


default search action
IEEE Transactions on Information Forensics and Security, Volume 12
Volume 12, Number 1, January 2017
- Anderson Rocha
, Walter J. Scheirer, Christopher W. Forstall, Thiago Cavalcante, Antonio Theophilo, Bingyu Shen, Ariadne Carvalho, Efstathios Stamatatos
:
Authorship Attribution for Social Media Forensics. 5-33 - Filippo Gandino
, Renato Ferrero
, Maurizio Rebaudengo:
A Key Distribution Scheme for Mobile Wireless Sensor Networks: q-Composite. 34-47 - Zhili Zhou
, Yunlong Wang, Q. M. Jonathan Wu
, Ching-Nung Yang, Xingming Sun:
Effective and Efficient Global Context Verification for Image Copy Detection. 48-63 - Arunkumar Vijayakumar
, Vinay C. Patil
, Daniel E. Holcomb, Christof Paar, Sandip Kundu:
Physical Design Obfuscation of Hardware: A Comprehensive Investigation of Device and Logic-Level Techniques. 64-77 - Hao Yan, Jiguo Li
, Jinguang Han
, Yichen Zhang:
A Novel Efficient Remote Data Possession Checking Protocol in Cloud Storage. 78-88 - Adi Hajj-Ahmad
, Séverine Baudry, Bertrand Chupeau, Gwenaël J. Doërr
, Min Wu
:
Flicker Forensics for Camcorder Piracy. 89-100 - Miao Xie, Jiankun Hu
, Song Guo
, Albert Y. Zomaya
:
Distributed Segment-Based Anomaly Detection With Kullback-Leibler Divergence in Wireless Sensor Networks. 101-110 - Wuqiong Pan
, Fangyu Zheng, Yuan Zhao, Wen Tao Zhu
, Jiwu Jing:
An Efficient Elliptic Curve Cryptography Signature Server With GPU Acceleration. 111-122 - Thanh Hai Thai
, Rémi Cogranne
, Florent Retraint, Thi-Ngoc-Canh Doan:
JPEG Quantization Step Estimation and Its Applications to Digital Image Forensics. 123-133 - Neeti Pokhriyal
, Kshitij Tayal, Ifeoma Nwogu
, Venu Govindaraju:
Cognitive-Biometric Recognition From Language Usage: A Feasibility Study. 134-143 - Yubao Zhang
, Xin Ruan, Haining Wang
, Hui Wang, Su He:
Twitter Trends Manipulation: A First Look Inside the Security of Twitter Trending. 144-156 - Yang Hu
, Konstantinos Sirlantzis
, Gareth Howells:
Optimal Generation of Iris Codes for Iris Recognition. 157-171 - Tao Zhang
, Quanyan Zhu:
Dynamic Differential Privacy for ADMM-Based Distributed Classification Learning. 172-187 - Michail Tsikerdekis
:
Identity Deception Prevention Using Common Contribution Network Data. 188-199 - Jun Yan, Haibo He
, Xiangnan Zhong, Yufei Tang:
Q-Learning-Based Vulnerability Analysis of Smart Grid Against Sequential Topology Attacks. 200-210 - Muhammad R. A. Khandaker
, Kai-Kit Wong, Yangyang Zhang, Zhongbin Zheng:
Probabilistically Robust SWIPT for Secrecy MISOME Systems. 211-226 - Nima Tavangaran
, Holger Boche, Rafael F. Schaefer
:
Secret-Key Generation Using Compound Sources and One-Way Public Communication. 227-241 - Andrey Garnaev
, Wade Trappe:
Bargaining Over the Fair Trade-Off Between Secrecy and Throughput in OFDM Communications. 242-251
Volume 12, Number 2, February 2017
- Fawaz S. Al-Qahtani
, Yuzhen Huang, Salah Hessien, Redha M. Radaydeh, Caijun Zhong
, Hussein M. Alnuweiri:
Secrecy Analysis of MIMO Wiretap Channels With Low-Complexity Receivers Under Imperfect Channel Estimation. 257-270 - Lei Xu, Chunxiao Jiang
, Yi Qian, Youjian Zhao, Jianhua Li, Yong Ren:
Dynamic Privacy Pricing: A Multi-Armed Bandit Approach With Time-Variant Rewards. 271-285 - Jingyu Hua
, Zhenyu Shen, Sheng Zhong:
We Can Track You if You Take the Metro: Tracking Metro Riders Using Accelerometers on Smartphones. 286-297 - Wenwen Tu
, Mario Goldenbaum, Lifeng Lai
, H. Vincent Poor
:
On Simultaneously Generating Multiple Keys in a Joint Source-Channel Model. 298-308 - Bo Wang, Leibo Liu
, Chenchen Deng, Min Zhu, Shouyi Yin, Zhuoquan Zhou, Shaojun Wei:
Exploration of Benes Network in Cryptographic Processors: A Random Infection Countermeasure for Block Ciphers Against Fault Attacks. 309-322 - Mahdi Jafari Siavoshani
, Shaunak Mishra, Christina Fragouli, Suhas N. Diggavi:
Multi-Party Secret Key Agreement Over State-Dependent Wireless Broadcast Channels. 323-337 - Hassan Salmani
:
COTD: Reference-Free Hardware Trojan Detection and Recovery Based on Controllability and Observability in Gate-Level Netlist. 338-350 - Jinho Choi
:
On Channel-Aware Secure HARQ-IR. 351-362 - Aijiao Cui
, Yanhui Luo, Chip-Hong Chang
:
Static and Dynamic Obfuscations of Scan Data Against Scan-Based Side-Channel Attacks. 363-376 - Chi-Man Pun
, Cai-Ping Yan, Xiaochen Yuan
:
Image Alignment-Based Multi-Region Matching for Object-Level Tampering Detection. 377-391 - Ashref Lawgaly, Fouad Khelifi
:
Sensor Pattern Noise Estimation Based on Improved Locally Adaptive DCT Filtering and Weighted Averaging for Source Camera Identification and Verification. 392-404 - Xiaolong Guo, Raj Gautam Dutta, Yier Jin
:
Eliminating the Hardware-Software Boundary: A Proof-Carrying Approach for Trust Evaluation on Computer Systems. 405-417 - Mohamed Grissa
, Attila A. Yavuz
, Bechir Hamdaoui:
Preserving the Location Privacy of Secondary Users in Cooperative Spectrum Sensing. 418-431 - Da Luo, Rui Yang, Bin Li, Jiwu Huang
:
Detection of Double Compressed AMR Audio Using Stacked Autoencoder. 432-444 - Kamal Taha
, Paul D. Yoo
:
Using the Spanning Tree of a Criminal Network for Identifying Its Leaders. 445-453 - Debiao He
, Neeraj Kumar
, Kim-Kwang Raymond Choo
, Wei Wu:
Efficient Hierarchical Identity-Based Signature With Batch Verification for Automatic Dependent Surveillance-Broadcast System. 454-464 - Hong Zhang
, Yun Cao, Xianfeng Zhao
:
A Steganalytic Approach to Detect Motion Vector Modification Using Near-Perfect Estimation for Local Optimality. 465-478 - Bo Peng
, Wei Wang
, Jing Dong, Tieniu Tan:
Optimized 3D Lighting Environment Estimation for Image Forgery Detection. 479-494
Volume 12, Number 3, March 2017
- Wei Wang
, Kah Chan Teh
, Kwok Hung Li
:
Secrecy Throughput Maximization for MISO Multi-Eavesdropper Wiretap Channels. 505-515 - Ta-Yuan Liu, Shih-Chun Lin, Y.-W. Peter Hong
:
On the Role of Artificial Noise in Training and Data Transmission for Secret Communications. 516-531 - Tao Jiang, Xiaofeng Chen, Qianhong Wu, Jianfeng Ma, Willy Susilo
, Wenjing Lou:
Secure and Efficient Cloud Data Deduplication With Randomized Tag. 532-543 - Hyukmin Kwon, Aziz Mohaisen, Jiyoung Woo
, Yongdae Kim
, Eunjo Lee, Huy Kang Kim
:
Crime Scene Reconstruction: Online Gold Farming Network Analysis. 544-556 - Jun Zhao
:
On Resilience and Connectivity of Secure Wireless Sensor Networks Under Node Capture Attacks. 557-571 - Parthajit Mohapatra
, Chandra R. Murthy
, Jemin Lee:
On the Secrecy Capacity Region of the Two-User Symmetric Z Interference Channel With Unidirectional Transmitter Cooperation. 572-587 - Benedetta Tondi
, Pedro Comesaña Alfaro
, Fernando Pérez-González
, Mauro Barni:
Smart Detection of Line-Search Oracle Attacks. 588-603 - Long Cheng, Dinil Mon Divakaran
, Aloysius Wooi Kiak Ang, Wee-Yong Lim, Vrizlynn L. L. Thing:
FACT: A Framework for Authentication in Cloud-Based IP Traceback. 604-616 - Yiliang Liu
, Hsiao-Hwa Chen
, Liangmin Wang
:
Secrecy Capacity Analysis of Artificial Noisy MIMO Channels - An Approach Based on Ordered Eigenvalues of Wishart Matrices. 617-630 - Nir Nissim
, Aviad Cohen, Yuval Elovici:
ALDOCX: Detection of Unknown Malicious Microsoft Office Documents Using Designated Active Learning Methods Based on New Structural Feature Extraction Methodology. 631-646 - Yuhong Nan
, Zhemin Yang, Min Yang, Shunfan Zhou, Yuan Zhang, Guofei Gu, Xiaofeng Wang, Limin Sun:
Identifying User-Input Privacy in Mobile Applications at a Large Scale. 647-661 - Aiqing Zhang, Lei Wang, Xinrong Ye, Xiaodong Lin
:
Light-Weight and Robust Security-Aware D2D-Assist Data Transmission Protocol for Mobile-Health Systems. 662-675 - Yuan Zhang
, Chunxiang Xu, Xiaohui Liang, Hongwei Li, Yi Mu, Xiaojun Zhang:
Efficient Public Verification of Data Integrity for Cloud Storage Systems from Indistinguishability Obfuscation. 676-688 - Takao Murakami
, Atsunori Kanemura
, Hideitsu Hino
:
Group Sparsity Tensor Factorization for Re-Identification of Open Mobility Traces. 689-704 - Abhishek Sharma, Suresh Sundaram
:
A Novel Online Signature Verification System Based on GMM Features in a DTW Framework. 705-718 - Antitza Dantcheva
, François Brémond:
Gender Estimation Based on Smile-Dynamics. 719-729 - Diksha Golait, Neminath Hubballi
:
Detecting Anomalous Behavior in VoIP Systems: A Discrete Event System Modeling. 730-745 - Bin Dai
, Zheng Ma, Yuan Luo:
Finite State Markov Wiretap Channel With Delayed Feedback. 746-760
Volume 12, Number 4, April 2017
- Yong Yu
, Man Ho Au
, Giuseppe Ateniese, Xinyi Huang, Willy Susilo
, Yuanshun Dai, Geyong Min
:
Identity-Based Remote Data Integrity Checking With Perfect Data Privacy Preserving for Cloud Storage. 767-778 - Parth Pradhan, Parv Venkitasubramaniam
:
Stealthy Attacks in Dynamical Systems: Tradeoffs Between Utility and Detectability With Application in Anonymous Systems. 779-792 - Xufeng Lin
, Chang-Tsun Li
:
Large-Scale Image Clustering Based on Camera Fingerprints. 793-808 - Pawel Korus
, Jiwu Huang
:
Multi-Scale Analysis Strategies in PRNU-Based Tampering Localization. 809-824 - Hongbin Xu
, Li Sun
, Pinyi Ren, Qinghe Du, Yichen Wang:
Cooperative Privacy Preserving Scheme for Downlink Transmission in Multiuser Relay Networks. 825-839 - Yousof Erfani
, Ramin Pichevar, Jean Rouat:
Audio Watermarking Using Spikegram and a Two-Dictionary Approach. 840-852 - Paulo Max Gil Innocencio Reis, João Paulo Carvalho Lustosa da Costa, Ricardo Kehrle Miranda, Giovanni Del Galdo:
ESPRIT-Hilbert-Based Audio Tampering Detection With SVM Classifier for Forensic Analysis via Electrical Network Frequency. 853-864 - Le Yu, Tao Zhang
, Xiapu Luo
, Lei Xue
, Henry Chang:
Toward Automatically Generating Privacy Policy for Android Apps. 865-880 - Andrey V. Lyamin
, Elena N. Cherepovskaya
:
An Approach to Biometric Identification by Using Low-Frequency Eye Tracker. 881-891 - Matteo Ferrara
, Raffaele Cappelli, Davide Maltoni:
On the Feasibility of Creating Double-Identity Fingerprints. 892-900 - Manar Mohamed
, Babins Shrestha, Nitesh Saxena:
SMASheD: Sniffing and Manipulating Android Sensor Data for Offensive Purposes. 901-913 - Chao Chen, Yu Wang
, Jun Zhang
, Yang Xiang, Wanlei Zhou
, Geyong Min
:
Statistical Features-Based Real-Time Detection of Drifted Twitter Spam. 914-925 - Yuichi Sei
, Akihiko Ohsuga:
Differential Private Data Collection and Analysis Based on Randomized Multiple Dummies for Untrusted Mobile Crowdsensing. 926-939 - Yujue Wang, Qianhong Wu, Bo Qin
, Wenchang Shi, Robert H. Deng
, Jiankun Hu
:
Identity-Based Data Outsourcing With Comprehensive Auditing in Clouds. 940-952 - Kaiping Xue
, Yingjie Xue, Jianan Hong, Wei Li, Hao Yue, David S. L. Wei, Peilin Hong:
RAAC: Robust and Auditable Access Control With Multiple Attribute Authorities for Public Cloud Storage. 953-967 - Pardeep Kumar
, An Braeken
, Andrei V. Gurtov
, Jari H. Iinatti, Phuong Hoai Ha
:
Anonymous Secure Framework in Connected Smart Home Environments. 968-979 - Zhaohong Wang
, Sen-Ching S. Cheung
, Ying Luo:
Information-Theoretic Secure Multi-Party Computation With Collusion Deterrence. 980-995
Volume 12, Number 5, May 2017
- Jun Yu, Baopeng Zhang
, Zhengzhong Kuang, Dan Lin, Jianping Fan:
iPrivacy: Image Privacy Protection by Identifying Sensitive Objects via Deep Multi-Task Learning. 1005-1016 - Zijing Zhao, Ajay Kumar
:
Accurate Periocular Recognition Under Less Constrained Environment Using Semantics-Assisted Convolutional Neural Network. 1017-1030 - Kurt Rohloff
, David Bruce Cousins, Daniel Sumorok:
Scalable, Practical VoIP Teleconferencing With End-to-End Homomorphic Encryption. 1031-1041 - Mohamed Abouelenien
, Verónica Pérez-Rosas, Rada Mihalcea
, Mihai Burzo:
Detecting Deceptive Behavior via Integration of Discriminative Features From Multiple Modalities. 1042-1055 - Qing Yang, Paolo Gasti, Gang Zhou, Aydin Farajidavar, Kiran S. Balagani
:
On Inferring Browsing Activity on Smartphones via USB Power Analysis Side-Channel. 1056-1066 - Mustafa Al-Ani
, Fouad Khelifi
:
On the SPN Estimation in Image Forensics: A Systematic Empirical Evaluation. 1067-1081 - Yu-Chi Chen
:
Fully Incrementing Visual Cryptography From a Succinct Non-Monotonic Structure. 1082-1091 - Sikhar Patranabis
, Abhishek Chakraborty, Debdeep Mukhopadhyay, Partha Pratim Chakrabarti:
Fault Space Transformation: A Generic Approach to Counter Differential Fault Analysis and Differential Fault Intensity Analysis on AES-Like Block Ciphers. 1092-1102 - Mingshen Sun
, Xiaolei Li, John C. S. Lui, Richard T. B. Ma
, Zhenkai Liang
:
Monet: A User-Oriented Behavior-Based Malware Variants Detection System for Android. 1103-1112 - Vahid Heydari
, Sun-il Kim
, Seong-Moo Yoo:
Scalable Anti-Censorship Framework Using Moving Target Defense for Web Servers. 1113-1124 - Alberto Pedrouzo-Ulloa
, Juan Ramón Troncoso-Pastoriza
, Fernando Pérez-González
:
Number Theoretic Transforms for Secure Signal Processing. 1125-1140 - Qinyi Xu
, Yan Chen, Beibei Wang, K. J. Ray Liu
:
Radio Biometrics: Human Recognition Through a Wall. 1141-1155 - Rajiv Bagai
, Nafia Malik, Murtuza Jadliwala:
Measuring Anonymity of Pseudonymized Data After Probabilistic Background Attacks. 1156-1169 - Y.-W. Peter Hong
, Lin-Ming Huang, Hou-Tung Li:
Vector Quantization and Clustered Key Mapping for Channel-Based Secret Key Generation. 1170-1181 - Yujue Wang, Qianhong Wu, Bo Qin
, Shaohua Tang, Willy Susilo
:
Online/Offline Provable Data Possession. 1182-1194 - Gaojie Chen
, Justin P. Coon, Marco Di Renzo:
Secrecy Outage Analysis for Downlink Transmissions in the Presence of Randomly Located Eavesdroppers. 1195-1206 - Francesco G. B. De Natale, Giulia Boato
:
Detecting Morphological Filtering of Binary Images. 1207-1217 - Hiroki Okada
, Ken Umeno
:
Randomness Evaluation With the Discrete Fourier Transform Test Based on Exact Analysis of the Reference Distribution. 1218-1226 - Li Liu
, Yue Lu, Ching Y. Suen:
An Image-Based Approach to Detection of Fake Coins. 1227-1239 - Haodong Li
, Weiqi Luo
, Xiaoqing Qiu, Jiwu Huang
:
Image Forgery Localization via Integrating Tampering Possibility Maps. 1240-1252
Volume 12, Number 6, June 2017
- Quratulain Alam, Saif Ur Rehman Malik
, Adnan Akhunzada
, Kim-Kwang Raymond Choo
, Saher Tabbasum, Masoom Alam:
A Cross Tenant Access Control (CTAC) Model for Cloud Computing: Formal Specification and Verification. 1259-1268 - Li Li
, Daoyuan Li, Tegawendé F. Bissyandé, Jacques Klein
, Yves Le Traon
, David Lo
, Lorenzo Cavallaro
:
Understanding Android App Piggybacking: A Systematic Study of Malicious Code Grafting. 1269-1284 - Yifeng Zheng
, Helei Cui
, Cong Wang
, Jiantao Zhou
:
Privacy-Preserving Image Denoising From External Cloud Databases. 1285-1298 - Roberto Caldelli
, Rudy Becarelli, Irene Amerini
:
Image Origin Classification Based on Social Network Provenance. 1299-1308 - Hang Long
, Wei Xiang
, Yuli Li:
Precoding and Cooperative Jamming in Multi- Antenna Two-Way Relaying Wiretap Systems Without Eavesdropper's Channel State Information. 1309-1318 - Soumik Mondal
, Patrick Bours:
Person Identification by Keystroke Dynamics Using Pairwise User Coupling. 1319-1329 - Jianfeng Lu
, Changbing Tang, Xiang Li
, Qian Wu:
Designing Socially-Optimal Rating Protocols for Crowdsourcing Contest Dilemma. 1330-1344 - Yanzhen Ren
, Jing Yang, Jinwei Wang, Lina Wang:
AMR Steganalysis Based on Second-Order Difference of Pitch Delay. 1345-1357 - John D. Roth
, Murali Tummala, John C. McEachen, James W. Scrofani:
On Location Privacy in LTE Networks. 1358-1368 - Hua Shen
, Mingwu Zhang, Jian Shen
:
Efficient Privacy-Preserving Cube-Data Aggregation Scheme for Smart Grids. 1369-1381 - Qi Xie, Duncan S. Wong, Guilin Wang, Xiao Tan, Kefei Chen, Liming Fang:
Provably Secure Dynamic ID-Based Anonymous Two-Factor Authenticated Key Exchange Protocol With Extended Security Model. 1382-1392 - Andrew Nadeau
, Gaurav Sharma:
An Audio Watermark Designed for Efficient and Robust Resynchronization After Analog Playback. 1393-1405 - Baris Coskun
:
(Un)wisdom of Crowds: Accurately Spotting Malicious IP Clusters Using Not-So-Accurate IP Blacklists. 1406-1417 - Jordi Soria-Comas, Josep Domingo-Ferrer
, David Sánchez
, David Megías
:
Individual Differential Privacy: A Utility-Preserving Formulation of Differential Privacy Guarantees. 1418-1429 - Yu Fu
, Lu Yu, Oluwakemi Hambolu, Ilker Özçelik
, Benafsh Husain, Jingxuan Sun, Karan Sapra, Dan Du, Christopher Tate Beasley, Richard R. Brooks
:
Stealthy Domain Generation Algorithms. 1430-1443 - Yuhong Liu
, Wenqi Zhou, Hong Chen:
Efficiently Promoting Product Online Outcome: An Iterative Rating Attack Utilizing Product and Market Property. 1444-1457 - Onur Tan
, Jesús Gómez-Vilardebó
, Deniz Gündüz
:
Privacy-Cost Trade-offs in Demand-Side Management With Storage. 1458-1469 - Wei Wang
, Kah Chan Teh
, Kwok Hung Li
:
Artificial Noise Aided Physical Layer Security in Multi-Antenna Small-Cell Networks. 1470-1482 - Yunlong Mao
, Tingting Chen, Yuan Zhang, Tiancong Wang, Sheng Zhong:
Towards Privacy-Preserving Aggregation for Collaborative Spectrum Sensing. 1483-1493
Volume 12, Number 7, July 2017
- Anil K. Jain, Sunpreet S. Arora
, Kai Cao, Lacey Best-Rowden, Anjoo Bhatnagar:
Fingerprint Recognition of Young Children. 1501-1514 - Abhishek Basak
, Swarup Bhunia
, Thomas E. Tkacik, Sandip Ray:
Security Assurance for System-on-Chip Designs With Untrusted IPs. 1515-1528 - Yinxing Xue, Guozhu Meng
, Yang Liu
, Tian Huat Tan, Hongxu Chen, Jun Sun
, Jie Zhang:
Auditing Anti-Malware Tools by Evolving Android Malware and Dynamic Loading Technique. 1529-1544 - Kyung-Ah Shim
:
BASIS: A Practical Multi-User Broadcast Authentication Scheme in Wireless Sensor Networks. 1545-1554 - Ruochi Zhang
, Parv Venkitasubramaniam
:
Stealthy Control Signal Attacks in Linear Quadratic Gaussian Control Systems: Detectability Reward Tradeoff. 1555-1570 - Chun-Yi Wei, Po-Ning Chen
, Yunghsiang S. Han
, Pramod K. Varshney:
Local Threshold Design for Target Localization Using Error Correcting Codes in Wireless Sensor Networks in the Presence of Byzantine Attacks. 1571-1584 - Saeedreza Shehnepoor
, Mostafa Salehi
, Reza Farahbakhsh, Noël Crespi:
NetSpam: A Network-Based Spam Detection Framework for Reviews in Online Social Media. 1585-1595 - Kaiping Xue
, Shaohua Li, Jianan Hong, Yingjie Xue, Nenghai Yu, Peilin Hong:
Two-Cloud Secure Database for Numeric-Related SQL Range Queries With Privacy Preserving. 1596-1608 - Rui Tan
, Hoang Hai Nguyen, Yi Shyh Eddy Foo
, David K. Y. Yau, Zbigniew Kalbarczyk, Ravishankar K. Iyer, Hoay Beng Gooi
:
Modeling and Mitigating Impact of False Data Injection Attacks on Automatic Generation Control. 1609-1624 - Maxim Chernyshev
, Craig Valli
, Michael N. Johnstone:
Revisiting Urban War Nibbling: Mobile Passive Discovery of Classic Bluetooth Devices Using Ubertooth One. 1625-1636 - Hugo Proença
, João C. Neves
:
Soft Biometrics: Globally Coherent Solutions for Hair Segmentation and Style Recognition Based on Hierarchical MRFs. 1637-1645 - Tomas Larrain
, John S. Bernhard, Domingo Mery
, Kevin W. Bowyer
:
Face Recognition Using Sparse Fingerprint Classification Algorithm. 1646-1657 - Shunquan Tan
, Haojie Zhang, Bin Li, Jiwu Huang
:
Pixel-Decimation-Assisted Steganalysis of Synchronize-Embedding-Changes Steganography. 1658-1670 - Haichang Gao
, Mengyun Tang, Yi Liu, Ping Zhang, Xiyang Liu:
Research on the Security of Microsoft's Two-Layer Captcha. 1671-1685 - Gaurav Goswami, Mayank Vatsa
, Richa Singh
:
Face Verification via Learned Representation on Feature-Rich Video Frames. 1686-1698 - Alex X. Liu
, Amir R. Khakpour, Joshua W. Hulst, Zihui Ge, Dan Pei
, Jia Wang:
Firewall Fingerprinting and Denial of Firewalling Attacks. 1699-1712 - Ishan Manjani, Snigdha Tariyal, Mayank Vatsa
, Richa Singh
, Angshul Majumdar:
Detecting Silicone Mask-Based Presentation Attack via Deep Dictionary Learning. 1713-1723 - Gabriel Emile Hine
, Emanuele Maiorana
, Patrizio Campisi:
A Zero-Leakage Fuzzy Embedder From the Theoretical Formulation to Real Data. 1724-1734 - Qingyu Yang, Dou An, Rui Min, Wei Yu
, Xinyu Yang, Wei Zhao
:
On Optimal PMU Placement-Based Defense Against Data Integrity Attacks in Smart Grid. 1735-1750
Volume 12, Number 8, August 2017
- Wei Yang
, Yongbin Zhou, Yuchen Cao, Hailong Zhang, Qian Zhang, Huan Wang:
Multi-Channel Fusion Attacks. 1757-1771 - Ming Fan
, Jun Liu, Wei Wang, Haifei Li, Zhenzhou Tian, Ting Liu
:
DAPASA: Detecting Android Piggybacked Apps Through Sensitive Subgraph Analysis. 1772-1785 - Yezekael Hayel
, Quanyan Zhu:
Epidemic Protection Over Heterogeneous Networks Using Evolutionary Poisson Games. 1786-1800 - Hongbin Luo
, Zhe Chen, Jiawei Li, Athanasios V. Vasilakos
:
Preventing Distributed Denial-of-Service Flooding Attacks With Dynamic Path Identifiers. 1801-1815 - Huafeng Qin
, Mounim A. El-Yacoubi
:
Deep Representation-Based Feature Extraction and Recovering for Finger-Vein Verification. 1816-1829 - Meng Shen
, Mingwei Wei, Liehuang Zhu
, Mingzhong Wang
:
Classification of Encrypted Traffic With Second-Order Markov Chains and Application Attribute Bigrams. 1830-1843 - Vincenzo Matta
, Mario Di Mauro
, Maurizio Longo:
DDoS Attacks With Randomized Traffic Innovation: Botnet Identification Challenges and Strategies. 1844-1859 - Anselmo Ferreira
, Luca Bondi
, Luca Baroffio, Paolo Bestagini
, Jiwu Huang
, Jefersson A. dos Santos, Stefano Tubaro, Anderson Rocha
:
Data-Driven Feature Characterization Techniques for Laser Printer Attribution. 1860-1873 - Zhangjie Fu, Fengxiao Huang, Kui Ren, Jian Weng
, Cong Wang
:
Privacy-Preserving Smart Semantic Search Based on Conceptual Graphs Over Encrypted Outsourced Data. 1874-1884 - Chau-Wai Wong
, Min Wu
:
Counterfeit Detection Based on Unclonable Feature of Paper Using Mobile Camera. 1885-1899 - Frodo Kin-Sun Chan, Xiaojie Li, Adams Wai-Kin Kong
:
A Study of Distinctiveness of Skin Texture for Forensic Applications Through Comparison With Blood Vessels. 1900-1915 - Andrey Garnaev
, Wade Trappe:
Bandwidth Scanning When Facing Interference Attacks Aimed at Reducing Spectrum Opportunities. 1916-1930 - Jia Yu
, Huaqun Wang
:
Strong Key-Exposure Resilient Auditing for Secure Cloud Storage. 1931-1940 - Diego Valsesia
, Giulio Coluccia
, Tiziano Bianchi
, Enrico Magli:
User Authentication via PRNU-Based Physical Unclonable Functions. 1941-1956 - Taras Stanko, Fitria Nur Andini, Boris Skoric
:
Optimized Quantization in Zero Leakage Helper Data Systems. 1957-1966 - Samiran Bag
, Sushmita Ruj
, Kouichi Sakurai:
Bitcoin Block Withholding Attack: Analysis and Mitigation. 1967-1978 - Yu-Hao Chin, Jia-Ching Wang
, Chien-Lin Huang, Kuang-Yao Wang, Chung-Hsien Wu
:
Speaker Identification Using Discriminative Features and Sparse Representation. 1979-1987 - Brice Colombier
, Lilian Bossuet, Viktor Fischer, David Hély
:
Key Reconciliation Protocols for Error Correction of Silicon PUF Responses. 1988-2002
Volume 12, Number 9, September 2017
- Aditi Roy
, Nasir D. Memon
, Arun Ross:
MasterPrint: Exploring the Vulnerability of Partial Fingerprint-Based Authentication Systems. 2013-2025 - Shota Saito
, Yoichi Tomioka
, Hitoshi Kitazawa:
A Theoretical Framework for Estimating False Acceptance Rate of PRNU-Based Camera Identification. 2026-2035 - Mustafa Ozmen, Mustafa Cenk Gursoy
:
Secure Transmission of Delay-Sensitive Data Over Wireless Fading Channels. 2036-2051 - Ahmed A. Zewail
, Aylin Yener:
Multi-Terminal Two-Hop Untrusted-Relay Networks With Hierarchical Security Guarantees. 2052-2066 - Sunpreet S. Arora
, Anil K. Jain, Nicholas G. Paulter Jr.:
Gold Fingers: 3D Targets for Evaluating Capacitive Readers. 2067-2077 - Ester Gonzalez-Sosa
, Rubén Vera-Rodríguez
, Julian Fiérrez
, Vishal M. Patel
:
Exploring Body Shape From mmW Images for Person Recognition. 2078-2089 - Nicolas Bruneau, Claude Carlet, Sylvain Guilley
, Annelie Heuser, Emmanuel Prouff, Olivier Rioul
:
Stochastic Collision Attack. 2090-2104 - Jing Yang Koh
, Derek Leong
, Gareth W. Peters
, Ido Nevat
, Wai-Choong Wong:
Optimal Privacy-Preserving Probabilistic Routing for Wireless Networks. 2105-2114 - David Vazquez-Padin
, Fernando Pérez-González
, Pedro Comesaña Alfaro
:
A Random Matrix Approach to the Forensic Analysis of Upscaled Images. 2115-2130 - Jing (Dave) Tian, Kevin R. B. Butler
, Joseph I. Choi, Patrick D. McDaniel, Padma Krishnaswamy:
Securing ARP/NDP From the Ground Up. 2131-2143 - Cai-Ping Yan, Chi-Man Pun
:
Multi-Scale Difference Map Fusion for Tamper Localization Using Binary Ranking Hashing. 2144-2158 - Byoung-Kyong Min
, Heung-Il Suk
, Min-Hee Ahn, Min-Ho Lee
, Seong-Whan Lee:
Individual Identification Using Cognitive Electroencephalographic Neurodynamics. 2159-2167 - Bahman Moraffah, Lalitha Sankar
:
Privacy-Guaranteed Two-Agent Interactions Using Information-Theoretic Mechanisms. 2168-2183 - Adam Czajka
, Kevin W. Bowyer
, Michael Krumdick, Rosaura G. VidalMata
:
Recognition of Image-Orientation-Based Iris Spoofing. 2184-2196 - Francesco Marra
, Giovanni Poggi
, Carlo Sansone
, Luisa Verdoliva
:
Blind PRNU-Based Image Clustering for Source Identification. 2197-2211 - Vladimir I. Ivanov
, John S. Baras:
Authentication of Swipe Fingerprint Scanners. 2212-2226 - Yuan Hong
, Wen Ming Liu, Lingyu Wang:
Privacy Preserving Smart Meter Streaming Against Information Leakage of Appliance Status. 2227-2241 - Xiaohui Han
, Lianhai Wang, Chaoran Cui, Jun Ma, Shuhui Zhang:
Linking Multiple Online Identities in Criminal Investigations: A Spectral Co-Clustering Framework. 2242-2255
Volume 12, Number 10, October 2017
- Xuan Zha
, Wei Ni
, Kangfeng Zheng, Ren Ping Liu
, Xinxin Niu:
Collaborative Authentication in Decentralized Dense Mobile Networks With Key Predistribution. 2261-2275 - Ronny Merkel
, Jana Dittmann, Claus Vielhauer:
A First Public Research Collection of High-Resolution Latent Fingerprint Time Series for Short- and Long-Term Print Age Estimation. 2276-2291 - Jiajun Wen, Zhihui Lai, Zhong Ming, Wai Keung Wong
, Zuofeng Zhong:
Directional Gaussian Model for Automatic Speeding Event Detection. 2292-2307 - Tomás Denemark
, Jessica J. Fridrich:
Steganography With Multiple JPEG Images of the Same Scene. 2308-2319 - Yue Li
, Haining Wang, Kun Sun:
Personal Information in Passwords and Its Security Implications. 2320-2333 - Wei Song, Bing Wang, Qian Wang
, Chengliang Shi, Wenjing Lou, Zhiyong Peng:
Publicly Verifiable Computation of Polynomials Over Outsourced Data With Multiple Sources. 2334-2347 - Richard E. Harang, Alexander Kott
:
Burstiness of Intrusion Detection Process: Empirical Evidence and a Modeling Approach. 2348-2359 - Alireza Alaei
, Srikanta Pal, Umapada Pal, Michael Blumenstein:
An Efficient Signature Verification Method Based on an Interval Symbolic Representation and a Fuzzy Similarity Measure. 2360-2372 - Nianfeng Liu
, Jing Liu, Zhenan Sun, Tieniu Tan:
A Code-Level Approach to Heterogeneous Iris Recognition. 2373-2386 - Lingxiang Li
, Athina P. Petropulu, Zhi Chen:
MIMO Secret Communications Against an Active Eavesdropper. 2387-2401 - Jian Shen
, Jun Shen, Xiaofeng Chen, Xinyi Huang, Willy Susilo
:
An Efficient Public Auditing Protocol With Novel Dynamic Structure for Cloud Data. 2402-2415 - Yier Jin
, Xiaolong Guo, Raj Gautam Dutta, Mohammad-Mahdi Bidmeshki, Yiorgos Makris
:
Data Secrecy Protection Through Information Flow Tracking in Proof-Carrying Hardware IP - Part I: Framework Fundamentals. 2416-2429 - Mohammad-Mahdi Bidmeshki, Xiaolong Guo, Raj Gautam Dutta, Yier Jin
, Yiorgos Makris
:
Data Secrecy Protection Through Information Flow Tracking in Proof-Carrying Hardware IP - Part II: Framework Automation. 2430-2443 - Wei Tong
, Jingyu Hua
, Sheng Zhong:
A Jointly Differentially Private Scheduling Protocol for Ridesharing Services. 2444-2456 - Irene Amerini
, Rudy Becarelli, Roberto Caldelli
, Alessio Melani, Moreno Niccolai:
Smartphone Fingerprinting Combining Features of On-Board Sensors. 2457-2466 - Girish Revadigar
, Chitra Javali, Weitao Xu
, Athanasios V. Vasilakos
, Wen Hu
, Sanjay Jha
:
Accelerometer and Fuzzy Vault-Based Secure Group Key Generation and Sharing Protocol for Smart Wearables. 2467-2482 - Bahman Rashidi
, Carol J. Fung, Elisa Bertino:
A Collaborative DDoS Defence Framework Using Network Function Virtualization. 2483-2497
Volume 12, Number 11, November 2017
- Md. Tauhid Bin Iqbal, Mohammad Shoyaib, Byungyong Ryu, Mohammad Abdullah-Al-Wadud
, Oksam Chae:
Directional Age-Primitive Pattern (DAPP) for Human Age Group Recognition and Age Estimation. 2505-2517 - Kai Zhou
, M. H. Afifi, Jian Ren
:
ExpSOS: Secure and Verifiable Outsourcing of Exponentiation Operations for Mobile Cloud Computing. 2518-2531 - Sushil Jajodia
, Noseong Park, Fabio Pierazzi
, Andrea Pugliese
, Edoardo Serra
, Gerardo I. Simari, V. S. Subrahmanian:
A Probabilistic Logic of Cyber Deception. 2532-2544 - Jian Ye, Jiangqun Ni
, Yang Yi:
Deep Learning Hierarchical Representations for Image Steganalysis. 2545-2557 - Tianbo Wang
, Chunhe Xia, Zhong Li, Xiaochen Liu, Yang Xiang
:
The Spatial-Temporal Perspective: The Study of the Propagation of Modern Social Worms. 2558-2573 - Noura Alomar
, Mansour Alsaleh, Abdulrahman Alarifi:
Someone in Your Contact List: Cued Recall-Based Textual Passwords. 2574-2589 - Rui Zhang, Shuang Qiu
, Yongbin Zhou:
Further Improving Efficiency of Higher Order Masking Schemes by Decreasing Randomness Complexity. 2590-2598 - Jun Wang, Guoqing Wang
:
Quality-Specific Hand Vein Recognition System. 2599-2610 - Elena Veronica Belmega
, Arsenia Chorti
:
Protecting Secret Key Generation Systems Against Jamming: Energy Harvesting and Channel Hopping Approaches. 2611-2626 - Attila Altay Yavuz
, Anand Mudgerikar, Ankush Singla, Ioannis Papapanagiotou, Elisa Bertino:
Real-Time Digital Signatures for Time-Critical Networks. 2627-2639 - Margarita Osadchy
, Julio C. Hernandez-Castro, Stuart J. Gibson, Orr Dunkelman, Daniel Pérez-Cabo:
No Bot Expects the DeepCAPTCHA! Introducing Immutable Adversarial Examples, With Applications to CAPTCHA Generation. 2640-2653 - Wenbo Zhou, Weiming Zhang
, Nenghai Yu:
A New Rule for Cost Reassignment in Adaptive Steganography. 2654-2667 - Muhammad Yasin
, Ozgur Sinanoglu
, Jeyavijayan Rajendran:
Testing the Trustworthiness of IC Testing: An Oracle-Less Attack on IC Camouflaging. 2668-2682 - Zarrin Montazeri
, Amir Houmansadr, Hossein Pishro-Nik:
Achieving Perfect Location Privacy in Wireless Devices Using Anonymization. 2683-2698 - Jinho Choi
:
Physical Layer Security for Channel-Aware Random Access With Opportunistic Jamming. 2699-2711 - Jong-Uk Hou
, Do-Gon Kim, Heung-Kyu Lee:
Blind 3D Mesh Watermarking for 3D Printed Model by Analyzing Layering Artifact. 2712-2725 - Naoise Holohan
, Douglas J. Leith
, Oliver Mason
:
Optimal Differentially Private Mechanisms for Randomised Response. 2726-2735 - Juntao Chen
, Quanyan Zhu:
Security as a Service for Cloud-Enabled Internet of Controlled Things Under Advanced Persistent Threats: A Contract Design Approach. 2736-2750 - Abdelmalik Ouamane
, Ammar Chouchane, Elhocine Boutellaa
, Mebarka Belahcene, Salah Bourennane, Abdenour Hadid:
Efficient Tensor-Based 2D+3D Face Verification. 2751-2762 - Xingliang Yuan
, Xinyu Wang
, Cong Wang
, Chenyun Yu, Sarana Nutanong:
Privacy-Preserving Similarity Joins Over Encrypted Data. 2763-2775 - Ding Wang
, Haibo Cheng, Ping Wang, Xinyi Huang, Gaopeng Jian:
Zipf's Law in Passwords. 2776-2791 - Changyu Dong
, Grigorios Loukides
:
Approximating Private Set Union/Intersection Cardinality With Logarithmic Complexity. 2792-2806 - Pan Zhou, Qian Wang
, Wei Wang, Yuchong Hu, Dapeng Wu
:
Near-Optimal and Practical Jamming-Resistant Energy-Efficient Cognitive Radio Communications. 2807-2822
Volume 12, Number 12, December 2017
- Javier Galbally
, Iwen Coisel, Ignacio Sánchez:
A New Multimodal Approach for Password Strength Estimation - Part I: Theory and Algorithms. 2829-2844 - Javier Galbally
, Iwen Coisel, Ignacio Sánchez:
A New Multimodal Approach for Password Strength Estimation - Part II: Experimental Evaluation. 2845-2860 - Zhengyu Zhu, Zheng Chu
, Ning Wang, Sai Huang, Zhongyong Wang
, Inkyu Lee:
Beamforming and Power Splitting Designs for AN-Aided Secure Multi-User MIMO SWIPT Systems. 2861-2874 - Athanasios Papadopoulos
, Toan Nguyen, Emre Durmus, Nasir D. Memon
:
IllusionPIN: Shoulder-Surfing Resistant Authentication Using Hybrid Images. 2875-2889 - Cecilia Pasquini
, Giulia Boato
, Fernando Pérez-González
:
Statistical Detection of JPEG Traces in Digital Images in Uncompressed Formats. 2890-2905 - Jeffrey Pawlick
, Quanyan Zhu:
Strategic Trust in Cloud-Enabled Cyber-Physical Systems With an Application to Glucose Control. 2906-2919 - Hua Sun
, Syed Ali Jafar
:
Optimal Download Cost of Private Information Retrieval for Arbitrary Message Length. 2920-2932 - Do-hyung Kim
, Jun Bi, Athanasios V. Vasilakos
, Ikjun Yeom:
Security of Cached Content in NDN. 2933-2944 - Tobias Senst
, Volker Eiselein, Alexander Kuhn, Thomas Sikora:
Crowd Violence Detection Using Global Motion-Compensated Lagrangian Features and Scale-Sensitive Video-Level Representation. 2945-2956 - Marcus Karlsson
, Emil Björnson
, Erik G. Larsson:
Jamming a TDD Point-to-Point Link Using Reciprocity-Based MIMO. 2957-2970 - Yuanman Li
, Jiantao Zhou
, An Cheng:
SIFT Keypoint Removal via Directed Graph Construction for Color Images. 2971-2985 - Zhangjie Fu, Xinle Wu, Qian Wang
, Kui Ren:
Enabling Central Keyword-Based Semantic Extension Search Over Encrypted Outsourced Data. 2986-2997 - Lei Zhang
:
OTIBAAGKA: A New Security Tool for Cryptographic Mix-Zone Establishment in Vehicular Ad Hoc Networks. 2998-3010 - Ming Wan
, Wenli Shang
, Peng Zeng
:
Double Behavior Characteristics for One-Class Classification Anomaly Detection in Networked Control Systems. 3011-3023 - Steven Gordon
, Xinyi Huang, Atsuko Miyaji
, Chunhua Su, Karin Sumongkayothin
, Komwut Wipusitwarakun:
Recursive Matrix Oblivious RAM: An ORAM Construction for Constrained Storage Devices. 3024-3038 - Ran Dubin
, Amit Dvir
, Ofir Pele
, Ofer Hadar
:
I Know What You Saw Last Minute - Encrypted HTTP Adaptive Video Streaming Title Classification. 3039-3049 - Haodong Li
, Weiqi Luo
, Jiwu Huang
:
Localization of Diffusion-Based Inpainting in Digital Images. 3050-3064 - Samet Taspinar, Manoranjan Mohanty
, Nasir D. Memon
:
PRNU-Based Camera Attribution From Multiple Seam-Carved Images. 3065-3080 - Chugui Xu, Ju Ren
, Yaoxue Zhang, Zhan Qin, Kui Ren:
DPPro: Differentially Private High-Dimensional Data Release via Random Projection. 3081-3093 - Lemonia Dritsoula
, Patrick Loiseau, John Musacchio:
A Game-Theoretic Analysis of Adversarial Classification. 3094-3109 - Willy Susilo
, Peng Jiang, Fuchun Guo
, Guomin Yang
, Yong Yu
, Yi Mu:
EACSIP: Extendable Access Control System With Integrity Protection for Enhancing Collaboration in the Cloud. 3110-3122 - Mauro Barni:
Farewell Message. i-ii

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.