:facetid:toc:\"db/journals/tifs/tifs11.bht\"OK:facetid:toc:db/journals/tifs/tifs11.bhtZhe Liu 0001Hwajeong SeoJohann GroßschädlHowon Kim 0001Efficient Implementation of NIST-Compliant Elliptic Curve Cryptography for 8-bit AVR-Based Sensor Nodes.IEEE Trans. Inf. Forensics Secur.1171385-13972016Journal Articlesclosedjournals/tifs/0001SGK1610.1109/TIFS.2015.2491261https://doi.org/10.1109/TIFS.2015.2491261https://dblp.org/rec/journals/tifs/0001SGK16URL#3185120Andrea AbrardoMauro BarniKassem KallasBenedetta TondiA Game-Theoretic Framework for Optimum Decision Fusion in the Presence of Byzantines.IEEE Trans. Inf. Forensics Secur.1161333-13452016Journal Articlesclosedjournals/tifs/AbrardoBKT1610.1109/TIFS.2016.2526963https://doi.org/10.1109/TIFS.2016.2526963https://dblp.org/rec/journals/tifs/AbrardoBKT16URL#3185121Mohammad Al-RubaieJ. Morris ChangReconstruction Attacks Against Mobile-Based Continuous Authentication Systems in the Cloud.IEEE Trans. Inf. Forensics Secur.11122648-26632016Journal Articlesclosedjournals/tifs/Al-RubaieC1610.1109/TIFS.2016.2594132https://doi.org/10.1109/TIFS.2016.2594132https://dblp.org/rec/journals/tifs/Al-RubaieC16URL#3185122Quratulain AlamSaher TabbasumSaif Ur Rehman MalikMasoom AlamTamleek AliAdnan AkhunzadaSamee Ullah KhanAthanasios V. VasilakosRajkumar BuyyaFormal Verification of the xDAuth Protocol.IEEE Trans. Inf. Forensics Secur.1191956-19692016Journal Articlesclosedjournals/tifs/AlamTMAAAKVB1610.1109/TIFS.2016.2561909https://doi.org/10.1109/TIFS.2016.2561909https://dblp.org/rec/journals/tifs/AlamTMAAAKVB16URL#3185123Abdulmohsen AlmalawiAdil FahadZahir TariAbdullah AlamriRayed AlGhamdiAlbert Y. ZomayaAn Efficient Data-Driven Clustering Technique to Detect Attacks in SCADA Systems.IEEE Trans. Inf. Forensics Secur.115893-9062016Journal Articlesclosedjournals/tifs/AlmalawiFTAAZ1610.1109/TIFS.2015.2512522https://doi.org/10.1109/TIFS.2015.2512522https://dblp.org/rec/journals/tifs/AlmalawiFTAAZ16URL#3185124Abdollah ArastehMohammad Hassan Moradi 0001Amin JanghorbaniA Novel Method Based on Empirical Mode Decomposition for P300-Based Detection of Deception.IEEE Trans. Inf. Forensics Secur.11112584-25932016Journal Articlesclosedjournals/tifs/ArastehMJ1610.1109/TIFS.2016.2590938https://doi.org/10.1109/TIFS.2016.2590938https://dblp.org/rec/journals/tifs/ArastehMJ16URL#3185125Sunpreet S. AroraKai Cao 0001Anil K. Jain 0001Nicholas G. Paulter Jr.Design and Fabrication of 3D Fingerprint Targets.IEEE Trans. Inf. Forensics Secur.11102284-22972016Journal Articlesclosedjournals/tifs/Arora0JP1610.1109/TIFS.2016.2581306https://doi.org/10.1109/TIFS.2016.2581306https://dblp.org/rec/journals/tifs/Arora0JP16URL#3185126Zohaib Hassan AwanAbdellatif ZaidiAydin SezginOn SDoF of Multi-Receiver Wiretap Channel With Alternating CSIT.IEEE Trans. Inf. Forensics Secur.1181780-17952016Journal Articlesclosedjournals/tifs/AwanZS1610.1109/TIFS.2016.2547863https://doi.org/10.1109/TIFS.2016.2547863https://dblp.org/rec/journals/tifs/AwanZS16URL#3185127Sumeet BajajAnrin ChakrabortiRadu SionPractical Foundations of History Independence.IEEE Trans. Inf. Forensics Secur.112303-3122016Journal Articlesclosedjournals/tifs/BajajCS1610.1109/TIFS.2015.2491309https://doi.org/10.1109/TIFS.2015.2491309https://dblp.org/rec/journals/tifs/BajajCS16URL#3185128Mauro BarniBenedetta TondiSource Distinguishability Under Distortion-Limited Attack: An Optimal Transport Perspective.IEEE Trans. Inf. Forensics Secur.11102145-21592016Journal Articlesclosedjournals/tifs/BarniT1610.1109/TIFS.2016.2570739https://doi.org/10.1109/TIFS.2016.2570739https://dblp.org/rec/journals/tifs/BarniT16URL#3185129Riccardo BernardiniRoberto RinaldoAnalytic and Simulation Results about a Compact, Reliable, and Unbiased 1-bit Physically Unclonable Constant.IEEE Trans. Inf. Forensics Secur.11122804-28172016Journal Articlesclosedjournals/tifs/BernardiniR1610.1109/TIFS.2016.2599008https://doi.org/10.1109/TIFS.2016.2599008https://dblp.org/rec/journals/tifs/BernardiniR16URL#3185130Samarth BharadwajHimanshu S. BhattMayank VatsaRicha Singh 0001Domain Specific Learning for Newborn Face Recognition.IEEE Trans. Inf. Forensics Secur.1171630-16412016Journal Articlesclosedjournals/tifs/BharadwajBVS1610.1109/TIFS.2016.2538744https://doi.org/10.1109/TIFS.2016.2538744https://dblp.org/rec/journals/tifs/BharadwajBVS16URL#3185131Aparna BharatiRicha Singh 0001Mayank VatsaKevin W. BowyerDetecting Facial Retouching Using Supervised Deep Learning.IEEE Trans. Inf. Forensics Secur.1191903-19132016Journal Articlesclosedjournals/tifs/BharatiSVB1610.1109/TIFS.2016.2561898https://doi.org/10.1109/TIFS.2016.2561898https://dblp.org/rec/journals/tifs/BharatiSVB16URL#3185132Tiziano BianchiValerio BioglioEnrico MagliAnalysis of One-Time Random Projections for Privacy Preserving Compressed Sensing.IEEE Trans. Inf. Forensics Secur.112313-3272016Journal Articlesclosedjournals/tifs/BianchiBM1610.1109/TIFS.2015.2493982https://doi.org/10.1109/TIFS.2015.2493982https://dblp.org/rec/journals/tifs/BianchiBM16URL#3185133Trevor J. BihlKenneth W. Bauer Jr.Michael A. TempleFeature Selection for RF Fingerprinting With Multiple Discriminant Analysis and Using ZigBee Device Emissions.IEEE Trans. Inf. Forensics Secur.1181862-18742016Journal Articlesclosedjournals/tifs/BihlBT1610.1109/TIFS.2016.2561902https://doi.org/10.1109/TIFS.2016.2561902https://dblp.org/rec/journals/tifs/BihlBT16URL#3185134Johan de BockPatrick de SmetJPGcarve: An Advanced Tool for Automated Recovery of Fragmented JPEG Files.IEEE Trans. Inf. Forensics Secur.11119-342016Journal Articlesclosedjournals/tifs/BockS1610.1109/TIFS.2015.2475238https://doi.org/10.1109/TIFS.2015.2475238https://dblp.org/rec/journals/tifs/BockS16URL#3185135Enrico BondiPietro PalaStefano BerrettiAlberto Del BimboReconstructing High-Resolution Face Models From Kinect Depth Sequences.IEEE Trans. Inf. Forensics Secur.11122843-28532016Journal Articlesclosedjournals/tifs/BondiPBB1610.1109/TIFS.2016.2601059https://doi.org/10.1109/TIFS.2016.2601059https://dblp.org/rec/journals/tifs/BondiPBB16URL#3185136Lilian BossuetBrice ColombierComments on "A PUF-FSM Binding Scheme for FPGA IP Protection and Pay-per-Device Licensing".IEEE Trans. Inf. Forensics Secur.11112624-26252016Journal Articlesclosedjournals/tifs/BossuetC1610.1109/TIFS.2016.2553454https://doi.org/10.1109/TIFS.2016.2553454https://dblp.org/rec/journals/tifs/BossuetC16URL#3185137Zinelabidine BoulkenafetJukka KomulainenAbdenour HadidFace Spoofing Detection Using Colour Texture Analysis.IEEE Trans. Inf. Forensics Secur.1181818-18302016Journal Articlesclosedjournals/tifs/BoulkenafetKH1610.1109/TIFS.2016.2555286https://doi.org/10.1109/TIFS.2016.2555286https://dblp.org/rec/journals/tifs/BoulkenafetKH16URL#3185138José Benito CamiñaRaúl MonroyLuis A. TrejoMiguel Angel Medina-PérezTemporal and Spatial Locality: An Abstraction for Masquerade Detection.IEEE Trans. Inf. Forensics Secur.1192036-20512016Journal Articlesclosedjournals/tifs/CaminaMTM1610.1109/TIFS.2016.2571679https://doi.org/10.1109/TIFS.2016.2571679https://dblp.org/rec/journals/tifs/CaminaMTM16URL#3185139Ruohan CaoTan F. WongTiejun LvHui Gao 0001Shaoshi YangDetecting Byzantine Attacks Without Clean Reference.IEEE Trans. Inf. Forensics Secur.11122717-27312016Journal Articlesclosedjournals/tifs/CaoWLGY1610.1109/TIFS.2016.2596140https://doi.org/10.1109/TIFS.2016.2596140https://dblp.org/rec/journals/tifs/CaoWLGY16URL#3185140Tiago Jose de CarvalhoFábio Augusto FariaHélio PedriniRicardo da Silva TorresAnderson Rocha 0001Illuminant-Based Transformed Spaces for Image Forensics.IEEE Trans. Inf. Forensics Secur.114720-7332016Journal Articlesclosedjournals/tifs/CarvalhoFPTR1610.1109/TIFS.2015.2506548https://doi.org/10.1109/TIFS.2015.2506548https://dblp.org/rec/journals/tifs/CarvalhoFPTR16URL#3185141Arcangelo CastiglioneAlfredo De SantisBarbara MasucciFrancesco Palmieri 0002Aniello CastiglioneJin Li 0002Xinyi Huang 0001Hierarchical and Shared Access Control.IEEE Trans. Inf. Forensics Secur.114850-8652016Journal Articlesclosedjournals/tifs/CastiglioneSMPC1610.1109/TIFS.2015.2512533https://doi.org/10.1109/TIFS.2015.2512533https://dblp.org/rec/journals/tifs/CastiglioneSMPC16URL#3185142Arcangelo CastiglioneAlfredo De SantisBarbara MasucciFrancesco Palmieri 0002Aniello CastiglioneXinyi Huang 0001Cryptographic Hierarchical Access Control for Dynamic Structures.IEEE Trans. Inf. Forensics Secur.11102349-23642016Journal Articlesclosedjournals/tifs/CastiglioneSMPC16a10.1109/TIFS.2016.2581147https://doi.org/10.1109/TIFS.2016.2581147https://dblp.org/rec/journals/tifs/CastiglioneSMPC16aURL#3185143Luca CaviglioneMauro GaggeroJean-François LalandeWojciech MazurczykMarcin UrbanskiSeeing the Unseen: Revealing Mobile Malware Hidden Communications via Energy Consumption and Artificial Intelligence.IEEE Trans. Inf. Forensics Secur.114799-8102016Journal Articlesclosedjournals/tifs/CaviglioneGLMU1610.1109/TIFS.2015.2510825https://doi.org/10.1109/TIFS.2015.2510825https://dblp.org/rec/journals/tifs/CaviglioneGLMU16URL#3185144Yiyu Chen 0002Ayalneh Dessalegn AtnafuIsabella SchlattnerWendimagegn Tariku WeldtsadikMyung-Cheol RohHyoung Joong KimSeong-Whan LeeBenjamin BlankertzSiamac FazliA High-Security EEG-Based Login System with RSVP Stimuli and Dry Electrodes.IEEE Trans. Inf. Forensics Secur.11122635-26472016Journal Articlesclosedjournals/tifs/ChenASWRKLBF1610.1109/TIFS.2016.2577551https://doi.org/10.1109/TIFS.2016.2577551https://dblp.org/rec/journals/tifs/ChenASWRKLBF16URL#3185145Jian