NoLeaks: Differentially Private Causal Discovery Under Functional Causal Model An Explainable AI-Based Intrusion Detection System for DNS Over HTTPS (DoH) Attacks 2324-2338 Component-Based Attention for Large-Scale Trademark Retrieval Mutual Adversarial Training: Learning Together is Better Than Going Alone Efficient Privacy-Preserving Forensic Method for Camera Model Identification Offset-Symmetric Gaussians for Differential Privacy A Practical Deceptive Jamming Method Based on Vulnerable Location Awareness Adversarial Attack for Radar HRRP Target Recognition LiSiam: Localization Invariance Siamese Network for Deepfake Detection Minipatch: Undermining DNN-Based Website Fingerprinting With Adversarial Patches Fine-Grained Question-Level Deception Detection via Graph-Based Learning and Cross-Modal Fusion Guided Erasable Adversarial Attack (GEAA) Toward Shared Data Protection LaF: Lattice-Based and Communication-Efficient Federated Learning Computational Sensor Fingerprints -Means Clustering With Local -Privacy for Privacy-Preserving Data Analysis Toward Privacy-Preserving Aggregate Reverse Skyline Query With Strong Security EDICS Information for Authors 2339-2349 2350-2363 2364-2377 2378-2393 2394-2409 2410-2424 2425-2436 2437-2451 2452-2467 2468-2482 2483-2496 2508-2523 2524-2537 2538-2552 www.signalprocessingsociety.org [24] AUGUST 2022https://dx.doi.org/10.1109/TIFS.2022.3184263 https://dx.doi.org/10.1109/TIFS.2022.3183390 https://dx.doi.org/10.1109/TIFS.2019.2959921 https://dx.doi.org/10.1109/TIFS.2022.3184262 https://dx.doi.org/10.1109/TIFS.2022.3185769 https://dx.doi.org/10.1109/TIFS.2022.3185770 https://dx.doi.org/10.1109/TIFS.2022.3170275 https://dx.doi.org/10.1109/TIFS.2022.3170275 https://dx.doi.org/10.1109/TIFS.2022.3186803 https://dx.doi.org/10.1109/TIFS.2022.3186743 https://dx.doi.org/10.1109/TIFS.2022.3186799 https://dx.doi.org/10.1109/TIFS.2022.3186799 https://dx.doi.org/10.1109/TIFS.2022.3186791 https://dx.doi.org/10.1109/TIFS.2022.3186739 https://dx.doi.org/10.1109/TIFS.2022.3179945 https://dx.doi.org/10.1109/TIFS.2022.3189532 https://dx.doi.org/10.1109/TIFS.2022.3188147 https://signalprocessingsociety.org/publications-resources/ieee-transactions-information-forensics-and-security/edics https://signalprocessingsociety.org/publications-resources/information-authors http://www.signalprocessingsociety.org