Search dblp for Publications

export results for "stream:streams/journals/tifs:"

more than 1000 matches, exporting first 1000 hits only!

 download as .bib file

@article{DBLP:journals/tifs/AlbieroZKB22,
  author    = {V{\'{\i}}tor Albiero and
               Kai Zhang and
               Michael C. King and
               Kevin W. Bowyer},
  title     = {Gendered Differences in Face Recognition Accuracy Explained by Hairstyles,
               Makeup, and Facial Morphology},
  journal   = {{IEEE} Trans. Inf. Forensics Secur.},
  volume    = {17},
  pages     = {127--137},
  year      = {2022},
  url       = {https://doi.org/10.1109/TIFS.2021.3135750},
  doi       = {10.1109/TIFS.2021.3135750},
  timestamp = {Tue, 08 Feb 2022 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/journals/tifs/AlbieroZKB22.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/AsaadWBMSP22,
  author    = {Saba Asaad and
               Yifei Wu and
               Ali Bereyhi and
               Ralf R. M{\"{u}}ller and
               Rafael F. Schaefer and
               H. Vincent Poor},
  title     = {Secure Active and Passive Beamforming in IRS-Aided {MIMO} Systems},
  journal   = {{IEEE} Trans. Inf. Forensics Secur.},
  volume    = {17},
  pages     = {1300--1315},
  year      = {2022},
  url       = {https://doi.org/10.1109/TIFS.2022.3159108},
  doi       = {10.1109/TIFS.2022.3159108},
  timestamp = {Wed, 27 Apr 2022 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/tifs/AsaadWBMSP22.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/BayEHSV22,
  author    = {Asl{\'{\i}} Bay and
               Zekeriya Erkin and
               Jaap{-}Henk Hoepman and
               Simona Samardjiska and
               Jelle Vos},
  title     = {Practical Multi-Party Private Set Intersection Protocols},
  journal   = {{IEEE} Trans. Inf. Forensics Secur.},
  volume    = {17},
  pages     = {1--15},
  year      = {2022},
  url       = {https://doi.org/10.1109/TIFS.2021.3118879},
  doi       = {10.1109/TIFS.2021.3118879},
  timestamp = {Sat, 08 Jan 2022 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/journals/tifs/BayEHSV22.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/BiSLXLG22,
  author    = {Xiuli Bi and
               Chao Shuai and
               Bo Liu and
               Bin Xiao and
               Weisheng Li and
               Xinbo Gao},
  title     = {Privacy-Preserving Color Image Feature Extraction by Quaternion Discrete
               Orthogonal Moments},
  journal   = {{IEEE} Trans. Inf. Forensics Secur.},
  volume    = {17},
  pages     = {1655--1668},
  year      = {2022},
  url       = {https://doi.org/10.1109/TIFS.2022.3170268},
  doi       = {10.1109/TIFS.2022.3170268},
  timestamp = {Thu, 02 Jun 2022 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/tifs/BiSLXLG22.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/BonnetFB22,
  author    = {Beno{\^{\i}}t Bonnet and
               Teddy Furon and
               Patrick Bas},
  title     = {Generating Adversarial Images in Quantized Domains},
  journal   = {{IEEE} Trans. Inf. Forensics Secur.},
  volume    = {17},
  pages     = {373--385},
  year      = {2022},
  url       = {https://doi.org/10.1109/TIFS.2021.3138616},
  doi       = {10.1109/TIFS.2021.3138616},
  timestamp = {Tue, 08 Feb 2022 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/journals/tifs/BonnetFB22.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/BronchainDMS22,
  author    = {Olivier Bronchain and
               Fran{\c{c}}ois Durvaux and
               Lo{\"{\i}}c Masure and
               Fran{\c{c}}ois{-}Xavier Standaert},
  title     = {Efficient Profiled Side-Channel Analysis of Masked Implementations,
               Extended},
  journal   = {{IEEE} Trans. Inf. Forensics Secur.},
  volume    = {17},
  pages     = {574--584},
  year      = {2022},
  url       = {https://doi.org/10.1109/TIFS.2022.3144871},
  doi       = {10.1109/TIFS.2022.3144871},
  timestamp = {Wed, 23 Feb 2022 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/journals/tifs/BronchainDMS22.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/CabriMRS22,
  author    = {Alberto Cabri and
               Francesco Masulli and
               Stefano Rovetta and
               Grazyna Suchacka},
  title     = {A Quantum-Inspired Classifier for Early Web Bot Detection},
  journal   = {{IEEE} Trans. Inf. Forensics Secur.},
  volume    = {17},
  pages     = {1684--1697},
  year      = {2022},
  url       = {https://doi.org/10.1109/TIFS.2022.3170237},
  doi       = {10.1109/TIFS.2022.3170237},
  timestamp = {Thu, 02 Jun 2022 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/tifs/CabriMRS22.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/CaiLWLHK22,
  author    = {Rizhao Cai and
               Zhi Li and
               Renjie Wan and
               Haoliang Li and
               Yongjian Hu and
               Alex C. Kot},
  title     = {Learning Meta Pattern for Face Anti-Spoofing},
  journal   = {{IEEE} Trans. Inf. Forensics Secur.},
  volume    = {17},
  pages     = {1201--1213},
  year      = {2022},
  url       = {https://doi.org/10.1109/TIFS.2022.3158551},
  doi       = {10.1109/TIFS.2022.3158551},
  timestamp = {Tue, 03 May 2022 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/tifs/CaiLWLHK22.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/ChenADOGJ22,
  author    = {Kejun Chen and
               Orlando Arias and
               Qingxu Deng and
               Daniela Oliveira and
               Xiaolong Guo and
               Yier Jin},
  title     = {FineDIFT: Fine-Grained Dynamic Information Flow Tracking for Data-Flow
               Integrity Using Coprocessor},
  journal   = {{IEEE} Trans. Inf. Forensics Secur.},
  volume    = {17},
  pages     = {559--573},
  year      = {2022},
  url       = {https://doi.org/10.1109/TIFS.2022.3144868},
  doi       = {10.1109/TIFS.2022.3144868},
  timestamp = {Wed, 23 Feb 2022 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/journals/tifs/ChenADOGJ22.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/ChenGLY22,
  author    = {Shengjie Chen and
               Zhenhua Guo and
               Xiu Li and
               Dongliang Yang},
  title     = {Query2Set: Single-to-Multiple Partial Fingerprint Recognition Based
               on Attention Mechanism},
  journal   = {{IEEE} Trans. Inf. Forensics Secur.},
  volume    = {17},
  pages     = {1243--1253},
  year      = {2022},
  url       = {https://doi.org/10.1109/TIFS.2022.3159151},
  doi       = {10.1109/TIFS.2022.3159151},
  timestamp = {Wed, 27 Apr 2022 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/tifs/ChenGLY22.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/ChenHLCZDL22,
  author    = {Xiaohui Chen and
               Zhiyu Hao and
               Lun Li and
               Lei Cui and
               Yiran Zhu and
               Zhenquan Ding and
               Yongji Liu},
  title     = {CruParamer: Learning on Parameter-Augmented {API} Sequences for Malware
               Detection},
  journal   = {{IEEE} Trans. Inf. Forensics Secur.},
  volume    = {17},
  pages     = {788--803},
  year      = {2022},
  url       = {https://doi.org/10.1109/TIFS.2022.3152360},
  doi       = {10.1109/TIFS.2022.3152360},
  timestamp = {Fri, 01 Apr 2022 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/tifs/ChenHLCZDL22.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/ChenHNZL22,
  author    = {Haixia Chen and
               Xinyi Huang and
               Jianting Ning and
               Futai Zhang and
               Chao Lin},
  title     = {{VILS:} {A} Verifiable Image Licensing System},
  journal   = {{IEEE} Trans. Inf. Forensics Secur.},
  volume    = {17},
  pages     = {1420--1434},
  year      = {2022},
  url       = {https://doi.org/10.1109/TIFS.2022.3162105},
  doi       = {10.1109/TIFS.2022.3162105},
  timestamp = {Wed, 18 May 2022 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/tifs/ChenHNZL22.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/ChenLW22,
  author    = {Mingliang Chen and
               Xin Liao and
               Min Wu},
  title     = {PulseEdit: Editing Physiological Signals in Facial Videos for Privacy
               Protection},
  journal   = {{IEEE} Trans. Inf. Forensics Secur.},
  volume    = {17},
  pages     = {457--471},
  year      = {2022},
  url       = {https://doi.org/10.1109/TIFS.2022.3142993},
  doi       = {10.1109/TIFS.2022.3142993},
  timestamp = {Wed, 23 Feb 2022 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/journals/tifs/ChenLW22.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/ChenQRH22,
  author    = {Yanli Chen and
               Tong Qiao and
               Florent Retraint and
               Gengran Hu},
  title     = {Efficient Privacy-Preserving Forensic Method for Camera Model Identification},
  journal   = {{IEEE} Trans. Inf. Forensics Secur.},
  volume    = {17},
  pages     = {2378--2393},
  year      = {2022},
  url       = {https://doi.org/10.1109/TIFS.2022.3185769},
  doi       = {10.1109/TIFS.2022.3185769},
  timestamp = {Mon, 08 Aug 2022 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/tifs/ChenQRH22.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/ChenWFGYD22,
  author    = {Zhenzhu Chen and
               Shang Wang and
               Anmin Fu and
               Yansong Gao and
               Shui Yu and
               Robert H. Deng},
  title     = {LinkBreaker: Breaking the Backdoor-Trigger Link in DNNs via Neurons
               Consistency Check},
  journal   = {{IEEE} Trans. Inf. Forensics Secur.},
  volume    = {17},
  pages     = {2000--2014},
  year      = {2022},
  url       = {https://doi.org/10.1109/TIFS.2022.3175616},
  doi       = {10.1109/TIFS.2022.3175616},
  timestamp = {Mon, 13 Jun 2022 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/tifs/ChenWFGYD22.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/ChengGD22,
  author    = {Wei Cheng and
               Sylvain Guilley and
               Jean{-}Luc Danger},
  title     = {Information Leakage in Code-Based Masking: {A} Systematic Evaluation
               by Higher-Order Attacks},
  journal   = {{IEEE} Trans. Inf. Forensics Secur.},
  volume    = {17},
  pages     = {1624--1638},
  year      = {2022},
  url       = {https://doi.org/10.1109/TIFS.2022.3167914},
  doi       = {10.1109/TIFS.2022.3167914},
  timestamp = {Thu, 02 Jun 2022 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/tifs/ChengGD22.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/CheonKP22,
  author    = {Jung Hee Cheon and
               Wootae Kim and
               Jai Hyun Park},
  title     = {Efficient Homomorphic Evaluation on Large Intervals},
  journal   = {{IEEE} Trans. Inf. Forensics Secur.},
  volume    = {17},
  pages     = {2553--2568},
  year      = {2022},
  url       = {https://doi.org/10.1109/TIFS.2022.3188145},
  doi       = {10.1109/TIFS.2022.3188145},
  timestamp = {Mon, 08 Aug 2022 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/tifs/CheonKP22.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/ChoiWHWR22,
  author    = {Jisoo Choi and
               Chau{-}Wai Wong and
               Adi Hajj{-}Ahmad and
               Min Wu and
               Yanpin Ren},
  title     = {Invisible Geolocation Signature Extraction From a Single Image},
  journal   = {{IEEE} Trans. Inf. Forensics Secur.},
  volume    = {17},
  pages     = {2598--2613},
  year      = {2022},
  url       = {https://doi.org/10.1109/TIFS.2022.3185775},
  doi       = {10.1109/TIFS.2022.3185775},
  timestamp = {Mon, 08 Aug 2022 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/tifs/ChoiWHWR22.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/ChorariaCMS22,
  author    = {Moulik Choraria and
               Arpan Chattopadhyay and
               Urbashi Mitra and
               Erik G. Str{\"{o}}m},
  title     = {Design of False Data Injection Attack on Distributed Process Estimation},
  journal   = {{IEEE} Trans. Inf. Forensics Secur.},
  volume    = {17},
  pages     = {670--683},
  year      = {2022},
  url       = {https://doi.org/10.1109/TIFS.2022.3146078},
  doi       = {10.1109/TIFS.2022.3146078},
  timestamp = {Tue, 15 Mar 2022 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/journals/tifs/ChorariaCMS22.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/CogranneGB22,
  author    = {R{\'{e}}mi Cogranne and
               Quentin Giboulot and
               Patrick Bas},
  title     = {Efficient Steganography in {JPEG} Images by Minimizing Performance
               of Optimal Detector},
  journal   = {{IEEE} Trans. Inf. Forensics Secur.},
  volume    = {17},
  pages     = {1328--1343},
  year      = {2022},
  url       = {https://doi.org/10.1109/TIFS.2021.3111713},
  doi       = {10.1109/TIFS.2021.3111713},
  timestamp = {Wed, 18 May 2022 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/tifs/CogranneGB22.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/DaiLLMS22,
  author    = {Bin Dai and
               Chong Li and
               Yingbin Liang and
               Zheng Ma and
               Shlomo Shamai},
  title     = {Self-Secure Capacity-Achieving Feedback Schemes of Gaussian Multiple-Access
               Wiretap Channels With Degraded Message Sets},
  journal   = {{IEEE} Trans. Inf. Forensics Secur.},
  volume    = {17},
  pages     = {1583--1596},
  year      = {2022},
  url       = {https://doi.org/10.1109/TIFS.2022.3164196},
  doi       = {10.1109/TIFS.2022.3164196},
  timestamp = {Wed, 18 May 2022 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/tifs/DaiLLMS22.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/DizdarC22,
  author    = {Onur Dizdar and
               Bruno Clerckx},
  title     = {Rate-Splitting Multiple Access for Communications and Jamming in Multi-Antenna
               Multi-Carrier Cognitive Radio Systems},
  journal   = {{IEEE} Trans. Inf. Forensics Secur.},
  volume    = {17},
  pages     = {628--643},
  year      = {2022},
  url       = {https://doi.org/10.1109/TIFS.2022.3149145},
  doi       = {10.1109/TIFS.2022.3149145},
  timestamp = {Tue, 15 Mar 2022 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/journals/tifs/DizdarC22.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/DuCZGW22,
  author    = {Chuan Du and
               Yulai Cong and
               Lei Zhang and
               Dandan Guo and
               Song Wei},
  title     = {A Practical Deceptive Jamming Method Based on Vulnerable Location
               Awareness Adversarial Attack for Radar {HRRP} Target Recognition},
  journal   = {{IEEE} Trans. Inf. Forensics Secur.},
  volume    = {17},
  pages     = {2410--2424},
  year      = {2022},
  url       = {https://doi.org/10.1109/TIFS.2022.3170275},
  doi       = {10.1109/TIFS.2022.3170275},
  timestamp = {Mon, 08 Aug 2022 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/tifs/DuCZGW22.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/EkenstedtOLJYK22,
  author    = {Emelie Ekenstedt and
               Lawrence Ong and
               Yucheng Liu and
               Sarah Johnson and
               Phee Lep Yeoh and
               J{\"{o}}rg Kliewer},
  title     = {When Differential Privacy Implies Syntactic Privacy},
  journal   = {{IEEE} Trans. Inf. Forensics Secur.},
  volume    = {17},
  pages     = {2110--2124},
  year      = {2022},
  url       = {https://doi.org/10.1109/TIFS.2022.3177953},
  doi       = {10.1109/TIFS.2022.3177953},
  timestamp = {Mon, 25 Jul 2022 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/tifs/EkenstedtOLJYK22.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/EsmaeilpourCK22,
  author    = {Mohammad Esmaeilpour and
               Patrick Cardinal and
               Alessandro Lameiras Koerich},
  title     = {Multidiscriminator Sobolev Defense-GAN Against Adversarial Attacks
               for End-to-End Speech Systems},
  journal   = {{IEEE} Trans. Inf. Forensics Secur.},
  volume    = {17},
  pages     = {2044--2058},
  year      = {2022},
  url       = {https://doi.org/10.1109/TIFS.2022.3175603},
  doi       = {10.1109/TIFS.2022.3175603},
  timestamp = {Mon, 25 Jul 2022 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/tifs/EsmaeilpourCK22.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/FengV22,
  author    = {Ce Feng and
               Parv Venkitasubramaniam},
  title     = {Inferential Separation for Privacy: Irrelevant Statistics and Quantization},
  journal   = {{IEEE} Trans. Inf. Forensics Secur.},
  volume    = {17},
  pages     = {2241--2255},
  year      = {2022},
  url       = {https://doi.org/10.1109/TIFS.2022.3181859},
  doi       = {10.1109/TIFS.2022.3181859},
  timestamp = {Mon, 25 Jul 2022 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/tifs/FengV22.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/FukamiSRGL22,
  author    = {Aya Fukami and
               Sasha Sheremetov and
               Francesco Regazzoni and
               Zeno J. M. H. Geradts and
               Cees De Laat},
  title     = {Experimental Evaluation of e.MMC Data Recovery},
  journal   = {{IEEE} Trans. Inf. Forensics Secur.},
  volume    = {17},
  pages     = {2074--2083},
  year      = {2022},
  url       = {https://doi.org/10.1109/TIFS.2022.3176187},
  doi       = {10.1109/TIFS.2022.3176187},
  timestamp = {Mon, 25 Jul 2022 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/tifs/FukamiSRGL22.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/Gaeta22,
  author    = {Rossano Gaeta},
  title     = {On the Impact of Pollution Attacks on Coding-Based Distributed Storage
               Systems},
  journal   = {{IEEE} Trans. Inf. Forensics Secur.},
  volume    = {17},
  pages     = {292--302},
  year      = {2022},
  url       = {https://doi.org/10.1109/TIFS.2022.3140924},
  doi       = {10.1109/TIFS.2022.3140924},
  timestamp = {Tue, 08 Feb 2022 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/journals/tifs/Gaeta22.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/GeF22,
  author    = {Yimeng Ge and
               Jiancun Fan},
  title     = {Robust Secure Beamforming for Intelligent Reflecting Surface Assisted
               Full-Duplex {MISO} Systems},
  journal   = {{IEEE} Trans. Inf. Forensics Secur.},
  volume    = {17},
  pages     = {253--264},
  year      = {2022},
  url       = {https://doi.org/10.1109/TIFS.2021.3137754},
  doi       = {10.1109/TIFS.2021.3137754},
  timestamp = {Fri, 21 Jan 2022 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/journals/tifs/GeF22.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/GiboulotBC22,
  author    = {Quentin Giboulot and
               Patrick Bas and
               R{\'{e}}mi Cogranne},
  title     = {Multivariate Side-Informed Gaussian Embedding Minimizing Statistical
               Detectability},
  journal   = {{IEEE} Trans. Inf. Forensics Secur.},
  volume    = {17},
  pages     = {1841--1854},
  year      = {2022},
  url       = {https://doi.org/10.1109/TIFS.2022.3173184},
  doi       = {10.1109/TIFS.2022.3173184},
  timestamp = {Mon, 13 Jun 2022 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/tifs/GiboulotBC22.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/GoelM22,
  author    = {Amish Goel and
               Pierre Moulin},
  title     = {Fast Locally Optimal Detection of Targeted Universal Adversarial Perturbations},
  journal   = {{IEEE} Trans. Inf. Forensics Secur.},
  volume    = {17},
  pages     = {1757--1770},
  year      = {2022},
  url       = {https://doi.org/10.1109/TIFS.2022.3169922},
  doi       = {10.1109/TIFS.2022.3169922},
  timestamp = {Thu, 02 Jun 2022 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/tifs/GoelM22.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/GrattonVAW22,
  author    = {Cristiano Gratton and
               Naveen K. D. Venkategowda and
               Reza Arablouei and
               Stefan Werner},
  title     = {Privacy-Preserved Distributed Learning With Zeroth-Order Optimization},
  journal   = {{IEEE} Trans. Inf. Forensics Secur.},
  volume    = {17},
  pages     = {265--279},
  year      = {2022},
  url       = {https://doi.org/10.1109/TIFS.2021.3139267},
  doi       = {10.1109/TIFS.2021.3139267},
  timestamp = {Fri, 21 Jan 2022 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/journals/tifs/GrattonVAW22.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/GroszELJ22,
  author    = {Steven A. Grosz and
               Joshua J. Engelsma and
               Eryun Liu and
               Anil K. Jain},
  title     = {{C2CL:} Contact to Contactless Fingerprint Matching},
  journal   = {{IEEE} Trans. Inf. Forensics Secur.},
  volume    = {17},
  pages     = {196--210},
  year      = {2022},
  url       = {https://doi.org/10.1109/TIFS.2021.3134867},
  doi       = {10.1109/TIFS.2021.3134867},
  timestamp = {Fri, 21 Jan 2022 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/journals/tifs/GroszELJ22.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/GuCLWLJM22,
  author    = {Jianyang Gu and
               Weihua Chen and
               Hao Luo and
               Fan Wang and
               Hao Li and
               Wei Jiang and
               Weijie Mao},
  title     = {Multi-View Evolutionary Training for Unsupervised Domain Adaptive
               Person Re-Identification},
  journal   = {{IEEE} Trans. Inf. Forensics Secur.},
  volume    = {17},
  pages     = {344--356},
  year      = {2022},
  url       = {https://doi.org/10.1109/TIFS.2022.3140696},
  doi       = {10.1109/TIFS.2022.3140696},
  timestamp = {Tue, 08 Feb 2022 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/journals/tifs/GuCLWLJM22.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/GursoyLCTW22,
  author    = {Mehmet Emre Gursoy and
               Ling Liu and
               Ka Ho Chow and
               Stacey Truex and
               Wenqi Wei},
  title     = {An Adversarial Approach to Protocol Analysis and Selection in Local
               Differential Privacy},
  journal   = {{IEEE} Trans. Inf. Forensics Secur.},
  volume    = {17},
  pages     = {1785--1799},
  year      = {2022},
  url       = {https://doi.org/10.1109/TIFS.2022.3170242},
  doi       = {10.1109/TIFS.2022.3170242},
  timestamp = {Thu, 02 Jun 2022 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/tifs/GursoyLCTW22.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/HadwigerR22,
  author    = {Benjamin Christopher Hadwiger and
               Christian Riess},
  title     = {Deep Metric Color Embeddings for Splicing Localization in Severely
               Degraded Images},
  journal   = {{IEEE} Trans. Inf. Forensics Secur.},
  volume    = {17},
  pages     = {2614--2627},
  year      = {2022},
  url       = {https://doi.org/10.1109/TIFS.2022.3189527},
  doi       = {10.1109/TIFS.2022.3189527},
  timestamp = {Mon, 08 Aug 2022 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/tifs/HadwigerR22.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/HajimaghsoodiJ22,
  author    = {Mosayeb Hajimaghsoodi and
               Rasool Jalili},
  title     = {{RAD:} {A} Statistical Mechanism Based on Behavioral Analysis for
               DDoS Attack Countermeasure},
  journal   = {{IEEE} Trans. Inf. Forensics Secur.},
  volume    = {17},
  pages     = {2732--2745},
  year      = {2022},
  url       = {https://doi.org/10.1109/TIFS.2022.3172598},
  doi       = {10.1109/TIFS.2022.3172598},
  timestamp = {Mon, 08 Aug 2022 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/tifs/HajimaghsoodiJ22.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/HongDH22,
  author    = {Shu Hong and
               Lingjie Duan and
               Jianwei Huang},
  title     = {Protecting Location Privacy by Multiquery: {A} Dynamic Bayesian Game
               Theoretic Approach},
  journal   = {{IEEE} Trans. Inf. Forensics Secur.},
  volume    = {17},
  pages     = {2569--2584},
  year      = {2022},
  url       = {https://doi.org/10.1109/TIFS.2022.3189531},
  doi       = {10.1109/TIFS.2022.3189531},
  timestamp = {Mon, 08 Aug 2022 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/tifs/HongDH22.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/HuH22,
  author    = {Weipeng Hu and
               Haifeng Hu},
  title     = {Domain-Private Factor Detachment Network for {NIR-VIS} Face Recognition},
  journal   = {{IEEE} Trans. Inf. Forensics Secur.},
  volume    = {17},
  pages     = {1435--1449},
  year      = {2022},
  url       = {https://doi.org/10.1109/TIFS.2022.3160612},
  doi       = {10.1109/TIFS.2022.3160612},
  timestamp = {Wed, 18 May 2022 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/tifs/HuH22.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/HuLZQ22,
  author    = {Changjie Hu and
               Quanzhong Li and
               Qi Zhang and
               Jiayin Qin},
  title     = {Security Optimization for an {AF} {MIMO} Two-Way Relay-Assisted Cognitive
               Radio Nonorthogonal Multiple Access Networks With {SWIPT}},
  journal   = {{IEEE} Trans. Inf. Forensics Secur.},
  volume    = {17},
  pages     = {1481--1496},
  year      = {2022},
  url       = {https://doi.org/10.1109/TIFS.2022.3163842},
  doi       = {10.1109/TIFS.2022.3163842},
  timestamp = {Wed, 18 May 2022 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/tifs/HuLZQ22.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/HuangC22,
  author    = {Yujin Huang and
               Chunyang Chen},
  title     = {Smart App Attack: Hacking Deep Learning Models in Android Apps},
  journal   = {{IEEE} Trans. Inf. Forensics Secur.},
  volume    = {17},
  pages     = {1827--1840},
  year      = {2022},
  url       = {https://doi.org/10.1109/TIFS.2022.3172213},
  doi       = {10.1109/TIFS.2022.3172213},
  timestamp = {Thu, 02 Jun 2022 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/tifs/HuangC22.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/HuangJBZ22,
  author    = {Linan Huang and
               Shumeng Jia and
               Emily Balcetis and
               Quanyan Zhu},
  title     = {{ADVERT:} An Adaptive and Data-Driven Attention Enhancement Mechanism
               for Phishing Prevention},
  journal   = {{IEEE} Trans. Inf. Forensics Secur.},
  volume    = {17},
  pages     = {2585--2597},
  year      = {2022},
  url       = {https://doi.org/10.1109/TIFS.2022.3189530},
  doi       = {10.1109/TIFS.2022.3189530},
  timestamp = {Mon, 08 Aug 2022 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/tifs/HuangJBZ22.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/HuangJGLP22,
  author    = {Yihao Huang and
               Felix Juefei{-}Xu and
               Qing Guo and
               Yang Liu and
               Geguang Pu},
  title     = {FakeLocator: Robust Localization of GAN-Based Face Manipulations},
  journal   = {{IEEE} Trans. Inf. Forensics Secur.},
  volume    = {17},
  pages     = {2657--2672},
  year      = {2022},
  url       = {https://doi.org/10.1109/TIFS.2022.3141262},
  doi       = {10.1109/TIFS.2022.3141262},
  timestamp = {Mon, 08 Aug 2022 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/tifs/HuangJGLP22.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/HuangLBS22,
  author    = {Da{-}Wen Huang and
               Fengji Luo and
               Jichao Bi and
               Mingyang Sun},
  title     = {An Efficient Hybrid {IDS} Deployment Architecture for Multi-Hop Clustered
               Wireless Sensor Networks},
  journal   = {{IEEE} Trans. Inf. Forensics Secur.},
  volume    = {17},
  pages     = {2688--2702},
  year      = {2022},
  url       = {https://doi.org/10.1109/TIFS.2022.3191491},
  doi       = {10.1109/TIFS.2022.3191491},
  timestamp = {Mon, 08 Aug 2022 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/tifs/HuangLBS22.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/InoueMOUH22,
  author    = {Akiko Inoue and
               Kazuhiko Minematsu and
               Maya Oda and
               Rei Ueno and
               Naofumi Homma},
  title     = {{ELM:} {A} Low-Latency and Scalable Memory Encryption Scheme},
  journal   = {{IEEE} Trans. Inf. Forensics Secur.},
  volume    = {17},
  pages     = {2628--2643},
  year      = {2022},
  url       = {https://doi.org/10.1109/TIFS.2022.3188146},
  doi       = {10.1109/TIFS.2022.3188146},
  timestamp = {Mon, 08 Aug 2022 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/tifs/InoueMOUH22.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/JiaZS22,
  author    = {Yunpei Jia and
               Jie Zhang and
               Shiguang Shan},
  title     = {Dual-Branch Meta-Learning Network With Distribution Alignment for
               Face Anti-Spoofing},
  journal   = {{IEEE} Trans. Inf. Forensics Secur.},
  volume    = {17},
  pages     = {138--151},
  year      = {2022},
  url       = {https://doi.org/10.1109/TIFS.2021.3134869},
  doi       = {10.1109/TIFS.2021.3134869},
  timestamp = {Fri, 21 Jan 2022 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/journals/tifs/JiaZS22.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/JiangLJZ22,
  author    = {Jiajia Jiang and
               Songxuan Lai and
               Lianwen Jin and
               Yecheng Zhu},
  title     = {DsDTW: Local Representation Learning With Deep soft-DTW for Dynamic
               Signature Verification},
  journal   = {{IEEE} Trans. Inf. Forensics Secur.},
  volume    = {17},
  pages     = {2198--2212},
  year      = {2022},
  url       = {https://doi.org/10.1109/TIFS.2022.3180219},
  doi       = {10.1109/TIFS.2022.3180219},
  timestamp = {Mon, 25 Jul 2022 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/tifs/JiangLJZ22.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/JiangQZ22,
  author    = {Peng Jiang and
               Baoqi Qiu and
               Liehuang Zhu},
  title     = {Report When Malicious: Deniable and Accountable Searchable Message-Moderation
               System},
  journal   = {{IEEE} Trans. Inf. Forensics Secur.},
  volume    = {17},
  pages     = {1597--1609},
  year      = {2022},
  url       = {https://doi.org/10.1109/TIFS.2022.3167900},
  doi       = {10.1109/TIFS.2022.3167900},
  timestamp = {Wed, 18 May 2022 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/tifs/JiangQZ22.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/JiangZQZ22,
  author    = {Yili Jiang and
               Kuan Zhang and
               Yi Qian and
               Liang Zhou},
  title     = {Anonymous and Efficient Authentication Scheme for Privacy-Preserving
               Distributed Learning},
  journal   = {{IEEE} Trans. Inf. Forensics Secur.},
  volume    = {17},
  pages     = {2227--2240},
  year      = {2022},
  url       = {https://doi.org/10.1109/TIFS.2022.3181848},
  doi       = {10.1109/TIFS.2022.3181848},
  timestamp = {Mon, 25 Jul 2022 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/tifs/JiangZQZ22.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/KairouzLHVWS22,
  author    = {Peter Kairouz and
               Jiachun Liao and
               Chong Huang and
               Maunil Vyas and
               Monica Welfert and
               Lalitha Sankar},
  title     = {Generating Fair Universal Representations Using Adversarial Models},
  journal   = {{IEEE} Trans. Inf. Forensics Secur.},
  volume    = {17},
  pages     = {1970--1985},
  year      = {2022},
  url       = {https://doi.org/10.1109/TIFS.2022.3170265},
  doi       = {10.1109/TIFS.2022.3170265},
  timestamp = {Mon, 13 Jun 2022 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/tifs/KairouzLHVWS22.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/KhosravyNHNB22,
  author    = {Mahdi Khosravy and
               Kazuaki Nakamura and
               Yuki Hirose and
               Naoko Nitta and
               Noboru Babaguchi},
  title     = {Model Inversion Attack by Integration of Deep Generative Models: Privacy-Sensitive
               Face Generation From a Face Recognition System},
  journal   = {{IEEE} Trans. Inf. Forensics Secur.},
  volume    = {17},
  pages     = {357--372},
  year      = {2022},
  url       = {https://doi.org/10.1109/TIFS.2022.3140687},
  doi       = {10.1109/TIFS.2022.3140687},
  timestamp = {Tue, 08 Feb 2022 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/journals/tifs/KhosravyNHNB22.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/KongCLWRK22,
  author    = {Chenqi Kong and
               Baoliang Chen and
               Haoliang Li and
               Shiqi Wang and
               Anderson Rocha and
               Sam Kwong},
  title     = {Detect and Locate: Exposing Face Manipulation by Semantic- and Noise-Level
               Telltales},
  journal   = {{IEEE} Trans. Inf. Forensics Secur.},
  volume    = {17},
  pages     = {1741--1756},
  year      = {2022},
  url       = {https://doi.org/10.1109/TIFS.2022.3169921},
  doi       = {10.1109/TIFS.2022.3169921},
  timestamp = {Thu, 23 Jun 2022 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/tifs/KongCLWRK22.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/KorusM22,
  author    = {Pawel Korus and
               Nasir D. Memon},
  title     = {Computational Sensor Fingerprints},
  journal   = {{IEEE} Trans. Inf. Forensics Secur.},
  volume    = {17},
  pages     = {2508--2523},
  year      = {2022},
  url       = {https://doi.org/10.1109/TIFS.2022.3179945},
  doi       = {10.1109/TIFS.2022.3179945},
  timestamp = {Mon, 08 Aug 2022 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/tifs/KorusM22.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/KuzdeuovAKV22,
  author    = {Askat Kuzdeuov and
               Dana Aubakirova and
               Darina Koishigarina and
               Huseyin Atakan Varol},
  title     = {{TFW:} Annotated Thermal Faces in the Wild Dataset},
  journal   = {{IEEE} Trans. Inf. Forensics Secur.},
  volume    = {17},
  pages     = {2084--2094},
  year      = {2022},
  url       = {https://doi.org/10.1109/TIFS.2022.3177949},
  doi       = {10.1109/TIFS.2022.3177949},
  timestamp = {Mon, 25 Jul 2022 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/tifs/KuzdeuovAKV22.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/LiCLLHK22,
  author    = {Zhi Li and
               Rizhao Cai and
               Haoliang Li and
               Kwok{-}Yan Lam and
               Yongjian Hu and
               Alex C. Kot},
  title     = {One-Class Knowledge Distillation for Face Presentation Attack Detection},
  journal   = {{IEEE} Trans. Inf. Forensics Secur.},
  volume    = {17},
  pages     = {2137--2150},
  year      = {2022},
  url       = {https://doi.org/10.1109/TIFS.2022.3178240},
  doi       = {10.1109/TIFS.2022.3178240},
  timestamp = {Mon, 25 Jul 2022 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/tifs/LiCLLHK22.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/LiDLYZWXW22,
  author    = {Qi Li and
               Xinhao Deng and
               Zhuotao Liu and
               Yuan Yang and
               Xiaoyue Zou and
               Qian Wang and
               Mingwei Xu and
               Jianping Wu},
  title     = {Dynamic Network Security Function Enforcement via Joint Flow and Function
               Scheduling},
  journal   = {{IEEE} Trans. Inf. Forensics Secur.},
  volume    = {17},
  pages     = {486--499},
  year      = {2022},
  url       = {https://doi.org/10.1109/TIFS.2022.3142995},
  doi       = {10.1109/TIFS.2022.3142995},
  timestamp = {Wed, 23 Feb 2022 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/journals/tifs/LiDLYZWXW22.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/LiH22,
  author    = {Jie Li and
               Camilla Hollanti},
  title     = {Private and Secure Distributed Matrix Multiplication Schemes for Replicated
               or MDS-Coded Servers},
  journal   = {{IEEE} Trans. Inf. Forensics Secur.},
  volume    = {17},
  pages     = {659--669},
  year      = {2022},
  url       = {https://doi.org/10.1109/TIFS.2022.3147638},
  doi       = {10.1109/TIFS.2022.3147638},
  timestamp = {Tue, 15 Mar 2022 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/journals/tifs/LiH22.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/LiLSCY22,
  author    = {Junqiang Li and
               Senyi Li and
               Gang Sun and
               Ting Chen and
               Hongfang Yu},
  title     = {SNPSFuzzer: {A} Fast Greybox Fuzzer for Stateful Network Protocols
               Using Snapshots},
  journal   = {{IEEE} Trans. Inf. Forensics Secur.},
  volume    = {17},
  pages     = {2673--2687},
  year      = {2022},
  url       = {https://doi.org/10.1109/TIFS.2022.3192991},
  doi       = {10.1109/TIFS.2022.3192991},
  timestamp = {Mon, 08 Aug 2022 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/tifs/LiLSCY22.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/LiLWJZ22,
  author    = {Yanchu Li and
               Lingguang Lei and
               Yuewu Wang and
               Jiwu Jing and
               Quan Zhou},
  title     = {TrustSAMP: Securing Streaming Music Against Multivector Attacks on
               {ARM} Platform},
  journal   = {{IEEE} Trans. Inf. Forensics Secur.},
  volume    = {17},
  pages     = {1709--1724},
  year      = {2022},
  url       = {https://doi.org/10.1109/TIFS.2022.3170274},
  doi       = {10.1109/TIFS.2022.3170274},
  timestamp = {Thu, 02 Jun 2022 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/tifs/LiLWJZ22.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/LiLYP22,
  author    = {Long Li and
               Yu Luo and
               Jing Yang and
               Lina Pu},
  title     = {Reinforcement Learning Enabled Intelligent Energy Attack in Green
               IoT Networks},
  journal   = {{IEEE} Trans. Inf. Forensics Secur.},
  volume    = {17},
  pages     = {644--658},
  year      = {2022},
  url       = {https://doi.org/10.1109/TIFS.2022.3149148},
  doi       = {10.1109/TIFS.2022.3149148},
  timestamp = {Tue, 10 May 2022 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/tifs/LiLYP22.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/LiMFZ22,
  author    = {Shuyi Li and
               Ruijun Ma and
               Lunke Fei and
               Bob Zhang},
  title     = {Learning Compact Multirepresentation Feature Descriptor for Finger-Vein
               Recognition},
  journal   = {{IEEE} Trans. Inf. Forensics Secur.},
  volume    = {17},
  pages     = {1946--1958},
  year      = {2022},
  url       = {https://doi.org/10.1109/TIFS.2022.3172218},
  doi       = {10.1109/TIFS.2022.3172218},
  timestamp = {Wed, 15 Jun 2022 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/tifs/LiMFZ22.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/LiQWQZ22,
  author    = {Xinran Li and
               Chuan Qin and
               Zichi Wang and
               Zhenxing Qian and
               Xinpeng Zhang},
  title     = {Unified Performance Evaluation Method for Perceptual Image Hashing},
  journal   = {{IEEE} Trans. Inf. Forensics Secur.},
  volume    = {17},
  pages     = {1404--1419},
  year      = {2022},
  url       = {https://doi.org/10.1109/TIFS.2022.3161149},
  doi       = {10.1109/TIFS.2022.3161149},
  timestamp = {Wed, 18 May 2022 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/tifs/LiQWQZ22.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/LiSXRH22,
  author    = {Guyue Li and
               Chen Sun and
               Wei Xu and
               Marco Di Renzo and
               Aiqun Hu},
  title     = {On Maximizing the Sum Secret Key Rate for Reconfigurable Intelligent
               Surface-Assisted Multiuser Systems},
  journal   = {{IEEE} Trans. Inf. Forensics Secur.},
  volume    = {17},
  pages     = {211--225},
  year      = {2022},
  url       = {https://doi.org/10.1109/TIFS.2021.3138612},
  doi       = {10.1109/TIFS.2021.3138612},
  timestamp = {Fri, 21 Jan 2022 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/journals/tifs/LiSXRH22.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/LiWHY22,
  author    = {Tian Li and
               Huaqun Wang and
               Debiao He and
               Jia Yu},
  title     = {Synchronized Provable Data Possession Based on Blockchain for Digital
               Twin},
  journal   = {{IEEE} Trans. Inf. Forensics Secur.},
  volume    = {17},
  pages     = {472--485},
  year      = {2022},
  url       = {https://doi.org/10.1109/TIFS.2022.3144869},
  doi       = {10.1109/TIFS.2022.3144869},
  timestamp = {Wed, 23 Feb 2022 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/journals/tifs/LiWHY22.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/LiZCW22,
  author    = {Ding Li and
               Yuefei Zhu and
               Minghao Chen and
               Jue Wang},
  title     = {Minipatch: Undermining DNN-Based Website Fingerprinting With Adversarial
               Patches},
  journal   = {{IEEE} Trans. Inf. Forensics Secur.},
  volume    = {17},
  pages     = {2437--2451},
  year      = {2022},
  url       = {https://doi.org/10.1109/TIFS.2022.3186743},
  doi       = {10.1109/TIFS.2022.3186743},
  timestamp = {Mon, 08 Aug 2022 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/tifs/LiZCW22.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/LimayePS22,
  author    = {Nimisha Limaye and
               Satwik Patnaik and
               Ozgur Sinanoglu},
  title     = {Valkyrie: Vulnerability Assessment Tool and Attack for Provably-Secure
               Logic Locking Techniques},
  journal   = {{IEEE} Trans. Inf. Forensics Secur.},
  volume    = {17},
  pages     = {744--759},
  year      = {2022},
  url       = {https://doi.org/10.1109/TIFS.2022.3149147},
  doi       = {10.1109/TIFS.2022.3149147},
  timestamp = {Fri, 01 Apr 2022 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/tifs/LimayePS22.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/LiuGSALZF22,
  author    = {Yuanyuan Liu and
               Jiacheng Geng and
               Fanhua Shang and
               Weixin An and
               Hongying Liu and
               Qi Zhu and
               Wei Feng},
  title     = {Laplacian Smoothing Stochastic ADMMs With Differential Privacy Guarantees},
  journal   = {{IEEE} Trans. Inf. Forensics Secur.},
  volume    = {17},
  pages     = {1814--1826},
  year      = {2022},
  url       = {https://doi.org/10.1109/TIFS.2022.3170271},
  doi       = {10.1109/TIFS.2022.3170271},
  timestamp = {Thu, 02 Jun 2022 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/tifs/LiuGSALZF22.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/LiuLLLYW22,
  author    = {Weijie Liu and
               Ximeng Liu and
               Zhi Li and
               Bin Liu and
               Rongwei Yu and
               Lina Wang},
  title     = {Retrofitting {LBR} Profiling to Enhance Virtual Machine Introspection},
  journal   = {{IEEE} Trans. Inf. Forensics Secur.},
  volume    = {17},
  pages     = {2311--2323},
  year      = {2022},
  url       = {https://doi.org/10.1109/TIFS.2022.3183409},
  doi       = {10.1109/TIFS.2022.3183409},
  timestamp = {Mon, 25 Jul 2022 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/tifs/LiuLLLYW22.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/LiuLSFC22,
  author    = {Jiang Liu and
               Chun Pong Lau and
               Hossein Souri and
               Soheil Feizi and
               Rama Chellappa},
  title     = {Mutual Adversarial Training: Learning Together is Better Than Going
               Alone},
  journal   = {{IEEE} Trans. Inf. Forensics Secur.},
  volume    = {17},
  pages     = {2364--2377},
  year      = {2022},
  url       = {https://doi.org/10.1109/TIFS.2022.3184262},
  doi       = {10.1109/TIFS.2022.3184262},
  timestamp = {Mon, 25 Jul 2022 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/tifs/LiuLSFC22.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/LiuMLMR22,
  author    = {Yang Liu and
               Zhuo Ma and
               Ximeng Liu and
               Siqi Ma and
               Kui Ren},
  title     = {Privacy-Preserving Object Detection for Medical Images With Faster
               {R-CNN}},
  journal   = {{IEEE} Trans. Inf. Forensics Secur.},
  volume    = {17},
  pages     = {69--84},
  year      = {2022},
  url       = {https://doi.org/10.1109/TIFS.2019.2946476},
  doi       = {10.1109/TIFS.2019.2946476},
  timestamp = {Sat, 08 Jan 2022 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/journals/tifs/LiuMLMR22.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/LiuWYY22,
  author    = {Xiaoning Liu and
               Bang Wu and
               Xingliang Yuan and
               Xun Yi},
  title     = {Leia: {A} Lightweight Cryptographic Neural Network Inference System
               at the Edge},
  journal   = {{IEEE} Trans. Inf. Forensics Secur.},
  volume    = {17},
  pages     = {237--252},
  year      = {2022},
  url       = {https://doi.org/10.1109/TIFS.2021.3138611},
  doi       = {10.1109/TIFS.2021.3138611},
  timestamp = {Thu, 23 Jun 2022 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/tifs/LiuWYY22.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/LiuXWX22,
  author    = {Linfeng Liu and
               Zhiyuan Xi and
               Jiagao Wu and
               Jia Xu},
  title     = {Noise-Based-Protection Message Dissemination Method for Insecure Opportunistic
               Underwater Sensor Networks},
  journal   = {{IEEE} Trans. Inf. Forensics Secur.},
  volume    = {17},
  pages     = {1610--1623},
  year      = {2022},
  url       = {https://doi.org/10.1109/TIFS.2022.3167911},
  doi       = {10.1109/TIFS.2022.3167911},
  timestamp = {Wed, 18 May 2022 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/tifs/LiuXWX22.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/LiuZYWSLTEXLGLL22,
  author    = {Ajian Liu and
               Chenxu Zhao and
               Zitong Yu and
               Jun Wan and
               Anyang Su and
               Xing Liu and
               Zichang Tan and
               Sergio Escalera and
               Junliang Xing and
               Yanyan Liang and
               Guodong Guo and
               Zhen Lei and
               Stan Z. Li and
               Du Zhang},
  title     = {Contrastive Context-Aware Learning for 3D High-Fidelity Mask Face
               Presentation Attack Detection},
  journal   = {{IEEE} Trans. Inf. Forensics Secur.},
  volume    = {17},
  pages     = {2497--2507},
  year      = {2022},
  url       = {https://doi.org/10.1109/TIFS.2022.3188149},
  doi       = {10.1109/TIFS.2022.3188149},
  timestamp = {Mon, 08 Aug 2022 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/tifs/LiuZYWSLTEXLGLL22.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/LuAKWD22,
  author    = {Zhigang Lu and
               Hassan Jameel Asghar and
               Mohamed Ali K{\^{a}}afar and
               Darren Webb and
               Peter Dickinson},
  title     = {A Differentially Private Framework for Deep Learning With Convexified
               Loss Functions},
  journal   = {{IEEE} Trans. Inf. Forensics Secur.},
  volume    = {17},
  pages     = {2151--2165},
  year      = {2022},
  url       = {https://doi.org/10.1109/TIFS.2022.3169911},
  doi       = {10.1109/TIFS.2022.3169911},
  timestamp = {Mon, 25 Jul 2022 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/tifs/LuAKWD22.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/LuXNJW22,
  author    = {Xiaozhen Lu and
               Liang Xiao and
               Guohang Niu and
               Xiangyang Ji and
               Qian Wang},
  title     = {Safe Exploration in Wireless Security: {A} Safe Reinforcement Learning
               Algorithm With Hierarchical Structure},
  journal   = {{IEEE} Trans. Inf. Forensics Secur.},
  volume    = {17},
  pages     = {732--743},
  year      = {2022},
  url       = {https://doi.org/10.1109/TIFS.2022.3149396},
  doi       = {10.1109/TIFS.2022.3149396},
  timestamp = {Tue, 15 Mar 2022 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/journals/tifs/LuXNJW22.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/LuoWHHH22,
  author    = {Mandi Luo and
               Haoxue Wu and
               Huaibo Huang and
               Weizan He and
               Ran He},
  title     = {Memory-Modulated Transformer Network for Heterogeneous Face Recognition},
  journal   = {{IEEE} Trans. Inf. Forensics Secur.},
  volume    = {17},
  pages     = {2095--2109},
  year      = {2022},
  url       = {https://doi.org/10.1109/TIFS.2022.3177960},
  doi       = {10.1109/TIFS.2022.3177960},
  timestamp = {Mon, 25 Jul 2022 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/tifs/LuoWHHH22.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/MaJPW22,
  author    = {Pingchuan Ma and
               Zhenlan Ji and
               Qi Pang and
               Shuai Wang},
  title     = {NoLeaks: Differentially Private Causal Discovery Under Functional
               Causal Model},
  journal   = {{IEEE} Trans. Inf. Forensics Secur.},
  volume    = {17},
  pages     = {2324--2338},
  year      = {2022},
  url       = {https://doi.org/10.1109/TIFS.2022.3184263},
  doi       = {10.1109/TIFS.2022.3184263},
  timestamp = {Mon, 25 Jul 2022 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/tifs/MaJPW22.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/MaMMLD22,
  author    = {Zhuoran Ma and
               Jianfeng Ma and
               Yinbin Miao and
               Yingjiu Li and
               Robert H. Deng},
  title     = {ShieldFL: Mitigating Model Poisoning Attacks in Privacy-Preserving
               Federated Learning},
  journal   = {{IEEE} Trans. Inf. Forensics Secur.},
  volume    = {17},
  pages     = {1639--1654},
  year      = {2022},
  url       = {https://doi.org/10.1109/TIFS.2022.3169918},
  doi       = {10.1109/TIFS.2022.3169918},
  timestamp = {Thu, 02 Jun 2022 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/tifs/MaMMLD22.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/MaXNHD22,
  author    = {Jinhua Ma and
               Shengmin Xu and
               Jianting Ning and
               Xinyi Huang and
               Robert H. Deng},
  title     = {Redactable Blockchain in Decentralized Setting},
  journal   = {{IEEE} Trans. Inf. Forensics Secur.},
  volume    = {17},
  pages     = {1227--1242},
  year      = {2022},
  url       = {https://doi.org/10.1109/TIFS.2022.3156808},
  doi       = {10.1109/TIFS.2022.3156808},
  timestamp = {Wed, 27 Apr 2022 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/tifs/MaXNHD22.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/MarquesAEM22,
  author    = {Rafael Salema Marques and
               Haider M. Al{-}Khateeb and
               Gregory Epiphaniou and
               Carsten Maple},
  title     = {{APIVADS:} {A} Novel Privacy-Preserving Pivot Attack Detection Scheme
               Based on Statistical Pattern Recognition},
  journal   = {{IEEE} Trans. Inf. Forensics Secur.},
  volume    = {17},
  pages     = {700--715},
  year      = {2022},
  url       = {https://doi.org/10.1109/TIFS.2022.3146076},
  doi       = {10.1109/TIFS.2022.3146076},
  timestamp = {Tue, 15 Mar 2022 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/journals/tifs/MarquesAEM22.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/MirandaGLTW22,
  author    = {Tom{\'{a}}s Concepci{\'{o}}n Miranda and
               Pierre{-}Fran{\c{c}}ois Gimenez and
               Jean{-}Fran{\c{c}}ois Lalande and
               Val{\'{e}}rie Viet Triem Tong and
               Pierre Wilke},
  title     = {Debiasing Android Malware Datasets: How Can {I} Trust Your Results
               If Your Dataset Is Biased?},
  journal   = {{IEEE} Trans. Inf. Forensics Secur.},
  volume    = {17},
  pages     = {2182--2197},
  year      = {2022},
  url       = {https://doi.org/10.1109/TIFS.2022.3180184},
  doi       = {10.1109/TIFS.2022.3180184},
  timestamp = {Mon, 25 Jul 2022 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/tifs/MirandaGLTW22.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/NekoueiPSJ22,
  author    = {Ehsan Nekouei and
               Mohammad Pirani and
               Henrik Sandberg and
               Karl Henrik Johansson},
  title     = {A Randomized Filtering Strategy Against Inference Attacks on Active
               Steering Control Systems},
  journal   = {{IEEE} Trans. Inf. Forensics Secur.},
  volume    = {17},
  pages     = {16--27},
  year      = {2022},
  url       = {https://doi.org/10.1109/TIFS.2021.3130439},
  doi       = {10.1109/TIFS.2021.3130439},
  timestamp = {Sat, 08 Jan 2022 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/journals/tifs/NekoueiPSJ22.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/NosouhiSGD22,
  author    = {Mohammad Reza Nosouhi and
               Keshav Sood and
               Marthie Grobler and
               Robin Doss},
  title     = {Towards Spoofing Resistant Next Generation IoT Networks},
  journal   = {{IEEE} Trans. Inf. Forensics Secur.},
  volume    = {17},
  pages     = {1669--1683},
  year      = {2022},
  url       = {https://doi.org/10.1109/TIFS.2022.3170276},
  doi       = {10.1109/TIFS.2022.3170276},
  timestamp = {Thu, 02 Jun 2022 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/tifs/NosouhiSGD22.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/ObeadLRK22,
  author    = {Sarah A. Obead and
               Hsuan{-}Yin Lin and
               Eirik Rosnes and
               J{\"{o}}rg Kliewer},
  title     = {Private Polynomial Function Computation for Noncolluding Coded Databases},
  journal   = {{IEEE} Trans. Inf. Forensics Secur.},
  volume    = {17},
  pages     = {1800--1813},
  year      = {2022},
  url       = {https://doi.org/10.1109/TIFS.2022.3166667},
  doi       = {10.1109/TIFS.2022.3166667},
  timestamp = {Mon, 13 Jun 2022 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/tifs/ObeadLRK22.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/PadilhaSWARJ22,
  author    = {Rafael Padilha and
               Tawfiq Salem and
               Scott Workman and
               Fernanda A. Andal{\'{o}} and
               Anderson Rocha and
               Nathan Jacobs},
  title     = {Content-Aware Detection of Temporal Metadata Manipulation},
  journal   = {{IEEE} Trans. Inf. Forensics Secur.},
  volume    = {17},
  pages     = {1316--1327},
  year      = {2022},
  url       = {https://doi.org/10.1109/TIFS.2022.3159154},
  doi       = {10.1109/TIFS.2022.3159154},
  timestamp = {Wed, 27 Apr 2022 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/tifs/PadilhaSWARJ22.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/PangWHCW22,
  author    = {Meng Pang and
               Binghui Wang and
               Siyu Huang and
               Yiu{-}Ming Cheung and
               Bihan Wen},
  title     = {A Unified Framework for Bidirectional Prototype Learning From Contaminated
               Faces Across Heterogeneous Domains},
  journal   = {{IEEE} Trans. Inf. Forensics Secur.},
  volume    = {17},
  pages     = {1544--1557},
  year      = {2022},
  url       = {https://doi.org/10.1109/TIFS.2022.3164215},
  doi       = {10.1109/TIFS.2022.3164215},
  timestamp = {Wed, 18 May 2022 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/tifs/PangWHCW22.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/PengDYP22,
  author    = {Datian Peng and
               Jianmin Dong and
               Jungang Yang and
               Qinke Peng},
  title     = {Dynamical Failures Driven by False Load Injection Attacks Against
               Smart Grid},
  journal   = {{IEEE} Trans. Inf. Forensics Secur.},
  volume    = {17},
  pages     = {2213--2226},
  year      = {2022},
  url       = {https://doi.org/10.1109/TIFS.2022.3181860},
  doi       = {10.1109/TIFS.2022.3181860},
  timestamp = {Mon, 25 Jul 2022 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/tifs/PengDYP22.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/PengS22,
  author    = {Pei Peng and
               Emina Soljanin},
  title     = {Covert, Low-Delay, Coded Message Passing in Mobile (IoT) Networks},
  journal   = {{IEEE} Trans. Inf. Forensics Secur.},
  volume    = {17},
  pages     = {599--611},
  year      = {2022},
  url       = {https://doi.org/10.1109/TIFS.2022.3147642},
  doi       = {10.1109/TIFS.2022.3147642},
  timestamp = {Wed, 23 Feb 2022 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/journals/tifs/PengS22.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/PurwantoPBJ22,
  author    = {Rizka Widyarini Purwanto and
               Arindam Pal and
               Alan Blair and
               Sanjay Jha},
  title     = {PhishSim: Aiding Phishing Website Detection With a Feature-Free Tool},
  journal   = {{IEEE} Trans. Inf. Forensics Secur.},
  volume    = {17},
  pages     = {1497--1512},
  year      = {2022},
  url       = {https://doi.org/10.1109/TIFS.2022.3164212},
  doi       = {10.1109/TIFS.2022.3164212},
  timestamp = {Thu, 23 Jun 2022 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/tifs/PurwantoPBJ22.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/RaghebHKNH22,
  author    = {Mohammad Ragheb and
               Sayed Mostafa Safavi Hemami and
               Ali Kuhestani and
               Derrick Wing Kwan Ng and
               Lajos Hanzo},
  title     = {On the Physical Layer Security of Untrusted Millimeter Wave Relaying
               Networks: {A} Stochastic Geometry Approach},
  journal   = {{IEEE} Trans. Inf. Forensics Secur.},
  volume    = {17},
  pages     = {53--68},
  year      = {2022},
  url       = {https://doi.org/10.1109/TIFS.2021.3131028},
  doi       = {10.1109/TIFS.2021.3131028},
  timestamp = {Sat, 08 Jan 2022 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/journals/tifs/RaghebHKNH22.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/RajendranS22,
  author    = {Sekhar Rajendran and
               Zhi Sun},
  title     = {{RF} Impairment Model-Based IoT Physical-Layer Identification for
               Enhanced Domain Generalization},
  journal   = {{IEEE} Trans. Inf. Forensics Secur.},
  volume    = {17},
  pages     = {1285--1299},
  year      = {2022},
  url       = {https://doi.org/10.1109/TIFS.2022.3158553},
  doi       = {10.1109/TIFS.2022.3158553},
  timestamp = {Wed, 27 Apr 2022 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/tifs/RajendranS22.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/RaviBRC22,
  author    = {Prasanna Ravi and
               Shivam Bhasin and
               Sujoy Sinha Roy and
               Anupam Chattopadhyay},
  title     = {On Exploiting Message Leakage in (Few) {NIST} {PQC} Candidates for
               Practical Message Recovery Attacks},
  journal   = {{IEEE} Trans. Inf. Forensics Secur.},
  volume    = {17},
  pages     = {684--699},
  year      = {2022},
  url       = {https://doi.org/10.1109/TIFS.2021.3139268},
  doi       = {10.1109/TIFS.2021.3139268},
  timestamp = {Tue, 15 Mar 2022 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/journals/tifs/RaviBRC22.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/RenLMLWCD22,
  author    = {Yanbing Ren and
               Xinghua Li and
               Yinbin Miao and
               Bin Luo and
               Jian Weng and
               Kim{-}Kwang Raymond Choo and
               Robert H. Deng},
  title     = {Towards Privacy-Preserving Spatial Distribution Crowdsensing: {A}
               Game Theoretic Approach},
  journal   = {{IEEE} Trans. Inf. Forensics Secur.},
  volume    = {17},
  pages     = {804--818},
  year      = {2022},
  url       = {https://doi.org/10.1109/TIFS.2022.3152409},
  doi       = {10.1109/TIFS.2022.3152409},
  timestamp = {Fri, 01 Apr 2022 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/tifs/RenLMLWCD22.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/RenSGH22,
  author    = {Hengyi Ren and
               Lijuan Sun and
               Jian Guo and
               Chong Han},
  title     = {A Dataset and Benchmark for Multimodal Biometric Recognition Based
               on Fingerprint and Finger Vein},
  journal   = {{IEEE} Trans. Inf. Forensics Secur.},
  volume    = {17},
  pages     = {2030--2043},
  year      = {2022},
  url       = {https://doi.org/10.1109/TIFS.2022.3175599},
  doi       = {10.1109/TIFS.2022.3175599},
  timestamp = {Mon, 13 Jun 2022 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/tifs/RenSGH22.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/ResendeRDNA22,
  author    = {Amanda Cristina Davi Resende and
               Davis Railsback and
               Rafael Dowsley and
               Anderson C. A. Nascimento and
               Diego F. Aranha},
  title     = {Fast Privacy-Preserving Text Classification Based on Secure Multiparty
               Computation},
  journal   = {{IEEE} Trans. Inf. Forensics Secur.},
  volume    = {17},
  pages     = {428--442},
  year      = {2022},
  url       = {https://doi.org/10.1109/TIFS.2022.3144007},
  doi       = {10.1109/TIFS.2022.3144007},
  timestamp = {Sat, 09 Apr 2022 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/tifs/ResendeRDNA22.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/RoyBK22,
  author    = {Hiranmoy Roy and
               Debotosh Bhattacharjee and
               Ondrej Krejcar},
  title     = {Interpretable Local Frequency Binary Pattern (LFrBP) Based Joint Continual
               Learning Network for Heterogeneous Face Recognition},
  journal   = {{IEEE} Trans. Inf. Forensics Secur.},
  volume    = {17},
  pages     = {2125--2136},
  year      = {2022},
  url       = {https://doi.org/10.1109/TIFS.2022.3179951},
  doi       = {10.1109/TIFS.2022.3179951},
  timestamp = {Mon, 25 Jul 2022 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/tifs/RoyBK22.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/SadeghiK22,
  author    = {Parastoo Sadeghi and
               Mehdi Korki},
  title     = {Offset-Symmetric Gaussians for Differential Privacy},
  journal   = {{IEEE} Trans. Inf. Forensics Secur.},
  volume    = {17},
  pages     = {2394--2409},
  year      = {2022},
  url       = {https://doi.org/10.1109/TIFS.2022.3185770},
  doi       = {10.1109/TIFS.2022.3185770},
  timestamp = {Mon, 08 Aug 2022 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/tifs/SadeghiK22.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/SahraeiAA22,
  author    = {Saeid Sahraei and
               Amir Salman Avestimehr and
               Ramy E. Ali},
  title     = {Info-Commit: Information-Theoretic Polynomial Commitment},
  journal   = {{IEEE} Trans. Inf. Forensics Secur.},
  volume    = {17},
  pages     = {1698--1708},
  year      = {2022},
  url       = {https://doi.org/10.1109/TIFS.2022.3163581},
  doi       = {10.1109/TIFS.2022.3163581},
  timestamp = {Thu, 02 Jun 2022 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/tifs/SahraeiAA22.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/ScottCM22,
  author    = {Mary Scott and
               Graham Cormode and
               Carsten Maple},
  title     = {Aggregation and Transformation of Vector-Valued Messages in the Shuffle
               Model of Differential Privacy},
  journal   = {{IEEE} Trans. Inf. Forensics Secur.},
  volume    = {17},
  pages     = {612--627},
  year      = {2022},
  url       = {https://doi.org/10.1109/TIFS.2022.3147643},
  doi       = {10.1109/TIFS.2022.3147643},
  timestamp = {Wed, 23 Feb 2022 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/journals/tifs/ScottCM22.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/ShanZCZD22,
  author    = {Guohou Shan and
               Boxin Zhao and
               James R. Clavin and
               Haibin Zhang and
               Sisi Duan},
  title     = {Poligraph: Intrusion-Tolerant and Distributed Fake News Detection
               System},
  journal   = {{IEEE} Trans. Inf. Forensics Secur.},
  volume    = {17},
  pages     = {28--41},
  year      = {2022},
  url       = {https://doi.org/10.1109/TIFS.2021.3131026},
  doi       = {10.1109/TIFS.2021.3131026},
  timestamp = {Sat, 08 Jan 2022 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/journals/tifs/ShanZCZD22.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/ShehnepoorTLB22,
  author    = {Saeedreza Shehnepoor and
               Roberto Togneri and
               Wei Liu and
               Mohammed Bennamoun},
  title     = {ScoreGAN: {A} Fraud Review Detector Based on Regulated {GAN} With
               Data Augmentation},
  journal   = {{IEEE} Trans. Inf. Forensics Secur.},
  volume    = {17},
  pages     = {280--291},
  year      = {2022},
  url       = {https://doi.org/10.1109/TIFS.2021.3139771},
  doi       = {10.1109/TIFS.2021.3139771},
  timestamp = {Sat, 09 Apr 2022 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/tifs/ShehnepoorTLB22.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/ShenLZZ22,
  author    = {Zhihao Shen and
               Shun Li and
               Xi Zhao and
               Jianhua Zou},
  title     = {MMAuth: {A} Continuous Authentication Framework on Smartphones Using
               Multiple Modalities},
  journal   = {{IEEE} Trans. Inf. Forensics Secur.},
  volume    = {17},
  pages     = {1450--1465},
  year      = {2022},
  url       = {https://doi.org/10.1109/TIFS.2022.3160361},
  doi       = {10.1109/TIFS.2022.3160361},
  timestamp = {Wed, 27 Apr 2022 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/tifs/ShenLZZ22.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/ShenZMC22,
  author    = {Guanxiong Shen and
               Junqing Zhang and
               Alan Marshall and
               Joseph R. Cavallaro},
  title     = {Towards Scalable and Channel-Robust Radio Frequency Fingerprint Identification
               for LoRa},
  journal   = {{IEEE} Trans. Inf. Forensics Secur.},
  volume    = {17},
  pages     = {774--787},
  year      = {2022},
  url       = {https://doi.org/10.1109/TIFS.2022.3152404},
  doi       = {10.1109/TIFS.2022.3152404},
  timestamp = {Fri, 01 Apr 2022 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/tifs/ShenZMC22.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/SoleymaniMA22,
  author    = {Mahdi Soleymani and
               Hessam Mahdavifar and
               Amir Salman Avestimehr},
  title     = {Analog Secret Sharing With Applications to Private Distributed Learning},
  journal   = {{IEEE} Trans. Inf. Forensics Secur.},
  volume    = {17},
  pages     = {1893--1904},
  year      = {2022},
  url       = {https://doi.org/10.1109/TIFS.2022.3173417},
  doi       = {10.1109/TIFS.2022.3173417},
  timestamp = {Thu, 02 Jun 2022 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/tifs/SoleymaniMA22.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/SomalathaM22,
  author    = {Uppalapati Somalatha and
               Parthajit Mohapatra},
  title     = {Role of Shared Key for Secure Communication Over 2-User Gaussian Z-Interference
               Channel},
  journal   = {{IEEE} Trans. Inf. Forensics Secur.},
  volume    = {17},
  pages     = {85--98},
  year      = {2022},
  url       = {https://doi.org/10.1109/TIFS.2021.3132234},
  doi       = {10.1109/TIFS.2021.3132234},
  timestamp = {Sat, 08 Jan 2022 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/journals/tifs/SomalathaM22.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/SongWQHL22,
  author    = {Linsen Song and
               Wayne Wu and
               Chen Qian and
               Ran He and
               Chen Change Loy},
  title     = {Everybody's Talkin': Let Me Talk as You Want},
  journal   = {{IEEE} Trans. Inf. Forensics Secur.},
  volume    = {17},
  pages     = {585--598},
  year      = {2022},
  url       = {https://doi.org/10.1109/TIFS.2022.3146783},
  doi       = {10.1109/TIFS.2022.3146783},
  timestamp = {Wed, 23 Feb 2022 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/journals/tifs/SongWQHL22.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/SunHZZLH22,
  author    = {Fajun Sun and
               Selena He and
               Xiaotong Zhang and
               Jun Zhang and
               Qingan Li and
               Yanxiang He},
  title     = {A Fully Authenticated Diffie-Hellman Protocol and Its Application
               in WSNs},
  journal   = {{IEEE} Trans. Inf. Forensics Secur.},
  volume    = {17},
  pages     = {1986--1999},
  year      = {2022},
  url       = {https://doi.org/10.1109/TIFS.2022.3173536},
  doi       = {10.1109/TIFS.2022.3173536},
  timestamp = {Mon, 13 Jun 2022 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/tifs/SunHZZLH22.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/SunWLLCS22,
  author    = {Muyi Sun and
               Jian Wang and
               Jian Liu and
               Jianshu Li and
               Tao Chen and
               Zhenan Sun},
  title     = {A Unified Framework for Biphasic Facial Age Translation With Noisy-Semantic
               Guided Generative Adversarial Networks},
  journal   = {{IEEE} Trans. Inf. Forensics Secur.},
  volume    = {17},
  pages     = {1513--1527},
  year      = {2022},
  url       = {https://doi.org/10.1109/TIFS.2022.3164187},
  doi       = {10.1109/TIFS.2022.3164187},
  timestamp = {Wed, 18 May 2022 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/tifs/SunWLLCS22.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/TaoZYWL22,
  author    = {Yingfan Tao and
               Wenxian Zheng and
               Wenming Yang and
               Guijin Wang and
               Qingmin Liao},
  title     = {Frontal-Centers Guided Face: Boosting Face Recognition by Learning
               Pose-Invariant Features},
  journal   = {{IEEE} Trans. Inf. Forensics Secur.},
  volume    = {17},
  pages     = {2272--2283},
  year      = {2022},
  url       = {https://doi.org/10.1109/TIFS.2022.3183410},
  doi       = {10.1109/TIFS.2022.3183410},
  timestamp = {Mon, 25 Jul 2022 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/tifs/TaoZYWL22.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/TapiaGB22,
  author    = {Juan E. Tapia and
               Sebastian Gonzalez and
               Christoph Busch},
  title     = {Iris Liveness Detection Using a Cascade of Dedicated Deep Learning
               Networks},
  journal   = {{IEEE} Trans. Inf. Forensics Secur.},
  volume    = {17},
  pages     = {42--52},
  year      = {2022},
  url       = {https://doi.org/10.1109/TIFS.2021.3132582},
  doi       = {10.1109/TIFS.2021.3132582},
  timestamp = {Mon, 03 Jan 2022 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/journals/tifs/TapiaGB22.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/TianSXE22,
  author    = {Yulong Tian and
               Fnu Suya and
               Fengyuan Xu and
               David Evans},
  title     = {Stealthy Backdoors as Compression Artifacts},
  journal   = {{IEEE} Trans. Inf. Forensics Secur.},
  volume    = {17},
  pages     = {1372--1387},
  year      = {2022},
  url       = {https://doi.org/10.1109/TIFS.2022.3160359},
  doi       = {10.1109/TIFS.2022.3160359},
  timestamp = {Wed, 27 Apr 2022 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/tifs/TianSXE22.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/TursunDSSFM22,
  author    = {Osman Tursun and
               Simon Denman and
               Sabesan Sivapalan and
               Sridha Sridharan and
               Clinton Fookes and
               Sandra Mau},
  title     = {Component-Based Attention for Large-Scale Trademark Retrieval},
  journal   = {{IEEE} Trans. Inf. Forensics Secur.},
  volume    = {17},
  pages     = {2350--2363},
  year      = {2022},
  url       = {https://doi.org/10.1109/TIFS.2019.2959921},
  doi       = {10.1109/TIFS.2019.2959921},
  timestamp = {Mon, 25 Jul 2022 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/tifs/TursunDSSFM22.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/VafaeiZBEPS22,
  author    = {Navid Vafaei and
               Sara Zarei and
               Nasour Bagheri and
               Maria Eichlseder and
               Robert Primas and
               Hadi Soleimany},
  title     = {Statistical Effective Fault Attacks: The Other Side of the Coin},
  journal   = {{IEEE} Trans. Inf. Forensics Secur.},
  volume    = {17},
  pages     = {1855--1867},
  year      = {2022},
  url       = {https://doi.org/10.1109/TIFS.2022.3172634},
  doi       = {10.1109/TIFS.2022.3172634},
  timestamp = {Thu, 02 Jun 2022 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/tifs/VafaeiZBEPS22.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/Vazquez-Castro22,
  author    = {{\'{A}}ngeles V{\'{a}}zquez{-}Castro},
  title     = {Asymptotically Guaranteed Anti-Jamming Spread Spectrum Random Access
               Without Pre-Shared Secret},
  journal   = {{IEEE} Trans. Inf. Forensics Secur.},
  volume    = {17},
  pages     = {332--343},
  year      = {2022},
  url       = {https://doi.org/10.1109/TIFS.2022.3140714},
  doi       = {10.1109/TIFS.2022.3140714},
  timestamp = {Tue, 28 Jun 2022 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/tifs/Vazquez-Castro22.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/WangPLWG22,
  author    = {Yukai Wang and
               Chunlei Peng and
               Decheng Liu and
               Nannan Wang and
               Xinbo Gao},
  title     = {ForgeryNIR: Deep Face Forgery and Detection in Near-Infrared Scenario},
  journal   = {{IEEE} Trans. Inf. Forensics Secur.},
  volume    = {17},
  pages     = {500--515},
  year      = {2022},
  url       = {https://doi.org/10.1109/TIFS.2022.3146766},
  doi       = {10.1109/TIFS.2022.3146766},
  timestamp = {Wed, 23 Feb 2022 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/journals/tifs/WangPLWG22.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/WangST22,
  author    = {Jian Wang and
               Yunlian Sun and
               Jinhui Tang},
  title     = {LiSiam: Localization Invariance Siamese Network for Deepfake Detection},
  journal   = {{IEEE} Trans. Inf. Forensics Secur.},
  volume    = {17},
  pages     = {2425--2436},
  year      = {2022},
  url       = {https://doi.org/10.1109/TIFS.2022.3186803},
  doi       = {10.1109/TIFS.2022.3186803},
  timestamp = {Mon, 08 Aug 2022 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/tifs/WangST22.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/WangWDG22,
  author    = {Zhuo Wang and
               Qiangchang Wang and
               Weihong Deng and
               Guodong Guo},
  title     = {Learning Multi-Granularity Temporal Characteristics for Face Anti-Spoofing},
  journal   = {{IEEE} Trans. Inf. Forensics Secur.},
  volume    = {17},
  pages     = {1254--1269},
  year      = {2022},
  url       = {https://doi.org/10.1109/TIFS.2022.3158062},
  doi       = {10.1109/TIFS.2022.3158062},
  timestamp = {Wed, 27 Apr 2022 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/tifs/WangWDG22.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/WangWZYL22,
  author    = {Weihang Wang and
               Fei Wen and
               Haoyuan Zheng and
               Rendong Ying and
               Peilin Liu},
  title     = {Conv-MLP: {A} Convolution and {MLP} Mixed Model for Multimodal Face
               Anti-Spoofing},
  journal   = {{IEEE} Trans. Inf. Forensics Secur.},
  volume    = {17},
  pages     = {2284--2297},
  year      = {2022},
  url       = {https://doi.org/10.1109/TIFS.2022.3183398},
  doi       = {10.1109/TIFS.2022.3183398},
  timestamp = {Mon, 25 Jul 2022 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/tifs/WangWZYL22.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/WangXGQR22,
  author    = {Yanbin Wang and
               Haitao Xu and
               Zhenhao Guo and
               Zhan Qin and
               Kui Ren},
  title     = {snWF: Website Fingerprinting Attack by Ensembling the Snapshot of
               Deep Learning},
  journal   = {{IEEE} Trans. Inf. Forensics Secur.},
  volume    = {17},
  pages     = {1214--1226},
  year      = {2022},
  url       = {https://doi.org/10.1109/TIFS.2022.3158086},
  doi       = {10.1109/TIFS.2022.3158086},
  timestamp = {Thu, 05 May 2022 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/tifs/WangXGQR22.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/WangZ22,
  author    = {Cheng Wang and
               Hangyu Zhu},
  title     = {Wrongdoing Monitor: {A} Graph-Based Behavioral Anomaly Detection in
               Cyber Security},
  journal   = {{IEEE} Trans. Inf. Forensics Secur.},
  volume    = {17},
  pages     = {2703--2718},
  year      = {2022},
  url       = {https://doi.org/10.1109/TIFS.2022.3191493},
  doi       = {10.1109/TIFS.2022.3191493},
  timestamp = {Mon, 08 Aug 2022 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/tifs/WangZ22.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/WangZWS22,
  author    = {Yongzhi Wang and
               Xiaoyu Zhang and
               Yao Wu and
               Yulong Shen},
  title     = {Enhancing Leakage Prevention for MapReduce},
  journal   = {{IEEE} Trans. Inf. Forensics Secur.},
  volume    = {17},
  pages     = {1558--1572},
  year      = {2022},
  url       = {https://doi.org/10.1109/TIFS.2022.3166641},
  doi       = {10.1109/TIFS.2022.3166641},
  timestamp = {Wed, 18 May 2022 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/tifs/WangZWS22.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/WeiL22,
  author    = {Wenqi Wei and
               Ling Liu},
  title     = {Gradient Leakage Attack Resilient Deep Learning},
  journal   = {{IEEE} Trans. Inf. Forensics Secur.},
  volume    = {17},
  pages     = {303--316},
  year      = {2022},
  url       = {https://doi.org/10.1109/TIFS.2021.3139777},
  doi       = {10.1109/TIFS.2021.3139777},
  timestamp = {Mon, 04 Apr 2022 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/tifs/WeiL22.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/WisiolTMSZ22,
  author    = {Nils Wisiol and
               Bipana Thapaliya and
               Khalid T. Mursi and
               Jean{-}Pierre Seifert and
               Yu Zhuang},
  title     = {Neural Network Modeling Attacks on Arbiter-PUF-Based Designs},
  journal   = {{IEEE} Trans. Inf. Forensics Secur.},
  volume    = {17},
  pages     = {2719--2731},
  year      = {2022},
  url       = {https://doi.org/10.1109/TIFS.2022.3189533},
  doi       = {10.1109/TIFS.2022.3189533},
  timestamp = {Mon, 08 Aug 2022 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/tifs/WisiolTMSZ22.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/WuVVK22,
  author    = {Nan Wu and
               Dinusha Vatsalan and
               Sunny Verma and
               Mohamed Ali K{\^{a}}afar},
  title     = {Fairness and Cost Constrained Privacy-Aware Record Linkage},
  journal   = {{IEEE} Trans. Inf. Forensics Secur.},
  volume    = {17},
  pages     = {2644--2656},
  year      = {2022},
  url       = {https://doi.org/10.1109/TIFS.2022.3191492},
  doi       = {10.1109/TIFS.2022.3191492},
  timestamp = {Mon, 08 Aug 2022 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/tifs/WuVVK22.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/WuYLGS22,
  author    = {Dongming Wu and
               Mang Ye and
               Gaojie Lin and
               Xin Gao and
               Jianbing Shen},
