Search dblp for Publications

export results for "toc:db/journals/tifs/tifs19.bht:"

 download as .bib file

@article{DBLP:journals/tifs/AbbadeSSRABR24,
  author       = {Marcelo Lu{\'{\i}}s Francisco Abbade and
                  Welerson Santos Souza and
                  Melissa de Oliveira Santos and
                  Ivan Eduardo Lage Rodrigues and
                  Ivan Aldaya and
                  Luiz H. Bonani and
                  Murilo Ara{\'{u}}jo Romero},
  title        = {Discrete Spectral Encryption of Single-Carrier Signals With Pseudo
                  Random Dynamic Keys},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {19},
  pages        = {4914--4929},
  year         = {2024},
  url          = {https://doi.org/10.1109/TIFS.2024.3390995},
  doi          = {10.1109/TIFS.2024.3390995},
  timestamp    = {Fri, 17 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/AbbadeSSRABR24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/AbdolinezhadZS24,
  author       = {Saeed Abdolinezhad and
                  Lukas Zimmermann and
                  Axel Sikora},
  title        = {Output Positioning to Derive Maximum Entropy From Physical Unclonable
                  Functions},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {19},
  pages        = {359--371},
  year         = {2024},
  url          = {https://doi.org/10.1109/TIFS.2023.3320608},
  doi          = {10.1109/TIFS.2023.3320608},
  timestamp    = {Sun, 10 Dec 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tifs/AbdolinezhadZS24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/AbulibdehYMHSA24,
  author       = {Enas E. Abulibdeh and
                  Leen Younes and
                  Baker Mohammad and
                  Khaled Humood and
                  Hani H. Saleh and
                  Mahmoud Al{-}Qutayri},
  title        = {DRAM-Based {PUF} Utilizing the Variation of Adjacent Cells},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {19},
  pages        = {2909--2918},
  year         = {2024},
  url          = {https://doi.org/10.1109/TIFS.2024.3354115},
  doi          = {10.1109/TIFS.2024.3354115},
  timestamp    = {Thu, 29 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tifs/AbulibdehYMHSA24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/AhmadTTKP24,
  author       = {Baleegh Ahmad and
                  Shailja Thakur and
                  Benjamin Tan and
                  Ramesh Karri and
                  Hammond Pearce},
  title        = {On Hardware Security Bug Code Fixes by Prompting Large Language Models},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {19},
  pages        = {4043--4057},
  year         = {2024},
  url          = {https://doi.org/10.1109/TIFS.2024.3374558},
  doi          = {10.1109/TIFS.2024.3374558},
  timestamp    = {Fri, 17 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/AhmadTTKP24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/AliMA24,
  author       = {Ziad Tariq Muhammad Ali and
                  Ameer Mohammed and
                  Imtiaz Ahmad},
  title        = {Vulnerability of Deep Forest to Adversarial Attacks},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {19},
  pages        = {5464--5475},
  year         = {2024},
  url          = {https://doi.org/10.1109/TIFS.2024.3402309},
  doi          = {10.1109/TIFS.2024.3402309},
  timestamp    = {Fri, 31 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/AliMA24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/AlyIYM24,
  author       = {Ahmed Aly and
                  Shahrear Iqbal and
                  Amr M. Youssef and
                  Essam Mansour},
  title        = {{MEGR-APT:} {A} Memory-Efficient {APT} Hunting System Based on Attack
                  Representation Learning},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {19},
  pages        = {5257--5271},
  year         = {2024},
  url          = {https://doi.org/10.1109/TIFS.2024.3396390},
  doi          = {10.1109/TIFS.2024.3396390},
  timestamp    = {Fri, 31 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/AlyIYM24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/AmihoodC24,
  author       = {Barak Amihood and
                  Asaf Cohen},
  title        = {Covertly Controlling a Linear System},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {19},
  pages        = {2651--2663},
  year         = {2024},
  url          = {https://doi.org/10.1109/TIFS.2023.3342637},
  doi          = {10.1109/TIFS.2023.3342637},
  timestamp    = {Thu, 29 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tifs/AmihoodC24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/ArdizzonCTL24,
  author       = {Francesco Ardizzon and
                  Laura Crosara and
                  Stefano Tomasin and
                  Nicola Laurenti},
  title        = {On Mixing Authenticated and Non-Authenticated Signals Against {GNSS}
                  Spoofing},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {19},
  pages        = {4480--4493},
  year         = {2024},
  url          = {https://doi.org/10.1109/TIFS.2024.3381473},
  doi          = {10.1109/TIFS.2024.3381473},
  timestamp    = {Fri, 17 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/ArdizzonCTL24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/AzarKFT24,
  author       = {Kimia Zamiri Azar and
                  Hadi Mardani Kamali and
                  Farimah Farahmandi and
                  Mark M. Tehranipoor},
  title        = {Improving Bounded Model Checkers Scalability for Circuit De-Obfuscation:
                  An Exploration},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {19},
  pages        = {2771--2785},
  year         = {2024},
  url          = {https://doi.org/10.1109/TIFS.2024.3357286},
  doi          = {10.1109/TIFS.2024.3357286},
  timestamp    = {Thu, 29 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tifs/AzarKFT24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/BazziC24,
  author       = {Ahmad Bazzi and
                  Marwa Chafii},
  title        = {Secure Full Duplex Integrated Sensing and Communications},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {19},
  pages        = {2082--2097},
  year         = {2024},
  url          = {https://doi.org/10.1109/TIFS.2023.3346696},
  doi          = {10.1109/TIFS.2023.3346696},
  timestamp    = {Tue, 07 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/BazziC24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/BeigizadSZR24,
  author       = {Ali Asghar Beigizad and
                  Hadi Soleimany and
                  Sara Zarei and
                  Hamed Ramzanipour},
  title        = {Linked Fault Analysis},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {19},
  pages        = {632--645},
  year         = {2024},
  url          = {https://doi.org/10.1109/TIFS.2023.3327658},
  doi          = {10.1109/TIFS.2023.3327658},
  timestamp    = {Sun, 10 Dec 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tifs/BeigizadSZR24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/BelousovQPCTTHV24,
  author       = {Yury Belousov and
                  Guillaume Qu{\'{e}}tant and
                  Brian Pulfer and
                  Roman Chaban and
                  Joakim Tutt and
                  Olga Taran and
                  Taras Holotyak and
                  Slava Voloshynovskiy},
  title        = {A Machine Learning-Based Digital Twin for Anti-Counterfeiting Applications
                  With Copy Detection Patterns},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {19},
  pages        = {3395--3408},
  year         = {2024},
  url          = {https://doi.org/10.1109/TIFS.2024.3361798},
  doi          = {10.1109/TIFS.2024.3361798},
  timestamp    = {Sat, 16 Mar 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tifs/BelousovQPCTTHV24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/BiLHNWW24,
  author       = {Siguo Bi and
                  Kai Li and
                  Shuyan Hu and
                  Wei Ni and
                  Cong Wang and
                  Xin Wang},
  title        = {Detection and Mitigation of Position Spoofing Attacks on Cooperative
                  {UAV} Swarm Formations},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {19},
  pages        = {1883--1895},
  year         = {2024},
  url          = {https://doi.org/10.1109/TIFS.2023.3341398},
  doi          = {10.1109/TIFS.2023.3341398},
  timestamp    = {Sat, 13 Jan 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tifs/BiLHNWW24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/BitarEWX24,
  author       = {Rawad Bitar and
                  Maximilian Egger and
                  Antonia Wachter{-}Zeh and
                  Marvin Xhemrishi},
  title        = {Sparsity and Privacy in Secret Sharing: {A} Fundamental Trade-Off},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {19},
  pages        = {5136--5150},
  year         = {2024},
  url          = {https://doi.org/10.1109/TIFS.2024.3394256},
  doi          = {10.1109/TIFS.2024.3394256},
  timestamp    = {Fri, 17 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/BitarEWX24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/BriguglioYTM24,
  author       = {William Briguglio and
                  Waleed A. Yousef and
                  Issa Traor{\'{e}} and
                  Mohammad Mamun},
  title        = {Federated Supervised Principal Component Analysis},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {19},
  pages        = {646--660},
  year         = {2024},
  url          = {https://doi.org/10.1109/TIFS.2023.3326981},
  doi          = {10.1109/TIFS.2023.3326981},
  timestamp    = {Sun, 10 Dec 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tifs/BriguglioYTM24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/ButoraB24,
  author       = {Jan Butora and
                  Patrick Bas},
  title        = {Size-Independent Reliable {CNN} for {RJCA} Steganalysis},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {19},
  pages        = {4420--4431},
  year         = {2024},
  url          = {https://doi.org/10.1109/TIFS.2024.3379849},
  doi          = {10.1109/TIFS.2024.3379849},
  timestamp    = {Fri, 17 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/ButoraB24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/CaiSSCWQT24,
  author       = {Xiao Cai and
                  Kaibo Shi and
                  Yanbin Sun and
                  Jinde Cao and
                  Shiping Wen and
                  Cheng Qiao and
                  Zhihong Tian},
  title        = {Stability Analysis of Networked Control Systems Under DoS Attacks
                  and Security Controller Design With Mini-Batch Machine Learning Supervision},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {19},
  pages        = {3857--3865},
  year         = {2024},
  url          = {https://doi.org/10.1109/TIFS.2023.3347889},
  doi          = {10.1109/TIFS.2023.3347889},
  timestamp    = {Fri, 17 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/CaiSSCWQT24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/CaoYNJLLZ24,
  author       = {Xuelian Cao and
                  Zheng Yang and
                  Jianting Ning and
                  Chenglu Jin and
                  Rongxing Lu and
                  Zhiming Liu and
                  Jianying Zhou},
  title        = {Dynamic Group Time-Based One-Time Passwords},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {19},
  pages        = {4897--4913},
  year         = {2024},
  url          = {https://doi.org/10.1109/TIFS.2024.3386350},
  doi          = {10.1109/TIFS.2024.3386350},
  timestamp    = {Fri, 17 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/CaoYNJLLZ24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/CasulaOMGMS24,
  author       = {Roberto Casula and
                  Giulia Orr{\`{u}} and
                  Stefano Marrone and
                  Umberto Gagliardini and
                  Gian Luca Marcialis and
                  Carlo Sansone},
  title        = {Realistic Fingerprint Presentation Attacks Based on an Adversarial
                  Approach},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {19},
  pages        = {863--877},
  year         = {2024},
  url          = {https://doi.org/10.1109/TIFS.2023.3327663},
  doi          = {10.1109/TIFS.2023.3327663},
  timestamp    = {Fri, 08 Mar 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tifs/CasulaOMGMS24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/CeldranSASBPS24,
  author       = {Alberto Huertas Celdr{\'{a}}n and
                  Pedro Miguel S{\'{a}}nchez S{\'{a}}nchez and
                  Jan von der Assen and
                  Timo Schenk and
                  G{\'{e}}r{\^{o}}me Bovet and
                  Gregorio Mart{\'{\i}}nez P{\'{e}}rez and
                  Burkhard Stiller},
  title        = {{RL} and Fingerprinting to Select Moving Target Defense Mechanisms
                  for Zero-Day Attacks in IoT},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {19},
  pages        = {5520--5529},
  year         = {2024},
  url          = {https://doi.org/10.1109/TIFS.2024.3402055},
  doi          = {10.1109/TIFS.2024.3402055},
  timestamp    = {Fri, 31 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/CeldranSASBPS24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/ChangSXHLS24,
  author       = {Shuyu Chang and
                  Zhenqi Shi and
                  Fu Xiao and
                  Haiping Huang and
                  Xingchen Liu and
                  Chaorun Sun},
  title        = {Privacy-Enhanced Frequent Sequence Mining and Retrieval for Personalized
                  Behavior Prediction},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {19},
  pages        = {4957--4969},
  year         = {2024},
  url          = {https://doi.org/10.1109/TIFS.2024.3391928},
  doi          = {10.1109/TIFS.2024.3391928},
  timestamp    = {Fri, 17 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/ChangSXHLS24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/ChatterjeePHRM24,
  author       = {Durba Chatterjee and
                  Kuheli Pratihar and
                  Aritra Hazra and
                  Ulrich R{\"{u}}hrmair and
                  Debdeep Mukhopadhyay},
  title        = {Systematically Quantifying Cryptanalytic Nonlinearities in Strong
                  PUFs},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {19},
  pages        = {1126--1141},
  year         = {2024},
  url          = {https://doi.org/10.1109/TIFS.2023.3329438},
  doi          = {10.1109/TIFS.2023.3329438},
  timestamp    = {Sun, 31 Dec 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tifs/ChatterjeePHRM24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/ChenC24,
  author       = {Niusen Chen and
                  Bo Chen},
  title        = {HiPDS: {A} Storage Hardware-Independent Plausibly Deniable Storage
                  System},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {19},
  pages        = {1483--1495},
  year         = {2024},
  url          = {https://doi.org/10.1109/TIFS.2023.3338528},
  doi          = {10.1109/TIFS.2023.3338528},
  timestamp    = {Tue, 30 Apr 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/ChenC24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/ChenCXZYS24,
  author       = {Jiefu Chen and
                  Tong Chen and
                  Xing Xu and
                  Jingran Zhang and
                  Yang Yang and
                  Heng Tao Shen},
  title        = {Coreset Learning-Based Sparse Black-Box Adversarial Attack for Video
                  Recognition},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {19},
  pages        = {1547--1560},
  year         = {2024},
  url          = {https://doi.org/10.1109/TIFS.2023.3333556},
  doi          = {10.1109/TIFS.2023.3333556},
  timestamp    = {Sat, 13 Jan 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tifs/ChenCXZYS24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/ChenGLAW24,
  author       = {Jian Chen and
                  Yuan Gao and
                  Gaoyang Liu and
                  Ahmed M. Abdelmoniem and
                  Chen Wang},
  title        = {Manipulating Pre-Trained Encoder for Targeted Poisoning Attacks in
                  Contrastive Learning},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {19},
  pages        = {2412--2424},
  year         = {2024},
  url          = {https://doi.org/10.1109/TIFS.2024.3350389},
  doi          = {10.1109/TIFS.2024.3350389},
  timestamp    = {Fri, 26 Jan 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tifs/ChenGLAW24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/ChenLCZH24,
  author       = {Changsheng Chen and
                  Bokang Li and
                  Rizhao Cai and
                  Jishen Zeng and
                  Jiwu Huang},
  title        = {Distortion Model-Based Spectral Augmentation for Generalized Recaptured
                  Document Detection},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {19},
  pages        = {1283--1298},
  year         = {2024},
  url          = {https://doi.org/10.1109/TIFS.2023.3333548},
  doi          = {10.1109/TIFS.2023.3333548},
  timestamp    = {Sun, 31 Dec 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tifs/ChenLCZH24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/ChenLPLCJ24,
  author       = {Yuanchao Chen and
                  Yuwei Li and
                  Zulie Pan and
                  Yuliang Lu and
                  Juxing Chen and
                  Shouling Ji},
  title        = {URadar: Discovering Unrestricted File Upload Vulnerabilities via Adaptive
                  Dynamic Testing},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {19},
  pages        = {1251--1266},
  year         = {2024},
  url          = {https://doi.org/10.1109/TIFS.2023.3335885},
  doi          = {10.1109/TIFS.2023.3335885},
  timestamp    = {Sun, 31 Dec 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tifs/ChenLPLCJ24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/ChenLYBLR24,
  author       = {Meng Chen and
                  Li Lu and
                  Jiadi Yu and
                  Zhongjie Ba and
                  Feng Lin and
                  Kui Ren},
  title        = {AdvReverb: Rethinking the Stealthiness of Audio Adversarial Examples
                  to Human Perception},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {19},
  pages        = {1948--1962},
  year         = {2024},
  url          = {https://doi.org/10.1109/TIFS.2023.3345639},
  doi          = {10.1109/TIFS.2023.3345639},
  timestamp    = {Fri, 26 Jan 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tifs/ChenLYBLR24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/ChenWTW24,
  author       = {Xingyu Chen and
                  Huici Wu and
                  Xiaofeng Tao and
                  Haowei Wang},
  title        = {Polar Coding for Wiretap Channels With Random States Non-Causally
                  Available at the Encoder},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {19},
  pages        = {3324--3338},
  year         = {2024},
  url          = {https://doi.org/10.1109/TIFS.2024.3358992},
  doi          = {10.1109/TIFS.2024.3358992},
  timestamp    = {Sat, 16 Mar 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tifs/ChenWTW24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/ChenWXZSZXY24,
  author       = {Zhuangzhi Chen and
                  Zhangwei Wang and
                  Dongwei Xu and
                  Jiawei Zhu and
                  Weiguo Shen and
                  Shilian Zheng and
                  Qi Xuan and
                  Xiaoniu Yang},
  title        = {Learn to Defend: Adversarial Multi-Distillation for Automatic Modulation
                  Recognition Models},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {19},
  pages        = {3690--3702},
  year         = {2024},
  url          = {https://doi.org/10.1109/TIFS.2024.3361172},
  doi          = {10.1109/TIFS.2024.3361172},
  timestamp    = {Fri, 17 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/ChenWXZSZXY24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/ChenYFLD24,
  author       = {Zekai Chen and
                  Shengxing Yu and
                  Mingyuan Fan and
                  Ximeng Liu and
                  Robert H. Deng},
  title        = {Privacy-Enhancing and Robust Backdoor Defense for Federated Learning
                  on Heterogeneous Data},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {19},
  pages        = {693--707},
  year         = {2024},
  url          = {https://doi.org/10.1109/TIFS.2023.3326983},
  doi          = {10.1109/TIFS.2023.3326983},
  timestamp    = {Sun, 10 Dec 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tifs/ChenYFLD24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/ChenZJZGG24,
  author       = {Zhuo Chen and
                  Liehuang Zhu and
                  Peng Jiang and
                  Can Zhang and
                  Feng Gao and
                  Fuchun Guo},
  title        = {Exploring Unobservable Blockchain-Based Covert Channel for Censorship-Resistant
                  Systems},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {19},
  pages        = {3380--3394},
  year         = {2024},
  url          = {https://doi.org/10.1109/TIFS.2024.3361212},
  doi          = {10.1109/TIFS.2024.3361212},
  timestamp    = {Thu, 29 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tifs/ChenZJZGG24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/ChenZLSC24,
  author       = {Chen Chen and
                  Junqing Zhang and
                  Tianyu Lu and
                  Magnus Sandell and
                  Liquan Chen},
  title        = {Secret Key Generation for IRS-Assisted Multi-Antenna Systems: {A}
                  Machine Learning-Based Approach},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {19},
  pages        = {1086--1098},
  year         = {2024},
  url          = {https://doi.org/10.1109/TIFS.2023.3331588},
  doi          = {10.1109/TIFS.2023.3331588},
  timestamp    = {Sun, 31 Dec 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tifs/ChenZLSC24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/ChengM24,
  author       = {Leixiao Cheng and
                  Fei Meng},
  title        = {Server-Aided Public Key Authenticated Searchable Encryption With Constant
                  Ciphertext and Constant Trapdoor},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {19},
  pages        = {1388--1400},
  year         = {2024},
  url          = {https://doi.org/10.1109/TIFS.2023.3336160},
  doi          = {10.1109/TIFS.2023.3336160},
  timestamp    = {Sat, 13 Jan 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tifs/ChengM24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/CohenCG24,
  author       = {Alejandro Cohen and
                  Asaf Cohen and
                  Omer Gurewitz},
  title        = {Secure Adaptive Group Testing},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {19},
  pages        = {2786--2799},
  year         = {2024},
  url          = {https://doi.org/10.1109/TIFS.2024.3354188},
  doi          = {10.1109/TIFS.2024.3354188},
  timestamp    = {Thu, 29 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tifs/CohenCG24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/ColtucC24,
  author       = {Dinu Coltuc and
                  Henri George Coanda},
  title        = {Reversible Contrast Enhancement by Histogram Specification and Very
                  Low Distortion Data Hiding},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {19},
  pages        = {529--539},
  year         = {2024},
  url          = {https://doi.org/10.1109/TIFS.2023.3326662},
  doi          = {10.1109/TIFS.2023.3326662},
  timestamp    = {Sun, 10 Dec 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tifs/ColtucC24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/CrosaraATL24,
  author       = {Laura Crosara and
                  Francesco Ardizzon and
                  Stefano Tomasin and
                  Nicola Laurenti},
  title        = {Worst-Case Spoofing Attack and Robust Countermeasure in Satellite
                  Navigation Systems},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {19},
  pages        = {2039--2050},
  year         = {2024},
  url          = {https://doi.org/10.1109/TIFS.2023.3340061},
  doi          = {10.1109/TIFS.2023.3340061},
  timestamp    = {Fri, 08 Mar 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tifs/CrosaraATL24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/CuiMYZZJ24,
  author       = {Ting Cui and
                  Yiming Mao and
                  Yang Yang and
                  Yi Zhang and
                  Jiyan Zhang and
                  Chenhui Jin},
  title        = {Congruent Differential Cluster for Binary {SPN} Ciphers},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {19},
  pages        = {2385--2397},
  year         = {2024},
  url          = {https://doi.org/10.1109/TIFS.2024.3350374},
  doi          = {10.1109/TIFS.2024.3350374},
  timestamp    = {Fri, 08 Mar 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tifs/CuiMYZZJ24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/CuiZP24,
  author       = {Zhenyu Cui and
                  Jiahuan Zhou and
                  Yuxin Peng},
  title        = {{DMA:} Dual Modality-Aware Alignment for Visible-Infrared Person Re-Identification},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {19},
  pages        = {2696--2708},
  year         = {2024},
  url          = {https://doi.org/10.1109/TIFS.2024.3352408},
  doi          = {10.1109/TIFS.2024.3352408},
  timestamp    = {Thu, 29 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tifs/CuiZP24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/DaiLZCXZJ24,
  author       = {Weiqi Dai and
                  Jinkai Liu and
                  Yang Zhou and
                  Kim{-}Kwang Raymond Choo and
                  Xia Xie and
                  Deqing Zou and
                  Hai Jin},
  title        = {{PRBFPT:} {A} Practical Redactable Blockchain Framework With a Public
                  Trapdoor},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {19},
  pages        = {2425--2437},
  year         = {2024},
  url          = {https://doi.org/10.1109/TIFS.2024.3349855},
  doi          = {10.1109/TIFS.2024.3349855},
  timestamp    = {Fri, 08 Mar 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tifs/DaiLZCXZJ24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/DanieliGAL24,
  author       = {Erez Danieli and
                  Menachem Goldzweig and
                  Moshe Avital and
                  Itamar Levi},
  title        = {Revealing the Secrets of Radio Embedded Systems: Extraction of Raw
                  Information via {RF}},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {19},
  pages        = {2066--2081},
  year         = {2024},
  url          = {https://doi.org/10.1109/TIFS.2023.3345131},
  doi          = {10.1109/TIFS.2023.3345131},
  timestamp    = {Fri, 26 Jan 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tifs/DanieliGAL24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/DassanayakeGB24,
  author       = {Janith Kavindu Dassanayake and
                  Dulaj Gunasinghe and
                  Gayan Amarasuriya Aruma Baduge},
  title        = {Secrecy Rate Analysis and Active Pilot Attack Detection for IRS-Aided
                  Massive {MIMO} Systems},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {19},
  pages        = {2664--2679},
  year         = {2024},
  url          = {https://doi.org/10.1109/TIFS.2023.3318941},
  doi          = {10.1109/TIFS.2023.3318941},
  timestamp    = {Thu, 29 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tifs/DassanayakeGB24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/DengJWWX24,
  author       = {Jiangyi Deng and
                  Xiaoyu Ji and
                  Beibei Wang and
                  Bin Wang and
                  Wenyuan Xu},
  title        = {Dr. Defender: Proactive Detection of Autopilot Drones Based on {CSI}},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {19},
  pages        = {194--206},
  year         = {2024},
  url          = {https://doi.org/10.1109/TIFS.2023.3311964},
  doi          = {10.1109/TIFS.2023.3311964},
  timestamp    = {Sun, 10 Dec 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tifs/DengJWWX24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/DengLXQ24,
  author       = {Zhouyan Deng and
                  Jiajia Liu and
                  Yijie Xun and
                  Junman Qin},
  title        = {IdentifierIDS: {A} Practical Voltage-Based Intrusion Detection System
                  for Real In-Vehicle Networks},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {19},
  pages        = {661--676},
  year         = {2024},
  url          = {https://doi.org/10.1109/TIFS.2023.3327026},
  doi          = {10.1109/TIFS.2023.3327026},
  timestamp    = {Sun, 10 Dec 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tifs/DengLXQ24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/DingSHSC24,
  author       = {Hongwei Ding and
                  Yu Sun and
                  Nana Huang and
                  Zhidong Shen and
                  Xiaohui Cui},
  title        = {{TMG-GAN:} Generative Adversarial Networks-Based Imbalanced Learning
                  for Network Intrusion Detection},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {19},
  pages        = {1156--1167},
  year         = {2024},
  url          = {https://doi.org/10.1109/TIFS.2023.3331240},
  doi          = {10.1109/TIFS.2023.3331240},
  timestamp    = {Sun, 31 Dec 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tifs/DingSHSC24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/DingWQZZQC24,
  author       = {Yi Ding and
                  Zi Wang and
                  Zhen Qin and
                  Erqiang Zhou and
                  Guobin Zhu and
                  Zhiguang Qin and
                  Kim{-}Kwang Raymond Choo},
  title        = {Backdoor Attack on Deep Learning-Based Medical Image Encryption and
                  Decryption Network},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {19},
  pages        = {280--292},
  year         = {2024},
  url          = {https://doi.org/10.1109/TIFS.2023.3322315},
  doi          = {10.1109/TIFS.2023.3322315},
  timestamp    = {Sun, 10 Dec 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tifs/DingWQZZQC24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/DipuATF24,
  author       = {Nusrat Farzana Dipu and
                  Avinash Ayalasomayajula and
                  Mark M. Tehranipoor and
                  Farimah Farahmandi},
  title        = {{AGILE:} Automated Assertion Generation to Detect Information Leakage
                  Vulnerabilities},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {19},
  pages        = {1794--1809},
  year         = {2024},
  url          = {https://doi.org/10.1109/TIFS.2023.3343970},
  doi          = {10.1109/TIFS.2023.3343970},
  timestamp    = {Sat, 13 Jan 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tifs/DipuATF24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/DongXZX24,
  author       = {Yong Dong and
                  Yinfei Xu and
                  Tong Zhang and
                  Yili Xia},
  title        = {Optimality of the Proper Gaussian Signal in Complex {MIMO} Wiretap
                  Channels},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {19},
  pages        = {1401--1414},
  year         = {2024},
  url          = {https://doi.org/10.1109/TIFS.2023.3337719},
  doi          = {10.1109/TIFS.2023.3337719},
  timestamp    = {Sat, 13 Jan 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tifs/DongXZX24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/DouDXWXCJ24,
  author       = {Haochen Dou and
                  Zhenwu Dan and
                  Peng Xu and
                  Wei Wang and
                  Shuning Xu and
                  Tianyang Chen and
                  Hai Jin},
  title        = {Dynamic Searchable Symmetric Encryption With Strong Security and Robustness},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {19},
  pages        = {2370--2384},
  year         = {2024},
  url          = {https://doi.org/10.1109/TIFS.2024.3350330},
  doi          = {10.1109/TIFS.2024.3350330},
  timestamp    = {Fri, 08 Mar 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tifs/DouDXWXCJ24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/DuCSZH24,
  author       = {Hanbiao Du and
                  Zheng Che and
                  Meng Shen and
