首页 > 最新文献

IEEE Transactions on Information Forensics and Security最新文献

英文 中文
MithrilRB: Resource-Efficient Redactable Blockchain With Single-Use Authorization MithrilRB:具有单次使用授权的资源高效可读区块链
IF 8 1区 计算机科学 Q1 COMPUTER SCIENCE, THEORY & METHODS Pub Date : 2026-03-05 DOI: 10.1109/TIFS.2026.3671133
Tianming Hou;Hui Ma;Jinchao Zhang;Yang Li;Bo Li;Weiping Wang
Redactable blockchains preserve the integrity of hash links while enabling authorized redactions to comply with regulatory requirements. However, existing permissioned solutions suffer from three severe issues. First, fine-grained privilege control incurs significant storage overhead, especially in the case of single-use authorization. Second, the reliance on bilinear pairings in chameleon hash leads to significant performance degradation when handling large-scale redaction requests. Finally, multiple incorporated components often unconsciously introduce centralized entities, undermining the decentralized nature. In this paper, we propose MithrilRB, a resource-efficient and decentralized redactable blockchain with single-use authorization. Specifically, we introduce a privilege control mechanism with our proposed multi-authority attribute-based signature (MA-ABS) and the threshold BLS signature, achieving fine-grained single-use authorization and direct user revocation without extra ciphertext storage. We also design a pairing-free non-interactive threshold chameleon hash (PNITCH), which enhances efficiency and is better suited for large-scale redaction requests. Moreover, MithrilRB eliminates centralized trust points that hold secret information, ensuring fully decentralization-compatible functional integration in redactable blockchains. Finally, we implement MithrilRB, and the experimental results demonstrate that MithrilRB significantly outperforms existing solutions in both computational efficiency and storage requirements.
可读区块链保持哈希链接的完整性,同时使授权编校符合监管要求。然而,现有的许可解决方案存在三个严重的问题。首先,细粒度的特权控制会导致大量的存储开销,特别是在单次使用授权的情况下。其次,在处理大规模编校请求时,对变色龙哈希中的双线性配对的依赖会导致显著的性能下降。最后,多个合并组件往往不自觉地引入集中的实体,破坏了分散的性质。在本文中,我们提出了MithrilRB,这是一种资源高效且分散的可读区块链,具有一次性使用授权。具体来说,我们通过我们提出的基于多权威属性的签名(MA-ABS)和阈值BLS签名引入了特权控制机制,实现了细粒度的一次性授权和直接用户撤销,而无需额外的密文存储。我们还设计了一个无配对非交互阈值变色龙散列(PNITCH),提高了效率,更适合大规模编校请求。此外,MithrilRB消除了持有秘密信息的中心化信任点,确保了可读区块链中完全去中心化兼容的功能集成。最后,我们实现了MithrilRB,实验结果表明,MithrilRB在计算效率和存储需求方面都明显优于现有的解决方案。
{"title":"MithrilRB: Resource-Efficient Redactable Blockchain With Single-Use Authorization","authors":"Tianming Hou;Hui Ma;Jinchao Zhang;Yang Li;Bo Li;Weiping Wang","doi":"10.1109/TIFS.2026.3671133","DOIUrl":"10.1109/TIFS.2026.3671133","url":null,"abstract":"Redactable blockchains preserve the integrity of hash links while enabling authorized redactions to comply with regulatory requirements. However, existing permissioned solutions suffer from three severe issues. First, fine-grained privilege control incurs significant storage overhead, especially in the case of single-use authorization. Second, the reliance on bilinear pairings in chameleon hash leads to significant performance degradation when handling large-scale redaction requests. Finally, multiple incorporated components often unconsciously introduce centralized entities, undermining the decentralized nature. In this paper, we propose MithrilRB, a resource-efficient and decentralized redactable blockchain with single-use authorization. Specifically, we