IEEE Transactions on Information Forensics and Security最新文献

筛选
英文 中文
Robust and Unstigmatized Imperceptible Perturbations for Rendering Face Manipulation Ineffective 鲁棒和非污名化的不可察觉扰动渲染面部操作无效
IF 6.8 1区 计算机科学
IEEE Transactions on Information Forensics and Security Pub Date : 2025-07-24 DOI: 10.1109/tifs.2025.3592565
Yibo Zhang, Weiguo Lin, Zhihong Tian, Geyong Min, Junfeng Xu, Yikun Xu
{"title":"Robust and Unstigmatized Imperceptible Perturbations for Rendering Face Manipulation Ineffective","authors":"Yibo Zhang, Weiguo Lin, Zhihong Tian, Geyong Min, Junfeng Xu, Yikun Xu","doi":"10.1109/tifs.2025.3592565","DOIUrl":"https://doi.org/10.1109/tifs.2025.3592565","url":null,"abstract":"","PeriodicalId":13492,"journal":{"name":"IEEE Transactions on Information Forensics and Security","volume":"14 1","pages":""},"PeriodicalIF":6.8,"publicationDate":"2025-07-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"144701954","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":1,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
New Visible Watermark Protection Mechanism Based on Information Hiding 基于信息隐藏的新型可见水印保护机制
IF 6.8 1区 计算机科学
IEEE Transactions on Information Forensics and Security Pub Date : 2025-07-24 DOI: 10.1109/tifs.2025.3592572
Wenhong Huang, Yunshu Dai, Jianwei Fei, Fangjun Huang
{"title":"New Visible Watermark Protection Mechanism Based on Information Hiding","authors":"Wenhong Huang, Yunshu Dai, Jianwei Fei, Fangjun Huang","doi":"10.1109/tifs.2025.3592572","DOIUrl":"https://doi.org/10.1109/tifs.2025.3592572","url":null,"abstract":"","PeriodicalId":13492,"journal":{"name":"IEEE Transactions on Information Forensics and Security","volume":"21 1","pages":""},"PeriodicalIF":6.8,"publicationDate":"2025-07-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"144701958","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":1,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Forward and Backward Private Conjunctive Dynamic Searchable Symmetric Encryption with Refined Leakage Function and Low Communication 具有精细泄漏函数和低通信的前向和后向私有合取动态可搜索对称加密
IF 6.8 1区 计算机科学
IEEE Transactions on Information Forensics and Security Pub Date : 2025-07-24 DOI: 10.1109/tifs.2025.3592533
Beining Wang, Yinuo Li, Jing Chen, Kun He, Meng Jia, Ruiying Du
{"title":"Forward and Backward Private Conjunctive Dynamic Searchable Symmetric Encryption with Refined Leakage Function and Low Communication","authors":"Beining Wang, Yinuo Li, Jing Chen, Kun He, Meng Jia, Ruiying Du","doi":"10.1109/tifs.2025.3592533","DOIUrl":"https://doi.org/10.1109/tifs.2025.3592533","url":null,"abstract":"","PeriodicalId":13492,"journal":{"name":"IEEE Transactions on Information Forensics and Security","volume":"10 1","pages":""},"PeriodicalIF":6.8,"publicationDate":"2025-07-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"144701961","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":1,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Any-to-any Speaker Attribute Perturbation for Asynchronous Voice Anonymization 异步语音匿名化的任意对任意说话人属性扰动
IF 6.8 1区 计算机科学
IEEE Transactions on Information Forensics and Security Pub Date : 2025-07-24 DOI: 10.1109/tifs.2025.3592553
Liping Chen, Chenyang Guo, Rui Wang, Kong Aik Lee, Zhen-Hua Ling
{"title":"Any-to-any Speaker Attribute Perturbation for Asynchronous Voice Anonymization","authors":"Liping Chen, Chenyang Guo, Rui Wang, Kong Aik Lee, Zhen-Hua Ling","doi":"10.1109/tifs.2025.3592553","DOIUrl":"https://doi.org/10.1109/tifs.2025.3592553","url":null,"abstract":"","PeriodicalId":13492,"journal":{"name":"IEEE Transactions on Information Forensics and Security","volume":"11 1","pages":""},"PeriodicalIF":6.8,"publicationDate":"2025-07-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"144701964","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":1,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Multi-authority Anonymous Credentials with Efficient and Decentralized Supervision 具有高效和分散监督的多权威匿名凭证
IF 6.8 1区 计算机科学
IEEE Transactions on Information Forensics and Security Pub Date : 2025-07-24 DOI: 10.1109/tifs.2025.3592554
Meng Jia, Jing Chen, Yuanzheng Wang, Kun He, Min Shi, Ruiying Du
{"title":"Multi-authority Anonymous Credentials with Efficient and Decentralized Supervision","authors":"Meng Jia, Jing Chen, Yuanzheng Wang, Kun He, Min Shi, Ruiying Du","doi":"10.1109/tifs.2025.3592554","DOIUrl":"https://doi.org/10.1109/tifs.2025.3592554","url":null,"abstract":"","PeriodicalId":13492,"journal":{"name":"IEEE Transactions on Information Forensics and Security","volume":"37 1","pages":""},"PeriodicalIF":6.8,"publicationDate":"2025-07-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"144701953","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":1,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Differentially Private Online Community Detection for Censored Block Models: Algorithms and Fundamental Limits 审查块模型的差异私有在线社区检测:算法和基本限制
