IEEE Transactions on Information Forensics and Security最新文献

筛选
英文 中文
Jump Routing: Towards Scalable and Lightweight Anonymous Network 跳转路由:走向可扩展和轻量级匿名网络
IF 6.8 1区 计算机科学
IEEE Transactions on Information Forensics and Security Pub Date : 2025-10-01 DOI: 10.1109/tifs.2025.3616618
Yusheng Xia, Jinshu Su, Rongmao Chen, Congxi Song
{"title":"Jump Routing: Towards Scalable and Lightweight Anonymous Network","authors":"Yusheng Xia, Jinshu Su, Rongmao Chen, Congxi Song","doi":"10.1109/tifs.2025.3616618","DOIUrl":"https://doi.org/10.1109/tifs.2025.3616618","url":null,"abstract":"","PeriodicalId":13492,"journal":{"name":"IEEE Transactions on Information Forensics and Security","volume":"24 1","pages":""},"PeriodicalIF":6.8,"publicationDate":"2025-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"145203438","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":1,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Mixed-Bit Sampling Marking: Towards Unifying Document Authentication in Copy-Sensitive Graphical Codes 混合位采样标记:实现复制敏感图形码文档认证的统一
IF 6.8 1区 计算机科学
IEEE Transactions on Information Forensics and Security Pub Date : 2025-10-01 DOI: 10.1109/tifs.2025.3616619
Jiale Chen, Li Dong, Wei Wang, Rangding Wang, Weiwei Sun, Yushu Zhang, Jiantao Zhou
{"title":"Mixed-Bit Sampling Marking: Towards Unifying Document Authentication in Copy-Sensitive Graphical Codes","authors":"Jiale Chen, Li Dong, Wei Wang, Rangding Wang, Weiwei Sun, Yushu Zhang, Jiantao Zhou","doi":"10.1109/tifs.2025.3616619","DOIUrl":"https://doi.org/10.1109/tifs.2025.3616619","url":null,"abstract":"","PeriodicalId":13492,"journal":{"name":"IEEE Transactions on Information Forensics and Security","volume":"38 1","pages":""},"PeriodicalIF":6.8,"publicationDate":"2025-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"145203441","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":1,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
VSecNN: Verifiable and Privacy-Preserving Neural Network Inference in Cloud Service 云服务中的可验证和隐私保护神经网络推理
IF 6.8 1区 计算机科学
IEEE Transactions on Information Forensics and Security Pub Date : 2025-10-01 DOI: 10.1109/tifs.2025.3616623
Wenti Yang, Xuan Li, Meng Li, Zijian Zhang, Zhitao Guan, Liehuang Zhu
{"title":"VSecNN: Verifiable and Privacy-Preserving Neural Network Inference in Cloud Service","authors":"Wenti Yang, Xuan Li, Meng Li, Zijian Zhang, Zhitao Guan, Liehuang Zhu","doi":"10.1109/tifs.2025.3616623","DOIUrl":"https://doi.org/10.1109/tifs.2025.3616623","url":null,"abstract":"","PeriodicalId":13492,"journal":{"name":"IEEE Transactions on Information Forensics and Security","volume":"33 1","pages":""},"PeriodicalIF":6.8,"publicationDate":"2025-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"145203516","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":1,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Amplifying Training Data Exposure through Fine-Tuning with Pseudo-Labeled Memberships 伪标记隶属度微调放大训练数据曝光
IF 6.8 1区 计算机科学
IEEE Transactions on Information Forensics and Security Pub Date : 2025-10-01 DOI: 10.1109/tifs.2025.3613882
Myunggyo Oh, Hong Eun Ahn, Leo Hyun Park, Taekyoung Kwon
{"title":"Amplifying Training Data Exposure through Fine-Tuning with Pseudo-Labeled Memberships","authors":"Myunggyo Oh, Hong Eun Ahn, Leo Hyun Park, Taekyoung Kwon","doi":"10.1109/tifs.2025.3613882","DOIUrl":"https://doi.org/10.1109/tifs.2025.3613882","url":null,"abstract":"","PeriodicalId":13492,"journal":{"name":"IEEE Transactions on Information Forensics and Security","volume":"29 1","pages":""},"PeriodicalIF":6.8,"publicationDate":"2025-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"145203511","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":1,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Improving Password Guessing with Isomorphism Modeling 利用同构建模改进密码猜测
IF 6.8 1区 计算机科学
IEEE Transactions on Information Forensics and Security Pub Date : 2025-10-01 DOI: 10.1109/tifs.2025.3616595
Xudong Yang, Zhenjia Xiao, Xiaoyu Wu, Kaiwen Xing, He Tang, Tao Yang, Kaitai Liang, Hu Xiong
{"title":"Improving Password Guessing with Isomorphism Modeling","authors":"Xudong Yang, Zhenjia Xiao, Xiaoyu Wu, Kaiwen Xing, He Tang, Tao Yang, Kaitai Liang, Hu Xiong","doi":"10.1109/tifs.2025.3616595","DOIUrl":"https://doi.org/10.1109/tifs.2025.3616595","url":null,"abstract":"","PeriodicalId":13492,"journal":{"name":"IEEE Transactions on Information Forensics and Security","volume":"3 1","pages":""},"PeriodicalIF":6.8,"publicationDate":"2025-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"145203437","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":1,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Non-Markovian Game Approach on Labeled Attack Graphs for Security Decision-making in Industrial Control Systems 工业控制系统安全决策中标记攻击图的非马尔可夫博弈方法
