Zhenhua Chen, Kaili Long, Junrui Xie, Qiqi Lai, Yilei Wang, Ni Li, Luqi Huang, Aijun Ge
{"title":"A New Functional Encryption Scheme Supporting Privacy-Preserving Maximum Similarity for Web Service Platforms","authors":"Zhenhua Chen, Kaili Long, Junrui Xie, Qiqi Lai, Yilei Wang, Ni Li, Luqi Huang, Aijun Ge","doi":"10.1109/tifs.2025.3544072","DOIUrl":"https://doi.org/10.1109/tifs.2025.3544072","url":null,"abstract":"","PeriodicalId":13492,"journal":{"name":"IEEE Transactions on Information Forensics and Security","volume":"18 1","pages":""},"PeriodicalIF":6.8,"publicationDate":"2025-02-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143462624","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":1,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Towards Effective Rotation Generalization in UAV Object Re-Identification","authors":"Shuoyi Chen, Mang Ye, Yan Huang, Bo Du","doi":"10.1109/tifs.2025.3544088","DOIUrl":"https://doi.org/10.1109/tifs.2025.3544088","url":null,"abstract":"","PeriodicalId":13492,"journal":{"name":"IEEE Transactions on Information Forensics and Security","volume":"38 1","pages":""},"PeriodicalIF":6.8,"publicationDate":"2025-02-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143462594","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":1,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Yuanchao Chen, Yuwei Li, Yuliang Lu, Zulie Pan, Yuan Chen Shouling Ji, Yu Chen, Yang Li, Yi Shen
{"title":"Understanding the Security Risks of Websites Using Cloud Storage for Direct User File Uploads","authors":"Yuanchao Chen, Yuwei Li, Yuliang Lu, Zulie Pan, Yuan Chen Shouling Ji, Yu Chen, Yang Li, Yi Shen","doi":"10.1109/tifs.2025.3544082","DOIUrl":"https://doi.org/10.1109/tifs.2025.3544082","url":null,"abstract":"","PeriodicalId":13492,"journal":{"name":"IEEE Transactions on Information Forensics and Security","volume":"1 1","pages":""},"PeriodicalIF":6.8,"publicationDate":"2025-02-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143462593","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":1,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Can We Trust the Similarity Measurement in Federated Learning?","authors":"Zhilin Wang, Qin Hu, Xukai Zou, Pengfei Hu, Xiuzhen Cheng","doi":"10.1109/tifs.2024.3516567","DOIUrl":"https://doi.org/10.1109/tifs.2024.3516567","url":null,"abstract":"","PeriodicalId":13492,"journal":{"name":"IEEE Transactions on Information Forensics and Security","volume":"14 1","pages":""},"PeriodicalIF":6.8,"publicationDate":"2025-02-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143462626","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":1,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Charles Gouert, Dimitris Mouris, Nektarios Georgios Tsoutsos
{"title":"HELM: Navigating Homomorphic Encryption through Gates and Lookup Tables","authors":"Charles Gouert, Dimitris Mouris, Nektarios Georgios Tsoutsos","doi":"10.1109/tifs.2025.3544066","DOIUrl":"https://doi.org/10.1109/tifs.2025.3544066","url":null,"abstract":"","PeriodicalId":13492,"journal":{"name":"IEEE Transactions on Information Forensics and Security","volume":"25 1","pages":""},"PeriodicalIF":6.8,"publicationDate":"2025-02-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143462596","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":1,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Huici Wu, Yi Fang, Na Li, Xin Yuan, Zhiqing Wei, Guoshun Nan, Xiaofeng Tao
{"title":"Secret Key Generation With Untrusted Internal Eavesdropper: Token-based Anti-eavesdropping","authors":"Huici Wu, Yi Fang, Na Li, Xin Yuan, Zhiqing Wei, Guoshun Nan, Xiaofeng Tao","doi":"10.1109/tifs.2025.3542959","DOIUrl":"https://doi.org/10.1109/tifs.2025.3542959","url":null,"abstract":"","PeriodicalId":13492,"journal":{"name":"IEEE Transactions on Information Forensics and Security","volume":"64 1","pages":""},"PeriodicalIF":6.8,"publicationDate":"2025-02-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143443668","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":1,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"On the Importance of Backbone to the Adversarial Robustness of Object Detectors","authors":"Xiao Li, Hang Chen, Xiaolin Hu","doi":"10.1109/tifs.2025.3542964","DOIUrl":"https://doi.org/10.1109/tifs.2025.3542964","url":null,"abstract":"","PeriodicalId":13492,"journal":{"name":"IEEE Transactions on Information Forensics and Security","volume":"113 1","pages":""},"PeriodicalIF":6.8,"publicationDate":"2025-02-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143443698","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":1,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Breaking the Paired Sample Barrier in Person Re-Identification: Leveraging Unpaired Samples for Domain Generalization","authors":"Huafeng Li, Yaoxin Liu, Yafei Zhang, Jinxing Li, Zhengtao Yu","doi":"10.1109/tifs.2025.3543040","DOIUrl":"https://doi.org/10.1109/tifs.2025.3543040","url":null,"abstract":"","PeriodicalId":13492,"journal":{"name":"IEEE Transactions on Information Forensics and Security","volume":"64 1","pages":""},"PeriodicalIF":6.8,"publicationDate":"2025-02-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143443697","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":1,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Stanislav Kruglik, Han Mao Kiah, Son Hoang Dau, Eitan Yaakobi
{"title":"Recovering Reed-Solomon Codes Privately","authors":"Stanislav Kruglik, Han Mao Kiah, Son Hoang Dau, Eitan Yaakobi","doi":"10.1109/tifs.2025.3543123","DOIUrl":"https://doi.org/10.1109/tifs.2025.3543123","url":null,"abstract":"","PeriodicalId":13492,"journal":{"name":"IEEE Transactions on Information Forensics and Security","volume":"31 1","pages":""},"PeriodicalIF":6.8,"publicationDate":"2025-02-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143443699","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":1,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}