IEEE Transactions on Information Forensics and Security最新文献

筛选
英文 中文
A New Functional Encryption Scheme Supporting Privacy-Preserving Maximum Similarity for Web Service Platforms
IF 6.8 1区 计算机科学
IEEE Transactions on Information Forensics and Security Pub Date : 2025-02-20 DOI: 10.1109/tifs.2025.3544072
Zhenhua Chen, Kaili Long, Junrui Xie, Qiqi Lai, Yilei Wang, Ni Li, Luqi Huang, Aijun Ge
{"title":"A New Functional Encryption Scheme Supporting Privacy-Preserving Maximum Similarity for Web Service Platforms","authors":"Zhenhua Chen, Kaili Long, Junrui Xie, Qiqi Lai, Yilei Wang, Ni Li, Luqi Huang, Aijun Ge","doi":"10.1109/tifs.2025.3544072","DOIUrl":"https://doi.org/10.1109/tifs.2025.3544072","url":null,"abstract":"","PeriodicalId":13492,"journal":{"name":"IEEE Transactions on Information Forensics and Security","volume":"18 1","pages":""},"PeriodicalIF":6.8,"publicationDate":"2025-02-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143462624","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":1,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Towards Effective Rotation Generalization in UAV Object Re-Identification
IF 6.8 1区 计算机科学
IEEE Transactions on Information Forensics and Security Pub Date : 2025-02-20 DOI: 10.1109/tifs.2025.3544088
Shuoyi Chen, Mang Ye, Yan Huang, Bo Du
{"title":"Towards Effective Rotation Generalization in UAV Object Re-Identification","authors":"Shuoyi Chen, Mang Ye, Yan Huang, Bo Du","doi":"10.1109/tifs.2025.3544088","DOIUrl":"https://doi.org/10.1109/tifs.2025.3544088","url":null,"abstract":"","PeriodicalId":13492,"journal":{"name":"IEEE Transactions on Information Forensics and Security","volume":"38 1","pages":""},"PeriodicalIF":6.8,"publicationDate":"2025-02-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143462594","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":1,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Understanding the Security Risks of Websites Using Cloud Storage for Direct User File Uploads
IF 6.8 1区 计算机科学
IEEE Transactions on Information Forensics and Security Pub Date : 2025-02-20 DOI: 10.1109/tifs.2025.3544082
Yuanchao Chen, Yuwei Li, Yuliang Lu, Zulie Pan, Yuan Chen Shouling Ji, Yu Chen, Yang Li, Yi Shen
{"title":"Understanding the Security Risks of Websites Using Cloud Storage for Direct User File Uploads","authors":"Yuanchao Chen, Yuwei Li, Yuliang Lu, Zulie Pan, Yuan Chen Shouling Ji, Yu Chen, Yang Li, Yi Shen","doi":"10.1109/tifs.2025.3544082","DOIUrl":"https://doi.org/10.1109/tifs.2025.3544082","url":null,"abstract":"","PeriodicalId":13492,"journal":{"name":"IEEE Transactions on Information Forensics and Security","volume":"1 1","pages":""},"PeriodicalIF":6.8,"publicationDate":"2025-02-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143462593","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":1,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
RSNet: Region-Specific Network for Contactless Palm Vein Authentication
IF 6.8 1区 计算机科学
IEEE Transactions on Information Forensics and Security Pub Date : 2025-02-20 DOI: 10.1109/tifs.2025.3544029
Dacan Luo, Junduan Huang, Weili Yang, M. Saad Shakeel, Wenxiong Kang
{"title":"RSNet: Region-Specific Network for Contactless Palm Vein Authentication","authors":"Dacan Luo, Junduan Huang, Weili Yang, M. Saad Shakeel, Wenxiong Kang","doi":"10.1109/tifs.2025.3544029","DOIUrl":"https://doi.org/10.1109/tifs.2025.3544029","url":null,"abstract":"","PeriodicalId":13492,"journal":{"name":"IEEE Transactions on Information Forensics and Security","volume":"2 1","pages":""},"PeriodicalIF":6.8,"publicationDate":"2025-02-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143462595","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":1,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Can We Trust the Similarity Measurement in Federated Learning?
