Search dblp for Publications

export results for "toc:db/journals/tifs/tifs12.bht:"

 download as .bib file

@article{DBLP:journals/tifs/0029LBKTLC17,
  author       = {Li Li and
                  Daoyuan Li and
                  Tegawend{\'{e}} F. Bissyand{\'{e}} and
                  Jacques Klein and
                  Yves Le Traon and
                  David Lo and
                  Lorenzo Cavallaro},
  title        = {Understanding Android App Piggybacking: {A} Systematic Study of Malicious
                  Code Grafting},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {12},
  number       = {6},
  pages        = {1269--1284},
  year         = {2017},
  url          = {https://doi.org/10.1109/TIFS.2017.2656460},
  doi          = {10.1109/TIFS.2017.2656460},
  timestamp    = {Fri, 09 Apr 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/0029LBKTLC17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/0100TL17,
  author       = {Wei Wang and
                  Kah Chan Teh and
                  Kwok Hung Li},
  title        = {Artificial Noise Aided Physical Layer Security in Multi-Antenna Small-Cell
                  Networks},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {12},
  number       = {6},
  pages        = {1470--1482},
  year         = {2017},
  url          = {https://doi.org/10.1109/TIFS.2017.2663336},
  doi          = {10.1109/TIFS.2017.2663336},
  timestamp    = {Thu, 06 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/0100TL17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/AbouelenienPMB17,
  author       = {Mohamed Abouelenien and
                  Ver{\'{o}}nica P{\'{e}}rez{-}Rosas and
                  Rada Mihalcea and
                  Mihai Burzo},
  title        = {Detecting Deceptive Behavior via Integration of Discriminative Features
                  From Multiple Modalities},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {12},
  number       = {5},
  pages        = {1042--1055},
  year         = {2017},
  url          = {https://doi.org/10.1109/TIFS.2016.2639344},
  doi          = {10.1109/TIFS.2016.2639344},
  timestamp    = {Sun, 12 Nov 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tifs/AbouelenienPMB17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/Al-AniK17,
  author       = {Mustafa Al{-}Ani and
                  Fouad Khelifi},
  title        = {On the {SPN} Estimation in Image Forensics: {A} Systematic Empirical
                  Evaluation},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {12},
  number       = {5},
  pages        = {1067--1081},
  year         = {2017},
  url          = {https://doi.org/10.1109/TIFS.2016.2640938},
  doi          = {10.1109/TIFS.2016.2640938},
  timestamp    = {Mon, 26 Oct 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tifs/Al-AniK17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/Al-QahtaniHHRZA17,
  author       = {Fawaz S. Al{-}Qahtani and
                  Yuzhen Huang and
                  Salah Hessien and
                  Redha M. Radaydeh and
                  Caijun Zhong and
                  Hussein M. Alnuweiri},
  title        = {Secrecy Analysis of {MIMO} Wiretap Channels With Low-Complexity Receivers
                  Under Imperfect Channel Estimation},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {12},
  number       = {2},
  pages        = {257--270},
  year         = {2017},
  url          = {https://doi.org/10.1109/TIFS.2016.2604490},
  doi          = {10.1109/TIFS.2016.2604490},
  timestamp    = {Mon, 31 Jul 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/Al-QahtaniHHRZA17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/AlaeiPPB17,
  author       = {Alireza Alaei and
                  Srikanta Pal and
                  Umapada Pal and
                  Michael Blumenstein},
  title        = {An Efficient Signature Verification Method Based on an Interval Symbolic
                  Representation and a Fuzzy Similarity Measure},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {12},
  number       = {10},
  pages        = {2360--2372},
  year         = {2017},
  url          = {https://doi.org/10.1109/TIFS.2017.2707332},
  doi          = {10.1109/TIFS.2017.2707332},
  timestamp    = {Thu, 06 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/AlaeiPPB17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/AlamMACTA17,
  author       = {Quratulain Alam and
                  Saif Ur Rehman Malik and
                  Adnan Akhunzada and
                  Kim{-}Kwang Raymond Choo and
                  Saher Tabbasum and
                  Masoom Alam},
  title        = {A Cross Tenant Access Control {(CTAC)} Model for Cloud Computing:
                  Formal Specification and Verification},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {12},
  number       = {6},
  pages        = {1259--1268},
  year         = {2017},
  url          = {https://doi.org/10.1109/TIFS.2016.2646639},
  doi          = {10.1109/TIFS.2016.2646639},
  timestamp    = {Thu, 06 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/AlamMACTA17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/AlomarAA17,
  author       = {Noura Alomar and
                  Mansour Alsaleh and
                  Abdulrahman Alarifi},
  title        = {Someone in Your Contact List: Cued Recall-Based Textual Passwords},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {12},
  number       = {11},
  pages        = {2574--2589},
  year         = {2017},
  url          = {https://doi.org/10.1109/TIFS.2017.2712126},
  doi          = {10.1109/TIFS.2017.2712126},
  timestamp    = {Thu, 06 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/AlomarAA17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/AmeriniBCMN17,
  author       = {Irene Amerini and
                  Rudy Becarelli and
                  Roberto Caldelli and
                  Alessio Melani and
                  Moreno Niccolai},
  title        = {Smartphone Fingerprinting Combining Features of On-Board Sensors},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {12},
  number       = {10},
  pages        = {2457--2466},
  year         = {2017},
  url          = {https://doi.org/10.1109/TIFS.2017.2708685},
  doi          = {10.1109/TIFS.2017.2708685},
  timestamp    = {Thu, 06 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/AmeriniBCMN17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/AroraJP17,
  author       = {Sunpreet S. Arora and
                  Anil K. Jain and
                  Nicholas G. Paulter Jr.},
  title        = {Gold Fingers: 3D Targets for Evaluating Capacitive Readers},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {12},
  number       = {9},
  pages        = {2067--2077},
  year         = {2017},
  url          = {https://doi.org/10.1109/TIFS.2017.2695166},
  doi          = {10.1109/TIFS.2017.2695166},
  timestamp    = {Thu, 06 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/AroraJP17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/BagRS17,
  author       = {Samiran Bag and
                  Sushmita Ruj and
                  Kouichi Sakurai},
  title        = {Bitcoin Block Withholding Attack: Analysis and Mitigation},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {12},
  number       = {8},
  pages        = {1967--1978},
  year         = {2017},
  url          = {https://doi.org/10.1109/TIFS.2016.2623588},
  doi          = {10.1109/TIFS.2016.2623588},
  timestamp    = {Thu, 23 Jun 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/BagRS17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/BagaiMJ17,
  author       = {Rajiv Bagai and
                  Nafia Malik and
                  Murtuza Jadliwala},
  title        = {Measuring Anonymity of Pseudonymized Data After Probabilistic Background
                  Attacks},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {12},
  number       = {5},
  pages        = {1156--1169},
  year         = {2017},
  url          = {https://doi.org/10.1109/TIFS.2017.2656458},
  doi          = {10.1109/TIFS.2017.2656458},
  timestamp    = {Thu, 06 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/BagaiMJ17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/Barni17,
  author       = {Mauro Barni},
  title        = {Farewell Message},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {12},
  number       = {12},
  pages        = {i--ii},
  year         = {2017},
  url          = {https://doi.org/10.1109/TIFS.2017.2755979},
  doi          = {10.1109/TIFS.2017.2755979},
  timestamp    = {Thu, 06 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/Barni17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/BasakBTR17,
  author       = {Abhishek Basak and
                  Swarup Bhunia and
                  Thomas E. Tkacik and
                  Sandip Ray},
  title        = {Security Assurance for System-on-Chip Designs With Untrusted IPs},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {12},
  number       = {7},
  pages        = {1515--1528},
  year         = {2017},
  url          = {https://doi.org/10.1109/TIFS.2017.2658544},
  doi          = {10.1109/TIFS.2017.2658544},
  timestamp    = {Tue, 07 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/BasakBTR17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/BelmegaC17,
  author       = {Elena Veronica Belmega and
                  Arsenia Chorti},
  title        = {Protecting Secret Key Generation Systems Against Jamming: Energy Harvesting
                  and Channel Hopping Approaches},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {12},
  number       = {11},
  pages        = {2611--2626},
  year         = {2017},
  url          = {https://doi.org/10.1109/TIFS.2017.2713342},
  doi          = {10.1109/TIFS.2017.2713342},
  timestamp    = {Thu, 06 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/BelmegaC17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/BidmeshkiGDJM17,
  author       = {Mohammad{-}Mahdi Bidmeshki and
                  Xiaolong Guo and
                  Raj Gautam Dutta and
                  Yier Jin and
                  Yiorgos Makris},
  title        = {Data Secrecy Protection Through Information Flow Tracking in Proof-Carrying
                  Hardware {IP} - Part {II:} Framework Automation},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {12},
  number       = {10},
  pages        = {2430--2443},
  year         = {2017},
  url          = {https://doi.org/10.1109/TIFS.2017.2707327},
  doi          = {10.1109/TIFS.2017.2707327},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/BidmeshkiGDJM17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/BruneauCGHPR17,
  author       = {Nicolas Bruneau and
                  Claude Carlet and
                  Sylvain Guilley and
                  Annelie Heuser and
                  Emmanuel Prouff and
                  Olivier Rioul},
  title        = {Stochastic Collision Attack},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {12},
  number       = {9},
  pages        = {2090--2104},
  year         = {2017},
  url          = {https://doi.org/10.1109/TIFS.2017.2697401},
  doi          = {10.1109/TIFS.2017.2697401},
  timestamp    = {Thu, 06 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/BruneauCGHPR17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/CaldelliBA17,
  author       = {Roberto Caldelli and
                  Rudy Becarelli and
                  Irene Amerini},
  title        = {Image Origin Classification Based on Social Network Provenance},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {12},
  number       = {6},
  pages        = {1299--1308},
  year         = {2017},
  url          = {https://doi.org/10.1109/TIFS.2017.2656842},
  doi          = {10.1109/TIFS.2017.2656842},
  timestamp    = {Thu, 06 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/CaldelliBA17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/ChanLK17,
  author       = {Frodo Kin{-}Sun Chan and
                  Xiaojie Li and
                  Adams Wai{-}Kin Kong},
  title        = {A Study of Distinctiveness of Skin Texture for Forensic Applications
                  Through Comparison With Blood Vessels},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {12},
  number       = {8},
  pages        = {1900--1915},
  year         = {2017},
  url          = {https://doi.org/10.1109/TIFS.2017.2692684},
  doi          = {10.1109/TIFS.2017.2692684},
  timestamp    = {Thu, 06 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/ChanLK17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/Chen17,
  author       = {Yu{-}Chi Chen},
  title        = {Fully Incrementing Visual Cryptography From a Succinct Non-Monotonic
                  Structure},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {12},
  number       = {5},
  pages        = {1082--1091},
  year         = {2017},
  url          = {https://doi.org/10.1109/TIFS.2016.2641378},
  doi          = {10.1109/TIFS.2016.2641378},
  timestamp    = {Thu, 06 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/Chen17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/ChenCR17,
  author       = {Gaojie Chen and
                  Justin P. Coon and
                  Marco Di Renzo},
  title        = {Secrecy Outage Analysis for Downlink Transmissions in the Presence
                  of Randomly Located Eavesdroppers},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {12},
  number       = {5},
  pages        = {1195--1206},
  year         = {2017},
  url          = {https://doi.org/10.1109/TIFS.2017.2656462},
  doi          = {10.1109/TIFS.2017.2656462},
  timestamp    = {Thu, 06 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/ChenCR17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/ChenWZXZM17,
  author       = {Chao Chen and
                  Yu Wang and
                  Jun Zhang and
                  Yang Xiang and
                  Wanlei Zhou and
                  Geyong Min},
  title        = {Statistical Features-Based Real-Time Detection of Drifted Twitter
                  Spam},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {12},
  number       = {4},
  pages        = {914--925},
  year         = {2017},
  url          = {https://doi.org/10.1109/TIFS.2016.2621888},
  doi          = {10.1109/TIFS.2016.2621888},
  timestamp    = {Thu, 21 Apr 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/ChenWZXZM17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/ChenZ17,
  author       = {Juntao Chen and
                  Quanyan Zhu},
  title        = {Security as a Service for Cloud-Enabled Internet of Controlled Things
                  Under Advanced Persistent Threats: {A} Contract Design Approach},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {12},
  number       = {11},
  pages        = {2736--2750},
  year         = {2017},
  url          = {https://doi.org/10.1109/TIFS.2017.2718489},
  doi          = {10.1109/TIFS.2017.2718489},
  timestamp    = {Thu, 06 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/ChenZ17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/ChengDALT17,
  author       = {Long Cheng and
                  Dinil Mon Divakaran and
                  Aloysius Wooi Kiak Ang and
                  Wee{-}Yong Lim and
                  Vrizlynn L. L. Thing},
  title        = {{FACT:} {A} Framework for Authentication in Cloud-Based {IP} Traceback},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {12},
  number       = {3},
  pages        = {604--616},
  year         = {2017},
  url          = {https://doi.org/10.1109/TIFS.2016.2624741},
  doi          = {10.1109/TIFS.2016.2624741},
  timestamp    = {Thu, 06 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/ChengDALT17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/ChernyshevVJ17,
  author       = {Maxim Chernyshev and
                  Craig Valli and
                  Michael N. Johnstone},
  title        = {Revisiting Urban War Nibbling: Mobile Passive Discovery of Classic
                  Bluetooth Devices Using Ubertooth One},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {12},
  number       = {7},
  pages        = {1625--1636},
  year         = {2017},
  url          = {https://doi.org/10.1109/TIFS.2017.2678463},
  doi          = {10.1109/TIFS.2017.2678463},
  timestamp    = {Thu, 06 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/ChernyshevVJ17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/ChinWHWW17,
  author       = {Yu{-}Hao Chin and
                  Jia{-}Ching Wang and
                  Chien{-}Lin Huang and
                  Kuang{-}Yao Wang and
                  Chung{-}Hsien Wu},
  title        = {Speaker Identification Using Discriminative Features and Sparse Representation},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {12},
  number       = {8},
  pages        = {1979--1987},
  year         = {2017},
  url          = {https://doi.org/10.1109/TIFS.2017.2678458},
  doi          = {10.1109/TIFS.2017.2678458},
  timestamp    = {Thu, 25 Jul 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/ChinWHWW17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/Choi17,
  author       = {Jinho Choi},
  title        = {On Channel-Aware Secure {HARQ-IR}},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {12},
  number       = {2},
  pages        = {351--362},
  year         = {2017},
  url          = {https://doi.org/10.1109/TIFS.2016.2613846},
  doi          = {10.1109/TIFS.2016.2613846},
  timestamp    = {Thu, 06 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/Choi17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/Choi17a,
  author       = {Jinho Choi},
  title        = {Physical Layer Security for Channel-Aware Random Access With Opportunistic
                  Jamming},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {12},
  number       = {11},
  pages        = {2699--2711},
  year         = {2017},
  url          = {https://doi.org/10.1109/TIFS.2017.2714842},
  doi          = {10.1109/TIFS.2017.2714842},
  timestamp    = {Thu, 06 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/Choi17a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/ColombierBFH17,
  author       = {Brice Colombier and
                  Lilian Bossuet and
