筛选条件 共查询到500条结果
排序方式
Privacy Leakage of SIFT Features via Deep Generative Model Based Image Reconstruction

期刊: IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2021; 16 ()

Many practical applications, e.g., content based image retrieval and object recognition, heavily rely on the local features extracted from the query i......

Effective and Robust Physical-World Attacks on Deep Learning Face Recognition Systems

期刊: IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2021; 16 ()

Deep neural networks (DNNs) have been increasingly used in face recognition (FR) systems. Recent studies, however, show that DNNs are vulnerable to ad......

CRSA: A Cryptocurrency Recovery Scheme Based on Hidden Assistance Relationships

期刊: IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2021; 16 ()

As cryptocurrency and blockchain-related assets become more common in our digital society, there is a corresponding need to secure our digital assets,......

Privacy-Utility Tradeoff for Hypothesis Testing Over a Noisy Channel

期刊: IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2021; 16 ()

We study a hypothesis testing problem with a privacy constraint over a noisy channel and derive the performance of optimal tests under the Neyman-Pear......

TRACE: Enterprise-Wide Provenance Tracking for Real-Time APT Detection

期刊: IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2021; 16 ()

We present TRACE, a comprehensive provenance tracking system for scalable, real-time, enterprise-wide APT detection. TRACE uses static analysis to ide......

Steganalysis of H.264/AVC Videos Exploiting Subtractive Prediction Error Blocks

期刊: IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2021; 16 ()

To cope with the abuse of steganography using H.264 videos, i.e., the dominant video format, as the carrier, this paper presents a steganalytic method......

Modulation Classification Based on Fourth-Order Cumulants of Superposed Signal in NOMA Systems

期刊: IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2021; 16 ()

In this paper, we study the automatic modulation classification in a non-orthogonal multiple access system. To mitigate the effect of interference, a ......

DPF-ECC: A Framework for Efficient ECC With Double Precision Floating-Point Computing Power

期刊: IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2021; 16 ()

Used ubiquitously in a huge amount of security protocols or applications, elliptic curve cryptography (ECC) is one of the most important cryptographic......

MCTSteg: A Monte Carlo Tree Search-Based Reinforcement Learning Framework for Universal Non-Additive Steganography

期刊: IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2021; 16 ()

Recent research has shown that non-additive image steganographic frameworks effectively improve security performance through adjusting distortion dist......

Cryptanalysis of an Anonymous and Traceable Group Data Sharing in Cloud Computing

期刊: IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2021; 16 ()

In cloud environments, group data sharing has become a hot topic in recent years. How to share data securely and efficiently in cloud environments is ......

Efficient JPEG Batch Steganography Using Intrinsic Energy of Image Contents

期刊: IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2021; 16 ()

Batch steganography aims at properly allocating a large payload to multiple covers, so as to keep the whole covert communication at a satisfactory lev......

Decomposed Meta Batch Normalization for Fast Domain Adaptation in Face Recognition

期刊: IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2021; 16 ()

Face recognition systems are sometimes deployed to a target domain with limited unlabeled samples available. For instance, a model trained on the larg......

A Privacy-Preserving Online Ride-Hailing System Without Involving a Third Trusted Server

期刊: IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2021; 16 ()

The increasing popularity of Online Ride-hailing (ORH) services has greatly facilitated our daily travel. It enables a rider to easily request the nea......

Minutiae Attention Network With Reciprocal Distance Loss for Contactless to Contact-Based Fingerprint Identification

期刊: IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2021; 16 ()

Interoperability between contactless and conventional contact-based fingerprint recognition systems is fundamental for the success of emerging contact......

Face Anti-Spoofing via Adversarial Cross-Modality Translation

期刊: IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2021; 16 ()

Face Presentation Attack Detection (PAD) approaches based on multi-modal data have been attracted increasingly by the research community. However, the......

共500条页码: 1/34页15条/页