{"title":"XAI for Fraud Detection: An Attention-Based Ensemble of CNNs, GNNs, and Confidence-Driven Gating for Reliable Decision-Making","authors":"Mehdi Hosseini Chagahi, Abolfazl Yekaneh, Saeed Mohammadi Dashtaki, Behzad Moshiri, Md. Jalil Piran","doi":"10.1109/tifs.2025.3646480","DOIUrl":"https://doi.org/10.1109/tifs.2025.3646480","url":null,"abstract":"","PeriodicalId":13492,"journal":{"name":"IEEE Transactions on Information Forensics and Security","volume":"9 1","pages":""},"PeriodicalIF":6.8,"publicationDate":"2025-12-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"145785626","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":1,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2025-12-19DOI: 10.1109/tifs.2025.3646027
Xiaoqi Li, Wenkai Li, Zhijie Liu, Meikang Qiu, Zhiquan Liu, Sen Nie, Zongwei Li, Shi Wu, Yuqing Zhang
{"title":"ScamSweeper: Detecting Illegal Accounts in Web3 Scams via Transactions Analysis","authors":"Xiaoqi Li, Wenkai Li, Zhijie Liu, Meikang Qiu, Zhiquan Liu, Sen Nie, Zongwei Li, Shi Wu, Yuqing Zhang","doi":"10.1109/tifs.2025.3646027","DOIUrl":"https://doi.org/10.1109/tifs.2025.3646027","url":null,"abstract":"","PeriodicalId":13492,"journal":{"name":"IEEE Transactions on Information Forensics and Security","volume":"176 1","pages":""},"PeriodicalIF":6.8,"publicationDate":"2025-12-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"145785624","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":1,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2025-12-18DOI: 10.1109/tifs.2025.3646048
Guancheng Lin, Man Zhou, Lianmiao Wang, Xinyue Shi, Qin Liu, Yueyue Dai, Fue Zeng
{"title":"GaitDG: A Single-Source Domain Generalization Framework for Cross-Domain Gait Recognition","authors":"Guancheng Lin, Man Zhou, Lianmiao Wang, Xinyue Shi, Qin Liu, Yueyue Dai, Fue Zeng","doi":"10.1109/tifs.2025.3646048","DOIUrl":"https://doi.org/10.1109/tifs.2025.3646048","url":null,"abstract":"","PeriodicalId":13492,"journal":{"name":"IEEE Transactions on Information Forensics and Security","volume":"25 1","pages":""},"PeriodicalIF":6.8,"publicationDate":"2025-12-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"145777955","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":1,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2025-12-18DOI: 10.1109/tifs.2025.3646036
Zhaoxuan Wang, Yang Li, Jie Zhang, Xingshuo Han, Kangbo Liu, Yang Lyu, Yuan Zhou, Tianwei Zhang, Quan Pan
{"title":"SSD: A State-based Stealthy Backdoor Attack For IMU/GNSS Navigation System in UAV Route Planning","authors":"Zhaoxuan Wang, Yang Li, Jie Zhang, Xingshuo Han, Kangbo Liu, Yang Lyu, Yuan Zhou, Tianwei Zhang, Quan Pan","doi":"10.1109/tifs.2025.3646036","DOIUrl":"https://doi.org/10.1109/tifs.2025.3646036","url":null,"abstract":"","PeriodicalId":13492,"journal":{"name":"IEEE Transactions on Information Forensics and Security","volume":"172 1","pages":""},"PeriodicalIF":6.8,"publicationDate":"2025-12-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"145778035","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":1,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"PowerEar: An Audio Eavesdropping Attack on Mobile Devices through USB Power Side Channel","authors":"Riccardo Spolaor, Heyuan Shi, Zekun Miao, Guoming Zhang, Yanni Yang, Xiuzhen Cheng, Pengfei Hu","doi":"10.1109/tifs.2025.3645562","DOIUrl":"https://doi.org/10.1109/tifs.2025.3645562","url":null,"abstract":"","PeriodicalId":13492,"journal":{"name":"IEEE Transactions on Information Forensics and Security","volume":"63 1","pages":""},"PeriodicalIF":6.8,"publicationDate":"2025-12-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"145771112","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":1,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2025-12-17DOI: 10.1109/tifs.2025.3645605
Junyu Quan, Yuxun Wang, Qin Li, Lvzhou Li
{"title":"Blind quantum computation with certified deletion for quantum inputs","authors":"Junyu Quan, Yuxun Wang, Qin Li, Lvzhou Li","doi":"10.1109/tifs.2025.3645605","DOIUrl":"https://doi.org/10.1109/tifs.2025.3645605","url":null,"abstract":"","PeriodicalId":13492,"journal":{"name":"IEEE Transactions on Information Forensics and Security","volume":"252 1","pages":""},"PeriodicalIF":6.8,"publicationDate":"2025-12-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"145771111","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":1,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}