IEEE Transactions on Information Forensics and Security最新文献

筛选
英文 中文
CELEST: Federated Learning for Globally Coordinated Threat Detection CELEST:全球协同威胁检测的联邦学习
IF 6.8 1区 计算机科学
IEEE Transactions on Information Forensics and Security Pub Date : 2025-09-29 DOI: 10.1109/tifs.2025.3614442
Talha Ongun, Simona Boboila, Alina Oprea, Tina Eliassi-Rad, Jason Hiser, Jack Davidson
{"title":"CELEST: Federated Learning for Globally Coordinated Threat Detection","authors":"Talha Ongun, Simona Boboila, Alina Oprea, Tina Eliassi-Rad, Jason Hiser, Jack Davidson","doi":"10.1109/tifs.2025.3614442","DOIUrl":"https://doi.org/10.1109/tifs.2025.3614442","url":null,"abstract":"","PeriodicalId":13492,"journal":{"name":"IEEE Transactions on Information Forensics and Security","volume":"100 1","pages":""},"PeriodicalIF":6.8,"publicationDate":"2025-09-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"145188876","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":1,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
FedRDA: Hierarchical Noise Detection for Federated Finger Vein Recognition 联邦指静脉识别的分层噪声检测
IF 8 1区 计算机科学
IEEE Transactions on Information Forensics and Security Pub Date : 2025-09-29 DOI: 10.1109/TIFS.2025.3615408
Yuchen Xie;Hengyi Ren;Hanyu He;Shurui Fei;Jian Guo;Lijuan Sun
{"title":"FedRDA: Hierarchical Noise Detection for Federated Finger Vein Recognition","authors":"Yuchen Xie;Hengyi Ren;Hanyu He;Shurui Fei;Jian Guo;Lijuan Sun","doi":"10.1109/TIFS.2025.3615408","DOIUrl":"10.1109/TIFS.2025.3615408","url":null,"abstract":"Finger vein recognition offers significant advantages in biometric authentication, while federated learning addresses data silo challenges in distributed environments. However, label noise issues severely impact recognition performance due to variations in data acquisition environments, fluctuations in user registration quality, and privacy constraints preventing centralized annotation review. Existing label noise research typically focuses on sample-level processing, overlooking quality variations between authentication systems and noise distribution characteristics across multiple source devices. This paper proposes FedRDA, a federated optimization framework that achieves precise identification and adaptive correction of noisy samples through a three-tier progressive mechanism. We first construct a hierarchical noise detection system that identifies label noise from both noisy client and noisy sample perspectives. Then, we design a dynamic pseudo-label learning module with an improved adaptive label ambiguation loss function that dynamically adjusts sample learning difficulty parameters and incorporates momentum update mechanisms, significantly enhancing model adaptability to label noise of varying difficulty, while integrating predictive uncertainty entropy with unsupervised consistency constraints for more accurate label correction. Finally, we propose an adaptive aggregation strategy based on distance awareness and gradient consistency metrics to address data isolation and label noise issues in distributed environments. Experiments on SDUMLA, MMCBNU_6000, FV-USM, and combined datasets demonstrate that FedRDA maintains high model accuracy even under high noise rate conditions, with approximately 14% accuracy improvement over existing methods. The proposed framework effectively mitigates the negative impact of label noise on model training, ensuring robust operation of finger vein recognition systems in practical distributed environments while protecting user privacy.","PeriodicalId":13492,"journal":{"name":"IEEE Transactions on Information Forensics and Security","volume":"20 ","pages":"10301-10314"},"PeriodicalIF":8.0,"publicationDate":"2025-09-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"145188872","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":1,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Perfectly Secure Key Agreement Over a Full Duplex Wireless Channel 全双工无线信道上的完全安全密钥协议
