Mohamed Seif, Liyan Xie, Andrea J. Goldsmith, H. Vincent Poor
{"title":"Differentially Private Online Community Detection for Censored Block Models: Algorithms and Fundamental Limits","authors":"Mohamed Seif, Liyan Xie, Andrea J. Goldsmith, H. Vincent Poor","doi":"10.1109/tifs.2025.3592556","DOIUrl":"https://doi.org/10.1109/tifs.2025.3592556","url":null,"abstract":"","PeriodicalId":13492,"journal":{"name":"IEEE Transactions on Information Forensics and Security","volume":"17 1","pages":""},"PeriodicalIF":6.8,"publicationDate":"2025-07-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"144701956","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":1,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Yunming Zhang, Dengpan Ye, Sipeng Shen, Jun Wang, Caiyun Xie
{"title":"StyleMark: Robust Style Watermarking for Artworks Against Black-Box Zero-Shot Style Transfer","authors":"Yunming Zhang, Dengpan Ye, Sipeng Shen, Jun Wang, Caiyun Xie","doi":"10.1109/tifs.2025.3592521","DOIUrl":"https://doi.org/10.1109/tifs.2025.3592521","url":null,"abstract":"","PeriodicalId":13492,"journal":{"name":"IEEE Transactions on Information Forensics and Security","volume":"214 1","pages":""},"PeriodicalIF":6.8,"publicationDate":"2025-07-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"144701960","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":1,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"BOSC: A Backdoor-based Framework for Open Set Synthetic Image Attribution","authors":"Jun Wang, Benedetta Tondi, Mauro Barni","doi":"10.1109/tifs.2025.3592531","DOIUrl":"https://doi.org/10.1109/tifs.2025.3592531","url":null,"abstract":"","PeriodicalId":13492,"journal":{"name":"IEEE Transactions on Information Forensics and Security","volume":"56 1","pages":""},"PeriodicalIF":6.8,"publicationDate":"2025-07-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"144701952","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":1,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Xiaoxiao Qiao;Man Zhou;Hongwei Li;Xiaojing Zhu;Zhihao Yao;Houzhen Wang;Xiaojing Ma
{"title":"NUSGuard: Smart Device Anti-Eavesdropping Protection Based on Near-Ultrasonic Interference","authors":"Xiaoxiao Qiao;Man Zhou;Hongwei Li;Xiaojing Zhu;Zhihao Yao;Houzhen Wang;Xiaojing Ma","doi":"10.1109/TIFS.2025.3592558","DOIUrl":"10.1109/TIFS.2025.3592558","url":null,"abstract":"Voice assistants (VAs) have become ubiquitous in smart devices, and are highly valued for their ability to perform a variety of tasks through voice interaction, offering users hands-free convenience. However, the always-on microphones of VAs have raised significant privacy concerns in recent years. In this paper, we propose and implement NUSGuard, a novel and practical anti-eavesdropping system. To our knowledge, it is the first system to utilize the built-in speakers of commercial off-the-shelf (COTS) devices for anti-eavesdropping, thereby eliminating the need for dedicated ultrasonic transmitters. Specifically, it exploits human ears’ insensitivity to near-ultrasonic signals and the inherent non-linearity of mic to inject jamming noises into the microphones of unauthorized smart devices. Furthermore, we propose a robust mixed-noise scheme and a lexical-level automatic jammer control strategy, effectively disrupting unauthorized recordings while maintaining seamless voice interaction with authorized VA devices. Extensive digital and real-world experiments have demonstrated NUSGuard’s superior performance in terms of jamming effectiveness and security.","PeriodicalId":13492,"journal":{"name":"IEEE Transactions on Information Forensics and Security","volume":"20 ","pages":"7839-7852"},"PeriodicalIF":8.0,"publicationDate":"2025-07-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"144701907","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":1,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Vulnerabilities in SVHFL: Toward Secure and Verifiable Hybrid Federated Learning","authors":"Fucai Luo, Jiahui Wu, Jinglong Luo","doi":"10.1109/tifs.2025.3592536","DOIUrl":"https://doi.org/10.1109/tifs.2025.3592536","url":null,"abstract":"","PeriodicalId":13492,"journal":{"name":"IEEE Transactions on Information Forensics and Security","volume":"7 1","pages":""},"PeriodicalIF":6.8,"publicationDate":"2025-07-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"144701908","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":1,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Ye Lu, Shen Wang, Guopu Zhu, Zhaoyang Zhang, Jiwu Huang
