


default search action
IEEE Transactions on Information Forensics and Security, Volume 17
Volume 17, 2022
- Aslí Bay
, Zekeriya Erkin
, Jaap-Henk Hoepman, Simona Samardjiska, Jelle Vos
:
Practical Multi-Party Private Set Intersection Protocols. 1-15 - Ehsan Nekouei
, Mohammad Pirani
, Henrik Sandberg
, Karl Henrik Johansson
:
A Randomized Filtering Strategy Against Inference Attacks on Active Steering Control Systems. 16-27 - Guohou Shan
, Boxin Zhao, James R. Clavin, Haibin Zhang, Sisi Duan
:
Poligraph: Intrusion-Tolerant and Distributed Fake News Detection System. 28-41 - Juan E. Tapia
, Sebastian Gonzalez, Christoph Busch
:
Iris Liveness Detection Using a Cascade of Dedicated Deep Learning Networks. 42-52 - Mohammad Ragheb
, Sayed Mostafa Safavi Hemami, Ali Kuhestani
, Derrick Wing Kwan Ng
, Lajos Hanzo
:
On the Physical Layer Security of Untrusted Millimeter Wave Relaying Networks: A Stochastic Geometry Approach. 53-68 - Yang Liu
, Zhuo Ma
, Ximeng Liu
, Siqi Ma, Kui Ren
:
Privacy-Preserving Object Detection for Medical Images With Faster R-CNN. 69-84 - Uppalapati Somalatha
, Parthajit Mohapatra
:
Role of Shared Key for Secure Communication Over 2-User Gaussian Z-Interference Channel. 85-98 - Yuanyu Zhang
, Yulong Shen
, Xiaohong Jiang
, Shoji Kasahara
:
Secure Millimeter-Wave Ad Hoc Communications Using Physical Layer Security. 99-114 - Dongming Wu
, Mang Ye
, Gaojie Lin, Xin Gao
, Jianbing Shen
:
Person Re-Identification by Context-Aware Part Attention and Multi-Head Collaborative Learning. 115-126 - Vítor Albiero
, Kai Zhang, Michael C. King, Kevin W. Bowyer
:
Gendered Differences in Face Recognition Accuracy Explained by Hairstyles, Makeup, and Facial Morphology. 127-137 - Yunpei Jia
, Jie Zhang
, Shiguang Shan
:
Dual-Branch Meta-Learning Network With Distribution Alignment for Face Anti-Spoofing. 138-151 - Jungang Yang
, Liyao Xiang
, Ruidong Chen, Weiting Li
, Baochun Li
:
Differential Privacy for Tensor-Valued Queries. 152-164 - Amirreza Zamani
, Tobias J. Oechtering
, Mikael Skoglund
:
Data Disclosure With Non-Zero Leakage and Non-Invertible Leakage Matrix. 165-179 - Linghui Zhou
, Tobias J. Oechtering
, Mikael Skoglund
:
Fundamental Limits-Achieving Polar Code Designs for Biometric Identification and Authentication. 180-195 - Steven A. Grosz
, Joshua J. Engelsma
, Eryun Liu
, Anil K. Jain
:
C2CL: Contact to Contactless Fingerprint Matching. 196-210 - Guyue Li
, Chen Sun
, Wei Xu
, Marco Di Renzo
, Aiqun Hu
:
On Maximizing the Sum Secret Key Rate for Reconfigurable Intelligent Surface-Assisted Multiuser Systems. 211-225 - Yuanrong Xu
, Yao Lu
, Fanglin Chen
, Guangming Lu
, David Zhang
:
High Resolution Fingerprint Retrieval Based on Pore Indexing and Graph Comparison. 226-236 - Xiaoning Liu
, Bang Wu
, Xingliang Yuan
, Xun Yi
:
Leia: A Lightweight Cryptographic Neural Network Inference System at the Edge. 237-252 - Yimeng Ge
, Jiancun Fan
:
Robust Secure Beamforming for Intelligent Reflecting Surface Assisted Full-Duplex MISO Systems. 253-264 - Cristiano Gratton
, Naveen K. D. Venkategowda
, Reza Arablouei
, Stefan Werner
:
Privacy-Preserved Distributed Learning With Zeroth-Order Optimization. 265-279 - Saeedreza Shehnepoor
, Roberto Togneri
, Wei Liu
, Mohammed Bennamoun
:
ScoreGAN: A Fraud Review Detector Based on Regulated GAN With Data Augmentation. 280-291 - Rossano Gaeta
:
On the Impact of Pollution Attacks on Coding-Based Distributed Storage Systems. 292-302 - Wenqi Wei
, Ling Liu
:
Gradient Leakage Attack Resilient Deep Learning. 303-316 - Yafang Yang
, Lei Zhang
, Yunlei Zhao
, Kim-Kwang Raymond Choo
, Yan Zhang
:
Privacy-Preserving Aggregation-Authentication Scheme for Safety Warning System in Fog-Cloud Based VANET. 317-331 - Ángeles Vázquez-Castro
:
Asymptotically Guaranteed Anti-Jamming Spread Spectrum Random Access Without Pre-Shared Secret. 332-343 - Jianyang Gu
, Weihua Chen
, Hao Luo
, Fan Wang
, Hao Li
, Wei Jiang
, Weijie Mao
:
Multi-View Evolutionary Training for Unsupervised Domain Adaptive Person Re-Identification. 344-356 - Mahdi Khosravy
, Kazuaki Nakamura
, Yuki Hirose, Naoko Nitta, Noboru Babaguchi:
Model Inversion Attack by Integration of Deep Generative Models: Privacy-Sensitive Face Generation From a Face Recognition System. 357-372 - Benoît Bonnet
, Teddy Furon
, Patrick Bas
:
Generating Adversarial Images in Quantized Domains. 373-385 - Mang Ye
, Cuiqun Chen
, Jianbing Shen
, Ling Shao
:
Dynamic Tri-Level Relation Mining With Attentive Graph for Visible Infrared Re-Identification. 386-398 - Jiucheng Xie
, Chi-Man Pun
, Kin-Man Lam:
Implicit and Explicit Feature Purification for Age-Invariant Facial Representation Learning. 399-412 - Bingyao Yu
, Jiwen Lu
, Xiu Li
, Jie Zhou
:
Salience-Aware Face Presentation Attack Detection via Deep Reinforcement Learning. 413-427 - Amanda Cristina Davi Resende, Davis Railsback, Rafael Dowsley
, Anderson C. A. Nascimento
, Diego F. Aranha
:
Fast Privacy-Preserving Text Classification Based on Secure Multiparty Computation. 428-442 - Haiwei Wu
, Jiantao Zhou
, Jinyu Tian
, Jun Liu
, Yu Qiao
:
Robust Image Forgery Detection Against Transmission Over Online Social Networks. 443-456 - Mingliang Chen
, Xin Liao
, Min Wu
:
PulseEdit: Editing Physiological Signals in Facial Videos for Privacy Protection. 457-471 - Tian Li
, Huaqun Wang
, Debiao He
, Jia Yu
:
Synchronized Provable Data Possession Based on Blockchain for Digital Twin. 472-485 - Qi Li
, Xinhao Deng
, Zhuotao Liu
, Yuan Yang, Xiaoyue Zou
, Qian Wang
, Mingwei Xu
, Jianping Wu:
