default search action
IEEE Transactions on Information Forensics and Security, Volume 16
Volume 16, 2021
- Zaiyu Pan, Jun Wang, Guoqing Wang, Jihong Zhu:
Multi-Scale Deep Representation Aggregation for Vein Recognition. 1-15 - Zhi Zhang, Yueqiang Cheng, Yansong Gao, Surya Nepal, Dongxi Liu, Yi Zou:
Detecting Hardware-Assisted Virtualization With Inconspicuous Features. 16-27 - Govind Mittal, Pawel Korus, Nasir D. Memon:
FiFTy: Large-Scale File Fragment Type Identification Using Convolutional Neural Networks. 28-41 - Tarang Chugh, Anil K. Jain:
Fingerprint Spoof Detector Generalization. 42-55 - Guoqing Wang, Hu Han, Shiguang Shan, Xilin Chen:
Unsupervised Adversarial Domain Adaptation for Cross-Domain Face Presentation Attack Detection. 56-69 - Weipeng Hu, Haifeng Hu:
Dual Adversarial Disentanglement and Deep Representation Decorrelation for NIR-VIS Face Recognition. 70-85 - Hyeonseong Jo, Jinwoo Kim, Phillip A. Porras, Vinod Yegneswaran, Seungwon Shin:
GapFinder: Finding Inconsistency of Security Information From Unstructured Text. 86-99 - Wenyuan Yang, Yuesheng Zhu:
A Verifiable Semantic Searching Scheme by Optimal Matching Over Encrypted Data in Public Cloud. 100-115 - Dae Yon Hwang, Bilal Taha, Da Saem Lee, Dimitrios Hatzinakos:
Evaluation of the Time Stability and Uniqueness in PPG-Based Biometric System. 116-130 - Shunquan Tan, Weilong Wu, Zilong Shao, Qiushi Li, Bin Li, Jiwu Huang:
CALPA-NET: Channel-Pruning-Assisted Deep Residual Network for Steganalysis of Digital Images. 131-146 - Yuwen Huang, Gongping Yang, Kuikui Wang, Haiying Liu, Yilong Yin:
Learning Joint and Specific Patterns: A Unified Sparse Representation for Off-the-Person ECG Biometric Recognition. 147-160 - Zaid Abdullah, Gaojie Chen, Mohammed A. M. Abdullah, Jonathon A. Chambers:
Enhanced Secrecy Performance of Multihop IoT Networks With Cooperative Hybrid-Duplex Jamming. 161-172 - Théo Taburet, Patrick Bas, Wadih Sawaya, Jessica J. Fridrich:
Natural Steganography in JPEG Domain With a Linear Development Pipeline. 173-186 - Ioan-Catalin Dragoi, Dinu Coltuc:
On the Security of Reversible Data Hiding in Encrypted Images by MSB Prediction. 187-189 - Claude Carlet, Éloi de Chérisey, Sylvain Guilley, Selçuk Kavut, Deng Tang:
Intrinsic Resiliency of S-Boxes Against Side-Channel Attacks-Best and Worst Scenarios. 203-218 - Lu Yang, Gongping Yang, Xiaoming Xi, Kun Su, Qing Chen, Yilong Yin:
Correction to "Finger Vein Code: From Indexing to Matching". 219 - Wei Cheng, Sylvain Guilley, Claude Carlet, Sihem Mesnager, Jean-Luc Danger:
Optimizing Inner Product Masking Scheme by a Coding Theory Approach. 220-235 - Guang Hua, Han Liao, Qingyi Wang, Haijian Zhang, Dengpan Ye:
Detection of Electric Network Frequency in Audio Recordings-From Theory to Practical Detectors. 236-248 - Songze Li, Mingchao Yu, Chien-Sheng Yang, Amir Salman Avestimehr, Sreeram Kannan, Pramod Viswanath:
PolyShard: Coded Sharding Achieves Linearly Scaling Efficiency and Security Simultaneously. 249-261 - Guangcan Mai, Kai Cao, Xiangyuan Lan, Pong C. Yuen:
SecureFace: Face Template Protection. 262-277 - Yijun Quan, Chang-Tsun Li:
On Addressing the Impact of ISO Speed Upon PRNU and Forgery Detection. 190-202 - Junwei Liang, Maode Ma:
ECF-MRS: An Efficient and Collaborative Framework With Markov-Based Reputation Scheme for IDSs in Vehicular Networks. 278-290 - Weike You, Hong Zhang, Xianfeng Zhao:
A Siamese CNN for Image Steganalysis. 291-306 - Yan Li, Yao Cheng, Weizhi Meng, Yingjiu Li, Robert H. Deng:
Designing Leakage-Resilient Password Entry on Head-Mounted Smart Wearable Glass Devices. 307-321 - Kang-Hee Cho, Si-Hyeon Lee:
Treating Interference as Noise Is Optimal for Covert Communication Over Interference Channels. 322-332 - Yu Wang, Yun Cao, Xianfeng Zhao:
Minimizing Embedding Impact for H.264 Steganography by Progressive Trellis Coding. 333-345 - Chunlei Peng, Nannan Wang, Jie Li, Xinbo Gao:
Soft Semantic Representation for Cross-Domain Face Recognition. 346-360 - Anjith George, Sébastien Marcel:
Learning One Class Representations for Face Presentation Attack Detection Using Multi-Channel Convolutional Neural Networks. 361-375 - MyeongAh Cho, Taeoh Kim, Ig-Jae Kim, Kyungjae Lee, Sangyoun Lee:
Relational Deep Feature Learning for Heterogeneous Face Recognition. 376-388 - Ece Naz Erdemir, Pier Luigi Dragotti, Deniz Gündüz:
Privacy-Aware Time-Series Data Sharing With Deep Reinforcement Learning. 389-401 - Ye Fan, Ang Li, Xuewen Liao, Victor C. M. Leung:
Secure Interference Exploitation Precoding in MISO Wiretap Channel: Destructive Region Redefinition With Efficient Solutions. 402-417 - Changhai Ou, Chengju Zhou, Siew-Kei Lam, Guiyuan Jiang:
Multiple-Differential Mechanism for Collision-Optimized Divide-and-Conquer Attacks. 418-430 - Farshad Rostami Ghadi, Ghosheh Abed Hodtani:
Copula-Based Analysis of Physical Layer Security Performances Over Correlated Rayleigh Fading Channels. 431-440 - Julien Lavauzelle, Razane Tajeddine, Ragnar Freij-Hollanti, Camilla Hollanti:
Private Information Retrieval Schemes With Product-Matrix MBR Codes. 441-450 - Weili Han, Ming Xu, Junjie Zhang, Chuanwang Wang, Kai Zhang, X. Sean Wang:
TransPCFG: Transferring the Grammars From Short Passwords to Guess Long Passwords Effectively. 451-465 - Jie Tang, Long Jiao, Kai Zeng, Hong Wen, Kaiyu Qin:
Physical Layer Secure MIMO Communications Against Eavesdroppers With Arbitrary Number of Antennas. 466-481 - Liqian Liang, Congyan Lang, Yidong Li, Songhe Feng, Jian Zhao:
Fine-Grained Facial Expression Recognition in the Wild. 482-494 - Arindam Kar, Sourav Pramanik, Arghya Chakraborty, Debotosh Bhattacharjee, Edmond S. L. Ho, Hubert P. H. Shum:
LMZMPM: Local Modified Zernike Moment Per-Unit Mass for Robust Human Face Recognition. 495-509 - Zhaoyuan Fang, Adam Czajka, Kevin W. Bowyer:
Robust Iris Presentation Attack Detection Fusing 2D and 3D Information. 510-520 - Shuai Zhao, Fenghua Li, Hongwei Li, Rongxing Lu, Siqi Ren, Haiyong Bao, Jianhong Lin, Song Han:
Smart and Practical Privacy-Preserving Data Aggregation for Fog-Based Smart Grids. 521-536 - Zhihai Yang, Qindong Sun, Yaling Zhang, Wei Wang:
Identification of Malicious Injection Attacks in Dense Rating and Co-Visitation Behaviors. 537-552 - Tiantian Zhu, Lei Fu, Qiang Liu, Zi Lin, Yan Chen, Tieming Chen:
One Cycle Attack: Fool Sensor-Based Personal Gait Authentication With Clustering. 553-568 - Dayong Ye, Tianqing Zhu, Sheng Shen, Wanlei Zhou:
A Differentially Private Game Theoretic Approach for Deceiving Cyber Adversaries. 569-584 - Qian Xu, Pinyi Ren, A. Lee Swindlehurst:
Rethinking Secure Precoding via Interference Exploitation: A Smart Eavesdropper Perspective. 585-600 - Bogdan Groza, Lucian Popa, Pal-Stefan Murvay:
CANTO - Covert AutheNtication With Timing Channels Over Optimized Traffic Flows for CAN. 601-616 - Amit Praseed, P. Santhi Thilagam:
Modelling Behavioural Dynamics for Asymmetric Application Layer DDoS Detection. 617-626 - Zhe Cui, Jianjiang Feng, Jie Zhou:
Dense Registration and Mosaicking of Fingerprints by Training an End-to-End Network. 627-642 - Enes Altinisik, Husrev Taha Sencar:
Source Camera Verification for Strongly Stabilized Videos. 643-657 - Ning Wang, Weiwei Li, Amir Alipour-Fanid, Long Jiao, Monireh Dabaghchian, Kai Zeng:
Pilot Contamination Attack Detection for 5G MmWave Grant-Free IoT Networks. 658-670 - Baojin Ding, Haixia Wang, Peng Chen, Yilong Zhang, Zhenhua Guo, Jianjiang Feng, Ronghua Liang:
Surface and Internal Fingerprint Reconstruction From Optical Coherence Tomography Through Convolutional Neural Network. 685-700 - Chong Xiao Wang, Yang Song, Wee Peng Tay:
Arbitrarily Strong Utility-Privacy Tradeoff in Multi-Agent Systems. 671-684 - Hanwei Zhang, Yannis Avrithis, Teddy Furon, Laurent Amsaleg:
Walking on the Edge: Fast, Low-Distortion Adversarial Examples. 701-713 - Xin Ai, Honglong Chen, Kai Lin, Zhibo Wang, Jiguo Yu:
Nowhere to Hide: Efficiently Identifying Probabilistic Cloning Attacks in Large-Scale RFID Systems. 714-727 - Mang Ye, Jianbing Shen, Ling Shao:
Visible-Infrared Person Re-Identification via Homogeneous Augmented Tri-Modal Learning. 728-739 - Fabio Pierazzi, Stefano Cristalli, Danilo Bruschi, Michele Colajanni, Mirco Marchetti, Andrea Lanzi:
Glyph: Efficient ML-Based Detection of Heap Spraying Attacks. 740-755 - Urbi Chatterjee, Debdeep Mukhopadhyay, Rajat Subhra Chakraborty:
3PAA: A Private PUF Protocol for Anonymous Authentication. 756-769 - Yiwen Gao, Yongbin Zhou:
Side-Channel Attacks With Multi-Thread Mixed Leakage. 770-785 - Kunrui Cao, Buhong Wang, Haiyang Ding, Lu Lv, Runze Dong, Tianhao Cheng, Fengkui Gong:
Improving Physical Layer Security of Uplink NOMA via Energy Harvesting Jammers. 786-799 - Hugo Proença, Ehsan Yaghoubi, Pendar Alirezazadeh:
A Quadruplet Loss for Enforcing Semantically Coherent Embeddings in Multi-Output Classification Problems. 800-811 - Solène Bernard, Patrick Bas, John Klein, Tomás Pevný:
Explicit Optimization of min max Steganographic Game. 812-823 - Linlin Zheng, Jiakang Li, Meng Sun, Xiongwei Zhang, Thomas Fang Zheng:
When Automatic Voice Disguise Meets Automatic Speaker Verification. 824-837 - Ming Fan, Wenying Wei, Xiaofei Xie, Yang Liu, Xiaohong Guan, Ting Liu:
Can We Trust Your Explanations? Sanity Checks for Interpreters in Android Malware Analysis. 838-853 - Laurent Amsaleg, James Bailey, Amélie Barbe, Sarah M. Erfani, Teddy Furon, Michael E. Houle, Milos Radovanovic, Xuan Vinh Nguyen:
High Intrinsic Dimensionality Facilitates Adversarial Attack: Theoretical Evidence. 854-865 - Kuo Wang, Ajay Kumar:
Periocular-Assisted Multi-Feature Collaboration for Dynamic Iris Recognition. 866-879 - Zhongliang Yang, Si-yu Zhang, Yuting Hu, Zhiwen Hu, Yongfeng Huang:
VAE-Stega: Linguistic Steganography Based on Variational Auto-Encoder. 880-895 - Qian Wang, Baolin Zheng, Qi Li, Chao Shen, Zhongjie Ba:
Towards Query-Efficient Adversarial Attacks Against Automatic Speech Recognition Systems. 896-908 - Zhihong Zhang, Ruiyang Liang, Xu Chen, Xuexin Xu, Guosheng Hu, Wangmeng Zuo, Edwin R. Hancock:
Semi-Supervised Face Frontalization in the Wild. 909-922 - Guang Chen, Peigen Liu, Zhengfa Liu, Huajin Tang, Lin Hong, Jinhu Dong, Jörg Conradt, Alois C. Knoll:
NeuroAED: Towards Efficient Abnormal Event Detection in Visual Surveillance With Neuromorphic Vision Sensor. 923-936 - Rizhao Cai, Haoliang Li, Shiqi Wang, Changsheng Chen, Alex C. Kot:
DRL-FAS: A Novel Framework Based on Deep Reinforcement Learning for Face Anti-Spoofing. 937-951 - Weixuan Tang, Bin Li, Mauro Barni, Jin Li, Jiwu Huang:
An Automatic Cost Learning Framework for Image Steganography Using Deep Reinforcement Learning. 952-967 - Guyue Li, Chen Sun, Eduard A. Jorswieck, Junqing Zhang, Aiqun Hu, You Chen:
Sum Secret Key Rate Maximization for TDD Multi-User Massive MIMO Wireless Networks. 968-982 - Xiaofeng Jiang, Feng Zhou, Shuangwu Chen, Huasen He, Jian Yang:
Jamming Resilient Tracking Using POMDP-Based Detection of Hidden Targets. 983-998 - Ferucio Laurentiu Tiplea, Cristian Hristea:
PUF Protected Variables: A Solution to RFID Security and Privacy Under Corruption With Temporary State Disclosure. 999-1013 - Mehmet Yamaç, Mete Ahishali, Nikolaos Passalis, Jenni Raitoharju, Bülent Sankur, Moncef Gabbouj:
Multi-Level Reversible Data Anonymization via Compressive Sensing and Data Hiding. 1014-1028 - Jingyu Hua, Zidong Zhou, Sheng Zhong:
Flow Misleading: Worm-Hole Attack in Software-Defined Networking via Building In-Band Covert Channel. 1029-1043 - Jiancheng Cai, Hu Han, Jiyun Cui, Jie Chen, Li Liu, S. Kevin Zhou:
Semi-Supervised Natural Face De-Occlusion. 1044-1057 - Max Hoffmann, Falk Schellenberg, Christof Paar:
ARMORY: Fully Automated and Exhaustive Fault Simulation on ARM-M Binaries. 1058-1073 - Muhammad Zaid Hameed, András György, Deniz Gündüz:
The Best Defense Is a Good Offense: Adversarial Attacks to Avoid Modulation Detection. 1074-1087 - Jizhe Zhou, Chi-Man Pun:
Personal Privacy Protection via Irrelevant Faces Tracking and Pixelation in Video Live Streaming. 1088-1103 - Khurram Shahzad, Xiangyun Zhou:
Covert Wireless Communications Under Quasi-Static Fading With Channel Uncertainty. 1104-1116 - Yaofei Wang, Weiming Zhang, Weixiang Li, Nenghai Yu:
Non-Additive Cost Functions for JPEG Steganography Based on Block Boundary Maintenance. 1117-1130 - Chaitanya Joshi, Jesús M. Ríos Aliaga, David Ríos Insua:
Insider Threat Modeling: An Adversarial Risk Analysis Approach. 1131-1142 - Debayan Deb, Anil K. Jain:
Look Locally Infer Globally: A Generalizable Face Anti-Spoofing Approach. 1143-1157 - Kevin H. M. Cheng, Ajay Kumar:
Deep Feature Collaboration for Challenging 3D Finger Knuckle Identification. 1158-1173 - Qiang Zhu, Mingliang Chen, Chau-Wai Wong, Min Wu:
Adaptive Multi-Trace Carving for Robust Frequency Tracking in Forensic Applications. 1174-1189 - Onur Günlü:
Multi-Entity and Multi-Enrollment Key Agreement With Correlated Noise. 1190-1202 - Hangjing Zhang, Yuejiang Li, Yan Chen, H. Vicky Zhao:
Smart Evolution for Information Diffusion Over Social Networks. 1203-1217 - Shuchao Duan, Zhenxue Chen, Q. M. Jonathan Wu, Lei Cai, Dan Lu:
Multi-Scale Gradients Self-Attention Residual Learning for Face Photo-Sketch Transformation. 1218-1230 - Shan Gu, Jianjiang Feng, Jiwen Lu, Jie Zhou:
Latent Fingerprint Registration via Matching Densely Sampled Points. 1231-1244 - Yusheng Xia, Jinshu Su, Rongmao Chen, Xinyi Huang:
APGS: An Efficient Source-Accountable and Metadata-Private Protocol in the Network Layer. 1245-1260 - Xinchun Yu, Shuangqing Wei, Yuan Luo:
Finite Blocklength Analysis of Gaussian Random Coding in AWGN Channels Under Covert Constraint. 1261-1274 - Martin Higgins, Fei Teng, Thomas Parisini:
Stealthy MTD Against Unsupervised Learning-Based Blind FDI Attacks in Power Systems. 1275-1287 - Jindan Zhang, Rongxing Lu, Baocang Wang, Xu An Wang:
Comments on "Privacy-Preserving Public Auditing Protocol for Regenerating-Code-Based Cloud Storage". 1288-1289 - Fangyuan Zhao, Xuebin Ren, Shusen Yang, Qing Han, Peng Zhao, Xinyu Yang:
Latent Dirichlet Allocation Model Training With Differential Privacy. 1290-1305 - Veeru Talreja, Matthew C. Valenti, Nasser M. Nasrabadi:
Deep Hashing for Secure Multimodal Biometrics. 1306-1321 - Yuli Yang, Meng Ma, Sonia Aïssa, Lajos Hanzo:
Physical-Layer Secret Key Generation via CQI-Mapped Spatial Modulation in Multi-Hop Wiretap Ad-Hoc Networks. 1322-1334 - Teruo M. Maruyama, Luiz S. Oliveira, Alceu S. Britto Jr., Robert Sabourin:
Intrapersonal Parameter Optimization for Offline Handwritten Signature Augmentation. 1335-1350 - Ville Yli-Mäyry, Rei Ueno, Noriyuki Miura, Makoto Nagata, Shivam Bhasin, Yves Mathieu, Tarik Graba, Jean-Luc Danger, Naofumi Homma:
Diffusional Side-Channel Leakage From Unrolled Lightweight Block Ciphers: A Case Study of Power Analysis on PRINCE. 1351-1364 - Alireza Sepas-Moghaddam, Ali Etemad, Fernando Pereira, Paulo Lobato Correia:
Long Short-Term Memory With Gate and State Level Fusion for Light Field-Based Face Recognition. 1365-1379 - Bingyu Li, Jingqiang Lin, Qiongxiao Wang, Ze Wang, Jiwu Jing:
Locally-Centralized Certificate Validation and its Application in Desktop Virtualization Systems. 1380-1395 - Weiyang Xu, Chang Yuan, Shengbo Xu, Hien Quoc Ngo, Wei Xiang:
On Pilot Spoofing Attack in Massive MIMO Systems: Detection and Countermeasure. 1396-1409 - Qiyao Deng, Qi Li, Jie Cao, Yunfan Liu, Zhenan Sun:
Controllable Multi-Attribute Editing of High-Resolution Face Images. 1410-1423 - Saptarshi Ghosh, Manav R. Bhatnagar, Walid Saad, Bijaya K. Panigrahi:
Defending False Data Injection on State Estimation Over Fading Wireless Channels. 1424-1439 - Xiaojun Wu, Jinghui Zhou, Jun Liu, Fangyi Ni, Haoqiang Fan:
Single-Shot Face Anti-Spoofing for Dual Pixel Camera. 1440-1451 - Yaoyao Zhong, Weihong Deng:
Towards Transferable Adversarial Attack Against Deep Face Recognition. 1452-1466 - Qihao Yin, Jianjiang Feng, Jiwen Lu, Jie Zhou:
Joint Estimation of Pose and Singular Points of Fingerprints. 1467-1479 - Huafeng Li, Yiwen Chen, Dapeng Tao, Zhengtao Yu, Guanqiu Qi:
Attribute-Aligned Domain-Invariant Feature Learning for Unsupervised Domain Adaptation Person Re-Identification. 1480-1494 - Sunghwan Cho, Gaojie Chen, Justin P. Coon:
Zero-Forcing Beamforming for Active and Passive Eavesdropper Mitigation in Visible Light Communication Systems. 1495-1505 - Linda Senigagliesi, Marco Baldi, Ennio Gambi:
Comparison of Statistical and Machine Learning Techniques for Physical Layer Authentication. 1506-1521 - Yang You, Zuxing Li, Tobias J. Oechtering:
Energy Management Strategy for Smart Meter Privacy and Cost Saving. 1522-1537 - Kun He, Jing Chen, Qinxi Zhou, Ruiying Du, Yang Xiang:
Secure Dynamic Searchable Symmetric Encryption With Constant Client Storage Cost. 1538-1549 - Chang Liu, Yulin Yang, Xingyan Liu, Linpu Fang, Wenxiong Kang:
Dynamic-Hand-Gesture Authentication Dataset and Benchmark. 1550-1562 - Ruitao Feng, Sen Chen, Xiaofei Xie, Guozhu Meng, Shang-Wei Lin, Yang Liu:
A Performance-Sensitive Malware Detection System Using Deep Learning on Mobile Devices. 1563-1578 - Alejandro Gómez Alanís, José Andrés González López, S. Pavankumar Dubagunta, Antonio M. Peinado, Mathew Magimai-Doss:
On Joint Optimization of Automatic Speaker Verification and Anti-Spoofing in the Embedding Space. 1579-1593 - Mohammad Saidur Rahman, Mohsen Imani, Nate Mathews, Matthew Wright:
Mockingbird: Defending Against Deep-Learning-Based Website Fingerprinting Attacks With Adversarial Traces. 1594-1609 - Yulong Nie, Xiaolong Lan, Yong Liu, Qingchun Chen, Gaojie Chen, Lisheng Fan, Dong Tang:
Achievable Rate Region of Energy-Harvesting Based Secure Two-Way Buffer-Aided Relay Networks. 1610-1625 - Jiexin Zhang, Alastair R. Beresford, Ian Sheret:
Factory Calibration Fingerprinting of Sensors. 1626-1639 - Tong-Xing Zheng, Hao-Wen Liu, Ning Zhang, Zhiguo Ding, Victor C. M. Leung:
Secure Content Delivery in Two-Tier Cache-Enabled mmWave Heterogeneous Networks. 1640-1654 - Zheng Chu, Wanming Hao, Pei Xiao, De Mi, Zilong Liu, Mohsen Khalily, James R. Kelly, Alexandros P. Feresidis:
Secrecy Rate Optimization for Intelligent Reflecting Surface Assisted MIMO System. 1655-1669 - Matthias G. Schraml, Robert T. Schwarz, Andreas Knopp:
Multiuser MIMO Concept for Physical Layer Security in Multibeam Satellite Systems. 1670-1680 - Lu Wei, Jie Cui, Yan Xu, Jiujun Cheng, Hong Zhong:
Secure and Lightweight Conditional Privacy-Preserving Authentication for Securing Traffic Emergency Messages in VANETs. 1681-1695 - S. V. Aruna Kumar, Ehsan Yaghoubi, Abhijit Das, B. S. Harish, Hugo Proença:
The P-DESTRE: A Fully Annotated Dataset for Pedestrian Detection, Tracking, and Short/Long-Term Re-Identification From Aerial Devices. 1696-1708 - Manhua Liu, Peng Qian:
Automatic Segmentation and Enhancement of Latent Fingerprints Using Deep Nested UNets. 1709-1719 - Ryan Heartfield, George Loukas, Anatolij Bezemskij, Emmanouil Panaousis:
Self-Configurable Cyber-Physical Intrusion Detection for Smart Homes Using Reinforcement Learning. 1720-1735 - Xiaojie Guo, Zheli Liu, Jin Li, Jiqiang Gao, Boyu Hou, Changyu Dong, Thar Baker:
VeriFL: Communication-Efficient and Fast Verifiable Aggregation for Federated Learning. 1736-1751 - Ming Jin, Javad Lavaei, Somayeh Sojoudi, Ross Baldick:
Boundary Defense Against Cyber Threat for Power System State Estimation. 1752-1767 - Hyeon-Seong Im, Si-Hyeon Lee:
Mobility-Assisted Covert Communication Over Wireless Ad Hoc Networks. 1768-1781 - Yue Xiao, Peng Zhang, Yuhong Liu:
Secure and Efficient Multi-Signature Schemes for Fabric: An Enterprise Blockchain Platform. 1782-1794 - Qiyang Song, Zhuotao Liu, Jiahao Cao, Kun Sun, Qi Li, Cong Wang:
SAP-SSE: Protecting Search Patterns and Access Patterns in Searchable Symmetric Encryption. 1795-1809 - Jing Zhang, Hong Zhong, Jie Cui, Yan Xu, Lu Liu:
SMAKA: Secure Many-to-Many Authentication and Key Agreement Scheme for Vehicular Networks. 1810-1824 - Mauro Barni, Quoc-Tin Phan, Benedetta Tondi:
Copy Move Source-Target Disambiguation Through Multi-Branch CNNs. 1825-1840 - Chenzhao Yang, Jun Ma, Shilin Wang, Alan Wee-Chung Liew:
Preventing DeepFake Attacks on Speaker Authentication by Dynamic Lip Movement Analysis. 1841-1854 - Yunfan Zhang, Lingfeng Wang, Zhaoxi Liu, Wei Wei:
A Cyber-Insurance Scheme for Water Distribution Systems Considering Malicious Cyberattacks. 1855-1867 - Yuejun Liu, Yongbin Zhou, Shuo Sun, Tianyu Wang, Rui Zhang, Jingdian Ming:
On the Security of Lattice-Based Fiat-Shamir Signatures in the Presence of Randomness Leakage. 1868-1879 - Jing Yan, Yuan Meng, Xian Yang, Xiaoyuan Luo, Xinping Guan:
Privacy-Preserving Localization for Underwater Sensor Networks via Deep Reinforcement Learning. 1880-1895 - Sekhar Rajendran, Zhi Sun, Feng Lin, Kui Ren:
Injecting Reliable Radio Frequency Fingerprints Using Metasurface for the Internet of Things. 1896-1911 - Zhaoyi Meng, Yan Xiong, Wenchao Huang, Fuyou Miao, Jianmeng Huang:
AppAngio: Revealing Contextual Information of Android App Behaviors by API-Level Audit Logs. 1912-1927 - Wenye Liu, Chip-Hong Chang, Fan Zhang:
Stealthy and Robust Glitch Injection Attack on Deep Learning Accelerator for Target With Variational Viewpoint. 1928-1942 - Huanting Wang, Guixin Ye, Zhanyong Tang, Shin Hwei Tan, Songfang Huang, Dingyi Fang, Yansong Feng, Lizhong Bian, Zheng Wang:
Combining Graph-Based Learning With Automated Data Collection for Code Vulnerability Detection. 1943-1958 - Shuyan Hu, Wei Ni, Xin Wang, Abbas Jamalipour, Dean Ta:
Joint Optimization of Trajectory, Propulsion, and Thrust Powers for Covert UAV-on-UAV Video Tracking and Surveillance. 1959-1972 - Tharindu Fernando, Clinton Fookes, Simon Denman, Sridha Sridharan:
Detection of Fake and Fraudulent Faces via Neural Memory Networks. 1973-1988 - Li Sun, Yong Zhang, A. Lee Swindlehurst:
Alternate-Jamming-Aided Wireless Physical-Layer Surveillance: Protocol Design and Performance Analysis. 1989-2003 - Lei Cui, Zhiyu Hao, Yang Jiao, Haiqiang Fei, Xiaochun Yun:
VulDetector: Detecting Vulnerabilities Using Weighted Feature Graph Comparison. 2004-2017 - Alemayehu Solomon Abrar, Neal Patwari, Sneha Kumar Kasera:
Quantifying Interference-Assisted Signal Strength Surveillance of Sound Vibrations. 2018-2030 - Zhizhong Huang, Shouzhen Chen, Junping Zhang, Hongming Shan:
PFA-GAN: Progressive Face Aging With Generative Adversarial Network. 2031-2045 - Meng Shen, Yiting Liu, Liehuang Zhu, Xiaojiang Du, Jiankun Hu:
Fine-Grained Webpage Fingerprinting Using Only Packet Length Information of Encrypted Traffic. 2046-2059 - Ishmam Zabir, Ahmed Maksud, Gaojie Chen, Brian M. Sadler, Yingbo Hua:
Secrecy of Multi-Antenna Transmission With Full-Duplex User in the Presence of Randomly Located Eavesdroppers. 2060-2075 - Mohammed Shayan, Sukanta Bhattacharjee, Ajymurat Orozaliev, Yong-Ak Song, Krishnendu Chakrabarty, Ramesh Karri:
Thwarting Bio-IP Theft Through Dummy-Valve-Based Obfuscation. 2076-2089 - Qiongxiu Li, Jaron Skovsted Gundersen, Richard Heusdens, Mads Græsbøll Christensen:
Privacy-Preserving Distributed Processing: Metrics, Bounds and Algorithms. 2090-2103 - Fangwei Ye, Carolina Naim, Salim El Rouayheb:
ON-OFF Privacy Against Correlation Over Time. 2104-2117 - Farhad Farokhi, Nan Wu, David B. Smith, Mohamed Ali Kâafar:
The Cost of Privacy in Asynchronous Differentially-Private Machine Learning. 2118-2129 - Wanda Li, Jianping Zeng:
Leet Usage and Its Effect on Password Security. 2130-2143 - Jianjun Huang, Songming Han, Wei You, Wenchang Shi, Bin Liang, Jingzheng Wu, Yanjun Wu:
Hunting Vulnerable Smart Contracts via Graph Embedding Based Bytecode Matching. 2144-2156 - Pierre-Francois Marteau:
Random Partitioning Forest for Point-Wise and Collective Anomaly Detection - Application to Network Intrusion Detection. 2157-2172 - Jake Bailey Perazzone, Paul L. Yu, Brian M. Sadler, Rick S. Blum:
Artificial Noise-Aided MIMO Physical Layer Authentication With Imperfect CSI. 2173-2185 - Zijian Fang, Maochao Xu, Shouhuai Xu, Taizhong Hu:
A Framework for Predicting Data Breach Risk: Leveraging Dependence to Cope With Sparsity. 2186-2201 - Quentin Giboulot, Rémi Cogranne, Patrick Bas:
Detectability-Based JPEG Steganography Modeling the Processing Pipeline: The Noise-Content Trade-off. 2202-2217 - Chaoyou Fu, Yibo Hu, Xiang Wu, Guoli Wang, Qian Zhang, Ran He:
High-Fidelity Face Manipulation With Extreme Poses and Expressions. 2218-2231 - Jiayu Zhang, Min Li, Shihao Yan, Chunshan Liu, Xihan Chen, Min-Jian Zhao, Philip Whiting:
Joint Beam Training and Data Transmission Design for Covert Millimeter-Wave Communication. 2232-2245 - Meng Pang, Binghui Wang, Yiu-ming Cheung, Yiran Chen, Bihan Wen:
VD-GAN: A Unified Framework for Joint Prototype and Representation Learning From Contaminated Single Sample per Person. 2246-2259 - Kang Yang, Liqun Chen, Zhenfeng Zhang, Christopher J. P. Newton, Bo Yang, Li Xi:
Direct Anonymous Attestation With Optimal TPM Signing Efficiency. 2260-2275 - S. Rasoul Etesami, Negar Kiyavash, Vincent Léon, H. Vincent Poor:
Optimal Adversarial Policies in the Multiplicative Learning System With a Malicious Expert. 2276-2287 - Yuqing Ni, Junfeng Wu, Li Li, Ling Shi:
Multi-Party Dynamic State Estimation That Preserves Data and Model Privacy. 2288-2299 - Shangbin Han, Qianhong Wu, Han Zhang, Bo Qin, Jiankun Hu, Xingang Shi, Linfeng Liu, Xia Yin:
Log-Based Anomaly Detection With Robust Feature Extraction and Online Learning. 2300-2311 - Amirreza Zamani, Tobias J. Oechtering, Mikael Skoglund:
A Design Framework for Strongly χ²-Private Data Disclosure. 2312-2325 - Parham Gohari, Bo Wu, Calvin Hawkins, Matthew T. Hale, Ufuk Topcu:
Differential Privacy on the Unit Simplex via the Dirichlet Mechanism. 2326-2340 - Mandi Luo, Jie Cao, Xin Ma, Xiaoyu Zhang, Ran He:
FA-GAN: Face Augmentation GAN for Deformation-Invariant Face Recognition. 2341-2355 - Ning Xie, Junjie Chen, Lei Huang:
Physical-Layer Authentication Using Multiple Channel-Based Features. 2356-2366 - Meng Shen, Jinpeng Zhang, Liehuang Zhu, Ke Xu, Xiaojiang Du:
Accurate Decentralized Application Identification via Encrypted Traffic Analysis Using Graph Neural Networks. 2367-2380 - Mohamed K. M. Fadul, Donald R. Reising, T. Daniel Loveless, Abdul R. Ofoli:
Nelder-Mead Simplex Channel Estimation for the RF-DNA Fingerprinting of OFDM Transmitters Under Rayleigh Fading Conditions. 2381-2396 - Antonia Nisioti, George Loukas, Aron Laszka, Emmanouil Panaousis:
Data-Driven Decision Support for Optimizing Cyber Forensic Investigations. 2397-2412 - Leonardo Babun, Hidayet Aksu, A. Selcuk Uluagac:
CPS Device-Class Identification via Behavioral Fingerprinting: From Theory to Practice. 2413-2428 - Dongyang Xu, Pinyi Ren:
Quantum Learning Based Nonrandom Superimposed Coding for Secure Wireless Access in 5G URLLC. 2429-2444 - Pauline Puteaux, William Puech:
Rebuttal: On the Security of Reversible Data Hiding in Encrypted Images by MSB Prediction. 2445-2446 - Qian Li, Yong Qi, Qingyuan Hu, Saiyu Qi, Yun Lin, Jin Song Dong:
Adversarial Adaptive Neighborhood With Feature Importance-Aware Convex Interpolation. 2447-2460 - Hardik Uppal, Alireza Sepas-Moghaddam, Michael A. Greenspan, Ali Etemad:
Depth as Attention for Face Representation Learning. 2461-2476 - Baoliang Chen, Wenhan Yang, Haoliang Li, Shiqi Wang, Sam Kwong:
Camera Invariant Feature Learning for Generalized Face Anti-Spoofing. 2477-2492 - Aparna Bharati, Daniel Moreira, Patrick J. Flynn, Anderson de Rezende Rocha, Kevin W. Bowyer, Walter J. Scheirer:
Transformation-Aware Embeddings for Image Provenance. 2493-2507 - Lilas Alrahis, Satwik Patnaik, Johann Knechtel, Hani H. Saleh, Baker Mohammad, Mahmoud Al-Qutayri, Ozgur Sinanoglu:
UNSAIL: Thwarting Oracle-Less Machine Learning Attacks on Logic Locking. 2508-2523 - Rajorshi Biswas, Sungji Kim, Jie Wu:
Sampling Rate Distribution for Flow Monitoring and DDoS Detection in Datacenter. 2524-2534 - Liang Xiao, Xiaozhen Lu, Tangwei Xu, Weihua Zhuang, Huaiyu Dai:
Reinforcement Learning-Based Physical-Layer Authentication for Controller Area Networks. 2535-2547 - Nadir Khan, Sven Nitzsche, Asier Garciandia López, Jürgen Becker:
Utilizing and Extending Trusted Execution Environment in Heterogeneous SoCs for a Pay-Per-Device IP Licensing Scheme. 2548-2563 - Shiyu Li, Yuan Zhang, Chunxiang Xu, Kefei Chen:
Cryptoanalysis of an Authenticated Data Structure Scheme With Public Privacy-Preserving Auditing. 2564-2565 - Sandamal Weerasinghe, Tansu Alpcan, Sarah M. Erfani, Christopher Leckie:
Defending Support Vector Machines Against Data Poisoning Attacks. 2566-2578 - Caihui Lan, Caifen Wang, Haifeng Li, Liangliang Liu:
Comments on "Attribute-Based Data Sharing Scheme Revisited in Cloud Computing". 2579-2580 - Jingbo Zhou, Xinmiao Zhang:
Generalized SAT-Attack-Resistant Logic Locking. 2581-2592 - Yuchun Fang, Zhengye Xiao, Wei Zhang, Yan Huang, Liang Wang, Nozha Boujemaa, Donald Geman:
Attribute Prototype Learning for Interactive Face Retrieval. 2593-2607 - Carlos Murguia, Iman Shames, Farhad Farokhi, Dragan Nesic, H. Vincent Poor:
On Privacy of Dynamical Systems: An Optimal Probabilistic Mapping Approach. 2608-2620 - Yun Chai, Youguo Wang, Liang Zhu:
Information Sources Estimation in Time-Varying Networks. 2621-2636 - Luca Durante, Lucia Seno, Adriano Valenzano:
A Formal Model and Technique to Redistribute the Packet Filtering Load in Multiple Firewall Networks. 2637-2651 - Huafeng Qin, Mounim A. El-Yacoubi, Yantao Li, Chong-Wen Liu:
Multi-Scale and Multi-Direction GAN for CNN-Based Single Palm-Vein Identification. 2652-2666 - Can Yang, Lan Wang, Houwei Cao, Qihu Yuan, Yong Liu:
User Behavior Fingerprinting With Multi-Item-Sets and Its Application in IPTV Viewer Identification. 2667-2682 - Si-Qi Liu, Xiangyuan Lan, Pong C. Yuen:
Multi-Channel Remote Photoplethysmography Correspondence Feature for 3D Mask Face Presentation Attack Detection. 2683-2696 - Sina Faezi, Rozhin Yasaei, Anomadarshi Barua, Mohammad Abdullah Al Faruque:
Brain-Inspired Golden Chip Free Hardware Trojan Detection. 2697-2708 - MaungMaung AprilPyone, Hitoshi Kiya:
Block-Wise Image Transformation With Secret Key for Adversarially Robust Defense. 2709-2723 - Subir Singh Lamba:
Comments on "Random Distance Method for Generating Unimodal and Multimodal Cancelable Biometric Features". 2724-2726 - Zhexian Shen, Kui Xu, Xiaochen Xia:
Beam-Domain Anti-Jamming Transmission for Downlink Massive MIMO Systems: A Stackelberg Game Perspective. 2727-2742 - Hassan ZivariFard, Matthieu R. Bloch, Aria Nosratinia:
Two-Multicast Channel With Confidential Messages. 2743-2758 - Ajian Liu, Zichang Tan, Jun Wan, Yanyan Liang, Zhen Lei, Guodong Guo, Stan Z. Li:
Face Anti-Spoofing via Adversarial Cross-Modality Translation. 2759-2772 - Xi Jun Lin, Lin Sun, Haipeng Qu:
Cryptanalysis of an Anonymous and Traceable Group Data Sharing in Cloud Computing. 2773-2775 - Yunfan Liu, Qi Li, Zhenan Sun, Tieniu Tan:
A3GAN: An Attribute-Aware Attentive Generative Adversarial Network for Face Aging. 2776-2790 - Zhaoxi Liu, Lingfeng Wang:
FlipIt Game Model-Based Defense Strategy Against Cyberattacks on SCADA Systems Considering Insider Assistance. 2791-2804 - Yang Gao, Wei Wang, Yincheng Jin, Chi Zhou, Wenyao Xu, Zhanpeng Jin:
ThermoTag: A Hidden ID of 3D Printers for Fingerprinting and Watermarking. 2805-2820 - Haejoon Jung, In-Ho Lee:
Comments on "Fixed Region Beamforming Using Frequency Diverse Subarray for Secure mmWave Wireless Communications". 2821-2822 - Shen Wang, Ehsan Toreini, Feng Hao:
Anti-Counterfeiting for Polymer Banknotes Based on Polymer Substrate Fingerprinting. 2823-2835 - Yvo Desmedt, Songbao Mo, Arkadii M. Slinko:
Framing in Secret Sharing. 2836-2842 - Byungkyu Song, Sehee Lim, Seung-Hyuk Kang, Seong-Ook Jung:
Environmental-Variation-Tolerant Magnetic Tunnel Junction-Based Physical Unclonable Function Cell With Auto Write-Back Technique. 2843-2853 - Yuanquan Hong, Hui Gao, Xiaojun Jing, Yuan He:
Rebuttal to "Comments on 'Fixed Region Beamforming Using Frequency Diverse Subarray for Secure MmWave Wireless Communications"'. 2854-2855 - Mari Ganesh Kumar, Shrikanth Narayanan, Mriganka Sur, Hema A. Murthy:
Evidence of Task-Independent Person-Specific Signatures in EEG Using Subspace Techniques. 2856-2871 - Yunhan Qian, Jie Qi, Xiaoyan Kuai, Guangjie Han, Haixin Sun, Shaohua Hong:
Specific Emitter Identification Based on Multi-Level Sparse Representation in Automatic Identification System. 2872-2884 - Tao Li, Yongzhao Li, Octavia A. Dobre:
Modulation Classification Based on Fourth-Order Cumulants of Superposed Signal in NOMA Systems. 2885-2897 - Bhawna Ahuja, Deepak Mishra, Ranjan Bose:
Fair Subcarrier Allocation for Securing OFDMA in IoT Against Full-Duplex Hybrid Attacker. 2898-2911 - Lizhi Xiong, Xinwei Zhong, Ching-Nung Yang, Xiao Han:
Transform Domain-Based Invertible and Lossless Secret Image Sharing With Authentication. 2912-2925 - Quang Nhat Tran, Jiankun Hu:
A Multi-Filter Fingerprint Matching Framework for Cancelable Template Design. 2926-2940 - Mee Lan Han, Byung Il Kwak, Huy Kang Kim:
Event-Triggered Interval-Based Anomaly Detection and Attack Identification Methods for an In-Vehicle Network. 2941-2956 - Caroline Mazini Rodrigues, Aurea Soriano-Vargas, Bahram Lavi, Anderson Rocha, Zanoni Dias:
Manifold Learning for Real-World Event Understanding. 2957-2972 - Haiwei Wu, Jiantao Zhou:
Privacy Leakage of SIFT Features via Deep Generative Model Based Image Reconstruction. 2973-2985 - Peiyu Zhuang, Haodong Li, Shunquan Tan, Bin Li, Jiwu Huang:
Image Tampering Localization Using a Dense Fully Convolutional Network. 2986-2999 - Wenguang He, Gangqiang Xiong, Yaomin Wang:
Reversible Data Hiding Based on Adaptive Multiple Histograms Modification. 3000-3012 - Yongjune Kim, Cyril Guyot, Young-Sik Kim:
On the Efficient Estimation of Min-Entropy. 3013-3025 - Shuai Ma, Yunqi Zhang, Hang Li, Songtao Lu, Naofal Al-Dhahir, Sha Zhang, Shiyin Li:
Robust Beamforming Design for Covert Communications. 3026-3038 - Runze Liu, Chau-Wai Wong:
On Microstructure Estimation Using Flatbed Scanners for Paper Surface-Based Authentication. 3039-3053 - Sinan E. Tandogan, Husrev Taha Sencar:
Estimating Uniqueness of I-Vector-Based Representation of Human Voice. 3054-3067 - Hongcheng Xie, Yu Guo, Xiaohua Jia:
A Privacy-Preserving Online Ride-Hailing System Without Involving a Third Trusted Server. 3068-3081 - Jianzhu Guo, Xiangyu Zhu, Zhen Lei, Stan Z. Li:
Decomposed Meta Batch Normalization for Fast Domain Adaptation in Face Recognition. 3082-3095 - Sara Saeidian, Giulia Cervia, Tobias J. Oechtering, Mikael Skoglund:
Quantifying Membership Privacy via Information Leakage. 3096-3108 - Amir Mahdi Sadeghzadeh, Behrad Tajali, Rasool Jalili:
AWA: Adversarial Website Adaptation. 3109-3122 - Wen Huang, Shijie Zhou, Yongjian Liao:
Unexpected Information Leakage of Differential Privacy Due to the Linear Property of Queries. 3123-3137 - Jinwoo Kim, Jaehyun Nam, Suyeol Lee, Vinod Yegneswaran, Phillip A. Porras, Seungwon Shin:
BottleNet: Hiding Network Bottlenecks Using SDN-Based Topology Deception. 3138-3153 - Ye Yuan, Liji Wu, Xiangmin Zhang:
Gini-Impurity Index Analysis. 3154-3169 - Yen-Lung Lai, Zhe Jin, KokSheik Wong, Massimo Tistarelli:
Efficient Known-Sample Attack for Distance-Preserving Hashing Biometric Template Protection Schemes. 3170-3185 - Shuyi Li, Bob Zhang:
Joint Discriminative Sparse Coding for Robust Hand-Based Multimodal Recognition. 3186-3198 - Zhi Sun, Sarankumar Balakrishnan, Lu Su, Arupjyoti Bhuyan, Pu Wang, Chunming Qiao:
Who Is in Control? Practical Physical Layer Attack and Defense for mmWave-Based Sensing in Autonomous Vehicles. 3199-3214 - Yoo-Seung Won, Xiaolu Hou, Dirmanto Jap, Jakub Breier, Shivam Bhasin:
Back to the Basics: Seamless Integration of Side-Channel Pre-Processing in Deep Neural Networks. 3215-3227 - Zhichao Sheng, Hoang Duong Tuan, Ali Arshad Nasir, H. Vincent Poor, Eryk Dutkiewicz:
Physical Layer Security Aided Wireless Interference Networks in the Presence of Strong Eavesdropper Channels. 3228-3240 - Chao Lin, Debiao He, Xinyi Huang, Kim-Kwang Raymond Choo:
OBFP: Optimized Blockchain-Based Fair Payment for Outsourcing Computations in Cloud Computing. 3241-3253 - Alexander Kulow, Thomas Schamberger, Lars Tebelmann, Georg Sigl:
Finding the Needle in the Haystack: Metrics for Best Trace Selection in Unsupervised Side-Channel Attacks on Blinded RSA. 3254-3268 - Dimitris Mouris, Nektarios Georgios Tsoutsos:
Zilch: A Framework for Deploying Transparent Zero-Knowledge Proofs. 3269-3284 - Mehmet Aktukmak, Yasin Yilmaz, Ismail Uysal:
Sequential Attack Detection in Recommender Systems. 3285-3298 - Hanzhuo Tan, Ajay Kumar:
Minutiae Attention Network With Reciprocal Distance Loss for Contactless to Contact-Based Fingerprint Identification. 3299-3311 - Tiantian Zhu, Jiayu Wang, Linqi Ruan, Chunlin Xiong, Jinkai Yu, Yaosheng Li, Yan Chen, Mingqi Lv, Tieming Chen:
General, Efficient, and Real-Time Data Compaction Strategy for APT Forensic Analysis. 3312-3325 - Yun Cao, Hong Zhang, Xianfeng Zhao, Xiaolei He:
Steganalysis of H.264/AVC Videos Exploiting Subtractive Prediction Error Blocks. 3326-3338 - Ngoc Tuyen Le, Duong Binh Giap, Jing-Wein Wang, Chih-Chiang Wang:
Tensor-Compensated Color Face Recognition. 3339-3354 - Olivier Cabana, Amr M. Youssef, Mourad Debbabi, Bernard Lebel, Marthe Kassouf, Ribal Atallah, Basile L. Agba:
Threat Intelligence Generation Using Network Telescope Data for Industrial Control Systems. 3355-3370 - Shuangrui Zhao, Jia Liu, Yulong Shen, Xiaohong Jiang, Norio Shiratori:
Secure and Energy-Efficient Precoding for MIMO Two-Way Untrusted Relay Systems. 3371-3386 - Yan Qin, Weiping Wang, Shigeng Zhang, Kai Chen:
An Exploit Kits Detection Approach Based on HTTP Message Graph. 3387-3400 - Hongliang He, Xizhao Luo, Jian Weng, Kaimin Wei:
Secure Transmission in Multiple Access Wiretap Channel: Cooperative Jamming Without Sharing CSI. 3401-3411 - Jian Chen, Xuxin Zhang, Rui Zhang, Chen Wang, Ling Liu:
De-Pois: An Attack-Agnostic Defense against Data Poisoning Attacks. 3412-3425 - Nikhil Chawla, Harshit Kumar, Saibal Mukhopadhyay:
Machine Learning in Wavelet Domain for Electromagnetic Emission Based Malware Analysis. 3426-3441 - Wenjie Ding, Xing Wei, Rongrong Ji, Xiaopeng Hong, Qi Tian, Yihong Gong:
Beyond Universal Person Re-Identification Attack. 3442-3455 - Saeedreza Shehnepoor, Roberto Togneri, Wei Liu, Mohammed Bennamoun:
DFraud³: Multi-Component Fraud Detection Free of Cold-Start. 3456-3468 - Luca Demetrio, Battista Biggio, Giovanni Lagorio, Fabio Roli, Alessandro Armando:
Functionality-Preserving Black-Box Optimization of Adversarial Windows Malware. 3469-3478 - Zhenyu Ning, Fengwei Zhang:
Corrections to "Hardware-Assisted Transparent Tracing and Debugging on ARM". 3479 - Jiayi Zhang, Hongyang Du, Qiang Sun, Bo Ai, Derrick Wing Kwan Ng:
Physical Layer Security Enhancement With Reconfigurable Intelligent Surface-Aided Networks. 3480-3495 - Marco Ceccato, Francesco Formaggio, Nicola Laurenti, Stefano Tomasin:
Generalized Likelihood Ratio Test for GNSS Spoofing Detection in Devices With IMU. 3496-3509 - Linghui Zhou, Minh Thanh Vu, Tobias J. Oechtering, Mikael Skoglund:
Privacy-Preserving Identification Systems With Noisy Enrollment. 3510-3523 - Muteb Aljasem, Aun Irtaza, Hafiz Malik, Noushin Saba, Ali Javed, Khalid Mahmood Malik, Mohammad Meharmohammadi:
Secure Automatic Speaker Verification (SASV) System Through sm-ALTP Features and Asymmetric Bagging. 3524-3537 - Jian Yang, Xiang Chen, Shuangwu Chen, Xiaofeng Jiang, Xiaobin Tan:
Conditional Variational Auto-Encoder and Extreme Value Theory Aided Two-Stage Learning Approach for Intelligent Fine-Grained Known/Unknown Intrusion Detection. 3538-3553 - Michele Cirillo, Mario Di Mauro, Vincenzo Matta, Marco Tambasco:
Botnet Identification in DDoS Attacks With Multiple Emulation Dictionaries. 3554-3569 - Harkeerat Kaur, Pritee Khanna:
Rebuttal to "Comments on Random Distance Method Generating Unimodal and Multimodal Cancelable Biometric Features". 3570-3572 - Wenting Li, Haibo Cheng, Ping Wang, Kaitai Liang:
Practical Threshold Multi-Factor Authentication. 3573-3588 - Cong Dong, Zhigang Lu, Zelin Cui, Baoxu Liu, Kai Chen:
MBTree: Detecting Encryption RATs Communication Using Malicious Behavior Tree. 3589-3603 - Paolo Addesso, Mauro Barni, Mario Di Mauro, Vincenzo Matta:
Adversarial Kendall's Model Towards Containment of Distributed Cyber-Threats. 3604-3619 - Qianjun Liu, Shouling Ji, Changchang Liu, Chunming Wu:
A Practical Black-Box Attack on Source Code Authorship Identification Classifiers. 3620-3633 - Jawad Muhammad, Yunlong Wang, Caiyong Wang, Kunbo Zhang, Zhenan Sun:
CASIA-Face-Africa: A Large-Scale African Face Image Database. 3634-3646 - Sorour Sheidani, Ahmad Mahmoudi Aznaveh, Ziba Eslami:
CPA-Secure Privacy-Preserving Reversible Data Hiding for JPEG Images. 3647-3661 - Yiqi Chen, Dan He, Yuan Luo:
Strong Secrecy of Arbitrarily Varying Multiple Access Channels. 3662-3677 - Mir Ali Rezazadeh Baee, Leonie Simpson, Xavier Boyen, Ernest Foo, Josef Pieprzyk:
On the Efficiency of Pairing-Based Authentication for Connected Vehicles: Time is Not on Our Side! 3678-3693 - Bo Jiang, Mohamed Seif, Ravi Tandon, Ming Li:
Context-Aware Local Information Privacy. 3694-3708 - Jialin Wen, Benjamin Zi Hao Zhao, Minhui Xue, Alina Oprea, Haifeng Qian:
With Great Dispersion Comes Greater Resilience: Efficient Poisoning Attacks and Defenses for Linear Regression Models. 3709-3723 - Abdulrahman Alaql, Swarup Bhunia:
SARO: Scalable Attack-Resistant Logic Locking. 3724-3739 - Souhail Meftah, Benjamin Hong Meng Tan, Chan Fook Mun, Khin Mi Mi Aung, Bharadwaj Veeravalli, Vijay Chandrasekhar:
DOReN: Toward Efficient Deep Convolutional Neural Networks with Fully Homomorphic Encryption. 3740-3752 - Zhe Qu, Shangqing Zhao, Jie Xu, Zhuo Lu, Yao Liu:
How to Test the Randomness From the Wireless Channel for Security? 3753-3766 - Juncheng Chen, Jun-Sheng Ng, Kwen-Siong Chong, Zhiping Lin, Bah-Hwee Gwee:
A Novel Normalized Variance-Based Differential Power Analysis Against Masking Countermeasures. 3767-3779 - Antonio Tarrías-Muñoz, José Luis Matez-Bandera, Pablo Ramírez-Espinosa, Francisco Javier López-Martínez:
Effect of Correlation Between Information and Energy Links in Secure Wireless Powered Communications. 3780-3789 - Akira Ito, Kotaro Saito, Rei Ueno, Naofumi Homma:
Imbalanced Data Problems in Deep Learning-Based Side-Channel Attacks: Analysis and Solution. 3790-3802 - Amena Khatun, Simon Denman, Sridha Sridharan, Clinton Fookes:
End-to-End Domain Adaptive Attention Network for Cross-Domain Person Re-Identification. 3803-3813 - Sven Müelich, Holger Mandry, Maurits Ortmanns, Robert F. H. Fischer:
A Multilevel Coding Scheme for Multi-Valued Physical Unclonable Functions. 3814-3827 - Prabuddha Chakraborty, Jonathan Cruz, Abdulrahman Alaql, Swarup Bhunia:
SAIL: Analyzing Structural Artifacts of Logic Locking Using Machine Learning. 3828-3842 - Xin Wang, Hideaki Ishii, Jianping He, Peng Cheng:
Dynamic Privacy-Aware Collaborative Schemes for Average Computation: A Multi-Time Reporting Case. 3843-3858 - Seyit Camtepe, Jarek Duda, Arash Mahboubi, Pawel Morawiecki, Surya Nepal, Marcin Pawlowski, Josef Pieprzyk:
Compcrypt-Lightweight ANS-Based Compression and Encryption. 3859-3873 - Guang Hua, Han Liao, Haijian Zhang, Dengpan Ye, Jiayi Ma:
Robust ENF Estimation Based on Harmonic Enhancement and Maximum Weight Clique. 3874-3887 - Xia Feng, Qichen Shi, Qingqing Xie, Liangmin Wang:
P2BA: A Privacy-Preserving Protocol With Batch Authentication Against Semi-Trusted RSUs in Vehicular Ad Hoc Networks. 3888-3899 - Arijit Dutta, Suyash Bagad, Saravanan Vijayakumaran:
MProve+: Privacy Enhancing Proof of Reserves Protocol for Monero. 3900-3915 - Shengling Wang, Lina Shi, Qin Hu, Junshan Zhang, Xiuzhen Cheng, Jiguo Yu:
Privacy-Aware Data Trading. 3916-3927 - Hangyu Tian, Kaiping Xue, Xinyi Luo, Shaohua Li, Jie Xu, Jianqing Liu, Jun Zhao, David S. L. Wei:
Enabling Cross-Chain Transactions: A Decentralized Cryptocurrency Exchange Protocol. 3928-3941 - Philipp Terhörst, Daniel Fährmann, Jan Niklas Kolf, Naser Damer, Florian Kirchbuchner, Arjan Kuijper:
MAAD-Face: A Massively Annotated Attribute Dataset for Face Images. 3942-3957 - Yin Zhang, Zhangqing He, Meilin Wan, Jiuyang Liu, Haoshuang Gu, Xuecheng Zou:
A SC PUF Standard Cell Used for Key Generation and Anti-Invasive-Attack Protection. 3958-3973 - Junqing Zhang, Roger F. Woods, Magnus Sandell, Mikko Valkama, Alan Marshall, Joseph R. Cavallaro:
Radio Frequency Fingerprint Identification for Narrowband Systems, Modelling and Classification. 3974-3987 - Lili Gao, Fangyu Zheng, Rong Wei, Jiankuo Dong, Niall Emmart, Yuan Ma, Jingqiang Lin, Charles C. Weems:
DPF-ECC: A Framework for Efficient ECC With Double Precision Floating-Point Computing Power. 3988-4002 - Alejandro Cohen, Asaf Cohen, Omer Gurewitz:
Secure Group Testing. 4003-4018 - Zhengmin Kong, Jing Song, Chao Wang, Hongyang Chen, Lajos Hanzo:
Hybrid Analog-Digital Precoder Design for Securing Cognitive Millimeter Wave Networks. 4019-4034 - Bashir M. Sabquat Bahar Talukder, Farah Ferdaus, Md. Tauhidur Rahman:
Memory-Based PUFs are Vulnerable as Well: A Non-Invasive Attack Against SRAM PUFs. 4035-4049 - Yuanhao Wang, Qiong Huang, Hongbo Li, Meiyan Xiao, Sha Ma, Willy Susilo:
Private Set Intersection With Authorization Over Outsourced Encrypted Datasets. 4050-4062 - Meng Shen, Hao Yu, Liehuang Zhu, Ke Xu, Qi Li, Jiankun Hu:
Effective and Robust Physical-World Attacks on Deep Learning Face Recognition Systems. 4063-4077 - Lin Zhou, Daming Cao:
Privacy-Utility Tradeoff for Hypothesis Testing Over a Noisy Channel. 4078-4091 - S. Sundeep Desai, Manisha J. Nene:
Multihop Trust Evaluation Using Memory Integrity in Wireless Sensor Networks. 4092-4100 - Chong Huang, Gaojie Chen, Kai-Kit Wong:
Multi-Agent Reinforcement Learning-Based Buffer-Aided Relay Selection in IRS-Assisted Secure Cooperative Networks. 4101-4112 - Su Peng, Liang Zhao, Neeraj Kumar:
Comments on "Efficient Public Verification of Data Integrity for Cloud Storage Systems From Indistinguishability Obfuscation". 4113-4116 - Ming Fan, Ziliang Si, Xiaofei Xie, Yang Liu, Ting Liu:
Text Backdoor Detection Using an Interpretable RNN Abstract Model. 4117-4132 - Mubark Jedh, Lotfi Ben Othmane, Noor Ahmed, Bharat K. Bhargava:
Detection of Message Injection Attacks Onto the CAN Bus Using Similarities of Successive Messages-Sequence Graphs. 4133-4146 - Blaz Meden, Peter Rot, Philipp Terhörst, Naser Damer, Arjan Kuijper, Walter J. Scheirer, Arun Ross, Peter Peer, Vitomir Struc:
Privacy-Enhancing Face Biometrics: A Comprehensive Survey. 4147-4183 - Danny Keller, Margarita Osadchy, Orr Dunkelman:
Inverting Binarizations of Facial Templates Produced by Deep Learning (and Its Implications). 4184-4196 - Guannan Dong, Chi-Man Pun, Zheng Zhang:
Deep Collaborative Multi-Modal Learning for Unsupervised Kinship Estimation. 4197-4210 - Mohd Fazil, Amit Kumar Sah, Muhammad Abulaish:
DeepSBD: A Deep Neural Network Model With Attention Mechanism for SocialBot Detection. 4211-4223 - Wei Li, Jiayao Li, Dawu Gu, Chaoyun Li, Tianpei Cai:
Statistical Fault Analysis of the Simeck Lightweight Cipher in the Ubiquitous Sensor Networks. 4224-4233 - Jiachen Yang, Aiyun Li, Shuai Xiao, Wen Lu, Xinbo Gao:
MTD-Net: Learning to Detect Deepfakes Images by Multi-Scale Texture Difference. 4234-4245 - Yangyang Wu, Changsong Jiang, Chunxiang Xu, Kefei Chen:
Security Analysis of a Path Validation Scheme With Constant-Size Proof. 4246-4248 - Marguerite Delcourt, Jean-Yves Le Boudec:
TDOA Source-Localization Technique Robust to Time-Synchronization Attacks. 4249-4264 - Pinchang Zhang, Jun Liu, Yulong Shen, Xiaohong Jiang:
Exploiting Channel Gain and Phase Noise for PHY-Layer Authentication in Massive MIMO Systems. 4265-4279 - Yahang Wang, Xiaoning Song, Tianyang Xu, Zhenhua Feng, Xiaojun Wu:
From RGB to Depth: Domain Transfer Network for Face Anti-Spoofing. IEEE Trans. Inf. Forensics Secur. 16: 4280-4290 (2021) - Weiqi Dai, Yan Lv, Kim-Kwang Raymond Choo, Zhongze Liu, Deqing Zou, Hai Jin:
CRSA: A Cryptocurrency Recovery Scheme Based on Hidden Assistance Relationships. 4291-4305 - Xianbo Mo, Shunquan Tan, Bin Li, Jiwu Huang:
MCTSteg: A Monte Carlo Tree Search-Based Reinforcement Learning Framework for Universal Non-Additive Steganography. 4306-4320 - Michael Gruber, Matthias Probst, Patrick Karl, Thomas Schamberger, Lars Tebelmann, Michael Tempelmeier, Georg Sigl:
DOMREP-An Orthogonal Countermeasure for Arbitrary Order Side-Channel and Fault Attack Protection. 4321-4335 - Kiran B. Raja, Matteo Ferrara, Annalisa Franco, Luuk J. Spreeuwers, Ilias Batskos, Florens de Wit, Marta Gomez-Barrero, Ulrich Scherhag, Daniel Fischer, Sushma Venkatesh, Jag Mohan Singh, Guoqiang Li, Loïc Bergeron, Sergey Isadskiy, Raghavendra Ramachandra, Christian Rathgeb, Dinusha Frings, Uwe Seidel, Fons Knopjes, Raymond N. J. Veldhuis, Davide Maltoni, Christoph Busch:
Morphing Attack Detection-Database, Evaluation Platform, and Benchmarking. 4336-4351 - Feng Ye, Zheyuan Cheng, Xianghui Cao, Mo-Yuen Chow:
A Random-Weight Privacy-Preserving Algorithm With Error Compensation for Microgrid Distributed Energy Management. 4352-4362 - Hassaan Irshad, Gabriela F. Ciocarlie, Ashish Gehani, Vinod Yegneswaran, Kyu Hyung Lee, Jignesh M. Patel, Somesh Jha, Yonghwi Kwon, Dongyan Xu, Xiangyu Zhang:
TRACE: Enterprise-Wide Provenance Tracking for Real-Time APT Detection. 4363-4376 - Yicheng Zhang, Rozhin Yasaei, Hao Chen, Zhou Li, Mohammad Abdullah Al Faruque:
Stealing Neural Network Structure Through Remote FPGA Side-Channel Analysis. 4377-4388 - Seungwan Hong, Seunghong Kim, Jiheon Choi, Younho Lee, Jung Hee Cheon:
Efficient Sorting of Homomorphic Encrypted Data With k-Way Sorting Network. 4389-4404 - Selim Yilmaz, Emre Aydogan, Sevil Sen:
A Transfer Learning Approach for Securing Resource-Constrained IoT Devices. 4405-4418 - Gabriel Bertocco, Fernanda A. Andaló, Anderson Rocha:
Unsupervised and Self-Adaptative Techniques for Cross-Domain Person Re-Identification. 4419-4434 - Renjie Xie, Wei Xu, Yanzhi Chen, Jiabao Yu, Aiqun Hu, Derrick Wing Kwan Ng, A. Lee Swindlehurst:
A Generalizable Model-and-Data Driven Approach for Open-Set RFF Authentication. 4435-4450 - Sen Wang, J. Morris Chang:
Privacy-Preserving Boosting in the Local Setting. 4451-4465 - Yanbin Li, Zhe Liu, Sylvain Guilley, Ming Tang:
Analysis of Multiplicative Low Entropy Masking Schemes Against Correlation Power Attack. 4466-4481 - Jiyan Zhang, Ting Cui, Chenhui Jin:
ICT: A Cryptanalysis Toolbox for Block Cipher Structure With Secret Components. 4482-4493 - Si Gao, Elisabeth Oswald, Yan Yan:
Neyman's Smoothness Test: A Trade-Off Between Moment-Based and Distribution-Based Leakage Detections. 4494-4506 - Shengmin Xu, Jianting Ning, Jinhua Ma, Xinyi Huang, Robert H. Deng:
K-Time Modifiable and Epoch-Based Redactable Blockchain. 4507-4520 - Marzieh Edraki, Nazmul Karim, Nazanin Rahnavard, Ajmal Mian, Mubarak Shah:
Odyssey: Creation, Analysis and Detection of Trojan Models. 4521-4533 - Qiangchang Wang, Guodong Guo:
DSA-Face: Diverse and Sparse Attentions for Face Recognition Robust to Pose Variation and Occlusion. 4534-4543 - Xianglei Hu, Jiangqun Ni, Weizhe Zhang, Jiwu Huang:
Efficient JPEG Batch Steganography Using Intrinsic Energy of Image Contents. 4544-4558 - Pengli Nie, Guangquan Xu, Litao Jiao, Shaoying Liu, Jian Liu, Weizhi Meng, Hongyue Wu, Meiqi Feng, Weizhe Wang, Zhengjun Jing, Xi Zheng:
Sparse Trust Data Mining. 4559-4573 - Xiaoyuan Liu, Hongwei Li, Guowen Xu, Zongqi Chen, Xiaoming Huang, Rongxing Lu:
Privacy-Enhanced Federated Learning Against Poisoning Adversaries. 4574-4588 - Xiaofeng Ding, Zuan Wang, Pan Zhou, Kim-Kwang Raymond Choo, Hai Jin:
Efficient and Privacy-Preserving Multi-Party Skyline Queries Over Encrypted Data. 4589-4604 - Shi-Yuan Wang, Matthieu R. Bloch:
Covert MIMO Communications Under Variational Distance Constraint. 4605-4620 - Minglin Liu, Weiqi Luo, Peijia Zheng, Jiwu Huang:
A New Adversarial Embedding Method for Enhancing Image Steganography. 4621-4634 - Shervin Rahimzadeh Arashloo:
Matrix-Regularized One-Class Multiple Kernel Learning for Unseen Face Presentation Attack Detection. 4635-4647 - Bo Li, Qiang He, Feifei Chen, Haipeng Dai, Hai Jin, Yang Xiang, Yun Yang:
Cooperative Assurance of Cache Data Integrity for Mobile Edge Computing. 4648-4662 - Song Bian, Dur-e-Shahwar Kundi, Kazuma Hirozawa, Weiqiang Liu, Takashi Sato:
APAS: Application-Specific Accelerators for RLWE-Based Homomorphic Linear Transformations. 4663-4678 - Haomiao Sun, Hongyu Pan, Hu Han, Shiguang Shan:
Deep Conditional Distribution Learning for Age Estimation. 4679-4690 - Zhisheng Hu, Ping Chen, Minghui Zhu, Peng Liu:
A Co-Design Adaptive Defense Scheme With Bounded Security Damages Against Heartbleed-Like Attacks. 4691-4704 - Yang Yang, Zhangshuang Guan, Zhiguo Wan, Jian Weng, HweeHwa Pang, Robert H. Deng:
PriScore: Blockchain-Based Self-Tallying Election System Supporting Score Voting. 4705-4720 - Ronghua Hu, Tian Wang, Yi Zhou, Hichem Snoussi, Abel Cherouat:
FT-MDnet: A Deep-Frozen Transfer Learning Framework for Person Search. 4721-4732 - Fanhua Shang, Tao Xu, Yuanyuan Liu, Hongying Liu, Longjie Shen, Maoguo Gong:
Differentially Private ADMM Algorithms for Machine Learning. 4733-4745 - Shengmin Xu, Jianting Ning, Xinyi Huang, Jianying Zhou, Robert H. Deng:
Server-Aided Bilateral Access Control for Secure Data Sharing With Dynamic User Groups. 4746-4761 - Chryssalenia Koumpouzi, Predrag Spasojevic, Fikadu T. Dagefu:
Improved LPD Characteristics for QS-DS-CDMA Employing Randomization Techniques. 4762-4771 - Yue Wang, Esha Sarkar, Wenqing Li, Michail Maniatakos, Saif Eddin Jabari:
Stop-and-Go: Exploring Backdoor Attacks on Deep Reinforcement Learning-Based Traffic Congestion Control Systems. 4772-4787 - Xuxin Zhang, Jian Chen, Rui Zhang, Chen Wang, Ling Liu:
Attacking Recommender Systems With Plausible Profile. 4788-4800 - Pawel Szalachowski:
Password-Authenticated Decentralized Identities. 4801-4810 - Sonal Joshi, Jesús Villalba, Piotr Zelasko, Laureano Moro-Velázquez, Najim Dehak:
Study of Pre-Processing Defenses Against Adversarial Attacks on State-of-the-Art Speaker Recognition Systems. 4811-4826 - Zhicong Yan, Jun Wu, Gaolei Li, Shenghong Li, Mohsen Guizani:
Deep Neural Backdoor in Semi-Supervised Learning: Threats and Countermeasures. 4827-4842 - Linan Huang, Quanyan Zhu:
Duplicity Games for Deception Design With an Application to Insider Threat Mitigation. 4843-4856 - Enes Altinisik, Hüsrev T. Sencar:
Automatic Generation of H.264 Parameter Sets to Recover Video File Fragments. 4857-4868 - Lu Yang, Gongping Yang, Kuikui Wang, Fanchang Hao, Yilong Yin:
Finger Vein Recognition via Sparse Reconstruction Error Constrained Low-Rank Representation. 4869-4881 - An Wang, Yuan Li, Yaoling Ding, Liehuang Zhu, Yongjuan Wang:
Efficient Framework for Genetic Algorithm-Based Correlation Power Analysis. 4882-4894 - Kosuke Shimizu, Taizo Suzuki:
Finely Tunable Bitcuboid-Based Encryption With Exception-Free Signed Binarization for JPEG Standard. 4895-4908 - Xiangyu Wang, Jianfeng Ma, Feng Li, Ximeng Liu, Yinbin Miao, Robert H. Deng:
Enabling Efficient Spatial Keyword Queries on Encrypted Data With Strong Security Guarantees. 4909-4923 - Aditya Kuppa, Nhien-An Le-Khac:
Adversarial XAI Methods in Cybersecurity. 4924-4938 - Sang Wu Kim, Xudong Liu:
Crypto-Aided MAP Test for Low-Latency Detection of False Data in Short Packets. 4939-4949 - Meng Yue, Jing Li, Zhijun Wu, Minxiao Wang:
High-Potency Models of LDoS Attack Against CUBIC + RED. 4950-4965 - Aris Gkoulalas-Divanis, Dinusha Vatsalan, Dimitrios Karapiperis, Murat Kantarcioglu:
Modern Privacy-Preserving Record Linkage Techniques: An Overview. 4966-4987 - Qiying Dong, Chunfu Jia, Fei Duan, Ding Wang:
RLS-PSM: A Robust and Accurate Password Strength Meter Based on Reuse, Leet and Separation. 4988-5002 - Mandi Luo, Xin Ma, Zhihang Li, Jie Cao, Ran He:
Partial NIR-VIS Heterogeneous Face Recognition With Automatic Saliency Search. 5003-5017 - Hamed Bastami, Mehdi Letafati, Majid Moradikia, Ahmed Abdelhadi, Hamid Behroozi, Lajos Hanzo:
On the Physical Layer Security of the Cooperative Rate-Splitting-Aided Downlink in UAV Networks. 5018-5033 - Arya Krishnan, Tony Thomas, Deepak Mishra:
Finger Vein Pulsation-Based Biometric Recognition. 5034-5044 - Amina Bassit, Florian Hahn, Joep Peeters, Tom Kevenaar, Raymond N. J. Veldhuis, Andreas Peter:
Fast and Accurate Likelihood Ratio-Based Biometric Verification Secure Against Malicious Adversaries. 5045-5060 - Zisheng Wang, Rick S. Blum:
Algorithms and Analysis for Optimizing the Tracking Performance of Cyber Attacked Sensor-Equipped Connected Vehicle Networks. 5061-5076 - Vasudev Gohil, Mark Tressler, Kevin Sipple, Satwik Patnaik, Jeyavijayan Rajendran:
Games, Dollars, Splits: A Game-Theoretic Analysis of Split Manufacturing. 5077-5092 - Jian Yu, Yuewang He, Qiben Yan, Xiangui Kang:
SpecView: Malware Spectrum Visualization Framework With Singular Spectrum Transformation. 5093-5107 - Victor Arribas, Zhenda Zhang, Svetla Nikova:
LLTI: Low-Latency Threshold Implementations. 5108-5123 - Dae Yon Hwang, Bilal Taha, Dimitrios Hatzinakos:
PBGAN: Learning PPG Representations From GAN for Time-Stable and Unique Verification System. 5124-5137 - Aijiao Cui, Chengkang He, Chip-Hong Chang, Hao Lu:
Identification of FSM State Registers by Analytics of Scan-Dump Data. 5138-5153 - Yi Liu, Dingwen Zhang, Qiang Zhang, Jungong Han:
Integrating Part-Object Relationship and Contrast for Camouflaged Object Detection. 5154-5166 - Zhi Zhang, Wei He, Yueqiang Cheng, Wenhao Wang, Yansong Gao, Minghua Wang, Kang Li, Surya Nepal, Yang Xiang:
BitMine: An End-to-End Tool for Detecting Rowhammer Vulnerability. 5167-5181 - Huikai Shao, Dexing Zhong:
Learning With Partners to Improve the Multi-Source Cross-Dataset Palmprint Recognition. 5182-5194 - Waleed A. Yousef, Issa Traoré, William Briguglio:
UN-AVOIDS: Unsupervised and Nonparametric Approach for Visualizing Outliers and Invariant Detection Scoring. 5195-5210 - Tim Van hamme, Enrique Argones-Rúa, Davy Preuveneers, Wouter Joosen:
On the Security of Biometrics and Fuzzy Commitment Cryptosystems: A Study on Gait Authentication. 5211-5224 - Kaveh Shamsi, Yier Jin:
In Praise of Exact-Functional-Secrecy in Circuit Locking. 5225-5238 - Yuling Chen, Sen Dong, Tao Li, Yilei Wang, Huiyu Zhou:
Dynamic Multi-Key FHE in Asymmetric Key Setting From LWE. 5239-5249 - Qifa Yan, Daniela Tuninetti:
Key Superposition Simultaneously Achieves Security and Privacy in Cache-Aided Linear Function Retrieval. 5250-5263 - Guyue Li, Yinghao Xu, Wei Xu, Eduard A. Jorswieck, Aiqun Hu:
Robust Key Generation With Hardware Mismatch for Secure MIMO Communications. 5264-5278 - Yifan Xu, Yuhua Xu, Guochun Ren, Jin Chen, Changhua Yao, Luliang Jia, Dianxiong Liu, Ximing Wang:
Play it by Ear: Context-Aware Distributed Coordinated Anti-Jamming Channel Access. 5279-5293 - Sumaiya Shomaji, Pallabi Ghosh, Fatemeh Ganji, Damon L. Woodard, Domenic Forte:
An Analysis of Enrollment and Query Attacks on Hierarchical Bloom Filter-Based Biometric Systems. 5294-5309 - Lei Xu, Huayi Duan, Anxin Zhou, Xingliang Yuan, Cong Wang:
Interpreting and Mitigating Leakage-Abuse Attacks in Searchable Symmetric Encryption. 5310-5325 - Lukas Holzbaur, Stanislav Kruglik, Alexey A. Frolov, Antonia Wachter-Zeh:
Secure Codes With Accessibility for Distributed Storage. 5326-5337 - Marco Micheletto, Gian Luca Marcialis, Giulia Orrù, Fabio Roli:
Fingerprint Recognition With Embedded Presentation Attacks Detection: Are We Ready? 5338-5351 - Lifang Zhou, Jun Luo, Xinbo Gao, Weisheng Li, Bangjun Lei, Jiaxu Leng:
Selective Domain-Invariant Feature Alignment Network for Face Anti-Spoofing. 5352-5365 - Yuyang Zhou, Guang Cheng, Shui Yu:
An SDN-Enabled Proactive Defense Framework for DDoS Mitigation in IoT Networks. 5366-5380 - Xianhao Tian, Peijia Zheng, Jiwu Huang:
Robust Privacy-Preserving Motion Detection and Object Tracking in Encrypted Streaming Video. 5381-5396 - Yakun Niu, Benedetta Tondi, Yao Zhao, Rongrong Ni, Mauro Barni:
Image Splicing Detection, Localization and Attribution via JPEG Primary Quantization Matrix Estimation and Clustering. 5397-5412 - Hui Zhang, Weixin Bian, Biao Jie, Deqin Xu, Jun Zhao:
A Complete User Authentication and Key Agreement Scheme Using Cancelable Biometrics and PUF in Multi-Server Environment. 5413-5428 - Silei Wang, Qiang Li:
Distributionally Robust Secure Multicast Beamforming With Intelligent Reflecting Surface. 5429-5441 - Bruno Degardin, Vasco Lopes, Hugo Proença:
REGINA - Reasoning Graph Convolutional Networks in Human Action Recognition. 5442-5451 - Manuel J. Marín-Jiménez, Francisco M. Castro, Rubén Delgado-Escaño, Vicky Kalogeiton, Nicolás Guil:
UGaitNet: Multimodal Gait Recognition With Missing Input Modalities. 5452-5462
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.