default search action
IEEE Transactions on Information Forensics and Security, Volume 9
Volume 9, Number 1, January 2014
- Xixiang Lv, Yi Mu, Hui Li:
Non-Interactive Key Establishment for Bundle Security Protocol of Space DTNs. 5-13 - Zhenhua Chai, Zhenan Sun, Heydi Mendez Vazquez, Ran He, Tieniu Tan:
Gabor Ordinal Measures for Face Recognition. 14-26 - Junjie Zhang, Roberto Perdisci, Wenke Lee, Xiapu Luo, Unum Sarfraz:
Building a Scalable System for Stealthy P2P-Botnet Detection. 27-38 - Jiantao Zhou, Xianming Liu, Oscar C. Au, Yuan Yan Tang:
Designing an Efficient Image Encryption-Then-Compression System via Prediction Error Clustering and Random Permutation. 39-50 - Jiwen Lu, Gang Wang, Pierre Moulin:
Human Identity and Gender Recognition From Gait Sequences With Arbitrary Walking Directions. 51-61 - Pablo David Gutiérrez, Miguel Lastra, Francisco Herrera, José Manuel Benítez:
A High Performance Fingerprint Matching System for Large Databases Based on GPU. 62-71 - Junghwan Rhee, Ryan D. Riley, Zhiqiang Lin, Xuxian Jiang, Dongyan Xu:
Data-Centric OS Kernel Malware Characterization. 72-87 - Kai-Hui Lee, Pei-Ling Chiu:
Digital Image Sharing by Diverse Image Media. 88-98 - Vaibhav Rastogi, Yan Chen, Xuxian Jiang:
Catch Me If You Can: Evaluating Android Anti-Malware Against Transformation Attacks. 99-108 - Chia-Mu Yu, Guo-Kai Ni, Ing-Yi Chen, Erol Gelenbe, Sy-Yen Kuo:
Top-$k$ Query Result Completeness Verification in Tiered Sensor Networks. 109-124 - Andrew Chi-Chih Yao, Yunlei Zhao:
Privacy-Preserving Authenticated Key-Exchange Over Internet. 125-140
Volume 9, Number 2, February 2014
- Peng Xu, Zhiguo Ding, Xuchu Dai, Kin K. Leung:
A General Framework of Wiretap Channel With Helping Interference and State Information. 182-195 - Zhiyong Shan, Xin Wang:
Growing Grapes in Your Computer to Defend Against Malware. 196-207 - Hong Liu, Huansheng Ning, Yan Zhang, Qingxu Xiong, Laurence T. Yang:
Role-Dependent Privacy Preservation for Secure V2G Networks in the Smart Grid. 208-220 - Steffen Schulz, Vijay Varadharajan, Ahmad-Reza Sadeghi:
The Silence of the LANs: Efficient Leakage Resilience for IPsec VPNs. 221-232 - Xin Liu, Yiu-ming Cheung:
Learning Multi-Boosted HMMs for Lip-Password Based Speaker Verification. 233-246 - Lifeng Wang, Nan (Jonas) Yang, Maged Elkashlan, Phee Lep Yeoh, Jinhong Yuan:
Physical Layer Security of Maximal Ratio Combining in Two-Wave With Diffuse Power Fading Channels. 247-258 - Takao Murakami, Kenta Takahashi, Kanta Matsuura:
Toward Optimal Fusion Algorithms With Security Against Wolves and Lambs in Biometrics. 259-271 - Ning Wang, Ning Zhang, T. Aaron Gulliver:
Cooperative Key Agreement for Wireless Networking: Key Rates and Practical Protocol Design. 272-284 - Jeffrey R. Paone, Patrick J. Flynn, P. Jonathon Phillips, Kevin W. Bowyer, Richard W. Vorder Bruegge, Patrick Grother, George W. Quinn, Matthew T. Pruitt, Jason M. Grant:
Double Trouble: Differentiating Identical Twins by Face Recognition. 285-295 - Muhammad Qasim Ali, Ehab Al-Shaer, Taghrid Samak:
Firewall Policy Reconnaissance: Techniques and Analysis. 296-308 - Bing Zeng, Jeff Siu-Kei Au-Yeung, Shuyuan Zhu, Moncef Gabbouj:
