default search action
IEEE Transactions on Information Forensics and Security, Volume 17
Volume 17, 2022
- Aslí Bay, Zekeriya Erkin, Jaap-Henk Hoepman, Simona Samardjiska, Jelle Vos:
Practical Multi-Party Private Set Intersection Protocols. 1-15 - Ehsan Nekouei, Mohammad Pirani, Henrik Sandberg, Karl Henrik Johansson:
A Randomized Filtering Strategy Against Inference Attacks on Active Steering Control Systems. 16-27 - Guohou Shan, Boxin Zhao, James R. Clavin, Haibin Zhang, Sisi Duan:
Poligraph: Intrusion-Tolerant and Distributed Fake News Detection System. 28-41 - Juan E. Tapia, Sebastian Gonzalez, Christoph Busch:
Iris Liveness Detection Using a Cascade of Dedicated Deep Learning Networks. 42-52 - Mohammad Ragheb, Sayed Mostafa Safavi Hemami, Ali Kuhestani, Derrick Wing Kwan Ng, Lajos Hanzo:
On the Physical Layer Security of Untrusted Millimeter Wave Relaying Networks: A Stochastic Geometry Approach. 53-68 - Yang Liu, Zhuo Ma, Ximeng Liu, Siqi Ma, Kui Ren:
Privacy-Preserving Object Detection for Medical Images With Faster R-CNN. 69-84 - Uppalapati Somalatha, Parthajit Mohapatra:
Role of Shared Key for Secure Communication Over 2-User Gaussian Z-Interference Channel. 85-98 - Yuanyu Zhang, Yulong Shen, Xiaohong Jiang, Shoji Kasahara:
Secure Millimeter-Wave Ad Hoc Communications Using Physical Layer Security. 99-114 - Dongming Wu, Mang Ye, Gaojie Lin, Xin Gao, Jianbing Shen:
Person Re-Identification by Context-Aware Part Attention and Multi-Head Collaborative Learning. 115-126 - Vítor Albiero, Kai Zhang, Michael C. King, Kevin W. Bowyer:
Gendered Differences in Face Recognition Accuracy Explained by Hairstyles, Makeup, and Facial Morphology. 127-137 - Yunpei Jia, Jie Zhang, Shiguang Shan:
Dual-Branch Meta-Learning Network With Distribution Alignment for Face Anti-Spoofing. 138-151 - Jungang Yang, Liyao Xiang, Ruidong Chen, Weiting Li, Baochun Li:
Differential Privacy for Tensor-Valued Queries. 152-164 - Amirreza Zamani, Tobias J. Oechtering, Mikael Skoglund:
Data Disclosure With Non-Zero Leakage and Non-Invertible Leakage Matrix. 165-179 - Linghui Zhou, Tobias J. Oechtering, Mikael Skoglund:
Fundamental Limits-Achieving Polar Code Designs for Biometric Identification and Authentication. 180-195 - Steven A. Grosz, Joshua J. Engelsma, Eryun Liu, Anil K. Jain:
C2CL: Contact to Contactless Fingerprint Matching. 196-210 - Guyue Li, Chen Sun, Wei Xu, Marco Di Renzo, Aiqun Hu:
On Maximizing the Sum Secret Key Rate for Reconfigurable Intelligent Surface-Assisted Multiuser Systems. 211-225 - Yuanrong Xu, Yao Lu, Fanglin Chen, Guangming Lu, David Zhang:
High Resolution Fingerprint Retrieval Based on Pore Indexing and Graph Comparison. 226-236 - Xiaoning Liu, Bang Wu, Xingliang Yuan, Xun Yi:
Leia: A Lightweight Cryptographic Neural Network Inference System at the Edge. 237-252 - Yimeng Ge, Jiancun Fan:
Robust Secure Beamforming for Intelligent Reflecting Surface Assisted Full-Duplex MISO Systems. 253-264 - Cristiano Gratton, Naveen K. D. Venkategowda, Reza Arablouei, Stefan Werner:
Privacy-Preserved Distributed Learning With Zeroth-Order Optimization. 265-279 - Saeedreza Shehnepoor, Roberto Togneri, Wei Liu, Mohammed Bennamoun:
ScoreGAN: A Fraud Review Detector Based on Regulated GAN With Data Augmentation. 280-291 - Rossano Gaeta:
On the Impact of Pollution Attacks on Coding-Based Distributed Storage Systems. 292-302 - Wenqi Wei, Ling Liu:
Gradient Leakage Attack Resilient Deep Learning. 303-316 - Yafang Yang, Lei Zhang, Yunlei Zhao, Kim-Kwang Raymond Choo, Yan Zhang:
Privacy-Preserving Aggregation-Authentication Scheme for Safety Warning System in Fog-Cloud Based VANET. 317-331 - Ángeles Vázquez-Castro:
Asymptotically Guaranteed Anti-Jamming Spread Spectrum Random Access Without Pre-Shared Secret. 332-343 - Jianyang Gu, Weihua Chen, Hao Luo, Fan Wang, Hao Li, Wei Jiang, Weijie Mao:
Multi-View Evolutionary Training for Unsupervised Domain Adaptive Person Re-Identification. 344-356 - Mahdi Khosravy, Kazuaki Nakamura, Yuki Hirose, Naoko Nitta, Noboru Babaguchi:
Model Inversion Attack by Integration of Deep Generative Models: Privacy-Sensitive Face Generation From a Face Recognition System. 357-372 - Benoît Bonnet, Teddy Furon, Patrick Bas:
Generating Adversarial Images in Quantized Domains. 373-385 - Mang Ye, Cuiqun Chen, Jianbing Shen, Ling Shao:
Dynamic Tri-Level Relation Mining With Attentive Graph for Visible Infrared Re-Identification. 386-398 - Jiucheng Xie, Chi-Man Pun, Kin-Man Lam:
Implicit and Explicit Feature Purification for Age-Invariant Facial Representation Learning. 399-412 - Bingyao Yu, Jiwen Lu, Xiu Li, Jie Zhou:
Salience-Aware Face Presentation Attack Detection via Deep Reinforcement Learning. 413-427 - Amanda Cristina Davi Resende, Davis Railsback, Rafael Dowsley, Anderson C. A. Nascimento, Diego F. Aranha:
Fast Privacy-Preserving Text Classification Based on Secure Multiparty Computation. 428-442 - Haiwei Wu, Jiantao Zhou, Jinyu Tian, Jun Liu, Yu Qiao:
Robust Image Forgery Detection Against Transmission Over Online Social Networks. 443-456 - Mingliang Chen, Xin Liao, Min Wu:
PulseEdit: Editing Physiological Signals in Facial Videos for Privacy Protection. 457-471 - Tian Li, Huaqun Wang, Debiao He, Jia Yu:
Synchronized Provable Data Possession Based on Blockchain for Digital Twin. 472-485 - Qi Li, Xinhao Deng, Zhuotao Liu, Yuan Yang, Xiaoyue Zou, Qian Wang, Mingwei Xu, Jianping Wu:
Dynamic Network Security Function Enforcement via Joint Flow and Function Scheduling. 486-499 - Yukai Wang, Chunlei Peng, Decheng Liu, Nannan Wang, Xinbo Gao:
ForgeryNIR: Deep Face Forgery and Detection in Near-Infrared Scenario. 500-515 - Mingyang Zhang, Yang Xiao, Fu Xiong, Shuai Li, Zhiguo Cao, Zhiwen Fang, Joey Tianyi Zhou:
Person Re-Identification With Hierarchical Discriminative Spatial Aggregation. 516-530 - Zhihai Yang, Qindong Sun, Zhaoli Liu:
Three Birds With One Stone: User Intention Understanding and Influential Neighbor Disclosure for Injection Attack Detection. 531-546 - Peipeng Yu, Jianwei Fei, Zhihua Xia, Zhili Zhou, Jian Weng:
Improving Generalization by Commonality Learning in Face Forgery Detection. 547-558 - Kejun Chen, Orlando Arias, Qingxu Deng, Daniela Oliveira, Xiaolong Guo, Yier Jin:
FineDIFT: Fine-Grained Dynamic Information Flow Tracking for Data-Flow Integrity Using Coprocessor. 559-573 - Olivier Bronchain, François Durvaux, Loïc Masure, François-Xavier Standaert:
Efficient Profiled Side-Channel Analysis of Masked Implementations, Extended. 574-584 - Linsen Song, Wayne Wu, Chen Qian, Ran He, Chen Change Loy:
Everybody's Talkin': Let Me Talk as You Want. 585-598 - Pei Peng, Emina Soljanin:
Covert, Low-Delay, Coded Message Passing in Mobile (IoT) Networks. 599-611 - Mary Scott, Graham Cormode, Carsten Maple:
Aggregation and Transformation of Vector-Valued Messages in the Shuffle Model of Differential Privacy. 612-627 - Onur Dizdar, Bruno Clerckx:
Rate-Splitting Multiple Access for Communications and Jamming in Multi-Antenna Multi-Carrier Cognitive Radio Systems. 628-643 - Long Li, Yu Luo, Jing Yang, Lina Pu:
Reinforcement Learning Enabled Intelligent Energy Attack in Green IoT Networks. 644-658 - Jie Li, Camilla Hollanti:
Private and Secure Distributed Matrix Multiplication Schemes for Replicated or MDS-Coded Servers. 659-669 - Moulik Choraria, Arpan Chattopadhyay, Urbashi Mitra, Erik G. Ström:
Design of False Data Injection Attack on Distributed Process Estimation. 670-683 - Prasanna Ravi, Shivam Bhasin, Sujoy Sinha Roy, Anupam Chattopadhyay:
On Exploiting Message Leakage in (Few) NIST PQC Candidates for Practical Message Recovery Attacks. 684-699 - Rafael Salema Marques, Haider M. Al-Khateeb, Gregory Epiphaniou, Carsten Maple:
APIVADS: A Novel Privacy-Preserving Pivot Attack Detection Scheme Based on Statistical Pattern Recognition. 700-715 - Baoyao Yang, Andy Jinhua Ma, Pong C. Yuen:
Revealing Task-Relevant Model Memorization for Source-Protected Unsupervised Domain Adaptation. 716-731 - Xiaozhen Lu, Liang Xiao, Guohang Niu, Xiangyang Ji, Qian Wang:
Safe Exploration in Wireless Security: A Safe Reinforcement Learning Algorithm With Hierarchical Structure. 732-743 - Nimisha Limaye, Satwik Patnaik, Ozgur Sinanoglu:
Valkyrie: Vulnerability Assessment Tool and Attack for Provably-Secure Logic Locking Techniques. 744-759 - Guanxiong Shen, Junqing Zhang, Alan Marshall, Joseph R. Cavallaro:
Towards Scalable and Channel-Robust Radio Frequency Fingerprint Identification for LoRa. 774-787 - Xiaohui Chen, Zhiyu Hao, Lun Li, Lei Cui, Yiran Zhu, Zhenquan Ding, Yongji Liu:
CruParamer: Learning on Parameter-Augmented API Sequences for Malware Detection. 788-803 - Yanbing Ren, Xinghua Li, Yinbin Miao, Bin Luo, Jian Weng, Kim-Kwang Raymond Choo, Robert H. Deng:
Towards Privacy-Preserving Spatial Distribution Crowdsensing: A Game Theoretic Approach. 804-818 - Long Zhuo, Shunquan Tan, Bin Li, Jiwu Huang:
Self-Adversarial Training Incorporating Forgery Attention for Image Forgery Localization. 819-834 - Yang Xiao, Jianping Zeng:
Dynamically Generate Password Policy via Zipf Distribution. 835-848 - Wenjing Zhang, Bo Jiang, Ming Li, Xiaodong Lin:
Privacy-Preserving Aggregate Mobility Data Release: An Information-Theoretic Deep Reinforcement Learning Approach. 849-864 - Rizhao Cai, Zhi Li, Renjie Wan, Haoliang Li, Yongjian Hu, Alex C. Kot:
Learning Meta Pattern for Face Anti-Spoofing. 1201-1213 - Yanbin Wang, Haitao Xu, Zhenhao Guo, Zhan Qin, Kui Ren:
snWF: Website Fingerprinting Attack by Ensembling the Snapshot of Deep Learning. 1214-1226 - Jinhua Ma, Shengmin Xu, Jianting Ning, Xinyi Huang, Robert H. Deng:
Redactable Blockchain in Decentralized Setting. 1227-1242 - Shengjie Chen, Zhenhua Guo, Xiu Li, Dongliang Yang:
Query2Set: Single-to-Multiple Partial Fingerprint Recognition Based on Attention Mechanism. 1243-1253 - Zhuo Wang, Qiangchang Wang, Weihong Deng, Guodong Guo:
Learning Multi-Granularity Temporal Characteristics for Face Anti-Spoofing. 1254-1269 - Jin Yang, Qishui Zhong, Kaibo Shi, Shouming Zhong:
Co-Design of Observer-Based Fault Detection Filter and Dynamic Event-Triggered Controller for Wind Power System Under Dual Alterable DoS Attacks. 1270-1284 - Sekhar Rajendran, Zhi Sun:
RF Impairment Model-Based IoT Physical-Layer Identification for Enhanced Domain Generalization. 1285-1299 - Saba Asaad, Yifei Wu, Ali Bereyhi, Ralf R. Müller, Rafael F. Schaefer, H. Vincent Poor:
Secure Active and Passive Beamforming in IRS-Aided MIMO Systems. 1300-1315 - Rafael Padilha, Tawfiq Salem, Scott Workman, Fernanda A. Andaló, Anderson Rocha, Nathan Jacobs:
Content-Aware Detection of Temporal Metadata Manipulation. 1316-1327 - Rémi Cogranne, Quentin Giboulot, Patrick Bas:
Efficient Steganography in JPEG Images by Minimizing Performance of Optimal Detector. 1328-1343 - Ziming Yang, Jian Liang, Chaoyou Fu, Mandi Luo, Xiaoyu Zhang:
Heterogeneous Face Recognition via Face Synthesis With Identity-Attribute Disentanglement. 1344-1358 - Yang Yang, Yanjiao Chen, Fei Chen, Jing Chen:
An Efficient Identity-Based Provable Data Possession Protocol With Compressed Cloud Storage. 1359-1371 - Yulong Tian, Fnu Suya, Fengyuan Xu, David Evans:
Stealthy Backdoors as Compression Artifacts. 1372-1387 - Donghyun Yu, Ruei-Hau Hsu, Jemin Lee, Sungjin Lee:
EC-SVC: Secure CAN Bus In-Vehicle Communications With Fine-Grained Access Control Based on Edge Computing. 1388-1403 - Zhihao Shen, Shun Li, Xi Zhao, Jianhua Zou:
MMAuth: A Continuous Authentication Framework on Smartphones Using Multiple Modalities. 1450-1465 - Xinran Li, Chuan Qin, Zichi Wang, Zhenxing Qian, Xinpeng Zhang:
Unified Performance Evaluation Method for Perceptual Image Hashing. 1404-1419 - Haixia Chen, Xinyi Huang, Jianting Ning, Futai Zhang, Chao Lin:
VILS: A Verifiable Image Licensing System. 1420-1434 - Weipeng Hu, Haifeng Hu:
Domain-Private Factor Detachment Network for NIR-VIS Face Recognition. 1435-1449 - Dayong Ye, Sheng Shen, Tianqing Zhu, Bo Liu, Wanlei Zhou:
One Parameter Defense - Defending Against Data Inference Attacks via Differential Privacy. 1466-1480 - Changjie Hu, Quanzhong Li, Qi Zhang, Jiayin Qin:
Security Optimization for an AF MIMO Two-Way Relay-Assisted Cognitive Radio Nonorthogonal Multiple Access Networks With SWIPT. 1481-1496 - Rizka Widyarini Purwanto, Arindam Pal, Alan Blair, Sanjay Jha:
PhishSim: Aiding Phishing Website Detection With a Feature-Free Tool. 1497-1512 - Muyi Sun, Jian Wang, Jian Liu, Jianshu Li, Tao Chen, Zhenan Sun:
A Unified Framework for Biphasic Facial Age Translation With Noisy-Semantic Guided Generative Adversarial Networks. 1513-1527 - Jiayu Zhang, Min Li, Min-Jian Zhao, Xiaoyu Ji, Wenyuan Xu:
Multi-User Beam Training and Transmission Design for Covert Millimeter-Wave Communication. 1528-1543 - Meng Pang, Binghui Wang, Siyu Huang, Yiu-Ming Cheung, Bihan Wen:
A Unified Framework for Bidirectional Prototype Learning From Contaminated Faces Across Heterogeneous Domains. 1544-1557 - Yongzhi Wang, Xiaoyu Zhang, Yao Wu, Yulong Shen:
Enhancing Leakage Prevention for MapReduce. 1558-1572 - Xiao Yang, Mengling Liu, Man Ho Au, Xiapu Luo, Qingqing Ye:
Efficient Verifiably Encrypted ECDSA-Like Signatures and Their Applications. 1573-1582 - Bin Dai, Chong Li, Yingbin Liang, Zheng Ma, Shlomo Shamai:
Self-Secure Capacity-Achieving Feedback Schemes of Gaussian Multiple-Access Wiretap Channels With Degraded Message Sets. 1583-1596 - Peng Jiang, Baoqi Qiu, Liehuang Zhu:
Report When Malicious: Deniable and Accountable Searchable Message-Moderation System. 1597-1609 - Linfeng Liu, Zhiyuan Xi, Jiagao Wu, Jia Xu:
Noise-Based-Protection Message Dissemination Method for Insecure Opportunistic Underwater Sensor Networks. 1610-1623 - Wei Cheng, Sylvain Guilley, Jean-Luc Danger:
Information Leakage in Code-Based Masking: A Systematic Evaluation by Higher-Order Attacks. 1624-1638 - Zhuoran Ma, Jianfeng Ma, Yinbin Miao, Yingjiu Li, Robert H. Deng:
ShieldFL: Mitigating Model Poisoning Attacks in Privacy-Preserving Federated Learning. 1639-1654 - Xiuli Bi, Chao Shuai, Bo Liu, Bin Xiao, Weisheng Li, Xinbo Gao:
Privacy-Preserving Color Image Feature Extraction by Quaternion Discrete Orthogonal Moments. 1655-1668 - Mohammad Reza Nosouhi, Keshav Sood, Marthie Grobler, Robin Doss:
Towards Spoofing Resistant Next Generation IoT Networks. 1669-1683 - Alberto Cabri, Francesco Masulli, Stefano Rovetta, Grazyna Suchacka:
A Quantum-Inspired Classifier for Early Web Bot Detection. 1684-1697 - Saeid Sahraei, Amir Salman Avestimehr, Ramy E. Ali:
Info-Commit: Information-Theoretic Polynomial Commitment. 1698-1708 - Yanchu Li, Lingguang Lei, Yuewu Wang, Jiwu Jing, Quan Zhou:
TrustSAMP: Securing Streaming Music Against Multivector Attacks on ARM Platform. 1709-1724 - Yuwei Zeng, Zhicheng Liu, Xunxun Chen, Tianning Zang:
Hidden Path: Understanding the Intermediary in Malicious Redirections. 1725-1740 - Chenqi Kong, Baoliang Chen, Haoliang Li, Shiqi Wang, Anderson Rocha, Sam Kwong:
Detect and Locate: Exposing Face Manipulation by Semantic- and Noise-Level Telltales. 1741-1756 - Amish Goel, Pierre Moulin:
Fast Locally Optimal Detection of Targeted Universal Adversarial Perturbations. 1757-1770 - Kai Zhang, Zhe Jiang, Jianting Ning, Xinyi Huang:
Subversion-Resistant and Consistent Attribute-Based Keyword Search for Secure Cloud Storage. 1771-1784 - Mehmet Emre Gursoy, Ling Liu, Ka Ho Chow, Stacey Truex, Wenqi Wei:
An Adversarial Approach to Protocol Analysis and Selection in Local Differential Privacy. 1785-1799 - Sarah A. Obead, Hsuan-Yin Lin, Eirik Rosnes, Jörg Kliewer:
Private Polynomial Function Computation for Noncolluding Coded Databases. 1800-1813 - Yuanyuan Liu, Jiacheng Geng, Fanhua Shang, Weixin An, Hongying Liu, Qi Zhu, Wei Feng:
Laplacian Smoothing Stochastic ADMMs With Differential Privacy Guarantees. 1814-1826 - Yujin Huang, Chunyang Chen:
Smart App Attack: Hacking Deep Learning Models in Android Apps. 1827-1840 - Quentin Giboulot, Patrick Bas, Rémi Cogranne:
Multivariate Side-Informed Gaussian Embedding Minimizing Statistical Detectability. 1841-1854 - Navid Vafaei, Sara Zarei, Nasour Bagheri, Maria Eichlseder, Robert Primas, Hadi Soleimany:
Statistical Effective Fault Attacks: The Other Side of the Coin. 1855-1867 - Meiyan Xiao, Hongbo Li, Qiong Huang, Shui Yu, Willy Susilo:
Attribute-Based Hierarchical Access Control With Extendable Policy. 1868-1883 - Xiao Mei Zeng, Qing Liu, Jing Yun Tay, Chee Lip Gan:
Selective Staining on Non-Volatile Memory Cells for Data Retrieval. 1884-1892 - Mahdi Soleymani, Hessam Mahdavifar, Amir Salman Avestimehr:
Analog Secret Sharing With Applications to Private Distributed Learning. 1893-1904 - Hao Zhou, Geng Yang, Hua Dai, Guoxiu Liu:
PFLF: Privacy-Preserving Federated Learning Framework for Edge Computing. 1905-1918 - Meng Zhang, Zhuorui Wu, Jun Yan, Rongxing Lu, Xiaohong Guan:
Attack-Resilient Optimal PMU Placement via Reinforcement Learning Guided Tree Search in Smart Grids. 1919-1929 - Xiaoyu Zhang, Hong Zhong, Chunyang Fan, Irina Bolodurina, Jie Cui:
CBACS: A Privacy-Preserving and Efficient Cache-Based Access Control Scheme for Software Defined Vehicular Networks. 1930-1945 - Shuyi Li, Ruijun Ma, Lunke Fei, Bob Zhang:
Learning Compact Multirepresentation Feature Descriptor for Finger-Vein Recognition. 1946-1958 - Jiayu Zhou, Wenjie Ding, Wen Yang:
A Secure Encoding Mechanism Against Deception Attacks on Multisensor Remote State Estimation. 1959-1969 - Peter Kairouz, Jiachun Liao, Chong Huang, Maunil Vyas, Monica Welfert, Lalitha Sankar:
Generating Fair Universal Representations Using Adversarial Models. 1970-1985 - Fajun Sun, Selena He, Xiaotong Zhang, Jun Zhang, Qingan Li, Yanxiang He:
A Fully Authenticated Diffie-Hellman Protocol and Its Application in WSNs. 1986-1999 - Zhenzhu Chen, Shang Wang, Anmin Fu, Yansong Gao, Shui Yu, Robert H. Deng:
LinkBreaker: Breaking the Backdoor-Trigger Link in DNNs via Neurons Consistency Check. 2000-2014 - Qiang Xu, Xinghao Jiang, Tanfeng Sun, Alex C. Kot:
Motion-Adaptive Detection of HEVC Double Compression With the Same Coding Parameters. 2015-2029 - Hengyi Ren, Lijuan Sun, Jian Guo, Chong Han:
A Dataset and Benchmark for Multimodal Biometric Recognition Based on Fingerprint and Finger Vein. 2030-2043 - Mohammad Esmaeilpour, Patrick Cardinal, Alessandro Lameiras Koerich:
Multidiscriminator Sobolev Defense-GAN Against Adversarial Attacks for End-to-End Speech Systems. 2044-2058 - Jiaqi Zhao, Hui Zhu, Fengwei Wang, Rongxing Lu, Zhe Liu, Hui Li:
PVD-FL: A Privacy-Preserving and Verifiable Decentralized Federated Learning Framework. 2059-2073 - Aya Fukami, Sasha Sheremetov, Francesco Regazzoni, Zeno J. M. H. Geradts, Cees de Laat:
Experimental Evaluation of e.MMC Data Recovery. 2074-2083 - Askat Kuzdeuov, Dana Aubakirova, Darina Koishigarina, Huseyin Atakan Varol:
TFW: Annotated Thermal Faces in the Wild Dataset. 2084-2094 - Mandi Luo, Haoxue Wu, Huaibo Huang, Weizan He, Ran He:
Memory-Modulated Transformer Network for Heterogeneous Face Recognition. 2095-2109 - Emelie Ekenstedt, Lawrence Ong, Yucheng Liu, Sarah Johnson, Phee Lep Yeoh, Jörg Kliewer:
When Differential Privacy Implies Syntactic Privacy. 2110-2124 - Hiranmoy Roy, Debotosh Bhattacharjee, Ondrej Krejcar:
Interpretable Local Frequency Binary Pattern (LFrBP) Based Joint Continual Learning Network for Heterogeneous Face Recognition. 2125-2136 - Zhi Li, Rizhao Cai, Haoliang Li, Kwok-Yan Lam, Yongjian Hu, Alex C. Kot:
One-Class Knowledge Distillation for Face Presentation Attack Detection. 2137-2150 - Zhigang Lu, Hassan Jameel Asghar, Mohamed Ali Kâafar, Darren Webb, Peter Dickinson:
A Differentially Private Framework for Deep Learning With Convexified Loss Functions. 2151-2165 - Shi-Jie Xu, Guang-Gang Geng, Xiao-Bo Jin, Dongjie Liu, Jian Weng:
Seeing Traffic Paths: Encrypted Traffic Classification With Path Signature Features. 2166-2181 - Tomás Concepción Miranda, Pierre-François Gimenez, Jean-François Lalande, Valérie Viet Triem Tong, Pierre Wilke:
Debiasing Android Malware Datasets: How Can I Trust Your Results If Your Dataset Is Biased? 2182-2197 - Jiajia Jiang, Songxuan Lai, Lianwen Jin, Yecheng Zhu:
DsDTW: Local Representation Learning With Deep soft-DTW for Dynamic Signature Verification. 2198-2212 - Datian Peng, Jianmin Dong, Jungang Yang, Qinke Peng:
Dynamical Failures Driven by False Load Injection Attacks Against Smart Grid. 2213-2226 - Yili Jiang, Kuan Zhang, Yi Qian, Liang Zhou:
Anonymous and Efficient Authentication Scheme for Privacy-Preserving Distributed Learning. 2227-2240 - Ce Feng, Parv Venkitasubramaniam:
Inferential Separation for Privacy: Irrelevant Statistics and Quantization. 2241-2255 - Zhirun Zheng, Zhetao Li, Hongbo Jiang, Leo Yu Zhang, Dengbiao Tu:
Semantic-Aware Privacy-Preserving Online Location Trajectory Data Sharing. 2256-2271 - Yingfan Tao, Wenxian Zheng, Wenming Yang, Guijin Wang, Qingmin Liao:
Frontal-Centers Guided Face: Boosting Face Recognition by Learning Pose-Invariant Features. 2272-2283 - Weihang Wang, Fei Wen, Haoyuan Zheng, Rendong Ying, Peilin Liu:
Conv-MLP: A Convolution and MLP Mixed Model for Multimodal Face Anti-Spoofing. 2284-2297 - Zejun Zhang, Fei Zhong, Wenxiong Kang:
Study on Reflection-Based Imaging Finger Vein Recognition. 2298-2310 - Weijie Liu, Ximeng Liu, Zhi Li, Bin Liu, Rongwei Yu, Lina Wang:
Retrofitting LBR Profiling to Enhance Virtual Machine Introspection. 2311-2323 - Pingchuan Ma, Zhenlan Ji, Qi Pang, Shuai Wang:
NoLeaks: Differentially Private Causal Discovery Under Functional Causal Model. 2324-2338 - Tahmina Zebin, Shahadate Rezvy, Yuan Luo:
An Explainable AI-Based Intrusion Detection System for DNS Over HTTPS (DoH) Attacks. 2339-2349 - Osman Tursun, Simon Denman, Sabesan Sivapalan, Sridha Sridharan, Clinton Fookes, Sandra Mau:
Component-Based Attention for Large-Scale Trademark Retrieval. 2350-2363 - Jiang Liu, Chun Pong Lau, Hossein Souri, Soheil Feizi, Rama Chellappa:
Mutual Adversarial Training: Learning Together is Better Than Going Alone. 2364-2377 - Yanli Chen, Tong Qiao, Florent Retraint, Gengran Hu:
Efficient Privacy-Preserving Forensic Method for Camera Model Identification. 2378-2393 - Parastoo Sadeghi, Mehdi Korki:
Offset-Symmetric Gaussians for Differential Privacy. 2394-2409 - Chuan Du, Yulai Cong, Lei Zhang, Dandan Guo, Song Wei:
A Practical Deceptive Jamming Method Based on Vulnerable Location Awareness Adversarial Attack for Radar HRRP Target Recognition. 2410-2424 - Jian Wang, Yunlian Sun, Jinhui Tang:
LiSiam: Localization Invariance Siamese Network for Deepfake Detection. 2425-2436 - Ding Li, Yuefei Zhu, Minghao Chen, Jue Wang:
Minipatch: Undermining DNN-Based Website Fingerprinting With Adversarial Patches. 2437-2451 - Huijun Zhang, Yang Ding, Lei Cao, Xin Wang, Ling Feng:
Fine-Grained Question-Level Deception Detection via Graph-Based Learning and Cross-Modal Fusion. 2452-2467 - Mengnan Zhao, Bo Wang, Wei Wang, Yuqiu Kong, Tianhang Zheng, Kui Ren:
Guided Erasable Adversarial Attack (GEAA) Toward Shared Data Protection. 2468-2482 - Peng Xu, Manqing Hu, Tianyang Chen, Wei Wang, Hai Jin:
LaF: Lattice-Based and Communication-Efficient Federated Learning. 2483-2496 - Ajian Liu, Chenxu Zhao, Zitong Yu, Jun Wan, Anyang Su, Xing Liu, Zichang Tan, Sergio Escalera, Junliang Xing, Yanyan Liang, Guodong Guo, Zhen Lei, Stan Z. Li, Du Zhang:
Contrastive Context-Aware Learning for 3D High-Fidelity Mask Face Presentation Attack Detection. 2497-2507 - Pawel Korus, Nasir D. Memon:
Computational Sensor Fingerprints. 2508-2523 - Mengmeng Yang, Ivan Tjuawinata, Kwok-Yan Lam:
K-Means Clustering With Local dᵪ-Privacy for Privacy-Preserving Data Analysis. 2524-2537 - Songnian Zhang, Suprio Ray, Rongxing Lu, Yunguo Guan, Yandong Zheng, Jun Shao:
Toward Privacy-Preserving Aggregate Reverse Skyline Query With Strong Security. 2538-2552 - Jung Hee Cheon, Wootae Kim, Jai Hyun Park:
Efficient Homomorphic Evaluation on Large Intervals. 2553-2568 - Shu Hong, Lingjie Duan, Jianwei Huang:
Protecting Location Privacy by Multiquery: A Dynamic Bayesian Game Theoretic Approach. 2569-2584 - Linan Huang, Shumeng Jia, Emily Balcetis, Quanyan Zhu:
ADVERT: An Adaptive and Data-Driven Attention Enhancement Mechanism for Phishing Prevention. 2585-2597 - Jisoo Choi, Chau-Wai Wong, Adi Hajj-Ahmad, Min Wu, Yanpin Ren:
Invisible Geolocation Signature Extraction From a Single Image. 2598-2613 - Benjamin Christopher Hadwiger, Christian Riess:
Deep Metric Color Embeddings for Splicing Localization in Severely Degraded Images. 2614-2627 - Akiko Inoue, Kazuhiko Minematsu, Maya Oda, Rei Ueno, Naofumi Homma:
ELM: A Low-Latency and Scalable Memory Encryption Scheme. 2628-2643 - Nan Wu, Dinusha Vatsalan, Sunny Verma, Mohamed Ali Kâafar:
Fairness and Cost Constrained Privacy-Aware Record Linkage. 2644-2656 - Yihao Huang, Felix Juefei-Xu, Qing Guo, Yang Liu, Geguang Pu:
FakeLocator: Robust Localization of GAN-Based Face Manipulations. 2657-2672 - Junqiang Li, Senyi Li, Gang Sun, Ting Chen, Hongfang Yu:
SNPSFuzzer: A Fast Greybox Fuzzer for Stateful Network Protocols Using Snapshots. 2673-2687 - Da-Wen Huang, Fengji Luo, Jichao Bi, Mingyang Sun:
An Efficient Hybrid IDS Deployment Architecture for Multi-Hop Clustered Wireless Sensor Networks. 2688-2702 - Cheng Wang, Hangyu Zhu:
Wrongdoing Monitor: A Graph-Based Behavioral Anomaly Detection in Cyber Security. 2703-2718 - Nils Wisiol, Bipana Thapaliya, Khalid T. Mursi, Jean-Pierre Seifert, Yu Zhuang:
Neural Network Modeling Attacks on Arbiter-PUF-Based Designs. 2719-2731 - Mosayeb Hajimaghsoodi, Rasool Jalili:
RAD: A Statistical Mechanism Based on Behavioral Analysis for DDoS Attack Countermeasure. 2732-2745 - Jiabei Wang, Rui Zhang, Jianhao Li, Yuting Xiao:
Owner-Enabled Secure Authorized Keyword Search Over Encrypted Data With Flexible Metadata. 2746-2760 - Congyu Zhang, Decheng Liu, Chunlei Peng, Nannan Wang, Xinbo Gao:
Edge Aware Domain Transformation for Face Sketch Synthesis. 2761-2770 - Meng Jia, Jing Chen, Kun He, Ruiying Du, Li Zheng, Mingxi Lai, Donghui Wang, Fei Liu:
Redactable Blockchain From Decentralized Chameleon Hash Functions. 2771-2783 - Dong-Hyun Jung, Joon-Gyu Ryu, Junil Choi:
When Satellites Work as Eavesdroppers. 2784-2799 - Zhaoxu Hu, Changsheng Chen, Wai Ho Mow, Jiwu Huang:
Document Recapture Detection Based on a Unified Distortion Model of Halftone Cells. 2800-2815 - Pu Wang, Zheng Yan, Kai Zeng:
BCAuth: Physical Layer Enhanced Authentication and Attack Tracing for Backscatter Communications. 2818-2834 - Servio Paguada, Lejla Batina, Ileana Buhan, Igor Armendariz:
Playing With Blocks: Toward Re-Usable Deep Learning Models for Side-Channel Profiled Attacks. 2835-2847 - Yinbin Miao, Ziteng Liu, Hongwei Li, Kim-Kwang Raymond Choo, Robert H. Deng:
Privacy-Preserving Byzantine-Robust Federated Learning via Blockchain Systems. 2848-2861 - Jianfei Sun, Guowen Xu, Tianwei Zhang, Mamoun Alazab, Robert H. Deng:
A Practical Fog-Based Privacy-Preserving Online Car-Hailing Service System. 2862-2877 - Lin Ding, Zheng Wu, Xinhai Wang, Ziyu Guan, Mingjin Li:
New Attacks on the GPRS Encryption Algorithms GEA-1 and GEA-2. 2878-2889 - Changsheng Chen, Shuzheng Zhang, Fengbo Lan, Jiwu Huang:
Domain-Agnostic Document Authentication Against Practical Recapturing Attacks. 2890-2905 - Hee-Yong Kwon, Mun-Kyu Lee:
Comments on "PassBio: Privacy-Preserving User-Centric Biometric Authentication". 2816-2817 - Shaobo Jia, Jian-Kang Zhang, Sheng Chen, Wanming Hao, Wei Xu:
Secure Multiantenna Transmission With an Unknown Eavesdropper: Power Allocation and Secrecy Outage Analysis. 2906-2919 - Jiaqing Bai, Ji He, Yanping Chen, Yulong Shen, Xiaohong Jiang:
On Covert Communication Performance With Outdated CSI in Wireless Greedy Relay Systems. 2920-2935 - Wanyu Lin, Baochun Li, Cong Wang:
Towards Private Learning on Decentralized Graphs With Local Differential Privacy. 2936-2946 - Min Ren, Yuhao Zhu, Yunlong Wang, Zhenan Sun:
Perturbation Inactivation Based Adversarial Defense for Face Recognition. 2947-2962 - Feng Liu, Zhe Kong, Haozhe Liu, Wentian Zhang, Linlin Shen:
Fingerprint Presentation Attack Detection by Channel-Wise Feature Denoising. 2963-2976 - Yue Zheng, Si Wang, Chip-Hong Chang:
A DNN Fingerprint for Non-Repudiable Model Ownership Identification and Piracy Detection. 2977-2989 - Golam Dastoger Bashar, Joshua Holmes, Gaby G. Dagher:
ACCORD: A Scalable Multileader Consensus Protocol for Healthcare Blockchain. 2990-3005 - Junjie Jiang, Willy Susilo, Joonsang Baek:
Security Analysis of "SMAKA: Secure Many-to-Many Authentication and Key Agreement Scheme for Vehicular Networks". 3006-3007 - Changtao Miao, Zichang Tan, Qi Chu, Nenghai Yu, Guodong Guo:
Hierarchical Frequency-Assisted Interactive Networks for Face Manipulation Detection. 3008-3021 - Kangkang Wei, Weiqi Luo, Shunquan Tan, Jiwu Huang:
Universal Deep Network for Steganalysis of Color Image Based on Channel Representation. 3022-3036 - Jiale Cheng, Nan Liu, Wei Kang, Yang Li:
The Capacity of Symmetric Private Information Retrieval Under Arbitrary Collusion and Eavesdropping Patterns. 3037-3050 - Junwei Zhou, Yijia Qian, Qingtian Zou, Peng Liu, Jianwen Xiang:
DeepSyslog: Deep Anomaly Detection on Syslog Using Sentence Embedding and Metadata. 3051-3061 - Cheng-Yaw Low, Andrew Beng Jin Teoh:
An Implicit Identity-Extended Data Augmentation for Low-Resolution Face Representation Learning. 3062-3076 - Shijia Liu, Yanru Chen, Hao Wang, Hongbin Liang, Liangyin Chen:
A Low-Calculation Contactless Continuous Authentication Based on Postural Transition. 3077-3090 - Yulong Wang, Minghui Zhao, Shenghong Li, Xin Yuan, Wei Ni:
Dispersed Pixel Perturbation-Based Imperceptible Backdoor Trigger for Image Classifier Models. 3091-3106 - Dajiang Chen, Shaoquan Jiang, Ning Zhang, Lei Liu, Kim-Kwang Raymond Choo:
On Message Authentication Channel Capacity Over a Wiretap Channel. 3107-3122 - Ge Shi, Sylvester B. Aboagye, Telex M. N. Nkouatchah, Octavia A. Dobre, Yong Li, Wei Cheng:
Secure Transmission in NOMA-Aided Multiuser Visible Light Communication Broadcasting Network With Cooperative Precoding Design. 3123-3138 - Lei Qi, Jiaying Shen, Jiaqi Liu, Yinghuan Shi, Xin Geng:
Label Distribution Learning for Generalizable Multisource Person Re-Identification. 3139-3150 - Dillon J. Lohr, Oleg V. Komogortsev:
Eye Know You Too: Toward Viable End-to-End Eye Movement Biometrics for User Authentication. 3151-3164 - Shuai Ma, Yunqi Zhang, Haihong Sheng, Hang Li, Jia Shi, Long Yang, Youlong Wu, Naofal Al-Dhahir, Shiyin Li:
Optimal Probabilistic Constellation Shaping for Covert Communications. 3165-3178 - Songlei Wang, Yifeng Zheng, Xiaohua Jia, Xun Yi:
PeGraph: A System for Privacy-Preserving and Efficient Search Over Encrypted Social Graphs. 3179-3194 - Si-Qi Liu, Xiangyuan Lan, Pong C. Yuen:
Learning Temporal Similarity of Remote Photoplethysmography for Fast 3D Mask Face Presentation Attack Detection. 3195-3210 - Enes Altinisik, Hüsrev Taha Sencar, Diram Tabaa:
Video Source Characterization Using Encoding and Encapsulation Characteristics. 3211-3224 - Yam Sharon, David Berend, Yang Liu, Asaf Shabtai, Yuval Elovici:
TANTRA: Timing-Based Adversarial Network Traffic Reshaping Attack. 3225-3237 - Chenqi Kong, Kexin Zheng, Shiqi Wang, Anderson Rocha, Haoliang Li:
Beyond the Pixel World: A Novel Acoustic-Based Face Anti-Spoofing System for Smartphones. 3238-3253 - Yujiao Lv, Jianquan Lu, Yang Liu, Jungang Lou:
Resilient Distributed State Estimation Under Stealthy Attack. 3254-3263 - Qin Li, Jia Wu, Junyu Quan, Jinjing Shi, Shichao Zhang:
Efficient Quantum Blockchain With a Consensus Mechanism QDPoS. 3264-3276 - Guiyang Xia, Xiaobo Zhou, Lichuan Gu, Feng Shu, Yongpeng Wu, Jiangzhou Wang:
Secure-Reliable Transmission Designs for Full-Duplex Receiver With Finite-Alphabet Inputs. 3277-3289 - Satwik Patnaik, Nimisha Limaye, Ozgur Sinanoglu:
Hide and Seek: Seeking the (Un)-Hidden Key in Provably-Secure Logic Locking Techniques. 3290-3305 - Haoxiang Huang, Jianbiao Zhang, Jun Hu, Yingfang Fu, Chenggang Qin:
Research on Distributed Dynamic Trusted Access Control Based on Security Subsystem. 3306-3320 - Yiming Wang, Guanqiu Qi, Shuang Li, Yi Chai, Huafeng Li:
Body Part-Level Domain Alignment for Domain-Adaptive Person Re-Identification With Transformer Framework. 3321-3334 - Qiuhua Wang, Tianyu Xia, Dong Wang, Yizhi Ren, Gongxun Miao, Kim-Kwang Raymond Choo:
SDoS: Selfish Mining-Based Denial-of-Service Attack. 3335-3349 - Min Wang, Song Wang, Jiankun Hu:
Cancellable Template Design for Privacy-Preserving EEG Biometric Authentication Systems. 3350-3364 - Pengyu Li, Dan Ye:
Measurement-Based Optimal Stealthy Attacks on Remote State Estimation. 3365-3374 - Yuki Hirose, Kazuaki Nakamura, Naoko Nitta, Noboru Babaguchi:
Anonymization of Human Gait in Video Based on Silhouette Deformation and Texture Transfer. 3375-3390 - Daniele Friolo, Fabio Massacci, Chan Nam Ngo, Daniele Venturi:
Cryptographic and Financial Fairness. 3391-3406 - Brice Colombier, Vlad-Florin Dragoi, Pierre-Louis Cayrel, Vincent Grosso:
Profiled Side-Channel Attack on Cryptosystems Based on the Binary Syndrome Decoding Problem. 3407-3420 - Fengyao Zhu, Yu Zhu, Xiaoben Jiang, Jiongyao Ye:
Cross-Domain Attention and Center Loss for Sketch Re-Identification. 3421-3432 - Jiajun Zhou, Chenkai Hu, Jianlei Chi, Jiajing Wu, Meng Shen, Qi Xuan:
Behavior-Aware Account De-Anonymization on Ethereum Interaction Graph. 3433-3448 - Ming Jie Lee, Zhe Jin, Shiuan-Ni Liang, Massimo Tistarelli:
Alignment-Robust Cancelable Biometric Scheme for Iris Verification. 3449-3464 - Zeyuan Yin, Bingsheng Zhang, Jingzhong Xu, Kaiyu Lu, Kui Ren:
Bool Network: An Open, Distributed, Secure Cross-Chain Notary Platform. 3465-3478 - Yuanyuan He, Xinyu Tan, Jianbing Ni, Laurence T. Yang, Xianjun Deng:
Differentially Private Set Intersection for Asymmetrical ID Alignment. 3479-3494 - Chung-Wei Weng, Yauhen Yakimenka, Hsuan-Yin Lin, Eirik Rosnes, Jörg Kliewer:
Generative Adversarial User Privacy in Lossy Single-Server Information Retrieval. 3495-3510 - Qinbao Xu, Elisa Bertino, Changda Wang:
Compact Provenance Scheme Through Packet Path Index Differences in WSNs. 3511-3524 - Shanshan Li, Chunxiang Xu, Yuan Zhang, Jianying Zhou:
A Secure Two-Factor Authentication Scheme From Password-Protected Hardware Tokens. 3525-3538 - Solène Bernard, Patrick Bas, John Klein, Tomás Pevný:
Backpack: A Backpropagable Adversarial Embedding Scheme. 3539-3554 - Jingdian Ming, Yongbin Zhou, Wei Cheng, Huizhong Li:
Optimizing Higher-Order Correlation Analysis Against Inner Product Masking Scheme. 3555-3568 - Chuan Zhang, Mingyang Zhao, Liehuang Zhu, Tong Wu, Ximeng Liu:
Enabling Efficient and Strong Privacy-Preserving Truth Discovery in Mobile Crowdsensing. 3569-3581 - Songlei Wang, Yifeng Zheng, Xiaohua Jia, Hejiao Huang, Cong Wang:
OblivGM: Oblivious Attributed Subgraph Matching as a Cloud Service. 3582-3596 - Michele Grisafi, Mahmoud Ammar, Kasim Sinan Yildirim, Bruno Crispo:
MPI: Memory Protection for Intermittent Computing. 3597-3610 - Michael G. Kallitsis, Rupesh Prajapati, Vasant G. Honavar, Dinghao Wu, John Yen:
Detecting and Interpreting Changes in Scanning Behavior in Large Network Telescopes. 3611-3625 - Farshad Rostami Ghadi, Francisco Javier López-Martínez, Wei-Ping Zhu, Jean-Marie Gorce:
The Impact of Side Information on Physical Layer Security Under Correlated Fading Channels. 3626-3636 - Bowen Zhao, Jiaming Yuan, Ximeng Liu, Yongdong Wu, HweeHwa Pang, Robert H. Deng:
SOCI: A Toolkit for Secure Outsourced Computation on Integers. 3637-3648 - Ying Miao, Qiong Huang, Meiyan Xiao, Willy Susilo:
Blockchain Assisted Multi-Copy Provable Data Possession With Faults Localization in Multi-Cloud Storage. 3663-3676 - Le Qin, Fei Peng, Min Long:
Face Morphing Attack Detection and Localization Based on Feature-Wise Supervision. 3649-3662 - Xiaolu Hou, Jakub Breier, Shivam Bhasin:
SBCMA: Semi-Blind Combined Middle-Round Attack on Bit-Permutation Ciphers With Application to AEAD Schemes. 3677-3690 - Xiaoyu Cao, Zaixi Zhang, Jinyuan Jia, Neil Zhenqiang Gong:
FLCert: Provably Secure Federated Learning Against Poisoning Attacks. 3691-3705 - Zhiyuan He, Jun Zhang, Liaojun Pang, Eryun Liu:
PFVNet: A Partial Fingerprint Verification Network Learned From Large Fingerprint Matching. 3706-3719 - Wanming Hao, Junjie Li, Gangcan Sun, Ming Zeng, Octavia A. Dobre:
Securing Reconfigurable Intelligent Surface-Aided Cell-Free Networks. 3720-3733 - Zhen Hong, Xiong Li, Zhenyu Wen, Leiqiang Zhou, Huan Chen, Jie Su:
ESP Spoofing: Covert Acoustic Attack on MEMS Gyroscopes in Vehicles. 3734-3747 - Hugo Proença:
: A Learning-Based Framework to Augment Permanence. 3748-3757 - Sha Ma, Yijian Zhong, Qiong Huang:
Efficient Public Key Encryption With Outsourced Equality Test for Cloud-Based IoT Environments. 3758-3772 - Yinbo Yu, Jiajia Liu:
TAPInspector: Safety and Liveness Verification of Concurrent Trigger-Action IoT Systems. 3773-3788 - Fei Tong, Xing Chen, Kaiming Wang, Yujian Zhang:
CCAP: A Complete Cross-Domain Authentication Based on Blockchain for Internet of Things. 3789-3800 - Pingan Fan, Hong Zhang, Xianfeng Zhao:
Adaptive QIM With Minimum Embedding Cost for Robust Video Steganography on Social Networks. 3801-3815 - Bao Gia Doan, Minhui Xue, Shiqing Ma, Ehsan Abbasnejad, Damith C. Ranasinghe:
TnT Attacks! Universal Naturalistic Adversarial Patches Against Deep Neural Network Systems. 3816-3830 - Aryan Mohammadi Pasikhani, John A. Clark, Prosanta Gope:
Adversarial RL-Based IDS for Evolving Data Environment in 6LoWPAN. 3831-3846 - Durba Chatterjee, Harishma Boyapally, Sikhar Patranabis, Urbi Chatterjee, Aritra Hazra, Debdeep Mukhopadhyay:
Physically Related Functions: Exploiting Related Inputs of PUFs for Authenticated-Key Exchange. 3847-3862 - Pei Cao, Chi Zhang, Xiangjun Lu, Dawu Gu, Sen Xu:
Improving Deep Learning Based Second-Order Side-Channel Analysis With Bilinear CNN. 3863-3876 - Liron David, Avinatan Hassidim, Yossi Matias, Moti Yung, Alon Ziv:
Eddystone-EID: Secure and Private Infrastructural Protocol for BLE Beacons. 3877-3889 - Matthew Bradbury, Arshad Jhumka:
Quantifying Source Location Privacy Routing Performance via Divergence and Information Loss. 3890-3905 - Unai Rioja, Lejla Batina, Igor Armendariz, Jose Luis Flores:
Towards Human Dependency Elimination: AI Approach to SCA Robustness Assessment. 3906-3921 - Krishnan Rajkumar, Antriksh Goswami, K. Lakshmanan, Ruchir Gupta:
Comment on "Federated Learning With Differential Privacy: Algorithms and Performance Analysis". 3922-3924 - Woojin Jeong, Eunmin Choi, Hoseung Song, Minji Cho, Ji-Woong Choi:
Adaptive Controller Area Network Intrusion Detection System Considering Temperature Variations. 3925-3933 - Ehsan Hallaji, Roozbeh Razavi-Far, Meng Wang, Mehrdad Saif, Bruce Fardanesh:
A Stream Learning Approach for Real-Time Identification of False Data Injection Attacks in Cyber-Physical Power Systems. 3934-3945 - Darren Hurley-Smith, Constantinos Patsakis, Julio C. Hernandez-Castro:
On the Unbearable Lightness of FIPS 140-2 Randomness Tests. 3946-3958 - Oleg Schell, Claudio Oechsler, Marcel Kneib:
Asymmetric Symbol and Skew Sender Identification for Automotive Networks. 3959-3971 - Su Wang, Zhiliang Wang, Tao Zhou, Hongbin Sun, Xia Yin, Dongqi Han, Han Zhang, Xingang Shi, Jiahai Yang:
THREATRACE: Detecting and Tracing Host-Based Threats in Node Level Through Provenance Graph Learning. 3972-3987 - Lu Lv, Zan Li, Haiyang Ding, Naofal Al-Dhahir, Jian Chen:
Achieving Covert Wireless Communication With a Multi-Antenna Relay. 760-773 - Jianze Wei, Huaibo Huang, Yunlong Wang, Ran He, Zhenan Sun:
Towards More Discriminative and Robust Iris Recognition by Learning Uncertain Factors. 865-879 - Yandong Zheng, Rongxing Lu, Yunguo Guan, Songnian Zhang, Jun Shao, Hui Zhu:
Efficient and Privacy-Preserving Similarity Query With Access Control in eHealthcare. 880-893 - Liang Zhang, Feiyang Qiu, Feng Hao, Haibin Kan:
1-Round Distributed Key Generation With Efficient Reconstruction Using Decentralized CP-ABE. 894-907 - Shan Gu, Jianjiang Feng, Jiwen Lu, Jie Zhou:
Latent Fingerprint Indexing: Robust Representation and Adaptive Candidate List. 908-923 - Wei Liu, Ruiming Wang, Xuyan Qi, Liehui Jiang, Jing Jing:
Multiclass Classification-Based Side-Channel Hybrid Attacks on Strong PUFs. 924-937 - Ning Lu, Junwei Zhang, Ximeng Liu, Wenbo Shi, Jianfeng Ma:
STOP: A Service Oriented Internet Purification Against Link Flooding Attacks. 938-953 - Zhaoyang Cheng, Guanpu Chen, Yiguang Hong:
Single-Leader-Multiple-Followers Stackelberg Security Game With Hypergame Framework. 954-969 - Zhaohui Zheng, Bichao Xu, Jianping Ju, Zhongyuan Guo, Changhui You, Qiang Lei, Qiang Zhang:
Circumferential Local Ternary Pattern: New and Efficient Feature Descriptors for Anti-Counterfeiting Pattern Identification. 970-981 - Pingchuan Ma, Zhibo Liu, Yuanyuan Yuan, Shuai Wang:
NeuralD: Detecting Indistinguishability Violations of Oblivious RAM With Neural Distinguishers. 982-997 - Cairong Zhao, Liang Zhu, Shuguang Dou, Weihong Deng, Liang Wang:
Detecting Overlapped Objects in X-Ray Security Imagery by a Label-Aware Mechanism. 998-1009 - Tiep Minh Hoang, Trinh Van Chien, Thien Van Luong, Symeon Chatzinotas, Björn E. Ottersten, Lajos Hanzo:
Detection of Spoofing Attacks in Aeronautical Ad-Hoc Networks Using Deep Autoencoders. 1010-1023 - Gaoyang Liu, Tianlong Xu, Xiaoqiang Ma, Chen Wang:
Your Model Trains on My Data? Protecting Intellectual Property of Training Data via Membership Fingerprint Authentication. 1024-1037 - Xiu-Chuan Li, Xu-Yao Zhang, Fei Yin, Cheng-Lin Liu:
Decision-Based Adversarial Attack With Frequency Mixup. 1038-1052 - Qin Jiang, Ee-Chien Chang, Yong Qi, Saiyu Qi, Pengfei Wu, Jianfeng Wang:
Rphx: Result Pattern Hiding Conjunctive Query Over Private Compressed Index Using Intel SGX. 1053-1068 - Zijie Yang, Jiahao Cao, Zhuotao Liu, Xiaoli Zhang, Kun Sun, Qi Li:
Good Learning, Bad Performance: A Novel Attack Against RL-Based Congestion Control Systems. 1069-1082 - Yang Yang, Ke Mu, Robert H. Deng:
Lightweight Privacy-Preserving GAN Framework for Model Training and Image Synthesis. 1083-1098 - Shuo Wang, Surya Nepal, Alsharif Abuadbba, Carsten Rudolph, Marthie Grobler:
Adversarial Detection by Latent Style Transformations. 1099-1114 - Peng Xu, Willy Susilo, Wei Wang, Tianyang Chen, Qianhong Wu, Kaitai Liang, Hai Jin:
ROSE: Robust Searchable Encryption With Forward and Backward Security. 1115-1130 - Inkyu Bang, Taehoon Kim, Han Seung Jang, Dan Keun Sung:
An Opportunistic Power Control Scheme for Mitigating User Location Tracking Attacks in Cellular Networks. 1131-1144 - Danilo Avola, Marco Cascio, Luigi Cinque, Alessio Fagioli, Chiara Petrioli:
Person Re-Identification Through Wi-Fi Extracted Radio Biometric Signatures. 1145-1158 - Mustafizur Rahman, Liang Zhou, Shantanu Chakrabartty:
SPoTKD: A Protocol for Symmetric Key Distribution Over Public Channels Using Self-Powered Timekeeping Devices. 1159-1171 - Zihao Cheng, Dong Yue, Shigen Shen, Songlin Hu, Lei Chen:
Secure Frequency Control of Hybrid Power System Under DoS Attacks via Lie Algebra. 1172-1184 - Lucian Popa, Bogdan Groza, Camil Jichici, Pal-Stefan Murvay:
ECUPrint - Physical Fingerprinting Electronic Control Units on CAN Buses Inside Cars and SAE J1939 Compliant Vehicles. 1185-1200
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.