


default search action
IEEE Transactions on Information Forensics and Security, Volume 13
Volume 13, Number 1, January 2018
- Patrizio Campisi:

Editorial. 5 - Anh Truong

, S. Rasoul Etesami, Jalal Etesami
, Negar Kiyavash:
Optimal Attack Strategies Against Predictors - Learning From Expert Advice. 6-19 - Tarang Chugh, Kai Cao

, Jiayu Zhou, Elham Tabassi, Anil K. Jain:
Latent Fingerprint Value Prediction: Crowd-Based Learning. 20-34 - Liang Xiao

, Yanda Li, Guoan Han, Huaiyu Dai, H. Vincent Poor
:
A Secure Mobile Crowdsensing Game With Deep Reinforcement Learning. 35-47 - Chao Shen

, Yuanxun Li, Yufei Chen
, Xiaohong Guan, Roy A. Maxion:
Performance Analysis of Multi-Motion Sensor Behavior for Active Smartphone Authentication. 48-62 - Vincent F. Taylor

, Riccardo Spolaor
, Mauro Conti
, Ivan Martinovic:
Robust Smartphone App Identification via Encrypted Network Traffic Analysis. 63-78 - Sandhya Koteshwara

, Chris H. Kim, Keshab K. Parhi
:
Key-Based Dynamic Functional Obfuscation of Integrated Circuits Using Sequentially Triggered Mode-Based Design. 79-93 - Jianting Ning

, Zhenfu Cao
, Xiaolei Dong, Kaitai Liang
, Hui Ma, Lifei Wei:
Auditable σ-Time Outsourced Attribute-Based Encryption for Access Control in Cloud Computing. 94-105 - Jiangshan Yu

, Mark Ryan
, Cas Cremers:
DECIM: Detecting Endpoint Compromise In Messaging. 106-118 - Nirattaya Khamsemanan, Cholwich Nattee

, Nitchan Jianwattanapaisarn:
Human Identification From Freestyle Walks Using Posture-Based Gait Feature. 119-128 - Giulio Giaconi

, Deniz Gündüz
, H. Vincent Poor
:
Smart Meter Privacy With Renewable Energy and an Energy Storage Device. 129-142 - João Sá Sousa

, João P. Vilela:
Uncoordinated Frequency Hopping for Wireless Secrecy Against Non-Degraded Eavesdroppers. 143-155 - Shan Gu, Jianjiang Feng

, Jiwen Lu
, Jie Zhou:
Efficient Rectification of Distorted Fingerprints. 156-169 - Xinghao Jiang, Peisong He

, Tanfeng Sun
, Feng Xie, Shilin Wang
:
Detection of Double Compression With the Same Coding Parameters Based on Quality Degradation Mechanism Analysis. 170-185 - Cong Zuo

, Jun Shao, Joseph K. Liu
, Guiyi Wei, Yun Ling:
Fine-Grained Two-Factor Protection Mechanism for Data Sharing in Cloud Storage. 186-196 - He Fang, Li Xu, Xianbin Wang

:
Coordinated Multiple-Relays Based Physical-Layer Security Improvement: A Single-Leader Multiple-Followers Stackelberg Game Scheme. 197-209 - Tan Tai Do

, Emil Björnson
, Erik G. Larsson, Seyed Mohammad Razavizadeh
:
Jamming-Resistant Receivers for the Massive MIMO Uplink. 210-223 - Te Sun Han, Hiroyuki Endo

, Masahide Sasaki:
Wiretap Channels With One-Time State Information: Strong Secrecy. 224-236 - Alessio Zappone

, Pin-Hsun Lin, Eduard A. Jorswieck:
Optimal Energy-Efficient Design of Confidential Multiple-Antenna Systems. 237-252 - Chris G. Zeinstra

, Raymond N. J. Veldhuis, Luuk J. Spreeuwers
:
Grid-Based Likelihood Ratio Classifiers for the Comparison of Facial Marks. 253-264
Volume 13, Number 2, February 2018
- Wei Wang

, Kah Chan Teh
, Kwok Hung Li
, Sheng Luo:
On the Impact of Adaptive Eavesdroppers in Multi-Antenna Cellular Networks. 269-279 - Wouter Biesmans, Josep Balasch

, Alfredo Rial
, Bart Preneel
, Ingrid Verbauwhede
:
Private Mobile Pay-TV From Priced Oblivious Transfer. 280-291 - Hao Liu, Jiwen Lu

, Jianjiang Feng
, Jie Zhou:
Label-Sensitive Deep Metric Learning for Facial Age Estimation. 292-305 - Dong-Hua Chen

, Yu-Cheng He
, Xiaodan Lin, Rui Zhao:
Both Worst-Case and Chance-Constrained Robust Secure SWIPT in MISO Interference Channels. 306-317 - Weichen Xiang

, Martin Johnston, Stéphane Y. Le Goff:
Low-Complexity Power Control and Energy Harvesting Algorithms for Wiretap Channels Employing Finite-Alphabet Input Schemes. 318-326 - Mauro Mangia

, Fabio Pareschi
, Riccardo Rovatti, Gianluca Setti
:
Low-Cost Security of IoT Sensor Nodes With Rakeness-Based Compressed Sensing: Statistical and Known-Plaintext Attacks. 327-340 - Ali Kuhestani

, Abbas Mohammadi
, Mohammadali Mohammadi
:
Joint Relay Selection and Power Allocation in Large-Scale MIMO Systems With Untrusted Relays and Passive Eavesdroppers. 341-355 - Manami Sasaki, Yodai Watanabe

:
Visual Secret Sharing Schemes Encrypting Multiple Images. 356-365 - Lei Xu

, Arumugam Nallanathan
, Xiaofei Pan, Jian Yang, Wenhe Liao:
Security-Aware Resource Allocation With Delay Constraint for NOMA-Based Cognitive Radio Network. 366-376 - Bo Peng

