


default search action
IEEE Transactions on Information Forensics and Security, Volume 13
Volume 13, Number 1, January 2018
- Patrizio Campisi:
Editorial. 5 - Anh Truong
, S. Rasoul Etesami, Jalal Etesami
, Negar Kiyavash:
Optimal Attack Strategies Against Predictors - Learning From Expert Advice. 6-19 - Tarang Chugh, Kai Cao
, Jiayu Zhou, Elham Tabassi, Anil K. Jain:
Latent Fingerprint Value Prediction: Crowd-Based Learning. 20-34 - Liang Xiao
, Yanda Li, Guoan Han, Huaiyu Dai, H. Vincent Poor
:
A Secure Mobile Crowdsensing Game With Deep Reinforcement Learning. 35-47 - Chao Shen
, Yuanxun Li, Yufei Chen
, Xiaohong Guan, Roy A. Maxion:
Performance Analysis of Multi-Motion Sensor Behavior for Active Smartphone Authentication. 48-62 - Vincent F. Taylor
, Riccardo Spolaor
, Mauro Conti
, Ivan Martinovic:
Robust Smartphone App Identification via Encrypted Network Traffic Analysis. 63-78 - Sandhya Koteshwara
, Chris H. Kim, Keshab K. Parhi
:
Key-Based Dynamic Functional Obfuscation of Integrated Circuits Using Sequentially Triggered Mode-Based Design. 79-93 - Jianting Ning
, Zhenfu Cao
, Xiaolei Dong, Kaitai Liang
, Hui Ma, Lifei Wei:
Auditable σ-Time Outsourced Attribute-Based Encryption for Access Control in Cloud Computing. 94-105 - Jiangshan Yu
, Mark Ryan
, Cas Cremers:
DECIM: Detecting Endpoint Compromise In Messaging. 106-118 - Nirattaya Khamsemanan, Cholwich Nattee
, Nitchan Jianwattanapaisarn:
Human Identification From Freestyle Walks Using Posture-Based Gait Feature. 119-128 - Giulio Giaconi
, Deniz Gündüz
, H. Vincent Poor
:
Smart Meter Privacy With Renewable Energy and an Energy Storage Device. 129-142 - João Sá Sousa
, João P. Vilela:
Uncoordinated Frequency Hopping for Wireless Secrecy Against Non-Degraded Eavesdroppers. 143-155 - Shan Gu, Jianjiang Feng
, Jiwen Lu
, Jie Zhou:
Efficient Rectification of Distorted Fingerprints. 156-169 - Xinghao Jiang, Peisong He
, Tanfeng Sun
, Feng Xie, Shilin Wang
:
Detection of Double Compression With the Same Coding Parameters Based on Quality Degradation Mechanism Analysis. 170-185 - Cong Zuo
, Jun Shao, Joseph K. Liu
, Guiyi Wei, Yun Ling:
Fine-Grained Two-Factor Protection Mechanism for Data Sharing in Cloud Storage. 186-196 - He Fang, Li Xu, Xianbin Wang
:
Coordinated Multiple-Relays Based Physical-Layer Security Improvement: A Single-Leader Multiple-Followers Stackelberg Game Scheme. 197-209 - Tan Tai Do
, Emil Björnson
, Erik G. Larsson, Seyed Mohammad Razavizadeh
:
Jamming-Resistant Receivers for the Massive MIMO Uplink. 210-223 - Te Sun Han, Hiroyuki Endo
, Masahide Sasaki:
Wiretap Channels With One-Time State Information: Strong Secrecy. 224-236 - Alessio Zappone
, Pin-Hsun Lin, Eduard A. Jorswieck:
Optimal Energy-Efficient Design of Confidential Multiple-Antenna Systems. 237-252 - Chris G. Zeinstra
, Raymond N. J. Veldhuis, Luuk J. Spreeuwers
:
Grid-Based Likelihood Ratio Classifiers for the Comparison of Facial Marks. 253-264
Volume 13, Number 2, February 2018
- Wei Wang
, Kah Chan Teh
, Kwok Hung Li
, Sheng Luo:
On the Impact of Adaptive Eavesdroppers in Multi-Antenna Cellular Networks. 269-279 - Wouter Biesmans, Josep Balasch, Alfredo Rial
, Bart Preneel
, Ingrid Verbauwhede
:
Private Mobile Pay-TV From Priced Oblivious Transfer. 280-291 - Hao Liu, Jiwen Lu
, Jianjiang Feng
, Jie Zhou:
Label-Sensitive Deep Metric Learning for Facial Age Estimation. 292-305 - Dong-Hua Chen
, Yu-Cheng He, Xiaodan Lin, Rui Zhao:
Both Worst-Case and Chance-Constrained Robust Secure SWIPT in MISO Interference Channels. 306-317 - Weichen Xiang
, Martin Johnston, Stéphane Y. Le Goff:
Low-Complexity Power Control and Energy Harvesting Algorithms for Wiretap Channels Employing Finite-Alphabet Input Schemes. 318-326 - Mauro Mangia
, Fabio Pareschi
, Riccardo Rovatti, Gianluca Setti
:
Low-Cost Security of IoT Sensor Nodes With Rakeness-Based Compressed Sensing: Statistical and Known-Plaintext Attacks. 327-340 - Ali Kuhestani
, Abbas Mohammadi
, Mohammadali Mohammadi
:
Joint Relay Selection and Power Allocation in Large-Scale MIMO Systems With Untrusted Relays and Passive Eavesdroppers. 341-355 - Manami Sasaki, Yodai Watanabe
:
Visual Secret Sharing Schemes Encrypting Multiple Images. 356-365 - Lei Xu
, Arumugam Nallanathan
, Xiaofei Pan, Jian Yang, Wenhe Liao:
Security-Aware Resource Allocation With Delay Constraint for NOMA-Based Cognitive Radio Network. 366-376 - Bo Peng
, Wei Wang
, Jing Dong, Tieniu Tan:
Image Forensics Based on Planar Contact Constraints of 3D Objects. 377-392 - Zhe Jin
