IEEE Transactions on Information Forensics and Security最新文献

筛选
英文 中文
SITA: Structurally Imperceptible and Transferable Adversarial Attacks for Stylized Image Generation
IF 6.8 1区 计算机科学
IEEE Transactions on Information Forensics and Security Pub Date : 2025-03-28 DOI: 10.1109/tifs.2025.3555552
Jingdan Kang, Haoxin Yang, Yan Cai, Huaidong Zhang, Xuemiao Xu, Yong Du, Shengfeng He
{"title":"SITA: Structurally Imperceptible and Transferable Adversarial Attacks for Stylized Image Generation","authors":"Jingdan Kang, Haoxin Yang, Yan Cai, Huaidong Zhang, Xuemiao Xu, Yong Du, Shengfeng He","doi":"10.1109/tifs.2025.3555552","DOIUrl":"https://doi.org/10.1109/tifs.2025.3555552","url":null,"abstract":"","PeriodicalId":13492,"journal":{"name":"IEEE Transactions on Information Forensics and Security","volume":"1 1","pages":"1-1"},"PeriodicalIF":6.8,"publicationDate":"2025-03-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143736447","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":1,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Compromising LLM Driven Embodied Agents with Contextual Backdoor Attacks
IF 6.8 1区 计算机科学
IEEE Transactions on Information Forensics and Security Pub Date : 2025-03-28 DOI: 10.1109/tifs.2025.3555410
Aishan Liu, Yuguang Zhou, Xianglong Liu, Tianyuan Zhang, Siyuan Liang, Jiakai Wang, Yanjun Pu, Tianlin Li, Junqi Zhang, Wenbo Zhou, Qing Guo, Dacheng Tao
{"title":"Compromising LLM Driven Embodied Agents with Contextual Backdoor Attacks","authors":"Aishan Liu, Yuguang Zhou, Xianglong Liu, Tianyuan Zhang, Siyuan Liang, Jiakai Wang, Yanjun Pu, Tianlin Li, Junqi Zhang, Wenbo Zhou, Qing Guo, Dacheng Tao","doi":"10.1109/tifs.2025.3555410","DOIUrl":"https://doi.org/10.1109/tifs.2025.3555410","url":null,"abstract":"","PeriodicalId":13492,"journal":{"name":"IEEE Transactions on Information Forensics and Security","volume":"14 1","pages":"1-1"},"PeriodicalIF":6.8,"publicationDate":"2025-03-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143736523","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":1,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Partner in Crime: Boosting Targeted Poisoning Attacks against Federated Learning
IF 6.8 1区 计算机科学
IEEE Transactions on Information Forensics and Security Pub Date : 2025-03-28 DOI: 10.1109/tifs.2025.3555429
Shihua Sun, Shridatt Sugrim, Angelos Stavrou, Haining Wang
{"title":"Partner in Crime: Boosting Targeted Poisoning Attacks against Federated Learning","authors":"Shihua Sun, Shridatt Sugrim, Angelos Stavrou, Haining Wang","doi":"10.1109/tifs.2025.3555429","DOIUrl":"https://doi.org/10.1109/tifs.2025.3555429","url":null,"abstract":"","PeriodicalId":13492,"journal":{"name":"IEEE Transactions on Information Forensics and Security","volume":"26 1","pages":"1-1"},"PeriodicalIF":6.8,"publicationDate":"2025-03-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143736446","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":1,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
SLAPP: Poisoning Prevention in Federated Learning and Differential Privacy via Stateful Proofs of Execution
IF 6.8 1区 计算机科学
IEEE Transactions on Information Forensics and Security Pub Date : 2025-03-27 DOI: 10.1109/tifs.2025.3555179
Norrathep Rattanavipanon, Ivan De Oliveira Nunes
{"title":"SLAPP: Poisoning Prevention in Federated Learning and Differential Privacy via Stateful Proofs of Execution","authors":"Norrathep Rattanavipanon, Ivan De Oliveira Nunes","doi":"10.1109/tifs.2025.3555179","DOIUrl":"https://doi.org/10.1109/tifs.2025.3555179","url":null,"abstract":"","PeriodicalId":13492,"journal":{"name":"IEEE Transactions on Information Forensics and Security","volume":"57 1","pages":"1-1"},"PeriodicalIF":6.8,"publicationDate":"2025-03-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143713181","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":1,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Do Not Skip over the Offline: Verifiable Silent Preprocessing from Small Security Hardware
IF 6.8 1区 计算机科学
IEEE Transactions on Information Forensics and Security Pub Date : 2025-03-27 DOI: 10.1109/tifs.2025.3554329
Wentao Dong, Lei Xu, Leqian Zheng, Huayi Duan, Cong Wang, Qian Wang
{"title":"Do Not Skip over the Offline: Verifiable Silent Preprocessing from Small Security Hardware","authors":"Wentao Dong, Lei Xu, Leqian Zheng, Huayi Duan, Cong Wang, Qian Wang","doi":"10.1109/tifs.2025.3554329","DOIUrl":"https://doi.org/10.1109/tifs.2025.3554329","url":null,"abstract":"","PeriodicalId":13492,"journal":{"name":"IEEE Transactions on Information Forensics and Security","volume":"99 3 1","pages":"1-1"},"PeriodicalIF":6.8,"publicationDate":"2025-03-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143713182","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":1,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Forward-Secure Hierarchical Delegable Signature for Smart Homes
