IEEE Transactions on Information Forensics and Security最新文献

筛选
英文 中文
Modality Unified Attack for Omni-Modality Person Re-Identification 全模态人再识别的模态统一攻击
IF 6.8 1区 计算机科学
IEEE Transactions on Information Forensics and Security Pub Date : 2025-05-05 DOI: 10.1109/tifs.2025.3566993
Yuan Bian, Min Liu, Yunqi Yi, Xueping Wang, Yunfeng Ma, Yaonan Wang
{"title":"Modality Unified Attack for Omni-Modality Person Re-Identification","authors":"Yuan Bian, Min Liu, Yunqi Yi, Xueping Wang, Yunfeng Ma, Yaonan Wang","doi":"10.1109/tifs.2025.3566993","DOIUrl":"https://doi.org/10.1109/tifs.2025.3566993","url":null,"abstract":"","PeriodicalId":13492,"journal":{"name":"IEEE Transactions on Information Forensics and Security","volume":"15 1","pages":"1-1"},"PeriodicalIF":6.8,"publicationDate":"2025-05-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143910439","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":1,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Differential-Trust-Mechanism Based Trade-off Method Between Privacy and Accuracy in Recommender Systems 基于差分信任机制的推荐系统隐私与准确性权衡方法
IF 6.8 1区 计算机科学
IEEE Transactions on Information Forensics and Security Pub Date : 2025-05-05 DOI: 10.1109/tifs.2025.3566509
Guangquan Xu, Shicheng Feng, Hao Xi, Qingyang Yan, Wenshan Li, Cong Wang, Wei Wang, Shaoying Liu, Zhihong Tian, Xi Zheng
{"title":"Differential-Trust-Mechanism Based Trade-off Method Between Privacy and Accuracy in Recommender Systems","authors":"Guangquan Xu, Shicheng Feng, Hao Xi, Qingyang Yan, Wenshan Li, Cong Wang, Wei Wang, Shaoying Liu, Zhihong Tian, Xi Zheng","doi":"10.1109/tifs.2025.3566509","DOIUrl":"https://doi.org/10.1109/tifs.2025.3566509","url":null,"abstract":"","PeriodicalId":13492,"journal":{"name":"IEEE Transactions on Information Forensics and Security","volume":"99 1","pages":"1-1"},"PeriodicalIF":6.8,"publicationDate":"2025-05-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143910438","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":1,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Semantic Token Transformer for Face Forgery Detection 用于人脸伪造检测的语义令牌转换器
IF 6.8 1区 计算机科学
IEEE Transactions on Information Forensics and Security Pub Date : 2025-05-05 DOI: 10.1109/tifs.2025.3567110
Chunlei Peng, Xiaoyi Luo, Decheng Liu, Nannan Wang, Ruimin Hu, Xinbo Gao
{"title":"Semantic Token Transformer for Face Forgery Detection","authors":"Chunlei Peng, Xiaoyi Luo, Decheng Liu, Nannan Wang, Ruimin Hu, Xinbo Gao","doi":"10.1109/tifs.2025.3567110","DOIUrl":"https://doi.org/10.1109/tifs.2025.3567110","url":null,"abstract":"","PeriodicalId":13492,"journal":{"name":"IEEE Transactions on Information Forensics and Security","volume":"35 1","pages":"1-1"},"PeriodicalIF":6.8,"publicationDate":"2025-05-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143910440","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":1,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Breaking XOR Arbiter PUFs with Chosen Challenge Attack 用选择的挑战攻击打破XOR仲裁者PUFs
IF 6.8 1区 计算机科学
IEEE Transactions on Information Forensics and Security Pub Date : 2025-05-02 DOI: 10.1109/tifs.2025.3566538
Niloufar Sayadi, Phuong Ha Nguyen, Marten Van Dijk, Chenglu Jin
{"title":"Breaking XOR Arbiter PUFs with Chosen Challenge Attack","authors":"Niloufar Sayadi, Phuong Ha Nguyen, Marten Van Dijk, Chenglu Jin","doi":"10.1109/tifs.2025.3566538","DOIUrl":"https://doi.org/10.1109/tifs.2025.3566538","url":null,"abstract":"","PeriodicalId":13492,"journal":{"name":"IEEE Transactions on Information Forensics and Security","volume":"45 1","pages":"1-1"},"PeriodicalIF":6.8,"publicationDate":"2025-05-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143901511","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":1,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Trinity: A Scalable and Forward-Secure DSSE for Spatio-Temporal Range Query 三位一体:用于时空范围查询的可扩展和前向安全DSSE
IF 6.8 1区 计算机科学
IEEE Transactions on Information Forensics and Security Pub Date : 2025-05-02 DOI: 10.1109/tifs.2025.3566552
Zhijun Li, Kuizhi Liu, Minghui Xu, Xiangyu Wang, Yinbin Miao, Jianfeng Ma, Xiuzhen Cheng
{"title":"Trinity: A Scalable and Forward-Secure DSSE for Spatio-Temporal Range Query","authors":"Zhijun Li, Kuizhi Liu, Minghui Xu, Xiangyu Wang, Yinbin Miao, Jianfeng Ma, Xiuzhen Cheng","doi":"10.1109/tifs.2025.3566552","DOIUrl":"https://doi.org/10.1109/tifs.2025.3566552","url":null,"abstract":"","PeriodicalId":13492,"journal":{"name":"IEEE Transactions on Information Forensics and Security","volume":"95 1","pages":"1-1"},"PeriodicalIF":6.8,"publicationDate":"2025-05-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143901202","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":1,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Challenge-Response to Authenticate Drone Communications: A Game Theoretic Approach 挑战-响应认证无人机通信:博弈论方法
