


default search action
IEEE Transactions on Information Forensics and Security, Volume 20
Volume 20, 2025
- Tong Fu
, Liquan Chen
, Yinghua Jiang, Ju Jia
, Zhangjie Fu
:
Image Steganalysis Based on Dual-Path Enhancement and Fractal Downsampling. 1-16 - Chong Xiao
, Ming Tang
, Sengim Karayalcin
, Wei Cheng
:
LD-PA: Distilling Univariate Leakage for Deep Learning-Based Profiling Attacks. 17-30 - Xin Xie
, Jianan Hong
, Cunqing Hua
, Yanhong Xu
:
Communication Efficient Ciphertext-Field Aggregation in Wireless Networks via Over-the-Air Computation. 31-45 - Jitendra Bhandari
, Jayanth Gopinath, Mohammed Ashraf, Johann Knechtel
, Ozgur Sinanoglu
, Ramesh Karri
:
DEFending Integrated Circuit Layouts. 46-59 - Hong Niu
, Xia Lei
, Jiancheng An
, Lechen Zhang
, Chau Yuen
:
On the Efficient Design of Stacked Intelligent Metasurfaces for Secure SISO Transmission. 60-70 - Yige Liu
, Che Wang, Yiwei Lou
, Yongzhi Cao
, Hanpin Wang:
Attackers Are Not the Same! Unveiling the Impact of Feature Distribution on Label Inference Attacks. 71-86 - Jiachen Yang
, Jipeng Zhang
:
LHADRO: A Robust Control Framework for Autonomous Vehicles Under Cyber-Physical Attacks. 87-100 - Shuping Zhao
, Lunke Fei
, Bob Zhang
, Jie Wen
, Jinrong Cui:
Toward Mobile Palmprint Recognition via Multi-View Hierarchical Graph Learning. 101-113 - Yibiao Lu
, Bingsheng Zhang
, Kui Ren
:
Load-Balanced Server-Aided MPC in Heterogeneous Computing. 114-128 - Liang Xie
, Zhou Su
, Yuntao Wang
, Zhendong Li
:
A Practical Federated Learning Framework With Truthful Incentive in UAV-Assisted Crowdsensing. 129-144 - Weihan Li
, Zongyang Zhang
, Yanpei Guo
, Sherman S. M. Chow
, Zhiguo Wan
:
Succinct Hash-Based Arbitrary-Range Proofs. 145-158 - Rujia Li
, Qin Wang
, Yuanzhao Li, Sisi Duan
, Qi Wang
, David Galindo:
Bringing Smart Contract Confidentiality via Trusted Hardware: Fact and Fiction. 159-174 - Xiaodong Wu
, Henry Yuan
, Xiangman Li, Jianbing Ni
, Rongxing Lu
:
Evaluating Security and Robustness for Split Federated Learning Against Poisoning Attacks. 175-190 - Cheng Wei
, Yang Wang, Kuofeng Gao
, Shuo Shao
, Yiming Li
, Zhibo Wang
, Zhan Qin
:
PointNCBW: Toward Dataset Ownership Verification for Point Clouds via Negative Clean-Label Backdoor Watermark. 191-206 - Naiyu Wang
, Shen Wang
, Meng Li
, Longfei Wu
, Zijian Zhang
, Zhitao Guan
, Liehuang Zhu
:
Balancing Differential Privacy and Utility: A Relevance-Based Adaptive Private Fine-Tuning Framework for Language Models. 207-220 - Jianghong Wei
, Guohua Tian
, Xiaofeng Chen
, Willy Susilo
:
Lightweight 0-RTT Session Resumption Protocol for Constrained Devices. 221-233 - Ruikang Chen, Yan Yan
, Jing-Hao Xue
, Yang Lu
, Hanzi Wang
:
Augmentation Matters: A Mix-Paste Method for X-Ray Prohibited Item Detection Under Noisy Annotations. 234-248 - Xiongjun Guan
, Zhiyu Pan
, Jianjiang Feng
, Jie Zhou
:
Joint Identity Verification and Pose Alignment for Partial Fingerprints. 249-263 - Ruiqi Kong
, He Henry Chen
:
DeepCRF: Deep Learning-Enhanced CSI-Based RF Fingerprinting for Channel-Resilient WiFi Device Identification. 264-278 - Haorui Yan
, Xi Lin
, Shenghong Li
, Hao Peng
, Bo Zhang:
Global or Local Adaptation? Client-Sampled Federated Meta-Learning for Personalized IoT Intrusion Detection. 279-293 - Jing Bai
, Chang Ge
, Zhu Xiao
, Hongbo Jiang
, Tong Li
, Huaji Zhou, Licheng Jiao
:
A Multiscale Discriminative Attack Method for Automatic Modulation Classification. 294-308 - Yue Huang
, Huizhong Li, Yi Sun
, Sisi Duan
:
Byzantine Fault Tolerance With Non-Determinism, Revisited. 309-322 - Pengfei Duan
, Zhaofeng Ma
, Hongmin Gao
, Tian Tian
, Yuqing Zhang
:
Multi-Authority Attribute-Based Encryption Scheme With Access Delegation for Cross Blockchain Data Sharing. 323-337 - Haochen Wang
, Qidi You, Sisi Duan
:
Synchronous Byzantine Agreement With O(n) Messages and O(1) Expected Time. 338-349 - Chenhao Lin
, Xiang Ji, Yulong Yang
, Qian Li
, Zhengyu Zhao
, Zhe Peng
, Run Wang
, Liming Fang
, Chao Shen
:
Hard Adversarial Example Mining for Improving Robust Fairness. 350-363 - Liang Xi
, Runze Li, Menghan Li
, Dehua Miao
, Ruidong Wang
, Zygmunt J. Haas
:
NMFAD: Neighbor-Aware Mask-Filling Attributed Network Anomaly Detection. 364-374 - Shouxu Han
, Jie Liu
, Yi Luo
, Hongping Gan
:
LCMA: A Novel Lightweight Continuous Message Authentication for Cyber-Physical System. 375-390 - Jie Song
, Sijia Zhang, Pengyi Zhang
, Junghoon Park, Yu Gu
, Ge Yu
:
Illicit Social Accounts? Anti-Money Laundering for Transactional Blockchains. 391-404 - Zhiyang Dai, Yansong Gao
, Chunyi Zhou
, Anmin Fu
, Zhi Zhang
, Minhui Xue
, Yifeng Zheng
, Yuqing Zhang
:
Decaf: Data Distribution Decompose Attack Against Federated Learning. 405-420 - Tingting Chai
, Xin Wang
, Ru Li
, Wei Jia
, Xiangqian Wu
:
Joint Finger Valley Points-Free ROI Detection and Recurrent Layer Aggregation for Palmprint Recognition in Open Environment. 421-435 - Ke Li
, Di Wang
, Wenxuan Zhu
, Shaofeng Li
, Quan Wang
, Xinbo Gao
:
Physical Adversarial Patch Attack for Optical Fine-Grained Aircraft Recognition. 436-448 - Roozbeh Sarenche
, Ren Zhang
, Svetla Nikova
, Bart Preneel
:
Selfish Mining Time-Averaged Analysis in Bitcoin: Is Orphan Reporting an Effective Countermeasure? 449-464 - Xiaozhen Lu
