Stop the war!
Остановите войну!
for scientists:
default search action
Search dblp for Publications
export results for "toc:db/journals/tifs/tifs19.bht:"
@article{DBLP:journals/tifs/AbbadeSSRABR24, author = {Marcelo Lu{\'{\i}}s Francisco Abbade and Welerson Santos Souza and Melissa de Oliveira Santos and Ivan Eduardo Lage Rodrigues and Ivan Aldaya and Luiz H. Bonani and Murilo Ara{\'{u}}jo Romero}, title = {Discrete Spectral Encryption of Single-Carrier Signals With Pseudo Random Dynamic Keys}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {19}, pages = {4914--4929}, year = {2024}, url = {https://doi.org/10.1109/TIFS.2024.3390995}, doi = {10.1109/TIFS.2024.3390995}, timestamp = {Fri, 17 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/AbbadeSSRABR24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/AbdolinezhadZS24, author = {Saeed Abdolinezhad and Lukas Zimmermann and Axel Sikora}, title = {Output Positioning to Derive Maximum Entropy From Physical Unclonable Functions}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {19}, pages = {359--371}, year = {2024}, url = {https://doi.org/10.1109/TIFS.2023.3320608}, doi = {10.1109/TIFS.2023.3320608}, timestamp = {Sun, 10 Dec 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tifs/AbdolinezhadZS24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/AbulibdehYMHSA24, author = {Enas E. Abulibdeh and Leen Younes and Baker Mohammad and Khaled Humood and Hani H. Saleh and Mahmoud Al{-}Qutayri}, title = {DRAM-Based {PUF} Utilizing the Variation of Adjacent Cells}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {19}, pages = {2909--2918}, year = {2024}, url = {https://doi.org/10.1109/TIFS.2024.3354115}, doi = {10.1109/TIFS.2024.3354115}, timestamp = {Thu, 29 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tifs/AbulibdehYMHSA24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/AhmadTTKP24, author = {Baleegh Ahmad and Shailja Thakur and Benjamin Tan and Ramesh Karri and Hammond Pearce}, title = {On Hardware Security Bug Code Fixes by Prompting Large Language Models}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {19}, pages = {4043--4057}, year = {2024}, url = {https://doi.org/10.1109/TIFS.2024.3374558}, doi = {10.1109/TIFS.2024.3374558}, timestamp = {Fri, 17 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/AhmadTTKP24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/AliMA24, author = {Ziad Tariq Muhammad Ali and Ameer Mohammed and Imtiaz Ahmad}, title = {Vulnerability of Deep Forest to Adversarial Attacks}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {19}, pages = {5464--5475}, year = {2024}, url = {https://doi.org/10.1109/TIFS.2024.3402309}, doi = {10.1109/TIFS.2024.3402309}, timestamp = {Fri, 31 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/AliMA24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/AlyIYM24, author = {Ahmed Aly and Shahrear Iqbal and Amr M. Youssef and Essam Mansour}, title = {{MEGR-APT:} {A} Memory-Efficient {APT} Hunting System Based on Attack Representation Learning}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {19}, pages = {5257--5271}, year = {2024}, url = {https://doi.org/10.1109/TIFS.2024.3396390}, doi = {10.1109/TIFS.2024.3396390}, timestamp = {Fri, 31 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/AlyIYM24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/AmihoodC24, author = {Barak Amihood and Asaf Cohen}, title = {Covertly Controlling a Linear System}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {19}, pages = {2651--2663}, year = {2024}, url = {https://doi.org/10.1109/TIFS.2023.3342637}, doi = {10.1109/TIFS.2023.3342637}, timestamp = {Thu, 29 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tifs/AmihoodC24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/ArdizzonCTL24, author = {Francesco Ardizzon and Laura Crosara and Stefano Tomasin and Nicola Laurenti}, title = {On Mixing Authenticated and Non-Authenticated Signals Against {GNSS} Spoofing}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {19}, pages = {4480--4493}, year = {2024}, url = {https://doi.org/10.1109/TIFS.2024.3381473}, doi = {10.1109/TIFS.2024.3381473}, timestamp = {Fri, 17 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/ArdizzonCTL24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/AzarKFT24, author = {Kimia Zamiri Azar and Hadi Mardani Kamali and Farimah Farahmandi and Mark M. Tehranipoor}, title = {Improving Bounded Model Checkers Scalability for Circuit De-Obfuscation: An Exploration}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {19}, pages = {2771--2785}, year = {2024}, url = {https://doi.org/10.1109/TIFS.2024.3357286}, doi = {10.1109/TIFS.2024.3357286}, timestamp = {Thu, 29 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tifs/AzarKFT24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/BazziC24, author = {Ahmad Bazzi and Marwa Chafii}, title = {Secure Full Duplex Integrated Sensing and Communications}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {19}, pages = {2082--2097}, year = {2024}, url = {https://doi.org/10.1109/TIFS.2023.3346696}, doi = {10.1109/TIFS.2023.3346696}, timestamp = {Tue, 07 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/BazziC24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/BeigizadSZR24, author = {Ali Asghar Beigizad and Hadi Soleimany and Sara Zarei and Hamed Ramzanipour}, title = {Linked Fault Analysis}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {19}, pages = {632--645}, year = {2024}, url = {https://doi.org/10.1109/TIFS.2023.3327658}, doi = {10.1109/TIFS.2023.3327658}, timestamp = {Sun, 10 Dec 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tifs/BeigizadSZR24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/BelousovQPCTTHV24, author = {Yury Belousov and Guillaume Qu{\'{e}}tant and Brian Pulfer and Roman Chaban and Joakim Tutt and Olga Taran and Taras Holotyak and Slava Voloshynovskiy}, title = {A Machine Learning-Based Digital Twin for Anti-Counterfeiting Applications With Copy Detection Patterns}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {19}, pages = {3395--3408}, year = {2024}, url = {https://doi.org/10.1109/TIFS.2024.3361798}, doi = {10.1109/TIFS.2024.3361798}, timestamp = {Sat, 16 Mar 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tifs/BelousovQPCTTHV24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/BiLHNWW24, author = {Siguo Bi and Kai Li and Shuyan Hu and Wei Ni and Cong Wang and Xin Wang}, title = {Detection and Mitigation of Position Spoofing Attacks on Cooperative {UAV} Swarm Formations}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {19}, pages = {1883--1895}, year = {2024}, url = {https://doi.org/10.1109/TIFS.2023.3341398}, doi = {10.1109/TIFS.2023.3341398}, timestamp = {Sat, 13 Jan 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tifs/BiLHNWW24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/BitarEWX24, author = {Rawad Bitar and Maximilian Egger and Antonia Wachter{-}Zeh and Marvin Xhemrishi}, title = {Sparsity and Privacy in Secret Sharing: {A} Fundamental Trade-Off}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {19}, pages = {5136--5150}, year = {2024}, url = {https://doi.org/10.1109/TIFS.2024.3394256}, doi = {10.1109/TIFS.2024.3394256}, timestamp = {Fri, 17 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/BitarEWX24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/BriguglioYTM24, author = {William Briguglio and Waleed A. Yousef and Issa Traor{\'{e}} and Mohammad Mamun}, title = {Federated Supervised Principal Component Analysis}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {19}, pages = {646--660}, year = {2024}, url = {https://doi.org/10.1109/TIFS.2023.3326981}, doi = {10.1109/TIFS.2023.3326981}, timestamp = {Sun, 10 Dec 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tifs/BriguglioYTM24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/ButoraB24, author = {Jan Butora and Patrick Bas}, title = {Size-Independent Reliable {CNN} for {RJCA} Steganalysis}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {19}, pages = {4420--4431}, year = {2024}, url = {https://doi.org/10.1109/TIFS.2024.3379849}, doi = {10.1109/TIFS.2024.3379849}, timestamp = {Fri, 17 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/ButoraB24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/CaiSSCWQT24, author = {Xiao Cai and Kaibo Shi and Yanbin Sun and Jinde Cao and Shiping Wen and Cheng Qiao and Zhihong Tian}, title = {Stability Analysis of Networked Control Systems Under DoS Attacks and Security Controller Design With Mini-Batch Machine Learning Supervision}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {19}, pages = {3857--3865}, year = {2024}, url = {https://doi.org/10.1109/TIFS.2023.3347889}, doi = {10.1109/TIFS.2023.3347889}, timestamp = {Fri, 17 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/CaiSSCWQT24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/CaoYNJLLZ24, author = {Xuelian Cao and Zheng Yang and Jianting Ning and Chenglu Jin and Rongxing Lu and Zhiming Liu and Jianying Zhou}, title = {Dynamic Group Time-Based One-Time Passwords}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {19}, pages = {4897--4913}, year = {2024}, url = {https://doi.org/10.1109/TIFS.2024.3386350}, doi = {10.1109/TIFS.2024.3386350}, timestamp = {Fri, 17 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/CaoYNJLLZ24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/CasulaOMGMS24, author = {Roberto Casula and Giulia Orr{\`{u}} and Stefano Marrone and Umberto Gagliardini and Gian Luca Marcialis and Carlo Sansone}, title = {Realistic Fingerprint Presentation Attacks Based on an Adversarial Approach}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {19}, pages = {863--877}, year = {2024}, url = {https://doi.org/10.1109/TIFS.2023.3327663}, doi = {10.1109/TIFS.2023.3327663}, timestamp = {Fri, 08 Mar 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tifs/CasulaOMGMS24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/CeldranSASBPS24, author = {Alberto Huertas Celdr{\'{a}}n and Pedro Miguel S{\'{a}}nchez S{\'{a}}nchez and Jan von der Assen and Timo Schenk and G{\'{e}}r{\^{o}}me Bovet and Gregorio Mart{\'{\i}}nez P{\'{e}}rez and Burkhard Stiller}, title = {{RL} and Fingerprinting to Select Moving Target Defense Mechanisms for Zero-Day Attacks in IoT}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {19}, pages = {5520--5529}, year = {2024}, url = {https://doi.org/10.1109/TIFS.2024.3402055}, doi = {10.1109/TIFS.2024.3402055}, timestamp = {Fri, 31 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/CeldranSASBPS24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/ChangSXHLS24, author = {Shuyu Chang and Zhenqi Shi and Fu Xiao and Haiping Huang and Xingchen Liu and Chaorun Sun}, title = {Privacy-Enhanced Frequent Sequence Mining and Retrieval for Personalized Behavior Prediction}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {19}, pages = {4957--4969}, year = {2024}, url = {https://doi.org/10.1109/TIFS.2024.3391928}, doi = {10.1109/TIFS.2024.3391928}, timestamp = {Fri, 17 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/ChangSXHLS24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/ChatterjeePHRM24, author = {Durba Chatterjee and Kuheli Pratihar and Aritra Hazra and Ulrich R{\"{u}}hrmair and Debdeep Mukhopadhyay}, title = {Systematically Quantifying Cryptanalytic Nonlinearities in Strong PUFs}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {19}, pages = {1126--1141}, year = {2024}, url = {https://doi.org/10.1109/TIFS.2023.3329438}, doi = {10.1109/TIFS.2023.3329438}, timestamp = {Sun, 31 Dec 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tifs/ChatterjeePHRM24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/ChenC24, author = {Niusen Chen and Bo Chen}, title = {HiPDS: {A} Storage Hardware-Independent Plausibly Deniable Storage System}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {19}, pages = {1483--1495}, year = {2024}, url = {https://doi.org/10.1109/TIFS.2023.3338528}, doi = {10.1109/TIFS.2023.3338528}, timestamp = {Tue, 30 Apr 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/ChenC24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/ChenCXZYS24, author = {Jiefu Chen and Tong Chen and Xing Xu and Jingran Zhang and Yang Yang and Heng Tao Shen}, title = {Coreset Learning-Based Sparse Black-Box Adversarial Attack for Video Recognition}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {19}, pages = {1547--1560}, year = {2024}, url = {https://doi.org/10.1109/TIFS.2023.3333556}, doi = {10.1109/TIFS.2023.3333556}, timestamp = {Sat, 13 Jan 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tifs/ChenCXZYS24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/ChenGLAW24, author = {Jian Chen and Yuan Gao and Gaoyang Liu and Ahmed M. Abdelmoniem and Chen Wang}, title = {Manipulating Pre-Trained Encoder for Targeted Poisoning Attacks in Contrastive Learning}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {19}, pages = {2412--2424}, year = {2024}, url = {https://doi.org/10.1109/TIFS.2024.3350389}, doi = {10.1109/TIFS.2024.3350389}, timestamp = {Fri, 26 Jan 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tifs/ChenGLAW24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/ChenLCZH24, author = {Changsheng Chen and Bokang Li and Rizhao Cai and Jishen Zeng and Jiwu Huang}, title = {Distortion Model-Based Spectral Augmentation for Generalized Recaptured Document Detection}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {19}, pages = {1283--1298}, year = {2024}, url = {https://doi.org/10.1109/TIFS.2023.3333548}, doi = {10.1109/TIFS.2023.3333548}, timestamp = {Sun, 31 Dec 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tifs/ChenLCZH24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/ChenLPLCJ24, author = {Yuanchao Chen and Yuwei Li and Zulie Pan and Yuliang Lu and Juxing Chen and Shouling Ji}, title = {URadar: Discovering Unrestricted File Upload Vulnerabilities via Adaptive Dynamic Testing}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {19}, pages = {1251--1266}, year = {2024}, url = {https://doi.org/10.1109/TIFS.2023.3335885}, doi = {10.1109/TIFS.2023.3335885}, timestamp = {Sun, 31 Dec 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tifs/ChenLPLCJ24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/ChenLYBLR24, author = {Meng Chen and Li Lu and Jiadi Yu and Zhongjie Ba and Feng Lin and Kui Ren}, title = {AdvReverb: Rethinking the Stealthiness of Audio Adversarial Examples to Human Perception}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {19}, pages = {1948--1962}, year = {2024}, url = {https://doi.org/10.1109/TIFS.2023.3345639}, doi = {10.1109/TIFS.2023.3345639}, timestamp = {Fri, 26 Jan 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tifs/ChenLYBLR24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/ChenWTW24, author = {Xingyu Chen and Huici Wu and Xiaofeng Tao and Haowei Wang}, title = {Polar Coding for Wiretap Channels With Random States Non-Causally Available at the Encoder}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {19}, pages = {3324--3338}, year = {2024}, url = {https://doi.org/10.1109/TIFS.2024.3358992}, doi = {10.1109/TIFS.2024.3358992}, timestamp = {Sat, 16 Mar 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tifs/ChenWTW24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/ChenWXZSZXY24, author = {Zhuangzhi Chen and Zhangwei Wang and Dongwei Xu and Jiawei Zhu and Weiguo Shen and Shilian Zheng and Qi Xuan and Xiaoniu Yang}, title = {Learn to Defend: Adversarial Multi-Distillation for Automatic Modulation Recognition Models}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {19}, pages = {3690--3702}, year = {2024}, url = {https://doi.org/10.1109/TIFS.2024.3361172}, doi = {10.1109/TIFS.2024.3361172}, timestamp = {Fri, 17 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/ChenWXZSZXY24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/ChenYFLD24, author = {Zekai Chen and Shengxing Yu and Mingyuan Fan and Ximeng Liu and Robert H. Deng}, title = {Privacy-Enhancing and Robust Backdoor Defense for Federated Learning on Heterogeneous Data}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {19}, pages = {693--707}, year = {2024}, url = {https://doi.org/10.1109/TIFS.2023.3326983}, doi = {10.1109/TIFS.2023.3326983}, timestamp = {Sun, 10 Dec 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tifs/ChenYFLD24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/ChenZJZGG24, author = {Zhuo Chen and Liehuang Zhu and Peng Jiang and Can Zhang and Feng Gao and Fuchun Guo}, title = {Exploring Unobservable Blockchain-Based Covert Channel for Censorship-Resistant Systems}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {19}, pages = {3380--3394}, year = {2024}, url = {https://doi.org/10.1109/TIFS.2024.3361212}, doi = {10.1109/TIFS.2024.3361212}, timestamp = {Thu, 29 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tifs/ChenZJZGG24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/ChenZLSC24, author = {Chen Chen and Junqing Zhang and Tianyu Lu and Magnus Sandell and Liquan Chen}, title = {Secret Key Generation for IRS-Assisted Multi-Antenna Systems: {A} Machine Learning-Based Approach}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {19}, pages = {1086--1098}, year = {2024}, url = {https://doi.org/10.1109/TIFS.2023.3331588}, doi = {10.1109/TIFS.2023.3331588}, timestamp = {Sun, 31 Dec 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tifs/ChenZLSC24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/ChengM24, author = {Leixiao Cheng and Fei Meng}, title = {Server-Aided Public Key Authenticated Searchable Encryption With Constant Ciphertext and Constant Trapdoor}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {19}, pages = {1388--1400}, year = {2024}, url = {https://doi.org/10.1109/TIFS.2023.3336160}, doi = {10.1109/TIFS.2023.3336160}, timestamp = {Sat, 13 Jan 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tifs/ChengM24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/CohenCG24, author = {Alejandro Cohen and Asaf Cohen and Omer Gurewitz}, title = {Secure Adaptive Group Testing}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {19}, pages = {2786--2799}, year = {2024}, url = {https://doi.org/10.1109/TIFS.2024.3354188}, doi = {10.1109/TIFS.2024.3354188}, timestamp = {Thu, 29 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tifs/CohenCG24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/ColtucC24, author = {Dinu Coltuc and Henri George Coanda}, title = {Reversible Contrast Enhancement by Histogram Specification and Very Low Distortion Data Hiding}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {19}, pages = {529--539}, year = {2024}, url = {https://doi.org/10.1109/TIFS.2023.3326662}, doi = {10.1109/TIFS.2023.3326662}, timestamp = {Sun, 10 Dec 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tifs/ColtucC24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/CrosaraATL24, author = {Laura Crosara and Francesco Ardizzon and Stefano Tomasin and Nicola Laurenti}, title = {Worst-Case Spoofing Attack and Robust Countermeasure in Satellite Navigation Systems}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {19}, pages = {2039--2050}, year = {2024}, url = {https://doi.org/10.1109/TIFS.2023.3340061}, doi = {10.1109/TIFS.2023.3340061}, timestamp = {Fri, 08 Mar 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tifs/CrosaraATL24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/CuiMYZZJ24, author = {Ting Cui and Yiming Mao and Yang Yang and Yi Zhang and Jiyan Zhang and Chenhui Jin}, title = {Congruent Differential Cluster for Binary {SPN} Ciphers}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {19}, pages = {2385--2397}, year = {2024}, url = {https://doi.org/10.1109/TIFS.2024.3350374}, doi = {10.1109/TIFS.2024.3350374}, timestamp = {Fri, 08 Mar 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tifs/CuiMYZZJ24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/CuiZP24, author = {Zhenyu Cui and Jiahuan Zhou and Yuxin Peng}, title = {{DMA:} Dual Modality-Aware Alignment for Visible-Infrared Person Re-Identification}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {19}, pages = {2696--2708}, year = {2024}, url = {https://doi.org/10.1109/TIFS.2024.3352408}, doi = {10.1109/TIFS.2024.3352408}, timestamp = {Thu, 29 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tifs/CuiZP24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/DaiLZCXZJ24, author = {Weiqi Dai and Jinkai Liu and Yang Zhou and Kim{-}Kwang Raymond Choo and Xia Xie and Deqing Zou and Hai Jin}, title = {{PRBFPT:} {A} Practical Redactable Blockchain Framework With a Public Trapdoor}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {19}, pages = {2425--2437}, year = {2024}, url = {https://doi.org/10.1109/TIFS.2024.3349855}, doi = {10.1109/TIFS.2024.3349855}, timestamp = {Fri, 08 Mar 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tifs/DaiLZCXZJ24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/DanieliGAL24, author = {Erez Danieli and Menachem Goldzweig and Moshe Avital and Itamar Levi}, title = {Revealing the Secrets of Radio Embedded Systems: Extraction of Raw Information via {RF}}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {19}, pages = {2066--2081}, year = {2024}, url = {https://doi.org/10.1109/TIFS.2023.3345131}, doi = {10.1109/TIFS.2023.3345131}, timestamp = {Fri, 26 Jan 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tifs/DanieliGAL24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/DassanayakeGB24, author = {Janith Kavindu Dassanayake and Dulaj Gunasinghe and Gayan Amarasuriya Aruma Baduge}, title = {Secrecy Rate Analysis and Active Pilot Attack Detection for IRS-Aided Massive {MIMO} Systems}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {19}, pages = {2664--2679}, year = {2024}, url = {https://doi.org/10.1109/TIFS.2023.3318941}, doi = {10.1109/TIFS.2023.3318941}, timestamp = {Thu, 29 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tifs/DassanayakeGB24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/DengJWWX24, author = {Jiangyi Deng and Xiaoyu Ji and Beibei Wang and Bin Wang and Wenyuan Xu}, title = {Dr. Defender: Proactive Detection of Autopilot Drones Based on {CSI}}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {19}, pages = {194--206}, year = {2024}, url = {https://doi.org/10.1109/TIFS.2023.3311964}, doi = {10.1109/TIFS.2023.3311964}, timestamp = {Sun, 10 Dec 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tifs/DengJWWX24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/DengLXQ24, author = {Zhouyan Deng and Jiajia Liu and Yijie Xun and Junman Qin}, title = {IdentifierIDS: {A} Practical Voltage-Based Intrusion Detection System for Real In-Vehicle Networks}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {19}, pages = {661--676}, year = {2024}, url = {https://doi.org/10.1109/TIFS.2023.3327026}, doi = {10.1109/TIFS.2023.3327026}, timestamp = {Sun, 10 Dec 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tifs/DengLXQ24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/DingSHSC24, author = {Hongwei Ding and Yu Sun and Nana Huang and Zhidong Shen and Xiaohui Cui}, title = {{TMG-GAN:} Generative Adversarial Networks-Based Imbalanced Learning for Network Intrusion Detection}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {19}, pages = {1156--1167}, year = {2024}, url = {https://doi.org/10.1109/TIFS.2023.3331240}, doi = {10.1109/TIFS.2023.3331240}, timestamp = {Sun, 31 Dec 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tifs/DingSHSC24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/DingWQZZQC24, author = {Yi Ding and Zi Wang and Zhen Qin and Erqiang Zhou and Guobin Zhu and Zhiguang Qin and Kim{-}Kwang Raymond Choo}, title = {Backdoor Attack on Deep Learning-Based Medical Image Encryption and Decryption Network}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {19}, pages = {280--292}, year = {2024}, url = {https://doi.org/10.1109/TIFS.2023.3322315}, doi = {10.1109/TIFS.2023.3322315}, timestamp = {Sun, 10 Dec 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tifs/DingWQZZQC24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/DipuATF24, author = {Nusrat Farzana Dipu and Avinash Ayalasomayajula and Mark M. Tehranipoor and Farimah Farahmandi}, title = {{AGILE:} Automated Assertion Generation to Detect Information Leakage Vulnerabilities}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {19}, pages = {1794--1809}, year = {2024}, url = {https://doi.org/10.1109/TIFS.2023.3343970}, doi = {10.1109/TIFS.2023.3343970}, timestamp = {Sat, 13 Jan 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tifs/DipuATF24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/DongXZX24, author = {Yong Dong and Yinfei Xu and Tong Zhang and Yili Xia}, title = {Optimality of the Proper Gaussian Signal in Complex {MIMO} Wiretap Channels}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {19}, pages = {1401--1414}, year = {2024}, url = {https://doi.org/10.1109/TIFS.2023.3337719}, doi = {10.1109/TIFS.2023.3337719}, timestamp = {Sat, 13 Jan 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tifs/DongXZX24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/DouDXWXCJ24, author = {Haochen Dou and Zhenwu Dan and Peng Xu and Wei Wang and Shuning Xu and Tianyang Chen and Hai Jin}, title = {Dynamic Searchable Symmetric Encryption With Strong Security and Robustness}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {19}, pages = {2370--2384}, year = {2024}, url = {https://doi.org/10.1109/TIFS.2024.3350330}, doi = {10.1109/TIFS.2024.3350330}, timestamp = {Fri, 08 Mar 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tifs/DouDXWXCJ24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/DuCSZH24, author = {Hanbiao Du and Zheng Che and Meng Shen and Liehuang Zhu and Jiankun Hu}, title = {Breaking the Anonymity of Ethereum Mixing Services Using Graph Feature Learning}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {19}, pages = {616--631}, year = {2024}, url = {https://doi.org/10.1109/TIFS.2023.3326984}, doi = {10.1109/TIFS.2023.3326984}, timestamp = {Sun, 10 Dec 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tifs/DuCSZH24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/DuLHC24, author = {Runmeng Du and Xuru Li and Daojing He and Kim{-}Kwang Raymond Choo}, title = {Toward Secure and Verifiable Hybrid Federated Learning}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {19}, pages = {2935--2950}, year = {2024}, url = {https://doi.org/10.1109/TIFS.2024.3357288}, doi = {10.1109/TIFS.2024.3357288}, timestamp = {Thu, 29 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tifs/DuLHC24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/DuLZDS24, author = {Yunhao Du and Cheng Lei and Zhicheng Zhao and Yuan Dong and Fei Su}, title = {Video-Based Visible-Infrared Person Re-Identification With Auxiliary Samples}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {19}, pages = {1313--1325}, year = {2024}, url = {https://doi.org/10.1109/TIFS.2023.3337972}, doi = {10.1109/TIFS.2023.3337972}, timestamp = {Sun, 31 Dec 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tifs/DuLZDS24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/DuanJYYXL24, author = {Mingxing Duan and Kailun Jiao and Siyang Yu and Zhibang Yang and Bin Xiao and Kenli Li}, title = {MC-Net: Realistic Sample Generation for Black-Box Attacks}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {19}, pages = {3008--3022}, year = {2024}, url = {https://doi.org/10.1109/TIFS.2024.3356812}, doi = {10.1109/TIFS.2024.3356812}, timestamp = {Thu, 29 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tifs/DuanJYYXL24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/DuanLWFL24, author = {Guanghan Duan and Hongwu Lv and Huiqiang Wang and Guangsheng Feng and Xiaoli Li}, title = {Practical Cyber Attack Detection With Continuous Temporal Graph in Dynamic Network System}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {19}, pages = {4851--4864}, year = {2024}, url = {https://doi.org/10.1109/TIFS.2024.3385321}, doi = {10.1109/TIFS.2024.3385321}, timestamp = {Fri, 17 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/DuanLWFL24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/EshunP24, author = {Samuel N. Eshun and Paolo Palmieri}, title = {A Cryptographic Protocol for Efficient Mutual Location Privacy Through Outsourcing in Indoor Wi-Fi Localization}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {19}, pages = {4086--4099}, year = {2024}, url = {https://doi.org/10.1109/TIFS.2024.3372805}, doi = {10.1109/TIFS.2024.3372805}, timestamp = {Fri, 17 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/EshunP24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/EsmaeiliERMS24, author = {Ashkan Esmaeili and Marzieh Edraki and Nazanin Rahnavard and Ajmal Mian and Mubarak Shah}, title = {Low-Rank and Sparse Decomposition for Low-Query Decision-Based Adversarial Attacks}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {19}, pages = {1561--1575}, year = {2024}, url = {https://doi.org/10.1109/TIFS.2023.3275737}, doi = {10.1109/TIFS.2023.3275737}, timestamp = {Sat, 13 Jan 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tifs/EsmaeiliERMS24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/FadulRWLST24, author = {Mohamed K. M. Fadul and Donald R. Reising and Lakmali P. Weerasena and T. Daniel Loveless and Mina Sartipi and Joshua H. Tyler}, title = {Improving {RF-DNA} Fingerprinting Performance in an Indoor Multipath Environment Using Semi-Supervised Learning}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {19}, pages = {3194--3209}, year = {2024}, url = {https://doi.org/10.1109/TIFS.2024.3360851}, doi = {10.1109/TIFS.2024.3360851}, timestamp = {Fri, 08 Mar 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tifs/FadulRWLST24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/FanHSFYL24, author = {Linkun Fan and Fazhi He and Tongzhen Si and Rubin Fan and Chuanlong Ye and Bing Li}, title = {{MBA:} Backdoor Attacks Against 3D Mesh Classifier}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {19}, pages = {2127--2142}, year = {2024}, url = {https://doi.org/10.1109/TIFS.2023.3346644}, doi = {10.1109/TIFS.2023.3346644}, timestamp = {Fri, 26 Jan 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tifs/FanHSFYL24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/FangLWEZZLL24, author = {Hao Fang and Ajian Liu and Jun Wan and Sergio Escalera and Chenxu Zhao and Xu Zhang and Stan Z. Li and Zhen Lei}, title = {Surveillance Face Anti-Spoofing}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {19}, pages = {1535--1546}, year = {2024}, url = {https://doi.org/10.1109/TIFS.2023.3337970}, doi = {10.1109/TIFS.2023.3337970}, timestamp = {Sat, 20 Jan 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tifs/FangLWEZZLL24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/FangS24, author = {Shengbang Fang and Matthew C. Stamm}, title = {Attacking Image Splicing Detection and Localization Algorithms Using Synthetic Traces}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {19}, pages = {2143--2156}, year = {2024}, url = {https://doi.org/10.1109/TIFS.2023.3346312}, doi = {10.1109/TIFS.2023.3346312}, timestamp = {Fri, 26 Jan 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tifs/FangS24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/FeiHWWJF24, author = {Hongyan Fei and Chuanwei Huang and Song Wu and Zheng Wang and Zexi Jia and Jufu Feng}, title = {Fingerprint Presentation Attack Detection by Region Decomposition}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {19}, pages = {3974--3985}, year = {2024}, url = {https://doi.org/10.1109/TIFS.2024.3372813}, doi = {10.1109/TIFS.2024.3372813}, timestamp = {Fri, 17 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/FeiHWWJF24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/FengCM24, author = {Kai Feng and Marco M. Cook and Angelos K. Marnerides}, title = {Sizzler: Sequential Fuzzing in Ladder Diagrams for Vulnerability Detection and Discovery in Programmable Logic Controllers}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {19}, pages = {1660--1671}, year = {2024}, url = {https://doi.org/10.1109/TIFS.2023.3340615}, doi = {10.1109/TIFS.2023.3340615}, timestamp = {Sat, 13 Jan 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tifs/FengCM24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/FengXZWZ24, author = {Weiwei Feng and Nanqing Xu and Tianzhu Zhang and Baoyuan Wu and Yongdong Zhang}, title = {Robust and Generalized Physical Adversarial Attacks via Meta-GAN}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {19}, pages = {1112--1125}, year = {2024}, url = {https://doi.org/10.1109/TIFS.2023.3288426}, doi = {10.1109/TIFS.2023.3288426}, timestamp = {Sun, 31 Dec 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tifs/FengXZWZ24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/FerdausTR24, author = {Farah Ferdaus and Bashir M. Sabquat Bahar Talukder and Md. Tauhidur Rahman}, title = {Hiding Information for Secure and Covert Data Storage in Commercial ReRAM Chips}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {19}, pages = {3608--3619}, year = {2024}, url = {https://doi.org/10.1109/TIFS.2024.3364845}, doi = {10.1109/TIFS.2024.3364845}, timestamp = {Fri, 17 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/FerdausTR24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/FuWNZ24, author = {Xingquan Fu and Guanghui Wen and Mengfei Niu and Wei Xing Zheng}, title = {Distributed Secure Filtering Against Eavesdropping Attacks in SINR-Based Sensor Networks}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {19}, pages = {3483--3494}, year = {2024}, url = {https://doi.org/10.1109/TIFS.2024.3361177}, doi = {10.1109/TIFS.2024.3361177}, timestamp = {Fri, 17 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/FuWNZ24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/Gaeta24, author = {Rossano Gaeta}, title = {An Accurate and Efficient Algorithm to Identify Malicious Nodes of a Graph}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {19}, pages = {947--958}, year = {2024}, url = {https://doi.org/10.1109/TIFS.2023.3328211}, doi = {10.1109/TIFS.2023.3328211}, timestamp = {Sun, 17 Dec 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tifs/Gaeta24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/GaoBWYX24, author = {Kuofeng Gao and Jiawang Bai and Baoyuan Wu and Mengxi Ya and Shu{-}Tao Xia}, title = {Imperceptible and Robust Backdoor Attack in 3D Point Cloud}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {19}, pages = {1267--1282}, year = {2024}, url = {https://doi.org/10.1109/TIFS.2023.3333687}, doi = {10.1109/TIFS.2023.3333687}, timestamp = {Sat, 13 Jan 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tifs/GaoBWYX24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/GaoHSZ24, author = {Rui Gao and Jiangshuai Huang and Xiaojie Su and Ling Zhao}, title = {Adaptive Control of Strict-Feedback Nonlinear Systems Under Denial-of-Service: {A} Synthetic Analysis}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {19}, pages = {2315--2327}, year = {2024}, url = {https://doi.org/10.1109/TIFS.2023.3347969}, doi = {10.1109/TIFS.2023.3347969}, timestamp = {Fri, 26 Jan 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tifs/GaoHSZ24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/GaoLLW24, author = {Lijun Gao and Wenjun Liu and Kai Liu and Jiehong Wu}, title = {AugSteal: Advancing Model Steal With Data Augmentation in Active Learning Frameworks}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {19}, pages = {4728--4740}, year = {2024}, url = {https://doi.org/10.1109/TIFS.2024.3384841}, doi = {10.1109/TIFS.2024.3384841}, timestamp = {Fri, 17 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/GaoLLW24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/GaoZSL24, author = {Ge Gao and Yuan Zhang and Yaqing Song and Shiyu Li}, title = {PrivSSO: Practical Single-Sign-On Authentication Against Subscription/Access Pattern Leakage}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {19}, pages = {5075--5089}, year = {2024}, url = {https://doi.org/10.1109/TIFS.2024.3392533}, doi = {10.1109/TIFS.2024.3392533}, timestamp = {Fri, 17 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/GaoZSL24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/GaoZWCPLZ24, author = {Ce Gao and Kang Zhang and Weiwei Wang and Zhicheng X. Cao and Liaojun Pang and Eryun Liu and Heng Zhao}, title = {Protected Face Templates Generation Based on Multiple Partial Walsh Transformations and Simhash}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {19}, pages = {4100--4113}, year = {2024}, url = {https://doi.org/10.1109/TIFS.2024.3369322}, doi = {10.1109/TIFS.2024.3369322}, timestamp = {Fri, 17 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/GaoZWCPLZ24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/GeCWTL24, author = {Wenhan Ge and Zeyuan Cui and Junfeng Wang and Binhui Tang and Xiaohui Li}, title = {MetaCluster: {A} Universal Interpretable Classification Framework for Cybersecurity}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {19}, pages = {3829--3843}, year = {2024}, url = {https://doi.org/10.1109/TIFS.2024.3372808}, doi = {10.1109/TIFS.2024.3372808}, timestamp = {Fri, 17 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/GeCWTL24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/GeZ24, author = {Yunfei Ge and Quanyan Zhu}, title = {{GAZETA:} GAme-Theoretic ZEro-Trust Authentication for Defense Against Lateral Movement in 5G IoT Networks}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {19}, pages = {540--554}, year = {2024}, url = {https://doi.org/10.1109/TIFS.2023.3326975}, doi = {10.1109/TIFS.2023.3326975}, timestamp = {Fri, 08 Mar 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tifs/GeZ24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/GilkarovD24, author = {Daniel Gilkarov and Ran Dubin}, title = {Steganalysis of {AI} Models {LSB} Attacks}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {19}, pages = {4767--4779}, year = {2024}, url = {https://doi.org/10.1109/TIFS.2024.3383770}, doi = {10.1109/TIFS.2024.3383770}, timestamp = {Fri, 17 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/GilkarovD24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/GongGGGSWC24, author = {Bei Gong and Chong Guo and Chong Guo and Chen Guo and Yao Sun and Muhammad Waqas and Sheng Chen}, title = {{SLIM:} {A} Secure and Lightweight Multi-Authority Attribute-Based Signcryption Scheme for IoT}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {19}, pages = {1299--1312}, year = {2024}, url = {https://doi.org/10.1109/TIFS.2023.3331566}, doi = {10.1109/TIFS.2023.3331566}, timestamp = {Mon, 11 Dec 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tifs/GongGGGSWC24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/GongSZZWBX24, author = {Zirui Gong and Liyue Shen and Yanjun Zhang and Leo Yu Zhang and Jingwei Wang and Guangdong Bai and Yong Xiang}, title = {AgrAmplifier: Defending Federated Learning Against Poisoning Attacks Through Local Update Amplification}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {19}, pages = {1241--1250}, year = {2024}, url = {https://doi.org/10.1109/TIFS.2023.3333555}, doi = {10.1109/TIFS.2023.3333555}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tifs/GongSZZWBX24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/GongZGQWWZ24, author = {Maoguo Gong and Yuanqiao Zhang and Yuan Gao and A. Kai Qin and Yue Wu and Shanfeng Wang and Yihong Zhang}, title = {A Multi-Modal Vertical Federated Learning Framework Based on Homomorphic Encryption}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {19}, pages = {1826--1839}, year = {2024}, url = {https://doi.org/10.1109/TIFS.2023.3340994}, doi = {10.1109/TIFS.2023.3340994}, timestamp = {Tue, 07 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/GongZGQWWZ24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/GongZZW24, author = {Jiajun Gong and Wuqi Zhang and Charles Zhang and Tao Wang}, title = {WFDefProxy: Real World Implementation and Evaluation of Website Fingerprinting Defenses}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {19}, pages = {1357--1371}, year = {2024}, url = {https://doi.org/10.1109/TIFS.2023.3327662}, doi = {10.1109/TIFS.2023.3327662}, timestamp = {Wed, 10 Apr 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/GongZZW24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/GronowskiPAGB24, author = {Adam Gronowski and William Paul and Fady Alajaji and Bahman Gharesifard and Philippe Burlina}, title = {Classification Utility, Fairness, and Compactness via Tunable Information Bottleneck and R{\'{e}}nyi Measures}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {19}, pages = {1630--1645}, year = {2024}, url = {https://doi.org/10.1109/TIFS.2023.3340094}, doi = {10.1109/TIFS.2023.3340094}, timestamp = {Sat, 13 Jan 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tifs/GronowskiPAGB24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/GrujicV24, author = {Milos Grujic and Ingrid Verbauwhede}, title = {Optimizing Linear Correctors: {A} Tight Output Min-Entropy Bound and Selection Technique}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {19}, pages = {586--600}, year = {2024}, url = {https://doi.org/10.1109/TIFS.2023.3326986}, doi = {10.1109/TIFS.2023.3326986}, timestamp = {Sun, 10 Dec 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tifs/GrujicV24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/GuanWDP24, author = {Weinan Guan and Wei Wang and Jing Dong and Bo Peng}, title = {Improving Generalization of Deepfake Detectors by Imposing Gradient Regularization}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {19}, pages = {5345--5356}, year = {2024}, url = {https://doi.org/10.1109/TIFS.2024.3396064}, doi = {10.1109/TIFS.2024.3396064}, timestamp = {Fri, 17 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/GuanWDP24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/GulK24, author = {{\c{C}}agdas G{\"{u}}l and Orhun Kara}, title = {Correction to "A New Construction Method for Keystream Generators"}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {19}, pages = {4198}, year = {2024}, url = {https://doi.org/10.1109/TIFS.2024.3372200}, doi = {10.1109/TIFS.2024.3372200}, timestamp = {Fri, 17 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/GulK24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/GuoGXYZ24, author = {Yimin Guo and Yajun Guo and Ping Xiong and Fan Yang and Chengde Zhang}, title = {Deeper Insight Into Why Authentication Schemes in IoT Environments Fail to Achieve the Desired Security}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {19}, pages = {4615--4627}, year = {2024}, url = {https://doi.org/10.1109/TIFS.2024.3382934}, doi = {10.1109/TIFS.2024.3382934}, timestamp = {Fri, 17 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/GuoGXYZ24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/GuoJCW24, author = {Liang Guo and Jie Jia and Jian Chen and Xingwei Wang}, title = {Secure Communication Optimization in {NOMA} Systems With UAV-Mounted {STAR-RIS}}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {19}, pages = {2300--2314}, year = {2024}, url = {https://doi.org/10.1109/TIFS.2023.3348242}, doi = {10.1109/TIFS.2023.3348242}, timestamp = {Fri, 26 Jan 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tifs/GuoJCW24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/GuoJWWYK24, author = {Zhiqing Guo and Zhenhong Jia and Liejun Wang and Dewang Wang and Gaobo Yang and Nikola K. Kasabov}, title = {Constructing New Backbone Networks via Space-Frequency Interactive Convolution for Deepfake Detection}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {19}, pages = {401--413}, year = {2024}, url = {https://doi.org/10.1109/TIFS.2023.3324739}, doi = {10.1109/TIFS.2023.3324739}, timestamp = {Sun, 10 Dec 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tifs/GuoJWWYK24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/GuoLLZLHZ24, author = {Zhenyu Guo and Xin Li and Jiamou Liu and Zijian Zhang and Meng Li and Jingjing Hu and Liehuang Zhu}, title = {Graph-Based Covert Transaction Detection and Protection in Blockchain}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {19}, pages = {2244--2257}, year = {2024}, url = {https://doi.org/10.1109/TIFS.2023.3347895}, doi = {10.1109/TIFS.2023.3347895}, timestamp = {Fri, 26 Jan 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tifs/GuoLLZLHZ24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/GuoTB24, author = {Wei Guo and Benedetta Tondi and Mauro Barni}, title = {Universal Detection of Backdoor Attacks via Density-Based Clustering and Centroids Analysis}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {19}, pages = {970--984}, year = {2024}, url = {https://doi.org/10.1109/TIFS.2023.3329426}, doi = {10.1109/TIFS.2023.3329426}, timestamp = {Fri, 08 Mar 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tifs/GuoTB24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/GuoZHWJ24, author = {Yu Guo and Yu Zhao and Saihui Hou and Cong Wang and Xiaohua Jia}, title = {Verifying in the Dark: Verifiable Machine Unlearning by Using Invisible Backdoor Triggers}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {19}, pages = {708--721}, year = {2024}, url = {https://doi.org/10.1109/TIFS.2023.3328269}, doi = {10.1109/TIFS.2023.3328269}, timestamp = {Sun, 10 Dec 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tifs/GuoZHWJ24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/HajraASPM24, author = {Suvadeep Hajra and Manaar Alam and Sayandeep Saha and Stjepan Picek and Debdeep Mukhopadhyay}, title = {On the Instability of Softmax Attention-Based Deep Learning Models in Side-Channel Analysis}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {19}, pages = {514--528}, year = {2024}, url = {https://doi.org/10.1109/TIFS.2023.3326667}, doi = {10.1109/TIFS.2023.3326667}, timestamp = {Sun, 10 Dec 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tifs/HajraASPM24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/HanGMLXBNMM24, author = {Ruidong Han and Huihui Gong and Siqi Ma and Juanru Li and Chang Xu and Elisa Bertino and Surya Nepal and Zhuo Ma and Jianfeng Ma}, title = {A Credential Usage Study: Flow-Aware Leakage Detection in Open-Source Projects}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {19}, pages = {722--734}, year = {2024}, url = {https://doi.org/10.1109/TIFS.2023.3326985}, doi = {10.1109/TIFS.2023.3326985}, timestamp = {Sun, 10 Dec 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tifs/HanGMLXBNMM24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/HanSLH24, author = {Jinguang Han and Willy Susilo and Nan Li and Xinyi Huang}, title = {{OLBS:} Oblivious Location-Based Services}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {19}, pages = {2231--2243}, year = {2024}, url = {https://doi.org/10.1109/TIFS.2023.3347874}, doi = {10.1109/TIFS.2023.3347874}, timestamp = {Fri, 26 Jan 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tifs/HanSLH24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/HaoLDHX24, author = {Xiaohan Hao and Chao Lin and Wenhan Dong and Xinyi Huang and Hui Xiong}, title = {Robust and Secure Federated Learning Against Hybrid Attacks: {A} Generic Architecture}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {19}, pages = {1576--1588}, year = {2024}, url = {https://doi.org/10.1109/TIFS.2023.3336521}, doi = {10.1109/TIFS.2023.3336521}, timestamp = {Sat, 13 Jan 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tifs/HaoLDHX24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/HeCWLWJD24, author = {Shuting He and Weihua Chen and Kai Wang and Hao Luo and Fan Wang and Wei Jiang and Henghui Ding}, title = {Region Generation and Assessment Network for Occluded Person Re-Identification}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {19}, pages = {120--132}, year = {2024}, url = {https://doi.org/10.1109/TIFS.2023.3318956}, doi = {10.1109/TIFS.2023.3318956}, timestamp = {Thu, 29 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tifs/HeCWLWJD24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/HeKYL24, author = {Yuewang He and Xiangui Kang and Qiben Yan and Enping Li}, title = {ResNeXt+: Attention Mechanisms Based on ResNeXt for Malware Detection and Classification}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {19}, pages = {1142--1155}, year = {2024}, url = {https://doi.org/10.1109/TIFS.2023.3328431}, doi = {10.1109/TIFS.2023.3328431}, timestamp = {Sun, 31 Dec 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tifs/HeKYL24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/HeLXCC24, author = {Daojing He and Xin Lv and Xueqian Xu and Sammy Chan and Kim{-}Kwang Raymond Choo}, title = {Double-Layer Detection of Internal Threat in Enterprise Systems Based on Deep Learning}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {19}, pages = {4741--4751}, year = {2024}, url = {https://doi.org/10.1109/TIFS.2024.3372771}, doi = {10.1109/TIFS.2024.3372771}, timestamp = {Fri, 17 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/HeLXCC24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/HeSHDNTHLZ24, author = {Ying He and Zhili Shen and Jingyu Hua and Qixuan Dong and Jiacheng Niu and Wei Tong and Xu Huang and Chen Li and Sheng Zhong}, title = {Backdoor Attack Against Split Neural Network-Based Vertical Federated Learning}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {19}, pages = {748--763}, year = {2024}, url = {https://doi.org/10.1109/TIFS.2023.3327853}, doi = {10.1109/TIFS.2023.3327853}, timestamp = {Sun, 10 Dec 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tifs/HeSHDNTHLZ24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/HeTLLCL24, author = {Junjiang He and Cong Tang and Wenshan Li and Tao Li and Li Chen and Xiaolong Lan}, title = {{BR-HIDF:} An Anti-Sparsity and Effective Host Intrusion Detection Framework Based on Multi-Granularity Feature Extraction}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {19}, pages = {485--499}, year = {2024}, url = {https://doi.org/10.1109/TIFS.2023.3324388}, doi = {10.1109/TIFS.2023.3324388}, timestamp = {Sun, 10 Dec 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tifs/HeTLLCL24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/HongYYL24, author = {Sangwoo Hong and Heecheol Yang and Youngseok Yoon and Jungwoo Lee}, title = {Group-Wise Verifiable Coded Computing Under Byzantine Attacks and Stragglers}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {19}, pages = {4344--4357}, year = {2024}, url = {https://doi.org/10.1109/TIFS.2024.3377929}, doi = {10.1109/TIFS.2024.3377929}, timestamp = {Fri, 17 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/HongYYL24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/HuGZY24, author = {Songlin Hu and Xiaohua Ge and Wei Zhang and Dong Yue}, title = {DoS-Resilient Load Frequency Control of Multi-Area Power Systems: An Attack-Parameter-Dependent