                  Viktor Fischer and
                  David H{\'{e}}ly},
  title        = {Key Reconciliation Protocols for Error Correction of Silicon {PUF}
                  Responses},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {12},
  number       = {8},
  pages        = {1988--2002},
  year         = {2017},
  url          = {https://doi.org/10.1109/TIFS.2017.2689726},
  doi          = {10.1109/TIFS.2017.2689726},
  timestamp    = {Thu, 06 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/ColombierBFH17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/Coskun17,
  author       = {Baris Coskun},
  title        = {(Un)wisdom of Crowds: Accurately Spotting Malicious {IP} Clusters
                  Using Not-So-Accurate {IP} Blacklists},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {12},
  number       = {6},
  pages        = {1406--1417},
  year         = {2017},
  url          = {https://doi.org/10.1109/TIFS.2017.2663333},
  doi          = {10.1109/TIFS.2017.2663333},
  timestamp    = {Thu, 06 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/Coskun17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/CuiLC17,
  author       = {Aijiao Cui and
                  Yanhui Luo and
                  Chip{-}Hong Chang},
  title        = {Static and Dynamic Obfuscations of Scan Data Against Scan-Based Side-Channel
                  Attacks},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {12},
  number       = {2},
  pages        = {363--376},
  year         = {2017},
  url          = {https://doi.org/10.1109/TIFS.2016.2613847},
  doi          = {10.1109/TIFS.2016.2613847},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/CuiLC17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/CzajkaBKV17,
  author       = {Adam Czajka and
                  Kevin W. Bowyer and
                  Michael Krumdick and
                  Rosaura G. VidalMata},
  title        = {Recognition of Image-Orientation-Based Iris Spoofing},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {12},
  number       = {9},
  pages        = {2184--2196},
  year         = {2017},
  url          = {https://doi.org/10.1109/TIFS.2017.2701332},
  doi          = {10.1109/TIFS.2017.2701332},
  timestamp    = {Sat, 05 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/CzajkaBKV17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/DaiML17,
  author       = {Bin Dai and
                  Zheng Ma and
                  Yuan Luo},
  title        = {Finite State Markov Wiretap Channel With Delayed Feedback},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {12},
  number       = {3},
  pages        = {746--760},
  year         = {2017},
  url          = {https://doi.org/10.1109/TIFS.2016.2636085},
  doi          = {10.1109/TIFS.2016.2636085},
  timestamp    = {Thu, 06 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/DaiML17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/DantchevaB17,
  author       = {Antitza Dantcheva and
                  Fran{\c{c}}ois Br{\'{e}}mond},
  title        = {Gender Estimation Based on Smile-Dynamics},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {12},
  number       = {3},
  pages        = {719--729},
  year         = {2017},
  url          = {https://doi.org/10.1109/TIFS.2016.2632070},
  doi          = {10.1109/TIFS.2016.2632070},
  timestamp    = {Thu, 06 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/DantchevaB17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/DenemarkF17,
  author       = {Tom{\'{a}}s Denemark and
                  Jessica J. Fridrich},
  title        = {Steganography With Multiple {JPEG} Images of the Same Scene},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {12},
  number       = {10},
  pages        = {2308--2319},
  year         = {2017},
  url          = {https://doi.org/10.1109/TIFS.2017.2705625},
  doi          = {10.1109/TIFS.2017.2705625},
  timestamp    = {Thu, 06 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/DenemarkF17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/DongL17,
  author       = {Changyu Dong and
                  Grigorios Loukides},
  title        = {Approximating Private Set Union/Intersection Cardinality With Logarithmic
                  Complexity},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {12},
  number       = {11},
  pages        = {2792--2806},
  year         = {2017},
  url          = {https://doi.org/10.1109/TIFS.2017.2721360},
  doi          = {10.1109/TIFS.2017.2721360},
  timestamp    = {Thu, 06 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/DongL17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/DritsoulaLM17,
  author       = {Lemonia Dritsoula and
                  Patrick Loiseau and
                  John Musacchio},
  title        = {A Game-Theoretic Analysis of Adversarial Classification},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {12},
  number       = {12},
  pages        = {3094--3109},
  year         = {2017},
  url          = {https://doi.org/10.1109/TIFS.2017.2718494},
  doi          = {10.1109/TIFS.2017.2718494},
  timestamp    = {Thu, 06 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/DritsoulaLM17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/DubinDPH17,
  author       = {Ran Dubin and
                  Amit Dvir and
                  Ofir Pele and
                  Ofer Hadar},
  title        = {I Know What You Saw Last Minute - Encrypted {HTTP} Adaptive Video
                  Streaming Title Classification},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {12},
  number       = {12},
  pages        = {3039--3049},
  year         = {2017},
  url          = {https://doi.org/10.1109/TIFS.2017.2730819},
  doi          = {10.1109/TIFS.2017.2730819},
  timestamp    = {Sun, 12 Nov 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tifs/DubinDPH17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/ErfaniPR17,
  author       = {Yousof Erfani and
                  Ramin Pichevar and
                  Jean Rouat},
  title        = {Audio Watermarking Using Spikegram and a Two-Dictionary Approach},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {12},
  number       = {4},
  pages        = {840--852},
  year         = {2017},
  url          = {https://doi.org/10.1109/TIFS.2016.2636094},
  doi          = {10.1109/TIFS.2016.2636094},
  timestamp    = {Thu, 06 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/ErfaniPR17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/FanLWLTL17,
  author       = {Ming Fan and
                  Jun Liu and
                  Wei Wang and
                  Haifei Li and
                  Zhenzhou Tian and
                  Ting Liu},
  title        = {{DAPASA:} Detecting Android Piggybacked Apps Through Sensitive Subgraph
                  Analysis},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {12},
  number       = {8},
  pages        = {1772--1785},
  year         = {2017},
  url          = {https://doi.org/10.1109/TIFS.2017.2687880},
  doi          = {10.1109/TIFS.2017.2687880},
  timestamp    = {Wed, 30 Mar 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/FanLWLTL17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/FerraraCM17,
  author       = {Matteo Ferrara and
                  Raffaele Cappelli and
                  Davide Maltoni},
  title        = {On the Feasibility of Creating Double-Identity Fingerprints},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {12},
  number       = {4},
  pages        = {892--900},
  year         = {2017},
  url          = {https://doi.org/10.1109/TIFS.2016.2639345},
  doi          = {10.1109/TIFS.2016.2639345},
  timestamp    = {Thu, 06 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/FerraraCM17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/FerreiraBBBHSTR17,
  author       = {Anselmo Ferreira and
                  Luca Bondi and
                  Luca Baroffio and
                  Paolo Bestagini and
                  Jiwu Huang and
                  Jefersson A. dos Santos and
                  Stefano Tubaro and
                  Anderson Rocha},
  title        = {Data-Driven Feature Characterization Techniques for Laser Printer
                  Attribution},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {12},
  number       = {8},
  pages        = {1860--1873},
  year         = {2017},
  url          = {https://doi.org/10.1109/TIFS.2017.2692722},
  doi          = {10.1109/TIFS.2017.2692722},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/FerreiraBBBHSTR17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/FuHRWW17,
  author       = {Zhangjie Fu and
                  Fengxiao Huang and
                  Kui Ren and
                  Jian Weng and
                  Cong Wang},
  title        = {Privacy-Preserving Smart Semantic Search Based on Conceptual Graphs
                  Over Encrypted Outsourced Data},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {12},
  number       = {8},
  pages        = {1874--1884},
  year         = {2017},
  url          = {https://doi.org/10.1109/TIFS.2017.2692728},
  doi          = {10.1109/TIFS.2017.2692728},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tifs/FuHRWW17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/FuWWR17,
  author       = {Zhangjie Fu and
                  Xinle Wu and
                  Qian Wang and
                  Kui Ren},
  title        = {Enabling Central Keyword-Based Semantic Extension Search Over Encrypted
                  Outsourced Data},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {12},
  number       = {12},
  pages        = {2986--2997},
  year         = {2017},
  url          = {https://doi.org/10.1109/TIFS.2017.2730365},
  doi          = {10.1109/TIFS.2017.2730365},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/FuWWR17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/FuYHOHSSDBB17,
  author       = {Yu Fu and
                  Lu Yu and
                  Oluwakemi Hambolu and
                  Ilker {\"{O}}z{\c{c}}elik and
                  Benafsh Husain and
                  Jingxuan Sun and
                  Karan Sapra and
                  Dan Du and
                  Christopher Tate Beasley and
                  Richard R. Brooks},
  title        = {Stealthy Domain Generation Algorithms},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {12},
  number       = {6},
  pages        = {1430--1443},
  year         = {2017},
  url          = {https://doi.org/10.1109/TIFS.2017.2668361},
  doi          = {10.1109/TIFS.2017.2668361},
  timestamp    = {Tue, 03 Aug 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/FuYHOHSSDBB17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/GalballyCS17,
  author       = {Javier Galbally and
                  Iwen Coisel and
                  Ignacio Sanchez},
  title        = {A New Multimodal Approach for Password Strength Estimation - Part
                  {I:} Theory and Algorithms},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {12},
  number       = {12},
  pages        = {2829--2844},
  year         = {2017},
  url          = {https://doi.org/10.1109/TIFS.2016.2636092},
  doi          = {10.1109/TIFS.2016.2636092},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/GalballyCS17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/GalballyCS17a,
  author       = {Javier Galbally and
                  Iwen Coisel and
                  Ignacio Sanchez},
  title        = {A New Multimodal Approach for Password Strength Estimation - Part
                  {II:} Experimental Evaluation},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {12},
  number       = {12},
  pages        = {2845--2860},
  year         = {2017},
  url          = {https://doi.org/10.1109/TIFS.2017.2730359},
  doi          = {10.1109/TIFS.2017.2730359},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/GalballyCS17a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/GandinoFR17,
  author       = {Filippo Gandino and
                  Renato Ferrero and
                  Maurizio Rebaudengo},
  title        = {A Key Distribution Scheme for Mobile Wireless Sensor Networks: q-Composite},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {12},
  number       = {1},
  pages        = {34--47},
  year         = {2017},
  url          = {https://doi.org/10.1109/TIFS.2016.2601061},
  doi          = {10.1109/TIFS.2016.2601061},
  timestamp    = {Sun, 25 Jul 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/GandinoFR17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/GaoTLZL17,
  author       = {Haichang Gao and
                  Mengyun Tang and
                  Yi Liu and
                  Ping Zhang and
                  Xiyang Liu},
  title        = {Research on the Security of Microsoft's Two-Layer Captcha},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {12},
  number       = {7},
  pages        = {1671--1685},
  year         = {2017},
  url          = {https://doi.org/10.1109/TIFS.2017.2682704},
  doi          = {10.1109/TIFS.2017.2682704},
  timestamp    = {Thu, 06 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/GaoTLZL17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/GarnaevT17,
  author       = {Andrey Garnaev and
                  Wade Trappe},
  title        = {Bargaining Over the Fair Trade-Off Between Secrecy and Throughput
                  in {OFDM} Communications},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {12},
  number       = {1},
  pages        = {242--251},
  year         = {2017},
  url          = {https://doi.org/10.1109/TIFS.2016.2611486},
  doi          = {10.1109/TIFS.2016.2611486},
  timestamp    = {Thu, 06 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/GarnaevT17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/GarnaevT17a,
  author       = {Andrey Garnaev and
                  Wade Trappe},
  title        = {Bandwidth Scanning When Facing Interference Attacks Aimed at Reducing
                  Spectrum Opportunities},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {12},
  number       = {8},
  pages        = {1916--1930},
  year         = {2017},
  url          = {https://doi.org/10.1109/TIFS.2017.2694766},
  doi          = {10.1109/TIFS.2017.2694766},
  timestamp    = {Thu, 06 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/GarnaevT17a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/GolaitH17,
  author       = {Diksha Golait and
                  Neminath Hubballi},
  title        = {Detecting Anomalous Behavior in VoIP Systems: {A} Discrete Event System
                  Modeling},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {12},
  number       = {3},
  pages        = {730--745},
  year         = {2017},
  url          = {https://doi.org/10.1109/TIFS.2016.2632071},
  doi          = {10.1109/TIFS.2016.2632071},
  timestamp    = {Thu, 06 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/GolaitH17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/Gonzalez-SosaVF17,
  author       = {Ester Gonzalez{-}Sosa and
                  Rub{\'{e}}n Vera{-}Rodr{\'{\i}}guez and
                  Julian Fi{\'{e}}rrez and
                  Vishal M. Patel},
  title        = {Exploring Body Shape From mmW Images for Person Recognition},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {12},
  number       = {9},
  pages        = {2078--2089},
  year         = {2017},
  url          = {https://doi.org/10.1109/TIFS.2017.2695979},
  doi          = {10.1109/TIFS.2017.2695979},
  timestamp    = {Fri, 12 Jul 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/Gonzalez-SosaVF17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/GordonHMSSW17,
  author       = {Steven Gordon and
                  Xinyi Huang and
                  Atsuko Miyaji and
                  Chunhua Su and
                  Karin Sumongkayothin and
                  Komwut Wipusitwarakun},
  title        = {Recursive Matrix Oblivious {RAM:} An {ORAM} Construction for Constrained
                  Storage Devices},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {12},
  number       = {12},
  pages        = {3024--3038},
  year         = {2017},
  url          = {https://doi.org/10.1109/TIFS.2017.2730584},
  doi          = {10.1109/TIFS.2017.2730584},
  timestamp    = {Tue, 07 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/GordonHMSSW17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/GoswamiVS17,
  author       = {Gaurav Goswami and
                  Mayank Vatsa and
                  Richa Singh},
  title        = {Face Verification via Learned Representation on Feature-Rich Video
                  Frames},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {12},
  number       = {7},
  pages        = {1686--1698},
  year         = {2017},
  url          = {https://doi.org/10.1109/TIFS.2017.2668221},
  doi          = {10.1109/TIFS.2017.2668221},
  timestamp    = {Thu, 06 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/GoswamiVS17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/GrissaYH17,
  author       = {Mohamed Grissa and
                  Attila A. Yavuz and
                  Bechir Hamdaoui},
  title        = {Preserving the Location Privacy of Secondary Users in Cooperative
                  Spectrum Sensing},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {12},
  number       = {2},
  pages        = {418--431},
  year         = {2017},
  url          = {https://doi.org/10.1109/TIFS.2016.2622000},
  doi          = {10.1109/TIFS.2016.2622000},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/GrissaYH17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/GuoDJ17,
  author       = {Xiaolong Guo and
                  Raj Gautam Dutta and
                  Yier Jin},
  title        = {Eliminating the Hardware-Software Boundary: {A} Proof-Carrying Approach
                  for Trust Evaluation on Computer Systems},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {12},
  number       = {2},
  pages        = {405--417},
  year         = {2017},
  url          = {https://doi.org/10.1109/TIFS.2016.2621999},
  doi          = {10.1109/TIFS.2016.2621999},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/GuoDJ17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/Hajj-AhmadBCDW17,