Dynamic Network Security Function Enforcement via Joint Flow and Function Scheduling. 486-499 - Yukai Wang
, Chunlei Peng
, Decheng Liu
, Nannan Wang
, Xinbo Gao
:
ForgeryNIR: Deep Face Forgery and Detection in Near-Infrared Scenario. 500-515 - Mingyang Zhang, Yang Xiao
, Fu Xiong, Shuai Li, Zhiguo Cao
, Zhiwen Fang
, Joey Tianyi Zhou
:
Person Re-Identification With Hierarchical Discriminative Spatial Aggregation. 516-530 - Zhihai Yang
, Qindong Sun
, Zhaoli Liu:
Three Birds With One Stone: User Intention Understanding and Influential Neighbor Disclosure for Injection Attack Detection. 531-546 - Peipeng Yu
, Jianwei Fei
, Zhihua Xia
, Zhili Zhou
, Jian Weng
:
Improving Generalization by Commonality Learning in Face Forgery Detection. 547-558 - Kejun Chen, Orlando Arias, Qingxu Deng
, Daniela Oliveira
, Xiaolong Guo
, Yier Jin
:
FineDIFT: Fine-Grained Dynamic Information Flow Tracking for Data-Flow Integrity Using Coprocessor. 559-573 - Olivier Bronchain
, François Durvaux, Loïc Masure
, François-Xavier Standaert
:
Efficient Profiled Side-Channel Analysis of Masked Implementations, Extended. 574-584 - Linsen Song
, Wayne Wu, Chen Qian, Ran He, Chen Change Loy:
Everybody's Talkin': Let Me Talk as You Want. 585-598 - Pei Peng
, Emina Soljanin:
Covert, Low-Delay, Coded Message Passing in Mobile (IoT) Networks. 599-611 - Mary Scott
, Graham Cormode
, Carsten Maple:
Aggregation and Transformation of Vector-Valued Messages in the Shuffle Model of Differential Privacy. 612-627 - Onur Dizdar
, Bruno Clerckx
:
Rate-Splitting Multiple Access for Communications and Jamming in Multi-Antenna Multi-Carrier Cognitive Radio Systems. 628-643 - Long Li
, Yu Luo, Jing Yang, Lina Pu
:
Reinforcement Learning Enabled Intelligent Energy Attack in Green IoT Networks. 644-658 - Jie Li
, Camilla Hollanti:
Private and Secure Distributed Matrix Multiplication Schemes for Replicated or MDS-Coded Servers. 659-669 - Moulik Choraria
, Arpan Chattopadhyay
, Urbashi Mitra
, Erik G. Ström
:
Design of False Data Injection Attack on Distributed Process Estimation. 670-683 - Prasanna Ravi
, Shivam Bhasin
, Sujoy Sinha Roy, Anupam Chattopadhyay
:
On Exploiting Message Leakage in (Few) NIST PQC Candidates for Practical Message Recovery Attacks. 684-699 - Rafael Salema Marques
, Haider M. Al-Khateeb
, Gregory Epiphaniou
, Carsten Maple
:
APIVADS: A Novel Privacy-Preserving Pivot Attack Detection Scheme Based on Statistical Pattern Recognition. 700-715 - Baoyao Yang
, Andy Jinhua Ma
, Pong C. Yuen
:
Revealing Task-Relevant Model Memorization for Source-Protected Unsupervised Domain Adaptation. 716-731 - Xiaozhen Lu
, Liang Xiao
, Guohang Niu, Xiangyang Ji
, Qian Wang
:
Safe Exploration in Wireless Security: A Safe Reinforcement Learning Algorithm With Hierarchical Structure. 732-743 - Nimisha Limaye
, Satwik Patnaik
, Ozgur Sinanoglu
:
Valkyrie: Vulnerability Assessment Tool and Attack for Provably-Secure Logic Locking Techniques. 744-759 - Guanxiong Shen
, Junqing Zhang
, Alan Marshall
, Joseph R. Cavallaro
:
Towards Scalable and Channel-Robust Radio Frequency Fingerprint Identification for LoRa. 774-787 - Xiaohui Chen
, Zhiyu Hao, Lun Li, Lei Cui
, Yiran Zhu, Zhenquan Ding, Yongji Liu
:
CruParamer: Learning on Parameter-Augmented API Sequences for Malware Detection. 788-803 - Yanbing Ren
, Xinghua Li
, Yinbin Miao
, Bin Luo
, Jian Weng
, Kim-Kwang Raymond Choo
, Robert H. Deng
:
Towards Privacy-Preserving Spatial Distribution Crowdsensing: A Game Theoretic Approach. 804-818 - Long Zhuo, Shunquan Tan
, Bin Li
, Jiwu Huang
:
Self-Adversarial Training Incorporating Forgery Attention for Image Forgery Localization. 819-834 - Yang Xiao
, Jianping Zeng
:
Dynamically Generate Password Policy via Zipf Distribution. 835-848 - Wenjing Zhang
, Bo Jiang
, Ming Li
, Xiaodong Lin
:
Privacy-Preserving Aggregate Mobility Data Release: An Information-Theoretic Deep Reinforcement Learning Approach. 849-864 - Rizhao Cai
, Zhi Li
, Renjie Wan
, Haoliang Li
, Yongjian Hu
, Alex C. Kot
:
Learning Meta Pattern for Face Anti-Spoofing. 1201-1213 - Yanbin Wang
, Haitao Xu
, Zhenhao Guo, Zhan Qin, Kui Ren
:
snWF: Website Fingerprinting Attack by Ensembling the Snapshot of Deep Learning. 1214-1226 - Jinhua Ma
, Shengmin Xu
, Jianting Ning
, Xinyi Huang
, Robert H. Deng
:
Redactable Blockchain in Decentralized Setting. 1227-1242 - Shengjie Chen
, Zhenhua Guo
, Xiu Li
, Dongliang Yang
:
Query2Set: Single-to-Multiple Partial Fingerprint Recognition Based on Attention Mechanism. 1243-1253 - Zhuo Wang
, Qiangchang Wang
, Weihong Deng
, Guodong Guo
:
Learning Multi-Granularity Temporal Characteristics for Face Anti-Spoofing. 1254-1269 - Jin Yang
, Qishui Zhong
, Kaibo Shi
, Shouming Zhong
:
Co-Design of Observer-Based Fault Detection Filter and Dynamic Event-Triggered Controller for Wind Power System Under Dual Alterable DoS Attacks. 1270-1284 - Sekhar Rajendran
, Zhi Sun
:
RF Impairment Model-Based IoT Physical-Layer Identification for Enhanced Domain Generalization. 1285-1299 - Saba Asaad
, Yifei Wu, Ali Bereyhi
, Ralf R. Müller
, Rafael F. Schaefer
, H. Vincent Poor
:
Secure Active and Passive Beamforming in IRS-Aided MIMO Systems. 1300-1315 - Rafael Padilha
, Tawfiq Salem
, Scott Workman
, Fernanda A. Andaló
, Anderson Rocha
, Nathan Jacobs:
Content-Aware Detection of Temporal Metadata Manipulation. 1316-1327 - Rémi Cogranne
, Quentin Giboulot
, Patrick Bas
:
Efficient Steganography in JPEG Images by Minimizing Performance of Optimal Detector. 1328-1343 - Ziming Yang
, Jian Liang
, Chaoyou Fu