  title     = {Person Re-Identification by Context-Aware Part Attention and Multi-Head
               Collaborative Learning},
  journal   = {{IEEE} Trans. Inf. Forensics Secur.},
  volume    = {17},
  pages     = {115--126},
  year      = {2022},
  url       = {https://doi.org/10.1109/TIFS.2021.3075894},
  doi       = {10.1109/TIFS.2021.3075894},
  timestamp = {Fri, 21 Jan 2022 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/journals/tifs/WuYLGS22.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/WuZTLQ22,
  author    = {Haiwei Wu and
               Jiantao Zhou and
               Jinyu Tian and
               Jun Liu and
               Yu Qiao},
  title     = {Robust Image Forgery Detection Against Transmission Over Online Social
               Networks},
  journal   = {{IEEE} Trans. Inf. Forensics Secur.},
  volume    = {17},
  pages     = {443--456},
  year      = {2022},
  url       = {https://doi.org/10.1109/TIFS.2022.3144878},
  doi       = {10.1109/TIFS.2022.3144878},
  timestamp = {Wed, 23 Feb 2022 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/journals/tifs/WuZTLQ22.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/XiaoLHYS22,
  author    = {Meiyan Xiao and
               Hongbo Li and
               Qiong Huang and
               Shui Yu and
               Willy Susilo},
  title     = {Attribute-Based Hierarchical Access Control With Extendable Policy},
  journal   = {{IEEE} Trans. Inf. Forensics Secur.},
  volume    = {17},
  pages     = {1868--1883},
  year      = {2022},
  url       = {https://doi.org/10.1109/TIFS.2022.3173412},
  doi       = {10.1109/TIFS.2022.3173412},
  timestamp = {Thu, 02 Jun 2022 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/tifs/XiaoLHYS22.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/XiaoZ22,
  author    = {Yang Xiao and
               Jianping Zeng},
  title     = {Dynamically Generate Password Policy via Zipf Distribution},
  journal   = {{IEEE} Trans. Inf. Forensics Secur.},
  volume    = {17},
  pages     = {835--848},
  year      = {2022},
  url       = {https://doi.org/10.1109/TIFS.2022.3152357},
  doi       = {10.1109/TIFS.2022.3152357},
  timestamp = {Fri, 01 Apr 2022 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/tifs/XiaoZ22.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/XiePL22,
  author    = {Jiucheng Xie and
               Chi{-}Man Pun and
               Kin{-}Man Lam},
  title     = {Implicit and Explicit Feature Purification for Age-Invariant Facial
               Representation Learning},
  journal   = {{IEEE} Trans. Inf. Forensics Secur.},
  volume    = {17},
  pages     = {399--412},
  year      = {2022},
  url       = {https://doi.org/10.1109/TIFS.2022.3142998},
  doi       = {10.1109/TIFS.2022.3142998},
  timestamp = {Tue, 08 Feb 2022 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/journals/tifs/XiePL22.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/XuGJLW22,
  author    = {Shi{-}Jie Xu and
               Guang{-}Gang Geng and
               Xiao{-}Bo Jin and
               Dongjie Liu and
               Jian Weng},
  title     = {Seeing Traffic Paths: Encrypted Traffic Classification With Path Signature
               Features},
  journal   = {{IEEE} Trans. Inf. Forensics Secur.},
  volume    = {17},
  pages     = {2166--2181},
  year      = {2022},
  url       = {https://doi.org/10.1109/TIFS.2022.3179955},
  doi       = {10.1109/TIFS.2022.3179955},
  timestamp = {Mon, 25 Jul 2022 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/tifs/XuGJLW22.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/XuHCWJ22,
  author    = {Peng Xu and
               Manqing Hu and
               Tianyang Chen and
               Wei Wang and
               Hai Jin},
  title     = {LaF: Lattice-Based and Communication-Efficient Federated Learning},
  journal   = {{IEEE} Trans. Inf. Forensics Secur.},
  volume    = {17},
  pages     = {2483--2496},
  year      = {2022},
  url       = {https://doi.org/10.1109/TIFS.2022.3186739},
  doi       = {10.1109/TIFS.2022.3186739},
  timestamp = {Mon, 08 Aug 2022 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/tifs/XuHCWJ22.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/XuJSK22,
  author    = {Qiang Xu and
               Xinghao Jiang and
               Tanfeng Sun and
               Alex C. Kot},
  title     = {Motion-Adaptive Detection of {HEVC} Double Compression With the Same
               Coding Parameters},
  journal   = {{IEEE} Trans. Inf. Forensics Secur.},
  volume    = {17},
  pages     = {2015--2029},
  year      = {2022},
  url       = {https://doi.org/10.1109/TIFS.2022.3176188},
  doi       = {10.1109/TIFS.2022.3176188},
  timestamp = {Mon, 13 Jun 2022 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/tifs/XuJSK22.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/XuLCLZ22,
  author    = {Yuanrong Xu and
               Yao Lu and
               Fanglin Chen and
               Guangming Lu and
               David Zhang},
  title     = {High Resolution Fingerprint Retrieval Based on Pore Indexing and Graph
               Comparison},
  journal   = {{IEEE} Trans. Inf. Forensics Secur.},
  volume    = {17},
  pages     = {226--236},
  year      = {2022},
  url       = {https://doi.org/10.1109/TIFS.2021.3139219},
  doi       = {10.1109/TIFS.2021.3139219},
  timestamp = {Fri, 21 Jan 2022 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/journals/tifs/XuLCLZ22.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/YangCCC22,
  author    = {Yang Yang and
               Yanjiao Chen and
               Fei Chen and
               Jing Chen},
  title     = {An Efficient Identity-Based Provable Data Possession Protocol With
               Compressed Cloud Storage},
  journal   = {{IEEE} Trans. Inf. Forensics Secur.},
  volume    = {17},
  pages     = {1359--1371},
  year      = {2022},
  url       = {https://doi.org/10.1109/TIFS.2022.3159152},
  doi       = {10.1109/TIFS.2022.3159152},
  timestamp = {Wed, 27 Apr 2022 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/tifs/YangCCC22.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/YangLALY22,
  author    = {Xiao Yang and
               Mengling Liu and
               Man Ho Au and
               Xiapu Luo and
               Qingqing Ye},
  title     = {Efficient Verifiably Encrypted ECDSA-Like Signatures and Their Applications},
  journal   = {{IEEE} Trans. Inf. Forensics Secur.},
  volume    = {17},
  pages     = {1573--1582},
  year      = {2022},
  url       = {https://doi.org/10.1109/TIFS.2022.3165978},
  doi       = {10.1109/TIFS.2022.3165978},
  timestamp = {Wed, 18 May 2022 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/tifs/YangLALY22.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/YangLFLZ22,
  author    = {Ziming Yang and
               Jian Liang and
               Chaoyou Fu and
               Mandi Luo and
               Xiaoyu Zhang},
  title     = {Heterogeneous Face Recognition via Face Synthesis With Identity-Attribute
               Disentanglement},
  journal   = {{IEEE} Trans. Inf. Forensics Secur.},
  volume    = {17},
  pages     = {1344--1358},
  year      = {2022},
  url       = {https://doi.org/10.1109/TIFS.2022.3160595},
  doi       = {10.1109/TIFS.2022.3160595},
  timestamp = {Wed, 27 Apr 2022 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/tifs/YangLFLZ22.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/YangMY22,
  author    = {Baoyao Yang and
               Andy Jinhua Ma and
               Pong C. Yuen},
  title     = {Revealing Task-Relevant Model Memorization for Source-Protected Unsupervised
               Domain Adaptation},
  journal   = {{IEEE} Trans. Inf. Forensics Secur.},
  volume    = {17},
  pages     = {716--731},
  year      = {2022},
  url       = {https://doi.org/10.1109/TIFS.2022.3149397},
  doi       = {10.1109/TIFS.2022.3149397},
  timestamp = {Tue, 15 Mar 2022 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/journals/tifs/YangMY22.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/YangSL22,
  author    = {Zhihai Yang and
               Qindong Sun and
               Zhaoli Liu},
  title     = {Three Birds With One Stone: User Intention Understanding and Influential
               Neighbor Disclosure for Injection Attack Detection},
  journal   = {{IEEE} Trans. Inf. Forensics Secur.},
  volume    = {17},
  pages     = {531--546},
  year      = {2022},
  url       = {https://doi.org/10.1109/TIFS.2022.3146769},
  doi       = {10.1109/TIFS.2022.3146769},
  timestamp = {Wed, 23 Feb 2022 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/journals/tifs/YangSL22.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/YangTL22,
  author    = {Mengmeng Yang and
               Ivan Tjuawinata and
               Kwok{-}Yan Lam},
  title     = {K-Means Clustering With Local d{\unicode{7530}}-Privacy for Privacy-Preserving
               Data Analysis},
  journal   = {{IEEE} Trans. Inf. Forensics Secur.},
  volume    = {17},
  pages     = {2524--2537},
  year      = {2022},
  url       = {https://doi.org/10.1109/TIFS.2022.3189532},
  doi       = {10.1109/TIFS.2022.3189532},
  timestamp = {Mon, 08 Aug 2022 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/tifs/YangTL22.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/YangXCLL22,
  author    = {Jungang Yang and
               Liyao Xiang and
               Ruidong Chen and
               Weiting Li and
               Baochun Li},
  title     = {Differential Privacy for Tensor-Valued Queries},
  journal   = {{IEEE} Trans. Inf. Forensics Secur.},
  volume    = {17},
  pages     = {152--164},
  year      = {2022},
  url       = {https://doi.org/10.1109/TIFS.2021.3089884},
  doi       = {10.1109/TIFS.2021.3089884},
  timestamp = {Fri, 21 Jan 2022 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/journals/tifs/YangXCLL22.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/YangZSZ22,
  author    = {Jin Yang and
               Qishui Zhong and
               Kaibo Shi and
               Shouming Zhong},
  title     = {Co-Design of Observer-Based Fault Detection Filter and Dynamic Event-Triggered
               Controller for Wind Power System Under Dual Alterable DoS Attacks},
  journal   = {{IEEE} Trans. Inf. Forensics Secur.},
  volume    = {17},
  pages     = {1270--1284},
  year      = {2022},
  url       = {https://doi.org/10.1109/TIFS.2022.3160355},
  doi       = {10.1109/TIFS.2022.3160355},
  timestamp = {Wed, 27 Apr 2022 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/tifs/YangZSZ22.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/YangZZCZ22,
  author    = {Yafang Yang and
               Lei Zhang and
               Yunlei Zhao and
               Kim{-}Kwang Raymond Choo and
               Yan Zhang},
  title     = {Privacy-Preserving Aggregation-Authentication Scheme for Safety Warning
               System in Fog-Cloud Based {VANET}},
  journal   = {{IEEE} Trans. Inf. Forensics Secur.},
  volume    = {17},
  pages     = {317--331},
  year      = {2022},
  url       = {https://doi.org/10.1109/TIFS.2022.3140657},
  doi       = {10.1109/TIFS.2022.3140657},
  timestamp = {Fri, 05 Aug 2022 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/tifs/YangZZCZ22.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/YeCSS22,
  author    = {Mang Ye and
               Cuiqun Chen and
               Jianbing Shen and
               Ling Shao},
  title     = {Dynamic Tri-Level Relation Mining With Attentive Graph for Visible
               Infrared Re-Identification},
  journal   = {{IEEE} Trans. Inf. Forensics Secur.},
  volume    = {17},
  pages     = {386--398},
  year      = {2022},
  url       = {https://doi.org/10.1109/TIFS.2021.3139224},
  doi       = {10.1109/TIFS.2021.3139224},
  timestamp = {Tue, 08 Feb 2022 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/journals/tifs/YeCSS22.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/YeSZLZ22,
  author    = {Dayong Ye and
               Sheng Shen and
               Tianqing Zhu and
               Bo Liu and
               Wanlei Zhou},
  title     = {One Parameter Defense - Defending Against Data Inference Attacks via
               Differential Privacy},
  journal   = {{IEEE} Trans. Inf. Forensics Secur.},
  volume    = {17},
  pages     = {1466--1480},
  year      = {2022},
  url       = {https://doi.org/10.1109/TIFS.2022.3163591},
  doi       = {10.1109/TIFS.2022.3163591},
  timestamp = {Wed, 18 May 2022 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/tifs/YeSZLZ22.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/YuFXZW22,
  author    = {Peipeng Yu and
               Jianwei Fei and
               Zhihua Xia and
               Zhili Zhou and
               Jian Weng},
  title     = {Improving Generalization by Commonality Learning in Face Forgery Detection},
  journal   = {{IEEE} Trans. Inf. Forensics Secur.},
  volume    = {17},
  pages     = {547--558},
  year      = {2022},
  url       = {https://doi.org/10.1109/TIFS.2022.3146781},
  doi       = {10.1109/TIFS.2022.3146781},
  timestamp = {Wed, 23 Feb 2022 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/journals/tifs/YuFXZW22.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/YuHLL22,
  author    = {Donghyun Yu and
               Ruei{-}Hau Hsu and
               Jemin Lee and
               Sungjin Lee},
  title     = {{EC-SVC:} Secure {CAN} Bus In-Vehicle Communications With Fine-Grained
               Access Control Based on Edge Computing},
  journal   = {{IEEE} Trans. Inf. Forensics Secur.},
  volume    = {17},
  pages     = {1388--1403},
  year      = {2022},
  url       = {https://doi.org/10.1109/TIFS.2022.3152405},
  doi       = {10.1109/TIFS.2022.3152405},
  timestamp = {Wed, 27 Apr 2022 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/tifs/YuHLL22.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/YuLLZ22,
  author    = {Bingyao Yu and
               Jiwen Lu and
               Xiu Li and
               Jie Zhou},
  title     = {Salience-Aware Face Presentation Attack Detection via Deep Reinforcement
               Learning},
  journal   = {{IEEE} Trans. Inf. Forensics Secur.},
  volume    = {17},
  pages     = {413--427},
  year      = {2022},
  url       = {https://doi.org/10.1109/TIFS.2021.3135748},
  doi       = {10.1109/TIFS.2021.3135748},
  timestamp = {Tue, 08 Feb 2022 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/journals/tifs/YuLLZ22.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/ZamaniOS22,
  author    = {Amirreza Zamani and
               Tobias J. Oechtering and
               Mikael Skoglund},
  title     = {Data Disclosure With Non-Zero Leakage and Non-Invertible Leakage Matrix},
  journal   = {{IEEE} Trans. Inf. Forensics Secur.},
  volume    = {17},
  pages     = {165--179},
  year      = {2022},
  url       = {https://doi.org/10.1109/TIFS.2021.3137755},
  doi       = {10.1109/TIFS.2021.3137755},
  timestamp = {Fri, 21 Jan 2022 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/journals/tifs/ZamaniOS22.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/ZebinRL22,
  author    = {Tahmina Zebin and
               Shahadate Rezvy and
               Yuan Luo},
  title     = {An Explainable AI-Based Intrusion Detection System for {DNS} Over
               {HTTPS} (DoH) Attacks},
  journal   = {{IEEE} Trans. Inf. Forensics Secur.},
  volume    = {17},
  pages     = {2339--2349},
  year      = {2022},
  url       = {https://doi.org/10.1109/TIFS.2022.3183390},
  doi       = {10.1109/TIFS.2022.3183390},
  timestamp = {Mon, 25 Jul 2022 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/tifs/ZebinRL22.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/ZengLCZ22,
  author    = {Yuwei Zeng and
               Zhicheng Liu and
               Xunxun Chen and
               Tianning Zang},
  title     = {Hidden Path: Understanding the Intermediary in Malicious Redirections},
  journal   = {{IEEE} Trans. Inf. Forensics Secur.},
  volume    = {17},
  pages     = {1725--1740},
  year      = {2022},
  url       = {https://doi.org/10.1109/TIFS.2022.3169923},
  doi       = {10.1109/TIFS.2022.3169923},
  timestamp = {Thu, 02 Jun 2022 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/tifs/ZengLCZ22.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/ZengLTG22,
  author    = {Xiao Mei Zeng and
               Qing Liu and
               Jing Yun Tay and
               Chee Lip Gan},
  title     = {Selective Staining on Non-Volatile Memory Cells for Data Retrieval},
  journal   = {{IEEE} Trans. Inf. Forensics Secur.},
  volume    = {17},
  pages     = {1884--1892},
  year      = {2022},
  url       = {https://doi.org/10.1109/TIFS.2022.3172222},
  doi       = {10.1109/TIFS.2022.3172222},
  timestamp = {Thu, 02 Jun 2022 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/tifs/ZengLTG22.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/ZhangDCWF22,
  author    = {Huijun Zhang and
               Yang Ding and
               Lei Cao and
               Xin Wang and
               Ling Feng},
  title     = {Fine-Grained Question-Level Deception Detection via Graph-Based Learning
               and Cross-Modal Fusion},
  journal   = {{IEEE} Trans. Inf. Forensics Secur.},
  volume    = {17},
  pages     = {2452--2467},
  year      = {2022},
  url       = {https://doi.org/10.1109/TIFS.2022.3186799},
  doi       = {10.1109/TIFS.2022.3186799},
  timestamp = {Mon, 08 Aug 2022 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/tifs/ZhangDCWF22.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/ZhangJLL22,
  author    = {Wenjing Zhang and
               Bo Jiang and
               Ming Li and
               Xiaodong Lin},
  title     = {Privacy-Preserving Aggregate Mobility Data Release: An Information-Theoretic
               Deep Reinforcement Learning Approach},
  journal   = {{IEEE} Trans. Inf. Forensics Secur.},
  volume    = {17},
  pages     = {849--864},
  year      = {2022},
  url       = {https://doi.org/10.1109/TIFS.2022.3152361},
  doi       = {10.1109/TIFS.2022.3152361},
  timestamp = {Fri, 01 Apr 2022 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/tifs/ZhangJLL22.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/ZhangJNH22,
  author    = {Kai Zhang and
               Zhe Jiang and
               Jianting Ning and
               Xinyi Huang},
  title     = {Subversion-Resistant and Consistent Attribute-Based Keyword Search
               for Secure Cloud Storage},
  journal   = {{IEEE} Trans. Inf. Forensics Secur.},
  volume    = {17},
  pages     = {1771--1784},
  year      = {2022},
  url       = {https://doi.org/10.1109/TIFS.2022.3172627},
  doi       = {10.1109/TIFS.2022.3172627},
  timestamp = {Thu, 02 Jun 2022 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/tifs/ZhangJNH22.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/ZhangLZJX22,
  author    = {Jiayu Zhang and
               Min Li and
               Min{-}Jian Zhao and
               Xiaoyu Ji and
               Wenyuan Xu},
  title     = {Multi-User Beam Training and Transmission Design for Covert Millimeter-Wave
               Communication},
  journal   = {{IEEE} Trans. Inf. Forensics Secur.},
  volume    = {17},
  pages     = {1528--1543},
  year      = {2022},
  url       = {https://doi.org/10.1109/TIFS.2022.3163583},
  doi       = {10.1109/TIFS.2022.3163583},
  timestamp = {Wed, 18 May 2022 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/tifs/ZhangLZJX22.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/ZhangRLGZS22,
  author    = {Songnian Zhang and
               Suprio Ray and
               Rongxing Lu and
               Yunguo Guan and
               Yandong Zheng and
               Jun Shao},
  title     = {Toward Privacy-Preserving Aggregate Reverse Skyline Query With Strong
               Security},
  journal   = {{IEEE} Trans. Inf. Forensics Secur.},
  volume    = {17},
  pages     = {2538--2552},
  year      = {2022},
  url       = {https://doi.org/10.1109/TIFS.2022.3188147},
  doi       = {10.1109/TIFS.2022.3188147},
  timestamp = {Mon, 08 Aug 2022 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/tifs/ZhangRLGZS22.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/ZhangSJK22,
  author    = {Yuanyu Zhang and
               Yulong Shen and
               Xiaohong Jiang and
               Shoji Kasahara},
  title     = {Secure Millimeter-Wave Ad Hoc Communications Using Physical Layer
               Security},
  journal   = {{IEEE} Trans. Inf. Forensics Secur.},
  volume    = {17},
  pages     = {99--114},
  year      = {2022},
  url       = {https://doi.org/10.1109/TIFS.2021.3054507},
  doi       = {10.1109/TIFS.2021.3054507},
  timestamp = {Fri, 21 Jan 2022 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/journals/tifs/ZhangSJK22.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/ZhangWYLG22,
  author    = {Meng Zhang and
               Zhuorui Wu and
               Jun Yan and
               Rongxing Lu and
               Xiaohong Guan},
  title     = {Attack-Resilient Optimal {PMU} Placement via Reinforcement Learning
               Guided Tree Search in Smart Grids},
  journal   = {{IEEE} Trans. Inf. Forensics Secur.},
  volume    = {17},
  pages     = {1919--1929},
  year      = {2022},
  url       = {https://doi.org/10.1109/TIFS.2022.3173728},
  doi       = {10.1109/TIFS.2022.3173728},
  timestamp = {Mon, 13 Jun 2022 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/tifs/ZhangWYLG22.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/ZhangXXLCFZ22,
  author    = {Mingyang Zhang and
               Yang Xiao and
               Fu Xiong and
               Shuai Li and
               Zhiguo Cao and
               Zhiwen Fang and
               Joey Tianyi Zhou},
  title     = {Person Re-Identification With Hierarchical Discriminative Spatial
               Aggregation},
  journal   = {{IEEE} Trans. Inf. Forensics Secur.},
  volume    = {17},
  pages     = {516--530},
  year      = {2022},
  url       = {https://doi.org/10.1109/TIFS.2022.3146773},
  doi       = {10.1109/TIFS.2022.3146773},
  timestamp = {Wed, 23 Feb 2022 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/journals/tifs/ZhangXXLCFZ22.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/ZhangZFBC22,
  author    = {Xiaoyu Zhang and
               Hong Zhong and
               Chunyang Fan and
               Irina Bolodurina and
               Jie Cui},
  title     = {{CBACS:} {A} Privacy-Preserving and Efficient Cache-Based Access Control
               Scheme for Software Defined Vehicular Networks},
  journal   = {{IEEE} Trans. Inf. Forensics Secur.},
  volume    = {17},
  pages     = {1930--1945},
  year      = {2022},
  url       = {https://doi.org/10.1109/TIFS.2022.3174389},
  doi       = {10.1109/TIFS.2022.3174389},
  timestamp = {Mon, 13 Jun 2022 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/tifs/ZhangZFBC22.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/ZhangZK22,
  author    = {Zejun Zhang and
               Fei Zhong and
               Wenxiong Kang},
  title     = {Study on Reflection-Based Imaging Finger Vein Recognition},
  journal   = {{IEEE} Trans. Inf. Forensics Secur.},
  volume    = {17},
  pages     = {2298--2310},
  year      = {2022},
  url       = {https://doi.org/10.1109/TIFS.2021.3093791},
  doi       = {10.1109/TIFS.2021.3093791},
  timestamp = {Mon, 25 Jul 2022 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/tifs/ZhangZK22.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/ZhaoWWKZR22,
  author    = {Mengnan Zhao and
               Bo Wang and
               Wei Wang and
               Yuqiu Kong and
               Tianhang Zheng and
               Kui Ren},
  title     = {Guided Erasable Adversarial Attack {(GEAA)} Toward Shared Data Protection},
  journal   = {{IEEE} Trans. Inf. Forensics Secur.},
  volume    = {17},
  pages     = {2468--2482},
  year      = {2022},
  url       = {https://doi.org/10.1109/TIFS.2022.3186791},
  doi       = {10.1109/TIFS.2022.3186791},
  timestamp = {Mon, 08 Aug 2022 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/tifs/ZhaoWWKZR22.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/ZhaoZWLLL22,
  author    = {Jiaqi Zhao and
               Hui Zhu and
               Fengwei Wang and
               Rongxing Lu and
               Zhe Liu and
               Hui Li},
  title     = {{PVD-FL:} {A} Privacy-Preserving and Verifiable Decentralized Federated
               Learning Framework},
  journal   = {{IEEE} Trans. Inf. Forensics Secur.},
  volume    = {17},
  pages     = {2059--2073},
  year      = {2022},
  url       = {https://doi.org/10.1109/TIFS.2022.3176191},
  doi       = {10.1109/TIFS.2022.3176191},
  timestamp = {Mon, 25 Jul 2022 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/tifs/ZhaoZWLLL22.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/ZhengLJZT22,
  author    = {Zhirun Zheng and
               Zhetao Li and
               Hongbo Jiang and
               Leo Yu Zhang and
               Dengbiao Tu},
  title     = {Semantic-Aware Privacy-Preserving Online Location Trajectory Data
               Sharing},
  journal   = {{IEEE} Trans. Inf. Forensics Secur.},
  volume    = {17},
  pages     = {2256--2271},
  year      = {2022},
  url       = {https://doi.org/10.1109/TIFS.2022.3181855},
  doi       = {10.1109/TIFS.2022.3181855},
  timestamp = {Mon, 25 Jul 2022 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/tifs/ZhengLJZT22.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/ZhouDY22,
  author    = {Jiayu Zhou and
               Wenjie Ding and
               Wen Yang},
  title     = {A Secure Encoding Mechanism Against Deception Attacks on Multisensor
               Remote State Estimation},
  journal   = {{IEEE} Trans. Inf. Forensics Secur.},
  volume    = {17},
  pages     = {1959--1969},
  year      = {2022},
  url       = {https://doi.org/10.1109/TIFS.2022.3175617},
  doi       = {10.1109/TIFS.2022.3175617},
  timestamp = {Mon, 13 Jun 2022 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/tifs/ZhouDY22.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/ZhouOS22,
  author    = {Linghui Zhou and
               Tobias J. Oechtering and
               Mikael Skoglund},
  title     = {Fundamental Limits-Achieving Polar Code Designs for Biometric Identification
               and Authentication},
  journal   = {{IEEE} Trans. Inf. Forensics Secur.},
  volume    = {17},
  pages     = {180--195},
  year      = {2022},
  url       = {https://doi.org/10.1109/TIFS.2021.3137749},
  doi       = {10.1109/TIFS.2021.3137749},
  timestamp = {Fri, 21 Jan 2022 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/journals/tifs/ZhouOS22.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/ZhouYDL22,
  author    = {Hao Zhou and
               Geng Yang and
               Hua Dai and
               Guoxiu Liu},
  title     = {{PFLF:} Privacy-Preserving Federated Learning Framework for Edge Computing},
  journal   = {{IEEE} Trans. Inf. Forensics Secur.},
  volume    = {17},
  pages     = {1905--1918},
  year      = {2022},
  url       = {https://doi.org/10.1109/TIFS.2022.3174394},
  doi       = {10.1109/TIFS.2022.3174394},
  timestamp = {Mon, 13 Jun 2022 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/tifs/ZhouYDL22.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/ZhuoTLH22,
  author    = {Long Zhuo and
               Shunquan Tan and
               Bin Li and
               Jiwu Huang},
  title     = {Self-Adversarial Training Incorporating Forgery Attention for Image
               Forgery Localization},
  journal   = {{IEEE} Trans. Inf. Forensics Secur.},
  volume    = {17},
  pages     = {819--834},
  year      = {2022},
  url       = {https://doi.org/10.1109/TIFS.2022.3152362},
  doi       = {10.1109/TIFS.2022.3152362},
  timestamp = {Fri, 01 Apr 2022 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/tifs/ZhuoTLH22.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/AbdullahCAC21,
  author    = {Zaid Abdullah and
               Gaojie Chen and
               Mohammed A. M. Abdullah and
               Jonathon A. Chambers},
  title     = {Enhanced Secrecy Performance of Multihop IoT Networks With Cooperative
               Hybrid-Duplex Jamming},
  journal   = {{IEEE} Trans. Inf. Forensics Secur.},
  volume    = {16},
  pages     = {161--172},
  year      = {2021},
  url       = {https://doi.org/10.1109/TIFS.2020.3005336},
  doi       = {10.1109/TIFS.2020.3005336},
  timestamp = {Wed, 26 Aug 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/tifs/AbdullahCAC21.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/AbrarPK21,
  author    = {Alemayehu Solomon Abrar and
               Neal Patwari and
               Sneha Kumar Kasera},
  title     = {Quantifying Interference-Assisted Signal Strength Surveillance of
               Sound Vibrations},
  journal   = {{IEEE} Trans. Inf. Forensics Secur.},
  volume    = {16},
  pages     = {2018--2030},
  year      = {2021},
  url       = {https://doi.org/10.1109/TIFS.2020.3045316},
  doi       = {10.1109/TIFS.2020.3045316},
  timestamp = {Thu, 11 Feb 2021 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/journals/tifs/AbrarPK21.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/AddessoBMM21,
  author    = {Paolo Addesso and
               Mauro Barni and
               Mario Di Mauro and
               Vincenzo Matta},
  title     = {Adversarial Kendall's Model Towards Containment of Distributed Cyber-Threats},
  journal   = {{IEEE} Trans. Inf. Forensics Secur.},
  volume    = {16},
  pages     = {3604--3619},
  year      = {2021},
  url       = {https://doi.org/10.1109/TIFS.2021.3082327},
  doi       = {10.1109/TIFS.2021.3082327},
  timestamp = {Thu, 16 Sep 2021 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/tifs/AddessoBMM21.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/AhujaMB21,
  author    = {Bhawna Ahuja and
               Deepak Mishra and
               Ranjan Bose},
  title     = {Fair Subcarrier Allocation for Securing {OFDMA} in IoT Against Full-Duplex
               Hybrid Attacker},
  journal   = {{IEEE} Trans. Inf. Forensics Secur.},
  volume    = {16},
  pages     = {2898--2911},
  year      = {2021},
  url       = {https://doi.org/10.1109/TIFS.2021.3067157},
  doi       = {10.1109/TIFS.2021.3067157},
  timestamp = {Sun, 16 May 2021 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/tifs/AhujaMB21.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/AiCLWY21,
  author    = {Xin Ai and
               Honglong Chen and
               Kai Lin and
               Zhibo Wang and
               Jiguo Yu},
  title     = {Nowhere to Hide: Efficiently Identifying Probabilistic Cloning Attacks
               in Large-Scale {RFID} Systems},
  journal   = {{IEEE} Trans. Inf. Forensics Secur.},
  volume    = {16},
  pages     = {714--727},
  year      = {2021},
  url       = {https://doi.org/10.1109/TIFS.2020.3023785},
  doi       = {10.1109/TIFS.2020.3023785},
  timestamp = {Tue, 30 Mar 2021 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/tifs/AiCLWY21.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/AktukmakYU21,
  author    = {Mehmet Aktukmak and
               Yasin Yilmaz and
               Ismail Uysal},
  title     = {Sequential Attack Detection in Recommender Systems},
  journal   = {{IEEE} Trans. Inf. Forensics Secur.},
  volume    = {16},
  pages     = {3285--3298},
  year      = {2021},
  url       = {https://doi.org/10.1109/TIFS.2021.3076295},
  doi       = {10.1109/TIFS.2021.3076295},
  timestamp = {Tue, 15 Jun 2021 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/tifs/AktukmakYU21.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/AlanisLDPM21,
  author    = {Alejandro G{\'{o}}mez Alan{\'{\i}}s and
               Jos{\'{e}} Andr{\'{e}}s Gonz{\'{a}}lez L{\'{o}}pez and
               S. Pavankumar Dubagunta and
               Antonio M. Peinado and
               Mathew Magimai{-}Doss},
  title     = {On Joint Optimization of Automatic Speaker Verification and Anti-Spoofing
               in the Embedding Space},
  journal   = {{IEEE} Trans. Inf. Forensics Secur.},
  volume    = {16},
  pages     = {1579--1593},
  year      = {2021},
  url       = {https://doi.org/10.1109/TIFS.2020.3039045},
  doi       = {10.1109/TIFS.2020.3039045},
  timestamp = {Fri, 09 Apr 2021 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/tifs/AlanisLDPM21.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/AlaqlB21,
  author    = {Abdulrahman Alaql and
               Swarup Bhunia},
  title     = {{SARO:} Scalable Attack-Resistant Logic Locking},
  journal   = {{IEEE} Trans. Inf. Forensics Secur.},
  volume    = {16},
  pages     = {3724--3739},
  year      = {2021},
  url       = {https://doi.org/10.1109/TIFS.2021.3092135},
  doi       = {10.1109/TIFS.2021.3092135},
  timestamp = {Thu, 16 Sep 2021 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/tifs/AlaqlB21.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/AljasemIMSJMM21,
  author    = {Muteb Aljasem and
               Aun Irtaza and
               Hafiz Malik and
               Noushin Saba and
               Ali Javed and
               Khalid Mahmood Malik and
               Mohammad Meharmohammadi},
  title     = {Secure Automatic Speaker Verification {(SASV)} System Through sm-ALTP
               Features and Asymmetric Bagging},
  journal   = {{IEEE} Trans. Inf. Forensics Secur.},
  volume    = {16},
  pages     = {3524--3537},
  year      = {2021},
  url       = {https://doi.org/10.1109/TIFS.2021.3082303},
  doi       = {10.1109/TIFS.2021.3082303},
  timestamp = {Thu, 16 Sep 2021 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/tifs/AljasemIMSJMM21.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/AlrahisPKSMAS21,
  author    = {Lilas Alrahis and
               Satwik Patnaik and
               Johann Knechtel and
               Hani H. Saleh and
               Baker Mohammad and
               Mahmoud Al{-}Qutayri and
               Ozgur Sinanoglu},
  title     = {{UNSAIL:} Thwarting Oracle-Less Machine Learning Attacks on Logic
               Locking},
  journal   = {{IEEE} Trans. Inf. Forensics Secur.},
  volume    = {16},
  pages     = {2508--2523},
  year      = {2021},
  url       = {https://doi.org/10.1109/TIFS.2021.3057576},
  doi       = {10.1109/TIFS.2021.3057576},
  timestamp = {Wed, 07 Apr 2021 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/tifs/AlrahisPKSMAS21.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/AltinisikS21,
  author    = {Enes Altinisik and
               Husrev Taha Sencar},
  title     = {Source Camera Verification for Strongly Stabilized Videos},
  journal   = {{IEEE} Trans. Inf. Forensics Secur.},
  volume    = {16},
  pages     = {643--657},
  year      = {2021},
  url       = {https://doi.org/10.1109/TIFS.2020.3016830},
  doi       = {10.1109/TIFS.2020.3016830},
  timestamp = {Tue, 06 Oct 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/tifs/AltinisikS21.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/AltinisikS21a,
  author    = {Enes Altinisik and
               H{\"{u}}srev T. Sencar},
  title     = {Automatic Generation of {H.264} Parameter Sets to Recover Video File
               Fragments},
  journal   = {{IEEE} Trans. Inf. Forensics Secur.},
  volume    = {16},
  pages     = {4857--4868},
  year      = {2021},
  url       = {https://doi.org/10.1109/TIFS.2021.3118876},
  doi       = {10.1109/TIFS.2021.3118876},
  timestamp = {Wed, 03 Nov 2021 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/journals/tifs/AltinisikS21a.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/AmsalegBBEFHRN21,
  author    = {Laurent Amsaleg and
               James Bailey and
               Am{\'{e}}lie Barbe and
               Sarah M. Erfani and
               Teddy Furon and
               Michael E. Houle and
               Milos Radovanovic and
               Xuan Vinh Nguyen},
  title     = {High Intrinsic Dimensionality Facilitates Adversarial Attack: Theoretical
               Evidence},
  journal   = {{IEEE} Trans. Inf. Forensics Secur.},
  volume    = {16},
  pages     = {854--865},
  year      = {2021},
  url       = {https://doi.org/10.1109/TIFS.2020.3023274},
  doi       = {10.1109/TIFS.2020.3023274},
  timestamp = {Tue, 01 Dec 2020 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/journals/tifs/AmsalegBBEFHRN21.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/AprilPyoneK21,
  author    = {MaungMaung AprilPyone and
               Hitoshi Kiya},
  title     = {Block-Wise Image Transformation With Secret Key for Adversarially
               Robust Defense},
  journal   = {{IEEE} Trans. Inf. Forensics Secur.},
  volume    = {16},
  pages     = {2709--2723},
  year      = {2021},
  url       = {https://doi.org/10.1109/TIFS.2021.3062977},
  doi       = {10.1109/TIFS.2021.3062977},
  timestamp = {Sun, 16 May 2021 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/tifs/AprilPyoneK21.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/Arashloo21,
  author    = {Shervin Rahimzadeh Arashloo},
  title     = {Matrix-Regularized One-Class Multiple Kernel Learning for Unseen Face
               Presentation Attack Detection},
  journal   = {{IEEE} Trans. Inf. Forensics Secur.},
  volume    = {16},
  pages     = {4635--4647},
  year      = {2021},
  url       = {https://doi.org/10.1109/TIFS.2021.3111766},
  doi       = {10.1109/TIFS.2021.3111766},
  timestamp = {Wed, 03 Nov 2021 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/journals/tifs/Arashloo21.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/ArribasZN21,
  author    = {Victor Arribas and
               Zhenda Zhang and
               Svetla Nikova},
  title     = {{LLTI:} Low-Latency Threshold Implementations},
  journal   = {{IEEE} Trans. Inf. Forensics Secur.},
  volume    = {16},
  pages     = {5108--5123},
  year      = {2021},
  url       = {https://doi.org/10.1109/TIFS.2021.3123527},
  doi       = {10.1109/TIFS.2021.3123527},
  timestamp = {Wed, 15 Dec 2021 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/journals/tifs/ArribasZN21.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/BabunAU21,
  author    = {Leonardo Babun and
               Hidayet Aksu and
               A. Selcuk Uluagac},
  title     = {{CPS} Device-Class Identification via Behavioral Fingerprinting: From
               Theory to Practice},
  journal   = {{IEEE} Trans. Inf. Forensics Secur.},
  volume    = {16},
  pages     = {2413--2428},
  year      = {2021},
  url       = {https://doi.org/10.1109/TIFS.2021.3054968},
  doi       = {10.1109/TIFS.2021.3054968},
  timestamp = {Tue, 02 Mar 2021 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/journals/tifs/BabunAU21.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/BaeeSBFP21,
  author    = {Mir Ali Rezazadeh Baee and
               Leonie Simpson and
               Xavier Boyen and
               Ernest Foo and
               Josef Pieprzyk},
  title     = {On the Efficiency of Pairing-Based Authentication for Connected Vehicles:
               Time is Not on Our Side!},
  journal   = {{IEEE} Trans. Inf. Forensics Secur.},
  volume    = {16},
  pages     = {3678--3693},
  year      = {2021},
  url       = {https://doi.org/10.1109/TIFS.2021.3087359},
  doi       = {10.1109/TIFS.2021.3087359},
  timestamp = {Thu, 16 Sep 2021 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/tifs/BaeeSBFP21.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/BarniPT21,
  author    = {Mauro Barni and
               Quoc{-}Tin Phan and
               Benedetta Tondi},
  title     = {Copy Move Source-Target Disambiguation Through Multi-Branch CNNs},
  journal   = {{IEEE} Trans. Inf. Forensics Secur.},
  volume    = {16},
  pages     = {1825--1840},
  year      = {2021},
  url       = {https://doi.org/10.1109/TIFS.2020.3045903},
  doi       = {10.1109/TIFS.2020.3045903},
  timestamp = {Thu, 11 Feb 2021 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/journals/tifs/BarniPT21.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/BassitHPKVP21,
  author    = {Amina Bassit and
               Florian Hahn and
               Joep Peeters and
               Tom Kevenaar and
               Raymond N. J. Veldhuis and
               Andreas Peter},
  title     = {Fast and Accurate Likelihood Ratio-Based Biometric Verification Secure
               Against Malicious Adversaries},
  journal   = {{IEEE} Trans. Inf. Forensics Secur.},
  volume    = {16},
  pages     = {5045--5060},
  year      = {2021},
  url       = {https://doi.org/10.1109/TIFS.2021.3122823},
  doi       = {10.1109/TIFS.2021.3122823},
  timestamp = {Wed, 15 Dec 2021 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/journals/tifs/BassitHPKVP21.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/BastamiLMABH21,
  author    = {Hamed Bastami and
               Mehdi Letafati and
               Majid Moradikia and
               Ahmed Abdelhadi and
               Hamid Behroozi and
               Lajos Hanzo},
  title     = {On the Physical Layer Security of the Cooperative Rate-Splitting-Aided
               Downlink in {UAV} Networks},
  journal   = {{IEEE} Trans. Inf. Forensics Secur.},
  volume    = {16},
  pages     = {5018--5033},
  year      = {2021},
  url       = {https://doi.org/10.1109/TIFS.2021.3122989},
  doi       = {10.1109/TIFS.2021.3122989},
  timestamp = {Wed, 15 Dec 2021 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/journals/tifs/BastamiLMABH21.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/BernardBKP21,
  author    = {Sol{\`{e}}ne Bernard and
               Patrick Bas and
               John Klein and
               Tom{\'{a}}s Pevn{\'{y}}},
  title     = {Explicit Optimization of min max Steganographic Game},
  journal   = {{IEEE} Trans. Inf. Forensics Secur.},
  volume    = {16},
  pages     = {812--823},
  year      = {2021},
  url       = {https://doi.org/10.1109/TIFS.2020.3021913},
  doi       = {10.1109/TIFS.2020.3021913},
  timestamp = {Tue, 01 Dec 2020 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/journals/tifs/BernardBKP21.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/BertoccoAR21,
  author    = {Gabriel Bertocco and
               Fernanda A. Andal{\'{o}} and
               Anderson Rocha},
  title     = {Unsupervised and Self-Adaptative Techniques for Cross-Domain Person
               Re-Identification},
  journal   = {{IEEE} Trans. Inf. Forensics Secur.},
  volume    = {16},
  pages     = {4419--4434},
  year      = {2021},
  url       = {https://doi.org/10.1109/TIFS.2021.3107157},
  doi       = {10.1109/TIFS.2021.3107157},
  timestamp = {Wed, 15 Dec 2021 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/journals/tifs/BertoccoAR21.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/BharatiMFRBS21,
  author    = {Aparna Bharati and
               Daniel Moreira and
               Patrick J. Flynn and
               Anderson de Rezende Rocha and
               Kevin W. Bowyer and
               Walter J. Scheirer},
  title     = {Transformation-Aware Embeddings for Image Provenance},
  journal   = {{IEEE} Trans. Inf. Forensics Secur.},
  volume    = {16},
  pages     = {2493--2507},
  year      = {2021},
  url       = {https://doi.org/10.1109/TIFS.2021.3050061},
  doi       = {10.1109/TIFS.2021.3050061},
  timestamp = {Wed, 07 Apr 2021 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/tifs/BharatiMFRBS21.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/BianKHLS21,
  author    = {Song Bian and
               Dur{-}e{-}Shahwar Kundi and
               Kazuma Hirozawa and
               Weiqiang Liu and
               Takashi Sato},
  title     = {{APAS:} Application-Specific Accelerators for RLWE-Based Homomorphic
               Linear Transformations},
  journal   = {{IEEE} Trans. Inf. Forensics Secur.},
  volume    = {16},
  pages     = {4663--4678},
  year      = {2021},
  url       = {https://doi.org/10.1109/TIFS.2021.3114032},
  doi       = {10.1109/TIFS.2021.3114032},
  timestamp = {Wed, 03 Nov 2021 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/journals/tifs/BianKHLS21.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/BiswasKW21,
  author    = {Rajorshi Biswas and
               Sungji Kim and
               Jie Wu},
  title     = {Sampling Rate Distribution for Flow Monitoring and DDoS Detection
               in Datacenter},
  journal   = {{IEEE} Trans. Inf. Forensics Secur.},
  volume    = {16},
  pages     = {2524--2534},
  year      = {2021},
  url       = {https://doi.org/10.1109/TIFS.2021.3054522},
  doi       = {10.1109/TIFS.2021.3054522},
  timestamp = {Wed, 07 Apr 2021 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/tifs/BiswasKW21.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/CabanaYDLKAA21,
  author    = {Olivier Cabana and
               Amr M. Youssef and
               Mourad Debbabi and
               Bernard Lebel and
               Marthe Kassouf and
               Ribal Atallah and
               Basile L. Agba},
  title     = {Threat Intelligence Generation Using Network Telescope Data for Industrial
               Control Systems},
  journal   = {{IEEE} Trans. Inf. Forensics Secur.},
  volume    = {16},
  pages     = {3355--3370},
  year      = {2021},
  url       = {https://doi.org/10.1109/TIFS.2021.3078261},
  doi       = {10.1109/TIFS.2021.3078261},
  timestamp = {Tue, 15 Jun 2021 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/tifs/CabanaYDLKAA21.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/CaiHCCLZ21,
  author    = {Jiancheng Cai and
               Hu Han and
               Jiyun Cui and
               Jie Chen and
               Li Liu and
               S. Kevin Zhou},
  title     = {Semi-Supervised Natural Face De-Occlusion},
  journal   = {{IEEE} Trans. Inf. Forensics Secur.},
  volume    = {16},
  pages     = {1044--1057},
  year      = {2021},
  url       = {https://doi.org/10.1109/TIFS.2020.3023793},
  doi       = {10.1109/TIFS.2020.3023793},
  timestamp = {Mon, 31 May 2021 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/tifs/CaiHCCLZ21.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/CaiLWCK21,
  author    = {Rizhao Cai and
               Haoliang Li and
               Shiqi Wang and
               Changsheng Chen and
               Alex C. Kot},
  title     = {{DRL-FAS:} {A} Novel Framework Based on Deep Reinforcement Learning
               for Face Anti-Spoofing},
  journal   = {{IEEE} Trans. Inf. Forensics Secur.},
  volume    = {16},
  pages     = {937--951},
  year      = {2021},
  url       = {https://doi.org/10.1109/TIFS.2020.3026553},
  doi       = {10.1109/TIFS.2020.3026553},
  timestamp = {Tue, 01 Dec 2020 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/journals/tifs/CaiLWCK21.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/CamtepeDMMNPP21,
  author    = {Seyit Camtepe and
               Jarek Duda and
               Arash Mahboubi and
               Pawel Morawiecki and
               Surya Nepal and
               Marcin Pawlowski and
               Josef Pieprzyk},
  title     = {Compcrypt-Lightweight ANS-Based Compression and Encryption},
  journal   = {{IEEE} Trans. Inf. Forensics Secur.},
  volume    = {16},
  pages     = {3859--3873},
  year      = {2021},
  url       = {https://doi.org/10.1109/TIFS.2021.3096026},
  doi       = {10.1109/TIFS.2021.3096026},
  timestamp = {Thu, 16 Sep 2021 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/tifs/CamtepeDMMNPP21.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/CaoWDLDCG21,
  author    = {Kunrui Cao and
               Buhong Wang and
               Haiyang Ding and
               Lu Lv and
               Runze Dong and
               Tianhao Cheng and
               Fengkui Gong},
  title     = {Improving Physical Layer Security of Uplink {NOMA} via Energy Harvesting
               Jammers},
  journal   = {{IEEE} Trans. Inf. Forensics Secur.},
  volume    = {16},
  pages     = {786--799},
  year      = {2021},
  url       = {https://doi.org/10.1109/TIFS.2020.3023277},
  doi       = {10.1109/TIFS.2020.3023277},
  timestamp = {Tue, 01 Dec 2020 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/journals/tifs/CaoWDLDCG21.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/CaoZZH21,
  author    = {Yun Cao and
               Hong Zhang and
               Xianfeng Zhao and
               Xiaolei He},
  title     = {Steganalysis of {H.264/AVC} Videos Exploiting Subtractive Prediction
               Error Blocks},
  journal   = {{IEEE} Trans. Inf. Forensics Secur.},
  volume    = {16},
  pages     = {3326--3338},
  year      = {2021},
  url       = {https://doi.org/10.1109/TIFS.2021.3078822},
  doi       = {10.1109/TIFS.2021.3078822},
  timestamp = {Tue, 15 Jun 2021 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/tifs/CaoZZH21.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/CarletCGKT21,
  author    = {Claude Carlet and
               {\'{E}}loi de Ch{\'{e}}risey and
               Sylvain Guilley and
               Sel{\c{c}}uk Kavut and
               Deng Tang},
  title     = {Intrinsic Resiliency of S-Boxes Against Side-Channel Attacks-Best
               and Worst Scenarios},
  journal   = {{IEEE} Trans. Inf. Forensics Secur.},
  volume    = {16},
  pages     = {203--218},
  year      = {2021},
  url       = {https://doi.org/10.1109/TIFS.2020.3006399},
  doi       = {10.1109/TIFS.2020.3006399},
  timestamp = {Wed, 26 Aug 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/tifs/CarletCGKT21.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/CeccatoFLT21,
  author    = {Marco Ceccato and
               Francesco Formaggio and
               Nicola Laurenti and
               Stefano Tomasin},
  title     = {Generalized Likelihood Ratio Test for {GNSS} Spoofing Detection in
               Devices With {IMU}},
  journal   = {{IEEE} Trans. Inf. Forensics Secur.},
  volume    = {16},
  pages     = {3496--3509},
  year      = {2021},
  url       = {https://doi.org/10.1109/TIFS.2021.3083414},
  doi       = {10.1109/TIFS.2021.3083414},
  timestamp = {Fri, 13 Aug 2021 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/tifs/CeccatoFLT21.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/ChaiWZ21,
  author    = {Yun Chai and
               Youguo Wang and
               Liang Zhu},
  title     = {Information Sources Estimation in Time-Varying Networks},
  journal   = {{IEEE} Trans. Inf. Forensics Secur.},
  volume    = {16},
  pages     = {2621--2636},
  year      = {2021},
  url       = {https://doi.org/10.1109/TIFS.2021.3050604},
  doi       = {10.1109/TIFS.2021.3050604},
  timestamp = {Wed, 07 Apr 2021 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/tifs/ChaiWZ21.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/ChakrabortyCAB21,
  author    = {Prabuddha Chakraborty and
               Jonathan Cruz and
               Abdulrahman Alaql and
               Swarup Bhunia},
  title     = {{SAIL:} Analyzing Structural Artifacts of Logic Locking Using Machine
               Learning},
  journal   = {{IEEE} Trans. Inf. Forensics Secur.},
  volume    = {16},
  pages     = {3828--3842},
  year      = {2021},
  url       = {https://doi.org/10.1109/TIFS.2021.3096028},
  doi       = {10.1109/TIFS.2021.3096028},
  timestamp = {Thu, 16 Sep 2021 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/tifs/ChakrabortyCAB21.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/ChaterjeeMC21,
  author    = {Urbi Chatterjee and
               Debdeep Mukhopadhyay and
               Rajat Subhra Chakraborty},
  title     = {3PAA: {A} Private {PUF} Protocol for Anonymous Authentication},
  journal   = {{IEEE} Trans. Inf. Forensics Secur.},
  volume    = {16},
  pages     = {756--769},
  year      = {2021},
  url       = {https://doi.org/10.1109/TIFS.2020.3021917},
  doi       = {10.1109/TIFS.2020.3021917},
  timestamp = {Tue, 01 Dec 2020 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/journals/tifs/ChaterjeeMC21.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/ChawlaKM21,
  author    = {Nikhil Chawla and
               Harshit Kumar and
               Saibal Mukhopadhyay},
  title     = {Machine Learning in Wavelet Domain for Electromagnetic Emission Based
               Malware Analysis},
  journal   = {{IEEE} Trans. Inf. Forensics Secur.},
  volume    = {16},
  pages     = {3426--3441},
  year      = {2021},
  url       = {https://doi.org/10.1109/TIFS.2021.3080510},
  doi       = {10.1109/TIFS.2021.3080510},
  timestamp = {Tue, 15 Jun 2021 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/tifs/ChawlaKM21.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/ChenDLWZ21,
  author    = {Yuling Chen and
               Sen Dong and
               Tao Li and
               Yilei Wang and
               Huiyu Zhou},
  title     = {Dynamic Multi-Key {FHE} in Asymmetric Key Setting From {LWE}},
  journal   = {{IEEE} Trans. Inf. Forensics Secur.},
  volume    = {16},
  pages     = {5239--5249},
  year      = {2021},
  url       = {https://doi.org/10.1109/TIFS.2021.3127023},
  doi       = {10.1109/TIFS.2021.3127023},
  timestamp = {Wed, 15 Dec 2021 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/journals/tifs/ChenDLWZ21.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/ChenHL21,
  author    = {Yiqi Chen and
               Dan He and
               Yuan Luo},
  title     = {Strong Secrecy of Arbitrarily Varying Multiple Access Channels},
  journal   = {{IEEE} Trans. Inf. Forensics Secur.},
  volume    = {16},
  pages     = {3662--3677},
  year      = {2021},
  url       = {https://doi.org/10.1109/TIFS.2021.3087338},
  doi       = {10.1109/TIFS.2021.3087338},
  timestamp = {Tue, 09 Nov 2021 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/journals/tifs/ChenHL21.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/ChenLLTHDCK21,
  author    = {Guang Chen and
               Peigen Liu and
               Zhengfa Liu and
               Huajin Tang and
               Lin Hong and
               Jinhu Dong and
               J{\"{o}}rg Conradt and
               Alois C. Knoll},
  title     = {NeuroAED: Towards Efficient Abnormal Event Detection in Visual Surveillance
               With Neuromorphic Vision Sensor},
  journal   = {{IEEE} Trans. Inf. Forensics Secur.},
  volume    = {16},
  pages     = {923--936},
  year      = {2021},
  url       = {https://doi.org/10.1109/TIFS.2020.3023791},
  doi       = {10.1109/TIFS.2020.3023791},
  timestamp = {Wed, 19 May 2021 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/tifs/ChenLLTHDCK21.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/ChenNCLG21,
  author    = {Juncheng Chen and
               Jun{-}Sheng Ng and
               Kwen{-}Siong Chong and
               Zhiping Lin and
               Bah{-}Hwee Gwee},
  title     = {A Novel Normalized Variance-Based Differential Power Analysis Against
               Masking Countermeasures},
  journal   = {{IEEE} Trans. Inf. Forensics Secur.},
  volume    = {16},
  pages     = {3767--3779},
  year      = {2021},
  url       = {https://doi.org/10.1109/TIFS.2021.3093783},
  doi       = {10.1109/TIFS.2021.3093783},
  timestamp = {Thu, 16 Sep 2021 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/tifs/ChenNCLG21.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/ChenYLWK21,
  author    = {Baoliang Chen and
               Wenhan Yang and
               Haoliang Li and
               Shiqi Wang and
               Sam Kwong},
  title     = {Camera Invariant Feature Learning for Generalized Face Anti-Spoofing},
  journal   = {{IEEE} Trans. Inf. Forensics Secur.},
  volume    = {16},
  pages     = {2477--2492},
  year      = {2021},
  url       = {https://doi.org/10.1109/TIFS.2021.3055018},
  doi       = {10.1109/TIFS.2021.3055018},
  timestamp = {Sun, 25 Jul 2021 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/tifs/ChenYLWK21.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/ChenZZWL21,
  author    = {Jian Chen and
               Xuxin Zhang and
               Rui Zhang and
               Chen Wang and
               Ling Liu},
  title     = {De-Pois: An Attack-Agnostic Defense against Data Poisoning Attacks},
  journal   = {{IEEE} Trans. Inf. Forensics Secur.},
  volume    = {16},
  pages     = {3412--3425},
  year      = {2021},
  url       = {https://doi.org/10.1109/TIFS.2021.3080522},
  doi       = {10.1109/TIFS.2021.3080522},
  timestamp = {Wed, 06 Oct 2021 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/tifs/ChenZZWL21.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/ChengGCMD21,
  author    = {Wei Cheng and
               Sylvain Guilley and
               Claude Carlet and
               Sihem Mesnager and
               Jean{-}Luc Danger},
  title     = {Optimizing Inner Product Masking Scheme by a Coding Theory Approach},
  journal   = {{IEEE} Trans. Inf. Forensics Secur.},
  volume    = {16},
  pages     = {220--235},
  year      = {2021},
  url       = {https://doi.org/10.1109/TIFS.2020.3009609},
  doi       = {10.1109/TIFS.2020.3009609},
  timestamp = {Fri, 11 Mar 2022 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/journals/tifs/ChengGCMD21.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/ChengK21,
  author    = {Kevin H. M. Cheng and
               Ajay Kumar},
  title     = {Deep Feature Collaboration for Challenging 3D Finger Knuckle Identification},
  journal   = {{IEEE} Trans. Inf. Forensics Secur.},
  volume    = {16},
  pages     = {1158--1173},
  year      = {2021},
  url       = {https://doi.org/10.1109/TIFS.2020.3029906},
  doi       = {10.1109/TIFS.2020.3029906},
  timestamp = {Thu, 17 Dec 2020 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/journals/tifs/ChengK21.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/ChoCC21,
  author    = {Sunghwan Cho and
               Gaojie Chen and
               Justin P. Coon},
  title     = {Zero-Forcing Beamforming for Active and Passive Eavesdropper Mitigation
               in Visible Light Communication Systems},
  journal   = {{IEEE} Trans. Inf. Forensics Secur.},
  volume    = {16},
  pages     = {1495--1505},
  year      = {2021},
  url       = {https://doi.org/10.1109/TIFS.2020.3036806},
  doi       = {10.1109/TIFS.2020.3036806},
  timestamp = {Thu, 11 Feb 2021 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/journals/tifs/ChoCC21.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/ChoKKLL21,
  author    = {MyeongAh Cho and
               Taeoh Kim and
               Ig{-}Jae Kim and
               Kyungjae Lee and
               Sangyoun Lee},
  title     = {Relational Deep Feature Learning for Heterogeneous Face Recognition},
  journal   = {{IEEE} Trans. Inf. Forensics Secur.},
  volume    = {16},
  pages     = {376--388},
  year      = {2021},
  url       = {https://doi.org/10.1109/TIFS.2020.3013186},
  doi       = {10.1109/TIFS.2020.3013186},
  timestamp = {Thu, 02 Sep 2021 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/tifs/ChoKKLL21.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/ChoL21,
  author    = {Kang{-}Hee Cho and
               Si{-}Hyeon Lee},
  title     = {Treating Interference as Noise Is Optimal for Covert Communication
               Over Interference Channels},
  journal   = {{IEEE} Trans. Inf. Forensics Secur.},
  volume    = {16},
  pages     = {322--332},
  year      = {2021},
  url       = {https://doi.org/10.1109/TIFS.2020.3013213},
  doi       = {10.1109/TIFS.2020.3013213},
  timestamp = {Tue, 06 Oct 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/tifs/ChoL21.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/ChuHXMLKKF21,
  author    = {Zheng Chu and
               Wanming Hao and
               Pei Xiao and
               De Mi and
               Zilong Liu and
               Mohsen Khalily and
               James R. Kelly and
               Alexandros P. Feresidis},
  title     = {Secrecy Rate Optimization for Intelligent Reflecting Surface Assisted
               {MIMO} System},
  journal   = {{IEEE} Trans. Inf. Forensics Secur.},
  volume    = {16},
  pages     = {1655--1669},
  year      = {2021},
  url       = {https://doi.org/10.1109/TIFS.2020.3038994},
  doi       = {10.1109/TIFS.2020.3038994},
  timestamp = {Wed, 23 Mar 2022 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/journals/tifs/ChuHXMLKKF21.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/ChughJ21,
  author    = {Tarang Chugh and
               Anil K. Jain},
  title     = {Fingerprint Spoof Detector Generalization},
  journal   = {{IEEE} Trans. Inf. Forensics Secur.},
  volume    = {16},
  pages     = {42--55},
  year      = {2021},
  url       = {https://doi.org/10.1109/TIFS.2020.2990789},
  doi       = {10.1109/TIFS.2020.2990789},
  timestamp = {Wed, 26 Aug 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/tifs/ChughJ21.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/CirilloMMT21,
  author    = {Michele Cirillo and
               Mario Di Mauro and
               Vincenzo Matta and
               Marco Tambasco},
  title     = {Botnet Identification in DDoS Attacks With Multiple Emulation Dictionaries},
  journal   = {{IEEE} Trans. Inf. Forensics Secur.},
  volume    = {16},
  pages     = {3554--3569},
  year      = {2021},
  url       = {https://doi.org/10.1109/TIFS.2021.3082290},
  doi       = {10.1109/TIFS.2021.3082290},
  timestamp = {Thu, 16 Sep 2021 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/tifs/CirilloMMT21.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/CohenCG21,
  author    = {Alejandro Cohen and
               Asaf Cohen and
               Omer Gurewitz},
  title     = {Secure Group Testing},
  journal   = {{IEEE} Trans. Inf. Forensics Secur.},
  volume    = {16},
  pages     = {4003--4018},
  year      = {2021},
  url       = {https://doi.org/10.1109/TIFS.2020.3029877},
  doi       = {10.1109/TIFS.2020.3029877},
  timestamp = {Thu, 16 Sep 2021 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/tifs/CohenCG21.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/CuiFZ21,
  author    = {Zhe Cui and
               Jianjiang Feng and
               Jie Zhou},
  title     = {Dense Registration and Mosaicking of Fingerprints by Training an End-to-End
               Network},
  journal   = {{IEEE} Trans. Inf. Forensics Secur.},
  volume    = {16},
  pages     = {627--642},
  year      = {2021},
  url       = {https://doi.org/10.1109/TIFS.2020.3017926},
  doi       = {10.1109/TIFS.2020.3017926},
  timestamp = {Tue, 06 Oct 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/tifs/CuiFZ21.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/CuiHCL21,
  author    = {Aijiao Cui and
               Chengkang He and
               Chip{-}Hong Chang and
               Hao Lu},
  title     = {Identification of {FSM} State Registers by Analytics of Scan-Dump
               Data},
  journal   = {{IEEE} Trans. Inf. Forensics Secur.},
  volume    = {16},
  pages     = {5138--5153},
  year      = {2021},
  url       = {https://doi.org/10.1109/TIFS.2021.3123534},
  doi       = {10.1109/TIFS.2021.3123534},
  timestamp = {Wed, 15 Dec 2021 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/journals/tifs/CuiHCL21.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/CuiHJFY21,
  author    = {Lei Cui and
               Zhiyu Hao and
               Yang Jiao and
               Haiqiang Fei and
               Xiaochun Yun},
  title     = {VulDetector: Detecting Vulnerabilities Using Weighted Feature Graph
               Comparison},
  journal   = {{IEEE} Trans. Inf. Forensics Secur.},
  volume    = {16},
  pages     = {2004--2017},
  year      = {2021},
  url       = {https://doi.org/10.1109/TIFS.2020.3047756},
  doi       = {10.1109/TIFS.2020.3047756},
  timestamp = {Thu, 11 Feb 2021 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/journals/tifs/CuiHJFY21.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/DaiLCLZJ21,
  author    = {Weiqi Dai and
               Yan Lv and
               Kim{-}Kwang Raymond Choo and
               Zhongze Liu and
               Deqing Zou and
               Hai Jin},
  title     = {{CRSA:} {A} Cryptocurrency Recovery Scheme Based on Hidden Assistance
               Relationships},
  journal   = {{IEEE} Trans. Inf. Forensics Secur.},
  volume    = {16},
  pages     = {4291--4305},
  year      = {2021},
  url       = {https://doi.org/10.1109/TIFS.2021.3104142},
  doi       = {10.1109/TIFS.2021.3104142},
  timestamp = {Mon, 20 Sep 2021 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/tifs/DaiLCLZJ21.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/DebJ21,
  author    = {Debayan Deb and
               Anil K. Jain},
  title     = {Look Locally Infer Globally: {A} Generalizable Face Anti-Spoofing
               Approach},
  journal   = {{IEEE} Trans. Inf. Forensics Secur.},
  volume    = {16},
  pages     = {1143--1157},
  year      = {2021},
  url       = {https://doi.org/10.1109/TIFS.2020.3029879},
  doi       = {10.1109/TIFS.2020.3029879},
  timestamp = {Thu, 17 Dec 2020 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/journals/tifs/DebJ21.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/DegardinLP21,
  author    = {Bruno Degardin and
               Vasco Lopes and
               Hugo Proen{\c{c}}a},
  title     = {{REGINA} - Reasoning Graph Convolutional Networks in Human Action
               Recognition},
  journal   = {{IEEE} Trans. Inf. Forensics Secur.},
  volume    = {16},
  pages     = {5442--5451},
  year      = {2021},
  url       = {https://doi.org/10.1109/TIFS.2021.3130437},
  doi       = {10.1109/TIFS.2021.3130437},
  timestamp = {Sat, 25 Dec 2021 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/journals/tifs/DegardinLP21.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/DelcourtB21,
  author    = {Marguerite Delcourt and
               Jean{-}Yves Le Boudec},
  title     = {{TDOA} Source-Localization Technique Robust to Time-Synchronization
               Attacks},
  journal   = {{IEEE} Trans. Inf. Forensics Secur.},
  volume    = {16},
  pages     = {4249--4264},
  year      = {2021},
  url       = {https://doi.org/10.1109/TIFS.2020.3001741},
  doi       = {10.1109/TIFS.2020.3001741},
  timestamp = {Thu, 16 Sep 2021 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/tifs/DelcourtB21.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/DemetrioBLRA21,
  author    = {Luca Demetrio and
               Battista Biggio and
               Giovanni Lagorio and
               Fabio Roli and
               Alessandro Armando},
  title     = {Functionality-Preserving Black-Box Optimization of Adversarial Windows
               Malware},
  journal   = {{IEEE} Trans. Inf. Forensics Secur.},
  volume    = {16},
  pages     = {3469--3478},
  year      = {2021},
  url       = {https://doi.org/10.1109/TIFS.2021.3082330},
  doi       = {10.1109/TIFS.2021.3082330},
  timestamp = {Sat, 09 Apr 2022 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/tifs/DemetrioBLRA21.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/DengLCLS21,
  author    = {Qiyao Deng and
               Qi Li and
               Jie Cao and
               Yunfan Liu and
               Zhenan Sun},
  title     = {Controllable Multi-Attribute Editing of High-Resolution Face Images},
  journal   = {{IEEE} Trans. Inf. Forensics Secur.},
  volume    = {16},
  pages     = {1410--1423},
  year      = {2021},
  url       = {https://doi.org/10.1109/TIFS.2020.3033184},
  doi       = {10.1109/TIFS.2020.3033184},
  timestamp = {Thu, 11 Feb 2021 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/journals/tifs/DengLCLS21.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/DesaiN21,
  author    = {S. Sundeep Desai and
               Manisha J. Nene},
  title     = {Multihop Trust Evaluation Using Memory Integrity in Wireless Sensor
               Networks},
  journal   = {{IEEE} Trans. Inf. Forensics Secur.},
  volume    = {16},
  pages     = {4092--4100},
  year      = {2021},
  url       = {https://doi.org/10.1109/TIFS.2021.3101051},
  doi       = {10.1109/TIFS.2021.3101051},
  timestamp = {Wed, 01 Sep 2021 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/tifs/DesaiN21.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/DesmedtMS21,
  author    = {Yvo Desmedt and
               Songbao Mo and
               Arkadii M. Slinko},
  title     = {Framing in Secret Sharing},
  journal   = {{IEEE} Trans. Inf. Forensics Secur.},
  volume    = {16},
  pages     = {2836--2842},
  year      = {2021},
  url       = {https://doi.org/10.1109/TIFS.2021.3067468},
  doi       = {10.1109/TIFS.2021.3067468},
  timestamp = {Sun, 16 May 2021 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/tifs/DesmedtMS21.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/DingWCZGFL21,
  author    = {Baojin Ding and
               Haixia Wang and
               Peng Chen and
               Yilong Zhang and
               Zhenhua Guo and
               Jianjiang Feng and
               Ronghua Liang},
  title     = {Surface and Internal Fingerprint Reconstruction From Optical Coherence
               Tomography Through Convolutional Neural Network},
  journal   = {{IEEE} Trans. Inf. Forensics Secur.},
  volume    = {16},
  pages     = {685--700},
  year      = {2021},
  url       = {https://doi.org/10.1109/TIFS.2020.3016829},
  doi       = {10.1109/TIFS.2020.3016829},
  timestamp = {Tue, 06 Oct 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/tifs/DingWCZGFL21.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/DingWJHTG21,
  author    = {Wenjie Ding and
               Xing Wei and
               Rongrong Ji and
               Xiaopeng Hong and
               Qi Tian and
               Yihong Gong},
  title     = {Beyond Universal Person Re-Identification Attack},
  journal   = {{IEEE} Trans. Inf. Forensics Secur.},
  volume    = {16},
  pages     = {3442--3455},
  year      = {2021},
  url       = {https://doi.org/10.1109/TIFS.2021.3081247},
  doi       = {10.1109/TIFS.2021.3081247},
  timestamp = {Tue, 15 Jun 2021 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/tifs/DingWJHTG21.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/DingWZCJ21,
  author    = {Xiaofeng Ding and
               Zuan Wang and
               Pan Zhou and
               Kim{-}Kwang Raymond Choo and
               Hai Jin},
  title     = {Efficient and Privacy-Preserving Multi-Party Skyline Queries Over
               Encrypted Data},
  journal   = {{IEEE} Trans. Inf. Forensics Secur.},
  volume    = {16},
  pages     = {4589--4604},
  year      = {2021},
  url       = {https://doi.org/10.1109/TIFS.2021.3109459},
  doi       = {10.1109/TIFS.2021.3109459},
  timestamp = {Mon, 20 Sep 2021 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/tifs/DingWZCJ21.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/DongJDW21,
  author    = {Qiying Dong and
               Chunfu Jia and
               Fei Duan and
               Ding Wang},
  title     = {{RLS-PSM:} {A} Robust and Accurate Password Strength Meter Based on
               Reuse, Leet and Separation},
  journal   = {{IEEE} Trans. Inf. Forensics Secur.},
  volume    = {16},
  pages     = {4988--5002},
  year      = {2021},
  url       = {https://doi.org/10.1109/TIFS.2021.3107147},
  doi       = {10.1109/TIFS.2021.3107147},
  timestamp = {Wed, 03 Nov 2021 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/journals/tifs/DongJDW21.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/DongLCLC21,
  author    = {Cong Dong and
               Zhigang Lu and
               Zelin Cui and
               Baoxu Liu and
               Kai Chen},
  title     = {MBTree: Detecting Encryption RATs Communication Using Malicious Behavior
               Tree},
  journal   = {{IEEE} Trans. Inf. Forensics Secur.},
  volume    = {16},
  pages     = {3589--3603},
  year      = {2021},
  url       = {https://doi.org/10.1109/TIFS.2021.3071595},
  doi       = {10.1109/TIFS.2021.3071595},
  timestamp = {Thu, 16 Sep 2021 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/tifs/DongLCLC21.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/DongPZ21,
  author    = {Guannan Dong and
               Chi{-}Man Pun and
               Zheng Zhang},
  title     = {Deep Collaborative Multi-Modal Learning for Unsupervised Kinship Estimation},
  journal   = {{IEEE} Trans. Inf. Forensics Secur.},
  volume    = {16},
  pages     = {4197--4210},
  year      = {2021},
  url       = {https://doi.org/10.1109/TIFS.2021.3098165},
  doi       = {10.1109/TIFS.2021.3098165},
  timestamp = {Thu, 16 Sep 2021 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/tifs/DongPZ21.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/DragoiC21,
  author    = {Ioan{-}Catalin Dragoi and
               Dinu Coltuc},
  title     = {On the Security of Reversible Data Hiding in Encrypted Images by {MSB}
               Prediction},
  journal   = {{IEEE} Trans. Inf. Forensics Secur.},
  volume    = {16},
  pages     = {187--189},
  year      = {2021},
  url       = {https://doi.org/10.1109/TIFS.2020.3006382},
  doi       = {10.1109/TIFS.2020.3006382},
  timestamp = {Fri, 26 Mar 2021 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/journals/tifs/DragoiC21.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/DuanCWCL21,
  author    = {Shuchao Duan and
               Zhenxue Chen and
               Q. M. Jonathan Wu and
               Lei Cai and
               Dan Lu},
  title     = {Multi-Scale Gradients Self-Attention Residual Learning for Face Photo-Sketch
               Transformation},
  journal   = {{IEEE} Trans. Inf. Forensics Secur.},
  volume    = {16},
  pages     = {1218--1230},
  year      = {2021},
  url       = {https://doi.org/10.1109/TIFS.2020.3031386},
  doi       = {10.1109/TIFS.2020.3031386},
  timestamp = {Thu, 17 Dec 2020 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/journals/tifs/DuanCWCL21.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/DuranteSV21,
  author    = {Luca Durante and
               Lucia Seno and
               Adriano Valenzano},
  title     = {A Formal Model and Technique to Redistribute the Packet Filtering
               Load in Multiple Firewall Networks},
  journal   = {{IEEE} Trans. Inf. Forensics Secur.},
  volume    = {16},
  pages     = {2637--2651},
  year      = {2021},
  url       = {https://doi.org/10.1109/TIFS.2021.3057552},
  doi       = {10.1109/TIFS.2021.3057552},
  timestamp = {Wed, 07 Apr 2021 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/tifs/DuranteSV21.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/DuttaBV21,
  author    = {Arijit Dutta and
               Suyash Bagad and
               Saravanan Vijayakumaran},
  title     = {MProve+: Privacy Enhancing Proof of Reserves Protocol for Monero},
  journal   = {{IEEE} Trans. Inf. Forensics Secur.},
  volume    = {16},
  pages     = {3900--3915},
  year      = {2021},
  url       = {https://doi.org/10.1109/TIFS.2021.3088035},
  doi       = {10.1109/TIFS.2021.3088035},
  timestamp = {Thu, 16 Sep 2021 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/tifs/DuttaBV21.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/EdrakiKRMS21,
  author    = {Marzieh Edraki and
               Nazmul Karim and
               Nazanin Rahnavard and
               Ajmal Mian and
               Mubarak Shah},
  title     = {Odyssey: Creation, Analysis and Detection of Trojan Models},
  journal   = {{IEEE} Trans. Inf. Forensics Secur.},
  volume    = {16},
  pages     = {4521--4533},
  year      = {2021},
  url       = {https://doi.org/10.1109/TIFS.2021.3108407},
  doi       = {10.1109/TIFS.2021.3108407},
  timestamp = {Mon, 20 Sep 2021 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/tifs/EdrakiKRMS21.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/ErdemirDG21,
  author    = {Ece Naz Erdemir and
               Pier Luigi Dragotti and
               Deniz G{\"{u}}nd{\"{u}}z},
  title     = {Privacy-Aware Time-Series Data Sharing With Deep Reinforcement Learning},
  journal   = {{IEEE} Trans. Inf. Forensics Secur.},
  volume    = {16},
  pages     = {389--401},
  year      = {2021},
  url       = {https://doi.org/10.1109/TIFS.2020.3013200},
  doi       = {10.1109/TIFS.2020.3013200},
  timestamp = {Mon, 26 Oct 2020 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/journals/tifs/ErdemirDG21.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/EtesamiKLP21,
  author    = {S. Rasoul Etesami and
               Negar Kiyavash and
               Vincent L{\'{e}}on and
               H. Vincent Poor},
  title     = {Optimal Adversarial Policies in the Multiplicative Learning System
               With a Malicious Expert},
  journal   = {{IEEE} Trans. Inf. Forensics Secur.},
  volume    = {16},
  pages     = {2276--2287},
  year      = {2021},
  url       = {https://doi.org/10.1109/TIFS.2021.3052360},
  doi       = {10.1109/TIFS.2021.3052360},
  timestamp = {Tue, 02 Mar 2021 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/journals/tifs/EtesamiKLP21.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/FadulRLO21,
  author    = {Mohamed K. M. Fadul and
               Donald R. Reising and
               T. Daniel Loveless and
               Abdul R. Ofoli},
  title     = {Nelder-Mead Simplex Channel Estimation for the {RF-DNA} Fingerprinting
               of {OFDM} Transmitters Under Rayleigh Fading Conditions},
  journal   = {{IEEE} Trans. Inf. Forensics Secur.},
  volume    = {16},
  pages     = {2381--2396},
  year      = {2021},
  url       = {https://doi.org/10.1109/TIFS.2021.3054524},
  doi       = {10.1109/TIFS.2021.3054524},
  timestamp = {Tue, 02 Mar 2021 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/journals/tifs/FadulRLO21.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/FaeziYBF21,
  author    = {Sina Faezi and
               Rozhin Yasaei and
               Anomadarshi Barua and
               Mohammad Abdullah Al Faruque},
  title     = {Brain-Inspired Golden Chip Free Hardware Trojan Detection},
  journal   = {{IEEE} Trans. Inf. Forensics Secur.},
  volume    = {16},
  pages     = {2697--2708},
  year      = {2021},
  url       = {https://doi.org/10.1109/TIFS.2021.3062989},
  doi       = {10.1109/TIFS.2021.3062989},
  timestamp = {Sun, 16 May 2021 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/tifs/FaeziYBF21.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/FanLLL21,
  author    = {Ye Fan and
               Ang Li and
               Xuewen Liao and
               Victor C. M. Leung},
  title     = {Secure Interference Exploitation Precoding in {MISO} Wiretap Channel:
               Destructive Region Redefinition With Efficient Solutions},
  journal   = {{IEEE} Trans. Inf. Forensics Secur.},
  volume    = {16},
  pages     = {402--417},
  year      = {2021},
  url       = {https://doi.org/10.1109/TIFS.2020.3013210},
  doi       = {10.1109/TIFS.2020.3013210},
  timestamp = {Tue, 06 Oct 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/tifs/FanLLL21.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/FanSXLL21,
  author    = {Ming Fan and
               Ziliang Si and
               Xiaofei Xie and
               Yang Liu and
               Ting Liu},
  title     = {Text Backdoor Detection Using an Interpretable {RNN} Abstract Model},