Chen 0028Xiaoming Chen 0001Wolfgang H. GerstackerDerrick Wing Kwan NgResource Allocation for a Massive MIMO Relay Aided Secure Communication.IEEE Trans. Inf. Forensics Secur.1181700-17112016Journal Articlesclosedjournals/tifs/ChenCGN1610.1109/TIFS.2016.2551685https://doi.org/10.1109/TIFS.2016.2551685https://dblp.org/rec/journals/tifs/ChenCGN16URL#3185146Cong ChenThomas Eisenbarth 0001Ingo von MaurichRainer SteinwandtHorizontal and Vertical Side Channel Analysis of a McEliece Cryptosystem.IEEE Trans. Inf. Forensics Secur.1161093-11052016Journal Articlesclosedjournals/tifs/ChenEMS1610.1109/TIFS.2015.2509944https://doi.org/10.1109/TIFS.2015.2509944https://dblp.org/rec/journals/tifs/ChenEMS16URL#3185147Rongmao ChenYi Mu 0001Guomin YangFuchun GuoXinyi Huang 0001Xiaofen WangYongjun WangServer-Aided Public Key Encryption With Keyword Search.IEEE Trans. Inf. Forensics Secur.11122833-28422016Journal Articlesclosedjournals/tifs/ChenMYGHWW1610.1109/TIFS.2016.2599293https://doi.org/10.1109/TIFS.2016.2599293https://dblp.org/rec/journals/tifs/ChenMYGHWW16URL#3185148Rongmao ChenYi Mu 0001Guomin YangFuchun GuoXiaofen WangDual-Server Public-Key Encryption With Keyword Search for Secure Cloud Storage.IEEE Trans. Inf. Forensics Secur.114789-7982016Journal Articlesclosedjournals/tifs/ChenMYGW1610.1109/TIFS.2015.2510822https://doi.org/10.1109/TIFS.2015.2510822https://dblp.org/rec/journals/tifs/ChenMYGW16URL#3185149Kan ChenBalasubramaniam NatarajanEvaluating Node Reliability in Cooperative MIMO Networks.IEEE Trans. Inf. Forensics Secur.1171453-14602016Journal Articlesclosedjournals/tifs/ChenN1610.1109/TIFS.2016.2532841https://doi.org/10.1109/TIFS.2016.2532841https://dblp.org/rec/journals/tifs/ChenN16URL#3185150Jianxu Chen 0001Feng ShenDanny Ziyi ChenPatrick J. FlynnIris Recognition Based on Human-Interpretable Features.IEEE Trans. Inf. Forensics Secur.1171476-14852016Journal Articlesclosedjournals/tifs/ChenSCF1610.1109/TIFS.2016.2535901https://doi.org/10.1109/TIFS.2016.2535901https://dblp.org/rec/journals/tifs/ChenSCF16URL#3185151Long Cheng 0005Dinil Mon DivakaranWee-Yong LimVrizlynn L. L. ThingOpportunistic Piggyback Marking for IP Traceback.IEEE Trans. Inf. Forensics Secur.112273-2882016Journal Articlesclosedjournals/tifs/ChengDLT1610.1109/TIFS.2015.2491299https://doi.org/10.1109/TIFS.2015.2491299https://dblp.org/rec/journals/tifs/ChengDLT16URL#3185152Chi ChengJemin LeeTao Jiang 0002Tsuyoshi TakagiSecurity Analysis and Improvements on Two Homomorphic Authentication Schemes for Network Coding.IEEE Trans. Inf. Forensics Secur.115993-10022016Journal Articlesclosedjournals/tifs/ChengLJT1610.1109/TIFS.2016.2515517https://doi.org/10.1109/TIFS.2016.2515517https://dblp.org/rec/journals/tifs/ChengLJT16URL#3185153Jung Hee CheonMiran KimMyungsun KimOptimized Search-and-Compute Circuits and Their Application to Query Evaluation on Encrypted Data.IEEE Trans. Inf. Forensics Secur.111188-1992016Journal Articlesclosedjournals/tifs/CheonKK1610.1109/TIFS.2015.2483486https://doi.org/10.1109/TIFS.2015.2483486https://dblp.org/rec/journals/tifs/CheonKK16URL#3185154Abdelkarim CherkaouiLilian BossuetCédric Marchand 0002Design, Evaluation, and Optimization of Physical Unclonable Functions Based on Transient Effect Ring Oscillators.IEEE Trans. Inf. Forensics Secur.1161291-13052016Journal Articlesclosedjournals/tifs/CherkaouiB01610.1109/TIFS.2016.2524666https://doi.org/10.1109/TIFS.2016.2524666https://dblp.org/rec/journals/tifs/CherkaouiB016URL#3185155Maxim ChernyshevCraig ValliPeter HannayOn 802.11 Access Point Locatability and Named Entity Recognition in Service Set Identifiers.IEEE Trans. Inf. Forensics Secur.113584-5932016Journal Articlesclosedjournals/tifs/ChernyshevVH1610.1109/TIFS.2015.2507542https://doi.org/10.1109/TIFS.2015.2507542https://dblp.org/rec/journals/tifs/ChernyshevVH16URL#3185156Xiaoyu ChuYan Chen 0007K. J. Ray LiuDetectability of the Order of Operations: An Information Theoretic Approach.IEEE Trans. Inf. Forensics Secur.114823-8362016Journal Articlesclosedjournals/tifs/ChuCL1610.1109/TIFS.2015.2510958https://doi.org/10.1109/TIFS.2015.2510958https://dblp.org/rec/journals/tifs/ChuCL16URL#3185157Xiaoyu ChuYan Chen 0007Matthew C. StammK. J. Ray LiuInformation Theoretical Limit of Media Forensics: The Forensicability.IEEE Trans. Inf. Forensics Secur.114774-7882016Journal Articlesclosedjournals/tifs/ChuCSL1610.1109/TIFS.2015.2510820https://doi.org/10.1109/TIFS.2015.2510820https://dblp.org/rec/journals/tifs/ChuCSL16URL#3185158Alberto CompagnoMauro ContiAntonio Alberto D'AmicoGianluca DiniPericle PerazzoLorenzo TaponeccoModeling Enlargement Attacks Against UWB Distance Bounding Protocols.IEEE Trans. Inf. Forensics Secur.1171565-15772016Journal Articlesclosedjournals/tifs/CompagnoCDDPT1610.1109/TIFS.2016.2541613https://doi.org/10.1109/TIFS.2016.2541613https://dblp.org/rec/journals/tifs/CompagnoCDDPT16URL#3185159Mauro ContiLuigi Vincenzo ManciniRiccardo SpolaorNino Vincenzo VerdeAnalyzing Android Encrypted Network Traffic to Identify User Actions.IEEE Trans. Inf. Forensics Secur.111114-1252016Journal Articlesclosedjournals/tifs/ContiMSV1610.1109/TIFS.2015.2478741https://doi.org/10.1109/TIFS.2015.2478741https://dblp.org/rec/journals/tifs/ContiMSV16URL#3185160Heng CuiGhassan O. KarameFelix KlaedtkeRoberto BifulcoOn the Fingerprinting of Software-Defined Networks.IEEE Trans. Inf. Forensics Secur.11102160-21732016Journal Articlesopenjournals/tifs/CuiKKB1610.1109/TIFS.2016.2573756https://doi.org/10.1109/TIFS.2016.2573756https://dblp.org/rec/journals/tifs/CuiKKB16URL#3185161Bin Dai 0003Linman YuZheng Ma 0001Relay Broadcast Channel With Confidential Messages.IEEE Trans. Inf. Forensics Secur.112410-4252016Journal Articlesclosedjournals/tifs/DaiYM1610.1109/TIFS.2015.2503259https://doi.org/10.1109/TIFS.2015.2503259https://dblp.org/rec/journals/tifs/DaiYM16URL#3185162Antitza DantchevaPetros EliaArun RossWhat Else Does Your Biometric Data Reveal? A Survey on Soft Biometrics.IEEE Trans. Inf. Forensics Secur.113441-4672016Journal Articlesclosedjournals/tifs/DantchevaER1610.1109/TIFS.2015.2480381https://doi.org/10.1109/TIFS.2015.2480381https://dblp.org/rec/journals/tifs/DantchevaER16URL#3185163Sanjeev DasYang Liu 0003Wei Zhang 0012Mahinthan ChandramohanSemantics-Based Online Malware Detection: Towards Efficient Real-Time Protection Against Malware.IEEE Trans. Inf. Forensics Secur.112289-3022016Journal Articlesclosedjournals/tifs/DasLZC1610.1109/TIFS.2015.2491300https://doi.org/10.1109/TIFS.2015.2491300https://dblp.org/rec/journals/tifs/DasLZC16URL#3185164John DaugmanInformation Theory and the IrisCode.IEEE Trans. Inf. Forensics Secur.112400-4092016Journal Articlesclosedjournals/tifs/Daugman1610.1109/TIFS.2015.2500196https://doi.org/10.1109/TIFS.2015.2500196https://dblp.org/rec/journals/tifs/Daugman16URL#3185165Bernardo Machado DavidRafael DowsleyJeroen van de GraafDavidson MarquesAnderson C. A. NascimentoAdriana C. B. PintoUnconditionally Secure, Universally Composable Privacy Preserving Linear Algebra.IEEE Trans. Inf. Forensics Secur.11159-732016Journal Articlesclosedjournals/tifs/DavidDGMNP1610.1109/TIFS.2015.2476783https://doi.org/10.1109/TIFS.2015.2476783https://dblp.org/rec/journals/tifs/DavidDGMNP16URL#3185166Tomás DenemarkMehdi BoroumandJessica J. FridrichSteganalysis Features for Content-Adaptive JPEG Steganography.IEEE Trans. Inf. Forensics Secur.1181736-17462016Journal Articlesclosedjournals/tifs/DenemarkBF1610.1109/TIFS.2016.2555281https://doi.org/10.1109/TIFS.2016.2555281https://dblp.org/rec/journals/tifs/DenemarkBF16URL#3185167Yansha DengLifeng Wang 0002Maged ElkashlanArumugam NallanathanRanjan K. MallikPhysical Layer Security in Three-Tier Wireless Sensor Networks: A Stochastic Geometry Approach.IEEE Trans. Inf. Forensics Secur.1161128-11382016Journal Articlesopenjournals/tifs/DengWENM1610.1109/TIFS.2016.2516917https://doi.org/10.1109/TIFS.2016.2516917https://dblp.org/rec/journals/tifs/DengWENM16URL#3185168Abolfazl DiyanatAhmad KhonsariSeyed Pooya ShariatpanahiA Dummy-Based Approach for Preserving Source Rate Privacy.IEEE Trans. Inf. Forensics Secur.1161321-13322016Journal Articlesclosedjournals/tifs/DiyanatKS1610.1109/TIFS.2016.2515050https://doi.org/10.1109/TIFS.2016.2515050https://dblp.org/rec/journals/tifs/DiyanatKS16URL#3185169Quang DoBen MartiniKim-Kwang Raymond ChooA Data Exfiltration and Remote Exploitation Attack on Consumer 3D Printers.IEEE Trans. Inf. Forensics Secur.11102174-21862016Journal Articlesclosedjournals/tifs/DoMC1610.1109/TIFS.2016.2578285https://doi.org/10.1109/TIFS.2016.2578285https://dblp.org/rec/journals/tifs/DoMC16URL#3185170Lijun DongKui Wu 0001Guoming TangA Data-Centric Approach to Quality Estimation of Role Mining Results.IEEE Trans. Inf. Forensics Secur.11122678-26922016Journal Articlesclosedjournals/tifs/DongWT1610.1109/TIFS.2016.2594137https://doi.org/10.1109/TIFS.2016.2594137https://dblp.org/rec/journals/tifs/DongWT16URL#3185171Rohit Kumar DubeyJonathan GohVrizlynn L. L. ThingFingerprint Liveness Detection From Single Image Using Low-Level Features and Shape Analysis.IEEE Trans. Inf. Forensics Secur.1171461-14752016Journal Articlesclosedjournals/tifs/DubeyGT1610.1109/TIFS.2016.2535899https://doi.org/10.1109/TIFS.2016.2535899https://dblp.org/rec/journals/tifs/DubeyGT16URL#3185172Jaroslaw Duda 0001Pawel KorusNeeraj J. GadgilKhalid TahboubEdward J. DelpImage-Like 