


default search action
IEEE Transactions on Information Forensics and Security, Volume 14
Volume 14, Number 1, January 2019
- Yanyang Yan
, Wenqi Ren
, Xiaochun Cao:
Recolored Image Detection via a Deep Discriminative Model. 5-17 - Chan Dai Truyen Thai, Jemin Lee
, Jay Prakash, Tony Q. S. Quek
:
Secret Group-Key Generation at Physical Layer for Multi-Antenna Mesh Topology. 18-33 - Ajay Kumar
:
Toward More Accurate Matching of Contactless Palmprint Images Under Less Constrained Environments. 34-47 - Lei Xu
, Chunxiao Jiang
, Nengqiang He
, Zhu Han, Abderrahim Benslimane:
Trust-Based Collaborative Privacy Management in Online Social Networks. 48-60 - Konstantinos Koufos
, Carl P. Dettmann:
Boundaries as an Enhancement Technique for Physical Layer Security. 61-74 - Rui Zhao, Chuan Yue
, Qi Han:
Sensor-Based Mobile Web Cross-Site Input Inference Attacks and Defenses. 75-89 - Wenming Yang
, Zhiquan Chen
, Chuan Qin, Qingmin Liao:
$\alpha$ -Trimmed Weber Representation and Cross Section Asymmetrical Coding for Human Identification Using Finger Images. 90-101 - Yiwei He
, Junping Zhang
, Hongming Shan
, Liang Wang:
Multi-Task GANs for View-Specific Feature Learning in Gait Recognition. 102-113 - Wenjian Luo
, Yamin Hu
, Hao Jiang, Junteng Wang
:
Authentication by Encrypted Negative Password. 114-128 - Shihao Yan
, Biao He
, Xiangyun Zhou
, Yirui Cong
, A. Lee Swindlehurst
:
Delay-Intolerant Covert Communications With Either Fixed or Random Transmit Power. 129-140 - Heecheol Yang
, Jungwoo Lee
:
Secure Distributed Computing With Straggling Servers Using Polynomial Codes. 141-150 - João Neves
, Hugo Proença
:
"A Leopard Cannot Change Its Spots": Improving Face Recognition Using 3D-Based Caricatures. 151-161 - Kisong Lee
, Jun-Pyo Hong
, Hyun-Ho Choi
, Tony Q. S. Quek
:
Wireless-Powered Two-Way Relaying Protocols for Optimizing Physical Layer Security. 162-174 - Jinho Choi
:
A Coding Approach With Key-Channel Randomization for Physical-Layer Authentication. 175-185 - Hamzeh Ghasemzadeh
:
Multi-Layer Architecture for Efficient Steganalysis of UnderMp3Cover in Multi-Encoder Scenario. 186-195 - Lu Zhou
, Suguo Du, Haojin Zhu
, Cailian Chen
, Kaoru Ota
, Mianxiong Dong
:
Location Privacy in Usage-Based Automotive Insurance: Attacks and Countermeasures. 196-211 - Xuanxuan Tang
, Yueming Cai
, Yansha Deng
, Yuzhen Huang
, Wendong Yang
, Weiwei Yang
:
Energy-Constrained SWIPT Networks: Enhancing Physical Layer Security With FD Self-Jamming. 212-222 - Taeho Jung
, Xiang-Yang Li
, Wenchao Huang
, Zhongying Qiao
, Jianwei Qian
, Linlin Chen, Junze Han
, Jiahui Hou
:
AccountTrade: Accountability Against Dishonest Big Data Buyers and Sellers. 223-234 - Wenjing Zhang, Ming Li
, Ravi Tandon
, Hui Li:
Online Location Trace Privacy: An Information Theoretic Approach. 235-250 - Shicheng Yang
, Le Zhang, Lianghua He, Ying Wen
:
Sparse Low-Rank Component-Based Representation for Face Recognition With Low-Quality Images. 251-261 - Bin Dai
, Yuan Luo
:
An Improved Feedback Coding Scheme for the Wire-Tap Channel. 262-271
Volume 14, Number 2, February 2019
- Adi Hajj-Ahmad
, Chau-Wai Wong
, Steven Gambino, Qiang Zhu
, Miao Yu
, Min Wu
:
Factors Affecting ENF Capture in Audio. 277-288 - Faraz Ahmad Khan
, Fouad Khelifi
, Muhammad Atif Tahir, Ahmed Bouridane
:
Dissimilarity Gaussian Mixture Models for Efficient Offline Handwritten Text-Independent Identification Using SIFT and RootSIFT Descriptors. 289-303 - Ravichandran Subramanian
, Sudeep Sarkar
:
Evaluation of Algorithms for Orientation Invariant Inertial Gait Matching. 304-318 - Libing Wu
, Jing Wang
, Kim-Kwang Raymond Choo
, Debiao He
:
Secure Key Agreement and Key Protection for Mobile Device User Authentication. 319-330 - Wenting Shen, Jing Qin, Jia Yu
, Rong Hao, Jiankun Hu
:
Enabling Identity-Based Integrity Auditing and Data Sharing With Sensitive Information Hiding for Secure Cloud Storage. 331-346 - Kaveh Shamsi, Travis Meade, Meng Li
, David Z. Pan
, Yier Jin
:
On the Approximation Resiliency of Logic Locking and IC Camouflaging Schemes. 347-359 - Rig Das
, Emanuela Piciucco
, Emanuele Maiorana
, Patrizio Campisi
:
Convolutional Neural Network for Finger-Vein-Based Biometric Identification. 360-373 - Qian Wang
, Jing Huang, Yanjiao Chen
, Cong Wang
, Fu Xiao
, Xiangyang Luo:
PROST: Privacy-Preserving and Truthful Online Double Auction for Spectrum Allocation. 374-386 - Dongyang Xu
, Pinyi Ren
, James A. Ritcey:
Independence-Checking Coding for OFDM Channel Training Authentication: Protocol Design, Security, Stability, and Tradeoff Analysis. 387-402 - Nhan Duy Truong
, Jing Yan Haw
, Syed Muhamad Assad, Ping Koy Lam
, Omid Kavehei
:
Machine Learning Cryptanalysis of a Quantum Random Number Generator. 403-414 - Ben Nassi
, Adi Shamir
, Yuval Elovici:
Xerox Day Vulnerability. 415-430 - Ryota Nakai, Shinya Sugiura
:
Physical Layer Security in Buffer-State-Based Max-Ratio Relay Selection Exploiting Broadcasting With Cooperative Beamforming and Jamming. 431-444 - Xiaofang Xia
