Stop the war!
Остановите войну!
for scientists:
default search action
Search dblp for Publications
export results for "toc:db/journals/tifs/tifs11.bht:"
@article{DBLP:journals/tifs/0001SGK16, author = {Zhe Liu and Hwajeong Seo and Johann Gro{\ss}sch{\"{a}}dl and Howon Kim}, title = {Efficient Implementation of NIST-Compliant Elliptic Curve Cryptography for 8-bit AVR-Based Sensor Nodes}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {11}, number = {7}, pages = {1385--1397}, year = {2016}, url = {https://doi.org/10.1109/TIFS.2015.2491261}, doi = {10.1109/TIFS.2015.2491261}, timestamp = {Wed, 01 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tifs/0001SGK16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/AbrardoBKT16, author = {Andrea Abrardo and Mauro Barni and Kassem Kallas and Benedetta Tondi}, title = {A Game-Theoretic Framework for Optimum Decision Fusion in the Presence of Byzantines}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {11}, number = {6}, pages = {1333--1345}, year = {2016}, url = {https://doi.org/10.1109/TIFS.2016.2526963}, doi = {10.1109/TIFS.2016.2526963}, timestamp = {Thu, 06 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/AbrardoBKT16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/Al-RubaieC16, author = {Mohammad Al{-}Rubaie and J. Morris Chang}, title = {Reconstruction Attacks Against Mobile-Based Continuous Authentication Systems in the Cloud}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {11}, number = {12}, pages = {2648--2663}, year = {2016}, url = {https://doi.org/10.1109/TIFS.2016.2594132}, doi = {10.1109/TIFS.2016.2594132}, timestamp = {Thu, 06 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/Al-RubaieC16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/AlamTMAAAKVB16, author = {Quratulain Alam and Saher Tabbasum and Saif Ur Rehman Malik and Masoom Alam and Tamleek Ali and Adnan Akhunzada and Samee Ullah Khan and Athanasios V. Vasilakos and Rajkumar Buyya}, title = {Formal Verification of the xDAuth Protocol}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {11}, number = {9}, pages = {1956--1969}, year = {2016}, url = {https://doi.org/10.1109/TIFS.2016.2561909}, doi = {10.1109/TIFS.2016.2561909}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/AlamTMAAAKVB16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/AlmalawiFTAAZ16, author = {Abdulmohsen Almalawi and Adil Fahad and Zahir Tari and Abdullah Alamri and Rayed AlGhamdi and Albert Y. Zomaya}, title = {An Efficient Data-Driven Clustering Technique to Detect Attacks in {SCADA} Systems}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {11}, number = {5}, pages = {893--906}, year = {2016}, url = {https://doi.org/10.1109/TIFS.2015.2512522}, doi = {10.1109/TIFS.2015.2512522}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/AlmalawiFTAAZ16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/ArastehMJ16, author = {Abdollah Arasteh and Mohammad Hassan Moradi and Amin Janghorbani}, title = {A Novel Method Based on Empirical Mode Decomposition for P300-Based Detection of Deception}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {11}, number = {11}, pages = {2584--2593}, year = {2016}, url = {https://doi.org/10.1109/TIFS.2016.2590938}, doi = {10.1109/TIFS.2016.2590938}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/ArastehMJ16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/Arora0JP16, author = {Sunpreet S. Arora and Kai Cao and Anil K. Jain and Nicholas G. Paulter Jr.}, title = {Design and Fabrication of 3D Fingerprint Targets}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {11}, number = {10}, pages = {2284--2297}, year = {2016}, url = {https://doi.org/10.1109/TIFS.2016.2581306}, doi = {10.1109/TIFS.2016.2581306}, timestamp = {Thu, 06 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/Arora0JP16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/AwanZS16, author = {Zohaib Hassan Awan and Abdellatif Zaidi and Aydin Sezgin}, title = {On SDoF of Multi-Receiver Wiretap Channel With Alternating {CSIT}}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {11}, number = {8}, pages = {1780--1795}, year = {2016}, url = {https://doi.org/10.1109/TIFS.2016.2547863}, doi = {10.1109/TIFS.2016.2547863}, timestamp = {Thu, 06 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/AwanZS16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/BajajCS16, author = {Sumeet Bajaj and Anrin Chakraborti and Radu Sion}, title = {Practical Foundations of History Independence}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {11}, number = {2}, pages = {303--312}, year = {2016}, url = {https://doi.org/10.1109/TIFS.2015.2491309}, doi = {10.1109/TIFS.2015.2491309}, timestamp = {Thu, 06 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/BajajCS16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/BarniT16, author = {Mauro Barni and Benedetta Tondi}, title = {Source Distinguishability Under Distortion-Limited Attack: An Optimal Transport Perspective}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {11}, number = {10}, pages = {2145--2159}, year = {2016}, url = {https://doi.org/10.1109/TIFS.2016.2570739}, doi = {10.1109/TIFS.2016.2570739}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/BarniT16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/BernardiniR16, author = {Riccardo Bernardini and Roberto Rinaldo}, title = {Analytic and Simulation Results about a Compact, Reliable, and Unbiased 1-bit Physically Unclonable Constant}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {11}, number = {12}, pages = {2804--2817}, year = {2016}, url = {https://doi.org/10.1109/TIFS.2016.2599008}, doi = {10.1109/TIFS.2016.2599008}, timestamp = {Thu, 06 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/BernardiniR16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/BharadwajBVS16, author = {Samarth Bharadwaj and Himanshu S. Bhatt and Mayank Vatsa and Richa Singh}, title = {Domain Specific Learning for Newborn Face Recognition}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {11}, number = {7}, pages = {1630--1641}, year = {2016}, url = {https://doi.org/10.1109/TIFS.2016.2538744}, doi = {10.1109/TIFS.2016.2538744}, timestamp = {Thu, 06 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/BharadwajBVS16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/BharatiSVB16, author = {Aparna Bharati and Richa Singh and Mayank Vatsa and Kevin W. Bowyer}, title = {Detecting Facial Retouching Using Supervised Deep Learning}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {11}, number = {9}, pages = {1903--1913}, year = {2016}, url = {https://doi.org/10.1109/TIFS.2016.2561898}, doi = {10.1109/TIFS.2016.2561898}, timestamp = {Fri, 09 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/BharatiSVB16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/BianchiBM16, author = {Tiziano Bianchi and Valerio Bioglio and Enrico Magli}, title = {Analysis of One-Time Random Projections for Privacy Preserving Compressed Sensing}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {11}, number = {2}, pages = {313--327}, year = {2016}, url = {https://doi.org/10.1109/TIFS.2015.2493982}, doi = {10.1109/TIFS.2015.2493982}, timestamp = {Tue, 21 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tifs/BianchiBM16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/BihlBT16, author = {Trevor J. Bihl and Kenneth W. Bauer Jr. and Michael A. Temple}, title = {Feature Selection for {RF} Fingerprinting With Multiple Discriminant Analysis and Using ZigBee Device Emissions}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {11}, number = {8}, pages = {1862--1874}, year = {2016}, url = {https://doi.org/10.1109/TIFS.2016.2561902}, doi = {10.1109/TIFS.2016.2561902}, timestamp = {Thu, 06 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/BihlBT16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/BockS16, author = {Johan de Bock and Patrick de Smet}, title = {JPGcarve: An Advanced Tool for Automated Recovery of Fragmented {JPEG} Files}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {11}, number = {1}, pages = {19--34}, year = {2016}, url = {https://doi.org/10.1109/TIFS.2015.2475238}, doi = {10.1109/TIFS.2015.2475238}, timestamp = {Thu, 06 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/BockS16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/BondiPBB16, author = {Enrico Bondi and Pietro Pala and Stefano Berretti and Alberto Del Bimbo}, title = {Reconstructing High-Resolution Face Models From Kinect Depth Sequences}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {11}, number = {12}, pages = {2843--2853}, year = {2016}, url = {https://doi.org/10.1109/TIFS.2016.2601059}, doi = {10.1109/TIFS.2016.2601059}, timestamp = {Thu, 06 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/BondiPBB16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/BossuetC16, author = {Lilian Bossuet and Brice Colombier}, title = {Comments on "A {PUF-FSM} Binding Scheme for {FPGA} {IP} Protection and Pay-per-Device Licensing"}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {11}, number = {11}, pages = {2624--2625}, year = {2016}, url = {https://doi.org/10.1109/TIFS.2016.2553454}, doi = {10.1109/TIFS.2016.2553454}, timestamp = {Thu, 06 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/BossuetC16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/BoulkenafetKH16, author = {Zinelabidine Boulkenafet and Jukka Komulainen and Abdenour Hadid}, title = {Face Spoofing Detection Using Colour Texture Analysis}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {11}, number = {8}, pages = {1818--1830}, year = {2016}, url = {https://doi.org/10.1109/TIFS.2016.2555286}, doi = {10.1109/TIFS.2016.2555286}, timestamp = {Thu, 06 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/BoulkenafetKH16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/CaminaMTM16, author = {Jos{\'{e}} Benito Cami{\~{n}}a and Ra{\'{u}}l Monroy and Luis A. Trejo and Miguel Angel Medina{-}P{\'{e}}rez}, title = {Temporal and Spatial Locality: An Abstraction for Masquerade Detection}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {11}, number = {9}, pages = {2036--2051}, year = {2016}, url = {https://doi.org/10.1109/TIFS.2016.2571679}, doi = {10.1109/TIFS.2016.2571679}, timestamp = {Thu, 06 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/CaminaMTM16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/CaoWLGY16, author = {Ruohan Cao and Tan F. Wong and Tiejun Lv and Hui Gao and Shaoshi Yang}, title = {Detecting Byzantine Attacks Without Clean Reference}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {11}, number = {12}, pages = {2717--2731}, year = {2016}, url = {https://doi.org/10.1109/TIFS.2016.2596140}, doi = {10.1109/TIFS.2016.2596140}, timestamp = {Thu, 06 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/CaoWLGY16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/CarvalhoFPTR16, author = {Tiago Jose de Carvalho and F{\'{a}}bio Augusto Faria and H{\'{e}}lio Pedrini and Ricardo da Silva Torres and Anderson Rocha}, title = {Illuminant-Based Transformed Spaces for Image Forensics}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {11}, number = {4}, pages = {720--733}, year = {2016}, url = {https://doi.org/10.1109/TIFS.2015.2506548}, doi = {10.1109/TIFS.2015.2506548}, timestamp = {Thu, 06 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/CarvalhoFPTR16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/CastiglioneSMPC16, author = {Arcangelo Castiglione and Alfredo De Santis and Barbara Masucci and Francesco Palmieri and Aniello Castiglione and Jin Li and Xinyi Huang}, title = {Hierarchical and Shared Access Control}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {11}, number = {4}, pages = {850--865}, year = {2016}, url = {https://doi.org/10.1109/TIFS.2015.2512533}, doi = {10.1109/TIFS.2015.2512533}, timestamp = {Sun, 06 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/CastiglioneSMPC16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/CastiglioneSMPC16a, author = {Arcangelo Castiglione and Alfredo De Santis and Barbara Masucci and Francesco Palmieri and Aniello Castiglione and Xinyi Huang}, title = {Cryptographic Hierarchical Access Control for Dynamic Structures}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {11}, number = {10}, pages = {2349--2364}, year = {2016}, url = {https://doi.org/10.1109/TIFS.2016.2581147}, doi = {10.1109/TIFS.2016.2581147}, timestamp = {Sun, 06 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/CastiglioneSMPC16a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/CaviglioneGLMU16, author = {Luca Caviglione and Mauro Gaggero and Jean{-}Fran{\c{c}}ois Lalande and Wojciech Mazurczyk and Marcin Urbanski}, title = {Seeing the Unseen: Revealing Mobile Malware Hidden Communications via Energy Consumption and Artificial Intelligence}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {11}, number = {4}, pages = {799--810}, year = {2016}, url = {https://doi.org/10.1109/TIFS.2015.2510825}, doi = {10.1109/TIFS.2015.2510825}, timestamp = {Thu, 06 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/CaviglioneGLMU16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/ChenASWRKLBF16, author = {Yiyu Chen and Ayalneh Dessalegn Atnafu and Isabella Schlattner and Wendimagegn Tariku Weldtsadik and Myung{-}Cheol Roh and Hyoung Joong Kim and Seong{-}Whan Lee and Benjamin Blankertz and Siamac Fazli}, title = {A High-Security EEG-Based Login System with {RSVP} Stimuli and Dry Electrodes}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {11}, number = {12}, pages = {2635--2647}, year = {2016}, url = {https://doi.org/10.1109/TIFS.2016.2577551}, doi = {10.1109/TIFS.2016.2577551}, timestamp = {Thu, 06 