
  author       = {Lacey Best{-}Rowden and
                  Anil K. Jain},
  title        = {Learning Face Image Quality From Human Assessments},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {13},
  number       = {12},
  pages        = {3064--3077},
  year         = {2018},
  url          = {https://doi.org/10.1109/TIFS.2018.2799585},
  doi          = {10.1109/TIFS.2018.2799585},
  timestamp    = {Thu, 06 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/Best-RowdenJ18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/BiesmansBRPV18,
  author       = {Wouter Biesmans and
                  Josep Balasch and
                  Alfredo Rial and
                  Bart Preneel and
                  Ingrid Verbauwhede},
  title        = {Private Mobile Pay-TV From Priced Oblivious Transfer},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {13},
  number       = {2},
  pages        = {280--291},
  year         = {2018},
  url          = {https://doi.org/10.1109/TIFS.2017.2746058},
  doi          = {10.1109/TIFS.2017.2746058},
  timestamp    = {Thu, 06 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/BiesmansBRPV18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/BocheD18,
  author       = {Holger Boche and
                  Christian Deppe},
  title        = {Secure Identification for Wiretap Channels; Robustness, Super-Additivity
                  and Continuity},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {13},
  number       = {7},
  pages        = {1641--1655},
  year         = {2018},
  url          = {https://doi.org/10.1109/TIFS.2018.2797004},
  doi          = {10.1109/TIFS.2018.2797004},
  timestamp    = {Thu, 06 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/BocheD18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/BoroumandF18,
  author       = {Mehdi Boroumand and
                  Jessica J. Fridrich},
  title        = {Applications of Explicit Non-Linear Feature Maps in Steganalysis},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {13},
  number       = {4},
  pages        = {823--833},
  year         = {2018},
  url          = {https://doi.org/10.1109/TIFS.2017.2766580},
  doi          = {10.1109/TIFS.2017.2766580},
  timestamp    = {Thu, 06 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/BoroumandF18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/BuL18,
  author       = {Kai Bu and
                  Yingjiu Li},
  title        = {Every Step You Take, I'll Be Watching You: Practical StepAuth-Entication
                  of {RFID} Paths},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {13},
  number       = {4},
  pages        = {834--849},
  year         = {2018},
  url          = {https://doi.org/10.1109/TIFS.2017.2768022},
  doi          = {10.1109/TIFS.2017.2768022},
  timestamp    = {Thu, 06 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/BuL18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/BurmesterMO18,
  author       = {Mike Burmester and
                  Jorge Munilla and
                  Andr{\'{e}}s Ortiz},
  title        = {Comments on "Unreconciled Collisions Uncover Cloning Attacks in Anonymous
                  {RFID} Systems"},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {13},
  number       = {11},
  pages        = {2929--2931},
  year         = {2018},
  url          = {https://doi.org/10.1109/TIFS.2018.2834876},
  doi          = {10.1109/TIFS.2018.2834876},
  timestamp    = {Thu, 28 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/BurmesterMO18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/CalderoniPM18,
  author       = {Luca Calderoni and
                  Paolo Palmieri and
                  Dario Maio},
  title        = {Probabilistic Properties of the Spatial Bloom Filters and Their Relevance
                  to Cryptographic Protocols},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {13},
  number       = {7},
  pages        = {1710--1721},
  year         = {2018},
  url          = {https://doi.org/10.1109/TIFS.2018.2799486},
  doi          = {10.1109/TIFS.2018.2799486},
  timestamp    = {Thu, 06 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/CalderoniPM18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/Campisi18,
  author       = {Patrizio Campisi},
  title        = {Editorial},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {13},
  number       = {1},
  pages        = {5},
  year         = {2018},
  url          = {https://doi.org/10.1109/TIFS.2017.2788318},
  doi          = {10.1109/TIFS.2017.2788318},
  timestamp    = {Thu, 06 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/Campisi18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/Campomanes-Alvarez18,
  author       = {Carmen Campomanes{-}{\'{A}}lvarez and
                  Rub{\'{e}}n Martos{-}Fern{\'{a}}ndez and
                  Caroline Wilkinson and
                  {\'{O}}scar Ib{\'{a}}{\~{n}}ez and
                  Oscar Cord{\'{o}}n},
  title        = {Modeling Skull-Face Anatomical/Morphological Correspondence for Craniofacial
                  Superimposition-Based Identification},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {13},
  number       = {6},
  pages        = {1481--1494},
  year         = {2018},
  url          = {https://doi.org/10.1109/TIFS.2018.2791434},
  doi          = {10.1109/TIFS.2018.2791434},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/Campomanes-Alvarez18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/CaoCWY18,
  author       = {Kuo Cao and
                  Yueming Cai and
                  Yongpeng Wu and
                  Weiwei Yang},
  title        = {Secure Communication for Amplify-and-Forward Relay Networks With Finite
                  Alphabet Input},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {13},
  number       = {9},
  pages        = {2269--2278},
  year         = {2018},
  url          = {https://doi.org/10.1109/TIFS.2018.2818065},
  doi          = {10.1109/TIFS.2018.2818065},
  timestamp    = {Thu, 29 Sep 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/CaoCWY18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/ChanLCYZWH18,
  author       = {Patrick P. K. Chan and
                  Weiwen Liu and
                  Danni Chen and
                  Daniel S. Yeung and
                  Fei Zhang and
                  Xizhao Wang and
                  Chien{-}Chang Hsu},
  title        = {Face Liveness Detection Using a Flash Against 2D Spoofing Attack},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {13},
  number       = {2},
  pages        = {521--534},
  year         = {2018},
  url          = {https://doi.org/10.1109/TIFS.2017.2758748},
  doi          = {10.1109/TIFS.2017.2758748},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/ChanLCYZWH18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/ChenHLZ18,
  author       = {Dong{-}Hua Chen and
                  Yu{-}Cheng He and
                  Xiaodan Lin and
                  Rui Zhao},
  title        = {Both Worst-Case and Chance-Constrained Robust Secure {SWIPT} in {MISO}
                  Interference Channels},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {13},
  number       = {2},
  pages        = {306--317},
  year         = {2018},
  url          = {https://doi.org/10.1109/TIFS.2017.2746063},
  doi          = {10.1109/TIFS.2017.2746063},
  timestamp    = {Thu, 06 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/ChenHLZ18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/ChenKV18,
  author       = {Yanling Chen and
                  Onur Ozan Koyluoglu and
                  A. J. Han Vinck},
  title        = {Collective Secrecy Over the K-Transmitter Multiple Access Channel},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {13},
  number       = {9},
  pages        = {2279--2293},
  year         = {2018},
  url          = {https://doi.org/10.1109/TIFS.2018.2818067},
  doi          = {10.1109/TIFS.2018.2818067},
  timestamp    = {Thu, 06 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/ChenKV18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/ChenWLCMLDWQ18,
  author       = {Fei Chen and
                  Donghong Wang and
                  Ronghua Li and
                  Jianyong Chen and
                  Zhong Ming and
                  Alex X. Liu and
                  Huayi Duan and
                  Cong Wang and
                  Jing Qin},
  title        = {Secure Hashing-Based Verifiable Pattern Matching},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {13},
  number       = {11},
  pages        = {2677--2690},
  year         = {2018},
  url          = {https://doi.org/10.1109/TIFS.2018.2825141},
  doi          = {10.1109/TIFS.2018.2825141},
  timestamp    = {Thu, 06 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/ChenWLCMLDWQ18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/ChenWZCDA18,
  author       = {Jing Chen and
                  Chiheng Wang and
                  Ziming Zhao and
                  Kai Chen and
                  Ruiying Du and
                  Gail{-}Joon Ahn},
  title        = {Uncovering the Face of Android Ransomware: Characterization and Real-Time
                  Detection},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {13},
  number       = {5},
  pages        = {1286--1300},
  year         = {2018},
  url          = {https://doi.org/10.1109/TIFS.2017.2787905},
  doi          = {10.1109/TIFS.2017.2787905},
  timestamp    = {Thu, 06 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/ChenWZCDA18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/ChengFY18,
  author       = {Yuqiao Cheng and
                  Zhengxin Fu and
                  Bin Yu},
  title        = {Improved Visual Secret Sharing Scheme for {QR} Code Applications},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {13},
  number       = {9},
  pages        = {2393--2403},
  year         = {2018},
  url          = {https://doi.org/10.1109/TIFS.2018.2819125},
  doi          = {10.1109/TIFS.2018.2819125},
  timestamp    = {Thu, 06 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/ChengFY18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/ChhetriFF18,
  author       = {Sujit Rokka Chhetri and
                  Sina Faezi and
                  Mohammad Abdullah Al Faruque},
  title        = {Information Leakage-Aware Computer-Aided Cyber-Physical Manufacturing},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {13},
  number       = {9},
  pages        = {2333--2344},
  year         = {2018},
  url          = {https://doi.org/10.1109/TIFS.2018.2818659},
  doi          = {10.1109/TIFS.2018.2818659},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/ChhetriFF18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/ChoiJJP018,
  author       = {Wonsuk Choi and
                  Kyungho Joo and
                  Hyo Jin Jo and
                  Moon Chan Park and
                  Dong Hoon Lee},
  title        = {VoltageIDS: Low-Level Communication Characteristics for Automotive
                  Intrusion Detection System},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {13},
  number       = {8},
  pages        = {2114--2129},
  year         = {2018},
  url          = {https://doi.org/10.1109/TIFS.2018.2812149},
  doi          = {10.1109/TIFS.2018.2812149},
  timestamp    = {Thu, 06 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/ChoiJJP018.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/ChoudaryK18,
  author       = {Marios O. Choudary and
                  Markus G. Kuhn},
  title        = {Efficient, Portable Template Attacks},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {13},
  number       = {2},
  pages        = {490--501},
  year         = {2018},
  url          = {https://doi.org/10.1109/TIFS.2017.2757440},
  doi          = {10.1109/TIFS.2017.2757440},
  timestamp    = {Thu, 06 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/ChoudaryK18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/ChuNC18,
  author       = {Zheng Chu and
                  Huan Xuan Nguyen and
                  Giuseppe Caire},
  title        = {Game Theory-Based Resource Allocation for Secure {WPCN} Multiantenna
                  Multicasting Systems},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {13},
  number       = {4},
  pages        = {926--939},
  year         = {2018},
  url          = {https://doi.org/10.1109/TIFS.2017.2774441},
  doi          = {10.1109/TIFS.2017.2774441},
  timestamp    = {Wed, 23 Mar 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tifs/ChuNC18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/ChughCJ18,
  author       = {Tarang Chugh and
                  Kai Cao and
                  Anil K. Jain},
  title        = {Fingerprint Spoof Buster: Use of Minutiae-Centered Patches},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {13},
  number       = {9},
  pages        = {2190--2202},
  year         = {2018},
  url          = {https://doi.org/10.1109/TIFS.2018.2812193},
  doi          = {10.1109/TIFS.2018.2812193},
  timestamp    = {Thu, 06 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/ChughCJ18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/ChughCZTJ18,
  author       = {Tarang Chugh and
                  Kai Cao and
                  Jiayu Zhou and
                  Elham Tabassi and
                  Anil K. Jain},
  title        = {Latent Fingerprint Value Prediction: Crowd-Based Learning},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {13},
  number       = {1},
  pages        = {20--34},
  year         = {2018},
  url          = {https://doi.org/10.1109/TIFS.2017.2721099},
  doi          = {10.1109/TIFS.2017.2721099},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/ChughCZTJ18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/CuiFLLZ18,
  author       = {Zhe Cui and
                  Jianjiang Feng and
                  Shihao Li and
                  Jiwen Lu and
                  Jie Zhou},
  title        = {2-D Phase Demodulation for Deformable Fingerprint Registration},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {13},
  number       = {12},
  pages        = {3153--3165},
  year         = {2018},
  url          = {https://doi.org/10.1109/TIFS.2018.2841849},
  doi          = {10.1109/TIFS.2018.2841849},
  timestamp    = {Thu, 06 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/CuiFLLZ18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/DaiDPRSSS18,
  author       = {Wei Dai and
                  Yarkin Dor{\"{o}}z and
                  Yuriy Polyakov and
                  Kurt Rohloff and
                  Hadi Sajjadpour and
                  Erkay Savas and
                  Berk Sunar},
  title        = {Implementation and Evaluation of a Lattice-Based Key-Policy {ABE}
                  Scheme},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {13},
  number       = {5},
  pages        = {1169--1184},
  year         = {2018},
  url          = {https://doi.org/10.1109/TIFS.2017.2779427},
  doi          = {10.1109/TIFS.2017.2779427},
  timestamp    = {Thu, 06 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/DaiDPRSSS18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/DengGLG18,
  author       = {Shuhua Deng and
                  Xing Gao and
                  Zebin Lu and
                  Xieping Gao},
  title        = {Packet Injection Attack and Its Defense in Software-Defined Networks},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {13},
  number       = {3},
  pages        = {695--705},
  year         = {2018},
  url          = {https://doi.org/10.1109/TIFS.2017.2765506},
  doi          = {10.1109/TIFS.2017.2765506},
  timestamp    = {Tue, 16 Aug 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/DengGLG18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/DoBLR18,
  author       = {Tan Tai Do and
                  Emil Bj{\"{o}}rnson and
                  Erik G. Larsson and
                  Seyed Mohammad Razavizadeh},
  title        = {Jamming-Resistant Receivers for the Massive {MIMO} Uplink},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {13},
  number       = {1},
  pages        = {210--223},
  year         = {2018},
  url          = {https://doi.org/10.1109/TIFS.2017.2746007},
  doi          = {10.1109/TIFS.2017.2746007},
  timestamp    = {Mon, 04 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/DoBLR18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/DongWWG18,
  author       = {Hao Dong and
                  Chao Wu and
                  Zhen Wei and
                  Yike Guo},
  title        = {Dropping Activation Outputs With Localized First-Layer Deep Network
                  for Enhancing User Privacy and Data Security},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {13},
  number       = {3},
  pages        = {662--670},
  year         = {2018},
  url          = {https://doi.org/10.1109/TIFS.2017.2763126},
  doi          = {10.1109/TIFS.2017.2763126},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/DongWWG18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/DuJCRP18,
  author       = {Jun Du and
                  Chunxiao Jiang and
                  Kwang{-}Cheng Chen and
                  Yong Ren and
                  H. Vincent Poor},
  title        = {Community-Structured Evolutionary Game for Privacy Protection in Social
                  Networks},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {13},
  number       = {3},
  pages        = {574--589},
  year         = {2018},
  url          = {https://doi.org/10.1109/TIFS.2017.2758756},
