Android User Privacy Preserving Through Crowdsourcing http://dx.doi.org/10.1109/TIFS.2018.2767019 ...................................... ...................................................................... B. Rashidi, C. Fung, A. Nguyen, T. Vu, and E. Bertino Network Traffic Fingerprinting Based on Approximated Kernel Two-Sample Test http://dx.doi.org/10.1109/TIFS.2018.2768018 .......... ........................................................................................................... J. Kohout and T. PevnĂ˝ Secret Key Establishment via RSS Trajectory Matching Between Wearable Devices http://dx.doi.org/10.1109/TIFS.2018.2768020 ........ ............................................................................... Z. Li, Q. Pei, I. Markwood, Y. Liu, and H. Zhu www.signalprocessingsociety.org [21] MARCH 2018 773 788 802http://dx.doi.org/10.1109/TIFS.2018.2767019 http://dx.doi.org/10.1109/TIFS.2018.2768018 http://dx.doi.org/10.1109/TIFS.2018.2768020 http://www.signalprocessingsociety.org