首页 > 最新文献

IEEE Transactions on Information Forensics and Security最新文献

英文 中文
Optimal Access Structure Partition Methods for Image Secret Sharing 图像秘密共享的最优访问结构划分方法
IF 6.8 1区 计算机科学 Q1 COMPUTER SCIENCE, THEORY & METHODS Pub Date : 2025-12-19 DOI: 10.1109/tifs.2025.3645631
Xiaotian Wu, Li Tang, Zhihua Xia, Ching-Nung Yang, Weiqi Yan
{"title":"Optimal Access Structure Partition Methods for Image Secret Sharing","authors":"Xiaotian Wu, Li Tang, Zhihua Xia, Ching-Nung Yang, Weiqi Yan","doi":"10.1109/tifs.2025.3645631","DOIUrl":"https://doi.org/10.1109/tifs.2025.3645631","url":null,"abstract":"","PeriodicalId":13492,"journal":{"name":"IEEE Transactions on Information Forensics and Security","volume":"83 1","pages":""},"PeriodicalIF":6.8,"publicationDate":"2025-12-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"145785625","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":1,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
XAI for Fraud Detection: An Attention-Based Ensemble of CNNs, GNNs, and Confidence-Driven Gating for Reliable Decision-Making 用于欺诈检测的XAI:基于注意力的cnn, gnn和可靠决策的置信度驱动门控集成
IF 6.8 1区 计算机科学 Q1 COMPUTER SCIENCE, THEORY & METHODS Pub Date : 2025-12-19 DOI: 10.1109/tifs.2025.3646480
Mehdi Hosseini Chagahi, Abolfazl Yekaneh, Saeed Mohammadi Dashtaki, Behzad Moshiri, Md. Jalil Piran
{"title":"XAI for Fraud Detection: An Attention-Based Ensemble of CNNs, GNNs, and Confidence-Driven Gating for Reliable Decision-Making","authors":"Mehdi Hosseini Chagahi, Abolfazl Yekaneh, Saeed Mohammadi Dashtaki, Behzad Moshiri, Md. Jalil Piran","doi":"10.1109/tifs.2025.3646480","DOIUrl":"https://doi.org/10.1109/tifs.2025.3646480","url":null,"abstract":"","PeriodicalId":13492,"journal":{"name":"IEEE Transactions on Information Forensics and Security","volume":"9 1","pages":""},"PeriodicalIF":6.8,"publicationDate":"2025-12-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"145785626","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":1,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
ScamSweeper: Detecting Illegal Accounts in Web3 Scams via Transactions Analysis ScamSweeper:通过交易分析检测Web3诈骗中的非法账户
IF 6.8 1区 计算机科学 Q1 COMPUTER SCIENCE, THEORY & METHODS Pub Date : 2025-12-19 DOI: 10.1109/tifs.2025.3646027
Xiaoqi Li, Wenkai Li, Zhijie Liu, Meikang Qiu, Zhiquan Liu, Sen Nie, Zongwei Li, Shi Wu, Yuqing Zhang
{"title":"ScamSweeper: Detecting Illegal Accounts in Web3 Scams via Transactions Analysis","authors":"Xiaoqi Li, Wenkai Li, Zhijie Liu, Meikang Qiu, Zhiquan Liu, Sen Nie, Zongwei Li, Shi Wu, Yuqing Zhang","doi":"10.1109/tifs.2025.3646027","DOIUrl":"https://doi.org/10.1109/tifs.2025.3646027","url":null,"abstract":"","PeriodicalId":13492,"journal":{"name":"IEEE Transactions on Information Forensics and Security","volume":"176 1","pages":""},"PeriodicalIF":6.8,"publicationDate":"2025-12-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"145785624","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":1,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
When Multimedia Meets Security: Privacy-Preserving Cross-modal Retrieval for Large-scale Data 当多媒体满足安全:保护隐私的大规模数据跨模态检索
IF 6.8 1区 计算机科学 Q1 COMPUTER SCIENCE, THEORY & METHODS Pub Date : 2025-12-18 DOI: 10.1109/tifs.2025.3645606
