default search action
IEEE Transactions on Information Forensics and Security, Volume 12
Volume 12, Number 1, January 2017
- Anderson Rocha, Walter J. Scheirer, Christopher W. Forstall, Thiago Cavalcante, Antonio Theophilo, Bingyu Shen, Ariadne Carvalho, Efstathios Stamatatos:
Authorship Attribution for Social Media Forensics. 5-33 - Filippo Gandino, Renato Ferrero, Maurizio Rebaudengo:
A Key Distribution Scheme for Mobile Wireless Sensor Networks: q-Composite. 34-47 - Zhili Zhou, Yunlong Wang, Q. M. Jonathan Wu, Ching-Nung Yang, Xingming Sun:
Effective and Efficient Global Context Verification for Image Copy Detection. 48-63 - Arunkumar Vijayakumar, Vinay C. Patil, Daniel E. Holcomb, Christof Paar, Sandip Kundu:
Physical Design Obfuscation of Hardware: A Comprehensive Investigation of Device and Logic-Level Techniques. 64-77 - Hao Yan, Jiguo Li, Jinguang Han, Yichen Zhang:
A Novel Efficient Remote Data Possession Checking Protocol in Cloud Storage. 78-88 - Adi Hajj-Ahmad, Séverine Baudry, Bertrand Chupeau, Gwenaël J. Doërr, Min Wu:
Flicker Forensics for Camcorder Piracy. 89-100 - Miao Xie, Jiankun Hu, Song Guo, Albert Y. Zomaya:
Distributed Segment-Based Anomaly Detection With Kullback-Leibler Divergence in Wireless Sensor Networks. 101-110 - Wuqiong Pan, Fangyu Zheng, Yuan Zhao, Wen Tao Zhu, Jiwu Jing:
An Efficient Elliptic Curve Cryptography Signature Server With GPU Acceleration. 111-122 - Thanh Hai Thai, Rémi Cogranne, Florent Retraint, Thi-Ngoc-Canh Doan:
JPEG Quantization Step Estimation and Its Applications to Digital Image Forensics. 123-133 - Neeti Pokhriyal, Kshitij Tayal, Ifeoma Nwogu, Venu Govindaraju:
Cognitive-Biometric Recognition From Language Usage: A Feasibility Study. 134-143 - Yubao Zhang, Xin Ruan, Haining Wang, Hui Wang, Su He:
Twitter Trends Manipulation: A First Look Inside the Security of Twitter Trending. 144-156 - Yang Hu, Konstantinos Sirlantzis, Gareth Howells:
Optimal Generation of Iris Codes for Iris Recognition. 157-171 - Tao Zhang, Quanyan Zhu:
Dynamic Differential Privacy for ADMM-Based Distributed Classification Learning. 172-187 - Michail Tsikerdekis:
Identity Deception Prevention Using Common Contribution Network Data. 188-199 - Jun Yan, Haibo He, Xiangnan Zhong, Yufei Tang:
Q-Learning-Based Vulnerability Analysis of Smart Grid Against Sequential Topology Attacks. 200-210 - Muhammad R. A. Khandaker, Kai-Kit Wong, Yangyang Zhang, Zhongbin Zheng:
Probabilistically Robust SWIPT for Secrecy MISOME Systems. 211-226 - Nima Tavangaran, Holger Boche, Rafael F. Schaefer:
Secret-Key Generation Using Compound Sources and One-Way Public Communication. 227-241 - Andrey Garnaev, Wade Trappe:
Bargaining Over the Fair Trade-Off Between Secrecy and Throughput in OFDM Communications. 242-251
Volume 12, Number 2, February 2017
- Fawaz S. Al-Qahtani, Yuzhen Huang, Salah Hessien, Redha M. Radaydeh, Caijun Zhong, Hussein M. Alnuweiri:
Secrecy Analysis of MIMO Wiretap Channels With Low-Complexity Receivers Under Imperfect Channel Estimation. 257-270 - Lei Xu, Chunxiao Jiang, Yi Qian, Youjian Zhao, Jianhua Li, Yong Ren:
Dynamic Privacy Pricing: A Multi-Armed Bandit Approach With Time-Variant Rewards. 271-285 - Jingyu Hua, Zhenyu Shen, Sheng Zhong:
We Can Track You if You Take the Metro: Tracking Metro Riders Using Accelerometers on Smartphones. 286-297 - Wenwen Tu, Mario Goldenbaum, Lifeng Lai, H. Vincent Poor:
