IEEE Transactions on Information Forensics and Security最新文献

筛选
英文 中文
Privacy-Preserving Authentication for Unlinkable Avatars in the Metaverse 虚拟世界中不可链接头像的隐私保护认证
IF 6.8 1区 计算机科学
IEEE Transactions on Information Forensics and Security Pub Date : 2025-09-29 DOI: 10.1109/tifs.2025.3615515
Mohamed Mobarak, Riham AlTawy, Amr Youssef
{"title":"Privacy-Preserving Authentication for Unlinkable Avatars in the Metaverse","authors":"Mohamed Mobarak, Riham AlTawy, Amr Youssef","doi":"10.1109/tifs.2025.3615515","DOIUrl":"https://doi.org/10.1109/tifs.2025.3615515","url":null,"abstract":"","PeriodicalId":13492,"journal":{"name":"IEEE Transactions on Information Forensics and Security","volume":"95 1","pages":""},"PeriodicalIF":6.8,"publicationDate":"2025-09-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"145188875","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":1,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Differentially Private Mean-Square Output Consensus for Heterogeneous Multiagent Systems: An Asynchronous Sampled-Data Interactions Scheme 异构多智能体系统的差分私有均方输出一致性:一种异步采样数据交互方案
IF 8 1区 计算机科学
IEEE Transactions on Information Forensics and Security Pub Date : 2025-09-26 DOI: 10.1109/TIFS.2025.3613051
Guoliang Chen;Lingyu Wang;Te Yang;Jianwei Xia;Ju H. Park
{"title":"Differentially Private Mean-Square Output Consensus for Heterogeneous Multiagent Systems: An Asynchronous Sampled-Data Interactions Scheme","authors":"Guoliang Chen;Lingyu Wang;Te Yang;Jianwei Xia;Ju H. Park","doi":"10.1109/TIFS.2025.3613051","DOIUrl":"10.1109/TIFS.2025.3613051","url":null,"abstract":"This article investigates the problem of privacy-preserving average consensus for continuous-time heterogeneous multiagent systems with intermittent information transfer under asynchronous sampled-data interactions. To address the challenges posed by agent-specific asynchronous sampled-data and time-varying communication delays, a time-translation approach incorporating a shared sampling period strategy is introduced, effectively transforming the asynchronous problem into a synchronous framework. Next, integrated distributed hybrid controller with time-varying noise injection is designed, enabling agents to interact with sensitive information only at sampling instants, thereby preserving privacy while maintaining trajectory availability. Then, the time-varying step-size and noise parameters, which are tunable parameters of the dual control mechanism corresponding to the desired <inline-formula> <tex-math>$varepsilon $ </tex-math></inline-formula>-differential privacy budget and system convergence accuracy are proposed, and the trade-off between control performance and privacy preservation is thoroughly analyzed. It is shown that the proposed protocol achieves asymptotically unbiased mean-square output consensus with predefined accuracy and privacy budget. Numerical examples validate the theoretical results.","PeriodicalId":13492,"journal":{"name":"IEEE Transactions on Information Forensics and Security","volume":"20 ","pages":"10189-10202"},"PeriodicalIF":8.0,"publicationDate":"2025-09-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"145154116","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":1,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Facilitating Access Control Vulnerability Detection in Modern Java Web Applications with Accurate Permission Check Identification 通过准确的权限检查识别,促进现代Java Web应用程序中的访问控制漏洞检测
IF 6.8 1区 计算机科学
IEEE Transactions on Information Forensics and Security Pub Date : 2025-09-25 DOI: 10.1109/tifs.2025.3614424
Youkun Shi, Fengyu Liu, Guangliang Yang, Yuan Zhang, Yinzhi Cao, Enhao Li, Xin Tan, Xiapu Luo, Min Yang, Siyi Chen
{"title":"Facilitating Access Control Vulnerability Detection in Modern Java Web Applications with Accurate Permission Check Identification","authors":"Youkun Shi, Fengyu Liu, Guangliang Yang, Yuan Zhang, Yinzhi Cao, Enhao Li, Xin Tan, Xiapu Luo, Min Yang, Siyi Chen","doi":"10.1109/tifs.2025.3614424","DOIUrl":"https://doi.org/10.1109/tifs.2025.3614424","url":null,"abstract":"","PeriodicalId":13492,"journal":{"name":"IEEE Transactions on Information Forensics and Security","volume":"62 1","pages":""},"PeriodicalIF":6.8,"publicationDate":"2025-09-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"145141357","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":1,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
MOJO: MOtion Pattern Learning and JOint-Based Fine-Grained Mining for Person Re-Identification Based on 4D LiDAR Point Clouds MOJO:运动模式学习和基于关节的细粒度挖掘,基于4D激光雷达点云的人再识别
IF 8 1区 计算机科学
IEEE Transactions on Information Forensics and Security Pub Date : 2025-09-25 DOI: 10.1109/TIFS.2025.3614500
Zhiyang Lu;Chenglu Wen;Ming Cheng;Cheng Wang