2D Barcodes Using Generalizations of the Kuznetsov-Tsybakov Problem.IEEE Trans. Inf. Forensics Secur.114691-7032016Journal Articlesclosedjournals/tifs/DudaKGTD1610.1109/TIFS.2015.2506002https://doi.org/10.1109/TIFS.2015.2506002https://dblp.org/rec/journals/tifs/DudaKGTD16URL#3185173Matthew EdmanAggelos KiayiasQiang Tang 0005Bülent YenerOn the Security of Key Extraction From Measuring Physical Quantities.IEEE Trans. Inf. Forensics Secur.1181796-18062016Journal Articlesclosedjournals/tifs/EdmanKTY1610.1109/TIFS.2016.2543687https://doi.org/10.1109/TIFS.2016.2543687https://dblp.org/rec/journals/tifs/EdmanKTY16URL#3185174Wei Fan 0004Kai Wang 0002François CayreZhang Xiong 0001Corrections to "JPEG Anti-Forensics With Improved Tradeoff Between Forensic Undetectability and Image Quality".IEEE Trans. Inf. Forensics Secur.111126282016Journal Articlesclosedjournals/tifs/FanWCX1610.1109/TIFS.2016.2585398https://doi.org/10.1109/TIFS.2016.2585398https://dblp.org/rec/journals/tifs/FanWCX16URL#3185175Song FangYao Liu 0007Peng NingMimicry Attacks Against Wireless Link Signature and New Defense Using Time-Synched Link Signature.IEEE Trans. Inf. Forensics Secur.1171515-15272016Journal Articlesclosedjournals/tifs/FangLN1610.1109/TIFS.2016.2541307https://doi.org/10.1109/TIFS.2016.2541307https://dblp.org/rec/journals/tifs/FangLN16URL#3185176Saman FeghhiDouglas J. LeithA Web Traffic Analysis Attack Using Only Timing Information.IEEE Trans. Inf. Forensics Secur.1181747-17592016Journal Articlesclosedjournals/tifs/FeghhiL1610.1109/TIFS.2016.2551203https://doi.org/10.1109/TIFS.2016.2551203https://dblp.org/rec/journals/tifs/FeghhiL16URL#3185177Zhangjie FuXinle WuChaowen GuanXingming SunKui Ren 0001Toward Efficient Multi-Keyword Fuzzy Search Over Encrypted Outsourced Data With Accuracy Improvement.IEEE Trans. Inf. Forensics Secur.11122706-27162016Journal Articlesclosedjournals/tifs/FuWGSR1610.1109/TIFS.2016.2596138https://doi.org/10.1109/TIFS.2016.2596138https://dblp.org/rec/journals/tifs/FuWGSR16URL#3185178Maria FueyoJavier HerranzOn the Efficiency of Revocation in RSA-Based Anonymous Systems.IEEE Trans. Inf. Forensics Secur.1181771-17792016Journal Articlesclosedjournals/tifs/FueyoH1610.1109/TIFS.2016.2559443https://doi.org/10.1109/TIFS.2016.2559443https://dblp.org/rec/journals/tifs/FueyoH16URL#3185179Hachiro FujitaOn the Secrecy Capacity of Wiretap Channels With Side Information at the Transmitter.IEEE Trans. Inf. Forensics Secur.11112441-24522016Journal Articlesclosedjournals/tifs/Fujita1610.1109/TIFS.2016.2582558https://doi.org/10.1109/TIFS.2016.2582558https://dblp.org/rec/journals/tifs/Fujita16URL#3185180Quanxue GaoRebuttal to "Comments on 'Joint Global and Local Structure Discriminant Analysis"'.IEEE Trans. Inf. Forensics Secur.112429-4302016Journal Articlesclosedjournals/tifs/Gao1610.1109/TIFS.2015.2490622https://doi.org/10.1109/TIFS.2015.2490622https://dblp.org/rec/journals/tifs/Gao16URL#3185181Andrey GarnaevWade TrappeA Bandwidth Monitoring Strategy Under Uncertainty of the Adversary's Activity.IEEE Trans. Inf. Forensics Secur.114837-8492016Journal Articlesclosedjournals/tifs/GarnaevT1610.1109/TIFS.2015.2510959https://doi.org/10.1109/TIFS.2015.2510959https://dblp.org/rec/journals/tifs/GarnaevT16URL#3185182Paolo GastiJaroslav SedenkaQing Yang 0005Gang ZhouKiran S. BalaganiSecure, Fast, and Energy-Efficient Outsourced Authentication for Smartphones.IEEE Trans. Inf. Forensics Secur.11112556-25712016Journal Articlesclosedjournals/tifs/GastiS0ZB1610.1109/TIFS.2016.2585093https://doi.org/10.1109/TIFS.2016.2585093https://dblp.org/rec/journals/tifs/GastiS0ZB16URL#3185183Alberto Giaretta 0001Sasitharan BalasubramaniamMauro ContiSecurity Vulnerabilities and Countermeasures for Target Localization in Bio-NanoThings Communication Networks.IEEE Trans. Inf. Forensics Secur.114665-6762016Journal Articlesclosedjournals/tifs/GiarettaBC1610.1109/TIFS.2015.2505632https://doi.org/10.1109/TIFS.2015.2505632https://dblp.org/rec/journals/tifs/GiarettaBC16URL#3185184Fuchun GuoWilly SusiloYi Mu 0001Distance-Based Encryption: How to Embed Fuzziness in Biometric-Based Encryption.IEEE Trans. Inf. Forensics Secur.112247-2572016Journal Articlesclosedjournals/tifs/GuoSM1610.1109/TIFS.2015.2489179https://doi.org/10.1109/TIFS.2015.2489179https://dblp.org/rec/journals/tifs/GuoSM16URL#3185185Haoran GuoXiaodong Wang 0013Kun ChangYe Tian 0004Exploiting Path Diversity for Thwarting Pollution Attacks in Named Data Networking.IEEE Trans. Inf. Forensics Secur.1192077-20902016Journal Articlesclosedjournals/tifs/GuoWCT1610.1109/TIFS.2016.2574307https://doi.org/10.1109/TIFS.2016.2574307https://dblp.org/rec/journals/tifs/GuoWCT16URL#3185186Mohammad HaghighatMohamed Abdel-MottalebWadee AlhalabiDiscriminant Correlation Analysis: Real-Time Feature Level Fusion for Multimodal Biometric Recognition.IEEE Trans. Inf. Forensics Secur.1191984-19962016Journal Articlesclosedjournals/tifs/HaghighatAA1610.1109/TIFS.2016.2569061https://doi.org/10.1109/TIFS.2016.2569061https://dblp.org/rec/journals/tifs/HaghighatAA16URL#3185187Mohammad Sayad HaghighiSheng WenYang Xiang 0001Barry G. QuinnWanlei Zhou 0001On the Race of Worms and Patches: Modeling the Spread of Information in Wireless Sensor Networks.IEEE Trans. Inf. Forensics Secur.11122854-28652016Journal Articlesclosedjournals/tifs/HaghighiWXQZ1610.1109/TIFS.2016.2594130https://doi.org/10.1109/TIFS.2016.2594130https://dblp.org/rec/journals/tifs/HaghighiWXQZ16URL#3185188Assia HamadeneYoucef ChibaniOne-Class Writer-Independent Offline Signature Verification Using Feature Dissimilarity Thresholding.IEEE Trans. Inf. Forensics Secur.1161226-12382016Journal Articlesclosedjournals/tifs/HamadeneC1610.1109/TIFS.2016.2521611https://doi.org/10.1109/TIFS.2016.2521611https://dblp.org/rec/journals/tifs/HamadeneC16URL#3185189Yi Han 0003Tansu AlpcanJeffrey ChanChristopher LeckieBenjamin I. P. RubinsteinA Game Theoretical Approach to Defend Against Co-Resident Attacks in Cloud Computing: Preventing Co-Residence Using Semi-Supervised Learning.IEEE Trans. Inf. Forensics Secur.113556-5702016Journal Articlesclosedjournals/tifs/HanACLR1610.1109/TIFS.2015.2505680https://doi.org/10.1109/TIFS.2015.2505680https://dblp.org/rec/journals/tifs/HanACLR16URL#3185190Weili HanZhigong LiLang YuanWenyuan Xu 0001Regional Patterns and Vulnerability Analysis of Chinese Web Passwords.IEEE Trans. Inf. Forensics Secur.112258-2722016Journal Articlesclosedjournals/tifs/HanLYX1610.1109/TIFS.2015.2490620https://doi.org/10.1109/TIFS.2015.2490620https://dblp.org/rec/journals/tifs/HanLYX16URL#3185191Song Han 0006Shuai ZhaoQinghua LiChun-Hua JuWanlei Zhou 0001PPM-HDA: Privacy-Preserving and Multifunctional Health Data Aggregation With Fault Tolerance.IEEE Trans. Inf. Forensics Secur.1191940-19552016Journal Articlesclosedjournals/tifs/HanZLJZ1610.1109/TIFS.2015.2472369https://doi.org/10.1109/TIFS.2015.2472369https://dblp.org/rec/journals/tifs/HanZLJZ16URL#3185192Debiao HeSherali ZeadallyNeeraj Kumar 0001Wei Wu 0001Efficient and Anonymous Mobile User Authentication Protocol Using Self-Certified Public Key Cryptography for Multi-Server Architectures.IEEE Trans. Inf. Forensics Secur.1192052-20642016Journal Articlesclosedjournals/tifs/HeZKW1610.1109/TIFS.2016.2573746https://doi.org/10.1109/TIFS.2016.2573746https://dblp.org/rec/journals/tifs/HeZKW16URL#3185193Matthias HillerMeng-Day (Mandel) YuGeorg SiglCherry-Picking Reliable PUF Bits With Differential Sequence Coding.IEEE Trans. Inf. Forensics Secur.1192065-20762016Journal Articlesclosedjournals/tifs/HillerYS1610.1109/TIFS.2016.2573766https://doi.org/10.1109/TIFS.2016.2573766https://dblp.org/rec/journals/tifs/HillerYS16URL#3185194Yang Hu 0004Konstantinos SirlantzisGareth Howells 0001Signal-Level Information Fusion for Less Constrained Iris Recognition Using Sparse-Error Low Rank Matrix Factorization.IEEE Trans. Inf. Forensics Secur.1171549-15642016Journal Articlesclosedjournals/tifs/HuSH1610.1109/TIFS.2016.2541612https://doi.org/10.1109/TIFS.2016.2541612https://dblp.org/rec/journals/tifs/HuSH16URL#3185195Ping HuChi Wan SungSiu-Wai HoTerence H. ChanOptimal Coding and Allocation for Perfect Secrecy in Multiple Clouds.IEEE Trans. Inf. Forensics Secur.112388-3992016Journal Articlesclosedjournals/tifs/HuSHC1610.1109/TIFS.2015.2500193https://doi.org/10.1109/TIFS.2015.2500193https://dblp.org/rec/journals/tifs/HuSHC16URL#3185196Jingyu HuaAn TangYixin FangZhenyu ShenSheng Zhong 0002Privacy-Preserving Utility Verification of the Data Published by Non-Interactive Differentially Private Mechanisms.IEEE Trans. Inf. Forensics Secur.11102298-23112016Journal Articlesclosedjournals/tifs/HuaTFSZ1610.1109/TIFS.2016.2532839https://doi.org/10.1109/TIFS.2016.2532839https://dblp.org/rec/journals/tifs/HuaTFSZ16URL#3185197Guang Hua 0001Ying Zhang 0047Jonathan GohVrizlynn L. L. ThingAudio Authentication by Exploring the Absolute-Error-Map of ENF Signals.IEEE Trans. Inf. Forensics Secur.1151003-10162016Journal Articlesclosedjournals/tifs/HuaZGT1610.1109/TIFS.2016.2516824https://doi.org/10.1109/TIFS.2016.2516824https://dblp.org/rec/journals/tifs/HuaZGT16URL#3185198Fangjun HuangJiwu HuangYun-Qing Shi 0001New Framework for Reversible Data Hiding in Encrypted Domain.IEEE Trans. Inf. Forensics Secur.11122777-27892016Journal Articlesclosedjournals/tifs/HuangHS1610.1109/TIFS.2016.2598528https://doi.org/10.1109/TIFS.2016.2598528https://dblp.org/rec/journals/tifs/HuangHS16URL#3185199Fei