Abstract is missing.
- Energy obfuscation for compressive encryption and processingMatteo Testa, Tiziano Bianchi, Enrico Magli. 1-6 [doi]
- Security in the shell: An optical physical unclonable function made of shells of cholesteric liquid crystalsGabriele Lenzini, Samir Ouchani, Peter Rønne, Peter Y. A. Ryan, Yong Geng, Jan Lagerwall, JungHyun Noh. 1-6 [doi]
- Sensitivity analysis in keystroke dynamics using convolutional neural networksHayreddin Çeker, Shambhu Upadhyaya. 1-6 [doi]
- Robust secure storage of data sources with perfect secrecySebastian Baur, Holger Boche. 1-6 [doi]
- Benchmarking keystroke authentication algorithmsJiaju Huang, Daqing Hou, Stephanie Schuckers, Timothy Law, Adam Sherwin. 1-6 [doi]
- Photo forensics from JPEG dimplesShruti Agarwal, Hany Farid. 1-6 [doi]
- A gradient-based pixel-domain attack against SVM detection of global image manipulationsZhipeng Chen, Benedetta Tondi, Xiaolong Li, Rongrong Ni, Yao Zhao, Mauro Barni. 1-6 [doi]
- The vulnerability of learning to adversarial perturbation increases with intrinsic dimensionalityLaurent Amsaleg, James Bailey, Dominique Barbe, Sarah M. Erfani, Michael E. Houle, Vinh Nguyen, Milos Radovanovic. 1-6 [doi]
- A fault-tolerant and efficient scheme for data aggregation over groups in the smart gridFabian Knirsch, Dominik Engel, Zekeriya Erkin. 1-6 [doi]
- It's always April fools' day!: On the difficulty of social network misinformation classification via propagation featuresMauro Conti, Daniele Lain, Riccardo Lazzeretti, Giulio Lovisotto, Walter Quattrociocchi. 1-6 [doi]
- Secure one-time biometrie tokens for non-repudiable multi-party transactionsKarthik Nandakumar, Nalini K. Ratha, Sharath Pankanti, Shelby Darnell. 1-6 [doi]
- Privacy preserving identification using sparse approximation with ambiguizationBehrooz Razeghi, Slava Voloshynovskiy, Dimche Kostadinov, Olga Taran. 1-6 [doi]
- An approach for gait anonymization using deep learningNgoc-Dung T. Tieu, Huy H. Nguyen, Hoang-Quoc Nguyen-Son, Junichi Yamagishi, Isao Echizen. 1-6 [doi]
- Linking received packet to the transmitter through physical-fingerprinting of controller area networkOmid Avatefipour, Azeem Hafeez, Muhammad Tayyab, Hafiz Malik. 1-6 [doi]
- Secure identification under jamming attacksHolger Boche, Christian Deppe. 1-6 [doi]
- Audio phylogenetic analysis using geometric transformsSebastiano Verde, Simone Milani, Paolo Bestagini, Stefano Tubaro. 1-6 [doi]
- Enhanced free-text keystroke continuous authentication based on dynamics of wrist motionBorui Li, Han Sun, Yang Gao, Vir V. Phoha, Zhanpeng Jin. 1-6 [doi]
- A two factor transformation for speaker verification through ℓ1 comparisonAbelino Jimenez, Bhiksha Raj. 1-6 [doi]
- Latent fingerprint segmentation based on convolutional neural networksYanming Zhu, Xuefei Yin, Xiuping Jia, Jiankun Hu. 1-6 [doi]
- Towards measuring uniqueness of human voiceSinan E. Tandogan, Husrev T. Senear, Bülent Tavli. 1-6 [doi]
- Extended beamforming by sum and difference composite co-array for radio surveillanceSho Iwazaki, Koichi Ichige. 1-6 [doi]
- On the feasibility of classification-based product package authenticationRudolf Schraml, Luca Debiasi, Christof Kauba, Andreas Uhl. 1-6 [doi]
- Distinguishing computer graphics from natural images using convolution neural networksNicolas Rahmouni, Vincent Nozick, Junichi Yamagishi, Isao Echizen. 1-6 [doi]
- AHEad: Privacy-preserving online behavioural advertising using homomorphic encryptionLeon J. Helsloot, Gamze Tillem, Zekeriya Erkin. 1-6 [doi]
- Tracing images back to their social network of origin: A CNN-based approachIrene Amerini, Tiberio Uricchio, Roberto Caldelli. 1-6 [doi]
- Minutia-pair spectral representations for fingerprint template protectionTaras Stanko, Boris Skoric. 1-6 [doi]
- Object insertion and removal in images with mirror reflectionZhaohui Sun, Anthony Hoogs. 1-6 [doi]
- Retrieving dates in smart card dumps is as hard as finding a needle in a haystackThomas Gougeon, Morgan Barbier, Patrick Lacharme, Gildas Avoine, Christophe Rosenberger. 1-6 [doi]
- Design of projection matrices for PRNU compressionLuca Bondi, Fernando Pérez-González, Paolo Bestagini, Stefano Tubaro. 1-6 [doi]
- Image carving with missing headers and missing fragmentsEmre Durmus, Manoranjan Mohanty, Samet Taspinar, Erkam Uzun, Nasir D. Memon. 1-6 [doi]