首页 > 最新文献

IEEE Transactions on Information Forensics and Security最新文献

英文 中文
Secure Acceleration of Aggregation Queries over Homomorphically Encrypted Databases 同态加密数据库上聚合查询的安全加速
IF 6.8 1区 计算机科学 Q1 COMPUTER SCIENCE, THEORY & METHODS Pub Date : 2026-02-03 DOI: 10.1109/tifs.2026.3658997
Jinjiang Yang, Chunyi Zhang, Feng Liu, Yingjie Xue, Feng Wang, Kaiping Xue
{"title":"Secure Acceleration of Aggregation Queries over Homomorphically Encrypted Databases","authors":"Jinjiang Yang, Chunyi Zhang, Feng Liu, Yingjie Xue, Feng Wang, Kaiping Xue","doi":"10.1109/tifs.2026.3658997","DOIUrl":"https://doi.org/10.1109/tifs.2026.3658997","url":null,"abstract":"","PeriodicalId":13492,"journal":{"name":"IEEE Transactions on Information Forensics and Security","volume":"19 1","pages":""},"PeriodicalIF":6.8,"publicationDate":"2026-02-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"146110446","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":1,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
MACHANet: Memory-Augmented Cross Modal Hybrid Alignment Network for Unsupervised Visible-Infrared Person Re-Identification 基于记忆增强交叉模态混合对准网络的无监督可见红外人再识别
IF 8 1区 计算机科学 Q1 COMPUTER SCIENCE, THEORY & METHODS Pub Date : 2026-02-03 DOI: 10.1109/TIFS.2026.3660597
Tingyu Yang;Weiqing Yan;Guanghui Yue;Wujie Zhou;Chang Tang
Unsupervised Visible-Infrared Person Re-Identification (USL-VI-ReID) aims to match person images across visible and infrared modalities without identity annotations, addressing challenges such as cross-modal discrepancy and unlabeled data. Existing methods, however, often suffer from excessive sub-clusters, identity mixing, and unreliable cross-modal associations, which degrade matching performance. To overcome these issues, we propose MACHANet, a novel framework. The Memory Learning via Progressive Hybrid Clustering (MLPHC) module reduces excessive sub-clustering and enhances memory representations by first applying Harmonic Discrepancy Clustering with harmonic constraints and a core-edge mechanism, then gradually transitioning to DBSCAN as features become more discriminative. The Global Cross-Modal Positive Sample Alignment (GCPSA) module constructs a global set of cross-modal positive pairs, selecting the most similar visible–infrared samples of the same identity and computing alignment losses across intra- and inter-modalities. By maximizing mutual information and minimizing cross-modal distribution gaps, GCPSA effectively reduces modality discrepancies and suppresses noisy identity associations. Finally, the Multi-Modal Support Sample Expansion Alignment (MSSEA) module dynamically expands multi-modal support samples and incorporates residual-based representations to refine clusters, separate mixed identities, and progressively merge sub-identities. Extensive experiments on SYSU-MM01 and RegDB show that MACHANet outperforms existing state-of-the-art methods, including some supervised approaches. The source code will be publicly released.
无监督可见红外人员再识别(USL-VI-ReID)旨在在没有身份注释的情况下匹配可见光和红外模式下的人员图像,解决跨模式差异和未标记数据等挑战。然而,现有的方法往往存在过多的子聚类、身份混合和不可靠的跨模态关联,从而降低了匹配性能。为了克服这些问题,我们提出了一个新的框架MACHANet。基于渐进式混合聚类(MLPHC)的记忆学习模块首先采用调和约束和核心边缘机制的调和差异聚类,然后随着特征的判别性增强,逐渐过渡到DBSCAN,从而减少过多的子聚类并增强记忆表征。Global Cross-Modal Positive Sample Alignment (GCPSA)模块构建了一组全局的Cross-Modal Positive pairs,选择最相似的具有相同身份的可见-红外样本,并计算跨模内和模间的校准损失。通过最大化互信息和最小化跨模态分布差距,GCPSA有效地减少了模态差异和抑制了噪声身份关联。最后,多模态支持样本扩展对齐(MSSEA)模块动态扩展多模态支持样本,并结合基于残差的表示来细化聚类,分离混合身份,逐步合并子身份。在SYSU-MM01和RegDB上进行的大量实验表明,MACHANet优于现有的最先进的方法,包括一些监督方法。源代码将被公开发布。