HuoPatrick MitranGuang GongAnalysis and Validation of Active Eavesdropping Attacks in Passive FHSS RFID Systems.IEEE Trans. Inf. Forensics Secur.1171528-15412016Journal Articlesclosedjournals/tifs/HuoMG1610.1109/TIFS.2016.2541309https://doi.org/10.1109/TIFS.2016.2541309https://dblp.org/rec/journals/tifs/HuoMG16URL#3185200Alexandros IosifidisMoncef GabboujScaling Up Class-Specific Kernel Discriminant Analysis for Large-Scale Face Verification.IEEE Trans. Inf. Forensics Secur.11112453-24652016Journal Articlesclosedjournals/tifs/IosifidisG1610.1109/TIFS.2016.2582562https://doi.org/10.1109/TIFS.2016.2582562https://dblp.org/rec/journals/tifs/IosifidisG16URL#3185201Ziad IsmailChristophe KiennertJean LeneutreLin Chen 0002Auditing a Cloud Provider's Compliance With Data Backup Requirements: A Game Theoretical Analysis.IEEE Trans. Inf. Forensics Secur.1181685-16992016Journal Articlesclosedjournals/tifs/IsmailKLC1610.1109/TIFS.2016.2549002https://doi.org/10.1109/TIFS.2016.2549002https://dblp.org/rec/journals/tifs/IsmailKLC16URL#3185202Emad Sami JahaMark S. NixonFrom Clothing to Identity: Manual and Automatic Soft Biometrics.IEEE Trans. Inf. Forensics Secur.11102377-23902016Journal Articlesclosedjournals/tifs/JahaN1610.1109/TIFS.2016.2584001https://doi.org/10.1109/TIFS.2016.2584001https://dblp.org/rec/journals/tifs/JahaN16URL#3185203Shouling JiWeiqing LiNeil Zhenqiang GongPrateek MittalRaheem A. BeyahSeed-Based De-Anonymizability Quantification of Social Networks.IEEE Trans. Inf. Forensics Secur.1171398-14112016Journal Articlesclosedjournals/tifs/JiLGMB1610.1109/TIFS.2016.2529591https://doi.org/10.1109/TIFS.2016.2529591https://dblp.org/rec/journals/tifs/JiLGMB16URL#3185204Richard Jiang 0001Somaya Ali Al-MáadeedAhmed BouridaneDanny CrookesM. Emre Celebi 0001Face Recognition in the Scrambled Domain via Salience-Aware Ensembles of Many Kernels.IEEE Trans. Inf. Forensics Secur.1181807-18172016Journal Articlesclosedjournals/tifs/JiangABCC1610.1109/TIFS.2016.2555792https://doi.org/10.1109/TIFS.2016.2555792https://dblp.org/rec/journals/tifs/JiangABCC16URL#3185205Rong Jin 0002Liu ShiKai Zeng 0001Amit PandePrasant MohapatraMagPairing: Pairing Smartphones in Close Proximity Using Magnetometers.IEEE Trans. Inf. Forensics Secur.1161306-13202016Journal Articlesclosedjournals/tifs/JinSZPM1610.1109/TIFS.2015.2505626https://doi.org/10.1109/TIFS.2015.2505626https://dblp.org/rec/journals/tifs/JinSZPM16URL#3185206Alireza JolfaeiXin-Wen WuVallipuram MuthukkumarasamyOn the Security of Permutation-Only Image Encryption Schemes.IEEE Trans. Inf. Forensics Secur.112235-2462016Journal Articlesclosedjournals/tifs/JolfaeiWM1610.1109/TIFS.2015.2489178https://doi.org/10.1109/TIFS.2015.2489178https://dblp.org/rec/journals/tifs/JolfaeiWM16URL#3185207Taeho JungXiang-Yang Li 0001Zhiguo WanMeng WanRebuttal to "Comments on 'Control Cloud Data Access Privilege and Anonymity With Fully Anonymous Attribute-Based Encryption"'.IEEE Trans. Inf. Forensics Secur.1148682016Journal Articlesclosedjournals/tifs/JungLWW1610.1109/TIFS.2015.2509946https://doi.org/10.1109/TIFS.2015.2509946https://dblp.org/rec/journals/tifs/JungLWW16URL#3185208David A. KarpukArsenia ChortiPerfect Secrecy in Physical-Layer Network Coding Systems From Structured Interference.IEEE Trans. Inf. Forensics Secur.1181875-18872016Journal Articlesclosedjournals/tifs/KarpukC1610.1109/TIFS.2016.2563165https://doi.org/10.1109/TIFS.2016.2563165https://dblp.org/rec/journals/tifs/KarpukC16URL#3185209Nicholas KolokotronisAlexandros KatsiotisNicholas KalouptsidisSecretly Pruned Convolutional Codes: Security Analysis and Performance Results.IEEE Trans. Inf. Forensics Secur.1171500-15142016Journal Articlesclosedjournals/tifs/KolokotronisKK1610.1109/TIFS.2016.2537262https://doi.org/10.1109/TIFS.2016.2537262https://dblp.org/rec/journals/tifs/KolokotronisKK16URL#3185210Oleg KomogortsevAlexey Karpov 0002Corey HollandOculomotor Plant Characteristics: The Effects of Environment and Stimulus.IEEE Trans. Inf. Forensics Secur.113621-6322016Journal Articlesclosedjournals/tifs/KomogortsevKH1610.1109/TIFS.2015.2503263https://doi.org/10.1109/TIFS.2015.2503263https://dblp.org/rec/journals/tifs/KomogortsevKH16URL#3185211Zhengmin KongShaoshi YangFeilong WuShixin PengLiang ZhongLajos HanzoIterative Distributed Minimum Total MSE Approach for Secure Communications in MIMO Interference Channels.IEEE Trans. Inf. Forensics Secur.113594-6082016Journal Articlesclosedjournals/tifs/KongYWPZH1610.1109/TIFS.2015.2493888https://doi.org/10.1109/TIFS.2015.2493888https://dblp.org/rec/journals/tifs/KongYWPZH16URL#3185212Marcin KowalskiMariusz KastekComparative Studies of Passive Imaging in Terahertz and Mid-Wavelength Infrared Ranges for Object Detection.IEEE Trans. Inf. Forensics Secur.1192028-20352016Journal Articlesclosedjournals/tifs/KowalskiK1610.1109/TIFS.2016.2571260https://doi.org/10.1109/TIFS.2016.2571260https://dblp.org/rec/journals/tifs/KowalskiK16URL#3185213Vireshwar KumarJung-Min "Jerry" ParkKaigui BianPHY-Layer Authentication Using Duobinary Signaling for Spectrum Enforcement.IEEE Trans. Inf. Forensics Secur.1151027-10382016Journal Articlesclosedjournals/tifs/KumarPB1610.1109/TIFS.2016.2516904https://doi.org/10.1109/TIFS.2016.2516904https://dblp.org/rec/journals/tifs/KumarPB16URL#3185214Ajay Kumar 0001Zhihuan XuPersonal Identification Using Minor Knuckle Patterns From Palm Dorsal Surface.IEEE Trans. Inf. Forensics Secur.11102338-23482016Journal Articlesclosedjournals/tifs/KumarX1610.1109/TIFS.2016.2574309https://doi.org/10.1109/TIFS.2016.2574309https://dblp.org/rec/journals/tifs/KumarX16URL#3185215Riccardo LazzerettiTommaso PignataMauro BarniPiecewise Function Approximation With Private Data.IEEE Trans. Inf. Forensics Secur.113642-6572016Journal Articlesclosedjournals/tifs/LazzerettiPB1610.1109/TIFS.2015.2503268https://doi.org/10.1109/TIFS.2015.2503268https://dblp.org/rec/journals/tifs/LazzerettiPB16URL#3185216Cai Li 0001Jiankun HuA Security-Enhanced Alignment-Free Fuzzy Vault-Based Fingerprint Cryptosystem Using Pair-Polar Minutiae Structures.IEEE Trans. Inf. Forensics Secur.113543-5552016Journal Articlesclosedjournals/tifs/LiH1610.1109/TIFS.2015.2505630https://doi.org/10.1109/TIFS.2015.2505630https://dblp.org/rec/journals/tifs/LiH16URL#3185217Zhi-Ming LiZheng-Hai HuangKun ShangA Customized Sparse Representation Model With Mixed Norm for Undersampled Face Recognition.IEEE Trans. Inf. Forensics Secur.11102203-22142016Journal Articlesclosedjournals/tifs/LiHS1610.1109/TIFS.2016.2567318https://doi.org/10.1109/TIFS.2016.2567318https://dblp.org/rec/journals/tifs/LiHS16URL#3185218Lichun LiRongxing LuKim-Kwang Raymond ChooAnwitaman DattaJun Shao 0001Privacy-Preserving-Outsourced Association Rule Mining on Vertically Partitioned Databases.IEEE Trans. Inf. Forensics Secur.1181847-18612016Journal Articlesclosedjournals/tifs/LiLCDS1610.1109/TIFS.2016.2561241https://doi.org/10.1109/TIFS.2016.2561241https://dblp.org/rec/journals/tifs/LiLCDS16URL#3185219Beibei Li 0002Rongxing LuWei Wang 0100Kim-Kwang Raymond ChooDDOA: A Dirichlet-Based Detection Scheme for Opportunistic Attacks in Smart Grid Cyber-Physical System.IEEE Trans. Inf. Forensics Secur.11112415-24252016Journal Articlesclosedjournals/tifs/LiLWC1610.1109/TIFS.2016.2576898https://doi.org/10.1109/TIFS.2016.2576898https://dblp.org/rec/journals/tifs/LiLWC16URL#3185220Shang Li 0002Xiaodong Wang 0001Cooperative Change Detection for Voltage Quality Monitoring in Smart Grids.IEEE Trans. Inf. Forensics Secur.11186-992016Journal Articlesclosedjournals/tifs/LiW1610.1109/TIFS.2015.2477796https://doi.org/10.1109/TIFS.2015.2477796https://dblp.org/rec/journals/tifs/LiW16URL#3185221Fengyong LiKui Wu 0001Jingsheng LeiMi WenZhongqin BiChunhua GuSteganalysis Over Large-Scale Social Networks With High-Order Joint Features and Clustering Ensembles.IEEE Trans. Inf. Forensics Secur.112344-3572016Journal Articlesclosedjournals/tifs/LiWLWBG1610.1109/TIFS.2015.2496910https://doi.org/10.1109/TIFS.2015.2496910https://dblp.org/rec/journals/tifs/LiWLWBG16URL#3185222Yongbo LiFan YaoTian LanGuru VenkataramaniSARRE: Semantics-Aware Rule Recommendation and Enforcement for Event Paths on Android.IEEE Trans. Inf. Forensics Secur.11122748-27622016Journal Articlesclosedjournals/tifs/LiYLV1610.1109/TIFS.2016.2596141https://doi.org/10.1109/TIFS.2016.2596141https://dblp.org/rec/journals/tifs/LiYLV16URL#3185223Yuanman LiJiantao Zhou 0001An ChengXianming LiuYuan Yan TangSIFT Keypoint Removal and Injection via Convex Relaxation.IEEE Trans. Inf. Forensics Secur.1181722-17352016Journal Articlesclosedjournals/tifs/LiZCLT1610.1109/TIFS.2016.2553645https://doi.org/10.1109/TIFS.2016.2553645https://dblp.org/rec/journals/tifs/LiZCLT16URL#3185224Jiangtao Li 0003Lei Zhang 0009Joseph K. LiuHaifeng QianZheming DongPrivacy-Preserving Public Auditing Protocol for Low-Performance End Devices in Cloud.IEEE Trans. Inf. Forensics Secur.11112572-25832016Journal Articlesclosedjournals/tifs/LiZLQD1610.1109/TIFS.2016.2587242https://doi.org/10.1109/TIFS.2016.2587242https://dblp.org/rec/journals/tifs/LiZLQD16URL#3185225Fagen LiDi ZhongTsuyoshi TakagiEfficient Deniably Authenticated Encryption and Its Application to E-Mail.IEEE Trans. Inf. Forensics Secur.11112477-24862016Journal Articlesclosedjournals/tifs/LiZT1610.1109/TIFS.2016.2585086https://doi.org/10.1109/TIFS.2016.2585086https://dblp.org/rec/journals/tifs/LiZT16URL#3185226Kaitai LiangXinyi