  author       = {Adi Hajj{-}Ahmad and
                  S{\'{e}}verine Baudry and
                  Bertrand Chupeau and
                  Gwena{\"{e}}l J. Do{\"{e}}rr and
                  Min Wu},
  title        = {Flicker Forensics for Camcorder Piracy},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {12},
  number       = {1},
  pages        = {89--100},
  year         = {2017},
  url          = {https://doi.org/10.1109/TIFS.2016.2603603},
  doi          = {10.1109/TIFS.2016.2603603},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/Hajj-AhmadBCDW17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/HanWCMZ17,
  author       = {Xiaohui Han and
                  Lianhai Wang and
                  Chaoran Cui and
                  Jun Ma and
                  Shuhui Zhang},
  title        = {Linking Multiple Online Identities in Criminal Investigations: {A}
                  Spectral Co-Clustering Framework},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {12},
  number       = {9},
  pages        = {2242--2255},
  year         = {2017},
  url          = {https://doi.org/10.1109/TIFS.2017.2704906},
  doi          = {10.1109/TIFS.2017.2704906},
  timestamp    = {Thu, 06 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/HanWCMZ17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/HarangK17,
  author       = {Richard E. Harang and
                  Alexander Kott},
  title        = {Burstiness of Intrusion Detection Process: Empirical Evidence and
                  a Modeling Approach},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {12},
  number       = {10},
  pages        = {2348--2359},
  year         = {2017},
  url          = {https://doi.org/10.1109/TIFS.2017.2705629},
  doi          = {10.1109/TIFS.2017.2705629},
  timestamp    = {Thu, 06 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/HarangK17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/HayelZ17,
  author       = {Yezekael Hayel and
                  Quanyan Zhu},
  title        = {Epidemic Protection Over Heterogeneous Networks Using Evolutionary
                  Poisson Games},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {12},
  number       = {8},
  pages        = {1786--1800},
  year         = {2017},
  url          = {https://doi.org/10.1109/TIFS.2017.2687883},
  doi          = {10.1109/TIFS.2017.2687883},
  timestamp    = {Thu, 06 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/HayelZ17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/HeKCW17,
  author       = {Debiao He and
                  Neeraj Kumar and
                  Kim{-}Kwang Raymond Choo and
                  Wei Wu},
  title        = {Efficient Hierarchical Identity-Based Signature With Batch Verification
                  for Automatic Dependent Surveillance-Broadcast System},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {12},
  number       = {2},
  pages        = {454--464},
  year         = {2017},
  url          = {https://doi.org/10.1109/TIFS.2016.2622682},
  doi          = {10.1109/TIFS.2016.2622682},
  timestamp    = {Thu, 06 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/HeKCW17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/HeydariKY17,
  author       = {Vahid Heydari and
                  Sun{-}il Kim and
                  Seong{-}Moo Yoo},
  title        = {Scalable Anti-Censorship Framework Using Moving Target Defense for
                  Web Servers},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {12},
  number       = {5},
  pages        = {1113--1124},
  year         = {2017},
  url          = {https://doi.org/10.1109/TIFS.2016.2647218},
  doi          = {10.1109/TIFS.2016.2647218},
  timestamp    = {Thu, 06 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/HeydariKY17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/HineMC17,
  author       = {Gabriel Emile Hine and
                  Emanuele Maiorana and
                  Patrizio Campisi},
  title        = {A Zero-Leakage Fuzzy Embedder From the Theoretical Formulation to
                  Real Data},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {12},
  number       = {7},
  pages        = {1724--1734},
  year         = {2017},
  url          = {https://doi.org/10.1109/TIFS.2017.2686005},
  doi          = {10.1109/TIFS.2017.2686005},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/HineMC17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/HolohanLM17,
  author       = {Naoise Holohan and
                  Douglas J. Leith and
                  Oliver Mason},
  title        = {Optimal Differentially Private Mechanisms for Randomised Response},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {12},
  number       = {11},
  pages        = {2726--2735},
  year         = {2017},
  url          = {https://doi.org/10.1109/TIFS.2017.2718487},
  doi          = {10.1109/TIFS.2017.2718487},
  timestamp    = {Sat, 05 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/HolohanLM17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/HongHL17,
  author       = {Y.{-}W. Peter Hong and
                  Lin{-}Ming Huang and
                  Hou{-}Tung Li},
  title        = {Vector Quantization and Clustered Key Mapping for Channel-Based Secret
                  Key Generation},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {12},
  number       = {5},
  pages        = {1170--1181},
  year         = {2017},
  url          = {https://doi.org/10.1109/TIFS.2017.2656459},
  doi          = {10.1109/TIFS.2017.2656459},
  timestamp    = {Thu, 06 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/HongHL17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/HongLW17,
  author       = {Yuan Hong and
                  Wen Ming Liu and
                  Lingyu Wang},
  title        = {Privacy Preserving Smart Meter Streaming Against Information Leakage
                  of Appliance Status},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {12},
  number       = {9},
  pages        = {2227--2241},
  year         = {2017},
  url          = {https://doi.org/10.1109/TIFS.2017.2704904},
  doi          = {10.1109/TIFS.2017.2704904},
  timestamp    = {Thu, 06 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/HongLW17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/HouKL17,
  author       = {Jong{-}Uk Hou and
                  Do{-}Gon Kim and
                  Heung{-}Kyu Lee},
  title        = {Blind 3D Mesh Watermarking for 3D Printed Model by Analyzing Layering
                  Artifact},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {12},
  number       = {11},
  pages        = {2712--2725},
  year         = {2017},
  url          = {https://doi.org/10.1109/TIFS.2017.2718482},
  doi          = {10.1109/TIFS.2017.2718482},
  timestamp    = {Thu, 06 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/HouKL17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/HuSH17,
  author       = {Yang Hu and
                  Konstantinos Sirlantzis and
                  Gareth Howells},
  title        = {Optimal Generation of Iris Codes for Iris Recognition},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {12},
  number       = {1},
  pages        = {157--171},
  year         = {2017},
  url          = {https://doi.org/10.1109/TIFS.2016.2606083},
  doi          = {10.1109/TIFS.2016.2606083},
  timestamp    = {Tue, 21 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tifs/HuSH17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/HuaSZ17,
  author       = {Jingyu Hua and
                  Zhenyu Shen and
                  Sheng Zhong},
  title        = {We Can Track You if You Take the Metro: Tracking Metro Riders Using
                  Accelerometers on Smartphones},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {12},
  number       = {2},
  pages        = {286--297},
  year         = {2017},
  url          = {https://doi.org/10.1109/TIFS.2016.2611489},
  doi          = {10.1109/TIFS.2016.2611489},
  timestamp    = {Thu, 09 Dec 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tifs/HuaSZ17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/IqbalSRAC17,
  author       = {Md. Tauhid Bin Iqbal and
                  Mohammad Shoyaib and
                  Byungyong Ryu and
                  Mohammad Abdullah{-}Al{-}Wadud and
                  Oksam Chae},
  title        = {Directional Age-Primitive Pattern {(DAPP)} for Human Age Group Recognition
                  and Age Estimation},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {12},
  number       = {11},
  pages        = {2505--2517},
  year         = {2017},
  url          = {https://doi.org/10.1109/TIFS.2017.2695456},
  doi          = {10.1109/TIFS.2017.2695456},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/IqbalSRAC17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/IvanovB17,
  author       = {Vladimir I. Ivanov and
                  John S. Baras},
  title        = {Authentication of Swipe Fingerprint Scanners},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {12},
  number       = {9},
  pages        = {2212--2226},
  year         = {2017},
  url          = {https://doi.org/10.1109/TIFS.2017.2702592},
  doi          = {10.1109/TIFS.2017.2702592},
  timestamp    = {Thu, 06 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/IvanovB17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/JainA0BB17,
  author       = {Anil K. Jain and
                  Sunpreet S. Arora and
                  Kai Cao and
                  Lacey Best{-}Rowden and
                  Anjoo Bhatnagar},
  title        = {Fingerprint Recognition of Young Children},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {12},
  number       = {7},
  pages        = {1501--1514},
  year         = {2017},
  url          = {https://doi.org/10.1109/TIFS.2016.2639346},
  doi          = {10.1109/TIFS.2016.2639346},
  timestamp    = {Thu, 06 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/JainA0BB17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/JajodiaPPPSSS17,
  author       = {Sushil Jajodia and
                  Noseong Park and
                  Fabio Pierazzi and
                  Andrea Pugliese and
                  Edoardo Serra and
                  Gerardo I. Simari and
                  V. S. Subrahmanian},
  title        = {A Probabilistic Logic of Cyber Deception},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {12},
  number       = {11},
  pages        = {2532--2544},
  year         = {2017},
  url          = {https://doi.org/10.1109/TIFS.2017.2710945},
  doi          = {10.1109/TIFS.2017.2710945},
  timestamp    = {Mon, 26 Oct 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tifs/JajodiaPPPSSS17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/Jiang0WMSL17,
  author       = {Tao Jiang and
                  Xiaofeng Chen and
                  Qianhong Wu and
                  Jianfeng Ma and
                  Willy Susilo and
                  Wenjing Lou},
  title        = {Secure and Efficient Cloud Data Deduplication With Randomized Tag},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {12},
  number       = {3},
  pages        = {532--543},
  year         = {2017},
  url          = {https://doi.org/10.1109/TIFS.2016.2622013},
  doi          = {10.1109/TIFS.2016.2622013},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/Jiang0WMSL17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/JinGDBM17,
  author       = {Yier Jin and
                  Xiaolong Guo and
                  Raj Gautam Dutta and
                  Mohammad{-}Mahdi Bidmeshki and
                  Yiorgos Makris},
  title        = {Data Secrecy Protection Through Information Flow Tracking in Proof-Carrying
                  Hardware {IP} - Part {I:} Framework Fundamentals},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {12},
  number       = {10},
  pages        = {2416--2429},
  year         = {2017},
  url          = {https://doi.org/10.1109/TIFS.2017.2707323},
  doi          = {10.1109/TIFS.2017.2707323},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/JinGDBM17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/KarlssonBL17,
  author       = {Marcus Karlsson and
                  Emil Bj{\"{o}}rnson and
                  Erik G. Larsson},
  title        = {Jamming a {TDD} Point-to-Point Link Using Reciprocity-Based {MIMO}},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {12},
  number       = {12},
  pages        = {2957--2970},
  year         = {2017},
  url          = {https://doi.org/10.1109/TIFS.2017.2725823},
  doi          = {10.1109/TIFS.2017.2725823},
  timestamp    = {Sun, 25 Jul 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/KarlssonBL17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/KhandakerWZZ17,
  author       = {Muhammad R. A. Khandaker and
                  Kai{-}Kit Wong and
                  Yangyang Zhang and
                  Zhongbin Zheng},
  title        = {Probabilistically Robust {SWIPT} for Secrecy {MISOME} Systems},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {12},
  number       = {1},
  pages        = {211--226},
  year         = {2017},
  url          = {https://doi.org/10.1109/TIFS.2016.2611478},
  doi          = {10.1109/TIFS.2016.2611478},
  timestamp    = {Thu, 06 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/KhandakerWZZ17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/KimBVY17,
  author       = {Do{-}hyung Kim and
                  Jun Bi and
                  Athanasios V. Vasilakos and
                  Ikjun Yeom},
  title        = {Security of Cached Content in {NDN}},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {12},
  number       = {12},
  pages        = {2933--2944},
  year         = {2017},
  url          = {https://doi.org/10.1109/TIFS.2017.2725229},
  doi          = {10.1109/TIFS.2017.2725229},
  timestamp    = {Mon, 20 Dec 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tifs/KimBVY17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/KohLPNW17,
  author       = {Jing Yang Koh and
                  Derek Leong and
                  Gareth W. Peters and
                  Ido Nevat and
                  Wai{-}Choong Wong},
  title        = {Optimal Privacy-Preserving Probabilistic Routing for Wireless Networks},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {12},
  number       = {9},
  pages        = {2105--2114},
  year         = {2017},
  url          = {https://doi.org/10.1109/TIFS.2017.2698424},
  doi          = {10.1109/TIFS.2017.2698424},
  timestamp    = {Thu, 06 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/KohLPNW17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/KorusH17,
  author       = {Pawel Korus and
                  Jiwu Huang},
  title        = {Multi-Scale Analysis Strategies in PRNU-Based Tampering Localization},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {12},
  number       = {4},
  pages        = {809--824},
  year         = {2017},
  url          = {https://doi.org/10.1109/TIFS.2016.2636089},
  doi          = {10.1109/TIFS.2016.2636089},
  timestamp    = {Thu, 06 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/KorusH17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/KumarBGIH17,
  author       = {Pardeep Kumar and
                  An Braeken and
                  Andrei V. Gurtov and
                  Jari H. Iinatti and
                  Phuong Hoai Ha},
  title        = {Anonymous Secure Framework in Connected Smart Home Environments},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {12},
  number       = {4},
  pages        = {968--979},
  year         = {2017},
  url          = {https://doi.org/10.1109/TIFS.2016.2647225},
  doi          = {10.1109/TIFS.2016.2647225},
  timestamp    = {Sat, 29 Apr 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/KumarBGIH17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/KwonMWKLK17,
  author       = {Hyukmin Kwon and
                  Aziz Mohaisen and
                  Jiyoung Woo and
                  Yongdae Kim and
                  Eunjo Lee and
                  Huy Kang Kim},
  title        = {Crime Scene Reconstruction: Online Gold Farming Network Analysis},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {12},
  number       = {3},
  pages        = {544--556},
  year         = {2017},
  url          = {https://doi.org/10.1109/TIFS.2016.2623586},
  doi          = {10.1109/TIFS.2016.2623586},
  timestamp    = {Tue, 21 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tifs/KwonMWKLK17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/LarrainBMB17,
  author       = {Tomas Larrain and
                  John S. Bernhard and
                  Domingo Mery and
                  Kevin W. Bowyer},
  title        = {Face Recognition Using Sparse Fingerprint Classification Algorithm},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {12},
  number       = {7},
  pages        = {1646--1657},
  year         = {2017},
  url          = {https://doi.org/10.1109/TIFS.2017.2680403},
  doi          = {10.1109/TIFS.2017.2680403},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/LarrainBMB17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/LawgalyK17,
  author       = {Ashref Lawgaly and
                  Fouad Khelifi},
  title        = {Sensor Pattern Noise Estimation Based on Improved Locally Adaptive
                  {DCT} Filtering and Weighted Averaging for Source Camera Identification
                  and Verification},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {12},
  number       = {2},
  pages        = {392--404},
  year         = {2017},
  url          = {https://doi.org/10.1109/TIFS.2016.2620280},
  doi          = {10.1109/TIFS.2016.2620280},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/LawgalyK17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/LiLH17,
  author       = {Haodong Li and
                  Weiqi Luo and
                  Jiwu Huang},
  title        = {Localization of Diffusion-Based Inpainting in Digital Images},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {12},
  number       = {12},
  pages        = {3050--3064},
  year         = {2017},
  url          = {https://doi.org/10.1109/TIFS.2017.2730822},