IF 6.8 1区 计算机科学
IEEE Transactions on Information Forensics and Security Pub Date : 2025-09-29 DOI: 10.1109/tifs.2025.3611162
Gerhard Wunder, Axel Flinth, Daniel Becker, Benedikt Groß
{"title":"Perfectly Secure Key Agreement Over a Full Duplex Wireless Channel","authors":"Gerhard Wunder, Axel Flinth, Daniel Becker, Benedikt Groß","doi":"10.1109/tifs.2025.3611162","DOIUrl":"https://doi.org/10.1109/tifs.2025.3611162","url":null,"abstract":"","PeriodicalId":13492,"journal":{"name":"IEEE Transactions on Information Forensics and Security","volume":"38 1","pages":""},"PeriodicalIF":6.8,"publicationDate":"2025-09-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"145188863","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":1,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Prototype-Based Diversity and Integrity Learning for All-Day Multi-Modal Person Re-Identification 基于原型的全天多模态人再识别多样性和完整性学习
IF 6.8 1区 计算机科学
IEEE Transactions on Information Forensics and Security Pub Date : 2025-09-29 DOI: 10.1109/tifs.2025.3615708
Zi Wang, Chenglong Li, Pengyu Li, Aihua Zheng, Jin Tang, Bin Luo
{"title":"Prototype-Based Diversity and Integrity Learning for All-Day Multi-Modal Person Re-Identification","authors":"Zi Wang, Chenglong Li, Pengyu Li, Aihua Zheng, Jin Tang, Bin Luo","doi":"10.1109/tifs.2025.3615708","DOIUrl":"https://doi.org/10.1109/tifs.2025.3615708","url":null,"abstract":"","PeriodicalId":13492,"journal":{"name":"IEEE Transactions on Information Forensics and Security","volume":"70 1","pages":""},"PeriodicalIF":6.8,"publicationDate":"2025-09-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"145188873","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":1,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Targeted Vaccine: Safety Alignment for Large Language Models against Harmful Fine-Tuning via Layer-wise Perturbation 靶向疫苗:通过分层扰动对大型语言模型进行有害微调的安全性校准
IF 6.8 1区 计算机科学
IEEE Transactions on Information Forensics and Security Pub Date : 2025-09-29 DOI: 10.1109/tifs.2025.3615412
Guozhi Liu, Weiwei Lin, Qi Mu, Tiansheng Huang, Ruichao Mo, Yuren Tao, Li Shen
{"title":"Targeted Vaccine: Safety Alignment for Large Language Models against Harmful Fine-Tuning via Layer-wise Perturbation","authors":"Guozhi Liu, Weiwei Lin, Qi Mu, Tiansheng Huang, Ruichao Mo, Yuren Tao, Li Shen","doi":"10.1109/tifs.2025.3615412","DOIUrl":"https://doi.org/10.1109/tifs.2025.3615412","url":null,"abstract":"","PeriodicalId":13492,"journal":{"name":"IEEE Transactions on Information Forensics and Security","volume":"5 1","pages":""},"PeriodicalIF":6.8,"publicationDate":"2025-09-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"145188901","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":1,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Hinge: An Environment-Varying Adaptive Physical-Layer Key Generation Scheme 铰链:一种环境变化的自适应物理层密钥生成方案
IF 6.8 1区 计算机科学
IEEE Transactions on Information Forensics and Security Pub Date : 2025-09-29 DOI: 10.1109/tifs.2025.3615510
Zihao Yang, Lin Wang, Yawen Zheng, Fan Dang, Xikai Sun, Zijuan Liu, Yunhao Liu
{"title":"Hinge: An Environment-Varying Adaptive Physical-Layer Key Generation Scheme","authors":"Zihao Yang, Lin Wang, Yawen Zheng, Fan Dang, Xikai Sun, Zijuan Liu, Yunhao Liu","doi":"10.1109/tifs.2025.3615510","DOIUrl":"https://doi.org/10.1109/tifs.2025.3615510","url":null,"abstract":"","PeriodicalId":13492,"journal":{"name":"IEEE Transactions on Information Forensics and Security","volume":"12 1","pages":""},"PeriodicalIF":6.8,"publicationDate":"2025-09-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"145188865","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":1,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Three Birds with One Arrow: Symmetric Two-Factor Authentication Protocol Based on Puncturable Pseudorandom Function 一箭三鸟:基于可穿刺伪随机函数的对称双因素认证协议