{"title":"FGMIA: Feature-Guided Model Inversion Attacks Against Face Recognition Models","authors":"Ye Lu, Shen Wang, Guopu Zhu, Zhaoyang Zhang, Jiwu Huang","doi":"10.1109/tifs.2025.3592542","DOIUrl":"https://doi.org/10.1109/tifs.2025.3592542","url":null,"abstract":"","PeriodicalId":13492,"journal":{"name":"IEEE Transactions on Information Forensics and Security","volume":"54 1","pages":""},"PeriodicalIF":6.8,"publicationDate":"2025-07-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"144701959","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":1,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Jiazhen Zhao;Kailong Zhu;Lu Yu;Hui Huang;Yuliang Lu
{"title":"Yama: Precise Opcode-Based Data Flow Analysis for Detecting PHP Applications Vulnerabilities","authors":"Jiazhen Zhao;Kailong Zhu;Lu Yu;Hui Huang;Yuliang Lu","doi":"10.1109/TIFS.2025.3592537","DOIUrl":"10.1109/TIFS.2025.3592537","url":null,"abstract":"Web applications encompass various aspects of daily life, including online shopping, e-learning, and internet banking. Once there is a vulnerability, it can cause severe societal and economic damage. Due to its ease of use, PHP has become the preferred server-side programming language for web applications, making PHP applications a primary target for attackers. Data flow analysis is widely used for vulnerability detection before deploying web applications because of its efficiency. However, the high complexity of the PHP language makes it difficult to achieve precise data flow analysis, resulting in higher rates of false positives and false negatives in vulnerability detection. In this paper, we present Yama, a context-sensitive and path-sensitive interprocedural data flow analysis method for PHP, designed to detect taint-style vulnerabilities in PHP applications. We have found that the precise semantics and clear control flow of PHP opcodes enable data flow analysis to be more precise and efficient. Leveraging this observation, we established parsing rules for PHP opcodes and implemented a precise understanding of PHP program semantics in Yama. This enables Yama to precisely address the high complexity of the PHP language, including type inference, dynamic features, and built-in functions. We evaluated Yama from three dimensions: basic data flow analysis capabilities, complex semantic analysis capabilities, and the ability to discover vulnerabilities in real-world applications, demonstrating Yama’s advancement in vulnerability detection. Specifically, Yama possesses context-sensitive and path-sensitive interprocedural analysis capabilities, achieving a 99.1% true positive rate in complex semantic analysis experiments related to type inference, dynamic features, and built-in functions. It discovered and reported 38 zero-day vulnerabilities across 24 projects on GitHub with over 1,000 stars each, assigning 34 new CVE IDs. We have released the source code of the prototype implementation and the parsing rules for PHP opcodes to facilitate future research.","PeriodicalId":13492,"journal":{"name":"IEEE Transactions on Information Forensics and Security","volume":"20 ","pages":"7748-7763"},"PeriodicalIF":8.0,"publicationDate":"2025-07-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=11095739","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"144701966","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":1,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Fei Luo, Anna Li, Jiguang He, Zitong Yu, Kaishun Wu, Bin Jiang, Lu Wang
{"title":"Improved Multi-Task Radar Sensing via Attention-based Feature Distillation and Contrastive Learning","authors":"Fei Luo, Anna Li, Jiguang He, Zitong Yu, Kaishun Wu, Bin Jiang, Lu Wang","doi":"10.1109/tifs.2025.3592544","DOIUrl":"https://doi.org/10.1109/tifs.2025.3592544","url":null,"abstract":"","PeriodicalId":13492,"journal":{"name":"IEEE Transactions on Information Forensics and Security","volume":"25 1","pages":""},"PeriodicalIF":6.8,"publicationDate":"2025-07-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"144701957","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":1,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}