, Wei Wang
, Jing Dong, Tieniu Tan:
Image Forensics Based on Planar Contact Constraints of 3D Objects. 377-392 - Zhe Jin

, Jung Yeon Hwang, Yen-Lung Lai, Soohyung Kim, Andrew Beng Jin Teoh
:
Ranking-Based Locality Sensitive Hashing-Enabled Cancelable Biometrics: Index-of-Max Hashing. 393-407 - Jianhua Liu

, Jiadi Yu, Shigen Shen
:
Energy-Efficient Two-Layer Cooperative Defense Scheme to Secure Sensor-Clouds. 408-420 - Lingxiang Li

, Zhi Chen, Athina P. Petropulu, Jun Fang
:
Linear Precoder Design for an MIMO Gaussian Wiretap Channel With Full-Duplex Source and Destination Nodes. 421-436 - Jeeson Kim

, Taimur Ahmed
, Hussein Nili
, Jiawei Yang
, Doo Seok Jeong, Paul Beckett
, Sharath Sriram
, Damith Chinthana Ranasinghe, Omid Kavehei
:
A Physical Unclonable Function With Redox-Based Nanoionic Resistive Memory. 437-448 - Ruei-Hau Hsu, Jemin Lee

, Tony Q. S. Quek
, Jyh-Cheng Chen:
GRAAD: Group Anonymous and Accountable D2D Communication in Mobile Networks. 449-464 - Xinwei Qiu

, Wenxiong Kang
, Senping Tian, Wei Jia, Zhixing Huang:
Finger Vein Presentation Attack Detection Using Total Variation Decomposition. 465-477 - Sina Lashgari

, Amir Salman Avestimehr:
Secrecy DoF of Blind MIMOME Wiretap Channel With Delayed CSIT. 478-489 - Marios O. Choudary

, Markus G. Kuhn
:
Efficient, Portable Template Attacks. 490-501 - Zahra Ahmadian

, Sadegh Jamshidpour:
Linear Subspace Cryptanalysis of Harn's Secret Sharing-Based Group Authentication Scheme. 502-510 - Meixia Miao, Jianfeng Ma, Xinyi Huang, Qian Wang

:
Efficient Verifiable Databases With Insertion/Deletion Operations From Delegating Polynomial Functions. 511-520 - Patrick P. K. Chan, Weiwen Liu

, Danni Chen, Daniel S. Yeung, Fei Zhang
, Xizhao Wang, Chien-Chang Hsu
:
Face Liveness Detection Using a Flash Against 2D Spoofing Attack. 521-534
Volume 13, Number 3, March 2018
- Shukun Yang

, Shouling Ji
, Raheem A. Beyah
:
DPPG: A Dynamic Password Policy Generation System. 545-558 - Chenxu Wang

, TungNgai Miu, Xiapu Luo
, Jinhe Wang:
SkyShield: A Sketch-Based Defense System Against Application Layer DDoS Attacks. 559-573 - Jun Du, Chunxiao Jiang

, Kwang-Cheng Chen
, Yong Ren, H. Vincent Poor
:
Community-Structured Evolutionary Game for Privacy Protection in Social Networks. 574-589 - Marc Sánchez Artigas

:
Enhancing Tree-Based ORAM Using Batched Request Reordering. 590-604 - Baki Berkay Yilmaz, Robert Locke Callan, Milos Prvulovic, Alenka G. Zajic

:
Capacity of the EM Covert/Side-Channel Created by the Execution of Instructions in a Processor. 605-620 - Muhamad Erza Aminanto

, Rakyong Choi, Harry Chandra Tanuwidjaja, Paul D. Yoo
, Kwangjo Kim:
Deep Abstraction and Weighted Feature Selection for Wi-Fi Impersonation Detection. 621-636 - Shu Zhang, Ran He, Zhenan Sun, Tieniu Tan:

DeMeshNet: Blind Face Inpainting for Deep MeshFace Verification. 637-647 - Takashi Nakamura

, Valentin Goverdovsky, Danilo P. Mandic
:
In-Ear EEG Biometrics for Feasible and Readily Collectable Real-World Person Authentication. 648-661 - Hao Dong, Chao Wu

, Zhen Wei, Yike Guo
:
Dropping Activation Outputs With Localized First-Layer Deep Network for Enhancing User Privacy and Data Security. 662-670 - Jingran Lin, Qiang Li, Jintai Yang, Huaizong Shao, Wen-Qin Wang:

Physical-Layer Security for Proximal Legitimate User and Eavesdropper: A Frequency Diverse Array Beamforming Approach. 671-684 - Vaishakh Ravindrakumar, Parthasarathi Panda, Nikhil Karamchandani

, Vinod M. Prabhakaran:
Private Coded Caching. 685-694 - Shuhua Deng

, Xing Gao, Zebin Lu, Xieping Gao
:
Packet Injection Attack and Its Defense in Software-Defined Networks. 695-705 - Nawaf Yousef Almudhahka

, Mark S. Nixon
, Jonathon S. Hare:
Semantic Face Signatures: Recognizing and Retrieving Faces by Verbal Descriptions. 706-716 - Xiaoke Zhu, Xiao-Yuan Jing

, Xinge You, Wangmeng Zuo, Shiguang Shan
, Wei-Shi Zheng:
Image to Video Person Re-Identification by Learning Heterogeneous Dictionary Pair With Feature Projection Matrix. 717-732 - Jun Wang, Guoqing Wang

, Mei Zhou:
Bimodal Vein Data Mining via Cross-Selected-Domain Knowledge Transfer. 733-744 - Yongdong Wu

, Binbin Chen
, Zhigang Zhao, Yao Cheng:
Attack and Countermeasure on Interlock-Based Device Pairing Schemes. 745-757 - Mingxing Duan

, Kenli Li, Keqin Li:
An Ensemble CNN2ELM for Age Estimation. 758-772 - Bahman Rashidi

