![](https://dblp.dagstuhl.de/img/logo.ua.320x120.png)
![](https://dblp.dagstuhl.de/img/dropdown.dark.16x16.png)
![](https://dblp.dagstuhl.de/img/peace.dark.16x16.png)
Остановите войну!
for scientists:
![search dblp search dblp](https://dblp.dagstuhl.de/img/search.dark.16x16.png)
![search dblp](https://dblp.dagstuhl.de/img/search.dark.16x16.png)
default search action
Search dblp for Publications
export results for "toc:db/journals/tifs/tifs10.bht:"
@article{DBLP:journals/tifs/0001J15, author = {Kai Cao and Anil K. Jain}, title = {Learning Fingerprint Reconstruction: From Minutiae to Image}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {10}, number = {1}, pages = {104--117}, year = {2015}, url = {https://doi.org/10.1109/TIFS.2014.2363951}, doi = {10.1109/TIFS.2014.2363951}, timestamp = {Thu, 06 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/0001J15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/0003LLMP15, author = {Liang Xiao and Jinliang Liu and Qiangda Li and Narayan B. Mandayam and H. Vincent Poor}, title = {User-Centric View of Jamming Games in Cognitive Radio Networks}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {10}, number = {12}, pages = {2578--2590}, year = {2015}, url = {https://doi.org/10.1109/TIFS.2015.2467593}, doi = {10.1109/TIFS.2015.2467593}, timestamp = {Thu, 23 Jun 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/0003LLMP15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/AlahmadiFSL15, author = {Ahmed Alahmadi and Zhaoxi Fang and Tianlong Song and Tongtong Li}, title = {Subband {PUEA} Detection and Mitigation in OFDM-Based Cognitive Radio Networks}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {10}, number = {10}, pages = {2131--2142}, year = {2015}, url = {https://doi.org/10.1109/TIFS.2015.2450673}, doi = {10.1109/TIFS.2015.2450673}, timestamp = {Thu, 06 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/AlahmadiFSL15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/AlipourASH15, author = {Hamid Reza Alipour and Youssif B. Al{-}Nashif and Pratik Satam and Salim Hariri}, title = {Wireless Anomaly Detection Based on {IEEE} 802.11 Behavior Analysis}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {10}, number = {10}, pages = {2158--2170}, year = {2015}, url = {https://doi.org/10.1109/TIFS.2015.2433898}, doi = {10.1109/TIFS.2015.2433898}, timestamp = {Fri, 03 Sep 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/AlipourASH15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/AlvarezICDC15, author = {B. Rosario Campomanes{-}{\'{A}}lvarez and {\'{O}}scar Ib{\'{a}}{\~{n}}ez and Carmen Campomanes{-}{\'{A}}lvarez and Sergio Damas and Oscar Cord{\'{o}}n}, title = {Modeling Facial Soft Tissue Thickness for Automatic Skull-Face Overlay}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {10}, number = {10}, pages = {2057--2070}, year = {2015}, url = {https://doi.org/10.1109/TIFS.2015.2441000}, doi = {10.1109/TIFS.2015.2441000}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/AlvarezICDC15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/AlzaabiTM15, author = {Mohammed Alzaabi and Kamal Taha and Thomas Anthony Martin}, title = {{CISRI:} {A} Crime Investigation System Using the Relative Importance of Information Spreaders in Networks Depicting Criminals Communications}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {10}, number = {10}, pages = {2196--2211}, year = {2015}, url = {https://doi.org/10.1109/TIFS.2015.2451073}, doi = {10.1109/TIFS.2015.2451073}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/AlzaabiTM15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/AmuruB15, author = {SaiDhiraj Amuru and R. Michael Buehrer}, title = {Optimal Jamming Against Digital Modulation}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {10}, number = {10}, pages = {2212--2224}, year = {2015}, url = {https://doi.org/10.1109/TIFS.2015.2451081}, doi = {10.1109/TIFS.2015.2451081}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/AmuruB15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/AnwarA15, author = {Tarique Anwar and Muhammad Abulaish}, title = {Ranking Radically Influential Web Forum Users}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {10}, number = {6}, pages = {1289--1298}, year = {2015}, url = {https://doi.org/10.1109/TIFS.2015.2407313}, doi = {10.1109/TIFS.2015.2407313}, timestamp = {Thu, 06 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/AnwarA15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/ArashlooKC15, author = {Shervin Rahimzadeh Arashloo and Josef Kittler and William J. Christmas}, title = {Face Spoofing Detection Based on Multiple Descriptor Fusion Using Multiscale Dynamic Binarized Statistical Image Features}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {10}, number = {11}, pages = {2396--2407}, year = {2015}, url = {https://doi.org/10.1109/TIFS.2015.2458700}, doi = {10.1109/TIFS.2015.2458700}, timestamp = {Thu, 06 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/ArashlooKC15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/ArdizzoneBM15, author = {Edoardo Ardizzone and Alessandro Bruno and Giuseppe Mazzola}, title = {Copy-Move Forgery Detection by Matching Triangles of Keypoints}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {10}, number = {10}, pages = {2084--2094}, year = {2015}, url = {https://doi.org/10.1109/TIFS.2015.2445742}, doi = {10.1109/TIFS.2015.2445742}, timestamp = {Mon, 26 Oct 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tifs/ArdizzoneBM15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/AsgharSLKP15, author = {Hassan Jameel Asghar and Ron Steinfeld and Shujun Li and Mohamed Ali K{\^{a}}afar and Josef Pieprzyk}, title = {On the Linearization of Human Identification Protocols: Attacks Based on Linear Algebra, Coding Theory, and Lattices}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {10}, number = {8}, pages = {1643--1655}, year = {2015}, url = {https://doi.org/10.1109/TIFS.2015.2421875}, doi = {10.1109/TIFS.2015.2421875}, timestamp = {Thu, 06 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/AsgharSLKP15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/BahramiKLL15, author = {Khosro Bahrami and Alex ChiChung Kot and Leida Li and Haoliang Li}, title = {Blurred Image Splicing Localization by Exposing Blur Type Inconsistency}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {10}, number = {5}, pages = {999--1009}, year = {2015}, url = {https://doi.org/10.1109/TIFS.2015.2394231}, doi = {10.1109/TIFS.2015.2394231}, timestamp = {Sun, 25 Jul 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/BahramiKLL15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/BansodRP15, author = {Gaurav Bansod and Nishchal Raval and Narayan Pisharoty}, title = {Implementation of a New Lightweight Encryption Design for Embedded Security}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {10}, number = {1}, pages = {142--151}, year = {2015}, url = {https://doi.org/10.1109/TIFS.2014.2365734}, doi = {10.1109/TIFS.2014.2365734}, timestamp = {Thu, 06 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/BansodRP15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/BarsoumH15, author = {Ayad F. Barsoum and M. Anwar Hasan}, title = {Provable Multicopy Dynamic Data Possession in Cloud Computing Systems}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {10}, number = {3}, pages = {485--497}, year = {2015}, url = {https://doi.org/10.1109/TIFS.2014.2384391}, doi = {10.1109/TIFS.2014.2384391}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/BarsoumH15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/BaturonePE15, author = {Iluminada Baturone and Miguel A. Prada{-}Delgado and Susana Eiroa}, title = {Improved Generation of Identifiers, Secret Keys, and Random Numbers From SRAMs}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {10}, number = {12}, pages = {2653--2668}, year = {2015}, url = {https://doi.org/10.1109/TIFS.2015.2471279}, doi = {10.1109/TIFS.2015.2471279}, timestamp = {Thu, 06 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/BaturonePE15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/BayramSM15, author = {Sevinc Bayram and Husrev Taha Sencar and Nasir D. Memon}, title = {Sensor Fingerprint Identification Through Composite Fingerprints and Group Testing}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {10}, number = {3}, pages = {597--612}, year = {2015}, url = {https://doi.org/10.1109/TIFS.2014.2385634}, doi = {10.1109/TIFS.2014.2385634}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tifs/BayramSM15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/BocheSP15, author = {Holger Boche and Rafael F. Schaefer and H. Vincent Poor}, title = {On the Continuity of the Secrecy Capacity of Compound and Arbitrarily Varying Wiretap Channels}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {10}, number = {12}, pages = {2531--2546}, year = {2015}, url = {https://doi.org/10.1109/TIFS.2015.2465937}, doi = {10.1109/TIFS.2015.2465937}, timestamp = {Thu, 23 Jun 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/BocheSP15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/BorleCD15, author = {Kapil M. Borle and Biao Chen and Wenliang Du}, title = {Physical Layer Spectrum Usage Authentication in Cognitive Radio: Analysis and Implementation}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {10}, number = {10}, pages = {2225--2235}, year = {2015}, url = {https://doi.org/10.1109/TIFS.2015.2452893}, doi = {10.1109/TIFS.2015.2452893}, timestamp = {Mon, 29 Apr 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/BorleCD15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/CS15, author = {Haris B. C. and Rohit Sinha}, title = {Robust Speaker Verification With Joint Sparse Coding Over Learned Dictionaries}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {10}, number = {10}, pages = {2143--2157}, year = {2015}, url = {https://doi.org/10.1109/TIFS.2015.2450674}, doi = {10.1109/TIFS.2015.2450674}, timestamp = {Sat, 05 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/CS15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/CagaljPB15, author = {Mario Cagalj and Toni Perkovic and Marin Bugaric}, title = {Timing Attacks on Cognitive Authentication Schemes}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {10}, number = {3}, pages = {584--596}, year = {2015}, url = {https://doi.org/10.1109/TIFS.2014.2376177}, doi = {10.1109/TIFS.2014.2376177}, timestamp = {Mon, 26 Oct 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tifs/CagaljPB15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/CambareriMPRS15, author = {Valerio Cambareri and Mauro Mangia and Fabio Pareschi and Riccardo Rovatti and Gianluca Setti}, title = {On Known-Plaintext Attacks to a Compressed Sensing-Based Encryption: {A} Quantitative Analysis}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {10}, number = {10}, pages = {2182--2195}, year = {2015}, url = {https://doi.org/10.1109/TIFS.2015.2450676}, doi = {10.1109/TIFS.2015.2450676}, timestamp = {Sun, 22 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/CambareriMPRS15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/ChenGXC15, author = {Gaojie Chen and Yu Gong and Pei Xiao and Jonathon A. Chambers}, title = {Physical Layer Network Security in the Full-Duplex Relay System}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {10}, number = {3}, pages = {574--583}, year = {2015}, url = {https://doi.org/10.1109/TIFS.2015.2390136}, doi = {10.1109/TIFS.2015.2390136}, timestamp = {Thu, 06 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/ChenGXC15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/ChenHLMLW15, author = {Xiaofeng Chen and Xinyi Huang and Jin Li and Jianfeng Ma and Wenjing Lou and Duncan S. Wong}, title = {New Algorithms for Secure Outsourcing of Large-Scale Systems of Linear Equations}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {10}, number = {1}, pages = {69--78}, year = {2015}, url = {https://doi.org/10.1109/TIFS.2014.2363765}, doi = {10.1109/TIFS.2014.2363765}, timestamp = {Mon, 25 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/ChenHLMLW15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/ChenMYG15, author = {Rongmao Chen and Yi Mu and Guomin Yang and Fuchun Guo}, title = {{BL-MLE:} Block-Level Message-Locked Encryption for Secure Large File Deduplication}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {10}, number = {12}, pages = {2643--2652}, year = {2015}, url = {https://doi.org/10.1109/TIFS.2015.2470221}, doi = {10.1109/TIFS.2015.2470221}, timestamp = {Sun, 22 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/ChenMYG15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/ChenNS15, author = {Kan Chen and Balasubramaniam Natarajan and Steve Shattil}, title = {Secret Key Generation Rate With Power Allocation in Relay-Based {LTE-A} Networks}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {10}, number = {11}, pages = {2424--2434}, year = {2015}, url = {https://doi.org/10.1109/TIFS.2015.2462756}, doi = {10.1109/TIFS.2015.2462756}, timestamp = {Thu, 06 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/ChenNS15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/ChenPZM15, author = {Shaxun Chen and Amit Pande and Kai Zeng and Prasant Mohapatra}, title = {Live Video Forensics: Source Identification in Lossy Wireless Networks}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {10}, number = {1}, pages = {28--39}, year = {2015}, url = {https://doi.org/10.1109/TIFS.2014.2362848}, doi = {10.1109/TIFS.2014.2362848}, timestamp = {Thu, 06 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/ChenPZM15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/CheonK15, author = {Jung Hee Cheon and Jinsu Kim}, title = {A Hybrid Scheme of Public-Key Encryption and Somewhat Homomorphic Encryption}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {10}, number = {5}, pages = {1052--1063}, year = {2015}, url = {https://doi.org/10.1109/TIFS.2015.2398359}, doi = {10.1109/TIFS.2015.2398359}, timestamp = {Thu, 06 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/CheonK15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/ChingovskaA15, author = {Ivana Chingovska and Andr{\'{e}} Rabello dos Anjos}, title = {On the Use of Client Identity Information for Face Antispoofing}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {10}, number = {4}, pages = {787--796}, year = {2015}, url = {https://doi.org/10.1109/TIFS.2015.2400392}, doi = {10.1109/TIFS.2015.2400392}, timestamp = {Thu, 06 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/ChingovskaA15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/ChuSL15, author = {Xiaoyu Chu and Matthew Christopher Stamm and K. J. Ray Liu}, title = {Compressive Sensing Forensics}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {10}, number = {7}, pages = {1416--1431}, year = {2015}, url = {https://doi.org/10.1109/TIFS.2015.2413389}, doi = {10.1109/TIFS.2015.2413389}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/ChuSL15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/CogranneF15, author = {R{\'{e}}mi Cogranne and Jessica J. Fridrich}, title = {Modeling and Extending the Ensemble Classifier for Steganalysis of Digital Images Using Hypothesis Testing Theory}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {10}, number = {12}, pages = {2627--2642}, year = {2015}, url = {https://doi.org/10.1109/TIFS.2015.2470220}, doi = {10.1109/TIFS.2015.2470220}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/CogranneF15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/ConotterAP15, author = {Valentina Conotter and Pedro {Comesa{~{n}}a Alfaro} and Fernando P{\'{e}}rez{-}Gonz{\'{a}}lez}, title = {Forensic Detection of Processing Operator Chains: Recovering the History of Filtered {JPEG} Images}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {10}, number = {11}, pages = {2257--2269}, year = {2015}, url = {https://doi.org/10.1109/TIFS.2015.2424195}, doi = {10.1109/TIFS.2015.2424195}, timestamp = {Sat, 09 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/ConotterAP15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/CozzolinoPV15, author = {Davide Cozzolino and Giovanni Poggi and Luisa Verdoliva}, title = {Efficient Dense-Field Copy-Move Forgery Detection}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {10}, number = {11}, pages = {2284--2297}, year = {2015}, url = {https://doi.org/10.1109/TIFS.2015.2455334}, doi = {10.1109/TIFS.2015.2455334}, timestamp = {Thu, 06 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/CozzolinoPV15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/CuiQZ15, author = {Aijiao Cui and Gang Qu and Yan Zhang}, title = {Ultra-Low Overhead Dynamic Watermarking on Scan Design for Hard {IP} Protection}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {10}, number = {11}, pages = {2298--2313}, year = {2015}, url = {https://doi.org/10.1109/TIFS.2015.2455338}, doi = {10.1109/TIFS.2015.2455338}, timestamp = {Tue, 14 Dec 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tifs/CuiQZ15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/Czajka15, author = {Adam Czajka}, title = {Pupil Dynamics for Iris Liveness Detection}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {10}, number = {4}, pages = {726--735}, year = {2015}, url = {https://doi.org/10.1109/TIFS.2015.2398815}, doi = {10.1109/TIFS.2015.2398815}, timestamp = {Thu, 06 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/Czajka15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/DaiM15, author = {Bin Dai and Zheng Ma}, title = {Multiple-Access Relay Wiretap Channel}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {10}, number = {9}, pages = {1835--1849}, year = {2015}, url = {https://doi.org/10.1109/TIFS.2015.2431992}, doi = {10.1109/TIFS.2015.2431992}, timestamp = {Thu, 06 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/DaiM15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/Dang-NguyenBN15, author = {Duc{-}Tien Dang{-}Nguyen and Giulia Boato and Francesco G. B. De Natale}, title = {3D-Model-Based Video Analysis for Computer Generated Faces Identification}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {10}, number = {8}, pages = {1752--1763}, year = {2015}, url = {https://doi.org/10.1109/TIFS.2015.2427778}, doi = {10.1109/TIFS.2015.2427778}, timestamp = {Thu, 06 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/Dang-NguyenBN15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/DengWGW15, author = {Hao Deng and Huiming Wang and Wei Guo and Wenjie Wang}, title = {Secrecy Transmission With a Helper: To Relay or to Jam}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {10}, number = {2}, pages = {293--307}, year = {2015}, url = {https://doi.org/10.1109/TIFS.2014.2374356}, doi = {10.1109/TIFS.2014.2374356}, timestamp = {Wed, 22 Feb 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tifs/DengWGW15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/EvansLMR15, author = {Nicholas W. D. Evans and Stan Z. Li and S{\'{e}}bastien Marcel and Arun Ross}, title = {Guest Editorial Special Issue on Biometric Spoofing and Countermeasures}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {10}, number = {4}, pages = {699--702}, year = {2015}, url = {https://doi.org/10.1109/TIFS.2015.2406111}, doi = {10.1109/TIFS.2015.2406111}, timestamp = {Wed, 07 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tifs/EvansLMR15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/FanWCX15, author = {Wei Fan and Kai Wang and Fran{\c{c}}ois Cayre and Zhang Xiong}, title = {Median Filtered Image Quality Enhancement and Anti-Forensics via Variational Deconvolution}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {10}, number = {5}, pages = {1076--1091}, year = {2015}, url = {https://doi.org/10.1109/TIFS.2015.2398362}, doi = {10.1109/TIFS.2015.2398362}, timestamp = {Thu, 03 Feb 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tifs/FanWCX15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/FengL015, author = {Bingwen Feng and Wei Lu and Wei Sun}, title = {Secure Binary Image Steganography Based on Minimizing the Distortion on the Texture}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {10}, number = {2}, pages = {243--255}, year = {2015}, url = {https://doi.org/10.1109/TIFS.2014.2368364}, doi = {10.1109/TIFS.2014.2368364}, timestamp = {Thu, 06 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/FengL015.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/FerranteLMPT15, author = {Augusto Ferrante and Nicola Laurenti and Chiara Masiero and Michele Pavon and Stefano Tomasin}, title = {On the Error Region for Channel Estimation-Based Physical Layer Authentication Over Rayleigh Fading}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {10}, number = {5}, pages = {941--952}, year = {2015}, url = {https://doi.org/10.1109/TIFS.2015.2392565}, doi = {10.1109/TIFS.2015.2392565}, timestamp = {Thu, 06 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/FerranteLMPT15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/Franco-Contreras15, author = {Javier Franco{-}Contreras and Gouenou Coatrieux}, title = {Robust Watermarking of Relational Databases With Ontology-Guided Distortion Control}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {10}, number = {9}, pages = {1939--1952}, year = {2015}, url = {https://doi.org/10.1109/TIFS.2015.2439962}, doi = {10.1109/TIFS.2015.2439962}, timestamp = {Thu, 06 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/Franco-Contreras15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/GaoZJLZ15, author = {Shenghua Gao and Yuting Zhang and Kui Jia and Jiwen Lu and Yingying Zhang}, title = {Single Sample Face Recognition via Learning Deep Supervised Autoencoders}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {10}, number = {10}, pages = {2108--2118}, year = {2015}, url = {https://doi.org/10.1109/TIFS.2015.2446438}, doi = {10.1109/TIFS.2015.2446438}, timestamp = {Fri, 09 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/GaoZJLZ15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/GarciaQ15, author = {Diogo C. Garcia and Ricardo L. de Queiroz}, title = {Face-Spoofing 2D-Detection Based on Moir{\'{e}}-Pattern Analysis}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {10}, number = {4}, pages = {778--786}, year = {2015}, url = {https://doi.org/10.1109/TIFS.2015.2411394}, doi = {10.1109/TIFS.2015.2411394}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/GarciaQ15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/GarnaevT15, author = {Andrey Garnaev and Wade Trappe}, title = {One-Time Spectrum Coexistence in Dynamic Spectrum Access When the Secondary User May Be Malicious}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {10}, number = {5}, pages = {1064--1075}, year = {2015}, url = {https://doi.org/10.1109/TIFS.2015.2398360}, doi = {10.1109/TIFS.2015.2398360}, timestamp = {Thu, 23 Jun 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/GarnaevT15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/Gomez-VilardeboG15, author = {Jes{\'{u}}s G{\'{o}}mez{-}Vilardeb{\'{o}} and Deniz G{\"{u}}nd{\"{u}}z}, title = {Smart Meter Privacy for Multiple Users in the Presence of an Alternative Energy Source}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {10}, number = {1}, pages = {132--141}, year = {2015}, url = {https://doi.org/10.1109/TIFS.2014.2365365}, doi = {10.1109/TIFS.2014.2365365}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/Gomez-VilardeboG15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/GragnanielloPSV15, author = {Diego Gragnaniello and Giovanni Poggi and Carlo Sansone and Luisa Verdoliva}, title = {An Investigation of Local Descriptors for Biometric Spoofing Detection}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {10}, number = {4}, pages = {849--863}, year = {2015}, url = {https://doi.org/10.1109/TIFS.2015.2404294}, doi = {10.1109/TIFS.2015.2404294}, timestamp = {Thu, 06 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/GragnanielloPSV15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/GuanTWS15, author = {Kyle Guan and Antonia M. Tulino and Peter J. Winzer and Emina Soljanin}, title = {Secrecy Capacities in Space-Division Multiplexed Fiber Optic Communication Systems}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {10}, number = {7}, pages = {1325--1335}, year = {2015}, url = {https://doi.org/10.1109/TIFS.2015.2405897}, doi = {10.1109/TIFS.2015.2405897}, timestamp = {Fri, 19 Apr 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/GuanTWS15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/GuoNSTS15, author = {Linjie Guo and Jiangqun Ni and Wenkang Su and Chengpei Tang and Yun{-}Qing Shi}, title = {Using Statistical Image Model for {JPEG} Steganography: Uniform Embedding Revisited}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {10}, number = {12}, pages = {2669--2680}, year = {2015}, url = {https://doi.org/10.1109/TIFS.2015.2473815}, doi = {10.1109/TIFS.2015.2473815}, timestamp = {Thu, 06 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/GuoNSTS15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/Hajj-AhmadG015, author = {Adi Hajj{-}Ahmad and Ravi Garg and Min Wu}, title = {ENF-Based Region-of-Recording Identification for Media Signals}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {10}, number = {6}, pages = {1125--1136}, year = {2015}, url = {https://doi.org/10.1109/TIFS.2015.2398367}, doi = {10.1109/TIFS.2015.2398367}, timestamp = {Thu, 06 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/Hajj-AhmadG015.