, Mandi Luo
, Xiaoyu Zhang
:
Heterogeneous Face Recognition via Face Synthesis With Identity-Attribute Disentanglement. 1344-1358 - Yang Yang
, Yanjiao Chen
, Fei Chen
, Jing Chen
:
An Efficient Identity-Based Provable Data Possession Protocol With Compressed Cloud Storage. 1359-1371 - Yulong Tian
, Fnu Suya
, Fengyuan Xu, David Evans
:
Stealthy Backdoors as Compression Artifacts. 1372-1387 - Donghyun Yu
, Ruei-Hau Hsu
, Jemin Lee
, Sungjin Lee
:
EC-SVC: Secure CAN Bus In-Vehicle Communications With Fine-Grained Access Control Based on Edge Computing. 1388-1403 - Zhihao Shen
, Shun Li, Xi Zhao
, Jianhua Zou:
MMAuth: A Continuous Authentication Framework on Smartphones Using Multiple Modalities. 1450-1465 - Xinran Li
, Chuan Qin
, Zichi Wang
, Zhenxing Qian
, Xinpeng Zhang
:
Unified Performance Evaluation Method for Perceptual Image Hashing. 1404-1419 - Haixia Chen
, Xinyi Huang
, Jianting Ning
, Futai Zhang
, Chao Lin
:
VILS: A Verifiable Image Licensing System. 1420-1434 - Weipeng Hu
, Haifeng Hu
:
Domain-Private Factor Detachment Network for NIR-VIS Face Recognition. 1435-1449 - Dayong Ye
, Sheng Shen
, Tianqing Zhu
, Bo Liu
, Wanlei Zhou:
One Parameter Defense - Defending Against Data Inference Attacks via Differential Privacy. 1466-1480 - Changjie Hu
, Quanzhong Li
, Qi Zhang
, Jiayin Qin:
Security Optimization for an AF MIMO Two-Way Relay-Assisted Cognitive Radio Nonorthogonal Multiple Access Networks With SWIPT. 1481-1496 - Rizka Widyarini Purwanto
, Arindam Pal
, Alan Blair
, Sanjay Jha
:
PhishSim: Aiding Phishing Website Detection With a Feature-Free Tool. 1497-1512 - Muyi Sun
, Jian Wang, Jian Liu, Jianshu Li, Tao Chen, Zhenan Sun
:
A Unified Framework for Biphasic Facial Age Translation With Noisy-Semantic Guided Generative Adversarial Networks. 1513-1527 - Jiayu Zhang, Min Li
, Min-Jian Zhao, Xiaoyu Ji
, Wenyuan Xu:
Multi-User Beam Training and Transmission Design for Covert Millimeter-Wave Communication. 1528-1543 - Meng Pang
, Binghui Wang
, Siyu Huang
, Yiu-Ming Cheung
, Bihan Wen
:
A Unified Framework for Bidirectional Prototype Learning From Contaminated Faces Across Heterogeneous Domains. 1544-1557 - Yongzhi Wang
, Xiaoyu Zhang
, Yao Wu, Yulong Shen
:
Enhancing Leakage Prevention for MapReduce. 1558-1572 - Xiao Yang
, Mengling Liu
, Man Ho Au
, Xiapu Luo
, Qingqing Ye
:
Efficient Verifiably Encrypted ECDSA-Like Signatures and Their Applications. 1573-1582 - Bin Dai
, Chong Li
, Yingbin Liang
, Zheng Ma
, Shlomo Shamai
:
Self-Secure Capacity-Achieving Feedback Schemes of Gaussian Multiple-Access Wiretap Channels With Degraded Message Sets. 1583-1596 - Peng Jiang
, Baoqi Qiu
, Liehuang Zhu
:
Report When Malicious: Deniable and Accountable Searchable Message-Moderation System. 1597-1609 - Linfeng Liu
, Zhiyuan Xi, Jiagao Wu
, Jia Xu
:
Noise-Based-Protection Message Dissemination Method for Insecure Opportunistic Underwater Sensor Networks. 1610-1623 - Wei Cheng
, Sylvain Guilley
, Jean-Luc Danger
:
Information Leakage in Code-Based Masking: A Systematic Evaluation by Higher-Order Attacks. 1624-1638 - Zhuoran Ma
, Jianfeng Ma
, Yinbin Miao
, Yingjiu Li
, Robert H. Deng
:
ShieldFL: Mitigating Model Poisoning Attacks in Privacy-Preserving Federated Learning. 1639-1654 - Xiuli Bi
, Chao Shuai
, Bo Liu
, Bin Xiao
, Weisheng Li
, Xinbo Gao
:
Privacy-Preserving Color Image Feature Extraction by Quaternion Discrete Orthogonal Moments. 1655-1668 - Mohammad Reza Nosouhi
, Keshav Sood
, Marthie Grobler
, Robin Doss
:
Towards Spoofing Resistant Next Generation IoT Networks. 1669-1683 - Alberto Cabri
, Francesco Masulli
, Stefano Rovetta
, Grazyna Suchacka
:
A Quantum-Inspired Classifier for Early Web Bot Detection. 1684-1697 - Saeid Sahraei
, Amir Salman Avestimehr, Ramy E. Ali
:
Info-Commit: Information-Theoretic Polynomial Commitment. 1698-1708 - Yanchu Li
, Lingguang Lei
, Yuewu Wang, Jiwu Jing, Quan Zhou:
TrustSAMP: Securing Streaming Music Against Multivector Attacks on ARM Platform. 1709-1724 - Yuwei Zeng
, Zhicheng Liu, Xunxun Chen, Tianning Zang:
Hidden Path: Understanding the Intermediary in Malicious Redirections. 1725-1740 - Chenqi Kong
, Baoliang Chen
, Haoliang Li
, Shiqi Wang
, Anderson Rocha
, Sam Kwong
:
Detect and Locate: Exposing Face Manipulation by Semantic- and Noise-Level Telltales. 1741-1756 - Amish Goel
, Pierre Moulin:
Fast Locally Optimal Detection of Targeted Universal Adversarial Perturbations. 1757-1770 - Kai Zhang
, Zhe Jiang
, Jianting Ning
, Xinyi Huang
:
Subversion-Resistant and Consistent Attribute-Based Keyword Search for Secure Cloud Storage. 1771-1784 - Mehmet Emre Gursoy
, Ling Liu
, Ka Ho Chow
, Stacey Truex
, Wenqi Wei
:
An Adversarial Approach to Protocol Analysis and Selection in Local Differential Privacy. 1785-1799 - Sarah A. Obead
, Hsuan-Yin Lin
, Eirik Rosnes
, Jörg Kliewer
:
Private Polynomial Function Computation for Noncolluding Coded Databases. 1800-1813 - Yuanyuan Liu
, Jiacheng Geng
, Fanhua Shang
, Weixin An
, Hongying Liu
, Qi Zhu, Wei Feng
:
Laplacian Smoothing Stochastic ADMMs With Differential Privacy Guarantees. 1814-1826 - Yujin Huang
, Chunyang Chen
:
Smart App Attack: Hacking Deep Learning Models in Android Apps. 1827-1840 - Quentin Giboulot
, Patrick Bas
, Rémi Cogranne
:
Multivariate Side-Informed Gaussian Embedding Minimizing Statistical Detectability. 1841-1854 - Navid Vafaei
, Sara Zarei
, Nasour Bagheri
, Maria Eichlseder
, Robert Primas, Hadi Soleimany
:
Statistical Effective Fault Attacks: The Other Side of the Coin. 1855-1867 - Meiyan Xiao
, Hongbo Li, Qiong Huang
