期刊: IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2021; 16 ()
Many practical applications, e.g., content based image retrieval and object recognition, heavily rely on the local features extracted from the query i......
期刊: IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2021; 16 ()
Deep neural networks (DNNs) have been increasingly used in face recognition (FR) systems. Recent studies, however, show that DNNs are vulnerable to ad......
期刊: IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2021; 16 ()
As cryptocurrency and blockchain-related assets become more common in our digital society, there is a corresponding need to secure our digital assets,......
期刊: IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2021; 16 ()
We study a hypothesis testing problem with a privacy constraint over a noisy channel and derive the performance of optimal tests under the Neyman-Pear......
期刊: IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2021; 16 ()
We present TRACE, a comprehensive provenance tracking system for scalable, real-time, enterprise-wide APT detection. TRACE uses static analysis to ide......
期刊: IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2021; 16 ()
To cope with the abuse of steganography using H.264 videos, i.e., the dominant video format, as the carrier, this paper presents a steganalytic method......
期刊: IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2021; 16 ()
In this paper, we study the automatic modulation classification in a non-orthogonal multiple access system. To mitigate the effect of interference, a ......
期刊: IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2021; 16 ()
Used ubiquitously in a huge amount of security protocols or applications, elliptic curve cryptography (ECC) is one of the most important cryptographic......
期刊: IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2021; 16 ()
Recent research has shown that non-additive image steganographic frameworks effectively improve security performance through adjusting distortion dist......
期刊: IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2021; 16 ()
In cloud environments, group data sharing has become a hot topic in recent years. How to share data securely and efficiently in cloud environments is ......
期刊: IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2021; 16 ()
Batch steganography aims at properly allocating a large payload to multiple covers, so as to keep the whole covert communication at a satisfactory lev......
期刊: IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2021; 16 ()
Face recognition systems are sometimes deployed to a target domain with limited unlabeled samples available. For instance, a model trained on the larg......
期刊: IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2021; 16 ()
The increasing popularity of Online Ride-hailing (ORH) services has greatly facilitated our daily travel. It enables a rider to easily request the nea......
期刊: IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2021; 16 ()
Interoperability between contactless and conventional contact-based fingerprint recognition systems is fundamental for the success of emerging contact......
期刊: IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2021; 16 ()
Face Presentation Attack Detection (PAD) approaches based on multi-modal data have been attracted increasingly by the research community. However, the......