IEEE Transactions on Information Forensics and Security最新文献

筛选
英文 中文
Kullback-Liebler Divergence-Based Observer Design Against Sensor Bias Injection Attacks in Single-Output Systems
IF 6.8 1区 计算机科学
IEEE Transactions on Information Forensics and Security Pub Date : 2025-02-26 DOI: 10.1109/tifs.2025.3546167
Fatih Emre Tosun, André M.H. Teixeira, Jingwei Dong, Anders Ahlén, Subhrakanti Dey
{"title":"Kullback-Liebler Divergence-Based Observer Design Against Sensor Bias Injection Attacks in Single-Output Systems","authors":"Fatih Emre Tosun, André M.H. Teixeira, Jingwei Dong, Anders Ahlén, Subhrakanti Dey","doi":"10.1109/tifs.2025.3546167","DOIUrl":"https://doi.org/10.1109/tifs.2025.3546167","url":null,"abstract":"","PeriodicalId":13492,"journal":{"name":"IEEE Transactions on Information Forensics and Security","volume":"186 1","pages":""},"PeriodicalIF":6.8,"publicationDate":"2025-02-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143507287","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":1,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Efficient and Privacy-Preserving Ride Matching over Road Networks against Malicious ORH server
IF 6.8 1区 计算机科学
IEEE Transactions on Information Forensics and Security Pub Date : 2025-02-25 DOI: 10.1109/tifs.2025.3544453
Mingtian Zhang, Anjia Yang, Jian Weng, Min-Rong Chen, Huang Zeng, Yi Liu, Xiaoli Liu, Zhihua Xia
{"title":"Efficient and Privacy-Preserving Ride Matching over Road Networks against Malicious ORH server","authors":"Mingtian Zhang, Anjia Yang, Jian Weng, Min-Rong Chen, Huang Zeng, Yi Liu, Xiaoli Liu, Zhihua Xia","doi":"10.1109/tifs.2025.3544453","DOIUrl":"https://doi.org/10.1109/tifs.2025.3544453","url":null,"abstract":"","PeriodicalId":13492,"journal":{"name":"IEEE Transactions on Information Forensics and Security","volume":"5 1","pages":""},"PeriodicalIF":6.8,"publicationDate":"2025-02-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143495479","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":1,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Secrecy Coding for the Binary Symmetric Wiretap Channel via Linear Programming
IF 6.8 1区 计算机科学
IEEE Transactions on Information Forensics and Security Pub Date : 2025-02-25 DOI: 10.1109/tifs.2025.3545301
Ali Nikkhah, Morteza Shoushtari, Bahareh Akhbari, Willie K. Harrison
{"title":"Secrecy Coding for the Binary Symmetric Wiretap Channel via Linear Programming","authors":"Ali Nikkhah, Morteza Shoushtari, Bahareh Akhbari, Willie K. Harrison","doi":"10.1109/tifs.2025.3545301","DOIUrl":"https://doi.org/10.1109/tifs.2025.3545301","url":null,"abstract":"","PeriodicalId":13492,"journal":{"name":"IEEE Transactions on Information Forensics and Security","volume":"57 1","pages":""},"PeriodicalIF":6.8,"publicationDate":"2025-02-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143495501","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":1,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Reliable Open-Set Network Traffic Classification
IF 6.8 1区 计算机科学
IEEE Transactions on Information Forensics and Security Pub Date : 2025-02-24 DOI: 10.1109/tifs.2025.3544067
Xueman Wang, Yipeng Wang, Yingxu Lai, Zhiyu Hao, Alex X. Liu
{"title":"Reliable Open-Set Network Traffic Classification","authors":"Xueman Wang, Yipeng Wang, Yingxu Lai, Zhiyu Hao, Alex X. Liu","doi":"10.1109/tifs.2025.3544067","DOIUrl":"https://doi.org/10.1109/tifs.2025.3544067","url":null,"abstract":"","PeriodicalId":13492,"journal":{"name":"IEEE Transactions on Information Forensics and Security","volume":"14 1","pages":""},"PeriodicalIF":6.8,"publicationDate":"2025-02-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143486223","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":1,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Achieving Positive Rate of Covert Communications Covered by Randomly Activated Overt Users
IF 6.8 1区 计算机科学
IEEE Transactions on Information Forensics and Security Pub Date : 2025-02-24 DOI: 10.1109/tifs.2025.3544957
Bichen Kang, Neng Ye, Jianping An
{"title":"Achieving Positive Rate of Covert Communications Covered by Randomly Activated Overt Users","authors":"Bichen Kang, Neng Ye, Jianping An","doi":"10.1109/tifs.2025.3544957","DOIUrl":"https://doi.org/10.1109/tifs.2025.3544957","url":null,"abstract":"","PeriodicalId":13492,"journal":{"name":"IEEE Transactions on Information Forensics and Security","volume":"32 1","pages":""},"PeriodicalIF":6.8,"publicationDate":"2025-02-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143486224","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":1,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Deep Prediction and Efficient 3D Mapping of Color Images for Reversible Data Hiding
