2477 | -- | 2491 | Kanoksak Wattanachote, Timothy K. Shih, Wen-Lung Chang, Hon-Hang Chang. Tamper Detection of JPEG Image Due to Seam Modifications |
2492 | -- | 2501 | Adam C. Polak, Dennis L. Goeckel. Wireless Device Identification Based on RF Oscillator Imperfections |
2502 | -- | 2514 | Jinguang Han, Willy Susilo, Yi Mu, Man Ho Au, Jie Cao. AAC-OT: Accountable Oblivious Transfer With Access Control |
2515 | -- | 2530 | Zhen Ling, Junzhou Luo, Kui Wu, Wei Yu, Xinwen Fu. TorWard: Discovery, Blocking, and Traceback of Malicious Traffic Over Tor |
2531 | -- | 2546 | Holger Boche, Rafael F. Schaefer, H. Vincent Poor. On the Continuity of the Secrecy Capacity of Compound and Arbitrarily Varying Wiretap Channels |
2547 | -- | 2561 | He Sun, Kun Sun, Yuewu Wang, Jiwu Jing. Reliable and Trustworthy Memory Acquisition on Smartphones |
2562 | -- | 2577 | Jafar Haadi Jafarian, Ehab Al-Shaer, Qi Duan. An Effective Address Mutation Approach for Disrupting Reconnaissance Attacks |
2578 | -- | 2590 | Liang Xiao 0003, Jinliang Liu, Qiangda Li, Narayan B. Mandayam, H. Vincent Poor. User-Centric View of Jamming Games in Cognitive Radio Networks |
2591 | -- | 2604 | Smita Naval, Vijay Laxmi, Muttukrishnan Rajarajan, Manoj Singh Gaur, Mauro Conti. Employing Program Semantics for Malware Detection |
2605 | -- | 2615 | Roneel V. Sharan, Tom J. Moir. Subband Time-Frequency Image Texture Features for Robust Audio Surveillance |
2616 | -- | 2626 | Jiao Jiao Jiang, Sheng Wen, Shui Yu, Yang Xiang, Wanlei Zhou. K-Center: An Approach on the Multi-Source Identification of Information Diffusion |
2627 | -- | 2642 | Rémi Cogranne, Jessica J. Fridrich. Modeling and Extending the Ensemble Classifier for Steganalysis of Digital Images Using Hypothesis Testing Theory |
2643 | -- | 2652 | Rongmao Chen, Yi Mu, Guomin Yang, Fuchun Guo. BL-MLE: Block-Level Message-Locked Encryption for Secure Large File Deduplication |
2653 | -- | 2668 | Iluminada Baturone, Miguel A. Prada-Delgado, Susana Eiroa. Improved Generation of Identifiers, Secret Keys, and Random Numbers From SRAMs |
2669 | -- | 2680 | Linjie Guo, Jiangqun Ni, Wenkang Su, Chengpei Tang, Yun-Qing Shi. Using Statistical Image Model for JPEG Steganography: Uniform Embedding Revisited |
2681 | -- | 2691 | Debiao He, Sherali Zeadally, Baowen Xu, Xinyi Huang. An Efficient Identity-Based Conditional Privacy-Preserving Authentication Scheme for Vehicular Ad Hoc Networks |
2692 | -- | 2704 | Yonggang Huang, Jun Zhang, Heyan Huang. Camera Model Identification With Unknown Models |