default search action
IEEE Transactions on Information Forensics and Security, Volume 12
Volume 12, Number 1, January 2017
- Anderson Rocha, Walter J. Scheirer, Christopher W. Forstall, Thiago Cavalcante, Antonio Theophilo, Bingyu Shen, Ariadne Carvalho, Efstathios Stamatatos:
Authorship Attribution for Social Media Forensics. 5-33 - Filippo Gandino, Renato Ferrero, Maurizio Rebaudengo:
A Key Distribution Scheme for Mobile Wireless Sensor Networks: q-Composite. 34-47 - Zhili Zhou, Yunlong Wang, Q. M. Jonathan Wu, Ching-Nung Yang, Xingming Sun:
Effective and Efficient Global Context Verification for Image Copy Detection. 48-63 - Arunkumar Vijayakumar, Vinay C. Patil, Daniel E. Holcomb, Christof Paar, Sandip Kundu:
Physical Design Obfuscation of Hardware: A Comprehensive Investigation of Device and Logic-Level Techniques. 64-77 - Hao Yan, Jiguo Li, Jinguang Han, Yichen Zhang:
A Novel Efficient Remote Data Possession Checking Protocol in Cloud Storage. 78-88 - Adi Hajj-Ahmad, Séverine Baudry, Bertrand Chupeau, Gwenaël J. Doërr, Min Wu:
Flicker Forensics for Camcorder Piracy. 89-100 - Miao Xie, Jiankun Hu, Song Guo, Albert Y. Zomaya:
Distributed Segment-Based Anomaly Detection With Kullback-Leibler Divergence in Wireless Sensor Networks. 101-110 - Wuqiong Pan, Fangyu Zheng, Yuan Zhao, Wen Tao Zhu, Jiwu Jing:
An Efficient Elliptic Curve Cryptography Signature Server With GPU Acceleration. 111-122 - Thanh Hai Thai, Rémi Cogranne, Florent Retraint, Thi-Ngoc-Canh Doan:
JPEG Quantization Step Estimation and Its Applications to Digital Image Forensics. 123-133 - Neeti Pokhriyal, Kshitij Tayal, Ifeoma Nwogu, Venu Govindaraju:
Cognitive-Biometric Recognition From Language Usage: A Feasibility Study. 134-143 - Yubao Zhang, Xin Ruan, Haining Wang, Hui Wang, Su He:
Twitter Trends Manipulation: A First Look Inside the Security of Twitter Trending. 144-156 - Yang Hu, Konstantinos Sirlantzis, Gareth Howells:
Optimal Generation of Iris Codes for Iris Recognition. 157-171 - Tao Zhang, Quanyan Zhu:
Dynamic Differential Privacy for ADMM-Based Distributed Classification Learning. 172-187 - Michail Tsikerdekis:
Identity Deception Prevention Using Common Contribution Network Data. 188-199 - Jun Yan, Haibo He, Xiangnan Zhong, Yufei Tang:
Q-Learning-Based Vulnerability Analysis of Smart Grid Against Sequential Topology Attacks. 200-210 - Muhammad R. A. Khandaker, Kai-Kit Wong, Yangyang Zhang, Zhongbin Zheng:
Probabilistically Robust SWIPT for Secrecy MISOME Systems. 211-226 - Nima Tavangaran, Holger Boche, Rafael F. Schaefer:
Secret-Key Generation Using Compound Sources and One-Way Public Communication. 227-241 - Andrey Garnaev, Wade Trappe:
Bargaining Over the Fair Trade-Off Between Secrecy and Throughput in OFDM Communications. 242-251
Volume 12, Number 2, February 2017
- Fawaz S. Al-Qahtani, Yuzhen Huang, Salah Hessien, Redha M. Radaydeh, Caijun Zhong, Hussein M. Alnuweiri:
Secrecy Analysis of MIMO Wiretap Channels With Low-Complexity Receivers Under Imperfect Channel Estimation. 257-270 - Lei Xu, Chunxiao Jiang, Yi Qian, Youjian Zhao, Jianhua Li, Yong Ren:
Dynamic Privacy Pricing: A Multi-Armed Bandit Approach With Time-Variant Rewards. 271-285 - Jingyu Hua, Zhenyu Shen, Sheng Zhong:
We Can Track You if You Take the Metro: Tracking Metro Riders Using Accelerometers on Smartphones. 286-297 - Wenwen Tu, Mario Goldenbaum, Lifeng Lai, H. Vincent Poor:
On Simultaneously Generating Multiple Keys in a Joint Source-Channel Model. 298-308 - Bo Wang, Leibo Liu, Chenchen Deng, Min Zhu, Shouyi Yin, Zhuoquan Zhou, Shaojun Wei:
Exploration of Benes Network in Cryptographic Processors: A Random Infection Countermeasure for Block Ciphers Against Fault Attacks. 309-322 - Mahdi Jafari Siavoshani, Shaunak Mishra, Christina Fragouli, Suhas N. Diggavi:
Multi-Party Secret Key Agreement Over State-Dependent Wireless Broadcast Channels. 323-337 - Hassan Salmani:
COTD: Reference-Free Hardware Trojan Detection and Recovery Based on Controllability and Observability in Gate-Level Netlist. 338-350 - Jinho Choi:
On Channel-Aware Secure HARQ-IR. 351-362 - Aijiao Cui, Yanhui Luo, Chip-Hong Chang:
Static and Dynamic Obfuscations of Scan Data Against Scan-Based Side-Channel Attacks. 363-376 - Chi-Man Pun, Cai-Ping Yan, Xiaochen Yuan:
