{"title":"ModelShield: Adaptive and Robust Watermark against Model Extraction Attack","authors":"Kaiyi Pang, Tao Qi, Chuhan Wu, Minhao Bai, Minghu Jiang, Yongfeng Huang","doi":"10.1109/tifs.2025.3530691","DOIUrl":"https://doi.org/10.1109/tifs.2025.3530691","url":null,"abstract":"","PeriodicalId":13492,"journal":{"name":"IEEE Transactions on Information Forensics and Security","volume":"22 1","pages":""},"PeriodicalIF":6.8,"publicationDate":"2025-01-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142987549","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":1,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2025-01-16DOI: 10.1109/tifs.2025.3530694
Qiaofeng Zhang, Meng Li, Yong Chen, Meng Zhang
{"title":"Non-Fragile Robust Security Control based on Dynamic Threshold Cryptographic Detector for Remote Motor under Stealthy FDI Attacks","authors":"Qiaofeng Zhang, Meng Li, Yong Chen, Meng Zhang","doi":"10.1109/tifs.2025.3530694","DOIUrl":"https://doi.org/10.1109/tifs.2025.3530694","url":null,"abstract":"","PeriodicalId":13492,"journal":{"name":"IEEE Transactions on Information Forensics and Security","volume":"55 1","pages":""},"PeriodicalIF":6.8,"publicationDate":"2025-01-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142987319","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":1,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Bottom Aggregating, Top Separating: An Aggregator and Separator Network for Encrypted Traffic Understanding","authors":"Wei Peng, Lei Cui, Wei Cai, Wei Wang, Xiaoyu Cui, Zhiyu Hao, Xiaochun Yun","doi":"10.1109/tifs.2025.3529316","DOIUrl":"https://doi.org/10.1109/tifs.2025.3529316","url":null,"abstract":"","PeriodicalId":13492,"journal":{"name":"IEEE Transactions on Information Forensics and Security","volume":"29 1","pages":""},"PeriodicalIF":6.8,"publicationDate":"2025-01-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142974875","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":1,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2025-01-13DOI: 10.1109/tifs.2025.3529311
Yanchun Li, Long Huang, Shujuan Tian, Haolin Liu, Zhetao Li
{"title":"Robust Generative Adaptation Network for Open-Set Adversarial Defense","authors":"Yanchun Li, Long Huang, Shujuan Tian, Haolin Liu, Zhetao Li","doi":"10.1109/tifs.2025.3529311","DOIUrl":"https://doi.org/10.1109/tifs.2025.3529311","url":null,"abstract":"","PeriodicalId":13492,"journal":{"name":"IEEE Transactions on Information Forensics and Security","volume":"22 1","pages":""},"PeriodicalIF":6.8,"publicationDate":"2025-01-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142975186","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":1,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2025-01-13DOI: 10.1109/tifs.2025.3527814
Meng Zhang, Li Lu, Yuhan Wu, Zheng Yan, Jiaqi Sun, Feng Lin, Kui Ren
{"title":"DroneAudioID: A Lightweight Acoustic Fingerprint-Based Drone Authentication System for Secure Drone Delivery","authors":"Meng Zhang, Li Lu, Yuhan Wu, Zheng Yan, Jiaqi Sun, Feng Lin, Kui Ren","doi":"10.1109/tifs.2025.3527814","DOIUrl":"https://doi.org/10.1109/tifs.2025.3527814","url":null,"abstract":"","PeriodicalId":13492,"journal":{"name":"IEEE Transactions on Information Forensics and Security","volume":"89 1","pages":""},"PeriodicalIF":6.8,"publicationDate":"2025-01-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142975053","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":1,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2025-01-13DOI: 10.1109/tifs.2025.3529321
Zhong Li, Xueting Yang, Changjun Jiang
{"title":"Multi-view Graph based Hierarchical Representation Learning for Money Laundering Group Detection","authors":"Zhong Li, Xueting Yang, Changjun Jiang","doi":"10.1109/tifs.2025.3529321","DOIUrl":"https://doi.org/10.1109/tifs.2025.3529321","url":null,"abstract":"","PeriodicalId":13492,"journal":{"name":"IEEE Transactions on Information Forensics and Security","volume":"17 1","pages":""},"PeriodicalIF":6.8,"publicationDate":"2025-01-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142975187","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":1,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}