Huang 0001Fuchun GuoJoseph K. LiuPrivacy-Preserving and Regular Language Search Over Encrypted Cloud Data.IEEE Trans. Inf. Forensics Secur.11102365-23762016Journal Articlesclosedjournals/tifs/LiangHGL1610.1109/TIFS.2016.2581316https://doi.org/10.1109/TIFS.2016.2581316https://dblp.org/rec/journals/tifs/LiangHGL16URL#3185227Pin-Hsun LinEduard A. JorswieckOn the Fast Fading Gaussian Wiretap Channel With Statistical Channel State Information at the Transmitter.IEEE Trans. Inf. Forensics Secur.11146-582016Journal Articlesclosedjournals/tifs/LinJ1610.1109/TIFS.2015.2476464https://doi.org/10.1109/TIFS.2015.2476464https://dblp.org/rec/journals/tifs/LinJ16URL#3185228Xufeng LinChang-Tsun LiPreprocessing Reference Sensor Pattern Noise via Spectrum Equalization.IEEE Trans. Inf. Forensics Secur.111126-1402016Journal Articlesopenjournals/tifs/LinL1610.1109/TIFS.2015.2478748https://doi.org/10.1109/TIFS.2015.2478748https://dblp.org/rec/journals/tifs/LinL16URL#3185229Eryun LiuKai Cao 0001Minutiae Extraction From Level 1 Features of Fingerprint.IEEE Trans. Inf. Forensics Secur.1191893-19022016Journal Articlesclosedjournals/tifs/Liu01610.1109/TIFS.2016.2541345https://doi.org/10.1109/TIFS.2016.2541345https://dblp.org/rec/journals/tifs/Liu016URL#3185230Joseph K. LiuMan Ho AuXinyi Huang 0001Rongxing LuJin Li 0002Fine-Grained Two-Factor Access Control for Web-Based Cloud Computing Services.IEEE Trans. Inf. Forensics Secur.113484-4972016Journal Articlesclosedjournals/tifs/LiuAHL01610.1109/TIFS.2015.2493983https://doi.org/10.1109/TIFS.2015.2493983https://dblp.org/rec/journals/tifs/LiuAHL016URL#3185231Ximeng LiuRobert H. DengKim-Kwang Raymond ChooJian Weng 0001An Efficient Privacy-Preserving Outsourced Calculation Toolkit With Multiple Keys.IEEE Trans. Inf. Forensics Secur.11112401-24142016Journal Articlesclosedjournals/tifs/LiuDCW1610.1109/TIFS.2016.2573770https://doi.org/10.1109/TIFS.2016.2573770https://dblp.org/rec/journals/tifs/LiuDCW16URL#3185232Ximeng LiuRobert H. DengWenxiu DingRongxing LuBaodong QinPrivacy-Preserving Outsourced Calculation on Floating Point Numbers.IEEE Trans. Inf. Forensics Secur.11112513-25272016Journal Articlesclosedjournals/tifs/LiuDDLQ1610.1109/TIFS.2016.2585121https://doi.org/10.1109/TIFS.2016.2585121https://dblp.org/rec/journals/tifs/LiuDDLQ16URL#3185233Yuxin Liu 0001Mianxiong DongKaoru OtaAnfeng LiuActiveTrust: Secure and Trustable Routing in Wireless Sensor Networks.IEEE Trans. Inf. Forensics Secur.1192013-20272016Journal Articlesclosedjournals/tifs/LiuDOL1610.1109/TIFS.2016.2570740https://doi.org/10.1109/TIFS.2016.2570740https://dblp.org/rec/journals/tifs/LiuDOL16URL#3185234Xuan Liu 0003Zhiyi LiXingdong LiuZuyi LiMasking Transmission Line Outages via False Data Injection Attacks.IEEE Trans. Inf. Forensics Secur.1171592-16022016Journal Articlesclosedjournals/tifs/LiuLLL1610.1109/TIFS.2016.2542061https://doi.org/10.1109/TIFS.2016.2542061https://dblp.org/rec/journals/tifs/LiuLLL16URL#3185235Weiwei Liu 0002Guangjie LiuJiangtao ZhaiYuewei DaiDipak GhosalDesigning Analog Fountain Timing Channels: Undetectability, Robustness, and Model-Adaptation.IEEE Trans. Inf. Forensics Secur.114677-6902016Journal Articlesclosedjournals/tifs/LiuLZDG1610.1109/TIFS.2015.2505688https://doi.org/10.1109/TIFS.2015.2505688https://dblp.org/rec/journals/tifs/LiuLZDG16URL#3185236Weijiang LiuWenyu QuJian GongKeqiu LiDetection of Superpoints Using a Vector Bloom Filter.IEEE Trans. Inf. Forensics Secur.113514-5272016Journal Articlesclosedjournals/tifs/LiuQGL1610.1109/TIFS.2015.2503269https://doi.org/10.1109/TIFS.2015.2503269https://dblp.org/rec/journals/tifs/LiuQGL16URL#3185237Wael LouisMajid KomeiliDimitrios HatzinakosContinuous Authentication Using One-Dimensional Multi-Resolution Local Binary Patterns (1DMRLBP) in ECG Biometrics.IEEE Trans. Inf. Forensics Secur.11122818-28322016Journal Articlesclosedjournals/tifs/LouisKH1610.1109/TIFS.2016.2599270https://doi.org/10.1109/TIFS.2016.2599270https://dblp.org/rec/journals/tifs/LouisKH16URL#3185238Haoyu MaRuiqi LiXiaoxu YuChunfu JiaDebin GaoIntegrated Software Fingerprinting via Neural-Network-Based Control Flow Obfuscation.IEEE Trans. Inf. Forensics Secur.11102322-23372016Journal Articlesclosedjournals/tifs/MaLYJG1610.1109/TIFS.2016.2555287https://doi.org/10.1109/TIFS.2016.2555287https://dblp.org/rec/journals/tifs/MaLYJG16URL#3185239Bin Ma 0003Yun Q. Shi 0001A Reversible Data Hiding Scheme Based on Code Division Multiplexing.IEEE Trans. Inf. Forensics Secur.1191914-19272016Journal Articlesclosedjournals/tifs/MaS1610.1109/TIFS.2016.2566261https://doi.org/10.1109/TIFS.2016.2566261https://dblp.org/rec/journals/tifs/MaS16URL#3185240Hui Ma 0002Rui Zhang 0002Wei YuanComments on "Control Cloud Data Access Privilege and Anonymity With Fully Anonymous Attribute-Based Encryption".IEEE Trans. Inf. Forensics Secur.114866-8672016Journal Articlesclosedjournals/tifs/MaZY1610.1109/TIFS.2015.2509865https://doi.org/10.1109/TIFS.2015.2509865https://dblp.org/rec/journals/tifs/MaZY16URL#3185241Brent MacRaeAmirali Salehi-AbariJulie ThorpeAn Exploration of Geographic Authentication Schemes.IEEE Trans. Inf. Forensics Secur.1191997-20122016Journal Articlesclosedjournals/tifs/MacRaeST1610.1109/TIFS.2016.2570681https://doi.org/10.1109/TIFS.2016.2570681https://dblp.org/rec/journals/tifs/MacRaeST16URL#3185242Emanuele MaioranaDaria La RoccaPatrizio CampisiOn the Permanence of EEG Signals for Biometric Recognition.IEEE Trans. Inf. Forensics Secur.111163-1752016Journal Articlesclosedjournals/tifs/MaioranaRC1610.1109/TIFS.2015.2481870https://doi.org/10.1109/TIFS.2015.2481870https://dblp.org/rec/journals/tifs/MaioranaRC16URL#3185243Ahmed S. MansourRafael F. SchaeferHolger BocheOn the Individual Secrecy Capacity Regions of the General, Degraded, and Gaussian Multi-Receiver Wiretap Broadcast Channel.IEEE Trans. Inf. Forensics Secur.1192107-21222016Journal Articlesclosedjournals/tifs/MansourSB1610.1109/TIFS.2016.2566260https://doi.org/10.1109/TIFS.2016.2566260https://dblp.org/rec/journals/tifs/MansourSB16URL#3185244Oleg MazonkaNektarios Georgios TsoutsosMichail ManiatakosCryptoleq: A Heterogeneous Abstract Machine for Encrypted and Unencrypted Computation.IEEE Trans. Inf. Forensics Secur.1192123-21382016Journal Articlesclosedjournals/tifs/MazonkaTM1610.1109/TIFS.2016.2569062https://doi.org/10.1109/TIFS.2016.2569062https://dblp.org/rec/journals/tifs/MazonkaTM16URL#3185245Manoranjan MohantyMuhammad Rizwan AsgharGiovanni Russello$2DCrypt$ : Image Scaling and Cropping in Encrypted Domains.IEEE Trans. Inf. Forensics Secur.11112542-25552016Journal Articlesclosedjournals/tifs/MohantyAR1610.1109/TIFS.2016.2585085https://doi.org/10.1109/TIFS.2016.2585085https://dblp.org/rec/journals/tifs/MohantyAR16URL#3185246Ali MoharrerShuangqing WeiGeorge T. AmariucaiJing Deng 0001Extractable Common Randomness From Gaussian Trees: Topological and Algebraic Perspectives.IEEE Trans. Inf. Forensics Secur.11102312-23212016Journal Articlesclosedjournals/tifs/MoharrerWAD1610.1109/TIFS.2016.2543688https://doi.org/10.1109/TIFS.2016.2543688https://dblp.org/rec/journals/tifs/MoharrerWAD16URL#3185247Hussein MoosaviFrancis Minhthang BuiDelay-Aware Optimization of Physical Layer Security in Multi-Hop Wireless Body Area Networks.IEEE Trans. Inf. Forensics Secur.1191928-19392016Journal Articlesclosedjournals/tifs/MoosaviB1610.1109/TIFS.2016.2566446https://doi.org/10.1109/TIFS.2016.2566446https://dblp.org/rec/journals/tifs/MoosaviB16URL#3185248Takao MurakamiHajime WatanabeLocalization Attacks Using Matrix and Tensor Factorization.IEEE Trans. Inf. Forensics Secur.1181647-16602016Journal Articlesclosedjournals/tifs/MurakamiW1610.1109/TIFS.2016.2547865https://doi.org/10.1109/TIFS.2016.2547865https://dblp.org/rec/journals/tifs/MurakamiW16URL#3185249Parinaz NaghizadehMingyan LiuOpting Out of Incentive Mechanisms: A Study of Security as a Non-Excludable Public Good.IEEE Trans. Inf. Forensics Secur.11122790-28032016Journal Articlesclosedjournals/tifs/NaghizadehL1610.1109/TIFS.2016.2599005https://doi.org/10.1109/TIFS.2016.2599005https://dblp.org/rec/journals/tifs/NaghizadehL16URL#3185250Farid Movahedi NainiJayakrishnan UnnikrishnanPatrick ThiranMartin VetterliWhere You Are Is Who You Are: User Identification by Matching Statistics.IEEE Trans. Inf. Forensics Secur.112358-3722016Journal Articlesclosedjournals/tifs/NainiUTV1610.1109/TIFS.2015.2498131https://doi.org/10.1109/TIFS.2015.2498131https://dblp.org/rec/journals/tifs/NainiUTV16URL#3185251Ajaya NeupaneNitesh SaxenaJose Omar MaximoRajesh K. KanaNeural Markers of Cybersecurity: An fMRI Study of Phishing and Malware Warnings.IEEE Trans. Inf. Forensics Secur.1191970-19832016Journal Articlesclosedjournals/tifs/NeupaneSMK1610.1109/TIFS.2016.2566265https://doi.org/10.1109/TIFS.2016.2566265https://dblp.org/rec/journals/tifs/NeupaneSMK16URL#3185252Van-Dinh NguyenTrung Quang DuongOctavia A. DobreOh-Soon ShinJoint Information and Jamming Beamforming for Secrecy Rate Maximization in Cognitive Radio Networks.IEEE Trans. Inf. Forensics Secur.11112609-26232016Journal Articlesclosedjournals/tifs/NguyenDDS1610.1109/TIFS.2016.2594131https://doi.org/10.1109/TIFS.2016.2594131https://dblp.org/rec/journals/tifs/NguyenDDS16URL#3185253Rodrigo Frassetto NogueiraRoberto de Alencar LotufoRubens Campos MachadoFingerprint Liveness Detection Using Convolutional Neural Networks.IEEE Trans. Inf. Forensics Secur.1161206-12132016Journal