首页 > 最新文献

IEEE Transactions on Information Forensics and Security最新文献

英文 中文
Multi-Leader Byzantine Fault Tolerance in Blockchain: Performance and Security b区块链中的多领导拜占庭容错:性能和安全性
IF 6.8 1区 计算机科学 Q1 COMPUTER SCIENCE, THEORY & METHODS Pub Date : 2026-01-22 DOI: 10.1109/tifs.2026.3657099
Yizhong Liu, Boyu Zhao, Mingzhe Zhai, Xun Lin, Chenhao Ying, Zhenyu Guan, Dawei Li, Qianhong Wu, Jianwei Liu, Willy Susilo, Robert H. Deng
{"title":"Multi-Leader Byzantine Fault Tolerance in Blockchain: Performance and Security","authors":"Yizhong Liu, Boyu Zhao, Mingzhe Zhai, Xun Lin, Chenhao Ying, Zhenyu Guan, Dawei Li, Qianhong Wu, Jianwei Liu, Willy Susilo, Robert H. Deng","doi":"10.1109/tifs.2026.3657099","DOIUrl":"https://doi.org/10.1109/tifs.2026.3657099","url":null,"abstract":"","PeriodicalId":13492,"journal":{"name":"IEEE Transactions on Information Forensics and Security","volume":"68 1","pages":""},"PeriodicalIF":6.8,"publicationDate":"2026-01-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"146043081","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":1,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Secret Sharing Schemes from Correlated Random Variables and Rate-Limited Public Communication 基于相关随机变量和限速公共通信的秘密共享方案
IF 6.8 1区 计算机科学 Q1 COMPUTER SCIENCE, THEORY & METHODS Pub Date : 2026-01-22 DOI: 10.1109/tifs.2026.3657030
Rumia Sultana, Rémi A. Chou
{"title":"Secret Sharing Schemes from Correlated Random Variables and Rate-Limited Public Communication","authors":"Rumia Sultana, Rémi A. Chou","doi":"10.1109/tifs.2026.3657030","DOIUrl":"https://doi.org/10.1109/tifs.2026.3657030","url":null,"abstract":"","PeriodicalId":13492,"journal":{"name":"IEEE Transactions on Information Forensics and Security","volume":"3 1","pages":""},"PeriodicalIF":6.8,"publicationDate":"2026-01-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"146043079","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":1,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Private Protocol Reverse Engineering via Self-Supervised Learning-Based Message Segmentation 基于自监督学习的消息分割私有协议逆向工程
IF 8 1区 计算机科学 Q1 COMPUTER SCIENCE, THEORY & METHODS Pub Date : 2026-01-22 DOI: 10.1109/TIFS.2026.3657097
Junchen Li;Guang Cheng;Huimin Tang;Ying Hu;Qinghua Shang
Private protocol reverse engineering is the main way to solve the problem of unknown traffic which brings huge security risks to the current network environment. The network traffic-based protocol reverse engineering approaches are the basis of traffic security supervision and are also widely used and flexible. These approaches utilize multiple algorithms from different perspectives to extract the protocol specifications from messages, but they fail to recognize the importance of message segmentation and do not adequately evaluate the relation of adjacent bytes, leading to imprecise performance. To address these issues, we propose the SLMSP, a self-supervised learning-based message segmentation approach for private protocol reverse engineering in this paper. SLMSP mines the rich information embedded in the word order and word semantics between adjacent bytes through self-supervised learning, and then makes optimal decisions about where the message should be segmented based on the fusion of those information, combing the horizontal inference and vertical correction. After that, SLMSP extracts protocol formats based on fine-grained message segmentation by introducing the progressive sequence merging algorithm. We conduct comprehensive experiments to demonstrate the effectiveness of SLMSP. The experimental results demonstrate that SLMSP achieves the ideal performance both in message segmentation and format inference, and it also has advantages over previous works.