Approach}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {19}, pages = {3423--3434}, year = {2024}, url = {https://doi.org/10.1109/TIFS.2024.3361159}, doi = {10.1109/TIFS.2024.3361159}, timestamp = {Sat, 16 Mar 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tifs/HuGZY24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/HuLFW24, author = {Cong Hu and Yuanbo Li and Zhen{-}Hua Feng and Xiaojun Wu}, title = {Toward Transferable Attack via Adversarial Diffusion in Face Recognition}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {19}, pages = {5506--5519}, year = {2024}, url = {https://doi.org/10.1109/TIFS.2024.3402167}, doi = {10.1109/TIFS.2024.3402167}, timestamp = {Fri, 31 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/HuLFW24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/HuLWHZG24, author = {Qingqing Hu and Tianrui Lin and Tianjian Wei and Nuo Huang and Yi{-}Jun Zhu and Chen Gong}, title = {Covert Transmission in Water-to-Air Optical Wireless Communication Systems}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {19}, pages = {4432--4447}, year = {2024}, url = {https://doi.org/10.1109/TIFS.2024.3376965}, doi = {10.1109/TIFS.2024.3376965}, timestamp = {Fri, 17 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/HuLWHZG24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/HuLZZWZD24, author = {Xiaoxue Hu and Geling Liu and Baolin Zheng and Lingchen Zhao and Qian Wang and Yufei Zhang and Minxin Du}, title = {FastTextDodger: Decision-Based Adversarial Attack Against Black-Box {NLP} Models With Extremely High Efficiency}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {19}, pages = {2398--2411}, year = {2024}, url = {https://doi.org/10.1109/TIFS.2024.3350376}, doi = {10.1109/TIFS.2024.3350376}, timestamp = {Fri, 26 Jan 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tifs/HuLZZWZD24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/HuSV24, author = {Fanliang Hu and Jian Shen and Pandi Vijayakumar}, title = {Side-Channel Attacks Based on Multi-Loss Regularized Denoising AutoEncoder}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {19}, pages = {2051--2065}, year = {2024}, url = {https://doi.org/10.1109/TIFS.2023.3343947}, doi = {10.1109/TIFS.2023.3343947}, timestamp = {Fri, 26 Jan 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tifs/HuSV24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/HuaTZLZ24, author = {Zhongyun Hua and Yan Tong and Yifeng Zheng and Yuhong Li and Yushu Zhang}, title = {PPGloVe: Privacy-Preserving GloVe for Training Word Vectors in the Dark}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {19}, pages = {3644--3658}, year = {2024}, url = {https://doi.org/10.1109/TIFS.2024.3364080}, doi = {10.1109/TIFS.2024.3364080}, timestamp = {Fri, 17 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/HuaTZLZ24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/HuangHCLHH24, author = {Panjian Huang and Saihui Hou and Chunshui Cao and Xu Liu and Xuecai Hu and Yongzhen Huang}, title = {Integral Pose Learning via Appearance Transfer for Gait Recognition}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {19}, pages = {4716--4727}, year = {2024}, url = {https://doi.org/10.1109/TIFS.2024.3382606}, doi = {10.1109/TIFS.2024.3382606}, timestamp = {Fri, 17 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/HuangHCLHH24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/HuangHQWG24, author = {Lifeng Huang and Qiong Huang and Peichao Qiu and Shuxin Wei and Chengying Gao}, title = {{FASTEN:} Fast Ensemble Learning for Improved Adversarial Robustness}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {19}, pages = {2565--2580}, year = {2024}, url = {https://doi.org/10.1109/TIFS.2023.3336527}, doi = {10.1109/TIFS.2023.3336527}, timestamp = {Thu, 29 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tifs/HuangHQWG24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/HuangLLTH24, author = {Dongxia Huang and Weiqi Luo and Minglin Liu and Weixuan Tang and Jiwu Huang}, title = {Steganography Embedding Cost Learning With Generative Multi-Adversarial Network}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {19}, pages = {15--29}, year = {2024}, url = {https://doi.org/10.1109/TIFS.2023.3318939}, doi = {10.1109/TIFS.2023.3318939}, timestamp = {Sun, 10 Dec 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tifs/HuangLLTH24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/HuangWYHL24, author = {Baojin Huang and Zhongyuan Wang and Jifan Yang and Zhen Han and Chao Liang}, title = {Unlabeled Data Assistant: Improving Mask Robustness for Face Recognition}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {19}, pages = {3109--3123}, year = {2024}, url = {https://doi.org/10.1109/TIFS.2024.3354109}, doi = {10.1109/TIFS.2024.3354109}, timestamp = {Thu, 29 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tifs/HuangWYHL24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/HuangZZDZCKC24, author = {Junhao Huang and Haosong Zhao and Jipeng Zhang and Wangchen Dai and Lu Zhou and Ray C. C. Cheung and {\c{C}}etin Kaya Ko{\c{c}} and Donglong Chen}, title = {Yet Another Improvement of Plantard Arithmetic for Faster Kyber on Low-End 32-bit IoT Devices}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {19}, pages = {3800--3813}, year = {2024}, url = {https://doi.org/10.1109/TIFS.2024.3371369}, doi = {10.1109/TIFS.2024.3371369}, timestamp = {Fri, 31 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/HuangZZDZCKC24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/IssaMTC24, author = {Wael Issa and Nour Moustafa and Benjamin P. Turnbull and Kim{-}Kwang Raymond Choo}, title = {{RVE-PFL:} Robust Variational Encoder-Based Personalized Federated Learning Against Model Inversion Attacks}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {19}, pages = {3772--3787}, year = {2024}, url = {https://doi.org/10.1109/TIFS.2024.3368879}, doi = {10.1109/TIFS.2024.3368879}, timestamp = {Fri, 17 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/IssaMTC24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/JeonJBJ24, author = {Jueun Jeon and Byeonghui Jeong and Seungyeon Baek and Young{-}Sik Jeong}, title = {Static Multi Feature-Based Malware Detection Using Multi SPP-net in Smart IoT Environments}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {19}, pages = {2487--2500}, year = {2024}, url = {https://doi.org/10.1109/TIFS.2024.3350379}, doi = {10.1109/TIFS.2024.3350379}, timestamp = {Fri, 26 Jan 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tifs/JeonJBJ24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/JiJLSX24, author = {Xiaoyu Ji and Qinhong Jiang and Chaohao Li and Zhuoyang Shi and Wenyuan Xu}, title = {Watch Your Speed: Injecting Malicious Voice Commands via Time-Scale Modification}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {19}, pages = {3366--3379}, year = {2024}, url = {https://doi.org/10.1109/TIFS.2024.3352394}, doi = {10.1109/TIFS.2024.3352394}, timestamp = {Sat, 16 Mar 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tifs/JiJLSX24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/JiaCHSWD24, author = {Meng Jia and Jing Chen and Kun He and Min Shi and Yuanzheng Wang and Ruiying Du}, title = {Generic Construction of Threshold Credential Management With User-Autonomy Aggregation}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {19}, pages = {2549--2564}, year = {2024}, url = {https://doi.org/10.1109/TIFS.2023.3347897}, doi = {10.1109/TIFS.2023.3347897}, timestamp = {Thu, 29 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tifs/JiaCHSWD24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/JiaLGBC24, author = {Xiaojun Jia and Jianshu Li and Jindong Gu and Yang Bai and Xiaochun Cao}, title = {Fast Propagation Is Better: Accelerating Single-Step Adversarial Training via Sampling Subnetworks}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {19}, pages = {4547--4559}, year = {2024}, url = {https://doi.org/10.1109/TIFS.2024.3377004}, doi = {10.1109/TIFS.2024.3377004}, timestamp = {Fri, 17 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/JiaLGBC24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/JiaMLWD24, author = {Ju Jia and Siqi Ma and Yang Liu and Lina Wang and Robert H. Deng}, title = {A Causality-Aligned Structure Rationalization Scheme Against Adversarial Biased Perturbations for Graph Neural Networks}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {19}, pages = {59--73}, year = {2024}, url = {https://doi.org/10.1109/TIFS.2023.3318936}, doi = {10.1109/TIFS.2023.3318936}, timestamp = {Fri, 15 Dec 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tifs/JiaMLWD24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/JiangLSD24, author = {Mei Jiang and Yannan Li and Willy Susilo and Dung Hoang Duong}, title = {Quantum-Safe Puncturable Signatures With Their Application in Blockchain}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {19}, pages = {2761--2770}, year = {2024}, url = {https://doi.org/10.1109/TIFS.2024.3353074}, doi = {10.1109/TIFS.2024.3353074}, timestamp = {Fri, 22 Mar 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tifs/JiangLSD24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/JiangLSML24, author = {Fangling Jiang and Yunfan Liu and Haolin Si and Jingjing Meng and Qi Li}, title = {Cross-Scenario Unknown-Aware Face Anti-Spoofing With Evidential Semantic Consistency Learning}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {19}, pages = {3093--3108}, year = {2024}, url = {https://doi.org/10.1109/TIFS.2024.3356234}, doi = {10.1109/TIFS.2024.3356234}, timestamp = {Fri, 24 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/JiangLSML24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/JiangLT24, author = {Bo Jiang and Ming Li and Ravi Tandon}, title = {Online Context-Aware Streaming Data Release With Sequence Information Privacy}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {19}, pages = {4390--4405}, year = {2024}, url = {https://doi.org/10.1109/TIFS.2024.3378008}, doi = {10.1109/TIFS.2024.3378008}, timestamp = {Fri, 17 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/JiangLT24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/JiangLZ24, author = {Peng Jiang and Qi Liu and Liehuang Zhu}, title = {SanIdea: Exploiting Secure Blockchain-Based Access Control via Sanitizable Encryption}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {19}, pages = {1589--1600}, year = {2024}, url = {https://doi.org/10.1109/TIFS.2023.3340066}, doi = {10.1109/TIFS.2023.3340066}, timestamp = {Sat, 13 Jan 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tifs/JiangLZ24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/JiangLZ24a, author = {Peng Jiang and Qi Liu and Liehuang Zhu}, title = {Purified Authorization Service With Encrypted Message Moderation}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {19}, pages = {5196--5206}, year = {2024}, url = {https://doi.org/10.1109/TIFS.2024.3393391}, doi = {10.1109/TIFS.2024.3393391}, timestamp = {Fri, 17 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/JiangLZ24a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/JiangW24, author = {Jingwei Jiang and Ding Wang}, title = {{QPASE:} Quantum-Resistant Password-Authenticated Searchable Encryption for Cloud Storage}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {19}, pages = {4231--4246}, year = {2024}, url = {https://doi.org/10.1109/TIFS.2024.3372804}, doi = {10.1109/TIFS.2024.3372804}, timestamp = {Fri, 17 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/JiangW24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/JiangXHZC24, author = {Changsong Jiang and Chunxiang Xu and Yunxia Han and Zhao Zhang and Kefei Chen}, title = {Two-Factor Authenticated Key Exchange From Biometrics With Low Entropy Rates}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {19}, pages = {3844--3856}, year = {2024}, url = {https://doi.org/10.1109/TIFS.2024.3372812}, doi = {10.1109/TIFS.2024.3372812}, timestamp = {Fri, 17 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/JiangXHZC24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/JiangZMLTL24, author = {Qi Jiang and Guichuan Zhao and Xindi Ma and Meng Li and Youliang Tian and Xinghua Li}, title = {Cross-Modal Learning Based Flexible Bimodal Biometric Authentication With Template Protection}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {19}, pages = {3593--3607}, year = {2024}, url = {https://doi.org/10.1109/TIFS.2024.3364092}, doi = {10.1109/TIFS.2024.3364092}, timestamp = {Fri, 17 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/JiangZMLTL24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/JingHGWHW24, author = {Tao Jing and Hongyan Huang and Qinghe Gao and Yue Wu and Yan Huo and Yawei Wang}, title = {Multi-User Physical Layer Authentication Based on {CSI} Using ResNet in Mobile IIoT}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {19}, pages = {1896--1907}, year = {2024}, url = {https://doi.org/10.1109/TIFS.2023.3340090}, doi = {10.1109/TIFS.2023.3340090}, timestamp = {Tue, 16 Jan 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tifs/JingHGWHW24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/JmalHBIKW24, author = {Houssem Jmal and Firas Ben Hmida and Nardine Basta and Muhammad Ikram and Mohamed Ali K{\^{a}}afar and Andy Walker}, title = {{SPGNN-API:} {A} Transferable Graph Neural Network for Attack Paths Identification and Autonomous Mitigation}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {19}, pages = {1601--1613}, year = {2024}, url = {https://doi.org/10.1109/TIFS.2023.3338965}, doi = {10.1109/TIFS.2023.3338965}, timestamp = {Sat, 13 Jan 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tifs/JmalHBIKW24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/KandePTDTKR24, author = {Rahul Kande and Hammond Pearce and Benjamin Tan and Brendan Dolan{-}Gavitt and Shailja Thakur and Ramesh Karri and Jeyavijayan Rajendran}, title = {(Security) Assertions by Large Language Models}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {19}, pages = {4374--4389}, year = {2024}, url = {https://doi.org/10.1109/TIFS.2024.3372809}, doi = {10.1109/TIFS.2024.3372809}, timestamp = {Fri, 17 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/KandePTDTKR24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/KangYA24, author = {Bichen Kang and Neng Ye and Jianping An}, title = {Optimal Signaling for Covert Communications Under Peak Power Constraint}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {19}, pages = {5030--5045}, year = {2024}, url = {https://doi.org/10.1109/TIFS.2024.3395067}, doi = {10.1109/TIFS.2024.3395067}, timestamp = {Fri, 17 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/KangYA24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/KarunanayakeJAJ24, author = {Ishan Karunanayake and Jiaojiao Jiang and Nadeem Ahmed and Sanjay K. Jha}, title = {Exploring Uncharted Waters of Website Fingerprinting}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {19}, pages = {1840--1854}, year = {2024}, url = {https://doi.org/10.1109/TIFS.2023.3342607}, doi = {10.1109/TIFS.2023.3342607}, timestamp = {Sat, 13 Jan 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tifs/KarunanayakeJAJ24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/KeWH24, author = {Da Ke and Xiang Wang and Zhitao Huang}, title = {Frequency-Selective Adversarial Attack Against Deep Learning-Based Wireless Signal Classifiers}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {19}, pages = {4001--4011}, year = {2024}, url = {https://doi.org/10.1109/TIFS.2024.3352423}, doi = {10.1109/TIFS.2024.3352423}, timestamp = {Fri, 17 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/KeWH24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/KimHKSH24, author = {Hodong Kim and Changhee Hahn and Hyunwoo J. Kim and Youngjoo Shin and Junbeom Hur}, title = {Deep Learning-Based Detection for Multiple Cache Side-Channel Attacks}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {19}, pages = {1672--1686}, year = {2024}, url = {https://doi.org/10.1109/TIFS.2023.3340088}, doi = {10.1109/TIFS.2023.3340088}, timestamp = {Sat, 13 Jan 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tifs/KimHKSH24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/KongC24, author = {Ruiqi Kong and He Henry Chen}, title = {{CSI-RFF:} Leveraging Micro-Signals on {CSI} for {RF} Fingerprinting of Commodity WiFi}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {19}, pages = {5301--5315}, year = {2024}, url = {https://doi.org/10.1109/TIFS.2024.3396375}, doi = {10.1109/TIFS.2024.3396375}, timestamp = {Fri, 31 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/KongC24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/KuangLLJ24, author = {Huafeng Kuang and Hong Liu and Xianming Lin and Rongrong Ji}, title = {Defense Against Adversarial Attacks Using Topology Aligning Adversarial Training}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {19}, pages = {3659--3673}, year = {2024}, url = {https://doi.org/10.1109/TIFS.2024.3359820}, doi = {10.1109/TIFS.2024.3359820}, timestamp = {Fri, 17 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/KuangLLJ24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/LaiSDG24, author = {Jianchang Lai and Willy Susilo and Robert H. Deng and Fuchun Guo}, title = {{SDSS:} Sequential Data Sharing System in IoT}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {19}, pages = {2288--2299}, year = {2024}, url = {https://doi.org/10.1109/TIFS.2023.3348229}, doi = {10.1109/TIFS.2023.3348229}, timestamp = {Fri, 26 Jan 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tifs/LaiSDG24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/LaiZFZZ24, author = {Yuni Lai and Yulin Zhu and Wenqi Fan and Xiaoge Zhang and Kai Zhou}, title = {Toward Adversarially Robust Recommendation From Adaptive Fraudster Detection}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {19}, pages = {907--919}, year = {2024}, url = {https://doi.org/10.1109/TIFS.2023.3327876}, doi = {10.1109/TIFS.2023.3327876}, timestamp = {Mon, 22 Jan 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tifs/LaiZFZZ24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/LeeYLH24, author = {Jinyoung Lee and Hyeonsik Yeom and Si{-}Hyeon Lee and Jeongseok Ha}, title = {Channel Correlation in Multi-User Covert Communication: Friend or Foe?}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {19}, pages = {1469--1482}, year = {2024}, url = {https://doi.org/10.1109/TIFS.2023.3338421}, doi = {10.1109/TIFS.2023.3338421}, timestamp = {Sat, 13 Jan 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tifs/LeeYLH24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/LiCZWC24, author = {Beibei Li and Youtong Chen and Lei Zhang and Licheng Wang and Yanyu Cheng}, title = {HomeSentinel: Intelligent Anti-Fingerprinting for IoT Traffic in Smart Homes}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {19}, pages = {4780--4793}, year = {2024}, url = {https://doi.org/10.1109/TIFS.2024.3382589}, doi = {10.1109/TIFS.2024.3382589}, timestamp = {Fri, 17 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/LiCZWC24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/LiDWZMZZL24, author = {Meng Li and Hanni Ding and Qing Wang and Mingwei Zhang and Weizhi Meng and Liehuang Zhu and Zijian Zhang and Xiaodong Lin}, title = {Decentralized Threshold Signatures With Dynamically Private Accountability}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {19}, pages = {2217--2230}, year = {2024}, url = {https://doi.org/10.1109/TIFS.2023.3347968}, doi = {10.1109/TIFS.2023.3347968}, timestamp = {Fri, 26 Jan 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tifs/LiDWZMZZL24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/LiGLH24, author = {Qiongxiu Li and Jaron Skovsted Gundersen and Milan Lopuha{\"{a}}{-}Zwakenberg and Richard Heusdens}, title = {Adaptive Differentially Quantized Subspace Perturbation {(ADQSP):} {A} Unified Framework for Privacy-Preserving Distributed Average Consensus}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {19}, pages = {1780--1793}, year = {2024}, url = {https://doi.org/10.1109/TIFS.2023.3343599}, doi = {10.1109/TIFS.2023.3343599}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tifs/LiGLH24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/LiHZYXD24, author = {Xiaoguo Li and Zixi Huang and Bowen Zhao and Guomin Yang and Tao Xiang and Robert H. Deng}, title = {{STDA:} Secure Time Series Data Analytics With Practical Efficiency in Wide-Area Network}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {19}, pages = {1440--1454}, year = {2024}, url = {https://doi.org/10.1109/TIFS.2023.3336512}, doi = {10.1109/TIFS.2023.3336512}, timestamp = {Sat, 13 Jan 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tifs/LiHZYXD24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/LiLHH24, author = {Xiao Li and Qiongxiu Li and Zhanhao Hu and Xiaolin Hu}, title = {On the Privacy Effect of Data Enhancement via the Lens of Memorization}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {19}, pages = {4686--4699}, year = {2024}, url = {https://doi.org/10.1109/TIFS.2024.3381477}, doi = {10.1109/TIFS.2024.3381477}, timestamp = {Fri, 17 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/LiLHH24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/LiLTLLL24, author = {Haozhe Li and Yilin Liao and Zijian Tian and Zhaoran Liu and Jiaqi Liu and Xinggao Liu}, title = {Bidirectional Stackable Recurrent Generative Adversarial Imputation Network for Specific Emitter Missing Data Imputation}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {19}, pages = {2967--2980}, year = {2024}, url = {https://doi.org/10.1109/TIFS.2024.3352393}, doi = {10.1109/TIFS.2024.3352393}, timestamp = {Thu, 29 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tifs/LiLTLLL24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/LiMZGAXFZAA24, author = {Yinshan Li and Hua Ma and Zhi Zhang and Yansong Gao and Alsharif Abuadbba and Minhui Xue and Anmin Fu and Yifeng Zheng and Said F. Al{-}Sarawi and Derek Abbott}, title = {{NTD:} Non-Transferability Enabled Deep Learning Backdoor Detection}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {19}, pages = {104--119}, year = {2024}, url = {https://doi.org/10.1109/TIFS.2023.3312973}, doi = {10.1109/TIFS.2023.3312973}, timestamp = {Sun, 10 Dec 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tifs/LiMZGAXFZAA24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/LiMZZW24, author = {Shuyi Li and Ruijun Ma and Jianhang Zhou and Bob Zhang and Lifang Wu}, title = {Joint Discriminative Analysis With Low-Rank Projection for Finger Vein Feature Extraction}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {19}, pages = {959--969}, year = {2024}, url = {https://doi.org/10.1109/TIFS.2023.3326364}, doi = {10.1109/TIFS.2023.3326364}, timestamp = {Sun, 31 Dec 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tifs/LiMZZW24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/LiPCM24, author = {Meng Li and Zheng Pei and Yong Chen and Zhenhai Miao}, title = {Fuzzy Linguistic Knowledge Reasoning-Based Secure Control for Connected Nonlinear Servosystem}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {19}, pages = {334--343}, year = {2024}, url = {https://doi.org/10.1109/TIFS.2023.3324396}, doi = {10.1109/TIFS.2023.3324396}, timestamp = {Sun, 10 Dec 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tifs/LiPCM24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/LiQHDS24, author = {Dingzhao Li and Jie Qi and Shaohua Hong and Pengfei Deng and Haixin Sun}, title = {A Class-Incremental Approach With Self-Training and Prototype Augmentation for Specific Emitter Identification}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {19}, pages = {1714--1727}, year = {2024}, url = {https://doi.org/10.1109/TIFS.2023.3343193}, doi = {10.1109/TIFS.2023.3343193}, timestamp = {Sat, 13 Jan 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tifs/LiQHDS24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/LiSLHZKEPH24, author = {Guyue Li and Paul Staat and Haoyu Li and Markus Heinrichs and Christian T. Zenger and Rainer Kronberger and Harald Elders{-}Boll and Christof Paar and Aiqun Hu}, title = {RIS-Jamming: Breaking Key Consistency in Channel Reciprocity-Based Key Generation}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {19}, pages = {5090--5105}, year = {2024}, url = {https://doi.org/10.1109/TIFS.2024.3389569}, doi = {10.1109/TIFS.2024.3389569}, timestamp = {Fri, 17 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/LiSLHZKEPH24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/LiWLCZ24, author = {Zhankai Li and Weiping Wang and Jie Li and Kai Chen and Shigeng Zhang}, title = {{UCG:} {A} Universal Cross-Domain Generator for Transferable Adversarial Examples}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {19}, pages = {3023--3037}, year = {2024}, url = {https://doi.org/10.1109/TIFS.2024.3352913}, doi = {10.1109/TIFS.2024.3352913}, timestamp = {Sat, 16 Mar 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tifs/LiWLCZ24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/LiWLCZ24a, author = {Zhankai Li and Weiping Wang and Jie Li and Kai Chen and Shigeng Zhang}, title = {Foolmix: Strengthen the Transferability of Adversarial Examples by Dual-Blending and Direction Update Strategy}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {19}, pages = {5286--5300}, year = {2024}, url = {https://doi.org/10.1109/TIFS.2024.3393745}, doi = {10.1109/TIFS.2024.3393745}, timestamp = {Fri, 31 