


default search action
IEEE Transactions on Information Forensics and Security, Volume 12
Volume 12, Number 1, January 2017
- Anderson Rocha

, Walter J. Scheirer, Christopher W. Forstall, Thiago Cavalcante, Antonio Theophilo, Bingyu Shen, Ariadne Carvalho, Efstathios Stamatatos
:
Authorship Attribution for Social Media Forensics. 5-33 - Filippo Gandino

, Renato Ferrero
, Maurizio Rebaudengo:
A Key Distribution Scheme for Mobile Wireless Sensor Networks: q-Composite. 34-47 - Zhili Zhou

, Yunlong Wang, Q. M. Jonathan Wu
, Ching-Nung Yang, Xingming Sun:
Effective and Efficient Global Context Verification for Image Copy Detection. 48-63 - Arunkumar Vijayakumar

, Vinay C. Patil
, Daniel E. Holcomb, Christof Paar, Sandip Kundu:
Physical Design Obfuscation of Hardware: A Comprehensive Investigation of Device and Logic-Level Techniques. 64-77 - Hao Yan, Jiguo Li

, Jinguang Han
, Yichen Zhang:
A Novel Efficient Remote Data Possession Checking Protocol in Cloud Storage. 78-88 - Adi Hajj-Ahmad

, Séverine Baudry, Bertrand Chupeau, Gwenaël J. Doërr
, Min Wu
:
Flicker Forensics for Camcorder Piracy. 89-100 - Miao Xie, Jiankun Hu

, Song Guo
, Albert Y. Zomaya
:
Distributed Segment-Based Anomaly Detection With Kullback-Leibler Divergence in Wireless Sensor Networks. 101-110 - Wuqiong Pan

, Fangyu Zheng, Yuan Zhao, Wen Tao Zhu
, Jiwu Jing:
An Efficient Elliptic Curve Cryptography Signature Server With GPU Acceleration. 111-122 - Thanh Hai Thai

, Rémi Cogranne
, Florent Retraint, Thi-Ngoc-Canh Doan:
JPEG Quantization Step Estimation and Its Applications to Digital Image Forensics. 123-133 - Neeti Pokhriyal

, Kshitij Tayal, Ifeoma Nwogu
, Venu Govindaraju:
Cognitive-Biometric Recognition From Language Usage: A Feasibility Study. 134-143 - Yubao Zhang

, Xin Ruan, Haining Wang
, Hui Wang, Su He:
Twitter Trends Manipulation: A First Look Inside the Security of Twitter Trending. 144-156 - Yang Hu

, Konstantinos Sirlantzis
, Gareth Howells:
Optimal Generation of Iris Codes for Iris Recognition. 157-171 - Tao Zhang

, Quanyan Zhu:
Dynamic Differential Privacy for ADMM-Based Distributed Classification Learning. 172-187 - Michail Tsikerdekis

:
Identity Deception Prevention Using Common Contribution Network Data. 188-199 - Jun Yan, Haibo He

, Xiangnan Zhong, Yufei Tang:
Q-Learning-Based Vulnerability Analysis of Smart Grid Against Sequential Topology Attacks. 200-210 - Muhammad R. A. Khandaker

, Kai-Kit Wong, Yangyang Zhang, Zhongbin Zheng:
Probabilistically Robust SWIPT for Secrecy MISOME Systems. 211-226 - Nima Tavangaran

, Holger Boche, Rafael F. Schaefer
:
Secret-Key Generation Using Compound Sources and One-Way Public Communication. 227-241 - Andrey Garnaev

, Wade Trappe:
Bargaining Over the Fair Trade-Off Between Secrecy and Throughput in OFDM Communications. 242-251
Volume 12, Number 2, February 2017
- Fawaz S. Al-Qahtani

, Yuzhen Huang, Salah Hessien, Redha M. Radaydeh, Caijun Zhong
, Hussein M. Alnuweiri:
Secrecy Analysis of MIMO Wiretap Channels With Low-Complexity Receivers Under Imperfect Channel Estimation. 257-270 - Lei Xu, Chunxiao Jiang

, Yi Qian, Youjian Zhao, Jianhua Li, Yong Ren:
Dynamic Privacy Pricing: A Multi-Armed Bandit Approach With Time-Variant Rewards. 271-285 - Jingyu Hua

, Zhenyu Shen, Sheng Zhong:
We Can Track You if You Take the Metro: Tracking Metro Riders Using Accelerometers on Smartphones. 286-297 - Wenwen Tu

, Mario Goldenbaum, Lifeng Lai
, H. Vincent Poor
:
On Simultaneously Generating Multiple Keys in a Joint Source-Channel Model. 298-308 - Bo Wang, Leibo Liu

, Chenchen Deng, Min Zhu, Shouyi Yin, Zhuoquan Zhou, Shaojun Wei:
Exploration of Benes Network in Cryptographic Processors: A Random Infection Countermeasure for Block Ciphers Against Fault Attacks. 309-322 - Mahdi Jafari Siavoshani

, Shaunak Mishra, Christina Fragouli, Suhas N. Diggavi:
Multi-Party Secret Key Agreement Over State-Dependent Wireless Broadcast Channels. 323-337 - Hassan Salmani

:
COTD: Reference-Free Hardware Trojan Detection and Recovery Based on Controllability and Observability in Gate-Level Netlist. 338-350 - Jinho Choi

:
On Channel-Aware Secure HARQ-IR. 351-362 - Aijiao Cui

, Yanhui Luo, Chip-Hong Chang
:
Static and Dynamic Obfuscations of Scan Data Against Scan-Based Side-Channel Attacks. 363-376 - Chi-Man Pun