IF 6.8 1区 计算机科学
IEEE Transactions on Information Forensics and Security Pub Date : 2025-02-20 DOI: 10.1109/tifs.2024.3516567
Zhilin Wang, Qin Hu, Xukai Zou, Pengfei Hu, Xiuzhen Cheng
{"title":"Can We Trust the Similarity Measurement in Federated Learning?","authors":"Zhilin Wang, Qin Hu, Xukai Zou, Pengfei Hu, Xiuzhen Cheng","doi":"10.1109/tifs.2024.3516567","DOIUrl":"https://doi.org/10.1109/tifs.2024.3516567","url":null,"abstract":"","PeriodicalId":13492,"journal":{"name":"IEEE Transactions on Information Forensics and Security","volume":"14 1","pages":""},"PeriodicalIF":6.8,"publicationDate":"2025-02-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143462626","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":1,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
HELM: Navigating Homomorphic Encryption through Gates and Lookup Tables
IF 6.8 1区 计算机科学
IEEE Transactions on Information Forensics and Security Pub Date : 2025-02-20 DOI: 10.1109/tifs.2025.3544066
Charles Gouert, Dimitris Mouris, Nektarios Georgios Tsoutsos
{"title":"HELM: Navigating Homomorphic Encryption through Gates and Lookup Tables","authors":"Charles Gouert, Dimitris Mouris, Nektarios Georgios Tsoutsos","doi":"10.1109/tifs.2025.3544066","DOIUrl":"https://doi.org/10.1109/tifs.2025.3544066","url":null,"abstract":"","PeriodicalId":13492,"journal":{"name":"IEEE Transactions on Information Forensics and Security","volume":"25 1","pages":""},"PeriodicalIF":6.8,"publicationDate":"2025-02-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143462596","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":1,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Secret Key Generation With Untrusted Internal Eavesdropper: Token-based Anti-eavesdropping
IF 6.8 1区 计算机科学
IEEE Transactions on Information Forensics and Security Pub Date : 2025-02-18 DOI: 10.1109/tifs.2025.3542959
Huici Wu, Yi Fang, Na Li, Xin Yuan, Zhiqing Wei, Guoshun Nan, Xiaofeng Tao
{"title":"Secret Key Generation With Untrusted Internal Eavesdropper: Token-based Anti-eavesdropping","authors":"Huici Wu, Yi Fang, Na Li, Xin Yuan, Zhiqing Wei, Guoshun Nan, Xiaofeng Tao","doi":"10.1109/tifs.2025.3542959","DOIUrl":"https://doi.org/10.1109/tifs.2025.3542959","url":null,"abstract":"","PeriodicalId":13492,"journal":{"name":"IEEE Transactions on Information Forensics and Security","volume":"64 1","pages":""},"PeriodicalIF":6.8,"publicationDate":"2025-02-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143443668","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":1,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
On the Importance of Backbone to the Adversarial Robustness of Object Detectors
IF 6.8 1区 计算机科学
IEEE Transactions on Information Forensics and Security Pub Date : 2025-02-17 DOI: 10.1109/tifs.2025.3542964
Xiao Li, Hang Chen, Xiaolin Hu
{"title":"On the Importance of Backbone to the Adversarial Robustness of Object Detectors","authors":"Xiao Li, Hang Chen, Xiaolin Hu","doi":"10.1109/tifs.2025.3542964","DOIUrl":"https://doi.org/10.1109/tifs.2025.3542964","url":null,"abstract":"","PeriodicalId":13492,"journal":{"name":"IEEE Transactions on Information Forensics and Security","volume":"113 1","pages":""},"PeriodicalIF":6.8,"publicationDate":"2025-02-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143443698","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":1,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Breaking the Paired Sample Barrier in Person Re-Identification: Leveraging Unpaired Samples for Domain Generalization
IF 6.8 1区 计算机科学
IEEE Transactions on Information Forensics and Security Pub Date : 2025-02-17 DOI: 10.1109/tifs.2025.3543040
Huafeng Li, Yaoxin Liu, Yafei Zhang, Jinxing Li, Zhengtao Yu
{"title":"Breaking the Paired Sample Barrier in Person Re-Identification: Leveraging Unpaired Samples for Domain Generalization","authors":"Huafeng Li, Yaoxin Liu, Yafei Zhang, Jinxing Li, Zhengtao Yu","doi":"10.1109/tifs.2025.3543040","DOIUrl":"https://doi.org/10.1109/tifs.2025.3543040","url":null,"abstract":"","PeriodicalId":13492,"journal":{"name":"IEEE Transactions on Information Forensics and Security","volume":"64 1","pages":""},"PeriodicalIF":6.8,"publicationDate":"2025-02-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143443697","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":1,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Recovering Reed-Solomon Codes Privately
IF 6.8 1区 计算机科学
IEEE Transactions on Information Forensics and Security Pub Date : 2025-02-17 DOI: 10.1109/tifs.2025.3543123
Stanislav Kruglik, Han Mao Kiah, Son Hoang Dau, Eitan Yaakobi
{"title":"Recovering Reed-Solomon Codes Privately","authors":"Stanislav Kruglik, Han Mao Kiah, Son Hoang Dau, Eitan Yaakobi","doi":"10.1109/tifs.2025.3543123","DOIUrl":"https://doi.org/10.1109/tifs.2025.3543123","url":null,"abstract":"","PeriodicalId":13492,"journal":{"name":"IEEE Transactions on Information Forensics and Security","volume":"31 1","pages":""},"PeriodicalIF":6.8,"publicationDate":"2025-02-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143443699","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":1,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信