Detection of Message Injection Attacks Onto the CAN Bus Using Similarities of Successive Messages-Sequence Graphs Privacy-Enhancing Face Biometrics: A Comprehensive Survey Inverting Binarizations of Facial Templates Produced by Deep Learning (and Its Implications) Deep Collaborative Multi-Modal Learning for Unsupervised Kinship Estimation DeepSBD: A Deep Neural Network Model With Attention Mechanism for SocialBot Detection Statistical Fault Analysis of the Simeck Lightweight Cipher in the Ubiquitous Sensor Networks MTD-Net: Learning to Detect Deepfakes Images by Multi-Scale Texture Difference Security Analysis of a Path Validation Scheme With Constant-Size Proof TDOA Source-Localization Technique Robust to Time-Synchronization Attacks Exploiting Channel Gain and Phase Noise for PHY-Layer Authentication in Massive MIMO Systems CRSA: A Cryptocurrency Recovery Scheme Based on Hidden Assistance Relationships MCTSteg: A Monte Carlo Tree Search-Based Reinforcement Learning Framework for Universal Non-Additive Steganography DOMREP-An Orthogonal Countermeasure for Arbitrary Order Side-Channel and Fault Attack Protection Morphing Attack Detection-Database, Evaluation Platform, and Benchmarking A Random-Weight Privacy-Preserving Algorithm With Error Compensation for Microgrid Distributed Energy Management TRACE: Enterprise-Wide Provenance Tracking for Real-Time APT Detection Stealing Neural Network Structure Through Remote FPGA Side-Channel Analysis Efficient Sorting of Homomorphic Encrypted Data With -Way Sorting Network A Transfer Learning Approach for Securing Resource-Constrained IoT Devices Unsupervised and Self-Adaptative Techniques for Cross-Domain Person ReIdentification A Generalizable Model-and-Data Driven Approach for Open-Set RFF Authentication Neyman's Smoothness Test: A Trade-Off Between Moment-Based and Distribution- Based Leakage Detections -Time Modifiable and Epoch-Based Redactable Blockchain Odyssey: Creation, Analysis and Detection of Trojan Models DSA-Face: Diverse and Sparse Attentions for Face Recognition Robust to Pose Variation and Occlusion Sparse Trust Data Mining EDICS Information for Authors 4133-4146 4147-4183 4184-4196 4197-4210 4211-4223 4224-4233 4234-4245 4246-4248 4249-4264 4265-4279 4291-4305 4306-4320 4321-4335 4336-4351 4352-4362 4363-4376 4377-4388 4389-4404 4405-4418 4419-4434 4435-4450 4494-4506 4507-4520 4521-4533 4534-4543 4559-4573 www.signalprocessingsociety.org [10] OCTOBER 2021https://dx.doi.org/10.1109/TIFS.2021.3098162 https://dx.doi.org/10.1109/TIFS.2021.3098162 https://dx.doi.org/10.1109/TIFS.2021.3096024 https://dx.doi.org/10.1109/TIFS.2021.3103056 https://dx.doi.org/10.1109/TIFS.2021.3103056 https://dx.doi.org/10.1109/TIFS.2021.3098165 https://dx.doi.org/10.1109/TIFS.2021.3102498 https://dx.doi.org/10.1109/TIFS.2021.3102498 https://dx.doi.org/10.1109/TIFS.2021.3102485 https://dx.doi.org/10.1109/TIFS.2021.3102485 https://dx.doi.org/10.1109/TIFS.2021.3102487 https://dx.doi.org/10.1109/TIFS.2021.3101043 https://dx.doi.org/10.1109/TIFS.2020.3001741 https://dx.doi.org/10.1109/TIFS.2020.3029894 https://dx.doi.org/10.1109/TIFS.2020.3029894 https://dx.doi.org/10.1109/TIFS.2021.3104142 https://dx.doi.org/10.1109/TIFS.2021.3104140 https://dx.doi.org/10.1109/TIFS.2021.3104140 https://dx.doi.org/10.1109/TIFS.2021.3089875 https://dx.doi.org/10.1109/TIFS.2021.3089875 https://dx.doi.org/10.1109/TIFS.2020.3035252 https://dx.doi.org/10.1109/TIFS.2021.3106161 https://dx.doi.org/10.1109/TIFS.2021.3106161 https://dx.doi.org/10.1109/TIFS.2021.3098977 https://dx.doi.org/10.1109/TIFS.2021.3106169 https://dx.doi.org/10.1109/TIFS.2021.3106167 https://dx.doi.org/10.1109/TIFS.2021.3106167 https://dx.doi.org/10.1109/TIFS.2021.3107157 https://dx.doi.org/10.1109/TIFS.2021.3107157 https://dx.doi.org/10.1109/TIFS.2021.3106166 https://dx.doi.org/10.1109/TIFS.2021.3108570 https://dx.doi.org/10.1109/TIFS.2021.3108570 https://dx.doi.org/10.1109/TIFS.2021.3108570 https://dx.doi.org/10.1109/TIFS.2021.3107146 https://dx.doi.org/10.1109/TIFS.2021.3108407 https://dx.doi.org/10.1109/TIFS.2021.3109463 https://dx.doi.org/10.1109/TIFS.2021.3109463 https://dx.doi.org/10.1109/TIFS.2021.3109412 https://www.signalprocessingsociety.org/publications-resources/ieee-transactions-information-forensics-and-security/edics https://www.signalprocessingsociety.org/publications-resources/information-authors http://www.signalprocessingsociety.org