


default search action
IEEE Transactions on Information Forensics and Security, Volume 15
Volume 15, 2020
- Matteo Testa

, Tiziano Bianchi
, Enrico Magli
:
Secrecy Analysis of Finite-Precision Compressive Cryptosystems. 1-13 - Sara Mandelli

, Paolo Bestagini
, Luisa Verdoliva
, Stefano Tubaro:
Facing Device Attribution Problem for Stabilized Video Sequences. 14-27 - Xuefei Yin

, Yanming Zhu
, Jiankun Hu
:
Contactless Fingerprint Recognition Based on Global Minutia Topology and Loose Genetic Algorithm. 28-41 - Anjith George

, Zohreh Mostaani
, David Geissenbuhler, Olegs Nikisins, André Anjos
, Sébastien Marcel
:
Biometric Face Presentation Attack Detection With Multi-Channel Convolutional Neural Network. 42-55 - Metodi P. Yankov

, Martin Aastrup Olsen
, Mikkel B. Stegmann, Søren Skovgaard Christensen, Søren Forchhammer
:
Fingerprint Entropy and Identification Capacity Estimation Based on Pixel-Level Generative Modelling. 56-65 - Ali Karimi, Abbas Taherpour

, Danijela Cabric
:
Smart Traffic-Aware Primary User Emulation Attack and Its Impact on Secondary User Throughput Under Rayleigh Flat Fading Channel. 66-80 - Kyung-Ah Shim

:
Comments on "Revocable and Scalable Certificateless Remote Authentication Protocol With Anonymity for Wireless Body Area Networks". 81-82 - Babak Siabi

, Mehdi Berenjkoub:
Comments on "Unconditionally Secure, Universally Composable Privacy Preserving Linear Algebra". 83-84 - Meng Sun

, Wee Peng Tay
:
Decentralized Detection With Robust Information Privacy Protection. 85-99 - Na Wang

, Junsong Fu
, Jian Li
, Bharat K. Bhargava
:
Source-Location Privacy Protection Based on Anonymity Cloud in Wireless Sensor Networks. 100-114 - Fei Ma

, Xiao-Yuan Jing
, Xiao Zhu, Zhenmin Tang
, Zhiping Peng:
True-Color and Grayscale Video Person Re-Identification. 115-129 - Quanzhong Li

, Liang Yang
:
Beamforming for Cooperative Secure Transmission in Cognitive Two-Way Relay Networks. 130-143 - Davide Cozzolino

, Luisa Verdoliva
:
Noiseprint: A CNN-Based Camera Model Fingerprint. 144-159 - Sharad Joshi

, Nitin Khanna
:
Source Printer Classification Using Printer Specific Local Texture Descriptor. 160-171 - Chunlei Peng

, Nannan Wang
, Jie Li, Xinbo Gao
:
Face Sketch Synthesis in the Wild via Deep Patch Representation-Based Probabilistic Graphical Model. 172-183 - Fawad Ahmad

, Lee-Ming Cheng
, Asif Khan
:
Lightweight and Privacy-Preserving Template Generation for Palm-Vein-Based Human Recognition. 184-194 - Meng Pang

, Yiu-Ming Cheung
, Binghui Wang
, Jian Lou
:
Synergistic Generic Learning for Face Recognition From a Contaminated Single Sample per Person. 195-209 - Ahmed Arafa

, Wonjae Shin
, Mojtaba Vaezi
, H. Vincent Poor
:
Secure Relaying in Non-Orthogonal Multiple Access: Trusted and Untrusted Scenarios. 210-222 - Jinguang Han

, Liqun Chen
, Steve A. Schneider
, Helen Treharne
, Stephan Wesemeyer
, Nick Wilson:
Anonymous Single Sign-On With Proxy Re-Verification. 223-236 - Chengwei Wu

, Ligang Wu
, Jianxing Liu
, Zhong-Ping Jiang
:
Active Defense-Based Resilient Sliding Mode Control Under Denial-of-Service Attacks. 237-249 - Xinghao Jiang

, Qiang Xu
, Tanfeng Sun
, Bin Li
, Peisong He
:
Detection of HEVC Double Compression With the Same Coding Parameters Based on Analysis of Intra Coding Quality Degradation Process. 250-263 - Qiang Li

, Chao Li, Jingran Lin
:
Constant Modulus Secure Beamforming for Multicast Massive MIMO Wiretap Channels. 264-275 - Wei-Che Wang

, Yair Yona
, Yizhang Wu
, Suhas N. Diggavi, Puneet Gupta
:
SLATE: A Secure Lightweight Entity Authentication Hardware Primitive. 276-285 - Enrico Bacis

, Sabrina De Capitani di Vimercati
, Sara Foresti
, Stefano Paraboschi
, Marco Rosa
, Pierangela Samarati
:
Securing Resources in Decentralized Cloud Storage. 286-298 - Dong Yuan, Qi Li

, Guoliang Li
, Qian Wang
, Kui Ren:
PriRadar: A Privacy-Preserving Framework for Spatial Crowdsourcing. 299-314 - Pu Zhao

, Jia Yu
, Hanlin Zhang, Zhan Qin
, Cong Wang
:
How to Securely Outsource Finding the Min-Cut of Undirected Edge-Weighted Graphs. 315-328 - Amir Ameli

, Ali Hooshyar
, Ehab F. El-Saadany
, Amr M. Youssef
:
An Intrusion Detection Method for Line Current Differential Relays. 329-344 - Ramin Soltani

, Dennis Goeckel
, Don Towsley
, Amir Houmansadr
:
Fundamental Limits of Invisible Flow Fingerprinting. 345-360 - Xiaofang Xia

, Yang Xiao
, Wei Liang
:
SAI: A Suspicion Assessment-Based Inspection Algorithm to Detect Malicious Users in Smart Grid. 361-374 - Guoqing Wang

, Changming Sun
, Arcot Sowmya:
Multi-Weighted Co-Occurrence Descriptor Encoding for Vein Recognition. 375-390 - Jingyi Feng

, Hua Chen
, Yang Li, Zhipeng Jiao, Wei Xi:
A Framework for Evaluation and Analysis on Infection Countermeasures Against Fault Attacks. 391-406 - Mang Ye

, Xiangyuan Lan
, Zheng Wang
, Pong C. Yuen
:
Bi-Directional Center-Constrained Top-Ranking for Visible Thermal Person Re-Identification. 407-419 - Jun Zhou

, Zhenfu Cao
, Zhan Qin
, Xiaolei Dong, Kui Ren:
LPPA: Lightweight Privacy-Preserving Authentication From Efficient Multi-Key Secure Outsourced Computation for Location-Based Services in VANETs. 420-434 - Nalam Venkata Abhishek

, Anshoo Tandon
, Teng Joon Lim
, Biplab Sikdar
:
A GLRT-Based Mechanism for Detecting Relay Misbehavior in Clustered IoT Networks. 435-446 - Jean de Dieu Mutangana, Ravi Tandon

:
Blind MIMO Cooperative Jamming: Secrecy via ISI Heterogeneity Without CSIT. 447-461 - Juntao Chen

, Corinne Touati
, Quanyan Zhu:
A Dynamic Game Approach to Strategic Design of Secure and Resilient Infrastructure Network. 462-474 - Ahmet Turan Erozan

, Michael Hefenbrock
, Michael Beigl, Jasmin Aghassi-Hagmann
, Mehdi Baradaran Tahoori:
Reverse Engineering of Printed Electronics Circuits: From Imaging to Netlist Extraction. 475-486 - Moisés Díaz

