首页 > 最新文献

IEEE Transactions on Information Forensics and Security最新文献

英文 中文
Privacy-Preserving Multi-Modal Object Fusion for Connected Autonomous Vehicles: Resilience Against Malicious Third-Party Attacks 互联自动驾驶汽车的隐私保护多模态目标融合:抵御恶意第三方攻击的弹性
IF 6.8 1区 计算机科学 Q1 COMPUTER SCIENCE, THEORY & METHODS Pub Date : 2026-03-25 DOI: 10.1109/tifs.2026.3677597
Renwan Bi, Jinbo Xiong, Xu Yang, Yuanyuan Zhang, Zhiqiang Ruan, Junfeng Tian, Xun Yi
{"title":"Privacy-Preserving Multi-Modal Object Fusion for Connected Autonomous Vehicles: Resilience Against Malicious Third-Party Attacks","authors":"Renwan Bi, Jinbo Xiong, Xu Yang, Yuanyuan Zhang, Zhiqiang Ruan, Junfeng Tian, Xun Yi","doi":"10.1109/tifs.2026.3677597","DOIUrl":"https://doi.org/10.1109/tifs.2026.3677597","url":null,"abstract":"","PeriodicalId":13492,"journal":{"name":"IEEE Transactions on Information Forensics and Security","volume":"405 1","pages":""},"PeriodicalIF":6.8,"publicationDate":"2026-03-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"147507409","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":1,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Interpretability-Oriented UAV Recognition via Frequency-Aware Networks: A Coarse-to-Fine Framework for Enhanced Accuracy and Insight 基于频率感知网络的可解释性无人机识别:提高精度和洞察力的从粗到细的框架
IF 6.8 1区 计算机科学 Q1 COMPUTER SCIENCE, THEORY & METHODS Pub Date : 2026-03-25 DOI: 10.1109/tifs.2026.3677579
Gejiacheng Lu, Shufei Wang, Tomoaki Ohtsuki, Hikmet Sari, Guan Gui
{"title":"Interpretability-Oriented UAV Recognition via Frequency-Aware Networks: A Coarse-to-Fine Framework for Enhanced Accuracy and Insight","authors":"Gejiacheng Lu, Shufei Wang, Tomoaki Ohtsuki, Hikmet Sari, Guan Gui","doi":"10.1109/tifs.2026.3677579","DOIUrl":"https://doi.org/10.1109/tifs.2026.3677579","url":null,"abstract":"","PeriodicalId":13492,"journal":{"name":"IEEE Transactions on Information Forensics and Security","volume":"44 1","pages":""},"PeriodicalIF":6.8,"publicationDate":"2026-03-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"147507408","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":1,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Propose and Rectify: A Forensics-Driven MLLM Framework for Image Manipulation Localization 提出和纠正:一个法医驱动的图像处理定位MLLM框架
IF 6.8 1区 计算机科学 Q1 COMPUTER SCIENCE, THEORY & METHODS Pub Date : 2026-03-25 DOI: 10.1109/tifs.2026.3677584
Keyang Zhang, Chenqi Kong, Hui Liu, Bo Ding, Xinghao Jiang, Haoliang Li
{"title":"Propose and Rectify: A Forensics-Driven MLLM Framework for Image Manipulation Localization","authors":"Keyang Zhang, Chenqi Kong, Hui Liu, Bo Ding, Xinghao Jiang, Haoliang Li","doi":"10.1109/tifs.2026.3677584","DOIUrl":"https://doi.org/10.1109/tifs.2026.3677584","url":null,"abstract":"","PeriodicalId":13492,"journal":{"name":"IEEE Transactions on Information Forensics and Security","volume":"90 1","pages":""},"PeriodicalIF":6.8,"publicationDate":"2026-03-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"147507441","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":1,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Assessing and Improving DNN Robustness against Adversarial Examples from the Perspective of Fully Connected Layers 从完全连接层的角度评估和改进DNN对对抗示例的鲁棒性
IF 6.8 1区 计算机科学 Q1 COMPUTER SCIENCE, THEORY & METHODS Pub Date : 2026-03-25 DOI: 10.1109/tifs.2026.3677691
Ziming Zhao, Zhaoxuan Li, Tingting Li, Fan Zhang
{"title":"Assessing and Improving DNN Robustness against Adversarial Examples from the Perspective of Fully Connected Layers","authors":"Ziming Zhao, Zhaoxuan Li, Tingting Li, Fan Zhang","doi":"10.1109/tifs.2026.3677691","DOIUrl":"https://doi.org/10.1109/tifs.2026.3677691","url":null,"abstract":"","PeriodicalId":13492,"journal":{"name":"IEEE Transactions on Information Forensics and Security","volume":"29 1","pages":""},"PeriodicalIF":6.8,"publicationDate":"2026-03-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"147507322","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":1,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Filter, Obstruct and Dilute: Defending Against Backdoor Attacks on Semi-Supervised Learning 过滤、阻碍和稀释:防范半监督学习中的后门攻击
IF 6.8 1区 计算机科学 Q1 COMPUTER SCIENCE, THEORY & METHODS Pub Date : 2026-03-25 DOI: 10.1109/tifs.2026.3677662
Xinrui Wang, Wenhai Wan, Xiang Li, Chuanxing Geng, Shao-Yuan Li, Songcan Chen
{"title":"Filter, Obstruct and Dilute: Defending Against Backdoor Attacks on Semi-Supervised Learning","authors":"Xinrui Wang, Wenhai Wan, Xiang Li, Chuanxing Geng, Shao-Yuan Li, Songcan Chen","doi":"10.1109/tifs.2026.3677662","DOIUrl":"https://doi.org/10.1109/tifs.2026.3677662","url":null,"abstract":"","PeriodicalId":13492,"journal":{"name":"IEEE Transactions on Information Forensics and Security","volume":"90 1","pages":""},"PeriodicalIF":6.8,"publicationDate":"2026-03-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"147507431","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":1,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