, Shui Yu
, Willy Susilo
:
Attribute-Based Hierarchical Access Control With Extendable Policy. 1868-1883 - Xiao Mei Zeng
, Qing Liu
, Jing Yun Tay, Chee Lip Gan
:
Selective Staining on Non-Volatile Memory Cells for Data Retrieval. 1884-1892 - Mahdi Soleymani
, Hessam Mahdavifar
, Amir Salman Avestimehr:
Analog Secret Sharing With Applications to Private Distributed Learning. 1893-1904 - Hao Zhou
, Geng Yang
, Hua Dai
, Guoxiu Liu:
PFLF: Privacy-Preserving Federated Learning Framework for Edge Computing. 1905-1918 - Meng Zhang
, Zhuorui Wu, Jun Yan
, Rongxing Lu
, Xiaohong Guan
:
Attack-Resilient Optimal PMU Placement via Reinforcement Learning Guided Tree Search in Smart Grids. 1919-1929 - Xiaoyu Zhang, Hong Zhong
, Chunyang Fan, Irina Bolodurina, Jie Cui
:
CBACS: A Privacy-Preserving and Efficient Cache-Based Access Control Scheme for Software Defined Vehicular Networks. 1930-1945 - Shuyi Li
, Ruijun Ma
, Lunke Fei
, Bob Zhang:
Learning Compact Multirepresentation Feature Descriptor for Finger-Vein Recognition. 1946-1958 - Jiayu Zhou
, Wenjie Ding
, Wen Yang
:
A Secure Encoding Mechanism Against Deception Attacks on Multisensor Remote State Estimation. 1959-1969 - Peter Kairouz, Jiachun Liao
, Chong Huang, Maunil Vyas, Monica Welfert
, Lalitha Sankar
:
Generating Fair Universal Representations Using Adversarial Models. 1970-1985 - Fajun Sun
, Selena He
, Xiaotong Zhang, Jun Zhang
, Qingan Li, Yanxiang He
:
A Fully Authenticated Diffie-Hellman Protocol and Its Application in WSNs. 1986-1999 - Zhenzhu Chen
, Shang Wang, Anmin Fu
, Yansong Gao
, Shui Yu
, Robert H. Deng
:
LinkBreaker: Breaking the Backdoor-Trigger Link in DNNs via Neurons Consistency Check. 2000-2014 - Qiang Xu
, Xinghao Jiang
, Tanfeng Sun
, Alex C. Kot
:
Motion-Adaptive Detection of HEVC Double Compression With the Same Coding Parameters. 2015-2029 - Hengyi Ren
, Lijuan Sun, Jian Guo, Chong Han
:
A Dataset and Benchmark for Multimodal Biometric Recognition Based on Fingerprint and Finger Vein. 2030-2043 - Mohammad Esmaeilpour
, Patrick Cardinal, Alessandro Lameiras Koerich
:
Multidiscriminator Sobolev Defense-GAN Against Adversarial Attacks for End-to-End Speech Systems. 2044-2058 - Jiaqi Zhao
, Hui Zhu
, Fengwei Wang, Rongxing Lu
, Zhe Liu
, Hui Li
:
PVD-FL: A Privacy-Preserving and Verifiable Decentralized Federated Learning Framework. 2059-2073 - Aya Fukami
, Sasha Sheremetov, Francesco Regazzoni
, Zeno J. M. H. Geradts
, Cees de Laat:
Experimental Evaluation of e.MMC Data Recovery. 2074-2083 - Askat Kuzdeuov
, Dana Aubakirova
, Darina Koishigarina
, Huseyin Atakan Varol
:
TFW: Annotated Thermal Faces in the Wild Dataset. 2084-2094 - Mandi Luo
, Haoxue Wu, Huaibo Huang
, Weizan He, Ran He
:
Memory-Modulated Transformer Network for Heterogeneous Face Recognition. 2095-2109 - Emelie Ekenstedt
, Lawrence Ong
, Yucheng Liu
, Sarah Johnson
, Phee Lep Yeoh
, Jörg Kliewer:
When Differential Privacy Implies Syntactic Privacy. 2110-2124 - Hiranmoy Roy
, Debotosh Bhattacharjee
, Ondrej Krejcar
:
Interpretable Local Frequency Binary Pattern (LFrBP) Based Joint Continual Learning Network for Heterogeneous Face Recognition. 2125-2136 - Zhi Li
, Rizhao Cai
, Haoliang Li
, Kwok-Yan Lam
, Yongjian Hu
, Alex C. Kot
:
One-Class Knowledge Distillation for Face Presentation Attack Detection. 2137-2150 - Zhigang Lu
, Hassan Jameel Asghar
, Mohamed Ali Kâafar
, Darren Webb, Peter Dickinson:
A Differentially Private Framework for Deep Learning With Convexified Loss Functions. 2151-2165 - Shi-Jie Xu
, Guang-Gang Geng
, Xiao-Bo Jin
, Dongjie Liu
, Jian Weng
:
Seeing Traffic Paths: Encrypted Traffic Classification With Path Signature Features. 2166-2181 - Tomás Concepción Miranda
, Pierre-François Gimenez
, Jean-François Lalande
, Valérie Viet Triem Tong
, Pierre Wilke
:
Debiasing Android Malware Datasets: How Can I Trust Your Results If Your Dataset Is Biased? 2182-2197 - Jiajia Jiang
, Songxuan Lai, Lianwen Jin
, Yecheng Zhu:
DsDTW: Local Representation Learning With Deep soft-DTW for Dynamic Signature Verification. 2198-2212 - Datian Peng
, Jianmin Dong
, Jungang Yang, Qinke Peng
:
Dynamical Failures Driven by False Load Injection Attacks Against Smart Grid. 2213-2226 - Yili Jiang
, Kuan Zhang
, Yi Qian
, Liang Zhou
:
Anonymous and Efficient Authentication Scheme for Privacy-Preserving Distributed Learning. 2227-2240 - Ce Feng
, Parv Venkitasubramaniam
:
Inferential Separation for Privacy: Irrelevant Statistics and Quantization. 2241-2255 - Zhirun Zheng
, Zhetao Li
, Hongbo Jiang
, Leo Yu Zhang
, Dengbiao Tu:
Semantic-Aware Privacy-Preserving Online Location Trajectory Data Sharing. 2256-2271 - Yingfan Tao
, Wenxian Zheng, Wenming Yang
, Guijin Wang
, Qingmin Liao
:
Frontal-Centers Guided Face: Boosting Face Recognition by Learning Pose-Invariant Features. 2272-2283 - Weihang Wang
, Fei Wen
, Haoyuan Zheng, Rendong Ying
, Peilin Liu
:
Conv-MLP: A Convolution and MLP Mixed Model for Multimodal Face Anti-Spoofing. 2284-2297 - Zejun Zhang
, Fei Zhong
, Wenxiong Kang
:
Study on Reflection-Based Imaging Finger Vein Recognition. 2298-2310 - Weijie Liu
, Ximeng Liu
, Zhi Li
, Bin Liu
, Rongwei Yu, Lina Wang
:
Retrofitting LBR Profiling to Enhance Virtual Machine Introspection. 2311-2323 - Pingchuan Ma, Zhenlan Ji
, Qi Pang, Shuai Wang
:
NoLeaks: Differentially Private Causal Discovery Under Functional Causal Model. 2324-2338 - Tahmina Zebin
, Shahadate Rezvy, Yuan Luo
:
An Explainable AI-Based Intrusion Detection System for DNS Over HTTPS (DoH) Attacks. 2339-2349 - Osman Tursun