, Miguel A. Ferrer
, Soodamani Ramalingam
, Richard M. Guest
:
Investigating the Common Authorship of Signatures by Off-Line Automatic Signature Verification Without the Use of Reference Signatures. 487-499 - Hussain M. J. Almohri

, Layne T. Watson, David Evans
:
Predictability of IP Address Allocations for Cloud Computing Platforms. 500-511 - Kanad Basu

, Prashanth Krishnamurthy
, Farshad Khorrami
, Ramesh Karri
:
A Theoretical Study of Hardware Performance Counters-Based Malware Detection. 512-525 - Hyun Kwon

, Yongchul Kim, Hyunsoo Yoon
, Daeseon Choi
:
Selective Audio Adversarial Example in Evasion Attack on Speech Recognition System. 526-538 - Dan Lin

, Douglas Steiert, Joshua Morris
, Anna Cinzia Squicciarini, Jianping Fan
:
REMIND: Risk Estimation Mechanism for Images in Network Distribution. 539-552 - Netanel Raviv

, David A. Karpuk
:
Private Polynomial Computation From Lagrange Encoding. 553-563 - Hoon Wei Lim, Geong Sen Poh

, Jia Xu
, Varsha Chittawar
:
PrivateLink: Privacy-Preserving Integration and Sharing of Datasets. 564-577 - Haonan Chen

, Guosheng Hu
, Zhen Lei
, Yaowu Chen
, Neil Martin Robertson, Stan Z. Li:
Attention-Based Two-Stream Convolutional Networks for Face Spoofing Detection. 578-593 - Borzoo Rassouli

, Deniz Gündüz
:
Optimal Utility-Privacy Trade-Off With Total Variation Distance as a Privacy Measure. 594-603 - Xin Yuan

, Zhiyong Feng
, Wei Ni
, Ren Ping Liu
, J. Andrew Zhang
, Wenjun Xu
:
Secrecy Performance of Terrestrial Radio Links Under Collaborative Aerial Eavesdropping. 604-619 - Yue Zheng

, Yuan Cao
, Chip-Hong Chang
:
A PUF-Based Data-Device Hash for Tampered Image Detection and Source Camera Identification. 620-634 - Guoqing Wang

, Changming Sun
, Arcot Sowmya:
Learning a Compact Vein Discrimination Model With GANerated Samples. 635-650 - Bo Song

, Xu Wang
, Wei Ni
, Yurong Song
, Ren Ping Liu
, Guoping Jiang
, Y. Jay Guo
:
Reliability Analysis of Large-Scale Adaptive Weighted Networks. 651-665 - Prashanth Krishnamurthy

, Ramesh Karri
, Farshad Khorrami
:
Anomaly Detection in Real-Time Multi-Threaded Processes Using Hardware Performance Counters. 666-680 - Hailong Zhang

:
On the Exact Relationship Between the Success Rate of Template Attack and Different Parameters. 681-694 - Miran Kim

, Junghye Lee
, Lucila Ohno-Machado, Xiaoqian Jiang:
Secure and Differentially Private Logistic Regression for Horizontally Distributed Data. 695-710 - Jian Kang

, Douglas Steiert, Dan Lin
, Yanjie Fu:
MoveWithMe: Location Privacy Preservation for Smartphone Users. 711-724 - Weiqi Dai

, Chunkai Dai
, Kim-Kwang Raymond Choo
, Changze Cui
, Deqing Zou
, Hai Jin
:
SDTE: A Secure Blockchain-Based Data Trading Ecosystem. 725-737 - Yuan Liang

, Jian Ren
, Tongtong Li
:
Secure OFDM System Design and Capacity Analysis Under Disguised Jamming. 738-752 - Yang Zi

, Haichang Gao
, Zhouhang Cheng, Yi Liu
:
An End-to-End Attack on Text CAPTCHAs. 753-766 - Yuqiao Zhang, Ujjwal Guin

:
End-to-End Traceability of ICs in Component Supply Chain for Fighting Against Recycling. 767-775 - Baki Berkay Yilmaz

, Milos Prvulovic
, Alenka G. Zajic
:
Electromagnetic Side Channel Information Leakage Created by Execution of Series of Instructions in a Computer Processor. 776-789 - Razane Tajeddine

, Antonia Wachter-Zeh
, Camilla Hollanti
:
Private Information Retrieval Over Random Linear Networks. 790-799 - Mehmet Necip Kurt

, Yasin Yilmaz
, Xiaodong Wang
:
Secure Distributed Dynamic State Estimation in Wide-Area Smart Grids. 800-815 - Dongxia Wang

, Tim Muller, Jie Zhang, Yang Liu
:
Information Theoretical Analysis of Unfair Rating Attacks Under Subjectivity. 816-828 - Phuong Le Cao

, Tobias J. Oechtering
:
Optimal Transmit Strategies for Gaussian MISO Wiretap Channels. 829-838 - Jianhua Yang

, Danyang Ruan
, Jiwu Huang
, Xiangui Kang
, Yun-Qing Shi:
An Embedding Cost Learning Framework Using GAN. 839-851 - Meng Sun

, Wee Peng Tay
:
On the Relationship Between Inference and Data Privacy in Decentralized IoT Networks. 852-866 - Mehdi Sharifzadeh

, Mohammed Aloraini
, Dan Schonfeld
:
Adaptive Batch Size Image Merging Steganography and Quantized Gaussian Image Steganography. 867-879 - Kai Cao

, Dinh-Luan Nguyen, Cori Tymoszek
, Anil K. Jain
:
End-to-End Latent Fingerprint Search. 880-894 - Yang Song

, Chong Xiao Wang, Wee Peng Tay
:
Compressive Privacy for a Linear Dynamical System. 895-910 - Guowen Xu

, Hongwei Li
, Sen Liu, Kan Yang
, Xiaodong Lin
:
VerifyNet: Secure and Verifiable Federated Learning. 911-926 - Chun-I Fan

, Jheng-Jia Huang
, Min-Zhe Zhong, Ruei-Hau Hsu
, Wen-Tsuen Chen, Jemin Lee
:
ReHand: Secure Region-Based Fast Handover With User Anonymity for Small Cell Networks in Mobile Communications. 927-942 - Paolo Addesso

, Michele Cirillo
, Mario Di Mauro
, Vincenzo Matta
:
ADVoIP: Adversarial Detection of Encrypted and Concealed VoIP. 943-958 - Sebastian Baur

, Holger Boche, Rafael F. Schaefer
, H. Vincent Poor
:
Secure Storage Capacity Under Rate Constraints - Continuity and Super Activation. 959-970 - Donghe Li, Qingyu Yang

, Wei Yu
, Dou An
, Yang Zhang, Wei Zhao
:
Towards Differential Privacy-Based Online Double Auction for Smart Grid. 971-986 - Xiao Chen

, Chaoran Li
, Derui Wang
, Sheng Wen, Jun Zhang
, Surya Nepal
, Yang Xiang
, Kui Ren:
Android HIV: A Study of Repackaging Malware for Evading Machine-Learning Detection. 987-1001 - Zonghao Huang

, Rui Hu, Yuanxiong Guo
, Eric Chan-Tin
, Yanmin Gong
:
DP-ADMM: ADMM-Based Distributed Learning With Differential Privacy. 1002-1012 - Holger Boche, Rafael F. Schaefer

, H. Vincent Poor
:
Secure Communication and Identification Systems - Effective Performance Evaluation on Turing Machines. 1013-1025 - Mehrdad Tahmasbi