, Yang Xiao
, Wei Liang:
ABSI: An Adaptive Binary Splitting Algorithm for Malicious Meter Inspection in Smart Grid. 445-458 - Yvonne Höller
, Arne C. Bathke, Andreas Uhl
:
Age, Sex, and Pathology Effects on Stability of Electroencephalographic Biometric Features Based on Measures of Interaction. 459-471 - Holger Boche, Christian Deppe
:
Secure Identification Under Passive Eavesdroppers and Active Jamming Attacks. 472-485 - Qingyou Yang, Kaiping Xue
, Jie Xu
, Jiajie Wang, Fenghua Li, Nenghai Yu:
AnFRA: Anonymous and Fast Roaming Authentication for Space Information Network. 486-497 - Mehmet Necip Kurt
, Yasin Yilmaz
, Xiaodong Wang
:
Real-Time Detection of Hybrid and Stealthy Cyber-Attacks in Smart Grid. 498-513 - Mohammad Reza Khalili Shoja
, George T. Amariucai
, Zhengdao Wang
, Shuangqing Wei
, Jing Deng
:
On the Secret Key Capacity of Sibling Hidden Markov Models. 514-524 - Saman Feghhi
, Douglas J. Leith
:
An Efficient Web Traffic Defence Against Timing-Analysis Attacks. 525-540 - Muhammad Umar Karim Khan
, Hyun Sang Park
, Chong-Min Kyung
:
Rejecting Motion Outliers for Efficient Crowd Anomaly Detection. 541-556
Volume 14, Number 3, March 2019
- Chunlei Zhang, Muaz Ahmad
, Yongqiang Wang
:
ADMM Based Privacy-Preserving Decentralized Optimization. 565-580 - Udit Satija
, Nikita Trivedi, Gagarin Biswal, Barathram Ramkumar:
Specific Emitter Identification Based on Variational Mode Decomposition and Spectral Features in Single Hop and Relaying Scenarios. 581-591 - Dongyang Xu
, Pinyi Ren
, James A. Ritcey:
Hierarchical 2-D Feature Coding for Secure Pilot Authentication in Multi-User Multi-Antenna OFDM Systems: A Reliability Bound Contraction Perspective. 592-607 - Luca Bondi
, Paolo Bestagini
, Fernando Pérez-González
, Stefano Tubaro:
Improving PRNU Compression Through Preprocessing, Quantization, and Coding. 608-620 - Zahra Mobini
, Mohammadali Mohammadi
, Chintha Tellambura
:
Wireless-Powered Full-Duplex Relay and Friendly Jamming for Secure Cooperative Communications. 621-634 - Massimo Iuliani
, Dasara Shullani
, Marco Fontani
, Saverio Meucci
, Alessandro Piva
:
A Video Forensic Framework for the Unsupervised Analysis of MP4-Like File Container. 635-645 - Yuqing Li
, Wenkuan Dai
, Jie Bai, Xiaoying Gan
, Jingchao Wang, Xinbing Wang
:
An Intelligence-Driven Security-Aware Defense Mechanism for Advanced Persistent Threats. 646-661 - Chenhao Lin
, Ajay Kumar
:
A CNN-Based Framework for Comparison of Contactless to Contact-Based Fingerprints. 662-676 - Junyang Bai
, Weiping Wang
, Yan Qin, Shigeng Zhang
, Jianxin Wang, Yi Pan
:
BridgeTaint: A Bi-Directional Dynamic Taint Tracking Method for JavaScript Bridges in Android Hybrid Applications. 677-692 - Chenyu Wang
, Bihuan Chen, Yang Liu
, Hongjun Wu
:
Layered Object-Oriented Programming: Advanced VTable Reuse Attacks on Binary-Level Defense. 693-708 - Harkeerat Kaur, Pritee Khanna
:
Random Distance Method for Generating Unimodal and Multimodal Cancelable Biometric Features. 709-719 - Zhe Liu
, Hwajeong Seo:
IoT-NUMS: Evaluating NUMS Elliptic Curve Cryptography for IoT Platforms. 720-729 - Attilio Fiandrotti
, Rossano Gaeta
, Marco Grangetto
:
Securing Network Coding Architectures Against Pollution Attacks With Band Codes. 730-742 - Emir Erdem
, Mehmet Tahir Sandikkaya
:
OTPaaS - One Time Password as a Service. 743-756 - Fania Mokhayeri
, Eric Granger
, Guillaume-Alexandre Bilodeau
:
Domain-Specific Face Synthesis for Video Face Recognition From a Single Sample Per Person. 757-772 - TaeGuen Kim, BooJoong Kang, Mina Rho, Sakir Sezer, Eul Gyu Im
:
A Multimodal Deep Learning Method for Android Malware Detection Using Various Features. 773-788 - Jianting Ning
, Jia Xu
, Kaitai Liang
, Fan Zhang
, Ee-Chien Chang
:
Passive Attacks Against Searchable Encryption. 789-802 - Peter Samarin
, Kerstin Lemke-Rust:
Detection of Counterfeit ICs Using Public Identification Sequences and Side-Channel Leakage. 803-813 - Lei Xue
, Chenxiong Qian, Hao Zhou, Xiapu Luo
, Yajin Zhou, Yuru Shao, Alvin T. S. Chan:
NDroid: Toward Tracking Information Flows Across Multiple Android Contexts. 814-828
Volume 14, Number 4, April 2019
- Yuhong Liu
, Na Li:
Retrieving Hidden Friends: A Collusion Privacy Attack Against Online Friend Search Engine. 833-847 - Sanjay Karmakar
, Anirban Ghosh
:
Secrecy Capacity Region of Fading Binary Z Interference Channel With Statistical CSIT. 848-857 - Wenxiong Kang
, Yuting Lu, Dejian Li, Wei Jia:
From Noise to Feature: Exploiting Intensity Distribution as a Novel Soft Biometric Trait for Finger Vein Recognition. 858-869 - Guowen Xu
, Hongwei Li
, Yuanshun Dai, Kan Yang
, Xiaodong Lin
:
Enabling Efficient and Geometric Range Query With Access Control Over Encrypted Spatial Data. 870-885 - Sivaram Prasad Mudunuri
, Shashanka Venkataramanan, Soma Biswas
:
Dictionary Alignment With Re-Ranking for Low-Resolution NIR-VIS Face Recognition. 886-896 - Vijay Varadharajan
, Kallol Krishna Karmakar
, Udaya Kiran Tupakula
, Michael Hitchens
