


Остановите войну!
for scientists:


default search action
IEEE Transactions on Information Forensics and Security, Volume 16
Volume 16, 2021
- Zaiyu Pan
, Jun Wang
, Guoqing Wang
, Jihong Zhu:
Multi-Scale Deep Representation Aggregation for Vein Recognition. 1-15 - Zhi Zhang
, Yueqiang Cheng, Yansong Gao
, Surya Nepal
, Dongxi Liu, Yi Zou:
Detecting Hardware-Assisted Virtualization With Inconspicuous Features. 16-27 - Govind Mittal, Pawel Korus
, Nasir D. Memon
:
FiFTy: Large-Scale File Fragment Type Identification Using Convolutional Neural Networks. 28-41 - Tarang Chugh
, Anil K. Jain
:
Fingerprint Spoof Detector Generalization. 42-55 - Guoqing Wang
, Hu Han
, Shiguang Shan
, Xilin Chen
:
Unsupervised Adversarial Domain Adaptation for Cross-Domain Face Presentation Attack Detection. 56-69 - Weipeng Hu
, Haifeng Hu
:
Dual Adversarial Disentanglement and Deep Representation Decorrelation for NIR-VIS Face Recognition. 70-85 - Hyeonseong Jo
, Jinwoo Kim
, Phillip A. Porras, Vinod Yegneswaran, Seungwon Shin
:
GapFinder: Finding Inconsistency of Security Information From Unstructured Text. 86-99 - Wenyuan Yang
, Yuesheng Zhu
:
A Verifiable Semantic Searching Scheme by Optimal Matching Over Encrypted Data in Public Cloud. 100-115 - Dae Yon Hwang
, Bilal Taha
, Da Saem Lee, Dimitrios Hatzinakos
:
Evaluation of the Time Stability and Uniqueness in PPG-Based Biometric System. 116-130 - Shunquan Tan
, Weilong Wu, Zilong Shao, Qiushi Li
, Bin Li
, Jiwu Huang
:
CALPA-NET: Channel-Pruning-Assisted Deep Residual Network for Steganalysis of Digital Images. 131-146 - Yuwen Huang, Gongping Yang
, Kuikui Wang, Haiying Liu
, Yilong Yin
:
Learning Joint and Specific Patterns: A Unified Sparse Representation for Off-the-Person ECG Biometric Recognition. 147-160 - Zaid Abdullah
, Gaojie Chen
, Mohammed A. M. Abdullah
, Jonathon A. Chambers:
Enhanced Secrecy Performance of Multihop IoT Networks With Cooperative Hybrid-Duplex Jamming. 161-172 - Théo Taburet
, Patrick Bas
, Wadih Sawaya, Jessica J. Fridrich:
Natural Steganography in JPEG Domain With a Linear Development Pipeline. 173-186 - Ioan-Catalin Dragoi, Dinu Coltuc
:
On the Security of Reversible Data Hiding in Encrypted Images by MSB Prediction. 187-189 - Claude Carlet
, Éloi de Chérisey, Sylvain Guilley
, Selçuk Kavut, Deng Tang
:
Intrinsic Resiliency of S-Boxes Against Side-Channel Attacks-Best and Worst Scenarios. 203-218 - Lu Yang, Gongping Yang
, Xiaoming Xi
, Kun Su, Qing Chen, Yilong Yin
:
Correction to "Finger Vein Code: From Indexing to Matching". 219 - Wei Cheng
, Sylvain Guilley
, Claude Carlet
, Sihem Mesnager
, Jean-Luc Danger
:
Optimizing Inner Product Masking Scheme by a Coding Theory Approach. 220-235 - Guang Hua
, Han Liao, Qingyi Wang, Haijian Zhang
, Dengpan Ye
:
Detection of Electric Network Frequency in Audio Recordings-From Theory to Practical Detectors. 236-248 - Songze Li