{"title":"MACHANet: Memory-Augmented Cross Modal Hybrid Alignment Network for Unsupervised Visible-Infrared Person Re-Identification","authors":"Tingyu Yang;Weiqing Yan;Guanghui Yue;Wujie Zhou;Chang Tang","doi":"10.1109/TIFS.2026.3660597","DOIUrl":"10.1109/TIFS.2026.3660597","url":null,"abstract":"Unsupervised Visible-Infrared Person Re-Identification (USL-VI-ReID) aims to match person images across visible and infrared modalities without identity annotations, addressing challenges such as cross-modal discrepancy and unlabeled data. Existing methods, however, often suffer from excessive sub-clusters, identity mixing, and unreliable cross-modal associations, which degrade matching performance. To overcome these issues, we propose MACHANet, a novel framework. The Memory Learning via Progressive Hybrid Clustering (MLPHC) module reduces excessive sub-clustering and enhances memory representations by first applying Harmonic Discrepancy Clustering with harmonic constraints and a core-edge mechanism, then gradually transitioning to DBSCAN as features become more discriminative. The Global Cross-Modal Positive Sample Alignment (GCPSA) module constructs a global set of cross-modal positive pairs, selecting the most similar visible–infrared samples of the same identity and computing alignment losses across intra- and inter-modalities. By maximizing mutual information and minimizing cross-modal distribution gaps, GCPSA effectively reduces modality discrepancies and suppresses noisy identity associations. Finally, the Multi-Modal Support Sample Expansion Alignment (MSSEA) module dynamically expands multi-modal support samples and incorporates residual-based representations to refine clusters, separate mixed identities, and progressively merge sub-identities. Extensive experiments on SYSU-MM01 and RegDB show that MACHANet outperforms existing state-of-the-art methods, including some supervised approaches. The source code will be publicly released.","PeriodicalId":13492,"journal":{"name":"IEEE Transactions on Information Forensics and Security","volume":"21 ","pages":"1914-1925"},"PeriodicalIF":8.0,"publicationDate":"2026-02-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"146110443","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":1,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
DriftTrace: Combating Concept Drift in Security Applications Through Detection and Explanation DriftTrace:通过检测和解释来对抗安全应用中的概念漂移
IF 8 1区 计算机科学 Q1 COMPUTER SCIENCE, THEORY & METHODS Pub Date : 2026-01-29 DOI: 10.1109/TIFS.2026.3659398
Yuedong Pan;Lixin Zhao;Tao Leng;Zhexi Luo;Lijun Cai;Aimin Yu;Dan Meng
Concept drift refers to the deviation in data distribution over time, driven by dynamic changes in attackers or environments. This phenomenon poses a significant challenge for deploying machine learning models in cybersecurity. Existing approaches rely heavily on frequent retraining or distribution-level analyses, which are costly, labor-intensive, and often lack interpretability. To address these limitations, we propose DriftTrace, a novel system designed to detect, explain, and adapt to concept drift in security applications. Through comprehensive analysis, we uncover associations, consistencies, and diversities in security application features. Inspired by these findings, we detect drift at the sample level using a contrastive learning-based autoencoder, enabling fine-grained detection without requiring extensive labeling. For explanation, we employ a greedy feature selection strategy that links detection decisions to semantically relevant input features. To address data imbalance during adaptation, DriftTrace leverages sample interpolation techniques. We evaluate DriftTrace on Android malware datasets (Drebin and MalDroid2020) and a network intrusion dataset (IDS2018). Our system achieves an average detection $F_{1}$ score of more than 0.94, which is superior to the advanced baseline TRANSCENDENT, and improves the explanation fidelity by an average of 76% compared with CADE. These results highlight the practicality of DriftTrace for security scenarios.