:
A Policy-Based Security Architecture for Software-Defined Networks. 897-912 - Qing Yang
, Ge Peng, Paolo Gasti
, Kiran S. Balagani
, Yantao Li
, Gang Zhou
:
MEG: Memory and Energy Efficient Garbled Circuit Evaluation on Smartphones. 913-922 - Rui Shao
, Xiangyuan Lan
, Pong C. Yuen
:
Joint Discriminative Learning of Deep Dynamic Textures for 3D Mask Face Anti-Spoofing. 923-938 - Changhai Ou
, Zhu Wang
, Degang Sun, Xinping Zhou:
Group Collision Attack. 939-953 - Sayandeep Saha
, Dirmanto Jap
, Sikhar Patranabis
, Debdeep Mukhopadhyay
, Shivam Bhasin
, Pallab Dasgupta
:
Automatic Characterization of Exploitable Faults: A Machine Learning Approach. 954-968 - Mohammed Adil Abbas
, Hojin Song, Jun-Pyo Hong
:
Opportunistic Scheduling for Average Secrecy Rate Enhancement in Fading Downlink Channel With Potential Eavesdroppers. 969-980 - Ángeles Vázquez-Castro
, Masahito Hayashi
:
Physical Layer Security for RF Satellite Channels in the Finite-Length Regime. 981-993 - Pierre-Francois Marteau
:
Sequence Covering for Efficient Host-Based Intrusion Detection. 994-1006 - Xing Hu
, Yingping Huang, Xiumin Gao, Lingkun Luo, Qianqian Duan:
Squirrel-Cage Local Binary Pattern and Its Application in Video Anomaly Detection. 1007-1022 - Ali Akbar Pammu
, Weng-Geng Ho, Ne Kyaw Zwa Lwin, Kwen-Siong Chong, Bah-Hwee Gwee
:
A High Throughput and Secure Authentication-Encryption AES-CCM Algorithm on Asynchronous Multicore Processor. 1023-1036 - Bogdan Groza
, Pal-Stefan Murvay
:
Efficient Intrusion Detection With Bloom Filtering in Controller Area Networks. 1037-1051 - Kejiang Chen
, Hang Zhou, Wenbo Zhou, Weiming Zhang
, Nenghai Yu:
Defining Cost Functions for Adaptive JPEG Steganography at the Microscale. 1052-1066 - Tengku Mohd Afendi Zulcaffle
, Fatih Kurugollu
, Danny Crookes
, Ahmed Bouridane, Mohsen Farid:
Frontal View Gait Recognition With Fusion of Depth Features From a Time of Flight Camera. 1067-1082 - Mirco Marchetti
, Dario Stabili
:
READ: Reverse Engineering of Automotive Data Frames. 1083-1097 - Zhuotao Liu
, Yuan Cao
, Min Zhu, Wei Ge:
Umbrella: Enabling ISPs to Offer Readily Deployable and Privacy-Preserving DDoS Prevention Services. 1098-1108 - Siarhei S. Zalivaka, Alexander A. Ivaniuk, Chip-Hong Chang
:
Reliable and Modeling Attack Resistant Authentication of Arbiter PUF in FPGA Implementation With Trinary Quadruple Response. 1109-1123
Volume 14, Number 5, May 2019
- Sofia Belikovetsky
, Yosef A. Solewicz
, Mark Yampolskiy
, Jinghui Toh, Yuval Elovici:
Digital Audio Signature for 3D Printing Integrity. 1127-1141 - Duo Li
, Xiao-Ping (Steven) Zhang
, Menghan Hu
, Guangtao Zhai
, Xiaokang Yang:
Physical Password Breaking via Thermal Sequence Analysis. 1142-1154 - Ankit Shah
, Rajesh Ganesan
, Sushil Jajodia
, Hasan Cam
:
Understanding Tradeoffs Between Throughput, Quality, and Cost of Alert Analysis in a CSOC. 1155-1170 - Zhenghui Liu
, Yuankun Huang
, Jiwu Huang
:
Patchwork-Based Audio Watermarking Robust Against De-Synchronization and Recapturing Attacks. 1171-1180 - Mehdi Boroumand
, Mo Chen, Jessica J. Fridrich:
Deep Residual Network for Steganalysis of Digital Images. 1181-1193 - Gurinder Singh
, Kulbir Singh
:
Counter JPEG Anti-Forensic Approach Based on the Second-Order Statistical Analysis. 1194-1209 - Lu Yang, Gongping Yang
, Xiaoming Xi
, Kun Su, Qing Chen, Yilong Yin
:
Finger Vein Code: From Indexing to Matching. 1210-1223 - Rick Fritschek
, Gerhard Wunder:
On the Gaussian Multiple Access Wiretap Channel and the Gaussian Wiretap Channel With a Helper: Achievable Schemes and Upper Bounds. 1224-1239 - Pramuditha Perera
, Vishal M. Patel
:
Face-Based Multiple User Active Authentication on Mobile Devices. 1240-1250 - Berk Akgun
, Marwan Krunz, Onur Ozan Koyluoglu:
Vulnerabilities of Massive MIMO Systems to Pilot Contamination Attacks. 1251-1263 - Kazuaki Nakamura
, Naoko Nitta, Noboru Babaguchi:
Encryption-Free Framework of Privacy-Preserving Image Recognition for Photo-Based Information Services. 1264-1279 - Zhongliang Yang
, Xiaoqing Guo
, Zi-Ming Chen
, Yongfeng Huang
, Yu-Jin Zhang
:
RNN-Stega: Linguistic Steganography Based on Recurrent Neural Networks. 1280-1295 - James Shey
, Justin A. Blanco
, T. Owens Walker
, Thomas W. Tedesso, Hau T. Ngo, Ryan N. Rakvic
, Kevin D. Fairbanks
:
Monitoring Device Current to Characterize Trim Operations of Solid-State Drives. 1296-1306 - Yuanman Li, Jiantao Zhou:
Fast and Effective Image Copy-Move Forgery Detection via Hierarchical Feature Point Matching. 1307-1322 - Shun-Chi Wu
, Peng-Tzu Chen, A. Lee Swindlehurst
, Pei-Lun Hung:
Cancelable Biometric Recognition With ECGs: Subspace-Based Approaches. 1323-1336 - Zhen Hong
, Rui Wang
, Shouling Ji, Raheem Beyah
:
Attacker Location Evaluation-Based Fake Source Scheduling for Source Location Privacy in Cyber-Physical Systems. 1337-1350 - Javier Galbally
, Rudolf Haraksim, Laurent Beslay:
A Study of Age and Ageing in Fingerprint Biometrics. 1351-1365 - Christina L. Ting
, Richard V. Field Jr.