, Cai-Ping Yan, Xiaochen Yuan
:
Image Alignment-Based Multi-Region Matching for Object-Level Tampering Detection. 377-391 - Ashref Lawgaly, Fouad Khelifi

:
Sensor Pattern Noise Estimation Based on Improved Locally Adaptive DCT Filtering and Weighted Averaging for Source Camera Identification and Verification. 392-404 - Xiaolong Guo, Raj Gautam Dutta, Yier Jin

:
Eliminating the Hardware-Software Boundary: A Proof-Carrying Approach for Trust Evaluation on Computer Systems. 405-417 - Mohamed Grissa

, Attila A. Yavuz
, Bechir Hamdaoui:
Preserving the Location Privacy of Secondary Users in Cooperative Spectrum Sensing. 418-431 - Da Luo, Rui Yang, Bin Li, Jiwu Huang

:
Detection of Double Compressed AMR Audio Using Stacked Autoencoder. 432-444 - Kamal Taha

, Paul D. Yoo
:
Using the Spanning Tree of a Criminal Network for Identifying Its Leaders. 445-453 - Debiao He

, Neeraj Kumar
, Kim-Kwang Raymond Choo
, Wei Wu:
Efficient Hierarchical Identity-Based Signature With Batch Verification for Automatic Dependent Surveillance-Broadcast System. 454-464 - Hong Zhang

, Yun Cao, Xianfeng Zhao
:
A Steganalytic Approach to Detect Motion Vector Modification Using Near-Perfect Estimation for Local Optimality. 465-478 - Bo Peng

, Wei Wang
, Jing Dong, Tieniu Tan:
Optimized 3D Lighting Environment Estimation for Image Forgery Detection. 479-494
Volume 12, Number 3, March 2017
- Wei Wang

, Kah Chan Teh
, Kwok Hung Li
:
Secrecy Throughput Maximization for MISO Multi-Eavesdropper Wiretap Channels. 505-515 - Ta-Yuan Liu, Shih-Chun Lin, Y.-W. Peter Hong

:
On the Role of Artificial Noise in Training and Data Transmission for Secret Communications. 516-531 - Tao Jiang, Xiaofeng Chen, Qianhong Wu, Jianfeng Ma, Willy Susilo

, Wenjing Lou:
Secure and Efficient Cloud Data Deduplication With Randomized Tag. 532-543 - Hyukmin Kwon, Aziz Mohaisen, Jiyoung Woo

, Yongdae Kim
, Eunjo Lee, Huy Kang Kim
:
Crime Scene Reconstruction: Online Gold Farming Network Analysis. 544-556 - Jun Zhao

:
On Resilience and Connectivity of Secure Wireless Sensor Networks Under Node Capture Attacks. 557-571 - Parthajit Mohapatra

, Chandra R. Murthy
, Jemin Lee:
On the Secrecy Capacity Region of the Two-User Symmetric Z Interference Channel With Unidirectional Transmitter Cooperation. 572-587 - Benedetta Tondi

, Pedro Comesaña Alfaro
, Fernando Pérez-González
, Mauro Barni:
Smart Detection of Line-Search Oracle Attacks. 588-603 - Long Cheng, Dinil Mon Divakaran

, Aloysius Wooi Kiak Ang, Wee-Yong Lim, Vrizlynn L. L. Thing:
FACT: A Framework for Authentication in Cloud-Based IP Traceback. 604-616 - Yiliang Liu

, Hsiao-Hwa Chen
, Liangmin Wang
:
Secrecy Capacity Analysis of Artificial Noisy MIMO Channels - An Approach Based on Ordered Eigenvalues of Wishart Matrices. 617-630 - Nir Nissim

, Aviad Cohen, Yuval Elovici:
ALDOCX: Detection of Unknown Malicious Microsoft Office Documents Using Designated Active Learning Methods Based on New Structural Feature Extraction Methodology. 631-646 - Yuhong Nan

, Zhemin Yang, Min Yang, Shunfan Zhou, Yuan Zhang, Guofei Gu, Xiaofeng Wang, Limin Sun:
Identifying User-Input Privacy in Mobile Applications at a Large Scale. 647-661 - Aiqing Zhang, Lei Wang, Xinrong Ye, Xiaodong Lin

:
Light-Weight and Robust Security-Aware D2D-Assist Data Transmission Protocol for Mobile-Health Systems. 662-675 - Yuan Zhang

, Chunxiang Xu, Xiaohui Liang
, Hongwei Li, Yi Mu, Xiaojun Zhang:
Efficient Public Verification of Data Integrity for Cloud Storage Systems from Indistinguishability Obfuscation. 676-688 - Takao Murakami

, Atsunori Kanemura
, Hideitsu Hino
:
Group Sparsity Tensor Factorization for Re-Identification of Open Mobility Traces. 689-704 - Abhishek Sharma, Suresh Sundaram

:
A Novel Online Signature Verification System Based on GMM Features in a DTW Framework. 705-718 - Antitza Dantcheva

, François Brémond:
Gender Estimation Based on Smile-Dynamics. 719-729 - Diksha Golait, Neminath Hubballi

:
Detecting Anomalous Behavior in VoIP Systems: A Discrete Event System Modeling. 730-745 - Bin Dai

, Zheng Ma, Yuan Luo:
Finite State Markov Wiretap Channel With Delayed Feedback. 746-760
Volume 12, Number 4, April 2017
- Yong Yu

, Man Ho Au
, Giuseppe Ateniese
, Xinyi Huang, Willy Susilo
, Yuanshun Dai, Geyong Min
:
Identity-Based Remote Data Integrity Checking With Perfect Data Privacy Preserving for Cloud Storage. 767-778 - Parth Pradhan, Parv Venkitasubramaniam

:
Stealthy Attacks in Dynamical Systems: Tradeoffs Between Utility and Detectability With Application in Anonymous Systems. 779-792 - Xufeng Lin