  journal   = {{IEEE} Trans. Inf. Forensics Secur.},
  volume    = {16},
  pages     = {4117--4132},
  year      = {2021},
  url       = {https://doi.org/10.1109/TIFS.2021.3103064},
  doi       = {10.1109/TIFS.2021.3103064},
  timestamp = {Thu, 23 Jun 2022 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/tifs/FanSXLL21.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/FanWXLGL21,
  author    = {Ming Fan and
               Wenying Wei and
               Xiaofei Xie and
               Yang Liu and
               Xiaohong Guan and
               Ting Liu},
  title     = {Can We Trust Your Explanations? Sanity Checks for Interpreters in
               Android Malware Analysis},
  journal   = {{IEEE} Trans. Inf. Forensics Secur.},
  volume    = {16},
  pages     = {838--853},
  year      = {2021},
  url       = {https://doi.org/10.1109/TIFS.2020.3021924},
  doi       = {10.1109/TIFS.2020.3021924},
  timestamp = {Thu, 23 Jun 2022 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/tifs/FanWXLGL21.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/FangCB21,
  author    = {Zhaoyuan Fang and
               Adam Czajka and
               Kevin W. Bowyer},
  title     = {Robust Iris Presentation Attack Detection Fusing 2D and 3D Information},
  journal   = {{IEEE} Trans. Inf. Forensics Secur.},
  volume    = {16},
  pages     = {510--520},
  year      = {2021},
  url       = {https://doi.org/10.1109/TIFS.2020.3015547},
  doi       = {10.1109/TIFS.2020.3015547},
  timestamp = {Tue, 06 Oct 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/tifs/FangCB21.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/FangXXH21,
  author    = {Zijian Fang and
               Maochao Xu and
               Shouhuai Xu and
               Taizhong Hu},
  title     = {A Framework for Predicting Data Breach Risk: Leveraging Dependence
               to Cope With Sparsity},
  journal   = {{IEEE} Trans. Inf. Forensics Secur.},
  volume    = {16},
  pages     = {2186--2201},
  year      = {2021},
  url       = {https://doi.org/10.1109/TIFS.2021.3051804},
  doi       = {10.1109/TIFS.2021.3051804},
  timestamp = {Tue, 02 Mar 2021 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/journals/tifs/FangXXH21.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/FangXZHWBG21,
  author    = {Yuchun Fang and
               Zhengye Xiao and
               Wei Zhang and
               Yan Huang and
               Liang Wang and
               Nozha Boujemaa and
               Donald Geman},
  title     = {Attribute Prototype Learning for Interactive Face Retrieval},
  journal   = {{IEEE} Trans. Inf. Forensics Secur.},
  volume    = {16},
  pages     = {2593--2607},
  year      = {2021},
  url       = {https://doi.org/10.1109/TIFS.2021.3059274},
  doi       = {10.1109/TIFS.2021.3059274},
  timestamp = {Tue, 26 Oct 2021 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/tifs/FangXZHWBG21.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/FarokhiWSK21,
  author    = {Farhad Farokhi and
               Nan Wu and
               David B. Smith and
               Mohamed Ali K{\^{a}}afar},
  title     = {The Cost of Privacy in Asynchronous Differentially-Private Machine
               Learning},
  journal   = {{IEEE} Trans. Inf. Forensics Secur.},
  volume    = {16},
  pages     = {2118--2129},
  year      = {2021},
  url       = {https://doi.org/10.1109/TIFS.2021.3050603},
  doi       = {10.1109/TIFS.2021.3050603},
  timestamp = {Tue, 02 Mar 2021 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/journals/tifs/FarokhiWSK21.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/FazilSA21,
  author    = {Mohd Fazil and
               Amit Kumar Sah and
               Muhammad Abulaish},
  title     = {DeepSBD: {A} Deep Neural Network Model With Attention Mechanism for
               SocialBot Detection},
  journal   = {{IEEE} Trans. Inf. Forensics Secur.},
  volume    = {16},
  pages     = {4211--4223},
  year      = {2021},
  url       = {https://doi.org/10.1109/TIFS.2021.3102498},
  doi       = {10.1109/TIFS.2021.3102498},
  timestamp = {Thu, 16 Sep 2021 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/tifs/FazilSA21.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/FengCXMLL21,
  author    = {Ruitao Feng and
               Sen Chen and
               Xiaofei Xie and
               Guozhu Meng and
               Shang{-}Wei Lin and
               Yang Liu},
  title     = {A Performance-Sensitive Malware Detection System Using Deep Learning
               on Mobile Devices},
  journal   = {{IEEE} Trans. Inf. Forensics Secur.},
  volume    = {16},
  pages     = {1563--1578},
  year      = {2021},
  url       = {https://doi.org/10.1109/TIFS.2020.3025436},
  doi       = {10.1109/TIFS.2020.3025436},
  timestamp = {Thu, 23 Jun 2022 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/tifs/FengCXMLL21.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/FengSXW21,
  author    = {Xia Feng and
               Qichen Shi and
               Qingqing Xie and
               Liangmin Wang},
  title     = {{P2BA:} {A} Privacy-Preserving Protocol With Batch Authentication
               Against Semi-Trusted RSUs in Vehicular Ad Hoc Networks},
  journal   = {{IEEE} Trans. Inf. Forensics Secur.},
  volume    = {16},
  pages     = {3888--3899},
  year      = {2021},
  url       = {https://doi.org/10.1109/TIFS.2021.3098971},
  doi       = {10.1109/TIFS.2021.3098971},
  timestamp = {Thu, 16 Sep 2021 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/tifs/FengSXW21.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/FernandoFDS21,
  author    = {Tharindu Fernando and
               Clinton Fookes and
               Simon Denman and
               Sridha Sridharan},
  title     = {Detection of Fake and Fraudulent Faces via Neural Memory Networks},
  journal   = {{IEEE} Trans. Inf. Forensics Secur.},
  volume    = {16},
  pages     = {1973--1988},
  year      = {2021},
  url       = {https://doi.org/10.1109/TIFS.2020.3047768},
  doi       = {10.1109/TIFS.2020.3047768},
  timestamp = {Tue, 02 Mar 2021 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/journals/tifs/FernandoFDS21.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/FuHWWZH21,
  author    = {Chaoyou Fu and
               Yibo Hu and
               Xiang Wu and
               Guoli Wang and
               Qian Zhang and
               Ran He},
  title     = {High-Fidelity Face Manipulation With Extreme Poses and Expressions},
  journal   = {{IEEE} Trans. Inf. Forensics Secur.},
  volume    = {16},
  pages     = {2218--2231},
  year      = {2021},
  url       = {https://doi.org/10.1109/TIFS.2021.3050065},
  doi       = {10.1109/TIFS.2021.3050065},
  timestamp = {Fri, 27 Aug 2021 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/tifs/FuHWWZH21.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/GaoOY21,
  author    = {Si Gao and
               Elisabeth Oswald and
               Yan Yan},
  title     = {Neyman's Smoothness Test: {A} Trade-Off Between Moment-Based and Distribution-Based
               Leakage Detections},
  journal   = {{IEEE} Trans. Inf. Forensics Secur.},
  volume    = {16},
  pages     = {4494--4506},
  year      = {2021},
  url       = {https://doi.org/10.1109/TIFS.2021.3108570},
  doi       = {10.1109/TIFS.2021.3108570},
  timestamp = {Mon, 20 Sep 2021 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/tifs/GaoOY21.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/GaoWJZXJ21,
  author    = {Yang Gao and
               Wei Wang and
               Yincheng Jin and
               Chi Zhou and
               Wenyao Xu and
               Zhanpeng Jin},
  title     = {ThermoTag: {A} Hidden {ID} of 3D Printers for Fingerprinting and Watermarking},
  journal   = {{IEEE} Trans. Inf. Forensics Secur.},
  volume    = {16},
  pages     = {2805--2820},
  year      = {2021},
  url       = {https://doi.org/10.1109/TIFS.2021.3065225},
  doi       = {10.1109/TIFS.2021.3065225},
  timestamp = {Sun, 25 Jul 2021 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/tifs/GaoWJZXJ21.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/GaoZ21,
  author    = {Yiwen Gao and
               Yongbin Zhou},
  title     = {Side-Channel Attacks With Multi-Thread Mixed Leakage},
  journal   = {{IEEE} Trans. Inf. Forensics Secur.},
  volume    = {16},
  pages     = {770--785},
  year      = {2021},
  url       = {https://doi.org/10.1109/TIFS.2020.3023278},
  doi       = {10.1109/TIFS.2020.3023278},
  timestamp = {Tue, 01 Dec 2020 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/journals/tifs/GaoZ21.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/GaoZWDEMLW21,
  author    = {Lili Gao and
               Fangyu Zheng and
               Rong Wei and
               Jiankuo Dong and
               Niall Emmart and
               Yuan Ma and
               Jingqiang Lin and
               Charles C. Weems},
  title     = {{DPF-ECC:} {A} Framework for Efficient {ECC} With Double Precision
               Floating-Point Computing Power},
  journal   = {{IEEE} Trans. Inf. Forensics Secur.},
  volume    = {16},
  pages     = {3988--4002},
  year      = {2021},
  url       = {https://doi.org/10.1109/TIFS.2021.3098987},
  doi       = {10.1109/TIFS.2021.3098987},
  timestamp = {Thu, 16 Sep 2021 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/tifs/GaoZWDEMLW21.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/GeorgeM21,
  author    = {Anjith George and
               S{\'{e}}bastien Marcel},
  title     = {Learning One Class Representations for Face Presentation Attack Detection
               Using Multi-Channel Convolutional Neural Networks},
  journal   = {{IEEE} Trans. Inf. Forensics Secur.},
  volume    = {16},
  pages     = {361--375},
  year      = {2021},
  url       = {https://doi.org/10.1109/TIFS.2020.3013214},
  doi       = {10.1109/TIFS.2020.3013214},
  timestamp = {Tue, 06 Oct 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/tifs/GeorgeM21.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/GhadiH21,
  author    = {Farshad Rostami Ghadi and
               Ghosheh Abed Hodtani},
  title     = {Copula-Based Analysis of Physical Layer Security Performances Over
               Correlated Rayleigh Fading Channels},
  journal   = {{IEEE} Trans. Inf. Forensics Secur.},
  volume    = {16},
  pages     = {431--440},
  year      = {2021},
  url       = {https://doi.org/10.1109/TIFS.2020.3014553},
  doi       = {10.1109/TIFS.2020.3014553},
  timestamp = {Tue, 06 Oct 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/tifs/GhadiH21.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/GhoshBSP21,
  author    = {Saptarshi Ghosh and
               Manav R. Bhatnagar and
               Walid Saad and
               Bijaya K. Panigrahi},
  title     = {Defending False Data Injection on State Estimation Over Fading Wireless
               Channels},
  journal   = {{IEEE} Trans. Inf. Forensics Secur.},
  volume    = {16},
  pages     = {1424--1439},
  year      = {2021},
  url       = {https://doi.org/10.1109/TIFS.2020.3031378},
  doi       = {10.1109/TIFS.2020.3031378},
  timestamp = {Thu, 11 Feb 2021 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/journals/tifs/GhoshBSP21.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/GiboulotCB21,
  author    = {Quentin Giboulot and
               R{\'{e}}mi Cogranne and
               Patrick Bas},
  title     = {Detectability-Based {JPEG} Steganography Modeling the Processing Pipeline:
               The Noise-Content Trade-off},
  journal   = {{IEEE} Trans. Inf. Forensics Secur.},
  volume    = {16},
  pages     = {2202--2217},
  year      = {2021},
  url       = {https://doi.org/10.1109/TIFS.2021.3050063},
  doi       = {10.1109/TIFS.2021.3050063},
  timestamp = {Tue, 23 Mar 2021 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/journals/tifs/GiboulotCB21.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/Gkoulalas-Divanis21,
  author    = {Aris Gkoulalas{-}Divanis and
               Dinusha Vatsalan and
               Dimitrios Karapiperis and
               Murat Kantarcioglu},
  title     = {Modern Privacy-Preserving Record Linkage Techniques: An Overview},
  journal   = {{IEEE} Trans. Inf. Forensics Secur.},
  volume    = {16},
  pages     = {4966--4987},
  year      = {2021},
  url       = {https://doi.org/10.1109/TIFS.2021.3114026},
  doi       = {10.1109/TIFS.2021.3114026},
  timestamp = {Wed, 03 Nov 2021 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/journals/tifs/Gkoulalas-Divanis21.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/GohariWHHT21,
  author    = {Parham Gohari and
               Bo Wu and
               Calvin Hawkins and
               Matthew T. Hale and
               Ufuk Topcu},
  title     = {Differential Privacy on the Unit Simplex via the Dirichlet Mechanism},
  journal   = {{IEEE} Trans. Inf. Forensics Secur.},
  volume    = {16},
  pages     = {2326--2340},
  year      = {2021},
  url       = {https://doi.org/10.1109/TIFS.2021.3052356},
  doi       = {10.1109/TIFS.2021.3052356},
  timestamp = {Tue, 02 Mar 2021 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/journals/tifs/GohariWHHT21.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/GohilTSPR21,
  author    = {Vasudev Gohil and
               Mark Tressler and
               Kevin Sipple and
               Satwik Patnaik and
               Jeyavijayan Rajendran},
  title     = {Games, Dollars, Splits: {A} Game-Theoretic Analysis of Split Manufacturing},
  journal   = {{IEEE} Trans. Inf. Forensics Secur.},
  volume    = {16},
  pages     = {5077--5092},
  year      = {2021},
  url       = {https://doi.org/10.1109/TIFS.2021.3122827},
  doi       = {10.1109/TIFS.2021.3122827},
  timestamp = {Wed, 15 Dec 2021 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/journals/tifs/GohilTSPR21.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/GrozaPM21,
  author    = {Bogdan Groza and
               Lucian Popa and
               Pal{-}Stefan Murvay},
  title     = {{CANTO} - Covert AutheNtication With Timing Channels Over Optimized
               Traffic Flows for {CAN}},
  journal   = {{IEEE} Trans. Inf. Forensics Secur.},
  volume    = {16},
  pages     = {601--616},
  year      = {2021},
  url       = {https://doi.org/10.1109/TIFS.2020.3017892},
  doi       = {10.1109/TIFS.2020.3017892},
  timestamp = {Tue, 06 Oct 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/tifs/GrozaPM21.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/GruberPKSTTS21,
  author    = {Michael Gruber and
               Matthias Probst and
               Patrick Karl and
               Thomas Schamberger and
               Lars Tebelmann and
               Michael Tempelmeier and
               Georg Sigl},
  title     = {DOMREP-An Orthogonal Countermeasure for Arbitrary Order Side-Channel
               and Fault Attack Protection},
  journal   = {{IEEE} Trans. Inf. Forensics Secur.},
  volume    = {16},
  pages     = {4321--4335},
  year      = {2021},
  url       = {https://doi.org/10.1109/TIFS.2021.3089875},
  doi       = {10.1109/TIFS.2021.3089875},
  timestamp = {Mon, 20 Sep 2021 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/tifs/GruberPKSTTS21.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/GuFLZ21,
  author    = {Shan Gu and
               Jianjiang Feng and
               Jiwen Lu and
               Jie Zhou},
  title     = {Latent Fingerprint Registration via Matching Densely Sampled Points},
  journal   = {{IEEE} Trans. Inf. Forensics Secur.},
  volume    = {16},
  pages     = {1231--1244},
  year      = {2021},
  url       = {https://doi.org/10.1109/TIFS.2020.3032041},
  doi       = {10.1109/TIFS.2020.3032041},
  timestamp = {Thu, 17 Dec 2020 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/journals/tifs/GuFLZ21.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/Gunlu21,
  author    = {Onur G{\"{u}}nl{\"{u}}},
  title     = {Multi-Entity and Multi-Enrollment Key Agreement With Correlated Noise},
  journal   = {{IEEE} Trans. Inf. Forensics Secur.},
  volume    = {16},
  pages     = {1190--1202},
  year      = {2021},
  url       = {https://doi.org/10.1109/TIFS.2020.3029885},
  doi       = {10.1109/TIFS.2020.3029885},
  timestamp = {Thu, 17 Dec 2020 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/journals/tifs/Gunlu21.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/GuoLLGHDB21,
  author    = {Xiaojie Guo and
               Zheli Liu and
               Jin Li and
               Jiqiang Gao and
               Boyu Hou and
               Changyu Dong and
               Thar Baker},
  title     = {VeriFL: Communication-Efficient and Fast Verifiable Aggregation for
               Federated Learning},
  journal   = {{IEEE} Trans. Inf. Forensics Secur.},
  volume    = {16},
  pages     = {1736--1751},
  year      = {2021},
  url       = {https://doi.org/10.1109/TIFS.2020.3043139},
  doi       = {10.1109/TIFS.2020.3043139},
  timestamp = {Thu, 11 Feb 2021 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/journals/tifs/GuoLLGHDB21.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/GuoZLL21,
  author    = {Jianzhu Guo and
               Xiangyu Zhu and
               Zhen Lei and
               Stan Z. Li},
  title     = {Decomposed Meta Batch Normalization for Fast Domain Adaptation in
               Face Recognition},
  journal   = {{IEEE} Trans. Inf. Forensics Secur.},
  volume    = {16},
  pages     = {3082--3095},
  year      = {2021},
  url       = {https://doi.org/10.1109/TIFS.2021.3073823},
  doi       = {10.1109/TIFS.2021.3073823},
  timestamp = {Tue, 12 Apr 2022 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/tifs/GuoZLL21.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/HameedGG21,
  author    = {Muhammad Zaid Hameed and
               Andr{\'{a}}s Gy{\"{o}}rgy and
               Deniz G{\"{u}}nd{\"{u}}z},
  title     = {The Best Defense Is a Good Offense: Adversarial Attacks to Avoid Modulation
               Detection},
  journal   = {{IEEE} Trans. Inf. Forensics Secur.},
  volume    = {16},
  pages     = {1074--1087},
  year      = {2021},
  url       = {https://doi.org/10.1109/TIFS.2020.3025441},
  doi       = {10.1109/TIFS.2020.3025441},
  timestamp = {Tue, 01 Dec 2020 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/journals/tifs/HameedGG21.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/HanKK21,
  author    = {Mee Lan Han and
               Byung Il Kwak and
               Huy Kang Kim},
  title     = {Event-Triggered Interval-Based Anomaly Detection and Attack Identification
               Methods for an In-Vehicle Network},
  journal   = {{IEEE} Trans. Inf. Forensics Secur.},
  volume    = {16},
  pages     = {2941--2956},
  year      = {2021},
  url       = {https://doi.org/10.1109/TIFS.2021.3069171},
  doi       = {10.1109/TIFS.2021.3069171},
  timestamp = {Sun, 16 May 2021 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/tifs/HanKK21.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/HanWZQHSLY21,
  author    = {Shangbin Han and
               Qianhong Wu and
               Han Zhang and
               Bo Qin and
               Jiankun Hu and
               Xingang Shi and
               Linfeng Liu and
               Xia Yin},
  title     = {Log-Based Anomaly Detection With Robust Feature Extraction and Online
               Learning},
  journal   = {{IEEE} Trans. Inf. Forensics Secur.},
  volume    = {16},
  pages     = {2300--2311},
  year      = {2021},
  url       = {https://doi.org/10.1109/TIFS.2021.3053371},
  doi       = {10.1109/TIFS.2021.3053371},
  timestamp = {Tue, 02 Mar 2021 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/journals/tifs/HanWZQHSLY21.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/HanXZWZW21,
  author    = {Weili Han and
               Ming Xu and
               Junjie Zhang and
               Chuanwang Wang and
               Kai Zhang and
               X. Sean Wang},
  title     = {TransPCFG: Transferring the Grammars From Short Passwords to Guess
               Long Passwords Effectively},
  journal   = {{IEEE} Trans. Inf. Forensics Secur.},
  volume    = {16},
  pages     = {451--465},
  year      = {2021},
  url       = {https://doi.org/10.1109/TIFS.2020.3003696},
  doi       = {10.1109/TIFS.2020.3003696},
  timestamp = {Wed, 15 Dec 2021 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/journals/tifs/HanXZWZW21.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/HeCZDX21,
  author    = {Kun He and
               Jing Chen and
               Qinxi Zhou and
               Ruiying Du and
               Yang Xiang},
  title     = {Secure Dynamic Searchable Symmetric Encryption With Constant Client
               Storage Cost},
  journal   = {{IEEE} Trans. Inf. Forensics Secur.},
  volume    = {16},
  pages     = {1538--1549},
  year      = {2021},
  url       = {https://doi.org/10.1109/TIFS.2020.3033412},
  doi       = {10.1109/TIFS.2020.3033412},
  timestamp = {Thu, 11 Feb 2021 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/journals/tifs/HeCZDX21.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/HeLWW21,
  author    = {Hongliang He and
               Xizhao Luo and
               Jian Weng and
               Kaimin Wei},
  title     = {Secure Transmission in Multiple Access Wiretap Channel: Cooperative
               Jamming Without Sharing {CSI}},
  journal   = {{IEEE} Trans. Inf. Forensics Secur.},
  volume    = {16},
  pages     = {3401--3411},
  year      = {2021},
  url       = {https://doi.org/10.1109/TIFS.2021.3080499},
  doi       = {10.1109/TIFS.2021.3080499},
  timestamp = {Tue, 15 Jun 2021 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/tifs/HeLWW21.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/HeXW21,
  author    = {Wenguang He and
               Gangqiang Xiong and
               Yaomin Wang},
  title     = {Reversible Data Hiding Based on Adaptive Multiple Histograms Modification},
  journal   = {{IEEE} Trans. Inf. Forensics Secur.},
  volume    = {16},
  pages     = {3000--3012},
  year      = {2021},
  url       = {https://doi.org/10.1109/TIFS.2021.3069173},
  doi       = {10.1109/TIFS.2021.3069173},
  timestamp = {Sun, 16 May 2021 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/tifs/HeXW21.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/HeartfieldLBP21,
  author    = {Ryan Heartfield and
               George Loukas and
               Anatolij Bezemskij and
               Emmanouil Panaousis},
  title     = {Self-Configurable Cyber-Physical Intrusion Detection for Smart Homes
               Using Reinforcement Learning},
  journal   = {{IEEE} Trans. Inf. Forensics Secur.},
  volume    = {16},
  pages     = {1720--1735},
  year      = {2021},
  url       = {https://doi.org/10.1109/TIFS.2020.3042049},
  doi       = {10.1109/TIFS.2020.3042049},
  timestamp = {Thu, 11 Feb 2021 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/journals/tifs/HeartfieldLBP21.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/HigginsTP21,
  author    = {Martin Higgins and
               Fei Teng and
               Thomas Parisini},
  title     = {Stealthy {MTD} Against Unsupervised Learning-Based Blind {FDI} Attacks
               in Power Systems},
  journal   = {{IEEE} Trans. Inf. Forensics Secur.},
  volume    = {16},
  pages     = {1275--1287},
  year      = {2021},
  url       = {https://doi.org/10.1109/TIFS.2020.3027148},
  doi       = {10.1109/TIFS.2020.3027148},
  timestamp = {Thu, 17 Dec 2020 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/journals/tifs/HigginsTP21.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/HoffmannSP21,
  author    = {Max Hoffmann and
               Falk Schellenberg and
               Christof Paar},
  title     = {{ARMORY:} Fully Automated and Exhaustive Fault Simulation on {ARM-M}
               Binaries},
  journal   = {{IEEE} Trans. Inf. Forensics Secur.},
  volume    = {16},
  pages     = {1058--1073},
  year      = {2021},
  url       = {https://doi.org/10.1109/TIFS.2020.3027143},
  doi       = {10.1109/TIFS.2020.3027143},
  timestamp = {Tue, 01 Dec 2020 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/journals/tifs/HoffmannSP21.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/HolzbaurKFW21,
  author    = {Lukas Holzbaur and
               Stanislav Kruglik and
               Alexey A. Frolov and
               Antonia Wachter{-}Zeh},
  title     = {Secure Codes With Accessibility for Distributed Storage},
  journal   = {{IEEE} Trans. Inf. Forensics Secur.},
  volume    = {16},
  pages     = {5326--5337},
  year      = {2021},
  url       = {https://doi.org/10.1109/TIFS.2021.3128822},
  doi       = {10.1109/TIFS.2021.3128822},
  timestamp = {Wed, 15 Dec 2021 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/journals/tifs/HolzbaurKFW21.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/HongGJH21,
  author    = {Yuanquan Hong and
               Hui Gao and
               Xiaojun Jing and
               Yuan He},
  title     = {Rebuttal to "Comments on 'Fixed Region Beamforming Using Frequency
               Diverse Subarray for Secure MmWave Wireless Communications"'},
  journal   = {{IEEE} Trans. Inf. Forensics Secur.},
  volume    = {16},
  pages     = {2854--2855},
  year      = {2021},
  url       = {https://doi.org/10.1109/TIFS.2021.3067204},
  doi       = {10.1109/TIFS.2021.3067204},
  timestamp = {Sun, 16 May 2021 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/tifs/HongGJH21.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/HongKCLC21,
  author    = {Seungwan Hong and
               Seunghong Kim and
               Jiheon Choi and
               Younho Lee and
               Jung Hee Cheon},
  title     = {Efficient Sorting of Homomorphic Encrypted Data With k-Way Sorting
               Network},
  journal   = {{IEEE} Trans. Inf. Forensics Secur.},
  volume    = {16},
  pages     = {4389--4404},
  year      = {2021},
  url       = {https://doi.org/10.1109/TIFS.2021.3106167},
  doi       = {10.1109/TIFS.2021.3106167},
  timestamp = {Mon, 20 Sep 2021 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/tifs/HongKCLC21.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/HuCZL21,
  author    = {Zhisheng Hu and
               Ping Chen and
               Minghui Zhu and
               Peng Liu},
  title     = {A Co-Design Adaptive Defense Scheme With Bounded Security Damages
               Against Heartbleed-Like Attacks},
  journal   = {{IEEE} Trans. Inf. Forensics Secur.},
  volume    = {16},
  pages     = {4691--4704},
  year      = {2021},
  url       = {https://doi.org/10.1109/TIFS.2021.3113512},
  doi       = {10.1109/TIFS.2021.3113512},
  timestamp = {Wed, 03 Nov 2021 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/journals/tifs/HuCZL21.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/HuH21,
  author    = {Weipeng Hu and
               Haifeng Hu},
  title     = {Dual Adversarial Disentanglement and Deep Representation Decorrelation
               for {NIR-VIS} Face Recognition},
  journal   = {{IEEE} Trans. Inf. Forensics Secur.},
  volume    = {16},
  pages     = {70--85},
  year      = {2021},
  url       = {https://doi.org/10.1109/TIFS.2020.3005314},
  doi       = {10.1109/TIFS.2020.3005314},
  timestamp = {Wed, 26 Aug 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/tifs/HuH21.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/HuNWJT21,
  author    = {Shuyan Hu and
               Wei Ni and
               Xin Wang and
               Abbas Jamalipour and
               Dean Ta},
  title     = {Joint Optimization of Trajectory, Propulsion, and Thrust Powers for
               Covert UAV-on-UAV Video Tracking and Surveillance},
  journal   = {{IEEE} Trans. Inf. Forensics Secur.},
  volume    = {16},
  pages     = {1959--1972},
  year      = {2021},
  url       = {https://doi.org/10.1109/TIFS.2020.3047758},
  doi       = {10.1109/TIFS.2020.3047758},
  timestamp = {Thu, 11 Feb 2021 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/journals/tifs/HuNWJT21.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/HuNZH21,
  author    = {Xianglei Hu and
               Jiangqun Ni and
               Weizhe Zhang and
               Jiwu Huang},
  title     = {Efficient {JPEG} Batch Steganography Using Intrinsic Energy of Image
               Contents},
  journal   = {{IEEE} Trans. Inf. Forensics Secur.},
  volume    = {16},
  pages     = {4544--4558},
  year      = {2021},
  url       = {https://doi.org/10.1109/TIFS.2021.3109464},
  doi       = {10.1109/TIFS.2021.3109464},
  timestamp = {Mon, 20 Sep 2021 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/tifs/HuNZH21.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/HuWZSC21,
  author    = {Ronghua Hu and
               Tian Wang and
               Yi Zhou and
               Hichem Snoussi and
               Abel Cherouat},
  title     = {FT-MDnet: {A} Deep-Frozen Transfer Learning Framework for Person Search},
  journal   = {{IEEE} Trans. Inf. Forensics Secur.},
  volume    = {16},
  pages     = {4721--4732},
  year      = {2021},
  url       = {https://doi.org/10.1109/TIFS.2021.3113517},
  doi       = {10.1109/TIFS.2021.3113517},
  timestamp = {Wed, 03 Nov 2021 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/journals/tifs/HuWZSC21.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/HuaLWZY21,
  author    = {Guang Hua and
               Han Liao and
               Qingyi Wang and
               Haijian Zhang and
               Dengpan Ye},
  title     = {Detection of Electric Network Frequency in Audio Recordings-From Theory
               to Practical Detectors},
  journal   = {{IEEE} Trans. Inf. Forensics Secur.},
  volume    = {16},
  pages     = {236--248},
  year      = {2021},
  url       = {https://doi.org/10.1109/TIFS.2020.3009579},
  doi       = {10.1109/TIFS.2020.3009579},
  timestamp = {Thu, 10 Sep 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/tifs/HuaLWZY21.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/HuaLZYM21,
  author    = {Guang Hua and
               Han Liao and
               Haijian Zhang and
               Dengpan Ye and
               Jiayi Ma},
  title     = {Robust {ENF} Estimation Based on Harmonic Enhancement and Maximum
               Weight Clique},
  journal   = {{IEEE} Trans. Inf. Forensics Secur.},
  volume    = {16},
  pages     = {3874--3887},
  year      = {2021},
  url       = {https://doi.org/10.1109/TIFS.2021.3099697},
  doi       = {10.1109/TIFS.2021.3099697},
  timestamp = {Thu, 16 Sep 2021 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/tifs/HuaLZYM21.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/HuaZZ21,
  author    = {Jingyu Hua and
               Zidong Zhou and
               Sheng Zhong},
  title     = {Flow Misleading: Worm-Hole Attack in Software-Defined Networking via
               Building In-Band Covert Channel},
  journal   = {{IEEE} Trans. Inf. Forensics Secur.},
  volume    = {16},
  pages     = {1029--1043},
  year      = {2021},
  url       = {https://doi.org/10.1109/TIFS.2020.3013093},
  doi       = {10.1109/TIFS.2020.3013093},
  timestamp = {Thu, 09 Dec 2021 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/journals/tifs/HuaZZ21.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/HuangCW21,
  author    = {Chong Huang and
               Gaojie Chen and
               Kai{-}Kit Wong},
  title     = {Multi-Agent Reinforcement Learning-Based Buffer-Aided Relay Selection
               in IRS-Assisted Secure Cooperative Networks},
  journal   = {{IEEE} Trans. Inf. Forensics Secur.},
  volume    = {16},
  pages     = {4101--4112},
  year      = {2021},
  url       = {https://doi.org/10.1109/TIFS.2021.3103062},
  doi       = {10.1109/TIFS.2021.3103062},
  timestamp = {Wed, 01 Sep 2021 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/tifs/HuangCW21.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/HuangCZS21,
  author    = {Zhizhong Huang and
               Shouzhen Chen and
               Junping Zhang and
               Hongming Shan},
  title     = {{PFA-GAN:} Progressive Face Aging With Generative Adversarial Network},
  journal   = {{IEEE} Trans. Inf. Forensics Secur.},
  volume    = {16},
  pages     = {2031--2045},
  year      = {2021},
  url       = {https://doi.org/10.1109/TIFS.2020.3047753},
  doi       = {10.1109/TIFS.2020.3047753},
  timestamp = {Thu, 11 Feb 2021 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/journals/tifs/HuangCZS21.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/HuangHYSLWW21,
  author    = {Jianjun Huang and
               Songming Han and
               Wei You and
               Wenchang Shi and
               Bin Liang and
               Jingzheng Wu and
               Yanjun Wu},
  title     = {Hunting Vulnerable Smart Contracts via Graph Embedding Based Bytecode
               Matching},
  journal   = {{IEEE} Trans. Inf. Forensics Secur.},
  volume    = {16},
  pages     = {2144--2156},
  year      = {2021},
  url       = {https://doi.org/10.1109/TIFS.2021.3050051},
  doi       = {10.1109/TIFS.2021.3050051},
  timestamp = {Tue, 02 Mar 2021 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/journals/tifs/HuangHYSLWW21.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/HuangYWLY21,
  author    = {Yuwen Huang and
               Gongping Yang and
               Kuikui Wang and
               Haiying Liu and
               Yilong Yin},
  title     = {Learning Joint and Specific Patterns: {A} Unified Sparse Representation
               for Off-the-Person {ECG} Biometric Recognition},
  journal   = {{IEEE} Trans. Inf. Forensics Secur.},
  volume    = {16},
  pages     = {147--160},
  year      = {2021},
  url       = {https://doi.org/10.1109/TIFS.2020.3006384},
  doi       = {10.1109/TIFS.2020.3006384},
  timestamp = {Wed, 26 Aug 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/tifs/HuangYWLY21.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/HuangZ21,
  author    = {Linan Huang and
               Quanyan Zhu},
  title     = {Duplicity Games for Deception Design With an Application to Insider
               Threat Mitigation},
  journal   = {{IEEE} Trans. Inf. Forensics Secur.},
  volume    = {16},
  pages     = {4843--4856},
  year      = {2021},
  url       = {https://doi.org/10.1109/TIFS.2021.3118886},
  doi       = {10.1109/TIFS.2021.3118886},
  timestamp = {Wed, 03 Nov 2021 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/journals/tifs/HuangZ21.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/HuangZL21,
  author    = {Wen Huang and
               Shijie Zhou and
               Yongjian Liao},
  title     = {Unexpected Information Leakage of Differential Privacy Due to the
               Linear Property of Queries},
  journal   = {{IEEE} Trans. Inf. Forensics Secur.},
  volume    = {16},
  pages     = {3123--3137},
  year      = {2021},
  url       = {https://doi.org/10.1109/TIFS.2021.3075843},
  doi       = {10.1109/TIFS.2021.3075843},
  timestamp = {Tue, 15 Jun 2021 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/tifs/HuangZL21.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/HwangTH21,
  author    = {Dae Yon Hwang and
               Bilal Taha and
               Dimitrios Hatzinakos},
  title     = {{PBGAN:} Learning {PPG} Representations From {GAN} for Time-Stable
               and Unique Verification System},
  journal   = {{IEEE} Trans. Inf. Forensics Secur.},
  volume    = {16},
  pages     = {5124--5137},
  year      = {2021},
  url       = {https://doi.org/10.1109/TIFS.2021.3122817},
  doi       = {10.1109/TIFS.2021.3122817},
  timestamp = {Wed, 15 Dec 2021 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/journals/tifs/HwangTH21.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/HwangTLH21,
  author    = {Dae Yon Hwang and
               Bilal Taha and
               Da Saem Lee and
               Dimitrios Hatzinakos},
  title     = {Evaluation of the Time Stability and Uniqueness in PPG-Based Biometric
               System},
  journal   = {{IEEE} Trans. Inf. Forensics Secur.},
  volume    = {16},
  pages     = {116--130},
  year      = {2021},
  url       = {https://doi.org/10.1109/TIFS.2020.3006313},
  doi       = {10.1109/TIFS.2020.3006313},
  timestamp = {Wed, 26 Aug 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/tifs/HwangTLH21.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/ImL21,
  author    = {Hyeon{-}Seong Im and
               Si{-}Hyeon Lee},
  title     = {Mobility-Assisted Covert Communication Over Wireless Ad Hoc Networks},
  journal   = {{IEEE} Trans. Inf. Forensics Secur.},
  volume    = {16},
  pages     = {1768--1781},
  year      = {2021},
  url       = {https://doi.org/10.1109/TIFS.2020.3045132},
  doi       = {10.1109/TIFS.2020.3045132},
  timestamp = {Thu, 11 Feb 2021 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/journals/tifs/ImL21.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/IrshadCGYLPJKXZ21,
  author    = {Hassaan Irshad and
               Gabriela F. Ciocarlie and
               Ashish Gehani and
               Vinod Yegneswaran and
               Kyu Hyung Lee and
               Jignesh M. Patel and
               Somesh Jha and
               Yonghwi Kwon and
               Dongyan Xu and
               Xiangyu Zhang},
  title     = {{TRACE:} Enterprise-Wide Provenance Tracking for Real-Time {APT} Detection},
  journal   = {{IEEE} Trans. Inf. Forensics Secur.},
  volume    = {16},
  pages     = {4363--4376},
  year      = {2021},
  url       = {https://doi.org/10.1109/TIFS.2021.3098977},
  doi       = {10.1109/TIFS.2021.3098977},
  timestamp = {Mon, 03 Jan 2022 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/journals/tifs/IrshadCGYLPJKXZ21.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/ItoSUH21,
  author    = {Akira Ito and
               Kotaro Saito and
               Rei Ueno and
               Naofumi Homma},
  title     = {Imbalanced Data Problems in Deep Learning-Based Side-Channel Attacks:
               Analysis and Solution},
  journal   = {{IEEE} Trans. Inf. Forensics Secur.},
  volume    = {16},
  pages     = {3790--3802},
  year      = {2021},
  url       = {https://doi.org/10.1109/TIFS.2021.3092050},
  doi       = {10.1109/TIFS.2021.3092050},
  timestamp = {Thu, 16 Sep 2021 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/tifs/ItoSUH21.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/JedhOAB21,
  author    = {Mubark Jedh and
               Lotfi Ben Othmane and
               Noor O. Ahmed and
               Bharat K. Bhargava},
  title     = {Detection of Message Injection Attacks Onto the {CAN} Bus Using Similarities
               of Successive Messages-Sequence Graphs},
  journal   = {{IEEE} Trans. Inf. Forensics Secur.},
  volume    = {16},
  pages     = {4133--4146},
  year      = {2021},
  url       = {https://doi.org/10.1109/TIFS.2021.3098162},
  doi       = {10.1109/TIFS.2021.3098162},
  timestamp = {Thu, 16 Sep 2021 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/tifs/JedhOAB21.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/JiangSTL21,
  author    = {Bo Jiang and
               Mohamed Seif and
               Ravi Tandon and
               Ming Li},
  title     = {Context-Aware Local Information Privacy},
  journal   = {{IEEE} Trans. Inf. Forensics Secur.},
  volume    = {16},
  pages     = {3694--3708},
  year      = {2021},
  url       = {https://doi.org/10.1109/TIFS.2021.3087350},
  doi       = {10.1109/TIFS.2021.3087350},
  timestamp = {Thu, 16 Sep 2021 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/tifs/JiangSTL21.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/JiangZCHY21,
  author    = {Xiaofeng Jiang and
               Feng Zhou and
               Shuangwu Chen and
               Huasen He and
               Jian Yang},
  title     = {Jamming Resilient Tracking Using POMDP-Based Detection of Hidden Targets},
  journal   = {{IEEE} Trans. Inf. Forensics Secur.},
  volume    = {16},
  pages     = {983--998},
  year      = {2021},
  url       = {https://doi.org/10.1109/TIFS.2020.3027145},
  doi       = {10.1109/TIFS.2020.3027145},
  timestamp = {Tue, 01 Dec 2020 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/journals/tifs/JiangZCHY21.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/JinLSB21,
  author    = {Ming Jin and
               Javad Lavaei and
               Somayeh Sojoudi and
               Ross Baldick},
  title     = {Boundary Defense Against Cyber Threat for Power System State Estimation},
  journal   = {{IEEE} Trans. Inf. Forensics Secur.},
  volume    = {16},
  pages     = {1752--1767},
  year      = {2021},
  url       = {https://doi.org/10.1109/TIFS.2020.3043065},
  doi       = {10.1109/TIFS.2020.3043065},
  timestamp = {Thu, 11 Feb 2021 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/journals/tifs/JinLSB21.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/JoKPYS21,
  author    = {Hyeonseong Jo and
               Jinwoo Kim and
               Phillip A. Porras and
               Vinod Yegneswaran and
               Seungwon Shin},
  title     = {GapFinder: Finding Inconsistency of Security Information From Unstructured
               Text},
  journal   = {{IEEE} Trans. Inf. Forensics Secur.},
  volume    = {16},
  pages     = {86--99},
  year      = {2021},
  url       = {https://doi.org/10.1109/TIFS.2020.3003570},
  doi       = {10.1109/TIFS.2020.3003570},
  timestamp = {Wed, 26 Aug 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/tifs/JoKPYS21.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/JoshiAI21,
  author    = {Chaitanya Joshi and
               Jes{\'{u}}s M. R{\'{\i}}os Aliaga and
               David R{\'{\i}}os Insua},
  title     = {Insider Threat Modeling: An Adversarial Risk Analysis Approach},
  journal   = {{IEEE} Trans. Inf. Forensics Secur.},
  volume    = {16},
  pages     = {1131--1142},
  year      = {2021},
  url       = {https://doi.org/10.1109/TIFS.2020.3029898},
  doi       = {10.1109/TIFS.2020.3029898},
  timestamp = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/tifs/JoshiAI21.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/JoshiVZMD21,
  author    = {Sonal Joshi and
               Jes{\'{u}}s Villalba and
               Piotr Zelasko and
               Laureano Moro{-}Vel{\'{a}}zquez and
               Najim Dehak},
  title     = {Study of Pre-Processing Defenses Against Adversarial Attacks on State-of-the-Art
               Speaker Recognition Systems},
  journal   = {{IEEE} Trans. Inf. Forensics Secur.},
  volume    = {16},
  pages     = {4811--4826},
  year      = {2021},
  url       = {https://doi.org/10.1109/TIFS.2021.3116438},
  doi       = {10.1109/TIFS.2021.3116438},
  timestamp = {Wed, 15 Dec 2021 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/journals/tifs/JoshiVZMD21.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/JungL21,
  author    = {Haejoon Jung and
               In{-}Ho Lee},
  title     = {Comments on "Fixed Region Beamforming Using Frequency Diverse Subarray
               for Secure mmWave Wireless Communications"},
  journal   = {{IEEE} Trans. Inf. Forensics Secur.},
  volume    = {16},
  pages     = {2821--2822},
  year      = {2021},
  url       = {https://doi.org/10.1109/TIFS.2021.3066296},
  doi       = {10.1109/TIFS.2021.3066296},
  timestamp = {Sun, 16 May 2021 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/tifs/JungL21.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/KarPCBHS21,
  author    = {Arindam Kar and
               Sourav Pramanik and
               Arghya Chakraborty and
               Debotosh Bhattacharjee and
               Edmond S. L. Ho and
               Hubert P. H. Shum},
  title     = {{LMZMPM:} Local Modified Zernike Moment Per-Unit Mass for Robust Human
               Face Recognition},
  journal   = {{IEEE} Trans. Inf. Forensics Secur.},
  volume    = {16},
  pages     = {495--509},
  year      = {2021},
  url       = {https://doi.org/10.1109/TIFS.2020.3015552},
  doi       = {10.1109/TIFS.2020.3015552},
  timestamp = {Tue, 06 Oct 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/tifs/KarPCBHS21.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/KaurK21,
  author    = {Harkeerat Kaur and
               Pritee Khanna},
  title     = {Rebuttal to "Comments on Random Distance Method Generating Unimodal
               and Multimodal Cancelable Biometric Features"},
  journal   = {{IEEE} Trans. Inf. Forensics Secur.},
  volume    = {16},
  pages     = {3570--3572},
  year      = {2021},
  url       = {https://doi.org/10.1109/TIFS.2021.3081264},
  doi       = {10.1109/TIFS.2021.3081264},
  timestamp = {Thu, 16 Sep 2021 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/tifs/KaurK21.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/KellerOD21,
  author    = {Danny Keller and
               Margarita Osadchy and
               Orr Dunkelman},
  title     = {Inverting Binarizations of Facial Templates Produced by Deep Learning
               (and Its Implications)},
  journal   = {{IEEE} Trans. Inf. Forensics Secur.},
  volume    = {16},
  pages     = {4184--4196},
  year      = {2021},
  url       = {https://doi.org/10.1109/TIFS.2021.3103056},
  doi       = {10.1109/TIFS.2021.3103056},
  timestamp = {Thu, 16 Sep 2021 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/tifs/KellerOD21.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/KhanNLB21,
  author    = {Nadir Khan and
               Sven Nitzsche and
               Asier Garciandia L{\'{o}}pez and
               J{\"{u}}rgen Becker},
  title     = {Utilizing and Extending Trusted Execution Environment in Heterogeneous
               SoCs for a Pay-Per-Device {IP} Licensing Scheme},
  journal   = {{IEEE} Trans. Inf. Forensics Secur.},
  volume    = {16},
  pages     = {2548--2563},
  year      = {2021},
  url       = {https://doi.org/10.1109/TIFS.2021.3058777},
  doi       = {10.1109/TIFS.2021.3058777},
  timestamp = {Wed, 07 Apr 2021 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/tifs/KhanNLB21.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/KhatunDSF21,
  author    = {Amena Khatun and
               Simon Denman and
               Sridha Sridharan and
               Clinton Fookes},
  title     = {End-to-End Domain Adaptive Attention Network for Cross-Domain Person
               Re-Identification},
  journal   = {{IEEE} Trans. Inf. Forensics Secur.},
  volume    = {16},
  pages     = {3803--3813},
  year      = {2021},
  url       = {https://doi.org/10.1109/TIFS.2021.3088012},
  doi       = {10.1109/TIFS.2021.3088012},
  timestamp = {Thu, 16 Sep 2021 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/tifs/KhatunDSF21.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/KimGK21,
  author    = {Yongjune Kim and
               Cyril Guyot and
               Young{-}Sik Kim},
  title     = {On the Efficient Estimation of Min-Entropy},
  journal   = {{IEEE} Trans. Inf. Forensics Secur.},
  volume    = {16},
  pages     = {3013--3025},
  year      = {2021},
  url       = {https://doi.org/10.1109/TIFS.2021.3070424},
  doi       = {10.1109/TIFS.2021.3070424},
  timestamp = {Sun, 16 May 2021 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/tifs/KimGK21.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/KimL21,
  author    = {Sang Wu Kim and
               Xudong Liu},
  title     = {Crypto-Aided {MAP} Test for Low-Latency Detection of False Data in
               Short Packets},
  journal   = {{IEEE} Trans. Inf. Forensics Secur.},
  volume    = {16},
  pages     = {4939--4949},
  year      = {2021},
  url       = {https://doi.org/10.1109/TIFS.2021.3118887},
  doi       = {10.1109/TIFS.2021.3118887},
  timestamp = {Wed, 03 Nov 2021 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/journals/tifs/KimL21.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/KimNLYPS21,
  author    = {Jinwoo Kim and
               Jaehyun Nam and
               Suyeol Lee and
               Vinod Yegneswaran and
               Phillip A. Porras and
               Seungwon Shin},
  title     = {BottleNet: Hiding Network Bottlenecks Using SDN-Based Topology Deception},
  journal   = {{IEEE} Trans. Inf. Forensics Secur.},
  volume    = {16},
  pages     = {3138--3153},
  year      = {2021},
  url       = {https://doi.org/10.1109/TIFS.2021.3075845},
  doi       = {10.1109/TIFS.2021.3075845},
  timestamp = {Tue, 15 Jun 2021 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/tifs/KimNLYPS21.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/KongSWCH21,
  author    = {Zhengmin Kong and
               Jing Song and
               Chao Wang and
               Hongyang Chen and
               Lajos Hanzo},
  title     = {Hybrid Analog-Digital Precoder Design for Securing Cognitive Millimeter
               Wave Networks},
  journal   = {{IEEE} Trans. Inf. Forensics Secur.},
  volume    = {16},
  pages     = {4019--4034},
  year      = {2021},
  url       = {https://doi.org/10.1109/TIFS.2020.3039697},
  doi       = {10.1109/TIFS.2020.3039697},
  timestamp = {Wed, 01 Sep 2021 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/tifs/KongSWCH21.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/KoumpouziSD21,
  author    = {Chryssalenia Koumpouzi and
               Predrag Spasojevic and
               Fikadu T. Dagefu},
  title     = {Improved {LPD} Characteristics for {QS-DS-CDMA} Employing Randomization
               Techniques},
  journal   = {{IEEE} Trans. Inf. Forensics Secur.},
  volume    = {16},
  pages     = {4762--4771},
  year      = {2021},
  url       = {https://doi.org/10.1109/TIFS.2021.3114065},
  doi       = {10.1109/TIFS.2021.3114065},
  timestamp = {Wed, 03 Nov 2021 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/journals/tifs/KoumpouziSD21.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/KrishnanTM21,
  author    = {Arya Krishnan and
               Tony Thomas and
               Deepak Mishra},
  title     = {Finger Vein Pulsation-Based Biometric Recognition},
  journal   = {{IEEE} Trans. Inf. Forensics Secur.},
  volume    = {16},
  pages     = {5034--5044},
  year      = {2021},
  url       = {https://doi.org/10.1109/TIFS.2021.3122073},
  doi       = {10.1109/TIFS.2021.3122073},
  timestamp = {Wed, 15 Dec 2021 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/journals/tifs/KrishnanTM21.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/KulowSTS21,
  author    = {Alexander Kulow and
               Thomas Schamberger and
               Lars Tebelmann and
               Georg Sigl},
  title     = {Finding the Needle in the Haystack: Metrics for Best Trace Selection
               in Unsupervised Side-Channel Attacks on Blinded {RSA}},
  journal   = {{IEEE} Trans. Inf. Forensics Secur.},
  volume    = {16},
  pages     = {3254--3268},
  year      = {2021},
  url       = {https://doi.org/10.1109/TIFS.2021.3074884},
  doi       = {10.1109/TIFS.2021.3074884},
  timestamp = {Tue, 15 Jun 2021 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/tifs/KulowSTS21.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/KumarNSM21,
  author    = {Mari Ganesh Kumar and
               Shrikanth Narayanan and
               Mriganka Sur and
               Hema A. Murthy},
  title     = {Evidence of Task-Independent Person-Specific Signatures in {EEG} Using
               Subspace Techniques},
  journal   = {{IEEE} Trans. Inf. Forensics Secur.},
  volume    = {16},
  pages     = {2856--2871},
  year      = {2021},
  url       = {https://doi.org/10.1109/TIFS.2021.3067998},
  doi       = {10.1109/TIFS.2021.3067998},
  timestamp = {Sun, 16 May 2021 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/tifs/KumarNSM21.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/KumarYDHP21,
  author    = {S. V. Aruna Kumar and
               Ehsan Yaghoubi and
               Abhijit Das and
               B. S. Harish and
               Hugo Proen{\c{c}}a},
  title     = {The {P-DESTRE:} {A} Fully Annotated Dataset for Pedestrian Detection,
               Tracking, and Short/Long-Term Re-Identification From Aerial Devices},
  journal   = {{IEEE} Trans. Inf. Forensics Secur.},
  volume    = {16},
  pages     = {1696--1708},
  year      = {2021},
  url       = {https://doi.org/10.1109/TIFS.2020.3040881},
  doi       = {10.1109/TIFS.2020.3040881},
  timestamp = {Fri, 23 Apr 2021 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/tifs/KumarYDHP21.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/KuppaL21,
  author    = {Aditya Kuppa and
               Nhien{-}An Le{-}Khac},
  title     = {Adversarial {XAI} Methods in Cybersecurity},
  journal   = {{IEEE} Trans. Inf. Forensics Secur.},
  volume    = {16},
  pages     = {4924--4938},
  year      = {2021},
  url       = {https://doi.org/10.1109/TIFS.2021.3117075},
  doi       = {10.1109/TIFS.2021.3117075},
  timestamp = {Wed, 03 Nov 2021 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/journals/tifs/KuppaL21.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/LaiJWT21,
  author    = {Yen{-}Lung Lai and
               Zhe Jin and
               KokSheik Wong and
               Massimo Tistarelli},
  title     = {Efficient Known-Sample Attack for Distance-Preserving Hashing Biometric
               Template Protection Schemes},
  journal   = {{IEEE} Trans. Inf. Forensics Secur.},
  volume    = {16},
  pages     = {3170--3185},
  year      = {2021},
  url       = {https://doi.org/10.1109/TIFS.2021.3073802},
  doi       = {10.1109/TIFS.2021.3073802},
  timestamp = {Tue, 15 Jun 2021 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/tifs/LaiJWT21.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/Lamba21,
  author    = {Subir Singh Lamba},
  title     = {Comments on "Random Distance Method for Generating Unimodal and Multimodal
               Cancelable Biometric Features"},
  journal   = {{IEEE} Trans. Inf. Forensics Secur.},
  volume    = {16},
  pages     = {2724--2726},
  year      = {2021},
  url       = {https://doi.org/10.1109/TIFS.2021.3062980},
  doi       = {10.1109/TIFS.2021.3062980},
  timestamp = {Sun, 16 May 2021 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/tifs/Lamba21.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/LanWLL21,
  author    = {Caihui Lan and
               Caifen Wang and
               Haifeng Li and
               Liangliang Liu},
  title     = {Comments on "Attribute-Based Data Sharing Scheme Revisited in Cloud
               Computing"},
  journal   = {{IEEE} Trans. Inf. Forensics Secur.},
  volume    = {16},
  pages     = {2579--2580},
  year      = {2021},
  url       = {https://doi.org/10.1109/TIFS.2021.3058758},
  doi       = {10.1109/TIFS.2021.3058758},
  timestamp = {Fri, 30 Apr 2021 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/tifs/LanWLL21.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/LavauzelleTFH21,
  author    = {Julien Lavauzelle and
               Razane Tajeddine and
               Ragnar Freij{-}Hollanti and
               Camilla Hollanti},
  title     = {Private Information Retrieval Schemes With Product-Matrix {MBR} Codes},
  journal   = {{IEEE} Trans. Inf. Forensics Secur.},
  volume    = {16},
  pages     = {441--450},
  year      = {2021},
  url       = {https://doi.org/10.1109/TIFS.2020.3003572},
  doi       = {10.1109/TIFS.2020.3003572},
  timestamp = {Tue, 06 Oct 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/tifs/LavauzelleTFH21.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/LeGWW21,
  author    = {Ngoc Tuyen Le and
               Duong Binh Giap and
               Jing{-}Wein Wang and
               Chih{-}Chiang Wang},
  title     = {Tensor-Compensated Color Face Recognition},
  journal   = {{IEEE} Trans. Inf. Forensics Secur.},
  volume    = {16},
  pages     = {3339--3354},
  year      = {2021},
  url       = {https://doi.org/10.1109/TIFS.2021.3078273},
  doi       = {10.1109/TIFS.2021.3078273},
  timestamp = {Tue, 15 Jun 2021 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/tifs/LeGWW21.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/LiCMLD21,
  author    = {Yan Li and
               Yao Cheng and
               Weizhi Meng and
               Yingjiu Li and
               Robert H. Deng},
  title     = {Designing Leakage-Resilient Password Entry on Head-Mounted Smart Wearable
               Glass Devices},
  journal   = {{IEEE} Trans. Inf. Forensics Secur.},
  volume    = {16},
  pages     = {307--321},
  year      = {2021},
  url       = {https://doi.org/10.1109/TIFS.2020.3013212},
  doi       = {10.1109/TIFS.2020.3013212},
  timestamp = {Thu, 29 Jul 2021 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/tifs/LiCMLD21.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/LiCTYQ21,
  author    = {Huafeng Li and
               Yiwen Chen and
               Dapeng Tao and
               Zhengtao Yu and
               Guanqiu Qi},
  title     = {Attribute-Aligned Domain-Invariant Feature Learning for Unsupervised
               Domain Adaptation Person Re-Identification},
  journal   = {{IEEE} Trans. Inf. Forensics Secur.},
  volume    = {16},
  pages     = {1480--1494},
  year      = {2021},
  url       = {https://doi.org/10.1109/TIFS.2020.3036800},
  doi       = {10.1109/TIFS.2020.3036800},
  timestamp = {Thu, 11 Feb 2021 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/journals/tifs/LiCTYQ21.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/LiCWL21,
  author    = {Wenting Li and
               Haibo Cheng and
               Ping Wang and
               Kaitai Liang},
  title     = {Practical Threshold Multi-Factor Authentication},
  journal   = {{IEEE} Trans. Inf. Forensics Secur.},
  volume    = {16},
  pages     = {3573--3588},
  year      = {2021},
  url       = {https://doi.org/10.1109/TIFS.2021.3081263},
  doi       = {10.1109/TIFS.2021.3081263},
  timestamp = {Thu, 16 Sep 2021 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/tifs/LiCWL21.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/LiGHC21,
  author    = {Qiongxiu Li and
               Jaron Skovsted Gundersen and
               Richard Heusdens and
               Mads Gr{\ae}sb{\o}ll Christensen},
  title     = {Privacy-Preserving Distributed Processing: Metrics, Bounds and Algorithms},
  journal   = {{IEEE} Trans. Inf. Forensics Secur.},
  volume    = {16},
  pages     = {2090--2103},
  year      = {2021},
  url       = {https://doi.org/10.1109/TIFS.2021.3050064},
  doi       = {10.1109/TIFS.2021.3050064},
  timestamp = {Tue, 23 Mar 2021 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/journals/tifs/LiGHC21.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/LiHCDJXY21,
  author    = {Bo Li and
               Qiang He and
               Feifei Chen and
               Haipeng Dai and
               Hai Jin and
               Yang Xiang and
               Yun Yang},
  title     = {Cooperative Assurance of Cache Data Integrity for Mobile Edge Computing},
  journal   = {{IEEE} Trans. Inf. Forensics Secur.},
  volume    = {16},
  pages     = {4648--4662},
  year      = {2021},
  url       = {https://doi.org/10.1109/TIFS.2021.3111747},
  doi       = {10.1109/TIFS.2021.3111747},
  timestamp = {Tue, 15 Mar 2022 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/journals/tifs/LiHCDJXY21.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/LiLD21,
  author    = {Tao Li and
               Yongzhao Li and
               Octavia A. Dobre},
  title     = {Modulation Classification Based on Fourth-Order Cumulants of Superposed
               Signal in {NOMA} Systems},
  journal   = {{IEEE} Trans. Inf. Forensics Secur.},
  volume    = {16},
  pages     = {2885--2897},
  year      = {2021},
  url       = {https://doi.org/10.1109/TIFS.2021.3068006},
  doi       = {10.1109/TIFS.2021.3068006},
  timestamp = {Sun, 16 May 2021 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/tifs/LiLD21.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/LiLGLC21,
  author    = {Wei Li and
               Jiayao Li and
               Dawu Gu and
               Chaoyun Li and
               Tianpei Cai},
  title     = {Statistical Fault Analysis of the Simeck Lightweight Cipher in the
               Ubiquitous Sensor Networks},
  journal   = {{IEEE} Trans. Inf. Forensics Secur.},
  volume    = {16},
  pages     = {4224--4233},
  year      = {2021},
  url       = {https://doi.org/10.1109/TIFS.2021.3102485},
  doi       = {10.1109/TIFS.2021.3102485},
  timestamp = {Thu, 23 Jun 2022 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/tifs/LiLGLC21.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/LiLGT21,
  author    = {Yanbin Li and
               Zhe Liu and
               Sylvain Guilley and
               Ming Tang},
  title     = {Analysis of Multiplicative Low Entropy Masking Schemes Against Correlation
               Power Attack},
  journal   = {{IEEE} Trans. Inf. Forensics Secur.},
  volume    = {16},
  pages     = {4466--4481},
  year      = {2021},
  url       = {https://doi.org/10.1109/TIFS.2021.3096130},
  doi       = {10.1109/TIFS.2021.3096130},
  timestamp = {Mon, 20 Sep 2021 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/tifs/LiLGT21.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/LiLWWJ21,
  author    = {Bingyu Li and
               Jingqiang Lin and
               Qiongxiao Wang and
               Ze Wang and
               Jiwu Jing},
  title     = {Locally-Centralized Certificate Validation and its Application in
               Desktop Virtualization Systems},
  journal   = {{IEEE} Trans. Inf. Forensics Secur.},
  volume    = {16},
  pages     = {1380--1395},
  year      = {2021},
  url       = {https://doi.org/10.1109/TIFS.2020.3035265},
  doi       = {10.1109/TIFS.2020.3035265},
  timestamp = {Thu, 11 Feb 2021 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/journals/tifs/LiLWWJ21.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/LiQHQLD21,
  author    = {Qian Li and
               Yong Qi and
               Qingyuan Hu and
               Saiyu Qi and
               Yun Lin and
               Jin Song Dong},
  title     = {Adversarial Adaptive Neighborhood With Feature Importance-Aware Convex
               Interpolation},
  journal   = {{IEEE} Trans. Inf. Forensics Secur.},
  volume    = {16},
  pages     = {2447--2460},
  year      = {2021},
  url       = {https://doi.org/10.1109/TIFS.2020.3047752},
  doi       = {10.1109/TIFS.2020.3047752},
  timestamp = {Wed, 07 Apr 2021 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/tifs/LiQHQLD21.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/LiSJZHC21,
  author    = {Guyue Li and
               Chen Sun and
               Eduard A. Jorswieck and
               Junqing Zhang and
               Aiqun Hu and
               You Chen},
  title     = {Sum Secret Key Rate Maximization for {TDD} Multi-User Massive {MIMO}
               Wireless Networks},
  journal   = {{IEEE} Trans. Inf. Forensics Secur.},
  volume    = {16},
  pages     = {968--982},
  year      = {2021},
  url       = {https://doi.org/10.1109/TIFS.2020.3026466},
  doi       = {10.1109/TIFS.2020.3026466},
  timestamp = {Tue, 11 May 2021 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/tifs/LiSJZHC21.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/LiXXJH21,
  author    = {Guyue Li and
               Yinghao Xu and
               Wei Xu and
               Eduard A. Jorswieck and
               Aiqun Hu},
  title     = {Robust Key Generation With Hardware Mismatch for Secure {MIMO} Communications},
  journal   = {{IEEE} Trans. Inf. Forensics Secur.},
  volume    = {16},
  pages     = {5264--5278},
  year      = {2021},
  url       = {https://doi.org/10.1109/TIFS.2021.3127021},
  doi       = {10.1109/TIFS.2021.3127021},
  timestamp = {Wed, 15 Dec 2021 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/journals/tifs/LiXXJH21.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/LiYYAKV21,
  author    = {Songze Li and
               Mingchao Yu and
               Chien{-}Sheng Yang and
               Amir Salman Avestimehr and
               Sreeram Kannan and
               Pramod Viswanath},
  title     = {PolyShard: Coded Sharding Achieves Linearly Scaling Efficiency and
               Security Simultaneously},
  journal   = {{IEEE} Trans. Inf. Forensics Secur.},
  volume    = {16},
  pages     = {249--261},
  year      = {2021},
  url       = {https://doi.org/10.1109/TIFS.2020.3009610},
  doi       = {10.1109/TIFS.2020.3009610},
  timestamp = {Wed, 26 Aug 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/tifs/LiYYAKV21.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/LiZ21,
  author    = {Wanda Li and
               Jianping Zeng},
  title     = {Leet Usage and Its Effect on Password Security},
  journal   = {{IEEE} Trans. Inf. Forensics Secur.},
  volume    = {16},
  pages     = {2130--2143},
  year      = {2021},
  url       = {https://doi.org/10.1109/TIFS.2021.3050066},
  doi       = {10.1109/TIFS.2021.3050066},
  timestamp = {Tue, 02 Mar 2021 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/journals/tifs/LiZ21.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/LiZ21a,
  author    = {Shuyi Li and
               Bob Zhang},
  title     = {Joint Discriminative Sparse Coding for Robust Hand-Based Multimodal
               Recognition},
  journal   = {{IEEE} Trans. Inf. Forensics Secur.},
  volume    = {16},
  pages     = {3186--3198},
  year      = {2021},
  url       = {https://doi.org/10.1109/TIFS.2021.3074315},
  doi       = {10.1109/TIFS.2021.3074315},
  timestamp = {Wed, 16 Jun 2021 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/tifs/LiZ21a.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/LiZXC21,
  author    = {Shiyu Li and
               Yuan Zhang and
               Chunxiang Xu and
               Kefei Chen},
  title     = {Cryptoanalysis of an Authenticated Data Structure Scheme With Public
               Privacy-Preserving Auditing},
  journal   = {{IEEE} Trans. Inf. Forensics Secur.},
  volume    = {16},
  pages     = {2564--2565},
  year      = {2021},
  url       = {https://doi.org/10.1109/TIFS.2021.3059270},
  doi       = {10.1109/TIFS.2021.3059270},
  timestamp = {Wed, 07 Apr 2021 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/tifs/LiZXC21.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/LiangLLFZ21,
  author    = {Liqian Liang and
               Congyan Lang and
               Yidong Li and
               Songhe Feng and
               Jian Zhao},
  title     = {Fine-Grained Facial Expression Recognition in the Wild},
  journal   = {{IEEE} Trans. Inf. Forensics Secur.},
  volume    = {16},
  pages     = {482--494},
  year      = {2021},
  url       = {https://doi.org/10.1109/TIFS.2020.3007327},
  doi       = {10.1109/TIFS.2020.3007327},
  timestamp = {Tue, 06 Oct 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/tifs/LiangLLFZ21.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/LiangM21,
  author    = {Junwei Liang and
               Maode Ma},
  title     = {{ECF-MRS:} An Efficient and Collaborative Framework With Markov-Based
               Reputation Scheme for IDSs in Vehicular Networks},
  journal   = {{IEEE} Trans. Inf. Forensics Secur.},
  volume    = {16},
  pages     = {278--290},
  year      = {2021},
  url       = {https://doi.org/10.1109/TIFS.2020.3013211},
  doi       = {10.1109/TIFS.2020.3013211},
  timestamp = {Tue, 06 Oct 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/tifs/LiangM21.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/LinHHC21,
  author    = {Chao Lin and
               Debiao He and
               Xinyi Huang and
               Kim{-}Kwang Raymond Choo},
  title     = {{OBFP:} Optimized Blockchain-Based Fair Payment for Outsourcing Computations
               in Cloud Computing},
  journal   = {{IEEE} Trans. Inf. Forensics Secur.},
  volume    = {16},
  pages     = {3241--3253},
  year      = {2021},
  url       = {https://doi.org/10.1109/TIFS.2021.3073818},
  doi       = {10.1109/TIFS.2021.3073818},
  timestamp = {Thu, 24 Feb 2022 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/journals/tifs/LinHHC21.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/LinSQ21,
  author    = {Xi Jun Lin and
               Lin Sun and
               Haipeng Qu},
  title     = {Cryptanalysis of an Anonymous and Traceable Group Data Sharing in
               Cloud Computing},
  journal   = {{IEEE} Trans. Inf. Forensics Secur.},
  volume    = {16},
  pages     = {2773--2775},
  year      = {2021},
  url       = {https://doi.org/10.1109/TIFS.2021.3065505},
  doi       = {10.1109/TIFS.2021.3065505},
  timestamp = {Sun, 16 May 2021 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/tifs/LinSQ21.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/LiuCZ21,
  author    = {Wenye Liu and
               Chip{-}Hong Chang and
               Fan Zhang},
  title     = {Stealthy and Robust Glitch Injection Attack on Deep Learning Accelerator
               for Target With Variational Viewpoint},
  journal   = {{IEEE} Trans. Inf. Forensics Secur.},
  volume    = {16},
  pages     = {1928--1942},
  year      = {2021},
  url       = {https://doi.org/10.1109/TIFS.2020.3046858},
  doi       = {10.1109/TIFS.2020.3046858},
  timestamp = {Thu, 11 Feb 2021 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/journals/tifs/LiuCZ21.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/LiuJLW21,
  author    = {Qianjun Liu and
               Shouling Ji and
               Changchang Liu and
               Chunming Wu},
  title     = {A Practical Black-Box Attack on Source Code Authorship Identification
               Classifiers},
  journal   = {{IEEE} Trans. Inf. Forensics Secur.},
  volume    = {16},
  pages     = {3620--3633},
  year      = {2021},
  url       = {https://doi.org/10.1109/TIFS.2021.3080507},
  doi       = {10.1109/TIFS.2021.3080507},
  timestamp = {Wed, 16 Mar 2022 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/journals/tifs/LiuJLW21.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/LiuLST21,
  author    = {Yunfan Liu and
               Qi Li and
               Zhenan Sun and
               Tieniu Tan},
  title     = {A\({}^{\mbox{3}}\)GAN: An Attribute-Aware Attentive Generative Adversarial
               Network for Face Aging},
  journal   = {{IEEE} Trans. Inf. Forensics Secur.},
  volume    = {16},
  pages     = {2776--2790},
  year      = {2021},
  url       = {https://doi.org/10.1109/TIFS.2021.3065499},
  doi       = {10.1109/TIFS.2021.3065499},
  timestamp = {Sun, 16 May 2021 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/tifs/LiuLST21.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/LiuLXCHL21,
  author    = {Xiaoyuan Liu and
               Hongwei Li and
               Guowen Xu and
               Zongqi Chen and
               Xiaoming Huang and
               Rongxing Lu},
  title     = {Privacy-Enhanced Federated Learning Against Poisoning Adversaries},
  journal   = {{IEEE} Trans. Inf. Forensics Secur.},
  volume    = {16},
  pages     = {4574--4588},
  year      = {2021},
  url       = {https://doi.org/10.1109/TIFS.2021.3108434},
  doi       = {10.1109/TIFS.2021.3108434},
  timestamp = {Mon, 20 Sep 2021 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/tifs/LiuLXCHL21.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/LiuLY21,
  author    = {Siqi Liu and
               Xiangyuan Lan and
               Pong C. Yuen},
  title     = {Multi-Channel Remote Photoplethysmography Correspondence Feature for
               3D Mask Face Presentation Attack Detection},
  journal   = {{IEEE} Trans. Inf. Forensics Secur.},
  volume    = {16},
  pages     = {2683--2696},
  year      = {2021},
  url       = {https://doi.org/10.1109/TIFS.2021.3050060},
  doi       = {10.1109/TIFS.2021.3050060},
  timestamp = {Wed, 07 Apr 2021 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/tifs/LiuLY21.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/LiuLZH21,
  author    = {Minglin Liu and
               Weiqi Luo and
               Peijia Zheng and
               Jiwu Huang},
  title     = {A New Adversarial Embedding Method for Enhancing Image Steganography},
  journal   = {{IEEE} Trans. Inf. Forensics Secur.},
  volume    = {16},
  pages     = {4621--4634},
  year      = {2021},
  url       = {https://doi.org/10.1109/TIFS.2021.3111748},
  doi       = {10.1109/TIFS.2021.3111748},
  timestamp = {Wed, 03 Nov 2021 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/journals/tifs/LiuLZH21.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/LiuQ21,
  author    = {Manhua Liu and
               Peng Qian},
  title     = {Automatic Segmentation and Enhancement of Latent Fingerprints Using
               Deep Nested UNets},
  journal   = {{IEEE} Trans. Inf. Forensics Secur.},
  volume    = {16},
  pages     = {1709--1719},
  year      = {2021},
  url       = {https://doi.org/10.1109/TIFS.2020.3039058},
  doi       = {10.1109/TIFS.2020.3039058},
  timestamp = {Thu, 11 Feb 2021 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/journals/tifs/LiuQ21.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/LiuTWLLGL21,
  author    = {Ajian Liu and
               Zichang Tan and
               Jun Wan and
               Yanyan Liang and
               Zhen Lei and
               Guodong Guo and
               Stan Z. Li},
  title     = {Face Anti-Spoofing via Adversarial Cross-Modality Translation},
  journal   = {{IEEE} Trans. Inf. Forensics Secur.},
  volume    = {16},
  pages     = {2759--2772},
  year      = {2021},
  url       = {https://doi.org/10.1109/TIFS.2021.3065495},
  doi       = {10.1109/TIFS.2021.3065495},
  timestamp = {Tue, 12 Apr 2022 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/tifs/LiuTWLLGL21.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/LiuW21,
  author    = {Zhaoxi Liu and
               Lingfeng Wang},
  title     = {FlipIt Game Model-Based Defense Strategy Against Cyberattacks on {SCADA}
               Systems Considering Insider Assistance},
  journal   = {{IEEE} Trans. Inf. Forensics Secur.},
  volume    = {16},
  pages     = {2791--2804},
  year      = {2021},
  url       = {https://doi.org/10.1109/TIFS.2021.3065504},
  doi       = {10.1109/TIFS.2021.3065504},
  timestamp = {Mon, 04 Oct 2021 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/tifs/LiuW21.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/LiuW21a,
  author    = {Runze Liu and
               Chau{-}Wai Wong},
  title     = {On Microstructure Estimation Using Flatbed Scanners for Paper Surface-Based
               Authentication},
  journal   = {{IEEE} Trans. Inf. Forensics Secur.},
  volume    = {16},
  pages     = {3039--3053},
  year      = {2021},
  url       = {https://doi.org/10.1109/TIFS.2021.3071585},
  doi       = {10.1109/TIFS.2021.3071585},
  timestamp = {Sun, 16 May 2021 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/tifs/LiuW21a.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/LiuYLFK21,
  author    = {Chang Liu and
               Yulin Yang and
               Xingyan Liu and
               Linpu Fang and
               Wenxiong Kang},
  title     = {Dynamic-Hand-Gesture Authentication Dataset and Benchmark},
  journal   = {{IEEE} Trans. Inf. Forensics Secur.},
  volume    = {16},
  pages     = {1550--1562},
  year      = {2021},
  url       = {https://doi.org/10.1109/TIFS.2020.3036218},
  doi       = {10.1109/TIFS.2020.3036218},
  timestamp = {Mon, 19 Apr 2021 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/tifs/LiuYLFK21.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/LiuZSWZM21,
  author    = {Yuejun Liu and
               Yongbin Zhou and
               Shuo Sun and
               Tianyu Wang and
               Rui Zhang and
               Jingdian Ming},
  title     = {On the Security of Lattice-Based Fiat-Shamir Signatures in the Presence
               of Randomness Leakage},
  journal   = {{IEEE} Trans. Inf. Forensics Secur.},
  volume    = {16},
  pages     = {1868--1879},
  year      = {2021},
  url       = {https://doi.org/10.1109/TIFS.2020.3045904},
  doi       = {10.1109/TIFS.2020.3045904},
  timestamp = {Thu, 11 Feb 2021 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/journals/tifs/LiuZSWZM21.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/LiuZZH21,
  author    = {Yi Liu and
               Dingwen Zhang and
               Qiang Zhang and
               Jungong Han},
  title     = {Integrating Part-Object Relationship and Contrast for Camouflaged
               Object Detection},
  journal   = {{IEEE} Trans. Inf. Forensics Secur.},
  volume    = {16},
  pages     = {5154--5166},
  year      = {2021},
  url       = {https://doi.org/10.1109/TIFS.2021.3124734},
  doi       = {10.1109/TIFS.2021.3124734},
  timestamp = {Wed, 15 Dec 2021 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/journals/tifs/LiuZZH21.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/LuoCMZH21,
  author    = {Mandi Luo and
               Jie Cao and
               Xin Ma and
               Xiaoyu Zhang and
               Ran He},
  title     = {{FA-GAN:} Face Augmentation {GAN} for Deformation-Invariant Face Recognition},
  journal   = {{IEEE} Trans. Inf. Forensics Secur.},
  volume    = {16},
  pages     = {2341--2355},
  year      = {2021},
  url       = {https://doi.org/10.1109/TIFS.2021.3053460},
  doi       = {10.1109/TIFS.2021.3053460},
  timestamp = {Tue, 02 Mar 2021 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/journals/tifs/LuoCMZH21.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/LuoMLCH21,
  author    = {Mandi Luo and
               Xin Ma and
               Zhihang Li and
               Jie Cao and
               Ran He},
  title     = {Partial {NIR-VIS} Heterogeneous Face Recognition With Automatic Saliency
               Search},
  journal   = {{IEEE} Trans. Inf. Forensics Secur.},
  volume    = {16},
  pages     = {5003--5017},
  year      = {2021},
  url       = {https://doi.org/10.1109/TIFS.2021.3122072},
  doi       = {10.1109/TIFS.2021.3122072},
  timestamp = {Wed, 15 Dec 2021 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/journals/tifs/LuoMLCH21.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/MaZLLAZL21,
  author    = {Shuai Ma and
               Yunqi Zhang and
               Hang Li and
               Songtao Lu and
               Naofal Al{-}Dhahir and
               Sha Zhang and
               Shiyin Li},
  title     = {Robust Beamforming Design for Covert Communications},
  journal   = {{IEEE} Trans. Inf. Forensics Secur.},
  volume    = {16},
  pages     = {3026--3038},
  year      = {2021},
  url       = {https://doi.org/10.1109/TIFS.2021.3071602},
  doi       = {10.1109/TIFS.2021.3071602},
  timestamp = {Sun, 16 May 2021 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/tifs/MaZLLAZL21.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/MaiCLY21,
  author    = {Guangcan Mai and
               Kai Cao and
               Xiangyuan Lan and
               Pong C. Yuen},
  title     = {SecureFace: Face Template Protection},
  journal   = {{IEEE} Trans. Inf. Forensics Secur.},
  volume    = {16},
  pages     = {262--277},
  year      = {2021},
  url       = {https://doi.org/10.1109/TIFS.2020.3009590},
  doi       = {10.1109/TIFS.2020.3009590},
