{"title":"LiSB: Lightweight Secure Boot and Attestation Scheme for IoT and Edge Devices","authors":"Mohamed Younis, Mohammad Ebrahimabadi, Suhee Sanjana Mehjabin, Emily Pozniak, Tamim Sookoor, Naghmeh Karimi","doi":"10.1109/tifs.2025.3592573","DOIUrl":"https://doi.org/10.1109/tifs.2025.3592573","url":null,"abstract":"","PeriodicalId":13492,"journal":{"name":"IEEE Transactions on Information Forensics and Security","volume":"1 1","pages":""},"PeriodicalIF":6.8,"publicationDate":"2025-07-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"144701910","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":1,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Junxian Shi, Linning Peng, Lingnan Xie, Hua Fu, Aiqun Hu
{"title":"An SNR-Aware Feature Reconstruction Method in Radio Frequency Fingerprint Identification","authors":"Junxian Shi, Linning Peng, Lingnan Xie, Hua Fu, Aiqun Hu","doi":"10.1109/tifs.2025.3592567","DOIUrl":"https://doi.org/10.1109/tifs.2025.3592567","url":null,"abstract":"","PeriodicalId":13492,"journal":{"name":"IEEE Transactions on Information Forensics and Security","volume":"2 1","pages":""},"PeriodicalIF":6.8,"publicationDate":"2025-07-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"144701969","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":1,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Yishan Yang, Zheng Yan, Niya Luo, Jiajun Li, Mianxiong Dong, Kaoru Ota
{"title":"HABC: A Mutual and Handover Authentication Scheme for Backscatter Communications with High Robustness","authors":"Yishan Yang, Zheng Yan, Niya Luo, Jiajun Li, Mianxiong Dong, Kaoru Ota","doi":"10.1109/tifs.2025.3592548","DOIUrl":"https://doi.org/10.1109/tifs.2025.3592548","url":null,"abstract":"","PeriodicalId":13492,"journal":{"name":"IEEE Transactions on Information Forensics and Security","volume":"37 1","pages":""},"PeriodicalIF":6.8,"publicationDate":"2025-07-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"144701981","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":1,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Within 3DMM Space: Exploring Inherent 3D Artifact for Video Forgery Detection","authors":"Chunlei Peng, Tian Xu, Decheng Liu, Nannan Wang, Xinbo Gao","doi":"10.1109/tifs.2025.3592557","DOIUrl":"https://doi.org/10.1109/tifs.2025.3592557","url":null,"abstract":"","PeriodicalId":13492,"journal":{"name":"IEEE Transactions on Information Forensics and Security","volume":"29 1","pages":""},"PeriodicalIF":6.8,"publicationDate":"2025-07-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"144701955","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":1,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"PERM: Streamlining Cloud Authorization with Flexible and Scalable Policy Enforcement","authors":"Yang Luo, Qingni Shen, Zhonghai Wu","doi":"10.1109/tifs.2025.3592519","DOIUrl":"https://doi.org/10.1109/tifs.2025.3592519","url":null,"abstract":"","PeriodicalId":13492,"journal":{"name":"IEEE Transactions on Information Forensics and Security","volume":"21 1","pages":""},"PeriodicalIF":6.8,"publicationDate":"2025-07-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"144702037","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":1,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Shuyang Lin;Tong Jia;Hao Wang;Bowen Ma;Mingyuan Li
{"title":"Open-Vocabulary Prohibited Item Detection for Real-World X-Ray Security Inspection","authors":"Shuyang Lin;Tong Jia;Hao Wang;Bowen Ma;Mingyuan Li","doi":"10.1109/TIFS.2025.3586492","DOIUrl":"10.1109/TIFS.2025.3586492","url":null,"abstract":"Computer-aided prohibited item detection is applied in X-ray security inspection to maintain public safety. However, existing prohibited item detectors are limited to a small set of categories in current X-ray datasets, posing potential risks to public security. Since constructing bigger datasets and annotating hundreds of categories is time-consuming and labor-intensive, scaling detectors to more categories with minimal supervision is of great importance. To this end, in this paper, we adopt an open-vocabulary object detection (OVOD) method to detect arbitrary unlabeled novel categories of prohibited item. OVOD methods typically rely on datasets with caption annotations, which are lacking in the domain of prohibited item detection. To support the research on OVOD in X-ray security inspection scenarios, we contribute PIXray Caption dataset, the first X-ray dataset with image-caption pair annotations, which could benchmark and facilitate researches in the community. Further, we propose a novel Open-Vocabulary Prohibited Item Detection (OVPID) network to leverage textual information from captions. OVPID contains two core modules, i.e., Interference Resistant Module (IRM) and Prediction Module (PM). Specifically, IRM includes two submodules, namely Edge Perception (EP) and Foreground Activation (FA), which are designed to address the dilemma of interference caused by overlapping problem and complex background in X-ray images. PM consists of two branches for classification and localization. In classification branch, PM generates more accurate prompts for X-ray dataset via large multimodal model (LMM). In localization branch, PM aligns the student embeddings with both teacher and caption embeddings. Extensive experiments on PIXray Caption dataset demonstrate that OVPID outperforms other OVOD methods by delivering a higher accuracy on novel categories.","PeriodicalId":13492,"journal":{"name":"IEEE Transactions on Information Forensics and Security","volume":"20 ","pages":"7469-7481"},"PeriodicalIF":6.3,"publicationDate":"2025-07-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"144694056","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":1,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Knowledge Driven Signal Transformer for Emitter Recognition","authors":"Shurong Ren;Shuyuan Yang;Mengyao Zhan;Zhuoyue Qi;Zhixi Feng","doi":"10.1109/TIFS.2025.3586503","DOIUrl":"https://doi.org/10.1109/TIFS.2025.3586503","url":null,"abstract":"Recently, deep neural networks (DNNs) based emitter recognition or identification has received increasing interest. However, most of them are purely data-driven and require a large number of labeled instances. In this paper, a new Knowledge Driven Signal Transformer (KDSiT) is proposed, which introduces the knowledge graph (KG) into a signal Transformer (ST) model for accurate emitter recognition in real-world scenarios. On the one hand, KDSiT use a unified multimodal Transformer structure to explore the latent long-range dependencies in signals, and capture the subtle differences of emitters. On the other hand, KDSiT introduces domain knowledge, such as relationships and attributes between emitters, by constructing an emitter knowledge graph. By combining the powerful feature learning capability of DNNs with the rich semantic information in KG, KDSiT can extract more discriminative features of emitters from multimodal learning, to improve the identification accuracy in degraded environments. Extensive experiments are conducted, and the results prove the superiority of KDSiT over its counterparts, especially in the case of low signal-to-noise ratio (SNR), incomplete signals, and a limited number of labeled instances.","PeriodicalId":13492,"journal":{"name":"IEEE Transactions on Information Forensics and Security","volume":"20 ","pages":"7724-7735"},"PeriodicalIF":8.0,"publicationDate":"2025-07-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"144725151","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":1,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}