  doi          = {10.1109/TIFS.2017.2758756},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tifs/DuJCRP18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/DuSCCX18,
  author       = {Pang Du and
                  Zheyuan Sun and
                  Huashan Chen and
                  Jin{-}Hee Cho and
                  Shouhuai Xu},
  title        = {Statistical Estimation of Malware Detection Metrics in the Absence
                  of Ground Truth},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {13},
  number       = {12},
  pages        = {2965--2980},
  year         = {2018},
  url          = {https://doi.org/10.1109/TIFS.2018.2833292},
  doi          = {10.1109/TIFS.2018.2833292},
  timestamp    = {Thu, 06 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/DuSCCX18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/DuWHW18,
  author       = {Minxin Du and
                  Qian Wang and
                  Meiqi He and
                  Jian Weng},
  title        = {Privacy-Preserving Indexing and Query Processing for Secure Dynamic
                  Cloud Storage},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {13},
  number       = {9},
  pages        = {2320--2332},
  year         = {2018},
  url          = {https://doi.org/10.1109/TIFS.2018.2818651},
  doi          = {10.1109/TIFS.2018.2818651},
  timestamp    = {Thu, 06 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/DuWHW18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/DuanLFZ18,
  author       = {Yueqi Duan and
                  Jiwen Lu and
                  Jianjiang Feng and
                  Jie Zhou},
  title        = {Topology Preserving Structural Matching for Automatic Partial Face
                  Recognition},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {13},
  number       = {7},
  pages        = {1823--1837},
  year         = {2018},
  url          = {https://doi.org/10.1109/TIFS.2018.2804919},
  doi          = {10.1109/TIFS.2018.2804919},
  timestamp    = {Sat, 10 Sep 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/DuanLFZ18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/DuanLL18,
  author       = {Mingxing Duan and
                  Kenli Li and
                  Keqin Li},
  title        = {An Ensemble {CNN2ELM} for Age Estimation},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {13},
  number       = {3},
  pages        = {758--772},
  year         = {2018},
  url          = {https://doi.org/10.1109/TIFS.2017.2766583},
  doi          = {10.1109/TIFS.2017.2766583},
  timestamp    = {Mon, 12 Oct 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/DuanLL18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/EngelsmaAJP18,
  author       = {Joshua J. Engelsma and
                  Sunpreet S. Arora and
                  Anil K. Jain and
                  Nicholas G. Paulter},
  title        = {Universal 3D Wearable Fingerprint Targets: Advancing Fingerprint Reader
                  Evaluations},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {13},
  number       = {6},
  pages        = {1564--1578},
  year         = {2018},
  url          = {https://doi.org/10.1109/TIFS.2018.2797000},
  doi          = {10.1109/TIFS.2018.2797000},
  timestamp    = {Sat, 10 Sep 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/EngelsmaAJP18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/Fan0LCTZL18,
  author       = {Ming Fan and
                  Jun Liu and
                  Xiapu Luo and
                  Kai Chen and
                  Zhenzhou Tian and
                  Qinghua Zheng and
                  Ting Liu},
  title        = {Android Malware Familial Classification and Representative Sample
                  Selection via Frequent Subgraph Analysis},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {13},
  number       = {8},
  pages        = {1890--1905},
  year         = {2018},
  url          = {https://doi.org/10.1109/TIFS.2018.2806891},
  doi          = {10.1109/TIFS.2018.2806891},
  timestamp    = {Wed, 01 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tifs/Fan0LCTZL18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/FangXW18,
  author       = {He Fang and
                  Li Xu and
                  Xianbin Wang},
  title        = {Coordinated Multiple-Relays Based Physical-Layer Security Improvement:
                  {A} Single-Leader Multiple-Followers Stackelberg Game Scheme},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {13},
  number       = {1},
  pages        = {197--209},
  year         = {2018},
  url          = {https://doi.org/10.1109/TIFS.2017.2746001},
  doi          = {10.1109/TIFS.2017.2746001},
  timestamp    = {Thu, 06 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/FangXW18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/FazilA18,
  author       = {Mohd Fazil and
                  Muhammad Abulaish},
  title        = {A Hybrid Approach for Detecting Automated Spammers in Twitter},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {13},
  number       = {11},
  pages        = {2707--2719},
  year         = {2018},
  url          = {https://doi.org/10.1109/TIFS.2018.2825958},
  doi          = {10.1109/TIFS.2018.2825958},
  timestamp    = {Thu, 06 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/FazilA18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/FerraraFM18,
  author       = {Matteo Ferrara and
                  Annalisa Franco and
                  Davide Maltoni},
  title        = {Face Demorphing},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {13},
  number       = {4},
  pages        = {1008--1017},
  year         = {2018},
  url          = {https://doi.org/10.1109/TIFS.2017.2777340},
  doi          = {10.1109/TIFS.2017.2777340},
  timestamp    = {Thu, 06 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/FerraraFM18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/FierrezPMGM18,
  author       = {Julian Fi{\'{e}}rrez and
                  Ada Pozo and
                  Marcos Martinez{-}Diaz and
                  Javier Galbally and
                  Aythami Morales},
  title        = {Benchmarking Touchscreen Biometrics for Mobile Authentication},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {13},
  number       = {11},
  pages        = {2720--2733},
  year         = {2018},
  url          = {https://doi.org/10.1109/TIFS.2018.2833042},
  doi          = {10.1109/TIFS.2018.2833042},
  timestamp    = {Thu, 06 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/FierrezPMGM18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/FodorSD18,
  author       = {G{\'{a}}bor Fodor and
                  Peter Schelkens and
                  Ann Dooms},
  title        = {Fingerprinting Codes Under the Weak Marking Assumption},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {13},
  number       = {6},
  pages        = {1495--1508},
  year         = {2018},
  url          = {https://doi.org/10.1109/TIFS.2017.2779112},
  doi          = {10.1109/TIFS.2017.2779112},
  timestamp    = {Mon, 11 Mar 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tifs/FodorSD18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/FuXSLX18,
  author       = {Zhangjie Fu and
                  Lili Xia and
                  Xingming Sun and
                  Alex X. Liu and
                  Guowu Xie},
  title        = {Semantic-Aware Searching Over Encrypted Data for Cloud Computing},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {13},
  number       = {9},
  pages        = {2359--2371},
  year         = {2018},
  url          = {https://doi.org/10.1109/TIFS.2018.2819121},
  doi          = {10.1109/TIFS.2018.2819121},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/FuXSLX18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/GaleaF18,
  author       = {Christian Galea and
                  Reuben A. Farrugia},
  title        = {Matching Software-Generated Sketches to Face Photographs With a Very
                  Deep CNN, Morphed Faces, and Transfer Learning},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {13},
  number       = {6},
  pages        = {1421--1431},
  year         = {2018},
  url          = {https://doi.org/10.1109/TIFS.2017.2788002},
  doi          = {10.1109/TIFS.2017.2788002},
  timestamp    = {Tue, 16 Aug 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/GaleaF18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/GhassamiK18,
  author       = {AmirEmad Ghassami and
                  Negar Kiyavash},
  title        = {A Covert Queueing Channel in {FCFS} Schedulers},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {13},
  number       = {6},
  pages        = {1551--1563},
  year         = {2018},
  url          = {https://doi.org/10.1109/TIFS.2018.2797953},
  doi          = {10.1109/TIFS.2018.2797953},
  timestamp    = {Sat, 10 Sep 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/GhassamiK18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/GiaconiGP18,
  author       = {Giulio Giaconi and
                  Deniz G{\"{u}}nd{\"{u}}z and
                  H. Vincent Poor},
  title        = {Smart Meter Privacy With Renewable Energy and an Energy Storage Device},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {13},
  number       = {1},
  pages        = {129--142},
  year         = {2018},
  url          = {https://doi.org/10.1109/TIFS.2017.2744601},
  doi          = {10.1109/TIFS.2017.2744601},
  timestamp    = {Thu, 23 Jun 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/GiaconiGP18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/Gomez-BarreroGR18,
  author       = {Marta Gomez{-}Barrero and
                  Javier Galbally and
                  Christian Rathgeb and
                  Christoph Busch},
  title        = {General Framework to Evaluate Unlinkability in Biometric Template
                  Protection Systems},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {13},
  number       = {6},
  pages        = {1406--1420},
  year         = {2018},
  url          = {https://doi.org/10.1109/TIFS.2017.2788000},
  doi          = {10.1109/TIFS.2017.2788000},
  timestamp    = {Tue, 05 Jan 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tifs/Gomez-BarreroGR18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/GongHSS18,
  author       = {Xueqing Gong and
                  Ping Hu and
                  Kenneth W. Shum and
                  Chi Wan Sung},
  title        = {A Zigzag-Decodable Ramp Secret Sharing Scheme},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {13},
  number       = {8},
  pages        = {1906--1916},
  year         = {2018},
  url          = {https://doi.org/10.1109/TIFS.2018.2806922},
  doi          = {10.1109/TIFS.2018.2806922},
  timestamp    = {Thu, 06 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/GongHSS18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/Gonzalez-SosaFV18,
  author       = {Ester Gonzalez{-}Sosa and
                  Julian Fi{\'{e}}rrez and
                  Rub{\'{e}}n Vera{-}Rodr{\'{\i}}guez and
                  Fernando Alonso{-}Fernandez},
  title        = {Facial Soft Biometrics for Recognition in the Wild: Recent Works,
                  Annotation, and {COTS} Evaluation},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {13},
  number       = {8},
  pages        = {2001--2014},
  year         = {2018},
  url          = {https://doi.org/10.1109/TIFS.2018.2807791},
  doi          = {10.1109/TIFS.2018.2807791},
  timestamp    = {Thu, 06 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/Gonzalez-SosaFV18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/GopeLQ18,
  author       = {Prosanta Gope and
                  Jemin Lee and
                  Tony Q. S. Quek},
  title        = {Lightweight and Practical Anonymous Authentication Protocol for {RFID}
                  Systems Using Physically Unclonable Functions},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {13},
  number       = {11},
  pages        = {2831--2843},
  year         = {2018},
  url          = {https://doi.org/10.1109/TIFS.2018.2832849},
  doi          = {10.1109/TIFS.2018.2832849},
  timestamp    = {Thu, 06 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/GopeLQ18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/GuFLZ18,
  author       = {Shan Gu and
                  Jianjiang Feng and
                  Jiwen Lu and
                  Jie Zhou},
  title        = {Efficient Rectification of Distorted Fingerprints},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {13},
  number       = {1},
  pages        = {156--169},
  year         = {2018},
  url          = {https://doi.org/10.1109/TIFS.2017.2745685},
  doi          = {10.1109/TIFS.2017.2745685},
  timestamp    = {Thu, 06 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/GuFLZ18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/GunasingheB18,
  author       = {Hasini Gunasinghe and
                  Elisa Bertino},
  title        = {PrivBioMTAuth: Privacy Preserving Biometrics-Based and User Centric
                  Protocol for User Authentication From Mobile Phones},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {13},
  number       = {4},
  pages        = {1042--1057},
  year         = {2018},
  url          = {https://doi.org/10.1109/TIFS.2017.2777787},
  doi          = {10.1109/TIFS.2017.2777787},
  timestamp    = {Thu, 06 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/GunasingheB18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/GunluK18,
  author       = {Onur G{\"{u}}nl{\"{u}} and
                  Gerhard Kramer},
  title        = {Privacy, Secrecy, and Storage With Multiple Noisy Measurements of
                  Identifiers},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {13},
  number       = {11},
  pages        = {2872--2883},
  year         = {2018},
  url          = {https://doi.org/10.1109/TIFS.2018.2834303},
  doi          = {10.1109/TIFS.2018.2834303},
  timestamp    = {Thu, 06 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/GunluK18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/GunluKSC18,
  author       = {Onur G{\"{u}}nl{\"{u}} and
                  Kittipong Kittichokechai and
                  Rafael F. Schaefer and
                  Giuseppe Caire},
  title        = {Controllable Identifier Measurements for Private Authentication With
                  Secret Keys},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {13},
  number       = {8},
  pages        = {1945--1959},
  year         = {2018},
  url          = {https://doi.org/10.1109/TIFS.2018.2806937},
  doi          = {10.1109/TIFS.2018.2806937},
  timestamp    = {Thu, 06 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/GunluKSC18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/GuoCZW18,
  author       = {Yuanfang Guo and
                  Xiaochun Cao and
                  Wei Zhang and
                  Rui Wang},
  title        = {Fake Colorized Image Detection},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {13},
  number       = {8},
  pages        = {1932--1944},
  year         = {2018},
  url          = {https://doi.org/10.1109/TIFS.2018.2806926},
  doi          = {10.1109/TIFS.2018.2806926},
  timestamp    = {Sun, 12 Nov 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tifs/GuoCZW18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/HanES18,
  author       = {Te Sun Han and
                  Hiroyuki Endo and
                  Masahide Sasaki},
  title        = {Wiretap Channels With One-Time State Information: Strong Secrecy},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {13},
  number       = {1},
  pages        = {224--236},
  year         = {2018},
  url          = {https://doi.org/10.1109/TIFS.2017.2746008},
  doi          = {10.1109/TIFS.2017.2746008},
  timestamp    = {Thu, 06 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/HanES18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/HaoMSD18,
  author       = {Feng Hao and
                  Roberto Metere and
                  Siamak F. Shahandashti and
                  Changyu Dong},
  title        = {Analyzing and Patching {SPEKE} in {ISO/IEC}},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {13},
  number       = {11},
  pages        = {2844--2855},
  year         = {2018},
  url          = {https://doi.org/10.1109/TIFS.2018.2832984},
  doi          = {10.1109/TIFS.2018.2832984},
  timestamp    = {Mon, 12 Apr 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/HaoMSD18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/HeJD18,
  author       = {Xiaofan He and
                  Richeng Jin and
                  Huaiyu Dai},
  title        = {Leveraging Spatial Diversity for Privacy-Aware Location-Based Services
                  in Mobile Networks},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {13},
  number       = {6},
  pages        = {1524--1534},
  year         = {2018},
  url          = {https://doi.org/10.1109/TIFS.2018.2797023},
  doi          = {10.1109/TIFS.2018.2797023},
  timestamp    = {Sat, 10 Sep 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/HeJD18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/HinarejosACFL18,
  author       = {M. Francisca Hinarejos and
                  Florina Almen{\'{a}}rez and
                  Patricia Arias Cabarcos and
                  Josep Llu{\'{\i}}s Ferrer{-}Gomila and
                  Andr{\'{e}}s Mar{\'{\i}}n L{\'{o}}pez},
  title        = {RiskLaine: {A} Probabilistic Approach for Assessing Risk in Certificate-Based
                  Security},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {13},
