


default search action
IEEE Transactions on Information Forensics and Security, Volume 20
Volume 20, 2025
- Tong Fu
, Liquan Chen
, Yinghua Jiang, Ju Jia
, Zhangjie Fu
:
Image Steganalysis Based on Dual-Path Enhancement and Fractal Downsampling. 1-16 - Chong Xiao
, Ming Tang
, Sengim Karayalcin
, Wei Cheng
:
LD-PA: Distilling Univariate Leakage for Deep Learning-Based Profiling Attacks. 17-30 - Xin Xie
, Jianan Hong
, Cunqing Hua
, Yanhong Xu
:
Communication Efficient Ciphertext-Field Aggregation in Wireless Networks via Over-the-Air Computation. 31-45 - Jitendra Bhandari
, Jayanth Gopinath, Mohammed Ashraf, Johann Knechtel
, Ozgur Sinanoglu
, Ramesh Karri
:
DEFending Integrated Circuit Layouts. 46-59 - Hong Niu
, Xia Lei
, Jiancheng An
, Lechen Zhang
, Chau Yuen
:
On the Efficient Design of Stacked Intelligent Metasurfaces for Secure SISO Transmission. 60-70 - Yige Liu
, Che Wang, Yiwei Lou
, Yongzhi Cao
, Hanpin Wang:
Attackers Are Not the Same! Unveiling the Impact of Feature Distribution on Label Inference Attacks. 71-86 - Jiachen Yang
, Jipeng Zhang
:
LHADRO: A Robust Control Framework for Autonomous Vehicles Under Cyber-Physical Attacks. 87-100 - Shuping Zhao
, Lunke Fei
, Bob Zhang
, Jie Wen
, Jinrong Cui:
Toward Mobile Palmprint Recognition via Multi-View Hierarchical Graph Learning. 101-113 - Yibiao Lu
, Bingsheng Zhang
, Kui Ren
:
Load-Balanced Server-Aided MPC in Heterogeneous Computing. 114-128 - Liang Xie
, Zhou Su
, Yuntao Wang
, Zhendong Li
:
A Practical Federated Learning Framework With Truthful Incentive in UAV-Assisted Crowdsensing. 129-144 - Weihan Li
, Zongyang Zhang
, Yanpei Guo
, Sherman S. M. Chow
, Zhiguo Wan
:
Succinct Hash-Based Arbitrary-Range Proofs. 145-158 - Rujia Li
, Qin Wang
, Yuanzhao Li, Sisi Duan
, Qi Wang
, David Galindo:
Bringing Smart Contract Confidentiality via Trusted Hardware: Fact and Fiction. 159-174 - Xiaodong Wu
, Henry Yuan
, Xiangman Li, Jianbing Ni
, Rongxing Lu
:
Evaluating Security and Robustness for Split Federated Learning Against Poisoning Attacks. 175-190 - Cheng Wei
, Yang Wang, Kuofeng Gao
, Shuo Shao
, Yiming Li
, Zhibo Wang
, Zhan Qin
:
PointNCBW: Toward Dataset Ownership Verification for Point Clouds via Negative Clean-Label Backdoor Watermark. 191-206 - Naiyu Wang
, Shen Wang
, Meng Li
, Longfei Wu
, Zijian Zhang
, Zhitao Guan
, Liehuang Zhu
:
Balancing Differential Privacy and Utility: A Relevance-Based Adaptive Private Fine-Tuning Framework for Language Models. 207-220 - Jianghong Wei
, Guohua Tian
, Xiaofeng Chen
, Willy Susilo
:
Lightweight 0-RTT Session Resumption Protocol for Constrained Devices. 221-233 - Ruikang Chen, Yan Yan
, Jing-Hao Xue
, Yang Lu
, Hanzi Wang
:
Augmentation Matters: A Mix-Paste Method for X-Ray Prohibited Item Detection Under Noisy Annotations. 234-248 - Xiongjun Guan
, Zhiyu Pan
, Jianjiang Feng
, Jie Zhou
:
Joint Identity Verification and Pose Alignment for Partial Fingerprints. 249-263 - Ruiqi Kong
, He Henry Chen
:
DeepCRF: Deep Learning-Enhanced CSI-Based RF Fingerprinting for Channel-Resilient WiFi Device Identification. 264-278 - Haorui Yan
, Xi Lin
, Shenghong Li
, Hao Peng
, Bo Zhang:
Global or Local Adaptation? Client-Sampled Federated Meta-Learning for Personalized IoT Intrusion Detection. 279-293 - Jing Bai
, Chang Ge
, Zhu Xiao
, Hongbo Jiang
, Tong Li
, Huaji Zhou, Licheng Jiao
:
A Multiscale Discriminative Attack Method for Automatic Modulation Classification. 294-308 - Yue Huang
, Huizhong Li, Yi Sun
, Sisi Duan
:
Byzantine Fault Tolerance With Non-Determinism, Revisited. 309-322 - Pengfei Duan
, Zhaofeng Ma
, Hongmin Gao
, Tian Tian
, Yuqing Zhang
:
Multi-Authority Attribute-Based Encryption Scheme With Access Delegation for Cross Blockchain Data Sharing. 323-337 - Haochen Wang
, Qidi You, Sisi Duan
:
Synchronous Byzantine Agreement With O(n) Messages and O(1) Expected Time. 338-349 - Chenhao Lin
, Xiang Ji, Yulong Yang
, Qian Li
, Zhengyu Zhao
, Zhe Peng
, Run Wang
, Liming Fang
, Chao Shen
:
Hard Adversarial Example Mining for Improving Robust Fairness. 350-363 - Liang Xi
, Runze Li, Menghan Li
, Dehua Miao
, Ruidong Wang
, Zygmunt J. Haas
:
NMFAD: Neighbor-Aware Mask-Filling Attributed Network Anomaly Detection. 364-374 - Shouxu Han
, Jie Liu
, Yi Luo
, Hongping Gan
:
LCMA: A Novel Lightweight Continuous Message Authentication for Cyber-Physical System. 375-390 - Jie Song
, Sijia Zhang, Pengyi Zhang
, Junghoon Park, Yu Gu
, Ge Yu
:
Illicit Social Accounts? Anti-Money Laundering for Transactional Blockchains. 391-404 - Zhiyang Dai, Yansong Gao
, Chunyi Zhou
, Anmin Fu
, Zhi Zhang
, Minhui Xue
, Yifeng Zheng
, Yuqing Zhang
:
Decaf: Data Distribution Decompose Attack Against Federated Learning. 405-420 - Tingting Chai
, Xin Wang
, Ru Li
, Wei Jia
, Xiangqian Wu
:
Joint Finger Valley Points-Free ROI Detection and Recurrent Layer Aggregation for Palmprint Recognition in Open Environment. 421-435 - Ke Li
, Di Wang
, Wenxuan Zhu
, Shaofeng Li
, Quan Wang
, Xinbo Gao
:
Physical Adversarial Patch Attack for Optical Fine-Grained Aircraft Recognition. 436-448 - Roozbeh Sarenche
, Ren Zhang
, Svetla Nikova
, Bart Preneel
:
Selfish Mining Time-Averaged Analysis in Bitcoin: Is Orphan Reporting an Effective Countermeasure? 449-464 - Xiaozhen Lu
, Zihan Liu
, Liang Xiao
, Huaiyu Dai
:
Reinforcement Learning-Based Personalized Differentially Private Federated Learning. 465-477 - K. Naveen Kumar
, C. Krishna Mohan
, Linga Reddy Cenkeramaddi
:
Federated Learning Minimal Model Replacement Attack Using Optimal Transport: An Attacker Perspective. 478-487 - Zeyu Zhao
, Yueneng Wang
, Ke Xu
, Tanfeng Sun
, Xinghao Jiang
:
HEVC Video Adversarial Samples Detection via Joint Features of Compression and Pixel Domains. 488-503 - Decheng Liu
, Tao Chen, Chunlei Peng
, Nannan Wang
, Ruimin Hu, Xinbo Gao
:
Attention Consistency Refined Masked Frequency Forgery Representation for Generalizing Face Forgery Detection. 504-515 - Yinan Hu
, Juntao Chen
, Quanyan Zhu
:
Game-Theoretic Neyman-Pearson Detection to Combat Strategic Evasion. 516-530 - Xueluan Gong
, Shuaike Li
, Yanjiao Chen
, Mingzhe Li
, Rubin Wei, Qian Wang
, Kwok-Yan Lam
:
Augmenting Model Extraction Attacks Against Disruption-Based Defenses. 531-546 - Weiqi Wang
, Zhiyi Tian
, Chenhan Zhang
, Shui Yu
:
SCU: An Efficient Machine Unlearning Scheme for Deep Learning Enabled Semantic Communications. 547-558 - Yuhang Qiu
, Honghui Chen, Xingbo Dong
, Zheng Lin, Iman Yi Liao
, Massimo Tistarelli, Zhe Jin
:
IFViT: Interpretable Fixed-Length Representation for Fingerprint Matching via Vision Transformer. 559-573 - Jianmin Dong
, Datian Peng
, Zhongmin Cai
, Bo Zeng
:
Bilevel Optimized Collusion Attacks Against Gait Recognizer. 574-588 - Shuyu Jiang, Yunxiang Qiu, Xian Mo
, Rui Tang
, Wei Wang
:
An Effective Node Injection Approach for Attacking Social Network Alignment. 589-604 - Yiping Zhang
, Yuntao Shou
, Wei Ai
, Tao Meng
, Keqin Li
:
GroupFace: Imbalanced Age Estimation Based on Multi-Hop Attention Graph Convolutional Network and Group-Aware Margin Optimization. 605-619 - Rujia Li
, Yuanzhao Li, Qin Wang
, Sisi Duan
, Qi Wang
, Mark Ryan:
Accountable Decryption Made Formal and Practical. 620-635 - Xue Chen
, Cheng Wang
, Qing Yang
, Teng Hu
, Changjun Jiang
:
Privacy Passport: Privacy-Preserving Cross-Domain Data Sharing. 636-650 - Yuli Liu
:
Signed Latent Factors for Spamming Activity Detection. 651-664 - Xiaoping Liang
, Zhenjun Tang
, Xianquan Zhang
, Xinpeng Zhang
, Ching-Nung Yang
:
Robust Image Hashing With Weighted Saliency Map and Laplacian Eigenmaps. 665-676 - Jianjin Zhao
, Qi Li
, Zewei Han
, Junsong Fu
, Guoshun Nan
, Meng Shen
, Bharat K. Bhargava
:
ReTrial: Robust Encrypted Malicious Traffic Detection via Discriminative Relation Incorporation and Misleading Relation Correction. 677-692 - Bo Gao
, Weiwei Liu
, Guangjie Liu
, Fengyuan Nie
, Jianan Huang
:
Multi-Level Resource-Coherented Graph Learning for Website Fingerprinting Attacks. 693-708 - Kaiyao Miao, Meng Zhang
, Fanghong Guo
, Rongxing Lu
, Xiaohong Guan
:
Detection of False Data Injection Attacks in Smart Grids: An Optimal Transport-Based Reliable Self-Training Approach. 709-723 - Luqing Wang
, Luyao Guo
, Shaofu Yang
, Xinli Shi
:
Differentially Private Decentralized Optimization With Relay Communication. 724-736 - Jing Yan
, Yuhan Zheng, Xian Yang
, Cailian Chen
, Xinping Guan
:
Privacy-Preserving Localization for Underwater Acoustic Sensor Networks: A Differential Privacy-Based Deep Learning Approach. 737-752 - Tanzim Mahfuz
, Swarup Bhunia
, Prabuddha Chakraborty
:
X-DFS: Explainable Artificial Intelligence Guided Design-for-Security Solution Space Exploration. 753-766 - Xue Gong, Fan Zhang
, Xin-jie Zhao, Jie Xiao
, Shize Guo
:
Key Schedule Guided Persistent Fault Attack. 767-780 - Yuhong Xue
, Zhutian Yang
, Zhilu Wu
, Hu Wang, Guan Gui
:
Online Two-Stage Channel-Based Lightweight Authentication Method for Time-Varying Scenarios. 781-795 - Wenfeng Huang
, Axin Wu
, Shengmin Xu
, Guowen Xu
, Wei Wu
:
EASNs: Efficient Anonymous Social Networks With Enhanced Security and High Scalability. 796-806 - Shuaishuai Zhang
, Jie Huang, Peihao Li
:
Analyze and Improve Differentially Private Federated Learning: A Model Robustness Perspective. 807-821 - Wenrui Yu
, Qiongxiu Li
, Milan Lopuhaä-Zwakenberg
, Mads Græsbøll Christensen
, Richard Heusdens
:
Provable Privacy Advantages of Decentralized Federated Learning via Distributed Optimization. 822-838 - Chengxiang Jin, Jiajun Zhou
, Chenxuan Xie, Shanqing Yu
, Qi Xuan
, Xiaoniu Yang
:
Enhancing Ethereum Fraud Detection via Generative and Contrastive Self-Supervision. 839-853 - Xirong Zhuang
, Lan Zhang
, Chen Tang
, Yaliang Li
:
DeepReg: A Trustworthy and Privacy-Friendly Ownership Regulatory Framework for Deep Learning Models. 854-870 - Kuiyuan Zhang
, Zhongyun Hua
, Yushu Zhang
, Yifang Guo, Tao Xiang
:
Robust AI-Synthesized Speech Detection Using Feature Decomposition Learning and Synthesizer Feature Augmentation. 871-885 - Apollo Albright
, Boris Gelfand
, Michael Dixon
:
Learnability of Optical Physical Unclonable Functions Through the Lens of Learning With Errors. 886-897 - Hangcheng Liu
, Yuan Zhou
, Ying Yang
, Qingchuan Zhao
, Tianwei Zhang
, Tao Xiang
:
Stealthiness Assessment of Adversarial Perturbation: From a Visual Perspective. 898-913 - Haochen Sun
, Tonghe Bai
, Jason Li, Hongyang Zhang
:
zkDL: Efficient Zero-Knowledge Proofs of Deep Learning Training. 914-927 - Zipeng Ye
, Wenjian Luo
, Qi Zhou, Yubo Tang, Zhenqian Zhu, Yuhui Shi
, Yan Jia:
Gradient Inversion of Text-Modal Data in Distributed Learning. 928-943 - Jiancun Wu
, Engang Tian
, Chen Peng
, Zhiru Cao
:
Data-Importance-Aware Attack Strategy Design and Secure Control Countermeasure. 944-954 - Fei Meng
, Leixiao Cheng
:
TSR-ABE: Traceable and Server-Aided Revocable Ciphertext-Policy Attribute-Based Encryption Under Static Assumptions. 955-967 - Chaowei Sun
, Qingyu Su
, Jian Li
:
Secure Tracking Control and Attack Detection for Power Cyber-Physical Systems Based on Integrated Control Decision. 968-979 - Pingyu Wang
, Xingjian Zheng
, Linbo Qing
, Bonan Li, Fei Su
, Zhicheng Zhao
, Honggang Chen
:
DRFormer: A Discriminable and Reliable Feature Transformer for Person Re-Identification. 980-995 - Mingwei Zeng, Jie Cui
, Qingyang Zhang
, Hong Zhong
, Debiao He
:
Efficient Revocable Cross-Domain Anonymous Authentication Scheme for IIoT. 996-1010 - Ziniu Liu
, Han Yu
, Kai Chen
, Aiping Li
:
Privacy-Preserving Generative Modeling With Sliced Wasserstein Distance. 1011-1022 - Yixiao Xu
, Binxing Fang, Mohan Li
, Xiaolei Liu
, Zhihong Tian
:
Query-Efficient Model Inversion Attacks: An Information Flow View. 1023-1036 - Zhenxin Cai, Yu Wang
, Guan Gui
, Jin Sha
:
Toward Robust Radio Frequency Fingerprint Identification via Adaptive Semantic Augmentation. 1037-1048 - Yipeng Liu
, Zhanqing Li
, Xuan Yang
, Xiao Lu, Jing Li, Peng Chen
, Ronghua Liang
:
Test-Time Image Reconstruction for Cross-Device OCT Fingerprint Extraction. 1049-1064 - Shahnewaz Karim Sakib
, George T. Amariucai
, Yong Guan
:
Information Leakage Measures for Imperfect Statistical Information: Application to Non-Bayesian Framework. 1065-1080 - Anmol Kumar
, Mayank Agarwal
:
Reducing Internal Collateral Damage From DDoS Attacks Through Micro-Service Cloud Architecture. 1081-1091 - Yibin Zhang
, Yuchao Liu
, Juzhen Wang, Qi Xuan
, Yun Lin
, Guan Gui
:
Enhancing Specific Emitter Identification: A Semi-Supervised Approach With Deep Cloud and Broad Edge Integration. 1092-1105 - Jia Sun
, Yanfeng Li
, Luyifu Chen
, Houjin Chen
, Minjun Wang
:
Dualistic Disentangled Meta-Learning Model for Generalizable Person Re-Identification. 1106-1118 - Shiyuan Xu
, Xue Chen
, Yu Guo
, Siu-Ming Yiu
, Shang Gao, Bin Xiao
:
Efficient and Secure Post-Quantum Certificateless Signcryption With Linkability for IoMT. 1119-1134 - Qiang Zhang
, Xiongwei Zhang
, Meng Sun
, Jibin Yang
:
A Soft-Contrastive Pseudo Learning Approach Toward Open-World Forged Speech Attribution. 1135-1148 - Jun Feng
, Yefan Wu, Hong Sun
, Shunli Zhang
, Debin Liu
:
Panther: Practical Secure Two-Party Neural Network Inference. 1149-1162 - Wei Wang
, Haipeng Peng
, Junke Duan
, Licheng Wang
, Xiaoya Hu
, Zilin Zhao:
Resilient and Redactable Blockchain With Two-Level Rewriting and Version Detection. 1163-1175 - Lingyan Xue
, Haiping Huang
, Fu Xiao
, Qi Li
, Zhiwei Wang
:
A Privacy-Enhanced Traceable Anonymous Transaction Scheme for Blockchain. 1176-1191 - Yu Tian
, Kunbo Zhang
, Yalin Huang
, Leyuan Wang
, Yue Liu
, Zhenan Sun
:
Cross-Optical Property Image Translation for Face Anti-Spoofing: From Visible to Polarization. 1192-1205 - Bei Li
, Hong Zhong
, Jie Cui
, Chengjie Gu
, Debiao He
:
RRMAC: A Multi-Data Owner Access Control Scheme With Robust Revocation for Co-Owned Data Sharing. 1206-1221 - Kai Liang
, Songze Li, Ming Ding
, Feng Tian
, Youlong Wu
:
Privacy-Preserving Coded Schemes for Multi-Server Federated Learning With Straggling Links. 1222-1236 - Chenhao Wang
, Yang Ming
, Hang Liu
, Yutong Deng, Yi Zhao
, Songnian Zhang
:
Security-Enhanced Data Transmission With Fine-Grained and Flexible Revocation for DTWNs. 1237-1250 - Yuxian Li
, Jian Weng
, Junzuo Lai
, Yingjiu Li
, Jiahe Wu, Ming Li
, Jianfei Sun, Pengfei Wu
, Robert H. Deng
:
AuditPCH: Auditable Payment Channel Hub With Privacy Protection. 1251-1261 - Ming Zheng
, Xiaowen Hu
, Ying Hu
, Xiaoyao Zheng
, Yonglong Luo
:
Fed-UGI: Federated Undersampling Learning Framework With Gini Impurity for Imbalanced Network Intrusion Detection. 1262-1277 - Yingkun Wen
, Yan Huo
, Junhuai Li
, Jin Qian
, Kan Wang
:
Generative Adversarial Network-Aided Covert Communication for Cooperative Jammers in CCRNs. 1278-1289 - Yiming Yang
, Weipeng Hu
, Haifeng Hu
:
Progressive Cross-Modal Association Learning for Unsupervised Visible-Infrared Person Re-Identification. 1290-1304 - Andong Lu
, Chenglong Li
, Tianrui Zha, Xiaofeng Wang
, Jin Tang
, Bin Luo
:
Nighttime Person Re-Identification via Collaborative Enhancement Network With Multi-Domain Learning. 1305-1319 - Licheng Ji
, Jiguo Li
, Yichen Zhang, Yang Lu
:
Verifiable Searchable Symmetric Encryption Over Additive Homomorphism. 1320-1332 - Qi Guo
, Shanmin Pang
, Xiaojun Jia
, Yang Liu
, Qing Guo
:
Efficient Generation of Targeted and Transferable Adversarial Examples for Vision-Language Models via Diffusion Models. 1333-1348 - Huixian Li
, Wenyu Mo
, Chun Shen
, Liaojun Pang
:
EvalComp: Bootstrapping Based on Homomorphic Comparison Function for CKKS. 1349-1361 - Wenjing An, Derui Ding
, Hongli Dong
, Bo Shen
, Lei Sun
:
Privacy-Preserving Distributed Optimization for Economic Dispatch Over Balanced Directed Networks. 1362-1373 - Ying Miao, Keke Gai
, Jing Yu
, Yu-an Tan
, Liehuang Zhu
, Weizhi Meng
:
Blockchain-Empowered Keyword Searchable Provable Data Possession for Large Similar Data. 1374-1389 - Jingwei Chen
, Linhan Yang, Wenyuan Wu, Yang Liu, Yong Feng:
Homomorphic Matrix Operations Under Bicyclic Encoding. 1390-1404 - Changsong Jiang
, Chunxiang Xu
, Xinfeng Dong, Kefei Chen
, Guomin Yang
:
An Efficient Privacy-Preserving Scheme for Weak Password Collection in Internet of Things Against Perpetual Leakage. 1405-1420 - Pengwen Dai
, Jingyu Li
, Dayan Wu
, Peijia Zheng
, Xiaochun Cao
:
TextSafety: Visual Text Vanishing via Hierarchical Context-Aware Interaction Reconstruction. 1421-1433 - Hao Zhang
, Wenqi Shao, Hong Liu, Yongqiang Ma, Ping Luo, Yu Qiao, Nanning Zheng
, Kaipeng Zhang
:
B-AVIBench: Toward Evaluating the Robustness of Large Vision-Language Model on Black-Box Adversarial Visual-Instructions. 1434-1446 - Meng Zhang
, Li Lu
, Yuhan Wu, Zheng Yan, Jiaqi Sun, Feng Lin
, Kui Ren
:
DroneAudioID: A Lightweight Acoustic Fingerprint-Based Drone Authentication System for Secure Drone Delivery. 1447-1461 - Desheng Zheng
, Wuping Ke
, Xiao-Yu Li
, Yaoxin Duan
, Guangqiang Yin
, Fan Min
:
Enhancing the Transferability of Adversarial Attacks via Multi-Feature Attention. 1462-1474 - Cong Wu
, Jianfei Sun
, Jing Chen
, Mamoun Alazab
, Yang Liu
, Yang Xiang
:
$\mathsf{TCG}\text{-}\mathsf{IDS}$ : Robust Network Intrusion Detection via Temporal Contrastive Graph Learning. 1475-1486 - Xiaoyuan Liu
, Hongwei Li
, Guowen Xu
, Xilin Zhang
, Tianwei Zhang
, Jianying Zhou
:
Secure and Lightweight Feature Selection for Horizontal Federated Learning. 1487-1502 - Manlin Wang
, Yao Yao
, Haiyang Ding
, Shihai Shao
, Bin Xia
, Jiangzhou Wang
:
Angle and Distance Discrimination by Utilizing Frequency Conversion Capability of STC-IRS for Covert Communications. 1503-1518 - Zhichao You
, Xuewen Dong
, Shujun Li
, Ximeng Liu, Siqi Ma
, Yulong Shen
:
Local Differential Privacy Is Not Enough: A Sample Reconstruction Attack Against Federated Learning With Local Differential Privacy. 1519-1534 - Dongming Li
, Wanting Ma
, Fuhui Zhou
, Qihui Wu, Derrick Wing Kwan Ng
:
Physical-Layer Key Generation Efficient Beamspace Adaptations in 5G New Radio. 1535-1550 - Aruna Jayasena
, Richard Bachmann
, Prabhat Mishra
:
CiseLeaks: Information Leakage Assessment of Cryptographic Instruction Set Extension Prototypes. 1551-1565 - Vamoua Yachongka
, Hideki Yagi
, Hideki Ochiai
:
Outer Bounds on the CEO Problem With Privacy Constraints. 1566-1581 - Xin Liu
, Yichen Yang
, Kun He
, John E. Hopcroft
:
Parameter Interpolation Adversarial Training for Robust Image Classification. 1613-1623 - Qing Li
, Shanxiang Lyu
, Jinming Wen
:
Optimal Client Selection of Federated Learning Based on Compressed Sensing. 1679-1694 - Rongxin Tu
, Xiangui Kang
, Chee-Wei Tan
, Chi-Hung Chi
, Kwok-Yan Lam
:
All Points Guided Adversarial Generator for Targeted Attack Against Deep Hashing Retrieval. 1695-1709 - Yamei Wang
, Yuexin Zhang
, Ayong Ye
, Jian Shen
, Derui Wang
, Yang Xiang
:
Anonymous and Efficient (t, n)-Threshold Ownership Transfer for Cloud EMRs Auditing. 1710-1723 - Zhaoyang Li
, Zhu Teng
, Baopeng Zhang
, Jianping Fan
:
Bi-Stream Coteaching Network for Weakly-Supervised Deepfake Localization in Videos. 1724-1738 - Junpeng He
, Xiong Li
, Xiaosong Zhang
, Weina Niu
, Fagen Li
:
A Synthetic Data-Assisted Satellite Terrestrial Integrated Network Intrusion Detection Framework. 1739-1754 - Hao Wang
, Zhichao Chen
, Zhaoran Liu
, Haozhe Li
, Degui Yang
, Xinggao Liu, Haoxuan Li:
Entire Space Counterfactual Learning for Reliable Content Recommendations. 1755-1764 - Satyabrat Rath
, Jothi Ramalingam
, Sohham Seal:
A Note on "Secure and Efficient Outsourcing of PCA-Based Face Recognition". 1765-1766 - Kaiyi Pang
, Tao Qi
, Chuhan Wu, Minhao Bai
, Minghu Jiang, Yongfeng Huang
:
ModelShield: Adaptive and Robust Watermark Against Model Extraction Attack. 1767-1782 - Qiaofeng Zhang, Meng Li, Yong Chen, Meng Zhang:
Non-Fragile Robust Security Control Based on Dynamic Threshold Cryptographic Detector for Remote Motor Under Stealthy FDI Attacks. 1783-1793 - Wei Peng, Lei Cui, Wei Cai, Wei Wang, Xiaoyu Cui, Zhiyu Hao, Xiaochun Yun:
Bottom Aggregating, Top Separating: An Aggregator and Separator Network for Encrypted Traffic Understanding. 1794-1806 - You Li, Yan Huo
, Tianhui Zhang
, Zhongguo Zhou, Qinghe Gao
, Tao Yan, Yongning Yang, Tao Jing
:
Distributed Physical Layer Authentication With Dynamic Soft Voting for Smart Distribution Grids. 1807-1821 - Qihua Hu
, Weiping Wang
, Hong Song
, Song Guo
, Jian Zhang
, Shigeng Zhang
:
ASDroid: Resisting Evolving Android Malware With API Clusters Derived From Source Code. 1822-1835 - Xinyue Zhang
, Jiahuan Zhou
, Luxin Yan
, Sheng Zhong
, Xu Zou
:
Hunt Camouflaged Objects via Revealing Mutation Regions. 1836-1851 - Mingzhi Hu
, Hongxia Wang
:
Mutual Information-Optimized Steganalysis for Generative Steganography. 1852-1865 - Xiaofu Chen
, Jiangyi Deng
, Yanjiao Chen
, Chaohao Li, Xin Fang, Cong Liu
, Wenyuan Xu
:
Imprints: Mitigating Watermark Removal Attacks With Defensive Watermarks. 1866-1881 - Bo Yang
, Hengwei Zhang
, Jindong Wang, Yulong Yang
, Chenhao Lin
, Chao Shen
, Zhengyu Zhao
:
Adversarial Example Soups: Improving Transferability and Stealthiness for Free. 1882-1894 - Jie Zhang
, Zhifan Wan
, Lanqing Hu
, Stephen Lin, Shuzhe Wu, Shiguang Shan
:
Collaboratively Self-Supervised Video Representation Learning for Action Recognition. 1895-1907 - Guoying Qiu
, Tiecheng Bai
, Guoming Tang
, Deke Guo
, Chuandong Li
, Yan Gan
, Baoping Zhou, Yulong Shen
:
Quantifying Privacy Risks of Behavioral Semantics in Mobile Communication Services. 1908-1923 - Hanyong Liu
, Lei Xu
, Xiaoning Liu
, Lin Mei
, Chungen Xu
:
Query Correlation Attack Against Searchable Symmetric Encryption With Supporting for Conjunctive Queries. 1924-1936 - Yongxiang Li
, Yuan Sun
, Yang Qin
, Dezhong Peng
, Xi Peng
, Peng Hu
:
Robust Duality Learning for Unsupervised Visible-Infrared Person Re-Identification. 1937-1948 - Jinhao Zhou
, Jun Wu
, Jianbing Ni
, Yuntao Wang
, Yanghe Pan
, Zhou Su
:
Protecting Your Attention During Distributed Graph Learning: Efficient Privacy-Preserving Federated Graph Attention Network. 1949-1964 - Yixuan Wu
, Long Zhang
, Lin Yang
, Feng Yang, Linru Ma
, Zhoumin Lu
, Wen Jiang
:
Intrusion Detection for Internet of Things: An Anchor Graph Clustering Approach. 1965-1980 - Xintao Pei
, Yuling Chen
, Yangyang Long
, Haiwei Sang, Yun Luo:
Einocchio: Efficiently Outsourcing Polynomial Computation With Verifiable Computation and Optimized Newton Interpolation. 1981-1992 - Likai Wang
, Xiangqun Zhang
, Ruize Han
, Yanjie Wei
, Song Wang
, Wei Feng
:
A New Benchmark and Algorithm for Clothes-Changing Video Person Re-Identification. 1993-2005 - Changsong Jiang
, Chunxiang Xu
, Guomin Yang
, Zhao Zhang
, Jie Chen
:
Device-Enhanced Password-Based Threshold Single-Sign-On Authentication. 2006-2021 - Anlin Chen
, Shengling Wang
, Hongwei Shi
, Yu Guo
, Xiuzhen Cheng
:
Reconnaissance-Strike Complex: A Network-Layer Solution to the Natural Forking in Blockchain. 2022-2034 - Zhong Li
, Xueting Yang
, Changjun Jiang
:
Multi-View Graph-Based Hierarchical Representation Learning for Money Laundering Group Detection. 2035-2050 - Ala Gouissem
, Shaimaa Hassanein
, Khalid Abualsaud
, Elias Yaacoub
, M. Mabrok, M. Abdallah, Tamer Khattab
, Mohsen Guizani
:
Low Complexity Byzantine-Resilient Federated Learning. 2051-2066 - Yankai Rong
, Guoshun Nan
, Minwei Zhang
, Sihan Chen
, Songtao Wang, Xuefei Zhang
, Nan Ma
, Shixun Gong
, Zhaohui Yang
, Qimei Cui
, Xiaofeng Tao
, Tony Q. S. Quek
:
Semantic Entropy Can Simultaneously Benefit Transmission Efficiency and Channel Security of Wireless Semantic Communications. 2067-2082 - Rama Krishna Koppanati
, Monika Santra
, Sateesh Kumar Peddoju
:
D24D: Dynamic Deep 4-Dimensional Analysis for Malware Detection. 2083-2095 - Zhuoran Ma
, Xinyi Huang, Zhuzhu Wang
, Zhan Qin
, Xiangyu Wang
, Jianfeng Ma
:
FedGhost: Data-Free Model Poisoning Enhancement in Federated Learning. 2096-2108 - Sisung Liu
, Jeong Gyu Park
, Hyeongsik Kim
, Je Hyeong Hong
:
A Cross-Attention Multi-Scale Performer With Gaussian Bit-Flips for File Fragment Classification. 2109-2121 - Mingping Qi
, Chi Chen
:
HPQKE: Hybrid Post-Quantum Key Exchange Protocol for SSH Transport Layer From CSIDH. 2122-2131 - Huazhong Zhao, Lei Qi
, Xin Geng
:
CILP-FGDI: Exploiting Vision-Language Model for Generalizable Person Re-Identification. 2132-2142 - Huajie Chen
, Tianqing Zhu
, Lefeng Zhang
, Bo Liu
, Derui Wang
, Wanlei Zhou
, Minhui Xue
:
QUEEN: Query Unlearning Against Model Extraction. 2143-2156 - Ruichao Liang
, Jing Chen
, Cong Wu
, Kun He
, Yueming Wu
, Ruochen Cao, Ruiying Du
, Ziming Zhao, Yang Liu
:
Vulseye: Detect Smart Contract Vulnerabilities via Stateful Directed Graybox Fuzzing. 2157-2170 - Yongluo Liu
, Zun Li, Lifang Wu
:
Dual Consistency Regularization for Generalized Face Anti-Spoofing. 2171-2183 - Yuxuan Qiu
, Liyang Wang
, Wei Song
, Jiawei Liu
, Zhi-Ping Shi
, Na Jiang
:
Advancing Visible-Infrared Person Re-Identification: Synergizing Visual-Textual Reasoning and Cross-Modal Feature Alignment. 2184-2196 - Jiahao Liu
, Caihui Du, Jihong Yu
, Jiangchuan Liu
, Huan Qi:
No Time for Remodulation: A PHY Steganographic Symbiotic Channel Over Constant Envelope. 2197-2211 - Fucai Luo
, Xingfu Yan
, Haining Yang
, Xiaofan Zheng
:
PAEWS: Public-Key Authenticated Encryption With Wildcard Search Over Outsourced Encrypted Data. 2212-2223 - Kai Zhang
, Pei-Wei Tsai
, Jiao Tian, Wenyu Zhao, Ke Yu, Hongwang Xiao, Xinyi Cai, Longxiang Gao
, Jinjun Chen
:
DPNM: A Differential Private Notary Mechanism for Privacy Preservation in Cross-Chain Transactions. 2224-2236 - Lifan Hu, Yu Wang
, Xue Fu
, Lantu Guo
, Yun Lin
, Guan Gui
:
Energy-Efficient Wireless Technology Recognition Method Using Time-Frequency Feature Fusion Spiking Neural Networks. 2252-2265 - Qinghua Mao
, Xi Lin
, Wenchao Xu
, Yuxin Qi
, Xiu Su
, Gaolei Li
, Jianhua Li
:
FeCoGraph: Label-Aware Federated Graph Contrastive Learning for Few-Shot Network Intrusion Detection. 2266-2280 - Denise Moussa
, Germans Hirsch
, Christian Riess
:
EnvId: A Metric Learning Approach for Forensic Few-Shot Identification of Unseen Environments. 2281-2296 - Ya-Ting Yang
, Tao Zhang
, Quanyan Zhu
:
Herd Accountability of Privacy-Preserving Algorithms: A Stackelberg Game Approach. 2237-2251 - Shuangrui Zhao
, Jia Liu
, Yulong Shen
, Xiaohong Jiang
, Tarik Taleb
, Norio Shiratori
:
On the Impact of Warden Collusion on Covert Communication in Wireless Networks. 2297-2312 - Xueman Wang
, Yipeng Wang
, Yingxu Lai
, Zhiyu Hao
, Alex X. Liu
:
Reliable Open-Set Network Traffic Classification. 2313-2328 - Zijie Lou, Gang Cao
, Kun Guo, Lifang Yu
, Shaowei Weng
:
Exploring Multi-View Pixel Contrast for General and Robust Image Forgery Localization. 2329-2341 - Qi Liu, Chengcheng Zhao
, Mengxiang Liu
, Ruilong Deng
, Peng Cheng
:
Submodularity-Based False Data Injection Attack Strategy in DC Microgrids. 2342-2356 - Huafeng Li
, Yaoxin Liu, Yafei Zhang
, Jinxing Li
, Zhengtao Yu
:
Breaking the Paired Sample Barrier in Person Re-Identification: Leveraging Unpaired Samples for Domain Generalization. 2357-2371 - Mingtian Zhang
, Anjia Yang
, Jian Weng
, Min-Rong Chen
, Huang Zeng, Yi Liu
, Xiaoli Liu
, Zhihua Xia
:
Efficient and Privacy-Preserving Ride Matching Over Road Networks Against Malicious ORH Server. 2372-2386 - Xiao Li
, Hang Chen
, Xiaolin Hu
:
On the Importance of Backbone to the Adversarial Robustness of Object Detectors. 2387-2398 - Marios Aristodemou
, Xiaolan Liu
, Yuan Wang
, Konstantinos G. Kyriakopoulos, Sangarapillai Lambotharan
, Qingsong Wei
:
Maximizing Uncertainty for Federated Learning via Bayesian Optimization-Based Model Poisoning. 2399-2411 - Ying Zhao
, Kai Zhang
, Longxiang Gao
, Jinjun Chen
:
Privacy and Fairness Analysis in the Post-Processed Differential Privacy Framework. 2412-2423 - S. V. Dilip Kumar
, Josep Balasch
, Benedikt Gierlichs
, Ingrid Verbauwhede
:
Low-Cost First-Order Secure Boolean Masking in Glitchy Hardware. 2437-2449 - Jingjing Xue
, Sheng Sun
, Min Liu
, Qi Li
, Ke Xu
:
Enhancing Federated Learning Robustness Using Locally Benignity-Assessable Bayesian Dropout. 2464-2479 - Boan Yu
, Jun Zhao
, Kai Zhang
, Junqing Gong
, Haifeng Qian
:
Lightweight and Dynamic Privacy-Preserving Federated Learning via Functional Encryption. 2496-2508 - Haoyang Wang
, Kai Fan
, Chong Yu
, Kuan Zhang
, Fenghua Li
, Haojin Zhu:
Beyond Access Pattern: Efficient Volume-Hiding Multi-Range Queries Over Outsourced Data Services. 2509-2522 - Marc Dib
, Samuel Pierre:
HSM-Based Architecture to Detect Insider Attacks on Server-Side Data. 2538-2549 - Chaohao Fu
, Hongbin Chen
, Na Ruan
:
Privacy for Free: Spy Attack in Vertical Federated Learning by Both Active and Passive Parties. 2550-2563 - Tao Wang
, Wenying Wen
, Xiangli Xiao
, Zhongyun Hua
, Yushu Zhang
, Yuming Fang
:
Beyond Privacy: Generating Privacy-Preserving Faces Supporting Robust Image Authentication. 2564-2576 - Marvin Xhemrishi
, Johan Östman
, Antonia Wachter-Zeh
, Alexandre Graell i Amat
:
FedGT: Identification of Malicious Clients in Federated Learning With Secure Aggregation. 2577-2592 - Shuoyi Chen
, Mang Ye
, Yan Huang, Bo Du
:
Towards Effective Rotation Generalization in UAV Object Re-Identification. 2593-2606 - Runwen Hu
, Yuhong Wu, Shijun Xiang
, Xiaolong Li
, Yao Zhao
:
Deep Prediction and Efficient 3D Mapping of Color Images for Reversible Data Hiding. 2607-2620 - Zhenhua Chen
, Kaili Long, Junrui Xie
, Qiqi Lai, Yilei Wang, Ni Li
, Luqi Huang
, Aijun Ge:
A New Functional Encryption Scheme Supporting Privacy-Preserving Maximum Similarity for Web Service Platforms. 2621-2631 - Lingzhi Zhao, Jianquan Lu
, Yang Liu
, Jungang Lou
:
Dynamic Event-Triggered Control for Leader-Following Consensus of Nonlinear Multi-Agent Systems Against Malicious Attacks. 2424-2436 - Ali Nikkhah
, Morteza Shoushtari
, Bahareh Akhbari
, Willie K. Harrison
:
Secrecy Coding for the Binary Symmetric Wiretap Channel via Linear Programming. 2450-2463 - Bichen Kang
, Neng Ye
, Jianping An
:
Achieving Positive Rate of Covert Communications Covered by Randomly Activated Overt Users. 2480-2495 - Huici Wu
, Yi Fang
, Na Li
, Xin Yuan
, Zhiqing Wei
, Guoshun Nan
, Xiaofeng Tao
:
Secret Key Generation With Untrusted Internal Eavesdropper: Token-Based Anti-Eavesdropping. 2523-2537 - Guangyong Gao
, Xiaoan Chen
, Li Li
, Zhihua Xia
, Jianwei Fei
, Yun Qing Shi:
Screen-Shooting Robust Watermark Based on Style Transfer and Structural Re-Parameterization. 2648-2663 - Ximing Fu
, Mo Li
, Qingming Zeng, Tianyang Li, Shenghao Yang
, Yonghui Guan, Chuanyi Liu
:
Hamster: A Fast Synchronous Byzantine Fault Tolerant Protocol. 2664-2676 - Yuanchao Chen, Yuwei Li, Yuliang Lu, Zulie Pan, Yuan Chen, Shouling Ji, Yu Chen, Yang Li, Yi Shen:
Understanding the Security Risks of Websites Using Cloud Storage for Direct User File Uploads. 2677-2692 - Shuo Wang
, Keke Gai
, Jing Yu
, Zijian Zhang
, Liehuang Zhu
:
PraVFed: Practical Heterogeneous Vertical Federated Learning via Representation Learning. 2693-2705 - Ying Gao
, Huanghao Deng
, Zukun Zhu
, Xiaofeng Chen
, Yuxin Xie
, Pei Duan
, Peixuan Chen:
Peafowl: Private Entity Alignment in Multi-Party Privacy-Preserving Machine Learning. 2706-2720 - Keke Gai
, Zijun Wang, Jing Yu
, Liehuang Zhu
:
MUFTI: Multi-Domain Distillation-Based Heterogeneous Federated Continuous Learning. 2721-2733 - Dacan Luo
, Junduan Huang
, Weili Yang
, M. Saad Shakeel
, Wenxiong Kang
:
RSNet: Region-Specific Network for Contactless Palm Vein Authentication. 2734-2747 - Yu Jiang
, Jiyuan Shen, Ziyao Liu
, Chee-Wei Tan
, Kwok-Yan Lam
:
Toward Efficient and Certified Recovery From Poisoning Attacks in Federated Learning. 2632-2647 - Luyang Ying
, Cheng Xiong, Chuan Qin
, Xiangyang Luo
, Zhenxing Qian
, Xinpeng Zhang
:
Generative Collision Attack on Deep Image Hashing. 2748-2762 - Fatih Emre Tosun
, André M. H. Teixeira
, Jingwei Dong
, Anders Ahlén
, Subhrakanti Dey
:
Kullback-Leibler Divergence-Based Observer Design Against Sensor Bias Injection Attacks in Single-Output Systems. 2763-2777 - Lijuan Huo
, Libing Wu
, Enshu Wang, Jinfei Liu
, Chunshuo Li, Zemei Liu, Zhuangzhuang Zhang
:
NTTproofs: A Maintainable and Aggregatable Vector Commitment With Fast Openings and Updates. 2778-2792 - Yu Fu
, Yu Tong, Yijing Ning
, Tianshi Xu
, Meng Li
, Jingqiang Lin
, Dengguo Feng
:
Swift: Fast Secure Neural Network Inference With Fully Homomorphic Encryption. 2793-2806 - Stanislav Kruglik
, Han Mao Kiah
, Son Hoang Dau
, Eitan Yaakobi
:
Recovering Reed-Solomon Codes Privately. 2807-2821 - Charles Gouert
, Dimitris Mouris
, Nektarios Georgios Tsoutsos
:
HELM: Navigating Homomorphic Encryption Through Gates and Lookup Tables. 2822-2835 - Gokularam Muthukrishnan
, Sheetal Kalyani
:
Differential Privacy With Higher Utility by Exploiting Coordinate-Wise Disparity: Laplace Mechanism Can Beat Gaussian in High Dimensions. 2836-2851 - Tinghan Wang, Chenhao Ying
, Jia Wang
, Yuan Luo
:
Information-Theoretic Security Problem in Cluster Distributed Storage Systems: Regenerating Code Against Two General Types of Eavesdroppers. 2852-2867 - Md. Mamunur Rashid
, Yong Xiang
, Md. Palash Uddin
, Jine Tang
, Keshav Sood
, Longxiang Gao
:
Trustworthy and Fair Federated Learning via Reputation-Based Consensus and Adaptive Incentives. 2868-2882 - Shuai Tang
, Peisong He
, Haoliang Li
, Wei Wang, Xinghao Jiang
, Yao Zhao
:
Towards Extensible Detection of AI-Generated Images via Content-Agnostic Adapter-Based Category-Aware Incremental Learning. 2883-2898 - Tianyu Zhaolu
, Zhiguo Wan
, Huaqun Wang
:
Post-Quantum Rollup: Falcon Signature Aggregation Based on SNARG With Enhanced Gates. 2899-2914 - Zhaoyi Meng
, Jiale Zhang, Jiaqi Guo, Wansen Wang
, Wenchao Huang
, Jie Cui
, Hong Zhong
, Yan Xiong
:
Detecting Android Malware by Visualizing App Behaviors From Multiple Complementary Views. 2915-2929 - Xueji Yang
, Fei Tong
, Fang Jiang, Guang Cheng
:
A Lightweight and Dynamic Open-Set Intrusion Detection for Industrial Internet of Things. 2930-2943 - Zhiqi Pang