introduce a privilege control mechanism with our proposed multi-authority attribute-based signature (MA-ABS) and the threshold BLS signature, achieving fine-grained single-use authorization and direct user revocation without extra ciphertext storage. We also design a pairing-free non-interactive threshold chameleon hash (PNITCH), which enhances efficiency and is better suited for large-scale redaction requests. Moreover, MithrilRB eliminates centralized trust points that hold secret information, ensuring fully decentralization-compatible functional integration in redactable blockchains. Finally, we implement MithrilRB, and the experimental results demonstrate that MithrilRB significantly outperforms existing solutions in both computational efficiency and storage requirements.","PeriodicalId":13492,"journal":{"name":"IEEE Transactions on Information Forensics and Security","volume":"21 ","pages":"2698-2712"},"PeriodicalIF":8.0,"publicationDate":"2026-03-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"147371510","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":1,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
QuEST: Quantization-conditioned Efficient Stealthy Trojan 任务:量化条件下的高效隐身木马
IF 6.8 1区 计算机科学 Q1 COMPUTER SCIENCE, THEORY & METHODS Pub Date : 2026-03-05 DOI: 10.1109/tifs.2026.3671079
Liming Lu, Shuchao Pang, Jiakai Wang, Xiang Gu, Yunhuai Liu, Xianglong Liu, Yongbin Zhou
{"title":"QuEST: Quantization-conditioned Efficient Stealthy Trojan","authors":"Liming Lu, Shuchao Pang, Jiakai Wang, Xiang Gu, Yunhuai Liu, Xianglong Liu, Yongbin Zhou","doi":"10.1109/tifs.2026.3671079","DOIUrl":"https://doi.org/10.1109/tifs.2026.3671079","url":null,"abstract":"","PeriodicalId":13492,"journal":{"name":"IEEE Transactions on Information Forensics and Security","volume":"81 1","pages":""},"PeriodicalIF":6.8,"publicationDate":"2026-03-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"147371505","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":1,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
X 2 O: Cross Parallel Optimization of the CROSS Post-Quantum Scheme on GPU x2o: GPU上Cross后量子方案的交叉并行优化
IF 6.8 1区 计算机科学 Q1 COMPUTER SCIENCE, THEORY & METHODS Pub Date : 2026-03-05 DOI: 10.1109/tifs.2026.3671118
Yijing Ning, Jiankuo Dong, Yajie Zhao, Jingqiang Lin, Tian Zhou, Jiachen Wang, Fu Xiao
{"title":"X 2 O: Cross Parallel Optimization of the CROSS Post-Quantum Scheme on GPU","authors":"Yijing Ning, Jiankuo Dong, Yajie Zhao, Jingqiang Lin, Tian Zhou, Jiachen Wang, Fu Xiao","doi":"10.1109/tifs.2026.3671118","DOIUrl":"https://doi.org/10.1109/tifs.2026.3671118","url":null,"abstract":"","PeriodicalId":13492,"journal":{"name":"IEEE Transactions on Information Forensics and Security","volume":"56 1","pages":""},"PeriodicalIF":6.8,"publicationDate":"2026-03-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"147371512","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":1,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Differentially Private Quadrature Amplitude Modulation Mechanism for Federated Analytics 联邦分析的差分私有正交调幅机制
IF 6.8 1区 计算机科学 Q1 COMPUTER SCIENCE, THEORY & METHODS Pub Date : 2026-03-05 DOI: 10.1109/tifs.2026.3671100
Yujie Gu, Richeng Jin, Chongwen Huang, Xiaofan He, Zhaoyang Zhang, Huaiyu Dai