, Matthieu R. Bloch
:
Covert Secret Key Generation With an Active Warden. 1026-1039 - Tao Qin

, Zhaoli Liu
, Pinghui Wang
, Shancang Li
, Xiaohong Guan, Lixin Gao:
Symmetry Degree Measurement and its Applications to Anomaly Detection. 1040-1055 - Changsheng Chen

, Mulin Li, Anselmo Ferreira
, Jiwu Huang
, Rizhao Cai:
A Copy-Proof Scheme Based on the Spectral and Spatial Barcoding Channel Models. 1056-1071 - Jakub Breier

, Dirmanto Jap
, Xiaolu Hou
, Shivam Bhasin
:
On Side Channel Vulnerabilities of Bit Permutations in Cryptographic Algorithms. 1072-1085 - Penny Chong, Yuval Elovici, Alexander Binder

:
User Authentication Based on Mouse Dynamics Using Deep Neural Networks: A Comprehensive Study. 1086-1101 - Bryse Flowers, R. Michael Buehrer, William C. Headley

:
Evaluating Adversarial Evasion Attacks in the Context of Wireless Communications. 1102-1113 - Shangyu Xie, Yuan Hong

, Peng-Jun Wan:
Pairing: Privately Balancing Multiparty Real-Time Supply and Demand on the Power Grid. 1114-1127 - Guillermo Suarez-Tangil

, Matthew Edwards
, Claudia Peersman, Gianluca Stringhini, Awais Rashid
, Monica T. Whitty
:
Automatically Dismantling Online Dating Fraud. 1128-1137 - Ru Zhang

, Feng Zhu, Jianyi Liu, Gongshen Liu:
Depth-Wise Separable Convolutions and Multi-Level Pooling for an Efficient Spatial CNN-Based Steganalysis. 1138-1150 - Shangwei Guo

, Tao Xiang
, Xiaoguo Li, Ying Yang
:
PEID: A Perceptually Encrypted Image Database for Visual Security Evaluation. 1151-1163 - Osama Al-Kadi

, Nour Moustafa
, Benjamin P. Turnbull
, Kim-Kwang Raymond Choo
:
An Ontological Graph Identification Method for Improving Localization of IP Prefix Hijacking in Network Systems. 1164-1174 - Wenxiong Kang, Hongda Liu, Wei Luo, Feiqi Deng

:
Study of a Full-View 3D Finger Vein Verification Technique. 1175-1189 - Mordechai Guri, Boris Zadov, Yuval Elovici:

ODINI: Escaping Sensitive Data From Faraday-Caged, Air-Gapped Computers via Magnetic Fields. 1190-1203 - Aske R. Lejbølle, Kamal Nasrollahi, Benjamin Krogh, Thomas B. Moeslund

:
Person Re-Identification Using Spatial and Layer-Wise Attention. 1216-1231 - Chonlatid Deerada, Krisada Phromsuthirak, Arucha Rungchokanun, Vutipong Areekul:

Progressive Focusing Algorithm for Reliable Pose Estimation of Latent Fingerprints. 1232-1247 - Jinbao Zhu

, Qifa Yan, Chao Qi, Xiaohu Tang:
A New Capacity-Achieving Private Information Retrieval Scheme With (Almost) Optimal File Length for Coded Servers. 1248-1260 - Ruben Tolosana

, Marta Gomez-Barrero, Christoph Busch
, Javier Ortega-Garcia
:
Biometric Presentation Attack Detection: Beyond the Visible Spectrum. 1261-1275 - Thanikasalam Kokul

, Clinton Fookes, Sridha Sridharan
, Amirthalingam Ramanan
, Amalka Pinidiyaarachchi:
Target-Specific Siamese Attention Network for Real-Time Object Tracking. 1276-1289 - Chuan-Xian Ren

, Bo-Hua Liang, Pengfei Ge
, Yiming Zhai, Zhen Lei:
Domain Adaptive Person Re-Identification via Camera Style Generation and Label Propagation. 1290-1302 - Falko Matern, Christian Riess, Marc Stamminger:

Gradient-Based Illumination Description for Image Forgery Detection. 1303-1317 - Shaohua Li, Kaiping Xue

, David S. L. Wei, Hao Yue
, Nenghai Yu
, Peilin Hong
:
SecGrid: A Secure and Efficient SGX-Enabled Smart Grid System With Rich Functionalities. 1318-1330 - Owen Mayer

, Matthew C. Stamm
:
Forensic Similarity for Digital Images. 1331-1346 - Ji He

, Jia Liu
, Yulong Shen
, Xiaohong Jiang
, Norio Shiratori:
Link Selection for Security-QoS Tradeoffs in Buffer-Aided Relaying Networks. 1347-1362 - Ning Wang

, Long Jiao, Amir Alipour-Fanid, Monireh Dabaghchian
, Kai Zeng
:
Pilot Contamination Attack Detection for NOMA in 5G mm-Wave Massive MIMO Networks. 1363-1378 - Michele Boreale

, Fabio Corradi
, Cecilia Viscardi
:
Relative Privacy Threats and Learning From Anonymized Data. 1379-1393 - Zhihang Li

, Xu Tang, Xiang Wu
, Jingtuo Liu
, Ran He
:
Progressively Refined Face Detection Through Semantics-Enriched Representation Learning. 1394-1406 - Fan Zhang

, Xiaofei Dong
, Bolin Yang
, Yajin Zhou
, Kui Ren
:
A Systematic Evaluation of Wavelet-Based Attack Framework on Random Delay Countermeasures. 1407-1422 - Kisong Lee

, Jin-Taek Lim
, Hyun-Ho Choi
:
Impact of Outdated CSI on the Secrecy Performance of Wireless-Powered Untrusted Relay Networks. 1423-1433 - Jan Butora

, Jessica J. Fridrich:
Reverse JPEG Compatibility Attack. 1444-1454 - David Formby

, Raheem Beyah
:
Temporal Execution Behavior for Host Anomaly Detection in Programmable Logic Controllers. 1455-1469 - Neetesh Saxena

, Mauro Conti
, Kim-Kwang Raymond Choo
, Narendra S. Chaudhari:
BAS-VAS: A Novel Secure Protocol for Value Added Service Delivery to Mobile Devices. 1470-1485 - Lingchen Zhao, Qian Wang

, Qin Zou
, Yan Zhang, Yanjiao Chen
:
Privacy-Preserving Collaborative Deep Learning With Unreliable Participants. 1486-1500 - Xiaofeng Liu

, Zhenhua Guo
, Jane You
, B. V. K. Vijaya Kumar
:
Dependency-Aware Attention Control for Image Set-Based Face Recognition. 1501-1512 - Ahmed A. Zewail

, Aylin Yener
:
Device-to-Device Secure Coded Caching. 1513-1524 - Guo-lin Shao

, Xingshu Chen
, Xuemei Zeng
, Lina Wang:
Deep Learning Hierarchical Representation From Heterogeneous Flow-Level Communication Data. 1525-1540 - Alexander Bunin

, Ziv Goldfeld, Haim H. Permuter, Shlomo Shamai Shitz
, Paul Cuff, Pablo Piantanida:
Key and Message Semantic-Security Over State-Dependent Channels. 1541-1556 - Enes Altinisik, Kasim Tasdemir

, Husrev Taha Sencar
:
Mitigation of H.264 and H.265 Video Compression for Reliable PRNU Estimation. 1557-1571 - Libing Wu