IF 6.8 1区 计算机科学
IEEE Transactions on Information Forensics and Security Pub Date : 2025-07-24 DOI: 10.1109/tifs.2025.3592556
Mohamed Seif, Liyan Xie, Andrea J. Goldsmith, H. Vincent Poor
{"title":"Differentially Private Online Community Detection for Censored Block Models: Algorithms and Fundamental Limits","authors":"Mohamed Seif, Liyan Xie, Andrea J. Goldsmith, H. Vincent Poor","doi":"10.1109/tifs.2025.3592556","DOIUrl":"https://doi.org/10.1109/tifs.2025.3592556","url":null,"abstract":"","PeriodicalId":13492,"journal":{"name":"IEEE Transactions on Information Forensics and Security","volume":"17 1","pages":""},"PeriodicalIF":6.8,"publicationDate":"2025-07-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"144701956","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":1,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
StyleMark: Robust Style Watermarking for Artworks Against Black-Box Zero-Shot Style Transfer 针对黑盒零拍摄风格转移的艺术品的鲁棒风格水印
IF 6.8 1区 计算机科学
IEEE Transactions on Information Forensics and Security Pub Date : 2025-07-24 DOI: 10.1109/tifs.2025.3592521
Yunming Zhang, Dengpan Ye, Sipeng Shen, Jun Wang, Caiyun Xie
{"title":"StyleMark: Robust Style Watermarking for Artworks Against Black-Box Zero-Shot Style Transfer","authors":"Yunming Zhang, Dengpan Ye, Sipeng Shen, Jun Wang, Caiyun Xie","doi":"10.1109/tifs.2025.3592521","DOIUrl":"https://doi.org/10.1109/tifs.2025.3592521","url":null,"abstract":"","PeriodicalId":13492,"journal":{"name":"IEEE Transactions on Information Forensics and Security","volume":"214 1","pages":""},"PeriodicalIF":6.8,"publicationDate":"2025-07-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"144701960","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":1,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
NUSGuard: Smart Device Anti-Eavesdropping Protection based on Near-Ultrasonic Interference NUSGuard:基于近超声干扰的智能设备防窃听保护
IF 6.8 1区 计算机科学
IEEE Transactions on Information Forensics and Security Pub Date : 2025-07-24 DOI: 10.1109/tifs.2025.3592558
Xiaoxiao Qiao, Man Zhou, Hongwei Li, Xiaojing Zhu, Zhihao Yao, Houzhen Wang, Xiaojing Ma
{"title":"NUSGuard: Smart Device Anti-Eavesdropping Protection based on Near-Ultrasonic Interference","authors":"Xiaoxiao Qiao, Man Zhou, Hongwei Li, Xiaojing Zhu, Zhihao Yao, Houzhen Wang, Xiaojing Ma","doi":"10.1109/tifs.2025.3592558","DOIUrl":"https://doi.org/10.1109/tifs.2025.3592558","url":null,"abstract":"","PeriodicalId":13492,"journal":{"name":"IEEE Transactions on Information Forensics and Security","volume":"117 1","pages":""},"PeriodicalIF":6.8,"publicationDate":"2025-07-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"144701907","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":1,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
BOSC: A Backdoor-based Framework for Open Set Synthetic Image Attribution BOSC:一个基于后门的开放集合成图像归属框架
IF 6.8 1区 计算机科学
IEEE Transactions on Information Forensics and Security Pub Date : 2025-07-24 DOI: 10.1109/tifs.2025.3592531
Jun Wang, Benedetta Tondi, Mauro Barni
{"title":"BOSC: A Backdoor-based Framework for Open Set Synthetic Image Attribution","authors":"Jun Wang, Benedetta Tondi, Mauro Barni","doi":"10.1109/tifs.2025.3592531","DOIUrl":"https://doi.org/10.1109/tifs.2025.3592531","url":null,"abstract":"","PeriodicalId":13492,"journal":{"name":"IEEE Transactions on Information Forensics and Security","volume":"56 1","pages":""},"PeriodicalIF":6.8,"publicationDate":"2025-07-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"144701952","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":1,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Vulnerabilities in SVHFL: Toward Secure and Verifiable Hybrid Federated Learning SVHFL中的漏洞:迈向安全和可验证的混合联邦学习
IF 6.8 1区 计算机科学
IEEE Transactions on Information Forensics and Security Pub Date : 2025-07-24 DOI: 10.1109/tifs.2025.3592536
Fucai Luo, Jiahui Wu, Jinglong Luo
{"title":"Vulnerabilities in SVHFL: Toward Secure and Verifiable Hybrid Federated Learning","authors":"Fucai Luo, Jiahui Wu, Jinglong Luo","doi":"10.1109/tifs.2025.3592536","DOIUrl":"https://doi.org/10.1109/tifs.2025.3592536","url":null,"abstract":"","PeriodicalId":13492,"journal":{"name":"IEEE Transactions on Information Forensics and Security","volume":"7 1","pages":""},"PeriodicalIF":6.8,"publicationDate":"2025-07-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"144701908","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":1,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信