, Lingling Zhao, Yang Liu
, Gaurav Sharma, Chunyu Wang
:
Joint Augmentation and Part Learning for Unsupervised Clothing Change Person Re-Identification. 2944-2956 - Weijie Xiong
, Jingran Lin
, Zhiling Xiao
, Qiang Li
:
Constant-Modulus Secure Analog Beamforming for an IRS-Assisted Communication System With Large-Scale Antenna Array. 2957-2969 - Qi Liu
, Xiaojie Guo
, Kang Yang
, Yu Yu
:
Labeled Private Set Intersection From Distributed Point Function. 2970-2983 - Ruonan Chen
, Yang Zhang, Dawei Li
, Yizhong Liu
, Jianwei Liu
, Qianhong Wu
, Jianying Zhou
, Willy Susilo
:
Bitcoin-Compatible Privacy-Preserving Multi-Party Payment Channels Supporting Variable Amounts. 2984-2998 - Yuhan Chai
, Ximing Chen
, Jing Qiu
, Lei Du
, Yanjun Xiao, Qiying Feng, Shouling Ji
, Zhihong Tian
:
MalFSCIL: A Few-Shot Class-Incremental Learning Approach for Malware Detection. 2999-3014 - Chenyang Wang, Yan Yan
, Jing-Hao Xue
, Hanzi Wang
:
I2OL-Net: Intra-Inter Objectness Learning Network for Point-Supervised X-Ray Prohibited Item Detection. 3045-3059 - Kaixiang Liu
, Yongfang Xie
, Shiwen Xie
, Yuqi Chen, Xin Chen
, Limin Sun
, Zhiwen Pan:
SecureSIS: Securing SIS Safety Functions With Safety Attributes and BPCS Information. 3060-3073 - Yansen Xin
, Hui Ma
, Rui Zhang
:
Hodor: Robust Fine-Grained Information Flow Control With Full Data Traffic Protection for Cloud-Edge Computing. 3074-3087 - Daniel Günther
, Marco Holz, Benjamin Judkewitz, Helen Möllering
, Benny Pinkas, Thomas Schneider
, Ajith Suresh
:
Privacy-Preserving Epidemiological Modeling on Mobile Graphs. 3088-3101 - Jiaxin Mi
, Qi Li
, Zewei Han
, Weilue Liao, Junsong Fu
:
Graph Learning on Instruction Stream-Augmented CFG for Malware Variant Detection. 3015-3030 - Mehedi Hassan
, Mehmet Engin Tozal
, Vipin Swarup
, Steven Noel
, Raju Gottumukkala
, Vijay Raghavan
:
Detecting Anomalous Communication Behaviors in Dynamically Evolving Networked Systems. 3031-3044 - Xiangyun Tang
, Luyao Peng
, Yu Weng
, Meng Shen
, Liehuang Zhu
, Robert H. Deng
:
Enforcing Differential Privacy in Federated Learning via Long-Term Contribution Incentives. 3102-3115 - Jiajun Chen
, Chunqiang Hu
, Weihong Sheng
, Tao Xiang
, Pengfei Hu
, Jiguo Yu
:
Sensitivity-Aware Personalized Differential Privacy Guarantees for Online Social Networks. 3116-3130 - Zhixuan Zhang
, Xingjian Zheng
, Linbo Qing
, Qi Liu
, Pingyu Wang, Yu Liu
, Jiyang Liao
:
A Stable and Efficient Data-Free Model Attack With Label-Noise Data Generation. 3131-3145 - Kuan Liu
, Jianting Ning
, Pengfei Wu
, Shengmin Xu
, Rongmao Chen
:
TLARDA: Threshold Label-Aggregating Remote Data Auditing in Decentralized Environment. 3146-3160 - Xin Zhang, Kejiang Chen
, Na Zhao, Weiming Zhang
, Nenghai Yu
:
Provably Secure Public-Key Steganography Based on Admissible Encoding. 3161-3175 - Yang Yang
, Haihui Fan
, Jinchao Zhang
, Bo Li, Hui Ma
, Xiaoyan Gu
:
SMSSE: Size-Pattern Mitigation Searchable Symmetric Encryption. 3176-3189 - Serhat Bakirtas
, Elza Erkip
:
Distribution-Agnostic Database De-Anonymization Under Obfuscation and Synchronization Errors. 3190-3203 - Chao Zha
, Zhiyu Wang
, Yifei Fan, Bing Bai
, Yinjie Zhang
, Sainan Shi
, Ruyun Zhang
:
A-NIDS: Adaptive Network Intrusion Detection System Based on Clustering and Stacked CTGAN. 3204-3219 - Jie Zhang
, Futai Zhang
, Xinyi Huang
:
Theory and Applications of Sequentially Threshold Public-Key Cryptography: Practical Private Key Safeguarding and Secure Use for Individual Users. 3220-3233 - Yongliang Xu
, Hang Cheng
, Jiguo Li
, Ximeng Liu
, Xinpeng Zhang
, Meiqing Wang
:
Lightweight Multi-User Public-Key Authenticated Encryption With Keyword Search. 3234-3246 - Minhong Sun
, Jiazhong Teng
, Xinyuan Liu
, Wei Wang
, Xingru Huang
:
Few-Shot Specific Emitter Identification: A Knowledge, Data, and Model-Driven Fusion Framework. 3247-3259 - Junpeng Zhang
, Hui Zhu
, Jiaqi Zhao
, Rongxing Lu
, Yandong Zheng
, Jiezhen Tang
, Hui Li
:
COKV: Key-Value Data Collection With Condensed Local Differential Privacy. 3260-3273 - Weiqi Dai
, Yang Zhou, Xiaohai Dai
, Kim-Kwang Raymond Choo
, Xia Xie, Deqing Zou
, Hai Jin
:
CR-DAP: A Comprehensive and Regulatory Decentralized Anonymous Payment System. 3274-3286 - Chao Pan
, Donghui Hu
, Yaofei Wang
, Kejiang Chen
, Yinyin Peng, Xianjin Rong, Chen Gu
, Meng Li
:
Rethinking Prefix-Based Steganography for Enhanced Security and Efficiency. 3287-3301 - Siquan Huang
, Yijiang Li, Xingfu Yan
, Ying Gao
, Chong Chen
, Leyu Shi
, Biao Chen, Wing W. Y. Ng
:
Scope: On Detecting Constrained Backdoor Attacks in Federated Learning. 3302-3315 - Xiao-Yu Yue
, Jiang-Wen Xiao
, Xiaokang Liu
, Yan-Wu Wang
:
Differentially Private Linearized ADMM Algorithm for Decentralized Nonconvex Optimization. 3316-3329 - Luming Yang
, Yongjun Wang, Lin Liu
, Junjie Huang
, Jiangyong Shi
, Shaojing Fu
, Shize Guo
:
unFlowS: An Unsupervised Construction Scheme of Flow Spectrum for Network Traffic Detection. 3330-3345 - Yan Zhang
, Chunsheng Gu
, Peizhong Shi
, Zhengjun Jing
, Bing Li
, Bo Liu
:
Bring Your Device Group (BYDG): Efficient and Privacy-Preserving User-Device Authentication Protocol in Multi-Access Edge Computing. 3346-3361 - Adrián Tobar Nicolau
, Javier Parra-Arnau, Jordi Forné
, Vicenç Torra
:
Uncoordinated Syntactic Privacy: A New Composable Metric for Multiple, Independent Data Publishing. 3362-3373 - Hongliang He
, Nengcheng Chen
:
Parallel PAM for Secure Transmission. 3374-3386 - Jianfeng Du
, Zhu Wang
, Aimin Yu
:
Revisiting the Masking Strategy: A Side-Channel Attack on CRYSTALS-Kyber. 3387-3399 - Mahdi Alehdaghi
, Arthur Josi
, Rafael M. O. Cruz
, Pourya Shamsolmoali
, Eric Granger
:
Adaptive Generation of Privileged Intermediate Information for Visible-Infrared Person Re-Identification. 3400-3413 - Tingxu Han
, Weisong Sun
, Ziqi Ding
, Chunrong Fang
, Hanwei Qian
, Jiaxun Li
, Zhenyu Chen
, Xiangyu Zhang
:
Mutual Information Guided Backdoor Mitigation for Pre-Trained Encoders. 3414-3428 - Haoran Zha
, Hanhong Wang, Yu Wang
, Zhi Sun
, Guan Gui
, Yun Lin
:
Enhancing Security in 5G NR With Channel-Robust RF Fingerprinting Leveraging SRS for Cross-Domain Stability. 3429-3444 - Tianchi Liao
, Lele Fu
, Lei Zhang
, Lei Yang
, Chuan Chen
, Michael Kwok-Po Ng
, Huawei Huang
, Zibin Zheng
:
Privacy-Preserving Vertical Federated Learning With Tensor Decomposition for Data Missing Features. 3445-3460 - Wenke Huang
, Mang Ye
, Zekun Shi, He Li
, Bo Du
:
Kindle Federated Generalization With Domain Specialized and Invariant Knowledge. 3461-3474 - Yunlong He
, Jia Yu
:
Toward Secure Weighted Aggregation for Privacy-Preserving Federated Learning. 3475-3488 - Jian-Wei Li
, Wen-Ze Shao
, Yubao Sun
, Li-Qian Wang
, Qi Ge
, Liang Xiao:
Boosting Adversarial Transferability via Relative Feature Importance-Aware Attacks. 3489-3504 - Luyao Wang
, Hao Guo, Weibin Wu
, Lu Zhou
:
Efficient and Privacy-Preserving Feature Selection Based on Multiparty Computation. 3505-3518 - Xiaoyu Shen
, Tao Zhang
, Hao Wu
, Xiaoqiang Qiao
, Yihang Du
, Guan Gui
:
An Adaptive Domain-Incremental Framework With Knowledge Replay and Domain Alignment for Specific Emitter Identification. 3519-3533 - Yansong Zhang
, Xiaojun Chen
, Ye Dong
, Qinghui Zhang
, Rui Hou
, Qiang Liu
, Xudong Chen
:
MD-SONIC: Maliciously-Secure Outsourcing Neural Network Inference With Reduced Online Communication. 3534-3549 - Marco Spanghero
, Filip Geib, Ronny Panier, Panos Papadimitratos
:
GNSS Jammer Localization and Identification With Airborne Commercial GNSS Receivers. 3550-3565 - Shuyi Li
, Bob Zhang
, Qinghua Hu
:
Dual-Cohesion Metric Learning for Few-Shot Hand-Based Multimodal Recognition. 3566-3575 - Teddy Furon
:
On the Vulnerability of Retrieval in High Intrinsic Dimensionality Neighborhood. 3576-3586 - Zekun Sun
, Na Ruan
, Jianhua Li
:
DDL: Effective and Comprehensible Interpretation Framework for Diverse Deepfake Detectors. 3601-3615 - Yuanyuan Ma
, Lige Xu, Qianqian Zhang, Yi Zhang
, Xianwei Xin, Xiangyang Luo
:
EIS-OBEA: Enhanced Image Steganalysis via Opposition-Based Evolutionary Algorithm. 3616-3631 - Xue Chen
, Shang Gao
, Shiyuan Xu
, Liquan Chen
, Siu-Ming Yiu
, Bin Xiao
:
From Σ-Protocol-Based Signatures to Ring Signatures: General Construction and Applications. 3646-3661 - Tianhua Xu
, Sheng-hua Zhong
, Zhi Zhang
, Yan Liu:
Intellectual Property Protection for Deep Models: Pioneering Cross-Domain Fingerprinting Solutions. 3587-3600 - Jiayi Chen, Zhufang Kuang
, Yuhao Zhang
, Siyu Lin
, Anfeng Liu
:
Blockchain-Enabled Computing Offloading and Resource Allocation in Multi-UAVs MEC Network: A Stackelberg Game Learning Approach. 3632-3645 - Jie Cai
, Jiachi Chen
, Tao Zhang
, Xiapu Luo
, Xiaobing Sun
, Bin Li:
Detecting Reentrancy Vulnerabilities for Solidity Smart Contracts With Contract Standards-Based Rules. 3662-3676 - Syed Shafiulla
, Manas Kumar Jena
:
A Dynamic State Estimation-Based Cyberattack Detection Scheme to Supervise Legacy Pilot Protection Operation. 3677-3688 - Xin Zhao
, Mu Zhang, Xiaopeng Ke
, Yu Pan
, Yue Duan, Sheng Zhong
, Fengyuan Xu
:
DeepVMUnProtect: Neural Network-Based Recovery of VM-Protected Android Apps for Semantics-Aware Malware Detection. 3689-3704 - Le Cheng
, Peican Zhu
, Keke Tang
, Chao Gao
, Zhen Wang
:
Efficient Source Detection in Incomplete Networks via Sensor Deployment and Source Approaching. 3705-3716 - Jianhua Liu
, Xin Wang
, Kui Ren
, Yiyi Zhou, Minglu Li
:
Secure Service Function Chain Provisioning for Task Offloading in Device-Edge-Cloud Computing. 3717-3730 - Yongchao Meng
, Peihan Qi
, Shilian Zheng
, Zihao Cai, Xiaoyu Zhou
, Tao Jiang
:
Adversarial Attack and Reliable Defense Based on Frequency Domain Feature Enhancement for Automatic Modulation Classification. 3731-3744 - Zhilin Wang
, Qin Hu
, Xukai Zou, Pengfei Hu
, Xiuzhen Cheng
:
Can We Trust the Similarity Measurement in Federated Learning? 3758-3771 - Chengze Jiang
, Junkai Wang, Minjing Dong
, Jie Gui
, Xinli Shi
, Yuan Cao
, Yuan Yan Tang
, James Tin-Yau Kwok
:
Improving Fast Adversarial Training via Self-Knowledge Guidance. 3772-3787 - Zhihao Wang
, Lei Xue
, Xiapu Luo
, Xiaobo Ma
, Guofei Gu
:
Driving State-Aware Anomaly Detection for Autonomous Vehicles. 3788-3803 - Euibum Lee
, Dong-Hoon Choi
, Taesik Nam
, Inhwan Kim
, Youngjae Yu
, Jong-Gwan Yook
:
Complete Coherent Demodulation and Recovery of Spread Spectrum Clocking-Based Electromagnetic Information Leakage: Theory and Demonstration. 3804-3818 - Xiaoxiao Miao
, Ruijie Tao
, Chang Zeng
, Xin Wang
:
A Benchmark for Multi-Speaker Anonymization. 3819-3833 - Yuxin Xi, Yu Guo
, Shiyuan Xu
, Chengjun Cai, Xiaohua Jia
:
Private Sample Alignment for Vertical Federated Learning: An Efficient and Reliable Realization. 3834-3848 - Cong Li
, Xiaoyu Jiao, Xinyu Feng
, Anyang Hu, Qingni Shen
, Zhonghai Wu
:
Identity-Based Chameleon Hashes in the Standard Model for Mobile Devices. 3849-3861 - Mengxiang Liu
, Zhongda Chu
, Fei Teng
:
Cyber Recovery From Dynamic Load Altering Attacks: Linking Electricity, Transportation, and Cyber Networks. 3862-3876 - Li Yang
, Yinbin Miao
, Ziteng Liu
, Zhiquan Liu
, Xinghua Li
, Da Kuang
, Hongwei Li
, Robert H. Deng
:
Enhanced Model Poisoning Attack and Multi-Strategy Defense in Federated Learning. 3877-3892 - Andrey V. Galichin, Mikhail Pautov
, Alexey Zhavoronkin, Oleg Y. Rogov
, Ivan V. Oseledets:
GLiRA: Closed-Box Membership Inference Attack via Knowledge Distillation. 3893-3906 - Jiahui Wu
, Fucai Luo
, Tiecheng Sun
, Weizhe Zhang
:
Vulnerabilities of NSPFL: Privacy-Preserving Federated Learning With Data Integrity Auditing. 3907-3908 - Yihao Huang
, Xin Luo
, Qing Guo
, Felix Juefei-Xu
, Xiaojun Jia
, Weikai Miao, Geguang Pu
, Yang Liu
:
Scale-Invariant Adversarial Attack Against Arbitrary-Scale Super-Resolution. 3909-3924 - Miaomiao Tian
, Chuang Gao, Long Chen
, Hong Zhong
, Jie Chen
:
Proofs of Retrievability With Public Verifiability From Lattices. 3925-3935 - Jingdan Kang, Haoxin Yang
, Yan Cai, Huaidong Zhang
, Xuemiao Xu
, Yong Du
, Shengfeng He
:
SITA: Structurally Imperceptible and Transferable Adversarial Attacks for Stylized Image Generation. 3936-3949 - Yi Yu
, Song Xia, Xun Lin
, Chenqi Kong
, Wenhan Yang
, Shijian Lu
, Yap-Peng Tan, Alex C. Kot
:
Toward Model Resistant to Transferable Adversarial Examples via Trigger Activation. 3745-3757 - Jianfei Sun
, Guowen Xu
, Yang Yang
, Xuehuan Yang, Xiaoguo Li
, Cong Wu
, Zhen Liu
, Guomin Yang
, Robert H. Deng
:
Forward-Secure Hierarchical Delegable Signature for Smart Homes. 3950-3965 - Ziyao Liu
, Huanyi Ye
, Yu Jiang
, Jiyuan Shen
, Jiale Guo
, Ivan Tjuawinata
, Kwok-Yan Lam
:
Privacy-Preserving Federated Unlearning With Certified Client Removal. 3966-3978 - Aishan Liu
, Yuguang Zhou
, Xianglong Liu
, Tianyuan Zhang
, Siyuan Liang, Jiakai Wang, Yanjun Pu
, Tianlin Li
, Junqi Zhang
, Wenbo Zhou
, Qing Guo
, Dacheng Tao
:
Compromising LLM Driven Embodied Agents With Contextual Backdoor Attacks. 3979-3994 - Zhaosen Shi
, Fagen Li
, Dong Hao
, Qinshuo Sun
:
Handwritten Signature Verification via Multimodal Consistency Learning. 3995-4007 - Qianmei Wu
, Wei Cheng
, Fan Zhang
, Sylvain Guilley
:
Statistical Analysis of Non-Profiling Higher-Order Distinguishers Against Inner Product Masking. 4008-4023 - Zhuoqun Yan
, Wenfang Zhang
, Xiaomin Wang
, Muhammad Khurram Khan
:
Comments on "VCD-FL: Verifiable, Collusion-Resistant, and Dynamic Federated Learning". 4024-4025 - Jalal Ghadermazi
, Soumyadeep Hore
, Ankit Shah
, Nathaniel D. Bastian
:
GTAE-IDS: Graph Transformer-Based Autoencoder Framework for Real-Time Network Intrusion Detection. 4026-4041 - Shuai Zhao
