Zi Wang, Chenglong Li, Pengyu Li, Aihua Zheng, Jin Tang, Bin Luo
{"title":"Prototype-Based Diversity and Integrity Learning for All-Day Multi-Modal Person Re-Identification","authors":"Zi Wang, Chenglong Li, Pengyu Li, Aihua Zheng, Jin Tang, Bin Luo","doi":"10.1109/tifs.2025.3615708","DOIUrl":"https://doi.org/10.1109/tifs.2025.3615708","url":null,"abstract":"","PeriodicalId":13492,"journal":{"name":"IEEE Transactions on Information Forensics and Security","volume":"70 1","pages":""},"PeriodicalIF":6.8,"publicationDate":"2025-09-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"145188873","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":1,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Targeted Vaccine: Safety Alignment for Large Language Models against Harmful Fine-Tuning via Layer-wise Perturbation","authors":"Guozhi Liu, Weiwei Lin, Qi Mu, Tiansheng Huang, Ruichao Mo, Yuren Tao, Li Shen","doi":"10.1109/tifs.2025.3615412","DOIUrl":"https://doi.org/10.1109/tifs.2025.3615412","url":null,"abstract":"","PeriodicalId":13492,"journal":{"name":"IEEE Transactions on Information Forensics and Security","volume":"5 1","pages":""},"PeriodicalIF":6.8,"publicationDate":"2025-09-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"145188901","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":1,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Zihao Yang, Lin Wang, Yawen Zheng, Fan Dang, Xikai Sun, Zijuan Liu, Yunhao Liu
{"title":"Hinge: An Environment-Varying Adaptive Physical-Layer Key Generation Scheme","authors":"Zihao Yang, Lin Wang, Yawen Zheng, Fan Dang, Xikai Sun, Zijuan Liu, Yunhao Liu","doi":"10.1109/tifs.2025.3615510","DOIUrl":"https://doi.org/10.1109/tifs.2025.3615510","url":null,"abstract":"","PeriodicalId":13492,"journal":{"name":"IEEE Transactions on Information Forensics and Security","volume":"12 1","pages":""},"PeriodicalIF":6.8,"publicationDate":"2025-09-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"145188865","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":1,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Three Birds with One Arrow: Symmetric Two-Factor Authentication Protocol Based on Puncturable Pseudorandom Function","authors":"Xiaomin Zhao, Qi Jiang, Xin Gong, Meng Li, Xindi Ma, Jianfeng Ma","doi":"10.1109/tifs.2025.3615710","DOIUrl":"https://doi.org/10.1109/tifs.2025.3615710","url":null,"abstract":"","PeriodicalId":13492,"journal":{"name":"IEEE Transactions on Information Forensics and Security","volume":"60 1","pages":""},"PeriodicalIF":6.8,"publicationDate":"2025-09-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"145188870","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":1,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Meng Li, Yifei Chen, Yan Qiao, Guixin Ye, Zijian Zhang, Liehuang Zhu, Mauro Conti
{"title":"Trust in a Decentralized World: Data Governance from Faithful, Private, Verifiable, and Traceable Data Feeds","authors":"Meng Li, Yifei Chen, Yan Qiao, Guixin Ye, Zijian Zhang, Liehuang Zhu, Mauro Conti","doi":"10.1109/tifs.2025.3615705","DOIUrl":"https://doi.org/10.1109/tifs.2025.3615705","url":null,"abstract":"","PeriodicalId":13492,"journal":{"name":"IEEE Transactions on Information Forensics and Security","volume":"5 1","pages":""},"PeriodicalIF":6.8,"publicationDate":"2025-09-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"145188877","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":1,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Jianping Cai, Tianqing Zhu, Qingqing Ye, Zuobin Ying, Wanlei Zhou