, Chang-Tsun Li
:
Large-Scale Image Clustering Based on Camera Fingerprints. 793-808 - Pawel Korus

, Jiwu Huang
:
Multi-Scale Analysis Strategies in PRNU-Based Tampering Localization. 809-824 - Hongbin Xu

, Li Sun
, Pinyi Ren, Qinghe Du, Yichen Wang:
Cooperative Privacy Preserving Scheme for Downlink Transmission in Multiuser Relay Networks. 825-839 - Yousof Erfani

, Ramin Pichevar, Jean Rouat:
Audio Watermarking Using Spikegram and a Two-Dictionary Approach. 840-852 - Paulo Max Gil Innocencio Reis, João Paulo Carvalho Lustosa da Costa

, Ricardo Kehrle Miranda, Giovanni Del Galdo:
ESPRIT-Hilbert-Based Audio Tampering Detection With SVM Classifier for Forensic Analysis via Electrical Network Frequency. 853-864 - Le Yu, Tao Zhang

, Xiapu Luo
, Lei Xue
, Henry Chang:
Toward Automatically Generating Privacy Policy for Android Apps. 865-880 - Andrey V. Lyamin

, Elena N. Cherepovskaya
:
An Approach to Biometric Identification by Using Low-Frequency Eye Tracker. 881-891 - Matteo Ferrara

, Raffaele Cappelli, Davide Maltoni:
On the Feasibility of Creating Double-Identity Fingerprints. 892-900 - Manar Mohamed

, Babins Shrestha, Nitesh Saxena:
SMASheD: Sniffing and Manipulating Android Sensor Data for Offensive Purposes. 901-913 - Chao Chen, Yu Wang

, Jun Zhang
, Yang Xiang, Wanlei Zhou
, Geyong Min
:
Statistical Features-Based Real-Time Detection of Drifted Twitter Spam. 914-925 - Yuichi Sei

, Akihiko Ohsuga:
Differential Private Data Collection and Analysis Based on Randomized Multiple Dummies for Untrusted Mobile Crowdsensing. 926-939 - Yujue Wang, Qianhong Wu, Bo Qin

, Wenchang Shi, Robert H. Deng
, Jiankun Hu
:
Identity-Based Data Outsourcing With Comprehensive Auditing in Clouds. 940-952 - Kaiping Xue

, Yingjie Xue, Jianan Hong, Wei Li, Hao Yue
, David S. L. Wei, Peilin Hong:
RAAC: Robust and Auditable Access Control With Multiple Attribute Authorities for Public Cloud Storage. 953-967 - Pardeep Kumar

, An Braeken
, Andrei V. Gurtov
, Jari H. Iinatti, Phuong Hoai Ha
:
Anonymous Secure Framework in Connected Smart Home Environments. 968-979 - Zhaohong Wang

, Sen-Ching S. Cheung
, Ying Luo:
Information-Theoretic Secure Multi-Party Computation With Collusion Deterrence. 980-995
Volume 12, Number 5, May 2017
- Jun Yu, Baopeng Zhang

, Zhengzhong Kuang, Dan Lin, Jianping Fan:
iPrivacy: Image Privacy Protection by Identifying Sensitive Objects via Deep Multi-Task Learning. 1005-1016 - Zijing Zhao, Ajay Kumar

:
Accurate Periocular Recognition Under Less Constrained Environment Using Semantics-Assisted Convolutional Neural Network. 1017-1030 - Kurt Rohloff

, David Bruce Cousins, Daniel Sumorok:
Scalable, Practical VoIP Teleconferencing With End-to-End Homomorphic Encryption. 1031-1041 - Mohamed Abouelenien

, Verónica Pérez-Rosas, Rada Mihalcea
, Mihai Burzo:
Detecting Deceptive Behavior via Integration of Discriminative Features From Multiple Modalities. 1042-1055 - Qing Yang, Paolo Gasti, Gang Zhou, Aydin Farajidavar, Kiran S. Balagani

:
On Inferring Browsing Activity on Smartphones via USB Power Analysis Side-Channel. 1056-1066 - Mustafa Al-Ani

, Fouad Khelifi
:
On the SPN Estimation in Image Forensics: A Systematic Empirical Evaluation. 1067-1081 - Yu-Chi Chen

:
Fully Incrementing Visual Cryptography From a Succinct Non-Monotonic Structure. 1082-1091 - Sikhar Patranabis

, Abhishek Chakraborty, Debdeep Mukhopadhyay, Partha Pratim Chakrabarti:
Fault Space Transformation: A Generic Approach to Counter Differential Fault Analysis and Differential Fault Intensity Analysis on AES-Like Block Ciphers. 1092-1102 - Mingshen Sun

, Xiaolei Li, John C. S. Lui, Richard T. B. Ma
, Zhenkai Liang
:
Monet: A User-Oriented Behavior-Based Malware Variants Detection System for Android. 1103-1112 - Vahid Heydari

, Sun-il Kim
, Seong-Moo Yoo:
Scalable Anti-Censorship Framework Using Moving Target Defense for Web Servers. 1113-1124 - Alberto Pedrouzo-Ulloa

, Juan Ramón Troncoso-Pastoriza
, Fernando Pérez-González
:
Number Theoretic Transforms for Secure Signal Processing. 1125-1140 - Qinyi Xu

, Yan Chen, Beibei Wang, K. J. Ray Liu
:
Radio Biometrics: Human Recognition Through a Wall. 1141-1155 - Rajiv Bagai

, Nafia Malik, Murtuza Jadliwala:
Measuring Anonymity of Pseudonymized Data After Probabilistic Background Attacks. 1156-1169 - Y.-W. Peter Hong

