Talha Ongun, Simona Boboila, Alina Oprea, Tina Eliassi-Rad, Jason Hiser, Jack Davidson
{"title":"CELEST: Federated Learning for Globally Coordinated Threat Detection","authors":"Talha Ongun, Simona Boboila, Alina Oprea, Tina Eliassi-Rad, Jason Hiser, Jack Davidson","doi":"10.1109/tifs.2025.3614442","DOIUrl":"https://doi.org/10.1109/tifs.2025.3614442","url":null,"abstract":"","PeriodicalId":13492,"journal":{"name":"IEEE Transactions on Information Forensics and Security","volume":"100 1","pages":""},"PeriodicalIF":6.8,"publicationDate":"2025-09-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"145188876","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":1,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Yuchen Xie;Hengyi Ren;Hanyu He;Shurui Fei;Jian Guo;Lijuan Sun
{"title":"FedRDA: Hierarchical Noise Detection for Federated Finger Vein Recognition","authors":"Yuchen Xie;Hengyi Ren;Hanyu He;Shurui Fei;Jian Guo;Lijuan Sun","doi":"10.1109/TIFS.2025.3615408","DOIUrl":"10.1109/TIFS.2025.3615408","url":null,"abstract":"Finger vein recognition offers significant advantages in biometric authentication, while federated learning addresses data silo challenges in distributed environments. However, label noise issues severely impact recognition performance due to variations in data acquisition environments, fluctuations in user registration quality, and privacy constraints preventing centralized annotation review. Existing label noise research typically focuses on sample-level processing, overlooking quality variations between authentication systems and noise distribution characteristics across multiple source devices. This paper proposes FedRDA, a federated optimization framework that achieves precise identification and adaptive correction of noisy samples through a three-tier progressive mechanism. We first construct a hierarchical noise detection system that identifies label noise from both noisy client and noisy sample perspectives. Then, we design a dynamic pseudo-label learning module with an improved adaptive label ambiguation loss function that dynamically adjusts sample learning difficulty parameters and incorporates momentum update mechanisms, significantly enhancing model adaptability to label noise of varying difficulty, while integrating predictive uncertainty entropy with unsupervised consistency constraints for more accurate label correction. Finally, we propose an adaptive aggregation strategy based on distance awareness and gradient consistency metrics to address data isolation and label noise issues in distributed environments. Experiments on SDUMLA, MMCBNU_6000, FV-USM, and combined datasets demonstrate that FedRDA maintains high model accuracy even under high noise rate conditions, with approximately 14% accuracy improvement over existing methods. The proposed framework effectively mitigates the negative impact of label noise on model training, ensuring robust operation of finger vein recognition systems in practical distributed environments while protecting user privacy.","PeriodicalId":13492,"journal":{"name":"IEEE Transactions on Information Forensics and Security","volume":"20 ","pages":"10301-10314"},"PeriodicalIF":8.0,"publicationDate":"2025-09-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"145188872","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":1,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Gerhard Wunder, Axel Flinth, Daniel Becker, Benedikt Groß
{"title":"Perfectly Secure Key Agreement Over a Full Duplex Wireless Channel","authors":"Gerhard Wunder, Axel Flinth, Daniel Becker, Benedikt Groß","doi":"10.1109/tifs.2025.3611162","DOIUrl":"https://doi.org/10.1109/tifs.2025.3611162","url":null,"abstract":"","PeriodicalId":13492,"journal":{"name":"IEEE Transactions on Information Forensics and Security","volume":"38 1","pages":""},"PeriodicalIF":6.8,"publicationDate":"2025-09-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"145188863","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":1,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Zi Wang, Chenglong Li, Pengyu Li, Aihua Zheng, Jin Tang, Bin Luo