, Junying Zhang
, Xindi Ma
, Qi Jiang
, Zhuo Ma
, Sheng Gao
, Zuobin Ying
, Jianfeng Ma
:
FedWiper: Federated Unlearning via Universal Adapter. 4042-4054 - Kim Hammar
, Tao Li
, Rolf Stadler
, Quanyan Zhu
:
Adaptive Security Response Strategies Through Conjectural Online Learning. 4055-4070 - Yuying Liao
, Xuechen Zhao
, Bin Zhou
, Yanyi Huang:
CapsuleBD: A Backdoor Attack Method Against Federated Learning Under Heterogeneous Models. 4071-4086 - Xin Liu
, Willy Susilo
, Joonsang Baek
:
How to Terminate Service Requests in Outsourcing: A Seamless Solution From Withdrawable Signatures. 4087-4099 - Xiao Cai
, Yanbin Sun
, Xiangpeng Xie
, Nan Wei
, Kaibo Shi
, Huaicheng Yan
, Zhihong Tian
:
Enhancing Networked Control Systems Resilience Against DoS Attacks: A Data-Driven Approach With Adaptive Sampled-Data and Compression. 4100-4109 - Kun Zhang
, Huaguang Zhang
, Yanlong Zhao
, Huai-Ning Wu
, Rong Su
:
Synchronization Learning Scheme of Hybrid Order Adaptive Dynamic Optimizations for Secure Communication. 4110-4120 - Wenrui Cheng
, Qixuan Yuan
, Tiantian Zhu
, Tieming Chen
, Jie Ying
, Aohan Zheng, Mingjun Ma, Chunlin Xiong
, Mingqi Lv
, Yan Chen
:
TAGAPT: Toward Automatic Generation of APT Samples With Provenance-Level Granularity. 4137-4151 - Shihua Sun
, Shridatt Sugrim, Angelos Stavrou
, Haining Wang
:
Partner in Crime: Boosting Targeted Poisoning Attacks Against Federated Learning. 4152-4166 - Cong Zhang
, Liqiang Peng
, Weiran Liu
, Shuaishuai Li
, Meng Hao
, Lei Zhang, Dongdai Lin
:
Charge Your Clients: Payable Secure Computation and Its Applications. 4183-4195 - Rui Yang, Qindong Sun, Han Cao, Chao Shen, Jiaming Cai, Dongzhu Rong:
1+1>2: A Dual-Function Defense Framework for Adversarial Example Mitigation. 4121-4136 - Wenyi Xue, Yang Yang, Minming Huang, Yingjiu Li, HweeHwa Pang, Robert H. Deng:
DkvSSO: Delegatable Keyed-Verification Credentials for Efficient Anonymous Single Sign-On. 4196-4211 - Zhaopin Su, Zhaofang Weng, Guofu Zhang, Chensi Lian, Niansong Wang:
LightGBM-Based Audio Watermarking Robust to Recapturing and Hybrid Attacks. 4212-4227 - Meng Shen, Jinhe Wu, Ke Ye, Ke Xu, Gang Xiong, Liehuang Zhu:
Robust Detection of Malicious Encrypted Traffic via Contrastive Learning. 4228-4242 - Tianming Xie, Wenxiong Kang:
A Random-Binding-Based Bio-Hashing Template Protection Method for Palm Vein Recognition. 4243-4255 - Guangjie Han, Weitao Wang, Zhengwei Xu:
A Multi-Granularity Deep Signal Shrinkage Network for Noise-Robust Specific Emitter Identification. 4256-4264 - Xinyu He, Yuan Zhang, Yaqing Song, Weidong Qiu, Hongwei Li, Qiang Tang:
What Makes a Good Exchange? Privacy-Preserving and Fair Contract Agreement in Data Trading. 4265-4279 - Lingling Wang, Mei Huang, Zhengyin Zhang, Meng Li, Jingjing Wang, Keke Gai:
RaSA: Robust and Adaptive Secure Aggregation for Edge-Assisted Hierarchical Federated Learning. 4280-4295 - Changshuo Wang, Xingyu Gao, Meiqing Wu, Siew-Kei Lam, Shuting He, Prayag Tiwari:
Looking Clearer With Text: A Hierarchical Context Blending Network for Occluded Person Re-Identification. 4296-4307 - Zaiyu Pan, Shuangtian Jiang, Xiao Yang, Hai Yuan, Jun Wang:
Hierarchical Cross-Modal Image Generation for Multimodal Biometric Recognition With Missing Modality. 4308-4321 - Zixuan Ma, Chen Li, Kun Zhang, Bibo Tu:
Towards Unsupervised Time-Series Anomaly Detection for Virtual Cloud Networks. 4322-4337 - Tao Zheng, Qiyu Hou, Xingshu Chen, Hao Ren, Meng Li, Hongwei Li, Changxiang Shen:
Gupacker: Generalized Unpacking Framework for Android Malware. 4338-4352 - Muneeba Asif, Mohammad Kumail Kazmi, Mohammad Ashiqur Rahman, Syed Rafay Hasan, Soamar Homsi:
SHEATH: Defending Horizontal Collaboration for Distributed CNNs Against Adversarial Noise. 4353-4368 - Gaojie Jin, Ronghui Mu, Xinping Yi, Xiaowei Huang, Lijun Zhang:
Invariant Correlation of Representation With Label. 4369-4381 - Jingcheng Zhao, Kaiping Xue, Yingjie Xue, Meng Li, Bin Zhu, Shaoxian Yuan:
Privacy-Preserving Statistical Analysis With Low Redundancy Over Task-Relevant Microdata. 4382-4395 - Jingyi Li, Wenzhong Ou, Bei Ouyang, Shengyuan Ye, Liekang Zeng, Lin Chen, Xu Chen:
Revisiting Location Privacy in MEC-Enabled Computation Offloading. 4396-4407 - Yunna Lv, Long Tang, Dengpan Ye, Caiyun Xie, Jiacheng Deng, Yiheng He, Sipeng Shen:
Three-in-One: Robust Enhanced Universal Transferable Anti-Facial Retrieval in Online Social Networks. 4408-4421 - Keyang Zhang, Chenqi Kong, Shiqi Wang, Anderson Rocha, Haoliang Li:
Image Provenance Analysis via Graph Encoding With Vision Transformer. 4422-4437 - Zixuan Ding, Ding Wang:
HTOTP: Honey Time-Based One-Time Passwords. 4438-4453 - Yiyao Wan, Jiahuan Ji, Fuhui Zhou, Qihui Wu, Tony Q. S. Quek:
From Static Dense to Dynamic Sparse: Vision-Radar Fusion-Based UAV Detection. 4454-4468 - Wanlun Ma, Derui Wang, Yiliao Song, Minhui Xue, Sheng Wen, Zhengdao Li, Yang Xiang:
TrapNet: Model Inversion Defense via Trapdoor. 4469-4483 - Xu Han, Haocong Li, Wei Wang, Haining Wang, Xiaobo Ma, Shouling Ji, Qiang Li:
SoFi: Spoofing OS Fingerprints Against Network Reconnaissance. 4484-4497 - Chengkun Wei, Weixian Li, Chen Gong, Wenzhi Chen:
DC-SGD: Differentially Private SGD With Dynamic Clipping Through Gradient Norm Distribution Estimation. 4498-4511 - Mian Zou, Baosheng Yu, Yibing Zhan, Siwei Lyu, Kede Ma:
Semantic Contextualization of Face Forgery: A New Definition, Dataset, and Detection Method. 4512-4524 - Jiaheng Wei, Yanjun Zhang, Leo Yu Zhang, Chao Chen, Shirui Pan, Kok-Leong Ong, Jun Zhang, Yang Xiang:
Extracting Private Training Data in Federated Learning From Clients. 4525-4540 - Song Bian, Yunhao Fu, Dongxu Zhao, Haowen Pan, Yuexiang Jin, Jiayue Sun, Hui Qiao, Zhenyu Guan:
FHECAP: An Encrypted Control System With Piecewise Continuous Actuation. 4551-4566 - Feng Liu, Jinjiang Yang, Jingcheng Zhao, Yingjie Xue, Kaiping Xue:
Structurally-Encrypted Databases Combined With Filters: Enhanced Security and Rich Queries. 4567-4580 - Xiangkun Wang, Kejiang Chen, Yuang Qi, Ruiheng Liu, Weiming Zhang, Nenghai Yu:
GIFDL: Generated Image Fluctuation Distortion Learning for Enhancing Steganographic Security. 4581-4594 - Juanjuan Weng, Zhiming Luo, Shaozi Li:
Improving Transferable Targeted Adversarial Attack via Normalized Logit Calibration and Truncated Feature Mixing. 4595-4609 - Tiong-Sik Ng, Jihyeon Kim, Andrew Beng Jin Teoh:
Flexible Secure Biometrics: A Protected Modality-Invariant Face-Periocular Recognition System. 4610-4621 - Zheng Chu, David Chieng, Chiew Foong Kwong, Huan Jin, Zhengyu Zhu, Chongwen Huang, Chau Yuen:
Throughput Improvement for RIS-Empowered Wireless Powered Anti-Jamming Communication Networks (WPAJCN). 4622-4637

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.