                  Liehuang Zhu and
                  Jiankun Hu},
  title        = {Breaking the Anonymity of Ethereum Mixing Services Using Graph Feature
                  Learning},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {19},
  pages        = {616--631},
  year         = {2024},
  url          = {https://doi.org/10.1109/TIFS.2023.3326984},
  doi          = {10.1109/TIFS.2023.3326984},
  timestamp    = {Sun, 10 Dec 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tifs/DuCSZH24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/DuLHC24,
  author       = {Runmeng Du and
                  Xuru Li and
                  Daojing He and
                  Kim{-}Kwang Raymond Choo},
  title        = {Toward Secure and Verifiable Hybrid Federated Learning},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {19},
  pages        = {2935--2950},
  year         = {2024},
  url          = {https://doi.org/10.1109/TIFS.2024.3357288},
  doi          = {10.1109/TIFS.2024.3357288},
  timestamp    = {Thu, 29 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tifs/DuLHC24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/DuLZDS24,
  author       = {Yunhao Du and
                  Cheng Lei and
                  Zhicheng Zhao and
                  Yuan Dong and
                  Fei Su},
  title        = {Video-Based Visible-Infrared Person Re-Identification With Auxiliary
                  Samples},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {19},
  pages        = {1313--1325},
  year         = {2024},
  url          = {https://doi.org/10.1109/TIFS.2023.3337972},
  doi          = {10.1109/TIFS.2023.3337972},
  timestamp    = {Sun, 31 Dec 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tifs/DuLZDS24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/DuanJYYXL24,
  author       = {Mingxing Duan and
                  Kailun Jiao and
                  Siyang Yu and
                  Zhibang Yang and
                  Bin Xiao and
                  Kenli Li},
  title        = {MC-Net: Realistic Sample Generation for Black-Box Attacks},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {19},
  pages        = {3008--3022},
  year         = {2024},
  url          = {https://doi.org/10.1109/TIFS.2024.3356812},
  doi          = {10.1109/TIFS.2024.3356812},
  timestamp    = {Thu, 29 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tifs/DuanJYYXL24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/DuanLWFL24,
  author       = {Guanghan Duan and
                  Hongwu Lv and
                  Huiqiang Wang and
                  Guangsheng Feng and
                  Xiaoli Li},
  title        = {Practical Cyber Attack Detection With Continuous Temporal Graph in
                  Dynamic Network System},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {19},
  pages        = {4851--4864},
  year         = {2024},
  url          = {https://doi.org/10.1109/TIFS.2024.3385321},
  doi          = {10.1109/TIFS.2024.3385321},
  timestamp    = {Fri, 17 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/DuanLWFL24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/EshunP24,
  author       = {Samuel N. Eshun and
                  Paolo Palmieri},
  title        = {A Cryptographic Protocol for Efficient Mutual Location Privacy Through
                  Outsourcing in Indoor Wi-Fi Localization},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {19},
  pages        = {4086--4099},
  year         = {2024},
  url          = {https://doi.org/10.1109/TIFS.2024.3372805},
  doi          = {10.1109/TIFS.2024.3372805},
  timestamp    = {Fri, 17 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/EshunP24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/EsmaeiliERMS24,
  author       = {Ashkan Esmaeili and
                  Marzieh Edraki and
                  Nazanin Rahnavard and
                  Ajmal Mian and
                  Mubarak Shah},
  title        = {Low-Rank and Sparse Decomposition for Low-Query Decision-Based Adversarial
                  Attacks},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {19},
  pages        = {1561--1575},
  year         = {2024},
  url          = {https://doi.org/10.1109/TIFS.2023.3275737},
  doi          = {10.1109/TIFS.2023.3275737},
  timestamp    = {Sat, 13 Jan 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tifs/EsmaeiliERMS24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/FadulRWLST24,
  author       = {Mohamed K. M. Fadul and
                  Donald R. Reising and
                  Lakmali P. Weerasena and
                  T. Daniel Loveless and
                  Mina Sartipi and
                  Joshua H. Tyler},
  title        = {Improving {RF-DNA} Fingerprinting Performance in an Indoor Multipath
                  Environment Using Semi-Supervised Learning},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {19},
  pages        = {3194--3209},
  year         = {2024},
  url          = {https://doi.org/10.1109/TIFS.2024.3360851},
  doi          = {10.1109/TIFS.2024.3360851},
  timestamp    = {Fri, 08 Mar 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tifs/FadulRWLST24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/FanHSFYL24,
  author       = {Linkun Fan and
                  Fazhi He and
                  Tongzhen Si and
                  Rubin Fan and
                  Chuanlong Ye and
                  Bing Li},
  title        = {{MBA:} Backdoor Attacks Against 3D Mesh Classifier},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {19},
  pages        = {2127--2142},
  year         = {2024},
  url          = {https://doi.org/10.1109/TIFS.2023.3346644},
  doi          = {10.1109/TIFS.2023.3346644},
  timestamp    = {Fri, 26 Jan 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tifs/FanHSFYL24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/FangLWEZZLL24,
  author       = {Hao Fang and
                  Ajian Liu and
                  Jun Wan and
                  Sergio Escalera and
                  Chenxu Zhao and
                  Xu Zhang and
                  Stan Z. Li and
                  Zhen Lei},
  title        = {Surveillance Face Anti-Spoofing},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {19},
  pages        = {1535--1546},
  year         = {2024},
  url          = {https://doi.org/10.1109/TIFS.2023.3337970},
  doi          = {10.1109/TIFS.2023.3337970},
  timestamp    = {Sat, 20 Jan 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tifs/FangLWEZZLL24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/FangS24,
  author       = {Shengbang Fang and
                  Matthew C. Stamm},
  title        = {Attacking Image Splicing Detection and Localization Algorithms Using
                  Synthetic Traces},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {19},
  pages        = {2143--2156},
  year         = {2024},
  url          = {https://doi.org/10.1109/TIFS.2023.3346312},
  doi          = {10.1109/TIFS.2023.3346312},
  timestamp    = {Fri, 26 Jan 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tifs/FangS24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/FeiHWWJF24,
  author       = {Hongyan Fei and
                  Chuanwei Huang and
                  Song Wu and
                  Zheng Wang and
                  Zexi Jia and
                  Jufu Feng},
  title        = {Fingerprint Presentation Attack Detection by Region Decomposition},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {19},
  pages        = {3974--3985},
  year         = {2024},
  url          = {https://doi.org/10.1109/TIFS.2024.3372813},
  doi          = {10.1109/TIFS.2024.3372813},
  timestamp    = {Fri, 17 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/FeiHWWJF24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/FengCM24,
  author       = {Kai Feng and
                  Marco M. Cook and
                  Angelos K. Marnerides},
  title        = {Sizzler: Sequential Fuzzing in Ladder Diagrams for Vulnerability Detection
                  and Discovery in Programmable Logic Controllers},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {19},
  pages        = {1660--1671},
  year         = {2024},
  url          = {https://doi.org/10.1109/TIFS.2023.3340615},
  doi          = {10.1109/TIFS.2023.3340615},
  timestamp    = {Sat, 13 Jan 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tifs/FengCM24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/FengXZWZ24,
  author       = {Weiwei Feng and
                  Nanqing Xu and
                  Tianzhu Zhang and
                  Baoyuan Wu and
                  Yongdong Zhang},
  title        = {Robust and Generalized Physical Adversarial Attacks via Meta-GAN},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {19},
  pages        = {1112--1125},
  year         = {2024},
  url          = {https://doi.org/10.1109/TIFS.2023.3288426},
  doi          = {10.1109/TIFS.2023.3288426},
  timestamp    = {Sun, 31 Dec 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tifs/FengXZWZ24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/FerdausTR24,
  author       = {Farah Ferdaus and
                  Bashir M. Sabquat Bahar Talukder and
                  Md. Tauhidur Rahman},
  title        = {Hiding Information for Secure and Covert Data Storage in Commercial
                  ReRAM Chips},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {19},
  pages        = {3608--3619},
  year         = {2024},
  url          = {https://doi.org/10.1109/TIFS.2024.3364845},
  doi          = {10.1109/TIFS.2024.3364845},
  timestamp    = {Fri, 17 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/FerdausTR24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/FuWNZ24,
  author       = {Xingquan Fu and
                  Guanghui Wen and
                  Mengfei Niu and
                  Wei Xing Zheng},
  title        = {Distributed Secure Filtering Against Eavesdropping Attacks in SINR-Based
                  Sensor Networks},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {19},
  pages        = {3483--3494},
  year         = {2024},
  url          = {https://doi.org/10.1109/TIFS.2024.3361177},
  doi          = {10.1109/TIFS.2024.3361177},
  timestamp    = {Fri, 17 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/FuWNZ24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/Gaeta24,
  author       = {Rossano Gaeta},
  title        = {An Accurate and Efficient Algorithm to Identify Malicious Nodes of
                  a Graph},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {19},
  pages        = {947--958},
  year         = {2024},
  url          = {https://doi.org/10.1109/TIFS.2023.3328211},
  doi          = {10.1109/TIFS.2023.3328211},
  timestamp    = {Sun, 17 Dec 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tifs/Gaeta24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/GaoBWYX24,
  author       = {Kuofeng Gao and
                  Jiawang Bai and
                  Baoyuan Wu and
                  Mengxi Ya and
                  Shu{-}Tao Xia},
  title        = {Imperceptible and Robust Backdoor Attack in 3D Point Cloud},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {19},
  pages        = {1267--1282},
  year         = {2024},
  url          = {https://doi.org/10.1109/TIFS.2023.3333687},
  doi          = {10.1109/TIFS.2023.3333687},
  timestamp    = {Sat, 13 Jan 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tifs/GaoBWYX24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/GaoHSZ24,
  author       = {Rui Gao and
                  Jiangshuai Huang and
                  Xiaojie Su and
                  Ling Zhao},
  title        = {Adaptive Control of Strict-Feedback Nonlinear Systems Under Denial-of-Service:
                  {A} Synthetic Analysis},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {19},
  pages        = {2315--2327},
  year         = {2024},
  url          = {https://doi.org/10.1109/TIFS.2023.3347969},
  doi          = {10.1109/TIFS.2023.3347969},
  timestamp    = {Fri, 26 Jan 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tifs/GaoHSZ24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/GaoLLW24,
  author       = {Lijun Gao and
                  Wenjun Liu and
                  Kai Liu and
                  Jiehong Wu},
  title        = {AugSteal: Advancing Model Steal With Data Augmentation in Active Learning
                  Frameworks},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {19},
  pages        = {4728--4740},
  year         = {2024},
  url          = {https://doi.org/10.1109/TIFS.2024.3384841},
  doi          = {10.1109/TIFS.2024.3384841},
  timestamp    = {Fri, 17 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/GaoLLW24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/GaoZSL24,
  author       = {Ge Gao and
                  Yuan Zhang and
                  Yaqing Song and
                  Shiyu Li},
  title        = {PrivSSO: Practical Single-Sign-On Authentication Against Subscription/Access
                  Pattern Leakage},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {19},
  pages        = {5075--5089},
  year         = {2024},
  url          = {https://doi.org/10.1109/TIFS.2024.3392533},
  doi          = {10.1109/TIFS.2024.3392533},
  timestamp    = {Fri, 17 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/GaoZSL24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/GaoZWCPLZ24,
  author       = {Ce Gao and
                  Kang Zhang and
                  Weiwei Wang and
                  Zhicheng X. Cao and
                  Liaojun Pang and
                  Eryun Liu and
                  Heng Zhao},
  title        = {Protected Face Templates Generation Based on Multiple Partial Walsh
                  Transformations and Simhash},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {19},
  pages        = {4100--4113},
  year         = {2024},
  url          = {https://doi.org/10.1109/TIFS.2024.3369322},
  doi          = {10.1109/TIFS.2024.3369322},
  timestamp    = {Fri, 17 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/GaoZWCPLZ24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/GeCWTL24,
  author       = {Wenhan Ge and
                  Zeyuan Cui and
                  Junfeng Wang and
                  Binhui Tang and
                  Xiaohui Li},
  title        = {MetaCluster: {A} Universal Interpretable Classification Framework
                  for Cybersecurity},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {19},
  pages        = {3829--3843},
  year         = {2024},
  url          = {https://doi.org/10.1109/TIFS.2024.3372808},
  doi          = {10.1109/TIFS.2024.3372808},
  timestamp    = {Fri, 17 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/GeCWTL24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/GeZ24,
  author       = {Yunfei Ge and
                  Quanyan Zhu},
  title        = {{GAZETA:} GAme-Theoretic ZEro-Trust Authentication for Defense Against
                  Lateral Movement in 5G IoT Networks},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {19},
  pages        = {540--554},
  year         = {2024},
  url          = {https://doi.org/10.1109/TIFS.2023.3326975},
  doi          = {10.1109/TIFS.2023.3326975},
  timestamp    = {Fri, 08 Mar 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tifs/GeZ24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/GilkarovD24,
  author       = {Daniel Gilkarov and
                  Ran Dubin},
  title        = {Steganalysis of {AI} Models {LSB} Attacks},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {19},
  pages        = {4767--4779},
  year         = {2024},
  url          = {https://doi.org/10.1109/TIFS.2024.3383770},
  doi          = {10.1109/TIFS.2024.3383770},
  timestamp    = {Fri, 17 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/GilkarovD24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/GongGGGSWC24,
  author       = {Bei Gong and
                  Chong Guo and
                  Chong Guo and
                  Chen Guo and
                  Yao Sun and
                  Muhammad Waqas and
                  Sheng Chen},
  title        = {{SLIM:} {A} Secure and Lightweight Multi-Authority Attribute-Based
                  Signcryption Scheme for IoT},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {19},
  pages        = {1299--1312},
  year         = {2024},
  url          = {https://doi.org/10.1109/TIFS.2023.3331566},
  doi          = {10.1109/TIFS.2023.3331566},
  timestamp    = {Mon, 11 Dec 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tifs/GongGGGSWC24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/GongSZZWBX24,
  author       = {Zirui Gong and
                  Liyue Shen and
                  Yanjun Zhang and
                  Leo Yu Zhang and
                  Jingwei Wang and
                  Guangdong Bai and
                  Yong Xiang},
  title        = {AgrAmplifier: Defending Federated Learning Against Poisoning Attacks
                  Through Local Update Amplification},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {19},
  pages        = {1241--1250},
  year         = {2024},
  url          = {https://doi.org/10.1109/TIFS.2023.3333555},
  doi          = {10.1109/TIFS.2023.3333555},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tifs/GongSZZWBX24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/GongZGQWWZ24,
  author       = {Maoguo Gong and
                  Yuanqiao Zhang and
                  Yuan Gao and
                  A. Kai Qin and
                  Yue Wu and
                  Shanfeng Wang and
                  Yihong Zhang},
  title        = {A Multi-Modal Vertical Federated Learning Framework Based on Homomorphic
                  Encryption},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {19},
  pages        = {1826--1839},
  year         = {2024},
  url          = {https://doi.org/10.1109/TIFS.2023.3340994},
  doi          = {10.1109/TIFS.2023.3340994},
  timestamp    = {Tue, 07 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/GongZGQWWZ24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/GongZZW24,
  author       = {Jiajun Gong and
                  Wuqi Zhang and
                  Charles Zhang and
                  Tao Wang},
  title        = {WFDefProxy: Real World Implementation and Evaluation of Website Fingerprinting
                  Defenses},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {19},
  pages        = {1357--1371},
  year         = {2024},
  url          = {https://doi.org/10.1109/TIFS.2023.3327662},
  doi          = {10.1109/TIFS.2023.3327662},
  timestamp    = {Wed, 10 Apr 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/GongZZW24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/GronowskiPAGB24,
  author       = {Adam Gronowski and
                  William Paul and
                  Fady Alajaji and
                  Bahman Gharesifard and
                  Philippe Burlina},
  title        = {Classification Utility, Fairness, and Compactness via Tunable Information
                  Bottleneck and R{\'{e}}nyi Measures},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {19},
  pages        = {1630--1645},
  year         = {2024},
  url          = {https://doi.org/10.1109/TIFS.2023.3340094},
  doi          = {10.1109/TIFS.2023.3340094},
  timestamp    = {Sat, 13 Jan 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tifs/GronowskiPAGB24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/GrujicV24,
  author       = {Milos Grujic and
                  Ingrid Verbauwhede},
  title        = {Optimizing Linear Correctors: {A} Tight Output Min-Entropy Bound and
                  Selection Technique},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {19},
  pages        = {586--600},
  year         = {2024},
  url          = {https://doi.org/10.1109/TIFS.2023.3326986},
  doi          = {10.1109/TIFS.2023.3326986},
  timestamp    = {Sun, 10 Dec 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tifs/GrujicV24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/GuanWDP24,
  author       = {Weinan Guan and
                  Wei Wang and
                  Jing Dong and
                  Bo Peng},
  title        = {Improving Generalization of Deepfake Detectors by Imposing Gradient
                  Regularization},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {19},
  pages        = {5345--5356},
  year         = {2024},
  url          = {https://doi.org/10.1109/TIFS.2024.3396064},
  doi          = {10.1109/TIFS.2024.3396064},
  timestamp    = {Fri, 17 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/GuanWDP24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/GulK24,
  author       = {{\c{C}}agdas G{\"{u}}l and
                  Orhun Kara},
  title        = {Correction to "A New Construction Method for Keystream Generators"},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {19},
  pages        = {4198},
  year         = {2024},
  url          = {https://doi.org/10.1109/TIFS.2024.3372200},
  doi          = {10.1109/TIFS.2024.3372200},
  timestamp    = {Fri, 17 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/GulK24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/GuoGXYZ24,
  author       = {Yimin Guo and
                  Yajun Guo and
                  Ping Xiong and
                  Fan Yang and
                  Chengde Zhang},
  title        = {Deeper Insight Into Why Authentication Schemes in IoT Environments
                  Fail to Achieve the Desired Security},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {19},
  pages        = {4615--4627},
  year         = {2024},
  url          = {https://doi.org/10.1109/TIFS.2024.3382934},
  doi          = {10.1109/TIFS.2024.3382934},
  timestamp    = {Fri, 17 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/GuoGXYZ24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/GuoJCW24,
  author       = {Liang Guo and
                  Jie Jia and
                  Jian Chen and
                  Xingwei Wang},
  title        = {Secure Communication Optimization in {NOMA} Systems With UAV-Mounted
                  {STAR-RIS}},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {19},
  pages        = {2300--2314},
  year         = {2024},
  url          = {https://doi.org/10.1109/TIFS.2023.3348242},
  doi          = {10.1109/TIFS.2023.3348242},
  timestamp    = {Fri, 26 Jan 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tifs/GuoJCW24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/GuoJWWYK24,
  author       = {Zhiqing Guo and
                  Zhenhong Jia and
                  Liejun Wang and
                  Dewang Wang and
                  Gaobo Yang and
                  Nikola K. Kasabov},
  title        = {Constructing New Backbone Networks via Space-Frequency Interactive
                  Convolution for Deepfake Detection},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {19},
  pages        = {401--413},
  year         = {2024},
  url          = {https://doi.org/10.1109/TIFS.2023.3324739},
  doi          = {10.1109/TIFS.2023.3324739},
  timestamp    = {Sun, 10 Dec 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tifs/GuoJWWYK24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/GuoLLZLHZ24,
  author       = {Zhenyu Guo and
                  Xin Li and
                  Jiamou Liu and
                  Zijian Zhang and
                  Meng Li and
                  Jingjing Hu and
                  Liehuang Zhu},
  title        = {Graph-Based Covert Transaction Detection and Protection in Blockchain},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {19},
  pages        = {2244--2257},
  year         = {2024},
  url          = {https://doi.org/10.1109/TIFS.2023.3347895},
  doi          = {10.1109/TIFS.2023.3347895},
  timestamp    = {Fri, 26 Jan 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tifs/GuoLLZLHZ24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/GuoTB24,
  author       = {Wei Guo and
                  Benedetta Tondi and
                  Mauro Barni},
  title        = {Universal Detection of Backdoor Attacks via Density-Based Clustering
                  and Centroids Analysis},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {19},
  pages        = {970--984},
  year         = {2024},
  url          = {https://doi.org/10.1109/TIFS.2023.3329426},
  doi          = {10.1109/TIFS.2023.3329426},
  timestamp    = {Fri, 08 Mar 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tifs/GuoTB24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/GuoZHWJ24,
  author       = {Yu Guo and
                  Yu Zhao and
                  Saihui Hou and
                  Cong Wang and
                  Xiaohua Jia},
  title        = {Verifying in the Dark: Verifiable Machine Unlearning by Using Invisible
                  Backdoor Triggers},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {19},
  pages        = {708--721},
  year         = {2024},
  url          = {https://doi.org/10.1109/TIFS.2023.3328269},
  doi          = {10.1109/TIFS.2023.3328269},
  timestamp    = {Sun, 10 Dec 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tifs/GuoZHWJ24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/HajraASPM24,
  author       = {Suvadeep Hajra and
                  Manaar Alam and
                  Sayandeep Saha and
                  Stjepan Picek and
                  Debdeep Mukhopadhyay},
  title        = {On the Instability of Softmax Attention-Based Deep Learning Models
                  in Side-Channel Analysis},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {19},
  pages        = {514--528},
  year         = {2024},
  url          = {https://doi.org/10.1109/TIFS.2023.3326667},
  doi          = {10.1109/TIFS.2023.3326667},
  timestamp    = {Sun, 10 Dec 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tifs/HajraASPM24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/HanGMLXBNMM24,
  author       = {Ruidong Han and
                  Huihui Gong and
                  Siqi Ma and
                  Juanru Li and
                  Chang Xu and
                  Elisa Bertino and
                  Surya Nepal and
                  Zhuo Ma and
                  Jianfeng Ma},
  title        = {A Credential Usage Study: Flow-Aware Leakage Detection in Open-Source
                  Projects},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {19},
  pages        = {722--734},
  year         = {2024},
  url          = {https://doi.org/10.1109/TIFS.2023.3326985},
  doi          = {10.1109/TIFS.2023.3326985},
  timestamp    = {Sun, 10 Dec 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tifs/HanGMLXBNMM24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/HanSLH24,
  author       = {Jinguang Han and
                  Willy Susilo and
                  Nan Li and
                  Xinyi Huang},
  title        = {{OLBS:} Oblivious Location-Based Services},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {19},
  pages        = {2231--2243},
  year         = {2024},
  url          = {https://doi.org/10.1109/TIFS.2023.3347874},
  doi          = {10.1109/TIFS.2023.3347874},
  timestamp    = {Fri, 26 Jan 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tifs/HanSLH24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/HaoLDHX24,
  author       = {Xiaohan Hao and
                  Chao Lin and
                  Wenhan Dong and
                  Xinyi Huang and
                  Hui Xiong},
  title        = {Robust and Secure Federated Learning Against Hybrid Attacks: {A} Generic
                  Architecture},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {19},
  pages        = {1576--1588},
  year         = {2024},
  url          = {https://doi.org/10.1109/TIFS.2023.3336521},
  doi          = {10.1109/TIFS.2023.3336521},
  timestamp    = {Sat, 13 Jan 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tifs/HaoLDHX24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/HeCWLWJD24,
  author       = {Shuting He and
                  Weihua Chen and
                  Kai Wang and
                  Hao Luo and
                  Fan Wang and
                  Wei Jiang and
                  Henghui Ding},
  title        = {Region Generation and Assessment Network for Occluded Person Re-Identification},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {19},
  pages        = {120--132},
  year         = {2024},
  url          = {https://doi.org/10.1109/TIFS.2023.3318956},
  doi          = {10.1109/TIFS.2023.3318956},
  timestamp    = {Thu, 29 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tifs/HeCWLWJD24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/HeKYL24,
  author       = {Yuewang He and
                  Xiangui Kang and
                  Qiben Yan and
                  Enping Li},
  title        = {ResNeXt+: Attention Mechanisms Based on ResNeXt for Malware Detection
                  and Classification},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {19},
  pages        = {1142--1155},
  year         = {2024},
  url          = {https://doi.org/10.1109/TIFS.2023.3328431},
  doi          = {10.1109/TIFS.2023.3328431},
  timestamp    = {Sun, 31 Dec 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tifs/HeKYL24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/HeLXCC24,
  author       = {Daojing He and
                  Xin Lv and
                  Xueqian Xu and
                  Sammy Chan and
                  Kim{-}Kwang Raymond Choo},
  title        = {Double-Layer Detection of Internal Threat in Enterprise Systems Based
                  on Deep Learning},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {19},
  pages        = {4741--4751},
  year         = {2024},
  url          = {https://doi.org/10.1109/TIFS.2024.3372771},
  doi          = {10.1109/TIFS.2024.3372771},
  timestamp    = {Fri, 17 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/HeLXCC24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/HeSHDNTHLZ24,
  author       = {Ying He and
                  Zhili Shen and
                  Jingyu Hua and
                  Qixuan Dong and
                  Jiacheng Niu and
                  Wei Tong and
                  Xu Huang and
                  Chen Li and
                  Sheng Zhong},
  title        = {Backdoor Attack Against Split Neural Network-Based Vertical Federated
                  Learning},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {19},
  pages        = {748--763},
  year         = {2024},
  url          = {https://doi.org/10.1109/TIFS.2023.3327853},
  doi          = {10.1109/TIFS.2023.3327853},
  timestamp    = {Sun, 10 Dec 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tifs/HeSHDNTHLZ24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/HeTLLCL24,
  author       = {Junjiang He and
                  Cong Tang and
                  Wenshan Li and
                  Tao Li and
                  Li Chen and
                  Xiaolong Lan},
  title        = {{BR-HIDF:} An Anti-Sparsity and Effective Host Intrusion Detection
                  Framework Based on Multi-Granularity Feature Extraction},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {19},
  pages        = {485--499},
  year         = {2024},
  url          = {https://doi.org/10.1109/TIFS.2023.3324388},
  doi          = {10.1109/TIFS.2023.3324388},
  timestamp    = {Sun, 10 Dec 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tifs/HeTLLCL24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/HongYYL24,
  author       = {Sangwoo Hong and
                  Heecheol Yang and
                  Youngseok Yoon and
                  Jungwoo Lee},
  title        = {Group-Wise Verifiable Coded Computing Under Byzantine Attacks and
                  Stragglers},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {19},
  pages        = {4344--4357},
  year         = {2024},
  url          = {https://doi.org/10.1109/TIFS.2024.3377929},
  doi          = {10.1109/TIFS.2024.3377929},
  timestamp    = {Fri, 17 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/HongYYL24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/HuGZY24,
  author       = {Songlin Hu and
                  Xiaohua Ge and
                  Wei Zhang and
                  Dong Yue},
  title        = {DoS-Resilient Load Frequency Control of Multi-Area Power Systems:
                  An Attack-Parameter-Dependent Approach},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {19},
  pages        = {3423--3434},
  year         = {2024},
  url          = {https://doi.org/10.1109/TIFS.2024.3361159},
  doi          = {10.1109/TIFS.2024.3361159},
  timestamp    = {Sat, 16 Mar 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tifs/HuGZY24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/HuLFW24,
  author       = {Cong Hu and
                  Yuanbo Li and
