{"title":"Interpretability-Oriented UAV Recognition via Frequency-Aware Networks: A Coarse-to-Fine Framework for Enhanced Accuracy and Insight","authors":"Gejiacheng Lu, Shufei Wang, Tomoaki Ohtsuki, Hikmet Sari, Guan Gui","doi":"10.1109/tifs.2026.3677579","DOIUrl":"https://doi.org/10.1109/tifs.2026.3677579","url":null,"abstract":"","PeriodicalId":13492,"journal":{"name":"IEEE Transactions on Information Forensics and Security","volume":"44 1","pages":""},"PeriodicalIF":6.8,"publicationDate":"2026-03-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"147507408","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":1,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2026-03-25DOI: 10.1109/tifs.2026.3677584
Keyang Zhang, Chenqi Kong, Hui Liu, Bo Ding, Xinghao Jiang, Haoliang Li
{"title":"Propose and Rectify: A Forensics-Driven MLLM Framework for Image Manipulation Localization","authors":"Keyang Zhang, Chenqi Kong, Hui Liu, Bo Ding, Xinghao Jiang, Haoliang Li","doi":"10.1109/tifs.2026.3677584","DOIUrl":"https://doi.org/10.1109/tifs.2026.3677584","url":null,"abstract":"","PeriodicalId":13492,"journal":{"name":"IEEE Transactions on Information Forensics and Security","volume":"90 1","pages":""},"PeriodicalIF":6.8,"publicationDate":"2026-03-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"147507441","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":1,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2026-03-25DOI: 10.1109/tifs.2026.3677691
Ziming Zhao, Zhaoxuan Li, Tingting Li, Fan Zhang
{"title":"Assessing and Improving DNN Robustness against Adversarial Examples from the Perspective of Fully Connected Layers","authors":"Ziming Zhao, Zhaoxuan Li, Tingting Li, Fan Zhang","doi":"10.1109/tifs.2026.3677691","DOIUrl":"https://doi.org/10.1109/tifs.2026.3677691","url":null,"abstract":"","PeriodicalId":13492,"journal":{"name":"IEEE Transactions on Information Forensics and Security","volume":"29 1","pages":""},"PeriodicalIF":6.8,"publicationDate":"2026-03-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"147507322","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":1,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Filter, Obstruct and Dilute: Defending Against Backdoor Attacks on Semi-Supervised Learning","authors":"Xinrui Wang, Wenhai Wan, Xiang Li, Chuanxing Geng, Shao-Yuan Li, Songcan Chen","doi":"10.1109/tifs.2026.3677662","DOIUrl":"https://doi.org/10.1109/tifs.2026.3677662","url":null,"abstract":"","PeriodicalId":13492,"journal":{"name":"IEEE Transactions on Information Forensics and Security","volume":"90 1","pages":""},"PeriodicalIF":6.8,"publicationDate":"2026-03-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"147507431","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":1,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2026-03-25DOI: 10.1109/tifs.2026.3677645
Jianhong Zhang, Chuming Shi
{"title":"On the security of Sequential Multi-signer Ring Signature for Secure Medical Data Sharing in IoMT","authors":"Jianhong Zhang, Chuming Shi","doi":"10.1109/tifs.2026.3677645","DOIUrl":"https://doi.org/10.1109/tifs.2026.3677645","url":null,"abstract":"","PeriodicalId":13492,"journal":{"name":"IEEE Transactions on Information Forensics and Security","volume":"58 1","pages":""},"PeriodicalIF":6.8,"publicationDate":"2026-03-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"147507323","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":1,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2026-03-23DOI: 10.1109/tifs.2026.3676667
Zeyu Zhao, Ke Xu, Tanfeng Sun, Xinghao Jiang
{"title":"SRAP: Robust and Transferable Self-Reversible Adversarial Patch for Image Privacy Protection","authors":"Zeyu Zhao, Ke Xu, Tanfeng Sun, Xinghao Jiang","doi":"10.1109/tifs.2026.3676667","DOIUrl":"https://doi.org/10.1109/tifs.2026.3676667","url":null,"abstract":"","PeriodicalId":13492,"journal":{"name":"IEEE Transactions on Information Forensics and Security","volume":"14 1","pages":""},"PeriodicalIF":6.8,"publicationDate":"2026-03-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"147507173","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":1,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2026-03-23DOI: 10.1109/tifs.2026.3676676
Khandaker Foysal Haque, Justin H. Kong, Terrence J. Moore, Kevin Chan, Francesco Restuccia, Fikadu T. Dagefu
{"title":"DECOR: Multi-Modal Decentralized Cluster-based Energy Efficient Covert Routing in HetNets","authors":"Khandaker Foysal Haque, Justin H. Kong, Terrence J. Moore, Kevin Chan, Francesco Restuccia, Fikadu T. Dagefu","doi":"10.1109/tifs.2026.3676676","DOIUrl":"https://doi.org/10.1109/tifs.2026.3676676","url":null,"abstract":"","PeriodicalId":13492,"journal":{"name":"IEEE Transactions on Information Forensics and Security","volume":"33 1","pages":""},"PeriodicalIF":6.8,"publicationDate":"2026-03-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"147507176","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":1,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2026-03-23DOI: 10.1109/tifs.2026.3676952
Anna V. Guglielmi, Laura Crosara, Stefano Tomasin
{"title":"Design of Physical Layer Challenge Response Authentication with RIS and Multiple-Antenna Devices","authors":"Anna V. Guglielmi, Laura Crosara, Stefano Tomasin","doi":"10.1109/tifs.2026.3676952","DOIUrl":"https://doi.org/10.1109/tifs.2026.3676952","url":null,"abstract":"","PeriodicalId":13492,"journal":{"name":"IEEE Transactions on Information Forensics and Security","volume":"4 1","pages":""},"PeriodicalIF":6.8,"publicationDate":"2026-03-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"147507181","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":1,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}