Intra-Domain Knowledge Reuse Assisted Reinforcement Learning for Fast Anti-Jamming Communication On Extremal Rates of Secure Storage Over Graphs FedRecovery: Differentially Private Machine Unlearning for Federated Learning Frameworks DNA Synthetic Steganography Based on Conditional Probability Adaptive Coding NTRU+: Compact Construction of NTRU Using Simple Encoding Method FM-ViT: Flexible Modal Vision Transformers for Face Anti-Spoofing Progressive Sub-Domain Information Mining for Single-Source Generalizable Gait Recognition CAN-LOC: Spoofing Detection and Physical Intrusion Localization on an In-Vehicle CAN Bus Based on Deep Features of Voltage Signals Efficient Privacy-Preserving Inference Outsourcing for Convolutional Neural Networks Identity-Based Broadcast Proxy Re-Encryption for Flexible Data Sharing in VANETs Modality Coupling for Privacy Image Classification PKDGA: A Partial Knowledge-Based Domain Generation Algorithm for Botnets Linguistic Steganalysis in Few-Shot Scenario A General Purpose Data and Query Privacy Preserving Protocol for Wireless Sensor Networks Differential Pricing Strategies for Bandwidth Allocation With LFA Resilience: A Stackelberg Game Approach ZOMETAG: Zone-Based Memory Tagging for Fast, Deterministic Detection of Spatial Memory Violations on ARM Privacy-Preserving Multi-User Outsourced Computation for Boolean Circuits Contactless Palmprint Image Recognition Across Smartphones With Self-Paced CycleGAN On Extremal Rates of Secure Storage Over Graphs EDICS Information for Authors 4707-4720 4721-4731 4732-4746 4747-4759 4760-4774 4775-4786 4787-4799 4800-4814 4815-4829 4830-4842 4843-4853 4854-4869 4870-4882 4883-4898 4899-4914 4915-4928 4929-4943 4944-4954 4721-4731 www.signalprocessingsociety.org [22] SEPTEMBER 2023https://dx.doi.org/10.1109/TIFS.2023.3284611 https://dx.doi.org/10.1109/TIFS.2023.3284611 https://dx.doi.org/10.1109/TIFS.2023.3299183 https://dx.doi.org/10.1109/TIFS.2023.3297905 https://dx.doi.org/10.1109/TIFS.2023.3285045 https://dx.doi.org/10.1109/TIFS.2023.3299172 https://dx.doi.org/10.1109/TIFS.2023.3296330 https://dx.doi.org/10.1109/TIFS.2023.3297444 https://dx.doi.org/10.1109/TIFS.2023.3297444 https://dx.doi.org/10.1109/TIFS.2023.3287072 https://dx.doi.org/10.1109/TIFS.2023.3299466 https://dx.doi.org/10.1109/TIFS.2023.3301414 https://dx.doi.org/10.1109/TIFS.2023.3298229 https://dx.doi.org/10.1109/TIFS.2023.3298210 https://dx.doi.org/10.1109/TIFS.2023.3300524 https://dx.doi.org/10.1109/TIFS.2023.3299181 https://dx.doi.org/10.1109/TIFS.2023.3299181 https://dx.doi.org/10.1109/TIFS.2023.3299454 https://dx.doi.org/10.1109/TIFS.2023.3299454 https://dx.doi.org/10.1109/TIFS.2023.3301734 https://dx.doi.org/10.1109/TIFS.2023.3301729 https://dx.doi.org/10.1109/TIFS.2023.3299183 https://signalprocessingsociety.org/publications-resources/ieee-transactions-information-forensics-and-security/edics https://signalprocessingsociety.org/publications-resources/information-authors http://www.signalprocessingsociety.org