, Mingchao Yu, Chien-Sheng Yang
, Amir Salman Avestimehr, Sreeram Kannan, Pramod Viswanath:
PolyShard: Coded Sharding Achieves Linearly Scaling Efficiency and Security Simultaneously. 249-261 - Guangcan Mai
, Kai Cao
, Xiangyuan Lan
, Pong C. Yuen
:
SecureFace: Face Template Protection. 262-277 - Yijun Quan
, Chang-Tsun Li
:
On Addressing the Impact of ISO Speed Upon PRNU and Forgery Detection. 190-202 - Junwei Liang
, Maode Ma
:
ECF-MRS: An Efficient and Collaborative Framework With Markov-Based Reputation Scheme for IDSs in Vehicular Networks. 278-290 - Weike You
, Hong Zhang
, Xianfeng Zhao
:
A Siamese CNN for Image Steganalysis. 291-306 - Yan Li
, Yao Cheng, Weizhi Meng
, Yingjiu Li
, Robert H. Deng
:
Designing Leakage-Resilient Password Entry on Head-Mounted Smart Wearable Glass Devices. 307-321 - Kang-Hee Cho
, Si-Hyeon Lee
:
Treating Interference as Noise Is Optimal for Covert Communication Over Interference Channels. 322-332 - Yu Wang
, Yun Cao
, Xianfeng Zhao
:
Minimizing Embedding Impact for H.264 Steganography by Progressive Trellis Coding. 333-345 - Chunlei Peng, Nannan Wang
, Jie Li, Xinbo Gao
:
Soft Semantic Representation for Cross-Domain Face Recognition. 346-360 - Anjith George
, Sébastien Marcel
:
Learning One Class Representations for Face Presentation Attack Detection Using Multi-Channel Convolutional Neural Networks. 361-375 - MyeongAh Cho
, Taeoh Kim
, Ig-Jae Kim
, Kyungjae Lee
, Sangyoun Lee
:
Relational Deep Feature Learning for Heterogeneous Face Recognition. 376-388 - Ece Naz Erdemir
, Pier Luigi Dragotti
, Deniz Gündüz
:
Privacy-Aware Time-Series Data Sharing With Deep Reinforcement Learning. 389-401 - Ye Fan
, Ang Li
, Xuewen Liao
, Victor C. M. Leung
:
Secure Interference Exploitation Precoding in MISO Wiretap Channel: Destructive Region Redefinition With Efficient Solutions. 402-417 - Changhai Ou
, Chengju Zhou
, Siew-Kei Lam
, Guiyuan Jiang
:
Multiple-Differential Mechanism for Collision-Optimized Divide-and-Conquer Attacks. 418-430 - Farshad Rostami Ghadi
, Ghosheh Abed Hodtani
:
Copula-Based Analysis of Physical Layer Security Performances Over Correlated Rayleigh Fading Channels. 431-440 - Julien Lavauzelle, Razane Tajeddine
, Ragnar Freij-Hollanti
, Camilla Hollanti
:
Private Information Retrieval Schemes With Product-Matrix MBR Codes. 441-450 - Weili Han
, Ming Xu
, Junjie Zhang
, Chuanwang Wang
, Kai Zhang, X. Sean Wang
:
TransPCFG: Transferring the Grammars From Short Passwords to Guess Long Passwords Effectively. 451-465 - Jie Tang
, Long Jiao, Kai Zeng
, Hong Wen
, Kaiyu Qin
:
Physical Layer Secure MIMO Communications Against Eavesdroppers With Arbitrary Number of Antennas. 466-481 - Liqian Liang
, Congyan Lang
, Yidong Li
, Songhe Feng
, Jian Zhao
:
Fine-Grained Facial Expression Recognition in the Wild. 482-494 - Arindam Kar, Sourav Pramanik
, Arghya Chakraborty
, Debotosh Bhattacharjee