IF 6.8 1区 计算机科学
IEEE Transactions on Information Forensics and Security Pub Date : 2025-05-02 DOI: 10.1109/tifs.2025.3566534
Mattia Piana, Francesco Ardizzon, Stefano Tomasin
{"title":"Challenge-Response to Authenticate Drone Communications: A Game Theoretic Approach","authors":"Mattia Piana, Francesco Ardizzon, Stefano Tomasin","doi":"10.1109/tifs.2025.3566534","DOIUrl":"https://doi.org/10.1109/tifs.2025.3566534","url":null,"abstract":"","PeriodicalId":13492,"journal":{"name":"IEEE Transactions on Information Forensics and Security","volume":"15 1","pages":"1-1"},"PeriodicalIF":6.8,"publicationDate":"2025-05-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143901203","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":1,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Optimal Subcarrier Allocation Scheme for Physical-Layer Key Generation in an OFDMA Network OFDMA网络物理层密钥生成的最优子载波分配方案
IF 6.8 1区 计算机科学
IEEE Transactions on Information Forensics and Security Pub Date : 2025-05-01 DOI: 10.1109/tifs.2025.3566242
Qingjiang Xiao, Guyue Li, Zilong Liu, Aiqun Hu
{"title":"Optimal Subcarrier Allocation Scheme for Physical-Layer Key Generation in an OFDMA Network","authors":"Qingjiang Xiao, Guyue Li, Zilong Liu, Aiqun Hu","doi":"10.1109/tifs.2025.3566242","DOIUrl":"https://doi.org/10.1109/tifs.2025.3566242","url":null,"abstract":"","PeriodicalId":13492,"journal":{"name":"IEEE Transactions on Information Forensics and Security","volume":"19 1","pages":""},"PeriodicalIF":6.8,"publicationDate":"2025-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143898351","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":1,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Defending Against Model Inversion Attack via Feature Purification 基于特征净化的模型反转攻击防御
IF 6.8 1区 计算机科学
IEEE Transactions on Information Forensics and Security Pub Date : 2025-04-30 DOI: 10.1109/tifs.2025.3565997
Shenhao Shi, Yan Wo
{"title":"Defending Against Model Inversion Attack via Feature Purification","authors":"Shenhao Shi, Yan Wo","doi":"10.1109/tifs.2025.3565997","DOIUrl":"https://doi.org/10.1109/tifs.2025.3565997","url":null,"abstract":"","PeriodicalId":13492,"journal":{"name":"IEEE Transactions on Information Forensics and Security","volume":"9 1","pages":"1-1"},"PeriodicalIF":6.8,"publicationDate":"2025-04-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143893637","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":1,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
WF-A2D: Enhancing Privacy with Asymmetric Adversarial Defense Against Website Fingerprinting WF-A2D:利用非对称对抗性防御增强网站指纹识别的隐私保护
IF 6.8 1区 计算机科学
IEEE Transactions on Information Forensics and Security Pub Date : 2025-04-30 DOI: 10.1109/tifs.2025.3565994
Jia-Nan Huang, Weiwei Liu, Guangjie Liu, Bo Gao, Fengyuan Nie
{"title":"WF-A2D: Enhancing Privacy with Asymmetric Adversarial Defense Against Website Fingerprinting","authors":"Jia-Nan Huang, Weiwei Liu, Guangjie Liu, Bo Gao, Fengyuan Nie","doi":"10.1109/tifs.2025.3565994","DOIUrl":"https://doi.org/10.1109/tifs.2025.3565994","url":null,"abstract":"","PeriodicalId":13492,"journal":{"name":"IEEE Transactions on Information Forensics and Security","volume":"224 1","pages":"1-1"},"PeriodicalIF":6.8,"publicationDate":"2025-04-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143893636","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":1,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
DD-rPPGNet: De-interfering and Descriptive Feature Learning for Unsupervised rPPG Estimation DD-rPPGNet:无监督rPPG估计的去干扰和描述性特征学习
IF 6.8 1区 计算机科学
IEEE Transactions on Information Forensics and Security Pub Date : 2025-04-30 DOI: 10.1109/tifs.2025.3565965
Pei-Kai Huang, Tzu-Hsien Chen, Ya-Ting Chan, Kuan-Wen Chen, Chiou-Ting Hsu
{"title":"DD-rPPGNet: De-interfering and Descriptive Feature Learning for Unsupervised rPPG Estimation","authors":"Pei-Kai Huang, Tzu-Hsien Chen, Ya-Ting Chan, Kuan-Wen Chen, Chiou-Ting Hsu","doi":"10.1109/tifs.2025.3565965","DOIUrl":"https://doi.org/10.1109/tifs.2025.3565965","url":null,"abstract":"","PeriodicalId":13492,"journal":{"name":"IEEE Transactions on Information Forensics and Security","volume":"18 1","pages":"1-1"},"PeriodicalIF":6.8,"publicationDate":"2025-04-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143893638","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":1,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信