default search action
IEEE Transactions on Information Forensics and Security, Volume 15
Volume 15, 2020
- Matteo Testa, Tiziano Bianchi, Enrico Magli:
Secrecy Analysis of Finite-Precision Compressive Cryptosystems. 1-13 - Sara Mandelli, Paolo Bestagini, Luisa Verdoliva, Stefano Tubaro:
Facing Device Attribution Problem for Stabilized Video Sequences. 14-27 - Xuefei Yin, Yanming Zhu, Jiankun Hu:
Contactless Fingerprint Recognition Based on Global Minutia Topology and Loose Genetic Algorithm. 28-41 - Anjith George, Zohreh Mostaani, David Geissenbuhler, Olegs Nikisins, André Anjos, Sébastien Marcel:
Biometric Face Presentation Attack Detection With Multi-Channel Convolutional Neural Network. 42-55 - Metodi P. Yankov, Martin Aastrup Olsen, Mikkel B. Stegmann, Søren Skovgaard Christensen, Søren Forchhammer:
Fingerprint Entropy and Identification Capacity Estimation Based on Pixel-Level Generative Modelling. 56-65 - Ali Karimi, Abbas Taherpour, Danijela Cabric:
Smart Traffic-Aware Primary User Emulation Attack and Its Impact on Secondary User Throughput Under Rayleigh Flat Fading Channel. 66-80 - Kyung-Ah Shim:
Comments on "Revocable and Scalable Certificateless Remote Authentication Protocol With Anonymity for Wireless Body Area Networks". 81-82 - Babak Siabi, Mehdi Berenjkoub:
Comments on "Unconditionally Secure, Universally Composable Privacy Preserving Linear Algebra". 83-84 - Meng Sun, Wee Peng Tay:
Decentralized Detection With Robust Information Privacy Protection. 85-99 - Na Wang, Junsong Fu, Jian Li, Bharat K. Bhargava:
Source-Location Privacy Protection Based on Anonymity Cloud in Wireless Sensor Networks. 100-114 - Fei Ma, Xiao-Yuan Jing, Xiao Zhu, Zhenmin Tang, Zhiping Peng:
True-Color and Grayscale Video Person Re-Identification. 115-129 - Quanzhong Li, Liang Yang:
Beamforming for Cooperative Secure Transmission in Cognitive Two-Way Relay Networks. 130-143 - Davide Cozzolino, Luisa Verdoliva:
Noiseprint: A CNN-Based Camera Model Fingerprint. 144-159 - Sharad Joshi, Nitin Khanna:
Source Printer Classification Using Printer Specific Local Texture Descriptor. 160-171 - Chunlei Peng, Nannan Wang, Jie Li, Xinbo Gao:
Face Sketch Synthesis in the Wild via Deep Patch Representation-Based Probabilistic Graphical Model. 172-183 - Fawad Ahmad, Lee-Ming Cheng, Asif Khan:
Lightweight and Privacy-Preserving Template Generation for Palm-Vein-Based Human Recognition. 184-194 - Meng Pang, Yiu-Ming Cheung, Binghui Wang, Jian Lou:
Synergistic Generic Learning for Face Recognition From a Contaminated Single Sample per Person. 195-209 - Ahmed Arafa, Wonjae Shin, Mojtaba Vaezi, H. Vincent Poor:
Secure Relaying in Non-Orthogonal Multiple Access: Trusted and Untrusted Scenarios. 210-222 - Jinguang Han, Liqun Chen, Steve A. Schneider, Helen Treharne, Stephan Wesemeyer, Nick Wilson:
Anonymous Single Sign-On With Proxy Re-Verification. 223-236 - Chengwei Wu, Ligang Wu, Jianxing Liu, Zhong-Ping Jiang:
Active Defense-Based Resilient Sliding Mode Control Under Denial-of-Service Attacks. 237-249 - Xinghao Jiang, Qiang Xu, Tanfeng Sun, Bin Li, Peisong He:
Detection of HEVC Double Compression With the Same Coding Parameters Based on Analysis of Intra Coding Quality Degradation Process. 250-263 - Qiang Li, Chao Li, Jingran Lin:
Constant Modulus Secure Beamforming for Multicast Massive MIMO Wiretap Channels. 264-275 - Wei-Che Wang, Yair Yona, Yizhang Wu, Suhas N. Diggavi, Puneet Gupta:
SLATE: A Secure Lightweight Entity Authentication Hardware Primitive. 276-285 - Enrico Bacis, Sabrina De Capitani di Vimercati, Sara Foresti, Stefano Paraboschi, Marco Rosa, Pierangela Samarati:
Securing Resources in Decentralized Cloud Storage. 286-298 - Dong Yuan, Qi Li, Guoliang Li, Qian Wang, Kui Ren:
PriRadar: A Privacy-Preserving Framework for Spatial Crowdsourcing. 299-314 - Pu Zhao, Jia Yu, Hanlin Zhang, Zhan Qin, Cong Wang:
How to Securely Outsource Finding the Min-Cut of Undirected Edge-Weighted Graphs. 315-328 - Amir Ameli, Ali Hooshyar, Ehab F. El-Saadany, Amr M. Youssef:
An Intrusion Detection Method for Line Current Differential Relays. 329-344 - Ramin Soltani, Dennis Goeckel, Don Towsley, Amir Houmansadr:
Fundamental Limits of Invisible Flow Fingerprinting. 345-360 - Xiaofang Xia, Yang Xiao, Wei Liang:
SAI: A Suspicion Assessment-Based Inspection Algorithm to Detect Malicious Users in Smart Grid. 361-374 - Guoqing Wang, Changming Sun, Arcot Sowmya:
Multi-Weighted Co-Occurrence Descriptor Encoding for Vein Recognition. 375-390 - Jingyi Feng, Hua Chen, Yang Li, Zhipeng Jiao, Wei Xi:
A Framework for Evaluation and Analysis on Infection Countermeasures Against Fault Attacks. 391-406 - Mang Ye, Xiangyuan Lan, Zheng Wang, Pong C. Yuen:
Bi-Directional Center-Constrained Top-Ranking for Visible Thermal Person Re-Identification. 407-419 - Jun Zhou, Zhenfu Cao, Zhan Qin, Xiaolei Dong, Kui Ren:
LPPA: Lightweight Privacy-Preserving Authentication From Efficient Multi-Key Secure Outsourced Computation for Location-Based Services in VANETs. 420-434 - Nalam Venkata Abhishek, Anshoo Tandon, Teng Joon Lim, Biplab Sikdar:
A GLRT-Based Mechanism for Detecting Relay Misbehavior in Clustered IoT Networks. 435-446 - Jean de Dieu Mutangana, Ravi Tandon:
Blind MIMO Cooperative Jamming: Secrecy via ISI Heterogeneity Without CSIT. 447-461 - Juntao Chen, Corinne Touati, Quanyan Zhu:
A Dynamic Game Approach to Strategic Design of Secure and Resilient Infrastructure Network. 462-474 - Ahmet Turan Erozan, Michael Hefenbrock, Michael Beigl, Jasmin Aghassi-Hagmann, Mehdi Baradaran Tahoori:
Reverse Engineering of Printed Electronics Circuits: From Imaging to Netlist Extraction. 475-486 - Moisés Díaz, Miguel A. Ferrer, Soodamani Ramalingam, Richard M. Guest:
Investigating the Common Authorship of Signatures by Off-Line Automatic Signature Verification Without the Use of Reference Signatures. 487-499 - Hussain M. J. Almohri, Layne T. Watson, David Evans:
Predictability of IP Address Allocations for Cloud Computing Platforms. 500-511 - Kanad Basu, Prashanth Krishnamurthy, Farshad Khorrami, Ramesh Karri:
A Theoretical Study of Hardware Performance Counters-Based Malware Detection. 512-525 - Hyun Kwon, Yongchul Kim, Hyunsoo Yoon, Daeseon Choi:
Selective Audio Adversarial Example in Evasion Attack on Speech Recognition System. 526-538 - Dan Lin, Douglas Steiert, Joshua Morris, Anna Cinzia Squicciarini, Jianping Fan:
REMIND: Risk Estimation Mechanism for Images in Network Distribution. 539-552 - Netanel Raviv, David A. Karpuk:
Private Polynomial Computation From Lagrange Encoding. 553-563 - Hoon Wei Lim, Geong Sen Poh, Jia Xu, Varsha Chittawar:
PrivateLink: Privacy-Preserving Integration and Sharing of Datasets. 564-577 - Haonan Chen, Guosheng Hu, Zhen Lei, Yaowu Chen, Neil Martin Robertson, Stan Z. Li:
Attention-Based Two-Stream Convolutional Networks for Face Spoofing Detection. 578-593 - Borzoo Rassouli, Deniz Gündüz:
Optimal Utility-Privacy Trade-Off With Total Variation Distance as a Privacy Measure. 594-603 - Xin Yuan, Zhiyong Feng, Wei Ni, Ren Ping Liu, J. Andrew Zhang, Wenjun Xu:
Secrecy Performance of Terrestrial Radio Links Under Collaborative Aerial Eavesdropping. 604-619 - Yue Zheng, Yuan Cao, Chip-Hong Chang:
A PUF-Based Data-Device Hash for Tampered Image Detection and Source Camera Identification. 620-634 - Guoqing Wang, Changming Sun, Arcot Sowmya:
Learning a Compact Vein Discrimination Model With GANerated Samples. 635-650 - Bo Song, Xu Wang, Wei Ni, Yurong Song, Ren Ping Liu, Guoping Jiang, Y. Jay Guo:
Reliability Analysis of Large-Scale Adaptive Weighted Networks. 651-665 - Prashanth Krishnamurthy, Ramesh Karri, Farshad Khorrami:
Anomaly Detection in Real-Time Multi-Threaded Processes Using Hardware Performance Counters. 666-680 - Hailong Zhang:
On the Exact Relationship Between the Success Rate of Template Attack and Different Parameters. 681-694 - Miran Kim, Junghye Lee, Lucila Ohno-Machado, Xiaoqian Jiang:
Secure and Differentially Private Logistic Regression for Horizontally Distributed Data. 695-710 - Jian Kang, Douglas Steiert, Dan Lin, Yanjie Fu:
MoveWithMe: Location Privacy Preservation for Smartphone Users. 711-724 - Weiqi Dai, Chunkai Dai, Kim-Kwang Raymond Choo, Changze Cui, Deqing Zou, Hai Jin:
SDTE: A Secure Blockchain-Based Data Trading Ecosystem. 725-737 - Yuan Liang, Jian Ren, Tongtong Li:
Secure OFDM System Design and Capacity Analysis Under Disguised Jamming. 738-752 - Yang Zi, Haichang Gao, Zhouhang Cheng, Yi Liu:
An End-to-End Attack on Text CAPTCHAs. 753-766 - Yuqiao Zhang, Ujjwal Guin:
End-to-End Traceability of ICs in Component Supply Chain for Fighting Against Recycling. 767-775 - Baki Berkay Yilmaz, Milos Prvulovic, Alenka G. Zajic:
Electromagnetic Side Channel Information Leakage Created by Execution of Series of Instructions in a Computer Processor. 776-789 - Razane Tajeddine, Antonia Wachter-Zeh, Camilla Hollanti:
Private Information Retrieval Over Random Linear Networks. 790-799 - Mehmet Necip Kurt, Yasin Yilmaz, Xiaodong Wang:
Secure Distributed Dynamic State Estimation in Wide-Area Smart Grids. 800-815 - Dongxia Wang, Tim Muller, Jie Zhang, Yang Liu:
Information Theoretical Analysis of Unfair Rating Attacks Under Subjectivity. 816-828 - Phuong Le Cao, Tobias J. Oechtering:
Optimal Transmit Strategies for Gaussian MISO Wiretap Channels. 829-838 - Jianhua Yang, Danyang Ruan, Jiwu Huang, Xiangui Kang, Yun-Qing Shi:
An Embedding Cost Learning Framework Using GAN. 839-851 - Meng Sun, Wee Peng Tay:
On the Relationship Between Inference and Data Privacy in Decentralized IoT Networks. 852-866 - Mehdi Sharifzadeh, Mohammed Aloraini, Dan Schonfeld:
Adaptive Batch Size Image Merging Steganography and Quantized Gaussian Image Steganography. 867-879 - Kai Cao, Dinh-Luan Nguyen, Cori Tymoszek, Anil K. Jain:
End-to-End Latent Fingerprint Search. 880-894 - Yang Song, Chong Xiao Wang, Wee Peng Tay:
Compressive Privacy for a Linear Dynamical System. 895-910 - Guowen Xu, Hongwei Li, Sen Liu, Kan Yang, Xiaodong Lin:
VerifyNet: Secure and Verifiable Federated Learning. 911-926 - Chun-I Fan, Jheng-Jia Huang, Min-Zhe Zhong, Ruei-Hau Hsu, Wen-Tsuen Chen, Jemin Lee:
ReHand: Secure Region-Based Fast Handover With User Anonymity for Small Cell Networks in Mobile Communications. 927-942 - Paolo Addesso, Michele Cirillo, Mario Di Mauro, Vincenzo Matta:
ADVoIP: Adversarial Detection of Encrypted and Concealed VoIP. 943-958 - Sebastian Baur, Holger Boche, Rafael F. Schaefer, H. Vincent Poor:
Secure Storage Capacity Under Rate Constraints - Continuity and Super Activation. 959-970 - Donghe Li, Qingyu Yang, Wei Yu, Dou An, Yang Zhang, Wei Zhao:
Towards Differential Privacy-Based Online Double Auction for Smart Grid. 971-986 - Xiao Chen, Chaoran Li, Derui Wang, Sheng Wen, Jun Zhang, Surya Nepal, Yang Xiang, Kui Ren:
Android HIV: A Study of Repackaging Malware for Evading Machine-Learning Detection. 987-1001 - Zonghao Huang, Rui Hu, Yuanxiong Guo, Eric Chan-Tin, Yanmin Gong:
DP-ADMM: ADMM-Based Distributed Learning With Differential Privacy. 1002-1012 - Holger Boche, Rafael F. Schaefer, H. Vincent Poor:
Secure Communication and Identification Systems - Effective Performance Evaluation on Turing Machines. 1013-1025 - Mehrdad Tahmasbi, Matthieu R. Bloch:
Covert Secret Key Generation With an Active Warden. 1026-1039 - Tao Qin, Zhaoli Liu, Pinghui Wang, Shancang Li, Xiaohong Guan, Lixin Gao:
Symmetry Degree Measurement and its Applications to Anomaly Detection. 1040-1055 - Changsheng Chen, Mulin Li, Anselmo Ferreira, Jiwu Huang, Rizhao Cai:
A Copy-Proof Scheme Based on the Spectral and Spatial Barcoding Channel Models. 1056-1071 - Jakub Breier, Dirmanto Jap, Xiaolu Hou, Shivam Bhasin:
On Side Channel Vulnerabilities of Bit Permutations in Cryptographic Algorithms. 1072-1085 - Penny Chong, Yuval Elovici, Alexander Binder:
User Authentication Based on Mouse Dynamics Using Deep Neural Networks: A Comprehensive Study. 1086-1101 - Bryse Flowers, R. Michael Buehrer, William C. Headley:
Evaluating Adversarial Evasion Attacks in the Context of Wireless Communications. 1102-1113 - Shangyu Xie, Yuan Hong, Peng-Jun Wan:
Pairing: Privately Balancing Multiparty Real-Time Supply and Demand on the Power Grid. 1114-1127 - Guillermo Suarez-Tangil, Matthew Edwards, Claudia Peersman, Gianluca Stringhini, Awais Rashid, Monica T. Whitty:
Automatically Dismantling Online Dating Fraud. 1128-1137 - Ru Zhang, Feng Zhu, Jianyi Liu, Gongshen Liu:
Depth-Wise Separable Convolutions and Multi-Level Pooling for an Efficient Spatial CNN-Based Steganalysis. 1138-1150 - Shangwei Guo, Tao Xiang, Xiaoguo Li, Ying Yang:
PEID: A Perceptually Encrypted Image Database for Visual Security Evaluation. 1151-1163 - Osama Al-Kadi, Nour Moustafa, Benjamin P. Turnbull, Kim-Kwang Raymond Choo:
An Ontological Graph Identification Method for Improving Localization of IP Prefix Hijacking in Network Systems. 1164-1174 - Wenxiong Kang, Hongda Liu, Wei Luo, Feiqi Deng:
Study of a Full-View 3D Finger Vein Verification Technique. 1175-1189 - Mordechai Guri, Boris Zadov, Yuval Elovici:
ODINI: Escaping Sensitive Data From Faraday-Caged, Air-Gapped Computers via Magnetic Fields. 1190-1203 - Aske R. Lejbølle, Kamal Nasrollahi, Benjamin Krogh, Thomas B. Moeslund:
Person Re-Identification Using Spatial and Layer-Wise Attention. 1216-1231 - Chonlatid Deerada, Krisada Phromsuthirak, Arucha Rungchokanun, Vutipong Areekul:
Progressive Focusing Algorithm for Reliable Pose Estimation of Latent Fingerprints. 1232-1247 - Jinbao Zhu, Qifa Yan, Chao Qi, Xiaohu Tang:
A New Capacity-Achieving Private Information Retrieval Scheme With (Almost) Optimal File Length for Coded Servers. 1248-1260 - Ruben Tolosana, Marta Gomez-Barrero, Christoph Busch, Javier Ortega-Garcia:
Biometric Presentation Attack Detection: Beyond the Visible Spectrum. 1261-1275 - Thanikasalam Kokul, Clinton Fookes, Sridha Sridharan, Amirthalingam Ramanan, Amalka Pinidiyaarachchi:
Target-Specific Siamese Attention Network for Real-Time Object Tracking. 1276-1289 - Chuan-Xian Ren, Bo-Hua Liang, Pengfei Ge, Yiming Zhai, Zhen Lei:
Domain Adaptive Person Re-Identification via Camera Style Generation and Label Propagation. 1290-1302 - Falko Matern, Christian Riess, Marc Stamminger:
Gradient-Based Illumination Description for Image Forgery Detection. 1303-1317 - Shaohua Li, Kaiping Xue, David S. L. Wei, Hao Yue, Nenghai Yu, Peilin Hong:
SecGrid: A Secure and Efficient SGX-Enabled Smart Grid System With Rich Functionalities. 1318-1330 - Owen Mayer, Matthew C. Stamm:
Forensic Similarity for Digital Images. 1331-1346 - Ji He, Jia Liu, Yulong Shen, Xiaohong Jiang, Norio Shiratori:
Link Selection for Security-QoS Tradeoffs in Buffer-Aided Relaying Networks. 1347-1362 - Ning Wang, Long Jiao, Amir Alipour-Fanid, Monireh Dabaghchian, Kai Zeng:
Pilot Contamination Attack Detection for NOMA in 5G mm-Wave Massive MIMO Networks. 1363-1378 - Michele Boreale, Fabio Corradi, Cecilia Viscardi:
Relative Privacy Threats and Learning From Anonymized Data. 1379-1393 - Zhihang Li, Xu Tang, Xiang Wu, Jingtuo Liu, Ran He:
Progressively Refined Face Detection Through Semantics-Enriched Representation Learning. 1394-1406 - Fan Zhang, Xiaofei Dong, Bolin Yang, Yajin Zhou, Kui Ren:
A Systematic Evaluation of Wavelet-Based Attack Framework on Random Delay Countermeasures. 1407-1422 - Kisong Lee, Jin-Taek Lim, Hyun-Ho Choi:
Impact of Outdated CSI on the Secrecy Performance of Wireless-Powered Untrusted Relay Networks. 1423-1433 - Jan Butora, Jessica J. Fridrich:
Reverse JPEG Compatibility Attack. 1444-1454 - David Formby, Raheem Beyah:
Temporal Execution Behavior for Host Anomaly Detection in Programmable Logic Controllers. 1455-1469 - Neetesh Saxena, Mauro Conti, Kim-Kwang Raymond Choo, Narendra S. Chaudhari:
BAS-VAS: A Novel Secure Protocol for Value Added Service Delivery to Mobile Devices. 1470-1485 - Lingchen Zhao, Qian Wang, Qin Zou, Yan Zhang, Yanjiao Chen:
Privacy-Preserving Collaborative Deep Learning With Unreliable Participants. 1486-1500 - Xiaofeng Liu, Zhenhua Guo, Jane You, B. V. K. Vijaya Kumar:
Dependency-Aware Attention Control for Image Set-Based Face Recognition. 1501-1512 - Ahmed A. Zewail, Aylin Yener:
Device-to-Device Secure Coded Caching. 1513-1524 - Guo-lin Shao, Xingshu Chen, Xuemei Zeng, Lina Wang:
Deep Learning Hierarchical Representation From Heterogeneous Flow-Level Communication Data. 1525-1540 - Alexander Bunin, Ziv Goldfeld, Haim H. Permuter, Shlomo Shamai Shitz, Paul Cuff, Pablo Piantanida:
Key and Message Semantic-Security Over State-Dependent Channels. 1541-1556 - Enes Altinisik, Kasim Tasdemir, Husrev Taha Sencar:
Mitigation of H.264 and H.265 Video Compression for Reliable PRNU Estimation. 1557-1571 - Libing Wu, Jingxiao Yang, Man Zhou, Yanjiao Chen, Qian Wang:
LVID: A Multimodal Biometrics Authentication System on Smartphones. 1572-1585 - Xu An Wang, Kim-Kwang Raymond Choo, Jian Weng, Jianfeng Ma:
Comments on "Publicly Verifiable Computation of Polynomials Over Outsourced Data With Multiple Sources". 1586-1588 - Hongliang Liang, Mingyu Li, Yixiu Chen, Lin Jiang, Zhuosi Xie, Tianqi Yang:
Establishing Trusted I/O Paths for SGX Client Systems With Aurora. 1589-1600 - Wojciech Michal Matkowski, Tingting Chai, Adams Wai-Kin Kong:
Palmprint Recognition in Uncontrolled and Uncooperative Environment. 1601-1615 - Anurag Chowdhury, Arun Ross:
Fusing MFCC and LPC Features Using 1D Triplet CNN for Speaker Recognition in Severely Degraded Audio Signals. 1616-1629 - Ankit Gangwal, Mauro Conti:
Cryptomining Cannot Change Its Spots: Detecting Covert Cryptomining Using Magnetic Side-Channel. 1630-1639 - Qiangchang Wang, Guodong Guo:
LS-CNN: Characterizing Local Patches at Multiple Scales for Face Recognition. 1640-1653 - Jie Cui, Xiaoyu Zhang, Hong Zhong, Jing Zhang, Lu Liu:
Extensible Conditional Privacy Protection Authentication Scheme for Secure Vehicular Networks in a Multi-Cloud Environment. 1654-1667 - Heedo Kang, Vinod Yegneswaran, Shalini Ghosh, Phillip A. Porras, Seungwon Shin:
Automated Permission Model Generation for Securing SDN Control-Plane. 1668-1682 - Yushu Zhang, Xiangli Xiao, Lu-Xing Yang, Yong Xiang, Sheng Zhong:
Secure and Efficient Outsourcing of PCA-Based Face Recognition. 1683-1695 - Shuangyi Zhu, Yuan Ma, Xusheng Li, Jing Yang, Jingqiang Lin, Jiwu Jing:
On the Analysis and Improvement of Min-Entropy Estimation on Time-Varying Data. 1696-1708 - Jean-Claude Bajard, Paulo Martins, Leonel Sousa, Vincent Zucca:
Improving the Efficiency of SVM Classification With FHE. 1709-1722 - Xueru Zhang, Mohammad Mahdi Khalili, Mingyan Liu:
Recycled ADMM: Improving the Privacy and Accuracy of Distributed Algorithms. 1723-1734 - Luiz G. Hafemann, Robert Sabourin, Luiz S. Oliveira:
Meta-Learning for Fast Classifier Adaptation to New Users of Signature Verification Systems. 1735-1745 - Nguyen Binh Truong, Kai Sun, Gyu Myoung Lee, Yike Guo:
GDPR-Compliant Personal Data Management: A Blockchain-Based Solution. 1746-1761 - Liming Zhai, Lina Wang, Yanzhen Ren:
Universal Detection of Video Steganography in Multiple Domains Based on the Consistency of Motion Vectors. 1762-1777 - Qin Hu, Shengling Wang, Xiuzhen Cheng, Liran Ma, Rongfang Bie:
Solving the Crowdsourcing Dilemma Using the Zero-Determinant Strategies. 1778-1789 - Amit Praseed, P. Santhi Thilagam:
Multiplexed Asymmetric Attacks: Next-Generation DDoS on HTTP/2 Servers. 1790-1800 - Parinaz Naghizadeh, Mingyan Liu:
Using Private and Public Assessments in Security Information Sharing Agreements. 1801-1814 - David Vázquez-Padín, Marco Fontani, Dasara Shullani, Fernando Pérez-González, Alessandro Piva, Mauro Barni:
Video Integrity Verification and GOP Size Estimation Via Generalized Variation of Prediction Footprint. 1815-1830 - Sarankumar Balakrishnan, Shreya Gupta, Arupjyoti Bhuyan, Pu Wang, Dimitrios Koutsonikolas, Zhi Sun:
Physical Layer Identification Based on Spatial-Temporal Beam Features for Millimeter-Wave Wireless Networks. 1831-1845 - Erkam Uzun, Hüsrev T. Sencar:
JpgScraper: An Advanced Carver for JPEG Files. 1846-1857 - Jin Sung Kang, Yuri A. Lawryshyn, Dimitrios Hatzinakos:
Neural Network Architecture and Transient Evoked Otoacoustic Emission (TEOAE) Biometrics for Identification and Verification. 1858-1867 - Guang Hua, Haijian Zhang:
ENF Signal Enhancement in Audio Recordings. 1868-1878 - Mordechai Guri, Boris Zadov, Dima Bykhovsky, Yuval Elovici:
PowerHammer: Exfiltrating Data From Air-Gapped Computers Through Power Lines. 1879-1890 - Baki Berkay Yilmaz, Nader Sehatbakhsh, Alenka G. Zajic, Milos Prvulovic:
Communication Model and Capacity Limits of Covert Channels Created by Software Activities. 1891-1904 - Sayandeep Saha, Dirmanto Jap, Debapriya Basu Roy, Avik Chakraborty, Shivam Bhasin, Debdeep Mukhopadhyay:
A Framework to Counter Statistical Ineffective Fault Analysis of Block Ciphers Using Domain Transformation and Error Correction. 1905-1919 - Cristian Hristea, Ferucio Laurentiu Tiplea:
Privacy of Stateful RFID Systems With Constant Tag Identifiers. 1920-1934 - Hridoy Sankar Dutta, Tanmoy Chakraborty:
Blackmarket-Driven Collusion Among Retweeters-Analysis, Detection, and Characterization. 1935-1944 - Gurjit Singh Walia, Gaurav Jain, Nipun Bansal, Kuldeep Singh:
Adaptive Weighted Graph Approach to Generate Multimodal Cancelable Biometric Templates. 1945-1958 - Kwang-Yul Kim, Yoan Shin:
Analysis on Cross-Correlation Coefficient for Survivability of Chirp Spread Spectrum Systems. 1959-1967 - Anshul Arora, Sateesh Kumar Peddoju, Mauro Conti:
PermPair: Android Malware Detection Using Permission Pairs. 1968-1982 - Mahmoud Alageli, Aïssa Ikhlef, Fahad Alsifiany, Mohammed A. M. Abdullah, Gaojie Chen, Jonathon A. Chambers:
Optimal Downlink Transmission for Cell-Free SWIPT Massive MIMO Systems With Active Eavesdropping. 1983-1998 - Wonwoo Cho, Nam Yul Yu:
Secure and Efficient Compressed Sensing-Based Encryption With Sparse Matrices. 1999-2011 - Borzoo Rassouli, Fernando E. Rosas, Deniz Gündüz:
Data Disclosure Under Perfect Sample Privacy. 2012-2025 - Rui Zhang, Quanyan Zhu:
FlipIn: A Game-Theoretic Cyber Insurance Framework for Incentive-Compatible Cyber Risk Management of Internet of Things. 2026-2041 - Wenjie Xiong, André Schaller, Stefan Katzenbeisser, Jakub Szefer:
Software Protection Using Dynamic PUFs. 2053-2068 - Tatsuya Yasui, Minoru Kuribayashi, Nobuo Funabiki, Isao Echizen:
Near-Optimal Detection for Binary Tardos Code by Estimating Collusion Strategy. 2069-2080 - Yaofei Wang, Weiming Zhang, Weixiang Li, Xinzhi Yu, Nenghai Yu:
Non-Additive Cost Functions for Color Image Steganography Based on Inter-Channel Correlations and Differences. 2081-2095 - Lingling Xu, Wanhua Li, Fangguo Zhang, Rong Cheng, Shaohua Tang:
Authorized Keyword Searches on Public Key Encrypted Data With Time Controlled Keyword Privacy. 2096-2109 - Arpan Jati, Naina Gupta, Anupam Chattopadhyay, Somitra Kumar Sanadhya, Donghoon Chang:
Threshold Implementations of GIFT: A Trade-Off Analysis. 2110-2120 - Junhui He, Junxi Chen, Shaohua Tang:
Reversible Data Hiding in JPEG Images Based on Negative Influence Models. 2121-2133 - Jun-Liu Zhong, Chi-Man Pun:
An End-to-End Dense-InceptionNet for Image Copy-Move Forgery Detection. 2134-2146 - Mohammad Esmaeilpour, Patrick Cardinal, Alessandro Lameiras Koerich:
A Robust Approach for Securing Audio Classification Against Adversarial Attacks. 2147-2159 - Jichen Yang, Rohan Kumar Das, Haizhou Li:
Significance of Subband Features for Synthetic Speech Detection. 2160-2170 - Zhongwu Xiang, Weiwei Yang, Gaofeng Pan, Yueming Cai, Yi Song, Yulong Zou:
Secure Transmission in HARQ-Assisted Non-Orthogonal Multiple Access Networks. 2171-2182 - Kostantinos Papadamou, Steven Gevers, Christos Xenakis, Michael Sirivianos, Savvas Zannettou, Bogdan Chifor, Sorin Teican, George Gugulea, Alberto Caponi, Annamaria Recupero, Claudio Pisa, Giuseppe Bianchi:
Killing the Password and Preserving Privacy With Device-Centric and Attribute-Based Authentication. 2183-2193 - Guilei Hu, Yang Xiao, Zhiguo Cao, Lubin Meng, Zhiwen Fang, Joey Tianyi Zhou, Junsong Yuan:
Towards Real-Time Eyeblink Detection in the Wild: Dataset, Theory and Practices. 2194-2208 - Haina Song, Tao Luo, Xun Wang, Jianfeng Li:
Multiple Sensitive Values-Oriented Personalized Privacy Preservation Based on Randomized Response. 2209-2224 - Xiaochun Yun, Ji Huang, Yipeng Wang, Tianning Zang, Yuan Zhou, Yongzheng Zhang:
Khaos: An Adversarial Neural Network DGA With High Anti-Detection Ability. 2225-2240 - Lingshuang Du, Haifeng Hu, Yongbo Wu:
Cycle Age-Adversarial Model Based on Identity Preserving Network and Transfer Learning for Cross-Age Face Recognition. 2241-2252 - Yuankun Huang, Bin Li, Mauro Barni, Jiwu Huang:
Identification of VoIP Speech With Multiple Domain Deep Features. 2253-2267 - Diana Pamela Moya Osorio, Hirley Alves, Edgar Eduardo Benitez Olivo:
On the Secrecy Performance and Power Allocation in Relaying Networks With Untrusted Relay in the Partial Secrecy Regime. 2268-2281 - Junqi Wu, Bolin Chen, Weiqi Luo, Yanmei Fang:
Audio Steganography Based on Iterative Adversarial Attacks Against Convolutional Neural Networks. 2282-2294 - Masahito Hayashi, Ángeles Vázquez-Castro:
Physical Layer Security Protocol for Poisson Channels for Passive Man-in-the-Middle Attack. 2295-2305 - Tong Zhang, Xiaolong Li, Wenfa Qi, Zongming Guo:
Location-Based PVO and Adaptive Pairwise Modification for Efficient Reversible Data Hiding. 2306-2319 - Zhenyong Zhang, Ruilong Deng, David K. Y. Yau, Peng Cheng, Jiming Chen:
Analysis of Moving Target Defense Against False Data Injection Attacks on Power Grid. 2320-2335 - Renyong Wu, Chao Yuan, Ning Zhang, Kim-Kwang Raymond Choo:
A Two-Dimensional Vectorized Secure Transmission Scheme for Wireless Communications. 2336-2345 - Amir Alipour-Fanid, Monireh Dabaghchian, Ning Wang, Pu Wang, Liang Zhao, Kai Zeng:
Machine Learning-Based Delay-Aware UAV Detection and Operation Mode Identification Over Encrypted Wi-Fi Traffic. 2346-2360 - Jiucheng Xie, Chi-Man Pun:
Deep and Ordinal Ensemble Learning for Human Age Estimation From Facial Images. 2361-2374 - Navaneet K. L., Ravi Kiran Sarvadevabhatla, Shashank Shekhar, R. Venkatesh Babu, Anirban Chakraborty:
Operator-in-the-Loop Deep Sequential Multi-Camera Feature Fusion for Person Re-Identification. 2375-2385 - Jong-Hyuk Im, Seong-Yun Jeon, Mun-Kyu Lee:
Practical Privacy-Preserving Face Authentication for Smartphones Secure Against Malicious Clients. 2386-2401 - Shun-Wen Hsiao, Yeali S. Sun, Meng Chang Chen:
Hardware-Assisted MMU Redirection for In-Guest Monitoring and API Profiling. 2402-2416 - Min Xia, Xu Zhang, Wan'an Liu, Liguo Weng, Yiqing Xu:
Multi-Stage Feature Constraints Learning for Age Estimation. 2417-2428 - Chao Lin, Debiao He, Xinyi Huang, Muhammad Khurram Khan, Kim-Kwang Raymond Choo:
DCAP: A Secure and Efficient Decentralized Conditional Anonymous Payment System Based on Blockchain. 2440-2452 - Yang Liu, Ting Liu, Hong Sun, Kehuan Zhang, Pengfei Liu:
Hidden Electricity Theft by Exploiting Multiple-Pricing Scheme in Smart Grids. 2453-2468 - Meng Yang, Wei Wen, Xing Wang, Linlin Shen, Guangwei Gao:
Adaptive Convolution Local and Global Learning for Class-Level Joint Representation of Facial Recognition With a Single Sample Per Data Subject. 2469-2484 - S. V. Sandeep Avvaru, Ziqing Zeng, Keshab K. Parhi:
Homogeneous and Heterogeneous Feed-Forward XOR Physical Unclonable Functions. 2485-2498 - Bo-Wei Tseng, Pei-Yuan Wu:
Compressive Privacy Generative Adversarial Network. 2499-2513 - Deepak Sirone, Pramod Subramanyan:
Functional Analysis Attacks on Logic Locking. 2514-2527 - Zhongwu Xiang, Weiwei Yang, Yueming Cai, Zhiguo Ding, Yi Song:
Secure Transmission Design in HARQ Assisted Cognitive NOMA Networks. 2528-2541 - Gaëtan Cassiers, François-Xavier Standaert:
Trivially and Efficiently Composing Masked Gadgets With Probe Isolating Non-Interference. 2542-2555 - Sahar Haddad, Gouenou Coatrieux, Alexandre Moreau-Gaudry, Michel Cozic:
Joint Watermarking-Encryption-JPEG-LS for Medical Image Reliability Control in Encrypted and Compressed Domains. 2556-2569 - Xiang Liu, Teng Joon Lim, Jie Huang:
Optimal Byzantine Attacker Identification Based on Game Theory in Network Coding Enabled Wireless Ad Hoc Networks. 2570-2583 - Wei Guo, Su-Juan Qin, Fei Gao, Hua Zhang, Wenmin Li, Zhengping Jin, Qiaoyan Wen:
Comments on "Provable Multicopy Dynamic Data Possession in Cloud Computing Systems". 2584-2586 - Sani M. Abdullahi, Hongxia Wang, Tao Li:
Fractal Coding-Based Robust and Alignment-Free Fingerprint Image Hashing. 2587-2601 - Christian Miranda, Georges Kaddoum, Elias Bou-Harb, Sahil Garg, Kuljeet Kaur:
A Collaborative Security Framework for Software-Defined Wireless Sensor Networks. 2602-2615 - Ruben Tolosana, Rubén Vera-Rodríguez, Julian Fiérrez, Javier Ortega-Garcia:
BioTouchPass2: Touchscreen Password Biometrics Using Time-Aligned Recurrent Neural Networks. 2616-2628 - Lin Zhou:
Multiple Private Key Generation for Continuous Memoryless Sources With a Helper. 2629-2640 - Ridvan Salih Kuzu, Emanuela Piciucco, Emanuele Maiorana, Patrizio Campisi:
On-the-Fly Finger-Vein-Based Biometric Recognition Using Deep Neural Networks. 2641-2654 - Mang Ye, Pong C. Yuen:
PurifyNet: A Robust Person Re-Identification Model With Noisy Labels. 2655-2666 - Hridoy Sankar Dutta, Vishal Raj Dutta, Aditya Adhikary, Tanmoy Chakraborty:
HawkesEye: Detecting Fake Retweeters Using Hawkes Process and Topic Modeling. 2667-2678 - Yunlian Sun, Jinhui Tang, Xiangbo Shu, Zhenan Sun, Massimo Tistarelli:
Facial Age Synthesis With Label Distribution-Guided Generative Adversarial Network. 2679-2691 - Nasser Aldaghri, Hessam Mahdavifar:
Physical Layer Secret Key Generation in Static Environments. 2692-2705 - Yuanquan Hong, Xiaojun Jing, Hui Gao, Yuan He:
Fixed Region Beamforming Using Frequency Diverse Subarray for Secure mmWave Wireless Communications. 2706-2721 - Malihe Aliasgari, Osvaldo Simeone, Jörg Kliewer:
Private and Secure Distributed Matrix Multiplication With Flexible Communication Load. 2722-2734 - Leye Wang, Daqing Zhang, Dingqi Yang, Brian Y. Lim, Xiao Han, Xiaojuan Ma:
Sparse Mobile Crowdsensing With Differential and Distortion Location Privacy. 2735-2749 - Daniele Cono D'Elia, Emilio Coppa, Federico Palmaro, Lorenzo Cavallaro:
On the Dissection of Evasive Malware. 2750-2765 - Zhihai Yang, Qindong Sun, Yaling Zhang, Lei Zhu, Wenjiang Ji:
Inference of Suspicious Co-Visitation and Co-Rating Behaviors and Abnormality Forensics for Recommender Systems. 2766-2781 - Mohannad Alhanahnah, Qiben Yan, Hamid Bagheri, Hao Zhou, Yutaka Tsutano, Witawas Srisa-an, Xiapu Luo:
DINA: Detecting Hidden Android Inter-App Communication in Dynamic Loaded Code. 2782-2797 - Sehee Lim, Byungkyu Song, Seong-Ook Jung:
Highly Independent MTJ-Based PUF System Using Diode-Connected Transistor and Two-Step Postprocessing for Improved Response Stability. 2798-2807 - Atul Prasad Deb Nath, Srivalli Boddupalli, Swarup Bhunia, Sandip Ray:
Resilient System-on-Chip Designs With NoC Fabrics. 2808-2823 - Yue Zheng, Xiaojin Zhao, Takashi Sato, Yuan Cao, Chip-Hong Chang:
Ed-PUF: Event-Driven Physical Unclonable Function for Camera Authentication in Reactive Monitoring System. 2824-2839 - Wanli Wen, Chenxi Liu, Yaru Fu, Tony Q. S. Quek, Fu-Chun Zheng, Shi Jin:
Enhancing Physical Layer Security of Random Caching in Large-Scale Multi-Antenna Heterogeneous Wireless Networks. 2840-2855 - Mehdi Letafati, Ali Kuhestani, Hamid Behroozi:
Three-Hop Untrusted Relay Networks With Hardware Imperfections and Channel Estimation Errors for Internet of Things. 2856-2868 - Loubna Ghammam, Koray Karabina, Patrick Lacharme, Kevin Atighehchi:
A Cryptanalysis of Two Cancelable Biometric Schemes Based on Index-of-Max Hashing. 2869-2880 - Xiong Li, Shanpeng Liu, Rongxing Lu:
Comments on "A Public Auditing Protocol With Novel Dynamic Structure for Cloud Data". 2881-2883 - Yuan Liang, Tongtong Li:
On the Discreteness of the Worst Jamming Distribution for SP-OFDM. 2884-2897 - Jialiang Gong, Xiaodong Xu, Yingke Lei:
Unsupervised Specific Emitter Identification Method Using Radio-Frequency Fingerprint Embedded InfoGAN. 2898-2913 - Lin Liu, Rongmao Chen, Ximeng Liu, Jinshu Su, Linbo Qiao:
Towards Practical Privacy-Preserving Decision Tree Training and Evaluation in the Cloud. 2914-2929 - Kunrui Cao, Buhong Wang, Haiyang Ding, Tengyao Li, Jiwei Tian, Fengkui Gong:
Secure Transmission Designs for NOMA Systems Against Internal and External Eavesdropping. 2930-2943 - Caiyong Wang, Jawad Muhammad, Yunlong Wang, Zhaofeng He, Zhenan Sun:
Towards Complete and Accurate Iris Segmentation Using Deep Multi-Task Attention Network for Non-Cooperative Iris Recognition. 2944-2959 - Yunlian Sun, Jinhui Tang, Zhenan Sun, Massimo Tistarelli:
Facial Age and Expression Synthesis Using Ordinal Ranking Adversarial Networks. 2960-2972 - Wanli Xue, Dinusha Vatsalan, Wen Hu, Aruna Seneviratne:
Sequence Data Matching and Beyond: New Privacy-Preserving Primitives Based on Bloom Filters. 2973-2987 - Eduardo Lopes Cominetti, Marcos A. Simplício Jr.:
Fast Additive Partially Homomorphic Encryption From the Approximate Common Divisor Problem. 2988-2998 - Tao Guo, Ruida Zhou, Chao Tian:
On the Information Leakage in Private Information Retrieval Systems. 2999-3012 - Sheng He, Lambert Schomaker:
FragNet: Writer Identification Using Deep Fragment Networks. 3013-3022 - Xiao Yang, Wang Fat Lau, Qingqing Ye, Man Ho Au, Joseph K. Liu, Jacob Cheng:
Practical Escrow Protocol for Bitcoin. 3023-3034 - David Froelicher, Juan Ramón Troncoso-Pastoriza, Joao Sa Sousa, Jean-Pierre Hubaux:
Drynx: Decentralized, Secure, Verifiable System for Statistical Queries and Machine Learning on Distributed Datasets. 3035-3050 - Saed Alrabaee, Mourad Debbabi, Lingyu Wang:
CPA: Accurate Cross-Platform Binary Authorship Characterization Using LDA. 3051-3066 - Xudong Liu, Sang Wu Kim:
Harnessing Node Multiplicity for Detecting and Mitigating False Data in Wireless Relay Networks. 3067-3078 - Chenyang Tu, Zeyi Liu, Neng Gao, Cunqing Ma, Jingquan Ge, Lingchen Zhang:
MACM: How to Reduce the Multi-Round SCA to the Single-Round Attack on the Feistel-SP Networks. 3079-3092 - Qian Wang, Zixi Li, Qin Zou, Lingchen Zhao, Song Wang:
Deep Domain Adaptation With Differential Privacy. 3093-3106 - Basker Palaniswamy, Seyit Camtepe, Ernest Foo, Josef Pieprzyk:
An Efficient Authentication Scheme for Intra-Vehicular Controller Area Network. 3107-3122 - Edlira Dushku, Md Masoom Rabbani, Mauro Conti, Luigi V. Mancini, Silvio Ranise:
SARA: Secure Asynchronous Remote Attestation for IoT Systems. 3123-3136 - Huadi Zheng, Haibo Hu:
MISSILE: A System of Mobile Inertial Sensor-Based Sensitive Indoor Location Eavesdropping. 3137-3151 - Donghoon Chang, Surabhi Garg, Munawar Hasan, Sweta Mishra:
Cancelable Multi-Biometric Approach Using Fuzzy Extractor and Novel Bit-Wise Encryption. 3152-3167 - Hua Deng, Zheng Qin, Qianhong Wu, Zhenyu Guan, Robert H. Deng, Yujue Wang, Yunya Zhou:
Identity-Based Encryption Transformation for Flexible Sharing of Encrypted Data in Public Cloud. 3168-3180 - Wenyun Sun, Yu Song, Changsheng Chen, Jiwu Huang, Alex C. Kot:
Face Spoofing Detection Based on Local Ternary Label Supervision in Fully Convolutional Networks. 3181-3196 - Qin Zou, Yanling Wang, Qian Wang, Yi Zhao, Qingquan Li:
Deep Learning-Based Gait Recognition Using Smartphones in the Wild. 3197-3212 - Kanad Basu, Suha Sabi Hussain, Ujjwal Gupta, Ramesh Karri:
COPPTCHA: COPPA Tracking by Checking Hardware-Level Activity. 3213-3226 - Hui Cui, Zhiguo Wan, Xinlei Wei, Surya Nepal, Xun Yi:
Pay as You Decrypt: Decryption Outsourcing for Functional Encryption Using Blockchain. 3227-3238 - Chengkun Wei, Shouling Ji, Changchang Liu, Wenzhi Chen, Ting Wang:
AsgLDP: Collecting and Generating Decentralized Attributed Graphs With Local Differential Privacy. 3239-3254 - Donatella Darsena, Giacinto Gelli, Ivan Iudice, Francesco Verde:
Design and Performance Analysis of Channel Estimators Under Pilot Spoofing Attacks in Multiple-Antenna Systems. 3255-3269 - Samet Taspinar, Manoranjan Mohanty, Nasir D. Memon:
Camera Fingerprint Extraction via Spatial Domain Averaged Frames. 3270-3282 - Fawad Ud Din, Fabrice Labeau:
In-Band Full-Duplex Discriminatory Channel Estimation Using MMSE. 3283-3292 - Yunxia Han, Chunxiang Xu, Debiao He, Kefei Chen:
On the Security of a Key Agreement and Key Protection Scheme. 3293-3294 - Yi Sun, Qian Liu, Xingyuan Chen, Xuehui Du:
An Adaptive Authenticated Data Structure With Privacy-Preserving for Big Data Stream in Cloud. 3295-3310 - Xiaolong Lan, Juanjuan Ren, Qingchun Chen, Lin Cai:
Achievable Secrecy Rate Region for Buffer-Aided Multiuser MISO Systems. 3311-3324 - Ana Nieto:
Becoming JUDAS: Correlating Users and Devices During a Digital Investigation. 3325-3334 - Gokhan Gok, Yasar Kemal Alp, Orhan Arikan:
A New Method for Specific Emitter Identification With Results on Real Radar Measurements. 3335-3346 - Allan da Silva Pinto, Siome Goldenstein, Alexandre M. Ferreira, Tiago J. Carvalho, Hélio Pedrini, Anderson Rocha:
Leveraging Shape, Reflectance and Albedo From Shading for Face Presentation Attack Detection. 3347-3358 - Rang Liu, Ming Li, Qian Liu, A. Lee Swindlehurst:
Secure Symbol-Level Precoding in MU-MISO Wiretap Systems. 3359-3373 - Karl-Ludwig Besser, Pin-Hsun Lin, Carsten R. Janda, Eduard A. Jorswieck:
Wiretap Code Design by Neural Network Autoencoders. 3374-3386 - Kai Huang, Yun He:
Trigger Identification Using Difference-Amplified Controllability and Dynamic Transition Probability for Hardware Trojan Detection. 3387-3400 - Yanxin Zhang, Yulei Sui, Shirui Pan, Zheng Zheng, Baodi Ning, Ivor W. Tsang, Wanlei Zhou:
Familial Clustering for Weakly-Labeled Android Malware Using Hybrid Representation Learning. 3401-3414 - Qichao Xu, Zhou Su, Rongxing Lu:
Game Theory and Reinforcement Learning Based Secure Edge Caching in Mobile Social Networks. 3415-3429 - Piya Limcharoen, Nirattaya Khamsemanan, Cholwich Nattee:
View-Independent Gait Recognition Using Joint Replacement Coordinates (JRCs) and Convolutional Neural Network. 3430-3442 - Tao Ding, Ming Qu, Xiong Wu, Boyu Qin, Yongheng Yang, Frede Blaabjerg:
Defense Strategy for Resilient Shipboard Power Systems Considering Sequential Attacks. 3443-3453 - Kang Wei, Jun Li, Ming Ding, Chuan Ma, Howard H. Yang, Farhad Farokhi, Shi Jin, Tony Q. S. Quek, H. Vincent Poor:
Federated Learning With Differential Privacy: Algorithms and Performance Analysis. 3454-3469 - Anita Aghaie, Amir Moradi:
TI-PUF: Toward Side-Channel Resistant Physical Unclonable Functions. 3470-3481 - Fabrizio Guerrini, Marco Dalai, Riccardo Leonardi:
Minimal Information Exchange for Secure Image Hash-Based Geometric Transformations Estimation. 3482-3496 - Kiruba Sankaran Subramani, Noha M. Helal, Angelos Antonopoulos, Aria Nosratinia, Yiorgos Makris:
Amplitude-Modulating Analog/RF Hardware Trojans in Wireless Networks: Risks and Remedies. 3497-3510 - Qian Han, V. S. Subrahmanian, Yanhai Xiong:
Android Malware Detection via (Somewhat) Robust Irreversible Feature Transformations. 3511-3525 - Sima Bagheri, Alireza Shameli-Sendi:
Dynamic Firewall Decomposition and Composition in the Cloud. 3526-3539 - Congyuan Xu, Jizhong Shen, Xin Du:
A Method of Few-Shot Network Intrusion Detection Based on Meta-Learning Framework. 3540-3552 - Songxuan Lai, Yecheng Zhu, Lianwen Jin:
Encoding Pathlet and SIFT Features With Bagged VLAD for Historical Writer Identification. 3553-3566 - Chandranath Adak, Bidyut B. Chaudhuri, Chin-Teng Lin, Michael Blumenstein:
Intra-Variable Handwriting Inspection Reinforced With Idiosyncrasy Analysis. 3567-3579 - Amir Ameli, Khaled A. Saleh, Aram Kirakosyan, Ehab F. El-Saadany, Magdy M. A. Salama:
An Intrusion Detection Method for Line Current Differential Relays in Medium-Voltage DC Microgrids. 3580-3594 - Mohamed Ibrahim, Tung-Che Liang, Kristin Scott, Krishnendu Chakrabarty, Ramesh Karri:
Molecular Barcoding as a Defense Against Benchtop Biochemical Attacks on DNA Fingerprinting and Information Forensics. 3595-3609 - Antonio Greco, Nicolai Petkov, Alessia Saggese, Mario Vento:
AReN: A Deep Learning Approach for Sound Event Recognition Using a Brain Inspired Representation. 3610-3624 - Ulrich Scherhag, Christian Rathgeb, Johannes Merkle, Christoph Busch:
Deep Face Representations for Differential Morphing Attack Detection. 3625-3639 - Jing Li, Yuangang Pan, Yulei Sui, Ivor W. Tsang:
Secure Metric Learning via Differential Pairwise Privacy. 3640-3652 - Zisheng Wang, Rick S. Blum:
A Statistical Learning-Based Algorithm for Topology Verification in Natural Gas Networks Based on Noisy Sensor Measurements. 3653-3666 - Chaimae Boudagdigue, Abderrahim Benslimane, Abdellatif Kobbane, Jiajia Liu:
Trust Management in Industrial Internet of Things. 3667-3682 - Chengtang Yao, Yunde Jia, Huijun Di, Yuwei Wu:
Face Spoofing Detection Using Relativity Representation on Riemannian Manifold. 3683-3693 - Jingdian Ming, Yongbin Zhou, Wei Cheng, Huizhong Li, Guang Yang, Qian Zhang:
Mind the Balance: Revealing the Vulnerabilities in Low Entropy Masking Schemes. 3694-3708 - Qi Feng, Debiao He, Zhe Liu, Huaqun Wang, Kim-Kwang Raymond Choo:
SecureNLP: A System for Multi-Party Privacy-Preserving Natural Language Processing. 3709-3721 - Zhifang Gu, He Henry Chen, Pingping Xu, Yonghui Li, Branka Vucetic:
Physical Layer Authentication for Non-Coherent Massive SIMO-Enabled Industrial IoT Communications. 3722-3733 - Liang Sun, Lu Cao, Zhiyao Tang, Yong Feng:
Artificial-Noise-Aided Secure Multi-User Multi-Antenna Transmission With Quantized CSIT: A Comprehensive Design and Analysis. 3734-3748 - Salman Salamatian, Wasim Huleihel, Ahmad Beirami, Asaf Cohen, Muriel Médard:
Centralized vs Decentralized Targeted Brute-Force Attacks: Guessing With Side-Information. 3749-3759 - Zhexian Shen, Kui Xu, Xiaochen Xia, Wei Xie, Dongmei Zhang:
Spatial Sparsity Based Secure Transmission Strategy for Massive MIMO Systems Against Simultaneous Jamming and Eavesdropping. 3760-3774 - Shuangrui Zhao, Jia Liu, Yulong Shen, Xiaohong Jiang, Norio Shiratori:
Secure Beamforming for Full-Duplex MIMO Two-Way Untrusted Relay Systems. 3775-3790 - Boxiang He, Fanggang Wang:
Cooperative Specific Emitter Identification via Multiple Distorted Receivers. 3791-3806 - Yubao Zhang, Jidong Xiao, Shuai Hao, Haining Wang, Sencun Zhu, Sushil Jajodia:
Understanding the Manipulation on Recommender Systems through Web Injection. 3807-3818 - Ali Shahin Shamsabadi, Adrià Gascón, Hamed Haddadi, Andrea Cavallaro:
PrivEdge: From Local to Distributed Private Training and Prediction. 3819-3831 - Anxiao He, Kai Bu, Yucong Li, Eikoh Chida, Qianping Gu, Kui Ren:
Atomos: Constant-Size Path Validation Proof. 3832-3847 - Xuehu Yan, Yuliang Lu, Lintao Liu, Xianhua Song:
Reversible Image Secret Sharing. 3848-3858 - Wenguang He, Zhanchuan Cai:
An Insight Into Pixel Value Ordering Prediction-Based Prediction-Error Expansion. 3859-3871 - Xinyu Li, Jing Xu, Xiong Fan, Yuchen Wang, Zhenfeng Zhang:
Puncturable Signatures and Applications in Proof-of-Stake Blockchain Protocols. 3872-3885 - Deqiang Li, Qianmu Li:
Adversarial Deep Ensemble: Evasion Attacks and Defenses for Malware Detection. 3886-3900 - Sherif Nagib Abbas Seha, Dimitrios Hatzinakos:
EEG-Based Human Recognition Using Steady-State AEPs and Subject-Unique Spatial Filters. 3901-3910 - Ni Ding, Farhad Farokhi:
Developing Non-Stochastic Privacy-Preserving Policies Using Agglomerative Clustering. 3911-3923 - Hanzhuo Tan, Ajay Kumar:
Towards More Accurate Contactless Fingerprint Minutiae Extraction and Pose-Invariant Matching. 3924-3937 - Xinrui Tan, Hongjia Li, Liming Wang, Zhen Xu:
Comments on "Dropping Activation Outputs with Localized First-Layer Deep Network for Enhancing User Privacy and Data Security". 3938-3939 - Hussain M. J. Almohri, Layne T. Watson, David Evans:
An Attack-Resilient Architecture for the Internet of Things. 3940-3954 - Minchul Kim, Heecheol Yang, Jungwoo Lee:
Private Coded Matrix Multiplication. 1434-1443 - Hyunsoo Kwon, Hyunjae Nam, Sangtae Lee, Changhee Hahn, Junbeom Hur:
(In-)Security of Cookies in HTTPS: Cookie Theft by Removing Cookie Flags. 1204-1215 - Samiran Bag, Feng Hao, Siamak F. Shahandashti, Indranil Ghosh Ray:
SEAL: Sealed-Bid Auction Without Auctioneers. 2042-2052 - Kyung-Ah Shim, Namhun Koo:
Algebraic Fault Analysis of UOV and Rainbow With the Leakage of Random Vinegar Values. 2429-2439
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.