Articlesclosedjournals/tifs/NogueiraLM1610.1109/TIFS.2016.2520880https://doi.org/10.1109/TIFS.2016.2520880https://dblp.org/rec/journals/tifs/NogueiraLM16URL#3185254Marina A. OikawaZanoni DiasAnderson de Rezende RochaSiome GoldensteinManifold Learning and Spectral Clustering for Image Phylogeny Forests.IEEE Trans. Inf. Forensics Secur.1115-182016Journal Articlesclosedjournals/tifs/OikawaDRG1610.1109/TIFS.2015.2442527https://doi.org/10.1109/TIFS.2015.2442527https://dblp.org/rec/journals/tifs/OikawaDRG16URL#3185255Alberto A. de OliveiraPasquale FerraraAlessia De RosaAlessandro PivaMauro BarniSiome GoldensteinZanoni DiasAnderson Rocha 0001Multiple Parenting Phylogeny Relationships in Digital Images.IEEE Trans. Inf. Forensics Secur.112328-3432016Journal Articlesclosedjournals/tifs/OliveiraFRPBGDR1610.1109/TIFS.2015.2493989https://doi.org/10.1109/TIFS.2015.2493989https://dblp.org/rec/journals/tifs/OliveiraFRPBGDR16URL#3185256Cecilia PasquiniGiulia BoatoNaif AlajlanFrancesco G. B. De NataleA Deterministic Approach to Detect Median Filtering in 1D Data.IEEE Trans. Inf. Forensics Secur.1171425-14372016Journal Articlesclosedjournals/tifs/PasquiniBAN1610.1109/TIFS.2016.2530636https://doi.org/10.1109/TIFS.2016.2530636https://dblp.org/rec/journals/tifs/PasquiniBAN16URL#3185257Keyurkumar PatelHu Han 0001Anil K. Jain 0001Secure Face Unlock: Spoof Detection on Smartphones.IEEE Trans. Inf. Forensics Secur.11102268-22832016Journal Articlesclosedjournals/tifs/PatelHJ1610.1109/TIFS.2016.2578288https://doi.org/10.1109/TIFS.2016.2578288https://dblp.org/rec/journals/tifs/PatelHJ16URL#3185258Tran Viet Xuan PhuongGuomin YangWilly SusiloHidden Ciphertext Policy Attribute-Based Encryption Under Standard Assumptions.IEEE Trans. Inf. Forensics Secur.11135-452016Journal Articlesclosedjournals/tifs/PhuongYS1610.1109/TIFS.2015.2475723https://doi.org/10.1109/TIFS.2015.2475723https://dblp.org/rec/journals/tifs/PhuongYS16URL#3185259Sílvia Cristina Dias PintoPetra UrbanovaRoberto M. CesarTwo-Dimensional Wavelet Analysis of Supraorbital Margins of the Human Skull for Characterizing Sexual Dimorphism.IEEE Trans. Inf. Forensics Secur.1171542-15482016Journal Articlesclosedjournals/tifs/PintoUC1610.1109/TIFS.2016.2541611https://doi.org/10.1109/TIFS.2016.2541611https://dblp.org/rec/journals/tifs/PintoUC16URL#3185260Victor ProkhorenkoKim-Kwang Raymond ChooHelen AshmanIntent-Based Extensible Real-Time PHP Supervision Framework.IEEE Trans. Inf. Forensics Secur.11102215-22262016Journal Articlesclosedjournals/tifs/ProkhorenkoCA1610.1109/TIFS.2016.2569063https://doi.org/10.1109/TIFS.2016.2569063https://dblp.org/rec/journals/tifs/ProkhorenkoCA16URL#3185261Dongrun QinZhi Ding 0001Exploiting Multi-Antenna Non-Reciprocal Channels for Shared Secret Key Generation.IEEE Trans. Inf. Forensics Secur.11122693-27052016Journal Articlesclosedjournals/tifs/QinD1610.1109/TIFS.2016.2594143https://doi.org/10.1109/TIFS.2016.2594143https://dblp.org/rec/journals/tifs/QinD16URL#3185262Ramachandra RaghavendraKiran Bylappa RajaChristoph Busch 0001Exploring the Usefulness of Light Field Cameras for Biometrics: An Empirical Study on Face and Iris Recognition.IEEE Trans. Inf. Forensics Secur.115922-9362016Journal Articlesclosedjournals/tifs/RaghavendraRB1610.1109/TIFS.2015.2512559https://doi.org/10.1109/TIFS.2015.2512559https://dblp.org/rec/journals/tifs/RaghavendraRB16URL#3185263Hanif RahbariMarwan KrunzFull Frame Encryption and Modulation Obfuscation Using Channel-Independent Preamble Identifier.IEEE Trans. Inf. Forensics Secur.11122732-27472016Journal Articlesclosedjournals/tifs/RahbariK1610.1109/TIFS.2016.2582560https://doi.org/10.1109/TIFS.2016.2582560https://dblp.org/rec/journals/tifs/RahbariK16URL#3185264Hiranmoy RoyDebotosh BhattacharjeeLocal-Gravity-Face (LG-face) for Illumination-Invariant and Heterogeneous Face Recognition.IEEE Trans. Inf. Forensics Secur.1171412-14242016Journal Articlesclosedjournals/tifs/RoyB1610.1109/TIFS.2016.2530043https://doi.org/10.1109/TIFS.2016.2530043https://dblp.org/rec/journals/tifs/RoyB16URL#3185265Xin RuanZhenyu WuHaining WangSushil JajodiaProfiling Online Social Behaviors for Compromised Account Detection.IEEE Trans. Inf. Forensics Secur.111176-1872016Journal Articlesclosedjournals/tifs/RuanWWJ1610.1109/TIFS.2015.2482465https://doi.org/10.1109/TIFS.2015.2482465https://dblp.org/rec/journals/tifs/RuanWWJ16URL#3185266Maria V. Ruiz-BlondetZhanpeng JinSarah LaszloCEREBRE: A Novel Method for Very High Accuracy Event-Related Potential Biometric Identification.IEEE Trans. Inf. Forensics Secur.1171618-16292016Journal Articlesclosedjournals/tifs/Ruiz-BlondetJL1610.1109/TIFS.2016.2543524https://doi.org/10.1109/TIFS.2016.2543524https://dblp.org/rec/journals/tifs/Ruiz-BlondetJL16URL#3185267Iris SafakaLászló Czap 0001Katerina J. ArgyrakiChristina FragouliCreating Secrets Out of Packet Erasures.IEEE Trans. Inf. Forensics Secur.1161177-11912016Journal Articlesclosedjournals/tifs/SafakaCAF1610.1109/TIFS.2016.2520887https://doi.org/10.1109/TIFS.2016.2520887https://dblp.org/rec/journals/tifs/SafakaCAF16URL#3185268Ravikant SainiAbhishek JindalSwades DeJammer-Assisted Resource Allocation in Secure OFDMA With Untrusted Users.IEEE Trans. Inf. Forensics Secur.1151055-10702016Journal Articlesclosedjournals/tifs/SainiJD1610.1109/TIFS.2016.2516912https://doi.org/10.1109/TIFS.2016.2516912https://dblp.org/rec/journals/tifs/SainiJD16URL#3185269Hassan SalmaniMark M. TehranipoorVulnerability Analysis of a Circuit Layout to Hardware Trojan Insertion.IEEE Trans. Inf. Forensics Secur.1161214-12252016Journal Articlesclosedjournals/tifs/SalmaniT1610.1109/TIFS.2016.2520910https://doi.org/10.1109/TIFS.2016.2520910https://dblp.org/rec/journals/tifs/SalmaniT16URL#3185270Yingpeng SangHong Shen 0001Hui Tian 0001Zonghua ZhangAchieving Probabilistic Anonymity in a Linear and Hybrid Randomization Model.IEEE Trans. Inf. Forensics Secur.11102187-22022016Journal Articlesclosedjournals/tifs/SangSTZ1610.1109/TIFS.2016.2562605https://doi.org/10.1109/TIFS.2016.2562605https://dblp.org/rec/journals/tifs/SangSTZ16URL#3185271Neetesh SaxenaBong Jun Choi 0001Authentication Scheme for Flexible Charging and Discharging of Mobile Vehicles in the V2G Networks.IEEE Trans. Inf. Forensics Secur.1171438-14522016Journal Articlesclosedjournals/tifs/SaxenaC1610.1109/TIFS.2016.2532840https://doi.org/10.1109/TIFS.2016.2532840https://dblp.org/rec/journals/tifs/SaxenaC16URL#3185272Neetesh SaxenaBong Jun Choi 0001Rongxing LuAuthentication and Authorization Scheme for Various User Roles and Devices in Smart Grid.IEEE Trans. Inf. Forensics Secur.115907-9212016Journal Articlesclosedjournals/tifs/SaxenaCL1610.1109/TIFS.2015.2512525https://doi.org/10.1109/TIFS.2015.2512525https://dblp.org/rec/journals/tifs/SaxenaCL16URL#3185273Pascal SchöttleRainer BöhmeGame Theory and Adaptive Steganography.IEEE Trans. Inf. Forensics Secur.114760-7732016Journal Articlesclosedjournals/tifs/SchottleB1610.1109/TIFS.2015.2509941https://doi.org/10.1109/TIFS.2015.2509941https://dblp.org/rec/journals/tifs/SchottleB16URL#3185274Vahid SedighiRémi CogranneJessica J. FridrichContent-Adaptive Steganography by Minimizing Statistical Detectability.IEEE Trans. Inf. Forensics Secur.112221-2342016Journal Articlesclosedjournals/tifs/SedighiCF1610.1109/TIFS.2015.2486744https://doi.org/10.1109/TIFS.2015.2486744https://dblp.org/rec/journals/tifs/SedighiCF16URL#3185275Marius SenftlebenAna BarrosoMihai BucicoiuMatthias HollickStefan Katzenbeisser 0001Erik TewsOn the Privacy and Performance of Mobile Anonymous Microblogging.IEEE Trans. Inf. Forensics Secur.1171578-15912016Journal Articlesclosedjournals/tifs/SenftlebenBBH0T1610.1109/TIFS.2016.2541633https://doi.org/10.1109/TIFS.2016.2541633https://dblp.org/rec/journals/tifs/SenftlebenBBH0T16URL#3185276Chao Shen 0001Yong ZhangXiaohong GuanRoy A. MaxionPerformance Analysis of Touch-Interaction Behavior for Active Smartphone Authentication.IEEE Trans. Inf. Forensics Secur.113498-5132016Journal Articlesclosedjournals/tifs/ShenZGM1610.1109/TIFS.2015.2503258https://doi.org/10.1109/TIFS.2015.2503258https://dblp.org/rec/journals/tifs/ShenZGM16URL#3185277Mohammad Reza Khalili ShojaGeorge Traian AmariucaiShuangqing WeiJing Deng 0001Secret Common Randomness From Routing Metadata in Ad Hoc Networks.IEEE Trans. Inf. Forensics Secur.1181674-16842016Journal Articlesclosedjournals/tifs/ShojaAWD1610.1109/TIFS.2016.2550424https://doi.org/10.1109/TIFS.2016.2550424https://dblp.org/rec/journals/tifs/ShojaAWD16URL#3185278Xiaokui ShuJing Zhang 0039Danfeng (Daphne) YaoWu-chun FengFast Detection of Transformed Data Leaks.IEEE Trans. Inf. Forensics Secur.113528-5422016Journal Articlesopenjournals/tifs/ShuZYF1610.1109/TIFS.2015.2503271https://doi.org/10.1109/TIFS.2015.2503271https://dblp.org/rec/journals/tifs/ShuZYF16URL#3185279Zdenka SitovaJaroslav SedenkaQing Yang 0005Ge PengGang ZhouPaolo GastiKiran S. BalaganiHMOG: New Behavioral Biometric Features for Continuous Authentication of Smartphone Users.IEEE Trans. Inf. Forensics Secur.115877-8922016Journal Articlesclosedjournals/tifs/SitovaSYPZGB1610.1109/TIFS.2015.2506542https://doi.org/10.1109/TIFS.2015.2506542https://dblp.org/rec/journals/tifs/SitovaSYPZGB16URL#3185280Tianlong SongKai Zhou 0001Tongtong LiCDMA System Design and Capacity Analysis Under Disguised Jamming.IEEE Trans. Inf. Forensics Secur.11112487-24982016Journal Articlesclosedjournals/tifs/SongZL1610.1109/TIFS.2016.2585089https://doi.org/10.1109/TIFS.2016.2585089https://dblp.org/rec/journals/tifs/SongZL16URL#3185281Yunlian