                  Zhen{-}Hua Feng and
                  Xiaojun Wu},
  title        = {Toward Transferable Attack via Adversarial Diffusion in Face Recognition},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {19},
  pages        = {5506--5519},
  year         = {2024},
  url          = {https://doi.org/10.1109/TIFS.2024.3402167},
  doi          = {10.1109/TIFS.2024.3402167},
  timestamp    = {Fri, 31 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/HuLFW24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/HuLWHZG24,
  author       = {Qingqing Hu and
                  Tianrui Lin and
                  Tianjian Wei and
                  Nuo Huang and
                  Yi{-}Jun Zhu and
                  Chen Gong},
  title        = {Covert Transmission in Water-to-Air Optical Wireless Communication
                  Systems},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {19},
  pages        = {4432--4447},
  year         = {2024},
  url          = {https://doi.org/10.1109/TIFS.2024.3376965},
  doi          = {10.1109/TIFS.2024.3376965},
  timestamp    = {Fri, 17 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/HuLWHZG24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/HuLZZWZD24,
  author       = {Xiaoxue Hu and
                  Geling Liu and
                  Baolin Zheng and
                  Lingchen Zhao and
                  Qian Wang and
                  Yufei Zhang and
                  Minxin Du},
  title        = {FastTextDodger: Decision-Based Adversarial Attack Against Black-Box
                  {NLP} Models With Extremely High Efficiency},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {19},
  pages        = {2398--2411},
  year         = {2024},
  url          = {https://doi.org/10.1109/TIFS.2024.3350376},
  doi          = {10.1109/TIFS.2024.3350376},
  timestamp    = {Fri, 26 Jan 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tifs/HuLZZWZD24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/HuSV24,
  author       = {Fanliang Hu and
                  Jian Shen and
                  Pandi Vijayakumar},
  title        = {Side-Channel Attacks Based on Multi-Loss Regularized Denoising AutoEncoder},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {19},
  pages        = {2051--2065},
  year         = {2024},
  url          = {https://doi.org/10.1109/TIFS.2023.3343947},
  doi          = {10.1109/TIFS.2023.3343947},
  timestamp    = {Fri, 26 Jan 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tifs/HuSV24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/HuaTZLZ24,
  author       = {Zhongyun Hua and
                  Yan Tong and
                  Yifeng Zheng and
                  Yuhong Li and
                  Yushu Zhang},
  title        = {PPGloVe: Privacy-Preserving GloVe for Training Word Vectors in the
                  Dark},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {19},
  pages        = {3644--3658},
  year         = {2024},
  url          = {https://doi.org/10.1109/TIFS.2024.3364080},
  doi          = {10.1109/TIFS.2024.3364080},
  timestamp    = {Fri, 17 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/HuaTZLZ24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/HuangHCLHH24,
  author       = {Panjian Huang and
                  Saihui Hou and
                  Chunshui Cao and
                  Xu Liu and
                  Xuecai Hu and
                  Yongzhen Huang},
  title        = {Integral Pose Learning via Appearance Transfer for Gait Recognition},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {19},
  pages        = {4716--4727},
  year         = {2024},
  url          = {https://doi.org/10.1109/TIFS.2024.3382606},
  doi          = {10.1109/TIFS.2024.3382606},
  timestamp    = {Fri, 17 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/HuangHCLHH24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/HuangHQWG24,
  author       = {Lifeng Huang and
                  Qiong Huang and
                  Peichao Qiu and
                  Shuxin Wei and
                  Chengying Gao},
  title        = {{FASTEN:} Fast Ensemble Learning for Improved Adversarial Robustness},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {19},
  pages        = {2565--2580},
  year         = {2024},
  url          = {https://doi.org/10.1109/TIFS.2023.3336527},
  doi          = {10.1109/TIFS.2023.3336527},
  timestamp    = {Thu, 29 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tifs/HuangHQWG24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/HuangLLTH24,
  author       = {Dongxia Huang and
                  Weiqi Luo and
                  Minglin Liu and
                  Weixuan Tang and
                  Jiwu Huang},
  title        = {Steganography Embedding Cost Learning With Generative Multi-Adversarial
                  Network},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {19},
  pages        = {15--29},
  year         = {2024},
  url          = {https://doi.org/10.1109/TIFS.2023.3318939},
  doi          = {10.1109/TIFS.2023.3318939},
  timestamp    = {Sun, 10 Dec 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tifs/HuangLLTH24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/HuangWYHL24,
  author       = {Baojin Huang and
                  Zhongyuan Wang and
                  Jifan Yang and
                  Zhen Han and
                  Chao Liang},
  title        = {Unlabeled Data Assistant: Improving Mask Robustness for Face Recognition},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {19},
  pages        = {3109--3123},
  year         = {2024},
  url          = {https://doi.org/10.1109/TIFS.2024.3354109},
  doi          = {10.1109/TIFS.2024.3354109},
  timestamp    = {Thu, 29 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tifs/HuangWYHL24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/HuangZZDZCKC24,
  author       = {Junhao Huang and
                  Haosong Zhao and
                  Jipeng Zhang and
                  Wangchen Dai and
                  Lu Zhou and
                  Ray C. C. Cheung and
                  {\c{C}}etin Kaya Ko{\c{c}} and
                  Donglong Chen},
  title        = {Yet Another Improvement of Plantard Arithmetic for Faster Kyber on
                  Low-End 32-bit IoT Devices},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {19},
  pages        = {3800--3813},
  year         = {2024},
  url          = {https://doi.org/10.1109/TIFS.2024.3371369},
  doi          = {10.1109/TIFS.2024.3371369},
  timestamp    = {Fri, 31 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/HuangZZDZCKC24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/IssaMTC24,
  author       = {Wael Issa and
                  Nour Moustafa and
                  Benjamin P. Turnbull and
                  Kim{-}Kwang Raymond Choo},
  title        = {{RVE-PFL:} Robust Variational Encoder-Based Personalized Federated
                  Learning Against Model Inversion Attacks},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {19},
  pages        = {3772--3787},
  year         = {2024},
  url          = {https://doi.org/10.1109/TIFS.2024.3368879},
  doi          = {10.1109/TIFS.2024.3368879},
  timestamp    = {Fri, 17 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/IssaMTC24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/JeonJBJ24,
  author       = {Jueun Jeon and
                  Byeonghui Jeong and
                  Seungyeon Baek and
                  Young{-}Sik Jeong},
  title        = {Static Multi Feature-Based Malware Detection Using Multi SPP-net in
                  Smart IoT Environments},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {19},
  pages        = {2487--2500},
  year         = {2024},
  url          = {https://doi.org/10.1109/TIFS.2024.3350379},
  doi          = {10.1109/TIFS.2024.3350379},
  timestamp    = {Fri, 26 Jan 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tifs/JeonJBJ24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/JiJLSX24,
  author       = {Xiaoyu Ji and
                  Qinhong Jiang and
                  Chaohao Li and
                  Zhuoyang Shi and
                  Wenyuan Xu},
  title        = {Watch Your Speed: Injecting Malicious Voice Commands via Time-Scale
                  Modification},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {19},
  pages        = {3366--3379},
  year         = {2024},
  url          = {https://doi.org/10.1109/TIFS.2024.3352394},
  doi          = {10.1109/TIFS.2024.3352394},
  timestamp    = {Sat, 16 Mar 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tifs/JiJLSX24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/JiaCHSWD24,
  author       = {Meng Jia and
                  Jing Chen and
                  Kun He and
                  Min Shi and
                  Yuanzheng Wang and
                  Ruiying Du},
  title        = {Generic Construction of Threshold Credential Management With User-Autonomy
                  Aggregation},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {19},
  pages        = {2549--2564},
  year         = {2024},
  url          = {https://doi.org/10.1109/TIFS.2023.3347897},
  doi          = {10.1109/TIFS.2023.3347897},
  timestamp    = {Thu, 29 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tifs/JiaCHSWD24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/JiaLGBC24,
  author       = {Xiaojun Jia and
                  Jianshu Li and
                  Jindong Gu and
                  Yang Bai and
                  Xiaochun Cao},
  title        = {Fast Propagation Is Better: Accelerating Single-Step Adversarial Training
                  via Sampling Subnetworks},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {19},
  pages        = {4547--4559},
  year         = {2024},
  url          = {https://doi.org/10.1109/TIFS.2024.3377004},
  doi          = {10.1109/TIFS.2024.3377004},
  timestamp    = {Fri, 17 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/JiaLGBC24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/JiaMLWD24,
  author       = {Ju Jia and
                  Siqi Ma and
                  Yang Liu and
                  Lina Wang and
                  Robert H. Deng},
  title        = {A Causality-Aligned Structure Rationalization Scheme Against Adversarial
                  Biased Perturbations for Graph Neural Networks},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {19},
  pages        = {59--73},
  year         = {2024},
  url          = {https://doi.org/10.1109/TIFS.2023.3318936},
  doi          = {10.1109/TIFS.2023.3318936},
  timestamp    = {Fri, 15 Dec 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tifs/JiaMLWD24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/JiangLSD24,
  author       = {Mei Jiang and
                  Yannan Li and
                  Willy Susilo and
                  Dung Hoang Duong},
  title        = {Quantum-Safe Puncturable Signatures With Their Application in Blockchain},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {19},
  pages        = {2761--2770},
  year         = {2024},
  url          = {https://doi.org/10.1109/TIFS.2024.3353074},
  doi          = {10.1109/TIFS.2024.3353074},
  timestamp    = {Fri, 22 Mar 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tifs/JiangLSD24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/JiangLSML24,
  author       = {Fangling Jiang and
                  Yunfan Liu and
                  Haolin Si and
                  Jingjing Meng and
                  Qi Li},
  title        = {Cross-Scenario Unknown-Aware Face Anti-Spoofing With Evidential Semantic
                  Consistency Learning},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {19},
  pages        = {3093--3108},
  year         = {2024},
  url          = {https://doi.org/10.1109/TIFS.2024.3356234},
  doi          = {10.1109/TIFS.2024.3356234},
  timestamp    = {Fri, 24 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/JiangLSML24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/JiangLT24,
  author       = {Bo Jiang and
                  Ming Li and
                  Ravi Tandon},
  title        = {Online Context-Aware Streaming Data Release With Sequence Information
                  Privacy},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {19},
  pages        = {4390--4405},
  year         = {2024},
  url          = {https://doi.org/10.1109/TIFS.2024.3378008},
  doi          = {10.1109/TIFS.2024.3378008},
  timestamp    = {Fri, 17 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/JiangLT24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/JiangLZ24,
  author       = {Peng Jiang and
                  Qi Liu and
                  Liehuang Zhu},
  title        = {SanIdea: Exploiting Secure Blockchain-Based Access Control via Sanitizable
                  Encryption},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {19},
  pages        = {1589--1600},
  year         = {2024},
  url          = {https://doi.org/10.1109/TIFS.2023.3340066},
  doi          = {10.1109/TIFS.2023.3340066},
  timestamp    = {Sat, 13 Jan 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tifs/JiangLZ24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/JiangLZ24a,
  author       = {Peng Jiang and
                  Qi Liu and
                  Liehuang Zhu},
  title        = {Purified Authorization Service With Encrypted Message Moderation},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {19},
  pages        = {5196--5206},
  year         = {2024},
  url          = {https://doi.org/10.1109/TIFS.2024.3393391},
  doi          = {10.1109/TIFS.2024.3393391},
  timestamp    = {Fri, 17 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/JiangLZ24a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/JiangW24,
  author       = {Jingwei Jiang and
                  Ding Wang},
  title        = {{QPASE:} Quantum-Resistant Password-Authenticated Searchable Encryption
                  for Cloud Storage},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {19},
  pages        = {4231--4246},
  year         = {2024},
  url          = {https://doi.org/10.1109/TIFS.2024.3372804},
  doi          = {10.1109/TIFS.2024.3372804},
  timestamp    = {Fri, 17 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/JiangW24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/JiangXHZC24,
  author       = {Changsong Jiang and
                  Chunxiang Xu and
                  Yunxia Han and
                  Zhao Zhang and
                  Kefei Chen},
  title        = {Two-Factor Authenticated Key Exchange From Biometrics With Low Entropy
                  Rates},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {19},
  pages        = {3844--3856},
  year         = {2024},
  url          = {https://doi.org/10.1109/TIFS.2024.3372812},
  doi          = {10.1109/TIFS.2024.3372812},
  timestamp    = {Fri, 17 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/JiangXHZC24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/JiangZMLTL24,
  author       = {Qi Jiang and
                  Guichuan Zhao and
                  Xindi Ma and
                  Meng Li and
                  Youliang Tian and
                  Xinghua Li},
  title        = {Cross-Modal Learning Based Flexible Bimodal Biometric Authentication
                  With Template Protection},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {19},
  pages        = {3593--3607},
  year         = {2024},
  url          = {https://doi.org/10.1109/TIFS.2024.3364092},
  doi          = {10.1109/TIFS.2024.3364092},
  timestamp    = {Fri, 17 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/JiangZMLTL24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/JingHGWHW24,
  author       = {Tao Jing and
                  Hongyan Huang and
                  Qinghe Gao and
                  Yue Wu and
                  Yan Huo and
                  Yawei Wang},
  title        = {Multi-User Physical Layer Authentication Based on {CSI} Using ResNet
                  in Mobile IIoT},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {19},
  pages        = {1896--1907},
  year         = {2024},
  url          = {https://doi.org/10.1109/TIFS.2023.3340090},
  doi          = {10.1109/TIFS.2023.3340090},
  timestamp    = {Tue, 16 Jan 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tifs/JingHGWHW24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/JmalHBIKW24,
  author       = {Houssem Jmal and
                  Firas Ben Hmida and
                  Nardine Basta and
                  Muhammad Ikram and
                  Mohamed Ali K{\^{a}}afar and
                  Andy Walker},
  title        = {{SPGNN-API:} {A} Transferable Graph Neural Network for Attack Paths
                  Identification and Autonomous Mitigation},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {19},
  pages        = {1601--1613},
  year         = {2024},
  url          = {https://doi.org/10.1109/TIFS.2023.3338965},
  doi          = {10.1109/TIFS.2023.3338965},
  timestamp    = {Sat, 13 Jan 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tifs/JmalHBIKW24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/KandePTDTKR24,
  author       = {Rahul Kande and
                  Hammond Pearce and
                  Benjamin Tan and
                  Brendan Dolan{-}Gavitt and
                  Shailja Thakur and
                  Ramesh Karri and
                  Jeyavijayan Rajendran},
  title        = {(Security) Assertions by Large Language Models},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {19},
  pages        = {4374--4389},
  year         = {2024},
  url          = {https://doi.org/10.1109/TIFS.2024.3372809},
  doi          = {10.1109/TIFS.2024.3372809},
  timestamp    = {Fri, 17 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/KandePTDTKR24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/KangYA24,
  author       = {Bichen Kang and
                  Neng Ye and
                  Jianping An},
  title        = {Optimal Signaling for Covert Communications Under Peak Power Constraint},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {19},
  pages        = {5030--5045},
  year         = {2024},
  url          = {https://doi.org/10.1109/TIFS.2024.3395067},
  doi          = {10.1109/TIFS.2024.3395067},
  timestamp    = {Fri, 17 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/KangYA24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/KarunanayakeJAJ24,
  author       = {Ishan Karunanayake and
                  Jiaojiao Jiang and
                  Nadeem Ahmed and
                  Sanjay K. Jha},
  title        = {Exploring Uncharted Waters of Website Fingerprinting},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {19},
  pages        = {1840--1854},
  year         = {2024},
  url          = {https://doi.org/10.1109/TIFS.2023.3342607},
  doi          = {10.1109/TIFS.2023.3342607},
  timestamp    = {Sat, 13 Jan 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tifs/KarunanayakeJAJ24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/KeWH24,
  author       = {Da Ke and
                  Xiang Wang and
                  Zhitao Huang},
  title        = {Frequency-Selective Adversarial Attack Against Deep Learning-Based
                  Wireless Signal Classifiers},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {19},
  pages        = {4001--4011},
  year         = {2024},
  url          = {https://doi.org/10.1109/TIFS.2024.3352423},
  doi          = {10.1109/TIFS.2024.3352423},
  timestamp    = {Fri, 17 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/KeWH24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/KimHKSH24,
  author       = {Hodong Kim and
                  Changhee Hahn and
                  Hyunwoo J. Kim and
                  Youngjoo Shin and
                  Junbeom Hur},
  title        = {Deep Learning-Based Detection for Multiple Cache Side-Channel Attacks},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {19},
  pages        = {1672--1686},
  year         = {2024},
  url          = {https://doi.org/10.1109/TIFS.2023.3340088},
  doi          = {10.1109/TIFS.2023.3340088},
  timestamp    = {Sat, 13 Jan 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tifs/KimHKSH24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/KongC24,
  author       = {Ruiqi Kong and
                  He Henry Chen},
  title        = {{CSI-RFF:} Leveraging Micro-Signals on {CSI} for {RF} Fingerprinting
                  of Commodity WiFi},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {19},
  pages        = {5301--5315},
  year         = {2024},
  url          = {https://doi.org/10.1109/TIFS.2024.3396375},
  doi          = {10.1109/TIFS.2024.3396375},
  timestamp    = {Fri, 31 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/KongC24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/KuangLLJ24,
  author       = {Huafeng Kuang and
                  Hong Liu and
                  Xianming Lin and
                  Rongrong Ji},
  title        = {Defense Against Adversarial Attacks Using Topology Aligning Adversarial
                  Training},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {19},
  pages        = {3659--3673},
  year         = {2024},
  url          = {https://doi.org/10.1109/TIFS.2024.3359820},
  doi          = {10.1109/TIFS.2024.3359820},
  timestamp    = {Fri, 17 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/KuangLLJ24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/LaiSDG24,
  author       = {Jianchang Lai and
                  Willy Susilo and
                  Robert H. Deng and
                  Fuchun Guo},
  title        = {{SDSS:} Sequential Data Sharing System in IoT},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {19},
  pages        = {2288--2299},
  year         = {2024},
  url          = {https://doi.org/10.1109/TIFS.2023.3348229},
  doi          = {10.1109/TIFS.2023.3348229},
  timestamp    = {Fri, 26 Jan 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tifs/LaiSDG24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/LaiZFZZ24,
  author       = {Yuni Lai and
                  Yulin Zhu and
                  Wenqi Fan and
                  Xiaoge Zhang and
                  Kai Zhou},
  title        = {Toward Adversarially Robust Recommendation From Adaptive Fraudster
                  Detection},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {19},
  pages        = {907--919},
  year         = {2024},
  url          = {https://doi.org/10.1109/TIFS.2023.3327876},
  doi          = {10.1109/TIFS.2023.3327876},
  timestamp    = {Mon, 22 Jan 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tifs/LaiZFZZ24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/LeeYLH24,
  author       = {Jinyoung Lee and
                  Hyeonsik Yeom and
                  Si{-}Hyeon Lee and
                  Jeongseok Ha},
  title        = {Channel Correlation in Multi-User Covert Communication: Friend or
                  Foe?},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {19},
  pages        = {1469--1482},
  year         = {2024},
  url          = {https://doi.org/10.1109/TIFS.2023.3338421},
  doi          = {10.1109/TIFS.2023.3338421},
  timestamp    = {Sat, 13 Jan 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tifs/LeeYLH24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/LiCZWC24,
  author       = {Beibei Li and
                  Youtong Chen and
                  Lei Zhang and
                  Licheng Wang and
                  Yanyu Cheng},
  title        = {HomeSentinel: Intelligent Anti-Fingerprinting for IoT Traffic in Smart
                  Homes},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {19},
  pages        = {4780--4793},
  year         = {2024},
  url          = {https://doi.org/10.1109/TIFS.2024.3382589},
  doi          = {10.1109/TIFS.2024.3382589},
  timestamp    = {Fri, 17 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/LiCZWC24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/LiDWZMZZL24,
  author       = {Meng Li and
                  Hanni Ding and
                  Qing Wang and
                  Mingwei Zhang and
                  Weizhi Meng and
                  Liehuang Zhu and
                  Zijian Zhang and
                  Xiaodong Lin},
  title        = {Decentralized Threshold Signatures With Dynamically Private Accountability},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {19},
  pages        = {2217--2230},
  year         = {2024},
  url          = {https://doi.org/10.1109/TIFS.2023.3347968},
  doi          = {10.1109/TIFS.2023.3347968},
  timestamp    = {Fri, 26 Jan 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tifs/LiDWZMZZL24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/LiGLH24,
  author       = {Qiongxiu Li and
                  Jaron Skovsted Gundersen and
                  Milan Lopuha{\"{a}}{-}Zwakenberg and
                  Richard Heusdens},
  title        = {Adaptive Differentially Quantized Subspace Perturbation {(ADQSP):}
                  {A} Unified Framework for Privacy-Preserving Distributed Average Consensus},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {19},
  pages        = {1780--1793},
  year         = {2024},
  url          = {https://doi.org/10.1109/TIFS.2023.3343599},
  doi          = {10.1109/TIFS.2023.3343599},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tifs/LiGLH24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/LiHZYXD24,
  author       = {Xiaoguo Li and
                  Zixi Huang and
                  Bowen Zhao and
                  Guomin Yang and
                  Tao Xiang and
                  Robert H. Deng},
  title        = {{STDA:} Secure Time Series Data Analytics With Practical Efficiency
                  in Wide-Area Network},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {19},
  pages        = {1440--1454},
  year         = {2024},
  url          = {https://doi.org/10.1109/TIFS.2023.3336512},
  doi          = {10.1109/TIFS.2023.3336512},
  timestamp    = {Sat, 13 Jan 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tifs/LiHZYXD24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/LiLHH24,
  author       = {Xiao Li and
                  Qiongxiu Li and
                  Zhanhao Hu and
                  Xiaolin Hu},
  title        = {On the Privacy Effect of Data Enhancement via the Lens of Memorization},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {19},
  pages        = {4686--4699},
  year         = {2024},
  url          = {https://doi.org/10.1109/TIFS.2024.3381477},
  doi          = {10.1109/TIFS.2024.3381477},
  timestamp    = {Fri, 17 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/LiLHH24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/LiLTLLL24,
  author       = {Haozhe Li and
                  Yilin Liao and
                  Zijian Tian and
                  Zhaoran Liu and
                  Jiaqi Liu and
                  Xinggao Liu},
  title        = {Bidirectional Stackable Recurrent Generative Adversarial Imputation
                  Network for Specific Emitter Missing Data Imputation},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {19},
  pages        = {2967--2980},
  year         = {2024},
  url          = {https://doi.org/10.1109/TIFS.2024.3352393},
  doi          = {10.1109/TIFS.2024.3352393},
  timestamp    = {Thu, 29 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tifs/LiLTLLL24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/LiMZGAXFZAA24,
  author       = {Yinshan Li and
                  Hua Ma and
                  Zhi Zhang and
                  Yansong Gao and
                  Alsharif Abuadbba and
                  Minhui Xue and
                  Anmin Fu and
                  Yifeng Zheng and
                  Said F. Al{-}Sarawi and
                  Derek Abbott},
  title        = {{NTD:} Non-Transferability Enabled Deep Learning Backdoor Detection},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {19},
  pages        = {104--119},
  year         = {2024},
  url          = {https://doi.org/10.1109/TIFS.2023.3312973},
  doi          = {10.1109/TIFS.2023.3312973},
  timestamp    = {Sun, 10 Dec 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tifs/LiMZGAXFZAA24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/LiMZZW24,
  author       = {Shuyi Li and
                  Ruijun Ma and
                  Jianhang Zhou and
                  Bob Zhang and
                  Lifang Wu},
  title        = {Joint Discriminative Analysis With Low-Rank Projection for Finger
                  Vein Feature Extraction},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {19},
  pages        = {959--969},
  year         = {2024},
  url          = {https://doi.org/10.1109/TIFS.2023.3326364},
  doi          = {10.1109/TIFS.2023.3326364},
  timestamp    = {Sun, 31 Dec 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tifs/LiMZZW24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/LiPCM24,
  author       = {Meng Li and
                  Zheng Pei and
                  Yong Chen and
                  Zhenhai Miao},
  title        = {Fuzzy Linguistic Knowledge Reasoning-Based Secure Control for Connected
                  Nonlinear Servosystem},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {19},
  pages        = {334--343},
  year         = {2024},
  url          = {https://doi.org/10.1109/TIFS.2023.3324396},
  doi          = {10.1109/TIFS.2023.3324396},
  timestamp    = {Sun, 10 Dec 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tifs/LiPCM24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/LiQHDS24,
  author       = {Dingzhao Li and
                  Jie Qi and
                  Shaohua Hong and
                  Pengfei Deng and
                  Haixin Sun},
  title        = {A Class-Incremental Approach With Self-Training and Prototype Augmentation
                  for Specific Emitter Identification},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {19},
  pages        = {1714--1727},
  year         = {2024},
  url          = {https://doi.org/10.1109/TIFS.2023.3343193},
  doi          = {10.1109/TIFS.2023.3343193},
  timestamp    = {Sat, 13 Jan 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tifs/LiQHDS24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/LiSLHZKEPH24,
  author       = {Guyue Li and
                  Paul Staat and
                  Haoyu Li and
                  Markus Heinrichs and
                  Christian T. Zenger and
                  Rainer Kronberger and
                  Harald Elders{-}Boll and
                  Christof Paar and
                  Aiqun Hu},
  title        = {RIS-Jamming: Breaking Key Consistency in Channel Reciprocity-Based
                  Key Generation},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {19},
  pages        = {5090--5105},
  year         = {2024},
  url          = {https://doi.org/10.1109/TIFS.2024.3389569},
  doi          = {10.1109/TIFS.2024.3389569},
  timestamp    = {Fri, 17 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/LiSLHZKEPH24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/LiWLCZ24,
  author       = {Zhankai Li and
                  Weiping Wang and
                  Jie Li and
                  Kai Chen and
                  Shigeng Zhang},
  title        = {{UCG:} {A} Universal Cross-Domain Generator for Transferable Adversarial
                  Examples},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {19},
  pages        = {3023--3037},
  year         = {2024},
  url          = {https://doi.org/10.1109/TIFS.2024.3352913},
  doi          = {10.1109/TIFS.2024.3352913},
  timestamp    = {Sat, 16 Mar 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tifs/LiWLCZ24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/LiWLCZ24a,
  author       = {Zhankai Li and
                  Weiping Wang and
                  Jie Li and
                  Kai Chen and
                  Shigeng Zhang},
  title        = {Foolmix: Strengthen the Transferability of Adversarial Examples by
                  Dual-Blending and Direction Update Strategy},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {19},
  pages        = {5286--5300},
  year         = {2024},
  url          = {https://doi.org/10.1109/TIFS.2024.3393745},
  doi          = {10.1109/TIFS.2024.3393745},
  timestamp    = {Fri, 31 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/LiWLCZ24a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/LiWYYZ24,
  author       = {Jiajun Li and
                  Pu Wang and
                  Zheng Yan and
                  Yishan Yang and
                  Kai Zeng},
  title        = {BGKey: Group Key Generation for Backscatter Communications Among Multiple
                  Devices},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {19},
  pages        = {2470--2486},
  year         = {2024},