概念漂移是指由于攻击者或环境的动态变化而导致的数据分布随时间的变化。这种现象对在网络安全中部署机器学习模型提出了重大挑战。现有的方法严重依赖于频繁的再训练或分布级分析,这是昂贵的,劳动密集型的,并且经常缺乏可解释性。为了解决这些限制,我们提出了DriftTrace,这是一个新的系统,旨在检测、解释和适应安全应用中的概念漂移。通过综合分析,我们揭示了安全应用程序特性之间的关联、一致性和多样性。受这些发现的启发,我们使用基于对比学习的自动编码器在样本水平上检测漂移,从而在不需要大量标记的情况下实现细粒度检测。为了解释,我们采用贪婪特征选择策略,将检测决策与语义相关的输入特征联系起来。为了解决适应过程中的数据不平衡,DriftTrace利用了样本插值技术。我们在Android恶意软件数据集(Drebin和MalDroid2020)和网络入侵数据集(IDS2018)上评估了DriftTrace。我们的系统实现了平均检测$F_{1}$得分超过0.94,优于先进的基线TRANSCENDENT,并且与CADE相比,解释保真度平均提高了76%。这些结果突出了DriftTrace在安全场景中的实用性。
{"title":"DriftTrace: Combating Concept Drift in Security Applications Through Detection and Explanation","authors":"Yuedong Pan;Lixin Zhao;Tao Leng;Zhexi Luo;Lijun Cai;Aimin Yu;Dan Meng","doi":"10.1109/TIFS.2026.3659398","DOIUrl":"10.1109/TIFS.2026.3659398","url":null,"abstract":"Concept drift refers to the deviation in data distribution over time, driven by dynamic changes in attackers or environments. This phenomenon poses a significant challenge for deploying machine learning models in cybersecurity. Existing approaches rely heavily on frequent retraining or distribution-level analyses, which are costly, labor-intensive, and often lack interpretability. To address these limitations, we propose DriftTrace, a novel system designed to detect, explain, and adapt to concept drift in security applications. Through comprehensive analysis, we uncover associations, consistencies, and diversities in security application features. Inspired by these findings, we detect drift at the sample level using a contrastive learning-based autoencoder, enabling fine-grained detection without requiring extensive labeling. For explanation, we employ a greedy feature selection strategy that links detection decisions to semantically relevant input features. To address data imbalance during adaptation, DriftTrace leverages sample interpolation techniques. We evaluate DriftTrace on Android malware datasets (Drebin and MalDroid2020) and a network intrusion dataset (IDS2018). Our system achieves an average detection <inline-formula> <tex-math>$F_{1}$ </tex-math></inline-formula> score of more than 0.94, which is superior to the advanced baseline TRANSCENDENT, and improves the explanation fidelity by an average of 76% compared with CADE. These results highlight the practicality of DriftTrace for security scenarios.","PeriodicalId":13492,"journal":{"name":"IEEE Transactions on Information Forensics and Security","volume":"21 ","pages":"1957-1972"},"PeriodicalIF":8.0,"publicationDate":"2026-01-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"146090043","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":1,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Safeguarding Federated Learning From Data Reconstruction Attacks via Gradient Dropout 通过梯度退出保护联邦学习免受数据重构攻击
IF 8 1区 计算机科学 Q1 COMPUTER SCIENCE, THEORY & METHODS Pub Date : 2026-01-29 DOI: 10.1109/TIFS.2026.3659401
Ekanut Sotthiwat;Chi Zhang;Xiaokui Xiao;Liangli Zhen
Federated Learning (FL) enables collaborative model training across distributed participants without sharing raw data, offering a privacy-preserving paradigm. However, recent studies on gradient inversion attacks have demonstrated the vulnerability of FL to adversaries who can reconstruct sensitive local training data from shared gradients. To mitigate this threat, we propose Gradient Dropout, a novel defense mechanism that disrupts reconstruction attempts while preserving model utility. Specifically, Gradient Dropout perturbs gradients by randomly scaling a subset of components and replacing the remainder with Gaussian noise, thereby creating a transformed gradient space that significantly impedes reconstruction attempts. Moreover, this mechanism is applied across all layers of the model, ensuring that attackers cannot exploit any unperturbed gradients. Theoretical analysis reveals that the perturbed gradients can be kept sufficiently distant from their true values, thereby providing safety guarantees for the proposed algorithm. Furthermore, we demonstrate that this protection mechanism minimally impacts model performance, as gradient dropout and the original training dynamics remain effectively bounded under certain convexity conditions. These findings are substantiated through experimental evaluations, where we show that various attack methods yield low-quality reconstructed images while model performance is largely preserved, with less than 2% accuracy reduction relative to the baseline. As such, Gradient Dropout is presented as an effective solution for safeguarding privacy in FL, providing a balanced trade-off between privacy protection, computational efficiency, and model accuracy.