  doi          = {10.1109/TIFS.2017.2730822},
  timestamp    = {Tue, 30 Jan 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tifs/LiLH17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/LiLQH17,
  author       = {Haodong Li and
                  Weiqi Luo and
                  Xiaoqing Qiu and
                  Jiwu Huang},
  title        = {Image Forgery Localization via Integrating Tampering Possibility Maps},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {12},
  number       = {5},
  pages        = {1240--1252},
  year         = {2017},
  url          = {https://doi.org/10.1109/TIFS.2017.2656823},
  doi          = {10.1109/TIFS.2017.2656823},
  timestamp    = {Tue, 30 Jan 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tifs/LiLQH17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/LiPC17,
  author       = {Lingxiang Li and
                  Athina P. Petropulu and
                  Zhi Chen},
  title        = {{MIMO} Secret Communications Against an Active Eavesdropper},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {12},
  number       = {10},
  pages        = {2387--2401},
  year         = {2017},
  url          = {https://doi.org/10.1109/TIFS.2017.2705618},
  doi          = {10.1109/TIFS.2017.2705618},
  timestamp    = {Sat, 26 Dec 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tifs/LiPC17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/LiWS17,
  author       = {Yue Li and
                  Haining Wang and
                  Kun Sun},
  title        = {Personal Information in Passwords and Its Security Implications},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {12},
  number       = {10},
  pages        = {2320--2333},
  year         = {2017},
  url          = {https://doi.org/10.1109/TIFS.2017.2705627},
  doi          = {10.1109/TIFS.2017.2705627},
  timestamp    = {Tue, 18 Jun 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/LiWS17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/LiZC17,
  author       = {Yuanman Li and
                  Jiantao Zhou and
                  An Cheng},
  title        = {{SIFT} Keypoint Removal via Directed Graph Construction for Color
                  Images},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {12},
  number       = {12},
  pages        = {2971--2985},
  year         = {2017},
  url          = {https://doi.org/10.1109/TIFS.2017.2730362},
  doi          = {10.1109/TIFS.2017.2730362},
  timestamp    = {Thu, 06 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/LiZC17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/LinL17,
  author       = {Xufeng Lin and
                  Chang{-}Tsun Li},
  title        = {Large-Scale Image Clustering Based on Camera Fingerprints},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {12},
  number       = {4},
  pages        = {793--808},
  year         = {2017},
  url          = {https://doi.org/10.1109/TIFS.2016.2636086},
  doi          = {10.1109/TIFS.2016.2636086},
  timestamp    = {Thu, 06 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/LinL17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/LiuCW17,
  author       = {Yiliang Liu and
                  Hsiao{-}Hwa Chen and
                  Liangmin Wang},
  title        = {Secrecy Capacity Analysis of Artificial Noisy {MIMO} Channels - An
                  Approach Based on Ordered Eigenvalues of Wishart Matrices},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {12},
  number       = {3},
  pages        = {617--630},
  year         = {2017},
  url          = {https://doi.org/10.1109/TIFS.2016.2627219},
  doi          = {10.1109/TIFS.2016.2627219},
  timestamp    = {Wed, 25 Jan 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tifs/LiuCW17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/LiuKHGPW17,
  author       = {Alex X. Liu and
                  Amir R. Khakpour and
                  Joshua W. Hulst and
                  Zihui Ge and
                  Dan Pei and
                  Jia Wang},
  title        = {Firewall Fingerprinting and Denial of Firewalling Attacks},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {12},
  number       = {7},
  pages        = {1699--1712},
  year         = {2017},
  url          = {https://doi.org/10.1109/TIFS.2017.2668602},
  doi          = {10.1109/TIFS.2017.2668602},
  timestamp    = {Fri, 09 Apr 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/LiuKHGPW17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/LiuLH17,
  author       = {Ta{-}Yuan Liu and
                  Shih{-}Chun Lin and
                  Y.{-}W. Peter Hong},
  title        = {On the Role of Artificial Noise in Training and Data Transmission
                  for Secret Communications},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {12},
  number       = {3},
  pages        = {516--531},
  year         = {2017},
  url          = {https://doi.org/10.1109/TIFS.2016.2620281},
  doi          = {10.1109/TIFS.2016.2620281},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/LiuLH17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/LiuLS17,
  author       = {Li Liu and
                  Yue Lu and
                  Ching Y. Suen},
  title        = {An Image-Based Approach to Detection of Fake Coins},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {12},
  number       = {5},
  pages        = {1227--1239},
  year         = {2017},
  url          = {https://doi.org/10.1109/TIFS.2017.2656478},
  doi          = {10.1109/TIFS.2017.2656478},
  timestamp    = {Wed, 24 Aug 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/LiuLS17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/LiuLST17,
  author       = {Nianfeng Liu and
                  Jing Liu and
                  Zhenan Sun and
                  Tieniu Tan},
  title        = {A Code-Level Approach to Heterogeneous Iris Recognition},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {12},
  number       = {10},
  pages        = {2373--2386},
  year         = {2017},
  url          = {https://doi.org/10.1109/TIFS.2017.2686013},
  doi          = {10.1109/TIFS.2017.2686013},
  timestamp    = {Thu, 06 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/LiuLST17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/LiuZC17,
  author       = {Yuhong Liu and
                  Wenqi Zhou and
                  Hong Chen},
  title        = {Efficiently Promoting Product Online Outcome: An Iterative Rating
                  Attack Utilizing Product and Market Property},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {12},
  number       = {6},
  pages        = {1444--1457},
  year         = {2017},
  url          = {https://doi.org/10.1109/TIFS.2017.2668992},
  doi          = {10.1109/TIFS.2017.2668992},
  timestamp    = {Thu, 06 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/LiuZC17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/LongXL17,
  author       = {Hang Long and
                  Wei Xiang and
                  Yuli Li},
  title        = {Precoding and Cooperative Jamming in Multi- Antenna Two-Way Relaying
                  Wiretap Systems Without Eavesdropper's Channel State Information},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {12},
  number       = {6},
  pages        = {1309--1318},
  year         = {2017},
  url          = {https://doi.org/10.1109/TIFS.2017.2656846},
  doi          = {10.1109/TIFS.2017.2656846},
  timestamp    = {Fri, 09 Apr 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/LongXL17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/LuTLW17,
  author       = {Jianfeng Lu and
                  Changbing Tang and
                  Xiang Li and
                  Qian Wu},
  title        = {Designing Socially-Optimal Rating Protocols for Crowdsourcing Contest
                  Dilemma},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {12},
  number       = {6},
  pages        = {1330--1344},
  year         = {2017},
  url          = {https://doi.org/10.1109/TIFS.2017.2656468},
  doi          = {10.1109/TIFS.2017.2656468},
  timestamp    = {Fri, 09 Apr 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/LuTLW17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/LuoCLV17,
  author       = {Hongbin Luo and
                  Zhe Chen and
                  Jiawei Li and
                  Athanasios V. Vasilakos},
  title        = {Preventing Distributed Denial-of-Service Flooding Attacks With Dynamic
                  Path Identifiers},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {12},
  number       = {8},
  pages        = {1801--1815},
  year         = {2017},
  url          = {https://doi.org/10.1109/TIFS.2017.2688414},
  doi          = {10.1109/TIFS.2017.2688414},
  timestamp    = {Fri, 09 Apr 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/LuoCLV17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/LuoYLH17,
  author       = {Da Luo and
                  Rui Yang and
                  Bin Li and
                  Jiwu Huang},
  title        = {Detection of Double Compressed {AMR} Audio Using Stacked Autoencoder},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {12},
  number       = {2},
  pages        = {432--444},
  year         = {2017},
  url          = {https://doi.org/10.1109/TIFS.2016.2622012},
  doi          = {10.1109/TIFS.2016.2622012},
  timestamp    = {Thu, 06 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/LuoYLH17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/LyaminC17,
  author       = {Andrey V. Lyamin and
                  Elena N. Cherepovskaya},
  title        = {An Approach to Biometric Identification by Using Low-Frequency Eye
                  Tracker},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {12},
  number       = {4},
  pages        = {881--891},
  year         = {2017},
  url          = {https://doi.org/10.1109/TIFS.2016.2639342},
  doi          = {10.1109/TIFS.2016.2639342},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/LyaminC17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/ManjaniTVSM17,
  author       = {Ishan Manjani and
                  Snigdha Tariyal and
                  Mayank Vatsa and
                  Richa Singh and
                  Angshul Majumdar},
  title        = {Detecting Silicone Mask-Based Presentation Attack via Deep Dictionary
                  Learning},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {12},
  number       = {7},
  pages        = {1713--1723},
  year         = {2017},
  url          = {https://doi.org/10.1109/TIFS.2017.2676720},
  doi          = {10.1109/TIFS.2017.2676720},
  timestamp    = {Thu, 06 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/ManjaniTVSM17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/MaoCZWZ17,
  author       = {Yunlong Mao and
                  Tingting Chen and
                  Yuan Zhang and
                  Tiancong Wang and
                  Sheng Zhong},
  title        = {Towards Privacy-Preserving Aggregation for Collaborative Spectrum
                  Sensing},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {12},
  number       = {6},
  pages        = {1483--1493},
  year         = {2017},
  url          = {https://doi.org/10.1109/TIFS.2017.2668219},
  doi          = {10.1109/TIFS.2017.2668219},
  timestamp    = {Thu, 09 Dec 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tifs/MaoCZWZ17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/MarraPSV17,
  author       = {Francesco Marra and
                  Giovanni Poggi and
                  Carlo Sansone and
                  Luisa Verdoliva},
  title        = {Blind PRNU-Based Image Clustering for Source Identification},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {12},
  number       = {9},
  pages        = {2197--2211},
  year         = {2017},
  url          = {https://doi.org/10.1109/TIFS.2017.2701335},
  doi          = {10.1109/TIFS.2017.2701335},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/MarraPSV17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/MattaML17,
  author       = {Vincenzo Matta and
                  Mario Di Mauro and
                  Maurizio Longo},
  title        = {DDoS Attacks With Randomized Traffic Innovation: Botnet Identification
                  Challenges and Strategies},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {12},
  number       = {8},
  pages        = {1844--1859},
  year         = {2017},
  url          = {https://doi.org/10.1109/TIFS.2017.2692685},
  doi          = {10.1109/TIFS.2017.2692685},
  timestamp    = {Sat, 05 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/MattaML17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/MerkelDV17,
  author       = {Ronny Merkel and
                  Jana Dittmann and
                  Claus Vielhauer},
  title        = {A First Public Research Collection of High-Resolution Latent Fingerprint
                  Time Series for Short- and Long-Term Print Age Estimation},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {12},
  number       = {10},
  pages        = {2276--2291},
  year         = {2017},
  url          = {https://doi.org/10.1109/TIFS.2017.2705622},
  doi          = {10.1109/TIFS.2017.2705622},
  timestamp    = {Thu, 06 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/MerkelDV17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/MinSALL17,
  author       = {Byoung{-}Kyong Min and
                  Heung{-}Il Suk and
                  Min{-}Hee Ahn and
                  Min{-}Ho Lee and
                  Seong{-}Whan Lee},
  title        = {Individual Identification Using Cognitive Electroencephalographic
                  Neurodynamics},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {12},
  number       = {9},
  pages        = {2159--2167},
  year         = {2017},
  url          = {https://doi.org/10.1109/TIFS.2017.2699944},
  doi          = {10.1109/TIFS.2017.2699944},
  timestamp    = {Tue, 21 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tifs/MinSALL17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/MohamedSS17,
  author       = {Manar Mohamed and
                  Babins Shrestha and
                  Nitesh Saxena},
  title        = {SMASheD: Sniffing and Manipulating Android Sensor Data for Offensive
                  Purposes},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {12},
  number       = {4},
  pages        = {901--913},
  year         = {2017},
  url          = {https://doi.org/10.1109/TIFS.2016.2620278},
  doi          = {10.1109/TIFS.2016.2620278},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/MohamedSS17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/MohapatraML17,
  author       = {Parthajit Mohapatra and
                  Chandra R. Murthy and
                  Jemin Lee},
  title        = {On the Secrecy Capacity Region of the Two-User Symmetric {Z} Interference
                  Channel With Unidirectional Transmitter Cooperation},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {12},
  number       = {3},
  pages        = {572--587},
  year         = {2017},
  url          = {https://doi.org/10.1109/TIFS.2016.2622007},
  doi          = {10.1109/TIFS.2016.2622007},
  timestamp    = {Thu, 06 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/MohapatraML17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/MondalB17,
  author       = {Soumik Mondal and
                  Patrick Bours},
  title        = {Person Identification by Keystroke Dynamics Using Pairwise User Coupling},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {12},
  number       = {6},
  pages        = {1319--1329},
  year         = {2017},
  url          = {https://doi.org/10.1109/TIFS.2017.2658539},
  doi          = {10.1109/TIFS.2017.2658539},
  timestamp    = {Thu, 06 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/MondalB17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/MontazeriHP17,
  author       = {Zarrin Montazeri and
                  Amir Houmansadr and
                  Hossein Pishro{-}Nik},
  title        = {Achieving Perfect Location Privacy in Wireless Devices Using Anonymization},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {12},
  number       = {11},
  pages        = {2683--2698},
  year         = {2017},
  url          = {https://doi.org/10.1109/TIFS.2017.2713341},
  doi          = {10.1109/TIFS.2017.2713341},
  timestamp    = {Thu, 06 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/MontazeriHP17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/MoraffahS17,
  author       = {Bahman Moraffah and
                  Lalitha Sankar},
  title        = {Privacy-Guaranteed Two-Agent Interactions Using Information-Theoretic
                  Mechanisms},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {12},
  number       = {9},
  pages        = {2168--2183},
  year         = {2017},
  url          = {https://doi.org/10.1109/TIFS.2017.2701278},
  doi          = {10.1109/TIFS.2017.2701278},
  timestamp    = {Thu, 06 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/MoraffahS17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/MurakamiKH17,
  author       = {Takao Murakami and
                  Atsunori Kanemura and
                  Hideitsu Hino},
  title        = {Group Sparsity Tensor Factorization for Re-Identification of Open
                  Mobility Traces},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {12},
  number       = {3},
  pages        = {689--704},
  year         = {2017},
  url          = {https://doi.org/10.1109/TIFS.2016.2631952},
  doi          = {10.1109/TIFS.2016.2631952},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/MurakamiKH17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/NadeauS17,
  author       = {Andrew Nadeau and
                  Gaurav Sharma},
  title        = {An Audio Watermark Designed for Efficient and Robust Resynchronization
                  After Analog Playback},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {12},
  number       = {6},
  pages        = {1393--1405},
  year         = {2017},
  url          = {https://doi.org/10.1109/TIFS.2017.2661724},
  doi          = {10.1109/TIFS.2017.2661724},
  timestamp    = {Wed, 14 Apr 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/NadeauS17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/NanYYZZGWS17,
