Secrecy Performance Analysis of Wireless Communications in the Presence of UAV Jammer and Randomly Located UAV Eavesdroppers ...................................................................... J. Tang, G. Chen, and J. P. Coon Secrecy Amplification of Distributed Encrypted Sources With Correlated Keys Using Post-EncryptionCompression ....................................................................................... B. Santoso and Y. Oohama A Synergistic Concealed Information Test With Novel Approach for EEG Channel Selection and SVM Parameter Optimization ............................................ A. Bablani, D. R. Edla, D. Tripathi, S. Dodia, and S. Chintala Provable Order Amplification for Code-Based Masking: How to Avoid Non-Linear Leakages Due to Masked Operations .............................................................................. W. Wang, Y. Yu, and F.-X. Standaert 3026 3042 3057 3069 Edics ............................................................................................................................................. Information for Authors ....................................................................................................................... www.signalprocessingsociety.org [13] DECEMBER 2019http://dx.doi.org/10.1109/TIFS.2019.2912074 http://dx.doi.org/10.1109/TIFS.2019.2912074 http://dx.doi.org/10.1109/TIFS.2019.2907464 http://dx.doi.org/10.1109/TIFS.2019.2907464 http://dx.doi.org/10.1109/TIFS.2019.2913798 http://dx.doi.org/10.1109/TIFS.2019.2913798 http://dx.doi.org/10.1109/TIFS.2019.2912549 http://dx.doi.org/10.1109/TIFS.2019.2912549 https://www.signalprocessingsociety.org/publications-resources/ieee-transactions-information-forensics-and-security/edics https://www.signalprocessingsociety.org/publications-resources/information-authors http://www.signalprocessingsociety.org