


default search action
IEEE Transactions on Information Forensics and Security, Volume 17
Volume 17, 2022
- Aslí Bay

, Zekeriya Erkin
, Jaap-Henk Hoepman, Simona Samardjiska, Jelle Vos
:
Practical Multi-Party Private Set Intersection Protocols. 1-15 - Ehsan Nekouei

, Mohammad Pirani
, Henrik Sandberg
, Karl Henrik Johansson
:
A Randomized Filtering Strategy Against Inference Attacks on Active Steering Control Systems. 16-27 - Guohou Shan

, Boxin Zhao, James R. Clavin, Haibin Zhang, Sisi Duan
:
Poligraph: Intrusion-Tolerant and Distributed Fake News Detection System. 28-41 - Juan E. Tapia

, Sebastian Gonzalez, Christoph Busch
:
Iris Liveness Detection Using a Cascade of Dedicated Deep Learning Networks. 42-52 - Mohammad Ragheb

, Sayed Mostafa Safavi Hemami, Ali Kuhestani
, Derrick Wing Kwan Ng
, Lajos Hanzo
:
On the Physical Layer Security of Untrusted Millimeter Wave Relaying Networks: A Stochastic Geometry Approach. 53-68 - Yang Liu

, Zhuo Ma
, Ximeng Liu
, Siqi Ma
, Kui Ren
:
Privacy-Preserving Object Detection for Medical Images With Faster R-CNN. 69-84 - Uppalapati Somalatha

, Parthajit Mohapatra
:
Role of Shared Key for Secure Communication Over 2-User Gaussian Z-Interference Channel. 85-98 - Yuanyu Zhang

, Yulong Shen
, Xiaohong Jiang
, Shoji Kasahara
:
Secure Millimeter-Wave Ad Hoc Communications Using Physical Layer Security. 99-114 - Dongming Wu

, Mang Ye
, Gaojie Lin, Xin Gao
, Jianbing Shen
:
Person Re-Identification by Context-Aware Part Attention and Multi-Head Collaborative Learning. 115-126 - Vítor Albiero

, Kai Zhang, Michael C. King, Kevin W. Bowyer
:
Gendered Differences in Face Recognition Accuracy Explained by Hairstyles, Makeup, and Facial Morphology. 127-137 - Yunpei Jia

, Jie Zhang
, Shiguang Shan
:
Dual-Branch Meta-Learning Network With Distribution Alignment for Face Anti-Spoofing. 138-151 - Jungang Yang

, Liyao Xiang
, Ruidong Chen, Weiting Li
, Baochun Li
:
Differential Privacy for Tensor-Valued Queries. 152-164 - Amirreza Zamani

, Tobias J. Oechtering
, Mikael Skoglund
:
Data Disclosure With Non-Zero Leakage and Non-Invertible Leakage Matrix. 165-179 - Linghui Zhou

, Tobias J. Oechtering
, Mikael Skoglund
:
Fundamental Limits-Achieving Polar Code Designs for Biometric Identification and Authentication. 180-195 - Steven A. Grosz

, Joshua J. Engelsma
, Eryun Liu
, Anil K. Jain
:
C2CL: Contact to Contactless Fingerprint Matching. 196-210 - Guyue Li

, Chen Sun
, Wei Xu
, Marco Di Renzo
, Aiqun Hu
:
On Maximizing the Sum Secret Key Rate for Reconfigurable Intelligent Surface-Assisted Multiuser Systems. 211-225 - Yuanrong Xu

, Yao Lu
, Fanglin Chen
, Guangming Lu
, David Zhang
:
High Resolution Fingerprint Retrieval Based on Pore Indexing and Graph Comparison. 226-236 - Xiaoning Liu

, Bang Wu
, Xingliang Yuan
, Xun Yi
:
Leia: A Lightweight Cryptographic Neural Network Inference System at the Edge. 237-252 - Yimeng Ge

, Jiancun Fan
:
Robust Secure Beamforming for Intelligent Reflecting Surface Assisted Full-Duplex MISO Systems. 253-264 - Cristiano Gratton

, Naveen K. D. Venkategowda
, Reza Arablouei
, Stefan Werner
:
Privacy-Preserved Distributed Learning With Zeroth-Order Optimization. 265-279 - Saeedreza Shehnepoor

, Roberto Togneri
, Wei Liu
, Mohammed Bennamoun
:
ScoreGAN: A Fraud Review Detector Based on Regulated GAN With Data Augmentation. 280-291 - Rossano Gaeta

:
On the Impact of Pollution Attacks on Coding-Based Distributed Storage Systems. 292-302 - Wenqi Wei

, Ling Liu
:
Gradient Leakage Attack Resilient Deep Learning. 303-316 - Yafang Yang

, Lei Zhang
, Yunlei Zhao
, Kim-Kwang Raymond Choo
, Yan Zhang
:
Privacy-Preserving Aggregation-Authentication Scheme for Safety Warning System in Fog-Cloud Based VANET. 317-331 - Ángeles Vázquez-Castro

:
Asymptotically Guaranteed Anti-Jamming Spread Spectrum Random Access Without Pre-Shared Secret. 332-343 - Jianyang Gu

, Weihua Chen
, Hao Luo
, Fan Wang
, Hao Li
, Wei Jiang
, Weijie Mao
:
Multi-View Evolutionary Training for Unsupervised Domain Adaptive Person Re-Identification. 344-356 - Mahdi Khosravy

, Kazuaki Nakamura
, Yuki Hirose, Naoko Nitta, Noboru Babaguchi:
Model Inversion Attack by Integration of Deep Generative Models: Privacy-Sensitive Face Generation From a Face Recognition System. 357-372 - Benoît Bonnet

, Teddy Furon
, Patrick Bas
:
Generating Adversarial Images in Quantized Domains. 373-385 - Mang Ye

, Cuiqun Chen
, Jianbing Shen
, Ling Shao
:
Dynamic Tri-Level Relation Mining With Attentive Graph for Visible Infrared Re-Identification. 386-398 - Jiucheng Xie

, Chi-Man Pun
, Kin-Man Lam:
Implicit and Explicit Feature Purification for Age-Invariant Facial Representation Learning. 399-412 - Bingyao Yu

, Jiwen Lu
, Xiu Li
, Jie Zhou
:
Salience-Aware Face Presentation Attack Detection via Deep Reinforcement Learning. 413-427 - Amanda Cristina Davi Resende, Davis Railsback, Rafael Dowsley

, Anderson C. A. Nascimento
, Diego F. Aranha
:
Fast Privacy-Preserving Text Classification Based on Secure Multiparty Computation. 428-442 - Haiwei Wu

, Jiantao Zhou
, Jinyu Tian
, Jun Liu
, Yu Qiao
:
Robust Image Forgery Detection Against Transmission Over Online Social Networks. 443-456 - Mingliang Chen

, Xin Liao
, Min Wu
:
PulseEdit: Editing Physiological Signals in Facial Videos for Privacy Protection. 457-471 - Tian Li

, Huaqun Wang
, Debiao He
, Jia Yu
:
Synchronized Provable Data Possession Based on Blockchain for Digital Twin. 472-485 - Qi Li

, Xinhao Deng
, Zhuotao Liu
, Yuan Yang, Xiaoyue Zou
, Qian Wang
, Mingwei Xu
, Jianping Wu:
Dynamic Network Security Function Enforcement via Joint Flow and Function Scheduling. 486-499 - Yukai Wang