  timestamp = {Wed, 26 Aug 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/tifs/MaiCLY21.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/Marin-JimenezCD21,
  author    = {Manuel J. Mar{\'{\i}}n{-}Jim{\'{e}}nez and
               Francisco M. Castro and
               Rub{\'{e}}n Delgado{-}Esca{\~{n}}o and
               Vicky Kalogeiton and
               Nicol{\'{a}}s Guil},
  title     = {UGaitNet: Multimodal Gait Recognition With Missing Input Modalities},
  journal   = {{IEEE} Trans. Inf. Forensics Secur.},
  volume    = {16},
  pages     = {5452--5462},
  year      = {2021},
  url       = {https://doi.org/10.1109/TIFS.2021.3132579},
  doi       = {10.1109/TIFS.2021.3132579},
  timestamp = {Mon, 03 Jan 2022 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/journals/tifs/Marin-JimenezCD21.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/Marteau21,
  author    = {Pierre{-}Francois Marteau},
  title     = {Random Partitioning Forest for Point-Wise and Collective Anomaly Detection
               - Application to Network Intrusion Detection},
  journal   = {{IEEE} Trans. Inf. Forensics Secur.},
  volume    = {16},
  pages     = {2157--2172},
  year      = {2021},
  url       = {https://doi.org/10.1109/TIFS.2021.3050605},
  doi       = {10.1109/TIFS.2021.3050605},
  timestamp = {Tue, 02 Mar 2021 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/journals/tifs/Marteau21.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/MaruyamaOBS21,
  author    = {Teruo M. Maruyama and
               Luiz S. Oliveira and
               Alceu S. Britto Jr. and
               Robert Sabourin},
  title     = {Intrapersonal Parameter Optimization for Offline Handwritten Signature
               Augmentation},
  journal   = {{IEEE} Trans. Inf. Forensics Secur.},
  volume    = {16},
  pages     = {1335--1350},
  year      = {2021},
  url       = {https://doi.org/10.1109/TIFS.2020.3033442},
  doi       = {10.1109/TIFS.2020.3033442},
  timestamp = {Thu, 11 Feb 2021 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/journals/tifs/MaruyamaOBS21.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/MedenRTDKSRPS21,
  author    = {Blaz Meden and
               Peter Rot and
               Philipp Terh{\"{o}}rst and
               Naser Damer and
               Arjan Kuijper and
               Walter J. Scheirer and
               Arun Ross and
               Peter Peer and
               Vitomir Struc},
  title     = {Privacy-Enhancing Face Biometrics: {A} Comprehensive Survey},
  journal   = {{IEEE} Trans. Inf. Forensics Secur.},
  volume    = {16},
  pages     = {4147--4183},
  year      = {2021},
  url       = {https://doi.org/10.1109/TIFS.2021.3096024},
  doi       = {10.1109/TIFS.2021.3096024},
  timestamp = {Thu, 16 Sep 2021 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/tifs/MedenRTDKSRPS21.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/MeftahTMAVC21,
  author    = {Souhail Meftah and
               Benjamin Hong Meng Tan and
               Chan Fook Mun and
               Khin Mi Mi Aung and
               Bharadwaj Veeravalli and
               Vijay Chandrasekhar},
  title     = {DOReN: Toward Efficient Deep Convolutional Neural Networks with Fully
               Homomorphic Encryption},
  journal   = {{IEEE} Trans. Inf. Forensics Secur.},
  volume    = {16},
  pages     = {3740--3752},
  year      = {2021},
  url       = {https://doi.org/10.1109/TIFS.2021.3090959},
  doi       = {10.1109/TIFS.2021.3090959},
  timestamp = {Thu, 16 Sep 2021 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/tifs/MeftahTMAVC21.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/MengXHMH21,
  author    = {Zhaoyi Meng and
               Yan Xiong and
               Wenchao Huang and
               Fuyou Miao and
               Jianmeng Huang},
  title     = {AppAngio: Revealing Contextual Information of Android App Behaviors
               by API-Level Audit Logs},
  journal   = {{IEEE} Trans. Inf. Forensics Secur.},
  volume    = {16},
  pages     = {1912--1927},
  year      = {2021},
  url       = {https://doi.org/10.1109/TIFS.2020.3044867},
  doi       = {10.1109/TIFS.2020.3044867},
  timestamp = {Thu, 11 Feb 2021 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/journals/tifs/MengXHMH21.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/MichelettoMOR21,
  author    = {Marco Micheletto and
               Gian Luca Marcialis and
               Giulia Orr{\`{u}} and
               Fabio Roli},
  title     = {Fingerprint Recognition With Embedded Presentation Attacks Detection:
               Are We Ready?},
  journal   = {{IEEE} Trans. Inf. Forensics Secur.},
  volume    = {16},
  pages     = {5338--5351},
  year      = {2021},
  url       = {https://doi.org/10.1109/TIFS.2021.3121201},
  doi       = {10.1109/TIFS.2021.3121201},
  timestamp = {Wed, 15 Dec 2021 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/journals/tifs/MichelettoMOR21.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/MittalKM21,
  author    = {Govind Mittal and
               Pawel Korus and
               Nasir D. Memon},
  title     = {FiFTy: Large-Scale File Fragment Type Identification Using Convolutional
               Neural Networks},
  journal   = {{IEEE} Trans. Inf. Forensics Secur.},
  volume    = {16},
  pages     = {28--41},
  year      = {2021},
  url       = {https://doi.org/10.1109/TIFS.2020.3004266},
  doi       = {10.1109/TIFS.2020.3004266},
  timestamp = {Thu, 27 Aug 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/tifs/MittalKM21.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/MoTLH21,
  author    = {Xianbo Mo and
               Shunquan Tan and
               Bin Li and
               Jiwu Huang},
  title     = {MCTSteg: {A} Monte Carlo Tree Search-Based Reinforcement Learning
               Framework for Universal Non-Additive Steganography},
  journal   = {{IEEE} Trans. Inf. Forensics Secur.},
  volume    = {16},
  pages     = {4306--4320},
  year      = {2021},
  url       = {https://doi.org/10.1109/TIFS.2021.3104140},
  doi       = {10.1109/TIFS.2021.3104140},
  timestamp = {Mon, 20 Sep 2021 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/tifs/MoTLH21.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/MourisT21,
  author    = {Dimitris Mouris and
               Nektarios Georgios Tsoutsos},
  title     = {Zilch: {A} Framework for Deploying Transparent Zero-Knowledge Proofs},
  journal   = {{IEEE} Trans. Inf. Forensics Secur.},
  volume    = {16},
  pages     = {3269--3284},
  year      = {2021},
  url       = {https://doi.org/10.1109/TIFS.2021.3074869},
  doi       = {10.1109/TIFS.2021.3074869},
  timestamp = {Tue, 15 Jun 2021 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/tifs/MourisT21.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/MuelichMOF21,
  author    = {Sven M{\"{u}}elich and
               Holger Mandry and
               Maurits Ortmanns and
               Robert F. H. Fischer},
  title     = {A Multilevel Coding Scheme for Multi-Valued Physical Unclonable Functions},
  journal   = {{IEEE} Trans. Inf. Forensics Secur.},
  volume    = {16},
  pages     = {3814--3827},
  year      = {2021},
  url       = {https://doi.org/10.1109/TIFS.2021.3089883},
  doi       = {10.1109/TIFS.2021.3089883},
  timestamp = {Wed, 15 Dec 2021 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/journals/tifs/MuelichMOF21.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/MuhammadWWZS21,
  author    = {Jawad Muhammad and
               Yunlong Wang and
               Caiyong Wang and
               Kunbo Zhang and
               Zhenan Sun},
  title     = {CASIA-Face-Africa: {A} Large-Scale African Face Image Database},
  journal   = {{IEEE} Trans. Inf. Forensics Secur.},
  volume    = {16},
  pages     = {3634--3646},
  year      = {2021},
  url       = {https://doi.org/10.1109/TIFS.2021.3080496},
  doi       = {10.1109/TIFS.2021.3080496},
  timestamp = {Thu, 02 Dec 2021 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/journals/tifs/MuhammadWWZS21.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/MurguiaSFNP21,
  author    = {Carlos Murguia and
               Iman Shames and
               Farhad Farokhi and
               Dragan Nesic and
               H. Vincent Poor},
  title     = {On Privacy of Dynamical Systems: An Optimal Probabilistic Mapping
               Approach},
  journal   = {{IEEE} Trans. Inf. Forensics Secur.},
  volume    = {16},
  pages     = {2608--2620},
  year      = {2021},
  url       = {https://doi.org/10.1109/TIFS.2021.3055022},
  doi       = {10.1109/TIFS.2021.3055022},
  timestamp = {Wed, 07 Apr 2021 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/tifs/MurguiaSFNP21.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/NiWLS21,
  author    = {Yuqing Ni and
               Junfeng Wu and
               Li Li and
               Ling Shi},
  title     = {Multi-Party Dynamic State Estimation That Preserves Data and Model
               Privacy},
  journal   = {{IEEE} Trans. Inf. Forensics Secur.},
  volume    = {16},
  pages     = {2288--2299},
  year      = {2021},
  url       = {https://doi.org/10.1109/TIFS.2021.3050621},
  doi       = {10.1109/TIFS.2021.3050621},
  timestamp = {Tue, 02 Mar 2021 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/journals/tifs/NiWLS21.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/NieLLCCFT21,
  author    = {Yulong Nie and
               Xiaolong Lan and
               Yong Liu and
               Qingchun Chen and
               Gaojie Chen and
               Lisheng Fan and
               Dong Tang},
  title     = {Achievable Rate Region of Energy-Harvesting Based Secure Two-Way Buffer-Aided
               Relay Networks},
  journal   = {{IEEE} Trans. Inf. Forensics Secur.},
  volume    = {16},
  pages     = {1610--1625},
  year      = {2021},
  url       = {https://doi.org/10.1109/TIFS.2020.3039047},
  doi       = {10.1109/TIFS.2020.3039047},
  timestamp = {Thu, 11 Feb 2021 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/journals/tifs/NieLLCCFT21.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/NieXJLLMWFWJZ21,
  author    = {Pengli Nie and
               Guangquan Xu and
               Litao Jiao and
               Shaoying Liu and
               Jian Liu and
               Weizhi Meng and
               Hongyue Wu and
               Meiqi Feng and
               Weizhe Wang and
               Zhengjun Jing and
               Xi Zheng},
  title     = {Sparse Trust Data Mining},
  journal   = {{IEEE} Trans. Inf. Forensics Secur.},
  volume    = {16},
  pages     = {4559--4573},
  year      = {2021},
  url       = {https://doi.org/10.1109/TIFS.2021.3109412},
  doi       = {10.1109/TIFS.2021.3109412},
  timestamp = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/tifs/NieXJLLMWFWJZ21.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/NingZ21,
  author    = {Zhenyu Ning and
               Fengwei Zhang},
  title     = {Corrections to "Hardware-Assisted Transparent Tracing and Debugging
               on ARM"},
  journal   = {{IEEE} Trans. Inf. Forensics Secur.},
  volume    = {16},
  pages     = {3479},
  year      = {2021},
  url       = {https://doi.org/10.1109/TIFS.2021.3083357},
  doi       = {10.1109/TIFS.2021.3083357},
  timestamp = {Fri, 13 Aug 2021 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/tifs/NingZ21.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/NisiotiLLP21,
  author    = {Antonia Nisioti and
               George Loukas and
               Aron Laszka and
               Emmanouil Panaousis},
  title     = {Data-Driven Decision Support for Optimizing Cyber Forensic Investigations},
  journal   = {{IEEE} Trans. Inf. Forensics Secur.},
  volume    = {16},
  pages     = {2397--2412},
  year      = {2021},
  url       = {https://doi.org/10.1109/TIFS.2021.3054966},
  doi       = {10.1109/TIFS.2021.3054966},
  timestamp = {Tue, 02 Mar 2021 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/journals/tifs/NisiotiLLP21.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/NiuTZNB21,
  author    = {Yakun Niu and
               Benedetta Tondi and
               Yao Zhao and
               Rongrong Ni and
               Mauro Barni},
  title     = {Image Splicing Detection, Localization and Attribution via {JPEG}
               Primary Quantization Matrix Estimation and Clustering},
  journal   = {{IEEE} Trans. Inf. Forensics Secur.},
  volume    = {16},
  pages     = {5397--5412},
  year      = {2021},
  url       = {https://doi.org/10.1109/TIFS.2021.3129654},
  doi       = {10.1109/TIFS.2021.3129654},
  timestamp = {Wed, 15 Dec 2021 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/journals/tifs/NiuTZNB21.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/OuZLJ21,
  author    = {Changhai Ou and
               Chengju Zhou and
               Siew{-}Kei Lam and
               Guiyuan Jiang},
  title     = {Multiple-Differential Mechanism for Collision-Optimized Divide-and-Conquer
               Attacks},
  journal   = {{IEEE} Trans. Inf. Forensics Secur.},
  volume    = {16},
  pages     = {418--430},
  year      = {2021},
  url       = {https://doi.org/10.1109/TIFS.2020.3014490},
  doi       = {10.1109/TIFS.2020.3014490},
  timestamp = {Tue, 06 Oct 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/tifs/OuZLJ21.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/PanWWZ21,
  author    = {Zaiyu Pan and
               Jun Wang and
               Guoqing Wang and
               Jihong Zhu},
  title     = {Multi-Scale Deep Representation Aggregation for Vein Recognition},
  journal   = {{IEEE} Trans. Inf. Forensics Secur.},
  volume    = {16},
  pages     = {1--15},
  year      = {2021},
  url       = {https://doi.org/10.1109/TIFS.2020.2994738},
  doi       = {10.1109/TIFS.2020.2994738},
  timestamp = {Tue, 23 Feb 2021 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/journals/tifs/PanWWZ21.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/PangWCCW21,
  author    = {Meng Pang and
               Binghui Wang and
               Yiu{-}ming Cheung and
               Yiran Chen and
               Bihan Wen},
  title     = {{VD-GAN:} {A} Unified Framework for Joint Prototype and Representation
               Learning From Contaminated Single Sample per Person},
  journal   = {{IEEE} Trans. Inf. Forensics Secur.},
  volume    = {16},
  pages     = {2246--2259},
  year      = {2021},
  url       = {https://doi.org/10.1109/TIFS.2021.3050055},
  doi       = {10.1109/TIFS.2021.3050055},
  timestamp = {Mon, 04 Jul 2022 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/tifs/PangWCCW21.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/PengWLG21,
  author    = {Chunlei Peng and
               Nannan Wang and
               Jie Li and
               Xinbo Gao},
  title     = {Soft Semantic Representation for Cross-Domain Face Recognition},
  journal   = {{IEEE} Trans. Inf. Forensics Secur.},
  volume    = {16},
  pages     = {346--360},
  year      = {2021},
  url       = {https://doi.org/10.1109/TIFS.2020.3013209},
  doi       = {10.1109/TIFS.2020.3013209},
  timestamp = {Mon, 20 Sep 2021 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/tifs/PengWLG21.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/PengZK21,
  author    = {Su Peng and
               Liang Zhao and
               Neeraj Kumar},
  title     = {Comments on "Efficient Public Verification of Data Integrity for Cloud
               Storage Systems From Indistinguishability Obfuscation"},
  journal   = {{IEEE} Trans. Inf. Forensics Secur.},
  volume    = {16},
  pages     = {4113--4116},
  year      = {2021},
  url       = {https://doi.org/10.1109/TIFS.2021.3102413},
  doi       = {10.1109/TIFS.2021.3102413},
  timestamp = {Wed, 01 Sep 2021 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/tifs/PengZK21.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/PerazzoneYSB21,
  author    = {Jake Bailey Perazzone and
               Paul L. Yu and
               Brian M. Sadler and
               Rick S. Blum},
  title     = {Artificial Noise-Aided {MIMO} Physical Layer Authentication With Imperfect
               {CSI}},
  journal   = {{IEEE} Trans. Inf. Forensics Secur.},
  volume    = {16},
  pages     = {2173--2185},
  year      = {2021},
  url       = {https://doi.org/10.1109/TIFS.2021.3050599},
  doi       = {10.1109/TIFS.2021.3050599},
  timestamp = {Tue, 02 Mar 2021 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/journals/tifs/PerazzoneYSB21.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/PierazziCBCML21,
  author    = {Fabio Pierazzi and
               Stefano Cristalli and
               Danilo Bruschi and
               Michele Colajanni and
               Mirco Marchetti and
               Andrea Lanzi},
  title     = {Glyph: Efficient ML-Based Detection of Heap Spraying Attacks},
  journal   = {{IEEE} Trans. Inf. Forensics Secur.},
  volume    = {16},
  pages     = {740--755},
  year      = {2021},
  url       = {https://doi.org/10.1109/TIFS.2020.3017925},
  doi       = {10.1109/TIFS.2020.3017925},
  timestamp = {Mon, 03 Jan 2022 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/journals/tifs/PierazziCBCML21.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/PraseedT21,
  author    = {Amit Praseed and
               P. Santhi Thilagam},
  title     = {Modelling Behavioural Dynamics for Asymmetric Application Layer DDoS
               Detection},
  journal   = {{IEEE} Trans. Inf. Forensics Secur.},
  volume    = {16},
  pages     = {617--626},
  year      = {2021},
  url       = {https://doi.org/10.1109/TIFS.2020.3017928},
  doi       = {10.1109/TIFS.2020.3017928},
  timestamp = {Tue, 06 Oct 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/tifs/PraseedT21.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/ProencaYA21,
  author    = {Hugo Proen{\c{c}}a and
               Ehsan Yaghoubi and
               Pendar Alirezazadeh},
  title     = {A Quadruplet Loss for Enforcing Semantically Coherent Embeddings in
               Multi-Output Classification Problems},
  journal   = {{IEEE} Trans. Inf. Forensics Secur.},
  volume    = {16},
  pages     = {800--811},
  year      = {2021},
  url       = {https://doi.org/10.1109/TIFS.2020.3023304},
  doi       = {10.1109/TIFS.2020.3023304},
  timestamp = {Fri, 23 Apr 2021 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/tifs/ProencaYA21.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/PuteauxP21,
  author    = {Pauline Puteaux and
               William Puech},
  title     = {Rebuttal: On the Security of Reversible Data Hiding in Encrypted Images
               by {MSB} Prediction},
  journal   = {{IEEE} Trans. Inf. Forensics Secur.},
  volume    = {16},
  pages     = {2445--2446},
  year      = {2021},
  url       = {https://doi.org/10.1109/TIFS.2021.3055630},
  doi       = {10.1109/TIFS.2021.3055630},
  timestamp = {Wed, 07 Apr 2021 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/tifs/PuteauxP21.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/QianQKHSH21,
  author    = {Yunhan Qian and
               Jie Qi and
               Xiaoyan Kuai and
               Guangjie Han and
               Haixin Sun and
               Shaohua Hong},
  title     = {Specific Emitter Identification Based on Multi-Level Sparse Representation
               in Automatic Identification System},
  journal   = {{IEEE} Trans. Inf. Forensics Secur.},
  volume    = {16},
  pages     = {2872--2884},
  year      = {2021},
  url       = {https://doi.org/10.1109/TIFS.2021.3068010},
  doi       = {10.1109/TIFS.2021.3068010},
  timestamp = {Sun, 16 May 2021 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/tifs/QianQKHSH21.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/QinELL21,
  author    = {Huafeng Qin and
               Mounim A. El{-}Yacoubi and
               Yantao Li and
               Chong{-}Wen Liu},
  title     = {Multi-Scale and Multi-Direction {GAN} for CNN-Based Single Palm-Vein
               Identification},
  journal   = {{IEEE} Trans. Inf. Forensics Secur.},
  volume    = {16},
  pages     = {2652--2666},
  year      = {2021},
  url       = {https://doi.org/10.1109/TIFS.2021.3059340},
  doi       = {10.1109/TIFS.2021.3059340},
  timestamp = {Wed, 07 Apr 2021 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/tifs/QinELL21.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/QinWZC21,
  author    = {Yan Qin and
               Weiping Wang and
               Shigeng Zhang and
               Kai Chen},
  title     = {An Exploit Kits Detection Approach Based on {HTTP} Message Graph},
  journal   = {{IEEE} Trans. Inf. Forensics Secur.},
  volume    = {16},
  pages     = {3387--3400},
  year      = {2021},
  url       = {https://doi.org/10.1109/TIFS.2021.3080082},
  doi       = {10.1109/TIFS.2021.3080082},
  timestamp = {Tue, 15 Jun 2021 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/tifs/QinWZC21.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/QuZXLL21,
  author    = {Zhe Qu and
               Shangqing Zhao and
               Jie Xu and
               Zhuo Lu and
               Yao Liu},
  title     = {How to Test the Randomness From the Wireless Channel for Security?},
  journal   = {{IEEE} Trans. Inf. Forensics Secur.},
  volume    = {16},
  pages     = {3753--3766},
  year      = {2021},
  url       = {https://doi.org/10.1109/TIFS.2021.3092051},
  doi       = {10.1109/TIFS.2021.3092051},
  timestamp = {Thu, 16 Sep 2021 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/tifs/QuZXLL21.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/QuanL21,
  author    = {Yijun Quan and
               Chang{-}Tsun Li},
  title     = {On Addressing the Impact of {ISO} Speed Upon {PRNU} and Forgery Detection},
  journal   = {{IEEE} Trans. Inf. Forensics Secur.},
  volume    = {16},
  pages     = {190--202},
  year      = {2021},
  url       = {https://doi.org/10.1109/TIFS.2020.3009583},
  doi       = {10.1109/TIFS.2020.3009583},
  timestamp = {Tue, 06 Oct 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/tifs/QuanL21.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/RahmanIMW21,
  author    = {Mohammad Saidur Rahman and
               Mohsen Imani and
               Nate Mathews and
               Matthew Wright},
  title     = {Mockingbird: Defending Against Deep-Learning-Based Website Fingerprinting
               Attacks With Adversarial Traces},
  journal   = {{IEEE} Trans. Inf. Forensics Secur.},
  volume    = {16},
  pages     = {1594--1609},
  year      = {2021},
  url       = {https://doi.org/10.1109/TIFS.2020.3039691},
  doi       = {10.1109/TIFS.2020.3039691},
  timestamp = {Mon, 29 Mar 2021 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/tifs/RahmanIMW21.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/RajaFFSBWGSFVSL21,
  author    = {Kiran B. Raja and
               Matteo Ferrara and
               Annalisa Franco and
               Luuk J. Spreeuwers and
               Illias Batskos and
               Florens de Wit and
               Marta Gomez{-}Barrero and
               Ulrich Scherhag and
               Daniel Fischer and
               Sushma Venkatesh and
               Jag Mohan Singh and
               Guoqiang Li and
               Lo{\"{\i}}c Bergeron and
               Sergey Isadskiy and
               Raghavendra Ramachandra and
               Christian Rathgeb and
               Dinusha Frings and
               Uwe Seidel and
               Fons Knopjes and
               Raymond N. J. Veldhuis and
               Davide Maltoni and
               Christoph Busch},
  title     = {Morphing Attack Detection-Database, Evaluation Platform, and Benchmarking},
  journal   = {{IEEE} Trans. Inf. Forensics Secur.},
  volume    = {16},
  pages     = {4336--4351},
  year      = {2021},
  url       = {https://doi.org/10.1109/TIFS.2020.3035252},
  doi       = {10.1109/TIFS.2020.3035252},
  timestamp = {Tue, 23 Nov 2021 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/journals/tifs/RajaFFSBWGSFVSL21.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/RajendranSLR21,
  author    = {Sekhar Rajendran and
               Zhi Sun and
               Feng Lin and
               Kui Ren},
  title     = {Injecting Reliable Radio Frequency Fingerprints Using Metasurface
               for the Internet of Things},
  journal   = {{IEEE} Trans. Inf. Forensics Secur.},
  volume    = {16},
  pages     = {1896--1911},
  year      = {2021},
  url       = {https://doi.org/10.1109/TIFS.2020.3045318},
  doi       = {10.1109/TIFS.2020.3045318},
  timestamp = {Thu, 11 Feb 2021 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/journals/tifs/RajendranSLR21.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/RodriguesSLRD21,
  author    = {Caroline Mazini Rodrigues and
               Aurea Soriano{-}Vargas and
               Bahram Lavi and
               Anderson Rocha and
               Zanoni Dias},
  title     = {Manifold Learning for Real-World Event Understanding},
  journal   = {{IEEE} Trans. Inf. Forensics Secur.},
  volume    = {16},
  pages     = {2957--2972},
  year      = {2021},
  url       = {https://doi.org/10.1109/TIFS.2021.3070431},
  doi       = {10.1109/TIFS.2021.3070431},
  timestamp = {Sun, 16 May 2021 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/tifs/RodriguesSLRD21.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/SadeghzadehTJ21,
  author    = {Amir Mahdi Sadeghzadeh and
               Behrad Tajali and
               Rasool Jalili},
  title     = {{AWA:} Adversarial Website Adaptation},
  journal   = {{IEEE} Trans. Inf. Forensics Secur.},
  volume    = {16},
  pages     = {3109--3122},
  year      = {2021},
  url       = {https://doi.org/10.1109/TIFS.2021.3074295},
  doi       = {10.1109/TIFS.2021.3074295},
  timestamp = {Sun, 16 May 2021 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/tifs/SadeghzadehTJ21.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/SaeidianCOS21,
  author    = {Sara Saeidian and
               Giulia Cervia and
               Tobias J. Oechtering and
               Mikael Skoglund},
  title     = {Quantifying Membership Privacy via Information Leakage},
  journal   = {{IEEE} Trans. Inf. Forensics Secur.},
  volume    = {16},
  pages     = {3096--3108},
  year      = {2021},
  url       = {https://doi.org/10.1109/TIFS.2021.3073804},
  doi       = {10.1109/TIFS.2021.3073804},
  timestamp = {Sun, 16 May 2021 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/tifs/SaeidianCOS21.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/SchramlSK21,
  author    = {Matthias G. Schraml and
               Robert T. Schwarz and
               Andreas Knopp},
  title     = {Multiuser {MIMO} Concept for Physical Layer Security in Multibeam
               Satellite Systems},
  journal   = {{IEEE} Trans. Inf. Forensics Secur.},
  volume    = {16},
  pages     = {1670--1680},
  year      = {2021},
  url       = {https://doi.org/10.1109/TIFS.2020.3040884},
  doi       = {10.1109/TIFS.2020.3040884},
  timestamp = {Thu, 11 Feb 2021 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/journals/tifs/SchramlSK21.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/SenigagliesiBG21,
  author    = {Linda Senigagliesi and
               Marco Baldi and
               Ennio Gambi},
  title     = {Comparison of Statistical and Machine Learning Techniques for Physical
               Layer Authentication},
  journal   = {{IEEE} Trans. Inf. Forensics Secur.},
  volume    = {16},
  pages     = {1506--1521},
  year      = {2021},
  url       = {https://doi.org/10.1109/TIFS.2020.3033454},
  doi       = {10.1109/TIFS.2020.3033454},
  timestamp = {Thu, 11 Feb 2021 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/journals/tifs/SenigagliesiBG21.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/Sepas-Moghaddam21,
  author    = {Alireza Sepas{-}Moghaddam and
               Ali Etemad and
               Fernando Pereira and
               Paulo Lobato Correia},
  title     = {Long Short-Term Memory With Gate and State Level Fusion for Light
               Field-Based Face Recognition},
  journal   = {{IEEE} Trans. Inf. Forensics Secur.},
  volume    = {16},
  pages     = {1365--1379},
  year      = {2021},
  url       = {https://doi.org/10.1109/TIFS.2020.3036242},
  doi       = {10.1109/TIFS.2020.3036242},
  timestamp = {Thu, 11 Feb 2021 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/journals/tifs/Sepas-Moghaddam21.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/ShahzadZ21,
  author    = {Khurram Shahzad and
               Xiangyun Zhou},
  title     = {Covert Wireless Communications Under Quasi-Static Fading With Channel
               Uncertainty},
  journal   = {{IEEE} Trans. Inf. Forensics Secur.},
  volume    = {16},
  pages     = {1104--1116},
  year      = {2021},
  url       = {https://doi.org/10.1109/TIFS.2020.3029902},
  doi       = {10.1109/TIFS.2020.3029902},
  timestamp = {Tue, 01 Dec 2020 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/journals/tifs/ShahzadZ21.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/ShamsiJ21,
  author    = {Kaveh Shamsi and
               Yier Jin},
  title     = {In Praise of Exact-Functional-Secrecy in Circuit Locking},
  journal   = {{IEEE} Trans. Inf. Forensics Secur.},
  volume    = {16},
  pages     = {5225--5238},
  year      = {2021},
  url       = {https://doi.org/10.1109/TIFS.2021.3125242},
  doi       = {10.1109/TIFS.2021.3125242},
  timestamp = {Wed, 15 Dec 2021 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/journals/tifs/ShamsiJ21.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/ShangXLLSG21,
  author    = {Fanhua Shang and
               Tao Xu and
               Yuanyuan Liu and
               Hongying Liu and
               Longjie Shen and
               Maoguo Gong},
  title     = {Differentially Private {ADMM} Algorithms for Machine Learning},
  journal   = {{IEEE} Trans. Inf. Forensics Secur.},
  volume    = {16},
  pages     = {4733--4745},
  year      = {2021},
  url       = {https://doi.org/10.1109/TIFS.2021.3113768},
  doi       = {10.1109/TIFS.2021.3113768},
  timestamp = {Wed, 03 Nov 2021 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/journals/tifs/ShangXLLSG21.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/ShaoZ21,
  author    = {Huikai Shao and
               Dexing Zhong},
  title     = {Learning With Partners to Improve the Multi-Source Cross-Dataset Palmprint
               Recognition},
  journal   = {{IEEE} Trans. Inf. Forensics Secur.},
  volume    = {16},
  pages     = {5182--5194},
  year      = {2021},
  url       = {https://doi.org/10.1109/TIFS.2021.3125612},
  doi       = {10.1109/TIFS.2021.3125612},
  timestamp = {Wed, 15 Dec 2021 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/journals/tifs/ShaoZ21.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/ShayanBOSCK21,
  author    = {Mohammed Shayan and
               Sukanta Bhattacharjee and
               Ajymurat Orozaliev and
               Yong{-}Ak Song and
               Krishnendu Chakrabarty and
               Ramesh Karri},
  title     = {Thwarting Bio-IP Theft Through Dummy-Valve-Based Obfuscation},
  journal   = {{IEEE} Trans. Inf. Forensics Secur.},
  volume    = {16},
  pages     = {2076--2089},
  year      = {2021},
  url       = {https://doi.org/10.1109/TIFS.2020.3047755},
  doi       = {10.1109/TIFS.2020.3047755},
  timestamp = {Tue, 02 Mar 2021 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/journals/tifs/ShayanBOSCK21.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/ShehnepoorTLB21,
  author    = {Saeedreza Shehnepoor and
               Roberto Togneri and
               Wei Liu and
               Mohammed Bennamoun},
  title     = {DFraud{\({^3}\)}: Multi-Component Fraud Detection Free of Cold-Start},
  journal   = {{IEEE} Trans. Inf. Forensics Secur.},
  volume    = {16},
  pages     = {3456--3468},
  year      = {2021},
  url       = {https://doi.org/10.1109/TIFS.2021.3081258},
  doi       = {10.1109/TIFS.2021.3081258},
  timestamp = {Sat, 09 Apr 2022 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/tifs/ShehnepoorTLB21.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/SheidaniAE21,
  author    = {Sorour Sheidani and
               Ahmad Mahmoudi Aznaveh and
               Ziba Eslami},
  title     = {CPA-Secure Privacy-Preserving Reversible Data Hiding for {JPEG} Images},
  journal   = {{IEEE} Trans. Inf. Forensics Secur.},
  volume    = {16},
  pages     = {3647--3661},
  year      = {2021},
  url       = {https://doi.org/10.1109/TIFS.2021.3080497},
  doi       = {10.1109/TIFS.2021.3080497},
  timestamp = {Thu, 16 Sep 2021 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/tifs/SheidaniAE21.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/ShenLZDH21,
  author    = {Meng Shen and
               Yiting Liu and
               Liehuang Zhu and
               Xiaojiang Du and
               Jiankun Hu},
  title     = {Fine-Grained Webpage Fingerprinting Using Only Packet Length Information
               of Encrypted Traffic},
  journal   = {{IEEE} Trans. Inf. Forensics Secur.},
  volume    = {16},
  pages     = {2046--2059},
  year      = {2021},
  url       = {https://doi.org/10.1109/TIFS.2020.3046876},
  doi       = {10.1109/TIFS.2020.3046876},
  timestamp = {Tue, 02 Mar 2021 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/journals/tifs/ShenLZDH21.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/ShenXX21,
  author    = {Zhexian Shen and
               Kui Xu and
               Xiaochen Xia},
  title     = {Beam-Domain Anti-Jamming Transmission for Downlink Massive {MIMO}
               Systems: {A} Stackelberg Game Perspective},
  journal   = {{IEEE} Trans. Inf. Forensics Secur.},
  volume    = {16},
  pages     = {2727--2742},
  year      = {2021},
  url       = {https://doi.org/10.1109/TIFS.2021.3063632},
  doi       = {10.1109/TIFS.2021.3063632},
  timestamp = {Sun, 16 May 2021 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/tifs/ShenXX21.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/ShenYZXLH21,
  author    = {Meng Shen and
               Hao Yu and
               Liehuang Zhu and
               Ke Xu and
               Qi Li and
               Jiankun Hu},
  title     = {Effective and Robust Physical-World Attacks on Deep Learning Face
               Recognition Systems},
  journal   = {{IEEE} Trans. Inf. Forensics Secur.},
  volume    = {16},
  pages     = {4063--4077},
  year      = {2021},
  url       = {https://doi.org/10.1109/TIFS.2021.3102492},
  doi       = {10.1109/TIFS.2021.3102492},
  timestamp = {Wed, 01 Sep 2021 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/tifs/ShenYZXLH21.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/ShenZZXD21,
  author    = {Meng Shen and
               Jinpeng Zhang and
               Liehuang Zhu and
               Ke Xu and
               Xiaojiang Du},
  title     = {Accurate Decentralized Application Identification via Encrypted Traffic
               Analysis Using Graph Neural Networks},
  journal   = {{IEEE} Trans. Inf. Forensics Secur.},
  volume    = {16},
  pages     = {2367--2380},
  year      = {2021},
  url       = {https://doi.org/10.1109/TIFS.2021.3050608},
  doi       = {10.1109/TIFS.2021.3050608},
  timestamp = {Tue, 02 Mar 2021 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/journals/tifs/ShenZZXD21.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/ShengTNPD21,
  author    = {Zhichao Sheng and
               Hoang Duong Tuan and
               Ali Arshad Nasir and
               H. Vincent Poor and
               Eryk Dutkiewicz},
  title     = {Physical Layer Security Aided Wireless Interference Networks in the
               Presence of Strong Eavesdropper Channels},
  journal   = {{IEEE} Trans. Inf. Forensics Secur.},
  volume    = {16},
  pages     = {3228--3240},
  year      = {2021},
  url       = {https://doi.org/10.1109/TIFS.2021.3076927},
  doi       = {10.1109/TIFS.2021.3076927},
  timestamp = {Tue, 15 Jun 2021 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/tifs/ShengTNPD21.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/ShimizuS21,
  author    = {Kosuke Shimizu and
               Taizo Suzuki},
  title     = {Finely Tunable Bitcuboid-Based Encryption With Exception-Free Signed
               Binarization for {JPEG} Standard},
  journal   = {{IEEE} Trans. Inf. Forensics Secur.},
  volume    = {16},
  pages     = {4895--4908},
  year      = {2021},
  url       = {https://doi.org/10.1109/TIFS.2021.3113510},
  doi       = {10.1109/TIFS.2021.3113510},
  timestamp = {Wed, 03 Nov 2021 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/journals/tifs/ShimizuS21.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/ShomajiGGWF21,
  author    = {Sumaiya Shomaji and
               Pallabi Ghosh and
               Fatemeh Ganji and
               Damon L. Woodard and
               Domenic Forte},
  title     = {An Analysis of Enrollment and Query Attacks on Hierarchical Bloom
               Filter-Based Biometric Systems},
  journal   = {{IEEE} Trans. Inf. Forensics Secur.},
  volume    = {16},
  pages     = {5294--5309},
  year      = {2021},
  url       = {https://doi.org/10.1109/TIFS.2021.3128821},
  doi       = {10.1109/TIFS.2021.3128821},
  timestamp = {Wed, 15 Dec 2021 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/journals/tifs/ShomajiGGWF21.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/SongLCSLW21,
  author    = {Qiyang Song and
               Zhuotao Liu and
               Jiahao Cao and
               Kun Sun and
               Qi Li and
               Cong Wang},
  title     = {{SAP-SSE:} Protecting Search Patterns and Access Patterns in Searchable
               Symmetric Encryption},
  journal   = {{IEEE} Trans. Inf. Forensics Secur.},
  volume    = {16},
  pages     = {1795--1809},
  year      = {2021},
  url       = {https://doi.org/10.1109/TIFS.2020.3042058},
  doi       = {10.1109/TIFS.2020.3042058},
  timestamp = {Thu, 11 Feb 2021 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/journals/tifs/SongLCSLW21.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/SongLKJ21,
  author    = {Byungkyu Song and
               Sehee Lim and
               Seung{-}Hyuk Kang and
               Seong{-}Ook Jung},
  title     = {Environmental-Variation-Tolerant Magnetic Tunnel Junction-Based Physical
               Unclonable Function Cell With Auto Write-Back Technique},
  journal   = {{IEEE} Trans. Inf. Forensics Secur.},
  volume    = {16},
  pages     = {2843--2853},
  year      = {2021},
  url       = {https://doi.org/10.1109/TIFS.2021.3067173},
  doi       = {10.1109/TIFS.2021.3067173},
  timestamp = {Sun, 16 May 2021 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/tifs/SongLKJ21.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/SunBSBWQ21,
  author    = {Zhi Sun and
               Sarankumar Balakrishnan and
               Lu Su and
               Arupjyoti Bhuyan and
               Pu Wang and
               Chunming Qiao},
  title     = {Who Is in Control? Practical Physical Layer Attack and Defense for
               mmWave-Based Sensing in Autonomous Vehicles},
  journal   = {{IEEE} Trans. Inf. Forensics Secur.},
  volume    = {16},
  pages     = {3199--3214},
  year      = {2021},
  url       = {https://doi.org/10.1109/TIFS.2021.3076287},
  doi       = {10.1109/TIFS.2021.3076287},
  timestamp = {Tue, 15 Jun 2021 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/tifs/SunBSBWQ21.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/SunPHS21,
  author    = {Haomiao Sun and
               Hongyu Pan and
               Hu Han and
               Shiguang Shan},
  title     = {Deep Conditional Distribution Learning for Age Estimation},
  journal   = {{IEEE} Trans. Inf. Forensics Secur.},
  volume    = {16},
  pages     = {4679--4690},
  year      = {2021},
  url       = {https://doi.org/10.1109/TIFS.2021.3114066},
  doi       = {10.1109/TIFS.2021.3114066},
  timestamp = {Wed, 03 Nov 2021 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/journals/tifs/SunPHS21.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/SunZS21,
  author    = {Li Sun and
               Yong Zhang and
               A. Lee Swindlehurst},
  title     = {Alternate-Jamming-Aided Wireless Physical-Layer Surveillance: Protocol
               Design and Performance Analysis},
  journal   = {{IEEE} Trans. Inf. Forensics Secur.},
  volume    = {16},
  pages     = {1989--2003},
  year      = {2021},
  url       = {https://doi.org/10.1109/TIFS.2020.3046880},
  doi       = {10.1109/TIFS.2020.3046880},
  timestamp = {Thu, 11 Feb 2021 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/journals/tifs/SunZS21.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/Szalachowski21,
  author    = {Pawel Szalachowski},
  title     = {Password-Authenticated Decentralized Identities},
  journal   = {{IEEE} Trans. Inf. Forensics Secur.},
  volume    = {16},
  pages     = {4801--4810},
  year      = {2021},
  url       = {https://doi.org/10.1109/TIFS.2021.3116429},
  doi       = {10.1109/TIFS.2021.3116429},
  timestamp = {Wed, 03 Nov 2021 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/journals/tifs/Szalachowski21.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/TaburetBSF21,
  author    = {Th{\'{e}}o Taburet and
               Patrick Bas and
               Wadih Sawaya and
               Jessica J. Fridrich},
  title     = {Natural Steganography in {JPEG} Domain With a Linear Development Pipeline},
  journal   = {{IEEE} Trans. Inf. Forensics Secur.},
  volume    = {16},
  pages     = {173--186},
  year      = {2021},
  url       = {https://doi.org/10.1109/TIFS.2020.3007354},
  doi       = {10.1109/TIFS.2020.3007354},
  timestamp = {Wed, 17 Mar 2021 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/journals/tifs/TaburetBSF21.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/TalrejaVN21,
  author    = {Veeru Talreja and
               Matthew C. Valenti and
               Nasser M. Nasrabadi},
  title     = {Deep Hashing for Secure Multimodal Biometrics},
  journal   = {{IEEE} Trans. Inf. Forensics Secur.},
  volume    = {16},
  pages     = {1306--1321},
  year      = {2021},
  url       = {https://doi.org/10.1109/TIFS.2020.3033189},
  doi       = {10.1109/TIFS.2020.3033189},
  timestamp = {Thu, 17 Dec 2020 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/journals/tifs/TalrejaVN21.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/TalukderFR21,
  author    = {Bashir M. Sabquat Bahar Talukder and
               Farah Ferdaus and
               Md. Tauhidur Rahman},
  title     = {Memory-Based PUFs are Vulnerable as Well: {A} Non-Invasive Attack
               Against {SRAM} PUFs},
  journal   = {{IEEE} Trans. Inf. Forensics Secur.},
  volume    = {16},
  pages     = {4035--4049},
  year      = {2021},
  url       = {https://doi.org/10.1109/TIFS.2021.3101045},
  doi       = {10.1109/TIFS.2021.3101045},
  timestamp = {Wed, 01 Sep 2021 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/tifs/TalukderFR21.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/TanK21,
  author    = {Hanzhuo Tan and
               Ajay Kumar},
  title     = {Minutiae Attention Network With Reciprocal Distance Loss for Contactless
               to Contact-Based Fingerprint Identification},
  journal   = {{IEEE} Trans. Inf. Forensics Secur.},
  volume    = {16},
  pages     = {3299--3311},
  year      = {2021},
  url       = {https://doi.org/10.1109/TIFS.2021.3076307},
  doi       = {10.1109/TIFS.2021.3076307},
  timestamp = {Tue, 15 Jun 2021 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/tifs/TanK21.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/TanWSLLH21,
  author    = {Shunquan Tan and
               Weilong Wu and
               Zilong Shao and
               Qiushi Li and
               Bin Li and
               Jiwu Huang},
  title     = {{CALPA-NET:} Channel-Pruning-Assisted Deep Residual Network for Steganalysis
               of Digital Images},
  journal   = {{IEEE} Trans. Inf. Forensics Secur.},
  volume    = {16},
  pages     = {131--146},
  year      = {2021},
  url       = {https://doi.org/10.1109/TIFS.2020.3005304},
  doi       = {10.1109/TIFS.2020.3005304},
  timestamp = {Thu, 27 Aug 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/tifs/TanWSLLH21.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/TandoganS21,
  author    = {Sinan E. Tandogan and
               Husrev Taha Sencar},
  title     = {Estimating Uniqueness of I-Vector-Based Representation of Human Voice},
  journal   = {{IEEE} Trans. Inf. Forensics Secur.},
  volume    = {16},
  pages     = {3054--3067},
  year      = {2021},
  url       = {https://doi.org/10.1109/TIFS.2021.3071574},
  doi       = {10.1109/TIFS.2021.3071574},
  timestamp = {Sun, 16 May 2021 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/tifs/TandoganS21.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/TangJZWQ21,
  author    = {Jie Tang and
               Long Jiao and
               Kai Zeng and
               Hong Wen and
               Kaiyu Qin},
  title     = {Physical Layer Secure {MIMO} Communications Against Eavesdroppers
               With Arbitrary Number of Antennas},
  journal   = {{IEEE} Trans. Inf. Forensics Secur.},
  volume    = {16},
  pages     = {466--481},
  year      = {2021},
  url       = {https://doi.org/10.1109/TIFS.2020.3015548},
  doi       = {10.1109/TIFS.2020.3015548},
  timestamp = {Tue, 06 Oct 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/tifs/TangJZWQ21.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/TangLBLH21,
  author    = {Weixuan Tang and
               Bin Li and
               Mauro Barni and
               Jin Li and
               Jiwu Huang},
  title     = {An Automatic Cost Learning Framework for Image Steganography Using
               Deep Reinforcement Learning},
  journal   = {{IEEE} Trans. Inf. Forensics Secur.},
  volume    = {16},
  pages     = {952--967},
  year      = {2021},
  url       = {https://doi.org/10.1109/TIFS.2020.3025438},
  doi       = {10.1109/TIFS.2020.3025438},
  timestamp = {Tue, 01 Dec 2020 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/journals/tifs/TangLBLH21.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/Tarrias-MunozMR21,
  author    = {Antonio Tarr{\'{\i}}as{-}Mu{\~{n}}oz and
               Jos{\'{e}} Luis Matez{-}Bandera and
               Pablo Ram{\'{\i}}rez{-}Espinosa and
               F. Javier L{\'{o}}pez{-}Mart{\'{\i}}nez},
  title     = {Effect of Correlation Between Information and Energy Links in Secure
               Wireless Powered Communications},
  journal   = {{IEEE} Trans. Inf. Forensics Secur.},
  volume    = {16},
  pages     = {3780--3789},
  year      = {2021},
  url       = {https://doi.org/10.1109/TIFS.2021.3090937},
  doi       = {10.1109/TIFS.2021.3090937},
  timestamp = {Wed, 15 Dec 2021 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/journals/tifs/Tarrias-MunozMR21.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/TerhorstFKDKK21,
  author    = {Philipp Terh{\"{o}}rst and
               Daniel F{\"{a}}hrmann and
               Jan Niklas Kolf and
               Naser Damer and
               Florian Kirchbuchner and
               Arjan Kuijper},
  title     = {MAAD-Face: {A} Massively Annotated Attribute Dataset for Face Images},
  journal   = {{IEEE} Trans. Inf. Forensics Secur.},
  volume    = {16},
  pages     = {3942--3957},
  year      = {2021},
  url       = {https://doi.org/10.1109/TIFS.2021.3096120},
  doi       = {10.1109/TIFS.2021.3096120},
  timestamp = {Wed, 15 Dec 2021 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/journals/tifs/TerhorstFKDKK21.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/TianXLLXLZW21,
  author    = {Hangyu Tian and
               Kaiping Xue and
               Xinyi Luo and
               Shaohua Li and
               Jie Xu and
               Jianqing Liu and
               Jun Zhao and
               David S. L. Wei},
  title     = {Enabling Cross-Chain Transactions: {A} Decentralized Cryptocurrency
               Exchange Protocol},
  journal   = {{IEEE} Trans. Inf. Forensics Secur.},
  volume    = {16},
  pages     = {3928--3941},
  year      = {2021},
  url       = {https://doi.org/10.1109/TIFS.2021.3096124},
  doi       = {10.1109/TIFS.2021.3096124},
  timestamp = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/tifs/TianXLLXLZW21.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/TianZH21,
  author    = {Xianhao Tian and
               Peijia Zheng and
               Jiwu Huang},
  title     = {Robust Privacy-Preserving Motion Detection and Object Tracking in
               Encrypted Streaming Video},
  journal   = {{IEEE} Trans. Inf. Forensics Secur.},
  volume    = {16},
  pages     = {5381--5396},
  year      = {2021},
  url       = {https://doi.org/10.1109/TIFS.2021.3128817},
  doi       = {10.1109/TIFS.2021.3128817},
  timestamp = {Wed, 15 Dec 2021 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/journals/tifs/TianZH21.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/TipleaH21,
  author    = {Ferucio Laurentiu Tiplea and
               Cristian Hristea},
  title     = {{PUF} Protected Variables: {A} Solution to {RFID} Security and Privacy
               Under Corruption With Temporary State Disclosure},
  journal   = {{IEEE} Trans. Inf. Forensics Secur.},
  volume    = {16},
  pages     = {999--1013},
  year      = {2021},
  url       = {https://doi.org/10.1109/TIFS.2020.3027147},
  doi       = {10.1109/TIFS.2020.3027147},
  timestamp = {Tue, 01 Dec 2020 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/journals/tifs/TipleaH21.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/TranH21,
  author    = {Quang Nhat Tran and
               Jiankun Hu},
  title     = {A Multi-Filter Fingerprint Matching Framework for Cancelable Template
               Design},
  journal   = {{IEEE} Trans. Inf. Forensics Secur.},
  volume    = {16},
  pages     = {2926--2940},
  year      = {2021},
  url       = {https://doi.org/10.1109/TIFS.2021.3069170},
  doi       = {10.1109/TIFS.2021.3069170},
  timestamp = {Sun, 16 May 2021 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/tifs/TranH21.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/UppalSGE21,
  author    = {Hardik Uppal and
               Alireza Sepas{-}Moghaddam and
               Michael A. Greenspan and
               Ali Etemad},
  title     = {Depth as Attention for Face Representation Learning},
  journal   = {{IEEE} Trans. Inf. Forensics Secur.},
  volume    = {16},
  pages     = {2461--2476},
  year      = {2021},
  url       = {https://doi.org/10.1109/TIFS.2021.3053458},
  doi       = {10.1109/TIFS.2021.3053458},
  timestamp = {Fri, 30 Apr 2021 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/tifs/UppalSGE21.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/WangB21,
  author    = {Shi{-}Yuan Wang and
               Matthieu R. Bloch},
  title     = {Covert {MIMO} Communications Under Variational Distance Constraint},
  journal   = {{IEEE} Trans. Inf. Forensics Secur.},
  volume    = {16},
  pages     = {4605--4620},
  year      = {2021},
  url       = {https://doi.org/10.1109/TIFS.2021.3110048},
  doi       = {10.1109/TIFS.2021.3110048},
  timestamp = {Mon, 20 Sep 2021 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/tifs/WangB21.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/WangB21a,
  author    = {Zisheng Wang and
               Rick S. Blum},
  title     = {Algorithms and Analysis for Optimizing the Tracking Performance of
               Cyber Attacked Sensor-Equipped Connected Vehicle Networks},
  journal   = {{IEEE} Trans. Inf. Forensics Secur.},
  volume    = {16},
  pages     = {5061--5076},
  year      = {2021},
  url       = {https://doi.org/10.1109/TIFS.2021.3122070},
  doi       = {10.1109/TIFS.2021.3122070},
  timestamp = {Wed, 15 Dec 2021 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/journals/tifs/WangB21a.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/WangC21,
  author    = {Sen Wang and
               J. Morris Chang},
  title     = {Privacy-Preserving Boosting in the Local Setting},
  journal   = {{IEEE} Trans. Inf. Forensics Secur.},
  volume    = {16},
  pages     = {4451--4465},
  year      = {2021},
  url       = {https://doi.org/10.1109/TIFS.2021.3097822},
  doi       = {10.1109/TIFS.2021.3097822},
  timestamp = {Sat, 08 Jan 2022 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/journals/tifs/WangC21.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/WangCZ21,
  author    = {Yu Wang and
               Yun Cao and
               Xianfeng Zhao},
  title     = {Minimizing Embedding Impact for {H.264} Steganography by Progressive
               Trellis Coding},
  journal   = {{IEEE} Trans. Inf. Forensics Secur.},
  volume    = {16},
  pages     = {333--345},
  year      = {2021},
  url       = {https://doi.org/10.1109/TIFS.2020.3013523},
  doi       = {10.1109/TIFS.2020.3013523},
  timestamp = {Mon, 19 Apr 2021 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/tifs/WangCZ21.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/WangG21,
  author    = {Qiangchang Wang and
               Guodong Guo},
  title     = {DSA-Face: Diverse and Sparse Attentions for Face Recognition Robust
               to Pose Variation and Occlusion},
  journal   = {{IEEE} Trans. Inf. Forensics Secur.},
  volume    = {16},
  pages     = {4534--4543},
  year      = {2021},
  url       = {https://doi.org/10.1109/TIFS.2021.3109463},
  doi       = {10.1109/TIFS.2021.3109463},
  timestamp = {Mon, 20 Sep 2021 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/tifs/WangG21.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/WangHLXMS21,
  author    = {Yuanhao Wang and
               Qiong Huang and
               Hongbo Li and
               Meiyan Xiao and
               Sha Ma and
               Willy Susilo},
  title     = {Private Set Intersection With Authorization Over Outsourced Encrypted
               Datasets},
  journal   = {{IEEE} Trans. Inf. Forensics Secur.},
  volume    = {16},
  pages     = {4050--4062},
  year      = {2021},
  url       = {https://doi.org/10.1109/TIFS.2021.3101059},
  doi       = {10.1109/TIFS.2021.3101059},
  timestamp = {Wed, 01 Sep 2021 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/tifs/WangHLXMS21.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/WangHSC21,
  author    = {Guoqing Wang and
               Hu Han and
               Shiguang Shan and
               Xilin Chen},
  title     = {Unsupervised Adversarial Domain Adaptation for Cross-Domain Face Presentation
               Attack Detection},
  journal   = {{IEEE} Trans. Inf. Forensics Secur.},
  volume    = {16},
  pages     = {56--69},
  year      = {2021},
  url       = {https://doi.org/10.1109/TIFS.2020.3002390},
  doi       = {10.1109/TIFS.2020.3002390},
  timestamp = {Thu, 02 Dec 2021 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/journals/tifs/WangHSC21.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/WangIHC21,
  author    = {Xin Wang and
               Hideaki Ishii and
               Jianping He and
               Peng Cheng},
  title     = {Dynamic Privacy-Aware Collaborative Schemes for Average Computation:
               {A} Multi-Time Reporting Case},
  journal   = {{IEEE} Trans. Inf. Forensics Secur.},
  volume    = {16},
  pages     = {3843--3858},
  year      = {2021},
  url       = {https://doi.org/10.1109/TIFS.2021.3096121},
  doi       = {10.1109/TIFS.2021.3096121},
  timestamp = {Thu, 16 Sep 2021 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/tifs/WangIHC21.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/WangK21,
  author    = {Kuo Wang and
               Ajay Kumar},
  title     = {Periocular-Assisted Multi-Feature Collaboration for Dynamic Iris Recognition},
  journal   = {{IEEE} Trans. Inf. Forensics Secur.},
  volume    = {16},
  pages     = {866--879},
  year      = {2021},
  url       = {https://doi.org/10.1109/TIFS.2020.3023289},
  doi       = {10.1109/TIFS.2020.3023289},
  timestamp = {Tue, 01 Dec 2020 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/journals/tifs/WangK21.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/WangL21,
  author    = {Silei Wang and
               Qiang Li},
  title     = {Distributionally Robust Secure Multicast Beamforming With Intelligent
               Reflecting Surface},
  journal   = {{IEEE} Trans. Inf. Forensics Secur.},
  volume    = {16},
  pages     = {5429--5441},
  year      = {2021},
  url       = {https://doi.org/10.1109/TIFS.2021.3130440},
  doi       = {10.1109/TIFS.2021.3130440},
  timestamp = {Wed, 15 Dec 2021 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/journals/tifs/WangL21.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/WangLAJDZ21,
  author    = {Ning Wang and
               Weiwei Li and
               Amir Alipour{-}Fanid and
               Long Jiao and
               Monireh Dabaghchian and
               Kai Zeng},
  title     = {Pilot Contamination Attack Detection for 5G MmWave Grant-Free IoT
               Networks},
  journal   = {{IEEE} Trans. Inf. Forensics Secur.},
  volume    = {16},
  pages     = {658--670},
  year      = {2021},
  url       = {https://doi.org/10.1109/TIFS.2020.3017932},
  doi       = {10.1109/TIFS.2020.3017932},
  timestamp = {Mon, 26 Oct 2020 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/journals/tifs/WangLAJDZ21.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/WangLDZW21,
  author    = {An Wang and
               Yuan Li and
               Yaoling Ding and
               Liehuang Zhu and
               Yongjuan Wang},
  title     = {Efficient Framework for Genetic Algorithm-Based Correlation Power
               Analysis},
  journal   = {{IEEE} Trans. Inf. Forensics Secur.},
  volume    = {16},
  pages     = {4882--4894},
  year      = {2021},
  url       = {https://doi.org/10.1109/TIFS.2021.3117091},
  doi       = {10.1109/TIFS.2021.3117091},
  timestamp = {Fri, 29 Oct 2021 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/tifs/WangLDZW21.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/WangMLLMD21,
  author    = {Xiangyu Wang and
               Jianfeng Ma and
               Feng Li and
               Ximeng Liu and
               Yinbin Miao and
               Robert H. Deng},
  title     = {Enabling Efficient Spatial Keyword Queries on Encrypted Data With
               Strong Security Guarantees},
  journal   = {{IEEE} Trans. Inf. Forensics Secur.},
  volume    = {16},
  pages     = {4909--4923},
  year      = {2021},
  url       = {https://doi.org/10.1109/TIFS.2021.3118880},
  doi       = {10.1109/TIFS.2021.3118880},
  timestamp = {Mon, 01 Aug 2022 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/tifs/WangMLLMD21.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/WangSHZCY21,
  author    = {Shengling Wang and
               Lina Shi and
               Qin Hu and
               Junshan Zhang and
               Xiuzhen Cheng and
               Jiguo Yu},
  title     = {Privacy-Aware Data Trading},
  journal   = {{IEEE} Trans. Inf. Forensics Secur.},
  volume    = {16},
  pages     = {3916--3927},
  year      = {2021},
  url       = {https://doi.org/10.1109/TIFS.2021.3099699},
  doi       = {10.1109/TIFS.2021.3099699},
  timestamp = {Thu, 10 Mar 2022 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/journals/tifs/WangSHZCY21.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/WangSLMJ21,
  author    = {Yue Wang and
               Esha Sarkar and
               Wenqing Li and
               Michail Maniatakos and
               Saif Eddin Jabari},
  title     = {Stop-and-Go: Exploring Backdoor Attacks on Deep Reinforcement Learning-Based
               Traffic Congestion Control Systems},
  journal   = {{IEEE} Trans. Inf. Forensics Secur.},
  volume    = {16},
  pages     = {4772--4787},
  year      = {2021},
  url       = {https://doi.org/10.1109/TIFS.2021.3114024},
  doi       = {10.1109/TIFS.2021.3114024},
  timestamp = {Tue, 02 Aug 2022 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/tifs/WangSLMJ21.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/WangST21,
  author    = {Chong Xiao Wang and
               Yang Song and
               Wee Peng Tay},
  title     = {Arbitrarily Strong Utility-Privacy Tradeoff in Multi-Agent Systems},
  journal   = {{IEEE} Trans. Inf. Forensics Secur.},
  volume    = {16},
  pages     = {671--684},
  year      = {2021},
  url       = {https://doi.org/10.1109/TIFS.2020.3016835},
  doi       = {10.1109/TIFS.2020.3016835},
  timestamp = {Fri, 29 Apr 2022 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/tifs/WangST21.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/WangSXFW21,
  author    = {Yahang Wang and
               Xiaoning Song and
               Tianyang Xu and
               Zhen{-}Hua Feng and
               Xiaojun Wu},
  title     = {From {RGB} to Depth: Domain Transfer Network for Face Anti-Spoofing},
  journal   = {{IEEE} Trans. Inf. Forensics Secur.},
  volume    = {16},
  pages     = {4280--4290},
  year      = {2021},
  timestamp = {Fri, 17 Sep 2021 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/tifs/WangSXFW21.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/WangTH21,
  author    = {Shen Wang and
               Ehsan Toreini and
               Feng Hao},
  title     = {Anti-Counterfeiting for Polymer Banknotes Based on Polymer Substrate
               Fingerprinting},
  journal   = {{IEEE} Trans. Inf. Forensics Secur.},
  volume    = {16},
  pages     = {2823--2835},
  year      = {2021},
  url       = {https://doi.org/10.1109/TIFS.2021.3067440},
  doi       = {10.1109/TIFS.2021.3067440},
  timestamp = {Sun, 16 May 2021 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/tifs/WangTH21.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/WangYTTHFFBW21,
  author    = {Huanting Wang and
               Guixin Ye and
               Zhanyong Tang and
               Shin Hwei Tan and
               Songfang Huang and
               Dingyi Fang and
               Yansong Feng and
               Lizhong Bian and
               Zheng Wang},
  title     = {Combining Graph-Based Learning With Automated Data Collection for
               Code Vulnerability Detection},
  journal   = {{IEEE} Trans. Inf. Forensics Secur.},
  volume    = {16},
  pages     = {1943--1958},
  year      = {2021},
  url       = {https://doi.org/10.1109/TIFS.2020.3044773},
  doi       = {10.1109/TIFS.2020.3044773},
  timestamp = {Thu, 11 Feb 2021 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/journals/tifs/WangYTTHFFBW21.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/WangZLSB21,
  author    = {Qian Wang and
               Baolin Zheng and
               Qi Li and
               Chao Shen and
               Zhongjie Ba},
  title     = {Towards Query-Efficient Adversarial Attacks Against Automatic Speech
               Recognition Systems},
  journal   = {{IEEE} Trans. Inf. Forensics Secur.},
  volume    = {16},
  pages     = {896--908},
  year      = {2021},
  url       = {https://doi.org/10.1109/TIFS.2020.3026543},
  doi       = {10.1109/TIFS.2020.3026543},
  timestamp = {Thu, 23 Jun 2022 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/tifs/WangZLSB21.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/WangZLY21,
  author    = {Yaofei Wang and
               Weiming Zhang and
               Weixiang Li and
               Nenghai Yu},
  title     = {Non-Additive Cost Functions for {JPEG} Steganography Based on Block
               Boundary Maintenance},
  journal   = {{IEEE} Trans. Inf. Forensics Secur.},
  volume    = {16},
  pages     = {1117--1130},
  year      = {2021},
  url       = {https://doi.org/10.1109/TIFS.2020.3029908},
  doi       = {10.1109/TIFS.2020.3029908},
  timestamp = {Tue, 01 Dec 2020 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/journals/tifs/WangZLY21.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/WeerasingheAEL21,
  author    = {Sandamal Weerasinghe and
               Tansu Alpcan and
               Sarah M. Erfani and
               Christopher Leckie},
  title     = {Defending Support Vector Machines Against Data Poisoning Attacks},
  journal   = {{IEEE} Trans. Inf. Forensics Secur.},
  volume    = {16},
  pages     = {2566--2578},
  year      = {2021},
  url       = {https://doi.org/10.1109/TIFS.2021.3058771},
  doi       = {10.1109/TIFS.2021.3058771},
  timestamp = {Wed, 07 Apr 2021 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/tifs/WeerasingheAEL21.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/WeiCXCZ21,
  author    = {Lu Wei and
               Jie Cui and
               Yan Xu and
               Jiujun Cheng and
               Hong Zhong},
  title     = {Secure and Lightweight Conditional Privacy-Preserving Authentication
               for Securing Traffic Emergency Messages in VANETs},
  journal   = {{IEEE} Trans. Inf. Forensics Secur.},
  volume    = {16},
  pages     = {1681--1695},
  year      = {2021},
  url       = {https://doi.org/10.1109/TIFS.2020.3040876},
  doi       = {10.1109/TIFS.2020.3040876},
  timestamp = {Wed, 16 Mar 2022 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/journals/tifs/WeiCXCZ21.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/WenZXOQ21,
  author    = {Jialin Wen and
               Benjamin Zi Hao Zhao and
               Minhui Xue and
               Alina Oprea and
               Haifeng Qian},
  title     = {With Great Dispersion Comes Greater Resilience: Efficient Poisoning
               Attacks and Defenses for Linear Regression Models},
  journal   = {{IEEE} Trans. Inf. Forensics Secur.},
  volume    = {16},
  pages     = {3709--3723},
  year      = {2021},
  url       = {https://doi.org/10.1109/TIFS.2021.3087332},
  doi       = {10.1109/TIFS.2021.3087332},
  timestamp = {Thu, 16 Sep 2021 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/tifs/WenZXOQ21.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/WonHJBB21,
  author    = {Yoo{-}Seung Won and
               Xiaolu Hou and
               Dirmanto Jap and
               Jakub Breier and
               Shivam Bhasin},
  title     = {Back to the Basics: Seamless Integration of Side-Channel Pre-Processing
               in Deep Neural Networks},
  journal   = {{IEEE} Trans. Inf. Forensics Secur.},
  volume    = {16},
  pages     = {3215--3227},
  year      = {2021},
  url       = {https://doi.org/10.1109/TIFS.2021.3076928},
  doi       = {10.1109/TIFS.2021.3076928},
  timestamp = {Tue, 15 Jun 2021 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/tifs/WonHJBB21.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/WuJXC21,
  author    = {Yangyang Wu and
               Changsong Jiang and
               Chunxiang Xu and
               Kefei Chen},
  title     = {Security Analysis of a Path Validation Scheme With Constant-Size Proof},
  journal   = {{IEEE} Trans. Inf. Forensics Secur.},
  volume    = {16},
  pages     = {4246--4248},
  year      = {2021},
  url       = {https://doi.org/10.1109/TIFS.2021.3101043},
  doi       = {10.1109/TIFS.2021.3101043},
  timestamp = {Thu, 16 Sep 2021 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/tifs/WuJXC21.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/WuZ21,
  author    = {Haiwei Wu and
               Jiantao Zhou},
  title     = {Privacy Leakage of {SIFT} Features via Deep Generative Model Based
               Image Reconstruction},
  journal   = {{IEEE} Trans. Inf. Forensics Secur.},
  volume    = {16},
  pages     = {2973--2985},
  year      = {2021},
  url       = {https://doi.org/10.1109/TIFS.2021.3070427},
  doi       = {10.1109/TIFS.2021.3070427},
  timestamp = {Sun, 16 May 2021 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/tifs/WuZ21.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/WuZLNF21,
  author    = {Xiaojun Wu and
               Jinghui Zhou and
               Jun Liu and
               Fangyi Ni and
               Haoqiang Fan},
  title     = {Single-Shot Face Anti-Spoofing for Dual Pixel Camera},
  journal   = {{IEEE} Trans. Inf. Forensics Secur.},
  volume    = {16},
  pages     = {1440--1451},
  year      = {2021},
  url       = {https://doi.org/10.1109/TIFS.2020.3035879},
  doi       = {10.1109/TIFS.2020.3035879},
  timestamp = {Thu, 16 Jun 2022 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/tifs/WuZLNF21.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/XiaSCH21,
  author    = {Yusheng Xia and
               Jinshu Su and
               Rongmao Chen and
               Xinyi Huang},
  title     = {{APGS:} An Efficient Source-Accountable and Metadata-Private Protocol
               in the Network Layer},
  journal   = {{IEEE} Trans. Inf. Forensics Secur.},
  volume    = {16},
  pages     = {1245--1260},
  year      = {2021},
  url       = {https://doi.org/10.1109/TIFS.2020.3032294},
  doi       = {10.1109/TIFS.2020.3032294},
  timestamp = {Thu, 24 Feb 2022 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/journals/tifs/XiaSCH21.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/XiaoLXZD21,
  author    = {Liang Xiao and
               Xiaozhen Lu and
               Tangwei Xu and
               Weihua Zhuang and
               Huaiyu Dai},
  title     = {Reinforcement Learning-Based Physical-Layer Authentication for Controller
               Area Networks},
  journal   = {{IEEE} Trans. Inf. Forensics Secur.},
  volume    = {16},
  pages     = {2535--2547},
  year      = {2021},
  url       = {https://doi.org/10.1109/TIFS.2021.3056206},
  doi       = {10.1109/TIFS.2021.3056206},
  timestamp = {Wed, 07 Apr 2021 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/tifs/XiaoLXZD21.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/XiaoZL21,
  author    = {Yue Xiao and
               Peng Zhang and
               Yuhong Liu},
  title     = {Secure and Efficient Multi-Signature Schemes for Fabric: An Enterprise
               Blockchain Platform},
  journal   = {{IEEE} Trans. Inf. Forensics Secur.},
  volume    = {16},
  pages     = {1782--1794},
  year      = {2021},
  url       = {https://doi.org/10.1109/TIFS.2020.3042070},
  doi       = {10.1109/TIFS.2020.3042070},
  timestamp = {Thu, 04 Aug 2022 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/tifs/XiaoZL21.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/XieCH21,
  author    = {Ning Xie and
               Junjie Chen and
               Lei Huang},
  title     = {Physical-Layer Authentication Using Multiple Channel-Based Features},
  journal   = {{IEEE} Trans. Inf. Forensics Secur.},
  volume    = {16},
  pages     = {2356--2366},
  year      = {2021},
  url       = {https://doi.org/10.1109/TIFS.2021.3054534},
  doi       = {10.1109/TIFS.2021.3054534},
  timestamp = {Tue, 02 Mar 2021 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/journals/tifs/XieCH21.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/XieGJ21,
  author    = {Hongcheng Xie and
               Yu Guo and
               Xiaohua Jia},
  title     = {A Privacy-Preserving Online Ride-Hailing System Without Involving
               a Third Trusted Server},
  journal   = {{IEEE} Trans. Inf. Forensics Secur.},
  volume    = {16},
  pages     = {3068--3081},
  year      = {2021},
  url       = {https://doi.org/10.1109/TIFS.2021.3065832},
  doi       = {10.1109/TIFS.2021.3065832},
  timestamp = {Sun, 16 May 2021 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/tifs/XieGJ21.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/XieXCYHNS21,
  author    = {Renjie Xie and
               Wei Xu and
               Yanzhi Chen and
               Jiabao Yu and
               Aiqun Hu and
               Derrick Wing Kwan Ng and
               A. Lee Swindlehurst},
  title     = {A Generalizable Model-and-Data Driven Approach for Open-Set {RFF}
               Authentication},
  journal   = {{IEEE} Trans. Inf. Forensics Secur.},
  volume    = {16},
  pages     = {4435--4450},
  year      = {2021},
  url       = {https://doi.org/10.1109/TIFS.2021.3106166},
  doi       = {10.1109/TIFS.2021.3106166},
  timestamp = {Mon, 20 Sep 2021 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/tifs/XieXCYHNS21.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/XiongZYH21,
  author    = {Lizhi Xiong and
               Xinwei Zhong and
               Ching{-}Nung Yang and
               Xiao Han},
  title     = {Transform Domain-Based Invertible and Lossless Secret Image Sharing
               With Authentication},
  journal   = {{IEEE} Trans. Inf. Forensics Secur.},
  volume    = {16},
  pages     = {2912--2925},
  year      = {2021},
  url       = {https://doi.org/10.1109/TIFS.2021.3065794},
  doi       = {10.1109/TIFS.2021.3065794},
  timestamp = {Sun, 16 May 2021 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/tifs/XiongZYH21.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/XuDZYW21,
  author    = {Lei Xu and
               Huayi Duan and
               Anxin Zhou and
               Xingliang Yuan and
               Cong Wang},
  title     = {Interpreting and Mitigating Leakage-Abuse Attacks in Searchable Symmetric
               Encryption},
  journal   = {{IEEE} Trans. Inf. Forensics Secur.},
  volume    = {16},
  pages     = {5310--5325},
  year      = {2021},
  url       = {https://doi.org/10.1109/TIFS.2021.3128823},
  doi       = {10.1109/TIFS.2021.3128823},
  timestamp = {Mon, 03 Jan 2022 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/journals/tifs/XuDZYW21.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/XuNHZD21,
  author    = {Shengmin Xu and
               Jianting Ning and
               Xinyi Huang and
               Jianying Zhou and
               Robert H. Deng},
  title     = {Server-Aided Bilateral Access Control for Secure Data Sharing With
               Dynamic User Groups},
  journal   = {{IEEE} Trans. Inf. Forensics Secur.},
  volume    = {16},
  pages     = {4746--4761},
  year      = {2021},
  url       = {https://doi.org/10.1109/TIFS.2021.3113516},
  doi       = {10.1109/TIFS.2021.3113516},
  timestamp = {Thu, 24 Feb 2022 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/journals/tifs/XuNHZD21.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/XuNMHD21,
  author    = {Shengmin Xu and
               Jianting Ning and
               Jinhua Ma and
               Xinyi Huang and
               Robert H. Deng},
  title     = {K-Time Modifiable and Epoch-Based Redactable Blockchain},
  journal   = {{IEEE} Trans. Inf. Forensics Secur.},
  volume    = {16},
  pages     = {4507--4520},
  year      = {2021},
  url       = {https://doi.org/10.1109/TIFS.2021.3107146},
  doi       = {10.1109/TIFS.2021.3107146},
  timestamp = {Thu, 24 Feb 2022 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/journals/tifs/XuNMHD21.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/XuR21,
  author    = {Dongyang Xu and
               Pinyi Ren},
  title     = {Quantum Learning Based Nonrandom Superimposed Coding for Secure Wireless
               Access in 5G {URLLC}},
  journal   = {{IEEE} Trans. Inf. Forensics Secur.},
  volume    = {16},
  pages     = {2429--2444},
  year      = {2021},
  url       = {https://doi.org/10.1109/TIFS.2021.3056215},
  doi       = {10.1109/TIFS.2021.3056215},
  timestamp = {Wed, 07 Apr 2021 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/tifs/XuR21.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/XuRS21,
  author    = {Qian Xu and
               Pinyi Ren and
               A. Lee Swindlehurst},
  title     = {Rethinking Secure Precoding via Interference Exploitation: {A} Smart
               Eavesdropper Perspective},
  journal   = {{IEEE} Trans. Inf. Forensics Secur.},
  volume    = {16},
  pages     = {585--600},
  year      = {2021},
  url       = {https://doi.org/10.1109/TIFS.2020.3016836},
  doi       = {10.1109/TIFS.2020.3016836},
  timestamp = {Tue, 06 Oct 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/tifs/XuRS21.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/XuXRCYJLW21,
  author    = {Yifan Xu and
               Yuhua Xu and
               Guochun Ren and
               Jin Chen and
               Changhua Yao and
               Luliang Jia and
               Dianxiong Liu and
               Ximing Wang},
  title     = {Play it by Ear: Context-Aware Distributed Coordinated Anti-Jamming
               Channel Access},
  journal   = {{IEEE} Trans. Inf. Forensics Secur.},
  volume    = {16},
  pages     = {5279--5293},
  year      = {2021},
  url       = {https://doi.org/10.1109/TIFS.2021.3128249},
  doi       = {10.1109/TIFS.2021.3128249},
  timestamp = {Wed, 15 Dec 2021 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/journals/tifs/XuXRCYJLW21.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/XuYXNX21,
  author    = {Weiyang Xu and
               Chang Yuan and
               Shengbo Xu and
               Hien Quoc Ngo and
               Wei Xiang},
  title     = {On Pilot Spoofing Attack in Massive {MIMO} Systems: Detection and
               Countermeasure},
  journal   = {{IEEE} Trans. Inf. Forensics Secur.},
  volume    = {16},
  pages     = {1396--1409},
  year      = {2021},
  url       = {https://doi.org/10.1109/TIFS.2020.3036805},
  doi       = {10.1109/TIFS.2020.3036805},
  timestamp = {Wed, 15 Dec 2021 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/journals/tifs/XuYXNX21.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/YamacAPRSG21,
  author    = {Mehmet Yama{\c{c}} and
               Mete Ahishali and
               Nikolaos Passalis and
               Jenni Raitoharju and
               B{\"{u}}lent Sankur and
               Moncef Gabbouj},
  title     = {Multi-Level Reversible Data Anonymization via Compressive Sensing
               and Data Hiding},
  journal   = {{IEEE} Trans. Inf. Forensics Secur.},
  volume    = {16},
  pages     = {1014--1028},
  year      = {2021},
  url       = {https://doi.org/10.1109/TIFS.2020.3026467},
  doi       = {10.1109/TIFS.2020.3026467},
  timestamp = {Wed, 16 Mar 2022 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/journals/tifs/YamacAPRSG21.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/YanMYLG21,
  author    = {Jing Yan and
               Yuan Meng and
               Xian Yang and
               Xiaoyuan Luo and
               Xinping Guan},
  title     = {Privacy-Preserving Localization for Underwater Sensor Networks via
               Deep Reinforcement Learning},
  journal   = {{IEEE} Trans. Inf. Forensics Secur.},
  volume    = {16},
  pages     = {1880--1895},
  year      = {2021},
  url       = {https://doi.org/10.1109/TIFS.2020.3045320},
  doi       = {10.1109/TIFS.2020.3045320},
  timestamp = {Wed, 23 Feb 2022 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/journals/tifs/YanMYLG21.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/YanT21,
  author    = {Qifa Yan and
               Daniela Tuninetti},
  title     = {Key Superposition Simultaneously Achieves Security and Privacy in
               Cache-Aided Linear Function Retrieval},
  journal   = {{IEEE} Trans. Inf. Forensics Secur.},
  volume    = {16},
  pages     = {5250--5263},