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/HanSMAC15, author = {Jinguang Han and Willy Susilo and Yi Mu and Man Ho Au and Jie Cao}, title = {{AAC-OT:} Accountable Oblivious Transfer With Access Control}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {10}, number = {12}, pages = {2502--2514}, year = {2015}, url = {https://doi.org/10.1109/TIFS.2015.2464781}, doi = {10.1109/TIFS.2015.2464781}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/HanSMAC15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/HanSMZA15, author = {Jinguang Han and Willy Susilo and Yi Mu and Jianying Zhou and Man Ho Allen Au}, title = {Improving Privacy and Security in Decentralized Ciphertext-Policy Attribute-Based Encryption}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {10}, number = {3}, pages = {665--678}, year = {2015}, url = {https://doi.org/10.1109/TIFS.2014.2382297}, doi = {10.1109/TIFS.2014.2382297}, timestamp = {Fri, 09 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/HanSMZA15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/HarounG15, author = {Mohamed F. Haroun and T. Aaron Gulliver}, title = {Secret Key Generation Using Chaotic Signals Over Frequency Selective Fading Channels}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {10}, number = {8}, pages = {1764--1775}, year = {2015}, url = {https://doi.org/10.1109/TIFS.2015.2428211}, doi = {10.1109/TIFS.2015.2428211}, timestamp = {Thu, 02 Dec 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tifs/HarounG15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/HeZXH15, author = {Debiao He and Sherali Zeadally and Baowen Xu and Xinyi Huang}, title = {An Efficient Identity-Based Conditional Privacy-Preserving Authentication Scheme for Vehicular Ad Hoc Networks}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {10}, number = {12}, pages = {2681--2691}, year = {2015}, url = {https://doi.org/10.1109/TIFS.2015.2473820}, doi = {10.1109/TIFS.2015.2473820}, timestamp = {Thu, 24 Feb 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tifs/HeZXH15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/HildebrandtD15, author = {Mario Hildebrandt and Jana Dittmann}, title = {StirTraceV2.0: Enhanced Benchmarking and Tuning of Printed Fingerprint Detection}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {10}, number = {4}, pages = {833--848}, year = {2015}, url = {https://doi.org/10.1109/TIFS.2015.2405412}, doi = {10.1109/TIFS.2015.2405412}, timestamp = {Thu, 06 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/HildebrandtD15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/HolubF15, author = {Vojtech Holub and Jessica J. Fridrich}, title = {Low-Complexity Features for {JPEG} Steganalysis Using Undecimated {DCT}}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {10}, number = {2}, pages = {219--228}, year = {2015}, url = {https://doi.org/10.1109/TIFS.2014.2364918}, doi = {10.1109/TIFS.2014.2364918}, timestamp = {Thu, 06 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/HolubF15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/HongXL15, author = {Jia{-}An Hong and Kaiping Xue and Wei Li}, title = {Comments on "DAC-MACS: Effective Data Access Control for Multiauthority Cloud Storage Systems" / Security Analysis of Attribute Revocation in Multiauthority Data Access Control for Cloud Storage Systems}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {10}, number = {6}, pages = {1315--1317}, year = {2015}, url = {https://doi.org/10.1109/TIFS.2015.2407327}, doi = {10.1109/TIFS.2015.2407327}, timestamp = {Thu, 06 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/HongXL15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/HoushmandAF15, author = {Shiva Houshmand and Sudhir Aggarwal and R. Flood}, title = {Next Gen {PCFG} Password Cracking}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {10}, number = {8}, pages = {1776--1791}, year = {2015}, url = {https://doi.org/10.1109/TIFS.2015.2428671}, doi = {10.1109/TIFS.2015.2428671}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/HoushmandAF15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/HuCYY15, author = {Jianwei Hu and Yueming Cai and Nan (Jonas) Yang and Weiwei Yang}, title = {A New Secure Transmission Scheme With Outdated Antenna Selection}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {10}, number = {11}, pages = {2435--2446}, year = {2015}, url = {https://doi.org/10.1109/TIFS.2015.2464703}, doi = {10.1109/TIFS.2015.2464703}, timestamp = {Wed, 17 Nov 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tifs/HuCYY15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/HuZLY15, author = {Xiaocheng Hu and Weiming Zhang and Xiaolong Li and Nenghai Yu}, title = {Minimum Rate Prediction and Optimized Histograms Modification for Reversible Data Hiding}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {10}, number = {3}, pages = {653--664}, year = {2015}, url = {https://doi.org/10.1109/TIFS.2015.2392556}, doi = {10.1109/TIFS.2015.2392556}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/HuZLY15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/HuaGT15, author = {Guang Hua and Jonathan Goh and Vrizlynn L. L. Thing}, title = {Cepstral Analysis for the Application of Echo-Based Audio Watermark Detection}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {10}, number = {9}, pages = {1850--1861}, year = {2015}, url = {https://doi.org/10.1109/TIFS.2015.2431997}, doi = {10.1109/TIFS.2015.2431997}, timestamp = {Thu, 10 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/HuaGT15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/HuangELY15, author = {Sheng Huang and Ahmed M. Elgammal and Jiwen Lu and Dan Yang}, title = {Cross-Speed Gait Recognition Using Speed-Invariant Gait Templates and Globality-Locality Preserving Projections}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {10}, number = {10}, pages = {2071--2083}, year = {2015}, url = {https://doi.org/10.1109/TIFS.2015.2445315}, doi = {10.1109/TIFS.2015.2445315}, timestamp = {Fri, 29 Jul 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/HuangELY15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/HuangZH15, author = {Yonggang Huang and Jun Zhang and Heyan Huang}, title = {Camera Model Identification With Unknown Models}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {10}, number = {12}, pages = {2692--2704}, year = {2015}, url = {https://doi.org/10.1109/TIFS.2015.2474836}, doi = {10.1109/TIFS.2015.2474836}, timestamp = {Thu, 06 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/HuangZH15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/HwangCCN15, author = {Jung Yeon Hwang and Liqun Chen and Hyun Sook Cho and DaeHun Nyang}, title = {Short Dynamic Group Signature Scheme Supporting Controllable Linkability}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {10}, number = {6}, pages = {1109--1124}, year = {2015}, url = {https://doi.org/10.1109/TIFS.2015.2390497}, doi = {10.1109/TIFS.2015.2390497}, timestamp = {Mon, 25 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/HwangCCN15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/JafarianAD15, author = {Jafar Haadi Jafarian and Ehab Al{-}Shaer and Qi Duan}, title = {An Effective Address Mutation Approach for Disrupting Reconnaissance Attacks}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {10}, number = {12}, pages = {2562--2577}, year = {2015}, url = {https://doi.org/10.1109/TIFS.2015.2467358}, doi = {10.1109/TIFS.2015.2467358}, timestamp = {Thu, 06 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/JafarianAD15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/Jiang15, author = {Shaoquan Jiang}, title = {On the Optimality of Keyless Authentication in a Noisy Model}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {10}, number = {6}, pages = {1250--1261}, year = {2015}, url = {https://doi.org/10.1109/TIFS.2015.2405891}, doi = {10.1109/TIFS.2015.2405891}, timestamp = {Thu, 06 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/Jiang15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/Jiang15a, author = {Shaoquan Jiang}, title = {On the Size of Source Space in a Secure {MAC}}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {10}, number = {9}, pages = {2007--2015}, year = {2015}, url = {https://doi.org/10.1109/TIFS.2015.2442523}, doi = {10.1109/TIFS.2015.2442523}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/Jiang15a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/JiangWYXZ15, author = {Jiao Jiao Jiang and Sheng Wen and Shui Yu and Yang Xiang and Wanlei Zhou}, title = {K-Center: An Approach on the Multi-Source Identification of Information Diffusion}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {10}, number = {12}, pages = {2616--2626}, year = {2015}, url = {https://doi.org/10.1109/TIFS.2015.2469256}, doi = {10.1109/TIFS.2015.2469256}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/JiangWYXZ15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/JinLR15, author = {Yi Jin and Jiwen Lu and Qiuqi Ruan}, title = {Coupled Discriminative Feature Learning for Heterogeneous Face Recognition}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {10}, number = {3}, pages = {640--652}, year = {2015}, url = {https://doi.org/10.1109/TIFS.2015.2390414}, doi = {10.1109/TIFS.2015.2390414}, timestamp = {Fri, 18 Dec 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tifs/JinLR15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/JolfaeiWM15, author = {Alireza Jolfaei and Xin{-}Wen Wu and Vallipuram Muthukkumarasamy}, title = {A 3D Object Encryption Scheme Which Maintains Dimensional and Spatial Stability}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {10}, number = {2}, pages = {409--422}, year = {2015}, url = {https://doi.org/10.1109/TIFS.2014.2378146}, doi = {10.1109/TIFS.2014.2378146}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/JolfaeiWM15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/JungLWW15, author = {Taeho Jung and Xiang{-}Yang Li and Zhiguo Wan and Meng Wan}, title = {Control Cloud Data Access Privilege and Anonymity With Fully Anonymous Attribute-Based Encryption}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {10}, number = {1}, pages = {190--199}, year = {2015}, url = {https://doi.org/10.1109/TIFS.2014.2368352}, doi = {10.1109/TIFS.2014.2368352}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/JungLWW15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/KalantariZGHO15, author = {Ashkan Kalantari and Gan Zheng and Zhen Gao and Zhu Han and Bj{\"{o}}rn E. Ottersten}, title = {Secrecy Analysis on Network Coding in Bidirectional Multibeam Satellite Communications}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {10}, number = {9}, pages = {1862--1874}, year = {2015}, url = {https://doi.org/10.1109/TIFS.2015.2432732}, doi = {10.1109/TIFS.2015.2432732}, timestamp = {Wed, 05 Jan 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tifs/KalantariZGHO15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/KaminagaYS15, author = {Masahiro Kaminaga and Hideki Yoshikawa and Toshinori Suzuki}, title = {Double Counting in 2\({}^{\mbox{t}}\)-ary {RSA} Precomputation Reveals the Secret Exponent}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {10}, number = {7}, pages = {1394--1401}, year = {2015}, url = {https://doi.org/10.1109/TIFS.2015.2411213}, doi = {10.1109/TIFS.2015.2411213}, timestamp = {Thu, 06 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/KaminagaYS15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/KarachontzitisTKB15, author = {Sotirios Karachontzitis and Stelios Timotheou and Ioannis Krikidis and Kostas Berberidis}, title = {Security-Aware Max-Min Resource Allocation in Multiuser {OFDMA} Downlink}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {10}, number = {3}, pages = {529--542}, year = {2015}, url = {https://doi.org/10.1109/TIFS.2014.2384392}, doi = {10.1109/TIFS.2014.2384392}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/KarachontzitisTKB15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/KhandakerW15, author = {Muhammad R. A. Khandaker and Kai{-}Kit Wong}, title = {Masked Beamforming in the Presence of Energy-Harvesting Eavesdroppers}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {10}, number = {1}, pages = {40--54}, year = {2015}, url = {https://doi.org/10.1109/TIFS.2014.2363033}, doi = {10.1109/TIFS.2014.2363033}, timestamp = {Thu, 06 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/KhandakerW15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/KimSAS15, author = {Jongkil Kim and Willy Susilo and Man Ho Au and Jennifer Seberry}, title = {Adaptively Secure Identity-Based Broadcast Encryption With a Constant-Sized Ciphertext}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {10}, number = {3}, pages = {679--693}, year = {2015}, url = {https://doi.org/10.1109/TIFS.2014.2388156}, doi = {10.1109/TIFS.2014.2388156}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/KimSAS15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/KomogortsevKH15, author = {Oleg V. Komogortsev and Alexey Karpov and Corey D. Holland}, title = {Attack of Mechanical Replicas: Liveness Detection With Eye Movements}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {10}, number = {4}, pages = {716--725}, year = {2015}, url = {https://doi.org/10.1109/TIFS.2015.2405345}, doi = {10.1109/TIFS.2015.2405345}, timestamp = {Thu, 06 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/KomogortsevKH15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/KungTH15, author = {Hsin{-}Wen Kung and Yi{-}Han Tu and Chiou{-}Ting Hsu}, title = {Dual Subspace Nonnegative Graph Embedding for Identity-Independent Expression Recognition}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {10}, number = {3}, pages = {626--639}, year = {2015}, url = {https://doi.org/10.1109/TIFS.2015.2390138}, doi = {10.1109/TIFS.2015.2390138}, timestamp = {Thu, 06 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/KungTH15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/Kwon015, author = {Taekyoung Kwon and Jin Hong}, title = {Analysis and Improvement of a PIN-Entry Method Resilient to Shoulder-Surfing and Recording Attacks}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {10}, number = {2}, pages = {278--292}, year = {2015}, url = {https://doi.org/10.1109/TIFS.2014.2374352}, doi = {10.1109/TIFS.2014.2374352}, timestamp = {Thu, 12 Nov 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tifs/Kwon015.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/Laarhoven15, author = {Thijs Laarhoven}, title = {Asymptotics of Fingerprinting and Group Testing: Tight Bounds From Channel Capacities}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {10}, number = {9}, pages = {1967--1980}, year = {2015}, url = {https://doi.org/10.1109/TIFS.2015.2440190}, doi = {10.1109/TIFS.2015.2440190}, timestamp = {Thu, 06 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/Laarhoven15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/LiCY15, author = {Enping Li and Scott Craver and Jun Yu}, title = {Capacity Limits of Pseudorandom Channels in Deception Problems}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {10}, number = {9}, pages = {1824--1834}, year = {2015}, url = {https://doi.org/10.1109/TIFS.2015.2423656}, doi = {10.1109/TIFS.2015.2423656}, timestamp = {Thu, 06 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/LiCY15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/LiHPS15, author = {Cai Li and Jiankun Hu and Josef Pieprzyk and Willy Susilo}, title = {A New Biocryptosystem-Oriented Security Analysis Framework and Implementation of Multibiometric Cryptosystems Based on Decision Level Fusion}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {10}, number = {6}, pages = {1193--1206}, year = {2015}, url = {https://doi.org/10.1109/TIFS.2015.2402593}, doi = {10.1109/TIFS.2015.2402593}, timestamp = {Tue, 07 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tifs/LiHPS15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/LiLYS15, author = {Jian Li and Xiaolong Li and Bin Yang and Xingming Sun}, title = {Segmentation-Based Image Copy-Move Forgery Detection Scheme}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {10}, number = {3}, pages = {507--518}, year = {2015}, url = {https://doi.org/10.1109/TIFS.2014.2381872}, doi = {10.1109/TIFS.2014.2381872}, timestamp = {Thu, 06 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/LiLYS15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/LiM15, author = {Mu Li and Vishal Monga}, title = {Twofold Video Hashing With Automatic Synchronization}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {10}, number = {8}, pages = {1727--1738}, year = {2015}, url = {https://doi.org/10.1109/TIFS.2015.2425362}, doi = {10.1109/TIFS.2015.2425362}, timestamp = {Mon, 21 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/LiM15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/LiMZY15, author = {Xiaoyong Li and Huadong Ma and Feng Zhou and Wenbin Yao}, title = {T-Broker: {A} Trust-Aware Service Brokering Scheme for Multiple Cloud Collaborative Services}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {10}, number = {7}, pages = {1402--1415}, year = {2015}, url = {https://doi.org/10.1109/TIFS.2015.2413386}, doi = {10.1109/TIFS.2015.2413386}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/LiMZY15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/LiNLTH15, author = {Bin Li and Tian{-}Tsong Ng and Xiaolong Li and Shunquan Tan and Jiwu Huang}, title = {Revealing the Trace of High-Quality {JPEG} Compression Through Quantization Noise Analysis}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {10}, number = {3}, pages = {558--573}, year = {2015}, url = {https://doi.org/10.1109/TIFS.2015.2389148}, doi = {10.1109/TIFS.2015.2389148}, timestamp = {Mon, 31 Jan 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tifs/LiNLTH15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/LiWLTH15, author = {Bin Li and Ming Wang and Xiaolong Li and Shunquan Tan and Jiwu Huang}, title = {A Strategy of Clustering Modification Directions in Spatial Image Steganography}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {10}, number = {9}, pages = {1905--1917}, year = {2015}, url = {https://doi.org/10.1109/TIFS.2015.2434600}, doi = {10.1109/TIFS.2015.2434600}, timestamp = {Mon, 31 Jan 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tifs/LiWLTH15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/LiZGY15, author = {Xiaolong Li and Weiming Zhang and Xinlu Gui and Bin Yang}, title = {Efficient Reversible Data Hiding Based on Multiple Histograms Modification}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {10}, number = {9}, pages = {2016--2027}, year = {2015}, url = {https://doi.org/10.1109/TIFS.2015.2444354}, doi = {10.1109/TIFS.2015.2444354}, timestamp = {Tue, 13 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tifs/LiZGY15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/LiZYY15, author = {Ke Li and Weiming Zhang and Ce Yang and Nenghai Yu}, title = {Security Analysis on One-to-Many Order Preserving Encryption-Based Cloud Data Search}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {10}, number = {9}, pages = {1918--1926}, year = {2015}, url = {https://doi.org/10.1109/TIFS.2015.2435697}, doi = {10.1109/TIFS.2015.2435697}, timestamp = {Thu, 29 Sep 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/LiZYY15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/LiZZSF15, author = {Qi Li and Xinwen Zhang and Qingji Zheng and Ravi S. Sandhu and Xiaoming Fu}, title = {{LIVE:} Lightweight Integrity Verification and Content Access Control for Named Data Networking}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {10}, number = {2}, pages = {308--320}, year = {2015}, url = {https://doi.org/10.1109/TIFS.2014.2365742}, doi = {10.1109/TIFS.2014.2365742}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/LiZZSF15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/LianCML15, author = {Bin Lian and Gongliang Chen and Maode Ma and Jianhua Li}, title = {Periodic K-Times Anonymous Authentication With Efficient Revocation of Violator's Credential}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {10}, number = {3}, pages = {543--557}, year = {2015}, url = {https://doi.org/10.1109/TIFS.2014.2386658}, doi = {10.1109/TIFS.2014.2386658}, timestamp = {Sun, 03 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/LianCML15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/LiangDX15, author = {Yicong Liang and Xiaoqing Ding and Jing{-}Hao Xue}, title = {Advanced Joint Bayesian Method for Face Verification}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {10}, number = {2}, pages = {346--354}, year = {2015}, url = {https://doi.org/10.1109/TIFS.2014.2375552}, doi = {10.1109/TIFS.2014.2375552}, timestamp = {Thu, 06 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/LiangDX15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/LiangS15, author = {Kaitai Liang and Willy Susilo}, title = {Searchable Attribute-Based Mechanism With Efficient Data Sharing for Secure Cloud Storage}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {10}, number = {9}, pages = {1981--1992}, year = {2015}, url = {https://doi.org/10.1109/TIFS.2015.2442215}, doi = {10.1109/TIFS.2015.2442215}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/LiangS15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/LiangSL15, author = {Kaitai Liang and Willy Susilo and Joseph K. Liu}, title = {Privacy-Preserving Ciphertext Multi-Sharing Control for Big Data Storage}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {10}, number = {8}, pages = {1578--1589}, year = {2015}, url = {https://doi.org/10.1109/TIFS.2015.2419186}, doi = {10.1109/TIFS.2015.2419186}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/LiangSL15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/LinCCLH15, author = {Kevin Lin and Shen{-}Chi Chen and Chu{-}Song Chen and Daw{-}Tung Lin and Yi{-}Ping Hung}, title = {Abandoned Object Detection via Temporal Consistency Modeling and Back-Tracing Verification for Visual Surveillance}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {10}, number = {7}, pages = {1359--1370}, year = {2015}, url = {https://doi.org/10.1109/TIFS.2015.2408263}, doi = {10.1109/TIFS.2015.2408263}, timestamp = {Thu, 06 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/LinCCLH15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/LinZMW15, author = {Suqing Lin and Rui Zhang and Hui Ma and Suqing Wang}, title = {Revisiting Attribute-Based Encryption With Verifiable Outsourced Decryption}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {10}, number = {10}, pages = {2119--2130}, year = {2015}, url = {https://doi.org/10.1109/TIFS.2015.2449264}, doi = {10.1109/TIFS.2015.2449264}, timestamp = {Thu, 06 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/LinZMW15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/LingLWYF15, author = {Zhen Ling and Junzhou Luo and Kui Wu and Wei Yu and Xinwen Fu}, title = {TorWard: Discovery, Blocking, and Traceback of Malicious Traffic Over Tor}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {10}, number = {12}, pages = {2515--2530}, year = {2015}, url = {https://doi.org/10.1109/TIFS.2015.2465934}, doi = {10.1109/TIFS.2015.2465934}, timestamp = {Tue, 21 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tifs/LingLWYF15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/LiuCCHAZ15, author = {Joseph K. Liu and Cheng{-}Kang Chu and Sherman S. M. Chow and Xinyi Huang and Man Ho Au and Jianying Zhou}, title = {Time-Bound Anonymous Authentication for Roaming Networks}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {10}, number = {1}, pages = {178--189}, year = {2015}, url = {https://doi.org/10.1109/TIFS.2014.2366300}, doi = {10.1109/TIFS.2014.2366300}, timestamp = {Mon, 25 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/LiuCCHAZ15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/LiuCW15, author = {Manhua Liu and Xiaoying Chen and Xiaoduan Wang}, title = {Latent Fingerprint Enhancement via Multi-Scale Patch Based Sparse Representation}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {10}, number = {1}, pages = {6--15}, year = {2015}, url = {https://doi.org/10.1109/TIFS.2014.2360582}, doi = {10.1109/TIFS.2014.2360582}, timestamp = {Thu, 06 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/LiuCW15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/LiuCW15a, author = {Zhen Liu and Zhenfu Cao and Duncan S. Wong}, title = {Traceable {CP-ABE:} How to Trace Decryption Devices Found in the Wild}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {10}, number = {1}, pages = {55--68}, year = {2015}, url = {https://doi.org/10.1109/TIFS.2014.2363562}, doi = {10.1109/TIFS.2014.2363562}, timestamp = {Thu, 23 Jun 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/LiuCW15a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/LiuYK15, author = {Kuan{-}Hsien Liu and Shuicheng Yan and C.