, Jung Yeon Hwang, Yen-Lung Lai, Soohyung Kim, Andrew Beng Jin Teoh
:
Ranking-Based Locality Sensitive Hashing-Enabled Cancelable Biometrics: Index-of-Max Hashing. 393-407 - Jianhua Liu
, Jiadi Yu, Shigen Shen
:
Energy-Efficient Two-Layer Cooperative Defense Scheme to Secure Sensor-Clouds. 408-420 - Lingxiang Li
, Zhi Chen, Athina P. Petropulu, Jun Fang:
Linear Precoder Design for an MIMO Gaussian Wiretap Channel With Full-Duplex Source and Destination Nodes. 421-436 - Jeeson Kim
, Taimur Ahmed
, Hussein Nili
, Jiawei Yang, Doo Seok Jeong, Paul Beckett, Sharath Sriram
, Damith Chinthana Ranasinghe, Omid Kavehei
:
A Physical Unclonable Function With Redox-Based Nanoionic Resistive Memory. 437-448 - Ruei-Hau Hsu, Jemin Lee
, Tony Q. S. Quek
, Jyh-Cheng Chen:
GRAAD: Group Anonymous and Accountable D2D Communication in Mobile Networks. 449-464 - Xinwei Qiu
, Wenxiong Kang
, Senping Tian, Wei Jia, Zhixing Huang:
Finger Vein Presentation Attack Detection Using Total Variation Decomposition. 465-477 - Sina Lashgari
, Amir Salman Avestimehr:
Secrecy DoF of Blind MIMOME Wiretap Channel With Delayed CSIT. 478-489 - Marios O. Choudary
, Markus G. Kuhn
:
Efficient, Portable Template Attacks. 490-501 - Zahra Ahmadian
, Sadegh Jamshidpour:
Linear Subspace Cryptanalysis of Harn's Secret Sharing-Based Group Authentication Scheme. 502-510 - Meixia Miao, Jianfeng Ma, Xinyi Huang, Qian Wang
:
Efficient Verifiable Databases With Insertion/Deletion Operations From Delegating Polynomial Functions. 511-520 - Patrick P. K. Chan, Weiwen Liu
, Danni Chen, Daniel S. Yeung, Fei Zhang
, Xizhao Wang, Chien-Chang Hsu
:
Face Liveness Detection Using a Flash Against 2D Spoofing Attack. 521-534
Volume 13, Number 3, March 2018
- Shukun Yang
, Shouling Ji
, Raheem A. Beyah
:
DPPG: A Dynamic Password Policy Generation System. 545-558 - Chenxu Wang
, TungNgai Miu, Xiapu Luo
, Jinhe Wang:
SkyShield: A Sketch-Based Defense System Against Application Layer DDoS Attacks. 559-573 - Jun Du, Chunxiao Jiang
, Kwang-Cheng Chen
, Yong Ren, H. Vincent Poor
:
Community-Structured Evolutionary Game for Privacy Protection in Social Networks. 574-589 - Marc Sánchez Artigas
:
Enhancing Tree-Based ORAM Using Batched Request Reordering. 590-604 - Baki Berkay Yilmaz, Robert Locke Callan, Milos Prvulovic, Alenka G. Zajic
:
Capacity of the EM Covert/Side-Channel Created by the Execution of Instructions in a Processor. 605-620 - Muhamad Erza Aminanto
, Rakyong Choi, Harry Chandra Tanuwidjaja, Paul D. Yoo
, Kwangjo Kim:
Deep Abstraction and Weighted Feature Selection for Wi-Fi Impersonation Detection. 621-636 - Shu Zhang, Ran He, Zhenan Sun, Tieniu Tan:
DeMeshNet: Blind Face Inpainting for Deep MeshFace Verification. 637-647 - Takashi Nakamura
, Valentin Goverdovsky, Danilo P. Mandic
:
In-Ear EEG Biometrics for Feasible and Readily Collectable Real-World Person Authentication. 648-661 - Hao Dong, Chao Wu
, Zhen Wei, Yike Guo:
Dropping Activation Outputs With Localized First-Layer Deep Network for Enhancing User Privacy and Data Security. 662-670 - Jingran Lin, Qiang Li, Jintai Yang, Huaizong Shao, Wen-Qin Wang:
Physical-Layer Security for Proximal Legitimate User and Eavesdropper: A Frequency Diverse Array Beamforming Approach. 671-684 - Vaishakh Ravindrakumar, Parthasarathi Panda, Nikhil Karamchandani
, Vinod M. Prabhakaran:
Private Coded Caching. 685-694 - Shuhua Deng
, Xing Gao, Zebin Lu, Xieping Gao
:
Packet Injection Attack and Its Defense in Software-Defined Networks. 695-705 - Nawaf Yousef Almudhahka
, Mark S. Nixon
, Jonathon S. Hare:
Semantic Face Signatures: Recognizing and Retrieving Faces by Verbal Descriptions. 706-716 - Xiaoke Zhu, Xiao-Yuan Jing
, Xinge You, Wangmeng Zuo, Shiguang Shan
, Wei-Shi Zheng:
Image to Video Person Re-Identification by Learning Heterogeneous Dictionary Pair With Feature Projection Matrix. 717-732 - Jun Wang, Guoqing Wang
, Mei Zhou:
Bimodal Vein Data Mining via Cross-Selected-Domain Knowledge Transfer. 733-744 - Yongdong Wu
, Binbin Chen
, Zhigang Zhao, Yao Cheng:
Attack and Countermeasure on Interlock-Based Device Pairing Schemes. 745-757 - Mingxing Duan
, Kenli Li, Keqin Li:
An Ensemble CNN2ELM for Age Estimation. 758-772 - Bahman Rashidi
, Carol J. Fung, Anh Nguyen, Tam Vu, Elisa Bertino:
Android User Privacy Preserving Through Crowdsourcing. 773-787 - Jan Kohout
, Tomás Pevný
:
Network Traffic Fingerprinting Based on Approximated Kernel Two-Sample Test. 788-801 - Zi Li