  number       = {8},
  pages        = {1975--1988},
  year         = {2018},
  url          = {https://doi.org/10.1109/TIFS.2018.2807788},
  doi          = {10.1109/TIFS.2018.2807788},
  timestamp    = {Wed, 07 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tifs/HinarejosACFL18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/HosseiniJ18,
  author       = {Seyed Mohammad Hosseini and
                  Amir Hossein Jahangir},
  title        = {An Effective Payload Attribution Scheme for Cybercriminal Detection
                  Using Compressed Bitmap Index Tables and Traffic Downsampling},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {13},
  number       = {4},
  pages        = {850--860},
  year         = {2018},
  url          = {https://doi.org/10.1109/TIFS.2017.2769018},
  doi          = {10.1109/TIFS.2017.2769018},
  timestamp    = {Thu, 10 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/HosseiniJ18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/HouLJWZ18,
  author       = {Jiahui Hou and
                  Xiang{-}Yang Li and
                  Taeho Jung and
                  Yu Wang and
                  Daren Zheng},
  title        = {{CASTLE:} Enhancing the Utility of Inequality Query Auditing Without
                  Denial Threats},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {13},
  number       = {7},
  pages        = {1656--1669},
  year         = {2018},
  url          = {https://doi.org/10.1109/TIFS.2018.2797802},
  doi          = {10.1109/TIFS.2018.2797802},
  timestamp    = {Thu, 06 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/HouLJWZ18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/HouSH18,
  author       = {Elizabeth Hou and
                  Kumar Sricharan and
                  Alfred O. Hero III},
  title        = {Latent Laplacian Maximum Entropy Discrimination for Detection of High-Utility
                  Anomalies},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {13},
  number       = {6},
  pages        = {1446--1459},
  year         = {2018},
  url          = {https://doi.org/10.1109/TIFS.2018.2790580},
  doi          = {10.1109/TIFS.2018.2790580},
  timestamp    = {Thu, 06 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/HouSH18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/HsuLQC18,
  author       = {Ruei{-}Hau Hsu and
                  Jemin Lee and
                  Tony Q. S. Quek and
                  Jyh{-}Cheng Chen},
  title        = {{GRAAD:} Group Anonymous and Accountable {D2D} Communication in Mobile
                  Networks},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {13},
  number       = {2},
  pages        = {449--464},
  year         = {2018},
  url          = {https://doi.org/10.1109/TIFS.2017.2756567},
  doi          = {10.1109/TIFS.2017.2756567},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tifs/HsuLQC18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/HuLWCD18,
  author       = {Shengshan Hu and
                  Minghui Li and
                  Qian Wang and
                  Sherman S. M. Chow and
                  Minxin Du},
  title        = {Outsourced Biometric Identification With Privacy},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {13},
  number       = {10},
  pages        = {2448--2463},
  year         = {2018},
  url          = {https://doi.org/10.1109/TIFS.2018.2819128},
  doi          = {10.1109/TIFS.2018.2819128},
  timestamp    = {Thu, 06 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/HuLWCD18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/HuaTXZ18,
  author       = {Jingyu Hua and
                  Wei Tong and
                  Fengyuan Xu and
                  Sheng Zhong},
  title        = {A Geo-Indistinguishable Location Perturbation Mechanism for Location-Based
                  Services Supporting Frequent Queries},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {13},
  number       = {5},
  pages        = {1155--1168},
  year         = {2018},
  url          = {https://doi.org/10.1109/TIFS.2017.2779402},
  doi          = {10.1109/TIFS.2017.2779402},
  timestamp    = {Thu, 09 Dec 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tifs/HuaTXZ18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/HuangBM18,
  author       = {Yuanwen Huang and
                  Swarup Bhunia and
                  Prabhat Mishra},
  title        = {Scalable Test Generation for Trojan Detection Using Side Channel Analysis},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {13},
  number       = {11},
  pages        = {2746--2760},
  year         = {2018},
  url          = {https://doi.org/10.1109/TIFS.2018.2833059},
  doi          = {10.1109/TIFS.2018.2833059},
  timestamp    = {Thu, 06 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/HuangBM18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/HuangCZPL18,
  author       = {Yonggang Huang and
                  Longbing Cao and
                  Jun Zhang and
                  Lei Pan and
                  Yuying Liu},
  title        = {Exploring Feature Coupling and Model Coupling for Image Source Identification},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {13},
  number       = {12},
  pages        = {3108--3121},
  year         = {2018},
  url          = {https://doi.org/10.1109/TIFS.2018.2838079},
  doi          = {10.1109/TIFS.2018.2838079},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/HuangCZPL18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/Hurley-SmithH18,
  author       = {Darren Hurley{-}Smith and
                  Julio C. Hernandez{-}Castro},
  title        = {Certifiably Biased: An In-Depth Analysis of a Common Criteria {EAL4+}
                  Certified {TRNG}},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {13},
  number       = {4},
  pages        = {1031--1041},
  year         = {2018},
  url          = {https://doi.org/10.1109/TIFS.2017.2777342},
  doi          = {10.1109/TIFS.2017.2777342},
  timestamp    = {Mon, 08 Apr 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/Hurley-SmithH18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/IacovazziSFE18,
  author       = {Alfonso Iacovazzi and
                  Sanat Sarda and
                  Daniel Frassinelli and
                  Yuval Elovici},
  title        = {DropWat: An Invisible Network Flow Watermark for Data Exfiltration
                  Traceback},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {13},
  number       = {5},
  pages        = {1139--1154},
  year         = {2018},
  url          = {https://doi.org/10.1109/TIFS.2017.2779113},
  doi          = {10.1109/TIFS.2017.2779113},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/IacovazziSFE18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/JhaSAV18,
  author       = {Sadhana Jha and
                  Shamik Sural and
                  Vijayalakshmi Atluri and
                  Jaideep Vaidya},
  title        = {Specification and Verification of Separation of Duty Constraints in
                  Attribute-Based Access Control},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {13},
  number       = {4},
  pages        = {897--911},
  year         = {2018},
  url          = {https://doi.org/10.1109/TIFS.2017.2771492},
  doi          = {10.1109/TIFS.2017.2771492},
  timestamp    = {Mon, 26 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/JhaSAV18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/JiangHSXW18,
  author       = {Xinghao Jiang and
                  Peisong He and
                  Tanfeng Sun and
                  Feng Xie and
                  Shilin Wang},
  title        = {Detection of Double Compression With the Same Coding Parameters Based
                  on Quality Degradation Mechanism Analysis},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {13},
  number       = {1},
  pages        = {170--185},
  year         = {2018},
  url          = {https://doi.org/10.1109/TIFS.2017.2745687},
  doi          = {10.1109/TIFS.2017.2745687},
  timestamp    = {Thu, 06 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/JiangHSXW18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/JinHLKT18,
  author       = {Zhe Jin and
                  Jung Yeon Hwang and
                  Yen{-}Lung Lai and
                  Soohyung Kim and
                  Andrew Beng Jin Teoh},
  title        = {Ranking-Based Locality Sensitive Hashing-Enabled Cancelable Biometrics:
                  Index-of-Max Hashing},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {13},
  number       = {2},
  pages        = {393--407},
  year         = {2018},
  url          = {https://doi.org/10.1109/TIFS.2017.2753172},
  doi          = {10.1109/TIFS.2017.2753172},
  timestamp    = {Thu, 06 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/JinHLKT18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/JinZ18,
  author       = {Rong Jin and
                  Kai Zeng},
  title        = {Secure Inductive-Coupled Near Field Communication at Physical Layer},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {13},
  number       = {12},
  pages        = {3078--3093},
  year         = {2018},
  url          = {https://doi.org/10.1109/TIFS.2018.2832983},
  doi          = {10.1109/TIFS.2018.2832983},
  timestamp    = {Thu, 16 Dec 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tifs/JinZ18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/JoshiK18,
  author       = {Sharad Joshi and
                  Nitin Khanna},
  title        = {Single Classifier-Based Passive System for Source Printer Classification
                  Using Local Texture Features},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {13},
  number       = {7},
  pages        = {1603--1614},
  year         = {2018},
  url          = {https://doi.org/10.1109/TIFS.2017.2779441},
  doi          = {10.1109/TIFS.2017.2779441},
  timestamp    = {Thu, 06 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/JoshiK18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/KabirAS18,
  author       = {Waziha Kabir and
                  M. Omair Ahmad and
                  M. N. S. Swamy},
  title        = {Normalization and Weighting Techniques Based on Genuine-Impostor Score
                  Fusion in Multi-Biometric Systems},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {13},
  number       = {8},
  pages        = {1989--2000},
  year         = {2018},
  url          = {https://doi.org/10.1109/TIFS.2018.2807790},
  doi          = {10.1109/TIFS.2018.2807790},
  timestamp    = {Thu, 06 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/KabirAS18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/KalantariSS18,
  author       = {Kousha Kalantari and
                  Lalitha Sankar and
                  Anand D. Sarwate},
  title        = {Robust Privacy-Utility Tradeoffs Under Differential Privacy and Hamming
                  Distortion},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {13},
  number       = {11},
  pages        = {2816--2830},
  year         = {2018},
  url          = {https://doi.org/10.1109/TIFS.2018.2831619},
  doi          = {10.1109/TIFS.2018.2831619},
  timestamp    = {Thu, 06 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/KalantariSS18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/KhaliliNL18,
  author       = {Mohammad Mahdi Khalili and
                  Parinaz Naghizadeh and
                  Mingyan Liu},
  title        = {Designing Cyber Insurance Policies: The Role of Pre-Screening and
                  Security Interdependence},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {13},
  number       = {9},
  pages        = {2226--2239},
  year         = {2018},
  url          = {https://doi.org/10.1109/TIFS.2018.2812205},
  doi          = {10.1109/TIFS.2018.2812205},
  timestamp    = {Thu, 06 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/KhaliliNL18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/KhamsemananNJ18,
  author       = {Nirattaya Khamsemanan and
                  Cholwich Nattee and
                  Nitchan Jianwattanapaisarn},
  title        = {Human Identification From Freestyle Walks Using Posture-Based Gait
                  Feature},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {13},
  number       = {1},
  pages        = {119--128},
  year         = {2018},
  url          = {https://doi.org/10.1109/TIFS.2017.2738611},
  doi          = {10.1109/TIFS.2017.2738611},
  timestamp    = {Thu, 06 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/KhamsemananNJ18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/KhandakerMW18,
  author       = {Muhammad R. A. Khandaker and
                  Christos Masouros and
                  Kai{-}Kit Wong},
  title        = {Constructive Interference Based Secure Precoding: {A} New Dimension
                  in Physical Layer Security},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {13},
  number       = {9},
  pages        = {2256--2268},
  year         = {2018},
  url          = {https://doi.org/10.1109/TIFS.2018.2815541},
  doi          = {10.1109/TIFS.2018.2815541},
  timestamp    = {Thu, 06 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/KhandakerMW18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/KimANYJBSRK18,
  author       = {Jeeson Kim and
                  Taimur Ahmed and
                  Hussein Nili and
                  Jiawei Yang and
                  Doo Seok Jeong and
                  Paul Beckett and
                  Sharath Sriram and
                  Damith Chinthana Ranasinghe and
                  Omid Kavehei},
  title        = {A Physical Unclonable Function With Redox-Based Nanoionic Resistive
                  Memory},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {13},
  number       = {2},
  pages        = {437--448},
  year         = {2018},
  url          = {https://doi.org/10.1109/TIFS.2017.2756562},
  doi          = {10.1109/TIFS.2017.2756562},
  timestamp    = {Fri, 09 Apr 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/KimANYJBSRK18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/KohoutP18,
  author       = {Jan Kohout and
                  Tom{\'{a}}s Pevn{\'{y}}},
  title        = {Network Traffic Fingerprinting Based on Approximated Kernel Two-Sample
                  Test},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {13},
  number       = {3},
  pages        = {788--801},
  year         = {2018},
  url          = {https://doi.org/10.1109/TIFS.2017.2768018},
  doi          = {10.1109/TIFS.2017.2768018},
  timestamp    = {Sun, 25 Jul 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/KohoutP18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/KomeiliAH18,
  author       = {Majid Komeili and
                  Narges Armanfard and
                  Dimitrios Hatzinakos},
  title        = {Liveness Detection and Automatic Template Updating Using Fusion of
                  {ECG} and Fingerprint},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {13},
  number       = {7},
  pages        = {1810--1822},
  year         = {2018},
  url          = {https://doi.org/10.1109/TIFS.2018.2804890},
  doi          = {10.1109/TIFS.2018.2804890},
  timestamp    = {Sat, 10 Sep 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/KomeiliAH18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/KoteshwaraKP18,
  author       = {Sandhya Koteshwara and
                  Chris H. Kim and
                  Keshab K. Parhi},
  title        = {Key-Based Dynamic Functional Obfuscation of Integrated Circuits Using
                  Sequentially Triggered Mode-Based Design},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {13},
  number       = {1},
  pages        = {79--93},
  year         = {2018},
  url          = {https://doi.org/10.1109/TIFS.2017.2738600},
  doi          = {10.1109/TIFS.2017.2738600},
  timestamp    = {Thu, 06 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/KoteshwaraKP18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/KrishnamurthyKK18,
  author       = {Prashanth Krishnamurthy and
                  Farshad Khorrami and
                  Ramesh Karri and
                  David Paul{-}Pena and
                  Hossein Salehghaffari},
  title        = {Process-Aware Covert Channels Using Physical Instrumentation in Cyber-Physical
                  Systems},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {13},
  number       = {11},
  pages        = {2761--2771},
  year         = {2018},
  url          = {https://doi.org/10.1109/TIFS.2018.2833063},
  doi          = {10.1109/TIFS.2018.2833063},
  timestamp    = {Thu, 06 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/KrishnamurthyKK18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/KuhestaniMM18,
  author       = {Ali Kuhestani and
                  Abbas Mohammadi and
                  Mohammadali Mohammadi},
  title        = {Joint Relay Selection and Power Allocation in Large-Scale {MIMO} Systems
                  With Untrusted Relays and Passive Eavesdroppers},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {13},
  number       = {2},
  pages        = {341--355},
  year         = {2018},
  url          = {https://doi.org/10.1109/TIFS.2017.2750102},
  doi          = {10.1109/TIFS.2017.2750102},
  timestamp    = {Thu, 06 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/KuhestaniMM18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/KurtY018,
  author       = {Mehmet Necip Kurt and
                  Yasin Yilmaz and
                  Xiaodong Wang},