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/LiWLCZ24a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/LiWYYZ24, author = {Jiajun Li and Pu Wang and Zheng Yan and Yishan Yang and Kai Zeng}, title = {BGKey: Group Key Generation for Backscatter Communications Among Multiple Devices}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {19}, pages = {2470--2486}, year = {2024}, url = {https://doi.org/10.1109/TIFS.2023.3345650}, doi = {10.1109/TIFS.2023.3345650}, timestamp = {Fri, 26 Jan 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tifs/LiWYYZ24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/LiWZXX24, author = {Jianhao Li and Jiabei Wang and Rui Zhang and Yansen Xin and Wenhan Xu}, title = {{NEMO:} Practical Distributed Boolean Queries With Minimal Leakage}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {19}, pages = {2594--2608}, year = {2024}, url = {https://doi.org/10.1109/TIFS.2024.3351433}, doi = {10.1109/TIFS.2024.3351433}, timestamp = {Thu, 29 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tifs/LiWZXX24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/LiWZZL24, author = {Zhi Li and Hao Wang and Songnian Zhang and Wenying Zhang and Rongxing Lu}, title = {SecKNN: FSS-Based Secure Multi-Party {KNN} Classification Under General Distance Functions}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {19}, pages = {1326--1341}, year = {2024}, url = {https://doi.org/10.1109/TIFS.2023.3337940}, doi = {10.1109/TIFS.2023.3337940}, timestamp = {Sat, 13 Jan 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tifs/LiWZZL24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/LiXZGDGP24, author = {Yuepei Li and Kai Xu and Junqing Zhang and Chongyan Gu and Yuan Ding and George Goussetis and Symon K. Podilchak}, title = {PUF-Assisted Radio Frequency Fingerprinting Exploiting Power Amplifier Active Load-Pulling}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {19}, pages = {5015--5029}, year = {2024}, url = {https://doi.org/10.1109/TIFS.2024.3389570}, doi = {10.1109/TIFS.2024.3389570}, timestamp = {Fri, 17 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/LiXZGDGP24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/LiY24, author = {Pengyu Li and Dan Ye}, title = {Vulnerability Analysis of Distributed State Estimator Under False Data Injection Attacks}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {19}, pages = {5235--5244}, year = {2024}, url = {https://doi.org/10.1109/TIFS.2024.3396634}, doi = {10.1109/TIFS.2024.3396634}, timestamp = {Fri, 17 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/LiY24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/LiYYLY24, author = {Shuai Li and Zhemin Yang and Yunteng Yang and Dingyi Liu and Min Yang}, title = {Identifying Cross-User Privacy Leakage in Mobile Mini-Apps at a Large Scale}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {19}, pages = {3135--3147}, year = {2024}, url = {https://doi.org/10.1109/TIFS.2024.3356197}, doi = {10.1109/TIFS.2024.3356197}, timestamp = {Tue, 20 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tifs/LiYYLY24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/LiYZL24, author = {Xue{-}Yang Li and Xue Yang and Zhengchun Zhou and Rongxing Lu}, title = {Efficiently Achieving Privacy Preservation and Poisoning Attack Resistance in Federated Learning}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {19}, pages = {4358--4373}, year = {2024}, url = {https://doi.org/10.1109/TIFS.2024.3378006}, doi = {10.1109/TIFS.2024.3378006}, timestamp = {Fri, 31 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/LiYZL24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/LiZLTR24, author = {Yanbin Li and Jiajie Zhu and Zhe Liu and Ming Tang and Shougang Ren}, title = {Deep Learning Gradient Visualization-Based Pre-Silicon Side-Channel Leakage Location}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {19}, pages = {2340--2355}, year = {2024}, url = {https://doi.org/10.1109/TIFS.2024.3350375}, doi = {10.1109/TIFS.2024.3350375}, timestamp = {Fri, 26 Jan 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tifs/LiZLTR24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/LiZWMN24, author = {Shuyi Li and Bob Zhang and Lifang Wu and Ruijun Ma and Xin Ning}, title = {Robust and Sparse Least Square Regression for Finger Vein and Finger Knuckle Print Recognition}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {19}, pages = {2709--2719}, year = {2024}, url = {https://doi.org/10.1109/TIFS.2024.3352389}, doi = {10.1109/TIFS.2024.3352389}, timestamp = {Thu, 29 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tifs/LiZWMN24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/LiZYNAP24, author = {Kai Li and Jingjing Zheng and Xin Yuan and Wei Ni and {\"{O}}zg{\"{u}}r B. Akan and H. Vincent Poor}, title = {Data-Agnostic Model Poisoning Against Federated Learning: {A} Graph Autoencoder Approach}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {19}, pages = {3465--3480}, year = {2024}, url = {https://doi.org/10.1109/TIFS.2024.3362147}, doi = {10.1109/TIFS.2024.3362147}, timestamp = {Thu, 29 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tifs/LiZYNAP24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/LiangWLCCPX24, author = {Ying Liang and Wenjie Wu and Haobo Li and Xiaojun Chang and Xiaojiang Chen and Jinye Peng and Pengfei Xu}, title = {DCS-Gait: {A} Class-Level Domain Adaptation Approach for Cross-Scene and Cross-State Gait Recognition Using Wi-Fi {CSI}}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {19}, pages = {2997--3007}, year = {2024}, url = {https://doi.org/10.1109/TIFS.2024.3356827}, doi = {10.1109/TIFS.2024.3356827}, timestamp = {Tue, 13 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tifs/LiangWLCCPX24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/LiangXLLKZ24, author = {Wei Liang and Siqi Xie and Kuan{-}Ching Li and Xiong Li and Xiaoyan Kui and Albert Y. Zomaya}, title = {{MC-DSC:} {A} Dynamic Secure Resource Configuration Scheme Based on Medical Consortium Blockchain}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {19}, pages = {3525--3538}, year = {2024}, url = {https://doi.org/10.1109/TIFS.2024.3364370}, doi = {10.1109/TIFS.2024.3364370}, timestamp = {Fri, 17 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/LiangXLLKZ24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/LinLLH24, author = {Guoyuan Lin and Weiqi Luo and Da Luo and Jiwu Huang}, title = {One-Class Neural Network With Directed Statistics Pooling for Spoofing Speech Detection}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {19}, pages = {2581--2593}, year = {2024}, url = {https://doi.org/10.1109/TIFS.2024.3352429}, doi = {10.1109/TIFS.2024.3352429}, timestamp = {Thu, 29 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tifs/LinLLH24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/LinYLLLBR24, author = {Feng Lin and Hao Yan and Jin Li and Ziwei Liu and Li Lu and Zhongjie Ba and Kui Ren}, title = {PhaDe: Practical Phantom Spoofing Attack Detection for Autonomous Vehicles}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {19}, pages = {4199--4214}, year = {2024}, url = {https://doi.org/10.1109/TIFS.2024.3376192}, doi = {10.1109/TIFS.2024.3376192}, timestamp = {Fri, 17 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/LinYLLLBR24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/LingTCSXLTHQ24, author = {Guowei Ling and Fei Tang and Chaochao Cai and Jinyong Shan and Haiyang Xue and Wulu Li and Peng Tang and Xinyi Huang and Weidong Qiu}, title = {P{\({^2}\)}FRPSI: Privacy-Preserving Feature Retrieved Private Set Intersection}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {19}, pages = {2201--2216}, year = {2024}, url = {https://doi.org/10.1109/TIFS.2023.3343973}, doi = {10.1109/TIFS.2023.3343973}, timestamp = {Fri, 26 Jan 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tifs/LingTCSXLTHQ24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/LiuCWWFZ24, author = {Jieli Liu and Jinze Chen and Jiajing Wu and Zhiying Wu and Junyuan Fang and Zibin Zheng}, title = {Fishing for Fraudsters: Uncovering Ethereum Phishing Gangs With Blockchain Data}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {19}, pages = {3038--3050}, year = {2024}, url = {https://doi.org/10.1109/TIFS.2024.3359000}, doi = {10.1109/TIFS.2024.3359000}, timestamp = {Thu, 29 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tifs/LiuCWWFZ24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/LiuDZXT24, author = {Jinliang Liu and Yanhui Dong and Lijuan Zha and Xiangpeng Xie and Engang Tian}, title = {Reinforcement Learning-Based Tracking Control for Networked Control Systems With DoS Attacks}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {19}, pages = {4188--4197}, year = {2024}, url = {https://doi.org/10.1109/TIFS.2024.3376250}, doi = {10.1109/TIFS.2024.3376250}, timestamp = {Fri, 17 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/LiuDZXT24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/LiuFWGLLZG24, author = {Chao Liu and Xue Fu and Yu Wang and Lantu Guo and Yuchao Liu and Yun Lin and Haitao Zhao and Guan Gui}, title = {Overcoming Data Limitations: {A} Few-Shot Specific Emitter Identification Method Using Self-Supervised Learning and Adversarial Augmentation}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {19}, pages = {500--513}, year = {2024}, url = {https://doi.org/10.1109/TIFS.2023.3324394}, doi = {10.1109/TIFS.2023.3324394}, timestamp = {Tue, 12 Mar 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tifs/LiuFWGLLZG24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/LiuGPWL24, author = {Decheng Liu and Xinbo Gao and Chunlei Peng and Nannan Wang and Jie Li}, title = {Universal Heterogeneous Face Analysis via Multi-Domain Feature Disentanglement}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {19}, pages = {735--747}, year = {2024}, url = {https://doi.org/10.1109/TIFS.2023.3327666}, doi = {10.1109/TIFS.2023.3327666}, timestamp = {Sun, 10 Dec 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tifs/LiuGPWL24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/LiuHCLL24, author = {Zhihuang Liu and Ling Hu and Zhiping Cai and Ximeng Liu and Yanhua Liu}, title = {SeCoSe: Toward Searchable and Communicable Healthcare Service Seeking in Flexible and Secure {EHR} Sharing}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {19}, pages = {4999--5014}, year = {2024}, url = {https://doi.org/10.1109/TIFS.2024.3391914}, doi = {10.1109/TIFS.2024.3391914}, timestamp = {Fri, 17 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/LiuHCLL24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/LiuJLLX24, author = {Beiyuan Liu and Jinjing Jiang and Qian Liu and Jiajia Liu and Sai Xu}, title = {An Intelligent Reflecting Surface-Based Attack Scheme Against Dual-Functional Radar and Communication Systems}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {19}, pages = {4945--4956}, year = {2024}, url = {https://doi.org/10.1109/TIFS.2024.3390621}, doi = {10.1109/TIFS.2024.3390621}, timestamp = {Fri, 17 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/LiuJLLX24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/LiuKLXT24, author = {Jian Liu and Jiachen Ke and Jinliang Liu and Xiangpeng Xie and Engang Tian}, title = {Outlier-Resistant Non-Fragile Control of Nonlinear Networked Systems Under DoS Attacks and Multi-Variable Event-Triggered {SC} Protocol}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {19}, pages = {2609--2622}, year = {2024}, url = {https://doi.org/10.1109/TIFS.2024.3352404}, doi = {10.1109/TIFS.2024.3352404}, timestamp = {Thu, 29 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tifs/LiuKLXT24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/LiuLCT24, author = {Junlin Liu and Xinchen Lyu and Qimei Cui and Xiaofeng Tao}, title = {Similarity-Based Label Inference Attack Against Training and Inference of Split Learning}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {19}, pages = {2881--2895}, year = {2024}, url = {https://doi.org/10.1109/TIFS.2024.3356821}, doi = {10.1109/TIFS.2024.3356821}, timestamp = {Thu, 29 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tifs/LiuLCT24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/LiuLWZLLLS24, author = {Andi Liu and Yizhong Liu and Qianhong Wu and Boyu Zhao and Dongyu Li and Yuan Lu and Rongxing Lu and Willy Susilo}, title = {{CHERUBIM:} {A} Secure and Highly Parallel Cross-Shard Consensus Using Quadruple Pipelined Two-Phase Commit for Sharding Blockchains}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {19}, pages = {3178--3193}, year = {2024}, url = {https://doi.org/10.1109/TIFS.2024.3358990}, doi = {10.1109/TIFS.2024.3358990}, timestamp = {Thu, 29 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tifs/LiuLWZLLLS24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/LiuLWZW24, author = {Yang Liu and Guangbo Liang and Xi Wang and Peican Zhu and Zhen Wang}, title = {Diffusion Containment in Complex Networks Through Collective Influence of Connections}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {19}, pages = {1510--1524}, year = {2024}, url = {https://doi.org/10.1109/TIFS.2023.3338423}, doi = {10.1109/TIFS.2023.3338423}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tifs/LiuLWZW24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/LiuLZFLL24, author = {Chen Liu and Bo Li and Jun Zhao and Weiwei Feng and Xudong Liu and Chunpei Li}, title = {{A2-CLM:} Few-Shot Malware Detection Based on Adversarial Heterogeneous Graph Augmentation}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {19}, pages = {2023--2038}, year = {2024}, url = {https://doi.org/10.1109/TIFS.2023.3345640}, doi = {10.1109/TIFS.2023.3345640}, timestamp = {Fri, 26 Jan 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tifs/LiuLZFLL24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/LiuMZZ24, author = {Weidong Liu and Xiaojun Mao and Xiaofei Zhang and Xin Zhang}, title = {Efficient Sparse Least Absolute Deviation Regression With Differential Privacy}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {19}, pages = {2328--2339}, year = {2024}, url = {https://doi.org/10.1109/TIFS.2023.3349054}, doi = {10.1109/TIFS.2023.3349054}, timestamp = {Fri, 26 Jan 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tifs/LiuMZZ24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/LiuRWQWSZLWHRB24, author = {Xinwei Liu and Kiran B. Raja and Renfang Wang and Hong Qiu and Hucheng Wu and Dechao Sun and Qiguang Zheng and Nian Liu and Xiaoxia Wang and Gehang Huang and Raghavendra Ramachandra and Christoph Busch}, title = {A Latent Fingerprint in the Wild Database}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {19}, pages = {3703--3718}, year = {2024}, url = {https://doi.org/10.1109/TIFS.2024.3368892}, doi = {10.1109/TIFS.2024.3368892}, timestamp = {Fri, 17 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/LiuRWQWSZLWHRB24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/LiuWRWGQL24, author = {Rongke Liu and Dong Wang and Yizhi Ren and Zhen Wang and Kaitian Guo and Qianqian Qin and Xiaolei Liu}, title = {Unstoppable Attack: Label-Only Model Inversion Via Conditional Diffusion Model}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {19}, pages = {3958--3973}, year = {2024}, url = {https://doi.org/10.1109/TIFS.2024.3372815}, doi = {10.1109/TIFS.2024.3372815}, timestamp = {Fri, 17 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/LiuWRWGQL24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/LiuWSRL24, author = {Hui Liu and Wenya Wang and Hao Sun and Anderson Rocha and Haoliang Li}, title = {Robust Domain Misinformation Detection via Multi-Modal Feature Alignment}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {19}, pages = {793--806}, year = {2024}, url = {https://doi.org/10.1109/TIFS.2023.3326368}, doi = {10.1109/TIFS.2023.3326368}, timestamp = {Sun, 31 Dec 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tifs/LiuWSRL24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/LiuXWZ24, author = {Jiawei Liu and Jingyi Xie and Yang Wang and Zheng{-}Jun Zha}, title = {Adaptive Texture and Spectrum Clue Mining for Generalizable Face Forgery Detection}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {19}, pages = {1922--1934}, year = {2024}, url = {https://doi.org/10.1109/TIFS.2023.3344293}, doi = {10.1109/TIFS.2023.3344293}, timestamp = {Fri, 26 Jan 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tifs/LiuXWZ24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/LiuXZWWL24, author = {Gaoyang Liu and Tianlong Xu and Rui Zhang and Zixiong Wang and Chen Wang and Ling Liu}, title = {Gradient-Leaks: Enabling Black-Box Membership Inference Attacks Against Machine Learning Models}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {19}, pages = {427--440}, year = {2024}, url = {https://doi.org/10.1109/TIFS.2023.3324772}, doi = {10.1109/TIFS.2023.3324772}, timestamp = {Sun, 10 Dec 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tifs/LiuXZWWL24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/LiuZLS24, author = {Feng Liu and Wenfeng Zeng and Yin Li and Linlin Shen}, title = {A Lightweight and Noise-Robust Method for Internal {OCT} Fingerprint Reconstruction}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {19}, pages = {5492--5505}, year = {2024}, url = {https://doi.org/10.1109/TIFS.2024.3402387}, doi = {10.1109/TIFS.2024.3402387}, timestamp = {Fri, 31 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/LiuZLS24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/LiuZZCZL24, author = {Renyang Liu and Wei Zhou and Tianwei Zhang and Kangjie Chen and Jun Zhao and Kwok{-}Yan Lam}, title = {Boosting Black-Box Attack to Deep Neural Networks With Conditional Diffusion Models}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {19}, pages = {5207--5219}, year = {2024}, url = {https://doi.org/10.1109/TIFS.2024.3390609}, doi = {10.1109/TIFS.2024.3390609}, timestamp = {Fri, 17 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/LiuZZCZL24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/LongYZP24, author = {Min Long and Quantao Yao and Le{-}Bing Zhang and Fei Peng}, title = {Face De-Morphing Based on Diffusion Autoencoders}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {19}, pages = {3051--3063}, year = {2024}, url = {https://doi.org/10.1109/TIFS.2024.3359029}, doi = {10.1109/TIFS.2024.3359029}, timestamp = {Thu, 29 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tifs/LongYZP24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/LongZWJS24, author = {Xingming Long and Jie Zhang and Shuzhe Wu and Xin Jin and Shiguang Shan}, title = {Dual Sampling Based Causal Intervention for Face Anti-Spoofing With Identity Debiasing}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {19}, pages = {851--862}, year = {2024}, url = {https://doi.org/10.1109/TIFS.2023.3326370}, doi = {10.1109/TIFS.2023.3326370}, timestamp = {Sun, 31 Dec 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tifs/LongZWJS24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/LuCZCD24, author = {Tianyu Lu and Liquan Chen and Junqing Zhang and Chen Chen and Trung Q. Duong}, title = {Reconfigurable Intelligent Surface-Assisted Key Generation for Millimeter-Wave Multi-User Systems}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {19}, pages = {5373--5388}, year = {2024}, url = {https://doi.org/10.1109/TIFS.2024.3397037}, doi = {10.1109/TIFS.2024.3397037}, timestamp = {Fri, 31 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/LuCZCD24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/LuHWLZXJ24, author = {Jianrong Lu and Shengshan Hu and Wei Wan and Minghui Li and Leo Yu Zhang and Lulu Xue and Hai Jin}, title = {Depriving the Survival Space of Adversaries Against Poisoned Gradients in Federated Learning}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {19}, pages = {5405--5418}, year = {2024}, url = {https://doi.org/10.1109/TIFS.2024.3360869}, doi = {10.1109/TIFS.2024.3360869}, timestamp = {Fri, 31 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/LuHWLZXJ24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/LuW24, author = {Tingting Lu and Junfeng Wang}, title = {{DOMR:} Toward Deep Open-World Malware Recognition}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {19}, pages = {1455--1468}, year = {2024}, url = {https://doi.org/10.1109/TIFS.2023.3338469}, doi = {10.1109/TIFS.2023.3338469}, timestamp = {Sat, 13 Jan 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tifs/LuW24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/LuZCM24, author = {Hai Lu and Yan Zhu and Cecilia E. Chen and Di Ma}, title = {Toward Efficient Key Extraction of {LBC} Over Ring: Fast Non-Spherical G-Lattice Sampler and Optimized Perturbation Generation}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {19}, pages = {4301--4315}, year = {2024}, url = {https://doi.org/10.1109/TIFS.2024.3376206}, doi = {10.1109/TIFS.2024.3376206}, timestamp = {Fri, 17 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/LuZCM24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/LuZDLLL24, author = {Jiucui Lu and Jiaran Zhou and Junyu Dong and Bin Li and Siwei Lyu and Yuezun Li}, title = {ForensicsForest Family: {A} Series of Multi-Scale Hierarchical Cascade Forests for Detecting GAN-Generated Faces}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {19}, pages = {5106--5119}, year = {2024}, url = {https://doi.org/10.1109/TIFS.2024.3395013}, doi = {10.1109/TIFS.2024.3395013}, timestamp = {Fri, 17 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/LuZDLLL24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/LuoHZWL24, author = {Xuejiao Luo and Xiaohui Han and Wenbo Zuo and Xiaoming Wu and Wenyin Liu}, title = {MLaD{\({^2}\)}: {A} Semi-Supervised Money Laundering Detection Framework Based on Decoupling Training}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {19}, pages = {4518--4533}, year = {2024}, url = {https://doi.org/10.1109/TIFS.2024.3380262}, doi = {10.1109/TIFS.2024.3380262}, timestamp = {Fri, 17 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/LuoHZWL24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/LuoKHHKK24, author = {Anwei Luo and Chenqi Kong and Jiwu Huang and Yongjian Hu and Xiangui Kang and Alex C. Kot}, title = {Beyond the Prior Forgery Knowledge: Mining Critical Clues for General Face Forgery Detection}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {19}, pages = {1168--1182}, year = {2024}, url = {https://doi.org/10.1109/TIFS.2023.3332218}, doi = {10.1109/TIFS.2023.3332218}, timestamp = {Sun, 31 Dec 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tifs/LuoKHHKK24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/LuoQXZK24, author = {Dacan Luo and Yitao Qiao and Di Xie and Shifeng Zhang and Wenxiong Kang}, title = {Palm Vein Recognition Under Unconstrained and Weak-Cooperative Conditions}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {19}, pages = {4601--4614}, year = {2024}, url = {https://doi.org/10.1109/TIFS.2024.3378427}, doi = {10.1109/TIFS.2024.3378427}, timestamp = {Fri, 17 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/LuoQXZK24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/LuoWSYZ24, author = {Fucai Luo and Haiyan Wang and Willy Susilo and Xingfu Yan and Xiaofan Zheng}, title = {Public Trace-and-Revoke Proxy Re-Encryption for Secure Data Sharing in Clouds}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {19}, pages = {2919--2934}, year = {2024}, url = {https://doi.org/10.1109/TIFS.2024.3357240}, doi = {10.1109/TIFS.2024.3357240}, timestamp = {Sat, 16 Mar 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tifs/LuoWSYZ24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/LyuHRGYCT24, author = {Xinchen Lyu and Xinyun Hou and Chenshan Ren and Xin Ge and Penglin Yang and Qimei Cui and Xiaofeng Tao}, title = {Secure and Efficient Federated Learning With Provable Performance Guarantees via Stochastic Quantization}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {19}, pages = {4070--4085}, year = {2024}, url = {https://doi.org/10.1109/TIFS.2024.3374590}, doi = {10.1109/TIFS.2024.3374590}, timestamp = {Fri, 17 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/LyuHRGYCT24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/MaJLWWC24, author = {Bowen Ma and Tong Jia and Mingyuan Li and Songsheng Wu and Hao Wang and Dongyue Chen}, title = {Toward Dual-View X-Ray Baggage Inspection: {A} Large-Scale Benchmark and Adaptive Hierarchical Cross Refinement for Prohibited Item Discovery}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {19}, pages = {3866--3878}, year = {2024}, url = {https://doi.org/10.1109/TIFS.2024.3372797}, doi = {10.1109/TIFS.2024.3372797}, timestamp = {Fri, 17 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/MaJLWWC24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/MaZY24, author = {Jingzhe Ma and Xiao{-}Qing Zhang and Shiqi Yu}, title = {An Identity-Preserved Framework for Human Motion Transfer}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {19}, pages = {3495--3509}, year = {2024}, url = {https://doi.org/10.1109/TIFS.2024.3364018}, doi = {10.1109/TIFS.2024.3364018}, timestamp = {Fri, 17 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/MaZY24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/MadhusudhananJSM24, author = {Sheema Madhusudhanan and Arun Cyril Jose and Jayakrushna Sahoo and Reza Malekian}, title = {PRIM{\unicode{1013}}: Novel Privacy-Preservation Model With Pattern Mining and Genetic Algorithm}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {19}, pages = {571--585}, year = {2024}, url = {https://doi.org/10.1109/TIFS.2023.3324769}, doi = {10.1109/TIFS.2023.3324769}, timestamp = {Sun, 10 Dec 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tifs/MadhusudhananJSM24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/MalhotraVSMN24, author = {Aakarsh Malhotra and Mayank Vatsa and Richa Singh and Keith B. Morris and Afzel Noore}, title = {Multi-Surface Multi-Technique {(MUST)} Latent Fingerprint Database}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {19}, pages = {1041--1055}, year = {2024}, url = {https://doi.org/10.1109/TIFS.2023.3280742}, doi = {10.1109/TIFS.2023.3280742}, timestamp = {Sun, 31 Dec 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tifs/MalhotraVSMN24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/MandlikPSB24, author = {Simon Mandl{\'{\i}}k and Tom{\'{a}}s Pevn{\'{y}} and V{\'{a}}clav Sm{\'{\i}}dl and Luk{\'{a}}s Bajer}, title = {Malicious Internet Entity Detection Using Local Graph Inference}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {19}, pages = {3554--3566}, year = {2024}, url = {https://doi.org/10.1109/TIFS.2024.3360867}, doi = {10.1109/TIFS.2024.3360867}, timestamp = {Fri, 31 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/MandlikPSB24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/MaoJZ24, author = {Wenze Mao and Peng Jiang and Liehuang Zhu}, title = {Locally Verifiable Batch Authentication in IoMT}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {19}, pages = {1001--1014}, year = {2024}, url = {https://doi.org/10.1109/TIFS.2023.3330577}, doi = {10.1109/TIFS.2023.3330577}, timestamp = {Sun, 31 Dec 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tifs/MaoJZ24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/MaoTLZC24, author = {Junlong Mao and Huiyi Tang and Shanxiang Lyu and Zhengchun Zhou and Xiaochun Cao}, title = {Content-Aware Quantization Index Modulation: Leveraging Data Statistics for Enhanced Image Watermarking}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {19}, pages = {1935--1947}, year = {2024}, url = {https://doi.org/10.1109/TIFS.2023.3342612}, doi = {10.1109/TIFS.2023.3342612}, timestamp = {Fri, 26 Jan 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tifs/MaoTLZC24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/MerkleSSP24, author = {Florian Merkle and Maximilian Samsinger and Pascal Sch{\"{o}}ttle and Tom{\'{a}}s Pevn{\'{y}}}, title = {On the Economics of Adversarial Machine Learning}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {19}, pages = {4670--4685}, year = {2024}, url = {https://doi.org/10.1109/TIFS.2024.3379829}, doi = {10.1109/TIFS.2024.3379829}, timestamp = {Fri, 17 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/MerkleSSP24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/MoltafetSR24, author = {Mohammad Moltafet and Hamid R. Sadjadpour and Zouheir Rezki}, title = {On the Semantic Security in the General Bounded Storage Model: {A} New Proof}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {19}, pages = {4263--4271}, year = {2024}, url = {https://doi.org/10.1109/TIFS.2024.3376959}, doi = {10.1109/TIFS.2024.3376959}, timestamp = {Fri, 31 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/MoltafetSR24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/MontibellerP24, author = {Andrea Montibeller and Fernando P{\'{e}}rez{-}Gonz{\'{a}}lez}, title = {An Adaptive Method for Camera Attribution Under Complex Radial Distortion Corrections}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {19}, pages = {385--400}, year = {2024}, url = {https://doi.org/10.1109/TIFS.2023.3318933}, doi = {10.1109/TIFS.2023.3318933}, timestamp = {Fri, 08 Mar 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tifs/MontibellerP24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/NamCLJY24, author = {Taesik Nam and Dong{-}Hoon Choi and Euibum Lee and Han{-}Shin Jo and Jong{-}Gwan Yook}, title = {Data Generation and Augmentation Method for Deep Learning-Based {VDU} Leakage Signal Restoration Algorithm}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {19}, pages = {5220--5234}, year = {2024}, url = {https://doi.org/10.1109/TIFS.2024.3393748}, doi = {10.1109/TIFS.2024.3393748}, timestamp = {Fri, 17 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/NamCLJY24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/NgCLT24, author = {Tiong{-}Sik Ng and Jacky Chen Long Chai and Cheng{-}Yaw Low and Andrew Beng Jin Teoh}, title = {Self-Attentive Contrastive Learning for Conditioned Periocular and Face Biometrics}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {19}, pages = {3251--3264}, year = {2024}, url = {https://doi.org/10.1109/TIFS.2024.3361216}, doi = {10.1109/TIFS.2024.3361216}, timestamp = {Thu, 29 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tifs/NgCLT24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/NguyenTSF24, author = {Huy Nguyen and Kien Nguyen Thanh and Sridha Sridharan and Clinton Fookes}, title = {AG-ReID.v2: Bridging Aerial and Ground Views for Person Re-Identification}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {19}, pages = {2896--2908}, year = {2024}, url = {https://doi.org/10.1109/TIFS.2024.3353078}, doi = {10.1109/TIFS.2024.3353078}, timestamp = {Thu, 29 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tifs/NguyenTSF24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/NiWFHS24, author = {Yanyan Ni and Zhen Wang and Yingjie Fan and Xia Huang and Hao Shen}, title = {Secure Stabilization of Networked Lur'e Systems Suffering From DoS Attacks: {A} Resilient Memory-Based Event-Trigger Mechanism}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {19}, pages = {4658--4669}, year = {2024}, url = {https://doi.org/10.1109/TIFS.2024.3384055}, doi = {10.1109/TIFS.2024.3384055}, timestamp = {Fri, 17 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/NiWFHS24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/NicolauPFP24, author = {Adri{\'{a}}n Tobar Nicolau and Javier Parra{-}Arnau and Jordi Forn{\'{e}} and Esteve Pallar{\`{e}}s}, title = {m-Eligibility With Minimum Counterfeits and Deletions for Privacy Protection in Continuous Data Publishing}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {19}, pages = {2854--2864}, year = {2024}, url = {https://doi.org/10.1109/TIFS.2024.3354557}, doi = {10.1109/TIFS.2024.3354557}, timestamp = {Sat, 16 Mar 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tifs/NicolauPFP24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/OtroshiShahrezaHM24, author = {Hatef Otroshi{-}Shahreza and Vedrana Krivokuca Hahn and S{\'{e}}bastien Marcel}, title = {Vulnerability of State-of-the-Art Face Recognition Models to Template Inversion Attack}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {19}, pages = {4585--4600}, year = {2024}, url = {https://doi.org/10.1109/TIFS.2024.3381820}, doi = {10.1109/TIFS.2024.3381820}, timestamp = {Fri, 31 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/OtroshiShahrezaHM24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/OzfaturaOKG24, author = {Kerem Ozfatura and Emre Ozfatura and Alptekin K{\"{u}}p{\c{c}}{\"{u}} and Deniz G{\"{u}}nd{\"{u}}z}, title = {Byzantines Can Also Learn From History: Fall of Centered Clipping in Federated Learning}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {19}, pages = {2010--2022}, year = {2024}, url = {https://doi.org/10.1109/TIFS.2023.3345171}, doi = {10.1109/TIFS.2023.3345171}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tifs/OzfaturaOKG24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/PeiDTLX24, author = {Xinjun Pei and Xiaoheng Deng and Shengwei Tian and Jianqing Liu and Kaiping Xue}, title = {Privacy-Enhanced Graph Neural Network for Decentralized Local Graphs}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {19}, pages = {1614--1629}, year = {2024}, url = {https://doi.org/10.1109/TIFS.2023.3329971}, doi = {10.1109/TIFS.2023.3329971}, timestamp = {Sat, 13 Jan 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tifs/PeiDTLX24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/Pelofske24, author = {Elijah Pelofske}, title = {Analysis of a Programmable Quantum Annealer as a Random Number Generator}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {19}, pages = {3636--3643}, year = {2024}, url = {https://doi.org/10.1109/TIFS.2024.3364054}, doi = {10.1109/TIFS.2024.3364054}, timestamp = {Fri, 17 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/Pelofske24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/PengLZ24, author = {Baihao Peng and Junfeng Liu and Jun Zeng}, title = {Dynamic Analysis of Multiplex Networks With Hybrid Maintenance Strategies}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {19}, pages = {555--570}, year = {2024}, url = {https://doi.org/10.1109/TIFS.2023.3324386}, doi = {10.1109/TIFS.2023.3324386}, timestamp = {Sun, 10 Dec 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tifs/PengLZ24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/PengMLWHG24, author = {Chunlei Peng and Zimin Miao and Decheng Liu and Nannan Wang and Ruimin Hu and Xinbo Gao}, title = {Where Deepfakes Gaze at? Spatial-Temporal Gaze Inconsistency Analysis for Video Face Forgery Detection}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {19}, pages = {4507--4517}, year = {2024}, url = {https://doi.org/10.1109/TIFS.2024.3381823}, doi = {10.1109/TIFS.2024.3381823}, timestamp = {Fri, 31 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/PengMLWHG24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/PengQMWFAAG24, author = {Huaibing Peng and Huming Qiu and Hua Ma and Shuo Wang and Anmin Fu and Said F. Al{-}Sarawi and Derek Abbott and Yansong Gao}, title = {On Model Outsourcing Adaptive Attacks to Deep Learning Backdoor Defenses}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {19}, pages = {2356--2369}, year = {2024}, url = {https://doi.org/10.1109/TIFS.2024.3349869}, doi = {10.1109/TIFS.2024.3349869}, timestamp = {Thu, 29 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tifs/PengQMWFAAG24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/PengTMLH24, author = {Rongxuan Peng and Shunquan Tan and Xianbo Mo and Bin Li and Jiwu Huang}, title = {Employing Reinforcement Learning to Construct a Decision-Making Environment for Image Forgery Localization}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {19}, pages = {4820--4834}, year = {2024}, url = {https://doi.org/10.1109/TIFS.2024.3381470}, doi = {10.1109/TIFS.2024.3381470}, timestamp = {Fri, 17 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/PengTMLH24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/PengYZXPHYZJ24, author = {Hao Peng and Jieshuai Yang and Dandan Zhao and Xiaogang Xu and Yuwen Pu and Jianmin Han and Xing Yang and Ming Zhong and Shouling Ji}, title = {MalGNE: Enhancing the Performance and Efficiency of CFG-Based Malware Detector by Graph Node Embedding in Low Dimension Space}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {19}, pages = {4881--4896}, year = {2024}, url = {https://doi.org/10.1109/TIFS.2024.3389614}, doi = {10.1109/TIFS.2024.3389614}, timestamp = {Fri, 17 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/PengYZXPHYZJ24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/QiHC24, author = {Xinyu Qi and Aiqun Hu and Tianshu Chen}, title = {Lightweight Radio Frequency Fingerprint Identification Scheme for {V2X} Based on Temporal Correlation}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {19}, pages = {1056--1070}, year = {2024}, url = {https://doi.org/10.1109/TIFS.2023.3329683}, doi = {10.1109/TIFS.2023.3329683}, timestamp = {Sun, 31 Dec 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tifs/QiHC24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/QiHT24, author = {Mingping Qi and Wei Hu and Yu Tai}, title = {{SAE+:} One-Round Provably Secure Asymmetric {SAE} Protocol for Client-Server Model}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {19}, pages = {3906--3913}, year = {2024}, url = {https://doi.org/10.1109/TIFS.2024.3372799}, doi = {10.1109/TIFS.2024.3372799}, timestamp = {Fri, 17 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/QiHT24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/QinFDLEZ24, author = {Huafeng Qin and Chao Fan and Shaojiang Deng and Yantao Li and Mounim A. El{-}Yacoubi and Gang Zhou}, title = {{AG-NAS:} An Attention GRU-Based Neural Architecture Search for Finger-Vein Recognition}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {19}, pages = {1699--1713}, year = {2024}, url = {https://doi.org/10.1109/TIFS.2023.3340915}, doi = {10.1109/TIFS.2023.3340915}, timestamp = {Fri, 26 Apr 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/QinFDLEZ24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/QingBLMW24, author = {Yuanyuan Qing and Tao Bai and Zhuotao Liu and Pierre Moulin and Bihan Wen}, title = {Detection of Adversarial Attacks via Disentangling Natural Images and Perturbations}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {19}, pages = {2814--2825}, year = {2024}, url = {https://doi.org/10.1109/TIFS.2024.3352837}, doi = {10.1109/TIFS.2024.3352837}, timestamp = {Thu, 29 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tifs/QingBLMW24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/QiuMZAKFG24, author = {Huming Qiu and Hua Ma and Zhi Zhang and Alsharif Abuadbba and Wei Kang and Anmin Fu and Yansong Gao}, title = {Toward a Critical Evaluation of Robustness for Deep Learning Backdoor Countermeasures}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {19}, pages = {455--468}, year = {2024}, url = {https://doi.org/10.1109/TIFS.2023.3324318}, doi = {10.1109/TIFS.2023.3324318}, timestamp = {Sun, 10 Dec 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tifs/QiuMZAKFG24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/QiuZJFYW24, author = {Pengyu Qiu and Xuhong Zhang and Shouling Ji and Chong Fu and Xing Yang and Ting Wang}, title = {HashVFL: Defending Against Data Reconstruction Attacks in Vertical Federated Learning}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {19}, pages = {3435--3450}, year = {2024}, url = {https://doi.org/10.1109/TIFS.2024.3356164}, doi = {10.1109/TIFS.2024.3356164}, timestamp = {Thu, 29 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tifs/QiuZJFYW24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/QuLWCJW24, author = {Zhenqing Qu and Xiang Ling and Ting Wang and Xiang Chen and Shouling Ji and Chunming Wu}, title = {AdvSQLi: Generating Adversarial {SQL} Injections Against Real-World WAF-as-a-Service}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {19}, pages = {2623--2638}, year = {2024}, url = {https://doi.org/10.1109/TIFS.2024.3350911}, doi = {10.1109/TIFS.2024.3350911}, timestamp = {Thu, 29 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tifs/QuLWCJW24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/QuXLLWL24, author = {Zuomin Qu and Zuping Xi and Wei Lu and Xiangyang Luo and Qian Wang and Bin Li}, title = {{DF-RAP:} {A} Robust Adversarial Perturbation for Defending Against Deepfakes in Real-World Social Network Scenarios}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {19}, pages = {3943--3957}, year = {2024}, url = {https://doi.org/10.1109/TIFS.2024.3372803}, doi = {10.1109/TIFS.2024.3372803}, timestamp = {Fri, 17 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/QuXLLWL24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/QuanDWY24, author = {Weize Quan and Pengfei Deng and Kai Wang and Dong{-}Ming Yan}, title = {CGFormer: ViT-Based Network for Identifying Computer-Generated Images With Token Labeling}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {19}, pages = {235--250}, year = {2024}, url = {https://doi.org/10.1109/TIFS.2023.3322083}, doi = {10.1109/TIFS.2023.3322083}, timestamp = {Sun, 10 Dec 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tifs/QuanDWY24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/QuanLL24, author = {Junyu Quan and Qin Li and Lvzhou Li}, title = {Verifiable Blind Quantum Computation With Identity Authentication for Multi-Type Clients}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {19}, pages = {1687--1698}, year = {2024}, url = {https://doi.org/10.1109/TIFS.2023.3340859}, doi = {10.1109/TIFS.2023.3340859}, timestamp = {Sat, 13 Jan 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tifs/QuanLL24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/RajendranDTKFT24, author = {Sree Ranjani Rajendran and Nusrat Farzana Dipu and Shams Tarek and Hadi Mardani Kamali and Farimah Farahmandi and Mark M. Tehranipoor}, title = {Exploring the Abyss? Unveiling Systems-on-Chip Hardware Vulnerabilities Beneath Software}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {19}, pages = {3914--3926}, year = {2024}, url = {https://doi.org/10.1109/TIFS.2024.3372800}, doi = {10.1109/TIFS.2024.3372800}, timestamp = {Fri, 17 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/RajendranDTKFT24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/RenLWWLWC24, author = {Qian Ren and Yue Li and Yingjun Wu and Yuchen Wu and Hong Lei and Lei Wang and Bangdao Chen}, title = {DeCloak: Enable Secure and Cheap Multi-Party Transactions on Legacy Blockchains by a Minimally Trusted {TEE} Network}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {19}, pages = {88--103}, year = {2024}, url = {https://doi.org/10.1109/TIFS.2023.3318935}, doi = {10.1109/TIFS.2023.3318935}, timestamp = {Wed, 01 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/RenLWWLWC24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/RoigGRB24, author = {Dail{\'{e}} Osorio Roig and L{\'{a}}zaro Janier Gonz{\'{a}}lez{-}Soler and Christian Rathgeb and Christoph Busch}, title = {Privacy-Preserving Multi-Biometric Indexing Based on Frequent Binary Patterns}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {19}, pages = {4835--4850}, year = {2024}, url = {https://doi.org/10.1109/TIFS.2024.3386310}, doi = {10.1109/TIFS.2024.3386310}, timestamp = {Fri, 31 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/RoigGRB24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/SadeghzadehSDJ24, author = {Amir Mahdi Sadeghzadeh and Amir Mohammad Sobhanian and Faezeh Dehghan and Rasool Jalili}, title = {{HODA:} Hardness-Oriented Detection of Model Extraction Attacks}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {19}, pages = {1429--1439}, year = {2024}, url = {https://doi.org/10.1109/TIFS.2023.3320609}, doi = {10.1109/TIFS.2023.3320609}, timestamp = {Sat, 13 Jan 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tifs/SadeghzadehSDJ24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/ShaoLLZ24, author = {Huikai Shao and Chengcheng Liu and Xiaojiang Li and Dexing Zhong}, title = {Privacy Preserving Palmprint Recognition via Federated Metric Learning}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {19}, pages = {878--891}, year = {2024}, url = {https://doi.org/10.1109/TIFS.2023.3327667}, doi = {10.1109/TIFS.2023.3327667}, timestamp = {Sun, 31 Dec 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tifs/ShaoLLZ24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/ShaoZLGZ24, author = {Huikai Shao and Yuchen Zou and Chengcheng Liu and Qiang Guo and Dexing Zhong}, title = {Learning to Generalize Unseen Dataset for Cross-Dataset Palmprint Recognition}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {19}, pages = {3788--3799}, year = {2024}, url = {https://doi.org/10.1109/TIFS.2024.3371257}, doi = {10.1109/TIFS.2024.3371257}, timestamp = {Fri, 17 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/ShaoZLGZ24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/SharmaAW24, author = {Chandra Sharma and George T. Amariucai and Shuangqing Wei}, title = {The Economics of Privacy and Utility: Investment Strategies}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {19}, pages = {1744--1755}, year = {2024}, url = {https://doi.org/10.1109/TIFS.2023.3341008}, doi = {10.1109/TIFS.2023.3341008}, timestamp = {Sat, 13 Jan 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tifs/SharmaAW24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/ShateriMLP24, author = {Mohammadhadi Shateri and Francisco Messina and Fabrice Labeau and Pablo Piantanida}, title = {Preserving Privacy in GANs Against Membership Inference Attack}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {19}, pages = {1728--1743}, year = {2024}, url = {https://doi.org/10.1109/TIFS.2023.3342654}, doi = {10.1109/TIFS.2023.3342654}, timestamp = {Sat, 13 Jan 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tifs/ShateriMLP24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/ShengYZZZ24, author = {Chuan Sheng and Yu Yao and Lianxiang Zhao and Peng Zeng and Jianming Zhao}, title = {Scanner-Hunter: An Effective {ICS} Scanning Group Identification System}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {19}, pages = {3077--3092}, year = {2024}, url = {https://doi.org/10.1109/TIFS.2024.3359002}, doi = {10.1109/TIFS.2024.3359002}, timestamp = {Thu, 29 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tifs/ShengYZZZ24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/SongHHCLHS24, author = {Xu Song and Saihui Hou and Yan Huang and Chunshui Cao and Xu Liu and Yongzhen Huang and Caifeng Shan}, title = {Gait Attribute Recognition: {A} New Benchmark for Learning Richer Attributes From Human Gait Patterns}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {19}, pages = {1--14}, year = {2024}, url = {https://doi.org/10.1109/TIFS.2023.3318934}, doi = {10.1109/TIFS.2023.3318934}, timestamp = {Sun, 10 Dec 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tifs/SongHHCLHS24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/SongHZXJ24, author = {Mingyang Song and Zhongyun Hua and Yifeng Zheng and Tao Xiang and Xiaohua Jia}, title = {SimLESS: {A} Secure Deduplication System Over Similar Data in Cloud Media Sharing}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {19}, pages = {4700--4715}, year = {2024}, url = {https://doi.org/10.1109/TIFS.2024.3382603}, doi = {10.1109/TIFS.2024.3382603}, timestamp = {Fri, 17 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/SongHZXJ24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/SongSZLX24, author = {Qige Song and Yafei Sang and Yongzheng Zhang and Shuhao Li and Xiaolin Xu}, title = {SepBIN: Binary Feature Separation for Better Semantic Comparison and Authorship Verification}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {19}, pages = {1372--1387}, year = {2024}, url = {https://doi.org/10.1109/TIFS.2023.3331895}, doi = {10.1109/TIFS.2023.3331895}, timestamp = {Sat, 13 Jan 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tifs/SongSZLX24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/SongXZL24, author = {Yaqing Song and Chunxiang Xu and Yuan Zhang and Shiyu Li}, title = {Hardening Password-Based Credential Databases}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {19}, pages = {469--484}, year = {2024}, url = {https://doi.org/10.1109/TIFS.2023.3324326}, doi = {10.1109/TIFS.2023.3324326}, timestamp = {Sun, 10 Dec 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tifs/SongXZL24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/SuiDZ24, author = {Xiao Sui and Sisi Duan and Haibin Zhang}, title = {{BG:} {A} Modular Treatment of {BFT} Consensus Toward a Unified Theory of {BFT} Replication}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {19}, pages = {44--58}, year = {2024}, url = {https://doi.org/10.1109/TIFS.2023.3318943}, doi = {10.1109/TIFS.2023.3318943}, timestamp = {Tue, 07 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/SuiDZ24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/SunARC24, author = {Guoxin Sun and Tansu Alpcan and Benjamin I. P. Rubinstein and Seyit Camtepe}, title = {To Act or Not to Act: An Adversarial Game for Securing Vehicle Platoons}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {19}, pages = {163--177}, year = {2024}, url = {https://doi.org/10.1109/TIFS.2023.3320610}, doi = {10.1109/TIFS.2023.3320610}, timestamp = {Sun, 10 Dec 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tifs/SunARC24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/SunCZXG24, author = {Rui Sun and Long Chen and Lei Zhang and Ruirui Xie and Jun Gao}, title = {Robust Visible-Infrared Person Re-Identification Based on Polymorphic Mask and Wavelet Graph Convolutional Network}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {19}, pages = {2800--2813}, year = {2024}, url = {https://doi.org/10.1109/TIFS.2024.3354377}, doi = {10.1109/TIFS.2024.3354377}, timestamp = {Thu, 29 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tifs/SunCZXG24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/SunJDLMDZ24, author = {Wenli Sun and Xinyang Jiang and Shuguang Dou and Dongsheng Li and Duoqian Miao and Cheng Deng and Cairong Zhao}, title = {Invisible Backdoor Attack With Dynamic Triggers Against Person Re-Identification}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {19}, pages = {307--319}, year = {2024}, url = {https://doi.org/10.1109/TIFS.2023.3322659}, doi = {10.1109/TIFS.2023.3322659}, timestamp = {Sun, 10 Dec 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tifs/SunJDLMDZ24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/SunRHLZ24, author = {Zongkun Sun and Yanzhen Ren and Yihuan Huang and Wuyang Liu and Hongcheng Zhu}, title = {{AFPM:} {A} Low-Cost and Universal Adversarial Defense for Speaker Recognition Systems}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {19}, pages = {2273--2287}, year = {2024}, url = {https://doi.org/10.1109/TIFS.2023.3348232}, doi = {10.1109/TIFS.2023.3348232}, timestamp = {Fri, 26 Jan 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tifs/SunRHLZ24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/SunYH24, author = {Fangyuan Sun and Jia Yu and Jiankun Hu}, title = {Privacy-Preserving Approximate Minimum Community Search on Large Networks}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {19}, pages = {4146--4160}, year = {2024}, url = {https://doi.org/10.1109/TIFS.2024.3376201}, doi = {10.1109/TIFS.2024.3376201}, timestamp = {Fri, 17 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/SunYH24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/SuoCCPXL24, author = {Yuhan Suo and Senchun Chai and Runqi Chai and Zhong{-}Hua Pang and Yuanqing Xia and Guo{-}Ping Liu}, title = {Security Defense of Large-Scale Networks Under False Data Injection Attacks: An Attack Detection Scheduling Approach}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {19}, pages = {1908--1921}, year = {2024}, url = {https://doi.org/10.1109/TIFS.2023.3340098}, doi = {10.1109/TIFS.2023.3340098}, timestamp = {Fri, 26 Jan 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tifs/SuoCCPXL24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/TanCWLP24, author = {Weihang Tan and Sin{-}Wei Chiu and Antian Wang and Yingjie Lao and Keshab K. Parhi}, title = {PaReNTT: Low-Latency Parallel Residue Number System and NTT-Based Long Polynomial Modular Multiplication for Homomorphic Encryption}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {19}, pages = {1646--1659}, year = {2024}, url = {https://doi.org/10.1109/TIFS.2023.3338553}, doi = {10.1109/TIFS.2023.3338553}, timestamp = {Sat, 13 Jan 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tifs/TanCWLP24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/TangDXJSW24, author = {Peng Tang and Guoru Ding and Yitao Xu and Yutao Jiao and Yehui Song and Guofeng Wei}, title = {Causal Learning for Robust Specific Emitter Identification Over Unknown Channel Statistics}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {19}, pages = {5316--5329}, year = {2024}, url = {https://doi.org/10.1109/TIFS.2024.3393237}, doi = {10.1109/TIFS.2024.3393237}, timestamp = {Fri, 31 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/TangDXJSW24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/TangGCL24, author = {Xinyu Tang and Cheng Guo and Kim{-}Kwang Raymond Choo and Yi{-}Ning Liu}, title = {An Efficient and Dynamic Privacy-Preserving Federated Learning System for Edge Computing}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {19}, pages = {207--220}, year = {2024}, url = {https://doi.org/10.1109/TIFS.2023.3320611}, doi = {10.1109/TIFS.2023.3320611}, timestamp = {Sun, 10 Dec 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tifs/TangGCL24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/TangWXC24, author = {Yichao Tang and Chuntao Wang and Shijun Xiang and Yiu{-}Ming Cheung}, title = {A Robust Reversible Watermarking Scheme Using Attack-Simulation-Based Adaptive Normalization and Embedding}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {19}, pages = {4114--4129}, year = {2024}, url = {https://doi.org/10.1109/TIFS.2024.3372811}, doi = {10.1109/TIFS.2024.3372811}, timestamp = {Fri, 17 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/TangWXC24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/TangXWTPL24, author = {Jinling Tang and Haixia Xu and Mingsheng Wang and Tao Tang and Chunying Peng and Huimei Liao}, title = {A Flexible and Scalable Malicious Secure Aggregation Protocol for Federated Learning}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {19}, pages = {4174--4187}, year = {2024}, url = {https://doi.org/10.1109/TIFS.2024.3375527}, doi = {10.1109/TIFS.2024.3375527}, timestamp = {Fri, 17 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/TangXWTPL24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/TangZLCH24, author = {Weixuan Tang and Zhili Zhou and Bin Li and Kim{-}Kwang Raymond Choo and Jiwu Huang}, title = {Joint Cost Learning and Payload Allocation With Image-Wise Attention for Batch Steganography}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {19}, pages = {2826--2839}, year = {2024}, url = {https://doi.org/10.1109/TIFS.2024.3354411}, doi = {10.1109/TIFS.2024.3354411}, timestamp = {Thu, 29 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tifs/TangZLCH24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/TangZLDL24, author = {Wenbing Tang and Yuan Zhou and Yang Liu and Zuohua Ding and Jing Liu}, title = {Robust Motion Planning for Multi-Robot Systems Against Position Deception Attacks}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {19}, pages = {2157--2170}, year = {2024}, url = {https://doi.org/10.1109/TIFS.2023.3346647}, doi = {10.1109/TIFS.2023.3346647}, timestamp = {Fri, 26 Jan 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tifs/TangZLDL24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/TengZCJX24, author = {Yulin Teng and Pinchang Zhang and Xiao Chen and Xiaohong Jiang and Fu Xiao}, title = {PHY-Layer Authentication Exploiting Channel Sparsity in MmWave {MIMO} UAV-Ground Systems}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {19}, pages = {4642--4657}, year = {2024}, url = {https://doi.org/10.1109/TIFS.2024.3384112}, doi = {10.1109/TIFS.2024.3384112}, timestamp = {Fri, 17 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/TengZCJX24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/TianCYFWDH24, author = {Jiahe Tian and Peng Chen and Cai Yu and Xiaomeng Fu and Xi Wang and Jiao Dai and Jizhong Han}, title = {Learning to Discover Forgery Cues for Face Forgery Detection}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {19}, pages = {3814--3828}, year = {2024}, url = {https://doi.org/10.1109/TIFS.2024.3372773}, doi = {10.1109/TIFS.2024.3372773}, timestamp = {Fri, 17 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/TianCYFWDH24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/TianLLSZ24, author = {Yangguang Tian and Bowen Liu and Yingjiu Li and Pawel Szalachowski and Jianying Zhou}, title = {Accountable Fine-Grained Blockchain Rewriting in the Permissionless Setting}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {19}, pages = {1756--1766}, year = {2024}, url = {https://doi.org/10.1109/TIFS.2023.3340917}, doi = {10.1109/TIFS.2023.3340917}, timestamp = {Sat, 13 Jan 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tifs/TianLLSZ24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/TianMLZMX24, author = {Chuang Tian and Jianfeng Ma and Teng Li and Junwei Zhang and Chengyan Ma and Ning Xi}, title = {Provably and Physically Secure UAV-Assisted Authentication Protocol for IoT Devices in Unattended Settings}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {19}, pages = {4448--4463}, year = {2024}, url = {https://doi.org/10.1109/TIFS.2024.3379861}, doi = {10.1109/TIFS.2024.3379861}, timestamp = {Fri, 31 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/TianMLZMX24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/TihanyiBBR24, author = {Norbert Tihanyi and Tam{\'{a}}s Bisztray and Bertalan Borsos and Sebastien Raveau}, title = {Privacy-Preserving Password Cracking: How a Third Party Can Crack Our Password Hash Without Learning the Hash Value or the Cleartext}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {19}, pages = {2981--2996}, year = {2024}, url = {https://doi.org/10.1109/TIFS.2024.3356162}, doi = {10.1109/TIFS.2024.3356162}, timestamp = {Sat, 16 Mar 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tifs/TihanyiBBR24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/TongLMWLD24, author = {Qiuyun Tong and Xinghua Li and Yinbin Miao and Yunwei Wang and Ximeng Liu and Robert H. Deng}, title = {Beyond Result Verification: Efficient Privacy-Preserving Spatial Keyword Query With Suppressed Leakage}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {19}, pages = {2746--2760}, year = {2024}, url = {https://doi.org/10.1109/TIFS.2024.3354414}, doi = {10.1109/TIFS.2024.3354414}, timestamp = {Thu, 29 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tifs/TongLMWLD24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/TosunS24, author = {Tolun Tosun and Erkay Savas}, title = {Zero-Value Filtering for Accelerating Non-Profiled Side-Channel Attack on Incomplete NTT-Based Implementations of Lattice-Based Cryptography}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {19}, pages = {3353--3365}, year = {2024}, url = {https://doi.org/10.1109/TIFS.2024.3359890}, doi = {10.1109/TIFS.2024.3359890}, timestamp = {Thu, 29 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tifs/TosunS24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/TuttTCPBHV24, author = {Joakim Tutt and Olga Taran and Roman Chaban and Brian Pulfer and Yury Belousov and Taras Holotyak and Slava Voloshynovskiy}, title = {Authentication of Copy Detection Patterns: {A} Pattern Reliability Based Approach}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {19}, pages = {3124--3134}, year = {2024}, url = {https://doi.org/10.1109/TIFS.2024.3359510}, doi = {10.1109/TIFS.2024.3359510}, timestamp = {Fri, 01 Mar 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tifs/TuttTCPBHV24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/UddinYJO24, author = {Kutub Uddin and Yoonmo Yang and Tae Hyun Jeong and Byung Tae Oh}, title = {A Robust Open-Set Multi-Instance Learning for Defending Adversarial Attacks in Digital Image}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {19}, pages = {2098--2111}, year = {2024}, url = {https://doi.org/10.1109/TIFS.2023.3346211}, doi = {10.1109/TIFS.2023.3346211}, timestamp = {Fri, 26 Jan 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tifs/UddinYJO24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/VedadiKS24, author = {Elahe Vedadi and Yasaman Keshtkarjahromi and Hulya Seferoglu}, title = {Efficient Coded Multi-Party Computation at Edge Networks}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {19}, pages = {807--820}, year = {2024}, url = {https://doi.org/10.1109/TIFS.2023.3326970}, doi = {10.1109/TIFS.2023.3326970}, timestamp = {Fri, 08 Mar 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tifs/VedadiKS24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/ViceAHM24, author = {Jordan Vice and Naveed Akhtar and Richard I. Hartley and Ajmal Mian}, title = {{BAGM:} {A} Backdoor Attack for Manipulating Text-to-Image Generative Models}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {19}, pages = {4865--4880}, year = {2024}, url = {https://doi.org/10.1109/TIFS.2024.3386058}, doi = {10.1109/TIFS.2024.3386058}, timestamp = {Fri, 17 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/ViceAHM24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/WahrstatterSDBS24, author = {Anton Wahrst{\"{a}}tter and Matthew Solomon and Ben DiFrancesco and Vitalik Buterin and Davor Svetinovic}, title = {BaseSAP: Modular Stealth Address Protocol for Programmable Blockchains}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {19}, pages = {3539--3553}, year = {2024}, url = {https://doi.org/10.1109/TIFS.2024.3364081}, doi = {10.1109/TIFS.2024.3364081}, timestamp = {Fri, 17 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/WahrstatterSDBS24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/WangCMHWJ24, author = {Mingyue Wang and Zizhuo Chen and Yinbin Miao and Hejiao Huang and Cong Wang and Xiaohua Jia}, title = {Cross-User Leakage Mitigation for Authorized Multi-User Encrypted Data Sharing}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {19}, pages = {1213--1226}, year = {2024}, url = {https://doi.org/10.1109/TIFS.2023.3333244}, doi = {10.1109/TIFS.2023.3333244}, timestamp = {Tue, 07 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/WangCMHWJ24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/WangCZHZ24, author = {Fengqun Wang and Jie Cui and Qingyang Zhang and Debiao He and Hong Zhong}, title = {Blockchain-Based Secure Cross-Domain Data Sharing for Edge-Assisted Industrial Internet of Things}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {19}, pages = {3892--3905}, year = {2024}, url = {https://doi.org/10.1109/TIFS.2024.3372806}, doi = {10.1109/TIFS.2024.3372806}, timestamp = {Fri, 17 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/WangCZHZ24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/WangDCGXZ24, author = {Ning Wang and Jixuan Duan and Biwen Chen and Shangwei Guo and Tao Xiang and Kai Zeng}, title = {Efficient Group Key Generation Based on Satellite Cluster State Information for Drone Swarm}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {19}, pages = {4464--4479}, year = {2024}, url = {https://doi.org/10.1109/TIFS.2024.3381432}, doi = {10.1109/TIFS.2024.3381432}, timestamp = {Fri, 31 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/WangDCGXZ24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/WangGBJ24, author = {Haodi Wang and Yu Guo and Rongfang Bie and Xiaohua Jia}, title = {Verifiable Arbitrary Queries With Zero Knowledge Confidentiality in Decentralized Storage}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {19}, pages = {1071--1085}, year = {2024}, url = {https://doi.org/10.1109/TIFS.2023.3330305}, doi = {10.1109/TIFS.2023.3330305}, timestamp = {Sun, 31 Dec 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tifs/WangGBJ24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/WangHJGC24, author = {Lipeng Wang and Mingsheng Hu and Zhijuan Jia and Zhi Guan and Zhong Chen}, title = {SStore: An Efficient and Secure Provable Data Auditing Platform for Cloud}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {19}, pages = {4572--4584}, year = {2024}, url = {https://doi.org/10.1109/TIFS.2024.3383772}, doi = {10.1109/TIFS.2024.3383772}, timestamp = {Fri, 31 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/WangHJGC24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/WangLHH24, author = {Xiaohu Wang and Chao Lin and Xinyi Huang and Debiao He}, title = {Anonymity-Enhancing Multi-Hop Locks for Monero-Enabled Payment Channel Networks}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {19}, pages = {2438--2453}, year = {2024}, url = {https://doi.org/10.1109/TIFS.2023.3346177}, doi = {10.1109/TIFS.2023.3346177}, timestamp = {Fri, 26 Jan 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tifs/WangLHH24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/WangLJLLL24, author = {Xiangming Wang and Yang Liu and Kexin Jiao and Pengfei Liu and Xiapu Luo and Ting Liu}, title = {Intrusion Device Detection in Fieldbus Networks Based on Channel-State Group Fingerprint}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {19}, pages = {4012--4027}, year = {2024}, url = {https://doi.org/10.1109/TIFS.2024.3374596}, doi = {10.1109/TIFS.2024.3374596}, timestamp = {Fri, 17 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/WangLJLLL24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/WangLXRWZC24, author = {Qiuhua Wang and Chengyu Li and Tianyu Xia and Yizhi Ren and Dong Wang and Guoyan Zhang and Kim{-}Kwang Raymond Choo}, title = {Optimal Selfish Mining-Based Denial-of-Service Attack}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {19}, pages = {835--850}, year = {2024}, url = {https://doi.org/10.1109/TIFS.2023.3326386}, doi = {10.1109/TIFS.2023.3326386}, timestamp = {Sun, 31 Dec 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tifs/WangLXRWZC24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/WangSBXDL24, author = {Yuntao Wang and Zhou Su and Abderrahim Benslimane and Qichao Xu and Minghui Dai and Ruidong Li}, title = {Collaborative Honeypot Defense in {UAV} Networks: {A} Learning-Based Game Approach}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {19}, pages = {1963--1978}, year = {2024}, url = {https://doi.org/10.1109/TIFS.2023.3318942}, doi = {10.1109/TIFS.2023.3318942}, timestamp = {Fri, 26 Jan 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tifs/WangSBXDL24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/WangTCGWZX24, author = {Haotian Wang and Jun Tao and Dingwen Chi and Yu Gao and Zuyan Wang and Dika Zou and Yifan Xu}, title = {A Preference-Driven Malicious Platform Detection Mechanism for Users in Mobile Crowdsensing}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {19}, pages = {2720--2731}, year = {2024}, url = {https://doi.org/10.1109/TIFS.2024.3352412}, doi = {10.1109/TIFS.2024.3352412}, timestamp = {Wed, 17 Apr 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/WangTCGWZX24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/WangYFW24, author = {Minxiao Wang and Ning Yang and Nicolas J. Forcade{-}Perkins and Ning Weng}, title = {ProGen: Projection-Based Adversarial Attack Generation Against Network Intrusion Detection}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {19}, pages = {5476--5491}, year = {2024}, url = {https://doi.org/10.1109/TIFS.2024.3402155}, doi = {10.1109/TIFS.2024.3402155}, timestamp = {Wed, 29 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/WangYFW24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/WangYH24, author = {Min Wang and Xuefei Yin and Jiankun Hu}, title = {Cancellable Deep Learning Framework for {EEG} Biometrics}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {19}, pages = {3745--3757}, year = {2024}, url = {https://doi.org/10.1109/TIFS.2024.3369405}, doi = {10.1109/TIFS.2024.3369405}, timestamp = {Fri, 17 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/WangYH24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/WangYMLHTL24, author = {Huanran Wang and Wu Yang and Dapeng Man and Jiguang Lv and Shuai Han and Jingwen Tan and Tao Liu}, title = {Anchor Link Prediction for Cross-Network Digital Forensics From Local and Global Perspectives}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {19}, pages = {3620--3635}, year = {2024}, url = {https://doi.org/10.1109/TIFS.2024.3364066}, doi = {10.1109/TIFS.2024.3364066}, timestamp = {Fri, 17 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/WangYMLHTL24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/WangYZWSS24, author = {Taiyu Wang and Qinglin Yang and Kaiming Zhu and Junbo Wang and Chunhua Su and Kento Sato}, title = {{LDS-FL:} Loss Differential Strategy Based Federated Learning for Privacy Preserving}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {19}, pages = {1015--1030}, year = {2024}, url = {https://doi.org/10.1109/TIFS.2023.3322328}, doi = {10.1109/TIFS.2023.3322328}, timestamp = {Sun, 31 Dec 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tifs/WangYZWSS24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/WangZTY24, author = {Weiqi Wang and Chenhan Zhang and Zhiyi Tian and Shui Yu}, title = {Machine Unlearning via Representation Forgetting With Parameter Self-Sharing}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {19}, pages = {1099--1111}, year = {2024}, url = {https://doi.org/10.1109/TIFS.2023.3331239}, doi = {10.1109/TIFS.2023.3331239}, timestamp = {Sun, 31 Dec 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tifs/WangZTY24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/WangZWGFL24, author = {Na Wang and Wen Zhou and Jingjing Wang and Yifan Guo and Junsong Fu and Jianwei Liu}, title = {Secure and Efficient Similarity Retrieval in Cloud Computing Based on Homomorphic Encryption}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {19}, pages = {2454--2469}, year = {2024}, url = {https://doi.org/10.1109/TIFS.2024.3350909}, doi = {10.1109/TIFS.2024.3350909}, timestamp = {Thu, 16 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/WangZWGFL24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/WangZYHT24, author = {Jiaxiang Wang and Aihua Zheng and Yan Yan and Ran He and Jin Tang}, title = {Attribute-Guided Cross-Modal Interaction and Enhancement for Audio-Visual Matching}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {19}, pages = {4986--4998}, year = {2024}, url = {https://doi.org/10.1109/TIFS.2024.3388949}, doi = {10.1109/TIFS.2024.3388949}, timestamp = {Fri, 17 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/WangZYHT24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/WeiFJJL24, author = {Jiali Wei and Ming Fan and Wenjing Jiao and Wuxia Jin and Ting Liu}, title = {{BDMMT:} Backdoor Sample Detection for Language Models Through Model Mutation Testing}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {19}, pages = {4285--4300}, year = {2024}, url = {https://doi.org/10.1109/TIFS.2024.3376968}, doi = {10.1109/TIFS.2024.3376968}, timestamp = {Fri, 31 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/WeiFJJL24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/WeiJWHDLCPW24, author = {Yu Wei and Jingyu Jia and Yuduo Wu and Changhui Hu and Changyu Dong and Zheli Liu and Xiaofeng Chen and Yun Peng and Shaowei Wang}, title = {Distributed Differential Privacy via Shuffling Versus Aggregation: {A} Curious Study}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {19}, pages = {2501--2516}, year = {2024}, url = {https://doi.org/10.1109/TIFS.2024.3351474}, doi = {10.1109/TIFS.2024.3351474}, timestamp = {Fri, 26 Jan 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tifs/WeiJWHDLCPW24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/WeiXC24, author = {Xiangye Wei and Liming Xiu and Yimao Cai}, title = {A Perspective of Using Frequency-Mixing as Entropy in Random Number Generation for Portable Hardware Cybersecurity {IP}}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {19}, pages = {320--333}, year = {2024}, url = {https://doi.org/10.1109/TIFS.2023.3322602}, doi = {10.1109/TIFS.2023.3322602}, timestamp = {Sun, 10 Dec 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tifs/WeiXC24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/WeiYWG24, author = {Ziyu Wei and Xi Yang and Nannan Wang and Xinbo Gao}, title = {Dual-Adversarial Representation Disentanglement for Visible Infrared Person Re-Identification}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {19}, pages = {2186--2200}, year = {2024}, url = {https://doi.org/10.1109/TIFS.2023.3344289}, doi = {10.1109/TIFS.2023.3344289}, timestamp = {Fri, 26 Jan 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tifs/WeiYWG24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/WenCFCXT24, author = {Yun Wen and Gaojie Chen and Sisai Fang and Zheng Chu and Pei Xiao and Rahim Tafazolli}, title = {STAR-RIS-Assisted-Full-Duplex Jamming Design for Secure Wireless Communications System}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {19}, pages = {4331--4343}, year = {2024}, url = {https://doi.org/10.1109/TIFS.2024.3376248}, doi = {10.1109/TIFS.2024.3376248}, timestamp = {Fri, 17 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/WenCFCXT24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/WenCFWTR24, author = {Yun Wen and Gaojie Chen and Sisai Fang and Miaowen Wen and Stefano Tomasin and Marco Di Renzo}, title = {RIS-Assisted {UAV} Secure Communications With Artificial Noise-Aware Trajectory Design Against Multiple Colluding Curious Users}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {19}, pages = {3064--3076}, year = {2024}, url = {https://doi.org/10.1109/TIFS.2024.3356166}, doi = {10.1109/TIFS.2024.3356166}, timestamp = {Thu, 29 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tifs/WenCFWTR24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/WenM24, author = {Daolin Wen and Xiaowu Mu}, title = {Secure Dual Asynchronous Tracking Control for Markov Jump Systems Under Hybrid Cyberattacks}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {19}, pages = {3226--3236}, year = {2024}, url = {https://doi.org/10.1109/TIFS.2024.3359459}, doi = {10.1109/TIFS.2024.3359459}, timestamp = {Thu, 29 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tifs/WenM24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/WengYDHWW24, author = {Jia{-}Si Weng and Shenglong Yao and Yuefeng Du and Junjie Huang and Jian Weng and Cong Wang}, title = {Proof of Unlearning: Definitions and Instantiation}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {19}, pages = {3309--3323}, year = {2024}, url = {https://doi.org/10.1109/TIFS.2024.3358993}, doi = {10.1109/TIFS.2024.3358993}, timestamp = {Thu, 29 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tifs/WengYDHWW24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/WongHGSC24, author = {Guo{-}Wei Wong and Yi{-}Ting Huang and Ying{-}Ren Guo and Yeali S. Sun and Meng Chang Chen}, title = {Attention-Based {API} Locating for Malware Techniques}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {19}, pages = {1199--1212}, year = {2024}, url = {https://doi.org/10.1109/TIFS.2023.3330337}, doi = {10.1109/TIFS.2023.3330337}, timestamp = {Sun, 31 Dec 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tifs/WongHGSC24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/WuCDMS24, author = {Tongshuai Wu and Liwei Chen and Gewangzi Du and Dan Meng and Gang Shi}, title = {UltraVCS: Ultra-Fine-Grained Variable-Based Code Slicing for Automated Vulnerability Detection}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {19}, pages = {3986--4000}, year = {2024}, url = {https://doi.org/10.1109/TIFS.2024.3374219}, doi = {10.1109/TIFS.2024.3374219}, timestamp = {Fri, 17 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/WuCDMS24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/WuCTLLH24, author = {Hao{-}Tian Wu and Yiu{-}Ming Cheung and Zhihong Tian and Dingcai Liu and Xiangyang Luo and Jiankun