Journal: IEEE Transactions on Information Forensics and Security

Volume 13, Issue 12

2937 -- 2952Zijing Zhao, Ajay Kumar 0001. Improving Periocular Recognition by Explicit Attention to Critical Regions in Deep Neural Network
2953 -- 2964Heecheol Yang, Wonjae Shin, Jungwoo Lee 0001. Private Information Retrieval for Secure Distributed Storage Systems
2965 -- 2980Pang Du, Zheyuan Sun, Huashan Chen, Jin-Hee Cho, Shouhuai Xu. Statistical Estimation of Malware Detection Metrics in the Absence of Ground Truth
2981 -- 2994Maƫl Le Treust, Leszek Szczecinski, Fabrice Labeau. Rate Adaptation for Secure HARQ Protocols
2995 -- 3007Zhikun Zhang, Shibo He, Jiming Chen, Junshan Zhang. REAP: An Efficient Incentive Mechanism for Reconciling Aggregation Accuracy and Individual Privacy in Crowdsensing
3008 -- 3018Ming Tang, Pengbo Wang, Ma Xiaoqi, Chang Wenjie, Huanguo Zhang, Guojun Peng, Jean-Luc Danger. An Efficient SCA Leakage Model Construction Method Under Predictable Evaluation
3019 -- 3034Hubert Ritzdorf, Claudio Soriente, Ghassan O. Karame, Srdjan Marinovic, Damian Gruber, Srdjan Capkun. Toward Shared Ownership in the Cloud
3035 -- 3049Wenchang Tang, Feng Ji, Wee-Peng Tay. Estimating Infection Sources in Networks Using Partial Timestamps
3050 -- 3063Kai Zhou, Jian Ren 0001. PassBio: Privacy-Preserving User-Centric Biometric Authentication
3064 -- 3077Lacey Best-Rowden, Anil K. Jain 0001. Learning Face Image Quality From Human Assessments
3078 -- 3093Rong Jin, Kai Zeng 0001. Secure Inductive-Coupled Near Field Communication at Physical Layer
3094 -- 3107Xu Zhang 0004, Edward W. Knightly. Pilot Distortion Attack and Zero-Startup-Cost Detection in Massive MIMO Network: From Analysis to Experiments
3108 -- 3121Yonggang Huang, Longbing Cao, Jun Zhang 0010, Lei Pan 0002, Yuying Liu. Exploring Feature Coupling and Model Coupling for Image Source Identification
3122 -- 3136Shih-Chun Lin, Chien-Chi Liu, Min-Yen Hsieh, Shih-Tang Su, Wei-Ho Chung. Coded Quickest Classification With Applications in Bandwidth-Efficient Smart Grid Monitoring
3137 -- 3152Vincenzo Matta, Mario Di Mauro, Maurizio Longo, Alfonso Farina. Cyber-Threat Mitigation Exploiting the Birth-Death-Immigration Model
3153 -- 3165Zhe Cui, Jianjiang Feng, Shihao Li, Jiwen Lu, Jie Zhou. 2-D Phase Demodulation for Deformable Fingerprint Registration