, Simon Denman, Sabesan Sivapalan, Sridha Sridharan
, Clinton Fookes
, Sandra Mau:
Component-Based Attention for Large-Scale Trademark Retrieval. 2350-2363 - Jiang Liu
, Chun Pong Lau
, Hossein Souri, Soheil Feizi
, Rama Chellappa:
Mutual Adversarial Training: Learning Together is Better Than Going Alone. 2364-2377 - Yanli Chen
, Tong Qiao
, Florent Retraint
, Gengran Hu
:
Efficient Privacy-Preserving Forensic Method for Camera Model Identification. 2378-2393 - Parastoo Sadeghi
, Mehdi Korki
:
Offset-Symmetric Gaussians for Differential Privacy. 2394-2409 - Chuan Du
, Yulai Cong, Lei Zhang, Dandan Guo
, Song Wei
:
A Practical Deceptive Jamming Method Based on Vulnerable Location Awareness Adversarial Attack for Radar HRRP Target Recognition. 2410-2424 - Jian Wang
, Yunlian Sun
, Jinhui Tang
:
LiSiam: Localization Invariance Siamese Network for Deepfake Detection. 2425-2436 - Ding Li
, Yuefei Zhu
, Minghao Chen, Jue Wang:
Minipatch: Undermining DNN-Based Website Fingerprinting With Adversarial Patches. 2437-2451 - Huijun Zhang
, Yang Ding
, Lei Cao
, Xin Wang, Ling Feng
:
Fine-Grained Question-Level Deception Detection via Graph-Based Learning and Cross-Modal Fusion. 2452-2467 - Mengnan Zhao
, Bo Wang
, Wei Wang
, Yuqiu Kong
, Tianhang Zheng
, Kui Ren
:
Guided Erasable Adversarial Attack (GEAA) Toward Shared Data Protection. 2468-2482 - Peng Xu
, Manqing Hu, Tianyang Chen, Wei Wang
, Hai Jin
:
LaF: Lattice-Based and Communication-Efficient Federated Learning. 2483-2496 - Ajian Liu
, Chenxu Zhao, Zitong Yu
, Jun Wan
, Anyang Su
, Xing Liu, Zichang Tan, Sergio Escalera
, Junliang Xing
, Yanyan Liang
, Guodong Guo
, Zhen Lei
, Stan Z. Li, Du Zhang:
Contrastive Context-Aware Learning for 3D High-Fidelity Mask Face Presentation Attack Detection. 2497-2507 - Pawel Korus
, Nasir D. Memon
:
Computational Sensor Fingerprints. 2508-2523 - Mengmeng Yang
, Ivan Tjuawinata
, Kwok-Yan Lam
:
K-Means Clustering With Local dᵪ-Privacy for Privacy-Preserving Data Analysis. 2524-2537 - Songnian Zhang, Suprio Ray
, Rongxing Lu
, Yunguo Guan
, Yandong Zheng
, Jun Shao
:
Toward Privacy-Preserving Aggregate Reverse Skyline Query With Strong Security. 2538-2552 - Jung Hee Cheon
, Wootae Kim, Jai Hyun Park
:
Efficient Homomorphic Evaluation on Large Intervals. 2553-2568 - Shu Hong
, Lingjie Duan
, Jianwei Huang
:
Protecting Location Privacy by Multiquery: A Dynamic Bayesian Game Theoretic Approach. 2569-2584 - Linan Huang
, Shumeng Jia
, Emily Balcetis, Quanyan Zhu:
ADVERT: An Adaptive and Data-Driven Attention Enhancement Mechanism for Phishing Prevention. 2585-2597 - Jisoo Choi
, Chau-Wai Wong
, Adi Hajj-Ahmad
, Min Wu
, Yanpin Ren
:
Invisible Geolocation Signature Extraction From a Single Image. 2598-2613 - Benjamin Christopher Hadwiger
, Christian Riess
:
Deep Metric Color Embeddings for Splicing Localization in Severely Degraded Images. 2614-2627 - Akiko Inoue
, Kazuhiko Minematsu
, Maya Oda, Rei Ueno, Naofumi Homma:
ELM: A Low-Latency and Scalable Memory Encryption Scheme. 2628-2643 - Nan Wu
, Dinusha Vatsalan
, Sunny Verma, Mohamed Ali Kâafar
:
Fairness and Cost Constrained Privacy-Aware Record Linkage. 2644-2656 - Yihao Huang
, Felix Juefei-Xu
, Qing Guo
, Yang Liu
, Geguang Pu
:
FakeLocator: Robust Localization of GAN-Based Face Manipulations. 2657-2672 - Junqiang Li
, Senyi Li
, Gang Sun
, Ting Chen
, Hongfang Yu
:
SNPSFuzzer: A Fast Greybox Fuzzer for Stateful Network Protocols Using Snapshots. 2673-2687 - Da-Wen Huang
, Fengji Luo
, Jichao Bi
, Mingyang Sun
:
An Efficient Hybrid IDS Deployment Architecture for Multi-Hop Clustered Wireless Sensor Networks. 2688-2702 - Cheng Wang
, Hangyu Zhu
:
Wrongdoing Monitor: A Graph-Based Behavioral Anomaly Detection in Cyber Security. 2703-2718 - Nils Wisiol
, Bipana Thapaliya
, Khalid T. Mursi
, Jean-Pierre Seifert, Yu Zhuang:
Neural Network Modeling Attacks on Arbiter-PUF-Based Designs. 2719-2731 - Mosayeb Hajimaghsoodi
, Rasool Jalili
:
RAD: A Statistical Mechanism Based on Behavioral Analysis for DDoS Attack Countermeasure. 2732-2745 - Jiabei Wang
, Rui Zhang
, Jianhao Li
, Yuting Xiao
:
Owner-Enabled Secure Authorized Keyword Search Over Encrypted Data With Flexible Metadata. 2746-2760 - Congyu Zhang, Decheng Liu
, Chunlei Peng
, Nannan Wang
, Xinbo Gao
:
Edge Aware Domain Transformation for Face Sketch Synthesis. 2761-2770 - Meng Jia
, Jing Chen
, Kun He
, Ruiying Du, Li Zheng, Mingxi Lai, Donghui Wang
, Fei Liu:
Redactable Blockchain From Decentralized Chameleon Hash Functions. 2771-2783 - Dong-Hyun Jung
, Joon-Gyu Ryu, Junil Choi
:
When Satellites Work as Eavesdroppers. 2784-2799 - Zhaoxu Hu
, Changsheng Chen
, Wai Ho Mow
, Jiwu Huang
:
Document Recapture Detection Based on a Unified Distortion Model of Halftone Cells. 2800-2815 - Pu Wang
, Zheng Yan
, Kai Zeng
:
BCAuth: Physical Layer Enhanced Authentication and Attack Tracing for Backscatter Communications. 2818-2834 - Servio Paguada
, Lejla Batina
, Ileana Buhan, Igor Armendariz
:
Playing With Blocks: Toward Re-Usable Deep Learning Models for Side-Channel Profiled Attacks. 2835-2847 - Yinbin Miao
, Ziteng Liu
, Hongwei Li
, Kim-Kwang Raymond Choo
, Robert H. Deng
:
Privacy-Preserving Byzantine-Robust Federated Learning via Blockchain Systems. 2848-2861 - Jianfei Sun
, Guowen Xu
, Tianwei Zhang
, Mamoun Alazab
, Robert H. Deng
:
A Practical Fog-Based Privacy-Preserving Online Car-Hailing Service System. 2862-2877 - Lin Ding
, Zheng Wu, Xinhai Wang, Ziyu Guan, Mingjin Li:
New Attacks on the GPRS Encryption Algorithms GEA-1 and GEA-2. 2878-2889 - Changsheng Chen
