


default search action
IEEE Transactions on Information Forensics and Security, Volume 20
Volume 20, 2025
- Tong Fu
, Liquan Chen
, Yinghua Jiang, Ju Jia
, Zhangjie Fu
:
Image Steganalysis Based on Dual-Path Enhancement and Fractal Downsampling. 1-16 - Chong Xiao
, Ming Tang
, Sengim Karayalcin
, Wei Cheng
:
LD-PA: Distilling Univariate Leakage for Deep Learning-Based Profiling Attacks. 17-30 - Xin Xie
, Jianan Hong
, Cunqing Hua
, Yanhong Xu
:
Communication Efficient Ciphertext-Field Aggregation in Wireless Networks via Over-the-Air Computation. 31-45 - Jitendra Bhandari
, Jayanth Gopinath, Mohammed Ashraf, Johann Knechtel
, Ozgur Sinanoglu
, Ramesh Karri
:
DEFending Integrated Circuit Layouts. 46-59 - Hong Niu
, Xia Lei
, Jiancheng An
, Lechen Zhang
, Chau Yuen
:
On the Efficient Design of Stacked Intelligent Metasurfaces for Secure SISO Transmission. 60-70 - Yige Liu
, Che Wang, Yiwei Lou
, Yongzhi Cao
, Hanpin Wang:
Attackers Are Not the Same! Unveiling the Impact of Feature Distribution on Label Inference Attacks. 71-86 - Jiachen Yang
, Jipeng Zhang
:
LHADRO: A Robust Control Framework for Autonomous Vehicles Under Cyber-Physical Attacks. 87-100 - Shuping Zhao
, Lunke Fei
, Bob Zhang
, Jie Wen
, Jinrong Cui:
Toward Mobile Palmprint Recognition via Multi-View Hierarchical Graph Learning. 101-113 - Yibiao Lu
, Bingsheng Zhang
, Kui Ren
:
Load-Balanced Server-Aided MPC in Heterogeneous Computing. 114-128 - Liang Xie
, Zhou Su
, Yuntao Wang
, Zhendong Li
:
A Practical Federated Learning Framework With Truthful Incentive in UAV-Assisted Crowdsensing. 129-144 - Weihan Li
, Zongyang Zhang
, Yanpei Guo
, Sherman S. M. Chow
, Zhiguo Wan
:
Succinct Hash-Based Arbitrary-Range Proofs. 145-158 - Rujia Li
, Qin Wang
, Yuanzhao Li, Sisi Duan
, Qi Wang
, David Galindo:
Bringing Smart Contract Confidentiality via Trusted Hardware: Fact and Fiction. 159-174 - Xiaodong Wu
, Henry Yuan
, Xiangman Li, Jianbing Ni
, Rongxing Lu
:
Evaluating Security and Robustness for Split Federated Learning Against Poisoning Attacks. 175-190 - Cheng Wei
, Yang Wang, Kuofeng Gao
, Shuo Shao
, Yiming Li
, Zhibo Wang
, Zhan Qin
:
PointNCBW: Toward Dataset Ownership Verification for Point Clouds via Negative Clean-Label Backdoor Watermark. 191-206 - Naiyu Wang
, Shen Wang
, Meng Li
, Longfei Wu
, Zijian Zhang
, Zhitao Guan
, Liehuang Zhu
:
Balancing Differential Privacy and Utility: A Relevance-Based Adaptive Private Fine-Tuning Framework for Language Models. 207-220 - Jianghong Wei
, Guohua Tian
, Xiaofeng Chen
, Willy Susilo
:
Lightweight 0-RTT Session Resumption Protocol for Constrained Devices. 221-233 - Ruikang Chen, Yan Yan
, Jing-Hao Xue
, Yang Lu
, Hanzi Wang
:
Augmentation Matters: A Mix-Paste Method for X-Ray Prohibited Item Detection Under Noisy Annotations. 234-248 - Xiongjun Guan
, Zhiyu Pan
, Jianjiang Feng
, Jie Zhou
:
Joint Identity Verification and Pose Alignment for Partial Fingerprints. 249-263 - Ruiqi Kong
, He Henry Chen
:
DeepCRF: Deep Learning-Enhanced CSI-Based RF Fingerprinting for Channel-Resilient WiFi Device Identification. 264-278 - Haorui Yan, Xi Lin
, Shenghong Li
, Hao Peng
, Bo Zhang:
Global or Local Adaptation? Client-Sampled Federated Meta-Learning for Personalized IoT Intrusion Detection. 279-293 - Jing Bai
, Chang Ge
, Zhu Xiao
, Hongbo Jiang
, Tong Li
, Huaji Zhou, Licheng Jiao
:
A Multiscale Discriminative Attack Method for Automatic Modulation Classification. 294-308 - Yue Huang
, Huizhong Li, Yi Sun
, Sisi Duan
:
Byzantine Fault Tolerance With Non-Determinism, Revisited. 309-322 - Pengfei Duan
, Zhaofeng Ma
, Hongmin Gao
, Tian Tian
, Yuqing Zhang
:
Multi-Authority Attribute-Based Encryption Scheme With Access Delegation for Cross Blockchain Data Sharing. 323-337 - Haochen Wang
, Qidi You, Sisi Duan
:
Synchronous Byzantine Agreement With O(n) Messages and O(1) Expected Time. 338-349 - Chenhao Lin
, Xiang Ji, Yulong Yang
, Qian Li
, Zhengyu Zhao
, Zhe Peng
, Run Wang
, Liming Fang
, Chao Shen
:
Hard Adversarial Example Mining for Improving Robust Fairness. 350-363 - Liang Xi
, Runze Li, Menghan Li
, Dehua Miao
, Ruidong Wang
, Zygmunt J. Haas
:
NMFAD: Neighbor-Aware Mask-Filling Attributed Network Anomaly Detection. 364-374 - Shouxu Han
, Jie Liu
, Yi Luo
, Hongping Gan
:
LCMA: A Novel Lightweight Continuous Message Authentication for Cyber-Physical System. 375-390 - Jie Song
, Sijia Zhang, Pengyi Zhang
, Junghoon Park, Yu Gu
, Ge Yu
:
Illicit Social Accounts? Anti-Money Laundering for Transactional Blockchains. 391-404 - Zhiyang Dai, Yansong Gao
, Chunyi Zhou
, Anmin Fu
, Zhi Zhang, Minhui Xue
, Yifeng Zheng
, Yuqing Zhang
:
Decaf: Data Distribution Decompose Attack Against Federated Learning. 405-420 - Tingting Chai
, Xin Wang
, Ru Li
, Wei Jia
, Xiangqian Wu
:
Joint Finger Valley Points-Free ROI Detection and Recurrent Layer Aggregation for Palmprint Recognition in Open Environment. 421-435 - Ke Li
, Di Wang
, Wenxuan Zhu
, Shaofeng Li
, Quan Wang
, Xinbo Gao
:
Physical Adversarial Patch Attack for Optical Fine-Grained Aircraft Recognition. 436-448 - Roozbeh Sarenche
, Ren Zhang
, Svetla Nikova
, Bart Preneel
:
Selfish Mining Time-Averaged Analysis in Bitcoin: Is Orphan Reporting an Effective Countermeasure? 449-464 - Xiaozhen Lu
, Zihan Liu
, Liang Xiao
, Huaiyu Dai
:
Reinforcement Learning-Based Personalized Differentially Private Federated Learning. 465-477 - K. Naveen Kumar
, C. Krishna Mohan
, Linga Reddy Cenkeramaddi
:
Federated Learning Minimal Model Replacement Attack Using Optimal Transport: An Attacker Perspective. 478-487 - Zeyu Zhao
, Yueneng Wang
, Ke Xu
, Tanfeng Sun
, Xinghao Jiang
:
HEVC Video Adversarial Samples Detection via Joint Features of Compression and Pixel Domains. 488-503 - Decheng Liu
