Journal: IEEE Transactions on Information Forensics and Security

Volume 13, Issue 9

2137 -- 2150Mario Preishuber, Thomas Hütter, Stefan Katzenbeisser 0001, Andreas Uhl. Depreciating Motivation and Empirical Security Analysis of Chaos-Based Image and Video Encryption
2151 -- 2166Xuebin Ren, Chia-Mu Yu, Weiren Yu, Shusen Yang, Xinyu Yang, Julie A. McCann, Philip S. Yu. LoPub: High-Dimensional Crowdsourced Data Publication With Local Differential Privacy
2167 -- 2178Peiyun Zhang, Yang Kong, MengChu Zhou. A Domain Partition-Based Trust Model for Unreliable Clouds
2179 -- 2189Da Luo, Pawel Korus, Jiwu Huang. Band Energy Difference for Source Attribution in Audio Forensics
2190 -- 2202Tarang Chugh, Kai Cao 0001, Anil K. Jain 0001. Fingerprint Spoof Buster: Use of Minutiae-Centered Patches
2203 -- 2215Samet Akcay, Mikolaj E. Kundegorski, Chris G. Willcocks, Toby P. Breckon. Using Deep Convolutional Neural Network Architectures for Object Classification and Detection Within X-Ray Baggage Security Imagery
2216 -- 2225Jake B. Perazzone, Paul L. Yu, Brian M. Sadler, Rick S. Blum. Cryptographic Side-Channel Signaling and Authentication via Fingerprint Embedding
2226 -- 2239Mohammad Mahdi Khalili, Parinaz Naghizadeh, Mingyan Liu. Designing Cyber Insurance Policies: The Role of Pre-Screening and Security Interdependence
2240 -- 2255Xuan Zha, Wei Ni, Xu Wang 0004, Ren Ping Liu, Y. Jay Guo, Xinxin Niu, Kangfeng Zheng. The Impact of Link Duration on the Integrity of Distributed Mobile Networks
2256 -- 2268Muhammad R. A. Khandaker, Christos Masouros, Kai-Kit Wong. Constructive Interference Based Secure Precoding: A New Dimension in Physical Layer Security
2269 -- 2278Kuo Cao, Yueming Cai, Yongpeng Wu, Weiwei Yang. Secure Communication for Amplify-and-Forward Relay Networks With Finite Alphabet Input
2279 -- 2293Yanling Chen, Onur Ozan Koyluoglu, A. J. Han Vinck. Collective Secrecy Over the K-Transmitter Multiple Access Channel
2294 -- 2309Parthajit Mohapatra, Nikolaos Pappas, Jemin Lee, Tony Q. S. Quek, Vangelis Angelakis. Secure Communications for the Two-User Broadcast Channel With Random Traffic
2310 -- 2319Si-Hyeon Lee, Ligong Wang, Ashish Khisti, Gregory W. Wornell. Covert Communication With Channel-State Information at the Transmitter
2320 -- 2332Minxin Du, Qian Wang 0002, Meiqi He, Jian Weng. Privacy-Preserving Indexing and Query Processing for Secure Dynamic Cloud Storage
2333 -- 2344Sujit Rokka Chhetri, Sina Faezi, Mohammad Abdullah Al Faruque. Information Leakage-Aware Computer-Aided Cyber-Physical Manufacturing
2345 -- 2358Ning Zhang, Ruide Zhang, Kun Sun, Wenjing Lou, Y. Thomas Hou, Sushil Jajodia. Memory Forensic Challenges Under Misused Architectural Features
2359 -- 2371Zhangjie Fu, Lili Xia, Xingming Sun, Alex X. Liu, Guowu Xie. Semantic-Aware Searching Over Encrypted Data for Cloud Computing
2372 -- 2382Zi-xing Lin, Fei Peng, Min Long. A Low-Distortion Reversible Watermarking for 2D Engineering Graphics Based on Region Nesting
2383 -- 2392Haoxi Li, Haifeng Hu 0001, Chitung Yip. Age-Related Factor Guided Joint Task Modeling Convolutional Neural Network for Cross-Age Face Recognition
2393 -- 2403Yuqiao Cheng, Zhengxin Fu, Bin Yu. Improved Visual Secret Sharing Scheme for QR Code Applications