联邦学习(FL)支持跨分布式参与者的协作模型训练,而无需共享原始数据,从而提供了一种保护隐私的范例。然而,最近关于梯度反转攻击的研究表明,攻击者可以从共享梯度中重建敏感的局部训练数据,FL很容易受到攻击。为了减轻这种威胁,我们提出了梯度Dropout,这是一种新的防御机制,可以在保留模型效用的同时破坏重建尝试。具体来说,Gradient Dropout通过随机缩放组件子集并用高斯噪声替换其余部分来干扰梯度,从而创建一个转换的梯度空间,从而显著阻碍重建尝试。此外,该机制应用于模型的所有层,确保攻击者无法利用任何未受干扰的梯度。理论分析表明,扰动梯度可以与真实值保持足够的距离,从而为所提算法提供了安全保证。此外,我们证明了这种保护机制对模型性能的影响最小,因为梯度dropout和原始训练动态在一定的凸性条件下仍然有效地有界。这些发现通过实验评估得到了证实,在实验评估中,我们发现各种攻击方法产生低质量的重建图像,而模型性能在很大程度上得到了保留,相对于基线精度降低不到2%。因此,Gradient Dropout被认为是FL中保护隐私的有效解决方案,在隐私保护、计算效率和模型准确性之间提供了平衡的权衡。
{"title":"Safeguarding Federated Learning From Data Reconstruction Attacks via Gradient Dropout","authors":"Ekanut Sotthiwat;Chi Zhang;Xiaokui Xiao;Liangli Zhen","doi":"10.1109/TIFS.2026.3659401","DOIUrl":"10.1109/TIFS.2026.3659401","url":null,"abstract":"Federated Learning (FL) enables collaborative model training across distributed participants without sharing raw data, offering a privacy-preserving paradigm. However, recent studies on gradient inversion attacks have demonstrated the vulnerability of FL to adversaries who can reconstruct sensitive local training data from shared gradients. To mitigate this threat, we propose Gradient Dropout, a novel defense mechanism that disrupts reconstruction attempts while preserving model utility. Specifically, Gradient Dropout perturbs gradients by randomly scaling a subset of components and replacing the remainder with Gaussian noise, thereby creating a transformed gradient space that significantly impedes reconstruction attempts. Moreover, this mechanism is applied across all layers of the model, ensuring that attackers cannot exploit any unperturbed gradients. Theoretical analysis reveals that the perturbed gradients can be kept sufficiently distant from their true values, thereby providing safety guarantees for the proposed algorithm. Furthermore, we demonstrate that this protection mechanism minimally impacts model performance, as gradient dropout and the original training dynamics remain effectively bounded under certain convexity conditions. These findings are substantiated through experimental evaluations, where we show that various attack methods yield low-quality reconstructed images while model performance is largely preserved, with less than 2% accuracy reduction relative to the baseline. As such, Gradient Dropout is presented as an effective solution for safeguarding privacy in FL, providing a balanced trade-off between privacy protection, computational efficiency, and model accuracy.","PeriodicalId":13492,"journal":{"name":"IEEE Transactions on Information Forensics and Security","volume":"21 ","pages":"1874-1888"},"PeriodicalIF":8.0,"publicationDate":"2026-01-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"146090042","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":1,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Model-Driven Learning-Based Physical Layer Authentication for Mobile Wi-Fi Devices 基于模型驱动学习的移动Wi-Fi设备物理层认证
IF 6.8 1区 计算机科学 Q1 COMPUTER SCIENCE, THEORY & METHODS Pub Date : 2026-01-29 DOI: 10.1109/tifs.2026.3657184
Yijia Guo, Junqing Zhang, Y.-W. Peter Hong, Stefano Tomasin
{"title":"Model-Driven Learning-Based Physical Layer Authentication for Mobile Wi-Fi Devices","authors":"Yijia Guo, Junqing Zhang, Y.-W. Peter Hong, Stefano Tomasin","doi":"10.1109/tifs.2026.3657184","DOIUrl":"https://doi.org/10.1109/tifs.2026.3657184","url":null,"abstract":"","PeriodicalId":13492,"journal":{"name":"IEEE Transactions on Information Forensics and Security","volume":"8 1","pages":""},"PeriodicalIF":6.8,"publicationDate":"2026-01-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"146089839","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":1,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Novel Quantum-Based Mutual Authentication and Key Agreement Scheme for Smart Grid 一种新的基于量子的智能电网相互认证与密钥协议方案
IF 6.8 1区 计算机科学 Q1 COMPUTER SCIENCE, THEORY & METHODS Pub Date : 2026-01-29 DOI: 10.1109/tifs.2026.3659003
Xiaoping Lou, Zidong Wang
