{"title":"Robust and Unstigmatized Imperceptible Perturbations for Rendering Face Manipulation Ineffective","authors":"Yibo Zhang, Weiguo Lin, Zhihong Tian, Geyong Min, Junfeng Xu, Yikun Xu","doi":"10.1109/tifs.2025.3592565","DOIUrl":"https://doi.org/10.1109/tifs.2025.3592565","url":null,"abstract":"","PeriodicalId":13492,"journal":{"name":"IEEE Transactions on Information Forensics and Security","volume":"14 1","pages":""},"PeriodicalIF":6.8,"publicationDate":"2025-07-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"144701954","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":1,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"New Visible Watermark Protection Mechanism Based on Information Hiding","authors":"Wenhong Huang, Yunshu Dai, Jianwei Fei, Fangjun Huang","doi":"10.1109/tifs.2025.3592572","DOIUrl":"https://doi.org/10.1109/tifs.2025.3592572","url":null,"abstract":"","PeriodicalId":13492,"journal":{"name":"IEEE Transactions on Information Forensics and Security","volume":"21 1","pages":""},"PeriodicalIF":6.8,"publicationDate":"2025-07-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"144701958","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":1,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Beining Wang, Yinuo Li, Jing Chen, Kun He, Meng Jia, Ruiying Du
{"title":"Forward and Backward Private Conjunctive Dynamic Searchable Symmetric Encryption with Refined Leakage Function and Low Communication","authors":"Beining Wang, Yinuo Li, Jing Chen, Kun He, Meng Jia, Ruiying Du","doi":"10.1109/tifs.2025.3592533","DOIUrl":"https://doi.org/10.1109/tifs.2025.3592533","url":null,"abstract":"","PeriodicalId":13492,"journal":{"name":"IEEE Transactions on Information Forensics and Security","volume":"10 1","pages":""},"PeriodicalIF":6.8,"publicationDate":"2025-07-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"144701961","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":1,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Meng Jia, Jing Chen, Yuanzheng Wang, Kun He, Min Shi, Ruiying Du
{"title":"Multi-authority Anonymous Credentials with Efficient and Decentralized Supervision","authors":"Meng Jia, Jing Chen, Yuanzheng Wang, Kun He, Min Shi, Ruiying Du","doi":"10.1109/tifs.2025.3592554","DOIUrl":"https://doi.org/10.1109/tifs.2025.3592554","url":null,"abstract":"","PeriodicalId":13492,"journal":{"name":"IEEE Transactions on Information Forensics and Security","volume":"37 1","pages":""},"PeriodicalIF":6.8,"publicationDate":"2025-07-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"144701953","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":1,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Mohamed Seif, Liyan Xie, Andrea J. Goldsmith, H. Vincent Poor
{"title":"Differentially Private Online Community Detection for Censored Block Models: Algorithms and Fundamental Limits","authors":"Mohamed Seif, Liyan Xie, Andrea J. Goldsmith, H. Vincent Poor","doi":"10.1109/tifs.2025.3592556","DOIUrl":"https://doi.org/10.1109/tifs.2025.3592556","url":null,"abstract":"","PeriodicalId":13492,"journal":{"name":"IEEE Transactions on Information Forensics and Security","volume":"17 1","pages":""},"PeriodicalIF":6.8,"publicationDate":"2025-07-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"144701956","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":1,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Yunming Zhang, Dengpan Ye, Sipeng Shen, Jun Wang, Caiyun Xie
{"title":"StyleMark: Robust Style Watermarking for Artworks Against Black-Box Zero-Shot Style Transfer","authors":"Yunming Zhang, Dengpan Ye, Sipeng Shen, Jun Wang, Caiyun Xie","doi":"10.1109/tifs.2025.3592521","DOIUrl":"https://doi.org/10.1109/tifs.2025.3592521","url":null,"abstract":"","PeriodicalId":13492,"journal":{"name":"IEEE Transactions on Information Forensics and Security","volume":"214 1","pages":""},"PeriodicalIF":6.8,"publicationDate":"2025-07-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"144701960","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":1,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Xiaoxiao Qiao, Man Zhou, Hongwei Li, Xiaojing Zhu, Zhihao Yao, Houzhen Wang, Xiaojing Ma
{"title":"NUSGuard: Smart Device Anti-Eavesdropping Protection based on Near-Ultrasonic Interference","authors":"Xiaoxiao Qiao, Man Zhou, Hongwei Li, Xiaojing Zhu, Zhihao Yao, Houzhen Wang, Xiaojing Ma","doi":"10.1109/tifs.2025.3592558","DOIUrl":"https://doi.org/10.1109/tifs.2025.3592558","url":null,"abstract":"","PeriodicalId":13492,"journal":{"name":"IEEE Transactions on Information Forensics and Security","volume":"117 1","pages":""},"PeriodicalIF":6.8,"publicationDate":"2025-07-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"144701907","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":1,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"BOSC: A Backdoor-based Framework for Open Set Synthetic Image Attribution","authors":"Jun Wang, Benedetta Tondi, Mauro Barni","doi":"10.1109/tifs.2025.3592531","DOIUrl":"https://doi.org/10.1109/tifs.2025.3592531","url":null,"abstract":"","PeriodicalId":13492,"journal":{"name":"IEEE Transactions on Information Forensics and Security","volume":"56 1","pages":""},"PeriodicalIF":6.8,"publicationDate":"2025-07-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"144701952","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":1,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Vulnerabilities in SVHFL: Toward Secure and Verifiable Hybrid Federated Learning","authors":"Fucai Luo, Jiahui Wu, Jinglong Luo","doi":"10.1109/tifs.2025.3592536","DOIUrl":"https://doi.org/10.1109/tifs.2025.3592536","url":null,"abstract":"","PeriodicalId":13492,"journal":{"name":"IEEE Transactions on Information Forensics and Security","volume":"7 1","pages":""},"PeriodicalIF":6.8,"publicationDate":"2025-07-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"144701908","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":1,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}