, Andrew Fisher, Travis L. Bauer:
Compression Analytics for Classification and Anomaly Detection Within Network Communication. 1366-1376 - Vincent Y. F. Tan
, Si-Hyeon Lee
:
Time-Division is Optimal for Covert Communication Over Some Broadcast Channels. 1377-1389 - Tian Wang
, Meina Qiao, Zhiwei Lin, Ce Li, Hichem Snoussi, Zhe Liu
, Chang Choi
:
Generative Neural Networks for Anomaly Detection in Crowded Scenes. 1390-1399
Volume 14, Number 6, June 2019
- Han Fang
, Weiming Zhang
, Hang Zhou
, Hao Cui
, Nenghai Yu:
Screen-Shooting Resilient Watermarking. 1403-1418 - Andrey Kuehlkamp
, Allan da Silva Pinto
, Anderson Rocha
, Kevin W. Bowyer
, Adam Czajka
:
Ensemble of Multi-View Learning Classifiers for Cross-Domain Iris Presentation Attack Detection. 1419-1431 - Hannes Mareen
, Johan De Praeter
, Glenn Van Wallendael
, Peter Lambert
:
A Scalable Architecture for Uncompressed-Domain Watermarked Videos. 1432-1444 - Liran Lerman
, Olivier Markowitch:
Efficient Profiled Attacks on Masking Schemes. 1445-1454 - Haipeng Cai
, Na Meng, Barbara G. Ryder
, Danfeng Yao
:
DroidCat: Effective Android Malware Detection and Categorization via App-Level Profiling. 1455-1470 - Muhammad Ejaz Ahmed, Saeed Ullah
, Hyoungshick Kim
:
Statistical Application Fingerprinting for DDoS Attack Mitigation. 1471-1484 - Di Zhuang
, J. Morris Chang:
Enhanced PeerHunter: Detecting Peer-to-Peer Botnets Through Network-Flow Level Community Behavior Analysis. 1485-1500 - Mateusz Trokielewicz
, Adam Czajka
, Piotr Maciejewicz:
Iris Recognition After Death. 1501-1514 - Tatsuya Chuman
, Warit Sirichotedumrong
, Hitoshi Kiya
:
Encryption-Then-Compression Systems Using Grayscale-Based Image Encryption for JPEG Images. 1515-1525 - Iman Vakilinia
, Shamik Sengupta:
A Coalitional Cyber-Insurance Framework for a Common Platform. 1526-1538 - Lewis D. Griffin
, Matthew Caldwell
, Jerone T. A. Andrews, Helene Bohler
:
"Unexpected Item in the Bagging Area": Anomaly Detection in X-Ray Security Images. 1539-1553 - Prosanta Gope
, Biplab Sikdar
:
Lightweight and Privacy-Friendly Spatial Data Aggregation for Secure Power Supply and Demand Management in Smart Grids. 1554-1566 - Zuxing Li, Tobias J. Oechtering, Deniz Gündüz
:
Privacy Against a Hypothesis Testing Adversary. 1567-1581 - Jun Du, Erol Gelenbe, Chunxiao Jiang, Haijun Zhang, Yong Ren, H. Vincent Poor
:
Peer Prediction-Based Trustworthiness Evaluation and Trustworthy Service Rating in Social Networks. 1582-1594 - Zhenyu Ning, Fengwei Zhang
:
Hardware-Assisted Transparent Tracing and Debugging on ARM. 1595-1609 - Tinghan Yang, Rongqing Zhang
, Xiang Cheng, Liuqing Yang:
Secure Massive MIMO Under Imperfect CSI: Performance Analysis and Channel Prediction. 1610-1623 - Songxuan Lai, Lianwen Jin:
Recurrent Adaptation Networks for Online Signature Verification. 1624-1637 - Yisroel Mirsky, Naor Kalbo, Yuval Elovici, Asaf Shabtai:
Vesper: Using Echo Analysis to Detect Man-in-the-Middle Attacks in LANs. 1638-1653 - Jeffrey Pawlick, Juntao Chen, Quanyan Zhu:
iSTRICT: An Interdependent Strategic Trust Mechanism for the Cloud-Enabled Internet of Controlled Things. 1654-1669 - Youhong Feng, Shihao Yan
, Chenxi Liu, Zhen Yang, Nan Yang
:
Two-Stage Relay Selection for Enhancing Physical Layer Security in Non-Orthogonal Multiple Access. 1670-1683
Volume 14, Number 7, July 2019
- Shuangke Wu, Yanjiao Chen
, Qian Wang
, Minghui Li
, Cong Wang
, Xiangyang Luo
:
CReam: A Smart Contract Enabled Collusion-Resistant e-Auction. 1687-1701 - Hugo Proença
, João C. Neves
:
A Reminiscence of "Mastermind": Iris/Periocular Biometrics by "In-Set" CNN Iterative Analysis. 1702-1712 - Lu-Xing Yang
, Pengdeng Li, Yushu Zhang
, Xiaofan Yang
, Yong Xiang
, Wanlei Zhou
:
Effective Repair Strategy Against Advanced Persistent Threat: A Differential Game Approach. 1713-1728 - Jianwu Wan
, Yi Wang
:
Cost-Sensitive Label Propagation for Semi-Supervised Face Recognition. 1729-1743 - Thiago M. Paixão
, Maria C. S. Boeres, Cinthia O. A. Freitas
, Thiago Oliveira-Santos
:
Exploring Character Shapes for Unsupervised Reconstruction of Strip-Shredded Text Documents. 1744-1754 - Dawei Zhao
, Lianhai Wang, Zhen Wang
, Gaoxi Xiao
:
Virus Propagation and Patch Distribution in Multiplex Networks: Modeling, Analysis, and Optimal Allocation. 1755-1767 - Seong Tae Kim
, Yong Man Ro
:
Attended Relation Feature Representation of Facial Dynamics for Facial Authentication. 1768-1778 - Yujue Wang, Yong Ding
, Qianhong Wu
, Yongzhuang Wei, Bo Qin