, Qingqi Pei, Ian D. Markwood, Yao Liu, Haojin Zhu
:
Secret Key Establishment via RSS Trajectory Matching Between Wearable Devices. 802-817
Volume 13, Number 4, April 2018
- Mehdi Boroumand
, Jessica J. Fridrich:
Applications of Explicit Non-Linear Feature Maps in Steganalysis. 823-833 - Kai Bu
, Yingjiu Li:
Every Step You Take, I'll Be Watching You: Practical StepAuth-Entication of RFID Paths. 834-849 - Seyed Mohammad Hosseini
, Amir Hossein Jahangir
:
An Effective Payload Attribution Scheme for Cybercriminal Detection Using Compressed Bitmap Index Tables and Traffic Downsampling. 850-860 - Lei Tang, Wenxiong Kang
, Yuxun Fang:
Information Divergence-Based Matching Strategy for Online Signature Verification. 861-873 - Pol Mac Aonghusa
, Douglas J. Leith
:
Plausible Deniability in Web Search - From Detection to Assessment. 874-887 - Hugo Proença
, João C. Neves
:
Deep-PRWIS: Periocular Recognition Without the Iris and Sclera Using Deep Learning Frameworks. 888-896 - Sadhana Jha, Shamik Sural
, Vijayalakshmi Atluri
, Jaideep Vaidya
:
Specification and Verification of Separation of Duty Constraints in Attribute-Based Access Control. 897-911 - Jian Shen
, Tianqi Zhou, Xiaofeng Chen
, Jin Li, Willy Susilo
:
Anonymous and Traceable Group Data Sharing in Cloud Computing. 912-925 - Zheng Chu
, Huan Xuan Nguyen
, Giuseppe Caire
:
Game Theory-Based Resource Allocation for Secure WPCN Multiantenna Multicasting Systems. 926-939 - Meng Shen
, Baoli Ma
, Liehuang Zhu
, Rashid Mijumbi
, Xiaojiang Du, Jiankun Hu
:
Cloud-Based Approximate Constrained Shortest Distance Queries Over Encrypted Graphs With Privacy Protection. 940-953 - André Schaller
, Taras Stanko, Boris Skoric
, Stefan Katzenbeisser:
Eliminating Leakage in Reverse Fuzzy Extractors. 954-964 - Yanxiong Li
, Xue Zhang, Xianku Li, Yuhan Zhang, Ji-Chen Yang, Qianhua He:
Mobile Phone Clustering From Speech Recordings Using Deep Representation and Spectral Clustering. 965-977 - Wei-Che Wang
, Yair Yona
, Suhas N. Diggavi, Puneet Gupta
:
Design and Analysis of Stability-Guaranteed PUFs. 978-992 - Linyuan Zhang, Guoru Ding
, Qihui Wu, Zhu Han:
Spectrum Sensing Under Spectrum Misuse Behaviors: A Multi-Hypothesis Test Perspective. 993-1007 - Matteo Ferrara
, Annalisa Franco, Davide Maltoni
:
Face Demorphing. 1008-1017 - Zhiyong Su
, Ying Ye, Qi Zhang, Weiqing Li, Yuewei Dai:
Robust 2D Engineering CAD Graphics Hashing for Joint Topology and Geometry Authentication via Covariance-Based Descriptors. 1018-1030 - Darren Hurley-Smith
, Julio C. Hernandez-Castro:
Certifiably Biased: An In-Depth Analysis of a Common Criteria EAL4+ Certified TRNG. 1031-1041 - Hasini Gunasinghe
, Elisa Bertino
:
PrivBioMTAuth: Privacy Preserving Biometrics-Based and User Centric Protocol for User Authentication From Mobile Phones. 1042-1057 - Jiachun Liao
, Lalitha Sankar
, Vincent Y. F. Tan
, Flávio du Pin Calmon
:
Hypothesis Testing Under Mutual Information Privacy Constraints in the High Privacy Regime. 1058-1071
Volume 13, Number 5, May 2018
- Zhongliu Zhuo
, Yang Zhang
, Zhi-Li Zhang, Xiaosong Zhang, Jingzhong Zhang:
Website Fingerprinting Attack on Anonymity Networks Based on Profile Hidden Markov Model. 1081-1095 - Shanshan Wang, Qiben Yan
, Zhenxiang Chen
, Bo Yang
, Chuan Zhao, Mauro Conti
:
Detecting Android Malware Leveraging Text Semantics of Network Flows. 1096-1109 - Harjinder Singh Lallie
, Kurt Debattista
, Jay Bal:
An Empirical Evaluation of the Effectiveness of Attack Graphs and Fault Trees in Cyber-Attack Perception. 1110-1122 - Emanuele Maiorana
, Patrizio Campisi
:
Longitudinal Evaluation of EEG-Based Biometric Recognition. 1123-1138 - Alfonso Iacovazzi
, Sanat Sarda
, Daniel Frassinelli, Yuval Elovici:
DropWat: An Invisible Network Flow Watermark for Data Exfiltration Traceback. 1139-1154 - Jingyu Hua
, Wei Tong
, Fengyuan Xu, Sheng Zhong:
A Geo-Indistinguishable Location Perturbation Mechanism for Location-Based Services Supporting Frequent Queries. 1155-1168 - Wei Dai
, Yarkin Doröz, Yuriy Polyakov
, Kurt Rohloff
, Hadi Sajjadpour
, Erkay Savas
, Berk Sunar:
Implementation and Evaluation of a Lattice-Based Key-Policy ABE Scheme. 1169-1184 - Suryadipta Majumdar
, Taous Madi, Yushun Wang, Yosr Jarraya, Makan Pourzandi, Lingyu Wang, Mourad Debbabi
:
User-Level Runtime Security Auditing for the Cloud. 1185-1199 - Jishen Zeng
, Shunquan Tan
, Bin Li, Jiwu Huang
:
Large-Scale JPEG Image Steganalysis Using Hybrid Deep-Learning Framework. 1200-1214 - Juan Lopez Jr.