  title        = {Distributed Quickest Detection of Cyber-Attacks in Smart Grid},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {13},
  number       = {8},
  pages        = {2015--2030},
  year         = {2018},
  url          = {https://doi.org/10.1109/TIFS.2018.2800908},
  doi          = {10.1109/TIFS.2018.2800908},
  timestamp    = {Thu, 06 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/KurtY018.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/LallieDB18,
  author       = {Harjinder Singh Lallie and
                  Kurt Debattista and
                  Jay Bal},
  title        = {An Empirical Evaluation of the Effectiveness of Attack Graphs and
                  Fault Trees in Cyber-Attack Perception},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {13},
  number       = {5},
  pages        = {1110--1122},
  year         = {2018},
  url          = {https://doi.org/10.1109/TIFS.2017.2771238},
  doi          = {10.1109/TIFS.2017.2771238},
  timestamp    = {Tue, 20 Apr 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/LallieDB18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/LashgariA18,
  author       = {Sina Lashgari and
                  Amir Salman Avestimehr},
  title        = {Secrecy DoF of Blind {MIMOME} Wiretap Channel With Delayed {CSIT}},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {13},
  number       = {2},
  pages        = {478--489},
  year         = {2018},
  url          = {https://doi.org/10.1109/TIFS.2017.2756602},
  doi          = {10.1109/TIFS.2017.2756602},
  timestamp    = {Thu, 06 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/LashgariA18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/LeeKK18,
  author       = {Seungkwang Lee and
                  Taesung Kim and
                  Yousung Kang},
  title        = {A Masked White-Box Cryptographic Implementation for Protecting Against
                  Differential Computation Analysis},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {13},
  number       = {10},
  pages        = {2602--2615},
  year         = {2018},
  url          = {https://doi.org/10.1109/TIFS.2018.2825939},
  doi          = {10.1109/TIFS.2018.2825939},
  timestamp    = {Tue, 16 Aug 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/LeeKK18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/LeeWKW18,
  author       = {Si{-}Hyeon Lee and
                  Ligong Wang and
                  Ashish Khisti and
                  Gregory W. Wornell},
  title        = {Covert Communication With Channel-State Information at the Transmitter},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {13},
  number       = {9},
  pages        = {2310--2319},
  year         = {2018},
  url          = {https://doi.org/10.1109/TIFS.2018.2818650},
  doi          = {10.1109/TIFS.2018.2818650},
  timestamp    = {Wed, 21 Apr 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/LeeWKW18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/LeeYDC018,
  author       = {Po{-}Yen Lee and
                  Chia{-}Mu Yu and
                  Tooska Dargahi and
                  Mauro Conti and
                  Giuseppe Bianchi},
  title        = {MDSClone: Multidimensional Scaling Aided Clone Detection in Internet
                  of Things},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {13},
  number       = {8},
  pages        = {2031--2046},
  year         = {2018},
  url          = {https://doi.org/10.1109/TIFS.2018.2805291},
  doi          = {10.1109/TIFS.2018.2805291},
  timestamp    = {Thu, 06 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/LeeYDC018.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/LiCPF18,
  author       = {Lingxiang Li and
                  Zhi Chen and
                  Athina P. Petropulu and
                  Jun Fang},
  title        = {Linear Precoder Design for an {MIMO} Gaussian Wiretap Channel With
                  Full-Duplex Source and Destination Nodes},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {13},
  number       = {2},
  pages        = {421--436},
  year         = {2018},
  url          = {https://doi.org/10.1109/TIFS.2017.2756350},
  doi          = {10.1109/TIFS.2017.2756350},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/LiCPF18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/LiHWRJK18,
  author       = {Haoliang Li and
                  Peisong He and
                  Shiqi Wang and
                  Anderson Rocha and
                  Xinghao Jiang and
                  Alex C. Kot},
  title        = {Learning Generalized Deep Feature Representation for Face Anti-Spoofing},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {13},
  number       = {10},
  pages        = {2639--2652},
  year         = {2018},
  url          = {https://doi.org/10.1109/TIFS.2018.2825949},
  doi          = {10.1109/TIFS.2018.2825949},
  timestamp    = {Thu, 06 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/LiHWRJK18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/LiHY18,
  author       = {Haoxi Li and
                  Haifeng Hu and
                  Chitung Yip},
  title        = {Age-Related Factor Guided Joint Task Modeling Convolutional Neural
                  Network for Cross-Age Face Recognition},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {13},
  number       = {9},
  pages        = {2383--2392},
  year         = {2018},
  url          = {https://doi.org/10.1109/TIFS.2018.2819124},
  doi          = {10.1109/TIFS.2018.2819124},
  timestamp    = {Thu, 06 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/LiHY18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/LiLCWHK18,
  author       = {Haoliang Li and
                  Wen Li and
                  Hong Cao and
                  Shiqi Wang and
                  Feiyue Huang and
                  Alex C. Kot},
  title        = {Unsupervised Domain Adaptation for Face Anti-Spoofing},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {13},
  number       = {7},
  pages        = {1794--1809},
  year         = {2018},
  url          = {https://doi.org/10.1109/TIFS.2018.2801312},
  doi          = {10.1109/TIFS.2018.2801312},
  timestamp    = {Thu, 29 Sep 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/LiLCWHK18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/LiLZTZ18,
  author       = {Bin Li and
                  Zhongpeng Li and
                  Shijun Zhou and
                  Shunquan Tan and
                  Xiaoling Zhang},
  title        = {New Steganalytic Features for Spatial Image Steganography Based on
                  Derivative Filters and Threshold {LBP} Operator},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {13},
  number       = {5},
  pages        = {1242--1257},
  year         = {2018},
  url          = {https://doi.org/10.1109/TIFS.2017.2780805},
  doi          = {10.1109/TIFS.2017.2780805},
  timestamp    = {Thu, 06 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/LiLZTZ18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/LiM18,
  author       = {Chen Li and
                  Wenping Ma},
  title        = {Comments on "An Efficient Privacy-Preserving Outsourced Calculation
                  Toolkit With Multiple Keys"},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {13},
  number       = {10},
  pages        = {2668--2669},
  year         = {2018},
  url          = {https://doi.org/10.1109/TIFS.2018.2825143},
  doi          = {10.1109/TIFS.2018.2825143},
  timestamp    = {Wed, 25 Aug 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/LiM18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/LiPMLZ18,
  author       = {Zi Li and
                  Qingqi Pei and
                  Ian D. Markwood and
                  Yao Liu and
                  Haojin Zhu},
  title        = {Secret Key Establishment via {RSS} Trajectory Matching Between Wearable
                  Devices},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {13},
  number       = {3},
  pages        = {802--817},
  year         = {2018},
  url          = {https://doi.org/10.1109/TIFS.2017.2768020},
  doi          = {10.1109/TIFS.2017.2768020},
  timestamp    = {Fri, 09 Apr 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/LiPMLZ18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/LiPMLZ18a,
  author       = {Zi Li and
                  Qingqi Pei and
                  Ian D. Markwood and
                  Yao Liu and
                  Haojin Zhu},
  title        = {Corrections to "Secret Key Establishment via {RSS} Trajectory Matching
                  Between Wearable Devices" [Mar 18 802-817]},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {13},
  number       = {6},
  pages        = {1595},
  year         = {2018},
  url          = {https://doi.org/10.1109/TIFS.2018.2790878},
  doi          = {10.1109/TIFS.2018.2790878},
  timestamp    = {Fri, 02 Sep 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/LiPMLZ18a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/LiTZM18,
  author       = {Jinku Li and
                  Xiaomeng Tong and
                  Fengwei Zhang and
                  Jianfeng Ma},
  title        = {Fine-CFI: Fine-Grained Control-Flow Integrity for Operating System
                  Kernels},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {13},
  number       = {6},
  pages        = {1535--1550},
  year         = {2018},
  url          = {https://doi.org/10.1109/TIFS.2018.2797932},
  doi          = {10.1109/TIFS.2018.2797932},
  timestamp    = {Fri, 28 Apr 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/LiTZM18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/LiY18,
  author       = {Quanzhong Li and
                  Liang Yang},
  title        = {Artificial Noise Aided Secure Precoding for {MIMO} Untrusted Two-Way
                  Relay Systems With Perfect and Imperfect Channel State Information},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {13},
  number       = {10},
  pages        = {2628--2638},
  year         = {2018},
  url          = {https://doi.org/10.1109/TIFS.2018.2825944},
  doi          = {10.1109/TIFS.2018.2825944},
  timestamp    = {Thu, 06 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/LiY18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/LiZLZYH18,
  author       = {Yanxiong Li and
                  Xue Zhang and
                  Xianku Li and
                  Yuhan Zhang and
                  Ji{-}Chen Yang and
                  Qianhua He},
  title        = {Mobile Phone Clustering From Speech Recordings Using Deep Representation
                  and Spectral Clustering},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {13},
  number       = {4},
  pages        = {965--977},
  year         = {2018},
  url          = {https://doi.org/10.1109/TIFS.2017.2774505},
  doi          = {10.1109/TIFS.2017.2774505},
  timestamp    = {Thu, 06 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/LiZLZYH18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/LiaoSTC18,
  author       = {Jiachun Liao and
                  Lalitha Sankar and
                  Vincent Y. F. Tan and
                  Fl{\'{a}}vio du Pin Calmon},
  title        = {Hypothesis Testing Under Mutual Information Privacy Constraints in
                  the High Privacy Regime},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {13},
  number       = {4},
  pages        = {1058--1071},
  year         = {2018},
  url          = {https://doi.org/10.1109/TIFS.2017.2779108},
  doi          = {10.1109/TIFS.2017.2779108},
  timestamp    = {Thu, 06 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/LiaoSTC18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/LiaskosI18,
  author       = {Christos Liaskos and
                  Sotiris Ioannidis},
  title        = {Network Topology Effects on the Detectability of Crossfire Attacks},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {13},
  number       = {7},
  pages        = {1682--1695},
  year         = {2018},
  url          = {https://doi.org/10.1109/TIFS.2018.2799425},
  doi          = {10.1109/TIFS.2018.2799425},
  timestamp    = {Thu, 06 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/LiaskosI18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/LinHW18,
  author       = {Zinan Lin and
                  Yongfeng Huang and
                  Jilong Wang},
  title        = {{RNN-SM:} Fast Steganalysis of VoIP Streams Using Recurrent Neural
                  Network},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {13},
  number       = {7},
  pages        = {1854--1868},
  year         = {2018},
  url          = {https://doi.org/10.1109/TIFS.2018.2806741},
  doi          = {10.1109/TIFS.2018.2806741},
  timestamp    = {Fri, 07 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/LinHW18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/LinLHSC18,
  author       = {Shih{-}Chun Lin and
                  Chien{-}Chi Liu and
                  Min{-}Yen Hsieh and
                  Shih{-}Tang Su and
                  Wei{-}Ho Chung},
  title        = {Coded Quickest Classification With Applications in Bandwidth-Efficient
                  Smart Grid Monitoring},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {13},
  number       = {12},
  pages        = {3122--3136},
  year         = {2018},
  url          = {https://doi.org/10.1109/TIFS.2018.2837658},
  doi          = {10.1109/TIFS.2018.2837658},
  timestamp    = {Thu, 06 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/LinLHSC18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/LinLYSW18,
  author       = {Jingran Lin and
                  Qiang Li and
                  Jintai Yang and
                  Huaizong Shao and
                  Wen{-}Qin Wang},
  title        = {Physical-Layer Security for Proximal Legitimate User and Eavesdropper:
                  {A} Frequency Diverse Array Beamforming Approach},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {13},
  number       = {3},
  pages        = {671--684},
  year         = {2018},
  url          = {https://doi.org/10.1109/TIFS.2017.2765500},
  doi          = {10.1109/TIFS.2017.2765500},
  timestamp    = {Thu, 27 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/LinLYSW18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/LinPL18,
  author       = {Zi{-}Xing Lin and
                  Fei Peng and
                  Min Long},
  title        = {A Low-Distortion Reversible Watermarking for 2D Engineering Graphics
                  Based on Region Nesting},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {13},
  number       = {9},
  pages        = {2372--2382},
  year         = {2018},
  url          = {https://doi.org/10.1109/TIFS.2018.2819122},
  doi          = {10.1109/TIFS.2018.2819122},
  timestamp    = {Thu, 06 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/LinPL18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/LiuLFZ18,
  author       = {Hao Liu and
                  Jiwen Lu and
                  Jianjiang Feng and
                  Jie Zhou},
  title        = {Label-Sensitive Deep Metric Learning for Facial Age Estimation},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {13},
  number       = {2},
  pages        = {292--305},
  year         = {2018},
  url          = {https://doi.org/10.1109/TIFS.2017.2746062},
  doi          = {10.1109/TIFS.2017.2746062},
  timestamp    = {Thu, 06 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/LiuLFZ18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/LiuYS18,
  author       = {Jianhua Liu and
                  Jiadi Yu and
                  Shigen Shen},
  title        = {Energy-Efficient Two-Layer Cooperative Defense Scheme to Secure Sensor-Clouds},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {13},
  number       = {2},
  pages        = {408--420},
  year         = {2018},
  url          = {https://doi.org/10.1109/TIFS.2017.2756344},
  doi          = {10.1109/TIFS.2017.2756344},
  timestamp    = {Thu, 11 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tifs/LiuYS18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/LopezLBT18,
  author       = {Juan Lopez Jr. and
                  Nathan C. Liefer and
                  Colin R. Busho and
                  Michael A. Temple},
  title        = {Enhancing Critical Infrastructure and Key Resources {(CIKR)} Level-0
                  Physical Process Security Using Field Device Distinct Native Attribute
                  Features},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {13},
  number       = {5},
  pages        = {1215--1229},
  year         = {2018},
  url          = {https://doi.org/10.1109/TIFS.2017.2779447},
  doi          = {10.1109/TIFS.2017.2779447},
  timestamp    = {Fri, 29 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/LopezLBT18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/LuXZLL18,
  author       = {Jianfeng Lu and
                  Yun Xin and
                  Zhao Zhang and
                  Xinwang Liu and
                  Kenli Li},
  title        = {Game-Theoretic Design of Optimal Two-Sided Rating Protocols for Service
                  Exchange Dilemma in Crowdsourcing},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {13},
  number       = {11},
  pages        = {2801--2815},
  year         = {2018},
  url          = {https://doi.org/10.1109/TIFS.2018.2834318},
  doi          = {10.1109/TIFS.2018.2834318},
  timestamp    = {Mon, 12 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tifs/LuXZLL18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/LuoAFW18,
  author       = {Pei Luo and