, Shuzheng Zhang, Fengbo Lan, Jiwu Huang
:
Domain-Agnostic Document Authentication Against Practical Recapturing Attacks. 2890-2905 - Hee-Yong Kwon
, Mun-Kyu Lee
:
Comments on "PassBio: Privacy-Preserving User-Centric Biometric Authentication". 2816-2817 - Shaobo Jia
, Jian-Kang Zhang
, Sheng Chen
, Wanming Hao
, Wei Xu
:
Secure Multiantenna Transmission With an Unknown Eavesdropper: Power Allocation and Secrecy Outage Analysis. 2906-2919 - Jiaqing Bai
, Ji He
, Yanping Chen
, Yulong Shen
, Xiaohong Jiang
:
On Covert Communication Performance With Outdated CSI in Wireless Greedy Relay Systems. 2920-2935 - Wanyu Lin
, Baochun Li
, Cong Wang
:
Towards Private Learning on Decentralized Graphs With Local Differential Privacy. 2936-2946 - Min Ren
, Yuhao Zhu
, Yunlong Wang, Zhenan Sun
:
Perturbation Inactivation Based Adversarial Defense for Face Recognition. 2947-2962 - Feng Liu
, Zhe Kong
, Haozhe Liu
, Wentian Zhang
, Linlin Shen
:
Fingerprint Presentation Attack Detection by Channel-Wise Feature Denoising. 2963-2976 - Yue Zheng
, Si Wang, Chip-Hong Chang
:
A DNN Fingerprint for Non-Repudiable Model Ownership Identification and Piracy Detection. 2977-2989 - Golam Dastoger Bashar
, Joshua Holmes, Gaby G. Dagher
:
ACCORD: A Scalable Multileader Consensus Protocol for Healthcare Blockchain. 2990-3005 - Junjie Jiang
, Willy Susilo
, Joonsang Baek:
Security Analysis of "SMAKA: Secure Many-to-Many Authentication and Key Agreement Scheme for Vehicular Networks". 3006-3007 - Changtao Miao
, Zichang Tan
, Qi Chu
, Nenghai Yu
, Guodong Guo
:
Hierarchical Frequency-Assisted Interactive Networks for Face Manipulation Detection. 3008-3021 - Kangkang Wei
, Weiqi Luo
, Shunquan Tan
, Jiwu Huang
:
Universal Deep Network for Steganalysis of Color Image Based on Channel Representation. 3022-3036 - Jiale Cheng
, Nan Liu
, Wei Kang
, Yang Li:
The Capacity of Symmetric Private Information Retrieval Under Arbitrary Collusion and Eavesdropping Patterns. 3037-3050 - Junwei Zhou
, Yijia Qian, Qingtian Zou
, Peng Liu
, Jianwen Xiang
:
DeepSyslog: Deep Anomaly Detection on Syslog Using Sentence Embedding and Metadata. 3051-3061 - Cheng-Yaw Low
, Andrew Beng Jin Teoh
:
An Implicit Identity-Extended Data Augmentation for Low-Resolution Face Representation Learning. 3062-3076 - Shijia Liu
, Yanru Chen
, Hao Wang, Hongbin Liang
, Liangyin Chen
:
A Low-Calculation Contactless Continuous Authentication Based on Postural Transition. 3077-3090 - Yulong Wang
, Minghui Zhao, Shenghong Li, Xin Yuan
, Wei Ni
:
Dispersed Pixel Perturbation-Based Imperceptible Backdoor Trigger for Image Classifier Models. 3091-3106 - Dajiang Chen
, Shaoquan Jiang
, Ning Zhang
, Lei Liu
, Kim-Kwang Raymond Choo
:
On Message Authentication Channel Capacity Over a Wiretap Channel. 3107-3122 - Ge Shi
, Sylvester B. Aboagye
, Telex M. N. Nkouatchah
, Octavia A. Dobre
, Yong Li
, Wei Cheng
:
Secure Transmission in NOMA-Aided Multiuser Visible Light Communication Broadcasting Network With Cooperative Precoding Design. 3123-3138 - Lei Qi
, Jiaying Shen, Jiaqi Liu, Yinghuan Shi
, Xin Geng
:
Label Distribution Learning for Generalizable Multisource Person Re-Identification. 3139-3150 - Dillon J. Lohr
, Oleg V. Komogortsev:
Eye Know You Too: Toward Viable End-to-End Eye Movement Biometrics for User Authentication. 3151-3164 - Shuai Ma
, Yunqi Zhang, Haihong Sheng
, Hang Li
, Jia Shi
, Long Yang, Youlong Wu
, Naofal Al-Dhahir
, Shiyin Li
:
Optimal Probabilistic Constellation Shaping for Covert Communications. 3165-3178 - Songlei Wang
, Yifeng Zheng
, Xiaohua Jia
, Xun Yi
:
PeGraph: A System for Privacy-Preserving and Efficient Search Over Encrypted Social Graphs. 3179-3194 - Si-Qi Liu
, Xiangyuan Lan
, Pong C. Yuen
:
Learning Temporal Similarity of Remote Photoplethysmography for Fast 3D Mask Face Presentation Attack Detection. 3195-3210 - Enes Altinisik
, Hüsrev Taha Sencar
, Diram Tabaa
:
Video Source Characterization Using Encoding and Encapsulation Characteristics. 3211-3224 - Yam Sharon, David Berend
, Yang Liu
, Asaf Shabtai
, Yuval Elovici
:
TANTRA: Timing-Based Adversarial Network Traffic Reshaping Attack. 3225-3237 - Chenqi Kong
, Kexin Zheng
, Shiqi Wang
, Anderson Rocha
, Haoliang Li
:
Beyond the Pixel World: A Novel Acoustic-Based Face Anti-Spoofing System for Smartphones. 3238-3253 - Yujiao Lv, Jianquan Lu
, Yang Liu
, Jungang Lou
:
Resilient Distributed State Estimation Under Stealthy Attack. 3254-3263 - Qin Li
, Jia Wu, Junyu Quan, Jinjing Shi
, Shichao Zhang
:
Efficient Quantum Blockchain With a Consensus Mechanism QDPoS. 3264-3276 - Guiyang Xia
, Xiaobo Zhou
, Lichuan Gu, Feng Shu
, Yongpeng Wu
, Jiangzhou Wang
:
Secure-Reliable Transmission Designs for Full-Duplex Receiver With Finite-Alphabet Inputs. 3277-3289 - Satwik Patnaik
, Nimisha Limaye
, Ozgur Sinanoglu
:
Hide and Seek: Seeking the (Un)-Hidden Key in Provably-Secure Logic Locking Techniques. 3290-3305 - Haoxiang Huang
, Jianbiao Zhang
, Jun Hu, Yingfang Fu, Chenggang Qin:
Research on Distributed Dynamic Trusted Access Control Based on Security Subsystem. 3306-3320 - Yiming Wang
, Guanqiu Qi
, Shuang Li
, Yi Chai
, Huafeng Li
:
Body Part-Level Domain Alignment for Domain-Adaptive Person Re-Identification With Transformer Framework. 3321-3334 - Qiuhua Wang, Tianyu Xia, Dong Wang
, Yizhi Ren, Gongxun Miao, Kim-Kwang Raymond Choo
:
SDoS: Selfish Mining-Based Denial-of-Service Attack. 3335-3349 - Min Wang
, Song Wang
, Jiankun Hu
:
Cancellable Template Design for Privacy-Preserving EEG Biometric Authentication Systems. 3350-3364 - Pengyu Li