Volume 13, Issue 8

1875 -- 1889Azzam Al-Nahari, Giovanni Geraci, Mukarram Al-jamali, Mohamed Hossam Ahmed, Nan Yang. Beamforming With Artificial Noise for Secure MISOME Cognitive Radio Transmissions
1890 -- 1905Ming Fan, Jun Liu 0002, Xiapu Luo, Kai Chen, Zhenzhou Tian, Qinghua Zheng, Ting Liu. Android Malware Familial Classification and Representative Sample Selection via Frequent Subgraph Analysis
1906 -- 1916Xueqing Gong, Ping Hu, Kenneth W. Shum, Chi Wan Sung. A Zigzag-Decodable Ramp Secret Sharing Scheme
1917 -- 1931Xiaoyong Li 0003, Jie Yuan, Huadong Ma, Wenbin Yao. Fast and Parallel Trust Computing Scheme Based on Big Data Analysis for Collaboration Cloud Service
1932 -- 1944Yuanfang Guo, Xiaochun Cao, Wei Zhang, Rui Wang. Fake Colorized Image Detection
1945 -- 1959Onur Günlü, Kittipong Kittichokechai, Rafael F. Schaefer, Giuseppe Caire. Controllable Identifier Measurements for Private Authentication With Secret Keys
1960 -- 1974Andrea Valsecchi, Sergio Damas, Oscar Cordón. A Robust and Efficient Method for Skull-Face Overlay in Computerized Craniofacial Superimposition
1975 -- 1988M. Francisca Hinarejos, Florina Almenarez, Patricia Arias Cabarcos, Josep Lluís Ferrer-Gomila, Andrés Marín López. RiskLaine: A Probabilistic Approach for Assessing Risk in Certificate-Based Security
1989 -- 2000Waziha Kabir, M. Omair Ahmad, M. N. S. Swamy. Normalization and Weighting Techniques Based on Genuine-Impostor Score Fusion in Multi-Biometric Systems
2001 -- 2014Ester Gonzalez-Sosa, Julian Fiérrez, Rubén Vera-Rodríguez, Fernando Alonso-Fernandez. Facial Soft Biometrics for Recognition in the Wild: Recent Works, Annotation, and COTS Evaluation
2015 -- 2030Mehmet Necip Kurt, Yasin Yilmaz, Xiaodong Wang 0001. Distributed Quickest Detection of Cyber-Attacks in Smart Grid
2031 -- 2046Po-Yen Lee, Chia-Mu Yu, Tooska Dargahi, Mauro Conti, Giuseppe Bianchi 0001. MDSClone: Multidimensional Scaling Aided Clone Detection in Internet of Things
2047 -- 2061Zhuo Tang, Xiaofei Ding, Ying Zhong, Li Yang, Keqin Li 0001. A Self-Adaptive Bell-LaPadula Model Based on Model Training With Historical Access Logs
2062 -- 2074Kaiping Xue, Weikeng Chen, Wei Li, Jianan Hong, Peilin Hong. Combining Data Owner-Side and Cloud-Side Access Control for Encrypted Cloud Storage
2075 -- 2086Nima Tavangaran, Rafael F. Schaefer, H. Vincent Poor, Holger Boche. Secret-Key Generation and Convexity of the Rate Region Using Infinite Compound Sources
2087 -- 2100Heejung Yu, Taejoon Kim, Hamid Jafarkhani. Wireless Secure Communication With Beamforming and Jamming in Time-Varying Wiretap Channels
2101 -- 2113Shengmin Xu, Guomin Yang, Yi Mu, Robert H. Deng. Secure Fine-Grained Access Control and Data Sharing for Dynamic Groups in the Cloud
2114 -- 2129Wonsuk Choi, Kyungho Joo, Hyo Jin Jo, Moon Chan Park, Dong Hoon Lee 0001. VoltageIDS: Low-Level Communication Characteristics for Automotive Intrusion Detection System

Volume 13, Issue 7

1603 -- 1614Sharad Joshi, Nitin Khanna. Single Classifier-Based Passive System for Source Printer Classification Using Local Texture Features
1615 -- 1625Farhang Bayat, Shuangqing Wei. Non-Adaptive Sequential Detection of Active Edge-Wise Disjoint Subgraphs Under Privacy Constraints
1626 -- 1640Yichun Shi, Charles Otto, Anil K. Jain 0001. Face Clustering: Representation and Pairwise Constraints
1641 -- 1655Holger Boche, Christian Deppe. Secure Identification for Wiretap Channels; Robustness, Super-Additivity and Continuity
1656 -- 1669Jiahui Hou, Xiang-Yang Li, Taeho Jung, Yu Wang 0003, Daren Zheng. CASTLE: Enhancing the Utility of Inequality Query Auditing Without Denial Threats
1670 -- 1681Pauline Puteaux, William Puech. An Efficient MSB Prediction-Based Method for High-Capacity Reversible Data Hiding in Encrypted Images
1682 -- 1695Christos Liaskos, Sotiris Ioannidis. Network Topology Effects on the Detectability of Crossfire Attacks
1696 -- 1709Alireza Sepas-Moghaddam, Fernando Pereira 0001, Paulo Lobato Correia. Light Field-Based Face Presentation Attack Detection: Reviewing, Benchmarking and One Step Further
1710 -- 1721Luca Calderoni, Paolo Palmieri 0001, Dario Maio. Probabilistic Properties of the Spatial Bloom Filters and Their Relevance to Cryptographic Protocols
1722 -- 1735Nam Yul Yu. Indistinguishability and Energy Sensitivity of Gaussian and Bernoulli Compressed Encryption
1736 -- 1751Peng Xu 0002, Zhiguo Ding, Xuchu Dai. Achievable Secrecy Rates for Relay-Eavesdropper Channel Based on the Application of Noisy Network Coding
1752 -- 1761Pei Luo, Konstantinos Athanasiou, Yunsi Fei, Thomas Wahl. Algebraic Fault Analysis of SHA-3 Under Relaxed Fault Models
1762 -- 1777Owen Mayer, Matthew C. Stamm. Accurate and Efficient Image Forgery Detection Using Lateral Chromatic Aberration
1778 -- 1793Dongyang Xu, Pinyi Ren, James A. Ritcey, Yichen Wang 0002. Code-Frequency Block Group Coding for Anti-Spoofing Pilot Authentication in Multi-Antenna OFDM Systems
1794 -- 1809Haoliang Li, Wen Li, Hong Cao, Shiqi Wang, Feiyue Huang, Alex C. Kot. Unsupervised Domain Adaptation for Face Anti-Spoofing
1810 -- 1822Majid Komeili, Narges Armanfard, Dimitrios Hatzinakos. Liveness Detection and Automatic Template Updating Using Fusion of ECG and Fingerprint
1823 -- 1837Yueqi Duan, Jiwen Lu, Jianjiang Feng, Jie Zhou 0001. Topology Preserving Structural Matching for Automatic Partial Face Recognition
1838 -- 1853Jing Zheng, Qi Li 0002, Guofei Gu, Jiahao Cao, David K. Y. Yau, Jianping Wu. Realtime DDoS Defense Using COTS SDN Switches via Adaptive Correlation Analysis
1854 -- 1868Zinan Lin, Yongfeng Huang, Jilong Wang. RNN-SM: Fast Steganalysis of VoIP Streams Using Recurrent Neural Network
1869 -- 1870Caixue Zhou. Comments on "Light-Weight and Robust Security-Aware D2D-Assist Data Transmission Protocol for Mobile-Health Systems"