  year      = {2021},
  url       = {https://doi.org/10.1109/TIFS.2021.3127018},
  doi       = {10.1109/TIFS.2021.3127018},
  timestamp = {Wed, 15 Dec 2021 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/journals/tifs/YanT21.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/YanWLLG21,
  author    = {Zhicong Yan and
               Jun Wu and
               Gaolei Li and
               Shenghong Li and
               Mohsen Guizani},
  title     = {Deep Neural Backdoor in Semi-Supervised Learning: Threats and Countermeasures},
  journal   = {{IEEE} Trans. Inf. Forensics Secur.},
  volume    = {16},
  pages     = {4827--4842},
  year      = {2021},
  url       = {https://doi.org/10.1109/TIFS.2021.3116431},
  doi       = {10.1109/TIFS.2021.3116431},
  timestamp = {Wed, 03 Nov 2021 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/journals/tifs/YanWLLG21.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/YangCCJT21,
  author    = {Jian Yang and
               Xiang Chen and
               Shuangwu Chen and
               Xiaofeng Jiang and
               Xiaobin Tan},
  title     = {Conditional Variational Auto-Encoder and Extreme Value Theory Aided
               Two-Stage Learning Approach for Intelligent Fine-Grained Known/Unknown
               Intrusion Detection},
  journal   = {{IEEE} Trans. Inf. Forensics Secur.},
  volume    = {16},
  pages     = {3538--3553},
  year      = {2021},
  url       = {https://doi.org/10.1109/TIFS.2021.3083422},
  doi       = {10.1109/TIFS.2021.3083422},
  timestamp = {Thu, 16 Sep 2021 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/tifs/YangCCJT21.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/YangCZNYX21,
  author    = {Kang Yang and
               Liqun Chen and
               Zhenfeng Zhang and
               Christopher J. P. Newton and
               Bo Yang and
               Li Xi},
  title     = {Direct Anonymous Attestation With Optimal {TPM} Signing Efficiency},
  journal   = {{IEEE} Trans. Inf. Forensics Secur.},
  volume    = {16},
  pages     = {2260--2275},
  year      = {2021},
  url       = {https://doi.org/10.1109/TIFS.2021.3051801},
  doi       = {10.1109/TIFS.2021.3051801},
  timestamp = {Wed, 15 Dec 2021 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/journals/tifs/YangCZNYX21.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/YangGWWPD21,
  author    = {Yang Yang and
               Zhangshuang Guan and
               Zhiguo Wan and
               Jian Weng and
               HweeHwa Pang and
               Robert H. Deng},
  title     = {PriScore: Blockchain-Based Self-Tallying Election System Supporting
               Score Voting},
  journal   = {{IEEE} Trans. Inf. Forensics Secur.},
  volume    = {16},
  pages     = {4705--4720},
  year      = {2021},
  url       = {https://doi.org/10.1109/TIFS.2021.3108494},
  doi       = {10.1109/TIFS.2021.3108494},
  timestamp = {Wed, 03 Nov 2021 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/journals/tifs/YangGWWPD21.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/YangLXLG21,
  author    = {Jiachen Yang and
               Aiyun Li and
               Shuai Xiao and
               Wen Lu and
               Xinbo Gao},
  title     = {MTD-Net: Learning to Detect Deepfakes Images by Multi-Scale Texture
               Difference},
  journal   = {{IEEE} Trans. Inf. Forensics Secur.},
  volume    = {16},
  pages     = {4234--4245},
  year      = {2021},
  url       = {https://doi.org/10.1109/TIFS.2021.3102487},
  doi       = {10.1109/TIFS.2021.3102487},
  timestamp = {Thu, 16 Sep 2021 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/tifs/YangLXLG21.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/YangMAH21,
  author    = {Yuli Yang and
               Meng Ma and
               Sonia A{\"{\i}}ssa and
               Lajos Hanzo},
  title     = {Physical-Layer Secret Key Generation via CQI-Mapped Spatial Modulation
               in Multi-Hop Wiretap Ad-Hoc Networks},
  journal   = {{IEEE} Trans. Inf. Forensics Secur.},
  volume    = {16},
  pages     = {1322--1334},
  year      = {2021},
  url       = {https://doi.org/10.1109/TIFS.2020.3032276},
  doi       = {10.1109/TIFS.2020.3032276},
  timestamp = {Thu, 17 Dec 2020 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/journals/tifs/YangMAH21.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/YangMWL21,
  author    = {Chenzhao Yang and
               Jun Ma and
               Shilin Wang and
               Alan Wee{-}Chung Liew},
  title     = {Preventing DeepFake Attacks on Speaker Authentication by Dynamic Lip
               Movement Analysis},
  journal   = {{IEEE} Trans. Inf. Forensics Secur.},
  volume    = {16},
  pages     = {1841--1854},
  year      = {2021},
  url       = {https://doi.org/10.1109/TIFS.2020.3045937},
  doi       = {10.1109/TIFS.2020.3045937},
  timestamp = {Thu, 11 Feb 2021 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/journals/tifs/YangMWL21.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/YangSZW21,
  author    = {Zhihai Yang and
               Qindong Sun and
               Yaling Zhang and
               Wei Wang},
  title     = {Identification of Malicious Injection Attacks in Dense Rating and
               Co-Visitation Behaviors},
  journal   = {{IEEE} Trans. Inf. Forensics Secur.},
  volume    = {16},
  pages     = {537--552},
  year      = {2021},
  url       = {https://doi.org/10.1109/TIFS.2020.3016827},
  doi       = {10.1109/TIFS.2020.3016827},
  timestamp = {Tue, 06 Oct 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/tifs/YangSZW21.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/YangWCYL21,
  author    = {Can Yang and
               Lan Wang and
               Houwei Cao and
               Qihu Yuan and
               Yong Liu},
  title     = {User Behavior Fingerprinting With Multi-Item-Sets and Its Application
               in {IPTV} Viewer Identification},
  journal   = {{IEEE} Trans. Inf. Forensics Secur.},
  volume    = {16},
  pages     = {2667--2682},
  year      = {2021},
  url       = {https://doi.org/10.1109/TIFS.2021.3055638},
  doi       = {10.1109/TIFS.2021.3055638},
  timestamp = {Thu, 12 Aug 2021 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/tifs/YangWCYL21.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/YangYWHY21,
  author    = {Lu Yang and
               Gongping Yang and
               Kuikui Wang and
               Fanchang Hao and
               Yilong Yin},
  title     = {Finger Vein Recognition via Sparse Reconstruction Error Constrained
               Low-Rank Representation},
  journal   = {{IEEE} Trans. Inf. Forensics Secur.},
  volume    = {16},
  pages     = {4869--4881},
  year      = {2021},
  url       = {https://doi.org/10.1109/TIFS.2021.3118894},
  doi       = {10.1109/TIFS.2021.3118894},
  timestamp = {Wed, 03 Nov 2021 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/journals/tifs/YangYWHY21.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/YangYXSCY21,
  author    = {Lu Yang and
               Gongping Yang and
               Xiaoming Xi and
               Kun Su and
               Qing Chen and
               Yilong Yin},
  title     = {Correction to "Finger Vein Code: From Indexing to Matching"},
  journal   = {{IEEE} Trans. Inf. Forensics Secur.},
  volume    = {16},
  pages     = {219},
  year      = {2021},
  url       = {https://doi.org/10.1109/TIFS.2020.3008986},
  doi       = {10.1109/TIFS.2020.3008986},
  timestamp = {Fri, 29 Oct 2021 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/tifs/YangYXSCY21.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/YangZ21,
  author    = {Wenyuan Yang and
               Yuesheng Zhu},
  title     = {A Verifiable Semantic Searching Scheme by Optimal Matching Over Encrypted
               Data in Public Cloud},
  journal   = {{IEEE} Trans. Inf. Forensics Secur.},
  volume    = {16},
  pages     = {100--115},
  year      = {2021},
  url       = {https://doi.org/10.1109/TIFS.2020.3001728},
  doi       = {10.1109/TIFS.2020.3001728},
  timestamp = {Wed, 26 Aug 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/tifs/YangZ21.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/YangZHHH21,
  author    = {Zhongliang Yang and
               Si{-}Yu Zhang and
               Yuting Hu and
               Zhiwen Hu and
               Yongfeng Huang},
  title     = {VAE-Stega: Linguistic Steganography Based on Variational Auto-Encoder},
  journal   = {{IEEE} Trans. Inf. Forensics Secur.},
  volume    = {16},
  pages     = {880--895},
  year      = {2021},
  url       = {https://doi.org/10.1109/TIFS.2020.3023279},
  doi       = {10.1109/TIFS.2020.3023279},
  timestamp = {Tue, 09 Mar 2021 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/journals/tifs/YangZHHH21.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/YeCCC21,
  author    = {Feng Ye and
               Zheyuan Cheng and
               Xianghui Cao and
               Mo{-}Yuen Chow},
  title     = {A Random-Weight Privacy-Preserving Algorithm With Error Compensation
               for Microgrid Distributed Energy Management},
  journal   = {{IEEE} Trans. Inf. Forensics Secur.},
  volume    = {16},
  pages     = {4352--4362},
  year      = {2021},
  url       = {https://doi.org/10.1109/TIFS.2021.3106161},
  doi       = {10.1109/TIFS.2021.3106161},
  timestamp = {Mon, 20 Sep 2021 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/tifs/YeCCC21.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/YeNR21,
  author    = {Fangwei Ye and
               Carolina Naim and
               Salim El Rouayheb},
  title     = {{ON-OFF} Privacy Against Correlation Over Time},
  journal   = {{IEEE} Trans. Inf. Forensics Secur.},
  volume    = {16},
  pages     = {2104--2117},
  year      = {2021},
  url       = {https://doi.org/10.1109/TIFS.2021.3050068},
  doi       = {10.1109/TIFS.2021.3050068},
  timestamp = {Tue, 02 Mar 2021 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/journals/tifs/YeNR21.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/YeSS21,
  author    = {Mang Ye and
               Jianbing Shen and
               Ling Shao},
  title     = {Visible-Infrared Person Re-Identification via Homogeneous Augmented
               Tri-Modal Learning},
  journal   = {{IEEE} Trans. Inf. Forensics Secur.},
  volume    = {16},
  pages     = {728--739},
  year      = {2021},
  url       = {https://doi.org/10.1109/TIFS.2020.3001665},
  doi       = {10.1109/TIFS.2020.3001665},
  timestamp = {Tue, 01 Dec 2020 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/journals/tifs/YeSS21.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/YeZSZ21,
  author    = {Dayong Ye and
               Tianqing Zhu and
               Sheng Shen and
               Wanlei Zhou},
  title     = {A Differentially Private Game Theoretic Approach for Deceiving Cyber
               Adversaries},
  journal   = {{IEEE} Trans. Inf. Forensics Secur.},
  volume    = {16},
  pages     = {569--584},
  year      = {2021},
  url       = {https://doi.org/10.1109/TIFS.2020.3016842},
  doi       = {10.1109/TIFS.2020.3016842},
  timestamp = {Thu, 21 Apr 2022 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/tifs/YeZSZ21.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/YilmazAS21,
  author    = {Selim Yilmaz and
               Emre Aydogan and
               Sevil Sen},
  title     = {A Transfer Learning Approach for Securing Resource-Constrained IoT
               Devices},
  journal   = {{IEEE} Trans. Inf. Forensics Secur.},
  volume    = {16},
  pages     = {4405--4418},
  year      = {2021},
  url       = {https://doi.org/10.1109/TIFS.2021.3096029},
  doi       = {10.1109/TIFS.2021.3096029},
  timestamp = {Mon, 20 Sep 2021 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/tifs/YilmazAS21.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/YinFLZ21,
  author    = {Qihao Yin and
               Jianjiang Feng and
               Jiwen Lu and
               Jie Zhou},
  title     = {Joint Estimation of Pose and Singular Points of Fingerprints},
  journal   = {{IEEE} Trans. Inf. Forensics Secur.},
  volume    = {16},
  pages     = {1467--1479},
  year      = {2021},
  url       = {https://doi.org/10.1109/TIFS.2020.3036803},
  doi       = {10.1109/TIFS.2020.3036803},
  timestamp = {Thu, 11 Feb 2021 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/journals/tifs/YinFLZ21.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/Yli-MayryUMNBMG21,
  author    = {Ville Yli{-}M{\"{a}}yry and
               Rei Ueno and
               Noriyuki Miura and
               Makoto Nagata and
               Shivam Bhasin and
               Yves Mathieu and
               Tarik Graba and
               Jean{-}Luc Danger and
               Naofumi Homma},
  title     = {Diffusional Side-Channel Leakage From Unrolled Lightweight Block Ciphers:
               {A} Case Study of Power Analysis on {PRINCE}},
  journal   = {{IEEE} Trans. Inf. Forensics Secur.},
  volume    = {16},
  pages     = {1351--1364},
  year      = {2021},
  url       = {https://doi.org/10.1109/TIFS.2020.3033441},
  doi       = {10.1109/TIFS.2020.3033441},
  timestamp = {Thu, 11 Feb 2021 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/journals/tifs/Yli-MayryUMNBMG21.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/YouLO21,
  author    = {Yang You and
               Zuxing Li and
               Tobias J. Oechtering},
  title     = {Energy Management Strategy for Smart Meter Privacy and Cost Saving},
  journal   = {{IEEE} Trans. Inf. Forensics Secur.},
  volume    = {16},
  pages     = {1522--1537},
  year      = {2021},
  url       = {https://doi.org/10.1109/TIFS.2020.3036247},
  doi       = {10.1109/TIFS.2020.3036247},
  timestamp = {Thu, 11 Feb 2021 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/journals/tifs/YouLO21.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/YouZZ21,
  author    = {Weike You and
               Hong Zhang and
               Xianfeng Zhao},
  title     = {A Siamese {CNN} for Image Steganalysis},
  journal   = {{IEEE} Trans. Inf. Forensics Secur.},
  volume    = {16},
  pages     = {291--306},
  year      = {2021},
  url       = {https://doi.org/10.1109/TIFS.2020.3013204},
  doi       = {10.1109/TIFS.2020.3013204},
  timestamp = {Tue, 06 Oct 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/tifs/YouZZ21.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/YousefTB21,
  author    = {Waleed A. Yousef and
               Issa Traor{\'{e}} and
               William Briguglio},
  title     = {{UN-AVOIDS:} Unsupervised and Nonparametric Approach for Visualizing
               Outliers and Invariant Detection Scoring},
  journal   = {{IEEE} Trans. Inf. Forensics Secur.},
  volume    = {16},
  pages     = {5195--5210},
  year      = {2021},
  url       = {https://doi.org/10.1109/TIFS.2021.3125608},
  doi       = {10.1109/TIFS.2021.3125608},
  timestamp = {Wed, 15 Dec 2021 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/journals/tifs/YousefTB21.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/YuHYK21,
  author    = {Jian Yu and
               Yuewang He and
               Qiben Yan and
               Xiangui Kang},
  title     = {SpecView: Malware Spectrum Visualization Framework With Singular Spectrum
               Transformation},
  journal   = {{IEEE} Trans. Inf. Forensics Secur.},
  volume    = {16},
  pages     = {5093--5107},
  year      = {2021},
  url       = {https://doi.org/10.1109/TIFS.2021.3124725},
  doi       = {10.1109/TIFS.2021.3124725},
  timestamp = {Wed, 15 Dec 2021 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/journals/tifs/YuHYK21.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/YuWL21,
  author    = {Xinchun Yu and
               Shuangqing Wei and
               Yuan Luo},
  title     = {Finite Blocklength Analysis of Gaussian Random Coding in {AWGN} Channels
               Under Covert Constraint},
  journal   = {{IEEE} Trans. Inf. Forensics Secur.},
  volume    = {16},
  pages     = {1261--1274},
  year      = {2021},
  url       = {https://doi.org/10.1109/TIFS.2020.3032292},
  doi       = {10.1109/TIFS.2020.3032292},
  timestamp = {Fri, 05 Nov 2021 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/journals/tifs/YuWL21.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/YuanWZ21,
  author    = {Ye Yuan and
               Liji Wu and
               Xiangmin Zhang},
  title     = {Gini-Impurity Index Analysis},
  journal   = {{IEEE} Trans. Inf. Forensics Secur.},
  volume    = {16},
  pages     = {3154--3169},
  year      = {2021},
  url       = {https://doi.org/10.1109/TIFS.2021.3076932},
  doi       = {10.1109/TIFS.2021.3076932},
  timestamp = {Tue, 15 Jun 2021 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/tifs/YuanWZ21.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/YueLWW21,
  author    = {Meng Yue and
               Jing Li and
               Zhijun Wu and
               Minxiao Wang},
  title     = {High-Potency Models of LDoS Attack Against {CUBIC} + {RED}},
  journal   = {{IEEE} Trans. Inf. Forensics Secur.},
  volume    = {16},
  pages     = {4950--4965},
  year      = {2021},
  url       = {https://doi.org/10.1109/TIFS.2021.3117066},
  doi       = {10.1109/TIFS.2021.3117066},
  timestamp = {Tue, 23 Nov 2021 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/journals/tifs/YueLWW21.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/ZabirMCSH21,
  author    = {Ishmam Zabir and
               Ahmed Maksud and
               Gaojie Chen and
               Brian M. Sadler and
               Yingbo Hua},
  title     = {Secrecy of Multi-Antenna Transmission With Full-Duplex User in the
               Presence of Randomly Located Eavesdroppers},
  journal   = {{IEEE} Trans. Inf. Forensics Secur.},
  volume    = {16},
  pages     = {2060--2075},
  year      = {2021},
  url       = {https://doi.org/10.1109/TIFS.2020.3047763},
  doi       = {10.1109/TIFS.2020.3047763},
  timestamp = {Tue, 02 Mar 2021 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/journals/tifs/ZabirMCSH21.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/ZamaniOS21,
  author    = {Amirreza Zamani and
               Tobias J. Oechtering and
               Mikael Skoglund},
  title     = {A Design Framework for Strongly {\(\chi\)}{\({^2}\)}-Private Data
               Disclosure},
  journal   = {{IEEE} Trans. Inf. Forensics Secur.},
  volume    = {16},
  pages     = {2312--2325},
  year      = {2021},
  url       = {https://doi.org/10.1109/TIFS.2021.3053462},
  doi       = {10.1109/TIFS.2021.3053462},
  timestamp = {Tue, 02 Mar 2021 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/journals/tifs/ZamaniOS21.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/ZhangAFA21,
  author    = {Hanwei Zhang and
               Yannis Avrithis and
               Teddy Furon and
               Laurent Amsaleg},
  title     = {Walking on the Edge: Fast, Low-Distortion Adversarial Examples},
  journal   = {{IEEE} Trans. Inf. Forensics Secur.},
  volume    = {16},
  pages     = {701--713},
  year      = {2021},
  url       = {https://doi.org/10.1109/TIFS.2020.3021899},
  doi       = {10.1109/TIFS.2020.3021899},
  timestamp = {Tue, 01 Dec 2020 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/journals/tifs/ZhangAFA21.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/ZhangBJXZ21,
  author    = {Hui Zhang and
               Weixin Bian and
               Biao Jie and
               Deqin Xu and
               Jun Zhao},
  title     = {A Complete User Authentication and Key Agreement Scheme Using Cancelable
               Biometrics and {PUF} in Multi-Server Environment},
  journal   = {{IEEE} Trans. Inf. Forensics Secur.},
  volume    = {16},
  pages     = {5413--5428},
  year      = {2021},
  url       = {https://doi.org/10.1109/TIFS.2021.3128826},
  doi       = {10.1109/TIFS.2021.3128826},
  timestamp = {Wed, 15 Dec 2021 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/journals/tifs/ZhangBJXZ21.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/ZhangBS21,
  author    = {Jiexin Zhang and
               Alastair R. Beresford and
               Ian Sheret},
  title     = {Factory Calibration Fingerprinting of Sensors},
  journal   = {{IEEE} Trans. Inf. Forensics Secur.},
  volume    = {16},
  pages     = {1626--1639},
  year      = {2021},
  url       = {https://doi.org/10.1109/TIFS.2020.3039685},
  doi       = {10.1109/TIFS.2020.3039685},
  timestamp = {Thu, 11 Feb 2021 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/journals/tifs/ZhangBS21.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/ZhangCGNLZ21,
  author    = {Zhi Zhang and
               Yueqiang Cheng and
               Yansong Gao and
               Surya Nepal and
               Dongxi Liu and
               Yi Zou},
  title     = {Detecting Hardware-Assisted Virtualization With Inconspicuous Features},
  journal   = {{IEEE} Trans. Inf. Forensics Secur.},
  volume    = {16},
  pages     = {16--27},
  year      = {2021},
  url       = {https://doi.org/10.1109/TIFS.2020.3004264},
  doi       = {10.1109/TIFS.2020.3004264},
  timestamp = {Wed, 26 Aug 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/tifs/ZhangCGNLZ21.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/ZhangCJ21,
  author    = {Jiyan Zhang and
               Ting Cui and
               Chenhui Jin},
  title     = {{ICT:} {A} Cryptanalysis Toolbox for Block Cipher Structure With Secret
               Components},
  journal   = {{IEEE} Trans. Inf. Forensics Secur.},
  volume    = {16},
  pages     = {4482--4493},
  year      = {2021},
  url       = {https://doi.org/10.1109/TIFS.2021.3108435},
  doi       = {10.1109/TIFS.2021.3108435},
  timestamp = {Mon, 20 Sep 2021 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/tifs/ZhangCJ21.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/ZhangCZWL21,
  author    = {Xuxin Zhang and
               Jian Chen and
               Rui Zhang and
               Chen Wang and
               Ling Liu},
  title     = {Attacking Recommender Systems With Plausible Profile},
  journal   = {{IEEE} Trans. Inf. Forensics Secur.},
  volume    = {16},
  pages     = {4788--4800},
  year      = {2021},
  url       = {https://doi.org/10.1109/TIFS.2021.3117078},
  doi       = {10.1109/TIFS.2021.3117078},
  timestamp = {Mon, 18 Jul 2022 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/tifs/ZhangCZWL21.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/ZhangDSAN21,
  author    = {Jiayi Zhang and
               Hongyang Du and
               Qiang Sun and
               Bo Ai and
               Derrick Wing Kwan Ng},
  title     = {Physical Layer Security Enhancement With Reconfigurable Intelligent
               Surface-Aided Networks},
  journal   = {{IEEE} Trans. Inf. Forensics Secur.},
  volume    = {16},
  pages     = {3480--3495},
  year      = {2021},
  url       = {https://doi.org/10.1109/TIFS.2021.3083409},
  doi       = {10.1109/TIFS.2021.3083409},
  timestamp = {Fri, 13 Aug 2021 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/tifs/ZhangDSAN21.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/ZhangHCWGWLNX21,
  author    = {Zhi Zhang and
               Wei He and
               Yueqiang Cheng and
               Wenhao Wang and
               Yansong Gao and
               Minghua Wang and
               Kang Li and
               Surya Nepal and
               Yang Xiang},
  title     = {BitMine: An End-to-End Tool for Detecting Rowhammer Vulnerability},
  journal   = {{IEEE} Trans. Inf. Forensics Secur.},
  volume    = {16},
  pages     = {5167--5181},
  year      = {2021},
  url       = {https://doi.org/10.1109/TIFS.2021.3124728},
  doi       = {10.1109/TIFS.2021.3124728},
  timestamp = {Wed, 15 Dec 2021 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/journals/tifs/ZhangHCWGWLNX21.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/ZhangHWLGZ21,
  author    = {Yin Zhang and
               Zhangqing He and
               Meilin Wan and
               Jiuyang Liu and
               Haoshuang Gu and
               Xuecheng Zou},
  title     = {A {SC} {PUF} Standard Cell Used for Key Generation and Anti-Invasive-Attack
               Protection},
  journal   = {{IEEE} Trans. Inf. Forensics Secur.},
  volume    = {16},
  pages     = {3958--3973},
  year      = {2021},
  url       = {https://doi.org/10.1109/TIFS.2021.3089854},
  doi       = {10.1109/TIFS.2021.3089854},
  timestamp = {Thu, 16 Sep 2021 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/tifs/ZhangHWLGZ21.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/ZhangLCXHZH21,
  author    = {Zhihong Zhang and
               Ruiyang Liang and
               Xu Chen and
               Xuexin Xu and
               Guosheng Hu and
               Wangmeng Zuo and
               Edwin R. Hancock},
  title     = {Semi-Supervised Face Frontalization in the Wild},
  journal   = {{IEEE} Trans. Inf. Forensics Secur.},
  volume    = {16},
  pages     = {909--922},
  year      = {2021},
  url       = {https://doi.org/10.1109/TIFS.2020.3025412},
  doi       = {10.1109/TIFS.2020.3025412},
  timestamp = {Fri, 06 May 2022 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/tifs/ZhangLCXHZH21.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/ZhangLCZ21,
  author    = {Hangjing Zhang and
               Yuejiang Li and
               Yan Chen and
               H. Vicky Zhao},
  title     = {Smart Evolution for Information Diffusion Over Social Networks},
  journal   = {{IEEE} Trans. Inf. Forensics Secur.},
  volume    = {16},
  pages     = {1203--1217},
  year      = {2021},
  url       = {https://doi.org/10.1109/TIFS.2020.3032039},
  doi       = {10.1109/TIFS.2020.3032039},
  timestamp = {Thu, 17 Dec 2020 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/journals/tifs/ZhangLCZ21.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/ZhangLSJ21,
  author    = {Pinchang Zhang and
               Jun Liu and
               Yulong Shen and
               Xiaohong Jiang},
  title     = {Exploiting Channel Gain and Phase Noise for PHY-Layer Authentication
               in Massive {MIMO} Systems},
  journal   = {{IEEE} Trans. Inf. Forensics Secur.},
  volume    = {16},
  pages     = {4265--4279},
  year      = {2021},
  url       = {https://doi.org/10.1109/TIFS.2020.3029894},
  doi       = {10.1109/TIFS.2020.3029894},
  timestamp = {Mon, 20 Sep 2021 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/tifs/ZhangLSJ21.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/ZhangLWW21,
  author    = {Jindan Zhang and
               Rongxing Lu and
               Baocang Wang and
               Xu An Wang},
  title     = {Comments on "Privacy-Preserving Public Auditing Protocol for Regenerating-Code-Based
               Cloud Storage"},
  journal   = {{IEEE} Trans. Inf. Forensics Secur.},
  volume    = {16},
  pages     = {1288--1289},
  year      = {2021},
  url       = {https://doi.org/10.1109/TIFS.2020.3032283},
  doi       = {10.1109/TIFS.2020.3032283},
  timestamp = {Thu, 31 Dec 2020 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/journals/tifs/ZhangLWW21.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/ZhangLYLCZW21,
  author    = {Jiayu Zhang and
               Min Li and
               Shihao Yan and
               Chunshan Liu and
               Xihan Chen and
               Min{-}Jian Zhao and
               Philip Whiting},
  title     = {Joint Beam Training and Data Transmission Design for Covert Millimeter-Wave
               Communication},
  journal   = {{IEEE} Trans. Inf. Forensics Secur.},
  volume    = {16},
  pages     = {2232--2245},
  year      = {2021},
  url       = {https://doi.org/10.1109/TIFS.2021.3050070},
  doi       = {10.1109/TIFS.2021.3050070},
  timestamp = {Thu, 23 Jun 2022 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/tifs/ZhangLYLCZW21.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/ZhangWLW21,
  author    = {Yunfan Zhang and
               Lingfeng Wang and
               Zhaoxi Liu and
               Wei Wei},
  title     = {A Cyber-Insurance Scheme for Water Distribution Systems Considering
               Malicious Cyberattacks},
  journal   = {{IEEE} Trans. Inf. Forensics Secur.},
  volume    = {16},
  pages     = {1855--1867},
  year      = {2021},
  url       = {https://doi.org/10.1109/TIFS.2020.3045902},
  doi       = {10.1109/TIFS.2020.3045902},
  timestamp = {Mon, 04 Oct 2021 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/tifs/ZhangWLW21.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/ZhangWSVMC21,
  author    = {Junqing Zhang and
               Roger F. Woods and
               Magnus Sandell and
               Mikko Valkama and
               Alan Marshall and
               Joseph R. Cavallaro},
  title     = {Radio Frequency Fingerprint Identification for Narrowband Systems,
               Modelling and Classification},
  journal   = {{IEEE} Trans. Inf. Forensics Secur.},
  volume    = {16},
  pages     = {3974--3987},
  year      = {2021},
  url       = {https://doi.org/10.1109/TIFS.2021.3088008},
  doi       = {10.1109/TIFS.2021.3088008},
  timestamp = {Wed, 16 Mar 2022 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/journals/tifs/ZhangWSVMC21.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/ZhangYCLF21,
  author    = {Yicheng Zhang and
               Rozhin Yasaei and
               Hao Chen and
               Zhou Li and
               Mohammad Abdullah Al Faruque},
  title     = {Stealing Neural Network Structure Through Remote {FPGA} Side-Channel
               Analysis},
  journal   = {{IEEE} Trans. Inf. Forensics Secur.},
  volume    = {16},
  pages     = {4377--4388},
  year      = {2021},
  url       = {https://doi.org/10.1109/TIFS.2021.3106169},
  doi       = {10.1109/TIFS.2021.3106169},
  timestamp = {Mon, 20 Sep 2021 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/tifs/ZhangYCLF21.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/ZhangZCXL21,
  author    = {Jing Zhang and
               Hong Zhong and
               Jie Cui and
               Yan Xu and
               Lu Liu},
  title     = {{SMAKA:} Secure Many-to-Many Authentication and Key Agreement Scheme
               for Vehicular Networks},
  journal   = {{IEEE} Trans. Inf. Forensics Secur.},
  volume    = {16},
  pages     = {1810--1824},
  year      = {2021},
  url       = {https://doi.org/10.1109/TIFS.2020.3044855},
  doi       = {10.1109/TIFS.2020.3044855},
  timestamp = {Sun, 25 Jul 2021 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/tifs/ZhangZCXL21.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/ZhaoLLLRBLH21,
  author    = {Shuai Zhao and
               Fenghua Li and
               Hongwei Li and
               Rongxing Lu and
               Siqi Ren and
               Haiyong Bao and
               Jianhong Lin and
               Song Han},
  title     = {Smart and Practical Privacy-Preserving Data Aggregation for Fog-Based
               Smart Grids},
  journal   = {{IEEE} Trans. Inf. Forensics Secur.},
  volume    = {16},
  pages     = {521--536},
  year      = {2021},
  url       = {https://doi.org/10.1109/TIFS.2020.3014487},
  doi       = {10.1109/TIFS.2020.3014487},
  timestamp = {Wed, 15 Dec 2021 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/journals/tifs/ZhaoLLLRBLH21.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/ZhaoLSJS21,
  author    = {Shuangrui Zhao and
               Jia Liu and
               Yulong Shen and
               Xiaohong Jiang and
               Norio Shiratori},
  title     = {Secure and Energy-Efficient Precoding for {MIMO} Two-Way Untrusted
               Relay Systems},
  journal   = {{IEEE} Trans. Inf. Forensics Secur.},
  volume    = {16},
  pages     = {3371--3386},
  year      = {2021},
  url       = {https://doi.org/10.1109/TIFS.2021.3080088},
  doi       = {10.1109/TIFS.2021.3080088},
  timestamp = {Wed, 18 Aug 2021 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/tifs/ZhaoLSJS21.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/ZhaoRYHZY21,
  author    = {Fangyuan Zhao and
               Xuebin Ren and
               Shusen Yang and
               Qing Han and
               Peng Zhao and
               Xinyu Yang},
  title     = {Latent Dirichlet Allocation Model Training With Differential Privacy},
  journal   = {{IEEE} Trans. Inf. Forensics Secur.},
  volume    = {16},
  pages     = {1290--1305},
  year      = {2021},
  url       = {https://doi.org/10.1109/TIFS.2020.3032021},
  doi       = {10.1109/TIFS.2020.3032021},
  timestamp = {Thu, 17 Dec 2020 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/journals/tifs/ZhaoRYHZY21.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/ZhengLSZZ21,
  author    = {Linlin Zheng and
               Jiakang Li and
               Meng Sun and
               Xiongwei Zhang and
               Thomas Fang Zheng},
  title     = {When Automatic Voice Disguise Meets Automatic Speaker Verification},
  journal   = {{IEEE} Trans. Inf. Forensics Secur.},
  volume    = {16},
  pages     = {824--837},
  year      = {2021},
  url       = {https://doi.org/10.1109/TIFS.2020.3023818},
  doi       = {10.1109/TIFS.2020.3023818},
  timestamp = {Tue, 01 Dec 2020 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/journals/tifs/ZhengLSZZ21.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/ZhengLZDL21,
  author    = {Tong{-}Xing Zheng and
               Hao{-}Wen Liu and
               Ning Zhang and
               Zhiguo Ding and
               Victor C. M. Leung},
  title     = {Secure Content Delivery in Two-Tier Cache-Enabled mmWave Heterogeneous
               Networks},
  journal   = {{IEEE} Trans. Inf. Forensics Secur.},
  volume    = {16},
  pages     = {1640--1654},
  year      = {2021},
  url       = {https://doi.org/10.1109/TIFS.2020.3040877},
  doi       = {10.1109/TIFS.2020.3040877},
  timestamp = {Thu, 11 Feb 2021 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/journals/tifs/ZhengLZDL21.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/ZhongD21,
  author    = {Yaoyao Zhong and
               Weihong Deng},
  title     = {Towards Transferable Adversarial Attack Against Deep Face Recognition},
  journal   = {{IEEE} Trans. Inf. Forensics Secur.},
  volume    = {16},
  pages     = {1452--1466},
  year      = {2021},
  url       = {https://doi.org/10.1109/TIFS.2020.3036801},
  doi       = {10.1109/TIFS.2020.3036801},
  timestamp = {Thu, 11 Feb 2021 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/journals/tifs/ZhongD21.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/ZhouC21,
  author    = {Lin Zhou and
               Daming Cao},
  title     = {Privacy-Utility Tradeoff for Hypothesis Testing Over a Noisy Channel},
  journal   = {{IEEE} Trans. Inf. Forensics Secur.},
  volume    = {16},
  pages     = {4078--4091},
  year      = {2021},
  url       = {https://doi.org/10.1109/TIFS.2021.3087357},
  doi       = {10.1109/TIFS.2021.3087357},
  timestamp = {Wed, 01 Sep 2021 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/tifs/ZhouC21.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/ZhouCY21,
  author    = {Yuyang Zhou and
               Guang Cheng and
               Shui Yu},
  title     = {An SDN-Enabled Proactive Defense Framework for DDoS Mitigation in
               IoT Networks},
  journal   = {{IEEE} Trans. Inf. Forensics Secur.},
  volume    = {16},
  pages     = {5366--5380},
  year      = {2021},
  url       = {https://doi.org/10.1109/TIFS.2021.3127009},
  doi       = {10.1109/TIFS.2021.3127009},
  timestamp = {Wed, 15 Dec 2021 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/journals/tifs/ZhouCY21.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/ZhouLGLLL21,
  author    = {Lifang Zhou and
               Jun Luo and
               Xinbo Gao and
               Weisheng Li and
               Bangjun Lei and
               Jiaxu Leng},
  title     = {Selective Domain-Invariant Feature Alignment Network for Face Anti-Spoofing},
  journal   = {{IEEE} Trans. Inf. Forensics Secur.},
  volume    = {16},
  pages     = {5352--5365},
  year      = {2021},
  url       = {https://doi.org/10.1109/TIFS.2021.3125603},
  doi       = {10.1109/TIFS.2021.3125603},
  timestamp = {Wed, 15 Dec 2021 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/journals/tifs/ZhouLGLLL21.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/ZhouP21,
  author    = {Jizhe Zhou and
               Chi{-}Man Pun},
  title     = {Personal Privacy Protection via Irrelevant Faces Tracking and Pixelation
               in Video Live Streaming},
  journal   = {{IEEE} Trans. Inf. Forensics Secur.},
  volume    = {16},
  pages     = {1088--1103},
  year      = {2021},
  url       = {https://doi.org/10.1109/TIFS.2020.3029913},
  doi       = {10.1109/TIFS.2020.3029913},
  timestamp = {Tue, 01 Dec 2020 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/journals/tifs/ZhouP21.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/ZhouVOS21,
  author    = {Linghui Zhou and
               Minh Thanh Vu and
               Tobias J. Oechtering and
               Mikael Skoglund},
  title     = {Privacy-Preserving Identification Systems With Noisy Enrollment},
  journal   = {{IEEE} Trans. Inf. Forensics Secur.},
  volume    = {16},
  pages     = {3510--3523},
  year      = {2021},
  url       = {https://doi.org/10.1109/TIFS.2021.3078297},
  doi       = {10.1109/TIFS.2021.3078297},
  timestamp = {Fri, 13 Aug 2021 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/tifs/ZhouVOS21.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/ZhouZ21,
  author    = {Jingbo Zhou and
               Xinmiao Zhang},
  title     = {Generalized SAT-Attack-Resistant Logic Locking},
  journal   = {{IEEE} Trans. Inf. Forensics Secur.},
  volume    = {16},
  pages     = {2581--2592},
  year      = {2021},
  url       = {https://doi.org/10.1109/TIFS.2021.3059271},
  doi       = {10.1109/TIFS.2021.3059271},
  timestamp = {Wed, 07 Apr 2021 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/tifs/ZhouZ21.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/ZhuCWW21,
  author    = {Qiang Zhu and
               Mingliang Chen and
               Chau{-}Wai Wong and
               Min Wu},
  title     = {Adaptive Multi-Trace Carving for Robust Frequency Tracking in Forensic
               Applications},
  journal   = {{IEEE} Trans. Inf. Forensics Secur.},
  volume    = {16},
  pages     = {1174--1189},
  year      = {2021},
  url       = {https://doi.org/10.1109/TIFS.2020.3030182},
  doi       = {10.1109/TIFS.2020.3030182},
  timestamp = {Thu, 31 Dec 2020 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/journals/tifs/ZhuCWW21.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/ZhuFLLCC21,
  author    = {Tiantian Zhu and
               Lei Fu and
               Qiang Liu and
               Zi Lin and
               Yan Chen and
               Tieming Chen},
  title     = {One Cycle Attack: Fool Sensor-Based Personal Gait Authentication With
               Clustering},
  journal   = {{IEEE} Trans. Inf. Forensics Secur.},
  volume    = {16},
  pages     = {553--568},
  year      = {2021},
  url       = {https://doi.org/10.1109/TIFS.2020.3016819},
  doi       = {10.1109/TIFS.2020.3016819},
  timestamp = {Tue, 06 Oct 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/tifs/ZhuFLLCC21.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/ZhuWRXYLCLC21,
  author    = {Tiantian Zhu and
               Jiayu Wang and
               Linqi Ruan and
               Chunlin Xiong and
               Jinkai Yu and
               Yaosheng Li and
               Yan Chen and
               Mingqi Lv and
               Tieming Chen},
  title     = {General, Efficient, and Real-Time Data Compaction Strategy for {APT}
               Forensic Analysis},
  journal   = {{IEEE} Trans. Inf. Forensics Secur.},
  volume    = {16},
  pages     = {3312--3325},
  year      = {2021},
  url       = {https://doi.org/10.1109/TIFS.2021.3076288},
  doi       = {10.1109/TIFS.2021.3076288},
  timestamp = {Wed, 15 Dec 2021 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/journals/tifs/ZhuWRXYLCLC21.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/ZhuangLTLH21,
  author    = {Peiyu Zhuang and
               Haodong Li and
               Shunquan Tan and
               Bin Li and
               Jiwu Huang},
  title     = {Image Tampering Localization Using a Dense Fully Convolutional Network},
  journal   = {{IEEE} Trans. Inf. Forensics Secur.},
  volume    = {16},
  pages     = {2986--2999},
  year      = {2021},
  url       = {https://doi.org/10.1109/TIFS.2021.3070444},
  doi       = {10.1109/TIFS.2021.3070444},
  timestamp = {Sun, 16 May 2021 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/tifs/ZhuangLTLH21.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/ZivariFardBN21,
  author    = {Hassan ZivariFard and
               Matthieu R. Bloch and
               Aria Nosratinia},
  title     = {Two-Multicast Channel With Confidential Messages},
  journal   = {{IEEE} Trans. Inf. Forensics Secur.},
  volume    = {16},
  pages     = {2743--2758},
  year      = {2021},
  url       = {https://doi.org/10.1109/TIFS.2021.3055031},
  doi       = {10.1109/TIFS.2021.3055031},
  timestamp = {Sun, 16 May 2021 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/tifs/ZivariFardBN21.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/hammeAPJ21,
  author    = {Tim Van hamme and
               Enrique Argones{-}R{\'{u}}a and
               Davy Preuveneers and
               Wouter Joosen},
  title     = {On the Security of Biometrics and Fuzzy Commitment Cryptosystems:
               {A} Study on Gait Authentication},
  journal   = {{IEEE} Trans. Inf. Forensics Secur.},
  volume    = {16},
  pages     = {5211--5224},
  year      = {2021},
  url       = {https://doi.org/10.1109/TIFS.2021.3124735},
  doi       = {10.1109/TIFS.2021.3124735},
  timestamp = {Wed, 15 Dec 2021 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/journals/tifs/hammeAPJ21.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/000120,
  author    = {Hailong Zhang},
  title     = {On the Exact Relationship Between the Success Rate of Template Attack
               and Different Parameters},
  journal   = {{IEEE} Trans. Inf. Forensics Secur.},
  volume    = {15},
  pages     = {681--694},
  year      = {2020},
  url       = {https://doi.org/10.1109/TIFS.2019.2928506},
  doi       = {10.1109/TIFS.2019.2928506},
  timestamp = {Thu, 06 Aug 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/tifs/000120.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/0001NT020,
  author    = {Kai Cao and
               Dinh{-}Luan Nguyen and
               Cori Tymoszek and
               Anil K. Jain},
  title     = {End-to-End Latent Fingerprint Search},
  journal   = {{IEEE} Trans. Inf. Forensics Secur.},
  volume    = {15},
  pages     = {880--894},
  year      = {2020},
  url       = {https://doi.org/10.1109/TIFS.2019.2930487},
  doi       = {10.1109/TIFS.2019.2930487},
  timestamp = {Thu, 06 Aug 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/tifs/0001NT020.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/0001SMS020,
  author    = {Dan Lin and
               Douglas Steiert and
               Joshua Morris and
               Anna Cinzia Squicciarini and
               Jianping Fan},
  title     = {{REMIND:} Risk Estimation Mechanism for Images in Network Distribution},
  journal   = {{IEEE} Trans. Inf. Forensics Secur.},
  volume    = {15},
  pages     = {539--552},
  year      = {2020},
  url       = {https://doi.org/10.1109/TIFS.2019.2924853},
  doi       = {10.1109/TIFS.2019.2924853},
  timestamp = {Thu, 06 Aug 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/tifs/0001SMS020.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/0002LWW0N0020,
  author    = {Xiao Chen and
               Chaoran Li and
               Derui Wang and
               Sheng Wen and
               Jun Zhang and
               Surya Nepal and
               Yang Xiang and
               Kui Ren},
  title     = {Android {HIV:} {A} Study of Repackaging Malware for Evading Machine-Learning
               Detection},
  journal   = {{IEEE} Trans. Inf. Forensics Secur.},
  volume    = {15},
  pages     = {987--1001},
  year      = {2020},
  url       = {https://doi.org/10.1109/TIFS.2019.2932228},
  doi       = {10.1109/TIFS.2019.2932228},
  timestamp = {Sat, 05 Sep 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/tifs/0002LWW0N0020.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/0003FLB20,
  author    = {Na Wang and
               Junsong Fu and
               Jian Li and
               Bharat K. Bhargava},
  title     = {Source-Location Privacy Protection Based on Anonymity Cloud in Wireless
               Sensor Networks},
  journal   = {{IEEE} Trans. Inf. Forensics Secur.},
  volume    = {15},
  pages     = {100--114},
  year      = {2020},
  url       = {https://doi.org/10.1109/TIFS.2019.2919388},
  doi       = {10.1109/TIFS.2019.2919388},
  timestamp = {Thu, 06 Aug 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/tifs/0003FLB20.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/0004F0LZX20,
  author    = {Xin Yuan and
               Zhiyong Feng and
               Wei Ni and
               Ren Ping Liu and
               J. Andrew Zhang and
               Wenjun Xu},
  title     = {Secrecy Performance of Terrestrial Radio Links Under Collaborative
               Aerial Eavesdropping},
  journal   = {{IEEE} Trans. Inf. Forensics Secur.},
  volume    = {15},
  pages     = {604--619},
  year      = {2020},
  url       = {https://doi.org/10.1109/TIFS.2019.2922353},
  doi       = {10.1109/TIFS.2019.2922353},
  timestamp = {Thu, 15 Apr 2021 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/tifs/0004F0LZX20.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/0004T20,
  author    = {Meng Sun and
               Wee Peng Tay},
  title     = {Decentralized Detection With Robust Information Privacy Protection},
  journal   = {{IEEE} Trans. Inf. Forensics Secur.},
  volume    = {15},
  pages     = {85--99},
  year      = {2020},
  url       = {https://doi.org/10.1109/TIFS.2019.2916650},
  doi       = {10.1109/TIFS.2019.2916650},
  timestamp = {Thu, 06 Aug 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/tifs/0004T20.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/0004T20a,
  author    = {Meng Sun and
               Wee Peng Tay},
  title     = {On the Relationship Between Inference and Data Privacy in Decentralized
               IoT Networks},
  journal   = {{IEEE} Trans. Inf. Forensics Secur.},
  volume    = {15},
  pages     = {852--866},
  year      = {2020},
  url       = {https://doi.org/10.1109/TIFS.2019.2929446},
  doi       = {10.1109/TIFS.2019.2929446},
  timestamp = {Thu, 06 Aug 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/tifs/0004T20a.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/0017LL20,
  author    = {Qiang Li and
               Chao Li and
               Jingran Lin},
  title     = {Constant Modulus Secure Beamforming for Multicast Massive {MIMO} Wiretap
               Channels},
  journal   = {{IEEE} Trans. Inf. Forensics Secur.},
  volume    = {15},
  pages     = {264--275},
  year      = {2020},
  url       = {https://doi.org/10.1109/TIFS.2019.2916687},
  doi       = {10.1109/TIFS.2019.2916687},
  timestamp = {Thu, 06 Aug 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/tifs/0017LL20.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/AbdullahiWL20,
  author    = {Sani M. Abdullahi and
               Hongxia Wang and
               Tao Li},
  title     = {Fractal Coding-Based Robust and Alignment-Free Fingerprint Image Hashing},
  journal   = {{IEEE} Trans. Inf. Forensics Secur.},
  volume    = {15},
  pages     = {2587--2601},
  year      = {2020},
  url       = {https://doi.org/10.1109/TIFS.2020.2971142},
  doi       = {10.1109/TIFS.2020.2971142},
  timestamp = {Fri, 28 Aug 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/tifs/AbdullahiWL20.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/AbhishekTLS20,
  author    = {Nalam Venkata Abhishek and
               Anshoo Tandon and
               Teng Joon Lim and
               Biplab Sikdar},
  title     = {A GLRT-Based Mechanism for Detecting Relay Misbehavior in Clustered
               IoT Networks},
  journal   = {{IEEE} Trans. Inf. Forensics Secur.},
  volume    = {15},
  pages     = {435--446},
  year      = {2020},
  url       = {https://doi.org/10.1109/TIFS.2019.2922262},
  doi       = {10.1109/TIFS.2019.2922262},
  timestamp = {Thu, 06 Aug 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/tifs/AbhishekTLS20.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/AdakCLB20,
  author    = {Chandranath Adak and
               Bidyut B. Chaudhuri and
               Chin{-}Teng Lin and
               Michael Blumenstein},
  title     = {Intra-Variable Handwriting Inspection Reinforced With Idiosyncrasy
               Analysis},
  journal   = {{IEEE} Trans. Inf. Forensics Secur.},
  volume    = {15},
  pages     = {3567--3579},
  year      = {2020},
  url       = {https://doi.org/10.1109/TIFS.2020.2991833},
  doi       = {10.1109/TIFS.2020.2991833},
  timestamp = {Thu, 06 Aug 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/tifs/AdakCLB20.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/AddessoCMM20,
  author    = {Paolo Addesso and
               Michele Cirillo and
               Mario Di Mauro and
               Vincenzo Matta},
  title     = {ADVoIP: Adversarial Detection of Encrypted and Concealed VoIP},
  journal   = {{IEEE} Trans. Inf. Forensics Secur.},
  volume    = {15},
  pages     = {943--958},
  year      = {2020},
  url       = {https://doi.org/10.1109/TIFS.2019.2922398},
  doi       = {10.1109/TIFS.2019.2922398},
  timestamp = {Thu, 06 Aug 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/tifs/AddessoCMM20.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/AghaieM20,
  author    = {Anita Aghaie and
               Amir Moradi},
  title     = {{TI-PUF:} Toward Side-Channel Resistant Physical Unclonable Functions},
  journal   = {{IEEE} Trans. Inf. Forensics Secur.},
  volume    = {15},
  pages     = {3470--3481},
  year      = {2020},
  url       = {https://doi.org/10.1109/TIFS.2020.2986887},
  doi       = {10.1109/TIFS.2020.2986887},
  timestamp = {Mon, 26 Oct 2020 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/journals/tifs/AghaieM20.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/AhmadC020,
  author    = {Fawad Ahmad and
               Lee{-}Ming Cheng and
               Asif Khan},
  title     = {Lightweight and Privacy-Preserving Template Generation for Palm-Vein-Based
               Human Recognition},
  journal   = {{IEEE} Trans. Inf. Forensics Secur.},
  volume    = {15},
  pages     = {184--194},
  year      = {2020},
  url       = {https://doi.org/10.1109/TIFS.2019.2917156},
  doi       = {10.1109/TIFS.2019.2917156},
  timestamp = {Thu, 06 Aug 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/tifs/AhmadC020.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/Al-KadiMTC20,
  author    = {Osama Al{-}Kadi and
               Nour Moustafa and
               Benjamin P. Turnbull and
               Kim{-}Kwang Raymond Choo},
  title     = {An Ontological Graph Identification Method for Improving Localization
               of {IP} Prefix Hijacking in Network Systems},
  journal   = {{IEEE} Trans. Inf. Forensics Secur.},
  volume    = {15},
  pages     = {1164--1174},
  year      = {2020},
  url       = {https://doi.org/10.1109/TIFS.2019.2936975},
  doi       = {10.1109/TIFS.2019.2936975},
  timestamp = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/tifs/Al-KadiMTC20.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/AlageliIAACC20,
  author    = {Mahmoud Alageli and
               A{\"{\i}}ssa Ikhlef and
               Fahad Alsifiany and
               Mohammed A. M. Abdullah and
               Gaojie Chen and
               Jonathon A. Chambers},
  title     = {Optimal Downlink Transmission for Cell-Free {SWIPT} Massive {MIMO}
               Systems With Active Eavesdropping},
  journal   = {{IEEE} Trans. Inf. Forensics Secur.},
  volume    = {15},
  pages     = {1983--1998},
  year      = {2020},
  url       = {https://doi.org/10.1109/TIFS.2019.2954748},
  doi       = {10.1109/TIFS.2019.2954748},
  timestamp = {Thu, 06 Aug 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/tifs/AlageliIAACC20.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/AldaghriM20,
  author    = {Nasser Aldaghri and
               Hessam Mahdavifar},
  title     = {Physical Layer Secret Key Generation in Static Environments},
  journal   = {{IEEE} Trans. Inf. Forensics Secur.},
  volume    = {15},
  pages     = {2692--2705},
  year      = {2020},
  url       = {https://doi.org/10.1109/TIFS.2020.2974621},
  doi       = {10.1109/TIFS.2020.2974621},
  timestamp = {Thu, 06 Aug 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/tifs/AldaghriM20.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/AlhanahnahYBZTS20,
  author    = {Mohannad Alhanahnah and
               Qiben Yan and
               Hamid Bagheri and
               Hao Zhou and
               Yutaka Tsutano and
               Witawas Srisa{-}an and
               Xiapu Luo},
  title     = {{DINA:} Detecting Hidden Android Inter-App Communication in Dynamic
               Loaded Code},
  journal   = {{IEEE} Trans. Inf. Forensics Secur.},
  volume    = {15},
  pages     = {2782--2797},
  year      = {2020},
  url       = {https://doi.org/10.1109/TIFS.2020.2976556},
  doi       = {10.1109/TIFS.2020.2976556},
  timestamp = {Thu, 06 Aug 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/tifs/AlhanahnahYBZTS20.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/AliasgariSK20,
  author    = {Malihe Aliasgari and
               Osvaldo Simeone and
               J{\"{o}}rg Kliewer},
  title     = {Private and Secure Distributed Matrix Multiplication With Flexible
               Communication Load},
  journal   = {{IEEE} Trans. Inf. Forensics Secur.},
  volume    = {15},
  pages     = {2722--2734},
  year      = {2020},
  url       = {https://doi.org/10.1109/TIFS.2020.2972166},
  doi       = {10.1109/TIFS.2020.2972166},
  timestamp = {Thu, 06 Aug 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/tifs/AliasgariSK20.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/Alipour-FanidDW20,
  author    = {Amir Alipour{-}Fanid and
               Monireh Dabaghchian and
               Ning Wang and
               Pu Wang and
               Liang Zhao and
               Kai Zeng},
  title     = {Machine Learning-Based Delay-Aware {UAV} Detection and Operation Mode
               Identification Over Encrypted Wi-Fi Traffic},
  journal   = {{IEEE} Trans. Inf. Forensics Secur.},
  volume    = {15},
  pages     = {2346--2360},
  year      = {2020},
  url       = {https://doi.org/10.1109/TIFS.2019.2959899},
  doi       = {10.1109/TIFS.2019.2959899},
  timestamp = {Mon, 26 Oct 2020 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/journals/tifs/Alipour-FanidDW20.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/AlmohriW020,
  author    = {Hussain M. J. Almohri and
               Layne T. Watson and
               David Evans},
  title     = {Predictability of {IP} Address Allocations for Cloud Computing Platforms},
  journal   = {{IEEE} Trans. Inf. Forensics Secur.},
  volume    = {15},
  pages     = {500--511},
  year      = {2020},
  url       = {https://doi.org/10.1109/TIFS.2019.2924555},
  doi       = {10.1109/TIFS.2019.2924555},
  timestamp = {Thu, 06 Aug 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/tifs/AlmohriW020.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/AlmohriWE20,
  author    = {Hussain M. J. Almohri and
               Layne T. Watson and
               David Evans},
  title     = {An Attack-Resilient Architecture for the Internet of Things},
  journal   = {{IEEE} Trans. Inf. Forensics Secur.},
  volume    = {15},
  pages     = {3940--3954},
  year      = {2020},
  url       = {https://doi.org/10.1109/TIFS.2020.2994777},
  doi       = {10.1109/TIFS.2020.2994777},
  timestamp = {Thu, 06 Aug 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/tifs/AlmohriWE20.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/AlrabaeeDW20,
  author    = {Saed Alrabaee and
               Mourad Debbabi and
               Lingyu Wang},
  title     = {{CPA:} Accurate Cross-Platform Binary Authorship Characterization
               Using {LDA}},
  journal   = {{IEEE} Trans. Inf. Forensics Secur.},
  volume    = {15},
  pages     = {3051--3066},
  year      = {2020},
  url       = {https://doi.org/10.1109/TIFS.2020.2980190},
  doi       = {10.1109/TIFS.2020.2980190},
  timestamp = {Thu, 06 Aug 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/tifs/AlrabaeeDW20.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/AltinisikTS20,
  author    = {Enes Altinisik and
               Kasim Tasdemir and
               Husrev Taha Sencar},
  title     = {Mitigation of {H.264} and {H.265} Video Compression for Reliable {PRNU}
               Estimation},
  journal   = {{IEEE} Trans. Inf. Forensics Secur.},
  volume    = {15},
  pages     = {1557--1571},
  year      = {2020},
  url       = {https://doi.org/10.1109/TIFS.2019.2945190},
  doi       = {10.1109/TIFS.2019.2945190},
  timestamp = {Mon, 20 Sep 2021 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/tifs/AltinisikTS20.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/AmeliHEY20,
  author    = {Amir Ameli and
               Ali Hooshyar and
               Ehab F. El{-}Saadany and
               Amr M. Youssef},
  title     = {An Intrusion Detection Method for Line Current Differential Relays},
  journal   = {{IEEE} Trans. Inf. Forensics Secur.},
  volume    = {15},
  pages     = {329--344},
  year      = {2020},
  url       = {https://doi.org/10.1109/TIFS.2019.2916331},
  doi       = {10.1109/TIFS.2019.2916331},
  timestamp = {Thu, 06 Aug 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/tifs/AmeliHEY20.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/AmeliSKES20,
  author    = {Amir Ameli and
               Khaled A. Saleh and
               Aram Kirakosyan and
               Ehab F. El{-}Saadany and
               Magdy M. A. Salama},
  title     = {An Intrusion Detection Method for Line Current Differential Relays
               in Medium-Voltage {DC} Microgrids},
  journal   = {{IEEE} Trans. Inf. Forensics Secur.},
  volume    = {15},
  pages     = {3580--3594},
  year      = {2020},
  url       = {https://doi.org/10.1109/TIFS.2020.2991892},
  doi       = {10.1109/TIFS.2020.2991892},
  timestamp = {Thu, 06 Aug 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/tifs/AmeliSKES20.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/ArafaSVP20,
  author    = {Ahmed Arafa and
               Wonjae Shin and
               Mojtaba Vaezi and
               H. Vincent Poor},
  title     = {Secure Relaying in Non-Orthogonal Multiple Access: Trusted and Untrusted
               Scenarios},
  journal   = {{IEEE} Trans. Inf. Forensics Secur.},
  volume    = {15},
  pages     = {210--222},
  year      = {2020},
  url       = {https://doi.org/10.1109/TIFS.2019.2911162},
  doi       = {10.1109/TIFS.2019.2911162},
  timestamp = {Tue, 11 May 2021 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/tifs/ArafaSVP20.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/AroraPC20,
  author    = {Anshul Arora and
               Sateesh Kumar Peddoju and
               Mauro Conti},
  title     = {PermPair: Android Malware Detection Using Permission Pairs},
  journal   = {{IEEE} Trans. Inf. Forensics Secur.},
  volume    = {15},
  pages     = {1968--1982},
  year      = {2020},
  url       = {https://doi.org/10.1109/TIFS.2019.2950134},
  doi       = {10.1109/TIFS.2019.2950134},
  timestamp = {Thu, 06 Aug 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/tifs/AroraPC20.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/AvvaruZP20,
  author    = {S. V. Sandeep Avvaru and
               Ziqing Zeng and
               Keshab K. Parhi},
  title     = {Homogeneous and Heterogeneous Feed-Forward {XOR} Physical Unclonable
               Functions},
  journal   = {{IEEE} Trans. Inf. Forensics Secur.},
  volume    = {15},
  pages     = {2485--2498},
  year      = {2020},
  url       = {https://doi.org/10.1109/TIFS.2020.2968113},
  doi       = {10.1109/TIFS.2020.2968113},
  timestamp = {Thu, 06 Aug 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/tifs/AvvaruZP20.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/BacisVFPRS20,
  author    = {Enrico Bacis and
               Sabrina De Capitani di Vimercati and
               Sara Foresti and
               Stefano Paraboschi and
               Marco Rosa and
               Pierangela Samarati},
  title     = {Securing Resources in Decentralized Cloud Storage},
  journal   = {{IEEE} Trans. Inf. Forensics Secur.},
  volume    = {15},
  pages     = {286--298},
  year      = {2020},
  url       = {https://doi.org/10.1109/TIFS.2019.2916673},
  doi       = {10.1109/TIFS.2019.2916673},
  timestamp = {Thu, 06 Aug 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/tifs/BacisVFPRS20.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/BagHSR20,
  author    = {Samiran Bag and
               Feng Hao and
               Siamak F. Shahandashti and
               Indranil Ghosh Ray},
  title     = {{SEAL:} Sealed-Bid Auction Without Auctioneers},
  journal   = {{IEEE} Trans. Inf. Forensics Secur.},
  volume    = {15},
  pages     = {2042--2052},
  year      = {2020},
  url       = {https://doi.org/10.1109/TIFS.2019.2955793},
  doi       = {10.1109/TIFS.2019.2955793},
  timestamp = {Mon, 12 Apr 2021 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/tifs/BagHSR20.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/BagheriS20,
  author    = {Sima Bagheri and
               Alireza Shameli Sendi},
  title     = {Dynamic Firewall Decomposition and Composition in the Cloud},
  journal   = {{IEEE} Trans. Inf. Forensics Secur.},
  volume    = {15},
  pages     = {3526--3539},
  year      = {2020},
  url       = {https://doi.org/10.1109/TIFS.2020.2990786},
  doi       = {10.1109/TIFS.2020.2990786},
  timestamp = {Thu, 06 Aug 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/tifs/BagheriS20.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/BajardMSZ20,
  author    = {Jean{-}Claude Bajard and
               Paulo Martins and
               Leonel Sousa and
               Vincent Zucca},
  title     = {Improving the Efficiency of {SVM} Classification With {FHE}},
  journal   = {{IEEE} Trans. Inf. Forensics Secur.},
  volume    = {15},
  pages     = {1709--1722},
  year      = {2020},
  url       = {https://doi.org/10.1109/TIFS.2019.2946097},
  doi       = {10.1109/TIFS.2019.2946097},
  timestamp = {Mon, 20 Sep 2021 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/tifs/BajardMSZ20.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/BalakrishnanGBW20,
  author    = {Sarankumar Balakrishnan and
               Shreya Gupta and
               Arupjyoti Bhuyan and
               Pu Wang and
               Dimitrios Koutsonikolas and
               Zhi Sun},
  title     = {Physical Layer Identification Based on Spatial-Temporal Beam Features
               for Millimeter-Wave Wireless Networks},
  journal   = {{IEEE} Trans. Inf. Forensics Secur.},
  volume    = {15},
  pages     = {1831--1845},
  year      = {2020},
  url       = {https://doi.org/10.1109/TIFS.2019.2948283},
  doi       = {10.1109/TIFS.2019.2948283},
  timestamp = {Thu, 06 Aug 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/tifs/BalakrishnanGBW20.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/BasuHGK20,
  author    = {Kanad Basu and
               Suha Sabi Hussain and
               Ujjwal Gupta and
               Ramesh Karri},
  title     = {{COPPTCHA:} {COPPA} Tracking by Checking Hardware-Level Activity},
  journal   = {{IEEE} Trans. Inf. Forensics Secur.},
  volume    = {15},
  pages     = {3213--3226},
  year      = {2020},
  url       = {https://doi.org/10.1109/TIFS.2020.2983287},
  doi       = {10.1109/TIFS.2020.2983287},
  timestamp = {Thu, 06 Aug 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/tifs/BasuHGK20.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/BasuKKK20,
  author    = {Kanad Basu and
               Prashanth Krishnamurthy and
               Farshad Khorrami and
               Ramesh Karri},
  title     = {A Theoretical Study of Hardware Performance Counters-Based Malware
               Detection},
  journal   = {{IEEE} Trans. Inf. Forensics Secur.},
  volume    = {15},
  pages     = {512--525},
  year      = {2020},
  url       = {https://doi.org/10.1109/TIFS.2019.2924549},
  doi       = {10.1109/TIFS.2019.2924549},
  timestamp = {Thu, 06 Aug 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/tifs/BasuKKK20.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/BaurBSP20,
  author    = {Sebastian Baur and
               Holger Boche and
               Rafael F. Schaefer and
               H. Vincent Poor},
  title     = {Secure Storage Capacity Under Rate Constraints - Continuity and Super
               Activation},
  journal   = {{IEEE} Trans. Inf. Forensics Secur.},
  volume    = {15},
  pages     = {959--970},
  year      = {2020},
  url       = {https://doi.org/10.1109/TIFS.2019.2929945},
  doi       = {10.1109/TIFS.2019.2929945},
  timestamp = {Thu, 06 Aug 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/tifs/BaurBSP20.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/BesserLJJ20,
  author    = {Karl{-}Ludwig Besser and
               Pin{-}Hsun Lin and
               Carsten R. Janda and
               Eduard A. Jorswieck},
  title     = {Wiretap Code Design by Neural Network Autoencoders},
  journal   = {{IEEE} Trans. Inf. Forensics Secur.},
  volume    = {15},
  pages     = {3374--3386},
  year      = {2020},
  url       = {https://doi.org/10.1109/TIFS.2019.2945619},
  doi       = {10.1109/TIFS.2019.2945619},
  timestamp = {Thu, 06 Aug 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/tifs/BesserLJJ20.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/BocheSP20,
  author    = {Holger Boche and
               Rafael F. Schaefer and
               H. Vincent Poor},
  title     = {Secure Communication and Identification Systems - Effective Performance
               Evaluation on Turing Machines},
  journal   = {{IEEE} Trans. Inf. Forensics Secur.},
  volume    = {15},
  pages     = {1013--1025},
  year      = {2020},
  url       = {https://doi.org/10.1109/TIFS.2019.2932226},
  doi       = {10.1109/TIFS.2019.2932226},
  timestamp = {Thu, 06 Aug 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/tifs/BocheSP20.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/BorealeCV20,
  author    = {Michele Boreale and
               Fabio Corradi and
               Cecilia Viscardi},
  title     = {Relative Privacy Threats and Learning From Anonymized Data},
  journal   = {{IEEE} Trans. Inf. Forensics Secur.},
  volume    = {15},
  pages     = {1379--1393},
  year      = {2020},
  url       = {https://doi.org/10.1109/TIFS.2019.2937640},
  doi       = {10.1109/TIFS.2019.2937640},
  timestamp = {Thu, 06 Aug 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/tifs/BorealeCV20.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/BoudagdigueBKL20,
  author    = {Chaimae Boudagdigue and
               Abderrahim Benslimane and
               Abdellatif Kobbane and
               Jiajia Liu},
  title     = {Trust Management in Industrial Internet of Things},
  journal   = {{IEEE} Trans. Inf. Forensics Secur.},
  volume    = {15},
  pages     = {3667--3682},
  year      = {2020},
  url       = {https://doi.org/10.1109/TIFS.2020.2997179},
  doi       = {10.1109/TIFS.2020.2997179},
  timestamp = {Mon, 21 Feb 2022 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/journals/tifs/BoudagdigueBKL20.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/BreierJHB20,
  author    = {Jakub Breier and
               Dirmanto Jap and
               Xiaolu Hou and
               Shivam Bhasin},
  title     = {On Side Channel Vulnerabilities of Bit Permutations in Cryptographic
               Algorithms},
  journal   = {{IEEE} Trans. Inf. Forensics Secur.},
  volume    = {15},
  pages     = {1072--1085},
  year      = {2020},
  url       = {https://doi.org/10.1109/TIFS.2019.2932230},
  doi       = {10.1109/TIFS.2019.2932230},
  timestamp = {Thu, 06 Aug 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/tifs/BreierJHB20.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/BuninGPSCP20,
  author    = {Alexander Bunin and
               Ziv Goldfeld and
               Haim H. Permuter and
               Shlomo Shamai Shitz and
               Paul Cuff and
               Pablo Piantanida},
  title     = {Key and Message Semantic-Security Over State-Dependent Channels},
  journal   = {{IEEE} Trans. Inf. Forensics Secur.},
  volume    = {15},
  pages     = {1541--1556},
  year      = {2020},
  url       = {https://doi.org/10.1109/TIFS.2018.2853108},
  doi       = {10.1109/TIFS.2018.2853108},
  timestamp = {Mon, 20 Sep 2021 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/tifs/BuninGPSCP20.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/ButoraF20,
  author    = {Jan Butora and
               Jessica J. Fridrich},
  title     = {Reverse {JPEG} Compatibility Attack},
  journal   = {{IEEE} Trans. Inf. Forensics Secur.},
  volume    = {15},
  pages     = {1444--1454},
  year      = {2020},
  url       = {https://doi.org/10.1109/TIFS.2019.2940904},
  doi       = {10.1109/TIFS.2019.2940904},
  timestamp = {Thu, 06 Aug 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/tifs/ButoraF20.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/CaoO20,
  author    = {Phuong Le Cao and
               Tobias J. Oechtering},
  title     = {Optimal Transmit Strategies for Gaussian {MISO} Wiretap Channels},
  journal   = {{IEEE} Trans. Inf. Forensics Secur.},
  volume    = {15},
  pages     = {829--838},
  year      = {2020},
  url       = {https://doi.org/10.1109/TIFS.2019.2929474},
  doi       = {10.1109/TIFS.2019.2929474},
  timestamp = {Thu, 06 Aug 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/tifs/CaoO20.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/CaoWDLTG20,
  author    = {Kunrui Cao and
               Buhong Wang and
               Haiyang Ding and
               Tengyao Li and
               Jiwei Tian and
               Fengkui Gong},
  title     = {Secure Transmission Designs for {NOMA} Systems Against Internal and
               External Eavesdropping},
  journal   = {{IEEE} Trans. Inf. Forensics Secur.},
  volume    = {15},
  pages     = {2930--2943},
  year      = {2020},
  url       = {https://doi.org/10.1109/TIFS.2020.2980202},
  doi       = {10.1109/TIFS.2020.2980202},
  timestamp = {Thu, 06 Aug 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/tifs/CaoWDLTG20.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/CassiersS20,
  author    = {Ga{\"{e}}tan Cassiers and
               Fran{\c{c}}ois{-}Xavier Standaert},
  title     = {Trivially and Efficiently Composing Masked Gadgets With Probe Isolating
               Non-Interference},
  journal   = {{IEEE} Trans. Inf. Forensics Secur.},
  volume    = {15},
  pages     = {2542--2555},
  year      = {2020},
  url       = {https://doi.org/10.1109/TIFS.2020.2971153},
  doi       = {10.1109/TIFS.2020.2971153},
  timestamp = {Thu, 06 Aug 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/tifs/CassiersS20.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/ChangGHM20,
  author    = {Donghoon Chang and
               Surabhi Garg and
               Munawar Hasan and
               Sweta Mishra},
  title     = {Cancelable Multi-Biometric Approach Using Fuzzy Extractor and Novel
               Bit-Wise Encryption},
  journal   = {{IEEE} Trans. Inf. Forensics Secur.},
  volume    = {15},
  pages     = {3152--3167},
  year      = {2020},
  url       = {https://doi.org/10.1109/TIFS.2020.2983250},
  doi       = {10.1109/TIFS.2020.2983250},
  timestamp = {Thu, 06 Aug 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/tifs/ChangGHM20.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/ChenHLCRL20,
  author    = {Haonan Chen and
               Guosheng Hu and
               Zhen Lei and
               Yaowu Chen and
               Neil Martin Robertson and
               Stan Z. Li},
  title     = {Attention-Based Two-Stream Convolutional Networks for Face Spoofing
               Detection},
  journal   = {{IEEE} Trans. Inf. Forensics Secur.},
  volume    = {15},
  pages     = {578--593},
  year      = {2020},
  url       = {https://doi.org/10.1109/TIFS.2019.2922241},
  doi       = {10.1109/TIFS.2019.2922241},
  timestamp = {Tue, 12 Apr 2022 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/tifs/ChenHLCRL20.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/ChenLFHC20,
  author    = {Changsheng Chen and
               Mulin Li and
               Anselmo Ferreira and
               Jiwu Huang and
               Rizhao Cai},
  title     = {A Copy-Proof Scheme Based on the Spectral and Spatial Barcoding Channel
               Models},
  journal   = {{IEEE} Trans. Inf. Forensics Secur.},
  volume    = {15},
  pages     = {1056--1071},
  year      = {2020},
  url       = {https://doi.org/10.1109/TIFS.2019.2934861},
  doi       = {10.1109/TIFS.2019.2934861},
  timestamp = {Thu, 06 Aug 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/tifs/ChenLFHC20.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/ChenTZ20,
  author    = {Juntao Chen and
               Corinne Touati and
               Quanyan Zhu},
  title     = {A Dynamic Game Approach to Strategic Design of Secure and Resilient
               Infrastructure Network},
  journal   = {{IEEE} Trans. Inf. Forensics Secur.},
  volume    = {15},
  pages     = {462--474},
  year      = {2020},
  url       = {https://doi.org/10.1109/TIFS.2019.2924130},
  doi       = {10.1109/TIFS.2019.2924130},
  timestamp = {Thu, 06 Aug 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/tifs/ChenTZ20.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/ChoY20,
  author    = {Wonwoo Cho and
               Nam Yul Yu},
  title     = {Secure and Efficient Compressed Sensing-Based Encryption With Sparse
               Matrices},
  journal   = {{IEEE} Trans. Inf. Forensics Secur.},
  volume    = {15},
  pages     = {1999--2011},
  year      = {2020},
  url       = {https://doi.org/10.1109/TIFS.2019.2953383},
  doi       = {10.1109/TIFS.2019.2953383},
  timestamp = {Thu, 06 Aug 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/tifs/ChoY20.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/ChongEB20,
  author    = {Penny Chong and
               Yuval Elovici and
               Alexander Binder},
  title     = {User Authentication Based on Mouse Dynamics Using Deep Neural Networks:
               {A} Comprehensive Study},
  journal   = {{IEEE} Trans. Inf. Forensics Secur.},
  volume    = {15},
  pages     = {1086--1101},
  year      = {2020},
  url       = {https://doi.org/10.1109/TIFS.2019.2930429},
  doi       = {10.1109/TIFS.2019.2930429},
  timestamp = {Thu, 06 Aug 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/tifs/ChongEB20.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/ChowdhuryR20,
  author    = {Anurag Chowdhury and
               Arun Ross},
  title     = {Fusing {MFCC} and {LPC} Features Using 1D Triplet {CNN} for Speaker
               Recognition in Severely Degraded Audio Signals},
  journal   = {{IEEE} Trans. Inf. Forensics Secur.},
  volume    = {15},
  pages     = {1616--1629},
  year      = {2020},
  url       = {https://doi.org/10.1109/TIFS.2019.2941773},
  doi       = {10.1109/TIFS.2019.2941773},
  timestamp = {Mon, 20 Sep 2021 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/tifs/ChowdhuryR20.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/CominettiS20,
  author    = {Eduardo Lopes Cominetti and
               Marcos A. Simpl{\'{\i}}cio Jr.},
  title     = {Fast Additive Partially Homomorphic Encryption From the Approximate
               Common Divisor Problem},
  journal   = {{IEEE} Trans. Inf. Forensics Secur.},
  volume    = {15},
  pages     = {2988--2998},
  year      = {2020},
  url       = {https://doi.org/10.1109/TIFS.2020.2981239},
  doi       = {10.1109/TIFS.2020.2981239},
  timestamp = {Wed, 26 Aug 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/tifs/CominettiS20.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/CozzolinoV20,
  author    = {Davide Cozzolino and
               Luisa Verdoliva},
  title     = {Noiseprint: {A} CNN-Based Camera Model Fingerprint},
  journal   = {{IEEE} Trans. Inf. Forensics Secur.},
  volume    = {15},
  pages     = {144--159},
  year      = {2020},
  url       = {https://doi.org/10.1109/TIFS.2019.2916364},
  doi       = {10.1109/TIFS.2019.2916364},
  timestamp = {Sat, 05 Sep 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/tifs/CozzolinoV20.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/CuiWWNY20,
  author    = {Hui Cui and
               Zhiguo Wan and
               Xinlei Wei and
               Surya Nepal and
               Xun Yi},
  title     = {Pay as You Decrypt: Decryption Outsourcing for Functional Encryption
               Using Blockchain},
  journal   = {{IEEE} Trans. Inf. Forensics Secur.},
  volume    = {15},
  pages     = {3227--3238},
  year      = {2020},
  url       = {https://doi.org/10.1109/TIFS.2020.2973864},
  doi       = {10.1109/TIFS.2020.2973864},
  timestamp = {Fri, 12 Nov 2021 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/journals/tifs/CuiWWNY20.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/CuiZZZL20,
  author    = {Jie Cui and
               Xiaoyu Zhang and
               Hong Zhong and
               Jing Zhang and
               Lu Liu},
  title     = {Extensible Conditional Privacy Protection Authentication Scheme for
               Secure Vehicular Networks in a Multi-Cloud Environment},
  journal   = {{IEEE} Trans. Inf. Forensics Secur.},
  volume    = {15},
  pages     = {1654--1667},
  year      = {2020},
  url       = {https://doi.org/10.1109/TIFS.2019.2946933},
  doi       = {10.1109/TIFS.2019.2946933},
  timestamp = {Mon, 20 Sep 2021 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/tifs/CuiZZZL20.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/DEliaCPC20,
  author    = {Daniele Cono D'Elia and
               Emilio Coppa and
               Federico Palmaro and
               Lorenzo Cavallaro},
  title     = {On the Dissection of Evasive Malware},
  journal   = {{IEEE} Trans. Inf. Forensics Secur.},
  volume    = {15},
  pages     = {2750--2765},
  year      = {2020},
  url       = {https://doi.org/10.1109/TIFS.2020.2976559},
  doi       = {10.1109/TIFS.2020.2976559},
  timestamp = {Thu, 06 Aug 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/tifs/DEliaCPC20.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/DaiDCCZ020,
  author    = {Weiqi Dai and
