Stop the war!
Остановите войну!
for scientists:
default search action
IEEE Transactions on Information Forensics and Security, Volume 19
Volume 19, 2024
- Xu Song, Saihui Hou, Yan Huang, Chunshui Cao, Xu Liu, Yongzhen Huang, Caifeng Shan:
Gait Attribute Recognition: A New Benchmark for Learning Richer Attributes From Human Gait Patterns. 1-14 - Dongxia Huang, Weiqi Luo, Minglin Liu, Weixuan Tang, Jiwu Huang:
Steganography Embedding Cost Learning With Generative Multi-Adversarial Network. 15-29 - Qiang Zhou, Liangmin Wang, Huijuan Zhu, Tong Lu, Victor S. Sheng:
WF-Transformer: Learning Temporal Features for Accurate Anonymous Traffic Identification by Using Transformer Networks. 30-43 - Ju Jia, Siqi Ma, Yang Liu, Lina Wang, Robert H. Deng:
A Causality-Aligned Structure Rationalization Scheme Against Adversarial Biased Perturbations for Graph Neural Networks. 59-73 - Guoxin Sun, Tansu Alpcan, Benjamin I. P. Rubinstein, Seyit Camtepe:
To Act or Not to Act: An Adversarial Game for Securing Vehicle Platoons. 163-177 - Jiangyi Deng, Xiaoyu Ji, Beibei Wang, Bin Wang, Wenyuan Xu:
Dr. Defender: Proactive Detection of Autopilot Drones Based on CSI. 194-206 - Xinyu Tang, Cheng Guo, Kim-Kwang Raymond Choo, Yi-Ning Liu:
An Efficient and Dynamic Privacy-Preserving Federated Learning System for Edge Computing. 207-220 - Yi Ding, Zi Wang, Zhen Qin, Erqiang Zhou, Guobin Zhu, Zhiguang Qin, Kim-Kwang Raymond Choo:
Backdoor Attack on Deep Learning-Based Medical Image Encryption and Decryption Network. 280-292 - Dandan Xu, Kai Chen, Miaoqian Lin, Chaoyang Lin, Xiaofeng Wang:
AutoPwn: Artifact-Assisted Heap Exploit Generation for CTF PWN Competitions. 293-306 - Xiangye Wei, Liming Xiu, Yimao Cai:
A Perspective of Using Frequency-Mixing as Entropy in Random Number Generation for Portable Hardware Cybersecurity IP. 320-333 - Xiao Sui, Sisi Duan, Haibin Zhang:
BG: A Modular Treatment of BFT Consensus Toward a Unified Theory of BFT Replication. 44-58 - Rui Xue, Kaiping Xue, Bin Zhu, Xinyi Luo, Tianwei Zhang, Qibin Sun, Jun Lu:
Differentially Private Federated Learning With an Adaptive Noise Mechanism. 74-87 - Qian Ren, Yue Li, Yingjun Wu, Yuchen Wu, Hong Lei, Lei Wang, Bangdao Chen:
DeCloak: Enable Secure and Cheap Multi-Party Transactions on Legacy Blockchains by a Minimally Trusted TEE Network. 88-103 - Yinshan Li, Hua Ma, Zhi Zhang, Yansong Gao, Alsharif Abuadbba, Minhui Xue, Anmin Fu, Yifeng Zheng, Said F. Al-Sarawi, Derek Abbott:
NTD: Non-Transferability Enabled Deep Learning Backdoor Detection. 104-119 - Shuting He, Weihua Chen, Kai Wang, Hao Luo, Fan Wang, Wei Jiang, Henghui Ding:
Region Generation and Assessment Network for Occluded Person Re-Identification. 120-132 - Qingjun Yuan, Gaopeng Gou, Yanbei Zhu, Yuefei Zhu, Gang Xiong, Yongjuan Wang:
MCRe: A Unified Framework for Handling Malicious Traffic With Noise Labels Based on Multidimensional Constraint Representation. 133-147 - Haiwei Wu, Jiantao Zhou, Xinyu Zhang, Jinyu Tian, Weiwei Sun:
Robust Camera Model Identification Over Online Social Network Shared Images via Multi-Scenario Learning. 148-162 - Haoheng Yuan, Yanghe Feng, Chuanchuan Yang, Zhuojun Zhuang, Bin Dai:
Two-User Gaussian Broadcast Wiretap Channel With Common Message and Feedback: Revisit. 178-193 - Chen Zhang, Yulong Ming, Mingyue Wang, Yu Guo, Xiaohua Jia:
Encrypted and Compressed Key-Value Store With Pattern-Analysis Security in Cloud Systems. 221-234 - Weize Quan, Pengfei Deng, Kai Wang, Dong-Ming Yan:
CGFormer: ViT-Based Network for Identifying Computer-Generated Images With Token Labeling. 235-250 - Ningbin Yang, Chunming Tang, Debiao He:
A Lightweight Certificateless Multi-User Matchmaking Encryption for Mobile Devices: Enhancing Security and Performance. 251-264 - Weisong Zhao, Xiangyu Zhu, Kaiwen Guo, Haichao Shi, Xiaoyu Zhang, Zhen Lei:
Masked Face Transformer. 265-279 - Wenli Sun, Xinyang Jiang, Shuguang Dou, Dongsheng Li, Duoqian Miao, Cheng Deng, Cairong Zhao:
Invisible Backdoor Attack With Dynamic Triggers Against Person Re-Identification. 307-319 - Meng Li, Zheng Pei, Yong Chen, Zhenhai Miao:
Fuzzy Linguistic Knowledge Reasoning-Based Secure Control for Connected Nonlinear Servosystem. 334-343 - Yuankun Xie, Haonan Cheng, Yutian Wang, Long Ye:
Domain Generalization via Aggregation and Separation for Audio Deepfake Detection. 344-358 - Saeed Abdolinezhad, Lukas Zimmermann, Axel Sikora:
Output Positioning to Derive Maximum Entropy From Physical Unclonable Functions. 359-371 - Min Xu, Ximiao Zhang, Xiuzhuang Zhou:
Confidence-Calibrated Face and Kinship Verification. 372-384 - Andrea Montibeller, Fernando Pérez-González:
An Adaptive Method for Camera Attribution Under Complex Radial Distortion Corrections. 385-400 - Zhiqing Guo, Zhenhong Jia, Liejun Wang, Dewang Wang, Gaobo Yang, Nikola K. Kasabov:
Constructing New Backbone Networks via Space-Frequency Interactive Convolution for Deepfake Detection. 401-413 - Youwen Zhu, Yiran Cao, Qiao Xue, Qihui Wu, Yushu Zhang:
Heavy Hitter Identification Over Large-Domain Set-Valued Data With Local Differential Privacy. 414-426 - Gaoyang Liu, Tianlong Xu, Rui Zhang, Zixiong Wang, Chen Wang, Ling Liu:
Gradient-Leaks: Enabling Black-Box Membership Inference Attacks Against Machine Learning Models. 427-440 - Zhenyu Zhou, Ajay Kumar:
Finger-Knuckle Assisted Slap Fingerprint Identification System for Higher Security and Convenience. 441-454 - Huming Qiu, Hua Ma, Zhi Zhang, Alsharif Abuadbba, Wei Kang, Anmin Fu, Yansong Gao:
Toward a Critical Evaluation of Robustness for Deep Learning Backdoor Countermeasures. 455-468 - Yaqing Song, Chunxiang Xu, Yuan Zhang, Shiyu Li:
Hardening Password-Based Credential Databases. 469-484 - Junjiang He, Cong Tang, Wenshan Li, Tao Li, Li Chen, Xiaolong Lan:
BR-HIDF: An Anti-Sparsity and Effective Host Intrusion Detection Framework Based on Multi-Granularity Feature Extraction. 485-499 - Chao Liu, Xue Fu, Yu Wang, Lantu Guo, Yuchao Liu, Yun Lin, Haitao Zhao, Guan Gui:
Overcoming Data Limitations: A Few-Shot Specific Emitter Identification Method Using Self-Supervised Learning and Adversarial Augmentation. 500-513 - Suvadeep Hajra, Manaar Alam, Sayandeep Saha, Stjepan Picek, Debdeep Mukhopadhyay:
On the Instability of Softmax Attention-Based Deep Learning Models in Side-Channel Analysis. 514-528 - Dinu Coltuc, Henri George Coanda:
Reversible Contrast Enhancement by Histogram Specification and Very Low Distortion Data Hiding. 529-539 - Yunfei Ge, Quanyan Zhu:
GAZETA: GAme-Theoretic ZEro-Trust Authentication for Defense Against Lateral Movement in 5G IoT Networks. 540-554 - Baihao Peng, Junfeng Liu, Jun Zeng:
Dynamic Analysis of Multiplex Networks With Hybrid Maintenance Strategies. 555-570 - Sheema Madhusudhanan, Arun Cyril Jose, Jayakrushna Sahoo, Reza Malekian:
PRIMϵ: Novel Privacy-Preservation Model With Pattern Mining and Genetic Algorithm. 571-585 - Milos Grujic, Ingrid Verbauwhede:
Optimizing Linear Correctors: A Tight Output Min-Entropy Bound and Selection Technique. 586-600 - Hanbiao Du, Zheng Che, Meng Shen, Liehuang Zhu, Jiankun Hu:
Breaking the Anonymity of Ethereum Mixing Services Using Graph Feature Learning. 616-631 - Ali Asghar Beigizad, Hadi Soleimany, Sara Zarei, Hamed Ramzanipour:
Linked Fault Analysis. 632-645 - William Briguglio, Waleed A. Yousef, Issa Traoré, Mohammad Mamun:
Federated Supervised Principal Component Analysis. 646-660 - Zhouyan Deng, Jiajia Liu, Yijie Xun, Junman Qin:
IdentifierIDS: A Practical Voltage-Based Intrusion Detection System for Real In-Vehicle Networks. 661-676 - Qi Xia, Isaac Amankona Obiri, Jianbin Gao, Hu Xia, Xiaosong Zhang, Kwame Omono Asamoah, Sandro Amofa:
PRIDN: A Privacy Preserving Data Sharing on Named Data Networking. 677-692 - Zekai Chen, Shengxing Yu, Mingyuan Fan, Ximeng Liu, Robert H. Deng:
Privacy-Enhancing and Robust Backdoor Defense for Federated Learning on Heterogeneous Data. 693-707 - Yu Guo, Yu Zhao, Saihui Hou, Cong Wang, Xiaohua Jia:
Verifying in the Dark: Verifiable Machine Unlearning by Using Invisible Backdoor Triggers. 708-721 - Ruidong Han, Huihui Gong, Siqi Ma, Juanru Li, Chang Xu, Elisa Bertino, Surya Nepal, Zhuo Ma, Jianfeng Ma:
A Credential Usage Study: Flow-Aware Leakage Detection in Open-Source Projects. 722-734 - Decheng Liu, Xinbo Gao, Chunlei Peng, Nannan Wang, Jie Li:
Universal Heterogeneous Face Analysis via Multi-Domain Feature Disentanglement. 735-747 - Ying He, Zhili Shen, Jingyu Hua, Qixuan Dong, Jiacheng Niu, Wei Tong, Xu Huang, Chen Li, Sheng Zhong:
Backdoor Attack Against Split Neural Network-Based Vertical Federated Learning. 748-763 - Menghao Zhang, Guanyu Li, Cheng Guo, Han Bao, Mingwei Xu, Hongxin Hu, Fenghua Li:
IMap: Toward a Fast, Scalable and Reconfigurable In-Network Scanner With Programmable Switches. 601-615 - Xiaohan Yuan, Jiqiang Liu, Bin Wang, Wei Wang, Bin Wang, Tao Li, Xiaobo Ma, Witold Pedrycz:
FedComm: A Privacy-Enhanced and Efficient Authentication Protocol for Federated Learning in Vehicular Ad-Hoc Networks. 777-792 - Hui Liu, Wenya Wang, Hao Sun, Anderson Rocha, Haoliang Li:
Robust Domain Misinformation Detection via Multi-Modal Feature Alignment. 793-806 - Elahe Vedadi, Yasaman Keshtkarjahromi, Hulya Seferoglu:
Efficient Coded Multi-Party Computation at Edge Networks. 807-820 - Yuqing Zhang, Zhaofeng Ma, Shoushan Luo, Pengfei Duan:
Dynamic Trust-Based Redactable Blockchain Supporting Update and Traceability. 821-834 - Qiuhua Wang, Chengyu Li, Tianyu Xia, Yizhi Ren, Dong Wang, Guoyan Zhang, Kim-Kwang Raymond Choo:
Optimal Selfish Mining-Based Denial-of-Service Attack. 835-850 - Xingming Long, Jie Zhang, Shuzhe Wu, Xin Jin, Shiguang Shan:
Dual Sampling Based Causal Intervention for Face Anti-Spoofing With Identity Debiasing. 851-862 - Huikai Shao, Chengcheng Liu, Xiaojiang Li, Dexing Zhong:
Privacy Preserving Palmprint Recognition via Federated Metric Learning. 878-891 - Yunchao Yang, Miao Hu, Yipeng Zhou, Xuezheng Liu, Di Wu:
CSRA: Robust Incentive Mechanism Design for Differentially Private Federated Learning. 892-906 - Yiming Xue, Jiaxuan Wu, Ronghua Ji, Ping Zhong, Juan Wen, Wanli Peng:
Adaptive Domain-Invariant Feature Extraction for Cross-Domain Linguistic Steganalysis. 920-933 - Jingwei Xin, Zikai Wei, Nannan Wang, Jie Li, Xinbo Gao:
Large Pose Face Recognition via Facial Representation Learning. 934-946 - Rossano Gaeta:
An Accurate and Efficient Algorithm to Identify Malicious Nodes of a Graph. 947-958 - Shuyi Li, Ruijun Ma, Jianhang Zhou, Bob Zhang, Lifang Wu:
Joint Discriminative Analysis With Low-Rank Projection for Finger Vein Feature Extraction. 959-969 - Wei Guo, Benedetta Tondi, Mauro Barni:
Universal Detection of Backdoor Attacks via Density-Based Clustering and Centroids Analysis. 970-984 - Haodi Wang, Yu Guo, Rongfang Bie, Xiaohua Jia:
Verifiable Arbitrary Queries With Zero Knowledge Confidentiality in Decentralized Storage. 1071-1085 - Anwei Luo, Chenqi Kong, Jiwu Huang, Yongjian Hu, Xiangui Kang, Alex C. Kot:
Beyond the Prior Forgery Knowledge: Mining Critical Clues for General Face Forgery Detection. 1168-1182 - Xiao Mei Zeng, Qing Liu, Chee Lip Gan:
A Comprehensive Data Retrieval and Correction Approach From 40-nm Flash Memory With Selective Chemical Engraving. 1031-1040 - Xinyu Qi, Aiqun Hu, Tianshu Chen:
Lightweight Radio Frequency Fingerprint Identification Scheme for V2X Based on Temporal Correlation. 1056-1070 - Chen Chen, Junqing Zhang, Tianyu Lu, Magnus Sandell, Liquan Chen:
Secret Key Generation for IRS-Assisted Multi-Antenna Systems: A Machine Learning-Based Approach. 1086-1098 - Weiqi Wang, Chenhan Zhang, Zhiyi Tian, Shui Yu:
Machine Unlearning via Representation Forgetting With Parameter Self-Sharing. 1099-1111 - Yuewang He, Xiangui Kang, Qiben Yan, Enping Li:
ResNeXt+: Attention Mechanisms Based on ResNeXt for Malware Detection and Classification. 1142-1155 - Guo-Wei Wong, Yi-Ting Huang, Ying-Ren Guo, Yeali S. Sun, Meng Chang Chen:
Attention-Based API Locating for Malware Techniques. 1199-1212 - Mingyue Wang, Zizhuo Chen, Yinbin Miao, Hejiao Huang, Cong Wang, Xiaohua Jia:
Cross-User Leakage Mitigation for Authorized Multi-User Encrypted Data Sharing. 1213-1226 - Shao-Chuan Zhao, Tianyang Xu, Xiaojun Wu, Josef Kittler:
Pluggable Attack for Visual Object Tracking. 1227-1240 - Mengqi Zhan, Yang Li, Bo Li, Jinchao Zhang, Chuanrong Li, Weiping Wang:
Toward Automated Field Semantics Inference for Binary Protocol Reverse Engineering. 764-776 - Roberto Casula, Giulia Orrù, Stefano Marrone, Umberto Gagliardini, Gian Luca Marcialis, Carlo Sansone:
Realistic Fingerprint Presentation Attacks Based on an Adversarial Approach. 863-877 - Yuni Lai, Yulin Zhu, Wenqi Fan, Xiaoge Zhang, Kai Zhou:
Toward Adversarially Robust Recommendation From Adaptive Fraudster Detection. 907-919 - Peng Xu, Jun Yang, Gaojie Chen, Zheng Yang, Yong Li, Moe Z. Win:
Physical-Layer Secret and Private Key Generation in Wireless Relay Networks With Correlated Eavesdropping Channels. 985-1000 - Wenze Mao, Peng Jiang, Liehuang Zhu:
Locally Verifiable Batch Authentication in IoMT. 1001-1014 - Taiyu Wang, Qinglin Yang, Kaiming Zhu, Junbo Wang, Chunhua Su, Kento Sato:
LDS-FL: Loss Differential Strategy Based Federated Learning for Privacy Preserving. 1015-1030 - Aakarsh Malhotra, Mayank Vatsa, Richa Singh, Keith B. Morris, Afzel Noore:
Multi-Surface Multi-Technique (MUST) Latent Fingerprint Database. 1041-1055 - Weiwei Feng, Nanqing Xu, Tianzhu Zhang, Baoyuan Wu, Yongdong Zhang:
Robust and Generalized Physical Adversarial Attacks via Meta-GAN. 1112-1125 - Durba Chatterjee, Kuheli Pratihar, Aritra Hazra, Ulrich Rührmair, Debdeep Mukhopadhyay:
Systematically Quantifying Cryptanalytic Nonlinearities in Strong PUFs. 1126-1141 - Hongwei Ding, Yu Sun, Nana Huang, Zhidong Shen, Xiaohui Cui:
TMG-GAN: Generative Adversarial Networks-Based Imbalanced Learning for Network Intrusion Detection. 1156-1167 - Dazhi Zhan, Yexin Duan, Yue Hu, Weili Li, Shize Guo, Zhisong Pan:
MalPatch: Evading DNN-Based Malware Detection With Adversarial Patches. 1183-1198 - Yuanchao Chen, Yuwei Li, Zulie Pan, Yuliang Lu, Juxing Chen, Shouling Ji:
URadar: Discovering Unrestricted File Upload Vulnerabilities via Adaptive Dynamic Testing. 1251-1266 - Changsheng Chen, Bokang Li, Rizhao Cai, Jishen Zeng, Jiwu Huang:
Distortion Model-Based Spectral Augmentation for Generalized Recaptured Document Detection. 1283-1298 - Bei Gong, Chong Guo, Chong Guo, Chen Guo, Yao Sun, Muhammad Waqas, Sheng Chen:
SLIM: A Secure and Lightweight Multi-Authority Attribute-Based Signcryption Scheme for IoT. 1299-1312 - Yunhao Du, Cheng Lei, Zhicheng Zhao, Yuan Dong, Fei Su:
Video-Based Visible-Infrared Person Re-Identification With Auxiliary Samples. 1313-1325 - Elias N. Zois, Dimitrios Tsourounis, Dimitrios Kalivas:
Similarity Distance Learning on SPD Manifold for Writer Independent Offline Signature Verification. 1342-1356 - Zirui Gong, Liyue Shen, Yanjun Zhang, Leo Yu Zhang, Jingwei Wang, Guangdong Bai, Yong Xiang:
AgrAmplifier: Defending Federated Learning Against Poisoning Attacks Through Local Update Amplification. 1241-1250 - Kuofeng Gao, Jiawang Bai, Baoyuan Wu, Mengxi Ya, Shu-Tao Xia:
Imperceptible and Robust Backdoor Attack in 3D Point Cloud. 1267-1282 - Zhi Li, Hao Wang, Songnian Zhang, Wenying Zhang, Rongxing Lu:
SecKNN: FSS-Based Secure Multi-Party KNN Classification Under General Distance Functions. 1326-1341 - Jiajun Gong, Wuqi Zhang, Charles Zhang, Tao Wang:
WFDefProxy: Real World Implementation and Evaluation of Website Fingerprinting Defenses. 1357-1371 - Qige Song, Yafei Sang, Yongzheng Zhang, Shuhao Li, Xiaolin Xu:
SepBIN: Binary Feature Separation for Better Semantic Comparison and Authorship Verification. 1372-1387 - Leixiao Cheng, Fei Meng:
Server-Aided Public Key Authenticated Searchable Encryption With Constant Ciphertext and Constant Trapdoor. 1388-1400 - Yong Dong, Yinfei Xu, Tong Zhang, Yili Xia:
Optimality of the Proper Gaussian Signal in Complex MIMO Wiretap Channels. 1401-1414 - Yinfei Xu, Jian Lu, Xuan Guang, Wei Xu:
Information Embedding With Stegotext Reconstruction. 1415-1428 - Amir Mahdi Sadeghzadeh, Amir Mohammad Sobhanian, Faezeh Dehghan, Rasool Jalili:
HODA: Hardness-Oriented Detection of Model Extraction Attacks. 1429-1439 - Xiaoguo Li, Zixi Huang, Bowen Zhao, Guomin Yang, Tao Xiang, Robert H. Deng:
STDA: Secure Time Series Data Analytics With Practical Efficiency in Wide-Area Network. 1440-1454 - Tingting Lu, Junfeng Wang:
DOMR: Toward Deep Open-World Malware Recognition. 1455-1468 - Jinyoung Lee, Hyeonsik Yeom, Si-Hyeon Lee, Jeongseok Ha:
Channel Correlation in Multi-User Covert Communication: Friend or Foe? 1469-1482 - Niusen Chen, Bo Chen:
HiPDS: A Storage Hardware-Independent Plausibly Deniable Storage System. 1483-1495 - Hengmin Zhang, Jian Yang, Jianjun Qian, Guangwei Gao, Xiangyuan Lan, Zhiyuan Zha, Bihan Wen:
Efficient Image Classification via Structured Low-Rank Matrix Factorization Regression. 1496-1509 - Yang Liu, Guangbo Liang, Xi Wang, Peican Zhu, Zhen Wang:
Diffusion Containment in Complex Networks Through Collective Influence of Connections. 1510-1524 - Ni Yang, Ruiyi Gao, Youzhi Feng, Huan Su:
Event-Triggered Impulsive Control for Complex Networks Under Stochastic Deception Attacks. 1525-1534 - Hao Fang, Ajian Liu, Jun Wan, Sergio Escalera, Chenxu Zhao, Xu Zhang, Stan Z. Li, Zhen Lei:
Surveillance Face Anti-Spoofing. 1535-1546 - Jiefu Chen, Tong Chen, Xing Xu, Jingran Zhang, Yang Yang, Heng Tao Shen:
Coreset Learning-Based Sparse Black-Box Adversarial Attack for Video Recognition. 1547-1560 - Ashkan Esmaeili, Marzieh Edraki, Nazanin Rahnavard, Ajmal Mian, Mubarak Shah:
Low-Rank and Sparse Decomposition for Low-Query Decision-Based Adversarial Attacks. 1561-1575 - Xiaohan Hao, Chao Lin, Wenhan Dong, Xinyi Huang, Hui Xiong:
Robust and Secure Federated Learning Against Hybrid Attacks: A Generic Architecture. 1576-1588 - Peng Jiang, Qi Liu, Liehuang Zhu:
SanIdea: Exploiting Secure Blockchain-Based Access Control via Sanitizable Encryption. 1589-1600 - Houssem Jmal, Firas Ben Hmida, Nardine Basta, Muhammad Ikram, Mohamed Ali Kâafar, Andy Walker:
SPGNN-API: A Transferable Graph Neural Network for Attack Paths Identification and Autonomous Mitigation. 1601-1613 - Xinjun Pei, Xiaoheng Deng, Shengwei Tian, Jianqing Liu, Kaiping Xue:
Privacy-Enhanced Graph Neural Network for Decentralized Local Graphs. 1614-1629 - Adam Gronowski, William Paul, Fady Alajaji, Bahman Gharesifard, Philippe Burlina:
Classification Utility, Fairness, and Compactness via Tunable Information Bottleneck and Rényi Measures. 1630-1645 - Weihang Tan, Sin-Wei Chiu, Antian Wang, Yingjie Lao, Keshab K. Parhi:
PaReNTT: Low-Latency Parallel Residue Number System and NTT-Based Long Polynomial Modular Multiplication for Homomorphic Encryption. 1646-1659 - Kai Feng, Marco M. Cook, Angelos K. Marnerides:
Sizzler: Sequential Fuzzing in Ladder Diagrams for Vulnerability Detection and Discovery in Programmable Logic Controllers. 1660-1671 - Hodong Kim, Changhee Hahn, Hyunwoo J. Kim, Youngjoo Shin, Junbeom Hur:
Deep Learning-Based Detection for Multiple Cache Side-Channel Attacks. 1672-1686 - Junyu Quan, Qin Li, Lvzhou Li:
Verifiable Blind Quantum Computation With Identity Authentication for Multi-Type Clients. 1687-1698 - Huafeng Qin, Chao Fan, Shaojiang Deng, Yantao Li, Mounim A. El-Yacoubi, Gang Zhou:
AG-NAS: An Attention GRU-Based Neural Architecture Search for Finger-Vein Recognition. 1699-1713 - Dingzhao Li, Jie Qi, Shaohua Hong, Pengfei Deng, Haixin Sun:
A Class-Incremental Approach With Self-Training and Prototype Augmentation for Specific Emitter Identification. 1714-1727 - Mohammadhadi Shateri, Francisco Messina, Fabrice Labeau, Pablo Piantanida:
Preserving Privacy in GANs Against Membership Inference Attack. 1728-1743 - Chandra Sharma, George T. Amariucai, Shuangqing Wei:
The Economics of Privacy and Utility: Investment Strategies. 1744-1755 - Yangguang Tian, Bowen Liu, Yingjiu Li, Pawel Szalachowski, Jianying Zhou:
Accountable Fine-Grained Blockchain Rewriting in the Permissionless Setting. 1756-1766 - Bin Yang, Jun Chen, Cuiqun Chen, Mang Ye:
Dual Consistency-Constrained Learning for Unsupervised Visible-Infrared Person Re-Identification. 1767-1779 - Qiongxiu Li, Jaron Skovsted Gundersen, Milan Lopuhaä-Zwakenberg, Richard Heusdens:
Adaptive Differentially Quantized Subspace Perturbation (ADQSP): A Unified Framework for Privacy-Preserving Distributed Average Consensus. 1780-1793 - Nusrat Farzana Dipu, Avinash Ayalasomayajula, Mark M. Tehranipoor, Farimah Farahmandi:
AGILE: Automated Assertion Generation to Detect Information Leakage Vulnerabilities. 1794-1809 - Boyu Zhu, Changyu Dong, Yuan Zhang, Yunlong Mao, Sheng Zhong:
Toward Universal Detection of Adversarial Examples via Pseudorandom Classifiers. 1810-1825 - Maoguo Gong, Yuanqiao Zhang, Yuan Gao, A. Kai Qin, Yue Wu, Shanfeng Wang, Yihong Zhang:
A Multi-Modal Vertical Federated Learning Framework Based on Homomorphic Encryption. 1826-1839 - Ishan Karunanayake, Jiaojiao Jiang, Nadeem Ahmed, Sanjay K. Jha:
Exploring Uncharted Waters of Website Fingerprinting. 1840-1854 - Xuan Yang, Dongming Li:
LED-RFF: LTE DMRS-Based Channel Robust Radio Frequency Fingerprint Identification Scheme. 1855-1869 - Zhenqin Yin, Xinmin Zhang, Zhihuan Song, Zhiqiang Ge:
Adversarial Learning From Imbalanced Data: A Robust Industrial Fault Classification Method. 1870-1882 - Siguo Bi, Kai Li, Shuyan Hu, Wei Ni, Cong Wang, Xin Wang:
Detection and Mitigation of Position Spoofing Attacks on Cooperative UAV Swarm Formations. 1883-1895 - Tao Jing, Hongyan Huang, Qinghe Gao, Yue Wu, Yan Huo, Yawei Wang:
Multi-User Physical Layer Authentication Based on CSI Using ResNet in Mobile IIoT. 1896-1907 - Yuhan Suo, Senchun Chai, Runqi Chai, Zhong-Hua Pang, Yuanqing Xia, Guo-Ping Liu:
Security Defense of Large-Scale Networks Under False Data Injection Attacks: An Attack Detection Scheduling Approach. 1908-1921 - Jiawei Liu, Jingyi Xie, Yang Wang, Zheng-Jun Zha:
Adaptive Texture and Spectrum Clue Mining for Generalizable Face Forgery Detection. 1922-1934 - Junlong Mao, Huiyi Tang, Shanxiang Lyu, Zhengchun Zhou, Xiaochun Cao:
Content-Aware Quantization Index Modulation: Leveraging Data Statistics for Enhanced Image Watermarking. 1935-1947 - Meng Chen, Li Lu, Jiadi Yu, Zhongjie Ba, Feng Lin, Kui Ren:
AdvReverb: Rethinking the Stealthiness of Audio Adversarial Examples to Human Perception. 1948-1962 - Yuntao Wang, Zhou Su, Abderrahim Benslimane, Qichao Xu, Minghui Dai, Ruidong Li:
Collaborative Honeypot Defense in UAV Networks: A Learning-Based Game Approach. 1963-1978 - Chuan Zhang, Haojun Xuan, Tong Wu, Ximeng Liu, Guomin Yang, Liehuang Zhu:
Blockchain-Based Dynamic Time-Encapsulated Data Auditing for Outsourcing Storage. 1979-1993 - Jiajing Wu, Dan Lin, Qishuang Fu, Shuo Yang, Ting Chen, Zibin Zheng, Bowen Song:
Toward Understanding Asset Flows in Crypto Money Laundering Through the Lenses of Ethereum Heists. 1994-2009 - Kerem Ozfatura, Emre Ozfatura, Alptekin Küpçü, Deniz Gündüz:
Byzantines Can Also Learn From History: Fall of Centered Clipping in Federated Learning. 2010-2022 - Chen Liu, Bo Li, Jun Zhao, Weiwei Feng, Xudong Liu, Chunpei Li:
A2-CLM: Few-Shot Malware Detection Based on Adversarial Heterogeneous Graph Augmentation. 2023-2038 - Laura Crosara, Francesco Ardizzon, Stefano Tomasin, Nicola Laurenti:
Worst-Case Spoofing Attack and Robust Countermeasure in Satellite Navigation Systems. 2039-2050 - Fanliang Hu, Jian Shen, Pandi Vijayakumar:
Side-Channel Attacks Based on Multi-Loss Regularized Denoising AutoEncoder. 2051-2065 - Erez Danieli, Menachem Goldzweig, Moshe Avital, Itamar Levi:
Revealing the Secrets of Radio Embedded Systems: Extraction of Raw Information via RF. 2066-2081 - Ahmad Bazzi, Marwa Chafii:
Secure Full Duplex Integrated Sensing and Communications. 2082-2097 - Kutub Uddin, Yoonmo Yang, Tae Hyun Jeong, Byung Tae Oh:
A Robust Open-Set Multi-Instance Learning for Defending Adversarial Attacks in Digital Image. 2098-2111 - Yiming Yang, Weipeng Hu, Haifeng Hu:
Unsupervised NIR-VIS Face Recognition via Homogeneous-to-Heterogeneous Learning and Residual-Invariant Enhancement. 2112-2126 - Linkun Fan, Fazhi He, Tongzhen Si, Rubin Fan, Chuanlong Ye, Bing Li:
MBA: Backdoor Attacks Against 3D Mesh Classifier. 2127-2142 - Shengbang Fang, Matthew C. Stamm:
Attacking Image Splicing Detection and Localization Algorithms Using Synthetic Traces. 2143-2156 - Wenbing Tang, Yuan Zhou, Yang Liu, Zuohua Ding, Jing Liu:
Robust Motion Planning for Multi-Robot Systems Against Position Deception Attacks. 2157-2170 - Yuexin Xiang, Yuchen Lei, Ding Bao, Tiantian Li, Qingqing Yang, Wenmao Liu, Wei Ren, Kim-Kwang Raymond Choo:
BABD: A Bitcoin Address Behavior Dataset for Pattern Analysis. 2171-2185 - Ziyu Wei, Xi Yang, Nannan Wang, Xinbo Gao:
Dual-Adversarial Representation Disentanglement for Visible Infrared Person Re-Identification. 2186-2200 - Guowei Ling, Fei Tang, Chaochao Cai, Jinyong Shan, Haiyang Xue, Wulu Li, Peng Tang, Xinyi Huang, Weidong Qiu:
P²FRPSI: Privacy-Preserving Feature Retrieved Private Set Intersection. 2201-2216 - Meng Li, Hanni Ding, Qing Wang, Mingwei Zhang, Weizhi Meng, Liehuang Zhu, Zijian Zhang, Xiaodong Lin:
Decentralized Threshold Signatures With Dynamically Private Accountability. 2217-2230 - Jinguang Han, Willy Susilo, Nan Li, Xinyi Huang:
OLBS: Oblivious Location-Based Services. 2231-2243 - Zhenyu Guo, Xin Li, Jiamou Liu, Zijian Zhang, Meng Li, Jingjing Hu, Liehuang Zhu:
Graph-Based Covert Transaction Detection and Protection in Blockchain. 2244-2257 - Fahong Zhang, Chen Yang, Rui Zong, Xinran Zheng, Jianfei Wang, Yishuo Meng:
An Efficient and Scalable FHE-Based PDQ Scheme: Utilizing FFT to Design a Low Multiplication Depth Large-Integer Comparison Algorithm. 2258-2272 - Zongkun Sun, Yanzhen Ren, Yihuan Huang, Wuyang Liu, Hongcheng Zhu:
AFPM: A Low-Cost and Universal Adversarial Defense for Speaker Recognition Systems. 2273-2287 - Jianchang Lai, Willy Susilo, Robert H. Deng, Fuchun Guo:
SDSS: Sequential Data Sharing System in IoT. 2288-2299 - Liang Guo, Jie Jia, Jian Chen, Xingwei Wang:
Secure Communication Optimization in NOMA Systems With UAV-Mounted STAR-RIS. 2300-2314 - Rui Gao, Jiangshuai Huang, Xiaojie Su, Ling Zhao:
Adaptive Control of Strict-Feedback Nonlinear Systems Under Denial-of-Service: A Synthetic Analysis. 2315-2327 - Weidong Liu, Xiaojun Mao, Xiaofei Zhang, Xin Zhang:
Efficient Sparse Least Absolute Deviation Regression With Differential Privacy. 2328-2339 - Yanbin Li, Jiajie Zhu, Zhe Liu, Ming Tang, Shougang Ren:
Deep Learning Gradient Visualization-Based Pre-Silicon Side-Channel Leakage Location. 2340-2355 - Haochen Dou, Zhenwu Dan, Peng Xu, Wei Wang, Shuning Xu, Tianyang Chen, Hai Jin:
Dynamic Searchable Symmetric Encryption With Strong Security and Robustness. 2370-2384 - Ting Cui, Yiming Mao, Yang Yang, Yi Zhang, Jiyan Zhang, Chenhui Jin:
Congruent Differential Cluster for Binary SPN Ciphers. 2385-2397 - Xiaoxue Hu, Geling Liu, Baolin Zheng, Lingchen Zhao, Qian Wang, Yufei Zhang, Minxin Du:
FastTextDodger: Decision-Based Adversarial Attack Against Black-Box NLP Models With Extremely High Efficiency. 2398-2411 - Jian Chen, Yuan Gao, Gaoyang Liu, Ahmed M. Abdelmoniem, Chen Wang:
Manipulating Pre-Trained Encoder for Targeted Poisoning Attacks in Contrastive Learning. 2412-2424 - Weiqi Dai, Jinkai Liu, Yang Zhou, Kim-Kwang Raymond Choo, Xia Xie, Deqing Zou, Hai Jin:
PRBFPT: A Practical Redactable Blockchain Framework With a Public Trapdoor. 2425-2437 - Xiaohu Wang, Chao Lin, Xinyi Huang, Debiao He:
Anonymity-Enhancing Multi-Hop Locks for Monero-Enabled Payment Channel Networks. 2438-2453 - Na Wang, Wen Zhou, Jingjing Wang, Yifan Guo, Junsong Fu, Jianwei Liu:
Secure and Efficient Similarity Retrieval in Cloud Computing Based on Homomorphic Encryption. 2454-2469 - Jiajun Li, Pu Wang, Zheng Yan, Yishan Yang, Kai Zeng:
BGKey: Group Key Generation for Backscatter Communications Among Multiple Devices. 2470-2486 - Jueun Jeon, Byeonghui Jeong, Seungyeon Baek, Young-Sik Jeong:
Static Multi Feature-Based Malware Detection Using Multi SPP-net in Smart IoT Environments. 2487-2500 - Yu Wei, Jingyu Jia, Yuduo Wu, Changhui Hu, Changyu Dong, Zheli Liu, Xiaofeng Chen, Yun Peng, Shaowei Wang:
Distributed Differential Privacy via Shuffling Versus Aggregation: A Curious Study. 2501-2516 - Xiaoli Zhang, Wenxiang Sun, Zhicheng Xu, Hongbing Cheng, Chengjun Cai, Helei Cui, Qi Li:
EVM-Shield: In-Contract State Access Control for Fast Vulnerability Detection and Prevention. 2517-2532 - Huaibing Peng, Huming Qiu, Hua Ma, Shuo Wang, Anmin Fu, Said F. Al-Sarawi, Derek Abbott, Yansong Gao:
On Model Outsourcing Adaptive Attacks to Deep Learning Backdoor Defenses. 2356-2369 - Tianyu Zhaolu, Zhiguo Wan, Huaqun Wang:
Division of Regulatory Power: Collaborative Regulation for Privacy-Preserving Blockchains. 2533-2548 - Meng Jia, Jing Chen, Kun He, Min Shi, Yuanzheng Wang, Ruiying Du:
Generic Construction of Threshold Credential Management With User-Autonomy Aggregation. 2549-2564 - Lifeng Huang, Qiong Huang, Peichao Qiu, Shuxin Wei, Chengying Gao:
FASTEN: Fast Ensemble Learning for Improved Adversarial Robustness. 2565-2580 - Guoyuan Lin, Weiqi Luo, Da Luo, Jiwu Huang:
One-Class Neural Network With Directed Statistics Pooling for Spoofing Speech Detection. 2581-2593 - Jianhao Li, Jiabei Wang, Rui Zhang, Yansen Xin, Wenhan Xu:
NEMO: Practical Distributed Boolean Queries With Minimal Leakage. 2594-2608 - Jian Liu, Jiachen Ke, Jinliang Liu, Xiangpeng Xie, Engang Tian:
Outlier-Resistant Non-Fragile Control of Nonlinear Networked Systems Under DoS Attacks and Multi-Variable Event-Triggered SC Protocol. 2609-2622 - Zhenqing Qu, Xiang Ling, Ting Wang, Xiang Chen, Shouling Ji, Chunming Wu:
AdvSQLi: Generating Adversarial SQL Injections Against Real-World WAF-as-a-Service. 2623-2638 - Yibin Zhang, Qianyun Zhang, Haitao Zhao, Yun Lin, Guan Gui, Hikmet Sari:
Multisource Heterogeneous Specific Emitter Identification Using Attention Mechanism-Based RFF Fusion Method. 2639-2650 - Barak Amihood, Asaf Cohen:
Covertly Controlling a Linear System. 2651-2663 - Janith Kavindu Dassanayake, Dulaj Gunasinghe, Gayan Amarasuriya Aruma Baduge:
Secrecy Rate Analysis and Active Pilot Attack Detection for IRS-Aided Massive MIMO Systems. 2664-2679 - Raymond K. Zhao, Sarah McCarthy, Ron Steinfeld, Amin Sakzad, Máire O'Neill:
Quantum-Safe HIBE: Does It Cost a Latte? 2680-2695 - Zhenyu Cui, Jiahuan Zhou, Yuxin Peng:
DMA: Dual Modality-Aware Alignment for Visible-Infrared Person Re-Identification. 2696-2708 - Shuyi Li, Bob Zhang, Lifang Wu, Ruijun Ma, Xin Ning:
Robust and Sparse Least Square Regression for Finger Vein and Finger Knuckle Print Recognition. 2709-2719 - Haotian Wang, Jun Tao, Dingwen Chi, Yu Gao, Zuyan Wang, Dika Zou, Yifan Xu:
A Preference-Driven Malicious Platform Detection Mechanism for Users in Mobile Crowdsensing. 2720-2731 - Jun Zhao, Kai Zhang, Junqing Gong, Haifeng Qian:
Lavida: Large-Universe, Verifiable, and Dynamic Fine-Grained Access Control for E-Health Cloud. 2732-2745 - Qiuyun Tong, Xinghua Li, Yinbin Miao, Yunwei Wang, Ximeng Liu, Robert H. Deng:
Beyond Result Verification: Efficient Privacy-Preserving Spatial Keyword Query With Suppressed Leakage. 2746-2760 - Mei Jiang, Yannan Li, Willy Susilo, Dung Hoang Duong:
Quantum-Safe Puncturable Signatures With Their Application in Blockchain. 2761-2770 - Kimia Zamiri Azar, Hadi Mardani Kamali, Farimah Farahmandi, Mark M. Tehranipoor:
Improving Bounded Model Checkers Scalability for Circuit De-Obfuscation: An Exploration. 2771-2785 - Alejandro Cohen, Asaf Cohen, Omer Gurewitz:
Secure Adaptive Group Testing. 2786-2799 - Rui Sun, Long Chen, Lei Zhang, Ruirui Xie, Jun Gao:
Robust Visible-Infrared Person Re-Identification Based on Polymorphic Mask and Wavelet Graph Convolutional Network. 2800-2813 - Weixuan Tang, Zhili Zhou, Bin Li, Kim-Kwang Raymond Choo, Jiwu Huang:
Joint Cost Learning and Payload Allocation With Image-Wise Attention for Batch Steganography. 2826-2839 - Mang Ye, Wei Shen, Junwu Zhang, Yao Yang, Bo Du:
SecureReID: Privacy-Preserving Anonymization for Person Re-Identification. 2840-2853 - Adrián Tobar Nicolau, Javier Parra-Arnau, Jordi Forné, Esteve Pallarès:
m-Eligibility With Minimum Counterfeits and Deletions for Privacy Protection in Continuous Data Publishing. 2854-2864 - Rui Zhang, Lei Zhang, Qian Wu, Jianying Zhou:
Secure Channel Establishment Scheme for Task Delivery in Vehicular Cloud Computing. 2865-2880 - Junlin Liu, Xinchen Lyu, Qimei Cui, Xiaofeng Tao:
Similarity-Based Label Inference Attack Against Training and Inference of Split Learning. 2881-2895 - Huy Nguyen, Kien Nguyen Thanh, Sridha Sridharan, Clinton Fookes:
AG-ReID.v2: Bridging Aerial and Ground Views for Person Re-Identification. 2896-2908 - Enas E. Abulibdeh, Leen Younes, Baker Mohammad, Khaled Humood, Hani H. Saleh, Mahmoud Al-Qutayri:
DRAM-Based PUF Utilizing the Variation of Adjacent Cells. 2909-2918 - Fucai Luo, Haiyan Wang, Willy Susilo, Xingfu Yan, Xiaofan Zheng:
Public Trace-and-Revoke Proxy Re-Encryption for Secure Data Sharing in Clouds. 2919-2934 - Runmeng Du, Xuru Li, Daojing He, Kim-Kwang Raymond Choo:
Toward Secure and Verifiable Hybrid Federated Learning. 2935-2950 - He Yang, Wei Xi, Yuhao Shen, Canhui Wu, Jizhong Zhao:
RoseAgg: Robust Defense Against Targeted Collusion Attacks in Federated Learning. 2951-2966 - Haozhe Li, Yilin Liao, Zijian Tian, Zhaoran Liu, Jiaqi Liu, Xinggao Liu:
Bidirectional Stackable Recurrent Generative Adversarial Imputation Network for Specific Emitter Missing Data Imputation. 2967-2980 - Norbert Tihanyi, Tamás Bisztray, Bertalan Borsos, Sebastien Raveau:
Privacy-Preserving Password Cracking: How a Third Party Can Crack Our Password Hash Without Learning the Hash Value or the Cleartext. 2981-2996 - Ying Liang, Wenjie Wu, Haobo Li, Xiaojun Chang, Xiaojiang Chen, Jinye Peng, Pengfei Xu:
DCS-Gait: A Class-Level Domain Adaptation Approach for Cross-Scene and Cross-State Gait Recognition Using Wi-Fi CSI. 2997-3007 - Mingxing Duan, Kailun Jiao, Siyang Yu, Zhibang Yang, Bin Xiao, Kenli Li:
MC-Net: Realistic Sample Generation for Black-Box Attacks. 3008-3022 - Jieli Liu, Jinze Chen, Jiajing Wu, Zhiying Wu, Junyuan Fang, Zibin Zheng:
Fishing for Fraudsters: Uncovering Ethereum Phishing Gangs With Blockchain Data. 3038-3050 - Min Long, Quantao Yao, Le-Bing Zhang, Fei Peng:
Face De-Morphing Based on Diffusion Autoencoders. 3051-3063 - Yuanyuan Qing, Tao Bai, Zhuotao Liu, Pierre Moulin, Bihan Wen:
Detection of Adversarial Attacks via Disentangling Natural Images and Perturbations. 2814-2825 - Zhankai Li, Weiping Wang, Jie Li, Kai Chen, Shigeng Zhang:
UCG: A Universal Cross-Domain Generator for Transferable Adversarial Examples. 3023-3037 - Yun Wen, Gaojie Chen, Sisai Fang, Miaowen Wen, Stefano Tomasin, Marco Di Renzo:
RIS-Assisted UAV Secure Communications With Artificial Noise-Aware Trajectory Design Against Multiple Colluding Curious Users. 3064-3076 - Chuan Sheng, Yu Yao, Lianxiang Zhao, Peng Zeng, Jianming Zhao:
Scanner-Hunter: An Effective ICS Scanning Group Identification System. 3077-3092 - Fangling Jiang, Yunfan Liu, Haolin Si, Jingjing Meng, Qi Li:
Cross-Scenario Unknown-Aware Face Anti-Spoofing With Evidential Semantic Consistency Learning. 3093-3108 - Baojin Huang, Zhongyuan Wang, Jifan Yang, Zhen Han, Chao Liang:
Unlabeled Data Assistant: Improving Mask Robustness for Face Recognition. 3109-3123 - Joakim Tutt, Olga Taran, Roman Chaban, Brian Pulfer, Yury Belousov, Taras Holotyak, Slava Voloshynovskiy:
Authentication of Copy Detection Patterns: A Pattern Reliability Based Approach. 3124-3134 - Shuai Li, Zhemin Yang, Yunteng Yang, Dingyi Liu, Min Yang:
Identifying Cross-User Privacy Leakage in Mobile Mini-Apps at a Large Scale. 3135-3147 - Xin Zhang, Kejiang Chen, Jinyang Ding, Yuqi Yang, Weiming Zhang, Nenghai Yu:
Provably Secure Public-Key Steganography Based on Elliptic Curve Cryptography. 3148-3163 - Shenyi Zhang, Baolin Zheng, Peipei Jiang, Lingchen Zhao, Chao Shen, Qian Wang:
Perception-Driven Imperceptible Adversarial Attack Against Decision-Based Black-Box Models. 3164-3177 - Andi Liu, Yizhong Liu, Qianhong Wu, Boyu Zhao, Dongyu Li, Yuan Lu, Rongxing Lu, Willy Susilo:
CHERUBIM: A Secure and Highly Parallel Cross-Shard Consensus Using Quadruple Pipelined Two-Phase Commit for Sharding Blockchains. 3178-3193 - Mohamed K. M. Fadul, Donald R. Reising, Lakmali P. Weerasena, T. Daniel Loveless, Mina Sartipi, Joshua H. Tyler:
Improving RF-DNA Fingerprinting Performance in an Indoor Multipath Environment Using Semi-Supervised Learning. 3194-3209 - Mengnan Zhao, Lihe Zhang, Wei Wang, Yuqiu Kong, Baocai Yin:
Adversarial Attacks on Scene Graph Generation. 3210-3225 - Daolin Wen, Xiaowu Mu:
Secure Dual Asynchronous Tracking Control for Markov Jump Systems Under Hybrid Cyberattacks. 3226-3236 - Kai Zeng, Kejiang Chen, Jiansong Zhang, Weiming Zhang, Nenghai Yu:
Toward Secure and Robust Steganography for Black-Box Generated Images. 3237-3250 - Tiong-Sik Ng, Jacky Chen Long Chai, Cheng-Yaw Low, Andrew Beng Jin Teoh:
Self-Attentive Contrastive Learning for Conditioned Periocular and Face Biometrics. 3251-3264 - Yulong Yang, Chenhao Lin, Qian Li, Zhengyu Zhao, Haoran Fan, Dawei Zhou, Nannan Wang, Tongliang Liu, Chao Shen:
Quantization Aware Attack: Enhancing Transferable Adversarial Attacks by Model Quantization. 3265-3278 - Peng Xu, Gaojie Chen, Zheng Yang, Yong Li, Stefano Tomasin:
Multiple Access Wiretap Channel With Partial Rate-Limited Feedback. 3279-3294 - Dayong Ye, Tianqing Zhu, Kun Gao, Wanlei Zhou:
Defending Against Label-Only Attacks via Meta-Reinforcement Learning. 3295-3308 - Jia-Si Weng, Shenglong Yao, Yuefeng Du, Junjie Huang, Jian Weng, Cong Wang:
Proof of Unlearning: Definitions and Instantiation. 3309-3323 - Xingyu Chen, Huici Wu, Xiaofeng Tao, Haowei Wang:
Polar Coding for Wiretap Channels With Random States Non-Causally Available at the Encoder. 3324-3338 - Qing Yang, Cheng Wang, Haifeng Yuan, Jipeng Cui, Hu Teng, Xue Chen, Changjun Jiang:
Approaching the Information-Theoretic Limit of Privacy Disclosure With Utility Guarantees. 3339-3352 - Tolun Tosun, Erkay Savas:
Zero-Value Filtering for Accelerating Non-Profiled Side-Channel Attack on Incomplete NTT-Based Implementations of Lattice-Based Cryptography. 3353-3365 - Xiaoyu Ji, Qinhong Jiang, Chaohao Li, Zhuoyang Shi, Wenyuan Xu:
Watch Your Speed: Injecting Malicious Voice Commands via Time-Scale Modification. 3366-3379 - Zhuo Chen, Liehuang Zhu, Peng Jiang, Can Zhang, Feng Gao, Fuchun Guo:
Exploring Unobservable Blockchain-Based Covert Channel for Censorship-Resistant Systems. 3380-3394 - Yury Belousov, Guillaume Quétant, Brian Pulfer, Roman Chaban, Joakim Tutt, Olga Taran, Taras Holotyak, Slava Voloshynovskiy:
A Machine Learning-Based Digital Twin for Anti-Counterfeiting Applications With Copy Detection Patterns. 3395-3408 - Ruiyang Xia, Decheng Liu, Jie Li, Lin Yuan, Nannan Wang, Xinbo Gao:
MMNet: Multi-Collaboration and Multi-Supervision Network for Sequential Deepfake Detection. 3409-3422 - Songlin Hu, Xiaohua Ge, Wei Zhang, Dong Yue:
DoS-Resilient Load Frequency Control of Multi-Area Power Systems: An Attack-Parameter-Dependent Approach. 3423-3434 - Pengyu Qiu, Xuhong Zhang, Shouling Ji, Chong Fu, Xing Yang, Ting Wang:
HashVFL: Defending Against Data Reconstruction Attacks in Vertical Federated Learning. 3435-3450 - Dong Xie, Jinghua Yang, Bin Wu, Weixin Bian, Fulong Chen, Taochun Wang:
An Effectively Applicable to Resource Constrained Devices and Semi-Trusted Servers Authenticated Key Agreement Scheme. 3451-3464 - Kai Li, Jingjing Zheng, Xin Yuan, Wei Ni, Özgür B. Akan, H. Vincent Poor:
Data-Agnostic Model Poisoning Against Federated Learning: A Graph Autoencoder Approach. 3465-3480 - Jiahui Wu, Weizhe Zhang, Fucai Luo:
On the Security of "LSFL: A Lightweight and Secure Federated Learning Scheme for Edge Computing". 3481-3482 - Xingquan Fu, Guanghui Wen, Mengfei Niu, Wei Xing Zheng:
Distributed Secure Filtering Against Eavesdropping Attacks in SINR-Based Sensor Networks. 3483-3494 - Jingzhe Ma, Xiao-Qing Zhang, Shiqi Yu:
An Identity-Preserved Framework for Human Motion Transfer. 3495-3509 - Fenghong Yang, Runqing Jiang, Yan Yan, Jing-Hao Xue, Biao Wang, Hanzi Wang:
Dual-Mode Learning for Multi-Dataset X-Ray Security Image Detection. 3510-3524 - Wei Liang, Siqi Xie, Kuan-Ching Li, Xiong Li, Xiaoyan Kui, Albert Y. Zomaya:
MC-DSC: A Dynamic Secure Resource Configuration Scheme Based on Medical Consortium Blockchain. 3525-3538 - Anton Wahrstätter, Matthew Solomon, Ben DiFrancesco, Vitalik Buterin, Davor Svetinovic:
BaseSAP: Modular Stealth Address Protocol for Programmable Blockchains. 3539-3553 - Simon Mandlík, Tomás Pevný, Václav Smídl, Lukás Bajer:
Malicious Internet Entity Detection Using Local Graph Inference. 3554-3566 - Yulin Zhu, Tomasz P. Michalak, Xiapu Luo, Xiaoge Zhang, Kai Zhou:
Toward Secrecy-Aware Attacks Against Trust Prediction in Signed Social Networks. 3567-3580 - Hao Yang, Shiyu Shen, Zhe Liu, Yunlei Zhao:
cuXCMP: CUDA-Accelerated Private Comparison Based on Homomorphic Encryption. 3581-3592 - Qi Jiang, Guichuan Zhao, Xindi Ma, Meng Li, Youliang Tian, Xinghua Li:
Cross-Modal Learning Based Flexible Bimodal Biometric Authentication With Template Protection. 3593-3607 - Farah Ferdaus, Bashir M. Sabquat Bahar Talukder, Md. Tauhidur Rahman:
Hiding Information for Secure and Covert Data Storage in Commercial ReRAM Chips. 3608-3619 - Huanran Wang, Wu Yang, Dapeng Man, Jiguang Lv, Shuai Han, Jingwen Tan, Tao Liu:
Anchor Link Prediction for Cross-Network Digital Forensics From Local and Global Perspectives. 3620-3635 - Elijah Pelofske:
Analysis of a Programmable Quantum Annealer as a Random Number Generator. 3636-3643 - Zhongyun Hua, Yan Tong, Yifeng Zheng, Yuhong Li, Yushu Zhang:
PPGloVe: Privacy-Preserving GloVe for Training Word Vectors in the Dark. 3644-3658 - Huafeng Kuang, Hong Liu, Xianming Lin, Rongrong Ji:
Defense Against Adversarial Attacks Using Topology Aligning Adversarial Training. 3659-3673 - Derui Zhu, Jinfu Chen, Xuebing Zhou, Weiyi Shang, Ahmed E. Hassan, Jens Grossklags:
Vulnerabilities of Data Protection in Vertical Federated Learning Training and Countermeasures. 3674-3689 - Zhuangzhi Chen, Zhangwei Wang, Dongwei Xu, Jiawei Zhu, Weiguo Shen, Shilian Zheng, Qi Xuan, Xiaoniu Yang:
Learn to Defend: Adversarial Multi-Distillation for Automatic Modulation Recognition Models. 3690-3702 - Xinwei Liu, Kiran B. Raja, Renfang Wang, Hong Qiu, Hucheng Wu, Dechao Sun, Qiguang Zheng, Nian Liu, Xiaoxia Wang, Gehang Huang, Raghavendra Ramachandra, Christoph Busch:
A Latent Fingerprint in the Wild Database. 3703-3718 - Hao-Tian Wu, Yiu-Ming Cheung, Zhihong Tian, Dingcai Liu, Xiangyang Luo, Jiankun Hu:
Lossless Data Hiding in NTRU Cryptosystem by Polynomial Encoding and Modulation. 3719-3732 - Xiaogang Zhu, Siyu Zhang, Chaoran Li, Sheng Wen, Yang Xiang:
Fuzzing Android Native System Libraries via Dynamic Data Dependency Graph. 3733-3744 - Min Wang, Xuefei Yin, Jiankun Hu:
Cancellable Deep Learning Framework for EEG Biometrics. 3745-3757 - Xingjian Zhang, Haochen Gong, Rui Chang, Yajin Zhou:
RECAST: Mitigating Conflict-Based Cache Attacks Through Fine-Grained Dynamic Mapping. 3758-3771 - Wael Issa, Nour Moustafa, Benjamin P. Turnbull, Kim-Kwang Raymond Choo:
RVE-PFL: Robust Variational Encoder-Based Personalized Federated Learning Against Model Inversion Attacks. 3772-3787 - Huikai Shao, Yuchen Zou, Chengcheng Liu, Qiang Guo, Dexing Zhong:
Learning to Generalize Unseen Dataset for Cross-Dataset Palmprint Recognition. 3788-3799 - Junhao Huang, Haosong Zhao, Jipeng Zhang, Wangchen Dai, Lu Zhou, Ray C. C. Cheung, Çetin Kaya Koç, Donglong Chen:
Yet Another Improvement of Plantard Arithmetic for Faster Kyber on Low-End 32-bit IoT Devices. 3800-3813 - Jiahe Tian, Peng Chen, Cai Yu, Xiaomeng Fu, Xi Wang, Jiao Dai, Jizhong Han:
Learning to Discover Forgery Cues for Face Forgery Detection. 3814-3828 - Wenhan Ge, Zeyuan Cui, Junfeng Wang, Binhui Tang, Xiaohui Li:
MetaCluster: A Universal Interpretable Classification Framework for Cybersecurity. 3829-3843 - Changsong Jiang, Chunxiang Xu, Yunxia Han, Zhao Zhang, Kefei Chen:
Two-Factor Authenticated Key Exchange From Biometrics With Low Entropy Rates. 3844-3856 - Xiao Cai, Kaibo Shi, Yanbin Sun, Jinde Cao, Shiping Wen, Cheng Qiao, Zhihong Tian:
Stability Analysis of Networked Control Systems Under DoS Attacks and Security Controller Design With Mini-Batch Machine Learning Supervision. 3857-3865 - Bowen Ma, Tong Jia, Mingyuan Li, Songsheng Wu, Hao Wang, Dongyue Chen:
Toward Dual-View X-Ray Baggage Inspection: A Large-Scale Benchmark and Adaptive Hierarchical Cross Refinement for Prohibited Item Discovery. 3866-3878 - Sicheng Zhang, Yandie Yang, Ziyao Zhou, Zhi Sun, Yun Lin:
DIBAD: A Disentangled Information Bottleneck Adversarial Defense Method Using Hilbert-Schmidt Independence Criterion for Spectrum Security. 3879-3891 - Fengqun Wang, Jie Cui, Qingyang Zhang, Debiao He, Hong Zhong:
Blockchain-Based Secure Cross-Domain Data Sharing for Edge-Assisted Industrial Internet of Things. 3892-3905 - Mingping Qi, Wei Hu, Yu Tai:
SAE+: One-Round Provably Secure Asymmetric SAE Protocol for Client-Server Model. 3906-3913 - Sree Ranjani Rajendran, Nusrat Farzana Dipu, Shams Tarek, Hadi Mardani Kamali, Farimah Farahmandi, Mark M. Tehranipoor:
Exploring the Abyss? Unveiling Systems-on-Chip Hardware Vulnerabilities Beneath Software. 3914-3926 - Chongyao Xu, Litao Zhang, Pui-In Mak, Rui Paulo Martins, Man-Kay Law:
Fully Symmetrical Obfuscated Interconnection and Weak-PUF-Assisted Challenge Obfuscation Strong PUFs Against Machine-Learning Modeling Attacks. 3927-3942 - Zuomin Qu, Zuping Xi, Wei Lu, Xiangyang Luo, Qian Wang, Bin Li:
DF-RAP: A Robust Adversarial Perturbation for Defending Against Deepfakes in Real-World Social Network Scenarios. 3943-3957 - Rongke Liu, Dong Wang, Yizhi Ren, Zhen Wang, Kaitian Guo, Qianqian Qin, Xiaolei Liu:
Unstoppable Attack: Label-Only Model Inversion Via Conditional Diffusion Model. 3958-3973 - Hongyan Fei, Chuanwei Huang, Song Wu, Zheng Wang, Zexi Jia, Jufu Feng:
Fingerprint Presentation Attack Detection by Region Decomposition. 3974-3985 - Tongshuai Wu, Liwei Chen, Gewangzi Du, Dan Meng, Gang Shi:
UltraVCS: Ultra-Fine-Grained Variable-Based Code Slicing for Automated Vulnerability Detection. 3986-4000 - Da Ke, Xiang Wang, Zhitao Huang:
Frequency-Selective Adversarial Attack Against Deep Learning-Based Wireless Signal Classifiers. 4001-4011 - Xiangming Wang, Yang Liu, Kexin Jiao, Pengfei Liu, Xiapu Luo, Ting Liu:
Intrusion Device Detection in Fieldbus Networks Based on Channel-State Group Fingerprint. 4012-4027 - Mengxue Yang, Huaqun Wang, Debiao He:
Puncturable Attribute-Based Encryption From Lattices for Classified Document Sharing. 4028-4042 - Baleegh Ahmad, Shailja Thakur, Benjamin Tan, Ramesh Karri, Hammond Pearce:
On Hardware Security Bug Code Fixes by Prompting Large Language Models. 4043-4057 - Tianyi Zheng, Bo Li, Shuang Wu, Ben Wan, Guodong Mu, Shice Liu, Shouhong Ding, Jia Wang:
MFAE: Masked Frequency Autoencoders for Domain Generalization Face Anti-Spoofing. 4058-4069 - Xinchen Lyu, Xinyun Hou, Chenshan Ren, Xin Ge, Penglin Yang, Qimei Cui, Xiaofeng Tao:
Secure and Efficient Federated Learning With Provable Performance Guarantees via Stochastic Quantization. 4070-4085 - Samuel N. Eshun, Paolo Palmieri:
A Cryptographic Protocol for Efficient Mutual Location Privacy Through Outsourcing in Indoor Wi-Fi Localization. 4086-4099 - Ce Gao, Kang Zhang, Weiwei Wang, Zhicheng X. Cao, Liaojun Pang, Eryun Liu, Heng Zhao:
Protected Face Templates Generation Based on Multiple Partial Walsh Transformations and Simhash. 4100-4113 - Yichao Tang, Chuntao Wang, Shijun Xiang, Yiu-Ming Cheung:
A Robust Reversible Watermarking Scheme Using Attack-Simulation-Based Adaptive Normalization and Embedding. 4114-4129 - Shuai Zhou, Tianqing Zhu, Dayong Ye, Wanlei Zhou, Wei Zhao:
Inversion-Guided Defense: Detecting Model Stealing Attacks by Output Inverting. 4130-4145 - Fangyuan Sun, Jia Yu, Jiankun Hu:
Privacy-Preserving Approximate Minimum Community Search on Large Networks. 4146-4160 - Xiao Yang, Chengru Zhang, Haiyang Xue, Man Ho Au:
Efficient Verifiably Encrypted ECDSA Schemes From Castagnos-Laguillaumie and Joye-Libert Encryptions. 4161-4173 - Jinling Tang, Haixia Xu, Mingsheng Wang, Tao Tang, Chunying Peng, Huimei Liao:
A Flexible and Scalable Malicious Secure Aggregation Protocol for Federated Learning. 4174-4187 - Jinliang Liu, Yanhui Dong, Lijuan Zha, Xiangpeng Xie, Engang Tian:
Reinforcement Learning-Based Tracking Control for Networked Control Systems With DoS Attacks. 4188-4197 - Feng Lin, Hao Yan, Jin Li, Ziwei Liu, Li Lu, Zhongjie Ba, Kui Ren:
PhaDe: Practical Phantom Spoofing Attack Detection for Autonomous Vehicles. 4199-4214 - Jingwei Jiang, Ding Wang:
QPASE: Quantum-Resistant Password-Authenticated Searchable Encryption for Cloud Storage. 4231-4246 - Tai Yue, Fengwei Zhang, Zhenyu Ning, Pengfei Wang, Xu Zhou, Kai Lu, Lei Zhou:
Armor: Protecting Software Against Hardware Tracing Techniques. 4247-4262 - Rahul Kande, Hammond Pearce, Benjamin Tan, Brendan Dolan-Gavitt, Shailja Thakur, Ramesh Karri, Jeyavijayan Rajendran:
(Security) Assertions by Large Language Models. 4374-4389 - Hatef Otroshi-Shahreza, Vedrana Krivokuca Hahn, Sébastien Marcel:
Vulnerability of State-of-the-Art Face Recognition Models to Template Inversion Attack. 4585-4600 - Dacan Luo, Yitao Qiao, Di Xie, Shifeng Zhang, Wenxiong Kang:
Palm Vein Recognition Under Unconstrained and Weak-Cooperative Conditions. 4601-4614 - Yimin Guo, Yajun Guo, Ping Xiong, Fan Yang, Chengde Zhang:
Deeper Insight Into Why Authentication Schemes in IoT Environments Fail to Achieve the Desired Security. 4615-4627 - Yunming Zhang, Dengpan Ye, Caiyun Xie, Long Tang, Xin Liao, Zi-yi Liu, Chuanxi Chen, Jiacheng Deng:
Dual Defense: Adversarial, Traceable, and Invisible Robust Watermarking Against Face Swapping. 4628-4641 - Yulin Teng, Pinchang Zhang, Xiao Chen, Xiaohong Jiang, Fu Xiao:
PHY-Layer Authentication Exploiting Channel Sparsity in MmWave MIMO UAV-Ground Systems. 4642-4657 - Yanyan Ni, Zhen Wang, Yingjie Fan, Xia Huang, Hao Shen:
Secure Stabilization of Networked Lur'e Systems Suffering From DoS Attacks: A Resilient Memory-Based Event-Trigger Mechanism. 4658-4669 - Florian Merkle, Maximilian Samsinger, Pascal Schöttle, Tomás Pevný:
On the Economics of Adversarial Machine Learning. 4670-4685 - Xiao Li, Qiongxiu Li, Zhanhao Hu, Xiaolin Hu:
On the Privacy Effect of Data Enhancement via the Lens of Memorization. 4686-4699 - Mingyang Song, Zhongyun Hua, Yifeng Zheng, Tao Xiang, Xiaohua Jia:
SimLESS: A Secure Deduplication System Over Similar Data in Cloud Media Sharing. 4700-4715 - Panjian Huang, Saihui Hou, Chunshui Cao, Xu Liu, Xuecai Hu, Yongzhen Huang:
Integral Pose Learning via Appearance Transfer for Gait Recognition. 4716-4727 - Lijun Gao, Wenjun Liu, Kai Liu, Jiehong Wu:
AugSteal: Advancing Model Steal With Data Augmentation in Active Learning Frameworks. 4728-4740 - Daojing He, Xin Lv, Xueqian Xu, Sammy Chan, Kim-Kwang Raymond Choo:
Double-Layer Detection of Internal Threat in Enterprise Systems Based on Deep Learning. 4741-4751 - Jiale Zhang, Chengcheng Zhu, Xiaobing Sun, Chunpeng Ge, Bing Chen, Willy Susilo, Shui Yu:
FLPurifier: Backdoor Defense in Federated Learning via Decoupled Contrastive Training. 4752-4766 - Daniel Gilkarov, Ran Dubin:
Steganalysis of AI Models LSB Attacks. 4767-4779 - Beibei Li, Youtong Chen, Lei Zhang, Licheng Wang, Yanyu Cheng:
HomeSentinel: Intelligent Anti-Fingerprinting for IoT Traffic in Smart Homes. 4780-4793 - Nanqing Xu, Weiwei Feng, Tianzhu Zhang, Yongdong Zhang:
A Unified Optimization Framework for Feature-Based Transferable Attacks. 4794-4808 - Liwang Zhu, Xiaotian Zhou, Jiahe Tian, Wei Li, Zhongzhi Zhang:
Defending Against Malicious Influence Control in Online Leader-Follower Social Networks. 4809-4819 - Rongxuan Peng, Shunquan Tan, Xianbo Mo, Bin Li, Jiwu Huang:
Employing Reinforcement Learning to Construct a Decision-Making Environment for Image Forgery Localization. 4820-4834 - Dailé Osorio Roig, Lázaro Janier González-Soler, Christian Rathgeb, Christoph Busch:
Privacy-Preserving Multi-Biometric Indexing Based on Frequent Binary Patterns. 4835-4850 - Guanghan Duan, Hongwu Lv, Huiqiang Wang, Guangsheng Feng, Xiaoli Li:
Practical Cyber Attack Detection With Continuous Temporal Graph in Dynamic Network System. 4851-4864 - Jordan Vice, Naveed Akhtar, Richard I. Hartley, Ajmal Mian:
BAGM: A Backdoor Attack for Manipulating Text-to-Image Generative Models. 4865-4880 - Hao Peng, Jieshuai Yang, Dandan Zhao, Xiaogang Xu, Yuwen Pu, Jianmin Han, Xing Yang, Ming Zhong, Shouling Ji:
MalGNE: Enhancing the Performance and Efficiency of CFG-Based Malware Detector by Graph Node Embedding in Low Dimension Space. 4881-4896 - Marcelo Luís Francisco Abbade, Welerson Santos Souza, Melissa de Oliveira Santos, Ivan Eduardo Lage Rodrigues, Ivan Aldaya, Luiz H. Bonani, Murilo Araújo Romero:
Discrete Spectral Encryption of Single-Carrier Signals With Pseudo Random Dynamic Keys. 4914-4929 - Lin Yuan, Wu Chen, Xiao Pu, Yan Zhang, Hongbo Li, Yushu Zhang, Xinbo Gao, Touradj Ebrahimi:
PRO-Face C: Privacy-Preserving Recognition of Obfuscated Face via Feature Compensation. 4930-4944 - Beiyuan Liu, Jinjing Jiang, Qian Liu, Jiajia Liu, Sai Xu:
An Intelligent Reflecting Surface-Based Attack Scheme Against Dual-Functional Radar and Communication Systems. 4945-4956 - Shuyu Chang, Zhenqi Shi, Fu Xiao, Haiping Huang, Xingchen Liu, Chaorun Sun:
Privacy-Enhanced Frequent Sequence Mining and Retrieval for Personalized Behavior Prediction. 4957-4969 - Hong Zhu, Yue Zhao, Shengzhi Zhang, Kai Chen:
NeuralSanitizer: Detecting Backdoors in Neural Networks. 4970-4985 - Jiaxiang Wang, Aihua Zheng, Yan Yan, Ran He, Jin Tang:
Attribute-Guided Cross-Modal Interaction and Enhancement for Audio-Visual Matching. 4986-4998 - Zhihuang Liu, Ling Hu, Zhiping Cai, Ximeng Liu, Yanhua Liu:
SeCoSe: Toward Searchable and Communicable Healthcare Service Seeking in Flexible and Secure EHR Sharing. 4999-5014 - Yuepei Li, Kai Xu, Junqing Zhang, Chongyan Gu, Yuan Ding, George Goussetis, Symon K. Podilchak:
PUF-Assisted Radio Frequency Fingerprinting Exploiting Power Amplifier Active Load-Pulling. 5015-5029 - Bichen Kang, Neng Ye, Jianping An:
Optimal Signaling for Covert Communications Under Peak Power Constraint. 5030-5045 - Yushu Zhang, Junhao Ji, Wenying Wen, Youwen Zhu, Zhihua Xia, Jian Weng:
Understanding Visual Privacy Protection: A Generalized Framework With an Instance on Facial Privacy. 5046-5059 - Ge Gao, Yuan Zhang, Yaqing Song, Shiyu Li:
PrivSSO: Practical Single-Sign-On Authentication Against Subscription/Access Pattern Leakage. 5075-5089 - Guyue Li, Paul Staat, Haoyu Li, Markus Heinrichs, Christian T. Zenger, Rainer Kronberger, Harald Elders-Boll, Christof Paar, Aiqun Hu:
RIS-Jamming: Breaking Key Consistency in Channel Reciprocity-Based Key Generation. 5090-5105 - Jiucui Lu, Jiaran Zhou, Junyu Dong, Bin Li, Siwei Lyu, Yuezun Li:
ForensicsForest Family: A Series of Multi-Scale Hierarchical Cascade Forests for Detecting GAN-Generated Faces. 5106-5119 - Yi Zhu, Mohamed Imoussaïne-Aïkous, Carolyn Côté-Lussier, Tiago H. Falk:
On the Impact of Voice Anonymization on Speech Diagnostic Applications: A Case Study on COVID-19 Detection. 5151-5165 - Zhirui Zeng, Tao Xiang, Shangwei Guo, Jialing He, Qiao Zhang, Guowen Xu, Tianwei Zhang:
Contrast-Then-Approximate: Analyzing Keyword Leakage of Generative Language Models. 5166-5180 - Zheng Xing, Chan-Tong Lam, Xiaochen Yuan, Sio Kei Im, Penousal Machado:
MMQW: Multi-Modal Quantum Watermarking Scheme. 5181-5195 - Peng Jiang, Qi Liu, Liehuang Zhu:
Purified Authorization Service With Encrypted Message Moderation. 5196-5206
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.