Pub Date : 2026-02-09DOI: 10.1109/tifs.2026.3663056
Mengsha Kou, Xiaoyu Xia, Ibrahim Khalil, Ziqi Wang, Xiuzhen Zhang, Lin Yao, Minhui Xue
{"title":"Data Flipping Attack and Defense in Web Edge Caching Systems","authors":"Mengsha Kou, Xiaoyu Xia, Ibrahim Khalil, Ziqi Wang, Xiuzhen Zhang, Lin Yao, Minhui Xue","doi":"10.1109/tifs.2026.3663056","DOIUrl":"https://doi.org/10.1109/tifs.2026.3663056","url":null,"abstract":"","PeriodicalId":13492,"journal":{"name":"IEEE Transactions on Information Forensics and Security","volume":"60 25 1","pages":""},"PeriodicalIF":6.8,"publicationDate":"2026-02-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"146160269","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":1,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Practical and Flexible Backdoor Attack against Deep Learning Models via Shell Code Injection","authors":"Jiakai Wang, Hao Liu, Renshuai Tao, Jian Sun, Xianglong Liu, Yao Zhao","doi":"10.1109/tifs.2026.3662587","DOIUrl":"https://doi.org/10.1109/tifs.2026.3662587","url":null,"abstract":"","PeriodicalId":13492,"journal":{"name":"IEEE Transactions on Information Forensics and Security","volume":"242 1","pages":""},"PeriodicalIF":6.8,"publicationDate":"2026-02-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"146160270","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":1,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2026-02-09DOI: 10.1109/tifs.2026.3662200
Haonan Yuan, Wenyuan Wu, Jingwei Chen
{"title":"Privacy-Preserving, Efficient and Accurate Dimensionality Reduction","authors":"Haonan Yuan, Wenyuan Wu, Jingwei Chen","doi":"10.1109/tifs.2026.3662200","DOIUrl":"https://doi.org/10.1109/tifs.2026.3662200","url":null,"abstract":"","PeriodicalId":13492,"journal":{"name":"IEEE Transactions on Information Forensics and Security","volume":"16 1","pages":""},"PeriodicalIF":6.8,"publicationDate":"2026-02-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"146160271","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":1,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2026-02-03DOI: 10.1109/tifs.2026.3660599
Haoyang Huang, Fengwei Zhangy
{"title":"HiveTEE: Scalable and Fine-grained Isolated Domains with RME and MTE Co-assisted","authors":"Haoyang Huang, Fengwei Zhangy","doi":"10.1109/tifs.2026.3660599","DOIUrl":"https://doi.org/10.1109/tifs.2026.3660599","url":null,"abstract":"","PeriodicalId":13492,"journal":{"name":"IEEE Transactions on Information Forensics and Security","volume":"11 1","pages":""},"PeriodicalIF":6.8,"publicationDate":"2026-02-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"146110444","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":1,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2026-01-29DOI: 10.1109/tifs.2026.3659398
Yuedong Pan, Lixin Zhao, Tao Leng, Zhexi Luo, Lijun Cai, Aimin Yu, Dan Meng
{"title":"DriftTrace: Combating Concept Drift in Security Applications through Detection and Explanation","authors":"Yuedong Pan, Lixin Zhao, Tao Leng, Zhexi Luo, Lijun Cai, Aimin Yu, Dan Meng","doi":"10.1109/tifs.2026.3659398","DOIUrl":"https://doi.org/10.1109/tifs.2026.3659398","url":null,"abstract":"","PeriodicalId":13492,"journal":{"name":"IEEE Transactions on Information Forensics and Security","volume":"78 1","pages":""},"PeriodicalIF":6.8,"publicationDate":"2026-01-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"146090043","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":1,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2026-01-29DOI: 10.1109/tifs.2026.3659401
Ekanut Sotthiwat, Chi Zhang, Xiaokui Xiao, Liangli Zhen
{"title":"Safeguarding Federated Learning from Data Reconstruction Attacks via Gradient Dropout","authors":"Ekanut Sotthiwat, Chi Zhang, Xiaokui Xiao, Liangli Zhen","doi":"10.1109/tifs.2026.3659401","DOIUrl":"https://doi.org/10.1109/tifs.2026.3659401","url":null,"abstract":"","PeriodicalId":13492,"journal":{"name":"IEEE Transactions on Information Forensics and Security","volume":"287 1","pages":""},"PeriodicalIF":6.8,"publicationDate":"2026-01-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"146090042","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":1,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2026-01-29DOI: 10.1109/tifs.2026.3657184
Yijia Guo, Junqing Zhang, Y.-W. Peter Hong, Stefano Tomasin
{"title":"Model-Driven Learning-Based Physical Layer Authentication for Mobile Wi-Fi Devices","authors":"Yijia Guo, Junqing Zhang, Y.-W. Peter Hong, Stefano Tomasin","doi":"10.1109/tifs.2026.3657184","DOIUrl":"https://doi.org/10.1109/tifs.2026.3657184","url":null,"abstract":"","PeriodicalId":13492,"journal":{"name":"IEEE Transactions on Information Forensics and Security","volume":"8 1","pages":""},"PeriodicalIF":6.8,"publicationDate":"2026-01-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"146089839","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":1,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}