, Chunlei Peng
, Decheng Liu
, Nannan Wang
, Xinbo Gao
:
ForgeryNIR: Deep Face Forgery and Detection in Near-Infrared Scenario. 500-515 - Mingyang Zhang, Yang Xiao

, Fu Xiong, Shuai Li, Zhiguo Cao
, Zhiwen Fang
, Joey Tianyi Zhou
:
Person Re-Identification With Hierarchical Discriminative Spatial Aggregation. 516-530 - Zhihai Yang

, Qindong Sun
, Zhaoli Liu:
Three Birds With One Stone: User Intention Understanding and Influential Neighbor Disclosure for Injection Attack Detection. 531-546 - Peipeng Yu

, Jianwei Fei
, Zhihua Xia
, Zhili Zhou
, Jian Weng
:
Improving Generalization by Commonality Learning in Face Forgery Detection. 547-558 - Kejun Chen, Orlando Arias, Qingxu Deng

, Daniela Oliveira
, Xiaolong Guo
, Yier Jin
:
FineDIFT: Fine-Grained Dynamic Information Flow Tracking for Data-Flow Integrity Using Coprocessor. 559-573 - Olivier Bronchain

, François Durvaux, Loïc Masure
, François-Xavier Standaert
:
Efficient Profiled Side-Channel Analysis of Masked Implementations, Extended. 574-584 - Linsen Song

, Wayne Wu, Chen Qian, Ran He, Chen Change Loy:
Everybody's Talkin': Let Me Talk as You Want. 585-598 - Pei Peng

, Emina Soljanin:
Covert, Low-Delay, Coded Message Passing in Mobile (IoT) Networks. 599-611 - Mary Scott

, Graham Cormode
, Carsten Maple:
Aggregation and Transformation of Vector-Valued Messages in the Shuffle Model of Differential Privacy. 612-627 - Onur Dizdar

, Bruno Clerckx
:
Rate-Splitting Multiple Access for Communications and Jamming in Multi-Antenna Multi-Carrier Cognitive Radio Systems. 628-643 - Long Li

, Yu Luo, Jing Yang, Lina Pu
:
Reinforcement Learning Enabled Intelligent Energy Attack in Green IoT Networks. 644-658 - Jie Li

, Camilla Hollanti
:
Private and Secure Distributed Matrix Multiplication Schemes for Replicated or MDS-Coded Servers. 659-669 - Moulik Choraria

, Arpan Chattopadhyay
, Urbashi Mitra
, Erik G. Ström
:
Design of False Data Injection Attack on Distributed Process Estimation. 670-683 - Prasanna Ravi

, Shivam Bhasin
, Sujoy Sinha Roy
, Anupam Chattopadhyay
:
On Exploiting Message Leakage in (Few) NIST PQC Candidates for Practical Message Recovery Attacks. 684-699 - Rafael Salema Marques

, Haider M. Al-Khateeb
, Gregory Epiphaniou
, Carsten Maple
:
APIVADS: A Novel Privacy-Preserving Pivot Attack Detection Scheme Based on Statistical Pattern Recognition. 700-715 - Baoyao Yang

, Andy Jinhua Ma
, Pong C. Yuen
:
Revealing Task-Relevant Model Memorization for Source-Protected Unsupervised Domain Adaptation. 716-731 - Xiaozhen Lu

, Liang Xiao
, Guohang Niu, Xiangyang Ji
, Qian Wang
:
Safe Exploration in Wireless Security: A Safe Reinforcement Learning Algorithm With Hierarchical Structure. 732-743 - Nimisha Limaye

, Satwik Patnaik
, Ozgur Sinanoglu
:
Valkyrie: Vulnerability Assessment Tool and Attack for Provably-Secure Logic Locking Techniques. 744-759 - Guanxiong Shen

, Junqing Zhang
, Alan Marshall
, Joseph R. Cavallaro
:
Towards Scalable and Channel-Robust Radio Frequency Fingerprint Identification for LoRa. 774-787 - Xiaohui Chen

, Zhiyu Hao, Lun Li, Lei Cui
, Yiran Zhu, Zhenquan Ding, Yongji Liu
:
CruParamer: Learning on Parameter-Augmented API Sequences for Malware Detection. 788-803 - Yanbing Ren

, Xinghua Li
, Yinbin Miao
, Bin Luo
, Jian Weng
, Kim-Kwang Raymond Choo
, Robert H. Deng
:
Towards Privacy-Preserving Spatial Distribution Crowdsensing: A Game Theoretic Approach. 804-818 - Long Zhuo, Shunquan Tan

, Bin Li
, Jiwu Huang
:
Self-Adversarial Training Incorporating Forgery Attention for Image Forgery Localization. 819-834 - Yang Xiao

, Jianping Zeng
:
Dynamically Generate Password Policy via Zipf Distribution. 835-848 - Wenjing Zhang

, Bo Jiang
, Ming Li
, Xiaodong Lin
:
Privacy-Preserving Aggregate Mobility Data Release: An Information-Theoretic Deep Reinforcement Learning Approach. 849-864 - Rizhao Cai

, Zhi Li
, Renjie Wan
, Haoliang Li
, Yongjian Hu
, Alex C. Kot
:
Learning Meta Pattern for Face Anti-Spoofing. 1201-1213 - Yanbin Wang

, Haitao Xu
, Zhenhao Guo, Zhan Qin
, Kui Ren
:
snWF: Website Fingerprinting Attack by Ensembling the Snapshot of Deep Learning. 1214-1226 - Jinhua Ma

, Shengmin Xu
, Jianting Ning
, Xinyi Huang
, Robert H. Deng
:
Redactable Blockchain in Decentralized Setting. 1227-1242 - Shengjie Chen

, Zhenhua Guo
, Xiu Li
, Dongliang Yang
:
Query2Set: Single-to-Multiple Partial Fingerprint Recognition Based on Attention Mechanism. 1243-1253 - Zhuo Wang

, Qiangchang Wang
, Weihong Deng
, Guodong Guo
:
Learning Multi-Granularity Temporal Characteristics for Face Anti-Spoofing. 1254-1269 - Jin Yang

, Qishui Zhong
, Kaibo Shi
, Shouming Zhong
:
Co-Design of Observer-Based Fault Detection Filter and Dynamic Event-Triggered Controller for Wind Power System Under Dual Alterable DoS Attacks. 1270-1284 - Sekhar Rajendran

, Zhi Sun
:
RF Impairment Model-Based IoT Physical-Layer Identification for Enhanced Domain Generalization. 1285-1299 - Saba Asaad

, Yifei Wu, Ali Bereyhi
, Ralf R. Müller
, Rafael F. Schaefer
, H. Vincent Poor
:
Secure Active and Passive Beamforming in IRS-Aided MIMO Systems. 1300-1315 - Rafael Padilha

, Tawfiq Salem
, Scott Workman
, Fernanda A. Andaló
, Anderson Rocha
, Nathan Jacobs:
Content-Aware Detection of Temporal Metadata Manipulation. 1316-1327 - Rémi Cogranne

, Quentin Giboulot
, Patrick Bas
:
Efficient Steganography in JPEG Images by Minimizing Performance of Optimal Detector. 1328-1343 - Ziming Yang

, Jian Liang
, Chaoyou Fu
, Mandi Luo
, Xiaoyu Zhang
:
Heterogeneous Face Recognition via Face Synthesis With Identity-Attribute Disentanglement. 1344-1358 - Yang Yang

, Yanjiao Chen
, Fei Chen
, Jing Chen
:
An Efficient Identity-Based Provable Data Possession Protocol With Compressed Cloud Storage. 1359-1371 - Yulong Tian