, Lin-Ming Huang, Hou-Tung Li:
Vector Quantization and Clustered Key Mapping for Channel-Based Secret Key Generation. 1170-1181 - Yujue Wang, Qianhong Wu, Bo Qin

, Shaohua Tang, Willy Susilo
:
Online/Offline Provable Data Possession. 1182-1194 - Gaojie Chen

, Justin P. Coon, Marco Di Renzo:
Secrecy Outage Analysis for Downlink Transmissions in the Presence of Randomly Located Eavesdroppers. 1195-1206 - Francesco G. B. De Natale, Giulia Boato

:
Detecting Morphological Filtering of Binary Images. 1207-1217 - Hiroki Okada

, Ken Umeno
:
Randomness Evaluation With the Discrete Fourier Transform Test Based on Exact Analysis of the Reference Distribution. 1218-1226 - Li Liu

, Yue Lu, Ching Y. Suen:
An Image-Based Approach to Detection of Fake Coins. 1227-1239 - Haodong Li

, Weiqi Luo
, Xiaoqing Qiu, Jiwu Huang
:
Image Forgery Localization via Integrating Tampering Possibility Maps. 1240-1252
Volume 12, Number 6, June 2017
- Quratulain Alam, Saif Ur Rehman Malik

, Adnan Akhunzada
, Kim-Kwang Raymond Choo
, Saher Tabbasum, Masoom Alam:
A Cross Tenant Access Control (CTAC) Model for Cloud Computing: Formal Specification and Verification. 1259-1268 - Li Li

, Daoyuan Li, Tegawendé F. Bissyandé, Jacques Klein
, Yves Le Traon
, David Lo
, Lorenzo Cavallaro
:
Understanding Android App Piggybacking: A Systematic Study of Malicious Code Grafting. 1269-1284 - Yifeng Zheng

, Helei Cui
, Cong Wang
, Jiantao Zhou
:
Privacy-Preserving Image Denoising From External Cloud Databases. 1285-1298 - Roberto Caldelli

, Rudy Becarelli, Irene Amerini
:
Image Origin Classification Based on Social Network Provenance. 1299-1308 - Hang Long

, Wei Xiang
, Yuli Li:
Precoding and Cooperative Jamming in Multi- Antenna Two-Way Relaying Wiretap Systems Without Eavesdropper's Channel State Information. 1309-1318 - Soumik Mondal

, Patrick Bours:
Person Identification by Keystroke Dynamics Using Pairwise User Coupling. 1319-1329 - Jianfeng Lu

, Changbing Tang, Xiang Li
, Qian Wu:
Designing Socially-Optimal Rating Protocols for Crowdsourcing Contest Dilemma. 1330-1344 - Yanzhen Ren

, Jing Yang, Jinwei Wang, Lina Wang:
AMR Steganalysis Based on Second-Order Difference of Pitch Delay. 1345-1357 - John D. Roth

, Murali Tummala, John C. McEachen, James W. Scrofani:
On Location Privacy in LTE Networks. 1358-1368 - Hua Shen

, Mingwu Zhang, Jian Shen
:
Efficient Privacy-Preserving Cube-Data Aggregation Scheme for Smart Grids. 1369-1381 - Qi Xie, Duncan S. Wong, Guilin Wang, Xiao Tan, Kefei Chen, Liming Fang:

Provably Secure Dynamic ID-Based Anonymous Two-Factor Authenticated Key Exchange Protocol With Extended Security Model. 1382-1392 - Andrew Nadeau

, Gaurav Sharma:
An Audio Watermark Designed for Efficient and Robust Resynchronization After Analog Playback. 1393-1405 - Baris Coskun

:
(Un)wisdom of Crowds: Accurately Spotting Malicious IP Clusters Using Not-So-Accurate IP Blacklists. 1406-1417 - Jordi Soria-Comas

, Josep Domingo-Ferrer
, David Sánchez
, David Megías
:
Individual Differential Privacy: A Utility-Preserving Formulation of Differential Privacy Guarantees. 1418-1429 - Yu Fu

, Lu Yu, Oluwakemi Hambolu, Ilker Özçelik
, Benafsh Husain, Jingxuan Sun, Karan Sapra, Dan Du, Christopher Tate Beasley, Richard R. Brooks
:
Stealthy Domain Generation Algorithms. 1430-1443 - Yuhong Liu

, Wenqi Zhou, Hong Chen:
Efficiently Promoting Product Online Outcome: An Iterative Rating Attack Utilizing Product and Market Property. 1444-1457 - Onur Tan

, Jesús Gómez-Vilardebó
, Deniz Gündüz
:
Privacy-Cost Trade-offs in Demand-Side Management With Storage. 1458-1469 - Wei Wang

, Kah Chan Teh
, Kwok Hung Li
:
Artificial Noise Aided Physical Layer Security in Multi-Antenna Small-Cell Networks. 1470-1482 - Yunlong Mao

, Tingting Chen, Yuan Zhang, Tiancong Wang, Sheng Zhong:
Towards Privacy-Preserving Aggregation for Collaborative Spectrum Sensing. 1483-1493
Volume 12, Number 7, July 2017
- Anil K. Jain, Sunpreet S. Arora

, Kai Cao, Lacey Best-Rowden, Anjoo Bhatnagar:
Fingerprint Recognition of Young Children. 1501-1514 - Abhishek Basak

, Swarup Bhunia
, Thomas E. Tkacik, Sandip Ray:
Security Assurance for System-on-Chip Designs With Untrusted IPs. 1515-1528 - Yinxing Xue, Guozhu Meng

, Yang Liu
, Tian Huat Tan, Hongxu Chen, Jun Sun
, Jie Zhang:
Auditing Anti-Malware Tools by Evolving Android Malware and Dynamic Loading Technique. 1529-1544 - Kyung-Ah Shim

