IEEE Transactions on Information Forensics and Security最新文献

筛选
英文 中文
Differentially Private Online Community Detection for Censored Block Models: Algorithms and Fundamental Limits 审查块模型的差异私有在线社区检测:算法和基本限制
IF 6.8 1区 计算机科学
IEEE Transactions on Information Forensics and Security Pub Date : 2025-07-24 DOI: 10.1109/tifs.2025.3592556
Mohamed Seif, Liyan Xie, Andrea J. Goldsmith, H. Vincent Poor
{"title":"Differentially Private Online Community Detection for Censored Block Models: Algorithms and Fundamental Limits","authors":"Mohamed Seif, Liyan Xie, Andrea J. Goldsmith, H. Vincent Poor","doi":"10.1109/tifs.2025.3592556","DOIUrl":"https://doi.org/10.1109/tifs.2025.3592556","url":null,"abstract":"","PeriodicalId":13492,"journal":{"name":"IEEE Transactions on Information Forensics and Security","volume":"17 1","pages":""},"PeriodicalIF":6.8,"publicationDate":"2025-07-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"144701956","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":1,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
StyleMark: Robust Style Watermarking for Artworks Against Black-Box Zero-Shot Style Transfer 针对黑盒零拍摄风格转移的艺术品的鲁棒风格水印
IF 6.8 1区 计算机科学
IEEE Transactions on Information Forensics and Security Pub Date : 2025-07-24 DOI: 10.1109/tifs.2025.3592521
Yunming Zhang, Dengpan Ye, Sipeng Shen, Jun Wang, Caiyun Xie
{"title":"StyleMark: Robust Style Watermarking for Artworks Against Black-Box Zero-Shot Style Transfer","authors":"Yunming Zhang, Dengpan Ye, Sipeng Shen, Jun Wang, Caiyun Xie","doi":"10.1109/tifs.2025.3592521","DOIUrl":"https://doi.org/10.1109/tifs.2025.3592521","url":null,"abstract":"","PeriodicalId":13492,"journal":{"name":"IEEE Transactions on Information Forensics and Security","volume":"214 1","pages":""},"PeriodicalIF":6.8,"publicationDate":"2025-07-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"144701960","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":1,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
BOSC: A Backdoor-based Framework for Open Set Synthetic Image Attribution BOSC:一个基于后门的开放集合成图像归属框架
IF 6.8 1区 计算机科学
IEEE Transactions on Information Forensics and Security Pub Date : 2025-07-24 DOI: 10.1109/tifs.2025.3592531
Jun Wang, Benedetta Tondi, Mauro Barni
{"title":"BOSC: A Backdoor-based Framework for Open Set Synthetic Image Attribution","authors":"Jun Wang, Benedetta Tondi, Mauro Barni","doi":"10.1109/tifs.2025.3592531","DOIUrl":"https://doi.org/10.1109/tifs.2025.3592531","url":null,"abstract":"","PeriodicalId":13492,"journal":{"name":"IEEE Transactions on Information Forensics and Security","volume":"56 1","pages":""},"PeriodicalIF":6.8,"publicationDate":"2025-07-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"144701952","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":1,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
NUSGuard: Smart Device Anti-Eavesdropping Protection Based on Near-Ultrasonic Interference NUSGuard:基于近超声干扰的智能设备防窃听保护
IF 8 1区 计算机科学
IEEE Transactions on Information Forensics and Security Pub Date : 2025-07-24 DOI: 10.1109/TIFS.2025.3592558
Xiaoxiao Qiao;Man Zhou;Hongwei Li;Xiaojing Zhu;Zhihao Yao;Houzhen Wang;Xiaojing Ma
{"title":"NUSGuard: Smart Device Anti-Eavesdropping Protection Based on Near-Ultrasonic Interference","authors":"Xiaoxiao Qiao;Man Zhou;Hongwei Li;Xiaojing Zhu;Zhihao Yao;Houzhen Wang;Xiaojing Ma","doi":"10.1109/TIFS.2025.3592558","DOIUrl":"10.1109/TIFS.2025.3592558","url":null,"abstract":"Voice assistants (VAs) have become ubiquitous in smart devices, and are highly valued for their ability to perform a variety of tasks through voice interaction, offering users hands-free convenience. However, the always-on microphones of VAs have raised significant privacy concerns in recent years. In this paper, we propose and implement NUSGuard, a novel and practical anti-eavesdropping system. To our knowledge, it is the first system to utilize the built-in speakers of commercial off-the-shelf (COTS) devices for anti-eavesdropping, thereby eliminating the need for dedicated ultrasonic transmitters. Specifically, it exploits human ears’ insensitivity to near-ultrasonic signals and the inherent non-linearity of mic to inject jamming