, Nathan C. Liefer, Colin R. Busho, Michael A. Temple
:
Enhancing Critical Infrastructure and Key Resources (CIKR) Level-0 Physical Process Security Using Field Device Distinct Native Attribute Features. 1215-1229 - Yanqing Yao
, Zhoujun Li
:
Differential Privacy With Bias-Control Limited Sources. 1230-1241 - Bin Li
, Zhongpeng Li, Shijun Zhou, Shunquan Tan
, Xiaoling Zhang:
New Steganalytic Features for Spatial Image Steganography Based on Derivative Filters and Threshold LBP Operator. 1242-1257 - Eduardo José da S. Luz
, Gladston J. P. Moreira
, Luiz S. Oliveira, William Robson Schwartz
, David Menotti
:
Learning Deep Off-the-Person Heart Biometrics Representations. 1258-1270 - Chuntao Wang
, Jiangqun Ni
, Xinpeng Zhang
, Qiong Huang:
Efficient Compression of Encrypted Binary Images Using the Markov Random Field. 1271-1285 - Jing Chen
, Chiheng Wang
, Ziming Zhao, Kai Chen
, Ruiying Du, Gail-Joon Ahn
:
Uncovering the Face of Android Ransomware: Characterization and Real-Time Detection. 1286-1300 - Weijia Wang
, Yu Yu
, François-Xavier Standaert
, Junrong Liu, Zheng Guo, Dawu Gu:
Ridge-Based DPA: Improvement of Differential Power Analysis For Nanoscale Chips. 1301-1316 - Jun Yu, Zhenzhong Kuang
, Baopeng Zhang
, Wei Zhang, Dan Lin
, Jianping Fan
:
Leveraging Content Sensitiveness and User Trustworthiness to Recommend Fine-Grained Privacy Settings for Social Image Sharing. 1317-1332 - Le Trieu Phong
, Yoshinori Aono, Takuya Hayashi
, Lihua Wang
, Shiho Moriai:
Privacy-Preserving Deep Learning via Additively Homomorphic Encryption. 1333-1345
Volume 13, Number 6, June 2018
- Haowei Wang
, Xiaofeng Tao
, Na Li, Zhu Han:
Polar Coding for the Wiretap Channel With Shared Key. 1351-1360 - Hussain M. J. Almohri
, Layne T. Watson, David Evans:
Misery Digraphs: Delaying Intrusion Attacks in Obscure Clouds. 1361-1375 - Yongzhi Wang
, Yulong Shen, Xiaohong Jiang
:
Practical Verifiable Computation-A MapReduce Case Study. 1376-1391 - Pramuditha Perera
, Vishal M. Patel
:
Efficient and Low Latency Detection of Intruders in Mobile Active Authentication. 1392-1405 - Marta Gomez-Barrero
, Javier Galbally
, Christian Rathgeb, Christoph Busch
:
General Framework to Evaluate Unlinkability in Biometric Template Protection Systems. 1406-1420 - Christian Galea
, Reuben A. Farrugia
:
Matching Software-Generated Sketches to Face Photographs With a Very Deep CNN, Morphed Faces, and Transfer Learning. 1421-1431 - Hao Wu
, Wei Wang
:
A Game Theory Based Collaborative Security Detection Method for Internet of Things Systems. 1432-1445 - Elizabeth Hou
, Kumar Sricharan, Alfred O. Hero III:
Latent Laplacian Maximum Entropy Discrimination for Detection of High-Utility Anomalies. 1446-1459 - Baocang Wang
, Yu Zhan, Zhili Zhang
:
Cryptanalysis of a Symmetric Fully Homomorphic Encryption Scheme. 1460-1467 - Florian Wilde
, Berndt M. Gammel
, Michael Pehl
:
Spatial Correlation Analysis on Physical Unclonable Functions. 1468-1480 - Carmen Campomanes-Álvarez
, Rubén Martos-Fernández
, Caroline M. Wilkinson
, Óscar Ibáñez
, Oscar Cordón
:
Modeling Skull-Face Anatomical/Morphological Correspondence for Craniofacial Superimposition-Based Identification. 1481-1494 - Gábor Fodor
, Peter Schelkens
, Ann Dooms
:
Fingerprinting Codes Under the Weak Marking Assumption. 1495-1508 - Xiushan Nie
, Xiaoyu Li, Yane Chai
, Chaoran Cui, Xiaoming Xi
, Yilong Yin:
Robust Image Fingerprinting Based on Feature Point Relationship Mining. 1509-1523 - Xiaofan He
, Richeng Jin, Huaiyu Dai:
Leveraging Spatial Diversity for Privacy-Aware Location-Based Services in Mobile Networks. 1524-1534 - Jinku Li
, Xiaomeng Tong
, Fengwei Zhang
, Jianfeng Ma:
Fine-CFI: Fine-Grained Control-Flow Integrity for Operating System Kernels. 1535-1550 - AmirEmad Ghassami
, Negar Kiyavash:
A Covert Queueing Channel in FCFS Schedulers. 1551-1563 - Joshua J. Engelsma
, Sunpreet S. Arora, Anil K. Jain
, Nicholas G. Paulter:
Universal 3D Wearable Fingerprint Targets: Advancing Fingerprint Reader Evaluations. 1564-1578 - Ning Xie
, Changsheng Chen
:
Slope Authentication at the Physical Layer. 1579-1594 - Zi Li, Qingqi Pei, Ian D. Markwood, Yao Liu, Haojin Zhu:
Corrections to "Secret Key Establishment via RSS Trajectory Matching Between Wearable Devices" [Mar 18 802-817]. 1595
Volume 13, Number 7, July 2018
- Sharad Joshi
, Nitin Khanna
:
Single Classifier-Based Passive System for Source Printer Classification Using Local Texture Features. 1603-1614 - Farhang Bayat