                  Konstantinos Athanasiou and
                  Yunsi Fei and
                  Thomas Wahl},
  title        = {Algebraic Fault Analysis of {SHA-3} Under Relaxed Fault Models},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {13},
  number       = {7},
  pages        = {1752--1761},
  year         = {2018},
  url          = {https://doi.org/10.1109/TIFS.2018.2790938},
  doi          = {10.1109/TIFS.2018.2790938},
  timestamp    = {Sat, 10 Sep 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/LuoAFW18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/LuoKH18,
  author       = {Da Luo and
                  Pawel Korus and
                  Jiwu Huang},
  title        = {Band Energy Difference for Source Attribution in Audio Forensics},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {13},
  number       = {9},
  pages        = {2179--2189},
  year         = {2018},
  url          = {https://doi.org/10.1109/TIFS.2018.2812185},
  doi          = {10.1109/TIFS.2018.2812185},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/LuoKH18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/LuzMOSM18,
  author       = {Eduardo Jos{\'{e}} da S. Luz and
                  Gladston J. P. Moreira and
                  Luiz S. Oliveira and
                  William Robson Schwartz and
                  David Menotti},
  title        = {Learning Deep Off-the-Person Heart Biometrics Representations},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {13},
  number       = {5},
  pages        = {1258--1270},
  year         = {2018},
  url          = {https://doi.org/10.1109/TIFS.2017.2784362},
  doi          = {10.1109/TIFS.2017.2784362},
  timestamp    = {Thu, 06 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/LuzMOSM18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/MaioranaC18,
  author       = {Emanuele Maiorana and
                  Patrizio Campisi},
  title        = {Longitudinal Evaluation of EEG-Based Biometric Recognition},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {13},
  number       = {5},
  pages        = {1123--1138},
  year         = {2018},
  url          = {https://doi.org/10.1109/TIFS.2017.2778010},
  doi          = {10.1109/TIFS.2017.2778010},
  timestamp    = {Thu, 06 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/MaioranaC18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/MajumdarMWJPWD18,
  author       = {Suryadipta Majumdar and
                  Taous Madi and
                  Yushun Wang and
                  Yosr Jarraya and
                  Makan Pourzandi and
                  Lingyu Wang and
                  Mourad Debbabi},
  title        = {User-Level Runtime Security Auditing for the Cloud},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {13},
  number       = {5},
  pages        = {1185--1199},
  year         = {2018},
  url          = {https://doi.org/10.1109/TIFS.2017.2779444},
  doi          = {10.1109/TIFS.2017.2779444},
  timestamp    = {Thu, 06 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/MajumdarMWJPWD18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/MangiaPRS18,
  author       = {Mauro Mangia and
                  Fabio Pareschi and
                  Riccardo Rovatti and
                  Gianluca Setti},
  title        = {Low-Cost Security of IoT Sensor Nodes With Rakeness-Based Compressed
                  Sensing: Statistical and Known-Plaintext Attacks},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {13},
  number       = {2},
  pages        = {327--340},
  year         = {2018},
  url          = {https://doi.org/10.1109/TIFS.2017.2749982},
  doi          = {10.1109/TIFS.2017.2749982},
  timestamp    = {Thu, 06 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/MangiaPRS18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/MattaMLF18,
  author       = {Vincenzo Matta and
                  Mario Di Mauro and
                  Maurizio Longo and
                  Alfonso Farina},
  title        = {Cyber-Threat Mitigation Exploiting the Birth-Death-Immigration Model},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {13},
  number       = {12},
  pages        = {3137--3152},
  year         = {2018},
  url          = {https://doi.org/10.1109/TIFS.2018.2838084},
  doi          = {10.1109/TIFS.2018.2838084},
  timestamp    = {Thu, 06 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/MattaMLF18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/MayerS18,
  author       = {Owen Mayer and
                  Matthew C. Stamm},
  title        = {Accurate and Efficient Image Forgery Detection Using Lateral Chromatic
                  Aberration},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {13},
  number       = {7},
  pages        = {1762--1777},
  year         = {2018},
  url          = {https://doi.org/10.1109/TIFS.2018.2799421},
  doi          = {10.1109/TIFS.2018.2799421},
  timestamp    = {Sat, 10 Sep 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/MayerS18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/MekkawyYTXL18,
  author       = {Tamer Mekkawy and
                  Rugui Yao and
                  Theodoros A. Tsiftsis and
                  Fei Xu and
                  Yanan Lu},
  title        = {Joint Beamforming Alignment With Suboptimal Power Allocation for a
                  Two-Way Untrusted Relay Network},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {13},
  number       = {10},
  pages        = {2464--2474},
  year         = {2018},
  url          = {https://doi.org/10.1109/TIFS.2018.2819132},
  doi          = {10.1109/TIFS.2018.2819132},
  timestamp    = {Thu, 06 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/MekkawyYTXL18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/MiaoMHW18,
  author       = {Meixia Miao and
                  Jianfeng Ma and
                  Xinyi Huang and
                  Qian Wang},
  title        = {Efficient Verifiable Databases With Insertion/Deletion Operations
                  From Delegating Polynomial Functions},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {13},
  number       = {2},
  pages        = {511--520},
  year         = {2018},
  url          = {https://doi.org/10.1109/TIFS.2017.2758746},
  doi          = {10.1109/TIFS.2017.2758746},
  timestamp    = {Mon, 25 Apr 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/MiaoMHW18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/MiehlingRT18,
  author       = {Erik Miehling and
                  Mohammad Rasouli and
                  Demosthenis Teneketzis},
  title        = {A {POMDP} Approach to the Dynamic Defense of Large-Scale Cyber Networks},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {13},
  number       = {10},
  pages        = {2490--2505},
  year         = {2018},
  url          = {https://doi.org/10.1109/TIFS.2018.2819967},
  doi          = {10.1109/TIFS.2018.2819967},
  timestamp    = {Thu, 06 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/MiehlingRT18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/MohapatraPLQA18,
  author       = {Parthajit Mohapatra and
                  Nikolaos Pappas and
                  Jemin Lee and
                  Tony Q. S. Quek and
                  Vangelis Angelakis},
  title        = {Secure Communications for the Two-User Broadcast Channel With Random
                  Traffic},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {13},
  number       = {9},
  pages        = {2294--2309},
  year         = {2018},
  url          = {https://doi.org/10.1109/TIFS.2018.2818076},
  doi          = {10.1109/TIFS.2018.2818076},
  timestamp    = {Thu, 06 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/MohapatraPLQA18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/NadzinskiDAMSSS18,
  author       = {Gorjan Nadzinski and
                  Matej Dobrevski and
                  Christopher Anderson and
                  Peter V. E. McClintock and
                  Aneta Stefanovska and
                  Mile J. Stankovski and
                  Tomislav Stankovski},
  title        = {Experimental Realization of the Coupling Function Secure Communications
                  Protocol and Analysis of Its Noise Robustness},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {13},
  number       = {10},
  pages        = {2591--2601},
  year         = {2018},
  url          = {https://doi.org/10.1109/TIFS.2018.2825147},
  doi          = {10.1109/TIFS.2018.2825147},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/NadzinskiDAMSSS18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/NakamuraGM18,
  author       = {Takashi Nakamura and
                  Valentin Goverdovsky and
                  Danilo P. Mandic},
  title        = {In-Ear {EEG} Biometrics for Feasible and Readily Collectable Real-World
                  Person Authentication},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {13},
  number       = {3},
  pages        = {648--661},
  year         = {2018},
  url          = {https://doi.org/10.1109/TIFS.2017.2763124},
  doi          = {10.1109/TIFS.2017.2763124},
  timestamp    = {Thu, 06 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/NakamuraGM18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/NieLCCXY18,
  author       = {Xiushan Nie and
                  Xiaoyu Li and
                  Yane Chai and
                  Chaoran Cui and
                  Xiaoming Xi and
                  Yilong Yin},
  title        = {Robust Image Fingerprinting Based on Feature Point Relationship Mining},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {13},
  number       = {6},
  pages        = {1509--1523},
  year         = {2018},
  url          = {https://doi.org/10.1109/TIFS.2018.2790953},
  doi          = {10.1109/TIFS.2018.2790953},
  timestamp    = {Sat, 10 Sep 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/NieLCCXY18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/NingCDLMW18,
  author       = {Jianting Ning and
                  Zhenfu Cao and
                  Xiaolei Dong and
                  Kaitai Liang and
                  Hui Ma and
                  Lifei Wei},
  title        = {Auditable {\(\sigma\)}-Time Outsourced Attribute-Based Encryption
                  for Access Control in Cloud Computing},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {13},
  number       = {1},
  pages        = {94--105},
  year         = {2018},
  url          = {https://doi.org/10.1109/TIFS.2017.2738601},
  doi          = {10.1109/TIFS.2017.2738601},
  timestamp    = {Sun, 22 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/NingCDLMW18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/PengWDT18,
  author       = {Bo Peng and
                  Wei Wang and
                  Jing Dong and
                  Tieniu Tan},
  title        = {Image Forensics Based on Planar Contact Constraints of 3D Objects},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {13},
  number       = {2},
  pages        = {377--392},
  year         = {2018},
  url          = {https://doi.org/10.1109/TIFS.2017.2752728},
  doi          = {10.1109/TIFS.2017.2752728},
  timestamp    = {Thu, 06 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/PengWDT18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/PerazzoneYSB18,
  author       = {Jake B. Perazzone and
                  Paul L. Yu and
                  Brian M. Sadler and
                  Rick S. Blum},
  title        = {Cryptographic Side-Channel Signaling and Authentication via Fingerprint
                  Embedding},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {13},
  number       = {9},
  pages        = {2216--2225},
  year         = {2018},
  url          = {https://doi.org/10.1109/TIFS.2018.2812202},
  doi          = {10.1109/TIFS.2018.2812202},
  timestamp    = {Thu, 06 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/PerazzoneYSB18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/PereraP18,
  author       = {Pramuditha Perera and
                  Vishal M. Patel},
  title        = {Efficient and Low Latency Detection of Intruders in Mobile Active
                  Authentication},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {13},
  number       = {6},
  pages        = {1392--1405},
  year         = {2018},
  url          = {https://doi.org/10.1109/TIFS.2017.2787995},
  doi          = {10.1109/TIFS.2017.2787995},
  timestamp    = {Thu, 04 May 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/PereraP18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/PhongAHWM18,
  author       = {Le Trieu Phong and
                  Yoshinori Aono and
                  Takuya Hayashi and
                  Lihua Wang and
                  Shiho Moriai},
  title        = {Privacy-Preserving Deep Learning via Additively Homomorphic Encryption},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {13},
  number       = {5},
  pages        = {1333--1345},
  year         = {2018},
  url          = {https://doi.org/10.1109/TIFS.2017.2787987},
  doi          = {10.1109/TIFS.2017.2787987},
  timestamp    = {Thu, 06 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/PhongAHWM18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/PreishuberHKU18,
  author       = {Mario Preishuber and
                  Thomas H{\"{u}}tter and
                  Stefan Katzenbeisser and
                  Andreas Uhl},
  title        = {Depreciating Motivation and Empirical Security Analysis of Chaos-Based
                  Image and Video Encryption},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {13},
  number       = {9},
  pages        = {2137--2150},
  year         = {2018},
  url          = {https://doi.org/10.1109/TIFS.2018.2812080},
  doi          = {10.1109/TIFS.2018.2812080},
  timestamp    = {Sat, 05 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/PreishuberHKU18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/ProencaN18,
  author       = {Hugo Proen{\c{c}}a and
                  Jo{\~{a}}o C. Neves},
  title        = {Deep-PRWIS: Periocular Recognition Without the Iris and Sclera Using
                  Deep Learning Frameworks},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {13},
  number       = {4},
  pages        = {888--896},
  year         = {2018},
  url          = {https://doi.org/10.1109/TIFS.2017.2771230},
  doi          = {10.1109/TIFS.2017.2771230},
  timestamp    = {Mon, 08 Apr 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/ProencaN18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/PuteauxP18,
  author       = {Pauline Puteaux and
                  William Puech},
  title        = {An Efficient {MSB} Prediction-Based Method for High-Capacity Reversible
                  Data Hiding in Encrypted Images},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {13},
  number       = {7},
  pages        = {1670--1681},
  year         = {2018},
  url          = {https://doi.org/10.1109/TIFS.2018.2799381},
  doi          = {10.1109/TIFS.2018.2799381},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/PuteauxP18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/QiuKTJH18,
  author       = {Xinwei Qiu and
                  Wenxiong Kang and
                  Senping Tian and
                  Wei Jia and
                  Zhixing Huang},
  title        = {Finger Vein Presentation Attack Detection Using Total Variation Decomposition},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {13},
  number       = {2},
  pages        = {465--477},
  year         = {2018},
  url          = {https://doi.org/10.1109/TIFS.2017.2756598},
  doi          = {10.1109/TIFS.2017.2756598},
  timestamp    = {Thu, 06 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/QiuKTJH18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/QuanWYZ18,
  author       = {Weize Quan and
                  Kai Wang and
                  Dong{-}Ming Yan and
                  Xiaopeng Zhang},
  title        = {Distinguishing Between Natural and Computer-Generated Images Using
                  Convolutional Neural Networks},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {13},
  number       = {11},
  pages        = {2772--2787},
  year         = {2018},
  url          = {https://doi.org/10.1109/TIFS.2018.2834147},
  doi          = {10.1109/TIFS.2018.2834147},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/QuanWYZ18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/RashidiFNVB18,
  author       = {Bahman Rashidi and
                  Carol J. Fung and
                  Anh Nguyen and
                  Tam Vu and
                  Elisa Bertino},
  title        = {Android User Privacy Preserving Through Crowdsourcing},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {13},
  number       = {3},
  pages        = {773--787},
  year         = {2018},
  url          = {https://doi.org/10.1109/TIFS.2017.2767019},
  doi          = {10.1109/TIFS.2017.2767019},
  timestamp    = {Mon, 16 Aug 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/RashidiFNVB18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/RavindrakumarPK18,
  author       = {Vaishakh Ravindrakumar and
                  Parthasarathi Panda and
                  Nikhil Karamchandani and
                  Vinod M. Prabhakaran},
  title        = {Private Coded Caching},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {13},
  number       = {3},
  pages        = {685--694},
  year         = {2018},
  url          = {https://doi.org/10.1109/TIFS.2017.2765503},
  doi          = {10.1109/TIFS.2017.2765503},
