default search action
IEEE Transactions on Information Forensics and Security, Volume 13
Volume 13, Number 1, January 2018
- Patrizio Campisi:
Editorial. 5 - Anh Truong, S. Rasoul Etesami, Jalal Etesami, Negar Kiyavash:
Optimal Attack Strategies Against Predictors - Learning From Expert Advice. 6-19 - Tarang Chugh, Kai Cao, Jiayu Zhou, Elham Tabassi, Anil K. Jain:
Latent Fingerprint Value Prediction: Crowd-Based Learning. 20-34 - Liang Xiao, Yanda Li, Guoan Han, Huaiyu Dai, H. Vincent Poor:
A Secure Mobile Crowdsensing Game With Deep Reinforcement Learning. 35-47 - Chao Shen, Yuanxun Li, Yufei Chen, Xiaohong Guan, Roy A. Maxion:
Performance Analysis of Multi-Motion Sensor Behavior for Active Smartphone Authentication. 48-62 - Vincent F. Taylor, Riccardo Spolaor, Mauro Conti, Ivan Martinovic:
Robust Smartphone App Identification via Encrypted Network Traffic Analysis. 63-78 - Sandhya Koteshwara, Chris H. Kim, Keshab K. Parhi:
Key-Based Dynamic Functional Obfuscation of Integrated Circuits Using Sequentially Triggered Mode-Based Design. 79-93 - Jianting Ning, Zhenfu Cao, Xiaolei Dong, Kaitai Liang, Hui Ma, Lifei Wei:
Auditable σ-Time Outsourced Attribute-Based Encryption for Access Control in Cloud Computing. 94-105 - Jiangshan Yu, Mark Ryan, Cas Cremers:
DECIM: Detecting Endpoint Compromise In Messaging. 106-118 - Nirattaya Khamsemanan, Cholwich Nattee, Nitchan Jianwattanapaisarn:
Human Identification From Freestyle Walks Using Posture-Based Gait Feature. 119-128 - Giulio Giaconi, Deniz Gündüz, H. Vincent Poor:
Smart Meter Privacy With Renewable Energy and an Energy Storage Device. 129-142 - João Sá Sousa, João P. Vilela:
Uncoordinated Frequency Hopping for Wireless Secrecy Against Non-Degraded Eavesdroppers. 143-155 - Shan Gu, Jianjiang Feng, Jiwen Lu, Jie Zhou:
Efficient Rectification of Distorted Fingerprints. 156-169 - Xinghao Jiang, Peisong He, Tanfeng Sun, Feng Xie, Shilin Wang:
Detection of Double Compression With the Same Coding Parameters Based on Quality Degradation Mechanism Analysis. 170-185 - Cong Zuo, Jun Shao, Joseph K. Liu, Guiyi Wei, Yun Ling:
Fine-Grained Two-Factor Protection Mechanism for Data Sharing in Cloud Storage. 186-196 - He Fang, Li Xu, Xianbin Wang:
Coordinated Multiple-Relays Based Physical-Layer Security Improvement: A Single-Leader Multiple-Followers Stackelberg Game Scheme. 197-209 - Tan Tai Do, Emil Björnson, Erik G. Larsson, Seyed Mohammad Razavizadeh:
Jamming-Resistant Receivers for the Massive MIMO Uplink. 210-223 - Te Sun Han, Hiroyuki Endo, Masahide Sasaki:
Wiretap Channels With One-Time State Information: Strong Secrecy. 224-236 - Alessio Zappone, Pin-Hsun Lin, Eduard A. Jorswieck:
Optimal Energy-Efficient Design of Confidential Multiple-Antenna Systems. 237-252 - Chris G. Zeinstra, Raymond N. J. Veldhuis, Luuk J. Spreeuwers:
Grid-Based Likelihood Ratio Classifiers for the Comparison of Facial Marks. 253-264
Volume 13, Number 2, February 2018
- Wei Wang, Kah Chan Teh, Kwok Hung Li, Sheng Luo:
On the Impact of Adaptive Eavesdroppers in Multi-Antenna Cellular Networks. 269-279 - Wouter Biesmans, Josep Balasch, Alfredo Rial, Bart Preneel, Ingrid Verbauwhede:
Private Mobile Pay-TV From Priced Oblivious Transfer. 280-291 - Hao Liu, Jiwen Lu, Jianjiang Feng, Jie Zhou:
Label-Sensitive Deep Metric Learning for Facial Age Estimation. 292-305 - Dong-Hua Chen, Yu-Cheng He, Xiaodan Lin, Rui Zhao:
