5 | -- | 15 | Jun Zhang, Chao Chen, Yang Xiang, Wanlei Zhou, Yong Xiang. Internet Traffic Classification by Aggregating Correlated Naive Bayes Predictions |
16 | -- | 30 | Chao Shen, Zhongmin Cai, Xiaohong Guan, Youtian Du, Roy A. Maxion. User Authentication Through Mouse Dynamics |
31 | -- | 45 | Alessandra A. Paulino, Jianjiang Feng, Anil K. Jain. Latent Fingerprint Matching Using Descriptor-Based Hough Transform |
46 | -- | 54 | Luís Filipe da Cruz Nassif, Eduardo R. Hruschka. Document Clustering for Forensic Analysis: An Approach for Improving Computer Inspection |
55 | -- | 63 | Yan Zhao, Shuozhong Wang, Xinpeng Zhang, Heng Yao. Robust Hashing for Image Authentication Using Zernike Moments and Local Features |
64 | -- | 75 | Yazhuo Gong, David Zhang, Pengfei Shi, Jingqi Yan. An Optimized Wavelength Band Selection for Heavily Pigmented Iris Recognition |
76 | -- | 88 | Zhen Liu, Zhenfu Cao, Duncan S. Wong. White-Box Traceable Ciphertext-Policy Attribute-Based Encryption Supporting Any Monotone Access Structures |
89 | -- | 100 | Himanshu S. Bhatt, Samarth Bharadwaj, Richa Singh, Mayank Vatsa. Recognizing Surgically Altered Face Images Using Multiobjective Evolutionary Algorithm |
101 | -- | 110 | Patrick Chi Kwong Chan, Lucas Chi Kwong Hui, Siu-Ming Yiu. Heap Graph Based Software Theft Detection |
111 | -- | 120 | Gouenou Coatrieux, Wei Pan, Nora Cuppens-Boulahia, Frédéric Cuppens, Christian Roux. Reversible Watermarking Based on Invariant Image Classification and Dynamic Histogram Shifting |
121 | -- | 135 | Stefanos Zafeiriou, Gary A. Atkinson, Mark F. Hansen, William A. P. Smith, Vasileios Argyriou, Maria Petrou, Melvyn L. Smith, Lyndon N. Smith. Face Recognition and Verification Using Photometric Stereo: The Photoface Database and a Comprehensive Evaluation |
136 | -- | 148 | Mario Frank, Ralf Biedert, Eugene Ma, Ivan Martinovic, Dawn Song. Touchalytics: On the Applicability of Touchscreen Input as a Behavioral Biometric for Continuous Authentication |
149 | -- | 162 | Ghassan Karame, Boris Danev, Cyrill Bannwart, Srdjan Capkun. On the Security of End-to-End Measurements Based on Packet-Pair Dispersions |
163 | -- | 173 | Roberto Di Pietro, Gabriele Oligeri. COKE Crypto-Less Over-the-Air Key Establishment |
174 | -- | 183 | Neil J. Grabham, Matthew A. Swabey, Paul Chambers, Mark E. Lutman, Neil M. White, John E. Chad, Stephen P. Beeby. An Evaluation of Otoacoustic Emissions as a Biometric |
184 | -- | 190 | Ke Cui, Jian Wang, Hong-Fei Zhang, Chun-Li Luo, Ge Jin, Teng-Yun Chen. A Real-Time Design Based on FPGA for Expeditious Error Reconciliation in QKD System |
191 | -- | 204 | Hu Han, Brendan Klare, Kathryn Bonnen, Anil K. Jain. Matching Composite Sketches to Face Photos: A Component-Based Approach |
205 | -- | 215 | Erfan Soltanmohammadi, Mahdi Orooji, Mort Naraghi-Pour. Decentralized Hypothesis Testing in Wireless Sensor Networks in the Presence of Misbehaving Nodes |
216 | -- | 228 | Chunfang Yang, Fenlin Liu, Xiangyang Luo, Ying Zeng. Pixel Group Trace Model-Based Quantitative Steganalysis for Multiple Least-Significant Bits Steganography |
229 | -- | 238 | Hang Long, Wei Xiang, Yueying Zhang, Yuanan Liu, Wenbo Wang 0007. Secrecy Capacity Enhancement With Distributed Precoding in Multirelay Wiretap Systems |
239 | -- | 253 | Kathryn Bonnen, Brendan Klare, Anil K. Jain. Component-Based Representation in Automated Face Recognition |
254 | -- | 259 | Nan (Jonas) Yang, Himal A. Suraweera, Iain B. Collings, Chau Yuen. Physical Layer Security of TAS/MRC With Antenna Correlation |
260 | -- | 267 | Asem A. Othman, Arun Ross. On Mixing Fingerprints |