


default search action
IEEE Transactions on Information Forensics and Security, Volume 15
Volume 15, 2020
- Matteo Testa
, Tiziano Bianchi
, Enrico Magli
:
Secrecy Analysis of Finite-Precision Compressive Cryptosystems. 1-13 - Sara Mandelli
, Paolo Bestagini
, Luisa Verdoliva
, Stefano Tubaro:
Facing Device Attribution Problem for Stabilized Video Sequences. 14-27 - Xuefei Yin
, Yanming Zhu
, Jiankun Hu
:
Contactless Fingerprint Recognition Based on Global Minutia Topology and Loose Genetic Algorithm. 28-41 - Anjith George
, Zohreh Mostaani
, David Geissenbuhler, Olegs Nikisins, André Anjos
, Sébastien Marcel
:
Biometric Face Presentation Attack Detection With Multi-Channel Convolutional Neural Network. 42-55 - Metodi P. Yankov
, Martin Aastrup Olsen
, Mikkel B. Stegmann, Søren Skovgaard Christensen, Søren Forchhammer
:
Fingerprint Entropy and Identification Capacity Estimation Based on Pixel-Level Generative Modelling. 56-65 - Ali Karimi, Abbas Taherpour
, Danijela Cabric
:
Smart Traffic-Aware Primary User Emulation Attack and Its Impact on Secondary User Throughput Under Rayleigh Flat Fading Channel. 66-80 - Kyung-Ah Shim
:
Comments on "Revocable and Scalable Certificateless Remote Authentication Protocol With Anonymity for Wireless Body Area Networks". 81-82 - Babak Siabi
, Mehdi Berenjkoub:
Comments on "Unconditionally Secure, Universally Composable Privacy Preserving Linear Algebra". 83-84 - Meng Sun
, Wee Peng Tay
:
Decentralized Detection With Robust Information Privacy Protection. 85-99 - Na Wang
, Junsong Fu
, Jian Li
, Bharat K. Bhargava
:
Source-Location Privacy Protection Based on Anonymity Cloud in Wireless Sensor Networks. 100-114 - Fei Ma
, Xiao-Yuan Jing
, Xiao Zhu, Zhenmin Tang
, Zhiping Peng:
True-Color and Grayscale Video Person Re-Identification. 115-129 - Quanzhong Li
, Liang Yang
:
Beamforming for Cooperative Secure Transmission in Cognitive Two-Way Relay Networks. 130-143 - Davide Cozzolino
, Luisa Verdoliva
:
Noiseprint: A CNN-Based Camera Model Fingerprint. 144-159 - Sharad Joshi
, Nitin Khanna
:
Source Printer Classification Using Printer Specific Local Texture Descriptor. 160-171 - Chunlei Peng, Nannan Wang
, Jie Li, Xinbo Gao
:
Face Sketch Synthesis in the Wild via Deep Patch Representation-Based Probabilistic Graphical Model. 172-183 - Fawad Ahmad
, Lee-Ming Cheng
, Asif Khan
:
Lightweight and Privacy-Preserving Template Generation for Palm-Vein-Based Human Recognition. 184-194 - Meng Pang
, Yiu-Ming Cheung
, Binghui Wang
, Jian Lou
:
Synergistic Generic Learning for Face Recognition From a Contaminated Single Sample per Person. 195-209 - Ahmed Arafa
, Wonjae Shin
, Mojtaba Vaezi
, H. Vincent Poor
:
Secure Relaying in Non-Orthogonal Multiple Access: Trusted and Untrusted Scenarios. 210-222 - Jinguang Han
, Liqun Chen
, Steve A. Schneider
, Helen Treharne
, Stephan Wesemeyer
, Nick Wilson:
Anonymous Single Sign-On With Proxy Re-Verification. 223-236 - Chengwei Wu
, Ligang Wu
, Jianxing Liu
, Zhong-Ping Jiang
:
Active Defense-Based Resilient Sliding Mode Control Under Denial-of-Service Attacks. 237-249 - Xinghao Jiang
, Qiang Xu
, Tanfeng Sun
, Bin Li
, Peisong He
:
Detection of HEVC Double Compression With the Same Coding Parameters Based on Analysis of Intra Coding Quality Degradation Process. 250-263 - Qiang Li
, Chao Li, Jingran Lin
:
Constant Modulus Secure Beamforming for Multicast Massive MIMO Wiretap Channels. 264-275 - Wei-Che Wang
, Yair Yona
, Yizhang Wu
, Suhas N. Diggavi, Puneet Gupta
:
SLATE: A Secure Lightweight Entity Authentication Hardware Primitive. 276-285 - Enrico Bacis
, Sabrina De Capitani di Vimercati
, Sara Foresti
, Stefano Paraboschi
, Marco Rosa
, Pierangela Samarati
:
Securing Resources in Decentralized Cloud Storage. 286-298 - Dong Yuan, Qi Li
, Guoliang Li
, Qian Wang
, Kui Ren:
PriRadar: A Privacy-Preserving Framework for Spatial Crowdsourcing. 299-314 - Pu Zhao
, Jia Yu
, Hanlin Zhang, Zhan Qin, Cong Wang
:
How to Securely Outsource Finding the Min-Cut of Undirected Edge-Weighted Graphs. 315-328 - Amir Ameli
, Ali Hooshyar
, Ehab F. El-Saadany
, Amr M. Youssef
:
An Intrusion Detection Method for Line Current Differential Relays. 329-344 - Ramin Soltani
, Dennis Goeckel
, Don Towsley
, Amir Houmansadr
:
Fundamental Limits of Invisible Flow Fingerprinting. 345-360 - Xiaofang Xia
, Yang Xiao
, Wei Liang
:
SAI: A Suspicion Assessment-Based Inspection Algorithm to Detect Malicious Users in Smart Grid. 361-374 - Guoqing Wang
, Changming Sun
, Arcot Sowmya:
Multi-Weighted Co-Occurrence Descriptor Encoding for Vein Recognition. 375-390 - Jingyi Feng
, Hua Chen
, Yang Li, Zhipeng Jiao, Wei Xi:
A Framework for Evaluation and Analysis on Infection Countermeasures Against Fault Attacks. 391-406 - Mang Ye
, Xiangyuan Lan
, Zheng Wang
, Pong C. Yuen
:
Bi-Directional Center-Constrained Top-Ranking for Visible Thermal Person Re-Identification. 407-419 - Jun Zhou
, Zhenfu Cao
, Zhan Qin, Xiaolei Dong, Kui Ren:
LPPA: Lightweight Privacy-Preserving Authentication From Efficient Multi-Key Secure Outsourced Computation for Location-Based Services in VANETs. 420-434 - Nalam Venkata Abhishek
, Anshoo Tandon
, Teng Joon Lim
, Biplab Sikdar
:
A GLRT-Based Mechanism for Detecting Relay Misbehavior in Clustered IoT Networks. 435-446 - Jean de Dieu Mutangana, Ravi Tandon
:
Blind MIMO Cooperative Jamming: Secrecy via ISI Heterogeneity Without CSIT. 447-461 - Juntao Chen
, Corinne Touati
, Quanyan Zhu:
A Dynamic Game Approach to Strategic Design of Secure and Resilient Infrastructure Network. 462-474 - Ahmet Turan Erozan
, Michael Hefenbrock
, Michael Beigl, Jasmin Aghassi-Hagmann