, Huiyong Wang:
Privacy-Preserving Cloud-Based Road Condition Monitoring With Source Authentication in VANETs. 1779-1790 - Yuchuan Luo
, Xiaohua Jia
, Shaojing Fu
, Ming Xu:
pRide: Privacy-Preserving Ride Matching Over Road Networks for Online Ride-Hailing Service. 1791-1802 - Tiago de Freitas Pereira
, André Anjos
, Sébastien Marcel
:
Heterogeneous Face Recognition Using Domain Specific Units. 1803-1816 - Xiaoli Sun
, Weiwei Yang
, Yueming Cai
, Liwei Tao
, Yang Liu
, Yongming Huang
:
Secure Transmissions in Wireless Information and Power Transfer Millimeter-Wave Ultra-Dense Networks. 1817-1829 - Yaxing Chen
, Wenhai Sun
, Ning Zhang
, Qinghua Zheng, Wenjing Lou, Y. Thomas Hou
:
Towards Efficient Fine-Grained Access Control and Trustworthy Data Processing for Remote Monitoring Services in IoT. 1830-1842 - Zengzhen Zhao
, Qingxiao Guan, Hong Zhang
, Xianfeng Zhao
:
Improving the Robustness of Adaptive Steganographic Algorithms Based on Transport Channel Matching. 1843-1856 - Ankit Shah
, Rajesh Ganesan
, Sushil Jajodia
, Hasan Cam:
A Two-Step Approach to Optimal Selection of Alerts for Investigation in a CSOC. 1857-1870 - Jeffrey Pawlick
, Edward Colbert, Quanyan Zhu:
Modeling and Analysis of Leaky Deception Using Signaling Games With Evidence. 1871-1886 - Yansong Gao
, Yang Su, Lei Xu
, Damith Chinthana Ranasinghe:
Lightweight (Reverse) Fuzzy Extractor With Multiple Reference PUF Responses. 1887-1901 - Quoc-Tin Phan
, Giulia Boato
, Francesco G. B. De Natale
:
Accurate and Scalable Image Clustering Based on Sparse Representation of Camera Fingerprint. 1902-1916 - Yi Yu
, Feipeng Da
, Yifan Guo
:
Sparse ICP With Resampling and Denoising for 3D Face Verification. 1917-1927 - Cecilia Pasquini
, Rainer Böhme
:
Information-Theoretic Bounds for the Forensic Detection of Downscaled Signals. 1928-1943 - Guozhu Meng
, Matthew Patrick, Yinxing Xue
, Yang Liu
, Jie Zhang:
Securing Android App Markets via Modeling and Predicting Malware Spread Between Markets. 1944-1959
Volume 14, Number 8, August 2019
- Robin Richter
, Carsten Gottschlich, Lucas Mentch, Duy Hoang Thai, Stephan F. Huckemann:
Smudge Noise for Quality Estimation of Fingerprints and its Validation. 1963-1974 - Nour Moustafa
, Kim-Kwang Raymond Choo
, Ibrahim Radwan
, Seyit Camtepe
:
Outlier Dirichlet Mixture Mechanism: Adversarial Statistical Learning for Anomaly Detection in the Fog. 1975-1987 - Kamal Taha
, Paul D. Yoo
:
Shortlisting the Influential Members of Criminal Organizations and Identifying Their Important Communication Channels. 1988-1999 - Pei Li
, Loreto Prieto, Domingo Mery
, Patrick J. Flynn
:
On Low-Resolution Face Recognition in the Wild: Comparisons and New Techniques. 2000-2012 - Sebastian Baur
, Christian Deppe
, Holger Boche:
Secure Storage for Identification; Random Resources and Privacy Leakage. 2013-2027 - Jie Cao
, Yibo Hu, Bing Yu, Ran He
, Zhenan Sun
:
3D Aided Duet GANs for Multi-View Face Image Synthesis. 2028-2042 - Jeroen Delvaux
:
Machine-Learning Attacks on PolyPUFs, OB-PUFs, RPUFs, LHS-PUFs, and PUF-FSMs. 2043-2058 - Alessio Zappone
, Pin-Hsun Lin, Eduard A. Jorswieck
:
Secrecy Energy Efficiency for MIMO Single- and Multi-Cell Downlink Transmission With Confidential Messages. 2059-2073 - Weixuan Tang, Bin Li
, Shunquan Tan
, Mauro Barni
, Jiwu Huang
:
CNN-Based Adversarial Embedding for Image Steganography. 2074-2087 - Xiazhi Lai
, Lisheng Fan
, Xianfu Lei
, Jin Li, Nan Yang
, George K. Karagiannidis
:
Distributed Secure Switch-and-Stay Combining Over Correlated Fading Channels. 2088-2101 - Joseph Thompson
, Patrick J. Flynn
, Christopher Boehnen, Hector J. Santos-Villalobos
:
Assessing the Impact of Corneal Refraction and Iris Tissue Non-Planarity on Iris Recognition. 2102-2112 - Abubakar Sadiq Sani
, Dong Yuan, Wei Bao
, Zhao Yang Dong
, Branka Vucetic
, Elisa Bertino
:
Universally Composable Key Bootstrapping and Secure Communication Protocols for the Energy Internet. 2113-2127 - Willie K. Harrison
, Telmo R. Fernandes, Marco A. C. Gomes
, João P. Vilela:
Generating a Binary Symmetric Channel for Wiretap Codes. 2128-2138 - S. Sundeep Desai
, Manisha J. Nene
:
Node-Level Trust Evaluation in Wireless Sensor Networks. 2139-2152 - Luiz G. Hafemann
, Robert Sabourin
, Luiz S. Oliveira:
Characterizing and Evaluating Adversarial Examples for Offline Handwritten Signature Verification. 2153-2166 - Alexandre Bartel
, Jacques Klein
, Yves Le Traon
:
Musti: Dynamic Prevention of Invalid Object Initialization Attacks. 2167-2178 - José Camacho