Weikai Huang, Xiangyu Wang, Dan Zhu, Xindi Ma, Jianfeng Ma
{"title":"When Multimedia Meets Security: Privacy-Preserving Cross-modal Retrieval for Large-scale Data","authors":"Weikai Huang, Xiangyu Wang, Dan Zhu, Xindi Ma, Jianfeng Ma","doi":"10.1109/tifs.2025.3645606","DOIUrl":"https://doi.org/10.1109/tifs.2025.3645606","url":null,"abstract":"","PeriodicalId":13492,"journal":{"name":"IEEE Transactions on Information Forensics and Security","volume":"20 1","pages":""},"PeriodicalIF":6.8,"publicationDate":"2025-12-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"145777954","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":1,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
GaitDG: A Single-Source Domain Generalization Framework for Cross-Domain Gait Recognition GaitDG:一种跨域步态识别的单源域泛化框架
IF 6.8 1区 计算机科学 Q1 COMPUTER SCIENCE, THEORY & METHODS Pub Date : 2025-12-18 DOI: 10.1109/tifs.2025.3646048
Guancheng Lin, Man Zhou, Lianmiao Wang, Xinyue Shi, Qin Liu, Yueyue Dai, Fue Zeng
{"title":"GaitDG: A Single-Source Domain Generalization Framework for Cross-Domain Gait Recognition","authors":"Guancheng Lin, Man Zhou, Lianmiao Wang, Xinyue Shi, Qin Liu, Yueyue Dai, Fue Zeng","doi":"10.1109/tifs.2025.3646048","DOIUrl":"https://doi.org/10.1109/tifs.2025.3646048","url":null,"abstract":"","PeriodicalId":13492,"journal":{"name":"IEEE Transactions on Information Forensics and Security","volume":"25 1","pages":""},"PeriodicalIF":6.8,"publicationDate":"2025-12-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"145777955","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":1,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
SSD: A State-based Stealthy Backdoor Attack For IMU/GNSS Navigation System in UAV Route Planning 无人机航路规划中基于状态的IMU/GNSS导航系统隐形后门攻击
IF 6.8 1区 计算机科学 Q1 COMPUTER SCIENCE, THEORY & METHODS Pub Date : 2025-12-18 DOI: 10.1109/tifs.2025.3646036
Zhaoxuan Wang, Yang Li, Jie Zhang, Xingshuo Han, Kangbo Liu, Yang Lyu, Yuan Zhou, Tianwei Zhang, Quan Pan
{"title":"SSD: A State-based Stealthy Backdoor Attack For IMU/GNSS Navigation System in UAV Route Planning","authors":"Zhaoxuan Wang, Yang Li, Jie Zhang, Xingshuo Han, Kangbo Liu, Yang Lyu, Yuan Zhou, Tianwei Zhang, Quan Pan","doi":"10.1109/tifs.2025.3646036","DOIUrl":"https://doi.org/10.1109/tifs.2025.3646036","url":null,"abstract":"","PeriodicalId":13492,"journal":{"name":"IEEE Transactions on Information Forensics and Security","volume":"172 1","pages":""},"PeriodicalIF":6.8,"publicationDate":"2025-12-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"145778035","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":1,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Exploiting Cyber Threat Intelligence for Indirect Attacks Against Serverless Infrastructures 利用网络威胁情报对无服务器基础设施进行间接攻击
IF 6.8 1区 计算机科学 Q1 COMPUTER SCIENCE, THEORY & METHODS Pub Date : 2025-12-17 DOI: 10.1109/tifs.2025.3644790
Baojin Wang, Yongzhao Zhang, Xiong Li, Jie Yang, Yijun Liu, Jiazhen Liu, Ting Chen, Xiaosong Zhang, Dian Ding, Yi-Chao Chen