, Mehdi Baradaran Tahoori:
Reverse Engineering of Printed Electronics Circuits: From Imaging to Netlist Extraction. 475-486 - Moisés Díaz
, Miguel A. Ferrer
, Soodamani Ramalingam
, Richard M. Guest
:
Investigating the Common Authorship of Signatures by Off-Line Automatic Signature Verification Without the Use of Reference Signatures. 487-499 - Hussain M. J. Almohri
, Layne T. Watson, David Evans:
Predictability of IP Address Allocations for Cloud Computing Platforms. 500-511 - Kanad Basu
, Prashanth Krishnamurthy
, Farshad Khorrami
, Ramesh Karri
:
A Theoretical Study of Hardware Performance Counters-Based Malware Detection. 512-525 - Hyun Kwon
, Yongchul Kim, Hyunsoo Yoon
, Daeseon Choi
:
Selective Audio Adversarial Example in Evasion Attack on Speech Recognition System. 526-538 - Dan Lin
, Douglas Steiert, Joshua Morris
, Anna Cinzia Squicciarini, Jianping Fan
:
REMIND: Risk Estimation Mechanism for Images in Network Distribution. 539-552 - Netanel Raviv
, David A. Karpuk
:
Private Polynomial Computation From Lagrange Encoding. 553-563 - Hoon Wei Lim, Geong Sen Poh
, Jia Xu
, Varsha Chittawar
:
PrivateLink: Privacy-Preserving Integration and Sharing of Datasets. 564-577 - Haonan Chen
, Guosheng Hu
, Zhen Lei
, Yaowu Chen
, Neil Martin Robertson, Stan Z. Li:
Attention-Based Two-Stream Convolutional Networks for Face Spoofing Detection. 578-593 - Borzoo Rassouli
, Deniz Gündüz
:
Optimal Utility-Privacy Trade-Off With Total Variation Distance as a Privacy Measure. 594-603 - Xin Yuan
, Zhiyong Feng
, Wei Ni
, Ren Ping Liu
, J. Andrew Zhang
, Wenjun Xu
:
Secrecy Performance of Terrestrial Radio Links Under Collaborative Aerial Eavesdropping. 604-619 - Yue Zheng
, Yuan Cao
, Chip-Hong Chang
:
A PUF-Based Data-Device Hash for Tampered Image Detection and Source Camera Identification. 620-634 - Guoqing Wang
, Changming Sun
, Arcot Sowmya:
Learning a Compact Vein Discrimination Model With GANerated Samples. 635-650 - Bo Song
, Xu Wang
, Wei Ni
, Yurong Song
, Ren Ping Liu
, Guoping Jiang
, Y. Jay Guo
:
Reliability Analysis of Large-Scale Adaptive Weighted Networks. 651-665 - Prashanth Krishnamurthy
, Ramesh Karri
, Farshad Khorrami
:
Anomaly Detection in Real-Time Multi-Threaded Processes Using Hardware Performance Counters. 666-680 - Hailong Zhang
:
On the Exact Relationship Between the Success Rate of Template Attack and Different Parameters. 681-694 - Miran Kim
, Junghye Lee
, Lucila Ohno-Machado, Xiaoqian Jiang:
Secure and Differentially Private Logistic Regression for Horizontally Distributed Data. 695-710 - Jian Kang
, Douglas Steiert, Dan Lin
, Yanjie Fu:
MoveWithMe: Location Privacy Preservation for Smartphone Users. 711-724 - Weiqi Dai
, Chunkai Dai
, Kim-Kwang Raymond Choo
, Changze Cui
, Deqing Zou
, Hai Jin
:
SDTE: A Secure Blockchain-Based Data Trading Ecosystem. 725-737 - Yuan Liang
, Jian Ren
, Tongtong Li
:
Secure OFDM System Design and Capacity Analysis Under Disguised Jamming. 738-752 - Yang Zi
, Haichang Gao
, Zhouhang Cheng, Yi Liu
:
An End-to-End Attack on Text CAPTCHAs. 753-766 - Yuqiao Zhang, Ujjwal Guin
:
End-to-End Traceability of ICs in Component Supply Chain for Fighting Against Recycling. 767-775 - Baki Berkay Yilmaz
, Milos Prvulovic
, Alenka G. Zajic
:
Electromagnetic Side Channel Information Leakage Created by Execution of Series of Instructions in a Computer Processor. 776-789 - Razane Tajeddine
, Antonia Wachter-Zeh
, Camilla Hollanti
:
Private Information Retrieval Over Random Linear Networks. 790-799 - Mehmet Necip Kurt
, Yasin Yilmaz
, Xiaodong Wang
:
Secure Distributed Dynamic State Estimation in Wide-Area Smart Grids. 800-815 - Dongxia Wang
, Tim Muller, Jie Zhang, Yang Liu
:
Information Theoretical Analysis of Unfair Rating Attacks Under Subjectivity. 816-828 - Phuong Le Cao
, Tobias J. Oechtering
:
Optimal Transmit Strategies for Gaussian MISO Wiretap Channels. 829-838 - Jianhua Yang
, Danyang Ruan
, Jiwu Huang
, Xiangui Kang
, Yun-Qing Shi:
An Embedding Cost Learning Framework Using GAN. 839-851 - Meng Sun
, Wee Peng Tay
:
On the Relationship Between Inference and Data Privacy in Decentralized IoT Networks. 852-866 - Mehdi Sharifzadeh
, Mohammed Aloraini
, Dan Schonfeld
:
Adaptive Batch Size Image Merging Steganography and Quantized Gaussian Image Steganography. 867-879 - Kai Cao
, Dinh-Luan Nguyen, Cori Tymoszek
, Anil K. Jain
:
End-to-End Latent Fingerprint Search. 880-894 - Yang Song
, Chong Xiao Wang, Wee Peng Tay
:
Compressive Privacy for a Linear Dynamical System. 895-910 - Guowen Xu
, Hongwei Li
, Sen Liu, Kan Yang
, Xiaodong Lin
:
VerifyNet: Secure and Verifiable Federated Learning. 911-926 - Chun-I Fan
, Jheng-Jia Huang
, Min-Zhe Zhong, Ruei-Hau Hsu
, Wen-Tsuen Chen, Jemin Lee
:
ReHand: Secure Region-Based Fast Handover With User Anonymity for Small Cell Networks in Mobile Communications. 927-942 - Paolo Addesso
, Michele Cirillo
, Mario Di Mauro
, Vincenzo Matta
:
ADVoIP: Adversarial Detection of Encrypted and Concealed VoIP. 943-958 - Sebastian Baur
, Holger Boche, Rafael F. Schaefer
, H. Vincent Poor
:
Secure Storage Capacity Under Rate Constraints - Continuity and Super Activation. 959-970 - Donghe Li, Qingyu Yang
, Wei Yu
, Dou An
, Yang Zhang, Wei Zhao
:
Towards Differential Privacy-Based Online Double Auction for Smart Grid. 971-986 - Xiao Chen
, Chaoran Li
, Derui Wang
, Sheng Wen, Jun Zhang
, Surya Nepal
, Yang Xiang
, Kui Ren:
Android HIV: A Study of Repackaging Malware for Evading Machine-Learning Detection. 987-1001 - Zonghao Huang
, Rui Hu, Yuanxiong Guo
, Eric Chan-Tin
, Yanmin Gong
:
DP-ADMM: ADMM-Based Distributed Learning With Differential Privacy. 1002-1012 - Holger Boche, Rafael F. Schaefer
, H. Vincent Poor
:
Secure Communication and Identification Systems - Effective Performance Evaluation on Turing Machines. 1013-1025 - Mehrdad Tahmasbi
, Matthieu R. Bloch
:
Covert Secret Key Generation With an Active Warden. 1026-1039 - Tao Qin
, Zhaoli Liu
, Pinghui Wang
, Shancang Li
, Xiaohong Guan, Lixin Gao:
Symmetry Degree Measurement and its Applications to Anomaly Detection. 1040-1055 - Changsheng Chen
, Mulin Li, Anselmo Ferreira
, Jiwu Huang
, Rizhao Cai:
A Copy-Proof Scheme Based on the Spectral and Spatial Barcoding Channel Models. 1056-1071 - Jakub Breier
, Dirmanto Jap
, Xiaolu Hou
, Shivam Bhasin
:
On Side Channel Vulnerabilities of Bit Permutations in Cryptographic Algorithms. 1072-1085 - Penny Chong, Yuval Elovici, Alexander Binder
:
User Authentication Based on Mouse Dynamics Using Deep Neural Networks: A Comprehensive Study. 1086-1101 - Bryse Flowers, R. Michael Buehrer, William C. Headley:
Evaluating Adversarial Evasion Attacks in the Context of Wireless Communications. 1102-1113 - Shangyu Xie, Yuan Hong, Peng-Jun Wan:
Pairing: Privately Balancing Multiparty Real-Time Supply and Demand on the Power Grid. 1114-1127 - Guillermo Suarez-Tangil
, Matthew Edwards
, Claudia Peersman, Gianluca Stringhini, Awais Rashid
, Monica T. Whitty
:
Automatically Dismantling Online Dating Fraud. 1128-1137 - Ru Zhang, Feng Zhu, Jianyi Liu, Gongshen Liu:
Depth-Wise Separable Convolutions and Multi-Level Pooling for an Efficient Spatial CNN-Based Steganalysis. 1138-1150 - Shangwei Guo
, Tao Xiang
, Xiaoguo Li, Ying Yang:
PEID: A Perceptually Encrypted Image Database for Visual Security Evaluation. 1151-1163 - Osama Al-Kadi
, Nour Moustafa
, Benjamin P. Turnbull
, Kim-Kwang Raymond Choo
:
An Ontological Graph Identification Method for Improving Localization of IP Prefix Hijacking in Network Systems. 1164-1174 - Wenxiong Kang, Hongda Liu, Wei Luo, Feiqi Deng
:
Study of a Full-View 3D Finger Vein Verification Technique. 1175-1189 - Mordechai Guri, Boris Zadov, Yuval Elovici:
ODINI: Escaping Sensitive Data From Faraday-Caged, Air-Gapped Computers via Magnetic Fields. 1190-1203 - Aske R. Lejbølle, Kamal Nasrollahi, Benjamin Krogh, Thomas B. Moeslund
:
Person Re-Identification Using Spatial and Layer-Wise Attention. 1216-1231 - Chonlatid Deerada, Krisada Phromsuthirak, Arucha Rungchokanun, Vutipong Areekul:
Progressive Focusing Algorithm for Reliable Pose Estimation of Latent Fingerprints. 1232-1247 - Jinbao Zhu
, Qifa Yan, Chao Qi, Xiaohu Tang:
A New Capacity-Achieving Private Information Retrieval Scheme With (Almost) Optimal File Length for Coded Servers. 1248-1260 - Ruben Tolosana
, Marta Gomez-Barrero, Christoph Busch
, Javier Ortega-Garcia
:
Biometric Presentation Attack Detection: Beyond the Visible Spectrum. 1261-1275 - Thanikasalam Kokul
, Clinton Fookes, Sridha Sridharan
, Amirthalingam Ramanan
, Amalka Pinidiyaarachchi:
Target-Specific Siamese Attention Network for Real-Time Object Tracking. 1276-1289 - Chuan-Xian Ren, Bo-Hua Liang, Pengfei Ge
, Yiming Zhai, Zhen Lei:
Domain Adaptive Person Re-Identification via Camera Style Generation and Label Propagation. 1290-1302 - Falko Matern, Christian Riess, Marc Stamminger:
Gradient-Based Illumination Description for Image Forgery Detection. 1303-1317 - Shaohua Li, Kaiping Xue
, David S. L. Wei, Hao Yue
, Nenghai Yu
, Peilin Hong
:
SecGrid: A Secure and Efficient SGX-Enabled Smart Grid System With Rich Functionalities. 1318-1330 - Owen Mayer
, Matthew C. Stamm
:
Forensic Similarity for Digital Images. 1331-1346 - Ji He
, Jia Liu
, Yulong Shen
, Xiaohong Jiang
, Norio Shiratori:
Link Selection for Security-QoS Tradeoffs in Buffer-Aided Relaying Networks. 1347-1362 - Ning Wang
, Long Jiao, Amir Alipour-Fanid, Monireh Dabaghchian
, Kai Zeng
:
Pilot Contamination Attack Detection for NOMA in 5G mm-Wave Massive MIMO Networks. 1363-1378 - Michele Boreale
, Fabio Corradi
, Cecilia Viscardi
:
Relative Privacy Threats and Learning From Anonymized Data. 1379-1393 - Zhihang Li
, Xu Tang, Xiang Wu
, Jingtuo Liu
, Ran He
:
Progressively Refined Face Detection Through Semantics-Enriched Representation Learning. 1394-1406 - Fan Zhang
, Xiaofei Dong
, Bolin Yang
, Yajin Zhou
, Kui Ren
:
A Systematic Evaluation of Wavelet-Based Attack Framework on Random Delay Countermeasures. 1407-1422 - Kisong Lee
, Jin-Taek Lim
, Hyun-Ho Choi
:
Impact of Outdated CSI on the Secrecy Performance of Wireless-Powered Untrusted Relay Networks. 1423-1433 - Jan Butora
, Jessica J. Fridrich:
Reverse JPEG Compatibility Attack. 1444-1454 - David Formby
, Raheem Beyah
:
Temporal Execution Behavior for Host Anomaly Detection in Programmable Logic Controllers. 1455-1469 - Neetesh Saxena
, Mauro Conti
, Kim-Kwang Raymond Choo
, Narendra S. Chaudhari:
BAS-VAS: A Novel Secure Protocol for Value Added Service Delivery to Mobile Devices. 1470-1485 - Lingchen Zhao, Qian Wang
, Qin Zou
, Yan Zhang, Yanjiao Chen
:
Privacy-Preserving Collaborative Deep Learning With Unreliable Participants. 1486-1500 - Xiaofeng Liu
, Zhenhua Guo
, Jane You
, B. V. K. Vijaya Kumar
:
Dependency-Aware Attention Control for Image Set-Based Face Recognition. 1501-1512 - Ahmed A. Zewail
, Aylin Yener
:
Device-to-Device Secure Coded Caching. 1513-1524 - Guo-lin Shao
, Xingshu Chen
, Xuemei Zeng
, Lina Wang:
Deep Learning Hierarchical Representation From Heterogeneous Flow-Level Communication Data. 1525-1540 - Alexander Bunin
, Ziv Goldfeld, Haim H. Permuter, Shlomo Shamai Shitz
, Paul Cuff, Pablo Piantanida:
Key and Message Semantic-Security Over State-Dependent Channels. 1541-1556 - Enes Altinisik, Kasim Tasdemir
, Husrev Taha Sencar
:
Mitigation of H.264 and H.265 Video Compression for Reliable PRNU Estimation. 1557-1571 - Libing Wu
, Jingxiao Yang, Man Zhou
, Yanjiao Chen
, Qian Wang
:
LVID: A Multimodal Biometrics Authentication System on Smartphones. 1572-1585 - Xu An Wang
, Kim-Kwang Raymond Choo
, Jian Weng
, Jianfeng Ma:
Comments on "Publicly Verifiable Computation of Polynomials Over Outsourced Data With Multiple Sources". 1586-1588 - Hongliang Liang
, Mingyu Li, Yixiu Chen, Lin Jiang, Zhuosi Xie, Tianqi Yang:
Establishing Trusted I/O Paths for SGX Client Systems With Aurora. 1589-1600 - Wojciech Michal Matkowski
, Tingting Chai, Adams Wai-Kin Kong
:
Palmprint Recognition in Uncontrolled and Uncooperative Environment. 1601-1615 - Anurag Chowdhury
, Arun Ross:
Fusing MFCC and LPC Features Using 1D Triplet CNN for Speaker Recognition in Severely Degraded Audio Signals. 1616-1629 - Ankit Gangwal
, Mauro Conti
:
Cryptomining Cannot Change Its Spots: Detecting Covert Cryptomining Using Magnetic Side-Channel. 1630-1639 - Qiangchang Wang
, Guodong Guo
:
LS-CNN: Characterizing Local Patches at Multiple Scales for Face Recognition. 1640-1653 - Jie Cui
, Xiaoyu Zhang, Hong Zhong
, Jing Zhang, Lu Liu
:
Extensible Conditional Privacy Protection Authentication Scheme for Secure Vehicular Networks in a Multi-Cloud Environment. 1654-1667 - Heedo Kang
, Vinod Yegneswaran, Shalini Ghosh, Phillip A. Porras, Seungwon Shin
:
Automated Permission Model Generation for Securing SDN Control-Plane. 1668-1682 - Yushu Zhang
, Xiangli Xiao
, Lu-Xing Yang
, Yong Xiang
, Sheng Zhong:
Secure and Efficient Outsourcing of PCA-Based Face Recognition. 1683-1695 - Shuangyi Zhu
, Yuan Ma
, Xusheng Li, Jing Yang
, Jingqiang Lin, Jiwu Jing:
On the Analysis and Improvement of Min-Entropy Estimation on Time-Varying Data. 1696-1708 - Jean-Claude Bajard
, Paulo Martins
, Leonel Sousa
, Vincent Zucca
:
Improving the Efficiency of SVM Classification With FHE. 1709-1722 - Xueru Zhang
, Mohammad Mahdi Khalili
, Mingyan Liu
:
Recycled ADMM: Improving the Privacy and Accuracy of Distributed Algorithms. 1723-1734 - Luiz G. Hafemann
, Robert Sabourin
, Luiz S. Oliveira:
Meta-Learning for Fast Classifier Adaptation to New Users of Signature Verification Systems. 1735-1745 - Nguyen Binh Truong
, Kai Sun, Gyu Myoung Lee
, Yike Guo:
GDPR-Compliant Personal Data Management: A Blockchain-Based Solution. 1746-1761 - Liming Zhai
, Lina Wang
, Yanzhen Ren
:
Universal Detection of Video Steganography in Multiple Domains Based on the Consistency of Motion Vectors. 1762-1777 - Qin Hu
, Shengling Wang
, Xiuzhen Cheng
, Liran Ma
, Rongfang Bie
:
Solving the Crowdsourcing Dilemma Using the Zero-Determinant Strategies. 1778-1789 - Amit Praseed
, P. Santhi Thilagam
:
Multiplexed Asymmetric Attacks: Next-Generation DDoS on HTTP/2 Servers. 1790-1800 - Parinaz Naghizadeh
, Mingyan Liu
:
Using Private and Public Assessments in Security Information Sharing Agreements. 1801-1814 - David Vázquez-Padín
, Marco Fontani
, Dasara Shullani
, Fernando Pérez-González, Alessandro Piva
, Mauro Barni
:
Video Integrity Verification and GOP Size Estimation Via Generalized Variation of Prediction Footprint. 1815-1830 - Sarankumar Balakrishnan
, Shreya Gupta, Arupjyoti Bhuyan
, Pu Wang
, Dimitrios Koutsonikolas
, Zhi Sun
:
Physical Layer Identification Based on Spatial-Temporal Beam Features for Millimeter-Wave Wireless Networks. 1831-1845 - Erkam Uzun
, Hüsrev T. Sencar
:
JpgScraper: An Advanced Carver for JPEG Files. 1846-1857 - Jin Sung Kang
, Yuri A. Lawryshyn, Dimitrios Hatzinakos
:
Neural Network Architecture and Transient Evoked Otoacoustic Emission (TEOAE) Biometrics for Identification and Verification. 1858-1867 - Guang Hua
, Haijian Zhang
:
ENF Signal Enhancement in Audio Recordings. 1868-1878 - Mordechai Guri
, Boris Zadov, Dima Bykhovsky
, Yuval Elovici
:
PowerHammer: Exfiltrating Data From Air-Gapped Computers Through Power Lines. 1879-1890 - Baki Berkay Yilmaz
, Nader Sehatbakhsh
, Alenka G. Zajic
, Milos Prvulovic
:
Communication Model and Capacity Limits of Covert Channels Created by Software Activities. 1891-1904 - Sayandeep Saha
, Dirmanto Jap
, Debapriya Basu Roy
, Avik Chakraborty, Shivam Bhasin
, Debdeep Mukhopadhyay
:
A Framework to Counter Statistical Ineffective Fault Analysis of Block Ciphers Using Domain Transformation and Error Correction. 1905-1919 - Cristian Hristea
, Ferucio Laurentiu Tiplea
:
Privacy of Stateful RFID Systems With Constant Tag Identifiers. 1920-1934 - Hridoy Sankar Dutta
, Tanmoy Chakraborty
:
Blackmarket-Driven Collusion Among Retweeters-Analysis, Detection, and Characterization. 1935-1944 - Gurjit Singh Walia
, Gaurav Jain
, Nipun Bansal, Kuldeep Singh
:
Adaptive Weighted Graph Approach to Generate Multimodal Cancelable Biometric Templates. 1945-1958 - Kwang-Yul Kim
, Yoan Shin
:
Analysis on Cross-Correlation Coefficient for Survivability of Chirp Spread Spectrum Systems. 1959-1967 - Anshul Arora
, Sateesh Kumar Peddoju
, Mauro Conti
:
PermPair: Android Malware Detection Using Permission Pairs. 1968-1982 - Mahmoud Alageli
, Aïssa Ikhlef, Fahad Alsifiany
, Mohammed A. M. Abdullah
, Gaojie Chen
, Jonathon A. Chambers
:
Optimal Downlink Transmission for Cell-Free SWIPT Massive MIMO Systems With Active Eavesdropping. 1983-1998 - Wonwoo Cho
, Nam Yul Yu
:
Secure and Efficient Compressed Sensing-Based Encryption With Sparse Matrices. 1999-2011 - Borzoo Rassouli
, Fernando E. Rosas
, Deniz Gündüz
:
Data Disclosure Under Perfect Sample Privacy. 2012-2025 - Rui Zhang
, Quanyan Zhu