{-}C. Jay Kuo}, title = {Age Estimation via Grouping and Decision Fusion}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {10}, number = {11}, pages = {2408--2423}, year = {2015}, url = {https://doi.org/10.1109/TIFS.2015.2462732}, doi = {10.1109/TIFS.2015.2462732}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/LiuYK15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/LuLWM15, author = {Jiwen Lu and Venice Erin Liong and Gang Wang and Pierre Moulin}, title = {Joint Feature Learning for Face Recognition}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {10}, number = {7}, pages = {1371--1383}, year = {2015}, url = {https://doi.org/10.1109/TIFS.2015.2408431}, doi = {10.1109/TIFS.2015.2408431}, timestamp = {Thu, 06 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/LuLWM15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/LuWDJ15, author = {Jiwen Lu and Gang Wang and Weihong Deng and Kui Jia}, title = {Reconstruction-Based Metric Learning for Unconstrained Face Verification}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {10}, number = {1}, pages = {79--89}, year = {2015}, url = {https://doi.org/10.1109/TIFS.2014.2363792}, doi = {10.1109/TIFS.2014.2363792}, timestamp = {Thu, 23 Jun 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/LuWDJ15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/MaHZY15, author = {Sha Ma and Qiong Huang and Mingwu Zhang and Bo Yang}, title = {Efficient Public Key Encryption With Equality Test Supporting Flexible Authorization}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {10}, number = {3}, pages = {458--470}, year = {2015}, url = {https://doi.org/10.1109/TIFS.2014.2378592}, doi = {10.1109/TIFS.2014.2378592}, timestamp = {Sun, 22 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/MaHZY15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/MaZW15, author = {Y. Ma and Li{-}Min Zhang and H. Wang}, title = {Reconstructing Synchronous Scrambler With Robust Detection Capability in the Presence of Noise}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {10}, number = {2}, pages = {397--408}, year = {2015}, url = {https://doi.org/10.1109/TIFS.2014.2378143}, doi = {10.1109/TIFS.2014.2378143}, timestamp = {Fri, 08 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/MaZW15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/MaioranaHC15, author = {Emanuele Maiorana and Gabriel Emile Hine and Patrizio Campisi}, title = {Hill-Climbing Attacks on Multibiometrics Recognition Systems}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {10}, number = {5}, pages = {900--915}, year = {2015}, url = {https://doi.org/10.1109/TIFS.2014.2384735}, doi = {10.1109/TIFS.2014.2384735}, timestamp = {Thu, 06 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/MaioranaHC15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/MaityA15, author = {Sayan Maity and Mohamed Abdel{-}Mottaleb}, title = {3D Ear Segmentation and Classification Through Indexing}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {10}, number = {2}, pages = {423--435}, year = {2015}, url = {https://doi.org/10.1109/TIFS.2014.2379437}, doi = {10.1109/TIFS.2014.2379437}, timestamp = {Fri, 09 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/MaityA15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/MartinKMH15, author = {Honorio Mart{\'{\i}}n and Thomas Korak and Enrique San Mill{\'{a}}n and Michael Hutter}, title = {Fault Attacks on STRNGs: Impact of Glitches, Temperature, and Underpowering on Randomness}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {10}, number = {2}, pages = {266--277}, year = {2015}, url = {https://doi.org/10.1109/TIFS.2014.2374072}, doi = {10.1109/TIFS.2014.2374072}, timestamp = {Thu, 06 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/MartinKMH15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/MasoumiR15, author = {Massoud Masoumi and Mohammad Hadi Rezayati}, title = {Novel Approach to Protect Advanced Encryption Standard Algorithm Implementation Against Differential Electromagnetic and Power Analysis}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {10}, number = {2}, pages = {256--265}, year = {2015}, url = {https://doi.org/10.1109/TIFS.2014.2371237}, doi = {10.1109/TIFS.2014.2371237}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/MasoumiR15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/MenottiCPSPFR15, author = {David Menotti and Giovani Chiachia and Allan da Silva Pinto and William Robson Schwartz and H{\'{e}}lio Pedrini and Alexandre Xavier Falc{\~{a}}o and Anderson Rocha}, title = {Deep Representations for Iris, Face, and Fingerprint Spoofing Detection}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {10}, number = {4}, pages = {864--879}, year = {2015}, url = {https://doi.org/10.1109/TIFS.2015.2398817}, doi = {10.1109/TIFS.2015.2398817}, timestamp = {Sat, 09 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/MenottiCPSPFR15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/MiaoXWB15, author = {Fuyou Miao and Yan Xiong and Xingfu Wang and Moaman Badawy}, title = {Randomized Component and Its Application to (t, m, n)-Group Oriented Secret Sharing}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {10}, number = {5}, pages = {889--899}, year = {2015}, url = {https://doi.org/10.1109/TIFS.2014.2384393}, doi = {10.1109/TIFS.2014.2384393}, timestamp = {Thu, 06 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/MiaoXWB15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/MoeiniM15, author = {Ali Moeini and Hossein Moeini}, title = {Real-World and Rapid Face Recognition Toward Pose and Expression Variations via Feature Library Matrix}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {10}, number = {5}, pages = {969--984}, year = {2015}, url = {https://doi.org/10.1109/TIFS.2015.2393553}, doi = {10.1109/TIFS.2015.2393553}, timestamp = {Thu, 06 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/MoeiniM15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/NaghibiSS15, author = {Farshad Naghibi and Somayeh Salimi and Mikael Skoglund}, title = {The {CEO} Problem With Secrecy Constraints}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {10}, number = {6}, pages = {1234--1249}, year = {2015}, url = {https://doi.org/10.1109/TIFS.2015.2404134}, doi = {10.1109/TIFS.2015.2404134}, timestamp = {Thu, 06 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/NaghibiSS15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/NavalLRGC15, author = {Smita Naval and Vijay Laxmi and Muttukrishnan Rajarajan and Manoj Singh Gaur and Mauro Conti}, title = {Employing Program Semantics for Malware Detection}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {10}, number = {12}, pages = {2591--2604}, year = {2015}, url = {https://doi.org/10.1109/TIFS.2015.2469253}, doi = {10.1109/TIFS.2015.2469253}, timestamp = {Sun, 12 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tifs/NavalLRGC15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/NguyenC15, author = {Huu{-}Tuan Nguyen and Alice Caplier}, title = {Local Patterns of Gradients for Face Recognition}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {10}, number = {8}, pages = {1739--1751}, year = {2015}, url = {https://doi.org/10.1109/TIFS.2015.2426144}, doi = {10.1109/TIFS.2015.2426144}, timestamp = {Thu, 06 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/NguyenC15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/NingDCWL15, author = {Jianting Ning and Xiaolei Dong and Zhenfu Cao and Lifei Wei and Xiaodong Lin}, title = {White-Box Traceable Ciphertext-Policy Attribute-Based Encryption Supporting Flexible Attributes}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {10}, number = {6}, pages = {1274--1288}, year = {2015}, url = {https://doi.org/10.1109/TIFS.2015.2405905}, doi = {10.1109/TIFS.2015.2405905}, timestamp = {Thu, 23 Jun 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/NingDCWL15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/NurhudatianaK15, author = {Arfika Nurhudatiana and Adams Wai{-}Kin Kong}, title = {On Criminal Identification in Color Skin Images Using Skin Marks {(RPPVSM)} and Fusion With Inferred Vein Patterns}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {10}, number = {5}, pages = {916--931}, year = {2015}, url = {https://doi.org/10.1109/TIFS.2014.2387575}, doi = {10.1109/TIFS.2014.2387575}, timestamp = {Thu, 06 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/NurhudatianaK15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/OdeluDG15, author = {Vanga Odelu and Ashok Kumar Das and Adrijit Goswami}, title = {A Secure Biometrics-Based Multi-Server Authentication Protocol Using Smart Cards}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {10}, number = {9}, pages = {1953--1966}, year = {2015}, url = {https://doi.org/10.1109/TIFS.2015.2439964}, doi = {10.1109/TIFS.2015.2439964}, timestamp = {Thu, 06 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/OdeluDG15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/OdinakaOSR15, author = {Ikenna Odinaka and Joseph A. O'Sullivan and Erik J. Sirevaag and John W. Rohrbaugh}, title = {Cardiovascular Biometrics: Combining Mechanical and Electrical Signals}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {10}, number = {1}, pages = {16--27}, year = {2015}, url = {https://doi.org/10.1109/TIFS.2014.2361261}, doi = {10.1109/TIFS.2014.2361261}, timestamp = {Thu, 06 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/OdinakaOSR15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/OthmanD15, author = {Nadia Othman and Bernadette Dorizzi}, title = {Impact of Quality-Based Fusion Techniques for Video-Based Iris Recognition at a Distance}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {10}, number = {8}, pages = {1590--1602}, year = {2015}, url = {https://doi.org/10.1109/TIFS.2015.2421314}, doi = {10.1109/TIFS.2015.2421314}, timestamp = {Thu, 06 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/OthmanD15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/ParkLL15, author = {Seunghwan Park and Kwangsu Lee and Dong Hoon Lee}, title = {New Constructions of Revocable Identity-Based Encryption From Multilinear Maps}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {10}, number = {8}, pages = {1564--1577}, year = {2015}, url = {https://doi.org/10.1109/TIFS.2015.2419180}, doi = {10.1109/TIFS.2015.2419180}, timestamp = {Thu, 06 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/ParkLL15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/ParsaeefardL15, author = {Saeedeh Parsaeefard and Tho Le{-}Ngoc}, title = {Improving Wireless Secrecy Rate via Full-Duplex Relay-Assisted Protocols}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {10}, number = {10}, pages = {2095--2107}, year = {2015}, url = {https://doi.org/10.1109/TIFS.2015.2446436}, doi = {10.1109/TIFS.2015.2446436}, timestamp = {Thu, 06 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/ParsaeefardL15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/PayerHGBF15, author = {Mathias Payer and Ling Huang and Neil Zhenqiang Gong and Kevin Borgolte and Mario Frank}, title = {What You Submit Is Who You Are: {A} Multimodal Approach for Deanonymizing Scientific Publications}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {10}, number = {1}, pages = {200--212}, year = {2015}, url = {https://doi.org/10.1109/TIFS.2014.2368355}, doi = {10.1109/TIFS.2014.2368355}, timestamp = {Mon, 29 Mar 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/PayerHGBF15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/PintoSPR15, author = {Allan da Silva Pinto and William Robson Schwartz and H{\'{e}}lio Pedrini and Anderson de Rezende Rocha}, title = {Using Visual Rhythms for Detecting Video-Based Facial Spoof Attacks}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {10}, number = {5}, pages = {1025--1038}, year = {2015}, url = {https://doi.org/10.1109/TIFS.2015.2395139}, doi = {10.1109/TIFS.2015.2395139}, timestamp = {Sat, 09 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/PintoSPR15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/PohC15, author = {Norman Poh and Chi{-}Ho Chan}, title = {Generalizing {DET} Curves Across Application Scenarios}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {10}, number = {10}, pages = {2171--2181}, year = {2015}, url = {https://doi.org/10.1109/TIFS.2015.2434320}, doi = {10.1109/TIFS.2015.2434320}, timestamp = {Thu, 06 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/PohC15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/PolakG15, author = {Adam C. Polak and Dennis L. Goeckel}, title = {Wireless Device Identification Based on {RF} Oscillator Imperfections}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {10}, number = {12}, pages = {2492--2501}, year = {2015}, url = {https://doi.org/10.1109/TIFS.2015.2464778}, doi = {10.1109/TIFS.2015.2464778}, timestamp = {Thu, 06 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/PolakG15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/Proenca15, author = {Hugo Proen{\c{c}}a}, title = {Iris Recognition: What Is Beyond Bit Fragility?