Image Alignment-Based Multi-Region Matching for Object-Level Tampering Detection. 377-391 - Ashref Lawgaly, Fouad Khelifi:
Sensor Pattern Noise Estimation Based on Improved Locally Adaptive DCT Filtering and Weighted Averaging for Source Camera Identification and Verification. 392-404 - Xiaolong Guo, Raj Gautam Dutta, Yier Jin:
Eliminating the Hardware-Software Boundary: A Proof-Carrying Approach for Trust Evaluation on Computer Systems. 405-417 - Mohamed Grissa, Attila A. Yavuz, Bechir Hamdaoui:
Preserving the Location Privacy of Secondary Users in Cooperative Spectrum Sensing. 418-431 - Da Luo, Rui Yang, Bin Li, Jiwu Huang:
Detection of Double Compressed AMR Audio Using Stacked Autoencoder. 432-444 - Kamal Taha, Paul D. Yoo:
Using the Spanning Tree of a Criminal Network for Identifying Its Leaders. 445-453 - Debiao He, Neeraj Kumar, Kim-Kwang Raymond Choo, Wei Wu:
Efficient Hierarchical Identity-Based Signature With Batch Verification for Automatic Dependent Surveillance-Broadcast System. 454-464 - Hong Zhang, Yun Cao, Xianfeng Zhao:
A Steganalytic Approach to Detect Motion Vector Modification Using Near-Perfect Estimation for Local Optimality. 465-478 - Bo Peng, Wei Wang, Jing Dong, Tieniu Tan:
Optimized 3D Lighting Environment Estimation for Image Forgery Detection. 479-494
Volume 12, Number 3, March 2017
- Wei Wang, Kah Chan Teh, Kwok Hung Li:
Secrecy Throughput Maximization for MISO Multi-Eavesdropper Wiretap Channels. 505-515 - Ta-Yuan Liu, Shih-Chun Lin, Y.-W. Peter Hong:
On the Role of Artificial Noise in Training and Data Transmission for Secret Communications. 516-531 - Tao Jiang, Xiaofeng Chen, Qianhong Wu, Jianfeng Ma, Willy Susilo, Wenjing Lou:
Secure and Efficient Cloud Data Deduplication With Randomized Tag. 532-543 - Hyukmin Kwon, Aziz Mohaisen, Jiyoung Woo, Yongdae Kim, Eunjo Lee, Huy Kang Kim:
Crime Scene Reconstruction: Online Gold Farming Network Analysis. 544-556 - Jun Zhao:
On Resilience and Connectivity of Secure Wireless Sensor Networks Under Node Capture Attacks. 557-571 - Parthajit Mohapatra, Chandra R. Murthy, Jemin Lee:
On the Secrecy Capacity Region of the Two-User Symmetric Z Interference Channel With Unidirectional Transmitter Cooperation. 572-587 - Benedetta Tondi, Pedro Comesaña Alfaro, Fernando Pérez-González, Mauro Barni:
Smart Detection of Line-Search Oracle Attacks. 588-603 - Long Cheng, Dinil Mon Divakaran, Aloysius Wooi Kiak Ang, Wee-Yong Lim, Vrizlynn L. L. Thing:
FACT: A Framework for Authentication in Cloud-Based IP Traceback. 604-616 - Yiliang Liu, Hsiao-Hwa Chen, Liangmin Wang:
Secrecy Capacity Analysis of Artificial Noisy MIMO Channels - An Approach Based on Ordered Eigenvalues of Wishart Matrices. 617-630 - Nir Nissim, Aviad Cohen, Yuval Elovici:
ALDOCX: Detection of Unknown Malicious Microsoft Office Documents Using Designated Active Learning Methods Based on New Structural Feature Extraction Methodology. 631-646 - Yuhong Nan, Zhemin Yang, Min Yang, Shunfan Zhou, Yuan Zhang, Guofei Gu, Xiaofeng Wang, Limin Sun:
Identifying User-Input Privacy in Mobile Applications at a Large Scale. 647-661 - Aiqing Zhang, Lei Wang, Xinrong Ye, Xiaodong Lin:
Light-Weight and Robust Security-Aware D2D-Assist Data Transmission Protocol for Mobile-Health Systems. 662-675 - Yuan Zhang, Chunxiang Xu, Xiaohui Liang, Hongwei Li, Yi Mu, Xiaojun Zhang:
Efficient Public Verification of Data Integrity for Cloud Storage Systems from Indistinguishability Obfuscation. 676-688 - Takao Murakami, Atsunori Kanemura, Hideitsu Hino:
Group Sparsity Tensor Factorization for Re-Identification of Open Mobility Traces. 689-704 - Abhishek Sharma, Suresh Sundaram:
A Novel Online Signature Verification System Based on GMM Features in a DTW Framework. 705-718 - Antitza Dantcheva, François Brémond:
Gender Estimation Based on Smile-Dynamics. 719-729 - Diksha Golait, Neminath Hubballi:
Detecting Anomalous Behavior in VoIP Systems: A Discrete Event System Modeling. 730-745 - Bin Dai, Zheng Ma, Yuan Luo:
Finite State Markov Wiretap Channel With Delayed Feedback. 746-760
Volume 12, Number 4, April 2017
- Yong Yu, Man Ho Au, Giuseppe Ateniese, Xinyi Huang, Willy Susilo, Yuanshun Dai, Geyong Min:
Identity-Based Remote Data Integrity Checking With Perfect Data Privacy Preserving for Cloud Storage. 767-778 - Parth Pradhan, Parv Venkitasubramaniam:
Stealthy Attacks in Dynamical Systems: Tradeoffs Between Utility and Detectability With Application in Anonymous Systems. 779-792 - Xufeng Lin, Chang-Tsun Li:
Large-Scale Image Clustering Based on Camera Fingerprints. 793-808 - Pawel Korus, Jiwu Huang:
Multi-Scale Analysis Strategies in PRNU-Based Tampering Localization. 809-824 - Hongbin Xu, Li Sun, Pinyi Ren, Qinghe Du, Yichen Wang:
Cooperative Privacy Preserving Scheme for Downlink Transmission in Multiuser Relay Networks. 825-839 - Yousof Erfani, Ramin Pichevar, Jean Rouat:
Audio Watermarking Using Spikegram and a Two-Dictionary Approach. 840-852 - Paulo Max Gil Innocencio Reis, João Paulo Carvalho Lustosa da Costa, Ricardo Kehrle Miranda, Giovanni Del Galdo:
ESPRIT-Hilbert-Based Audio Tampering Detection With SVM Classifier for Forensic Analysis via Electrical Network Frequency. 853-864 - Le Yu, Tao Zhang, Xiapu Luo, Lei Xue, Henry Chang:
Toward Automatically Generating Privacy Policy for Android Apps. 865-880 - Andrey V. Lyamin, Elena N. Cherepovskaya:
An Approach to Biometric Identification by Using Low-Frequency Eye Tracker. 881-891 - Matteo Ferrara, Raffaele Cappelli, Davide Maltoni:
On the Feasibility of Creating Double-Identity Fingerprints. 892-900 - Manar Mohamed, Babins Shrestha, Nitesh Saxena:
SMASheD: Sniffing and Manipulating Android Sensor Data for Offensive Purposes. 901-913 - Chao Chen, Yu Wang, Jun Zhang, Yang Xiang, Wanlei Zhou, Geyong Min:
Statistical Features-Based Real-Time Detection of Drifted Twitter Spam. 914-925 - Yuichi Sei, Akihiko Ohsuga:
Differential Private Data Collection and Analysis Based on Randomized Multiple Dummies for Untrusted Mobile Crowdsensing. 926-939 - Yujue Wang, Qianhong Wu, Bo Qin, Wenchang Shi, Robert H. Deng, Jiankun Hu:
Identity-Based Data Outsourcing With Comprehensive Auditing in Clouds. 940-952 - Kaiping Xue, Yingjie Xue, Jianan Hong, Wei Li, Hao Yue, David S. L. Wei, Peilin Hong:
RAAC: Robust and Auditable Access Control With Multiple Attribute Authorities for Public Cloud Storage. 953-967 - Pardeep Kumar, An Braeken, Andrei V. Gurtov, Jari H. Iinatti, Phuong Hoai Ha:
Anonymous Secure Framework in Connected Smart Home Environments. 968-979 - Zhaohong Wang, Sen-Ching S. Cheung, Ying Luo:
Information-Theoretic Secure Multi-Party Computation With Collusion Deterrence. 980-995
Volume 12, Number 5, May 2017
- Jun Yu, Baopeng Zhang, Zhengzhong Kuang, Dan Lin, Jianping Fan:
iPrivacy: Image Privacy Protection by Identifying Sensitive Objects via Deep Multi-Task Learning. 1005-1016 - Zijing Zhao, Ajay Kumar:
Accurate Periocular Recognition Under Less Constrained Environment Using Semantics-Assisted Convolutional Neural Network. 1017-1030 - Kurt Rohloff, David Bruce Cousins, Daniel Sumorok:
Scalable, Practical VoIP Teleconferencing With End-to-End Homomorphic Encryption. 1031-1041 - Mohamed Abouelenien, Verónica Pérez-Rosas, Rada Mihalcea, Mihai Burzo:
Detecting Deceptive Behavior via Integration of Discriminative Features From Multiple Modalities. 1042-1055 - Qing Yang, Paolo Gasti, Gang Zhou, Aydin Farajidavar, Kiran S. Balagani:
On Inferring Browsing Activity on Smartphones via USB Power Analysis Side-Channel. 1056-1066 - Mustafa Al-Ani, Fouad Khelifi:
On the SPN Estimation in Image Forensics: A Systematic Empirical Evaluation. 1067-1081 - Yu-Chi Chen:
Fully Incrementing Visual Cryptography From a Succinct Non-Monotonic Structure. 1082-1091 - Sikhar Patranabis, Abhishek Chakraborty, Debdeep Mukhopadhyay, Partha Pratim Chakrabarti:
Fault Space Transformation: A Generic Approach to Counter Differential Fault Analysis and Differential Fault Intensity Analysis on AES-Like Block Ciphers. 1092-1102 - Mingshen Sun, Xiaolei Li, John C. S. Lui, Richard T. B. Ma, Zhenkai Liang:
Monet: A User-Oriented Behavior-Based Malware Variants Detection System for Android. 1103-1112 - Vahid Heydari, Sun-il Kim, Seong-Moo Yoo:
Scalable Anti-Censorship Framework Using Moving Target Defense for Web Servers. 1113-1124 - Alberto Pedrouzo-Ulloa, Juan Ramón Troncoso-Pastoriza, Fernando Pérez-González:
Number Theoretic Transforms for Secure Signal Processing. 1125-1140 - Qinyi Xu, Yan Chen, Beibei Wang, K. J. Ray Liu:
Radio Biometrics: Human Recognition Through a Wall. 1141-1155 - Rajiv Bagai, Nafia Malik, Murtuza Jadliwala:
Measuring Anonymity of Pseudonymized Data After Probabilistic Background Attacks. 1156-1169 - Y.-W. Peter Hong, Lin-Ming Huang, Hou-Tung Li:
Vector Quantization and Clustered Key Mapping for Channel-Based Secret Key Generation. 1170-1181 - Yujue Wang, Qianhong Wu, Bo Qin, Shaohua Tang, Willy Susilo:
Online/Offline Provable Data Possession. 1182-1194 - Gaojie Chen, Justin P. Coon, Marco Di Renzo:
Secrecy Outage Analysis for Downlink Transmissions in the Presence of Randomly Located Eavesdroppers. 1195-1206 - Francesco G. B. De Natale, Giulia Boato:
Detecting Morphological Filtering of Binary Images. 1207-1217 - Hiroki Okada, Ken Umeno:
Randomness Evaluation With the Discrete Fourier Transform Test Based on Exact Analysis of the Reference Distribution. 1218-1226 - Li Liu, Yue Lu, Ching Y. Suen:
An Image-Based Approach to Detection of Fake Coins. 1227-1239 - Haodong Li, Weiqi Luo, Xiaoqing Qiu, Jiwu Huang:
Image Forgery Localization via Integrating Tampering Possibility Maps. 1240-1252
Volume 12, Number 6, June 2017
- Quratulain Alam, Saif Ur Rehman Malik, Adnan Akhunzada, Kim-Kwang Raymond Choo, Saher Tabbasum, Masoom Alam:
A Cross Tenant Access Control (CTAC) Model for Cloud Computing: Formal Specification and Verification. 1259-1268 - Li Li, Daoyuan Li, Tegawendé F. Bissyandé, Jacques Klein, Yves Le Traon, David Lo, Lorenzo Cavallaro:
Understanding Android App Piggybacking: A Systematic Study of Malicious Code Grafting. 1269-1284 - Yifeng Zheng, Helei Cui, Cong Wang, Jiantao Zhou:
Privacy-Preserving Image Denoising From External Cloud Databases. 1285-1298 - Roberto Caldelli, Rudy Becarelli, Irene Amerini:
Image Origin Classification Based on Social Network Provenance. 1299-1308 - Hang Long, Wei Xiang, Yuli Li:
Precoding and Cooperative Jamming in Multi- Antenna Two-Way Relaying Wiretap Systems Without Eavesdropper's Channel State Information. 1309-1318 - Soumik Mondal, Patrick Bours:
Person Identification by Keystroke Dynamics Using Pairwise User Coupling. 1319-1329 - Jianfeng Lu, Changbing Tang, Xiang Li, Qian Wu:
Designing Socially-Optimal Rating Protocols for Crowdsourcing Contest Dilemma. 1330-1344 - Yanzhen Ren, Jing Yang, Jinwei Wang, Lina Wang:
AMR Steganalysis Based on Second-Order Difference of Pitch Delay. 1345-1357 - John D. Roth, Murali Tummala, John C. McEachen, James W. Scrofani:
On Location Privacy in LTE Networks. 1358-1368 - Hua Shen, Mingwu Zhang, Jian Shen:
Efficient Privacy-Preserving Cube-Data Aggregation Scheme for Smart Grids. 1369-1381 - Qi Xie, Duncan S. Wong, Guilin Wang, Xiao Tan, Kefei Chen, Liming Fang:
Provably Secure Dynamic ID-Based Anonymous Two-Factor Authenticated Key Exchange Protocol With Extended Security Model. 1382-1392 - Andrew Nadeau, Gaurav Sharma:
An Audio Watermark Designed for Efficient and Robust Resynchronization After Analog Playback. 1393-1405 - Baris Coskun:
(Un)wisdom of Crowds: Accurately Spotting Malicious IP Clusters Using Not-So-Accurate IP Blacklists. 1406-1417 - Jordi Soria-Comas, Josep Domingo-Ferrer, David Sánchez, David Megías:
Individual Differential Privacy: A Utility-Preserving Formulation of Differential Privacy Guarantees. 1418-1429 - Yu Fu, Lu Yu, Oluwakemi Hambolu, Ilker Özçelik, Benafsh Husain, Jingxuan Sun, Karan Sapra, Dan Du, Christopher Tate Beasley, Richard R. Brooks:
Stealthy Domain Generation Algorithms. 1430-1443 - Yuhong Liu, Wenqi Zhou, Hong Chen:
Efficiently Promoting Product Online Outcome: An Iterative Rating Attack Utilizing Product and Market Property. 1444-1457 - Onur Tan, Jesús Gómez-Vilardebó, Deniz Gündüz:
Privacy-Cost Trade-offs in Demand-Side Management With Storage. 1458-1469 - Wei Wang, Kah Chan Teh, Kwok Hung Li:
Artificial Noise Aided Physical Layer Security in Multi-Antenna Small-Cell Networks. 1470-1482 - Yunlong Mao, Tingting Chen, Yuan Zhang, Tiancong Wang, Sheng Zhong:
Towards Privacy-Preserving Aggregation for Collaborative Spectrum Sensing. 1483-1493
Volume 12, Number 7, July 2017
- Anil K. Jain, Sunpreet S. Arora, Kai Cao, Lacey Best-Rowden, Anjoo Bhatnagar:
Fingerprint Recognition of Young Children. 1501-1514 - Abhishek Basak, Swarup Bhunia, Thomas E. Tkacik, Sandip Ray:
Security Assurance for System-on-Chip Designs With Untrusted IPs. 1515-1528 - Yinxing Xue, Guozhu Meng, Yang Liu, Tian Huat Tan, Hongxu Chen, Jun Sun, Jie Zhang:
Auditing Anti-Malware Tools by Evolving Android Malware and Dynamic Loading Technique. 1529-1544 - Kyung-Ah Shim:
BASIS: A Practical Multi-User Broadcast Authentication Scheme in Wireless Sensor Networks. 1545-1554 - Ruochi Zhang, Parv Venkitasubramaniam:
Stealthy Control Signal Attacks in Linear Quadratic Gaussian Control Systems: Detectability Reward Tradeoff. 1555-1570 - Chun-Yi Wei, Po-Ning Chen, Yunghsiang S. Han, Pramod K. Varshney:
Local Threshold Design for Target Localization Using Error Correcting Codes in Wireless Sensor Networks in the Presence of Byzantine Attacks. 1571-1584 - Saeedreza Shehnepoor, Mostafa Salehi, Reza Farahbakhsh, Noël Crespi:
NetSpam: A Network-Based Spam Detection Framework for Reviews in Online Social Media. 1585-1595 - Kaiping Xue, Shaohua Li, Jianan Hong, Yingjie Xue, Nenghai Yu, Peilin Hong:
Two-Cloud Secure Database for Numeric-Related SQL Range Queries With Privacy Preserving. 1596-1608 - Rui Tan, Hoang Hai Nguyen, Yi Shyh Eddy Foo, David K. Y. Yau, Zbigniew Kalbarczyk, Ravishankar K. Iyer, Hoay Beng Gooi:
Modeling and Mitigating Impact of False Data Injection Attacks on Automatic Generation Control. 1609-1624 - Maxim Chernyshev, Craig Valli, Michael N. Johnstone:
Revisiting Urban War Nibbling: Mobile Passive Discovery of Classic Bluetooth Devices Using Ubertooth One. 1625-1636 - Hugo Proença, João C. Neves:
Soft Biometrics: Globally Coherent Solutions for Hair Segmentation and Style Recognition Based on Hierarchical MRFs. 1637-1645 - Tomas Larrain, John S. Bernhard, Domingo Mery, Kevin W. Bowyer:
Face Recognition Using Sparse Fingerprint Classification Algorithm. 1646-1657 - Shunquan Tan, Haojie Zhang, Bin Li, Jiwu Huang:
Pixel-Decimation-Assisted Steganalysis of Synchronize-Embedding-Changes Steganography. 1658-1670 - Haichang Gao, Mengyun Tang, Yi Liu, Ping Zhang, Xiyang Liu:
Research on the Security of Microsoft's Two-Layer Captcha. 1671-1685 - Gaurav Goswami, Mayank Vatsa, Richa Singh:
Face Verification via Learned Representation on Feature-Rich Video Frames. 1686-1698 - Alex X. Liu, Amir R. Khakpour, Joshua W. Hulst, Zihui Ge, Dan Pei, Jia Wang:
Firewall Fingerprinting and Denial of Firewalling Attacks. 1699-1712 - Ishan Manjani, Snigdha Tariyal, Mayank Vatsa, Richa Singh, Angshul Majumdar:
Detecting Silicone Mask-Based Presentation Attack via Deep Dictionary Learning. 1713-1723 - Gabriel Emile Hine, Emanuele Maiorana, Patrizio Campisi:
A Zero-Leakage Fuzzy Embedder From the Theoretical Formulation to Real Data. 1724-1734 - Qingyu Yang, Dou An, Rui Min, Wei Yu, Xinyu Yang, Wei Zhao:
On Optimal PMU Placement-Based Defense Against Data Integrity Attacks in Smart Grid. 1735-1750
Volume 12, Number 8, August 2017
- Wei Yang, Yongbin Zhou, Yuchen Cao, Hailong Zhang, Qian Zhang, Huan Wang:
Multi-Channel Fusion Attacks. 1757-1771 - Ming Fan, Jun Liu, Wei Wang, Haifei Li, Zhenzhou Tian, Ting Liu:
DAPASA: Detecting Android Piggybacked Apps Through Sensitive Subgraph Analysis. 1772-1785 - Yezekael Hayel, Quanyan Zhu:
Epidemic Protection Over Heterogeneous Networks Using Evolutionary Poisson Games. 1786-1800 - Hongbin Luo, Zhe Chen, Jiawei Li, Athanasios V. Vasilakos:
Preventing Distributed Denial-of-Service Flooding Attacks With Dynamic Path Identifiers. 1801-1815 - Huafeng Qin, Mounim A. El-Yacoubi:
Deep Representation-Based Feature Extraction and Recovering for Finger-Vein Verification. 1816-1829 - Meng Shen, Mingwei Wei, Liehuang Zhu, Mingzhong Wang:
Classification of Encrypted Traffic With Second-Order Markov Chains and Application Attribute Bigrams. 1830-1843 - Vincenzo Matta, Mario Di Mauro, Maurizio Longo:
DDoS Attacks With Randomized Traffic Innovation: Botnet Identification Challenges and Strategies. 1844-1859 - Anselmo Ferreira, Luca Bondi, Luca Baroffio, Paolo Bestagini, Jiwu Huang, Jefersson A. dos Santos, Stefano Tubaro, Anderson Rocha:
Data-Driven Feature Characterization Techniques for Laser Printer Attribution. 1860-1873 - Zhangjie Fu, Fengxiao Huang, Kui Ren, Jian Weng, Cong Wang:
Privacy-Preserving Smart Semantic Search Based on Conceptual Graphs Over Encrypted Outsourced Data. 1874-1884 - Chau-Wai Wong, Min Wu:
Counterfeit Detection Based on Unclonable Feature of Paper Using Mobile Camera. 1885-1899 - Frodo Kin-Sun Chan, Xiaojie Li, Adams Wai-Kin Kong:
A Study of Distinctiveness of Skin Texture for Forensic Applications Through Comparison With Blood Vessels. 1900-1915 - Andrey Garnaev, Wade Trappe:
Bandwidth Scanning When Facing Interference Attacks Aimed at Reducing Spectrum Opportunities. 1916-1930 - Jia Yu, Huaqun Wang:
Strong Key-Exposure Resilient Auditing for Secure Cloud Storage. 1931-1940 - Diego Valsesia, Giulio Coluccia, Tiziano Bianchi, Enrico Magli:
User Authentication via PRNU-Based Physical Unclonable Functions. 1941-1956 - Taras Stanko, Fitria Nur Andini, Boris Skoric:
Optimized Quantization in Zero Leakage Helper Data Systems. 1957-1966 - Samiran Bag, Sushmita Ruj, Kouichi Sakurai:
Bitcoin Block Withholding Attack: Analysis and Mitigation. 1967-1978 - Yu-Hao Chin, Jia-Ching Wang, Chien-Lin Huang, Kuang-Yao Wang, Chung-Hsien Wu:
Speaker Identification Using Discriminative Features and Sparse Representation. 1979-1987 - Brice Colombier, Lilian Bossuet, Viktor Fischer, David Hély:
Key Reconciliation Protocols for Error Correction of Silicon PUF Responses. 1988-2002
Volume 12, Number 9, September 2017
- Aditi Roy, Nasir D. Memon, Arun Ross:
MasterPrint: Exploring the Vulnerability of Partial Fingerprint-Based Authentication Systems. 2013-2025 - Shota Saito, Yoichi Tomioka, Hitoshi Kitazawa:
A Theoretical Framework for Estimating False Acceptance Rate of PRNU-Based Camera Identification. 2026-2035 - Mustafa Ozmen, Mustafa Cenk Gursoy:
Secure Transmission of Delay-Sensitive Data Over Wireless Fading Channels. 2036-2051 - Ahmed A. Zewail, Aylin Yener:
Multi-Terminal Two-Hop Untrusted-Relay Networks With Hierarchical Security Guarantees. 2052-2066 - Sunpreet S. Arora, Anil K. Jain, Nicholas G. Paulter Jr.:
Gold Fingers: 3D Targets for Evaluating Capacitive Readers. 2067-2077 - Ester Gonzalez-Sosa, Rubén Vera-Rodríguez, Julian Fiérrez, Vishal M. Patel:
Exploring Body Shape From mmW Images for Person Recognition. 2078-2089 - Nicolas Bruneau, Claude Carlet, Sylvain Guilley, Annelie Heuser, Emmanuel Prouff, Olivier Rioul:
Stochastic Collision Attack. 2090-2104 - Jing Yang Koh, Derek Leong, Gareth W. Peters, Ido Nevat, Wai-Choong Wong:
Optimal Privacy-Preserving Probabilistic Routing for Wireless Networks. 2105-2114 - David Vazquez-Padin, Fernando Pérez-González, Pedro Comesaña Alfaro:
A Random Matrix Approach to the Forensic Analysis of Upscaled Images. 2115-2130 - Jing (Dave) Tian, Kevin R. B. Butler, Joseph I. Choi, Patrick D. McDaniel, Padma Krishnaswamy:
Securing ARP/NDP From the Ground Up. 2131-2143 - Cai-Ping Yan, Chi-Man Pun:
Multi-Scale Difference Map Fusion for Tamper Localization Using Binary Ranking Hashing. 2144-2158 - Byoung-Kyong Min, Heung-Il Suk, Min-Hee Ahn, Min-Ho Lee, Seong-Whan Lee:
Individual Identification Using Cognitive Electroencephalographic Neurodynamics. 2159-2167 - Bahman Moraffah, Lalitha Sankar:
Privacy-Guaranteed Two-Agent Interactions Using Information-Theoretic Mechanisms. 2168-2183 - Adam Czajka, Kevin W. Bowyer, Michael Krumdick, Rosaura G. VidalMata:
Recognition of Image-Orientation-Based Iris Spoofing. 2184-2196 - Francesco Marra, Giovanni Poggi, Carlo Sansone, Luisa Verdoliva:
Blind PRNU-Based Image Clustering for Source Identification. 2197-2211 - Vladimir I. Ivanov, John S. Baras:
Authentication of Swipe Fingerprint Scanners. 2212-2226 - Yuan Hong, Wen Ming Liu, Lingyu Wang:
Privacy Preserving Smart Meter Streaming Against Information Leakage of Appliance Status. 2227-2241 - Xiaohui Han, Lianhai Wang, Chaoran Cui, Jun Ma, Shuhui Zhang:
Linking Multiple Online Identities in Criminal Investigations: A Spectral Co-Clustering Framework. 2242-2255
Volume 12, Number 10, October 2017
- Xuan Zha, Wei Ni, Kangfeng Zheng, Ren Ping Liu, Xinxin Niu:
Collaborative Authentication in Decentralized Dense Mobile Networks With Key Predistribution. 2261-2275 - Ronny Merkel, Jana Dittmann, Claus Vielhauer:
A First Public Research Collection of High-Resolution Latent Fingerprint Time Series for Short- and Long-Term Print Age Estimation. 2276-2291 - Jiajun Wen, Zhihui Lai, Zhong Ming, Wai Keung Wong, Zuofeng Zhong:
Directional Gaussian Model for Automatic Speeding Event Detection. 2292-2307 - Tomás Denemark, Jessica J. Fridrich:
Steganography With Multiple JPEG Images of the Same Scene. 2308-2319 - Yue Li, Haining Wang, Kun Sun:
Personal Information in Passwords and Its Security Implications. 2320-2333 - Wei Song, Bing Wang, Qian Wang, Chengliang Shi, Wenjing Lou, Zhiyong Peng:
Publicly Verifiable Computation of Polynomials Over Outsourced Data With Multiple Sources. 2334-2347 - Richard E. Harang, Alexander Kott:
Burstiness of Intrusion Detection Process: Empirical Evidence and a Modeling Approach. 2348-2359 - Alireza Alaei, Srikanta Pal, Umapada Pal, Michael Blumenstein:
An Efficient Signature Verification Method Based on an Interval Symbolic Representation and a Fuzzy Similarity Measure. 2360-2372 - Nianfeng Liu, Jing Liu, Zhenan Sun, Tieniu Tan:
A Code-Level Approach to Heterogeneous Iris Recognition. 2373-2386 - Lingxiang Li, Athina P. Petropulu, Zhi Chen:
MIMO Secret Communications Against an Active Eavesdropper. 2387-2401 - Jian Shen, Jun Shen, Xiaofeng Chen, Xinyi Huang, Willy Susilo:
An Efficient Public Auditing Protocol With Novel Dynamic Structure for Cloud Data. 2402-2415 - Yier Jin, Xiaolong Guo, Raj Gautam Dutta, Mohammad-Mahdi Bidmeshki, Yiorgos Makris:
Data Secrecy Protection Through Information Flow Tracking in Proof-Carrying Hardware IP - Part I: Framework Fundamentals. 2416-2429 - Mohammad-Mahdi Bidmeshki, Xiaolong Guo, Raj Gautam Dutta, Yier Jin, Yiorgos Makris:
Data Secrecy Protection Through Information Flow Tracking in Proof-Carrying Hardware IP - Part II: Framework Automation. 2430-2443 - Wei Tong, Jingyu Hua, Sheng Zhong:
A Jointly Differentially Private Scheduling Protocol for Ridesharing Services. 2444-2456 - Irene Amerini, Rudy Becarelli, Roberto Caldelli, Alessio Melani, Moreno Niccolai:
Smartphone Fingerprinting Combining Features of On-Board Sensors. 2457-2466 - Girish Revadigar, Chitra Javali, Weitao Xu, Athanasios V. Vasilakos, Wen Hu, Sanjay Jha:
Accelerometer and Fuzzy Vault-Based Secure Group Key Generation and Sharing Protocol for Smart Wearables. 2467-2482 - Bahman Rashidi, Carol J. Fung, Elisa Bertino:
A Collaborative DDoS Defence Framework Using Network Function Virtualization. 2483-2497
Volume 12, Number 11, November 2017
- Md. Tauhid Bin Iqbal, Mohammad Shoyaib, Byungyong Ryu, Mohammad Abdullah-Al-Wadud, Oksam Chae:
Directional Age-Primitive Pattern (DAPP) for Human Age Group Recognition and Age Estimation. 2505-2517 - Kai Zhou, M. H. Afifi, Jian Ren:
ExpSOS: Secure and Verifiable Outsourcing of Exponentiation Operations for Mobile Cloud Computing. 2518-2531 - Sushil Jajodia, Noseong Park, Fabio Pierazzi, Andrea Pugliese, Edoardo Serra, Gerardo I. Simari, V. S. Subrahmanian:
A Probabilistic Logic of Cyber Deception. 2532-2544 - Jian Ye, Jiangqun Ni, Yang Yi:
Deep Learning Hierarchical Representations for Image Steganalysis. 2545-2557 - Tianbo Wang, Chunhe Xia, Zhong Li, Xiaochen Liu, Yang Xiang:
The Spatial-Temporal Perspective: The Study of the Propagation of Modern Social Worms. 2558-2573 - Noura Alomar, Mansour Alsaleh, Abdulrahman Alarifi:
Someone in Your Contact List: Cued Recall-Based Textual Passwords. 2574-2589 - Rui Zhang, Shuang Qiu, Yongbin Zhou:
Further Improving Efficiency of Higher Order Masking Schemes by Decreasing Randomness Complexity. 2590-2598 - Jun Wang, Guoqing Wang:
Quality-Specific Hand Vein Recognition System. 2599-2610 - Elena Veronica Belmega, Arsenia Chorti:
Protecting Secret Key Generation Systems Against Jamming: Energy Harvesting and Channel Hopping Approaches. 2611-2626 - Attila Altay Yavuz, Anand Mudgerikar, Ankush Singla, Ioannis Papapanagiotou, Elisa Bertino:
Real-Time Digital Signatures for Time-Critical Networks. 2627-2639 - Margarita Osadchy, Julio C. Hernandez-Castro, Stuart J. Gibson, Orr Dunkelman, Daniel Pérez-Cabo:
No Bot Expects the DeepCAPTCHA! Introducing Immutable Adversarial Examples, With Applications to CAPTCHA Generation. 2640-2653 - Wenbo Zhou, Weiming Zhang, Nenghai Yu:
A New Rule for Cost Reassignment in Adaptive Steganography. 2654-2667 - Muhammad Yasin, Ozgur Sinanoglu, Jeyavijayan Rajendran:
Testing the Trustworthiness of IC Testing: An Oracle-Less Attack on IC Camouflaging. 2668-2682 - Zarrin Montazeri, Amir Houmansadr, Hossein Pishro-Nik:
Achieving Perfect Location Privacy in Wireless Devices Using Anonymization. 2683-2698 - Jinho Choi:
Physical Layer Security for Channel-Aware Random Access With Opportunistic Jamming. 2699-2711 - Jong-Uk Hou, Do-Gon Kim, Heung-Kyu Lee:
Blind 3D Mesh Watermarking for 3D Printed Model by Analyzing Layering Artifact. 2712-2725 - Naoise Holohan, Douglas J. Leith, Oliver Mason:
Optimal Differentially Private Mechanisms for Randomised Response. 2726-2735 - Juntao Chen, Quanyan Zhu:
Security as a Service for Cloud-Enabled Internet of Controlled Things Under Advanced Persistent Threats: A Contract Design Approach. 2736-2750 - Abdelmalik Ouamane, Ammar Chouchane, Elhocine Boutellaa, Mebarka Belahcene, Salah Bourennane, Abdenour Hadid:
Efficient Tensor-Based 2D+3D Face Verification. 2751-2762 - Xingliang Yuan, Xinyu Wang, Cong Wang, Chenyun Yu, Sarana Nutanong:
Privacy-Preserving Similarity Joins Over Encrypted Data. 2763-2775 - Ding Wang, Haibo Cheng, Ping Wang, Xinyi Huang, Gaopeng Jian:
Zipf's Law in Passwords. 2776-2791 - Changyu Dong, Grigorios Loukides:
Approximating Private Set Union/Intersection Cardinality With Logarithmic Complexity. 2792-2806 - Pan Zhou, Qian Wang, Wei Wang, Yuchong Hu, Dapeng Wu:
Near-Optimal and Practical Jamming-Resistant Energy-Efficient Cognitive Radio Communications. 2807-2822
Volume 12, Number 12, December 2017
- Javier Galbally, Iwen Coisel, Ignacio Sanchez:
A New Multimodal Approach for Password Strength Estimation - Part I: Theory and Algorithms. 2829-2844 - Javier Galbally, Iwen Coisel, Ignacio Sanchez:
A New Multimodal Approach for Password Strength Estimation - Part II: Experimental Evaluation. 2845-2860 - Zhengyu Zhu, Zheng Chu, Ning Wang, Sai Huang, Zhongyong Wang, Inkyu Lee:
Beamforming and Power Splitting Designs for AN-Aided Secure Multi-User MIMO SWIPT Systems. 2861-2874 - Athanasios Papadopoulos, Toan Nguyen, Emre Durmus, Nasir D. Memon:
IllusionPIN: Shoulder-Surfing Resistant Authentication Using Hybrid Images. 2875-2889 - Cecilia Pasquini, Giulia Boato, Fernando Pérez-González:
Statistical Detection of JPEG Traces in Digital Images in Uncompressed Formats. 2890-2905 - Jeffrey Pawlick, Quanyan Zhu:
Strategic Trust in Cloud-Enabled Cyber-Physical Systems With an Application to Glucose Control. 2906-2919 - Hua Sun, Syed Ali Jafar:
Optimal Download Cost of Private Information Retrieval for Arbitrary Message Length. 2920-2932 - Do-hyung Kim, Jun Bi, Athanasios V. Vasilakos, Ikjun Yeom:
Security of Cached Content in NDN. 2933-2944 - Tobias Senst, Volker Eiselein, Alexander Kuhn, Thomas Sikora:
Crowd Violence Detection Using Global Motion-Compensated Lagrangian Features and Scale-Sensitive Video-Level Representation. 2945-2956 - Marcus Karlsson, Emil Björnson, Erik G. Larsson:
Jamming a TDD Point-to-Point Link Using Reciprocity-Based MIMO. 2957-2970 - Yuanman Li, Jiantao Zhou, An Cheng:
SIFT Keypoint Removal via Directed Graph Construction for Color Images. 2971-2985 - Zhangjie Fu, Xinle Wu, Qian Wang, Kui Ren:
Enabling Central Keyword-Based Semantic Extension Search Over Encrypted Outsourced Data. 2986-2997 - Lei Zhang:
OTIBAAGKA: A New Security Tool for Cryptographic Mix-Zone Establishment in Vehicular Ad Hoc Networks. 2998-3010 - Ming Wan, Wenli Shang, Peng Zeng:
Double Behavior Characteristics for One-Class Classification Anomaly Detection in Networked Control Systems. 3011-3023 - Steven Gordon, Xinyi Huang, Atsuko Miyaji, Chunhua Su, Karin Sumongkayothin, Komwut Wipusitwarakun:
Recursive Matrix Oblivious RAM: An ORAM Construction for Constrained Storage Devices. 3024-3038 - Ran Dubin, Amit Dvir, Ofir Pele, Ofer Hadar:
I Know What You Saw Last Minute - Encrypted HTTP Adaptive Video Streaming Title Classification. 3039-3049 - Haodong Li, Weiqi Luo, Jiwu Huang:
Localization of Diffusion-Based Inpainting in Digital Images. 3050-3064 - Samet Taspinar, Manoranjan Mohanty, Nasir D. Memon:
PRNU-Based Camera Attribution From Multiple Seam-Carved Images. 3065-3080 - Chugui Xu, Ju Ren, Yaoxue Zhang, Zhan Qin, Kui Ren:
DPPro: Differentially Private High-Dimensional Data Release via Random Projection. 3081-3093 - Lemonia Dritsoula, Patrick Loiseau, John Musacchio:
A Game-Theoretic Analysis of Adversarial Classification. 3094-3109 - Willy Susilo, Peng Jiang, Fuchun Guo, Guomin Yang, Yong Yu, Yi Mu:
EACSIP: Extendable Access Control System With Integrity Protection for Enhancing Collaboration in the Cloud. 3110-3122 - Mauro Barni:
Farewell Message. i-ii
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.