{"title":"A Novel Quantum-Based Mutual Authentication and Key Agreement Scheme for Smart Grid","authors":"Xiaoping Lou, Zidong Wang","doi":"10.1109/tifs.2026.3659003","DOIUrl":"https://doi.org/10.1109/tifs.2026.3659003","url":null,"abstract":"","PeriodicalId":13492,"journal":{"name":"IEEE Transactions on Information Forensics and Security","volume":"79 1","pages":""},"PeriodicalIF":6.8,"publicationDate":"2026-01-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"146090041","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":1,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
ISFL-AE: Insider-Specific Feature Learning Autoencoder for Lightweight Insider Threat Detection ISFL-AE:用于轻量级内部威胁检测的内部特定特征学习自动编码器
IF 6.8 1区 计算机科学 Q1 COMPUTER SCIENCE, THEORY & METHODS Pub Date : 2026-01-28 DOI: 10.1109/tifs.2026.3659000
Yujun Kim, Young-Gab Kim
{"title":"ISFL-AE: Insider-Specific Feature Learning Autoencoder for Lightweight Insider Threat Detection","authors":"Yujun Kim, Young-Gab Kim","doi":"10.1109/tifs.2026.3659000","DOIUrl":"https://doi.org/10.1109/tifs.2026.3659000","url":null,"abstract":"","PeriodicalId":13492,"journal":{"name":"IEEE Transactions on Information Forensics and Security","volume":"5 1","pages":""},"PeriodicalIF":6.8,"publicationDate":"2026-01-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"146070464","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":1,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Consensus Labelling: Prompt-Guided Clustering Refinement for Weakly Supervised Text-based Person Re-Identification 共识标签:基于弱监督文本的人物再识别的提示引导聚类改进
IF 6.8 1区 计算机科学 Q1 COMPUTER SCIENCE, THEORY & METHODS Pub Date : 2026-01-28 DOI: 10.1109/tifs.2026.3658987
Chengji Wang, Weizhi Nie, Hongbo Zhang, Hao Sun, Mang Ye
{"title":"Consensus Labelling: Prompt-Guided Clustering Refinement for Weakly Supervised Text-based Person Re-Identification","authors":"Chengji Wang, Weizhi Nie, Hongbo Zhang, Hao Sun, Mang Ye","doi":"10.1109/tifs.2026.3658987","DOIUrl":"https://doi.org/10.1109/tifs.2026.3658987","url":null,"abstract":"","PeriodicalId":13492,"journal":{"name":"IEEE Transactions on Information Forensics and Security","volume":"44 1","pages":""},"PeriodicalIF":6.8,"publicationDate":"2026-01-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"146070474","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":1,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Sparse VMamba: Robust Spatio-Temporal Information Modeling for Event Camera Person Re-Identification 稀疏vamba:事件相机人物再识别的鲁棒时空信息建模
IF 8 1区 计算机科学 Q1 COMPUTER SCIENCE, THEORY & METHODS Pub Date : 2026-01-28 DOI: 10.1109/TIFS.2026.3658994
Wenjiao Dong;Xi Yang;Nannan Wang
Event camera-based person re-identification (Re-ID) effectively addresses the challenges faced by traditional Re-ID systems, such as privacy leakage, low-light imaging degradation, and motion blur. However, traditional Convolutional Neural Networks (CNNs) struggle to model long-range spatio-temporal dependencies, while the Transformer architecture encounters fundamental conflicts with second-order computational complexity and the high temporal resolution of event streams. Additionally, sparse data leads to wasted computational resources and diluted effective data. In contrast, the Mamba architecture, with its long-term modeling capability and linear complexity, is better suited for event stream data. Therefore, we innovatively explore the potential of VMamba in event camera-based person Re-ID; however, directly using VMamba does not fully leverage the temporal asynchronicity and spatial sparsity inherent in event data. To address this, we design a novel Sparse VMamba framework to construct a more robust spatio-temporal information extraction mechanism. First, we develop a Spatio-Temporal Information Modeling (STIM) module that simultaneously employs CNNs and Gated Recurrent Units (GRUs) for modeling spatial and temporal information. Then, we enhance the robustness of sparse data feature extraction using two strategies: on one hand, we utilize Anti-Noise Contour Enhancement (ANCE) module to improve motion contour features and mitigate sensor pulse noise; on the other hand, we implement Direction-Aware Sparse Perception (DASP) module to encourage the model to extract robust person descriptors. Results on the Event-ReID-v1 and Event-ReID-v2 datasets validate the effectiveness of our approach.
