


default search action
IEEE Transactions on Information Forensics and Security, Volume 15
Volume 15, 2020
- Matteo Testa
, Tiziano Bianchi
, Enrico Magli
:
Secrecy Analysis of Finite-Precision Compressive Cryptosystems. 1-13 - Sara Mandelli
, Paolo Bestagini
, Luisa Verdoliva
, Stefano Tubaro:
Facing Device Attribution Problem for Stabilized Video Sequences. 14-27 - Xuefei Yin
, Yanming Zhu
, Jiankun Hu
:
Contactless Fingerprint Recognition Based on Global Minutia Topology and Loose Genetic Algorithm. 28-41 - Anjith George
, Zohreh Mostaani
, David Geissenbuhler, Olegs Nikisins, André Anjos
, Sébastien Marcel
:
Biometric Face Presentation Attack Detection With Multi-Channel Convolutional Neural Network. 42-55 - Metodi P. Yankov
, Martin Aastrup Olsen
, Mikkel B. Stegmann, Søren Skovgaard Christensen, Søren Forchhammer
:
Fingerprint Entropy and Identification Capacity Estimation Based on Pixel-Level Generative Modelling. 56-65 - Ali Karimi, Abbas Taherpour
, Danijela Cabric
:
Smart Traffic-Aware Primary User Emulation Attack and Its Impact on Secondary User Throughput Under Rayleigh Flat Fading Channel. 66-80 - Kyung-Ah Shim
:
Comments on "Revocable and Scalable Certificateless Remote Authentication Protocol With Anonymity for Wireless Body Area Networks". 81-82 - Babak Siabi
, Mehdi Berenjkoub:
Comments on "Unconditionally Secure, Universally Composable Privacy Preserving Linear Algebra". 83-84 - Meng Sun
, Wee Peng Tay
:
Decentralized Detection With Robust Information Privacy Protection. 85-99 - Na Wang
, Junsong Fu
, Jian Li
, Bharat K. Bhargava
:
Source-Location Privacy Protection Based on Anonymity Cloud in Wireless Sensor Networks. 100-114 - Fei Ma
, Xiao-Yuan Jing
, Xiao Zhu, Zhenmin Tang
, Zhiping Peng:
True-Color and Grayscale Video Person Re-Identification. 115-129 - Quanzhong Li
, Liang Yang
:
Beamforming for Cooperative Secure Transmission in Cognitive Two-Way Relay Networks. 130-143 - Davide Cozzolino
, Luisa Verdoliva
:
Noiseprint: A CNN-Based Camera Model Fingerprint. 144-159 - Sharad Joshi
, Nitin Khanna
:
Source Printer Classification Using Printer Specific Local Texture Descriptor. 160-171 - Chunlei Peng, Nannan Wang
, Jie Li, Xinbo Gao
:
Face Sketch Synthesis in the Wild via Deep Patch Representation-Based Probabilistic Graphical Model. 172-183 - Fawad Ahmad
, Lee-Ming Cheng
, Asif Khan
:
Lightweight and Privacy-Preserving Template Generation for Palm-Vein-Based Human Recognition. 184-194 - Meng Pang
, Yiu-Ming Cheung
, Binghui Wang
, Jian Lou
:
Synergistic Generic Learning for Face Recognition From a Contaminated Single Sample per Person. 195-209 - Ahmed Arafa
, Wonjae Shin
, Mojtaba Vaezi
, H. Vincent Poor
:
Secure Relaying in Non-Orthogonal Multiple Access: Trusted and Untrusted Scenarios. 210-222 - Jinguang Han
, Liqun Chen
, Steve A. Schneider
, Helen Treharne
, Stephan Wesemeyer
, Nick Wilson:
Anonymous Single Sign-On With Proxy Re-Verification. 223-236 - Chengwei Wu
, Ligang Wu
, Jianxing Liu
, Zhong-Ping Jiang
:
Active Defense-Based Resilient Sliding Mode Control Under Denial-of-Service Attacks. 237-249 - Xinghao Jiang
, Qiang Xu
, Tanfeng Sun
, Bin Li
, Peisong He
:
Detection of HEVC Double Compression With the Same Coding Parameters Based on Analysis of Intra Coding Quality Degradation Process. 250-263 - Qiang Li
, Chao Li, Jingran Lin
:
Constant Modulus Secure Beamforming for Multicast Massive MIMO Wiretap Channels. 264-275 - Wei-Che Wang
, Yair Yona
, Yizhang Wu
, Suhas N. Diggavi, Puneet Gupta
:
SLATE: A Secure Lightweight Entity Authentication Hardware Primitive. 276-285 - Enrico Bacis
, Sabrina De Capitani di Vimercati
, Sara Foresti
, Stefano Paraboschi
, Marco Rosa
, Pierangela Samarati
:
Securing Resources in Decentralized Cloud Storage. 286-298 - Dong Yuan, Qi Li
, Guoliang Li
, Qian Wang
, Kui Ren:
PriRadar: A Privacy-Preserving Framework for Spatial Crowdsourcing. 299-314 - Pu Zhao
, Jia Yu
, Hanlin Zhang, Zhan Qin, Cong Wang
:
How to Securely Outsource Finding the Min-Cut of Undirected Edge-Weighted Graphs. 315-328 - Amir Ameli
, Ali Hooshyar
, Ehab F. El-Saadany
, Amr M. Youssef
:
An Intrusion Detection Method for Line Current Differential Relays. 329-344 - Ramin Soltani
, Dennis Goeckel
, Don Towsley
, Amir Houmansadr
:
Fundamental Limits of Invisible Flow Fingerprinting. 345-360 - Xiaofang Xia
, Yang Xiao
, Wei Liang
:
SAI: A Suspicion Assessment-Based Inspection Algorithm to Detect Malicious Users in Smart Grid. 361-374 - Guoqing Wang
, Changming Sun
, Arcot Sowmya:
Multi-Weighted Co-Occurrence Descriptor Encoding for Vein Recognition. 375-390 - Jingyi Feng
, Hua Chen
, Yang Li, Zhipeng Jiao, Wei Xi:
A Framework for Evaluation and Analysis on Infection Countermeasures Against Fault Attacks. 391-406 - Mang Ye
, Xiangyuan Lan
, Zheng Wang
, Pong C. Yuen
:
Bi-Directional Center-Constrained Top-Ranking for Visible Thermal Person Re-Identification. 407-419 - Jun Zhou
, Zhenfu Cao
, Zhan Qin, Xiaolei Dong, Kui Ren:
LPPA: Lightweight Privacy-Preserving Authentication From Efficient Multi-Key Secure Outsourced Computation for Location-Based Services in VANETs. 420-434 - Nalam Venkata Abhishek
, Anshoo Tandon
, Teng Joon Lim
, Biplab Sikdar
:
A GLRT-Based Mechanism for Detecting Relay Misbehavior in Clustered IoT Networks. 435-446 - Jean de Dieu Mutangana, Ravi Tandon
:
Blind MIMO Cooperative Jamming: Secrecy via ISI Heterogeneity Without CSIT. 447-461 - Juntao Chen
, Corinne Touati
, Quanyan Zhu:
A Dynamic Game Approach to Strategic Design of Secure and Resilient Infrastructure Network. 462-474 - Ahmet Turan Erozan
, Michael Hefenbrock
, Michael Beigl, Jasmin Aghassi-Hagmann
, Mehdi Baradaran Tahoori:
Reverse Engineering of Printed Electronics Circuits: From Imaging to Netlist Extraction. 475-486 - Moisés Díaz
, Miguel A. Ferrer
, Soodamani Ramalingam
, Richard M. Guest
:
Investigating the Common Authorship of Signatures by Off-Line Automatic Signature Verification Without the Use of Reference Signatures. 487-499 - Hussain M. J. Almohri
, Layne T. Watson, David Evans:
Predictability of IP Address Allocations for Cloud Computing Platforms. 500-511 - Kanad Basu
, Prashanth Krishnamurthy
, Farshad Khorrami
, Ramesh Karri
:
A Theoretical Study of Hardware Performance Counters-Based Malware Detection. 512-525 - Hyun Kwon
, Yongchul Kim, Hyunsoo Yoon
, Daeseon Choi
:
Selective Audio Adversarial Example in Evasion Attack on Speech Recognition System. 526-538 - Dan Lin
, Douglas Steiert, Joshua Morris
, Anna Cinzia Squicciarini, Jianping Fan
:
REMIND: Risk Estimation Mechanism for Images in Network Distribution. 539-552 - Netanel Raviv
, David A. Karpuk
:
Private Polynomial Computation From Lagrange Encoding. 553-563 - Hoon Wei Lim, Geong Sen Poh
, Jia Xu
, Varsha Chittawar
:
PrivateLink: Privacy-Preserving Integration and Sharing of Datasets. 564-577 - Haonan Chen
, Guosheng Hu
, Zhen Lei
, Yaowu Chen
, Neil Martin Robertson, Stan Z. Li:
Attention-Based Two-Stream Convolutional Networks for Face Spoofing Detection. 578-593 - Borzoo Rassouli
, Deniz Gündüz
:
Optimal Utility-Privacy Trade-Off With Total Variation Distance as a Privacy Measure. 594-603 - Xin Yuan
, Zhiyong Feng
, Wei Ni
, Ren Ping Liu
, J. Andrew Zhang
, Wenjun Xu
:
Secrecy Performance of Terrestrial Radio Links Under Collaborative Aerial Eavesdropping. 604-619 - Yue Zheng
, Yuan Cao
, Chip-Hong Chang
:
A PUF-Based Data-Device Hash for Tampered Image Detection and Source Camera Identification. 620-634 - Guoqing Wang
, Changming Sun
, Arcot Sowmya:
Learning a Compact Vein Discrimination Model With GANerated Samples. 635-650 - Bo Song
, Xu Wang
, Wei Ni
, Yurong Song
, Ren Ping Liu
, Guoping Jiang
, Y. Jay Guo
:
Reliability Analysis of Large-Scale Adaptive Weighted Networks. 651-665 - Prashanth Krishnamurthy
, Ramesh Karri
, Farshad Khorrami
:
Anomaly Detection in Real-Time Multi-Threaded Processes Using Hardware Performance Counters. 666-680 - Hailong Zhang
:
On the Exact Relationship Between the Success Rate of Template Attack and Different Parameters. 681-694 - Miran Kim
, Junghye Lee
, Lucila Ohno-Machado, Xiaoqian Jiang:
Secure and Differentially Private Logistic Regression for Horizontally Distributed Data. 695-710 - Jian Kang
, Douglas Steiert, Dan Lin
, Yanjie Fu:
MoveWithMe: Location Privacy Preservation for Smartphone Users. 711-724 - Weiqi Dai
, Chunkai Dai
, Kim-Kwang Raymond Choo
, Changze Cui
, Deqing Zou
, Hai Jin
:
SDTE: A Secure Blockchain-Based Data Trading Ecosystem. 725-737 - Yuan Liang
, Jian Ren
, Tongtong Li
:
Secure OFDM System Design and Capacity Analysis Under Disguised Jamming. 738-752 - Yang Zi
, Haichang Gao
, Zhouhang Cheng, Yi Liu
:
An End-to-End Attack on Text CAPTCHAs. 753-766 - Yuqiao Zhang, Ujjwal Guin
:
End-to-End Traceability of ICs in Component Supply Chain for Fighting Against Recycling. 767-775 - Baki Berkay Yilmaz
, Milos Prvulovic
, Alenka G. Zajic
:
Electromagnetic Side Channel Information Leakage Created by Execution of Series of Instructions in a Computer Processor. 776-789 - Razane Tajeddine
, Antonia Wachter-Zeh
, Camilla Hollanti
:
Private Information Retrieval Over Random Linear Networks. 790-799 - Mehmet Necip Kurt
, Yasin Yilmaz
, Xiaodong Wang
:
Secure Distributed Dynamic State Estimation in Wide-Area Smart Grids. 800-815 - Dongxia Wang
, Tim Muller, Jie Zhang, Yang Liu
:
Information Theoretical Analysis of Unfair Rating Attacks Under Subjectivity. 816-828 - Phuong Le Cao
, Tobias J. Oechtering
:
Optimal Transmit Strategies for Gaussian MISO Wiretap Channels. 829-838 - Jianhua Yang
, Danyang Ruan
, Jiwu Huang
, Xiangui Kang
, Yun-Qing Shi:
An Embedding Cost Learning Framework Using GAN. 839-851 - Meng Sun
, Wee Peng Tay
:
On the Relationship Between Inference and Data Privacy in Decentralized IoT Networks. 852-866 - Mehdi Sharifzadeh
, Mohammed Aloraini
, Dan Schonfeld
:
Adaptive Batch Size Image Merging Steganography and Quantized Gaussian Image Steganography. 867-879 - Kai Cao
, Dinh-Luan Nguyen, Cori Tymoszek
, Anil K. Jain
:
End-to-End Latent Fingerprint Search. 880-894 - Yang Song
, Chong Xiao Wang, Wee Peng Tay
:
Compressive Privacy for a Linear Dynamical System. 895-910 - Guowen Xu
