2021 VOLUME 16 ITIFA6 Articles published in IEEEXplore® from 16 July 2021 to 15 August 2021 CPA-Secure Privacy-Preserving Reversible Data Hiding for JPEG Images Strong Secrecy of Arbitrarily Varying Multiple Access Channels On the Efficiency of Pairing-Based Authentication for Connected Vehicles: Time is Not on Our Side! Context-Aware Local Information Privacy With Great Dispersion Comes Greater Resilience: Efficient Poisoning Attacks and Defenses for Linear Regression Models SARO: Scalable Attack-Resistant Logic Locking DOReN: Toward Efficient Deep Convolutional Neural Networks with Fully Homomorphic Encryption How to Test the Randomness From the Wireless Channel for Security? A Novel Normalized Variance-Based Differential Power Analysis Against Masking Countermeasures Effect of Correlation Between Information and Energy Links in Secure Wireless Powered Communications Imbalanced Data Problems in Deep Learning-Based Side-Channel Attacks: Analysis and Solution End-to-End Domain Adaptive Attention Network for Cross-Domain Person ReIdentification A Multilevel Coding Scheme for Multi-Valued Physical Unclonable Functions SAIL: Analyzing Structural Artifacts of Logic Locking Using Machine Learning Dynamic Privacy-Aware Collaborative Schemes for Average Computation: A Multi-Time Reporting Case Compcrypt-Lightweight ANS-Based Compression and Encryption EDICS Information for Authors (ISSN 1556-6013) 3647-3661 3662-3677 3678-3693 3694-3708 3709-3723 3724-3739 3740-3752 3753-3766 3767-3779 3780-3789 3790-3802 3803-3813 3814-3827 3828-3842 3843-3858 3859-3873 www.signalprocessingsociety.org [10] SEPTEMBER 2021https://signalprocessingsociety.org/ https://dx.doi.org/10.1109/TIFS.2021.3080497 https://dx.doi.org/10.1109/TIFS.2021.3087338 https://dx.doi.org/10.1109/TIFS.2021.3087359 https://dx.doi.org/10.1109/TIFS.2021.3087359 https://dx.doi.org/10.1109/TIFS.2021.3087359 https://dx.doi.org/10.1109/TIFS.2021.3087350 https://dx.doi.org/10.1109/TIFS.2021.3087332 https://dx.doi.org/10.1109/TIFS.2021.3087332 https://dx.doi.org/10.1109/TIFS.2021.3092135 https://dx.doi.org/10.1109/TIFS.2021.3090959 https://dx.doi.org/10.1109/TIFS.2021.3090959 https://dx.doi.org/10.1109/TIFS.2021.3092051 https://dx.doi.org/10.1109/TIFS.2021.3093783 https://dx.doi.org/10.1109/TIFS.2021.3093783 https://dx.doi.org/10.1109/TIFS.2021.3090937 https://dx.doi.org/10.1109/TIFS.2021.3090937 https://dx.doi.org/10.1109/TIFS.2021.3092050 https://dx.doi.org/10.1109/TIFS.2021.3092050 https://dx.doi.org/10.1109/TIFS.2021.3088012 https://dx.doi.org/10.1109/TIFS.2021.3088012 https://dx.doi.org/10.1109/TIFS.2021.3089883 https://dx.doi.org/10.1109/TIFS.2021.3096028 https://dx.doi.org/10.1109/TIFS.2021.3096121 https://dx.doi.org/10.1109/TIFS.2021.3096121 https://dx.doi.org/10.1109/TIFS.2021.3096026 https://www.signalprocessingsociety.org/publications-resources/ieee-transactions-information-forensics-and-security/edics https://www.signalprocessingsociety.org/publications-resources/information-authors http://www.signalprocessingsociety.org