, Carol J. Fung, Anh Nguyen, Tam Vu, Elisa Bertino:
Android User Privacy Preserving Through Crowdsourcing. 773-787 - Jan Kohout

, Tomás Pevný
:
Network Traffic Fingerprinting Based on Approximated Kernel Two-Sample Test. 788-801 - Zi Li

, Qingqi Pei, Ian D. Markwood, Yao Liu, Haojin Zhu
:
Secret Key Establishment via RSS Trajectory Matching Between Wearable Devices. 802-817
Volume 13, Number 4, April 2018
- Mehdi Boroumand

, Jessica J. Fridrich:
Applications of Explicit Non-Linear Feature Maps in Steganalysis. 823-833 - Kai Bu

, Yingjiu Li:
Every Step You Take, I'll Be Watching You: Practical StepAuth-Entication of RFID Paths. 834-849 - Seyed Mohammad Hosseini

, Amir Hossein Jahangir
:
An Effective Payload Attribution Scheme for Cybercriminal Detection Using Compressed Bitmap Index Tables and Traffic Downsampling. 850-860 - Lei Tang, Wenxiong Kang

, Yuxun Fang:
Information Divergence-Based Matching Strategy for Online Signature Verification. 861-873 - Pol Mac Aonghusa

, Douglas J. Leith
:
Plausible Deniability in Web Search - From Detection to Assessment. 874-887 - Hugo Proença

, João C. Neves
:
Deep-PRWIS: Periocular Recognition Without the Iris and Sclera Using Deep Learning Frameworks. 888-896 - Sadhana Jha, Shamik Sural

, Vijayalakshmi Atluri
, Jaideep Vaidya
:
Specification and Verification of Separation of Duty Constraints in Attribute-Based Access Control. 897-911 - Jian Shen

, Tianqi Zhou, Xiaofeng Chen
, Jin Li, Willy Susilo
:
Anonymous and Traceable Group Data Sharing in Cloud Computing. 912-925 - Zheng Chu

, Huan Xuan Nguyen
, Giuseppe Caire
:
Game Theory-Based Resource Allocation for Secure WPCN Multiantenna Multicasting Systems. 926-939 - Meng Shen

, Baoli Ma
, Liehuang Zhu
, Rashid Mijumbi
, Xiaojiang Du, Jiankun Hu
:
Cloud-Based Approximate Constrained Shortest Distance Queries Over Encrypted Graphs With Privacy Protection. 940-953 - André Schaller

, Taras Stanko, Boris Skoric
, Stefan Katzenbeisser:
Eliminating Leakage in Reverse Fuzzy Extractors. 954-964 - Yanxiong Li

, Xue Zhang, Xianku Li, Yuhan Zhang, Ji-Chen Yang, Qianhua He:
Mobile Phone Clustering From Speech Recordings Using Deep Representation and Spectral Clustering. 965-977 - Wei-Che Wang

, Yair Yona
, Suhas N. Diggavi, Puneet Gupta
:
Design and Analysis of Stability-Guaranteed PUFs. 978-992 - Linyuan Zhang, Guoru Ding

, Qihui Wu, Zhu Han:
Spectrum Sensing Under Spectrum Misuse Behaviors: A Multi-Hypothesis Test Perspective. 993-1007 - Matteo Ferrara

, Annalisa Franco, Davide Maltoni
:
Face Demorphing. 1008-1017 - Zhiyong Su

, Ying Ye, Qi Zhang, Weiqing Li, Yuewei Dai:
Robust 2D Engineering CAD Graphics Hashing for Joint Topology and Geometry Authentication via Covariance-Based Descriptors. 1018-1030 - Darren Hurley-Smith

, Julio C. Hernandez-Castro:
Certifiably Biased: An In-Depth Analysis of a Common Criteria EAL4+ Certified TRNG. 1031-1041 - Hasini Gunasinghe

, Elisa Bertino
:
PrivBioMTAuth: Privacy Preserving Biometrics-Based and User Centric Protocol for User Authentication From Mobile Phones. 1042-1057 - Jiachun Liao

, Lalitha Sankar
, Vincent Y. F. Tan
, Flávio du Pin Calmon
:
Hypothesis Testing Under Mutual Information Privacy Constraints in the High Privacy Regime. 1058-1071
Volume 13, Number 5, May 2018
- Zhongliu Zhuo

, Yang Zhang
, Zhi-Li Zhang, Xiaosong Zhang, Jingzhong Zhang:
Website Fingerprinting Attack on Anonymity Networks Based on Profile Hidden Markov Model. 1081-1095 - Shanshan Wang, Qiben Yan

, Zhenxiang Chen
, Bo Yang
, Chuan Zhao, Mauro Conti
:
Detecting Android Malware Leveraging Text Semantics of Network Flows. 1096-1109 - Harjinder Singh Lallie

, Kurt Debattista
, Jay Bal:
An Empirical Evaluation of the Effectiveness of Attack Graphs and Fault Trees in Cyber-Attack Perception. 1110-1122 - Emanuele Maiorana

, Patrizio Campisi
:
Longitudinal Evaluation of EEG-Based Biometric Recognition. 1123-1138 - Alfonso Iacovazzi

, Sanat Sarda
, Daniel Frassinelli, Yuval Elovici:
DropWat: An Invisible Network Flow Watermark for Data Exfiltration Traceback. 1139-1154 - Jingyu Hua

, Wei Tong
, Fengyuan Xu, Sheng Zhong:
A Geo-Indistinguishable Location Perturbation Mechanism for Location-Based Services Supporting Frequent Queries. 1155-1168 - Wei Dai

, Yarkin Doröz, Yuriy Polyakov
, Kurt Rohloff
, Hadi Sajjadpour
, Erkay Savas
, Berk Sunar:
Implementation and Evaluation of a Lattice-Based Key-Policy ABE Scheme. 1169-1184 - Suryadipta Majumdar

, Taous Madi, Yushun Wang, Yosr Jarraya, Makan Pourzandi, Lingyu Wang, Mourad Debbabi
:
User-Level Runtime Security Auditing for the Cloud. 1185-1199 - Jishen Zeng

, Shunquan Tan
, Bin Li, Jiwu Huang
:
Large-Scale JPEG Image Steganalysis Using Hybrid Deep-Learning Framework. 1200-1214 - Juan Lopez Jr.