, Fnu Suya
, Fengyuan Xu, David Evans
:
Stealthy Backdoors as Compression Artifacts. 1372-1387 - Donghyun Yu

, Ruei-Hau Hsu
, Jemin Lee
, Sungjin Lee
:
EC-SVC: Secure CAN Bus In-Vehicle Communications With Fine-Grained Access Control Based on Edge Computing. 1388-1403 - Zhihao Shen

, Shun Li, Xi Zhao
, Jianhua Zou:
MMAuth: A Continuous Authentication Framework on Smartphones Using Multiple Modalities. 1450-1465 - Xinran Li

, Chuan Qin
, Zichi Wang
, Zhenxing Qian
, Xinpeng Zhang
:
Unified Performance Evaluation Method for Perceptual Image Hashing. 1404-1419 - Haixia Chen

, Xinyi Huang
, Jianting Ning
, Futai Zhang
, Chao Lin
:
VILS: A Verifiable Image Licensing System. 1420-1434 - Weipeng Hu

, Haifeng Hu
:
Domain-Private Factor Detachment Network for NIR-VIS Face Recognition. 1435-1449 - Dayong Ye

, Sheng Shen
, Tianqing Zhu
, Bo Liu
, Wanlei Zhou:
One Parameter Defense - Defending Against Data Inference Attacks via Differential Privacy. 1466-1480 - Changjie Hu

, Quanzhong Li
, Qi Zhang
, Jiayin Qin:
Security Optimization for an AF MIMO Two-Way Relay-Assisted Cognitive Radio Nonorthogonal Multiple Access Networks With SWIPT. 1481-1496 - Rizka Widyarini Purwanto

, Arindam Pal
, Alan Blair
, Sanjay Jha
:
PhishSim: Aiding Phishing Website Detection With a Feature-Free Tool. 1497-1512 - Muyi Sun

, Jian Wang, Jian Liu, Jianshu Li, Tao Chen, Zhenan Sun
:
A Unified Framework for Biphasic Facial Age Translation With Noisy-Semantic Guided Generative Adversarial Networks. 1513-1527 - Jiayu Zhang, Min Li

, Min-Jian Zhao, Xiaoyu Ji
, Wenyuan Xu:
Multi-User Beam Training and Transmission Design for Covert Millimeter-Wave Communication. 1528-1543 - Meng Pang

, Binghui Wang
, Siyu Huang
, Yiu-Ming Cheung
, Bihan Wen
:
A Unified Framework for Bidirectional Prototype Learning From Contaminated Faces Across Heterogeneous Domains. 1544-1557 - Yongzhi Wang

, Xiaoyu Zhang
, Yao Wu, Yulong Shen
:
Enhancing Leakage Prevention for MapReduce. 1558-1572 - Xiao Yang

, Mengling Liu
, Man Ho Au
, Xiapu Luo
, Qingqing Ye
:
Efficient Verifiably Encrypted ECDSA-Like Signatures and Their Applications. 1573-1582 - Bin Dai

, Chong Li
, Yingbin Liang
, Zheng Ma
, Shlomo Shamai
:
Self-Secure Capacity-Achieving Feedback Schemes of Gaussian Multiple-Access Wiretap Channels With Degraded Message Sets. 1583-1596 - Peng Jiang

, Baoqi Qiu
, Liehuang Zhu
:
Report When Malicious: Deniable and Accountable Searchable Message-Moderation System. 1597-1609 - Linfeng Liu

, Zhiyuan Xi, Jiagao Wu
, Jia Xu
:
Noise-Based-Protection Message Dissemination Method for Insecure Opportunistic Underwater Sensor Networks. 1610-1623 - Wei Cheng

, Sylvain Guilley
, Jean-Luc Danger
:
Information Leakage in Code-Based Masking: A Systematic Evaluation by Higher-Order Attacks. 1624-1638 - Zhuoran Ma

, Jianfeng Ma
, Yinbin Miao
, Yingjiu Li
, Robert H. Deng
:
ShieldFL: Mitigating Model Poisoning Attacks in Privacy-Preserving Federated Learning. 1639-1654 - Xiuli Bi

, Chao Shuai
, Bo Liu
, Bin Xiao
, Weisheng Li
, Xinbo Gao
:
Privacy-Preserving Color Image Feature Extraction by Quaternion Discrete Orthogonal Moments. 1655-1668 - Mohammad Reza Nosouhi

, Keshav Sood
, Marthie Grobler
, Robin Doss
:
Towards Spoofing Resistant Next Generation IoT Networks. 1669-1683 - Alberto Cabri

, Francesco Masulli
, Stefano Rovetta
, Grazyna Suchacka
:
A Quantum-Inspired Classifier for Early Web Bot Detection. 1684-1697 - Saeid Sahraei

, Amir Salman Avestimehr, Ramy E. Ali
:
Info-Commit: Information-Theoretic Polynomial Commitment. 1698-1708 - Yanchu Li

, Lingguang Lei
, Yuewu Wang, Jiwu Jing, Quan Zhou:
TrustSAMP: Securing Streaming Music Against Multivector Attacks on ARM Platform. 1709-1724 - Yuwei Zeng

, Zhicheng Liu, Xunxun Chen, Tianning Zang:
Hidden Path: Understanding the Intermediary in Malicious Redirections. 1725-1740 - Chenqi Kong

, Baoliang Chen
, Haoliang Li
, Shiqi Wang
, Anderson Rocha
, Sam Kwong
:
Detect and Locate: Exposing Face Manipulation by Semantic- and Noise-Level Telltales. 1741-1756 - Amish Goel

, Pierre Moulin:
Fast Locally Optimal Detection of Targeted Universal Adversarial Perturbations. 1757-1770 - Kai Zhang

, Zhe Jiang
, Jianting Ning
, Xinyi Huang
:
Subversion-Resistant and Consistent Attribute-Based Keyword Search for Secure Cloud Storage. 1771-1784 - Mehmet Emre Gursoy

, Ling Liu
, Ka Ho Chow
, Stacey Truex
, Wenqi Wei
:
An Adversarial Approach to Protocol Analysis and Selection in Local Differential Privacy. 1785-1799 - Sarah A. Obead

, Hsuan-Yin Lin
, Eirik Rosnes
, Jörg Kliewer
:
Private Polynomial Function Computation for Noncolluding Coded Databases. 1800-1813 - Yuanyuan Liu

, Jiacheng Geng
, Fanhua Shang
, Weixin An
, Hongying Liu
, Qi Zhu, Wei Feng
:
Laplacian Smoothing Stochastic ADMMs With Differential Privacy Guarantees. 1814-1826 - Yujin Huang

, Chunyang Chen
:
Smart App Attack: Hacking Deep Learning Models in Android Apps. 1827-1840 - Quentin Giboulot

, Patrick Bas
, Rémi Cogranne
:
Multivariate Side-Informed Gaussian Embedding Minimizing Statistical Detectability. 1841-1854 - Navid Vafaei

, Sara Zarei
, Nasour Bagheri
, Maria Eichlseder
, Robert Primas, Hadi Soleimany
:
Statistical Effective Fault Attacks: The Other Side of the Coin. 1855-1867 - Meiyan Xiao

, Hongbo Li
, Qiong Huang
, Shui Yu
, Willy Susilo
:
Attribute-Based Hierarchical Access Control With Extendable Policy. 1868-1883 - Xiao Mei Zeng