Volume 13, Issue 6

1351 -- 1360Haowei Wang, Xiaofeng Tao, Na Li, Zhu Han. Polar Coding for the Wiretap Channel With Shared Key
1361 -- 1375Hussain M. J. Almohri, Layne T. Watson, David Evans. Misery Digraphs: Delaying Intrusion Attacks in Obscure Clouds
1376 -- 1391Yongzhi Wang, Yulong Shen, Xiaohong Jiang. Practical Verifiable Computation-A MapReduce Case Study
1392 -- 1405Pramuditha Perera, Vishal M. Patel. Efficient and Low Latency Detection of Intruders in Mobile Active Authentication
1406 -- 1420Marta Gomez-Barrero, Javier Galbally, Christian Rathgeb, Christoph Busch. General Framework to Evaluate Unlinkability in Biometric Template Protection Systems
1421 -- 1431Christian Galea, Reuben A. Farrugia. Matching Software-Generated Sketches to Face Photographs With a Very Deep CNN, Morphed Faces, and Transfer Learning
1432 -- 1445Hao Wu, Wei Wang. A Game Theory Based Collaborative Security Detection Method for Internet of Things Systems
1446 -- 1459Elizabeth Hou, Kumar Sricharan, Alfred O. Hero III. Latent Laplacian Maximum Entropy Discrimination for Detection of High-Utility Anomalies
1460 -- 1467Baocang Wang, Yu Zhan, Zhili Zhang. Cryptanalysis of a Symmetric Fully Homomorphic Encryption Scheme
1468 -- 1480Florian Wilde, Berndt M. Gammel, Michael Pehl. Spatial Correlation Analysis on Physical Unclonable Functions
1481 -- 1494Carmen Campomanes-Alvarez, Ruben Martos-Fernandez, Caroline Wilkinson, Óscar Ibáñez, Oscar Cordón. Modeling Skull-Face Anatomical/Morphological Correspondence for Craniofacial Superimposition-Based Identification
1495 -- 1508Gábor Fodor, Peter Schelkens, Ann Dooms. Fingerprinting Codes Under the Weak Marking Assumption
1509 -- 1523Xiushan Nie, Xiaoyu Li, Yane Chai, Chaoran Cui, Xiaoming Xi, Yilong Yin. Robust Image Fingerprinting Based on Feature Point Relationship Mining
1524 -- 1534Xiaofan He, Richeng Jin, Huaiyu Dai. Leveraging Spatial Diversity for Privacy-Aware Location-Based Services in Mobile Networks
1535 -- 1550Jinku Li, Xiaomeng Tong, Fengwei Zhang, Jianfeng Ma. Fine-CFI: Fine-Grained Control-Flow Integrity for Operating System Kernels
1551 -- 1563AmirEmad Ghassami, Negar Kiyavash. A Covert Queueing Channel in FCFS Schedulers
1564 -- 1578Joshua J. Engelsma, Sunpreet S. Arora, Anil K. Jain 0001, Nicholas G. Paulter. Universal 3D Wearable Fingerprint Targets: Advancing Fingerprint Reader Evaluations
1579 -- 1594Ning Xie, Changsheng Chen. Slope Authentication at the Physical Layer
1595 -- 0Zi Li, Qingqi Pei, Ian D. Markwood, Yao Liu 0007, Haojin Zhu. Corrections to "Secret Key Establishment via RSS Trajectory Matching Between Wearable Devices" [Mar 18 802-817]

