default search action
Search dblp for Publications
export results for "toc:db/journals/tifs/tifs12.bht:"
@article{DBLP:journals/tifs/0029LBKTLC17, author = {Li Li and Daoyuan Li and Tegawend{\'{e}} F. Bissyand{\'{e}} and Jacques Klein and Yves Le Traon and David Lo and Lorenzo Cavallaro}, title = {Understanding Android App Piggybacking: {A} Systematic Study of Malicious Code Grafting}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {12}, number = {6}, pages = {1269--1284}, year = {2017}, url = {https://doi.org/10.1109/TIFS.2017.2656460}, doi = {10.1109/TIFS.2017.2656460}, timestamp = {Fri, 09 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/0029LBKTLC17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/0100TL17, author = {Wei Wang and Kah Chan Teh and Kwok Hung Li}, title = {Artificial Noise Aided Physical Layer Security in Multi-Antenna Small-Cell Networks}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {12}, number = {6}, pages = {1470--1482}, year = {2017}, url = {https://doi.org/10.1109/TIFS.2017.2663336}, doi = {10.1109/TIFS.2017.2663336}, timestamp = {Thu, 06 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/0100TL17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/AbouelenienPMB17, author = {Mohamed Abouelenien and Ver{\'{o}}nica P{\'{e}}rez{-}Rosas and Rada Mihalcea and Mihai Burzo}, title = {Detecting Deceptive Behavior via Integration of Discriminative Features From Multiple Modalities}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {12}, number = {5}, pages = {1042--1055}, year = {2017}, url = {https://doi.org/10.1109/TIFS.2016.2639344}, doi = {10.1109/TIFS.2016.2639344}, timestamp = {Sun, 12 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tifs/AbouelenienPMB17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/Al-AniK17, author = {Mustafa Al{-}Ani and Fouad Khelifi}, title = {On the {SPN} Estimation in Image Forensics: {A} Systematic Empirical Evaluation}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {12}, number = {5}, pages = {1067--1081}, year = {2017}, url = {https://doi.org/10.1109/TIFS.2016.2640938}, doi = {10.1109/TIFS.2016.2640938}, timestamp = {Mon, 26 Oct 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tifs/Al-AniK17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/Al-QahtaniHHRZA17, author = {Fawaz S. Al{-}Qahtani and Yuzhen Huang and Salah Hessien and Redha M. Radaydeh and Caijun Zhong and Hussein M. Alnuweiri}, title = {Secrecy Analysis of {MIMO} Wiretap Channels With Low-Complexity Receivers Under Imperfect Channel Estimation}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {12}, number = {2}, pages = {257--270}, year = {2017}, url = {https://doi.org/10.1109/TIFS.2016.2604490}, doi = {10.1109/TIFS.2016.2604490}, timestamp = {Mon, 31 Jul 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/Al-QahtaniHHRZA17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/AlaeiPPB17, author = {Alireza Alaei and Srikanta Pal and Umapada Pal and Michael Blumenstein}, title = {An Efficient Signature Verification Method Based on an Interval Symbolic Representation and a Fuzzy Similarity Measure}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {12}, number = {10}, pages = {2360--2372}, year = {2017}, url = {https://doi.org/10.1109/TIFS.2017.2707332}, doi = {10.1109/TIFS.2017.2707332}, timestamp = {Thu, 06 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/AlaeiPPB17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/AlamMACTA17, author = {Quratulain Alam and Saif Ur Rehman Malik and Adnan Akhunzada and Kim{-}Kwang Raymond Choo and Saher Tabbasum and Masoom Alam}, title = {A Cross Tenant Access Control {(CTAC)} Model for Cloud Computing: Formal Specification and Verification}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {12}, number = {6}, pages = {1259--1268}, year = {2017}, url = {https://doi.org/10.1109/TIFS.2016.2646639}, doi = {10.1109/TIFS.2016.2646639}, timestamp = {Thu, 06 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/AlamMACTA17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/AlomarAA17, author = {Noura Alomar and Mansour Alsaleh and Abdulrahman Alarifi}, title = {Someone in Your Contact List: Cued Recall-Based Textual Passwords}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {12}, number = {11}, pages = {2574--2589}, year = {2017}, url = {https://doi.org/10.1109/TIFS.2017.2712126}, doi = {10.1109/TIFS.2017.2712126}, timestamp = {Thu, 06 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/AlomarAA17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/AmeriniBCMN17, author = {Irene Amerini and Rudy Becarelli and Roberto Caldelli and Alessio Melani and Moreno Niccolai}, title = {Smartphone Fingerprinting Combining Features of On-Board Sensors}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {12}, number = {10}, pages = {2457--2466}, year = {2017}, url = {https://doi.org/10.1109/TIFS.2017.2708685}, doi = {10.1109/TIFS.2017.2708685}, timestamp = {Thu, 06 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/AmeriniBCMN17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/AroraJP17, author = {Sunpreet S. Arora and Anil K. Jain and Nicholas G. Paulter Jr.}, title = {Gold Fingers: 3D Targets for Evaluating Capacitive Readers}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {12}, number = {9}, pages = {2067--2077}, year = {2017}, url = {https://doi.org/10.1109/TIFS.2017.2695166}, doi = {10.1109/TIFS.2017.2695166}, timestamp = {Thu, 06 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/AroraJP17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/BagRS17, author = {Samiran Bag and Sushmita Ruj and Kouichi Sakurai}, title = {Bitcoin Block Withholding Attack: Analysis and Mitigation}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {12}, number = {8}, pages = {1967--1978}, year = {2017}, url = {https://doi.org/10.1109/TIFS.2016.2623588}, doi = {10.1109/TIFS.2016.2623588}, timestamp = {Thu, 23 Jun 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/BagRS17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/BagaiMJ17, author = {Rajiv Bagai and Nafia Malik and Murtuza Jadliwala}, title = {Measuring Anonymity of Pseudonymized Data After Probabilistic Background Attacks}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {12}, number = {5}, pages = {1156--1169}, year = {2017}, url = {https://doi.org/10.1109/TIFS.2017.2656458}, doi = {10.1109/TIFS.2017.2656458}, timestamp = {Thu, 06 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/BagaiMJ17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/Barni17, author = {Mauro Barni}, title = {Farewell Message}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {12}, number = {12}, pages = {i--ii}, year = {2017}, url = {https://doi.org/10.1109/TIFS.2017.2755979}, doi = {10.1109/TIFS.2017.2755979}, timestamp = {Thu, 06 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/Barni17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/BasakBTR17, author = {Abhishek Basak and Swarup Bhunia and Thomas E. Tkacik and Sandip Ray}, title = {Security Assurance for System-on-Chip Designs With Untrusted IPs}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {12}, number = {7}, pages = {1515--1528}, year = {2017}, url = {https://doi.org/10.1109/TIFS.2017.2658544}, doi = {10.1109/TIFS.2017.2658544}, timestamp = {Tue, 07 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/BasakBTR17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/BelmegaC17, author = {Elena Veronica Belmega and Arsenia Chorti}, title = {Protecting Secret Key Generation Systems Against Jamming: Energy Harvesting and Channel Hopping Approaches}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {12}, number = {11}, pages = {2611--2626}, year = {2017}, url = {https://doi.org/10.1109/TIFS.2017.2713342}, doi = {10.1109/TIFS.2017.2713342}, timestamp = {Thu, 06 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/BelmegaC17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/BidmeshkiGDJM17, author = {Mohammad{-}Mahdi Bidmeshki and Xiaolong Guo and Raj Gautam Dutta and Yier Jin and Yiorgos Makris}, title = {Data Secrecy Protection Through Information Flow Tracking in Proof-Carrying Hardware {IP} - Part {II:} Framework Automation}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {12}, number = {10}, pages = {2430--2443}, year = {2017}, url = {https://doi.org/10.1109/TIFS.2017.2707327}, doi = {10.1109/TIFS.2017.2707327}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/BidmeshkiGDJM17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/BruneauCGHPR17, author = {Nicolas Bruneau and Claude Carlet and Sylvain Guilley and Annelie Heuser and Emmanuel Prouff and Olivier Rioul}, title = {Stochastic Collision Attack}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {12}, number = {9}, pages = {2090--2104}, year = {2017}, url = {https://doi.org/10.1109/TIFS.2017.2697401}, doi = {10.1109/TIFS.2017.2697401}, timestamp = {Thu, 06 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/BruneauCGHPR17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/CaldelliBA17, author = {Roberto Caldelli and Rudy Becarelli and Irene Amerini}, title = {Image Origin Classification Based on Social Network Provenance}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {12}, number = {6}, pages = {1299--1308}, year = {2017}, url = {https://doi.org/10.1109/TIFS.2017.2656842}, doi = {10.1109/TIFS.2017.2656842}, timestamp = {Thu, 06 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/CaldelliBA17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/ChanLK17, author = {Frodo Kin{-}Sun Chan and Xiaojie Li and Adams Wai{-}Kin Kong}, title = {A Study of Distinctiveness of Skin Texture for Forensic Applications Through Comparison With Blood Vessels}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {12}, number = {8}, pages = {1900--1915}, year = {2017}, url = {https://doi.org/10.1109/TIFS.2017.2692684}, doi = {10.1109/TIFS.2017.2692684}, timestamp = {Thu, 06 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/ChanLK17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/Chen17, author = {Yu{-}Chi Chen}, title = {Fully Incrementing Visual Cryptography From a Succinct Non-Monotonic Structure}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {12}, number = {5}, pages = {1082--1091}, year = {2017}, url = {https://doi.org/10.1109/TIFS.2016.2641378}, doi = {10.1109/TIFS.2016.2641378}, timestamp = {Thu, 06 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/Chen17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/ChenCR17, author = {Gaojie Chen and Justin P. Coon and Marco Di Renzo}, title = {Secrecy Outage Analysis for Downlink Transmissions in the Presence of Randomly Located Eavesdroppers}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {12}, number = {5}, pages = {1195--1206}, year = {2017}, url = {https://doi.org/10.1109/TIFS.2017.2656462}, doi = {10.1109/TIFS.2017.2656462}, timestamp = {Thu, 06 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/ChenCR17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/ChenWZXZM17, author = {Chao Chen and Yu Wang and Jun Zhang and Yang Xiang and Wanlei Zhou and Geyong Min}, title = {Statistical Features-Based Real-Time Detection of Drifted Twitter Spam}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {12}, number = {4}, pages = {914--925}, year = {2017}, url = {https://doi.org/10.1109/TIFS.2016.2621888}, doi = {10.1109/TIFS.2016.2621888}, timestamp = {Thu, 21 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/ChenWZXZM17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/ChenZ17, author = {Juntao Chen and Quanyan Zhu}, title = {Security as a Service for Cloud-Enabled Internet of Controlled Things Under Advanced Persistent Threats: {A} Contract Design Approach}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {12}, number = {11}, pages = {2736--2750}, year = {2017}, url = {https://doi.org/10.1109/TIFS.2017.2718489}, doi = {10.1109/TIFS.2017.2718489}, timestamp = {Thu, 06 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/ChenZ17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/ChengDALT17, author = {Long Cheng and Dinil Mon Divakaran and Aloysius Wooi Kiak Ang and Wee{-}Yong Lim and Vrizlynn L. L. Thing}, title = {{FACT:} {A} Framework for Authentication in Cloud-Based {IP} Traceback}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {12}, number = {3}, pages = {604--616}, year = {2017}, url = {https://doi.org/10.1109/TIFS.2016.2624741}, doi = {10.1109/TIFS.2016.2624741}, timestamp = {Thu, 06 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/ChengDALT17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/ChernyshevVJ17, author = {Maxim Chernyshev and Craig Valli and Michael N. Johnstone}, title = {Revisiting Urban War Nibbling: Mobile Passive Discovery of Classic Bluetooth Devices Using Ubertooth One}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {12}, number = {7}, pages = {1625--1636}, year = {2017}, url = {https://doi.org/10.1109/TIFS.2017.2678463}, doi = {10.1109/TIFS.2017.2678463}, timestamp = {Thu, 06 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/ChernyshevVJ17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/ChinWHWW17, author = {Yu{-}Hao Chin and Jia{-}Ching Wang and Chien{-}Lin Huang and Kuang{-}Yao Wang and Chung{-}Hsien Wu}, title = {Speaker Identification Using Discriminative Features and Sparse Representation}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {12}, number = {8}, pages = {1979--1987}, year = {2017}, url = {https://doi.org/10.1109/TIFS.2017.2678458}, doi = {10.1109/TIFS.2017.2678458}, timestamp = {Thu, 25 Jul 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/ChinWHWW17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/Choi17, author = {Jinho Choi}, title = {On Channel-Aware Secure {HARQ-IR}}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {12}, number = {2}, pages = {351--362}, year = {2017}, url = {https://doi.org/10.1109/TIFS.2016.2613846}, doi = {10.1109/TIFS.2016.2613846}, timestamp = {Thu, 06 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/Choi17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/Choi17a, author = {Jinho Choi}, title = {Physical Layer Security for Channel-Aware Random Access With Opportunistic Jamming}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {12}, number = {11}, pages = {2699--2711}, year = {2017}, url = {https://doi.org/10.1109/TIFS.2017.2714842}, doi = {10.1109/TIFS.2017.2714842}, timestamp = {Thu, 06 