Browse by Journal
![]() | Up a level |
Xiao, Qingjiang and Li, Guyue and Liu, Zilong and Hu, Aiqun (2025) Optimal Subcarrier Allocation Scheme for Physical-Layer Key Generation in an OFDMA Network. IEEE Transactions on Information Forensics and Security, 20. pp. 4929-4942. DOI https://doi.org/10.1109/tifs.2025.3566242
Shao, Xinghan and Chang, C and Gan, John Q and Wang, Haixian (2025) An interpretable contrastive learning transformer for EEG-based person identification. IEEE Transactions on Information Forensics and Security, 20. pp. 5069-5082. DOI https://doi.org/10.1109/tifs.2025.3570183
Chu, Zheng and Hao, Wanming and Xiao, Pei and Mi, De and Liu, Zilong and Khalily, Mohsen and Kelly, James R and Feresidis, Alexandros P (2020) Secrecy Rate Optimization for Intelligent Reflecting Surface Assisted MIMO System. IEEE Transactions on Information Forensics and Security, 16. pp. 1655-1669. DOI https://doi.org/10.1109/tifs.2020.3038994
Rassouli, Borzoo and Gunduz, Deniz (2020) Optimal Utility-Privacy Trade-off with Total Variation Distance as a Privacy Measure. IEEE Transactions on Information Forensics and Security, 15. pp. 594-603. DOI https://doi.org/10.1109/tifs.2019.2903658
Belmega, E Veronica and Chorti, Arsenia (2017) Protecting Secret Key Generation Systems Against Jamming: Energy Harvesting and Channel Hopping Approaches. IEEE Transactions on Information Forensics and Security, 12 (11). pp. 2611-2626. DOI https://doi.org/10.1109/TIFS.2017.2713342
Karpuk, David A and Chorti, Arsenia (2016) Perfect Secrecy in Physical-Layer Network Coding Systems From Structured Interference. IEEE Transactions on Information Forensics and Security, 11 (8). pp. 1875-1887. DOI https://doi.org/10.1109/TIFS.2016.2563165
Kalantari, Ashkan and Gan Zheng and Zhen Gao and Zhu Han and Ottersten, Bjorn (2015) Secrecy Analysis on Network Coding in Bidirectional Multibeam Satellite Communications. IEEE Transactions on Information Forensics and Security, 10 (9). pp. 1862-1874. DOI https://doi.org/10.1109/tifs.2015.2432732
Zhai, Xiaojun and Appiah, Kofi and Ehsan, Shoaib and Howells, Gareth and Hu, Huosheng and Gu, Dongbing and McDonald-Maier, Klaus D (2015) A Method for Detecting Abnormal Program Behavior on Embedded Devices. IEEE Transactions on Information Forensics and Security, 10 (8). pp. 1692-1704. DOI https://doi.org/10.1109/tifs.2015.2422674