, Qing Liu
, Jing Yun Tay, Chee Lip Gan
:
Selective Staining on Non-Volatile Memory Cells for Data Retrieval. 1884-1892 - Mahdi Soleymani

, Hessam Mahdavifar
, Amir Salman Avestimehr:
Analog Secret Sharing With Applications to Private Distributed Learning. 1893-1904 - Hao Zhou

, Geng Yang
, Hua Dai
, Guoxiu Liu:
PFLF: Privacy-Preserving Federated Learning Framework for Edge Computing. 1905-1918 - Meng Zhang

, Zhuorui Wu, Jun Yan
, Rongxing Lu
, Xiaohong Guan
:
Attack-Resilient Optimal PMU Placement via Reinforcement Learning Guided Tree Search in Smart Grids. 1919-1929 - Xiaoyu Zhang

, Hong Zhong
, Chunyang Fan, Irina Bolodurina, Jie Cui
:
CBACS: A Privacy-Preserving and Efficient Cache-Based Access Control Scheme for Software Defined Vehicular Networks. 1930-1945 - Shuyi Li

, Ruijun Ma
, Lunke Fei
, Bob Zhang:
Learning Compact Multirepresentation Feature Descriptor for Finger-Vein Recognition. 1946-1958 - Jiayu Zhou

, Wenjie Ding
, Wen Yang
:
A Secure Encoding Mechanism Against Deception Attacks on Multisensor Remote State Estimation. 1959-1969 - Peter Kairouz, Jiachun Liao

, Chong Huang, Maunil Vyas, Monica Welfert
, Lalitha Sankar
:
Generating Fair Universal Representations Using Adversarial Models. 1970-1985 - Fajun Sun

, Selena He
, Xiaotong Zhang, Jun Zhang
, Qingan Li, Yanxiang He
:
A Fully Authenticated Diffie-Hellman Protocol and Its Application in WSNs. 1986-1999 - Zhenzhu Chen

, Shang Wang, Anmin Fu
, Yansong Gao
, Shui Yu
, Robert H. Deng
:
LinkBreaker: Breaking the Backdoor-Trigger Link in DNNs via Neurons Consistency Check. 2000-2014 - Qiang Xu

, Xinghao Jiang
, Tanfeng Sun
, Alex C. Kot
:
Motion-Adaptive Detection of HEVC Double Compression With the Same Coding Parameters. 2015-2029 - Hengyi Ren

, Lijuan Sun, Jian Guo, Chong Han
:
A Dataset and Benchmark for Multimodal Biometric Recognition Based on Fingerprint and Finger Vein. 2030-2043 - Mohammad Esmaeilpour

, Patrick Cardinal, Alessandro Lameiras Koerich
:
Multidiscriminator Sobolev Defense-GAN Against Adversarial Attacks for End-to-End Speech Systems. 2044-2058 - Jiaqi Zhao

, Hui Zhu
, Fengwei Wang, Rongxing Lu
, Zhe Liu
, Hui Li
:
PVD-FL: A Privacy-Preserving and Verifiable Decentralized Federated Learning Framework. 2059-2073 - Aya Fukami

, Sasha Sheremetov, Francesco Regazzoni
, Zeno J. M. H. Geradts
, Cees de Laat:
Experimental Evaluation of e.MMC Data Recovery. 2074-2083 - Askat Kuzdeuov

, Dana Aubakirova
, Darina Koishigarina
, Huseyin Atakan Varol
:
TFW: Annotated Thermal Faces in the Wild Dataset. 2084-2094 - Mandi Luo

, Haoxue Wu, Huaibo Huang
, Weizan He, Ran He
:
Memory-Modulated Transformer Network for Heterogeneous Face Recognition. 2095-2109 - Emelie Ekenstedt

, Lawrence Ong
, Yucheng Liu
, Sarah Johnson
, Phee Lep Yeoh
, Jörg Kliewer:
When Differential Privacy Implies Syntactic Privacy. 2110-2124 - Hiranmoy Roy

, Debotosh Bhattacharjee
, Ondrej Krejcar
:
Interpretable Local Frequency Binary Pattern (LFrBP) Based Joint Continual Learning Network for Heterogeneous Face Recognition. 2125-2136 - Zhi Li

, Rizhao Cai
, Haoliang Li
, Kwok-Yan Lam
, Yongjian Hu
, Alex C. Kot
:
One-Class Knowledge Distillation for Face Presentation Attack Detection. 2137-2150 - Zhigang Lu

, Hassan Jameel Asghar
, Mohamed Ali Kâafar
, Darren Webb, Peter Dickinson:
A Differentially Private Framework for Deep Learning With Convexified Loss Functions. 2151-2165 - Shi-Jie Xu

, Guang-Gang Geng
, Xiao-Bo Jin
, Dongjie Liu
, Jian Weng
:
Seeing Traffic Paths: Encrypted Traffic Classification With Path Signature Features. 2166-2181 - Tomás Concepción Miranda

, Pierre-François Gimenez
, Jean-François Lalande
, Valérie Viet Triem Tong
, Pierre Wilke
:
Debiasing Android Malware Datasets: How Can I Trust Your Results If Your Dataset Is Biased? 2182-2197 - Jiajia Jiang

, Songxuan Lai, Lianwen Jin
, Yecheng Zhu:
DsDTW: Local Representation Learning With Deep soft-DTW for Dynamic Signature Verification. 2198-2212 - Datian Peng

, Jianmin Dong
, Jungang Yang, Qinke Peng
:
Dynamical Failures Driven by False Load Injection Attacks Against Smart Grid. 2213-2226 - Yili Jiang

, Kuan Zhang
, Yi Qian
, Liang Zhou
:
Anonymous and Efficient Authentication Scheme for Privacy-Preserving Distributed Learning. 2227-2240 - Ce Feng

, Parv Venkitasubramaniam
:
Inferential Separation for Privacy: Irrelevant Statistics and Quantization. 2241-2255 - Zhirun Zheng

, Zhetao Li
, Hongbo Jiang
, Leo Yu Zhang
, Dengbiao Tu:
Semantic-Aware Privacy-Preserving Online Location Trajectory Data Sharing. 2256-2271 - Yingfan Tao

, Wenxian Zheng, Wenming Yang
, Guijin Wang
, Qingmin Liao
:
Frontal-Centers Guided Face: Boosting Face Recognition by Learning Pose-Invariant Features. 2272-2283 - Weihang Wang

, Fei Wen
, Haoyuan Zheng, Rendong Ying
, Peilin Liu
:
Conv-MLP: A Convolution and MLP Mixed Model for Multimodal Face Anti-Spoofing. 2284-2297 - Zejun Zhang

, Fei Zhong
, Wenxiong Kang
:
Study on Reflection-Based Imaging Finger Vein Recognition. 2298-2310 - Weijie Liu

, Ximeng Liu
, Zhi Li
, Bin Liu
, Rongwei Yu, Lina Wang
:
Retrofitting LBR Profiling to Enhance Virtual Machine Introspection. 2311-2323 - Pingchuan Ma, Zhenlan Ji

, Qi Pang, Shuai Wang
:
NoLeaks: Differentially Private Causal Discovery Under Functional Causal Model. 2324-2338 - Tahmina Zebin

, Shahadate Rezvy, Yuan Luo
:
An Explainable AI-Based Intrusion Detection System for DNS Over HTTPS (DoH) Attacks. 2339-2349 - Osman Tursun

, Simon Denman, Sabesan Sivapalan, Sridha Sridharan
, Clinton Fookes
, Sandra Mau:
Component-Based Attention for Large-Scale Trademark Retrieval. 2350-2363 - Jiang Liu

