Pub Date : 2026-02-03DOI: 10.1109/tifs.2026.3660599
Haoyang Huang, Fengwei Zhangy
{"title":"HiveTEE: Scalable and Fine-grained Isolated Domains with RME and MTE Co-assisted","authors":"Haoyang Huang, Fengwei Zhangy","doi":"10.1109/tifs.2026.3660599","DOIUrl":"https://doi.org/10.1109/tifs.2026.3660599","url":null,"abstract":"","PeriodicalId":13492,"journal":{"name":"IEEE Transactions on Information Forensics and Security","volume":"11 1","pages":""},"PeriodicalIF":6.8,"publicationDate":"2026-02-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"146110444","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":1,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2026-01-29DOI: 10.1109/tifs.2026.3659398
Yuedong Pan, Lixin Zhao, Tao Leng, Zhexi Luo, Lijun Cai, Aimin Yu, Dan Meng
{"title":"DriftTrace: Combating Concept Drift in Security Applications through Detection and Explanation","authors":"Yuedong Pan, Lixin Zhao, Tao Leng, Zhexi Luo, Lijun Cai, Aimin Yu, Dan Meng","doi":"10.1109/tifs.2026.3659398","DOIUrl":"https://doi.org/10.1109/tifs.2026.3659398","url":null,"abstract":"","PeriodicalId":13492,"journal":{"name":"IEEE Transactions on Information Forensics and Security","volume":"78 1","pages":""},"PeriodicalIF":6.8,"publicationDate":"2026-01-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"146090043","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":1,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2026-01-29DOI: 10.1109/tifs.2026.3659401
Ekanut Sotthiwat, Chi Zhang, Xiaokui Xiao, Liangli Zhen
{"title":"Safeguarding Federated Learning from Data Reconstruction Attacks via Gradient Dropout","authors":"Ekanut Sotthiwat, Chi Zhang, Xiaokui Xiao, Liangli Zhen","doi":"10.1109/tifs.2026.3659401","DOIUrl":"https://doi.org/10.1109/tifs.2026.3659401","url":null,"abstract":"","PeriodicalId":13492,"journal":{"name":"IEEE Transactions on Information Forensics and Security","volume":"287 1","pages":""},"PeriodicalIF":6.8,"publicationDate":"2026-01-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"146090042","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":1,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2026-01-29DOI: 10.1109/tifs.2026.3657184
Yijia Guo, Junqing Zhang, Y.-W. Peter Hong, Stefano Tomasin
{"title":"Model-Driven Learning-Based Physical Layer Authentication for Mobile Wi-Fi Devices","authors":"Yijia Guo, Junqing Zhang, Y.-W. Peter Hong, Stefano Tomasin","doi":"10.1109/tifs.2026.3657184","DOIUrl":"https://doi.org/10.1109/tifs.2026.3657184","url":null,"abstract":"","PeriodicalId":13492,"journal":{"name":"IEEE Transactions on Information Forensics and Security","volume":"8 1","pages":""},"PeriodicalIF":6.8,"publicationDate":"2026-01-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"146089839","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":1,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2026-01-29DOI: 10.1109/tifs.2026.3659003
Xiaoping Lou, Zidong Wang
{"title":"A Novel Quantum-Based Mutual Authentication and Key Agreement Scheme for Smart Grid","authors":"Xiaoping Lou, Zidong Wang","doi":"10.1109/tifs.2026.3659003","DOIUrl":"https://doi.org/10.1109/tifs.2026.3659003","url":null,"abstract":"","PeriodicalId":13492,"journal":{"name":"IEEE Transactions on Information Forensics and Security","volume":"79 1","pages":""},"PeriodicalIF":6.8,"publicationDate":"2026-01-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"146090041","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":1,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2026-01-28DOI: 10.1109/tifs.2026.3659000
Yujun Kim, Young-Gab Kim
{"title":"ISFL-AE: Insider-Specific Feature Learning Autoencoder for Lightweight Insider Threat Detection","authors":"Yujun Kim, Young-Gab Kim","doi":"10.1109/tifs.2026.3659000","DOIUrl":"https://doi.org/10.1109/tifs.2026.3659000","url":null,"abstract":"","PeriodicalId":13492,"journal":{"name":"IEEE Transactions on Information Forensics and Security","volume":"5 1","pages":""},"PeriodicalIF":6.8,"publicationDate":"2026-01-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"146070464","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":1,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2026-01-28DOI: 10.1109/tifs.2026.3658994
Wenjiao Dong, Xi Yang, Nannan Wang
{"title":"Sparse VMamba: Robust Spatio-Temporal Information Modeling for Event Camera Person Re-Identification","authors":"Wenjiao Dong, Xi Yang, Nannan Wang","doi":"10.1109/tifs.2026.3658994","DOIUrl":"https://doi.org/10.1109/tifs.2026.3658994","url":null,"abstract":"","PeriodicalId":13492,"journal":{"name":"IEEE Transactions on Information Forensics and Security","volume":"5 1","pages":""},"PeriodicalIF":6.8,"publicationDate":"2026-01-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"146070470","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":1,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}