  url          = {https://doi.org/10.1109/TIFS.2023.3345650},
  doi          = {10.1109/TIFS.2023.3345650},
  timestamp    = {Fri, 26 Jan 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tifs/LiWYYZ24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/LiWZXX24,
  author       = {Jianhao Li and
                  Jiabei Wang and
                  Rui Zhang and
                  Yansen Xin and
                  Wenhan Xu},
  title        = {{NEMO:} Practical Distributed Boolean Queries With Minimal Leakage},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {19},
  pages        = {2594--2608},
  year         = {2024},
  url          = {https://doi.org/10.1109/TIFS.2024.3351433},
  doi          = {10.1109/TIFS.2024.3351433},
  timestamp    = {Thu, 29 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tifs/LiWZXX24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/LiWZZL24,
  author       = {Zhi Li and
                  Hao Wang and
                  Songnian Zhang and
                  Wenying Zhang and
                  Rongxing Lu},
  title        = {SecKNN: FSS-Based Secure Multi-Party {KNN} Classification Under General
                  Distance Functions},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {19},
  pages        = {1326--1341},
  year         = {2024},
  url          = {https://doi.org/10.1109/TIFS.2023.3337940},
  doi          = {10.1109/TIFS.2023.3337940},
  timestamp    = {Sat, 13 Jan 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tifs/LiWZZL24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/LiXZGDGP24,
  author       = {Yuepei Li and
                  Kai Xu and
                  Junqing Zhang and
                  Chongyan Gu and
                  Yuan Ding and
                  George Goussetis and
                  Symon K. Podilchak},
  title        = {PUF-Assisted Radio Frequency Fingerprinting Exploiting Power Amplifier
                  Active Load-Pulling},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {19},
  pages        = {5015--5029},
  year         = {2024},
  url          = {https://doi.org/10.1109/TIFS.2024.3389570},
  doi          = {10.1109/TIFS.2024.3389570},
  timestamp    = {Fri, 17 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/LiXZGDGP24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/LiY24,
  author       = {Pengyu Li and
                  Dan Ye},
  title        = {Vulnerability Analysis of Distributed State Estimator Under False
                  Data Injection Attacks},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {19},
  pages        = {5235--5244},
  year         = {2024},
  url          = {https://doi.org/10.1109/TIFS.2024.3396634},
  doi          = {10.1109/TIFS.2024.3396634},
  timestamp    = {Fri, 17 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/LiY24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/LiYYLY24,
  author       = {Shuai Li and
                  Zhemin Yang and
                  Yunteng Yang and
                  Dingyi Liu and
                  Min Yang},
  title        = {Identifying Cross-User Privacy Leakage in Mobile Mini-Apps at a Large
                  Scale},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {19},
  pages        = {3135--3147},
  year         = {2024},
  url          = {https://doi.org/10.1109/TIFS.2024.3356197},
  doi          = {10.1109/TIFS.2024.3356197},
  timestamp    = {Tue, 20 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tifs/LiYYLY24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/LiYZL24,
  author       = {Xue{-}Yang Li and
                  Xue Yang and
                  Zhengchun Zhou and
                  Rongxing Lu},
  title        = {Efficiently Achieving Privacy Preservation and Poisoning Attack Resistance
                  in Federated Learning},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {19},
  pages        = {4358--4373},
  year         = {2024},
  url          = {https://doi.org/10.1109/TIFS.2024.3378006},
  doi          = {10.1109/TIFS.2024.3378006},
  timestamp    = {Fri, 31 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/LiYZL24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/LiZLTR24,
  author       = {Yanbin Li and
                  Jiajie Zhu and
                  Zhe Liu and
                  Ming Tang and
                  Shougang Ren},
  title        = {Deep Learning Gradient Visualization-Based Pre-Silicon Side-Channel
                  Leakage Location},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {19},
  pages        = {2340--2355},
  year         = {2024},
  url          = {https://doi.org/10.1109/TIFS.2024.3350375},
  doi          = {10.1109/TIFS.2024.3350375},
  timestamp    = {Fri, 26 Jan 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tifs/LiZLTR24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/LiZWMN24,
  author       = {Shuyi Li and
                  Bob Zhang and
                  Lifang Wu and
                  Ruijun Ma and
                  Xin Ning},
  title        = {Robust and Sparse Least Square Regression for Finger Vein and Finger
                  Knuckle Print Recognition},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {19},
  pages        = {2709--2719},
  year         = {2024},
  url          = {https://doi.org/10.1109/TIFS.2024.3352389},
  doi          = {10.1109/TIFS.2024.3352389},
  timestamp    = {Thu, 29 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tifs/LiZWMN24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/LiZYNAP24,
  author       = {Kai Li and
                  Jingjing Zheng and
                  Xin Yuan and
                  Wei Ni and
                  {\"{O}}zg{\"{u}}r B. Akan and
                  H. Vincent Poor},
  title        = {Data-Agnostic Model Poisoning Against Federated Learning: {A} Graph
                  Autoencoder Approach},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {19},
  pages        = {3465--3480},
  year         = {2024},
  url          = {https://doi.org/10.1109/TIFS.2024.3362147},
  doi          = {10.1109/TIFS.2024.3362147},
  timestamp    = {Thu, 29 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tifs/LiZYNAP24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/LiangWLCCPX24,
  author       = {Ying Liang and
                  Wenjie Wu and
                  Haobo Li and
                  Xiaojun Chang and
                  Xiaojiang Chen and
                  Jinye Peng and
                  Pengfei Xu},
  title        = {DCS-Gait: {A} Class-Level Domain Adaptation Approach for Cross-Scene
                  and Cross-State Gait Recognition Using Wi-Fi {CSI}},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {19},
  pages        = {2997--3007},
  year         = {2024},
  url          = {https://doi.org/10.1109/TIFS.2024.3356827},
  doi          = {10.1109/TIFS.2024.3356827},
  timestamp    = {Tue, 13 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tifs/LiangWLCCPX24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/LiangXLLKZ24,
  author       = {Wei Liang and
                  Siqi Xie and
                  Kuan{-}Ching Li and
                  Xiong Li and
                  Xiaoyan Kui and
                  Albert Y. Zomaya},
  title        = {{MC-DSC:} {A} Dynamic Secure Resource Configuration Scheme Based on
                  Medical Consortium Blockchain},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {19},
  pages        = {3525--3538},
  year         = {2024},
  url          = {https://doi.org/10.1109/TIFS.2024.3364370},
  doi          = {10.1109/TIFS.2024.3364370},
  timestamp    = {Fri, 17 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/LiangXLLKZ24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/LinLLH24,
  author       = {Guoyuan Lin and
                  Weiqi Luo and
                  Da Luo and
                  Jiwu Huang},
  title        = {One-Class Neural Network With Directed Statistics Pooling for Spoofing
                  Speech Detection},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {19},
  pages        = {2581--2593},
  year         = {2024},
  url          = {https://doi.org/10.1109/TIFS.2024.3352429},
  doi          = {10.1109/TIFS.2024.3352429},
  timestamp    = {Thu, 29 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tifs/LinLLH24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/LinYLLLBR24,
  author       = {Feng Lin and
                  Hao Yan and
                  Jin Li and
                  Ziwei Liu and
                  Li Lu and
                  Zhongjie Ba and
                  Kui Ren},
  title        = {PhaDe: Practical Phantom Spoofing Attack Detection for Autonomous
                  Vehicles},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {19},
  pages        = {4199--4214},
  year         = {2024},
  url          = {https://doi.org/10.1109/TIFS.2024.3376192},
  doi          = {10.1109/TIFS.2024.3376192},
  timestamp    = {Fri, 17 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/LinYLLLBR24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/LingTCSXLTHQ24,
  author       = {Guowei Ling and
                  Fei Tang and
                  Chaochao Cai and
                  Jinyong Shan and
                  Haiyang Xue and
                  Wulu Li and
                  Peng Tang and
                  Xinyi Huang and
                  Weidong Qiu},
  title        = {P{\({^2}\)}FRPSI: Privacy-Preserving Feature Retrieved Private Set
                  Intersection},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {19},
  pages        = {2201--2216},
  year         = {2024},
  url          = {https://doi.org/10.1109/TIFS.2023.3343973},
  doi          = {10.1109/TIFS.2023.3343973},
  timestamp    = {Fri, 26 Jan 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tifs/LingTCSXLTHQ24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/LiuCWWFZ24,
  author       = {Jieli Liu and
                  Jinze Chen and
                  Jiajing Wu and
                  Zhiying Wu and
                  Junyuan Fang and
                  Zibin Zheng},
  title        = {Fishing for Fraudsters: Uncovering Ethereum Phishing Gangs With Blockchain
                  Data},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {19},
  pages        = {3038--3050},
  year         = {2024},
  url          = {https://doi.org/10.1109/TIFS.2024.3359000},
  doi          = {10.1109/TIFS.2024.3359000},
  timestamp    = {Thu, 29 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tifs/LiuCWWFZ24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/LiuDZXT24,
  author       = {Jinliang Liu and
                  Yanhui Dong and
                  Lijuan Zha and
                  Xiangpeng Xie and
                  Engang Tian},
  title        = {Reinforcement Learning-Based Tracking Control for Networked Control
                  Systems With DoS Attacks},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {19},
  pages        = {4188--4197},
  year         = {2024},
  url          = {https://doi.org/10.1109/TIFS.2024.3376250},
  doi          = {10.1109/TIFS.2024.3376250},
  timestamp    = {Fri, 17 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/LiuDZXT24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/LiuFWGLLZG24,
  author       = {Chao Liu and
                  Xue Fu and
                  Yu Wang and
                  Lantu Guo and
                  Yuchao Liu and
                  Yun Lin and
                  Haitao Zhao and
                  Guan Gui},
  title        = {Overcoming Data Limitations: {A} Few-Shot Specific Emitter Identification
                  Method Using Self-Supervised Learning and Adversarial Augmentation},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {19},
  pages        = {500--513},
  year         = {2024},
  url          = {https://doi.org/10.1109/TIFS.2023.3324394},
  doi          = {10.1109/TIFS.2023.3324394},
  timestamp    = {Tue, 12 Mar 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tifs/LiuFWGLLZG24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/LiuGPWL24,
  author       = {Decheng Liu and
                  Xinbo Gao and
                  Chunlei Peng and
                  Nannan Wang and
                  Jie Li},
  title        = {Universal Heterogeneous Face Analysis via Multi-Domain Feature Disentanglement},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {19},
  pages        = {735--747},
  year         = {2024},
  url          = {https://doi.org/10.1109/TIFS.2023.3327666},
  doi          = {10.1109/TIFS.2023.3327666},
  timestamp    = {Sun, 10 Dec 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tifs/LiuGPWL24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/LiuHCLL24,
  author       = {Zhihuang Liu and
                  Ling Hu and
                  Zhiping Cai and
                  Ximeng Liu and
                  Yanhua Liu},
  title        = {SeCoSe: Toward Searchable and Communicable Healthcare Service Seeking
                  in Flexible and Secure {EHR} Sharing},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {19},
  pages        = {4999--5014},
  year         = {2024},
  url          = {https://doi.org/10.1109/TIFS.2024.3391914},
  doi          = {10.1109/TIFS.2024.3391914},
  timestamp    = {Fri, 17 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/LiuHCLL24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/LiuJLLX24,
  author       = {Beiyuan Liu and
                  Jinjing Jiang and
                  Qian Liu and
                  Jiajia Liu and
                  Sai Xu},
  title        = {An Intelligent Reflecting Surface-Based Attack Scheme Against Dual-Functional
                  Radar and Communication Systems},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {19},
  pages        = {4945--4956},
  year         = {2024},
  url          = {https://doi.org/10.1109/TIFS.2024.3390621},
  doi          = {10.1109/TIFS.2024.3390621},
  timestamp    = {Fri, 17 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/LiuJLLX24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/LiuKLXT24,
  author       = {Jian Liu and
                  Jiachen Ke and
                  Jinliang Liu and
                  Xiangpeng Xie and
                  Engang Tian},
  title        = {Outlier-Resistant Non-Fragile Control of Nonlinear Networked Systems
                  Under DoS Attacks and Multi-Variable Event-Triggered {SC} Protocol},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {19},
  pages        = {2609--2622},
  year         = {2024},
  url          = {https://doi.org/10.1109/TIFS.2024.3352404},
  doi          = {10.1109/TIFS.2024.3352404},
  timestamp    = {Thu, 29 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tifs/LiuKLXT24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/LiuLCT24,
  author       = {Junlin Liu and
                  Xinchen Lyu and
                  Qimei Cui and
                  Xiaofeng Tao},
  title        = {Similarity-Based Label Inference Attack Against Training and Inference
                  of Split Learning},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {19},
  pages        = {2881--2895},
  year         = {2024},
  url          = {https://doi.org/10.1109/TIFS.2024.3356821},
  doi          = {10.1109/TIFS.2024.3356821},
  timestamp    = {Thu, 29 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tifs/LiuLCT24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/LiuLWZLLLS24,
  author       = {Andi Liu and
                  Yizhong Liu and
                  Qianhong Wu and
                  Boyu Zhao and
                  Dongyu Li and
                  Yuan Lu and
                  Rongxing Lu and
                  Willy Susilo},
  title        = {{CHERUBIM:} {A} Secure and Highly Parallel Cross-Shard Consensus Using
                  Quadruple Pipelined Two-Phase Commit for Sharding Blockchains},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {19},
  pages        = {3178--3193},
  year         = {2024},
  url          = {https://doi.org/10.1109/TIFS.2024.3358990},
  doi          = {10.1109/TIFS.2024.3358990},
  timestamp    = {Thu, 29 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tifs/LiuLWZLLLS24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/LiuLWZW24,
  author       = {Yang Liu and
                  Guangbo Liang and
                  Xi Wang and
                  Peican Zhu and
                  Zhen Wang},
  title        = {Diffusion Containment in Complex Networks Through Collective Influence
                  of Connections},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {19},
  pages        = {1510--1524},
  year         = {2024},
  url          = {https://doi.org/10.1109/TIFS.2023.3338423},
  doi          = {10.1109/TIFS.2023.3338423},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tifs/LiuLWZW24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/LiuLZFLL24,
  author       = {Chen Liu and
                  Bo Li and
                  Jun Zhao and
                  Weiwei Feng and
                  Xudong Liu and
                  Chunpei Li},
  title        = {{A2-CLM:} Few-Shot Malware Detection Based on Adversarial Heterogeneous
                  Graph Augmentation},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {19},
  pages        = {2023--2038},
  year         = {2024},
  url          = {https://doi.org/10.1109/TIFS.2023.3345640},
  doi          = {10.1109/TIFS.2023.3345640},
  timestamp    = {Fri, 26 Jan 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tifs/LiuLZFLL24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/LiuMZZ24,
  author       = {Weidong Liu and
                  Xiaojun Mao and
                  Xiaofei Zhang and
                  Xin Zhang},
  title        = {Efficient Sparse Least Absolute Deviation Regression With Differential
                  Privacy},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {19},
  pages        = {2328--2339},
  year         = {2024},
  url          = {https://doi.org/10.1109/TIFS.2023.3349054},
  doi          = {10.1109/TIFS.2023.3349054},
  timestamp    = {Fri, 26 Jan 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tifs/LiuMZZ24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/LiuRWQWSZLWHRB24,
  author       = {Xinwei Liu and
                  Kiran B. Raja and
                  Renfang Wang and
                  Hong Qiu and
                  Hucheng Wu and
                  Dechao Sun and
                  Qiguang Zheng and
                  Nian Liu and
                  Xiaoxia Wang and
                  Gehang Huang and
                  Raghavendra Ramachandra and
                  Christoph Busch},
  title        = {A Latent Fingerprint in the Wild Database},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {19},
  pages        = {3703--3718},
  year         = {2024},
  url          = {https://doi.org/10.1109/TIFS.2024.3368892},
  doi          = {10.1109/TIFS.2024.3368892},
  timestamp    = {Fri, 17 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/LiuRWQWSZLWHRB24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/LiuWRWGQL24,
  author       = {Rongke Liu and
                  Dong Wang and
                  Yizhi Ren and
                  Zhen Wang and
                  Kaitian Guo and
                  Qianqian Qin and
                  Xiaolei Liu},
  title        = {Unstoppable Attack: Label-Only Model Inversion Via Conditional Diffusion
                  Model},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {19},
  pages        = {3958--3973},
  year         = {2024},
  url          = {https://doi.org/10.1109/TIFS.2024.3372815},
  doi          = {10.1109/TIFS.2024.3372815},
  timestamp    = {Fri, 17 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/LiuWRWGQL24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/LiuWSRL24,
  author       = {Hui Liu and
                  Wenya Wang and
                  Hao Sun and
                  Anderson Rocha and
                  Haoliang Li},
  title        = {Robust Domain Misinformation Detection via Multi-Modal Feature Alignment},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {19},
  pages        = {793--806},
  year         = {2024},
  url          = {https://doi.org/10.1109/TIFS.2023.3326368},
  doi          = {10.1109/TIFS.2023.3326368},
  timestamp    = {Sun, 31 Dec 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tifs/LiuWSRL24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/LiuXWZ24,
  author       = {Jiawei Liu and
                  Jingyi Xie and
                  Yang Wang and
                  Zheng{-}Jun Zha},
  title        = {Adaptive Texture and Spectrum Clue Mining for Generalizable Face Forgery
                  Detection},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {19},
  pages        = {1922--1934},
  year         = {2024},
  url          = {https://doi.org/10.1109/TIFS.2023.3344293},
  doi          = {10.1109/TIFS.2023.3344293},
  timestamp    = {Fri, 26 Jan 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tifs/LiuXWZ24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/LiuXZWWL24,
  author       = {Gaoyang Liu and
                  Tianlong Xu and
                  Rui Zhang and
                  Zixiong Wang and
                  Chen Wang and
                  Ling Liu},
  title        = {Gradient-Leaks: Enabling Black-Box Membership Inference Attacks Against
                  Machine Learning Models},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {19},
  pages        = {427--440},
  year         = {2024},
  url          = {https://doi.org/10.1109/TIFS.2023.3324772},
  doi          = {10.1109/TIFS.2023.3324772},
  timestamp    = {Sun, 10 Dec 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tifs/LiuXZWWL24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/LiuZLS24,
  author       = {Feng Liu and
                  Wenfeng Zeng and
                  Yin Li and
                  Linlin Shen},
  title        = {A Lightweight and Noise-Robust Method for Internal {OCT} Fingerprint
                  Reconstruction},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {19},
  pages        = {5492--5505},
  year         = {2024},
  url          = {https://doi.org/10.1109/TIFS.2024.3402387},
  doi          = {10.1109/TIFS.2024.3402387},
  timestamp    = {Fri, 31 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/LiuZLS24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/LiuZZCZL24,
  author       = {Renyang Liu and
                  Wei Zhou and
                  Tianwei Zhang and
                  Kangjie Chen and
                  Jun Zhao and
                  Kwok{-}Yan Lam},
  title        = {Boosting Black-Box Attack to Deep Neural Networks With Conditional
                  Diffusion Models},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {19},
  pages        = {5207--5219},
  year         = {2024},
  url          = {https://doi.org/10.1109/TIFS.2024.3390609},
  doi          = {10.1109/TIFS.2024.3390609},
  timestamp    = {Fri, 17 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/LiuZZCZL24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/LongYZP24,
  author       = {Min Long and
                  Quantao Yao and
                  Le{-}Bing Zhang and
                  Fei Peng},
  title        = {Face De-Morphing Based on Diffusion Autoencoders},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {19},
  pages        = {3051--3063},
  year         = {2024},
  url          = {https://doi.org/10.1109/TIFS.2024.3359029},
  doi          = {10.1109/TIFS.2024.3359029},
  timestamp    = {Thu, 29 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tifs/LongYZP24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/LongZWJS24,
  author       = {Xingming Long and
                  Jie Zhang and
                  Shuzhe Wu and
                  Xin Jin and
                  Shiguang Shan},
  title        = {Dual Sampling Based Causal Intervention for Face Anti-Spoofing With
                  Identity Debiasing},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {19},
  pages        = {851--862},
  year         = {2024},
  url          = {https://doi.org/10.1109/TIFS.2023.3326370},
  doi          = {10.1109/TIFS.2023.3326370},
  timestamp    = {Sun, 31 Dec 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tifs/LongZWJS24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/LuCZCD24,
  author       = {Tianyu Lu and
                  Liquan Chen and
                  Junqing Zhang and
                  Chen Chen and
                  Trung Q. Duong},
  title        = {Reconfigurable Intelligent Surface-Assisted Key Generation for Millimeter-Wave
                  Multi-User Systems},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {19},
  pages        = {5373--5388},
  year         = {2024},
  url          = {https://doi.org/10.1109/TIFS.2024.3397037},
  doi          = {10.1109/TIFS.2024.3397037},
  timestamp    = {Fri, 31 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/LuCZCD24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/LuHWLZXJ24,
  author       = {Jianrong Lu and
                  Shengshan Hu and
                  Wei Wan and
                  Minghui Li and
                  Leo Yu Zhang and
                  Lulu Xue and
                  Hai Jin},
  title        = {Depriving the Survival Space of Adversaries Against Poisoned Gradients
                  in Federated Learning},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {19},
  pages        = {5405--5418},
  year         = {2024},
  url          = {https://doi.org/10.1109/TIFS.2024.3360869},
  doi          = {10.1109/TIFS.2024.3360869},
  timestamp    = {Fri, 31 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/LuHWLZXJ24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/LuW24,
  author       = {Tingting Lu and
                  Junfeng Wang},
  title        = {{DOMR:} Toward Deep Open-World Malware Recognition},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {19},
  pages        = {1455--1468},
  year         = {2024},
  url          = {https://doi.org/10.1109/TIFS.2023.3338469},
  doi          = {10.1109/TIFS.2023.3338469},
  timestamp    = {Sat, 13 Jan 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tifs/LuW24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/LuZCM24,
  author       = {Hai Lu and
                  Yan Zhu and
                  Cecilia E. Chen and
                  Di Ma},
  title        = {Toward Efficient Key Extraction of {LBC} Over Ring: Fast Non-Spherical
                  G-Lattice Sampler and Optimized Perturbation Generation},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {19},
  pages        = {4301--4315},
  year         = {2024},
  url          = {https://doi.org/10.1109/TIFS.2024.3376206},
  doi          = {10.1109/TIFS.2024.3376206},
  timestamp    = {Fri, 17 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/LuZCM24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/LuZDLLL24,
  author       = {Jiucui Lu and
                  Jiaran Zhou and
                  Junyu Dong and
                  Bin Li and
                  Siwei Lyu and
                  Yuezun Li},
  title        = {ForensicsForest Family: {A} Series of Multi-Scale Hierarchical Cascade
                  Forests for Detecting GAN-Generated Faces},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {19},
  pages        = {5106--5119},
  year         = {2024},
  url          = {https://doi.org/10.1109/TIFS.2024.3395013},
  doi          = {10.1109/TIFS.2024.3395013},
  timestamp    = {Fri, 17 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/LuZDLLL24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/LuoHZWL24,
  author       = {Xuejiao Luo and
                  Xiaohui Han and
                  Wenbo Zuo and
                  Xiaoming Wu and
                  Wenyin Liu},
  title        = {MLaD{\({^2}\)}: {A} Semi-Supervised Money Laundering Detection Framework
                  Based on Decoupling Training},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {19},
  pages        = {4518--4533},
  year         = {2024},
  url          = {https://doi.org/10.1109/TIFS.2024.3380262},
  doi          = {10.1109/TIFS.2024.3380262},
  timestamp    = {Fri, 17 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/LuoHZWL24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/LuoKHHKK24,
  author       = {Anwei Luo and
                  Chenqi Kong and
                  Jiwu Huang and
                  Yongjian Hu and
                  Xiangui Kang and
                  Alex C. Kot},
  title        = {Beyond the Prior Forgery Knowledge: Mining Critical Clues for General
                  Face Forgery Detection},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {19},
  pages        = {1168--1182},
  year         = {2024},
  url          = {https://doi.org/10.1109/TIFS.2023.3332218},
  doi          = {10.1109/TIFS.2023.3332218},
  timestamp    = {Sun, 31 Dec 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tifs/LuoKHHKK24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/LuoQXZK24,
  author       = {Dacan Luo and
                  Yitao Qiao and
                  Di Xie and
                  Shifeng Zhang and
                  Wenxiong Kang},
  title        = {Palm Vein Recognition Under Unconstrained and Weak-Cooperative Conditions},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {19},
  pages        = {4601--4614},
  year         = {2024},
  url          = {https://doi.org/10.1109/TIFS.2024.3378427},
  doi          = {10.1109/TIFS.2024.3378427},
  timestamp    = {Fri, 17 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/LuoQXZK24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/LuoWSYZ24,
  author       = {Fucai Luo and
                  Haiyan Wang and
                  Willy Susilo and
                  Xingfu Yan and
                  Xiaofan Zheng},
  title        = {Public Trace-and-Revoke Proxy Re-Encryption for Secure Data Sharing
                  in Clouds},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {19},
  pages        = {2919--2934},
  year         = {2024},
  url          = {https://doi.org/10.1109/TIFS.2024.3357240},
  doi          = {10.1109/TIFS.2024.3357240},
  timestamp    = {Sat, 16 Mar 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tifs/LuoWSYZ24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/LyuHRGYCT24,
  author       = {Xinchen Lyu and
                  Xinyun Hou and
                  Chenshan Ren and
                  Xin Ge and
                  Penglin Yang and
                  Qimei Cui and
                  Xiaofeng Tao},
  title        = {Secure and Efficient Federated Learning With Provable Performance
                  Guarantees via Stochastic Quantization},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {19},
  pages        = {4070--4085},
  year         = {2024},
  url          = {https://doi.org/10.1109/TIFS.2024.3374590},
  doi          = {10.1109/TIFS.2024.3374590},
  timestamp    = {Fri, 17 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/LyuHRGYCT24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/MaJLWWC24,
  author       = {Bowen Ma and
                  Tong Jia and
                  Mingyuan Li and
                  Songsheng Wu and
                  Hao Wang and
                  Dongyue Chen},
  title        = {Toward Dual-View X-Ray Baggage Inspection: {A} Large-Scale Benchmark
                  and Adaptive Hierarchical Cross Refinement for Prohibited Item Discovery},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {19},
  pages        = {3866--3878},
  year         = {2024},
  url          = {https://doi.org/10.1109/TIFS.2024.3372797},
  doi          = {10.1109/TIFS.2024.3372797},
  timestamp    = {Fri, 17 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/MaJLWWC24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/MaZY24,
  author       = {Jingzhe Ma and
                  Xiao{-}Qing Zhang and
                  Shiqi Yu},
  title        = {An Identity-Preserved Framework for Human Motion Transfer},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {19},
  pages        = {3495--3509},
  year         = {2024},
  url          = {https://doi.org/10.1109/TIFS.2024.3364018},
  doi          = {10.1109/TIFS.2024.3364018},
  timestamp    = {Fri, 17 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/MaZY24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/MadhusudhananJSM24,
  author       = {Sheema Madhusudhanan and
                  Arun Cyril Jose and
                  Jayakrushna Sahoo and
                  Reza Malekian},
  title        = {PRIM{\unicode{1013}}: Novel Privacy-Preservation Model With Pattern
                  Mining and Genetic Algorithm},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {19},
  pages        = {571--585},
  year         = {2024},
  url          = {https://doi.org/10.1109/TIFS.2023.3324769},