Volume 13, Issue 5

1081 -- 1095Zhongliu Zhuo, Yang Zhang, Zhi-Li Zhang, Xiaosong Zhang, Jingzhong Zhang. Website Fingerprinting Attack on Anonymity Networks Based on Profile Hidden Markov Model
1096 -- 1109Shanshan Wang, Qiben Yan, Zhenxiang Chen, Bo Yang 0001, Chuan Zhao, Mauro Conti. Detecting Android Malware Leveraging Text Semantics of Network Flows
1110 -- 1122Harjinder Singh Lallie, Kurt Debattista, Jay Bal. An Empirical Evaluation of the Effectiveness of Attack Graphs and Fault Trees in Cyber-Attack Perception
1123 -- 1138Emanuele Maiorana, Patrizio Campisi. Longitudinal Evaluation of EEG-Based Biometric Recognition
1139 -- 1154Alfonso Iacovazzi, Sanat Sarda, Daniel Frassinelli, Yuval Elovici. DropWat: An Invisible Network Flow Watermark for Data Exfiltration Traceback
1155 -- 1168Jingyu Hua, Wei Tong, Fengyuan Xu, Sheng Zhong. A Geo-Indistinguishable Location Perturbation Mechanism for Location-Based Services Supporting Frequent Queries
1169 -- 1184Wei Dai, Yarkin Doröz, Yuriy Polyakov, Kurt Rohloff, Hadi Sajjadpour, Erkay Savas, Berk Sunar. Implementation and Evaluation of a Lattice-Based Key-Policy ABE Scheme
1185 -- 1199Suryadipta Majumdar, Taous Madi, Yushun Wang, Yosr Jarraya, Makan Pourzandi, Lingyu Wang 0001, Mourad Debbabi. User-Level Runtime Security Auditing for the Cloud
1200 -- 1214Jishen Zeng, Shunquan Tan, Bin Li, Jiwu Huang. Large-Scale JPEG Image Steganalysis Using Hybrid Deep-Learning Framework
1215 -- 1229Juan Lopez, Nathan C. Liefer, Colin R. Busho, Michael A. Temple. Enhancing Critical Infrastructure and Key Resources (CIKR) Level-0 Physical Process Security Using Field Device Distinct Native Attribute Features
1230 -- 1241Yanqing Yao, Zhoujun Li. Differential Privacy With Bias-Control Limited Sources
1242 -- 1257Bin Li, Zhongpeng Li, Shijun Zhou, Shunquan Tan, Xiaoling Zhang. New Steganalytic Features for Spatial Image Steganography Based on Derivative Filters and Threshold LBP Operator
1258 -- 1270Eduardo José da S. Luz, Gladston J. P. Moreira, Luiz S. Oliveira, William Robson Schwartz, David Menotti. Learning Deep Off-the-Person Heart Biometrics Representations
1271 -- 1285Chuntao Wang, Jiangqun Ni, Xinpeng Zhang, Qiong Huang. Efficient Compression of Encrypted Binary Images Using the Markov Random Field
1286 -- 1300Jing Chen 0003, Chiheng Wang, Ziming Zhao, Kai Chen, RuiYing Du, Gail-Joon Ahn. Uncovering the Face of Android Ransomware: Characterization and Real-Time Detection
1301 -- 1316Weijia Wang, Yu Yu, François-Xavier Standaert, Junrong Liu, Zheng Guo, Dawu Gu. Ridge-Based DPA: Improvement of Differential Power Analysis For Nanoscale Chips
1317 -- 1332Jun Yu, Zhenzhong Kuang, Baopeng Zhang, Wei Zhang, Dan Lin 0001, Jianping Fan 0001. Leveraging Content Sensitiveness and User Trustworthiness to Recommend Fine-Grained Privacy Settings for Social Image Sharing
1333 -- 1345Le Trieu Phong, Yoshinori Aono, Takuya Hayashi 0001, Lihua Wang 0001, Shiho Moriai. Privacy-Preserving Deep Learning via Additively Homomorphic Encryption

Volume 13, Issue 4

823 -- 833Mehdi Boroumand, Jessica J. Fridrich. Applications of Explicit Non-Linear Feature Maps in Steganalysis
834 -- 849Kai Bu, Yingjiu Li. Every Step You Take, I'll Be Watching You: Practical StepAuth-Entication of RFID Paths
850 -- 860S. Mohammad Hosseini, Amir-Hossein Jahangir. An Effective Payload Attribution Scheme for Cybercriminal Detection Using Compressed Bitmap Index Tables and Traffic Downsampling
861 -- 873Lei Tang, Wenxiong Kang, Yuxun Fang. Information Divergence-Based Matching Strategy for Online Signature Verification
874 -- 887Pol Mac Aonghusa, Douglas J. Leith. Plausible Deniability in Web Search - From Detection to Assessment
888 -- 896Hugo Proença, João C. Neves. Deep-PRWIS: Periocular Recognition Without the Iris and Sclera Using Deep Learning Frameworks
897 -- 911Sadhana Jha, Shamik Sural, Vijayalakshmi Atluri, Jaideep Vaidya. Specification and Verification of Separation of Duty Constraints in Attribute-Based Access Control
912 -- 925Jian Shen, Tianqi Zhou, Xiaofeng Chen 0001, Jin Li 0002, Willy Susilo. Anonymous and Traceable Group Data Sharing in Cloud Computing
926 -- 939Zheng Chu, Huan Xuan Nguyen, Giuseppe Caire. Game Theory-Based Resource Allocation for Secure WPCN Multiantenna Multicasting Systems
940 -- 953Meng Shen, Baoli Ma, Liehuang Zhu, Rashid Mijumbi, Xiaojiang Du, Jiankun Hu. Cloud-Based Approximate Constrained Shortest Distance Queries Over Encrypted Graphs With Privacy Protection
954 -- 964André Schaller, Taras Stanko, Boris Skoric, Stefan Katzenbeisser 0001. Eliminating Leakage in Reverse Fuzzy Extractors
965 -- 977Yanxiong Li, Xue Zhang, Xianku Li, Yuhan Zhang, Ji-Chen Yang, Qianhua He. Mobile Phone Clustering From Speech Recordings Using Deep Representation and Spectral Clustering
978 -- 992Wei-Che Wang, Yair Yona, Suhas N. Diggavi, Puneet Gupta. Design and Analysis of Stability-Guaranteed PUFs
993 -- 1007Linyuan Zhang, Guoru Ding, QiHui Wu, Zhu Han. Spectrum Sensing Under Spectrum Misuse Behaviors: A Multi-Hypothesis Test Perspective
1008 -- 1017Matteo Ferrara, Annalisa Franco, Davide Maltoni. Face Demorphing
1018 -- 1030Zhiyong Su, Ying Ye, Qi Zhang, Weiqing Li, Yuewei Dai. Robust 2D Engineering CAD Graphics Hashing for Joint Topology and Geometry Authentication via Covariance-Based Descriptors
1031 -- 1041Darren Hurley-Smith, Julio Hernandez-Castro. Certifiably Biased: An In-Depth Analysis of a Common Criteria EAL4+ Certified TRNG
1042 -- 1057Hasini Gunasinghe, Elisa Bertino. PrivBioMTAuth: Privacy Preserving Biometrics-Based and User Centric Protocol for User Authentication From Mobile Phones
1058 -- 1071Jiachun Liao, Lalitha Sankar, Vincent Y. F. Tan, Flávio du Pin Calmon. Hypothesis Testing Under Mutual Information Privacy Constraints in the High Privacy Regime