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/ChenASWRKLBF16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/ChenCGN16, author = {Jian Chen and Xiaoming Chen and Wolfgang H. Gerstacker and Derrick Wing Kwan Ng}, title = {Resource Allocation for a Massive {MIMO} Relay Aided Secure Communication}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {11}, number = {8}, pages = {1700--1711}, year = {2016}, url = {https://doi.org/10.1109/TIFS.2016.2551685}, doi = {10.1109/TIFS.2016.2551685}, timestamp = {Thu, 06 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/ChenCGN16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/ChenEMS16, author = {Cong Chen and Thomas Eisenbarth and Ingo von Maurich and Rainer Steinwandt}, title = {Horizontal and Vertical Side Channel Analysis of a McEliece Cryptosystem}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {11}, number = {6}, pages = {1093--1105}, year = {2016}, url = {https://doi.org/10.1109/TIFS.2015.2509944}, doi = {10.1109/TIFS.2015.2509944}, timestamp = {Thu, 06 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/ChenEMS16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/ChenMYGHWW16, author = {Rongmao Chen and Yi Mu and Guomin Yang and Fuchun Guo and Xinyi Huang and Xiaofen Wang and Yongjun Wang}, title = {Server-Aided Public Key Encryption With Keyword Search}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {11}, number = {12}, pages = {2833--2842}, year = {2016}, url = {https://doi.org/10.1109/TIFS.2016.2599293}, doi = {10.1109/TIFS.2016.2599293}, timestamp = {Mon, 25 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/ChenMYGHWW16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/ChenMYGW16, author = {Rongmao Chen and Yi Mu and Guomin Yang and Fuchun Guo and Xiaofen Wang}, title = {Dual-Server Public-Key Encryption With Keyword Search for Secure Cloud Storage}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {11}, number = {4}, pages = {789--798}, year = {2016}, url = {https://doi.org/10.1109/TIFS.2015.2510822}, doi = {10.1109/TIFS.2015.2510822}, timestamp = {Thu, 06 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/ChenMYGW16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/ChenN16, author = {Kan Chen and Balasubramaniam Natarajan}, title = {Evaluating Node Reliability in Cooperative {MIMO} Networks}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {11}, number = {7}, pages = {1453--1460}, year = {2016}, url = {https://doi.org/10.1109/TIFS.2016.2532841}, doi = {10.1109/TIFS.2016.2532841}, timestamp = {Thu, 06 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/ChenN16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/ChenSCF16, author = {Jianxu Chen and Feng Shen and Danny Ziyi Chen and Patrick J. Flynn}, title = {Iris Recognition Based on Human-Interpretable Features}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {11}, number = {7}, pages = {1476--1485}, year = {2016}, url = {https://doi.org/10.1109/TIFS.2016.2535901}, doi = {10.1109/TIFS.2016.2535901}, timestamp = {Tue, 13 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tifs/ChenSCF16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/ChengDLT16, author = {Long Cheng and Dinil Mon Divakaran and Wee{-}Yong Lim and Vrizlynn L. L. Thing}, title = {Opportunistic Piggyback Marking for {IP} Traceback}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {11}, number = {2}, pages = {273--288}, year = {2016}, url = {https://doi.org/10.1109/TIFS.2015.2491299}, doi = {10.1109/TIFS.2015.2491299}, timestamp = {Thu, 06 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/ChengDLT16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/ChengLJT16, author = {Chi Cheng and Jemin Lee and Tao Jiang and Tsuyoshi Takagi}, title = {Security Analysis and Improvements on Two Homomorphic Authentication Schemes for Network Coding}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {11}, number = {5}, pages = {993--1002}, year = {2016}, url = {https://doi.org/10.1109/TIFS.2016.2515517}, doi = {10.1109/TIFS.2016.2515517}, timestamp = {Sun, 22 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/ChengLJT16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/CheonKK16, author = {Jung Hee Cheon and Miran Kim and Myungsun Kim}, title = {Optimized Search-and-Compute Circuits and Their Application to Query Evaluation on Encrypted Data}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {11}, number = {1}, pages = {188--199}, year = {2016}, url = {https://doi.org/10.1109/TIFS.2015.2483486}, doi = {10.1109/TIFS.2015.2483486}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/CheonKK16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/CherkaouiB016, author = {Abdelkarim Cherkaoui and Lilian Bossuet and C{\'{e}}dric Marchand}, title = {Design, Evaluation, and Optimization of Physical Unclonable Functions Based on Transient Effect Ring Oscillators}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {11}, number = {6}, pages = {1291--1305}, year = {2016}, url = {https://doi.org/10.1109/TIFS.2016.2524666}, doi = {10.1109/TIFS.2016.2524666}, timestamp = {Mon, 26 Oct 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tifs/CherkaouiB016.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/ChernyshevVH16, author = {Maxim Chernyshev and Craig Valli and Peter Hannay}, title = {On 802.11 Access Point Locatability and Named Entity Recognition in Service Set Identifiers}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {11}, number = {3}, pages = {584--593}, year = {2016}, url = {https://doi.org/10.1109/TIFS.2015.2507542}, doi = {10.1109/TIFS.2015.2507542}, timestamp = {Thu, 06 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/ChernyshevVH16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/ChuCL16, author = {Xiaoyu Chu and Yan Chen and K. J. Ray Liu}, title = {Detectability of the Order of Operations: An Information Theoretic Approach}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {11}, number = {4}, pages = {823--836}, year = {2016}, url = {https://doi.org/10.1109/TIFS.2015.2510958}, doi = {10.1109/TIFS.2015.2510958}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/ChuCL16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/ChuCSL16, author = {Xiaoyu Chu and Yan Chen and Matthew C. Stamm and K. J. Ray Liu}, title = {Information Theoretical Limit of Media Forensics: The Forensicability}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {11}, number = {4}, pages = {774--788}, year = {2016}, url = {https://doi.org/10.1109/TIFS.2015.2510820}, doi = {10.1109/TIFS.2015.2510820}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/ChuCSL16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/CompagnoCDDPT16, author = {Alberto Compagno and Mauro Conti and Antonio Alberto D'Amico and Gianluca Dini and Pericle Perazzo and Lorenzo Taponecco}, title = {Modeling Enlargement Attacks Against {UWB} Distance Bounding Protocols}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {11}, number = {7}, pages = {1565--1577}, year = {2016}, url = {https://doi.org/10.1109/TIFS.2016.2541613}, doi = {10.1109/TIFS.2016.2541613}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tifs/CompagnoCDDPT16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/ContiMSV16, author = {Mauro Conti and Luigi Vincenzo Mancini and Riccardo Spolaor and Nino Vincenzo Verde}, title = {Analyzing Android Encrypted Network Traffic to Identify User Actions}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {11}, number = {1}, pages = {114--125}, year = {2016}, url = {https://doi.org/10.1109/TIFS.2015.2478741}, doi = {10.1109/TIFS.2015.2478741}, timestamp = {Sun, 12 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tifs/ContiMSV16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/CuiKKB16, author = {Heng Cui and Ghassan O. Karame and Felix Klaedtke and Roberto Bifulco}, title = {On the Fingerprinting of Software-Defined Networks}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {11}, number = {10}, pages = {2160--2173}, year = {2016}, url = {https://doi.org/10.1109/TIFS.2016.2573756}, doi = {10.1109/TIFS.2016.2573756}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/CuiKKB16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/DaiYM16, author = {Bin Dai and Linman Yu and Zheng Ma}, title = {Relay Broadcast Channel With Confidential Messages}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {11}, number = {2}, pages = {410--425}, year = {2016}, url = {https://doi.org/10.1109/TIFS.2015.2503259}, doi = {10.1109/TIFS.2015.2503259}, timestamp = {Thu, 06 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/DaiYM16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/DantchevaER16, author = {Antitza Dantcheva and Petros Elia and Arun Ross}, title = {What Else Does Your Biometric Data Reveal? {A} Survey on Soft Biometrics}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {11}, number = {3}, pages = {441--467}, year = {2016}, url = {https://doi.org/10.1109/TIFS.2015.2480381}, doi = {10.1109/TIFS.2015.2480381}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/DantchevaER16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/DasLZC16, author = {Sanjeev Das and Yang Liu and Wei Zhang and Mahinthan Chandramohan}, title = {Semantics-Based Online Malware Detection: Towards Efficient Real-Time Protection Against Malware}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {11}, number = {2}, pages = {289--302}, year = {2016}, url = {https://doi.org/10.1109/TIFS.2015.2491300}, doi = {10.1109/TIFS.2015.2491300}, timestamp = {Mon, 26 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/DasLZC16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/Daugman16, author = {John Daugman}, title = {Information Theory and the IrisCode}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {11}, number = {2}, pages = {400--409}, year = {2016}, url = {https://doi.org/10.1109/TIFS.2015.2500196}, doi = {10.1109/TIFS.2015.2500196}, timestamp = {Thu, 06 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/Daugman16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/DavidDGMNP16, author = {Bernardo Machado David and Rafael Dowsley and Jeroen van de Graaf and Davidson Marques and Anderson C. A. Nascimento and Adriana C. B. Pinto}, title = {Unconditionally Secure, Universally Composable Privacy Preserving Linear Algebra}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {11}, number = {1}, pages = {59--73}, year = {2016}, url = {https://doi.org/10.1109/TIFS.2015.2476783}, doi = {10.1109/TIFS.2015.2476783}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/DavidDGMNP16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/DenemarkBF16, author = {Tom{\'{a}}s Denemark and Mehdi Boroumand and Jessica J. Fridrich}, title = {Steganalysis Features for Content-Adaptive {JPEG} Steganography}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {11}, number = {8}, pages = {1736--1746}, year = {2016}, url = {https://doi.org/10.1109/TIFS.2016.2555281}, doi = {10.1109/TIFS.2016.2555281}, timestamp = {Thu, 06 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/DenemarkBF16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/DengWENM16, author = {Yansha Deng and Lifeng Wang and Maged Elkashlan and Arumugam Nallanathan and Ranjan K. Mallik}, title = {Physical Layer Security in Three-Tier Wireless Sensor Networks: {A} Stochastic Geometry Approach}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {11}, number = {6}, pages = {1128--1138}, year = {2016}, url = {https://doi.org/10.1109/TIFS.2016.2516917}, doi = {10.1109/TIFS.2016.2516917}, timestamp = {Tue, 29 Dec 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tifs/DengWENM16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/DiyanatKS16, author = {Abolfazl Diyanat and Ahmad Khonsari and Seyed Pooya Shariatpanahi}, title = {A Dummy-Based Approach for Preserving Source Rate Privacy}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {11}, number = {6}, pages = {1321--1332}, year = {2016}, url = {https://doi.org/10.1109/TIFS.2016.2515050}, doi = {10.1109/TIFS.2016.2515050}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/DiyanatKS16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/DoMC16, author = {Quang Do and Ben Martini and Kim{-}Kwang Raymond Choo}, title = {A Data Exfiltration and Remote Exploitation Attack on Consumer 3D Printers}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {11}, number = {10}, pages = {2174--2186}, year = {2016}, url = {https://doi.org/10.1109/TIFS.2016.2578285}, doi = {10.1109/TIFS.2016.2578285}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/DoMC16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/DongWT16, author = {Lijun Dong and Kui Wu and Guoming Tang}, title = {A Data-Centric Approach to Quality Estimation of Role Mining Results}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {11}, number = {12}, pages = {2678--2692}, year = {2016}, url = {https://doi.org/10.1109/TIFS.2016.2594137}, doi = {10.1109/TIFS.2016.2594137}, timestamp = {Thu, 06 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/DongWT16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/DubeyGT16, author = {Rohit Kumar Dubey and Jonathan Goh and Vrizlynn L. L. Thing}, title = {Fingerprint Liveness Detection From Single Image Using Low-Level Features and Shape Analysis}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {11}, number = {7}, pages = {1461--1475}, year = {2016}, url = {https://doi.org/10.1109/TIFS.2016.2535899}, doi = {10.1109/TIFS.2016.2535899}, timestamp = {Tue, 07 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/DubeyGT16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/DudaKGTD16, author = {Jaroslaw Duda and Pawel Korus and Neeraj J. Gadgil and Khalid