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/Choi17a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/ColombierBFH17, author = {Brice Colombier and Lilian Bossuet and Viktor Fischer and David H{\'{e}}ly}, title = {Key Reconciliation Protocols for Error Correction of Silicon {PUF} Responses}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {12}, number = {8}, pages = {1988--2002}, year = {2017}, url = {https://doi.org/10.1109/TIFS.2017.2689726}, doi = {10.1109/TIFS.2017.2689726}, timestamp = {Thu, 06 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/ColombierBFH17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/Coskun17, author = {Baris Coskun}, title = {(Un)wisdom of Crowds: Accurately Spotting Malicious {IP} Clusters Using Not-So-Accurate {IP} Blacklists}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {12}, number = {6}, pages = {1406--1417}, year = {2017}, url = {https://doi.org/10.1109/TIFS.2017.2663333}, doi = {10.1109/TIFS.2017.2663333}, timestamp = {Thu, 06 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/Coskun17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/CuiLC17, author = {Aijiao Cui and Yanhui Luo and Chip{-}Hong Chang}, title = {Static and Dynamic Obfuscations of Scan Data Against Scan-Based Side-Channel Attacks}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {12}, number = {2}, pages = {363--376}, year = {2017}, url = {https://doi.org/10.1109/TIFS.2016.2613847}, doi = {10.1109/TIFS.2016.2613847}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/CuiLC17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/CzajkaBKV17, author = {Adam Czajka and Kevin W. Bowyer and Michael Krumdick and Rosaura G. VidalMata}, title = {Recognition of Image-Orientation-Based Iris Spoofing}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {12}, number = {9}, pages = {2184--2196}, year = {2017}, url = {https://doi.org/10.1109/TIFS.2017.2701332}, doi = {10.1109/TIFS.2017.2701332}, timestamp = {Sat, 05 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/CzajkaBKV17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/DaiML17, author = {Bin Dai and Zheng Ma and Yuan Luo}, title = {Finite State Markov Wiretap Channel With Delayed Feedback}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {12}, number = {3}, pages = {746--760}, year = {2017}, url = {https://doi.org/10.1109/TIFS.2016.2636085}, doi = {10.1109/TIFS.2016.2636085}, timestamp = {Thu, 06 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/DaiML17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/DantchevaB17, author = {Antitza Dantcheva and Fran{\c{c}}ois Br{\'{e}}mond}, title = {Gender Estimation Based on Smile-Dynamics}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {12}, number = {3}, pages = {719--729}, year = {2017}, url = {https://doi.org/10.1109/TIFS.2016.2632070}, doi = {10.1109/TIFS.2016.2632070}, timestamp = {Thu, 06 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/DantchevaB17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/DenemarkF17, author = {Tom{\'{a}}s Denemark and Jessica J. Fridrich}, title = {Steganography With Multiple {JPEG} Images of the Same Scene}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {12}, number = {10}, pages = {2308--2319}, year = {2017}, url = {https://doi.org/10.1109/TIFS.2017.2705625}, doi = {10.1109/TIFS.2017.2705625}, timestamp = {Thu, 06 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/DenemarkF17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/DongL17, author = {Changyu Dong and Grigorios Loukides}, title = {Approximating Private Set Union/Intersection Cardinality With Logarithmic Complexity}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {12}, number = {11}, pages = {2792--2806}, year = {2017}, url = {https://doi.org/10.1109/TIFS.2017.2721360}, doi = {10.1109/TIFS.2017.2721360}, timestamp = {Thu, 06 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/DongL17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/DritsoulaLM17, author = {Lemonia Dritsoula and Patrick Loiseau and John Musacchio}, title = {A Game-Theoretic Analysis of Adversarial Classification}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {12}, number = {12}, pages = {3094--3109}, year = {2017}, url = {https://doi.org/10.1109/TIFS.2017.2718494}, doi = {10.1109/TIFS.2017.2718494}, timestamp = {Thu, 06 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/DritsoulaLM17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/DubinDPH17, author = {Ran Dubin and Amit Dvir and Ofir Pele and Ofer Hadar}, title = {I Know What You Saw Last Minute - Encrypted {HTTP} Adaptive Video Streaming Title Classification}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {12}, number = {12}, pages = {3039--3049}, year = {2017}, url = {https://doi.org/10.1109/TIFS.2017.2730819}, doi = {10.1109/TIFS.2017.2730819}, timestamp = {Sun, 12 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tifs/DubinDPH17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/ErfaniPR17, author = {Yousof Erfani and Ramin Pichevar and Jean Rouat}, title = {Audio Watermarking Using Spikegram and a Two-Dictionary Approach}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {12}, number = {4}, pages = {840--852}, year = {2017}, url = {https://doi.org/10.1109/TIFS.2016.2636094}, doi = {10.1109/TIFS.2016.2636094}, timestamp = {Thu, 06 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/ErfaniPR17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/FanLWLTL17, author = {Ming Fan and Jun Liu and Wei Wang and Haifei Li and Zhenzhou Tian and Ting Liu}, title = {{DAPASA:} Detecting Android Piggybacked Apps Through Sensitive Subgraph Analysis}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {12}, number = {8}, pages = {1772--1785}, year = {2017}, url = {https://doi.org/10.1109/TIFS.2017.2687880}, doi = {10.1109/TIFS.2017.2687880}, timestamp = {Wed, 30 Mar 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/FanLWLTL17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/FerraraCM17, author = {Matteo Ferrara and Raffaele Cappelli and Davide Maltoni}, title = {On the Feasibility of Creating Double-Identity Fingerprints}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {12}, number = {4}, pages = {892--900}, year = {2017}, url = {https://doi.org/10.1109/TIFS.2016.2639345}, doi = {10.1109/TIFS.2016.2639345}, timestamp = {Thu, 06 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/FerraraCM17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/FerreiraBBBHSTR17, author = {Anselmo Ferreira and Luca Bondi and Luca Baroffio and Paolo Bestagini and Jiwu Huang and Jefersson A. dos Santos and Stefano Tubaro and Anderson Rocha}, title = {Data-Driven Feature Characterization Techniques for Laser Printer Attribution}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {12}, number = {8}, pages = {1860--1873}, year = {2017}, url = {https://doi.org/10.1109/TIFS.2017.2692722}, doi = {10.1109/TIFS.2017.2692722}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/FerreiraBBBHSTR17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/FuHRWW17, author = {Zhangjie Fu and Fengxiao Huang and Kui Ren and Jian Weng and Cong Wang}, title = {Privacy-Preserving Smart Semantic Search Based on Conceptual Graphs Over Encrypted Outsourced Data}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {12}, number = {8}, pages = {1874--1884}, year = {2017}, url = {https://doi.org/10.1109/TIFS.2017.2692728}, doi = {10.1109/TIFS.2017.2692728}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tifs/FuHRWW17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/FuWWR17, author = {Zhangjie Fu and Xinle Wu and Qian Wang and Kui Ren}, title = {Enabling Central Keyword-Based Semantic Extension Search Over Encrypted Outsourced Data}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {12}, number = {12}, pages = {2986--2997}, year = {2017}, url = {https://doi.org/10.1109/TIFS.2017.2730365}, doi = {10.1109/TIFS.2017.2730365}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/FuWWR17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/FuYHOHSSDBB17, author = {Yu Fu and Lu Yu and Oluwakemi Hambolu and Ilker {\"{O}}z{\c{c}}elik and Benafsh Husain and Jingxuan Sun and Karan Sapra and Dan Du and Christopher Tate Beasley and Richard R. Brooks}, title = {Stealthy Domain Generation Algorithms}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {12}, number = {6}, pages = {1430--1443}, year = {2017}, url = {https://doi.org/10.1109/TIFS.2017.2668361}, doi = {10.1109/TIFS.2017.2668361}, timestamp = {Tue, 03 Aug 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/FuYHOHSSDBB17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/GalballyCS17, author = {Javier Galbally and Iwen Coisel and Ignacio Sanchez}, title = {A New Multimodal Approach for Password Strength Estimation - Part {I:} Theory and Algorithms}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {12}, number = {12}, pages = {2829--2844}, year = {2017}, url = {https://doi.org/10.1109/TIFS.2016.2636092}, doi = {10.1109/TIFS.2016.2636092}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/GalballyCS17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/GalballyCS17a, author = {Javier Galbally and Iwen Coisel and Ignacio Sanchez}, title = {A New Multimodal Approach for Password Strength Estimation - Part {II:} Experimental Evaluation}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {12}, number = {12}, pages = {2845--2860}, year = {2017}, url = {https://doi.org/10.1109/TIFS.2017.2730359}, doi = {10.1109/TIFS.2017.2730359}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/GalballyCS17a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/GandinoFR17, author = {Filippo Gandino and Renato Ferrero and Maurizio Rebaudengo}, title = {A Key Distribution Scheme for Mobile Wireless Sensor Networks: q-Composite}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {12}, number = {1}, pages = {34--47}, year = {2017}, url = {https://doi.org/10.1109/TIFS.2016.2601061}, doi = {10.1109/TIFS.2016.2601061}, timestamp = {Sun, 25 Jul 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/GandinoFR17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/GaoTLZL17, author = {Haichang Gao and Mengyun Tang and Yi Liu and Ping Zhang and Xiyang Liu}, title = {Research on the Security of Microsoft's Two-Layer Captcha}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {12}, number = {7}, pages = {1671--1685}, year = {2017}, url = {https://doi.org/10.1109/TIFS.2017.2682704}, doi = {10.1109/TIFS.2017.2682704}, timestamp = {Thu, 06 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/GaoTLZL17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/GarnaevT17, author = {Andrey Garnaev and Wade Trappe}, title = {Bargaining Over the Fair Trade-Off Between Secrecy and Throughput in {OFDM} Communications}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {12}, number = {1}, pages = {242--251}, year = {2017}, url = {https://doi.org/10.1109/TIFS.2016.2611486}, doi = {10.1109/TIFS.2016.2611486}, timestamp = {Thu, 06 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/GarnaevT17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/GarnaevT17a, author = {Andrey Garnaev and Wade Trappe}, title = {Bandwidth Scanning When Facing Interference Attacks Aimed at Reducing Spectrum Opportunities}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {12}, number = {8}, pages = {1916--1930}, year = {2017}, url = {https://doi.org/10.1109/TIFS.2017.2694766}, doi = {10.1109/TIFS.2017.2694766}, timestamp = {Thu, 06 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/GarnaevT17a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/GolaitH17, author = {Diksha Golait and Neminath Hubballi}, title = {Detecting Anomalous Behavior in VoIP Systems: {A} Discrete Event System Modeling}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {12}, number = {3}, pages = {730--745}, year = {2017}, url = {https://doi.org/10.1109/TIFS.2016.2632071}, doi = {10.1109/TIFS.2016.2632071}, timestamp = {Thu, 06 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/GolaitH17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/Gonzalez-SosaVF17, author = {Ester Gonzalez{-}Sosa and Rub{\'{e}}n Vera{-}Rodr{\'{\i}}guez and Julian Fi{\'{e}}rrez and Vishal M. Patel}, title = {Exploring Body Shape From mmW Images for Person Recognition}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {12}, number = {9}, pages = {2078--2089}, year = {2017}, url = {https://doi.org/10.1109/TIFS.2017.2695979}, doi = {10.1109/TIFS.2017.2695979}, timestamp = {Fri, 12 Jul 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/Gonzalez-SosaVF17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/GordonHMSSW17, author = {Steven Gordon and Xinyi Huang and Atsuko Miyaji and Chunhua Su and Karin Sumongkayothin and Komwut Wipusitwarakun}, title = {Recursive Matrix Oblivious {RAM:} An {ORAM} Construction for Constrained Storage Devices}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {12}, number = {12}, pages = {3024--3038}, year = {2017}, url = {https://doi.org/10.1109/TIFS.2017.2730584}, doi = {10.1109/TIFS.2017.2730584}, timestamp = {Tue, 07 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/GordonHMSSW17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/GoswamiVS17, author = {Gaurav Goswami and Mayank Vatsa and Richa Singh}, title = {Face Verification via Learned Representation on Feature-Rich Video Frames}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {12}, number = {7}, pages = {1686--1698}, year = {2017}, url = {https://doi.org/10.1109/TIFS.2017.2668221}, doi = {10.1109/TIFS.2017.2668221}, timestamp = {Thu, 06 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/GoswamiVS17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/GrissaYH17, author = {Mohamed Grissa and Attila A. Yavuz and Bechir Hamdaoui}, title = {Preserving the Location Privacy of Secondary Users in Cooperative Spectrum Sensing}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {12}, number = {2}, pages = {418--431}, year = {2017}, url = {https://doi.org/10.1109/TIFS.2016.2622000}, doi = {10.1109/TIFS.2016.2622000}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/GrissaYH17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/GuoDJ17, author = {Xiaolong Guo and Raj Gautam Dutta and Yier Jin}, title = {Eliminating the Hardware-Software Boundary: {A} Proof-Carrying Approach for Trust Evaluation on Computer Systems}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {12}, number = {2}, pages = {405--417}, year = {2017}, url = {https://doi.org/10.1109/TIFS.2016.2621999}, doi = {10.1109/TIFS.2016.2621999}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/GuoDJ17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/Hajj-AhmadBCDW17, author = {Adi Hajj{-}Ahmad and S{\'{e}}verine Baudry and Bertrand Chupeau and Gwena{\"{e}}l J. Do{\"{e}}rr and Min Wu}, title = {Flicker Forensics for Camcorder Piracy}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {12}, number = {1}, pages = {89--100}, year = {2017}, url = {https://doi.org/10.1109/TIFS.2016.2603603}, doi = {10.1109/TIFS.2016.2603603}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/Hajj-AhmadBCDW17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/HanWCMZ17, author = {Xiaohui Han and Lianhai Wang and Chaoran Cui and Jun Ma and Shuhui Zhang}, title = {Linking Multiple Online Identities in Criminal Investigations: {A} Spectral Co-Clustering Framework}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {12}, number = {9}, pages = {2242--2255}, year = {2017}, url = {https://doi.org/10.1109/TIFS.2017.2704906}, doi = {10.1109/TIFS.2017.2704906}, timestamp = {Thu, 06 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/HanWCMZ17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/HarangK17, author = {Richard E. Harang and Alexander Kott}, title = {Burstiness of Intrusion Detection Process: Empirical Evidence and a Modeling Approach}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {12}, number = {10}, pages = {2348--2359}, year = {2017}, url = {https://doi.org/10.1109/TIFS.2017.2705629}, doi = {10.1109/TIFS.2017.2705629}, timestamp = {Thu, 06 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/HarangK17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/HayelZ17, author = {Yezekael Hayel and Quanyan Zhu}, title = {Epidemic Protection Over Heterogeneous Networks Using Evolutionary Poisson Games}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {12}, number = {8}, pages = {1786--1800}, year = {2017}, url = {https://doi.org/10.1109/TIFS.2017.2687883}, doi = {10.1109/TIFS.2017.2687883}, timestamp = {Thu, 06 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/HayelZ17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/HeKCW17, author = {Debiao He and Neeraj Kumar and Kim{-}Kwang Raymond Choo and Wei Wu}, title = {Efficient Hierarchical Identity-Based Signature With Batch Verification for Automatic Dependent Surveillance-Broadcast System}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {12}, number = {2}, pages = {454--464}, year = {2017}, url = {https://doi.org/10.1109/TIFS.2016.2622682}, doi = {10.1109/TIFS.2016.2622682}, timestamp = {Thu, 06 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/HeKCW17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/HeydariKY17, author = {Vahid Heydari and Sun{-}il Kim and Seong{-}Moo Yoo}, title = {Scalable Anti-Censorship Framework Using Moving Target Defense for Web Servers}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {12}, number = {5}, pages = {1113--1124}, year = {2017}, url = {https://doi.org/10.1109/TIFS.2016.2647218}, doi = {10.1109/TIFS.2016.2647218}, timestamp = {Thu, 06 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/HeydariKY17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/HineMC17, author = {Gabriel Emile Hine and Emanuele Maiorana and Patrizio Campisi}, title = {A Zero-Leakage Fuzzy Embedder From the Theoretical Formulation to Real Data}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {12}, number = {7}, pages = {1724--1734}, year = {2017}, url = {https://doi.org/10.1109/TIFS.2017.2686005}, doi = {10.1109/TIFS.2017.2686005}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/HineMC17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/HolohanLM17, author = {Naoise Holohan and Douglas J. Leith and Oliver Mason}, title = {Optimal Differentially Private Mechanisms for Randomised Response}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {12}, number = {11}, pages = {2726--2735}, year = {2017}, url = {https://doi.org/10.1109/TIFS.2017.2718487}, doi = {10.1109/TIFS.2017.2718487}, timestamp = {Sat, 05 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/HolohanLM17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/HongHL17, author = {Y.{-}W. Peter Hong and Lin{-}Ming Huang and Hou{-}Tung Li}, title = {Vector Quantization and Clustered Key Mapping for Channel-Based Secret Key Generation}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {12}, number = {5}, pages = {1170--1181}, year = {2017}, url = {https://doi.org/10.1109/TIFS.2017.2656459}, doi = {10.1109/TIFS.2017.2656459}, timestamp = {Thu, 06 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/HongHL17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/HongLW17, author = {Yuan Hong and Wen Ming Liu and Lingyu Wang}, title = {Privacy Preserving Smart Meter Streaming Against Information Leakage of Appliance Status}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {12}, number = {9}, pages = {2227--2241}, year = {2017}, url = {https://doi.org/10.1109/TIFS.2017.2704904}, doi = {10.1109/TIFS.2017.2704904}, timestamp = {Thu, 06 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/HongLW17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/HouKL17, author = {Jong{-}Uk Hou and Do{-}Gon Kim and Heung{-}Kyu Lee}, title = {Blind 3D Mesh Watermarking for 3D Printed Model by Analyzing Layering Artifact}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {12}, number = {11}, pages = {2712--2725}, year = {2017}, url = {https://doi.org/10.1109/TIFS.2017.2718482}, doi = {10.1109/TIFS.2017.2718482}, timestamp = {Thu, 06 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/HouKL17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/HuSH17, author = {Yang Hu and Konstantinos Sirlantzis and Gareth Howells}, title = {Optimal Generation of Iris Codes for Iris Recognition}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {12}, number = {1}, pages = {157--171}, year = {2017}, url = {https://doi.org/10.1109/TIFS.2016.2606083}, doi = {10.1109/TIFS.2016.2606083}, timestamp = {Tue, 21 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tifs/HuSH17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/HuaSZ17, author = {Jingyu Hua and Zhenyu Shen and Sheng Zhong}, title = {We Can Track You if You Take the Metro: Tracking Metro Riders Using Accelerometers on Smartphones}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {12}, number = {2}, pages = {286--297}, year = {2017}, url = {https://doi.org/10.1109/TIFS.2016.2611489}, doi = {10.1109/TIFS.2016.2611489}, timestamp = {Thu, 09 Dec 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tifs/HuaSZ17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/IqbalSRAC17, author = {Md. Tauhid Bin Iqbal and Mohammad Shoyaib and Byungyong Ryu and Mohammad Abdullah{-}Al{-}Wadud and Oksam Chae}, title = {Directional Age-Primitive Pattern {(DAPP)} for Human Age Group Recognition and Age Estimation}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {12}, number = {11}, pages = {2505--2517}, year = {2017}, url = {https://doi.org/10.1109/TIFS.2017.2695456}, doi = {10.1109/TIFS.2017.2695456}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/IqbalSRAC17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/IvanovB17, author = {Vladimir I. Ivanov and John S. Baras}, title = {Authentication of Swipe Fingerprint Scanners}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {12}, number = {9}, pages = {2212--2226}, year = {2017}, url = {https://doi.org/10.1109/TIFS.2017.2702592}, doi = {10.1109/TIFS.2017.2702592}, timestamp = {Thu, 06 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/IvanovB17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/JainA0BB17, author = {Anil K. Jain and Sunpreet S. Arora and Kai Cao and Lacey Best{-}Rowden and Anjoo Bhatnagar}, title = {Fingerprint Recognition of Young Children}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {12}, number = {7}, pages = {1501--1514}, year = {2017}, url = {https://doi.org/10.1109/TIFS.2016.2639346}, doi = {10.1109/TIFS.2016.2639346}, timestamp = {Thu, 06 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/JainA0BB17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/JajodiaPPPSSS17, author = {Sushil Jajodia and Noseong Park and Fabio Pierazzi and Andrea Pugliese and Edoardo Serra and Gerardo I. Simari and V. S. Subrahmanian}, title = {A Probabilistic Logic of Cyber Deception}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {12}, number = {11}, pages = {2532--2544}, year = {2017}, url = {https://doi.org/10.1109/TIFS.2017.2710945}, doi = {10.1109/TIFS.2017.2710945}, timestamp = {Mon, 26 Oct 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tifs/JajodiaPPPSSS17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/Jiang0WMSL17, author = {Tao Jiang and Xiaofeng Chen and Qianhong Wu and Jianfeng Ma and Willy Susilo and Wenjing Lou}, title = {Secure and Efficient Cloud Data Deduplication With Randomized Tag}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {12}, number = {3}, pages = {532--543}, year = {2017}, url = {https://doi.org/10.1109/TIFS.2016.2622013}, doi = {10.1109/TIFS.2016.2622013}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/Jiang0WMSL17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/JinGDBM17, author = {Yier Jin and Xiaolong Guo and Raj Gautam Dutta and Mohammad{-}Mahdi Bidmeshki and Yiorgos Makris}, title = {Data Secrecy Protection Through Information Flow Tracking in Proof-Carrying Hardware {IP} - Part {I:} Framework Fundamentals}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {12}, number = {10}, pages = {2416--2429}, year = {2017}, url = {https://doi.org/10.1109/TIFS.2017.2707323}, doi = {10.1109/TIFS.2017.2707323}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/JinGDBM17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/KarlssonBL17, author = {Marcus Karlsson and Emil Bj{\"{o}}rnson and Erik G. Larsson}, title = {Jamming a {TDD} Point-to-Point Link Using Reciprocity-Based {MIMO}}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {12}, number = {12}, pages = {2957--2970}, year = {2017}, url = {https://doi.org/10.1109/TIFS.2017.2725823}, doi = {10.1109/TIFS.2017.2725823}, timestamp = {Sun, 25 Jul 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/KarlssonBL17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/KhandakerWZZ17, author = {Muhammad R. A. Khandaker and Kai{-}Kit Wong and Yangyang Zhang and Zhongbin Zheng}, title = {Probabilistically Robust {SWIPT} for Secrecy {MISOME} Systems}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {12}, number = {1}, pages = {211--226}, year = {2017}, url = {https://doi.org/10.1109/TIFS.2016.2611478}, doi = {10.1109/TIFS.2016.2611478}, timestamp = {Thu, 06 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/KhandakerWZZ17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/KimBVY17, author = {Do{-}hyung Kim and Jun Bi and Athanasios V. Vasilakos and Ikjun Yeom}, title = {Security of Cached Content in {NDN}}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {12}, number = {12}, pages = {2933--2944}, year = {2017}, url = {https://doi.org/10.1109/TIFS.2017.2725229}, doi = {10.1109/TIFS.2017.2725229}, timestamp = {Mon, 20 Dec 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tifs/KimBVY17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/KohLPNW17, author = {Jing Yang Koh and Derek Leong and Gareth W. Peters and Ido Nevat and Wai{-}Choong Wong}, title = {Optimal Privacy-Preserving Probabilistic Routing for Wireless Networks}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {12}, number = {9}, pages = {2105--2114}, year = {2017}, url = {https://doi.org/10.1109/TIFS.2017.2698424}, doi = {10.1109/TIFS.2017.2698424}, timestamp = {Thu, 06 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/KohLPNW17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/KorusH17, author = {Pawel Korus and Jiwu Huang}, title = {Multi-Scale Analysis Strategies in PRNU-Based Tampering Localization}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {12}, number = {4}, pages = {809--824}, year = {2017}, url = {https://doi.org/10.1109/TIFS.2016.2636089}, doi = {10.1109/TIFS.2016.2636089}, timestamp = {Thu, 06 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/KorusH17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/KumarBGIH17, author = {Pardeep Kumar and An Braeken and Andrei V. Gurtov and Jari H. Iinatti and Phuong Hoai Ha}, title = {Anonymous Secure Framework in Connected Smart Home Environments}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {12}, number = {4}, pages = {968--979}, year = {2017}, url = {https://doi.org/10.1109/TIFS.2016.2647225}, doi = {10.1109/TIFS.2016.2647225}, timestamp = {Sat, 29 Apr 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/KumarBGIH17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/KwonMWKLK17, author = {Hyukmin Kwon and Aziz Mohaisen and Jiyoung Woo and Yongdae Kim and Eunjo Lee and Huy Kang Kim}, title = {Crime Scene Reconstruction: Online Gold Farming Network Analysis}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {12}, number = {3}, pages = {544--556}, year = {2017}, url = {https://doi.org/10.1109/TIFS.2016.2623586}, doi = {10.1109/TIFS.2016.2623586}, timestamp = {Tue, 21 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tifs/KwonMWKLK17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/LarrainBMB17, author = {Tomas Larrain and John S. Bernhard and Domingo Mery and Kevin W. Bowyer}, title = {Face Recognition Using Sparse Fingerprint Classification Algorithm}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {12}, number = {7}, pages = {1646--1657}, year = {2017}, url = {https://doi.org/10.1109/TIFS.2017.2680403}, doi = {10.1109/TIFS.2017.2680403}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/LarrainBMB17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/LawgalyK17, author = {Ashref Lawgaly and Fouad Khelifi}, title = {Sensor Pattern Noise Estimation Based on Improved Locally Adaptive {DCT} Filtering and Weighted Averaging for Source Camera Identification and Verification}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {12}, number = {2}, pages = {392--404}, year = {2017}, url = {https://doi.org/10.1109/TIFS.2016.2620280}, doi = {10.1109/TIFS.2016.2620280}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/LawgalyK17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/LiLH17, author = {Haodong Li and Weiqi Luo and Jiwu Huang}, title = {Localization of Diffusion-Based Inpainting in Digital