, Chun Pong Lau
, Hossein Souri, Soheil Feizi
, Rama Chellappa:
Mutual Adversarial Training: Learning Together is Better Than Going Alone. 2364-2377 - Yanli Chen

, Tong Qiao
, Florent Retraint
, Gengran Hu
:
Efficient Privacy-Preserving Forensic Method for Camera Model Identification. 2378-2393 - Parastoo Sadeghi

, Mehdi Korki
:
Offset-Symmetric Gaussians for Differential Privacy. 2394-2409 - Chuan Du

, Yulai Cong, Lei Zhang, Dandan Guo
, Song Wei
:
A Practical Deceptive Jamming Method Based on Vulnerable Location Awareness Adversarial Attack for Radar HRRP Target Recognition. 2410-2424 - Jian Wang

, Yunlian Sun
, Jinhui Tang
:
LiSiam: Localization Invariance Siamese Network for Deepfake Detection. 2425-2436 - Ding Li

, Yuefei Zhu
, Minghao Chen, Jue Wang:
Minipatch: Undermining DNN-Based Website Fingerprinting With Adversarial Patches. 2437-2451 - Huijun Zhang

, Yang Ding
, Lei Cao
, Xin Wang, Ling Feng
:
Fine-Grained Question-Level Deception Detection via Graph-Based Learning and Cross-Modal Fusion. 2452-2467 - Mengnan Zhao

, Bo Wang
, Wei Wang
, Yuqiu Kong
, Tianhang Zheng
, Kui Ren
:
Guided Erasable Adversarial Attack (GEAA) Toward Shared Data Protection. 2468-2482 - Peng Xu

, Manqing Hu, Tianyang Chen, Wei Wang
, Hai Jin
:
LaF: Lattice-Based and Communication-Efficient Federated Learning. 2483-2496 - Ajian Liu

, Chenxu Zhao, Zitong Yu
, Jun Wan
, Anyang Su
, Xing Liu, Zichang Tan, Sergio Escalera
, Junliang Xing
, Yanyan Liang
, Guodong Guo
, Zhen Lei
, Stan Z. Li, Du Zhang:
Contrastive Context-Aware Learning for 3D High-Fidelity Mask Face Presentation Attack Detection. 2497-2507 - Pawel Korus

, Nasir D. Memon
:
Computational Sensor Fingerprints. 2508-2523 - Mengmeng Yang

, Ivan Tjuawinata
, Kwok-Yan Lam
:
K-Means Clustering With Local dᵪ-Privacy for Privacy-Preserving Data Analysis. 2524-2537 - Songnian Zhang, Suprio Ray

, Rongxing Lu
, Yunguo Guan
, Yandong Zheng
, Jun Shao
:
Toward Privacy-Preserving Aggregate Reverse Skyline Query With Strong Security. 2538-2552 - Jung Hee Cheon

, Wootae Kim, Jai Hyun Park
:
Efficient Homomorphic Evaluation on Large Intervals. 2553-2568 - Shu Hong

, Lingjie Duan
, Jianwei Huang
:
Protecting Location Privacy by Multiquery: A Dynamic Bayesian Game Theoretic Approach. 2569-2584 - Linan Huang

, Shumeng Jia
, Emily Balcetis, Quanyan Zhu:
ADVERT: An Adaptive and Data-Driven Attention Enhancement Mechanism for Phishing Prevention. 2585-2597 - Jisoo Choi

, Chau-Wai Wong
, Adi Hajj-Ahmad
, Min Wu
, Yanpin Ren
:
Invisible Geolocation Signature Extraction From a Single Image. 2598-2613 - Benjamin Christopher Hadwiger

, Christian Riess
:
Deep Metric Color Embeddings for Splicing Localization in Severely Degraded Images. 2614-2627 - Akiko Inoue

, Kazuhiko Minematsu
, Maya Oda, Rei Ueno, Naofumi Homma:
ELM: A Low-Latency and Scalable Memory Encryption Scheme. 2628-2643 - Nan Wu

, Dinusha Vatsalan
, Sunny Verma, Mohamed Ali Kâafar
:
Fairness and Cost Constrained Privacy-Aware Record Linkage. 2644-2656 - Yihao Huang

, Felix Juefei-Xu
, Qing Guo
, Yang Liu
, Geguang Pu
:
FakeLocator: Robust Localization of GAN-Based Face Manipulations. 2657-2672 - Junqiang Li

, Senyi Li
, Gang Sun
, Ting Chen
, Hongfang Yu
:
SNPSFuzzer: A Fast Greybox Fuzzer for Stateful Network Protocols Using Snapshots. 2673-2687 - Da-Wen Huang

, Fengji Luo
, Jichao Bi
, Mingyang Sun
:
An Efficient Hybrid IDS Deployment Architecture for Multi-Hop Clustered Wireless Sensor Networks. 2688-2702 - Cheng Wang

, Hangyu Zhu
:
Wrongdoing Monitor: A Graph-Based Behavioral Anomaly Detection in Cyber Security. 2703-2718 - Nils Wisiol

, Bipana Thapaliya
, Khalid T. Mursi
, Jean-Pierre Seifert, Yu Zhuang:
Neural Network Modeling Attacks on Arbiter-PUF-Based Designs. 2719-2731 - Mosayeb Hajimaghsoodi

, Rasool Jalili
:
RAD: A Statistical Mechanism Based on Behavioral Analysis for DDoS Attack Countermeasure. 2732-2745 - Jiabei Wang

, Rui Zhang
, Jianhao Li
, Yuting Xiao
:
Owner-Enabled Secure Authorized Keyword Search Over Encrypted Data With Flexible Metadata. 2746-2760 - Congyu Zhang, Decheng Liu

, Chunlei Peng
, Nannan Wang
, Xinbo Gao
:
Edge Aware Domain Transformation for Face Sketch Synthesis. 2761-2770 - Meng Jia

, Jing Chen
, Kun He
, Ruiying Du, Li Zheng, Mingxi Lai, Donghui Wang
, Fei Liu:
Redactable Blockchain From Decentralized Chameleon Hash Functions. 2771-2783 - Dong-Hyun Jung

, Joon-Gyu Ryu, Junil Choi
:
When Satellites Work as Eavesdroppers. 2784-2799 - Zhaoxu Hu

, Changsheng Chen
, Wai Ho Mow
, Jiwu Huang
:
Document Recapture Detection Based on a Unified Distortion Model of Halftone Cells. 2800-2815 - Pu Wang

, Zheng Yan
, Kai Zeng
:
BCAuth: Physical Layer Enhanced Authentication and Attack Tracing for Backscatter Communications. 2818-2834 - Servio Paguada

, Lejla Batina
, Ileana Buhan, Igor Armendariz
:
Playing With Blocks: Toward Re-Usable Deep Learning Models for Side-Channel Profiled Attacks. 2835-2847 - Yinbin Miao

, Ziteng Liu
, Hongwei Li
, Kim-Kwang Raymond Choo
, Robert H. Deng
:
Privacy-Preserving Byzantine-Robust Federated Learning via Blockchain Systems. 2848-2861 - Jianfei Sun

, Guowen Xu
, Tianwei Zhang
, Mamoun Alazab
, Robert H. Deng
:
A Practical Fog-Based Privacy-Preserving Online Car-Hailing Service System. 2862-2877 - Lin Ding

, Zheng Wu, Xinhai Wang, Ziyu Guan, Mingjin Li:
New Attacks on the GPRS Encryption Algorithms GEA-1 and GEA-2. 2878-2889 - Changsheng Chen