Tahboub and Edward J. Delp}, title = {Image-Like 2D Barcodes Using Generalizations of the Kuznetsov-Tsybakov Problem}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {11}, number = {4}, pages = {691--703}, year = {2016}, url = {https://doi.org/10.1109/TIFS.2015.2506002}, doi = {10.1109/TIFS.2015.2506002}, timestamp = {Mon, 27 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tifs/DudaKGTD16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/EdmanKTY16, author = {Matthew Edman and Aggelos Kiayias and Qiang Tang and B{\"{u}}lent Yener}, title = {On the Security of Key Extraction From Measuring Physical Quantities}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {11}, number = {8}, pages = {1796--1806}, year = {2016}, url = {https://doi.org/10.1109/TIFS.2016.2543687}, doi = {10.1109/TIFS.2016.2543687}, timestamp = {Thu, 06 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/EdmanKTY16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/FanWCX16, author = {Wei Fan and Kai Wang and Fran{\c{c}}ois Cayre and Zhang Xiong}, title = {Corrections to "JPEG Anti-Forensics With Improved Tradeoff Between Forensic Undetectability and Image Quality"}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {11}, number = {11}, pages = {2628}, year = {2016}, url = {https://doi.org/10.1109/TIFS.2016.2585398}, doi = {10.1109/TIFS.2016.2585398}, timestamp = {Thu, 03 Feb 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tifs/FanWCX16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/FangLN16, author = {Song Fang and Yao Liu and Peng Ning}, title = {Mimicry Attacks Against Wireless Link Signature and New Defense Using Time-Synched Link Signature}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {11}, number = {7}, pages = {1515--1527}, year = {2016}, url = {https://doi.org/10.1109/TIFS.2016.2541307}, doi = {10.1109/TIFS.2016.2541307}, timestamp = {Thu, 06 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/FangLN16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/FeghhiL16, author = {Saman Feghhi and Douglas J. Leith}, title = {A Web Traffic Analysis Attack Using Only Timing Information}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {11}, number = {8}, pages = {1747--1759}, year = {2016}, url = {https://doi.org/10.1109/TIFS.2016.2551203}, doi = {10.1109/TIFS.2016.2551203}, timestamp = {Thu, 06 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/FeghhiL16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/FuWGSR16, author = {Zhangjie Fu and Xinle Wu and Chaowen Guan and Xingming Sun and Kui Ren}, title = {Toward Efficient Multi-Keyword Fuzzy Search Over Encrypted Outsourced Data With Accuracy Improvement}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {11}, number = {12}, pages = {2706--2716}, year = {2016}, url = {https://doi.org/10.1109/TIFS.2016.2596138}, doi = {10.1109/TIFS.2016.2596138}, timestamp = {Thu, 06 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/FuWGSR16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/FueyoH16, author = {Maria Fueyo and Javier Herranz}, title = {On the Efficiency of Revocation in RSA-Based Anonymous Systems}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {11}, number = {8}, pages = {1771--1779}, year = {2016}, url = {https://doi.org/10.1109/TIFS.2016.2559443}, doi = {10.1109/TIFS.2016.2559443}, timestamp = {Thu, 06 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/FueyoH16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/Fujita16, author = {Hachiro Fujita}, title = {On the Secrecy Capacity of Wiretap Channels With Side Information at the Transmitter}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {11}, number = {11}, pages = {2441--2452}, year = {2016}, url = {https://doi.org/10.1109/TIFS.2016.2582558}, doi = {10.1109/TIFS.2016.2582558}, timestamp = {Thu, 06 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/Fujita16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/Gao16, author = {Quanxue Gao}, title = {Rebuttal to "Comments on 'Joint Global and Local Structure Discriminant Analysis"'}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {11}, number = {2}, pages = {429--430}, year = {2016}, url = {https://doi.org/10.1109/TIFS.2015.2490622}, doi = {10.1109/TIFS.2015.2490622}, timestamp = {Thu, 06 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/Gao16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/GarnaevT16, author = {Andrey Garnaev and Wade Trappe}, title = {A Bandwidth Monitoring Strategy Under Uncertainty of the Adversary's Activity}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {11}, number = {4}, pages = {837--849}, year = {2016}, url = {https://doi.org/10.1109/TIFS.2015.2510959}, doi = {10.1109/TIFS.2015.2510959}, timestamp = {Thu, 23 Jun 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/GarnaevT16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/GastiS0ZB16, author = {Paolo Gasti and Jaroslav Sedenka and Qing Yang and Gang Zhou and Kiran S. Balagani}, title = {Secure, Fast, and Energy-Efficient Outsourced Authentication for Smartphones}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {11}, number = {11}, pages = {2556--2571}, year = {2016}, url = {https://doi.org/10.1109/TIFS.2016.2585093}, doi = {10.1109/TIFS.2016.2585093}, timestamp = {Thu, 06 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/GastiS0ZB16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/GiarettaBC16, author = {Alberto Giaretta and Sasitharan Balasubramaniam and Mauro Conti}, title = {Security Vulnerabilities and Countermeasures for Target Localization in Bio-NanoThings Communication Networks}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {11}, number = {4}, pages = {665--676}, year = {2016}, url = {https://doi.org/10.1109/TIFS.2015.2505632}, doi = {10.1109/TIFS.2015.2505632}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/GiarettaBC16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/GuoSM16, author = {Fuchun Guo and Willy Susilo and Yi Mu}, title = {Distance-Based Encryption: How to Embed Fuzziness in Biometric-Based Encryption}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {11}, number = {2}, pages = {247--257}, year = {2016}, url = {https://doi.org/10.1109/TIFS.2015.2489179}, doi = {10.1109/TIFS.2015.2489179}, timestamp = {Sun, 22 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/GuoSM16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/GuoWCT16, author = {Haoran Guo and Xiaodong Wang and Kun Chang and Ye Tian}, title = {Exploiting Path Diversity for Thwarting Pollution Attacks in Named Data Networking}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {11}, number = {9}, pages = {2077--2090}, year = {2016}, url = {https://doi.org/10.1109/TIFS.2016.2574307}, doi = {10.1109/TIFS.2016.2574307}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/GuoWCT16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/HaghighatAA16, author = {Mohammad Haghighat and Mohamed Abdel{-}Mottaleb and Wadee Alhalabi}, title = {Discriminant Correlation Analysis: Real-Time Feature Level Fusion for Multimodal Biometric Recognition}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {11}, number = {9}, pages = {1984--1996}, year = {2016}, url = {https://doi.org/10.1109/TIFS.2016.2569061}, doi = {10.1109/TIFS.2016.2569061}, timestamp = {Mon, 03 Jan 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tifs/HaghighatAA16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/HaghighiWXQZ16, author = {Mohammad Sayad Haghighi and Sheng Wen and Yang Xiang and Barry G. Quinn and Wanlei Zhou}, title = {On the Race of Worms and Patches: Modeling the Spread of Information in Wireless Sensor Networks}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {11}, number = {12}, pages = {2854--2865}, year = {2016}, url = {https://doi.org/10.1109/TIFS.2016.2594130}, doi = {10.1109/TIFS.2016.2594130}, timestamp = {Thu, 21 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/HaghighiWXQZ16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/HamadeneC16, author = {Assia Hamadene and Youcef Chibani}, title = {One-Class Writer-Independent Offline Signature Verification Using Feature Dissimilarity Thresholding}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {11}, number = {6}, pages = {1226--1238}, year = {2016}, url = {https://doi.org/10.1109/TIFS.2016.2521611}, doi = {10.1109/TIFS.2016.2521611}, timestamp = {Mon, 26 Oct 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tifs/HamadeneC16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/HanACLR16, author = {Yi Han and Tansu Alpcan and Jeffrey Chan and Christopher Leckie and Benjamin I. P. Rubinstein}, title = {A Game Theoretical Approach to Defend Against Co-Resident Attacks in Cloud Computing: Preventing Co-Residence Using Semi-Supervised Learning}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {11}, number = {3}, pages = {556--570}, year = {2016}, url = {https://doi.org/10.1109/TIFS.2015.2505680}, doi = {10.1109/TIFS.2015.2505680}, timestamp = {Thu, 06 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/HanACLR16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/HanLYX16, author = {Weili Han and Zhigong Li and Lang Yuan and Wenyuan Xu}, title = {Regional Patterns and Vulnerability Analysis of Chinese Web Passwords}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {11}, number = {2}, pages = {258--272}, year = {2016}, url = {https://doi.org/10.1109/TIFS.2015.2490620}, doi = {10.1109/TIFS.2015.2490620}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/HanLYX16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/HanZLJZ16, author = {Song Han and Shuai Zhao and Qinghua Li and Chun{-}Hua Ju and Wanlei Zhou}, title = {{PPM-HDA:} Privacy-Preserving and Multifunctional Health Data Aggregation With Fault Tolerance}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {11}, number = {9}, pages = {1940--1955}, year = {2016}, url = {https://doi.org/10.1109/TIFS.2015.2472369}, doi = {10.1109/TIFS.2015.2472369}, timestamp = {Tue, 13 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tifs/HanZLJZ16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/HeZKW16, author = {Debiao He and Sherali Zeadally and Neeraj Kumar and Wei Wu}, title = {Efficient and Anonymous Mobile User Authentication Protocol Using Self-Certified Public Key Cryptography for Multi-Server Architectures}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {11}, number = {9}, pages = {2052--2064}, year = {2016}, url = {https://doi.org/10.1109/TIFS.2016.2573746}, doi = {10.1109/TIFS.2016.2573746}, timestamp = {Thu, 06 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/HeZKW16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/HillerYS16, author = {Matthias Hiller and Meng{-}Day (Mandel) Yu and Georg Sigl}, title = {Cherry-Picking Reliable {PUF} Bits With Differential Sequence Coding}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {11}, number = {9}, pages = {2065--2076}, year = {2016}, url = {https://doi.org/10.1109/TIFS.2016.2573766}, doi = {10.1109/TIFS.2016.2573766}, timestamp = {Thu, 06 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/HillerYS16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/HuSH16, author = {Yang Hu and Konstantinos Sirlantzis and Gareth Howells}, title = {Signal-Level Information Fusion for Less Constrained Iris Recognition Using Sparse-Error Low Rank Matrix Factorization}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {11}, number = {7}, pages = {1549--1564}, year = {2016}, url = {https://doi.org/10.1109/TIFS.2016.2541612}, doi = {10.1109/TIFS.2016.2541612}, timestamp = {Tue, 21 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tifs/HuSH16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/HuSHC16, author = {Ping Hu and Chi Wan Sung and Siu{-}Wai Ho and Terence H. Chan}, title = {Optimal Coding and Allocation for Perfect Secrecy in Multiple Clouds}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {11}, number = {2}, pages = {388--399}, year = {2016}, url = {https://doi.org/10.1109/TIFS.2015.2500193}, doi = {10.1109/TIFS.2015.2500193}, timestamp = {Sun, 25 Jul 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/HuSHC16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/HuaTFSZ16, author = {Jingyu Hua and An Tang and Yixin Fang and Zhenyu Shen and Sheng Zhong}, title = {Privacy-Preserving Utility Verification of the Data Published by Non-Interactive Differentially Private Mechanisms}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {11}, number = {10}, pages = {2298--2311}, year = {2016}, url = {https://doi.org/10.1109/TIFS.2016.2532839}, doi = {10.1109/TIFS.2016.2532839}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/HuaTFSZ16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/HuaZGT16, author = {Guang Hua and Ying Zhang and Jonathan Goh and Vrizlynn L. L. Thing}, title = {Audio Authentication by Exploring the Absolute-Error-Map of {ENF} Signals}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {11}, number = {5}, pages = {1003--1016}, year = {2016}, url = {https://doi.org/10.1109/TIFS.2016.2516824}, doi = {10.1109/TIFS.2016.2516824}, timestamp = {Mon, 04 Jan 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tifs/HuaZGT16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/HuangHS16, author = {Fangjun Huang and Jiwu Huang and Yun{-}Qing Shi}, title = {New Framework for Reversible Data Hiding in Encrypted Domain}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {11}, number = {12}, pages = {2777--2789}, year = {2016}, url = {https://doi.org/10.1109/TIFS.2016.2598528}, doi = {10.1109/TIFS.2016.2598528}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/HuangHS16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/HuoMG16, author = {Fei Huo and Patrick