The IEEE Transactions on Information Forensics and Security covers the sciences, technologies, and applications relating to information forensics, information security, biometrics, surveillance and systems applications that incorporate these features
Multi-Task GANs for View-Specific Feature Learning in Gait Recognition
来源期刊:IEEE Transactions on Information Forensics and SecurityDOI:10.1109/TIFS.2018.2844819
CNN-Based Adversarial Embedding for Image Steganography
来源期刊:IEEE Transactions on Information Forensics and SecurityDOI:10.1109/TIFS.2019.2891237
ADMM Based Privacy-Preserving Decentralized Optimization
来源期刊:IEEE Transactions on Information Forensics and SecurityDOI:10.1109/TIFS.2018.2855169
Secure Key Agreement and Key Protection for Mobile Device User Authentication
来源期刊:IEEE Transactions on Information Forensics and SecurityDOI:10.1109/TIFS.2018.2850299
AnomalyNet: An Anomaly Detection Network for Video Surveillance
来源期刊:IEEE Transactions on Information Forensics and SecurityDOI:10.1109/TIFS.2019.2900907
Joint Discriminative Learning of Deep Dynamic Textures for 3D Mask Face Anti-Spoofing
来源期刊:IEEE Transactions on Information Forensics and SecurityDOI:10.1109/TIFS.2018.2868230
Real-Time Detection of Hybrid and Stealthy Cyber-Attacks in Smart Grid
来源期刊:IEEE Transactions on Information Forensics and SecurityDOI:10.1109/TIFS.2018.2854745
Passive Attacks Against Searchable Encryption
来源期刊:IEEE Transactions on Information Forensics and SecurityDOI:10.1109/TIFS.2018.2866321
Ensemble of Multi-View Learning Classifiers for Cross-Domain Iris Presentation Attack Detection
来源期刊:IEEE Transactions on Information Forensics and SecurityDOI:10.1109/TIFS.2018.2878542
Lightweight and Privacy-Friendly Spatial Data Aggregation for Secure Power Supply and Demand Management in Smart Grids
来源期刊:IEEE Transactions on Information Forensics and SecurityDOI:10.1109/TIFS.2018.2881730
$PROST$ : Privacy-Preserving and Truthful Online Double Auction for Spectrum Allocation
来源期刊:IEEE Transactions on Information Forensics and SecurityDOI:10.1109/TIFS.2018.2850330
Why Botnets Work: Distributed Brute-Force Attacks Need No Synchronization
来源期刊:IEEE Transactions on Information Forensics and SecurityDOI:10.1109/TIFS.2019.2895955
Face-Based Multiple User Active Authentication on Mobile Devices
来源期刊:IEEE Transactions on Information Forensics and SecurityDOI:10.1109/TIFS.2018.2876748
Iris Recognition After Death
来源期刊:IEEE Transactions on Information Forensics and SecurityDOI:10.1109/TIFS.2018.2881671
Finger Vein Code: From Indexing to Matching
来源期刊:IEEE Transactions on Information Forensics and SecurityDOI:10.1109/TIFS.2018.2871778
Privacy-Preserving Deep Learning via Weight Transmission
来源期刊:IEEE Transactions on Information Forensics and SecurityDOI:10.1109/TIFS.2019.2911169
Recurrent Adaptation Networks for Online Signature Verification
来源期刊:IEEE Transactions on Information Forensics and SecurityDOI:10.1109/TIFS.2018.2883152
Jamming-Assisted Eavesdropping Over Parallel Fading Channels
来源期刊:IEEE Transactions on Information Forensics and SecurityDOI:10.1109/TIFS.2019.2901821
Cancelable Biometric Recognition With ECGs: Subspace-Based Approaches
来源期刊:IEEE Transactions on Information Forensics and SecurityDOI:10.1109/TIFS.2018.2876838
Digital Audio Signature for 3D Printing Integrity
来源期刊:IEEE Transactions on Information Forensics and SecurityDOI:10.1109/TIFS.2018.2851584
Patchwork-Based Audio Watermarking Robust Against De-Synchronization and Recapturing Attacks
来源期刊:IEEE Transactions on Information Forensics and SecurityDOI:10.1109/TIFS.2018.2871748
Energy-Constrained SWIPT Networks: Enhancing Physical Layer Security With FD Self-Jamming
来源期刊:IEEE Transactions on Information Forensics and SecurityDOI:10.1109/TIFS.2018.2848630
Robust Beamforming and Jamming for Enhancing the Physical Layer Security of Full Duplex Radios
来源期刊:IEEE Transactions on Information Forensics and SecurityDOI:10.1109/TIFS.2019.2908481
Towards Efficient Fine-Grained Access Control and Trustworthy Data Processing for Remote Monitoring Services in IoT
来源期刊:IEEE Transactions on Information Forensics and SecurityDOI:10.1109/TIFS.2018.2885287
Multi-Beam Directional Modulation Synthesis Scheme Based on Frequency Diverse Array
来源期刊:IEEE Transactions on Information Forensics and SecurityDOI:10.1109/TIFS.2019.2900942
From Noise to Feature: Exploiting Intensity Distribution as a Novel Soft Biometric Trait for Finger Vein Recognition