, Jingxiao Yang, Man Zhou
, Yanjiao Chen
, Qian Wang
:
LVID: A Multimodal Biometrics Authentication System on Smartphones. 1572-1585 - Xu An Wang

, Kim-Kwang Raymond Choo
, Jian Weng
, Jianfeng Ma:
Comments on "Publicly Verifiable Computation of Polynomials Over Outsourced Data With Multiple Sources". 1586-1588 - Hongliang Liang

, Mingyu Li, Yixiu Chen, Lin Jiang, Zhuosi Xie, Tianqi Yang:
Establishing Trusted I/O Paths for SGX Client Systems With Aurora. 1589-1600 - Wojciech Michal Matkowski

, Tingting Chai, Adams Wai-Kin Kong
:
Palmprint Recognition in Uncontrolled and Uncooperative Environment. 1601-1615 - Anurag Chowdhury

, Arun Ross:
Fusing MFCC and LPC Features Using 1D Triplet CNN for Speaker Recognition in Severely Degraded Audio Signals. 1616-1629 - Ankit Gangwal

, Mauro Conti
:
Cryptomining Cannot Change Its Spots: Detecting Covert Cryptomining Using Magnetic Side-Channel. 1630-1639 - Qiangchang Wang

, Guodong Guo
:
LS-CNN: Characterizing Local Patches at Multiple Scales for Face Recognition. 1640-1653 - Jie Cui

, Xiaoyu Zhang
, Hong Zhong
, Jing Zhang, Lu Liu
:
Extensible Conditional Privacy Protection Authentication Scheme for Secure Vehicular Networks in a Multi-Cloud Environment. 1654-1667 - Heedo Kang

, Vinod Yegneswaran, Shalini Ghosh, Phillip A. Porras, Seungwon Shin
:
Automated Permission Model Generation for Securing SDN Control-Plane. 1668-1682 - Yushu Zhang

, Xiangli Xiao
, Lu-Xing Yang
, Yong Xiang
, Sheng Zhong:
Secure and Efficient Outsourcing of PCA-Based Face Recognition. 1683-1695 - Shuangyi Zhu

, Yuan Ma
, Xusheng Li, Jing Yang
, Jingqiang Lin, Jiwu Jing:
On the Analysis and Improvement of Min-Entropy Estimation on Time-Varying Data. 1696-1708 - Jean-Claude Bajard

, Paulo Martins
, Leonel Sousa
, Vincent Zucca
:
Improving the Efficiency of SVM Classification With FHE. 1709-1722 - Xueru Zhang

, Mohammad Mahdi Khalili
, Mingyan Liu
:
Recycled ADMM: Improving the Privacy and Accuracy of Distributed Algorithms. 1723-1734 - Luiz G. Hafemann

, Robert Sabourin
, Luiz S. Oliveira:
Meta-Learning for Fast Classifier Adaptation to New Users of Signature Verification Systems. 1735-1745 - Nguyen Binh Truong

, Kai Sun, Gyu Myoung Lee
, Yike Guo
:
GDPR-Compliant Personal Data Management: A Blockchain-Based Solution. 1746-1761 - Liming Zhai

, Lina Wang
, Yanzhen Ren
:
Universal Detection of Video Steganography in Multiple Domains Based on the Consistency of Motion Vectors. 1762-1777 - Qin Hu

, Shengling Wang
, Xiuzhen Cheng
, Liran Ma
, Rongfang Bie
:
Solving the Crowdsourcing Dilemma Using the Zero-Determinant Strategies. 1778-1789 - Amit Praseed

, P. Santhi Thilagam
:
Multiplexed Asymmetric Attacks: Next-Generation DDoS on HTTP/2 Servers. 1790-1800 - Parinaz Naghizadeh

, Mingyan Liu
:
Using Private and Public Assessments in Security Information Sharing Agreements. 1801-1814 - David Vázquez-Padín

, Marco Fontani
, Dasara Shullani
, Fernando Pérez-González, Alessandro Piva
, Mauro Barni
:
Video Integrity Verification and GOP Size Estimation Via Generalized Variation of Prediction Footprint. 1815-1830 - Sarankumar Balakrishnan

, Shreya Gupta, Arupjyoti Bhuyan
, Pu Wang
, Dimitrios Koutsonikolas
, Zhi Sun
:
Physical Layer Identification Based on Spatial-Temporal Beam Features for Millimeter-Wave Wireless Networks. 1831-1845 - Erkam Uzun

, Hüsrev T. Sencar
:
JpgScraper: An Advanced Carver for JPEG Files. 1846-1857 - Jin Sung Kang

, Yuri A. Lawryshyn, Dimitrios Hatzinakos
:
Neural Network Architecture and Transient Evoked Otoacoustic Emission (TEOAE) Biometrics for Identification and Verification. 1858-1867 - Guang Hua

, Haijian Zhang
:
ENF Signal Enhancement in Audio Recordings. 1868-1878 - Mordechai Guri

, Boris Zadov, Dima Bykhovsky
, Yuval Elovici
:
PowerHammer: Exfiltrating Data From Air-Gapped Computers Through Power Lines. 1879-1890 - Baki Berkay Yilmaz

, Nader Sehatbakhsh
, Alenka G. Zajic
, Milos Prvulovic
:
Communication Model and Capacity Limits of Covert Channels Created by Software Activities. 1891-1904 - Sayandeep Saha

, Dirmanto Jap
, Debapriya Basu Roy
, Avik Chakraborty, Shivam Bhasin
, Debdeep Mukhopadhyay
:
A Framework to Counter Statistical Ineffective Fault Analysis of Block Ciphers Using Domain Transformation and Error Correction. 1905-1919 - Cristian Hristea

, Ferucio Laurentiu Tiplea
:
Privacy of Stateful RFID Systems With Constant Tag Identifiers. 1920-1934 - Hridoy Sankar Dutta

, Tanmoy Chakraborty
:
Blackmarket-Driven Collusion Among Retweeters-Analysis, Detection, and Characterization. 1935-1944 - Gurjit Singh Walia

, Gaurav Jain
, Nipun Bansal, Kuldeep Singh
:
Adaptive Weighted Graph Approach to Generate Multimodal Cancelable Biometric Templates. 1945-1958 - Kwang-Yul Kim

, Yoan Shin
:
Analysis on Cross-Correlation Coefficient for Survivability of Chirp Spread Spectrum Systems. 1959-1967 - Anshul Arora

, Sateesh Kumar Peddoju
, Mauro Conti
:
PermPair: Android Malware Detection Using Permission Pairs. 1968-1982 - Mahmoud Alageli

, Aïssa Ikhlef, Fahad Alsifiany
, Mohammed A. M. Abdullah
, Gaojie Chen
, Jonathon A. Chambers
:
Optimal Downlink Transmission for Cell-Free SWIPT Massive MIMO Systems With Active Eavesdropping. 1983-1998 - Wonwoo Cho

, Nam Yul Yu
:
Secure and Efficient Compressed Sensing-Based Encryption With Sparse Matrices. 1999-2011 - Borzoo Rassouli

, Fernando E. Rosas
, Deniz Gündüz
:
Data Disclosure Under Perfect Sample Privacy. 2012-2025 - Rui Zhang

, Quanyan Zhu
:
FlipIn: A Game-Theoretic Cyber Insurance Framework for Incentive-Compatible Cyber Risk Management of Internet of Things. 2026-2041 - Wenjie Xiong

, André Schaller
, Stefan Katzenbeisser, Jakub Szefer
:
Software Protection Using Dynamic PUFs. 2053-2068 - Tatsuya Yasui