, Gabriel Maciá-Fernández
, Noemí Marta Fuentes García
, Edoardo Saccenti
:
Semi-Supervised Multivariate Statistical Network Monitoring for Learning Security Threats. 2179-2189 - Meysam Mirzaee, Soroush Akhlaghi
:
Maximizing the Minimum Achievable Secrecy Rate for a Two-User Gaussian Weak Interference Channel. 2190-2202 - Michael Kiperberg
, Roee Leon, Amit Resh, Asaf Algawi, Nezer J. Zaidenberg
:
Hypervisor-Based Protection of Code. 2203-2216 - Xiaowei Yi
, Kun Yang, Xianfeng Zhao
, Yuntao Wang, Haibo Yu:
AHCM: Adaptive Huffman Code Mapping for Audio Steganography Based on Psychoacoustic Model. 2217-2231 - Masahiro Kaminaga, Toshinori Suzuki
, Masaharu Fukase
:
Determining the Optimal Random-Padding Size for Rabin Cryptosystems. 2232-2242
Volume 14, Number 9, September 2019
- Lei Li
, Zhaoqiang Xia
, Abdenour Hadid
, Xiaoyue Jiang, Haixi Zhang, Xiaoyi Feng:
Replayed Video Attack Detection Based on Motion Blur Analysis. 2246-2261 - Saffet Vatansever
, Ahmet Emir Dirik
, Nasir D. Memon
:
Analysis of Rolling Shutter Effect on ENF-Based Video Forensics. 2262-2275 - Lieneke Kusters
, Frans M. J. Willems
:
Secret-Key Capacity Regions for Multiple Enrollments With an SRAM-PUF. 2276-2287 - Salman Salamatian
, Wasim Huleihel, Ahmad Beirami
, Asaf Cohen
, Muriel Médard:
Why Botnets Work: Distributed Brute-Force Attacks Need No Synchronization. 2288-2299 - Xuhang Ying
, Sang Uk Sagong, Andrew Clark
, Linda Bushnell
, Radha Poovendran
:
Shape of the Cloak: Formal Analysis of Clock Skew-Based Intrusion Detection System in Controller Area Networks. 2300-2314 - Mengyuan Zhang
, Xavier de Carné de Carnavalet
, Lingyu Wang
, Ahmed Ragab
:
Large-Scale Empirical Study of Important Features Indicative of Discovered Vulnerabilities to Assess Application Security. 2315-2330 - Qi Yan, Rui Yang, Jiwu Huang
:
Robust Copy-Move Detection of Speech Recording Using Similarities of Pitch and Formant. 2331-2341 - Yanan Li
, Xuebin Ren
, Shusen Yang
, Xinyu Yang
:
Impact of Prior Knowledge and Data Correlation on Privacy Leakage: A Unified Analysis. 2342-2357 - Chugui Xu, Ju Ren
, Deyu Zhang
, Yaoxue Zhang
, Zhan Qin, Kui Ren:
GANobfuscator: Mitigating Information Leakage Under GAN via Differential Privacy. 2358-2371 - Emre Durmus, Pawel Korus
, Nasir D. Memon
:
Every Shred Helps: Assembling Evidence From Orphaned JPEG Fragments. 2372-2386 - Shengbo Xu, Weiyang Xu
, Cunhua Pan
, Maged Elkashlan
:
Detection of Jamming Attack in Non-Coherent Massive SIMO Systems. 2387-2399 - Fei Peng
, Zi-Xing Lin
, Xiang Zhang
, Min Long:
Reversible Data Hiding in Encrypted 2D Vector Graphics Based on Reversible Mapping Model for Real Numbers. 2400-2411 - Muhammad Junaid Farooq
, Quanyan Zhu:
Modeling, Analysis, and Mitigation of Dynamic Botnet Formation in Wireless IoT Networks. 2412-2426 - Zezhi Wu
, Xingyuan Chen
, Zhi Yang, Xuehui Du:
Reducing Security Risks of Suspicious Data and Codes Through a Novel Dynamic Defense Model. 2427-2440 - Qi Yan, Rui Yang, Jiwu Huang
:
Detection of Speech Smoothing on Very Short Clips. 2441-2453 - Zhipeng Chen
, Benedetta Tondi
, Xiaolong Li
, Rongrong Ni, Yao Zhao
, Mauro Barni
:
Secure Detection of Image Manipulation by Means of Random Feature Selection. 2454-2469 - Tan N. Nguyen, Hoang Long Mai, Rémi Cogranne
, Guillaume Doyen, Wissam Mallouli, Luong Nguyen
, Moustapha El Aoun, Edgardo Montes de Oca
, Olivier Festor
:
Reliable Detection of Interest Flooding Attack in Real Deployment of Named Data Networking. 2470-2485 - Yitao Han
, Lingjie Duan
, Rui Zhang
:
Jamming-Assisted Eavesdropping Over Parallel Fading Channels. 2486-2499 - Jiucheng Xie
, Chi-Man Pun
:
Chronological Age Estimation Under the Guidance of Age-Related Facial Attributes. 2500-2511 - Wenming Yang
, Changqing Hui
, Zhiquan Chen
, Jing-Hao Xue
, Qingmin Liao:
FV-GAN: Finger Vein Representation Using Generative Adversarial Networks. 2512-2524
Volume 14, Number 10, October 2019
- Lee Friedman
, Oleg V. Komogortsev:
Assessment of the Effectiveness of Seven Biometric Feature Normalization Techniques. 2528-2536 - Joey Tianyi Zhou
, Jiawei Du, Hongyuan Zhu, Xi Peng
, Yong Liu, Rick Siow Mong Goh:
AnomalyNet: An Anomaly Detection Network for Video Surveillance. 2537-2550 - Yaqi Liu
, Xiaobin Zhu, Xianfeng Zhao
, Yun Cao:
Adversarial Learning for Constrained Image Splicing Detection and Localization Based on Atrous Convolution. 2551-2566 - Farhad Farokhi
:
Development and Analysis of Deterministic Privacy-Preserving Policies Using Non- Stochastic Information Theory. 2567-2576 - Seokeon Choi
, Jonghee Kim
, Wonjun Kim
, Changick Kim
:
Skeleton-Based Gait Recognition via Robust Frame-Level Matching. 2577-2592 - Bin Qiu
, Mingliang Tao
, Ling Wang, Jian Xie
, Yuexian Wang
:
Multi-Beam Directional Modulation Synthesis Scheme Based on Frequency Diverse Array. 2593-2606 - Kai-Hsiang Hsu, Yu-Hsi Chiang, Hsu-Chun Hsiao
:
SafeChain: Securing Trigger-Action Programming From Attack Chains. 2607-2622 - Aleksander Essex
:
Secure Approximate String Matching for Privacy-Preserving Record Linkage. 2623-2632 - Sunghwan Cho
, Gaojie Chen
, Justin P. Coon
:
Enhancement of Physical Layer Security With Simultaneous Beamforming and Jamming for Visible Light Communication Systems. 2633-2648 - Yanzhen Ren
, Hanyi Yang, Hongxia Wu, Weiping Tu
, Lina Wang:
A Secure AMR Fixed Codebook Steganographic Scheme Based on Pulse Distribution Model. 2649-2661 - Ribhu Chopra
, Chandra R. Murthy
, Ramesh Annavajjala:
Physical Layer Security in Wireless Sensor Networks Using Distributed Co-Phasing. 2662-2675 - Min Jiang
, Guodong Guo
:
Body Weight Analysis From Human Body Images. 2676-2688 - Anna Engelmann
, Admela Jukan
:
Toward All-Optical Layered Encryption: A Feasibility Analysis of Optical Stream Cipher. 2689-2704 - Nguyen Binh Truong
, Gyu Myoung Lee
, Tai-Won Um
, Michael Mackay
:
Trust Evaluation Mechanism for User Recruitment in Mobile Crowd-Sensing in the Internet of Things. 2705-2719 - Kiruba Sankaran Subramani
, Angelos Antonopoulos
, Ahmed Attia Abotabl
, Aria Nosratinia
, Yiorgos Makris
:
Demonstrating and Mitigating the Risk of an FEC-Based Hardware Trojan in Wireless Networks. 2720-2734 - Jishen Zeng
, Shunquan Tan
, Guangqing Liu
, Bin Li
, Jiwu Huang
:
WISERNet: Wider Separate-Then-Reunion Network for Steganalysis of Color Images. 2735-2748 - Anyi Liu
, Huirong Fu, Yuan Hong
, Jigang Liu, Yingjiu Li
:
LiveForen: Ensuring Live Forensic Integrity in the Cloud. 2749-2764 - Saeed Ahmed
, Youngdoo Lee, Seung Ho Hyun
, Insoo Koo
:
Unsupervised Machine Learning-Based Detection of Covert Data Integrity Assault in Smart Grid Networks Utilizing Isolation Forest. 2765-2777 - Fangfei Yang
, Ming Tang
, Ozgur Sinanoglu
:
Stripped Functionality Logic Locking With Hamming Distance-Based Restore Unit (SFLL-hd) - Unlocked. 2778-2786 - Keerthi Suria Kumar Arumugam
, Matthieu R. Bloch
:
Embedding Covert Information in Broadcast Communications. 2787-2801
Volume 14, Number 11, November 2019
- Zhili Chen
, Tianjiao Ni
, Hong Zhong, Shun Zhang
, Jie Cui
:
Differentially Private Double Spectrum Auction With Approximate Social Welfare Maximization. 2805-2818 - Dhanushka Kudathanthirige
, Santosh Timilsina
, Gayan Amarasuriya Aruma Baduge
:
Secure Communication in Relay-Assisted Massive MIMO Downlink With Active Pilot Attacks. 2819-2833 - Enrique Argones-Rúa
, Aysajan Abidin
, Roel Peeters
, Jac Romme
:
Efficient and Privacy-Preserving Cryptographic Key Derivation From Continuous Sources. 2834-2847 - Onur Günlü
, Onurcan Iscan
, Vladimir Sidorenko
, Gerhard Kramer
:
Code Constructions for Physical Unclonable Functions and Biometric Secrecy Systems. 2848-2858 - Haoyu Ma
, Chunfu Jia
, Shijia Li
, Wantong Zheng
, Dinghao Wu
:
Xmark: Dynamic Software Watermarking Using Collatz Conjecture. 2859-2874 - Yuechi Jiang
, Frank H. F. Leung
:
Source Microphone Recognition Aided by a Kernel-Based Projection Method. 2875-2886 - Yuan Ma
, Tianyu Chen
, Jingqiang Lin, Jing Yang
, Jiwu Jing:
Entropy Estimation for ADC Sampling-Based True Random Number Generators. 2887-2900 - Mohammed Shayan
, Sukanta Bhattacharjee, Jack Tang
, Krishnendu Chakrabarty
, Ramesh Karri
:
Bio-Protocol Watermarking on Digital Microfluidic Biochips. 2901-2915 - Fran Casino
, Kim-Kwang Raymond Choo
, Constantinos Patsakis
:
HEDGE: Efficient Traffic Classification of Encrypted and Compressed Packets. 2916-2926 - Yingjie Xue, Kaiping Xue
, Na Gai, Jianan Hong, David S. L. Wei, Peilin Hong
:
An Attribute-Based Controlled Collaborative Access Control Scheme for Public Cloud Storage. 2927-2942 - Peipei Li
, Yibo Hu, Ran He
, Zhenan Sun
:
Global and Local Consistent Wavelet-Domain Age Synthesis. 2943-2957 - Juntao Chen
, Quanyan Zhu:
Interdependent Strategic Security Risk Management With Bounded Rationality in the Internet of Things. 2958-2971 - Debanjan Sadhya
, Balasubramanian Raman:
Generation of Cancelable Iris Templates via Randomized Bit Sampling. 2972-2986 - Zhongjie Ba
