Kai Liang, Songze Li, Ming Ding, Feng Tian, Youlong Wu
{"title":"Privacy-Preserving Coded Schemes for Multi-Server Federated Learning with Straggling Links","authors":"Kai Liang, Songze Li, Ming Ding, Feng Tian, Youlong Wu","doi":"10.1109/tifs.2024.3524160","DOIUrl":"https://doi.org/10.1109/tifs.2024.3524160","url":null,"abstract":"","PeriodicalId":13492,"journal":{"name":"IEEE Transactions on Information Forensics and Security","volume":"20 1","pages":""},"PeriodicalIF":6.8,"publicationDate":"2024-12-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142905582","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":1,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Enhancing Specific Emitter Identification: A Semi-Supervised Approach with Deep Cloud and Broad Edge Integration","authors":"Yibin Zhang, Yuchao Liu, Juzhen Wang, Qi Xuan, Yun Lin, Guan Gui","doi":"10.1109/tifs.2024.3524157","DOIUrl":"https://doi.org/10.1109/tifs.2024.3524157","url":null,"abstract":"","PeriodicalId":13492,"journal":{"name":"IEEE Transactions on Information Forensics and Security","volume":"3 1","pages":""},"PeriodicalIF":6.8,"publicationDate":"2024-12-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142905262","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":1,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Chenhao Wang, Yang Ming, Hang Liu, Yutong Deng, Yi Zhao, Songnian Zhang
{"title":"Security-Enhanced Data Transmission with Fine-Grained and Flexible Revocation for DTWNs","authors":"Chenhao Wang, Yang Ming, Hang Liu, Yutong Deng, Yi Zhao, Songnian Zhang","doi":"10.1109/tifs.2024.3523765","DOIUrl":"https://doi.org/10.1109/tifs.2024.3523765","url":null,"abstract":"","PeriodicalId":13492,"journal":{"name":"IEEE Transactions on Information Forensics and Security","volume":"3 1","pages":""},"PeriodicalIF":6.8,"publicationDate":"2024-12-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142888368","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":1,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Blockchain-empowered Keyword Searchable Provable Data Possession for Large Similar Data","authors":"Ying Miao, Keke Gai, Jing Yu, Yu’an Tan, Liehuang Zhu, Weizhi Meng","doi":"10.1109/tifs.2024.3516563","DOIUrl":"https://doi.org/10.1109/tifs.2024.3516563","url":null,"abstract":"","PeriodicalId":13492,"journal":{"name":"IEEE Transactions on Information Forensics and Security","volume":"114 1","pages":""},"PeriodicalIF":6.8,"publicationDate":"2024-12-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142888367","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":1,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Reconnaissance-Strike Complex: A Network-layer Solution to the Natural Forking in Blockchain","authors":"Anlin Chen, Shengling Wang, Hongwei Shi, Yu Guo, Xiuzhen Cheng","doi":"10.1109/tifs.2024.3523767","DOIUrl":"https://doi.org/10.1109/tifs.2024.3523767","url":null,"abstract":"","PeriodicalId":13492,"journal":{"name":"IEEE Transactions on Information Forensics and Security","volume":"151 1","pages":""},"PeriodicalIF":6.8,"publicationDate":"2024-12-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142888369","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":1,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Zipeng Ye, Wenjian Luo, Qi Zhou, Yubo Tang, Zhenqian Zhu, Yuhui Shi, Yan Jia
{"title":"Gradient Inversion of Text-Modal Data in Distributed Learning","authors":"Zipeng Ye, Wenjian Luo, Qi Zhou, Yubo Tang, Zhenqian Zhu, Yuhui Shi, Yan Jia","doi":"10.1109/tifs.2024.3522792","DOIUrl":"https://doi.org/10.1109/tifs.2024.3522792","url":null,"abstract":"","PeriodicalId":13492,"journal":{"name":"IEEE Transactions on Information Forensics and Security","volume":"151 1","pages":""},"PeriodicalIF":6.8,"publicationDate":"2024-12-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142888822","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":1,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Data-importance-aware Attack Strategy Design and Secure Control Countermeasure","authors":"Jiancun Wu, Engang Tian, Chen Peng, Zhiru Cao","doi":"10.1109/tifs.2024.3522770","DOIUrl":"https://doi.org/10.1109/tifs.2024.3522770","url":null,"abstract":"","PeriodicalId":13492,"journal":{"name":"IEEE Transactions on Information Forensics and Security","volume":"2 1","pages":""},"PeriodicalIF":6.8,"publicationDate":"2024-12-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142888371","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":1,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Cross-Optical Property Image Translation for Face Anti-Spoofing: From Visible to Polarization","authors":"Yu Tian, Kunbo Zhang, Yalin Huang, Leyuan Wang, Yue Liu, Zhenan Sun","doi":"10.1109/tifs.2024.3521323","DOIUrl":"https://doi.org/10.1109/tifs.2024.3521323","url":null,"abstract":"","PeriodicalId":13492,"journal":{"name":"IEEE Transactions on Information Forensics and Security","volume":"3 1","pages":""},"PeriodicalIF":6.8,"publicationDate":"2024-12-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142888380","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":1,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Toward Robust Radio Frequency Fingerprint Identification via Adaptive Semantic Augmentation","authors":"Zhenxin Cai, Yu Wang, Guan Gui, Jin Sha","doi":"10.1109/tifs.2024.3522758","DOIUrl":"https://doi.org/10.1109/tifs.2024.3522758","url":null,"abstract":"","PeriodicalId":13492,"journal":{"name":"IEEE Transactions on Information Forensics and Security","volume":"3 1","pages":""},"PeriodicalIF":6.8,"publicationDate":"2024-12-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142888826","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":1,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Changsong Jiang, Chunxiang Xu, Xinfeng Dong, Kefei Chen, Guomin Yang
{"title":"An Efficient Privacy-Preserving Scheme for Weak Password Collection in Internet of Things against Perpetual Leakage","authors":"Changsong Jiang, Chunxiang Xu, Xinfeng Dong, Kefei Chen, Guomin Yang","doi":"10.1109/tifs.2024.3523202","DOIUrl":"https://doi.org/10.1109/tifs.2024.3523202","url":null,"abstract":"","PeriodicalId":13492,"journal":{"name":"IEEE Transactions on Information Forensics and Security","volume":"41 1","pages":""},"PeriodicalIF":6.8,"publicationDate":"2024-12-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142888825","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":1,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}