On Simultaneously Generating Multiple Keys in a Joint Source-Channel Model. 298-308 - Bo Wang, Leibo Liu, Chenchen Deng, Min Zhu, Shouyi Yin, Zhuoquan Zhou, Shaojun Wei:
Exploration of Benes Network in Cryptographic Processors: A Random Infection Countermeasure for Block Ciphers Against Fault Attacks. 309-322 - Mahdi Jafari Siavoshani, Shaunak Mishra, Christina Fragouli, Suhas N. Diggavi:
Multi-Party Secret Key Agreement Over State-Dependent Wireless Broadcast Channels. 323-337 - Hassan Salmani:
COTD: Reference-Free Hardware Trojan Detection and Recovery Based on Controllability and Observability in Gate-Level Netlist. 338-350 - Jinho Choi:
On Channel-Aware Secure HARQ-IR. 351-362 - Aijiao Cui, Yanhui Luo, Chip-Hong Chang:
Static and Dynamic Obfuscations of Scan Data Against Scan-Based Side-Channel Attacks. 363-376 - Chi-Man Pun, Cai-Ping Yan, Xiaochen Yuan:
Image Alignment-Based Multi-Region Matching for Object-Level Tampering Detection. 377-391 - Ashref Lawgaly, Fouad Khelifi:
Sensor Pattern Noise Estimation Based on Improved Locally Adaptive DCT Filtering and Weighted Averaging for Source Camera Identification and Verification. 392-404 - Xiaolong Guo, Raj Gautam Dutta, Yier Jin:
Eliminating the Hardware-Software Boundary: A Proof-Carrying Approach for Trust Evaluation on Computer Systems. 405-417 - Mohamed Grissa, Attila A. Yavuz, Bechir Hamdaoui:
Preserving the Location Privacy of Secondary Users in Cooperative Spectrum Sensing. 418-431 - Da Luo, Rui Yang, Bin Li, Jiwu Huang:
Detection of Double Compressed AMR Audio Using Stacked Autoencoder. 432-444 - Kamal Taha, Paul D. Yoo:
Using the Spanning Tree of a Criminal Network for Identifying Its Leaders. 445-453 - Debiao He, Neeraj Kumar, Kim-Kwang Raymond Choo, Wei Wu:
Efficient Hierarchical Identity-Based Signature With Batch Verification for Automatic Dependent Surveillance-Broadcast System. 454-464 - Hong Zhang, Yun Cao, Xianfeng Zhao:
A Steganalytic Approach to Detect Motion Vector Modification Using Near-Perfect Estimation for Local Optimality. 465-478 - Bo Peng, Wei Wang, Jing Dong, Tieniu Tan:
Optimized 3D Lighting Environment Estimation for Image Forgery Detection. 479-494
Volume 12, Number 3, March 2017
- Wei Wang, Kah Chan Teh, Kwok Hung Li:
Secrecy Throughput Maximization for MISO Multi-Eavesdropper Wiretap Channels. 505-515 - Ta-Yuan Liu, Shih-Chun Lin, Y.-W. Peter Hong:
On the Role of Artificial Noise in Training and Data Transmission for Secret Communications. 516-531 - Tao Jiang, Xiaofeng Chen, Qianhong Wu, Jianfeng Ma, Willy Susilo, Wenjing Lou:
Secure and Efficient Cloud Data Deduplication With Randomized Tag. 532-543 - Hyukmin Kwon, Aziz Mohaisen, Jiyoung Woo, Yongdae Kim, Eunjo Lee, Huy Kang Kim:
Crime Scene Reconstruction: Online Gold Farming Network Analysis. 544-556 - Jun Zhao:
On Resilience and Connectivity of Secure Wireless Sensor Networks Under Node Capture Attacks. 557-571 - Parthajit Mohapatra, Chandra R. Murthy, Jemin Lee:
On the Secrecy Capacity Region of the Two-User Symmetric Z Interference Channel With Unidirectional Transmitter Cooperation. 572-587 - Benedetta Tondi, Pedro Comesaña Alfaro, Fernando Pérez-González, Mauro Barni:
Smart Detection of Line-Search Oracle Attacks. 588-603 - Long Cheng, Dinil Mon Divakaran, Aloysius Wooi Kiak Ang, Wee-Yong Lim, Vrizlynn L. L. Thing:
FACT: A Framework for Authentication in Cloud-Based IP Traceback. 604-616 - Yiliang Liu, Hsiao-Hwa Chen, Liangmin Wang:
Secrecy Capacity Analysis of Artificial Noisy MIMO Channels - An Approach Based on Ordered Eigenvalues of Wishart Matrices. 617-630 - Nir Nissim, Aviad Cohen, Yuval Elovici:
ALDOCX: Detection of Unknown Malicious Microsoft Office Documents Using Designated Active Learning Methods Based on New Structural Feature Extraction Methodology. 631-646 - Yuhong Nan, Zhemin Yang, Min Yang, Shunfan Zhou, Yuan Zhang, Guofei Gu, Xiaofeng Wang, Limin Sun:
Identifying User-Input Privacy in Mobile Applications at a Large Scale. 647-661 - Aiqing Zhang, Lei Wang, Xinrong Ye, Xiaodong Lin:
Light-Weight and Robust Security-Aware D2D-Assist Data Transmission Protocol for Mobile-Health Systems. 662-675 - Yuan Zhang, Chunxiang Xu, Xiaohui Liang, Hongwei Li, Yi Mu, Xiaojun Zhang:
Efficient Public Verification of Data Integrity for Cloud Storage Systems from Indistinguishability Obfuscation. 676-688 - Takao Murakami, Atsunori Kanemura, Hideitsu Hino:
Group Sparsity Tensor Factorization for Re-Identification of Open Mobility Traces. 689-704 - Abhishek Sharma, Suresh Sundaram:
A Novel Online Signature Verification System Based on GMM Features in a DTW Framework. 705-718 - Antitza Dantcheva, François Brémond:
Gender Estimation Based on Smile-Dynamics. 719-729 - Diksha Golait, Neminath Hubballi:
Detecting Anomalous Behavior in VoIP Systems: A Discrete Event System Modeling. 730-745 - Bin Dai, Zheng Ma, Yuan Luo:
Finite State Markov Wiretap Channel With Delayed Feedback. 746-760
Volume 12, Number 4, April 2017
- Yong Yu, Man Ho Au, Giuseppe Ateniese, Xinyi Huang, Willy Susilo, Yuanshun Dai, Geyong Min:
Identity-Based Remote Data Integrity Checking With Perfect Data Privacy Preserving for Cloud Storage. 767-778 - Parth Pradhan, Parv Venkitasubramaniam:
Stealthy Attacks in Dynamical Systems: Tradeoffs Between Utility and Detectability With Application in Anonymous Systems. 779-792 - Xufeng Lin, Chang-Tsun Li:
Large-Scale Image Clustering Based on Camera Fingerprints. 793-808 - Pawel Korus, Jiwu Huang:
Multi-Scale Analysis Strategies in PRNU-Based Tampering Localization. 809-824 - Hongbin Xu, Li Sun, Pinyi Ren, Qinghe Du, Yichen Wang:
Cooperative Privacy Preserving Scheme for Downlink Transmission in Multiuser Relay Networks. 825-839 - Yousof Erfani, Ramin Pichevar, Jean Rouat:
Audio Watermarking Using Spikegram and a Two-Dictionary Approach. 840-852 - Paulo Max Gil Innocencio Reis, João Paulo Carvalho Lustosa da Costa, Ricardo Kehrle Miranda, Giovanni Del Galdo:
ESPRIT-Hilbert-Based Audio Tampering Detection With SVM Classifier for Forensic Analysis via Electrical Network Frequency. 853-864 - Le Yu, Tao Zhang, Xiapu Luo, Lei Xue, Henry Chang:
Toward Automatically Generating Privacy Policy for Android Apps. 865-880 - Andrey V. Lyamin, Elena N. Cherepovskaya:
An Approach to Biometric Identification by Using Low-Frequency Eye Tracker. 881-891 - Matteo Ferrara, Raffaele Cappelli, Davide Maltoni:
On the Feasibility of Creating Double-Identity Fingerprints. 892-900 - Manar Mohamed, Babins Shrestha, Nitesh Saxena:
SMASheD: Sniffing and Manipulating Android Sensor Data for Offensive Purposes. 901-913 - Chao Chen, Yu Wang, Jun Zhang, Yang Xiang, Wanlei Zhou, Geyong Min:
Statistical Features-Based Real-Time Detection of Drifted Twitter Spam. 914-925 - Yuichi Sei, Akihiko Ohsuga:
Differential Private Data Collection and Analysis Based on Randomized Multiple Dummies for Untrusted Mobile Crowdsensing. 926-939 - Yujue Wang, Qianhong Wu, Bo Qin, Wenchang Shi, Robert H. Deng, Jiankun Hu:
Identity-Based Data Outsourcing With Comprehensive Auditing in Clouds. 940-952 - Kaiping Xue, Yingjie Xue, Jianan Hong, Wei Li, Hao Yue, David S. L. Wei, Peilin Hong:
RAAC: Robust and Auditable Access Control With Multiple Attribute Authorities for Public Cloud Storage. 953-967 - Pardeep Kumar, An Braeken, Andrei V. Gurtov, Jari H. Iinatti, Phuong Hoai Ha:
Anonymous Secure Framework in Connected Smart Home Environments. 968-979 - Zhaohong Wang, Sen-Ching S. Cheung, Ying Luo:
Information-Theoretic Secure Multi-Party Computation With Collusion Deterrence. 980-995
Volume 12, Number 5, May 2017
- Jun Yu, Baopeng Zhang, Zhengzhong Kuang, Dan Lin, Jianping Fan:
iPrivacy: Image Privacy Protection by Identifying Sensitive Objects via Deep Multi-Task Learning. 1005-1016 - Zijing Zhao, Ajay Kumar:
Accurate Periocular Recognition Under Less Constrained Environment Using Semantics-Assisted Convolutional Neural Network. 1017-1030 - Kurt Rohloff, David Bruce Cousins, Daniel Sumorok:
Scalable, Practical VoIP Teleconferencing With End-to-End Homomorphic Encryption. 1031-1041 - Mohamed Abouelenien, Verónica Pérez-Rosas, Rada Mihalcea, Mihai Burzo:
Detecting Deceptive Behavior via Integration of Discriminative Features From Multiple Modalities. 1042-1055 - Qing Yang, Paolo Gasti, Gang Zhou, Aydin Farajidavar, Kiran S. Balagani:
On Inferring Browsing Activity on Smartphones via USB Power Analysis Side-Channel. 1056-1066 - Mustafa Al-Ani, Fouad Khelifi:
On the SPN Estimation in Image Forensics: A Systematic Empirical Evaluation. 1067-1081 - Yu-Chi Chen:
Fully Incrementing Visual Cryptography From a Succinct Non-Monotonic Structure. 1082-1091 - Sikhar Patranabis, Abhishek Chakraborty, Debdeep Mukhopadhyay, Partha Pratim Chakrabarti:
Fault Space Transformation: A Generic Approach to Counter Differential Fault Analysis and Differential Fault Intensity Analysis on AES-Like Block Ciphers. 1092-1102 - Mingshen Sun, Xiaolei Li, John C. S. Lui, Richard T. B. Ma, Zhenkai Liang:
Monet: A User-Oriented Behavior-Based Malware Variants Detection System for Android. 1103-1112 - Vahid Heydari, Sun-il Kim, Seong-Moo Yoo:
Scalable Anti-Censorship Framework Using Moving Target Defense for Web Servers. 1113-1124 - Alberto Pedrouzo-Ulloa, Juan Ramón Troncoso-Pastoriza, Fernando Pérez-González:
Number Theoretic Transforms for Secure Signal Processing. 1125-1140 - Qinyi Xu, Yan Chen, Beibei Wang, K. J. Ray Liu:
Radio Biometrics: Human Recognition Through a Wall. 1141-1155 - Rajiv Bagai, Nafia Malik, Murtuza Jadliwala:
Measuring Anonymity of Pseudonymized Data After Probabilistic Background Attacks. 1156-1169 - Y.-W. Peter Hong, Lin-Ming Huang, Hou-Tung Li:
Vector Quantization and Clustered Key Mapping for Channel-Based Secret Key Generation. 1170-1181 - Yujue Wang, Qianhong Wu, Bo Qin, Shaohua Tang, Willy Susilo:
Online/Offline Provable Data Possession. 1182-1194 - Gaojie Chen, Justin P. Coon, Marco Di Renzo:
Secrecy Outage Analysis for Downlink Transmissions in the Presence of Randomly Located Eavesdroppers. 1195-1206 - Francesco G. B. De Natale, Giulia Boato:
Detecting Morphological Filtering of Binary Images. 1207-1217 - Hiroki Okada, Ken Umeno:
Randomness Evaluation With the Discrete Fourier Transform Test Based on Exact Analysis of the Reference Distribution. 1218-1226 - Li Liu, Yue Lu, Ching Y. Suen:
An Image-Based Approach to Detection of Fake Coins. 1227-1239 - Haodong Li, Weiqi Luo, Xiaoqing Qiu, Jiwu Huang:
Image Forgery Localization via Integrating Tampering Possibility Maps. 1240-1252
Volume 12, Number 6, June 2017
- Quratulain Alam, Saif Ur Rehman Malik, Adnan Akhunzada, Kim-Kwang Raymond Choo, Saher Tabbasum, Masoom Alam:
A Cross Tenant Access Control (CTAC) Model for Cloud Computing: Formal Specification and Verification. 1259-1268 - Li Li, Daoyuan Li, Tegawendé F. Bissyandé, Jacques Klein, Yves Le Traon, David Lo, Lorenzo Cavallaro:
Understanding Android App Piggybacking: A Systematic Study of Malicious Code Grafting. 1269-1284 - Yifeng Zheng, Helei Cui, Cong Wang, Jiantao Zhou:
Privacy-Preserving Image Denoising From External Cloud Databases. 1285-1298 - Roberto Caldelli, Rudy Becarelli, Irene Amerini:
Image Origin Classification Based on Social Network Provenance. 1299-1308 - Hang Long, Wei Xiang, Yuli Li:
Precoding and Cooperative Jamming in Multi- Antenna Two-Way Relaying Wiretap Systems Without Eavesdropper's Channel State Information. 1309-1318 - Soumik Mondal, Patrick Bours:
Person Identification by Keystroke Dynamics Using Pairwise User Coupling. 1319-1329 - Jianfeng Lu, Changbing Tang, Xiang Li, Qian Wu:
Designing Socially-Optimal Rating Protocols for Crowdsourcing Contest Dilemma. 1330-1344 - Yanzhen Ren, Jing Yang, Jinwei Wang, Lina Wang:
AMR Steganalysis Based on Second-Order Difference of Pitch Delay. 1345-1357 - John D. Roth, Murali Tummala, John C. McEachen, James W. Scrofani:
On Location Privacy in LTE Networks. 1358-1368 - Hua Shen, Mingwu Zhang, Jian Shen:
Efficient Privacy-Preserving Cube-Data Aggregation Scheme for Smart Grids. 1369-1381 - Qi Xie, Duncan S. Wong, Guilin Wang, Xiao Tan, Kefei Chen, Liming Fang:
Provably Secure Dynamic ID-Based Anonymous Two-Factor Authenticated Key Exchange Protocol With Extended Security Model. 1382-1392 - Andrew Nadeau, Gaurav Sharma:
An Audio Watermark Designed for Efficient and Robust Resynchronization After Analog Playback. 1393-1405 - Baris Coskun:
(Un)wisdom of Crowds: Accurately Spotting Malicious IP Clusters Using Not-So-Accurate IP Blacklists. 1406-1417 - Jordi Soria-Comas, Josep Domingo-Ferrer, David Sánchez, David Megías:
Individual Differential Privacy: A Utility-Preserving Formulation of Differential Privacy Guarantees. 1418-1429 - Yu Fu, Lu Yu, Oluwakemi Hambolu, Ilker Özçelik, Benafsh Husain, Jingxuan Sun, Karan Sapra, Dan Du, Christopher Tate Beasley, Richard R. Brooks:
Stealthy Domain Generation Algorithms. 1430-1443 - Yuhong Liu, Wenqi Zhou, Hong Chen:
Efficiently Promoting Product Online Outcome: An Iterative Rating Attack Utilizing Product and Market Property. 1444-1457 - Onur Tan, Jesús Gómez-Vilardebó, Deniz Gündüz:
Privacy-Cost Trade-offs in Demand-Side Management With Storage. 1458-1469 - Wei Wang, Kah Chan Teh, Kwok Hung Li:
Artificial Noise Aided Physical Layer Security in Multi-Antenna Small-Cell Networks. 1470-1482 - Yunlong Mao, Tingting Chen, Yuan Zhang, Tiancong Wang, Sheng Zhong:
Towards Privacy-Preserving Aggregation for Collaborative Spectrum Sensing. 1483-1493
Volume 12, Number 7, July 2017
- Anil K. Jain, Sunpreet S. Arora, Kai Cao, Lacey Best-Rowden, Anjoo Bhatnagar:
Fingerprint Recognition of Young Children. 1501-1514 - Abhishek Basak, Swarup Bhunia, Thomas E. Tkacik, Sandip Ray:
Security Assurance for System-on-Chip Designs With Untrusted IPs. 1515-1528 - Yinxing Xue, Guozhu Meng, Yang Liu, Tian Huat Tan, Hongxu Chen, Jun Sun, Jie Zhang:
Auditing Anti-Malware Tools by Evolving Android Malware and Dynamic Loading Technique. 1529-1544