, Minoru Kuribayashi
, Nobuo Funabiki, Isao Echizen:
Near-Optimal Detection for Binary Tardos Code by Estimating Collusion Strategy. 2069-2080 - Yaofei Wang

, Weiming Zhang
, Weixiang Li
, Xinzhi Yu, Nenghai Yu
:
Non-Additive Cost Functions for Color Image Steganography Based on Inter-Channel Correlations and Differences. 2081-2095 - Lingling Xu

, Wanhua Li
, Fangguo Zhang
, Rong Cheng, Shaohua Tang:
Authorized Keyword Searches on Public Key Encrypted Data With Time Controlled Keyword Privacy. 2096-2109 - Arpan Jati

, Naina Gupta
, Anupam Chattopadhyay
, Somitra Kumar Sanadhya
, Donghoon Chang:
Threshold Implementations of GIFT: A Trade-Off Analysis. 2110-2120 - Junhui He

, Junxi Chen, Shaohua Tang
:
Reversible Data Hiding in JPEG Images Based on Negative Influence Models. 2121-2133 - Jun-Liu Zhong, Chi-Man Pun

:
An End-to-End Dense-InceptionNet for Image Copy-Move Forgery Detection. 2134-2146 - Mohammad Esmaeilpour

, Patrick Cardinal, Alessandro Lameiras Koerich
:
A Robust Approach for Securing Audio Classification Against Adversarial Attacks. 2147-2159 - Jichen Yang

, Rohan Kumar Das
, Haizhou Li
:
Significance of Subband Features for Synthetic Speech Detection. 2160-2170 - Zhongwu Xiang

, Weiwei Yang
, Gaofeng Pan
, Yueming Cai
, Yi Song
, Yulong Zou
:
Secure Transmission in HARQ-Assisted Non-Orthogonal Multiple Access Networks. 2171-2182 - Kostantinos Papadamou

, Steven Gevers, Christos Xenakis
, Michael Sirivianos, Savvas Zannettou, Bogdan Chifor, Sorin Teican, George Gugulea
, Alberto Caponi, Annamaria Recupero
, Claudio Pisa, Giuseppe Bianchi:
Killing the Password and Preserving Privacy With Device-Centric and Attribute-Based Authentication. 2183-2193 - Guilei Hu, Yang Xiao

, Zhiguo Cao
, Lubin Meng, Zhiwen Fang
, Joey Tianyi Zhou
, Junsong Yuan
:
Towards Real-Time Eyeblink Detection in the Wild: Dataset, Theory and Practices. 2194-2208 - Haina Song

, Tao Luo
, Xun Wang, Jianfeng Li:
Multiple Sensitive Values-Oriented Personalized Privacy Preservation Based on Randomized Response. 2209-2224 - Xiaochun Yun, Ji Huang

, Yipeng Wang
, Tianning Zang, Yuan Zhou, Yongzheng Zhang:
Khaos: An Adversarial Neural Network DGA With High Anti-Detection Ability. 2225-2240 - Lingshuang Du, Haifeng Hu

, Yongbo Wu:
Cycle Age-Adversarial Model Based on Identity Preserving Network and Transfer Learning for Cross-Age Face Recognition. 2241-2252 - Yuankun Huang

, Bin Li
, Mauro Barni
, Jiwu Huang
:
Identification of VoIP Speech With Multiple Domain Deep Features. 2253-2267 - Diana Pamela Moya Osorio

, Hirley Alves
, Edgar Eduardo Benitez Olivo
:
On the Secrecy Performance and Power Allocation in Relaying Networks With Untrusted Relay in the Partial Secrecy Regime. 2268-2281 - Junqi Wu

, Bolin Chen, Weiqi Luo
, Yanmei Fang:
Audio Steganography Based on Iterative Adversarial Attacks Against Convolutional Neural Networks. 2282-2294 - Masahito Hayashi

, Ángeles Vázquez-Castro
:
Physical Layer Security Protocol for Poisson Channels for Passive Man-in-the-Middle Attack. 2295-2305 - Tong Zhang

, Xiaolong Li
, Wenfa Qi, Zongming Guo
:
Location-Based PVO and Adaptive Pairwise Modification for Efficient Reversible Data Hiding. 2306-2319 - Zhenyong Zhang

, Ruilong Deng
, David K. Y. Yau, Peng Cheng
, Jiming Chen
:
Analysis of Moving Target Defense Against False Data Injection Attacks on Power Grid. 2320-2335 - Renyong Wu

, Chao Yuan, Ning Zhang
, Kim-Kwang Raymond Choo
:
A Two-Dimensional Vectorized Secure Transmission Scheme for Wireless Communications. 2336-2345 - Amir Alipour-Fanid

, Monireh Dabaghchian
, Ning Wang
, Pu Wang
, Liang Zhao
, Kai Zeng
:
Machine Learning-Based Delay-Aware UAV Detection and Operation Mode Identification Over Encrypted Wi-Fi Traffic. 2346-2360 - Jiucheng Xie

, Chi-Man Pun
:
Deep and Ordinal Ensemble Learning for Human Age Estimation From Facial Images. 2361-2374 - Navaneet K. L.

, Ravi Kiran Sarvadevabhatla
, Shashank Shekhar, R. Venkatesh Babu
, Anirban Chakraborty
:
Operator-in-the-Loop Deep Sequential Multi-Camera Feature Fusion for Person Re-Identification. 2375-2385 - Jong-Hyuk Im

, Seong-Yun Jeon, Mun-Kyu Lee
:
Practical Privacy-Preserving Face Authentication for Smartphones Secure Against Malicious Clients. 2386-2401 - Shun-Wen Hsiao

, Yeali S. Sun, Meng Chang Chen
:
Hardware-Assisted MMU Redirection for In-Guest Monitoring and API Profiling. 2402-2416 - Min Xia

, Xu Zhang
, Wan'an Liu, Liguo Weng
, Yiqing Xu
:
Multi-Stage Feature Constraints Learning for Age Estimation. 2417-2428 - Chao Lin

, Debiao He
, Xinyi Huang
, Muhammad Khurram Khan
, Kim-Kwang Raymond Choo
:
DCAP: A Secure and Efficient Decentralized Conditional Anonymous Payment System Based on Blockchain. 2440-2452 - Yang Liu

, Ting Liu
, Hong Sun, Kehuan Zhang, Pengfei Liu:
Hidden Electricity Theft by Exploiting Multiple-Pricing Scheme in Smart Grids. 2453-2468 - Meng Yang

, Wei Wen, Xing Wang
, Linlin Shen
, Guangwei Gao
:
Adaptive Convolution Local and Global Learning for Class-Level Joint Representation of Facial Recognition With a Single Sample Per Data Subject. 2469-2484 - S. V. Sandeep Avvaru

, Ziqing Zeng
, Keshab K. Parhi
:
Homogeneous and Heterogeneous Feed-Forward XOR Physical Unclonable Functions. 2485-2498 - Bo-Wei Tseng

, Pei-Yuan Wu
:
Compressive Privacy Generative Adversarial Network. 2499-2513 - Deepak Sirone

, Pramod Subramanyan
:
Functional Analysis Attacks on Logic Locking. 2514-2527 - Zhongwu Xiang

, Weiwei Yang
, Yueming Cai
, Zhiguo Ding
, Yi Song
:
Secure Transmission Design in HARQ Assisted Cognitive NOMA Networks. 2528-2541 - Gaëtan Cassiers

, François-Xavier Standaert
:
Trivially and Efficiently Composing Masked Gadgets With Probe Isolating Non-Interference. 2542-2555 - Sahar Haddad