, Zhan Qin, Xinwen Fu
, Kui Ren:
CIM: Camera in Motion for Smartphone Authentication. 2987-3002 - Le Trieu Phong
, Tran Thi Phuong
:
Privacy-Preserving Deep Learning via Weight Transmission. 3003-3015 - Eunsoo Park, Xuenan Cui, Thi Hai Binh Nguyen
, Hakil Kim
:
Presentation Attack Detection Using a Tiny Fully Convolutional Network. 3016-3025 - Jinchuan Tang
, Gaojie Chen
, Justin P. Coon
:
Secrecy Performance Analysis of Wireless Communications in the Presence of UAV Jammer and Randomly Located UAV Eavesdroppers. 3026-3041 - Bagus Santoso
, Yasutada Oohama:
Secrecy Amplification of Distributed Encrypted Sources With Correlated Keys Using Post-Encryption-Compression. 3042-3056 - Annushree Bablani
, Damodar Reddy Edla
, Diwakar Tripathi, Shubham Dodia
, Sridhar Chintala
:
A Synergistic Concealed Information Test With Novel Approach for EEG Channel Selection and SVM Parameter Optimization. 3057-3068 - Weijia Wang
, Yu Yu
, François-Xavier Standaert
:
Provable Order Amplification for Code-Based Masking: How to Avoid Non-Linear Leakages Due to Masked Operations. 3069-3082
Volume 14, Number 12, December 2019
- Diksha Shukla
, Vir V. Phoha
:
Stealing Passwords by Observing Hands Movement. 3086-3101 - Sudip Vhaduri
, Christian Poellabauer
:
Multi-Modal Biometric-Based Implicit Authentication of Wearable Device Users. 3116-3125 - Jinyuan Chen
, Fan Li
:
Adding a Helper Can Totally Remove the Secrecy Constraints in a Two-User Interference Channel. 3126-3139 - Dexing Zhong
, Huikai Shao
, Xuefeng Du
:
A Hand-Based Multi-Biometrics via Deep Hashing Network and Biometric Graph Matching. 3140-3150 - Zhengmin Kong
, Shaoshi Yang
, Die Wang
, Lajos Hanzo
:
Robust Beamforming and Jamming for Enhancing the Physical Layer Security of Full Duplex Radios. 3151-3159 - Angelo Genovese
, Vincenzo Piuri
, Konstantinos N. Plataniotis
, Fabio Scotti
:
PalmNet: Gabor-PCA Convolutional Networks for Touchless Palmprint Recognition. 3160-3174 - Alejandro Calleja
, Juan Tapiador
, Juan Caballero:
The MalSource Dataset: Quantifying Complexity and Code Reuse in Malware Development. 3175-3190 - Lu Lv
, Fuhui Zhou
, Jian Chen
, Naofal Al-Dhahir:
Secure Cooperative Communications With an Untrusted Relay: A NOMA-Inspired Jamming and Relaying Approach. 3191-3205 - Hongze Zhao
, Yijun Wang
, Zhiduo Liu, Weihua Pei, Hongda Chen:
Individual Identification Based on Code-Modulated Visual-Evoked Potentials. 3206-3216 - Jose David Mireles
, Eric Ficke
, Jin-Hee Cho, Patrick M. Hurley, Shouhuai Xu
:
Metrics Towards Measuring Cyber Agility. 3217-3232 - Kuo Wang
, Ajay Kumar
:
Toward More Accurate Iris Recognition Using Dilated Residual Features. 3233-3245 - Xiang Li
, Yasushi Makihara, Chi Xu
, Yasushi Yagi
, Mingwu Ren:
Joint Intensity Transformer Network for Gait Recognition Robust Against Clothing and Carrying Status. 3102-3115 - Christian Kison
, Omar Mohamed Awad
, Marc Fyrbiak
, Christof Paar
:
Security Implications of Intentional Capacitive Crosstalk. 3246-3258 - Min Wang
, Heba El-Fiqi
, Jiankun Hu
, Hussein A. Abbass
:
Convolutional Neural Networks Using Dynamic Functional Connectivity for EEG-Based Person Identification in Diverse Human States. 3259-3272 - Richeng Jin
, Xiaofan He
, Huaiyu Dai
:
On the Security-Privacy Tradeoff in Collaborative Security: A Quantitative Information Flow Game Perspective. 3273-3286 - Muhammad Taqi Raza
, Songwu Lu, Mario Gerla:
vEPC-sec: Securing LTE Network Functions Virtualization on Public Cloud. 3287-3297 - Josep Domingo-Ferrer
, Jordi Soria-Comas
, Rafael Mulero-Vellido
:
Steered Microaggregation as a Unified Primitive to Anonymize Data Sets and Data Streams. 3298-3311 - Seyed Mohammad Hosseini
, Amir Hossein Jahangir
, Mehdi Kazemi:
Digesting Network Traffic for Forensic Investigation Using Digital Signal Processing Techniques. 3312-3321 - Yanwei Pang
, Jiale Cao
, Jian Wang, Jungong Han
:
JCS-Net: Joint Classification and Super-Resolution Network for Small-Scale Pedestrian Detection in Surveillance Images. 3322-3331 - Yu-Chi Chen
, Tsung-Hsuan Hung, Sung-Hsien Hsieh
, Chih-Wei Shiu
:
A New Reversible Data Hiding in Encrypted Image Based on Multi-Secret Sharing and Lightweight Cryptographic Algorithms. 3332-3343 - Xiaowei Li
, Dengqi Yang, Xing Zeng, Benhui Chen, Yuqing Zhang
:
Comments on "Provably Secure Dynamic Id-Based Anonymous Two-Factor Authenticated Key Exchange Protocol With Extended Security Model". 3344-3345

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.