Congyi Li, Peizhuo Lv, Jinwen He, Kai Chen, Hong Zhu
{"title":"HEFLGuard: Backdoor Detection in Homomorphic Encryption-based Federated Learning","authors":"Congyi Li, Peizhuo Lv, Jinwen He, Kai Chen, Hong Zhu","doi":"10.1109/tifs.2026.3688017","DOIUrl":"https://doi.org/10.1109/tifs.2026.3688017","url":null,"abstract":"","PeriodicalId":13492,"journal":{"name":"IEEE Transactions on Information Forensics and Security","volume":"69 1","pages":""},"PeriodicalIF":6.8,"publicationDate":"2026-04-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"147753009","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":1,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Xingyu Chen, Huici Wu, Xiaofeng Tao, Jin Xu, Shixun Gong
{"title":"Polar Coding for the Multiple Access Wiretap Channel with Partial Rate-Limited Feedback via Rate-Splitting","authors":"Xingyu Chen, Huici Wu, Xiaofeng Tao, Jin Xu, Shixun Gong","doi":"10.1109/tifs.2026.3687750","DOIUrl":"https://doi.org/10.1109/tifs.2026.3687750","url":null,"abstract":"","PeriodicalId":13492,"journal":{"name":"IEEE Transactions on Information Forensics and Security","volume":"250 1","pages":""},"PeriodicalIF":6.8,"publicationDate":"2026-04-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"147753006","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":1,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Closing the Proof-of-Stake Security Gap: A Signature-Based Defense Against Malicious Validators in Long-Range Attacks","authors":"Zhanwen Chen, Yannan Li, Willy Susilo","doi":"10.1109/tifs.2026.3687013","DOIUrl":"https://doi.org/10.1109/tifs.2026.3687013","url":null,"abstract":"","PeriodicalId":13492,"journal":{"name":"IEEE Transactions on Information Forensics and Security","volume":"10 1","pages":""},"PeriodicalIF":6.8,"publicationDate":"2026-04-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"147735809","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":1,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Sara Faour, Filip Maksimovic, David C. Burnett, Paul Muhlethaler, Thomas Watteyne, Kristofer Pister, Mališa Vučinić
{"title":"TMVS: Threshold-based Majority Voting Scheme for Robust SRAM PUFs","authors":"Sara Faour, Filip Maksimovic, David C. Burnett, Paul Muhlethaler, Thomas Watteyne, Kristofer Pister, Mališa Vučinić","doi":"10.1109/tifs.2026.3687093","DOIUrl":"https://doi.org/10.1109/tifs.2026.3687093","url":null,"abstract":"","PeriodicalId":13492,"journal":{"name":"IEEE Transactions on Information Forensics and Security","volume":"2 1","pages":""},"PeriodicalIF":6.8,"publicationDate":"2026-04-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"147735806","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":1,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Mauricio J. Ferreira, Nuno A. Silva, Armando N. Pinto, Nelson J. Muga
{"title":"Machine Learning Validation of a Physical Prime Random Number Generator","authors":"Mauricio J. Ferreira, Nuno A. Silva, Armando N. Pinto, Nelson J. Muga","doi":"10.1109/tifs.2026.3686995","DOIUrl":"https://doi.org/10.1109/tifs.2026.3686995","url":null,"abstract":"","PeriodicalId":13492,"journal":{"name":"IEEE Transactions on Information Forensics and Security","volume":"18 1","pages":""},"PeriodicalIF":6.8,"publicationDate":"2026-04-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"147735804","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":1,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"ESCM: A Toolkit for Efficient and Secure Outsourced Computation with Multiple Keys","authors":"Yunzhen Zhang, Yupeng Jiang","doi":"10.1109/tifs.2026.3685083","DOIUrl":"https://doi.org/10.1109/tifs.2026.3685083","url":null,"abstract":"","PeriodicalId":13492,"journal":{"name":"IEEE Transactions on Information Forensics and Security","volume":"24 1","pages":""},"PeriodicalIF":6.8,"publicationDate":"2026-04-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"147708594","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":1,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Fan Wang, Zhenxin Cai, Hong Wan, Tiantian Tang, Qin Wang, Guan Gui
{"title":"Towards Robust Receiver-Invariant Specific Emitter Identification via Multi-Task Adversarial Learning","authors":"Fan Wang, Zhenxin Cai, Hong Wan, Tiantian Tang, Qin Wang, Guan Gui","doi":"10.1109/tifs.2026.3685173","DOIUrl":"https://doi.org/10.1109/tifs.2026.3685173","url":null,"abstract":"","PeriodicalId":13492,"journal":{"name":"IEEE Transactions on Information Forensics and Security","volume":"66 1","pages":""},"PeriodicalIF":6.8,"publicationDate":"2026-04-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"147709009","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":1,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Ke Chao, Shengling Wang, Hongwei Shi, Xiuzhen Cheng
{"title":"Analysis of Collaborative Data Privacy Leakage: A Macro-Level Perspective","authors":"Ke Chao, Shengling Wang, Hongwei Shi, Xiuzhen Cheng","doi":"10.1109/tifs.2026.3685106","DOIUrl":"https://doi.org/10.1109/tifs.2026.3685106","url":null,"abstract":"","PeriodicalId":13492,"journal":{"name":"IEEE Transactions on Information Forensics and Security","volume":"21 1","pages":""},"PeriodicalIF":6.8,"publicationDate":"2026-04-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"147709010","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":1,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}