Mitran and Guang Gong}, title = {Analysis and Validation of Active Eavesdropping Attacks in Passive {FHSS} {RFID} Systems}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {11}, number = {7}, pages = {1528--1541}, year = {2016}, url = {https://doi.org/10.1109/TIFS.2016.2541309}, doi = {10.1109/TIFS.2016.2541309}, timestamp = {Thu, 06 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/HuoMG16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/IosifidisG16, author = {Alexandros Iosifidis and Moncef Gabbouj}, title = {Scaling Up Class-Specific Kernel Discriminant Analysis for Large-Scale Face Verification}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {11}, number = {11}, pages = {2453--2465}, year = {2016}, url = {https://doi.org/10.1109/TIFS.2016.2582562}, doi = {10.1109/TIFS.2016.2582562}, timestamp = {Thu, 06 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/IosifidisG16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/IsmailKLC16, author = {Ziad Ismail and Christophe Kiennert and Jean Leneutre and Lin Chen}, title = {Auditing a Cloud Provider's Compliance With Data Backup Requirements: {A} Game Theoretical Analysis}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {11}, number = {8}, pages = {1685--1699}, year = {2016}, url = {https://doi.org/10.1109/TIFS.2016.2549002}, doi = {10.1109/TIFS.2016.2549002}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/IsmailKLC16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/JahaN16, author = {Emad Sami Jaha and Mark S. Nixon}, title = {From Clothing to Identity: Manual and Automatic Soft Biometrics}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {11}, number = {10}, pages = {2377--2390}, year = {2016}, url = {https://doi.org/10.1109/TIFS.2016.2584001}, doi = {10.1109/TIFS.2016.2584001}, timestamp = {Thu, 06 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/JahaN16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/JiLGMB16, author = {Shouling Ji and Weiqing Li and Neil Zhenqiang Gong and Prateek Mittal and Raheem A. Beyah}, title = {Seed-Based De-Anonymizability Quantification of Social Networks}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {11}, number = {7}, pages = {1398--1411}, year = {2016}, url = {https://doi.org/10.1109/TIFS.2016.2529591}, doi = {10.1109/TIFS.2016.2529591}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/JiLGMB16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/JiangABCC16, author = {Richard Jiang and Somaya Ali Al{-}M{\'{a}}adeed and Ahmed Bouridane and Danny Crookes and M. Emre Celebi}, title = {Face Recognition in the Scrambled Domain via Salience-Aware Ensembles of Many Kernels}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {11}, number = {8}, pages = {1807--1817}, year = {2016}, url = {https://doi.org/10.1109/TIFS.2016.2555792}, doi = {10.1109/TIFS.2016.2555792}, timestamp = {Mon, 10 Jan 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tifs/JiangABCC16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/JinSZPM16, author = {Rong Jin and Liu Shi and Kai Zeng and Amit Pande and Prasant Mohapatra}, title = {MagPairing: Pairing Smartphones in Close Proximity Using Magnetometers}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {11}, number = {6}, pages = {1306--1320}, year = {2016}, url = {https://doi.org/10.1109/TIFS.2015.2505626}, doi = {10.1109/TIFS.2015.2505626}, timestamp = {Thu, 16 Dec 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tifs/JinSZPM16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/JolfaeiWM16, author = {Alireza Jolfaei and Xin{-}Wen Wu and Vallipuram Muthukkumarasamy}, title = {On the Security of Permutation-Only Image Encryption Schemes}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {11}, number = {2}, pages = {235--246}, year = {2016}, url = {https://doi.org/10.1109/TIFS.2015.2489178}, doi = {10.1109/TIFS.2015.2489178}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/JolfaeiWM16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/JungLWW16, author = {Taeho Jung and Xiang{-}Yang Li and Zhiguo Wan and Meng Wan}, title = {Rebuttal to "Comments on 'Control Cloud Data Access Privilege and Anonymity With Fully Anonymous Attribute-Based Encryption"'}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {11}, number = {4}, pages = {868}, year = {2016}, url = {https://doi.org/10.1109/TIFS.2015.2509946}, doi = {10.1109/TIFS.2015.2509946}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/JungLWW16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/KarpukC16, author = {David A. Karpuk and Arsenia Chorti}, title = {Perfect Secrecy in Physical-Layer Network Coding Systems From Structured Interference}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {11}, number = {8}, pages = {1875--1887}, year = {2016}, url = {https://doi.org/10.1109/TIFS.2016.2563165}, doi = {10.1109/TIFS.2016.2563165}, timestamp = {Thu, 06 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/KarpukC16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/KolokotronisKK16, author = {Nicholas Kolokotronis and Alexandros Katsiotis and Nicholas Kalouptsidis}, title = {Secretly Pruned Convolutional Codes: Security Analysis and Performance Results}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {11}, number = {7}, pages = {1500--1514}, year = {2016}, url = {https://doi.org/10.1109/TIFS.2016.2537262}, doi = {10.1109/TIFS.2016.2537262}, timestamp = {Mon, 03 Jan 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tifs/KolokotronisKK16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/KomogortsevKH16, author = {Oleg Komogortsev and Alexey Karpov and Corey Holland}, title = {Oculomotor Plant Characteristics: The Effects of Environment and Stimulus}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {11}, number = {3}, pages = {621--632}, year = {2016}, url = {https://doi.org/10.1109/TIFS.2015.2503263}, doi = {10.1109/TIFS.2015.2503263}, timestamp = {Thu, 06 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/KomogortsevKH16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/KongYWPZH16, author = {Zhengmin Kong and Shaoshi Yang and Feilong Wu and Shixin Peng and Liang Zhong and Lajos Hanzo}, title = {Iterative Distributed Minimum Total {MSE} Approach for Secure Communications in {MIMO} Interference Channels}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {11}, number = {3}, pages = {594--608}, year = {2016}, url = {https://doi.org/10.1109/TIFS.2015.2493888}, doi = {10.1109/TIFS.2015.2493888}, timestamp = {Thu, 06 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/KongYWPZH16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/KowalskiK16, author = {Marcin Kowalski and Mariusz Kastek}, title = {Comparative Studies of Passive Imaging in Terahertz and Mid-Wavelength Infrared Ranges for Object Detection}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {11}, number = {9}, pages = {2028--2035}, year = {2016}, url = {https://doi.org/10.1109/TIFS.2016.2571260}, doi = {10.1109/TIFS.2016.2571260}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/KowalskiK16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/KumarPB16, author = {Vireshwar Kumar and Jung{-}Min "Jerry" Park and Kaigui Bian}, title = {PHY-Layer Authentication Using Duobinary Signaling for Spectrum Enforcement}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {11}, number = {5}, pages = {1027--1038}, year = {2016}, url = {https://doi.org/10.1109/TIFS.2016.2516904}, doi = {10.1109/TIFS.2016.2516904}, timestamp = {Sat, 05 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/KumarPB16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/KumarX16, author = {Ajay Kumar and Zhihuan Xu}, title = {Personal Identification Using Minor Knuckle Patterns From Palm Dorsal Surface}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {11}, number = {10}, pages = {2338--2348}, year = {2016}, url = {https://doi.org/10.1109/TIFS.2016.2574309}, doi = {10.1109/TIFS.2016.2574309}, timestamp = {Thu, 06 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/KumarX16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/LazzerettiPB16, author = {Riccardo Lazzeretti and Tommaso Pignata and Mauro Barni}, title = {Piecewise Function Approximation With Private Data}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {11}, number = {3}, pages = {642--657}, year = {2016}, url = {https://doi.org/10.1109/TIFS.2015.2503268}, doi = {10.1109/TIFS.2015.2503268}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/LazzerettiPB16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/LiH16, author = {Cai Li and Jiankun Hu}, title = {A Security-Enhanced Alignment-Free Fuzzy Vault-Based Fingerprint Cryptosystem Using Pair-Polar Minutiae Structures}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {11}, number = {3}, pages = {543--555}, year = {2016}, url = {https://doi.org/10.1109/TIFS.2015.2505630}, doi = {10.1109/TIFS.2015.2505630}, timestamp = {Tue, 07 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tifs/LiH16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/LiHS16, author = {Zhi{-}Ming Li and Zheng{-}Hai Huang and Kun Shang}, title = {A Customized Sparse Representation Model With Mixed Norm for Undersampled Face Recognition}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {11}, number = {10}, pages = {2203--2214}, year = {2016}, url = {https://doi.org/10.1109/TIFS.2016.2567318}, doi = {10.1109/TIFS.2016.2567318}, timestamp = {Thu, 06 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/LiHS16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/LiLCDS16, author = {Lichun Li and Rongxing Lu and Kim{-}Kwang Raymond Choo and Anwitaman Datta and Jun Shao}, title = {Privacy-Preserving-Outsourced Association Rule Mining on Vertically Partitioned Databases}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {11}, number = {8}, pages = {1847--1861}, year = {2016}, url = {https://doi.org/10.1109/TIFS.2016.2561241}, doi = {10.1109/TIFS.2016.2561241}, timestamp = {Tue, 02 May 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/LiLCDS16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/LiLWC16, author = {Beibei Li and Rongxing Lu and Wei Wang and Kim{-}Kwang Raymond Choo}, title = {{DDOA:} {A} Dirichlet-Based Detection Scheme for Opportunistic Attacks in Smart Grid Cyber-Physical System}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {11}, number = {11}, pages = {2415--2425}, year = {2016}, url = {https://doi.org/10.1109/TIFS.2016.2576898}, doi = {10.1109/TIFS.2016.2576898}, timestamp = {Mon, 12 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tifs/LiLWC16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/LiW16, author = {Shang Li and Xiaodong Wang}, title = {Cooperative Change Detection for Voltage Quality Monitoring in Smart Grids}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {11}, number = {1}, pages = {86--99}, year = {2016}, url = {https://doi.org/10.1109/TIFS.2015.2477796}, doi = {10.1109/TIFS.2015.2477796}, timestamp = {Thu, 06 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/LiW16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/LiWLWBG16, author = {Fengyong Li and Kui Wu and Jingsheng Lei and Mi Wen and Zhongqin Bi and Chunhua Gu}, title = {Steganalysis Over Large-Scale Social Networks With High-Order Joint Features and Clustering Ensembles}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {11}, number = {2}, pages = {344--357}, year = {2016}, url = {https://doi.org/10.1109/TIFS.2015.2496910}, doi = {10.1109/TIFS.2015.2496910}, timestamp = {Thu, 06 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/LiWLWBG16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/LiYLV16, author = {Yongbo Li and Fan Yao and Tian Lan and Guru Venkataramani}, title = {{SARRE:} Semantics-Aware Rule Recommendation and Enforcement for Event Paths on Android}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {11}, number = {12}, pages = {2748--2762}, year = {2016}, url = {https://doi.org/10.1109/TIFS.2016.2596141}, doi = {10.1109/TIFS.2016.2596141}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/LiYLV16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/LiZCLT16, author = {Yuanman Li and Jiantao Zhou and An Cheng and Xianming Liu and Yuan Yan Tang}, title = {{SIFT} Keypoint Removal and Injection via Convex Relaxation}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {11}, number = {8}, pages = {1722--1735}, year = {2016}, url = {https://doi.org/10.1109/TIFS.2016.2553645}, doi = {10.1109/TIFS.2016.2553645}, timestamp = {Thu, 06 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/LiZCLT16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/LiZLQD16, author = {Jiangtao Li and Lei Zhang and Joseph K. Liu and Haifeng Qian and Zheming Dong}, title = {Privacy-Preserving Public Auditing Protocol for Low-Performance End Devices in Cloud}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {11}, number = {11}, pages = {2572--2583}, year = {2016}, url = {https://doi.org/10.1109/TIFS.2016.2587242}, doi = {10.1109/TIFS.2016.2587242}, timestamp = {Thu, 06 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/LiZLQD16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/LiZT16, author = {Fagen Li and Di Zhong and Tsuyoshi Takagi}, title = {Efficient Deniably Authenticated Encryption and Its Application to E-Mail}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {11}, number = {11}, pages = {2477--2486}, year = {2016}, url = {https://doi.org/10.1109/TIFS.2016.2585086}, doi = {10.1109/TIFS.2016.2585086}, timestamp = {Thu, 06 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/LiZT16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/LiangHGL16, author = {Kaitai Liang and Xinyi Huang and Fuchun Guo and Joseph K. Liu}, title = {Privacy-Preserving and Regular Language Search Over Encrypted Cloud Data}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {11}, number = {10}, pages = {2365--2376}, year = {2016}, url = {https://doi.org/10.1109/TIFS.2016.2581316}, doi = {10.1109/TIFS.2016.2581316}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/LiangHGL16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/LinJ16, author = {Pin{-}Hsun Lin and Eduard A. Jorswieck}, title = {On the Fast Fading Gaussian Wiretap Channel With Statistical Channel State Information at the Transmitter}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {11}, number = {1}, pages = {46--58}, year = {2016}, url = {https://doi.org/10.1109/TIFS.2015.2476464}, doi = {10.1109/TIFS.2015.2476464}, timestamp = {Thu, 06 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/LinJ16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/LinL16, author = {Xufeng Lin and Chang{-}Tsun Li}, title = {Preprocessing Reference Sensor Pattern Noise via Spectrum Equalization}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {11}, number = {1}, pages = {126--140}, year = {2016}, url = {https://doi.org/10.1109/TIFS.2015.2478748}, doi = {10.1109/TIFS.2015.2478748}, timestamp = {Thu, 06 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/LinL16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/Liu016, author = {Eryun Liu and Kai Cao}, title = {Minutiae Extraction From Level 1 Features of Fingerprint}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {11}, number = {9}, pages = {1893--1902}, year = {2016}, url = {https://doi.org/10.1109/TIFS.2016.2541345}, doi = {10.1109/TIFS.2016.2541345}, timestamp = {Thu, 06 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/Liu016.