  timestamp    = {Thu, 06 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/RavindrakumarPK18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/RenYYYYMY18,
  author       = {Xuebin Ren and
                  Chia{-}Mu Yu and
                  Weiren Yu and
                  Shusen Yang and
                  Xinyu Yang and
                  Julie A. McCann and
                  Philip S. Yu},
  title        = {LoPub: High-Dimensional Crowdsourced Data Publication With Local Differential
                  Privacy},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {13},
  number       = {9},
  pages        = {2151--2166},
  year         = {2018},
  url          = {https://doi.org/10.1109/TIFS.2018.2812146},
  doi          = {10.1109/TIFS.2018.2812146},
  timestamp    = {Thu, 06 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/RenYYYYMY18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/RitzdorfSKMGC18,
  author       = {Hubert Ritzdorf and
                  Claudio Soriente and
                  Ghassan O. Karame and
                  Srdjan Marinovic and
                  Damian Gruber and
                  Srdjan Capkun},
  title        = {Toward Shared Ownership in the Cloud},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {13},
  number       = {12},
  pages        = {3019--3034},
  year         = {2018},
  url          = {https://doi.org/10.1109/TIFS.2018.2837648},
  doi          = {10.1109/TIFS.2018.2837648},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tifs/RitzdorfSKMGC18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/SasakiW18,
  author       = {Manami Sasaki and
                  Yodai Watanabe},
  title        = {Visual Secret Sharing Schemes Encrypting Multiple Images},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {13},
  number       = {2},
  pages        = {356--365},
  year         = {2018},
  url          = {https://doi.org/10.1109/TIFS.2017.2750104},
  doi          = {10.1109/TIFS.2017.2750104},
  timestamp    = {Sun, 22 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/SasakiW18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/SchallerSSK18,
  author       = {Andr{\'{e}} Schaller and
                  Taras Stanko and
                  Boris Skoric and
                  Stefan Katzenbeisser},
  title        = {Eliminating Leakage in Reverse Fuzzy Extractors},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {13},
  number       = {4},
  pages        = {954--964},
  year         = {2018},
  url          = {https://doi.org/10.1109/TIFS.2017.2774500},
  doi          = {10.1109/TIFS.2017.2774500},
  timestamp    = {Thu, 06 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/SchallerSSK18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/SenAA18,
  author       = {Sevil Sen and
                  Emre Aydogan and
                  Ahmet Ilhan Aysan},
  title        = {Coevolution of Mobile Malware and Anti-Malware},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {13},
  number       = {10},
  pages        = {2563--2574},
  year         = {2018},
  url          = {https://doi.org/10.1109/TIFS.2018.2824250},
  doi          = {10.1109/TIFS.2018.2824250},
  timestamp    = {Thu, 06 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/SenAA18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/Sepas-Moghaddam18,
  author       = {Alireza Sepas{-}Moghaddam and
                  Fernando Pereira and
                  Paulo Lobato Correia},
  title        = {Light Field-Based Face Presentation Attack Detection: Reviewing, Benchmarking
                  and One Step Further},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {13},
  number       = {7},
  pages        = {1696--1709},
  year         = {2018},
  url          = {https://doi.org/10.1109/TIFS.2018.2799427},
  doi          = {10.1109/TIFS.2018.2799427},
  timestamp    = {Thu, 06 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/Sepas-Moghaddam18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/ShenLCGM18,
  author       = {Chao Shen and
                  Yuanxun Li and
                  Yufei Chen and
                  Xiaohong Guan and
                  Roy A. Maxion},
  title        = {Performance Analysis of Multi-Motion Sensor Behavior for Active Smartphone
                  Authentication},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {13},
  number       = {1},
  pages        = {48--62},
  year         = {2018},
  url          = {https://doi.org/10.1109/TIFS.2017.2737969},
  doi          = {10.1109/TIFS.2017.2737969},
  timestamp    = {Tue, 29 Jun 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/ShenLCGM18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/ShenMZMDH18,
  author       = {Meng Shen and
                  Baoli Ma and
                  Liehuang Zhu and
                  Rashid Mijumbi and
                  Xiaojiang Du and
                  Jiankun Hu},
  title        = {Cloud-Based Approximate Constrained Shortest Distance Queries Over
                  Encrypted Graphs With Privacy Protection},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {13},
  number       = {4},
  pages        = {940--953},
  year         = {2018},
  url          = {https://doi.org/10.1109/TIFS.2017.2774451},
  doi          = {10.1109/TIFS.2017.2774451},
  timestamp    = {Fri, 12 May 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/ShenMZMDH18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/ShenZCLS18,
  author       = {Jian Shen and
                  Tianqi Zhou and
                  Xiaofeng Chen and
                  Jin Li and
                  Willy Susilo},
  title        = {Anonymous and Traceable Group Data Sharing in Cloud Computing},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {13},
  number       = {4},
  pages        = {912--925},
  year         = {2018},
  url          = {https://doi.org/10.1109/TIFS.2017.2774439},
  doi          = {10.1109/TIFS.2017.2774439},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/ShenZCLS18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/ShiOJ18,
  author       = {Yichun Shi and
                  Charles Otto and
                  Anil K. Jain},
  title        = {Face Clustering: Representation and Pairwise Constraints},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {13},
  number       = {7},
  pages        = {1626--1640},
  year         = {2018},
  url          = {https://doi.org/10.1109/TIFS.2018.2796999},
  doi          = {10.1109/TIFS.2018.2796999},
  timestamp    = {Thu, 06 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/ShiOJ18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/ShoufanASD18,
  author       = {Abdulhadi Shoufan and
                  Haitham M. Al{-}Angari and
                  Muhammad Faraz Afzal Sheikh and
                  Ernesto Damiani},
  title        = {Drone Pilot Identification by Classifying Radio-Control Signals},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {13},
  number       = {10},
  pages        = {2439--2447},
  year         = {2018},
  url          = {https://doi.org/10.1109/TIFS.2018.2819126},
  doi          = {10.1109/TIFS.2018.2819126},
  timestamp    = {Thu, 06 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/ShoufanASD18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/SongFHKW18,
  author       = {Xiaoning Song and
                  Zhen{-}Hua Feng and
                  Guosheng Hu and
                  Josef Kittler and
                  Xiao{-}Jun Wu},
  title        = {Dictionary Integration Using 3D Morphable Face Models for Pose-Invariant
                  Collaborative-Representation-Based Classification},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {13},
  number       = {11},
  pages        = {2734--2745},
  year         = {2018},
  url          = {https://doi.org/10.1109/TIFS.2018.2833052},
  doi          = {10.1109/TIFS.2018.2833052},
  timestamp    = {Sat, 29 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/SongFHKW18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/SousaV18,
  author       = {Jo{\~{a}}o S{\'{a}} Sousa and
                  Jo{\~{a}}o P. Vilela},
  title        = {Uncoordinated Frequency Hopping for Wireless Secrecy Against Non-Degraded
                  Eavesdroppers},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {13},
  number       = {1},
  pages        = {143--155},
  year         = {2018},
  url          = {https://doi.org/10.1109/TIFS.2017.2737963},
  doi          = {10.1109/TIFS.2017.2737963},
  timestamp    = {Thu, 06 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/SousaV18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/SuYZLD18,
  author       = {Zhiyong Su and
                  Ying Ye and
                  Qi Zhang and
                  Weiqing Li and
                  Yuewei Dai},
  title        = {Robust 2D Engineering {CAD} Graphics Hashing for Joint Topology and
                  Geometry Authentication via Covariance-Based Descriptors},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {13},
  number       = {4},
  pages        = {1018--1030},
  year         = {2018},
  url          = {https://doi.org/10.1109/TIFS.2017.2777341},
  doi          = {10.1109/TIFS.2017.2777341},
  timestamp    = {Thu, 06 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/SuYZLD18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/SunDLSY18,
  author       = {Xiaoyan Sun and
                  Jun Dai and
                  Peng Liu and
                  Anoop Singhal and
                  John Yen},
  title        = {Using Bayesian Networks for Probabilistic Identification of Zero-Day
                  Attack Paths},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {13},
  number       = {10},
  pages        = {2506--2521},
  year         = {2018},
  url          = {https://doi.org/10.1109/TIFS.2018.2821095},
  doi          = {10.1109/TIFS.2018.2821095},
  timestamp    = {Mon, 04 Jan 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tifs/SunDLSY18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/TangDZY018,
  author       = {Zhuo Tang and
                  Xiaofei Ding and
                  Ying Zhong and
                  Li Yang and
                  Keqin Li},
  title        = {A Self-Adaptive Bell-LaPadula Model Based on Model Training With Historical
                  Access Logs},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {13},
  number       = {8},
  pages        = {2047--2061},
  year         = {2018},
  url          = {https://doi.org/10.1109/TIFS.2018.2807793},
  doi          = {10.1109/TIFS.2018.2807793},
  timestamp    = {Thu, 14 Dec 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tifs/TangDZY018.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/TangGZLZW18,
  author       = {Mengyun Tang and
                  Haichang Gao and
                  Yang Zhang and
                  Yi Liu and
                  Ping Zhang and
                  Ping Wang},
  title        = {Research on Deep Learning Techniques in Breaking Text-Based Captchas
                  and Designing Image-Based Captcha},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {13},
  number       = {10},
  pages        = {2522--2537},
  year         = {2018},
  url          = {https://doi.org/10.1109/TIFS.2018.2821096},
  doi          = {10.1109/TIFS.2018.2821096},
  timestamp    = {Sun, 12 Nov 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tifs/TangGZLZW18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/TangJT18,
  author       = {Wenchang Tang and
                  Feng Ji and
                  Wee Peng Tay},
  title        = {Estimating Infection Sources in Networks Using Partial Timestamps},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {13},
  number       = {12},
  pages        = {3035--3049},
  year         = {2018},
  url          = {https://doi.org/10.1109/TIFS.2018.2837655},
  doi          = {10.1109/TIFS.2018.2837655},
  timestamp    = {Thu, 06 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/TangJT18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/TangKF18,
  author       = {Lei Tang and
                  Wenxiong Kang and
                  Yuxun Fang},
  title        = {Information Divergence-Based Matching Strategy for Online Signature
                  Verification},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {13},
  number       = {4},
  pages        = {861--873},
  year         = {2018},
  url          = {https://doi.org/10.1109/TIFS.2017.2769023},
  doi          = {10.1109/TIFS.2017.2769023},
  timestamp    = {Thu, 06 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/TangKF18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/TangWXWZPD18,
  author       = {Ming Tang and
                  Pengbo Wang and
                  Xiaoqi Ma and
                  Wenjie Chang and
                  Huanguo Zhang and
                  Guojun Peng and
                  Jean{-}Luc Danger},
  title        = {An Efficient {SCA} Leakage Model Construction Method Under Predictable
                  Evaluation},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {13},
  number       = {12},
  pages        = {3008--3018},
  year         = {2018},
  url          = {https://doi.org/10.1109/TIFS.2018.2837644},
  doi          = {10.1109/TIFS.2018.2837644},
  timestamp    = {Fri, 13 Aug 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/TangWXWZPD18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/TavangaranSPB18,
  author       = {Nima Tavangaran and
                  Rafael F. Schaefer and
                  H. Vincent Poor and
                  Holger Boche},
  title        = {Secret-Key Generation and Convexity of the Rate Region Using Infinite
                  Compound Sources},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {13},
  number       = {8},
  pages        = {2075--2086},
  year         = {2018},
  url          = {https://doi.org/10.1109/TIFS.2018.2809680},
  doi          = {10.1109/TIFS.2018.2809680},
  timestamp    = {Thu, 06 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/TavangaranSPB18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/TaylorSCM18,
  author       = {Vincent F. Taylor and
                  Riccardo Spolaor and
                  Mauro Conti and
                  Ivan Martinovic},
  title        = {Robust Smartphone App Identification via Encrypted Network Traffic
                  Analysis},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {13},
  number       = {1},
  pages        = {63--78},
  year         = {2018},
  url          = {https://doi.org/10.1109/TIFS.2017.2737970},
  doi          = {10.1109/TIFS.2017.2737970},
  timestamp    = {Sun, 12 Nov 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tifs/TaylorSCM18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/TreustSL18,
  author       = {Ma{\"{e}}l Le Treust and
                  Leszek Szczecinski and
                  Fabrice Labeau},
  title        = {Rate Adaptation for Secure {HARQ} Protocols},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {13},
  number       = {12},
  pages        = {2981--2994},
  year         = {2018},
  url          = {https://doi.org/10.1109/TIFS.2018.2833799},
  doi          = {10.1109/TIFS.2018.2833799},
  timestamp    = {Thu, 06 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/TreustSL18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/TruongEEK18,
  author       = {Anh Truong and
                  S. Rasoul Etesami and
                  Jalal Etesami and
                  Negar Kiyavash},
  title        = {Optimal Attack Strategies Against Predictors - Learning From Expert
                  Advice},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {13},
  number       = {1},
  pages        = {6--19},
  year         = {2018},
  url          = {https://doi.org/10.1109/TIFS.2017.2718488},
  doi          = {10.1109/TIFS.2017.2718488},
  timestamp    = {Mon, 02 Nov 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tifs/TruongEEK18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/ValsecchiDC18,
  author       = {Andrea Valsecchi and
                  Sergio Damas and
                  Oscar Cord{\'{o}}n},
  title        = {A Robust and Efficient Method for Skull-Face Overlay in Computerized
                  Craniofacial Superimposition},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {13},
  number       = {8},
  pages        = {1960--1974},
  year         = {2018},
  url          = {https://doi.org/10.1109/TIFS.2018.2806939},
  doi          = {10.1109/TIFS.2018.2806939},
  timestamp    = {Tue, 29 Dec 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tifs/ValsecchiDC18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/VenugopalS18,
  author       = {Vivek Venugopal and
                  Suresh Sundaram},
  title        = {Online Writer Identification With Sparse Coding-Based Descriptors},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {13},
  number       = {10},
  pages        = {2538--2552},
  year         = {2018},
  url          = {https://doi.org/10.1109/TIFS.2018.2823276},
  doi          = {10.1109/TIFS.2018.2823276},
  timestamp    = {Tue, 07 Sep 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/VenugopalS18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/WangFBZ18,
  author       = {Na Wang and
                  Junsong Fu and
                  Bharat K. Bhargava and
                  Jiwen Zeng},
  title        = {Efficient Retrieval Over Documents Encrypted by Attributes in Cloud
                  Computing},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {13},
  number       = {10},
  pages        = {2653--2667},
  year         = {2018},
