


Остановите войну!
for scientists:


default search action
IEEE Transactions on Information Forensics and Security, Volume 18
Volume 18, 2023
- Zehua Qiao
, Yuejun Liu
, Yongbin Zhou, Jingdian Ming
, Chengbin Jin, Huizhong Li
:
Practical Public Template Attack Attacks on CRYSTALS-Dilithium With Randomness Leakages. 1-14 - Tianshan Liu
, Cong Zhang
, Kin-Man Lam
, Jun Kong
:
Decouple and Resolve: Transformer-Based Models for Online Anomaly Detection From Weakly Labeled Videos. 15-28 - Wangkun Xu
, Imad M. Jaimoukha
, Fei Teng
:
Robust Moving Target Defence Against False Data Injection Attacks in Power Grids. 29-40 - Xianting Huang
, Jing Liu
, Yingxu Lai
, Beifeng Mao
, Hongshuo Lyu
:
EEFED: Personalized Federated Learning of Execution&Evaluation Dual Network for CPS Intrusion Detection. 41-56 - Jianze Wei
, Yunlong Wang, Huaibo Huang
, Ran He
, Zhenan Sun
, Xingyu Gao
:
Contextual Measures for Iris Recognition. 57-70 - Kan Yang
, Jiangang Shu
, Ruitao Xie
:
Efficient and Provably Secure Data Selective Sharing and Acquisition in Cloud-Based Systems. 71-84 - Yucheng Yao, Nan Liu
, Wei Kang
, Chunguo Li
:
Secure Distributed Matrix Multiplication Under Arbitrary Collusion Pattern. 85-100 - Shengmin Xu
, Xinyi Huang
, Jiaming Yuan
, Yingjiu Li
, Robert H. Deng
:
Accountable and Fine-Grained Controllable Rewriting in Blockchains. 101-116 - Rémi A. Chou
:
Explicit Wiretap Channel Codes via Source Coding, Universal Hashing, and Distribution Approximation, When the Channels' Statistics are Uncertain. 117-132 - Anjith George
, Amir Mohammadi, Sébastien Marcel
:
Prepended Domain Transformer: Heterogeneous Face Recognition Without Bells and Whistles. 133-146 - Shujuan Wang, Run Liu
, Huafeng Li
, Guanqiu Qi
, Zhengtao Yu
:
Occluded Person Re-Identification via Defending Against Attacks From Obstacles. 147-161 - Baojin Ding
, Haixia Wang
, Ronghua Liang
, Yilong Zhang
, Peng Chen
:
End-to-End Surface and Internal Fingerprint Reconstruction From Optical Coherence Tomography Based on Contour Regression. 162-176 - (Withdrawn) Robust and Efficient Finger Vein Recognition Using Binarized Difference of Gabor Jet on Grid. 177-189
- Matej Vitek
, Abhijit Das, Diego Rafael Lucio
, Luiz A. Zanlorensi
, David Menotti
, Jalil Nourmohammadi-Khiarak
, Mohsen Akbari Shahpar, Meysam Asgari-Chenaghlu, Farhang Jaryani, Juan E. Tapia
, Andres Valenzuela
, Caiyong Wang
, Yunlong Wang, Zhaofeng He, Zhenan Sun
, Fadi Boutros
, Naser Damer
, Jonas Henry Grebe, Arjan Kuijper
, Kiran B. Raja
, Gourav Gupta
, Georgios Zampoukis, Lazaros T. Tsochatzidis, Ioannis Pratikakis, S. V. Aruna Kumar, B. S. Harish, Umapada Pal
, Peter Peer
, Vitomir Struc
:
Exploring Bias in Sclera Segmentation Models: A Group Evaluation Approach. 190-205 - Xiaoyan Yin
, Wanyu Lin, Kexin Sun, Chun Wei, Yanjiao Chen
:
A2S2-GNN: Rigging GNN-Based Social Status by Adversarial Attacks in Signed Social Networks. 206-220 - Zenghao Bao
, Zichang Tan