{"title":"Exploiting Cyber Threat Intelligence for Indirect Attacks Against Serverless Infrastructures","authors":"Baojin Wang, Yongzhao Zhang, Xiong Li, Jie Yang, Yijun Liu, Jiazhen Liu, Ting Chen, Xiaosong Zhang, Dian Ding, Yi-Chao Chen","doi":"10.1109/tifs.2025.3644790","DOIUrl":"https://doi.org/10.1109/tifs.2025.3644790","url":null,"abstract":"","PeriodicalId":13492,"journal":{"name":"IEEE Transactions on Information Forensics and Security","volume":"12 1","pages":""},"PeriodicalIF":6.8,"publicationDate":"2025-12-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"145771109","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":1,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
RIS-Enabled Integrated Anti-Jamming Covert Communication and Sensing Systems RIS-Enabled集成抗干扰隐蔽通信和传感系统
IF 6.8 1区 计算机科学 Q1 COMPUTER SCIENCE, THEORY & METHODS Pub Date : 2025-12-17 DOI: 10.1109/tifs.2025.3645577
Zheng Li, Zheng Chu, Zhengyu Zhu, Jinlei Xu, Kexian Gong, Pei Xiao
{"title":"RIS-Enabled Integrated Anti-Jamming Covert Communication and Sensing Systems","authors":"Zheng Li, Zheng Chu, Zhengyu Zhu, Jinlei Xu, Kexian Gong, Pei Xiao","doi":"10.1109/tifs.2025.3645577","DOIUrl":"https://doi.org/10.1109/tifs.2025.3645577","url":null,"abstract":"","PeriodicalId":13492,"journal":{"name":"IEEE Transactions on Information Forensics and Security","volume":"5 1","pages":""},"PeriodicalIF":6.8,"publicationDate":"2025-12-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"145771110","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":1,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
PowerEar: An Audio Eavesdropping Attack on Mobile Devices through USB Power Side Channel PowerEar:通过USB电源侧通道对移动设备进行音频窃听攻击
IF 6.8 1区 计算机科学 Q1 COMPUTER SCIENCE, THEORY & METHODS Pub Date : 2025-12-17 DOI: 10.1109/tifs.2025.3645562
Riccardo Spolaor, Heyuan Shi, Zekun Miao, Guoming Zhang, Yanni Yang, Xiuzhen Cheng, Pengfei Hu
{"title":"PowerEar: An Audio Eavesdropping Attack on Mobile Devices through USB Power Side Channel","authors":"Riccardo Spolaor, Heyuan Shi, Zekun Miao, Guoming Zhang, Yanni Yang, Xiuzhen Cheng, Pengfei Hu","doi":"10.1109/tifs.2025.3645562","DOIUrl":"https://doi.org/10.1109/tifs.2025.3645562","url":null,"abstract":"","PeriodicalId":13492,"journal":{"name":"IEEE Transactions on Information Forensics and Security","volume":"63 1","pages":""},"PeriodicalIF":6.8,"publicationDate":"2025-12-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"145771112","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":1,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Blind quantum computation with certified deletion for quantum inputs 量子输入的认证删除盲量子计算
IF 6.8 1区 计算机科学 Q1 COMPUTER SCIENCE, THEORY & METHODS Pub Date : 2025-12-17 DOI: 10.1109/tifs.2025.3645605
Junyu Quan, Yuxun Wang, Qin Li, Lvzhou Li
{"title":"Blind quantum computation with certified deletion for quantum inputs","authors":"Junyu Quan, Yuxun Wang, Qin Li, Lvzhou Li","doi":"10.1109/tifs.2025.3645605","DOIUrl":"https://doi.org/10.1109/tifs.2025.3645605","url":null,"abstract":"","PeriodicalId":13492,"journal":{"name":"IEEE Transactions on Information Forensics and Security","volume":"252 1","pages":""},"PeriodicalIF":6.8,"publicationDate":"2025-12-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"145771111","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":1,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
IEEE Transactions on Information Forensics and Security
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1