  url          = {https://doi.org/10.1109/TIFS.2018.2825952},
  doi          = {10.1109/TIFS.2018.2825952},
  timestamp    = {Thu, 06 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/WangFBZ18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/WangMLW18,
  author       = {Chenxu Wang and
                  TungNgai Miu and
                  Xiapu Luo and
                  Jinhe Wang},
  title        = {SkyShield: {A} Sketch-Based Defense System Against Application Layer
                  DDoS Attacks},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {13},
  number       = {3},
  pages        = {559--573},
  year         = {2018},
  url          = {https://doi.org/10.1109/TIFS.2017.2758754},
  doi          = {10.1109/TIFS.2017.2758754},
  timestamp    = {Thu, 06 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/WangMLW18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/WangNZH18,
  author       = {Chuntao Wang and
                  Jiangqun Ni and
                  Xinpeng Zhang and
                  Qiong Huang},
  title        = {Efficient Compression of Encrypted Binary Images Using the Markov
                  Random Field},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {13},
  number       = {5},
  pages        = {1271--1285},
  year         = {2018},
  url          = {https://doi.org/10.1109/TIFS.2017.2784379},
  doi          = {10.1109/TIFS.2017.2784379},
  timestamp    = {Wed, 20 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/WangNZH18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/WangQWAJ18,
  author       = {Felix Wang and
                  Tu{-}Thach Quach and
                  Jason Wheeler and
                  James B. Aimone and
                  Conrad D. James},
  title        = {Sparse Coding for N-Gram Feature Extraction and Training for File
                  Fragment Classification},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {13},
  number       = {10},
  pages        = {2553--2562},
  year         = {2018},
  url          = {https://doi.org/10.1109/TIFS.2018.2823697},
  doi          = {10.1109/TIFS.2018.2823697},
  timestamp    = {Tue, 29 Dec 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tifs/WangQWAJ18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/WangSJ18,
  author       = {Yongzhi Wang and
                  Yulong Shen and
                  Xiaohong Jiang},
  title        = {Practical Verifiable Computation-A MapReduce Case Study},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {13},
  number       = {6},
  pages        = {1376--1391},
  year         = {2018},
  url          = {https://doi.org/10.1109/TIFS.2017.2787993},
  doi          = {10.1109/TIFS.2017.2787993},
  timestamp    = {Wed, 27 Apr 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/WangSJ18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/WangTLH18,
  author       = {Haowei Wang and
                  Xiaofeng Tao and
                  Na Li and
                  Zhu Han},
  title        = {Polar Coding for the Wiretap Channel With Shared Key},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {13},
  number       = {6},
  pages        = {1351--1360},
  year         = {2018},
  url          = {https://doi.org/10.1109/TIFS.2017.2774499},
  doi          = {10.1109/TIFS.2017.2774499},
  timestamp    = {Wed, 21 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tifs/WangTLH18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/WangTLL18,
  author       = {Wei Wang and
                  Kah Chan Teh and
                  Kwok Hung Li and
                  Sheng Luo},
  title        = {On the Impact of Adaptive Eavesdroppers in Multi-Antenna Cellular
                  Networks},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {13},
  number       = {2},
  pages        = {269--279},
  year         = {2018},
  url          = {https://doi.org/10.1109/TIFS.2017.2746010},
  doi          = {10.1109/TIFS.2017.2746010},
  timestamp    = {Thu, 06 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/WangTLL18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/WangWZ18,
  author       = {Jun Wang and
                  Guoqing Wang and
                  Mei Zhou},
  title        = {Bimodal Vein Data Mining via Cross-Selected-Domain Knowledge Transfer},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {13},
  number       = {3},
  pages        = {733--744},
  year         = {2018},
  url          = {https://doi.org/10.1109/TIFS.2017.2766039},
  doi          = {10.1109/TIFS.2017.2766039},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/WangWZ18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/WangYCYZC18,
  author       = {Shanshan Wang and
                  Qiben Yan and
                  Zhenxiang Chen and
                  Bo Yang and
                  Chuan Zhao and
                  Mauro Conti},
  title        = {Detecting Android Malware Leveraging Text Semantics of Network Flows},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {13},
  number       = {5},
  pages        = {1096--1109},
  year         = {2018},
  url          = {https://doi.org/10.1109/TIFS.2017.2771228},
  doi          = {10.1109/TIFS.2017.2771228},
  timestamp    = {Thu, 06 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/WangYCYZC18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/WangYDG18,
  author       = {Wei{-}Che Wang and
                  Yair Yona and
                  Suhas N. Diggavi and
                  Puneet Gupta},
  title        = {Design and Analysis of Stability-Guaranteed PUFs},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {13},
  number       = {4},
  pages        = {978--992},
  year         = {2018},
  url          = {https://doi.org/10.1109/TIFS.2017.2774761},
  doi          = {10.1109/TIFS.2017.2774761},
  timestamp    = {Thu, 28 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/WangYDG18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/WangYSLGG18,
  author       = {Weijia Wang and
                  Yu Yu and
                  Fran{\c{c}}ois{-}Xavier Standaert and
                  Junrong Liu and
                  Zheng Guo and
                  Dawu Gu},
  title        = {Ridge-Based {DPA:} Improvement of Differential Power Analysis For
                  Nanoscale Chips},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {13},
  number       = {5},
  pages        = {1301--1316},
  year         = {2018},
  url          = {https://doi.org/10.1109/TIFS.2017.2787985},
  doi          = {10.1109/TIFS.2017.2787985},
  timestamp    = {Mon, 19 Sep 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/WangYSLGG18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/WangZZ18,
  author       = {Baocang Wang and
                  Yu Zhan and
                  Zhili Zhang},
  title        = {Cryptanalysis of a Symmetric Fully Homomorphic Encryption Scheme},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {13},
  number       = {6},
  pages        = {1460--1467},
  year         = {2018},
  url          = {https://doi.org/10.1109/TIFS.2018.2790916},
  doi          = {10.1109/TIFS.2018.2790916},
  timestamp    = {Sun, 22 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/WangZZ18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/WildeGP18,
  author       = {Florian Wilde and
                  Berndt M. Gammel and
                  Michael Pehl},
  title        = {Spatial Correlation Analysis on Physical Unclonable Functions},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {13},
  number       = {6},
  pages        = {1468--1480},
  year         = {2018},
  url          = {https://doi.org/10.1109/TIFS.2018.2791341},
  doi          = {10.1109/TIFS.2018.2791341},
  timestamp    = {Thu, 06 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/WildeGP18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/WuCZC18,
  author       = {Yongdong Wu and
                  Binbin Chen and
                  Zhigang Zhao and
                  Yao Cheng},
  title        = {Attack and Countermeasure on Interlock-Based Device Pairing Schemes},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {13},
  number       = {3},
  pages        = {745--757},
  year         = {2018},
  url          = {https://doi.org/10.1109/TIFS.2017.2766048},
  doi          = {10.1109/TIFS.2017.2766048},
  timestamp    = {Fri, 20 Jan 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tifs/WuCZC18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/WuHST18,
  author       = {Xiang Wu and
                  Ran He and
                  Zhenan Sun and
                  Tieniu Tan},
  title        = {A Light {CNN} for Deep Face Representation With Noisy Labels},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {13},
  number       = {11},
  pages        = {2884--2896},
  year         = {2018},
  url          = {https://doi.org/10.1109/TIFS.2018.2833032},
  doi          = {10.1109/TIFS.2018.2833032},
  timestamp    = {Fri, 26 Jan 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tifs/WuHST18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/WuW18,
  author       = {Hao Wu and
                  Wei Wang},
  title        = {A Game Theory Based Collaborative Security Detection Method for Internet
                  of Things Systems},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {13},
  number       = {6},
  pages        = {1432--1445},
  year         = {2018},
  url          = {https://doi.org/10.1109/TIFS.2018.2790382},
  doi          = {10.1109/TIFS.2018.2790382},
  timestamp    = {Thu, 06 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/WuW18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/XiangJG18,
  author       = {Weichen Xiang and
                  Martin Johnston and
                  St{\'{e}}phane Y. Le Goff},
  title        = {Low-Complexity Power Control and Energy Harvesting Algorithms for
                  Wiretap Channels Employing Finite-Alphabet Input Schemes},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {13},
  number       = {2},
  pages        = {318--326},
  year         = {2018},
  url          = {https://doi.org/10.1109/TIFS.2017.2749161},
  doi          = {10.1109/TIFS.2017.2749161},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/XiangJG18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/XiaoLHDP18,
  author       = {Liang Xiao and
                  Yanda Li and
                  Guoan Han and
                  Huaiyu Dai and
                  H. Vincent Poor},
  title        = {A Secure Mobile Crowdsensing Game With Deep Reinforcement Learning},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {13},
  number       = {1},
  pages        = {35--47},
  year         = {2018},
  url          = {https://doi.org/10.1109/TIFS.2017.2737968},
  doi          = {10.1109/TIFS.2017.2737968},
  timestamp    = {Thu, 23 Jun 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/XiaoLHDP18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/XieC18,
  author       = {Ning Xie and
                  Changsheng Chen},
  title        = {Slope Authentication at the Physical Layer},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {13},
  number       = {6},
  pages        = {1579--1594},
  year         = {2018},
  url          = {https://doi.org/10.1109/TIFS.2018.2797963},
  doi          = {10.1109/TIFS.2018.2797963},
  timestamp    = {Sun, 11 Sep 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/XieC18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/XuDD18,
  author       = {Peng Xu and
                  Zhiguo Ding and
                  Xuchu Dai},
  title        = {Achievable Secrecy Rates for Relay-Eavesdropper Channel Based on the
                  Application of Noisy Network Coding},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {13},
  number       = {7},
  pages        = {1736--1751},
  year         = {2018},
  url          = {https://doi.org/10.1109/TIFS.2018.2805601},
  doi          = {10.1109/TIFS.2018.2805601},
  timestamp    = {Thu, 06 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/XuDD18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/XuNPYL18,
  author       = {Lei Xu and
                  Arumugam Nallanathan and
                  Xiaofei Pan and
                  Jian Yang and
                  Wenhe Liao},
  title        = {Security-Aware Resource Allocation With Delay Constraint for NOMA-Based
                  Cognitive Radio Network},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {13},
  number       = {2},
  pages        = {366--376},
  year         = {2018},
  url          = {https://doi.org/10.1109/TIFS.2017.2750106},
  doi          = {10.1109/TIFS.2017.2750106},
  timestamp    = {Fri, 22 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/XuNPYL18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/XuRRW18,
  author       = {Dongyang Xu and
                  Pinyi Ren and
                  James A. Ritcey and
                  Yichen Wang},
  title        = {Code-Frequency Block Group Coding for Anti-Spoofing Pilot Authentication
                  in Multi-Antenna {OFDM} Systems},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {13},
  number       = {7},
  pages        = {1778--1793},
  year         = {2018},
  url          = {https://doi.org/10.1109/TIFS.2018.2800696},
  doi          = {10.1109/TIFS.2018.2800696},
  timestamp    = {Sat, 10 Sep 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/XuRRW18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/XuSBX18,
  author       = {Maochao Xu and
                  Kristin M. Schweitzer and
                  Raymond M. Bateman and
                  Shouhuai Xu},
  title        = {Modeling and Predicting Cyber Hacking Breaches},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {13},
  number       = {11},
  pages        = {2856--2871},
  year         = {2018},
  url          = {https://doi.org/10.1109/TIFS.2018.2834227},
  doi          = {10.1109/TIFS.2018.2834227},
  timestamp    = {Thu, 06 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/XuSBX18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/XuYMD18,
  author       = {Shengmin Xu and
                  Guomin Yang and
                  Yi Mu and
                  Robert H. Deng},
  title        = {Secure Fine-Grained Access Control and Data Sharing for Dynamic Groups
                  in the Cloud},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {13},
  number       = {8},
  pages        = {2101--2113},
  year         = {2018},
  url          = {https://doi.org/10.1109/TIFS.2018.2810065},
  doi          = {10.1109/TIFS.2018.2810065},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/XuYMD18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/XueCLHH18,
  author       = {Kaiping Xue and
                  Weikeng Chen and
                  Wei Li and
                  Jianan Hong and
                  Peilin Hong},
  title        = {Combining Data Owner-Side and Cloud-Side Access Control for Encrypted
                  Cloud Storage},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {13},
  number       = {8},
  pages        = {2062--2074},
  year         = {2018},
  url          = {https://doi.org/10.1109/TIFS.2018.2809679},
  doi          = {10.1109/TIFS.2018.2809679},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/XueCLHH18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/XueMLCMG18,
  author       = {Lei Xue and
                  Xiaobo Ma and
                  Xiapu Luo and
                  Edmond W. W. Chan and
                  TungNgai Miu and
                  Guofei Gu},
  title        = {LinkScope: Toward Detecting Target Link Flooding Attacks},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {13},
  number       = {10},
  pages        = {2423--2438},
  year         = {2018},
  url          = {https://doi.org/10.1109/TIFS.2018.2815555},
  doi          = {10.1109/TIFS.2018.2815555},
  timestamp    = {Thu, 06 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/XueMLCMG18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/YanZYAS18,
  author       = {Shihao Yan and
                  Xiangyun Zhou and
                  Nan (Jonas) Yang and
                  Thushara D. Abhayapala and
                  A. Lee Swindlehurst},
  title        = {Secret Channel Training to Enhance Physical Layer Security With a
                  Full-Duplex Receiver},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {13},
  number       = {11},
  pages        = {2788--2800},
  year         = {2018},
  url          = {https://doi.org/10.1109/TIFS.2018.2834301},
  doi          = {10.1109/TIFS.2018.2834301},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/YanZYAS18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/YangCWZ18,
  author       = {Yuan Yang and
                  Zhongmin Cai and
                  Chunyan Wang and
                  Junjie Zhang},
  title        = {Probabilistically Inferring Attack Ramifications Using Temporal Dependence
                  Network},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {13},
  number       = {11},
  pages        = {2913--2928},
  year         = {2018},
  url          = {https://doi.org/10.1109/TIFS.2018.2833048},
  doi          = {10.1109/TIFS.2018.2833048},
  timestamp    = {Thu, 06 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/YangCWZ18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/YangJB18,
  author       = {Shukun Yang and
                  Shouling Ji and
                  Raheem A. Beyah},
  title        = {{DPPG:} {A} Dynamic Password Policy Generation System},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {13},
