Vyzkoušejte nový nástroj s podporou AI
Summon Research Assistant
BETA
Loading…
Loading…
Q-Learning-Based Vulnerability Analysis of Smart Grid Against Sequential Topology Attacks
Yan, Jun, He, Haibo, Zhong, Xiangnan, Tang, Yufei
Published in IEEE transactions on information forensics and security (01.01.2017)
Published in IEEE transactions on information forensics and security (01.01.2017)
Get full text
Journal Article
Loading…
PUF Modeling Attacks on Simulated and Silicon Data
Ruhrmair, Ulrich, Solter, Jan, Sehnke, Frank, Xiaolin Xu, Mahmoud, Ahmed, Stoyanova, Vera, Dror, Gideon, Schmidhuber, Jurgen, Burleson, Wayne, Devadas, Srinivas
Published in IEEE transactions on information forensics and security (01.11.2013)
Published in IEEE transactions on information forensics and security (01.11.2013)
Get full text
Journal Article
Loading…
An End-to-End Dense-InceptionNet for Image Copy-Move Forgery Detection
Zhong, Jun-Liu, Pun, Chi-Man
Published in IEEE transactions on information forensics and security (2020)
Published in IEEE transactions on information forensics and security (2020)
Get full text
Journal Article
Loading…
Ensemble Classifiers for Steganalysis of Digital Media
Kodovsky, Jan, Fridrich, J., Holub, V.
Published in IEEE transactions on information forensics and security (01.04.2012)
Published in IEEE transactions on information forensics and security (01.04.2012)
Get full text
Journal Article
Loading…
Loading…
Loading…
Loading…
Loading…
Loading…
Loading…
Efficient Dense-Field Copy-Move Forgery Detection
Cozzolino, Davide, Poggi, Giovanni, Verdoliva, Luisa
Published in IEEE transactions on information forensics and security (01.11.2015)
Published in IEEE transactions on information forensics and security (01.11.2015)
Get full text
Journal Article
Loading…
Loading…
Secure Key Agreement and Key Protection for Mobile Device User Authentication
Libing Wu, Jing Wang, Choo, Kim-Kwang Raymond, Debiao He
Published in IEEE transactions on information forensics and security (01.02.2019)
Published in IEEE transactions on information forensics and security (01.02.2019)
Get full text
Journal Article
Loading…
Secure Full Duplex Integrated Sensing and Communications
Bazzi, Ahmad, Chafii, Marwa
Published in IEEE transactions on information forensics and security (2024)
Published in IEEE transactions on information forensics and security (2024)
Get full text
Journal Article
Loading…
Loading…
Dual-Server Public-Key Encryption With Keyword Search for Secure Cloud Storage
Chen, Rongmao, Mu, Yi, Yang, Guomin, Guo, Fuchun, Wang, Xiaofen
Published in IEEE transactions on information forensics and security (01.04.2016)
Published in IEEE transactions on information forensics and security (01.04.2016)
Get full text
Journal Article
Loading…
Dynamic Differential Privacy for ADMM-Based Distributed Classification Learning
Zhang, Tao, Zhu, Quanyan
Published in IEEE transactions on information forensics and security (01.01.2017)
Published in IEEE transactions on information forensics and security (01.01.2017)
Get full text
Journal Article
Loading…
A Secure Mobile Crowdsensing Game With Deep Reinforcement Learning
Xiao, Liang, Li, Yanda, Han, Guoan, Dai, Huaiyu, Poor, H. Vincent
Published in IEEE transactions on information forensics and security (01.01.2018)
Published in IEEE transactions on information forensics and security (01.01.2018)
Get full text
Journal Article