{"title":"A Differentially Private Quadrature Amplitude Modulation Mechanism for Federated Analytics","authors":"Yujie Gu, Richeng Jin, Chongwen Huang, Xiaofan He, Zhaoyang Zhang, Huaiyu Dai","doi":"10.1109/tifs.2026.3671100","DOIUrl":"https://doi.org/10.1109/tifs.2026.3671100","url":null,"abstract":"","PeriodicalId":13492,"journal":{"name":"IEEE Transactions on Information Forensics and Security","volume":"261 1","pages":""},"PeriodicalIF":6.8,"publicationDate":"2026-03-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"147371515","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":1,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Multi-Scale Adaptive Clustering and Local Consistency Learning for Unsupervised Clothing-Changing Person Re-Identification 无监督换衣人再识别的多尺度自适应聚类和局部一致性学习
IF 6.8 1区 计算机科学 Q1 COMPUTER SCIENCE, THEORY & METHODS Pub Date : 2026-03-05 DOI: 10.1109/tifs.2026.3671089
Yongkang Ding, Zi Ye, Ivonne Xu, Shuangquan Lyu, Liyan Zhang
{"title":"Multi-Scale Adaptive Clustering and Local Consistency Learning for Unsupervised Clothing-Changing Person Re-Identification","authors":"Yongkang Ding, Zi Ye, Ivonne Xu, Shuangquan Lyu, Liyan Zhang","doi":"10.1109/tifs.2026.3671089","DOIUrl":"https://doi.org/10.1109/tifs.2026.3671089","url":null,"abstract":"","PeriodicalId":13492,"journal":{"name":"IEEE Transactions on Information Forensics and Security","volume":"6 1","pages":""},"PeriodicalIF":6.8,"publicationDate":"2026-03-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"147371506","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":1,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
TFSCL: A Novel Time-Frequency Similarity Contrastive Learning Method With Hybrid Augmentation for Robust and Accurate Specific Emitter Identification 一种基于混合增强的时频相似度对比学习方法,用于鲁棒准确识别特定辐射源
IF 8 1区 计算机科学 Q1 COMPUTER SCIENCE, THEORY & METHODS Pub Date : 2026-03-05 DOI: 10.1109/TIFS.2026.3671097
Kaixuan Huang;Yongtao Ma;Jialu Zhu;Yuxiang Han
As the Internet of Things (IoT) and Sixth Generation (6G) technologies advance rapidly, the cryptographic identification of electronic devices has become a critical issue in information security. Radio frequency fingerprint (RFF)-based specific emitter identification (SEI) has emerged as a prominent physical-layer authentication technique. To enhance the stability and accuracy of multi-target recognition in complex electromagnetic environments, a novel technique for specific emitter identification based on time-frequency similarity contrastive learning (TFSCL) is proposed. In this study, we present a novel pre-training method utilizing a deep complex-valued pyramid network (DCPN) to enhance the extraction and reconstruction of time series and frequency domain sequences. The DCPN enables contrastive learning of signal features in both the temporal and frequency domains, significantly reducing computational complexity and improving pretraining performance. Additionally, we first introduce the Time-Frequency Synchronization Data Added (TFS-DA), a Time-Frequency Hybrid Data Added Technique that employs Gray code to generate random sequences, effectively improving feature representation in both domains. Empirical results demonstrate that the proposed method achieves an accuracy rate of 97.12% on an automatic-dependent surveillance-broadcast (ADS-B) dataset that contains 10 categories with only data labeled 10%. On a LoRa dataset containing 30 categories with only data labeled 10%, the accuracy rate reaches 77.06%.
