1. IEEE Signal Processing Magazine
2. Signal Processing Digital Library*
3. Inside Signal Processing Newsletter
4. SPS Resource Center
5. Career advancement & recognition
6. Discounts on conferences and publications
7. Professional networking
8. Communities for students, young professionals, and women
9. Volunteer opportunities
10. Coming soon! PDH/CEU credits
Click here to learn more.
Name | Description |
---|
ADP | ANONYMIZATION AND DATA PRIVACY |
---|---|
ADP-ANDE | Anonymization and de-anonymization |
ADP-PMOD | Privacy modeling and analysis |
ADP-PATT | Privacy attacks |
ADP-PPRO | Privacy protection |
ADP-ANCR | Anonymous credentials |
ADP-DIFP | Differential privacy |
ADP-APPS | Applications and systems |
ADP-OTHS | Others |
APC | APPLIED CRYPTOGRAPHY |
---|---|
APC-MMED | Multimedia encryption |
APC-MMPP | Property-preserving encryption of multimedia |
APC-IPED | Information processing in the encrypted domain |
APC-IPED-HOM | Homomorphic encryption applications |
APC-IPED-MPC | Applications of two- and multi-party computation |
APC-IPED-SEAR | Searchable encryption applications |
APC-FIN | Financial cryptography |
APC-VER | Secure and verifiable outsourcing |
APC-BRTT | Broadcast encryption and traitor tracing |
APC-FUN | Functional encryption applications |
APC-SS | Secret sharing |
APC-OTHS | Others |
BIO | BIOMETRICS |
---|---|
BIO-MODA | Biometric modalities |
BIO-MODA-FAC | Face biometrics |
BIO-MODA-FIN | Fingerprint biometrics |
BIO-MODA-IRI | Iris/ocular biometrics |
BIO-MODA-VOI | Voice biometrics |
BIO-MODA-SIG | Signature/handwriting biometrics |
BIO-MODA-VEIN | Vein biometrics |
BIO-MODA-OTH | Other biometric modalities |
BIO-MULM | Multi-modal biometric systems |
BIO-PROT | Biometrics Protocol |
BIO-SECP | Biometrics security and privacy management |
BIO-MODA-PAD | Presentation attacks (spoofing) and presentation attack detection (liveness detection ...) |
BIO-PEVA | Performance evaluation |
BIO-STAD | Standardization |
BIO-APPS | Applications |
BIO-OTHS | Others |
CIT | COMMUNICATION AND INFORMATION THEORETIC SECURITY |
---|---|
CIT-COM-JAM | Jamming and anti-jamming techniques |
CIT-COM-COV | Covert or stealthy communication via physical layers |
CIT-COM-FOR | Communication forensics (modulation identification, coding scheme identification, etc.) |
CIT-COM-COOP | Security and trust in cooperative communications |
CIT-COM-MIMO | Security and trust in MIMO and multiple-access techniques |
CIT-COM-COG | Security in cognitive radio |
CIT-PHY | Physical layer security |
CIT-PHY-SKEY | Secret key extraction from channels |
CIT-PHY-COD | Coding for physical layer security |
CIT-PHY-MIMO | Physical layer security in MIMO systems |
CIT-INF | Information theoretic security |
CIT-INF-SECC | Security over channels (wire-tap, broadcast, multiple access, interference, multi-user, etc.) |
CIT-INF-CONF | Information-theoretic formulation of confidentiality and authentication |
CIT-INF-PRIV | Information-theoretic formulation of privacy |
CIT-ADV | Adversarial signal processing |
CIT-ADV-DT | Adversarial detection and estimation theory |
CIT-ADV-CLA | Adversarial classification |
CIT-ADV-BYZ | Distributed signal processing with Byzantines |
CIT-OTHS | Others |
CYB | CYBERSECURITY |
---|---|
CYB-MOD | Cyber-security modelling (Dynamic systems, Control theoretic, Game theoretic etc ...) |
CYB-VAL | Model validation and experiments |
CYB-DAN | Cyber-security data analytics |
CYB-APP | Applications |
CYB-APP-BMHC | Bio-medical and health care systems |
CYB-APP-CLOU | Cloud computing |
CYB-APP-DIST | Distributed computing systems |
CYB-APP-SMGD | Smart grid and power/energy systems |
CYB-SNET | Social networks |
CYB-SNET-SEC | Security in social networks |
CYB-SNET-SMED | Social media forensics |
CYB-CP | Cyber-Physical security |
CYB-CP-ATT | Coordinated cyber and physical attacks |
