Secure and Energy-Efficient Precoding for MIMO Two-Way Untrusted Relay Systems An Exploit Kits Detection Approach Based on HTTP Message Graph Secure Transmission in Multiple Access Wiretap Channel: Cooperative Jamming Without Sharing CSI De-Pois: An Attack-Agnostic Defense against Data Poisoning Attacks Machine Learning in Wavelet Domain for Electromagnetic Emission Based Malware Analysis Beyond Universal Person Re-Identification Attack Corrections to " Hardware-Assisted Transparent Tracing and Debugging on ARM " DFraud³: Multi-Component Fraud Detection Free of Cold-Start Functionality-Preserving Black-Box Optimization of Adversarial Windows Malware Physical Layer Security Enhancement With Reconfigurable Intelligent Surface-Aided Networks Generalized Likelihood Ratio Test for GNSS Spoofing Detection in Devices With IMU Privacy-Preserving Identification Systems With Noisy Enrollment EDICS Information for Authors 3371-3386 3387-3400 3401-3411 3412-3425 3426-3441 3442-3455 3479 3456-3468 3469-3478 3480-3495 3496-3509 3510-3523 www.signalprocessingsociety.org [9] JUNE 2021https://dx.doi.org/10.1109/TIFS.2021.3080088 https://dx.doi.org/10.1109/TIFS.2021.3080082 https://dx.doi.org/10.1109/TIFS.2021.3080499 https://dx.doi.org/10.1109/TIFS.2021.3080499 https://dx.doi.org/10.1109/TIFS.2021.3080522 https://dx.doi.org/10.1109/TIFS.2021.3080510 https://dx.doi.org/10.1109/TIFS.2021.3080510 https://dx.doi.org/10.1109/TIFS.2021.3081247 https://dx.doi.org/10.1109/TIFS.2021.3083357 https://dx.doi.org/10.1109/TIFS.2021.3081258 https://dx.doi.org/10.1109/TIFS.2021.3082330 https://dx.doi.org/10.1109/TIFS.2021.3083409 https://dx.doi.org/10.1109/TIFS.2021.3083409 https://dx.doi.org/10.1109/TIFS.2021.3083414 https://dx.doi.org/10.1109/TIFS.2021.3078297 https://www.signalprocessingsociety.org/publications-resources/ieee-transactions-information-forensics-and-security/edics https://www.signalprocessingsociety.org/publications-resources/information-authors http://www.signalprocessingsociety.org