:
FlipIn: A Game-Theoretic Cyber Insurance Framework for Incentive-Compatible Cyber Risk Management of Internet of Things. 2026-2041 - Wenjie Xiong
, André Schaller
, Stefan Katzenbeisser, Jakub Szefer
:
Software Protection Using Dynamic PUFs. 2053-2068 - Tatsuya Yasui
, Minoru Kuribayashi
, Nobuo Funabiki, Isao Echizen:
Near-Optimal Detection for Binary Tardos Code by Estimating Collusion Strategy. 2069-2080 - Yaofei Wang
, Weiming Zhang
, Weixiang Li
, Xinzhi Yu, Nenghai Yu
:
Non-Additive Cost Functions for Color Image Steganography Based on Inter-Channel Correlations and Differences. 2081-2095 - Lingling Xu
, Wanhua Li
, Fangguo Zhang
, Rong Cheng, Shaohua Tang:
Authorized Keyword Searches on Public Key Encrypted Data With Time Controlled Keyword Privacy. 2096-2109 - Arpan Jati
, Naina Gupta
, Anupam Chattopadhyay
, Somitra Kumar Sanadhya
, Donghoon Chang:
Threshold Implementations of GIFT: A Trade-Off Analysis. 2110-2120 - Junhui He
, Junxi Chen, Shaohua Tang
:
Reversible Data Hiding in JPEG Images Based on Negative Influence Models. 2121-2133 - Jun-Liu Zhong, Chi-Man Pun
:
An End-to-End Dense-InceptionNet for Image Copy-Move Forgery Detection. 2134-2146 - Mohammad Esmaeilpour
, Patrick Cardinal, Alessandro Lameiras Koerich
:
A Robust Approach for Securing Audio Classification Against Adversarial Attacks. 2147-2159 - Jichen Yang
, Rohan Kumar Das
, Haizhou Li
:
Significance of Subband Features for Synthetic Speech Detection. 2160-2170 - Zhongwu Xiang
, Weiwei Yang
, Gaofeng Pan
, Yueming Cai
, Yi Song
, Yulong Zou
:
Secure Transmission in HARQ-Assisted Non-Orthogonal Multiple Access Networks. 2171-2182 - Kostantinos Papadamou
, Steven Gevers, Christos Xenakis
, Michael Sirivianos, Savvas Zannettou, Bogdan Chifor, Sorin Teican, George Gugulea
, Alberto Caponi, Annamaria Recupero
, Claudio Pisa, Giuseppe Bianchi:
Killing the Password and Preserving Privacy With Device-Centric and Attribute-Based Authentication. 2183-2193 - Guilei Hu, Yang Xiao
, Zhiguo Cao
, Lubin Meng, Zhiwen Fang
, Joey Tianyi Zhou
, Junsong Yuan
:
Towards Real-Time Eyeblink Detection in the Wild: Dataset, Theory and Practices. 2194-2208 - Haina Song
, Tao Luo
, Xun Wang, Jianfeng Li:
Multiple Sensitive Values-Oriented Personalized Privacy Preservation Based on Randomized Response. 2209-2224 - Xiaochun Yun, Ji Huang
, Yipeng Wang
, Tianning Zang, Yuan Zhou, Yongzheng Zhang:
Khaos: An Adversarial Neural Network DGA With High Anti-Detection Ability. 2225-2240 - Lingshuang Du, Haifeng Hu
, Yongbo Wu:
Cycle Age-Adversarial Model Based on Identity Preserving Network and Transfer Learning for Cross-Age Face Recognition. 2241-2252 - Yuankun Huang
, Bin Li
, Mauro Barni
, Jiwu Huang
:
Identification of VoIP Speech With Multiple Domain Deep Features. 2253-2267 - Diana Pamela Moya Osorio
, Hirley Alves
, Edgar Eduardo Benitez Olivo
:
On the Secrecy Performance and Power Allocation in Relaying Networks With Untrusted Relay in the Partial Secrecy Regime. 2268-2281 - Junqi Wu
, Bolin Chen, Weiqi Luo
, Yanmei Fang:
Audio Steganography Based on Iterative Adversarial Attacks Against Convolutional Neural Networks. 2282-2294 - Masahito Hayashi
, Ángeles Vázquez-Castro
:
Physical Layer Security Protocol for Poisson Channels for Passive Man-in-the-Middle Attack. 2295-2305 - Tong Zhang
, Xiaolong Li
, Wenfa Qi, Zongming Guo
:
Location-Based PVO and Adaptive Pairwise Modification for Efficient Reversible Data Hiding. 2306-2319 - Zhenyong Zhang
, Ruilong Deng
, David K. Y. Yau, Peng Cheng
, Jiming Chen
:
Analysis of Moving Target Defense Against False Data Injection Attacks on Power Grid. 2320-2335 - Renyong Wu
, Chao Yuan, Ning Zhang
, Kim-Kwang Raymond Choo
:
A Two-Dimensional Vectorized Secure Transmission Scheme for Wireless Communications. 2336-2345 - Amir Alipour-Fanid
, Monireh Dabaghchian
, Ning Wang
, Pu Wang
, Liang Zhao
, Kai Zeng
:
Machine Learning-Based Delay-Aware UAV Detection and Operation Mode Identification Over Encrypted Wi-Fi Traffic. 2346-2360 - Jiucheng Xie
, Chi-Man Pun
:
Deep and Ordinal Ensemble Learning for Human Age Estimation From Facial Images. 2361-2374 - Navaneet K. L.
, Ravi Kiran Sarvadevabhatla
, Shashank Shekhar, R. Venkatesh Babu
, Anirban Chakraborty
:
Operator-in-the-Loop Deep Sequential Multi-Camera Feature Fusion for Person Re-Identification. 2375-2385 - Jong-Hyuk Im
, Seong-Yun Jeon, Mun-Kyu Lee
:
Practical Privacy-Preserving Face Authentication for Smartphones Secure Against Malicious Clients. 2386-2401 - Shun-Wen Hsiao
, Yeali S. Sun, Meng Chang Chen
:
Hardware-Assisted MMU Redirection for In-Guest Monitoring and API Profiling. 2402-2416 - Min Xia
, Xu Zhang
, Wan'an Liu, Liguo Weng, Yiqing Xu
:
Multi-Stage Feature Constraints Learning for Age Estimation. 2417-2428 - Chao Lin
, Debiao He
, Xinyi Huang
, Muhammad Khurram Khan
, Kim-Kwang Raymond Choo
:
DCAP: A Secure and Efficient Decentralized Conditional Anonymous Payment System Based on Blockchain. 2440-2452 - Yang Liu
, Ting Liu
, Hong Sun, Kehuan Zhang, Pengfei Liu:
Hidden Electricity Theft by Exploiting Multiple-Pricing Scheme in Smart Grids. 2453-2468 - Meng Yang
, Wei Wen, Xing Wang
, Linlin Shen
, Guangwei Gao
:
Adaptive Convolution Local and Global Learning for Class-Level Joint Representation of Facial Recognition With a Single Sample Per Data Subject. 2469-2484 - S. V. Sandeep Avvaru
, Ziqing Zeng, Keshab K. Parhi
:
Homogeneous and Heterogeneous Feed-Forward XOR Physical Unclonable Functions. 2485-2498 - Bo-Wei Tseng
, Pei-Yuan Wu
:
Compressive Privacy Generative Adversarial Network. 2499-2513 - Deepak Sirone
, Pramod Subramanyan
:
Functional Analysis Attacks on Logic Locking. 2514-2527 - Zhongwu Xiang
, Weiwei Yang
, Yueming Cai
, Zhiguo Ding
, Yi Song
:
Secure Transmission Design in HARQ Assisted Cognitive NOMA Networks. 2528-2541 - Gaëtan Cassiers
, François-Xavier Standaert
:
Trivially and Efficiently Composing Masked Gadgets With Probe Isolating Non-Interference. 2542-2555 - Sahar Haddad
, Gouenou Coatrieux, Alexandre Moreau-Gaudry, Michel Cozic:
Joint Watermarking-Encryption-JPEG-LS for Medical Image Reliability Control in Encrypted and Compressed Domains. 2556-2569 - Xiang Liu
, Teng Joon Lim
, Jie Huang:
Optimal Byzantine Attacker Identification Based on Game Theory in Network Coding Enabled Wireless Ad Hoc Networks. 2570-2583 - Wei Guo
, Su-Juan Qin
, Fei Gao
, Hua Zhang
, Wenmin Li
, Zhengping Jin
, Qiaoyan Wen
:
Comments on "Provable Multicopy Dynamic Data Possession in Cloud Computing Systems". 2584-2586 - Sani M. Abdullahi
, Hongxia Wang, Tao Li
:
Fractal Coding-Based Robust and Alignment-Free Fingerprint Image Hashing. 2587-2601 - Christian Miranda, Georges Kaddoum
, Elias Bou-Harb
, Sahil Garg
, Kuljeet Kaur
:
A Collaborative Security Framework for Software-Defined Wireless Sensor Networks. 2602-2615 - Ruben Tolosana
, Rubén Vera-Rodríguez
, Julian Fiérrez
, Javier Ortega-Garcia
:
BioTouchPass2: Touchscreen Password Biometrics Using Time-Aligned Recurrent Neural Networks. 2616-2628 - Lin Zhou
:
Multiple Private Key Generation for Continuous Memoryless Sources With a Helper. 2629-2640 - Ridvan Salih Kuzu
, Emanuela Piciucco
, Emanuele Maiorana
, Patrizio Campisi
:
On-the-Fly Finger-Vein-Based Biometric Recognition Using Deep Neural Networks. 2641-2654 - Mang Ye
, Pong C. Yuen
:
PurifyNet: A Robust Person Re-Identification Model With Noisy Labels. 2655-2666 - Hridoy Sankar Dutta
, Vishal Raj Dutta, Aditya Adhikary
, Tanmoy Chakraborty
:
HawkesEye: Detecting Fake Retweeters Using Hawkes Process and Topic Modeling. 2667-2678 - Yunlian Sun
, Jinhui Tang
, Xiangbo Shu
, Zhenan Sun
, Massimo Tistarelli
:
Facial Age Synthesis With Label Distribution-Guided Generative Adversarial Network. 2679-2691 - Nasser Aldaghri
, Hessam Mahdavifar
:
Physical Layer Secret Key Generation in Static Environments. 2692-2705 - Yuanquan Hong
, Xiaojun Jing
, Hui Gao
, Yuan He
:
Fixed Region Beamforming Using Frequency Diverse Subarray for Secure mmWave Wireless Communications. 2706-2721 - Malihe Aliasgari
, Osvaldo Simeone
, Jörg Kliewer
:
Private and Secure Distributed Matrix Multiplication With Flexible Communication Load. 2722-2734 - Leye Wang
, Daqing Zhang, Dingqi Yang
, Brian Y. Lim, Xiao Han
, Xiaojuan Ma
:
Sparse Mobile Crowdsensing With Differential and Distortion Location Privacy. 2735-2749 - Daniele Cono D'Elia
, Emilio Coppa
, Federico Palmaro
, Lorenzo Cavallaro
:
On the Dissection of Evasive Malware. 2750-2765 - Zhihai Yang
, Qindong Sun, Yaling Zhang, Lei Zhu, Wenjiang Ji:
Inference of Suspicious Co-Visitation and Co-Rating Behaviors and Abnormality Forensics for Recommender Systems. 2766-2781 - Mohannad Alhanahnah
, Qiben Yan
, Hamid Bagheri, Hao Zhou, Yutaka Tsutano, Witawas Srisa-an
, Xiapu Luo
:
DINA: Detecting Hidden Android Inter-App Communication in Dynamic Loaded Code. 2782-2797 - Sehee Lim
, Byungkyu Song, Seong-Ook Jung
:
Highly Independent MTJ-Based PUF System Using Diode-Connected Transistor and Two-Step Postprocessing for Improved Response Stability. 2798-2807 - Atul Prasad Deb Nath
, Srivalli Boddupalli, Swarup Bhunia
, Sandip Ray:
Resilient System-on-Chip Designs With NoC Fabrics. 2808-2823 - Yue Zheng
, Xiaojin Zhao
, Takashi Sato
, Yuan Cao
, Chip-Hong Chang
:
Ed-PUF: Event-Driven Physical Unclonable Function for Camera Authentication in Reactive Monitoring System. 2824-2839 - Wanli Wen
, Chenxi Liu
, Yaru Fu
, Tony Q. S. Quek
, Fu-Chun Zheng
, Shi Jin
:
Enhancing Physical Layer Security of Random Caching in Large-Scale Multi-Antenna Heterogeneous Wireless Networks. 2840-2855 - Mehdi Letafati
, Ali Kuhestani
, Hamid Behroozi
:
Three-Hop Untrusted Relay Networks With Hardware Imperfections and Channel Estimation Errors for Internet of Things. 2856-2868 - Loubna Ghammam, Koray Karabina
, Patrick Lacharme, Kevin Atighehchi
:
A Cryptanalysis of Two Cancelable Biometric Schemes Based on Index-of-Max Hashing. 2869-2880 - Xiong Li
, Shanpeng Liu
, Rongxing Lu
:
Comments on "A Public Auditing Protocol With Novel Dynamic Structure for Cloud Data". 2881-2883 - Yuan Liang
, Tongtong Li
:
On the Discreteness of the Worst Jamming Distribution for SP-OFDM. 2884-2897 - Jialiang Gong
, Xiaodong Xu
, Yingke Lei:
Unsupervised Specific Emitter Identification Method Using Radio-Frequency Fingerprint Embedded InfoGAN. 2898-2913 - Lin Liu
, Rongmao Chen
, Ximeng Liu
, Jinshu Su, Linbo Qiao
:
Towards Practical Privacy-Preserving Decision Tree Training and Evaluation in the Cloud. 2914-2929 - Kunrui Cao
, Buhong Wang
, Haiyang Ding
, Tengyao Li
, Jiwei Tian
, Fengkui Gong
:
Secure Transmission Designs for NOMA Systems Against Internal and External Eavesdropping. 2930-2943 - Caiyong Wang
, Jawad Muhammad, Yunlong Wang, Zhaofeng He
, Zhenan Sun
:
Towards Complete and Accurate Iris Segmentation Using Deep Multi-Task Attention Network for Non-Cooperative Iris Recognition. 2944-2959 - Yunlian Sun
, Jinhui Tang
, Zhenan Sun
, Massimo Tistarelli
:
Facial Age and Expression Synthesis Using Ordinal Ranking Adversarial Networks. 2960-2972 - Wanli Xue
, Dinusha Vatsalan
, Wen Hu
, Aruna Seneviratne
:
Sequence Data Matching and Beyond: New Privacy-Preserving Primitives Based on Bloom Filters. 2973-2987 - Eduardo Lopes Cominetti
, Marcos A. Simplício Jr.