  doi          = {10.1109/TIFS.2023.3324769},
  timestamp    = {Sun, 10 Dec 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tifs/MadhusudhananJSM24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/MalhotraVSMN24,
  author       = {Aakarsh Malhotra and
                  Mayank Vatsa and
                  Richa Singh and
                  Keith B. Morris and
                  Afzel Noore},
  title        = {Multi-Surface Multi-Technique {(MUST)} Latent Fingerprint Database},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {19},
  pages        = {1041--1055},
  year         = {2024},
  url          = {https://doi.org/10.1109/TIFS.2023.3280742},
  doi          = {10.1109/TIFS.2023.3280742},
  timestamp    = {Sun, 31 Dec 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tifs/MalhotraVSMN24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/MandlikPSB24,
  author       = {Simon Mandl{\'{\i}}k and
                  Tom{\'{a}}s Pevn{\'{y}} and
                  V{\'{a}}clav Sm{\'{\i}}dl and
                  Luk{\'{a}}s Bajer},
  title        = {Malicious Internet Entity Detection Using Local Graph Inference},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {19},
  pages        = {3554--3566},
  year         = {2024},
  url          = {https://doi.org/10.1109/TIFS.2024.3360867},
  doi          = {10.1109/TIFS.2024.3360867},
  timestamp    = {Fri, 31 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/MandlikPSB24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/MaoJZ24,
  author       = {Wenze Mao and
                  Peng Jiang and
                  Liehuang Zhu},
  title        = {Locally Verifiable Batch Authentication in IoMT},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {19},
  pages        = {1001--1014},
  year         = {2024},
  url          = {https://doi.org/10.1109/TIFS.2023.3330577},
  doi          = {10.1109/TIFS.2023.3330577},
  timestamp    = {Sun, 31 Dec 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tifs/MaoJZ24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/MaoTLZC24,
  author       = {Junlong Mao and
                  Huiyi Tang and
                  Shanxiang Lyu and
                  Zhengchun Zhou and
                  Xiaochun Cao},
  title        = {Content-Aware Quantization Index Modulation: Leveraging Data Statistics
                  for Enhanced Image Watermarking},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {19},
  pages        = {1935--1947},
  year         = {2024},
  url          = {https://doi.org/10.1109/TIFS.2023.3342612},
  doi          = {10.1109/TIFS.2023.3342612},
  timestamp    = {Fri, 26 Jan 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tifs/MaoTLZC24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/MerkleSSP24,
  author       = {Florian Merkle and
                  Maximilian Samsinger and
                  Pascal Sch{\"{o}}ttle and
                  Tom{\'{a}}s Pevn{\'{y}}},
  title        = {On the Economics of Adversarial Machine Learning},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {19},
  pages        = {4670--4685},
  year         = {2024},
  url          = {https://doi.org/10.1109/TIFS.2024.3379829},
  doi          = {10.1109/TIFS.2024.3379829},
  timestamp    = {Fri, 17 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/MerkleSSP24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/MoltafetSR24,
  author       = {Mohammad Moltafet and
                  Hamid R. Sadjadpour and
                  Zouheir Rezki},
  title        = {On the Semantic Security in the General Bounded Storage Model: {A}
                  New Proof},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {19},
  pages        = {4263--4271},
  year         = {2024},
  url          = {https://doi.org/10.1109/TIFS.2024.3376959},
  doi          = {10.1109/TIFS.2024.3376959},
  timestamp    = {Fri, 31 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/MoltafetSR24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/MontibellerP24,
  author       = {Andrea Montibeller and
                  Fernando P{\'{e}}rez{-}Gonz{\'{a}}lez},
  title        = {An Adaptive Method for Camera Attribution Under Complex Radial Distortion
                  Corrections},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {19},
  pages        = {385--400},
  year         = {2024},
  url          = {https://doi.org/10.1109/TIFS.2023.3318933},
  doi          = {10.1109/TIFS.2023.3318933},
  timestamp    = {Fri, 08 Mar 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tifs/MontibellerP24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/NamCLJY24,
  author       = {Taesik Nam and
                  Dong{-}Hoon Choi and
                  Euibum Lee and
                  Han{-}Shin Jo and
                  Jong{-}Gwan Yook},
  title        = {Data Generation and Augmentation Method for Deep Learning-Based {VDU}
                  Leakage Signal Restoration Algorithm},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {19},
  pages        = {5220--5234},
  year         = {2024},
  url          = {https://doi.org/10.1109/TIFS.2024.3393748},
  doi          = {10.1109/TIFS.2024.3393748},
  timestamp    = {Fri, 17 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/NamCLJY24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/NgCLT24,
  author       = {Tiong{-}Sik Ng and
                  Jacky Chen Long Chai and
                  Cheng{-}Yaw Low and
                  Andrew Beng Jin Teoh},
  title        = {Self-Attentive Contrastive Learning for Conditioned Periocular and
                  Face Biometrics},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {19},
  pages        = {3251--3264},
  year         = {2024},
  url          = {https://doi.org/10.1109/TIFS.2024.3361216},
  doi          = {10.1109/TIFS.2024.3361216},
  timestamp    = {Thu, 29 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tifs/NgCLT24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/NguyenTSF24,
  author       = {Huy Nguyen and
                  Kien Nguyen Thanh and
                  Sridha Sridharan and
                  Clinton Fookes},
  title        = {AG-ReID.v2: Bridging Aerial and Ground Views for Person Re-Identification},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {19},
  pages        = {2896--2908},
  year         = {2024},
  url          = {https://doi.org/10.1109/TIFS.2024.3353078},
  doi          = {10.1109/TIFS.2024.3353078},
  timestamp    = {Thu, 29 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tifs/NguyenTSF24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/NiWFHS24,
  author       = {Yanyan Ni and
                  Zhen Wang and
                  Yingjie Fan and
                  Xia Huang and
                  Hao Shen},
  title        = {Secure Stabilization of Networked Lur'e Systems Suffering From DoS
                  Attacks: {A} Resilient Memory-Based Event-Trigger Mechanism},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {19},
  pages        = {4658--4669},
  year         = {2024},
  url          = {https://doi.org/10.1109/TIFS.2024.3384055},
  doi          = {10.1109/TIFS.2024.3384055},
  timestamp    = {Fri, 17 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/NiWFHS24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/NicolauPFP24,
  author       = {Adri{\'{a}}n Tobar Nicolau and
                  Javier Parra{-}Arnau and
                  Jordi Forn{\'{e}} and
                  Esteve Pallar{\`{e}}s},
  title        = {m-Eligibility With Minimum Counterfeits and Deletions for Privacy
                  Protection in Continuous Data Publishing},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {19},
  pages        = {2854--2864},
  year         = {2024},
  url          = {https://doi.org/10.1109/TIFS.2024.3354557},
  doi          = {10.1109/TIFS.2024.3354557},
  timestamp    = {Sat, 16 Mar 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tifs/NicolauPFP24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/OtroshiShahrezaHM24,
  author       = {Hatef Otroshi{-}Shahreza and
                  Vedrana Krivokuca Hahn and
                  S{\'{e}}bastien Marcel},
  title        = {Vulnerability of State-of-the-Art Face Recognition Models to Template
                  Inversion Attack},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {19},
  pages        = {4585--4600},
  year         = {2024},
  url          = {https://doi.org/10.1109/TIFS.2024.3381820},
  doi          = {10.1109/TIFS.2024.3381820},
  timestamp    = {Fri, 31 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/OtroshiShahrezaHM24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/OzfaturaOKG24,
  author       = {Kerem Ozfatura and
                  Emre Ozfatura and
                  Alptekin K{\"{u}}p{\c{c}}{\"{u}} and
                  Deniz G{\"{u}}nd{\"{u}}z},
  title        = {Byzantines Can Also Learn From History: Fall of Centered Clipping
                  in Federated Learning},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {19},
  pages        = {2010--2022},
  year         = {2024},
  url          = {https://doi.org/10.1109/TIFS.2023.3345171},
  doi          = {10.1109/TIFS.2023.3345171},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tifs/OzfaturaOKG24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/PeiDTLX24,
  author       = {Xinjun Pei and
                  Xiaoheng Deng and
                  Shengwei Tian and
                  Jianqing Liu and
                  Kaiping Xue},
  title        = {Privacy-Enhanced Graph Neural Network for Decentralized Local Graphs},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {19},
  pages        = {1614--1629},
  year         = {2024},
  url          = {https://doi.org/10.1109/TIFS.2023.3329971},
  doi          = {10.1109/TIFS.2023.3329971},
  timestamp    = {Sat, 13 Jan 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tifs/PeiDTLX24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/Pelofske24,
  author       = {Elijah Pelofske},
  title        = {Analysis of a Programmable Quantum Annealer as a Random Number Generator},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {19},
  pages        = {3636--3643},
  year         = {2024},
  url          = {https://doi.org/10.1109/TIFS.2024.3364054},
  doi          = {10.1109/TIFS.2024.3364054},
  timestamp    = {Fri, 17 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/Pelofske24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/PengLZ24,
  author       = {Baihao Peng and
                  Junfeng Liu and
                  Jun Zeng},
  title        = {Dynamic Analysis of Multiplex Networks With Hybrid Maintenance Strategies},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {19},
  pages        = {555--570},
  year         = {2024},
  url          = {https://doi.org/10.1109/TIFS.2023.3324386},
  doi          = {10.1109/TIFS.2023.3324386},
  timestamp    = {Sun, 10 Dec 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tifs/PengLZ24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/PengMLWHG24,
  author       = {Chunlei Peng and
                  Zimin Miao and
                  Decheng Liu and
                  Nannan Wang and
                  Ruimin Hu and
                  Xinbo Gao},
  title        = {Where Deepfakes Gaze at? Spatial-Temporal Gaze Inconsistency Analysis
                  for Video Face Forgery Detection},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {19},
  pages        = {4507--4517},
  year         = {2024},
  url          = {https://doi.org/10.1109/TIFS.2024.3381823},
  doi          = {10.1109/TIFS.2024.3381823},
  timestamp    = {Fri, 31 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/PengMLWHG24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/PengQMWFAAG24,
  author       = {Huaibing Peng and
                  Huming Qiu and
                  Hua Ma and
                  Shuo Wang and
                  Anmin Fu and
                  Said F. Al{-}Sarawi and
                  Derek Abbott and
                  Yansong Gao},
  title        = {On Model Outsourcing Adaptive Attacks to Deep Learning Backdoor Defenses},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {19},
  pages        = {2356--2369},
  year         = {2024},
  url          = {https://doi.org/10.1109/TIFS.2024.3349869},
  doi          = {10.1109/TIFS.2024.3349869},
  timestamp    = {Thu, 29 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tifs/PengQMWFAAG24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/PengTMLH24,
  author       = {Rongxuan Peng and
                  Shunquan Tan and
                  Xianbo Mo and
                  Bin Li and
                  Jiwu Huang},
  title        = {Employing Reinforcement Learning to Construct a Decision-Making Environment
                  for Image Forgery Localization},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {19},
  pages        = {4820--4834},
  year         = {2024},
  url          = {https://doi.org/10.1109/TIFS.2024.3381470},
  doi          = {10.1109/TIFS.2024.3381470},
  timestamp    = {Fri, 17 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/PengTMLH24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/PengYZXPHYZJ24,
  author       = {Hao Peng and
                  Jieshuai Yang and
                  Dandan Zhao and
                  Xiaogang Xu and
                  Yuwen Pu and
                  Jianmin Han and
                  Xing Yang and
                  Ming Zhong and
                  Shouling Ji},
  title        = {MalGNE: Enhancing the Performance and Efficiency of CFG-Based Malware
                  Detector by Graph Node Embedding in Low Dimension Space},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {19},
  pages        = {4881--4896},
  year         = {2024},
  url          = {https://doi.org/10.1109/TIFS.2024.3389614},
  doi          = {10.1109/TIFS.2024.3389614},
  timestamp    = {Fri, 17 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/PengYZXPHYZJ24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/QiHC24,
  author       = {Xinyu Qi and
                  Aiqun Hu and
                  Tianshu Chen},
  title        = {Lightweight Radio Frequency Fingerprint Identification Scheme for
                  {V2X} Based on Temporal Correlation},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {19},
  pages        = {1056--1070},
  year         = {2024},
  url          = {https://doi.org/10.1109/TIFS.2023.3329683},
  doi          = {10.1109/TIFS.2023.3329683},
  timestamp    = {Sun, 31 Dec 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tifs/QiHC24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/QiHT24,
  author       = {Mingping Qi and
                  Wei Hu and
                  Yu Tai},
  title        = {{SAE+:} One-Round Provably Secure Asymmetric {SAE} Protocol for Client-Server
                  Model},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {19},
  pages        = {3906--3913},
  year         = {2024},
  url          = {https://doi.org/10.1109/TIFS.2024.3372799},
  doi          = {10.1109/TIFS.2024.3372799},
  timestamp    = {Fri, 17 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/QiHT24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/QinFDLEZ24,
  author       = {Huafeng Qin and
                  Chao Fan and
                  Shaojiang Deng and
                  Yantao Li and
                  Mounim A. El{-}Yacoubi and
                  Gang Zhou},
  title        = {{AG-NAS:} An Attention GRU-Based Neural Architecture Search for Finger-Vein
                  Recognition},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {19},
  pages        = {1699--1713},
  year         = {2024},
  url          = {https://doi.org/10.1109/TIFS.2023.3340915},
  doi          = {10.1109/TIFS.2023.3340915},
  timestamp    = {Fri, 26 Apr 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/QinFDLEZ24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/QingBLMW24,
  author       = {Yuanyuan Qing and
                  Tao Bai and
                  Zhuotao Liu and
                  Pierre Moulin and
                  Bihan Wen},
  title        = {Detection of Adversarial Attacks via Disentangling Natural Images
                  and Perturbations},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {19},
  pages        = {2814--2825},
  year         = {2024},
  url          = {https://doi.org/10.1109/TIFS.2024.3352837},
  doi          = {10.1109/TIFS.2024.3352837},
  timestamp    = {Thu, 29 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tifs/QingBLMW24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/QiuMZAKFG24,
  author       = {Huming Qiu and
                  Hua Ma and
                  Zhi Zhang and
                  Alsharif Abuadbba and
                  Wei Kang and
                  Anmin Fu and
                  Yansong Gao},
  title        = {Toward a Critical Evaluation of Robustness for Deep Learning Backdoor
                  Countermeasures},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {19},
  pages        = {455--468},
  year         = {2024},
  url          = {https://doi.org/10.1109/TIFS.2023.3324318},
  doi          = {10.1109/TIFS.2023.3324318},
  timestamp    = {Sun, 10 Dec 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tifs/QiuMZAKFG24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/QiuZJFYW24,
  author       = {Pengyu Qiu and
                  Xuhong Zhang and
                  Shouling Ji and
                  Chong Fu and
                  Xing Yang and
                  Ting Wang},
  title        = {HashVFL: Defending Against Data Reconstruction Attacks in Vertical
                  Federated Learning},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {19},
  pages        = {3435--3450},
  year         = {2024},
  url          = {https://doi.org/10.1109/TIFS.2024.3356164},
  doi          = {10.1109/TIFS.2024.3356164},
  timestamp    = {Thu, 29 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tifs/QiuZJFYW24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/QuLWCJW24,
  author       = {Zhenqing Qu and
                  Xiang Ling and
                  Ting Wang and
                  Xiang Chen and
                  Shouling Ji and
                  Chunming Wu},
  title        = {AdvSQLi: Generating Adversarial {SQL} Injections Against Real-World
                  WAF-as-a-Service},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {19},
  pages        = {2623--2638},
  year         = {2024},
  url          = {https://doi.org/10.1109/TIFS.2024.3350911},
  doi          = {10.1109/TIFS.2024.3350911},
  timestamp    = {Thu, 29 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tifs/QuLWCJW24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/QuXLLWL24,
  author       = {Zuomin Qu and
                  Zuping Xi and
                  Wei Lu and
                  Xiangyang Luo and
                  Qian Wang and
                  Bin Li},
  title        = {{DF-RAP:} {A} Robust Adversarial Perturbation for Defending Against
                  Deepfakes in Real-World Social Network Scenarios},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {19},
  pages        = {3943--3957},
  year         = {2024},
  url          = {https://doi.org/10.1109/TIFS.2024.3372803},
  doi          = {10.1109/TIFS.2024.3372803},
  timestamp    = {Fri, 17 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/QuXLLWL24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/QuanDWY24,
  author       = {Weize Quan and
                  Pengfei Deng and
                  Kai Wang and
                  Dong{-}Ming Yan},
  title        = {CGFormer: ViT-Based Network for Identifying Computer-Generated Images
                  With Token Labeling},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {19},
  pages        = {235--250},
  year         = {2024},
  url          = {https://doi.org/10.1109/TIFS.2023.3322083},
  doi          = {10.1109/TIFS.2023.3322083},
  timestamp    = {Sun, 10 Dec 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tifs/QuanDWY24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/QuanLL24,
  author       = {Junyu Quan and
                  Qin Li and
                  Lvzhou Li},
  title        = {Verifiable Blind Quantum Computation With Identity Authentication
                  for Multi-Type Clients},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {19},
  pages        = {1687--1698},
  year         = {2024},
  url          = {https://doi.org/10.1109/TIFS.2023.3340859},
  doi          = {10.1109/TIFS.2023.3340859},
  timestamp    = {Sat, 13 Jan 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tifs/QuanLL24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/RajendranDTKFT24,
  author       = {Sree Ranjani Rajendran and
                  Nusrat Farzana Dipu and
                  Shams Tarek and
                  Hadi Mardani Kamali and
                  Farimah Farahmandi and
                  Mark M. Tehranipoor},
  title        = {Exploring the Abyss? Unveiling Systems-on-Chip Hardware Vulnerabilities
                  Beneath Software},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {19},
  pages        = {3914--3926},
  year         = {2024},
  url          = {https://doi.org/10.1109/TIFS.2024.3372800},
  doi          = {10.1109/TIFS.2024.3372800},
  timestamp    = {Fri, 17 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/RajendranDTKFT24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/RenLWWLWC24,
  author       = {Qian Ren and
                  Yue Li and
                  Yingjun Wu and
                  Yuchen Wu and
                  Hong Lei and
                  Lei Wang and
                  Bangdao Chen},
  title        = {DeCloak: Enable Secure and Cheap Multi-Party Transactions on Legacy
                  Blockchains by a Minimally Trusted {TEE} Network},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {19},
  pages        = {88--103},
  year         = {2024},
  url          = {https://doi.org/10.1109/TIFS.2023.3318935},
  doi          = {10.1109/TIFS.2023.3318935},
  timestamp    = {Wed, 01 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/RenLWWLWC24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/RoigGRB24,
  author       = {Dail{\'{e}} Osorio Roig and
                  L{\'{a}}zaro Janier Gonz{\'{a}}lez{-}Soler and
                  Christian Rathgeb and
                  Christoph Busch},
  title        = {Privacy-Preserving Multi-Biometric Indexing Based on Frequent Binary
                  Patterns},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {19},
  pages        = {4835--4850},
  year         = {2024},
  url          = {https://doi.org/10.1109/TIFS.2024.3386310},
  doi          = {10.1109/TIFS.2024.3386310},
  timestamp    = {Fri, 31 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/RoigGRB24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/SadeghzadehSDJ24,
  author       = {Amir Mahdi Sadeghzadeh and
                  Amir Mohammad Sobhanian and
                  Faezeh Dehghan and
                  Rasool Jalili},
  title        = {{HODA:} Hardness-Oriented Detection of Model Extraction Attacks},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {19},
  pages        = {1429--1439},
  year         = {2024},
  url          = {https://doi.org/10.1109/TIFS.2023.3320609},
  doi          = {10.1109/TIFS.2023.3320609},
  timestamp    = {Sat, 13 Jan 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tifs/SadeghzadehSDJ24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/ShaoLLZ24,
  author       = {Huikai Shao and
                  Chengcheng Liu and
                  Xiaojiang Li and
                  Dexing Zhong},
  title        = {Privacy Preserving Palmprint Recognition via Federated Metric Learning},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {19},
  pages        = {878--891},
  year         = {2024},
  url          = {https://doi.org/10.1109/TIFS.2023.3327667},
  doi          = {10.1109/TIFS.2023.3327667},
  timestamp    = {Sun, 31 Dec 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tifs/ShaoLLZ24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/ShaoZLGZ24,
  author       = {Huikai Shao and
                  Yuchen Zou and
                  Chengcheng Liu and
                  Qiang Guo and
                  Dexing Zhong},
  title        = {Learning to Generalize Unseen Dataset for Cross-Dataset Palmprint
                  Recognition},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {19},
  pages        = {3788--3799},
  year         = {2024},
  url          = {https://doi.org/10.1109/TIFS.2024.3371257},
  doi          = {10.1109/TIFS.2024.3371257},
  timestamp    = {Fri, 17 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/ShaoZLGZ24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/SharmaAW24,
  author       = {Chandra Sharma and
                  George T. Amariucai and
                  Shuangqing Wei},
  title        = {The Economics of Privacy and Utility: Investment Strategies},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {19},
  pages        = {1744--1755},
  year         = {2024},
  url          = {https://doi.org/10.1109/TIFS.2023.3341008},
  doi          = {10.1109/TIFS.2023.3341008},
  timestamp    = {Sat, 13 Jan 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tifs/SharmaAW24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/ShateriMLP24,
  author       = {Mohammadhadi Shateri and
                  Francisco Messina and
                  Fabrice Labeau and
                  Pablo Piantanida},
  title        = {Preserving Privacy in GANs Against Membership Inference Attack},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {19},
  pages        = {1728--1743},
  year         = {2024},
  url          = {https://doi.org/10.1109/TIFS.2023.3342654},
  doi          = {10.1109/TIFS.2023.3342654},
  timestamp    = {Sat, 13 Jan 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tifs/ShateriMLP24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/ShengYZZZ24,
  author       = {Chuan Sheng and
                  Yu Yao and
                  Lianxiang Zhao and
                  Peng Zeng and
                  Jianming Zhao},
  title        = {Scanner-Hunter: An Effective {ICS} Scanning Group Identification System},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {19},
  pages        = {3077--3092},
  year         = {2024},
  url          = {https://doi.org/10.1109/TIFS.2024.3359002},
  doi          = {10.1109/TIFS.2024.3359002},
  timestamp    = {Thu, 29 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tifs/ShengYZZZ24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/SongHHCLHS24,
  author       = {Xu Song and
                  Saihui Hou and
                  Yan Huang and
                  Chunshui Cao and
                  Xu Liu and
                  Yongzhen Huang and
                  Caifeng Shan},
  title        = {Gait Attribute Recognition: {A} New Benchmark for Learning Richer
                  Attributes From Human Gait Patterns},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {19},
  pages        = {1--14},
  year         = {2024},
  url          = {https://doi.org/10.1109/TIFS.2023.3318934},
  doi          = {10.1109/TIFS.2023.3318934},
  timestamp    = {Sun, 10 Dec 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tifs/SongHHCLHS24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/SongHZXJ24,
  author       = {Mingyang Song and
                  Zhongyun Hua and
                  Yifeng Zheng and
                  Tao Xiang and
                  Xiaohua Jia},
  title        = {SimLESS: {A} Secure Deduplication System Over Similar Data in Cloud
                  Media Sharing},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {19},
  pages        = {4700--4715},
  year         = {2024},
  url          = {https://doi.org/10.1109/TIFS.2024.3382603},
  doi          = {10.1109/TIFS.2024.3382603},
  timestamp    = {Fri, 17 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/SongHZXJ24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/SongSZLX24,
  author       = {Qige Song and
                  Yafei Sang and
                  Yongzheng Zhang and
                  Shuhao Li and
                  Xiaolin Xu},
  title        = {SepBIN: Binary Feature Separation for Better Semantic Comparison and
                  Authorship Verification},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {19},
  pages        = {1372--1387},
  year         = {2024},
  url          = {https://doi.org/10.1109/TIFS.2023.3331895},
  doi          = {10.1109/TIFS.2023.3331895},
  timestamp    = {Sat, 13 Jan 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tifs/SongSZLX24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/SongXZL24,
  author       = {Yaqing Song and
                  Chunxiang Xu and
                  Yuan Zhang and
                  Shiyu Li},
  title        = {Hardening Password-Based Credential Databases},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {19},
  pages        = {469--484},
  year         = {2024},
  url          = {https://doi.org/10.1109/TIFS.2023.3324326},
  doi          = {10.1109/TIFS.2023.3324326},
  timestamp    = {Sun, 10 Dec 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tifs/SongXZL24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/SuiDZ24,
  author       = {Xiao Sui and
                  Sisi Duan and
                  Haibin Zhang},
  title        = {{BG:} {A} Modular Treatment of {BFT} Consensus Toward a Unified Theory
                  of {BFT} Replication},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {19},
  pages        = {44--58},
  year         = {2024},
  url          = {https://doi.org/10.1109/TIFS.2023.3318943},
  doi          = {10.1109/TIFS.2023.3318943},
  timestamp    = {Tue, 07 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/SuiDZ24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/SunARC24,
  author       = {Guoxin Sun and
                  Tansu Alpcan and
                  Benjamin I. P. Rubinstein and
                  Seyit Camtepe},
  title        = {To Act or Not to Act: An Adversarial Game for Securing Vehicle Platoons},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {19},
  pages        = {163--177},
  year         = {2024},
  url          = {https://doi.org/10.1109/TIFS.2023.3320610},
  doi          = {10.1109/TIFS.2023.3320610},
  timestamp    = {Sun, 10 Dec 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tifs/SunARC24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/SunCZXG24,
  author       = {Rui Sun and
                  Long Chen and
                  Lei Zhang and
                  Ruirui Xie and
                  Jun Gao},
  title        = {Robust Visible-Infrared Person Re-Identification Based on Polymorphic
                  Mask and Wavelet Graph Convolutional Network},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {19},
  pages        = {2800--2813},
  year         = {2024},
  url          = {https://doi.org/10.1109/TIFS.2024.3354377},
  doi          = {10.1109/TIFS.2024.3354377},
  timestamp    = {Thu, 29 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tifs/SunCZXG24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/SunJDLMDZ24,
  author       = {Wenli Sun and
                  Xinyang Jiang and
                  Shuguang Dou and
                  Dongsheng Li and
                  Duoqian Miao and
                  Cheng Deng and
                  Cairong Zhao},
  title        = {Invisible Backdoor Attack With Dynamic Triggers Against Person Re-Identification},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {19},
  pages        = {307--319},
  year         = {2024},
  url          = {https://doi.org/10.1109/TIFS.2023.3322659},
  doi          = {10.1109/TIFS.2023.3322659},
  timestamp    = {Sun, 10 Dec 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tifs/SunJDLMDZ24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/SunRHLZ24,
  author       = {Zongkun Sun and
                  Yanzhen Ren and
                  Yihuan Huang and
                  Wuyang Liu and
                  Hongcheng Zhu},
  title        = {{AFPM:} {A} Low-Cost and Universal Adversarial Defense for Speaker
                  Recognition Systems},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {19},
  pages        = {2273--2287},
  year         = {2024},
  url          = {https://doi.org/10.1109/TIFS.2023.3348232},
  doi          = {10.1109/TIFS.2023.3348232},
  timestamp    = {Fri, 26 Jan 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tifs/SunRHLZ24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/SunYH24,
  author       = {Fangyuan Sun and
                  Jia Yu and
                  Jiankun Hu},
  title        = {Privacy-Preserving Approximate Minimum Community Search on Large Networks},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {19},