, Zihan Liu
, Liang Xiao
, Huaiyu Dai
:
Reinforcement Learning-Based Personalized Differentially Private Federated Learning. 465-477 - K. Naveen Kumar
, C. Krishna Mohan
, Linga Reddy Cenkeramaddi
:
Federated Learning Minimal Model Replacement Attack Using Optimal Transport: An Attacker Perspective. 478-487 - Zeyu Zhao
, Yueneng Wang
, Ke Xu
, Tanfeng Sun
, Xinghao Jiang
:
HEVC Video Adversarial Samples Detection via Joint Features of Compression and Pixel Domains. 488-503 - Decheng Liu
, Tao Chen, Chunlei Peng
, Nannan Wang
, Ruimin Hu, Xinbo Gao
:
Attention Consistency Refined Masked Frequency Forgery Representation for Generalizing Face Forgery Detection. 504-515 - Yinan Hu
, Juntao Chen
, Quanyan Zhu
:
Game-Theoretic Neyman-Pearson Detection to Combat Strategic Evasion. 516-530 - Xueluan Gong
, Shuaike Li
, Yanjiao Chen
, Mingzhe Li
, Rubin Wei, Qian Wang
, Kwok-Yan Lam
:
Augmenting Model Extraction Attacks Against Disruption-Based Defenses. 531-546 - Weiqi Wang
, Zhiyi Tian
, Chenhan Zhang
, Shui Yu
:
SCU: An Efficient Machine Unlearning Scheme for Deep Learning Enabled Semantic Communications. 547-558 - Yuhang Qiu
, Honghui Chen, Xingbo Dong
, Zheng Lin, Iman Yi Liao
, Massimo Tistarelli, Zhe Jin
:
IFViT: Interpretable Fixed-Length Representation for Fingerprint Matching via Vision Transformer. 559-573 - Jianmin Dong
, Datian Peng
, Zhongmin Cai
, Bo Zeng
:
Bilevel Optimized Collusion Attacks Against Gait Recognizer. 574-588 - Shuyu Jiang, Yunxiang Qiu, Xian Mo
, Rui Tang
, Wei Wang
:
An Effective Node Injection Approach for Attacking Social Network Alignment. 589-604 - Yiping Zhang
, Yuntao Shou
, Wei Ai
, Tao Meng
, Keqin Li
:
GroupFace: Imbalanced Age Estimation Based on Multi-Hop Attention Graph Convolutional Network and Group-Aware Margin Optimization. 605-619 - Rujia Li
, Yuanzhao Li, Qin Wang
, Sisi Duan
, Qi Wang
, Mark Ryan:
Accountable Decryption Made Formal and Practical. 620-635 - Xue Chen
, Cheng Wang
, Qing Yang
, Teng Hu
, Changjun Jiang
:
Privacy Passport: Privacy-Preserving Cross-Domain Data Sharing. 636-650 - Yuli Liu
:
Signed Latent Factors for Spamming Activity Detection. 651-664 - Xiaoping Liang
, Zhenjun Tang
, Xianquan Zhang
, Xinpeng Zhang
, Ching-Nung Yang
:
Robust Image Hashing With Weighted Saliency Map and Laplacian Eigenmaps. 665-676 - Jianjin Zhao
, Qi Li
, Zewei Han
, Junsong Fu
, Guoshun Nan
, Meng Shen
, Bharat K. Bhargava
:
ReTrial: Robust Encrypted Malicious Traffic Detection via Discriminative Relation Incorporation and Misleading Relation Correction. 677-692 - Bo Gao
, Weiwei Liu
, Guangjie Liu
, Fengyuan Nie
, Jianan Huang
:
Multi-Level Resource-Coherented Graph Learning for Website Fingerprinting Attacks. 693-708 - Kaiyao Miao, Meng Zhang
, Fanghong Guo
, Rongxing Lu
, Xiaohong Guan
:
Detection of False Data Injection Attacks in Smart Grids: An Optimal Transport-Based Reliable Self-Training Approach. 709-723 - Luqing Wang
, Luyao Guo
, Shaofu Yang
, Xinli Shi
:
Differentially Private Decentralized Optimization With Relay Communication. 724-736 - Jing Yan
, Yuhan Zheng, Xian Yang
, Cailian Chen
, Xinping Guan
:
Privacy-Preserving Localization for Underwater Acoustic Sensor Networks: A Differential Privacy-Based Deep Learning Approach. 737-752 - Tanzim Mahfuz
, Swarup Bhunia
, Prabuddha Chakraborty
:
X-DFS: Explainable Artificial Intelligence Guided Design-for-Security Solution Space Exploration. 753-766 - Xue Gong, Fan Zhang
, Xin-jie Zhao, Jie Xiao
, Shize Guo
:
Key Schedule Guided Persistent Fault Attack. 767-780 - Yuhong Xue
, Zhutian Yang
, Zhilu Wu
, Hu Wang, Guan Gui
:
Online Two-Stage Channel-Based Lightweight Authentication Method for Time-Varying Scenarios. 781-795 - Wenfeng Huang
, Axin Wu
, Shengmin Xu
, Guowen Xu
, Wei Wu
:
EASNs: Efficient Anonymous Social Networks With Enhanced Security and High Scalability. 796-806 - Shuaishuai Zhang
, Jie Huang, Peihao Li
:
Analyze and Improve Differentially Private Federated Learning: A Model Robustness Perspective. 807-821 - Wenrui Yu
, Qiongxiu Li
, Milan Lopuhaä-Zwakenberg
, Mads Græsbøll Christensen
, Richard Heusdens
:
Provable Privacy Advantages of Decentralized Federated Learning via Distributed Optimization. 822-838 - Chengxiang Jin, Jiajun Zhou
, Chenxuan Xie, Shanqing Yu
, Qi Xuan
, Xiaoniu Yang
:
Enhancing Ethereum Fraud Detection via Generative and Contrastive Self-Supervision. 839-853 - Xirong Zhuang
, Lan Zhang
, Chen Tang
, Yaliang Li
:
DeepReg: A Trustworthy and Privacy-Friendly Ownership Regulatory Framework for Deep Learning Models. 854-870 - Kuiyuan Zhang
, Zhongyun Hua
, Yushu Zhang
, Yifang Guo, Tao Xiang
:
Robust AI-Synthesized Speech Detection Using Feature Decomposition Learning and Synthesizer Feature Augmentation. 871-885 - Apollo Albright
, Boris Gelfand
, Michael Dixon
:
Learnability of Optical Physical Unclonable Functions Through the Lens of Learning With Errors. 886-897 - Hangcheng Liu
, Yuan Zhou
, Ying Yang
, Qingchuan Zhao
, Tianwei Zhang
, Tao Xiang
:
Stealthiness Assessment of Adversarial Perturbation: From a Visual Perspective. 898-913 - Haochen Sun
, Tonghe Bai
, Jason Li, Hongyang Zhang
:
zkDL: Efficient Zero-Knowledge Proofs of Deep Learning Training. 914-927 - Zipeng Ye
, Wenjian Luo
, Qi Zhou, Yubo Tang, Zhenqian Zhu, Yuhui Shi