, Edmond S. L. Ho
, Hubert P. H. Shum
:
LMZMPM: Local Modified Zernike Moment Per-Unit Mass for Robust Human Face Recognition. 495-509 - Zhaoyuan Fang
, Adam Czajka
, Kevin W. Bowyer
:
Robust Iris Presentation Attack Detection Fusing 2D and 3D Information. 510-520 - Shuai Zhao, Fenghua Li, Hongwei Li
, Rongxing Lu
, Siqi Ren, Haiyong Bao, Jianhong Lin, Song Han
:
Smart and Practical Privacy-Preserving Data Aggregation for Fog-Based Smart Grids. 521-536 - Zhihai Yang
, Qindong Sun, Yaling Zhang, Wei Wang:
Identification of Malicious Injection Attacks in Dense Rating and Co-Visitation Behaviors. 537-552 - Tiantian Zhu
, Lei Fu
, Qiang Liu
, Zi Lin
, Yan Chen, Tieming Chen:
One Cycle Attack: Fool Sensor-Based Personal Gait Authentication With Clustering. 553-568 - Dayong Ye
, Tianqing Zhu
, Sheng Shen, Wanlei Zhou
:
A Differentially Private Game Theoretic Approach for Deceiving Cyber Adversaries. 569-584 - Qian Xu
, Pinyi Ren
, A. Lee Swindlehurst
:
Rethinking Secure Precoding via Interference Exploitation: A Smart Eavesdropper Perspective. 585-600 - Bogdan Groza
, Lucian Popa
, Pal-Stefan Murvay
:
CANTO - Covert AutheNtication With Timing Channels Over Optimized Traffic Flows for CAN. 601-616 - Amit Praseed
, P. Santhi Thilagam
:
Modelling Behavioural Dynamics for Asymmetric Application Layer DDoS Detection. 617-626 - Zhe Cui
, Jianjiang Feng
, Jie Zhou:
Dense Registration and Mosaicking of Fingerprints by Training an End-to-End Network. 627-642 - Enes Altinisik
, Husrev Taha Sencar
:
Source Camera Verification for Strongly Stabilized Videos. 643-657 - Ning Wang
, Weiwei Li, Amir Alipour-Fanid
, Long Jiao
, Monireh Dabaghchian
, Kai Zeng
:
Pilot Contamination Attack Detection for 5G MmWave Grant-Free IoT Networks. 658-670 - Baojin Ding
, Haixia Wang
, Peng Chen
, Yilong Zhang
, Zhenhua Guo
, Jianjiang Feng
, Ronghua Liang
:
Surface and Internal Fingerprint Reconstruction From Optical Coherence Tomography Through Convolutional Neural Network. 685-700 - Chong Xiao Wang
, Yang Song
, Wee Peng Tay
:
Arbitrarily Strong Utility-Privacy Tradeoff in Multi-Agent Systems. 671-684 - Hanwei Zhang
, Yannis Avrithis
, Teddy Furon
, Laurent Amsaleg:
Walking on the Edge: Fast, Low-Distortion Adversarial Examples. 701-713 - Xin Ai, Honglong Chen
, Kai Lin, Zhibo Wang
, Jiguo Yu
:
Nowhere to Hide: Efficiently Identifying Probabilistic Cloning Attacks in Large-Scale RFID Systems. 714-727 - Mang Ye
, Jianbing Shen
, Ling Shao
:
Visible-Infrared Person Re-Identification via Homogeneous Augmented Tri-Modal Learning. 728-739 - Fabio Pierazzi
, Stefano Cristalli
, Danilo Bruschi, Michele Colajanni
, Mirco Marchetti
, Andrea Lanzi:
Glyph: Efficient ML-Based Detection of Heap Spraying Attacks. 740-755 - Urbi Chatterjee
, Debdeep Mukhopadhyay
, Rajat Subhra Chakraborty
:
3PAA: A Private PUF Protocol for Anonymous Authentication. 756-769 - Yiwen Gao