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/LiuAHL016, author = {Joseph K. Liu and Man Ho Au and Xinyi Huang and Rongxing Lu and Jin Li}, title = {Fine-Grained Two-Factor Access Control for Web-Based Cloud Computing Services}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {11}, number = {3}, pages = {484--497}, year = {2016}, url = {https://doi.org/10.1109/TIFS.2015.2493983}, doi = {10.1109/TIFS.2015.2493983}, timestamp = {Mon, 25 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/LiuAHL016.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/LiuDCW16, author = {Ximeng Liu and Robert H. Deng and Kim{-}Kwang Raymond Choo and Jian Weng}, title = {An Efficient Privacy-Preserving Outsourced Calculation Toolkit With Multiple Keys}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {11}, number = {11}, pages = {2401--2414}, year = {2016}, url = {https://doi.org/10.1109/TIFS.2016.2573770}, doi = {10.1109/TIFS.2016.2573770}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tifs/LiuDCW16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/LiuDDLQ16, author = {Ximeng Liu and Robert H. Deng and Wenxiu Ding and Rongxing Lu and Baodong Qin}, title = {Privacy-Preserving Outsourced Calculation on Floating Point Numbers}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {11}, number = {11}, pages = {2513--2527}, year = {2016}, url = {https://doi.org/10.1109/TIFS.2016.2585121}, doi = {10.1109/TIFS.2016.2585121}, timestamp = {Thu, 06 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/LiuDDLQ16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/LiuDOL16, author = {Yuxin Liu and Mianxiong Dong and Kaoru Ota and Anfeng Liu}, title = {ActiveTrust: Secure and Trustable Routing in Wireless Sensor Networks}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {11}, number = {9}, pages = {2013--2027}, year = {2016}, url = {https://doi.org/10.1109/TIFS.2016.2570740}, doi = {10.1109/TIFS.2016.2570740}, timestamp = {Wed, 07 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tifs/LiuDOL16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/LiuLLL16, author = {Xuan Liu and Zhiyi Li and Xingdong Liu and Zuyi Li}, title = {Masking Transmission Line Outages via False Data Injection Attacks}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {11}, number = {7}, pages = {1592--1602}, year = {2016}, url = {https://doi.org/10.1109/TIFS.2016.2542061}, doi = {10.1109/TIFS.2016.2542061}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/LiuLLL16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/LiuLZDG16, author = {Weiwei Liu and Guangjie Liu and Jiangtao Zhai and Yuewei Dai and Dipak Ghosal}, title = {Designing Analog Fountain Timing Channels: Undetectability, Robustness, and Model-Adaptation}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {11}, number = {4}, pages = {677--690}, year = {2016}, url = {https://doi.org/10.1109/TIFS.2015.2505688}, doi = {10.1109/TIFS.2015.2505688}, timestamp = {Thu, 06 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/LiuLZDG16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/LiuQGL16, author = {Weijiang Liu and Wenyu Qu and Jian Gong and Keqiu Li}, title = {Detection of Superpoints Using a Vector Bloom Filter}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {11}, number = {3}, pages = {514--527}, year = {2016}, url = {https://doi.org/10.1109/TIFS.2015.2503269}, doi = {10.1109/TIFS.2015.2503269}, timestamp = {Thu, 06 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/LiuQGL16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/LouisKH16, author = {Wael Louis and Majid Komeili and Dimitrios Hatzinakos}, title = {Continuous Authentication Using One-Dimensional Multi-Resolution Local Binary Patterns {(1DMRLBP)} in {ECG} Biometrics}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {11}, number = {12}, pages = {2818--2832}, year = {2016}, url = {https://doi.org/10.1109/TIFS.2016.2599270}, doi = {10.1109/TIFS.2016.2599270}, timestamp = {Thu, 06 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/LouisKH16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/MaLYJG16, author = {Haoyu Ma and Ruiqi Li and Xiaoxu Yu and Chunfu Jia and Debin Gao}, title = {Integrated Software Fingerprinting via Neural-Network-Based Control Flow Obfuscation}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {11}, number = {10}, pages = {2322--2337}, year = {2016}, url = {https://doi.org/10.1109/TIFS.2016.2555287}, doi = {10.1109/TIFS.2016.2555287}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/MaLYJG16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/MaS16, author = {Bin Ma and Yun Q. Shi}, title = {A Reversible Data Hiding Scheme Based on Code Division Multiplexing}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {11}, number = {9}, pages = {1914--1927}, year = {2016}, url = {https://doi.org/10.1109/TIFS.2016.2566261}, doi = {10.1109/TIFS.2016.2566261}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/MaS16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/MaZY16, author = {Hui Ma and Rui Zhang and Wei Yuan}, title = {Comments on "Control Cloud Data Access Privilege and Anonymity With Fully Anonymous Attribute-Based Encryption"}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {11}, number = {4}, pages = {866--867}, year = {2016}, url = {https://doi.org/10.1109/TIFS.2015.2509865}, doi = {10.1109/TIFS.2015.2509865}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/MaZY16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/MacRaeST16, author = {Brent MacRae and Amirali Salehi{-}Abari and Julie Thorpe}, title = {An Exploration of Geographic Authentication Schemes}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {11}, number = {9}, pages = {1997--2012}, year = {2016}, url = {https://doi.org/10.1109/TIFS.2016.2570681}, doi = {10.1109/TIFS.2016.2570681}, timestamp = {Thu, 06 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/MacRaeST16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/MaioranaRC16, author = {Emanuele Maiorana and Daria La Rocca and Patrizio Campisi}, title = {On the Permanence of {EEG} Signals for Biometric Recognition}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {11}, number = {1}, pages = {163--175}, year = {2016}, url = {https://doi.org/10.1109/TIFS.2015.2481870}, doi = {10.1109/TIFS.2015.2481870}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/MaioranaRC16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/MansourSB16, author = {Ahmed S. Mansour and Rafael F. Schaefer and Holger Boche}, title = {On the Individual Secrecy Capacity Regions of the General, Degraded, and Gaussian Multi-Receiver Wiretap Broadcast Channel}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {11}, number = {9}, pages = {2107--2122}, year = {2016}, url = {https://doi.org/10.1109/TIFS.2016.2566260}, doi = {10.1109/TIFS.2016.2566260}, timestamp = {Thu, 06 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/MansourSB16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/MazonkaTM16, author = {Oleg Mazonka and Nektarios Georgios Tsoutsos and Michail Maniatakos}, title = {Cryptoleq: {A} Heterogeneous Abstract Machine for Encrypted and Unencrypted Computation}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {11}, number = {9}, pages = {2123--2138}, year = {2016}, url = {https://doi.org/10.1109/TIFS.2016.2569062}, doi = {10.1109/TIFS.2016.2569062}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/MazonkaTM16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/MohantyAR16, author = {Manoranjan Mohanty and Muhammad Rizwan Asghar and Giovanni Russello}, title = {{\textdollar}2DCrypt{\textdollar} : Image Scaling and Cropping in Encrypted Domains}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {11}, number = {11}, pages = {2542--2555}, year = {2016}, url = {https://doi.org/10.1109/TIFS.2016.2585085}, doi = {10.1109/TIFS.2016.2585085}, timestamp = {Thu, 06 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/MohantyAR16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/MoharrerWAD16, author = {Ali Moharrer and Shuangqing Wei and George T. Amariucai and Jing Deng}, title = {Extractable Common Randomness From Gaussian Trees: Topological and Algebraic Perspectives}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {11}, number = {10}, pages = {2312--2321}, year = {2016}, url = {https://doi.org/10.1109/TIFS.2016.2543688}, doi = {10.1109/TIFS.2016.2543688}, timestamp = {Thu, 06 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/MoharrerWAD16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/MoosaviB16, author = {Hussein Moosavi and Francis Minhthang Bui}, title = {Delay-Aware Optimization of Physical Layer Security in Multi-Hop Wireless Body Area Networks}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {11}, number = {9}, pages = {1928--1939}, year = {2016}, url = {https://doi.org/10.1109/TIFS.2016.2566446}, doi = {10.1109/TIFS.2016.2566446}, timestamp = {Sat, 09 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/MoosaviB16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/MurakamiW16, author = {Takao Murakami and Hajime Watanabe}, title = {Localization Attacks Using Matrix and Tensor Factorization}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {11}, number = {8}, pages = {1647--1660}, year = {2016}, url = {https://doi.org/10.1109/TIFS.2016.2547865}, doi = {10.1109/TIFS.2016.2547865}, timestamp = {Thu, 06 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/MurakamiW16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/NaghizadehL16, author = {Parinaz Naghizadeh and Mingyan Liu}, title = {Opting Out of Incentive Mechanisms: {A} Study of Security as a Non-Excludable Public Good}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {11}, number = {12}, pages = {2790--2803}, year = {2016}, url = {https://doi.org/10.1109/TIFS.2016.2599005}, doi = {10.1109/TIFS.2016.2599005}, timestamp = {Thu, 06 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/NaghizadehL16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/NainiUTV16, author = {Farid Movahedi Naini and Jayakrishnan Unnikrishnan and Patrick Thiran and Martin Vetterli}, title = {Where You Are Is Who You Are: User Identification by Matching Statistics}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {11}, number = {2}, pages = {358--372}, year = {2016}, url = {https://doi.org/10.1109/TIFS.2015.2498131}, doi = {10.1109/TIFS.2015.2498131}, timestamp = {Thu, 06 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/NainiUTV16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/NeupaneSMK16, author = {Ajaya Neupane and Nitesh Saxena and Jose Omar Maximo and Rajesh K. Kana}, title = {Neural Markers of Cybersecurity: An fMRI Study of Phishing and Malware Warnings}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {11}, number = {9}, pages = {1970--1983}, year = {2016}, url = {https://doi.org/10.1109/TIFS.2016.2566265}, doi = {10.1109/TIFS.2016.2566265}, timestamp = {Thu, 06 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/NeupaneSMK16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/NguyenDDS16, author = {Van{-}Dinh Nguyen and Trung Quang Duong and Octavia A. Dobre and Oh{-}Soon Shin}, title = {Joint Information and Jamming Beamforming for Secrecy Rate Maximization in Cognitive Radio Networks}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {11}, number = {11}, pages = {2609--2623}, year = {2016}, url = {https://doi.org/10.1109/TIFS.2016.2594131}, doi = {10.1109/TIFS.2016.2594131}, timestamp = {Thu, 06 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/NguyenDDS16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/NogueiraLM16, author = {Rodrigo Frassetto Nogueira and Roberto de Alencar Lotufo and Rubens Campos Machado}, title = {Fingerprint Liveness Detection Using Convolutional Neural Networks}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {11}, number = {6}, pages = {1206--1213}, year = {2016}, url = {https://doi.org/10.1109/TIFS.2016.2520880}, doi = {10.1109/TIFS.2016.2520880}, timestamp = {Thu, 06 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/NogueiraLM16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/OikawaDRG16, author = {Marina A. Oikawa and Zanoni Dias and Anderson de Rezende Rocha and Siome Goldenstein}, title = {Manifold Learning and Spectral Clustering for Image Phylogeny Forests}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {11}, number = {1}, pages = {5--18}, year = {2016}, url = {https://doi.org/10.1109/TIFS.2015.2442527}, doi = {10.1109/TIFS.2015.2442527}, timestamp = {Thu, 06 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/OikawaDRG16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/OliveiraFRPBGDR16, author = {Alberto A. de Oliveira and Pasquale Ferrara and Alessia De Rosa and Alessandro Piva and Mauro Barni and Siome Goldenstein and Zanoni Dias and Anderson Rocha}, title = {Multiple Parenting Phylogeny Relationships in Digital Images}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {11}, number = {2}, pages = {328--343}, year = {2016}, url = {https://doi.org/10.1109/TIFS.2015.2493989}, doi = {10.1109/TIFS.2015.2493989}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tifs/OliveiraFRPBGDR16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/PasquiniBAN16, author = {Cecilia Pasquini and Giulia Boato and Naif Alajlan and Francesco G. B. De Natale}, title = {A Deterministic Approach to Detect Median Filtering in 1D Data}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {11}, number = {7}, pages = {1425--1437}, year = {2016}, url = {https://doi.org/10.1109/TIFS.2016.2530636}, doi = {10.1109/TIFS.2016.2530636}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tifs/PasquiniBAN16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/PatelHJ16, author = {Keyurkumar Patel and Hu Han and Anil K. Jain}, title = {Secure Face Unlock: Spoof Detection on Smartphones}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {11}, number = {10}, pages = {2268--2283}, year = {2016}, url = {https://doi.org/10.1109/TIFS.2016.2578288}, doi = {10.1109/TIFS.2016.2578288}, timestamp = {Thu, 06 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/PatelHJ16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/PhuongYS16, author = {Tran Viet Xuan Phuong and Guomin Yang and Willy Susilo}, title = {Hidden Ciphertext Policy Attribute-Based Encryption Under Standard Assumptions}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {11}, number = {1}, pages = {35--45}, year = {2016}, url = {https://doi.org/10.1109/TIFS.2015.2475723}, doi = {10.1109/TIFS.2015.2475723}, timestamp = {Sun, 22 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/PhuongYS16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/PintoUC16, author = {S{\'{\i}}lvia Cristina Dias Pinto and Petra Urbanova and Roberto M. Cesar}, title = {Two-Dimensional Wavelet Analysis of Supraorbital Margins of the Human Skull for Characterizing Sexual Dimorphism}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {11}, number = {7}, pages = {1542--1548}, year = {2016}, url = {https://doi.org/10.1109/TIFS.2016.2541611}, doi = {10.1109/TIFS.2016.2541611}, timestamp = {Sat, 09 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/PintoUC16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/ProkhorenkoCA16, author = {Victor Prokhorenko and Kim{-}Kwang Raymond Choo and Helen Ashman}, title = {Intent-Based Extensible Real-Time {PHP} Supervision Framework}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {11}, number = {10}, pages = {2215--2226}, year = {2016}, url = {https://doi.org/10.1109/TIFS.2016.2569063}, doi = {10.1109/TIFS.2016.2569063}, timestamp = {Mon, 26 Oct 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tifs/ProkhorenkoCA16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/QinD16, author = {Dongrun Qin and Zhi Ding}, title = {Exploiting Multi-Antenna Non-Reciprocal Channels for Shared Secret Key Generation}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {11}, number = {12}, pages = {2693--2705}, year = {2016}, url = {https://doi.org/10.1109/TIFS.2016.2594143}, doi = {10.1109/TIFS.2016.2594143}, timestamp = {Sat, 05 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/QinD16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/RaghavendraRB16, author = {Ramachandra Raghavendra and Kiran Bylappa Raja and Christoph Busch}, title = {Exploring the Usefulness of Light Field Cameras for Biometrics: An Empirical Study on Face and Iris Recognition}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {11}, number = {5}, pages = {922--936}, year = {2016}, url = {https://doi.org/10.1109/TIFS.2015.2512559}, doi = {10.1109/TIFS.2015.2512559}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/RaghavendraRB16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/RahbariK16, author = {Hanif Rahbari and Marwan Krunz}, title = {Full Frame Encryption and Modulation Obfuscation Using Channel-Independent Preamble Identifier}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {11}, number = {12}, pages = {2732--2747}, year = {2016}, url = {https://doi.org/10.1109/TIFS.2016.2582560}, doi = {10.1109/TIFS.2016.2582560}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/RahbariK16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/RoyB16, author = {Hiranmoy Roy and Debotosh Bhattacharjee}, title = {Local-Gravity-Face (LG-face) for Illumination-Invariant and Heterogeneous Face Recognition}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {11}, number = {7}, pages = {1412--1424}, year = {2016}, url = {https://doi.org/10.1109/TIFS.2016.2530043}, doi = {10.1109/TIFS.2016.2530043}, timestamp = {Thu, 06 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/RoyB16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/RuanWWJ16, author = {Xin Ruan and Zhenyu Wu and Haining Wang and Sushil Jajodia}, title = {Profiling Online Social Behaviors for Compromised Account Detection}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {11}, number = {1}, pages = {176--187}, year = {2016}, url = {https://doi.org/10.1109/TIFS.2015.2482465}, doi = {10.1109/TIFS.2015.2482465}, timestamp = {Thu, 06 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/RuanWWJ16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/Ruiz-BlondetJL16, author = {Maria V. Ruiz{-}Blondet and Zhanpeng Jin and Sarah Laszlo}, title = {{CEREBRE:} {A} Novel Method for Very High Accuracy Event-Related Potential Biometric Identification}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {11}, number = {7}, pages = {1618--1629}, year = {2016}, url = {https://doi.org/10.1109/TIFS.2016.2543524}, doi = {10.1109/TIFS.2016.2543524}, timestamp = {Thu, 06 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/Ruiz-BlondetJL16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/SafakaCAF16, author = {Iris Safaka and L{\'{a}}szl{\'{o}} Czap and Katerina J. Argyraki and Christina Fragouli}, title = {Creating Secrets Out of Packet Erasures}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {11}, number = {6}, pages = {1177--1191}, year = {2016}, url = {https://doi.org/10.1109/TIFS.2016.2520887}, doi = {10.1109/TIFS.2016.2520887}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tifs/SafakaCAF16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/SainiJD16, author = {Ravikant Saini and Abhishek Jindal and Swades De}, title = {Jammer-Assisted Resource Allocation in Secure {OFDMA} With Untrusted Users}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {11}, number = {5}, pages = {1055--1070}, year = {2016}, url = {https://doi.org/10.1109/TIFS.2016.2516912}, doi = {10.1109/TIFS.2016.2516912}, timestamp = {Thu, 06 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/SainiJD16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/SalmaniT16, author = {Hassan Salmani and Mark M. Tehranipoor}, title = {Vulnerability Analysis of a Circuit Layout to Hardware Trojan Insertion}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {11}, number = {6}, pages = {1214--1225}, year = {2016}, url = {https://doi.org/10.1109/TIFS.2016.2520910}, doi = {10.1109/TIFS.2016.2520910}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/SalmaniT16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/SangSTZ16, author = {Yingpeng Sang and Hong Shen and Hui Tian and Zonghua Zhang}, title = {Achieving Probabilistic Anonymity in a Linear and Hybrid Randomization Model}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {11}, number = {10}, pages = {2187--2202}, year = {2016}, url = {https://doi.org/10.1109/TIFS.2016.2562605}, doi = {10.1109/TIFS.2016.2562605}, timestamp = {Sat, 05 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/SangSTZ16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/SaxenaC16, author = {Neetesh Saxena and Bong Jun Choi}, title = {Authentication Scheme for Flexible Charging and Discharging of Mobile Vehicles in the {V2G} Networks}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {11}, number = {7}, pages = {1438--1452}, year = {2016}, url = {https://doi.org/10.1109/TIFS.2016.2532840}, doi = {10.1109/TIFS.2016.2532840}, timestamp = {Mon, 26 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/SaxenaC16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/SaxenaCL16, author = {Neetesh Saxena and Bong Jun Choi and Rongxing Lu}, title = {Authentication and Authorization Scheme for Various User Roles and Devices in Smart Grid}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {11}, number = {5}, pages = {907--921}, year = {2016}, url = {https://doi.org/10.1109/TIFS.2015.2512525}, doi = {10.1109/TIFS.2015.2512525}, timestamp = {Mon, 26 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/SaxenaCL16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/SchottleB16, author = {Pascal Sch{\"{o}}ttle and Rainer B{\"{o}}hme}, title = {Game Theory and Adaptive Steganography}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {11}, number = {4}, pages = {760--773}, year = {2016}, url = {https://doi.org/10.1109/TIFS.2015.2509941}, doi = {10.1109/TIFS.2015.2509941}, timestamp = {Thu, 06 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/SchottleB16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/SedighiCF16, author = {Vahid Sedighi and R{\'{e}}mi Cogranne and Jessica J. Fridrich}, title = {Content-Adaptive Steganography by Minimizing Statistical Detectability}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {11}, number = {2}, pages = {221--234}, year = {2016}, url = {https://doi.org/10.1109/TIFS.2015.2486744}, doi = {10.1109/TIFS.2015.2486744}, timestamp = {Thu, 06 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/SedighiCF16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/SenftlebenBBH0T16, author = {Marius Senftleben and Ana Barroso and Mihai Bucicoiu and Matthias Hollick and Stefan Katzenbeisser and Erik Tews}, title = {On the Privacy and Performance of Mobile Anonymous Microblogging}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {11}, number = {7}, pages = {1578--1591}, year = {2016}, url = {https://doi.org/10.1109/TIFS.2016.2541633}, doi = {10.1109/TIFS.2016.2541633}, timestamp = {Thu, 06 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/SenftlebenBBH0T16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/ShenZGM16, author = {Chao Shen and Yong Zhang and Xiaohong Guan and Roy A. Maxion}, title = {Performance Analysis of Touch-Interaction Behavior for Active Smartphone Authentication}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {11}, number = {3}, pages = {498--513}, year = {2016}, url = {https://doi.org/10.1109/TIFS.2015.2503258}, doi = {10.1109/TIFS.2015.2503258}, timestamp = {Mon, 01 Apr 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/ShenZGM16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/ShojaAWD16, author = {Mohammad Reza Khalili Shoja and George Traian Amariucai and Shuangqing Wei and Jing Deng}, title = {Secret Common Randomness From Routing Metadata in Ad Hoc Networks}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {11}, number = {8}, pages = {1674--1684}, year = {2016}, url = {https://doi.org/10.1109/TIFS.2016.2550424}, doi = {10.1109/TIFS.2016.2550424}, timestamp = {Thu, 06 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/ShojaAWD16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/ShuZYF16, author = {Xiaokui Shu and Jing Zhang and Danfeng (Daphne) Yao and Wu{-}chun Feng}, title = {Fast Detection of Transformed Data Leaks}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {11}, number = {3}, pages = {528--542}, year = {2016}, url = {https://doi.org/10.1109/TIFS.2015.2503271}, doi = {10.1109/TIFS.2015.2503271}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/ShuZYF16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/SitovaSYPZGB16, author = {Zdenka Sitova and Jaroslav Sedenka and Qing Yang and Ge Peng and Gang Zhou and Paolo Gasti and Kiran S. Balagani}, title = {{HMOG:} New Behavioral Biometric Features for Continuous Authentication of Smartphone Users}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {11}, number = {5}, pages = {877--892}, year = {2016}, url = {https://doi.org/10.1109/TIFS.2015.2506542}, doi = {10.1109/TIFS.2015.2506542}, timestamp = {Thu, 06 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/SitovaSYPZGB16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/SongZL16, author = {Tianlong Song and Kai Zhou and Tongtong Li}, title = {{CDMA} System Design and Capacity Analysis Under Disguised Jamming}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {11}, number = {11}, pages = {2487--2498}, year = {2016}, url = {https://doi.org/10.1109/TIFS.2016.2585089}, doi = {10.1109/TIFS.2016.2585089}, timestamp = {Mon, 22 Jan 