, Jun Wan
, Xibo Ma
, Guodong Guo, Zhen Lei
:
Divergence-Driven Consistency Training for Semi-Supervised Facial Age Estimation. 221-232 - Qingyang Zhang
, Jing Wu
, Hong Zhong
, Debiao He
, Jie Cui
:
Efficient Anonymous Authentication Based on Physically Unclonable Function in Industrial Internet of Things. 233-247 - Saffet Vatansever
, Ahmet Emir Dirik
, Nasir D. Memon
:
The Effect of Inverse Square Law of Light on ENF in Videos Exposed by Rolling Shutter. 248-260 - Bar Sadeh, Yujie Gu
, Itzhak Tamo
:
Bounds on the Capacity of Private Information Retrieval Over Graphs. 261-273 - Gabriele Oligeri
, Savio Sciancalepore
, Simone Raponi
, Roberto Di Pietro
:
PAST-AI: Physical-Layer Authentication of Satellite Transmitters via Deep Learning. 274-289 - Xiaotong Zhou, Debiao He
, Jianting Ning
, Min Luo
, Xinyi Huang
:
AADEC: Anonymous and Auditable Distributed Access Control for Edge Computing Services. 290-303 - Likhitha Mankali
, Lilas Alrahis
, Satwik Patnaik
, Johann Knechtel
, Ozgur Sinanoglu
:
Titan: Security Analysis of Large-Scale Hardware Obfuscation Using Graph Neural Networks. 304-318 - Mohammad Wazid
, Ashok Kumar Das
, Sachin Shetty
, Joel J. P. C. Rodrigues
, Mohsen Guizani
:
AISCM-FH: AI-Enabled Secure Communication Mechanism in Fog Computing-Based Healthcare. 319-334 - Qian Chen
, Zilong Wang
, Hongbo Wang
, Xiaodong Lin
:
FedDual: Pair-Wise Gossip Helps Federated Learning in Large Decentralized Networks. 335-350 - Shen Wang
, Zhaoyang Zhang, Guopu Zhu
, Xinpeng Zhang
, Yicong Zhou
, Jiwu Huang
:
Query-Efficient Adversarial Attack With Low Perturbation Against End-to-End Speech Recognition Systems. 351-364 - Zhuangzhuang Zhang
, Libing Wu, Chuanguo Ma, Jianxin Li
, Jing Wang, Qian Wang
, Shui Yu
:
LSFL: A Lightweight and Secure Federated Learning Scheme for Edge Computing. 365-379 - Xinliang Zhang
, Tianyun Li, Pei Gong, Xiong Zha
, Renwei Liu:
Variable-Modulation Specific Emitter Identification With Domain Adaptation. 380-395 - Hongbo Li
, Qiong Huang
, Jianye Huang
, Willy Susilo
:
Public-Key Authenticated Encryption With Keyword Search Supporting Constant Trapdoor Generation and Fast Search. 396-410 - Mee Lan Han
, Byung Il Kwak
, Huy Kang Kim
:
TOW-IDS: Intrusion Detection System Based on Three Overlapped Wavelets for Automotive Ethernet. 411-422 - Yang You
, Zuxing Li
, Tobias J. Oechtering
:
Non-Cooperative Games for Privacy-Preserving and Cost-Efficient Smart Grid Energy Management. 423-434 - Niladri B. Puhan
, Sushree Sangeeta Behera:
Holistic Feature Reconstruction-Based 3-D Attention Mechanism for Cross-Spectral Periocular Recognition. 435-448 - Kai Zhang
, Xiwen Wang
, Jianting Ning
, Xinyi Huang
:
Dual-Server Boolean Data Retrieval for Highly-Scalable Secure File Sharing Services. 449-462 - Li-Wei Chen
, Ziang Chen
, Werner Schindler
, Xianyue Zhao, Heidemarie Schmidt, Nan Du
, Ilia Polian
:
On Side-Channel Analysis of Memristive Cryptographic Circuits. 463-476 - Liad Dekel, Ilia Leybovich, Polina Zilberman, Rami Puzis
:
MABAT: A Multi-Armed Bandit Approach for Threat-Hunting. 477-490 - Yaroslav Sovyn, Volodymyr Khoma, Michal Podpora
:
Bitsliced Implementation of Non-Algebraic 8×8 Cryptographic S-Boxes Using ×86-64 Processor SIMD Instructions. 491-500 - Qingxiao Guan
, Peng Liu
, Weiming Zhang
, Wei Lu
, Xinpeng Zhang
:
Double-Layered Dual-Syndrome Trellis Codes Utilizing Channel Knowledge for Robust Steganography. 501-516 - Zhenduo Hou
, Ding Wang
:
New Observations on Zipf's Law in Passwords. 517-532 - Danjun Liu
, Pengfei Wang
, Xu Zhou
, Wei Xie, Gen Zhang, Zhenhao Luo
, Tai Yue
, Baosheng Wang:
From Release to Rebirth: Exploiting Thanos Objects in Linux Kernel. 533-548 - Georg Maringer
, Sven Puchinger
, Antonia Wachter-Zeh
:
Information- and Coding-Theoretic Analysis of the RLWE/MLWE Channel. 549-564 - Hao Zhou
, Geng Yang
, Yuxian Huang
, Hua Dai
, Yang Xiang:
Privacy-Preserving and Verifiable Federated Learning Framework for Edge Computing. 565-580 - Zhenyong Zhang
, Ruilong Deng
, Youliang Tian
, Peng Cheng
, Jianfeng Ma
:
SPMA: Stealthy Physics-Manipulated Attack and Countermeasures in Cyber-Physical Smart Grid. 581-596 - Qingxuan Wang
, Ding Wang
:
Understanding Failures in Security Proofs of Multi-Factor Authentication for Mobile Devices. 597-612 - Antonio M. Larriba
, Damián López
:
How to Grant Anonymous Access. 613-625 - Nayyer Aafaq
, Naveed Akhtar
, Wei Liu
, Mubarak Shah
, Ajmal Mian
:
Language Model Agnostic Gray-Box Adversarial Attack on Image Captioning. 626-638 - Vedrana Krivokuca Hahn
, Sébastien Marcel
:
Biometric Template Protection for Neural-Network-Based Face Recognition Systems: A Survey of Methods and Evaluation Techniques. 639-666 - Amir Javadpour
, Forough Ja'fari
, Tarik Taleb
, Mohammad Shojafar
, Bin Yang
:
SCEMA: An SDN-Oriented Cost-Effective Edge-Based MTD Approach. 667-682 - Jianfei Sun
, Guowen Xu
, Tianwei Zhang
, Xuehuan Yang, Mamoun Alazab
, Robert H. Deng
:
Verifiable, Fair and Privacy-Preserving Broadcast Authorization for Flexible Data Sharing in Clouds. 683-698 - Guanghan Duan
, Hongwu Lv
, Huiqiang Wang
, Guangsheng Feng
:
Application of a Dynamic Line Graph Neural Network for Intrusion Detection With Semisupervised Learning. 699-714 - Donghoon Jeong
, Joseph H. T. Kim, Jongho Im
:
A New Global Measure to Simultaneously Evaluate Data Utility and Privacy Risk. 715-729 - Steven A. Grosz
, Anil K. Jain
:
SpoofGAN: Synthetic Fingerprint Spoof Images. 730-743 - Kanishka P. Wijewardena
, Steven A. Grosz
, Kai Cao
, Anil K. Jain
:
Fingerprint Template Invertibility: Minutiae vs. Deep Templates. 744-757 - Thao M. Dang
, Thuc Dinh Nguyen, Thang Hoang, Hyunseok Kim, Andrew Beng Jin Teoh
, Deokjai Choi
:
AVET: A Novel Transform Function to Improve Cancellable Biometrics Security. 758-772 - Mirko Marras
, Pawel Korus
, Anubhav Jain, Nasir D. Memon
:
Dictionary Attacks on Speaker Verification. 773-788 - Wei Liu