noises into the microphones of unauthorized smart devices. Furthermore, we propose a robust mixed-noise scheme and a lexical-level automatic jammer control strategy, effectively disrupting unauthorized recordings while maintaining seamless voice interaction with authorized VA devices. Extensive digital and real-world experiments have demonstrated NUSGuard’s superior performance in terms of jamming effectiveness and security.","PeriodicalId":13492,"journal":{"name":"IEEE Transactions on Information Forensics and Security","volume":"20 ","pages":"7839-7852"},"PeriodicalIF":8.0,"publicationDate":"2025-07-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"144701907","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":1,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Vulnerabilities in SVHFL: Toward Secure and Verifiable Hybrid Federated Learning SVHFL中的漏洞:迈向安全和可验证的混合联邦学习
IF 6.8 1区 计算机科学
IEEE Transactions on Information Forensics and Security Pub Date : 2025-07-24 DOI: 10.1109/tifs.2025.3592536
Fucai Luo, Jiahui Wu, Jinglong Luo
{"title":"Vulnerabilities in SVHFL: Toward Secure and Verifiable Hybrid Federated Learning","authors":"Fucai Luo, Jiahui Wu, Jinglong Luo","doi":"10.1109/tifs.2025.3592536","DOIUrl":"https://doi.org/10.1109/tifs.2025.3592536","url":null,"abstract":"","PeriodicalId":13492,"journal":{"name":"IEEE Transactions on Information Forensics and Security","volume":"7 1","pages":""},"PeriodicalIF":6.8,"publicationDate":"2025-07-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"144701908","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":1,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
FGMIA: Feature-Guided Model Inversion Attacks Against Face Recognition Models 针对人脸识别模型的特征引导模型反演攻击
IF 6.8 1区 计算机科学
IEEE Transactions on Information Forensics and Security Pub Date : 2025-07-24 DOI: 10.1109/tifs.2025.3592542
Ye Lu, Shen Wang, Guopu Zhu, Zhaoyang Zhang, Jiwu Huang
{"title":"FGMIA: Feature-Guided Model Inversion Attacks Against Face Recognition Models","authors":"Ye Lu, Shen Wang, Guopu Zhu, Zhaoyang Zhang, Jiwu Huang","doi":"10.1109/tifs.2025.3592542","DOIUrl":"https://doi.org/10.1109/tifs.2025.3592542","url":null,"abstract":"","PeriodicalId":13492,"journal":{"name":"IEEE Transactions on Information Forensics and Security","volume":"54 1","pages":""},"PeriodicalIF":6.8,"publicationDate":"2025-07-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"144701959","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":1,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Efficient Byzantine Broadcast from Succinct Erasure Coding Proof System 简洁纠删编码证明系统的高效拜占庭广播
IF 6.8 1区 计算机科学
IEEE Transactions on Information Forensics and Security Pub Date : 2025-07-24 DOI: 10.1109/tifs.2025.3592564
Nicolas Alhaddad, Sisi Duan, Mayank Varia, Haochen Wang, Haibin Zhang
{"title":"Efficient Byzantine Broadcast from Succinct Erasure Coding Proof System","authors":"Nicolas Alhaddad, Sisi Duan, Mayank Varia, Haochen Wang, Haibin Zhang","doi":"10.1109/tifs.2025.3592564","DOIUrl":"https://doi.org/10.1109/tifs.2025.3592564","url":null,"abstract":"","PeriodicalId":13492,"journal":{"name":"IEEE Transactions on Information Forensics and Security","volume":"705 1","pages":""},"PeriodicalIF":6.8,"publicationDate":"2025-07-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"144701963","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":1,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Yama: Precise Opcode-Based Data Flow Analysis for Detecting PHP Applications Vulnerabilities Yama:用于检测PHP应用程序漏洞的精确基于操作码的数据流分析
IF 8 1区 计算机科学
IEEE Transactions on Information Forensics and Security Pub Date : 2025-07-24 DOI: 10.1109/TIFS.2025.3592537
Jiazhen Zhao;Kailong Zhu;Lu Yu;Hui Huang;Yuliang Lu
