IEEE Transactions on Information Forensics and Security最新文献

筛选
英文 中文
Bilevel Optimized Collusion Attacks Against Gait Recognizer
IF 6.8 1区 计算机科学
IEEE Transactions on Information Forensics and Security Pub Date : 2024-12-11 DOI: 10.1109/tifs.2024.3515806
Jianmin Dong, Da-Tian Peng, Zhongmin Cai, Bo Zeng
{"title":"Bilevel Optimized Collusion Attacks Against Gait Recognizer","authors":"Jianmin Dong, Da-Tian Peng, Zhongmin Cai, Bo Zeng","doi":"10.1109/tifs.2024.3515806","DOIUrl":"https://doi.org/10.1109/tifs.2024.3515806","url":null,"abstract":"","PeriodicalId":13492,"journal":{"name":"IEEE Transactions on Information Forensics and Security","volume":"38 1","pages":""},"PeriodicalIF":6.8,"publicationDate":"2024-12-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142809169","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":1,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Local Differential Privacy is Not Enough: A Sample Reconstruction Attack against Federated Learning with Local Differential Privacy
IF 6.8 1区 计算机科学
IEEE Transactions on Information Forensics and Security Pub Date : 2024-12-11 DOI: 10.1109/tifs.2024.3515793
Zhichao You, Xuewen Dong, Shujun Li, Siqi Ma, Yulong Shen
{"title":"Local Differential Privacy is Not Enough: A Sample Reconstruction Attack against Federated Learning with Local Differential Privacy","authors":"Zhichao You, Xuewen Dong, Shujun Li, Siqi Ma, Yulong Shen","doi":"10.1109/tifs.2024.3515793","DOIUrl":"https://doi.org/10.1109/tifs.2024.3515793","url":null,"abstract":"","PeriodicalId":13492,"journal":{"name":"IEEE Transactions on Information Forensics and Security","volume":"95 1","pages":""},"PeriodicalIF":6.8,"publicationDate":"2024-12-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142809176","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":1,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Soft-Contrastive Pseudo Learning Approach Towards Open-World Forged Speech Attribution
IF 6.8 1区 计算机科学
IEEE Transactions on Information Forensics and Security Pub Date : 2024-12-11 DOI: 10.1109/tifs.2024.3515815
Qiang Zhang, Xiongwei Zhang, Meng Sun, Jibin Yang
{"title":"A Soft-Contrastive Pseudo Learning Approach Towards Open-World Forged Speech Attribution","authors":"Qiang Zhang, Xiongwei Zhang, Meng Sun, Jibin Yang","doi":"10.1109/tifs.2024.3515815","DOIUrl":"https://doi.org/10.1109/tifs.2024.3515815","url":null,"abstract":"","PeriodicalId":13492,"journal":{"name":"IEEE Transactions on Information Forensics and Security","volume":"12 1","pages":""},"PeriodicalIF":6.8,"publicationDate":"2024-12-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142809178","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":1,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
RRMAC: A Multi-data Owner Access Control Scheme with Robust Revocation for Co-owned Data Sharing
IF 6.8 1区 计算机科学
IEEE Transactions on Information Forensics and Security Pub Date : 2024-12-11 DOI: 10.1109/tifs.2024.3515853
Bei Li, Hong Zhong, Jie Cui, Chengjie Gu, Debiao He
{"title":"RRMAC: A Multi-data Owner Access Control Scheme with Robust Revocation for Co-owned Data Sharing","authors":"Bei Li, Hong Zhong, Jie Cui, Chengjie Gu, Debiao He","doi":"10.1109/tifs.2024.3515853","DOIUrl":"https://doi.org/10.1109/tifs.2024.3515853","url":null,"abstract":"","PeriodicalId":13492,"journal":{"name":"IEEE Transactions on Information Forensics and Security","volume":"2 1","pages":""},"PeriodicalIF":6.8,"publicationDate":"2024-12-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142809179","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":1,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Synchronous Byzantine Agreement with O(n) Messages and O(1) Expected Time
IF 6.8 1区 计算机科学
IEEE Transactions on Information Forensics and Security Pub Date : 2024-12-11 DOI: 10.1109/tifs.2024.3515854
Haochen Wang, Qidi You, Sisi Duan
{"title":"Synchronous Byzantine Agreement with O(n) Messages and O(1) Expected Time","authors":"Haochen Wang, Qidi You, Sisi Duan","doi":"10.1109/tifs.2024.3515854","DOIUrl":"https://doi.org/10.1109/tifs.2024.3515854","url":null,"abstract":"","PeriodicalId":13492,"journal":{"name":"IEEE Transactions on Information Forensics and Security","volume":"61 1","pages":""},"PeriodicalIF":6.8,"publicationDate":"2024-12-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142809166","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":1,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Privacy Passport: Privacy-Preserving Cross-Domain Data Sharing
