default search action
IEEE Transactions on Information Forensics and Security, Volume 18
Volume 18, 2023
- Zehua Qiao, Yuejun Liu, Yongbin Zhou, Jingdian Ming, Chengbin Jin, Huizhong Li:
Practical Public Template Attack Attacks on CRYSTALS-Dilithium With Randomness Leakages. 1-14 - Tianshan Liu, Cong Zhang, Kin-Man Lam, Jun Kong:
Decouple and Resolve: Transformer-Based Models for Online Anomaly Detection From Weakly Labeled Videos. 15-28 - Wangkun Xu, Imad M. Jaimoukha, Fei Teng:
Robust Moving Target Defence Against False Data Injection Attacks in Power Grids. 29-40 - Xianting Huang, Jing Liu, Yingxu Lai, Beifeng Mao, Hongshuo Lyu:
EEFED: Personalized Federated Learning of Execution&Evaluation Dual Network for CPS Intrusion Detection. 41-56 - Jianze Wei, Yunlong Wang, Huaibo Huang, Ran He, Zhenan Sun, Xingyu Gao:
Contextual Measures for Iris Recognition. 57-70 - Kan Yang, Jiangang Shu, Ruitao Xie:
Efficient and Provably Secure Data Selective Sharing and Acquisition in Cloud-Based Systems. 71-84 - Yucheng Yao, Nan Liu, Wei Kang, Chunguo Li:
Secure Distributed Matrix Multiplication Under Arbitrary Collusion Pattern. 85-100 - Shengmin Xu, Xinyi Huang, Jiaming Yuan, Yingjiu Li, Robert H. Deng:
Accountable and Fine-Grained Controllable Rewriting in Blockchains. 101-116 - Rémi A. Chou:
Explicit Wiretap Channel Codes via Source Coding, Universal Hashing, and Distribution Approximation, When the Channels' Statistics are Uncertain. 117-132 - Anjith George, Amir Mohammadi, Sébastien Marcel:
Prepended Domain Transformer: Heterogeneous Face Recognition Without Bells and Whistles. 133-146 - Shujuan Wang, Run Liu, Huafeng Li, Guanqiu Qi, Zhengtao Yu:
Occluded Person Re-Identification via Defending Against Attacks From Obstacles. 147-161 - Baojin Ding, Haixia Wang, Ronghua Liang, Yilong Zhang, Peng Chen:
End-to-End Surface and Internal Fingerprint Reconstruction From Optical Coherence Tomography Based on Contour Regression. 162-176 - (Withdrawn) Robust and Efficient Finger Vein Recognition Using Binarized Difference of Gabor Jet on Grid. 177-189
- Matej Vitek, Abhijit Das, Diego Rafael Lucio, Luiz A. Zanlorensi, David Menotti, Jalil Nourmohammadi-Khiarak, Mohsen Akbari Shahpar, Meysam Asgari-Chenaghlu, Farhang Jaryani, Juan E. Tapia, Andres Valenzuela, Caiyong Wang, Yunlong Wang, Zhaofeng He, Zhenan Sun, Fadi Boutros, Naser Damer, Jonas Henry Grebe, Arjan Kuijper, Kiran B. Raja, Gourav Gupta, Georgios Zampoukis, Lazaros T. Tsochatzidis, Ioannis Pratikakis, S. V. Aruna Kumar, B. S. Harish, Umapada Pal, Peter Peer, Vitomir Struc:
Exploring Bias in Sclera Segmentation Models: A Group Evaluation Approach. 190-205 - Xiaoyan Yin, Wanyu Lin, Kexin Sun, Chun Wei, Yanjiao Chen:
A2S2-GNN: Rigging GNN-Based Social Status by Adversarial Attacks in Signed Social Networks. 206-220 - Zenghao Bao, Zichang Tan, Jun Wan, Xibo Ma, Guodong Guo, Zhen Lei:
Divergence-Driven Consistency Training for Semi-Supervised Facial Age Estimation. 221-232 - Qingyang Zhang, Jing Wu, Hong Zhong, Debiao He, Jie Cui:
Efficient Anonymous Authentication Based on Physically Unclonable Function in Industrial Internet of Things. 233-247 - Saffet Vatansever, Ahmet Emir Dirik, Nasir D. Memon:
The Effect of Inverse Square Law of Light on ENF in Videos Exposed by Rolling Shutter. 248-260 - Bar Sadeh, Yujie Gu, Itzhak Tamo:
Bounds on the Capacity of Private Information Retrieval Over Graphs. 261-273 - Gabriele Oligeri, Savio Sciancalepore, Simone Raponi, Roberto Di Pietro:
PAST-AI: Physical-Layer Authentication of Satellite Transmitters via Deep Learning. 274-289 - Xiaotong Zhou, Debiao He, Jianting Ning, Min Luo, Xinyi Huang:
AADEC: Anonymous and Auditable Distributed Access Control for Edge Computing Services. 290-303 - Likhitha Mankali, Lilas Alrahis, Satwik Patnaik, Johann Knechtel, Ozgur Sinanoglu:
Titan: Security Analysis of Large-Scale Hardware Obfuscation Using Graph Neural Networks. 304-318 - Mohammad Wazid, Ashok Kumar Das, Sachin Shetty, Joel J. P. C. Rodrigues, Mohsen Guizani:
AISCM-FH: AI-Enabled Secure Communication Mechanism in Fog Computing-Based Healthcare. 319-334 - Qian Chen, Zilong Wang, Hongbo Wang, Xiaodong Lin:
FedDual: Pair-Wise Gossip Helps Federated Learning in Large Decentralized Networks. 335-350 - Shen Wang, Zhaoyang Zhang, Guopu Zhu, Xinpeng Zhang, Yicong Zhou, Jiwu Huang:
Query-Efficient Adversarial Attack With Low Perturbation Against End-to-End Speech Recognition Systems. 351-364 - Zhuangzhuang Zhang, Libing Wu, Chuanguo Ma, Jianxin Li, Jing Wang, Qian Wang, Shui Yu:
LSFL: A Lightweight and Secure Federated Learning Scheme for Edge Computing. 365-379 - Xinliang Zhang, Tianyun Li, Pei Gong, Xiong Zha, Renwei Liu:
Variable-Modulation Specific Emitter Identification With Domain Adaptation. 380-395 - Hongbo Li, Qiong Huang, Jianye Huang, Willy Susilo:
Public-Key Authenticated Encryption With Keyword Search Supporting Constant Trapdoor Generation and Fast Search. 396-410 - Mee Lan Han, Byung Il Kwak, Huy Kang Kim:
TOW-IDS: Intrusion Detection System Based on Three Overlapped Wavelets for Automotive Ethernet. 411-422 - Yang You, Zuxing Li, Tobias J. Oechtering:
Non-Cooperative Games for Privacy-Preserving and Cost-Efficient Smart Grid Energy Management. 423-434 - Niladri B. Puhan, Sushree Sangeeta Behera:
Holistic Feature Reconstruction-Based 3-D Attention Mechanism for Cross-Spectral Periocular Recognition. 435-448 - Kai Zhang, Xiwen Wang, Jianting Ning, Xinyi Huang:
Dual-Server Boolean Data Retrieval for Highly-Scalable Secure File Sharing Services. 449-462 - Li-Wei Chen, Ziang Chen, Werner Schindler, Xianyue Zhao, Heidemarie Schmidt, Nan Du, Ilia Polian:
On Side-Channel Analysis of Memristive Cryptographic Circuits. 463-476 - Liad Dekel, Ilia Leybovich, Polina Zilberman, Rami Puzis:
MABAT: A Multi-Armed Bandit Approach for Threat-Hunting. 477-490 - Yaroslav Sovyn, Volodymyr Khoma, Michal Podpora:
Bitsliced Implementation of Non-Algebraic 8×8 Cryptographic S-Boxes Using ×86-64 Processor SIMD Instructions. 491-500 - Qingxiao Guan, Peng Liu, Weiming Zhang, Wei Lu, Xinpeng Zhang:
Double-Layered Dual-Syndrome Trellis Codes Utilizing Channel Knowledge for Robust Steganography. 501-516 - Zhenduo Hou, Ding Wang:
New Observations on Zipf's Law in Passwords. 517-532 - Danjun Liu, Pengfei Wang, Xu Zhou, Wei Xie, Gen Zhang, Zhenhao Luo, Tai Yue, Baosheng Wang:
From Release to Rebirth: Exploiting Thanos Objects in Linux Kernel. 533-548 - Georg Maringer, Sven Puchinger, Antonia Wachter-Zeh:
Information- and Coding-Theoretic Analysis of the RLWE/MLWE Channel. 549-564 - Hao Zhou, Geng Yang, Yuxian Huang, Hua Dai, Yang Xiang:
Privacy-Preserving and Verifiable Federated Learning Framework for Edge Computing. 565-580 - Zhenyong Zhang, Ruilong Deng, Youliang Tian, Peng Cheng, Jianfeng Ma:
SPMA: Stealthy Physics-Manipulated Attack and Countermeasures in Cyber-Physical Smart Grid. 581-596 - Qingxuan Wang, Ding Wang:
Understanding Failures in Security Proofs of Multi-Factor Authentication for Mobile Devices. 597-612 - Antonio M. Larriba, Damián López:
How to Grant Anonymous Access. 613-625 - Nayyer Aafaq, Naveed Akhtar, Wei Liu, Mubarak Shah, Ajmal Mian:
Language Model Agnostic Gray-Box Adversarial Attack on Image Captioning. 626-638 - Vedrana Krivokuca Hahn, Sébastien Marcel:
Biometric Template Protection for Neural-Network-Based Face Recognition Systems: A Survey of Methods and Evaluation Techniques. 639-666 - Amir Javadpour, Forough Ja'fari, Tarik Taleb, Mohammad Shojafar, Bin Yang:
SCEMA: An SDN-Oriented Cost-Effective Edge-Based MTD Approach. 667-682 - Jianfei Sun, Guowen Xu, Tianwei Zhang, Xuehuan Yang, Mamoun Alazab, Robert H. Deng:
Verifiable, Fair and Privacy-Preserving Broadcast Authorization for Flexible Data Sharing in Clouds. 683-698 - Guanghan Duan, Hongwu Lv, Huiqiang Wang, Guangsheng Feng:
Application of a Dynamic Line Graph Neural Network for Intrusion Detection With Semisupervised Learning. 699-714 - Donghoon Jeong, Joseph H. T. Kim, Jongho Im:
A New Global Measure to Simultaneously Evaluate Data Utility and Privacy Risk. 715-729 - Steven A. Grosz, Anil K. Jain:
SpoofGAN: Synthetic Fingerprint Spoof Images. 730-743 - Kanishka P. Wijewardena, Steven A. Grosz, Kai Cao, Anil K. Jain:
Fingerprint Template Invertibility: Minutiae vs. Deep Templates. 744-757 - Thao M. Dang, Thuc Dinh Nguyen, Thang Hoang, Hyunseok Kim, Andrew Beng Jin Teoh, Deokjai Choi:
AVET: A Novel Transform Function to Improve Cancellable Biometrics Security. 758-772 - Mirko Marras, Pawel Korus, Anubhav Jain, Nasir D. Memon:
Dictionary Attacks on Speaker Verification. 773-788 - Wei Liu, Youwei Zhang, Yonghe Tang, Huanwei Wang, Qiang Wei:
ALScA: A Framework for Using Auxiliary Learning Side-Channel Attacks to Model PUFs. 804-817 - Haomiao Yang, Mengyu Ge, Kunlan Xiang, Jingwei Li:
Using Highly Compressed Gradients in Federated Learning for Data Reconstruction Attacks. 818-830 - Jiachun Pan, Yonglong Li, Vincent Y. F. Tan:
Asymptotic Nash Equilibrium for the M-Ary Sequential Adversarial Hypothesis Testing Game. 831-845 - Jinshuai Yang, Zhongliang Yang, Jiajun Zou, Haoqin Tu, Yongfeng Huang:
Linguistic Steganalysis Toward Social Network. 859-871 - Hyeon-Seong Im, Si-Hyeon Lee:
Anti-Jamming Games in Multi-Band Wireless Ad Hoc Networks. 872-887 - Yandong Zheng, Rongxing Lu, Hui Zhu, Songnian Zhang, Yunguo Guan, Jun Shao, Fengwei Wang, Hui Li:
SetRkNN: Efficient and Privacy-Preserving Set Reverse kNN Query in Cloud. 888-903 - Anusha Vangala, Ashok Kumar Das, Ankush Mitra, Sajal K. Das, Youngho Park:
Blockchain-Enabled Authenticated Key Agreement Scheme for Mobile Vehicles-Assisted Precision Agricultural IoT Networks. 904-919 - Zuan Wang, Liang Zhang, Xiaofeng Ding, Kim-Kwang Raymond Choo, Hai Jin:
A Dynamic-Efficient Structure for Secure and Verifiable Location-Based Skyline Queries. 920-935 - Songlin Hu, Xiaohua Ge, Yu Li, Xiaoli Chen, Xiangpeng Xie, Dong Yue:
Resilient Load Frequency Control of Multi-Area Power Systems Under DoS Attacks. 936-947 - Jiajun Li, Pu Wang, Long Jiao, Zheng Yan, Kai Zeng, Yishan Yang:
Security Analysis of Triangle Channel-Based Physical Layer Key Generation in Wireless Backscatter Communications. 948-964 - Keshav Sood, Mohammad Reza Nosouhi, Dinh Duc Nha Nguyen, Frank Jiang, Morshed Chowdhury, Robin Doss:
Intrusion Detection Scheme With Dimensionality Reduction in Next Generation Networks. 965-979 - Jiacheng Tang, Shiping Shao, Jiguo Song, Abhishek Gupta:
Nash Equilibrium Control Policy Against Bus-off Attacks in CAN Networks. 980-990 - Tianqing Zhu, Dayong Ye, Shuai Zhou, Bo Liu, Wanlei Zhou:
Label-Only Model Inversion Attacks: Attack With the Least Information. 991-1005 - Hanxiao Chen, Hongwei Li, Yingzhe Wang, Meng Hao, Guowen Xu, Tianwei Zhang:
PriVDT: An Efficient Two-Party Cryptographic Framework for Vertical Decision Trees. 1006-1021 - Jiaqi Zhao, Hui Zhu, Wei Xu, Fengwei Wang, Rongxing Lu, Hui Li:
SGBoost: An Efficient and Privacy-Preserving Vertical Federated Tree Boosting Framework. 1022-1036 - Jianhong Zhang, Qijia Zhang:
Comment on "Secure and Lightweight Conditional Privacy-Preserving Authentication for Securing Traffic Emergency Messages in VANETs". 1037-1038 - Changtao Miao, Zichang Tan, Qi Chu, Huan Liu, Honggang Hu, Nenghai Yu:
F2Trans: High-Frequency Fine-Grained Transformer for Face Forgery Detection. 1039-1051 - Chengru Zhang, Xinyu Li, Man Ho Au:
ePoSt: Practical and Client-Friendly Proof of Storage-Time. 1052-1063 - Zhifan Xu, Melike Baykal-Gürsoy:
Power Allocation for Cooperative Jamming Against a Strategic Eavesdropper Over Parallel Channels. 846-858 - Chao Wang, Zhiqiu Huang, Shuren Qi, Yaoshen Yu, Guohua Shen, Yushu Zhang:
Shrinking the Semantic Gap: Spatial Pooling of Local Moment Invariants for Copy-Move Forgery Detection. 1064-1079 - Chenglu Jin, Zheng Yang, Tao Xiang, Sridhar Adepu, Jianying Zhou:
HMACCE: Establishing Authenticated and Confidential Channel From Historical Data for Industrial Internet of Things. 1080-1094 - Gen Li, Xianfeng Zhao, Yun Cao:
Forensic Symmetry for DeepFakes. 1095-1110 - Ding Xu, Hongbo Zhu:
Proactive Eavesdropping of Physical Layer Security Aided Suspicious Communications in Fading Channels. 1111-1126 - Zezheng Wang, Zitong Yu, Xun Wang, Yunxiao Qin, Jiahong Li, Chenxu Zhao, Xin Liu, Zhen Lei:
Consistency Regularization for Deep Face Anti-Spoofing. 1127-1140 - Nikolay Ivanov, Qiben Yan, Anurag Kompalli:
TxT: Real-Time Transaction Encapsulation for Ethereum Smart Contracts. 1141-1155 - Jiayan Shen, Peng Zeng, Kim-Kwang Raymond Choo, Chengju Li:
A Certificateless Provable Data Possession Scheme for Cloud-Based EHRs. 1156-1168 - Changhee Hahn, Hyundo Yoon, Junbeom Hur:
Multi-Key Similar Data Search on Encrypted Storage With Secure Pay-Per-Query. 1169-1181 - Guofu Zhang, Lulu Zheng, Zhaopin Su, Yifei Zeng, Guoquan Wang:
M-Sequences and Sliding Window Based Audio Watermarking Robust Against Large-Scale Cropping Attacks. 1182-1195 - Weiting Li, Liyao Xiang, Bin Guo, Zhetao Li, Xinbing Wang:
DPlanner: A Privacy Budgeting System for Utility. 1196-1210 - Yu Yao, Junhui Zhao, Zeqing Li, Xu Cheng, Lenan Wu:
Jamming and Eavesdropping Defense Scheme Based on Deep Reinforcement Learning in Autonomous Vehicle Networks. 1211-1224 - Satoshi Furutani, Toshiki Shibahara, Mitsuaki Akiyama, Masaki Aida:
Interpreting Graph-Based Sybil Detection Methods as Low-Pass Filtering. 1225-1236 - Zhenguang Liu, Peng Qian, Jiaxu Yang, Lingfeng Liu, Xiaojun Xu, Qinming He, Xiaosong Zhang:
Rethinking Smart Contract Fuzzing: Fuzzing With Invocation Ordering and Important Branch Revisiting. 1237-1251 - Keyu Ji, Bingsheng Zhang, Tianpei Lu, Kui Ren:
Multi-Party Private Function Evaluation for RAM. 1252-1267 - Tsung-Hsien Lin, Ying-Shuo Lee, Fu-Chieh Chang, J. Morris Chang, Pei-Yuan Wu:
Protecting Sensitive Attributes by Adversarial Training Through Class-Overlapping Techniques. 1283-1294 - Zheng Zheng, Qian Wang, Cong Wang, Man Zhou, Yi Zhao, Qi Li, Chao Shen:
Where Are the Dots: Hardening Face Authentication on Smartphones With Unforgeable Eye Movement Patterns. 1295-1308 - Chi Xu, Yasushi Makihara, Xiang Li, Yasushi Yagi:
Occlusion-Aware Human Mesh Model-Based Gait Recognition. 1309-1321 - Ziming Zhao, Zhaoxuan Li, Fan Zhang, Ziqi Yang, Shuang Luo, Tingting Li, Rui Zhang, Kui Ren:
SAGE: Steering the Adversarial Generation of Examples With Accelerations. 789-803 - Anxiao He, Xiang Li, Jiandong Fu, Haoyu Hu, Kai Bu, Chenlu Miao, Kui Ren:
Hummingbird: Dynamic Path Validation With Hidden Equal-Probability Sampling. 1268-1282 - Junduan Huang, An Zheng, M. Saad Shakeel, Weili Yang, Wenxiong Kang:
FVFSNet: Frequency-Spatial Coupling Network for Finger Vein Authentication. 1322-1334 - Cairong Zhao, Chutian Wang, Guosheng Hu, Haonan Chen, Chun Liu, Jinhui Tang:
ISTVT: Interpretable Spatial-Temporal Video Transformer for Deepfake Detection. 1335-1348 - Lefeng Zhang, Tianqing Zhu, Farookh Khadeer Hussain, Dayong Ye, Wanlei Zhou:
A Game-Theoretic Method for Defending Against Advanced Persistent Threats in Cyber Systems. 1349-1364 - Haocheng Ma, Max Panoff, Jiaji He, Yiqiang Zhao, Yier Jin:
EMSim: A Fast Layout Level Electromagnetic Emanation Simulation Framework for High Accuracy Pre-Silicon Verification. 1365-1379 - Peilun Du, Xiaolong Zheng, Mengshi Qi, Huadong Ma:
GaitReload: A Reloading Framework for Defending Against On-Manifold Adversarial Gait Sequences. 1380-1392 - Bin Qiu, Wenchi Cheng, Wei Zhang:
Robust Multi-Beam Secure mmWave Wireless Communication for Hybrid Wiretapping Systems. 1393-1406 - Thomas Schneider, Ajith Suresh, Hossein Yalame:
Comments on "Privacy-Enhanced Federated Learning Against Poisoning Adversaries". 1407-1409 - Haohao Li, Jianguo Zhang, Zhihu Li, Juan Liu, Yuncai Wang:
Improvement of Min-Entropy Evaluation Based on Pruning and Quantized Deep Neural Network. 1410-1420 - Shervin Rahimzadeh Arashloo:
Unknown Face Presentation Attack Detection via Localized Learning of Multiple Kernels. 1421-1432 - Gaddisa Olani Ganfure, Chun-Feng Wu, Yuan-Hao Chang, Wei-Kuan Shih:
RTrap: Trapping and Containing Ransomware With Machine Learning. 1433-1448 - Xuhui Bu, Wei Yu, Yanling Yin, Zhongsheng Hou:
Event-Triggered Data-Driven Control for Nonlinear Systems Under Frequency-Duration-Constrained DoS Attacks. 1449-1460 - Ran Dubin:
Content Disarm and Reconstruction of RTF Files a Zero File Trust Methodology. 1461-1472 - Haitian Zhang, Guang Hua, Xinya Wang, Hao Jiang, Wen Yang:
Categorical Inference Poisoning: Verifiable Defense Against Black-Box DNN Model Stealing Without Constraining Surrogate Data and Query Times. 1473-1486 - Wei Li, Chun Liu, Dawu Gu, Jianning Gao, Wenqian Sun:
Statistical Differential Fault Analysis of the Saturnin Lightweight Cryptosystem in the Mobile Wireless Sensor Networks. 1487-1496 - Harishma Boyapally, Sikhar Patranabis, Debdeep Mukhopadhyay:
Commitments via Physically Related Functions. 1497-1508 - Yantao Li, Song Ruan, Huafeng Qin, Shaojiang Deng, Mounim A. El-Yacoubi:
Transformer Based Defense GAN Against Palm-Vein Adversarial Attacks. 1509-1523 - Xianbo Mo, Shunquan Tan, Weixuan Tang, Bin Li, Jiwu Huang:
ReLOAD: Using Reinforcement Learning to Optimize Asymmetric Distortion for Additive Steganography. 1524-1538 - Zhousheng Wang, Geng Yang, Hua Dai, Chunming Rong:
Privacy-Preserving Split Learning for Large-Scaled Vision Pre-Training. 1539-1553