  number       = {3},
  pages        = {545--558},
  year         = {2018},
  url          = {https://doi.org/10.1109/TIFS.2017.2737971},
  doi          = {10.1109/TIFS.2017.2737971},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/YangJB18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/YangSL18,
  author       = {Heecheol Yang and
                  Wonjae Shin and
                  Jungwoo Lee},
  title        = {Private Information Retrieval for Secure Distributed Storage Systems},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {13},
  number       = {12},
  pages        = {2953--2964},
  year         = {2018},
  url          = {https://doi.org/10.1109/TIFS.2018.2833050},
  doi          = {10.1109/TIFS.2018.2833050},
  timestamp    = {Thu, 06 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/YangSL18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/YaoL18,
  author       = {Yanqing Yao and
                  Zhoujun Li},
  title        = {Differential Privacy With Bias-Control Limited Sources},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {13},
  number       = {5},
  pages        = {1230--1241},
  year         = {2018},
  url          = {https://doi.org/10.1109/TIFS.2017.2780802},
  doi          = {10.1109/TIFS.2017.2780802},
  timestamp    = {Tue, 16 Aug 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/YaoL18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/YilmazCPZ18,
  author       = {Baki Berkay Yilmaz and
                  Robert Locke Callan and
                  Milos Prvulovic and
                  Alenka G. Zajic},
  title        = {Capacity of the {EM} Covert/Side-Channel Created by the Execution
                  of Instructions in a Processor},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {13},
  number       = {3},
  pages        = {605--620},
  year         = {2018},
  url          = {https://doi.org/10.1109/TIFS.2017.2762826},
  doi          = {10.1109/TIFS.2017.2762826},
  timestamp    = {Thu, 06 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/YilmazCPZ18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/Yu18,
  author       = {Nam Yul Yu},
  title        = {Indistinguishability and Energy Sensitivity of Gaussian and Bernoulli
                  Compressed Encryption},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {13},
  number       = {7},
  pages        = {1722--1735},
  year         = {2018},
  url          = {https://doi.org/10.1109/TIFS.2018.2800726},
  doi          = {10.1109/TIFS.2018.2800726},
  timestamp    = {Sun, 22 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/Yu18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/YuKJ18,
  author       = {Heejung Yu and
                  Taejoon Kim and
                  Hamid Jafarkhani},
  title        = {Wireless Secure Communication With Beamforming and Jamming in Time-Varying
                  Wiretap Channels},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {13},
  number       = {8},
  pages        = {2087--2100},
  year         = {2018},
  url          = {https://doi.org/10.1109/TIFS.2018.2809695},
  doi          = {10.1109/TIFS.2018.2809695},
  timestamp    = {Thu, 06 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/YuKJ18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/YuKZZLF18,
  author       = {Jun Yu and
                  Zhenzhong Kuang and
                  Baopeng Zhang and
                  Wei Zhang and
                  Dan Lin and
                  Jianping Fan},
  title        = {Leveraging Content Sensitiveness and User Trustworthiness to Recommend
                  Fine-Grained Privacy Settings for Social Image Sharing},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {13},
  number       = {5},
  pages        = {1317--1332},
  year         = {2018},
  url          = {https://doi.org/10.1109/TIFS.2017.2787986},
  doi          = {10.1109/TIFS.2017.2787986},
  timestamp    = {Mon, 26 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/YuKZZLF18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/YuRC18,
  author       = {Jiangshan Yu and
                  Mark Ryan and
                  Cas Cremers},
  title        = {{DECIM:} Detecting Endpoint Compromise In Messaging},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {13},
  number       = {1},
  pages        = {106--118},
  year         = {2018},
  url          = {https://doi.org/10.1109/TIFS.2017.2738609},
  doi          = {10.1109/TIFS.2017.2738609},
  timestamp    = {Sun, 12 Nov 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tifs/YuRC18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/ZapponeLJ18,
  author       = {Alessio Zappone and
                  Pin{-}Hsun Lin and
                  Eduard A. Jorswieck},
  title        = {Optimal Energy-Efficient Design of Confidential Multiple-Antenna Systems},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {13},
  number       = {1},
  pages        = {237--252},
  year         = {2018},
  url          = {https://doi.org/10.1109/TIFS.2017.2746009},
  doi          = {10.1109/TIFS.2017.2746009},
  timestamp    = {Thu, 06 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/ZapponeLJ18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/ZeinstraVS18,
  author       = {Chris G. Zeinstra and
                  Raymond N. J. Veldhuis and
                  Luuk J. Spreeuwers},
  title        = {Grid-Based Likelihood Ratio Classifiers for the Comparison of Facial
                  Marks},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {13},
  number       = {1},
  pages        = {253--264},
  year         = {2018},
  url          = {https://doi.org/10.1109/TIFS.2017.2746013},
  doi          = {10.1109/TIFS.2017.2746013},
  timestamp    = {Thu, 06 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/ZeinstraVS18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/ZengTLH18,
  author       = {Jishen Zeng and
                  Shunquan Tan and
                  Bin Li and
                  Jiwu Huang},
  title        = {Large-Scale {JPEG} Image Steganalysis Using Hybrid Deep-Learning Framework},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {13},
  number       = {5},
  pages        = {1200--1214},
  year         = {2018},
  url          = {https://doi.org/10.1109/TIFS.2017.2779446},
  doi          = {10.1109/TIFS.2017.2779446},
  timestamp    = {Thu, 06 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/ZengTLH18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/ZhaNWLGNZ18,
  author       = {Xuan Zha and
                  Wei Ni and
                  Xu Wang and
                  Ren Ping Liu and
                  Y. Jay Guo and
                  Xinxin Niu and
                  Kangfeng Zheng},
  title        = {The Impact of Link Duration on the Integrity of Distributed Mobile
                  Networks},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {13},
  number       = {9},
  pages        = {2240--2255},
  year         = {2018},
  url          = {https://doi.org/10.1109/TIFS.2018.2812714},
  doi          = {10.1109/TIFS.2018.2812714},
  timestamp    = {Thu, 06 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/ZhaNWLGNZ18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/ZhangDWH18,
  author       = {Linyuan Zhang and
                  Guoru Ding and
                  Qihui Wu and
                  Zhu Han},
  title        = {Spectrum Sensing Under Spectrum Misuse Behaviors: {A} Multi-Hypothesis
                  Test Perspective},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {13},
  number       = {4},
  pages        = {993--1007},
  year         = {2018},
  url          = {https://doi.org/10.1109/TIFS.2017.2774770},
  doi          = {10.1109/TIFS.2017.2774770},
  timestamp    = {Wed, 05 Jan 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tifs/ZhangDWH18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/ZhangHCZ18,
  author       = {Zhikun Zhang and
                  Shibo He and
                  Jiming Chen and
                  Junshan Zhang},
  title        = {{REAP:} An Efficient Incentive Mechanism for Reconciling Aggregation
                  Accuracy and Individual Privacy in Crowdsensing},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {13},
  number       = {12},
  pages        = {2995--3007},
  year         = {2018},
  url          = {https://doi.org/10.1109/TIFS.2018.2834232},
  doi          = {10.1109/TIFS.2018.2834232},
  timestamp    = {Fri, 23 Jul 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/ZhangHCZ18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/ZhangHST18,
  author       = {Shu Zhang and
                  Ran He and
                  Zhenan Sun and
                  Tieniu Tan},
  title        = {DeMeshNet: Blind Face Inpainting for Deep MeshFace Verification},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {13},
  number       = {3},
  pages        = {637--647},
  year         = {2018},
  url          = {https://doi.org/10.1109/TIFS.2017.2763119},
  doi          = {10.1109/TIFS.2017.2763119},
  timestamp    = {Fri, 26 Jan 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tifs/ZhangHST18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/ZhangK18,
  author       = {Xu Zhang and
                  Edward W. Knightly},
  title        = {Pilot Distortion Attack and Zero-Startup-Cost Detection in Massive
                  {MIMO} Network: From Analysis to Experiments},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {13},
  number       = {12},
  pages        = {3094--3107},
  year         = {2018},
  url          = {https://doi.org/10.1109/TIFS.2018.2837641},
  doi          = {10.1109/TIFS.2018.2837641},
  timestamp    = {Thu, 06 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/ZhangK18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/ZhangKZ18,
  author       = {PeiYun Zhang and
                  Yang Kong and
                  MengChu Zhou},
  title        = {A Domain Partition-Based Trust Model for Unreliable Clouds},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {13},
  number       = {9},
  pages        = {2167--2178},
  year         = {2018},
  url          = {https://doi.org/10.1109/TIFS.2018.2812166},
  doi          = {10.1109/TIFS.2018.2812166},
  timestamp    = {Thu, 06 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/ZhangKZ18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/ZhangLSL18,
  author       = {Hongwen Zhang and
                  Qi Li and
                  Zhenan Sun and
                  Yunfan Liu},
  title        = {Combining Data-Driven and Model-Driven Methods for Robust Facial Landmark
                  Detection},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {13},
  number       = {10},
  pages        = {2409--2422},
  year         = {2018},
  url          = {https://doi.org/10.1109/TIFS.2018.2800901},
  doi          = {10.1109/TIFS.2018.2800901},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/ZhangLSL18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/ZhangLST18,
  author       = {Qi Zhang and
                  Haiqing Li and
                  Zhenan Sun and
                  Tieniu Tan},
  title        = {Deep Feature Fusion for Iris and Periocular Biometrics on Mobile Devices},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {13},
  number       = {11},
  pages        = {2897--2912},
  year         = {2018},
  url          = {https://doi.org/10.1109/TIFS.2018.2833033},
  doi          = {10.1109/TIFS.2018.2833033},
  timestamp    = {Thu, 06 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/ZhangLST18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/ZhangZSLHJ18,
  author       = {Ning Zhang and
                  Ruide Zhang and
                  Kun Sun and
                  Wenjing Lou and
                  Y. Thomas Hou and
                  Sushil Jajodia},
  title        = {Memory Forensic Challenges Under Misused Architectural Features},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {13},
  number       = {9},
  pages        = {2345--2358},
  year         = {2018},
  url          = {https://doi.org/10.1109/TIFS.2018.2819119},
  doi          = {10.1109/TIFS.2018.2819119},
  timestamp    = {Thu, 11 May 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/ZhangZSLHJ18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/ZhaoK18,
  author       = {Zijing Zhao and
                  Ajay Kumar},
  title        = {Improving Periocular Recognition by Explicit Attention to Critical
                  Regions in Deep Neural Network},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {13},
  number       = {12},
  pages        = {2937--2952},
  year         = {2018},
  url          = {https://doi.org/10.1109/TIFS.2018.2833018},
  doi          = {10.1109/TIFS.2018.2833018},
  timestamp    = {Thu, 29 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tifs/ZhaoK18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/ZhengDW18,
  author       = {Yifeng Zheng and
                  Huayi Duan and
                  Cong Wang},
  title        = {Learning the Truth Privately and Confidently: Encrypted Confidence-Aware
                  Truth Discovery in Mobile Crowdsensing},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {13},
  number       = {10},
  pages        = {2475--2489},
  year         = {2018},
  url          = {https://doi.org/10.1109/TIFS.2018.2819134},
  doi          = {10.1109/TIFS.2018.2819134},
  timestamp    = {Sun, 22 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/ZhengDW18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/ZhengLGCYW18,
  author       = {Jing Zheng and
                  Qi Li and
                  Guofei Gu and
                  Jiahao Cao and
                  David K. Y. Yau and
                  Jianping Wu},
  title        = {Realtime DDoS Defense Using {COTS} {SDN} Switches via Adaptive Correlation
                  Analysis},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {13},
  number       = {7},
  pages        = {1838--1853},
  year         = {2018},
  url          = {https://doi.org/10.1109/TIFS.2018.2805600},
  doi          = {10.1109/TIFS.2018.2805600},
  timestamp    = {Sat, 10 Sep 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/ZhengLGCYW18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/Zhou18,
  author       = {Caixue Zhou},
  title        = {Comments on "Light-Weight and Robust Security-Aware D2D-Assist Data
                  Transmission Protocol for Mobile-Health Systems"},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {13},
  number       = {7},
  pages        = {1869--1870},
  year         = {2018},
  url          = {https://doi.org/10.1109/TIFS.2018.2799582},
  doi          = {10.1109/TIFS.2018.2799582},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/Zhou18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/ZhouR18,
  author       = {Kai Zhou and
                  Jian Ren},
  title        = {PassBio: Privacy-Preserving User-Centric Biometric Authentication},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {13},
  number       = {12},
  pages        = {3050--3063},
  year         = {2018},
  url          = {https://doi.org/10.1109/TIFS.2018.2838540},
  doi          = {10.1109/TIFS.2018.2838540},
  timestamp    = {Mon, 22 Jan 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tifs/ZhouR18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/ZhuJYZSZ18,
  author       = {Xiaoke Zhu and
                  Xiao{-}Yuan Jing and
                  Xinge You and
                  Wangmeng Zuo and
                  Shiguang Shan and
                  Wei{-}Shi Zheng},
  title        = {Image to Video Person Re-Identification by Learning Heterogeneous
                  Dictionary Pair With Feature Projection Matrix},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {13},
  number       = {3},
  pages        = {717--732},
  year         = {2018},
  url          = {https://doi.org/10.1109/TIFS.2017.2765524},
  doi          = {10.1109/TIFS.2017.2765524},
  timestamp    = {Thu, 12 Jan 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tifs/ZhuJYZSZ18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/ZhuoZZZZ18,
  author       = {Zhongliu Zhuo and
                  Yang Zhang and
                  Zhi{-}Li Zhang and
                  Xiaosong Zhang and
                  Jingzhong Zhang},
  title        = {Website Fingerprinting Attack on Anonymity Networks Based on Profile
                  Hidden Markov Model},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {13},
  number       = {5},
  pages        = {1081--1095},
  year         = {2018},
  url          = {https://doi.org/10.1109/TIFS.2017.2762825},
  doi          = {10.1109/TIFS.2017.2762825},
  timestamp    = {Thu, 11 Aug 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/ZhuoZZZZ18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/ZuoSLWL18,
  author       = {Cong Zuo and
                  Jun Shao and
                  Joseph K. Liu and
                  Guiyi Wei and
                  Yun Ling},
  title        = {Fine-Grained Two-Factor Protection Mechanism for Data Sharing in Cloud
                  Storage},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {13},
  number       = {1},
  pages        = {186--196},
  year         = {2018},
  url          = {https://doi.org/10.1109/TIFS.2017.2746000},
  doi          = {10.1109/TIFS.2017.2746000},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/ZuoSLWL18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
a service of  Schloss Dagstuhl - Leibniz Center for Informatics