2021 VOLUME 16 ITIFA6 (ISSN 1556-6013) Articles published in IEEEXplore® from 16 June 2021 to 15 July 2021 Secure Automatic Speaker Verification (SASV) System Through sm-ALTP Features and Asymmetric Bagging Conditional Variational Auto-Encoder and Extreme Value Theory Aided Two-Stage Learning Approach for Intelligent Fine-Grained Known/Unknown Intrusion Detection Botnet Identification in DDoS Attacks With Multiple Emulation Dictionaries Rebuttal to " Comments on Random Distance Method Generating Unimodal and Multimodal Cancelable Biometric Features " Practical Threshold Multi-Factor Authentication MBTree: Detecting Encryption RATs Communication Using Malicious Behavior Tree Adversarial Kendall's Model Towards Containment of Distributed Cyber-Threats A Practical Black-Box Attack on Source Code Authorship Identification Classifiers CASIA-Face-Africa: A Large-Scale African Face Image Database EDICS Information for Authors 3524-3537 3538-3553 3554-3569 3570-3572 3573-3588 3589-3603 3604-3619 3620-3633 3634-3646 www.signalprocessingsociety.org [6] JUNE 2021https://signalprocessingsociety.org/ https://dx.doi.org/10.1109/TIFS.2021.3082303 https://dx.doi.org/10.1109/TIFS.2021.3082303 https://dx.doi.org/10.1109/TIFS.2021.3083422 https://dx.doi.org/10.1109/TIFS.2021.3083422 https://dx.doi.org/10.1109/TIFS.2021.3082290 https://dx.doi.org/10.1109/TIFS.2021.3081264 https://dx.doi.org/10.1109/TIFS.2021.3081264 https://dx.doi.org/10.1109/TIFS.2021.3081264 https://dx.doi.org/10.1109/TIFS.2021.3081263 https://dx.doi.org/10.1109/TIFS.2021.3071595 https://dx.doi.org/10.1109/TIFS.2021.3082327 https://dx.doi.org/10.1109/TIFS.2021.3080507 https://dx.doi.org/10.1109/TIFS.2021.3080496 https://www.signalprocessingsociety.org/publications-resources/ieee-transactions-information-forensics-and-security/edics https://www.signalprocessingsociety.org/publications-resources/information-authors http://www.signalprocessingsociety.org