IEEE Transactions on Information Forensics and Security最新文献

筛选
英文 中文
Gradient-Aware Adaptive Meta-Prompt Learner for Generalizable Face Forgery Detection 基于梯度感知的自适应元提示学习器的人脸伪造检测
IF 8 1区 计算机科学
IEEE Transactions on Information Forensics and Security Pub Date : 2025-10-17 DOI: 10.1109/TIFS.2025.3622981
Hanqing Liu;Hongxia Wang;Rui Zhang;Yang Zhou;Qiang Zeng
{"title":"Gradient-Aware Adaptive Meta-Prompt Learner for Generalizable Face Forgery Detection","authors":"Hanqing Liu;Hongxia Wang;Rui Zhang;Yang Zhou;Qiang Zeng","doi":"10.1109/TIFS.2025.3622981","DOIUrl":"10.1109/TIFS.2025.3622981","url":null,"abstract":"The misuse of AI-generated techniques in face forgery has raised significant concerns, driving advancements in detection methods. However, existing algorithms struggle with generalization in cross-domain scenarios due to domain shifts, limiting their practical applications. Prompt tuning, which learns soft prompts while freezing the backbone, enables the generalizable Vision-Language Models (VLMs) pre-trained on large-scale datasets to adapt to downstream tasks. Though effective, prompt tuning confronts challenges in face forgery detection, where its performance is sensitive to initialization and may undermine the generalizability of pre-trained VLMs. To address this issue, we propose a novel Gradient-aware Adaptive Meta-Prompt Learner (GAMP-Learner). The core idea is to learn a meta-general gradient from multiple source domains through the Direction-shared Gradient Pruning Module (DGPM) for efficient initialization in the inner-loop, while addressing gradient conflicts via the Adaptive Gradient Calibration Module (AdaGCM) to enhance generalization in the outer-loop. Notably, our GAMP-Learner can be seamlessly integrated into any prompt-based fine-tuning VLM in a model-agnostic way. Additionally, to capture fine-grained forgery clues, we design a Multi-Granularity Conditional Prompt Generator (MGCP), which constructs instance-level prompts by incorporating multi-scale content-style feature representations. Simulating practical scenarios, we devise three protocols which evaluate generalization performance trained on multiple source domains. Extensive experiments demonstrate that the proposed framework achieves competitive cross-domain detection performance compared to state-of-the-art methods.","PeriodicalId":13492,"journal":{"name":"IEEE Transactions on Information Forensics and Security","volume":"20 ","pages":"11208-11222"},"PeriodicalIF":8.0,"publicationDate":"2025-10-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"145310988","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":1,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Boosting Parallel Fuzzing with Boundary-Targeted Task Allocation and Exploration 基于边界目标任务分配与探索的并行模糊算法
IF 6.8 1区 计算机科学
IEEE Transactions on Information Forensics and Security Pub Date : 2025-10-17 DOI: 10.1109/tifs.2025.3622956
Hong Liang, Yijia Guo, Haotian Wu, Yifan Xia, Yi Xiang, Xiantao Jin, Hao Peng, Xuhong Zhang, Shouling Ji
{"title":"Boosting Parallel Fuzzing with Boundary-Targeted Task Allocation and Exploration","authors":"Hong Liang, Yijia Guo, Haotian Wu, Yifan Xia, Yi Xiang, Xiantao Jin, Hao Peng, Xuhong Zhang, Shouling Ji","doi":"10.1109/tifs.2025.3622956","DOIUrl":"https://doi.org/10.1109/tifs.2025.3622956","url":null,"abstract":"","PeriodicalId":13492,"journal":{"name":"IEEE Transactions on Information Forensics and Security","volume":"61 1","pages":""},"PeriodicalIF":6.8,"publicationDate":"2025-10-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"145310991","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":1,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
