IEEE Transactions on Information Forensics and Security最新文献

筛选
英文 中文
Reducing Internal Collateral Damage from Distributed Denial of Service (DDoS) Attacks through Micro-Service Cloud Architecture
IF 6.8 1区 计算机科学
IEEE Transactions on Information Forensics and Security Pub Date : 2024-12-20 DOI: 10.1109/tifs.2024.3516560
Anmol Kumar, Mayank Agarwal
{"title":"Reducing Internal Collateral Damage from Distributed Denial of Service (DDoS) Attacks through Micro-Service Cloud Architecture","authors":"Anmol Kumar, Mayank Agarwal","doi":"10.1109/tifs.2024.3516560","DOIUrl":"https://doi.org/10.1109/tifs.2024.3516560","url":null,"abstract":"","PeriodicalId":13492,"journal":{"name":"IEEE Transactions on Information Forensics and Security","volume":"265 1","pages":""},"PeriodicalIF":6.8,"publicationDate":"2024-12-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142867141","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":1,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
zkDL: Efficient Zero-Knowledge Proofs of Deep Learning Training
IF 6.8 1区 计算机科学
IEEE Transactions on Information Forensics and Security Pub Date : 2024-12-20 DOI: 10.1109/tifs.2024.3520863
Haochen Sun, Tonghe Bai, Jason Li, Hongyang Zhang
{"title":"zkDL: Efficient Zero-Knowledge Proofs of Deep Learning Training","authors":"Haochen Sun, Tonghe Bai, Jason Li, Hongyang Zhang","doi":"10.1109/tifs.2024.3520863","DOIUrl":"https://doi.org/10.1109/tifs.2024.3520863","url":null,"abstract":"","PeriodicalId":13492,"journal":{"name":"IEEE Transactions on Information Forensics and Security","volume":"24 1","pages":""},"PeriodicalIF":6.8,"publicationDate":"2024-12-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142867142","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":1,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Resilient and Redactable Blockchain with 2-Level Rewriting and Version Detection
IF 6.8 1区 计算机科学
IEEE Transactions on Information Forensics and Security Pub Date : 2024-12-20 DOI: 10.1109/tifs.2024.3520830
Wei Wang, Haipeng Peng, Junke Duan, Licheng Wang, Xiaoya Hu, Zilin Zhao
{"title":"Resilient and Redactable Blockchain with 2-Level Rewriting and Version Detection","authors":"Wei Wang, Haipeng Peng, Junke Duan, Licheng Wang, Xiaoya Hu, Zilin Zhao","doi":"10.1109/tifs.2024.3520830","DOIUrl":"https://doi.org/10.1109/tifs.2024.3520830","url":null,"abstract":"","PeriodicalId":13492,"journal":{"name":"IEEE Transactions on Information Forensics and Security","volume":"31 1","pages":""},"PeriodicalIF":6.8,"publicationDate":"2024-12-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142867076","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":1,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
DRFormer: A Discriminable and Reliable Feature Transformer for Person Re-Identification
IF 6.8 1区 计算机科学
IEEE Transactions on Information Forensics and Security Pub Date : 2024-12-19 DOI: 10.1109/tifs.2024.3520304
Pingyu Wang, Xingjian Zheng, Linbo Qing, Bonan Li, Fei Su, Zhicheng Zhao, Honggang Chen
{"title":"DRFormer: A Discriminable and Reliable Feature Transformer for Person Re-Identification","authors":"Pingyu Wang, Xingjian Zheng, Linbo Qing, Bonan Li, Fei Su, Zhicheng Zhao, Honggang Chen","doi":"10.1109/tifs.2024.3520304","DOIUrl":"https://doi.org/10.1109/tifs.2024.3520304","url":null,"abstract":"","PeriodicalId":13492,"journal":{"name":"IEEE Transactions on Information Forensics and Security","volume":"31 1","pages":""},"PeriodicalIF":6.8,"publicationDate":"2024-12-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142858456","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":1,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
GroupFace: Imbalanced Age Estimation Based on Multi-hop Attention Graph Convolutional Network and Group-aware Margin Optimization GroupFace:基于多跳注意力图卷积网络和群体感知边际优化的不平衡年龄估计
IF 6.8 1区 计算机科学
IEEE Transactions on Information Forensics and Security Pub Date : 2024-12-18 DOI: 10.1109/tifs.2024.3520020
Yiping Zhang, Yuntao Shou, Wei Ai, Tao Meng, Keqin Li
{"title":"GroupFace: Imbalanced Age Estimation Based on Multi-hop Attention Graph Convolutional Network and Group-aware Margin Optimization","authors":"Yiping Zhang, Yuntao Shou, Wei Ai, Tao Meng, Keqin Li","doi":"10.1109/tifs.2024.3520020","DOIUrl":"https://doi.org/10.1109/tifs.2024.3520020","url":null,"abstract":"","PeriodicalId":13492,"journal":{"name":"IEEE Transactions on Information Forensics and Security","volume":"23 1","pages":""},"PeriodicalIF":6.8,"publicationDate":"2024-12-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142849469","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":1,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Efficient and Secure Post-Quantum Certificateless Signcryption with Linkability for IoMT