, Youwei Zhang, Yonghe Tang, Huanwei Wang, Qiang Wei
:
ALScA: A Framework for Using Auxiliary Learning Side-Channel Attacks to Model PUFs. 804-817 - Haomiao Yang
, Mengyu Ge, Kunlan Xiang, Jingwei Li
:
Using Highly Compressed Gradients in Federated Learning for Data Reconstruction Attacks. 818-830 - Jiachun Pan
, Yonglong Li, Vincent Y. F. Tan
:
Asymptotic Nash Equilibrium for the M-Ary Sequential Adversarial Hypothesis Testing Game. 831-845 - Jinshuai Yang
, Zhongliang Yang
, Jiajun Zou, Haoqin Tu
, Yongfeng Huang
:
Linguistic Steganalysis Toward Social Network. 859-871 - Hyeon-Seong Im
, Si-Hyeon Lee
:
Anti-Jamming Games in Multi-Band Wireless Ad Hoc Networks. 872-887 - Yandong Zheng
, Rongxing Lu
, Hui Zhu
, Songnian Zhang, Yunguo Guan
, Jun Shao
, Fengwei Wang, Hui Li
:
SetRkNN: Efficient and Privacy-Preserving Set Reverse kNN Query in Cloud. 888-903 - Anusha Vangala
, Ashok Kumar Das
, Ankush Mitra, Sajal K. Das
, Youngho Park
:
Blockchain-Enabled Authenticated Key Agreement Scheme for Mobile Vehicles-Assisted Precision Agricultural IoT Networks. 904-919 - Zuan Wang
, Liang Zhang
, Xiaofeng Ding
, Kim-Kwang Raymond Choo
, Hai Jin
:
A Dynamic-Efficient Structure for Secure and Verifiable Location-Based Skyline Queries. 920-935 - Songlin Hu
, Xiaohua Ge
, Yu Li, Xiaoli Chen, Xiangpeng Xie
, Dong Yue
:
Resilient Load Frequency Control of Multi-Area Power Systems Under DoS Attacks. 936-947 - Jiajun Li
, Pu Wang
, Long Jiao
, Zheng Yan
, Kai Zeng
, Yishan Yang
:
Security Analysis of Triangle Channel-Based Physical Layer Key Generation in Wireless Backscatter Communications. 948-964 - Keshav Sood
, Mohammad Reza Nosouhi
, Dinh Duc Nha Nguyen
, Frank Jiang, Morshed Chowdhury
, Robin Doss
:
Intrusion Detection Scheme With Dimensionality Reduction in Next Generation Networks. 965-979 - Jiacheng Tang
, Shiping Shao
, Jiguo Song, Abhishek Gupta
:
Nash Equilibrium Control Policy Against Bus-off Attacks in CAN Networks. 980-990 - Tianqing Zhu
, Dayong Ye
, Shuai Zhou, Bo Liu
, Wanlei Zhou:
Label-Only Model Inversion Attacks: Attack With the Least Information. 991-1005 - Hanxiao Chen
, Hongwei Li
, Yingzhe Wang, Meng Hao
, Guowen Xu
, Tianwei Zhang
:
PriVDT: An Efficient Two-Party Cryptographic Framework for Vertical Decision Trees. 1006-1021 - Jiaqi Zhao
, Hui Zhu
, Wei Xu
, Fengwei Wang
, Rongxing Lu
, Hui Li
:
SGBoost: An Efficient and Privacy-Preserving Vertical Federated Tree Boosting Framework. 1022-1036 - Jianhong Zhang
, Qijia Zhang
:
Comment on "Secure and Lightweight Conditional Privacy-Preserving Authentication for Securing Traffic Emergency Messages in VANETs". 1037-1038 - Changtao Miao
, Zichang Tan
, Qi Chu
, Huan Liu
, Honggang Hu, Nenghai Yu
:
F2Trans: High-Frequency Fine-Grained Transformer for Face Forgery Detection. 1039-1051 - Chengru Zhang, Xinyu Li
, Man Ho Au
:
ePoSt: Practical and Client-Friendly Proof of Storage-Time. 1052-1063 - Zhifan Xu