IF 6.8 1区 计算机科学
IEEE Transactions on Information Forensics and Security Pub Date : 2025-02-24 DOI: 10.1109/tifs.2025.3544956
Runwen Hu, Yuhong Wu, Shijun Xiang, Xiaolong Li, Yao Zhao
{"title":"Deep Prediction and Efficient 3D Mapping of Color Images for Reversible Data Hiding","authors":"Runwen Hu, Yuhong Wu, Shijun Xiang, Xiaolong Li, Yao Zhao","doi":"10.1109/tifs.2025.3544956","DOIUrl":"https://doi.org/10.1109/tifs.2025.3544956","url":null,"abstract":"","PeriodicalId":13492,"journal":{"name":"IEEE Transactions on Information Forensics and Security","volume":"65 1","pages":""},"PeriodicalIF":6.8,"publicationDate":"2025-02-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143486225","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":1,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Screen-Shooting Robust Watermark Based on Style Transfer and Structural Re-parameterization
IF 6.8 1区 计算机科学
IEEE Transactions on Information Forensics and Security Pub Date : 2025-02-21 DOI: 10.1109/tifs.2025.3542992
Guangyong Gao, Xiaoan Chen, Li Li, Zhihua Xia, Jianwei Fei, Yun-Qing Shi
{"title":"Screen-Shooting Robust Watermark Based on Style Transfer and Structural Re-parameterization","authors":"Guangyong Gao, Xiaoan Chen, Li Li, Zhihua Xia, Jianwei Fei, Yun-Qing Shi","doi":"10.1109/tifs.2025.3542992","DOIUrl":"https://doi.org/10.1109/tifs.2025.3542992","url":null,"abstract":"","PeriodicalId":13492,"journal":{"name":"IEEE Transactions on Information Forensics and Security","volume":"30 1","pages":""},"PeriodicalIF":6.8,"publicationDate":"2025-02-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143470582","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":1,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Post-Quantum Rollup: Falcon Signature Aggregation Based on SNARG with Enhanced Gates
IF 6.8 1区 计算机科学
IEEE Transactions on Information Forensics and Security Pub Date : 2025-02-21 DOI: 10.1109/tifs.2025.3544490
Tianyu Zhaolu, Zhiguo Wan, Huaqun Wang
{"title":"Post-Quantum Rollup: Falcon Signature Aggregation Based on SNARG with Enhanced Gates","authors":"Tianyu Zhaolu, Zhiguo Wan, Huaqun Wang","doi":"10.1109/tifs.2025.3544490","DOIUrl":"https://doi.org/10.1109/tifs.2025.3544490","url":null,"abstract":"","PeriodicalId":13492,"journal":{"name":"IEEE Transactions on Information Forensics and Security","volume":"2018 1","pages":""},"PeriodicalIF":6.8,"publicationDate":"2025-02-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143470580","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":1,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
HSM-Based Architecture to Detect Insider Attacks on Server-Side Data
IF 6.8 1区 计算机科学
IEEE Transactions on Information Forensics and Security Pub Date : 2025-02-21 DOI: 10.1109/tifs.2025.3544485
Marc Dib, Samuel Pierre
{"title":"HSM-Based Architecture to Detect Insider Attacks on Server-Side Data","authors":"Marc Dib, Samuel Pierre","doi":"10.1109/tifs.2025.3544485","DOIUrl":"https://doi.org/10.1109/tifs.2025.3544485","url":null,"abstract":"","PeriodicalId":13492,"journal":{"name":"IEEE Transactions on Information Forensics and Security","volume":"3 1","pages":""},"PeriodicalIF":6.8,"publicationDate":"2025-02-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143470583","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":1,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Hamster: A Fast Synchronous Byzantine Fault Tolerant Protocol
IF 6.8 1区 计算机科学
IEEE Transactions on Information Forensics and Security Pub Date : 2025-02-20 DOI: 10.1109/tifs.2025.3544034
Ximing Fu, Mo Li, Qingming Zeng, Tianyang Li, Shenghao Yang, Yonghui Guan, Chuanyi Liu
{"title":"Hamster: A Fast Synchronous Byzantine Fault Tolerant Protocol","authors":"Ximing Fu, Mo Li, Qingming Zeng, Tianyang Li, Shenghao Yang, Yonghui Guan, Chuanyi Liu","doi":"10.1109/tifs.2025.3544034","DOIUrl":"https://doi.org/10.1109/tifs.2025.3544034","url":null,"abstract":"","PeriodicalId":13492,"journal":{"name":"IEEE Transactions on Information Forensics and Security","volume":"21 1","pages":""},"PeriodicalIF":6.8,"publicationDate":"2025-02-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143462597","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":1,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信