, Gouenou Coatrieux, Alexandre Moreau-Gaudry, Michel Cozic:
Joint Watermarking-Encryption-JPEG-LS for Medical Image Reliability Control in Encrypted and Compressed Domains. 2556-2569 - Xiang Liu

, Teng Joon Lim
, Jie Huang:
Optimal Byzantine Attacker Identification Based on Game Theory in Network Coding Enabled Wireless Ad Hoc Networks. 2570-2583 - Wei Guo

, Su-Juan Qin
, Fei Gao
, Hua Zhang
, Wenmin Li
, Zhengping Jin
, Qiaoyan Wen
:
Comments on "Provable Multicopy Dynamic Data Possession in Cloud Computing Systems". 2584-2586 - Sani M. Abdullahi

, Hongxia Wang, Tao Li
:
Fractal Coding-Based Robust and Alignment-Free Fingerprint Image Hashing. 2587-2601 - Christian Miranda, Georges Kaddoum

, Elias Bou-Harb
, Sahil Garg
, Kuljeet Kaur
:
A Collaborative Security Framework for Software-Defined Wireless Sensor Networks. 2602-2615 - Ruben Tolosana

, Rubén Vera-Rodríguez
, Julian Fiérrez
, Javier Ortega-Garcia
:
BioTouchPass2: Touchscreen Password Biometrics Using Time-Aligned Recurrent Neural Networks. 2616-2628 - Lin Zhou

:
Multiple Private Key Generation for Continuous Memoryless Sources With a Helper. 2629-2640 - Ridvan Salih Kuzu

, Emanuela Piciucco
, Emanuele Maiorana
, Patrizio Campisi
:
On-the-Fly Finger-Vein-Based Biometric Recognition Using Deep Neural Networks. 2641-2654 - Mang Ye

, Pong C. Yuen
:
PurifyNet: A Robust Person Re-Identification Model With Noisy Labels. 2655-2666 - Hridoy Sankar Dutta

, Vishal Raj Dutta, Aditya Adhikary
, Tanmoy Chakraborty
:
HawkesEye: Detecting Fake Retweeters Using Hawkes Process and Topic Modeling. 2667-2678 - Yunlian Sun

, Jinhui Tang
, Xiangbo Shu
, Zhenan Sun
, Massimo Tistarelli
:
Facial Age Synthesis With Label Distribution-Guided Generative Adversarial Network. 2679-2691 - Nasser Aldaghri

, Hessam Mahdavifar
:
Physical Layer Secret Key Generation in Static Environments. 2692-2705 - Yuanquan Hong

, Xiaojun Jing
, Hui Gao
, Yuan He
:
Fixed Region Beamforming Using Frequency Diverse Subarray for Secure mmWave Wireless Communications. 2706-2721 - Malihe Aliasgari

, Osvaldo Simeone
, Jörg Kliewer
:
Private and Secure Distributed Matrix Multiplication With Flexible Communication Load. 2722-2734 - Leye Wang

, Daqing Zhang, Dingqi Yang
, Brian Y. Lim, Xiao Han
, Xiaojuan Ma
:
Sparse Mobile Crowdsensing With Differential and Distortion Location Privacy. 2735-2749 - Daniele Cono D'Elia

, Emilio Coppa
, Federico Palmaro
, Lorenzo Cavallaro
:
On the Dissection of Evasive Malware. 2750-2765 - Zhihai Yang

, Qindong Sun, Yaling Zhang, Lei Zhu, Wenjiang Ji:
Inference of Suspicious Co-Visitation and Co-Rating Behaviors and Abnormality Forensics for Recommender Systems. 2766-2781 - Mohannad Alhanahnah

, Qiben Yan
, Hamid Bagheri, Hao Zhou
, Yutaka Tsutano, Witawas Srisa-an
, Xiapu Luo
:
DINA: Detecting Hidden Android Inter-App Communication in Dynamic Loaded Code. 2782-2797 - Sehee Lim

, Byungkyu Song, Seong-Ook Jung
:
Highly Independent MTJ-Based PUF System Using Diode-Connected Transistor and Two-Step Postprocessing for Improved Response Stability. 2798-2807 - Atul Prasad Deb Nath

, Srivalli Boddupalli, Swarup Bhunia
, Sandip Ray:
Resilient System-on-Chip Designs With NoC Fabrics. 2808-2823 - Yue Zheng

, Xiaojin Zhao
, Takashi Sato
, Yuan Cao
, Chip-Hong Chang
:
Ed-PUF: Event-Driven Physical Unclonable Function for Camera Authentication in Reactive Monitoring System. 2824-2839 - Wanli Wen

, Chenxi Liu
, Yaru Fu
, Tony Q. S. Quek
, Fu-Chun Zheng
, Shi Jin
:
Enhancing Physical Layer Security of Random Caching in Large-Scale Multi-Antenna Heterogeneous Wireless Networks. 2840-2855 - Mehdi Letafati

, Ali Kuhestani
, Hamid Behroozi
:
Three-Hop Untrusted Relay Networks With Hardware Imperfections and Channel Estimation Errors for Internet of Things. 2856-2868 - Loubna Ghammam, Koray Karabina

, Patrick Lacharme, Kevin Atighehchi
:
A Cryptanalysis of Two Cancelable Biometric Schemes Based on Index-of-Max Hashing. 2869-2880 - Xiong Li

, Shanpeng Liu
, Rongxing Lu
:
Comments on "A Public Auditing Protocol With Novel Dynamic Structure for Cloud Data". 2881-2883 - Yuan Liang

, Tongtong Li
:
On the Discreteness of the Worst Jamming Distribution for SP-OFDM. 2884-2897 - Jialiang Gong

, Xiaodong Xu
, Yingke Lei:
Unsupervised Specific Emitter Identification Method Using Radio-Frequency Fingerprint Embedded InfoGAN. 2898-2913 - Lin Liu

, Rongmao Chen
, Ximeng Liu
, Jinshu Su, Linbo Qiao
:
Towards Practical Privacy-Preserving Decision Tree Training and Evaluation in the Cloud. 2914-2929 - Kunrui Cao

, Buhong Wang
, Haiyang Ding
, Tengyao Li
, Jiwei Tian
, Fengkui Gong
:
Secure Transmission Designs for NOMA Systems Against Internal and External Eavesdropping. 2930-2943 - Caiyong Wang

, Jawad Muhammad, Yunlong Wang, Zhaofeng He
, Zhenan Sun
:
Towards Complete and Accurate Iris Segmentation Using Deep Multi-Task Attention Network for Non-Cooperative Iris Recognition. 2944-2959 - Yunlian Sun

, Jinhui Tang
, Zhenan Sun
, Massimo Tistarelli
:
Facial Age and Expression Synthesis Using Ordinal Ranking Adversarial Networks. 2960-2972 - Wanli Xue

, Dinusha Vatsalan
, Wen Hu
, Aruna Seneviratne
:
Sequence Data Matching and Beyond: New Privacy-Preserving Primitives Based on Bloom Filters. 2973-2987 - Eduardo Lopes Cominetti

, Marcos A. Simplício Jr.
:
Fast Additive Partially Homomorphic Encryption From the Approximate Common Divisor Problem. 2988-2998 - Tao Guo

, Ruida Zhou, Chao Tian
:
On the Information Leakage in Private Information Retrieval Systems. 2999-3012 - Sheng He

, Lambert Schomaker
:
FragNet: Writer Identification Using Deep Fragment Networks. 3013-3022 - Xiao Yang

