2022/9/28

Time-Division is Optimal for Covert Communication Over Some Broadcast Channels…. VYF Tan and S.-H. Lee 1377

S Belikovetsky, YA Solewicz, M Yampolskiy, J Toh, Y Elovici, A Shah, R Ganesan, S Jajodia, H Cam, J Shey, JA Blanco, O Walker, TW Tedesso, HT Ngo, R Rakvic, KD Fairbanks

Table of contents Page 1 MAY 2019 VOLUME 14 NUMBER 5 ITIFA6 (ISSN 1556-6013)
REGULAR PAPERS Anonymization and Data Privacy Encryption-Free Framework of
Privacy-Preserving Image Recognition for Photo-Based Information Services ……… ………………………………………………………………………….
K. Nakamura, N. Nitta, and N. Babaguchi 1264 Attacker Location Evaluation-Based Fake
Source Scheduling for Source Location Privacy in Cyber-Physical Systems ……………………………………………………………………
Z. Hong, R. Wang, S. Ji, and R. Beyah 1337 Biometrics Finger Vein Code: From Indexing to
Matching ………………. L. Yang, G. Yang, X. Xi, K. Su, Q. Chen, and Y. Yin 1210 Face-Based
Multiple User Active Authentication on Mobile Devices ……………………. P. Perera and VM
Patel 1240 Cancelable Biometric Recognition With ECGs: Subspace-Based Approaches ………………………………………..
…………………………………………..…