基于事件摄像机的人物再识别(Re-ID)有效地解决了传统Re-ID系统所面临的挑战,如隐私泄露、弱光成像退化和运动模糊。然而,传统的卷积神经网络(cnn)难以模拟远程时空依赖关系,而Transformer架构遇到了与二阶计算复杂性和事件流的高时间分辨率的根本冲突。此外,稀疏数据会导致计算资源的浪费和有效数据的稀释。相反,具有长期建模能力和线性复杂性的Mamba体系结构更适合于事件流数据。因此,我们创新性地探索vamba在基于事件摄像头的人员Re-ID中的潜力;然而,直接使用vamba并不能充分利用事件数据中固有的时间异步性和空间稀疏性。为了解决这个问题,我们设计了一种新的稀疏vammba框架来构建一个更健壮的时空信息提取机制。首先,我们开发了一个时空信息建模(STIM)模块,该模块同时使用cnn和门控循环单元(gru)来建模时空信息。然后,我们采用两种策略来增强稀疏数据特征提取的鲁棒性:一方面,我们利用抗噪声轮廓增强(ANCE)模块来改善运动轮廓特征和减轻传感器脉冲噪声;另一方面,我们实现了方向感知稀疏感知(DASP)模块,以促进模型提取鲁棒的人物描述符。Event-ReID-v1和Event-ReID-v2数据集上的结果验证了我们方法的有效性。
{"title":"Sparse VMamba: Robust Spatio-Temporal Information Modeling for Event Camera Person Re-Identification","authors":"Wenjiao Dong;Xi Yang;Nannan Wang","doi":"10.1109/TIFS.2026.3658994","DOIUrl":"10.1109/TIFS.2026.3658994","url":null,"abstract":"Event camera-based person re-identification (Re-ID) effectively addresses the challenges faced by traditional Re-ID systems, such as privacy leakage, low-light imaging degradation, and motion blur. However, traditional Convolutional Neural Networks (CNNs) struggle to model long-range spatio-temporal dependencies, while the Transformer architecture encounters fundamental conflicts with second-order computational complexity and the high temporal resolution of event streams. Additionally, sparse data leads to wasted computational resources and diluted effective data. In contrast, the Mamba architecture, with its long-term modeling capability and linear complexity, is better suited for event stream data. Therefore, we innovatively explore the potential of VMamba in event camera-based person Re-ID; however, directly using VMamba does not fully leverage the temporal asynchronicity and spatial sparsity inherent in event data. To address this, we design a novel Sparse VMamba framework to construct a more robust spatio-temporal information extraction mechanism. First, we develop a Spatio-Temporal Information Modeling (STIM) module that simultaneously employs CNNs and Gated Recurrent Units (GRUs) for modeling spatial and temporal information. Then, we enhance the robustness of sparse data feature extraction using two strategies: on one hand, we utilize Anti-Noise Contour Enhancement (ANCE) module to improve motion contour features and mitigate sensor pulse noise; on the other hand, we implement Direction-Aware Sparse Perception (DASP) module to encourage the model to extract robust person descriptors. Results on the Event-ReID-v1 and Event-ReID-v2 datasets validate the effectiveness of our approach.","PeriodicalId":13492,"journal":{"name":"IEEE Transactions on Information Forensics and Security","volume":"21 ","pages":"1889-1901"},"PeriodicalIF":8.0,"publicationDate":"2026-01-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"146070470","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":1,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
From Gradient Analysis to Norm Control: Rethinking Triplet Loss for Gait Recognition 从梯度分析到范数控制:重新思考步态识别中的三联体损失
IF 6.8 1区 计算机科学 Q1 COMPUTER SCIENCE, THEORY & METHODS Pub Date : 2026-01-28 DOI: 10.1109/tifs.2026.3658989
Guozhen Peng, Yunhong Wang, Zhuguanyu Wu, Shaoxiong Zhang, Yuwei Zhao, Ruiyi Zhan, Annan Li
{"title":"From Gradient Analysis to Norm Control: Rethinking Triplet Loss for Gait Recognition","authors":"Guozhen Peng, Yunhong Wang, Zhuguanyu Wu, Shaoxiong Zhang, Yuwei Zhao, Ruiyi Zhan, Annan Li","doi":"10.1109/tifs.2026.3658989","DOIUrl":"https://doi.org/10.1109/tifs.2026.3658989","url":null,"abstract":"","PeriodicalId":13492,"journal":{"name":"IEEE Transactions on Information Forensics and Security","volume":"272 1","pages":""},"PeriodicalIF":6.8,"publicationDate":"2026-01-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"146070467","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":1,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
IEEE Transactions on Information Forensics and Security
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1