, Wang Fat Lau, Qingqing Ye
, Man Ho Au
, Joseph K. Liu
, Jacob Cheng:
Practical Escrow Protocol for Bitcoin. 3023-3034 - David Froelicher

, Juan Ramón Troncoso-Pastoriza, Joao Sa Sousa
, Jean-Pierre Hubaux:
Drynx: Decentralized, Secure, Verifiable System for Statistical Queries and Machine Learning on Distributed Datasets. 3035-3050 - Saed Alrabaee

, Mourad Debbabi
, Lingyu Wang
:
CPA: Accurate Cross-Platform Binary Authorship Characterization Using LDA. 3051-3066 - Xudong Liu

, Sang Wu Kim
:
Harnessing Node Multiplicity for Detecting and Mitigating False Data in Wireless Relay Networks. 3067-3078 - Chenyang Tu

, Zeyi Liu, Neng Gao, Cunqing Ma, Jingquan Ge
, Lingchen Zhang:
MACM: How to Reduce the Multi-Round SCA to the Single-Round Attack on the Feistel-SP Networks. 3079-3092 - Qian Wang

, Zixi Li, Qin Zou
, Lingchen Zhao, Song Wang
:
Deep Domain Adaptation With Differential Privacy. 3093-3106 - Basker Palaniswamy

, Seyit Camtepe
, Ernest Foo
, Josef Pieprzyk
:
An Efficient Authentication Scheme for Intra-Vehicular Controller Area Network. 3107-3122 - Edlira Dushku

, Md Masoom Rabbani
, Mauro Conti
, Luigi V. Mancini
, Silvio Ranise
:
SARA: Secure Asynchronous Remote Attestation for IoT Systems. 3123-3136 - Huadi Zheng

, Haibo Hu
:
MISSILE: A System of Mobile Inertial Sensor-Based Sensitive Indoor Location Eavesdropping. 3137-3151 - Donghoon Chang

, Surabhi Garg
, Munawar Hasan
, Sweta Mishra:
Cancelable Multi-Biometric Approach Using Fuzzy Extractor and Novel Bit-Wise Encryption. 3152-3167 - Hua Deng

, Zheng Qin
, Qianhong Wu, Zhenyu Guan
, Robert H. Deng
, Yujue Wang
, Yunya Zhou:
Identity-Based Encryption Transformation for Flexible Sharing of Encrypted Data in Public Cloud. 3168-3180 - Wenyun Sun

, Yu Song
, Changsheng Chen
, Jiwu Huang
, Alex C. Kot
:
Face Spoofing Detection Based on Local Ternary Label Supervision in Fully Convolutional Networks. 3181-3196 - Qin Zou

, Yanling Wang
, Qian Wang
, Yi Zhao, Qingquan Li
:
Deep Learning-Based Gait Recognition Using Smartphones in the Wild. 3197-3212 - Kanad Basu

, Suha Sabi Hussain
, Ujjwal Gupta
, Ramesh Karri
:
COPPTCHA: COPPA Tracking by Checking Hardware-Level Activity. 3213-3226 - Hui Cui

, Zhiguo Wan
, Xinlei Wei, Surya Nepal
, Xun Yi
:
Pay as You Decrypt: Decryption Outsourcing for Functional Encryption Using Blockchain. 3227-3238 - Chengkun Wei

, Shouling Ji
, Changchang Liu, Wenzhi Chen
, Ting Wang
:
AsgLDP: Collecting and Generating Decentralized Attributed Graphs With Local Differential Privacy. 3239-3254 - Donatella Darsena

, Giacinto Gelli
, Ivan Iudice
, Francesco Verde
:
Design and Performance Analysis of Channel Estimators Under Pilot Spoofing Attacks in Multiple-Antenna Systems. 3255-3269 - Samet Taspinar

, Manoranjan Mohanty, Nasir D. Memon
:
Camera Fingerprint Extraction via Spatial Domain Averaged Frames. 3270-3282 - Fawad Ud Din

, Fabrice Labeau
:
In-Band Full-Duplex Discriminatory Channel Estimation Using MMSE. 3283-3292 - Yunxia Han

, Chunxiang Xu
, Debiao He
, Kefei Chen
:
On the Security of a Key Agreement and Key Protection Scheme. 3293-3294 - Yi Sun, Qian Liu

, Xingyuan Chen, Xuehui Du:
An Adaptive Authenticated Data Structure With Privacy-Preserving for Big Data Stream in Cloud. 3295-3310 - Xiaolong Lan, Juanjuan Ren, Qingchun Chen, Lin Cai

:
Achievable Secrecy Rate Region for Buffer-Aided Multiuser MISO Systems. 3311-3324 - Ana Nieto:

Becoming JUDAS: Correlating Users and Devices During a Digital Investigation. 3325-3334 - Gokhan Gok

, Yasar Kemal Alp, Orhan Arikan:
A New Method for Specific Emitter Identification With Results on Real Radar Measurements. 3335-3346 - Allan da Silva Pinto

, Siome Goldenstein, Alexandre M. Ferreira
, Tiago J. Carvalho, Hélio Pedrini, Anderson Rocha:
Leveraging Shape, Reflectance and Albedo From Shading for Face Presentation Attack Detection. 3347-3358 - Rang Liu

, Ming Li, Qian Liu, A. Lee Swindlehurst
:
Secure Symbol-Level Precoding in MU-MISO Wiretap Systems. 3359-3373 - Karl-Ludwig Besser

, Pin-Hsun Lin, Carsten R. Janda, Eduard A. Jorswieck
:
Wiretap Code Design by Neural Network Autoencoders. 3374-3386 - Kai Huang, Yun He

:
Trigger Identification Using Difference-Amplified Controllability and Dynamic Transition Probability for Hardware Trojan Detection. 3387-3400 - Yanxin Zhang

, Yulei Sui, Shirui Pan
, Zheng Zheng, Baodi Ning, Ivor W. Tsang
, Wanlei Zhou
:
Familial Clustering for Weakly-Labeled Android Malware Using Hybrid Representation Learning. 3401-3414 - Qichao Xu, Zhou Su, Rongxing Lu:

Game Theory and Reinforcement Learning Based Secure Edge Caching in Mobile Social Networks. 3415-3429 - Piya Limcharoen

, Nirattaya Khamsemanan, Cholwich Nattee:
View-Independent Gait Recognition Using Joint Replacement Coordinates (JRCs) and Convolutional Neural Network. 3430-3442 - Tao Ding

, Ming Qu, Xiong Wu, Boyu Qin, Yongheng Yang
, Frede Blaabjerg
:
Defense Strategy for Resilient Shipboard Power Systems Considering Sequential Attacks. 3443-3453 - Kang Wei

, Jun Li
, Ming Ding
, Chuan Ma
, Howard H. Yang, Farhad Farokhi
, Shi Jin, Tony Q. S. Quek
, H. Vincent Poor
:
Federated Learning With Differential Privacy: Algorithms and Performance Analysis. 3454-3469 - Anita Aghaie, Amir Moradi

:
TI-PUF: Toward Side-Channel Resistant Physical Unclonable Functions. 3470-3481 - Fabrizio Guerrini, Marco Dalai

, Riccardo Leonardi:
Minimal Information Exchange for Secure Image Hash-Based Geometric Transformations Estimation. 3482-3496 - Kiruba Sankaran Subramani, Noha M. Helal, Angelos Antonopoulos, Aria Nosratinia