, Hongwei Li
, Sen Liu, Kan Yang
, Xiaodong Lin
:
VerifyNet: Secure and Verifiable Federated Learning. 911-926 - Chun-I Fan
, Jheng-Jia Huang
, Min-Zhe Zhong, Ruei-Hau Hsu
, Wen-Tsuen Chen, Jemin Lee
:
ReHand: Secure Region-Based Fast Handover With User Anonymity for Small Cell Networks in Mobile Communications. 927-942 - Paolo Addesso
, Michele Cirillo
, Mario Di Mauro
, Vincenzo Matta
:
ADVoIP: Adversarial Detection of Encrypted and Concealed VoIP. 943-958 - Sebastian Baur
, Holger Boche, Rafael F. Schaefer
, H. Vincent Poor
:
Secure Storage Capacity Under Rate Constraints - Continuity and Super Activation. 959-970 - Donghe Li, Qingyu Yang
, Wei Yu
, Dou An
, Yang Zhang, Wei Zhao
:
Towards Differential Privacy-Based Online Double Auction for Smart Grid. 971-986 - Xiao Chen
, Chaoran Li
, Derui Wang
, Sheng Wen, Jun Zhang
, Surya Nepal
, Yang Xiang
, Kui Ren:
Android HIV: A Study of Repackaging Malware for Evading Machine-Learning Detection. 987-1001 - Zonghao Huang
, Rui Hu, Yuanxiong Guo
, Eric Chan-Tin
, Yanmin Gong
:
DP-ADMM: ADMM-Based Distributed Learning With Differential Privacy. 1002-1012 - Holger Boche, Rafael F. Schaefer
, H. Vincent Poor
:
Secure Communication and Identification Systems - Effective Performance Evaluation on Turing Machines. 1013-1025 - Mehrdad Tahmasbi
, Matthieu R. Bloch
:
Covert Secret Key Generation With an Active Warden. 1026-1039 - Tao Qin
, Zhaoli Liu
, Pinghui Wang
, Shancang Li
, Xiaohong Guan, Lixin Gao:
Symmetry Degree Measurement and its Applications to Anomaly Detection. 1040-1055 - Changsheng Chen
, Mulin Li, Anselmo Ferreira
, Jiwu Huang
, Rizhao Cai:
A Copy-Proof Scheme Based on the Spectral and Spatial Barcoding Channel Models. 1056-1071 - Jakub Breier
, Dirmanto Jap
, Xiaolu Hou
, Shivam Bhasin
:
On Side Channel Vulnerabilities of Bit Permutations in Cryptographic Algorithms. 1072-1085 - Penny Chong, Yuval Elovici, Alexander Binder
:
User Authentication Based on Mouse Dynamics Using Deep Neural Networks: A Comprehensive Study. 1086-1101 - Bryse Flowers, R. Michael Buehrer, William C. Headley:
Evaluating Adversarial Evasion Attacks in the Context of Wireless Communications. 1102-1113 - Shangyu Xie, Yuan Hong, Peng-Jun Wan:
Pairing: Privately Balancing Multiparty Real-Time Supply and Demand on the Power Grid. 1114-1127 - Guillermo Suarez-Tangil
, Matthew Edwards
, Claudia Peersman, Gianluca Stringhini, Awais Rashid
, Monica T. Whitty
:
Automatically Dismantling Online Dating Fraud. 1128-1137 - Ru Zhang, Feng Zhu, Jianyi Liu, Gongshen Liu:
Depth-Wise Separable Convolutions and Multi-Level Pooling for an Efficient Spatial CNN-Based Steganalysis. 1138-1150 - Shangwei Guo
, Tao Xiang
, Xiaoguo Li, Ying Yang:
PEID: A Perceptually Encrypted Image Database for Visual Security Evaluation. 1151-1163 - Osama Al-Kadi
, Nour Moustafa
, Benjamin P. Turnbull
, Kim-Kwang Raymond Choo
:
An Ontological Graph Identification Method for Improving Localization of IP Prefix Hijacking in Network Systems. 1164-1174 - Wenxiong Kang, Hongda Liu, Wei Luo, Feiqi Deng
:
Study of a Full-View 3D Finger Vein Verification Technique. 1175-1189 - Mordechai Guri, Boris Zadov, Yuval Elovici:
ODINI: Escaping Sensitive Data From Faraday-Caged, Air-Gapped Computers via Magnetic Fields. 1190-1203 - Aske R. Lejbølle, Kamal Nasrollahi, Benjamin Krogh, Thomas B. Moeslund
:
Person Re-Identification Using Spatial and Layer-Wise Attention. 1216-1231 - Chonlatid Deerada, Krisada Phromsuthirak, Arucha Rungchokanun, Vutipong Areekul:
Progressive Focusing Algorithm for Reliable Pose Estimation of Latent Fingerprints. 1232-1247 - Jinbao Zhu
, Qifa Yan, Chao Qi, Xiaohu Tang:
A New Capacity-Achieving Private Information Retrieval Scheme With (Almost) Optimal File Length for Coded Servers. 1248-1260 - Ruben Tolosana
, Marta Gomez-Barrero, Christoph Busch
, Javier Ortega-Garcia
:
Biometric Presentation Attack Detection: Beyond the Visible Spectrum. 1261-1275 - Thanikasalam Kokul
, Clinton Fookes, Sridha Sridharan
, Amirthalingam Ramanan
, Amalka Pinidiyaarachchi:
Target-Specific Siamese Attention Network for Real-Time Object Tracking. 1276-1289 - Chuan-Xian Ren, Bo-Hua Liang, Pengfei Ge
, Yiming Zhai, Zhen Lei:
Domain Adaptive Person Re-Identification via Camera Style Generation and Label Propagation. 1290-1302 - Falko Matern, Christian Riess, Marc Stamminger:
Gradient-Based Illumination Description for Image Forgery Detection. 1303-1317 - Shaohua Li, Kaiping Xue
, David S. L. Wei, Hao Yue
, Nenghai Yu
, Peilin Hong
:
SecGrid: A Secure and Efficient SGX-Enabled Smart Grid System With Rich Functionalities. 1318-1330 - Owen Mayer
, Matthew C. Stamm
:
Forensic Similarity for Digital Images. 1331-1346 - Ji He
, Jia Liu
, Yulong Shen
, Xiaohong Jiang
, Norio Shiratori:
Link Selection for Security-QoS Tradeoffs in Buffer-Aided Relaying Networks. 1347-1362 - Ning Wang
, Long Jiao, Amir Alipour-Fanid, Monireh Dabaghchian
, Kai Zeng
:
Pilot Contamination Attack Detection for NOMA in 5G mm-Wave Massive MIMO Networks. 1363-1378 - Michele Boreale
, Fabio Corradi
, Cecilia Viscardi
:
Relative Privacy Threats and Learning From Anonymized Data. 1379-1393 - Zhihang Li
, Xu Tang, Xiang Wu
, Jingtuo Liu
, Ran He
:
Progressively Refined Face Detection Through Semantics-Enriched Representation Learning. 1394-1406 - Fan Zhang
, Xiaofei Dong
, Bolin Yang
, Yajin Zhou
, Kui Ren
:
A Systematic Evaluation of Wavelet-Based Attack Framework on Random Delay Countermeasures. 1407-1422 - Kisong Lee
, Jin-Taek Lim
, Hyun-Ho Choi
:
Impact of Outdated CSI on the Secrecy Performance of Wireless-Powered Untrusted Relay Networks. 1423-1433 - Jan Butora
, Jessica J. Fridrich:
Reverse JPEG Compatibility Attack. 1444-1454 - David Formby
, Raheem Beyah
:
Temporal Execution Behavior for Host Anomaly Detection in Programmable Logic Controllers. 1455-1469 - Neetesh Saxena
, Mauro Conti
, Kim-Kwang Raymond Choo
, Narendra S. Chaudhari:
BAS-VAS: A Novel Secure Protocol for Value Added Service Delivery to Mobile Devices. 1470-1485 - Lingchen Zhao, Qian Wang
, Qin Zou
, Yan Zhang, Yanjiao Chen
:
Privacy-Preserving Collaborative Deep Learning With Unreliable Participants. 1486-1500 - Xiaofeng Liu
, Zhenhua Guo
, Jane You
, B. V. K. Vijaya Kumar
:
Dependency-Aware Attention Control for Image Set-Based Face Recognition. 1501-1512 - Ahmed A. Zewail
, Aylin Yener
:
Device-to-Device Secure Coded Caching. 1513-1524 - Guo-lin Shao
, Xingshu Chen
, Xuemei Zeng
, Lina Wang:
Deep Learning Hierarchical Representation From Heterogeneous Flow-Level Communication Data. 1525-1540 - Alexander Bunin
, Ziv Goldfeld, Haim H. Permuter, Shlomo Shamai Shitz
, Paul Cuff, Pablo Piantanida:
Key and Message Semantic-Security Over State-Dependent Channels. 1541-1556