, Yan Jia:
Gradient Inversion of Text-Modal Data in Distributed Learning. 928-943 - Jiancun Wu
, Engang Tian
, Chen Peng
, Zhiru Cao
:
Data-Importance-Aware Attack Strategy Design and Secure Control Countermeasure. 944-954 - Fei Meng
, Leixiao Cheng
:
TSR-ABE: Traceable and Server-Aided Revocable Ciphertext-Policy Attribute-Based Encryption Under Static Assumptions. 955-967 - Chaowei Sun
, Qingyu Su
, Jian Li
:
Secure Tracking Control and Attack Detection for Power Cyber-Physical Systems Based on Integrated Control Decision. 968-979 - Pingyu Wang
, Xingjian Zheng
, Linbo Qing
, Bonan Li, Fei Su
, Zhicheng Zhao
, Honggang Chen
:
DRFormer: A Discriminable and Reliable Feature Transformer for Person Re-Identification. 980-995 - Mingwei Zeng, Jie Cui
, Qingyang Zhang
, Hong Zhong
, Debiao He
:
Efficient Revocable Cross-Domain Anonymous Authentication Scheme for IIoT. 996-1010 - Ziniu Liu
, Han Yu
, Kai Chen
, Aiping Li
:
Privacy-Preserving Generative Modeling With Sliced Wasserstein Distance. 1011-1022 - Yixiao Xu
, Binxing Fang, Mohan Li
, Xiaolei Liu
, Zhihong Tian
:
Query-Efficient Model Inversion Attacks: An Information Flow View. 1023-1036 - Zhenxin Cai, Yu Wang
, Guan Gui
, Jin Sha
:
Toward Robust Radio Frequency Fingerprint Identification via Adaptive Semantic Augmentation. 1037-1048 - Yipeng Liu
, Zhanqing Li
, Xuan Yang
, Xiao Lu, Jing Li, Peng Chen
, Ronghua Liang
:
Test-Time Image Reconstruction for Cross-Device OCT Fingerprint Extraction. 1049-1064 - Shahnewaz Karim Sakib
, George T. Amariucai
, Yong Guan
:
Information Leakage Measures for Imperfect Statistical Information: Application to Non-Bayesian Framework. 1065-1080 - Anmol Kumar
, Mayank Agarwal
:
Reducing Internal Collateral Damage From DDoS Attacks Through Micro-Service Cloud Architecture. 1081-1091 - Yibin Zhang
, Yuchao Liu
, Juzhen Wang, Qi Xuan
, Yun Lin
, Guan Gui
:
Enhancing Specific Emitter Identification: A Semi-Supervised Approach With Deep Cloud and Broad Edge Integration. 1092-1105 - Jia Sun
, Yanfeng Li
, Luyifu Chen
, Houjin Chen
, Minjun Wang
:
Dualistic Disentangled Meta-Learning Model for Generalizable Person Re-Identification. 1106-1118 - Shiyuan Xu
, Xue Chen
, Yu Guo
, Siu-Ming Yiu
, Shang Gao, Bin Xiao
:
Efficient and Secure Post-Quantum Certificateless Signcryption With Linkability for IoMT. 1119-1134 - Qiang Zhang
, Xiongwei Zhang
, Meng Sun
, Jibin Yang
:
A Soft-Contrastive Pseudo Learning Approach Toward Open-World Forged Speech Attribution. 1135-1148 - Jun Feng
, Yefan Wu, Hong Sun
, Shunli Zhang
, Debin Liu
:
Panther: Practical Secure Two-Party Neural Network Inference. 1149-1162 - Wei Wang
, Haipeng Peng
, Junke Duan
, Licheng Wang
, Xiaoya Hu
, Zilin Zhao:
Resilient and Redactable Blockchain With Two-Level Rewriting and Version Detection. 1163-1175 - Lingyan Xue
, Haiping Huang
, Fu Xiao
, Qi Li
, Zhiwei Wang
:
A Privacy-Enhanced Traceable Anonymous Transaction Scheme for Blockchain. 1176-1191 - Yu Tian
, Kunbo Zhang
, Yalin Huang
, Leyuan Wang
, Yue Liu
, Zhenan Sun
:
Cross-Optical Property Image Translation for Face Anti-Spoofing: From Visible to Polarization. 1192-1205 - Bei Li
, Hong Zhong
, Jie Cui
, Chengjie Gu
, Debiao He
:
RRMAC: A Multi-Data Owner Access Control Scheme With Robust Revocation for Co-Owned Data Sharing. 1206-1221 - Kai Liang
, Songze Li, Ming Ding
, Feng Tian
, Youlong Wu
:
Privacy-Preserving Coded Schemes for Multi-Server Federated Learning With Straggling Links. 1222-1236 - Chenhao Wang
, Yang Ming
, Hang Liu
, Yutong Deng, Yi Zhao
, Songnian Zhang
:
Security-Enhanced Data Transmission With Fine-Grained and Flexible Revocation for DTWNs. 1237-1250 - Yuxian Li
, Jian Weng
, Junzuo Lai
, Yingjiu Li
, Jiahe Wu, Ming Li
, Jianfei Sun, Pengfei Wu
, Robert H. Deng
:
AuditPCH: Auditable Payment Channel Hub With Privacy Protection. 1251-1261 - Ming Zheng
, Xiaowen Hu
, Ying Hu
, Xiaoyao Zheng
, Yonglong Luo
:
Fed-UGI: Federated Undersampling Learning Framework With Gini Impurity for Imbalanced Network Intrusion Detection. 1262-1277 - Yingkun Wen
, Yan Huo
, Junhuai Li
, Jin Qian
, Kan Wang
:
Generative Adversarial Network-Aided Covert Communication for Cooperative Jammers in CCRNs. 1278-1289 - Yiming Yang
, Weipeng Hu
, Haifeng Hu
:
Progressive Cross-Modal Association Learning for Unsupervised Visible-Infrared Person Re-Identification. 1290-1304 - Andong Lu
, Chenglong Li
, Tianrui Zha, Xiaofeng Wang
, Jin Tang
, Bin Luo
:
Nighttime Person Re-Identification via Collaborative Enhancement Network With Multi-Domain Learning. 1305-1319 - Licheng Ji
, Jiguo Li
, Yichen Zhang, Yang Lu
:
Verifiable Searchable Symmetric Encryption Over Additive Homomorphism. 1320-1332 - Qi Guo
, Shanmin Pang
, Xiaojun Jia
, Yang Liu
, Qing Guo
:
Efficient Generation of Targeted and Transferable Adversarial Examples for Vision-Language Models via Diffusion Models. 1333-1348 - Huixian Li
, Wenyu Mo
, Chun Shen
, Liaojun Pang
:
EvalComp: Bootstrapping Based on Homomorphic Comparison Function for CKKS. 1349-1361 - Wenjing An, Derui Ding
, Hongli Dong
, Bo Shen
, Lei Sun
:
Privacy-Preserving Distributed Optimization for Economic Dispatch Over Balanced Directed Networks. 1362-1373 - Ying Miao, Keke Gai
, Jing Yu
, Yu-an Tan
, Liehuang Zhu
, Weizhi Meng
:
Blockchain-Empowered Keyword Searchable Provable Data Possession for Large Similar Data. 1374-1389 - Jingwei Chen
, Linhan Yang, Wenyuan Wu, Yang Liu, Yong Feng:
Homomorphic Matrix Operations Under Bicyclic Encoding. 1390-1404 - Changsong Jiang
, Chunxiang Xu
, Xinfeng Dong, Kefei Chen
, Guomin Yang
:
An Efficient Privacy-Preserving Scheme for Weak Password Collection in Internet of Things Against Perpetual Leakage. 1405-1420 - Pengwen Dai
, Jingyu Li
, Dayan Wu
, Peijia Zheng
, Xiaochun Cao
:
TextSafety: Visual Text Vanishing via Hierarchical Context-Aware Interaction Reconstruction. 1421-1433 - Hao Zhang
, Wenqi Shao, Hong Liu, Yongqiang Ma, Ping Luo, Yu Qiao, Nanning Zheng
, Kaipeng Zhang
:
B-AVIBench: Toward Evaluating the Robustness of Large Vision-Language Model on Black-Box Adversarial Visual-Instructions. 1434-1446 - Meng Zhang
, Li Lu
, Yuhan Wu, Zheng Yan, Jiaqi Sun, Feng Lin
, Kui Ren
:
DroneAudioID: A Lightweight Acoustic Fingerprint-Based Drone Authentication System for Secure Drone Delivery. 1447-1461 - Desheng Zheng
, Wuping Ke
, Xiao-Yu Li
, Yaoxin Duan
, Guangqiang Yin
, Fan Min
:
Enhancing the Transferability of Adversarial Attacks via Multi-Feature Attention. 1462-1474 - Cong Wu
, Jianfei Sun
, Jing Chen
, Mamoun Alazab
, Yang Liu
, Yang Xiang
:
$\mathsf{TCG}\text{-}\mathsf{IDS}$ : Robust Network Intrusion Detection via Temporal Contrastive Graph Learning. 1475-1486 - Xiaoyuan Liu
, Hongwei Li
, Guowen Xu
, Xilin Zhang
, Tianwei Zhang
, Jianying Zhou
:
Secure and Lightweight Feature Selection for Horizontal Federated Learning. 1487-1502 - Manlin Wang
, Yao Yao
, Haiyang Ding
, Shihai Shao
, Bin Xia
, Jiangzhou Wang
:
Angle and Distance Discrimination by Utilizing Frequency Conversion Capability of STC-IRS for Covert Communications. 1503-1518 - Zhichao You
, Xuewen Dong
, Shujun Li
, Ximeng Liu, Siqi Ma
, Yulong Shen
:
Local Differential Privacy Is Not Enough: A Sample Reconstruction Attack Against Federated Learning With Local Differential Privacy. 1519-1534 - Dongming Li
, Wanting Ma
, Fuhui Zhou
, Qihui Wu, Derrick Wing Kwan Ng
:
Physical-Layer Key Generation Efficient Beamspace Adaptations in 5G New Radio. 1535-1550 - Aruna Jayasena
, Richard Bachmann
, Prabhat Mishra
:
CiseLeaks: Information Leakage Assessment of Cryptographic Instruction Set Extension Prototypes. 1551-1565 - Vamoua Yachongka
, Hideki Yagi
, Hideki Ochiai
:
Outer Bounds on the CEO Problem With Privacy Constraints. 1566-1581 - Xin Liu
, Yichen Yang
, Kun He
, John E. Hopcroft
:
Parameter Interpolation Adversarial Training for Robust Image Classification. 1613-1623 - Qing Li
, Shanxiang Lyu
, Jinming Wen
:
Optimal Client Selection of Federated Learning Based on Compressed Sensing. 1679-1694 - Rongxin Tu
, Xiangui Kang
, Chee-Wei Tan
, Chi-Hung Chi
, Kwok-Yan Lam
:
All Points Guided Adversarial Generator for Targeted Attack Against Deep Hashing Retrieval. 1695-1709 - Yamei Wang
, Yuexin Zhang
, Ayong Ye
, Jian Shen
, Derui Wang
, Yang Xiang
:
Anonymous and Efficient (t, n)-Threshold Ownership Transfer for Cloud EMRs Auditing. 1710-1723 - Zhaoyang Li
, Zhu Teng
, Baopeng Zhang
, Jianping Fan
:
Bi-Stream Coteaching Network for Weakly-Supervised Deepfake Localization in Videos. 1724-1738 - Junpeng He
, Xiong Li
, Xiaosong Zhang
, Weina Niu
, Fagen Li
:
A Synthetic Data-Assisted Satellite Terrestrial Integrated Network Intrusion Detection Framework. 1739-1754 - Hao Wang
, Zhichao Chen
, Zhaoran Liu
, Haozhe Li
, Degui Yang
, Xinggao Liu, Haoxuan Li:
Entire Space Counterfactual Learning for Reliable Content Recommendations. 1755-1764 - Satyabrat Rath
, Jothi Ramalingam
, Sohham Seal:
A Note on "Secure and Efficient Outsourcing of PCA-Based Face Recognition". 1765-1766 - Kaiyi Pang
, Tao Qi
, Chuhan Wu, Minhao Bai
, Minghu Jiang, Yongfeng Huang
:
ModelShield: Adaptive and Robust Watermark Against Model Extraction Attack. 1767-1782 - Qiaofeng Zhang, Meng Li, Yong Chen, Meng Zhang:
Non-Fragile Robust Security Control Based on Dynamic Threshold Cryptographic Detector for Remote Motor Under Stealthy FDI Attacks. 1783-1793 - Wei Peng, Lei Cui, Wei Cai, Wei Wang, Xiaoyu Cui, Zhiyu Hao, Xiaochun Yun:
Bottom Aggregating, Top Separating: An Aggregator and Separator Network for Encrypted Traffic Understanding. 1794-1806 - You Li, Yan Huo
, Tianhui Zhang
, Zhongguo Zhou, Qinghe Gao
, Tao Yan, Yongning Yang, Tao Jing
:
Distributed Physical Layer Authentication With Dynamic Soft Voting for Smart Distribution Grids. 1807-1821 - Qihua Hu
, Weiping Wang
, Hong Song
, Song Guo
, Jian Zhang
, Shigeng Zhang
:
ASDroid: Resisting Evolving Android Malware With API Clusters Derived From Source Code. 1822-1835 - Xinyue Zhang
, Jiahuan Zhou
, Luxin Yan
, Sheng Zhong
, Xu Zou
:
Hunt Camouflaged Objects via Revealing Mutation Regions. 1836-1851 - Mingzhi Hu
, Hongxia Wang
:
Mutual Information-Optimized Steganalysis for Generative Steganography. 1852-1865 - Xiaofu Chen
, Jiangyi Deng
, Yanjiao Chen
, Chaohao Li, Xin Fang, Cong Liu
, Wenyuan Xu
:
Imprints: Mitigating Watermark Removal Attacks With Defensive Watermarks. 1866-1881 - Bo Yang
, Hengwei Zhang
, Jindong Wang, Yulong Yang
, Chenhao Lin
, Chao Shen
, Zhengyu Zhao
:
Adversarial Example Soups: Improving Transferability and Stealthiness for Free. 1882-1894 - Jie Zhang