Images}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {12}, number = {12}, pages = {3050--3064}, year = {2017}, url = {https://doi.org/10.1109/TIFS.2017.2730822}, doi = {10.1109/TIFS.2017.2730822}, timestamp = {Tue, 30 Jan 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tifs/LiLH17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/LiLQH17, author = {Haodong Li and Weiqi Luo and Xiaoqing Qiu and Jiwu Huang}, title = {Image Forgery Localization via Integrating Tampering Possibility Maps}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {12}, number = {5}, pages = {1240--1252}, year = {2017}, url = {https://doi.org/10.1109/TIFS.2017.2656823}, doi = {10.1109/TIFS.2017.2656823}, timestamp = {Tue, 30 Jan 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tifs/LiLQH17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/LiPC17, author = {Lingxiang Li and Athina P. Petropulu and Zhi Chen}, title = {{MIMO} Secret Communications Against an Active Eavesdropper}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {12}, number = {10}, pages = {2387--2401}, year = {2017}, url = {https://doi.org/10.1109/TIFS.2017.2705618}, doi = {10.1109/TIFS.2017.2705618}, timestamp = {Sat, 26 Dec 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tifs/LiPC17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/LiWS17, author = {Yue Li and Haining Wang and Kun Sun}, title = {Personal Information in Passwords and Its Security Implications}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {12}, number = {10}, pages = {2320--2333}, year = {2017}, url = {https://doi.org/10.1109/TIFS.2017.2705627}, doi = {10.1109/TIFS.2017.2705627}, timestamp = {Tue, 18 Jun 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/LiWS17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/LiZC17, author = {Yuanman Li and Jiantao Zhou and An Cheng}, title = {{SIFT} Keypoint Removal via Directed Graph Construction for Color Images}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {12}, number = {12}, pages = {2971--2985}, year = {2017}, url = {https://doi.org/10.1109/TIFS.2017.2730362}, doi = {10.1109/TIFS.2017.2730362}, timestamp = {Thu, 06 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/LiZC17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/LinL17, author = {Xufeng Lin and Chang{-}Tsun Li}, title = {Large-Scale Image Clustering Based on Camera Fingerprints}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {12}, number = {4}, pages = {793--808}, year = {2017}, url = {https://doi.org/10.1109/TIFS.2016.2636086}, doi = {10.1109/TIFS.2016.2636086}, timestamp = {Thu, 06 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/LinL17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/LiuCW17, author = {Yiliang Liu and Hsiao{-}Hwa Chen and Liangmin Wang}, title = {Secrecy Capacity Analysis of Artificial Noisy {MIMO} Channels - An Approach Based on Ordered Eigenvalues of Wishart Matrices}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {12}, number = {3}, pages = {617--630}, year = {2017}, url = {https://doi.org/10.1109/TIFS.2016.2627219}, doi = {10.1109/TIFS.2016.2627219}, timestamp = {Wed, 25 Jan 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tifs/LiuCW17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/LiuKHGPW17, author = {Alex X. Liu and Amir R. Khakpour and Joshua W. Hulst and Zihui Ge and Dan Pei and Jia Wang}, title = {Firewall Fingerprinting and Denial of Firewalling Attacks}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {12}, number = {7}, pages = {1699--1712}, year = {2017}, url = {https://doi.org/10.1109/TIFS.2017.2668602}, doi = {10.1109/TIFS.2017.2668602}, timestamp = {Fri, 09 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/LiuKHGPW17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/LiuLH17, author = {Ta{-}Yuan Liu and Shih{-}Chun Lin and Y.{-}W. Peter Hong}, title = {On the Role of Artificial Noise in Training and Data Transmission for Secret Communications}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {12}, number = {3}, pages = {516--531}, year = {2017}, url = {https://doi.org/10.1109/TIFS.2016.2620281}, doi = {10.1109/TIFS.2016.2620281}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/LiuLH17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/LiuLS17, author = {Li Liu and Yue Lu and Ching Y. Suen}, title = {An Image-Based Approach to Detection of Fake Coins}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {12}, number = {5}, pages = {1227--1239}, year = {2017}, url = {https://doi.org/10.1109/TIFS.2017.2656478}, doi = {10.1109/TIFS.2017.2656478}, timestamp = {Wed, 24 Aug 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/LiuLS17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/LiuLST17, author = {Nianfeng Liu and Jing Liu and Zhenan Sun and Tieniu Tan}, title = {A Code-Level Approach to Heterogeneous Iris Recognition}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {12}, number = {10}, pages = {2373--2386}, year = {2017}, url = {https://doi.org/10.1109/TIFS.2017.2686013}, doi = {10.1109/TIFS.2017.2686013}, timestamp = {Thu, 06 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/LiuLST17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/LiuZC17, author = {Yuhong Liu and Wenqi Zhou and Hong Chen}, title = {Efficiently Promoting Product Online Outcome: An Iterative Rating Attack Utilizing Product and Market Property}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {12}, number = {6}, pages = {1444--1457}, year = {2017}, url = {https://doi.org/10.1109/TIFS.2017.2668992}, doi = {10.1109/TIFS.2017.2668992}, timestamp = {Thu, 06 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/LiuZC17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/LongXL17, author = {Hang Long and Wei Xiang and Yuli Li}, title = {Precoding and Cooperative Jamming in Multi- Antenna Two-Way Relaying Wiretap Systems Without Eavesdropper's Channel State Information}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {12}, number = {6}, pages = {1309--1318}, year = {2017}, url = {https://doi.org/10.1109/TIFS.2017.2656846}, doi = {10.1109/TIFS.2017.2656846}, timestamp = {Fri, 09 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/LongXL17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/LuTLW17, author = {Jianfeng Lu and Changbing Tang and Xiang Li and Qian Wu}, title = {Designing Socially-Optimal Rating Protocols for Crowdsourcing Contest Dilemma}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {12}, number = {6}, pages = {1330--1344}, year = {2017}, url = {https://doi.org/10.1109/TIFS.2017.2656468}, doi = {10.1109/TIFS.2017.2656468}, timestamp = {Fri, 09 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/LuTLW17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/LuoCLV17, author = {Hongbin Luo and Zhe Chen and Jiawei Li and Athanasios V. Vasilakos}, title = {Preventing Distributed Denial-of-Service Flooding Attacks With Dynamic Path Identifiers}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {12}, number = {8}, pages = {1801--1815}, year = {2017}, url = {https://doi.org/10.1109/TIFS.2017.2688414}, doi = {10.1109/TIFS.2017.2688414}, timestamp = {Fri, 09 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/LuoCLV17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/LuoYLH17, author = {Da Luo and Rui Yang and Bin Li and Jiwu Huang}, title = {Detection of Double Compressed {AMR} Audio Using Stacked Autoencoder}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {12}, number = {2}, pages = {432--444}, year = {2017}, url = {https://doi.org/10.1109/TIFS.2016.2622012}, doi = {10.1109/TIFS.2016.2622012}, timestamp = {Thu, 06 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/LuoYLH17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/LyaminC17, author = {Andrey V. Lyamin and Elena N. Cherepovskaya}, title = {An Approach to Biometric Identification by Using Low-Frequency Eye Tracker}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {12}, number = {4}, pages = {881--891}, year = {2017}, url = {https://doi.org/10.1109/TIFS.2016.2639342}, doi = {10.1109/TIFS.2016.2639342}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/LyaminC17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/ManjaniTVSM17, author = {Ishan Manjani and Snigdha Tariyal and Mayank Vatsa and Richa Singh and Angshul Majumdar}, title = {Detecting Silicone Mask-Based Presentation Attack via Deep Dictionary Learning}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {12}, number = {7}, pages = {1713--1723}, year = {2017}, url = {https://doi.org/10.1109/TIFS.2017.2676720}, doi = {10.1109/TIFS.2017.2676720}, timestamp = {Thu, 06 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/ManjaniTVSM17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/MaoCZWZ17, author = {Yunlong Mao and Tingting Chen and Yuan Zhang and Tiancong Wang and Sheng Zhong}, title = {Towards Privacy-Preserving Aggregation for Collaborative Spectrum Sensing}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {12}, number = {6}, pages = {1483--1493}, year = {2017}, url = {https://doi.org/10.1109/TIFS.2017.2668219}, doi = {10.1109/TIFS.2017.2668219}, timestamp = {Thu, 09 Dec 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tifs/MaoCZWZ17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/MarraPSV17, author = {Francesco Marra and Giovanni Poggi and Carlo Sansone and Luisa Verdoliva}, title = {Blind PRNU-Based Image Clustering for Source Identification}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {12}, number = {9}, pages = {2197--2211}, year = {2017}, url = {https://doi.org/10.1109/TIFS.2017.2701335}, doi = {10.1109/TIFS.2017.2701335}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/MarraPSV17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/MattaML17, author = {Vincenzo Matta and Mario Di Mauro and Maurizio Longo}, title = {DDoS Attacks With Randomized Traffic Innovation: Botnet Identification Challenges and Strategies}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {12}, number = {8}, pages = {1844--1859}, year = {2017}, url = {https://doi.org/10.1109/TIFS.2017.2692685}, doi = {10.1109/TIFS.2017.2692685}, timestamp = {Sat, 05 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/MattaML17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/MerkelDV17, author = {Ronny Merkel and Jana Dittmann and Claus Vielhauer}, title = {A First Public Research Collection of High-Resolution Latent Fingerprint Time Series for Short- and Long-Term Print Age Estimation}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {12}, number = {10}, pages = {2276--2291}, year = {2017}, url = {https://doi.org/10.1109/TIFS.2017.2705622}, doi = {10.1109/TIFS.2017.2705622}, timestamp = {Thu, 06 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/MerkelDV17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/MinSALL17, author = {Byoung{-}Kyong Min and Heung{-}Il Suk and Min{-}Hee Ahn and Min{-}Ho Lee and Seong{-}Whan Lee}, title = {Individual Identification Using Cognitive Electroencephalographic Neurodynamics}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {12}, number = {9}, pages = {2159--2167}, year = {2017}, url = {https://doi.org/10.1109/TIFS.2017.2699944}, doi = {10.1109/TIFS.2017.2699944}, timestamp = {Tue, 21 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tifs/MinSALL17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/MohamedSS17, author = {Manar Mohamed and Babins Shrestha and Nitesh Saxena}, title = {SMASheD: Sniffing and Manipulating Android Sensor Data for Offensive Purposes}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {12}, number = {4}, pages = {901--913}, year = {2017}, url = {https://doi.org/10.1109/TIFS.2016.2620278}, doi = {10.1109/TIFS.2016.2620278}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/MohamedSS17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/MohapatraML17, author = {Parthajit Mohapatra and Chandra R. Murthy and Jemin Lee}, title = {On the Secrecy Capacity Region of the Two-User Symmetric {Z} Interference Channel With Unidirectional Transmitter Cooperation}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {12}, number = {3}, pages = {572--587}, year = {2017}, url = {https://doi.org/10.1109/TIFS.2016.2622007}, doi = {10.1109/TIFS.2016.2622007}, timestamp = {Thu, 06 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/MohapatraML17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/MondalB17, author = {Soumik Mondal and Patrick Bours}, title = {Person Identification by Keystroke Dynamics Using Pairwise User Coupling}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {12}, number = {6}, pages = {1319--1329}, year = {2017}, url = {https://doi.org/10.1109/TIFS.2017.2658539}, doi = {10.1109/TIFS.2017.2658539}, timestamp = {Thu, 06 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/MondalB17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/MontazeriHP17, author = {Zarrin Montazeri and Amir Houmansadr and Hossein Pishro{-}Nik}, title = {Achieving Perfect Location Privacy in Wireless Devices Using Anonymization}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {12}, number = {11}, pages = {2683--2698}, year = {2017}, url = {https://doi.org/10.1109/TIFS.2017.2713341}, doi = {10.1109/TIFS.2017.2713341}, timestamp = {Thu, 06 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/MontazeriHP17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/MoraffahS17, author = {Bahman Moraffah and Lalitha Sankar}, title = {Privacy-Guaranteed Two-Agent Interactions Using Information-Theoretic Mechanisms}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {12}, number = {9}, pages = {2168--2183}, year = {2017}, url = {https://doi.org/10.1109/TIFS.2017.2701278}, doi = {10.1109/TIFS.2017.2701278}, timestamp = {Thu, 06 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/MoraffahS17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/MurakamiKH17, author = {Takao Murakami and Atsunori Kanemura and Hideitsu Hino}, title = {Group Sparsity Tensor Factorization for Re-Identification of Open Mobility Traces}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {12}, number = {3}, pages = {689--704}, year = {2017}, url = {https://doi.org/10.1109/TIFS.2016.2631952}, doi = {10.1109/TIFS.2016.2631952}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/MurakamiKH17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/NadeauS17, author = {Andrew Nadeau and Gaurav Sharma}, title = {An Audio Watermark Designed for Efficient and Robust Resynchronization After Analog Playback}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {12}, number = {6}, pages = {1393--1405}, year = {2017}, url = {https://doi.org/10.1109/TIFS.2017.2661724}, doi = {10.1109/TIFS.2017.2661724}, timestamp = {Wed, 14 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/NadeauS17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/NanYYZZGWS17, author = {Yuhong Nan and Zhemin Yang and Min Yang and Shunfan Zhou and Yuan Zhang and Guofei Gu and Xiaofeng Wang and Limin Sun}, title = {Identifying User-Input Privacy in Mobile Applications at a Large Scale}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {12}, number = {3}, pages = {647--661}, year = {2017}, url = {https://doi.org/10.1109/TIFS.2016.2631949}, doi = {10.1109/TIFS.2016.2631949}, timestamp = {Wed, 12 Jun 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/NanYYZZGWS17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/NataleB17, author = {Francesco G. B. De Natale and Giulia Boato}, title = {Detecting Morphological Filtering of Binary Images}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {12}, number = {5}, pages = {1207--1217}, year = {2017}, url = {https://doi.org/10.1109/TIFS.2017.2656472}, doi = {10.1109/TIFS.2017.2656472}, timestamp = {Thu, 06 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/NataleB17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/NissimCE17, author = {Nir Nissim and Aviad Cohen and Yuval Elovici}, title = {{ALDOCX:} Detection of Unknown Malicious Microsoft Office Documents Using Designated Active Learning Methods Based on New Structural Feature Extraction Methodology}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {12}, number = {3}, pages = {631--646}, year = {2017}, url = {https://doi.org/10.1109/TIFS.2016.2631905}, doi = {10.1109/TIFS.2016.2631905}, timestamp = {Fri, 26 Mar 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tifs/NissimCE17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/OkadaU17, author = {Hiroki Okada and Ken Umeno}, title = {Randomness Evaluation With the Discrete Fourier Transform Test Based on Exact Analysis of the Reference Distribution}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {12}, number = {5}, pages = {1218--1226}, year = {2017}, url = {https://doi.org/10.1109/TIFS.2017.2656473}, doi = {10.1109/TIFS.2017.2656473}, timestamp = {Wed, 26 Jul 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/OkadaU17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/OsadchyHGDP17, author = {Margarita Osadchy and Julio C. Hernandez{-}Castro and Stuart J. Gibson and Orr Dunkelman and Daniel P{\'{e}}rez{-}Cabo}, title = {No Bot Expects the DeepCAPTCHA! Introducing Immutable Adversarial Examples, With Applications to {CAPTCHA} Generation}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {12}, number = {11}, pages = {2640--2653}, year = {2017}, url = {https://doi.org/10.1109/TIFS.2017.2718479}, doi = {10.1109/TIFS.2017.2718479}, timestamp = {Fri, 08 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/OsadchyHGDP17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/OuamaneCBBBH17, author = {Abdelmalik Ouamane and Ammar Chouchane and Elhocine Boutellaa and Mebarka Belahcene and Salah Bourennane and Abdenour Hadid}, title = {Efficient Tensor-Based 2D+3D Face Verification}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {12}, number = {11}, pages = {2751--2762}, year = {2017}, url = {https://doi.org/10.1109/TIFS.2017.2718490}, doi = {10.1109/TIFS.2017.2718490}, timestamp = {Sun, 06 Oct 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/OuamaneCBBBH17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/OzmenG17, author = {Mustafa Ozmen and Mustafa Cenk Gursoy}, title = {Secure Transmission of Delay-Sensitive Data Over Wireless Fading Channels}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {12}, number = {9}, pages = {2036--2051}, year = {2017}, url = {https://doi.org/10.1109/TIFS.2017.2692749}, doi = {10.1109/TIFS.2017.2692749}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/OzmenG17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/PanZZZJ17, author = {Wuqiong Pan and Fangyu Zheng and Yuan Zhao and Wen Tao Zhu and Jiwu Jing}, title = {An Efficient Elliptic Curve Cryptography Signature Server With {GPU} Acceleration}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {12}, number = {1}, pages = {111--122}, year = {2017}, url = {https://doi.org/10.1109/TIFS.2016.2603974}, doi = {10.1109/TIFS.2016.2603974}, timestamp = {Sun, 06 Oct 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/PanZZZJ17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/PapadopoulosNDM17, author = {Athanasios Papadopoulos and Toan Nguyen and Emre Durmus and Nasir D. Memon}, title = {IllusionPIN: Shoulder-Surfing Resistant Authentication Using Hybrid Images}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {12}, number = {12}, pages = {2875--2889}, year = {2017}, url = {https://doi.org/10.1109/TIFS.2017.2725199}, doi = {10.1109/TIFS.2017.2725199}, timestamp = {Tue, 07 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/PapadopoulosNDM17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/PasquiniBP17, author = {Cecilia Pasquini and Giulia Boato and Fernando P{\'{e}}rez{-}Gonz{\'{a}}lez}, title = {Statistical Detection of {JPEG} Traces in Digital Images in Uncompressed Formats}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {12}, number = {12}, pages = {2890--2905}, year = {2017}, url = {https://doi.org/10.1109/TIFS.2017.2725201}, doi = {10.1109/TIFS.2017.2725201}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/PasquiniBP17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/PatranabisCMC17, author = {Sikhar Patranabis and Abhishek Chakraborty and Debdeep Mukhopadhyay and Partha Pratim Chakrabarti}, title = {Fault Space Transformation: {A} Generic Approach to Counter Differential Fault Analysis and Differential Fault Intensity Analysis on AES-Like Block Ciphers}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {12}, number = {5}, pages = {1092--1102}, year = {2017}, url = {https://doi.org/10.1109/TIFS.2016.2646638}, doi = {10.1109/TIFS.2016.2646638}, timestamp = {Thu, 06 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/PatranabisCMC17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/PawlickZ17, author = {Jeffrey Pawlick and Quanyan Zhu}, title = {Strategic Trust in Cloud-Enabled Cyber-Physical Systems With an Application to Glucose Control}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {12}, number = {12}, pages = {2906--2919}, year = {2017}, url = {https://doi.org/10.1109/TIFS.2017.2725224}, doi = {10.1109/TIFS.2017.2725224}, timestamp = {Thu, 06 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/PawlickZ17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/Pedrouzo-UlloaT17, author = {Alberto Pedrouzo{-}Ulloa and Juan Ram{\'{o}}n Troncoso{-}Pastoriza and Fernando P{\'{e}}rez{-}Gonz{\'{a}}lez}, title = {Number Theoretic Transforms for Secure Signal Processing}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {12}, number = {5}, pages = {1125--1140}, year = {2017}, url = {https://doi.org/10.1109/TIFS.2016.2647223}, doi = {10.1109/TIFS.2016.2647223}, timestamp = {Mon, 26 Oct 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tifs/Pedrouzo-UlloaT17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/PengWDT17, author = {Bo Peng and Wei Wang and Jing Dong and Tieniu Tan}, title = {Optimized 3D Lighting Environment Estimation for Image Forgery Detection}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {12}, number = {2}, pages = {479--494}, year = {2017}, url = {https://doi.org/10.1109/TIFS.2016.2623589}, doi = {10.1109/TIFS.2016.2623589}, timestamp = {Thu, 06 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/PengWDT17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/PokhriyalTNG17, author = {Neeti Pokhriyal and Kshitij Tayal and Ifeoma Nwogu and Venu Govindaraju}, title = {Cognitive-Biometric Recognition From Language Usage: {A} Feasibility Study}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {12}, number = {1}, pages = {134--143}, year = {2017}, url = {https://doi.org/10.1109/TIFS.2016.2604213}, doi = {10.1109/TIFS.2016.2604213}, timestamp = {Sun, 06 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/PokhriyalTNG17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/PradhanV17, author = {Parth Pradhan and Parv Venkitasubramaniam}, title = {Stealthy Attacks in Dynamical Systems: Tradeoffs Between Utility and Detectability With Application in Anonymous Systems}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {12}, number = {4}, pages = {779--792}, year = {2017}, url = {https://doi.org/10.1109/TIFS.2016.2607695}, doi = {10.1109/TIFS.2016.2607695}, timestamp = {Thu, 06 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/PradhanV17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/ProencaN17, author = {Hugo Proen{\c{c}}a and Jo{\~{a}}o C. Neves}, title = {Soft Biometrics: Globally Coherent Solutions for Hair Segmentation and Style Recognition Based on Hierarchical MRFs}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {12}, number = {7}, pages = {1637--1645}, year = {2017}, url = {https://doi.org/10.1109/TIFS.2017.2680246}, doi = {10.1109/TIFS.2017.2680246}, timestamp = {Mon, 08 Apr 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/ProencaN17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/PunYY17, author = {Chi{-}Man Pun and Cai{-}Ping Yan and Xiaochen Yuan}, title = {Image Alignment-Based Multi-Region Matching for Object-Level Tampering Detection}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {12}, number = {2}, pages = {377--391}, year = {2017}, url = {https://doi.org/10.1109/TIFS.2016.2615272}, doi = {10.1109/TIFS.2016.2615272}, timestamp = {Thu, 06 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/PunYY17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/QinE17, author = {Huafeng Qin and Mounim A. El{-}Yacoubi}, title = {Deep Representation-Based Feature Extraction and Recovering for Finger-Vein Verification}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {12}, number = {8}, pages = {1816--1829}, year = {2017}, url = {https://doi.org/10.1109/TIFS.2017.2689724}, doi = {10.1109/TIFS.2017.2689724}, timestamp = {Fri, 09 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/QinE17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/RashidiFB17, author = {Bahman Rashidi and Carol J. Fung and Elisa Bertino}, title = {A Collaborative DDoS Defence Framework Using Network Function Virtualization}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {12}, number = {10}, pages = {2483--2497}, year = {2017}, url = {https://doi.org/10.1109/TIFS.2017.2708693}, doi = {10.1109/TIFS.2017.2708693}, timestamp = {Thu, 06 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/RashidiFB17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/ReisCMG17, author = {Paulo Max Gil Innocencio Reis and Jo{\~{a}}o Paulo Carvalho Lustosa da Costa and Ricardo Kehrle Miranda and Giovanni Del Galdo}, title = {ESPRIT-Hilbert-Based Audio Tampering Detection With {SVM} Classifier for Forensic Analysis via Electrical Network Frequency}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {12}, number = {4}, pages = {853--864}, year = {2017}, url = {https://doi.org/10.1109/TIFS.2016.2636095}, doi = {10.1109/TIFS.2016.2636095}, timestamp = {Thu, 06 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/ReisCMG17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/RenYWW17, author = {Yanzhen Ren and Jing Yang and Jinwei Wang and Lina Wang}, title = {{AMR} Steganalysis Based on Second-Order Difference of Pitch Delay}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {12}, number = {6}, pages = {1345--1357}, year = {2017}, url = {https://doi.org/10.1109/TIFS.2016.2636087}, doi = {10.1109/TIFS.2016.2636087}, timestamp = {Fri, 15 Dec 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tifs/RenYWW17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/RevadigarJXVHJ17, author = {Girish Revadigar and Chitra Javali and Weitao Xu and Athanasios V. Vasilakos and Wen Hu and Sanjay Jha}, title = {Accelerometer and Fuzzy Vault-Based Secure Group Key Generation and Sharing Protocol for Smart Wearables}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {12}, number = {10}, pages = {2467--2482}, year = {2017}, url = {https://doi.org/10.1109/TIFS.2017.2708690}, doi = {10.1109/TIFS.2017.2708690}, timestamp = {Fri, 09 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/RevadigarJXVHJ17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/RochaSFCTSCS17, author = {Anderson Rocha and Walter J. Scheirer and Christopher W. Forstall and Thiago Cavalcante and Antonio Theophilo and Bingyu Shen and Ariadne Carvalho and Efstathios Stamatatos}, title = {Authorship Attribution for Social Media Forensics}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {12}, number = {1}, pages = {5--33}, year = {2017}, url = {https://doi.org/10.1109/TIFS.2016.2603960}, doi = {10.1109/TIFS.2016.2603960}, timestamp = {Mon, 01 Mar 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tifs/RochaSFCTSCS17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/RohloffCS17, author = {Kurt Rohloff and David Bruce Cousins and Daniel Sumorok}, title = {Scalable, Practical VoIP Teleconferencing With End-to-End Homomorphic Encryption}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {12}, number = {5}, pages = {1031--1041}, year = {2017}, url = {https://doi.org/10.1109/TIFS.2016.2639340}, doi = {10.1109/TIFS.2016.2639340}, timestamp = {Thu, 06 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/RohloffCS17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/RothTMS17, author = {John D. Roth and Murali Tummala and John C. McEachen and James W. Scrofani}, title = {On Location Privacy in {LTE} Networks}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {12}, number = {6}, pages = {1358--1368}, year = {2017}, url = {https://doi.org/10.1109/TIFS.2017.2656470}, doi = {10.1109/TIFS.2017.2656470}, timestamp = {Thu, 06 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/RothTMS17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/RoyMR17, author = {Aditi Roy and Nasir D. Memon and Arun Ross}, title = {MasterPrint: Exploring the Vulnerability of Partial Fingerprint-Based Authentication Systems}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {12}, number = {9}, pages = {2013--2025}, year = {2017}, url = {https://doi.org/10.1109/TIFS.2017.2691658}, doi = {10.1109/TIFS.2017.2691658}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/RoyMR17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/SaitoTK17, author = {Shota Saito and Yoichi Tomioka and Hitoshi Kitazawa}, title = {A Theoretical Framework for Estimating False Acceptance Rate of PRNU-Based Camera Identification}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {12}, number = {9}, pages = {2026--2035}, year = {2017}, url = {https://doi.org/10.1109/TIFS.2017.2692683}, doi = {10.1109/TIFS.2017.2692683}, timestamp = {Mon, 26 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/SaitoTK17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/Salmani17, author = {Hassan Salmani}, title = {{COTD:} Reference-Free Hardware Trojan Detection and Recovery Based on Controllability and Observability in Gate-Level Netlist}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {12}, number = {2}, pages = {338--350}, year = {2017}, url = {https://doi.org/10.1109/TIFS.2016.2613842}, doi = {10.1109/TIFS.2016.2613842}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/Salmani17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/SeiO17, author = {Yuichi Sei and Akihiko Ohsuga}, title = {Differential Private Data Collection and Analysis Based on Randomized Multiple Dummies for Untrusted Mobile Crowdsensing}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {12}, number = {4}, pages = {926--939}, year = {2017}, url = {https://doi.org/10.1109/TIFS.2016.2632069}, doi = {10.1109/TIFS.2016.2632069}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/SeiO17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/SenstEKS17, author = {Tobias Senst and Volker Eiselein and Alexander Kuhn and Thomas Sikora}, title = {Crowd Violence Detection Using Global Motion-Compensated Lagrangian Features and Scale-Sensitive Video-Level Representation}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {12}, number = {12}, pages = {2945--2956}, year = {2017}, url = {https://doi.org/10.1109/TIFS.2017.2725820}, doi = {10.1109/TIFS.2017.2725820}, timestamp = {Thu, 06 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/SenstEKS17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/SharmaS17, author = {Abhishek Sharma and Suresh Sundaram}, title = {A Novel Online Signature Verification System Based on {GMM} Features in a {DTW} Framework}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {12}, number = {3}, pages = {705--718}, year = {2017}, url = {https://doi.org/10.1109/TIFS.2016.2632063}, doi = {10.1109/TIFS.2016.2632063}, timestamp = {Tue, 07 Sep 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/SharmaS17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/ShehnepoorSFC17, author = {Saeedreza Shehnepoor and Mostafa Salehi and Reza Farahbakhsh and No{\"{e}}l Crespi}, title = {NetSpam: {A} Network-Based Spam Detection Framework for Reviews in Online Social Media}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {12}, number = {7}, pages = {1585--1595}, year = {2017}, url = {https://doi.org/10.1109/TIFS.2017.2675361}, doi = {10.1109/TIFS.2017.2675361}, timestamp = {Thu, 06 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/ShehnepoorSFC17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/ShenSCHS17, author = {Jian Shen and Jun Shen and Xiaofeng Chen and Xinyi Huang and Willy Susilo}, title = {An Efficient Public Auditing Protocol With Novel Dynamic Structure for Cloud Data}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {12}, number = {10}, pages = {2402--2415}, year = {2017}, url = {https://doi.org/10.1109/TIFS.2017.2705620}, doi = {10.1109/TIFS.2017.2705620}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/ShenSCHS17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/ShenWZW17, author = {Meng Shen and Mingwei Wei and Liehuang Zhu and Mingzhong Wang}, title = {Classification of Encrypted Traffic With Second-Order Markov Chains and Application Attribute Bigrams}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {12}, number = {8}, pages = {1830--1843}, year = {2017}, url = {https://doi.org/10.1109/TIFS.2017.2692682}, doi = {10.1109/TIFS.2017.2692682}, timestamp = {Sun, 22 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/ShenWZW17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/ShenZS17, author = {Hua Shen and Mingwu Zhang and Jian Shen}, title = {Efficient Privacy-Preserving Cube-Data Aggregation Scheme for Smart Grids}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {12}, number = {6}, pages = {1369--1381}, year = {2017}, url = {https://doi.org/10.1109/TIFS.2017.2656475}, doi = {10.1109/TIFS.2017.2656475}, timestamp = {Thu, 06 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/ShenZS17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/Shim17, author = {Kyung{-}Ah Shim}, title = {{BASIS:} {A} Practical Multi-User Broadcast Authentication Scheme in Wireless Sensor Networks}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {12}, number = {7}, pages = {1545--1554}, year = {2017}, url = {https://doi.org/10.1109/TIFS.2017.2668062}, doi = {10.1109/TIFS.2017.2668062}, timestamp = {Thu, 06 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/Shim17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/SiavoshaniMFD17, author = {Mahdi Jafari Siavoshani and Shaunak Mishra and Christina Fragouli and Suhas N. Diggavi}, title = {Multi-Party Secret Key Agreement Over State-Dependent Wireless Broadcast Channels}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {12}, number = {2}, pages = {323--337}, year = {2017}, url = {https://doi.org/10.1109/TIFS.2016.2612649}, doi = {10.1109/TIFS.2016.2612649}, timestamp = {Thu, 06 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/SiavoshaniMFD17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/SongWWSLP17, author = {Wei Song and Bing Wang and Qian Wang and Chengliang Shi and Wenjing Lou and Zhiyong Peng}, title = {Publicly Verifiable Computation of Polynomials Over Outsourced Data With Multiple Sources}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {12}, number = {10}, pages = {2334--2347}, year = {2017}, url = {https://doi.org/10.1109/TIFS.2017.2705628}, doi = {10.1109/TIFS.2017.2705628}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/SongWWSLP17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/Soria-ComasDSM17, author = {Jordi Soria{-}Comas and Josep Domingo{-}Ferrer and David S{\'{a}}nchez and David Meg{\'{\i}}as}, title = {Individual Differential Privacy: {A} Utility-Preserving Formulation of Differential Privacy Guarantees}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {12}, number = {6}, pages = {1418--1429}, year = {2017}, url = {https://doi.org/10.1109/TIFS.2017.2663337}, doi = {10.1109/TIFS.2017.2663337}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/Soria-ComasDSM17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/StankoAS17, author = {Taras Stanko and Fitria Nur Andini and Boris Skoric}, title = {Optimized Quantization in Zero Leakage Helper Data Systems}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {12}, number = {8}, pages = {1957--1966}, year = {2017}, url = {https://doi.org/10.1109/TIFS.2017.2697840}, doi = {10.1109/TIFS.2017.2697840}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/StankoAS17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/SunJ17, author = {Hua Sun and Syed Ali Jafar}, title = {Optimal Download Cost of Private Information Retrieval for Arbitrary Message Length}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {12}, number = {12}, pages = {2920--2932}, year = {2017}, url = {https://doi.org/10.1109/TIFS.2017.2725225}, doi = {10.1109/TIFS.2017.2725225}, timestamp = {Thu, 06 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/SunJ17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/SunLLML17, author = {Mingshen Sun and Xiaolei Li and John C. S. Lui and Richard T. B. Ma and Zhenkai Liang}, title = {Monet: {A} User-Oriented Behavior-Based Malware Variants Detection System for Android}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {12}, number = {5}, pages = {1103--1112}, year = {2017}, url = {https://doi.org/10.1109/TIFS.2016.2646641}, doi = {10.1109/TIFS.2016.2646641}, timestamp = {Sat, 05 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/SunLLML17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/SusiloJGYYM17, author = {Willy Susilo and Peng Jiang and Fuchun Guo and Guomin Yang and Yong Yu and Yi Mu}, title = {{EACSIP:} Extendable Access Control System With Integrity Protection for Enhancing Collaboration in the Cloud}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {12}, number = {12}, pages = {3110--3122}, year = {2017}, url = {https://doi.org/10.1109/TIFS.2017.2737960}, doi = {10.1109/TIFS.2017.2737960}, timestamp = {Mon, 30 Sep 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/SusiloJGYYM17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/TahaY17, author = {Kamal Taha and Paul D. Yoo}, title = {Using the Spanning Tree of a Criminal Network for Identifying Its Leaders}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {12}, number = {2}, pages = {445--453}, year = {2017}, url = {https://doi.org/10.1109/TIFS.2016.2622226}, doi = {10.1109/TIFS.2016.2622226}, timestamp = {Sat, 05 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/TahaY17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/TanGG17, author = {Onur Tan and Jes{\'{u}}s G{\'{o}}mez{-}Vilardeb{\'{o}} and Deniz G{\"{u}}nd{\"{u}}z}, title = {Privacy-Cost Trade-offs in Demand-Side Management With Storage}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {12}, number = {6}, pages = {1458--1469}, year = {2017}, url = {https://doi.org/10.1109/TIFS.2017.2656469}, doi = {10.1109/TIFS.2017.2656469}, timestamp = {Thu, 23 Jun 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/TanGG17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/TanNFYKIG17, author = {Rui Tan and Hoang Hai Nguyen and Yi Shyh Eddy Foo and David K. Y. Yau and Zbigniew Kalbarczyk and Ravishankar K. Iyer and Hoay Beng Gooi}, title = {Modeling and Mitigating Impact of False Data Injection Attacks on Automatic Generation Control}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {12}, number = {7}, pages = {1609--1624}, year = {2017}, url = {https://doi.org/10.1109/TIFS.2017.2676721}, doi = {10.1109/TIFS.2017.2676721}, timestamp = {Fri, 12 Jan 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tifs/TanNFYKIG17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/TanZLH17, author = {Shunquan Tan and Haojie Zhang and Bin Li and Jiwu Huang}, title = {Pixel-Decimation-Assisted Steganalysis of Synchronize-Embedding-Changes Steganography}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {12}, number = {7}, pages = {1658--1670}, year = {2017}, url = {https://doi.org/10.1109/TIFS.2017.2682703}, doi = {10.1109/TIFS.2017.2682703}, timestamp = {Thu, 06 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/TanZLH17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/TaspinarMM17, author = {Samet Taspinar and Manoranjan Mohanty and Nasir D. Memon}, title = {PRNU-Based Camera Attribution From Multiple Seam-Carved Images}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {12}, number = {12}, pages = {3065--3080}, year = {2017}, url = {https://doi.org/10.1109/TIFS.2017.2737961}, doi = {10.1109/TIFS.2017.2737961}, timestamp = {Thu, 06 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/TaspinarMM17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/TavangaranBS17, author = {Nima Tavangaran and Holger Boche and Rafael F. Schaefer}, title = {Secret-Key Generation Using Compound Sources and One-Way Public Communication}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {12}, number = {1}, pages = {227--241}, year = {2017}, url = {https://doi.org/10.1109/TIFS.2016.2611484}, doi = {10.1109/TIFS.2016.2611484}, timestamp = {Thu, 06 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/TavangaranBS17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/ThaiCRD17, author = {Thanh Hai Thai and R{\'{e}}mi Cogranne and Florent Retraint and Thi{-}Ngoc{-}Canh Doan}, title = {{JPEG} Quantization Step Estimation and Its Applications to Digital Image Forensics}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {12}, number = {1}, pages = {123--133}, year = {2017}, url = {https://doi.org/10.1109/TIFS.2016.2604208}, doi = {10.1109/TIFS.2016.2604208}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/ThaiCRD17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/TianBCMK17, author = {Jing (Dave) Tian and Kevin R. B. Butler and Joseph I. Choi and Patrick D. McDaniel and Padma Krishnaswamy}, title = {Securing {ARP/NDP} From the Ground Up}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {12}, number = {9}, pages = {2131--2143}, year = {2017}, url = {https://doi.org/10.1109/TIFS.2017.2695983}, doi = {10.1109/TIFS.2017.2695983}, timestamp = {Thu, 06 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/TianBCMK17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/TondiAPB17, author = {Benedetta Tondi and Pedro {Comesa{~{n}}a Alfaro} and Fernando P{\'{e}}rez{-}Gonz{\'{a}}lez and Mauro Barni}, title = {Smart Detection of Line-Search Oracle Attacks}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {12}, number = {3}, pages = {588--603}, year = {2017}, url = {https://doi.org/10.1109/TIFS.2016.2624280}, doi = {10.1109/TIFS.2016.2624280}, timestamp = {Sat, 09 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/TondiAPB17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/TongHZ17, author = {Wei Tong and Jingyu Hua and Sheng Zhong}, title = {A Jointly Differentially Private Scheduling Protocol for Ridesharing Services}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {12}, number = {10}, pages = {2444--2456}, year = {2017}, url = {https://doi.org/10.1109/TIFS.2017.2707334}, doi = {10.1109/TIFS.2017.2707334}, timestamp = {Thu, 09 Dec 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tifs/TongHZ17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/Tsikerdekis17, author = {Michail Tsikerdekis}, title = {Identity Deception Prevention Using Common Contribution Network Data}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {12}, number = {1}, pages = {188--199}, year = {2017}, url = {https://doi.org/10.1109/TIFS.2016.2607697}, doi = {10.1109/TIFS.2016.2607697}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/Tsikerdekis17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/TuGLP17, author = {Wenwen Tu and Mario Goldenbaum and Lifeng Lai and H. Vincent Poor}, title = {On Simultaneously