| A Light CNN for Deep Face Representation With Noisy Labels |
91 |
| Leveraging Content Sensitiveness and User Trustworthiness to Recommend Fine-Grained Privacy Settings for Social Image Sharing |
68 |
| Privacy-Preserving Deep Learning via Additively Homomorphic Encryption |
55 |
| Deep Residual Network for Steganalysis of Digital Images |
41 |
| An Efficient MSB Prediction-Based Method for High-Capacity Reversible Data Hiding in Encrypted Images |
38 |
| Depreciating Motivation and Empirical Security Analysis of Chaos-Based Image and Video Encryption |
38 |
| Enabling Efficient and Geometric Range Query With Access Control Over Encrypted Spatial Data |
37 |
| Cloud-Based Approximate Constrained Shortest Distance Queries Over Encrypted Graphs With Privacy Protection |
37 |
| Using Deep Convolutional Neural Network Architectures for Object Classification and Detection Within X-Ray Baggage Security Imagery |
36 |
| Enabling Identity-Based Integrity Auditing and Data Sharing With Sensitive Information Hiding for Secure Cloud Storage |
32 |
| Constrained Convolutional Neural Networks: A New Approach Towards General Purpose Image Manipulation Detection |
32 |
| A Secure Mobile Crowdsensing Game With Deep Reinforcement Learning |
30 |
| Anonymous and Traceable Group Data Sharing in Cloud Computing |
28 |
| Specific Emitter Identification Based on Variational Mode Decomposition and Spectral Features in Single Hop and Relaying Scenarios |
28 |
| Convolutional Neural Network for Finger-Vein-Based Biometric Identification |
28 |
| Robust Smartphone App Identification via Encrypted Network Traffic Analysis |
26 |
| Android Malware Familial Classification and Representative Sample Selection via Frequent Subgraph Analysis |
26 |
| Unsupervised Domain Adaptation for Face Anti-Spoofing |
25 |
| Large-Scale JPEG Image Steganalysis Using Hybrid Deep-Learning Framework |
25 |
| Learning Generalized Deep Feature Representation for Face Anti-Spoofing |
24 |
| Performance Analysis of Multi-Motion Sensor Behavior for Active Smartphone Authentication |
23 |
| A Multimodal Deep Learning Method for Android Malware Detection Using Various Features |
23 |
| Deep Abstraction and Weighted Feature Selection for Wi-Fi Impersonation Detection |
21 |
| AnomalyNet: An Anomaly Detection Network for Video Surveillance |
21 |
| Encryption-Then-Compression Systems Using Grayscale-Based Image Encryption for JPEG Images |
19 |
| Uncovering the Face of Android Ransomware: Characterization and Real-Time Detection |
19 |
| LoPub: High-Dimensional Crowdsourced Data Publication With Local Differential Privacy |
19 |
| Multi-Task GANs for View-Specific Feature Learning in Gait Recognition |
18 |
| CNN-Based Adversarial Embedding for Image Steganography |
18 |
| Fingerprint Spoof Buster: Use of Minutiae-Centered Patches |
18 |
| Joint Relay Selection and Power Allocation in Large-Scale MIMO Systems With Untrusted Relays and Passive Eavesdroppers |
18 |
| Secure Key Agreement and Key Protection for Mobile Device User Authentication |
18 |
| Two-Stage Relay Selection for Enhancing Physical Layer Security in Non-Orthogonal Multiple Access |
18 |
| VoltageIDS: Low-Level Communication Characteristics for Automotive Intrusion Detection System |
17 |
| Learning the Truth Privately and Confidently: Encrypted Confidence-Aware Truth Discovery in Mobile Crowdsensing |
17 |
| Secure Cooperative Communications With an Untrusted Relay: A NOMA-Inspired Jamming and Relaying Approach |
17 |
| Image to Video Person Re-Identification by Learning Heterogeneous Dictionary Pair With Feature Projection Matrix |
17 |
| Physical-Layer Security for Proximal Legitimate User and Eavesdropper: A Frequency Diverse Array Beamforming Approach |
16 |
| Deep-PRWIS: Periocular Recognition Without the Iris and Sclera Using Deep Learning Frameworks |
16 |
| Lightweight and Practical Anonymous Authentication Protocol for RFID Systems Using Physically Unclonable Functions |
16 |
| General Framework to Evaluate Unlinkability in Biometric Template Protection Systems |
16 |
| Ranking-Based Locality Sensitive Hashing-Enabled Cancelable Biometrics: Index-of-Max Hashing |
16 |
| Distributed Quickest Detection of Cyber-Attacks in Smart Grid |
16 |
| Lightweight and Privacy-Friendly Spatial Data Aggregation for Secure Power Supply and Demand Management in Smart Grids |
15 |
| Realtime DDoS Defense Using COTS SDN Switches via Adaptive Correlation Analysis |
15 |
| SkyShield: A Sketch-Based Defense System Against Application Layer DDoS Attacks |
15 |
| Constructive Interference Based Secure Precoding: A New Dimension in Physical Layer Security |
14 |
| An Ensemble CNN2ELM for Age Estimation |
14 |
| Secure Transmissions in Wireless Information and Power Transfer Millimeter-Wave Ultra-Dense Networks |
14 |
| Auditable sigma-Time Outsourced Attribute-Based Encryption for Access Control in Cloud Computing |
14 |