               Chunkai Dai and
               Kim{-}Kwang Raymond Choo and
               Changze Cui and
               Deqing Zou and
               Hai Jin},
  title     = {{SDTE:} {A} Secure Blockchain-Based Data Trading Ecosystem},
  journal   = {{IEEE} Trans. Inf. Forensics Secur.},
  volume    = {15},
  pages     = {725--737},
  year      = {2020},
  url       = {https://doi.org/10.1109/TIFS.2019.2928256},
  doi       = {10.1109/TIFS.2019.2928256},
  timestamp = {Thu, 06 Aug 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/tifs/DaiDCCZ020.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/DarsenaGIV20,
  author    = {Donatella Darsena and
               Giacinto Gelli and
               Ivan Iudice and
               Francesco Verde},
  title     = {Design and Performance Analysis of Channel Estimators Under Pilot
               Spoofing Attacks in Multiple-Antenna Systems},
  journal   = {{IEEE} Trans. Inf. Forensics Secur.},
  volume    = {15},
  pages     = {3255--3269},
  year      = {2020},
  url       = {https://doi.org/10.1109/TIFS.2020.2985548},
  doi       = {10.1109/TIFS.2020.2985548},
  timestamp = {Thu, 06 Aug 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/tifs/DarsenaGIV20.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/DeeradaPRA20,
  author    = {Chonlatid Deerada and
               Krisada Phromsuthirak and
               Arucha Rungchokanun and
               Vutipong Areekul},
  title     = {Progressive Focusing Algorithm for Reliable Pose Estimation of Latent
               Fingerprints},
  journal   = {{IEEE} Trans. Inf. Forensics Secur.},
  volume    = {15},
  pages     = {1232--1247},
  year      = {2020},
  url       = {https://doi.org/10.1109/TIFS.2019.2934865},
  doi       = {10.1109/TIFS.2019.2934865},
  timestamp = {Thu, 06 Aug 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/tifs/DeeradaPRA20.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/DengQWGDWZ20,
  author    = {Hua Deng and
               Zheng Qin and
               Qianhong Wu and
               Zhenyu Guan and
               Robert H. Deng and
               Yujue Wang and
               Yunya Zhou},
  title     = {Identity-Based Encryption Transformation for Flexible Sharing of Encrypted
               Data in Public Cloud},
  journal   = {{IEEE} Trans. Inf. Forensics Secur.},
  volume    = {15},
  pages     = {3168--3180},
  year      = {2020},
  url       = {https://doi.org/10.1109/TIFS.2020.2985532},
  doi       = {10.1109/TIFS.2020.2985532},
  timestamp = {Wed, 27 Apr 2022 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/tifs/DengQWGDWZ20.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/DiazFRG20,
  author    = {Mois{\'{e}}s D{\'{\i}}az and
               Miguel A. Ferrer and
               Soodamani Ramalingam and
               Richard M. Guest},
  title     = {Investigating the Common Authorship of Signatures by Off-Line Automatic
               Signature Verification Without the Use of Reference Signatures},
  journal   = {{IEEE} Trans. Inf. Forensics Secur.},
  volume    = {15},
  pages     = {487--499},
  year      = {2020},
  url       = {https://doi.org/10.1109/TIFS.2019.2924195},
  doi       = {10.1109/TIFS.2019.2924195},
  timestamp = {Thu, 06 Aug 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/tifs/DiazFRG20.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/DinL20,
  author    = {Fawad Ud Din and
               Fabrice Labeau},
  title     = {In-Band Full-Duplex Discriminatory Channel Estimation Using {MMSE}},
  journal   = {{IEEE} Trans. Inf. Forensics Secur.},
  volume    = {15},
  pages     = {3283--3292},
  year      = {2020},
  url       = {https://doi.org/10.1109/TIFS.2020.2986885},
  doi       = {10.1109/TIFS.2020.2986885},
  timestamp = {Thu, 06 Aug 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/tifs/DinL20.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/DingF20,
  author    = {Ni Ding and
               Farhad Farokhi},
  title     = {Developing Non-Stochastic Privacy-Preserving Policies Using Agglomerative
               Clustering},
  journal   = {{IEEE} Trans. Inf. Forensics Secur.},
  volume    = {15},
  pages     = {3911--3923},
  year      = {2020},
  url       = {https://doi.org/10.1109/TIFS.2020.3002479},
  doi       = {10.1109/TIFS.2020.3002479},
  timestamp = {Thu, 06 Aug 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/tifs/DingF20.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/DingQWQYB20,
  author    = {Tao Ding and
               Ming Qu and
               Xiong Wu and
               Boyu Qin and
               Yongheng Yang and
               Frede Blaabjerg},
  title     = {Defense Strategy for Resilient Shipboard Power Systems Considering
               Sequential Attacks},
  journal   = {{IEEE} Trans. Inf. Forensics Secur.},
  volume    = {15},
  pages     = {3443--3453},
  year      = {2020},
  url       = {https://doi.org/10.1109/TIFS.2019.2960657},
  doi       = {10.1109/TIFS.2019.2960657},
  timestamp = {Sat, 05 Sep 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/tifs/DingQWQYB20.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/DuHW20,
  author    = {Lingshuang Du and
               Haifeng Hu and
               Yongbo Wu},
  title     = {Cycle Age-Adversarial Model Based on Identity Preserving Network and
               Transfer Learning for Cross-Age Face Recognition},
  journal   = {{IEEE} Trans. Inf. Forensics Secur.},
  volume    = {15},
  pages     = {2241--2252},
  year      = {2020},
  url       = {https://doi.org/10.1109/TIFS.2019.2960585},
  doi       = {10.1109/TIFS.2019.2960585},
  timestamp = {Thu, 06 Aug 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/tifs/DuHW20.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/DushkuRCMR20,
  author    = {Edlira Dushku and
               Md Masoom Rabbani and
               Mauro Conti and
               Luigi V. Mancini and
               Silvio Ranise},
  title     = {{SARA:} Secure Asynchronous Remote Attestation for IoT Systems},
  journal   = {{IEEE} Trans. Inf. Forensics Secur.},
  volume    = {15},
  pages     = {3123--3136},
  year      = {2020},
  url       = {https://doi.org/10.1109/TIFS.2020.2983282},
  doi       = {10.1109/TIFS.2020.2983282},
  timestamp = {Thu, 06 Aug 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/tifs/DushkuRCMR20.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/DuttaC20,
  author    = {Hridoy Sankar Dutta and
               Tanmoy Chakraborty},
  title     = {Blackmarket-Driven Collusion Among Retweeters-Analysis, Detection,
               and Characterization},
  journal   = {{IEEE} Trans. Inf. Forensics Secur.},
  volume    = {15},
  pages     = {1935--1944},
  year      = {2020},
  url       = {https://doi.org/10.1109/TIFS.2019.2953331},
  doi       = {10.1109/TIFS.2019.2953331},
  timestamp = {Thu, 06 Aug 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/tifs/DuttaC20.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/DuttaDAC20,
  author    = {Hridoy Sankar Dutta and
               Vishal Raj Dutta and
               Aditya Adhikary and
               Tanmoy Chakraborty},
  title     = {HawkesEye: Detecting Fake Retweeters Using Hawkes Process and Topic
               Modeling},
  journal   = {{IEEE} Trans. Inf. Forensics Secur.},
  volume    = {15},
  pages     = {2667--2678},
  year      = {2020},
  url       = {https://doi.org/10.1109/TIFS.2020.2970601},
  doi       = {10.1109/TIFS.2020.2970601},
  timestamp = {Wed, 15 Dec 2021 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/journals/tifs/DuttaDAC20.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/ErozanHBAT20,
  author    = {Ahmet Turan Erozan and
               Michael Hefenbrock and
               Michael Beigl and
               Jasmin Aghassi{-}Hagmann and
               Mehdi Baradaran Tahoori},
  title     = {Reverse Engineering of Printed Electronics Circuits: From Imaging
               to Netlist Extraction},
  journal   = {{IEEE} Trans. Inf. Forensics Secur.},
  volume    = {15},
  pages     = {475--486},
  year      = {2020},
  url       = {https://doi.org/10.1109/TIFS.2019.2922237},
  doi       = {10.1109/TIFS.2019.2922237},
  timestamp = {Thu, 06 Aug 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/tifs/ErozanHBAT20.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/EsmaeilpourCK20,
  author    = {Mohammad Esmaeilpour and
               Patrick Cardinal and
               Alessandro Lameiras Koerich},
  title     = {A Robust Approach for Securing Audio Classification Against Adversarial
               Attacks},
  journal   = {{IEEE} Trans. Inf. Forensics Secur.},
  volume    = {15},
  pages     = {2147--2159},
  year      = {2020},
  url       = {https://doi.org/10.1109/TIFS.2019.2956591},
  doi       = {10.1109/TIFS.2019.2956591},
  timestamp = {Thu, 06 Aug 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/tifs/EsmaeilpourCK20.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/FanHZHCL20,
  author    = {Chun{-}I Fan and
               Jheng{-}Jia Huang and
               Min{-}Zhe Zhong and
               Ruei{-}Hau Hsu and
               Wen{-}Tsuen Chen and
               Jemin Lee},
  title     = {ReHand: Secure Region-Based Fast Handover With User Anonymity for
               Small Cell Networks in Mobile Communications},
  journal   = {{IEEE} Trans. Inf. Forensics Secur.},
  volume    = {15},
  pages     = {927--942},
  year      = {2020},
  url       = {https://doi.org/10.1109/TIFS.2019.2931076},
  doi       = {10.1109/TIFS.2019.2931076},
  timestamp = {Thu, 06 Aug 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/tifs/FanHZHCL20.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/FengCLJX20,
  author    = {Jingyi Feng and
               Hua Chen and
               Yang Li and
               Zhipeng Jiao and
               Wei Xi},
  title     = {A Framework for Evaluation and Analysis on Infection Countermeasures
               Against Fault Attacks},
  journal   = {{IEEE} Trans. Inf. Forensics Secur.},
  volume    = {15},
  pages     = {391--406},
  year      = {2020},
  url       = {https://doi.org/10.1109/TIFS.2019.2903653},
  doi       = {10.1109/TIFS.2019.2903653},
  timestamp = {Fri, 04 Sep 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/tifs/FengCLJX20.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/FengHLWC20,
  author    = {Qi Feng and
               Debiao He and
               Zhe Liu and
               Huaqun Wang and
               Kim{-}Kwang Raymond Choo},
  title     = {SecureNLP: {A} System for Multi-Party Privacy-Preserving Natural Language
               Processing},
  journal   = {{IEEE} Trans. Inf. Forensics Secur.},
  volume    = {15},
  pages     = {3709--3721},
  year      = {2020},
  url       = {https://doi.org/10.1109/TIFS.2020.2997134},
  doi       = {10.1109/TIFS.2020.2997134},
  timestamp = {Thu, 06 Aug 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/tifs/FengHLWC20.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/FlowersBH20,
  author    = {Bryse Flowers and
               R. Michael Buehrer and
               William C. Headley},
  title     = {Evaluating Adversarial Evasion Attacks in the Context of Wireless
               Communications},
  journal   = {{IEEE} Trans. Inf. Forensics Secur.},
  volume    = {15},
  pages     = {1102--1113},
  year      = {2020},
  url       = {https://doi.org/10.1109/TIFS.2019.2934069},
  doi       = {10.1109/TIFS.2019.2934069},
  timestamp = {Thu, 06 Aug 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/tifs/FlowersBH20.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/FormbyB20,
  author    = {David Formby and
               Raheem Beyah},
  title     = {Temporal Execution Behavior for Host Anomaly Detection in Programmable
               Logic Controllers},
  journal   = {{IEEE} Trans. Inf. Forensics Secur.},
  volume    = {15},
  pages     = {1455--1469},
  year      = {2020},
  url       = {https://doi.org/10.1109/TIFS.2019.2940890},
  doi       = {10.1109/TIFS.2019.2940890},
  timestamp = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/tifs/FormbyB20.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/FroelicherTSH20,
  author    = {David Froelicher and
               Juan Ram{\'{o}}n Troncoso{-}Pastoriza and
               Joao Sa Sousa and
               Jean{-}Pierre Hubaux},
  title     = {Drynx: Decentralized, Secure, Verifiable System for Statistical Queries
               and Machine Learning on Distributed Datasets},
  journal   = {{IEEE} Trans. Inf. Forensics Secur.},
  volume    = {15},
  pages     = {3035--3050},
  year      = {2020},
  url       = {https://doi.org/10.1109/TIFS.2020.2976612},
  doi       = {10.1109/TIFS.2020.2976612},
  timestamp = {Wed, 15 Dec 2021 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/journals/tifs/FroelicherTSH20.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/GangwalC20,
  author    = {Ankit Gangwal and
               Mauro Conti},
  title     = {Cryptomining Cannot Change Its Spots: Detecting Covert Cryptomining
               Using Magnetic Side-Channel},
  journal   = {{IEEE} Trans. Inf. Forensics Secur.},
  volume    = {15},
  pages     = {1630--1639},
  year      = {2020},
  url       = {https://doi.org/10.1109/TIFS.2019.2945171},
  doi       = {10.1109/TIFS.2019.2945171},
  timestamp = {Fri, 09 Apr 2021 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/tifs/GangwalC20.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/GeorgeMGNAM20,
  author    = {Anjith George and
               Zohreh Mostaani and
               David Geissenbuhler and
               Olegs Nikisins and
               Andr{\'{e}} Anjos and
               S{\'{e}}bastien Marcel},
  title     = {Biometric Face Presentation Attack Detection With Multi-Channel Convolutional
               Neural Network},
  journal   = {{IEEE} Trans. Inf. Forensics Secur.},
  volume    = {15},
  pages     = {42--55},
  year      = {2020},
  url       = {https://doi.org/10.1109/TIFS.2019.2916652},
  doi       = {10.1109/TIFS.2019.2916652},
  timestamp = {Thu, 06 Aug 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/tifs/GeorgeMGNAM20.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/GhammamKLA20,
  author    = {Loubna Ghammam and
               Koray Karabina and
               Patrick Lacharme and
               Kevin Atighehchi},
  title     = {A Cryptanalysis of Two Cancelable Biometric Schemes Based on Index-of-Max
               Hashing},
  journal   = {{IEEE} Trans. Inf. Forensics Secur.},
  volume    = {15},
  pages     = {2869--2880},
  year      = {2020},
  url       = {https://doi.org/10.1109/TIFS.2020.2977533},
  doi       = {10.1109/TIFS.2020.2977533},
  timestamp = {Thu, 06 Aug 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/tifs/GhammamKLA20.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/GokAA20,
  author    = {Gokhan Gok and
               Yasar Kemal Alp and
               Orhan Arikan},
  title     = {A New Method for Specific Emitter Identification With Results on Real
               Radar Measurements},
  journal   = {{IEEE} Trans. Inf. Forensics Secur.},
  volume    = {15},
  pages     = {3335--3346},
  year      = {2020},
  url       = {https://doi.org/10.1109/TIFS.2020.2988558},
  doi       = {10.1109/TIFS.2020.2988558},
  timestamp = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/tifs/GokAA20.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/GongXL20,
  author    = {Jialiang Gong and
               Xiaodong Xu and
               Yingke Lei},
  title     = {Unsupervised Specific Emitter Identification Method Using Radio-Frequency
               Fingerprint Embedded InfoGAN},
  journal   = {{IEEE} Trans. Inf. Forensics Secur.},
  volume    = {15},
  pages     = {2898--2913},
  year      = {2020},
  url       = {https://doi.org/10.1109/TIFS.2020.2978620},
  doi       = {10.1109/TIFS.2020.2978620},
  timestamp = {Fri, 06 Aug 2021 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/tifs/GongXL20.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/GrecoPSV20,
  author    = {Antonio Greco and
               Nicolai Petkov and
               Alessia Saggese and
               Mario Vento},
  title     = {AReN: {A} Deep Learning Approach for Sound Event Recognition Using
               a Brain Inspired Representation},
  journal   = {{IEEE} Trans. Inf. Forensics Secur.},
  volume    = {15},
  pages     = {3610--3624},
  year      = {2020},
  url       = {https://doi.org/10.1109/TIFS.2020.2994740},
  doi       = {10.1109/TIFS.2020.2994740},
  timestamp = {Thu, 06 Aug 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/tifs/GrecoPSV20.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/GuCXLV20,
  author    = {Zhifang Gu and
               He Henry Chen and
               Pingping Xu and
               Yonghui Li and
               Branka Vucetic},
  title     = {Physical Layer Authentication for Non-Coherent Massive SIMO-Enabled
               Industrial IoT Communications},
  journal   = {{IEEE} Trans. Inf. Forensics Secur.},
  volume    = {15},
  pages     = {3722--3733},
  year      = {2020},
  url       = {https://doi.org/10.1109/TIFS.2020.2998947},
  doi       = {10.1109/TIFS.2020.2998947},
  timestamp = {Thu, 06 Aug 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/tifs/GuCXLV20.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/GuerriniDL20,
  author    = {Fabrizio Guerrini and
               Marco Dalai and
               Riccardo Leonardi},
  title     = {Minimal Information Exchange for Secure Image Hash-Based Geometric
               Transformations Estimation},
  journal   = {{IEEE} Trans. Inf. Forensics Secur.},
  volume    = {15},
  pages     = {3482--3496},
  year      = {2020},
  url       = {https://doi.org/10.1109/TIFS.2020.2990793},
  doi       = {10.1109/TIFS.2020.2990793},
  timestamp = {Thu, 06 Aug 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/tifs/GuerriniDL20.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/GuoQGZLJW20,
  author    = {Wei Guo and
               Su{-}Juan Qin and
               Fei Gao and
               Hua Zhang and
               Wenmin Li and
               Zhengping Jin and
               Qiaoyan Wen},
  title     = {Comments on "Provable Multicopy Dynamic Data Possession in Cloud Computing
               Systems"},
  journal   = {{IEEE} Trans. Inf. Forensics Secur.},
  volume    = {15},
  pages     = {2584--2586},
  year      = {2020},
  url       = {https://doi.org/10.1109/TIFS.2020.2970591},
  doi       = {10.1109/TIFS.2020.2970591},
  timestamp = {Thu, 14 Jul 2022 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/tifs/GuoQGZLJW20.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/GuoXLY20,
  author    = {Shangwei Guo and
               Tao Xiang and
               Xiaoguo Li and
               Ying Yang},
  title     = {{PEID:} {A} Perceptually Encrypted Image Database for Visual Security
               Evaluation},
  journal   = {{IEEE} Trans. Inf. Forensics Secur.},
  volume    = {15},
  pages     = {1151--1163},
  year      = {2020},
  url       = {https://doi.org/10.1109/TIFS.2019.2935415},
  doi       = {10.1109/TIFS.2019.2935415},
  timestamp = {Thu, 23 Jun 2022 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/tifs/GuoXLY20.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/GuoZT20,
  author    = {Tao Guo and
               Ruida Zhou and
               Chao Tian},
  title     = {On the Information Leakage in Private Information Retrieval Systems},
  journal   = {{IEEE} Trans. Inf. Forensics Secur.},
  volume    = {15},
  pages     = {2999--3012},
  year      = {2020},
  url       = {https://doi.org/10.1109/TIFS.2020.2981282},
  doi       = {10.1109/TIFS.2020.2981282},
  timestamp = {Fri, 23 Oct 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/tifs/GuoZT20.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/GuriZBE20,
  author    = {Mordechai Guri and
               Boris Zadov and
               Dima Bykhovsky and
               Yuval Elovici},
  title     = {PowerHammer: Exfiltrating Data From Air-Gapped Computers Through Power
               Lines},
  journal   = {{IEEE} Trans. Inf. Forensics Secur.},
  volume    = {15},
  pages     = {1879--1890},
  year      = {2020},
  url       = {https://doi.org/10.1109/TIFS.2019.2952257},
  doi       = {10.1109/TIFS.2019.2952257},
  timestamp = {Thu, 06 Aug 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/tifs/GuriZBE20.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/GuriZE20,
  author    = {Mordechai Guri and
               Boris Zadov and
               Yuval Elovici},
  title     = {{ODINI:} Escaping Sensitive Data From Faraday-Caged, Air-Gapped Computers
               via Magnetic Fields},
  journal   = {{IEEE} Trans. Inf. Forensics Secur.},
  volume    = {15},
  pages     = {1190--1203},
  year      = {2020},
  url       = {https://doi.org/10.1109/TIFS.2019.2938404},
  doi       = {10.1109/TIFS.2019.2938404},
  timestamp = {Thu, 06 Aug 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/tifs/GuriZE20.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/HaddadCMC20,
  author    = {Sahar Haddad and
               Gouenou Coatrieux and
               Alexandre Moreau{-}Gaudry and
               Michel Cozic},
  title     = {Joint Watermarking-Encryption-JPEG-LS for Medical Image Reliability
               Control in Encrypted and Compressed Domains},
  journal   = {{IEEE} Trans. Inf. Forensics Secur.},
  volume    = {15},
  pages     = {2556--2569},
  year      = {2020},
  url       = {https://doi.org/10.1109/TIFS.2020.2972159},
  doi       = {10.1109/TIFS.2020.2972159},
  timestamp = {Thu, 06 Aug 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/tifs/HaddadCMC20.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/HafemannSO20,
  author    = {Luiz G. Hafemann and
               Robert Sabourin and
               Luiz S. Oliveira},
  title     = {Meta-Learning for Fast Classifier Adaptation to New Users of Signature
               Verification Systems},
  journal   = {{IEEE} Trans. Inf. Forensics Secur.},
  volume    = {15},
  pages     = {1735--1745},
  year      = {2020},
  url       = {https://doi.org/10.1109/TIFS.2019.2949425},
  doi       = {10.1109/TIFS.2019.2949425},
  timestamp = {Mon, 20 Sep 2021 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/tifs/HafemannSO20.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/HanCSTWW20,
  author    = {Jinguang Han and
               Liqun Chen and
               Steve A. Schneider and
               Helen Treharne and
               Stephan Wesemeyer and
               Nick Wilson},
  title     = {Anonymous Single Sign-On With Proxy Re-Verification},
  journal   = {{IEEE} Trans. Inf. Forensics Secur.},
  volume    = {15},
  pages     = {223--236},
  year      = {2020},
  url       = {https://doi.org/10.1109/TIFS.2019.2919926},
  doi       = {10.1109/TIFS.2019.2919926},
  timestamp = {Fri, 02 Jul 2021 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/tifs/HanCSTWW20.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/HanSX20,
  author    = {Qian Han and
               V. S. Subrahmanian and
               Yanhai Xiong},
  title     = {Android Malware Detection via (Somewhat) Robust Irreversible Feature
               Transformations},
  journal   = {{IEEE} Trans. Inf. Forensics Secur.},
  volume    = {15},
  pages     = {3511--3525},
  year      = {2020},
  url       = {https://doi.org/10.1109/TIFS.2020.2975932},
  doi       = {10.1109/TIFS.2020.2975932},
  timestamp = {Thu, 06 Aug 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/tifs/HanSX20.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/HanXHC20,
  author    = {Yunxia Han and
               Chunxiang Xu and
               Debiao He and
               Kefei Chen},
  title     = {On the Security of a Key Agreement and Key Protection Scheme},
  journal   = {{IEEE} Trans. Inf. Forensics Secur.},
  volume    = {15},
  pages     = {3293--3294},
  year      = {2020},
  url       = {https://doi.org/10.1109/TIFS.2020.2986881},
  doi       = {10.1109/TIFS.2020.2986881},
  timestamp = {Thu, 06 Aug 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/tifs/HanXHC20.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/HayashiV20,
  author    = {Masahito Hayashi and
               {\'{A}}ngeles V{\'{a}}zquez{-}Castro},
  title     = {Physical Layer Security Protocol for Poisson Channels for Passive
               Man-in-the-Middle Attack},
  journal   = {{IEEE} Trans. Inf. Forensics Secur.},
  volume    = {15},
  pages     = {2295--2305},
  year      = {2020},
  url       = {https://doi.org/10.1109/TIFS.2019.2963771},
  doi       = {10.1109/TIFS.2019.2963771},
  timestamp = {Tue, 28 Jun 2022 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/tifs/HayashiV20.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/HeBLCGR20,
  author    = {Anxiao He and
               Kai Bu and
               Yucong Li and
               Eikoh Chida and
               Qianping Gu and
               Kui Ren},
  title     = {Atomos: Constant-Size Path Validation Proof},
  journal   = {{IEEE} Trans. Inf. Forensics Secur.},
  volume    = {15},
  pages     = {3832--3847},
  year      = {2020},
  url       = {https://doi.org/10.1109/TIFS.2020.3001669},
  doi       = {10.1109/TIFS.2020.3001669},
  timestamp = {Thu, 06 Aug 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/tifs/HeBLCGR20.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/HeC20,
  author    = {Wenguang He and
               Zhanchuan Cai},
  title     = {An Insight Into Pixel Value Ordering Prediction-Based Prediction-Error
               Expansion},
  journal   = {{IEEE} Trans. Inf. Forensics Secur.},
  volume    = {15},
  pages     = {3859--3871},
  year      = {2020},
  url       = {https://doi.org/10.1109/TIFS.2020.3002377},
  doi       = {10.1109/TIFS.2020.3002377},
  timestamp = {Thu, 06 Aug 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/tifs/HeC20.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/HeCT20,
  author    = {Junhui He and
               Junxi Chen and
               Shaohua Tang},
  title     = {Reversible Data Hiding in {JPEG} Images Based on Negative Influence
               Models},
  journal   = {{IEEE} Trans. Inf. Forensics Secur.},
  volume    = {15},
  pages     = {2121--2133},
  year      = {2020},
  url       = {https://doi.org/10.1109/TIFS.2019.2958758},
  doi       = {10.1109/TIFS.2019.2958758},
  timestamp = {Thu, 06 Aug 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/tifs/HeCT20.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/HeLSJS20,
  author    = {Ji He and
               Jia Liu and
               Yulong Shen and
               Xiaohong Jiang and
               Norio Shiratori},
  title     = {Link Selection for Security-QoS Tradeoffs in Buffer-Aided Relaying
               Networks},
  journal   = {{IEEE} Trans. Inf. Forensics Secur.},
  volume    = {15},
  pages     = {1347--1362},
  year      = {2020},
  url       = {https://doi.org/10.1109/TIFS.2019.2939738},
  doi       = {10.1109/TIFS.2019.2939738},
  timestamp = {Wed, 18 Aug 2021 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/tifs/HeLSJS20.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/HeS20,
  author    = {Sheng He and
               Lambert Schomaker},
  title     = {FragNet: Writer Identification Using Deep Fragment Networks},
  journal   = {{IEEE} Trans. Inf. Forensics Secur.},
  volume    = {15},
  pages     = {3013--3022},
  year      = {2020},
  url       = {https://doi.org/10.1109/TIFS.2020.2981236},
  doi       = {10.1109/TIFS.2020.2981236},
  timestamp = {Mon, 26 Oct 2020 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/journals/tifs/HeS20.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/HeW20,
  author    = {Boxiang He and
               Fanggang Wang},
  title     = {Cooperative Specific Emitter Identification via Multiple Distorted
               Receivers},
  journal   = {{IEEE} Trans. Inf. Forensics Secur.},
  volume    = {15},
  pages     = {3791--3806},
  year      = {2020},
  url       = {https://doi.org/10.1109/TIFS.2020.3001721},
  doi       = {10.1109/TIFS.2020.3001721},
  timestamp = {Thu, 06 Aug 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/tifs/HeW20.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/HongJGH20,
  author    = {Yuanquan Hong and
               Xiaojun Jing and
               Hui Gao and
               Yuan He},
  title     = {Fixed Region Beamforming Using Frequency Diverse Subarray for Secure
               mmWave Wireless Communications},
  journal   = {{IEEE} Trans. Inf. Forensics Secur.},
  volume    = {15},
  pages     = {2706--2721},
  year      = {2020},
  url       = {https://doi.org/10.1109/TIFS.2020.2969576},
  doi       = {10.1109/TIFS.2020.2969576},
  timestamp = {Thu, 06 Aug 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/tifs/HongJGH20.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/HristeaT20,
  author    = {Cristian Hristea and
               Ferucio Laurentiu Tiplea},
  title     = {Privacy of Stateful {RFID} Systems With Constant Tag Identifiers},
  journal   = {{IEEE} Trans. Inf. Forensics Secur.},
  volume    = {15},
  pages     = {1920--1934},
  year      = {2020},
  url       = {https://doi.org/10.1109/TIFS.2019.2953398},
  doi       = {10.1109/TIFS.2019.2953398},
  timestamp = {Thu, 06 Aug 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/tifs/HristeaT20.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/HsiaoSC20,
  author    = {Shun{-}Wen Hsiao and
               Yeali S. Sun and
               Meng Chang Chen},
  title     = {Hardware-Assisted {MMU} Redirection for In-Guest Monitoring and {API}
               Profiling},
  journal   = {{IEEE} Trans. Inf. Forensics Secur.},
  volume    = {15},
  pages     = {2402--2416},
  year      = {2020},
  url       = {https://doi.org/10.1109/TIFS.2020.2969514},
  doi       = {10.1109/TIFS.2020.2969514},
  timestamp = {Thu, 06 Aug 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/tifs/HsiaoSC20.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/HuWCMB20,
  author    = {Qin Hu and
               Shengling Wang and
               Xiuzhen Cheng and
               Liran Ma and
               Rongfang Bie},
  title     = {Solving the Crowdsourcing Dilemma Using the Zero-Determinant Strategies},
  journal   = {{IEEE} Trans. Inf. Forensics Secur.},
  volume    = {15},
  pages     = {1778--1789},
  year      = {2020},
  url       = {https://doi.org/10.1109/TIFS.2019.2949440},
  doi       = {10.1109/TIFS.2019.2949440},
  timestamp = {Thu, 10 Mar 2022 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/journals/tifs/HuWCMB20.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/HuXCMFZY20,
  author    = {Guilei Hu and
               Yang Xiao and
               Zhiguo Cao and
               Lubin Meng and
               Zhiwen Fang and
               Joey Tianyi Zhou and
               Junsong Yuan},
  title     = {Towards Real-Time Eyeblink Detection in the Wild: Dataset, Theory
               and Practices},
  journal   = {{IEEE} Trans. Inf. Forensics Secur.},
  volume    = {15},
  pages     = {2194--2208},
  year      = {2020},
  url       = {https://doi.org/10.1109/TIFS.2019.2959978},
  doi       = {10.1109/TIFS.2019.2959978},
  timestamp = {Tue, 25 May 2021 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/tifs/HuXCMFZY20.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/HuaZ20,
  author    = {Guang Hua and
               Haijian Zhang},
  title     = {{ENF} Signal Enhancement in Audio Recordings},
  journal   = {{IEEE} Trans. Inf. Forensics Secur.},
  volume    = {15},
  pages     = {1868--1878},
  year      = {2020},
  url       = {https://doi.org/10.1109/TIFS.2019.2952264},
  doi       = {10.1109/TIFS.2019.2952264},
  timestamp = {Thu, 10 Sep 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/tifs/HuaZ20.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/HuangH20,
  author    = {Kai Huang and
               Yun He},
  title     = {Trigger Identification Using Difference-Amplified Controllability
               and Dynamic Transition Probability for Hardware Trojan Detection},
  journal   = {{IEEE} Trans. Inf. Forensics Secur.},
  volume    = {15},
  pages     = {3387--3400},
  year      = {2020},
  url       = {https://doi.org/10.1109/TIFS.2019.2946044},
  doi       = {10.1109/TIFS.2019.2946044},
  timestamp = {Thu, 06 Aug 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/tifs/HuangH20.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/HuangHGCG20,
  author    = {Zonghao Huang and
               Rui Hu and
               Yuanxiong Guo and
               Eric Chan{-}Tin and
               Yanmin Gong},
  title     = {{DP-ADMM:} ADMM-Based Distributed Learning With Differential Privacy},
  journal   = {{IEEE} Trans. Inf. Forensics Secur.},
  volume    = {15},
  pages     = {1002--1012},
  year      = {2020},
  url       = {https://doi.org/10.1109/TIFS.2019.2931068},
  doi       = {10.1109/TIFS.2019.2931068},
  timestamp = {Wed, 11 May 2022 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/tifs/HuangHGCG20.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/HuangLBH20,
  author    = {Yuankun Huang and
               Bin Li and
               Mauro Barni and
               Jiwu Huang},
  title     = {Identification of VoIP Speech With Multiple Domain Deep Features},
  journal   = {{IEEE} Trans. Inf. Forensics Secur.},
  volume    = {15},
  pages     = {2253--2267},
  year      = {2020},
  url       = {https://doi.org/10.1109/TIFS.2019.2960635},
  doi       = {10.1109/TIFS.2019.2960635},
  timestamp = {Thu, 06 Aug 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/tifs/HuangLBH20.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/IbrahimLSCK20,
  author    = {Mohamed Ibrahim and
               Tung{-}Che Liang and
               Kristin Scott and
               Krishnendu Chakrabarty and
               Ramesh Karri},
  title     = {Molecular Barcoding as a Defense Against Benchtop Biochemical Attacks
               on {DNA} Fingerprinting and Information Forensics},
  journal   = {{IEEE} Trans. Inf. Forensics Secur.},
  volume    = {15},
  pages     = {3595--3609},
  year      = {2020},
  url       = {https://doi.org/10.1109/TIFS.2020.2994742},
  doi       = {10.1109/TIFS.2020.2994742},
  timestamp = {Thu, 06 Aug 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/tifs/IbrahimLSCK20.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/ImJL20,
  author    = {Jong{-}Hyuk Im and
               Seong{-}Yun Jeon and
               Mun{-}Kyu Lee},
  title     = {Practical Privacy-Preserving Face Authentication for Smartphones Secure
               Against Malicious Clients},
  journal   = {{IEEE} Trans. Inf. Forensics Secur.},
  volume    = {15},
  pages     = {2386--2401},
  year      = {2020},
  url       = {https://doi.org/10.1109/TIFS.2020.2969513},
  doi       = {10.1109/TIFS.2020.2969513},
  timestamp = {Thu, 06 Aug 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/tifs/ImJL20.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/JatiGCSC20,
  author    = {Arpan Jati and
               Naina Gupta and
               Anupam Chattopadhyay and
               Somitra Kumar Sanadhya and
               Donghoon Chang},
  title     = {Threshold Implementations of {\textless}tt{\textgreater}GIFT{\textless}/tt{\textgreater}:
               {A} Trade-Off Analysis},
  journal   = {{IEEE} Trans. Inf. Forensics Secur.},
  volume    = {15},
  pages     = {2110--2120},
  year      = {2020},
  url       = {https://doi.org/10.1109/TIFS.2019.2957974},
  doi       = {10.1109/TIFS.2019.2957974},
  timestamp = {Thu, 06 Aug 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/tifs/JatiGCSC20.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/JiangXS0H20,
  author    = {Xinghao Jiang and
               Qiang Xu and
               Tanfeng Sun and
               Bin Li and
               Peisong He},
  title     = {Detection of {HEVC} Double Compression With the Same Coding Parameters
               Based on Analysis of Intra Coding Quality Degradation Process},
  journal   = {{IEEE} Trans. Inf. Forensics Secur.},
  volume    = {15},
  pages     = {250--263},
  year      = {2020},
  url       = {https://doi.org/10.1109/TIFS.2019.2918085},
  doi       = {10.1109/TIFS.2019.2918085},
  timestamp = {Thu, 06 Aug 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/tifs/JiangXS0H20.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/JoshiK20,
  author    = {Sharad Joshi and
               Nitin Khanna},
  title     = {Source Printer Classification Using Printer Specific Local Texture
               Descriptor},
  journal   = {{IEEE} Trans. Inf. Forensics Secur.},
  volume    = {15},
  pages     = {160--171},
  year      = {2020},
  url       = {https://doi.org/10.1109/TIFS.2019.2919869},
  doi       = {10.1109/TIFS.2019.2919869},
  timestamp = {Thu, 06 Aug 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/tifs/JoshiK20.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/KangLH20,
  author    = {Jin Sung Kang and
               Yuri Lawryshyn and
               Dimitrios Hatzinakos},
  title     = {Neural Network Architecture and Transient Evoked Otoacoustic Emission
               {(TEOAE)} Biometrics for Identification and Verification},
  journal   = {{IEEE} Trans. Inf. Forensics Secur.},
  volume    = {15},
  pages     = {1858--1867},
  year      = {2020},
  url       = {https://doi.org/10.1109/TIFS.2019.2951310},
  doi       = {10.1109/TIFS.2019.2951310},
  timestamp = {Thu, 06 Aug 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/tifs/KangLH20.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/KangLLD20,
  author    = {Wenxiong Kang and
               Hongda Liu and
               Wei Luo and
               Feiqi Deng},
  title     = {Study of a Full-View 3D Finger Vein Verification Technique},
  journal   = {{IEEE} Trans. Inf. Forensics Secur.},
  volume    = {15},
  pages     = {1175--1189},
  year      = {2020},
  url       = {https://doi.org/10.1109/TIFS.2019.2928507},
  doi       = {10.1109/TIFS.2019.2928507},
  timestamp = {Sat, 09 Apr 2022 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/tifs/KangLLD20.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/KangS0F20,
  author    = {Jian Kang and
               Douglas Steiert and
               Dan Lin and
               Yanjie Fu},
  title     = {MoveWithMe: Location Privacy Preservation for Smartphone Users},
  journal   = {{IEEE} Trans. Inf. Forensics Secur.},
  volume    = {15},
  pages     = {711--724},
  year      = {2020},
  url       = {https://doi.org/10.1109/TIFS.2019.2928205},
  doi       = {10.1109/TIFS.2019.2928205},
  timestamp = {Thu, 06 Aug 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/tifs/KangS0F20.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/KangYGPS20,
  author    = {Heedo Kang and
               Vinod Yegneswaran and
               Shalini Ghosh and
               Phillip A. Porras and
               Seungwon Shin},
  title     = {Automated Permission Model Generation for Securing {SDN} Control-Plane},
  journal   = {{IEEE} Trans. Inf. Forensics Secur.},
  volume    = {15},
  pages     = {1668--1682},
  year      = {2020},
  url       = {https://doi.org/10.1109/TIFS.2019.2946928},
  doi       = {10.1109/TIFS.2019.2946928},
  timestamp = {Mon, 20 Sep 2021 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/tifs/KangYGPS20.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/KarimiTC20,
  author    = {Ali Karimi and
               Abbas Taherpour and
               Danijela Cabric},
  title     = {Smart Traffic-Aware Primary User Emulation Attack and Its Impact on
               Secondary User Throughput Under Rayleigh Flat Fading Channel},
  journal   = {{IEEE} Trans. Inf. Forensics Secur.},
  volume    = {15},
  pages     = {66--80},
  year      = {2020},
  url       = {https://doi.org/10.1109/TIFS.2019.2911168},
  doi       = {10.1109/TIFS.2019.2911168},
  timestamp = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/tifs/KarimiTC20.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/KimLOJ20,
  author    = {Miran Kim and
               Junghye Lee and
               Lucila Ohno{-}Machado and
               Xiaoqian Jiang},
  title     = {Secure and Differentially Private Logistic Regression for Horizontally
               Distributed Data},
  journal   = {{IEEE} Trans. Inf. Forensics Secur.},
  volume    = {15},
  pages     = {695--710},
  year      = {2020},
  url       = {https://doi.org/10.1109/TIFS.2019.2925496},
  doi       = {10.1109/TIFS.2019.2925496},
  timestamp = {Thu, 06 Aug 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/tifs/KimLOJ20.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/KimS20,
  author    = {Kwang{-}Yul Kim and
               Yoan Shin},
  title     = {Analysis on Cross-Correlation Coefficient for Survivability of Chirp
               Spread Spectrum Systems},
  journal   = {{IEEE} Trans. Inf. Forensics Secur.},
  volume    = {15},
  pages     = {1959--1967},
  year      = {2020},
  url       = {https://doi.org/10.1109/TIFS.2019.2953332},
  doi       = {10.1109/TIFS.2019.2953332},
  timestamp = {Thu, 06 Aug 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/tifs/KimS20.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/KimYL20,
  author    = {Minchul Kim and
               Heecheol Yang and
               Jungwoo Lee},
  title     = {Private Coded Matrix Multiplication},
  journal   = {{IEEE} Trans. Inf. Forensics Secur.},
  volume    = {15},
  pages     = {1434--1443},
  year      = {2020},
  url       = {https://doi.org/10.1109/TIFS.2019.2940895},
  doi       = {10.1109/TIFS.2019.2940895},
  timestamp = {Wed, 26 Aug 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/tifs/KimYL20.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/KokulFSRP20,
  author    = {Thanikasalam Kokul and
               Clinton Fookes and
               Sridha Sridharan and
               Amirthalingam Ramanan and
               Amalka Pinidiyaarachchi},
  title     = {Target-Specific Siamese Attention Network for Real-Time Object Tracking},
  journal   = {{IEEE} Trans. Inf. Forensics Secur.},
  volume    = {15},
  pages     = {1276--1289},
  year      = {2020},
  url       = {https://doi.org/10.1109/TIFS.2019.2935871},
  doi       = {10.1109/TIFS.2019.2935871},
  timestamp = {Sun, 25 Jul 2021 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/tifs/KokulFSRP20.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/KrishnamurthyKK20,
  author    = {Prashanth Krishnamurthy and
               Ramesh Karri and
               Farshad Khorrami},
  title     = {Anomaly Detection in Real-Time Multi-Threaded Processes Using Hardware
               Performance Counters},
  journal   = {{IEEE} Trans. Inf. Forensics Secur.},
  volume    = {15},
  pages     = {666--680},
  year      = {2020},
  url       = {https://doi.org/10.1109/TIFS.2019.2923577},
  doi       = {10.1109/TIFS.2019.2923577},
  timestamp = {Thu, 06 Aug 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/tifs/KrishnamurthyKK20.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/KurtY020,
  author    = {Mehmet Necip Kurt and
               Yasin Yilmaz and
               Xiaodong Wang},
  title     = {Secure Distributed Dynamic State Estimation in Wide-Area Smart Grids},
  journal   = {{IEEE} Trans. Inf. Forensics Secur.},
  volume    = {15},
  pages     = {800--815},
  year      = {2020},
  url       = {https://doi.org/10.1109/TIFS.2019.2928207},
  doi       = {10.1109/TIFS.2019.2928207},
  timestamp = {Thu, 06 Aug 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/tifs/KurtY020.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/KuzuPMC20,
  author    = {Ridvan Salih Kuzu and
               Emanuela Piciucco and
               Emanuele Maiorana and
               Patrizio Campisi},
  title     = {On-the-Fly Finger-Vein-Based Biometric Recognition Using Deep Neural
               Networks},
  journal   = {{IEEE} Trans. Inf. Forensics Secur.},
  volume    = {15},
  pages     = {2641--2654},
  year      = {2020},
  url       = {https://doi.org/10.1109/TIFS.2020.2971144},
  doi       = {10.1109/TIFS.2020.2971144},
  timestamp = {Thu, 06 Aug 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/tifs/KuzuPMC20.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/KwonKYC20,
  author    = {Hyun Kwon and
               Yongchul Kim and
               Hyunsoo Yoon and
               Daeseon Choi},
  title     = {Selective Audio Adversarial Example in Evasion Attack on Speech Recognition
               System},
  journal   = {{IEEE} Trans. Inf. Forensics Secur.},
  volume    = {15},
  pages     = {526--538},
  year      = {2020},
  url       = {https://doi.org/10.1109/TIFS.2019.2925452},
  doi       = {10.1109/TIFS.2019.2925452},
  timestamp = {Thu, 06 Aug 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/tifs/KwonKYC20.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/KwonNLHH20,
  author    = {Hyunsoo Kwon and
               Hyunjae Nam and
               Sangtae Lee and
               Changhee Hahn and
               Junbeom Hur},
  title     = {(In-)Security of Cookies in {HTTPS:} Cookie Theft by Removing Cookie
               Flags},
  journal   = {{IEEE} Trans. Inf. Forensics Secur.},
  volume    = {15},
  pages     = {1204--1215},
  year      = {2020},
  url       = {https://doi.org/10.1109/TIFS.2019.2938416},
  doi       = {10.1109/TIFS.2019.2938416},
  timestamp = {Thu, 03 Sep 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/tifs/KwonNLHH20.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/LSSBC20,
  author    = {Navaneet K. L. and
               Ravi Kiran Sarvadevabhatla and
               Shashank Shekhar and
               R. Venkatesh Babu and
               Anirban Chakraborty},
  title     = {Operator-in-the-Loop Deep Sequential Multi-Camera Feature Fusion for
               Person Re-Identification},
  journal   = {{IEEE} Trans. Inf. Forensics Secur.},
  volume    = {15},
  pages     = {2375--2385},
  year      = {2020},
  url       = {https://doi.org/10.1109/TIFS.2019.2957701},
  doi       = {10.1109/TIFS.2019.2957701},
  timestamp = {Sat, 12 Jun 2021 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/tifs/LSSBC20.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/LaiZJ20,
  author    = {Songxuan Lai and
               Yecheng Zhu and
               Lianwen Jin},
  title     = {Encoding Pathlet and {SIFT} Features With Bagged {VLAD} for Historical
               Writer Identification},
  journal   = {{IEEE} Trans. Inf. Forensics Secur.},
  volume    = {15},
  pages     = {3553--3566},
  year      = {2020},
  url       = {https://doi.org/10.1109/TIFS.2020.2991880},
  doi       = {10.1109/TIFS.2020.2991880},
  timestamp = {Thu, 06 Aug 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/tifs/LaiZJ20.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/LanRCC20,
  author    = {Xiaolong Lan and
               Juanjuan Ren and
               Qingchun Chen and
               Lin Cai},
  title     = {Achievable Secrecy Rate Region for Buffer-Aided Multiuser {MISO} Systems},
  journal   = {{IEEE} Trans. Inf. Forensics Secur.},
  volume    = {15},
  pages     = {3311--3324},
  year      = {2020},
  url       = {https://doi.org/10.1109/TIFS.2020.2988567},
  doi       = {10.1109/TIFS.2020.2988567},
  timestamp = {Mon, 03 Jan 2022 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/journals/tifs/LanRCC20.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/LeeLC20,
  author    = {Kisong Lee and
               Jin{-}Taek Lim and
               Hyun{-}Ho Choi},
  title     = {Impact of Outdated {CSI} on the Secrecy Performance of Wireless-Powered
               Untrusted Relay Networks},
  journal   = {{IEEE} Trans. Inf. Forensics Secur.},
  volume    = {15},
  pages     = {1423--1433},
  year      = {2020},
  url       = {https://doi.org/10.1109/TIFS.2019.2940906},
  doi       = {10.1109/TIFS.2019.2940906},
  timestamp = {Thu, 06 Aug 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/tifs/LeeLC20.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/LejbolleNKM20,
  author    = {Aske R. Lejb{\o}lle and
               Kamal Nasrollahi and
               Benjamin Krogh and
               Thomas B. Moeslund},
  title     = {Person Re-Identification Using Spatial and Layer-Wise Attention},
  journal   = {{IEEE} Trans. Inf. Forensics Secur.},
  volume    = {15},
  pages     = {1216--1231},
  year      = {2020},
  url       = {https://doi.org/10.1109/TIFS.2019.2938870},
  doi       = {10.1109/TIFS.2019.2938870},
  timestamp = {Sat, 05 Sep 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/tifs/LejbolleNKM20.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/LetafatiKB20,
  author    = {Mehdi Letafati and
               Ali Kuhestani and
               Hamid Behroozi},
  title     = {Three-Hop Untrusted Relay Networks With Hardware Imperfections and
               Channel Estimation Errors for Internet of Things},
  journal   = {{IEEE} Trans. Inf. Forensics Secur.},
  volume    = {15},
  pages     = {2856--2868},
  year      = {2020},
  url       = {https://doi.org/10.1109/TIFS.2020.2978627},
  doi       = {10.1109/TIFS.2020.2978627},
  timestamp = {Thu, 06 Aug 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/tifs/LetafatiKB20.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/Li020,
  author    = {Quanzhong Li and
               Liang Yang},
  title     = {Beamforming for Cooperative Secure Transmission in Cognitive Two-Way
               Relay Networks},
  journal   = {{IEEE} Trans. Inf. Forensics Secur.},
  volume    = {15},
  pages     = {130--143},
  year      = {2020},
  url       = {https://doi.org/10.1109/TIFS.2019.2918431},
  doi       = {10.1109/TIFS.2019.2918431},
  timestamp = {Thu, 06 Aug 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/tifs/Li020.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/LiL20,
  author    = {Deqiang Li and
               Qianmu Li},
  title     = {Adversarial Deep Ensemble: Evasion Attacks and Defenses for Malware
               Detection},
  journal   = {{IEEE} Trans. Inf. Forensics Secur.},
  volume    = {15},
  pages     = {3886--3900},
  year      = {2020},
  url       = {https://doi.org/10.1109/TIFS.2020.3003571},
  doi       = {10.1109/TIFS.2020.3003571},
  timestamp = {Thu, 06 Aug 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/tifs/LiL20.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/LiLL20,
  author    = {Xiong Li and
               Shanpeng Liu and
               Rongxing Lu},
  title     = {Comments on "A Public Auditing Protocol With Novel Dynamic Structure
               for Cloud Data"},
  journal   = {{IEEE} Trans. Inf. Forensics Secur.},
  volume    = {15},
  pages     = {2881--2883},
  year      = {2020},
  url       = {https://doi.org/10.1109/TIFS.2020.2978592},
  doi       = {10.1109/TIFS.2020.2978592},
  timestamp = {Thu, 06 Aug 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/tifs/LiLL20.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/LiPST20,
  author    = {Jing Li and
               Yuangang Pan and
               Yulei Sui and
               Ivor W. Tsang},
  title     = {Secure Metric Learning via Differential Pairwise Privacy},
  journal   = {{IEEE} Trans. Inf. Forensics Secur.},
  volume    = {15},
  pages     = {3640--3652},
  year      = {2020},
  url       = {https://doi.org/10.1109/TIFS.2020.2997183},
  doi       = {10.1109/TIFS.2020.2997183},
  timestamp = {Thu, 06 Aug 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/tifs/LiPST20.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/LiTWLH20,
  author    = {Zhihang Li and
               Xu Tang and
               Xiang Wu and
               Jingtuo Liu and
               Ran He},
  title     = {Progressively Refined Face Detection Through Semantics-Enriched Representation
               Learning},
  journal   = {{IEEE} Trans. Inf. Forensics Secur.},
  volume    = {15},
  pages     = {1394--1406},
  year      = {2020},
  url       = {https://doi.org/10.1109/TIFS.2019.2941800},
  doi       = {10.1109/TIFS.2019.2941800},
  timestamp = {Thu, 06 Aug 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/tifs/LiTWLH20.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/LiXFWZ20,
  author    = {Xinyu Li and
               Jing Xu and
               Xiong Fan and
               Yuchen Wang and
               Zhenfeng Zhang},
  title     = {Puncturable Signatures and Applications in Proof-of-Stake Blockchain
               Protocols},
  journal   = {{IEEE} Trans. Inf. Forensics Secur.},
  volume    = {15},
  pages     = {3872--3885},
  year      = {2020},
  url       = {https://doi.org/10.1109/TIFS.2020.3001738},
  doi       = {10.1109/TIFS.2020.3001738},
  timestamp = {Wed, 30 Jun 2021 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/tifs/LiXFWZ20.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/LiXWYYH20,
  author    = {Shaohua Li and
               Kaiping Xue and
               David S. L. Wei and
               Hao Yue and
               Nenghai Yu and
               Peilin Hong},
  title     = {SecGrid: {A} Secure and Efficient SGX-Enabled Smart Grid System With
               Rich Functionalities},
  journal   = {{IEEE} Trans. Inf. Forensics Secur.},
  volume    = {15},
  pages     = {1318--1330},
  year      = {2020},
  url       = {https://doi.org/10.1109/TIFS.2019.2938875},
  doi       = {10.1109/TIFS.2019.2938875},
  timestamp = {Thu, 06 Aug 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/tifs/LiXWYYH20.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/LiY0AZ020,
  author    = {Donghe Li and
               Qingyu Yang and
               Wei Yu and
               Dou An and
               Yang Zhang and
               Wei Zhao},
  title     = {Towards Differential Privacy-Based Online Double Auction for Smart
               Grid},
  journal   = {{IEEE} Trans. Inf. Forensics Secur.},
  volume    = {15},
  pages     = {971--986},
  year      = {2020},
  url       = {https://doi.org/10.1109/TIFS.2019.2932911},
  doi       = {10.1109/TIFS.2019.2932911},
  timestamp = {Thu, 06 Aug 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/tifs/LiY0AZ020.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/Liang0L20,
  author    = {Yuan Liang and
               Jian Ren and
               Tongtong Li},
  title     = {Secure {OFDM} System Design and Capacity Analysis Under Disguised
               Jamming},
  journal   = {{IEEE} Trans. Inf. Forensics Secur.},
  volume    = {15},
  pages     = {738--752},
  year      = {2020},
  url       = {https://doi.org/10.1109/TIFS.2019.2929449},
  doi       = {10.1109/TIFS.2019.2929449},
  timestamp = {Thu, 06 Aug 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/tifs/Liang0L20.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/LiangL20,
  author    = {Yuan Liang and
               Tongtong Li},
  title     = {On the Discreteness of the Worst Jamming Distribution for {SP-OFDM}},
  journal   = {{IEEE} Trans. Inf. Forensics Secur.},
  volume    = {15},
  pages     = {2884--2897},
  year      = {2020},
  url       = {https://doi.org/10.1109/TIFS.2020.2978616},
  doi       = {10.1109/TIFS.2020.2978616},
  timestamp = {Thu, 06 Aug 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/tifs/LiangL20.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/LiangLCJXY20,
  author    = {Hongliang Liang and
               Mingyu Li and
               Yixiu Chen and
               Lin Jiang and
               Zhuosi Xie and
               Tianqi Yang},
  title     = {Establishing Trusted {I/O} Paths for {SGX} Client Systems With Aurora},
  journal   = {{IEEE} Trans. Inf. Forensics Secur.},
  volume    = {15},
  pages     = {1589--1600},
  year      = {2020},
  url       = {https://doi.org/10.1109/TIFS.2019.2945621},
  doi       = {10.1109/TIFS.2019.2945621},
  timestamp = {Wed, 22 Jun 2022 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/tifs/LiangLCJXY20.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/LimPXC20,
  author    = {Hoon Wei Lim and
               Geong Sen Poh and
               Jia Xu and
               Varsha Chittawar},
  title     = {\emph{PrivateLink}: Privacy-Preserving Integration and Sharing of
               Datasets},
  journal   = {{IEEE} Trans. Inf. Forensics Secur.},
  volume    = {15},
  pages     = {564--577},
  year      = {2020},
  url       = {https://doi.org/10.1109/TIFS.2019.2924201},
  doi       = {10.1109/TIFS.2019.2924201},
  timestamp = {Thu, 06 Aug 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/tifs/LimPXC20.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/LimSJ20,
  author    = {Sehee Lim and
               Byungkyu Song and
               Seong{-}Ook Jung},
  title     = {Highly Independent MTJ-Based {PUF} System Using Diode-Connected Transistor
               and Two-Step Postprocessing for Improved Response Stability},
  journal   = {{IEEE} Trans. Inf. Forensics Secur.},
  volume    = {15},
  pages     = {2798--2807},
  year      = {2020},
  url       = {https://doi.org/10.1109/TIFS.2020.2976623},
  doi       = {10.1109/TIFS.2020.2976623},
  timestamp = {Thu, 06 Aug 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/tifs/LimSJ20.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/LimcharoenKN20,
  author    = {Piya Limcharoen and
               Nirattaya Khamsemanan and
               Cholwich Nattee},
  title     = {View-Independent Gait Recognition Using Joint Replacement Coordinates
               (JRCs) and Convolutional Neural Network},
  journal   = {{IEEE} Trans. Inf. Forensics Secur.},
  volume    = {15},
  pages     = {3430--3442},
  year      = {2020},
  url       = {https://doi.org/10.1109/TIFS.2020.2985535},
  doi       = {10.1109/TIFS.2020.2985535},
  timestamp = {Mon, 03 Jan 2022 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/journals/tifs/LimcharoenKN20.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/LinHHKC20,
  author    = {Chao Lin and
               Debiao He and
               Xinyi Huang and
               Muhammad Khurram Khan and
               Kim{-}Kwang Raymond Choo},
  title     = {{DCAP:} {A} Secure and Efficient Decentralized Conditional Anonymous
               Payment System Based on Blockchain},
  journal   = {{IEEE} Trans. Inf. Forensics Secur.},
  volume    = {15},
  pages     = {2440--2452},
  year      = {2020},
  url       = {https://doi.org/10.1109/TIFS.2020.2969565},
  doi       = {10.1109/TIFS.2020.2969565},
  timestamp = {Thu, 24 Feb 2022 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/journals/tifs/LinHHKC20.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/LiuCLSQ20,
  author    = {Lin Liu and
               Rongmao Chen and
               Ximeng Liu and
               Jinshu Su and
               Linbo Qiao},
  title     = {Towards Practical Privacy-Preserving Decision Tree Training and Evaluation
               in the Cloud},
  journal   = {{IEEE} Trans. Inf. Forensics Secur.},
  volume    = {15},
  pages     = {2914--2929},
  year      = {2020},
  url       = {https://doi.org/10.1109/TIFS.2020.2980192},
  doi       = {10.1109/TIFS.2020.2980192},
  timestamp = {Thu, 06 Aug 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/tifs/LiuCLSQ20.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/LiuGYK20,
  author    = {Xiaofeng Liu and
               Zhenhua Guo and
               Jane You and
               B. V. K. Vijaya Kumar},
  title     = {Dependency-Aware Attention Control for Image Set-Based Face Recognition},
  journal   = {{IEEE} Trans. Inf. Forensics Secur.},
  volume    = {15},
  pages     = {1501--1512},
  year      = {2020},
  url       = {https://doi.org/10.1109/TIFS.2019.2938418},
  doi       = {10.1109/TIFS.2019.2938418},
  timestamp = {Mon, 20 Sep 2021 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/tifs/LiuGYK20.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/LiuK20,
  author    = {Xudong Liu and
               Sang Wu Kim},
  title     = {Harnessing Node Multiplicity for Detecting and Mitigating False Data
               in Wireless Relay Networks},
  journal   = {{IEEE} Trans. Inf. Forensics Secur.},
  volume    = {15},
  pages     = {3067--3078},
  year      = {2020},
  url       = {https://doi.org/10.1109/TIFS.2020.2980199},
  doi       = {10.1109/TIFS.2020.2980199},
  timestamp = {Thu, 06 Aug 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/tifs/LiuK20.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/LiuLH20,
  author    = {Xiang Liu and
               Teng Joon Lim and
               Jie Huang},
  title     = {Optimal Byzantine Attacker Identification Based on Game Theory in
               Network Coding Enabled Wireless Ad Hoc Networks},
  journal   = {{IEEE} Trans. Inf. Forensics Secur.},
  volume    = {15},
  pages     = {2570--2583},
  year      = {2020},
  url       = {https://doi.org/10.1109/TIFS.2020.2972129},
  doi       = {10.1109/TIFS.2020.2972129},
  timestamp = {Fri, 04 Jun 2021 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/tifs/LiuLH20.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/LiuLLS20,
  author    = {Rang Liu and
               Ming Li and
               Qian Liu and
               A. Lee Swindlehurst},
  title     = {Secure Symbol-Level Precoding in {MU-MISO} Wiretap Systems},
  journal   = {{IEEE} Trans. Inf. Forensics Secur.},
  volume    = {15},
  pages     = {3359--3373},
  year      = {2020},
  url       = {https://doi.org/10.1109/TIFS.2020.2988127},
  doi       = {10.1109/TIFS.2020.2988127},
  timestamp = {Sat, 05 Sep 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/tifs/LiuLLS20.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/LiuLSZL20,
  author    = {Yang Liu and
               Ting Liu and
               Hong Sun and
               Kehuan Zhang and
               Pengfei Liu},
  title     = {Hidden Electricity Theft by Exploiting Multiple-Pricing Scheme in
               Smart Grids},
  journal   = {{IEEE} Trans. Inf. Forensics Secur.},
  volume    = {15},
  pages     = {2453--2468},
  year      = {2020},
  url       = {https://doi.org/10.1109/TIFS.2020.2965276},
  doi       = {10.1109/TIFS.2020.2965276},
  timestamp = {Thu, 06 Aug 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/tifs/LiuLSZL20.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/MaJZTP20,
  author    = {Fei Ma and
               Xiao{-}Yuan Jing and
               Xiao Zhu and
               Zhenmin Tang and
               Zhiping Peng},
  title     = {True-Color and Grayscale Video Person Re-Identification},
  journal   = {{IEEE} Trans. Inf. Forensics Secur.},
  volume    = {15},
  pages     = {115--129},
  year      = {2020},
  url       = {https://doi.org/10.1109/TIFS.2019.2917160},
  doi       = {10.1109/TIFS.2019.2917160},
  timestamp = {Mon, 26 Oct 2020 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/journals/tifs/MaJZTP20.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/MandelliBVT20,
  author    = {Sara Mandelli and
               Paolo Bestagini and
               Luisa Verdoliva and
               Stefano Tubaro},
  title     = {Facing Device Attribution Problem for Stabilized Video Sequences},
  journal   = {{IEEE} Trans. Inf. Forensics Secur.},
  volume    = {15},
  pages     = {14--27},
  year      = {2020},
  url       = {https://doi.org/10.1109/TIFS.2019.2918644},
  doi       = {10.1109/TIFS.2019.2918644},
  timestamp = {Thu, 06 Aug 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/tifs/MandelliBVT20.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/MaternRS20,
  author    = {Falko Matern and
               Christian Riess and
               Marc Stamminger},
  title     = {Gradient-Based Illumination Description for Image Forgery Detection},
  journal   = {{IEEE} Trans. Inf. Forensics Secur.},
  volume    = {15},
  pages     = {1303--1317},
  year      = {2020},
  url       = {https://doi.org/10.1109/TIFS.2019.2935913},
  doi       = {10.1109/TIFS.2019.2935913},
  timestamp = {Thu, 06 Aug 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/tifs/MaternRS20.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/MatkowskiCK20,
  author    = {Wojciech Michal Matkowski and
               Tingting Chai and
               Adams Wai{-}Kin Kong},
  title     = {Palmprint Recognition in Uncontrolled and Uncooperative Environment},
  journal   = {{IEEE} Trans. Inf. Forensics Secur.},
  volume    = {15},
  pages     = {1601--1615},
  year      = {2020},
  url       = {https://doi.org/10.1109/TIFS.2019.2945183},
  doi       = {10.1109/TIFS.2019.2945183},
  timestamp = {Tue, 26 Jan 2021 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/journals/tifs/MatkowskiCK20.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/MayerS20,
  author    = {Owen Mayer and
               Matthew C. Stamm},
  title     = {Forensic Similarity for Digital Images},
  journal   = {{IEEE} Trans. Inf. Forensics Secur.},
  volume    = {15},
  pages     = {1331--1346},
  year      = {2020},
  url       = {https://doi.org/10.1109/TIFS.2019.2924552},
  doi       = {10.1109/TIFS.2019.2924552},
  timestamp = {Thu, 06 Aug 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/tifs/MayerS20.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/MingZCLYZ20,
  author    = {Jingdian Ming and
               Yongbin Zhou and
               Wei Cheng and
               Huizhong Li and
               Guang Yang and
               Qian Zhang},
  title     = {Mind the Balance: Revealing the Vulnerabilities in Low Entropy Masking
               Schemes},
  journal   = {{IEEE} Trans. Inf. Forensics Secur.},
  volume    = {15},
  pages     = {3694--3708},
  year      = {2020},
  url       = {https://doi.org/10.1109/TIFS.2020.2994775},
  doi       = {10.1109/TIFS.2020.2994775},
  timestamp = {Fri, 11 Mar 2022 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/journals/tifs/MingZCLYZ20.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/MirandaKBGK20,
  author    = {Christian Miranda and
               Georges Kaddoum and
               Elias Bou{-}Harb and
               Sahil Garg and
               Kuljeet Kaur},
  title     = {A Collaborative Security Framework for Software-Defined Wireless Sensor
               Networks},
  journal   = {{IEEE} Trans. Inf. Forensics Secur.},
  volume    = {15},
  pages     = {2602--2615},
  year      = {2020},
  url       = {https://doi.org/10.1109/TIFS.2020.2973875},
  doi       = {10.1109/TIFS.2020.2973875},
  timestamp = {Thu, 06 Aug 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/tifs/MirandaKBGK20.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/MutanganaT20,
  author    = {Jean de Dieu Mutangana and
               Ravi Tandon},
  title     = {Blind {MIMO} Cooperative Jamming: Secrecy via {ISI} Heterogeneity
               Without {CSIT}},
  journal   = {{IEEE} Trans. Inf. Forensics Secur.},
  volume    = {15},
  pages     = {447--461},
  year      = {2020},
  url       = {https://doi.org/10.1109/TIFS.2019.2923340},
  doi       = {10.1109/TIFS.2019.2923340},
  timestamp = {Thu, 06 Aug 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/tifs/MutanganaT20.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/NaghizadehL20,
  author    = {Parinaz Naghizadeh and
               Mingyan Liu},
  title     = {Using Private and Public Assessments in Security Information Sharing
               Agreements},
  journal   = {{IEEE} Trans. Inf. Forensics Secur.},
  volume    = {15},
  pages     = {1801--1814},
  year      = {2020},
  url       = {https://doi.org/10.1109/TIFS.2019.2950125},
  doi       = {10.1109/TIFS.2019.2950125},
  timestamp = {Thu, 06 Aug 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/tifs/NaghizadehL20.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/NathBBR20,
  author    = {Atul Prasad Deb Nath and
               Srivalli Boddupalli and
               Swarup Bhunia and
               Sandip Ray},
  title     = {Resilient System-on-Chip Designs With NoC Fabrics},
  journal   = {{IEEE} Trans. Inf. Forensics Secur.},
  volume    = {15},
  pages     = {2808--2823},
  year      = {2020},
  url       = {https://doi.org/10.1109/TIFS.2020.2977534},
  doi       = {10.1109/TIFS.2020.2977534},
  timestamp = {Thu, 06 Aug 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/tifs/NathBBR20.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/Nieto20,
  author    = {Ana Nieto},
  title     = {Becoming {JUDAS:} Correlating Users and Devices During a Digital Investigation},
  journal   = {{IEEE} Trans. Inf. Forensics Secur.},
  volume    = {15},
  pages     = {3325--3334},
  year      = {2020},
  url       = {https://doi.org/10.1109/TIFS.2020.2988602},
  doi       = {10.1109/TIFS.2020.2988602},
  timestamp = {Thu, 06 Aug 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/tifs/Nieto20.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/OsorioAO20,
  author    = {Diana Pamela Moya Osorio and
               Hirley Alves and
               Edgar Eduardo Benitez Olivo},
  title     = {On the Secrecy Performance and Power Allocation in Relaying Networks
               With Untrusted Relay in the Partial Secrecy Regime},
  journal   = {{IEEE} Trans. Inf. Forensics Secur.},
  volume    = {15},
  pages     = {2268--2281},
  year      = {2020},
  url       = {https://doi.org/10.1109/TIFS.2019.2959920},
  doi       = {10.1109/TIFS.2019.2959920},
  timestamp = {Thu, 06 Aug 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/tifs/OsorioAO20.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/PalaniswamyCFP20,
  author    = {Basker Palaniswamy and
               Seyit Camtepe and
               Ernest Foo and
               Josef Pieprzyk},
  title     = {An Efficient Authentication Scheme for Intra-Vehicular Controller
               Area Network},
  journal   = {{IEEE} Trans. Inf. Forensics Secur.},
  volume    = {15},
  pages     = {3107--3122},
  year      = {2020},
  url       = {https://doi.org/10.1109/TIFS.2020.2983285},
  doi       = {10.1109/TIFS.2020.2983285},
  timestamp = {Thu, 06 Aug 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/tifs/PalaniswamyCFP20.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/PangCWL20,
  author    = {Meng Pang and
               Yiu{-}Ming Cheung and
               Binghui Wang and
               Jian Lou},
  title     = {Synergistic Generic Learning for Face Recognition From a Contaminated
               Single Sample per Person},
  journal   = {{IEEE} Trans. Inf. Forensics Secur.},
  volume    = {15},
  pages     = {195--209},
  year      = {2020},
  url       = {https://doi.org/10.1109/TIFS.2019.2919950},
  doi       = {10.1109/TIFS.2019.2919950},
  timestamp = {Thu, 03 Sep 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/tifs/PangCWL20.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/PapadamouGXSZCT20,
  author    = {Kostantinos Papadamou and
               Steven Gevers and
               Christos Xenakis and
               Michael Sirivianos and
               Savvas Zannettou and
               Bogdan Chifor and
               Sorin Teican and
               George Gugulea and
               Alberto Caponi and
               Annamaria Recupero and
               Claudio Pisa and
               Giuseppe Bianchi},
  title     = {Killing the Password and Preserving Privacy With Device-Centric and
               Attribute-Based Authentication},
  journal   = {{IEEE} Trans. Inf. Forensics Secur.},
  volume    = {15},
  pages     = {2183--2193},
  year      = {2020},
  url       = {https://doi.org/10.1109/TIFS.2019.2958763},
  doi       = {10.1109/TIFS.2019.2958763},
  timestamp = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/tifs/PapadamouGXSZCT20.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/PengW0G20,
  author    = {Chunlei Peng and
               Nannan Wang and
               Jie Li and
               Xinbo Gao},
  title     = {Face Sketch Synthesis in the Wild via Deep Patch Representation-Based
               Probabilistic Graphical Model},
  journal   = {{IEEE} Trans. Inf. Forensics Secur.},
  volume    = {15},
  pages     = {172--183},
  year      = {2020},
  url       = {https://doi.org/10.1109/TIFS.2019.2916633},
  doi       = {10.1109/TIFS.2019.2916633},
  timestamp = {Mon, 20 Sep 2021 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/tifs/PengW0G20.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/PintoGFCPR20,
  author    = {Allan da Silva Pinto and
               Siome Goldenstein and
               Alexandre M. Ferreira and
               Tiago Carvalho and
               H{\'{e}}lio Pedrini and
               Anderson Rocha},
  title     = {Leveraging Shape, Reflectance and Albedo From Shading for Face Presentation
               Attack Detection},
  journal   = {{IEEE} Trans. Inf. Forensics Secur.},
  volume    = {15},
  pages     = {3347--3358},
  year      = {2020},
  url       = {https://doi.org/10.1109/TIFS.2020.2988168},
  doi       = {10.1109/TIFS.2020.2988168},
  timestamp = {Sat, 09 Apr 2022 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/tifs/PintoGFCPR20.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/PraseedT20,
  author    = {Amit Praseed and
               P. Santhi Thilagam},
  title     = {Multiplexed Asymmetric Attacks: Next-Generation DDoS on {HTTP/2} Servers},
  journal   = {{IEEE} Trans. Inf. Forensics Secur.},
  volume    = {15},
  pages     = {1790--1800},
  year      = {2020},
  url       = {https://doi.org/10.1109/TIFS.2019.2950121},
  doi       = {10.1109/TIFS.2019.2950121},
  timestamp = {Thu, 06 Aug 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/tifs/PraseedT20.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/QinLWLGG20,
  author    = {Tao Qin and
               Zhaoli Liu and
               Pinghui Wang and
               Shancang Li and
               Xiaohong Guan and
               Lixin Gao},
  title     = {Symmetry Degree Measurement and its Applications to Anomaly Detection},
  journal   = {{IEEE} Trans. Inf. Forensics Secur.},
  volume    = {15},
  pages     = {1040--1055},
  year      = {2020},
  url       = {https://doi.org/10.1109/TIFS.2019.2933731},
  doi       = {10.1109/TIFS.2019.2933731},
  timestamp = {Sat, 28 Aug 2021 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/tifs/QinLWLGG20.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/RassouliG20,
  author    = {Borzoo Rassouli and
               Deniz G{\"{u}}nd{\"{u}}z},
  title     = {Optimal Utility-Privacy Trade-Off With Total Variation Distance as
               a Privacy Measure},
  journal   = {{IEEE} Trans. Inf. Forensics Secur.},
  volume    = {15},
  pages     = {594--603},
  year      = {2020},
  url       = {https://doi.org/10.1109/TIFS.2019.2903658},
  doi       = {10.1109/TIFS.2019.2903658},
  timestamp = {Thu, 06 Aug 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/tifs/RassouliG20.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/RassouliRG20,
  author    = {Borzoo Rassouli and
               Fernando E. Rosas and
               Deniz G{\"{u}}nd{\"{u}}z},
  title     = {Data Disclosure Under Perfect Sample Privacy},
  journal   = {{IEEE} Trans. Inf. Forensics Secur.},
  volume    = {15},
  pages     = {2012--2025},
  year      = {2020},
  url       = {https://doi.org/10.1109/TIFS.2019.2954652},
  doi       = {10.1109/TIFS.2019.2954652},
  timestamp = {Thu, 06 Aug 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/tifs/RassouliRG20.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/RavivK20,
  author    = {Netanel Raviv and
               David A. Karpuk},
  title     = {Private Polynomial Computation From Lagrange Encoding},
  journal   = {{IEEE} Trans. Inf. Forensics Secur.},
  volume    = {15},
  pages     = {553--563},
  year      = {2020},
  url       = {https://doi.org/10.1109/TIFS.2019.2925723},
  doi       = {10.1109/TIFS.2019.2925723},
  timestamp = {Thu, 06 Aug 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/tifs/RavivK20.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/RenLGZL20,
  author    = {Chuan{-}Xian Ren and
               Bo{-}Hua Liang and
               Pengfei Ge and
               Yiming Zhai and
               Zhen Lei},
  title     = {Domain Adaptive Person Re-Identification via Camera Style Generation
               and Label Propagation},
  journal   = {{IEEE} Trans. Inf. Forensics Secur.},
  volume    = {15},
  pages     = {1290--1302},
  year      = {2020},
  url       = {https://doi.org/10.1109/TIFS.2019.2939750},
  doi       = {10.1109/TIFS.2019.2939750},
  timestamp = {Tue, 12 Apr 2022 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/tifs/RenLGZL20.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/SahaJRCBM20,
  author    = {Sayandeep Saha and
               Dirmanto Jap and
               Debapriya Basu Roy and
               Avik Chakraborty and
               Shivam Bhasin and
               Debdeep Mukhopadhyay},
  title     = {A Framework to Counter Statistical Ineffective Fault Analysis of Block
               Ciphers Using Domain Transformation and Error Correction},
  journal   = {{IEEE} Trans. Inf. Forensics Secur.},
  volume    = {15},
  pages     = {1905--1919},
  year      = {2020},
  url       = {https://doi.org/10.1109/TIFS.2019.2952262},
  doi       = {10.1109/TIFS.2019.2952262},
  timestamp = {Thu, 06 Aug 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/tifs/SahaJRCBM20.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/SalamatianHBCM20,
  author    = {Salman Salamatian and
               Wasim Huleihel and
               Ahmad Beirami and
               Asaf Cohen and
               Muriel M{\'{e}}dard},
  title     = {Centralized vs Decentralized Targeted Brute-Force Attacks: Guessing
               With Side-Information},
  journal   = {{IEEE} Trans. Inf. Forensics Secur.},
  volume    = {15},
  pages     = {3749--3759},
  year      = {2020},
  url       = {https://doi.org/10.1109/TIFS.2020.2998949},
  doi       = {10.1109/TIFS.2020.2998949},
  timestamp = {Thu, 06 Aug 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/tifs/SalamatianHBCM20.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/SaxenaCCC20,
  author    = {Neetesh Saxena and
               Mauro Conti and
               Kim{-}Kwang Raymond Choo and
               Narendra S. Chaudhari},
  title     = {{BAS-VAS:} {A} Novel Secure Protocol for Value Added Service Delivery
               to Mobile Devices},
  journal   = {{IEEE} Trans. Inf. Forensics Secur.},
  volume    = {15},
  pages     = {1470--1485},
  year      = {2020},
  url       = {https://doi.org/10.1109/TIFS.2019.2940908},
  doi       = {10.1109/TIFS.2019.2940908},
  timestamp = {Thu, 21 Jan 2021 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/journals/tifs/SaxenaCCC20.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/ScherhagRMB20,
  author    = {Ulrich Scherhag and
               Christian Rathgeb and
               Johannes Merkle and
               Christoph Busch},
  title     = {Deep Face Representations for Differential Morphing Attack Detection},
  journal   = {{IEEE} Trans. Inf. Forensics Secur.},
  volume    = {15},
  pages     = {3625--3639},
