


default search action
IEEE Transactions on Information Forensics and Security, Volume 14
Volume 14, Number 1, January 2019
- Yanyang Yan
, Wenqi Ren
, Xiaochun Cao:
Recolored Image Detection via a Deep Discriminative Model. 5-17 - Chan Dai Truyen Thai, Jemin Lee
, Jay Prakash, Tony Q. S. Quek
:
Secret Group-Key Generation at Physical Layer for Multi-Antenna Mesh Topology. 18-33 - Ajay Kumar
:
Toward More Accurate Matching of Contactless Palmprint Images Under Less Constrained Environments. 34-47 - Lei Xu
, Chunxiao Jiang
, Nengqiang He
, Zhu Han, Abderrahim Benslimane:
Trust-Based Collaborative Privacy Management in Online Social Networks. 48-60 - Konstantinos Koufos
, Carl P. Dettmann:
Boundaries as an Enhancement Technique for Physical Layer Security. 61-74 - Rui Zhao, Chuan Yue
, Qi Han:
Sensor-Based Mobile Web Cross-Site Input Inference Attacks and Defenses. 75-89 - Wenming Yang
, Zhiquan Chen
, Chuan Qin, Qingmin Liao:
$\alpha$ -Trimmed Weber Representation and Cross Section Asymmetrical Coding for Human Identification Using Finger Images. 90-101 - Yiwei He
, Junping Zhang
, Hongming Shan
, Liang Wang:
Multi-Task GANs for View-Specific Feature Learning in Gait Recognition. 102-113 - Wenjian Luo
, Yamin Hu
, Hao Jiang, Junteng Wang
:
Authentication by Encrypted Negative Password. 114-128 - Shihao Yan
, Biao He
, Xiangyun Zhou
, Yirui Cong
, A. Lee Swindlehurst
:
Delay-Intolerant Covert Communications With Either Fixed or Random Transmit Power. 129-140 - Heecheol Yang
, Jungwoo Lee
:
Secure Distributed Computing With Straggling Servers Using Polynomial Codes. 141-150 - João Neves
, Hugo Proença
:
"A Leopard Cannot Change Its Spots": Improving Face Recognition Using 3D-Based Caricatures. 151-161 - Kisong Lee
, Jun-Pyo Hong
, Hyun-Ho Choi
, Tony Q. S. Quek
:
Wireless-Powered Two-Way Relaying Protocols for Optimizing Physical Layer Security. 162-174 - Jinho Choi
:
A Coding Approach With Key-Channel Randomization for Physical-Layer Authentication. 175-185 - Hamzeh Ghasemzadeh
:
Multi-Layer Architecture for Efficient Steganalysis of UnderMp3Cover in Multi-Encoder Scenario. 186-195 - Lu Zhou
, Suguo Du, Haojin Zhu
, Cailian Chen
, Kaoru Ota
, Mianxiong Dong
:
Location Privacy in Usage-Based Automotive Insurance: Attacks and Countermeasures. 196-211 - Xuanxuan Tang
, Yueming Cai
, Yansha Deng
, Yuzhen Huang
, Wendong Yang
, Weiwei Yang
:
Energy-Constrained SWIPT Networks: Enhancing Physical Layer Security With FD Self-Jamming. 212-222 - Taeho Jung
, Xiang-Yang Li
, Wenchao Huang
, Zhongying Qiao
, Jianwei Qian
, Linlin Chen, Junze Han
, Jiahui Hou
:
AccountTrade: Accountability Against Dishonest Big Data Buyers and Sellers. 223-234 - Wenjing Zhang, Ming Li
, Ravi Tandon
, Hui Li:
Online Location Trace Privacy: An Information Theoretic Approach. 235-250 - Shicheng Yang
, Le Zhang, Lianghua He, Ying Wen
:
Sparse Low-Rank Component-Based Representation for Face Recognition With Low-Quality Images. 251-261 - Bin Dai
, Yuan Luo
:
An Improved Feedback Coding Scheme for the Wire-Tap Channel. 262-271
Volume 14, Number 2, February 2019
- Adi Hajj-Ahmad
, Chau-Wai Wong
, Steven Gambino, Qiang Zhu
, Miao Yu
, Min Wu
:
Factors Affecting ENF Capture in Audio. 277-288 - Faraz Ahmad Khan
, Fouad Khelifi
, Muhammad Atif Tahir, Ahmed Bouridane
:
Dissimilarity Gaussian Mixture Models for Efficient Offline Handwritten Text-Independent Identification Using SIFT and RootSIFT Descriptors. 289-303 - Ravichandran Subramanian
