{"title":"Towards Efficient and Certified Recovery from Poisoning Attacks in Federated Learning","authors":"Yu Jiang, Jiyuan Shen, Ziyao Liu, Chee Wei Tan, Kwok-Yan Lam","doi":"10.1109/tifs.2025.3533907","DOIUrl":"https://doi.org/10.1109/tifs.2025.3533907","url":null,"abstract":"","PeriodicalId":13492,"journal":{"name":"IEEE Transactions on Information Forensics and Security","volume":"38 1","pages":""},"PeriodicalIF":6.8,"publicationDate":"2025-01-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143031011","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":1,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Parameter Interpolation Adversarial Training for Robust Image Classification","authors":"Xin Liu, Yichen Yang, Kun He, John E. Hopcroft","doi":"10.1109/tifs.2025.3533925","DOIUrl":"https://doi.org/10.1109/tifs.2025.3533925","url":null,"abstract":"","PeriodicalId":13492,"journal":{"name":"IEEE Transactions on Information Forensics and Security","volume":"14 1","pages":""},"PeriodicalIF":6.8,"publicationDate":"2025-01-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143030792","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":1,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
You Li, Yan Huo, Tianhui Zhang, Zhongguo Zhou, Qinghe Gao, Tao Yan, Yongning Yang, Tao Jing
{"title":"Distributed Physical Layer Authentication With Dynamic Soft Voting for Smart Distribution Grids","authors":"You Li, Yan Huo, Tianhui Zhang, Zhongguo Zhou, Qinghe Gao, Tao Yan, Yongning Yang, Tao Jing","doi":"10.1109/tifs.2025.3533914","DOIUrl":"https://doi.org/10.1109/tifs.2025.3533914","url":null,"abstract":"","PeriodicalId":13492,"journal":{"name":"IEEE Transactions on Information Forensics and Security","volume":"109 1","pages":""},"PeriodicalIF":6.8,"publicationDate":"2025-01-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143031010","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":1,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Self-supervised Locality-Sensitive Deep Hashing for the Robust Retrieval of Degraded Images","authors":"Lingyun Xiang, Hailang Hu, Qian Li, Hao Yu, Xiaobo Shen","doi":"10.1109/tifs.2025.3531104","DOIUrl":"https://doi.org/10.1109/tifs.2025.3531104","url":null,"abstract":"","PeriodicalId":13492,"journal":{"name":"IEEE Transactions on Information Forensics and Security","volume":"38 1","pages":""},"PeriodicalIF":6.8,"publicationDate":"2025-01-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143027167","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":1,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Zhuoqun Yan, Wenfang Zhang, Xiaomin Wang, Muhammad Khurram Khan
{"title":"Comments on “VCD-FL: Verifiable, Collusion-Resistant, and Dynamic Federated Learning”","authors":"Zhuoqun Yan, Wenfang Zhang, Xiaomin Wang, Muhammad Khurram Khan","doi":"10.1109/tifs.2025.3533141","DOIUrl":"https://doi.org/10.1109/tifs.2025.3533141","url":null,"abstract":"","PeriodicalId":13492,"journal":{"name":"IEEE Transactions on Information Forensics and Security","volume":"29 1","pages":""},"PeriodicalIF":6.8,"publicationDate":"2025-01-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143026520","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":1,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Quantifying Privacy Risks of Behavioral Semantics in Mobile Communication Services","authors":"Guoying Qiu, Tiecheng Bai, Guoming Tang, Deke Guo, Chuandong Li, Yan Gan, Baoping Zhou, Yulong Shen","doi":"10.1109/tifs.2025.3533144","DOIUrl":"https://doi.org/10.1109/tifs.2025.3533144","url":null,"abstract":"","PeriodicalId":13492,"journal":{"name":"IEEE Transactions on Information Forensics and Security","volume":"13 1","pages":""},"PeriodicalIF":6.8,"publicationDate":"2025-01-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143027184","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":1,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Manlin Wang, Yao Yao, Haiyang Ding, Shihai Shao, Bin Xia, Jiangzhou Wang
{"title":"Angle and Distance Discrimination by Utilizing Frequency Conversion Capability of STC-IRS for Covert Communications","authors":"Manlin Wang, Yao Yao, Haiyang Ding, Shihai Shao, Bin Xia, Jiangzhou Wang","doi":"10.1109/tifs.2025.3530689","DOIUrl":"https://doi.org/10.1109/tifs.2025.3530689","url":null,"abstract":"","PeriodicalId":13492,"journal":{"name":"IEEE Transactions on Information Forensics and Security","volume":"24 1","pages":""},"PeriodicalIF":6.8,"publicationDate":"2025-01-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142991402","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":1,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Dynamic event-triggered control for leader-following consensus of nonlinear multi-agent systems against malicious attacks","authors":"Lingzhi Zhao, Jianquan Lu, Yang Liu, Jungang Lou","doi":"10.1109/tifs.2025.3531775","DOIUrl":"https://doi.org/10.1109/tifs.2025.3531775","url":null,"abstract":"","PeriodicalId":13492,"journal":{"name":"IEEE Transactions on Information Forensics and Security","volume":"49 1","pages":""},"PeriodicalIF":6.8,"publicationDate":"2025-01-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142991445","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":1,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}