


Остановите войну!
for scientists:


default search action
IEEE Transactions on Information Forensics and Security, Volume 13
Volume 13, Number 1, January 2018
- Patrizio Campisi:
Editorial. 5 - Anh Truong
, S. Rasoul Etesami, Jalal Etesami
, Negar Kiyavash:
Optimal Attack Strategies Against Predictors - Learning From Expert Advice. 6-19 - Tarang Chugh, Kai Cao
, Jiayu Zhou, Elham Tabassi, Anil K. Jain:
Latent Fingerprint Value Prediction: Crowd-Based Learning. 20-34 - Liang Xiao
, Yanda Li, Guoan Han, Huaiyu Dai, H. Vincent Poor
:
A Secure Mobile Crowdsensing Game With Deep Reinforcement Learning. 35-47 - Chao Shen
, Yuanxun Li, Yufei Chen
, Xiaohong Guan, Roy A. Maxion:
Performance Analysis of Multi-Motion Sensor Behavior for Active Smartphone Authentication. 48-62 - Vincent F. Taylor
, Riccardo Spolaor
, Mauro Conti, Ivan Martinovic:
Robust Smartphone App Identification via Encrypted Network Traffic Analysis. 63-78 - Sandhya Koteshwara
, Chris H. Kim, Keshab K. Parhi
:
Key-Based Dynamic Functional Obfuscation of Integrated Circuits Using Sequentially Triggered Mode-Based Design. 79-93 - Jianting Ning
, Zhenfu Cao
, Xiaolei Dong, Kaitai Liang
, Hui Ma, Lifei Wei:
Auditable σ-Time Outsourced Attribute-Based Encryption for Access Control in Cloud Computing. 94-105 - Jiangshan Yu, Mark Ryan
, Cas Cremers:
DECIM: Detecting Endpoint Compromise In Messaging. 106-118 - Nirattaya Khamsemanan, Cholwich Nattee
, Nitchan Jianwattanapaisarn:
Human Identification From Freestyle Walks Using Posture-Based Gait Feature. 119-128 - Giulio Giaconi
, Deniz Gündüz
, H. Vincent Poor
:
Smart Meter Privacy With Renewable Energy and an Energy Storage Device. 129-142 - João Sá Sousa
, João P. Vilela:
Uncoordinated Frequency Hopping for Wireless Secrecy Against Non-Degraded Eavesdroppers. 143-155 - Shan Gu, Jianjiang Feng
, Jiwen Lu
, Jie Zhou:
Efficient Rectification of Distorted Fingerprints. 156-169 - Xinghao Jiang, Peisong He
, Tanfeng Sun
, Feng Xie, Shilin Wang
:
Detection of Double Compression With the Same Coding Parameters Based on Quality Degradation Mechanism Analysis. 170-185 - Cong Zuo
, Jun Shao, Joseph K. Liu
, Guiyi Wei, Yun Ling:
Fine-Grained Two-Factor Protection Mechanism for Data Sharing in Cloud Storage. 186-196 - He Fang, Li Xu, Xianbin Wang
:
Coordinated Multiple-Relays Based Physical-Layer Security Improvement: A Single-Leader Multiple-Followers Stackelberg Game Scheme. 197-209 - Tan Tai Do
, Emil Björnson
, Erik G. Larsson, Seyed Mohammad Razavizadeh
:
Jamming-Resistant Receivers for the Massive MIMO Uplink. 210-223 - Te Sun Han, Hiroyuki Endo
, Masahide Sasaki:
Wiretap Channels With One-Time State Information: Strong Secrecy. 224-236 - Alessio Zappone
, Pin-Hsun Lin, Eduard A. Jorswieck:
Optimal Energy-Efficient Design of Confidential Multiple-Antenna Systems. 237-252 - Chris G. Zeinstra
, Raymond N. J. Veldhuis, Luuk J. Spreeuwers:
Grid-Based Likelihood Ratio Classifiers for the Comparison of Facial Marks. 253-264
Volume 13, Number 2, February 2018
- Wei Wang
, Kah Chan Teh
, Kwok Hung Li
, Sheng Luo:
On the Impact of Adaptive Eavesdroppers in Multi-Antenna Cellular Networks. 269-279 - Wouter Biesmans, Josep Balasch, Alfredo Rial
, Bart Preneel
, Ingrid Verbauwhede
:
Private Mobile Pay-TV From Priced Oblivious Transfer. 280-291 - Hao Liu, Jiwen Lu
, Jianjiang Feng
, Jie Zhou:
Label-Sensitive Deep Metric Learning for Facial Age Estimation. 292-305 - Dong-Hua Chen
, Yu-Cheng He, Xiaodan Lin, Rui Zhao:
Both Worst-Case and Chance-Constrained Robust Secure SWIPT in MISO Interference Channels. 306-317 - Weichen Xiang
, Martin Johnston, Stéphane Y. Le Goff:
Low-Complexity Power Control and Energy Harvesting Algorithms for Wiretap Channels Employing Finite-Alphabet Input Schemes. 318-326 - Mauro Mangia
, Fabio Pareschi
, Riccardo Rovatti, Gianluca Setti
:
Low-Cost Security of IoT Sensor Nodes With Rakeness-Based Compressed Sensing: Statistical and Known-Plaintext Attacks. 327-340 - Ali Kuhestani
, Abbas Mohammadi
, Mohammadali Mohammadi
:
Joint Relay Selection and Power Allocation in Large-Scale MIMO Systems With Untrusted Relays and Passive Eavesdroppers. 341-355 - Manami Sasaki, Yodai Watanabe
:
Visual Secret Sharing Schemes Encrypting Multiple Images. 356-365 - Lei Xu
, Arumugam Nallanathan
, Xiaofei Pan, Jian Yang, Wenhe Liao:
Security-Aware Resource Allocation With Delay Constraint for NOMA-Based Cognitive Radio Network. 366-376 - Bo Peng
, Wei Wang
, Jing Dong, Tieniu Tan:
Image Forensics Based on Planar Contact Constraints of 3D Objects. 377-392 - Zhe Jin
, Jung Yeon Hwang, Yen-Lung Lai, Soohyung Kim, Andrew Beng Jin Teoh
:
Ranking-Based Locality Sensitive Hashing-Enabled Cancelable Biometrics: Index-of-Max Hashing. 393-407 - Jianhua Liu
, Jiadi Yu, Shigen Shen
:
Energy-Efficient Two-Layer Cooperative Defense Scheme to Secure Sensor-Clouds. 408-420 - Lingxiang Li
, Zhi Chen, Athina P. Petropulu, Jun Fang:
Linear Precoder Design for an MIMO Gaussian Wiretap Channel With Full-Duplex Source and Destination Nodes. 421-436 - Jeeson Kim
, Taimur Ahmed
, Hussein Nili
, Jiawei Yang, Doo Seok Jeong, Paul Beckett, Sharath Sriram
, Damith Chinthana Ranasinghe, Omid Kavehei
:
A Physical Unclonable Function With Redox-Based Nanoionic Resistive Memory. 437-448 - Ruei-Hau Hsu, Jemin Lee
, Tony Q. S. Quek, Jyh-Cheng Chen:
GRAAD: Group Anonymous and Accountable D2D Communication in Mobile Networks. 449-464 - Xinwei Qiu
, Wenxiong Kang
, Senping Tian, Wei Jia, Zhixing Huang:
Finger Vein Presentation Attack Detection Using Total Variation Decomposition. 465-477 - Sina Lashgari
, Amir Salman Avestimehr:
Secrecy DoF of Blind MIMOME Wiretap Channel With Delayed CSIT. 478-489 - Marios O. Choudary
, Markus G. Kuhn
:
Efficient, Portable Template Attacks. 490-501 - Zahra Ahmadian
, Sadegh Jamshidpour:
Linear Subspace Cryptanalysis of Harn's Secret Sharing-Based Group Authentication Scheme. 502-510 - Meixia Miao, Jianfeng Ma, Xinyi Huang, Qian Wang
:
Efficient Verifiable Databases With Insertion/Deletion Operations From Delegating Polynomial Functions. 511-520 - Patrick P. K. Chan, Weiwen Liu, Danni Chen, Daniel S. Yeung, Fei Zhang
, Xizhao Wang, Chien-Chang Hsu
:
Face Liveness Detection Using a Flash Against 2D Spoofing Attack. 521-534
Volume 13, Number 3, March 2018
- Shukun Yang
, Shouling Ji
, Raheem A. Beyah
:
DPPG: A Dynamic Password Policy Generation System. 545-558 - Chenxu Wang
, TungNgai Miu, Xiapu Luo
, Jinhe Wang:
SkyShield: A Sketch-Based Defense System Against Application Layer DDoS Attacks. 559-573 - Jun Du, Chunxiao Jiang
, Kwang-Cheng Chen, Yong Ren, H. Vincent Poor
:
Community-Structured Evolutionary Game for Privacy Protection in Social Networks. 574-589 - Marc Sánchez Artigas
:
Enhancing Tree-Based ORAM Using Batched Request Reordering. 590-604 - Baki Berkay Yilmaz, Robert Locke Callan, Milos Prvulovic, Alenka G. Zajic
:
Capacity of the EM Covert/Side-Channel Created by the Execution of Instructions in a Processor. 605-620 - Muhamad Erza Aminanto
, Rakyong Choi, Harry Chandra Tanuwidjaja, Paul D. Yoo
, Kwangjo Kim:
Deep Abstraction and Weighted Feature Selection for Wi-Fi Impersonation Detection. 621-636 - Shu Zhang, Ran He, Zhenan Sun, Tieniu Tan:
DeMeshNet: Blind Face Inpainting for Deep MeshFace Verification. 637-647 - Takashi Nakamura
, Valentin Goverdovsky, Danilo P. Mandic
:
In-Ear EEG Biometrics for Feasible and Readily Collectable Real-World Person Authentication. 648-661 - Hao Dong, Chao Wu
, Zhen Wei, Yike Guo:
Dropping Activation Outputs With Localized First-Layer Deep Network for Enhancing User Privacy and Data Security. 662-670 - Jingran Lin, Qiang Li, Jintai Yang, Huaizong Shao, Wen-Qin Wang:
Physical-Layer Security for Proximal Legitimate User and Eavesdropper: A Frequency Diverse Array Beamforming Approach. 671-684 - Vaishakh Ravindrakumar, Parthasarathi Panda, Nikhil Karamchandani
, Vinod M. Prabhakaran:
Private Coded Caching. 685-694 - Shuhua Deng
, Xing Gao, Zebin Lu, Xieping Gao
:
Packet Injection Attack and Its Defense in Software-Defined Networks. 695-705 - Nawaf Yousef Almudhahka
, Mark S. Nixon
, Jonathon S. Hare:
Semantic Face Signatures: Recognizing and Retrieving Faces by Verbal Descriptions. 706-716 - Xiaoke Zhu, Xiao-Yuan Jing
, Xinge You, Wangmeng Zuo, Shiguang Shan
, Wei-Shi Zheng:
Image to Video Person Re-Identification by Learning Heterogeneous Dictionary Pair With Feature Projection Matrix. 717-732 - Jun Wang, Guoqing Wang
, Mei Zhou:
Bimodal Vein Data Mining via Cross-Selected-Domain Knowledge Transfer. 733-744 - Yongdong Wu
, Binbin Chen
, Zhigang Zhao, Yao Cheng:
Attack and Countermeasure on Interlock-Based Device Pairing Schemes. 745-757 - Mingxing Duan
, Kenli Li, Keqin Li:
An Ensemble CNN2ELM for Age Estimation. 758-772 - Bahman Rashidi