Volume 13, Issue 3

545 -- 558Shukun Yang, Shouling Ji, Raheem A. Beyah. DPPG: A Dynamic Password Policy Generation System
559 -- 573Chenxu Wang, TungNgai Miu, Xiapu Luo, Jinhe Wang. SkyShield: A Sketch-Based Defense System Against Application Layer DDoS Attacks
574 -- 589Jun Du, Chunxiao Jiang, Kwang-Cheng Chen, Yong Ren, H. Vincent Poor. Community-Structured Evolutionary Game for Privacy Protection in Social Networks
590 -- 604Marc Sánchez Artigas. Enhancing Tree-Based ORAM Using Batched Request Reordering
605 -- 620Baki Berkay Yilmaz, Robert Locke Callan, Milos Prvulovic, Alenka G. Zajic. Capacity of the EM Covert/Side-Channel Created by the Execution of Instructions in a Processor
621 -- 636Muhamad Erza Aminanto, Rakyong Choi, Harry Chandra Tanuwidjaja, Paul D. Yoo, Kwangjo Kim. Deep Abstraction and Weighted Feature Selection for Wi-Fi Impersonation Detection
637 -- 647Shu Zhang, Ran He, Zhenan Sun, Tieniu Tan. DeMeshNet: Blind Face Inpainting for Deep MeshFace Verification
648 -- 661Takashi Nakamura, Valentin Goverdovsky, Danilo P. Mandic. In-Ear EEG Biometrics for Feasible and Readily Collectable Real-World Person Authentication
662 -- 670Hao Dong, Chao Wu, Zhen Wei, Yike Guo. Dropping Activation Outputs With Localized First-Layer Deep Network for Enhancing User Privacy and Data Security
671 -- 684Jingran Lin, Qiang Li, Jintai Yang, Huaizong Shao, Wen-Qin Wang. Physical-Layer Security for Proximal Legitimate User and Eavesdropper: A Frequency Diverse Array Beamforming Approach
685 -- 694Vaishakh Ravindrakumar, Parthasarathi Panda, Nikhil Karamchandani, Vinod M. Prabhakaran. Private Coded Caching
695 -- 705Shuhua Deng, Xing Gao, Zebin Lu, Xieping Gao. Packet Injection Attack and Its Defense in Software-Defined Networks
706 -- 716Nawaf Yousef Almudhahka, Mark S. Nixon, Jonathon S. Hare. Semantic Face Signatures: Recognizing and Retrieving Faces by Verbal Descriptions
717 -- 732Xiaoke Zhu, Xiao-Yuan Jing, Xinge You, Wangmeng Zuo, Shiguang Shan, Wei-Shi Zheng. Image to Video Person Re-Identification by Learning Heterogeneous Dictionary Pair With Feature Projection Matrix
733 -- 744Jun Wang, Guoqing Wang, Mei Zhou. Bimodal Vein Data Mining via Cross-Selected-Domain Knowledge Transfer
745 -- 757Yongdong Wu, Binbin Chen, Zhigang Zhao, Yao Cheng. Attack and Countermeasure on Interlock-Based Device Pairing Schemes
758 -- 772Mingxing Duan, Kenli Li, Keqin Li 0001. An Ensemble CNN2ELM for Age Estimation
773 -- 787Bahman Rashidi, Carol J. Fung, Anh Nguyen, Tam Vu, Elisa Bertino. Android User Privacy Preserving Through Crowdsourcing
788 -- 801Jan Kohout, Tomás Pevný. Network Traffic Fingerprinting Based on Approximated Kernel Two-Sample Test
802 -- 817Zi Li, Qingqi Pei, Ian D. Markwood, Yao Liu, Haojin Zhu. Secret Key Establishment via RSS Trajectory Matching Between Wearable Devices