Both Worst-Case and Chance-Constrained Robust Secure SWIPT in MISO Interference Channels. 306-317 - Weichen Xiang, Martin Johnston, Stéphane Y. Le Goff:
Low-Complexity Power Control and Energy Harvesting Algorithms for Wiretap Channels Employing Finite-Alphabet Input Schemes. 318-326 - Mauro Mangia, Fabio Pareschi, Riccardo Rovatti, Gianluca Setti:
Low-Cost Security of IoT Sensor Nodes With Rakeness-Based Compressed Sensing: Statistical and Known-Plaintext Attacks. 327-340 - Ali Kuhestani, Abbas Mohammadi, Mohammadali Mohammadi:
Joint Relay Selection and Power Allocation in Large-Scale MIMO Systems With Untrusted Relays and Passive Eavesdroppers. 341-355 - Manami Sasaki, Yodai Watanabe:
Visual Secret Sharing Schemes Encrypting Multiple Images. 356-365 - Lei Xu, Arumugam Nallanathan, Xiaofei Pan, Jian Yang, Wenhe Liao:
Security-Aware Resource Allocation With Delay Constraint for NOMA-Based Cognitive Radio Network. 366-376 - Bo Peng, Wei Wang, Jing Dong, Tieniu Tan:
Image Forensics Based on Planar Contact Constraints of 3D Objects. 377-392 - Zhe Jin, Jung Yeon Hwang, Yen-Lung Lai, Soohyung Kim, Andrew Beng Jin Teoh:
Ranking-Based Locality Sensitive Hashing-Enabled Cancelable Biometrics: Index-of-Max Hashing. 393-407 - Jianhua Liu, Jiadi Yu, Shigen Shen:
Energy-Efficient Two-Layer Cooperative Defense Scheme to Secure Sensor-Clouds. 408-420 - Lingxiang Li, Zhi Chen, Athina P. Petropulu, Jun Fang:
Linear Precoder Design for an MIMO Gaussian Wiretap Channel With Full-Duplex Source and Destination Nodes. 421-436 - Jeeson Kim, Taimur Ahmed, Hussein Nili, Jiawei Yang, Doo Seok Jeong, Paul Beckett, Sharath Sriram, Damith Chinthana Ranasinghe, Omid Kavehei:
A Physical Unclonable Function With Redox-Based Nanoionic Resistive Memory. 437-448 - Ruei-Hau Hsu, Jemin Lee, Tony Q. S. Quek, Jyh-Cheng Chen:
GRAAD: Group Anonymous and Accountable D2D Communication in Mobile Networks. 449-464 - Xinwei Qiu, Wenxiong Kang, Senping Tian, Wei Jia, Zhixing Huang:
Finger Vein Presentation Attack Detection Using Total Variation Decomposition. 465-477 - Sina Lashgari, Amir Salman Avestimehr:
Secrecy DoF of Blind MIMOME Wiretap Channel With Delayed CSIT. 478-489 - Marios O. Choudary, Markus G. Kuhn:
Efficient, Portable Template Attacks. 490-501 - Zahra Ahmadian, Sadegh Jamshidpour:
Linear Subspace Cryptanalysis of Harn's Secret Sharing-Based Group Authentication Scheme. 502-510 - Meixia Miao, Jianfeng Ma, Xinyi Huang, Qian Wang:
Efficient Verifiable Databases With Insertion/Deletion Operations From Delegating Polynomial Functions. 511-520 - Patrick P. K. Chan, Weiwen Liu, Danni Chen, Daniel S. Yeung, Fei Zhang, Xizhao Wang, Chien-Chang Hsu:
Face Liveness Detection Using a Flash Against 2D Spoofing Attack. 521-534
Volume 13, Number 3, March 2018
- Shukun Yang, Shouling Ji, Raheem A. Beyah:
DPPG: A Dynamic Password Policy Generation System. 545-558 - Chenxu Wang, TungNgai Miu, Xiapu Luo, Jinhe Wang:
SkyShield: A Sketch-Based Defense System Against Application Layer DDoS Attacks. 559-573 - Jun Du, Chunxiao Jiang, Kwang-Cheng Chen, Yong Ren, H. Vincent Poor:
Community-Structured Evolutionary Game for Privacy Protection in Social Networks. 574-589 - Marc Sánchez Artigas:
Enhancing Tree-Based ORAM Using Batched Request Reordering. 590-604 - Baki Berkay Yilmaz, Robert Locke Callan, Milos Prvulovic, Alenka G. Zajic:
Capacity of the EM Covert/Side-Channel Created by the Execution of Instructions in a Processor. 605-620 - Muhamad Erza Aminanto, Rakyong Choi, Harry Chandra Tanuwidjaja, Paul D. Yoo, Kwangjo Kim:
Deep Abstraction and Weighted Feature Selection for Wi-Fi Impersonation Detection. 621-636 - Shu Zhang, Ran He, Zhenan Sun, Tieniu Tan:
DeMeshNet: Blind Face Inpainting for Deep MeshFace Verification. 637-647 - Takashi Nakamura, Valentin Goverdovsky, Danilo P. Mandic:
In-Ear EEG Biometrics for Feasible and Readily Collectable Real-World Person Authentication. 648-661 - Hao Dong, Chao Wu, Zhen Wei, Yike Guo:
Dropping Activation Outputs With Localized First-Layer Deep Network for Enhancing User Privacy and Data Security. 662-670 - Jingran Lin, Qiang Li, Jintai Yang, Huaizong Shao, Wen-Qin Wang:
Physical-Layer Security for Proximal Legitimate User and Eavesdropper: A Frequency Diverse Array Beamforming Approach. 671-684 - Vaishakh Ravindrakumar, Parthasarathi Panda, Nikhil Karamchandani, Vinod M. Prabhakaran:
Private Coded Caching. 685-694 - Shuhua Deng, Xing Gao, Zebin Lu, Xieping Gao:
Packet Injection Attack and Its Defense in Software-Defined Networks. 695-705 - Nawaf Yousef Almudhahka, Mark S. Nixon, Jonathon S. Hare:
Semantic Face Signatures: Recognizing and Retrieving Faces by Verbal Descriptions. 706-716 - Xiaoke Zhu, Xiao-Yuan Jing, Xinge You, Wangmeng Zuo, Shiguang Shan, Wei-Shi Zheng:
Image to Video Person Re-Identification by Learning Heterogeneous Dictionary Pair With Feature Projection Matrix. 717-732 - Jun Wang, Guoqing Wang, Mei Zhou:
Bimodal Vein Data Mining via Cross-Selected-Domain Knowledge Transfer. 733-744 - Yongdong Wu, Binbin Chen, Zhigang Zhao, Yao Cheng:
Attack and Countermeasure on Interlock-Based Device Pairing Schemes. 745-757 - Mingxing Duan, Kenli Li, Keqin Li:
An Ensemble CNN2ELM for Age Estimation. 758-772 - Bahman Rashidi, Carol J. Fung, Anh Nguyen, Tam Vu, Elisa Bertino:
Android User Privacy Preserving Through Crowdsourcing. 773-787 - Jan Kohout, Tomás Pevný:
Network Traffic Fingerprinting Based on Approximated Kernel Two-Sample Test. 788-801 - Zi Li, Qingqi Pei, Ian D. Markwood, Yao Liu, Haojin Zhu:
Secret Key Establishment via RSS Trajectory Matching Between Wearable Devices. 802-817
Volume 13, Number 4, April 2018
- Mehdi Boroumand, Jessica J. Fridrich:
Applications of Explicit Non-Linear Feature Maps in Steganalysis. 823-833 - Kai Bu, Yingjiu Li:
Every Step You Take, I'll Be Watching You: Practical StepAuth-Entication of RFID Paths. 834-849 - Seyed Mohammad Hosseini, Amir Hossein Jahangir:
An Effective Payload Attribution Scheme for Cybercriminal Detection Using Compressed Bitmap Index Tables and Traffic Downsampling. 850-860 - Lei Tang, Wenxiong Kang, Yuxun Fang:
Information Divergence-Based Matching Strategy for Online Signature Verification. 861-873 - Pol Mac Aonghusa, Douglas J. Leith:
Plausible Deniability in Web Search - From Detection to Assessment. 874-887 - Hugo Proença, João C. Neves:
Deep-PRWIS: Periocular Recognition Without the Iris and Sclera Using Deep Learning Frameworks. 888-896 - Sadhana Jha, Shamik Sural, Vijayalakshmi Atluri, Jaideep Vaidya:
Specification and Verification of Separation of Duty Constraints in Attribute-Based Access Control. 897-911 - Jian Shen, Tianqi Zhou, Xiaofeng Chen, Jin Li, Willy Susilo:
Anonymous and Traceable Group Data Sharing in Cloud Computing. 912-925 - Zheng Chu, Huan Xuan Nguyen, Giuseppe Caire:
Game Theory-Based Resource Allocation for Secure WPCN Multiantenna Multicasting Systems. 926-939 - Meng Shen, Baoli Ma, Liehuang Zhu, Rashid Mijumbi, Xiaojiang Du, Jiankun Hu:
Cloud-Based Approximate Constrained Shortest Distance Queries Over Encrypted Graphs With Privacy Protection. 940-953 - André Schaller, Taras Stanko, Boris Skoric, Stefan Katzenbeisser:
Eliminating Leakage in Reverse Fuzzy Extractors. 954-964 - Yanxiong Li, Xue Zhang, Xianku Li, Yuhan Zhang, Ji-Chen Yang, Qianhua He:
Mobile Phone Clustering From Speech Recordings Using Deep Representation and Spectral Clustering. 965-977 - Wei-Che Wang, Yair Yona, Suhas N. Diggavi, Puneet Gupta:
Design and Analysis of Stability-Guaranteed PUFs. 978-992 - Linyuan Zhang, Guoru Ding, Qihui Wu, Zhu Han:
Spectrum Sensing Under Spectrum Misuse Behaviors: A Multi-Hypothesis Test Perspective. 993-1007 - Matteo Ferrara, Annalisa Franco, Davide Maltoni:
Face Demorphing. 1008-1017 - Zhiyong Su, Ying Ye, Qi Zhang, Weiqing Li, Yuewei Dai:
Robust 2D Engineering CAD Graphics Hashing for Joint Topology and Geometry Authentication via Covariance-Based Descriptors. 1018-1030 - Darren Hurley-Smith, Julio C. Hernandez-Castro:
Certifiably Biased: An In-Depth Analysis of a Common Criteria EAL4+ Certified TRNG. 1031-1041 - Hasini Gunasinghe, Elisa Bertino:
PrivBioMTAuth: Privacy Preserving Biometrics-Based and User Centric Protocol for User Authentication From Mobile Phones. 1042-1057 - Jiachun Liao, Lalitha Sankar, Vincent Y. F. Tan, Flávio du Pin Calmon:
Hypothesis Testing Under Mutual Information Privacy Constraints in the High Privacy Regime. 1058-1071
Volume 13, Number 5, May 2018
- Zhongliu Zhuo, Yang Zhang, Zhi-Li Zhang, Xiaosong Zhang, Jingzhong Zhang:
Website Fingerprinting Attack on Anonymity Networks Based on Profile Hidden Markov Model. 1081-1095 - Shanshan Wang, Qiben Yan, Zhenxiang Chen, Bo Yang, Chuan Zhao, Mauro Conti:
Detecting Android Malware Leveraging Text Semantics of Network Flows. 1096-1109 - Harjinder Singh Lallie, Kurt Debattista, Jay Bal:
An Empirical Evaluation of the Effectiveness of Attack Graphs and Fault Trees in Cyber-Attack Perception. 1110-1122 - Emanuele Maiorana, Patrizio Campisi:
Longitudinal Evaluation of EEG-Based Biometric Recognition. 1123-1138 - Alfonso Iacovazzi, Sanat Sarda, Daniel Frassinelli, Yuval Elovici:
DropWat: An Invisible Network Flow Watermark for Data Exfiltration Traceback. 1139-1154 - Jingyu Hua, Wei Tong, Fengyuan Xu, Sheng Zhong:
A Geo-Indistinguishable Location Perturbation Mechanism for Location-Based Services Supporting Frequent Queries. 1155-1168 - Wei Dai, Yarkin Doröz, Yuriy Polyakov, Kurt Rohloff, Hadi Sajjadpour, Erkay Savas, Berk Sunar:
Implementation and Evaluation of a Lattice-Based Key-Policy ABE Scheme. 1169-1184 - Suryadipta Majumdar, Taous Madi, Yushun Wang, Yosr Jarraya, Makan Pourzandi, Lingyu Wang, Mourad Debbabi:
User-Level Runtime Security Auditing for the Cloud. 1185-1199 - Jishen Zeng, Shunquan Tan, Bin Li, Jiwu Huang:
Large-Scale JPEG Image Steganalysis Using Hybrid Deep-Learning Framework. 1200-1214 - Juan Lopez Jr., Nathan C. Liefer, Colin R. Busho, Michael A. Temple:
Enhancing Critical Infrastructure and Key Resources (CIKR) Level-0 Physical Process Security Using Field Device Distinct Native Attribute Features. 1215-1229 - Yanqing Yao, Zhoujun Li:
Differential Privacy With Bias-Control Limited Sources. 1230-1241 - Bin Li, Zhongpeng Li, Shijun Zhou, Shunquan Tan, Xiaoling Zhang:
New Steganalytic Features for Spatial Image Steganography Based on Derivative Filters and Threshold LBP Operator. 1242-1257 - Eduardo José da S. Luz, Gladston J. P. Moreira, Luiz S. Oliveira, William Robson Schwartz, David Menotti:
Learning Deep Off-the-Person Heart Biometrics Representations. 1258-1270 - Chuntao Wang, Jiangqun Ni, Xinpeng Zhang, Qiong Huang:
Efficient Compression of Encrypted Binary Images Using the Markov Random Field. 1271-1285 - Jing Chen, Chiheng Wang, Ziming Zhao, Kai Chen, Ruiying Du, Gail-Joon Ahn:
Uncovering the Face of Android Ransomware: Characterization and Real-Time Detection. 1286-1300 - Weijia Wang, Yu Yu, François-Xavier Standaert, Junrong Liu, Zheng Guo, Dawu Gu:
Ridge-Based DPA: Improvement of Differential Power Analysis For Nanoscale Chips. 1301-1316 - Jun Yu, Zhenzhong Kuang, Baopeng Zhang, Wei Zhang, Dan Lin, Jianping Fan:
Leveraging Content Sensitiveness and User Trustworthiness to Recommend Fine-Grained Privacy Settings for Social Image Sharing. 1317-1332 - Le Trieu Phong, Yoshinori Aono, Takuya Hayashi, Lihua Wang, Shiho Moriai:
Privacy-Preserving Deep Learning via Additively Homomorphic Encryption. 1333-1345
Volume 13, Number 6, June 2018
- Haowei Wang, Xiaofeng Tao, Na Li, Zhu Han:
Polar Coding for the Wiretap Channel With Shared Key. 1351-1360 - Hussain M. J. Almohri, Layne T. Watson, David Evans:
Misery Digraphs: Delaying Intrusion Attacks in Obscure Clouds. 1361-1375 - Yongzhi Wang, Yulong Shen, Xiaohong Jiang:
Practical Verifiable Computation-A MapReduce Case Study. 1376-1391 - Pramuditha Perera, Vishal M. Patel:
Efficient and Low Latency Detection of Intruders in Mobile Active Authentication. 1392-1405 - Marta Gomez-Barrero, Javier Galbally, Christian Rathgeb, Christoph Busch:
General Framework to Evaluate Unlinkability in Biometric Template Protection Systems. 1406-1420 - Christian Galea, Reuben A. Farrugia:
Matching Software-Generated Sketches to Face Photographs With a Very Deep CNN, Morphed Faces, and Transfer Learning. 1421-1431 - Hao Wu, Wei Wang:
A Game Theory Based Collaborative Security Detection Method for Internet of Things Systems. 1432-1445 - Elizabeth Hou, Kumar Sricharan, Alfred O. Hero III:
Latent Laplacian Maximum Entropy Discrimination for Detection of High-Utility Anomalies. 1446-1459 - Baocang Wang, Yu Zhan, Zhili Zhang:
Cryptanalysis of a Symmetric Fully Homomorphic Encryption Scheme. 1460-1467 - Florian Wilde, Berndt M. Gammel, Michael Pehl:
Spatial Correlation Analysis on Physical Unclonable Functions. 1468-1480 - Carmen Campomanes-Álvarez, Rubén Martos-Fernández, Caroline M. Wilkinson, Óscar Ibáñez, Oscar Cordón:
Modeling Skull-Face Anatomical/Morphological Correspondence for Craniofacial Superimposition-Based Identification. 1481-1494 - Gábor Fodor, Peter Schelkens, Ann Dooms:
Fingerprinting Codes Under the Weak Marking Assumption. 1495-1508 - Xiushan Nie, Xiaoyu Li, Yane Chai, Chaoran Cui, Xiaoming Xi, Yilong Yin:
Robust Image Fingerprinting Based on Feature Point Relationship Mining. 1509-1523 - Xiaofan He, Richeng Jin, Huaiyu Dai:
Leveraging Spatial Diversity for Privacy-Aware Location-Based Services in Mobile Networks. 1524-1534 - Jinku Li, Xiaomeng Tong, Fengwei Zhang, Jianfeng Ma:
Fine-CFI: Fine-Grained Control-Flow Integrity for Operating System Kernels. 1535-1550 - AmirEmad Ghassami, Negar Kiyavash:
A Covert Queueing Channel in FCFS Schedulers. 1551-1563