, Carol J. Fung, Anh Nguyen, Tam Vu, Elisa Bertino:
Android User Privacy Preserving Through Crowdsourcing. 773-787 - Jan Kohout
, Tomás Pevný
:
Network Traffic Fingerprinting Based on Approximated Kernel Two-Sample Test. 788-801 - Zi Li
, Qingqi Pei, Ian D. Markwood, Yao Liu, Haojin Zhu
:
Secret Key Establishment via RSS Trajectory Matching Between Wearable Devices. 802-817
Volume 13, Number 4, April 2018
- Mehdi Boroumand
, Jessica J. Fridrich:
Applications of Explicit Non-Linear Feature Maps in Steganalysis. 823-833 - Kai Bu
, Yingjiu Li:
Every Step You Take, I'll Be Watching You: Practical StepAuth-Entication of RFID Paths. 834-849 - Seyed Mohammad Hosseini
, Amir Hossein Jahangir
:
An Effective Payload Attribution Scheme for Cybercriminal Detection Using Compressed Bitmap Index Tables and Traffic Downsampling. 850-860 - Lei Tang, Wenxiong Kang
, Yuxun Fang:
Information Divergence-Based Matching Strategy for Online Signature Verification. 861-873 - Pol Mac Aonghusa
, Douglas J. Leith
:
Plausible Deniability in Web Search - From Detection to Assessment. 874-887 - Hugo Proença
, João C. Neves
:
Deep-PRWIS: Periocular Recognition Without the Iris and Sclera Using Deep Learning Frameworks. 888-896 - Sadhana Jha, Shamik Sural
, Vijayalakshmi Atluri
, Jaideep Vaidya
:
Specification and Verification of Separation of Duty Constraints in Attribute-Based Access Control. 897-911 - Jian Shen
, Tianqi Zhou, Xiaofeng Chen
, Jin Li, Willy Susilo
:
Anonymous and Traceable Group Data Sharing in Cloud Computing. 912-925 - Zheng Chu
, Huan Xuan Nguyen
, Giuseppe Caire
:
Game Theory-Based Resource Allocation for Secure WPCN Multiantenna Multicasting Systems. 926-939 - Meng Shen
, Baoli Ma
, Liehuang Zhu
, Rashid Mijumbi
, Xiaojiang Du, Jiankun Hu
:
Cloud-Based Approximate Constrained Shortest Distance Queries Over Encrypted Graphs With Privacy Protection. 940-953 - André Schaller
, Taras Stanko, Boris Skoric
, Stefan Katzenbeisser:
Eliminating Leakage in Reverse Fuzzy Extractors. 954-964 - Yanxiong Li
, Xue Zhang, Xianku Li, Yuhan Zhang, Ji-Chen Yang, Qianhua He:
Mobile Phone Clustering From Speech Recordings Using Deep Representation and Spectral Clustering. 965-977 - Wei-Che Wang
, Yair Yona
, Suhas N. Diggavi, Puneet Gupta
:
Design and Analysis of Stability-Guaranteed PUFs. 978-992 - Linyuan Zhang, Guoru Ding
, Qihui Wu, Zhu Han:
Spectrum Sensing Under Spectrum Misuse Behaviors: A Multi-Hypothesis Test Perspective. 993-1007 - Matteo Ferrara
, Annalisa Franco, Davide Maltoni
:
Face Demorphing. 1008-1017 - Zhiyong Su
, Ying Ye, Qi Zhang, Weiqing Li, Yuewei Dai:
Robust 2D Engineering CAD Graphics Hashing for Joint Topology and Geometry Authentication via Covariance-Based Descriptors. 1018-1030 - Darren Hurley-Smith
, Julio Hernandez-Castro:
Certifiably Biased: An In-Depth Analysis of a Common Criteria EAL4+ Certified TRNG. 1031-1041 - Hasini Gunasinghe