, Yongbin Zhou:
Side-Channel Attacks With Multi-Thread Mixed Leakage. 770-785 - Kunrui Cao
, Buhong Wang
, Haiyang Ding
, Lu Lv
, Runze Dong
, Tianhao Cheng
, Fengkui Gong
:
Improving Physical Layer Security of Uplink NOMA via Energy Harvesting Jammers. 786-799 - Hugo Proença
, Ehsan Yaghoubi, Pendar Alirezazadeh:
A Quadruplet Loss for Enforcing Semantically Coherent Embeddings in Multi-Output Classification Problems. 800-811 - Solène Bernard
, Patrick Bas, John Klein
, Tomás Pevný
:
Explicit Optimization of min max Steganographic Game. 812-823 - Linlin Zheng
, Jiakang Li
, Meng Sun
, Xiongwei Zhang
, Thomas Fang Zheng
:
When Automatic Voice Disguise Meets Automatic Speaker Verification. 824-837 - Ming Fan
, Wenying Wei, Xiaofei Xie
, Yang Liu
, Xiaohong Guan, Ting Liu
:
Can We Trust Your Explanations? Sanity Checks for Interpreters in Android Malware Analysis. 838-853 - Laurent Amsaleg
, James Bailey
, Amélie Barbe, Sarah M. Erfani
, Teddy Furon
, Michael E. Houle
, Milos Radovanovic
, Xuan Vinh Nguyen
:
High Intrinsic Dimensionality Facilitates Adversarial Attack: Theoretical Evidence. 854-865 - Kuo Wang
, Ajay Kumar
:
Periocular-Assisted Multi-Feature Collaboration for Dynamic Iris Recognition. 866-879 - Zhongliang Yang
, Si-Yu Zhang
, Yuting Hu
, Zhiwen Hu
, Yongfeng Huang
:
VAE-Stega: Linguistic Steganography Based on Variational Auto-Encoder. 880-895 - Qian Wang
, Baolin Zheng, Qi Li
, Chao Shen
, Zhongjie Ba
:
Towards Query-Efficient Adversarial Attacks Against Automatic Speech Recognition Systems. 896-908 - Zhihong Zhang
, Ruiyang Liang
, Xu Chen
, Xuexin Xu
, Guosheng Hu
, Wangmeng Zuo
, Edwin R. Hancock
:
Semi-Supervised Face Frontalization in the Wild. 909-922 - Guang Chen
, Peigen Liu
, Zhengfa Liu
, Huajin Tang
, Lin Hong, Jinhu Dong, Jörg Conradt, Alois C. Knoll
:
NeuroAED: Towards Efficient Abnormal Event Detection in Visual Surveillance With Neuromorphic Vision Sensor. 923-936 - Rizhao Cai
, Haoliang Li
, Shiqi Wang
, Changsheng Chen
, Alex C. Kot
:
DRL-FAS: A Novel Framework Based on Deep Reinforcement Learning for Face Anti-Spoofing. 937-951 - Weixuan Tang
, Bin Li
, Mauro Barni
, Jin Li
, Jiwu Huang
:
An Automatic Cost Learning Framework for Image Steganography Using Deep Reinforcement Learning. 952-967 - Guyue Li
, Chen Sun
, Eduard A. Jorswieck
, Junqing Zhang
, Aiqun Hu
, You Chen:
Sum Secret Key Rate Maximization for TDD Multi-User Massive MIMO Wireless Networks. 968-982 - Xiaofeng Jiang
, Feng Zhou
, Shuangwu Chen
, Huasen He
, Jian Yang
:
Jamming Resilient Tracking Using POMDP-Based Detection of Hidden Targets. 983-998 - Ferucio Laurentiu Tiplea
, Cristian Hristea
:
PUF Protected Variables: A Solution to RFID Security and Privacy Under Corruption With Temporary State Disclosure. 999-1013 - Mehmet Yamaç
, Mete Ahishali
, Nikolaos Passalis, Jenni Raitoharju
, Bülent Sankur
, Moncef Gabbouj
:
Multi-Level Reversible Data Anonymization via Compressive Sensing and Data Hiding. 1014-1028 - Jingyu Hua
, Zidong Zhou
, Sheng Zhong
:
Flow Misleading: Worm-Hole Attack in Software-Defined Networking via Building In-Band Covert Channel. 1029-1043 - Jiancheng Cai
, Hu Han
, Jiyun Cui, Jie Chen, Li Liu
, S. Kevin Zhou
:
Semi-Supervised Natural Face De-Occlusion. 1044-1057 - Max Hoffmann
, Falk Schellenberg
, Christof Paar
:
ARMORY: Fully Automated and Exhaustive Fault Simulation on ARM-M Binaries. 1058-1073 - Muhammad Zaid Hameed
, András György, Deniz Gündüz
:
The Best Defense Is a Good Offense: Adversarial Attacks to Avoid Modulation Detection. 1074-1087 - Jizhe Zhou
, Chi-Man Pun
:
Personal Privacy Protection via Irrelevant Faces Tracking and Pixelation in Video Live Streaming. 1088-1103 - Khurram Shahzad
, Xiangyun Zhou
:
Covert Wireless Communications Under Quasi-Static Fading With Channel Uncertainty. 1104-1116 - Yaofei Wang
, Weiming Zhang
, Weixiang Li
, Nenghai Yu
:
Non-Additive Cost Functions for JPEG Steganography Based on Block Boundary Maintenance. 1117-1130 - Chaitanya Joshi
, Jesús M. Ríos Aliaga, David Ríos Insua
:
Insider Threat Modeling: An Adversarial Risk Analysis Approach. 1131-1142 - Debayan Deb
, Anil K. Jain
:
Look Locally Infer Globally: A Generalizable Face Anti-Spoofing Approach. 1143-1157 - Kevin H. M. Cheng
, Ajay Kumar
:
Deep Feature Collaboration for Challenging 3D Finger Knuckle Identification. 1158-1173 - Qiang Zhu
, Mingliang Chen
, Chau-Wai Wong
, Min Wu
:
Adaptive Multi-Trace Carving for Robust Frequency Tracking in Forensic Applications. 1174-1189 - Onur Günlü
:
Multi-Entity and Multi-Enrollment Key Agreement With Correlated Noise. 1190-1202 - Hangjing Zhang, Yuejiang Li, Yan Chen
, H. Vicky Zhao
:
Smart Evolution for Information Diffusion Over Social Networks. 1203-1217 - Shuchao Duan
, Zhenxue Chen
, Q. M. Jonathan Wu
, Lei Cai
, Dan Lu:
Multi-Scale Gradients Self-Attention Residual Learning for Face Photo-Sketch Transformation. 1218-1230 - Shan Gu
, Jianjiang Feng
, Jiwen Lu
, Jie Zhou:
Latent Fingerprint Registration via Matching Densely Sampled Points. 1231-1244 - Yusheng Xia
, Jinshu Su
, Rongmao Chen
, Xinyi Huang
:
APGS: An Efficient Source-Accountable and Metadata-Private Protocol in the Network Layer. 1245-1260 - Xinchun Yu, Shuangqing Wei
, Yuan Luo
:
Finite Blocklength Analysis of Gaussian Random Coding in AWGN Channels Under Covert Constraint. 1261-1274 - Martin Higgins
, Fei Teng
, Thomas Parisini
:
Stealthy MTD Against Unsupervised Learning-Based Blind FDI Attacks in Power Systems. 1275-1287 - Jindan Zhang
, Rongxing Lu
, Baocang Wang
, Xu An Wang
:
Comments on "Privacy-Preserving Public Auditing Protocol for Regenerating-Code-Based Cloud Storage". 1288-1289 - Fangyuan Zhao
, Xuebin Ren
, Shusen Yang
, Qing Han, Peng Zhao
, Xinyu Yang
:
Latent Dirichlet Allocation Model Training With Differential Privacy. 1290-1305 - Veeru Talreja
