Home
Research Trends
Papers list
Open Access Journals
All Journals
Search in Journals
Contact us
IEEE Transactions on Information Forensics and Security
Title
Publication Date
Language
Citations
Improved Visual Secret Sharing Scheme for QR Code Applications
2018/09/01
7
Detection of Abnormal Visual Events via Global Optical Flow Orientation Histogram
2014/06/01
7
Uniform Embedding for Efficient JPEG Steganography
2014/05/01
7
Provable Multicopy Dynamic Data Possession in Cloud Computing Systems
2015/03/01
7
HASBE: A Hierarchical Attribute-Based Solution for Flexible and Scalable Access Control in Cloud Computing
2012/04/01
6
LDTS: A Lightweight and Dependable Trust System for Clustered Wireless Sensor Networks
2013/06/01
6
GANobfuscator: Mitigating Information Leakage Under GAN via Differential Privacy
2019/09/01
6
Multi-Task GANs for View-Specific Feature Learning in Gait Recognition
2019/01/01
6
Fingerprint Liveness Detection Using Convolutional Neural Networks
2016/06/01
6
Provably Secure Dynamic ID-Based Anonymous Two-Factor Authenticated Key Exchange Protocol With Extended Security Model
2017/06/01
6
CP-ABE With Constant-Size Keys for Lightweight Devices
2014/05/01
6
Empirical Evaluation and New Design for Fighting Evolving Twitter Spammers
2013/08/01
6
Convolutional Neural Networks Using Dynamic Functional Connectivity for EEG-Based Person Identification in Diverse Human States
2019/12/01
6
Deep Learning-Based Gait Recognition Using Smartphones in the Wild
2020/01/01
6
VAE-Stega: Linguistic Steganography Based on Variational Auto-Encoder
2021/01/01
6
Single Sample Face Recognition via Learning Deep Supervised Autoencoders
2015/10/01
6
White-Box Traceable Ciphertext-Policy Attribute-Based Encryption Supporting Flexible Attributes
2015/06/01
6
Improving Privacy and Security in Decentralized Ciphertext-Policy Attribute-Based Encryption
2015/03/01
6
Constrained Convolutional Neural Networks: A New Approach Towards General Purpose Image Manipulation Detection
2018/11/01
6
Combining Data Owner-Side and Cloud-Side Access Control for Encrypted Cloud Storage
2018/08/01
6
AnomalyNet: An Anomaly Detection Network for Video Surveillance
2019/10/01
6
Forensic detection of image manipulation using statistical intrinsic fingerprints
2010/09/01
6
PermPair: Android Malware Detection Using Permission Pairs
2020/01/01
6
Depth-Wise Separable Convolutions and Multi-Level Pooling for an Efficient Spatial CNN-Based Steganalysis
2020/01/01
6
Convolutional Neural Network for Finger-Vein-Based Biometric Identification
2019/02/01
6
Privacy-Enhanced Federated Learning Against Poisoning Adversaries
2021/01/01
6
b-SPECS+: Batch Verification for Secure Pseudonymous Authentication in VANET
2013/11/01
6
Age and Gender Estimation of Unfiltered Faces
2014/12/01
6
Face Spoofing Detection Using Colour Texture Analysis
2016/08/01
5
Effective Repair Strategy Against Advanced Persistent Threat: A Differential Game Approach
2019/07/01
5
«
‹ Pervious
Next ›
»