SunKamal NasrollahiZhenan SunTieniu TanComplementary Cohort Strategy for Multimodal Face Pair Matching.IEEE Trans. Inf. Forensics Secur.115937-9502016Journal Articlesclosedjournals/tifs/SunNST1610.1109/TIFS.2015.2512561https://doi.org/10.1109/TIFS.2015.2512561https://dblp.org/rec/journals/tifs/SunNST16URL#3185282Kamal TahaPaul D. YooSIIMCO: A Forensic Investigation Tool for Identifying the Influential Members of a Criminal Organization.IEEE Trans. Inf. Forensics Secur.114811-8222016Journal Articlesclosedjournals/tifs/TahaY1610.1109/TIFS.2015.2510826https://doi.org/10.1109/TIFS.2015.2510826https://dblp.org/rec/journals/tifs/TahaY16URL#3185283Weixuan TangHaodong Li 0001Weiqi Luo 0001Jiwu HuangAdaptive Steganalysis Based on Embedding Probabilities of Pixels.IEEE Trans. Inf. Forensics Secur.114734-7452016Journal Articlesclosedjournals/tifs/TangLLH1610.1109/TIFS.2015.2507159https://doi.org/10.1109/TIFS.2015.2507159https://dblp.org/rec/journals/tifs/TangLLH16URL#3185284Zhenjun TangXianquan ZhangXianxian LiShichao ZhangRobust Image Hashing With Ring Partition and Invariant Vector Distance.IEEE Trans. Inf. Forensics Secur.111200-2142016Journal Articlesopenjournals/tifs/TangZLZ1610.1109/TIFS.2015.2485163https://doi.org/10.1109/TIFS.2015.2485163https://dblp.org/rec/journals/tifs/TangZLZ16URL#3185285Juan E. TapiaClaudio A. PerezKevin W. BowyerGender Classification From the Same Iris Code Used for Recognition.IEEE Trans. Inf. Forensics Secur.1181760-17702016Journal Articlesclosedjournals/tifs/TapiaPB1610.1109/TIFS.2016.2550418https://doi.org/10.1109/TIFS.2016.2550418https://dblp.org/rec/journals/tifs/TapiaPB16URL#3185286Iuliia TkachenkoWilliam PuechChristophe DestruelOlivier StraussJean-Marc GaudinChristian GuichardTwo-Level QR Code for Private Message Sharing and Document Authentication.IEEE Trans. Inf. Forensics Secur.113571-5832016Journal Articlesclosedjournals/tifs/TkachenkoPDSGG1610.1109/TIFS.2015.2506546https://doi.org/10.1109/TIFS.2015.2506546https://dblp.org/rec/journals/tifs/TkachenkoPDSGG16URL#3185287Wei TongSheng Zhong 0002A Unified Resource Allocation Framework for Defending Against Pollution Attacks in Wireless Network Coding Systems.IEEE Trans. Inf. Forensics Secur.11102255-22672016Journal Articlesclosedjournals/tifs/TongZ1610.1109/TIFS.2016.2581313https://doi.org/10.1109/TIFS.2016.2581313https://dblp.org/rec/journals/tifs/TongZ16URL#3185288Alok TongaonkarR. Sekar 0001Condition Factorization: A Technique for Building Fast and Compact Packet Matching Automata.IEEE Trans. Inf. Forensics Secur.113468-4832016Journal Articlesclosedjournals/tifs/TongaonkarS1610.1109/TIFS.2015.2489182https://doi.org/10.1109/TIFS.2015.2489182https://dblp.org/rec/journals/tifs/TongaonkarS16URL#3185289Huaqun WangDebiao HeShaohua TangIdentity-Based Proxy-Oriented Data Uploading and Remote Data Integrity Checking in Public Cloud.IEEE Trans. Inf. Forensics Secur.1161165-11762016Journal Articlesclosedjournals/tifs/WangHT1610.1109/TIFS.2016.2520886https://doi.org/10.1109/TIFS.2016.2520886https://dblp.org/rec/journals/tifs/WangHT16URL#3185290Bo Wang 0023Leibo LiuChenchen DengMin Zhu 0001Shouyi YinShaojun WeiAgainst Double Fault Attacks: Injection Effort Model, Space and Time Randomization Based Countermeasures for Reconfigurable Array Architecture.IEEE Trans. Inf. Forensics Secur.1161151-11642016Journal Articlesopenjournals/tifs/WangLDZYW1610.1109/TIFS.2016.2518130https://doi.org/10.1109/TIFS.2016.2518130https://dblp.org/rec/journals/tifs/WangLDZYW16URL#3185291Shulan WangKaitai LiangJoseph K. LiuJianyong ChenJianping YuWeixin XieAttribute-Based Data Sharing Scheme Revisited in Cloud Computing.IEEE Trans. Inf. Forensics Secur.1181661-16732016Journal Articlesclosedjournals/tifs/WangLLCYX1610.1109/TIFS.2016.2549004https://doi.org/10.1109/TIFS.2016.2549004https://dblp.org/rec/journals/tifs/WangLLCYX16URL#3185292Boyang WangMing Li 0003Haitao Wang 0001Geometric Range Search on Encrypted Spatial Data.IEEE Trans. Inf. Forensics Secur.114704-7192016Journal Articlesclosedjournals/tifs/WangLW1610.1109/TIFS.2015.2506145https://doi.org/10.1109/TIFS.2015.2506145https://dblp.org/rec/journals/tifs/WangLW16URL#3185293Xiaofen WangYi Mu 0001Rongmao ChenOne-Round Privacy-Preserving Meeting Location Determination for Smartphone Applications.IEEE Trans. Inf. Forensics Secur.1181712-17212016Journal Articlesclosedjournals/tifs/WangMC1610.1109/TIFS.2016.2549508https://doi.org/10.1109/TIFS.2016.2549508https://dblp.org/rec/journals/tifs/WangMC16URL#3185294Yuhao Wang 0002Leibin NiChip-Hong ChangHao Yu 0001DW-AES: A Domain-Wall Nanowire-Based AES for High Throughput and Energy-Efficient Data Encryption in Non-Volatile Memory.IEEE Trans. Inf. Forensics Secur.11112426-24402016Journal Articlesclosedjournals/tifs/WangNCY1610.1109/TIFS.2016.2576903https://doi.org/10.1109/TIFS.2016.2576903https://dblp.org/rec/journals/tifs/WangNCY16URL#3185295Xu Wang 0004Wei Ni 0001Kangfeng ZhengRen Ping LiuXinxin NiuVirus Propagation Modeling and Convergence Analysis in Large-Scale Networks.IEEE Trans. Inf. Forensics Secur.11102241-22542016Journal Articlesclosedjournals/tifs/WangNZLN1610.1109/TIFS.2016.2581305https://doi.org/10.1109/TIFS.2016.2581305https://dblp.org/rec/journals/tifs/WangNZLN16URL#3185296Wenhao WangZhi SunSixu PiaoBocheng ZhuKui Ren 0001Wireless Physical-Layer Identification: Modeling and Validation.IEEE Trans. Inf. Forensics Secur.1192091-21062016Journal Articlesclosedjournals/tifs/WangSPZR1610.1109/TIFS.2016.2552146https://doi.org/10.1109/TIFS.2016.2552146https://dblp.org/rec/journals/tifs/WangSPZR16URL#3185297Wei Wang 0100Kah Chan TehKwok Hung LiRelay Selection for Secure Successive AF Relaying Networks With Untrusted Nodes.IEEE Trans. Inf. Forensics Secur.11112466-24762016Journal Articlesclosedjournals/tifs/WangTL1610.1109/TIFS.2016.2584006https://doi.org/10.1109/TIFS.2016.2584006https://dblp.org/rec/journals/tifs/WangTL16URL#3185298Shulan WangJunwei ZhouJoseph K. LiuJianping YuJianyong ChenWeixin XieAn Efficient File Hierarchy Attribute-Based Encryption Scheme in Cloud Computing.IEEE Trans. Inf. Forensics Secur.1161265-12772016Journal Articlesclosedjournals/tifs/WangZLYCX1610.1109/TIFS.2016.2523941https://doi.org/10.1109/TIFS.2016.2523941https://dblp.org/rec/journals/tifs/WangZLYCX16URL#3185299Naoufel WerghiClaudio TortoriciStefano BerrettiAlberto Del BimboBoosting 3D LBP-Based Face Recognition by Fusing Shape and Texture Descriptors on the Mesh.IEEE Trans. Inf. Forensics Secur.115964-9792016Journal Articlesclosedjournals/tifs/WerghiTBB1610.1109/TIFS.2016.2515505https://doi.org/10.1109/TIFS.2016.2515505https://dblp.org/rec/journals/tifs/WerghiTBB16URL#3185300Xiaofu WuZhen Yang 0001Cong Ling 0001Xiang-Gen Xia 0001Artificial-Noise-Aided Message Authentication Codes With Information-Theoretic Security.IEEE Trans. Inf. Forensics Secur.1161278-12902016Journal Articlesclosedjournals/tifs/WuYLX1610.1109/TIFS.2016.2524514https://doi.org/10.1109/TIFS.2016.2524514https://dblp.org/rec/journals/tifs/WuYLX16URL#3185301Zhihua XiaXinhui WangLiangao ZhangZhan QinXingming SunKui Ren 0001A Privacy-Preserving and Copy-Deterrence Content-Based Image Retrieval Scheme in Cloud Computing.IEEE Trans. Inf. Forensics Secur.11112594-26082016Journal Articlesclosedjournals/tifs/XiaWZQSR1610.1109/TIFS.2016.2590944https://doi.org/10.1109/TIFS.2016.2590944https://dblp.org/rec/journals/tifs/XiaWZQSR16URL#3185302Tao Xiang 0001Shangwei GuoXiaoguo LiPerceptual Visual Security Index Based on Edge and Texture Similarities.IEEE Trans. Inf. Forensics Secur.115951-9632016Journal Articlesclosedjournals/tifs/XiangGL1610.1109/TIFS.2016.2515503https://doi.org/10.1109/TIFS.2016.2515503https://dblp.org/rec/journals/tifs/XiangGL16URL#3185303Qi XiongYing-Chang LiangKwok Hung LiYi Gong 0001Shiying HanSecure Transmission Against Pilot Spoofing Attack: A Two-Way Training-Based Scheme.IEEE Trans. Inf. Forensics Secur.1151017-10262016Journal Articlesclosedjournals/tifs/XiongLLGH1610.1109/TIFS.2016.2516825https://doi.org/10.1109/TIFS.2016.2516825https://dblp.org/rec/journals/tifs/XiongLLGH16URL#3185304Peng Xu 0002Kanapathippillai CumananZhiguo Ding 0001Xuchu DaiKin K. LeungGroup Secret Key Generation in Wireless Networks: Algorithms and Rate Optimization.IEEE Trans. Inf. Forensics Secur.1181831-18462016Journal Articlesclosedjournals/tifs/XuCDDL1610.1109/TIFS.2016.2553643https://doi.org/10.1109/TIFS.2016.2553643https://dblp.org/rec/journals/tifs/XuCDDL16URL#3185305Peng Xu 0002Zhiguo Ding 0001Xuchu DaiGeorge K. KaragiannidisSimultaneously Generating Secret and Private Keys in a Cooperative Pairwise-Independent Network.IEEE Trans. Inf. Forensics Secur.1161139-11502016Journal Articlesclosedjournals/tifs/XuDDK1610.1109/TIFS.2016.2516970https://doi.org/10.1109/TIFS.2016.2516970https://dblp.org/rec/journals/tifs/XuDDK16URL#3185306Xiaoming XuBiao HeWeiwei Yang 0001Xiangyun Zhou 0001Yueming CaiSecure Transmission Design for Cognitive Radio Networks With Poisson Distributed Eavesdroppers.IEEE Trans. Inf. Forensics Secur.112373-3872016Journal Articlesclosedjournals/tifs/XuHYZC1610.1109/TIFS.2015.2500178https://doi.org/10.1109/TIFS.2015.2500178https://dblp.org/rec/journals/tifs/XuHYZC16URL#3185307Ke XuYingjiu LiRobert H. DengICCDetector: ICC-Based Malware Detection on Android.IEEE Trans. Inf. Forensics Secur.1161252-12642016Journal