Metadata Search Funding Data Link References Status API Help
Facet browsing currently unavailable
Page 5 of 4949 results
Sort by: relevance publication year

Adaptive Directional Total-Variation Model for Latent Fingerprint Segmentation

JOURNAL ARTICLE published August 2013 in IEEE Transactions on Information Forensics and Security

Authors: Jiangyang Zhang | Rongjie Lai | C.-C. Jay Kuo

DAPASA: Detecting Android Piggybacked Apps Through Sensitive Subgraph Analysis

JOURNAL ARTICLE published August 2017 in IEEE Transactions on Information Forensics and Security

Research funded by National Basic Research Program of China (2016YFB1000903) | National Natural Science Foundation of China (91418205,61472318,61532015,61532004,61672419,61632015) | Fok Ying-Tong Education Foundation (151067) | Ministry of Education Innovation Research Team (IRT13035) | Shenzhen City Science and Technology Research and Development Fund (JCYJ20150630115257892)

Authors: Ming Fan | Jun Liu | Wei Wang | Haifei Li | Zhenzhou Tian | Ting Liu

Determining Image Origin and Integrity Using Sensor Noise

JOURNAL ARTICLE published 2008 in IEEE Transactions on Information Forensics and Security

Authors: Mo Chen | Jessica Fridrich | Miroslav Goljan | Jan Lukas

A Unified Framework for Contactless Hand Verification

JOURNAL ARTICLE published September 2011 in IEEE Transactions on Information Forensics and Security

Authors: Vivek Kanhangad | Ajay Kumar | David Zhang

PVD-FL: A Privacy-Preserving and Verifiable Decentralized Federated Learning Framework

JOURNAL ARTICLE published 2022 in IEEE Transactions on Information Forensics and Security

Research funded by National Key Research and Development Program of China (2021YFB3101300) | National Natural Science Foundation of China (61972304,61932015) | Science Foundation of the Ministry of Education (MCM20200101) | Shaanxi Provincial Key Research and Development Program (2020ZDLGY08-04)

Authors: Jiaqi Zhao | Hui Zhu | Fengwei Wang | Rongxing Lu | Zhe Liu | Hui Li

Combining Graph-Based Learning With Automated Data Collection for Code Vulnerability Detection

JOURNAL ARTICLE published 2021 in IEEE Transactions on Information Forensics and Security

Research funded by National Natural Science Foundation of China (61972314,61672427,61872294) | International Cooperation Projects of Shaanxi Province (2019KW-009,2020KWZ-013)

Authors: Huanting Wang | Guixin Ye | Zhanyong Tang | Shin Hwei Tan | Songfang Huang | Dingyi Fang | Yansong Feng | Lizhong Bian | Zheng Wang

Automated Depression Diagnosis Based on Facial Dynamic Analysis and Sparse Coding

JOURNAL ARTICLE published July 2015 in IEEE Transactions on Information Forensics and Security

Authors: Lingyun Wen | Xin Li | Guodong Guo | Yu Zhu

Evaluating Adversarial Evasion Attacks in the Context of Wireless Communications

JOURNAL ARTICLE published 2020 in IEEE Transactions on Information Forensics and Security

Authors: Bryse Flowers | R. Michael Buehrer | William C. Headley

MTD-Net: Learning to Detect Deepfakes Images by Multi-Scale Texture Difference

JOURNAL ARTICLE published 2021 in IEEE Transactions on Information Forensics and Security

Research funded by National Natural Science Foundation of China (61871283) | Foundation of Pre-Research on Equipment of China (61400010304) | Major Civil-Military Integration Project in Tianjin, China (18ZXJMTG00170)

Authors: Jiachen Yang | Aiyun Li | Shuai Xiao | Wen Lu | Xinbo Gao

Location-Based PVO and Adaptive Pairwise Modification for Efficient Reversible Data Hiding

JOURNAL ARTICLE published 2020 in IEEE Transactions on Information Forensics and Security

Research funded by National Natural Science Foundation of China (61972031,U1736213,61572052,U1636206)

