2020 VOLUME 16 ITIFA6 (ISSN 1556-6013) Articles published in IEEEXplore® from 16 September to 15 October2020 Walking on the Edge: Fast, Low-Distortion Adversarial Examples 701-713 Nowhere to Hide: Efficiently Identifying Probabilistic Cloning Attacks in Large-Scale RFID Visible-Infrared Person Re-Identification via Homogeneous Augmented Tri-Modal Glyph: Efficient ML-Based Detection of Heap Spraying Attacks 740-755 Side-Channel Attacks With Multi-Thread Mixed Leakage 770-785 A Quadruplet Loss for Enforcing Semantically Coherent Embeddings in Multi-Output Explicit Optimization of min max Steganographic Game 800-811 812-823 When Automatic Voice Disguise Meets Automatic Speaker Verification Can We Trust Your Explanations? Sanity Checks for Interpreters in Android Malware 824-837 Periocular-Assisted Multi-Feature Collaboration for Dynamic Iris Recognition 866-879 Towards Query-Efficient Adversarial Attacks Against Automatic Speech Recognition Semi-Supervised Face Frontalization in the Wild www.signalprocessingsociety.org 13 NOVEMBER 2020 838-853 896-908 909-922http://www.signalprocessingsociety.org https://dx.doi.org/10.1109/TIFS.2020.3021899 https://dx.doi.org/10.1109/TIFS.2020.3023785 https://dx.doi.org/10.1109/TIFS.2020.3001665 https://dx.doi.org/10.1109/TIFS.2020.3017925 https://dx.doi.org/10.1109/TIFS.2020.3023278 https://dx.doi.org/10.1109/TIFS.2020.3023304 https://dx.doi.org/10.1109/TIFS.2020.3021913 https://dx.doi.org/10.1109/TIFS.2020.3023818 https://dx.doi.org/10.1109/TIFS.2020.3021924 https://dx.doi.org/10.1109/TIFS.2020.3023289 https://dx.doi.org/10.1109/TIFS.2020.3026543 https://dx.doi.org/10.1109/TIFS.2020.3025412 http://www.signalprocessingsociety.org