The Early Bird Catches the Leak: Unveiling Timing Side Channels in LLM Serving Systems 捷足先登:揭示LLM服务系统中的时序侧信道
IF 6.8 1区 计算机科学
IEEE Transactions on Information Forensics and Security Pub Date : 2025-10-17 DOI: 10.1109/tifs.2025.3622954
Linke Song, Zixuan Pang, Wenhao Wang, Zihao Wang, XiaoFeng Wang, Hongbo Chen, Wei Song, Yier Jin, Dan Meng, Rui Hou
{"title":"The Early Bird Catches the Leak: Unveiling Timing Side Channels in LLM Serving Systems","authors":"Linke Song, Zixuan Pang, Wenhao Wang, Zihao Wang, XiaoFeng Wang, Hongbo Chen, Wei Song, Yier Jin, Dan Meng, Rui Hou","doi":"10.1109/tifs.2025.3622954","DOIUrl":"https://doi.org/10.1109/tifs.2025.3622954","url":null,"abstract":"","PeriodicalId":13492,"journal":{"name":"IEEE Transactions on Information Forensics and Security","volume":"27 1","pages":""},"PeriodicalIF":6.8,"publicationDate":"2025-10-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"145310989","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":1,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Unlocking Mobile Phones by Rolling Wrists: A Novel Motion-based Biometric Recognition Method 通过滚动手腕解锁手机:一种新的基于动作的生物识别方法
IF 6.8 1区 计算机科学
IEEE Transactions on Information Forensics and Security Pub Date : 2025-10-17 DOI: 10.1109/tifs.2025.3622964
Yadi He, Sitan Chen, Linfeng Liu
{"title":"Unlocking Mobile Phones by Rolling Wrists: A Novel Motion-based Biometric Recognition Method","authors":"Yadi He, Sitan Chen, Linfeng Liu","doi":"10.1109/tifs.2025.3622964","DOIUrl":"https://doi.org/10.1109/tifs.2025.3622964","url":null,"abstract":"","PeriodicalId":13492,"journal":{"name":"IEEE Transactions on Information Forensics and Security","volume":"12 1","pages":""},"PeriodicalIF":6.8,"publicationDate":"2025-10-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"145310990","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":1,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Polar-Domain Multi-User Key Generation in Near-Field Communications 近场通信中极域多用户密钥生成
IF 6.8 1区 计算机科学
IEEE Transactions on Information Forensics and Security Pub Date : 2025-10-16 DOI: 10.1109/tifs.2025.3622317
Tianyu Lu, Liquan Chen, Junqing Zhang, Weicheng Zhang, Michail Matthaiou
{"title":"Polar-Domain Multi-User Key Generation in Near-Field Communications","authors":"Tianyu Lu, Liquan Chen, Junqing Zhang, Weicheng Zhang, Michail Matthaiou","doi":"10.1109/tifs.2025.3622317","DOIUrl":"https://doi.org/10.1109/tifs.2025.3622317","url":null,"abstract":"","PeriodicalId":13492,"journal":{"name":"IEEE Transactions on Information Forensics and Security","volume":"101 1","pages":""},"PeriodicalIF":6.8,"publicationDate":"2025-10-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"145311052","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":1,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Jamming and Impulsive Noise Uncertainty Aided Covert Communication in PLC Networks 干扰和脉冲噪声不确定性辅助PLC网络隐蔽通信
IF 6.8 1区 计算机科学
IEEE Transactions on Information Forensics and Security Pub Date : 2025-10-16 DOI: 10.1109/tifs.2025.3622369
Rui Chen, Jianqiang Chen, Shouzhi Xu, Xingwang Li, Xiaojun Liu
{"title":"Jamming and Impulsive Noise Uncertainty Aided Covert Communication in PLC Networks","authors":"Rui Chen, Jianqiang Chen, Shouzhi Xu, Xingwang Li, Xiaojun Liu","doi":"10.1109/tifs.2025.3622369","DOIUrl":"https://doi.org/10.1109/tifs.2025.3622369","url":null,"abstract":"","PeriodicalId":13492,"journal":{"name":"IEEE Transactions on Information Forensics and Security","volume":"18 1","pages":""},"PeriodicalIF":6.8,"publicationDate":"2025-10-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"145311051","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":1,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Practical Constant-Time Asynchronous Distributed Key Generation with Improved Efficiency 实用的提高效率的恒时异步分布式密钥生成