Volume 13, Issue 2

269 -- 279Wei Wang 0100, Kah Chan Teh, Kwok Hung Li, Sheng Luo. On the Impact of Adaptive Eavesdroppers in Multi-Antenna Cellular Networks
280 -- 291Wouter Biesmans, Josep Balasch, Alfredo Rial, Bart Preneel, Ingrid Verbauwhede. Private Mobile Pay-TV From Priced Oblivious Transfer
292 -- 305Hao Liu 0019, Jiwen Lu, Jianjiang Feng, Jie Zhou 0001. Label-Sensitive Deep Metric Learning for Facial Age Estimation
306 -- 317Dong-Hua Chen, Yu-Cheng He, Xiaodan Lin, Rui Zhao. Both Worst-Case and Chance-Constrained Robust Secure SWIPT in MISO Interference Channels
318 -- 326Weichen Xiang, Martin Johnston, Stéphane Y. Le Goff. Low-Complexity Power Control and Energy Harvesting Algorithms for Wiretap Channels Employing Finite-Alphabet Input Schemes
327 -- 340Mauro Mangia, Fabio Pareschi, Riccardo Rovatti, Gianluca Setti. Low-Cost Security of IoT Sensor Nodes With Rakeness-Based Compressed Sensing: Statistical and Known-Plaintext Attacks
341 -- 355Ali Kuhestani, Abbas Mohammadi 0002, MohammadAli Mohammadi. Joint Relay Selection and Power Allocation in Large-Scale MIMO Systems With Untrusted Relays and Passive Eavesdroppers
356 -- 365Manami Sasaki, Yodai Watanabe. Visual Secret Sharing Schemes Encrypting Multiple Images
366 -- 376Lei Xu 0015, Arumugam Nallanathan, Xiaofei Pan, Jian Yang, Wenhe Liao. Security-Aware Resource Allocation With Delay Constraint for NOMA-Based Cognitive Radio Network
377 -- 392Bo Peng 0002, Wei Wang 0025, Jing Dong, Tieniu Tan. Image Forensics Based on Planar Contact Constraints of 3D Objects
393 -- 407Zhe Jin, Jung Yeon Hwang, Yen-Lung Lai, Soohyung Kim, Andrew Beng Jin Teoh. Ranking-Based Locality Sensitive Hashing-Enabled Cancelable Biometrics: Index-of-Max Hashing
408 -- 420Jianhua Liu, Jiadi Yu, Shigen Shen. Energy-Efficient Two-Layer Cooperative Defense Scheme to Secure Sensor-Clouds
421 -- 436Lingxiang Li, Zhi Chen, Athina P. Petropulu, Jun Fang. Linear Precoder Design for an MIMO Gaussian Wiretap Channel With Full-Duplex Source and Destination Nodes
437 -- 448Jeeson Kim, Taimur Ahmed, Hussein Nili, Jiawei Yang, Doo Seok Jeong, Paul Beckett, Sharath Sriram, Damith Chinthana Ranasinghe, Omid Kavehei. A Physical Unclonable Function With Redox-Based Nanoionic Resistive Memory
449 -- 464Ruei-Hau Hsu, Jemin Lee, Tony Q. S. Quek, Jyh-Cheng Chen. GRAAD: Group Anonymous and Accountable D2D Communication in Mobile Networks
465 -- 477Xinwei Qiu, Wenxiong Kang, Senping Tian, Wei Jia, Zhixing Huang. Finger Vein Presentation Attack Detection Using Total Variation Decomposition
478 -- 489Sina Lashgari, Amir Salman Avestimehr. Secrecy DoF of Blind MIMOME Wiretap Channel With Delayed CSIT
490 -- 501Marios O. Choudary, Markus G. Kuhn. Efficient, Portable Template Attacks
502 -- 510Zahra Ahmadian, Sadegh Jamshidpour. Linear Subspace Cryptanalysis of Harn's Secret Sharing-Based Group Authentication Scheme
511 -- 520Meixia Miao, Jianfeng Ma, Xinyi Huang, Qian Wang 0002. Efficient Verifiable Databases With Insertion/Deletion Operations From Delegating Polynomial Functions
521 -- 534Patrick P. K. Chan, Weiwen Liu, Danni Chen, Daniel S. Yeung, Fei Zhang, Xizhao Wang, Chien-Chang Hsu. Face Liveness Detection Using a Flash Against 2D Spoofing Attack

Volume 13, Issue 12

2937 -- 2952Zijing Zhao, Ajay Kumar 0001. Improving Periocular Recognition by Explicit Attention to Critical Regions in Deep Neural Network
2953 -- 2964Heecheol Yang, Wonjae Shin, Jungwoo Lee 0001. Private Information Retrieval for Secure Distributed Storage Systems
2965 -- 2980Pang Du, Zheyuan Sun, Huashan Chen, Jin-Hee Cho, Shouhuai Xu. Statistical Estimation of Malware Detection Metrics in the Absence of Ground Truth
2981 -- 2994Maël Le Treust, Leszek Szczecinski, Fabrice Labeau. Rate Adaptation for Secure HARQ Protocols
2995 -- 3007Zhikun Zhang, Shibo He, Jiming Chen, Junshan Zhang. REAP: An Efficient Incentive Mechanism for Reconciling Aggregation Accuracy and Individual Privacy in Crowdsensing
3008 -- 3018Ming Tang, Pengbo Wang, Ma Xiaoqi, Chang Wenjie, Huanguo Zhang, Guojun Peng, Jean-Luc Danger. An Efficient SCA Leakage Model Construction Method Under Predictable Evaluation
3019 -- 3034Hubert Ritzdorf, Claudio Soriente, Ghassan O. Karame, Srdjan Marinovic, Damian Gruber, Srdjan Capkun. Toward Shared Ownership in the Cloud
3035 -- 3049Wenchang Tang, Feng Ji, Wee-Peng Tay. Estimating Infection Sources in Networks Using Partial Timestamps
3050 -- 3063Kai Zhou, Jian Ren 0001. PassBio: Privacy-Preserving User-Centric Biometric Authentication
3064 -- 3077Lacey Best-Rowden, Anil K. Jain 0001. Learning Face Image Quality From Human Assessments
3078 -- 3093Rong Jin, Kai Zeng 0001. Secure Inductive-Coupled Near Field Communication at Physical Layer
3094 -- 3107Xu Zhang 0004, Edward W. Knightly. Pilot Distortion Attack and Zero-Startup-Cost Detection in Massive MIMO Network: From Analysis to Experiments
3108 -- 3121Yonggang Huang, Longbing Cao, Jun Zhang 0010, Lei Pan 0002, Yuying Liu. Exploring Feature Coupling and Model Coupling for Image Source Identification
3122 -- 3136Shih-Chun Lin, Chien-Chi Liu, Min-Yen Hsieh, Shih-Tang Su, Wei-Ho Chung. Coded Quickest Classification With Applications in Bandwidth-Efficient Smart Grid Monitoring
3137 -- 3152Vincenzo Matta, Mario Di Mauro, Maurizio Longo, Alfonso Farina. Cyber-Threat Mitigation Exploiting the Birth-Death-Immigration Model
3153 -- 3165Zhe Cui, Jianjiang Feng, Shihao Li, Jiwen Lu, Jie Zhou. 2-D Phase Demodulation for Deformable Fingerprint Registration

