default search action
IEEE Transactions on Information Forensics and Security, Volume 14
Volume 14, Number 1, January 2019
- Yanyang Yan, Wenqi Ren, Xiaochun Cao:
Recolored Image Detection via a Deep Discriminative Model. 5-17 - Chan Dai Truyen Thai, Jemin Lee, Jay Prakash, Tony Q. S. Quek:
Secret Group-Key Generation at Physical Layer for Multi-Antenna Mesh Topology. 18-33 - Ajay Kumar:
Toward More Accurate Matching of Contactless Palmprint Images Under Less Constrained Environments. 34-47 - Lei Xu, Chunxiao Jiang, Nengqiang He, Zhu Han, Abderrahim Benslimane:
Trust-Based Collaborative Privacy Management in Online Social Networks. 48-60 - Konstantinos Koufos, Carl P. Dettmann:
Boundaries as an Enhancement Technique for Physical Layer Security. 61-74 - Rui Zhao, Chuan Yue, Qi Han:
Sensor-Based Mobile Web Cross-Site Input Inference Attacks and Defenses. 75-89 - Wenming Yang, Zhiquan Chen, Chuan Qin, Qingmin Liao:
$\alpha$ -Trimmed Weber Representation and Cross Section Asymmetrical Coding for Human Identification Using Finger Images. 90-101 - Yiwei He, Junping Zhang, Hongming Shan, Liang Wang:
Multi-Task GANs for View-Specific Feature Learning in Gait Recognition. 102-113 - Wenjian Luo, Yamin Hu, Hao Jiang, Junteng Wang:
Authentication by Encrypted Negative Password. 114-128 - Shihao Yan, Biao He, Xiangyun Zhou, Yirui Cong, A. Lee Swindlehurst:
Delay-Intolerant Covert Communications With Either Fixed or Random Transmit Power. 129-140 - Heecheol Yang, Jungwoo Lee:
Secure Distributed Computing With Straggling Servers Using Polynomial Codes. 141-150 - João Neves, Hugo Proença:
"A Leopard Cannot Change Its Spots": Improving Face Recognition Using 3D-Based Caricatures. 151-161 - Kisong Lee, Jun-Pyo Hong, Hyun-Ho Choi, Tony Q. S. Quek:
Wireless-Powered Two-Way Relaying Protocols for Optimizing Physical Layer Security. 162-174 - Jinho Choi:
A Coding Approach With Key-Channel Randomization for Physical-Layer Authentication. 175-185 - Hamzeh Ghasemzadeh:
Multi-Layer Architecture for Efficient Steganalysis of UnderMp3Cover in Multi-Encoder Scenario. 186-195 - Lu Zhou, Suguo Du, Haojin Zhu, Cailian Chen, Kaoru Ota, Mianxiong Dong:
Location Privacy in Usage-Based Automotive Insurance: Attacks and Countermeasures. 196-211 - Xuanxuan Tang, Yueming Cai, Yansha Deng, Yuzhen Huang, Wendong Yang, Weiwei Yang:
Energy-Constrained SWIPT Networks: Enhancing Physical Layer Security With FD Self-Jamming. 212-222 - Taeho Jung, Xiang-Yang Li, Wenchao Huang, Zhongying Qiao, Jianwei Qian, Linlin Chen, Junze Han, Jiahui Hou:
AccountTrade: Accountability Against Dishonest Big Data Buyers and Sellers. 223-234 - Wenjing Zhang, Ming Li, Ravi Tandon, Hui Li:
Online Location Trace Privacy: An Information Theoretic Approach. 235-250 - Shicheng Yang, Le Zhang, Lianghua He, Ying Wen:
Sparse Low-Rank Component-Based Representation for Face Recognition With Low-Quality Images. 251-261 - Bin Dai, Yuan Luo:
An Improved Feedback Coding Scheme for the Wire-Tap Channel. 262-271
Volume 14, Number 2, February 2019
- Adi Hajj-Ahmad, Chau-Wai Wong, Steven Gambino, Qiang Zhu, Miao Yu, Min Wu:
Factors Affecting ENF Capture in Audio. 277-288 - Faraz Ahmad Khan, Fouad Khelifi, Muhammad Atif Tahir, Ahmed Bouridane:
Dissimilarity Gaussian Mixture Models for Efficient Offline Handwritten Text-Independent Identification Using SIFT and RootSIFT Descriptors. 289-303 - Ravichandran Subramanian, Sudeep Sarkar:
Evaluation of Algorithms for Orientation Invariant Inertial Gait Matching. 304-318 - Libing Wu, Jing Wang, Kim-Kwang Raymond Choo, Debiao He:
Secure Key Agreement and Key Protection for Mobile Device User Authentication. 319-330 - Wenting Shen, Jing Qin, Jia Yu, Rong Hao, Jiankun Hu:
Enabling Identity-Based Integrity Auditing and Data Sharing With Sensitive Information Hiding for Secure Cloud Storage. 331-346 - Kaveh Shamsi, Travis Meade, Meng Li, David Z. Pan, Yier Jin:
On the Approximation Resiliency of Logic Locking and IC Camouflaging Schemes. 347-359 - Rig Das, Emanuela Piciucco, Emanuele Maiorana, Patrizio Campisi:
Convolutional Neural Network for Finger-Vein-Based Biometric Identification. 360-373 - Qian Wang, Jing Huang, Yanjiao Chen, Cong Wang, Fu Xiao, Xiangyang Luo:
PROST: Privacy-Preserving and Truthful Online Double Auction for Spectrum Allocation. 374-386 - Dongyang Xu, Pinyi Ren, James A. Ritcey:
Independence-Checking Coding for OFDM Channel Training Authentication: Protocol Design, Security, Stability, and Tradeoff Analysis. 387-402 - Nhan Duy Truong, Jing Yan Haw, Syed Muhamad Assad, Ping Koy Lam, Omid Kavehei:
Machine Learning Cryptanalysis of a Quantum Random Number Generator. 403-414 - Ben Nassi, Adi Shamir, Yuval Elovici:
Xerox Day Vulnerability. 415-430 - Ryota Nakai, Shinya Sugiura:
Physical Layer Security in Buffer-State-Based Max-Ratio Relay Selection Exploiting Broadcasting With Cooperative Beamforming and Jamming. 431-444 - Xiaofang Xia, Yang Xiao, Wei Liang:
ABSI: An Adaptive Binary Splitting Algorithm for Malicious Meter Inspection in Smart Grid. 445-458 - Yvonne Höller, Arne C. Bathke, Andreas Uhl:
Age, Sex, and Pathology Effects on Stability of Electroencephalographic Biometric Features Based on Measures of Interaction. 459-471 - Holger Boche, Christian Deppe:
Secure Identification Under Passive Eavesdroppers and Active Jamming Attacks. 472-485 - Qingyou Yang, Kaiping Xue, Jie Xu, Jiajie Wang, Fenghua Li, Nenghai Yu:
AnFRA: Anonymous and Fast Roaming Authentication for Space Information Network. 486-497 - Mehmet Necip Kurt, Yasin Yilmaz, Xiaodong Wang:
Real-Time Detection of Hybrid and Stealthy Cyber-Attacks in Smart Grid. 498-513 - Mohammad Reza Khalili Shoja, George T. Amariucai, Zhengdao Wang, Shuangqing Wei, Jing Deng:
On the Secret Key Capacity of Sibling Hidden Markov Models. 514-524 - Saman Feghhi, Douglas J. Leith:
An Efficient Web Traffic Defence Against Timing-Analysis Attacks. 525-540 - Muhammad Umar Karim Khan, Hyun Sang Park, Chong-Min Kyung:
Rejecting Motion Outliers for Efficient Crowd Anomaly Detection. 541-556
Volume 14, Number 3, March 2019
- Chunlei Zhang, Muaz Ahmad, Yongqiang Wang:
ADMM Based Privacy-Preserving Decentralized Optimization. 565-580 - Udit Satija, Nikita Trivedi, Gagarin Biswal, Barathram Ramkumar:
Specific Emitter Identification Based on Variational Mode Decomposition and Spectral Features in Single Hop and Relaying Scenarios. 581-591 - Dongyang Xu, Pinyi Ren, James A. Ritcey:
Hierarchical 2-D Feature Coding for Secure Pilot Authentication in Multi-User Multi-Antenna OFDM Systems: A Reliability Bound Contraction Perspective. 592-607 - Luca Bondi, Paolo Bestagini, Fernando Pérez-González, Stefano Tubaro:
Improving PRNU Compression Through Preprocessing, Quantization, and Coding. 608-620 - Zahra Mobini, Mohammadali Mohammadi, Chintha Tellambura:
Wireless-Powered Full-Duplex Relay and Friendly Jamming for Secure Cooperative Communications. 621-634 - Massimo Iuliani, Dasara Shullani, Marco Fontani, Saverio Meucci, Alessandro Piva:
A Video Forensic Framework for the Unsupervised Analysis of MP4-Like File Container. 635-645 - Yuqing Li, Wenkuan Dai, Jie Bai, Xiaoying Gan, Jingchao Wang, Xinbing Wang:
An Intelligence-Driven Security-Aware Defense Mechanism for Advanced Persistent Threats. 646-661 - Chenhao Lin, Ajay Kumar:
A CNN-Based Framework for Comparison of Contactless to Contact-Based Fingerprints. 662-676 - Junyang Bai, Weiping Wang, Yan Qin, Shigeng Zhang, Jianxin Wang, Yi Pan:
BridgeTaint: A Bi-Directional Dynamic Taint Tracking Method for JavaScript Bridges in Android Hybrid Applications. 677-692 - Chenyu Wang, Bihuan Chen, Yang Liu, Hongjun Wu:
Layered Object-Oriented Programming: Advanced VTable Reuse Attacks on Binary-Level Defense. 693-708 - Harkeerat Kaur, Pritee Khanna:
Random Distance Method for Generating Unimodal and Multimodal Cancelable Biometric Features. 709-719 - Zhe Liu, Hwajeong Seo:
IoT-NUMS: Evaluating NUMS Elliptic Curve Cryptography for IoT Platforms. 720-729 - Attilio Fiandrotti, Rossano Gaeta, Marco Grangetto:
Securing Network Coding Architectures Against Pollution Attacks With Band Codes. 730-742 - Emir Erdem, Mehmet Tahir Sandikkaya:
OTPaaS - One Time Password as a Service. 743-756 - Fania Mokhayeri, Eric Granger, Guillaume-Alexandre Bilodeau:
Domain-Specific Face Synthesis for Video Face Recognition From a Single Sample Per Person. 757-772 - TaeGuen Kim, BooJoong Kang, Mina Rho, Sakir Sezer, Eul Gyu Im:
A Multimodal Deep Learning Method for Android Malware Detection Using Various Features. 773-788 - Jianting Ning, Jia Xu, Kaitai Liang, Fan Zhang, Ee-Chien Chang:
Passive Attacks Against Searchable Encryption. 789-802 - Peter Samarin, Kerstin Lemke-Rust:
Detection of Counterfeit ICs Using Public Identification Sequences and Side-Channel Leakage. 803-813 - Lei Xue, Chenxiong Qian, Hao Zhou, Xiapu Luo, Yajin Zhou, Yuru Shao, Alvin T. S. Chan:
NDroid: Toward Tracking Information Flows Across Multiple Android Contexts. 814-828
Volume 14, Number 4, April 2019
- Yuhong Liu, Na Li:
Retrieving Hidden Friends: A Collusion Privacy Attack Against Online Friend Search Engine. 833-847 - Sanjay Karmakar, Anirban Ghosh:
Secrecy Capacity Region of Fading Binary Z Interference Channel With Statistical CSIT. 848-857 - Wenxiong Kang, Yuting Lu, Dejian Li, Wei Jia:
From Noise to Feature: Exploiting Intensity Distribution as a Novel Soft Biometric Trait for Finger Vein Recognition. 858-869 - Guowen Xu, Hongwei Li, Yuanshun Dai, Kan Yang, Xiaodong Lin:
Enabling Efficient and Geometric Range Query With Access Control Over Encrypted Spatial Data. 870-885 - Sivaram Prasad Mudunuri, Shashanka Venkataramanan, Soma Biswas:
Dictionary Alignment With Re-Ranking for Low-Resolution NIR-VIS Face Recognition. 886-896 - Vijay Varadharajan, Kallol Krishna Karmakar, Udaya Kiran Tupakula, Michael Hitchens:
A Policy-Based Security Architecture for Software-Defined Networks. 897-912 - Qing Yang, Ge Peng, Paolo Gasti, Kiran S. Balagani, Yantao Li, Gang Zhou:
MEG: Memory and Energy Efficient Garbled Circuit Evaluation on Smartphones. 913-922 - Rui Shao, Xiangyuan Lan, Pong C. Yuen:
Joint Discriminative Learning of Deep Dynamic Textures for 3D Mask Face Anti-Spoofing. 923-938 - Changhai Ou, Zhu Wang, Degang Sun, Xinping Zhou:
Group Collision Attack. 939-953 - Sayandeep Saha, Dirmanto Jap, Sikhar Patranabis, Debdeep Mukhopadhyay, Shivam Bhasin, Pallab Dasgupta:
Automatic Characterization of Exploitable Faults: A Machine Learning Approach. 954-968 - Mohammed Adil Abbas, Hojin Song, Jun-Pyo Hong:
Opportunistic Scheduling for Average Secrecy Rate Enhancement in Fading Downlink Channel With Potential Eavesdroppers. 969-980 - Ángeles Vázquez-Castro, Masahito Hayashi:
Physical Layer Security for RF Satellite Channels in the Finite-Length Regime. 981-993 - Pierre-Francois Marteau:
Sequence Covering for Efficient Host-Based Intrusion Detection. 994-1006 - Xing Hu, Yingping Huang, Xiumin Gao, Lingkun Luo, Qianqian Duan:
Squirrel-Cage Local Binary Pattern and Its Application in Video Anomaly Detection. 1007-1022 - Ali Akbar Pammu, Weng-Geng Ho, Ne Kyaw Zwa Lwin, Kwen-Siong Chong, Bah-Hwee Gwee:
A High Throughput and Secure Authentication-Encryption AES-CCM Algorithm on Asynchronous Multicore Processor. 1023-1036 - Bogdan Groza, Pal-Stefan Murvay:
Efficient Intrusion Detection With Bloom Filtering in Controller Area Networks. 1037-1051 - Kejiang Chen, Hang Zhou, Wenbo Zhou, Weiming Zhang, Nenghai Yu:
Defining Cost Functions for Adaptive JPEG Steganography at the Microscale. 1052-1066 - Tengku Mohd Afendi Zulcaffle, Fatih Kurugollu, Danny Crookes, Ahmed Bouridane, Mohsen Farid:
Frontal View Gait Recognition With Fusion of Depth Features From a Time of Flight Camera. 1067-1082 - Mirco Marchetti, Dario Stabili:
READ: Reverse Engineering of Automotive Data Frames. 1083-1097 - Zhuotao Liu, Yuan Cao, Min Zhu, Wei Ge:
Umbrella: Enabling ISPs to Offer Readily Deployable and Privacy-Preserving DDoS Prevention Services. 1098-1108 - Siarhei S. Zalivaka, Alexander A. Ivaniuk, Chip-Hong Chang:
Reliable and Modeling Attack Resistant Authentication of Arbiter PUF in FPGA Implementation With Trinary Quadruple Response. 1109-1123
Volume 14, Number 5, May 2019
- Sofia Belikovetsky, Yosef A. Solewicz, Mark Yampolskiy, Jinghui Toh, Yuval Elovici:
Digital Audio Signature for 3D Printing Integrity. 1127-1141 - Duo Li, Xiao-Ping (Steven) Zhang, Menghan Hu, Guangtao Zhai, Xiaokang Yang:
Physical Password Breaking via Thermal Sequence Analysis. 1142-1154 - Ankit Shah, Rajesh Ganesan, Sushil Jajodia, Hasan Cam:
Understanding Tradeoffs Between Throughput, Quality, and Cost of Alert Analysis in a CSOC. 1155-1170 - Zhenghui Liu, Yuankun Huang, Jiwu Huang:
Patchwork-Based Audio Watermarking Robust Against De-Synchronization and Recapturing Attacks. 1171-1180 - Mehdi Boroumand, Mo Chen, Jessica J. Fridrich:
Deep Residual Network for Steganalysis of Digital Images. 1181-1193 - Gurinder Singh, Kulbir Singh:
Counter JPEG Anti-Forensic Approach Based on the Second-Order Statistical Analysis. 1194-1209 - Lu Yang, Gongping Yang, Xiaoming Xi, Kun Su, Qing Chen, Yilong Yin:
Finger Vein Code: From Indexing to Matching. 1210-1223 - Rick Fritschek, Gerhard Wunder:
On the Gaussian Multiple Access Wiretap Channel and the Gaussian Wiretap Channel With a Helper: Achievable Schemes and Upper Bounds. 1224-1239 - Pramuditha Perera, Vishal M. Patel:
Face-Based Multiple User Active Authentication on Mobile Devices. 1240-1250 - Berk Akgun, Marwan Krunz, Onur Ozan Koyluoglu:
Vulnerabilities of Massive MIMO Systems to Pilot Contamination Attacks. 1251-1263 - Kazuaki Nakamura, Naoko Nitta, Noboru Babaguchi:
Encryption-Free Framework of Privacy-Preserving Image Recognition for Photo-Based Information Services. 1264-1279 - Zhongliang Yang, Xiaoqing Guo, Zi-Ming Chen, Yongfeng Huang, Yu-Jin Zhang:
RNN-Stega: Linguistic Steganography Based on Recurrent Neural Networks. 1280-1295 - James Shey, Justin A. Blanco, T. Owens Walker, Thomas W. Tedesso, Hau T. Ngo, Ryan N. Rakvic, Kevin D. Fairbanks:
Monitoring Device Current to Characterize Trim Operations of Solid-State Drives. 1296-1306 - Yuanman Li, Jiantao Zhou:
Fast and Effective Image Copy-Move Forgery Detection via Hierarchical Feature Point Matching. 1307-1322 - Shun-Chi Wu, Peng-Tzu Chen, A. Lee Swindlehurst, Pei-Lun Hung:
Cancelable Biometric Recognition With ECGs: Subspace-Based Approaches. 1323-1336 - Zhen Hong, Rui Wang, Shouling Ji, Raheem Beyah:
Attacker Location Evaluation-Based Fake Source Scheduling for Source Location Privacy in Cyber-Physical Systems. 1337-1350 - Javier Galbally, Rudolf Haraksim, Laurent Beslay:
A Study of Age and Ageing in Fingerprint Biometrics. 1351-1365 - Christina L. Ting, Richard V. Field Jr., Andrew Fisher, Travis L. Bauer:
Compression Analytics for Classification and Anomaly Detection Within Network Communication. 1366-1376 - Vincent Y. F. Tan, Si-Hyeon Lee:
Time-Division is Optimal for Covert Communication Over Some Broadcast Channels. 1377-1389 - Tian Wang, Meina Qiao, Zhiwei Lin, Ce Li, Hichem Snoussi, Zhe Liu, Chang Choi:
Generative Neural Networks for Anomaly Detection in Crowded Scenes. 1390-1399
Volume 14, Number 6, June 2019
- Han Fang, Weiming Zhang, Hang Zhou, Hao Cui, Nenghai Yu:
Screen-Shooting Resilient Watermarking. 1403-1418 - Andrey Kuehlkamp, Allan da Silva Pinto, Anderson Rocha, Kevin W. Bowyer, Adam Czajka:
Ensemble of Multi-View Learning Classifiers for Cross-Domain Iris Presentation Attack Detection. 1419-1431 - Hannes Mareen, Johan De Praeter, Glenn Van Wallendael, Peter Lambert:
A Scalable Architecture for Uncompressed-Domain Watermarked Videos. 1432-1444 - Liran Lerman, Olivier Markowitch:
Efficient Profiled Attacks on Masking Schemes. 1445-1454 - Haipeng Cai, Na Meng, Barbara G. Ryder, Danfeng Yao:
DroidCat: Effective Android Malware Detection and Categorization via App-Level Profiling. 1455-1470 - Muhammad Ejaz Ahmed, Saeed Ullah, Hyoungshick Kim:
Statistical Application Fingerprinting for DDoS Attack Mitigation. 1471-1484 - Di Zhuang, J. Morris Chang:
Enhanced PeerHunter: Detecting Peer-to-Peer Botnets Through Network-Flow Level Community Behavior Analysis. 1485-1500 - Mateusz Trokielewicz, Adam Czajka, Piotr Maciejewicz:
Iris Recognition After Death. 1501-1514 - Tatsuya Chuman, Warit Sirichotedumrong, Hitoshi Kiya:
Encryption-Then-Compression Systems Using Grayscale-Based Image Encryption for JPEG Images. 1515-1525 - Iman Vakilinia, Shamik Sengupta:
A Coalitional Cyber-Insurance Framework for a Common Platform. 1526-1538 - Lewis D. Griffin, Matthew Caldwell, Jerone T. A. Andrews, Helene Bohler:
"Unexpected Item in the Bagging Area": Anomaly Detection in X-Ray Security Images. 1539-1553 - Prosanta Gope, Biplab Sikdar:
Lightweight and Privacy-Friendly Spatial Data Aggregation for Secure Power Supply and Demand Management in Smart Grids. 1554-1566 - Zuxing Li, Tobias J. Oechtering, Deniz Gündüz:
Privacy Against a Hypothesis Testing Adversary. 1567-1581 - Jun Du, Erol Gelenbe, Chunxiao Jiang, Haijun Zhang, Yong Ren, H. Vincent Poor:
Peer Prediction-Based Trustworthiness Evaluation and Trustworthy Service Rating in Social Networks. 1582-1594 - Zhenyu Ning, Fengwei Zhang:
Hardware-Assisted Transparent Tracing and Debugging on ARM. 1595-1609 - Tinghan Yang, Rongqing Zhang, Xiang Cheng, Liuqing Yang:
Secure Massive MIMO Under Imperfect CSI: Performance Analysis and Channel Prediction. 1610-1623 - Songxuan Lai, Lianwen Jin:
Recurrent Adaptation Networks for Online Signature Verification. 1624-1637 - Yisroel Mirsky, Naor Kalbo, Yuval Elovici, Asaf Shabtai:
Vesper: Using Echo Analysis to Detect Man-in-the-Middle Attacks in LANs. 1638-1653 - Jeffrey Pawlick, Juntao Chen, Quanyan Zhu:
iSTRICT: An Interdependent Strategic Trust Mechanism for the Cloud-Enabled Internet of Controlled Things. 1654-1669 - Youhong Feng, Shihao Yan, Chenxi Liu, Zhen Yang, Nan Yang:
Two-Stage Relay Selection for Enhancing Physical Layer Security in Non-Orthogonal Multiple Access. 1670-1683
Volume 14, Number 7, July 2019
- Shuangke Wu, Yanjiao Chen, Qian Wang, Minghui Li, Cong Wang, Xiangyang Luo:
CReam: A Smart Contract Enabled Collusion-Resistant e-Auction. 1687-1701 - Hugo Proença, João C. Neves:
A Reminiscence of "Mastermind": Iris/Periocular Biometrics by "In-Set" CNN Iterative Analysis. 1702-1712 - Lu-Xing Yang, Pengdeng Li, Yushu Zhang, Xiaofan Yang, Yong Xiang, Wanlei Zhou:
Effective Repair Strategy Against Advanced Persistent Threat: A Differential Game Approach. 1713-1728 - Jianwu Wan, Yi Wang:
Cost-Sensitive Label Propagation for Semi-Supervised Face Recognition. 1729-1743 - Thiago M. Paixão, Maria C. S. Boeres, Cinthia O. A. Freitas, Thiago Oliveira-Santos:
Exploring Character Shapes for Unsupervised Reconstruction of Strip-Shredded Text Documents. 1744-1754 - Dawei Zhao, Lianhai Wang, Zhen Wang, Gaoxi Xiao:
Virus Propagation and Patch Distribution in Multiplex Networks: Modeling, Analysis, and Optimal Allocation. 1755-1767 - Seong Tae Kim, Yong Man Ro:
Attended Relation Feature Representation of Facial Dynamics for Facial Authentication. 1768-1778 - Yujue Wang, Yong Ding, Qianhong Wu, Yongzhuang Wei, Bo Qin, Huiyong Wang:
Privacy-Preserving Cloud-Based Road Condition Monitoring With Source Authentication in VANETs. 1779-1790 - Yuchuan Luo, Xiaohua Jia, Shaojing Fu, Ming Xu:
pRide: Privacy-Preserving Ride Matching Over Road Networks for Online Ride-Hailing Service. 1791-1802 - Tiago de Freitas Pereira, André Anjos, Sébastien Marcel:
Heterogeneous Face Recognition Using Domain Specific Units. 1803-1816 - Xiaoli Sun, Weiwei Yang, Yueming Cai, Liwei Tao, Yang Liu, Yongming Huang:
Secure Transmissions in Wireless Information and Power Transfer Millimeter-Wave Ultra-Dense Networks. 1817-1829 - Yaxing Chen, Wenhai Sun, Ning Zhang, Qinghua Zheng, Wenjing Lou, Y. Thomas Hou:
Towards Efficient Fine-Grained Access Control and Trustworthy Data Processing for Remote Monitoring Services in IoT. 1830-1842 - Zengzhen Zhao, Qingxiao Guan, Hong Zhang, Xianfeng Zhao:
Improving the Robustness of Adaptive Steganographic Algorithms Based on Transport Channel Matching. 1843-1856 - Ankit Shah, Rajesh Ganesan, Sushil Jajodia, Hasan Cam:
A Two-Step Approach to Optimal Selection of Alerts for Investigation in a CSOC. 1857-1870 - Jeffrey Pawlick, Edward Colbert, Quanyan Zhu:
Modeling and Analysis of Leaky Deception Using Signaling Games With Evidence. 1871-1886 - Yansong Gao, Yang Su, Lei Xu, Damith Chinthana Ranasinghe:
Lightweight (Reverse) Fuzzy Extractor With Multiple Reference PUF Responses. 1887-1901 - Quoc-Tin Phan, Giulia Boato, Francesco G. B. De Natale:
Accurate and Scalable Image Clustering Based on Sparse Representation of Camera Fingerprint. 1902-1916 - Yi Yu, Feipeng Da, Yifan Guo:
Sparse ICP With Resampling and Denoising for 3D Face Verification. 1917-1927 - Cecilia Pasquini, Rainer Böhme:
Information-Theoretic Bounds for the Forensic Detection of Downscaled Signals. 1928-1943 - Guozhu Meng, Matthew Patrick, Yinxing Xue, Yang Liu, Jie Zhang:
Securing Android App Markets via Modeling and Predicting Malware Spread Between Markets. 1944-1959
Volume 14, Number 8, August 2019
- Robin Richter, Carsten Gottschlich, Lucas Mentch, Duy Hoang Thai, Stephan F. Huckemann:
Smudge Noise for Quality Estimation of Fingerprints and its Validation. 1963-1974 - Nour Moustafa, Kim-Kwang Raymond Choo, Ibrahim Radwan, Seyit Camtepe:
Outlier Dirichlet Mixture Mechanism: Adversarial Statistical Learning for Anomaly Detection in the Fog. 1975-1987 - Kamal Taha, Paul D. Yoo:
Shortlisting the Influential Members of Criminal Organizations and Identifying Their Important Communication Channels. 1988-1999 - Pei Li, Loreto Prieto, Domingo Mery, Patrick J. Flynn:
On Low-Resolution Face Recognition in the Wild: Comparisons and New Techniques. 2000-2012 - Sebastian Baur, Christian Deppe, Holger Boche:
Secure Storage for Identification; Random Resources and Privacy Leakage. 2013-2027 - Jie Cao, Yibo Hu, Bing Yu, Ran He, Zhenan Sun:
3D Aided Duet GANs for Multi-View Face Image Synthesis. 2028-2042 - Jeroen Delvaux:
Machine-Learning Attacks on PolyPUFs, OB-PUFs, RPUFs, LHS-PUFs, and PUF-FSMs. 2043-2058 - Alessio Zappone, Pin-Hsun Lin, Eduard A. Jorswieck:
Secrecy Energy Efficiency for MIMO Single- and Multi-Cell Downlink Transmission With Confidential Messages. 2059-2073 - Weixuan Tang, Bin Li, Shunquan Tan, Mauro Barni, Jiwu Huang:
CNN-Based Adversarial Embedding for Image Steganography. 2074-2087 - Xiazhi Lai, Lisheng Fan, Xianfu Lei, Jin Li, Nan Yang, George K. Karagiannidis:
Distributed Secure Switch-and-Stay Combining Over Correlated Fading Channels. 2088-2101 - Joseph Thompson, Patrick J. Flynn, Christopher Boehnen, Hector J. Santos-Villalobos:
Assessing the Impact of Corneal Refraction and Iris Tissue Non-Planarity on Iris Recognition. 2102-2112 - Abubakar Sadiq Sani, Dong Yuan, Wei Bao, Zhao Yang Dong, Branka Vucetic, Elisa Bertino:
Universally Composable Key Bootstrapping and Secure Communication Protocols for the Energy Internet. 2113-2127 - Willie K. Harrison, Telmo R. Fernandes, Marco A. C. Gomes, João P. Vilela:
Generating a Binary Symmetric Channel for Wiretap Codes. 2128-2138 - S. Sundeep Desai, Manisha J. Nene:
Node-Level Trust Evaluation in Wireless Sensor Networks. 2139-2152 - Luiz G. Hafemann, Robert Sabourin, Luiz S. Oliveira:
Characterizing and Evaluating Adversarial Examples for Offline Handwritten Signature Verification. 2153-2166 - Alexandre Bartel, Jacques Klein, Yves Le Traon:
Musti: Dynamic Prevention of Invalid Object Initialization Attacks. 2167-2178 - José Camacho, Gabriel Maciá-Fernández, Noemí Marta Fuentes García, Edoardo Saccenti:
Semi-Supervised Multivariate Statistical Network Monitoring for Learning Security Threats. 2179-2189 - Meysam Mirzaee, Soroush Akhlaghi:
Maximizing the Minimum Achievable Secrecy Rate for a Two-User Gaussian Weak Interference Channel. 2190-2202 - Michael Kiperberg, Roee Leon, Amit Resh, Asaf Algawi, Nezer J. Zaidenberg:
Hypervisor-Based Protection of Code. 2203-2216 - Xiaowei Yi, Kun Yang, Xianfeng Zhao, Yuntao Wang, Haibo Yu:
AHCM: Adaptive Huffman Code Mapping for Audio Steganography Based on Psychoacoustic Model. 2217-2231 - Masahiro Kaminaga, Toshinori Suzuki, Masaharu Fukase:
Determining the Optimal Random-Padding Size for Rabin Cryptosystems. 2232-2242
Volume 14, Number 9, September 2019
- Lei Li, Zhaoqiang Xia, Abdenour Hadid, Xiaoyue Jiang, Haixi Zhang, Xiaoyi Feng:
Replayed Video Attack Detection Based on Motion Blur Analysis. 2246-2261 - Saffet Vatansever, Ahmet Emir Dirik, Nasir D. Memon:
Analysis of Rolling Shutter Effect on ENF-Based Video Forensics. 2262-2275 - Lieneke Kusters, Frans M. J. Willems:
Secret-Key Capacity Regions for Multiple Enrollments With an SRAM-PUF. 2276-2287 - Salman Salamatian, Wasim Huleihel, Ahmad Beirami, Asaf Cohen, Muriel Médard:
Why Botnets Work: Distributed Brute-Force Attacks Need No Synchronization. 2288-2299 - Xuhang Ying, Sang Uk Sagong, Andrew Clark, Linda Bushnell, Radha Poovendran:
Shape of the Cloak: Formal Analysis of Clock Skew-Based Intrusion Detection System in Controller Area Networks. 2300-2314 - Mengyuan Zhang, Xavier de Carné de Carnavalet, Lingyu Wang, Ahmed Ragab:
Large-Scale Empirical Study of Important Features Indicative of Discovered Vulnerabilities to Assess Application Security. 2315-2330 - Qi Yan, Rui Yang, Jiwu Huang:
Robust Copy-Move Detection of Speech Recording Using Similarities of Pitch and Formant. 2331-2341 - Yanan Li, Xuebin Ren, Shusen Yang, Xinyu Yang:
Impact of Prior Knowledge and Data Correlation on Privacy Leakage: A Unified Analysis. 2342-2357 - Chugui Xu, Ju Ren, Deyu Zhang, Yaoxue Zhang, Zhan Qin, Kui Ren:
GANobfuscator: Mitigating Information Leakage Under GAN via Differential Privacy. 2358-2371 - Emre Durmus, Pawel Korus, Nasir D. Memon:
Every Shred Helps: Assembling Evidence From Orphaned JPEG Fragments. 2372-2386 - Shengbo Xu, Weiyang Xu, Cunhua Pan, Maged Elkashlan:
Detection of Jamming Attack in Non-Coherent Massive SIMO Systems. 2387-2399 - Fei Peng, Zi-Xing Lin, Xiang Zhang, Min Long:
Reversible Data Hiding in Encrypted 2D Vector Graphics Based on Reversible Mapping Model for Real Numbers. 2400-2411 - Muhammad Junaid Farooq, Quanyan Zhu:
Modeling, Analysis, and Mitigation of Dynamic Botnet Formation in Wireless IoT Networks. 2412-2426 - Zezhi Wu, Xingyuan Chen, Zhi Yang, Xuehui Du:
Reducing Security Risks of Suspicious Data and Codes Through a Novel Dynamic Defense Model. 2427-2440 - Qi Yan, Rui Yang, Jiwu Huang:
Detection of Speech Smoothing on Very Short Clips. 2441-2453 - Zhipeng Chen, Benedetta Tondi, Xiaolong Li, Rongrong Ni, Yao Zhao, Mauro Barni:
Secure Detection of Image Manipulation by Means of Random Feature Selection. 2454-2469 - Tan N. Nguyen, Hoang Long Mai, Rémi Cogranne, Guillaume Doyen, Wissam Mallouli, Luong Nguyen, Moustapha El Aoun, Edgardo Montes de Oca, Olivier Festor:
Reliable Detection of Interest Flooding Attack in Real Deployment of Named Data Networking. 2470-2485 - Yitao Han, Lingjie Duan, Rui Zhang:
Jamming-Assisted Eavesdropping Over Parallel Fading Channels. 2486-2499 - Jiucheng Xie, Chi-Man Pun:
Chronological Age Estimation Under the Guidance of Age-Related Facial Attributes. 2500-2511 - Wenming Yang, Changqing Hui, Zhiquan Chen, Jing-Hao Xue, Qingmin Liao:
FV-GAN: Finger Vein Representation Using Generative Adversarial Networks. 2512-2524
Volume 14, Number 10, October 2019
- Lee Friedman, Oleg V. Komogortsev:
Assessment of the Effectiveness of Seven Biometric Feature Normalization Techniques. 2528-2536 - Joey Tianyi Zhou, Jiawei Du, Hongyuan Zhu, Xi Peng, Yong Liu, Rick Siow Mong Goh:
AnomalyNet: An Anomaly Detection Network for Video Surveillance. 2537-2550 - Yaqi Liu, Xiaobin Zhu, Xianfeng Zhao, Yun Cao:
Adversarial Learning for Constrained Image Splicing Detection and Localization Based on Atrous Convolution. 2551-2566 - Farhad Farokhi:
Development and Analysis of Deterministic Privacy-Preserving Policies Using Non- Stochastic Information Theory. 2567-2576 - Seokeon Choi, Jonghee Kim, Wonjun Kim, Changick Kim:
Skeleton-Based Gait Recognition via Robust Frame-Level Matching. 2577-2592 - Bin Qiu, Mingliang Tao, Ling Wang, Jian Xie, Yuexian Wang:
Multi-Beam Directional Modulation Synthesis Scheme Based on Frequency Diverse Array. 2593-2606 - Kai-Hsiang Hsu, Yu-Hsi Chiang, Hsu-Chun Hsiao:
SafeChain: Securing Trigger-Action Programming From Attack Chains. 2607-2622 - Aleksander Essex:
Secure Approximate String Matching for Privacy-Preserving Record Linkage. 2623-2632 - Sunghwan Cho, Gaojie Chen, Justin P. Coon:
Enhancement of Physical Layer Security With Simultaneous Beamforming and Jamming for Visible Light Communication Systems. 2633-2648 - Yanzhen Ren, Hanyi Yang, Hongxia Wu, Weiping Tu, Lina Wang:
A Secure AMR Fixed Codebook Steganographic Scheme Based on Pulse Distribution Model. 2649-2661 - Ribhu Chopra, Chandra R. Murthy, Ramesh Annavajjala:
Physical Layer Security in Wireless Sensor Networks Using Distributed Co-Phasing. 2662-2675 - Min Jiang, Guodong Guo:
Body Weight Analysis From Human Body Images. 2676-2688 - Anna Engelmann, Admela Jukan:
Toward All-Optical Layered Encryption: A Feasibility Analysis of Optical Stream Cipher. 2689-2704 - Nguyen Binh Truong, Gyu Myoung Lee, Tai-Won Um, Michael Mackay:
Trust Evaluation Mechanism for User Recruitment in Mobile Crowd-Sensing in the Internet of Things. 2705-2719 - Kiruba Sankaran Subramani, Angelos Antonopoulos, Ahmed Attia Abotabl, Aria Nosratinia, Yiorgos Makris:
Demonstrating and Mitigating the Risk of an FEC-Based Hardware Trojan in Wireless Networks. 2720-2734 - Jishen Zeng, Shunquan Tan, Guangqing Liu, Bin Li, Jiwu Huang:
WISERNet: Wider Separate-Then-Reunion Network for Steganalysis of Color Images. 2735-2748 - Anyi Liu, Huirong Fu, Yuan Hong, Jigang Liu, Yingjiu Li:
LiveForen: Ensuring Live Forensic Integrity in the Cloud. 2749-2764 - Saeed Ahmed, Youngdoo Lee, Seung Ho Hyun, Insoo Koo:
Unsupervised Machine Learning-Based Detection of Covert Data Integrity Assault in Smart Grid Networks Utilizing Isolation Forest. 2765-2777 - Fangfei Yang, Ming Tang, Ozgur Sinanoglu:
Stripped Functionality Logic Locking With Hamming Distance-Based Restore Unit (SFLL-hd) - Unlocked. 2778-2786 - Keerthi Suria Kumar Arumugam, Matthieu R. Bloch:
Embedding Covert Information in Broadcast Communications. 2787-2801
Volume 14, Number 11, November 2019
- Zhili Chen, Tianjiao Ni, Hong Zhong, Shun Zhang, Jie Cui:
Differentially Private Double Spectrum Auction With Approximate Social Welfare Maximization. 2805-2818 - Dhanushka Kudathanthirige, Santosh Timilsina, Gayan Amarasuriya Aruma Baduge:
Secure Communication in Relay-Assisted Massive MIMO Downlink With Active Pilot Attacks. 2819-2833 - Enrique Argones-Rúa, Aysajan Abidin, Roel Peeters, Jac Romme:
Efficient and Privacy-Preserving Cryptographic Key Derivation From Continuous Sources. 2834-2847 - Onur Günlü, Onurcan Iscan, Vladimir Sidorenko, Gerhard Kramer:
Code Constructions for Physical Unclonable Functions and Biometric Secrecy Systems. 2848-2858 - Haoyu Ma, Chunfu Jia, Shijia Li, Wantong Zheng, Dinghao Wu:
Xmark: Dynamic Software Watermarking Using Collatz Conjecture. 2859-2874 - Yuechi Jiang, Frank H. F. Leung:
Source Microphone Recognition Aided by a Kernel-Based Projection Method. 2875-2886 - Yuan Ma, Tianyu Chen, Jingqiang Lin, Jing Yang, Jiwu Jing:
Entropy Estimation for ADC Sampling-Based True Random Number Generators. 2887-2900 - Mohammed Shayan, Sukanta Bhattacharjee, Jack Tang, Krishnendu Chakrabarty, Ramesh Karri:
Bio-Protocol Watermarking on Digital Microfluidic Biochips. 2901-2915 - Fran Casino, Kim-Kwang Raymond Choo, Constantinos Patsakis:
HEDGE: Efficient Traffic Classification of Encrypted and Compressed Packets. 2916-2926 - Yingjie Xue, Kaiping Xue, Na Gai, Jianan Hong, David S. L. Wei, Peilin Hong:
An Attribute-Based Controlled Collaborative Access Control Scheme for Public Cloud Storage. 2927-2942 - Peipei Li, Yibo Hu, Ran He, Zhenan Sun:
Global and Local Consistent Wavelet-Domain Age Synthesis. 2943-2957 - Juntao Chen, Quanyan Zhu:
Interdependent Strategic Security Risk Management With Bounded Rationality in the Internet of Things. 2958-2971 - Debanjan Sadhya, Balasubramanian Raman:
Generation of Cancelable Iris Templates via Randomized Bit Sampling. 2972-2986 - Zhongjie Ba, Zhan Qin, Xinwen Fu, Kui Ren:
CIM: Camera in Motion for Smartphone Authentication. 2987-3002 - Le Trieu Phong, Tran Thi Phuong:
Privacy-Preserving Deep Learning via Weight Transmission. 3003-3015 - Eunsoo Park, Xuenan Cui, Thi Hai Binh Nguyen, Hakil Kim:
Presentation Attack Detection Using a Tiny Fully Convolutional Network. 3016-3025 - Jinchuan Tang, Gaojie Chen, Justin P. Coon:
Secrecy Performance Analysis of Wireless Communications in the Presence of UAV Jammer and Randomly Located UAV Eavesdroppers. 3026-3041 - Bagus Santoso, Yasutada Oohama:
Secrecy Amplification of Distributed Encrypted Sources With Correlated Keys Using Post-Encryption-Compression. 3042-3056 - Annushree Bablani, Damodar Reddy Edla, Diwakar Tripathi, Shubham Dodia, Sridhar Chintala:
A Synergistic Concealed Information Test With Novel Approach for EEG Channel Selection and SVM Parameter Optimization. 3057-3068 - Weijia Wang, Yu Yu, François-Xavier Standaert:
Provable Order Amplification for Code-Based Masking: How to Avoid Non-Linear Leakages Due to Masked Operations. 3069-3082
Volume 14, Number 12, December 2019
- Diksha Shukla, Vir V. Phoha:
Stealing Passwords by Observing Hands Movement. 3086-3101 - Sudip Vhaduri, Christian Poellabauer:
Multi-Modal Biometric-Based Implicit Authentication of Wearable Device Users. 3116-3125 - Jinyuan Chen, Fan Li:
Adding a Helper Can Totally Remove the Secrecy Constraints in a Two-User Interference Channel. 3126-3139 - Dexing Zhong, Huikai Shao, Xuefeng Du:
A Hand-Based Multi-Biometrics via Deep Hashing Network and Biometric Graph Matching. 3140-3150 - Zhengmin Kong, Shaoshi Yang, Die Wang, Lajos Hanzo:
Robust Beamforming and Jamming for Enhancing the Physical Layer Security of Full Duplex Radios. 3151-3159 - Angelo Genovese, Vincenzo Piuri, Konstantinos N. Plataniotis, Fabio Scotti:
PalmNet: Gabor-PCA Convolutional Networks for Touchless Palmprint Recognition. 3160-3174 - Alejandro Calleja, Juan Tapiador, Juan Caballero:
The MalSource Dataset: Quantifying Complexity and Code Reuse in Malware Development. 3175-3190 - Lu Lv, Fuhui Zhou, Jian Chen, Naofal Al-Dhahir:
Secure Cooperative Communications With an Untrusted Relay: A NOMA-Inspired Jamming and Relaying Approach. 3191-3205 - Hongze Zhao, Yijun Wang, Zhiduo Liu, Weihua Pei, Hongda Chen:
Individual Identification Based on Code-Modulated Visual-Evoked Potentials. 3206-3216 - Jose David Mireles, Eric Ficke, Jin-Hee Cho, Patrick M. Hurley, Shouhuai Xu:
Metrics Towards Measuring Cyber Agility. 3217-3232 - Kuo Wang, Ajay Kumar:
Toward More Accurate Iris Recognition Using Dilated Residual Features. 3233-3245 - Xiang Li, Yasushi Makihara, Chi Xu, Yasushi Yagi, Mingwu Ren:
Joint Intensity Transformer Network for Gait Recognition Robust Against Clothing and Carrying Status. 3102-3115 - Christian Kison, Omar Mohamed Awad, Marc Fyrbiak, Christof Paar:
Security Implications of Intentional Capacitive Crosstalk. 3246-3258 - Min Wang, Heba El-Fiqi, Jiankun Hu, Hussein A. Abbass:
Convolutional Neural Networks Using Dynamic Functional Connectivity for EEG-Based Person Identification in Diverse Human States. 3259-3272 - Richeng Jin, Xiaofan He, Huaiyu Dai:
On the Security-Privacy Tradeoff in Collaborative Security: A Quantitative Information Flow Game Perspective. 3273-3286 - Muhammad Taqi Raza, Songwu Lu, Mario Gerla:
vEPC-sec: Securing LTE Network Functions Virtualization on Public Cloud. 3287-3297 - Josep Domingo-Ferrer, Jordi Soria-Comas, Rafael Mulero-Vellido:
Steered Microaggregation as a Unified Primitive to Anonymize Data Sets and Data Streams. 3298-3311 - Seyed Mohammad Hosseini, Amir Hossein Jahangir, Mehdi Kazemi:
Digesting Network Traffic for Forensic Investigation Using Digital Signal Processing Techniques. 3312-3321 - Yanwei Pang, Jiale Cao, Jian Wang, Jungong Han:
JCS-Net: Joint Classification and Super-Resolution Network for Small-Scale Pedestrian Detection in Surveillance Images. 3322-3331 - Yu-Chi Chen, Tsung-Hsuan Hung, Sung-Hsien Hsieh, Chih-Wei Shiu:
A New Reversible Data Hiding in Encrypted Image Based on Multi-Secret Sharing and Lightweight Cryptographic Algorithms. 3332-3343 - Xiaowei Li, Dengqi Yang, Xing Zeng, Benhui Chen, Yuqing Zhang:
Comments on "Provably Secure Dynamic Id-Based Anonymous Two-Factor Authenticated Key Exchange Protocol With Extended Security Model". 3344-3345
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.