2021 VOLUME 16/17 ITIFA6 Articles published in IEEEXplore® from 16 December 2021 to 15 January 2022 Practical Multi-Party Private Set Intersection Protocols Privacy-Preserving Object Detection for Medical Images With Faster R-CNN Role of Shared Key for Secure Communication Over 2-User Gaussian Z-Interference Channel Secure Millimeter-Wave Ad Hoc Communications Using Physical Layer Security Person Re-Identification by Context-Aware Part Attention and Multi-Head Collaborative Learning Gendered Differences in Face Recognition Accuracy Explained by Hairstyles, Makeup, and Facial Morphology Dual-Branch Meta-Learning Network With Distribution Alignment for Face Anti-Spoofing Differential Privacy for Tensor-Valued Queries Data Disclosure With Non-Zero Leakage and Non-Invertible Leakage Matrix Fundamental Limits-Achieving Polar Code Designs for Biometric Identification and Authentication C2CL: Contact to Contactless Fingerprint Matching On Maximizing the Sum Secret Key Rate for Reconfigurable Intelligent Surface-Assisted Multiuser Systems High Resolution Fingerprint Retrieval Based on Pore Indexing and Graph Comparison Leia: A Lightweight Cryptographic Neural Network Inference System at the Edge Robust Secure Beamforming for Intelligent Reflecting Surface Assisted Full-Duplex MISO Systems Privacy-Preserved Distributed Learning With Zeroth-Order Optimization ScoreGAN: A Fraud Review Detector Based on Regulated GAN With Data Augmentation Privacy-Preserving Boosting in the Local Setting EDICS Information for Authors (ISSN 1556-6013) 1-15 69-84 85-98 99-114 115-126 127-137 138-151 152-164 165-179 180-195 196-210 211-225 226-236 237-252 253-264 265-279 280-291 4451-4465 www.signalprocessingsociety.org [8] FEBRUARY 2022https://signalprocessingsociety.org/ https://dx.doi.org/10.1109/TIFS.2021.3118879 https://dx.doi.org/10.1109/TIFS.2019.2946476 https://dx.doi.org/10.1109/TIFS.2021.3132234 https://dx.doi.org/10.1109/TIFS.2021.3054507 https://dx.doi.org/10.1109/TIFS.2021.3075894 https://dx.doi.org/10.1109/TIFS.2021.3135750 https://dx.doi.org/10.1109/TIFS.2021.3135750 https://dx.doi.org/10.1109/TIFS.2021.3134869 https://dx.doi.org/10.1109/TIFS.2021.3089884 https://dx.doi.org/10.1109/TIFS.2021.3137755 https://dx.doi.org/10.1109/TIFS.2021.3137749 https://dx.doi.org/10.1109/TIFS.2021.3137749 https://dx.doi.org/10.1109/TIFS.2021.3134867 https://dx.doi.org/10.1109/TIFS.2021.3138612 https://dx.doi.org/10.1109/TIFS.2021.3138612 https://dx.doi.org/10.1109/TIFS.2021.3139219 https://dx.doi.org/10.1109/TIFS.2021.3138611 https://dx.doi.org/10.1109/TIFS.2021.3137754 https://dx.doi.org/10.1109/TIFS.2021.3139267 https://dx.doi.org/10.1109/TIFS.2021.3139771 https://dx.doi.org/10.1109/TIFS.2021.3097822 https://www.signalprocessingsociety.org/publications-resources/ieee-transactions-information-forensics-and-security/edics https://www.signalprocessingsociety.org/publications-resources/information-authors http://www.signalprocessingsociety.org