随着物联网(IoT)和第六代(6G)技术的快速发展,电子设备的加密识别已成为信息安全中的关键问题。基于射频指纹(RFF)的特定发射器识别(SEI)已成为一种重要的物理层身份验证技术。为了提高复杂电磁环境下多目标识别的稳定性和准确性,提出了一种基于时频相似度对比学习(TFSCL)的特定辐射源识别方法。在这项研究中,我们提出了一种新的预训练方法,利用深度复值金字塔网络(DCPN)来增强时间序列和频域序列的提取和重建。DCPN能够在时域和频域对信号特征进行对比学习,显著降低了计算复杂度,提高了预训练性能。此外,我们首先介绍了时频同步数据添加(TFS-DA),这是一种时频混合数据添加技术,它使用灰色编码生成随机序列,有效地改善了两个领域的特征表示。实验结果表明,该方法在ADS-B数据集上的准确率达到97.12%,ADS-B数据集包含10个类别,仅标记10%的数据。在包含30个类别的LoRa数据集上,仅标记10%的数据,准确率达到77.06%。
{"title":"TFSCL: A Novel Time-Frequency Similarity Contrastive Learning Method With Hybrid Augmentation for Robust and Accurate Specific Emitter Identification","authors":"Kaixuan Huang;Yongtao Ma;Jialu Zhu;Yuxiang Han","doi":"10.1109/TIFS.2026.3671097","DOIUrl":"10.1109/TIFS.2026.3671097","url":null,"abstract":"As the Internet of Things (IoT) and Sixth Generation (6G) technologies advance rapidly, the cryptographic identification of electronic devices has become a critical issue in information security. Radio frequency fingerprint (RFF)-based specific emitter identification (SEI) has emerged as a prominent physical-layer authentication technique. To enhance the stability and accuracy of multi-target recognition in complex electromagnetic environments, a novel technique for specific emitter identification based on time-frequency similarity contrastive learning (TFSCL) is proposed. In this study, we present a novel pre-training method utilizing a deep complex-valued pyramid network (DCPN) to enhance the extraction and reconstruction of time series and frequency domain sequences. The DCPN enables contrastive learning of signal features in both the temporal and frequency domains, significantly reducing computational complexity and improving pretraining performance. Additionally, we first introduce the Time-Frequency Synchronization Data Added (TFS-DA), a Time-Frequency Hybrid Data Added Technique that employs Gray code to generate random sequences, effectively improving feature representation in both domains. Empirical results demonstrate that the proposed method achieves an accuracy rate of 97.12% on an automatic-dependent surveillance-broadcast (ADS-B) dataset that contains 10 categories with only data labeled 10%. On a LoRa dataset containing 30 categories with only data labeled 10%, the accuracy rate reaches 77.06%.","PeriodicalId":13492,"journal":{"name":"IEEE Transactions on Information Forensics and Security","volume":"21 ","pages":"2668-2681"},"PeriodicalIF":8.0,"publicationDate":"2026-03-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"147371545","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":1,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Uncertainty-Aware Jamming Mitigation with Active RIS: A Robust Stackelberg Game Approach 基于有源RIS的不确定性感知干扰抑制:一种鲁棒Stackelberg博弈方法
IF 6.8 1区 计算机科学 Q1 COMPUTER SCIENCE, THEORY & METHODS Pub Date : 2026-03-05 DOI: 10.1109/tifs.2026.3671078
Xiao Tang, Zhen Ma, Limeng Dong, Yichen Wang, Qinghe Du, Dusit Niyato, Zhu Han
{"title":"Uncertainty-Aware Jamming Mitigation with Active RIS: A Robust Stackelberg Game Approach","authors":"Xiao Tang, Zhen Ma, Limeng Dong, Yichen Wang, Qinghe Du, Dusit Niyato, Zhu Han","doi":"10.1109/tifs.2026.3671078","DOIUrl":"https://doi.org/10.1109/tifs.2026.3671078","url":null,"abstract":"","PeriodicalId":13492,"journal":{"name":"IEEE Transactions on Information Forensics and Security","volume":"236 1","pages":""},"PeriodicalIF":6.8,"publicationDate":"2026-03-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"147371514","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":1,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Efficient Byzantine-Robust Privacy-Preserving Federated Learning via Dimension Compression 基于维数压缩的高效拜占庭鲁棒隐私保护联邦学习
IF 8 1区 计算机科学 Q1 COMPUTER SCIENCE, THEORY & METHODS Pub Date : 2026-03-05 DOI: 10.1109/TIFS.2026.3671104