, Tao Chen, Chunlei Peng
, Nannan Wang
, Ruimin Hu, Xinbo Gao
:
Attention Consistency Refined Masked Frequency Forgery Representation for Generalizing Face Forgery Detection. 504-515 - Yinan Hu
, Juntao Chen
, Quanyan Zhu
:
Game-Theoretic Neyman-Pearson Detection to Combat Strategic Evasion. 516-530 - Xueluan Gong
, Shuaike Li
, Yanjiao Chen
, Mingzhe Li
, Rubin Wei, Qian Wang
, Kwok-Yan Lam
:
Augmenting Model Extraction Attacks Against Disruption-Based Defenses. 531-546 - Weiqi Wang
, Zhiyi Tian
, Chenhan Zhang
, Shui Yu
:
SCU: An Efficient Machine Unlearning Scheme for Deep Learning Enabled Semantic Communications. 547-558 - Yuhang Qiu
, Honghui Chen, Xingbo Dong
, Zheng Lin, Iman Yi Liao
, Massimo Tistarelli, Zhe Jin
:
IFViT: Interpretable Fixed-Length Representation for Fingerprint Matching via Vision Transformer. 559-573 - Jianmin Dong
, Datian Peng
, Zhongmin Cai
, Bo Zeng
:
Bilevel Optimized Collusion Attacks Against Gait Recognizer. 574-588 - Shuyu Jiang, Yunxiang Qiu, Xian Mo
, Rui Tang
, Wei Wang
:
An Effective Node Injection Approach for Attacking Social Network Alignment. 589-604 - Yiping Zhang
, Yuntao Shou
, Wei Ai
, Tao Meng
, Keqin Li
:
GroupFace: Imbalanced Age Estimation Based on Multi-Hop Attention Graph Convolutional Network and Group-Aware Margin Optimization. 605-619 - Rujia Li
, Yuanzhao Li, Qin Wang
, Sisi Duan
, Qi Wang
, Mark Ryan:
Accountable Decryption Made Formal and Practical. 620-635 - Xue Chen
, Cheng Wang
, Qing Yang
, Teng Hu
, Changjun Jiang
:
Privacy Passport: Privacy-Preserving Cross-Domain Data Sharing. 636-650 - Yuli Liu
:
Signed Latent Factors for Spamming Activity Detection. 651-664 - Xiaoping Liang
, Zhenjun Tang
, Xianquan Zhang
, Xinpeng Zhang
, Ching-Nung Yang
:
Robust Image Hashing With Weighted Saliency Map and Laplacian Eigenmaps. 665-676 - Jianjin Zhao
, Qi Li
, Zewei Han
, Junsong Fu
, Guoshun Nan
, Meng Shen
, Bharat K. Bhargava
:
ReTrial: Robust Encrypted Malicious Traffic Detection via Discriminative Relation Incorporation and Misleading Relation Correction. 677-692 - Bo Gao
, Weiwei Liu
, Guangjie Liu
, Fengyuan Nie
, Jianan Huang
:
Multi-Level Resource-Coherented Graph Learning for Website Fingerprinting Attacks. 693-708 - Kaiyao Miao, Meng Zhang
, Fanghong Guo
, Rongxing Lu
, Xiaohong Guan
:
Detection of False Data Injection Attacks in Smart Grids: An Optimal Transport-Based Reliable Self-Training Approach. 709-723 - Luqing Wang
, Luyao Guo
, Shaofu Yang
, Xinli Shi
:
Differentially Private Decentralized Optimization With Relay Communication. 724-736 - Jing Yan
, Yuhan Zheng, Xian Yang
, Cailian Chen
, Xinping Guan
:
Privacy-Preserving Localization for Underwater Acoustic Sensor Networks: A Differential Privacy-Based Deep Learning Approach. 737-752 - Tanzim Mahfuz
, Swarup Bhunia
, Prabuddha Chakraborty
:
X-DFS: Explainable Artificial Intelligence Guided Design-for-Security Solution Space Exploration. 753-766 - Xue Gong, Fan Zhang
, Xin-jie Zhao, Jie Xiao
, Shize Guo
:
Key Schedule Guided Persistent Fault Attack. 767-780 - Yuhong Xue
, Zhutian Yang
, Zhilu Wu
, Hu Wang, Guan Gui
:
Online Two-Stage Channel-Based Lightweight Authentication Method for Time-Varying Scenarios. 781-795 - Wenfeng Huang
, Axin Wu
, Shengmin Xu
, Guowen Xu
, Wei Wu
:
EASNs: Efficient Anonymous Social Networks With Enhanced Security and High Scalability. 796-806 - Shuaishuai Zhang
, Jie Huang, Peihao Li
:
Analyze and Improve Differentially Private Federated Learning: A Model Robustness Perspective. 807-821 - Wenrui Yu
, Qiongxiu Li
, Milan Lopuhaä-Zwakenberg
, Mads Græsbøll Christensen, Richard Heusdens
:
Provable Privacy Advantages of Decentralized Federated Learning via Distributed Optimization. 822-838 - Chengxiang Jin, Jiajun Zhou
, Chenxuan Xie, Shanqing Yu
, Qi Xuan
, Xiaoniu Yang
:
Enhancing Ethereum Fraud Detection via Generative and Contrastive Self-Supervision. 839-853 - Xirong Zhuang
, Lan Zhang
, Chen Tang
, Yaliang Li
:
DeepReg: A Trustworthy and Privacy-Friendly Ownership Regulatory Framework for Deep Learning Models. 854-870 - Kuiyuan Zhang
, Zhongyun Hua
, Yushu Zhang
, Yifang Guo, Tao Xiang
:
Robust AI-Synthesized Speech Detection Using Feature Decomposition Learning and Synthesizer Feature Augmentation. 871-885 - Apollo Albright
, Boris Gelfand
, Michael Dixon
:
Learnability of Optical Physical Unclonable Functions Through the Lens of Learning With Errors. 886-897 - Hangcheng Liu
, Yuan Zhou
, Ying Yang
, Qingchuan Zhao
, Tianwei Zhang
, Tao Xiang
:
Stealthiness Assessment of Adversarial Perturbation: From a Visual Perspective. 898-913 - Haochen Sun
, Tonghe Bai
, Jason Li, Hongyang Zhang
:
zkDL: Efficient Zero-Knowledge Proofs of Deep Learning Training. 914-927 - Zipeng Ye
, Wenjian Luo
, Qi Zhou, Yubo Tang, Zhenqian Zhu, Yuhui Shi
, Yan Jia:
Gradient Inversion of Text-Modal Data in Distributed Learning. 928-943 - Jiancun Wu
, Engang Tian
, Chen Peng
, Zhiru Cao
:
Data-Importance-Aware Attack Strategy Design and Secure Control Countermeasure. 944-954 - Fei Meng
, Leixiao Cheng
:
TSR-ABE: Traceable and Server-Aided Revocable Ciphertext-Policy Attribute-Based Encryption Under Static Assumptions. 955-967 - Chaowei Sun
, Qingyu Su
, Jian Li
:
Secure Tracking Control and Attack Detection for Power Cyber-Physical Systems Based on Integrated Control Decision. 968-979 - Pingyu Wang
, Xingjian Zheng
, Linbo Qing
, Bonan Li, Fei Su
, Zhicheng Zhao
, Honggang Chen
:
DRFormer: A Discriminable and Reliable Feature Transformer for Person Re-Identification. 980-995 - Mingwei Zeng, Jie Cui
, Qingyang Zhang
, Hong Zhong
, Debiao He
:
Efficient Revocable Cross-Domain Anonymous Authentication Scheme for IIoT. 996-1010 - Ziniu Liu
, Han Yu
