


default search action
IEEE Transactions on Information Forensics and Security, Volume 12
Volume 12, Number 1, January 2017
- Anderson Rocha
, Walter J. Scheirer, Christopher W. Forstall, Thiago Cavalcante, Antonio Theophilo, Bingyu Shen, Ariadne Carvalho, Efstathios Stamatatos
:
Authorship Attribution for Social Media Forensics. 5-33 - Filippo Gandino
, Renato Ferrero
, Maurizio Rebaudengo:
A Key Distribution Scheme for Mobile Wireless Sensor Networks: q-Composite. 34-47 - Zhili Zhou
, Yunlong Wang, Q. M. Jonathan Wu
, Ching-Nung Yang, Xingming Sun:
Effective and Efficient Global Context Verification for Image Copy Detection. 48-63 - Arunkumar Vijayakumar
, Vinay C. Patil
, Daniel E. Holcomb, Christof Paar, Sandip Kundu:
Physical Design Obfuscation of Hardware: A Comprehensive Investigation of Device and Logic-Level Techniques. 64-77 - Hao Yan, Jiguo Li
, Jinguang Han
, Yichen Zhang:
A Novel Efficient Remote Data Possession Checking Protocol in Cloud Storage. 78-88 - Adi Hajj-Ahmad
, Séverine Baudry, Bertrand Chupeau, Gwenaël J. Doërr
, Min Wu
:
Flicker Forensics for Camcorder Piracy. 89-100 - Miao Xie, Jiankun Hu
, Song Guo
, Albert Y. Zomaya
:
Distributed Segment-Based Anomaly Detection With Kullback-Leibler Divergence in Wireless Sensor Networks. 101-110 - Wuqiong Pan
, Fangyu Zheng, Yuan Zhao, Wen Tao Zhu
, Jiwu Jing:
An Efficient Elliptic Curve Cryptography Signature Server With GPU Acceleration. 111-122 - Thanh Hai Thai
, Rémi Cogranne
, Florent Retraint, Thi-Ngoc-Canh Doan:
JPEG Quantization Step Estimation and Its Applications to Digital Image Forensics. 123-133 - Neeti Pokhriyal
, Kshitij Tayal, Ifeoma Nwogu
, Venu Govindaraju:
Cognitive-Biometric Recognition From Language Usage: A Feasibility Study. 134-143 - Yubao Zhang
, Xin Ruan, Haining Wang
, Hui Wang, Su He:
Twitter Trends Manipulation: A First Look Inside the Security of Twitter Trending. 144-156 - Yang Hu
, Konstantinos Sirlantzis
, Gareth Howells:
Optimal Generation of Iris Codes for Iris Recognition. 157-171 - Tao Zhang
, Quanyan Zhu:
Dynamic Differential Privacy for ADMM-Based Distributed Classification Learning. 172-187 - Michail Tsikerdekis
:
Identity Deception Prevention Using Common Contribution Network Data. 188-199 - Jun Yan, Haibo He
, Xiangnan Zhong, Yufei Tang:
Q-Learning-Based Vulnerability Analysis of Smart Grid Against Sequential Topology Attacks. 200-210 - Muhammad R. A. Khandaker
, Kai-Kit Wong, Yangyang Zhang, Zhongbin Zheng:
Probabilistically Robust SWIPT for Secrecy MISOME Systems. 211-226 - Nima Tavangaran
, Holger Boche, Rafael F. Schaefer
:
Secret-Key Generation Using Compound Sources and One-Way Public Communication. 227-241 - Andrey Garnaev
, Wade Trappe:
Bargaining Over the Fair Trade-Off Between Secrecy and Throughput in OFDM Communications. 242-251
Volume 12, Number 2, February 2017
- Fawaz S. Al-Qahtani
, Yuzhen Huang, Salah Hessien, Redha M. Radaydeh, Caijun Zhong
, Hussein M. Alnuweiri:
Secrecy Analysis of MIMO Wiretap Channels With Low-Complexity Receivers Under Imperfect Channel Estimation. 257-270 - Lei Xu, Chunxiao Jiang
, Yi Qian, Youjian Zhao, Jianhua Li, Yong Ren:
Dynamic Privacy Pricing: A Multi-Armed Bandit Approach With Time-Variant Rewards. 271-285 - Jingyu Hua
, Zhenyu Shen, Sheng Zhong:
We Can Track You if You Take the Metro: Tracking Metro Riders Using Accelerometers on Smartphones. 286-297 - Wenwen Tu
, Mario Goldenbaum, Lifeng Lai
, H. Vincent Poor
:
On Simultaneously Generating Multiple Keys in a Joint Source-Channel Model. 298-308 - Bo Wang, Leibo Liu