, Melike Baykal-Gürsoy
:
Power Allocation for Cooperative Jamming Against a Strategic Eavesdropper Over Parallel Channels. 846-858 - Chao Wang
, Zhiqiu Huang
, Shuren Qi
, Yaoshen Yu
, Guohua Shen
, Yushu Zhang
:
Shrinking the Semantic Gap: Spatial Pooling of Local Moment Invariants for Copy-Move Forgery Detection. 1064-1079 - Chenglu Jin
, Zheng Yang
, Tao Xiang
, Sridhar Adepu, Jianying Zhou:
HMACCE: Establishing Authenticated and Confidential Channel From Historical Data for Industrial Internet of Things. 1080-1094 - Gen Li
, Xianfeng Zhao
, Yun Cao
:
Forensic Symmetry for DeepFakes. 1095-1110 - Ding Xu
, Hongbo Zhu
:
Proactive Eavesdropping of Physical Layer Security Aided Suspicious Communications in Fading Channels. 1111-1126 - Zezheng Wang
, Zitong Yu
, Xun Wang, Yunxiao Qin
, Jiahong Li, Chenxu Zhao, Xin Liu
, Zhen Lei
:
Consistency Regularization for Deep Face Anti-Spoofing. 1127-1140 - Nikolay Ivanov
, Qiben Yan
, Anurag Kompalli
:
TxT: Real-Time Transaction Encapsulation for Ethereum Smart Contracts. 1141-1155 - Jiayan Shen, Peng Zeng
, Kim-Kwang Raymond Choo
, Chengju Li
:
A Certificateless Provable Data Possession Scheme for Cloud-Based EHRs. 1156-1168 - Changhee Hahn
, Hyundo Yoon
, Junbeom Hur
:
Multi-Key Similar Data Search on Encrypted Storage With Secure Pay-Per-Query. 1169-1181 - Guofu Zhang
, Lulu Zheng, Zhaopin Su
, Yifei Zeng, Guoquan Wang:
M-Sequences and Sliding Window Based Audio Watermarking Robust Against Large-Scale Cropping Attacks. 1182-1195 - Weiting Li
, Liyao Xiang
, Bin Guo
, Zhetao Li
, Xinbing Wang
:
DPlanner: A Privacy Budgeting System for Utility. 1196-1210 - Yu Yao
, Junhui Zhao
, Zeqing Li
, Xu Cheng, Lenan Wu:
Jamming and Eavesdropping Defense Scheme Based on Deep Reinforcement Learning in Autonomous Vehicle Networks. 1211-1224 - Satoshi Furutani
, Toshiki Shibahara
, Mitsuaki Akiyama
, Masaki Aida
:
Interpreting Graph-Based Sybil Detection Methods as Low-Pass Filtering. 1225-1236 - Zhenguang Liu
, Peng Qian
, Jiaxu Yang, Lingfeng Liu, Xiaojun Xu, Qinming He, Xiaosong Zhang
:
Rethinking Smart Contract Fuzzing: Fuzzing With Invocation Ordering and Important Branch Revisiting. 1237-1251 - Keyu Ji
, Bingsheng Zhang
, Tianpei Lu, Kui Ren
:
Multi-Party Private Function Evaluation for RAM. 1252-1267 - Tsung-Hsien Lin
, Ying-Shuo Lee, Fu-Chieh Chang
, J. Morris Chang, Pei-Yuan Wu
:
Protecting Sensitive Attributes by Adversarial Training Through Class-Overlapping Techniques. 1283-1294 - Zheng Zheng
, Qian Wang
, Cong Wang
, Man Zhou, Yi Zhao
, Qi Li
, Chao Shen
:
Where Are the Dots: Hardening Face Authentication on Smartphones With Unforgeable Eye Movement Patterns. 1295-1308 - Chi Xu
, Yasushi Makihara, Xiang Li
, Yasushi Yagi
:
Occlusion-Aware Human Mesh Model-Based Gait Recognition. 1309-1321 - Ziming Zhao
, Zhaoxuan Li
, Fan Zhang
, Ziqi Yang, Shuang Luo, Tingting Li, Rui Zhang
, Kui Ren
:
SAGE: Steering the Adversarial Generation of Examples With Accelerations. 789-803 - Anxiao He, Xiang Li, Jiandong Fu, Haoyu Hu, Kai Bu
, Chenlu Miao, Kui Ren
:
Hummingbird: Dynamic Path Validation With Hidden Equal-Probability Sampling. 1268-1282 - Junduan Huang
, An Zheng
, M. Saad Shakeel
, Weili Yang
, Wenxiong Kang
:
FVFSNet: Frequency-Spatial Coupling Network for Finger Vein Authentication. 1322-1334 - Cairong Zhao
, Chutian Wang, Guosheng Hu
, Haonan Chen, Chun Liu
, Jinhui Tang
:
ISTVT: Interpretable Spatial-Temporal Video Transformer for Deepfake Detection. 1335-1348 - Lefeng Zhang
, Tianqing Zhu
, Farookh Khadeer Hussain, Dayong Ye
, Wanlei Zhou:
A Game-Theoretic Method for Defending Against Advanced Persistent Threats in Cyber Systems. 1349-1364 - Haocheng Ma
, Max Panoff
, Jiaji He
, Yiqiang Zhao, Yier Jin
:
EMSim: A Fast Layout Level Electromagnetic Emanation Simulation Framework for High Accuracy Pre-Silicon Verification. 1365-1379 - Peilun Du
, Xiaolong Zheng
, Mengshi Qi, Huadong Ma
:
GaitReload: A Reloading Framework for Defending Against On-Manifold Adversarial Gait Sequences. 1380-1392 - Bin Qiu
, Wenchi Cheng
, Wei Zhang
:
Robust Multi-Beam Secure mmWave Wireless Communication for Hybrid Wiretapping Systems. 1393-1406 - Thomas Schneider
, Ajith Suresh
, Hossein Yalame
:
Comments on "Privacy-Enhanced Federated Learning Against Poisoning Adversaries". 1407-1409 - Haohao Li, JianGuo Zhang
, Zhihu Li, Juan Liu, Yuncai Wang
:
Improvement of Min-Entropy Evaluation Based on Pruning and Quantized Deep Neural Network. 1410-1420 - Shervin Rahimzadeh Arashloo
:
Unknown Face Presentation Attack Detection via Localized Learning of Multiple Kernels. 1421-1432 - Gaddisa Olani Ganfure
, Chun-Feng Wu
, Yuan-Hao Chang
, Wei-Kuan Shih
:
RTrap: Trapping and Containing Ransomware With Machine Learning. 1433-1448 - Xuhui Bu
, Wei Yu
, Yanling Yin
, Zhongsheng Hou
:
Event-Triggered Data-Driven Control for Nonlinear Systems Under Frequency-Duration-Constrained DoS Attacks. 1449-1460 - Ran Dubin
:
Content Disarm and Reconstruction of RTF Files a Zero File Trust Methodology. 1461-1472 - Haitian Zhang, Guang Hua
, Xinya Wang, Hao Jiang
, Wen Yang
:
Categorical Inference Poisoning: Verifiable Defense Against Black-Box DNN Model Stealing Without Constraining Surrogate Data and Query Times. 1473-1486 - Wei Li
, Chun Liu, Dawu Gu
, Jianning Gao, Wenqian Sun:
Statistical Differential Fault Analysis of the Saturnin Lightweight Cryptosystem in the Mobile Wireless Sensor Networks. 1487-1496 - Harishma Boyapally
, Sikhar Patranabis
, Debdeep Mukhopadhyay
:
Commitments via Physically Related Functions. 1497-1508 - Yantao Li
, Song Ruan
, Huafeng Qin
, Shaojiang Deng
, Mounim A. El-Yacoubi
:
Transformer Based Defense GAN Against Palm-Vein Adversarial Attacks. 1509-1523 - Xianbo Mo
, Shunquan Tan
, Weixuan Tang
, Bin Li
, Jiwu Huang
:
ReLOAD: Using Reinforcement Learning to Optimize Asymmetric Distortion for Additive Steganography. 1524-1538