IF 6.8 1区 计算机科学
IEEE Transactions on Information Forensics and Security Pub Date : 2024-12-11 DOI: 10.1109/tifs.2024.3515797
Xue Chen, Cheng Wang, Qing Yang, Hu Teng, Changjun Jiang
{"title":"Privacy Passport: Privacy-Preserving Cross-Domain Data Sharing","authors":"Xue Chen, Cheng Wang, Qing Yang, Hu Teng, Changjun Jiang","doi":"10.1109/tifs.2024.3515797","DOIUrl":"https://doi.org/10.1109/tifs.2024.3515797","url":null,"abstract":"","PeriodicalId":13492,"journal":{"name":"IEEE Transactions on Information Forensics and Security","volume":"9 1","pages":""},"PeriodicalIF":6.8,"publicationDate":"2024-12-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142809219","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":1,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
List of Reviewers
IF 6.3 1区 计算机科学
IEEE Transactions on Information Forensics and Security Pub Date : 2024-12-09 DOI: 10.1109/TIFS.2024.3508313
{"title":"List of Reviewers","authors":"","doi":"10.1109/TIFS.2024.3508313","DOIUrl":"10.1109/TIFS.2024.3508313","url":null,"abstract":"","PeriodicalId":13492,"journal":{"name":"IEEE Transactions on Information Forensics and Security","volume":"19 ","pages":"10400-10425"},"PeriodicalIF":6.3,"publicationDate":"2024-12-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=10786588","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142797462","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":1,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Low Complexity Byzantine-Resilient Federated Learning
IF 6.8 1区 计算机科学
IEEE Transactions on Information Forensics and Security Pub Date : 2024-11-28 DOI: 10.1109/tifs.2024.3482727
A. Gouissem, S. Hassanein, K. Abualsaud, E. Yaacoub, M. Mabrok, M. Abdallah, T. Khattab, M. Guizani
{"title":"Low Complexity Byzantine-Resilient Federated Learning","authors":"A. Gouissem, S. Hassanein, K. Abualsaud, E. Yaacoub, M. Mabrok, M. Abdallah, T. Khattab, M. Guizani","doi":"10.1109/tifs.2024.3482727","DOIUrl":"https://doi.org/10.1109/tifs.2024.3482727","url":null,"abstract":"","PeriodicalId":13492,"journal":{"name":"IEEE Transactions on Information Forensics and Security","volume":"14 1","pages":""},"PeriodicalIF":6.8,"publicationDate":"2024-11-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142752835","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":1,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
On the Efficient Design of Stacked Intelligent Metasurfaces for Secure SISO Transmission 论用于安全 SISO 传输的堆叠智能元表面的高效设计
IF 6.8 1区 计算机科学
IEEE Transactions on Information Forensics and Security Pub Date : 2024-11-25 DOI: 10.1109/tifs.2024.3494247
Hong Niu, Xia Lei, Jiancheng An, Lechen Zhang, Chau Yuen
{"title":"On the Efficient Design of Stacked Intelligent Metasurfaces for Secure SISO Transmission","authors":"Hong Niu, Xia Lei, Jiancheng An, Lechen Zhang, Chau Yuen","doi":"10.1109/tifs.2024.3494247","DOIUrl":"https://doi.org/10.1109/tifs.2024.3494247","url":null,"abstract":"","PeriodicalId":13492,"journal":{"name":"IEEE Transactions on Information Forensics and Security","volume":"16 1","pages":""},"PeriodicalIF":6.8,"publicationDate":"2024-11-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142712666","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":1,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Attackers Are Not the Same! Unveiling the Impact of Feature Distribution on Label Inference Attacks 攻击者不尽相同!揭示特征分布对标签推理攻击的影响
IF 6.8 1区 计算机科学
IEEE Transactions on Information Forensics and Security Pub Date : 2024-11-14 DOI: 10.1109/tifs.2024.3498464
Yige Liu, Che Wang, Yiwei Lou, Yongzhi Cao, Hanpin Wang
{"title":"Attackers Are Not the Same! Unveiling the Impact of Feature Distribution on Label Inference Attacks","authors":"Yige Liu, Che Wang, Yiwei Lou, Yongzhi Cao, Hanpin Wang","doi":"10.1109/tifs.2024.3498464","DOIUrl":"https://doi.org/10.1109/tifs.2024.3498464","url":null,"abstract":"","PeriodicalId":13492,"journal":{"name":"IEEE Transactions on Information Forensics and Security","volume":"17 1","pages":""},"PeriodicalIF":6.8,"publicationDate":"2024-11-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142637250","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":1,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信