, Matthew C. Valenti
, Nasser M. Nasrabadi
:
Deep Hashing for Secure Multimodal Biometrics. 1306-1321 - Yuli Yang
, Meng Ma
, Sonia Aïssa
, Lajos Hanzo
:
Physical-Layer Secret Key Generation via CQI-Mapped Spatial Modulation in Multi-Hop Wiretap Ad-Hoc Networks. 1322-1334 - Teruo M. Maruyama
, Luiz S. Oliveira, Alceu S. Britto Jr., Robert Sabourin
:
Intrapersonal Parameter Optimization for Offline Handwritten Signature Augmentation. 1335-1350 - Ville Yli-Mäyry
, Rei Ueno
, Noriyuki Miura
, Makoto Nagata
, Shivam Bhasin
, Yves Mathieu, Tarik Graba, Jean-Luc Danger
, Naofumi Homma
:
Diffusional Side-Channel Leakage From Unrolled Lightweight Block Ciphers: A Case Study of Power Analysis on PRINCE. 1351-1364 - Alireza Sepas-Moghaddam
, Ali Etemad
, Fernando Pereira
, Paulo Lobato Correia
:
Long Short-Term Memory With Gate and State Level Fusion for Light Field-Based Face Recognition. 1365-1379 - Bingyu Li
, Jingqiang Lin, Qiongxiao Wang, Ze Wang, Jiwu Jing:
Locally-Centralized Certificate Validation and its Application in Desktop Virtualization Systems. 1380-1395 - Weiyang Xu
, Chang Yuan, Shengbo Xu, Hien Quoc Ngo
, Wei Xiang
:
On Pilot Spoofing Attack in Massive MIMO Systems: Detection and Countermeasure. 1396-1409 - Qiyao Deng
, Qi Li
, Jie Cao
, Yunfan Liu
, Zhenan Sun
:
Controllable Multi-Attribute Editing of High-Resolution Face Images. 1410-1423 - Saptarshi Ghosh
, Manav R. Bhatnagar
, Walid Saad
, Bijaya K. Panigrahi
:
Defending False Data Injection on State Estimation Over Fading Wireless Channels. 1424-1439 - Xiaojun Wu
, Jinghui Zhou
, Jun Liu, Fangyi Ni, Haoqiang Fan:
Single-Shot Face Anti-Spoofing for Dual Pixel Camera. 1440-1451 - Yaoyao Zhong
, Weihong Deng
:
Towards Transferable Adversarial Attack Against Deep Face Recognition. 1452-1466 - Qihao Yin
, Jianjiang Feng
, Jiwen Lu
, Jie Zhou:
Joint Estimation of Pose and Singular Points of Fingerprints. 1467-1479 - Huafeng Li
, Yiwen Chen, Dapeng Tao
, Zhengtao Yu
, Guanqiu Qi
:
Attribute-Aligned Domain-Invariant Feature Learning for Unsupervised Domain Adaptation Person Re-Identification. 1480-1494 - Sunghwan Cho
, Gaojie Chen
, Justin P. Coon
:
Zero-Forcing Beamforming for Active and Passive Eavesdropper Mitigation in Visible Light Communication Systems. 1495-1505 - Linda Senigagliesi
, Marco Baldi
, Ennio Gambi
:
Comparison of Statistical and Machine Learning Techniques for Physical Layer Authentication. 1506-1521 - Yang You
, Zuxing Li
, Tobias J. Oechtering
:
Energy Management Strategy for Smart Meter Privacy and Cost Saving. 1522-1537 - Kun He
, Jing Chen
, Qinxi Zhou, Ruiying Du, Yang Xiang
:
Secure Dynamic Searchable Symmetric Encryption With Constant Client Storage Cost. 1538-1549 - Chang Liu
, Yulin Yang
, Xingyan Liu
, Linpu Fang, Wenxiong Kang
:
Dynamic-Hand-Gesture Authentication Dataset and Benchmark. 1550-1562