Perceptual Encryption of H.264 Videos: Embedding Sign-Flips Into the Integer-Based Transforms. 309-320 - Mohamad Badra, Sherali Zeadally:
Design and Performance Analysis of a Virtual Ring Architecture for Smart Grid Privacy. 321-329
Volume 9, Number 3, March 2014
- C.-C. Jay Kuo:
Editorial. 337-338 - Yajuan Tang, Xiapu Luo, Qing Hui, Rocky K. C. Chang:
Modeling the Vulnerability of Feedback-Control Based Internet Services to Low-Rate DoS Attacks. 339-353 - Erik Matlin, Motilal Agrawal, David Stoker:
Non-Invasive Recognition of Poorly Resolved Integrated Circuit Elements. 354-363 - Pietro Lovato, Manuele Bicego, Cristina Segalin, Alessandro Perina, Nicu Sebe, Marco Cristani:
Faved! Biometrics: Tell Me Which Image You Like and I'll Tell You Who You Are. 364-374 - Reza Soosahabi, Mort Naraghi-Pour, Dmitri D. Perkins, Magdy A. Bayoumi:
Optimal Probabilistic Encryption for Secure Detection in Wireless Sensor Networks. 375-385 - Taha A. Khalaf, Sang Wu Kim, Alaa E. Abdel-Hakim:
Tradeoff Between Reliability and Security in Multiple Access Relay Networks Under Falsified Data Injection Attack. 386-396 - Javier Franco-Contreras, Gouenou Coatrieux, Frédéric Cuppens, Nora Cuppens-Boulahia, Christian Roux:
Robust Lossless Watermarking of Relational Databases Based on Circular Histogram Modulation. 397-410 - Michael Arnold, Xiao-Ming Chen, Peter G. Baum, Ulrich Gries, Gwenaël J. Doërr:
A Phase-Based Audio Watermarking System Robust to Acoustic Path Propagation. 411-425 - Erfan Soltanmohammadi, Mort Naraghi-Pour:
Nonparametric Density Estimation, Hypotheses Testing, and Sensor Classification in Centralized Detection. 426-435 - Bingyang Liu, Jun Bi, Athanasios V. Vasilakos:
Toward Incentivizing Anti-Spoofing Deployment. 436-450 - Jun Yan, Haibo He, Yan Sun:
Integrated Security Analysis on Cascading Failure in Complex Networks. 451-463 - Pedro Tome-Gonzalez, Julian Fiérrez, Rubén Vera-Rodríguez, Mark S. Nixon:
Soft Biometrics and Their Application in Person Recognition at a Distance. 464-475 - Heng Zhou, Lauren M. Huie, Lifeng Lai:
Secret Key Generation in the Two-Way Relay Channel With Active Attackers. 476-488 - Haojun Wu, Yong Wang, Jiwu Huang:
Identification of Electronic Disguised Voices. 489-500 - Jun-Yong Zhu, Wei-Shi Zheng, Jian-Huang Lai, Stan Z. Li:
Matching NIR Face to VIS Face Using Transduction. 501-514 - Gang Cao, Yao Zhao, Rongrong Ni, Xuelong Li:
Contrast Enhancement-Based Forensics in Digital Images. 515-525 - Xiangqian Wu, Youbao Tang, Wei Bu:
Offline Text-Independent Writer Identification Based on Scale Invariant Feature Transform. 526-536
Volume 9, Number 4, April 2014
- Zhuo Wei, Yongdong Wu, Robert H. Deng, Xuhua Ding:
A Hybrid Scheme for Authenticating Scalable Video Codestreams. 543-553 - Giovanni Chierchia, Giovanni Poggi, Carlo Sansone, Luisa Verdoliva:
A Bayesian-MRF Approach for PRNU-Based Image Forgery Detection. 554-567 - Napa Sae-Bae, Nasir D. Memon, Katherine Isbister, Kowsar Ahmed:
Multitouch Gesture-Based Authentication. 568-582 - Makkena Purnachandra Rao, A. N. Rajagopalan, Guna Seetharaman:
Harnessing Motion Blur to Unveil Splicing. 583-595 - Dawen Xu, Rangding Wang, Yun Q. Shi:
Data Hiding in Encrypted H.264/AVC Video Streams by Codeword Substitution. 596-606 - Hans Georg Schaathun:
Attacks on Kuribayashi's Fingerprinting Scheme. 607-609 - Minoru Kuribayashi:
Simplified MAP Detector for Binary Fingerprinting Code Embedded by Spread Spectrum Watermarking Scheme. 610-623 - Chunxiao Cai, Yueming Cai, Xiangyun Zhou, Weiwei Yang, Wendong Yang:
When Does Relay Transmission Give a More Secure Connection in Wireless Ad Hoc Networks? 624-632 - Mahmoud M. Elmesalawy, Mostafa M. Eissa:
New Forensic ENF Reference Database for Media Recording Authentication Based on Harmony Search Technique Using GIS and Wide Area Frequency Measurements. 633-644 - Lin Ding, Chenhui Jin, Jie Guan, Qiuyan Wang:
Cryptanalysis of Lightweight WG-8 Stream Cipher. 645-652 - Roberto De Prisco, Alfredo De Santis:
On the Relation of Random Grid and Deterministic Visual Cryptography. 653-665 - Han Su, Adams Wai-Kin Kong:
A Study on Low Resolution Androgenic Hair Patterns for Criminal and Victim Identification. 666-680 - Sankardas Roy, Mauro Conti, Sanjeev Setia, Sushil Jajodia:
Secure Data Aggregation in Wireless Sensor Networks: Filtering out the Attacker's Impact. 681-694 - Mun-Kyu Lee:
Security Notions and Advanced Method for Human Shoulder-Surfing Resistant PIN-Entry. 695-708 - Bogdan Carbunar, Mahmudur Rahman, Jaime Ballesteros, Naphtali Rishe, Athanasios V. Vasilakos:
${\rm PROFIL}_{R}$: Toward Preserving Privacy and Functionality in Geosocial Networks. 709-718 - Gaojie Chen, Zhao Tian, Yu Gong, Zhi Chen, Jonathon A. Chambers:
Max-Ratio Relay Selection in Secure Buffer-Aided Cooperative Wireless Networks. 719-729
Volume 9, Number 5, May 2014
- Keren Wang, Hong Zhao, Hongxia Wang:
Video Steganalysis Against Motion Vector-Based Steganography by Adding or Subtracting One Motion Vector Value. 741-751 - Jan Kodovský, Jessica J. Fridrich:
Effect of Image Downsampling on Steganographic Security. 752-762 - Fuchun Guo, Yi Mu, Willy Susilo, Duncan S. Wong, Vijay Varadharajan:
CP-ABE With Constant-Size Keys for Lightweight Devices. 763-771 - Ahmed Alahmadi, Mai Abdelhakim, Jian Ren, Tongtong Li:
Defense Against Primary User Emulation Attacks in Cognitive Radio Networks Using Advanced Encryption Standard. 772-781 - Patrizio Campisi, Daria La Rocca:
Brain waves for automatic biometric-based user recognition. 782-800 - Chia-Hua Lin, Shang-Ho Tsai, Yuan-Pei Lin:
Secure Transmission Using MIMO Precoding. 801-813 - Linjie Guo, Jiangqun Ni, Yun-Qing Shi:
Uniform Embedding for Efficient JPEG Steganography. 814-825 - Nesli Erdogmus, Jean-Luc Dugelay:
3D Assisted Face Recognition: Dealing With Expression Variations. 826-838 - Joan Enric Barceló-Lladó, Antoni Morell, Gonzalo Seco-Granados:
Amplify-and-Forward Compressed Sensing as a Physical-Layer Secrecy Solution in Wireless Sensor Networks. 839-850 - Daksha Yadav, Naman Kohli, James S. Doyle Jr., Richa Singh, Mayank Vatsa, Kevin W. Bowyer:
Unraveling the Effect of Textured Contact Lenses on Iris Recognition. 851-862 - Rubén Heras Evangelio, Michael Pätzold, Ivo Keller, Thomas Sikora:
Adaptively Splitted GMM With Feedback Improvement for the Task of Background Subtraction. 863-874 - Boris Skoric, Niels de Vreede:
The Spammed Code Offset Method. 875-884
Volume 9, Number 6, June 2014
- Bin B. Zhu, Jeff Yan, Guanbo Bao, Maowei Yang, Ning Xu:
Captcha as Graphical Passwords - A New Security Primitive Based on Hard AI Problems. 891-904 - Farzad Farhadzadeh, Sviatoslav Voloshynovskiy:
Active Content Fingerpriting. 905-920 - Le Zhang, Zhi-Hui Kong, Chip-Hong Chang, Alessandro Cabrini, Guido Torelli:
Exploiting Process Variations and Programming Sensitivity of Phase Change Memory for Reconfigurable Physical Unclonable Functions. 921-932 - Napa Sae-Bae, Nasir D. Memon:
Online Signature Verification on Mobile Devices. 933-947 - Pinghui Wang, Xiaohong Guan, Junzhou Zhao, Jing Tao, Tao Qin:
A New Sketch Method for Measuring Host Connection Degree Distribution. 948-960 - Saravanan Sundaresan, Robin Doss, Selwyn Piramuthu, Wanlei Zhou:
A Robust Grouping Proof Protocol for RFID EPC C1G2 Tags. 961-975 - Neil Zhenqiang Gong, Mario Frank, Prateek Mittal:
SybilBelief: A Semi-Supervised Learning Approach for Structure-Based Sybil Detection. 976-987 - Tian Wang, Hichem Snoussi:
Detection of Abnormal Visual Events via Global Optical Flow Orientation Histogram. 988-998 - Shize Guo, Xinjie Zhao, Fan Zhang, Tao Wang, Zhijie Jerry Shi, François-Xavier Standaert, Chujiao Ma:
Exploiting the Incomplete Diffusion Feature: A Specialized Analytical Side-Channel Attack Against the AES and Its Application to Microcontroller Implementations. 999-1014 - Bashar A. Rajoub, Reyer Zwiggelaar:
Thermal Facial Analysis for Deception Detection. 1015-1023 - Shaoquan Jiang:
Keyless Authentication in a Noisy Model. 1024-1033
Volume 9, Number 7, July 2014
- Guang Hua, Jonathan Goh, Vrizlynn L. L. Thing:
A Dynamic Matching Algorithm for Audio Timestamp Identification Using the ENF Criterion. 1045-1055 - Himanshu S. Bhatt, Richa Singh, Mayank Vatsa:
On Recognizing Faces in Videos Using Clustering-Based Re-Ranking and Fusion. 1056-1068 - Jingtang Luo, Xiaolong Yang, Jin Wang, Jie Xu, Jian Sun, Keping Long:
On a Mathematical Model for Low-Rate Shrew DDoS. 1069-1083 - Nesli Erdogmus, Sébastien Marcel:
Spoofing Face Recognition With 3D Masks. 1084-1097 - Fuchun Guo, Yi Mu, Willy Susilo:
Subset Membership Encryption and Its Applications to Oblivious Transfer. 1098-1107 - Matthieu Urvoy, Dalila Goudia, Florent Autrusseau:
Perceptual DFT Watermarking With Improved Detection and Robustness to Geometrical Distortions. 1108-1119 - Pengfei Zhu, Wangmeng Zuo, Lei Zhang, Simon Chi-Keung Shiu, David Zhang:
Image Set-Based Collaborative Representation for Face Recognition. 1120-1132 - David Irakiza, Md. Enamul Karim, Vir V. Phoha:
A Non-Interactive Dual Channel Continuous Traffic Authentication Protocol. 1133-1140 - Igor Bilogrevic, Murtuza Jadliwala, Vishal Joneja, Kübra Kalkan, Jean-Pierre Hubaux, Imad Aad:
Privacy-Preserving Optimal Meeting Location Determination on Mobile Devices. 1141-1156 - Neetesh Saxena, Narendra S. Chaudhari:
EasySMS: A Protocol for End-to-End Secure Transmission of SMS. 1157-1168 - Haibin Yan, Jiwen Lu, Weihong Deng, Xiuzhuang Zhou:
Discriminative Multimetric Learning for Kinship Verification. 1169-1178 - Wencheng Yang, Jiankun Hu, Song Wang:
A Delaunay Quadrangle-Based Fingerprint Authentication System With Template Protection Using Topology Code for Local Registration and Security Enhancement. 1179-1192 - Jae Hong Seo, Keita Emura:
Revocable Identity-Based Cryptosystem Revisited: Security Models and Constructions. 1193-1205
Volume 9, Number 8, August 2014
- Wei Fan, Kai Wang, François Cayre, Zhang Xiong:
JPEG Anti-Forensics With Improved Tradeoff Between Forensic Undetectability and Image Quality. 1211-1226 - Yang Wang, Willy Susilo, Man Ho Au, Guilin Wang:
Collusion-Resistance in Optimistic Fair Exchange. 1227-1239 - Huiming Wang, Feng Liu, Xiang-Gen Xia:
Joint Source-Relay Precoding and Power Allocation for Secure Amplify-and-Forward MIMO Relay Networks. 1240-1250 - Neil Zhenqiang Gong, Di Wang:
On the Security of Trustee-Based Social Authentications. 1251-1263 - Bin Li, Shunquan Tan, Ming Wang, Jiwu Huang:
Investigation on Cost Assignment in Spatial Image Steganography. 1264-1277 - Andrey Garnaev, Melike Baykal-Gursoy, H. Vincent Poor:
Incorporating Attack-Type Uncertainty Into Network Protection. 1278-1287 - Ajay Kumar:
Importance of Being Unique From Finger Dorsal Patterns: Exploring Minor Finger Knuckle Patterns in Verifying Human Identities. 1288-1298 - Fausto Galvan, Giovanni Puglisi, Arcangelo Ranieri Bruna, Sebastiano Battiato:
First Quantization Matrix Estimation From Double Compressed JPEG Images. 1299-1310 - Michail Tsikerdekis, Sherali Zeadally:
Multiple Account Identity Deception Detection in Social Media Using Nonverbal Behavior. 1311-1321 - Fuqing Duan, Yanchao Yang, Yan Li, Yun Tian, Ke Lu, Zhongke Wu, Mingquan Zhou:
Skull Identification via Correlation Measure Between Skull and Face Shape. 1322-1332
Volume 9, Number 9, September 2014
- Fernando Pérez-González, Carmela Troncoso, Simon Oya:
A Least Squares Approach to the Static Traffic Analysis of High-Latency Anonymous Communication Systems. 1341-1355 - Michael R. Clark, Kenneth M. Hopkinson:
Transferable Multiparty Computation With Applications to the Smart Grid. 1356-1366 - Hussein Moosavi, Francis Minhthang Bui:
A Game-Theoretic Framework for Robust Optimal Intrusion Detection in Wireless Sensor Networks. 1367-1379 - Andrea Abrardo, Mauro Barni:
A New Watermarking Scheme Based on Antipodal Binary Dirty Paper Coding. 1380-1393 - Kevin M. Carter, Nwokedi C. Idika, William W. Streilein:
Probabilistic Threat Propagation for Network Security. 1394-1405 - Shaoquan Jiang:
(Im)possibility of Deterministic Commitment Over a Discrete Memoryless Channel. 1406-1415 - Worapan Kusakunniran:
Recognizing Gaits on Spatio-Temporal Feature Domain. 1416-1423 - Andrew D. Ker, Tomás Pevný:
The Steganographer is the Outlier: Realistic Large-Scale Steganalysis. 1424-1435 - Stefano Berretti, Pietro Pala, Alberto Del Bimbo:
Face Recognition by Super-Resolved 3D Models From Consumer Depth Cameras. 1436-1449 - Andrea Costanzo, Irene Amerini, Roberto Caldelli, Mauro Barni:
Forensic Analysis of SIFT Keypoint Removal and Injection. 1450-1464 - Seyyedeh Atefeh Musavi, Mehdi Kharrazi:
Back to Static Analysis for Kernel-Level Rootkit Detection. 1465-1476 - Yen-Wei Huang, Pierre Moulin:
On the Fingerprinting Capacity Games for Arbitrary Alphabets and Their Asymptotics. 1477-1490 - Xavier Rolland-Nevière, Gwenaël J. Doërr, Pierre Alliez:
Triangle Surface Mesh Watermarking Based on a Constrained Optimization Framework. 1491-1501 - Md. Asikuzzaman, Md. Jahangir Alam, Andrew J. Lambert, Mark R. Pickering:
Imperceptible and Robust Blind Video Watermarking Using Chrominance Embedding: A Set of Approaches in the DT CWT Domain. 1502-1517 - Chun-Wei Tan, Ajay Kumar:
Efficient and Accurate At-a-Distance Iris Recognition Using Geometric Key-Based Iris Encoding. 1518-1526
Volume 9, Number 10, October 2014
- Filipe de Oliveira Costa, Marina A. Oikawa, Zanoni Dias, Siome Goldenstein, Anderson de Rezende Rocha:
Image Phylogeny Forests Reconstruction. 1533-1546 - Ning Zhang, Yali Zang, Xin Yang, Xiaofei Jia, Jie Tian:
Adaptive Orientation Model Fitting for Latent Overlapped Fingerprints Separation. 1547-1556 - Tiziano Bianchi, Alessandro Piva:
TTP-Free Asymmetric Fingerprinting Based on Client Side Embedding. 1557-1568 - Jianwu Wan, Ming Yang, Yang Gao, Yin-Juan Chen:
Pairwise Costs in Semisupervised Discriminant Analysis for Face Recognition. 1569-1580 - Wen Zhou, Zhong Zhang:
Human Action Recognition With Multiple-Instance Markov Model. 1581-1591 - Xiaotian Wu, Wei Sun:
Extended Capabilities for XOR-Based Visual Cryptography. 1592-1605 - Honghai Yu, Pierre Moulin:
Regularized Adaboost Learning for Identification of Time-Varying Content. 1606-1616 - Seong Ho Chae, Wan Choi, Jung Hoon Lee, Tony Q. S. Quek:
Enhanced Secrecy in Stochastic Wireless Networks: Artificial Noise With Secrecy Protected Zone. 1617-1628 - Gaurav Goswami, Mayank Vatsa, Richa Singh:
RGB-D Face Recognition With Texture and Attribute Features. 1629-1640 - Siavash Ahmadi, Zahra Ahmadian, Javad Mohajeri, Mohammad Reza Aref:
Low-Data Complexity Biclique Cryptanalysis of Block Ciphers With Application to Piccolo and HIGHT. 1641-1652 - Wei Wang, Jing Dong, Tieniu Tan:
Exploring DCT Coefficient Quantization Effects for Local Tampering Detection. 1653-1666 - Kaitai Liang, Man Ho Au, Joseph K. Liu, Willy Susilo, Duncan S. Wong, Guomin Yang, Tran Viet Xuan Phuong, Qi Xie:
A DFA-Based Functional Proxy Re-Encryption Scheme for Secure Public Cloud Data Sharing. 1667-1680 - Qing Zhang, Yilong Yin, De-Chuan Zhan, Jingliang Peng:
A Novel Serial Multimodal Biometrics Framework Based on Semisupervised Learning Techniques. 1681-1694 - Yongkun Li, John C. S. Lui:
Friends or Foes: Distributed and Randomized Algorithms to Determine Dishonest Recommenders in Online Social Networks. 1695-1707 - Stefano Tomasin, Nicola Laurenti:
Secure HARQ With Multiple Encoding Over Block Fading Channels: Channel Set Characterization and Outage Analysis. 1708-1719 - Rafael F. Schaefer, Holger Boche:
Robust Broadcasting of Common and Confidential Messages Over Compound Channels: Strong Secrecy and Decoding Performance. 1720-1732 - Attila Altay Yavuz:
An Efficient Real-Time Broadcast Authentication Scheme for Command and Control Messages. 1733-1742 - Ioannis Rigas, Oleg V. Komogortsev:
Biometric Recognition via Probabilistic Spatial Projection of Eye Movement Trajectories in Dynamic Visual Environments. 1743-1754
Volume 9, Number 11, November 2014
- Marco Baldi, Franco Chiaraluce, Nicola Laurenti, Stefano Tomasin, Francesco Renna:
Secrecy Transmission on Parallel Channels: Theoretical Limits and Performance of Practical Codes. 1765-1779 - Xi Zhao, Tao Feng, Weidong Shi, Ioannis A. Kakadiaris:
Mobile User Authentication Using Statistical Touch Dynamics Images. 1780-1789 - Zhen Xu, Cong Wang, Kui Ren, Lingyu Wang, Bingsheng Zhang:
Proof-Carrying Cloud Computation: The Case of Convex Optimization. 1790-1803 - Mohsen Zareian, Hamid Reza Tohidypour:
A Novel Gain Invariant Quantization-Based Watermarking Approach. 1804-1813 - Chao Wang, Huiming Wang:
On the Secrecy Throughput Maximization for MISO Cognitive Radio Network in Slow Fading Channels. 1814-1827 - Yuan Zhang, Min Yang, Zhemin Yang, Guofei Gu, Peng Ning, Binyu Zang:
Permission Use Analysis for Vetting Undesirable Behaviors in Android Apps. 1828-1842 - Pratik Chattopadhyay, Shamik Sural, Jayanta Mukherjee:
Frontal Gait Recognition From Incomplete Sequences Using RGB-D Camera. 1843-1856 - Jiantao Zhou, Oscar C. Au, Guangtao Zhai, Yuan Yan Tang, Xianming Liu:
Scalable Compression of Stream Cipher Encrypted Images Through Context-Adaptive Sampling. 1857-1868 - Wei Wang, Xing Wang, Dawei Feng, Jiqiang Liu, Zhen Han, Xiangliang Zhang:
Exploring Permission-Induced Risk in Android Applications for Malicious Application Detection. 1869-1882 - Yang Wang, Man Ho Allen Au, Willy Susilo:
Revisiting Optimistic Fair Exchange Based on Ring Signatures. 1883-1892 - Li Zhang, Chip-Hong Chang:
A Pragmatic Per-Device Licensing Scheme for Hardware IP Cores on SRAM-Based FPGAs. 1893-1905 - Xiaobo Ma, Junjie Zhang, Jing Tao, Jianfeng Li, Jue Tian, Xiaohong Guan:
DNSRadar: Outsourcing Malicious Domain Detection Based on Distributed Cache-Footprints. 1906-1921 - Aythami Morales, Raffaele Cappelli, Miguel Angel Ferrer-Ballester, Davide Maltoni:
Synthesis and Evaluation of High Resolution Hand-Prints. 1922-1932 - Jianquan Yang, Jin Xie, Guopu Zhu, Sam Kwong, Yun-Qing Shi:
An Effective Method for Detecting Double JPEG Compression With the Same Quantization Matrix. 1933-1942 - Qiang Tang:
Nothing is for Free: Security in Searching Shared and Encrypted Data. 1943-1952 - Yun-Fu Liu, Jing-Ming Guo, Chih-Hsien Hsia, Sheng-Yao Su, Hua Lee:
Sample Space Dimensionality Refinement for Symmetrical Object Detection. 1953-1961 - Shigen Shen, Hongjie Li, Risheng Han, Athanasios V. Vasilakos, Yihan Wang, Qiying Cao:
Differential Game-Based Strategies for Preventing Malware Propagation in Wireless Sensor Networks. 1962-1973 - Wenxiong Kang, Qiuxia Wu:
Contactless Palm Vein Recognition Using a Mutual Foreground-Based Local Binary Pattern. 1974-1985 - Jeremiah R. Barr, Kevin W. Bowyer, Patrick J. Flynn:
Framework for Active Clustering With Ensembles. 1986-2001 - Saeid Wahabi, Shahrzad Pouryayevali, Siddarth Hari, Dimitrios Hatzinakos:
On Evaluating ECG Biometric Systems: Session-Dependence and Body Posture. 2002-2013
Volume 9, Number 12, December 2014
- George Tzimiropoulos, Joan Alabort-i-Medina, Stefanos Zafeiriou, Maja Pantic:
Active Orientation Models for Face Alignment In-the-Wild. 2024-2034 - Xingjie Wei, Chang-Tsun Li, Zhen Lei, Dong Yi, Stan Z. Li:
Dynamic Image-to-Class Warping for Occluded Face Recognition. 2035-2050 - Yong Li, Jing Liu, Hanqing Lu, Songde Ma:
Learning Robust Face Representation With Classwise Block-Diagonal Structure. 2051-2062 - Massimo Tistarelli, Yunlian Sun, Norman Poh:
On the Use of Discriminative Cohort Score Normalization for Unconstrained Face Recognition. 2063-2075 - Yi-Chen Chen, Vishal M. Patel, Rama Chellappa, P. Jonathon Phillips:
Ambiguously Labeled Learning Using Dictionaries. 2076-2088 - Giovani Chiachia, Alexandre X. Falcão, Nicolas Pinto, Anderson Rocha, David D. Cox:
Learning Person-Specific Representations From Faces in the Wild. 2089-2099 - Shervin Rahimzadeh Arashloo, Josef Kittler:
Class-Specific Kernel Fusion of Multiple Descriptors for Face Verification Using Multiscale Binarised Statistical Image Features. 2100-2109 - Gee-Sern Hsu, Yu-Lun Liu, Hsiao-Chia Peng, Po-Xun Wu:
RGB-D-Based Face Reconstruction and Recognition. 2110-2118 - Suriya Gunasekar, Joydeep Ghosh, Alan C. Bovik:
Face Detection on Distorted Images Augmented by Perceptual Quality-Aware Features. 2119-2131 - Mehran Kafai, Le An, Bir Bhanu:
Reference Face Graph for Face Recognition. 2132-2143 - Lacey Best-Rowden, Hu Han, Charles Otto, Brendan Klare, Anil K. Jain:
Unconstrained Face Recognition: Identifying a Person of Interest From a Media Collection. 2144-2157 - Asem M. Ali:
A 3D-Based Pose Invariant Face Recognition at a Distance Framework. 2158-2169 - Eran Eidinger, Roee Enbar, Tal Hassner:
Age and Gender Estimation of Unfiltered Faces. 2170-2179 - Gayathri Mahalingam, Karl Ricanek Jr., A. Midori Albert:
Investigating the Periocular-Based Face Recognition Across Gender Transformation. 2180-2192 - Syed Taha Ali, Vijay Sivaraman, Diethelm Ostry, Gene Tsudik, Sanjay K. Jha:
Securing First-Hop Data Provenance for Bodyworn Devices Using Wireless Link Fingerprints. 2193-2204 - Arik Vartanian, Asaf Shabtai:
TM-Score: A Misuseability Weight Measure for Textual Content. 2205-2219 - Yuan Cao, Chip-Hong Chang, Shoushun Chen:
A Cluster-Based Distributed Active Current Sensing Circuit for Hardware Trojan Detection. 2220-2231 - Cong Liu, Hefei Ling, Fuhao Zou, Lingyu Yan, Yunfei Wang, Hui Feng, Xinyu Ou:
Kernelized Neighborhood Preserving Hashing for Social-Network-Oriented Digital Fingerprints. 2232-2247 - Scott Klum, Hu Han, Brendan Klare, Anil K. Jain:
The FaceSketchID System: Matching Facial Composites to Mugshots. 2248-2263 - Ivana Chingovska, André Rabello dos Anjos, Sébastien Marcel:
Biometrics Evaluation Under Spoofing Attacks. 2264-2276 - Ahmet Emir Dirik, Hüsrev T. Sencar, Nasir D. Memon:
Analysis of Seam-Carving-Based Anonymization of Images Against PRNU Noise Pattern-Based Source Attribution. 2277-2290 - Yuxi Liu, Dimitrios Hatzinakos:
Earprint: Transient Evoked Otoacoustic Emission for Biometrics. 2291-2301 - Jiangshan Yu, Guilin Wang, Yi Mu, Wei Gao:
An Efficient Generic Framework for Three-Factor Authentication With Provably Secure Instantiation. 2302-2313 - Paulo Antonio Andrade Esquef, José Antonio Apolinário, Luiz W. P. Biscainho:
Edit Detection in Speech Recordings via Instantaneous Electric Network Frequency Variations. 2314-2326 - Hu Xiong:
Cost-Effective Scalable and Anonymous Certificateless Remote Authentication Protocol. 2327-2339 - Yihai Zhu, Jun Yan, Yufei Tang, Yan Lindsay Sun, Haibo He:
Resilience Analysis of Power Grids Under the Sequential Attack. 2340-2354
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.