{"title":"Enhancing Federated Learning with Differentially Private Continuous Data Release via k-Ary Trees","authors":"Jianping Cai, Tianqing Zhu, Qingqing Ye, Zuobin Ying, Wanlei Zhou","doi":"10.1109/tifs.2025.3615460","DOIUrl":"https://doi.org/10.1109/tifs.2025.3615460","url":null,"abstract":"","PeriodicalId":13492,"journal":{"name":"IEEE Transactions on Information Forensics and Security","volume":"31 1","pages":""},"PeriodicalIF":6.8,"publicationDate":"2025-09-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"145188878","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":1,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"PRADA: Proactive Risk Assessment and Mitigation of Misinformed Demand Attacks on Navigational Route Recommendations","authors":"Ya-Ting Yang, Haozhe Lei, Quanyan Zhu","doi":"10.1109/tifs.2025.3615726","DOIUrl":"https://doi.org/10.1109/tifs.2025.3615726","url":null,"abstract":"","PeriodicalId":13492,"journal":{"name":"IEEE Transactions on Information Forensics and Security","volume":"5 1","pages":""},"PeriodicalIF":6.8,"publicationDate":"2025-09-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"145188869","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":1,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Privacy-Preserving Authentication for Unlinkable Avatars in the Metaverse","authors":"Mohamed Mobarak, Riham AlTawy, Amr Youssef","doi":"10.1109/tifs.2025.3615515","DOIUrl":"https://doi.org/10.1109/tifs.2025.3615515","url":null,"abstract":"","PeriodicalId":13492,"journal":{"name":"IEEE Transactions on Information Forensics and Security","volume":"95 1","pages":""},"PeriodicalIF":6.8,"publicationDate":"2025-09-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"145188875","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":1,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Guoliang Chen;Lingyu Wang;Te Yang;Jianwei Xia;Ju H. Park
{"title":"Differentially Private Mean-Square Output Consensus for Heterogeneous Multiagent Systems: An Asynchronous Sampled-Data Interactions Scheme","authors":"Guoliang Chen;Lingyu Wang;Te Yang;Jianwei Xia;Ju H. Park","doi":"10.1109/TIFS.2025.3613051","DOIUrl":"10.1109/TIFS.2025.3613051","url":null,"abstract":"This article investigates the problem of privacy-preserving average consensus for continuous-time heterogeneous multiagent systems with intermittent information transfer under asynchronous sampled-data interactions. To address the challenges posed by agent-specific asynchronous sampled-data and time-varying communication delays, a time-translation approach incorporating a shared sampling period strategy is introduced, effectively transforming the asynchronous problem into a synchronous framework. Next, integrated distributed hybrid controller with time-varying noise injection is designed, enabling agents to interact with sensitive information only at sampling instants, thereby preserving privacy while maintaining trajectory availability. Then, the time-varying step-size and noise parameters, which are tunable parameters of the dual control mechanism corresponding to the desired <inline-formula> <tex-math>$varepsilon $ </tex-math></inline-formula>-differential privacy budget and system convergence accuracy are proposed, and the trade-off between control performance and privacy preservation is thoroughly analyzed. It is shown that the proposed protocol achieves asymptotically unbiased mean-square output consensus with predefined accuracy and privacy budget. Numerical examples validate the theoretical results.","PeriodicalId":13492,"journal":{"name":"IEEE Transactions on Information Forensics and Security","volume":"20 ","pages":"10189-10202"},"PeriodicalIF":8.0,"publicationDate":"2025-09-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"145154116","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":1,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Facilitating Access Control Vulnerability Detection in Modern Java Web Applications with Accurate Permission Check Identification","authors":"Youkun Shi, Fengyu Liu, Guangliang Yang, Yuan Zhang, Yinzhi Cao, Enhao Li, Xin Tan, Xiapu Luo, Min Yang, Siyi Chen","doi":"10.1109/tifs.2025.3614424","DOIUrl":"https://doi.org/10.1109/tifs.2025.3614424","url":null,"abstract":"","PeriodicalId":13492,"journal":{"name":"IEEE Transactions on Information Forensics and Security","volume":"62 1","pages":""},"PeriodicalIF":6.8,"publicationDate":"2025-09-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"145141357","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":1,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}