Home
Research Trends
Papers list
Open Access Journals
All Journals
Search in Journals
Contact us
IEEE Transactions on Information Forensics and Security
Title
Publication Date
Language
Citations
An Effective Address Mutation Approach for Disrupting Reconnaissance Attacks
2015/12/01
9
Attribute-Based Encryption With Efficient Verifiable Outsourced Decryption
2015/07/01
9
A Reversible Data Hiding Scheme Based on Code Division Multiplexing
2016/09/01
9
An Evaluation of Popular Copy-Move Forgery Detection Approaches
2012/12/01
9
A SIFT-Based Forensic Method for Copy–Move Attack Detection and Transformation Recovery
2011/09/01
9
Revisiting Attribute-Based Encryption With Verifiable Outsourced Decryption
2015/10/01
8
Multi-Stage Feature Constraints Learning for Age Estimation
2020/01/01
8
Classification of Encrypted Traffic With Second-Order Markov Chains and Application Attribute Bigrams
2017/08/01
8
Robust Image Hashing With Ring Partition and Invariant Vector Distance
2016/01/01
8
Android Malware Familial Classification and Representative Sample Selection via Frequent Subgraph Analysis
2018/08/01
8
Secure Face Unlock: Spoof Detection on Smartphones
2016/10/01
8
Deep Residual Network for Steganalysis of Digital Images
2019/05/01
8
Reversible Image Watermarking Based on Integer-to-Integer Wavelet Transform
2007/09/01
8
Minimizing Additive Distortion in Steganography Using Syndrome-Trellis Codes
2011/09/01
8
White-Box Traceable Ciphertext-Policy Attribute-Based Encryption Supporting Any Monotone Access Structures
2013/01/01
8
A Method of Few-Shot Network Intrusion Detection Based on Meta-Learning Framework
2020/01/01
8
Light-Weight and Robust Security-Aware D2D-Assist Data Transmission Protocol for Mobile-Health Systems
2017/03/01
8
Face Spoof Detection With Image Distortion Analysis
2015/04/01
8
Exploring Permission-Induced Risk in Android Applications for Malicious Application Detection
2014/11/01
8
Biometrics: A Tool for Information Security
2006/06/01
English
8
Reversible Image Watermarking Using Interpolation Technique
2010/03/01
8
Information-Theoretically Secret Key Generation for Fading Wireless Channels
2010/06/01
7
New Algorithms for Secure Outsourcing of Large-Scale Systems of Linear Equations
2015/01/01
7
Identity-Based Proxy-Oriented Data Uploading and Remote Data Integrity Checking in Public Cloud
2016/06/01
7
Low-Rate DDoS Attacks Detection and Traceback by Using New Information Metrics
2011/06/01
7
Digital Camera Identification From Sensor Pattern Noise
2006/06/01
English
7
Enabling Cloud Storage Auditing With Verifiable Outsourcing of Key Updates
2016/06/01
7
Ensemble Classifiers for Steganalysis of Digital Media
2012/04/01
7
Unconstrained Face Recognition: Identifying a Person of Interest From a Media Collection
2014/12/01
7
Unsupervised Machine Learning-Based Detection of Covert Data Integrity Assault in Smart Grid Networks Utilizing Isolation Forest
2019/10/01
7
«
‹ Pervious
Next ›
»