:
BASIS: A Practical Multi-User Broadcast Authentication Scheme in Wireless Sensor Networks. 1545-1554 - Ruochi Zhang

, Parv Venkitasubramaniam
:
Stealthy Control Signal Attacks in Linear Quadratic Gaussian Control Systems: Detectability Reward Tradeoff. 1555-1570 - Chun-Yi Wei, Po-Ning Chen

, Yunghsiang S. Han
, Pramod K. Varshney:
Local Threshold Design for Target Localization Using Error Correcting Codes in Wireless Sensor Networks in the Presence of Byzantine Attacks. 1571-1584 - Saeedreza Shehnepoor

, Mostafa Salehi
, Reza Farahbakhsh, Noël Crespi:
NetSpam: A Network-Based Spam Detection Framework for Reviews in Online Social Media. 1585-1595 - Kaiping Xue

, Shaohua Li, Jianan Hong, Yingjie Xue, Nenghai Yu, Peilin Hong:
Two-Cloud Secure Database for Numeric-Related SQL Range Queries With Privacy Preserving. 1596-1608 - Rui Tan

, Hoang Hai Nguyen, Yi Shyh Eddy Foo
, David K. Y. Yau, Zbigniew Kalbarczyk, Ravishankar K. Iyer, Hoay Beng Gooi
:
Modeling and Mitigating Impact of False Data Injection Attacks on Automatic Generation Control. 1609-1624 - Maxim Chernyshev

, Craig Valli
, Michael N. Johnstone:
Revisiting Urban War Nibbling: Mobile Passive Discovery of Classic Bluetooth Devices Using Ubertooth One. 1625-1636 - Hugo Proença

, João C. Neves
:
Soft Biometrics: Globally Coherent Solutions for Hair Segmentation and Style Recognition Based on Hierarchical MRFs. 1637-1645 - Tomas Larrain

, John S. Bernhard, Domingo Mery
, Kevin W. Bowyer
:
Face Recognition Using Sparse Fingerprint Classification Algorithm. 1646-1657 - Shunquan Tan

, Haojie Zhang, Bin Li, Jiwu Huang
:
Pixel-Decimation-Assisted Steganalysis of Synchronize-Embedding-Changes Steganography. 1658-1670 - Haichang Gao

, Mengyun Tang, Yi Liu, Ping Zhang, Xiyang Liu:
Research on the Security of Microsoft's Two-Layer Captcha. 1671-1685 - Gaurav Goswami, Mayank Vatsa

, Richa Singh
:
Face Verification via Learned Representation on Feature-Rich Video Frames. 1686-1698 - Alex X. Liu

, Amir R. Khakpour, Joshua W. Hulst, Zihui Ge, Dan Pei
, Jia Wang:
Firewall Fingerprinting and Denial of Firewalling Attacks. 1699-1712 - Ishan Manjani, Snigdha Tariyal, Mayank Vatsa

, Richa Singh
, Angshul Majumdar:
Detecting Silicone Mask-Based Presentation Attack via Deep Dictionary Learning. 1713-1723 - Gabriel Emile Hine

, Emanuele Maiorana
, Patrizio Campisi:
A Zero-Leakage Fuzzy Embedder From the Theoretical Formulation to Real Data. 1724-1734 - Qingyu Yang, Dou An, Rui Min, Wei Yu

, Xinyu Yang, Wei Zhao
:
On Optimal PMU Placement-Based Defense Against Data Integrity Attacks in Smart Grid. 1735-1750
Volume 12, Number 8, August 2017
- Wei Yang

, Yongbin Zhou, Yuchen Cao, Hailong Zhang, Qian Zhang, Huan Wang:
Multi-Channel Fusion Attacks. 1757-1771 - Ming Fan

, Jun Liu, Wei Wang, Haifei Li, Zhenzhou Tian, Ting Liu
:
DAPASA: Detecting Android Piggybacked Apps Through Sensitive Subgraph Analysis. 1772-1785 - Yezekael Hayel

, Quanyan Zhu:
Epidemic Protection Over Heterogeneous Networks Using Evolutionary Poisson Games. 1786-1800 - Hongbin Luo

, Zhe Chen, Jiawei Li, Athanasios V. Vasilakos
:
Preventing Distributed Denial-of-Service Flooding Attacks With Dynamic Path Identifiers. 1801-1815 - Huafeng Qin

, Mounim A. El-Yacoubi
:
Deep Representation-Based Feature Extraction and Recovering for Finger-Vein Verification. 1816-1829 - Meng Shen

, Mingwei Wei, Liehuang Zhu
, Mingzhong Wang
:
Classification of Encrypted Traffic With Second-Order Markov Chains and Application Attribute Bigrams. 1830-1843 - Vincenzo Matta

, Mario Di Mauro
, Maurizio Longo:
DDoS Attacks With Randomized Traffic Innovation: Botnet Identification Challenges and Strategies. 1844-1859 - Anselmo Ferreira

, Luca Bondi
, Luca Baroffio, Paolo Bestagini
, Jiwu Huang
, Jefersson A. dos Santos, Stefano Tubaro, Anderson Rocha
:
Data-Driven Feature Characterization Techniques for Laser Printer Attribution. 1860-1873 - Zhangjie Fu, Fengxiao Huang, Kui Ren, Jian Weng

, Cong Wang
:
Privacy-Preserving Smart Semantic Search Based on Conceptual Graphs Over Encrypted Outsourced Data. 1874-1884 - Chau-Wai Wong

, Min Wu
:
Counterfeit Detection Based on Unclonable Feature of Paper Using Mobile Camera. 1885-1899 - Frodo Kin-Sun Chan, Xiaojie Li, Adams Wai-Kin Kong

