Metadata Search Funding Data Link References Status API Help
Facet browsing currently unavailable
Page 2 of 4949 results
Sort by: relevance publication year

Enhanced PeerHunter: Detecting Peer-to-Peer Botnets Through Network-Flow Level Community Behavior Analysis

JOURNAL ARTICLE published June 2019 in IEEE Transactions on Information Forensics and Security

Authors: Di Zhuang | J. Morris Chang

SpecView: Malware Spectrum Visualization Framework With Singular Spectrum Transformation

JOURNAL ARTICLE published 2021 in IEEE Transactions on Information Forensics and Security

Research funded by NSFC (62072484,61772571) | Chinese National Key Research and Development Project (2019QY2203) | National Science Foundation (CNS-1950171) | Key Project of Hanshan Normal University (XN202035)

Authors: Jian Yu | Yuewang He | Qiben Yan | Xiangui Kang

Segmentation-Based Image Copy-Move Forgery Detection Scheme

JOURNAL ARTICLE published March 2015 in IEEE Transactions on Information Forensics and Security

Research funded by Jiangsu Basic Research Programs-Natural Science Foundation (BK20141006,BK20131004) | Natural Science Foundation of the Universities in Jiangsu Province (14KJB520024) | NSFC (61173142,61232016,61379151,61300238) | Startup Foundation for Introducing Talent of NUIST (2012x053) | Suzhou Science Project-Applied Basic Research (SYG201315)

Image Phylogeny by Minimal Spanning Trees

JOURNAL ARTICLE published April 2012 in IEEE Transactions on Information Forensics and Security

Authors: Zanoni Dias | Anderson Rocha | Siome Goldenstein

BL-MLE: Block-Level Message-Locked Encryption for Secure Large File Deduplication

JOURNAL ARTICLE published December 2015 in IEEE Transactions on Information Forensics and Security

Authors: Rongmao Chen | Yi Mu | Guomin Yang | Fuchun Guo

<italic>pRide</italic>: Privacy-Preserving Ride Matching Over Road Networks for Online Ride-Hailing Service

JOURNAL ARTICLE published July 2019 in IEEE Transactions on Information Forensics and Security

Research funded by National Science and Technology Major Project (2016YFB0800804) | National Natural Science Foundation of China (61379144,61572026,61732022) | Research Grants Council of Hong Kong (CityU C1008-16G)

Authors: Yuchuan Luo | Xiaohua Jia | Shaojing Fu | Ming Xu

Differentially Private ADMM Algorithms for Machine Learning

JOURNAL ARTICLE published 2021 in IEEE Transactions on Information Forensics and Security

Research funded by National Natural Science Foundation of China (61876220,61876221,61976164,62036006) | Foundation for Innovative Research Groups of the National Natural Science Foundation of China (61621005) | Major Research Plan of the National Natural Science Foundation of China (91438201,91438103) | Program for Cheung Kong Scholars and Innovative Research Team in University (IRT_15R53) | Fund for Foreign Scholars in University Research and Teaching Programs (B07048) | National Science Basic Research Plan in Shaanxi Province of China (2020JM-194)

Authors: Fanhua Shang | Tao Xu | Yuanyuan Liu | Hongying Liu | Longjie Shen | Maoguo Gong

Audio Splicing Detection and Localization Based on Acquisition Device Traces

JOURNAL ARTICLE published 2023 in IEEE Transactions on Information Forensics and Security

Research funded by Defense Advanced Research Projects Agency (DARPA) and the Air Force Research Laboratory (FA8750-20-2-1004) | European Union through the Horizon 2020 AI4Media Project (951911) | European Union through the Italian National Recovery and Resilience Plan (NRRP) of NextGenerationEU, partnership on “Telecommunications of the Future” (PE00000001-Program “RESTART.”)