, Chenchen Deng, Min Zhu, Shouyi Yin, Zhuoquan Zhou, Shaojun Wei:
Exploration of Benes Network in Cryptographic Processors: A Random Infection Countermeasure for Block Ciphers Against Fault Attacks. 309-322 - Mahdi Jafari Siavoshani
, Shaunak Mishra, Christina Fragouli, Suhas N. Diggavi:
Multi-Party Secret Key Agreement Over State-Dependent Wireless Broadcast Channels. 323-337 - Hassan Salmani
:
COTD: Reference-Free Hardware Trojan Detection and Recovery Based on Controllability and Observability in Gate-Level Netlist. 338-350 - Jinho Choi
:
On Channel-Aware Secure HARQ-IR. 351-362 - Aijiao Cui
, Yanhui Luo, Chip-Hong Chang
:
Static and Dynamic Obfuscations of Scan Data Against Scan-Based Side-Channel Attacks. 363-376 - Chi-Man Pun
, Cai-Ping Yan, Xiaochen Yuan
:
Image Alignment-Based Multi-Region Matching for Object-Level Tampering Detection. 377-391 - Ashref Lawgaly, Fouad Khelifi
:
Sensor Pattern Noise Estimation Based on Improved Locally Adaptive DCT Filtering and Weighted Averaging for Source Camera Identification and Verification. 392-404 - Xiaolong Guo, Raj Gautam Dutta, Yier Jin
:
Eliminating the Hardware-Software Boundary: A Proof-Carrying Approach for Trust Evaluation on Computer Systems. 405-417 - Mohamed Grissa
, Attila A. Yavuz
, Bechir Hamdaoui:
Preserving the Location Privacy of Secondary Users in Cooperative Spectrum Sensing. 418-431 - Da Luo, Rui Yang, Bin Li, Jiwu Huang
:
Detection of Double Compressed AMR Audio Using Stacked Autoencoder. 432-444 - Kamal Taha
, Paul D. Yoo
:
Using the Spanning Tree of a Criminal Network for Identifying Its Leaders. 445-453 - Debiao He
, Neeraj Kumar
, Kim-Kwang Raymond Choo
, Wei Wu:
Efficient Hierarchical Identity-Based Signature With Batch Verification for Automatic Dependent Surveillance-Broadcast System. 454-464 - Hong Zhang
, Yun Cao, Xianfeng Zhao
:
A Steganalytic Approach to Detect Motion Vector Modification Using Near-Perfect Estimation for Local Optimality. 465-478 - Bo Peng
, Wei Wang
, Jing Dong, Tieniu Tan:
Optimized 3D Lighting Environment Estimation for Image Forgery Detection. 479-494
Volume 12, Number 3, March 2017
- Wei Wang
, Kah Chan Teh
, Kwok Hung Li
:
Secrecy Throughput Maximization for MISO Multi-Eavesdropper Wiretap Channels. 505-515 - Ta-Yuan Liu, Shih-Chun Lin, Y.-W. Peter Hong
:
On the Role of Artificial Noise in Training and Data Transmission for Secret Communications. 516-531 - Tao Jiang, Xiaofeng Chen, Qianhong Wu, Jianfeng Ma, Willy Susilo
, Wenjing Lou:
Secure and Efficient Cloud Data Deduplication With Randomized Tag. 532-543 - Hyukmin Kwon, Aziz Mohaisen, Jiyoung Woo
, Yongdae Kim
, Eunjo Lee, Huy Kang Kim
:
Crime Scene Reconstruction: Online Gold Farming Network Analysis. 544-556 - Jun Zhao
:
On Resilience and Connectivity of Secure Wireless Sensor Networks Under Node Capture Attacks. 557-571 - Parthajit Mohapatra
, Chandra R. Murthy
, Jemin Lee:
On the Secrecy Capacity Region of the Two-User Symmetric Z Interference Channel With Unidirectional Transmitter Cooperation. 572-587 - Benedetta Tondi
, Pedro Comesaña Alfaro
, Fernando Pérez-González
, Mauro Barni:
Smart Detection of Line-Search Oracle Attacks. 588-603 - Long Cheng, Dinil Mon Divakaran
, Aloysius Wooi Kiak Ang, Wee-Yong Lim, Vrizlynn L. L. Thing:
FACT: A Framework for Authentication in Cloud-Based IP Traceback. 604-616 - Yiliang Liu
, Hsiao-Hwa Chen
, Liangmin Wang
:
Secrecy Capacity Analysis of Artificial Noisy MIMO Channels - An Approach Based on Ordered Eigenvalues of Wishart Matrices. 617-630 - Nir Nissim