:
A Study of Distinctiveness of Skin Texture for Forensic Applications Through Comparison With Blood Vessels. 1900-1915 - Andrey Garnaev

, Wade Trappe:
Bandwidth Scanning When Facing Interference Attacks Aimed at Reducing Spectrum Opportunities. 1916-1930 - Jia Yu

, Huaqun Wang
:
Strong Key-Exposure Resilient Auditing for Secure Cloud Storage. 1931-1940 - Diego Valsesia

, Giulio Coluccia
, Tiziano Bianchi
, Enrico Magli:
User Authentication via PRNU-Based Physical Unclonable Functions. 1941-1956 - Taras Stanko, Fitria Nur Andini, Boris Skoric

:
Optimized Quantization in Zero Leakage Helper Data Systems. 1957-1966 - Samiran Bag

, Sushmita Ruj
, Kouichi Sakurai:
Bitcoin Block Withholding Attack: Analysis and Mitigation. 1967-1978 - Yu-Hao Chin, Jia-Ching Wang

, Chien-Lin Huang, Kuang-Yao Wang, Chung-Hsien Wu
:
Speaker Identification Using Discriminative Features and Sparse Representation. 1979-1987 - Brice Colombier

, Lilian Bossuet, Viktor Fischer, David Hély
:
Key Reconciliation Protocols for Error Correction of Silicon PUF Responses. 1988-2002
Volume 12, Number 9, September 2017
- Aditi Roy

, Nasir D. Memon
, Arun Ross:
MasterPrint: Exploring the Vulnerability of Partial Fingerprint-Based Authentication Systems. 2013-2025 - Shota Saito

, Yoichi Tomioka
, Hitoshi Kitazawa:
A Theoretical Framework for Estimating False Acceptance Rate of PRNU-Based Camera Identification. 2026-2035 - Mustafa Ozmen, Mustafa Cenk Gursoy

:
Secure Transmission of Delay-Sensitive Data Over Wireless Fading Channels. 2036-2051 - Ahmed A. Zewail

, Aylin Yener:
Multi-Terminal Two-Hop Untrusted-Relay Networks With Hierarchical Security Guarantees. 2052-2066 - Sunpreet S. Arora

, Anil K. Jain, Nicholas G. Paulter Jr.:
Gold Fingers: 3D Targets for Evaluating Capacitive Readers. 2067-2077 - Ester Gonzalez-Sosa

, Rubén Vera-Rodríguez
, Julian Fiérrez
, Vishal M. Patel
:
Exploring Body Shape From mmW Images for Person Recognition. 2078-2089 - Nicolas Bruneau, Claude Carlet, Sylvain Guilley

, Annelie Heuser, Emmanuel Prouff, Olivier Rioul
:
Stochastic Collision Attack. 2090-2104 - Jing Yang Koh

, Derek Leong
, Gareth W. Peters
, Ido Nevat
, Wai-Choong Wong:
Optimal Privacy-Preserving Probabilistic Routing for Wireless Networks. 2105-2114 - David Vazquez-Padin

, Fernando Pérez-González
, Pedro Comesaña Alfaro
:
A Random Matrix Approach to the Forensic Analysis of Upscaled Images. 2115-2130 - Jing (Dave) Tian, Kevin R. B. Butler

, Joseph I. Choi, Patrick D. McDaniel, Padma Krishnaswamy:
Securing ARP/NDP From the Ground Up. 2131-2143 - Cai-Ping Yan, Chi-Man Pun

:
Multi-Scale Difference Map Fusion for Tamper Localization Using Binary Ranking Hashing. 2144-2158 - Byoung-Kyong Min

, Heung-Il Suk
, Min-Hee Ahn, Min-Ho Lee
, Seong-Whan Lee:
Individual Identification Using Cognitive Electroencephalographic Neurodynamics. 2159-2167 - Bahman Moraffah, Lalitha Sankar

:
Privacy-Guaranteed Two-Agent Interactions Using Information-Theoretic Mechanisms. 2168-2183 - Adam Czajka

, Kevin W. Bowyer
, Michael Krumdick, Rosaura G. VidalMata
:
Recognition of Image-Orientation-Based Iris Spoofing. 2184-2196 - Francesco Marra

, Giovanni Poggi
, Carlo Sansone
, Luisa Verdoliva
:
Blind PRNU-Based Image Clustering for Source Identification. 2197-2211 - Vladimir I. Ivanov

, John S. Baras:
Authentication of Swipe Fingerprint Scanners. 2212-2226 - Yuan Hong

, Wen Ming Liu, Lingyu Wang:
Privacy Preserving Smart Meter Streaming Against Information Leakage of Appliance Status. 2227-2241 - Xiaohui Han

, Lianhai Wang, Chaoran Cui, Jun Ma, Shuhui Zhang:
Linking Multiple Online Identities in Criminal Investigations: A Spectral Co-Clustering Framework. 2242-2255
Volume 12, Number 10, October 2017
- Xuan Zha

, Wei Ni
, Kangfeng Zheng, Ren Ping Liu
, Xinxin Niu:
Collaborative Authentication in Decentralized Dense Mobile Networks With Key Predistribution. 2261-2275 - Ronny Merkel

, Jana Dittmann, Claus Vielhauer:
A First Public Research Collection of High-Resolution Latent Fingerprint Time Series for Short- and Long-Term Print Age Estimation. 2276-2291 - Jiajun Wen, Zhihui Lai, Zhong Ming, Wai Keung Wong

, Zuofeng Zhong:
Directional Gaussian Model for Automatic Speeding Event Detection. 2292-2307 - Tomás Denemark

, Jessica J. Fridrich:
Steganography With Multiple JPEG Images of the Same Scene. 2308-2319 - Yue Li

