default search action
IEEE Transactions on Information Forensics and Security, Volume 20
Volume 20, 2025
- Tong Fu, Liquan Chen, Yinghua Jiang, Ju Jia, Zhangjie Fu:
Image Steganalysis Based on Dual-Path Enhancement and Fractal Downsampling. 1-16 - Chong Xiao, Ming Tang, Sengim Karayalcin, Wei Cheng:
LD-PA: Distilling Univariate Leakage for Deep Learning-Based Profiling Attacks. 17-30 - Xin Xie, Jianan Hong, Cunqing Hua, Yanhong Xu:
Communication Efficient Ciphertext-Field Aggregation in Wireless Networks via Over-the-Air Computation. 31-45 - Jitendra Bhandari, Jayanth Gopinath, Mohammed Ashraf, Johann Knechtel, Ozgur Sinanoglu, Ramesh Karri:
DEFending Integrated Circuit Layouts. 46-59 - Hong Niu, Xia Lei, Jiancheng An, Lechen Zhang, Chau Yuen:
On the Efficient Design of Stacked Intelligent Metasurfaces for Secure SISO Transmission. 60-70 - Yige Liu, Che Wang, Yiwei Lou, Yongzhi Cao, Hanpin Wang:
Attackers Are Not the Same! Unveiling the Impact of Feature Distribution on Label Inference Attacks. 71-86 - Jiachen Yang, Jipeng Zhang:
LHADRO: A Robust Control Framework for Autonomous Vehicles Under Cyber-Physical Attacks. 87-100 - Shuping Zhao, Lunke Fei, Bob Zhang, Jie Wen, Jinrong Cui:
Toward Mobile Palmprint Recognition via Multi-View Hierarchical Graph Learning. 101-113 - Yibiao Lu, Bingsheng Zhang, Kui Ren:
Load-Balanced Server-Aided MPC in Heterogeneous Computing. 114-128 - Liang Xie, Zhou Su, Yuntao Wang, Zhendong Li:
A Practical Federated Learning Framework With Truthful Incentive in UAV-Assisted Crowdsensing. 129-144 - Weihan Li, Zongyang Zhang, Yanpei Guo, Sherman S. M. Chow, Zhiguo Wan:
Succinct Hash-Based Arbitrary-Range Proofs. 145-158 - Rujia Li, Qin Wang, Yuanzhao Li, Sisi Duan, Qi Wang, David Galindo:
Bringing Smart Contract Confidentiality via Trusted Hardware: Fact and Fiction. 159-174 - Xiaodong Wu, Henry Yuan, Xiangman Li, Jianbing Ni, Rongxing Lu:
Evaluating Security and Robustness for Split Federated Learning Against Poisoning Attacks. 175-190 - Cheng Wei, Yang Wang, Kuofeng Gao, Shuo Shao, Yiming Li, Zhibo Wang, Zhan Qin:
PointNCBW: Toward Dataset Ownership Verification for Point Clouds via Negative Clean-Label Backdoor Watermark. 191-206 - Naiyu Wang, Shen Wang, Meng Li, Longfei Wu, Zijian Zhang, Zhitao Guan, Liehuang Zhu:
Balancing Differential Privacy and Utility: A Relevance-Based Adaptive Private Fine-Tuning Framework for Language Models. 207-220 - Jianghong Wei, Guohua Tian, Xiaofeng Chen, Willy Susilo:
Lightweight 0-RTT Session Resumption Protocol for Constrained Devices. 221-233 - Ruikang Chen, Yan Yan, Jing-Hao Xue, Yang Lu, Hanzi Wang:
Augmentation Matters: A Mix-Paste Method for X-Ray Prohibited Item Detection Under Noisy Annotations. 234-248 - Xiongjun Guan, Zhiyu Pan, Jianjiang Feng, Jie Zhou:
Joint Identity Verification and Pose Alignment for Partial Fingerprints. 249-263 - Ruiqi Kong, He Henry Chen:
DeepCRF: Deep Learning-Enhanced CSI-Based RF Fingerprinting for Channel-Resilient WiFi Device Identification. 264-278 - Haorui Yan, Xi Lin, Shenghong Li, Hao Peng, Bo Zhang:
Global or Local Adaptation? Client-Sampled Federated Meta-Learning for Personalized IoT Intrusion Detection. 279-293 - Jing Bai, Chang Ge, Zhu Xiao, Hongbo Jiang, Tong Li, Huaji Zhou, Licheng Jiao:
A Multiscale Discriminative Attack Method for Automatic Modulation Classification. 294-308 - Yue Huang, Huizhong Li, Yi Sun, Sisi Duan:
Byzantine Fault Tolerance With Non-Determinism, Revisited. 309-322 - Pengfei Duan, Zhaofeng Ma, Hongmin Gao, Tian Tian, Yuqing Zhang:
Multi-Authority Attribute-Based Encryption Scheme With Access Delegation for Cross Blockchain Data Sharing. 323-337 - Haochen Wang, Qidi You, Sisi Duan:
Synchronous Byzantine Agreement With O(n) Messages and O(1) Expected Time. 338-349 - Chenhao Lin, Xiang Ji, Yulong Yang, Qian Li, Zhengyu Zhao, Zhe Peng, Run Wang, Liming Fang, Chao Shen:
Hard Adversarial Example Mining for Improving Robust Fairness. 350-363 - Liang Xi, Runze Li, Menghan Li, Dehua Miao, Ruidong Wang, Zygmunt J. Haas:
NMFAD: Neighbor-Aware Mask-Filling Attributed Network Anomaly Detection. 364-374 - Shouxu Han, Jie Liu, Yi Luo, Hongping Gan:
LCMA: A Novel Lightweight Continuous Message Authentication for Cyber-Physical System. 375-390 - Jie Song, Sijia Zhang, Pengyi Zhang, Junghoon Park, Yu Gu, Ge Yu:
Illicit Social Accounts? Anti-Money Laundering for Transactional Blockchains. 391-404 - Zhiyang Dai, Yansong Gao, Chunyi Zhou, Anmin Fu, Zhi Zhang, Minhui Xue, Yifeng Zheng, Yuqing Zhang:
Decaf: Data Distribution Decompose Attack Against Federated Learning. 405-420 - Tingting Chai, Xin Wang, Ru Li, Wei Jia, Xiangqian Wu:
Joint Finger Valley Points-Free ROI Detection and Recurrent Layer Aggregation for Palmprint Recognition in Open Environment. 421-435 - Ke Li, Di Wang, Wenxuan Zhu, Shaofeng Li, Quan Wang, Xinbo Gao:
Physical Adversarial Patch Attack for Optical Fine-Grained Aircraft Recognition. 436-448 - Roozbeh Sarenche, Ren Zhang, Svetla Nikova, Bart Preneel:
Selfish Mining Time-Averaged Analysis in Bitcoin: Is Orphan Reporting an Effective Countermeasure? 449-464 - Xiaozhen Lu, Zihan Liu, Liang Xiao, Huaiyu Dai:
Reinforcement Learning-Based Personalized Differentially Private Federated Learning. 465-477 - K. Naveen Kumar, C. Krishna Mohan, Linga Reddy Cenkeramaddi:
Federated Learning Minimal Model Replacement Attack Using Optimal Transport: An Attacker Perspective. 478-487 - Zeyu Zhao, Yueneng Wang, Ke Xu, Tanfeng Sun, Xinghao Jiang:
HEVC Video Adversarial Samples Detection via Joint Features of Compression and Pixel Domains. 488-503 - Decheng Liu, Tao Chen, Chunlei Peng, Nannan Wang, Ruimin Hu, Xinbo Gao:
Attention Consistency Refined Masked Frequency Forgery Representation for Generalizing Face Forgery Detection. 504-515 - Yinan Hu, Juntao Chen, Quanyan Zhu:
Game-Theoretic Neyman-Pearson Detection to Combat Strategic Evasion. 516-530 - Xueluan Gong, Shuaike Li, Yanjiao Chen, Mingzhe Li, Rubin Wei, Qian Wang, Kwok-Yan Lam:
Augmenting Model Extraction Attacks Against Disruption-Based Defenses. 531-546 - Weiqi Wang, Zhiyi Tian, Chenhan Zhang, Shui Yu:
SCU: An Efficient Machine Unlearning Scheme for Deep Learning Enabled Semantic Communications. 547-558 - Yuhang Qiu, Honghui Chen, Xingbo Dong, Zheng Lin, Iman Yi Liao, Massimo Tistarelli, Zhe Jin:
IFViT: Interpretable Fixed-Length Representation for Fingerprint Matching via Vision Transformer. 559-573 - Jianmin Dong, Datian Peng, Zhongmin Cai, Bo Zeng:
Bilevel Optimized Collusion Attacks Against Gait Recognizer. 574-588 - Shuyu Jiang, Yunxiang Qiu, Xian Mo, Rui Tang, Wei Wang:
An Effective Node Injection Approach for Attacking Social Network Alignment. 589-604 - Yiping Zhang, Yuntao Shou, Wei Ai, Tao Meng, Keqin Li:
GroupFace: Imbalanced Age Estimation Based on Multi-Hop Attention Graph Convolutional Network and Group-Aware Margin Optimization. 605-619 - Rujia Li, Yuanzhao Li, Qin Wang, Sisi Duan, Qi Wang, Mark Ryan:
Accountable Decryption Made Formal and Practical. 620-635 - Xue Chen, Cheng Wang, Qing Yang, Teng Hu, Changjun Jiang:
Privacy Passport: Privacy-Preserving Cross-Domain Data Sharing. 636-650 - Yuli Liu:
Signed Latent Factors for Spamming Activity Detection. 651-664 - Xiaoping Liang, Zhenjun Tang, Xianquan Zhang, Xinpeng Zhang, Ching-Nung Yang:
Robust Image Hashing With Weighted Saliency Map and Laplacian Eigenmaps. 665-676 - Jianjin Zhao, Qi Li, Zewei Han, Junsong Fu, Guoshun Nan, Meng Shen, Bharat K. Bhargava:
ReTrial: Robust Encrypted Malicious Traffic Detection via Discriminative Relation Incorporation and Misleading Relation Correction. 677-692 - Bo Gao, Weiwei Liu, Guangjie Liu, Fengyuan Nie, Jianan Huang:
Multi-Level Resource-Coherented Graph Learning for Website Fingerprinting Attacks. 693-708 - Kaiyao Miao, Meng Zhang, Fanghong Guo, Rongxing Lu, Xiaohong Guan:
Detection of False Data Injection Attacks in Smart Grids: An Optimal Transport-Based Reliable Self-Training Approach. 709-723 - Luqing Wang, Luyao Guo, Shaofu Yang, Xinli Shi:
Differentially Private Decentralized Optimization With Relay Communication. 724-736 - Jing Yan, Yuhan Zheng, Xian Yang, Cailian Chen, Xinping Guan:
Privacy-Preserving Localization for Underwater Acoustic Sensor Networks: A Differential Privacy-Based Deep Learning Approach. 737-752 - Tanzim Mahfuz, Swarup Bhunia, Prabuddha Chakraborty:
X-DFS: Explainable Artificial Intelligence Guided Design-for-Security Solution Space Exploration. 753-766
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.