, Nathan C. Liefer, Colin R. Busho, Michael A. Temple
:
Enhancing Critical Infrastructure and Key Resources (CIKR) Level-0 Physical Process Security Using Field Device Distinct Native Attribute Features. 1215-1229 - Yanqing Yao

, Zhoujun Li
:
Differential Privacy With Bias-Control Limited Sources. 1230-1241 - Bin Li

, Zhongpeng Li, Shijun Zhou, Shunquan Tan
, Xiaoling Zhang:
New Steganalytic Features for Spatial Image Steganography Based on Derivative Filters and Threshold LBP Operator. 1242-1257 - Eduardo José da S. Luz

, Gladston J. P. Moreira
, Luiz S. Oliveira, William Robson Schwartz
, David Menotti
:
Learning Deep Off-the-Person Heart Biometrics Representations. 1258-1270 - Chuntao Wang

, Jiangqun Ni
, Xinpeng Zhang
, Qiong Huang:
Efficient Compression of Encrypted Binary Images Using the Markov Random Field. 1271-1285 - Jing Chen

, Chiheng Wang
, Ziming Zhao, Kai Chen
, Ruiying Du, Gail-Joon Ahn
:
Uncovering the Face of Android Ransomware: Characterization and Real-Time Detection. 1286-1300 - Weijia Wang

, Yu Yu
, François-Xavier Standaert
, Junrong Liu, Zheng Guo, Dawu Gu:
Ridge-Based DPA: Improvement of Differential Power Analysis For Nanoscale Chips. 1301-1316 - Jun Yu

, Zhenzhong Kuang
, Baopeng Zhang
, Wei Zhang, Dan Lin
, Jianping Fan
:
Leveraging Content Sensitiveness and User Trustworthiness to Recommend Fine-Grained Privacy Settings for Social Image Sharing. 1317-1332 - Le Trieu Phong

, Yoshinori Aono, Takuya Hayashi
, Lihua Wang
, Shiho Moriai:
Privacy-Preserving Deep Learning via Additively Homomorphic Encryption. 1333-1345
Volume 13, Number 6, June 2018
- Haowei Wang

, Xiaofeng Tao
, Na Li, Zhu Han:
Polar Coding for the Wiretap Channel With Shared Key. 1351-1360 - Hussain M. J. Almohri

, Layne T. Watson, David Evans
:
Misery Digraphs: Delaying Intrusion Attacks in Obscure Clouds. 1361-1375 - Yongzhi Wang

, Yulong Shen, Xiaohong Jiang
:
Practical Verifiable Computation-A MapReduce Case Study. 1376-1391 - Pramuditha Perera

, Vishal M. Patel
:
Efficient and Low Latency Detection of Intruders in Mobile Active Authentication. 1392-1405 - Marta Gomez-Barrero

, Javier Galbally
, Christian Rathgeb, Christoph Busch
:
General Framework to Evaluate Unlinkability in Biometric Template Protection Systems. 1406-1420 - Christian Galea

, Reuben A. Farrugia
:
Matching Software-Generated Sketches to Face Photographs With a Very Deep CNN, Morphed Faces, and Transfer Learning. 1421-1431 - Hao Wu

, Wei Wang
:
A Game Theory Based Collaborative Security Detection Method for Internet of Things Systems. 1432-1445 - Elizabeth Hou

, Kumar Sricharan, Alfred O. Hero III:
Latent Laplacian Maximum Entropy Discrimination for Detection of High-Utility Anomalies. 1446-1459 - Baocang Wang

, Yu Zhan, Zhili Zhang
:
Cryptanalysis of a Symmetric Fully Homomorphic Encryption Scheme. 1460-1467 - Florian Wilde

, Berndt M. Gammel
, Michael Pehl
:
Spatial Correlation Analysis on Physical Unclonable Functions. 1468-1480 - Carmen Campomanes-Álvarez

, Rubén Martos-Fernández
, Caroline M. Wilkinson
, Óscar Ibáñez
, Oscar Cordón
:
Modeling Skull-Face Anatomical/Morphological Correspondence for Craniofacial Superimposition-Based Identification. 1481-1494 - Gábor Fodor

, Peter Schelkens
, Ann Dooms
:
Fingerprinting Codes Under the Weak Marking Assumption. 1495-1508 - Xiushan Nie

, Xiaoyu Li, Yane Chai
, Chaoran Cui, Xiaoming Xi
, Yilong Yin:
Robust Image Fingerprinting Based on Feature Point Relationship Mining. 1509-1523 - Xiaofan He

, Richeng Jin, Huaiyu Dai:
Leveraging Spatial Diversity for Privacy-Aware Location-Based Services in Mobile Networks. 1524-1534 - Jinku Li

, Xiaomeng Tong
, Fengwei Zhang
, Jianfeng Ma:
Fine-CFI: Fine-Grained Control-Flow Integrity for Operating System Kernels. 1535-1550 - AmirEmad Ghassami

, Negar Kiyavash:
A Covert Queueing Channel in FCFS Schedulers. 1551-1563 - Joshua J. Engelsma

, Sunpreet S. Arora, Anil K. Jain
, Nicholas G. Paulter:
Universal 3D Wearable Fingerprint Targets: Advancing Fingerprint Reader Evaluations. 1564-1578 - Ning Xie

, Changsheng Chen
:
Slope Authentication at the Physical Layer. 1579-1594 - Zi Li, Qingqi Pei, Ian D. Markwood, Yao Liu, Haojin Zhu:

Corrections to "Secret Key Establishment via RSS Trajectory Matching Between Wearable Devices" [Mar 18 802-817]. 1595
Volume 13, Number 7, July 2018
- Sharad Joshi

, Nitin Khanna
:
Single Classifier-Based Passive System for Source Printer Classification Using Local Texture Features. 1603-1614 - Farhang Bayat

, Shuangqing Wei
:
Non-Adaptive Sequential Detection of Active Edge-Wise Disjoint Subgraphs Under Privacy Constraints. 1615-1625 - Yichun Shi

, Charles Otto
, Anil K. Jain
:
Face Clustering: Representation and Pairwise Constraints. 1626-1640 - Holger Boche, Christian Deppe

:
Secure Identification for Wiretap Channels; Robustness, Super-Additivity and Continuity. 1641-1655 - Jiahui Hou

, Xiang-Yang Li
, Taeho Jung
, Yu Wang
, Daren Zheng:
CASTLE: Enhancing the Utility of Inequality Query Auditing Without Denial Threats. 1656-1669 - Pauline Puteaux

, William Puech
:
An Efficient MSB Prediction-Based Method for High-Capacity Reversible Data Hiding in Encrypted Images. 1670-1681 - Christos Liaskos

, Sotiris Ioannidis:
Network Topology Effects on the Detectability of Crossfire Attacks. 1682-1695 - Alireza Sepas-Moghaddam

, Fernando Pereira
, Paulo Lobato Correia
:
Light Field-Based Face Presentation Attack Detection: Reviewing, Benchmarking and One Step Further. 1696-1709 - Luca Calderoni

, Paolo Palmieri
, Dario Maio
:
Probabilistic Properties of the Spatial Bloom Filters and Their Relevance to Cryptographic Protocols. 1710-1721 - Nam Yul Yu

:
Indistinguishability and Energy Sensitivity of Gaussian and Bernoulli Compressed Encryption. 1722-1735 - Peng Xu

, Zhiguo Ding
, Xuchu Dai:
Achievable Secrecy Rates for Relay-Eavesdropper Channel Based on the Application of Noisy Network Coding. 1736-1751 - Pei Luo

, Konstantinos Athanasiou, Yunsi Fei
, Thomas Wahl:
Algebraic Fault Analysis of SHA-3 Under Relaxed Fault Models. 1752-1761 - Owen Mayer

, Matthew C. Stamm
:
Accurate and Efficient Image Forgery Detection Using Lateral Chromatic Aberration. 1762-1777 - Dongyang Xu

, Pinyi Ren
, James A. Ritcey, Yichen Wang:
Code-Frequency Block Group Coding for Anti-Spoofing Pilot Authentication in Multi-Antenna OFDM Systems. 1778-1793 - Haoliang Li

, Wen Li
, Hong Cao, Shiqi Wang, Feiyue Huang
, Alex C. Kot
:
Unsupervised Domain Adaptation for Face Anti-Spoofing. 1794-1809 - Majid Komeili

, Narges Armanfard
, Dimitrios Hatzinakos:
Liveness Detection and Automatic Template Updating Using Fusion of ECG and Fingerprint. 1810-1822 - Yueqi Duan, Jiwen Lu

, Jianjiang Feng
, Jie Zhou:
Topology Preserving Structural Matching for Automatic Partial Face Recognition. 1823-1837 - Jing Zheng

, Qi Li
, Guofei Gu, Jiahao Cao
, David K. Y. Yau, Jianping Wu:
Realtime DDoS Defense Using COTS SDN Switches via Adaptive Correlation Analysis. 1838-1853 - Zinan Lin

, Yongfeng Huang
, Jilong Wang:
RNN-SM: Fast Steganalysis of VoIP Streams Using Recurrent Neural Network. 1854-1868 - Caixue Zhou

:
Comments on "Light-Weight and Robust Security-Aware D2D-Assist Data Transmission Protocol for Mobile-Health Systems". 1869-1870
Volume 13, Number 8, August 2018
- Azzam Al-Nahari

, Giovanni Geraci
, Mukarram Al-jamali, Mohamed Hossam Ahmed, Nan Yang
:
Beamforming With Artificial Noise for Secure MISOME Cognitive Radio Transmissions. 1875-1889 - Ming Fan

, Jun Liu, Xiapu Luo
, Kai Chen, Zhenzhou Tian, Qinghua Zheng, Ting Liu
:
Android Malware Familial Classification and Representative Sample Selection via Frequent Subgraph Analysis. 1890-1905 - Xueqing Gong

, Ping Hu, Kenneth W. Shum, Chi Wan Sung:
A Zigzag-Decodable Ramp Secret Sharing Scheme. 1906-1916 - Xiaoyong Li

, Jie Yuan, Huadong Ma, Wenbin Yao:
Fast and Parallel Trust Computing Scheme Based on Big Data Analysis for Collaboration Cloud Service. 1917-1931 - Yuanfang Guo

, Xiaochun Cao, Wei Zhang, Rui Wang
:
Fake Colorized Image Detection. 1932-1944 - Onur Günlü

, Kittipong Kittichokechai, Rafael F. Schaefer
, Giuseppe Caire:
Controllable Identifier Measurements for Private Authentication With Secret Keys. 1945-1959 - Andrea Valsecchi

, Sergio Damas
, Oscar Cordón
:
A Robust and Efficient Method for Skull-Face Overlay in Computerized Craniofacial Superimposition. 1960-1974 - M. Francisca Hinarejos

, Florina Almenárez
, Patricia Arias Cabarcos
, Josep-Lluís Ferrer-Gomila
, Andrés Marín López
:
RiskLaine: A Probabilistic Approach for Assessing Risk in Certificate-Based Security. 1975-1988 - Waziha Kabir, M. Omair Ahmad

, M. N. S. Swamy:
Normalization and Weighting Techniques Based on Genuine-Impostor Score Fusion in Multi-Biometric Systems. 1989-2000 - Ester Gonzalez-Sosa