, Sudeep Sarkar
:
Evaluation of Algorithms for Orientation Invariant Inertial Gait Matching. 304-318 - Libing Wu
, Jing Wang
, Kim-Kwang Raymond Choo
, Debiao He
:
Secure Key Agreement and Key Protection for Mobile Device User Authentication. 319-330 - Wenting Shen, Jing Qin, Jia Yu
, Rong Hao, Jiankun Hu
:
Enabling Identity-Based Integrity Auditing and Data Sharing With Sensitive Information Hiding for Secure Cloud Storage. 331-346 - Kaveh Shamsi, Travis Meade, Meng Li
, David Z. Pan
, Yier Jin
:
On the Approximation Resiliency of Logic Locking and IC Camouflaging Schemes. 347-359 - Rig Das
, Emanuela Piciucco
, Emanuele Maiorana
, Patrizio Campisi
:
Convolutional Neural Network for Finger-Vein-Based Biometric Identification. 360-373 - Qian Wang
, Jing Huang, Yanjiao Chen
, Cong Wang
, Fu Xiao
, Xiangyang Luo:
PROST: Privacy-Preserving and Truthful Online Double Auction for Spectrum Allocation. 374-386 - Dongyang Xu
, Pinyi Ren
, James A. Ritcey:
Independence-Checking Coding for OFDM Channel Training Authentication: Protocol Design, Security, Stability, and Tradeoff Analysis. 387-402 - Nhan Duy Truong
, Jing Yan Haw
, Syed Muhamad Assad, Ping Koy Lam
, Omid Kavehei
:
Machine Learning Cryptanalysis of a Quantum Random Number Generator. 403-414 - Ben Nassi
, Adi Shamir
, Yuval Elovici:
Xerox Day Vulnerability. 415-430 - Ryota Nakai, Shinya Sugiura
:
Physical Layer Security in Buffer-State-Based Max-Ratio Relay Selection Exploiting Broadcasting With Cooperative Beamforming and Jamming. 431-444 - Xiaofang Xia
, Yang Xiao
, Wei Liang:
ABSI: An Adaptive Binary Splitting Algorithm for Malicious Meter Inspection in Smart Grid. 445-458 - Yvonne Höller
, Arne C. Bathke, Andreas Uhl
:
Age, Sex, and Pathology Effects on Stability of Electroencephalographic Biometric Features Based on Measures of Interaction. 459-471 - Holger Boche, Christian Deppe
:
Secure Identification Under Passive Eavesdroppers and Active Jamming Attacks. 472-485 - Qingyou Yang, Kaiping Xue
, Jie Xu
, Jiajie Wang, Fenghua Li, Nenghai Yu:
AnFRA: Anonymous and Fast Roaming Authentication for Space Information Network. 486-497 - Mehmet Necip Kurt
, Yasin Yilmaz
, Xiaodong Wang
:
Real-Time Detection of Hybrid and Stealthy Cyber-Attacks in Smart Grid. 498-513 - Mohammad Reza Khalili Shoja
, George T. Amariucai
, Zhengdao Wang
, Shuangqing Wei
, Jing Deng
:
On the Secret Key Capacity of Sibling Hidden Markov Models. 514-524 - Saman Feghhi
, Douglas J. Leith
:
An Efficient Web Traffic Defence Against Timing-Analysis Attacks. 525-540 - Muhammad Umar Karim Khan
, Hyun Sang Park
, Chong-Min Kyung
:
Rejecting Motion Outliers for Efficient Crowd Anomaly Detection. 541-556
Volume 14, Number 3, March 2019
- Chunlei Zhang, Muaz Ahmad
, Yongqiang Wang
:
ADMM Based Privacy-Preserving Decentralized Optimization. 565-580 - Udit Satija
, Nikita Trivedi, Gagarin Biswal, Barathram Ramkumar:
Specific Emitter Identification Based on Variational Mode Decomposition and Spectral Features in Single Hop and Relaying Scenarios. 581-591 - Dongyang Xu
, Pinyi Ren
, James A. Ritcey:
Hierarchical 2-D Feature Coding for Secure Pilot Authentication in Multi-User Multi-Antenna OFDM Systems: A Reliability Bound Contraction Perspective. 592-607 - Luca Bondi
, Paolo Bestagini
, Fernando Pérez-González
, Stefano Tubaro:
Improving PRNU Compression Through Preprocessing, Quantization, and Coding. 608-620 - Zahra Mobini
, Mohammadali Mohammadi
, Chintha Tellambura
:
Wireless-Powered Full-Duplex Relay and Friendly Jamming for Secure Cooperative Communications. 621-634 - Massimo Iuliani
, Dasara Shullani
, Marco Fontani
, Saverio Meucci
, Alessandro Piva
:
A Video Forensic Framework for the Unsupervised Analysis of MP4-Like File Container. 635-645 - Yuqing Li
, Wenkuan Dai
, Jie Bai, Xiaoying Gan
, Jingchao Wang, Xinbing Wang
:
An Intelligence-Driven Security-Aware Defense Mechanism for Advanced Persistent Threats. 646-661 - Chenhao Lin
, Ajay Kumar
:
A CNN-Based Framework for Comparison of Contactless to Contact-Based Fingerprints. 662-676 - Junyang Bai
, Weiping Wang
, Yan Qin, Shigeng Zhang
, Jianxin Wang, Yi Pan
:
BridgeTaint: A Bi-Directional Dynamic Taint Tracking Method for JavaScript Bridges in Android Hybrid Applications. 677-692 - Chenyu Wang
, Bihuan Chen, Yang Liu
, Hongjun Wu
:
Layered Object-Oriented Programming: Advanced VTable Reuse Attacks on Binary-Level Defense. 693-708 - Harkeerat Kaur, Pritee Khanna
:
Random Distance Method for Generating Unimodal and Multimodal Cancelable Biometric Features. 709-719 - Zhe Liu
, Hwajeong Seo:
IoT-NUMS: Evaluating NUMS Elliptic Curve Cryptography for IoT Platforms. 720-729 - Attilio Fiandrotti
, Rossano Gaeta
, Marco Grangetto
:
Securing Network Coding Architectures Against Pollution Attacks With Band Codes. 730-742 - Emir Erdem
, Mehmet Tahir Sandikkaya
:
OTPaaS - One Time Password as a Service. 743-756 - Fania Mokhayeri
, Eric Granger
, Guillaume-Alexandre Bilodeau
:
Domain-Specific Face Synthesis for Video Face Recognition From a Single Sample Per Person. 757-772 - TaeGuen Kim, BooJoong Kang, Mina Rho, Sakir Sezer, Eul Gyu Im
:
A Multimodal Deep Learning Method for Android Malware Detection Using Various Features. 773-788 - Jianting Ning
, Jia Xu
, Kaitai Liang
, Fan Zhang
, Ee-Chien Chang
:
Passive Attacks Against Searchable Encryption. 789-802 - Peter Samarin
, Kerstin Lemke-Rust:
Detection of Counterfeit ICs Using Public Identification Sequences and Side-Channel Leakage. 803-813 - Lei Xue
, Chenxiong Qian, Hao Zhou, Xiapu Luo
, Yajin Zhou, Yuru Shao, Alvin T. S. Chan:
NDroid: Toward Tracking Information Flows Across Multiple Android Contexts. 814-828
Volume 14, Number 4, April 2019
- Yuhong Liu
, Na Li:
Retrieving Hidden Friends: A Collusion Privacy Attack Against Online Friend Search Engine. 833-847 - Sanjay Karmakar
, Anirban Ghosh
:
Secrecy Capacity Region of Fading Binary Z Interference Channel With Statistical CSIT. 848-857 - Wenxiong Kang
, Yuting Lu, Dejian Li, Wei Jia:
From Noise to Feature: Exploiting Intensity Distribution as a Novel Soft Biometric Trait for Finger Vein Recognition. 858-869 - Guowen Xu
, Hongwei Li
, Yuanshun Dai, Kan Yang
, Xiaodong Lin
:
Enabling Efficient and Geometric Range Query With Access Control Over Encrypted Spatial Data. 870-885 - Sivaram Prasad Mudunuri
, Shashanka Venkataramanan, Soma Biswas
:
Dictionary Alignment With Re-Ranking for Low-Resolution NIR-VIS Face Recognition. 886-896 - Vijay Varadharajan
, Kallol Krishna Karmakar
, Udaya Kiran Tupakula
, Michael Hitchens
:
A Policy-Based Security Architecture for Software-Defined Networks. 897-912 - Qing Yang
, Ge Peng, Paolo Gasti
, Kiran S. Balagani
, Yantao Li
, Gang Zhou
:
MEG: Memory and Energy Efficient Garbled Circuit Evaluation on Smartphones. 913-922 - Rui Shao
, Xiangyuan Lan
, Pong C. Yuen
:
Joint Discriminative Learning of Deep Dynamic Textures for 3D Mask Face Anti-Spoofing. 923-938 - Changhai Ou
, Zhu Wang
, Degang Sun, Xinping Zhou:
Group Collision Attack. 939-953 - Sayandeep Saha
, Dirmanto Jap
, Sikhar Patranabis
, Debdeep Mukhopadhyay
, Shivam Bhasin
, Pallab Dasgupta
:
Automatic Characterization of Exploitable Faults: A Machine Learning Approach. 954-968 - Mohammed Adil Abbas
, Hojin Song, Jun-Pyo Hong
:
Opportunistic Scheduling for Average Secrecy Rate Enhancement in Fading Downlink Channel With Potential Eavesdroppers. 969-980 - Ángeles Vázquez-Castro
, Masahito Hayashi
:
Physical Layer Security for RF Satellite Channels in the Finite-Length Regime. 981-993 - Pierre-Francois Marteau
:
Sequence Covering for Efficient Host-Based Intrusion Detection. 994-1006 - Xing Hu
, Yingping Huang, Xiumin Gao, Lingkun Luo, Qianqian Duan:
Squirrel-Cage Local Binary Pattern and Its Application in Video Anomaly Detection. 1007-1022 - Ali Akbar Pammu
, Weng-Geng Ho, Ne Kyaw Zwa Lwin, Kwen-Siong Chong, Bah-Hwee Gwee
:
A High Throughput and Secure Authentication-Encryption AES-CCM Algorithm on Asynchronous Multicore Processor. 1023-1036 - Bogdan Groza
, Pal-Stefan Murvay
:
Efficient Intrusion Detection With Bloom Filtering in Controller Area Networks. 1037-1051 - Kejiang Chen
, Hang Zhou, Wenbo Zhou, Weiming Zhang
, Nenghai Yu:
Defining Cost Functions for Adaptive JPEG Steganography at the Microscale. 1052-1066 - Tengku Mohd Afendi Zulcaffle
, Fatih Kurugollu
, Danny Crookes
, Ahmed Bouridane, Mohsen Farid:
Frontal View Gait Recognition With Fusion of Depth Features From a Time of Flight Camera. 1067-1082 - Mirco Marchetti
, Dario Stabili
:
READ: Reverse Engineering of Automotive Data Frames. 1083-1097 - Zhuotao Liu
, Yuan Cao
, Min Zhu, Wei Ge:
Umbrella: Enabling ISPs to Offer Readily Deployable and Privacy-Preserving DDoS Prevention Services. 1098-1108 - Siarhei S. Zalivaka, Alexander A. Ivaniuk, Chip-Hong Chang
:
Reliable and Modeling Attack Resistant Authentication of Arbiter PUF in FPGA Implementation With Trinary Quadruple Response. 1109-1123
Volume 14, Number 5, May 2019
- Sofia Belikovetsky
, Yosef A. Solewicz
, Mark Yampolskiy
, Jinghui Toh, Yuval Elovici:
Digital Audio Signature for 3D Printing Integrity. 1127-1141 - Duo Li
, Xiao-Ping (Steven) Zhang
, Menghan Hu
, Guangtao Zhai
, Xiaokang Yang:
Physical Password Breaking via Thermal Sequence Analysis. 1142-1154 - Ankit Shah
, Rajesh Ganesan
, Sushil Jajodia
, Hasan Cam
:
Understanding Tradeoffs Between Throughput, Quality, and Cost of Alert Analysis in a CSOC. 1155-1170 - Zhenghui Liu
, Yuankun Huang
, Jiwu Huang
:
Patchwork-Based Audio Watermarking Robust Against De-Synchronization and Recapturing Attacks. 1171-1180 - Mehdi Boroumand
, Mo Chen, Jessica J. Fridrich:
Deep Residual Network for Steganalysis of Digital Images. 1181-1193 - Gurinder Singh
, Kulbir Singh
:
Counter JPEG Anti-Forensic Approach Based on the Second-Order Statistical Analysis. 1194-1209 - Lu Yang, Gongping Yang
, Xiaoming Xi
, Kun Su, Qing Chen, Yilong Yin
:
Finger Vein Code: From Indexing to Matching. 1210-1223 - Rick Fritschek
, Gerhard Wunder:
On the Gaussian Multiple Access Wiretap Channel and the Gaussian Wiretap Channel With a Helper: Achievable Schemes and Upper Bounds. 1224-1239 - Pramuditha Perera