Xian Qin;Xue Yang;Xiaohu Tang
Federated Learning (FL) allows collaborative model training across distributed clients without sharing raw data, thus preserving privacy. However, the system remains vulnerable to privacy leakage from gradient updates and Byzantine attacks from malicious clients. Existing solutions face a critical trade-off among privacy preservation, Byzantine robustness, and computational efficiency. We propose a novel scheme that effectively balances these competing objectives by integrating homomorphic encryption with dimension compression based on the Johnson-Lindenstrauss transformation. Our approach employs a dual-server architecture that enables secure Byzantine defense in the ciphertext domain while dramatically reducing computational overhead through gradient compression. The dimension compression technique preserves the geometric relationships necessary for Byzantine defence while reducing computation complexity from $O(dn)$ to $O(kn)$ cryptographic operations, where $k ll d$ . Extensive experiments across diverse datasets demonstrate that our approach maintains model accuracy comparable to non-private FL while effectively defending against Byzantine clients comprising up to 40% of the network. Our approach also demonstrates substantial improvements in computational and communication efficiency. Experimental evaluation shows that the dimension compression technique achieves $25 times sim 35 times $ reduction in computational overhead and $17 times $ reduction in communication overhead compared to our non-compression version. When compared to state-of-the-art methods like ShieldFL, our approach demonstrates order-of-magnitude improvements in both computational and communication efficiency while maintaining equivalent privacy guarantees and achieving superior Byzantine robustness comparable to FLTrust. These substantial efficiency enhancements make secure FL practical for deployment in large-scale neural networks with millions of parameters.
联邦学习(FL)允许在不共享原始数据的情况下跨分布式客户端进行协作模型训练,从而保护隐私。然而,系统仍然容易受到梯度更新的隐私泄露和恶意客户端的拜占庭攻击。现有的解决方案面临着隐私保护、拜占庭鲁棒性和计算效率之间的关键权衡。我们提出了一种新的方案,通过基于Johnson-Lindenstrauss变换将同态加密与维数压缩相结合,有效地平衡了这些相互竞争的目标。我们的方法采用双服务器架构,在密文域中实现安全的拜占庭防御,同时通过梯度压缩显着减少计算开销。维数压缩技术保留了拜占庭防御所需的几何关系,同时将计算复杂度从$O(dn)$降低到$O(kn)$,其中$k ll d$。在不同数据集上进行的广泛实验表明,我们的方法保持了与非私有FL相当的模型准确性,同时有效地防御了占网络40%的拜占庭客户端。我们的方法也证明了计算和通信效率的实质性改进。实验评估表明,与我们的非压缩版本相比,维度压缩技术的计算开销减少了25美元,通信开销减少了35美元,通信开销减少了17美元。与ShieldFL等最先进的方法相比,我们的方法在计算和通信效率方面都有了数量级的提高,同时保持了同等的隐私保证,并实现了与FLTrust相当的拜占庭鲁棒性。这些实质性的效率增强使得安全FL在具有数百万个参数的大规模神经网络中部署是可行的。
{"title":"Efficient Byzantine-Robust Privacy-Preserving Federated Learning via Dimension Compression","authors":"Xian Qin;Xue Yang;Xiaohu Tang","doi":"10.1109/TIFS.2026.3671104","DOIUrl":"https://doi.org/10.1109/TIFS.2026.3671104","url":null,"abstract":"Federated Learning (FL) allows collaborative model training across distributed clients without sharing raw data, thus preserving privacy. However, the system remains vulnerable to privacy leakage from gradient updates and Byzantine attacks from malicious clients. Existing solutions face a critical trade-off among privacy preservation, Byzantine robustness, and computational efficiency. We propose a novel scheme that effectively balances these competing objectives by integrating homomorphic encryption with dimension compression based on the Johnson-Lindenstrauss transformation. Our approach employs a dual-server architecture that enables secure Byzantine defense in the ciphertext domain while dramatically reducing computational overhead through gradient compression. The dimension compression technique preserves the geometric relationships necessary for Byzantine defence while reducing computation