}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {10}, number = {2}, pages = {321--332}, year = {2015}, url = {https://doi.org/10.1109/TIFS.2014.2371691}, doi = {10.1109/TIFS.2014.2371691}, timestamp = {Fri, 23 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/Proenca15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/PunYB15, author = {Chi{-}Man Pun and Xiaochen Yuan and Xiu{-}Li Bi}, title = {Image Forgery Detection Using Adaptive Oversegmentation and Feature Point Matching}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {10}, number = {8}, pages = {1705--1716}, year = {2015}, url = {https://doi.org/10.1109/TIFS.2015.2423261}, doi = {10.1109/TIFS.2015.2423261}, timestamp = {Thu, 06 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/PunYB15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/QinDLM15, author = {Baodong Qin and Robert H. Deng and Shengli Liu and Siqi Ma}, title = {Attribute-Based Encryption With Efficient Verifiable Outsourced Decryption}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {10}, number = {7}, pages = {1384--1393}, year = {2015}, url = {https://doi.org/10.1109/TIFS.2015.2410137}, doi = {10.1109/TIFS.2015.2410137}, timestamp = {Fri, 17 Jun 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/QinDLM15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/RaghavendraB15, author = {Ramachandra Raghavendra and Christoph Busch}, title = {Robust Scheme for Iris Presentation Attack Detection Using Multiscale Binarized Statistical Image Features}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {10}, number = {4}, pages = {703--715}, year = {2015}, url = {https://doi.org/10.1109/TIFS.2015.2400393}, doi = {10.1109/TIFS.2015.2400393}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/RaghavendraB15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/RajaRB15, author = {Kiran B. Raja and Ramachandra Raghavendra and Christoph Busch}, title = {Video Presentation Attack Detection in Visible Spectrum Iris Recognition Using Magnified Phase Information}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {10}, number = {10}, pages = {2048--2056}, year = {2015}, url = {https://doi.org/10.1109/TIFS.2015.2440188}, doi = {10.1109/TIFS.2015.2440188}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/RajaRB15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/RattaniSR15, author = {Ajita Rattani and Walter J. Scheirer and Arun Ross}, title = {Open Set Fingerprint Spoof Detection Across Novel Fabrication Materials}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {10}, number = {11}, pages = {2447--2460}, year = {2015}, url = {https://doi.org/10.1109/TIFS.2015.2464772}, doi = {10.1109/TIFS.2015.2464772}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/RattaniSR15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/ReisingTJ15, author = {Donald R. Reising and Michael A. Temple and Julie Ann Jackson}, title = {Authorized and Rogue Device Discrimination Using Dimensionally Reduced {RF-DNA} Fingerprints}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {10}, number = {6}, pages = {1180--1192}, year = {2015}, url = {https://doi.org/10.1109/TIFS.2015.2400426}, doi = {10.1109/TIFS.2015.2400426}, timestamp = {Thu, 06 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/ReisingTJ15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/RenCTW15, author = {Yanzhen Ren and Tingting Cai and Ming Tang and Lina Wang}, title = {{AMR} Steganalysis Based on the Probability of Same Pulse Position}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {10}, number = {9}, pages = {1801--1811}, year = {2015}, url = {https://doi.org/10.1109/TIFS.2015.2421322}, doi = {10.1109/TIFS.2015.2421322}, timestamp = {Fri, 15 Dec 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tifs/RenCTW15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/RezvaniSIBJ15, author = {Mohsen Rezvani and Verica Sekulic and Aleksandar Ignjatovic and Elisa Bertino and Sanjay K. Jha}, title = {Interdependent Security Risk Analysis of Hosts and Flows}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {10}, number = {11}, pages = {2325--2339}, year = {2015}, url = {https://doi.org/10.1109/TIFS.2015.2455414}, doi = {10.1109/TIFS.2015.2455414}, timestamp = {Thu, 06 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/RezvaniSIBJ15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/RichterSEJ15, author = {Johannes Richter and Christian Scheunert and Sabrina Engelmann and Eduard A. Jorswieck}, title = {Weak Secrecy in the Multiway Untrusted Relay Channel With Compute-and-Forward}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {10}, number = {6}, pages = {1262--1273}, year = {2015}, url = {https://doi.org/10.1109/TIFS.2015.2405903}, doi = {10.1109/TIFS.2015.2405903}, timestamp = {Thu, 06 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/RichterSEJ15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/RothLRM15, author = {Joseph Roth and Xiaoming Liu and Arun Ross and Dimitris N. Metaxas}, title = {Investigating the Discriminative Power of Keystroke Sound}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {10}, number = {2}, pages = {333--345}, year = {2015}, url = {https://doi.org/10.1109/TIFS.2014.2374424}, doi = {10.1109/TIFS.2014.2374424}, timestamp = {Thu, 06 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/RothLRM15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/SanchezSHNER15, author = {Jon S{\'{a}}nchez and Ibon Saratxaga and Inma Hern{\'{a}}ez and Eva Navas and Daniel Erro and Tuomo Raitio}, title = {Toward a Universal Synthetic Speech Spoofing Detection Using Phase Information}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {10}, number = {4}, pages = {810--820}, year = {2015}, url = {https://doi.org/10.1109/TIFS.2015.2398812}, doi = {10.1109/TIFS.2015.2398812}, timestamp = {Thu, 06 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/SanchezSHNER15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/ScanlonG15, author = {Jacob R. Scanlon and Matthew S. Gerber}, title = {Forecasting Violent Extremist Cyber Recruitment}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {10}, number = {11}, pages = {2461--2470}, year = {2015}, url = {https://doi.org/10.1109/TIFS.2015.2464775}, doi = {10.1109/TIFS.2015.2464775}, timestamp = {Thu, 06 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/ScanlonG15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/SenguptaTC15, author = {Avik Sengupta and Ravi Tandon and T. Charles Clancy}, title = {Fundamental Limits of Caching With Secure Delivery}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {10}, number = {2}, pages = {355--370}, year = {2015}, url = {https://doi.org/10.1109/TIFS.2014.2375553}, doi = {10.1109/TIFS.2014.2375553}, timestamp = {Thu, 06 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/SenguptaTC15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/SeoWSB15, author = {Seung{-}Hyun Seo and Jongho Won and Salmin Sultana and Elisa Bertino}, title = {Effective Key Management in Dynamic Wireless Sensor Networks}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {10}, number = {2}, pages = {371--383}, year = {2015}, url = {https://doi.org/10.1109/TIFS.2014.2375555}, doi = {10.1109/TIFS.2014.2375555}, timestamp = {Mon, 26 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/SeoWSB15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/SgroiFBP15, author = {Amanda Sgroi and Patrick J. Flynn and Kevin W. Bowyer and P. Jonathon Phillips}, title = {Strong, Neutral, or Weak: Exploring the Impostor Score Distribution}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {10}, number = {6}, pages = {1207--1220}, year = {2015}, url = {https://doi.org/10.1109/TIFS.2015.2403136}, doi = {10.1109/TIFS.2015.2403136}, timestamp = {Thu, 06 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/SgroiFBP15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/SharanM15, author = {Roneel V. Sharan and Tom J. Moir}, title = {Subband Time-Frequency Image Texture Features for Robust Audio Surveillance}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {10}, number = {12}, pages = {2605--2615}, year = {2015}, url = {https://doi.org/10.1109/TIFS.2015.2469254}, doi = {10.1109/TIFS.2015.2469254}, timestamp = {Thu, 06 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/SharanM15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/ShinWG15, author = {Seungwon Shin and Haopei Wang and Guofei Gu}, title = {A First Step Toward Network Security Virtualization: From Concept To Prototype}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {10}, number = {10}, pages = {2236--2249}, year = {2015}, url = {https://doi.org/10.1109/TIFS.2015.2453936}, doi = {10.1109/TIFS.2015.2453936}, timestamp = {Thu, 06 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/ShinWG15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/ShresthaM0LS15, author = {Babins Shrestha and Di Ma and Yan Zhu and Haoyu Li and Nitesh Saxena}, title = {Tap-Wave-Rub: Lightweight Human Interaction Approach to Curb Emerging Smartphone Malware}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {10}, number = {11}, pages = {2270--2283}, year = {2015}, url = {https://doi.org/10.1109/TIFS.2015.2436364}, doi = {10.1109/TIFS.2015.2436364}, timestamp = {Wed, 07 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tifs/ShresthaM0LS15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/ShuYB15, author = {Xiaokui Shu and Danfeng Yao and Elisa Bertino}, title = {Privacy-Preserving Detection of Sensitive Data Exposure}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {10}, number = {5}, pages = {1092--1103}, year = {2015}, url = {https://doi.org/10.1109/TIFS.2015.2398363}, doi = {10.1109/TIFS.2015.2398363}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/ShuYB15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/SizovKKWM15, author = {Aleksandr Sizov and Elie Khoury and Tomi Kinnunen and Zhizheng Wu and S{\'{e}}bastien Marcel}, title = {Joint Speaker Verification and Antispoofing in the i-Vector Space}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {10}, number = {4}, pages = {821--832}, year = {2015}, url = {https://doi.org/10.1109/TIFS.2015.2407362}, doi = {10.1109/TIFS.2015.2407362}, timestamp = {Sat, 18 Feb 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tifs/SizovKKWM15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/Skoric15, author = {Boris Skoric}, title = {Tally-Based Simple Decoders for Traitor Tracing and Group Testing}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {10}, number = {6}, pages = {1221--1233}, year = {2015}, url = {https://doi.org/10.1109/TIFS.2015.2403575}, doi = {10.1109/TIFS.2015.2403575}, timestamp = {Thu, 06 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/Skoric15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/SmerekaBK15, author = {Jonathon M. Smereka and Vishnu Naresh Boddeti and B. V. K. Vijaya Kumar}, title = {Probabilistic Deformation Models for Challenging Periocular Image Verification}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {10}, number = {9}, pages = {1875--1890}, year = {2015}, url = {https://doi.org/10.1109/TIFS.2015.2434271}, doi = {10.1109/TIFS.2015.2434271}, timestamp = {Tue, 21 