Authors: Tong Zhang | Xiaolong Li | Wenfa Qi | Zongming Guo

A Hybrid Approach for Detecting Automated Spammers in Twitter

JOURNAL ARTICLE published November 2018 in IEEE Transactions on Information Forensics and Security

Authors: Mohd Fazil | Muhammad Abulaish

Speaker Identification Using Discriminative Features and Sparse Representation

JOURNAL ARTICLE published August 2017 in IEEE Transactions on Information Forensics and Security

Authors: Yu-Hao Chin | Jia-Ching Wang | Chien-Lin Huang | Kuang-Yao Wang | Chung-Hsien Wu

Multi-Scale and Multi-Direction GAN for CNN-Based Single Palm-Vein Identification

JOURNAL ARTICLE published 2021 in IEEE Transactions on Information Forensics and Security

Research funded by National Natural Science Foundation of China (61976030,62072061,U20A20176) | Natural Science Foundation Project of Chongqing (cstc2018jcyjAX0095) | Scientific and Technological Research Program of Chongqing Municipal Education Commission (KJQN201900848)

Authors: Huafeng Qin | Mounim A. El-Yacoubi | Yantao Li | Chongwen Liu

Unsupervised Domain Adaptation for Face Anti-Spoofing

JOURNAL ARTICLE published July 2018 in IEEE Transactions on Information Forensics and Security

Authors: Haoliang Li | Wen Li | Hong Cao | Shiqi Wang | Feiyue Huang | Alex C. Kot

Spoofing Face Recognition With 3D Masks

JOURNAL ARTICLE published July 2014 in IEEE Transactions on Information Forensics and Security

Authors: Nesli Erdogmus | Sebastien Marcel

Dependency-Aware Attention Control for Image Set-Based Face Recognition

JOURNAL ARTICLE published 2020 in IEEE Transactions on Information Forensics and Security

Research funded by National Natural Science Foundation of China (61772296,U1713214) | Shenzhen FRF (JCYJ20170412170438636) | HK GRF (152202/14E)

Authors: Xiaofeng Liu | Zhenhua Guo | Jane You | B. V. K. Vijaya Kumar

Deep and Ordinal Ensemble Learning for Human Age Estimation From Facial Images

JOURNAL ARTICLE published 2020 in IEEE Transactions on Information Forensics and Security

Research funded by Universidade de Macau (MYRG2018-00035-FST,MYRG2019-00086-FST) | Science and Technology Development Fund, Macau SAR (041/2017/A1,0019/2019/A)

Authors: Jiu-Cheng Xie | Chi-Man Pun

PFLF: Privacy-Preserving Federated Learning Framework for Edge Computing

JOURNAL ARTICLE published 2022 in IEEE Transactions on Information Forensics and Security

Research funded by National Natural Science Foundation of China (61872197,61972209) | Postgraduate Research and Practice Innovation Program of Jiangsu Province (KYCX21 0789) | Natural Research Foundation of Nanjing University of Posts and Telecommunications (NY217119) | Anhui Provincial Key Laboratory of Network and Information Security (AHNIS2020002)

Authors: Hao Zhou | Geng Yang | Hua Dai | Guoxiu Liu

DNSRadar: Outsourcing Malicious Domain Detection Based on Distributed Cache-Footprints

JOURNAL ARTICLE published November 2014 in IEEE Transactions on Information Forensics and Security

Research funded by National Natural Science Foundation of China (61221063,U1301254,61103241,61103240,91118005) | 863 High Tech Development Plan (2012AA011003) | Application Foundation Research Program of Suzhou (SYG201311)

Authors: Xiaobo Ma | Junjie Zhang | Jing Tao | Jianfeng Li | Jue Tian | Xiaohong Guan

General Framework to Evaluate Unlinkability in Biometric Template Protection Systems

JOURNAL ARTICLE published June 2018 in IEEE Transactions on Information Forensics and Security

Authors: Marta Gomez-Barrero | Javier Galbally | Christian Rathgeb | Christoph Busch