2137 | -- | 2150 | Mario Preishuber, Thomas Hütter, Stefan Katzenbeisser 0001, Andreas Uhl. Depreciating Motivation and Empirical Security Analysis of Chaos-Based Image and Video Encryption |
2151 | -- | 2166 | Xuebin Ren, Chia-Mu Yu, Weiren Yu, Shusen Yang, Xinyu Yang, Julie A. McCann, Philip S. Yu. LoPub: High-Dimensional Crowdsourced Data Publication With Local Differential Privacy |
2167 | -- | 2178 | Peiyun Zhang, Yang Kong, MengChu Zhou. A Domain Partition-Based Trust Model for Unreliable Clouds |
2179 | -- | 2189 | Da Luo, Pawel Korus, Jiwu Huang. Band Energy Difference for Source Attribution in Audio Forensics |
2190 | -- | 2202 | Tarang Chugh, Kai Cao 0001, Anil K. Jain 0001. Fingerprint Spoof Buster: Use of Minutiae-Centered Patches |
2203 | -- | 2215 | Samet Akcay, Mikolaj E. Kundegorski, Chris G. Willcocks, Toby P. Breckon. Using Deep Convolutional Neural Network Architectures for Object Classification and Detection Within X-Ray Baggage Security Imagery |
2216 | -- | 2225 | Jake B. Perazzone, Paul L. Yu, Brian M. Sadler, Rick S. Blum. Cryptographic Side-Channel Signaling and Authentication via Fingerprint Embedding |
2226 | -- | 2239 | Mohammad Mahdi Khalili, Parinaz Naghizadeh, Mingyan Liu. Designing Cyber Insurance Policies: The Role of Pre-Screening and Security Interdependence |
2240 | -- | 2255 | Xuan Zha, Wei Ni, Xu Wang 0004, Ren Ping Liu, Y. Jay Guo, Xinxin Niu, Kangfeng Zheng. The Impact of Link Duration on the Integrity of Distributed Mobile Networks |
2256 | -- | 2268 | Muhammad R. A. Khandaker, Christos Masouros, Kai-Kit Wong. Constructive Interference Based Secure Precoding: A New Dimension in Physical Layer Security |
2269 | -- | 2278 | Kuo Cao, Yueming Cai, Yongpeng Wu, Weiwei Yang. Secure Communication for Amplify-and-Forward Relay Networks With Finite Alphabet Input |
2279 | -- | 2293 | Yanling Chen, Onur Ozan Koyluoglu, A. J. Han Vinck. Collective Secrecy Over the K-Transmitter Multiple Access Channel |
2294 | -- | 2309 | Parthajit Mohapatra, Nikolaos Pappas, Jemin Lee, Tony Q. S. Quek, Vangelis Angelakis. Secure Communications for the Two-User Broadcast Channel With Random Traffic |
2310 | -- | 2319 | Si-Hyeon Lee, Ligong Wang, Ashish Khisti, Gregory W. Wornell. Covert Communication With Channel-State Information at the Transmitter |
2320 | -- | 2332 | Minxin Du, Qian Wang 0002, Meiqi He, Jian Weng. Privacy-Preserving Indexing and Query Processing for Secure Dynamic Cloud Storage |
2333 | -- | 2344 | Sujit Rokka Chhetri, Sina Faezi, Mohammad Abdullah Al Faruque. Information Leakage-Aware Computer-Aided Cyber-Physical Manufacturing |
2345 | -- | 2358 | Ning Zhang, Ruide Zhang, Kun Sun, Wenjing Lou, Y. Thomas Hou, Sushil Jajodia. Memory Forensic Challenges Under Misused Architectural Features |
2359 | -- | 2371 | Zhangjie Fu, Lili Xia, Xingming Sun, Alex X. Liu, Guowu Xie. Semantic-Aware Searching Over Encrypted Data for Cloud Computing |
2372 | -- | 2382 | Zi-xing Lin, Fei Peng, Min Long. A Low-Distortion Reversible Watermarking for 2D Engineering Graphics Based on Region Nesting |
2383 | -- | 2392 | Haoxi Li, Haifeng Hu 0001, Chitung Yip. Age-Related Factor Guided Joint Task Modeling Convolutional Neural Network for Cross-Age Face Recognition |
2393 | -- | 2403 | Yuqiao Cheng, Zhengxin Fu, Bin Yu. Improved Visual Secret Sharing Scheme for QR Code Applications |