, Shuangqing Wei
:
Non-Adaptive Sequential Detection of Active Edge-Wise Disjoint Subgraphs Under Privacy Constraints. 1615-1625 - Yichun Shi
, Charles Otto
, Anil K. Jain
:
Face Clustering: Representation and Pairwise Constraints. 1626-1640 - Holger Boche, Christian Deppe
:
Secure Identification for Wiretap Channels; Robustness, Super-Additivity and Continuity. 1641-1655 - Jiahui Hou
, Xiang-Yang Li
, Taeho Jung
, Yu Wang
, Daren Zheng:
CASTLE: Enhancing the Utility of Inequality Query Auditing Without Denial Threats. 1656-1669 - Pauline Puteaux
, William Puech
:
An Efficient MSB Prediction-Based Method for High-Capacity Reversible Data Hiding in Encrypted Images. 1670-1681 - Christos Liaskos
, Sotiris Ioannidis:
Network Topology Effects on the Detectability of Crossfire Attacks. 1682-1695 - Alireza Sepas-Moghaddam
, Fernando Pereira
, Paulo Lobato Correia
:
Light Field-Based Face Presentation Attack Detection: Reviewing, Benchmarking and One Step Further. 1696-1709 - Luca Calderoni
, Paolo Palmieri
, Dario Maio
:
Probabilistic Properties of the Spatial Bloom Filters and Their Relevance to Cryptographic Protocols. 1710-1721 - Nam Yul Yu
:
Indistinguishability and Energy Sensitivity of Gaussian and Bernoulli Compressed Encryption. 1722-1735 - Peng Xu
, Zhiguo Ding
, Xuchu Dai:
Achievable Secrecy Rates for Relay-Eavesdropper Channel Based on the Application of Noisy Network Coding. 1736-1751 - Pei Luo
, Konstantinos Athanasiou, Yunsi Fei
, Thomas Wahl:
Algebraic Fault Analysis of SHA-3 Under Relaxed Fault Models. 1752-1761 - Owen Mayer
, Matthew C. Stamm
:
Accurate and Efficient Image Forgery Detection Using Lateral Chromatic Aberration. 1762-1777 - Dongyang Xu
, Pinyi Ren
, James A. Ritcey, Yichen Wang:
Code-Frequency Block Group Coding for Anti-Spoofing Pilot Authentication in Multi-Antenna OFDM Systems. 1778-1793 - Haoliang Li
, Wen Li
, Hong Cao, Shiqi Wang, Feiyue Huang
, Alex C. Kot
:
Unsupervised Domain Adaptation for Face Anti-Spoofing. 1794-1809 - Majid Komeili
, Narges Armanfard
, Dimitrios Hatzinakos:
Liveness Detection and Automatic Template Updating Using Fusion of ECG and Fingerprint. 1810-1822 - Yueqi Duan, Jiwen Lu
, Jianjiang Feng
, Jie Zhou:
Topology Preserving Structural Matching for Automatic Partial Face Recognition. 1823-1837 - Jing Zheng
, Qi Li
, Guofei Gu, Jiahao Cao
, David K. Y. Yau, Jianping Wu:
Realtime DDoS Defense Using COTS SDN Switches via Adaptive Correlation Analysis. 1838-1853 - Zinan Lin
, Yongfeng Huang
, Jilong Wang:
RNN-SM: Fast Steganalysis of VoIP Streams Using Recurrent Neural Network. 1854-1868 - Caixue Zhou
:
Comments on "Light-Weight and Robust Security-Aware D2D-Assist Data Transmission Protocol for Mobile-Health Systems". 1869-1870
Volume 13, Number 8, August 2018
- Azzam Al-Nahari
, Giovanni Geraci
, Mukarram Al-jamali, Mohamed Hossam Ahmed, Nan Yang
:
Beamforming With Artificial Noise for Secure MISOME Cognitive Radio Transmissions. 1875-1889 - Ming Fan
, Jun Liu, Xiapu Luo
, Kai Chen, Zhenzhou Tian, Qinghua Zheng, Ting Liu
:
Android Malware Familial Classification and Representative Sample Selection via Frequent Subgraph Analysis. 1890-1905 - Xueqing Gong
, Ping Hu, Kenneth W. Shum, Chi Wan Sung:
A Zigzag-Decodable Ramp Secret Sharing Scheme. 1906-1916 - Xiaoyong Li
, Jie Yuan, Huadong Ma, Wenbin Yao:
Fast and Parallel Trust Computing Scheme Based on Big Data Analysis for Collaboration Cloud Service. 1917-1931 - Yuanfang Guo
, Xiaochun Cao, Wei Zhang, Rui Wang
:
Fake Colorized Image Detection. 1932-1944 - Onur Günlü
, Kittipong Kittichokechai, Rafael F. Schaefer
, Giuseppe Caire:
Controllable Identifier Measurements for Private Authentication With Secret Keys. 1945-1959 - Andrea Valsecchi
, Sergio Damas
, Oscar Cordón
:
A Robust and Efficient Method for Skull-Face Overlay in Computerized Craniofacial Superimposition. 1960-1974 - M. Francisca Hinarejos
, Florina Almenárez
, Patricia Arias Cabarcos
, Josep Lluís Ferrer-Gomila
, Andrés Marín López
:
RiskLaine: A Probabilistic Approach for Assessing Risk in Certificate-Based Security. 1975-1988 - Waziha Kabir, M. Omair Ahmad
, M. N. S. Swamy:
Normalization and Weighting Techniques Based on Genuine-Impostor Score Fusion in Multi-Biometric Systems. 1989-2000 - Ester Gonzalez-Sosa
, Julian Fiérrez
, Rubén Vera-Rodríguez
, Fernando Alonso-Fernandez
:
Facial Soft Biometrics for Recognition in the Wild: Recent Works, Annotation, and COTS Evaluation. 2001-2014 - Mehmet Necip Kurt
, Yasin Yilmaz
, Xiaodong Wang
:
Distributed Quickest Detection of Cyber-Attacks in Smart Grid. 2015-2030 - Po-Yen Lee, Chia-Mu Yu
, Tooska Dargahi
, Mauro Conti
, Giuseppe Bianchi:
MDSClone: Multidimensional Scaling Aided Clone Detection in Internet of Things. 2031-2046 - Zhuo Tang
, Xiaofei Ding, Ying Zhong, Li Yang, Keqin Li
:
A Self-Adaptive Bell-LaPadula Model Based on Model Training With Historical Access Logs. 2047-2061 - Kaiping Xue
, Weikeng Chen
, Wei Li, Jianan Hong, Peilin Hong:
Combining Data Owner-Side and Cloud-Side Access Control for Encrypted Cloud Storage. 2062-2074 - Nima Tavangaran
, Rafael F. Schaefer
, H. Vincent Poor
, Holger Boche:
Secret-Key Generation and Convexity of the Rate Region Using Infinite Compound Sources. 2075-2086 - Heejung Yu
, Taejoon Kim
, Hamid Jafarkhani
:
Wireless Secure Communication With Beamforming and Jamming in Time-Varying Wiretap Channels. 2087-2100 - Shengmin Xu
, Guomin Yang
, Yi Mu
, Robert H. Deng
:
Secure Fine-Grained Access Control and Data Sharing for Dynamic Groups in the Cloud. 2101-2113 - Wonsuk Choi, Kyungho Joo, Hyo Jin Jo, Moon Chan Park
, Dong Hoon Lee
:
VoltageIDS: Low-Level Communication Characteristics for Automotive Intrusion Detection System. 2114-2129
Volume 13, Number 9, September 2018
- Mario Preishuber, Thomas Hütter
, Stefan Katzenbeisser, Andreas Uhl
:
Depreciating Motivation and Empirical Security Analysis of Chaos-Based Image and Video Encryption. 2137-2150 - Xuebin Ren
, Chia-Mu Yu
, Weiren Yu, Shusen Yang, Xinyu Yang
, Julie A. McCann, Philip S. Yu:
LoPub: High-Dimensional Crowdsourced Data Publication With Local Differential Privacy. 2151-2166 - PeiYun Zhang, Yang Kong
, MengChu Zhou
:
A Domain Partition-Based Trust Model for Unreliable Clouds. 2167-2178 - Da Luo, Pawel Korus
, Jiwu Huang
:
Band Energy Difference for Source Attribution in Audio Forensics. 2179-2189 - Tarang Chugh
, Kai Cao, Anil K. Jain
:
Fingerprint Spoof Buster: Use of Minutiae-Centered Patches. 2190-2202 - Samet Akcay
, Mikolaj E. Kundegorski
, Chris G. Willcocks
, Toby P. Breckon
:
Using Deep Convolutional Neural Network Architectures for Object Classification and Detection Within X-Ray Baggage Security Imagery. 2203-2215 - Jake B. Perazzone
, Paul L. Yu, Brian M. Sadler
, Rick S. Blum
:
Cryptographic Side-Channel Signaling and Authentication via Fingerprint Embedding. 2216-2225 - Mohammad Mahdi Khalili
, Parinaz Naghizadeh
, Mingyan Liu:
Designing Cyber Insurance Policies: The Role of Pre-Screening and Security Interdependence. 2226-2239 - Xuan Zha
, Wei Ni
, Xu Wang
, Ren Ping Liu
, Y. Jay Guo
, Xinxin Niu, Kangfeng Zheng:
The Impact of Link Duration on the Integrity of Distributed Mobile Networks. 2240-2255 - Muhammad R. A. Khandaker
, Christos Masouros, Kai-Kit Wong:
Constructive Interference Based Secure Precoding: A New Dimension in Physical Layer Security. 2256-2268 - Kuo Cao
, Yueming Cai, Yongpeng Wu
, Weiwei Yang
:
Secure Communication for Amplify-and-Forward Relay Networks With Finite Alphabet Input. 2269-2278 - Yanling Chen
, Onur Ozan Koyluoglu
, A. J. Han Vinck:
Collective Secrecy Over the K-Transmitter Multiple Access Channel. 2279-2293 - Parthajit Mohapatra
, Nikolaos Pappas
, Jemin Lee
, Tony Q. S. Quek
, Vangelis Angelakis:
Secure Communications for the Two-User Broadcast Channel With Random Traffic. 2294-2309 - Si-Hyeon Lee
, Ligong Wang
, Ashish Khisti
, Gregory W. Wornell
:
Covert Communication With Channel-State Information at the Transmitter. 2310-2319 - Minxin Du
, Qian Wang
, Meiqi He, Jian Weng
:
Privacy-Preserving Indexing and Query Processing for Secure Dynamic Cloud Storage. 2320-2332 - Sujit Rokka Chhetri
, Sina Faezi
, Mohammad Abdullah Al Faruque
:
Information Leakage-Aware Computer-Aided Cyber-Physical Manufacturing. 2333-2344 - Ning Zhang
, Ruide Zhang, Kun Sun, Wenjing Lou, Y. Thomas Hou
, Sushil Jajodia
:
Memory Forensic Challenges Under Misused Architectural Features. 2345-2358 - Zhangjie Fu
, Lili Xia
, Xingming Sun, Alex X. Liu
, Guowu Xie:
Semantic-Aware Searching Over Encrypted Data for Cloud Computing. 2359-2371 - Zi-Xing Lin
, Fei Peng
, Min Long:
A Low-Distortion Reversible Watermarking for 2D Engineering Graphics Based on Region Nesting. 2372-2382 - Haoxi Li, Haifeng Hu
, Chitung Yip:
Age-Related Factor Guided Joint Task Modeling Convolutional Neural Network for Cross-Age Face Recognition. 2383-2392 - Yuqiao Cheng
, Zhengxin Fu
, Bin Yu
:
Improved Visual Secret Sharing Scheme for QR Code Applications. 2393-2403
Volume 13, Number 10, October 2018
- Hongwen Zhang
, Qi Li
, Zhenan Sun
, Yunfan Liu
:
Combining Data-Driven and Model-Driven Methods for Robust Facial Landmark Detection. 2409-2422 - Lei Xue
, Xiaobo Ma, Xiapu Luo
, Edmond W. W. Chan, TungNgai Miu, Guofei Gu:
LinkScope: Toward Detecting Target Link Flooding Attacks. 2423-2438 - Abdulhadi Shoufan
, Haitham M. Al-Angari, Muhammad Faraz Afzal Sheikh
, Ernesto Damiani
:
Drone Pilot Identification by Classifying Radio-Control Signals. 2439-2447 - Shengshan Hu
, Minghui Li
, Qian Wang
, Sherman S. M. Chow
, Minxin Du
:
Outsourced Biometric Identification With Privacy. 2448-2463 - Tamer Mekkawy
, Rugui Yao
, Theodoros A. Tsiftsis
, Fei Xu, Yanan Lu:
Joint Beamforming Alignment With Suboptimal Power Allocation for a Two-Way Untrusted Relay Network. 2464-2474 - Yifeng Zheng
, Huayi Duan
, Cong Wang
:
Learning the Truth Privately and Confidently: Encrypted Confidence-Aware Truth Discovery in Mobile Crowdsensing. 2475-2489 - Erik Miehling
, Mohammad Rasouli, Demosthenis Teneketzis:
A POMDP Approach to the Dynamic Defense of Large-Scale Cyber Networks. 2490-2505 - Xiaoyan Sun
, Jun Dai
, Peng Liu
, Anoop Singhal, John Yen:
Using Bayesian Networks for Probabilistic Identification of Zero-Day Attack Paths. 2506-2521 - Mengyun Tang, Haichang Gao
, Yang Zhang, Yi Liu
, Ping Zhang, Ping Wang:
Research on Deep Learning Techniques in Breaking Text-Based Captchas and Designing Image-Based Captcha. 2522-2537 - Vivek Venugopal
, Suresh Sundaram
:
Online Writer Identification With Sparse Coding-Based Descriptors. 2538-2552 - Felix Wang
, Tu-Thach Quach
, Jason Wheeler, James B. Aimone
, Conrad D. James
:
Sparse Coding for N-Gram Feature Extraction and Training for File Fragment Classification. 2553-2562 - Sevil Sen
, Emre Aydogan
, Ahmet Ilhan Aysan:
Coevolution of Mobile Malware and Anti-Malware. 2563-2574 - Amir Ameli
, Ali Hooshyar
, Ameen Hassan Yazdavar, Ehab F. El-Saadany
, Amr M. Youssef:
Attack Detection for Load Frequency Control Systems Using Stochastic Unknown Input Estimators. 2575-2590 - Gorjan Nadzinski
, Matej Dobrevski
, Christopher Anderson
, Peter V. E. McClintock
, Aneta Stefanovska
, Mile J. Stankovski, Tomislav Stankovski
:
Experimental Realization of the Coupling Function Secure Communications Protocol and Analysis of Its Noise Robustness. 2591-2601 - Seungkwang Lee
, Taesung Kim, Yousung Kang:
A Masked White-Box Cryptographic Implementation for Protecting Against Differential Computation Analysis. 2602-2615 - Amir Akhavan
, Mohammad H. Moradi
:
Detection of Concealed Information Using Multichannel Discriminative Dictionary and Spatial Filter Learning. 2616-2627 - Quanzhong Li
, Liang Yang
:
Artificial Noise Aided Secure Precoding for MIMO Untrusted Two-Way Relay Systems With Perfect and Imperfect Channel State Information. 2628-2638 - Haoliang Li
, Peisong He
, Shiqi Wang
, Anderson Rocha
, Xinghao Jiang
, Alex C. Kot
:
Learning Generalized Deep Feature Representation for Face Anti-Spoofing. 2639-2652 - Na Wang
, Junsong Fu
, Bharat K. Bhargava
, Jiwen Zeng:
Efficient Retrieval Over Documents Encrypted by Attributes in Cloud Computing. 2653-2667 - Chen Li
, Wenping Ma:
Comments on "An Efficient Privacy-Preserving Outsourced Calculation Toolkit With Multiple Keys". 2668-2669
Volume 13, Number 11, November 2018
- Fei Chen, Donghong Wang, Ronghua Li, Jianyong Chen
, Zhong Ming, Alex X. Liu
, Huayi Duan
, Cong Wang
, Jing Qin
:
Secure Hashing-Based Verifiable Pattern Matching. 2677-2690 - Belhassen Bayar
, Matthew C. Stamm
:
Constrained Convolutional Neural Networks: A New Approach Towards General Purpose Image Manipulation Detection. 2691-2706 - Mohd Fazil
, Muhammad Abulaish
:
A Hybrid Approach for Detecting Automated Spammers in Twitter. 2707-2719 - Julian Fiérrez
, Ada Pozo, Marcos Martinez-Diaz
, Javier Galbally
, Aythami Morales
:
Benchmarking Touchscreen Biometrics for Mobile Authentication. 2720-2733 - Xiaoning Song
, Zhenhua Feng
, Guosheng Hu, Josef Kittler
, Xiao-Jun Wu:
Dictionary Integration Using 3D Morphable Face Models for Pose-Invariant Collaborative-Representation-Based Classification. 2734-2745 - Yuanwen Huang
, Swarup Bhunia
, Prabhat Mishra
:
Scalable Test Generation for Trojan Detection Using Side Channel Analysis. 2746-2760 - Prashanth Krishnamurthy, Farshad Khorrami
, Ramesh Karri
, David Paul-Pena
, Hossein Salehghaffari:
Process-Aware Covert Channels Using Physical Instrumentation in Cyber-Physical Systems. 2761-2771 - Weize Quan
, Kai Wang
, Dong-Ming Yan
, Xiaopeng Zhang
:
Distinguishing Between Natural and Computer-Generated Images Using Convolutional Neural Networks. 2772-2787 - Shihao Yan
, Xiangyun Zhou
, Nan (Jonas) Yang
, Thushara D. Abhayapala
, A. Lee Swindlehurst
:
Secret Channel Training to Enhance Physical Layer Security With a Full-Duplex Receiver. 2788-2800 - Jianfeng Lu
, Yun Xin, Zhao Zhang, Xinwang Liu
, Kenli Li
:
Game-Theoretic Design of Optimal Two-Sided Rating Protocols for Service Exchange Dilemma in Crowdsourcing. 2801-2815 - Kousha Kalantari
, Lalitha Sankar
, Anand D. Sarwate
:
Robust Privacy-Utility Tradeoffs Under Differential Privacy and Hamming Distortion. 2816-2830 - Prosanta Gope
, Jemin Lee
, Tony Q. S. Quek
:
Lightweight and Practical Anonymous Authentication Protocol for RFID Systems Using Physically Unclonable Functions. 2831-2843 - Feng Hao
, Roberto Metere, Siamak F. Shahandashti
, Changyu Dong
:
Analyzing and Patching SPEKE in ISO/IEC. 2844-2855 - Maochao Xu, Kristin M. Schweitzer
, Raymond M. Bateman
, Shouhuai Xu
:
Modeling and Predicting Cyber Hacking Breaches. 2856-2871 - Onur Günlü
, Gerhard Kramer
:
Privacy, Secrecy, and Storage With Multiple Noisy Measurements of Identifiers. 2872-2883 - Xiang Wu
, Ran He
, Zhenan Sun
, Tieniu Tan:
A Light CNN for Deep Face Representation With Noisy Labels. 2884-2896 - Qi Zhang
, Haiqing Li, Zhenan Sun
, Tieniu Tan:
Deep Feature Fusion for Iris and Periocular Biometrics on Mobile Devices. 2897-2912 - Yuan Yang
, Zhongmin Cai
, Chunyan Wang, Junjie Zhang:
Probabilistically Inferring Attack Ramifications Using Temporal Dependence Network. 2913-2928 - Mike Burmester, Jorge Munilla
, Andrés Ortiz
:
Comments on "Unreconciled Collisions Uncover Cloning Attacks in Anonymous RFID Systems". 2929-2931
Volume 13, Number 12, December 2018
- Zijing Zhao
, Ajay Kumar
:
Improving Periocular Recognition by Explicit Attention to Critical Regions in Deep Neural Network. 2937-2952 - Heecheol Yang
, Wonjae Shin, Jungwoo Lee
:
Private Information Retrieval for Secure Distributed Storage Systems. 2953-2964 - Pang Du
, Zheyuan Sun, Huashan Chen, Jin-Hee Cho, Shouhuai Xu
:
Statistical Estimation of Malware Detection Metrics in the Absence of Ground Truth. 2965-2980 - Maël Le Treust, Leszek Szczecinski, Fabrice Labeau
:
Rate Adaptation for Secure HARQ Protocols. 2981-2994 - Zhikun Zhang
, Shibo He
, Jiming Chen
, Junshan Zhang:
REAP: An Efficient Incentive Mechanism for Reconciling Aggregation Accuracy and Individual Privacy in Crowdsensing. 2995-3007 - Ming Tang
, Pengbo Wang
, Xiaoqi Ma, Wenjie Chang, Huanguo Zhang, Guojun Peng, Jean-Luc Danger
:
An Efficient SCA Leakage Model Construction Method Under Predictable Evaluation. 3008-3018 - Hubert Ritzdorf, Claudio Soriente
, Ghassan O. Karame
, Srdjan Marinovic, Damian Gruber, Srdjan Capkun:
Toward Shared Ownership in the Cloud. 3019-3034 - Wenchang Tang
, Feng Ji
, Wee Peng Tay
:
Estimating Infection Sources in Networks Using Partial Timestamps. 3035-3049 - Kai Zhou
, Jian Ren
:
PassBio: Privacy-Preserving User-Centric Biometric Authentication. 3050-3063 - Lacey Best-Rowden
, Anil K. Jain:
Learning Face Image Quality From Human Assessments. 3064-3077 - Rong Jin, Kai Zeng
:
Secure Inductive-Coupled Near Field Communication at Physical Layer. 3078-3093 - Xu Zhang
, Edward W. Knightly:
Pilot Distortion Attack and Zero-Startup-Cost Detection in Massive MIMO Network: From Analysis to Experiments. 3094-3107 - Yonggang Huang
, Longbing Cao
, Jun Zhang
, Lei Pan
, Yuying Liu:
Exploring Feature Coupling and Model Coupling for Image Source Identification. 3108-3121 - Shih-Chun Lin
, Chien-Chi Liu, Min-Yen Hsieh, Shih-Tang Su, Wei-Ho Chung
:
Coded Quickest Classification With Applications in Bandwidth-Efficient Smart Grid Monitoring. 3122-3136 - Vincenzo Matta
, Mario Di Mauro
, Maurizio Longo
, Alfonso Farina:
Cyber-Threat Mitigation Exploiting the Birth-Death-Immigration Model. 3137-3152 - Zhe Cui
, Jianjiang Feng
, Shihao Li, Jiwen Lu
, Jie Zhou:
2-D Phase Demodulation for Deformable Fingerprint Registration. 3153-3165

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.