2020 VOLUME 16 ITIFA6 (ISSN 1556-6013) Articles published in IEEEXplore® from 16 October to 15 November Jamming Resilient Tracking Using POMDP-Based Detection of Hidden Targets 983-998 PUF Protected Variables: A Solution to RFID Security and Privacy Under Corruption With Temporary State Disclosure Multi-Level Reversible Data Anonymization via Compressive Sensing and Data Hiding 999-1013 1014-1028 Flow Misleading: Worm-Hole Attack in Software-Defined Networking via Building In-Band Covert Channel Semi-Supervised Natural Face De-Occlusion 1029-1043 1044-1057 : Fully Automated and Exhaustive Fault Simulation on ARM-M Binaries The Best Defense Is a Good Offense: Adversarial Attacks to Avoid Modulation Detection 1058-1073 1074-1087 Personal Privacy Protection via Irrelevant Faces Tracking and Pixelation in Video Live Streaming Covert Wireless Communications Under Quasi-Static Fading With Channel Uncertainty 1088-1103 1104-1116 Non-Additive Cost Functions for JPEG Steganography Based on Block Boundary Maintenance Insider Threat Modeling: An Adversarial Risk Analysis Approach 1117-1130 1131-1142 Look Locally Infer Globally: A Generalizable Face Anti-Spoofing Approach Deep Feature Collaboration for Challenging 3D Finger Knuckle Identification 1143-1157 1158-1173 Multi-Entity and Multi-Enrollment Key Agreement With Correlated Noise Smart Evolution for Information Diffusion Over Social Networks 1190-1202 1203-1217 Multi-Scale Gradients Self-Attention Residual Learning for Face Photo-Sketch Transformation Latent Fingerprint Registration via Matching Densely Sampled Points 1218-1230 1231-1244 APGS: An Efficient Source-Accountable and Metadata-Private Protocol in the Network Layer 1245-1260 www.signalprocessingsociety.org 12 DECEMBER 2020https://signalprocessingsociety.org/ https://dx.doi.org/10.1109/TIFS.2020.3027145 https://dx.doi.org/10.1109/TIFS.2020.3027147 https://dx.doi.org/10.1109/TIFS.2020.3027147 https://dx.doi.org/10.1109/TIFS.2020.3026467 https://dx.doi.org/10.1109/TIFS.2020.3013093 https://dx.doi.org/10.1109/TIFS.2020.3013093 https://dx.doi.org/10.1109/TIFS.2020.3023793 https://dx.doi.org/10.1109/TIFS.2020.3027143 https://dx.doi.org/10.1109/TIFS.2020.3031386 https://dx.doi.org/10.1109/TIFS.2020.3029913 https://dx.doi.org/10.1109/TIFS.2020.3029913 https://dx.doi.org/10.1109/TIFS.2020.3029902 https://dx.doi.org/10.1109/TIFS.2020.3029908 https://dx.doi.org/10.1109/TIFS.2020.3029908 https://dx.doi.org/10.1109/TIFS.2020.3029898 https://dx.doi.org/10.1109/TIFS.2020.3029879 https://dx.doi.org/10.1109/TIFS.2020.3029906 https://dx.doi.org/10.1109/TIFS.2020.3029885 https://dx.doi.org/10.1109/TIFS.2020.3033189 https://dx.doi.org/10.1109/TIFS.2020.3031386 https://dx.doi.org/10.1109/TIFS.2020.3031386 https://dx.doi.org/10.1109/TIFS.2020.3032041 https://dx.doi.org/10.1109/TIFS.2020.3032294 https://dx.doi.org/10.1109/TIFS.2020.3032294 http://www.signalprocessingsociety.org