  author       = {Yuhong Nan and
                  Zhemin Yang and
                  Min Yang and
                  Shunfan Zhou and
                  Yuan Zhang and
                  Guofei Gu and
                  Xiaofeng Wang and
                  Limin Sun},
  title        = {Identifying User-Input Privacy in Mobile Applications at a Large Scale},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {12},
  number       = {3},
  pages        = {647--661},
  year         = {2017},
  url          = {https://doi.org/10.1109/TIFS.2016.2631949},
  doi          = {10.1109/TIFS.2016.2631949},
  timestamp    = {Wed, 12 Jun 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/NanYYZZGWS17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/NataleB17,
  author       = {Francesco G. B. De Natale and
                  Giulia Boato},
  title        = {Detecting Morphological Filtering of Binary Images},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {12},
  number       = {5},
  pages        = {1207--1217},
  year         = {2017},
  url          = {https://doi.org/10.1109/TIFS.2017.2656472},
  doi          = {10.1109/TIFS.2017.2656472},
  timestamp    = {Thu, 06 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/NataleB17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/NissimCE17,
  author       = {Nir Nissim and
                  Aviad Cohen and
                  Yuval Elovici},
  title        = {{ALDOCX:} Detection of Unknown Malicious Microsoft Office Documents
                  Using Designated Active Learning Methods Based on New Structural Feature
                  Extraction Methodology},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {12},
  number       = {3},
  pages        = {631--646},
  year         = {2017},
  url          = {https://doi.org/10.1109/TIFS.2016.2631905},
  doi          = {10.1109/TIFS.2016.2631905},
  timestamp    = {Fri, 26 Mar 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tifs/NissimCE17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/OkadaU17,
  author       = {Hiroki Okada and
                  Ken Umeno},
  title        = {Randomness Evaluation With the Discrete Fourier Transform Test Based
                  on Exact Analysis of the Reference Distribution},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {12},
  number       = {5},
  pages        = {1218--1226},
  year         = {2017},
  url          = {https://doi.org/10.1109/TIFS.2017.2656473},
  doi          = {10.1109/TIFS.2017.2656473},
  timestamp    = {Wed, 26 Jul 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/OkadaU17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/OsadchyHGDP17,
  author       = {Margarita Osadchy and
                  Julio C. Hernandez{-}Castro and
                  Stuart J. Gibson and
                  Orr Dunkelman and
                  Daniel P{\'{e}}rez{-}Cabo},
  title        = {No Bot Expects the DeepCAPTCHA! Introducing Immutable Adversarial
                  Examples, With Applications to {CAPTCHA} Generation},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {12},
  number       = {11},
  pages        = {2640--2653},
  year         = {2017},
  url          = {https://doi.org/10.1109/TIFS.2017.2718479},
  doi          = {10.1109/TIFS.2017.2718479},
  timestamp    = {Fri, 08 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/OsadchyHGDP17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/OuamaneCBBBH17,
  author       = {Abdelmalik Ouamane and
                  Ammar Chouchane and
                  Elhocine Boutellaa and
                  Mebarka Belahcene and
                  Salah Bourennane and
                  Abdenour Hadid},
  title        = {Efficient Tensor-Based 2D+3D Face Verification},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {12},
  number       = {11},
  pages        = {2751--2762},
  year         = {2017},
  url          = {https://doi.org/10.1109/TIFS.2017.2718490},
  doi          = {10.1109/TIFS.2017.2718490},
  timestamp    = {Sun, 06 Oct 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/OuamaneCBBBH17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/OzmenG17,
  author       = {Mustafa Ozmen and
                  Mustafa Cenk Gursoy},
  title        = {Secure Transmission of Delay-Sensitive Data Over Wireless Fading Channels},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {12},
  number       = {9},
  pages        = {2036--2051},
  year         = {2017},
  url          = {https://doi.org/10.1109/TIFS.2017.2692749},
  doi          = {10.1109/TIFS.2017.2692749},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/OzmenG17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/PanZZZJ17,
  author       = {Wuqiong Pan and
                  Fangyu Zheng and
                  Yuan Zhao and
                  Wen Tao Zhu and
                  Jiwu Jing},
  title        = {An Efficient Elliptic Curve Cryptography Signature Server With {GPU}
                  Acceleration},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {12},
  number       = {1},
  pages        = {111--122},
  year         = {2017},
  url          = {https://doi.org/10.1109/TIFS.2016.2603974},
  doi          = {10.1109/TIFS.2016.2603974},
  timestamp    = {Sun, 06 Oct 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/PanZZZJ17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/PapadopoulosNDM17,
  author       = {Athanasios Papadopoulos and
                  Toan Nguyen and
                  Emre Durmus and
                  Nasir D. Memon},
  title        = {IllusionPIN: Shoulder-Surfing Resistant Authentication Using Hybrid
                  Images},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {12},
  number       = {12},
  pages        = {2875--2889},
  year         = {2017},
  url          = {https://doi.org/10.1109/TIFS.2017.2725199},
  doi          = {10.1109/TIFS.2017.2725199},
  timestamp    = {Tue, 07 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/PapadopoulosNDM17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/PasquiniBP17,
  author       = {Cecilia Pasquini and
                  Giulia Boato and
                  Fernando P{\'{e}}rez{-}Gonz{\'{a}}lez},
  title        = {Statistical Detection of {JPEG} Traces in Digital Images in Uncompressed
                  Formats},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {12},
  number       = {12},
  pages        = {2890--2905},
  year         = {2017},
  url          = {https://doi.org/10.1109/TIFS.2017.2725201},
  doi          = {10.1109/TIFS.2017.2725201},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/PasquiniBP17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/PatranabisCMC17,
  author       = {Sikhar Patranabis and
                  Abhishek Chakraborty and
                  Debdeep Mukhopadhyay and
                  Partha Pratim Chakrabarti},
  title        = {Fault Space Transformation: {A} Generic Approach to Counter Differential
                  Fault Analysis and Differential Fault Intensity Analysis on AES-Like
                  Block Ciphers},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {12},
  number       = {5},
  pages        = {1092--1102},
  year         = {2017},
  url          = {https://doi.org/10.1109/TIFS.2016.2646638},
  doi          = {10.1109/TIFS.2016.2646638},
  timestamp    = {Thu, 06 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/PatranabisCMC17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/PawlickZ17,
  author       = {Jeffrey Pawlick and
                  Quanyan Zhu},
  title        = {Strategic Trust in Cloud-Enabled Cyber-Physical Systems With an Application
                  to Glucose Control},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {12},
  number       = {12},
  pages        = {2906--2919},
  year         = {2017},
  url          = {https://doi.org/10.1109/TIFS.2017.2725224},
  doi          = {10.1109/TIFS.2017.2725224},
  timestamp    = {Thu, 06 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/PawlickZ17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/Pedrouzo-UlloaT17,
  author       = {Alberto Pedrouzo{-}Ulloa and
                  Juan Ram{\'{o}}n Troncoso{-}Pastoriza and
                  Fernando P{\'{e}}rez{-}Gonz{\'{a}}lez},
  title        = {Number Theoretic Transforms for Secure Signal Processing},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {12},
  number       = {5},
  pages        = {1125--1140},
  year         = {2017},
  url          = {https://doi.org/10.1109/TIFS.2016.2647223},
  doi          = {10.1109/TIFS.2016.2647223},
  timestamp    = {Mon, 26 Oct 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tifs/Pedrouzo-UlloaT17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/PengWDT17,
  author       = {Bo Peng and
                  Wei Wang and
                  Jing Dong and
                  Tieniu Tan},
  title        = {Optimized 3D Lighting Environment Estimation for Image Forgery Detection},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {12},
  number       = {2},
  pages        = {479--494},
  year         = {2017},
  url          = {https://doi.org/10.1109/TIFS.2016.2623589},
  doi          = {10.1109/TIFS.2016.2623589},
  timestamp    = {Thu, 06 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/PengWDT17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/PokhriyalTNG17,
  author       = {Neeti Pokhriyal and
                  Kshitij Tayal and
                  Ifeoma Nwogu and
                  Venu Govindaraju},
  title        = {Cognitive-Biometric Recognition From Language Usage: {A} Feasibility
                  Study},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {12},
  number       = {1},
  pages        = {134--143},
  year         = {2017},
  url          = {https://doi.org/10.1109/TIFS.2016.2604213},
  doi          = {10.1109/TIFS.2016.2604213},
  timestamp    = {Sun, 06 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/PokhriyalTNG17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/PradhanV17,
  author       = {Parth Pradhan and
                  Parv Venkitasubramaniam},
  title        = {Stealthy Attacks in Dynamical Systems: Tradeoffs Between Utility and
                  Detectability With Application in Anonymous Systems},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {12},
  number       = {4},
  pages        = {779--792},
  year         = {2017},
  url          = {https://doi.org/10.1109/TIFS.2016.2607695},
  doi          = {10.1109/TIFS.2016.2607695},
  timestamp    = {Thu, 06 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/PradhanV17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/ProencaN17,
  author       = {Hugo Proen{\c{c}}a and
                  Jo{\~{a}}o C. Neves},
  title        = {Soft Biometrics: Globally Coherent Solutions for Hair Segmentation
                  and Style Recognition Based on Hierarchical MRFs},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {12},
  number       = {7},
  pages        = {1637--1645},
  year         = {2017},
  url          = {https://doi.org/10.1109/TIFS.2017.2680246},
  doi          = {10.1109/TIFS.2017.2680246},
  timestamp    = {Mon, 08 Apr 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/ProencaN17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/PunYY17,
  author       = {Chi{-}Man Pun and
                  Cai{-}Ping Yan and
                  Xiaochen Yuan},
  title        = {Image Alignment-Based Multi-Region Matching for Object-Level Tampering
                  Detection},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {12},
  number       = {2},
  pages        = {377--391},
  year         = {2017},
  url          = {https://doi.org/10.1109/TIFS.2016.2615272},
  doi          = {10.1109/TIFS.2016.2615272},
  timestamp    = {Thu, 06 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/PunYY17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/QinE17,
  author       = {Huafeng Qin and
                  Mounim A. El{-}Yacoubi},
  title        = {Deep Representation-Based Feature Extraction and Recovering for Finger-Vein
                  Verification},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {12},
  number       = {8},
  pages        = {1816--1829},
  year         = {2017},
  url          = {https://doi.org/10.1109/TIFS.2017.2689724},
  doi          = {10.1109/TIFS.2017.2689724},
  timestamp    = {Fri, 09 Apr 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/QinE17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/RashidiFB17,
  author       = {Bahman Rashidi and
                  Carol J. Fung and
                  Elisa Bertino},
  title        = {A Collaborative DDoS Defence Framework Using Network Function Virtualization},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {12},
  number       = {10},
  pages        = {2483--2497},
  year         = {2017},
  url          = {https://doi.org/10.1109/TIFS.2017.2708693},
  doi          = {10.1109/TIFS.2017.2708693},
  timestamp    = {Thu, 06 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/RashidiFB17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/ReisCMG17,
  author       = {Paulo Max Gil Innocencio Reis and
                  Jo{\~{a}}o Paulo Carvalho Lustosa da Costa and
                  Ricardo Kehrle Miranda and
                  Giovanni Del Galdo},
  title        = {ESPRIT-Hilbert-Based Audio Tampering Detection With {SVM} Classifier
                  for Forensic Analysis via Electrical Network Frequency},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {12},
  number       = {4},
  pages        = {853--864},
  year         = {2017},
  url          = {https://doi.org/10.1109/TIFS.2016.2636095},
  doi          = {10.1109/TIFS.2016.2636095},
  timestamp    = {Thu, 06 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/ReisCMG17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/RenYWW17,
  author       = {Yanzhen Ren and
                  Jing Yang and
                  Jinwei Wang and
                  Lina Wang},
  title        = {{AMR} Steganalysis Based on Second-Order Difference of Pitch Delay},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {12},
  number       = {6},
  pages        = {1345--1357},
  year         = {2017},
  url          = {https://doi.org/10.1109/TIFS.2016.2636087},
  doi          = {10.1109/TIFS.2016.2636087},
  timestamp    = {Fri, 15 Dec 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tifs/RenYWW17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/RevadigarJXVHJ17,
  author       = {Girish Revadigar and
                  Chitra Javali and
                  Weitao Xu and
                  Athanasios V. Vasilakos and
                  Wen Hu and
                  Sanjay Jha},
  title        = {Accelerometer and Fuzzy Vault-Based Secure Group Key Generation and
                  Sharing Protocol for Smart Wearables},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {12},
  number       = {10},
  pages        = {2467--2482},
  year         = {2017},
  url          = {https://doi.org/10.1109/TIFS.2017.2708690},
  doi          = {10.1109/TIFS.2017.2708690},
  timestamp    = {Fri, 09 Apr 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/RevadigarJXVHJ17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/RochaSFCTSCS17,
  author       = {Anderson Rocha and
                  Walter J. Scheirer and
                  Christopher W. Forstall and
                  Thiago Cavalcante and
                  Antonio Theophilo and
                  Bingyu Shen and
                  Ariadne Carvalho and
                  Efstathios Stamatatos},
  title        = {Authorship Attribution for Social Media Forensics},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {12},
  number       = {1},
  pages        = {5--33},
  year         = {2017},
  url          = {https://doi.org/10.1109/TIFS.2016.2603960},
  doi          = {10.1109/TIFS.2016.2603960},
  timestamp    = {Mon, 01 Mar 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tifs/RochaSFCTSCS17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/RohloffCS17,
  author       = {Kurt Rohloff and
                  David Bruce Cousins and
                  Daniel Sumorok},
  title        = {Scalable, Practical VoIP Teleconferencing With End-to-End Homomorphic
                  Encryption},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {12},
  number       = {5},
  pages        = {1031--1041},
  year         = {2017},
  url          = {https://doi.org/10.1109/TIFS.2016.2639340},
  doi          = {10.1109/TIFS.2016.2639340},
  timestamp    = {Thu, 06 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/RohloffCS17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/RothTMS17,
  author       = {John D. Roth and
                  Murali Tummala and
                  John C. McEachen and
                  James W. Scrofani},
  title        = {On Location Privacy in {LTE} Networks},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {12},
  number       = {6},
  pages        = {1358--1368},
  year         = {2017},
  url          = {https://doi.org/10.1109/TIFS.2017.2656470},
  doi          = {10.1109/TIFS.2017.2656470},
  timestamp    = {Thu, 06 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/RothTMS17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/RoyMR17,
  author       = {Aditi Roy and
                  Nasir D. Memon and
                  Arun Ross},
  title        = {MasterPrint: Exploring the Vulnerability of Partial Fingerprint-Based
                  Authentication Systems},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {12},
  number       = {9},
  pages        = {2013--2025},
  year         = {2017},
  url          = {https://doi.org/10.1109/TIFS.2017.2691658},
  doi          = {10.1109/TIFS.2017.2691658},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/RoyMR17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/SaitoTK17,
  author       = {Shota Saito and
                  Yoichi Tomioka and
                  Hitoshi Kitazawa},
  title        = {A Theoretical Framework for Estimating False Acceptance Rate of PRNU-Based
                  Camera Identification},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {12},
  number       = {9},