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tifs/SmerekaBK15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/SmithWL15, author = {Daniel F. Smith and Arnold Wiliem and Brian C. Lovell}, title = {Face Recognition on Consumer Devices: Reflections on Replay Attacks}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {10}, number = {4}, pages = {736--745}, year = {2015}, url = {https://doi.org/10.1109/TIFS.2015.2398819}, doi = {10.1109/TIFS.2015.2398819}, timestamp = {Thu, 06 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/SmithWL15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/SoneeH15, author = {Amir Sonee and Ghosheh Abed Hodtani}, title = {On the Secrecy Rate Region of Multiple-Access Wiretap Channel With Noncausal Side Information}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {10}, number = {6}, pages = {1151--1166}, year = {2015}, url = {https://doi.org/10.1109/TIFS.2015.2400416}, doi = {10.1109/TIFS.2015.2400416}, timestamp = {Thu, 06 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/SoneeH15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/SunSWJ15, author = {He Sun and Kun Sun and Yuewu Wang and Jiwu Jing}, title = {Reliable and Trustworthy Memory Acquisition on Smartphones}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {10}, number = {12}, pages = {2547--2561}, year = {2015}, url = {https://doi.org/10.1109/TIFS.2015.2467356}, doi = {10.1109/TIFS.2015.2467356}, timestamp = {Thu, 06 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/SunSWJ15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/TahaS15, author = {Mostafa M. I. Taha and Patrick Schaumont}, title = {Key Updating for Leakage Resiliency With Application to {AES} Modes of Operation}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {10}, number = {3}, pages = {519--528}, year = {2015}, url = {https://doi.org/10.1109/TIFS.2014.2383359}, doi = {10.1109/TIFS.2014.2383359}, timestamp = {Thu, 06 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/TahaS15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/TamsMM15, author = {Benjamin Tams and Preda Mihailescu and Axel Munk}, title = {Security Considerations in Minutiae-Based Fuzzy Vaults}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {10}, number = {5}, pages = {985--998}, year = {2015}, url = {https://doi.org/10.1109/TIFS.2015.2392559}, doi = {10.1109/TIFS.2015.2392559}, timestamp = {Thu, 06 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/TamsMM15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/TanB15, author = {Vincent Y. F. Tan and Matthieu R. Bloch}, title = {Information Spectrum Approach to Strong Converse Theorems for Degraded Wiretap Channels}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {10}, number = {9}, pages = {1891--1904}, year = {2015}, url = {https://doi.org/10.1109/TIFS.2015.2434592}, doi = {10.1109/TIFS.2015.2434592}, timestamp = {Thu, 06 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/TanB15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/Tatli15, author = {Emin Islam Tatli}, title = {Cracking More Password Hashes With Patterns}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {10}, number = {8}, pages = {1656--1665}, year = {2015}, url = {https://doi.org/10.1109/TIFS.2015.2422259}, doi = {10.1109/TIFS.2015.2422259}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/Tatli15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/ThongkamwitoonM15, author = {Thirapiroon Thongkamwitoon and Hani Muammar and Pier Luigi Dragotti}, title = {An Image Recapture Detection Algorithm Based on Learning Dictionaries of Edge Profiles}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {10}, number = {5}, pages = {953--968}, year = {2015}, url = {https://doi.org/10.1109/TIFS.2015.2392566}, doi = {10.1109/TIFS.2015.2392566}, timestamp = {Thu, 06 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/ThongkamwitoonM15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/TirunagariPWISH15, author = {Santosh Tirunagari and Norman Poh and David Windridge and Aamo Iorliam and Nik Suki and Anthony T. S. Ho}, title = {Detection of Face Spoofing Using Visual Dynamics}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {10}, number = {4}, pages = {762--777}, year = {2015}, url = {https://doi.org/10.1109/TIFS.2015.2406533}, doi = {10.1109/TIFS.2015.2406533}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/TirunagariPWISH15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/TomasinD15, author = {Stefano Tomasin and Alberto Dall'Arche}, title = {Resource Allocation for Secret Key Agreement Over Parallel Channels With Full and Partial Eavesdropper {CSI}}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {10}, number = {11}, pages = {2314--2324}, year = {2015}, url = {https://doi.org/10.1109/TIFS.2015.2455412}, doi = {10.1109/TIFS.2015.2455412}, timestamp = {Thu, 06 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/TomasinD15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/UzunS15, author = {Erkam Uzun and Husrev Taha Sencar}, title = {Carving Orphaned {JPEG} File Fragments}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {10}, number = {8}, pages = {1549--1563}, year = {2015}, url = {https://doi.org/10.1109/TIFS.2015.2416685}, doi = {10.1109/TIFS.2015.2416685}, timestamp = {Thu, 06 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/UzunS15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/Veugen15, author = {Thijs Veugen}, title = {Linear Round Bit-Decomposition of Secret-Shared Values}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {10}, number = {3}, pages = {498--506}, year = {2015}, url = {https://doi.org/10.1109/TIFS.2014.2373811}, doi = {10.1109/TIFS.2014.2373811}, timestamp = {Thu, 06 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/Veugen15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/VeugenHCM15, author = {Thijs Veugen and Robbert de Haan and Ronald Cramer and Frank Muller}, title = {A Framework for Secure Computations With Two Non-Colluding Servers and Multiple Clients, Applied to Recommendations}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {10}, number = {3}, pages = {445--457}, year = {2015}, url = {https://doi.org/10.1109/TIFS.2014.2370255}, doi = {10.1109/TIFS.2014.2370255}, timestamp = {Thu, 06 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/VeugenHCM15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/VoloshynovskiyH15, author = {Slava Voloshynovskiy and Taras Holotyak and Fokko Beekhof}, title = {Soft Content Fingerprinting With Bit Polarization Based on Sign-Magnitude Decomposition}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {10}, number = {10}, pages = {2033--2047}, year = {2015}, url = {https://doi.org/10.1109/TIFS.2015.2432744}, doi = {10.1109/TIFS.2015.2432744}, timestamp = {Fri, 22 Mar 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tifs/VoloshynovskiyH15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/WangKDEP15, author = {Lifeng Wang and Kyeong Jin Kim and Trung Quang Duong and Maged Elkashlan and H. Vincent Poor}, title = {Security Enhancement of Cooperative Single Carrier Systems}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {10}, number = {1}, pages = {90--103}, year = {2015}, url = {https://doi.org/10.1109/TIFS.2014.2360437}, doi = {10.1109/TIFS.2014.2360437}, timestamp = {Thu, 23 Jun 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/WangKDEP15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/WangPZZLX15, author = {Xiaofeng Wang and Kemu Pang and Xiaorui Zhou and Yang Zhou and Lu Li and Jianru Xue}, title = {A Visual Model-Based Perceptual Image Hash for Content Authentication}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {10}, number = {7}, pages = {1336--1349}, year = {2015}, url = {https://doi.org/10.1109/TIFS.2015.2407698}, doi = {10.1109/TIFS.2015.2407698}, timestamp = {Thu, 06 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/WangPZZLX15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/WangQWXD15, author = {Huaqun Wang and Bo Qin and Qianhong Wu and Li Xu and Josep Domingo{-}Ferrer}, title = {{TPP:} Traceable Privacy-Preserving Communication and Precise Reward for Vehicle-to-Grid Networks in Smart Grids}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {10}, number = {11}, pages = {2340--2351}, year = {2015}, url = {https://doi.org/10.1109/TIFS.2015.2455513}, doi = {10.1109/TIFS.2015.2455513}, timestamp = {Wed, 03 May 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/WangQWXD15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/WangWCY15, author = {Yi Wang and Lipeng Wang and Yiu{-}ming Cheung and Pong C. Yuen}, title = {Learning Compact Binary Codes for Hash-Based Fingerprint Indexing}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {10}, number = {8}, pages = {1603--1616}, year = {2015}, url = {https://doi.org/10.1109/TIFS.2015.2421332}, doi = {10.1109/TIFS.2015.2421332}, timestamp = {Sat, 05 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/WangWCY15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/WattanachoteSCC15, author = {Kanoksak Wattanachote and Timothy K. Shih and Wen{-}Lung Chang and Hon{-}Hang Chang}, title = {Tamper Detection of {JPEG} Image Due to Seam Modifications}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {10}, number = {12}, pages = {2477--2491}, year = {2015}, url = {https://doi.org/10.1109/TIFS.2015.2464776}, doi = {10.1109/TIFS.2015.2464776}, timestamp = {Thu, 06 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/WattanachoteSCC15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/Weaver15, author = {Rhiannon Weaver}, title = {Visualizing and Modeling the Scanning Behavior of the Conficker Botnet in the Presence of User and Network Activity}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {10}, number = {5}, pages = {1039--1051}, year = {2015}, url = {https://doi.org/10.1109/TIFS.2015.2396478}, doi = {10.1109/TIFS.2015.2396478}, timestamp = {Sun, 01 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/Weaver15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/WenHJ15, author = {Di Wen and Hu Han and Anil K. Jain}, title = {Face Spoof Detection With Image Distortion Analysis}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {10}, number = {4}, pages = {746--761}, year = {2015}, url = {https://doi.org/10.1109/TIFS.2015.2400395}, doi = {10.1109/TIFS.2015.2400395}, timestamp = {Fri, 01 Mar 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tifs/WenHJ15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/WenLGZ15, author = {Lingyun Wen and Xin Li and Guodong Guo and Yu Zhu}, title = {Automated Depression Diagnosis Based on Facial Dynamic Analysis and Sparse Coding}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {10}, number = {7}, pages = {1432--1441}, year = {2015}, url = {https://doi.org/10.1109/TIFS.2015.2414392}, doi = {10.1109/TIFS.2015.2414392}, timestamp = {Thu, 06 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/WenLGZ15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/WengAMM15, author = {Li Weng and Laurent Amsaleg and April Morton and St{\'{e}}phane Marchand{-}Maillet}, title = {A Privacy-Preserving Framework for Large-Scale Content-Based Information Retrieval}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {10}, number = {1}, pages = {152--167}, year = {2015}, url = {https://doi.org/10.1109/TIFS.2014.2365998}, doi = {10.1109/TIFS.2014.2365998}, timestamp = {Thu, 06 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/WengAMM15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/WuZBD15, author = {Yongdong Wu and Zhigang Zhao and Feng Bao and Robert H. Deng}, title = {Software Puzzle: {A} Countermeasure to Resource-Inflated Denial-of-Service Attacks}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {10}, number = {1}, pages = {168--177}, year = {2015}, url = {https://doi.org/10.1109/TIFS.2014.2366293}, doi = {10.1109/TIFS.2014.2366293}, timestamp = {Thu, 06 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/WuZBD15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/XiongLLG15, author = {Qi Xiong and Ying{-}Chang Liang and Kwok Hung Li and Yi Gong}, title = {An Energy-Ratio-Based Approach for Detecting Pilot Spoofing Attack in Multiple-Antenna Systems}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {10}, number = {5}, pages = {932--940}, year = {2015}, url = {https://doi.org/10.1109/TIFS.2015.2392564}, doi = {10.1109/TIFS.2015.2392564}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tifs/XiongLLG15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/XiongLZT15, author = {Tao Xiong and Wei Lou and Jie Zhang and Hailun Tan}, title = {{MIO:} Enhancing Wireless Communications Security Through Physical Layer Multiple Inter-Symbol Obfuscation}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {10}, number = {8}, pages = {1678--1691}, year = {2015}, url = {https://doi.org/10.1109/TIFS.2015.2422264}, doi = {10.1109/TIFS.2015.2422264}, timestamp = {Thu, 02 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tifs/XiongLZT15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/XiongQ15, author = {Hu Xiong and Zhiguang Qin}, title = {Revocable and Scalable Certificateless Remote Authentication Protocol With Anonymity for Wireless Body Area Networks}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {10}, number = {7}, pages = {1442--1455}, year = {2015}, url = {https://doi.org/10.1109/TIFS.2015.2414399}, doi = {10.1109/TIFS.2015.2414399}, timestamp = {Thu, 06 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/XiongQ15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/XiongTMXW15, author = {Jun Xiong and Yanqun Tang and Dongtang Ma and Pei Xiao and Kai{-}Kit Wong}, title = {Secrecy Performance Analysis for {TAS-MRC} System With Imperfect Feedback}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {10}, number = {8}, pages = {1617--1629}, year = {2015}, url = {https://doi.org/10.1109/TIFS.2015.2421358}, doi = {10.1109/TIFS.2015.2421358}, timestamp = {Wed, 27 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/XiongTMXW15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/XuWWSDJ15, author = {Peng Xu and Qianhong Wu and Wei Wang and Willy Susilo and Josep Domingo{-}Ferrer and Hai Jin}, title = {Generating Searchable Public-Key Ciphertexts With Hidden Structures for Fast Keyword Search}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {10}, number = {9}, pages = {1993--2006}, year = {2015}, url = {https://doi.org/10.1109/TIFS.2015.2442220}, doi = {10.1109/TIFS.2015.2442220}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tifs/XuWWSDJ15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/YangLYL15, author = {Jianwei Yang and Zhen Lei and Dong Yi and Stan Z. Li}, title = {Person-Specific Face Antispoofing With Subject Domain Adaptation}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {10}, number = {4}, pages = {797--809}, year = {2015}, url = {https://doi.org/10.1109/TIFS.2015.2403306}, doi = {10.1109/TIFS.2015.2403306}, timestamp = {Tue, 12 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/YangLYL15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/YaoBV15, author = {Guang Yao and Jun Bi and Athanasios V. Vasilakos}, title = {Passive {IP} Traceback: Disclosing the Locations of {IP} Spoofers From Path Backscatter}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {10}, number = {3}, pages = {471--484}, year = {2015}, url = {https://doi.org/10.1109/TIFS.2014.2381873}, doi = {10.1109/TIFS.2014.2381873}, timestamp = {Fri, 09 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/YaoBV15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/YuM15, author = {Honghai Yu and Pierre Moulin}, title = {{SNR} Maximization Hashing}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {10}, number = {9}, pages = {1927--1938}, year = {2015}, url = {https://doi.org/10.1109/TIFS.2015.2436871}, doi = {10.1109/TIFS.2015.2436871}, timestamp = {Thu, 06 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/YuM15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/YuRWV15, author = {Jia Yu and Kui Ren and Cong Wang and Vijay Varadharajan}, title = {Enabling Cloud Storage Auditing With Key-Exposure Resistance}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {10}, number = {6}, pages = {1167--1179}, year = {2015}, url = {https://doi.org/10.1109/TIFS.2015.2400425}, doi = {10.1109/TIFS.2015.2400425}, timestamp = {Thu, 06 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/YuRWV15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/YuanY15, author = {Jiawei Yuan and Shucheng Yu}, title = {Public Integrity Auditing for Dynamic Data Sharing With Multiuser Modification}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {10}, number = {8}, pages = {1717--1726}, year = {2015}, url = {https://doi.org/10.1109/TIFS.2015.2423264}, doi = {10.1109/TIFS.2015.2423264}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/YuanY15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/YunL015, author = {Xiao{-}chun Yun and Shuhao Li and Yongzheng Zhang}, title = {{SMS} Worm Propagation Over Contact Social Networks: Modeling and Validation}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {10}, number = {11}, pages = {2365--2380}, year = {2015}, url = {https://doi.org/10.1109/TIFS.2015.2455413}, doi = {10.1109/TIFS.2015.2455413}, timestamp = {Thu, 06 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/YunL015.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/Zancajo-Blazquez15, author = {Sandra Zancajo{-}Blazquez and Susana Lag{\"{u}}ela{-}Lopez and Diego Gonz{\'{a}}lez{-}Aguilera and Joaquin Martinez{-}Sanchez}, title = {Segmentation of Indoor Mapping Point Clouds Applied to Crime Scenes Reconstruction}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {10}, number = {7}, pages = {1350--1358}, year = {2015}, url = {https://doi.org/10.1109/TIFS.2015.2407699}, doi = {10.1109/TIFS.2015.2407699}, timestamp = {Mon, 03 Jan 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tifs/Zancajo-Blazquez15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/ZhaiAEHHGM15, author = {Xiaojun Zhai and Kofi Appiah and Shoaib Ehsan and W. Gareth J. Howells and Huosheng Hu and Dongbing Gu and Klaus D. McDonald{-}Maier}, title = {A Method for Detecting Abnormal Program Behavior on Embedded Devices}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {10}, number = {8}, pages = {1692--1704}, year = {2015}, url = {https://doi.org/10.1109/TIFS.2015.2422674}, doi = {10.1109/TIFS.2015.2422674}, timestamp = {Thu, 06 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/ZhaiAEHHGM15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/ZhanXX15, author = {Zhenxin Zhan and Maochao Xu and Shouhuai Xu}, title = {Predicting Cyber Attack Rates With Extreme Values}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {10}, number = {8}, pages = {1666--1677}, year = {2015}, url = {https://doi.org/10.1109/TIFS.2015.2422261}, doi = {10.1109/TIFS.2015.2422261}, timestamp = {Thu, 06 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/ZhanXX15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/ZhangFCKR15, author = {Le Zhang and Xuanyao Fong and Chip{-}Hong Chang and Zhi{-}Hui Kong and Kaushik Roy}, title = {Highly Reliable Spin-Transfer Torque Magnetic RAM-Based Physical Unclonable Function With Multi-Response-Bits Per Cell}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {10}, number = {8}, pages = {1630--1642}, year = {2015}, url = {https://doi.org/10.1109/TIFS.2015.2421481}, doi = {10.1109/TIFS.2015.2421481}, timestamp = {Thu, 06 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/ZhangFCKR15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/ZhangLLQ15, author = {Jiliang Zhang and Yaping Lin and Yongqiang Lyu and Gang Qu}, title = {A {PUF-FSM} Binding Scheme for {FPGA} {IP} Protection and Pay-Per-Device Licensing}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {10}, number = {6}, pages = {1137--1150}, year = {2015}, url = {https://doi.org/10.1109/TIFS.2015.2400413}, doi = {10.1109/TIFS.2015.2400413}, timestamp = {Wed, 07 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tifs/ZhangLLQ15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/ZhangWDQD15, author = {Lei Zhang and Qianhong Wu and Josep Domingo{-}Ferrer and Bo Qin and Zheming Dong}, title = {Round-Efficient and Sender-Unrestricted Dynamic Group Key Agreement Protocol for Secure Group Communications}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {10}, number = {11}, pages = {2352--2364}, year = {2015}, url = {https://doi.org/10.1109/TIFS.2015.2447933}, doi = {10.1109/TIFS.2015.2447933}, timestamp = {Mon, 03 Jan 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tifs/ZhangWDQD15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/ZhaoZYL015, author = {Pu Zhao and Meng Zhang and Hui Yu and Hanwen Luo and Wen Chen}, title = {Robust Beamforming Design for Sum Secrecy Rate Optimization in {MU-MISO} Networks}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {10}, number = {9}, pages = {1812--1823}, year = {2015}, url = {https://doi.org/10.1109/TIFS.2015.2423263}, doi = {10.1109/TIFS.2015.2423263}, timestamp = {Fri, 29 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/ZhaoZYL015.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/ZhouDCV15, author = {Jun Zhou and Xiaolei Dong and Zhenfu Cao and Athanasios V. Vasilakos}, title = {Secure and privacy preserving protocol for cloud-based vehicular DTNs}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {10}, number = {6}, pages = {1299--1314}, year = {2015}, url = {https://doi.org/10.1109/TIFS.2015.2407326}, doi = {10.1109/TIFS.2015.2407326}, timestamp = {Thu, 23 Jun 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/ZhouDCV15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/ZhouJIZZT15, author = {Peng Zhou and Siwei Jiang and Athirai Aravazhi Irissappane and Jie Zhang and Jianying Zhou and Joseph Chee Ming Teo}, title = {Toward Energy-Efficient Trust System Through Watchdog Optimization for WSNs}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {10}, number = {3}, pages = {613--625}, year = {2015}, url = {https://doi.org/10.1109/TIFS.2015.2389145}, doi = {10.1109/TIFS.2015.2389145}, timestamp = {Sun, 30 Apr 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/ZhouJIZZT15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/ZhouVH15, author = {Lan Zhou and Vijay Varadharajan and Michael Hitchens}, title = {Trust Enhanced Cryptographic Role-Based Access Control for Secure Cloud Data Storage}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {10}, number = {11}, pages = {2381--2395}, year = {2015}, url = {https://doi.org/10.1109/TIFS.2015.2455952}, doi = {10.1109/TIFS.2015.2455952}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/ZhouVH15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/ZhuNLY15, author = {Chunsheng Zhu and Hasen Nicanfar and Victor C. M. Leung and Laurence T. Yang}, title = {An Authenticated Trust and Reputation Calculation and Management System for Cloud and Sensor Networks Integration}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {10}, number = {1}, pages = {118--131}, year = {2015}, url = {https://doi.org/10.1109/TIFS.2014.2364679}, doi = {10.1109/TIFS.2014.2364679}, timestamp = {Thu, 06 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/ZhuNLY15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/ZhuXLZ15, author = {Tianqing Zhu and Ping Xiong and Gang Li and Wanlei Zhou}, title = {Correlated Differential Privacy: Hiding Information in Non-IID Data Set}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {10}, number = {2}, pages = {229--242}, year = {2015}, url = {https://doi.org/10.1109/TIFS.2014.2368363}, doi = {10.1109/TIFS.2014.2368363}, timestamp = {Wed, 06 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/ZhuXLZ15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/ZhuYTSH15, author = {Yihai Zhu and Jun Yan and Yufei Tang and Yan Lindsay Sun and Haibo He}, title = {Joint Substation-Transmission Line Vulnerability Assessment Against the Smart Grid}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {10}, number = {5}, pages = {1010--1024}, year = {2015}, url = {https://doi.org/10.1109/TIFS.2015.2394240}, doi = {10.1109/TIFS.2015.2394240}, timestamp = {Thu, 06 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/ZhuYTSH15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/sedenkaGGB15, author = {Jaroslav Sedenka and Sathya Govindarajan and Paolo Gasti and Kiran S. Balagani}, title = {Secure Outsourced Biometric Authentication With Performance Evaluation on Smartphones}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {10}, number = {2}, pages = {384--396}, year = {2015}, url = {https://doi.org/10.1109/TIFS.2014.2375571}, doi = {10.1109/TIFS.2014.2375571}, timestamp = {Thu, 06 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/sedenkaGGB15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
![](https://dblp.dagstuhl.de/img/cog.dark.24x24.png)
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.