{"title":"Prototype-Based Diversity and Integrity Learning for All-Day Multi-Modal Person Re-Identification","authors":"Zi Wang, Chenglong Li, Pengyu Li, Aihua Zheng, Jin Tang, Bin Luo","doi":"10.1109/tifs.2025.3615708","DOIUrl":"https://doi.org/10.1109/tifs.2025.3615708","url":null,"abstract":"","PeriodicalId":13492,"journal":{"name":"IEEE Transactions on Information Forensics and Security","volume":"70 1","pages":""},"PeriodicalIF":6.8,"publicationDate":"2025-09-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"145188873","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":1,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Targeted Vaccine: Safety Alignment for Large Language Models against Harmful Fine-Tuning via Layer-wise Perturbation","authors":"Guozhi Liu, Weiwei Lin, Qi Mu, Tiansheng Huang, Ruichao Mo, Yuren Tao, Li Shen","doi":"10.1109/tifs.2025.3615412","DOIUrl":"https://doi.org/10.1109/tifs.2025.3615412","url":null,"abstract":"","PeriodicalId":13492,"journal":{"name":"IEEE Transactions on Information Forensics and Security","volume":"5 1","pages":""},"PeriodicalIF":6.8,"publicationDate":"2025-09-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"145188901","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":1,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Zihao Yang, Lin Wang, Yawen Zheng, Fan Dang, Xikai Sun, Zijuan Liu, Yunhao Liu
{"title":"Hinge: An Environment-Varying Adaptive Physical-Layer Key Generation Scheme","authors":"Zihao Yang, Lin Wang, Yawen Zheng, Fan Dang, Xikai Sun, Zijuan Liu, Yunhao Liu","doi":"10.1109/tifs.2025.3615510","DOIUrl":"https://doi.org/10.1109/tifs.2025.3615510","url":null,"abstract":"","PeriodicalId":13492,"journal":{"name":"IEEE Transactions on Information Forensics and Security","volume":"12 1","pages":""},"PeriodicalIF":6.8,"publicationDate":"2025-09-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"145188865","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":1,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Three Birds with One Arrow: Symmetric Two-Factor Authentication Protocol Based on Puncturable Pseudorandom Function","authors":"Xiaomin Zhao, Qi Jiang, Xin Gong, Meng Li, Xindi Ma, Jianfeng Ma","doi":"10.1109/tifs.2025.3615710","DOIUrl":"https://doi.org/10.1109/tifs.2025.3615710","url":null,"abstract":"","PeriodicalId":13492,"journal":{"name":"IEEE Transactions on Information Forensics and Security","volume":"60 1","pages":""},"PeriodicalIF":6.8,"publicationDate":"2025-09-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"145188870","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":1,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Meng Li, Yifei Chen, Yan Qiao, Guixin Ye, Zijian Zhang, Liehuang Zhu, Mauro Conti
{"title":"Trust in a Decentralized World: Data Governance from Faithful, Private, Verifiable, and Traceable Data Feeds","authors":"Meng Li, Yifei Chen, Yan Qiao, Guixin Ye, Zijian Zhang, Liehuang Zhu, Mauro Conti","doi":"10.1109/tifs.2025.3615705","DOIUrl":"https://doi.org/10.1109/tifs.2025.3615705","url":null,"abstract":"","PeriodicalId":13492,"journal":{"name":"IEEE Transactions on Information Forensics and Security","volume":"5 1","pages":""},"PeriodicalIF":6.8,"publicationDate":"2025-09-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"145188877","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":1,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Jianping Cai, Tianqing Zhu, Qingqing Ye, Zuobin Ying, Wanlei Zhou
{"title":"Enhancing Federated Learning with Differentially Private Continuous Data Release via k-Ary Trees","authors":"Jianping Cai, Tianqing Zhu, Qingqing Ye, Zuobin Ying, Wanlei Zhou","doi":"10.1109/tifs.2025.3615460","DOIUrl":"https://doi.org/10.1109/tifs.2025.3615460","url":null,"abstract":"","PeriodicalId":13492,"journal":{"name":"IEEE Transactions on Information Forensics and Security","volume":"31 1","pages":""},"PeriodicalIF":6.8,"publicationDate":"2025-09-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"145188878","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":1,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"PRADA: Proactive Risk Assessment and Mitigation of Misinformed Demand Attacks on Navigational Route Recommendations","authors":"Ya-Ting Yang, Haozhe Lei, Quanyan Zhu","doi":"10.1109/tifs.2025.3615726","DOIUrl":"https://doi.org/10.1109/tifs.2025.3615726","url":null,"abstract":"","PeriodicalId":13492,"journal":{"name":"IEEE Transactions on Information Forensics and Security","volume":"5 1","pages":""},"PeriodicalIF":6.8,"publicationDate":"2025-09-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"145188869","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":1,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}