Metadata Search Funding Data Link References Status API Help
Facet browsing currently unavailable
Page 4 of 4945 results
Sort by: relevance publication year

A Sensing Seat for Human Authentication

JOURNAL ARTICLE published September 2009 in IEEE Transactions on Information Forensics and Security

Authors: M. Ferro | G. Pioggia | A. Tognetti | N. Carbonaro | D. De Rossi

Explore IEL IEEE's most comprehensive resource [advertisement]

JOURNAL ARTICLE published September 2009 in IEEE Transactions on Information Forensics and Security

An Automated Solution to the Multiuser Carved Data Ascription Problem

JOURNAL ARTICLE published December 2010 in IEEE Transactions on Information Forensics and Security

Authors: Simson L. Garfinkel | Aleatha Parker-Wood | Daniel Huynh | James Migletz

CBSeq: A Channel-Level Behavior Sequence for Encrypted Malware Traffic Detection

JOURNAL ARTICLE published 2023 in IEEE Transactions on Information Forensics and Security

Research funded by Strategic Priority Research Program of Chinese Academy of Sciences (XDC02040100) | National Key Research and Development Program of China (2021YFB3101400) | NSFC (61902376,61972039) | National Engineering Research Center of Classified Protection and Safeguard Technology for Cybersecurity (C21640-3) | China National Funds for Excellent Young Scientists (62222201) | Beijing Nova Program (Z201100006820006,20220484174) | Beijing Natural Science Foundation (M23020,L222098,7232041)

Authors: Susu Cui | Cong Dong | Meng Shen | Yuling Liu | Bo Jiang | Zhigang Lu

Quaternary Quantized Gaussian Modulation With Optimal Polarity Map Selection for JPEG Steganography

JOURNAL ARTICLE published 2023 in IEEE Transactions on Information Forensics and Security

Research funded by Natural Science Foundation of China (62202310,U22B2047,62072421,62102386) | China Postdoctoral Science Foundation (2022M722192) | Basic and Applied Basic Research Foundation of Guangdong Province (2019B151502001) | Shenzhen Key Research Project (JCYJ20200109105008228,JSGG20220831095603007) | Guangxi Key Research and Development Project (Guike AB20238026)

Authors: Weixiang Li | Bin Li | Weiming Zhang | Shengli Zhang

A Manifold Consistency Interpolation Method of Poisoning Attacks Against Semi-Supervised Model

JOURNAL ARTICLE published 2023 in IEEE Transactions on Information Forensics and Security

Research funded by National Natural Science Foundation of China (62227805,62071056,30603020403)

Authors: Xinlei Wang | Xiaojuan Wang | Mingshu He | Min Zhang | Zhao Zhang

Automatic Construction of Dental Charts for Postmortem Identification

JOURNAL ARTICLE published June 2008 in IEEE Transactions on Information Forensics and Security

Authors: D.E. Nassar | A. Abaza | H. Ammar

Controllable Secure Watermarking Technique for Tradeoff Between Robustness and Security

JOURNAL ARTICLE published April 2012 in IEEE Transactions on Information Forensics and Security

Authors: Jian Cao | Jiwu Huang

A Selective Feature Information Approach for Iris Image-Quality Measure

JOURNAL ARTICLE published September 2008 in IEEE Transactions on Information Forensics and Security

Authors: C. Belcher

ON-OFF Privacy Against Correlation Over Time

JOURNAL ARTICLE published 2021 in IEEE Transactions on Information Forensics and Security

Research funded by NSF (CCF 1817635)

Authors: Fangwei Ye | Carolina Naim | Salim El Rouayheb

Uncoordinated Frequency Hopping for Wireless Secrecy Against Non-Degraded Eavesdroppers

JOURNAL ARTICLE published January 2018 in IEEE Transactions on Information Forensics and Security

Authors: Joao Sa Sousa | Joao P. Vilela

Physical Layer Spectrum Usage Authentication in Cognitive Radio: Analysis and Implementation

JOURNAL ARTICLE published October 2015 in IEEE Transactions on Information Forensics and Security

Research funded by Air Force Office of Scientific Research (FA9550-09-1-0224) | Air Force Research Laboratories (FA8750-15-1-0045)

Authors: Kapil M. Borle | Biao Chen | Wenliang Kevin Du

Biometric Template Protection Using Universal Background Models: An Application to Online Signature

JOURNAL ARTICLE published February 2012 in IEEE Transactions on Information Forensics and Security

Authors: Enrique Argones Rua | Emanuele Maiorana | Jose Luis Alba Castro | Patrizio Campisi

Back to Static Analysis for Kernel-Level Rootkit Detection

JOURNAL ARTICLE published September 2014 in IEEE Transactions on Information Forensics and Security

Research funded by ITRC (12188/500 (91/8/2))

Authors: Seyyedeh Atefeh Musavi | Mehdi Kharrazi

Joint Coding and Embedding Techniques for Multimedia Fingerprinting

JOURNAL ARTICLE published June 2006 in IEEE Transactions on Information Forensics and Security

Authors: S. He | M. Wu

In-Band Full-Duplex Discriminatory Channel Estimation Using MMSE

JOURNAL ARTICLE published 2020 in IEEE Transactions on Information Forensics and Security

Research funded by McGill University in the framework of the NSERC/Hydro-Québec Industrial Research Chair in Interactive Information Infrastructure for the Power Grid (IRCPJ406021-14)

Authors: Fawad Ud Din | Fabrice Labeau

Table of contents

JOURNAL ARTICLE published June 2015 in IEEE Transactions on Information Forensics and Security

J-STSP call for special issue proposals

JOURNAL ARTICLE published January 2013 in IEEE Transactions on Information Forensics and Security

[Blank page]

JOURNAL ARTICLE published January 2013 in IEEE Transactions on Information Forensics and Security

Table of contents EDICS

JOURNAL ARTICLE published September 2018 in IEEE Transactions on Information Forensics and Security