, Aviad Cohen, Yuval Elovici:
ALDOCX: Detection of Unknown Malicious Microsoft Office Documents Using Designated Active Learning Methods Based on New Structural Feature Extraction Methodology. 631-646 - Yuhong Nan
, Zhemin Yang, Min Yang, Shunfan Zhou, Yuan Zhang, Guofei Gu, Xiaofeng Wang, Limin Sun:
Identifying User-Input Privacy in Mobile Applications at a Large Scale. 647-661 - Aiqing Zhang, Lei Wang, Xinrong Ye, Xiaodong Lin
:
Light-Weight and Robust Security-Aware D2D-Assist Data Transmission Protocol for Mobile-Health Systems. 662-675 - Yuan Zhang
, Chunxiang Xu, Xiaohui Liang, Hongwei Li, Yi Mu, Xiaojun Zhang:
Efficient Public Verification of Data Integrity for Cloud Storage Systems from Indistinguishability Obfuscation. 676-688 - Takao Murakami
, Atsunori Kanemura
, Hideitsu Hino
:
Group Sparsity Tensor Factorization for Re-Identification of Open Mobility Traces. 689-704 - Abhishek Sharma, Suresh Sundaram
:
A Novel Online Signature Verification System Based on GMM Features in a DTW Framework. 705-718 - Antitza Dantcheva
, François Brémond:
Gender Estimation Based on Smile-Dynamics. 719-729 - Diksha Golait, Neminath Hubballi
:
Detecting Anomalous Behavior in VoIP Systems: A Discrete Event System Modeling. 730-745 - Bin Dai
, Zheng Ma, Yuan Luo:
Finite State Markov Wiretap Channel With Delayed Feedback. 746-760
Volume 12, Number 4, April 2017
- Yong Yu
, Man Ho Au
, Giuseppe Ateniese, Xinyi Huang, Willy Susilo
, Yuanshun Dai, Geyong Min
:
Identity-Based Remote Data Integrity Checking With Perfect Data Privacy Preserving for Cloud Storage. 767-778 - Parth Pradhan, Parv Venkitasubramaniam
:
Stealthy Attacks in Dynamical Systems: Tradeoffs Between Utility and Detectability With Application in Anonymous Systems. 779-792 - Xufeng Lin
, Chang-Tsun Li
:
Large-Scale Image Clustering Based on Camera Fingerprints. 793-808 - Pawel Korus
, Jiwu Huang
:
Multi-Scale Analysis Strategies in PRNU-Based Tampering Localization. 809-824 - Hongbin Xu
, Li Sun
, Pinyi Ren, Qinghe Du, Yichen Wang:
Cooperative Privacy Preserving Scheme for Downlink Transmission in Multiuser Relay Networks. 825-839 - Yousof Erfani
, Ramin Pichevar, Jean Rouat:
Audio Watermarking Using Spikegram and a Two-Dictionary Approach. 840-852 - Paulo Max Gil Innocencio Reis, João Paulo Carvalho Lustosa da Costa, Ricardo Kehrle Miranda, Giovanni Del Galdo:
ESPRIT-Hilbert-Based Audio Tampering Detection With SVM Classifier for Forensic Analysis via Electrical Network Frequency. 853-864 - Le Yu, Tao Zhang
, Xiapu Luo
, Lei Xue
, Henry Chang:
Toward Automatically Generating Privacy Policy for Android Apps. 865-880 - Andrey V. Lyamin
, Elena N. Cherepovskaya
:
An Approach to Biometric Identification by Using Low-Frequency Eye Tracker. 881-891 - Matteo Ferrara
, Raffaele Cappelli, Davide Maltoni:
On the Feasibility of Creating Double-Identity Fingerprints. 892-900 - Manar Mohamed
, Babins Shrestha, Nitesh Saxena:
SMASheD: Sniffing and Manipulating Android Sensor Data for Offensive Purposes. 901-913 - Chao Chen, Yu Wang
, Jun Zhang
, Yang Xiang, Wanlei Zhou
, Geyong Min
:
Statistical Features-Based Real-Time Detection of Drifted Twitter Spam. 914-925 - Yuichi Sei
, Akihiko Ohsuga:
Differential Private Data Collection and Analysis Based on Randomized Multiple Dummies for Untrusted Mobile Crowdsensing. 926-939 - Yujue Wang, Qianhong Wu, Bo Qin
, Wenchang Shi, Robert H. Deng
, Jiankun Hu
:
Identity-Based Data Outsourcing With Comprehensive Auditing in Clouds. 940-952 - Kaiping Xue
, Yingjie Xue, Jianan Hong, Wei Li, Hao Yue, David S. L. Wei, Peilin Hong:
RAAC: Robust and Auditable Access Control With Multiple Attribute Authorities for Public Cloud Storage. 953-967 - Pardeep Kumar
, An Braeken
, Andrei V. Gurtov
, Jari H. Iinatti, Phuong Hoai Ha
:
Anonymous Secure Framework in Connected Smart Home Environments. 968-979 - Zhaohong Wang
, Sen-Ching S. Cheung
, Ying Luo:
Information-Theoretic Secure Multi-Party Computation With Collusion Deterrence. 980-995
Volume 12, Number 5, May 2017
- Jun Yu, Baopeng Zhang
, Zhengzhong Kuang, Dan Lin, Jianping Fan:
iPrivacy: Image Privacy Protection by Identifying Sensitive Objects via Deep Multi-Task Learning. 1005-1016 - Zijing Zhao, Ajay Kumar
:
Accurate Periocular Recognition Under Less Constrained Environment Using Semantics-Assisted Convolutional Neural Network. 1017-1030 - Kurt Rohloff
, David Bruce Cousins, Daniel Sumorok:
Scalable, Practical VoIP Teleconferencing With End-to-End Homomorphic Encryption. 1031-1041 - Mohamed Abouelenien
, Verónica Pérez-Rosas, Rada Mihalcea
, Mihai Burzo:
Detecting Deceptive Behavior via Integration of Discriminative Features From Multiple Modalities. 1042-1055 - Qing Yang, Paolo Gasti, Gang Zhou, Aydin Farajidavar, Kiran S. Balagani
:
On Inferring Browsing Activity on Smartphones via USB Power Analysis Side-Channel. 1056-1066 - Mustafa Al-Ani
, Fouad Khelifi
:
On the SPN Estimation in Image Forensics: A Systematic Empirical Evaluation. 1067-1081 - Yu-Chi Chen
:
Fully Incrementing Visual Cryptography From a Succinct Non-Monotonic Structure. 1082-1091 - Sikhar Patranabis
, Abhishek Chakraborty, Debdeep Mukhopadhyay, Partha Pratim Chakrabarti:
Fault Space Transformation: A Generic Approach to Counter Differential Fault Analysis and Differential Fault Intensity Analysis on AES-Like Block Ciphers. 1092-1102 - Mingshen Sun
, Xiaolei Li, John C. S. Lui, Richard T. B. Ma
, Zhenkai Liang
:
Monet: A User-Oriented Behavior-Based Malware Variants Detection System for Android. 1103-1112 - Vahid Heydari
, Sun-il Kim
, Seong-Moo Yoo:
Scalable Anti-Censorship Framework Using Moving Target Defense for Web Servers. 1113-1124 - Alberto Pedrouzo-Ulloa
, Juan Ramón Troncoso-Pastoriza
, Fernando Pérez-González
:
Number Theoretic Transforms for Secure Signal Processing. 1125-1140 - Qinyi Xu
, Yan Chen, Beibei Wang, K. J. Ray Liu
:
Radio Biometrics: Human Recognition Through a Wall. 1141-1155 - Rajiv Bagai
, Nafia Malik, Murtuza Jadliwala:
Measuring Anonymity of Pseudonymized Data After Probabilistic Background Attacks. 1156-1169 - Y.-W. Peter Hong
, Lin-Ming Huang, Hou-Tung Li:
Vector Quantization and Clustered Key Mapping for Channel-Based Secret Key Generation. 1170-1181 - Yujue Wang, Qianhong Wu, Bo Qin
, Shaohua Tang, Willy Susilo
:
Online/Offline Provable Data Possession. 1182-1194 - Gaojie Chen
, Justin P. Coon, Marco Di Renzo:
Secrecy Outage Analysis for Downlink Transmissions in the Presence of Randomly Located Eavesdroppers. 1195-1206 - Francesco G. B. De Natale, Giulia Boato
:
Detecting Morphological Filtering of Binary Images. 1207-1217 - Hiroki Okada
, Ken Umeno
:
Randomness Evaluation With the Discrete Fourier Transform Test Based on Exact Analysis of the Reference Distribution. 1218-1226 - Li Liu
, Yue Lu, Ching Y. Suen:
An Image-Based Approach to Detection of Fake Coins. 1227-1239 - Haodong Li
, Weiqi Luo
, Xiaoqing Qiu, Jiwu Huang
:
Image Forgery Localization via Integrating Tampering Possibility Maps. 1240-1252