{"title":"MOJO: MOtion Pattern Learning and JOint-Based Fine-Grained Mining for Person Re-Identification Based on 4D LiDAR Point Clouds","authors":"Zhiyang Lu;Chenglu Wen;Ming Cheng;Cheng Wang","doi":"10.1109/TIFS.2025.3614500","DOIUrl":"10.1109/TIFS.2025.3614500","url":null,"abstract":"Person Re-identification (ReID) primarily involves the extraction of discriminative representations derived from morphological characteristics, gait patterns, and related attributes. While camera-based Person ReID methods yield notable results, their reliability diminishes in scenarios involving long distances and limited illumination. LiDAR enables the precise acquisition of human point cloud sequences across extended distances, unaffected by variations in lighting or similar factors. Nevertheless, current LiDAR-based Person ReID techniques are limited to static measurements, rendering them susceptible to perturbations from attire variations, occlusions, and similar confounding factors. To address these issues, this manuscript introduces MOJO, which is applied to 4D LiDAR point clouds to extract unique motion patterns specific to individuals. To characterize the motion patterns across two consecutive point cloud frames, MOJO employs optimal transport to compute point-wise motion vectors, thereby enabling the identification of discriminative implicit motion information. To mitigate the attenuation of point cloud density induced by self-occlusion during dynamic motion, MOJO leverages inverse point-wise flow information to integrate forward frames, thereby yielding a comprehensive representation, whilst concurrently ameliorating the effects of heterogeneous density distribution within localized regions of the 4D point cloud data. Additionally, the inherent unordered nature and sparsity of 4D point clouds present significant obstacles to capturing discriminative features. We develop the 3D joint graph to extract scalable fine-grained traits and employ the joint pyramid pooling module to conduct hierarchical spatiotemporal aggregation across the 4D point clouds. Extensive experimental evaluations demonstrate that MOJO achieves state-of-the-art (SOTA) accuracy on the LReID dataset (for LiDAR-based Person Re-identification) and SUSTech1k dataset (for LiDAR-based Gait Recognition) without any pre-training while exhibiting robust performance across various point cloud densities. Our code will be available at <uri>https://github.com/O-VIGIA/MOJO</uri>","PeriodicalId":13492,"journal":{"name":"IEEE Transactions on Information Forensics and Security","volume":"20 ","pages":"10288-10300"},"PeriodicalIF":8.0,"publicationDate":"2025-09-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"145141360","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":1,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Lightweight Consensus Mechanism for Large-Scale UAV Networking 面向大规模无人机网络的轻量级共识机制
IF 6.8 1区 计算机科学
IEEE Transactions on Information Forensics and Security Pub Date : 2025-09-25 DOI: 10.1109/tifs.2025.3614501
Jingjing Wang, Wei Long, Yizhong Liu, Xin Zhang, Zheng Zhang, Robert H. Deng
{"title":"A Lightweight Consensus Mechanism for Large-Scale UAV Networking","authors":"Jingjing Wang, Wei Long, Yizhong Liu, Xin Zhang, Zheng Zhang, Robert H. Deng","doi":"10.1109/tifs.2025.3614501","DOIUrl":"https://doi.org/10.1109/tifs.2025.3614501","url":null,"abstract":"","PeriodicalId":13492,"journal":{"name":"IEEE Transactions on Information Forensics and Security","volume":"15 1","pages":""},"PeriodicalIF":6.8,"publicationDate":"2025-09-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"145141355","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":1,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Tensor-Based Joint Hybrid Beamforming and Artificial Noise Design for Secure mmWave MU-MIMO-OFDM Communication Systems 基于张量的毫米波MU-MIMO-OFDM通信系统联合混合波束形成与人工噪声设计
IF 6.8 1区 计算机科学
IEEE Transactions on Information Forensics and Security Pub Date : 2025-09-25 DOI: 10.1109/tifs.2025.3614447
Dandan Mao, Ze Li, Shuangzhi Li, Wanming Hao, Ning Wang, Wei Xu
{"title":"Tensor-Based Joint Hybrid Beamforming and Artificial Noise Design for Secure mmWave MU-MIMO-OFDM Communication Systems","authors":"Dandan Mao, Ze Li, Shuangzhi Li, Wanming Hao, Ning Wang, Wei Xu","doi":"10.1109/tifs.2025.3614447","DOIUrl":"https://doi.org/10.1109/tifs.2025.3614447","url":null,"abstract":"","PeriodicalId":13492,"journal":{"name":"IEEE Transactions on Information Forensics and Security","volume":"16 1","pages":""},"PeriodicalIF":6.8,"publicationDate":"2025-09-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"145141361","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":1,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Precoding Design for Key Generation in Extremely Large-Scale MIMO Near-Field Multi-User Systems 超大规模MIMO近场多用户系统密钥生成的预编码设计
IF 6.8 1区 计算机科学
IEEE Transactions on Information Forensics and Security Pub Date : 2025-09-25 DOI: 10.1109/tifs.2025.3614468
Tianyu Lu, Liquan Chen, Junqing Zhang, Chen Chen, Trung Q. Duong, Michail Matthaiou