, Julian Fiérrez
, Rubén Vera-Rodríguez
, Fernando Alonso-Fernandez
:
Facial Soft Biometrics for Recognition in the Wild: Recent Works, Annotation, and COTS Evaluation. 2001-2014 - Mehmet Necip Kurt

, Yasin Yilmaz
, Xiaodong Wang
:
Distributed Quickest Detection of Cyber-Attacks in Smart Grid. 2015-2030 - Po-Yen Lee, Chia-Mu Yu

, Tooska Dargahi
, Mauro Conti
, Giuseppe Bianchi:
MDSClone: Multidimensional Scaling Aided Clone Detection in Internet of Things. 2031-2046 - Zhuo Tang

, Xiaofei Ding, Ying Zhong, Li Yang, Keqin Li
:
A Self-Adaptive Bell-LaPadula Model Based on Model Training With Historical Access Logs. 2047-2061 - Kaiping Xue

, Weikeng Chen
, Wei Li, Jianan Hong, Peilin Hong:
Combining Data Owner-Side and Cloud-Side Access Control for Encrypted Cloud Storage. 2062-2074 - Nima Tavangaran

, Rafael F. Schaefer
, H. Vincent Poor
, Holger Boche:
Secret-Key Generation and Convexity of the Rate Region Using Infinite Compound Sources. 2075-2086 - Heejung Yu

, Taejoon Kim
, Hamid Jafarkhani
:
Wireless Secure Communication With Beamforming and Jamming in Time-Varying Wiretap Channels. 2087-2100 - Shengmin Xu

, Guomin Yang
, Yi Mu
, Robert H. Deng
:
Secure Fine-Grained Access Control and Data Sharing for Dynamic Groups in the Cloud. 2101-2113 - Wonsuk Choi, Kyungho Joo, Hyo Jin Jo, Moon Chan Park

, Dong Hoon Lee
:
VoltageIDS: Low-Level Communication Characteristics for Automotive Intrusion Detection System. 2114-2129
Volume 13, Number 9, September 2018
- Mario Preishuber, Thomas Hütter

, Stefan Katzenbeisser, Andreas Uhl
:
Depreciating Motivation and Empirical Security Analysis of Chaos-Based Image and Video Encryption. 2137-2150 - Xuebin Ren

, Chia-Mu Yu
, Weiren Yu, Shusen Yang, Xinyu Yang
, Julie A. McCann, Philip S. Yu:
LoPub: High-Dimensional Crowdsourced Data Publication With Local Differential Privacy. 2151-2166 - PeiYun Zhang, Yang Kong

, MengChu Zhou
:
A Domain Partition-Based Trust Model for Unreliable Clouds. 2167-2178 - Da Luo, Pawel Korus

, Jiwu Huang
:
Band Energy Difference for Source Attribution in Audio Forensics. 2179-2189 - Tarang Chugh

, Kai Cao, Anil K. Jain
:
Fingerprint Spoof Buster: Use of Minutiae-Centered Patches. 2190-2202 - Samet Akcay

, Mikolaj E. Kundegorski
, Chris G. Willcocks
, Toby P. Breckon
:
Using Deep Convolutional Neural Network Architectures for Object Classification and Detection Within X-Ray Baggage Security Imagery. 2203-2215 - Jake B. Perazzone

, Paul L. Yu, Brian M. Sadler
, Rick S. Blum
:
Cryptographic Side-Channel Signaling and Authentication via Fingerprint Embedding. 2216-2225 - Mohammad Mahdi Khalili

, Parinaz Naghizadeh
, Mingyan Liu:
Designing Cyber Insurance Policies: The Role of Pre-Screening and Security Interdependence. 2226-2239 - Xuan Zha

, Wei Ni
, Xu Wang
, Ren Ping Liu
, Y. Jay Guo
, Xinxin Niu, Kangfeng Zheng:
The Impact of Link Duration on the Integrity of Distributed Mobile Networks. 2240-2255 - Muhammad R. A. Khandaker

, Christos Masouros, Kai-Kit Wong:
Constructive Interference Based Secure Precoding: A New Dimension in Physical Layer Security. 2256-2268 - Kuo Cao

, Yueming Cai, Yongpeng Wu
, Weiwei Yang
:
Secure Communication for Amplify-and-Forward Relay Networks With Finite Alphabet Input. 2269-2278 - Yanling Chen

, Onur Ozan Koyluoglu
, A. J. Han Vinck:
Collective Secrecy Over the K-Transmitter Multiple Access Channel. 2279-2293 - Parthajit Mohapatra

, Nikolaos Pappas
, Jemin Lee
, Tony Q. S. Quek
, Vangelis Angelakis:
Secure Communications for the Two-User Broadcast Channel With Random Traffic. 2294-2309 - Si-Hyeon Lee

, Ligong Wang
, Ashish Khisti
, Gregory W. Wornell
:
Covert Communication With Channel-State Information at the Transmitter. 2310-2319 - Minxin Du

, Qian Wang
, Meiqi He, Jian Weng
:
Privacy-Preserving Indexing and Query Processing for Secure Dynamic Cloud Storage. 2320-2332 - Sujit Rokka Chhetri

, Sina Faezi
, Mohammad Abdullah Al Faruque
:
Information Leakage-Aware Computer-Aided Cyber-Physical Manufacturing. 2333-2344 - Ning Zhang

, Ruide Zhang, Kun Sun, Wenjing Lou, Y. Thomas Hou
, Sushil Jajodia
:
Memory Forensic Challenges Under Misused Architectural Features. 2345-2358 - Zhangjie Fu

, Lili Xia
, Xingming Sun, Alex X. Liu
, Guowu Xie:
Semantic-Aware Searching Over Encrypted Data for Cloud Computing. 2359-2371 - Zi-Xing Lin