Hu}, title = {Lossless Data Hiding in {NTRU} Cryptosystem by Polynomial Encoding and Modulation}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {19}, pages = {3719--3732}, year = {2024}, url = {https://doi.org/10.1109/TIFS.2024.3362592}, doi = {10.1109/TIFS.2024.3362592}, timestamp = {Fri, 17 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/WuCTLLH24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/WuLFYCZS24, author = {Jiajing Wu and Dan Lin and Qishuang Fu and Shuo Yang and Ting Chen and Zibin Zheng and Bowen Song}, title = {Toward Understanding Asset Flows in Crypto Money Laundering Through the Lenses of Ethereum Heists}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {19}, pages = {1994--2009}, year = {2024}, url = {https://doi.org/10.1109/TIFS.2023.3346276}, doi = {10.1109/TIFS.2023.3346276}, timestamp = {Fri, 26 Jan 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tifs/WuLFYCZS24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/WuZL24, author = {Jiahui Wu and Weizhe Zhang and Fucai Luo}, title = {On the Security of "LSFL: {A} Lightweight and Secure Federated Learning Scheme for Edge Computing"}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {19}, pages = {3481--3482}, year = {2024}, url = {https://doi.org/10.1109/TIFS.2023.3331274}, doi = {10.1109/TIFS.2023.3331274}, timestamp = {Sat, 16 Mar 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tifs/WuZL24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/WuZZTS24, author = {Haiwei Wu and Jiantao Zhou and Xinyu Zhang and Jinyu Tian and Weiwei Sun}, title = {Robust Camera Model Identification Over Online Social Network Shared Images via Multi-Scenario Learning}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {19}, pages = {148--162}, year = {2024}, url = {https://doi.org/10.1109/TIFS.2023.3318968}, doi = {10.1109/TIFS.2023.3318968}, timestamp = {Sun, 10 Dec 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tifs/WuZZTS24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/XiaLLYWG24, author = {Ruiyang Xia and Decheng Liu and Jie Li and Lin Yuan and Nannan Wang and Xinbo Gao}, title = {MMNet: Multi-Collaboration and Multi-Supervision Network for Sequential Deepfake Detection}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {19}, pages = {3409--3422}, year = {2024}, url = {https://doi.org/10.1109/TIFS.2024.3361151}, doi = {10.1109/TIFS.2024.3361151}, timestamp = {Sat, 16 Mar 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tifs/XiaLLYWG24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/XiaOGXZAA24, author = {Qi Xia and Isaac Amankona Obiri and Jianbin Gao and Hu Xia and Xiaosong Zhang and Kwame Omono Asamoah and Sandro Amofa}, title = {{PRIDN:} {A} Privacy Preserving Data Sharing on Named Data Networking}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {19}, pages = {677--692}, year = {2024}, url = {https://doi.org/10.1109/TIFS.2023.3327660}, doi = {10.1109/TIFS.2023.3327660}, timestamp = {Sun, 10 Dec 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tifs/XiaOGXZAA24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/XiangLBLYLRC24, author = {Yuexin Xiang and Yuchen Lei and Ding Bao and Tiantian Li and Qingqing Yang and Wenmao Liu and Wei Ren and Kim{-}Kwang Raymond Choo}, title = {{BABD:} {A} Bitcoin Address Behavior Dataset for Pattern Analysis}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {19}, pages = {2171--2185}, year = {2024}, url = {https://doi.org/10.1109/TIFS.2023.3347894}, doi = {10.1109/TIFS.2023.3347894}, timestamp = {Fri, 26 Jan 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tifs/XiangLBLYLRC24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/XiaoXZWY24, author = {Peng Xiao and Qibin Xiao and Xusheng Zhang and Yumei Wu and Fengyu Yang}, title = {Vulnerability Detection Based on Enhanced Graph Representation Learning}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {19}, pages = {5120--5135}, year = {2024}, url = {https://doi.org/10.1109/TIFS.2024.3392536}, doi = {10.1109/TIFS.2024.3392536}, timestamp = {Fri, 17 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/XiaoXZWY24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/XiaoZHXW24, author = {Xiangli Xiao and Yushu Zhang and Zhongyun Hua and Zhihua Xia and Jian Weng}, title = {Client-Side Embedding of Screen-Shooting Resilient Image Watermarking}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {19}, pages = {5357--5372}, year = {2024}, url = {https://doi.org/10.1109/TIFS.2024.3397043}, doi = {10.1109/TIFS.2024.3397043}, timestamp = {Fri, 31 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/XiaoZHXW24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/XieCWY24, author = {Yuankun Xie and Haonan Cheng and Yutian Wang and Long Ye}, title = {Domain Generalization via Aggregation and Separation for Audio Deepfake Detection}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {19}, pages = {344--358}, year = {2024}, url = {https://doi.org/10.1109/TIFS.2023.3324724}, doi = {10.1109/TIFS.2023.3324724}, timestamp = {Sun, 10 Dec 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tifs/XieCWY24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/XieSZMWLZ24, author = {Zhijie Xie and Fan Shi and Min Zhang and Huimin Ma and Huaixi Wang and Zhenhan Li and Yunyi Zhang}, title = {GuessFuse: Hybrid Password Guessing With Multi-View}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {19}, pages = {4215--4230}, year = {2024}, url = {https://doi.org/10.1109/TIFS.2024.3376246}, doi = {10.1109/TIFS.2024.3376246}, timestamp = {Fri, 31 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/XieSZMWLZ24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/XieYWBCW24, author = {Dong Xie and Jinghua Yang and Bin Wu and Weixin Bian and Fulong Chen and Taochun Wang}, title = {An Effectively Applicable to Resource Constrained Devices and Semi-Trusted Servers Authenticated Key Agreement Scheme}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {19}, pages = {3451--3464}, year = {2024}, url = {https://doi.org/10.1109/TIFS.2024.3362589}, doi = {10.1109/TIFS.2024.3362589}, timestamp = {Thu, 29 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tifs/XieYWBCW24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/XinWWLG24, author = {Jingwei Xin and Zikai Wei and Nannan Wang and Jie Li and Xinbo Gao}, title = {Large Pose Face Recognition via Facial Representation Learning}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {19}, pages = {934--946}, year = {2024}, url = {https://doi.org/10.1109/TIFS.2023.3329686}, doi = {10.1109/TIFS.2023.3329686}, timestamp = {Sun, 31 Dec 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tifs/XinWWLG24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/XingLYIM24, author = {Zheng Xing and Chan{-}Tong Lam and Xiaochen Yuan and Sio Kei Im and Penousal Machado}, title = {{MMQW:} Multi-Modal Quantum Watermarking Scheme}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {19}, pages = {5181--5195}, year = {2024}, url = {https://doi.org/10.1109/TIFS.2024.3394768}, doi = {10.1109/TIFS.2024.3394768}, timestamp = {Fri, 17 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/XingLYIM24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/XuCCHQ24, author = {Gehui Xu and Guanpu Chen and Zhaoyang Cheng and Yiguang Hong and Hongsheng Qi}, title = {Consistency of Stackelberg and Nash Equilibria in Three-Player Leader-Follower Games}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {19}, pages = {5330--5344}, year = {2024}, url = {https://doi.org/10.1109/TIFS.2024.3397196}, doi = {10.1109/TIFS.2024.3397196}, timestamp = {Fri, 31 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/XuCCHQ24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/XuCLLW24, author = {Dandan Xu and Kai Chen and Miaoqian Lin and Chaoyang Lin and Xiaofeng Wang}, title = {AutoPwn: Artifact-Assisted Heap Exploit Generation for {CTF} {PWN} Competitions}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {19}, pages = {293--306}, year = {2024}, url = {https://doi.org/10.1109/TIFS.2023.3322319}, doi = {10.1109/TIFS.2023.3322319}, timestamp = {Sun, 10 Dec 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tifs/XuCLLW24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/XuCYLT24, author = {Peng Xu and Gaojie Chen and Zheng Yang and Yong Li and Stefano Tomasin}, title = {Multiple Access Wiretap Channel With Partial Rate-Limited Feedback}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {19}, pages = {3279--3294}, year = {2024}, url = {https://doi.org/10.1109/TIFS.2024.3359071}, doi = {10.1109/TIFS.2024.3359071}, timestamp = {Thu, 29 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tifs/XuCYLT24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/XuFZZ24, author = {Nanqing Xu and Weiwei Feng and Tianzhu Zhang and Yongdong Zhang}, title = {A Unified Optimization Framework for Feature-Based Transferable Attacks}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {19}, pages = {4794--4808}, year = {2024}, url = {https://doi.org/10.1109/TIFS.2024.3380248}, doi = {10.1109/TIFS.2024.3380248}, timestamp = {Fri, 17 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/XuFZZ24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/XuLGX24, author = {Yinfei Xu and Jian Lu and Xuan Guang and Wei Xu}, title = {Information Embedding With Stegotext Reconstruction}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {19}, pages = {1415--1428}, year = {2024}, url = {https://doi.org/10.1109/TIFS.2023.3337947}, doi = {10.1109/TIFS.2023.3337947}, timestamp = {Sat, 13 Jan 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tifs/XuLGX24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/XuYCYLW24, author = {Peng Xu and Jun Yang and Gaojie Chen and Zheng Yang and Yong Li and Moe Z. Win}, title = {Physical-Layer Secret and Private Key Generation in Wireless Relay Networks With Correlated Eavesdropping Channels}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {19}, pages = {985--1000}, year = {2024}, url = {https://doi.org/10.1109/TIFS.2023.3329740}, doi = {10.1109/TIFS.2023.3329740}, timestamp = {Sun, 31 Dec 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tifs/XuYCYLW24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/XuZMML24, author = {Chongyao Xu and Litao Zhang and Pui{-}In Mak and Rui Paulo Martins and Man{-}Kay Law}, title = {Fully Symmetrical Obfuscated Interconnection and Weak-PUF-Assisted Challenge Obfuscation Strong PUFs Against Machine-Learning Modeling Attacks}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {19}, pages = {3927--3942}, year = {2024}, url = {https://doi.org/10.1109/TIFS.2024.3372801}, doi = {10.1109/TIFS.2024.3372801}, timestamp = {Fri, 17 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/XuZMML24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/XuZZ24, author = {Min Xu and Ximiao Zhang and Xiuzhuang Zhou}, title = {Confidence-Calibrated Face and Kinship Verification}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {19}, pages = {372--384}, year = {2024}, url = {https://doi.org/10.1109/TIFS.2023.3318957}, doi = {10.1109/TIFS.2023.3318957}, timestamp = {Sun, 10 Dec 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tifs/XuZZ24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/XueWJZWP24, author = {Yiming Xue and Jiaxuan Wu and Ronghua Ji and Ping Zhong and Juan Wen and Wanli Peng}, title = {Adaptive Domain-Invariant Feature Extraction for Cross-Domain Linguistic Steganalysis}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {19}, pages = {920--933}, year = {2024}, url = {https://doi.org/10.1109/TIFS.2023.3328455}, doi = {10.1109/TIFS.2023.3328455}, timestamp = {Sun, 31 Dec 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tifs/XueWJZWP24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/XueXZLZSL24, author = {Rui Xue and Kaiping Xue and Bin Zhu and Xinyi Luo and Tianwei Zhang and Qibin Sun and Jun Lu}, title = {Differentially Private Federated Learning With an Adaptive Noise Mechanism}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {19}, pages = {74--87}, year = {2024}, url = {https://doi.org/10.1109/TIFS.2023.3318944}, doi = {10.1109/TIFS.2023.3318944}, timestamp = {Sun, 10 Dec 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tifs/XueXZLZSL24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/XunJGLGC24, author = {Yuan Xun and Xiaojun Jia and Jindong Gu and Xinwei Liu and Qing Guo and Xiaochun Cao}, title = {Minimalism is King! High-Frequency Energy-Based Screening for Data-Efficient Backdoor Attacks}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {19}, pages = {4560--4571}, year = {2024}, url = {https://doi.org/10.1109/TIFS.2024.3380821}, doi = {10.1109/TIFS.2024.3380821}, timestamp = {Fri, 31 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/XunJGLGC24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/YangCCJLH24, author = {Guoyu Yang and Chang Chen and Qi Chen and Jianan Jiang and Jin Li and Debiao He}, title = {Sweeper: Breaking the Validity-Latency Tradeoff in Asynchronous Common Subset}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {19}, pages = {4534--4546}, year = {2024}, url = {https://doi.org/10.1109/TIFS.2024.3382602}, doi = {10.1109/TIFS.2024.3382602}, timestamp = {Fri, 31 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/YangCCJLH24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/YangCCY24, author = {Bin Yang and Jun Chen and Cuiqun Chen and Mang Ye}, title = {Dual Consistency-Constrained Learning for Unsupervised Visible-Infrared Person Re-Identification}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {19}, pages = {1767--1779}, year = {2024}, url = {https://doi.org/10.1109/TIFS.2023.3341392}, doi = {10.1109/TIFS.2023.3341392}, timestamp = {Sat, 13 Jan 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tifs/YangCCY24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/YangGFS24, author = {Ni Yang and Ruiyi Gao and Youzhi Feng and Huan Su}, title = {Event-Triggered Impulsive Control for Complex Networks Under Stochastic Deception Attacks}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {19}, pages = {1525--1534}, year = {2024}, url = {https://doi.org/10.1109/TIFS.2023.3336078}, doi = {10.1109/TIFS.2023.3336078}, timestamp = {Sat, 13 Jan 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tifs/YangGFS24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/YangHH24, author = {Yiming Yang and Weipeng Hu and Haifeng Hu}, title = {Unsupervised {NIR-VIS} Face Recognition via Homogeneous-to-Heterogeneous Learning and Residual-Invariant Enhancement}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {19}, pages = {2112--2126}, year = {2024}, url = {https://doi.org/10.1109/TIFS.2023.3346176}, doi = {10.1109/TIFS.2023.3346176}, timestamp = {Fri, 26 Jan 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tifs/YangHH24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/YangHZLW24, author = {Yunchao Yang and Miao Hu and Yipeng Zhou and Xuezheng Liu and Di Wu}, title = {{CSRA:} Robust Incentive Mechanism Design for Differentially Private Federated Learning}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {19}, pages = {892--906}, year = {2024}, url = {https://doi.org/10.1109/TIFS.2023.3329441}, doi = {10.1109/TIFS.2023.3329441}, timestamp = {Sun, 31 Dec 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tifs/YangHZLW24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/YangJYXWW24, author = {Fenghong Yang and Runqing Jiang and Yan Yan and Jing{-}Hao Xue and Biao Wang and Hanzi Wang}, title = {Dual-Mode Learning for Multi-Dataset X-Ray Security Image Detection}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {19}, pages = {3510--3524}, year = {2024}, url = {https://doi.org/10.1109/TIFS.2024.3364368}, doi = {10.1109/TIFS.2024.3364368}, timestamp = {Fri, 17 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/YangJYXWW24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/YangL24, author = {Xuan Yang and Dongming Li}, title = {{LED-RFF:} {LTE} DMRS-Based Channel Robust Radio Frequency Fingerprint Identification Scheme}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {19}, pages = {1855--1869}, year = {2024}, url = {https://doi.org/10.1109/TIFS.2023.3343079}, doi = {10.1109/TIFS.2023.3343079}, timestamp = {Sat, 13 Jan 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tifs/YangL24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/YangLLZFZWLS24, author = {Yulong Yang and Chenhao Lin and Qian Li and Zhengyu Zhao and Haoran Fan and Dawei Zhou and Nannan Wang and Tongliang Liu and Chao Shen}, title = {Quantization Aware Attack: Enhancing Transferable Adversarial Attacks by Model Quantization}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {19}, pages = {3265--3278}, year = {2024}, url = {https://doi.org/10.1109/TIFS.2024.3360891}, doi = {10.1109/TIFS.2024.3360891}, timestamp = {Tue, 02 Apr 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/YangLLZFZWLS24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/YangP24, author = {Haoxuan Yang and Changgen Peng}, title = {{CP-IPFE:} Ciphertext-Policy Based Inner Product Functional Encryption}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {19}, pages = {5419--5433}, year = {2024}, url = {https://doi.org/10.1109/TIFS.2024.3396395}, doi = {10.1109/TIFS.2024.3396395}, timestamp = {Fri, 31 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/YangP24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/YangSLZ24, author = {Hao Yang and Shiyu Shen and Zhe Liu and Yunlei Zhao}, title = {cuXCMP: CUDA-Accelerated Private Comparison Based on Homomorphic Encryption}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {19}, pages = {3581--3592}, year = {2024}, url = {https://doi.org/10.1109/TIFS.2023.3267677}, doi = {10.1109/TIFS.2023.3267677}, timestamp = {Fri, 17 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/YangSLZ24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/YangTH24, author = {Ningbin Yang and Chunming Tang and Debiao He}, title = {A Lightweight Certificateless Multi-User Matchmaking Encryption for Mobile Devices: Enhancing Security and Performance}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {19}, pages = {251--264}, year = {2024}, url = {https://doi.org/10.1109/TIFS.2023.3321961}, doi = {10.1109/TIFS.2023.3321961}, timestamp = {Sun, 10 Dec 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tifs/YangTH24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/YangWH24, author = {Mengxue Yang and Huaqun Wang and Debiao He}, title = {Puncturable Attribute-Based Encryption From Lattices for Classified Document Sharing}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {19}, pages = {4028--4042}, year = {2024}, url = {https://doi.org/10.1109/TIFS.2024.3374262}, doi = {10.1109/TIFS.2024.3374262}, timestamp = {Fri, 17 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/YangWH24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/YangWYCTCJ24, author = {Qing Yang and Cheng Wang and Haifeng Yuan and Jipeng Cui and Hu Teng and Xue Chen and Changjun Jiang}, title = {Approaching the Information-Theoretic Limit of Privacy Disclosure With Utility Guarantees}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {19}, pages = {3339--3352}, year = {2024}, url = {https://doi.org/10.1109/TIFS.2024.3354412}, doi = {10.1109/TIFS.2024.3354412}, timestamp = {Sun, 24 Mar 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tifs/YangWYCTCJ24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/YangXSWZ24, author = {He Yang and Wei Xi and Yuhao Shen and Canhui Wu and Jizhong Zhao}, title = {RoseAgg: Robust Defense Against Targeted Collusion Attacks in Federated Learning}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {19}, pages = {2951--2966}, year = {2024}, url = {https://doi.org/10.1109/TIFS.2024.3352415}, doi = {10.1109/TIFS.2024.3352415}, timestamp = {Thu, 29 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tifs/YangXSWZ24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/YangZXA24, author = {Xiao Yang and Chengru Zhang and Haiyang Xue and Man Ho Au}, title = {Efficient Verifiably Encrypted {ECDSA} Schemes From Castagnos-Laguillaumie and Joye-Libert Encryptions}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {19}, pages = {4161--4173}, year = {2024}, url = {https://doi.org/10.1109/TIFS.2024.3375622}, doi = {10.1109/TIFS.2024.3375622}, timestamp = {Fri, 17 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/YangZXA24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/YaoWWWRM24, author = {Ye Yao and Chen Wang and Hui Wang and Ke Wang and Yizhi Ren and Weizhi Meng}, title = {Embedding Secret Message in Chinese Characters via Glyph Perturbation and Style Transfer}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {19}, pages = {4406--4419}, year = {2024}, url = {https://doi.org/10.1109/TIFS.2024.3377903}, doi = {10.1109/TIFS.2024.3377903}, timestamp = {Fri, 31 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/YaoWWWRM24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/YeSZYD24, author = {Mang Ye and Wei Shen and Junwu Zhang and Yao Yang and Bo Du}, title = {SecureReID: Privacy-Preserving Anonymization for Person Re-Identification}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {19}, pages = {2840--2853}, year = {2024}, url = {https://doi.org/10.1109/TIFS.2024.3356233}, doi = {10.1109/TIFS.2024.3356233}, timestamp = {Thu, 29 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tifs/YeSZYD24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/YeZGZ24, author = {Dayong Ye and Tianqing Zhu and Kun Gao and Wanlei Zhou}, title = {Defending Against Label-Only Attacks via Meta-Reinforcement Learning}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {19}, pages = {3295--3308}, year = {2024}, url = {https://doi.org/10.1109/TIFS.2024.3357292}, doi = {10.1109/TIFS.2024.3357292}, timestamp = {Thu, 29 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tifs/YeZGZ24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/YinZSG24, author = {Zhenqin Yin and Xinmin Zhang and Zhihuan Song and Zhiqiang Ge}, title = {Adversarial Learning From Imbalanced Data: {A} Robust Industrial Fault Classification Method}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {19}, pages = {1870--1882}, year = {2024}, url = {https://doi.org/10.1109/TIFS.2023.3343073}, doi = {10.1109/TIFS.2023.3343073}, timestamp = {Sat, 13 Jan 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tifs/YinZSG24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/YuanCPZLZGE24, author = {Lin Yuan and Wu Chen and Xiao Pu and Yan Zhang and Hongbo Li and Yushu Zhang and Xinbo Gao and Touradj Ebrahimi}, title = {PRO-Face {C:} Privacy-Preserving Recognition of Obfuscated Face via Feature Compensation}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {19}, pages = {4930--4944}, year = {2024}, url = {https://doi.org/10.1109/TIFS.2024.3388976}, doi = {10.1109/TIFS.2024.3388976}, timestamp = {Fri, 17 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/YuanCPZLZGE24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/YuanFYZD24, author = {Haoheng Yuan and Yanghe Feng and Chuanchuan Yang and Zhuojun Zhuang and Bin Dai}, title = {Two-User Gaussian Broadcast Wiretap Channel With Common Message and Feedback: Revisit}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {19}, pages = {178--193}, year = {2024}, url = {https://doi.org/10.1109/TIFS.2023.3318948}, doi = {10.1109/TIFS.2023.3318948}, timestamp = {Sun, 10 Dec 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tifs/YuanFYZD24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/YuanGZZXW24, author = {Qingjun Yuan and Gaopeng Gou and Yanbei Zhu and Yuefei Zhu and Gang Xiong and Yongjuan Wang}, title = {MCRe: {A} Unified Framework for Handling Malicious Traffic With Noise Labels Based on Multidimensional Constraint Representation}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {19}, pages = {133--147}, year = {2024}, url = {https://doi.org/10.1109/TIFS.2023.3318962}, doi = {10.1109/TIFS.2023.3318962}, timestamp = {Sun, 10 Dec 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tifs/YuanGZZXW24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/YuanLWWWLMP24, author = {Xiaohan Yuan and Jiqiang Liu and Bin Wang and Wei Wang and Bin Wang and Tao Li and Xiaobo Ma and Witold Pedrycz}, title = {FedComm: {A} Privacy-Enhanced and Efficient Authentication Protocol for Federated Learning in Vehicular Ad-Hoc Networks}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {19}, pages = {777--792}, year = {2024}, url = {https://doi.org/10.1109/TIFS.2023.3324747}, doi = {10.1109/TIFS.2023.3324747}, timestamp = {Tue, 07 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/YuanLWWWLMP24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/YueZNWZLZ24, author = {Tai Yue and Fengwei Zhang and Zhenyu Ning and Pengfei Wang and Xu Zhou and Kai Lu and Lei Zhou}, title = {Armor: Protecting Software Against Hardware Tracing Techniques}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {19}, pages = {4247--4262}, year = {2024}, url = {https://doi.org/10.1109/TIFS.2024.3372816}, doi = {10.1109/TIFS.2024.3372816}, timestamp = {Fri, 17 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/YueZNWZLZ24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/ZengCZZY24, author = {Kai Zeng and Kejiang Chen and Jiansong Zhang and Weiming Zhang and Nenghai Yu}, title = {Toward Secure and Robust Steganography for Black-Box Generated Images}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {19}, pages = {3237--3250}, year = {2024}, url = {https://doi.org/10.1109/TIFS.2024.3361220}, doi = {10.1109/TIFS.2024.3361220}, timestamp = {Tue, 07 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/ZengCZZY24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/ZengLG24, author = {Xiao Mei Zeng and Qing Liu and Chee Lip Gan}, title = {A Comprehensive Data Retrieval and Correction Approach From 40-nm Flash Memory With Selective Chemical Engraving}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {19}, pages = {1031--1040}, year = {2024}, url = {https://doi.org/10.1109/TIFS.2023.3327857}, doi = {10.1109/TIFS.2023.3327857}, timestamp = {Tue, 21 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/ZengLG24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/ZengXGHZXZ24, author = {Zhirui Zeng and Tao Xiang and Shangwei Guo and Jialing He and Qiao Zhang and Guowen Xu and Tianwei Zhang}, title = {Contrast-Then-Approximate: Analyzing Keyword Leakage of Generative Language Models}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {19}, pages = {5166--5180}, year = {2024}, url = {https://doi.org/10.1109/TIFS.2024.3392535}, doi = {10.1109/TIFS.2024.3392535}, timestamp = {Fri, 17 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/ZengXGHZXZ24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/ZhaiWLQDGS24, author = {Mingzhe Zhai and Qianhong Wu and Yizhong Liu and Bo Qin and Xiaopeng Dai and Qiyuan Gao and Willy Susilo}, title = {Secret Multiple Leaders {\&} Committee Election With Application to Sharding Blockchain}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {19}, pages = {5060--5074}, year = {2024}, url = {https://doi.org/10.1109/TIFS.2024.3390584}, doi = {10.1109/TIFS.2024.3390584}, timestamp = {Fri, 31 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/ZhaiWLQDGS24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/ZhanDHLGP24, author = {Dazhi Zhan and Yexin Duan and Yue Hu and Weili Li and Shize Guo and Zhisong Pan}, title = {MalPatch: Evading DNN-Based Malware Detection With Adversarial Patches}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {19}, pages = {1183--1198}, year = {2024}, url = {https://doi.org/10.1109/TIFS.2023.3333567}, doi = {10.1109/TIFS.2023.3333567}, timestamp = {Sun, 31 Dec 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tifs/ZhanDHLGP24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/ZhanLLZLW24, author = {Mengqi Zhan and Yang Li and Bo Li and Jinchao Zhang and Chuanrong Li and Weiping Wang}, title = {Toward Automated Field Semantics Inference for Binary Protocol Reverse Engineering}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {19}, pages = {764--776}, year = {2024}, url = {https://doi.org/10.1109/TIFS.2023.3326666}, doi = {10.1109/TIFS.2023.3326666}, timestamp = {Sun, 31 Dec 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tifs/ZhanLLZLW24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/ZhangCDYZY24, author = {Xin Zhang and Kejiang Chen and Jinyang Ding and Yuqi Yang and Weiming Zhang and Nenghai Yu}, title = {Provably Secure Public-Key Steganography Based on Elliptic Curve Cryptography}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {19}, pages = {3148--3163}, year = {2024}, url = {https://doi.org/10.1109/TIFS.2024.3361219}, doi = {10.1109/TIFS.2024.3361219}, timestamp = {Thu, 29 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tifs/ZhangCDYZY24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/ZhangGCZ24, author = {Xingjian Zhang and Haochen Gong and Rui Chang and Yajin Zhou}, title = {{RECAST:} Mitigating Conflict-Based Cache Attacks Through Fine-Grained Dynamic Mapping}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {19}, pages = {3758--3771}, year = {2024}, url = {https://doi.org/10.1109/TIFS.2024.3368862}, doi = {10.1109/TIFS.2024.3368862}, timestamp = {Fri, 17 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/ZhangGCZ24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/ZhangJGLWWZ24, author = {Xinxun Zhang and Pengfei Jiao and Mengzhou Gao and Tianpeng Li and Yiming Wu and Huaming Wu and Zhidong Zhao}, title = {{VGGM:} Variational Graph Gaussian Mixture Model for Unsupervised Change Point Detection in Dynamic Networks}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {19}, pages = {4272--4284}, year = {2024}, url = {https://doi.org/10.1109/TIFS.2024.3377548}, doi = {10.1109/TIFS.2024.3377548}, timestamp = {Fri, 31 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/ZhangJGLWWZ24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/ZhangJWZXW24, author = {Yushu Zhang and Junhao Ji and Wenying Wen and Youwen Zhu and Zhihua Xia and Jian Weng}, title = {Understanding Visual Privacy Protection: {A} Generalized Framework With an Instance on Facial Privacy}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {19}, pages = {5046--5059}, year = {2024}, url = {https://doi.org/10.1109/TIFS.2024.3389572}, doi = {10.1109/TIFS.2024.3389572}, timestamp = {Fri, 17 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/ZhangJWZXW24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/ZhangL24, author = {Zehu Zhang and Yanping Li}, title = {{NSPFL:} {A} Novel Secure and Privacy-Preserving Federated Learning With Data Integrity Auditing}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {19}, pages = {4494--4506}, year = {2024}, url = {https://doi.org/10.1109/TIFS.2024.3379852}, doi = {10.1109/TIFS.2024.3379852}, timestamp = {Fri, 17 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/ZhangL24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/ZhangLGBXHL24, author = {Menghao Zhang and Guanyu Li and Cheng Guo and Han Bao and Mingwei Xu and Hongxin Hu and Fenghua Li}, title = {IMap: Toward a Fast, Scalable and Reconfigurable In-Network Scanner With Programmable Switches}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {19}, pages = {601--615}, year = {2024}, url = {https://doi.org/10.1109/TIFS.2023.3327665}, doi = {10.1109/TIFS.2023.3327665}, timestamp = {Sun, 31 Dec 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tifs/ZhangLGBXHL24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/ZhangLMLXRD24, author = {Man Zhang and Xinghua Li and Yinbin Miao and Bin Luo and Wanyun Xu and Yanbing Ren and Robert H. Deng}, title = {Privacy-Preserved Data Disturbance and Truthfulness Verification for Data Trading}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {19}, pages = {5545--5560}, year = {2024}, url = {https://doi.org/10.1109/TIFS.2024.3402162}, doi = {10.1109/TIFS.2024.3402162}, timestamp = {Fri, 31 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/ZhangLMLXRD24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/ZhangLZZGWSL24, author = {Songnian Zhang and Rongxing Lu and Hui Zhu and Yandong Zheng and Yunguo Guan and Fengwei Wang and Jun Shao and Hui Li}, title = {Performance Enhanced Secure Spatial Keyword Similarity Query With Arbitrary Spatial Ranges}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {19}, pages = {5272--5285}, year = {2024}, url = {https://doi.org/10.1109/TIFS.2024.3396384}, doi = {10.1109/TIFS.2024.3396384}, timestamp = {Fri, 31 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/ZhangLZZGWSL24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/ZhangMLD24, author = {Yuqing Zhang and Zhaofeng Ma and Shoushan Luo and Pengfei Duan}, title = {Dynamic Trust-Based Redactable Blockchain Supporting Update and Traceability}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {19}, pages = {821--834}, year = {2024}, url = {https://doi.org/10.1109/TIFS.2023.3326379}, doi = {10.1109/TIFS.2023.3326379}, timestamp = {Sun, 31 Dec 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tifs/ZhangMLD24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/ZhangMWGJ24, author = {Chen Zhang and Yulong Ming and Mingyue Wang and Yu Guo and Xiaohua Jia}, title = {Encrypted and Compressed Key-Value Store With Pattern-Analysis Security in Cloud Systems}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {19}, pages = {221--234}, year = {2024}, url = {https://doi.org/10.1109/TIFS.2023.3320612}, doi = {10.1109/TIFS.2023.3320612}, timestamp = {Sun, 10 Dec 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tifs/ZhangMWGJ24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/ZhangSXCCCL24, author = {Xiaoli Zhang and Wenxiang Sun and Zhicheng Xu and Hongbing Cheng and Chengjun Cai and Helei Cui and Qi Li}, title = {EVM-Shield: In-Contract State Access Control for Fast Vulnerability Detection and Prevention}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {19}, pages = {2517--2532}, year = {2024}, url = {https://doi.org/10.1109/TIFS.2024.3349852}, doi = {10.1109/TIFS.2024.3349852}, timestamp = {Fri, 26 Jan 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tifs/ZhangSXCCCL24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/ZhangWQWOASG24, author = {Xixi Zhang and Qin Wang and Maoyang Qin and Yu Wang and Tomoaki Ohtsuki and Bamidele Adebisi and Hikmet Sari and Guan Gui}, title = {Enhanced Few-Shot Malware Traffic Classification via Integrating Knowledge Transfer With Neural Architecture Search}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {19}, pages = {5245--5256}, year = {2024}, url = {https://doi.org/10.1109/TIFS.2024.3396624}, doi = {10.1109/TIFS.2024.3396624}, timestamp = {Fri, 31 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/ZhangWQWOASG24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/ZhangXWLYZ24, author = {Chuan Zhang and Haojun Xuan and Tong Wu and Ximeng Liu and Guomin Yang and Liehuang Zhu}, title = {Blockchain-Based Dynamic Time-Encapsulated Data Auditing for Outsourcing Storage}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {19}, pages = {1979--1993}, year = {2024}, url = {https://doi.org/10.1109/TIFS.2023.3338485}, doi = {10.1109/TIFS.2023.3338485}, timestamp = {Fri, 26 Jan 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tifs/ZhangXWLYZ24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/ZhangYQGLZW24, author = {Hengmin Zhang and Jian Yang and Jianjun Qian and Guangwei Gao and Xiangyuan Lan and Zhiyuan Zha and Bihan Wen}, title = {Efficient Image Classification via Structured Low-Rank Matrix Factorization Regression}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {19}, pages = {1496--1509}, year = {2024}, url = {https://doi.org/10.1109/TIFS.2023.3337717}, doi = {10.1109/TIFS.2023.3337717}, timestamp = {Sat, 13 Jan 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tifs/ZhangYQGLZW24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/ZhangYXTLLCD24, author = {Yunming Zhang and Dengpan Ye and Caiyun Xie and Long Tang and Xin Liao and Zi{-}yi Liu and Chuanxi Chen and Jiacheng Deng}, title = {Dual Defense: Adversarial, Traceable, and Invisible Robust Watermarking Against Face Swapping}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {19}, pages = {4628--4641}, year = {2024}, url = {https://doi.org/10.1109/TIFS.2024.3383648}, doi = {10.1109/TIFS.2024.3383648}, timestamp = {Fri, 17 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/ZhangYXTLLCD24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/ZhangYZSL24, author = {Sicheng Zhang and Yandie Yang and Ziyao Zhou and Zhi Sun and Yun Lin}, title = {{DIBAD:} {A} Disentangled Information Bottleneck Adversarial Defense Method Using Hilbert-Schmidt Independence Criterion for Spectrum Security}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {19}, pages = {3879--3891}, year = {2024}, url = {https://doi.org/10.1109/TIFS.2024.3372798}, doi = {10.1109/TIFS.2024.3372798}, timestamp = {Fri, 17 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/ZhangYZSL24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/ZhangYZZWM24, author = {Fahong Zhang and Chen Yang and Rui Zong and Xinran Zheng and Jianfei Wang and Yishuo Meng}, title = {An Efficient and Scalable FHE-Based {PDQ} Scheme: Utilizing {FFT} to Design a Low Multiplication Depth Large-Integer Comparison Algorithm}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {19}, pages = {2258--2272}, year = {2024}, url = {https://doi.org/10.1109/TIFS.2023.3348246}, doi = {10.1109/TIFS.2023.3348246}, timestamp = {Fri, 26 Jan 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tifs/ZhangYZZWM24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/ZhangZJZSW24, author = {Shenyi Zhang and Baolin Zheng and Peipei Jiang and Lingchen Zhao and Chao Shen and Qian Wang}, title = {Perception-Driven Imperceptible Adversarial Attack Against Decision-Based Black-Box Models}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {19}, pages = {3164--3177}, year = {2024}, url = {https://doi.org/10.1109/TIFS.2024.3359441}, doi = {10.1109/TIFS.2024.3359441}, timestamp = {Thu, 29 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tifs/ZhangZJZSW24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/ZhangZSGCSY24, author = {Jiale Zhang and Chengcheng Zhu and Xiaobing Sun and Chunpeng Ge and Bing Chen and Willy Susilo and Shui Yu}, title = {FLPurifier: Backdoor Defense in Federated Learning via Decoupled Contrastive Training}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {19}, pages = {4752--4766}, year = {2024}, url = {https://doi.org/10.1109/TIFS.2024.3384846}, doi = {10.1109/TIFS.2024.3384846}, timestamp = {Fri, 17 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/ZhangZSGCSY24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/ZhangZWZ24, author = {Rui Zhang and Lei Zhang and Qian Wu and Jianying Zhou}, title = {Secure Channel Establishment Scheme for Task Delivery in Vehicular Cloud Computing}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {19}, pages = {2865--2880}, year = {2024}, url = {https://doi.org/10.1109/TIFS.2024.3356809}, doi = {10.1109/TIFS.2024.3356809}, timestamp = {Tue, 13 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tifs/ZhangZWZ24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/ZhangZYCXY24, author = {Zhibo Zhang and Lei Zhang and Guangliang Yang and Yanjun Chen and Jiahao Xu and Min Yang}, title = {The Dark Forest: Understanding Security Risks of Cross-Party Delegated Resources in Mobile App-in-App Ecosystems}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {19}, pages = {5434--5448}, year = {2024}, url = {https://doi.org/10.1109/TIFS.2024.3390553}, doi = {10.1109/TIFS.2024.3390553}, timestamp = {Fri, 31 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/ZhangZYCXY24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/ZhangZZLGS24, author = {Yibin Zhang and Qianyun Zhang and Haitao Zhao and Yun Lin and Guan Gui and Hikmet Sari}, title = {Multisource Heterogeneous Specific Emitter Identification Using Attention Mechanism-Based {RFF} Fusion Method}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {19}, pages = {2639--2650}, year = {2024}, url = {https://doi.org/10.1109/TIFS.2024.3353594}, doi = {10.1109/TIFS.2024.3353594}, timestamp = {Tue, 12 Mar 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tifs/ZhangZZLGS24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/ZhaoMSSO24, author = {Raymond K. Zhao and Sarah McCarthy and Ron Steinfeld and Amin Sakzad and M{\'{a}}ire O'Neill}, title = {Quantum-Safe {HIBE:} Does It Cost a Latte?}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {19}, pages = {2680--2695}, year = {2024}, url = {https://doi.org/10.1109/TIFS.2023.3347880}, doi = {10.1109/TIFS.2023.3347880}, timestamp = {Sat, 16 Mar 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tifs/ZhaoMSSO24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/ZhaoXWK24, author = {Shao{-}Chuan Zhao and Tianyang Xu and Xiaojun Wu and Josef Kittler}, title = {Pluggable Attack for Visual Object Tracking}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {19}, pages = {1227--1240}, year = {2024}, url = {https://doi.org/10.1109/TIFS.2023.3331899}, doi = {10.1109/TIFS.2023.3331899}, timestamp = {Sun, 31 Dec 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tifs/ZhaoXWK24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/ZhaoZGQ24, author = {Jun Zhao and Kai Zhang and Junqing Gong and Haifeng Qian}, title = {Lavida: Large-Universe, Verifiable, and Dynamic Fine-Grained Access Control for E-Health Cloud}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {19}, pages = {2732--2745}, year = {2024}, url = {https://doi.org/10.1109/TIFS.2024.3350925}, doi = {10.1109/TIFS.2024.3350925}, timestamp = {Thu, 29 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tifs/ZhaoZGQ24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/ZhaoZGSZL24, author = {Weisong Zhao and Xiangyu Zhu and Kaiwen Guo and Haichao Shi and Xiaoyu Zhang and Zhen Lei}, title = {Masked Face Transformer}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {19}, pages = {265--279}, year = {2024}, url = {https://doi.org/10.1109/TIFS.2023.3322600}, doi = {10.1109/TIFS.2023.3322600}, timestamp = {Sun, 10 Dec 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tifs/ZhaoZGSZL24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/ZhaoZWKY24, author = {Mengnan Zhao and Lihe Zhang and Wei Wang and Yuqiu Kong and Baocai Yin}, title = {Adversarial Attacks on Scene Graph Generation}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {19}, pages = {3210--3225}, year = {2024}, url = {https://doi.org/10.1109/TIFS.2024.3360880}, doi = {10.1109/TIFS.2024.3360880}, timestamp = {Fri, 29 Mar 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tifs/ZhaoZWKY24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/ZhaoZWNLZ24, author = {Mingyang Zhao and Chuan Zhang and Tong Wu and Jianbing Ni and Ximeng Liu and Liehuang Zhu}, title = {Revocable and Privacy-Preserving Bilateral Access Control for Cloud Data Sharing}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {19}, pages = {5389--5404}, year = {2024}, url = {https://doi.org/10.1109/TIFS.2024.3394678}, doi = {10.1109/TIFS.2024.3394678}, timestamp = {Fri, 31 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/ZhaoZWNLZ24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/ZhaoluWW24, author = {Tianyu Zhaolu and Zhiguo Wan and Huaqun Wang}, title = {Division of Regulatory Power: Collaborative Regulation for Privacy-Preserving Blockchains}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {19}, pages = {2533--2548}, year = {2024}, url = {https://doi.org/10.1109/TIFS.2023.3348268}, doi = {10.1109/TIFS.2023.3348268}, timestamp = {Thu, 29 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tifs/ZhaoluWW24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/ZhengLWWMLDW24, author = {Tianyi Zheng and Bo Li and Shuang Wu and Ben Wan and Guodong Mu and Shice Liu and Shouhong Ding and Jia Wang}, title = {{MFAE:} Masked Frequency Autoencoders for Domain Generalization Face Anti-Spoofing}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {19}, pages = {4058--4069}, year = {2024}, url = {https://doi.org/10.1109/TIFS.2024.3371266}, doi = {10.1109/TIFS.2024.3371266}, timestamp = {Fri, 17 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/ZhengLWWMLDW24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/ZhouK24, author = {Zhenyu Zhou and Ajay Kumar}, title = {Finger-Knuckle Assisted Slap Fingerprint Identification System for Higher Security and Convenience}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {19}, pages = {441--454}, year = {2024}, url = {https://doi.org/10.1109/TIFS.2023.3318938}, doi = {10.1109/TIFS.2023.3318938}, timestamp = {Sun, 10 Dec 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tifs/ZhouK24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/ZhouWZLS24, author = {Qiang Zhou and Liangmin Wang and Huijuan Zhu and Tong Lu and Victor S. Sheng}, title = {WF-Transformer: Learning Temporal Features for Accurate Anonymous Traffic Identification by Using Transformer Networks}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {19}, pages = {30--43}, year = {2024}, url = {https://doi.org/10.1109/TIFS.2023.3318966}, doi = {10.1109/TIFS.2023.3318966}, timestamp = {Sun, 10 Dec 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tifs/ZhouWZLS24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/ZhouZYZZ24, author = {Shuai Zhou and Tianqing Zhu and Dayong Ye and Wanlei Zhou and Wei Zhao}, title = {Inversion-Guided Defense: Detecting Model Stealing Attacks by Output Inverting}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {19}, pages = {4130--4145}, year = {2024}, url = {https://doi.org/10.1109/TIFS.2024.3376190}, doi = {10.1109/TIFS.2024.3376190}, timestamp = {Fri, 17 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/ZhouZYZZ24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/ZhuCXWZ24, author = {Youwen Zhu and Yiran Cao and Qiao Xue and Qihui Wu and Yushu Zhang}, title = {Heavy Hitter Identification Over Large-Domain Set-Valued Data With Local Differential Privacy}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {19}, pages = {414--426}, year = {2024}, url = {https://doi.org/10.1109/TIFS.2023.3324726}, doi = {10.1109/TIFS.2023.3324726}, timestamp = {Sun, 10 Dec 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tifs/ZhuCXWZ24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/ZhuCZSHG24, author = {Derui Zhu and Jinfu Chen and Xuebing Zhou and Weiyi Shang and Ahmed E. Hassan and Jens Grossklags}, title = {Vulnerabilities of Data Protection in Vertical Federated Learning Training and Countermeasures}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {19}, pages = {3674--3689}, year = {2024}, url = {https://doi.org/10.1109/TIFS.2024.3361813}, doi = {10.1109/TIFS.2024.3361813}, timestamp = {Fri, 17 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/ZhuCZSHG24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/ZhuDZMZ24, author = {Boyu Zhu and Changyu Dong and Yuan Zhang and Yunlong Mao and Sheng Zhong}, title = {Toward Universal Detection of Adversarial Examples via Pseudorandom Classifiers}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {19}, pages = {1810--1825}, year = {2024}, url = {https://doi.org/10.1109/TIFS.2023.3340889}, doi = {10.1109/TIFS.2023.3340889}, timestamp = {Sat, 13 Jan 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tifs/ZhuDZMZ24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/ZhuICF24, author = {Yi Zhu and Mohamed Imoussa{\"{\i}}ne{-}A{\"{\i}}kous and Carolyn C{\^{o}}t{\'{e}}{-}Lussier and Tiago H. Falk}, title = {On the Impact of Voice Anonymization on Speech Diagnostic Applications: {A} Case Study on {COVID-19} Detection}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {19}, pages = {5151--5165}, year = {2024}, url = {https://doi.org/10.1109/TIFS.2024.3390990}, doi = {10.1109/TIFS.2024.3390990}, timestamp = {Fri, 31 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/ZhuICF24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/ZhuMLZZ24, author = {Yulin Zhu and Tomasz P. Michalak and Xiapu Luo and Xiaoge Zhang and Kai Zhou}, title = {Toward Secrecy-Aware Attacks Against Trust Prediction in Signed Social Networks}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {19}, pages = {3567--3580}, year = {2024}, url = {https://doi.org/10.1109/TIFS.2024.3364366}, doi = {10.1109/TIFS.2024.3364366}, timestamp = {Fri, 17 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/ZhuMLZZ24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/ZhuSDXH24, author = {Xiaojie Zhu and Peisong Shen and Yueyue Dai and Lei Xu and Jiankun Hu}, title = {Privacy-Preserving and Trusted Keyword Search for Multi-Tenancy Cloud}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {19}, pages = {4316--4330}, year = {2024}, url = {https://doi.org/10.1109/TIFS.2024.3377549}, doi = {10.1109/TIFS.2024.3377549}, timestamp = {Fri, 17 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/ZhuSDXH24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/ZhuZLWX24, author = {Xiaogang Zhu and Siyu Zhang and Chaoran Li and Sheng Wen and Yang Xiang}, title = {Fuzzing Android Native System Libraries via Dynamic Data Dependency Graph}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {19}, pages = {3733--3744}, year = {2024}, url = {https://doi.org/10.1109/TIFS.2024.3369479}, doi = {10.1109/TIFS.2024.3369479}, timestamp = {Fri, 17 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/ZhuZLWX24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/ZhuZTLZ24, author = {Liwang Zhu and Xiaotian Zhou and Jiahe Tian and Wei Li and Zhongzhi Zhang}, title = {Defending Against Malicious Influence Control in Online Leader-Follower Social Networks}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {19}, pages = {4809--4819}, year = {2024}, url = {https://doi.org/10.1109/TIFS.2024.3383244}, doi = {10.1109/TIFS.2024.3383244}, timestamp = {Fri, 17 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/ZhuZTLZ24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/ZhuZZC24, author = {Hong Zhu and Yue Zhao and Shengzhi Zhang and Kai Chen}, title = {NeuralSanitizer: Detecting Backdoors in Neural Networks}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {19}, pages = {4970--4985}, year = {2024}, url = {https://doi.org/10.1109/TIFS.2024.3390599}, doi = {10.1109/TIFS.2024.3390599}, timestamp = {Fri, 17 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/ZhuZZC24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/ZoisTK24, author = {Elias N. Zois and Dimitrios Tsourounis and Dimitrios Kalivas}, title = {Similarity Distance Learning on {SPD} Manifold for Writer Independent Offline Signature Verification}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {19}, pages = {1342--1356}, year = {2024}, url = {https://doi.org/10.1109/TIFS.2023.3333681}, doi = {10.1109/TIFS.2023.3333681}, timestamp = {Sun, 31 Dec 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tifs/ZoisTK24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.