, Dan Ye
:
Measurement-Based Optimal Stealthy Attacks on Remote State Estimation. 3365-3374 - Yuki Hirose
, Kazuaki Nakamura
, Naoko Nitta, Noboru Babaguchi:
Anonymization of Human Gait in Video Based on Silhouette Deformation and Texture Transfer. 3375-3390 - Daniele Friolo
, Fabio Massacci, Chan Nam Ngo
, Daniele Venturi
:
Cryptographic and Financial Fairness. 3391-3406 - Brice Colombier
, Vlad-Florin Dragoi
, Pierre-Louis Cayrel, Vincent Grosso:
Profiled Side-Channel Attack on Cryptosystems Based on the Binary Syndrome Decoding Problem. 3407-3420 - Fengyao Zhu
, Yu Zhu
, Xiaoben Jiang
, Jiongyao Ye
:
Cross-Domain Attention and Center Loss for Sketch Re-Identification. 3421-3432 - Jiajun Zhou
, Chenkai Hu, Jianlei Chi
, Jiajing Wu
, Meng Shen
, Qi Xuan
:
Behavior-Aware Account De-Anonymization on Ethereum Interaction Graph. 3433-3448 - Ming Jie Lee
, Zhe Jin
, Shiuan-Ni Liang, Massimo Tistarelli
:
Alignment-Robust Cancelable Biometric Scheme for Iris Verification. 3449-3464 - Zeyuan Yin
, Bingsheng Zhang
, Jingzhong Xu, Kaiyu Lu, Kui Ren
:
Bool Network: An Open, Distributed, Secure Cross-Chain Notary Platform. 3465-3478 - Yuanyuan He
, Xinyu Tan, Jianbing Ni
, Laurence T. Yang
, Xianjun Deng
:
Differentially Private Set Intersection for Asymmetrical ID Alignment. 3479-3494 - Chung-Wei Weng, Yauhen Yakimenka
, Hsuan-Yin Lin
, Eirik Rosnes
, Jörg Kliewer
:
Generative Adversarial User Privacy in Lossy Single-Server Information Retrieval. 3495-3510 - Qinbao Xu
, Elisa Bertino
, Changda Wang
:
Compact Provenance Scheme Through Packet Path Index Differences in WSNs. 3511-3524 - Shanshan Li
, Chunxiang Xu
, Yuan Zhang
, Jianying Zhou:
A Secure Two-Factor Authentication Scheme From Password-Protected Hardware Tokens. 3525-3538 - Solène Bernard
, Patrick Bas
, John Klein
, Tomás Pevný
:
Backpack: A Backpropagable Adversarial Embedding Scheme. 3539-3554 - Jingdian Ming
, Yongbin Zhou
, Wei Cheng
, Huizhong Li
:
Optimizing Higher-Order Correlation Analysis Against Inner Product Masking Scheme. 3555-3568 - Chuan Zhang
, Mingyang Zhao, Liehuang Zhu
, Tong Wu
, Ximeng Liu
:
Enabling Efficient and Strong Privacy-Preserving Truth Discovery in Mobile Crowdsensing. 3569-3581 - Songlei Wang
, Yifeng Zheng
, Xiaohua Jia
, Hejiao Huang
, Cong Wang
:
OblivGM: Oblivious Attributed Subgraph Matching as a Cloud Service. 3582-3596 - Michele Grisafi
, Mahmoud Ammar
, Kasim Sinan Yildirim
, Bruno Crispo
:
MPI: Memory Protection for Intermittent Computing. 3597-3610 - Michael G. Kallitsis
, Rupesh Prajapati, Vasant G. Honavar
, Dinghao Wu, John Yen:
Detecting and Interpreting Changes in Scanning Behavior in Large Network Telescopes. 3611-3625 - Farshad Rostami Ghadi
, Francisco Javier López-Martínez
, Wei-Ping Zhu
, Jean-Marie Gorce
:
The Impact of Side Information on Physical Layer Security Under Correlated Fading Channels. 3626-3636 - Bowen Zhao
, Jiaming Yuan
, Ximeng Liu
, Yongdong Wu
, HweeHwa Pang
, Robert H. Deng
:
SOCI: A Toolkit for Secure Outsourced Computation on Integers. 3637-3648 - Ying Miao
, Qiong Huang
, Meiyan Xiao
, Willy Susilo
:
Blockchain Assisted Multi-Copy Provable Data Possession With Faults Localization in Multi-Cloud Storage. 3663-3676 - Le Qin
, Fei Peng
, Min Long
:
Face Morphing Attack Detection and Localization Based on Feature-Wise Supervision. 3649-3662 - Xiaolu Hou
, Jakub Breier
, Shivam Bhasin
:
SBCMA: Semi-Blind Combined Middle-Round Attack on Bit-Permutation Ciphers With Application to AEAD Schemes. 3677-3690 - Xiaoyu Cao
, Zaixi Zhang
, Jinyuan Jia
, Neil Zhenqiang Gong
:
FLCert: Provably Secure Federated Learning Against Poisoning Attacks. 3691-3705 - Zhiyuan He
, Jun Zhang
, Liaojun Pang
, Eryun Liu
:
PFVNet: A Partial Fingerprint Verification Network Learned From Large Fingerprint Matching. 3706-3719 - Wanming Hao
, Junjie Li
, Gangcan Sun
, Ming Zeng
, Octavia A. Dobre
:
Securing Reconfigurable Intelligent Surface-Aided Cell-Free Networks. 3720-3733 - Zhen Hong
, Xiong Li
, Zhenyu Wen
, Leiqiang Zhou
, Huan Chen
, Jie Su
:
ESP Spoofing: Covert Acoustic Attack on MEMS Gyroscopes in Vehicles. 3734-3747 - Hugo Proença
:
: A Learning-Based Framework to Augment Permanence. 3748-3757 - Sha Ma
, Yijian Zhong
, Qiong Huang
:
Efficient Public Key Encryption With Outsourced Equality Test for Cloud-Based IoT Environments. 3758-3772 - Yinbo Yu
, Jiajia Liu
:
TAPInspector: Safety and Liveness Verification of Concurrent Trigger-Action IoT Systems. 3773-3788 - Fei Tong
, Xing Chen
, Kaiming Wang
, Yujian Zhang:
CCAP: A Complete Cross-Domain Authentication Based on Blockchain for Internet of Things. 3789-3800 - Pingan Fan
, Hong Zhang
, Xianfeng Zhao
:
Adaptive QIM With Minimum Embedding Cost for Robust Video Steganography on Social Networks. 3801-3815 - Bao Gia Doan
, Minhui Xue
, Shiqing Ma, Ehsan Abbasnejad, Damith C. Ranasinghe
:
TnT Attacks! Universal Naturalistic Adversarial Patches Against Deep Neural Network Systems. 3816-3830 - Aryan Mohammadi Pasikhani
, John A. Clark, Prosanta Gope
:
Adversarial RL-Based IDS for Evolving Data Environment in 6LoWPAN. 3831-3846 - Durba Chatterjee, Harishma Boyapally, Sikhar Patranabis, Urbi Chatterjee, Aritra Hazra, Debdeep Mukhopadhyay:
Physically Related Functions: Exploiting Related Inputs of PUFs for Authenticated-Key Exchange. 3847-3862 - Pei Cao
, Chi Zhang
, Xiangjun Lu, Dawu Gu
, Sen Xu:
Improving Deep Learning Based Second-Order Side-Channel Analysis With Bilinear CNN. 3863-3876 - Liron David
, Avinatan Hassidim, Yossi Matias