Generating Multiple Keys in a Joint Source-Channel Model}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {12}, number = {2}, pages = {298--308}, year = {2017}, url = {https://doi.org/10.1109/TIFS.2016.2612172}, doi = {10.1109/TIFS.2016.2612172}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/TuGLP17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/ValsesiaCBM17, author = {Diego Valsesia and Giulio Coluccia and Tiziano Bianchi and Enrico Magli}, title = {User Authentication via PRNU-Based Physical Unclonable Functions}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {12}, number = {8}, pages = {1941--1956}, year = {2017}, url = {https://doi.org/10.1109/TIFS.2017.2697402}, doi = {10.1109/TIFS.2017.2697402}, timestamp = {Thu, 06 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/ValsesiaCBM17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/Vazquez-PadinPA17, author = {David Vazquez{-}Padin and Fernando P{\'{e}}rez{-}Gonz{\'{a}}lez and Pedro {Comesa{~{n}}a Alfaro}}, title = {A Random Matrix Approach to the Forensic Analysis of Upscaled Images}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {12}, number = {9}, pages = {2115--2130}, year = {2017}, url = {https://doi.org/10.1109/TIFS.2017.2699638}, doi = {10.1109/TIFS.2017.2699638}, timestamp = {Sat, 09 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/Vazquez-PadinPA17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/VijayakumarPHPK17, author = {Arunkumar Vijayakumar and Vinay C. Patil and Daniel E. Holcomb and Christof Paar and Sandip Kundu}, title = {Physical Design Obfuscation of Hardware: {A} Comprehensive Investigation of Device and Logic-Level Techniques}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {12}, number = {1}, pages = {64--77}, year = {2017}, url = {https://doi.org/10.1109/TIFS.2016.2601067}, doi = {10.1109/TIFS.2016.2601067}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/VijayakumarPHPK17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/WanSZ17, author = {Ming Wan and Wenli Shang and Peng Zeng}, title = {Double Behavior Characteristics for One-Class Classification Anomaly Detection in Networked Control Systems}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {12}, number = {12}, pages = {3011--3023}, year = {2017}, url = {https://doi.org/10.1109/TIFS.2017.2730581}, doi = {10.1109/TIFS.2017.2730581}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/WanSZ17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/WangCL17, author = {Zhaohong Wang and Sen{-}Ching S. Cheung and Ying Luo}, title = {Information-Theoretic Secure Multi-Party Computation With Collusion Deterrence}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {12}, number = {4}, pages = {980--995}, year = {2017}, url = {https://doi.org/10.1109/TIFS.2016.2598533}, doi = {10.1109/TIFS.2016.2598533}, timestamp = {Thu, 31 Mar 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/WangCL17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/WangCWHJ17, author = {Ding Wang and Haibo Cheng and Ping Wang and Xinyi Huang and Gaopeng Jian}, title = {Zipf's Law in Passwords}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {12}, number = {11}, pages = {2776--2791}, year = {2017}, url = {https://doi.org/10.1109/TIFS.2017.2721359}, doi = {10.1109/TIFS.2017.2721359}, timestamp = {Mon, 25 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/WangCWHJ17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/WangLDZYZW17, author = {Bo Wang and Leibo Liu and Chenchen Deng and Min Zhu and Shouyi Yin and Zhuoquan Zhou and Shaojun Wei}, title = {Exploration of Benes Network in Cryptographic Processors: {A} Random Infection Countermeasure for Block Ciphers Against Fault Attacks}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {12}, number = {2}, pages = {309--322}, year = {2017}, url = {https://doi.org/10.1109/TIFS.2016.2612638}, doi = {10.1109/TIFS.2016.2612638}, timestamp = {Sun, 22 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/WangLDZYZW17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/WangTL17, author = {Wei Wang and Kah Chan Teh and Kwok Hung Li}, title = {Secrecy Throughput Maximization for {MISO} Multi-Eavesdropper Wiretap Channels}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {12}, number = {3}, pages = {505--515}, year = {2017}, url = {https://doi.org/10.1109/TIFS.2016.2620279}, doi = {10.1109/TIFS.2016.2620279}, timestamp = {Thu, 06 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/WangTL17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/WangW17, author = {Jun Wang and Guoqing Wang}, title = {Quality-Specific Hand Vein Recognition System}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {12}, number = {11}, pages = {2599--2610}, year = {2017}, url = {https://doi.org/10.1109/TIFS.2017.2713340}, doi = {10.1109/TIFS.2017.2713340}, timestamp = {Thu, 23 Dec 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tifs/WangW17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/WangWQSDH17, author = {Yujue Wang and Qianhong Wu and Bo Qin and Wenchang Shi and Robert H. Deng and Jiankun Hu}, title = {Identity-Based Data Outsourcing With Comprehensive Auditing in Clouds}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {12}, number = {4}, pages = {940--952}, year = {2017}, url = {https://doi.org/10.1109/TIFS.2016.2646913}, doi = {10.1109/TIFS.2016.2646913}, timestamp = {Thu, 06 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/WangWQSDH17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/WangWQTS17, author = {Yujue Wang and Qianhong Wu and Bo Qin and Shaohua Tang and Willy Susilo}, title = {Online/Offline Provable Data Possession}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {12}, number = {5}, pages = {1182--1194}, year = {2017}, url = {https://doi.org/10.1109/TIFS.2017.2656461}, doi = {10.1109/TIFS.2017.2656461}, timestamp = {Thu, 06 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/WangWQTS17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/WangXLLX17, author = {Tianbo Wang and Chunhe Xia and Zhong Li and Xiaochen Liu and Yang Xiang}, title = {The Spatial-Temporal Perspective: The Study of the Propagation of Modern Social Worms}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {12}, number = {11}, pages = {2558--2573}, year = {2017}, url = {https://doi.org/10.1109/TIFS.2017.2711424}, doi = {10.1109/TIFS.2017.2711424}, timestamp = {Thu, 06 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/WangXLLX17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/WeiCHV17, author = {Chun{-}Yi Wei and Po{-}Ning Chen and Yunghsiang S. Han and Pramod K. Varshney}, title = {Local Threshold Design for Target Localization Using Error Correcting Codes in Wireless Sensor Networks in the Presence of Byzantine Attacks}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {12}, number = {7}, pages = {1571--1584}, year = {2017}, url = {https://doi.org/10.1109/TIFS.2017.2670531}, doi = {10.1109/TIFS.2017.2670531}, timestamp = {Thu, 06 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/WeiCHV17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/WenLMWZ17, author = {Jiajun Wen and Zhihui Lai and Zhong Ming and Wai Keung Wong and Zuofeng Zhong}, title = {Directional Gaussian Model for Automatic Speeding Event Detection}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {12}, number = {10}, pages = {2292--2307}, year = {2017}, url = {https://doi.org/10.1109/TIFS.2017.2705623}, doi = {10.1109/TIFS.2017.2705623}, timestamp = {Thu, 06 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/WenLMWZ17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/Wong017, author = {Chau{-}Wai Wong and Min Wu}, title = {Counterfeit Detection Based on Unclonable Feature of Paper Using Mobile Camera}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {12}, number = {8}, pages = {1885--1899}, year = {2017}, url = {https://doi.org/10.1109/TIFS.2017.2694404}, doi = {10.1109/TIFS.2017.2694404}, timestamp = {Thu, 06 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/Wong017.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/XieHGZ17, author = {Miao Xie and Jiankun Hu and Song Guo and Albert Y. Zomaya}, title = {Distributed Segment-Based Anomaly Detection With Kullback-Leibler Divergence in Wireless Sensor Networks}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {12}, number = {1}, pages = {101--110}, year = {2017}, url = {https://doi.org/10.1109/TIFS.2016.2603961}, doi = {10.1109/TIFS.2016.2603961}, timestamp = {Thu, 06 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/XieHGZ17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/XieWWTCF17, author = {Qi Xie and Duncan S. Wong and Guilin Wang and Xiao Tan and Kefei Chen and Liming Fang}, title = {Provably Secure Dynamic ID-Based Anonymous Two-Factor Authenticated Key Exchange Protocol With Extended Security Model}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {12}, number = {6}, pages = {1382--1392}, year = {2017}, url = {https://doi.org/10.1109/TIFS.2017.2659640}, doi = {10.1109/TIFS.2017.2659640}, timestamp = {Mon, 21 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/XieWWTCF17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/XuCWL17, author = {Qinyi Xu and Yan Chen and Beibei Wang and K. J. Ray Liu}, title = {Radio Biometrics: Human Recognition Through a Wall}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {12}, number = {5}, pages = {1141--1155}, year = {2017}, url = {https://doi.org/10.1109/TIFS.2016.2647224}, doi = {10.1109/TIFS.2016.2647224}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/XuCWL17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/XuJQZLR17, author = {Lei Xu and Chunxiao Jiang and Yi Qian and Youjian Zhao and Jianhua Li and Yong Ren}, title = {Dynamic Privacy Pricing: {A} Multi-Armed Bandit Approach With Time-Variant Rewards}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {12}, number = {2}, pages = {271--285}, year = {2017}, url = {https://doi.org/10.1109/TIFS.2016.2611487}, doi = {10.1109/TIFS.2016.2611487}, timestamp = {Mon, 21 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/XuJQZLR17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/XuRZQR17, author = {Chugui Xu and Ju Ren and Yaoxue Zhang and Zhan Qin and Kui Ren}, title = {DPPro: Differentially Private High-Dimensional Data Release via Random Projection}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {12}, number = {12}, pages = {3081--3093}, year = {2017}, url = {https://doi.org/10.1109/TIFS.2017.2737966}, doi = {10.1109/TIFS.2017.2737966}, timestamp = {Mon, 25 Mar 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tifs/XuRZQR17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/XuSRDW17, author = {Hongbin Xu and Li Sun and Pinyi Ren and Qinghe Du and Yichen Wang}, title = {Cooperative Privacy Preserving Scheme for Downlink Transmission in Multiuser Relay Networks}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {12}, number = {4}, pages = {825--839}, year = {2017}, url = {https://doi.org/10.1109/TIFS.2016.2636091}, doi = {10.1109/TIFS.2016.2636091}, timestamp = {Thu, 06 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/XuSRDW17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/XueLHXYH17, author = {Kaiping Xue and Shaohua Li and Jianan Hong and Yingjie Xue and Nenghai Yu and Peilin Hong}, title = {Two-Cloud Secure Database for Numeric-Related {SQL} Range Queries With Privacy Preserving}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {12}, number = {7}, pages = {1596--1608}, year = {2017}, url = {https://doi.org/10.1109/TIFS.2017.2675864}, doi = {10.1109/TIFS.2017.2675864}, timestamp = {Thu, 21 Dec 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tifs/XueLHXYH17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/XueM0TC0Z17, author = {Yinxing Xue and Guozhu Meng and Yang Liu and Tian Huat Tan and Hongxu Chen and Jun Sun and Jie Zhang}, title = {Auditing Anti-Malware Tools by Evolving Android Malware and Dynamic Loading Technique}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {12}, number = {7}, pages = {1529--1544}, year = {2017}, url = {https://doi.org/10.1109/TIFS.2017.2661723}, doi = {10.1109/TIFS.2017.2661723}, timestamp = {Fri, 24 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tifs/XueM0TC0Z17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/XueXHLYWH17, author = {Kaiping Xue and Yingjie Xue and Jianan Hong and Wei Li and Hao Yue and David S. L. Wei and Peilin Hong}, title = {{RAAC:} Robust and Auditable Access Control With Multiple Attribute Authorities for Public Cloud Storage}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {12}, number = {4}, pages = {953--967}, year = {2017}, url = {https://doi.org/10.1109/TIFS.2016.2647222}, doi = {10.1109/TIFS.2016.2647222}, timestamp = {Fri, 20 Sep 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/XueXHLYWH17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/YanHZT17, author = {Jun Yan and Haibo He and Xiangnan Zhong and Yufei Tang}, title = {Q-Learning-Based Vulnerability Analysis of Smart Grid Against Sequential Topology Attacks}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {12}, number = {1}, pages = {200--210}, year = {2017}, url = {https://doi.org/10.1109/TIFS.2016.2607701}, doi = {10.1109/TIFS.2016.2607701}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/YanHZT17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/YanLHZ17, author = {Hao Yan and Jiguo Li and Jinguang Han and Yichen Zhang}, title = {A Novel Efficient Remote Data Possession Checking Protocol in Cloud Storage}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {12}, number = {1}, pages = {78--88}, year = {2017}, url = {https://doi.org/10.1109/TIFS.2016.2601070}, doi = {10.1109/TIFS.2016.2601070}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/YanLHZ17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/YanP17, author = {Cai{-}Ping Yan and Chi{-}Man Pun}, title = {Multi-Scale Difference Map Fusion for Tamper Localization Using Binary Ranking Hashing}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {12}, number = {9}, pages = {2144--2158}, year = {2017}, url = {https://doi.org/10.1109/TIFS.2017.2699942}, doi = {10.1109/TIFS.2017.2699942}, timestamp = {Thu, 06 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/YanP17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/YangAM0Y017, author = {Qingyu Yang and Dou An and Rui Min and Wei Yu and Xinyu Yang and Wei Zhao}, title = {On Optimal {PMU} Placement-Based Defense Against Data Integrity Attacks in Smart Grid}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {12}, number = {7}, pages = {1735--1750}, year = {2017}, url = {https://doi.org/10.1109/TIFS.2017.2686367}, doi = {10.1109/TIFS.2017.2686367}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/YangAM0Y017.