, Kai Chen
, Aiping Li
:
Privacy-Preserving Generative Modeling With Sliced Wasserstein Distance. 1011-1022 - Yixiao Xu
, Binxing Fang, Mohan Li
, Xiaolei Liu
, Zhihong Tian
:
Query-Efficient Model Inversion Attacks: An Information Flow View. 1023-1036 - Zhenxin Cai, Yu Wang
, Guan Gui
, Jin Sha
:
Toward Robust Radio Frequency Fingerprint Identification via Adaptive Semantic Augmentation. 1037-1048 - Yipeng Liu
, Zhanqing Li
, Xuan Yang
, Xiao Lu, Jing Li, Peng Chen
, Ronghua Liang
:
Test-Time Image Reconstruction for Cross-Device OCT Fingerprint Extraction. 1049-1064 - Shahnewaz Karim Sakib
, George T. Amariucai
, Yong Guan
:
Information Leakage Measures for Imperfect Statistical Information: Application to Non-Bayesian Framework. 1065-1080 - Anmol Kumar
, Mayank Agarwal
:
Reducing Internal Collateral Damage From DDoS Attacks Through Micro-Service Cloud Architecture. 1081-1091 - Yibin Zhang
, Yuchao Liu
, Juzhen Wang, Qi Xuan
, Yun Lin
, Guan Gui
:
Enhancing Specific Emitter Identification: A Semi-Supervised Approach With Deep Cloud and Broad Edge Integration. 1092-1105 - Jia Sun
, Yanfeng Li
, Luyifu Chen
, Houjin Chen
, Minjun Wang
:
Dualistic Disentangled Meta-Learning Model for Generalizable Person Re-Identification. 1106-1118 - Shiyuan Xu
, Xue Chen
, Yu Guo
, Siu-Ming Yiu
, Shang Gao, Bin Xiao
:
Efficient and Secure Post-Quantum Certificateless Signcryption With Linkability for IoMT. 1119-1134 - Qiang Zhang
, Xiongwei Zhang
, Meng Sun
, Jibin Yang
:
A Soft-Contrastive Pseudo Learning Approach Toward Open-World Forged Speech Attribution. 1135-1148 - Jun Feng
, Yefan Wu, Hong Sun
, Shunli Zhang
, Debin Liu
:
Panther: Practical Secure Two-Party Neural Network Inference. 1149-1162 - Wei Wang
, Haipeng Peng
, Junke Duan
, Licheng Wang
, Xiaoya Hu
, Zilin Zhao:
Resilient and Redactable Blockchain With Two-Level Rewriting and Version Detection. 1163-1175 - Lingyan Xue
, Haiping Huang
, Fu Xiao
, Qi Li
, Zhiwei Wang
:
A Privacy-Enhanced Traceable Anonymous Transaction Scheme for Blockchain. 1176-1191 - Yu Tian
, Kunbo Zhang
, Yalin Huang
, Leyuan Wang
, Yue Liu
, Zhenan Sun
:
Cross-Optical Property Image Translation for Face Anti-Spoofing: From Visible to Polarization. 1192-1205 - Bei Li
, Hong Zhong
, Jie Cui
, Chengjie Gu
, Debiao He
:
RRMAC: A Multi-Data Owner Access Control Scheme With Robust Revocation for Co-Owned Data Sharing. 1206-1221 - Kai Liang, Songze Li, Ming Ding, Feng Tian, Youlong Wu:
Privacy-Preserving Coded Schemes for Multi-Server Federated Learning With Straggling Links. 1222-1236 - Chenhao Wang, Yang Ming, Hang Liu, Yutong Deng, Yi Zhao, Songnian Zhang:
Security-Enhanced Data Transmission With Fine-Grained and Flexible Revocation for DTWNs. 1237-1250 - Yuxian Li, Jian Weng, Junzuo Lai, Yingjiu Li, Jiahe Wu, Ming Li, Jianfei Sun, Pengfei Wu, Robert H. Deng:
AuditPCH: Auditable Payment Channel Hub With Privacy Protection. 1251-1261 - Ming Zheng, Xiaowen Hu, Ying Hu, Xiaoyao Zheng, Yonglong Luo:
Fed-UGI: Federated Undersampling Learning Framework With Gini Impurity for Imbalanced Network Intrusion Detection. 1262-1277 - Yingkun Wen, Yan Huo, Junhuai Li, Jin Qian, Kan Wang:
Generative Adversarial Network-Aided Covert Communication for Cooperative Jammers in CCRNs. 1278-1289 - Yiming Yang, Weipeng Hu, Haifeng Hu:
Progressive Cross-Modal Association Learning for Unsupervised Visible-Infrared Person Re-Identification. 1290-1304 - Andong Lu, Chenglong Li, Tianrui Zha, Xiaofeng Wang, Jin Tang, Bin Luo:
Nighttime Person Re-Identification via Collaborative Enhancement Network With Multi-Domain Learning. 1305-1319 - Licheng Ji, Jiguo Li, Yichen Zhang, Yang Lu:
Verifiable Searchable Symmetric Encryption Over Additive Homomorphism. 1320-1332 - Qi Guo, Shanmin Pang, Xiaojun Jia, Yang Liu, Qing Guo:
Efficient Generation of Targeted and Transferable Adversarial Examples for Vision-Language Models via Diffusion Models. 1333-1348 - Huixian Li, Wenyu Mo, Chun Shen, Liaojun Pang:
EvalComp: Bootstrapping Based on Homomorphic Comparison Function for CKKS. 1349-1361 - Wenjing An, Derui Ding, Hongli Dong, Bo Shen, Lei Sun:
Privacy-Preserving Distributed Optimization for Economic Dispatch Over Balanced Directed Networks. 1362-1373 - Ying Miao, Keke Gai, Jing Yu, Yu-an Tan, Liehuang Zhu, Weizhi Meng:
Blockchain-Empowered Keyword Searchable Provable Data Possession for Large Similar Data. 1374-1389 - Jingwei Chen, Linhan Yang, Wenyuan Wu, Yang Liu, Yong Feng:
Homomorphic Matrix Operations Under Bicyclic Encoding. 1390-1404 - Changsong Jiang, Chunxiang Xu, Xinfeng Dong, Kefei Chen, Guomin Yang:
An Efficient Privacy-Preserving Scheme for Weak Password Collection in Internet of Things Against Perpetual Leakage. 1405-1420 - Pengwen Dai, Jingyu Li, Dayan Wu, Peijia Zheng, Xiaochun Cao:
TextSafety: Visual Text Vanishing via Hierarchical Context-Aware Interaction Reconstruction. 1421-1433 - Hao Zhang, Wenqi Shao, Hong Liu, Yongqiang Ma, Ping Luo, Yu Qiao, Nanning Zheng, Kaipeng Zhang:
B-AVIBench: Toward Evaluating the Robustness of Large Vision-Language Model on Black-Box Adversarial Visual-Instructions. 1434-1446 - Meng Zhang, Li Lu, Yuhan Wu, Zheng Yan, Jiaqi Sun, Feng Lin, Kui Ren:
DroneAudioID: A Lightweight Acoustic Fingerprint-Based Drone Authentication System for Secure Drone Delivery. 1447-1461 - Desheng Zheng, Wuping Ke, Xiao-Yu Li, Yaoxin Duan, Guangqiang Yin, Fan Min:
Enhancing the Transferability of Adversarial Attacks via Multi-Feature Attention. 1462-1474 - Cong Wu, Jianfei Sun, Jing Chen, Mamoun Alazab, Yang Liu, Yang Xiang:
$\mathsf{TCG}\text{-}\mathsf{IDS}$ : Robust Network Intrusion Detection via Temporal Contrastive Graph Learning. 1475-1486

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.