IEEE Transactions on Information Forensics and Security最新文献

筛选
英文 中文
TruVRF: Towards Triple-Granularity Verification on Machine Unlearning TruVRF:面向机器学习的三粒度验证
IF 6.8 1区 计算机科学
IEEE Transactions on Information Forensics and Security Pub Date : 2025-04-30 DOI: 10.1109/tifs.2025.3565991
Chunyi Zhou, Yansong Gao, Anmin Fu, Kai Chen, Zhi Zhang, Minhui Xue, Zhiyang Dai, Shouling Ji, Yuqing Zhang
{"title":"TruVRF: Towards Triple-Granularity Verification on Machine Unlearning","authors":"Chunyi Zhou, Yansong Gao, Anmin Fu, Kai Chen, Zhi Zhang, Minhui Xue, Zhiyang Dai, Shouling Ji, Yuqing Zhang","doi":"10.1109/tifs.2025.3565991","DOIUrl":"https://doi.org/10.1109/tifs.2025.3565991","url":null,"abstract":"","PeriodicalId":13492,"journal":{"name":"IEEE Transactions on Information Forensics and Security","volume":"136 1","pages":"1-1"},"PeriodicalIF":6.8,"publicationDate":"2025-04-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143893788","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":1,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
CoSwinVIT: A Vision Transformer for Enhanced Uniform Spectrum Response in Specific Emitter Identification CoSwinVIT:在特定发射器识别中增强均匀光谱响应的视觉变压器
IF 6.8 1区 计算机科学
IEEE Transactions on Information Forensics and Security Pub Date : 2025-04-30 DOI: 10.1109/tifs.2025.3565999
Yuting Lei, Dingzhao Li, Mingyuan Shao, Shaohua Hong, Haixin Sun
{"title":"CoSwinVIT: A Vision Transformer for Enhanced Uniform Spectrum Response in Specific Emitter Identification","authors":"Yuting Lei, Dingzhao Li, Mingyuan Shao, Shaohua Hong, Haixin Sun","doi":"10.1109/tifs.2025.3565999","DOIUrl":"https://doi.org/10.1109/tifs.2025.3565999","url":null,"abstract":"","PeriodicalId":13492,"journal":{"name":"IEEE Transactions on Information Forensics and Security","volume":"12 1","pages":"1-1"},"PeriodicalIF":6.8,"publicationDate":"2025-04-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143893787","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":1,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
CAMeL: Cross-modality Adaptive Meta-Learning for Text-based Person Retrieval 骆驼:基于文本的人物检索的跨模态自适应元学习
IF 6.8 1区 计算机科学
IEEE Transactions on Information Forensics and Security Pub Date : 2025-04-29 DOI: 10.1109/tifs.2025.3565392
Hang Yu, Jiahao Wen, Zhedong Zheng
{"title":"CAMeL: Cross-modality Adaptive Meta-Learning for Text-based Person Retrieval","authors":"Hang Yu, Jiahao Wen, Zhedong Zheng","doi":"10.1109/tifs.2025.3565392","DOIUrl":"https://doi.org/10.1109/tifs.2025.3565392","url":null,"abstract":"","PeriodicalId":13492,"journal":{"name":"IEEE Transactions on Information Forensics and Security","volume":"68 1","pages":""},"PeriodicalIF":6.8,"publicationDate":"2025-04-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143889754","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":1,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
BAST: Blockchain-Assisted Secure and Traceable Data Sharing Scheme for Vehicular Networks BAST:区块链辅助的车辆网络安全可追溯数据共享方案
IF 6.8 1区 计算机科学
IEEE Transactions on Information Forensics and Security Pub Date : 2025-04-29 DOI: 10.1109/tifs.2025.3565372
Xinzhong Liu, Jie Cui, Jing Zhang, Rongwang Yin, Hong Zhong, Lu Wei, Irina Bolodurina, Debiao He
{"title":"BAST: Blockchain-Assisted Secure and Traceable Data Sharing Scheme for Vehicular Networks","authors":"Xinzhong Liu, Jie Cui, Jing Zhang, Rongwang Yin, Hong Zhong, Lu Wei, Irina Bolodurina, Debiao He","doi":"10.1109/tifs.2025.3565372","DOIUrl":"https://doi.org/10.1109/tifs.2025.3565372","url":null,"abstract":"","PeriodicalId":13492,"journal":{"name":"IEEE Transactions on Information Forensics and Security","volume":"37 1","pages":""},"PeriodicalIF":6.8,"publicationDate":"2025-04-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143889756","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":1,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Threshold Password-Hardening Updatable Oblivious Key Management 阈值密码加固可更新遗忘密钥管理
IF 6.8 1区 计算机科学
IEEE Transactions on Information Forensics and Security Pub Date : 2025-04-29 DOI: 10.1109/tifs.2025.3565371
Changsong Jiang, Chunxiang Xu, Zhen Liu, Xinfeng Dong, Wenzheng Zhang
{"title":"Threshold Password-Hardening Updatable Oblivious Key Management","authors":"Changsong Jiang, Chunxiang Xu, Zhen Liu, Xinfeng Dong, Wenzheng Zhang","doi":"10.1109/tifs.2025.3565371","DOIUrl":"https://doi.org/10.1109/tifs.2025.3565371","url":null,"abstract":"","PeriodicalId":13492,"journal":{"name":"IEEE Transactions on Information Forensics and Security","volume":"46 1","pages":""},"PeriodicalIF":6.8,"publicationDate":"2025-04-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143889755","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":1,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Across-Platform Detection of Malicious Cryptocurrency Accounts via Interaction Feature Learning 基于交互特征学习的恶意加密货币账户跨平台检测