, Shuzheng Zhang, Fengbo Lan, Jiwu Huang
:
Domain-Agnostic Document Authentication Against Practical Recapturing Attacks. 2890-2905 - Hee-Yong Kwon

, Mun-Kyu Lee
:
Comments on "PassBio: Privacy-Preserving User-Centric Biometric Authentication". 2816-2817 - Shaobo Jia

, Jian-Kang Zhang
, Sheng Chen
, Wanming Hao
, Wei Xu
:
Secure Multiantenna Transmission With an Unknown Eavesdropper: Power Allocation and Secrecy Outage Analysis. 2906-2919 - Jiaqing Bai

, Ji He
, Yanping Chen
, Yulong Shen
, Xiaohong Jiang
:
On Covert Communication Performance With Outdated CSI in Wireless Greedy Relay Systems. 2920-2935 - Wanyu Lin

, Baochun Li
, Cong Wang
:
Towards Private Learning on Decentralized Graphs With Local Differential Privacy. 2936-2946 - Min Ren

, Yuhao Zhu
, Yunlong Wang, Zhenan Sun
:
Perturbation Inactivation Based Adversarial Defense for Face Recognition. 2947-2962 - Feng Liu

, Zhe Kong
, Haozhe Liu
, Wentian Zhang
, Linlin Shen
:
Fingerprint Presentation Attack Detection by Channel-Wise Feature Denoising. 2963-2976 - Yue Zheng

, Si Wang, Chip-Hong Chang
:
A DNN Fingerprint for Non-Repudiable Model Ownership Identification and Piracy Detection. 2977-2989 - Golam Dastoger Bashar

, Joshua Holmes, Gaby G. Dagher
:
ACCORD: A Scalable Multileader Consensus Protocol for Healthcare Blockchain. 2990-3005 - Junjie Jiang

, Willy Susilo
, Joonsang Baek
:
Security Analysis of "SMAKA: Secure Many-to-Many Authentication and Key Agreement Scheme for Vehicular Networks". 3006-3007 - Changtao Miao

, Zichang Tan
, Qi Chu
, Nenghai Yu
, Guodong Guo
:
Hierarchical Frequency-Assisted Interactive Networks for Face Manipulation Detection. 3008-3021 - Kangkang Wei

, Weiqi Luo
, Shunquan Tan
, Jiwu Huang
:
Universal Deep Network for Steganalysis of Color Image Based on Channel Representation. 3022-3036 - Jiale Cheng

, Nan Liu
, Wei Kang
, Yang Li:
The Capacity of Symmetric Private Information Retrieval Under Arbitrary Collusion and Eavesdropping Patterns. 3037-3050 - Junwei Zhou

, Yijia Qian, Qingtian Zou
, Peng Liu
, Jianwen Xiang
:
DeepSyslog: Deep Anomaly Detection on Syslog Using Sentence Embedding and Metadata. 3051-3061 - Cheng-Yaw Low

, Andrew Beng Jin Teoh
:
An Implicit Identity-Extended Data Augmentation for Low-Resolution Face Representation Learning. 3062-3076 - Shijia Liu

, Yanru Chen
, Hao Wang, Hongbin Liang
, Liangyin Chen
:
A Low-Calculation Contactless Continuous Authentication Based on Postural Transition. 3077-3090 - Yulong Wang

, Minghui Zhao, Shenghong Li, Xin Yuan
, Wei Ni
:
Dispersed Pixel Perturbation-Based Imperceptible Backdoor Trigger for Image Classifier Models. 3091-3106 - Dajiang Chen

, Shaoquan Jiang
, Ning Zhang
, Lei Liu
, Kim-Kwang Raymond Choo
:
On Message Authentication Channel Capacity Over a Wiretap Channel. 3107-3122 - Ge Shi

, Sylvester B. Aboagye
, Telex M. N. Nkouatchah
, Octavia A. Dobre
, Yong Li
, Wei Cheng
:
Secure Transmission in NOMA-Aided Multiuser Visible Light Communication Broadcasting Network With Cooperative Precoding Design. 3123-3138 - Lei Qi

, Jiaying Shen, Jiaqi Liu, Yinghuan Shi
, Xin Geng
:
Label Distribution Learning for Generalizable Multisource Person Re-Identification. 3139-3150 - Dillon J. Lohr

, Oleg V. Komogortsev:
Eye Know You Too: Toward Viable End-to-End Eye Movement Biometrics for User Authentication. 3151-3164 - Shuai Ma

, Yunqi Zhang, Haihong Sheng
, Hang Li
, Jia Shi
, Long Yang, Youlong Wu
, Naofal Al-Dhahir
, Shiyin Li
:
Optimal Probabilistic Constellation Shaping for Covert Communications. 3165-3178 - Songlei Wang

, Yifeng Zheng
, Xiaohua Jia
, Xun Yi
:
PeGraph: A System for Privacy-Preserving and Efficient Search Over Encrypted Social Graphs. 3179-3194 - Si-Qi Liu

, Xiangyuan Lan
, Pong C. Yuen
:
Learning Temporal Similarity of Remote Photoplethysmography for Fast 3D Mask Face Presentation Attack Detection. 3195-3210 - Enes Altinisik

, Hüsrev Taha Sencar
, Diram Tabaa
:
Video Source Characterization Using Encoding and Encapsulation Characteristics. 3211-3224 - Yam Sharon, David Berend

, Yang Liu
, Asaf Shabtai
, Yuval Elovici
:
TANTRA: Timing-Based Adversarial Network Traffic Reshaping Attack. 3225-3237 - Chenqi Kong

, Kexin Zheng
, Shiqi Wang
, Anderson Rocha
, Haoliang Li
:
Beyond the Pixel World: A Novel Acoustic-Based Face Anti-Spoofing System for Smartphones. 3238-3253 - Yujiao Lv, Jianquan Lu

, Yang Liu
, Jungang Lou
:
Resilient Distributed State Estimation Under Stealthy Attack. 3254-3263 - Qin Li

, Jia Wu, Junyu Quan, Jinjing Shi
, Shichao Zhang
:
Efficient Quantum Blockchain With a Consensus Mechanism QDPoS. 3264-3276 - Guiyang Xia

, Xiaobo Zhou
, Lichuan Gu, Feng Shu
, Yongpeng Wu
, Jiangzhou Wang
:
Secure-Reliable Transmission Designs for Full-Duplex Receiver With Finite-Alphabet Inputs. 3277-3289 - Satwik Patnaik

, Nimisha Limaye
, Ozgur Sinanoglu
:
Hide and Seek: Seeking the (Un)-Hidden Key in Provably-Secure Logic Locking Techniques. 3290-3305 - Haoxiang Huang

, Jianbiao Zhang
, Jun Hu, Yingfang Fu, Chenggang Qin:
Research on Distributed Dynamic Trusted Access Control Based on Security Subsystem. 3306-3320 - Yiming Wang

, Guanqiu Qi
, Shuang Li
, Yi Chai
, Huafeng Li
:
Body Part-Level Domain Alignment for Domain-Adaptive Person Re-Identification With Transformer Framework. 3321-3334 - Qiuhua Wang, Tianyu Xia, Dong Wang

, Yizhi Ren, Gongxun Miao, Kim-Kwang Raymond Choo
:
SDoS: Selfish Mining-Based Denial-of-Service Attack. 3335-3349 - Min Wang