  pages        = {4146--4160},
  year         = {2024},
  url          = {https://doi.org/10.1109/TIFS.2024.3376201},
  doi          = {10.1109/TIFS.2024.3376201},
  timestamp    = {Fri, 17 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/SunYH24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/SuoCCPXL24,
  author       = {Yuhan Suo and
                  Senchun Chai and
                  Runqi Chai and
                  Zhong{-}Hua Pang and
                  Yuanqing Xia and
                  Guo{-}Ping Liu},
  title        = {Security Defense of Large-Scale Networks Under False Data Injection
                  Attacks: An Attack Detection Scheduling Approach},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {19},
  pages        = {1908--1921},
  year         = {2024},
  url          = {https://doi.org/10.1109/TIFS.2023.3340098},
  doi          = {10.1109/TIFS.2023.3340098},
  timestamp    = {Fri, 26 Jan 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tifs/SuoCCPXL24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/TanCWLP24,
  author       = {Weihang Tan and
                  Sin{-}Wei Chiu and
                  Antian Wang and
                  Yingjie Lao and
                  Keshab K. Parhi},
  title        = {PaReNTT: Low-Latency Parallel Residue Number System and NTT-Based
                  Long Polynomial Modular Multiplication for Homomorphic Encryption},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {19},
  pages        = {1646--1659},
  year         = {2024},
  url          = {https://doi.org/10.1109/TIFS.2023.3338553},
  doi          = {10.1109/TIFS.2023.3338553},
  timestamp    = {Sat, 13 Jan 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tifs/TanCWLP24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/TangDXJSW24,
  author       = {Peng Tang and
                  Guoru Ding and
                  Yitao Xu and
                  Yutao Jiao and
                  Yehui Song and
                  Guofeng Wei},
  title        = {Causal Learning for Robust Specific Emitter Identification Over Unknown
                  Channel Statistics},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {19},
  pages        = {5316--5329},
  year         = {2024},
  url          = {https://doi.org/10.1109/TIFS.2024.3393237},
  doi          = {10.1109/TIFS.2024.3393237},
  timestamp    = {Fri, 31 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/TangDXJSW24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/TangGCL24,
  author       = {Xinyu Tang and
                  Cheng Guo and
                  Kim{-}Kwang Raymond Choo and
                  Yi{-}Ning Liu},
  title        = {An Efficient and Dynamic Privacy-Preserving Federated Learning System
                  for Edge Computing},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {19},
  pages        = {207--220},
  year         = {2024},
  url          = {https://doi.org/10.1109/TIFS.2023.3320611},
  doi          = {10.1109/TIFS.2023.3320611},
  timestamp    = {Sun, 10 Dec 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tifs/TangGCL24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/TangWXC24,
  author       = {Yichao Tang and
                  Chuntao Wang and
                  Shijun Xiang and
                  Yiu{-}Ming Cheung},
  title        = {A Robust Reversible Watermarking Scheme Using Attack-Simulation-Based
                  Adaptive Normalization and Embedding},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {19},
  pages        = {4114--4129},
  year         = {2024},
  url          = {https://doi.org/10.1109/TIFS.2024.3372811},
  doi          = {10.1109/TIFS.2024.3372811},
  timestamp    = {Fri, 17 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/TangWXC24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/TangXWTPL24,
  author       = {Jinling Tang and
                  Haixia Xu and
                  Mingsheng Wang and
                  Tao Tang and
                  Chunying Peng and
                  Huimei Liao},
  title        = {A Flexible and Scalable Malicious Secure Aggregation Protocol for
                  Federated Learning},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {19},
  pages        = {4174--4187},
  year         = {2024},
  url          = {https://doi.org/10.1109/TIFS.2024.3375527},
  doi          = {10.1109/TIFS.2024.3375527},
  timestamp    = {Fri, 17 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/TangXWTPL24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/TangZLCH24,
  author       = {Weixuan Tang and
                  Zhili Zhou and
                  Bin Li and
                  Kim{-}Kwang Raymond Choo and
                  Jiwu Huang},
  title        = {Joint Cost Learning and Payload Allocation With Image-Wise Attention
                  for Batch Steganography},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {19},
  pages        = {2826--2839},
  year         = {2024},
  url          = {https://doi.org/10.1109/TIFS.2024.3354411},
  doi          = {10.1109/TIFS.2024.3354411},
  timestamp    = {Thu, 29 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tifs/TangZLCH24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/TangZLDL24,
  author       = {Wenbing Tang and
                  Yuan Zhou and
                  Yang Liu and
                  Zuohua Ding and
                  Jing Liu},
  title        = {Robust Motion Planning for Multi-Robot Systems Against Position Deception
                  Attacks},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {19},
  pages        = {2157--2170},
  year         = {2024},
  url          = {https://doi.org/10.1109/TIFS.2023.3346647},
  doi          = {10.1109/TIFS.2023.3346647},
  timestamp    = {Fri, 26 Jan 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tifs/TangZLDL24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/TengZCJX24,
  author       = {Yulin Teng and
                  Pinchang Zhang and
                  Xiao Chen and
                  Xiaohong Jiang and
                  Fu Xiao},
  title        = {PHY-Layer Authentication Exploiting Channel Sparsity in MmWave {MIMO}
                  UAV-Ground Systems},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {19},
  pages        = {4642--4657},
  year         = {2024},
  url          = {https://doi.org/10.1109/TIFS.2024.3384112},
  doi          = {10.1109/TIFS.2024.3384112},
  timestamp    = {Fri, 17 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/TengZCJX24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/TianCYFWDH24,
  author       = {Jiahe Tian and
                  Peng Chen and
                  Cai Yu and
                  Xiaomeng Fu and
                  Xi Wang and
                  Jiao Dai and
                  Jizhong Han},
  title        = {Learning to Discover Forgery Cues for Face Forgery Detection},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {19},
  pages        = {3814--3828},
  year         = {2024},
  url          = {https://doi.org/10.1109/TIFS.2024.3372773},
  doi          = {10.1109/TIFS.2024.3372773},
  timestamp    = {Fri, 17 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/TianCYFWDH24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/TianLLSZ24,
  author       = {Yangguang Tian and
                  Bowen Liu and
                  Yingjiu Li and
                  Pawel Szalachowski and
                  Jianying Zhou},
  title        = {Accountable Fine-Grained Blockchain Rewriting in the Permissionless
                  Setting},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {19},
  pages        = {1756--1766},
  year         = {2024},
  url          = {https://doi.org/10.1109/TIFS.2023.3340917},
  doi          = {10.1109/TIFS.2023.3340917},
  timestamp    = {Sat, 13 Jan 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tifs/TianLLSZ24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/TianMLZMX24,
  author       = {Chuang Tian and
                  Jianfeng Ma and
                  Teng Li and
                  Junwei Zhang and
                  Chengyan Ma and
                  Ning Xi},
  title        = {Provably and Physically Secure UAV-Assisted Authentication Protocol
                  for IoT Devices in Unattended Settings},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {19},
  pages        = {4448--4463},
  year         = {2024},
  url          = {https://doi.org/10.1109/TIFS.2024.3379861},
  doi          = {10.1109/TIFS.2024.3379861},
  timestamp    = {Fri, 31 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/TianMLZMX24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/TihanyiBBR24,
  author       = {Norbert Tihanyi and
                  Tam{\'{a}}s Bisztray and
                  Bertalan Borsos and
                  Sebastien Raveau},
  title        = {Privacy-Preserving Password Cracking: How a Third Party Can Crack
                  Our Password Hash Without Learning the Hash Value or the Cleartext},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {19},
  pages        = {2981--2996},
  year         = {2024},
  url          = {https://doi.org/10.1109/TIFS.2024.3356162},
  doi          = {10.1109/TIFS.2024.3356162},
  timestamp    = {Sat, 16 Mar 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tifs/TihanyiBBR24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/TongLMWLD24,
  author       = {Qiuyun Tong and
                  Xinghua Li and
                  Yinbin Miao and
                  Yunwei Wang and
                  Ximeng Liu and
                  Robert H. Deng},
  title        = {Beyond Result Verification: Efficient Privacy-Preserving Spatial Keyword
                  Query With Suppressed Leakage},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {19},
  pages        = {2746--2760},
  year         = {2024},
  url          = {https://doi.org/10.1109/TIFS.2024.3354414},
  doi          = {10.1109/TIFS.2024.3354414},
  timestamp    = {Thu, 29 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tifs/TongLMWLD24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/TosunS24,
  author       = {Tolun Tosun and
                  Erkay Savas},
  title        = {Zero-Value Filtering for Accelerating Non-Profiled Side-Channel Attack
                  on Incomplete NTT-Based Implementations of Lattice-Based Cryptography},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {19},
  pages        = {3353--3365},
  year         = {2024},
  url          = {https://doi.org/10.1109/TIFS.2024.3359890},
  doi          = {10.1109/TIFS.2024.3359890},
  timestamp    = {Thu, 29 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tifs/TosunS24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/TuttTCPBHV24,
  author       = {Joakim Tutt and
                  Olga Taran and
                  Roman Chaban and
                  Brian Pulfer and
                  Yury Belousov and
                  Taras Holotyak and
                  Slava Voloshynovskiy},
  title        = {Authentication of Copy Detection Patterns: {A} Pattern Reliability
                  Based Approach},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {19},
  pages        = {3124--3134},
  year         = {2024},
  url          = {https://doi.org/10.1109/TIFS.2024.3359510},
  doi          = {10.1109/TIFS.2024.3359510},
  timestamp    = {Fri, 01 Mar 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tifs/TuttTCPBHV24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/UddinYJO24,
  author       = {Kutub Uddin and
                  Yoonmo Yang and
                  Tae Hyun Jeong and
                  Byung Tae Oh},
  title        = {A Robust Open-Set Multi-Instance Learning for Defending Adversarial
                  Attacks in Digital Image},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {19},
  pages        = {2098--2111},
  year         = {2024},
  url          = {https://doi.org/10.1109/TIFS.2023.3346211},
  doi          = {10.1109/TIFS.2023.3346211},
  timestamp    = {Fri, 26 Jan 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tifs/UddinYJO24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/VedadiKS24,
  author       = {Elahe Vedadi and
                  Yasaman Keshtkarjahromi and
                  Hulya Seferoglu},
  title        = {Efficient Coded Multi-Party Computation at Edge Networks},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {19},
  pages        = {807--820},
  year         = {2024},
  url          = {https://doi.org/10.1109/TIFS.2023.3326970},
  doi          = {10.1109/TIFS.2023.3326970},
  timestamp    = {Fri, 08 Mar 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tifs/VedadiKS24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/ViceAHM24,
  author       = {Jordan Vice and
                  Naveed Akhtar and
                  Richard I. Hartley and
                  Ajmal Mian},
  title        = {{BAGM:} {A} Backdoor Attack for Manipulating Text-to-Image Generative
                  Models},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {19},
  pages        = {4865--4880},
  year         = {2024},
  url          = {https://doi.org/10.1109/TIFS.2024.3386058},
  doi          = {10.1109/TIFS.2024.3386058},
  timestamp    = {Fri, 17 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/ViceAHM24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/WahrstatterSDBS24,
  author       = {Anton Wahrst{\"{a}}tter and
                  Matthew Solomon and
                  Ben DiFrancesco and
                  Vitalik Buterin and
                  Davor Svetinovic},
  title        = {BaseSAP: Modular Stealth Address Protocol for Programmable Blockchains},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {19},
  pages        = {3539--3553},
  year         = {2024},
  url          = {https://doi.org/10.1109/TIFS.2024.3364081},
  doi          = {10.1109/TIFS.2024.3364081},
  timestamp    = {Fri, 17 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/WahrstatterSDBS24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/WangCMHWJ24,
  author       = {Mingyue Wang and
                  Zizhuo Chen and
                  Yinbin Miao and
                  Hejiao Huang and
                  Cong Wang and
                  Xiaohua Jia},
  title        = {Cross-User Leakage Mitigation for Authorized Multi-User Encrypted
                  Data Sharing},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {19},
  pages        = {1213--1226},
  year         = {2024},
  url          = {https://doi.org/10.1109/TIFS.2023.3333244},
  doi          = {10.1109/TIFS.2023.3333244},
  timestamp    = {Tue, 07 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/WangCMHWJ24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/WangCZHZ24,
  author       = {Fengqun Wang and
                  Jie Cui and
                  Qingyang Zhang and
                  Debiao He and
                  Hong Zhong},
  title        = {Blockchain-Based Secure Cross-Domain Data Sharing for Edge-Assisted
                  Industrial Internet of Things},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {19},
  pages        = {3892--3905},
  year         = {2024},
  url          = {https://doi.org/10.1109/TIFS.2024.3372806},
  doi          = {10.1109/TIFS.2024.3372806},
  timestamp    = {Fri, 17 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/WangCZHZ24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/WangDCGXZ24,
  author       = {Ning Wang and
                  Jixuan Duan and
                  Biwen Chen and
                  Shangwei Guo and
                  Tao Xiang and
                  Kai Zeng},
  title        = {Efficient Group Key Generation Based on Satellite Cluster State Information
                  for Drone Swarm},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {19},
  pages        = {4464--4479},
  year         = {2024},
  url          = {https://doi.org/10.1109/TIFS.2024.3381432},
  doi          = {10.1109/TIFS.2024.3381432},
  timestamp    = {Fri, 31 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/WangDCGXZ24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/WangGBJ24,
  author       = {Haodi Wang and
                  Yu Guo and
                  Rongfang Bie and
                  Xiaohua Jia},
  title        = {Verifiable Arbitrary Queries With Zero Knowledge Confidentiality in
                  Decentralized Storage},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {19},
  pages        = {1071--1085},
  year         = {2024},
  url          = {https://doi.org/10.1109/TIFS.2023.3330305},
  doi          = {10.1109/TIFS.2023.3330305},
  timestamp    = {Sun, 31 Dec 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tifs/WangGBJ24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/WangHJGC24,
  author       = {Lipeng Wang and
                  Mingsheng Hu and
                  Zhijuan Jia and
                  Zhi Guan and
                  Zhong Chen},
  title        = {SStore: An Efficient and Secure Provable Data Auditing Platform for
                  Cloud},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {19},
  pages        = {4572--4584},
  year         = {2024},
  url          = {https://doi.org/10.1109/TIFS.2024.3383772},
  doi          = {10.1109/TIFS.2024.3383772},
  timestamp    = {Fri, 31 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/WangHJGC24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/WangLHH24,
  author       = {Xiaohu Wang and
                  Chao Lin and
                  Xinyi Huang and
                  Debiao He},
  title        = {Anonymity-Enhancing Multi-Hop Locks for Monero-Enabled Payment Channel
                  Networks},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {19},
  pages        = {2438--2453},
  year         = {2024},
  url          = {https://doi.org/10.1109/TIFS.2023.3346177},
  doi          = {10.1109/TIFS.2023.3346177},
  timestamp    = {Fri, 26 Jan 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tifs/WangLHH24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/WangLJLLL24,
  author       = {Xiangming Wang and
                  Yang Liu and
                  Kexin Jiao and
                  Pengfei Liu and
                  Xiapu Luo and
                  Ting Liu},
  title        = {Intrusion Device Detection in Fieldbus Networks Based on Channel-State
                  Group Fingerprint},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {19},
  pages        = {4012--4027},
  year         = {2024},
  url          = {https://doi.org/10.1109/TIFS.2024.3374596},
  doi          = {10.1109/TIFS.2024.3374596},
  timestamp    = {Fri, 17 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/WangLJLLL24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/WangLXRWZC24,
  author       = {Qiuhua Wang and
                  Chengyu Li and
                  Tianyu Xia and
                  Yizhi Ren and
                  Dong Wang and
                  Guoyan Zhang and
                  Kim{-}Kwang Raymond Choo},
  title        = {Optimal Selfish Mining-Based Denial-of-Service Attack},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {19},
  pages        = {835--850},
  year         = {2024},
  url          = {https://doi.org/10.1109/TIFS.2023.3326386},
  doi          = {10.1109/TIFS.2023.3326386},
  timestamp    = {Sun, 31 Dec 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tifs/WangLXRWZC24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/WangSBXDL24,
  author       = {Yuntao Wang and
                  Zhou Su and
                  Abderrahim Benslimane and
                  Qichao Xu and
                  Minghui Dai and
                  Ruidong Li},
  title        = {Collaborative Honeypot Defense in {UAV} Networks: {A} Learning-Based
                  Game Approach},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {19},
  pages        = {1963--1978},
  year         = {2024},
  url          = {https://doi.org/10.1109/TIFS.2023.3318942},
  doi          = {10.1109/TIFS.2023.3318942},
  timestamp    = {Fri, 26 Jan 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tifs/WangSBXDL24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/WangTCGWZX24,
  author       = {Haotian Wang and
                  Jun Tao and
                  Dingwen Chi and
                  Yu Gao and
                  Zuyan Wang and
                  Dika Zou and
                  Yifan Xu},
  title        = {A Preference-Driven Malicious Platform Detection Mechanism for Users
                  in Mobile Crowdsensing},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {19},
  pages        = {2720--2731},
  year         = {2024},
  url          = {https://doi.org/10.1109/TIFS.2024.3352412},
  doi          = {10.1109/TIFS.2024.3352412},
  timestamp    = {Wed, 17 Apr 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/WangTCGWZX24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/WangYFW24,
  author       = {Minxiao Wang and
                  Ning Yang and
                  Nicolas J. Forcade{-}Perkins and
                  Ning Weng},
  title        = {ProGen: Projection-Based Adversarial Attack Generation Against Network
                  Intrusion Detection},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {19},
  pages        = {5476--5491},
  year         = {2024},
  url          = {https://doi.org/10.1109/TIFS.2024.3402155},
  doi          = {10.1109/TIFS.2024.3402155},
  timestamp    = {Wed, 29 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/WangYFW24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/WangYH24,
  author       = {Min Wang and
                  Xuefei Yin and
                  Jiankun Hu},
  title        = {Cancellable Deep Learning Framework for {EEG} Biometrics},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {19},
  pages        = {3745--3757},
  year         = {2024},
  url          = {https://doi.org/10.1109/TIFS.2024.3369405},
  doi          = {10.1109/TIFS.2024.3369405},
  timestamp    = {Fri, 17 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/WangYH24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/WangYMLHTL24,
  author       = {Huanran Wang and
                  Wu Yang and
                  Dapeng Man and
                  Jiguang Lv and
                  Shuai Han and
                  Jingwen Tan and
                  Tao Liu},
  title        = {Anchor Link Prediction for Cross-Network Digital Forensics From Local
                  and Global Perspectives},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {19},
  pages        = {3620--3635},
  year         = {2024},
  url          = {https://doi.org/10.1109/TIFS.2024.3364066},
  doi          = {10.1109/TIFS.2024.3364066},
  timestamp    = {Fri, 17 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/WangYMLHTL24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/WangYZWSS24,
  author       = {Taiyu Wang and
                  Qinglin Yang and
                  Kaiming Zhu and
                  Junbo Wang and
                  Chunhua Su and
                  Kento Sato},
  title        = {{LDS-FL:} Loss Differential Strategy Based Federated Learning for
                  Privacy Preserving},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {19},
  pages        = {1015--1030},
  year         = {2024},
  url          = {https://doi.org/10.1109/TIFS.2023.3322328},
  doi          = {10.1109/TIFS.2023.3322328},
  timestamp    = {Sun, 31 Dec 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tifs/WangYZWSS24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/WangZTY24,
  author       = {Weiqi Wang and
                  Chenhan Zhang and
                  Zhiyi Tian and
                  Shui Yu},
  title        = {Machine Unlearning via Representation Forgetting With Parameter Self-Sharing},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {19},
  pages        = {1099--1111},
  year         = {2024},
  url          = {https://doi.org/10.1109/TIFS.2023.3331239},
  doi          = {10.1109/TIFS.2023.3331239},
  timestamp    = {Sun, 31 Dec 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tifs/WangZTY24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/WangZWGFL24,
  author       = {Na Wang and
                  Wen Zhou and
                  Jingjing Wang and
                  Yifan Guo and
                  Junsong Fu and
                  Jianwei Liu},
  title        = {Secure and Efficient Similarity Retrieval in Cloud Computing Based
                  on Homomorphic Encryption},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {19},
  pages        = {2454--2469},
  year         = {2024},
  url          = {https://doi.org/10.1109/TIFS.2024.3350909},
  doi          = {10.1109/TIFS.2024.3350909},
  timestamp    = {Thu, 16 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/WangZWGFL24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/WangZYHT24,
  author       = {Jiaxiang Wang and
                  Aihua Zheng and
                  Yan Yan and
                  Ran He and
                  Jin Tang},
  title        = {Attribute-Guided Cross-Modal Interaction and Enhancement for Audio-Visual
                  Matching},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {19},
  pages        = {4986--4998},
  year         = {2024},
  url          = {https://doi.org/10.1109/TIFS.2024.3388949},
  doi          = {10.1109/TIFS.2024.3388949},
  timestamp    = {Fri, 17 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/WangZYHT24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/WeiFJJL24,
  author       = {Jiali Wei and
                  Ming Fan and
                  Wenjing Jiao and
                  Wuxia Jin and
                  Ting Liu},
  title        = {{BDMMT:} Backdoor Sample Detection for Language Models Through Model
                  Mutation Testing},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {19},
  pages        = {4285--4300},
  year         = {2024},
  url          = {https://doi.org/10.1109/TIFS.2024.3376968},
  doi          = {10.1109/TIFS.2024.3376968},
  timestamp    = {Fri, 31 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/WeiFJJL24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/WeiJWHDLCPW24,
  author       = {Yu Wei and
                  Jingyu Jia and
                  Yuduo Wu and
                  Changhui Hu and
                  Changyu Dong and
                  Zheli Liu and
                  Xiaofeng Chen and
                  Yun Peng and
                  Shaowei Wang},
  title        = {Distributed Differential Privacy via Shuffling Versus Aggregation:
                  {A} Curious Study},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {19},
  pages        = {2501--2516},
  year         = {2024},
  url          = {https://doi.org/10.1109/TIFS.2024.3351474},
  doi          = {10.1109/TIFS.2024.3351474},
  timestamp    = {Fri, 26 Jan 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tifs/WeiJWHDLCPW24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/WeiXC24,
  author       = {Xiangye Wei and
                  Liming Xiu and
                  Yimao Cai},
  title        = {A Perspective of Using Frequency-Mixing as Entropy in Random Number
                  Generation for Portable Hardware Cybersecurity {IP}},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {19},
  pages        = {320--333},
  year         = {2024},
  url          = {https://doi.org/10.1109/TIFS.2023.3322602},
  doi          = {10.1109/TIFS.2023.3322602},
  timestamp    = {Sun, 10 Dec 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tifs/WeiXC24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/WeiYWG24,
  author       = {Ziyu Wei and
                  Xi Yang and
                  Nannan Wang and
                  Xinbo Gao},
  title        = {Dual-Adversarial Representation Disentanglement for Visible Infrared
                  Person Re-Identification},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {19},
  pages        = {2186--2200},
  year         = {2024},
  url          = {https://doi.org/10.1109/TIFS.2023.3344289},
  doi          = {10.1109/TIFS.2023.3344289},
  timestamp    = {Fri, 26 Jan 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tifs/WeiYWG24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/WenCFCXT24,
  author       = {Yun Wen and
                  Gaojie Chen and
                  Sisai Fang and
                  Zheng Chu and
                  Pei Xiao and
                  Rahim Tafazolli},
  title        = {STAR-RIS-Assisted-Full-Duplex Jamming Design for Secure Wireless Communications
                  System},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {19},
  pages        = {4331--4343},
  year         = {2024},
  url          = {https://doi.org/10.1109/TIFS.2024.3376248},
  doi          = {10.1109/TIFS.2024.3376248},
  timestamp    = {Fri, 17 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/WenCFCXT24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/WenCFWTR24,
  author       = {Yun Wen and
                  Gaojie Chen and
                  Sisai Fang and
                  Miaowen Wen and
                  Stefano Tomasin and
                  Marco Di Renzo},
  title        = {RIS-Assisted {UAV} Secure Communications With Artificial Noise-Aware
                  Trajectory Design Against Multiple Colluding Curious Users},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {19},
  pages        = {3064--3076},
  year         = {2024},
  url          = {https://doi.org/10.1109/TIFS.2024.3356166},
  doi          = {10.1109/TIFS.2024.3356166},
  timestamp    = {Thu, 29 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tifs/WenCFWTR24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/WenM24,
  author       = {Daolin Wen and
                  Xiaowu Mu},
  title        = {Secure Dual Asynchronous Tracking Control for Markov Jump Systems
                  Under Hybrid Cyberattacks},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {19},
  pages        = {3226--3236},
  year         = {2024},
  url          = {https://doi.org/10.1109/TIFS.2024.3359459},
  doi          = {10.1109/TIFS.2024.3359459},
  timestamp    = {Thu, 29 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tifs/WenM24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/WengYDHWW24,
  author       = {Jia{-}Si Weng and
                  Shenglong Yao and
                  Yuefeng Du and
                  Junjie Huang and
                  Jian Weng and
                  Cong Wang},
  title        = {Proof of Unlearning: Definitions and Instantiation},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {19},
  pages        = {3309--3323},
  year         = {2024},
  url          = {https://doi.org/10.1109/TIFS.2024.3358993},
  doi          = {10.1109/TIFS.2024.3358993},
  timestamp    = {Thu, 29 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tifs/WengYDHWW24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/WongHGSC24,
  author       = {Guo{-}Wei Wong and
                  Yi{-}Ting Huang and
                  Ying{-}Ren Guo and
                  Yeali S. Sun and
                  Meng Chang Chen},
  title        = {Attention-Based {API} Locating for Malware Techniques},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {19},
  pages        = {1199--1212},
  year         = {2024},
  url          = {https://doi.org/10.1109/TIFS.2023.3330337},
  doi          = {10.1109/TIFS.2023.3330337},
  timestamp    = {Sun, 31 Dec 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tifs/WongHGSC24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/WuCDMS24,
  author       = {Tongshuai Wu and
                  Liwei Chen and
                  Gewangzi Du and
                  Dan Meng and
                  Gang Shi},
  title        = {UltraVCS: Ultra-Fine-Grained Variable-Based Code Slicing for Automated
                  Vulnerability Detection},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {19},
  pages        = {3986--4000},
  year         = {2024},
  url          = {https://doi.org/10.1109/TIFS.2024.3374219},
  doi          = {10.1109/TIFS.2024.3374219},
  timestamp    = {Fri, 17 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/WuCDMS24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/WuCTLLH24,
  author       = {Hao{-}Tian Wu and
                  Yiu{-}Ming Cheung and
                  Zhihong Tian and
                  Dingcai Liu and
                  Xiangyang Luo and
                  Jiankun Hu},
  title        = {Lossless Data Hiding in {NTRU} Cryptosystem by Polynomial Encoding
                  and Modulation},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {19},
  pages        = {3719--3732},
  year         = {2024},
  url          = {https://doi.org/10.1109/TIFS.2024.3362592},
  doi          = {10.1109/TIFS.2024.3362592},
  timestamp    = {Fri, 17 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/WuCTLLH24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/WuLFYCZS24,