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tifs/SongZL16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/SunNST16, author = {Yunlian Sun and Kamal Nasrollahi and Zhenan Sun and Tieniu Tan}, title = {Complementary Cohort Strategy for Multimodal Face Pair Matching}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {11}, number = {5}, pages = {937--950}, year = {2016}, url = {https://doi.org/10.1109/TIFS.2015.2512561}, doi = {10.1109/TIFS.2015.2512561}, timestamp = {Thu, 06 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/SunNST16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/TahaY16, author = {Kamal Taha and Paul D. Yoo}, title = {{SIIMCO:} {A} Forensic Investigation Tool for Identifying the Influential Members of a Criminal Organization}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {11}, number = {4}, pages = {811--822}, year = {2016}, url = {https://doi.org/10.1109/TIFS.2015.2510826}, doi = {10.1109/TIFS.2015.2510826}, timestamp = {Sat, 05 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/TahaY16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/TangLLH16, author = {Weixuan Tang and Haodong Li and Weiqi Luo and Jiwu Huang}, title = {Adaptive Steganalysis Based on Embedding Probabilities of Pixels}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {11}, number = {4}, pages = {734--745}, year = {2016}, url = {https://doi.org/10.1109/TIFS.2015.2507159}, doi = {10.1109/TIFS.2015.2507159}, timestamp = {Tue, 30 Jan 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tifs/TangLLH16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/TangZLZ16, author = {Zhenjun Tang and Xianquan Zhang and Xianxian Li and Shichao Zhang}, title = {Robust Image Hashing With Ring Partition and Invariant Vector Distance}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {11}, number = {1}, pages = {200--214}, year = {2016}, url = {https://doi.org/10.1109/TIFS.2015.2485163}, doi = {10.1109/TIFS.2015.2485163}, timestamp = {Thu, 04 Apr 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/TangZLZ16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/TapiaPB16, author = {Juan E. Tapia and Claudio A. Perez and Kevin W. Bowyer}, title = {Gender Classification From the Same Iris Code Used for Recognition}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {11}, number = {8}, pages = {1760--1770}, year = {2016}, url = {https://doi.org/10.1109/TIFS.2016.2550418}, doi = {10.1109/TIFS.2016.2550418}, timestamp = {Sat, 05 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/TapiaPB16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/TkachenkoPDSGG16, author = {Iuliia Tkachenko and William Puech and Christophe Destruel and Olivier Strauss and Jean{-}Marc Gaudin and Christian Guichard}, title = {Two-Level {QR} Code for Private Message Sharing and Document Authentication}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {11}, number = {3}, pages = {571--583}, year = {2016}, url = {https://doi.org/10.1109/TIFS.2015.2506546}, doi = {10.1109/TIFS.2015.2506546}, timestamp = {Thu, 06 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/TkachenkoPDSGG16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/TongZ16, author = {Wei Tong and Sheng Zhong}, title = {A Unified Resource Allocation Framework for Defending Against Pollution Attacks in Wireless Network Coding Systems}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {11}, number = {10}, pages = {2255--2267}, year = {2016}, url = {https://doi.org/10.1109/TIFS.2016.2581313}, doi = {10.1109/TIFS.2016.2581313}, timestamp = {Wed, 02 Feb 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tifs/TongZ16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/TongaonkarS16, author = {Alok Tongaonkar and R. Sekar}, title = {Condition Factorization: {A} Technique for Building Fast and Compact Packet Matching Automata}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {11}, number = {3}, pages = {468--483}, year = {2016}, url = {https://doi.org/10.1109/TIFS.2015.2489182}, doi = {10.1109/TIFS.2015.2489182}, timestamp = {Thu, 18 Nov 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tifs/TongaonkarS16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/WangHT16, author = {Huaqun Wang and Debiao He and Shaohua Tang}, title = {Identity-Based Proxy-Oriented Data Uploading and Remote Data Integrity Checking in Public Cloud}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {11}, number = {6}, pages = {1165--1176}, year = {2016}, url = {https://doi.org/10.1109/TIFS.2016.2520886}, doi = {10.1109/TIFS.2016.2520886}, timestamp = {Thu, 06 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/WangHT16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/WangLDZYW16, author = {Bo Wang and Leibo Liu and Chenchen Deng and Min Zhu and Shouyi Yin and Shaojun Wei}, title = {Against Double Fault Attacks: Injection Effort Model, Space and Time Randomization Based Countermeasures for Reconfigurable Array Architecture}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {11}, number = {6}, pages = {1151--1164}, year = {2016}, url = {https://doi.org/10.1109/TIFS.2016.2518130}, doi = {10.1109/TIFS.2016.2518130}, timestamp = {Thu, 06 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/WangLDZYW16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/WangLLCYX16, author = {Shulan Wang and Kaitai Liang and Joseph K. Liu and Jianyong Chen and Jianping Yu and Weixin Xie}, title = {Attribute-Based Data Sharing Scheme Revisited in Cloud Computing}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {11}, number = {8}, pages = {1661--1673}, year = {2016}, url = {https://doi.org/10.1109/TIFS.2016.2549004}, doi = {10.1109/TIFS.2016.2549004}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/WangLLCYX16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/WangLW16, author = {Boyang Wang and Ming Li and Haitao Wang}, title = {Geometric Range Search on Encrypted Spatial Data}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {11}, number = {4}, pages = {704--719}, year = {2016}, url = {https://doi.org/10.1109/TIFS.2015.2506145}, doi = {10.1109/TIFS.2015.2506145}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/WangLW16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/WangMC16, author = {Xiaofen Wang and Yi Mu and Rongmao Chen}, title = {One-Round Privacy-Preserving Meeting Location Determination for Smartphone Applications}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {11}, number = {8}, pages = {1712--1721}, year = {2016}, url = {https://doi.org/10.1109/TIFS.2016.2549508}, doi = {10.1109/TIFS.2016.2549508}, timestamp = {Thu, 06 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/WangMC16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/WangNCY16, author = {Yuhao Wang and Leibin Ni and Chip{-}Hong Chang and Hao Yu}, title = {{DW-AES:} {A} Domain-Wall Nanowire-Based {AES} for High Throughput and Energy-Efficient Data Encryption in Non-Volatile Memory}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {11}, number = {11}, pages = {2426--2440}, year = {2016}, url = {https://doi.org/10.1109/TIFS.2016.2576903}, doi = {10.1109/TIFS.2016.2576903}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/WangNCY16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/WangNZLN16, author = {Xu Wang and Wei Ni and Kangfeng Zheng and Ren Ping Liu and Xinxin Niu}, title = {Virus Propagation Modeling and Convergence Analysis in Large-Scale Networks}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {11}, number = {10}, pages = {2241--2254}, year = {2016}, url = {https://doi.org/10.1109/TIFS.2016.2581305}, doi = {10.1109/TIFS.2016.2581305}, timestamp = {Mon, 26 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/WangNZLN16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/WangSPZR16, author = {Wenhao Wang and Zhi Sun and Sixu Piao and Bocheng Zhu and Kui Ren}, title = {Wireless Physical-Layer Identification: Modeling and Validation}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {11}, number = {9}, pages = {2091--2106}, year = {2016}, url = {https://doi.org/10.1109/TIFS.2016.2552146}, doi = {10.1109/TIFS.2016.2552146}, timestamp = {Thu, 06 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/WangSPZR16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/WangTL16, author = {Wei Wang and Kah Chan Teh and Kwok Hung Li}, title = {Relay Selection for Secure Successive {AF} Relaying Networks With Untrusted Nodes}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {11}, number = {11}, pages = {2466--2476}, year = {2016}, url = {https://doi.org/10.1109/TIFS.2016.2584006}, doi = {10.1109/TIFS.2016.2584006}, timestamp = {Thu, 06 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/WangTL16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/WangZLYCX16, author = {Shulan Wang and Junwei Zhou and Joseph K. Liu and Jianping Yu and Jianyong Chen and Weixin Xie}, title = {An Efficient File Hierarchy Attribute-Based Encryption Scheme in Cloud Computing}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {11}, number = {6}, pages = {1265--1277}, year = {2016}, url = {https://doi.org/10.1109/TIFS.2016.2523941}, doi = {10.1109/TIFS.2016.2523941}, timestamp = {Sun, 22 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/WangZLYCX16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/WerghiTBB16, author = {Naoufel Werghi and Claudio Tortorici and Stefano Berretti and Alberto Del Bimbo}, title = {Boosting 3D LBP-Based Face Recognition by Fusing Shape and Texture Descriptors on the Mesh}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {11}, number = {5}, pages = {964--979}, year = {2016}, url = {https://doi.org/10.1109/TIFS.2016.2515505}, doi = {10.1109/TIFS.2016.2515505}, timestamp = {Thu, 06 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/WerghiTBB16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/WuYLX16, author = {Xiaofu Wu and Zhen Yang and Cong Ling and Xiang{-}Gen Xia}, title = {Artificial-Noise-Aided Message Authentication Codes With Information-Theoretic Security}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {11}, number = {6}, pages = {1278--1290}, year = {2016}, url = {https://doi.org/10.1109/TIFS.2016.2524514}, doi = {10.1109/TIFS.2016.2524514}, timestamp = {Wed, 16 Mar 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tifs/WuYLX16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/XiaWZQSR16, author = {Zhihua Xia and Xinhui Wang and Liangao Zhang and Zhan Qin and Xingming Sun and Kui Ren}, title = {A Privacy-Preserving and Copy-Deterrence Content-Based Image Retrieval Scheme in Cloud Computing}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {11}, number = {11}, pages = {2594--2608}, year = {2016}, url = {https://doi.org/10.1109/TIFS.2016.2590944}, doi = {10.1109/TIFS.2016.2590944}, timestamp = {Thu, 06 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/XiaWZQSR16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/XiangGL16, author = {Tao Xiang and Shangwei Guo and Xiaoguo Li}, title = {Perceptual Visual Security Index Based on Edge and Texture Similarities}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {11}, number = {5}, pages = {951--963}, year = {2016}, url = {https://doi.org/10.1109/TIFS.2016.2515503}, doi = {10.1109/TIFS.2016.2515503}, timestamp = {Wed, 10 Jan 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tifs/XiangGL16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/XiongLLGH16, author = {Qi Xiong and Ying{-}Chang Liang and Kwok Hung Li and Yi Gong and Shiying Han}, title = {Secure Transmission Against Pilot Spoofing Attack: {A} Two-Way Training-Based Scheme}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {11}, number = {5}, pages = {1017--1026}, year = {2016}, url = {https://doi.org/10.1109/TIFS.2016.2516825}, doi = {10.1109/TIFS.2016.2516825}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tifs/XiongLLGH16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/XuCDDL16, author = {Peng Xu and Kanapathippillai Cumanan and Zhiguo Ding and Xuchu Dai and Kin K. Leung}, title = {Group Secret Key Generation in Wireless Networks: Algorithms and Rate Optimization}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {11}, number = {8}, pages = {1831--1846}, year = {2016}, url = {https://doi.org/10.1109/TIFS.2016.2553643}, doi = {10.1109/TIFS.2016.2553643}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/XuCDDL16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/XuDDK16, author = {Peng Xu and Zhiguo Ding and Xuchu Dai and George K. Karagiannidis}, title = {Simultaneously Generating Secret and Private Keys in a Cooperative Pairwise-Independent Network}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {11}, number = {6}, pages = {1139--1150}, year = {2016}, url = {https://doi.org/10.1109/TIFS.2016.2516970}, doi = {10.1109/TIFS.2016.2516970}, timestamp = {Thu, 06 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/XuDDK16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/XuHYZC16, author = {Xiaoming Xu and Biao He and Weiwei Yang and Xiangyun Zhou and Yueming Cai}, title = {Secure Transmission Design for Cognitive Radio Networks With Poisson Distributed Eavesdroppers}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {11}, number = {2}, pages = {373--387}, year = {2016}, url = {https://doi.org/10.1109/TIFS.2015.2500178}, doi = {10.1109/TIFS.2015.2500178}, timestamp = {Wed, 17 Nov 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tifs/XuHYZC16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/XuLD16, author = {Ke Xu and Yingjiu Li and Robert H. Deng}, title = {ICCDetector: ICC-Based Malware Detection on Android}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {11}, number = {6}, pages = {1252--1264}, year = {2016}, url = {https://doi.org/10.1109/TIFS.2016.2523912}, doi = {10.1109/TIFS.2016.2523912}, timestamp = {Thu, 06 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/XuLD16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/YanPY16, author = {Cai{-}Ping Yan and Chi{-}Man Pun and Xiaochen Yuan}, title = {Quaternion-Based Image Hashing for Adaptive Tampering Localization}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {11}, number = {12}, pages = {2664--2677}, year = {2016}, url = {https://doi.org/10.1109/TIFS.2016.2594136}, doi = {10.1109/TIFS.2016.2594136}, timestamp = {Thu, 06 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/YanPY16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/YanZJ0LH16, author = {Qiben Yan and Huacheng Zeng and Tingting Jiang and Ming Li and Wenjing Lou and Yiwei Thomas Hou}, title = {Jamming Resilient Communication Using {MIMO} Interference Cancellation}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {11}, number = {7}, pages = {1486--1499}, year = {2016}, url = {https://doi.org/10.1109/TIFS.2016.2535906}, doi = {10.1109/TIFS.2016.2535906}, timestamp = {Mon, 11 Mar 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tifs/YanZJ0LH16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/YangM16, author = {Yang Yang and Maode Ma}, title = {Conjunctive Keyword Search With Designated Tester and Timing Enabled Proxy Re-Encryption Function for E-Health Clouds}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {11}, number = {4}, pages = {746--759}, year = {2016}, url = {https://doi.org/10.1109/TIFS.2015.2509912}, doi = {10.1109/TIFS.2015.2509912}, timestamp = {Sun, 22 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/YangM16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/YeJ16, author = {Qiaolin Ye and Jiajia Jing}, title = {Comments on "Joint Global and Local Structure Discriminant Analysis"}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {11}, number = {2}, pages = {426--428}, year = {2016}, url = {https://doi.org/10.1109/TIFS.2015.2490624}, doi = {10.1109/TIFS.2015.2490624}, timestamp = {Thu, 06 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/YeJ16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/YiPBX16, author = {Xun Yi and Russell Paulet and Elisa Bertino and Guandong Xu}, title = {Private Cell Retrieval From Data Warehouses}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {11}, number = {6}, pages = {1346--1361}, year = {2016}, url = {https://doi.org/10.1109/TIFS.2016.2527620}, doi = {10.1109/TIFS.2016.2527620}, timestamp = {Thu, 02 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/YiPBX16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/YuLNYMS16, author = {Yong Yu and Yannan Li and Jianbing Ni and Guomin Yang and Yi Mu and Willy Susilo}, title = {Comments on "Public Integrity Auditing for Dynamic Data Sharing With Multiuser Modification"}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {11}, number = {3}, pages = {658--659}, year = {2016}, url = {https://doi.org/10.1109/TIFS.2015.2501728}, doi = {10.1109/TIFS.2015.2501728}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tifs/YuLNYMS16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/YuRW16, author = {Jia Yu and Kui Ren and Cong Wang}, title = {Enabling Cloud Storage Auditing With Verifiable Outsourcing of Key Updates}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {11}, number = {6}, pages = {1362--1375}, year = {2016}, url = {https://doi.org/10.1109/TIFS.2016.2528500}, doi = {10.1109/TIFS.2016.2528500}, timestamp = {Thu, 06 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/YuRW16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/ZandiAT16, author = {Mohsen Zandi and Ahmad Mahmoudi Aznaveh and Alireza Talebpour}, title = {Iterative Copy-Move Forgery Detection Based on a New Interest Point Detector}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {11}, number = {11}, pages = {2499--2512}, year = {2016}, url = {https://doi.org/10.1109/TIFS.2016.2585118}, doi = {10.1109/TIFS.2016.2585118}, timestamp = {Sun, 25 Jul 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/ZandiAT16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/ZeitouniOWKS16, author = {Shaza Zeitouni and Yossef Oren and Christian Wachsmann and Patrick Koeberl and Ahmad{-}Reza Sadeghi}, title = {Remanence Decay Side-Channel: The {PUF} Case}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {11}, number = {6}, pages = {1106--1116}, year = {2016}, url = {https://doi.org/10.1109/TIFS.2015.2512534}, doi = {10.1109/TIFS.2015.2512534}, timestamp = {Thu, 06 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/ZeitouniOWKS16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/ZhangCZ16, author = {Yuan Zhang and Qingjun Chen and Sheng Zhong}, title = {Privacy-Preserving Data Aggregation in Mobile Phone Sensing}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {11}, number = {5}, pages = {980--992}, year = {2016}, url = {https://doi.org/10.1109/TIFS.2016.2515513}, doi = {10.1109/TIFS.2016.2515513}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/ZhangCZ16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/ZhangGZWYSG16, author = {Fan Zhang and Shize Guo and Xinjie Zhao and Tao Wang and Jian Yang and Fran{\c{c}}ois{-}Xavier Standaert and Dawu Gu}, title = {A Framework for the Analysis and Evaluation of Algebraic Fault Attacks on Lightweight Block Ciphers}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {11}, number = {5}, pages = {1039--1054}, year = {2016}, url = {https://doi.org/10.1109/TIFS.2016.2516905}, doi = {10.1109/TIFS.2016.2516905}, timestamp = {Thu, 06 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/ZhangGZWYSG16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/ZhangL16, author = {Meng Zhang and Yuan Liu}, title = {Energy Harvesting for Physical-Layer Security in {OFDMA} Networks}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {11}, number = {1}, pages = {154--162}, year = {2016}, url = {https://doi.org/10.1109/TIFS.2015.2481797}, doi = {10.1109/TIFS.2015.2481797}, timestamp = {Thu, 06 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/ZhangL16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/ZhangQ16, author = {Jiliang Zhang and Gang Qu}, title = {Rebuttal to "Comments on 'A {PUF-FSM} Binding Scheme for {FPGA} {IP} Protection and Pay-Per-Device Licensing"'}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {11}, number = {11}, pages = {2626--2627}, year = {2016}, url = {https://doi.org/10.1109/TIFS.2016.2553443}, doi = {10.1109/TIFS.2016.2553443}, timestamp = {Tue, 14 Dec 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tifs/ZhangQ16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/ZhangTZ16, author = {Yuan Zhang and Wei Tong and Sheng Zhong}, title = {On Designing Satisfaction-Ratio-Aware Truthful Incentive Mechanisms for k-Anonymity Location Privacy}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {11}, number = {11}, pages = {2528--2541}, year = {2016}, url = {https://doi.org/10.1109/TIFS.2016.2587241}, doi = {10.1109/TIFS.2016.2587241}, timestamp = {Thu, 09 Dec 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tifs/ZhangTZ16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/ZhangWDZ16, author = {Jingwen Zhang and Fanggang Wang and Octavia A. Dobre and Zhangdui Zhong}, title = {Specific Emitter Identification via Hilbert-Huang Transform in Single-Hop and Relaying Scenarios}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {11}, number = {6}, pages = {1192--1205}, year = {2016}, url = {https://doi.org/10.1109/TIFS.2016.2520908}, doi = {10.1109/TIFS.2016.2520908}, timestamp = {Thu, 06 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/ZhangWDZ16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/ZhangWJSA16, author = {Mengyuan Zhang and Lingyu Wang and Sushil Jajodia and Anoop Singhal and Massimiliano Albanese}, title = {Network Diversity: {A} Security Metric for Evaluating the Resilience of Networks Against Zero-Day Attacks}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {11}, number = {5}, pages = {1071--1086}, year = {2016}, url = {https://doi.org/10.1109/TIFS.2016.2516916}, doi = {10.1109/TIFS.2016.2516916}, timestamp = {Wed, 01 Jun 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/ZhangWJSA16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/ZhangWSH16, author = {Hang Zhang and Tianyu Wang and Lingyang Song and Zhu Han}, title = {Interference Improves {PHY} Security for Cognitive Radio Networks}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {11}, number = {3}, pages = {609--620}, year = {2016}, url = {https://doi.org/10.1109/TIFS.2015.2500184}, doi = {10.1109/TIFS.2015.2500184}, timestamp = {Tue, 03 Jan 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tifs/ZhangWSH16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/ZhangYG016, author = {Yuan Zhang and Min Yang and Guofei Gu and Hao Chen}, title = {Rethinking Permission Enforcement Mechanism on Mobile Systems}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {11}, number = {10}, pages = {2227--2240}, year = {2016}, url = {https://doi.org/10.1109/TIFS.2016.2581304}, doi = {10.1109/TIFS.2016.2581304}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/ZhangYG016.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/ZhangYWJWZ16, author = {Jun Zhang and Chau Yuen and Chao{-}Kai Wen and Shi Jin and Kai{-}Kit Wong and Hongbo Zhu}, title = {Large System Secrecy Rate Analysis for {SWIPT} {MIMO} Wiretap Channels}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {11}, number = {1}, pages = {74--85}, year = {2016}, url = {https://doi.org/10.1109/TIFS.2015.2477050}, doi = {10.1109/TIFS.2015.2477050}, timestamp = {Thu, 27 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/ZhangYWJWZ16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/ZhangZTZ16, author = {Yuan Zhang and He Zhang and Siyuan Tang and Sheng Zhong}, title = {Designing Secure and Dependable Mobile Sensing Mechanisms With Revenue Guarantees}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {11}, number = {1}, pages = {100--113}, year = {2016}, url = {https://doi.org/10.1109/TIFS.2015.2478739}, doi = {10.1109/TIFS.2015.2478739}, timestamp = {Thu, 09 Dec 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tifs/ZhangZTZ16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/ZhaoCWM16, author = {Hong Zhao and Yifan Chen and Rui Wang and Hafiz Malik}, title = {Anti-Forensics of Environmental-Signature-Based Audio Splicing Detection and Its Countermeasure via Rich-Features Classification}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {11}, number = {7}, pages = {1603--1617}, year = {2016}, url = {https://doi.org/10.1109/TIFS.2016.2543205}, doi = {10.1109/TIFS.2016.2543205}, timestamp = {Mon, 17 Apr 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/ZhaoCWM16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/ZhaoM16, author = {Lianying Zhao and Mohammad Mannan}, title = {Deceptive Deletion Triggers Under Coercion}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {11}, number = {12}, pages = {2763--2776}, year = {2016}, url = {https://doi.org/10.1109/TIFS.2016.2598523}, doi = {10.1109/TIFS.2016.2598523}, timestamp = {Mon, 26 Oct 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tifs/ZhaoM16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/ZhengKP16, author = {Qian Zheng and Ajay Kumar and Gang Pan}, title = {Suspecting Less and Doing Better: New Insights on Palmprint Identification for Faster and More Accurate Matching}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {11}, number = {3}, pages = {633--641}, year = {2016}, url = {https://doi.org/10.1109/TIFS.2015.2503265}, doi = {10.1109/TIFS.2015.2503265}, timestamp = {Mon, 02 Nov 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tifs/ZhengKP16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/ZhuC16, author = {Xinglei Zhu and Chang Wen Chen}, title = {A Joint Source-Channel Adaptive Scheme for Wireless {H.264/AVC} Video Authentication}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {11}, number = {1}, pages = {141--153}, year = {2016}, url = {https://doi.org/10.1109/TIFS.2015.2481366}, doi = {10.1109/TIFS.2015.2481366}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/ZhuC16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/ZhuL16, author = {Wen Tao Zhu and Jingqiang Lin}, title = {Generating Correlated Digital Certificates: Framework and Applications}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {11}, number = {6}, pages = {1117--1127}, year = {2016}, url = {https://doi.org/10.1109/TIFS.2016.2516818}, doi = {10.1109/TIFS.2016.2516818}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/ZhuL16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/ZhuLMSG16, author = {Yu Zhu and Yan Li and Guowang Mu and Shiguang Shan and Guodong Guo}, title = {Still-to-Video Face Matching Using Multiple Geodesic Flows}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {11}, number = {12}, pages = {2866--2875}, year = {2016}, url = {https://doi.org/10.1109/TIFS.2016.2601060}, doi = {10.1109/TIFS.2016.2601060}, timestamp = {Thu, 06 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/ZhuLMSG16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/Zivari-FardAAA16, author = {Hassan Zivari{-}Fard and Bahareh Akhbari and Mahmoud Ahmadian{-}Attari and Mohammad Reza Aref}, title = {Imperfect and Perfect Secrecy in Compound Multiple Access Channel With Confidential Message}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {11}, number = {6}, pages = {1239--1251}, year = {2016}, url = {https://doi.org/10.1109/TIFS.2016.2523813}, doi = {10.1109/TIFS.2016.2523813}, timestamp = {Thu, 06 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/Zivari-FardAAA16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.