default search action
IEEE Transactions on Information Forensics and Security, Volume 19
Volume 19, 2024
- Xu Song, Saihui Hou, Yan Huang, Chunshui Cao, Xu Liu, Yongzhen Huang, Caifeng Shan:
Gait Attribute Recognition: A New Benchmark for Learning Richer Attributes From Human Gait Patterns. 1-14 - Dongxia Huang, Weiqi Luo, Minglin Liu, Weixuan Tang, Jiwu Huang:
Steganography Embedding Cost Learning With Generative Multi-Adversarial Network. 15-29 - Qiang Zhou, Liangmin Wang, Huijuan Zhu, Tong Lu, Victor S. Sheng:
WF-Transformer: Learning Temporal Features for Accurate Anonymous Traffic Identification by Using Transformer Networks. 30-43 - Ju Jia, Siqi Ma, Yang Liu, Lina Wang, Robert H. Deng:
A Causality-Aligned Structure Rationalization Scheme Against Adversarial Biased Perturbations for Graph Neural Networks. 59-73 - Guoxin Sun, Tansu Alpcan, Benjamin I. P. Rubinstein, Seyit Camtepe:
To Act or Not to Act: An Adversarial Game for Securing Vehicle Platoons. 163-177 - Jiangyi Deng, Xiaoyu Ji, Beibei Wang, Bin Wang, Wenyuan Xu:
Dr. Defender: Proactive Detection of Autopilot Drones Based on CSI. 194-206 - Xinyu Tang, Cheng Guo, Kim-Kwang Raymond Choo, Yi-Ning Liu:
An Efficient and Dynamic Privacy-Preserving Federated Learning System for Edge Computing. 207-220 - Yi Ding, Zi Wang, Zhen Qin, Erqiang Zhou, Guobin Zhu, Zhiguang Qin, Kim-Kwang Raymond Choo:
Backdoor Attack on Deep Learning-Based Medical Image Encryption and Decryption Network. 280-292 - Dandan Xu, Kai Chen, Miaoqian Lin, Chaoyang Lin, Xiaofeng Wang:
AutoPwn: Artifact-Assisted Heap Exploit Generation for CTF PWN Competitions. 293-306 - Xiangye Wei, Liming Xiu, Yimao Cai:
A Perspective of Using Frequency-Mixing as Entropy in Random Number Generation for Portable Hardware Cybersecurity IP. 320-333 - Xiao Sui, Sisi Duan, Haibin Zhang:
BG: A Modular Treatment of BFT Consensus Toward a Unified Theory of BFT Replication. 44-58 - Rui Xue, Kaiping Xue, Bin Zhu, Xinyi Luo, Tianwei Zhang, Qibin Sun, Jun Lu:
Differentially Private Federated Learning With an Adaptive Noise Mechanism. 74-87 - Qian Ren, Yue Li, Yingjun Wu, Yuchen Wu, Hong Lei, Lei Wang, Bangdao Chen:
DeCloak: Enable Secure and Cheap Multi-Party Transactions on Legacy Blockchains by a Minimally Trusted TEE Network. 88-103 - Yinshan Li, Hua Ma, Zhi Zhang, Yansong Gao, Alsharif Abuadbba, Minhui Xue, Anmin Fu, Yifeng Zheng, Said F. Al-Sarawi, Derek Abbott:
NTD: Non-Transferability Enabled Deep Learning Backdoor Detection. 104-119 - Shuting He, Weihua Chen, Kai Wang, Hao Luo, Fan Wang, Wei Jiang, Henghui Ding:
Region Generation and Assessment Network for Occluded Person Re-Identification. 120-132 - Qingjun Yuan, Gaopeng Gou, Yanbei Zhu, Yuefei Zhu, Gang Xiong, Yongjuan Wang:
MCRe: A Unified Framework for Handling Malicious Traffic With Noise Labels Based on Multidimensional Constraint Representation. 133-147 - Haiwei Wu, Jiantao Zhou, Xinyu Zhang, Jinyu Tian, Weiwei Sun:
Robust Camera Model Identification Over Online Social Network Shared Images via Multi-Scenario Learning. 148-162 - Haoheng Yuan, Yanghe Feng, Chuanchuan Yang, Zhuojun Zhuang, Bin Dai:
Two-User Gaussian Broadcast Wiretap Channel With Common Message and Feedback: Revisit. 178-193 - Chen Zhang, Yulong Ming, Mingyue Wang, Yu Guo, Xiaohua Jia:
Encrypted and Compressed Key-Value Store With Pattern-Analysis Security in Cloud Systems. 221-234 - Weize Quan, Pengfei Deng, Kai Wang, Dong-Ming Yan:
CGFormer: ViT-Based Network for Identifying Computer-Generated Images With Token Labeling. 235-250 - Ningbin Yang, Chunming Tang, Debiao He:
A Lightweight Certificateless Multi-User Matchmaking Encryption for Mobile Devices: Enhancing Security and Performance. 251-264 - Weisong Zhao, Xiangyu Zhu, Kaiwen Guo, Haichao Shi, Xiaoyu Zhang, Zhen Lei:
Masked Face Transformer. 265-279 - Wenli Sun, Xinyang Jiang, Shuguang Dou, Dongsheng Li, Duoqian Miao, Cheng Deng, Cairong Zhao:
Invisible Backdoor Attack With Dynamic Triggers Against Person Re-Identification. 307-319 - Meng Li, Zheng Pei, Yong Chen, Zhenhai Miao:
Fuzzy Linguistic Knowledge Reasoning-Based Secure Control for Connected Nonlinear Servosystem. 334-343 - Yuankun Xie, Haonan Cheng, Yutian Wang, Long Ye:
Domain Generalization via Aggregation and Separation for Audio Deepfake Detection. 344-358 - Saeed Abdolinezhad, Lukas Zimmermann, Axel Sikora:
Output Positioning to Derive Maximum Entropy From Physical Unclonable Functions. 359-371 - Min Xu, Ximiao Zhang, Xiuzhuang Zhou:
Confidence-Calibrated Face and Kinship Verification. 372-384 - Andrea Montibeller, Fernando Pérez-González:
An Adaptive Method for Camera Attribution Under Complex Radial Distortion Corrections. 385-400 - Zhiqing Guo, Zhenhong Jia, Liejun Wang, Dewang Wang, Gaobo Yang, Nikola K. Kasabov:
Constructing New Backbone Networks via Space-Frequency Interactive Convolution for Deepfake Detection. 401-413 - Youwen Zhu, Yiran Cao, Qiao Xue, Qihui Wu, Yushu Zhang:
Heavy Hitter Identification Over Large-Domain Set-Valued Data With Local Differential Privacy. 414-426 - Gaoyang Liu, Tianlong Xu, Rui Zhang, Zixiong Wang, Chen Wang, Ling Liu:
Gradient-Leaks: Enabling Black-Box Membership Inference Attacks Against Machine Learning Models. 427-440 - Zhenyu Zhou, Ajay Kumar:
Finger-Knuckle Assisted Slap Fingerprint Identification System for Higher Security and Convenience. 441-454 - Huming Qiu, Hua Ma, Zhi Zhang, Alsharif Abuadbba, Wei Kang, Anmin Fu, Yansong Gao:
Toward a Critical Evaluation of Robustness for Deep Learning Backdoor Countermeasures. 455-468 - Yaqing Song, Chunxiang Xu, Yuan Zhang, Shiyu Li:
Hardening Password-Based Credential Databases. 469-484 - Junjiang He, Cong Tang, Wenshan Li, Tao Li, Li Chen, Xiaolong Lan:
BR-HIDF: An Anti-Sparsity and Effective Host Intrusion Detection Framework Based on Multi-Granularity Feature Extraction. 485-499 - Chao Liu, Xue Fu, Yu Wang, Lantu Guo, Yuchao Liu, Yun Lin, Haitao Zhao, Guan Gui:
Overcoming Data Limitations: A Few-Shot Specific Emitter Identification Method Using Self-Supervised Learning and Adversarial Augmentation. 500-513 - Suvadeep Hajra, Manaar Alam, Sayandeep Saha, Stjepan Picek, Debdeep Mukhopadhyay:
On the Instability of Softmax Attention-Based Deep Learning Models in Side-Channel Analysis. 514-528 - Dinu Coltuc, Henri George Coanda:
Reversible Contrast Enhancement by Histogram Specification and Very Low Distortion Data Hiding. 529-539 - Yunfei Ge, Quanyan Zhu:
GAZETA: GAme-Theoretic ZEro-Trust Authentication for Defense Against Lateral Movement in 5G IoT Networks. 540-554 - Baihao Peng, Junfeng Liu, Jun Zeng:
Dynamic Analysis of Multiplex Networks With Hybrid Maintenance Strategies. 555-570 - Sheema Madhusudhanan, Arun Cyril Jose, Jayakrushna Sahoo, Reza Malekian:
PRIMϵ: Novel Privacy-Preservation Model With Pattern Mining and Genetic Algorithm. 571-585 - Milos Grujic, Ingrid Verbauwhede:
Optimizing Linear Correctors: A Tight Output Min-Entropy Bound and Selection Technique. 586-600 - Hanbiao Du, Zheng Che, Meng Shen, Liehuang Zhu, Jiankun Hu:
Breaking the Anonymity of Ethereum Mixing Services Using Graph Feature Learning. 616-631 - Ali Asghar Beigizad, Hadi Soleimany, Sara Zarei, Hamed Ramzanipour:
Linked Fault Analysis. 632-645 - William Briguglio, Waleed A. Yousef, Issa Traoré, Mohammad Mamun:
Federated Supervised Principal Component Analysis. 646-660 - Zhouyan Deng, Jiajia Liu, Yijie Xun, Junman Qin:
IdentifierIDS: A Practical Voltage-Based Intrusion Detection System for Real In-Vehicle Networks. 661-676 - Qi Xia, Isaac Amankona Obiri, Jianbin Gao, Hu Xia, Xiaosong Zhang, Kwame Omono Asamoah, Sandro Amofa:
PRIDN: A Privacy Preserving Data Sharing on Named Data Networking. 677-692 - Zekai Chen, Shengxing Yu, Mingyuan Fan, Ximeng Liu, Robert H. Deng:
Privacy-Enhancing and Robust Backdoor Defense for Federated Learning on Heterogeneous Data. 693-707 - Yu Guo, Yu Zhao, Saihui Hou, Cong Wang, Xiaohua Jia:
Verifying in the Dark: Verifiable Machine Unlearning by Using Invisible Backdoor Triggers. 708-721 - Ruidong Han, Huihui Gong, Siqi Ma, Juanru Li, Chang Xu, Elisa Bertino, Surya Nepal, Zhuo Ma, Jianfeng Ma:
A Credential Usage Study: Flow-Aware Leakage Detection in Open-Source Projects. 722-734 - Decheng Liu, Xinbo Gao, Chunlei Peng, Nannan Wang, Jie Li:
Universal Heterogeneous Face Analysis via Multi-Domain Feature Disentanglement. 735-747 - Ying He, Zhili Shen, Jingyu Hua, Qixuan Dong, Jiacheng Niu, Wei Tong, Xu Huang, Chen Li, Sheng Zhong:
Backdoor Attack Against Split Neural Network-Based Vertical Federated Learning. 748-763 - Menghao Zhang, Guanyu Li, Cheng Guo, Han Bao, Mingwei Xu, Hongxin Hu, Fenghua Li:
IMap: Toward a Fast, Scalable and Reconfigurable In-Network Scanner With Programmable Switches. 601-615 - Xiaohan Yuan, Jiqiang Liu, Bin Wang, Wei Wang, Bin Wang, Tao Li, Xiaobo Ma, Witold Pedrycz:
FedComm: A Privacy-Enhanced and Efficient Authentication Protocol for Federated Learning in Vehicular Ad-Hoc Networks. 777-792 - Hui Liu, Wenya Wang, Hao Sun, Anderson Rocha, Haoliang Li:
Robust Domain Misinformation Detection via Multi-Modal Feature Alignment. 793-806 - Elahe Vedadi, Yasaman Keshtkarjahromi, Hulya Seferoglu:
Efficient Coded Multi-Party Computation at Edge Networks. 807-820 - Yuqing Zhang, Zhaofeng Ma, Shoushan Luo, Pengfei Duan:
Dynamic Trust-Based Redactable Blockchain Supporting Update and Traceability. 821-834 - Qiuhua Wang, Chengyu Li, Tianyu Xia, Yizhi Ren, Dong Wang, Guoyan Zhang, Kim-Kwang Raymond Choo:
Optimal Selfish Mining-Based Denial-of-Service Attack. 835-850 - Xingming Long, Jie Zhang, Shuzhe Wu, Xin Jin, Shiguang Shan:
Dual Sampling Based Causal Intervention for Face Anti-Spoofing With Identity Debiasing. 851-862 - Huikai Shao, Chengcheng Liu, Xiaojiang Li, Dexing Zhong:
Privacy Preserving Palmprint Recognition via Federated Metric Learning. 878-891 - Yunchao Yang, Miao Hu, Yipeng Zhou, Xuezheng Liu, Di Wu:
CSRA: Robust Incentive Mechanism Design for Differentially Private Federated Learning. 892-906 - Yiming Xue, Jiaxuan Wu, Ronghua Ji, Ping Zhong, Juan Wen, Wanli Peng:
Adaptive Domain-Invariant Feature Extraction for Cross-Domain Linguistic Steganalysis. 920-933 - Jingwei Xin, Zikai Wei, Nannan Wang, Jie Li, Xinbo Gao:
Large Pose Face Recognition via Facial Representation Learning. 934-946 - Rossano Gaeta:
An Accurate and Efficient Algorithm to Identify Malicious Nodes of a Graph. 947-958 - Shuyi Li, Ruijun Ma, Jianhang Zhou, Bob Zhang, Lifang Wu:
Joint Discriminative Analysis With Low-Rank Projection for Finger Vein Feature Extraction. 959-969 - Wei Guo, Benedetta Tondi, Mauro Barni:
Universal Detection of Backdoor Attacks via Density-Based Clustering and Centroids Analysis. 970-984 - Haodi Wang, Yu Guo, Rongfang Bie, Xiaohua Jia:
Verifiable Arbitrary Queries With Zero Knowledge Confidentiality in Decentralized Storage. 1071-1085 - Anwei Luo, Chenqi Kong, Jiwu Huang, Yongjian Hu, Xiangui Kang, Alex C. Kot:
Beyond the Prior Forgery Knowledge: Mining Critical Clues for General Face Forgery Detection. 1168-1182 - Xiao Mei Zeng, Qing Liu, Chee Lip Gan:
A Comprehensive Data Retrieval and Correction Approach From 40-nm Flash Memory With Selective Chemical Engraving. 1031-1040 - Xinyu Qi, Aiqun Hu, Tianshu Chen:
Lightweight Radio Frequency Fingerprint Identification Scheme for V2X Based on Temporal Correlation. 1056-1070 - Chen Chen, Junqing Zhang, Tianyu Lu, Magnus Sandell, Liquan Chen:
Secret Key Generation for IRS-Assisted Multi-Antenna Systems: A Machine Learning-Based Approach. 1086-1098 - Weiqi Wang, Chenhan Zhang, Zhiyi Tian, Shui Yu:
Machine Unlearning via Representation Forgetting With Parameter Self-Sharing. 1099-1111 - Yuewang He, Xiangui Kang, Qiben Yan, Enping Li:
ResNeXt+: Attention Mechanisms Based on ResNeXt for Malware Detection and Classification. 1142-1155 - Guo-Wei Wong, Yi-Ting Huang, Ying-Ren Guo, Yeali S. Sun, Meng Chang Chen:
Attention-Based API Locating for Malware Techniques. 1199-1212 - Mingyue Wang, Zizhuo Chen, Yinbin Miao, Hejiao Huang, Cong Wang, Xiaohua Jia:
Cross-User Leakage Mitigation for Authorized Multi-User Encrypted Data Sharing. 1213-1226 - Shao-Chuan Zhao, Tianyang Xu, Xiaojun Wu, Josef Kittler:
Pluggable Attack for Visual Object Tracking. 1227-1240 - Mengqi Zhan, Yang Li, Bo Li, Jinchao Zhang, Chuanrong Li, Weiping Wang:
Toward Automated Field Semantics Inference for Binary Protocol Reverse Engineering. 764-776 - Roberto Casula, Giulia Orrù, Stefano Marrone, Umberto Gagliardini, Gian Luca Marcialis, Carlo Sansone:
Realistic Fingerprint Presentation Attacks Based on an Adversarial Approach. 863-877 - Yuni Lai, Yulin Zhu, Wenqi Fan, Xiaoge Zhang, Kai Zhou:
Toward Adversarially Robust Recommendation From Adaptive Fraudster Detection. 907-919 - Peng Xu, Jun Yang, Gaojie Chen, Zheng Yang, Yong Li, Moe Z. Win:
Physical-Layer Secret and Private Key Generation in Wireless Relay Networks With Correlated Eavesdropping Channels. 985-1000 - Wenze Mao, Peng Jiang, Liehuang Zhu:
Locally Verifiable Batch Authentication in IoMT. 1001-1014 - Taiyu Wang, Qinglin Yang, Kaiming Zhu, Junbo Wang, Chunhua Su, Kento Sato:
LDS-FL: Loss Differential Strategy Based Federated Learning for Privacy Preserving. 1015-1030 - Aakarsh Malhotra, Mayank Vatsa, Richa Singh, Keith B. Morris, Afzel Noore:
Multi-Surface Multi-Technique (MUST) Latent Fingerprint Database. 1041-1055 - Weiwei Feng, Nanqing Xu, Tianzhu Zhang, Baoyuan Wu, Yongdong Zhang:
Robust and Generalized Physical Adversarial Attacks via Meta-GAN. 1112-1125 - Durba Chatterjee, Kuheli Pratihar, Aritra Hazra, Ulrich Rührmair, Debdeep Mukhopadhyay:
Systematically Quantifying Cryptanalytic Nonlinearities in Strong PUFs. 1126-1141 - Hongwei Ding, Yu Sun, Nana Huang, Zhidong Shen, Xiaohui Cui:
TMG-GAN: Generative Adversarial Networks-Based Imbalanced Learning for Network Intrusion Detection. 1156-1167 - Dazhi Zhan, Yexin Duan, Yue Hu, Weili Li, Shize Guo, Zhisong Pan:
MalPatch: Evading DNN-Based Malware Detection With Adversarial Patches. 1183-1198 - Yuanchao Chen, Yuwei Li, Zulie Pan, Yuliang Lu, Juxing Chen, Shouling Ji:
URadar: Discovering Unrestricted File Upload Vulnerabilities via Adaptive Dynamic Testing. 1251-1266 - Changsheng Chen, Bokang Li, Rizhao Cai, Jishen Zeng, Jiwu Huang:
Distortion Model-Based Spectral Augmentation for Generalized Recaptured Document Detection. 1283-1298 - Bei Gong, Chong Guo, Chong Guo, Chen Guo, Yao Sun, Muhammad Waqas, Sheng Chen:
SLIM: A Secure and Lightweight Multi-Authority Attribute-Based Signcryption Scheme for IoT. 1299-1312 - Yunhao Du, Cheng Lei, Zhicheng Zhao, Yuan Dong, Fei Su:
Video-Based Visible-Infrared Person Re-Identification With Auxiliary Samples. 1313-1325 - Elias N. Zois, Dimitrios Tsourounis, Dimitrios Kalivas:
Similarity Distance Learning on SPD Manifold for Writer Independent Offline Signature Verification. 1342-1356 - Zirui Gong, Liyue Shen, Yanjun Zhang, Leo Yu Zhang, Jingwei Wang, Guangdong Bai, Yong Xiang:
AgrAmplifier: Defending Federated Learning Against Poisoning Attacks Through Local Update Amplification. 1241-1250 - Kuofeng Gao, Jiawang Bai, Baoyuan Wu, Mengxi Ya, Shu-Tao Xia:
Imperceptible and Robust Backdoor Attack in 3D Point Cloud. 1267-1282 - Zhi Li, Hao Wang, Songnian Zhang, Wenying Zhang, Rongxing Lu:
SecKNN: FSS-Based Secure Multi-Party KNN Classification Under General Distance Functions. 1326-1341 - Jiajun Gong, Wuqi Zhang, Charles Zhang, Tao Wang:
WFDefProxy: Real World Implementation and Evaluation of Website Fingerprinting Defenses. 1357-1371 - Qige Song, Yafei Sang, Yongzheng Zhang, Shuhao Li, Xiaolin Xu:
SepBIN: Binary Feature Separation for Better Semantic Comparison and Authorship Verification. 1372-1387 - Leixiao Cheng, Fei Meng:
Server-Aided Public Key Authenticated Searchable Encryption With Constant Ciphertext and Constant Trapdoor. 1388-1400 - Yong Dong, Yinfei Xu, Tong Zhang, Yili Xia:
Optimality of the Proper Gaussian Signal in Complex MIMO Wiretap Channels. 1401-1414 - Yinfei Xu, Jian Lu, Xuan Guang, Wei Xu:
Information Embedding With Stegotext Reconstruction. 1415-1428 - Amir Mahdi Sadeghzadeh, Amir Mohammad Sobhanian, Faezeh Dehghan, Rasool Jalili:
HODA: Hardness-Oriented Detection of Model Extraction Attacks. 1429-1439 - Xiaoguo Li, Zixi Huang, Bowen Zhao, Guomin Yang, Tao Xiang, Robert H. Deng:
STDA: Secure Time Series Data Analytics With Practical Efficiency in Wide-Area Network. 1440-1454 - Tingting Lu, Junfeng Wang:
DOMR: Toward Deep Open-World Malware Recognition. 1455-1468 - Jinyoung Lee, Hyeonsik Yeom, Si-Hyeon Lee, Jeongseok Ha:
Channel Correlation in Multi-User Covert Communication: Friend or Foe? 1469-1482 - Niusen Chen, Bo Chen:
HiPDS: A Storage Hardware-Independent Plausibly Deniable Storage System. 1483-1495 - Hengmin Zhang, Jian Yang, Jianjun Qian, Guangwei Gao, Xiangyuan Lan, Zhiyuan Zha, Bihan Wen:
Efficient Image Classification via Structured Low-Rank Matrix Factorization Regression. 1496-1509 - Yang Liu, Guangbo Liang, Xi Wang, Peican Zhu, Zhen Wang:
Diffusion Containment in Complex Networks Through Collective Influence of Connections. 1510-1524 - Ni Yang, Ruiyi Gao, Youzhi Feng, Huan Su:
Event-Triggered Impulsive Control for Complex Networks Under Stochastic Deception Attacks. 1525-1534 - Hao Fang, Ajian Liu, Jun Wan, Sergio Escalera, Chenxu Zhao, Xu Zhang, Stan Z. Li, Zhen Lei:
Surveillance Face Anti-Spoofing. 1535-1546 - Jiefu Chen, Tong Chen, Xing Xu, Jingran Zhang, Yang Yang, Heng Tao Shen:
Coreset Learning-Based Sparse Black-Box Adversarial Attack for Video Recognition. 1547-1560 - Ashkan Esmaeili, Marzieh Edraki, Nazanin Rahnavard, Ajmal Mian, Mubarak Shah:
Low-Rank and Sparse Decomposition for Low-Query Decision-Based Adversarial Attacks. 1561-1575 - Xiaohan Hao, Chao Lin, Wenhan Dong, Xinyi Huang, Hui Xiong:
Robust and Secure Federated Learning Against Hybrid Attacks: A Generic Architecture. 1576-1588 - Peng Jiang, Qi Liu, Liehuang Zhu:
SanIdea: Exploiting Secure Blockchain-Based Access Control via Sanitizable Encryption. 1589-1600