default search action
IEEE Transactions on Information Forensics and Security, Volume 17
Volume 17, 2022
- Aslí Bay, Zekeriya Erkin, Jaap-Henk Hoepman, Simona Samardjiska, Jelle Vos:
Practical Multi-Party Private Set Intersection Protocols. 1-15 - Ehsan Nekouei, Mohammad Pirani, Henrik Sandberg, Karl Henrik Johansson:
A Randomized Filtering Strategy Against Inference Attacks on Active Steering Control Systems. 16-27 - Guohou Shan, Boxin Zhao, James R. Clavin, Haibin Zhang, Sisi Duan:
Poligraph: Intrusion-Tolerant and Distributed Fake News Detection System. 28-41 - Juan E. Tapia, Sebastian Gonzalez, Christoph Busch:
Iris Liveness Detection Using a Cascade of Dedicated Deep Learning Networks. 42-52 - Mohammad Ragheb, Sayed Mostafa Safavi Hemami, Ali Kuhestani, Derrick Wing Kwan Ng, Lajos Hanzo:
On the Physical Layer Security of Untrusted Millimeter Wave Relaying Networks: A Stochastic Geometry Approach. 53-68 - Yang Liu, Zhuo Ma, Ximeng Liu, Siqi Ma, Kui Ren:
Privacy-Preserving Object Detection for Medical Images With Faster R-CNN. 69-84 - Uppalapati Somalatha, Parthajit Mohapatra:
Role of Shared Key for Secure Communication Over 2-User Gaussian Z-Interference Channel. 85-98 - Yuanyu Zhang, Yulong Shen, Xiaohong Jiang, Shoji Kasahara:
Secure Millimeter-Wave Ad Hoc Communications Using Physical Layer Security. 99-114 - Dongming Wu, Mang Ye, Gaojie Lin, Xin Gao, Jianbing Shen:
Person Re-Identification by Context-Aware Part Attention and Multi-Head Collaborative Learning. 115-126 - Vítor Albiero, Kai Zhang, Michael C. King, Kevin W. Bowyer:
Gendered Differences in Face Recognition Accuracy Explained by Hairstyles, Makeup, and Facial Morphology. 127-137 - Yunpei Jia, Jie Zhang, Shiguang Shan:
Dual-Branch Meta-Learning Network With Distribution Alignment for Face Anti-Spoofing. 138-151 - Jungang Yang, Liyao Xiang, Ruidong Chen, Weiting Li, Baochun Li:
Differential Privacy for Tensor-Valued Queries. 152-164 - Amirreza Zamani, Tobias J. Oechtering, Mikael Skoglund:
Data Disclosure With Non-Zero Leakage and Non-Invertible Leakage Matrix. 165-179 - Linghui Zhou, Tobias J. Oechtering, Mikael Skoglund:
Fundamental Limits-Achieving Polar Code Designs for Biometric Identification and Authentication. 180-195 - Steven A. Grosz, Joshua J. Engelsma, Eryun Liu, Anil K. Jain:
C2CL: Contact to Contactless Fingerprint Matching. 196-210 - Guyue Li, Chen Sun, Wei Xu, Marco Di Renzo, Aiqun Hu:
On Maximizing the Sum Secret Key Rate for Reconfigurable Intelligent Surface-Assisted Multiuser Systems. 211-225 - Yuanrong Xu, Yao Lu, Fanglin Chen, Guangming Lu, David Zhang:
High Resolution Fingerprint Retrieval Based on Pore Indexing and Graph Comparison. 226-236 - Xiaoning Liu, Bang Wu, Xingliang Yuan, Xun Yi:
Leia: A Lightweight Cryptographic Neural Network Inference System at the Edge. 237-252 - Yimeng Ge, Jiancun Fan:
Robust Secure Beamforming for Intelligent Reflecting Surface Assisted Full-Duplex MISO Systems. 253-264 - Cristiano Gratton, Naveen K. D. Venkategowda, Reza Arablouei, Stefan Werner:
Privacy-Preserved Distributed Learning With Zeroth-Order Optimization. 265-279 - Saeedreza Shehnepoor, Roberto Togneri, Wei Liu, Mohammed Bennamoun:
ScoreGAN: A Fraud Review Detector Based on Regulated GAN With Data Augmentation. 280-291 - Rossano Gaeta:
On the Impact of Pollution Attacks on Coding-Based Distributed Storage Systems. 292-302 - Wenqi Wei, Ling Liu:
Gradient Leakage Attack Resilient Deep Learning. 303-316 - Yafang Yang, Lei Zhang, Yunlei Zhao, Kim-Kwang Raymond Choo, Yan Zhang:
Privacy-Preserving Aggregation-Authentication Scheme for Safety Warning System in Fog-Cloud Based VANET. 317-331 - Ángeles Vázquez-Castro:
Asymptotically Guaranteed Anti-Jamming Spread Spectrum Random Access Without Pre-Shared Secret. 332-343 - Jianyang Gu, Weihua Chen, Hao Luo, Fan Wang, Hao Li, Wei Jiang, Weijie Mao:
Multi-View Evolutionary Training for Unsupervised Domain Adaptive Person Re-Identification. 344-356 - Mahdi Khosravy, Kazuaki Nakamura, Yuki Hirose, Naoko Nitta, Noboru Babaguchi:
Model Inversion Attack by Integration of Deep Generative Models: Privacy-Sensitive Face Generation From a Face Recognition System. 357-372 - Benoît Bonnet, Teddy Furon, Patrick Bas:
Generating Adversarial Images in Quantized Domains. 373-385 - Mang Ye, Cuiqun Chen, Jianbing Shen, Ling Shao:
Dynamic Tri-Level Relation Mining With Attentive Graph for Visible Infrared Re-Identification. 386-398 - Jiucheng Xie, Chi-Man Pun, Kin-Man Lam:
Implicit and Explicit Feature Purification for Age-Invariant Facial Representation Learning. 399-412 - Bingyao Yu, Jiwen Lu, Xiu Li, Jie Zhou:
Salience-Aware Face Presentation Attack Detection via Deep Reinforcement Learning. 413-427 - Amanda Cristina Davi Resende, Davis Railsback, Rafael Dowsley, Anderson C. A. Nascimento, Diego F. Aranha:
Fast Privacy-Preserving Text Classification Based on Secure Multiparty Computation. 428-442 - Haiwei Wu, Jiantao Zhou, Jinyu Tian, Jun Liu, Yu Qiao:
Robust Image Forgery Detection Against Transmission Over Online Social Networks. 443-456 - Mingliang Chen, Xin Liao, Min Wu:
PulseEdit: Editing Physiological Signals in Facial Videos for Privacy Protection. 457-471 - Tian Li, Huaqun Wang, Debiao He, Jia Yu:
Synchronized Provable Data Possession Based on Blockchain for Digital Twin. 472-485 - Qi Li, Xinhao Deng, Zhuotao Liu, Yuan Yang, Xiaoyue Zou, Qian Wang, Mingwei Xu, Jianping Wu:
Dynamic Network Security Function Enforcement via Joint Flow and Function Scheduling. 486-499 - Yukai Wang, Chunlei Peng, Decheng Liu, Nannan Wang, Xinbo Gao:
ForgeryNIR: Deep Face Forgery and Detection in Near-Infrared Scenario. 500-515 - Mingyang Zhang, Yang Xiao, Fu Xiong, Shuai Li, Zhiguo Cao, Zhiwen Fang, Joey Tianyi Zhou:
Person Re-Identification With Hierarchical Discriminative Spatial Aggregation. 516-530 - Zhihai Yang, Qindong Sun, Zhaoli Liu:
Three Birds With One Stone: User Intention Understanding and Influential Neighbor Disclosure for Injection Attack Detection. 531-546 - Peipeng Yu, Jianwei Fei, Zhihua Xia, Zhili Zhou, Jian Weng:
Improving Generalization by Commonality Learning in Face Forgery Detection. 547-558 - Kejun Chen, Orlando Arias, Qingxu Deng, Daniela Oliveira, Xiaolong Guo, Yier Jin:
FineDIFT: Fine-Grained Dynamic Information Flow Tracking for Data-Flow Integrity Using Coprocessor. 559-573 - Olivier Bronchain, François Durvaux, Loïc Masure, François-Xavier Standaert:
Efficient Profiled Side-Channel Analysis of Masked Implementations, Extended. 574-584 - Linsen Song, Wayne Wu, Chen Qian, Ran He, Chen Change Loy:
Everybody's Talkin': Let Me Talk as You Want. 585-598 - Pei Peng, Emina Soljanin:
Covert, Low-Delay, Coded Message Passing in Mobile (IoT) Networks. 599-611 - Mary Scott, Graham Cormode, Carsten Maple:
Aggregation and Transformation of Vector-Valued Messages in the Shuffle Model of Differential Privacy. 612-627 - Onur Dizdar, Bruno Clerckx:
Rate-Splitting Multiple Access for Communications and Jamming in Multi-Antenna Multi-Carrier Cognitive Radio Systems. 628-643 - Long Li, Yu Luo, Jing Yang, Lina Pu:
Reinforcement Learning Enabled Intelligent Energy Attack in Green IoT Networks. 644-658 - Jie Li, Camilla Hollanti:
Private and Secure Distributed Matrix Multiplication Schemes for Replicated or MDS-Coded Servers. 659-669 - Moulik Choraria, Arpan Chattopadhyay, Urbashi Mitra, Erik G. Ström:
Design of False Data Injection Attack on Distributed Process Estimation. 670-683 - Prasanna Ravi, Shivam Bhasin, Sujoy Sinha Roy, Anupam Chattopadhyay:
On Exploiting Message Leakage in (Few) NIST PQC Candidates for Practical Message Recovery Attacks. 684-699 - Rafael Salema Marques, Haider M. Al-Khateeb, Gregory Epiphaniou, Carsten Maple:
APIVADS: A Novel Privacy-Preserving Pivot Attack Detection Scheme Based on Statistical Pattern Recognition. 700-715 - Baoyao Yang, Andy Jinhua Ma, Pong C. Yuen:
Revealing Task-Relevant Model Memorization for Source-Protected Unsupervised Domain Adaptation. 716-731 - Xiaozhen Lu, Liang Xiao, Guohang Niu, Xiangyang Ji, Qian Wang:
Safe Exploration in Wireless Security: A Safe Reinforcement Learning Algorithm With Hierarchical Structure. 732-743 - Nimisha Limaye, Satwik Patnaik, Ozgur Sinanoglu:
Valkyrie: Vulnerability Assessment Tool and Attack for Provably-Secure Logic Locking Techniques. 744-759 - Guanxiong Shen, Junqing Zhang, Alan Marshall, Joseph R. Cavallaro:
Towards Scalable and Channel-Robust Radio Frequency Fingerprint Identification for LoRa. 774-787 - Xiaohui Chen, Zhiyu Hao, Lun Li, Lei Cui, Yiran Zhu, Zhenquan Ding, Yongji Liu:
CruParamer: Learning on Parameter-Augmented API Sequences for Malware Detection. 788-803 - Yanbing Ren, Xinghua Li, Yinbin Miao, Bin Luo, Jian Weng, Kim-Kwang Raymond Choo, Robert H. Deng:
Towards Privacy-Preserving Spatial Distribution Crowdsensing: A Game Theoretic Approach. 804-818 - Long Zhuo, Shunquan Tan, Bin Li, Jiwu Huang:
Self-Adversarial Training Incorporating Forgery Attention for Image Forgery Localization. 819-834 - Yang Xiao, Jianping Zeng:
Dynamically Generate Password Policy via Zipf Distribution. 835-848 - Wenjing Zhang, Bo Jiang, Ming Li, Xiaodong Lin:
Privacy-Preserving Aggregate Mobility Data Release: An Information-Theoretic Deep Reinforcement Learning Approach. 849-864 - Rizhao Cai, Zhi Li, Renjie Wan, Haoliang Li, Yongjian Hu, Alex C. Kot:
Learning Meta Pattern for Face Anti-Spoofing. 1201-1213 - Yanbin Wang, Haitao Xu, Zhenhao Guo, Zhan Qin, Kui Ren:
snWF: Website Fingerprinting Attack by Ensembling the Snapshot of Deep Learning. 1214-1226 - Jinhua Ma, Shengmin Xu, Jianting Ning, Xinyi Huang, Robert H. Deng:
Redactable Blockchain in Decentralized Setting. 1227-1242 - Shengjie Chen, Zhenhua Guo, Xiu Li, Dongliang Yang:
Query2Set: Single-to-Multiple Partial Fingerprint Recognition Based on Attention Mechanism. 1243-1253 - Zhuo Wang, Qiangchang Wang, Weihong Deng, Guodong Guo:
Learning Multi-Granularity Temporal Characteristics for Face Anti-Spoofing. 1254-1269 - Jin Yang, Qishui Zhong, Kaibo Shi, Shouming Zhong:
Co-Design of Observer-Based Fault Detection Filter and Dynamic Event-Triggered Controller for Wind Power System Under Dual Alterable DoS Attacks. 1270-1284 - Sekhar Rajendran, Zhi Sun:
RF Impairment Model-Based IoT Physical-Layer Identification for Enhanced Domain Generalization. 1285-1299 - Saba Asaad, Yifei Wu, Ali Bereyhi, Ralf R. Müller, Rafael F. Schaefer, H. Vincent Poor:
Secure Active and Passive Beamforming in IRS-Aided MIMO Systems. 1300-1315 - Rafael Padilha, Tawfiq Salem, Scott Workman, Fernanda A. Andaló, Anderson Rocha, Nathan Jacobs:
Content-Aware Detection of Temporal Metadata Manipulation. 1316-1327 - Rémi Cogranne, Quentin Giboulot, Patrick Bas:
Efficient Steganography in JPEG Images by Minimizing Performance of Optimal Detector. 1328-1343 - Ziming Yang, Jian Liang, Chaoyou Fu, Mandi Luo, Xiaoyu Zhang:
Heterogeneous Face Recognition via Face Synthesis With Identity-Attribute Disentanglement. 1344-1358 - Yang Yang, Yanjiao Chen, Fei Chen, Jing Chen:
An Efficient Identity-Based Provable Data Possession Protocol With Compressed Cloud Storage. 1359-1371 - Yulong Tian, Fnu Suya, Fengyuan Xu, David Evans:
Stealthy Backdoors as Compression Artifacts. 1372-1387 - Donghyun Yu, Ruei-Hau Hsu, Jemin Lee, Sungjin Lee:
EC-SVC: Secure CAN Bus In-Vehicle Communications With Fine-Grained Access Control Based on Edge Computing. 1388-1403 - Zhihao Shen, Shun Li, Xi Zhao, Jianhua Zou:
MMAuth: A Continuous Authentication Framework on Smartphones Using Multiple Modalities. 1450-1465 - Xinran Li, Chuan Qin, Zichi Wang, Zhenxing Qian, Xinpeng Zhang:
Unified Performance Evaluation Method for Perceptual Image Hashing. 1404-1419 - Haixia Chen, Xinyi Huang, Jianting Ning, Futai Zhang, Chao Lin:
VILS: A Verifiable Image Licensing System. 1420-1434 - Weipeng Hu, Haifeng Hu:
Domain-Private Factor Detachment Network for NIR-VIS Face Recognition. 1435-1449 - Dayong Ye, Sheng Shen, Tianqing Zhu, Bo Liu, Wanlei Zhou:
One Parameter Defense - Defending Against Data Inference Attacks via Differential Privacy. 1466-1480 - Changjie Hu, Quanzhong Li, Qi Zhang, Jiayin Qin:
Security Optimization for an AF MIMO Two-Way Relay-Assisted Cognitive Radio Nonorthogonal Multiple Access Networks With SWIPT. 1481-1496 - Rizka Widyarini Purwanto, Arindam Pal, Alan Blair, Sanjay Jha:
PhishSim: Aiding Phishing Website Detection With a Feature-Free Tool. 1497-1512 - Muyi Sun, Jian Wang, Jian Liu, Jianshu Li, Tao Chen, Zhenan Sun:
A Unified Framework for Biphasic Facial Age Translation With Noisy-Semantic Guided Generative Adversarial Networks. 1513-1527 - Jiayu Zhang, Min Li, Min-Jian Zhao, Xiaoyu Ji, Wenyuan Xu:
Multi-User Beam Training and Transmission Design for Covert Millimeter-Wave Communication. 1528-1543 - Meng Pang, Binghui Wang, Siyu Huang, Yiu-Ming Cheung, Bihan Wen:
A Unified Framework for Bidirectional Prototype Learning From Contaminated Faces Across Heterogeneous Domains. 1544-1557 - Yongzhi Wang, Xiaoyu Zhang, Yao Wu, Yulong Shen:
Enhancing Leakage Prevention for MapReduce. 1558-1572 - Xiao Yang, Mengling Liu, Man Ho Au, Xiapu Luo, Qingqing Ye:
Efficient Verifiably Encrypted ECDSA-Like Signatures and Their Applications. 1573-1582 - Bin Dai, Chong Li, Yingbin Liang, Zheng Ma, Shlomo Shamai:
Self-Secure Capacity-Achieving Feedback Schemes of Gaussian Multiple-Access Wiretap Channels With Degraded Message Sets. 1583-1596 - Peng Jiang, Baoqi Qiu, Liehuang Zhu:
Report When Malicious: Deniable and Accountable Searchable Message-Moderation System. 1597-1609 - Linfeng Liu, Zhiyuan Xi, Jiagao Wu, Jia Xu:
Noise-Based-Protection Message Dissemination Method for Insecure Opportunistic Underwater Sensor Networks. 1610-1623 - Wei Cheng, Sylvain Guilley, Jean-Luc Danger:
Information Leakage in Code-Based Masking: A Systematic Evaluation by Higher-Order Attacks. 1624-1638 - Zhuoran Ma, Jianfeng Ma, Yinbin Miao, Yingjiu Li, Robert H. Deng:
ShieldFL: Mitigating Model Poisoning Attacks in Privacy-Preserving Federated Learning. 1639-1654 - Xiuli Bi, Chao Shuai, Bo Liu, Bin Xiao, Weisheng Li, Xinbo Gao:
Privacy-Preserving Color Image Feature Extraction by Quaternion Discrete Orthogonal Moments. 1655-1668 - Mohammad Reza Nosouhi, Keshav Sood, Marthie Grobler, Robin Doss:
Towards Spoofing Resistant Next Generation IoT Networks. 1669-1683 - Alberto Cabri, Francesco Masulli, Stefano Rovetta, Grazyna Suchacka:
A Quantum-Inspired Classifier for Early Web Bot Detection. 1684-1697 - Saeid Sahraei, Amir Salman Avestimehr, Ramy E. Ali:
Info-Commit: Information-Theoretic Polynomial Commitment. 1698-1708 - Yanchu Li, Lingguang Lei, Yuewu Wang, Jiwu Jing, Quan Zhou:
TrustSAMP: Securing Streaming Music Against Multivector Attacks on ARM Platform. 1709-1724 - Yuwei Zeng, Zhicheng Liu, Xunxun Chen, Tianning Zang:
Hidden Path: Understanding the Intermediary in Malicious Redirections. 1725-1740 - Chenqi Kong, Baoliang Chen, Haoliang Li, Shiqi Wang, Anderson Rocha, Sam Kwong:
Detect and Locate: Exposing Face Manipulation by Semantic- and Noise-Level Telltales. 1741-1756 - Amish Goel, Pierre Moulin:
Fast Locally Optimal Detection of Targeted Universal Adversarial Perturbations. 1757-1770 - Kai Zhang, Zhe Jiang, Jianting Ning, Xinyi Huang:
Subversion-Resistant and Consistent Attribute-Based Keyword Search for Secure Cloud Storage. 1771-1784 - Mehmet Emre Gursoy, Ling Liu, Ka Ho Chow, Stacey Truex, Wenqi Wei:
An Adversarial Approach to Protocol Analysis and Selection in Local Differential Privacy. 1785-1799 - Sarah A. Obead, Hsuan-Yin Lin, Eirik Rosnes, Jörg Kliewer:
Private Polynomial Function Computation for Noncolluding Coded Databases. 1800-1813 - Yuanyuan Liu, Jiacheng Geng, Fanhua Shang, Weixin An, Hongying Liu, Qi Zhu, Wei Feng:
Laplacian Smoothing Stochastic ADMMs With Differential Privacy Guarantees. 1814-1826 - Yujin Huang, Chunyang Chen:
Smart App Attack: Hacking Deep Learning Models in Android Apps. 1827-1840 - Quentin Giboulot, Patrick Bas, Rémi Cogranne:
Multivariate Side-Informed Gaussian Embedding Minimizing Statistical Detectability. 1841-1854 - Navid Vafaei, Sara Zarei, Nasour Bagheri, Maria Eichlseder, Robert Primas, Hadi Soleimany:
Statistical Effective Fault Attacks: The Other Side of the Coin. 1855-1867 - Meiyan Xiao, Hongbo Li, Qiong Huang, Shui Yu, Willy Susilo:
Attribute-Based Hierarchical Access Control With Extendable Policy. 1868-1883 - Xiao Mei Zeng, Qing Liu, Jing Yun Tay, Chee Lip Gan:
Selective Staining on Non-Volatile Memory Cells for Data Retrieval. 1884-1892 - Mahdi Soleymani, Hessam Mahdavifar, Amir Salman Avestimehr:
Analog Secret Sharing With Applications to Private Distributed Learning. 1893-1904 - Hao Zhou, Geng Yang, Hua Dai, Guoxiu Liu:
PFLF: Privacy-Preserving Federated Learning Framework for Edge Computing. 1905-1918