{"title":"Yama: Precise Opcode-Based Data Flow Analysis for Detecting PHP Applications Vulnerabilities","authors":"Jiazhen Zhao;Kailong Zhu;Lu Yu;Hui Huang;Yuliang Lu","doi":"10.1109/TIFS.2025.3592537","DOIUrl":"10.1109/TIFS.2025.3592537","url":null,"abstract":"Web applications encompass various aspects of daily life, including online shopping, e-learning, and internet banking. Once there is a vulnerability, it can cause severe societal and economic damage. Due to its ease of use, PHP has become the preferred server-side programming language for web applications, making PHP applications a primary target for attackers. Data flow analysis is widely used for vulnerability detection before deploying web applications because of its efficiency. However, the high complexity of the PHP language makes it difficult to achieve precise data flow analysis, resulting in higher rates of false positives and false negatives in vulnerability detection. In this paper, we present Yama, a context-sensitive and path-sensitive interprocedural data flow analysis method for PHP, designed to detect taint-style vulnerabilities in PHP applications. We have found that the precise semantics and clear control flow of PHP opcodes enable data flow analysis to be more precise and efficient. Leveraging this observation, we established parsing rules for PHP opcodes and implemented a precise understanding of PHP program semantics in Yama. This enables Yama to precisely address the high complexity of the PHP language, including type inference, dynamic features, and built-in functions. We evaluated Yama from three dimensions: basic data flow analysis capabilities, complex semantic analysis capabilities, and the ability to discover vulnerabilities in real-world applications, demonstrating Yama’s advancement in vulnerability detection. Specifically, Yama possesses context-sensitive and path-sensitive interprocedural analysis capabilities, achieving a 99.1% true positive rate in complex semantic analysis experiments related to type inference, dynamic features, and built-in functions. It discovered and reported 38 zero-day vulnerabilities across 24 projects on GitHub with over 1,000 stars each, assigning 34 new CVE IDs. We have released the source code of the prototype implementation and the parsing rules for PHP opcodes to facilitate future research.","PeriodicalId":13492,"journal":{"name":"IEEE Transactions on Information Forensics and Security","volume":"20 ","pages":"7748-7763"},"PeriodicalIF":8.0,"publicationDate":"2025-07-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=11095739","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"144701966","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":1,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Improved Multi-Task Radar Sensing via Attention-based Feature Distillation and Contrastive Learning 基于注意力特征蒸馏和对比学习的多任务雷达感知改进
IF 6.8 1区 计算机科学
IEEE Transactions on Information Forensics and Security Pub Date : 2025-07-24 DOI: 10.1109/tifs.2025.3592544
Fei Luo, Anna Li, Jiguang He, Zitong Yu, Kaishun Wu, Bin Jiang, Lu Wang
{"title":"Improved Multi-Task Radar Sensing via Attention-based Feature Distillation and Contrastive Learning","authors":"Fei Luo, Anna Li, Jiguang He, Zitong Yu, Kaishun Wu, Bin Jiang, Lu Wang","doi":"10.1109/tifs.2025.3592544","DOIUrl":"https://doi.org/10.1109/tifs.2025.3592544","url":null,"abstract":"","PeriodicalId":13492,"journal":{"name":"IEEE Transactions on Information Forensics and Security","volume":"25 1","pages":""},"PeriodicalIF":6.8,"publicationDate":"2025-07-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"144701957","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":1,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Contrastive-Generative-Contrastive: Neutralize Subjectivity in Sketch Re-identification 对比-生成-对比:素描再识别中的中性主体性
IF 6.8 1区 计算机科学
IEEE Transactions on Information Forensics and Security Pub Date : 2025-07-24 DOI: 10.1109/tifs.2025.3592535
Zechao Hu, Zhengwei Yang, Hao Li, Zheng Wang
{"title":"Contrastive-Generative-Contrastive: Neutralize Subjectivity in Sketch Re-identification","authors":"Zechao Hu, Zhengwei Yang, Hao Li, Zheng Wang","doi":"10.1109/tifs.2025.3592535","DOIUrl":"https://doi.org/10.1109/tifs.2025.3592535","url":null,"abstract":"","PeriodicalId":13492,"journal":{"name":"IEEE Transactions on Information Forensics and Security","volume":"119 1","pages":""},"PeriodicalIF":6.8,"publicationDate":"2025-07-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"144701980","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":1,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信