Finite Blocklength Analysis of Gaussian Random Coding in AWGN Channels Under Covert Constraint Stealthy MTD Against Unsupervised Learning-Based Blind FDI Attacks in Power Systems Latent Dirichlet Allocation Model Training With Differential Privacy Deep Hashing for Secure Multimodal Biometrics Physical-Layer Secret Key Generation via CQI-Mapped Spatial Modulation in Multi-Hop Wiretap Ad-Hoc Networks EDICS Information for Authors www.signalprocessingsociety.org 13 DECEMBER 2020 1261-1274 1275-1287 1290-1305 1306-1321 1322-1334https://dx.doi.org/10.1109/TIFS.2020.3032292 https://dx.doi.org/10.1109/TIFS.2020.3032292 https://dx.doi.org/10.1109/TIFS.2020.3027148 https://dx.doi.org/10.1109/TIFS.2020.3027148 https://dx.doi.org/10.1109/TIFS.2020.3032021 https://dx.doi.org/10.1109/TIFS.2020.3033189 https://dx.doi.org/10.1109/TIFS.2020.3023793 https://dx.doi.org/10.1109/TIFS.2020.3023793 https://www.signalprocessingsociety.org/publications-resources/ieee-signal-processing-letters/edics https://www.signalprocessingsociety.org/publications-resources/ieee-signal-processing-letters/information-authors-spl http://www.signalprocessingsociety.org