Authors: Daniele Ugo Leonzio | Luca Cuccovillo | Paolo Bestagini | Marco Marcon | Patrick Aichroth | Stefano Tubaro

GapFinder: Finding Inconsistency of Security Information From Unstructured Text

JOURNAL ARTICLE published 2021 in IEEE Transactions on Information Forensics and Security

Research funded by Korean Government MSIT (NRF-2018R1A5A1059921)

Authors: Hyeonseong Jo | Jinwoo Kim | Phillip Porras | Vinod Yegneswaran | Seungwon Shin

Why Botnets Work: Distributed Brute-Force Attacks Need No Synchronization

JOURNAL ARTICLE published September 2019 in IEEE Transactions on Information Forensics and Security

Research funded by National Science Foundation (CCF-1527270) | Defense Advanced Research Projects Agency (HR0011-17-C-0050)

Authors: Salman Salamatian | Wasim Huleihel | Ahmad Beirami | Asaf Cohen | Muriel Medard

General Constructions for Threshold Multiple-Secret Visual Cryptographic Schemes

JOURNAL ARTICLE published May 2013 in IEEE Transactions on Information Forensics and Security

Direct Anonymous Attestation With Optimal TPM Signing Efficiency

JOURNAL ARTICLE published 2021 in IEEE Transactions on Information Forensics and Security

Research funded by National Natural Science Foundation of China (61932019,61802021) | EU Horizon 2020 Research and Innovation Program (779391) | Engineering and Physical Sciences Research Council (EPSRC) through the DICE Project (EP/N028295/1) | National Key Research and Development Program of China (2017YFB0802504) | National Natural Science Foundation of China (U1536205)

Authors: Kang Yang | Liqun Chen | Zhenfeng Zhang | Christopher J. P. Newton | Bo Yang | Li Xi

Privacy-Preserving Split Learning for Large-Scaled Vision Pre-Training

JOURNAL ARTICLE published 2023 in IEEE Transactions on Information Forensics and Security

Research funded by National Natural Science Foundation of China (61872197,61972209) | Postgraduate Research and Practice Innovation Program of Jiangsu Province (KYCX21_0791) | Natural Research Foundation of Nanjing University of Posts and Telecommunications (NY217119)

Authors: Zhousheng Wang | Geng Yang | Hua Dai | Chunming Rong

Realtime DDoS Defense Using COTS SDN Switches via Adaptive Correlation Analysis

JOURNAL ARTICLE published July 2018 in IEEE Transactions on Information Forensics and Security

Research funded by National Key R&D Program of China (2016YFB0800102) | National Natural Science Foundation of China (61572278,U1736209) | National Science Foundation (1617985,1642129,1700544)

Authors: Jing Zheng | Qi Li | Guofei Gu | Jiahao Cao | David K. Y. Yau | Jianping Wu

On Generation and Analysis of Synthetic Iris Images

JOURNAL ARTICLE published March 2007 in IEEE Transactions on Information Forensics and Security

Authors: Jinyu Zuo | Natalia A. Schmid | Xiaohan Chen

FVFSNet: Frequency-Spatial Coupling Network for Finger Vein Authentication

JOURNAL ARTICLE published 2023 in IEEE Transactions on Information Forensics and Security

Research funded by National Natural Science Foundation of China (61976095) | Natural Science Foundation of Guangdong Province, China (2022A1515010114) | Fundamental Research Funds for the Central Universities (2022ZYGXZR099)

Authors: Junduan Huang | An Zheng | M. Saad Shakeel | Weili Yang | Wenxiong Kang

A New Method for EEG-Based Concealed Information Test

JOURNAL ARTICLE published March 2013 in IEEE Transactions on Information Forensics and Security

Authors: Deng Wang | Duoqian Miao | Gunnar Blohm

IEEE Transactions on Information Forensics and Security Edics

JOURNAL ARTICLE published November 2018 in IEEE Transactions on Information Forensics and Security

Table of contents

JOURNAL ARTICLE published September 2016 in IEEE Transactions on Information Forensics and Security

Table of contents

JOURNAL ARTICLE published May 2014 in IEEE Transactions on Information Forensics and Security