, Haining Wang, Kun Sun:
Personal Information in Passwords and Its Security Implications. 2320-2333 - Wei Song, Bing Wang, Qian Wang

, Chengliang Shi, Wenjing Lou, Zhiyong Peng:
Publicly Verifiable Computation of Polynomials Over Outsourced Data With Multiple Sources. 2334-2347 - Richard E. Harang, Alexander Kott

:
Burstiness of Intrusion Detection Process: Empirical Evidence and a Modeling Approach. 2348-2359 - Alireza Alaei

, Srikanta Pal, Umapada Pal, Michael Blumenstein:
An Efficient Signature Verification Method Based on an Interval Symbolic Representation and a Fuzzy Similarity Measure. 2360-2372 - Nianfeng Liu

, Jing Liu, Zhenan Sun, Tieniu Tan:
A Code-Level Approach to Heterogeneous Iris Recognition. 2373-2386 - Lingxiang Li

, Athina P. Petropulu, Zhi Chen:
MIMO Secret Communications Against an Active Eavesdropper. 2387-2401 - Jian Shen

, Jun Shen, Xiaofeng Chen, Xinyi Huang, Willy Susilo
:
An Efficient Public Auditing Protocol With Novel Dynamic Structure for Cloud Data. 2402-2415 - Yier Jin

, Xiaolong Guo, Raj Gautam Dutta, Mohammad-Mahdi Bidmeshki, Yiorgos Makris
:
Data Secrecy Protection Through Information Flow Tracking in Proof-Carrying Hardware IP - Part I: Framework Fundamentals. 2416-2429 - Mohammad-Mahdi Bidmeshki, Xiaolong Guo, Raj Gautam Dutta, Yier Jin

, Yiorgos Makris
:
Data Secrecy Protection Through Information Flow Tracking in Proof-Carrying Hardware IP - Part II: Framework Automation. 2430-2443 - Wei Tong

, Jingyu Hua
, Sheng Zhong:
A Jointly Differentially Private Scheduling Protocol for Ridesharing Services. 2444-2456 - Irene Amerini

, Rudy Becarelli, Roberto Caldelli
, Alessio Melani, Moreno Niccolai:
Smartphone Fingerprinting Combining Features of On-Board Sensors. 2457-2466 - Girish Revadigar

, Chitra Javali, Weitao Xu
, Athanasios V. Vasilakos
, Wen Hu
, Sanjay Jha
:
Accelerometer and Fuzzy Vault-Based Secure Group Key Generation and Sharing Protocol for Smart Wearables. 2467-2482 - Bahman Rashidi

, Carol J. Fung, Elisa Bertino:
A Collaborative DDoS Defence Framework Using Network Function Virtualization. 2483-2497
Volume 12, Number 11, November 2017
- Md. Tauhid Bin Iqbal, Mohammad Shoyaib, Byungyong Ryu, Mohammad Abdullah-Al-Wadud

, Oksam Chae:
Directional Age-Primitive Pattern (DAPP) for Human Age Group Recognition and Age Estimation. 2505-2517 - Kai Zhou

, M. H. Afifi, Jian Ren
:
ExpSOS: Secure and Verifiable Outsourcing of Exponentiation Operations for Mobile Cloud Computing. 2518-2531 - Sushil Jajodia

, Noseong Park, Fabio Pierazzi
, Andrea Pugliese
, Edoardo Serra
, Gerardo I. Simari, V. S. Subrahmanian:
A Probabilistic Logic of Cyber Deception. 2532-2544 - Jian Ye, Jiangqun Ni

, Yang Yi
:
Deep Learning Hierarchical Representations for Image Steganalysis. 2545-2557 - Tianbo Wang

, Chunhe Xia, Zhong Li, Xiaochen Liu, Yang Xiang
:
The Spatial-Temporal Perspective: The Study of the Propagation of Modern Social Worms. 2558-2573 - Noura Alomar

, Mansour Alsaleh, Abdulrahman Alarifi:
Someone in Your Contact List: Cued Recall-Based Textual Passwords. 2574-2589 - Rui Zhang, Shuang Qiu

, Yongbin Zhou:
Further Improving Efficiency of Higher Order Masking Schemes by Decreasing Randomness Complexity. 2590-2598 - Jun Wang, Guoqing Wang

:
Quality-Specific Hand Vein Recognition System. 2599-2610 - Elena Veronica Belmega

, Arsenia Chorti
:
Protecting Secret Key Generation Systems Against Jamming: Energy Harvesting and Channel Hopping Approaches. 2611-2626 - Attila Altay Yavuz

, Anand Mudgerikar, Ankush Singla, Ioannis Papapanagiotou, Elisa Bertino:
Real-Time Digital Signatures for Time-Critical Networks. 2627-2639 - Margarita Osadchy

, Julio C. Hernandez-Castro, Stuart J. Gibson, Orr Dunkelman, Daniel Pérez-Cabo:
No Bot Expects the DeepCAPTCHA! Introducing Immutable Adversarial Examples, With Applications to CAPTCHA Generation. 2640-2653 - Wenbo Zhou, Weiming Zhang

, Nenghai Yu:
A New Rule for Cost Reassignment in Adaptive Steganography. 2654-2667 - Muhammad Yasin

, Ozgur Sinanoglu
, Jeyavijayan Rajendran:
Testing the Trustworthiness of IC Testing: An Oracle-Less Attack on IC Camouflaging. 2668-2682 - Zarrin Montazeri

, Amir Houmansadr, Hossein Pishro-Nik:
Achieving Perfect Location Privacy in Wireless Devices Using Anonymization. 2683-2698 - Jinho Choi

:
Physical Layer Security for Channel-Aware Random Access With Opportunistic Jamming. 2699-2711 - Jong-Uk Hou

