Browse by Journal
![]() | Up a level |
Chu, Zheng and Hao, Wanming and Xiao, Pei and Mi, De and Liu, Zilong and Khalily, Mohsen and Kelly, James R and Feresidis, Alexandros P (2020) Secrecy Rate Optimization for Intelligent Reflecting Surface Assisted MIMO System. IEEE Transactions on Information Forensics and Security, 16. pp. 1655-1669. DOI https://doi.org/10.1109/tifs.2020.3038994
Rassouli, Borzoo and Gunduz, Deniz (2020) Optimal Utility-Privacy Trade-off with Total Variation Distance as a Privacy Measure. IEEE Transactions on Information Forensics and Security, 15. pp. 594-603. DOI https://doi.org/10.1109/tifs.2019.2903658
Belmega, E Veronica and Chorti, Arsenia (2017) Protecting Secret Key Generation Systems Against Jamming: Energy Harvesting and Channel Hopping Approaches. IEEE Transactions on Information Forensics and Security, 12 (11). pp. 2611-2626. DOI https://doi.org/10.1109/TIFS.2017.2713342
Karpuk, David A and Chorti, Arsenia (2016) Perfect Secrecy in Physical-Layer Network Coding Systems From Structured Interference. IEEE Transactions on Information Forensics and Security, 11 (8). pp. 1875-1887. DOI https://doi.org/10.1109/TIFS.2016.2563165
Kalantari, Ashkan and Gan Zheng and Zhen Gao and Zhu Han and Ottersten, Bjorn (2015) Secrecy Analysis on Network Coding in Bidirectional Multibeam Satellite Communications. IEEE Transactions on Information Forensics and Security, 10 (9). pp. 1862-1874. DOI https://doi.org/10.1109/tifs.2015.2432732
Zhai, Xiaojun and Appiah, Kofi and Ehsan, Shoaib and Howells, Gareth and Hu, Huosheng and Gu, Dongbing and McDonald-Maier, Klaus D (2015) A Method for Detecting Abnormal Program Behavior on Embedded Devices. IEEE Transactions on Information Forensics and Security, 10 (8). pp. 1692-1704. DOI https://doi.org/10.1109/tifs.2015.2422674