Facet browsing currently unavailable
Page 2 of 4949 results
Sort by: relevance publication year
Enhanced PeerHunter: Detecting Peer-to-Peer Botnets Through Network-Flow Level Community Behavior Analysis JOURNAL ARTICLE published June 2019 in IEEE Transactions on Information Forensics and Security |
SpecView: Malware Spectrum Visualization Framework With Singular Spectrum Transformation JOURNAL ARTICLE published 2021 in IEEE Transactions on Information Forensics and Security Research funded by NSFC (62072484,61772571) | Chinese National Key Research and Development Project (2019QY2203) | National Science Foundation (CNS-1950171) | Key Project of Hanshan Normal University (XN202035) |
Segmentation-Based Image Copy-Move Forgery Detection Scheme JOURNAL ARTICLE published March 2015 in IEEE Transactions on Information Forensics and Security Research funded by Jiangsu Basic Research Programs-Natural Science Foundation (BK20141006,BK20131004) | Natural Science Foundation of the Universities in Jiangsu Province (14KJB520024) | NSFC (61173142,61232016,61379151,61300238) | Startup Foundation for Introducing Talent of NUIST (2012x053) | Suzhou Science Project-Applied Basic Research (SYG201315) |
Image Phylogeny by Minimal Spanning Trees JOURNAL ARTICLE published April 2012 in IEEE Transactions on Information Forensics and Security |
BL-MLE: Block-Level Message-Locked Encryption for Secure Large File Deduplication JOURNAL ARTICLE published December 2015 in IEEE Transactions on Information Forensics and Security |
<italic>pRide</italic>: Privacy-Preserving Ride Matching Over Road Networks for Online Ride-Hailing Service JOURNAL ARTICLE published July 2019 in IEEE Transactions on Information Forensics and Security Research funded by National Science and Technology Major Project (2016YFB0800804) | National Natural Science Foundation of China (61379144,61572026,61732022) | Research Grants Council of Hong Kong (CityU C1008-16G) |
Differentially Private ADMM Algorithms for Machine Learning JOURNAL ARTICLE published 2021 in IEEE Transactions on Information Forensics and Security Research funded by National Natural Science Foundation of China (61876220,61876221,61976164,62036006) | Foundation for Innovative Research Groups of the National Natural Science Foundation of China (61621005) | Major Research Plan of the National Natural Science Foundation of China (91438201,91438103) | Program for Cheung Kong Scholars and Innovative Research Team in University (IRT_15R53) | Fund for Foreign Scholars in University Research and Teaching Programs (B07048) | National Science Basic Research Plan in Shaanxi Province of China (2020JM-194) |
Audio Splicing Detection and Localization Based on Acquisition Device Traces JOURNAL ARTICLE published 2023 in IEEE Transactions on Information Forensics and Security Research funded by Defense Advanced Research Projects Agency (DARPA) and the Air Force Research Laboratory (FA8750-20-2-1004) | European Union through the Horizon 2020 AI4Media Project (951911) | European Union through the Italian National Recovery and Resilience Plan (NRRP) of NextGenerationEU, partnership on “Telecommunications of the Future” (PE00000001-Program “RESTART.”) |
GapFinder: Finding Inconsistency of Security Information From Unstructured Text JOURNAL ARTICLE published 2021 in IEEE Transactions on Information Forensics and Security Research funded by Korean Government MSIT (NRF-2018R1A5A1059921) |
Why Botnets Work: Distributed Brute-Force Attacks Need No Synchronization JOURNAL ARTICLE published September 2019 in IEEE Transactions on Information Forensics and Security Research funded by National Science Foundation (CCF-1527270) | Defense Advanced Research Projects Agency (HR0011-17-C-0050) |
General Constructions for Threshold Multiple-Secret Visual Cryptographic Schemes JOURNAL ARTICLE published May 2013 in IEEE Transactions on Information Forensics and Security |
Direct Anonymous Attestation With Optimal TPM Signing Efficiency JOURNAL ARTICLE published 2021 in IEEE Transactions on Information Forensics and Security Research funded by National Natural Science Foundation of China (61932019,61802021) | EU Horizon 2020 Research and Innovation Program (779391) | Engineering and Physical Sciences Research Council (EPSRC) through the DICE Project (EP/N028295/1) | National Key Research and Development Program of China (2017YFB0802504) | National Natural Science Foundation of China (U1536205) |
Privacy-Preserving Split Learning for Large-Scaled Vision Pre-Training JOURNAL ARTICLE published 2023 in IEEE Transactions on Information Forensics and Security Research funded by National Natural Science Foundation of China (61872197,61972209) | Postgraduate Research and Practice Innovation Program of Jiangsu Province (KYCX21_0791) | Natural Research Foundation of Nanjing University of Posts and Telecommunications (NY217119) |
Realtime DDoS Defense Using COTS SDN Switches via Adaptive Correlation Analysis JOURNAL ARTICLE published July 2018 in IEEE Transactions on Information Forensics and Security Research funded by National Key R&D Program of China (2016YFB0800102) | National Natural Science Foundation of China (61572278,U1736209) | National Science Foundation (1617985,1642129,1700544) |
On Generation and Analysis of Synthetic Iris Images JOURNAL ARTICLE published March 2007 in IEEE Transactions on Information Forensics and Security |
FVFSNet: Frequency-Spatial Coupling Network for Finger Vein Authentication JOURNAL ARTICLE published 2023 in IEEE Transactions on Information Forensics and Security Research funded by National Natural Science Foundation of China (61976095) | Natural Science Foundation of Guangdong Province, China (2022A1515010114) | Fundamental Research Funds for the Central Universities (2022ZYGXZR099) |
A New Method for EEG-Based Concealed Information Test JOURNAL ARTICLE published March 2013 in IEEE Transactions on Information Forensics and Security |
IEEE Transactions on Information Forensics and Security Edics JOURNAL ARTICLE published November 2018 in IEEE Transactions on Information Forensics and Security |
Table of contents JOURNAL ARTICLE published September 2016 in IEEE Transactions on Information Forensics and Security |
Table of contents JOURNAL ARTICLE published May 2014 in IEEE Transactions on Information Forensics and Security |