Chunyi Zhou, Yansong Gao, Anmin Fu, Kai Chen, Zhi Zhang, Minhui Xue, Zhiyang Dai, Shouling Ji, Yuqing Zhang
{"title":"TruVRF: Towards Triple-Granularity Verification on Machine Unlearning","authors":"Chunyi Zhou, Yansong Gao, Anmin Fu, Kai Chen, Zhi Zhang, Minhui Xue, Zhiyang Dai, Shouling Ji, Yuqing Zhang","doi":"10.1109/tifs.2025.3565991","DOIUrl":"https://doi.org/10.1109/tifs.2025.3565991","url":null,"abstract":"","PeriodicalId":13492,"journal":{"name":"IEEE Transactions on Information Forensics and Security","volume":"136 1","pages":"1-1"},"PeriodicalIF":6.8,"publicationDate":"2025-04-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143893788","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":1,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Yuting Lei, Dingzhao Li, Mingyuan Shao, Shaohua Hong, Haixin Sun
{"title":"CoSwinVIT: A Vision Transformer for Enhanced Uniform Spectrum Response in Specific Emitter Identification","authors":"Yuting Lei, Dingzhao Li, Mingyuan Shao, Shaohua Hong, Haixin Sun","doi":"10.1109/tifs.2025.3565999","DOIUrl":"https://doi.org/10.1109/tifs.2025.3565999","url":null,"abstract":"","PeriodicalId":13492,"journal":{"name":"IEEE Transactions on Information Forensics and Security","volume":"12 1","pages":"1-1"},"PeriodicalIF":6.8,"publicationDate":"2025-04-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143893787","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":1,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"CAMeL: Cross-modality Adaptive Meta-Learning for Text-based Person Retrieval","authors":"Hang Yu, Jiahao Wen, Zhedong Zheng","doi":"10.1109/tifs.2025.3565392","DOIUrl":"https://doi.org/10.1109/tifs.2025.3565392","url":null,"abstract":"","PeriodicalId":13492,"journal":{"name":"IEEE Transactions on Information Forensics and Security","volume":"68 1","pages":""},"PeriodicalIF":6.8,"publicationDate":"2025-04-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143889754","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":1,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Xinzhong Liu, Jie Cui, Jing Zhang, Rongwang Yin, Hong Zhong, Lu Wei, Irina Bolodurina, Debiao He
{"title":"BAST: Blockchain-Assisted Secure and Traceable Data Sharing Scheme for Vehicular Networks","authors":"Xinzhong Liu, Jie Cui, Jing Zhang, Rongwang Yin, Hong Zhong, Lu Wei, Irina Bolodurina, Debiao He","doi":"10.1109/tifs.2025.3565372","DOIUrl":"https://doi.org/10.1109/tifs.2025.3565372","url":null,"abstract":"","PeriodicalId":13492,"journal":{"name":"IEEE Transactions on Information Forensics and Security","volume":"37 1","pages":""},"PeriodicalIF":6.8,"publicationDate":"2025-04-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143889756","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":1,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Zheng Che, Meng Shen, Zhehui Tan, Hanbiao Du, Wei Wang, Ting Chen, Qinglin Zhao, Yong Xie, Liehuang Zhu
{"title":"Across-Platform Detection of Malicious Cryptocurrency Accounts via Interaction Feature Learning","authors":"Zheng Che, Meng Shen, Zhehui Tan, Hanbiao Du, Wei Wang, Ting Chen, Qinglin Zhao, Yong Xie, Liehuang Zhu","doi":"10.1109/tifs.2025.3565130","DOIUrl":"https://doi.org/10.1109/tifs.2025.3565130","url":null,"abstract":"","PeriodicalId":13492,"journal":{"name":"IEEE Transactions on Information Forensics and Security","volume":"39 1","pages":"1-1"},"PeriodicalIF":6.8,"publicationDate":"2025-04-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143884822","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":1,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Confidence Aware Learning for Reliable Face Anti-spoofing","authors":"Xingming Long, Jie Zhang, Shiguang Shan","doi":"10.1109/tifs.2025.3564878","DOIUrl":"https://doi.org/10.1109/tifs.2025.3564878","url":null,"abstract":"","PeriodicalId":13492,"journal":{"name":"IEEE Transactions on Information Forensics and Security","volume":"11 1","pages":"1-1"},"PeriodicalIF":6.8,"publicationDate":"2025-04-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143884873","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":1,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Huan Bao, Kaimin Wei, Yongdong Wu, Jin Qian, Robert H. Deng
{"title":"Distributional Black-Box Model Inversion Attack with Multi-Agent Reinforcement Learning","authors":"Huan Bao, Kaimin Wei, Yongdong Wu, Jin Qian, Robert H. Deng","doi":"10.1109/tifs.2025.3564043","DOIUrl":"https://doi.org/10.1109/tifs.2025.3564043","url":null,"abstract":"","PeriodicalId":13492,"journal":{"name":"IEEE Transactions on Information Forensics and Security","volume":"7 1","pages":""},"PeriodicalIF":6.8,"publicationDate":"2025-04-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143872944","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":1,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Stealthy Attacks with Historical Data on Distributed State Estimation","authors":"Jitao Xing, Dan Ye, Pengyu Li","doi":"10.1109/tifs.2025.3564063","DOIUrl":"https://doi.org/10.1109/tifs.2025.3564063","url":null,"abstract":"","PeriodicalId":13492,"journal":{"name":"IEEE Transactions on Information Forensics and Security","volume":"3 1","pages":""},"PeriodicalIF":6.8,"publicationDate":"2025-04-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143872945","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":1,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}