  year      = {2020},
  url       = {https://doi.org/10.1109/TIFS.2020.2994750},
  doi       = {10.1109/TIFS.2020.2994750},
  timestamp = {Tue, 05 Jan 2021 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/journals/tifs/ScherhagRMB20.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/SehaH20,
  author    = {Sherif Nagib Abbas Seha and
               Dimitrios Hatzinakos},
  title     = {EEG-Based Human Recognition Using Steady-State AEPs and Subject-Unique
               Spatial Filters},
  journal   = {{IEEE} Trans. Inf. Forensics Secur.},
  volume    = {15},
  pages     = {3901--3910},
  year      = {2020},
  url       = {https://doi.org/10.1109/TIFS.2020.3001729},
  doi       = {10.1109/TIFS.2020.3001729},
  timestamp = {Thu, 06 Aug 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/tifs/SehaH20.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/ShamsabadiGHC20,
  author    = {Ali Shahin Shamsabadi and
               Adri{\`{a}} Gasc{\'{o}}n and
               Hamed Haddadi and
               Andrea Cavallaro},
  title     = {PrivEdge: From Local to Distributed Private Training and Prediction},
  journal   = {{IEEE} Trans. Inf. Forensics Secur.},
  volume    = {15},
  pages     = {3819--3831},
  year      = {2020},
  url       = {https://doi.org/10.1109/TIFS.2020.2988132},
  doi       = {10.1109/TIFS.2020.2988132},
  timestamp = {Thu, 06 Aug 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/tifs/ShamsabadiGHC20.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/ShaoCZW20,
  author    = {Guo{-}lin Shao and
               Xingshu Chen and
               Xuemei Zeng and
               Lina Wang},
  title     = {Deep Learning Hierarchical Representation From Heterogeneous Flow-Level
               Communication Data},
  journal   = {{IEEE} Trans. Inf. Forensics Secur.},
  volume    = {15},
  pages     = {1525--1540},
  year      = {2020},
  url       = {https://doi.org/10.1109/TIFS.2019.2943236},
  doi       = {10.1109/TIFS.2019.2943236},
  timestamp = {Mon, 20 Sep 2021 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/tifs/ShaoCZW20.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/SharifzadehAS20,
  author    = {Mehdi Sharifzadeh and
               Mohammed Aloraini and
               Dan Schonfeld},
  title     = {Adaptive Batch Size Image Merging Steganography and Quantized Gaussian
               Image Steganography},
  journal   = {{IEEE} Trans. Inf. Forensics Secur.},
  volume    = {15},
  pages     = {867--879},
  year      = {2020},
  url       = {https://doi.org/10.1109/TIFS.2019.2929441},
  doi       = {10.1109/TIFS.2019.2929441},
  timestamp = {Thu, 06 Aug 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/tifs/SharifzadehAS20.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/ShenXXXZ20,
  author    = {Zhexian Shen and
               Kui Xu and
               Xiaochen Xia and
               Wei Xie and
               Dongmei Zhang},
  title     = {Spatial Sparsity Based Secure Transmission Strategy for Massive {MIMO}
               Systems Against Simultaneous Jamming and Eavesdropping},
  journal   = {{IEEE} Trans. Inf. Forensics Secur.},
  volume    = {15},
  pages     = {3760--3774},
  year      = {2020},
  url       = {https://doi.org/10.1109/TIFS.2020.3002386},
  doi       = {10.1109/TIFS.2020.3002386},
  timestamp = {Wed, 22 Jun 2022 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/tifs/ShenXXXZ20.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/Shim20,
  author    = {Kyung{-}Ah Shim},
  title     = {Comments on "Revocable and Scalable Certificateless Remote Authentication
               Protocol With Anonymity for Wireless Body Area Networks"},
  journal   = {{IEEE} Trans. Inf. Forensics Secur.},
  volume    = {15},
  pages     = {81--82},
  year      = {2020},
  url       = {https://doi.org/10.1109/TIFS.2018.2871761},
  doi       = {10.1109/TIFS.2018.2871761},
  timestamp = {Thu, 06 Aug 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/tifs/Shim20.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/ShimK20,
  author    = {Kyung{-}Ah Shim and
               Namhun Koo},
  title     = {Algebraic Fault Analysis of {UOV} and Rainbow With the Leakage of
               Random Vinegar Values},
  journal   = {{IEEE} Trans. Inf. Forensics Secur.},
  volume    = {15},
  pages     = {2429--2439},
  year      = {2020},
  url       = {https://doi.org/10.1109/TIFS.2020.2969555},
  doi       = {10.1109/TIFS.2020.2969555},
  timestamp = {Fri, 09 Apr 2021 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/tifs/ShimK20.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/SiabiB20,
  author    = {Babak Siabi and
               Mehdi Berenjkoub},
  title     = {Comments on "Unconditionally Secure, Universally Composable Privacy
               Preserving Linear Algebra"},
  journal   = {{IEEE} Trans. Inf. Forensics Secur.},
  volume    = {15},
  pages     = {83--84},
  year      = {2020},
  url       = {https://doi.org/10.1109/TIFS.2019.2912068},
  doi       = {10.1109/TIFS.2019.2912068},
  timestamp = {Thu, 06 Aug 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/tifs/SiabiB20.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/SironeS20,
  author    = {Deepak Sirone and
               Pramod Subramanyan},
  title     = {Functional Analysis Attacks on Logic Locking},
  journal   = {{IEEE} Trans. Inf. Forensics Secur.},
  volume    = {15},
  pages     = {2514--2527},
  year      = {2020},
  url       = {https://doi.org/10.1109/TIFS.2020.2968183},
  doi       = {10.1109/TIFS.2020.2968183},
  timestamp = {Thu, 06 Aug 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/tifs/SironeS20.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/SoltaniGTH20,
  author    = {Ramin Soltani and
               Dennis Goeckel and
               Don Towsley and
               Amir Houmansadr},
  title     = {Fundamental Limits of Invisible Flow Fingerprinting},
  journal   = {{IEEE} Trans. Inf. Forensics Secur.},
  volume    = {15},
  pages     = {345--360},
  year      = {2020},
  url       = {https://doi.org/10.1109/TIFS.2019.2919870},
  doi       = {10.1109/TIFS.2019.2919870},
  timestamp = {Thu, 06 Aug 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/tifs/SoltaniGTH20.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/Song00SLJG20,
  author    = {Bo Song and
               Xu Wang and
               Wei Ni and
               Yurong Song and
               Ren Ping Liu and
               Guoping Jiang and
               Y. Jay Guo},
  title     = {Reliability Analysis of Large-Scale Adaptive Weighted Networks},
  journal   = {{IEEE} Trans. Inf. Forensics Secur.},
  volume    = {15},
  pages     = {651--665},
  year      = {2020},
  url       = {https://doi.org/10.1109/TIFS.2019.2926193},
  doi       = {10.1109/TIFS.2019.2926193},
  timestamp = {Thu, 06 Aug 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/tifs/Song00SLJG20.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/SongLWL20,
  author    = {Haina Song and
               Tao Luo and
               Xun Wang and
               Jianfeng Li},
  title     = {Multiple Sensitive Values-Oriented Personalized Privacy Preservation
               Based on Randomized Response},
  journal   = {{IEEE} Trans. Inf. Forensics Secur.},
  volume    = {15},
  pages     = {2209--2224},
  year      = {2020},
  url       = {https://doi.org/10.1109/TIFS.2019.2959911},
  doi       = {10.1109/TIFS.2019.2959911},
  timestamp = {Tue, 29 Dec 2020 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/journals/tifs/SongLWL20.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/SongWT20,
  author    = {Yang Song and
               Chong Xiao Wang and
               Wee Peng Tay},
  title     = {Compressive Privacy for a Linear Dynamical System},
  journal   = {{IEEE} Trans. Inf. Forensics Secur.},
  volume    = {15},
  pages     = {895--910},
  year      = {2020},
  url       = {https://doi.org/10.1109/TIFS.2019.2930366},
  doi       = {10.1109/TIFS.2019.2930366},
  timestamp = {Fri, 29 Apr 2022 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/tifs/SongWT20.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/Suarez-TangilEP20,
  author    = {Guillermo Suarez{-}Tangil and
               Matthew Edwards and
               Claudia Peersman and
               Gianluca Stringhini and
               Awais Rashid and
               Monica T. Whitty},
  title     = {Automatically Dismantling Online Dating Fraud},
  journal   = {{IEEE} Trans. Inf. Forensics Secur.},
  volume    = {15},
  pages     = {1128--1137},
  year      = {2020},
  url       = {https://doi.org/10.1109/TIFS.2019.2930479},
  doi       = {10.1109/TIFS.2019.2930479},
  timestamp = {Fri, 09 Apr 2021 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/tifs/Suarez-TangilEP20.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/SubramaniHANM20,
  author    = {Kiruba Sankaran Subramani and
               Noha M. Helal and
               Angelos Antonopoulos and
               Aria Nosratinia and
               Yiorgos Makris},
  title     = {Amplitude-Modulating Analog/RF Hardware Trojans in Wireless Networks:
               Risks and Remedies},
  journal   = {{IEEE} Trans. Inf. Forensics Secur.},
  volume    = {15},
  pages     = {3497--3510},
  year      = {2020},
  url       = {https://doi.org/10.1109/TIFS.2020.2990792},
  doi       = {10.1109/TIFS.2020.2990792},
  timestamp = {Fri, 09 Apr 2021 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/tifs/SubramaniHANM20.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/SunCTF20,
  author    = {Liang Sun and
               Lu Cao and
               Zhiyao Tang and
               Yong Feng},
  title     = {Artificial-Noise-Aided Secure Multi-User Multi-Antenna Transmission
               With Quantized {CSIT:} {A} Comprehensive Design and Analysis},
  journal   = {{IEEE} Trans. Inf. Forensics Secur.},
  volume    = {15},
  pages     = {3734--3748},
  year      = {2020},
  url       = {https://doi.org/10.1109/TIFS.2020.2998942},
  doi       = {10.1109/TIFS.2020.2998942},
  timestamp = {Thu, 06 Aug 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/tifs/SunCTF20.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/SunLCD20,
  author    = {Yi Sun and
               Qian Liu and
               Xingyuan Chen and
               Xuehui Du},
  title     = {An Adaptive Authenticated Data Structure With Privacy-Preserving for
               Big Data Stream in Cloud},
  journal   = {{IEEE} Trans. Inf. Forensics Secur.},
  volume    = {15},
  pages     = {3295--3310},
  year      = {2020},
  url       = {https://doi.org/10.1109/TIFS.2020.2986879},
  doi       = {10.1109/TIFS.2020.2986879},
  timestamp = {Thu, 06 Aug 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/tifs/SunLCD20.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/SunSCHK20,
  author    = {Wenyun Sun and
               Yu Song and
               Changsheng Chen and
               Jiwu Huang and
               Alex C. Kot},
  title     = {Face Spoofing Detection Based on Local Ternary Label Supervision in
               Fully Convolutional Networks},
  journal   = {{IEEE} Trans. Inf. Forensics Secur.},
  volume    = {15},
  pages     = {3181--3196},
  year      = {2020},
  url       = {https://doi.org/10.1109/TIFS.2020.2985530},
  doi       = {10.1109/TIFS.2020.2985530},
  timestamp = {Thu, 06 Aug 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/tifs/SunSCHK20.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/SunTSST20,
  author    = {Yunlian Sun and
               Jinhui Tang and
               Xiangbo Shu and
               Zhenan Sun and
               Massimo Tistarelli},
  title     = {Facial Age Synthesis With Label Distribution-Guided Generative Adversarial
               Network},
  journal   = {{IEEE} Trans. Inf. Forensics Secur.},
  volume    = {15},
  pages     = {2679--2691},
  year      = {2020},
  url       = {https://doi.org/10.1109/TIFS.2020.2975921},
  doi       = {10.1109/TIFS.2020.2975921},
  timestamp = {Tue, 08 Mar 2022 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/journals/tifs/SunTSST20.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/SunTST20,
  author    = {Yunlian Sun and
               Jinhui Tang and
               Zhenan Sun and
               Massimo Tistarelli},
  title     = {Facial Age and Expression Synthesis Using Ordinal Ranking Adversarial
               Networks},
  journal   = {{IEEE} Trans. Inf. Forensics Secur.},
  volume    = {15},
  pages     = {2960--2972},
  year      = {2020},
  url       = {https://doi.org/10.1109/TIFS.2020.2980792},
  doi       = {10.1109/TIFS.2020.2980792},
  timestamp = {Tue, 08 Mar 2022 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/journals/tifs/SunTST20.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/TahmasbiB20,
  author    = {Mehrdad Tahmasbi and
               Matthieu R. Bloch},
  title     = {Covert Secret Key Generation With an Active Warden},
  journal   = {{IEEE} Trans. Inf. Forensics Secur.},
  volume    = {15},
  pages     = {1026--1039},
  year      = {2020},
  url       = {https://doi.org/10.1109/TIFS.2019.2932906},
  doi       = {10.1109/TIFS.2019.2932906},
  timestamp = {Thu, 06 Aug 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/tifs/TahmasbiB20.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/TajeddineWH20,
  author    = {Razane Tajeddine and
               Antonia Wachter{-}Zeh and
               Camilla Hollanti},
  title     = {Private Information Retrieval Over Random Linear Networks},
  journal   = {{IEEE} Trans. Inf. Forensics Secur.},
  volume    = {15},
  pages     = {790--799},
  year      = {2020},
  url       = {https://doi.org/10.1109/TIFS.2019.2928483},
  doi       = {10.1109/TIFS.2019.2928483},
  timestamp = {Thu, 06 Aug 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/tifs/TajeddineWH20.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/TanK20,
  author    = {Hanzhuo Tan and
               Ajay Kumar},
  title     = {Towards More Accurate Contactless Fingerprint Minutiae Extraction
               and Pose-Invariant Matching},
  journal   = {{IEEE} Trans. Inf. Forensics Secur.},
  volume    = {15},
  pages     = {3924--3937},
  year      = {2020},
  url       = {https://doi.org/10.1109/TIFS.2020.3001732},
  doi       = {10.1109/TIFS.2020.3001732},
  timestamp = {Thu, 06 Aug 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/tifs/TanK20.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/TanLWX20,
  author    = {Xinrui Tan and
               Hongjia Li and
               Liming Wang and
               Zhen Xu},
  title     = {Comments on "Dropping Activation Outputs with Localized First-Layer
               Deep Network for Enhancing User Privacy and Data Security"},
  journal   = {{IEEE} Trans. Inf. Forensics Secur.},
  volume    = {15},
  pages     = {3938--3939},
  year      = {2020},
  url       = {https://doi.org/10.1109/TIFS.2020.2988156},
  doi       = {10.1109/TIFS.2020.2988156},
  timestamp = {Thu, 06 Aug 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/tifs/TanLWX20.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/TaspinarMM20,
  author    = {Samet Taspinar and
               Manoranjan Mohanty and
               Nasir D. Memon},
  title     = {Camera Fingerprint Extraction via Spatial Domain Averaged Frames},
  journal   = {{IEEE} Trans. Inf. Forensics Secur.},
  volume    = {15},
  pages     = {3270--3282},
  year      = {2020},
  url       = {https://doi.org/10.1109/TIFS.2020.2985544},
  doi       = {10.1109/TIFS.2020.2985544},
  timestamp = {Thu, 06 Aug 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/tifs/TaspinarMM20.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/TestaBM20,
  author    = {Matteo Testa and
               Tiziano Bianchi and
               Enrico Magli},
  title     = {Secrecy Analysis of Finite-Precision Compressive Cryptosystems},
  journal   = {{IEEE} Trans. Inf. Forensics Secur.},
  volume    = {15},
  pages     = {1--13},
  year      = {2020},
  url       = {https://doi.org/10.1109/TIFS.2019.2918089},
  doi       = {10.1109/TIFS.2019.2918089},
  timestamp = {Thu, 06 Aug 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/tifs/TestaBM20.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/TolosanaGBO20,
  author    = {Rub{\'{e}}n Tolosana and
               Marta Gomez{-}Barrero and
               Christoph Busch and
               Javier Ortega{-}Garcia},
  title     = {Biometric Presentation Attack Detection: Beyond the Visible Spectrum},
  journal   = {{IEEE} Trans. Inf. Forensics Secur.},
  volume    = {15},
  pages     = {1261--1275},
  year      = {2020},
  url       = {https://doi.org/10.1109/TIFS.2019.2934867},
  doi       = {10.1109/TIFS.2019.2934867},
  timestamp = {Mon, 03 Jan 2022 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/journals/tifs/TolosanaGBO20.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/TolosanaVFO20,
  author    = {Rub{\'{e}}n Tolosana and
               Rub{\'{e}}n Vera{-}Rodr{\'{\i}}guez and
               Julian Fi{\'{e}}rrez and
               Javier Ortega{-}Garcia},
  title     = {BioTouchPass2: Touchscreen Password Biometrics Using Time-Aligned
               Recurrent Neural Networks},
  journal   = {{IEEE} Trans. Inf. Forensics Secur.},
  volume    = {15},
  pages     = {2616--2628},
  year      = {2020},
  url       = {https://doi.org/10.1109/TIFS.2020.2973832},
  doi       = {10.1109/TIFS.2020.2973832},
  timestamp = {Mon, 03 Jan 2022 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/journals/tifs/TolosanaVFO20.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/TruongSLG20,
  author    = {Nguyen Binh Truong and
               Kai Sun and
               Gyu Myoung Lee and
               Yike Guo},
  title     = {GDPR-Compliant Personal Data Management: {A} Blockchain-Based Solution},
  journal   = {{IEEE} Trans. Inf. Forensics Secur.},
  volume    = {15},
  pages     = {1746--1761},
  year      = {2020},
  url       = {https://doi.org/10.1109/TIFS.2019.2948287},
  doi       = {10.1109/TIFS.2019.2948287},
  timestamp = {Thu, 21 Jan 2021 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/journals/tifs/TruongSLG20.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/TsengW20,
  author    = {Bo{-}Wei Tseng and
               Pei{-}Yuan Wu},
  title     = {Compressive Privacy Generative Adversarial Network},
  journal   = {{IEEE} Trans. Inf. Forensics Secur.},
  volume    = {15},
  pages     = {2499--2513},
  year      = {2020},
  url       = {https://doi.org/10.1109/TIFS.2020.2968188},
  doi       = {10.1109/TIFS.2020.2968188},
  timestamp = {Thu, 06 Aug 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/tifs/TsengW20.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/TuLGMGZ20,
  author    = {Chenyang Tu and
               Zeyi Liu and
               Neng Gao and
               Cunqing Ma and
               Jingquan Ge and
               Lingchen Zhang},
  title     = {{MACM:} How to Reduce the Multi-Round {SCA} to the Single-Round Attack
               on the Feistel-SP Networks},
  journal   = {{IEEE} Trans. Inf. Forensics Secur.},
  volume    = {15},
  pages     = {3079--3092},
  year      = {2020},
  url       = {https://doi.org/10.1109/TIFS.2019.2959910},
  doi       = {10.1109/TIFS.2019.2959910},
  timestamp = {Thu, 06 Aug 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/tifs/TuLGMGZ20.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/UzunS20,
  author    = {Erkam Uzun and
               H{\"{u}}srev T. Sencar},
  title     = {Jpg\emph{Scraper}: An Advanced Carver for {JPEG} Files},
  journal   = {{IEEE} Trans. Inf. Forensics Secur.},
  volume    = {15},
  pages     = {1846--1857},
  year      = {2020},
  url       = {https://doi.org/10.1109/TIFS.2019.2953382},
  doi       = {10.1109/TIFS.2019.2953382},
  timestamp = {Thu, 06 Aug 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/tifs/UzunS20.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/Vazquez-PadinFS20,
  author    = {David V{\'{a}}zquez{-}Pad{\'{\i}}n and
               Marco Fontani and
               Dasara Shullani and
               Fernando P{\'{e}}rez{-}Gonz{\'{a}}lez and
               Alessandro Piva and
               Mauro Barni},
  title     = {Video Integrity Verification and {GOP} Size Estimation Via Generalized
               Variation of Prediction Footprint},
  journal   = {{IEEE} Trans. Inf. Forensics Secur.},
  volume    = {15},
  pages     = {1815--1830},
  year      = {2020},
  url       = {https://doi.org/10.1109/TIFS.2019.2951313},
  doi       = {10.1109/TIFS.2019.2951313},
  timestamp = {Thu, 06 Aug 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/tifs/Vazquez-PadinFS20.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/WaliaJBS20,
  author    = {Gurjit Singh Walia and
               Gaurav Jain and
               Nipun Bansal and
               Kuldeep Singh},
  title     = {Adaptive Weighted Graph Approach to Generate Multimodal Cancelable
               Biometric Templates},
  journal   = {{IEEE} Trans. Inf. Forensics Secur.},
  volume    = {15},
  pages     = {1945--1958},
  year      = {2020},
  url       = {https://doi.org/10.1109/TIFS.2019.2954779},
  doi       = {10.1109/TIFS.2019.2954779},
  timestamp = {Fri, 16 Apr 2021 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/tifs/WaliaJBS20.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/WangB20,
  author    = {Zisheng Wang and
               Rick S. Blum},
  title     = {A Statistical Learning-Based Algorithm for Topology Verification in
               Natural Gas Networks Based on Noisy Sensor Measurements},
  journal   = {{IEEE} Trans. Inf. Forensics Secur.},
  volume    = {15},
  pages     = {3653--3666},
  year      = {2020},
  url       = {https://doi.org/10.1109/TIFS.2020.2998943},
  doi       = {10.1109/TIFS.2020.2998943},
  timestamp = {Thu, 06 Aug 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/tifs/WangB20.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/WangCWM20,
  author    = {Xu An Wang and
               Kim{-}Kwang Raymond Choo and
               Jian Weng and
               Jianfeng Ma},
  title     = {Comments on "Publicly Verifiable Computation of Polynomials Over Outsourced
               Data With Multiple Sources"},
  journal   = {{IEEE} Trans. Inf. Forensics Secur.},
  volume    = {15},
  pages     = {1586--1588},
  year      = {2020},
  url       = {https://doi.org/10.1109/TIFS.2019.2936971},
  doi       = {10.1109/TIFS.2019.2936971},
  timestamp = {Tue, 02 Mar 2021 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/journals/tifs/WangCWM20.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/WangG20,
  author    = {Qiangchang Wang and
               Guodong Guo},
  title     = {{LS-CNN:} Characterizing Local Patches at Multiple Scales for Face
               Recognition},
  journal   = {{IEEE} Trans. Inf. Forensics Secur.},
  volume    = {15},
  pages     = {1640--1653},
  year      = {2020},
  url       = {https://doi.org/10.1109/TIFS.2019.2946938},
  doi       = {10.1109/TIFS.2019.2946938},
  timestamp = {Mon, 20 Sep 2021 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/tifs/WangG20.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/WangJADZ20,
  author    = {Ning Wang and
               Long Jiao and
               Amir Alipour{-}Fanid and
               Monireh Dabaghchian and
               Kai Zeng},
  title     = {Pilot Contamination Attack Detection for {NOMA} in 5G mm-Wave Massive
               {MIMO} Networks},
  journal   = {{IEEE} Trans. Inf. Forensics Secur.},
  volume    = {15},
  pages     = {1363--1378},
  year      = {2020},
  url       = {https://doi.org/10.1109/TIFS.2019.2939742},
  doi       = {10.1109/TIFS.2019.2939742},
  timestamp = {Mon, 26 Oct 2020 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/journals/tifs/WangJADZ20.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/WangLZZW20,
  author    = {Qian Wang and
               Zixi Li and
               Qin Zou and
               Lingchen Zhao and
               Song Wang},
  title     = {Deep Domain Adaptation With Differential Privacy},
  journal   = {{IEEE} Trans. Inf. Forensics Secur.},
  volume    = {15},
  pages     = {3093--3106},
  year      = {2020},
  url       = {https://doi.org/10.1109/TIFS.2020.2983254},
  doi       = {10.1109/TIFS.2020.2983254},
  timestamp = {Thu, 06 Aug 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/tifs/WangLZZW20.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/WangM0020,
  author    = {Dongxia Wang and
               Tim Muller and
               Jie Zhang and
               Yang Liu},
  title     = {Information Theoretical Analysis of Unfair Rating Attacks Under Subjectivity},
  journal   = {{IEEE} Trans. Inf. Forensics Secur.},
  volume    = {15},
  pages     = {816--828},
  year      = {2020},
  url       = {https://doi.org/10.1109/TIFS.2019.2929678},
  doi       = {10.1109/TIFS.2019.2929678},
  timestamp = {Fri, 17 Dec 2021 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/journals/tifs/WangM0020.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/WangMWHS20,
  author    = {Caiyong Wang and
               Jawad Muhammad and
               Yunlong Wang and
               Zhaofeng He and
               Zhenan Sun},
  title     = {Towards Complete and Accurate Iris Segmentation Using Deep Multi-Task
               Attention Network for Non-Cooperative Iris Recognition},
  journal   = {{IEEE} Trans. Inf. Forensics Secur.},
  volume    = {15},
  pages     = {2944--2959},
  year      = {2020},
  url       = {https://doi.org/10.1109/TIFS.2020.2980791},
  doi       = {10.1109/TIFS.2020.2980791},
  timestamp = {Thu, 06 Aug 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/tifs/WangMWHS20.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/WangSS20,
  author    = {Guoqing Wang and
               Changming Sun and
               Arcot Sowmya},
  title     = {Multi-Weighted Co-Occurrence Descriptor Encoding for Vein Recognition},
  journal   = {{IEEE} Trans. Inf. Forensics Secur.},
  volume    = {15},
  pages     = {375--390},
  year      = {2020},
  url       = {https://doi.org/10.1109/TIFS.2019.2922331},
  doi       = {10.1109/TIFS.2019.2922331},
  timestamp = {Mon, 22 Feb 2021 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/journals/tifs/WangSS20.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/WangSS20a,
  author    = {Guoqing Wang and
               Changming Sun and
               Arcot Sowmya},
  title     = {Learning a Compact Vein Discrimination Model With GANerated Samples},
  journal   = {{IEEE} Trans. Inf. Forensics Secur.},
  volume    = {15},
  pages     = {635--650},
  year      = {2020},
  url       = {https://doi.org/10.1109/TIFS.2019.2924553},
  doi       = {10.1109/TIFS.2019.2924553},
  timestamp = {Mon, 22 Feb 2021 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/journals/tifs/WangSS20a.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/WangYWDG20,
  author    = {Wei{-}Che Wang and
               Yair Yona and
               Yizhang Wu and
               Suhas N. Diggavi and
               Puneet Gupta},
  title     = {{SLATE:} {A} Secure Lightweight Entity Authentication Hardware Primitive},
  journal   = {{IEEE} Trans. Inf. Forensics Secur.},
  volume    = {15},
  pages     = {276--285},
  year      = {2020},
  url       = {https://doi.org/10.1109/TIFS.2019.2919393},
  doi       = {10.1109/TIFS.2019.2919393},
  timestamp = {Thu, 28 Oct 2021 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/tifs/WangYWDG20.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/WangZLYY20,
  author    = {Yaofei Wang and
               Weiming Zhang and
               Weixiang Li and
               Xinzhi Yu and
               Nenghai Yu},
  title     = {Non-Additive Cost Functions for Color Image Steganography Based on
               Inter-Channel Correlations and Differences},
  journal   = {{IEEE} Trans. Inf. Forensics Secur.},
  volume    = {15},
  pages     = {2081--2095},
  year      = {2020},
  url       = {https://doi.org/10.1109/TIFS.2019.2956590},
  doi       = {10.1109/TIFS.2019.2956590},
  timestamp = {Thu, 06 Aug 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/tifs/WangZLYY20.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/WangZYLHM20,
  author    = {Leye Wang and
               Daqing Zhang and
               Dingqi Yang and
               Brian Y. Lim and
               Xiao Han and
               Xiaojuan Ma},
  title     = {Sparse Mobile Crowdsensing With Differential and Distortion Location
               Privacy},
  journal   = {{IEEE} Trans. Inf. Forensics Secur.},
  volume    = {15},
  pages     = {2735--2749},
  year      = {2020},
  url       = {https://doi.org/10.1109/TIFS.2020.2975925},
  doi       = {10.1109/TIFS.2020.2975925},
  timestamp = {Thu, 06 Aug 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/tifs/WangZYLHM20.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/WeiJLCW20,
  author    = {Chengkun Wei and
               Shouling Ji and
               Changchang Liu and
               Wenzhi Chen and
               Ting Wang},
  title     = {AsgLDP: Collecting and Generating Decentralized Attributed Graphs
               With Local Differential Privacy},
  journal   = {{IEEE} Trans. Inf. Forensics Secur.},
  volume    = {15},
  pages     = {3239--3254},
  year      = {2020},
  url       = {https://doi.org/10.1109/TIFS.2020.2985524},
  doi       = {10.1109/TIFS.2020.2985524},
  timestamp = {Thu, 06 Aug 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/tifs/WeiJLCW20.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/WeiLDMYFJQP20,
  author    = {Kang Wei and
               Jun Li and
               Ming Ding and
               Chuan Ma and
               Howard H. Yang and
               Farhad Farokhi and
               Shi Jin and
               Tony Q. S. Quek and
               H. Vincent Poor},
  title     = {Federated Learning With Differential Privacy: Algorithms and Performance
               Analysis},
  journal   = {{IEEE} Trans. Inf. Forensics Secur.},
  volume    = {15},
  pages     = {3454--3469},
  year      = {2020},
  url       = {https://doi.org/10.1109/TIFS.2020.2988575},
  doi       = {10.1109/TIFS.2020.2988575},
  timestamp = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/tifs/WeiLDMYFJQP20.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/WenLFQZJ20,
  author    = {Wanli Wen and
               Chenxi Liu and
               Yaru Fu and
               Tony Q. S. Quek and
               Fu{-}Chun Zheng and
               Shi Jin},
  title     = {Enhancing Physical Layer Security of Random Caching in Large-Scale
               Multi-Antenna Heterogeneous Wireless Networks},
  journal   = {{IEEE} Trans. Inf. Forensics Secur.},
  volume    = {15},
  pages     = {2840--2855},
  year      = {2020},
  url       = {https://doi.org/10.1109/TIFS.2020.2976961},
  doi       = {10.1109/TIFS.2020.2976961},
  timestamp = {Thu, 27 Aug 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/tifs/WenLFQZJ20.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/WuCLF20,
  author    = {Junqi Wu and
               Bolin Chen and
               Weiqi Luo and
               Yanmei Fang},
  title     = {Audio Steganography Based on Iterative Adversarial Attacks Against
               Convolutional Neural Networks},
  journal   = {{IEEE} Trans. Inf. Forensics Secur.},
  volume    = {15},
  pages     = {2282--2294},
  year      = {2020},
  url       = {https://doi.org/10.1109/TIFS.2019.2963764},
  doi       = {10.1109/TIFS.2019.2963764},
  timestamp = {Thu, 06 Aug 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/tifs/WuCLF20.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/WuWLJ20,
  author    = {Chengwei Wu and
               Ligang Wu and
               Jianxing Liu and
               Zhong{-}Ping Jiang},
  title     = {Active Defense-Based Resilient Sliding Mode Control Under Denial-of-Service
               Attacks},
  journal   = {{IEEE} Trans. Inf. Forensics Secur.},
  volume    = {15},
  pages     = {237--249},
  year      = {2020},
  url       = {https://doi.org/10.1109/TIFS.2019.2917373},
  doi       = {10.1109/TIFS.2019.2917373},
  timestamp = {Thu, 06 Aug 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/tifs/WuWLJ20.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/WuYZC20,
  author    = {Renyong Wu and
               Chao Yuan and
               Ning Zhang and
               Kim{-}Kwang Raymond Choo},
  title     = {A Two-Dimensional Vectorized Secure Transmission Scheme for Wireless
               Communications},
  journal   = {{IEEE} Trans. Inf. Forensics Secur.},
  volume    = {15},
  pages     = {2336--2345},
  year      = {2020},
  url       = {https://doi.org/10.1109/TIFS.2019.2954742},
  doi       = {10.1109/TIFS.2019.2954742},
  timestamp = {Thu, 06 Aug 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/tifs/WuYZC20.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/WuYZCW20,
  author    = {Libing Wu and
               Jingxiao Yang and
               Man Zhou and
               Yanjiao Chen and
               Qian Wang},
  title     = {{LVID:} {A} Multimodal Biometrics Authentication System on Smartphones},
  journal   = {{IEEE} Trans. Inf. Forensics Secur.},
  volume    = {15},
  pages     = {1572--1585},
  year      = {2020},
  url       = {https://doi.org/10.1109/TIFS.2019.2944058},
  doi       = {10.1109/TIFS.2019.2944058},
  timestamp = {Mon, 20 Sep 2021 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/tifs/WuYZCW20.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/Xia0020,
  author    = {Xiaofang Xia and
               Yang Xiao and
               Wei Liang},
  title     = {{SAI:} {A} Suspicion Assessment-Based Inspection Algorithm to Detect
               Malicious Users in Smart Grid},
  journal   = {{IEEE} Trans. Inf. Forensics Secur.},
  volume    = {15},
  pages     = {361--374},
  year      = {2020},
  url       = {https://doi.org/10.1109/TIFS.2019.2921232},
  doi       = {10.1109/TIFS.2019.2921232},
  timestamp = {Thu, 06 Aug 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/tifs/Xia0020.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/XiaZLWX20,
  author    = {Min Xia and
               Xu Zhang and
               Wan'an Liu and
               Liguo Weng and
               Yiqing Xu},
  title     = {Multi-Stage Feature Constraints Learning for Age Estimation},
  journal   = {{IEEE} Trans. Inf. Forensics Secur.},
  volume    = {15},
  pages     = {2417--2428},
  year      = {2020},
  url       = {https://doi.org/10.1109/TIFS.2020.2969552},
  doi       = {10.1109/TIFS.2020.2969552},
  timestamp = {Mon, 26 Oct 2020 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/journals/tifs/XiaZLWX20.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/XiangYCDS20,
  author    = {Zhongwu Xiang and
               Weiwei Yang and
               Yueming Cai and
               Zhiguo Ding and
               Yi Song},
  title     = {Secure Transmission Design in {HARQ} Assisted Cognitive {NOMA} Networks},
  journal   = {{IEEE} Trans. Inf. Forensics Secur.},
  volume    = {15},
  pages     = {2528--2541},
  year      = {2020},
  url       = {https://doi.org/10.1109/TIFS.2020.2968176},
  doi       = {10.1109/TIFS.2020.2968176},
  timestamp = {Fri, 29 Jul 2022 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/tifs/XiangYCDS20.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/XiangYPCSZ20,
  author    = {Zhongwu Xiang and
               Weiwei Yang and
               Gaofeng Pan and
               Yueming Cai and
               Yi Song and
               Yulong Zou},
  title     = {Secure Transmission in HARQ-Assisted Non-Orthogonal Multiple Access
               Networks},
  journal   = {{IEEE} Trans. Inf. Forensics Secur.},
  volume    = {15},
  pages     = {2171--2182},
  year      = {2020},
  url       = {https://doi.org/10.1109/TIFS.2019.2955792},
  doi       = {10.1109/TIFS.2019.2955792},
  timestamp = {Fri, 29 Jul 2022 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/tifs/XiangYPCSZ20.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/XieHW20,
  author    = {Shangyu Xie and
               Yuan Hong and
               Peng{-}Jun Wan},
  title     = {Pairing: Privately Balancing Multiparty Real-Time Supply and Demand
               on the Power Grid},
  journal   = {{IEEE} Trans. Inf. Forensics Secur.},
  volume    = {15},
  pages     = {1114--1127},
  year      = {2020},
  url       = {https://doi.org/10.1109/TIFS.2019.2933732},
  doi       = {10.1109/TIFS.2019.2933732},
  timestamp = {Thu, 06 Aug 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/tifs/XieHW20.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/XieP20,
  author    = {Jiucheng Xie and
               Chi{-}Man Pun},
  title     = {Deep and Ordinal Ensemble Learning for Human Age Estimation From Facial
               Images},
  journal   = {{IEEE} Trans. Inf. Forensics Secur.},
  volume    = {15},
  pages     = {2361--2374},
  year      = {2020},
  url       = {https://doi.org/10.1109/TIFS.2020.2965298},
  doi       = {10.1109/TIFS.2020.2965298},
  timestamp = {Thu, 06 Aug 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/tifs/XieP20.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/XiongSKS20,
  author    = {Wenjie Xiong and
               Andr{\'{e}} Schaller and
               Stefan Katzenbeisser and
               Jakub Szefer},
  title     = {Software Protection Using Dynamic PUFs},
  journal   = {{IEEE} Trans. Inf. Forensics Secur.},
  volume    = {15},
  pages     = {2053--2068},
  year      = {2020},
  url       = {https://doi.org/10.1109/TIFS.2019.2955788},
  doi       = {10.1109/TIFS.2019.2955788},
  timestamp = {Thu, 06 Aug 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/tifs/XiongSKS20.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/XuLL0L20,
  author    = {Guowen Xu and
               Hongwei Li and
               Sen Liu and
               Kan Yang and
               Xiaodong Lin},
  title     = {VerifyNet: Secure and Verifiable Federated Learning},
  journal   = {{IEEE} Trans. Inf. Forensics Secur.},
  volume    = {15},
  pages     = {911--926},
  year      = {2020},
  url       = {https://doi.org/10.1109/TIFS.2019.2929409},
  doi       = {10.1109/TIFS.2019.2929409},
  timestamp = {Tue, 21 Dec 2021 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/journals/tifs/XuLL0L20.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/XuLZCT20,
  author    = {Lingling Xu and
               Wanhua Li and
               Fangguo Zhang and
               Rong Cheng and
               Shaohua Tang},
  title     = {Authorized Keyword Searches on Public Key Encrypted Data With Time
               Controlled Keyword Privacy},
  journal   = {{IEEE} Trans. Inf. Forensics Secur.},
  volume    = {15},
  pages     = {2096--2109},
  year      = {2020},
  url       = {https://doi.org/10.1109/TIFS.2019.2957691},
  doi       = {10.1109/TIFS.2019.2957691},
  timestamp = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/tifs/XuLZCT20.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/XuSD20,
  author    = {Congyuan Xu and
               Jizhong Shen and
               Xin Du},
  title     = {A Method of Few-Shot Network Intrusion Detection Based on Meta-Learning
               Framework},
  journal   = {{IEEE} Trans. Inf. Forensics Secur.},
  volume    = {15},
  pages     = {3540--3552},
  year      = {2020},
  url       = {https://doi.org/10.1109/TIFS.2020.2991876},
  doi       = {10.1109/TIFS.2020.2991876},
  timestamp = {Thu, 06 Aug 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/tifs/XuSD20.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/XuSL20,
  author    = {Qichao Xu and
               Zhou Su and
               Rongxing Lu},
  title     = {Game Theory and Reinforcement Learning Based Secure Edge Caching in
               Mobile Social Networks},
  journal   = {{IEEE} Trans. Inf. Forensics Secur.},
  volume    = {15},
  pages     = {3415--3429},
  year      = {2020},
  url       = {https://doi.org/10.1109/TIFS.2020.2980823},
  doi       = {10.1109/TIFS.2020.2980823},
  timestamp = {Thu, 06 Aug 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/tifs/XuSL20.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/XueVHS20,
  author    = {Wanli Xue and
               Dinusha Vatsalan and
               Wen Hu and
               Aruna Seneviratne},
  title     = {Sequence Data Matching and Beyond: New Privacy-Preserving Primitives
               Based on Bloom Filters},
  journal   = {{IEEE} Trans. Inf. Forensics Secur.},
  volume    = {15},
  pages     = {2973--2987},
  year      = {2020},
  url       = {https://doi.org/10.1109/TIFS.2020.2980835},
  doi       = {10.1109/TIFS.2020.2980835},
  timestamp = {Sat, 05 Sep 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/tifs/XueVHS20.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/YanLLS20,
  author    = {Xuehu Yan and
               Yuliang Lu and
               Lintao Liu and
               Xianhua Song},
  title     = {Reversible Image Secret Sharing},
  journal   = {{IEEE} Trans. Inf. Forensics Secur.},
  volume    = {15},
  pages     = {3848--3858},
  year      = {2020},
  url       = {https://doi.org/10.1109/TIFS.2020.3001735},
  doi       = {10.1109/TIFS.2020.3001735},
  timestamp = {Thu, 06 Aug 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/tifs/YanLLS20.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/YangDL20,
  author    = {Jichen Yang and
               Rohan Kumar Das and
               Haizhou Li},
  title     = {Significance of Subband Features for Synthetic Speech Detection},
  journal   = {{IEEE} Trans. Inf. Forensics Secur.},
  volume    = {15},
  pages     = {2160--2170},
  year      = {2020},
  url       = {https://doi.org/10.1109/TIFS.2019.2956589},
  doi       = {10.1109/TIFS.2019.2956589},
  timestamp = {Thu, 06 Aug 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/tifs/YangDL20.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/YangLYALC20,
  author    = {Xiao Yang and
               Wang Fat Lau and
               Qingqing Ye and
               Man Ho Au and
               Joseph K. Liu and
               Jacob Cheng},
  title     = {Practical Escrow Protocol for Bitcoin},
  journal   = {{IEEE} Trans. Inf. Forensics Secur.},
  volume    = {15},
  pages     = {3023--3034},
  year      = {2020},
  url       = {https://doi.org/10.1109/TIFS.2020.2976607},
  doi       = {10.1109/TIFS.2020.2976607},
  timestamp = {Thu, 06 Aug 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/tifs/YangLYALC20.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/YangRHKS20,
  author    = {Jianhua Yang and
               Danyang Ruan and
               Jiwu Huang and
               Xiangui Kang and
               Yun{-}Qing Shi},
  title     = {An Embedding Cost Learning Framework Using {GAN}},
  journal   = {{IEEE} Trans. Inf. Forensics Secur.},
  volume    = {15},
  pages     = {839--851},
  year      = {2020},
  url       = {https://doi.org/10.1109/TIFS.2019.2922229},
  doi       = {10.1109/TIFS.2019.2922229},
  timestamp = {Thu, 06 Aug 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/tifs/YangRHKS20.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/YangSZZJ20,
  author    = {Zhihai Yang and
               Qindong Sun and
               Yaling Zhang and
               Lei Zhu and
               Wenjiang Ji},
  title     = {Inference of Suspicious Co-Visitation and Co-Rating Behaviors and
               Abnormality Forensics for Recommender Systems},
  journal   = {{IEEE} Trans. Inf. Forensics Secur.},
  volume    = {15},
  pages     = {2766--2781},
  year      = {2020},
  url       = {https://doi.org/10.1109/TIFS.2020.2977023},
  doi       = {10.1109/TIFS.2020.2977023},
  timestamp = {Fri, 29 Apr 2022 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/tifs/YangSZZJ20.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/YangWWSG20,
  author    = {Meng Yang and
               Wei Wen and
               Xing Wang and
               Linlin Shen and
               Guangwei Gao},
  title     = {Adaptive Convolution Local and Global Learning for Class-Level Joint
               Representation of Facial Recognition With a Single Sample Per Data
               Subject},
  journal   = {{IEEE} Trans. Inf. Forensics Secur.},
  volume    = {15},
  pages     = {2469--2484},
  year      = {2020},
  url       = {https://doi.org/10.1109/TIFS.2020.2965301},
  doi       = {10.1109/TIFS.2020.2965301},
  timestamp = {Thu, 06 Aug 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/tifs/YangWWSG20.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/YankovOSCF20,
  author    = {Metodi P. Yankov and
               Martin Aastrup Olsen and
               Mikkel B. Stegmann and
               S{\o}ren Skovgaard Christensen and
               S{\o}ren Forchhammer},
  title     = {Fingerprint Entropy and Identification Capacity Estimation Based on
               Pixel-Level Generative Modelling},
  journal   = {{IEEE} Trans. Inf. Forensics Secur.},
  volume    = {15},
  pages     = {56--65},
  year      = {2020},
  url       = {https://doi.org/10.1109/TIFS.2019.2916406},
  doi       = {10.1109/TIFS.2019.2916406},
  timestamp = {Thu, 06 Aug 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/tifs/YankovOSCF20.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/YaoJDW20,
  author    = {Chengtang Yao and
               Yunde Jia and
               Huijun Di and
               Yuwei Wu},
  title     = {Face Spoofing Detection Using Relativity Representation on Riemannian
               Manifold},
  journal   = {{IEEE} Trans. Inf. Forensics Secur.},
  volume    = {15},
  pages     = {3683--3693},
  year      = {2020},
  url       = {https://doi.org/10.1109/TIFS.2020.2998956},
  doi       = {10.1109/TIFS.2020.2998956},
  timestamp = {Thu, 06 Aug 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/tifs/YaoJDW20.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/YasuiKFE20,
  author    = {Tatsuya Yasui and
               Minoru Kuribayashi and
               Nobuo Funabiki and
               Isao Echizen},
  title     = {Near-Optimal Detection for Binary Tardos Code by Estimating Collusion
               Strategy},
  journal   = {{IEEE} Trans. Inf. Forensics Secur.},
  volume    = {15},
  pages     = {2069--2080},
  year      = {2020},
  url       = {https://doi.org/10.1109/TIFS.2019.2956587},
  doi       = {10.1109/TIFS.2019.2956587},
  timestamp = {Thu, 06 Aug 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/tifs/YasuiKFE20.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/YeL0Y20,
  author    = {Mang Ye and
               Xiangyuan Lan and
               Zheng Wang and
               Pong C. Yuen},
  title     = {Bi-Directional Center-Constrained Top-Ranking for Visible Thermal
               Person Re-Identification},
  journal   = {{IEEE} Trans. Inf. Forensics Secur.},
  volume    = {15},
  pages     = {407--419},
  year      = {2020},
  url       = {https://doi.org/10.1109/TIFS.2019.2921454},
  doi       = {10.1109/TIFS.2019.2921454},
  timestamp = {Thu, 06 Aug 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/tifs/YeL0Y20.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/YeY20,
  author    = {Mang Ye and
               Pong C. Yuen},
  title     = {PurifyNet: {A} Robust Person Re-Identification Model With Noisy Labels},
  journal   = {{IEEE} Trans. Inf. Forensics Secur.},
  volume    = {15},
  pages     = {2655--2666},
  year      = {2020},
  url       = {https://doi.org/10.1109/TIFS.2020.2970590},
  doi       = {10.1109/TIFS.2020.2970590},
  timestamp = {Thu, 06 Aug 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/tifs/YeY20.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/YilmazPZ20,
  author    = {Baki Berkay Yilmaz and
               Milos Prvulovic and
               Alenka G. Zajic},
  title     = {Electromagnetic Side Channel Information Leakage Created by Execution
               of Series of Instructions in a Computer Processor},
  journal   = {{IEEE} Trans. Inf. Forensics Secur.},
  volume    = {15},
  pages     = {776--789},
  year      = {2020},
  url       = {https://doi.org/10.1109/TIFS.2019.2929018},
  doi       = {10.1109/TIFS.2019.2929018},
  timestamp = {Thu, 06 Aug 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/tifs/YilmazPZ20.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/YilmazSZP20,
  author    = {Baki Berkay Yilmaz and
               Nader Sehatbakhsh and
               Alenka G. Zajic and
               Milos Prvulovic},
  title     = {Communication Model and Capacity Limits of Covert Channels Created
               by Software Activities},
  journal   = {{IEEE} Trans. Inf. Forensics Secur.},
  volume    = {15},
  pages     = {1891--1904},
  year      = {2020},
  url       = {https://doi.org/10.1109/TIFS.2019.2952265},
  doi       = {10.1109/TIFS.2019.2952265},
  timestamp = {Thu, 06 Aug 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/tifs/YilmazSZP20.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/Yin0H20,
  author    = {Xuefei Yin and
               Yanming Zhu and
               Jiankun Hu},
  title     = {Contactless Fingerprint Recognition Based on Global Minutia Topology
               and Loose Genetic Algorithm},
  journal   = {{IEEE} Trans. Inf. Forensics Secur.},
  volume    = {15},
  pages     = {28--41},
  year      = {2020},
  url       = {https://doi.org/10.1109/TIFS.2019.2918083},
  doi       = {10.1109/TIFS.2019.2918083},
  timestamp = {Thu, 06 Aug 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/tifs/Yin0H20.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/Yuan000020,
  author    = {Dong Yuan and
               Qi Li and
               Guoliang Li and
               Qian Wang and
               Kui Ren},
  title     = {PriRadar: {A} Privacy-Preserving Framework for Spatial Crowdsourcing},
  journal   = {{IEEE} Trans. Inf. Forensics Secur.},
  volume    = {15},
  pages     = {299--314},
  year      = {2020},
  url       = {https://doi.org/10.1109/TIFS.2019.2913232},
  doi       = {10.1109/TIFS.2019.2913232},
  timestamp = {Thu, 06 Aug 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/tifs/Yuan000020.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/YunHWZZZ20,
  author    = {Xiaochun Yun and
               Ji Huang and
               Yipeng Wang and
               Tianning Zang and
               Yuan Zhou and
               Yongzheng Zhang},
  title     = {Khaos: An Adversarial Neural Network {DGA} With High Anti-Detection
               Ability},
  journal   = {{IEEE} Trans. Inf. Forensics Secur.},
  volume    = {15},
  pages     = {2225--2240},
  year      = {2020},
  url       = {https://doi.org/10.1109/TIFS.2019.2960647},
  doi       = {10.1109/TIFS.2019.2960647},
  timestamp = {Thu, 06 Aug 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/tifs/YunHWZZZ20.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/ZewailY20,
  author    = {Ahmed A. Zewail and
               Aylin Yener},
  title     = {Device-to-Device Secure Coded Caching},
  journal   = {{IEEE} Trans. Inf. Forensics Secur.},
  volume    = {15},
  pages     = {1513--1524},
  year      = {2020},
  url       = {https://doi.org/10.1109/TIFS.2019.2940885},
  doi       = {10.1109/TIFS.2019.2940885},
  timestamp = {Mon, 20 Sep 2021 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/tifs/ZewailY20.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/ZhaiWR20,
  author    = {Liming Zhai and
               Lina Wang and
               Yanzhen Ren},
  title     = {Universal Detection of Video Steganography in Multiple Domains Based
               on the Consistency of Motion Vectors},
  journal   = {{IEEE} Trans. Inf. Forensics Secur.},
  volume    = {15},
  pages     = {1762--1777},
  year      = {2020},
  url       = {https://doi.org/10.1109/TIFS.2019.2949428},
  doi       = {10.1109/TIFS.2019.2949428},
  timestamp = {Thu, 06 Aug 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/tifs/ZhaiWR20.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/ZhangDYCC20,
  author    = {Zhenyong Zhang and
               Ruilong Deng and
               David K. Y. Yau and
               Peng Cheng and
               Jiming Chen},
  title     = {Analysis of Moving Target Defense Against False Data Injection Attacks
               on Power Grid},
  journal   = {{IEEE} Trans. Inf. Forensics Secur.},
  volume    = {15},
  pages     = {2320--2335},
  year      = {2020},
  url       = {https://doi.org/10.1109/TIFS.2019.2928624},
  doi       = {10.1109/TIFS.2019.2928624},
  timestamp = {Mon, 24 Aug 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/tifs/ZhangDYCC20.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/ZhangDYZR20,
  author    = {Fan Zhang and
               Xiaofei Dong and
               Bolin Yang and
               Yajin Zhou and
               Kui Ren},
  title     = {A Systematic Evaluation of Wavelet-Based Attack Framework on Random
               Delay Countermeasures},
  journal   = {{IEEE} Trans. Inf. Forensics Secur.},
  volume    = {15},
  pages     = {1407--1422},
  year      = {2020},
  url       = {https://doi.org/10.1109/TIFS.2019.2941774},
  doi       = {10.1109/TIFS.2019.2941774},
  timestamp = {Thu, 06 Aug 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/tifs/ZhangDYZR20.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/ZhangG20,
  author    = {Yuqiao Zhang and
               Ujjwal Guin},
  title     = {End-to-End Traceability of ICs in Component Supply Chain for Fighting
               Against Recycling},
  journal   = {{IEEE} Trans. Inf. Forensics Secur.},
  volume    = {15},
  pages     = {767--775},
  year      = {2020},
  url       = {https://doi.org/10.1109/TIFS.2019.2928493},
  doi       = {10.1109/TIFS.2019.2928493},
  timestamp = {Thu, 06 Aug 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/tifs/ZhangG20.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/ZhangKL20,
  author    = {Xueru Zhang and
               Mohammad Mahdi Khalili and
               Mingyan Liu},
  title     = {Recycled {ADMM:} Improving the Privacy and Accuracy of Distributed
               Algorithms},
  journal   = {{IEEE} Trans. Inf. Forensics Secur.},
  volume    = {15},
  pages     = {1723--1734},
  year      = {2020},
  url       = {https://doi.org/10.1109/TIFS.2019.2947867},
  doi       = {10.1109/TIFS.2019.2947867},
  timestamp = {Mon, 20 Sep 2021 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/tifs/ZhangKL20.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/ZhangLQG20,
  author    = {Tong Zhang and
               Xiaolong Li and
               Wenfa Qi and
               Zongming Guo},
  title     = {Location-Based {PVO} and Adaptive Pairwise Modification for Efficient
               Reversible Data Hiding},
  journal   = {{IEEE} Trans. Inf. Forensics Secur.},
  volume    = {15},
  pages     = {2306--2319},
  year      = {2020},
  url       = {https://doi.org/10.1109/TIFS.2019.2963766},
  doi       = {10.1109/TIFS.2019.2963766},
  timestamp = {Wed, 07 Apr 2021 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/tifs/ZhangLQG20.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/ZhangSPZNTZ20,
  author    = {Yanxin Zhang and
               Yulei Sui and
               Shirui Pan and
               Zheng Zheng and
               Baodi Ning and
               Ivor W. Tsang and
               Wanlei Zhou},
  title     = {Familial Clustering for Weakly-Labeled Android Malware Using Hybrid
               Representation Learning},
  journal   = {{IEEE} Trans. Inf. Forensics Secur.},
  volume    = {15},
  pages     = {3401--3414},
  year      = {2020},
  url       = {https://doi.org/10.1109/TIFS.2019.2947861},
  doi       = {10.1109/TIFS.2019.2947861},
  timestamp = {Thu, 21 Apr 2022 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/tifs/ZhangSPZNTZ20.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/ZhangXHWZJ20,
  author    = {Yubao Zhang and
               Jidong Xiao and
               Shuai Hao and
               Haining Wang and
               Sencun Zhu and
               Sushil Jajodia},
  title     = {Understanding the Manipulation on Recommender Systems through Web
               Injection},
  journal   = {{IEEE} Trans. Inf. Forensics Secur.},
  volume    = {15},
  pages     = {3807--3818},
  year      = {2020},
  url       = {https://doi.org/10.1109/TIFS.2019.2954737},
  doi       = {10.1109/TIFS.2019.2954737},
  timestamp = {Mon, 10 Jan 2022 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/journals/tifs/ZhangXHWZJ20.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/ZhangXYXZ20,
  author    = {Yushu Zhang and
               Xiangli Xiao and
               Lu{-}Xing Yang and
               Yong Xiang and
               Sheng Zhong},
  title     = {Secure and Efficient Outsourcing of PCA-Based Face Recognition},
  journal   = {{IEEE} Trans. Inf. Forensics Secur.},
  volume    = {15},
  pages     = {1683--1695},
  year      = {2020},
  url       = {https://doi.org/10.1109/TIFS.2019.2947872},
  doi       = {10.1109/TIFS.2019.2947872},
  timestamp = {Wed, 02 Feb 2022 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/journals/tifs/ZhangXYXZ20.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/ZhangZ20,
  author    = {Rui Zhang and
               Quanyan Zhu},
  title     = {{\textless}tt{\textgreater}FlipIn{\textless}/tt{\textgreater}: {A}
               Game-Theoretic Cyber Insurance Framework for Incentive-Compatible
               Cyber Risk Management of Internet of Things},
  journal   = {{IEEE} Trans. Inf. Forensics Secur.},
  volume    = {15},
  pages     = {2026--2041},
  year      = {2020},
  url       = {https://doi.org/10.1109/TIFS.2019.2955891},
  doi       = {10.1109/TIFS.2019.2955891},
  timestamp = {Thu, 06 Aug 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/tifs/ZhangZ20.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/ZhangZLL20,
  author    = {Ru Zhang and
               Feng Zhu and
               Jianyi Liu and
               Gongshen Liu},
  title     = {Depth-Wise Separable Convolutions and Multi-Level Pooling for an Efficient
               Spatial CNN-Based Steganalysis},
  journal   = {{IEEE} Trans. Inf. Forensics Secur.},
  volume    = {15},
  pages     = {1138--1150},
  year      = {2020},
  url       = {https://doi.org/10.1109/TIFS.2019.2936913},
  doi       = {10.1109/TIFS.2019.2936913},
  timestamp = {Thu, 06 Aug 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/tifs/ZhangZLL20.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/Zhao0ZQ020,
  author    = {Pu Zhao and
               Jia Yu and
               Hanlin Zhang and
               Zhan Qin and
               Cong Wang},
  title     = {How to Securely Outsource Finding the Min-Cut of Undirected Edge-Weighted
               Graphs},
  journal   = {{IEEE} Trans. Inf. Forensics Secur.},
  volume    = {15},
  pages     = {315--328},
  year      = {2020},
  url       = {https://doi.org/10.1109/TIFS.2019.2922277},
  doi       = {10.1109/TIFS.2019.2922277},
  timestamp = {Thu, 06 Aug 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/tifs/Zhao0ZQ020.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/ZhaoLSJS20,
  author    = {Shuangrui Zhao and
               Jia Liu and
               Yulong Shen and
               Xiaohong Jiang and
               Norio Shiratori},
  title     = {Secure Beamforming for Full-Duplex {MIMO} Two-Way Untrusted Relay
               Systems},
  journal   = {{IEEE} Trans. Inf. Forensics Secur.},
  volume    = {15},
  pages     = {3775--3790},
  year      = {2020},
  url       = {https://doi.org/10.1109/TIFS.2020.3001733},
  doi       = {10.1109/TIFS.2020.3001733},
  timestamp = {Wed, 18 Aug 2021 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/tifs/ZhaoLSJS20.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/ZhaoWZZC20,
  author    = {Lingchen Zhao and
               Qian Wang and
               Qin Zou and
               Yan Zhang and
               Yanjiao Chen},
  title     = {Privacy-Preserving Collaborative Deep Learning With Unreliable Participants},
  journal   = {{IEEE} Trans. Inf. Forensics Secur.},
  volume    = {15},
  pages     = {1486--1500},
  year      = {2020},
  url       = {https://doi.org/10.1109/TIFS.2019.2939713},
  doi       = {10.1109/TIFS.2019.2939713},
  timestamp = {Mon, 20 Sep 2021 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/tifs/ZhaoWZZC20.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/Zheng0C20,
  author    = {Yue Zheng and
               Yuan Cao and
               Chip{-}Hong Chang},
  title     = {A PUF-Based Data-Device Hash for Tampered Image Detection and Source
               Camera Identification},
  journal   = {{IEEE} Trans. Inf. Forensics Secur.},
  volume    = {15},
  pages     = {620--634},
  year      = {2020},
  url       = {https://doi.org/10.1109/TIFS.2019.2926777},
  doi       = {10.1109/TIFS.2019.2926777},
  timestamp = {Thu, 06 Aug 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/tifs/Zheng0C20.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/ZhengH20,
  author    = {Huadi Zheng and
               Haibo Hu},
  title     = {{MISSILE:} {A} System of Mobile Inertial Sensor-Based Sensitive Indoor
               Location Eavesdropping},
  journal   = {{IEEE} Trans. Inf. Forensics Secur.},
  volume    = {15},
  pages     = {3137--3151},
  year      = {2020},
  url       = {https://doi.org/10.1109/TIFS.2019.2944034},
  doi       = {10.1109/TIFS.2019.2944034},
  timestamp = {Sat, 05 Sep 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/tifs/ZhengH20.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/ZhengZSCC20,
  author    = {Yue Zheng and
               Xiaojin Zhao and
               Takashi Sato and
               Yuan Cao and
               Chip{-}Hong Chang},
  title     = {Ed-PUF: Event-Driven Physical Unclonable Function for Camera Authentication
               in Reactive Monitoring System},
  journal   = {{IEEE} Trans. Inf. Forensics Secur.},
  volume    = {15},
  pages     = {2824--2839},
  year      = {2020},
  url       = {https://doi.org/10.1109/TIFS.2020.2977597},
  doi       = {10.1109/TIFS.2020.2977597},
  timestamp = {Thu, 06 Aug 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/tifs/ZhengZSCC20.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/ZhongP20,
  author    = {Junliu Zhong and
               Chi{-}Man Pun},
  title     = {An End-to-End Dense-InceptionNet for Image Copy-Move Forgery Detection},
  journal   = {{IEEE} Trans. Inf. Forensics Secur.},
  volume    = {15},
  pages     = {2134--2146},
  year      = {2020},
  url       = {https://doi.org/10.1109/TIFS.2019.2957693},
  doi       = {10.1109/TIFS.2019.2957693},
  timestamp = {Thu, 06 Aug 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/tifs/ZhongP20.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/Zhou20,
  author    = {Lin Zhou},
  title     = {Multiple Private Key Generation for Continuous Memoryless Sources
               With a Helper},
  journal   = {{IEEE} Trans. Inf. Forensics Secur.},
  volume    = {15},
  pages     = {2629--2640},
  year      = {2020},
  url       = {https://doi.org/10.1109/TIFS.2020.2973865},
  doi       = {10.1109/TIFS.2020.2973865},
  timestamp = {Thu, 06 Aug 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/tifs/Zhou20.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/ZhouCQD020,
  author    = {Jun Zhou and
               Zhenfu Cao and
               Zhan Qin and
               Xiaolei Dong and
               Kui Ren},
  title     = {{LPPA:} Lightweight Privacy-Preserving Authentication From Efficient
               Multi-Key Secure Outsourced Computation for Location-Based Services
               in VANETs},
  journal   = {{IEEE} Trans. Inf. Forensics Secur.},
  volume    = {15},
  pages     = {420--434},
  year      = {2020},
  url       = {https://doi.org/10.1109/TIFS.2019.2923156},
  doi       = {10.1109/TIFS.2019.2923156},
  timestamp = {Thu, 23 Jun 2022 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/tifs/ZhouCQD020.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/ZhuMLYLJ20,
  author    = {Shuangyi Zhu and
               Yuan Ma and
               Xusheng Li and
               Jing Yang and
               Jingqiang Lin and
               Jiwu Jing},
  title     = {On the Analysis and Improvement of Min-Entropy Estimation on Time-Varying
               Data},
  journal   = {{IEEE} Trans. Inf. Forensics Secur.},
  volume    = {15},
  pages     = {1696--1708},
  year      = {2020},
  url       = {https://doi.org/10.1109/TIFS.2019.2947871},
  doi       = {10.1109/TIFS.2019.2947871},
  timestamp = {Wed, 12 May 2021 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/tifs/ZhuMLYLJ20.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/ZhuYQT20,
  author    = {Jinbao Zhu and
               Qifa Yan and
               Chao Qi and
               Xiaohu Tang},
  title     = {A New Capacity-Achieving Private Information Retrieval Scheme With
               (Almost) Optimal File Length for Coded Servers},
  journal   = {{IEEE} Trans. Inf. Forensics Secur.},
  volume    = {15},
  pages     = {1248--1260},
  year      = {2020},
  url       = {https://doi.org/10.1109/TIFS.2019.2937634},
  doi       = {10.1109/TIFS.2019.2937634},
  timestamp = {Mon, 26 Oct 2020 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/journals/tifs/ZhuYQT20.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/ZiGCL20,
  author    = {Yang Zi and
               Haichang Gao and
               Zhouhang Cheng and
               Yi Liu},
  title     = {An End-to-End Attack on Text CAPTCHAs},
  journal   = {{IEEE} Trans. Inf. Forensics Secur.},
  volume    = {15},
  pages     = {753--766},
  year      = {2020},
  url       = {https://doi.org/10.1109/TIFS.2019.2928622},
  doi       = {10.1109/TIFS.2019.2928622},
  timestamp = {Thu, 06 Aug 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/tifs/ZiGCL20.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/ZouWWZL20,
  author    = {Qin Zou and
               Yanling Wang and
               Qian Wang and
               Yi Zhao and
               Qingquan Li},
  title     = {Deep Learning-Based Gait Recognition Using Smartphones in the Wild},
  journal   = {{IEEE} Trans. Inf. Forensics Secur.},
  volume    = {15},
  pages     = {3197--3212},
  year      = {2020},
  url       = {https://doi.org/10.1109/TIFS.2020.2985628},
  doi       = {10.1109/TIFS.2020.2985628},
  timestamp = {Wed, 15 Dec 2021 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/journals/tifs/ZouWWZL20.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/AbbasSH19,
  author    = {Mohammed Adil Abbas and
               Hojin Song and
               Jun{-}Pyo Hong},
  title     = {Opportunistic Scheduling for Average Secrecy Rate Enhancement in Fading
               Downlink Channel With Potential Eavesdroppers},
  journal   = {{IEEE} Trans. Inf. Forensics Secur.},
  volume    = {14},
  number    = {4},
  pages     = {969--980},
  year      = {2019},
  url       = {https://doi.org/10.1109/TIFS.2018.2868494},
  doi       = {10.1109/TIFS.2018.2868494},
  timestamp = {Thu, 06 Aug 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/tifs/AbbasSH19.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/AhmedLHK19,
  author    = {Saeed Ahmed and
               Youngdoo Lee and
               Seung Ho Hyun and
               Insoo Koo},
  title     = {Unsupervised Machine Learning-Based Detection of Covert Data Integrity
               Assault in Smart Grid Networks Utilizing Isolation Forest},
  journal   = {{IEEE} Trans. Inf. Forensics Secur.},
  volume    = {14},
  number    = {10},
  pages     = {2765--2777},
  year      = {2019},
  url       = {https://doi.org/10.1109/TIFS.2019.2902822},
  doi       = {10.1109/TIFS.2019.2902822},
  timestamp = {Thu, 06 Aug 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/tifs/AhmedLHK19.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/AhmedUK19,
  author    = {Muhammad Ejaz Ahmed and
               Saeed Ullah and
               Hyoungshick Kim},
  title     = {Statistical Application Fingerprinting for DDoS Attack Mitigation},
  journal   = {{IEEE} Trans. Inf. Forensics Secur.},
  volume    = {14},
  number    = {6},
  pages     = {1471--1484},
  year      = {2019},
  url       = {https://doi.org/10.1109/TIFS.2018.2879616},
  doi       = {10.1109/TIFS.2018.2879616},
  timestamp = {Thu, 06 Aug 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/tifs/AhmedUK19.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/AkgunKK19,
  author    = {Berk Akgun and
               Marwan Krunz and
               Onur Ozan Koyluoglu},
  title     = {Vulnerabilities of Massive {MIMO} Systems to Pilot Contamination Attacks},
  journal   = {{IEEE} Trans. Inf. Forensics Secur.},
  volume    = {14},
  number    = {5},
  pages     = {1251--1263},
  year      = {2019},
  url       = {https://doi.org/10.1109/TIFS.2018.2876750},
  doi       = {10.1109/TIFS.2018.2876750},
  timestamp = {Thu, 06 Aug 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/tifs/AkgunKK19.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/Argones-RuaAPR19,
  author    = {Enrique Argones{-}R{\'{u}}a and
               Aysajan Abidin and
               Roel Peeters and
               Jac Romme},
  title     = {Efficient and Privacy-Preserving Cryptographic Key Derivation From
               Continuous Sources},
  journal   = {{IEEE} Trans. Inf. Forensics Secur.},
  volume    = {14},
  number    = {11},
  pages     = {2834--2847},
  year      = {2019},
  url       = {https://doi.org/10.1109/TIFS.2019.2907459},
  doi       = {10.1109/TIFS.2019.2907459},
  timestamp = {Mon, 26 Oct 2020 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/journals/tifs/Argones-RuaAPR19.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/ArumugamB19,
  author    = {Keerthi Suria Kumar Arumugam and
               Matthieu R. Bloch},
  title     = {Embedding Covert Information in Broadcast Communications},
  journal   = {{IEEE} Trans. Inf. Forensics Secur.},
  volume    = {14},
  number    = {10},
  pages     = {2787--2801},
  year      = {2019},
  url       = {https://doi.org/10.1109/TIFS.2019.2907190},
  doi       = {10.1109/TIFS.2019.2907190},
  timestamp = {Thu, 06 Aug 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/tifs/ArumugamB19.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/BaQFR19,
  author    = {Zhongjie Ba and
               Zhan Qin and
               Xinwen Fu and
               Kui Ren},
  title     = {{CIM:} Camera in Motion for Smartphone Authentication},
  journal   = {{IEEE} Trans. Inf. Forensics Secur.},
  volume    = {14},
  number    = {11},
  pages     = {2987--3002},
  year      = {2019},
  url       = {https://doi.org/10.1109/TIFS.2019.2911173},
  doi       = {10.1109/TIFS.2019.2911173},
  timestamp = {Sat, 05 Sep 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/tifs/BaQFR19.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/BablaniETDC19,
  author    = {Annushree Bablani and
               Damodar Reddy Edla and
               Diwakar Tripathi and
               Shubham Dodia and
               Sridhar Chintala},
  title     = {A Synergistic Concealed Information Test With Novel Approach for {EEG}
               Channel Selection and {SVM} Parameter Optimization},
  journal   = {{IEEE} Trans. Inf. Forensics Secur.},
  volume    = {14},
  number    = {11},
  pages     = {3057--3068},
  year      = {2019},
  url       = {https://doi.org/10.1109/TIFS.2019.2913798},
  doi       = {10.1109/TIFS.2019.2913798},
  timestamp = {Thu, 06 Aug 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/tifs/BablaniETDC19.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/BaiWQZWP19,
  author    = {Junyang Bai and
               Weiping Wang and
               Yan Qin and
               Shigeng Zhang and
               Jianxin Wang and
               Yi Pan},
  title     = {BridgeTaint: {A} Bi-Directional Dynamic Taint Tracking Method for
               JavaScript Bridges in Android Hybrid Applications},
  journal   = {{IEEE} Trans. Inf. Forensics Secur.},
  volume    = {14},
  number    = {3},
  pages     = {677--692},
  year      = {2019},
  url       = {https://doi.org/10.1109/TIFS.2018.2855650},
  doi       = {10.1109/TIFS.2018.2855650},
  timestamp = {Fri, 21 Aug 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/tifs/BaiWQZWP19.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/BartelKT19,
  author    = {Alexandre Bartel and
               Jacques Klein and
               Yves Le Traon},
  title     = {Musti: Dynamic Prevention of Invalid Object Initialization Attacks},
  journal   = {{IEEE} Trans. Inf. Forensics Secur.},
  volume    = {14},
  number    = {8},
  pages     = {2167--2178},
  year      = {2019},
  url       = {https://doi.org/10.1109/TIFS.2019.2894356},
  doi       = {10.1109/TIFS.2019.2894356},
  timestamp = {Fri, 09 Apr 2021 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/tifs/BartelKT19.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/BaurDB19,
  author    = {Sebastian Baur and
               Christian Deppe and
               Holger Boche},
  title     = {Secure Storage for Identification; Random Resources and Privacy Leakage},
  journal   = {{IEEE} Trans. Inf. Forensics Secur.},
  volume    = {14},
  number    = {8},
  pages     = {2013--2027},
  year      = {2019},
  url       = {https://doi.org/10.1109/TIFS.2018.2890813},
  doi       = {10.1109/TIFS.2018.2890813},
  timestamp = {Thu, 06 Aug 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/tifs/BaurDB19.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/BelikovetskySYT19,
  author    = {Sofia Belikovetsky and
               Yosef A. Solewicz and
               Mark Yampolskiy and
               Jinghui Toh and
               Yuval Elovici},
  title     = {Digital Audio Signature for 3D Printing Integrity},
  journal   = {{IEEE} Trans. Inf. Forensics Secur.},
  volume    = {14},
  number    = {5},
  pages     = {1127--1141},
  year      = {2019},
  url       = {https://doi.org/10.1109/TIFS.2018.2851584},
  doi       = {10.1109/TIFS.2018.2851584},
  timestamp = {Thu, 06 Aug 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/tifs/BelikovetskySYT19.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/BocheD19,
  author    = {Holger Boche and
               Christian Deppe},
  title     = {Secure Identification Under Passive Eavesdroppers and Active Jamming
               Attacks},
  journal   = {{IEEE} Trans. Inf. Forensics Secur.},
  volume    = {14},
  number    = {2},
  pages     = {472--485},
  year      = {2019},
  url       = {https://doi.org/10.1109/TIFS.2018.2854729},
  doi       = {10.1109/TIFS.2018.2854729},
  timestamp = {Thu, 06 Aug 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/tifs/BocheD19.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/BondiBPT19,
  author    = {Luca Bondi and
               Paolo Bestagini and
               Fernando P{\'{e}}rez{-}Gonz{\'{a}}lez and
               Stefano Tubaro},
  title     = {Improving {PRNU} Compression Through Preprocessing, Quantization,
               and Coding},
  journal   = {{IEEE} Trans. Inf. Forensics Secur.},
  volume    = {14},
  number    = {3},
  pages     = {608--620},
  year      = {2019},
  url       = {https://doi.org/10.1109/TIFS.2018.2859587},
  doi       = {10.1109/TIFS.2018.2859587},
  timestamp = {Thu, 06 Aug 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/tifs/BondiBPT19.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/BoroumandCF19,
  author    = {Mehdi Boroumand and
               Mo Chen and
               Jessica J. Fridrich},
  title     = {Deep Residual Network for Steganalysis of Digital Images},
  journal   = {{IEEE} Trans. Inf. Forensics Secur.},
  volume    = {14},
  number    = {5},
  pages     = {1181--1193},
  year      = {2019},
  url       = {https://doi.org/10.1109/TIFS.2018.2871749},
  doi       = {10.1109/TIFS.2018.2871749},
  timestamp = {Thu, 06 Aug 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/tifs/BoroumandCF19.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/CaiMRY19,
  author    = {Haipeng Cai and
               Na Meng and
               Barbara G. Ryder and
               Danfeng Yao},
  title     = {DroidCat: Effective Android Malware Detection and Categorization via
               App-Level Profiling},
  journal   = {{IEEE} Trans. Inf. Forensics Secur.},
  volume    = {14},
  number    = {6},
  pages     = {1455--1470},
  year      = {2019},
  url       = {https://doi.org/10.1109/TIFS.2018.2879302},
  doi       = {10.1109/TIFS.2018.2879302},
  timestamp = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/tifs/CaiMRY19.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/CallejaTC19,
  author    = {Alejandro Calleja and
               Juan Tapiador and
               Juan Caballero},
  title     = {The MalSource Dataset: Quantifying Complexity and Code Reuse in Malware
               Development},
  journal   = {{IEEE} Trans. Inf. Forensics Secur.},
  volume    = {14},
  number    = {12},
  pages     = {3175--3190},
  year      = {2019},
  url       = {https://doi.org/10.1109/TIFS.2018.2885512},
  doi       = {10.1109/TIFS.2018.2885512},
  timestamp = {Fri, 09 Apr 2021 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/tifs/CallejaTC19.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/CamachoMGS19,
  author    = {Jos{\'{e}} Camacho and
               Gabriel Maci{\'{a}}{-}Fern{\'{a}}ndez and
               Noem{\'{\i}} Marta Fuentes Garc{\'{\i}}a and
               Edoardo Saccenti},
  title     = {Semi-Supervised Multivariate Statistical Network Monitoring for Learning
               Security Threats},
  journal   = {{IEEE} Trans. Inf. Forensics Secur.},
  volume    = {14},
  number    = {8},
  pages     = {2179--2189},
  year      = {2019},
  url       = {https://doi.org/10.1109/TIFS.2019.2894358},
  doi       = {10.1109/TIFS.2019.2894358},
  timestamp = {Thu, 30 Jun 2022 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/tifs/CamachoMGS19.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/CaoHYHS19,
  author    = {Jie Cao and
               Yibo Hu and
               Bing Yu and
               Ran He and
               Zhenan Sun},
  title     = {3D Aided Duet GANs for Multi-View Face Image Synthesis},
  journal   = {{IEEE} Trans. Inf. Forensics Secur.},
  volume    = {14},
  number    = {8},
  pages     = {2028--2042},
  year      = {2019},
  url       = {https://doi.org/10.1109/TIFS.2019.2891116},
  doi       = {10.1109/TIFS.2019.2891116},
  timestamp = {Thu, 06 Aug 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/tifs/CaoHYHS19.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/CasinoCP19,
  author    = {Fran Casino and
               Kim{-}Kwang Raymond Choo and
               Constantinos Patsakis},
  title     = {{HEDGE:} Efficient Traffic Classification of Encrypted and Compressed
               Packets},
  journal   = {{IEEE} Trans. Inf. Forensics Secur.},
  volume    = {14},
  number    = {11},
  pages     = {2916--2926},
  year      = {2019},