, Fei Peng
, Min Long:
A Low-Distortion Reversible Watermarking for 2D Engineering Graphics Based on Region Nesting. 2372-2382 - Haoxi Li, Haifeng Hu

, Chitung Yip:
Age-Related Factor Guided Joint Task Modeling Convolutional Neural Network for Cross-Age Face Recognition. 2383-2392 - Yuqiao Cheng

, Zhengxin Fu
, Bin Yu
:
Improved Visual Secret Sharing Scheme for QR Code Applications. 2393-2403
Volume 13, Number 10, October 2018
- Hongwen Zhang

, Qi Li
, Zhenan Sun
, Yunfan Liu
:
Combining Data-Driven and Model-Driven Methods for Robust Facial Landmark Detection. 2409-2422 - Lei Xue

, Xiaobo Ma, Xiapu Luo
, Edmond W. W. Chan, TungNgai Miu, Guofei Gu:
LinkScope: Toward Detecting Target Link Flooding Attacks. 2423-2438 - Abdulhadi Shoufan

, Haitham M. Al-Angari, Muhammad Faraz Afzal Sheikh
, Ernesto Damiani
:
Drone Pilot Identification by Classifying Radio-Control Signals. 2439-2447 - Shengshan Hu

, Minghui Li
, Qian Wang
, Sherman S. M. Chow
, Minxin Du
:
Outsourced Biometric Identification With Privacy. 2448-2463 - Tamer Mekkawy

, Rugui Yao
, Theodoros A. Tsiftsis
, Fei Xu, Yanan Lu:
Joint Beamforming Alignment With Suboptimal Power Allocation for a Two-Way Untrusted Relay Network. 2464-2474 - Yifeng Zheng

, Huayi Duan
, Cong Wang
:
Learning the Truth Privately and Confidently: Encrypted Confidence-Aware Truth Discovery in Mobile Crowdsensing. 2475-2489 - Erik Miehling

, Mohammad Rasouli, Demosthenis Teneketzis:
A POMDP Approach to the Dynamic Defense of Large-Scale Cyber Networks. 2490-2505 - Xiaoyan Sun

, Jun Dai
, Peng Liu
, Anoop Singhal, John Yen:
Using Bayesian Networks for Probabilistic Identification of Zero-Day Attack Paths. 2506-2521 - Mengyun Tang, Haichang Gao

, Yang Zhang, Yi Liu
, Ping Zhang, Ping Wang:
Research on Deep Learning Techniques in Breaking Text-Based Captchas and Designing Image-Based Captcha. 2522-2537 - Vivek Venugopal

, Suresh Sundaram
:
Online Writer Identification With Sparse Coding-Based Descriptors. 2538-2552 - Felix Wang

, Tu-Thach Quach
, Jason Wheeler, James B. Aimone
, Conrad D. James
:
Sparse Coding for N-Gram Feature Extraction and Training for File Fragment Classification. 2553-2562 - Sevil Sen

, Emre Aydogan
, Ahmet Ilhan Aysan:
Coevolution of Mobile Malware and Anti-Malware. 2563-2574 - Amir Ameli

, Ali Hooshyar
, Ameen Hassan Yazdavar, Ehab F. El-Saadany
, Amr M. Youssef:
Attack Detection for Load Frequency Control Systems Using Stochastic Unknown Input Estimators. 2575-2590 - Gorjan Nadzinski

, Matej Dobrevski
, Christopher Anderson
, Peter V. E. McClintock
, Aneta Stefanovska
, Mile J. Stankovski, Tomislav Stankovski
:
Experimental Realization of the Coupling Function Secure Communications Protocol and Analysis of Its Noise Robustness. 2591-2601 - Seungkwang Lee

, Taesung Kim, Yousung Kang:
A Masked White-Box Cryptographic Implementation for Protecting Against Differential Computation Analysis. 2602-2615 - Amir Akhavan

, Mohammad H. Moradi
:
Detection of Concealed Information Using Multichannel Discriminative Dictionary and Spatial Filter Learning. 2616-2627 - Quanzhong Li

, Liang Yang
:
Artificial Noise Aided Secure Precoding for MIMO Untrusted Two-Way Relay Systems With Perfect and Imperfect Channel State Information. 2628-2638 - Haoliang Li

, Peisong He
, Shiqi Wang
, Anderson Rocha
, Xinghao Jiang
, Alex C. Kot
:
Learning Generalized Deep Feature Representation for Face Anti-Spoofing. 2639-2652 - Na Wang

, Junsong Fu
, Bharat K. Bhargava
, Jiwen Zeng:
Efficient Retrieval Over Documents Encrypted by Attributes in Cloud Computing. 2653-2667 - Chen Li

, Wenping Ma:
Comments on "An Efficient Privacy-Preserving Outsourced Calculation Toolkit With Multiple Keys". 2668-2669
Volume 13, Number 11, November 2018
- Fei Chen, Donghong Wang, Ronghua Li, Jianyong Chen

, Zhong Ming, Alex X. Liu
, Huayi Duan
, Cong Wang
, Jing Qin
:
Secure Hashing-Based Verifiable Pattern Matching. 2677-2690 - Belhassen Bayar

, Matthew C. Stamm
:
Constrained Convolutional Neural Networks: A New Approach Towards General Purpose Image Manipulation Detection. 2691-2706 - Mohd Fazil

, Muhammad Abulaish
:
A Hybrid Approach for Detecting Automated Spammers in Twitter. 2707-2719 - Julian Fiérrez

, Ada Pozo, Marcos Martinez-Diaz
, Javier Galbally
, Aythami Morales
:
Benchmarking Touchscreen Biometrics for Mobile Authentication. 2720-2733 - Xiaoning Song

, Zhenhua Feng
, Guosheng Hu, Josef Kittler
, Xiao-Jun Wu:
Dictionary Integration Using 3D Morphable Face Models for Pose-Invariant Collaborative-Representation-Based Classification. 2734-2745 - Yuanwen Huang