IF 6.8 1区 计算机科学
IEEE Transactions on Information Forensics and Security Pub Date : 2024-12-18 DOI: 10.1109/tifs.2024.3520007
Shiyuan Xu, Xue Chen, Yu Guo, Siu-Ming Yiu, Shang Gao, Bin Xiao
{"title":"Efficient and Secure Post-Quantum Certificateless Signcryption with Linkability for IoMT","authors":"Shiyuan Xu, Xue Chen, Yu Guo, Siu-Ming Yiu, Shang Gao, Bin Xiao","doi":"10.1109/tifs.2024.3520007","DOIUrl":"https://doi.org/10.1109/tifs.2024.3520007","url":null,"abstract":"","PeriodicalId":13492,"journal":{"name":"IEEE Transactions on Information Forensics and Security","volume":"84 1","pages":""},"PeriodicalIF":6.8,"publicationDate":"2024-12-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142849579","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":1,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Privacy-Preserving Localization for Underwater Acoustic Sensor Networks: A Differential Privacy-Based Deep Learning Approach 水下声学传感器网络的隐私保护定位:基于差异隐私的深度学习方法
IF 6.8 1区 计算机科学
IEEE Transactions on Information Forensics and Security Pub Date : 2024-12-18 DOI: 10.1109/tifs.2024.3518069
Jing Yan, Yuhan Zheng, Xian Yang, Cailian Chen, Xinping Guan
{"title":"Privacy-Preserving Localization for Underwater Acoustic Sensor Networks: A Differential Privacy-Based Deep Learning Approach","authors":"Jing Yan, Yuhan Zheng, Xian Yang, Cailian Chen, Xinping Guan","doi":"10.1109/tifs.2024.3518069","DOIUrl":"https://doi.org/10.1109/tifs.2024.3518069","url":null,"abstract":"","PeriodicalId":13492,"journal":{"name":"IEEE Transactions on Information Forensics and Security","volume":"10 1","pages":""},"PeriodicalIF":6.8,"publicationDate":"2024-12-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142849470","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":1,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Robust AI-Synthesized Speech Detection Using Feature Decomposition Learning and Synthesizer Feature Augmentation
IF 6.8 1区 计算机科学
IEEE Transactions on Information Forensics and Security Pub Date : 2024-12-18 DOI: 10.1109/tifs.2024.3520001
Kuiyuan Zhang, Zhongyun Hua, Yushu Zhang, Yifang Guo, Tao Xiang
{"title":"Robust AI-Synthesized Speech Detection Using Feature Decomposition Learning and Synthesizer Feature Augmentation","authors":"Kuiyuan Zhang, Zhongyun Hua, Yushu Zhang, Yifang Guo, Tao Xiang","doi":"10.1109/tifs.2024.3520001","DOIUrl":"https://doi.org/10.1109/tifs.2024.3520001","url":null,"abstract":"","PeriodicalId":13492,"journal":{"name":"IEEE Transactions on Information Forensics and Security","volume":"40 1","pages":""},"PeriodicalIF":6.8,"publicationDate":"2024-12-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142849581","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":1,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Query-Efficient Model Inversion Attacks: An Information Flow View
IF 6.8 1区 计算机科学
IEEE Transactions on Information Forensics and Security Pub Date : 2024-12-18 DOI: 10.1109/tifs.2024.3518779
Yixiao Xu, Binxing Fang, Mohan Li, Xiaolei Liu, Zhihong Tian
{"title":"Query-Efficient Model Inversion Attacks: An Information Flow View","authors":"Yixiao Xu, Binxing Fang, Mohan Li, Xiaolei Liu, Zhihong Tian","doi":"10.1109/tifs.2024.3518779","DOIUrl":"https://doi.org/10.1109/tifs.2024.3518779","url":null,"abstract":"","PeriodicalId":13492,"journal":{"name":"IEEE Transactions on Information Forensics and Security","volume":"28 1","pages":""},"PeriodicalIF":6.8,"publicationDate":"2024-12-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142849580","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":1,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Multi-Level Resource-Coherented Graph Learning For Website Fingerprinting Attacks 针对网站指纹攻击的多层次资源连贯图学习
IF 6.8 1区 计算机科学
IEEE Transactions on Information Forensics and Security Pub Date : 2024-12-18 DOI: 10.1109/tifs.2024.3520014
Bo Gao, Weiwei Liu, Guangjie Liu, Fengyuan Nie, Jianan Huang
{"title":"Multi-Level Resource-Coherented Graph Learning For Website Fingerprinting Attacks","authors":"Bo Gao, Weiwei Liu, Guangjie Liu, Fengyuan Nie, Jianan Huang","doi":"10.1109/tifs.2024.3520014","DOIUrl":"https://doi.org/10.1109/tifs.2024.3520014","url":null,"abstract":"","PeriodicalId":13492,"journal":{"name":"IEEE Transactions on Information Forensics and Security","volume":"88 1","pages":""},"PeriodicalIF":6.8,"publicationDate":"2024-12-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142849471","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":1,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信