  url       = {https://doi.org/10.1109/TIFS.2019.2911156},
  doi       = {10.1109/TIFS.2019.2911156},
  timestamp = {Thu, 06 Aug 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/tifs/CasinoCP19.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/ChenHHS19,
  author    = {Yu{-}Chi Chen and
               Tsung{-}Hsuan Hung and
               Sung{-}Hsien Hsieh and
               Chih{-}Wei Shiu},
  title     = {A New Reversible Data Hiding in Encrypted Image Based on Multi-Secret
               Sharing and Lightweight Cryptographic Algorithms},
  journal   = {{IEEE} Trans. Inf. Forensics Secur.},
  volume    = {14},
  number    = {12},
  pages     = {3332--3343},
  year      = {2019},
  url       = {https://doi.org/10.1109/TIFS.2019.2914557},
  doi       = {10.1109/TIFS.2019.2914557},
  timestamp = {Mon, 26 Oct 2020 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/journals/tifs/ChenHHS19.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/ChenL19,
  author    = {Jinyuan Chen and
               Fan Li},
  title     = {Adding a Helper Can Totally Remove the Secrecy Constraints in a Two-User
               Interference Channel},
  journal   = {{IEEE} Trans. Inf. Forensics Secur.},
  volume    = {14},
  number    = {12},
  pages     = {3126--3139},
  year      = {2019},
  url       = {https://doi.org/10.1109/TIFS.2019.2913514},
  doi       = {10.1109/TIFS.2019.2913514},
  timestamp = {Thu, 06 Aug 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/tifs/ChenL19.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/ChenNZZC19,
  author    = {Zhili Chen and
               Tianjiao Ni and
               Hong Zhong and
               Shun Zhang and
               Jie Cui},
  title     = {Differentially Private Double Spectrum Auction With Approximate Social
               Welfare Maximization},
  journal   = {{IEEE} Trans. Inf. Forensics Secur.},
  volume    = {14},
  number    = {11},
  pages     = {2805--2818},
  year      = {2019},
  url       = {https://doi.org/10.1109/TIFS.2019.2908070},
  doi       = {10.1109/TIFS.2019.2908070},
  timestamp = {Thu, 06 Aug 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/tifs/ChenNZZC19.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/ChenSZZLH19,
  author    = {Yaxing Chen and
               Wenhai Sun and
               Ning Zhang and
               Qinghua Zheng and
               Wenjing Lou and
               Y. Thomas Hou},
  title     = {Towards Efficient Fine-Grained Access Control and Trustworthy Data
               Processing for Remote Monitoring Services in IoT},
  journal   = {{IEEE} Trans. Inf. Forensics Secur.},
  volume    = {14},
  number    = {7},
  pages     = {1830--1842},
  year      = {2019},
  url       = {https://doi.org/10.1109/TIFS.2018.2885287},
  doi       = {10.1109/TIFS.2018.2885287},
  timestamp = {Thu, 06 Aug 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/tifs/ChenSZZLH19.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/ChenTLNZB19,
  author    = {Zhipeng Chen and
               Benedetta Tondi and
               Xiaolong Li and
               Rongrong Ni and
               Yao Zhao and
               Mauro Barni},
  title     = {Secure Detection of Image Manipulation by Means of Random Feature
               Selection},
  journal   = {{IEEE} Trans. Inf. Forensics Secur.},
  volume    = {14},
  number    = {9},
  pages     = {2454--2469},
  year      = {2019},
  url       = {https://doi.org/10.1109/TIFS.2019.2901826},
  doi       = {10.1109/TIFS.2019.2901826},
  timestamp = {Thu, 06 Aug 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/tifs/ChenTLNZB19.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/ChenZ19,
  author    = {Juntao Chen and
               Quanyan Zhu},
  title     = {Interdependent Strategic Security Risk Management With Bounded Rationality
               in the Internet of Things},
  journal   = {{IEEE} Trans. Inf. Forensics Secur.},
  volume    = {14},
  number    = {11},
  pages     = {2958--2971},
  year      = {2019},
  url       = {https://doi.org/10.1109/TIFS.2019.2911112},
  doi       = {10.1109/TIFS.2019.2911112},
  timestamp = {Thu, 06 Aug 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/tifs/ChenZ19.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/ChenZZZY19,
  author    = {Kejiang Chen and
               Hang Zhou and
               Wenbo Zhou and
               Weiming Zhang and
               Nenghai Yu},
  title     = {Defining Cost Functions for Adaptive {JPEG} Steganography at the Microscale},
  journal   = {{IEEE} Trans. Inf. Forensics Secur.},
  volume    = {14},
  number    = {4},
  pages     = {1052--1066},
  year      = {2019},
  url       = {https://doi.org/10.1109/TIFS.2018.2869353},
  doi       = {10.1109/TIFS.2018.2869353},
  timestamp = {Mon, 29 Mar 2021 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/tifs/ChenZZZY19.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/ChoCC19,
  author    = {Sunghwan Cho and
               Gaojie Chen and
               Justin P. Coon},
  title     = {Enhancement of Physical Layer Security With Simultaneous Beamforming
               and Jamming for Visible Light Communication Systems},
  journal   = {{IEEE} Trans. Inf. Forensics Secur.},
  volume    = {14},
  number    = {10},
  pages     = {2633--2648},
  year      = {2019},
  url       = {https://doi.org/10.1109/TIFS.2019.2904440},
  doi       = {10.1109/TIFS.2019.2904440},
  timestamp = {Thu, 06 Aug 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/tifs/ChoCC19.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/Choi19,
  author    = {Jinho Choi},
  title     = {A Coding Approach With Key-Channel Randomization for Physical-Layer
               Authentication},
  journal   = {{IEEE} Trans. Inf. Forensics Secur.},
  volume    = {14},
  number    = {1},
  pages     = {175--185},
  year      = {2019},
  url       = {https://doi.org/10.1109/TIFS.2018.2847659},
  doi       = {10.1109/TIFS.2018.2847659},
  timestamp = {Thu, 06 Aug 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/tifs/Choi19.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/ChoiKKK19,
  author    = {Seokeon Choi and
               Jonghee Kim and
               Wonjun Kim and
               Changick Kim},
  title     = {Skeleton-Based Gait Recognition via Robust Frame-Level Matching},
  journal   = {{IEEE} Trans. Inf. Forensics Secur.},
  volume    = {14},
  number    = {10},
  pages     = {2577--2592},
  year      = {2019},
  url       = {https://doi.org/10.1109/TIFS.2019.2901823},
  doi       = {10.1109/TIFS.2019.2901823},
  timestamp = {Thu, 06 Aug 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/tifs/ChoiKKK19.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/ChopraMA19,
  author    = {Ribhu Chopra and
               Chandra R. Murthy and
               Ramesh Annavajjala},
  title     = {Physical Layer Security in Wireless Sensor Networks Using Distributed
               Co-Phasing},
  journal   = {{IEEE} Trans. Inf. Forensics Secur.},
  volume    = {14},
  number    = {10},
  pages     = {2662--2675},
  year      = {2019},
  url       = {https://doi.org/10.1109/TIFS.2019.2905759},
  doi       = {10.1109/TIFS.2019.2905759},
  timestamp = {Thu, 06 Aug 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/tifs/ChopraMA19.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/ChumanSK19,
  author    = {Tatsuya Chuman and
               Warit Sirichotedumrong and
               Hitoshi Kiya},
  title     = {Encryption-Then-Compression Systems Using Grayscale-Based Image Encryption
               for {JPEG} Images},
  journal   = {{IEEE} Trans. Inf. Forensics Secur.},
  volume    = {14},
  number    = {6},
  pages     = {1515--1525},
  year      = {2019},
  url       = {https://doi.org/10.1109/TIFS.2018.2881677},
  doi       = {10.1109/TIFS.2018.2881677},
  timestamp = {Thu, 06 Aug 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/tifs/ChumanSK19.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/DaiL19,
  author    = {Bin Dai and
               Yuan Luo},
  title     = {An Improved Feedback Coding Scheme for the Wire-Tap Channel},
  journal   = {{IEEE} Trans. Inf. Forensics Secur.},
  volume    = {14},
  number    = {1},
  pages     = {262--271},
  year      = {2019},
  url       = {https://doi.org/10.1109/TIFS.2018.2849978},
  doi       = {10.1109/TIFS.2018.2849978},
  timestamp = {Thu, 06 Aug 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/tifs/DaiL19.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/DasPMC19,
  author    = {Rig Das and
               Emanuela Piciucco and
               Emanuele Maiorana and
               Patrizio Campisi},
  title     = {Convolutional Neural Network for Finger-Vein-Based Biometric Identification},
  journal   = {{IEEE} Trans. Inf. Forensics Secur.},
  volume    = {14},
  number    = {2},
  pages     = {360--373},
  year      = {2019},
  url       = {https://doi.org/10.1109/TIFS.2018.2850320},
  doi       = {10.1109/TIFS.2018.2850320},
  timestamp = {Thu, 06 Aug 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/tifs/DasPMC19.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/Delvaux19,
  author    = {Jeroen Delvaux},
  title     = {Machine-Learning Attacks on PolyPUFs, OB-PUFs, RPUFs, LHS-PUFs, and
               PUF-FSMs},
  journal   = {{IEEE} Trans. Inf. Forensics Secur.},
  volume    = {14},
  number    = {8},
  pages     = {2043--2058},
  year      = {2019},
  url       = {https://doi.org/10.1109/TIFS.2019.2891223},
  doi       = {10.1109/TIFS.2019.2891223},
  timestamp = {Thu, 06 Aug 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/tifs/Delvaux19.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/DesaiN19,
  author    = {S. Sundeep Desai and
               Manisha J. Nene},
  title     = {Node-Level Trust Evaluation in Wireless Sensor Networks},
  journal   = {{IEEE} Trans. Inf. Forensics Secur.},
  volume    = {14},
  number    = {8},
  pages     = {2139--2152},
  year      = {2019},
  url       = {https://doi.org/10.1109/TIFS.2019.2894027},
  doi       = {10.1109/TIFS.2019.2894027},
  timestamp = {Thu, 06 Aug 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/tifs/DesaiN19.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/Domingo-FerrerS19,
  author    = {Josep Domingo{-}Ferrer and
               Jordi Soria{-}Comas and
               Rafael Mulero{-}Vellido},
  title     = {Steered Microaggregation as a Unified Primitive to Anonymize Data
               Sets and Data Streams},
  journal   = {{IEEE} Trans. Inf. Forensics Secur.},
  volume    = {14},
  number    = {12},
  pages     = {3298--3311},
  year      = {2019},
  url       = {https://doi.org/10.1109/TIFS.2019.2914832},
  doi       = {10.1109/TIFS.2019.2914832},
  timestamp = {Thu, 06 Aug 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/tifs/Domingo-FerrerS19.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/DuGJZRP19,
  author    = {Jun Du and
               Erol Gelenbe and
               Chunxiao Jiang and
               Haijun Zhang and
               Yong Ren and
               H. Vincent Poor},
  title     = {Peer Prediction-Based Trustworthiness Evaluation and Trustworthy Service
               Rating in Social Networks},
  journal   = {{IEEE} Trans. Inf. Forensics Secur.},
  volume    = {14},
  number    = {6},
  pages     = {1582--1594},
  year      = {2019},
  url       = {https://doi.org/10.1109/TIFS.2018.2883000},
  doi       = {10.1109/TIFS.2018.2883000},
  timestamp = {Thu, 23 Jun 2022 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/tifs/DuGJZRP19.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/DurmusKM19,
  author    = {Emre Durmus and
               Pawel Korus and
               Nasir D. Memon},
  title     = {Every Shred Helps: Assembling Evidence From Orphaned {JPEG} Fragments},
  journal   = {{IEEE} Trans. Inf. Forensics Secur.},
  volume    = {14},
  number    = {9},
  pages     = {2372--2386},
  year      = {2019},
  url       = {https://doi.org/10.1109/TIFS.2019.2897912},
  doi       = {10.1109/TIFS.2019.2897912},
  timestamp = {Thu, 06 Aug 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/tifs/DurmusKM19.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/EngelmannJ19,
  author    = {Anna Engelmann and
               Admela Jukan},
  title     = {Toward All-Optical Layered Encryption: {A} Feasibility Analysis of
               Optical Stream Cipher},
  journal   = {{IEEE} Trans. Inf. Forensics Secur.},
  volume    = {14},
  number    = {10},
  pages     = {2689--2704},
  year      = {2019},
  url       = {https://doi.org/10.1109/TIFS.2019.2904793},
  doi       = {10.1109/TIFS.2019.2904793},
  timestamp = {Thu, 06 Aug 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/tifs/EngelmannJ19.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/ErdemS19,
  author    = {Emir Erdem and
               Mehmet Tahir Sandikkaya},
  title     = {OTPaaS - One Time Password as a Service},
  journal   = {{IEEE} Trans. Inf. Forensics Secur.},
  volume    = {14},
  number    = {3},
  pages     = {743--756},
  year      = {2019},
  url       = {https://doi.org/10.1109/TIFS.2018.2866025},
  doi       = {10.1109/TIFS.2018.2866025},
  timestamp = {Thu, 06 Aug 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/tifs/ErdemS19.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/Essex19,
  author    = {Aleksander Essex},
  title     = {Secure Approximate String Matching for Privacy-Preserving Record Linkage},
  journal   = {{IEEE} Trans. Inf. Forensics Secur.},
  volume    = {14},
  number    = {10},
  pages     = {2623--2632},
  year      = {2019},
  url       = {https://doi.org/10.1109/TIFS.2019.2903651},
  doi       = {10.1109/TIFS.2019.2903651},
  timestamp = {Thu, 06 Aug 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/tifs/Essex19.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/FangZZCY19,
  author    = {Han Fang and
               Weiming Zhang and
               Hang Zhou and
               Hao Cui and
               Nenghai Yu},
  title     = {Screen-Shooting Resilient Watermarking},
  journal   = {{IEEE} Trans. Inf. Forensics Secur.},
  volume    = {14},
  number    = {6},
  pages     = {1403--1418},
  year      = {2019},
  url       = {https://doi.org/10.1109/TIFS.2018.2878541},
  doi       = {10.1109/TIFS.2018.2878541},
  timestamp = {Mon, 29 Mar 2021 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/tifs/FangZZCY19.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/Farokhi19,
  author    = {Farhad Farokhi},
  title     = {Development and Analysis of Deterministic Privacy-Preserving Policies
               Using Non- Stochastic Information Theory},
  journal   = {{IEEE} Trans. Inf. Forensics Secur.},
  volume    = {14},
  number    = {10},
  pages     = {2567--2576},
  year      = {2019},
  url       = {https://doi.org/10.1109/TIFS.2019.2903660},
  doi       = {10.1109/TIFS.2019.2903660},
  timestamp = {Thu, 06 Aug 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/tifs/Farokhi19.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/FarooqZ19,
  author    = {Muhammad Junaid Farooq and
               Quanyan Zhu},
  title     = {Modeling, Analysis, and Mitigation of Dynamic Botnet Formation in
               Wireless IoT Networks},
  journal   = {{IEEE} Trans. Inf. Forensics Secur.},
  volume    = {14},
  number    = {9},
  pages     = {2412--2426},
  year      = {2019},
  url       = {https://doi.org/10.1109/TIFS.2019.2898817},
  doi       = {10.1109/TIFS.2019.2898817},
  timestamp = {Thu, 06 Aug 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/tifs/FarooqZ19.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/FeghhiL19,
  author    = {Saman Feghhi and
               Douglas J. Leith},
  title     = {An Efficient Web Traffic Defence Against Timing-Analysis Attacks},
  journal   = {{IEEE} Trans. Inf. Forensics Secur.},
  volume    = {14},
  number    = {2},
  pages     = {525--540},
  year      = {2019},
  url       = {https://doi.org/10.1109/TIFS.2018.2855655},
  doi       = {10.1109/TIFS.2018.2855655},
  timestamp = {Thu, 06 Aug 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/tifs/FeghhiL19.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/FengYLYY19,
  author    = {Youhong Feng and
               Shihao Yan and
               Chenxi Liu and
               Zhen Yang and
               Nan Yang},
  title     = {Two-Stage Relay Selection for Enhancing Physical Layer Security in
               Non-Orthogonal Multiple Access},
  journal   = {{IEEE} Trans. Inf. Forensics Secur.},
  volume    = {14},
  number    = {6},
  pages     = {1670--1683},
  year      = {2019},
  url       = {https://doi.org/10.1109/TIFS.2018.2883273},
  doi       = {10.1109/TIFS.2018.2883273},
  timestamp = {Thu, 06 Aug 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/tifs/FengYLYY19.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/FiandrottiGG19,
  author    = {Attilio Fiandrotti and
               Rossano Gaeta and
               Marco Grangetto},
  title     = {Securing Network Coding Architectures Against Pollution Attacks With
               Band Codes},
  journal   = {{IEEE} Trans. Inf. Forensics Secur.},
  volume    = {14},
  number    = {3},
  pages     = {730--742},
  year      = {2019},
  url       = {https://doi.org/10.1109/TIFS.2018.2859583},
  doi       = {10.1109/TIFS.2018.2859583},
  timestamp = {Thu, 06 Aug 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/tifs/FiandrottiGG19.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/FriedmanK19,
  author    = {Lee Friedman and
               Oleg V. Komogortsev},
  title     = {Assessment of the Effectiveness of Seven Biometric Feature Normalization
               Techniques},
  journal   = {{IEEE} Trans. Inf. Forensics Secur.},
  volume    = {14},
  number    = {10},
  pages     = {2528--2536},
  year      = {2019},
  url       = {https://doi.org/10.1109/TIFS.2019.2904844},
  doi       = {10.1109/TIFS.2019.2904844},
  timestamp = {Thu, 06 Aug 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/tifs/FriedmanK19.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/FritschekW19,
  author    = {Rick Fritschek and
               Gerhard Wunder},
  title     = {On the Gaussian Multiple Access Wiretap Channel and the Gaussian Wiretap
               Channel With a Helper: Achievable Schemes and Upper Bounds},
  journal   = {{IEEE} Trans. Inf. Forensics Secur.},
  volume    = {14},
  number    = {5},
  pages     = {1224--1239},
  year      = {2019},
  url       = {https://doi.org/10.1109/TIFS.2018.2871779},
  doi       = {10.1109/TIFS.2018.2871779},
  timestamp = {Thu, 06 Aug 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/tifs/FritschekW19.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/GalballyHB19,
  author    = {Javier Galbally and
               Rudolf Haraksim and
               Laurent Beslay},
  title     = {A Study of Age and Ageing in Fingerprint Biometrics},
  journal   = {{IEEE} Trans. Inf. Forensics Secur.},
  volume    = {14},
  number    = {5},
  pages     = {1351--1365},
  year      = {2019},
  url       = {https://doi.org/10.1109/TIFS.2018.2878160},
  doi       = {10.1109/TIFS.2018.2878160},
  timestamp = {Thu, 06 Aug 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/tifs/GalballyHB19.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/GaoSXR19,
  author    = {Yansong Gao and
               Yang Su and
               Lei Xu and
               Damith Chinthana Ranasinghe},
  title     = {Lightweight (Reverse) Fuzzy Extractor With Multiple Reference {PUF}
               Responses},
  journal   = {{IEEE} Trans. Inf. Forensics Secur.},
  volume    = {14},
  number    = {7},
  pages     = {1887--1901},
  year      = {2019},
  url       = {https://doi.org/10.1109/TIFS.2018.2886624},
  doi       = {10.1109/TIFS.2018.2886624},
  timestamp = {Thu, 06 Aug 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/tifs/GaoSXR19.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/GenovesePPS19,
  author    = {Angelo Genovese and
               Vincenzo Piuri and
               Konstantinos N. Plataniotis and
               Fabio Scotti},
  title     = {PalmNet: Gabor-PCA Convolutional Networks for Touchless Palmprint
               Recognition},
  journal   = {{IEEE} Trans. Inf. Forensics Secur.},
  volume    = {14},
  number    = {12},
  pages     = {3160--3174},
  year      = {2019},
  url       = {https://doi.org/10.1109/TIFS.2019.2911165},
  doi       = {10.1109/TIFS.2019.2911165},
  timestamp = {Sat, 05 Sep 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/tifs/GenovesePPS19.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/Ghasemzadeh19,
  author    = {Hamzeh Ghasemzadeh},
  title     = {Multi-Layer Architecture for Efficient Steganalysis of UnderMp3Cover
               in Multi-Encoder Scenario},
  journal   = {{IEEE} Trans. Inf. Forensics Secur.},
  volume    = {14},
  number    = {1},
  pages     = {186--195},
  year      = {2019},
  url       = {https://doi.org/10.1109/TIFS.2018.2847678},
  doi       = {10.1109/TIFS.2018.2847678},
  timestamp = {Thu, 06 Aug 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/tifs/Ghasemzadeh19.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/GopeS19,
  author    = {Prosanta Gope and
               Biplab Sikdar},
  title     = {Lightweight and Privacy-Friendly Spatial Data Aggregation for Secure
               Power Supply and Demand Management in Smart Grids},
  journal   = {{IEEE} Trans. Inf. Forensics Secur.},
  volume    = {14},
  number    = {6},
  pages     = {1554--1566},
  year      = {2019},
  url       = {https://doi.org/10.1109/TIFS.2018.2881730},
  doi       = {10.1109/TIFS.2018.2881730},
  timestamp = {Thu, 06 Aug 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/tifs/GopeS19.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/GriffinCAB19,
  author    = {Lewis D. Griffin and
               Matthew Caldwell and
               Jerone T. A. Andrews and
               Helene Bohler},
  title     = {"Unexpected Item in the Bagging Area": Anomaly Detection in X-Ray
               Security Images},
  journal   = {{IEEE} Trans. Inf. Forensics Secur.},
  volume    = {14},
  number    = {6},
  pages     = {1539--1553},
  year      = {2019},
  url       = {https://doi.org/10.1109/TIFS.2018.2881700},
  doi       = {10.1109/TIFS.2018.2881700},
  timestamp = {Thu, 06 Aug 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/tifs/GriffinCAB19.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/GrozaM19,
  author    = {Bogdan Groza and
               Pal{-}Stefan Murvay},
  title     = {Efficient Intrusion Detection With Bloom Filtering in Controller Area
               Networks},
  journal   = {{IEEE} Trans. Inf. Forensics Secur.},
  volume    = {14},
  number    = {4},
  pages     = {1037--1051},
  year      = {2019},
  url       = {https://doi.org/10.1109/TIFS.2018.2869351},
  doi       = {10.1109/TIFS.2018.2869351},
  timestamp = {Sun, 25 Jul 2021 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/tifs/GrozaM19.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/GunluISK19,
  author    = {Onur G{\"{u}}nl{\"{u}} and
               Onurcan Iscan and
               Vladimir Sidorenko and
               Gerhard Kramer},
  title     = {Code Constructions for Physical Unclonable Functions and Biometric
               Secrecy Systems},
  journal   = {{IEEE} Trans. Inf. Forensics Secur.},
  volume    = {14},
  number    = {11},
  pages     = {2848--2858},
  year      = {2019},
  url       = {https://doi.org/10.1109/TIFS.2019.2911155},
  doi       = {10.1109/TIFS.2019.2911155},
  timestamp = {Thu, 06 Aug 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/tifs/GunluISK19.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/HafemannSO19,
  author    = {Luiz G. Hafemann and
               Robert Sabourin and
               Luiz S. Oliveira},
  title     = {Characterizing and Evaluating Adversarial Examples for Offline Handwritten
               Signature Verification},
  journal   = {{IEEE} Trans. Inf. Forensics Secur.},
  volume    = {14},
  number    = {8},
  pages     = {2153--2166},
  year      = {2019},
  url       = {https://doi.org/10.1109/TIFS.2019.2894031},
  doi       = {10.1109/TIFS.2019.2894031},
  timestamp = {Thu, 06 Aug 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/tifs/HafemannSO19.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/Hajj-AhmadWGZYW19,
  author    = {Adi Hajj{-}Ahmad and
               Chau{-}Wai Wong and
               Steven Gambino and
               Qiang Zhu and
               Miao Yu and
               Min Wu},
  title     = {Factors Affecting {ENF} Capture in Audio},
  journal   = {{IEEE} Trans. Inf. Forensics Secur.},
  volume    = {14},
  number    = {2},
  pages     = {277--288},
  year      = {2019},
  url       = {https://doi.org/10.1109/TIFS.2018.2837645},
  doi       = {10.1109/TIFS.2018.2837645},
  timestamp = {Thu, 06 Aug 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/tifs/Hajj-AhmadWGZYW19.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/HanDZ19,
  author    = {Yitao Han and
               Lingjie Duan and
               Rui Zhang},
  title     = {Jamming-Assisted Eavesdropping Over Parallel Fading Channels},
  journal   = {{IEEE} Trans. Inf. Forensics Secur.},
  volume    = {14},
  number    = {9},
  pages     = {2486--2499},
  year      = {2019},
  url       = {https://doi.org/10.1109/TIFS.2019.2901821},
  doi       = {10.1109/TIFS.2019.2901821},
  timestamp = {Thu, 06 Aug 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/tifs/HanDZ19.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/HarrisonFGV19,
  author    = {Willie K. Harrison and
               Telmo R. Fernandes and
               Marco A. C. Gomes and
               Jo{\~{a}}o P. Vilela},
  title     = {Generating a Binary Symmetric Channel for Wiretap Codes},
  journal   = {{IEEE} Trans. Inf. Forensics Secur.},
  volume    = {14},
  number    = {8},
  pages     = {2128--2138},
  year      = {2019},
  url       = {https://doi.org/10.1109/TIFS.2019.2892010},
  doi       = {10.1109/TIFS.2019.2892010},
  timestamp = {Thu, 06 Aug 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/tifs/HarrisonFGV19.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/HeZSW19,
  author    = {Yiwei He and
               Junping Zhang and
               Hongming Shan and
               Liang Wang},
  title     = {Multi-Task GANs for View-Specific Feature Learning in Gait Recognition},
  journal   = {{IEEE} Trans. Inf. Forensics Secur.},
  volume    = {14},
  number    = {1},
  pages     = {102--113},
  year      = {2019},
  url       = {https://doi.org/10.1109/TIFS.2018.2844819},
  doi       = {10.1109/TIFS.2018.2844819},
  timestamp = {Tue, 02 Nov 2021 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/journals/tifs/HeZSW19.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/HollerBU19,
  author    = {Yvonne H{\"{o}}ller and
               Arne C. Bathke and
               Andreas Uhl},
  title     = {Age, Sex, and Pathology Effects on Stability of Electroencephalographic
               Biometric Features Based on Measures of Interaction},
  journal   = {{IEEE} Trans. Inf. Forensics Secur.},
  volume    = {14},
  number    = {2},
  pages     = {459--471},
  year      = {2019},
  url       = {https://doi.org/10.1109/TIFS.2018.2854728},
  doi       = {10.1109/TIFS.2018.2854728},
  timestamp = {Thu, 06 Aug 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/tifs/HollerBU19.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/HongWJB19,
  author    = {Zhen Hong and
               Rui Wang and
               Shouling Ji and
               Raheem Beyah},
  title     = {Attacker Location Evaluation-Based Fake Source Scheduling for Source
               Location Privacy in Cyber-Physical Systems},
  journal   = {{IEEE} Trans. Inf. Forensics Secur.},
  volume    = {14},
  number    = {5},
  pages     = {1337--1350},
  year      = {2019},
  url       = {https://doi.org/10.1109/TIFS.2018.2876839},
  doi       = {10.1109/TIFS.2018.2876839},
  timestamp = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/tifs/HongWJB19.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/HosseiniJK19,
  author    = {Seyed Mohammad Hosseini and
               Amir Hossein Jahangir and
               Mehdi Kazemi},
  title     = {Digesting Network Traffic for Forensic Investigation Using Digital
               Signal Processing Techniques},
  journal   = {{IEEE} Trans. Inf. Forensics Secur.},
  volume    = {14},
  number    = {12},
  pages     = {3312--3321},
  year      = {2019},
  url       = {https://doi.org/10.1109/TIFS.2019.2915190},
  doi       = {10.1109/TIFS.2019.2915190},
  timestamp = {Thu, 10 Sep 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/tifs/HosseiniJK19.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/HsuCH19,
  author    = {Kai{-}Hsiang Hsu and
               Yu{-}Hsi Chiang and
               Hsu{-}Chun Hsiao},
  title     = {SafeChain: Securing Trigger-Action Programming From Attack Chains},
  journal   = {{IEEE} Trans. Inf. Forensics Secur.},
  volume    = {14},
  number    = {10},
  pages     = {2607--2622},
  year      = {2019},
  url       = {https://doi.org/10.1109/TIFS.2019.2899758},
  doi       = {10.1109/TIFS.2019.2899758},
  timestamp = {Thu, 06 Aug 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/tifs/HsuCH19.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/HuHGLD19,
  author    = {Xing Hu and
               Yingping Huang and
               Xiumin Gao and
               Lingkun Luo and
               Qianqian Duan},
  title     = {Squirrel-Cage Local Binary Pattern and Its Application in Video Anomaly
               Detection},
  journal   = {{IEEE} Trans. Inf. Forensics Secur.},
  volume    = {14},
  number    = {4},
  pages     = {1007--1022},
  year      = {2019},
  url       = {https://doi.org/10.1109/TIFS.2018.2868617},
  doi       = {10.1109/TIFS.2018.2868617},
  timestamp = {Thu, 06 Aug 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/tifs/HuHGLD19.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/IulianiSFMP19,
  author    = {Massimo Iuliani and
               Dasara Shullani and
               Marco Fontani and
               Saverio Meucci and
               Alessandro Piva},
  title     = {A Video Forensic Framework for the Unsupervised Analysis of MP4-Like
               File Container},
  journal   = {{IEEE} Trans. Inf. Forensics Secur.},
  volume    = {14},
  number    = {3},
  pages     = {635--645},
  year      = {2019},
  url       = {https://doi.org/10.1109/TIFS.2018.2859760},
  doi       = {10.1109/TIFS.2018.2859760},
  timestamp = {Thu, 06 Aug 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/tifs/IulianiSFMP19.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/JiangG19,
  author    = {Min Jiang and
               Guodong Guo},
  title     = {Body Weight Analysis From Human Body Images},
  journal   = {{IEEE} Trans. Inf. Forensics Secur.},
  volume    = {14},
  number    = {10},
  pages     = {2676--2688},
  year      = {2019},
  url       = {https://doi.org/10.1109/TIFS.2019.2904840},
  doi       = {10.1109/TIFS.2019.2904840},
  timestamp = {Thu, 06 Aug 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/tifs/JiangG19.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/JiangL19,
  author    = {Yuechi Jiang and
               Frank H. F. Leung},
  title     = {Source Microphone Recognition Aided by a Kernel-Based Projection Method},
  journal   = {{IEEE} Trans. Inf. Forensics Secur.},
  volume    = {14},
  number    = {11},
  pages     = {2875--2886},
  year      = {2019},
  url       = {https://doi.org/10.1109/TIFS.2019.2911175},
  doi       = {10.1109/TIFS.2019.2911175},
  timestamp = {Thu, 06 Aug 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/tifs/JiangL19.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/JinHD19,
  author    = {Richeng Jin and
               Xiaofan He and
               Huaiyu Dai},
  title     = {On the Security-Privacy Tradeoff in Collaborative Security: {A} Quantitative
               Information Flow Game Perspective},
  journal   = {{IEEE} Trans. Inf. Forensics Secur.},
  volume    = {14},
  number    = {12},
  pages     = {3273--3286},
  year      = {2019},
  url       = {https://doi.org/10.1109/TIFS.2019.2914358},
  doi       = {10.1109/TIFS.2019.2914358},
  timestamp = {Thu, 06 Aug 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/tifs/JinHD19.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/JungLHQQCHH19,
  author    = {Taeho Jung and
               Xiang{-}Yang Li and
               Wenchao Huang and
               Zhongying Qiao and
               Jianwei Qian and
               Linlin Chen and
               Junze Han and
               Jiahui Hou},
  title     = {AccountTrade: Accountability Against Dishonest Big Data Buyers and
               Sellers},
  journal   = {{IEEE} Trans. Inf. Forensics Secur.},
  volume    = {14},
  number    = {1},
  pages     = {223--234},
  year      = {2019},
  url       = {https://doi.org/10.1109/TIFS.2018.2848657},
  doi       = {10.1109/TIFS.2018.2848657},
  timestamp = {Thu, 06 Aug 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/tifs/JungLHQQCHH19.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/KaminagaSF19,
  author    = {Masahiro Kaminaga and
               Toshinori Suzuki and
               Masaharu Fukase},
  title     = {Determining the Optimal Random-Padding Size for Rabin Cryptosystems},
  journal   = {{IEEE} Trans. Inf. Forensics Secur.},
  volume    = {14},
  number    = {8},
  pages     = {2232--2242},
  year      = {2019},
  url       = {https://doi.org/10.1109/TIFS.2019.2895545},
  doi       = {10.1109/TIFS.2019.2895545},
  timestamp = {Thu, 06 Aug 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/tifs/KaminagaSF19.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/KangLLJ19,
  author    = {Wenxiong Kang and
               Yuting Lu and
               Dejian Li and
               Wei Jia},
  title     = {From Noise to Feature: Exploiting Intensity Distribution as a Novel
               Soft Biometric Trait for Finger Vein Recognition},
  journal   = {{IEEE} Trans. Inf. Forensics Secur.},
  volume    = {14},
  number    = {4},
  pages     = {858--869},
  year      = {2019},
  url       = {https://doi.org/10.1109/TIFS.2018.2866330},
  doi       = {10.1109/TIFS.2018.2866330},
  timestamp = {Thu, 06 Aug 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/tifs/KangLLJ19.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/KarmakarG19,
  author    = {Sanjay Karmakar and
               Anirban Ghosh},
  title     = {Secrecy Capacity Region of Fading Binary {Z} Interference Channel
               With Statistical {CSIT}},
  journal   = {{IEEE} Trans. Inf. Forensics Secur.},
  volume    = {14},
  number    = {4},
  pages     = {848--857},
  year      = {2019},
  url       = {https://doi.org/10.1109/TIFS.2018.2866327},
  doi       = {10.1109/TIFS.2018.2866327},
  timestamp = {Mon, 22 Nov 2021 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/journals/tifs/KarmakarG19.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/KaurK19,
  author    = {Harkeerat Kaur and
               Pritee Khanna},
  title     = {Random Distance Method for Generating Unimodal and Multimodal Cancelable
               Biometric Features},
  journal   = {{IEEE} Trans. Inf. Forensics Secur.},
  volume    = {14},
  number    = {3},
  pages     = {709--719},
  year      = {2019},
  url       = {https://doi.org/10.1109/TIFS.2018.2855669},
  doi       = {10.1109/TIFS.2018.2855669},
  timestamp = {Thu, 06 Aug 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/tifs/KaurK19.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/KhanKTB19,
  author    = {Faraz Ahmad Khan and
               Fouad Khelifi and
               Muhammad Atif Tahir and
               Ahmed Bouridane},
  title     = {Dissimilarity Gaussian Mixture Models for Efficient Offline Handwritten
               Text-Independent Identification Using {SIFT} and RootSIFT Descriptors},
  journal   = {{IEEE} Trans. Inf. Forensics Secur.},
  volume    = {14},
  number    = {2},
  pages     = {289--303},
  year      = {2019},
  url       = {https://doi.org/10.1109/TIFS.2018.2850011},
  doi       = {10.1109/TIFS.2018.2850011},
  timestamp = {Thu, 06 Aug 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/tifs/KhanKTB19.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/KhanPK19,
  author    = {Muhammad Umar Karim Khan and
               Hyun Sang Park and
               Chong{-}Min Kyung},
  title     = {Rejecting Motion Outliers for Efficient Crowd Anomaly Detection},
  journal   = {{IEEE} Trans. Inf. Forensics Secur.},
  volume    = {14},
  number    = {2},
  pages     = {541--556},
  year      = {2019},
  url       = {https://doi.org/10.1109/TIFS.2018.2856189},
  doi       = {10.1109/TIFS.2018.2856189},
  timestamp = {Thu, 06 Aug 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/tifs/KhanPK19.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/KimKRSI19,
  author    = {TaeGuen Kim and
               BooJoong Kang and
               Mina Rho and
               Sakir Sezer and
               Eul Gyu Im},
  title     = {A Multimodal Deep Learning Method for Android Malware Detection Using
               Various Features},
  journal   = {{IEEE} Trans. Inf. Forensics Secur.},
  volume    = {14},
  number    = {3},
  pages     = {773--788},
  year      = {2019},
  url       = {https://doi.org/10.1109/TIFS.2018.2866319},
  doi       = {10.1109/TIFS.2018.2866319},
  timestamp = {Thu, 06 Aug 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/tifs/KimKRSI19.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/KimR19,
  author    = {Seong Tae Kim and
               Yong Man Ro},
  title     = {Attended Relation Feature Representation of Facial Dynamics for Facial
               Authentication},
  journal   = {{IEEE} Trans. Inf. Forensics Secur.},
  volume    = {14},
  number    = {7},
  pages     = {1768--1778},
  year      = {2019},
  url       = {https://doi.org/10.1109/TIFS.2018.2885276},
  doi       = {10.1109/TIFS.2018.2885276},
  timestamp = {Fri, 20 Nov 2020 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/journals/tifs/KimR19.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/KiperbergLRAZ19,
  author    = {Michael Kiperberg and
               Roee Leon and
               Amit Resh and
               Asaf Algawi and
               Nezer J. Zaidenberg},
  title     = {Hypervisor-Based Protection of Code},
  journal   = {{IEEE} Trans. Inf. Forensics Secur.},
  volume    = {14},
  number    = {8},
  pages     = {2203--2216},
  year      = {2019},
  url       = {https://doi.org/10.1109/TIFS.2019.2894577},
  doi       = {10.1109/TIFS.2019.2894577},
  timestamp = {Wed, 16 Mar 2022 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/journals/tifs/KiperbergLRAZ19.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/KisonAFP19,
  author    = {Christian Kison and
               Omar Mohamed Awad and
               Marc Fyrbiak and
               Christof Paar},
  title     = {Security Implications of Intentional Capacitive Crosstalk},
  journal   = {{IEEE} Trans. Inf. Forensics Secur.},
  volume    = {14},
  number    = {12},
  pages     = {3246--3258},
  year      = {2019},
  url       = {https://doi.org/10.1109/TIFS.2019.2900914},
  doi       = {10.1109/TIFS.2019.2900914},
  timestamp = {Thu, 06 Aug 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/tifs/KisonAFP19.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/KongYWH19,
  author    = {Zhengmin Kong and
               Shaoshi Yang and
               Die Wang and
               Lajos Hanzo},
  title     = {Robust Beamforming and Jamming for Enhancing the Physical Layer Security
               of Full Duplex Radios},
  journal   = {{IEEE} Trans. Inf. Forensics Secur.},
  volume    = {14},
  number    = {12},
  pages     = {3151--3159},
  year      = {2019},
  url       = {https://doi.org/10.1109/TIFS.2019.2908481},
  doi       = {10.1109/TIFS.2019.2908481},
  timestamp = {Thu, 06 Aug 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/tifs/KongYWH19.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/KoufosD19,
  author    = {Konstantinos Koufos and
               Carl P. Dettmann},
  title     = {Boundaries as an Enhancement Technique for Physical Layer Security},
  journal   = {{IEEE} Trans. Inf. Forensics Secur.},
  volume    = {14},
  number    = {1},
  pages     = {61--74},
  year      = {2019},
  url       = {https://doi.org/10.1109/TIFS.2018.2841870},
  doi       = {10.1109/TIFS.2018.2841870},
  timestamp = {Thu, 06 Aug 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/tifs/KoufosD19.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/Kudathanthirige19,
  author    = {Dhanushka Kudathanthirige and
               Santosh Timilsina and
               Gayan Amarasuriya Aruma Baduge},
  title     = {Secure Communication in Relay-Assisted Massive {MIMO} Downlink With
               Active Pilot Attacks},
  journal   = {{IEEE} Trans. Inf. Forensics Secur.},
  volume    = {14},
  number    = {11},
  pages     = {2819--2833},
  year      = {2019},
  url       = {https://doi.org/10.1109/TIFS.2019.2901825},
  doi       = {10.1109/TIFS.2019.2901825},
  timestamp = {Thu, 06 Aug 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/tifs/Kudathanthirige19.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/KuehlkampPRBC19,
  author    = {Andrey Kuehlkamp and
               Allan da Silva Pinto and
               Anderson Rocha and
               Kevin W. Bowyer and
               Adam Czajka},
  title     = {Ensemble of Multi-View Learning Classifiers for Cross-Domain Iris
               Presentation Attack Detection},
  journal   = {{IEEE} Trans. Inf. Forensics Secur.},
  volume    = {14},
  number    = {6},
  pages     = {1419--1431},
  year      = {2019},
  url       = {https://doi.org/10.1109/TIFS.2018.2878542},
  doi       = {10.1109/TIFS.2018.2878542},
  timestamp = {Fri, 21 Jan 2022 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/journals/tifs/KuehlkampPRBC19.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/Kumar19,
  author    = {Ajay Kumar},
  title     = {Toward More Accurate Matching of Contactless Palmprint Images Under
               Less Constrained Environments},
  journal   = {{IEEE} Trans. Inf. Forensics Secur.},
  volume    = {14},
  number    = {1},
  pages     = {34--47},
  year      = {2019},
  url       = {https://doi.org/10.1109/TIFS.2018.2837669},
  doi       = {10.1109/TIFS.2018.2837669},
  timestamp = {Thu, 06 Aug 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/tifs/Kumar19.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/KurtYW19,
  author    = {Mehmet Necip Kurt and
               Yasin Yilmaz and
               Xiaodong Wang},
  title     = {Real-Time Detection of Hybrid and Stealthy Cyber-Attacks in Smart
               Grid},
  journal   = {{IEEE} Trans. Inf. Forensics Secur.},
  volume    = {14},
  number    = {2},
  pages     = {498--513},
  year      = {2019},
  url       = {https://doi.org/10.1109/TIFS.2018.2854745},
  doi       = {10.1109/TIFS.2018.2854745},
  timestamp = {Thu, 06 Aug 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/tifs/KurtYW19.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/KustersW19,
  author    = {Lieneke Kusters and
               Frans M. J. Willems},
  title     = {Secret-Key Capacity Regions for Multiple Enrollments With an {SRAM-PUF}},
  journal   = {{IEEE} Trans. Inf. Forensics Secur.},
  volume    = {14},
  number    = {9},
  pages     = {2276--2287},
  year      = {2019},
  url       = {https://doi.org/10.1109/TIFS.2019.2895552},
  doi       = {10.1109/TIFS.2019.2895552},
  timestamp = {Thu, 06 Aug 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/tifs/KustersW19.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/LaiFLLYK19,
  author    = {Xiazhi Lai and
               Lisheng Fan and
               Xianfu Lei and
               Jin Li and
               Nan Yang and
               George K. Karagiannidis},
  title     = {Distributed Secure Switch-and-Stay Combining Over Correlated Fading
               Channels},
  journal   = {{IEEE} Trans. Inf. Forensics Secur.},
  volume    = {14},
  number    = {8},
  pages     = {2088--2101},
  year      = {2019},
  url       = {https://doi.org/10.1109/TIFS.2019.2891932},
  doi       = {10.1109/TIFS.2019.2891932},
  timestamp = {Thu, 06 Aug 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/tifs/LaiFLLYK19.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/LaiJ19,
  author    = {Songxuan Lai and
               Lianwen Jin},
  title     = {Recurrent Adaptation Networks for Online Signature Verification},
  journal   = {{IEEE} Trans. Inf. Forensics Secur.},
  volume    = {14},
  number    = {6},
  pages     = {1624--1637},
  year      = {2019},
  url       = {https://doi.org/10.1109/TIFS.2018.2883152},
  doi       = {10.1109/TIFS.2018.2883152},
  timestamp = {Thu, 06 Aug 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/tifs/LaiJ19.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/LeeHCQ19,
  author    = {Kisong Lee and
               Jun{-}Pyo Hong and
               Hyun{-}Ho Choi and
               Tony Q. S. Quek},
  title     = {Wireless-Powered Two-Way Relaying Protocols for Optimizing Physical
               Layer Security},
  journal   = {{IEEE} Trans. Inf. Forensics Secur.},
  volume    = {14},
  number    = {1},
  pages     = {162--174},
  year      = {2019},
  url       = {https://doi.org/10.1109/TIFS.2018.2847452},
  doi       = {10.1109/TIFS.2018.2847452},
  timestamp = {Thu, 06 Aug 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/tifs/LeeHCQ19.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/LermanM19,
  author    = {Liran Lerman and
               Olivier Markowitch},
  title     = {Efficient Profiled Attacks on Masking Schemes},
  journal   = {{IEEE} Trans. Inf. Forensics Secur.},
  volume    = {14},
  number    = {6},
  pages     = {1445--1454},
  year      = {2019},
  url       = {https://doi.org/10.1109/TIFS.2018.2879295},
  doi       = {10.1109/TIFS.2018.2879295},
  timestamp = {Thu, 06 Aug 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/tifs/LermanM19.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/LiDBGWW19,
  author    = {Yuqing Li and
               Wenkuan Dai and
               Jie Bai and
               Xiaoying Gan and
               Jingchao Wang and
               Xinbing Wang},
  title     = {An Intelligence-Driven Security-Aware Defense Mechanism for Advanced
               Persistent Threats},
  journal   = {{IEEE} Trans. Inf. Forensics Secur.},
  volume    = {14},
  number    = {3},
  pages     = {646--661},
  year      = {2019},
  url       = {https://doi.org/10.1109/TIFS.2018.2847671},
  doi       = {10.1109/TIFS.2018.2847671},
  timestamp = {Thu, 06 Aug 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/tifs/LiDBGWW19.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/LiHHS19,
  author    = {Peipei Li and
               Yibo Hu and
               Ran He and
               Zhenan Sun},
  title     = {Global and Local Consistent Wavelet-Domain Age Synthesis},
  journal   = {{IEEE} Trans. Inf. Forensics Secur.},
  volume    = {14},
  number    = {11},
  pages     = {2943--2957},
  year      = {2019},
  url       = {https://doi.org/10.1109/TIFS.2019.2907973},
  doi       = {10.1109/TIFS.2019.2907973},
  timestamp = {Thu, 06 Aug 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/tifs/LiHHS19.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/LiMXYR19,
  author    = {Xiang Li and
               Yasushi Makihara and
               Chi Xu and
               Yasushi Yagi and
               Mingwu Ren},
  title     = {Joint Intensity Transformer Network for Gait Recognition Robust Against
               Clothing and Carrying Status},
  journal   = {{IEEE} Trans. Inf. Forensics Secur.},
  volume    = {14},
  number    = {12},
  pages     = {3102--3115},
  year      = {2019},
  url       = {https://doi.org/10.1109/TIFS.2019.2912577},
  doi       = {10.1109/TIFS.2019.2912577},
  timestamp = {Thu, 06 Aug 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/tifs/LiMXYR19.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/LiOG19,
  author    = {Zuxing Li and
               Tobias J. Oechtering and
               Deniz G{\"{u}}nd{\"{u}}z},
  title     = {Privacy Against a Hypothesis Testing Adversary},
  journal   = {{IEEE} Trans. Inf. Forensics Secur.},
  volume    = {14},
  number    = {6},
  pages     = {1567--1581},
  year      = {2019},
  url       = {https://doi.org/10.1109/TIFS.2018.2882343},
  doi       = {10.1109/TIFS.2018.2882343},
  timestamp = {Fri, 09 Apr 2021 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/tifs/LiOG19.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/LiPMF19,
  author    = {Pei Li and
               Loreto Prieto and
               Domingo Mery and
               Patrick J. Flynn},
  title     = {On Low-Resolution Face Recognition in the Wild: Comparisons and New
               Techniques},
  journal   = {{IEEE} Trans. Inf. Forensics Secur.},
  volume    = {14},
  number    = {8},
  pages     = {2000--2012},
  year      = {2019},
  url       = {https://doi.org/10.1109/TIFS.2018.2890812},
  doi       = {10.1109/TIFS.2018.2890812},
  timestamp = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/tifs/LiPMF19.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/LiRYY19,
  author    = {Yanan Li and
               Xuebin Ren and
               Shusen Yang and
               Xinyu Yang},
  title     = {Impact of Prior Knowledge and Data Correlation on Privacy Leakage:
               {A} Unified Analysis},
  journal   = {{IEEE} Trans. Inf. Forensics Secur.},
  volume    = {14},
  number    = {9},
  pages     = {2342--2357},
  year      = {2019},
  url       = {https://doi.org/10.1109/TIFS.2019.2895970},
  doi       = {10.1109/TIFS.2019.2895970},
  timestamp = {Thu, 03 Sep 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/tifs/LiRYY19.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/LiXHJZF19,
  author    = {Lei Li and
               Zhaoqiang Xia and
               Abdenour Hadid and
               Xiaoyue Jiang and
               Haixi Zhang and
               Xiaoyi Feng},
  title     = {Replayed Video Attack Detection Based on Motion Blur Analysis},
  journal   = {{IEEE} Trans. Inf. Forensics Secur.},
  volume    = {14},
  number    = {9},
  pages     = {2246--2261},
  year      = {2019},
  url       = {https://doi.org/10.1109/TIFS.2019.2895212},
  doi       = {10.1109/TIFS.2019.2895212},
  timestamp = {Mon, 03 Jan 2022 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/journals/tifs/LiXHJZF19.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/LiYZCZ19,
  author    = {Xiaowei Li and
               Dengqi Yang and
               Xing Zeng and
               Benhui Chen and
               Yuqing Zhang},
  title     = {Comments on "Provably Secure Dynamic Id-Based Anonymous Two-Factor
               Authenticated Key Exchange Protocol With Extended Security Model"},
  journal   = {{IEEE} Trans. Inf. Forensics Secur.},
  volume    = {14},
  number    = {12},
  pages     = {3344--3345},
  year      = {2019},
  url       = {https://doi.org/10.1109/TIFS.2018.2866304},
  doi       = {10.1109/TIFS.2018.2866304},
  timestamp = {Thu, 06 Aug 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/tifs/LiYZCZ19.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/LiZ19,
  author    = {Yuanman Li and
               Jiantao Zhou},
  title     = {Fast and Effective Image Copy-Move Forgery Detection via Hierarchical
               Feature Point Matching},
  journal   = {{IEEE} Trans. Inf. Forensics Secur.},
  volume    = {14},
  number    = {5},
  pages     = {1307--1322},
  year      = {2019},
  url       = {https://doi.org/10.1109/TIFS.2018.2876837},
  doi       = {10.1109/TIFS.2018.2876837},
  timestamp = {Thu, 06 Aug 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/tifs/LiZ19.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/LiZHZY19,
  author    = {Duo Li and
               Xiao{-}Ping (Steven) Zhang and
               Menghan Hu and
               Guangtao Zhai and
               Xiaokang Yang},
  title     = {Physical Password Breaking via Thermal Sequence Analysis},
  journal   = {{IEEE} Trans. Inf. Forensics Secur.},
  volume    = {14},
  number    = {5},
  pages     = {1142--1154},
  year      = {2019},
  url       = {https://doi.org/10.1109/TIFS.2018.2868219},
  doi       = {10.1109/TIFS.2018.2868219},
  timestamp = {Thu, 06 Aug 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/tifs/LiZHZY19.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/LinK19,
  author    = {Chenhao Lin and
               Ajay Kumar},
  title     = {A CNN-Based Framework for Comparison of Contactless to Contact-Based
               Fingerprints},
  journal   = {{IEEE} Trans. Inf. Forensics Secur.},
  volume    = {14},
  number    = {3},
  pages     = {662--676},
  year      = {2019},
  url       = {https://doi.org/10.1109/TIFS.2018.2854765},
  doi       = {10.1109/TIFS.2018.2854765},
  timestamp = {Thu, 06 Aug 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/tifs/LinK19.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/LiuCZG19,
  author    = {Zhuotao Liu and
               Yuan Cao and
               Min Zhu and
               Wei Ge},
  title     = {Umbrella: Enabling ISPs to Offer Readily Deployable and Privacy-Preserving
               DDoS Prevention Services},
  journal   = {{IEEE} Trans. Inf. Forensics Secur.},
  volume    = {14},
  number    = {4},
  pages     = {1098--1108},
  year      = {2019},
  url       = {https://doi.org/10.1109/TIFS.2018.2870828},
  doi       = {10.1109/TIFS.2018.2870828},
  timestamp = {Thu, 06 Aug 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/tifs/LiuCZG19.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/LiuFHLL19,
  author    = {Anyi Liu and
               Huirong Fu and
               Yuan Hong and
               Jigang Liu and
               Yingjiu Li},
  title     = {\emph{LiveForen}: Ensuring Live Forensic Integrity in the Cloud},
  journal   = {{IEEE} Trans. Inf. Forensics Secur.},
  volume    = {14},
  number    = {10},
  pages     = {2749--2764},
  year      = {2019},
  url       = {https://doi.org/10.1109/TIFS.2019.2898841},
  doi       = {10.1109/TIFS.2019.2898841},
  timestamp = {Thu, 06 Aug 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/tifs/LiuFHLL19.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/LiuHH19,
  author    = {Zhenghui Liu and
               Yuankun Huang and
               Jiwu Huang},
  title     = {Patchwork-Based Audio Watermarking Robust Against De-Synchronization
               and Recapturing Attacks},
  journal   = {{IEEE} Trans. Inf. Forensics Secur.},
  volume    = {14},
  number    = {5},
  pages     = {1171--1180},
  year      = {2019},
  url       = {https://doi.org/10.1109/TIFS.2018.2871748},
  doi       = {10.1109/TIFS.2018.2871748},
  timestamp = {Thu, 06 Aug 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/tifs/LiuHH19.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/LiuL19,
  author    = {Yuhong Liu and
               Na Li},
  title     = {Retrieving Hidden Friends: {A} Collusion Privacy Attack Against Online
               Friend Search Engine},
  journal   = {{IEEE} Trans. Inf. Forensics Secur.},
  volume    = {14},
  number    = {4},
  pages     = {833--847},
  year      = {2019},
  url       = {https://doi.org/10.1109/TIFS.2018.2866309},
  doi       = {10.1109/TIFS.2018.2866309},
  timestamp = {Thu, 06 Aug 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/tifs/LiuL19.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/LiuS19,
  author    = {Zhe Liu and
               Hwajeong Seo},
  title     = {IoT-NUMS: Evaluating {NUMS} Elliptic Curve Cryptography for IoT Platforms},
  journal   = {{IEEE} Trans. Inf. Forensics Secur.},
  volume    = {14},
  number    = {3},
  pages     = {720--729},
  year      = {2019},
  url       = {https://doi.org/10.1109/TIFS.2018.2856123},
  doi       = {10.1109/TIFS.2018.2856123},
  timestamp = {Thu, 06 Aug 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/tifs/LiuS19.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/LiuZZC19,
  author    = {Yaqi Liu and
               Xiaobin Zhu and
               Xianfeng Zhao and
               Yun Cao},
  title     = {Adversarial Learning for Constrained Image Splicing Detection and
               Localization Based on Atrous Convolution},
  journal   = {{IEEE} Trans. Inf. Forensics Secur.},
  volume    = {14},
  number    = {10},
  pages     = {2551--2566},
  year      = {2019},
  url       = {https://doi.org/10.1109/TIFS.2019.2902826},
  doi       = {10.1109/TIFS.2019.2902826},
  timestamp = {Wed, 06 Oct 2021 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/tifs/LiuZZC19.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/LuoHJW19,
  author    = {Wenjian Luo and
               Yamin Hu and
               Hao Jiang and
               Junteng Wang},
  title     = {Authentication by Encrypted Negative Password},
  journal   = {{IEEE} Trans. Inf. Forensics Secur.},
  volume    = {14},
  number    = {1},
  pages     = {114--128},
  year      = {2019},
  url       = {https://doi.org/10.1109/TIFS.2018.2844854},
  doi       = {10.1109/TIFS.2018.2844854},
  timestamp = {Thu, 06 Aug 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/tifs/LuoHJW19.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/LuoJF019,
  author    = {Yuchuan Luo and
               Xiaohua Jia and
               Shaojing Fu and
               Ming Xu},
  title     = {pRide: Privacy-Preserving Ride Matching Over Road Networks for Online
               Ride-Hailing Service},
  journal   = {{IEEE} Trans. Inf. Forensics Secur.},
  volume    = {14},
  number    = {7},
  pages     = {1791--1802},
  year      = {2019},
  url       = {https://doi.org/10.1109/TIFS.2018.2885282},
  doi       = {10.1109/TIFS.2018.2885282},
  timestamp = {Thu, 06 Aug 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/tifs/LuoJF019.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/LvZCA19,
  author    = {Lu Lv and
               Fuhui Zhou and
               Jian Chen and
               Naofal Al{-}Dhahir},
  title     = {Secure Cooperative Communications With an Untrusted Relay: {A} NOMA-Inspired
               Jamming and Relaying Approach},
  journal   = {{IEEE} Trans. Inf. Forensics Secur.},
  volume    = {14},
  number    = {12},
  pages     = {3191--3205},
  year      = {2019},
  url       = {https://doi.org/10.1109/TIFS.2019.2912337},
  doi       = {10.1109/TIFS.2019.2912337},
  timestamp = {Thu, 06 Aug 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/tifs/LvZCA19.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/MaCLYJ19,
  author    = {Yuan Ma and
               Tianyu Chen and
               Jingqiang Lin and
               Jing Yang and
               Jiwu Jing},
  title     = {Entropy Estimation for {ADC} Sampling-Based True Random Number Generators},
  journal   = {{IEEE} Trans. Inf. Forensics Secur.},
  volume    = {14},
  number    = {11},
  pages     = {2887--2900},
  year      = {2019},
  url       = {https://doi.org/10.1109/TIFS.2019.2908798},
  doi       = {10.1109/TIFS.2019.2908798},
  timestamp = {Wed, 12 May 2021 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/tifs/MaCLYJ19.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/MaJLZW19,
  author    = {Haoyu Ma and
               Chunfu Jia and
               Shijia Li and
               Wantong Zheng and
               Dinghao Wu},
  title     = {Xmark: Dynamic Software Watermarking Using Collatz Conjecture},
  journal   = {{IEEE} Trans. Inf. Forensics Secur.},
  volume    = {14},
  number    = {11},
  pages     = {2859--2874},
  year      = {2019},
  url       = {https://doi.org/10.1109/TIFS.2019.2908071},
  doi       = {10.1109/TIFS.2019.2908071},
  timestamp = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/tifs/MaJLZW19.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/MarchettiS19,
  author    = {Mirco Marchetti and
               Dario Stabili},
  title     = {{READ:} Reverse Engineering of Automotive Data Frames},
  journal   = {{IEEE} Trans. Inf. Forensics Secur.},
  volume    = {14},
  number    = {4},
  pages     = {1083--1097},
  year      = {2019},
  url       = {https://doi.org/10.1109/TIFS.2018.2870826},
  doi       = {10.1109/TIFS.2018.2870826},
  timestamp = {Thu, 06 Aug 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/tifs/MarchettiS19.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/MareenPWL19,
  author    = {Hannes Mareen and
               Johan De Praeter and
               Glenn Van Wallendael and
               Peter Lambert},
  title     = {A Scalable Architecture for Uncompressed-Domain Watermarked Videos},
  journal   = {{IEEE} Trans. Inf. Forensics Secur.},
  volume    = {14},
  number    = {6},
  pages     = {1432--1444},
  year      = {2019},
  url       = {https://doi.org/10.1109/TIFS.2018.2879301},
  doi       = {10.1109/TIFS.2018.2879301},
  timestamp = {Thu, 06 Aug 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/tifs/MareenPWL19.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/Marteau19,
  author    = {Pierre{-}Francois Marteau},
  title     = {Sequence Covering for Efficient Host-Based Intrusion Detection},
  journal   = {{IEEE} Trans. Inf. Forensics Secur.},
  volume    = {14},
  number    = {4},
  pages     = {994--1006},
  year      = {2019},
  url       = {https://doi.org/10.1109/TIFS.2018.2868614},
  doi       = {10.1109/TIFS.2018.2868614},
  timestamp = {Thu, 06 Aug 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/tifs/Marteau19.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/MengPXLZ19,
  author    = {Guozhu Meng and
               Matthew Patrick and
               Yinxing Xue and
               Yang Liu and
               Jie Zhang},
  title     = {Securing Android App Markets via Modeling and Predicting Malware Spread
               Between Markets},
  journal   = {{IEEE} Trans. Inf. Forensics Secur.},
  volume    = {14},
  number    = {7},
  pages     = {1944--1959},
  year      = {2019},
  url       = {https://doi.org/10.1109/TIFS.2018.2889924},
  doi       = {10.1109/TIFS.2018.2889924},
  timestamp = {Thu, 06 Aug 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/tifs/MengPXLZ19.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/MirelesFCHX19,
  author    = {Jose David Mireles and
               Eric Ficke and
               Jin{-}Hee Cho and
               Patrick M. Hurley and
               Shouhuai Xu},
  title     = {Metrics Towards Measuring Cyber Agility},
  journal   = {{IEEE} Trans. Inf. Forensics Secur.},
  volume    = {14},
  number    = {12},
  pages     = {3217--3232},
  year      = {2019},
  url       = {https://doi.org/10.1109/TIFS.2019.2912551},
  doi       = {10.1109/TIFS.2019.2912551},
  timestamp = {Thu, 06 Aug 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/tifs/MirelesFCHX19.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/MirskyKES19,
  author    = {Yisroel Mirsky and
               Naor Kalbo and
               Yuval Elovici and
               Asaf Shabtai},
  title     = {Vesper: Using Echo Analysis to Detect Man-in-the-Middle Attacks in
               LANs},
  journal   = {{IEEE} Trans. Inf. Forensics Secur.},
  volume    = {14},
  number    = {6},
  pages     = {1638--1653},
  year      = {2019},
  url       = {https://doi.org/10.1109/TIFS.2018.2883177},
  doi       = {10.1109/TIFS.2018.2883177},
  timestamp = {Thu, 06 Aug 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/tifs/MirskyKES19.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/MirzaeeA19,
  author    = {Meysam Mirzaee and
               Soroush Akhlaghi},
  title     = {Maximizing the Minimum Achievable Secrecy Rate for a Two-User Gaussian
               Weak Interference Channel},
  journal   = {{IEEE} Trans. Inf. Forensics Secur.},
  volume    = {14},
  number    = {8},
  pages     = {2190--2202},
  year      = {2019},
  url       = {https://doi.org/10.1109/TIFS.2019.2894370},
  doi       = {10.1109/TIFS.2019.2894370},
  timestamp = {Thu, 06 Aug 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/tifs/MirzaeeA19.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/MobiniMT19,
  author    = {Zahra Mobini and
               Mohammadali Mohammadi and
               Chintha Tellambura},
  title     = {Wireless-Powered Full-Duplex Relay and Friendly Jamming for Secure
               Cooperative Communications},
  journal   = {{IEEE} Trans. Inf. Forensics Secur.},
  volume    = {14},
  number    = {3},
  pages     = {621--634},
  year      = {2019},
  url       = {https://doi.org/10.1109/TIFS.2018.2859593},
  doi       = {10.1109/TIFS.2018.2859593},
  timestamp = {Thu, 06 Aug 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/tifs/MobiniMT19.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/MokhayeriGB19,
  author    = {Fania Mokhayeri and
               Eric Granger and
               Guillaume{-}Alexandre Bilodeau},
  title     = {Domain-Specific Face Synthesis for Video Face Recognition From a Single
               Sample Per Person},
  journal   = {{IEEE} Trans. Inf. Forensics Secur.},
  volume    = {14},
  number    = {3},
  pages     = {757--772},
  year      = {2019},
  url       = {https://doi.org/10.1109/TIFS.2018.2866295},
  doi       = {10.1109/TIFS.2018.2866295},
  timestamp = {Thu, 06 Aug 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/tifs/MokhayeriGB19.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/MoustafaCRC19,
  author    = {Nour Moustafa and
               Kim{-}Kwang Raymond Choo and
               Ibrahim Radwan and
               Seyit Camtepe},
  title     = {Outlier Dirichlet Mixture Mechanism: Adversarial Statistical Learning
               for Anomaly Detection in the Fog},
  journal   = {{IEEE} Trans. Inf. Forensics Secur.},
  volume    = {14},
  number    = {8},
  pages     = {1975--1987},
  year      = {2019},
  url       = {https://doi.org/10.1109/TIFS.2018.2890808},
  doi       = {10.1109/TIFS.2018.2890808},
  timestamp = {Thu, 06 Aug 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/tifs/MoustafaCRC19.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/MudunuriVB19,
  author    = {Sivaram Prasad Mudunuri and
               Shashanka Venkataramanan and
               Soma Biswas},
  title     = {Dictionary Alignment With Re-Ranking for Low-Resolution {NIR-VIS}
               Face Recognition},
  journal   = {{IEEE} Trans. Inf. Forensics Secur.},
  volume    = {14},
  number    = {4},
  pages     = {886--896},
  year      = {2019},
  url       = {https://doi.org/10.1109/TIFS.2018.2868173},
  doi       = {10.1109/TIFS.2018.2868173},
  timestamp = {Thu, 06 Aug 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/tifs/MudunuriVB19.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/NakaiS19,
  author    = {Ryota Nakai and
               Shinya Sugiura},
  title     = {Physical Layer Security in Buffer-State-Based Max-Ratio Relay Selection
               Exploiting Broadcasting With Cooperative Beamforming and Jamming},
  journal   = {{IEEE} Trans. Inf. Forensics Secur.},
  volume    = {14},
  number    = {2},
  pages     = {431--444},
  year      = {2019},
  url       = {https://doi.org/10.1109/TIFS.2018.2854711},
  doi       = {10.1109/TIFS.2018.2854711},
  timestamp = {Thu, 06 Aug 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/tifs/NakaiS19.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/NakamuraNB19,
  author    = {Kazuaki Nakamura and
               Naoko Nitta and
               Noboru Babaguchi},
  title     = {Encryption-Free Framework of Privacy-Preserving Image Recognition
               for Photo-Based Information Services},
  journal   = {{IEEE} Trans. Inf. Forensics Secur.},
  volume    = {14},
  number    = {5},
  pages     = {1264--1279},
  year      = {2019},
  url       = {https://doi.org/10.1109/TIFS.2018.2876752},
  doi       = {10.1109/TIFS.2018.2876752},
  timestamp = {Thu, 06 Aug 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/tifs/NakamuraNB19.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/NassiSE19,
  author    = {Ben Nassi and
               Adi Shamir and
               Yuval Elovici},
  title     = {Xerox Day Vulnerability},
  journal   = {{IEEE} Trans. Inf. Forensics Secur.},
  volume    = {14},
  number    = {2},
  pages     = {415--430},
  year      = {2019},
  url       = {https://doi.org/10.1109/TIFS.2018.2854708},
  doi       = {10.1109/TIFS.2018.2854708},
  timestamp = {Thu, 06 Aug 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/tifs/NassiSE19.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/NevesP19,
  author    = {Jo{\~{a}}o C. Neves and
               Hugo Proen{\c{c}}a},
  title     = {"A Leopard Cannot Change Its Spots": Improving Face Recognition Using
               3D-Based Caricatures},
  journal   = {{IEEE} Trans. Inf. Forensics Secur.},
  volume    = {14},
  number    = {1},
  pages     = {151--161},
  year      = {2019},
  url       = {https://doi.org/10.1109/TIFS.2018.2846617},
  doi       = {10.1109/TIFS.2018.2846617},
  timestamp = {Fri, 23 Apr 2021 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/tifs/NevesP19.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/NguyenMCDMNAOF19,
  author    = {Tan N. Nguyen and
               Hoang Long Mai and
               R{\'{e}}mi Cogranne and
               Guillaume Doyen and
               Wissam Mallouli and
               Luong Nguyen and
               Moustapha El Aoun and
               Edgardo Montes de Oca and
               Olivier Festor},
  title     = {Reliable Detection of Interest Flooding Attack in Real Deployment
               of Named Data Networking},
  journal   = {{IEEE} Trans. Inf. Forensics Secur.},
  volume    = {14},
  number    = {9},
  pages     = {2470--2485},
  year      = {2019},
  url       = {https://doi.org/10.1109/TIFS.2019.2899247},
  doi       = {10.1109/TIFS.2019.2899247},
  timestamp = {Thu, 06 Aug 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/tifs/NguyenMCDMNAOF19.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/NingXLZC19,
  author    = {Jianting Ning and
               Jia Xu and
               Kaitai Liang and
               Fan Zhang and
               Ee{-}Chien Chang},
  title     = {Passive Attacks Against Searchable Encryption},
  journal   = {{IEEE} Trans. Inf. Forensics Secur.},
  volume    = {14},
  number    = {3},
  pages     = {789--802},
  year      = {2019},
  url       = {https://doi.org/10.1109/TIFS.2018.2866321},
  doi       = {10.1109/TIFS.2018.2866321},
  timestamp = {Mon, 26 Oct 2020 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/journals/tifs/NingXLZC19.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/NingZ19,
  author    = {Zhenyu Ning and
               Fengwei Zhang},
  title     = {Hardware-Assisted Transparent Tracing and Debugging on {ARM}},
  journal   = {{IEEE} Trans. Inf. Forensics Secur.},
  volume    = {14},
  number    = {6},
  pages     = {1595--1609},
  year      = {2019},
  url       = {https://doi.org/10.1109/TIFS.2018.2883027},
  doi       = {10.1109/TIFS.2018.2883027},
  timestamp = {Thu, 06 Aug 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/tifs/NingZ19.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/OuWSZ19,
  author    = {Changhai Ou and
               Zhu Wang and
               Degang Sun and
               Xinping Zhou},
  title     = {Group Collision Attack},
  journal   = {{IEEE} Trans. Inf. Forensics Secur.},
  volume    = {14},
  number    = {4},
  pages     = {939--953},
  year      = {2019},
  url       = {https://doi.org/10.1109/TIFS.2018.2868237},
  doi       = {10.1109/TIFS.2018.2868237},
  timestamp = {Fri, 18 Dec 2020 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/journals/tifs/OuWSZ19.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/PaixaoBFO19,
  author    = {Thiago M. Paix{\~{a}}o and
               Maria C. S. Boeres and
               Cinthia O. A. Freitas and
               Thiago Oliveira{-}Santos},
  title     = {Exploring Character Shapes for Unsupervised Reconstruction of Strip-Shredded
               Text Documents},
  journal   = {{IEEE} Trans. Inf. Forensics Secur.},
  volume    = {14},
  number    = {7},
  pages     = {1744--1754},
  year      = {2019},
  url       = {https://doi.org/10.1109/TIFS.2018.2885253},
  doi       = {10.1109/TIFS.2018.2885253},
  timestamp = {Thu, 06 Aug 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/tifs/PaixaoBFO19.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/PammuHLCG19,
  author    = {Ali Akbar Pammu and
               Weng{-}Geng Ho and
               Ne Kyaw Zwa Lwin and
               Kwen{-}Siong Chong and
               Bah{-}Hwee Gwee},
  title     = {A High Throughput and Secure Authentication-Encryption {AES-CCM} Algorithm
               on Asynchronous Multicore Processor},
  journal   = {{IEEE} Trans. Inf. Forensics Secur.},
  volume    = {14},
  number    = {4},
  pages     = {1023--1036},
  year      = {2019},
  url       = {https://doi.org/10.1109/TIFS.2018.2869344},
  doi       = {10.1109/TIFS.2018.2869344},
  timestamp = {Mon, 26 Oct 2020 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/journals/tifs/PammuHLCG19.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/PangCWH19,
  author    = {Yanwei Pang and
               Jiale Cao and
               Jian Wang and
               Jungong Han},
  title     = {JCS-Net: Joint Classification and Super-Resolution Network for Small-Scale
               Pedestrian Detection in Surveillance Images},
  journal   = {{IEEE} Trans. Inf. Forensics Secur.},
  volume    = {14},
  number    = {12},
  pages     = {3322--3331},
  year      = {2019},
  url       = {https://doi.org/10.1109/TIFS.2019.2916592},
  doi       = {10.1109/TIFS.2019.2916592},
  timestamp = {Tue, 08 Feb 2022 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/journals/tifs/PangCWH19.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/ParkCNK19,
  author    = {Eunsoo Park and
               Xuenan Cui and
               Thi Hai Binh Nguyen and
               Hakil Kim},
  title     = {Presentation Attack Detection Using a Tiny Fully Convolutional Network},
  journal   = {{IEEE} Trans. Inf. Forensics Secur.},
  volume    = {14},
  number    = {11},
  pages     = {3016--3025},
  year      = {2019},
  url       = {https://doi.org/10.1109/TIFS.2019.2907184},
  doi       = {10.1109/TIFS.2019.2907184},
  timestamp = {Thu, 06 Aug 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/tifs/ParkCNK19.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/PasquiniB19,
  author    = {Cecilia Pasquini and
               Rainer B{\"{o}}hme},
  title     = {Information-Theoretic Bounds for the Forensic Detection of Downscaled
               Signals},
  journal   = {{IEEE} Trans. Inf. Forensics Secur.},
  volume    = {14},
  number    = {7},
  pages     = {1928--1943},
  year      = {2019},
  url       = {https://doi.org/10.1109/TIFS.2018.2889259},
  doi       = {10.1109/TIFS.2018.2889259},
  timestamp = {Thu, 06 Aug 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/tifs/PasquiniB19.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/PawlickCZ19,
  author    = {Jeffrey Pawlick and
               Juntao Chen and
               Quanyan Zhu},
  title     = {iSTRICT: An Interdependent Strategic Trust Mechanism for the Cloud-Enabled
               Internet of Controlled Things},
  journal   = {{IEEE} Trans. Inf. Forensics Secur.},
  volume    = {14},
  number    = {6},
  pages     = {1654--1669},
  year      = {2019},
  url       = {https://doi.org/10.1109/TIFS.2018.2883272},
  doi       = {10.1109/TIFS.2018.2883272},
  timestamp = {Thu, 06 Aug 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/tifs/PawlickCZ19.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/PawlickCZ19a,
  author    = {Jeffrey Pawlick and
               Edward Colbert and
               Quanyan Zhu},
  title     = {Modeling and Analysis of Leaky Deception Using Signaling Games With
               Evidence},
  journal   = {{IEEE} Trans. Inf. Forensics Secur.},
  volume    = {14},
  number    = {7},
  pages     = {1871--1886},
  year      = {2019},
  url       = {https://doi.org/10.1109/TIFS.2018.2886472},
  doi       = {10.1109/TIFS.2018.2886472},
  timestamp = {Thu, 06 Aug 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/tifs/PawlickCZ19a.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/PengLZL19,
  author    = {Fei Peng and
               Zi{-}Xing Lin and
               Xiang Zhang and
               Min Long},
  title     = {Reversible Data Hiding in Encrypted 2D Vector Graphics Based on Reversible
               Mapping Model for Real Numbers},
  journal   = {{IEEE} Trans. Inf. Forensics Secur.},
  volume    = {14},
  number    = {9},
  pages     = {2400--2411},
  year      = {2019},
  url       = {https://doi.org/10.1109/TIFS.2019.2899520},
  doi       = {10.1109/TIFS.2019.2899520},
  timestamp = {Thu, 06 Aug 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/tifs/PengLZL19.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/PereiraAM19,
  author    = {Tiago de Freitas Pereira and
               Andr{\'{e}} Anjos and
               S{\'{e}}bastien Marcel},
  title     = {Heterogeneous Face Recognition Using Domain Specific Units},
  journal   = {{IEEE} Trans. Inf. Forensics Secur.},
  volume    = {14},
  number    = {7},
  pages     = {1803--1816},
  year      = {2019},
  url       = {https://doi.org/10.1109/TIFS.2018.2885284},
  doi       = {10.1109/TIFS.2018.2885284},
  timestamp = {Thu, 06 Aug 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/tifs/PereiraAM19.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/PereraP19,
  author    = {Pramuditha Perera and
               Vishal M. Patel},
  title     = {Face-Based Multiple User Active Authentication on Mobile Devices},
  journal   = {{IEEE} Trans. Inf. Forensics Secur.},
  volume    = {14},
  number    = {5},
  pages     = {1240--1250},
  year      = {2019},
  url       = {https://doi.org/10.1109/TIFS.2018.2876748},
  doi       = {10.1109/TIFS.2018.2876748},
  timestamp = {Thu, 06 Aug 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/tifs/PereraP19.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/PhanBN19,
  author    = {Quoc{-}Tin Phan and
               Giulia Boato and
               Francesco G. B. De Natale},
  title     = {Accurate and Scalable Image Clustering Based on Sparse Representation
               of Camera Fingerprint},
  journal   = {{IEEE} Trans. Inf. Forensics Secur.},
  volume    = {14},
  number    = {7},
  pages     = {1902--1916},
  year      = {2019},
  url       = {https://doi.org/10.1109/TIFS.2018.2886929},
  doi       = {10.1109/TIFS.2018.2886929},
  timestamp = {Thu, 06 Aug 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/tifs/PhanBN19.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
a service of  Schloss Dagstuhl - Leibniz Center for Informatics