来源期刊:IEEE Transactions on Information Forensics and SecurityDOI:10.1109/TIFS.2018.2866330
The MalSource Dataset: Quantifying Complexity and Code Reuse in Malware Development
来源期刊:IEEE Transactions on Information Forensics and SecurityDOI:10.1109/TIFS.2018.2885512
Detection of Jamming Attack in Non-Coherent Massive SIMO Systems
来源期刊:IEEE Transactions on Information Forensics and SecurityDOI:10.1109/TIFS.2019.2899484
Improving the Robustness of Adaptive Steganographic Algorithms Based on Transport Channel Matching
来源期刊:IEEE Transactions on Information Forensics and SecurityDOI:10.1109/TIFS.2018.2885438
Accurate and Scalable Image Clustering Based on Sparse Representation of Camera Fingerprint
来源期刊:IEEE Transactions on Information Forensics and SecurityDOI:10.1109/TIFS.2018.2886929
Differentially Private Double Spectrum Auction With Approximate Social Welfare Maximization
来源期刊:IEEE Transactions on Information Forensics and SecurityDOI:10.1109/TIFS.2019.2908070
Securing Android App Markets via Modeling and Predicting Malware Spread Between Markets
来源期刊:IEEE Transactions on Information Forensics and SecurityDOI:10.1109/TIFS.2018.2889924
ABSI: An Adaptive Binary Splitting Algorithm for Malicious Meter Inspection in Smart Grid
来源期刊:IEEE Transactions on Information Forensics and SecurityDOI:10.1109/TIFS.2018.2854703
Information-Theoretic Bounds for the Forensic Detection of Downscaled Signals
来源期刊:IEEE Transactions on Information Forensics and SecurityDOI:10.1109/TIFS.2018.2889259
Retrieving Hidden Friends: A Collusion Privacy Attack Against Online Friend Search Engine
来源期刊:IEEE Transactions on Information Forensics and SecurityDOI:10.1109/TIFS.2018.2866309
$LiveForen$ : Ensuring Live Forensic Integrity in the Cloud
来源期刊:IEEE Transactions on Information Forensics and SecurityDOI:10.1109/TIFS.2019.2898841
Secure Communication in Relay-Assisted Massive MIMO Downlink With Active Pilot Attacks
来源期刊:IEEE Transactions on Information Forensics and SecurityDOI:10.1109/TIFS.2019.2901825
A Scalable Architecture for Uncompressed-Domain Watermarked Videos
来源期刊:IEEE Transactions on Information Forensics and SecurityDOI:10.1109/TIFS.2018.2879301
Every Shred Helps: Assembling Evidence From Orphaned JPEG Fragments
来源期刊:IEEE Transactions on Information Forensics and SecurityDOI:10.1109/TIFS.2019.2897912
Attended Relation Feature Representation of Facial Dynamics for Facial Authentication
来源期刊:IEEE Transactions on Information Forensics and SecurityDOI:10.1109/TIFS.2018.2885276
Impact of Prior Knowledge and Data Correlation on Privacy Leakage: A Unified Analysis
来源期刊:IEEE Transactions on Information Forensics and SecurityDOI:10.1109/TIFS.2019.2895970
Cost-Sensitive Label Propagation for Semi-Supervised Face Recognition
来源期刊:IEEE Transactions on Information Forensics and SecurityDOI:10.1109/TIFS.2018.2885252
$\\alpha$ -Trimmed Weber Representation and Cross Section Asymmetrical Coding for Human Identification Using Finger Images
来源期刊:IEEE Transactions on Information Forensics and SecurityDOI:10.1109/TIFS.2018.2844803
Shortlisting the Influential Members of Criminal Organizations and Identifying Their Important Communication Channels
来源期刊:IEEE Transactions on Information Forensics and SecurityDOI:10.1109/TIFS.2018.2890811
Exploring Character Shapes for Unsupervised Reconstruction of Strip-Shredded Text Documents
来源期刊:IEEE Transactions on Information Forensics and SecurityDOI:10.1109/TIFS.2018.2885253
Securing Network Coding Architectures Against Pollution Attacks With Band Codes
来源期刊:IEEE Transactions on Information Forensics and SecurityDOI:10.1109/TIFS.2018.2859583
A Synergistic Concealed Information Test With Novel Approach for EEG Channel Selection and SVM Parameter Optimization
来源期刊:IEEE Transactions on Information Forensics and SecurityDOI:10.1109/TIFS.2019.2913798
Secrecy Amplification of Distributed Encrypted Sources With Correlated Keys Using Post-Encryption-Compression
来源期刊:IEEE Transactions on Information Forensics and SecurityDOI:10.1109/TIFS.2019.2907464
Detection of Speech Smoothing on Very Short Clips
来源期刊:IEEE Transactions on Information Forensics and SecurityDOI:10.1109/TIFS.2019.2900935
Detection of Counterfeit ICs Using Public Identification Sequences and Side-Channel Leakage
来源期刊:IEEE Transactions on Information Forensics and SecurityDOI:10.1109/TIFS.2018.2866333