, Song Wang
, Jiankun Hu
:
Cancellable Template Design for Privacy-Preserving EEG Biometric Authentication Systems. 3350-3364 - Pengyu Li

, Dan Ye
:
Measurement-Based Optimal Stealthy Attacks on Remote State Estimation. 3365-3374 - Yuki Hirose

, Kazuaki Nakamura
, Naoko Nitta, Noboru Babaguchi:
Anonymization of Human Gait in Video Based on Silhouette Deformation and Texture Transfer. 3375-3390 - Daniele Friolo

, Fabio Massacci
, Chan Nam Ngo
, Daniele Venturi
:
Cryptographic and Financial Fairness. 3391-3406 - Brice Colombier

, Vlad-Florin Dragoi
, Pierre-Louis Cayrel, Vincent Grosso:
Profiled Side-Channel Attack on Cryptosystems Based on the Binary Syndrome Decoding Problem. 3407-3420 - Fengyao Zhu

, Yu Zhu
, Xiaoben Jiang
, Jiongyao Ye
:
Cross-Domain Attention and Center Loss for Sketch Re-Identification. 3421-3432 - Jiajun Zhou

, Chenkai Hu, Jianlei Chi
, Jiajing Wu
, Meng Shen
, Qi Xuan
:
Behavior-Aware Account De-Anonymization on Ethereum Interaction Graph. 3433-3448 - Ming Jie Lee

, Zhe Jin
, Shiuan-Ni Liang, Massimo Tistarelli
:
Alignment-Robust Cancelable Biometric Scheme for Iris Verification. 3449-3464 - Zeyuan Yin

, Bingsheng Zhang
, Jingzhong Xu, Kaiyu Lu, Kui Ren
:
Bool Network: An Open, Distributed, Secure Cross-Chain Notary Platform. 3465-3478 - Yuanyuan He

, Xinyu Tan, Jianbing Ni
, Laurence T. Yang
, Xianjun Deng
:
Differentially Private Set Intersection for Asymmetrical ID Alignment. 3479-3494 - Chung-Wei Weng, Yauhen Yakimenka

, Hsuan-Yin Lin
, Eirik Rosnes
, Jörg Kliewer
:
Generative Adversarial User Privacy in Lossy Single-Server Information Retrieval. 3495-3510 - Qinbao Xu

, Elisa Bertino
, Changda Wang
:
Compact Provenance Scheme Through Packet Path Index Differences in WSNs. 3511-3524 - Shanshan Li

, Chunxiang Xu
, Yuan Zhang
, Jianying Zhou:
A Secure Two-Factor Authentication Scheme From Password-Protected Hardware Tokens. 3525-3538 - Solène Bernard

, Patrick Bas
, John Klein
, Tomás Pevný
:
Backpack: A Backpropagable Adversarial Embedding Scheme. 3539-3554 - Jingdian Ming

, Yongbin Zhou
, Wei Cheng
, Huizhong Li
:
Optimizing Higher-Order Correlation Analysis Against Inner Product Masking Scheme. 3555-3568 - Chuan Zhang

, Mingyang Zhao, Liehuang Zhu
, Tong Wu
, Ximeng Liu
:
Enabling Efficient and Strong Privacy-Preserving Truth Discovery in Mobile Crowdsensing. 3569-3581 - Songlei Wang

, Yifeng Zheng
, Xiaohua Jia
, Hejiao Huang
, Cong Wang
:
OblivGM: Oblivious Attributed Subgraph Matching as a Cloud Service. 3582-3596 - Michele Grisafi

, Mahmoud Ammar
, Kasim Sinan Yildirim
, Bruno Crispo
:
MPI: Memory Protection for Intermittent Computing. 3597-3610 - Michael G. Kallitsis

, Rupesh Prajapati, Vasant G. Honavar
, Dinghao Wu, John Yen:
Detecting and Interpreting Changes in Scanning Behavior in Large Network Telescopes. 3611-3625 - Farshad Rostami Ghadi

, Francisco Javier López-Martínez
, Wei-Ping Zhu
, Jean-Marie Gorce
:
The Impact of Side Information on Physical Layer Security Under Correlated Fading Channels. 3626-3636 - Bowen Zhao

, Jiaming Yuan
, Ximeng Liu
, Yongdong Wu
, HweeHwa Pang
, Robert H. Deng
:
SOCI: A Toolkit for Secure Outsourced Computation on Integers. 3637-3648 - Ying Miao

, Qiong Huang
, Meiyan Xiao
, Willy Susilo
:
Blockchain Assisted Multi-Copy Provable Data Possession With Faults Localization in Multi-Cloud Storage. 3663-3676 - Le Qin

, Fei Peng
, Min Long
:
Face Morphing Attack Detection and Localization Based on Feature-Wise Supervision. 3649-3662 - Xiaolu Hou

, Jakub Breier
, Shivam Bhasin
:
SBCMA: Semi-Blind Combined Middle-Round Attack on Bit-Permutation Ciphers With Application to AEAD Schemes. 3677-3690 - Xiaoyu Cao

, Zaixi Zhang
, Jinyuan Jia
, Neil Zhenqiang Gong
:
FLCert: Provably Secure Federated Learning Against Poisoning Attacks. 3691-3705 - Zhiyuan He

, Jun Zhang
, Liaojun Pang
, Eryun Liu
:
PFVNet: A Partial Fingerprint Verification Network Learned From Large Fingerprint Matching. 3706-3719 - Wanming Hao

, Junjie Li
, Gangcan Sun
, Ming Zeng
, Octavia A. Dobre
:
Securing Reconfigurable Intelligent Surface-Aided Cell-Free Networks. 3720-3733 - Zhen Hong

, Xiong Li
, Zhenyu Wen
, Leiqiang Zhou
, Huan Chen
, Jie Su
:
ESP Spoofing: Covert Acoustic Attack on MEMS Gyroscopes in Vehicles. 3734-3747 - Hugo Proença

:
: A Learning-Based Framework to Augment Permanence. 3748-3757 - Sha Ma

, Yijian Zhong
, Qiong Huang
:
Efficient Public Key Encryption With Outsourced Equality Test for Cloud-Based IoT Environments. 3758-3772 - Yinbo Yu

, Jiajia Liu
:
TAPInspector: Safety and Liveness Verification of Concurrent Trigger-Action IoT Systems. 3773-3788 - Fei Tong

, Xing Chen
, Kaiming Wang
, Yujian Zhang:
CCAP: A Complete Cross-Domain Authentication Based on Blockchain for Internet of Things. 3789-3800 - Pingan Fan

, Hong Zhang
, Xianfeng Zhao
:
Adaptive QIM With Minimum Embedding Cost for Robust Video Steganography on Social Networks. 3801-3815 - Bao Gia Doan

, Minhui Xue
, Shiqing Ma, Ehsan Abbasnejad, Damith C. Ranasinghe
:
TnT Attacks! Universal Naturalistic Adversarial Patches Against Deep Neural Network Systems. 3816-3830 - Aryan Mohammadi Pasikhani

, John A. Clark, Prosanta Gope
:
Adversarial RL-Based IDS for Evolving Data Environment in 6LoWPAN. 3831-3846 - Durba Chatterjee, Harishma Boyapally, Sikhar Patranabis, Urbi Chatterjee, Aritra Hazra, Debdeep Mukhopadhyay:

Physically Related Functions: Exploiting Related Inputs of PUFs for Authenticated-Key Exchange. 3847-3862 - Pei Cao

, Chi Zhang
, Xiangjun Lu, Dawu Gu
, Sen Xu:
Improving Deep Learning Based Second-Order Side-Channel Analysis With Bilinear CNN. 3863-3876 - Liron David