{"title":"Precoding Design for Key Generation in Extremely Large-Scale MIMO Near-Field Multi-User Systems","authors":"Tianyu Lu, Liquan Chen, Junqing Zhang, Chen Chen, Trung Q. Duong, Michail Matthaiou","doi":"10.1109/tifs.2025.3614468","DOIUrl":"https://doi.org/10.1109/tifs.2025.3614468","url":null,"abstract":"","PeriodicalId":13492,"journal":{"name":"IEEE Transactions on Information Forensics and Security","volume":"42 1","pages":""},"PeriodicalIF":6.8,"publicationDate":"2025-09-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"145141358","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":1,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Two-Stage Jamming Detection and Channel Estimation for UAV-based IoT Systems 基于无人机的物联网系统的两级干扰检测和信道估计
IF 6.8 1区 计算机科学
IEEE Transactions on Information Forensics and Security Pub Date : 2025-09-24 DOI: 10.1109/tifs.2025.3614004
Tasneem Assaf, Mohammad Al-Jarrah, Arafat Al-Dweik, Zhiguo Ding, Emad Alsusa, Anshul Pandey
{"title":"Two-Stage Jamming Detection and Channel Estimation for UAV-based IoT Systems","authors":"Tasneem Assaf, Mohammad Al-Jarrah, Arafat Al-Dweik, Zhiguo Ding, Emad Alsusa, Anshul Pandey","doi":"10.1109/tifs.2025.3614004","DOIUrl":"https://doi.org/10.1109/tifs.2025.3614004","url":null,"abstract":"","PeriodicalId":13492,"journal":{"name":"IEEE Transactions on Information Forensics and Security","volume":"15 1","pages":""},"PeriodicalIF":6.8,"publicationDate":"2025-09-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"145133821","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":1,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Secure Beamforming for Integrated Sensing, NOMA Communication, and Over-the-Air Computation Networks 用于集成传感、NOMA通信和空中计算网络的安全波束形成
IF 8 1区 计算机科学
IEEE Transactions on Information Forensics and Security Pub Date : 2025-09-24 DOI: 10.1109/TIFS.2025.3614008
Changjie Hu;Quanzhong Li;Qi Zhang;Qiang Li
{"title":"Secure Beamforming for Integrated Sensing, NOMA Communication, and Over-the-Air Computation Networks","authors":"Changjie Hu;Quanzhong Li;Qi Zhang;Qiang Li","doi":"10.1109/TIFS.2025.3614008","DOIUrl":"https://doi.org/10.1109/TIFS.2025.3614008","url":null,"abstract":"With the rapid evolution of wireless technologies, the deep integration of sensing, communication and computation has heralded a novel and promising paradigm. In this paper, we propose a secure beamforming design framework for integrated sensing, non-orthogonal multiple access (NOMA) communication and over-the-air computation (AirComp) networks, which can provide multi-functional intelligent services for communication-intensive, computation-intensive, delay-sensitive and security-sensitive applications. In the considered network, each dual-functional intelligent device engages in NOMA information transmission and AirComp. Meanwhile, the triple-functional base station conducts target sensing, NOMA signal decoding and data aggregation simultaneously. Our aim is to maximize the sum secrecy rate (SSR) of NOAM devices while ensuring that the quality of service requirements for both sensing and AirComp are met within the transmit power constraints imposed on all nodes. The formulated optimization problem involves coupled variables and logarithmic determinant, thus it is highly non-convex. To solve it, we propose an efficient matrix-extended generalized Lagrangian dual transformation based algorithm with penalty method, which can obtain the Karush-Kuhn-Tucker (KKT) solution to the original problem with low-complexity and convergence guarantee. Additionally, the well-known successive convex approximation based algorithm is also employed to address the formulated SSR maximization problem. However, its computational complexity significantly exceeds that of our proposed algorithm. Finally, extensive experiments demonstrate the performance improvement of our proposal compared with the benchmark approaches.","PeriodicalId":13492,"journal":{"name":"IEEE Transactions on Information Forensics and Security","volume":"20 ","pages":"10315-10331"},"PeriodicalIF":8.0,"publicationDate":"2025-09-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"145223675","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":1,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Robustness Matters: Pre-Training can Enhance the Performance of Encrypted Traffic Analysis 鲁棒性问题:预训练可以提高加密流量分析的性能
IF 6.8 1区 计算机科学
IEEE Transactions on Information Forensics and Security Pub Date : 2025-09-24 DOI: 10.1109/tifs.2025.3613970
Luming Yang, Lin Liu, Jun-jie Huang, Jiangyong Shi, Shaojing Fu, Yongjun Wang, Jinshu Su
{"title":"Robustness Matters: Pre-Training can Enhance the Performance of Encrypted Traffic Analysis","authors":"Luming Yang, Lin Liu, Jun-jie Huang, Jiangyong Shi, Shaojing Fu, Yongjun Wang, Jinshu Su","doi":"10.1109/tifs.2025.3613970","DOIUrl":"https://doi.org/10.1109/tifs.2025.3613970","url":null,"abstract":"","PeriodicalId":13492,"journal":{"name":"IEEE Transactions on Information Forensics and Security","volume":"95 1","pages":""},"PeriodicalIF":6.8,"publicationDate":"2025-09-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"145133823","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":1,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信