, Swarup Bhunia
, Prabhat Mishra
:
Scalable Test Generation for Trojan Detection Using Side Channel Analysis. 2746-2760 - Prashanth Krishnamurthy, Farshad Khorrami

, Ramesh Karri
, David Paul-Pena
, Hossein Salehghaffari:
Process-Aware Covert Channels Using Physical Instrumentation in Cyber-Physical Systems. 2761-2771 - Weize Quan

, Kai Wang
, Dong-Ming Yan
, Xiaopeng Zhang
:
Distinguishing Between Natural and Computer-Generated Images Using Convolutional Neural Networks. 2772-2787 - Shihao Yan

, Xiangyun Zhou
, Nan (Jonas) Yang
, Thushara D. Abhayapala
, A. Lee Swindlehurst
:
Secret Channel Training to Enhance Physical Layer Security With a Full-Duplex Receiver. 2788-2800 - Jianfeng Lu

, Yun Xin, Zhao Zhang, Xinwang Liu
, Kenli Li
:
Game-Theoretic Design of Optimal Two-Sided Rating Protocols for Service Exchange Dilemma in Crowdsourcing. 2801-2815 - Kousha Kalantari

, Lalitha Sankar
, Anand D. Sarwate
:
Robust Privacy-Utility Tradeoffs Under Differential Privacy and Hamming Distortion. 2816-2830 - Prosanta Gope

, Jemin Lee
, Tony Q. S. Quek
:
Lightweight and Practical Anonymous Authentication Protocol for RFID Systems Using Physically Unclonable Functions. 2831-2843 - Feng Hao

, Roberto Metere, Siamak F. Shahandashti
, Changyu Dong
:
Analyzing and Patching SPEKE in ISO/IEC. 2844-2855 - Maochao Xu, Kristin M. Schweitzer

, Raymond M. Bateman
, Shouhuai Xu
:
Modeling and Predicting Cyber Hacking Breaches. 2856-2871 - Onur Günlü

, Gerhard Kramer
:
Privacy, Secrecy, and Storage With Multiple Noisy Measurements of Identifiers. 2872-2883 - Xiang Wu

, Ran He
, Zhenan Sun
, Tieniu Tan:
A Light CNN for Deep Face Representation With Noisy Labels. 2884-2896 - Qi Zhang

, Haiqing Li, Zhenan Sun
, Tieniu Tan:
Deep Feature Fusion for Iris and Periocular Biometrics on Mobile Devices. 2897-2912 - Yuan Yang

, Zhongmin Cai
, Chunyan Wang, Junjie Zhang:
Probabilistically Inferring Attack Ramifications Using Temporal Dependence Network. 2913-2928 - Mike Burmester, Jorge Munilla

, Andrés Ortiz
:
Comments on "Unreconciled Collisions Uncover Cloning Attacks in Anonymous RFID Systems". 2929-2931
Volume 13, Number 12, December 2018
- Zijing Zhao

, Ajay Kumar
:
Improving Periocular Recognition by Explicit Attention to Critical Regions in Deep Neural Network. 2937-2952 - Heecheol Yang

, Wonjae Shin, Jungwoo Lee
:
Private Information Retrieval for Secure Distributed Storage Systems. 2953-2964 - Pang Du

, Zheyuan Sun, Huashan Chen, Jin-Hee Cho, Shouhuai Xu
:
Statistical Estimation of Malware Detection Metrics in the Absence of Ground Truth. 2965-2980 - Maël Le Treust, Leszek Szczecinski, Fabrice Labeau

:
Rate Adaptation for Secure HARQ Protocols. 2981-2994 - Zhikun Zhang

, Shibo He
, Jiming Chen
, Junshan Zhang:
REAP: An Efficient Incentive Mechanism for Reconciling Aggregation Accuracy and Individual Privacy in Crowdsensing. 2995-3007 - Ming Tang

, Pengbo Wang
, Xiaoqi Ma, Wenjie Chang, Huanguo Zhang, Guojun Peng, Jean-Luc Danger
:
An Efficient SCA Leakage Model Construction Method Under Predictable Evaluation. 3008-3018 - Hubert Ritzdorf, Claudio Soriente

, Ghassan O. Karame
, Srdjan Marinovic, Damian Gruber, Srdjan Capkun:
Toward Shared Ownership in the Cloud. 3019-3034 - Wenchang Tang

, Feng Ji
, Wee Peng Tay
:
Estimating Infection Sources in Networks Using Partial Timestamps. 3035-3049 - Kai Zhou

, Jian Ren
:
PassBio: Privacy-Preserving User-Centric Biometric Authentication. 3050-3063 - Lacey Best-Rowden

, Anil K. Jain:
Learning Face Image Quality From Human Assessments. 3064-3077 - Rong Jin, Kai Zeng

:
Secure Inductive-Coupled Near Field Communication at Physical Layer. 3078-3093 - Xu Zhang

, Edward W. Knightly:
Pilot Distortion Attack and Zero-Startup-Cost Detection in Massive MIMO Network: From Analysis to Experiments. 3094-3107 - Yonggang Huang

, Longbing Cao
, Jun Zhang
, Lei Pan
, Yuying Liu:
Exploring Feature Coupling and Model Coupling for Image Source Identification. 3108-3121 - Shih-Chun Lin

, Chien-Chi Liu, Min-Yen Hsieh, Shih-Tang Su, Wei-Ho Chung
:
Coded Quickest Classification With Applications in Bandwidth-Efficient Smart Grid Monitoring. 3122-3136 - Vincenzo Matta

, Mario Di Mauro
, Maurizio Longo
, Alfonso Farina:
Cyber-Threat Mitigation Exploiting the Birth-Death-Immigration Model. 3137-3152 - Zhe Cui

, Jianjiang Feng
, Shihao Li, Jiwen Lu
, Jie Zhou:
2-D Phase Demodulation for Deformable Fingerprint Registration. 3153-3165

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