CYB-CP-AUT | Cyber-physical authentication |
CYB-CP-OGT | Optimization and game-theoretic techniques for physical layer security |
CYB-CP-REAL | Real-time CPS security |
CYB-OTHS | Others |
MMF | MULTIMEDIA FORENSICS |
---|---|
MMF-DEV | Acquisition device forensics |
MMF-PROC | Multimedia processing forensics |
MMF-PROC-IM | Image forensics |
MMF-PROC-VID | Video forensics |
MMF-PROC-AU | Audio forensics |
MMF-PROC-TXT | Text fingerprinting |
MMF-PROC-MM | Multimodal forensic analysis |
MMF-MCLUE | Multi-clue forensics analysis |
MMF-BENM | Benchmarking |
MMF-BENM-REF | Reference datasets and algorithms |
MMF-BENM-PER | Performance measurement and validation of forensic evidence |
MMF-ADV | Adversarial multimedia forensics |
MMF-ADV-COU | Counter forensics |
MMF-ADV-ACOU | Anti counter-forensics measures |
MMF-ADV-GT | Game theory in multimedia forensics |
MMF-OTHS | Others |
HWS | HARDWARE SECURITY |
---|---|
HWS-PRIM | Hardware security primitives |
HWS-PRIM-PUF | Physical Unclonable Functions |
HWS-PRIM-RAN | True random number generators |
HWS-PRIM-TPM | Trusted execution environments |
HWS-SIDE | Side channels (power, timing, electromagnetic radiation, etc.) |
HWS-HWTR | Hardware Trojans |
HWS-ANTI | Anti-counterfeiting |
HWS-FORE | Hardware forensics |
HWS-OTHS | Others |
MMH | MULTIMEDIA CONTENT HASH |
---|---|
MMH-CHF | Content hash functions |
MMH-BENM | Benchmarking |
MMH-BENM-REF | Reference datasets and algorithms |
MMH-BENM-SEC | Security analysis |
MMH-BENM-PER | Performance measurement |
MMH-APPS | Applications |
MMH-APPS-NDD | Near-duplicate detection |
MMH-APPS-CBR | Content identification and authentication |
MMH-APPS-PLA | Content plagiarism detection |
MMH-OTHS | Others |
NET | NETWORK SECURITY |
---|---|
NET-SPRO | Security protocols |
NET-KEYD | Key distribution and management |
NET-ATTP | Network attacks and protection |
NET-ATTP-VUL | Vulnerability analysis |
NET-ATTP-MAL | Malware analysis |
NET-ATTP-DOS | Denial-of-service attack |
NET-ATTP-INT | Intrusion detection and prevention |
NET-ATTP-FIW | Firewalls |
NET-MOB | Security in mobile networks |
NET-MOB-MAN | Mobile ad-hoc networks (MANET) |
NET-MOB-VNET | Vehicular networks |
NET-MOB-AUTH | Authentication protocols for mobile networks |
NET-MONT | Network monitoring |
NET-SSN | Sensor networks |
NET-SREC | Self-recovery from failures |
NET-TRAC | Network forensics (network trace analysis, etc.) |
NET-OTHS | Others |
SUR | SURVEILLANCE |
---|---|
SUR-OBJD | Object detection, tracking and behavior analysis |
SUR-BEHA | Behavior analysis |
SUR-EVNT | Event detection and recognition |
SUR-FORE | Forensics in surveillance |
SUR-PRIV | Privacy in surveillance |
SUR-ADAW | Adversary-aware video surveillance |
SUR-SENA | Design and analysis of sensor arrays |
SUR-OTHS | Others |
USH | USABILITY AND HUMAN FACTORS |
---|---|
USH-DESN | Usability design |
USH-EVAL | Evaluation of privacy and security solutions |
USH-TRU | Trust management and models |
USH-NTEC | Non-technical (legal, ethical, social, and economic) aspects |
USH-BSOC | Behavior forensics and social factors |
USH-HAAI | Hard artificial intelligence problems and security (Captcha’s, man vs machine identification) |
USH-PASS | Password generation and protection |
USH-OTHS | Others |
WAT | WATERMARKING AND DATA HIDING |
---|---|
WAT-MOD | Theoretical models |
WAT-ALGO | Watermarking algorithms |
WAT-ALGO-IM | Image watermarking algorithms |
WAT-ALGO-VID | Video watermarking algorithms |
WAT-ALGO-AUD | Audio watermarking algorithms |
WAT-ALGO-3D | 3D watermarking |
WAT-PCM | Perceptual models |
WAT-RSYN | Resynchronization strategies |
WAT-BENM | Benchmarking |
WAT-SEC | Watermarking security |
WAT-APPS | Applications |
WAT-REV | Reversible data hiding |
WAT-STEG | Steganography |
WAT-STGA | Steganalysis |
WAT-NM | Steganography in new media |
WAT-OTH | Others |