:
Fast Additive Partially Homomorphic Encryption From the Approximate Common Divisor Problem. 2988-2998 - Tao Guo
, Ruida Zhou, Chao Tian
:
On the Information Leakage in Private Information Retrieval Systems. 2999-3012 - Sheng He
, Lambert Schomaker
:
FragNet: Writer Identification Using Deep Fragment Networks. 3013-3022 - Xiao Yang
, Wang Fat Lau, Qingqing Ye
, Man Ho Au
, Joseph K. Liu
, Jacob Cheng:
Practical Escrow Protocol for Bitcoin. 3023-3034 - David Froelicher
, Juan Ramón Troncoso-Pastoriza, Joao Sa Sousa
, Jean-Pierre Hubaux:
Drynx: Decentralized, Secure, Verifiable System for Statistical Queries and Machine Learning on Distributed Datasets. 3035-3050 - Saed Alrabaee
, Mourad Debbabi
, Lingyu Wang
:
CPA: Accurate Cross-Platform Binary Authorship Characterization Using LDA. 3051-3066 - Xudong Liu
, Sang Wu Kim
:
Harnessing Node Multiplicity for Detecting and Mitigating False Data in Wireless Relay Networks. 3067-3078 - Chenyang Tu
, Zeyi Liu, Neng Gao, Cunqing Ma, Jingquan Ge
, Lingchen Zhang:
MACM: How to Reduce the Multi-Round SCA to the Single-Round Attack on the Feistel-SP Networks. 3079-3092 - Qian Wang
, Zixi Li, Qin Zou
, Lingchen Zhao, Song Wang
:
Deep Domain Adaptation With Differential Privacy. 3093-3106 - Basker Palaniswamy
, Seyit Camtepe
, Ernest Foo
, Josef Pieprzyk
:
An Efficient Authentication Scheme for Intra-Vehicular Controller Area Network. 3107-3122 - Edlira Dushku
, Md Masoom Rabbani
, Mauro Conti
, Luigi V. Mancini
, Silvio Ranise
:
SARA: Secure Asynchronous Remote Attestation for IoT Systems. 3123-3136 - Huadi Zheng
, Haibo Hu
:
MISSILE: A System of Mobile Inertial Sensor-Based Sensitive Indoor Location Eavesdropping. 3137-3151 - Donghoon Chang
, Surabhi Garg
, Munawar Hasan
, Sweta Mishra:
Cancelable Multi-Biometric Approach Using Fuzzy Extractor and Novel Bit-Wise Encryption. 3152-3167 - Hua Deng
, Zheng Qin
, Qianhong Wu, Zhenyu Guan
, Robert H. Deng
, Yujue Wang
, Yunya Zhou:
Identity-Based Encryption Transformation for Flexible Sharing of Encrypted Data in Public Cloud. 3168-3180 - Wenyun Sun
, Yu Song
, Changsheng Chen
, Jiwu Huang
, Alex C. Kot
:
Face Spoofing Detection Based on Local Ternary Label Supervision in Fully Convolutional Networks. 3181-3196 - Qin Zou
, Yanling Wang
, Qian Wang
, Yi Zhao, Qingquan Li
:
Deep Learning-Based Gait Recognition Using Smartphones in the Wild. 3197-3212 - Kanad Basu
, Suha Sabi Hussain
, Ujjwal Gupta
, Ramesh Karri
:
COPPTCHA: COPPA Tracking by Checking Hardware-Level Activity. 3213-3226 - Hui Cui
, Zhiguo Wan
, Xinlei Wei, Surya Nepal
, Xun Yi
:
Pay as You Decrypt: Decryption Outsourcing for Functional Encryption Using Blockchain. 3227-3238 - Chengkun Wei
, Shouling Ji
, Changchang Liu, Wenzhi Chen
, Ting Wang
:
AsgLDP: Collecting and Generating Decentralized Attributed Graphs With Local Differential Privacy. 3239-3254 - Donatella Darsena
, Giacinto Gelli
, Ivan Iudice
, Francesco Verde
:
Design and Performance Analysis of Channel Estimators Under Pilot Spoofing Attacks in Multiple-Antenna Systems. 3255-3269 - Samet Taspinar
, Manoranjan Mohanty, Nasir D. Memon
:
Camera Fingerprint Extraction via Spatial Domain Averaged Frames. 3270-3282 - Fawad Ud Din
, Fabrice Labeau
:
In-Band Full-Duplex Discriminatory Channel Estimation Using MMSE. 3283-3292 - Yunxia Han
, Chunxiang Xu
, Debiao He
, Kefei Chen
:
On the Security of a Key Agreement and Key Protection Scheme. 3293-3294 - Yi Sun, Qian Liu
, Xingyuan Chen, Xuehui Du:
An Adaptive Authenticated Data Structure With Privacy-Preserving for Big Data Stream in Cloud. 3295-3310 - Xiaolong Lan, Juanjuan Ren, Qingchun Chen, Lin Cai
:
Achievable Secrecy Rate Region for Buffer-Aided Multiuser MISO Systems. 3311-3324 - Ana Nieto:
Becoming JUDAS: Correlating Users and Devices During a Digital Investigation. 3325-3334 - Gokhan Gok
, Yasar Kemal Alp, Orhan Arikan:
A New Method for Specific Emitter Identification With Results on Real Radar Measurements. 3335-3346 - Allan da Silva Pinto
, Siome Goldenstein, Alexandre M. Ferreira, Tiago J. Carvalho, Hélio Pedrini, Anderson Rocha:
Leveraging Shape, Reflectance and Albedo From Shading for Face Presentation Attack Detection. 3347-3358 - Rang Liu
, Ming Li, Qian Liu, A. Lee Swindlehurst
:
Secure Symbol-Level Precoding in MU-MISO Wiretap Systems. 3359-3373 - Karl-Ludwig Besser
, Pin-Hsun Lin, Carsten R. Janda, Eduard A. Jorswieck
:
Wiretap Code Design by Neural Network Autoencoders. 3374-3386 - Kai Huang, Yun He
:
Trigger Identification Using Difference-Amplified Controllability and Dynamic Transition Probability for Hardware Trojan Detection. 3387-3400 - Yanxin Zhang
, Yulei Sui, Shirui Pan
, Zheng Zheng, Baodi Ning, Ivor W. Tsang
, Wanlei Zhou
:
Familial Clustering for Weakly-Labeled Android Malware Using Hybrid Representation Learning. 3401-3414 - Qichao Xu, Zhou Su, Rongxing Lu:
Game Theory and Reinforcement Learning Based Secure Edge Caching in Mobile Social Networks. 3415-3429 - Piya Limcharoen
, Nirattaya Khamsemanan, Cholwich Nattee:
View-Independent Gait Recognition Using Joint Replacement Coordinates (JRCs) and Convolutional Neural Network. 3430-3442 - Tao Ding
, Ming Qu, Xiong Wu, Boyu Qin, Yongheng Yang
, Frede Blaabjerg:
Defense Strategy for Resilient Shipboard Power Systems Considering Sequential Attacks. 3443-3453 - Kang Wei
, Jun Li, Ming Ding
, Chuan Ma
, Howard H. Yang, Farhad Farokhi
, Shi Jin, Tony Q. S. Quek
, H. Vincent Poor
:
Federated Learning With Differential Privacy: Algorithms and Performance Analysis. 3454-3469 - Anita Aghaie, Amir Moradi
:
TI-PUF: Toward Side-Channel Resistant Physical Unclonable Functions. 3470-3481 - Fabrizio Guerrini, Marco Dalai
, Riccardo Leonardi:
Minimal Information Exchange for Secure Image Hash-Based Geometric Transformations Estimation. 3482-3496 - Kiruba Sankaran Subramani, Noha M. Helal, Angelos Antonopoulos, Aria Nosratinia, Yiorgos Makris