, Elisa Bertino
:
PrivBioMTAuth: Privacy Preserving Biometrics-Based and User Centric Protocol for User Authentication From Mobile Phones. 1042-1057 - Jiachun Liao
, Lalitha Sankar
, Vincent Y. F. Tan
, Flávio du Pin Calmon
:
Hypothesis Testing Under Mutual Information Privacy Constraints in the High Privacy Regime. 1058-1071
Volume 13, Number 5, May 2018
- Zhongliu Zhuo
, Yang Zhang
, Zhi-Li Zhang, Xiaosong Zhang, Jingzhong Zhang:
Website Fingerprinting Attack on Anonymity Networks Based on Profile Hidden Markov Model. 1081-1095 - Shanshan Wang, Qiben Yan
, Zhenxiang Chen
, Bo Yang
, Chuan Zhao, Mauro Conti
:
Detecting Android Malware Leveraging Text Semantics of Network Flows. 1096-1109 - Harjinder Singh Lallie
, Kurt Debattista
, Jay Bal:
An Empirical Evaluation of the Effectiveness of Attack Graphs and Fault Trees in Cyber-Attack Perception. 1110-1122 - Emanuele Maiorana
, Patrizio Campisi
:
Longitudinal Evaluation of EEG-Based Biometric Recognition. 1123-1138 - Alfonso Iacovazzi
, Sanat Sarda
, Daniel Frassinelli, Yuval Elovici:
DropWat: An Invisible Network Flow Watermark for Data Exfiltration Traceback. 1139-1154 - Jingyu Hua
, Wei Tong
, Fengyuan Xu, Sheng Zhong:
A Geo-Indistinguishable Location Perturbation Mechanism for Location-Based Services Supporting Frequent Queries. 1155-1168 - Wei Dai, Yarkin Doröz, Yuriy Polyakov
, Kurt Rohloff
, Hadi Sajjadpour
, Erkay Savas
, Berk Sunar:
Implementation and Evaluation of a Lattice-Based Key-Policy ABE Scheme. 1169-1184 - Suryadipta Majumdar
, Taous Madi, Yushun Wang, Yosr Jarraya, Makan Pourzandi, Lingyu Wang, Mourad Debbabi:
User-Level Runtime Security Auditing for the Cloud. 1185-1199 - Jishen Zeng
, Shunquan Tan
, Bin Li, Jiwu Huang
:
Large-Scale JPEG Image Steganalysis Using Hybrid Deep-Learning Framework. 1200-1214 - Juan Lopez Jr.
, Nathan C. Liefer, Colin R. Busho, Michael A. Temple
:
Enhancing Critical Infrastructure and Key Resources (CIKR) Level-0 Physical Process Security Using Field Device Distinct Native Attribute Features. 1215-1229 - Yanqing Yao
, Zhoujun Li
:
Differential Privacy With Bias-Control Limited Sources. 1230-1241 - Bin Li
, Zhongpeng Li, Shijun Zhou, Shunquan Tan
, Xiaoling Zhang:
New Steganalytic Features for Spatial Image Steganography Based on Derivative Filters and Threshold LBP Operator. 1242-1257 - Eduardo José da S. Luz
, Gladston J. P. Moreira
, Luiz S. Oliveira, William Robson Schwartz
, David Menotti
:
Learning Deep Off-the-Person Heart Biometrics Representations. 1258-1270 - Chuntao Wang
, Jiangqun Ni
, Xinpeng Zhang
, Qiong Huang:
Efficient Compression of Encrypted Binary Images Using the Markov Random Field. 1271-1285 - Jing Chen
, Chiheng Wang
, Ziming Zhao, Kai Chen
, Ruiying Du, Gail-Joon Ahn
:
Uncovering the Face of Android Ransomware: Characterization and Real-Time Detection. 1286-1300 - Weijia Wang
, Yu Yu
, François-Xavier Standaert
, Junrong Liu, Zheng Guo, Dawu Gu:
Ridge-Based DPA: Improvement of Differential Power Analysis For Nanoscale Chips. 1301-1316 - Jun Yu, Zhenzhong Kuang
, Baopeng Zhang
, Wei Zhang, Dan Lin
, Jianping Fan
:
Leveraging Content Sensitiveness and User Trustworthiness to Recommend Fine-Grained Privacy Settings for Social Image Sharing. 1317-1332 - Le Trieu Phong
, Yoshinori Aono, Takuya Hayashi
, Lihua Wang
, Shiho Moriai:
Privacy-Preserving Deep Learning via Additively Homomorphic Encryption. 1333-1345
Volume 13, Number 6, June 2018
- Haowei Wang
, Xiaofeng Tao
, Na Li, Zhu Han:
Polar Coding for the Wiretap Channel With Shared Key. 1351-1360 - Hussain M. J. Almohri
, Layne T. Watson, David Evans:
Misery Digraphs: Delaying Intrusion Attacks in Obscure Clouds. 1361-1375 - Yongzhi Wang
, Yulong Shen, Xiaohong Jiang
:
Practical Verifiable Computation-A MapReduce Case Study. 1376-1391 - Pramuditha Perera
, Vishal M. Patel
:
Efficient and Low Latency Detection of Intruders in Mobile Active Authentication. 1392-1405 - Marta Gomez-Barrero
, Javier Galbally
, Christian Rathgeb, Christoph Busch
:
General Framework to Evaluate Unlinkability in Biometric Template Protection Systems. 1406-1420 - Christian Galea
, Reuben A. Farrugia
:
Matching Software-Generated Sketches to Face Photographs With a Very Deep CNN, Morphed Faces, and Transfer Learning. 1421-1431 - Hao Wu
, Wei Wang
:
A Game Theory Based Collaborative Security Detection Method for Internet of Things Systems. 1432-1445 - Elizabeth Hou
, Kumar Sricharan, Alfred O. Hero III:
Latent Laplacian Maximum Entropy Discrimination for Detection of High-Utility Anomalies. 1446-1459 - Baocang Wang
, Yu Zhan, Zhili Zhang
:
Cryptanalysis of a Symmetric Fully Homomorphic Encryption Scheme. 1460-1467 - Florian Wilde
, Berndt M. Gammel
, Michael Pehl
:
Spatial Correlation Analysis on Physical Unclonable Functions. 1468-1480 - Carmen Campomanes-Álvarez
, Rubén Martos-Fernández
, Caroline Wilkinson
, Óscar Ibáñez
, Oscar Cordón
:
Modeling Skull-Face Anatomical/Morphological Correspondence for Craniofacial Superimposition-Based Identification. 1481-1494 - Gábor Fodor
, Peter Schelkens
, Ann Dooms
:
Fingerprinting Codes Under the Weak Marking Assumption. 1495-1508 - Xiushan Nie
, Xiaoyu Li, Yane Chai
, Chaoran Cui, Xiaoming Xi
, Yilong Yin:
Robust Image Fingerprinting Based on Feature Point Relationship Mining. 1509-1523 - Xiaofan He
, Richeng Jin, Huaiyu Dai:
Leveraging Spatial Diversity for Privacy-Aware Location-Based Services in Mobile Networks. 1524-1534 - Jinku Li
, Xiaomeng Tong
, Fengwei Zhang
, Jianfeng Ma:
Fine-CFI: Fine-Grained Control-Flow Integrity for Operating System Kernels. 1535-1550 - AmirEmad Ghassami
, Negar Kiyavash:
A Covert Queueing Channel in FCFS Schedulers. 1551-1563 - Joshua J. Engelsma
, Sunpreet S. Arora, Anil K. Jain
, Nicholas G. Paulter:
Universal 3D Wearable Fingerprint Targets: Advancing Fingerprint Reader Evaluations. 1564-1578