  author       = {Jiajing Wu and
                  Dan Lin and
                  Qishuang Fu and
                  Shuo Yang and
                  Ting Chen and
                  Zibin Zheng and
                  Bowen Song},
  title        = {Toward Understanding Asset Flows in Crypto Money Laundering Through
                  the Lenses of Ethereum Heists},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {19},
  pages        = {1994--2009},
  year         = {2024},
  url          = {https://doi.org/10.1109/TIFS.2023.3346276},
  doi          = {10.1109/TIFS.2023.3346276},
  timestamp    = {Fri, 26 Jan 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tifs/WuLFYCZS24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/WuZL24,
  author       = {Jiahui Wu and
                  Weizhe Zhang and
                  Fucai Luo},
  title        = {On the Security of "LSFL: {A} Lightweight and Secure Federated Learning
                  Scheme for Edge Computing"},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {19},
  pages        = {3481--3482},
  year         = {2024},
  url          = {https://doi.org/10.1109/TIFS.2023.3331274},
  doi          = {10.1109/TIFS.2023.3331274},
  timestamp    = {Sat, 16 Mar 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tifs/WuZL24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/WuZZTS24,
  author       = {Haiwei Wu and
                  Jiantao Zhou and
                  Xinyu Zhang and
                  Jinyu Tian and
                  Weiwei Sun},
  title        = {Robust Camera Model Identification Over Online Social Network Shared
                  Images via Multi-Scenario Learning},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {19},
  pages        = {148--162},
  year         = {2024},
  url          = {https://doi.org/10.1109/TIFS.2023.3318968},
  doi          = {10.1109/TIFS.2023.3318968},
  timestamp    = {Sun, 10 Dec 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tifs/WuZZTS24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/XiaLLYWG24,
  author       = {Ruiyang Xia and
                  Decheng Liu and
                  Jie Li and
                  Lin Yuan and
                  Nannan Wang and
                  Xinbo Gao},
  title        = {MMNet: Multi-Collaboration and Multi-Supervision Network for Sequential
                  Deepfake Detection},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {19},
  pages        = {3409--3422},
  year         = {2024},
  url          = {https://doi.org/10.1109/TIFS.2024.3361151},
  doi          = {10.1109/TIFS.2024.3361151},
  timestamp    = {Sat, 16 Mar 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tifs/XiaLLYWG24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/XiaOGXZAA24,
  author       = {Qi Xia and
                  Isaac Amankona Obiri and
                  Jianbin Gao and
                  Hu Xia and
                  Xiaosong Zhang and
                  Kwame Omono Asamoah and
                  Sandro Amofa},
  title        = {{PRIDN:} {A} Privacy Preserving Data Sharing on Named Data Networking},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {19},
  pages        = {677--692},
  year         = {2024},
  url          = {https://doi.org/10.1109/TIFS.2023.3327660},
  doi          = {10.1109/TIFS.2023.3327660},
  timestamp    = {Sun, 10 Dec 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tifs/XiaOGXZAA24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/XiangLBLYLRC24,
  author       = {Yuexin Xiang and
                  Yuchen Lei and
                  Ding Bao and
                  Tiantian Li and
                  Qingqing Yang and
                  Wenmao Liu and
                  Wei Ren and
                  Kim{-}Kwang Raymond Choo},
  title        = {{BABD:} {A} Bitcoin Address Behavior Dataset for Pattern Analysis},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {19},
  pages        = {2171--2185},
  year         = {2024},
  url          = {https://doi.org/10.1109/TIFS.2023.3347894},
  doi          = {10.1109/TIFS.2023.3347894},
  timestamp    = {Fri, 26 Jan 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tifs/XiangLBLYLRC24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/XiaoXZWY24,
  author       = {Peng Xiao and
                  Qibin Xiao and
                  Xusheng Zhang and
                  Yumei Wu and
                  Fengyu Yang},
  title        = {Vulnerability Detection Based on Enhanced Graph Representation Learning},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {19},
  pages        = {5120--5135},
  year         = {2024},
  url          = {https://doi.org/10.1109/TIFS.2024.3392536},
  doi          = {10.1109/TIFS.2024.3392536},
  timestamp    = {Fri, 17 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/XiaoXZWY24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/XiaoZHXW24,
  author       = {Xiangli Xiao and
                  Yushu Zhang and
                  Zhongyun Hua and
                  Zhihua Xia and
                  Jian Weng},
  title        = {Client-Side Embedding of Screen-Shooting Resilient Image Watermarking},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {19},
  pages        = {5357--5372},
  year         = {2024},
  url          = {https://doi.org/10.1109/TIFS.2024.3397043},
  doi          = {10.1109/TIFS.2024.3397043},
  timestamp    = {Fri, 31 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/XiaoZHXW24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/XieCWY24,
  author       = {Yuankun Xie and
                  Haonan Cheng and
                  Yutian Wang and
                  Long Ye},
  title        = {Domain Generalization via Aggregation and Separation for Audio Deepfake
                  Detection},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {19},
  pages        = {344--358},
  year         = {2024},
  url          = {https://doi.org/10.1109/TIFS.2023.3324724},
  doi          = {10.1109/TIFS.2023.3324724},
  timestamp    = {Sun, 10 Dec 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tifs/XieCWY24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/XieSZMWLZ24,
  author       = {Zhijie Xie and
                  Fan Shi and
                  Min Zhang and
                  Huimin Ma and
                  Huaixi Wang and
                  Zhenhan Li and
                  Yunyi Zhang},
  title        = {GuessFuse: Hybrid Password Guessing With Multi-View},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {19},
  pages        = {4215--4230},
  year         = {2024},
  url          = {https://doi.org/10.1109/TIFS.2024.3376246},
  doi          = {10.1109/TIFS.2024.3376246},
  timestamp    = {Fri, 31 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/XieSZMWLZ24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/XieYWBCW24,
  author       = {Dong Xie and
                  Jinghua Yang and
                  Bin Wu and
                  Weixin Bian and
                  Fulong Chen and
                  Taochun Wang},
  title        = {An Effectively Applicable to Resource Constrained Devices and Semi-Trusted
                  Servers Authenticated Key Agreement Scheme},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {19},
  pages        = {3451--3464},
  year         = {2024},
  url          = {https://doi.org/10.1109/TIFS.2024.3362589},
  doi          = {10.1109/TIFS.2024.3362589},
  timestamp    = {Thu, 29 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tifs/XieYWBCW24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/XinWWLG24,
  author       = {Jingwei Xin and
                  Zikai Wei and
                  Nannan Wang and
                  Jie Li and
                  Xinbo Gao},
  title        = {Large Pose Face Recognition via Facial Representation Learning},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {19},
  pages        = {934--946},
  year         = {2024},
  url          = {https://doi.org/10.1109/TIFS.2023.3329686},
  doi          = {10.1109/TIFS.2023.3329686},
  timestamp    = {Sun, 31 Dec 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tifs/XinWWLG24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/XingLYIM24,
  author       = {Zheng Xing and
                  Chan{-}Tong Lam and
                  Xiaochen Yuan and
                  Sio Kei Im and
                  Penousal Machado},
  title        = {{MMQW:} Multi-Modal Quantum Watermarking Scheme},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {19},
  pages        = {5181--5195},
  year         = {2024},
  url          = {https://doi.org/10.1109/TIFS.2024.3394768},
  doi          = {10.1109/TIFS.2024.3394768},
  timestamp    = {Fri, 17 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/XingLYIM24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/XuCCHQ24,
  author       = {Gehui Xu and
                  Guanpu Chen and
                  Zhaoyang Cheng and
                  Yiguang Hong and
                  Hongsheng Qi},
  title        = {Consistency of Stackelberg and Nash Equilibria in Three-Player Leader-Follower
                  Games},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {19},
  pages        = {5330--5344},
  year         = {2024},
  url          = {https://doi.org/10.1109/TIFS.2024.3397196},
  doi          = {10.1109/TIFS.2024.3397196},
  timestamp    = {Fri, 31 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/XuCCHQ24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/XuCLLW24,
  author       = {Dandan Xu and
                  Kai Chen and
                  Miaoqian Lin and
                  Chaoyang Lin and
                  Xiaofeng Wang},
  title        = {AutoPwn: Artifact-Assisted Heap Exploit Generation for {CTF} {PWN}
                  Competitions},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {19},
  pages        = {293--306},
  year         = {2024},
  url          = {https://doi.org/10.1109/TIFS.2023.3322319},
  doi          = {10.1109/TIFS.2023.3322319},
  timestamp    = {Sun, 10 Dec 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tifs/XuCLLW24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/XuCYLT24,
  author       = {Peng Xu and
                  Gaojie Chen and
                  Zheng Yang and
                  Yong Li and
                  Stefano Tomasin},
  title        = {Multiple Access Wiretap Channel With Partial Rate-Limited Feedback},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {19},
  pages        = {3279--3294},
  year         = {2024},
  url          = {https://doi.org/10.1109/TIFS.2024.3359071},
  doi          = {10.1109/TIFS.2024.3359071},
  timestamp    = {Thu, 29 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tifs/XuCYLT24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/XuFZZ24,
  author       = {Nanqing Xu and
                  Weiwei Feng and
                  Tianzhu Zhang and
                  Yongdong Zhang},
  title        = {A Unified Optimization Framework for Feature-Based Transferable Attacks},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {19},
  pages        = {4794--4808},
  year         = {2024},
  url          = {https://doi.org/10.1109/TIFS.2024.3380248},
  doi          = {10.1109/TIFS.2024.3380248},
  timestamp    = {Fri, 17 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/XuFZZ24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/XuLGX24,
  author       = {Yinfei Xu and
                  Jian Lu and
                  Xuan Guang and
                  Wei Xu},
  title        = {Information Embedding With Stegotext Reconstruction},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {19},
  pages        = {1415--1428},
  year         = {2024},
  url          = {https://doi.org/10.1109/TIFS.2023.3337947},
  doi          = {10.1109/TIFS.2023.3337947},
  timestamp    = {Sat, 13 Jan 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tifs/XuLGX24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/XuYCYLW24,
  author       = {Peng Xu and
                  Jun Yang and
                  Gaojie Chen and
                  Zheng Yang and
                  Yong Li and
                  Moe Z. Win},
  title        = {Physical-Layer Secret and Private Key Generation in Wireless Relay
                  Networks With Correlated Eavesdropping Channels},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {19},
  pages        = {985--1000},
  year         = {2024},
  url          = {https://doi.org/10.1109/TIFS.2023.3329740},
  doi          = {10.1109/TIFS.2023.3329740},
  timestamp    = {Sun, 31 Dec 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tifs/XuYCYLW24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/XuZMML24,
  author       = {Chongyao Xu and
                  Litao Zhang and
                  Pui{-}In Mak and
                  Rui Paulo Martins and
                  Man{-}Kay Law},
  title        = {Fully Symmetrical Obfuscated Interconnection and Weak-PUF-Assisted
                  Challenge Obfuscation Strong PUFs Against Machine-Learning Modeling
                  Attacks},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {19},
  pages        = {3927--3942},
  year         = {2024},
  url          = {https://doi.org/10.1109/TIFS.2024.3372801},
  doi          = {10.1109/TIFS.2024.3372801},
  timestamp    = {Fri, 17 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/XuZMML24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/XuZZ24,
  author       = {Min Xu and
                  Ximiao Zhang and
                  Xiuzhuang Zhou},
  title        = {Confidence-Calibrated Face and Kinship Verification},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {19},
  pages        = {372--384},
  year         = {2024},
  url          = {https://doi.org/10.1109/TIFS.2023.3318957},
  doi          = {10.1109/TIFS.2023.3318957},
  timestamp    = {Sun, 10 Dec 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tifs/XuZZ24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/XueWJZWP24,
  author       = {Yiming Xue and
                  Jiaxuan Wu and
                  Ronghua Ji and
                  Ping Zhong and
                  Juan Wen and
                  Wanli Peng},
  title        = {Adaptive Domain-Invariant Feature Extraction for Cross-Domain Linguistic
                  Steganalysis},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {19},
  pages        = {920--933},
  year         = {2024},
  url          = {https://doi.org/10.1109/TIFS.2023.3328455},
  doi          = {10.1109/TIFS.2023.3328455},
  timestamp    = {Sun, 31 Dec 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tifs/XueWJZWP24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/XueXZLZSL24,
  author       = {Rui Xue and
                  Kaiping Xue and
                  Bin Zhu and
                  Xinyi Luo and
                  Tianwei Zhang and
                  Qibin Sun and
                  Jun Lu},
  title        = {Differentially Private Federated Learning With an Adaptive Noise Mechanism},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {19},
  pages        = {74--87},
  year         = {2024},
  url          = {https://doi.org/10.1109/TIFS.2023.3318944},
  doi          = {10.1109/TIFS.2023.3318944},
  timestamp    = {Sun, 10 Dec 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tifs/XueXZLZSL24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/XunJGLGC24,
  author       = {Yuan Xun and
                  Xiaojun Jia and
                  Jindong Gu and
                  Xinwei Liu and
                  Qing Guo and
                  Xiaochun Cao},
  title        = {Minimalism is King! High-Frequency Energy-Based Screening for Data-Efficient
                  Backdoor Attacks},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {19},
  pages        = {4560--4571},
  year         = {2024},
  url          = {https://doi.org/10.1109/TIFS.2024.3380821},
  doi          = {10.1109/TIFS.2024.3380821},
  timestamp    = {Fri, 31 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/XunJGLGC24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/YangCCJLH24,
  author       = {Guoyu Yang and
                  Chang Chen and
                  Qi Chen and
                  Jianan Jiang and
                  Jin Li and
                  Debiao He},
  title        = {Sweeper: Breaking the Validity-Latency Tradeoff in Asynchronous Common
                  Subset},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {19},
  pages        = {4534--4546},
  year         = {2024},
  url          = {https://doi.org/10.1109/TIFS.2024.3382602},
  doi          = {10.1109/TIFS.2024.3382602},
  timestamp    = {Fri, 31 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/YangCCJLH24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/YangCCY24,
  author       = {Bin Yang and
                  Jun Chen and
                  Cuiqun Chen and
                  Mang Ye},
  title        = {Dual Consistency-Constrained Learning for Unsupervised Visible-Infrared
                  Person Re-Identification},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {19},
  pages        = {1767--1779},
  year         = {2024},
  url          = {https://doi.org/10.1109/TIFS.2023.3341392},
  doi          = {10.1109/TIFS.2023.3341392},
  timestamp    = {Sat, 13 Jan 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tifs/YangCCY24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/YangGFS24,
  author       = {Ni Yang and
                  Ruiyi Gao and
                  Youzhi Feng and
                  Huan Su},
  title        = {Event-Triggered Impulsive Control for Complex Networks Under Stochastic
                  Deception Attacks},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {19},
  pages        = {1525--1534},
  year         = {2024},
  url          = {https://doi.org/10.1109/TIFS.2023.3336078},
  doi          = {10.1109/TIFS.2023.3336078},
  timestamp    = {Sat, 13 Jan 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tifs/YangGFS24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/YangHH24,
  author       = {Yiming Yang and
                  Weipeng Hu and
                  Haifeng Hu},
  title        = {Unsupervised {NIR-VIS} Face Recognition via Homogeneous-to-Heterogeneous
                  Learning and Residual-Invariant Enhancement},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {19},
  pages        = {2112--2126},
  year         = {2024},
  url          = {https://doi.org/10.1109/TIFS.2023.3346176},
  doi          = {10.1109/TIFS.2023.3346176},
  timestamp    = {Fri, 26 Jan 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tifs/YangHH24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/YangHZLW24,
  author       = {Yunchao Yang and
                  Miao Hu and
                  Yipeng Zhou and
                  Xuezheng Liu and
                  Di Wu},
  title        = {{CSRA:} Robust Incentive Mechanism Design for Differentially Private
                  Federated Learning},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {19},
  pages        = {892--906},
  year         = {2024},
  url          = {https://doi.org/10.1109/TIFS.2023.3329441},
  doi          = {10.1109/TIFS.2023.3329441},
  timestamp    = {Sun, 31 Dec 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tifs/YangHZLW24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/YangJYXWW24,
  author       = {Fenghong Yang and
                  Runqing Jiang and
                  Yan Yan and
                  Jing{-}Hao Xue and
                  Biao Wang and
                  Hanzi Wang},
  title        = {Dual-Mode Learning for Multi-Dataset X-Ray Security Image Detection},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {19},
  pages        = {3510--3524},
  year         = {2024},
  url          = {https://doi.org/10.1109/TIFS.2024.3364368},
  doi          = {10.1109/TIFS.2024.3364368},
  timestamp    = {Fri, 17 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/YangJYXWW24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/YangL24,
  author       = {Xuan Yang and
                  Dongming Li},
  title        = {{LED-RFF:} {LTE} DMRS-Based Channel Robust Radio Frequency Fingerprint
                  Identification Scheme},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {19},
  pages        = {1855--1869},
  year         = {2024},
  url          = {https://doi.org/10.1109/TIFS.2023.3343079},
  doi          = {10.1109/TIFS.2023.3343079},
  timestamp    = {Sat, 13 Jan 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tifs/YangL24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/YangLLZFZWLS24,
  author       = {Yulong Yang and
                  Chenhao Lin and
                  Qian Li and
                  Zhengyu Zhao and
                  Haoran Fan and
                  Dawei Zhou and
                  Nannan Wang and
                  Tongliang Liu and
                  Chao Shen},
  title        = {Quantization Aware Attack: Enhancing Transferable Adversarial Attacks
                  by Model Quantization},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {19},
  pages        = {3265--3278},
  year         = {2024},
  url          = {https://doi.org/10.1109/TIFS.2024.3360891},
  doi          = {10.1109/TIFS.2024.3360891},
  timestamp    = {Tue, 02 Apr 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/YangLLZFZWLS24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/YangP24,
  author       = {Haoxuan Yang and
                  Changgen Peng},
  title        = {{CP-IPFE:} Ciphertext-Policy Based Inner Product Functional Encryption},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {19},
  pages        = {5419--5433},
  year         = {2024},
  url          = {https://doi.org/10.1109/TIFS.2024.3396395},
  doi          = {10.1109/TIFS.2024.3396395},
  timestamp    = {Fri, 31 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/YangP24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/YangSLZ24,
  author       = {Hao Yang and
                  Shiyu Shen and
                  Zhe Liu and
                  Yunlei Zhao},
  title        = {cuXCMP: CUDA-Accelerated Private Comparison Based on Homomorphic Encryption},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {19},
  pages        = {3581--3592},
  year         = {2024},
  url          = {https://doi.org/10.1109/TIFS.2023.3267677},
  doi          = {10.1109/TIFS.2023.3267677},
  timestamp    = {Fri, 17 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/YangSLZ24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/YangTH24,
  author       = {Ningbin Yang and
                  Chunming Tang and
                  Debiao He},
  title        = {A Lightweight Certificateless Multi-User Matchmaking Encryption for
                  Mobile Devices: Enhancing Security and Performance},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {19},
  pages        = {251--264},
  year         = {2024},
  url          = {https://doi.org/10.1109/TIFS.2023.3321961},
  doi          = {10.1109/TIFS.2023.3321961},
  timestamp    = {Sun, 10 Dec 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tifs/YangTH24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/YangWH24,
  author       = {Mengxue Yang and
                  Huaqun Wang and
                  Debiao He},
  title        = {Puncturable Attribute-Based Encryption From Lattices for Classified
                  Document Sharing},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {19},
  pages        = {4028--4042},
  year         = {2024},
  url          = {https://doi.org/10.1109/TIFS.2024.3374262},
  doi          = {10.1109/TIFS.2024.3374262},
  timestamp    = {Fri, 17 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/YangWH24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/YangWYCTCJ24,
  author       = {Qing Yang and
                  Cheng Wang and
                  Haifeng Yuan and
                  Jipeng Cui and
                  Hu Teng and
                  Xue Chen and
                  Changjun Jiang},
  title        = {Approaching the Information-Theoretic Limit of Privacy Disclosure
                  With Utility Guarantees},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {19},
  pages        = {3339--3352},
  year         = {2024},
  url          = {https://doi.org/10.1109/TIFS.2024.3354412},
  doi          = {10.1109/TIFS.2024.3354412},
  timestamp    = {Sun, 24 Mar 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tifs/YangWYCTCJ24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/YangXSWZ24,
  author       = {He Yang and
                  Wei Xi and
                  Yuhao Shen and
                  Canhui Wu and
                  Jizhong Zhao},
  title        = {RoseAgg: Robust Defense Against Targeted Collusion Attacks in Federated
                  Learning},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {19},
  pages        = {2951--2966},
  year         = {2024},
  url          = {https://doi.org/10.1109/TIFS.2024.3352415},
  doi          = {10.1109/TIFS.2024.3352415},
  timestamp    = {Thu, 29 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tifs/YangXSWZ24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/YangZXA24,
  author       = {Xiao Yang and
                  Chengru Zhang and
                  Haiyang Xue and
                  Man Ho Au},
  title        = {Efficient Verifiably Encrypted {ECDSA} Schemes From Castagnos-Laguillaumie
                  and Joye-Libert Encryptions},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {19},
  pages        = {4161--4173},
  year         = {2024},
  url          = {https://doi.org/10.1109/TIFS.2024.3375622},
  doi          = {10.1109/TIFS.2024.3375622},
  timestamp    = {Fri, 17 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/YangZXA24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/YaoWWWRM24,
  author       = {Ye Yao and
                  Chen Wang and
                  Hui Wang and
                  Ke Wang and
                  Yizhi Ren and
                  Weizhi Meng},
  title        = {Embedding Secret Message in Chinese Characters via Glyph Perturbation
                  and Style Transfer},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {19},
  pages        = {4406--4419},
  year         = {2024},
  url          = {https://doi.org/10.1109/TIFS.2024.3377903},
  doi          = {10.1109/TIFS.2024.3377903},
  timestamp    = {Fri, 31 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/YaoWWWRM24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/YeSZYD24,
  author       = {Mang Ye and
                  Wei Shen and
                  Junwu Zhang and
                  Yao Yang and
                  Bo Du},
  title        = {SecureReID: Privacy-Preserving Anonymization for Person Re-Identification},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {19},
  pages        = {2840--2853},
  year         = {2024},
  url          = {https://doi.org/10.1109/TIFS.2024.3356233},
  doi          = {10.1109/TIFS.2024.3356233},
  timestamp    = {Thu, 29 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tifs/YeSZYD24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/YeZGZ24,
  author       = {Dayong Ye and
                  Tianqing Zhu and
                  Kun Gao and
                  Wanlei Zhou},
  title        = {Defending Against Label-Only Attacks via Meta-Reinforcement Learning},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {19},
  pages        = {3295--3308},
  year         = {2024},
  url          = {https://doi.org/10.1109/TIFS.2024.3357292},
  doi          = {10.1109/TIFS.2024.3357292},
  timestamp    = {Thu, 29 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tifs/YeZGZ24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/YinZSG24,
  author       = {Zhenqin Yin and
                  Xinmin Zhang and
                  Zhihuan Song and
                  Zhiqiang Ge},
  title        = {Adversarial Learning From Imbalanced Data: {A} Robust Industrial Fault
                  Classification Method},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {19},
  pages        = {1870--1882},
  year         = {2024},
  url          = {https://doi.org/10.1109/TIFS.2023.3343073},
  doi          = {10.1109/TIFS.2023.3343073},
  timestamp    = {Sat, 13 Jan 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tifs/YinZSG24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/YuanCPZLZGE24,
  author       = {Lin Yuan and
                  Wu Chen and
                  Xiao Pu and
                  Yan Zhang and
                  Hongbo Li and
                  Yushu Zhang and
                  Xinbo Gao and
                  Touradj Ebrahimi},
  title        = {PRO-Face {C:} Privacy-Preserving Recognition of Obfuscated Face via
                  Feature Compensation},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {19},
  pages        = {4930--4944},
  year         = {2024},
  url          = {https://doi.org/10.1109/TIFS.2024.3388976},
  doi          = {10.1109/TIFS.2024.3388976},
  timestamp    = {Fri, 17 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/YuanCPZLZGE24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/YuanFYZD24,
  author       = {Haoheng Yuan and
                  Yanghe Feng and
                  Chuanchuan Yang and
                  Zhuojun Zhuang and
                  Bin Dai},
  title        = {Two-User Gaussian Broadcast Wiretap Channel With Common Message and
                  Feedback: Revisit},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {19},
  pages        = {178--193},
  year         = {2024},
  url          = {https://doi.org/10.1109/TIFS.2023.3318948},
  doi          = {10.1109/TIFS.2023.3318948},
  timestamp    = {Sun, 10 Dec 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tifs/YuanFYZD24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/YuanGZZXW24,
  author       = {Qingjun Yuan and
                  Gaopeng Gou and
                  Yanbei Zhu and
                  Yuefei Zhu and
                  Gang Xiong and
                  Yongjuan Wang},
  title        = {MCRe: {A} Unified Framework for Handling Malicious Traffic With Noise
                  Labels Based on Multidimensional Constraint Representation},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {19},
  pages        = {133--147},
  year         = {2024},
  url          = {https://doi.org/10.1109/TIFS.2023.3318962},
  doi          = {10.1109/TIFS.2023.3318962},
  timestamp    = {Sun, 10 Dec 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tifs/YuanGZZXW24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/YuanLWWWLMP24,
  author       = {Xiaohan Yuan and
                  Jiqiang Liu and
                  Bin Wang and
                  Wei Wang and
                  Bin Wang and
                  Tao Li and
                  Xiaobo Ma and
                  Witold Pedrycz},
  title        = {FedComm: {A} Privacy-Enhanced and Efficient Authentication Protocol
                  for Federated Learning in Vehicular Ad-Hoc Networks},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {19},
  pages        = {777--792},
  year         = {2024},
  url          = {https://doi.org/10.1109/TIFS.2023.3324747},
  doi          = {10.1109/TIFS.2023.3324747},
  timestamp    = {Tue, 07 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/YuanLWWWLMP24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/YueZNWZLZ24,
  author       = {Tai Yue and
                  Fengwei Zhang and
                  Zhenyu Ning and
                  Pengfei Wang and
                  Xu Zhou and
                  Kai Lu and
                  Lei Zhou},
  title        = {Armor: Protecting Software Against Hardware Tracing Techniques},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {19},
  pages        = {4247--4262},
  year         = {2024},
  url          = {https://doi.org/10.1109/TIFS.2024.3372816},
  doi          = {10.1109/TIFS.2024.3372816},
  timestamp    = {Fri, 17 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/YueZNWZLZ24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/ZengCZZY24,
  author       = {Kai Zeng and
                  Kejiang Chen and
                  Jiansong Zhang and
                  Weiming Zhang and
                  Nenghai Yu},
  title        = {Toward Secure and Robust Steganography for Black-Box Generated Images},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {19},
  pages        = {3237--3250},
  year         = {2024},
  url          = {https://doi.org/10.1109/TIFS.2024.3361220},
  doi          = {10.1109/TIFS.2024.3361220},
  timestamp    = {Tue, 07 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/ZengCZZY24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/ZengLG24,
  author       = {Xiao Mei Zeng and
                  Qing Liu and
                  Chee Lip Gan},
  title        = {A Comprehensive Data Retrieval and Correction Approach From 40-nm