Volume 12, Number 6, June 2017
- Quratulain Alam, Saif Ur Rehman Malik
, Adnan Akhunzada
, Kim-Kwang Raymond Choo
, Saher Tabbasum, Masoom Alam:
A Cross Tenant Access Control (CTAC) Model for Cloud Computing: Formal Specification and Verification. 1259-1268 - Li Li
, Daoyuan Li, Tegawendé F. Bissyandé, Jacques Klein
, Yves Le Traon
, David Lo
, Lorenzo Cavallaro
:
Understanding Android App Piggybacking: A Systematic Study of Malicious Code Grafting. 1269-1284 - Yifeng Zheng
, Helei Cui
, Cong Wang
, Jiantao Zhou
:
Privacy-Preserving Image Denoising From External Cloud Databases. 1285-1298 - Roberto Caldelli
, Rudy Becarelli, Irene Amerini
:
Image Origin Classification Based on Social Network Provenance. 1299-1308 - Hang Long
, Wei Xiang
, Yuli Li:
Precoding and Cooperative Jamming in Multi- Antenna Two-Way Relaying Wiretap Systems Without Eavesdropper's Channel State Information. 1309-1318 - Soumik Mondal
, Patrick Bours:
Person Identification by Keystroke Dynamics Using Pairwise User Coupling. 1319-1329 - Jianfeng Lu
, Changbing Tang, Xiang Li
, Qian Wu:
Designing Socially-Optimal Rating Protocols for Crowdsourcing Contest Dilemma. 1330-1344 - Yanzhen Ren
, Jing Yang, Jinwei Wang, Lina Wang:
AMR Steganalysis Based on Second-Order Difference of Pitch Delay. 1345-1357 - John D. Roth
, Murali Tummala, John C. McEachen, James W. Scrofani:
On Location Privacy in LTE Networks. 1358-1368 - Hua Shen
, Mingwu Zhang, Jian Shen
:
Efficient Privacy-Preserving Cube-Data Aggregation Scheme for Smart Grids. 1369-1381 - Qi Xie, Duncan S. Wong, Guilin Wang, Xiao Tan, Kefei Chen, Liming Fang:
Provably Secure Dynamic ID-Based Anonymous Two-Factor Authenticated Key Exchange Protocol With Extended Security Model. 1382-1392 - Andrew Nadeau
, Gaurav Sharma:
An Audio Watermark Designed for Efficient and Robust Resynchronization After Analog Playback. 1393-1405 - Baris Coskun
:
(Un)wisdom of Crowds: Accurately Spotting Malicious IP Clusters Using Not-So-Accurate IP Blacklists. 1406-1417 - Jordi Soria-Comas, Josep Domingo-Ferrer
, David Sánchez
, David Megías
:
Individual Differential Privacy: A Utility-Preserving Formulation of Differential Privacy Guarantees. 1418-1429 - Yu Fu
, Lu Yu, Oluwakemi Hambolu, Ilker Özçelik
, Benafsh Husain, Jingxuan Sun, Karan Sapra, Dan Du, Christopher Tate Beasley, Richard R. Brooks
:
Stealthy Domain Generation Algorithms. 1430-1443 - Yuhong Liu
, Wenqi Zhou, Hong Chen:
Efficiently Promoting Product Online Outcome: An Iterative Rating Attack Utilizing Product and Market Property. 1444-1457 - Onur Tan
, Jesús Gómez-Vilardebó
, Deniz Gündüz
:
Privacy-Cost Trade-offs in Demand-Side Management With Storage. 1458-1469 - Wei Wang
, Kah Chan Teh
, Kwok Hung Li
:
Artificial Noise Aided Physical Layer Security in Multi-Antenna Small-Cell Networks. 1470-1482 - Yunlong Mao
, Tingting Chen, Yuan Zhang, Tiancong Wang, Sheng Zhong:
Towards Privacy-Preserving Aggregation for Collaborative Spectrum Sensing. 1483-1493
Volume 12, Number 7, July 2017
- Anil K. Jain, Sunpreet S. Arora
, Kai Cao, Lacey Best-Rowden, Anjoo Bhatnagar:
Fingerprint Recognition of Young Children. 1501-1514 - Abhishek Basak
, Swarup Bhunia
, Thomas E. Tkacik, Sandip Ray:
Security Assurance for System-on-Chip Designs With Untrusted IPs. 1515-1528 - Yinxing Xue, Guozhu Meng
, Yang Liu
, Tian Huat Tan, Hongxu Chen, Jun Sun
, Jie Zhang:
Auditing Anti-Malware Tools by Evolving Android Malware and Dynamic Loading Technique. 1529-1544