Abstract is missing.
- Polar code for secure Wyner-Ziv codingMinh Thanh Vu, Tobias J. Oechtering, Mikael Skoglund. 1-6 [doi]
- Scalable secure computation from ANSI-CNiklas Büscher, David Kretzmer, Arnav Jindal, Stefan Katzenbeisser 0001. 1-6 [doi]
- An ensemble of one-class SVMs for fingerprint spoof detection across different fabrication materialsYaohui Ding, Arun Ross. 1-6 [doi]
- Cryptographic randomness on a CC2538: A case studyYan Yan, Elisabeth Oswald, Theo Tryfonas. 1-6 [doi]
- Permissions snapshots: Assessing users' adaptation to the Android runtime permission modelPanagiotis Andriotis, Martina Angela Sasse, Gianluca Stringhini. 1-6 [doi]
- Shared keystroke dataset for continuous authenticationYan Sun, Hayreddin Çeker, Shambhu J. Upadhyaya. 1-6 [doi]
- Effects of text filtering on authentication performance of keystroke biometricsJiaju Huang, Daqing Hou, Stephanie Schuckers, Shambhu Upadhyaya. 1-6 [doi]
- Passive NAT detection using HTTP access logsTomás Komárek, Martin Grill, Tomás Pevný. 1-6 [doi]
- Dynamic content selection-and-prediction framework applied to reversible data hidingHan-Zhou Wu, Hong-Xia Wang, Yun-Qing Shi. 1-6 [doi]
- Multimedia fingerprinting codes resistant against colluders and noiseGrigory Kabatiansky, Marcel Fernandez, Elena Egorova. 1-5 [doi]
- Efficient and secure equality testsMajid Nateghizad, Zekeriya Erkin, Reginald L. Lagendijk. 1-6 [doi]
- Fast content identification in high-dimensional feature spaces using Sparse Ternary CodesSohrab Ferdowsi, Slava Voloshynovskiy, Dimche Kostadinov, Taras Holotyak. 1-6 [doi]
- Topological analysis and visualisation of network monitoring data: Darknet case studyMarc Coudriau, Abdelkader Lahmadi, Jérôme François. 1-6 [doi]
- Anti-forensic technique for median filtering using L1-L2 TV modelShishir Sharma, A. V. Subramanyam, Monika Jain, Ambuj Mehrish, Sabu Emmanuel. 1-6 [doi]
- On the usefulness of color for kinship verification from face imagesXiaoting Wu, Elhocine Boutellaa, Miguel Bordallo López, Xiaoyi Feng, Abdenour Hadid. 1-6 [doi]
- Source camera attribution using stabilized videoSamet Taspinar, Manoranjan Mohanty, Nasir D. Memon. 1-6 [doi]
- Camera model identification with the use of deep convolutional neural networksAmel Tuama, Frédéric Comby, Marc Chaumont. 1-6 [doi]
- Adversary-aware, data-driven detection of double JPEG compression: How to make counter-forensics harderMauro Barni, Zhipeng Chen, Benedetta Tondi. 1-6 [doi]
- Steganography via cover-source switchingPatrick Bas. 1-6 [doi]
- A deep learning approach to detection of splicing and copy-move forgeries in imagesYuan Rao, Jiangqun Ni. 1-6 [doi]
- Image denoising in the encrypted domainAlberto Pedrouzo-Ulloa, Juan Ramón Troncoso-Pastoriza, Fernando Pérez-González. 1-6 [doi]
- Forensic analysis of xbox one and playstation 4 gaming consolesSalam Khanji, Raja Jabir, Farkhund Iqbal, Andrew Marrington. 1-6 [doi]
- Evaluation of random field models in multi-modal unsupervised tampering localizationPawel Korus, Jiwu Huang. 1-6 [doi]
- A residual feature-based replay attack detection approach for brainprint biometric systemsQiong Gui, Wei Yang, Zhanpeng Jin, Maria V. Ruiz-Blondet, Sarah Laszlo. 1-6 [doi]
- Defining cost functions for adaptive steganography at the microscaleKejiang Chen, Weiming Zhang, Hang Zhou, Nenghai Yu, Guorui Feng. 1-6 [doi]
- A Stackelberg game perspective on the conflict between machine learning and data obfuscationJeffrey Pawlick, Quanyan Zhu. 1-6 [doi]
- Hierarchical PCA-based multivariate statistical network monitoring for anomaly detectionGabriel Maciá-Fernández, José Camacho, Pedro Garcia-Teodoro, Rafael A. Rodríguez-Gómez. 1-6 [doi]
- Hash-based frame selection for video phylogenyFilipe de O. Costa, Silvia Lameri, Paolo Bestagini, Zanoni Dias, Stefano Tubaro, Anderson Rocha. 1-6 [doi]
- Correlation clustering for PRNU-based blind image source identificationFrancesco Marra, Giovanni Poggi, Carlo Sansone, Luisa Verdoliva. 1-6 [doi]
- Phylogenetic analysis of near-duplicate and semantically-similar images using viewpoint localizationSimone Milani, Paolo Bestagini, Stefano Tubaro. 1-6 [doi]
- On solving large-scale low-rank zero-sum security games of incomplete informationAmnol Monga, Quanyan Zhu. 1-6 [doi]
- Single-image splicing localization through autoencoder-based anomaly detectionDavide Cozzolino, Luisa Verdoliva. 1-6 [doi]