IF 6.8 1区 计算机科学
IEEE Transactions on Information Forensics and Security Pub Date : 2025-09-29 DOI: 10.1109/tifs.2025.3615710
Xiaomin Zhao, Qi Jiang, Xin Gong, Meng Li, Xindi Ma, Jianfeng Ma
{"title":"Three Birds with One Arrow: Symmetric Two-Factor Authentication Protocol Based on Puncturable Pseudorandom Function","authors":"Xiaomin Zhao, Qi Jiang, Xin Gong, Meng Li, Xindi Ma, Jianfeng Ma","doi":"10.1109/tifs.2025.3615710","DOIUrl":"https://doi.org/10.1109/tifs.2025.3615710","url":null,"abstract":"","PeriodicalId":13492,"journal":{"name":"IEEE Transactions on Information Forensics and Security","volume":"60 1","pages":""},"PeriodicalIF":6.8,"publicationDate":"2025-09-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"145188870","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":1,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Trust in a Decentralized World: Data Governance from Faithful, Private, Verifiable, and Traceable Data Feeds 去中心化世界中的信任:来自忠实、私有、可验证和可追踪数据源的数据治理
IF 6.8 1区 计算机科学
IEEE Transactions on Information Forensics and Security Pub Date : 2025-09-29 DOI: 10.1109/tifs.2025.3615705
Meng Li, Yifei Chen, Yan Qiao, Guixin Ye, Zijian Zhang, Liehuang Zhu, Mauro Conti
{"title":"Trust in a Decentralized World: Data Governance from Faithful, Private, Verifiable, and Traceable Data Feeds","authors":"Meng Li, Yifei Chen, Yan Qiao, Guixin Ye, Zijian Zhang, Liehuang Zhu, Mauro Conti","doi":"10.1109/tifs.2025.3615705","DOIUrl":"https://doi.org/10.1109/tifs.2025.3615705","url":null,"abstract":"","PeriodicalId":13492,"journal":{"name":"IEEE Transactions on Information Forensics and Security","volume":"5 1","pages":""},"PeriodicalIF":6.8,"publicationDate":"2025-09-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"145188877","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":1,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Enhancing Federated Learning with Differentially Private Continuous Data Release via k-Ary Trees 基于k-Ary树的差分私有连续数据发布增强联邦学习
IF 6.8 1区 计算机科学
IEEE Transactions on Information Forensics and Security Pub Date : 2025-09-29 DOI: 10.1109/tifs.2025.3615460
Jianping Cai, Tianqing Zhu, Qingqing Ye, Zuobin Ying, Wanlei Zhou
{"title":"Enhancing Federated Learning with Differentially Private Continuous Data Release via k-Ary Trees","authors":"Jianping Cai, Tianqing Zhu, Qingqing Ye, Zuobin Ying, Wanlei Zhou","doi":"10.1109/tifs.2025.3615460","DOIUrl":"https://doi.org/10.1109/tifs.2025.3615460","url":null,"abstract":"","PeriodicalId":13492,"journal":{"name":"IEEE Transactions on Information Forensics and Security","volume":"31 1","pages":""},"PeriodicalIF":6.8,"publicationDate":"2025-09-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"145188878","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":1,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
PRADA: Proactive Risk Assessment and Mitigation of Misinformed Demand Attacks on Navigational Route Recommendations 普拉达:对航路建议的错误需求攻击的前瞻性风险评估和缓解
IF 6.8 1区 计算机科学
IEEE Transactions on Information Forensics and Security Pub Date : 2025-09-29 DOI: 10.1109/tifs.2025.3615726
Ya-Ting Yang, Haozhe Lei, Quanyan Zhu
{"title":"PRADA: Proactive Risk Assessment and Mitigation of Misinformed Demand Attacks on Navigational Route Recommendations","authors":"Ya-Ting Yang, Haozhe Lei, Quanyan Zhu","doi":"10.1109/tifs.2025.3615726","DOIUrl":"https://doi.org/10.1109/tifs.2025.3615726","url":null,"abstract":"","PeriodicalId":13492,"journal":{"name":"IEEE Transactions on Information Forensics and Security","volume":"5 1","pages":""},"PeriodicalIF":6.8,"publicationDate":"2025-09-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"145188869","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":1,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信