IF 6.8 1区 计算机科学
IEEE Transactions on Information Forensics and Security Pub Date : 2025-03-27 DOI: 10.1109/tifs.2025.3555185
Jianfei Sun, Guowen Xu, Yang Yang, Xuehuan Yang, Xiaoguo Li, Cong Wu, Zhen Liu, Guomin Yang, Robert H. Deng
{"title":"Forward-Secure Hierarchical Delegable Signature for Smart Homes","authors":"Jianfei Sun, Guowen Xu, Yang Yang, Xuehuan Yang, Xiaoguo Li, Cong Wu, Zhen Liu, Guomin Yang, Robert H. Deng","doi":"10.1109/tifs.2025.3555185","DOIUrl":"https://doi.org/10.1109/tifs.2025.3555185","url":null,"abstract":"","PeriodicalId":13492,"journal":{"name":"IEEE Transactions on Information Forensics and Security","volume":"35 1","pages":"1-1"},"PeriodicalIF":6.8,"publicationDate":"2025-03-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143713234","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":1,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
DkvSSO: Delegatable Keyed-Verification Credentials for Efficient Anonymous Single Sign-on
IF 6.8 1区 计算机科学
IEEE Transactions on Information Forensics and Security Pub Date : 2025-03-27 DOI: 10.1109/tifs.2025.3555196
Wenyi Xue, Yang Yang, Minming Huang, Yingjiu Li, Hwee Hwa Pang, Robert H. Deng
{"title":"DkvSSO: Delegatable Keyed-Verification Credentials for Efficient Anonymous Single Sign-on","authors":"Wenyi Xue, Yang Yang, Minming Huang, Yingjiu Li, Hwee Hwa Pang, Robert H. Deng","doi":"10.1109/tifs.2025.3555196","DOIUrl":"https://doi.org/10.1109/tifs.2025.3555196","url":null,"abstract":"","PeriodicalId":13492,"journal":{"name":"IEEE Transactions on Information Forensics and Security","volume":"37 1","pages":"1-1"},"PeriodicalIF":6.8,"publicationDate":"2025-03-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143713180","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":1,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Cyber Recovery from Dynamic Load Altering Attacks: Linking Electricity, Transportation, and Cyber Networks
IF 6.8 1区 计算机科学
IEEE Transactions on Information Forensics and Security Pub Date : 2025-03-27 DOI: 10.1109/tifs.2025.3553079
Mengxiang Liu, Zhongda Chu, Fei Teng
{"title":"Cyber Recovery from Dynamic Load Altering Attacks: Linking Electricity, Transportation, and Cyber Networks","authors":"Mengxiang Liu, Zhongda Chu, Fei Teng","doi":"10.1109/tifs.2025.3553079","DOIUrl":"https://doi.org/10.1109/tifs.2025.3553079","url":null,"abstract":"","PeriodicalId":13492,"journal":{"name":"IEEE Transactions on Information Forensics and Security","volume":"3 1","pages":"1-1"},"PeriodicalIF":6.8,"publicationDate":"2025-03-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143713183","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":1,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Enhanced Model Poisoning Attack and Multi-strategy Defense in Federated Learning
IF 6.8 1区 计算机科学
IEEE Transactions on Information Forensics and Security Pub Date : 2025-03-27 DOI: 10.1109/tifs.2025.3555193
Li Yang, Yinbin Miao, Ziteng Liu, Zhiquan Liu, Xinghua Li, Da Kuang, Hongwei Li, Robert H. Deng
{"title":"Enhanced Model Poisoning Attack and Multi-strategy Defense in Federated Learning","authors":"Li Yang, Yinbin Miao, Ziteng Liu, Zhiquan Liu, Xinghua Li, Da Kuang, Hongwei Li, Robert H. Deng","doi":"10.1109/tifs.2025.3555193","DOIUrl":"https://doi.org/10.1109/tifs.2025.3555193","url":null,"abstract":"","PeriodicalId":13492,"journal":{"name":"IEEE Transactions on Information Forensics and Security","volume":"29 1","pages":"1-1"},"PeriodicalIF":6.8,"publicationDate":"2025-03-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143713184","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":1,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
1 + 1 > 2: A Dual-Function Defense Framework for Adversarial Example Mitigation
IF 6.8 1区 计算机科学
IEEE Transactions on Information Forensics and Security Pub Date : 2025-03-27 DOI: 10.1109/tifs.2025.3555186
Rui Yang, Qindong Sun, Han Cao, Chao Shen, Jiaming Cai, Dongzhu Rong
{"title":"1 + 1 > 2: A Dual-Function Defense Framework for Adversarial Example Mitigation","authors":"Rui Yang, Qindong Sun, Han Cao, Chao Shen, Jiaming Cai, Dongzhu Rong","doi":"10.1109/tifs.2025.3555186","DOIUrl":"https://doi.org/10.1109/tifs.2025.3555186","url":null,"abstract":"","PeriodicalId":13492,"journal":{"name":"IEEE Transactions on Information Forensics and Security","volume":"16 1","pages":"1-1"},"PeriodicalIF":6.8,"publicationDate":"2025-03-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143713233","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":1,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信