Volume 13, Issue 11

2677 -- 2690Fei Chen, Donghong Wang, Ronghua Li, Jianyong Chen, Zhong Ming, Alex X. Liu, Huayi Duan, Cong Wang 0001, Jing Qin. Secure Hashing-Based Verifiable Pattern Matching
2691 -- 2706Belhassen Bayar, Matthew C. Stamm. Constrained Convolutional Neural Networks: A New Approach Towards General Purpose Image Manipulation Detection
2707 -- 2719Mohd Fazil, Muhammad Abulaish. A Hybrid Approach for Detecting Automated Spammers in Twitter
2720 -- 2733Julian Fiérrez, Ada Pozo, Marcos Martinez-Diaz, Javier Galbally, Aythami Morales. Benchmarking Touchscreen Biometrics for Mobile Authentication
2734 -- 2745Xiaoning Song, Zhen-Hua Feng, Guosheng Hu, Josef Kittler, Xiao-jun Wu. Dictionary Integration Using 3D Morphable Face Models for Pose-Invariant Collaborative-Representation-Based Classification
2746 -- 2760Yuanwen Huang, Swarup Bhunia, Prabhat Mishra. Scalable Test Generation for Trojan Detection Using Side Channel Analysis
2761 -- 2771Prashanth Krishnamurthy, Farshad Khorrami, Ramesh Karri, David Paul-Pena, Hossein Salehghaffari. Process-Aware Covert Channels Using Physical Instrumentation in Cyber-Physical Systems
2772 -- 2787Weize Quan, Kai Wang, Dong-Ming Yan, Xiaopeng Zhang 0001. Distinguishing Between Natural and Computer-Generated Images Using Convolutional Neural Networks
2788 -- 2800Shihao Yan, Xiangyun Zhou, Nan (Jonas) Yang, Thushara D. Abhayapala, A. Lee Swindlehurst. Secret Channel Training to Enhance Physical Layer Security With a Full-Duplex Receiver
2801 -- 2815Jianfeng Lu 0002, Yun Xin, Zhao Zhang, Xinwang Liu, Kenli Li. Game-Theoretic Design of Optimal Two-Sided Rating Protocols for Service Exchange Dilemma in Crowdsourcing
2816 -- 2830Kousha Kalantari, Lalitha Sankar, Anand D. Sarwate. Robust Privacy-Utility Tradeoffs Under Differential Privacy and Hamming Distortion
2831 -- 2843Prosanta Gope, Jemin Lee, Tony Q. S. Quek. Lightweight and Practical Anonymous Authentication Protocol for RFID Systems Using Physically Unclonable Functions
2844 -- 2855Feng Hao, Roberto Metere, Siamak F. Shahandashti, Changyu Dong. Analyzing and Patching SPEKE in ISO/IEC
2856 -- 2871Maochao Xu, Kristin M. Schweitzer, Raymond M. Bateman, Shouhuai Xu. Modeling and Predicting Cyber Hacking Breaches
2872 -- 2883Onur Günlü, Gerhard Kramer. Privacy, Secrecy, and Storage With Multiple Noisy Measurements of Identifiers
2884 -- 2896Xiang Wu, Ran He, Zhenan Sun, Tieniu Tan. A Light CNN for Deep Face Representation With Noisy Labels
2897 -- 2912Qi Zhang, Haiqing Li, Zhenan Sun, Tieniu Tan. Deep Feature Fusion for Iris and Periocular Biometrics on Mobile Devices
2913 -- 2928Yuan Yang 0003, Zhongmin Cai, Chunyan Wang, Junjie Zhang. Probabilistically Inferring Attack Ramifications Using Temporal Dependence Network
2929 -- 2931Mike Burmester, Jorge Munilla, Andrés Ortiz. Comments on "Unreconciled Collisions Uncover Cloning Attacks in Anonymous RFID Systems"

Volume 13, Issue 10

2409 -- 2422Hongwen Zhang, Qi Li 0005, Zhenan Sun, Yunfan Liu. Combining Data-Driven and Model-Driven Methods for Robust Facial Landmark Detection
2423 -- 2438Lei Xue, Xiaobo Ma, Xiapu Luo, Edmond W. W. Chan, TungNgai Miu, Guofei Gu. LinkScope: Toward Detecting Target Link Flooding Attacks
2439 -- 2447Abdulhadi Shoufan, Haitham M. Al-Angari, Muhammad Faraz Afzal Sheikh, Ernesto Damiani. Drone Pilot Identification by Classifying Radio-Control Signals
2448 -- 2463Shengshan Hu, Minghui Li, Qian Wang 0002, Sherman S. M. Chow, Minxin Du. Outsourced Biometric Identification With Privacy
2464 -- 2474Tamer Mekkawy, Rugui Yao, Theodoros A. Tsiftsis, Fei Xu, Yanan Lu. Joint Beamforming Alignment With Suboptimal Power Allocation for a Two-Way Untrusted Relay Network
2475 -- 2489Yifeng Zheng, Huayi Duan, Cong Wang 0001. Learning the Truth Privately and Confidently: Encrypted Confidence-Aware Truth Discovery in Mobile Crowdsensing
2490 -- 2505Erik Miehling, Mohammad Rasouli 0001, Demosthenis Teneketzis. A POMDP Approach to the Dynamic Defense of Large-Scale Cyber Networks
2506 -- 2521Xiaoyan Sun, Jun Dai, Peng Liu, Anoop Singhal, John Yen. Using Bayesian Networks for Probabilistic Identification of Zero-Day Attack Paths
2522 -- 2537Mengyun Tang, Haichang Gao, Yang Zhang, Yi Liu, Ping Zhang, Ping Wang. Research on Deep Learning Techniques in Breaking Text-Based Captchas and Designing Image-Based Captcha
2538 -- 2552Vivek Venugopal, Suresh Sundaram. Online Writer Identification With Sparse Coding-Based Descriptors
2553 -- 2562Felix Wang, Tu-Thach Quach, Jason Wheeler, James B. Aimone, Conrad D. James. Sparse Coding for N-Gram Feature Extraction and Training for File Fragment Classification
2563 -- 2574Sevil Sen, Emre Aydogan, Ahmet Ilhan Aysan. Coevolution of Mobile Malware and Anti-Malware
2575 -- 2590Amir Ameli, Ali Hooshyar, Ameen Hassan Yazdavar, Ehab F. El-Saadany, Amr Youssef. Attack Detection for Load Frequency Control Systems Using Stochastic Unknown Input Estimators
2591 -- 2601Gorjan Nadzinski, Matej Dobrevski, Christopher Anderson, Peter V. E. McClintock, Aneta Stefanovska, Mile J. Stankovski, Tomislav Stankovski. Experimental Realization of the Coupling Function Secure Communications Protocol and Analysis of Its Noise Robustness
2602 -- 2615Seungkwang Lee, Taesung Kim, YouSung Kang. A Masked White-Box Cryptographic Implementation for Protecting Against Differential Computation Analysis
2616 -- 2627Amir Akhavan, Mohammad Hassan Moradi. Detection of Concealed Information Using Multichannel Discriminative Dictionary and Spatial Filter Learning
2628 -- 2638Quanzhong Li, Liang Yang 0001. Artificial Noise Aided Secure Precoding for MIMO Untrusted Two-Way Relay Systems With Perfect and Imperfect Channel State Information
2639 -- 2652Haoliang Li, Peisong He, Shiqi Wang, Anderson Rocha, Xinghao Jiang, Alex C. Kot. Learning Generalized Deep Feature Representation for Face Anti-Spoofing
2653 -- 2667Na Wang, Junsong Fu, Bharat K. Bhargava, Jiwen Zeng. Efficient Retrieval Over Documents Encrypted by Attributes in Cloud Computing
2668 -- 2669Chen Li, Wenping Ma. Comments on "An Efficient Privacy-Preserving Outsourced Calculation Toolkit With Multiple Keys"