, Vishal M. Patel
:
Face-Based Multiple User Active Authentication on Mobile Devices. 1240-1250 - Berk Akgun
, Marwan Krunz, Onur Ozan Koyluoglu:
Vulnerabilities of Massive MIMO Systems to Pilot Contamination Attacks. 1251-1263 - Kazuaki Nakamura
, Naoko Nitta, Noboru Babaguchi:
Encryption-Free Framework of Privacy-Preserving Image Recognition for Photo-Based Information Services. 1264-1279 - Zhongliang Yang
, Xiaoqing Guo
, Zi-Ming Chen
, Yongfeng Huang
, Yu-Jin Zhang
:
RNN-Stega: Linguistic Steganography Based on Recurrent Neural Networks. 1280-1295 - James Shey
, Justin A. Blanco
, T. Owens Walker
, Thomas W. Tedesso, Hau T. Ngo, Ryan N. Rakvic
, Kevin D. Fairbanks
:
Monitoring Device Current to Characterize Trim Operations of Solid-State Drives. 1296-1306 - Yuanman Li, Jiantao Zhou:
Fast and Effective Image Copy-Move Forgery Detection via Hierarchical Feature Point Matching. 1307-1322 - Shun-Chi Wu
, Peng-Tzu Chen, A. Lee Swindlehurst
, Pei-Lun Hung:
Cancelable Biometric Recognition With ECGs: Subspace-Based Approaches. 1323-1336 - Zhen Hong
, Rui Wang
, Shouling Ji, Raheem Beyah
:
Attacker Location Evaluation-Based Fake Source Scheduling for Source Location Privacy in Cyber-Physical Systems. 1337-1350 - Javier Galbally
, Rudolf Haraksim, Laurent Beslay:
A Study of Age and Ageing in Fingerprint Biometrics. 1351-1365 - Christina L. Ting
, Richard V. Field Jr.
, Andrew Fisher, Travis L. Bauer:
Compression Analytics for Classification and Anomaly Detection Within Network Communication. 1366-1376 - Vincent Y. F. Tan
, Si-Hyeon Lee
:
Time-Division is Optimal for Covert Communication Over Some Broadcast Channels. 1377-1389 - Tian Wang
, Meina Qiao, Zhiwei Lin, Ce Li, Hichem Snoussi, Zhe Liu
, Chang Choi
:
Generative Neural Networks for Anomaly Detection in Crowded Scenes. 1390-1399
Volume 14, Number 6, June 2019
- Han Fang
, Weiming Zhang
, Hang Zhou
, Hao Cui
, Nenghai Yu:
Screen-Shooting Resilient Watermarking. 1403-1418 - Andrey Kuehlkamp
, Allan da Silva Pinto
, Anderson Rocha
, Kevin W. Bowyer
, Adam Czajka
:
Ensemble of Multi-View Learning Classifiers for Cross-Domain Iris Presentation Attack Detection. 1419-1431 - Hannes Mareen
, Johan De Praeter
, Glenn Van Wallendael
, Peter Lambert
:
A Scalable Architecture for Uncompressed-Domain Watermarked Videos. 1432-1444 - Liran Lerman
, Olivier Markowitch:
Efficient Profiled Attacks on Masking Schemes. 1445-1454 - Haipeng Cai
, Na Meng, Barbara G. Ryder
, Danfeng Yao
:
DroidCat: Effective Android Malware Detection and Categorization via App-Level Profiling. 1455-1470 - Muhammad Ejaz Ahmed, Saeed Ullah
, Hyoungshick Kim
:
Statistical Application Fingerprinting for DDoS Attack Mitigation. 1471-1484 - Di Zhuang
, J. Morris Chang:
Enhanced PeerHunter: Detecting Peer-to-Peer Botnets Through Network-Flow Level Community Behavior Analysis. 1485-1500 - Mateusz Trokielewicz
, Adam Czajka
, Piotr Maciejewicz:
Iris Recognition After Death. 1501-1514 - Tatsuya Chuman
, Warit Sirichotedumrong
, Hitoshi Kiya
:
Encryption-Then-Compression Systems Using Grayscale-Based Image Encryption for JPEG Images. 1515-1525 - Iman Vakilinia
, Shamik Sengupta:
A Coalitional Cyber-Insurance Framework for a Common Platform. 1526-1538 - Lewis D. Griffin
, Matthew Caldwell
, Jerone T. A. Andrews, Helene Bohler
:
"Unexpected Item in the Bagging Area": Anomaly Detection in X-Ray Security Images. 1539-1553