complexity from <inline-formula> <tex-math>$O(dn)$ </tex-math></inline-formula> to <inline-formula> <tex-math>$O(kn)$ </tex-math></inline-formula> cryptographic operations, where <inline-formula> <tex-math>$k ll d$ </tex-math></inline-formula>. Extensive experiments across diverse datasets demonstrate that our approach maintains model accuracy comparable to non-private FL while effectively defending against Byzantine clients comprising up to 40% of the network. Our approach also demonstrates substantial improvements in computational and communication efficiency. Experimental evaluation shows that the dimension compression technique achieves <inline-formula> <tex-math>$25 times sim 35 times $ </tex-math></inline-formula> reduction in computational overhead and <inline-formula> <tex-math>$17 times $ </tex-math></inline-formula> reduction in communication overhead compared to our non-compression version. When compared to state-of-the-art methods like ShieldFL, our approach demonstrates order-of-magnitude improvements in both computational and communication efficiency while maintaining equivalent privacy guarantees and achieving superior Byzantine robustness comparable to FLTrust. These substantial efficiency enhancements make secure FL practical for deployment in large-scale neural networks with millions of parameters.","PeriodicalId":13492,"journal":{"name":"IEEE Transactions on Information Forensics and Security","volume":"21 ","pages":"2596-2609"},"PeriodicalIF":8.0,"publicationDate":"2026-03-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"147440573","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":1,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Fine-Tuning Data Recovery Attack on Generative Language Models via Backdooring 基于后门的生成语言模型微调数据恢复攻击
IF 6.8 1区 计算机科学 Q1 COMPUTER SCIENCE, THEORY & METHODS Pub Date : 2026-03-05 DOI: 10.1109/tifs.2026.3671126
Zhenya Ma, Yongheng Deng, Ziqing Qiao, Quan Zhang, Chijin Zhou, Fan Wu, Yaoxue Zhang, Ju Ren
{"title":"A Fine-Tuning Data Recovery Attack on Generative Language Models via Backdooring","authors":"Zhenya Ma, Yongheng Deng, Ziqing Qiao, Quan Zhang, Chijin Zhou, Fan Wu, Yaoxue Zhang, Ju Ren","doi":"10.1109/tifs.2026.3671126","DOIUrl":"https://doi.org/10.1109/tifs.2026.3671126","url":null,"abstract":"","PeriodicalId":13492,"journal":{"name":"IEEE Transactions on Information Forensics and Security","volume":"73 1","pages":""},"PeriodicalIF":6.8,"publicationDate":"2026-03-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"147371504","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":1,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
HIBPEKS: Hierarchical Identity-based Puncturable Encryption With Keyword Search Over Outsourced Encrypted Data HIBPEKS:在外包加密数据上使用关键字搜索的基于身份的分层可穿透加密
IF 6.8 1区 计算机科学 Q1 COMPUTER SCIENCE, THEORY & METHODS Pub Date : 2026-03-05 DOI: 10.1109/tifs.2026.3671053
Zelin Zhang, Jiangfeng Li, Guoyue Xiong, Xiaoping Wang, Minyu Teng, Yang Shi
{"title":"HIBPEKS: Hierarchical Identity-based Puncturable Encryption With Keyword Search Over Outsourced Encrypted Data","authors":"Zelin Zhang, Jiangfeng Li, Guoyue Xiong, Xiaoping Wang, Minyu Teng, Yang Shi","doi":"10.1109/tifs.2026.3671053","DOIUrl":"https://doi.org/10.1109/tifs.2026.3671053","url":null,"abstract":"","PeriodicalId":13492,"journal":{"name":"IEEE Transactions on Information Forensics and Security","volume":"30 1","pages":""},"PeriodicalIF":6.8,"publicationDate":"2026-03-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"147371502","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":1,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
IEEE Transactions on Information Forensics and Security
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1