IF 6.8 1区 计算机科学
IEEE Transactions on Information Forensics and Security Pub Date : 2025-10-16 DOI: 10.1109/tifs.2025.3622362
Zhaoyang Xie, Haibin Zhang, Shengli Liu, Sisi Duan, Liehuang Zhu
{"title":"Practical Constant-Time Asynchronous Distributed Key Generation with Improved Efficiency","authors":"Zhaoyang Xie, Haibin Zhang, Shengli Liu, Sisi Duan, Liehuang Zhu","doi":"10.1109/tifs.2025.3622362","DOIUrl":"https://doi.org/10.1109/tifs.2025.3622362","url":null,"abstract":"","PeriodicalId":13492,"journal":{"name":"IEEE Transactions on Information Forensics and Security","volume":"18 1","pages":""},"PeriodicalIF":6.8,"publicationDate":"2025-10-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"145311053","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":1,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Achieving Packet Traceback by Inferring AS-level Topology based on Cryptographic Path Identifiers 基于加密路径标识符的as级拓扑推断实现报文回溯
IF 6.8 1区 计算机科学
IEEE Transactions on Information Forensics and Security Pub Date : 2025-10-15 DOI: 10.1109/tifs.2025.3622069
Hongbin Luo, Hongyi Li, Shan Zhang, Yuxin Mao, Zhiyuan Wang
{"title":"Achieving Packet Traceback by Inferring AS-level Topology based on Cryptographic Path Identifiers","authors":"Hongbin Luo, Hongyi Li, Shan Zhang, Yuxin Mao, Zhiyuan Wang","doi":"10.1109/tifs.2025.3622069","DOIUrl":"https://doi.org/10.1109/tifs.2025.3622069","url":null,"abstract":"","PeriodicalId":13492,"journal":{"name":"IEEE Transactions on Information Forensics and Security","volume":"44 1","pages":""},"PeriodicalIF":6.8,"publicationDate":"2025-10-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"145295756","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":1,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
User-autonomous Multi-Factor Authentication Supporting Arbitrary Factor Configurations 支持任意因素配置的用户自治多因素认证
IF 6.8 1区 计算机科学
IEEE Transactions on Information Forensics and Security Pub Date : 2025-10-15 DOI: 10.1109/tifs.2025.3622084
Wenting Li, Haibo Cheng, Kaitai Liang
{"title":"User-autonomous Multi-Factor Authentication Supporting Arbitrary Factor Configurations","authors":"Wenting Li, Haibo Cheng, Kaitai Liang","doi":"10.1109/tifs.2025.3622084","DOIUrl":"https://doi.org/10.1109/tifs.2025.3622084","url":null,"abstract":"","PeriodicalId":13492,"journal":{"name":"IEEE Transactions on Information Forensics and Security","volume":"20 1","pages":""},"PeriodicalIF":6.8,"publicationDate":"2025-10-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"145295812","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":1,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Posture-aware Robust Person Re-identification via Optimal Transport Calibration 基于最优运输校准的姿态感知鲁棒人再识别
IF 6.8 1区 计算机科学
IEEE Transactions on Information Forensics and Security Pub Date : 2025-10-15 DOI: 10.1109/tifs.2025.3622067
Ruiying Lu, Yalin Sun, Chunlei Peng, Yu Zheng
{"title":"Posture-aware Robust Person Re-identification via Optimal Transport Calibration","authors":"Ruiying Lu, Yalin Sun, Chunlei Peng, Yu Zheng","doi":"10.1109/tifs.2025.3622067","DOIUrl":"https://doi.org/10.1109/tifs.2025.3622067","url":null,"abstract":"","PeriodicalId":13492,"journal":{"name":"IEEE Transactions on Information Forensics and Security","volume":"11 1","pages":""},"PeriodicalIF":6.8,"publicationDate":"2025-10-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"145295754","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":1,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信