  pages        = {2026--2035},
  year         = {2017},
  url          = {https://doi.org/10.1109/TIFS.2017.2692683},
  doi          = {10.1109/TIFS.2017.2692683},
  timestamp    = {Mon, 26 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/SaitoTK17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/Salmani17,
  author       = {Hassan Salmani},
  title        = {{COTD:} Reference-Free Hardware Trojan Detection and Recovery Based
                  on Controllability and Observability in Gate-Level Netlist},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {12},
  number       = {2},
  pages        = {338--350},
  year         = {2017},
  url          = {https://doi.org/10.1109/TIFS.2016.2613842},
  doi          = {10.1109/TIFS.2016.2613842},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/Salmani17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/SeiO17,
  author       = {Yuichi Sei and
                  Akihiko Ohsuga},
  title        = {Differential Private Data Collection and Analysis Based on Randomized
                  Multiple Dummies for Untrusted Mobile Crowdsensing},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {12},
  number       = {4},
  pages        = {926--939},
  year         = {2017},
  url          = {https://doi.org/10.1109/TIFS.2016.2632069},
  doi          = {10.1109/TIFS.2016.2632069},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/SeiO17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/SenstEKS17,
  author       = {Tobias Senst and
                  Volker Eiselein and
                  Alexander Kuhn and
                  Thomas Sikora},
  title        = {Crowd Violence Detection Using Global Motion-Compensated Lagrangian
                  Features and Scale-Sensitive Video-Level Representation},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {12},
  number       = {12},
  pages        = {2945--2956},
  year         = {2017},
  url          = {https://doi.org/10.1109/TIFS.2017.2725820},
  doi          = {10.1109/TIFS.2017.2725820},
  timestamp    = {Thu, 06 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/SenstEKS17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/SharmaS17,
  author       = {Abhishek Sharma and
                  Suresh Sundaram},
  title        = {A Novel Online Signature Verification System Based on {GMM} Features
                  in a {DTW} Framework},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {12},
  number       = {3},
  pages        = {705--718},
  year         = {2017},
  url          = {https://doi.org/10.1109/TIFS.2016.2632063},
  doi          = {10.1109/TIFS.2016.2632063},
  timestamp    = {Tue, 07 Sep 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/SharmaS17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/ShehnepoorSFC17,
  author       = {Saeedreza Shehnepoor and
                  Mostafa Salehi and
                  Reza Farahbakhsh and
                  No{\"{e}}l Crespi},
  title        = {NetSpam: {A} Network-Based Spam Detection Framework for Reviews in
                  Online Social Media},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {12},
  number       = {7},
  pages        = {1585--1595},
  year         = {2017},
  url          = {https://doi.org/10.1109/TIFS.2017.2675361},
  doi          = {10.1109/TIFS.2017.2675361},
  timestamp    = {Thu, 06 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/ShehnepoorSFC17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/ShenSCHS17,
  author       = {Jian Shen and
                  Jun Shen and
                  Xiaofeng Chen and
                  Xinyi Huang and
                  Willy Susilo},
  title        = {An Efficient Public Auditing Protocol With Novel Dynamic Structure
                  for Cloud Data},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {12},
  number       = {10},
  pages        = {2402--2415},
  year         = {2017},
  url          = {https://doi.org/10.1109/TIFS.2017.2705620},
  doi          = {10.1109/TIFS.2017.2705620},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/ShenSCHS17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/ShenWZW17,
  author       = {Meng Shen and
                  Mingwei Wei and
                  Liehuang Zhu and
                  Mingzhong Wang},
  title        = {Classification of Encrypted Traffic With Second-Order Markov Chains
                  and Application Attribute Bigrams},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {12},
  number       = {8},
  pages        = {1830--1843},
  year         = {2017},
  url          = {https://doi.org/10.1109/TIFS.2017.2692682},
  doi          = {10.1109/TIFS.2017.2692682},
  timestamp    = {Sun, 22 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/ShenWZW17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/ShenZS17,
  author       = {Hua Shen and
                  Mingwu Zhang and
                  Jian Shen},
  title        = {Efficient Privacy-Preserving Cube-Data Aggregation Scheme for Smart
                  Grids},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {12},
  number       = {6},
  pages        = {1369--1381},
  year         = {2017},
  url          = {https://doi.org/10.1109/TIFS.2017.2656475},
  doi          = {10.1109/TIFS.2017.2656475},
  timestamp    = {Thu, 06 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/ShenZS17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/Shim17,
  author       = {Kyung{-}Ah Shim},
  title        = {{BASIS:} {A} Practical Multi-User Broadcast Authentication Scheme
                  in Wireless Sensor Networks},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {12},
  number       = {7},
  pages        = {1545--1554},
  year         = {2017},
  url          = {https://doi.org/10.1109/TIFS.2017.2668062},
  doi          = {10.1109/TIFS.2017.2668062},
  timestamp    = {Thu, 06 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/Shim17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/SiavoshaniMFD17,
  author       = {Mahdi Jafari Siavoshani and
                  Shaunak Mishra and
                  Christina Fragouli and
                  Suhas N. Diggavi},
  title        = {Multi-Party Secret Key Agreement Over State-Dependent Wireless Broadcast
                  Channels},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {12},
  number       = {2},
  pages        = {323--337},
  year         = {2017},
  url          = {https://doi.org/10.1109/TIFS.2016.2612649},
  doi          = {10.1109/TIFS.2016.2612649},
  timestamp    = {Thu, 06 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/SiavoshaniMFD17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/SongWWSLP17,
  author       = {Wei Song and
                  Bing Wang and
                  Qian Wang and
                  Chengliang Shi and
                  Wenjing Lou and
                  Zhiyong Peng},
  title        = {Publicly Verifiable Computation of Polynomials Over Outsourced Data
                  With Multiple Sources},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {12},
  number       = {10},
  pages        = {2334--2347},
  year         = {2017},
  url          = {https://doi.org/10.1109/TIFS.2017.2705628},
  doi          = {10.1109/TIFS.2017.2705628},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/SongWWSLP17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/Soria-ComasDSM17,
  author       = {Jordi Soria{-}Comas and
                  Josep Domingo{-}Ferrer and
                  David S{\'{a}}nchez and
                  David Meg{\'{\i}}as},
  title        = {Individual Differential Privacy: {A} Utility-Preserving Formulation
                  of Differential Privacy Guarantees},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {12},
  number       = {6},
  pages        = {1418--1429},
  year         = {2017},
  url          = {https://doi.org/10.1109/TIFS.2017.2663337},
  doi          = {10.1109/TIFS.2017.2663337},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/Soria-ComasDSM17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/StankoAS17,
  author       = {Taras Stanko and
                  Fitria Nur Andini and
                  Boris Skoric},
  title        = {Optimized Quantization in Zero Leakage Helper Data Systems},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {12},
  number       = {8},
  pages        = {1957--1966},
  year         = {2017},
  url          = {https://doi.org/10.1109/TIFS.2017.2697840},
  doi          = {10.1109/TIFS.2017.2697840},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/StankoAS17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/SunJ17,
  author       = {Hua Sun and
                  Syed Ali Jafar},
  title        = {Optimal Download Cost of Private Information Retrieval for Arbitrary
                  Message Length},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {12},
  number       = {12},
  pages        = {2920--2932},
  year         = {2017},
  url          = {https://doi.org/10.1109/TIFS.2017.2725225},
  doi          = {10.1109/TIFS.2017.2725225},
  timestamp    = {Thu, 06 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/SunJ17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/SunLLML17,
  author       = {Mingshen Sun and
                  Xiaolei Li and
                  John C. S. Lui and
                  Richard T. B. Ma and
                  Zhenkai Liang},
  title        = {Monet: {A} User-Oriented Behavior-Based Malware Variants Detection
                  System for Android},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {12},
  number       = {5},
  pages        = {1103--1112},
  year         = {2017},
  url          = {https://doi.org/10.1109/TIFS.2016.2646641},
  doi          = {10.1109/TIFS.2016.2646641},
  timestamp    = {Sat, 05 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/SunLLML17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/SusiloJGYYM17,
  author       = {Willy Susilo and
                  Peng Jiang and
                  Fuchun Guo and
                  Guomin Yang and
                  Yong Yu and
                  Yi Mu},
  title        = {{EACSIP:} Extendable Access Control System With Integrity Protection
                  for Enhancing Collaboration in the Cloud},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {12},
  number       = {12},
  pages        = {3110--3122},
  year         = {2017},
  url          = {https://doi.org/10.1109/TIFS.2017.2737960},
  doi          = {10.1109/TIFS.2017.2737960},
  timestamp    = {Mon, 30 Sep 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/SusiloJGYYM17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/TahaY17,
  author       = {Kamal Taha and
                  Paul D. Yoo},
  title        = {Using the Spanning Tree of a Criminal Network for Identifying Its
                  Leaders},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {12},
  number       = {2},
  pages        = {445--453},
  year         = {2017},
  url          = {https://doi.org/10.1109/TIFS.2016.2622226},
  doi          = {10.1109/TIFS.2016.2622226},
  timestamp    = {Sat, 05 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/TahaY17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/TanGG17,
  author       = {Onur Tan and
                  Jes{\'{u}}s G{\'{o}}mez{-}Vilardeb{\'{o}} and
                  Deniz G{\"{u}}nd{\"{u}}z},
  title        = {Privacy-Cost Trade-offs in Demand-Side Management With Storage},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {12},
  number       = {6},
  pages        = {1458--1469},
  year         = {2017},
  url          = {https://doi.org/10.1109/TIFS.2017.2656469},
  doi          = {10.1109/TIFS.2017.2656469},
  timestamp    = {Thu, 23 Jun 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/TanGG17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/TanNFYKIG17,
  author       = {Rui Tan and
                  Hoang Hai Nguyen and
                  Yi Shyh Eddy Foo and
                  David K. Y. Yau and
                  Zbigniew Kalbarczyk and
                  Ravishankar K. Iyer and
                  Hoay Beng Gooi},
  title        = {Modeling and Mitigating Impact of False Data Injection Attacks on
                  Automatic Generation Control},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {12},
  number       = {7},
  pages        = {1609--1624},
  year         = {2017},
  url          = {https://doi.org/10.1109/TIFS.2017.2676721},
  doi          = {10.1109/TIFS.2017.2676721},
  timestamp    = {Fri, 12 Jan 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tifs/TanNFYKIG17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/TanZLH17,
  author       = {Shunquan Tan and
                  Haojie Zhang and
                  Bin Li and
                  Jiwu Huang},
  title        = {Pixel-Decimation-Assisted Steganalysis of Synchronize-Embedding-Changes
                  Steganography},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {12},
  number       = {7},
  pages        = {1658--1670},
  year         = {2017},
  url          = {https://doi.org/10.1109/TIFS.2017.2682703},
  doi          = {10.1109/TIFS.2017.2682703},
  timestamp    = {Thu, 06 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/TanZLH17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/TaspinarMM17,
  author       = {Samet Taspinar and
                  Manoranjan Mohanty and
                  Nasir D. Memon},
  title        = {PRNU-Based Camera Attribution From Multiple Seam-Carved Images},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {12},
  number       = {12},
  pages        = {3065--3080},
  year         = {2017},
  url          = {https://doi.org/10.1109/TIFS.2017.2737961},
  doi          = {10.1109/TIFS.2017.2737961},
  timestamp    = {Thu, 06 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/TaspinarMM17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/TavangaranBS17,
  author       = {Nima Tavangaran and
                  Holger Boche and
                  Rafael F. Schaefer},
  title        = {Secret-Key Generation Using Compound Sources and One-Way Public Communication},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {12},
  number       = {1},
  pages        = {227--241},
  year         = {2017},
  url          = {https://doi.org/10.1109/TIFS.2016.2611484},
  doi          = {10.1109/TIFS.2016.2611484},
  timestamp    = {Thu, 06 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/TavangaranBS17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/ThaiCRD17,
  author       = {Thanh Hai Thai and
                  R{\'{e}}mi Cogranne and
                  Florent Retraint and
                  Thi{-}Ngoc{-}Canh Doan},
  title        = {{JPEG} Quantization Step Estimation and Its Applications to Digital
                  Image Forensics},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {12},
  number       = {1},
  pages        = {123--133},
  year         = {2017},
  url          = {https://doi.org/10.1109/TIFS.2016.2604208},
  doi          = {10.1109/TIFS.2016.2604208},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/ThaiCRD17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/TianBCMK17,
  author       = {Jing (Dave) Tian and
                  Kevin R. B. Butler and
                  Joseph I. Choi and
                  Patrick D. McDaniel and
                  Padma Krishnaswamy},
  title        = {Securing {ARP/NDP} From the Ground Up},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {12},
  number       = {9},
  pages        = {2131--2143},
  year         = {2017},
  url          = {https://doi.org/10.1109/TIFS.2017.2695983},
  doi          = {10.1109/TIFS.2017.2695983},
  timestamp    = {Thu, 06 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/TianBCMK17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/TondiAPB17,
  author       = {Benedetta Tondi and
                  Pedro {Comesa{~{n}}a Alfaro} and
                  Fernando P{\'{e}}rez{-}Gonz{\'{a}}lez and
                  Mauro Barni},
  title        = {Smart Detection of Line-Search Oracle Attacks},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {12},
  number       = {3},
  pages        = {588--603},
  year         = {2017},
  url          = {https://doi.org/10.1109/TIFS.2016.2624280},
  doi          = {10.1109/TIFS.2016.2624280},
  timestamp    = {Sat, 09 Apr 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/TondiAPB17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/TongHZ17,
  author       = {Wei Tong and
                  Jingyu Hua and
                  Sheng Zhong},
  title        = {A Jointly Differentially Private Scheduling Protocol for Ridesharing
                  Services},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {12},
  number       = {10},
  pages        = {2444--2456},
  year         = {2017},
  url          = {https://doi.org/10.1109/TIFS.2017.2707334},
  doi          = {10.1109/TIFS.2017.2707334},
  timestamp    = {Thu, 09 Dec 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tifs/TongHZ17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/Tsikerdekis17,
  author       = {Michail Tsikerdekis},
  title        = {Identity Deception Prevention Using Common Contribution Network Data},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {12},
  number       = {1},
  pages        = {188--199},
  year         = {2017},
  url          = {https://doi.org/10.1109/TIFS.2016.2607697},
  doi          = {10.1109/TIFS.2016.2607697},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/Tsikerdekis17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/TuGLP17,
  author       = {Wenwen Tu and
                  Mario Goldenbaum and
                  Lifeng Lai and
                  H. Vincent Poor},
  title        = {On Simultaneously Generating Multiple Keys in a Joint Source-Channel
                  Model},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {12},
  number       = {2},
  pages        = {298--308},
  year         = {2017},
  url          = {https://doi.org/10.1109/TIFS.2016.2612172},
  doi          = {10.1109/TIFS.2016.2612172},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/TuGLP17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/ValsesiaCBM17,
  author       = {Diego Valsesia and