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/YangGZFB17, author = {Qing Yang and Paolo Gasti and Gang Zhou and Aydin Farajidavar and Kiran S. Balagani}, title = {On Inferring Browsing Activity on Smartphones via {USB} Power Analysis Side-Channel}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {12}, number = {5}, pages = {1056--1066}, year = {2017}, url = {https://doi.org/10.1109/TIFS.2016.2639446}, doi = {10.1109/TIFS.2016.2639446}, timestamp = {Thu, 06 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/YangGZFB17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/YangZC0ZW17, author = {Wei Yang and Yongbin Zhou and Yuchen Cao and Hailong Zhang and Qian Zhang and Huan Wang}, title = {Multi-Channel Fusion Attacks}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {12}, number = {8}, pages = {1757--1771}, year = {2017}, url = {https://doi.org/10.1109/TIFS.2017.2672521}, doi = {10.1109/TIFS.2017.2672521}, timestamp = {Thu, 28 Jan 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tifs/YangZC0ZW17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/YasinSR17, author = {Muhammad Yasin and Ozgur Sinanoglu and Jeyavijayan Rajendran}, title = {Testing the Trustworthiness of {IC} Testing: An Oracle-Less Attack on {IC} Camouflaging}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {12}, number = {11}, pages = {2668--2682}, year = {2017}, url = {https://doi.org/10.1109/TIFS.2017.2710954}, doi = {10.1109/TIFS.2017.2710954}, timestamp = {Tue, 29 Dec 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tifs/YasinSR17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/YavuzMSPB17, author = {Attila Altay Yavuz and Anand Mudgerikar and Ankush Singla and Ioannis Papapanagiotou and Elisa Bertino}, title = {Real-Time Digital Signatures for Time-Critical Networks}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {12}, number = {11}, pages = {2627--2639}, year = {2017}, url = {https://doi.org/10.1109/TIFS.2017.2716911}, doi = {10.1109/TIFS.2017.2716911}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/YavuzMSPB17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/YeNY17, author = {Jian Ye and Jiangqun Ni and Yang Yi}, title = {Deep Learning Hierarchical Representations for Image Steganalysis}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {12}, number = {11}, pages = {2545--2557}, year = {2017}, url = {https://doi.org/10.1109/TIFS.2017.2710946}, doi = {10.1109/TIFS.2017.2710946}, timestamp = {Fri, 03 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tifs/YeNY17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/YuAAHSDM17, author = {Yong Yu and Man Ho Au and Giuseppe Ateniese and Xinyi Huang and Willy Susilo and Yuanshun Dai and Geyong Min}, title = {Identity-Based Remote Data Integrity Checking With Perfect Data Privacy Preserving for Cloud Storage}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {12}, number = {4}, pages = {767--778}, year = {2017}, url = {https://doi.org/10.1109/TIFS.2016.2615853}, doi = {10.1109/TIFS.2016.2615853}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tifs/YuAAHSDM17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/YuW17, author = {Jia Yu and Huaqun Wang}, title = {Strong Key-Exposure Resilient Auditing for Secure Cloud Storage}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {12}, number = {8}, pages = {1931--1940}, year = {2017}, url = {https://doi.org/10.1109/TIFS.2017.2695449}, doi = {10.1109/TIFS.2017.2695449}, timestamp = {Sat, 31 Aug 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/YuW17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/YuZKLF17, author = {Jun Yu and Baopeng Zhang and Zhengzhong Kuang and Dan Lin and Jianping Fan}, title = {iPrivacy: Image Privacy Protection by Identifying Sensitive Objects via Deep Multi-Task Learning}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {12}, number = {5}, pages = {1005--1016}, year = {2017}, url = {https://doi.org/10.1109/TIFS.2016.2636090}, doi = {10.1109/TIFS.2016.2636090}, timestamp = {Mon, 26 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/YuZKLF17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/YuZLXC17, author = {Le Yu and Tao Zhang and Xiapu Luo and Lei Xue and Henry Chang}, title = {Toward Automatically Generating Privacy Policy for Android Apps}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {12}, number = {4}, pages = {865--880}, year = {2017}, url = {https://doi.org/10.1109/TIFS.2016.2639339}, doi = {10.1109/TIFS.2016.2639339}, timestamp = {Mon, 24 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/YuZLXC17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/YuanWWYN17, author = {Xingliang Yuan and Xinyu Wang and Cong Wang and Chenyun Yu and Sarana Nutanong}, title = {Privacy-Preserving Similarity Joins Over Encrypted Data}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {12}, number = {11}, pages = {2763--2775}, year = {2017}, url = {https://doi.org/10.1109/TIFS.2017.2721221}, doi = {10.1109/TIFS.2017.2721221}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/YuanWWYN17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/ZewailY17, author = {Ahmed A. Zewail and Aylin Yener}, title = {Multi-Terminal Two-Hop Untrusted-Relay Networks With Hierarchical Security Guarantees}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {12}, number = {9}, pages = {2052--2066}, year = {2017}, url = {https://doi.org/10.1109/TIFS.2017.2695163}, doi = {10.1109/TIFS.2017.2695163}, timestamp = {Thu, 06 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/ZewailY17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/ZhaNZLN17, author = {Xuan Zha and Wei Ni and Kangfeng Zheng and Ren Ping Liu and Xinxin Niu}, title = {Collaborative Authentication in Decentralized Dense Mobile Networks With Key Predistribution}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {12}, number = {10}, pages = {2261--2275}, year = {2017}, url = {https://doi.org/10.1109/TIFS.2017.2705584}, doi = {10.1109/TIFS.2017.2705584}, timestamp = {Mon, 26 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/ZhaNZLN17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/Zhang17, author = {Lei Zhang}, title = {{OTIBAAGKA:} {A} New Security Tool for Cryptographic Mix-Zone Establishment in Vehicular Ad Hoc Networks}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {12}, number = {12}, pages = {2998--3010}, year = {2017}, url = {https://doi.org/10.1109/TIFS.2017.2730479}, doi = {10.1109/TIFS.2017.2730479}, timestamp = {Thu, 06 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/Zhang17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/ZhangCZ17, author = {Hong Zhang and Yun Cao and Xianfeng Zhao}, title = {A Steganalytic Approach to Detect Motion Vector Modification Using Near-Perfect Estimation for Local Optimality}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {12}, number = {2}, pages = {465--478}, year = {2017}, url = {https://doi.org/10.1109/TIFS.2016.2623587}, doi = {10.1109/TIFS.2016.2623587}, timestamp = {Fri, 09 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/ZhangCZ17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/ZhangQZ17, author = {Rui Zhang and Shuang Qiu and Yongbin Zhou}, title = {Further Improving Efficiency of Higher Order Masking Schemes by Decreasing Randomness Complexity}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {12}, number = {11}, pages = {2590--2598}, year = {2017}, url = {https://doi.org/10.1109/TIFS.2017.2713323}, doi = {10.1109/TIFS.2017.2713323}, timestamp = {Thu, 06 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/ZhangQZ17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/ZhangRWWH17, author = {Yubao Zhang and Xin Ruan and Haining Wang and Hui Wang and Su He}, title = {Twitter Trends Manipulation: {A} First Look Inside the Security of Twitter Trending}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {12}, number = {1}, pages = {144--156}, year = {2017}, url = {https://doi.org/10.1109/TIFS.2016.2604226}, doi = {10.1109/TIFS.2016.2604226}, timestamp = {Tue, 18 Jun 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/ZhangRWWH17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/ZhangV17, author = {Ruochi Zhang and Parv Venkitasubramaniam}, title = {Stealthy Control Signal Attacks in Linear Quadratic Gaussian Control Systems: Detectability Reward Tradeoff}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {12}, number = {7}, pages = {1555--1570}, year = {2017}, url = {https://doi.org/10.1109/TIFS.2017.2668220}, doi = {10.1109/TIFS.2017.2668220}, timestamp = {Thu, 06 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/ZhangV17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/ZhangWYL17, author = {Aiqing Zhang and Lei Wang and Xinrong Ye and Xiaodong Lin}, title = {Light-Weight and Robust Security-Aware D2D-Assist Data Transmission Protocol for Mobile-Health Systems}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {12}, number = {3}, pages = {662--675}, year = {2017}, url = {https://doi.org/10.1109/TIFS.2016.2631950}, doi = {10.1109/TIFS.2016.2631950}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/ZhangWYL17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/ZhangXLLMZ17, author = {Yuan Zhang and Chunxiang Xu and Xiaohui Liang and Hongwei Li and Yi Mu and Xiaojun Zhang}, title = {Efficient Public Verification of Data Integrity for Cloud Storage Systems from Indistinguishability Obfuscation}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {12}, number = {3}, pages = {676--688}, year = {2017}, url = {https://doi.org/10.1109/TIFS.2016.2631951}, doi = {10.1109/TIFS.2016.2631951}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/ZhangXLLMZ17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/ZhangZ17, author = {Tao Zhang and Quanyan Zhu}, title = {Dynamic Differential Privacy for ADMM-Based Distributed Classification Learning}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {12}, number = {1}, pages = {172--187}, year = {2017}, url = {https://doi.org/10.1109/TIFS.2016.2607691}, doi = {10.1109/TIFS.2016.2607691}, timestamp = {Thu, 06 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/ZhangZ17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/Zhao17, author = {Jun Zhao}, title = {On Resilience and Connectivity of Secure Wireless Sensor Networks Under Node Capture Attacks}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {12}, number = {3}, pages = {557--571}, year = {2017}, url = {https://doi.org/10.1109/TIFS.2016.2613841}, doi = {10.1109/TIFS.2016.2613841}, timestamp = {Thu, 06 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/Zhao17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/ZhaoK17, author = {Zijing Zhao and Ajay Kumar}, title = {Accurate Periocular Recognition Under Less Constrained Environment Using Semantics-Assisted Convolutional Neural Network}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {12}, number = {5}, pages = {1017--1030}, year = {2017}, url = {https://doi.org/10.1109/TIFS.2016.2636093}, doi = {10.1109/TIFS.2016.2636093}, timestamp = {Thu, 29 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tifs/ZhaoK17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/ZhengCWZ17, author = {Yifeng Zheng and Helei Cui and Cong Wang and Jiantao Zhou}, title = {Privacy-Preserving Image Denoising From External Cloud Databases}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {12}, number = {6}, pages = {1285--1298}, year = {2017}, url = {https://doi.org/10.1109/TIFS.2017.2656824}, doi = {10.1109/TIFS.2017.2656824}, timestamp = {Thu, 06 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/ZhengCWZ17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/ZhouAR17, author = {Kai Zhou and M. H. Afifi and Jian Ren}, title = {ExpSOS: Secure and Verifiable Outsourcing of Exponentiation Operations for Mobile Cloud Computing}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {12}, number = {11}, pages = {2518--2531}, year = {2017}, url = {https://doi.org/10.1109/TIFS.2017.2710941}, doi = {10.1109/TIFS.2017.2710941}, timestamp = {Mon, 22 Jan 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tifs/ZhouAR17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/ZhouWWHW17, author = {Pan Zhou and Qian Wang and Wei Wang and Yuchong Hu and Dapeng Wu}, title = {Near-Optimal and Practical Jamming-Resistant Energy-Efficient Cognitive Radio Communications}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {12}, number = {11}, pages = {2807--2822}, year = {2017}, url = {https://doi.org/10.1109/TIFS.2017.2721931}, doi = {10.1109/TIFS.2017.2721931}, timestamp = {Thu, 20 Jun 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/ZhouWWHW17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/ZhouWWYS17, author = {Zhili Zhou and Yunlong Wang and Q. M. Jonathan Wu and Ching{-}Nung Yang and Xingming Sun}, title = {Effective and Efficient Global Context Verification for Image Copy Detection}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {12}, number = {1}, pages = {48--63}, year = {2017}, url = {https://doi.org/10.1109/TIFS.2016.2601065}, doi = {10.1109/TIFS.2016.2601065}, timestamp = {Fri, 09 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/ZhouWWYS17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/ZhouZY17, author = {Wenbo Zhou and Weiming Zhang and Nenghai Yu}, title = {A New Rule for Cost Reassignment in Adaptive Steganography}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {12}, number = {11}, pages = {2654--2667}, year = {2017}, url = {https://doi.org/10.1109/TIFS.2017.2718480}, doi = {10.1109/TIFS.2017.2718480}, timestamp = {Thu, 29 Sep 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/ZhouZY17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/ZhuCWHWL17, author = {Zhengyu Zhu and Zheng Chu and Ning Wang and Sai Huang and Zhongyong Wang and Inkyu Lee}, title = {Beamforming and Power Splitting Designs for AN-Aided Secure Multi-User {MIMO} {SWIPT} Systems}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {12}, number = {12}, pages = {2861--2874}, year = {2017}, url = {https://doi.org/10.1109/TIFS.2017.2721908}, doi = {10.1109/TIFS.2017.2721908}, timestamp = {Wed, 23 Mar 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tifs/ZhuCWHWL17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.