IF 6.8 1区 计算机科学
IEEE Transactions on Information Forensics and Security Pub Date : 2025-04-28 DOI: 10.1109/tifs.2025.3565130
Zheng Che, Meng Shen, Zhehui Tan, Hanbiao Du, Wei Wang, Ting Chen, Qinglin Zhao, Yong Xie, Liehuang Zhu
{"title":"Across-Platform Detection of Malicious Cryptocurrency Accounts via Interaction Feature Learning","authors":"Zheng Che, Meng Shen, Zhehui Tan, Hanbiao Du, Wei Wang, Ting Chen, Qinglin Zhao, Yong Xie, Liehuang Zhu","doi":"10.1109/tifs.2025.3565130","DOIUrl":"https://doi.org/10.1109/tifs.2025.3565130","url":null,"abstract":"","PeriodicalId":13492,"journal":{"name":"IEEE Transactions on Information Forensics and Security","volume":"39 1","pages":"1-1"},"PeriodicalIF":6.8,"publicationDate":"2025-04-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143884822","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":1,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
RandFlash: Breaking the Quadratic Barrier in Large-Scale Distributed Randomness Beacons RandFlash:打破大规模分布式随机信标的二次障碍
IF 6.8 1区 计算机科学
IEEE Transactions on Information Forensics and Security Pub Date : 2025-04-28 DOI: 10.1109/tifs.2025.3564877
Yang Yang, Bingyu Li, Qianhong Wu, Bo Qin, Qin Wang, Shihong Xiong, Willy Susilo
{"title":"RandFlash: Breaking the Quadratic Barrier in Large-Scale Distributed Randomness Beacons","authors":"Yang Yang, Bingyu Li, Qianhong Wu, Bo Qin, Qin Wang, Shihong Xiong, Willy Susilo","doi":"10.1109/tifs.2025.3564877","DOIUrl":"https://doi.org/10.1109/tifs.2025.3564877","url":null,"abstract":"","PeriodicalId":13492,"journal":{"name":"IEEE Transactions on Information Forensics and Security","volume":"45 1","pages":"1-1"},"PeriodicalIF":6.8,"publicationDate":"2025-04-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143884830","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":1,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Confidence Aware Learning for Reliable Face Anti-spoofing 可靠人脸防欺骗的自信感知学习
IF 6.8 1区 计算机科学
IEEE Transactions on Information Forensics and Security Pub Date : 2025-04-28 DOI: 10.1109/tifs.2025.3564878
Xingming Long, Jie Zhang, Shiguang Shan
{"title":"Confidence Aware Learning for Reliable Face Anti-spoofing","authors":"Xingming Long, Jie Zhang, Shiguang Shan","doi":"10.1109/tifs.2025.3564878","DOIUrl":"https://doi.org/10.1109/tifs.2025.3564878","url":null,"abstract":"","PeriodicalId":13492,"journal":{"name":"IEEE Transactions on Information Forensics and Security","volume":"11 1","pages":"1-1"},"PeriodicalIF":6.8,"publicationDate":"2025-04-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143884873","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":1,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Distributional Black-Box Model Inversion Attack with Multi-Agent Reinforcement Learning 基于多智能体强化学习的分布式黑盒模型反演攻击
IF 6.8 1区 计算机科学
IEEE Transactions on Information Forensics and Security Pub Date : 2025-04-24 DOI: 10.1109/tifs.2025.3564043
Huan Bao, Kaimin Wei, Yongdong Wu, Jin Qian, Robert H. Deng
{"title":"Distributional Black-Box Model Inversion Attack with Multi-Agent Reinforcement Learning","authors":"Huan Bao, Kaimin Wei, Yongdong Wu, Jin Qian, Robert H. Deng","doi":"10.1109/tifs.2025.3564043","DOIUrl":"https://doi.org/10.1109/tifs.2025.3564043","url":null,"abstract":"","PeriodicalId":13492,"journal":{"name":"IEEE Transactions on Information Forensics and Security","volume":"7 1","pages":""},"PeriodicalIF":6.8,"publicationDate":"2025-04-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143872944","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":1,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Stealthy Attacks with Historical Data on Distributed State Estimation 基于分布式状态估计的历史数据隐身攻击
IF 6.8 1区 计算机科学
IEEE Transactions on Information Forensics and Security Pub Date : 2025-04-24 DOI: 10.1109/tifs.2025.3564063
Jitao Xing, Dan Ye, Pengyu Li
{"title":"Stealthy Attacks with Historical Data on Distributed State Estimation","authors":"Jitao Xing, Dan Ye, Pengyu Li","doi":"10.1109/tifs.2025.3564063","DOIUrl":"https://doi.org/10.1109/tifs.2025.3564063","url":null,"abstract":"","PeriodicalId":13492,"journal":{"name":"IEEE Transactions on Information Forensics and Security","volume":"3 1","pages":""},"PeriodicalIF":6.8,"publicationDate":"2025-04-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143872945","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":1,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信