                  Giulio Coluccia and
                  Tiziano Bianchi and
                  Enrico Magli},
  title        = {User Authentication via PRNU-Based Physical Unclonable Functions},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {12},
  number       = {8},
  pages        = {1941--1956},
  year         = {2017},
  url          = {https://doi.org/10.1109/TIFS.2017.2697402},
  doi          = {10.1109/TIFS.2017.2697402},
  timestamp    = {Thu, 06 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/ValsesiaCBM17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/Vazquez-PadinPA17,
  author       = {David Vazquez{-}Padin and
                  Fernando P{\'{e}}rez{-}Gonz{\'{a}}lez and
                  Pedro {Comesa{~{n}}a Alfaro}},
  title        = {A Random Matrix Approach to the Forensic Analysis of Upscaled Images},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {12},
  number       = {9},
  pages        = {2115--2130},
  year         = {2017},
  url          = {https://doi.org/10.1109/TIFS.2017.2699638},
  doi          = {10.1109/TIFS.2017.2699638},
  timestamp    = {Sat, 09 Apr 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/Vazquez-PadinPA17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/VijayakumarPHPK17,
  author       = {Arunkumar Vijayakumar and
                  Vinay C. Patil and
                  Daniel E. Holcomb and
                  Christof Paar and
                  Sandip Kundu},
  title        = {Physical Design Obfuscation of Hardware: {A} Comprehensive Investigation
                  of Device and Logic-Level Techniques},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {12},
  number       = {1},
  pages        = {64--77},
  year         = {2017},
  url          = {https://doi.org/10.1109/TIFS.2016.2601067},
  doi          = {10.1109/TIFS.2016.2601067},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/VijayakumarPHPK17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/WanSZ17,
  author       = {Ming Wan and
                  Wenli Shang and
                  Peng Zeng},
  title        = {Double Behavior Characteristics for One-Class Classification Anomaly
                  Detection in Networked Control Systems},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {12},
  number       = {12},
  pages        = {3011--3023},
  year         = {2017},
  url          = {https://doi.org/10.1109/TIFS.2017.2730581},
  doi          = {10.1109/TIFS.2017.2730581},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/WanSZ17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/WangCL17,
  author       = {Zhaohong Wang and
                  Sen{-}Ching S. Cheung and
                  Ying Luo},
  title        = {Information-Theoretic Secure Multi-Party Computation With Collusion
                  Deterrence},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {12},
  number       = {4},
  pages        = {980--995},
  year         = {2017},
  url          = {https://doi.org/10.1109/TIFS.2016.2598533},
  doi          = {10.1109/TIFS.2016.2598533},
  timestamp    = {Thu, 31 Mar 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/WangCL17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/WangCWHJ17,
  author       = {Ding Wang and
                  Haibo Cheng and
                  Ping Wang and
                  Xinyi Huang and
                  Gaopeng Jian},
  title        = {Zipf's Law in Passwords},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {12},
  number       = {11},
  pages        = {2776--2791},
  year         = {2017},
  url          = {https://doi.org/10.1109/TIFS.2017.2721359},
  doi          = {10.1109/TIFS.2017.2721359},
  timestamp    = {Mon, 25 Apr 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/WangCWHJ17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/WangLDZYZW17,
  author       = {Bo Wang and
                  Leibo Liu and
                  Chenchen Deng and
                  Min Zhu and
                  Shouyi Yin and
                  Zhuoquan Zhou and
                  Shaojun Wei},
  title        = {Exploration of Benes Network in Cryptographic Processors: {A} Random
                  Infection Countermeasure for Block Ciphers Against Fault Attacks},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {12},
  number       = {2},
  pages        = {309--322},
  year         = {2017},
  url          = {https://doi.org/10.1109/TIFS.2016.2612638},
  doi          = {10.1109/TIFS.2016.2612638},
  timestamp    = {Sun, 22 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/WangLDZYZW17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/WangTL17,
  author       = {Wei Wang and
                  Kah Chan Teh and
                  Kwok Hung Li},
  title        = {Secrecy Throughput Maximization for {MISO} Multi-Eavesdropper Wiretap
                  Channels},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {12},
  number       = {3},
  pages        = {505--515},
  year         = {2017},
  url          = {https://doi.org/10.1109/TIFS.2016.2620279},
  doi          = {10.1109/TIFS.2016.2620279},
  timestamp    = {Thu, 06 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/WangTL17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/WangW17,
  author       = {Jun Wang and
                  Guoqing Wang},
  title        = {Quality-Specific Hand Vein Recognition System},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {12},
  number       = {11},
  pages        = {2599--2610},
  year         = {2017},
  url          = {https://doi.org/10.1109/TIFS.2017.2713340},
  doi          = {10.1109/TIFS.2017.2713340},
  timestamp    = {Thu, 23 Dec 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tifs/WangW17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/WangWQSDH17,
  author       = {Yujue Wang and
                  Qianhong Wu and
                  Bo Qin and
                  Wenchang Shi and
                  Robert H. Deng and
                  Jiankun Hu},
  title        = {Identity-Based Data Outsourcing With Comprehensive Auditing in Clouds},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {12},
  number       = {4},
  pages        = {940--952},
  year         = {2017},
  url          = {https://doi.org/10.1109/TIFS.2016.2646913},
  doi          = {10.1109/TIFS.2016.2646913},
  timestamp    = {Thu, 06 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/WangWQSDH17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/WangWQTS17,
  author       = {Yujue Wang and
                  Qianhong Wu and
                  Bo Qin and
                  Shaohua Tang and
                  Willy Susilo},
  title        = {Online/Offline Provable Data Possession},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {12},
  number       = {5},
  pages        = {1182--1194},
  year         = {2017},
  url          = {https://doi.org/10.1109/TIFS.2017.2656461},
  doi          = {10.1109/TIFS.2017.2656461},
  timestamp    = {Thu, 06 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/WangWQTS17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/WangXLLX17,
  author       = {Tianbo Wang and
                  Chunhe Xia and
                  Zhong Li and
                  Xiaochen Liu and
                  Yang Xiang},
  title        = {The Spatial-Temporal Perspective: The Study of the Propagation of
                  Modern Social Worms},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {12},
  number       = {11},
  pages        = {2558--2573},
  year         = {2017},
  url          = {https://doi.org/10.1109/TIFS.2017.2711424},
  doi          = {10.1109/TIFS.2017.2711424},
  timestamp    = {Thu, 06 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/WangXLLX17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/WeiCHV17,
  author       = {Chun{-}Yi Wei and
                  Po{-}Ning Chen and
                  Yunghsiang S. Han and
                  Pramod K. Varshney},
  title        = {Local Threshold Design for Target Localization Using Error Correcting
                  Codes in Wireless Sensor Networks in the Presence of Byzantine Attacks},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {12},
  number       = {7},
  pages        = {1571--1584},
  year         = {2017},
  url          = {https://doi.org/10.1109/TIFS.2017.2670531},
  doi          = {10.1109/TIFS.2017.2670531},
  timestamp    = {Thu, 06 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/WeiCHV17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/WenLMWZ17,
  author       = {Jiajun Wen and
                  Zhihui Lai and
                  Zhong Ming and
                  Wai Keung Wong and
                  Zuofeng Zhong},
  title        = {Directional Gaussian Model for Automatic Speeding Event Detection},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {12},
  number       = {10},
  pages        = {2292--2307},
  year         = {2017},
  url          = {https://doi.org/10.1109/TIFS.2017.2705623},
  doi          = {10.1109/TIFS.2017.2705623},
  timestamp    = {Thu, 06 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/WenLMWZ17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/Wong017,
  author       = {Chau{-}Wai Wong and
                  Min Wu},
  title        = {Counterfeit Detection Based on Unclonable Feature of Paper Using Mobile
                  Camera},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {12},
  number       = {8},
  pages        = {1885--1899},
  year         = {2017},
  url          = {https://doi.org/10.1109/TIFS.2017.2694404},
  doi          = {10.1109/TIFS.2017.2694404},
  timestamp    = {Thu, 06 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/Wong017.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/XieHGZ17,
  author       = {Miao Xie and
                  Jiankun Hu and
                  Song Guo and
                  Albert Y. Zomaya},
  title        = {Distributed Segment-Based Anomaly Detection With Kullback-Leibler
                  Divergence in Wireless Sensor Networks},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {12},
  number       = {1},
  pages        = {101--110},
  year         = {2017},
  url          = {https://doi.org/10.1109/TIFS.2016.2603961},
  doi          = {10.1109/TIFS.2016.2603961},
  timestamp    = {Thu, 06 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/XieHGZ17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/XieWWTCF17,
  author       = {Qi Xie and
                  Duncan S. Wong and
                  Guilin Wang and
                  Xiao Tan and
                  Kefei Chen and
                  Liming Fang},
  title        = {Provably Secure Dynamic ID-Based Anonymous Two-Factor Authenticated
                  Key Exchange Protocol With Extended Security Model},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {12},
  number       = {6},
  pages        = {1382--1392},
  year         = {2017},
  url          = {https://doi.org/10.1109/TIFS.2017.2659640},
  doi          = {10.1109/TIFS.2017.2659640},
  timestamp    = {Mon, 21 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/XieWWTCF17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/XuCWL17,
  author       = {Qinyi Xu and
                  Yan Chen and
                  Beibei Wang and
                  K. J. Ray Liu},
  title        = {Radio Biometrics: Human Recognition Through a Wall},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {12},
  number       = {5},
  pages        = {1141--1155},
  year         = {2017},
  url          = {https://doi.org/10.1109/TIFS.2016.2647224},
  doi          = {10.1109/TIFS.2016.2647224},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/XuCWL17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/XuJQZLR17,
  author       = {Lei Xu and
                  Chunxiao Jiang and
                  Yi Qian and
                  Youjian Zhao and
                  Jianhua Li and
                  Yong Ren},
  title        = {Dynamic Privacy Pricing: {A} Multi-Armed Bandit Approach With Time-Variant
                  Rewards},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {12},
  number       = {2},
  pages        = {271--285},
  year         = {2017},
  url          = {https://doi.org/10.1109/TIFS.2016.2611487},
  doi          = {10.1109/TIFS.2016.2611487},
  timestamp    = {Mon, 21 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/XuJQZLR17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/XuRZQR17,
  author       = {Chugui Xu and
                  Ju Ren and
                  Yaoxue Zhang and
                  Zhan Qin and
                  Kui Ren},
  title        = {DPPro: Differentially Private High-Dimensional Data Release via Random
                  Projection},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {12},
  number       = {12},
  pages        = {3081--3093},
  year         = {2017},
  url          = {https://doi.org/10.1109/TIFS.2017.2737966},
  doi          = {10.1109/TIFS.2017.2737966},
  timestamp    = {Mon, 25 Mar 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tifs/XuRZQR17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/XuSRDW17,
  author       = {Hongbin Xu and
                  Li Sun and
                  Pinyi Ren and
                  Qinghe Du and
                  Yichen Wang},
  title        = {Cooperative Privacy Preserving Scheme for Downlink Transmission in
                  Multiuser Relay Networks},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {12},
  number       = {4},
  pages        = {825--839},
  year         = {2017},
  url          = {https://doi.org/10.1109/TIFS.2016.2636091},
  doi          = {10.1109/TIFS.2016.2636091},
  timestamp    = {Thu, 06 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/XuSRDW17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/XueLHXYH17,
  author       = {Kaiping Xue and
                  Shaohua Li and
                  Jianan Hong and
                  Yingjie Xue and
                  Nenghai Yu and
                  Peilin Hong},
  title        = {Two-Cloud Secure Database for Numeric-Related {SQL} Range Queries
                  With Privacy Preserving},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {12},
  number       = {7},
  pages        = {1596--1608},
  year         = {2017},
  url          = {https://doi.org/10.1109/TIFS.2017.2675864},
  doi          = {10.1109/TIFS.2017.2675864},
  timestamp    = {Thu, 21 Dec 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tifs/XueLHXYH17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/XueM0TC0Z17,
  author       = {Yinxing Xue and
                  Guozhu Meng and
                  Yang Liu and
                  Tian Huat Tan and
                  Hongxu Chen and
                  Jun Sun and
                  Jie Zhang},
  title        = {Auditing Anti-Malware Tools by Evolving Android Malware and Dynamic
                  Loading Technique},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {12},
  number       = {7},
  pages        = {1529--1544},
  year         = {2017},
  url          = {https://doi.org/10.1109/TIFS.2017.2661723},
  doi          = {10.1109/TIFS.2017.2661723},
  timestamp    = {Fri, 24 Nov 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tifs/XueM0TC0Z17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/XueXHLYWH17,
  author       = {Kaiping Xue and
                  Yingjie Xue and
                  Jianan Hong and
                  Wei Li and
                  Hao Yue and
                  David S. L. Wei and
                  Peilin Hong},
  title        = {{RAAC:} Robust and Auditable Access Control With Multiple Attribute
                  Authorities for Public Cloud Storage},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {12},
  number       = {4},
  pages        = {953--967},
  year         = {2017},
  url          = {https://doi.org/10.1109/TIFS.2016.2647222},
  doi          = {10.1109/TIFS.2016.2647222},
  timestamp    = {Fri, 20 Sep 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/XueXHLYWH17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/YanHZT17,
  author       = {Jun Yan and
                  Haibo He and
                  Xiangnan Zhong and
                  Yufei Tang},
  title        = {Q-Learning-Based Vulnerability Analysis of Smart Grid Against Sequential
                  Topology Attacks},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {12},
  number       = {1},
  pages        = {200--210},
  year         = {2017},
  url          = {https://doi.org/10.1109/TIFS.2016.2607701},
  doi          = {10.1109/TIFS.2016.2607701},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/YanHZT17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/YanLHZ17,
  author       = {Hao Yan and
                  Jiguo Li and
                  Jinguang Han and
                  Yichen Zhang},
  title        = {A Novel Efficient Remote Data Possession Checking Protocol in Cloud
                  Storage},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {12},
  number       = {1},
  pages        = {78--88},
  year         = {2017},
  url          = {https://doi.org/10.1109/TIFS.2016.2601070},
  doi          = {10.1109/TIFS.2016.2601070},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/YanLHZ17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/YanP17,
  author       = {Cai{-}Ping Yan and
                  Chi{-}Man Pun},
  title        = {Multi-Scale Difference Map Fusion for Tamper Localization Using Binary
                  Ranking Hashing},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {12},
  number       = {9},
  pages        = {2144--2158},
  year         = {2017},
  url          = {https://doi.org/10.1109/TIFS.2017.2699942},
  doi          = {10.1109/TIFS.2017.2699942},
  timestamp    = {Thu, 06 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/YanP17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/YangAM0Y017,
  author       = {Qingyu Yang and
                  Dou An and
                  Rui Min and
                  Wei Yu and
                  Xinyu Yang and
                  Wei Zhao},
  title        = {On Optimal {PMU} Placement-Based Defense Against Data Integrity Attacks
                  in Smart Grid},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {12},
  number       = {7},