, Moti Yung, Alon Ziv
:
Eddystone-EID: Secure and Private Infrastructural Protocol for BLE Beacons. 3877-3889 - Matthew Bradbury
, Arshad Jhumka
:
Quantifying Source Location Privacy Routing Performance via Divergence and Information Loss. 3890-3905 - Unai Rioja
, Lejla Batina
, Igor Armendariz
, Jose Luis Flores
:
Towards Human Dependency Elimination: AI Approach to SCA Robustness Assessment. 3906-3921 - Krishnan Rajkumar
, Antriksh Goswami
, K. Lakshmanan, Ruchir Gupta
:
Comment on "Federated Learning With Differential Privacy: Algorithms and Performance Analysis". 3922-3924 - Woojin Jeong
, Eunmin Choi
, Hoseung Song
, Minji Cho
, Ji-Woong Choi
:
Adaptive Controller Area Network Intrusion Detection System Considering Temperature Variations. 3925-3933 - Ehsan Hallaji
, Roozbeh Razavi-Far
, Meng Wang
, Mehrdad Saif
, Bruce Fardanesh
:
A Stream Learning Approach for Real-Time Identification of False Data Injection Attacks in Cyber-Physical Power Systems. 3934-3945 - Darren Hurley-Smith
, Constantinos Patsakis
, Julio C. Hernandez-Castro:
On the Unbearable Lightness of FIPS 140-2 Randomness Tests. 3946-3958 - Oleg Schell
, Claudio Oechsler
, Marcel Kneib
:
Asymmetric Symbol and Skew Sender Identification for Automotive Networks. 3959-3971 - Su Wang
, Zhiliang Wang
, Tao Zhou, Hongbin Sun, Xia Yin, Dongqi Han
, Han Zhang
, Xingang Shi
, Jiahai Yang
:
THREATRACE: Detecting and Tracing Host-Based Threats in Node Level Through Provenance Graph Learning. 3972-3987 - Lu Lv
, Zan Li
, Haiyang Ding
, Naofal Al-Dhahir
, Jian Chen
:
Achieving Covert Wireless Communication With a Multi-Antenna Relay. 760-773 - Jianze Wei
, Huaibo Huang
, Yunlong Wang, Ran He
, Zhenan Sun
:
Towards More Discriminative and Robust Iris Recognition by Learning Uncertain Factors. 865-879 - Yandong Zheng
, Rongxing Lu
, Yunguo Guan
, Songnian Zhang, Jun Shao
, Hui Zhu
:
Efficient and Privacy-Preserving Similarity Query With Access Control in eHealthcare. 880-893 - Liang Zhang
, Feiyang Qiu, Feng Hao
, Haibin Kan
:
1-Round Distributed Key Generation With Efficient Reconstruction Using Decentralized CP-ABE. 894-907 - Shan Gu
, Jianjiang Feng
, Jiwen Lu
, Jie Zhou
:
Latent Fingerprint Indexing: Robust Representation and Adaptive Candidate List. 908-923 - Wei Liu
, Ruiming Wang
, Xuyan Qi, Liehui Jiang, Jing Jing
:
Multiclass Classification-Based Side-Channel Hybrid Attacks on Strong PUFs. 924-937 - Ning Lu
, Junwei Zhang, Ximeng Liu
, Wenbo Shi
, Jianfeng Ma
:
STOP: A Service Oriented Internet Purification Against Link Flooding Attacks. 938-953 - Zhaoyang Cheng
, Guanpu Chen
, Yiguang Hong
:
Single-Leader-Multiple-Followers Stackelberg Security Game With Hypergame Framework. 954-969 - Zhaohui Zheng, Bichao Xu
, Jianping Ju, Zhongyuan Guo, Changhui You, Qiang Lei
, Qiang Zhang:
Circumferential Local Ternary Pattern: New and Efficient Feature Descriptors for Anti-Counterfeiting Pattern Identification. 970-981 - Pingchuan Ma, Zhibo Liu
, Yuanyuan Yuan
, Shuai Wang
:
NeuralD: Detecting Indistinguishability Violations of Oblivious RAM With Neural Distinguishers. 982-997 - Cairong Zhao
, Liang Zhu
, Shuguang Dou
, Weihong Deng
, Liang Wang:
Detecting Overlapped Objects in X-Ray Security Imagery by a Label-Aware Mechanism. 998-1009 - Tiep Minh Hoang
, Trinh Van Chien
, Thien Van Luong
, Symeon Chatzinotas
, Björn E. Ottersten, Lajos Hanzo
:
Detection of Spoofing Attacks in Aeronautical Ad-Hoc Networks Using Deep Autoencoders. 1010-1023 - Gaoyang Liu, Tianlong Xu, Xiaoqiang Ma, Chen Wang
:
Your Model Trains on My Data? Protecting Intellectual Property of Training Data via Membership Fingerprint Authentication. 1024-1037 - Xiu-Chuan Li
, Xu-Yao Zhang
, Fei Yin
, Cheng-Lin Liu
:
Decision-Based Adversarial Attack With Frequency Mixup. 1038-1052 - Qin Jiang
, Ee-Chien Chang, Yong Qi
, Saiyu Qi
, Pengfei Wu
, Jianfeng Wang
:
Rphx: Result Pattern Hiding Conjunctive Query Over Private Compressed Index Using Intel SGX. 1053-1068 - Zijie Yang
, Jiahao Cao, Zhuotao Liu, Xiaoli Zhang, Kun Sun
, Qi Li
:
Good Learning, Bad Performance: A Novel Attack Against RL-Based Congestion Control Systems. 1069-1082 - Yang Yang
, Ke Mu
, Robert H. Deng
:
Lightweight Privacy-Preserving GAN Framework for Model Training and Image Synthesis. 1083-1098 - Shuo Wang
, Surya Nepal
, Alsharif Abuadbba, Carsten Rudolph
, Marthie Grobler
:
Adversarial Detection by Latent Style Transformations. 1099-1114 - Peng Xu
, Willy Susilo
, Wei Wang
, Tianyang Chen, Qianhong Wu
, Kaitai Liang
, Hai Jin
:
ROSE: Robust Searchable Encryption With Forward and Backward Security. 1115-1130 - Inkyu Bang
, Taehoon Kim
, Han Seung Jang
, Dan Keun Sung
:
An Opportunistic Power Control Scheme for Mitigating User Location Tracking Attacks in Cellular Networks. 1131-1144 - Danilo Avola
, Marco Cascio
, Luigi Cinque, Alessio Fagioli
, Chiara Petrioli
:
Person Re-Identification Through Wi-Fi Extracted Radio Biometric Signatures. 1145-1158 - Mustafizur Rahman
, Liang Zhou
, Shantanu Chakrabartty
:
SPoTKD: A Protocol for Symmetric Key Distribution Over Public Channels Using Self-Powered Timekeeping Devices. 1159-1171 - Zihao Cheng
, Dong Yue
, Shigen Shen
, Songlin Hu
, Lei Chen
:
Secure Frequency Control of Hybrid Power System Under DoS Attacks via Lie Algebra. 1172-1184 - Lucian Popa
, Bogdan Groza
, Camil Jichici
, Pal-Stefan Murvay
:
ECUPrint - Physical Fingerprinting Electronic Control Units on CAN Buses Inside Cars and SAE J1939 Compliant Vehicles. 1185-1200

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.