:
Amplitude-Modulating Analog/RF Hardware Trojans in Wireless Networks: Risks and Remedies. 3497-3510 - Qian Han
, V. S. Subrahmanian
, Yanhai Xiong
:
Android Malware Detection via (Somewhat) Robust Irreversible Feature Transformations. 3511-3525 - Sima Bagheri
, Alireza Shameli-Sendi
:
Dynamic Firewall Decomposition and Composition in the Cloud. 3526-3539 - Congyuan Xu, Jizhong Shen
, Xin Du
:
A Method of Few-Shot Network Intrusion Detection Based on Meta-Learning Framework. 3540-3552 - Songxuan Lai
, Yecheng Zhu, Lianwen Jin
:
Encoding Pathlet and SIFT Features With Bagged VLAD for Historical Writer Identification. 3553-3566 - Chandranath Adak
, Bidyut B. Chaudhuri
, Chin-Teng Lin
, Michael Blumenstein
:
Intra-Variable Handwriting Inspection Reinforced With Idiosyncrasy Analysis. 3567-3579 - Amir Ameli
, Khaled A. Saleh
, Aram Kirakosyan, Ehab F. El-Saadany
, Magdy M. A. Salama
:
An Intrusion Detection Method for Line Current Differential Relays in Medium-Voltage DC Microgrids. 3580-3594 - Mohamed Ibrahim
, Tung-Che Liang
, Kristin Scott, Krishnendu Chakrabarty
, Ramesh Karri
:
Molecular Barcoding as a Defense Against Benchtop Biochemical Attacks on DNA Fingerprinting and Information Forensics. 3595-3609 - Antonio Greco
, Nicolai Petkov
, Alessia Saggese
, Mario Vento
:
AReN: A Deep Learning Approach for Sound Event Recognition Using a Brain Inspired Representation. 3610-3624 - Ulrich Scherhag
, Christian Rathgeb
, Johannes Merkle, Christoph Busch
:
Deep Face Representations for Differential Morphing Attack Detection. 3625-3639 - Jing Li
, Yuangang Pan
, Yulei Sui, Ivor W. Tsang
:
Secure Metric Learning via Differential Pairwise Privacy. 3640-3652 - Zisheng Wang
, Rick S. Blum
:
A Statistical Learning-Based Algorithm for Topology Verification in Natural Gas Networks Based on Noisy Sensor Measurements. 3653-3666 - Chaimae Boudagdigue
, Abderrahim Benslimane
, Abdellatif Kobbane, Jiajia Liu
:
Trust Management in Industrial Internet of Things. 3667-3682 - Chengtang Yao, Yunde Jia, Huijun Di
, Yuwei Wu:
Face Spoofing Detection Using Relativity Representation on Riemannian Manifold. 3683-3693 - Jingdian Ming
, Yongbin Zhou, Wei Cheng
, Huizhong Li
, Guang Yang
, Qian Zhang
:
Mind the Balance: Revealing the Vulnerabilities in Low Entropy Masking Schemes. 3694-3708 - Qi Feng, Debiao He
, Zhe Liu
, Huaqun Wang
, Kim-Kwang Raymond Choo
:
SecureNLP: A System for Multi-Party Privacy-Preserving Natural Language Processing. 3709-3721 - Zhifang Gu
, He Henry Chen
, Pingping Xu
, Yonghui Li
, Branka Vucetic
:
Physical Layer Authentication for Non-Coherent Massive SIMO-Enabled Industrial IoT Communications. 3722-3733 - Liang Sun
, Lu Cao, Zhiyao Tang, Yong Feng
:
Artificial-Noise-Aided Secure Multi-User Multi-Antenna Transmission With Quantized CSIT: A Comprehensive Design and Analysis. 3734-3748 - Salman Salamatian
, Wasim Huleihel
, Ahmad Beirami
, Asaf Cohen
, Muriel Médard:
Centralized vs Decentralized Targeted Brute-Force Attacks: Guessing With Side-Information. 3749-3759 - Zhexian Shen
, Kui Xu
, Xiaochen Xia
, Wei Xie, Dongmei Zhang:
Spatial Sparsity Based Secure Transmission Strategy for Massive MIMO Systems Against Simultaneous Jamming and Eavesdropping. 3760-3774 - Shuangrui Zhao
, Jia Liu
, Yulong Shen
, Xiaohong Jiang
, Norio Shiratori:
Secure Beamforming for Full-Duplex MIMO Two-Way Untrusted Relay Systems. 3775-3790 - Boxiang He
, Fanggang Wang
:
Cooperative Specific Emitter Identification via Multiple Distorted Receivers. 3791-3806 - Yubao Zhang
, Jidong Xiao
, Shuai Hao
, Haining Wang
, Sencun Zhu
, Sushil Jajodia
:
Understanding the Manipulation on Recommender Systems through Web Injection. 3807-3818 - Ali Shahin Shamsabadi
, Adrià Gascón, Hamed Haddadi, Andrea Cavallaro
:
PrivEdge: From Local to Distributed Private Training and Prediction. 3819-3831 - Anxiao He, Kai Bu
, Yucong Li, Eikoh Chida, Qianping Gu, Kui Ren
:
Atomos: Constant-Size Path Validation Proof. 3832-3847 - Xuehu Yan
, Yuliang Lu
, Lintao Liu
, Xianhua Song
:
Reversible Image Secret Sharing. 3848-3858 - Wenguang He
, Zhanchuan Cai
:
An Insight Into Pixel Value Ordering Prediction-Based Prediction-Error Expansion. 3859-3871 - Xinyu Li
, Jing Xu
, Xiong Fan
, Yuchen Wang, Zhenfeng Zhang:
Puncturable Signatures and Applications in Proof-of-Stake Blockchain Protocols. 3872-3885 - Deqiang Li
, Qianmu Li
:
Adversarial Deep Ensemble: Evasion Attacks and Defenses for Malware Detection. 3886-3900 - Sherif Nagib Abbas Seha
, Dimitrios Hatzinakos
:
EEG-Based Human Recognition Using Steady-State AEPs and Subject-Unique Spatial Filters. 3901-3910 - Ni Ding
, Farhad Farokhi
:
Developing Non-Stochastic Privacy-Preserving Policies Using Agglomerative Clustering. 3911-3923 - Hanzhuo Tan
, Ajay Kumar
:
Towards More Accurate Contactless Fingerprint Minutiae Extraction and Pose-Invariant Matching. 3924-3937 - Xinrui Tan
, Hongjia Li
, Liming Wang, Zhen Xu:
Comments on "Dropping Activation Outputs with Localized First-Layer Deep Network for Enhancing User Privacy and Data Security". 3938-3939 - Hussain M. J. Almohri
, Layne T. Watson, David Evans:
An Attack-Resilient Architecture for the Internet of Things. 3940-3954 - Minchul Kim
, Heecheol Yang
, Jungwoo Lee
:
Private Coded Matrix Multiplication. 1434-1443 - Hyunsoo Kwon
, Hyunjae Nam, Sangtae Lee, Changhee Hahn
, Junbeom Hur:
(In-)Security of Cookies in HTTPS: Cookie Theft by Removing Cookie Flags. 1204-1215 - Samiran Bag
, Feng Hao
, Siamak F. Shahandashti
, Indranil Ghosh Ray
:
SEAL: Sealed-Bid Auction Without Auctioneers. 2042-2052 - Kyung-Ah Shim
, Namhun Koo
:
Algebraic Fault Analysis of UOV and Rainbow With the Leakage of Random Vinegar Values. 2429-2439

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.