, Avinatan Hassidim, Yossi Matias
, Moti Yung, Alon Ziv
:
Eddystone-EID: Secure and Private Infrastructural Protocol for BLE Beacons. 3877-3889 - Matthew Bradbury

, Arshad Jhumka
:
Quantifying Source Location Privacy Routing Performance via Divergence and Information Loss. 3890-3905 - Unai Rioja

, Lejla Batina
, Igor Armendariz
, Jose Luis Flores
:
Towards Human Dependency Elimination: AI Approach to SCA Robustness Assessment. 3906-3921 - Krishnan Rajkumar

, Antriksh Goswami
, K. Lakshmanan, Ruchir Gupta
:
Comment on "Federated Learning With Differential Privacy: Algorithms and Performance Analysis". 3922-3924 - Woojin Jeong

, Eunmin Choi
, Hoseung Song
, Minji Cho
, Ji-Woong Choi
:
Adaptive Controller Area Network Intrusion Detection System Considering Temperature Variations. 3925-3933 - Ehsan Hallaji

, Roozbeh Razavi-Far
, Meng Wang
, Mehrdad Saif
, Bruce Fardanesh
:
A Stream Learning Approach for Real-Time Identification of False Data Injection Attacks in Cyber-Physical Power Systems. 3934-3945 - Darren Hurley-Smith

, Constantinos Patsakis
, Julio C. Hernandez-Castro:
On the Unbearable Lightness of FIPS 140-2 Randomness Tests. 3946-3958 - Oleg Schell

, Claudio Oechsler
, Marcel Kneib
:
Asymmetric Symbol and Skew Sender Identification for Automotive Networks. 3959-3971 - Su Wang

, Zhiliang Wang
, Tao Zhou, Hongbin Sun, Xia Yin, Dongqi Han
, Han Zhang
, Xingang Shi
, Jiahai Yang
:
THREATRACE: Detecting and Tracing Host-Based Threats in Node Level Through Provenance Graph Learning. 3972-3987 - Lu Lv

, Zan Li
, Haiyang Ding
, Naofal Al-Dhahir
, Jian Chen
:
Achieving Covert Wireless Communication With a Multi-Antenna Relay. 760-773 - Jianze Wei

, Huaibo Huang
, Yunlong Wang, Ran He
, Zhenan Sun
:
Towards More Discriminative and Robust Iris Recognition by Learning Uncertain Factors. 865-879 - Yandong Zheng

, Rongxing Lu
, Yunguo Guan
, Songnian Zhang, Jun Shao
, Hui Zhu
:
Efficient and Privacy-Preserving Similarity Query With Access Control in eHealthcare. 880-893 - Liang Zhang

, Feiyang Qiu, Feng Hao
, Haibin Kan
:
1-Round Distributed Key Generation With Efficient Reconstruction Using Decentralized CP-ABE. 894-907 - Shan Gu

, Jianjiang Feng
, Jiwen Lu
, Jie Zhou
:
Latent Fingerprint Indexing: Robust Representation and Adaptive Candidate List. 908-923 - Wei Liu

, Ruiming Wang
, Xuyan Qi, Liehui Jiang, Jing Jing
:
Multiclass Classification-Based Side-Channel Hybrid Attacks on Strong PUFs. 924-937 - Ning Lu

, Junwei Zhang, Ximeng Liu
, Wenbo Shi
, Jianfeng Ma
:
STOP: A Service Oriented Internet Purification Against Link Flooding Attacks. 938-953 - Zhaoyang Cheng

, Guanpu Chen
, Yiguang Hong
:
Single-Leader-Multiple-Followers Stackelberg Security Game With Hypergame Framework. 954-969 - Zhaohui Zheng, Bichao Xu

, Jianping Ju, Zhongyuan Guo
, Changhui You, Qiang Lei
, Qiang Zhang:
Circumferential Local Ternary Pattern: New and Efficient Feature Descriptors for Anti-Counterfeiting Pattern Identification. 970-981 - Pingchuan Ma, Zhibo Liu

, Yuanyuan Yuan
, Shuai Wang
:
NeuralD: Detecting Indistinguishability Violations of Oblivious RAM With Neural Distinguishers. 982-997 - Cairong Zhao

, Liang Zhu
, Shuguang Dou
, Weihong Deng
, Liang Wang:
Detecting Overlapped Objects in X-Ray Security Imagery by a Label-Aware Mechanism. 998-1009 - Tiep Minh Hoang

, Trinh Van Chien
, Thien Van Luong
, Symeon Chatzinotas
, Björn E. Ottersten, Lajos Hanzo
:
Detection of Spoofing Attacks in Aeronautical Ad-Hoc Networks Using Deep Autoencoders. 1010-1023 - Gaoyang Liu, Tianlong Xu

, Xiaoqiang Ma, Chen Wang
:
Your Model Trains on My Data? Protecting Intellectual Property of Training Data via Membership Fingerprint Authentication. 1024-1037 - Xiu-Chuan Li

, Xu-Yao Zhang
, Fei Yin
, Cheng-Lin Liu
:
Decision-Based Adversarial Attack With Frequency Mixup. 1038-1052 - Qin Jiang

, Ee-Chien Chang, Yong Qi
, Saiyu Qi
, Pengfei Wu
, Jianfeng Wang
:
Rphx: Result Pattern Hiding Conjunctive Query Over Private Compressed Index Using Intel SGX. 1053-1068 - Zijie Yang

, Jiahao Cao, Zhuotao Liu
, Xiaoli Zhang, Kun Sun
, Qi Li
:
Good Learning, Bad Performance: A Novel Attack Against RL-Based Congestion Control Systems. 1069-1082 - Yang Yang

, Ke Mu
, Robert H. Deng
:
Lightweight Privacy-Preserving GAN Framework for Model Training and Image Synthesis. 1083-1098 - Shuo Wang

, Surya Nepal
, Alsharif Abuadbba, Carsten Rudolph
, Marthie Grobler
:
Adversarial Detection by Latent Style Transformations. 1099-1114 - Peng Xu

, Willy Susilo
, Wei Wang
, Tianyang Chen, Qianhong Wu
, Kaitai Liang
, Hai Jin
:
ROSE: Robust Searchable Encryption With Forward and Backward Security. 1115-1130 - Inkyu Bang

, Taehoon Kim
, Han Seung Jang
, Dan Keun Sung
:
An Opportunistic Power Control Scheme for Mitigating User Location Tracking Attacks in Cellular Networks. 1131-1144 - Danilo Avola

, Marco Cascio
, Luigi Cinque, Alessio Fagioli
, Chiara Petrioli
:
Person Re-Identification Through Wi-Fi Extracted Radio Biometric Signatures. 1145-1158 - Mustafizur Rahman

, Liang Zhou
, Shantanu Chakrabartty
:
SPoTKD: A Protocol for Symmetric Key Distribution Over Public Channels Using Self-Powered Timekeeping Devices. 1159-1171 - Zihao Cheng

, Dong Yue
, Shigen Shen
, Songlin Hu
, Lei Chen
:
Secure Frequency Control of Hybrid Power System Under DoS Attacks via Lie Algebra. 1172-1184 - Lucian Popa

, Bogdan Groza
, Camil Jichici
, Pal-Stefan Murvay
:
ECUPrint - Physical Fingerprinting Electronic Control Units on CAN Buses Inside Cars and SAE J1939 Compliant Vehicles. 1185-1200

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