, Yiorgos Makris
:
Amplitude-Modulating Analog/RF Hardware Trojans in Wireless Networks: Risks and Remedies. 3497-3510 - Qian Han

, V. S. Subrahmanian
, Yanhai Xiong
:
Android Malware Detection via (Somewhat) Robust Irreversible Feature Transformations. 3511-3525 - Sima Bagheri

, Alireza Shameli-Sendi
:
Dynamic Firewall Decomposition and Composition in the Cloud. 3526-3539 - Congyuan Xu, Jizhong Shen

, Xin Du
:
A Method of Few-Shot Network Intrusion Detection Based on Meta-Learning Framework. 3540-3552 - Songxuan Lai

, Yecheng Zhu, Lianwen Jin
:
Encoding Pathlet and SIFT Features With Bagged VLAD for Historical Writer Identification. 3553-3566 - Chandranath Adak

, Bidyut B. Chaudhuri
, Chin-Teng Lin
, Michael Blumenstein
:
Intra-Variable Handwriting Inspection Reinforced With Idiosyncrasy Analysis. 3567-3579 - Amir Ameli

, Khaled A. Saleh
, Aram Kirakosyan, Ehab F. El-Saadany
, Magdy M. A. Salama
:
An Intrusion Detection Method for Line Current Differential Relays in Medium-Voltage DC Microgrids. 3580-3594 - Mohamed Ibrahim

, Tung-Che Liang
, Kristin Scott, Krishnendu Chakrabarty
, Ramesh Karri
:
Molecular Barcoding as a Defense Against Benchtop Biochemical Attacks on DNA Fingerprinting and Information Forensics. 3595-3609 - Antonio Greco

, Nicolai Petkov
, Alessia Saggese
, Mario Vento
:
AReN: A Deep Learning Approach for Sound Event Recognition Using a Brain Inspired Representation. 3610-3624 - Ulrich Scherhag

, Christian Rathgeb
, Johannes Merkle, Christoph Busch
:
Deep Face Representations for Differential Morphing Attack Detection. 3625-3639 - Jing Li

, Yuangang Pan
, Yulei Sui, Ivor W. Tsang
:
Secure Metric Learning via Differential Pairwise Privacy. 3640-3652 - Zisheng Wang

, Rick S. Blum
:
A Statistical Learning-Based Algorithm for Topology Verification in Natural Gas Networks Based on Noisy Sensor Measurements. 3653-3666 - Chaimae Boudagdigue

, Abderrahim Benslimane
, Abdellatif Kobbane, Jiajia Liu
:
Trust Management in Industrial Internet of Things. 3667-3682 - Chengtang Yao, Yunde Jia, Huijun Di

, Yuwei Wu:
Face Spoofing Detection Using Relativity Representation on Riemannian Manifold. 3683-3693 - Jingdian Ming

, Yongbin Zhou, Wei Cheng
, Huizhong Li
, Guang Yang
, Qian Zhang
:
Mind the Balance: Revealing the Vulnerabilities in Low Entropy Masking Schemes. 3694-3708 - Qi Feng, Debiao He

, Zhe Liu
, Huaqun Wang
, Kim-Kwang Raymond Choo
:
SecureNLP: A System for Multi-Party Privacy-Preserving Natural Language Processing. 3709-3721 - Zhifang Gu

, He Henry Chen
, Pingping Xu
, Yonghui Li
, Branka Vucetic
:
Physical Layer Authentication for Non-Coherent Massive SIMO-Enabled Industrial IoT Communications. 3722-3733 - Liang Sun

, Lu Cao, Zhiyao Tang, Yong Feng
:
Artificial-Noise-Aided Secure Multi-User Multi-Antenna Transmission With Quantized CSIT: A Comprehensive Design and Analysis. 3734-3748 - Salman Salamatian

, Wasim Huleihel
, Ahmad Beirami
, Asaf Cohen
, Muriel Médard:
Centralized vs Decentralized Targeted Brute-Force Attacks: Guessing With Side-Information. 3749-3759 - Zhexian Shen

, Kui Xu
, Xiaochen Xia
, Wei Xie, Dongmei Zhang:
Spatial Sparsity Based Secure Transmission Strategy for Massive MIMO Systems Against Simultaneous Jamming and Eavesdropping. 3760-3774 - Shuangrui Zhao

, Jia Liu
, Yulong Shen
, Xiaohong Jiang
, Norio Shiratori:
Secure Beamforming for Full-Duplex MIMO Two-Way Untrusted Relay Systems. 3775-3790 - Boxiang He

, Fanggang Wang
:
Cooperative Specific Emitter Identification via Multiple Distorted Receivers. 3791-3806 - Yubao Zhang

, Jidong Xiao
, Shuai Hao
, Haining Wang
, Sencun Zhu
, Sushil Jajodia
:
Understanding the Manipulation on Recommender Systems through Web Injection. 3807-3818 - Ali Shahin Shamsabadi

, Adrià Gascón, Hamed Haddadi, Andrea Cavallaro
:
PrivEdge: From Local to Distributed Private Training and Prediction. 3819-3831 - Anxiao He, Kai Bu

, Yucong Li, Eikoh Chida, Qianping Gu, Kui Ren
:
Atomos: Constant-Size Path Validation Proof. 3832-3847 - Xuehu Yan

, Yuliang Lu
, Lintao Liu
, Xianhua Song
:
Reversible Image Secret Sharing. 3848-3858 - Wenguang He

, Zhanchuan Cai
:
An Insight Into Pixel Value Ordering Prediction-Based Prediction-Error Expansion. 3859-3871 - Xinyu Li

, Jing Xu
, Xiong Fan
, Yuchen Wang, Zhenfeng Zhang:
Puncturable Signatures and Applications in Proof-of-Stake Blockchain Protocols. 3872-3885 - Deqiang Li

, Qianmu Li
:
Adversarial Deep Ensemble: Evasion Attacks and Defenses for Malware Detection. 3886-3900 - Sherif Nagib Abbas Seha

, Dimitrios Hatzinakos
:
EEG-Based Human Recognition Using Steady-State AEPs and Subject-Unique Spatial Filters. 3901-3910 - Ni Ding

, Farhad Farokhi
:
Developing Non-Stochastic Privacy-Preserving Policies Using Agglomerative Clustering. 3911-3923 - Hanzhuo Tan

, Ajay Kumar
:
Towards More Accurate Contactless Fingerprint Minutiae Extraction and Pose-Invariant Matching. 3924-3937 - Xinrui Tan

, Hongjia Li
, Liming Wang, Zhen Xu:
Comments on "Dropping Activation Outputs with Localized First-Layer Deep Network for Enhancing User Privacy and Data Security". 3938-3939 - Hussain M. J. Almohri

, Layne T. Watson, David Evans
:
An Attack-Resilient Architecture for the Internet of Things. 3940-3954 - Minchul Kim

, Heecheol Yang
, Jungwoo Lee
:
Private Coded Matrix Multiplication. 1434-1443 - Hyunsoo Kwon

, Hyunjae Nam, Sangtae Lee, Changhee Hahn
, Junbeom Hur:
(In-)Security of Cookies in HTTPS: Cookie Theft by Removing Cookie Flags. 1204-1215 - Samiran Bag

, Feng Hao
, Siamak F. Shahandashti
, Indranil Ghosh Ray
:
SEAL: Sealed-Bid Auction Without Auctioneers. 2042-2052 - Kyung-Ah Shim

, Namhun Koo
:
Algebraic Fault Analysis of UOV and Rainbow With the Leakage of Random Vinegar Values. 2429-2439

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