                  Flash Memory With Selective Chemical Engraving},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {19},
  pages        = {1031--1040},
  year         = {2024},
  url          = {https://doi.org/10.1109/TIFS.2023.3327857},
  doi          = {10.1109/TIFS.2023.3327857},
  timestamp    = {Tue, 21 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/ZengLG24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/ZengXGHZXZ24,
  author       = {Zhirui Zeng and
                  Tao Xiang and
                  Shangwei Guo and
                  Jialing He and
                  Qiao Zhang and
                  Guowen Xu and
                  Tianwei Zhang},
  title        = {Contrast-Then-Approximate: Analyzing Keyword Leakage of Generative
                  Language Models},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {19},
  pages        = {5166--5180},
  year         = {2024},
  url          = {https://doi.org/10.1109/TIFS.2024.3392535},
  doi          = {10.1109/TIFS.2024.3392535},
  timestamp    = {Fri, 17 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/ZengXGHZXZ24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/ZhaiWLQDGS24,
  author       = {Mingzhe Zhai and
                  Qianhong Wu and
                  Yizhong Liu and
                  Bo Qin and
                  Xiaopeng Dai and
                  Qiyuan Gao and
                  Willy Susilo},
  title        = {Secret Multiple Leaders {\&} Committee Election With Application
                  to Sharding Blockchain},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {19},
  pages        = {5060--5074},
  year         = {2024},
  url          = {https://doi.org/10.1109/TIFS.2024.3390584},
  doi          = {10.1109/TIFS.2024.3390584},
  timestamp    = {Fri, 31 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/ZhaiWLQDGS24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/ZhanDHLGP24,
  author       = {Dazhi Zhan and
                  Yexin Duan and
                  Yue Hu and
                  Weili Li and
                  Shize Guo and
                  Zhisong Pan},
  title        = {MalPatch: Evading DNN-Based Malware Detection With Adversarial Patches},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {19},
  pages        = {1183--1198},
  year         = {2024},
  url          = {https://doi.org/10.1109/TIFS.2023.3333567},
  doi          = {10.1109/TIFS.2023.3333567},
  timestamp    = {Sun, 31 Dec 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tifs/ZhanDHLGP24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/ZhanLLZLW24,
  author       = {Mengqi Zhan and
                  Yang Li and
                  Bo Li and
                  Jinchao Zhang and
                  Chuanrong Li and
                  Weiping Wang},
  title        = {Toward Automated Field Semantics Inference for Binary Protocol Reverse
                  Engineering},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {19},
  pages        = {764--776},
  year         = {2024},
  url          = {https://doi.org/10.1109/TIFS.2023.3326666},
  doi          = {10.1109/TIFS.2023.3326666},
  timestamp    = {Sun, 31 Dec 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tifs/ZhanLLZLW24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/ZhangCDYZY24,
  author       = {Xin Zhang and
                  Kejiang Chen and
                  Jinyang Ding and
                  Yuqi Yang and
                  Weiming Zhang and
                  Nenghai Yu},
  title        = {Provably Secure Public-Key Steganography Based on Elliptic Curve Cryptography},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {19},
  pages        = {3148--3163},
  year         = {2024},
  url          = {https://doi.org/10.1109/TIFS.2024.3361219},
  doi          = {10.1109/TIFS.2024.3361219},
  timestamp    = {Thu, 29 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tifs/ZhangCDYZY24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/ZhangGCZ24,
  author       = {Xingjian Zhang and
                  Haochen Gong and
                  Rui Chang and
                  Yajin Zhou},
  title        = {{RECAST:} Mitigating Conflict-Based Cache Attacks Through Fine-Grained
                  Dynamic Mapping},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {19},
  pages        = {3758--3771},
  year         = {2024},
  url          = {https://doi.org/10.1109/TIFS.2024.3368862},
  doi          = {10.1109/TIFS.2024.3368862},
  timestamp    = {Fri, 17 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/ZhangGCZ24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/ZhangJGLWWZ24,
  author       = {Xinxun Zhang and
                  Pengfei Jiao and
                  Mengzhou Gao and
                  Tianpeng Li and
                  Yiming Wu and
                  Huaming Wu and
                  Zhidong Zhao},
  title        = {{VGGM:} Variational Graph Gaussian Mixture Model for Unsupervised
                  Change Point Detection in Dynamic Networks},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {19},
  pages        = {4272--4284},
  year         = {2024},
  url          = {https://doi.org/10.1109/TIFS.2024.3377548},
  doi          = {10.1109/TIFS.2024.3377548},
  timestamp    = {Fri, 31 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/ZhangJGLWWZ24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/ZhangJWZXW24,
  author       = {Yushu Zhang and
                  Junhao Ji and
                  Wenying Wen and
                  Youwen Zhu and
                  Zhihua Xia and
                  Jian Weng},
  title        = {Understanding Visual Privacy Protection: {A} Generalized Framework
                  With an Instance on Facial Privacy},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {19},
  pages        = {5046--5059},
  year         = {2024},
  url          = {https://doi.org/10.1109/TIFS.2024.3389572},
  doi          = {10.1109/TIFS.2024.3389572},
  timestamp    = {Fri, 17 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/ZhangJWZXW24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/ZhangL24,
  author       = {Zehu Zhang and
                  Yanping Li},
  title        = {{NSPFL:} {A} Novel Secure and Privacy-Preserving Federated Learning
                  With Data Integrity Auditing},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {19},
  pages        = {4494--4506},
  year         = {2024},
  url          = {https://doi.org/10.1109/TIFS.2024.3379852},
  doi          = {10.1109/TIFS.2024.3379852},
  timestamp    = {Fri, 17 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/ZhangL24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/ZhangLGBXHL24,
  author       = {Menghao Zhang and
                  Guanyu Li and
                  Cheng Guo and
                  Han Bao and
                  Mingwei Xu and
                  Hongxin Hu and
                  Fenghua Li},
  title        = {IMap: Toward a Fast, Scalable and Reconfigurable In-Network Scanner
                  With Programmable Switches},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {19},
  pages        = {601--615},
  year         = {2024},
  url          = {https://doi.org/10.1109/TIFS.2023.3327665},
  doi          = {10.1109/TIFS.2023.3327665},
  timestamp    = {Sun, 31 Dec 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tifs/ZhangLGBXHL24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/ZhangLMLXRD24,
  author       = {Man Zhang and
                  Xinghua Li and
                  Yinbin Miao and
                  Bin Luo and
                  Wanyun Xu and
                  Yanbing Ren and
                  Robert H. Deng},
  title        = {Privacy-Preserved Data Disturbance and Truthfulness Verification for
                  Data Trading},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {19},
  pages        = {5545--5560},
  year         = {2024},
  url          = {https://doi.org/10.1109/TIFS.2024.3402162},
  doi          = {10.1109/TIFS.2024.3402162},
  timestamp    = {Fri, 31 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/ZhangLMLXRD24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/ZhangLZZGWSL24,
  author       = {Songnian Zhang and
                  Rongxing Lu and
                  Hui Zhu and
                  Yandong Zheng and
                  Yunguo Guan and
                  Fengwei Wang and
                  Jun Shao and
                  Hui Li},
  title        = {Performance Enhanced Secure Spatial Keyword Similarity Query With
                  Arbitrary Spatial Ranges},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {19},
  pages        = {5272--5285},
  year         = {2024},
  url          = {https://doi.org/10.1109/TIFS.2024.3396384},
  doi          = {10.1109/TIFS.2024.3396384},
  timestamp    = {Fri, 31 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/ZhangLZZGWSL24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/ZhangMLD24,
  author       = {Yuqing Zhang and
                  Zhaofeng Ma and
                  Shoushan Luo and
                  Pengfei Duan},
  title        = {Dynamic Trust-Based Redactable Blockchain Supporting Update and Traceability},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {19},
  pages        = {821--834},
  year         = {2024},
  url          = {https://doi.org/10.1109/TIFS.2023.3326379},
  doi          = {10.1109/TIFS.2023.3326379},
  timestamp    = {Sun, 31 Dec 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tifs/ZhangMLD24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/ZhangMWGJ24,
  author       = {Chen Zhang and
                  Yulong Ming and
                  Mingyue Wang and
                  Yu Guo and
                  Xiaohua Jia},
  title        = {Encrypted and Compressed Key-Value Store With Pattern-Analysis Security
                  in Cloud Systems},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {19},
  pages        = {221--234},
  year         = {2024},
  url          = {https://doi.org/10.1109/TIFS.2023.3320612},
  doi          = {10.1109/TIFS.2023.3320612},
  timestamp    = {Sun, 10 Dec 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tifs/ZhangMWGJ24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/ZhangSXCCCL24,
  author       = {Xiaoli Zhang and
                  Wenxiang Sun and
                  Zhicheng Xu and
                  Hongbing Cheng and
                  Chengjun Cai and
                  Helei Cui and
                  Qi Li},
  title        = {EVM-Shield: In-Contract State Access Control for Fast Vulnerability
                  Detection and Prevention},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {19},
  pages        = {2517--2532},
  year         = {2024},
  url          = {https://doi.org/10.1109/TIFS.2024.3349852},
  doi          = {10.1109/TIFS.2024.3349852},
  timestamp    = {Fri, 26 Jan 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tifs/ZhangSXCCCL24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/ZhangWQWOASG24,
  author       = {Xixi Zhang and
                  Qin Wang and
                  Maoyang Qin and
                  Yu Wang and
                  Tomoaki Ohtsuki and
                  Bamidele Adebisi and
                  Hikmet Sari and
                  Guan Gui},
  title        = {Enhanced Few-Shot Malware Traffic Classification via Integrating Knowledge
                  Transfer With Neural Architecture Search},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {19},
  pages        = {5245--5256},
  year         = {2024},
  url          = {https://doi.org/10.1109/TIFS.2024.3396624},
  doi          = {10.1109/TIFS.2024.3396624},
  timestamp    = {Fri, 31 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/ZhangWQWOASG24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/ZhangXWLYZ24,
  author       = {Chuan Zhang and
                  Haojun Xuan and
                  Tong Wu and
                  Ximeng Liu and
                  Guomin Yang and
                  Liehuang Zhu},
  title        = {Blockchain-Based Dynamic Time-Encapsulated Data Auditing for Outsourcing
                  Storage},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {19},
  pages        = {1979--1993},
  year         = {2024},
  url          = {https://doi.org/10.1109/TIFS.2023.3338485},
  doi          = {10.1109/TIFS.2023.3338485},
  timestamp    = {Fri, 26 Jan 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tifs/ZhangXWLYZ24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/ZhangYQGLZW24,
  author       = {Hengmin Zhang and
                  Jian Yang and
                  Jianjun Qian and
                  Guangwei Gao and
                  Xiangyuan Lan and
                  Zhiyuan Zha and
                  Bihan Wen},
  title        = {Efficient Image Classification via Structured Low-Rank Matrix Factorization
                  Regression},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {19},
  pages        = {1496--1509},
  year         = {2024},
  url          = {https://doi.org/10.1109/TIFS.2023.3337717},
  doi          = {10.1109/TIFS.2023.3337717},
  timestamp    = {Sat, 13 Jan 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tifs/ZhangYQGLZW24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/ZhangYXTLLCD24,
  author       = {Yunming Zhang and
                  Dengpan Ye and
                  Caiyun Xie and
                  Long Tang and
                  Xin Liao and
                  Zi{-}yi Liu and
                  Chuanxi Chen and
                  Jiacheng Deng},
  title        = {Dual Defense: Adversarial, Traceable, and Invisible Robust Watermarking
                  Against Face Swapping},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {19},
  pages        = {4628--4641},
  year         = {2024},
  url          = {https://doi.org/10.1109/TIFS.2024.3383648},
  doi          = {10.1109/TIFS.2024.3383648},
  timestamp    = {Fri, 17 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/ZhangYXTLLCD24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/ZhangYZSL24,
  author       = {Sicheng Zhang and
                  Yandie Yang and
                  Ziyao Zhou and
                  Zhi Sun and
                  Yun Lin},
  title        = {{DIBAD:} {A} Disentangled Information Bottleneck Adversarial Defense
                  Method Using Hilbert-Schmidt Independence Criterion for Spectrum Security},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {19},
  pages        = {3879--3891},
  year         = {2024},
  url          = {https://doi.org/10.1109/TIFS.2024.3372798},
  doi          = {10.1109/TIFS.2024.3372798},
  timestamp    = {Fri, 17 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/ZhangYZSL24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/ZhangYZZWM24,
  author       = {Fahong Zhang and
                  Chen Yang and
                  Rui Zong and
                  Xinran Zheng and
                  Jianfei Wang and
                  Yishuo Meng},
  title        = {An Efficient and Scalable FHE-Based {PDQ} Scheme: Utilizing {FFT}
                  to Design a Low Multiplication Depth Large-Integer Comparison Algorithm},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {19},
  pages        = {2258--2272},
  year         = {2024},
  url          = {https://doi.org/10.1109/TIFS.2023.3348246},
  doi          = {10.1109/TIFS.2023.3348246},
  timestamp    = {Fri, 26 Jan 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tifs/ZhangYZZWM24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/ZhangZJZSW24,
  author       = {Shenyi Zhang and
                  Baolin Zheng and
                  Peipei Jiang and
                  Lingchen Zhao and
                  Chao Shen and
                  Qian Wang},
  title        = {Perception-Driven Imperceptible Adversarial Attack Against Decision-Based
                  Black-Box Models},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {19},
  pages        = {3164--3177},
  year         = {2024},
  url          = {https://doi.org/10.1109/TIFS.2024.3359441},
  doi          = {10.1109/TIFS.2024.3359441},
  timestamp    = {Thu, 29 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tifs/ZhangZJZSW24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/ZhangZSGCSY24,
  author       = {Jiale Zhang and
                  Chengcheng Zhu and
                  Xiaobing Sun and
                  Chunpeng Ge and
                  Bing Chen and
                  Willy Susilo and
                  Shui Yu},
  title        = {FLPurifier: Backdoor Defense in Federated Learning via Decoupled Contrastive
                  Training},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {19},
  pages        = {4752--4766},
  year         = {2024},
  url          = {https://doi.org/10.1109/TIFS.2024.3384846},
  doi          = {10.1109/TIFS.2024.3384846},
  timestamp    = {Fri, 17 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/ZhangZSGCSY24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/ZhangZWZ24,
  author       = {Rui Zhang and
                  Lei Zhang and
                  Qian Wu and
                  Jianying Zhou},
  title        = {Secure Channel Establishment Scheme for Task Delivery in Vehicular
                  Cloud Computing},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {19},
  pages        = {2865--2880},
  year         = {2024},
  url          = {https://doi.org/10.1109/TIFS.2024.3356809},
  doi          = {10.1109/TIFS.2024.3356809},
  timestamp    = {Tue, 13 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tifs/ZhangZWZ24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/ZhangZYCXY24,
  author       = {Zhibo Zhang and
                  Lei Zhang and
                  Guangliang Yang and
                  Yanjun Chen and
                  Jiahao Xu and
                  Min Yang},
  title        = {The Dark Forest: Understanding Security Risks of Cross-Party Delegated
                  Resources in Mobile App-in-App Ecosystems},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {19},
  pages        = {5434--5448},
  year         = {2024},
  url          = {https://doi.org/10.1109/TIFS.2024.3390553},
  doi          = {10.1109/TIFS.2024.3390553},
  timestamp    = {Fri, 31 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/ZhangZYCXY24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/ZhangZZLGS24,
  author       = {Yibin Zhang and
                  Qianyun Zhang and
                  Haitao Zhao and
                  Yun Lin and
                  Guan Gui and
                  Hikmet Sari},
  title        = {Multisource Heterogeneous Specific Emitter Identification Using Attention
                  Mechanism-Based {RFF} Fusion Method},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {19},
  pages        = {2639--2650},
  year         = {2024},
  url          = {https://doi.org/10.1109/TIFS.2024.3353594},
  doi          = {10.1109/TIFS.2024.3353594},
  timestamp    = {Tue, 12 Mar 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tifs/ZhangZZLGS24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/ZhaoMSSO24,
  author       = {Raymond K. Zhao and
                  Sarah McCarthy and
                  Ron Steinfeld and
                  Amin Sakzad and
                  M{\'{a}}ire O'Neill},
  title        = {Quantum-Safe {HIBE:} Does It Cost a Latte?},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {19},
  pages        = {2680--2695},
  year         = {2024},
  url          = {https://doi.org/10.1109/TIFS.2023.3347880},
  doi          = {10.1109/TIFS.2023.3347880},
  timestamp    = {Sat, 16 Mar 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tifs/ZhaoMSSO24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/ZhaoXWK24,
  author       = {Shao{-}Chuan Zhao and
                  Tianyang Xu and
                  Xiaojun Wu and
                  Josef Kittler},
  title        = {Pluggable Attack for Visual Object Tracking},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {19},
  pages        = {1227--1240},
  year         = {2024},
  url          = {https://doi.org/10.1109/TIFS.2023.3331899},
  doi          = {10.1109/TIFS.2023.3331899},
  timestamp    = {Sun, 31 Dec 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tifs/ZhaoXWK24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/ZhaoZGQ24,
  author       = {Jun Zhao and
                  Kai Zhang and
                  Junqing Gong and
                  Haifeng Qian},
  title        = {Lavida: Large-Universe, Verifiable, and Dynamic Fine-Grained Access
                  Control for E-Health Cloud},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {19},
  pages        = {2732--2745},
  year         = {2024},
  url          = {https://doi.org/10.1109/TIFS.2024.3350925},
  doi          = {10.1109/TIFS.2024.3350925},
  timestamp    = {Thu, 29 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tifs/ZhaoZGQ24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/ZhaoZGSZL24,
  author       = {Weisong Zhao and
                  Xiangyu Zhu and
                  Kaiwen Guo and
                  Haichao Shi and
                  Xiaoyu Zhang and
                  Zhen Lei},
  title        = {Masked Face Transformer},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {19},
  pages        = {265--279},
  year         = {2024},
  url          = {https://doi.org/10.1109/TIFS.2023.3322600},
  doi          = {10.1109/TIFS.2023.3322600},
  timestamp    = {Sun, 10 Dec 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tifs/ZhaoZGSZL24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/ZhaoZWKY24,
  author       = {Mengnan Zhao and
                  Lihe Zhang and
                  Wei Wang and
                  Yuqiu Kong and
                  Baocai Yin},
  title        = {Adversarial Attacks on Scene Graph Generation},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {19},
  pages        = {3210--3225},
  year         = {2024},
  url          = {https://doi.org/10.1109/TIFS.2024.3360880},
  doi          = {10.1109/TIFS.2024.3360880},
  timestamp    = {Fri, 29 Mar 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tifs/ZhaoZWKY24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/ZhaoZWNLZ24,
  author       = {Mingyang Zhao and
                  Chuan Zhang and
                  Tong Wu and
                  Jianbing Ni and
                  Ximeng Liu and
                  Liehuang Zhu},
  title        = {Revocable and Privacy-Preserving Bilateral Access Control for Cloud
                  Data Sharing},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {19},
  pages        = {5389--5404},
  year         = {2024},
  url          = {https://doi.org/10.1109/TIFS.2024.3394678},
  doi          = {10.1109/TIFS.2024.3394678},
  timestamp    = {Fri, 31 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/ZhaoZWNLZ24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/ZhaoluWW24,
  author       = {Tianyu Zhaolu and
                  Zhiguo Wan and
                  Huaqun Wang},
  title        = {Division of Regulatory Power: Collaborative Regulation for Privacy-Preserving
                  Blockchains},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {19},
  pages        = {2533--2548},
  year         = {2024},
  url          = {https://doi.org/10.1109/TIFS.2023.3348268},
  doi          = {10.1109/TIFS.2023.3348268},
  timestamp    = {Thu, 29 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tifs/ZhaoluWW24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/ZhengLWWMLDW24,
  author       = {Tianyi Zheng and
                  Bo Li and
                  Shuang Wu and
                  Ben Wan and
                  Guodong Mu and
                  Shice Liu and
                  Shouhong Ding and
                  Jia Wang},
  title        = {{MFAE:} Masked Frequency Autoencoders for Domain Generalization Face
                  Anti-Spoofing},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {19},
  pages        = {4058--4069},
  year         = {2024},
  url          = {https://doi.org/10.1109/TIFS.2024.3371266},
  doi          = {10.1109/TIFS.2024.3371266},
  timestamp    = {Fri, 17 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/ZhengLWWMLDW24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/ZhouK24,
  author       = {Zhenyu Zhou and
                  Ajay Kumar},
  title        = {Finger-Knuckle Assisted Slap Fingerprint Identification System for
                  Higher Security and Convenience},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {19},
  pages        = {441--454},
  year         = {2024},
  url          = {https://doi.org/10.1109/TIFS.2023.3318938},
  doi          = {10.1109/TIFS.2023.3318938},
  timestamp    = {Sun, 10 Dec 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tifs/ZhouK24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/ZhouWZLS24,
  author       = {Qiang Zhou and
                  Liangmin Wang and
                  Huijuan Zhu and
                  Tong Lu and
                  Victor S. Sheng},
  title        = {WF-Transformer: Learning Temporal Features for Accurate Anonymous
                  Traffic Identification by Using Transformer Networks},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {19},
  pages        = {30--43},
  year         = {2024},
  url          = {https://doi.org/10.1109/TIFS.2023.3318966},
  doi          = {10.1109/TIFS.2023.3318966},
  timestamp    = {Sun, 10 Dec 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tifs/ZhouWZLS24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/ZhouZYZZ24,
  author       = {Shuai Zhou and
                  Tianqing Zhu and
                  Dayong Ye and
                  Wanlei Zhou and
                  Wei Zhao},
  title        = {Inversion-Guided Defense: Detecting Model Stealing Attacks by Output
                  Inverting},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {19},
  pages        = {4130--4145},
  year         = {2024},
  url          = {https://doi.org/10.1109/TIFS.2024.3376190},
  doi          = {10.1109/TIFS.2024.3376190},
  timestamp    = {Fri, 17 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/ZhouZYZZ24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/ZhuCXWZ24,
  author       = {Youwen Zhu and
                  Yiran Cao and
                  Qiao Xue and
                  Qihui Wu and
                  Yushu Zhang},
  title        = {Heavy Hitter Identification Over Large-Domain Set-Valued Data With
                  Local Differential Privacy},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {19},
  pages        = {414--426},
  year         = {2024},
  url          = {https://doi.org/10.1109/TIFS.2023.3324726},
  doi          = {10.1109/TIFS.2023.3324726},
  timestamp    = {Sun, 10 Dec 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tifs/ZhuCXWZ24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/ZhuCZSHG24,
  author       = {Derui Zhu and
                  Jinfu Chen and
                  Xuebing Zhou and
                  Weiyi Shang and
                  Ahmed E. Hassan and
                  Jens Grossklags},
  title        = {Vulnerabilities of Data Protection in Vertical Federated Learning
                  Training and Countermeasures},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {19},
  pages        = {3674--3689},
  year         = {2024},
  url          = {https://doi.org/10.1109/TIFS.2024.3361813},
  doi          = {10.1109/TIFS.2024.3361813},
  timestamp    = {Fri, 17 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/ZhuCZSHG24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/ZhuDZMZ24,
  author       = {Boyu Zhu and
                  Changyu Dong and
                  Yuan Zhang and
                  Yunlong Mao and
                  Sheng Zhong},
  title        = {Toward Universal Detection of Adversarial Examples via Pseudorandom
                  Classifiers},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {19},
  pages        = {1810--1825},
  year         = {2024},
  url          = {https://doi.org/10.1109/TIFS.2023.3340889},
  doi          = {10.1109/TIFS.2023.3340889},
  timestamp    = {Sat, 13 Jan 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tifs/ZhuDZMZ24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/ZhuICF24,
  author       = {Yi Zhu and
                  Mohamed Imoussa{\"{\i}}ne{-}A{\"{\i}}kous and
                  Carolyn C{\^{o}}t{\'{e}}{-}Lussier and
                  Tiago H. Falk},
  title        = {On the Impact of Voice Anonymization on Speech Diagnostic Applications:
                  {A} Case Study on {COVID-19} Detection},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {19},
  pages        = {5151--5165},
  year         = {2024},
  url          = {https://doi.org/10.1109/TIFS.2024.3390990},
  doi          = {10.1109/TIFS.2024.3390990},
  timestamp    = {Fri, 31 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/ZhuICF24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/ZhuMLZZ24,
  author       = {Yulin Zhu and
                  Tomasz P. Michalak and
                  Xiapu Luo and
                  Xiaoge Zhang and
                  Kai Zhou},
  title        = {Toward Secrecy-Aware Attacks Against Trust Prediction in Signed Social
                  Networks},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {19},
  pages        = {3567--3580},
  year         = {2024},
  url          = {https://doi.org/10.1109/TIFS.2024.3364366},
  doi          = {10.1109/TIFS.2024.3364366},
  timestamp    = {Fri, 17 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/ZhuMLZZ24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/ZhuSDXH24,
  author       = {Xiaojie Zhu and
                  Peisong Shen and
                  Yueyue Dai and
                  Lei Xu and
                  Jiankun Hu},
  title        = {Privacy-Preserving and Trusted Keyword Search for Multi-Tenancy Cloud},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {19},
  pages        = {4316--4330},
  year         = {2024},
  url          = {https://doi.org/10.1109/TIFS.2024.3377549},
  doi          = {10.1109/TIFS.2024.3377549},
  timestamp    = {Fri, 17 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/ZhuSDXH24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/ZhuZLWX24,
  author       = {Xiaogang Zhu and
                  Siyu Zhang and
                  Chaoran Li and
                  Sheng Wen and
                  Yang Xiang},
  title        = {Fuzzing Android Native System Libraries via Dynamic Data Dependency
                  Graph},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {19},
  pages        = {3733--3744},
  year         = {2024},
  url          = {https://doi.org/10.1109/TIFS.2024.3369479},
  doi          = {10.1109/TIFS.2024.3369479},
  timestamp    = {Fri, 17 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/ZhuZLWX24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/ZhuZTLZ24,
  author       = {Liwang Zhu and
                  Xiaotian Zhou and
                  Jiahe Tian and
                  Wei Li and
                  Zhongzhi Zhang},
  title        = {Defending Against Malicious Influence Control in Online Leader-Follower
                  Social Networks},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {19},
  pages        = {4809--4819},
  year         = {2024},
  url          = {https://doi.org/10.1109/TIFS.2024.3383244},
  doi          = {10.1109/TIFS.2024.3383244},
  timestamp    = {Fri, 17 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/ZhuZTLZ24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/ZhuZZC24,
  author       = {Hong Zhu and
                  Yue Zhao and
                  Shengzhi Zhang and
                  Kai Chen},
  title        = {NeuralSanitizer: Detecting Backdoors in Neural Networks},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {19},
  pages        = {4970--4985},
  year         = {2024},
  url          = {https://doi.org/10.1109/TIFS.2024.3390599},
  doi          = {10.1109/TIFS.2024.3390599},
  timestamp    = {Fri, 17 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/ZhuZZC24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/ZoisTK24,
  author       = {Elias N. Zois and
                  Dimitrios Tsourounis and
                  Dimitrios Kalivas},
  title        = {Similarity Distance Learning on {SPD} Manifold for Writer Independent
                  Offline Signature Verification},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {19},
  pages        = {1342--1356},
  year         = {2024},
  url          = {https://doi.org/10.1109/TIFS.2023.3333681},
  doi          = {10.1109/TIFS.2023.3333681},
  timestamp    = {Sun, 31 Dec 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tifs/ZoisTK24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
a service of  Schloss Dagstuhl - Leibniz Center for Informatics