Pseudo-Label Noise Prevention, Suppression and Softening for Unsupervised Person ReIdentification Comprehensive Study in Open-Set Iris Presentation Attack Detection Joint Precoding and Phase Shift Design in Reconfigurable Intelligent Surfaces-Assisted Secret Key Generation The Art of Defense: Letting Networks Fool the Attacker Survivability Analysis of IoT Systems Under Resource Exhausting Attacks SAFELearning: Secure Aggregation in Federated Learning With Backdoor Detectability Generalized LRS Estimator for Min-Entropy Estimation Secret Key Generation From Route Propagation Delays for Underwater Acoustic Networks A Reversible Framework for Efficient and Secure Visual Privacy Protection Measures and Optimization for Robustness and Vulnerability in Disconnected Networks Multi-Domain Virtual Network Embedding Algorithm Based on Horizontal Federated Learning PLCPrint: Fingerprinting Memory Attacks in Programmable Logic Controllers Joint Holistic and Masked Face Recognition Cross-Chain Virtual Payment Channels Efficient and Privacy-Preserving Arbitrary Polygon Range Query Scheme Over Dynamic and TimeSeries Location Data Secure Model-Contrastive Federated Learning With Improved Compressive Sensing Distributed Detection Over Blockchain-Aided Internet of Things in the Presence of Attacks Prototype-Guided Autoencoder for OCT-Based Fingerprint Presentation Attack Detection EDICS Information for Authors 3222-3237 3238-3250 3251-3266 3267-3276 3277-3288 3289-3304 3305-3317 3318-3333 3334-3349 3350-3362 3363-3375 3376-3387 3388-3400 3401-3413 3414-3429 3430-3444 3445-3460 3461-3475 www.signalprocessingsociety.org [20] JULY 2023https://dx.doi.org/10.1109/TIFS.2023.3277694 https://dx.doi.org/10.1109/TIFS.2023.3277694 https://dx.doi.org/10.1109/TIFS.2023.3274477 https://dx.doi.org/10.1109/TIFS.2023.3268881 https://dx.doi.org/10.1109/TIFS.2023.3268881 https://dx.doi.org/10.1109/TIFS.2023.3278458 https://dx.doi.org/10.1109/TIFS.2023.3278449 https://dx.doi.org/10.1109/TIFS.2023.3280032 https://dx.doi.org/10.1109/TIFS.2023.3280745 https://dx.doi.org/10.1109/TIFS.2023.3280040 https://dx.doi.org/10.1109/TIFS.2023.3280341 https://dx.doi.org/10.1109/TIFS.2023.3279979 https://dx.doi.org/10.1109/TIFS.2023.3279587 https://dx.doi.org/10.1109/TIFS.2023.3277688 https://dx.doi.org/10.1109/TIFS.2023.3280717 https://dx.doi.org/10.1109/TIFS.2023.3281064 https://dx.doi.org/10.1109/TIFS.2023.3282133 https://dx.doi.org/10.1109/TIFS.2023.3282133 https://dx.doi.org/10.1109/TIFS.2023.3282574 https://dx.doi.org/10.1109/TIFS.2023.3279984 https://dx.doi.org/10.1109/TIFS.2023.3282386 https://signalprocessingsociety.org/publications-resources/ieee-transactions-information-forensics-and-security/edics https://signalprocessingsociety.org/publications-resources/information-authors http://www.signalprocessingsociety.org