, Zhifan Wan
, Lanqing Hu
, Stephen Lin, Shuzhe Wu, Shiguang Shan
:
Collaboratively Self-Supervised Video Representation Learning for Action Recognition. 1895-1907 - Guoying Qiu
, Tiecheng Bai
, Guoming Tang
, Deke Guo
, Chuandong Li
, Yan Gan
, Baoping Zhou, Yulong Shen
:
Quantifying Privacy Risks of Behavioral Semantics in Mobile Communication Services. 1908-1923 - Hanyong Liu
, Lei Xu
, Xiaoning Liu
, Lin Mei
, Chungen Xu
:
Query Correlation Attack Against Searchable Symmetric Encryption With Supporting for Conjunctive Queries. 1924-1936 - Yongxiang Li
, Yuan Sun
, Yang Qin
, Dezhong Peng
, Xi Peng
, Peng Hu
:
Robust Duality Learning for Unsupervised Visible-Infrared Person Re-Identification. 1937-1948 - Jinhao Zhou
, Jun Wu
, Jianbing Ni
, Yuntao Wang
, Yanghe Pan
, Zhou Su
:
Protecting Your Attention During Distributed Graph Learning: Efficient Privacy-Preserving Federated Graph Attention Network. 1949-1964 - Yixuan Wu
, Long Zhang
, Lin Yang
, Feng Yang, Linru Ma
, Zhoumin Lu
, Wen Jiang
:
Intrusion Detection for Internet of Things: An Anchor Graph Clustering Approach. 1965-1980 - Xintao Pei
, Yuling Chen
, Yangyang Long
, Haiwei Sang, Yun Luo:
Einocchio: Efficiently Outsourcing Polynomial Computation With Verifiable Computation and Optimized Newton Interpolation. 1981-1992 - Likai Wang
, Xiangqun Zhang
, Ruize Han
, Yanjie Wei
, Song Wang
, Wei Feng
:
A New Benchmark and Algorithm for Clothes-Changing Video Person Re-Identification. 1993-2005 - Changsong Jiang
, Chunxiang Xu
, Guomin Yang
, Zhao Zhang
, Jie Chen
:
Device-Enhanced Password-Based Threshold Single-Sign-On Authentication. 2006-2021 - Anlin Chen
, Shengling Wang
, Hongwei Shi
, Yu Guo
, Xiuzhen Cheng
:
Reconnaissance-Strike Complex: A Network-Layer Solution to the Natural Forking in Blockchain. 2022-2034 - Zhong Li
, Xueting Yang
, Changjun Jiang
:
Multi-View Graph-Based Hierarchical Representation Learning for Money Laundering Group Detection. 2035-2050 - Ala Gouissem
, Shaimaa Hassanein
, Khalid Abualsaud
, Elias Yaacoub
, M. Mabrok, M. Abdallah, Tamer Khattab
, Mohsen Guizani
:
Low Complexity Byzantine-Resilient Federated Learning. 2051-2066 - Yankai Rong
, Guoshun Nan
, Minwei Zhang
, Sihan Chen
, Songtao Wang, Xuefei Zhang
, Nan Ma
, Shixun Gong
, Zhaohui Yang
, Qimei Cui
, Xiaofeng Tao
, Tony Q. S. Quek
:
Semantic Entropy Can Simultaneously Benefit Transmission Efficiency and Channel Security of Wireless Semantic Communications. 2067-2082 - Rama Krishna Koppanati
, Monika Santra
, Sateesh Kumar Peddoju
:
D24D: Dynamic Deep 4-Dimensional Analysis for Malware Detection. 2083-2095 - Zhuoran Ma
, Xinyi Huang, Zhuzhu Wang
, Zhan Qin
, Xiangyu Wang
, Jianfeng Ma
:
FedGhost: Data-Free Model Poisoning Enhancement in Federated Learning. 2096-2108 - Sisung Liu
, Jeong Gyu Park
, Hyeongsik Kim
, Je Hyeong Hong
:
A Cross-Attention Multi-Scale Performer With Gaussian Bit-Flips for File Fragment Classification. 2109-2121 - Mingping Qi
, Chi Chen
:
HPQKE: Hybrid Post-Quantum Key Exchange Protocol for SSH Transport Layer From CSIDH. 2122-2131 - Huazhong Zhao, Lei Qi
, Xin Geng
:
CILP-FGDI: Exploiting Vision-Language Model for Generalizable Person Re-Identification. 2132-2142 - Huajie Chen
, Tianqing Zhu
, Lefeng Zhang
, Bo Liu
, Derui Wang
, Wanlei Zhou
, Minhui Xue
:
QUEEN: Query Unlearning Against Model Extraction. 2143-2156 - Ruichao Liang
, Jing Chen
, Cong Wu
, Kun He
, Yueming Wu
, Ruochen Cao, Ruiying Du
, Ziming Zhao, Yang Liu
:
Vulseye: Detect Smart Contract Vulnerabilities via Stateful Directed Graybox Fuzzing. 2157-2170 - Yongluo Liu
, Zun Li, Lifang Wu
:
Dual Consistency Regularization for Generalized Face Anti-Spoofing. 2171-2183 - Yuxuan Qiu
, Liyang Wang
, Wei Song
, Jiawei Liu
, Zhi-Ping Shi
, Na Jiang
:
Advancing Visible-Infrared Person Re-Identification: Synergizing Visual-Textual Reasoning and Cross-Modal Feature Alignment. 2184-2196 - Jiahao Liu
, Caihui Du, Jihong Yu
, Jiangchuan Liu
, Huan Qi:
No Time for Remodulation: A PHY Steganographic Symbiotic Channel Over Constant Envelope. 2197-2211 - Fucai Luo
, Xingfu Yan
, Haining Yang
, Xiaofan Zheng
:
PAEWS: Public-Key Authenticated Encryption With Wildcard Search Over Outsourced Encrypted Data. 2212-2223 - Kai Zhang
, Pei-Wei Tsai
, Jiao Tian, Wenyu Zhao, Ke Yu, Hongwang Xiao, Xinyi Cai, Longxiang Gao
, Jinjun Chen
:
DPNM: A Differential Private Notary Mechanism for Privacy Preservation in Cross-Chain Transactions. 2224-2236 - Lifan Hu, Yu Wang
, Xue Fu
, Lantu Guo
, Yun Lin
, Guan Gui
:
Energy-Efficient Wireless Technology Recognition Method Using Time-Frequency Feature Fusion Spiking Neural Networks. 2252-2265 - Qinghua Mao
, Xi Lin
, Wenchao Xu
, Yuxin Qi
, Xiu Su
, Gaolei Li
, Jianhua Li
:
FeCoGraph: Label-Aware Federated Graph Contrastive Learning for Few-Shot Network Intrusion Detection. 2266-2280 - Denise Moussa
, Germans Hirsch
, Christian Riess
:
EnvId: A Metric Learning Approach for Forensic Few-Shot Identification of Unseen Environments. 2281-2296 - Ya-Ting Yang
, Tao Zhang
, Quanyan Zhu
:
Herd Accountability of Privacy-Preserving Algorithms: A Stackelberg Game Approach. 2237-2251 - Shuangrui Zhao
, Jia Liu
, Yulong Shen
, Xiaohong Jiang
, Tarik Taleb
, Norio Shiratori
:
On the Impact of Warden Collusion on Covert Communication in Wireless Networks. 2297-2312 - Xueman Wang
, Yipeng Wang
, Yingxu Lai
, Zhiyu Hao
, Alex X. Liu
:
Reliable Open-Set Network Traffic Classification. 2313-2328 - Zijie Lou, Gang Cao
, Kun Guo, Lifang Yu
, Shaowei Weng
:
Exploring Multi-View Pixel Contrast for General and Robust Image Forgery Localization. 2329-2341 - Qi Liu, Chengcheng Zhao
, Mengxiang Liu
, Ruilong Deng
, Peng Cheng
:
Submodularity-Based False Data Injection Attack Strategy in DC Microgrids. 2342-2356 - Huafeng Li
, Yaoxin Liu, Yafei Zhang
, Jinxing Li
, Zhengtao Yu
:
Breaking the Paired Sample Barrier in Person Re-Identification: Leveraging Unpaired Samples for Domain Generalization. 2357-2371 - Mingtian Zhang
, Anjia Yang
, Jian Weng
, Min-Rong Chen
, Huang Zeng, Yi Liu
, Xiaoli Liu
, Zhihua Xia
:
Efficient and Privacy-Preserving Ride Matching Over Road Networks Against Malicious ORH Server. 2372-2386 - Xiao Li
, Hang Chen
, Xiaolin Hu
:
On the Importance of Backbone to the Adversarial Robustness of Object Detectors. 2387-2398 - Marios Aristodemou
, Xiaolan Liu
, Yuan Wang
, Konstantinos G. Kyriakopoulos, Sangarapillai Lambotharan
, Qingsong Wei
:
Maximizing Uncertainty for Federated Learning via Bayesian Optimization-Based Model Poisoning. 2399-2411 - Ying Zhao
, Kai Zhang
, Longxiang Gao
, Jinjun Chen
:
Privacy and Fairness Analysis in the Post-Processed Differential Privacy Framework. 2412-2423 - S. V. Dilip Kumar
, Josep Balasch
, Benedikt Gierlichs
, Ingrid Verbauwhede
:
Low-Cost First-Order Secure Boolean Masking in Glitchy Hardware. 2437-2449 - Jingjing Xue
, Sheng Sun
, Min Liu
, Qi Li
, Ke Xu
:
Enhancing Federated Learning Robustness Using Locally Benignity-Assessable Bayesian Dropout. 2464-2479 - Boan Yu
, Jun Zhao
, Kai Zhang
, Junqing Gong
, Haifeng Qian
:
Lightweight and Dynamic Privacy-Preserving Federated Learning via Functional Encryption. 2496-2508 - Haoyang Wang
, Kai Fan
, Chong Yu
, Kuan Zhang
, Fenghua Li
, Haojin Zhu:
Beyond Access Pattern: Efficient Volume-Hiding Multi-Range Queries Over Outsourced Data Services. 2509-2522 - Marc Dib
, Samuel Pierre:
HSM-Based Architecture to Detect Insider Attacks on Server-Side Data. 2538-2549 - Chaohao Fu
, Hongbin Chen
, Na Ruan
:
Privacy for Free: Spy Attack in Vertical Federated Learning by Both Active and Passive Parties. 2550-2563 - Tao Wang
, Wenying Wen
, Xiangli Xiao
, Zhongyun Hua
, Yushu Zhang
, Yuming Fang
:
Beyond Privacy: Generating Privacy-Preserving Faces Supporting Robust Image Authentication. 2564-2576 - Marvin Xhemrishi
, Johan Östman, Antonia Wachter-Zeh
, Alexandre Graell i Amat
:
FedGT: Identification of Malicious Clients in Federated Learning With Secure Aggregation. 2577-2592 - Shuoyi Chen
, Mang Ye
, Yan Huang, Bo Du
:
Towards Effective Rotation Generalization in UAV Object Re-Identification. 2593-2606 - Runwen Hu
, Yuhong Wu, Shijun Xiang
, Xiaolong Li
, Yao Zhao
:
Deep Prediction and Efficient 3D Mapping of Color Images for Reversible Data Hiding. 2607-2620 - Zhenhua Chen
, Kaili Long, Junrui Xie
, Qiqi Lai, Yilei Wang, Ni Li
, Luqi Huang
, Aijun Ge:
A New Functional Encryption Scheme Supporting Privacy-Preserving Maximum Similarity for Web Service Platforms. 2621-2631 - Lingzhi Zhao, Jianquan Lu
, Yang Liu
, Jungang Lou
:
Dynamic Event-Triggered Control for Leader-Following Consensus of Nonlinear Multi-Agent Systems Against Malicious Attacks. 2424-2436 - Ali Nikkhah
, Morteza Shoushtari
, Bahareh Akhbari
, Willie K. Harrison
:
Secrecy Coding for the Binary Symmetric Wiretap Channel via Linear Programming. 2450-2463 - Bichen Kang
, Neng Ye
, Jianping An
:
Achieving Positive Rate of Covert Communications Covered by Randomly Activated Overt Users. 2480-2495 - Huici Wu
, Yi Fang
, Na Li
, Xin Yuan
, Zhiqing Wei
, Guoshun Nan
, Xiaofeng Tao
:
Secret Key Generation With Untrusted Internal Eavesdropper: Token-Based Anti-Eavesdropping. 2523-2537 - Guangyong Gao
, Xiaoan Chen
, Li Li
, Zhihua Xia
, Jianwei Fei
, Yun Qing Shi:
Screen-Shooting Robust Watermark Based on Style Transfer and Structural Re-Parameterization. 2648-2663 - Ximing Fu
, Mo Li
, Qingming Zeng, Tianyang Li, Shenghao Yang
, Yonghui Guan, Chuanyi Liu
:
Hamster: A Fast Synchronous Byzantine Fault Tolerant Protocol. 2664-2676 - Yuanchao Chen, Yuwei Li, Yuliang Lu, Zulie Pan, Yuan Chen, Shouling Ji, Yu Chen, Yang Li, Yi Shen:
Understanding the Security Risks of Websites Using Cloud Storage for Direct User File Uploads. 2677-2692 - Shuo Wang
, Keke Gai
, Jing Yu
, Zijian Zhang
, Liehuang Zhu
:
PraVFed: Practical Heterogeneous Vertical Federated Learning via Representation Learning. 2693-2705 - Ying Gao
, Huanghao Deng
, Zukun Zhu
, Xiaofeng Chen
, Yuxin Xie
, Pei Duan
, Peixuan Chen:
Peafowl: Private Entity Alignment in Multi-Party Privacy-Preserving Machine Learning. 2706-2720 - Keke Gai
, Zijun Wang, Jing Yu
, Liehuang Zhu
:
MUFTI: Multi-Domain Distillation-Based Heterogeneous Federated Continuous Learning. 2721-2733 - Dacan Luo
, Junduan Huang
, Weili Yang
, M. Saad Shakeel
, Wenxiong Kang
:
RSNet: Region-Specific Network for Contactless Palm Vein Authentication. 2734-2747 - Yu Jiang
, Jiyuan Shen, Ziyao Liu
, Chee-Wei Tan
, Kwok-Yan Lam
:
Toward Efficient and Certified Recovery From Poisoning Attacks in Federated Learning. 2632-2647 - Luyang Ying
, Cheng Xiong, Chuan Qin
, Xiangyang Luo
, Zhenxing Qian
, Xinpeng Zhang
:
Generative Collision Attack on Deep Image Hashing. 2748-2762 - Fatih Emre Tosun
, André M. H. Teixeira
, Jingwei Dong
, Anders Ahlén
, Subhrakanti Dey
:
Kullback-Leibler Divergence-Based Observer Design Against Sensor Bias Injection Attacks in Single-Output Systems. 2763-2777 - Lijuan Huo
, Libing Wu
, Enshu Wang, Jinfei Liu
, Chunshuo Li, Zemei Liu, Zhuangzhuang Zhang
:
NTTproofs: A Maintainable and Aggregatable Vector Commitment With Fast Openings and Updates. 2778-2792 - Yu Fu
, Yu Tong, Yijing Ning
, Tianshi Xu
, Meng Li
, Jingqiang Lin
, Dengguo Feng
:
Swift: Fast Secure Neural Network Inference With Fully Homomorphic Encryption. 2793-2806 - Stanislav Kruglik
, Han Mao Kiah
, Son Hoang Dau
, Eitan Yaakobi
:
Recovering Reed-Solomon Codes Privately. 2807-2821 - Charles Gouert
, Dimitris Mouris
, Nektarios Georgios Tsoutsos
:
HELM: Navigating Homomorphic Encryption Through Gates and Lookup Tables. 2822-2835 - Gokularam Muthukrishnan
, Sheetal Kalyani
:
Differential Privacy With Higher Utility by Exploiting Coordinate-Wise Disparity: Laplace Mechanism Can Beat Gaussian in High Dimensions. 2836-2851 - Tinghan Wang, Chenhao Ying
, Jia Wang
, Yuan Luo
:
Information-Theoretic Security Problem in Cluster Distributed Storage Systems: Regenerating Code Against Two General Types of Eavesdroppers. 2852-2867 - Md. Mamunur Rashid
, Yong Xiang
, Md. Palash Uddin
, Jine Tang
, Keshav Sood
, Longxiang Gao
:
Trustworthy and Fair Federated Learning via Reputation-Based Consensus and Adaptive Incentives. 2868-2882 - Shuai Tang
, Peisong He
, Haoliang Li
, Wei Wang, Xinghao Jiang
, Yao Zhao
:
Towards Extensible Detection of AI-Generated Images via Content-Agnostic Adapter-Based Category-Aware Incremental Learning. 2883-2898 - Tianyu Zhaolu
, Zhiguo Wan
, Huaqun Wang
:
Post-Quantum Rollup: Falcon Signature Aggregation Based on SNARG With Enhanced Gates. 2899-2914 - Zhaoyi Meng
, Jiale Zhang, Jiaqi Guo, Wansen Wang
, Wenchao Huang
, Jie Cui
, Hong Zhong
, Yan Xiong
:
Detecting Android Malware by Visualizing App Behaviors From Multiple Complementary Views. 2915-2929 - Xueji Yang
, Fei Tong
, Fang Jiang, Guang Cheng
:
A Lightweight and Dynamic Open-Set Intrusion Detection for Industrial Internet of Things. 2930-2943 - Zhiqi Pang
, Lingling Zhao, Yang Liu
, Gaurav Sharma, Chunyu Wang
:
Joint Augmentation and Part Learning for Unsupervised Clothing Change Person Re-Identification. 2944-2956 - Weijie Xiong
, Jingran Lin
, Zhiling Xiao
, Qiang Li
:
Constant-Modulus Secure Analog Beamforming for an IRS-Assisted Communication System With Large-Scale Antenna Array. 2957-2969 - Qi Liu
, Xiaojie Guo
, Kang Yang
, Yu Yu
:
Labeled Private Set Intersection From Distributed Point Function. 2970-2983 - Ruonan Chen
, Yang Zhang, Dawei Li
, Yizhong Liu
, Jianwei Liu
, Qianhong Wu
, Jianying Zhou
, Willy Susilo
:
Bitcoin-Compatible Privacy-Preserving Multi-Party Payment Channels Supporting Variable Amounts. 2984-2998 - Yuhan Chai
, Ximing Chen
, Jing Qiu
, Lei Du
, Yanjun Xiao, Qiying Feng, Shouling Ji
, Zhihong Tian
:
MalFSCIL: A Few-Shot Class-Incremental Learning Approach for Malware Detection. 2999-3014 - Chenyang Wang, Yan Yan
, Jing-Hao Xue
, Hanzi Wang
:
I2OL-Net: Intra-Inter Objectness Learning Network for Point-Supervised X-Ray Prohibited Item Detection. 3045-3059 - Kaixiang Liu
, Yongfang Xie
, Shiwen Xie
, Yuqi Chen, Xin Chen
, Limin Sun
, Zhiwen Pan:
SecureSIS: Securing SIS Safety Functions With Safety Attributes and BPCS Information. 3060-3073 - Yansen Xin
, Hui Ma
, Rui Zhang
:
Hodor: Robust Fine-Grained Information Flow Control With Full Data Traffic Protection for Cloud-Edge Computing. 3074-3087 - Daniel Günther
, Marco Holz, Benjamin Judkewitz, Helen Möllering
, Benny Pinkas, Thomas Schneider
, Ajith Suresh
:
Privacy-Preserving Epidemiological Modeling on Mobile Graphs. 3088-3101 - Jiaxin Mi, Qi Li, Zewei Han, Weilue Liao, Junsong Fu:
Graph Learning on Instruction Stream-Augmented CFG for Malware Variant Detection. 3015-3030 - Mehedi Hassan, Mehmet Engin Tozal, Vipin Swarup, Steven Noel, Raju Gottumukkala, Vijay Raghavan:
Detecting Anomalous Communication Behaviors in Dynamically Evolving Networked Systems. 3031-3044 - Xiangyun Tang, Luyao Peng, Yu Weng, Meng Shen, Liehuang Zhu, Robert H. Deng:
Enforcing Differential Privacy in Federated Learning via Long-Term Contribution Incentives. 3102-3115 - Jiajun Chen, Chunqiang Hu, Weihong Sheng, Tao Xiang, Pengfei Hu, Jiguo Yu:
Sensitivity-Aware Personalized Differential Privacy Guarantees for Online Social Networks. 3116-3130 - Zhixuan Zhang, Xingjian Zheng, Linbo Qing, Qi Liu, Pingyu Wang, Yu Liu, Jiyang Liao:
A Stable and Efficient Data-Free Model Attack With Label-Noise Data Generation. 3131-3145 - Kuan Liu, Jianting Ning, Pengfei Wu, Shengmin Xu, Rongmao Chen:
TLARDA: Threshold Label-Aggregating Remote Data Auditing in Decentralized Environment. 3146-3160 - Xin Zhang, Kejiang Chen, Na Zhao, Weiming Zhang, Nenghai Yu:
Provably Secure Public-Key Steganography Based on Admissible Encoding. 3161-3175 - Yang Yang, Haihui Fan, Jinchao Zhang, Bo Li, Hui Ma, Xiaoyan Gu:
SMSSE: Size-Pattern Mitigation Searchable Symmetric Encryption. 3176-3189 - Serhat Bakirtas, Elza Erkip:
Distribution-Agnostic Database De-Anonymization Under Obfuscation and Synchronization Errors. 3190-3203 - Chao Zha, Zhiyu Wang, Yifei Fan, Bing Bai, Yinjie Zhang, Sainan Shi, Ruyun Zhang:
A-NIDS: Adaptive Network Intrusion Detection System Based on Clustering and Stacked CTGAN. 3204-3219 - Jie Zhang, Futai Zhang, Xinyi Huang:
Theory and Applications of Sequentially Threshold Public-Key Cryptography: Practical Private Key Safeguarding and Secure Use for Individual Users. 3220-3233 - Yongliang Xu, Hang Cheng, Jiguo Li, Ximeng Liu, Xinpeng Zhang, Meiqing Wang:
Lightweight Multi-User Public-Key Authenticated Encryption With Keyword Search. 3234-3246 - Minhong Sun, Jiazhong Teng, Xinyuan Liu, Wei Wang, Xingru Huang:
Few-Shot Specific Emitter Identification: A Knowledge, Data, and Model-Driven Fusion Framework. 3247-3259 - Junpeng Zhang, Hui Zhu, Jiaqi Zhao, Rongxing Lu, Yandong Zheng, Jiezhen Tang, Hui Li:
COKV: Key-Value Data Collection With Condensed Local Differential Privacy. 3260-3273 - Weiqi Dai, Yang Zhou, Xiaohai Dai, Kim-Kwang Raymond Choo, Xia Xie, Deqing Zou, Hai Jin:
CR-DAP: A Comprehensive and Regulatory Decentralized Anonymous Payment System. 3274-3286 - Chao Pan, Donghui Hu, Yaofei Wang, Kejiang Chen, Yinyin Peng, Xianjin Rong, Chen Gu, Meng Li:
Rethinking Prefix-Based Steganography for Enhanced Security and Efficiency. 3287-3301 - Siquan Huang, Yijiang Li, Xingfu Yan, Ying Gao, Chong Chen, Leyu Shi, Biao Chen, Wing W. Y. Ng:
Scope: On Detecting Constrained Backdoor Attacks in Federated Learning. 3302-3315 - Xiao-Yu Yue, Jiang-Wen Xiao, Xiaokang Liu, Yan-Wu Wang:
Differentially Private Linearized ADMM Algorithm for Decentralized Nonconvex Optimization. 3316-3329 - Luming Yang, Yongjun Wang, Lin Liu, Junjie Huang, Jiangyong Shi, Shaojing Fu, Shize Guo:
unFlowS: An Unsupervised Construction Scheme of Flow Spectrum for Network Traffic Detection. 3330-3345 - Yan Zhang, Chunsheng Gu, Peizhong Shi, Zhengjun Jing, Bing Li, Bo Liu:
Bring Your Device Group (BYDG): Efficient and Privacy-Preserving User-Device Authentication Protocol in Multi-Access Edge Computing. 3346-3361 - Adrián Tobar Nicolau, Javier Parra-Arnau, Jordi Forné, Vicenç Torra:
Uncoordinated Syntactic Privacy: A New Composable Metric for Multiple, Independent Data Publishing. 3362-3373 - Hongliang He, Nengcheng Chen:
Parallel PAM for Secure Transmission. 3374-3386 - Jianfeng Du, Zhu Wang, Aimin Yu:
Revisiting the Masking Strategy: A Side-Channel Attack on CRYSTALS-Kyber. 3387-3399 - Mahdi Alehdaghi, Arthur Josi, Rafael M. O. Cruz, Pourya Shamsolmoali, Eric Granger:
Adaptive Generation of Privileged Intermediate Information for Visible-Infrared Person Re-Identification. 3400-3413 - Tingxu Han, Weisong Sun, Ziqi Ding, Chunrong Fang, Hanwei Qian, Jiaxun Li, Zhenyu Chen, Xiangyu Zhang:
Mutual Information Guided Backdoor Mitigation for Pre-Trained Encoders. 3414-3428 - Haoran Zha, Hanhong Wang, Yu Wang, Zhi Sun, Guan Gui, Yun Lin:
Enhancing Security in 5G NR With Channel-Robust RF Fingerprinting Leveraging SRS for Cross-Domain Stability. 3429-3444 - Tianchi Liao, Lele Fu, Lei Zhang, Lei Yang, Chuan Chen, Michael Kwok-Po Ng, Huawei Huang, Zibin Zheng:
Privacy-Preserving Vertical Federated Learning With Tensor Decomposition for Data Missing Features. 3445-3460 - Wenke Huang, Mang Ye, Zekun Shi, He Li, Bo Du:
Kindle Federated Generalization With Domain Specialized and Invariant Knowledge. 3461-3474 - Yunlong He, Jia Yu:
Toward Secure Weighted Aggregation for Privacy-Preserving Federated Learning. 3475-3488 - Jian-Wei Li, Wen-Ze Shao, Yubao Sun, Li-Qian Wang, Qi Ge, Liang Xiao:
Boosting Adversarial Transferability via Relative Feature Importance-Aware Attacks. 3489-3504 - Luyao Wang, Hao Guo, Weibin Wu, Lu Zhou:
Efficient and Privacy-Preserving Feature Selection Based on Multiparty Computation. 3505-3518 - Xiaoyu Shen, Tao Zhang, Hao Wu, Xiaoqiang Qiao, Yihang Du, Guan Gui:
An Adaptive Domain-Incremental Framework With Knowledge Replay and Domain Alignment for Specific Emitter Identification. 3519-3533 - Yansong Zhang, Xiaojun Chen, Ye Dong, Qinghui Zhang, Rui Hou, Qiang Liu, Xudong Chen:
MD-SONIC: Maliciously-Secure Outsourcing Neural Network Inference With Reduced Online Communication. 3534-3549 - Marco Spanghero, Filip Geib, Ronny Panier, Panos Papadimitratos:
GNSS Jammer Localization and Identification With Airborne Commercial GNSS Receivers. 3550-3565 - Shuyi Li, Bob Zhang, Qinghua Hu:
Dual-Cohesion Metric Learning for Few-Shot Hand-Based Multimodal Recognition. 3566-3575 - Teddy Furon:
On the Vulnerability of Retrieval in High Intrinsic Dimensionality Neighborhood. 3576-3586 - Zekun Sun, Na Ruan, Jianhua Li:
DDL: Effective and Comprehensible Interpretation Framework for Diverse Deepfake Detectors. 3601-3615 - Yuanyuan Ma, Lige Xu, Qianqian Zhang, Yi Zhang, Xianwei Xin, Xiangyang Luo:
EIS-OBEA: Enhanced Image Steganalysis via Opposition-Based Evolutionary Algorithm. 3616-3631 - Xue Chen, Shang Gao, Shiyuan Xu, Liquan Chen, Siu-Ming Yiu, Bin Xiao:
From Σ-Protocol-Based Signatures to Ring Signatures: General Construction and Applications. 3646-3661

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.