, Do-Gon Kim, Heung-Kyu Lee:
Blind 3D Mesh Watermarking for 3D Printed Model by Analyzing Layering Artifact. 2712-2725 - Naoise Holohan

, Douglas J. Leith
, Oliver Mason
:
Optimal Differentially Private Mechanisms for Randomised Response. 2726-2735 - Juntao Chen

, Quanyan Zhu:
Security as a Service for Cloud-Enabled Internet of Controlled Things Under Advanced Persistent Threats: A Contract Design Approach. 2736-2750 - Abdelmalik Ouamane

, Ammar Chouchane, Elhocine Boutellaa
, Mebarka Belahcene, Salah Bourennane, Abdenour Hadid:
Efficient Tensor-Based 2D+3D Face Verification. 2751-2762 - Xingliang Yuan

, Xinyu Wang
, Cong Wang
, Chenyun Yu, Sarana Nutanong:
Privacy-Preserving Similarity Joins Over Encrypted Data. 2763-2775 - Ding Wang

, Haibo Cheng, Ping Wang, Xinyi Huang, Gaopeng Jian:
Zipf's Law in Passwords. 2776-2791 - Changyu Dong

, Grigorios Loukides
:
Approximating Private Set Union/Intersection Cardinality With Logarithmic Complexity. 2792-2806 - Pan Zhou, Qian Wang

, Wei Wang, Yuchong Hu, Dapeng Wu
:
Near-Optimal and Practical Jamming-Resistant Energy-Efficient Cognitive Radio Communications. 2807-2822
Volume 12, Number 12, December 2017
- Javier Galbally

, Iwen Coisel, Ignacio Sánchez:
A New Multimodal Approach for Password Strength Estimation - Part I: Theory and Algorithms. 2829-2844 - Javier Galbally

, Iwen Coisel, Ignacio Sánchez:
A New Multimodal Approach for Password Strength Estimation - Part II: Experimental Evaluation. 2845-2860 - Zhengyu Zhu

, Zheng Chu
, Ning Wang, Sai Huang, Zhongyong Wang
, Inkyu Lee:
Beamforming and Power Splitting Designs for AN-Aided Secure Multi-User MIMO SWIPT Systems. 2861-2874 - Athanasios Papadopoulos

, Toan Nguyen, Emre Durmus, Nasir D. Memon
:
IllusionPIN: Shoulder-Surfing Resistant Authentication Using Hybrid Images. 2875-2889 - Cecilia Pasquini

, Giulia Boato
, Fernando Pérez-González
:
Statistical Detection of JPEG Traces in Digital Images in Uncompressed Formats. 2890-2905 - Jeffrey Pawlick

, Quanyan Zhu:
Strategic Trust in Cloud-Enabled Cyber-Physical Systems With an Application to Glucose Control. 2906-2919 - Hua Sun

, Syed Ali Jafar
:
Optimal Download Cost of Private Information Retrieval for Arbitrary Message Length. 2920-2932 - Do-hyung Kim

, Jun Bi, Athanasios V. Vasilakos
, Ikjun Yeom:
Security of Cached Content in NDN. 2933-2944 - Tobias Senst

, Volker Eiselein, Alexander Kuhn, Thomas Sikora:
Crowd Violence Detection Using Global Motion-Compensated Lagrangian Features and Scale-Sensitive Video-Level Representation. 2945-2956 - Marcus Karlsson

, Emil Björnson
, Erik G. Larsson:
Jamming a TDD Point-to-Point Link Using Reciprocity-Based MIMO. 2957-2970 - Yuanman Li

, Jiantao Zhou
, An Cheng:
SIFT Keypoint Removal via Directed Graph Construction for Color Images. 2971-2985 - Zhangjie Fu, Xinle Wu, Qian Wang

, Kui Ren:
Enabling Central Keyword-Based Semantic Extension Search Over Encrypted Outsourced Data. 2986-2997 - Lei Zhang

:
OTIBAAGKA: A New Security Tool for Cryptographic Mix-Zone Establishment in Vehicular Ad Hoc Networks. 2998-3010 - Ming Wan

, Wenli Shang
, Peng Zeng
:
Double Behavior Characteristics for One-Class Classification Anomaly Detection in Networked Control Systems. 3011-3023 - Steven Gordon

, Xinyi Huang, Atsuko Miyaji
, Chunhua Su, Karin Sumongkayothin
, Komwut Wipusitwarakun:
Recursive Matrix Oblivious RAM: An ORAM Construction for Constrained Storage Devices. 3024-3038 - Ran Dubin

, Amit Dvir
, Ofir Pele
, Ofer Hadar
:
I Know What You Saw Last Minute - Encrypted HTTP Adaptive Video Streaming Title Classification. 3039-3049 - Haodong Li

, Weiqi Luo
, Jiwu Huang
:
Localization of Diffusion-Based Inpainting in Digital Images. 3050-3064 - Samet Taspinar, Manoranjan Mohanty

, Nasir D. Memon
:
PRNU-Based Camera Attribution From Multiple Seam-Carved Images. 3065-3080 - Chugui Xu, Ju Ren

, Yaoxue Zhang, Zhan Qin
, Kui Ren:
DPPro: Differentially Private High-Dimensional Data Release via Random Projection. 3081-3093 - Lemonia Dritsoula

, Patrick Loiseau, John Musacchio:
A Game-Theoretic Analysis of Adversarial Classification. 3094-3109 - Willy Susilo

, Peng Jiang
, Fuchun Guo
, Guomin Yang
, Yong Yu
, Yi Mu:
EACSIP: Extendable Access Control System With Integrity Protection for Enhancing Collaboration in the Cloud. 3110-3122 - Mauro Barni:

Farewell Message. i-ii

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