On the security of Sequential Multi-signer Ring Signature for Secure Medical Data Sharing in IoMT 面向IoMT安全医疗数据共享的顺序多签名者环签名安全性研究
IF 6.8 1区 计算机科学 Q1 COMPUTER SCIENCE, THEORY & METHODS Pub Date : 2026-03-25 DOI: 10.1109/tifs.2026.3677645
Jianhong Zhang, Chuming Shi
{"title":"On the security of Sequential Multi-signer Ring Signature for Secure Medical Data Sharing in IoMT","authors":"Jianhong Zhang, Chuming Shi","doi":"10.1109/tifs.2026.3677645","DOIUrl":"https://doi.org/10.1109/tifs.2026.3677645","url":null,"abstract":"","PeriodicalId":13492,"journal":{"name":"IEEE Transactions on Information Forensics and Security","volume":"58 1","pages":""},"PeriodicalIF":6.8,"publicationDate":"2026-03-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"147507323","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":1,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
CLIP-ADA: CLIP-guided Artifact-invariant Generalizable Synthetic Image Detection CLIP-ADA: clip引导的伪影不变广义合成图像检测
IF 6.8 1区 计算机科学 Q1 COMPUTER SCIENCE, THEORY & METHODS Pub Date : 2026-03-23 DOI: 10.1109/tifs.2026.3676657
Jingyi Deng, Chong Zhang, Chenken Xu, Chenhao Lin, Zhengyu Zhao, Shuai Liu, Qian Wang, Chao Shen
{"title":"CLIP-ADA: CLIP-guided Artifact-invariant Generalizable Synthetic Image Detection","authors":"Jingyi Deng, Chong Zhang, Chenken Xu, Chenhao Lin, Zhengyu Zhao, Shuai Liu, Qian Wang, Chao Shen","doi":"10.1109/tifs.2026.3676657","DOIUrl":"https://doi.org/10.1109/tifs.2026.3676657","url":null,"abstract":"","PeriodicalId":13492,"journal":{"name":"IEEE Transactions on Information Forensics and Security","volume":"17 1","pages":""},"PeriodicalIF":6.8,"publicationDate":"2026-03-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"147507180","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":1,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
SRAP: Robust and Transferable Self-Reversible Adversarial Patch for Image Privacy Protection 图像隐私保护的鲁棒可转移自可逆对抗补丁
IF 6.8 1区 计算机科学 Q1 COMPUTER SCIENCE, THEORY & METHODS Pub Date : 2026-03-23 DOI: 10.1109/tifs.2026.3676667
Zeyu Zhao, Ke Xu, Tanfeng Sun, Xinghao Jiang
{"title":"SRAP: Robust and Transferable Self-Reversible Adversarial Patch for Image Privacy Protection","authors":"Zeyu Zhao, Ke Xu, Tanfeng Sun, Xinghao Jiang","doi":"10.1109/tifs.2026.3676667","DOIUrl":"https://doi.org/10.1109/tifs.2026.3676667","url":null,"abstract":"","PeriodicalId":13492,"journal":{"name":"IEEE Transactions on Information Forensics and Security","volume":"14 1","pages":""},"PeriodicalIF":6.8,"publicationDate":"2026-03-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"147507173","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":1,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
DECOR: Multi-Modal Decentralized Cluster-based Energy Efficient Covert Routing in HetNets 装饰:HetNets中基于多模态分散集群的节能隐蔽路由
IF 6.8 1区 计算机科学 Q1 COMPUTER SCIENCE, THEORY & METHODS Pub Date : 2026-03-23 DOI: 10.1109/tifs.2026.3676676
Khandaker Foysal Haque, Justin H. Kong, Terrence J. Moore, Kevin Chan, Francesco Restuccia, Fikadu T. Dagefu
{"title":"DECOR: Multi-Modal Decentralized Cluster-based Energy Efficient Covert Routing in HetNets","authors":"Khandaker Foysal Haque, Justin H. Kong, Terrence J. Moore, Kevin Chan, Francesco Restuccia, Fikadu T. Dagefu","doi":"10.1109/tifs.2026.3676676","DOIUrl":"https://doi.org/10.1109/tifs.2026.3676676","url":null,"abstract":"","PeriodicalId":13492,"journal":{"name":"IEEE Transactions on Information Forensics and Security","volume":"33 1","pages":""},"PeriodicalIF":6.8,"publicationDate":"2026-03-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"147507176","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":1,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Design of Physical Layer Challenge Response Authentication with RIS and Multiple-Antenna Devices RIS和多天线设备的物理层挑战响应认证设计
IF 6.8 1区 计算机科学 Q1 COMPUTER SCIENCE, THEORY & METHODS Pub Date : 2026-03-23 DOI: 10.1109/tifs.2026.3676952
Anna V. Guglielmi, Laura Crosara, Stefano Tomasin
{"title":"Design of Physical Layer Challenge Response Authentication with RIS and Multiple-Antenna Devices","authors":"Anna V. Guglielmi, Laura Crosara, Stefano Tomasin","doi":"10.1109/tifs.2026.3676952","DOIUrl":"https://doi.org/10.1109/tifs.2026.3676952","url":null,"abstract":"","PeriodicalId":13492,"journal":{"name":"IEEE Transactions on Information Forensics and Security","volume":"4 1","pages":""},"PeriodicalIF":6.8,"publicationDate":"2026-03-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"147507181","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":1,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
IEEE Transactions on Information Forensics and Security
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1