IF 6.8 1区 计算机科学
IEEE Transactions on Information Forensics and Security Pub Date : 2025-10-01 DOI: 10.1109/tifs.2025.3616599
Yiqun Yue, Shaolin Tan, Ye Tao, Nian Liu, Jinhu Lü
{"title":"A Non-Markovian Game Approach on Labeled Attack Graphs for Security Decision-making in Industrial Control Systems","authors":"Yiqun Yue, Shaolin Tan, Ye Tao, Nian Liu, Jinhu Lü","doi":"10.1109/tifs.2025.3616599","DOIUrl":"https://doi.org/10.1109/tifs.2025.3616599","url":null,"abstract":"","PeriodicalId":13492,"journal":{"name":"IEEE Transactions on Information Forensics and Security","volume":"124 1","pages":""},"PeriodicalIF":6.8,"publicationDate":"2025-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"145203512","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":1,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Cross-Modal Driven Object Restoration for 3D Point Cloud Backdoor Defense 三维点云后门防御的跨模态驱动对象恢复
IF 6.8 1区 计算机科学
IEEE Transactions on Information Forensics and Security Pub Date : 2025-09-29 DOI: 10.1109/tifs.2025.3615416
Jiawei Lian, Xia Du, Jianghua Liu, Le Hui, Jian Yang
{"title":"Cross-Modal Driven Object Restoration for 3D Point Cloud Backdoor Defense","authors":"Jiawei Lian, Xia Du, Jianghua Liu, Le Hui, Jian Yang","doi":"10.1109/tifs.2025.3615416","DOIUrl":"https://doi.org/10.1109/tifs.2025.3615416","url":null,"abstract":"","PeriodicalId":13492,"journal":{"name":"IEEE Transactions on Information Forensics and Security","volume":"8 1","pages":""},"PeriodicalIF":6.8,"publicationDate":"2025-09-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"145188864","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":1,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Zero-Latency Website Identification for QUIC Traffic Based on Feature Alignment 基于特征对齐的QUIC流量零延迟网站识别
IF 6.8 1区 计算机科学
IEEE Transactions on Information Forensics and Security Pub Date : 2025-09-29 DOI: 10.1109/tifs.2025.3615743
Jingwen Tan, Wei Zhao, Huanran Wang, Shuai Han, Mingzhu Lai, Wu Yang
{"title":"A Zero-Latency Website Identification for QUIC Traffic Based on Feature Alignment","authors":"Jingwen Tan, Wei Zhao, Huanran Wang, Shuai Han, Mingzhu Lai, Wu Yang","doi":"10.1109/tifs.2025.3615743","DOIUrl":"https://doi.org/10.1109/tifs.2025.3615743","url":null,"abstract":"","PeriodicalId":13492,"journal":{"name":"IEEE Transactions on Information Forensics and Security","volume":"31 1","pages":""},"PeriodicalIF":6.8,"publicationDate":"2025-09-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"145188867","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":1,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
An Image Robust Batch Steganography Framework with Minimum Embedding Signs 一种嵌入符号最小的图像鲁棒批隐写框架
IF 6.8 1区 计算机科学
IEEE Transactions on Information Forensics and Security Pub Date : 2025-09-29 DOI: 10.1109/tifs.2025.3615446
Yi Zhang, Yuanyuan Ma, QianQian Zhang, Yang Pei, Xiangyang Luo
{"title":"An Image Robust Batch Steganography Framework with Minimum Embedding Signs","authors":"Yi Zhang, Yuanyuan Ma, QianQian Zhang, Yang Pei, Xiangyang Luo","doi":"10.1109/tifs.2025.3615446","DOIUrl":"https://doi.org/10.1109/tifs.2025.3615446","url":null,"abstract":"","PeriodicalId":13492,"journal":{"name":"IEEE Transactions on Information Forensics and Security","volume":"26 1","pages":""},"PeriodicalIF":6.8,"publicationDate":"2025-09-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"145188868","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":1,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
F2Attack: Two-Factors Scoring Method For Query-Efficient Hard-Label Black-Box Textual Adversarial Attacks F2Attack:查询高效硬标签黑盒文本对抗性攻击的双因素评分方法
IF 6.8 1区 计算机科学
IEEE Transactions on Information Forensics and Security Pub Date : 2025-09-29 DOI: 10.1109/tifs.2025.3615475
Jiahui Wang, Hua Zhang, Yongji Wang, Haoran Gao, Qi Li, Huiyu Zhou
{"title":"F2Attack: Two-Factors Scoring Method For Query-Efficient Hard-Label Black-Box Textual Adversarial Attacks","authors":"Jiahui Wang, Hua Zhang, Yongji Wang, Haoran Gao, Qi Li, Huiyu Zhou","doi":"10.1109/tifs.2025.3615475","DOIUrl":"https://doi.org/10.1109/tifs.2025.3615475","url":null,"abstract":"","PeriodicalId":13492,"journal":{"name":"IEEE Transactions on Information Forensics and Security","volume":"116 1","pages":""},"PeriodicalIF":6.8,"publicationDate":"2025-09-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"145188874","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":1,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信