Articlesclosedjournals/tifs/XuLD1610.1109/TIFS.2016.2523912https://doi.org/10.1109/TIFS.2016.2523912https://dblp.org/rec/journals/tifs/XuLD16URL#3185308Cai-Ping YanChi-Man PunXiaochen YuanQuaternion-Based Image Hashing for Adaptive Tampering Localization.IEEE Trans. Inf. Forensics Secur.11122664-26772016Journal Articlesclosedjournals/tifs/YanPY1610.1109/TIFS.2016.2594136https://doi.org/10.1109/TIFS.2016.2594136https://dblp.org/rec/journals/tifs/YanPY16URL#3185309Qiben YanHuacheng ZengTingting Jiang 0005Ming Li 0003Wenjing LouYiwei Thomas HouJamming Resilient Communication Using MIMO Interference Cancellation.IEEE Trans. Inf. Forensics Secur.1171486-14992016Journal Articlesclosedjournals/tifs/YanZJ0LH1610.1109/TIFS.2016.2535906https://doi.org/10.1109/TIFS.2016.2535906https://dblp.org/rec/journals/tifs/YanZJ0LH16URL#3185310Yang YangMaode MaConjunctive Keyword Search With Designated Tester and Timing Enabled Proxy Re-Encryption Function for E-Health Clouds.IEEE Trans. Inf. Forensics Secur.114746-7592016Journal Articlesclosedjournals/tifs/YangM1610.1109/TIFS.2015.2509912https://doi.org/10.1109/TIFS.2015.2509912https://dblp.org/rec/journals/tifs/YangM16URL#3185311Qiaolin YeJiajia JingComments on "Joint Global and Local Structure Discriminant Analysis".IEEE Trans. Inf. Forensics Secur.112426-4282016Journal Articlesclosedjournals/tifs/YeJ1610.1109/TIFS.2015.2490624https://doi.org/10.1109/TIFS.2015.2490624https://dblp.org/rec/journals/tifs/YeJ16URL#3185312Xun YiRussell PauletElisa BertinoGuandong XuPrivate Cell Retrieval From Data Warehouses.IEEE Trans. Inf. Forensics Secur.1161346-13612016Journal Articlesclosedjournals/tifs/YiPBX1610.1109/TIFS.2016.2527620https://doi.org/10.1109/TIFS.2016.2527620https://dblp.org/rec/journals/tifs/YiPBX16URL#3185313Yong Yu 0002Yannan LiJianbing NiGuomin YangYi Mu 0001Willy SusiloComments on "Public Integrity Auditing for Dynamic Data Sharing With Multiuser Modification".IEEE Trans. Inf. Forensics Secur.113658-6592016Journal Articlesclosedjournals/tifs/YuLNYMS1610.1109/TIFS.2015.2501728https://doi.org/10.1109/TIFS.2015.2501728https://dblp.org/rec/journals/tifs/YuLNYMS16URL#3185314Jia Yu 0005Kui Ren 0001Cong Wang 0001Enabling Cloud Storage Auditing With Verifiable Outsourcing of Key Updates.IEEE Trans. Inf. Forensics Secur.1161362-13752016Journal Articlesclosedjournals/tifs/YuRW1610.1109/TIFS.2016.2528500https://doi.org/10.1109/TIFS.2016.2528500https://dblp.org/rec/journals/tifs/YuRW16URL#3185315Mohsen ZandiAhmad Mahmoudi AznavehAlireza TalebpourIterative Copy-Move Forgery Detection Based on a New Interest Point Detector.IEEE Trans. Inf. Forensics Secur.11112499-25122016Journal Articlesclosedjournals/tifs/ZandiAT1610.1109/TIFS.2016.2585118https://doi.org/10.1109/TIFS.2016.2585118https://dblp.org/rec/journals/tifs/ZandiAT16URL#3185316Shaza ZeitouniYossef OrenChristian WachsmannPatrick KoeberlAhmad-Reza SadeghiRemanence Decay Side-Channel: The PUF Case.IEEE Trans. Inf. Forensics Secur.1161106-11162016Journal Articlesclosedjournals/tifs/ZeitouniOWKS1610.1109/TIFS.2015.2512534https://doi.org/10.1109/TIFS.2015.2512534https://dblp.org/rec/journals/tifs/ZeitouniOWKS16URL#3185317Yuan Zhang 0004Qingjun ChenSheng Zhong 0002Privacy-Preserving Data Aggregation in Mobile Phone Sensing.IEEE Trans. Inf. Forensics Secur.115980-9922016Journal Articlesclosedjournals/tifs/ZhangCZ1610.1109/TIFS.2016.2515513https://doi.org/10.1109/TIFS.2016.2515513https://dblp.org/rec/journals/tifs/ZhangCZ16URL#3185318Fan Zhang 0010Shize GuoXinjie Zhao 0001Tao Wang 0008Jian Yang 0018François-Xavier StandaertDawu GuA Framework for the Analysis and Evaluation of Algebraic Fault Attacks on Lightweight Block Ciphers.IEEE Trans. Inf. Forensics Secur.1151039-10542016Journal Articlesclosedjournals/tifs/ZhangGZWYSG1610.1109/TIFS.2016.2516905https://doi.org/10.1109/TIFS.2016.2516905https://dblp.org/rec/journals/tifs/ZhangGZWYSG16URL#3185319Meng Zhang 0013Yuan Liu 0001Energy Harvesting for Physical-Layer Security in OFDMA Networks.IEEE Trans. Inf. Forensics Secur.111154-1622016Journal Articlesclosedjournals/tifs/ZhangL1610.1109/TIFS.2015.2481797https://doi.org/10.1109/TIFS.2015.2481797https://dblp.org/rec/journals/tifs/ZhangL16URL#3185320Jiliang Zhang 0002Gang Qu 0001Rebuttal to "Comments on 'A PUF-FSM Binding Scheme for FPGA IP Protection and Pay-Per-Device Licensing"'.IEEE Trans. Inf. Forensics Secur.11112626-26272016Journal Articlesclosedjournals/tifs/ZhangQ1610.1109/TIFS.2016.2553443https://doi.org/10.1109/TIFS.2016.2553443https://dblp.org/rec/journals/tifs/ZhangQ16URL#3185321Yuan Zhang 0004Wei TongSheng Zhong 0002On Designing Satisfaction-Ratio-Aware Truthful Incentive Mechanisms for k-Anonymity Location Privacy.IEEE Trans. Inf. Forensics Secur.11112528-25412016Journal Articlesclosedjournals/tifs/ZhangTZ1610.1109/TIFS.2016.2587241https://doi.org/10.1109/TIFS.2016.2587241https://dblp.org/rec/journals/tifs/ZhangTZ16URL#3185322Jingwen ZhangFanggang WangOctavia A. DobreZhangdui ZhongSpecific Emitter Identification via Hilbert-Huang Transform in Single-Hop and Relaying Scenarios.IEEE Trans. Inf. Forensics Secur.1161192-12052016Journal Articlesclosedjournals/tifs/ZhangWDZ1610.1109/TIFS.2016.2520908https://doi.org/10.1109/TIFS.2016.2520908https://dblp.org/rec/journals/tifs/ZhangWDZ16URL#3185323Mengyuan Zhang 0001Lingyu Wang 0001Sushil JajodiaAnoop SinghalMassimiliano AlbaneseNetwork Diversity: A Security Metric for Evaluating the Resilience of Networks Against Zero-Day Attacks.IEEE Trans. Inf. Forensics Secur.1151071-10862016Journal Articlesclosedjournals/tifs/ZhangWJSA1610.1109/TIFS.2016.2516916https://doi.org/10.1109/TIFS.2016.2516916https://dblp.org/rec/journals/tifs/ZhangWJSA16URL#3185324Hang Zhang 0013Tianyu Wang 0001Lingyang SongZhu Han 0001Interference Improves PHY Security for Cognitive Radio Networks.IEEE Trans. Inf. Forensics Secur.113609-6202016Journal Articlesclosedjournals/tifs/ZhangWSH1610.1109/TIFS.2015.2500184https://doi.org/10.1109/TIFS.2015.2500184https://dblp.org/rec/journals/tifs/ZhangWSH16URL#3185325Yuan Zhang 0009Min Yang 0002Guofei GuHao Chen 0003Rethinking Permission Enforcement Mechanism on Mobile Systems.IEEE Trans. Inf. Forensics Secur.11102227-22402016Journal Articlesclosedjournals/tifs/ZhangYG01610.1109/TIFS.2016.2581304https://doi.org/10.1109/TIFS.2016.2581304https://dblp.org/rec/journals/tifs/ZhangYG016URL#3185326Jun Zhang 0023Chau YuenChao-Kai WenShi Jin 0002Kai-Kit WongHongbo Zhu 0002Large System Secrecy Rate Analysis for SWIPT MIMO Wiretap Channels.IEEE Trans. Inf. Forensics Secur.11174-852016Journal Articlesclosedjournals/tifs/ZhangYWJWZ1610.1109/TIFS.2015.2477050https://doi.org/10.1109/TIFS.2015.2477050https://dblp.org/rec/journals/tifs/ZhangYWJWZ16URL#3185327Yuan Zhang 0004He ZhangSiyuan TangSheng Zhong 0002Designing Secure and Dependable Mobile Sensing Mechanisms With Revenue Guarantees.IEEE Trans. Inf. Forensics Secur.111100-1132016Journal Articlesclosedjournals/tifs/ZhangZTZ1610.1109/TIFS.2015.2478739https://doi.org/10.1109/TIFS.2015.2478739https://dblp.org/rec/journals/tifs/ZhangZTZ16URL#3185328Hong ZhaoYifan Chen 0001Rui Wang 0007Hafiz MalikAnti-Forensics of Environmental-Signature-Based Audio Splicing Detection and Its Countermeasure via Rich-Features Classification.IEEE Trans. Inf. Forensics Secur.1171603-16172016Journal Articlesclosedjournals/tifs/ZhaoCWM1610.1109/TIFS.2016.2543205https://doi.org/10.1109/TIFS.2016.2543205https://dblp.org/rec/journals/tifs/ZhaoCWM16URL#3185329Lianying ZhaoMohammad MannanDeceptive Deletion Triggers Under Coercion.IEEE Trans. Inf. Forensics Secur.11122763-27762016Journal Articlesclosedjournals/tifs/ZhaoM1610.1109/TIFS.2016.2598523https://doi.org/10.1109/TIFS.2016.2598523https://dblp.org/rec/journals/tifs/ZhaoM16URL#3185330Qian ZhengAjay Kumar 0001Gang Pan 0001Suspecting Less and Doing Better: New Insights on Palmprint Identification for Faster and More Accurate Matching.IEEE Trans. Inf. Forensics Secur.113633-6412016Journal Articlesclosedjournals/tifs/ZhengKP1610.1109/TIFS.2015.2503265https://doi.org/10.1109/TIFS.2015.2503265https://dblp.org/rec/journals/tifs/ZhengKP16URL#3185331Xinglei ZhuChang Wen ChenA Joint Source-Channel Adaptive Scheme for Wireless H.264/AVC Video Authentication.IEEE Trans. Inf. Forensics Secur.111141-1532016Journal Articlesclosedjournals/tifs/ZhuC1610.1109/TIFS.2015.2481366https://doi.org/10.1109/TIFS.2015.2481366https://dblp.org/rec/journals/tifs/ZhuC16URL#3185332Wen Tao ZhuJingqiang LinGenerating Correlated Digital Certificates: Framework and Applications.IEEE Trans. Inf. Forensics Secur.1161117-11272016Journal Articlesclosedjournals/tifs/ZhuL1610.1109/TIFS.2016.2516818https://doi.org/10.1109/TIFS.2016.2516818https://dblp.org/rec/journals/tifs/ZhuL16URL#3185333Yu ZhuYan Li 0014Guowang MuShiguang ShanGuodong GuoStill-to-Video Face Matching Using Multiple Geodesic Flows.IEEE Trans. Inf. Forensics Secur.11122866-28752016Journal Articlesclosedjournals/tifs/ZhuLMSG1610.1109/TIFS.2016.2601060https://doi.org/10.1109/TIFS.2016.2601060https://dblp.org/rec/journals/tifs/ZhuLMSG16URL#3185334Hassan Zivari-FardBahareh AkhbariMahmoud Ahmadian-AttariMohammad Reza ArefImperfect and Perfect Secrecy in Compound Multiple Access Channel With Confidential Message.IEEE Trans. Inf. Forensics Secur.1161239-12512016Journal Articlesclosedjournals/tifs/Zivari-FardAAA1610.1109/TIFS.2016.2523813https://doi.org/10.1109/TIFS.2016.2523813https://dblp.org/rec/journals/tifs/Zivari-FardAAA16URL#3185335