  pages        = {1735--1750},
  year         = {2017},
  url          = {https://doi.org/10.1109/TIFS.2017.2686367},
  doi          = {10.1109/TIFS.2017.2686367},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/YangAM0Y017.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/YangGZFB17,
  author       = {Qing Yang and
                  Paolo Gasti and
                  Gang Zhou and
                  Aydin Farajidavar and
                  Kiran S. Balagani},
  title        = {On Inferring Browsing Activity on Smartphones via {USB} Power Analysis
                  Side-Channel},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {12},
  number       = {5},
  pages        = {1056--1066},
  year         = {2017},
  url          = {https://doi.org/10.1109/TIFS.2016.2639446},
  doi          = {10.1109/TIFS.2016.2639446},
  timestamp    = {Thu, 06 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/YangGZFB17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/YangZC0ZW17,
  author       = {Wei Yang and
                  Yongbin Zhou and
                  Yuchen Cao and
                  Hailong Zhang and
                  Qian Zhang and
                  Huan Wang},
  title        = {Multi-Channel Fusion Attacks},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {12},
  number       = {8},
  pages        = {1757--1771},
  year         = {2017},
  url          = {https://doi.org/10.1109/TIFS.2017.2672521},
  doi          = {10.1109/TIFS.2017.2672521},
  timestamp    = {Thu, 28 Jan 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tifs/YangZC0ZW17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/YasinSR17,
  author       = {Muhammad Yasin and
                  Ozgur Sinanoglu and
                  Jeyavijayan Rajendran},
  title        = {Testing the Trustworthiness of {IC} Testing: An Oracle-Less Attack
                  on {IC} Camouflaging},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {12},
  number       = {11},
  pages        = {2668--2682},
  year         = {2017},
  url          = {https://doi.org/10.1109/TIFS.2017.2710954},
  doi          = {10.1109/TIFS.2017.2710954},
  timestamp    = {Tue, 29 Dec 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tifs/YasinSR17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/YavuzMSPB17,
  author       = {Attila Altay Yavuz and
                  Anand Mudgerikar and
                  Ankush Singla and
                  Ioannis Papapanagiotou and
                  Elisa Bertino},
  title        = {Real-Time Digital Signatures for Time-Critical Networks},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {12},
  number       = {11},
  pages        = {2627--2639},
  year         = {2017},
  url          = {https://doi.org/10.1109/TIFS.2017.2716911},
  doi          = {10.1109/TIFS.2017.2716911},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/YavuzMSPB17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/YeNY17,
  author       = {Jian Ye and
                  Jiangqun Ni and
                  Yang Yi},
  title        = {Deep Learning Hierarchical Representations for Image Steganalysis},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {12},
  number       = {11},
  pages        = {2545--2557},
  year         = {2017},
  url          = {https://doi.org/10.1109/TIFS.2017.2710946},
  doi          = {10.1109/TIFS.2017.2710946},
  timestamp    = {Fri, 03 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tifs/YeNY17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/YuAAHSDM17,
  author       = {Yong Yu and
                  Man Ho Au and
                  Giuseppe Ateniese and
                  Xinyi Huang and
                  Willy Susilo and
                  Yuanshun Dai and
                  Geyong Min},
  title        = {Identity-Based Remote Data Integrity Checking With Perfect Data Privacy
                  Preserving for Cloud Storage},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {12},
  number       = {4},
  pages        = {767--778},
  year         = {2017},
  url          = {https://doi.org/10.1109/TIFS.2016.2615853},
  doi          = {10.1109/TIFS.2016.2615853},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tifs/YuAAHSDM17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/YuW17,
  author       = {Jia Yu and
                  Huaqun Wang},
  title        = {Strong Key-Exposure Resilient Auditing for Secure Cloud Storage},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {12},
  number       = {8},
  pages        = {1931--1940},
  year         = {2017},
  url          = {https://doi.org/10.1109/TIFS.2017.2695449},
  doi          = {10.1109/TIFS.2017.2695449},
  timestamp    = {Sat, 31 Aug 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/YuW17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/YuZKLF17,
  author       = {Jun Yu and
                  Baopeng Zhang and
                  Zhengzhong Kuang and
                  Dan Lin and
                  Jianping Fan},
  title        = {iPrivacy: Image Privacy Protection by Identifying Sensitive Objects
                  via Deep Multi-Task Learning},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {12},
  number       = {5},
  pages        = {1005--1016},
  year         = {2017},
  url          = {https://doi.org/10.1109/TIFS.2016.2636090},
  doi          = {10.1109/TIFS.2016.2636090},
  timestamp    = {Mon, 26 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/YuZKLF17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/YuZLXC17,
  author       = {Le Yu and
                  Tao Zhang and
                  Xiapu Luo and
                  Lei Xue and
                  Henry Chang},
  title        = {Toward Automatically Generating Privacy Policy for Android Apps},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {12},
  number       = {4},
  pages        = {865--880},
  year         = {2017},
  url          = {https://doi.org/10.1109/TIFS.2016.2639339},
  doi          = {10.1109/TIFS.2016.2639339},
  timestamp    = {Mon, 24 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/YuZLXC17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/YuanWWYN17,
  author       = {Xingliang Yuan and
                  Xinyu Wang and
                  Cong Wang and
                  Chenyun Yu and
                  Sarana Nutanong},
  title        = {Privacy-Preserving Similarity Joins Over Encrypted Data},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {12},
  number       = {11},
  pages        = {2763--2775},
  year         = {2017},
  url          = {https://doi.org/10.1109/TIFS.2017.2721221},
  doi          = {10.1109/TIFS.2017.2721221},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/YuanWWYN17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/ZewailY17,
  author       = {Ahmed A. Zewail and
                  Aylin Yener},
  title        = {Multi-Terminal Two-Hop Untrusted-Relay Networks With Hierarchical
                  Security Guarantees},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {12},
  number       = {9},
  pages        = {2052--2066},
  year         = {2017},
  url          = {https://doi.org/10.1109/TIFS.2017.2695163},
  doi          = {10.1109/TIFS.2017.2695163},
  timestamp    = {Thu, 06 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/ZewailY17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/ZhaNZLN17,
  author       = {Xuan Zha and
                  Wei Ni and
                  Kangfeng Zheng and
                  Ren Ping Liu and
                  Xinxin Niu},
  title        = {Collaborative Authentication in Decentralized Dense Mobile Networks
                  With Key Predistribution},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {12},
  number       = {10},
  pages        = {2261--2275},
  year         = {2017},
  url          = {https://doi.org/10.1109/TIFS.2017.2705584},
  doi          = {10.1109/TIFS.2017.2705584},
  timestamp    = {Mon, 26 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/ZhaNZLN17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/Zhang17,
  author       = {Lei Zhang},
  title        = {{OTIBAAGKA:} {A} New Security Tool for Cryptographic Mix-Zone Establishment
                  in Vehicular Ad Hoc Networks},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {12},
  number       = {12},
  pages        = {2998--3010},
  year         = {2017},
  url          = {https://doi.org/10.1109/TIFS.2017.2730479},
  doi          = {10.1109/TIFS.2017.2730479},
  timestamp    = {Thu, 06 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/Zhang17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/ZhangCZ17,
  author       = {Hong Zhang and
                  Yun Cao and
                  Xianfeng Zhao},
  title        = {A Steganalytic Approach to Detect Motion Vector Modification Using
                  Near-Perfect Estimation for Local Optimality},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {12},
  number       = {2},
  pages        = {465--478},
  year         = {2017},
  url          = {https://doi.org/10.1109/TIFS.2016.2623587},
  doi          = {10.1109/TIFS.2016.2623587},
  timestamp    = {Fri, 09 Apr 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/ZhangCZ17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/ZhangQZ17,
  author       = {Rui Zhang and
                  Shuang Qiu and
                  Yongbin Zhou},
  title        = {Further Improving Efficiency of Higher Order Masking Schemes by Decreasing
                  Randomness Complexity},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {12},
  number       = {11},
  pages        = {2590--2598},
  year         = {2017},
  url          = {https://doi.org/10.1109/TIFS.2017.2713323},
  doi          = {10.1109/TIFS.2017.2713323},
  timestamp    = {Thu, 06 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/ZhangQZ17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/ZhangRWWH17,
  author       = {Yubao Zhang and
                  Xin Ruan and
                  Haining Wang and
                  Hui Wang and
                  Su He},
  title        = {Twitter Trends Manipulation: {A} First Look Inside the Security of
                  Twitter Trending},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {12},
  number       = {1},
  pages        = {144--156},
  year         = {2017},
  url          = {https://doi.org/10.1109/TIFS.2016.2604226},
  doi          = {10.1109/TIFS.2016.2604226},
  timestamp    = {Tue, 18 Jun 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/ZhangRWWH17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/ZhangV17,
  author       = {Ruochi Zhang and
                  Parv Venkitasubramaniam},
  title        = {Stealthy Control Signal Attacks in Linear Quadratic Gaussian Control
                  Systems: Detectability Reward Tradeoff},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {12},
  number       = {7},
  pages        = {1555--1570},
  year         = {2017},
  url          = {https://doi.org/10.1109/TIFS.2017.2668220},
  doi          = {10.1109/TIFS.2017.2668220},
  timestamp    = {Thu, 06 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/ZhangV17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/ZhangWYL17,
  author       = {Aiqing Zhang and
                  Lei Wang and
                  Xinrong Ye and
                  Xiaodong Lin},
  title        = {Light-Weight and Robust Security-Aware D2D-Assist Data Transmission
                  Protocol for Mobile-Health Systems},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {12},
  number       = {3},
  pages        = {662--675},
  year         = {2017},
  url          = {https://doi.org/10.1109/TIFS.2016.2631950},
  doi          = {10.1109/TIFS.2016.2631950},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/ZhangWYL17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/ZhangXLLMZ17,
  author       = {Yuan Zhang and
                  Chunxiang Xu and
                  Xiaohui Liang and
                  Hongwei Li and
                  Yi Mu and
                  Xiaojun Zhang},
  title        = {Efficient Public Verification of Data Integrity for Cloud Storage
                  Systems from Indistinguishability Obfuscation},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {12},
  number       = {3},
  pages        = {676--688},
  year         = {2017},
  url          = {https://doi.org/10.1109/TIFS.2016.2631951},
  doi          = {10.1109/TIFS.2016.2631951},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/ZhangXLLMZ17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/ZhangZ17,
  author       = {Tao Zhang and
                  Quanyan Zhu},
  title        = {Dynamic Differential Privacy for ADMM-Based Distributed Classification
                  Learning},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {12},
  number       = {1},
  pages        = {172--187},
  year         = {2017},
  url          = {https://doi.org/10.1109/TIFS.2016.2607691},
  doi          = {10.1109/TIFS.2016.2607691},
  timestamp    = {Thu, 06 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/ZhangZ17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/Zhao17,
  author       = {Jun Zhao},
  title        = {On Resilience and Connectivity of Secure Wireless Sensor Networks
                  Under Node Capture Attacks},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {12},
  number       = {3},
  pages        = {557--571},
  year         = {2017},
  url          = {https://doi.org/10.1109/TIFS.2016.2613841},
  doi          = {10.1109/TIFS.2016.2613841},
  timestamp    = {Thu, 06 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/Zhao17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/ZhaoK17,
  author       = {Zijing Zhao and
                  Ajay Kumar},
  title        = {Accurate Periocular Recognition Under Less Constrained Environment
                  Using Semantics-Assisted Convolutional Neural Network},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {12},
  number       = {5},
  pages        = {1017--1030},
  year         = {2017},
  url          = {https://doi.org/10.1109/TIFS.2016.2636093},
  doi          = {10.1109/TIFS.2016.2636093},
  timestamp    = {Thu, 29 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tifs/ZhaoK17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/ZhengCWZ17,
  author       = {Yifeng Zheng and
                  Helei Cui and
                  Cong Wang and
                  Jiantao Zhou},
  title        = {Privacy-Preserving Image Denoising From External Cloud Databases},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {12},
  number       = {6},
  pages        = {1285--1298},
  year         = {2017},
  url          = {https://doi.org/10.1109/TIFS.2017.2656824},
  doi          = {10.1109/TIFS.2017.2656824},
  timestamp    = {Thu, 06 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/ZhengCWZ17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/ZhouAR17,
  author       = {Kai Zhou and
                  M. H. Afifi and
                  Jian Ren},
  title        = {ExpSOS: Secure and Verifiable Outsourcing of Exponentiation Operations
                  for Mobile Cloud Computing},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {12},
  number       = {11},
  pages        = {2518--2531},
  year         = {2017},
  url          = {https://doi.org/10.1109/TIFS.2017.2710941},
  doi          = {10.1109/TIFS.2017.2710941},
  timestamp    = {Mon, 22 Jan 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tifs/ZhouAR17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/ZhouWWHW17,
  author       = {Pan Zhou and
                  Qian Wang and
                  Wei Wang and
                  Yuchong Hu and
                  Dapeng Wu},
  title        = {Near-Optimal and Practical Jamming-Resistant Energy-Efficient Cognitive
                  Radio Communications},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {12},
  number       = {11},
  pages        = {2807--2822},
  year         = {2017},
  url          = {https://doi.org/10.1109/TIFS.2017.2721931},
  doi          = {10.1109/TIFS.2017.2721931},
  timestamp    = {Thu, 20 Jun 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/ZhouWWHW17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/ZhouWWYS17,
  author       = {Zhili Zhou and
                  Yunlong Wang and
                  Q. M. Jonathan Wu and
                  Ching{-}Nung Yang and
                  Xingming Sun},
  title        = {Effective and Efficient Global Context Verification for Image Copy
                  Detection},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {12},
  number       = {1},
  pages        = {48--63},
  year         = {2017},
  url          = {https://doi.org/10.1109/TIFS.2016.2601065},
  doi          = {10.1109/TIFS.2016.2601065},
  timestamp    = {Fri, 09 Apr 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/ZhouWWYS17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/ZhouZY17,
  author       = {Wenbo Zhou and
                  Weiming Zhang and
                  Nenghai Yu},
  title        = {A New Rule for Cost Reassignment in Adaptive Steganography},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {12},
  number       = {11},
  pages        = {2654--2667},
  year         = {2017},
  url          = {https://doi.org/10.1109/TIFS.2017.2718480},
  doi          = {10.1109/TIFS.2017.2718480},
  timestamp    = {Thu, 29 Sep 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/ZhouZY17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/ZhuCWHWL17,
  author       = {Zhengyu Zhu and
                  Zheng Chu and
                  Ning Wang and
                  Sai Huang and
                  Zhongyong Wang and
                  Inkyu Lee},
  title        = {Beamforming and Power Splitting Designs for AN-Aided Secure Multi-User
                  {MIMO} {SWIPT} Systems},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {12},
  number       = {12},
  pages        = {2861--2874},
  year         = {2017},
  url          = {https://doi.org/10.1109/TIFS.2017.2721908},
  doi          = {10.1109/TIFS.2017.2721908},
  timestamp    = {Wed, 23 Mar 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tifs/ZhuCWHWL17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}