Volume 13, Issue 1

5 -- 0Patrizio Campisi. Editorial
6 -- 19Anh Truong, Seyed Rasoul Etesami, Jalal Etesami, Negar Kiyavash. Optimal Attack Strategies Against Predictors - Learning From Expert Advice
20 -- 34Tarang Chugh, Kai Cao 0001, Jiayu Zhou, Elham Tabassi, Anil K. Jain 0001. Latent Fingerprint Value Prediction: Crowd-Based Learning
35 -- 47Liang Xiao 0003, Yanda Li, Guoan Han, Huaiyu Dai, H. Vincent Poor. A Secure Mobile Crowdsensing Game With Deep Reinforcement Learning
48 -- 62Chao Shen, Yuanxun Li, Yufei Chen, Xiaohong Guan, Roy A. Maxion. Performance Analysis of Multi-Motion Sensor Behavior for Active Smartphone Authentication
63 -- 78Vincent F. Taylor, Riccardo Spolaor, Mauro Conti, Ivan Martinovic. Robust Smartphone App Identification via Encrypted Network Traffic Analysis
79 -- 93Sandhya Koteshwara, Chris H. Kim, Keshab K. Parhi. Key-Based Dynamic Functional Obfuscation of Integrated Circuits Using Sequentially Triggered Mode-Based Design
94 -- 105Jianting Ning, Zhenfu Cao, Xiaolei Dong, Kaitai Liang, Hui Ma, Lifei Wei. Auditable σ-Time Outsourced Attribute-Based Encryption for Access Control in Cloud Computing
106 -- 118Jiangshan Yu, Mark Ryan 0001, Cas Cremers. DECIM: Detecting Endpoint Compromise In Messaging
119 -- 128Nirattaya Khamsemanan, Cholwich Nattee, Nitchan Jianwattanapaisarn. Human Identification From Freestyle Walks Using Posture-Based Gait Feature
129 -- 142Giulio Giaconi, Deniz Gündüz, H. Vincent Poor. Smart Meter Privacy With Renewable Energy and an Energy Storage Device
143 -- 155Joao Sa Sousa, João P. Vilela. Uncoordinated Frequency Hopping for Wireless Secrecy Against Non-Degraded Eavesdroppers
156 -- 169Shan Gu, Jianjiang Feng, Jiwen Lu, Jie Zhou 0001. Efficient Rectification of Distorted Fingerprints
170 -- 185Xinghao Jiang, Peisong He, Tanfeng Sun, Feng Xie, Shilin Wang. Detection of Double Compression With the Same Coding Parameters Based on Quality Degradation Mechanism Analysis
186 -- 196Cong Zuo, Jun Shao, Joseph K. Liu, Guiyi Wei, Yun Ling. Fine-Grained Two-Factor Protection Mechanism for Data Sharing in Cloud Storage
197 -- 209He Fang, Li Xu, Xianbin Wang. Coordinated Multiple-Relays Based Physical-Layer Security Improvement: A Single-Leader Multiple-Followers Stackelberg Game Scheme
210 -- 223Tan Tai Do, Emil Björnson, Erik G. Larsson, S. Mohammad Razavizadeh. Jamming-Resistant Receivers for the Massive MIMO Uplink
224 -- 236Te Sun Han, Hiroyuki Endo, Masahide Sasaki. Wiretap Channels With One-Time State Information: Strong Secrecy
237 -- 252Alessio Zappone, Pin-Hsun Lin, Eduard A. Jorswieck. Optimal Energy-Efficient Design of Confidential Multiple-Antenna Systems
253 -- 264Chris G. Zeinstra, Raymond N. J. Veldhuis, Luuk J. Spreeuwers. Grid-Based Likelihood Ratio Classifiers for the Comparison of Facial Marks