IEEE Transactions on Information Forensics and Security

Title Publication Date Language Citations
Improved Visual Secret Sharing Scheme for QR Code Applications2018/09/017
Detection of Abnormal Visual Events via Global Optical Flow Orientation Histogram2014/06/017
Uniform Embedding for Efficient JPEG Steganography2014/05/017
Provable Multicopy Dynamic Data Possession in Cloud Computing Systems2015/03/017
HASBE: A Hierarchical Attribute-Based Solution for Flexible and Scalable Access Control in Cloud Computing2012/04/016
LDTS: A Lightweight and Dependable Trust System for Clustered Wireless Sensor Networks2013/06/016
GANobfuscator: Mitigating Information Leakage Under GAN via Differential Privacy2019/09/016
Multi-Task GANs for View-Specific Feature Learning in Gait Recognition2019/01/016
Fingerprint Liveness Detection Using Convolutional Neural Networks2016/06/016
Provably Secure Dynamic ID-Based Anonymous Two-Factor Authenticated Key Exchange Protocol With Extended Security Model2017/06/016
CP-ABE With Constant-Size Keys for Lightweight Devices2014/05/016
Empirical Evaluation and New Design for Fighting Evolving Twitter Spammers2013/08/016
Convolutional Neural Networks Using Dynamic Functional Connectivity for EEG-Based Person Identification in Diverse Human States2019/12/016
Deep Learning-Based Gait Recognition Using Smartphones in the Wild2020/01/016
VAE-Stega: Linguistic Steganography Based on Variational Auto-Encoder2021/01/016
Single Sample Face Recognition via Learning Deep Supervised Autoencoders2015/10/016
White-Box Traceable Ciphertext-Policy Attribute-Based Encryption Supporting Flexible Attributes2015/06/016
Improving Privacy and Security in Decentralized Ciphertext-Policy Attribute-Based Encryption2015/03/016
Constrained Convolutional Neural Networks: A New Approach Towards General Purpose Image Manipulation Detection2018/11/016
Combining Data Owner-Side and Cloud-Side Access Control for Encrypted Cloud Storage2018/08/016
AnomalyNet: An Anomaly Detection Network for Video Surveillance2019/10/016
Forensic detection of image manipulation using statistical intrinsic fingerprints2010/09/016
PermPair: Android Malware Detection Using Permission Pairs2020/01/016
Depth-Wise Separable Convolutions and Multi-Level Pooling for an Efficient Spatial CNN-Based Steganalysis2020/01/016
Convolutional Neural Network for Finger-Vein-Based Biometric Identification2019/02/016
Privacy-Enhanced Federated Learning Against Poisoning Adversaries2021/01/016
b-SPECS+: Batch Verification for Secure Pseudonymous Authentication in VANET2013/11/016
Age and Gender Estimation of Unfiltered Faces2014/12/016
Face Spoofing Detection Using Colour Texture Analysis2016/08/015
Effective Repair Strategy Against Advanced Persistent Threat: A Differential Game Approach2019/07/015