私有协议逆向工程是解决未知流量问题的主要途径,未知流量给当前网络环境带来了巨大的安全风险。基于网络流量的协议逆向工程方法是流量安全监管的基础,具有广泛的应用前景和灵活性。这些方法从不同的角度利用多种算法从消息中提取协议规范,但它们没有认识到消息分段的重要性,也没有充分评估相邻字节的关系,导致性能不精确。为了解决这些问题,我们提出了SLMSP,一种基于自监督学习的私有协议逆向工程消息分割方法。SLMSP通过自监督学习挖掘嵌入在相邻字节之间的词序和语义中的丰富信息,然后在这些信息融合的基础上,结合水平推理和垂直校正,对消息的分割位置做出最优决策。然后,通过引入渐进式序列合并算法,基于细粒度消息分割提取协议格式。我们进行了全面的实验来证明SLMSP的有效性。实验结果表明,SLMSP在消息分割和格式推断方面都取得了理想的性能,并且与以往的研究成果相比具有一定的优势。
{"title":"Private Protocol Reverse Engineering via Self-Supervised Learning-Based Message Segmentation","authors":"Junchen Li;Guang Cheng;Huimin Tang;Ying Hu;Qinghua Shang","doi":"10.1109/TIFS.2026.3657097","DOIUrl":"10.1109/TIFS.2026.3657097","url":null,"abstract":"Private protocol reverse engineering is the main way to solve the problem of unknown traffic which brings huge security risks to the current network environment. The network traffic-based protocol reverse engineering approaches are the basis of traffic security supervision and are also widely used and flexible. These approaches utilize multiple algorithms from different perspectives to extract the protocol specifications from messages, but they fail to recognize the importance of message segmentation and do not adequately evaluate the relation of adjacent bytes, leading to imprecise performance. To address these issues, we propose the SLMSP, a self-supervised learning-based message segmentation approach for private protocol reverse engineering in this paper. SLMSP mines the rich information embedded in the word order and word semantics between adjacent bytes through self-supervised learning, and then makes optimal decisions about where the message should be segmented based on the fusion of those information, combing the horizontal inference and vertical correction. After that, SLMSP extracts protocol formats based on fine-grained message segmentation by introducing the progressive sequence merging algorithm. We conduct comprehensive experiments to demonstrate the effectiveness of SLMSP. The experimental results demonstrate that SLMSP achieves the ideal performance both in message segmentation and format inference, and it also has advantages over previous works.","PeriodicalId":13492,"journal":{"name":"IEEE Transactions on Information Forensics and Security","volume":"21 ","pages":"1926-1940"},"PeriodicalIF":8.0,"publicationDate":"2026-01-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"146043080","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":1,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Match on My Own: Fine-Grained Bilateral Access Control with Self-Constrained Matching for Online Social Networks 自我匹配:基于自约束匹配的在线社交网络细粒度双边访问控制
IF 6.8 1区 计算机科学 Q1 COMPUTER SCIENCE, THEORY & METHODS Pub Date : 2026-01-22 DOI: 10.1109/tifs.2026.3657093
Hua Deng, Letian Sha, Hui Yin, Zheng Qin, Yuying Liu
{"title":"Match on My Own: Fine-Grained Bilateral Access Control with Self-Constrained Matching for Online Social Networks","authors":"Hua Deng, Letian Sha, Hui Yin, Zheng Qin, Yuying Liu","doi":"10.1109/tifs.2026.3657093","DOIUrl":"https://doi.org/10.1109/tifs.2026.3657093","url":null,"abstract":"","PeriodicalId":13492,"journal":{"name":"IEEE Transactions on Information Forensics and Security","volume":"29 1","pages":""},"PeriodicalIF":6.8,"publicationDate":"2026-01-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"146043075","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":1,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Secure and Customized Data Sharing with Identical Sub-Policy and Bilateral Access Control 具有相同子策略和双边访问控制的安全自定义数据共享
IF 6.8 1区 计算机科学 Q1 COMPUTER SCIENCE, THEORY & METHODS Pub Date : 2026-01-22 DOI: 10.1109/tifs.2026.3657105
Fuyuan Song, Chuan Zhang, Zhangjie Fu, Meng Li, Zheng Qin, Liehuang Zhu
{"title":"Secure and Customized Data Sharing with Identical Sub-Policy and Bilateral Access Control","authors":"Fuyuan Song, Chuan Zhang, Zhangjie Fu, Meng Li, Zheng Qin, Liehuang Zhu","doi":"10.1109/tifs.2026.3657105","DOIUrl":"https://doi.org/10.1109/tifs.2026.3657105","url":null,"abstract":"","PeriodicalId":13492,"journal":{"name":"IEEE Transactions on Information Forensics and Security","volume":"17 1","pages":""},"PeriodicalIF":6.8,"publicationDate":"2026-01-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"146043082","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":1,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Fine-Grained Domain Alignment for Face Anti-Spoofing With Asymmetric Pseudo-Labels 非对称伪标签人脸抗欺骗的细粒度域对齐
IF 8 1区 计算机科学 Q1 COMPUTER SCIENCE, THEORY & METHODS Pub Date : 2026-01-22 DOI: 10.1109/TIFS.2026.3657032
Jing Yang;Xusheng Cui;Yuehai Chen;Shaoyi Du;Badong Chen;Yuewen Liu
As face recognition systems become more prevalent and various presentation attacks continue to surface, the significance of face anti-spoofing (FAS) has escalated. In real-world scenarios, we can utilize the existing labeled sample sets, and we can also obtain a wide range of unlabeled face samples, which are the target samples that we need to classify. However, the existing cross-domain FAS methods do not fully utilize the target domain data. That is, they only align the overall distribution of features shared by the source and target domains, but cannot complete the alignment of live and spoof features relevant to classification within the source and target domains, resulting in not so good generalization performance in cross-domain scenarios, especially when the target domain is more complex compared to the source domain. To address this issue, we propose a novel domain adaptation approach called Fine-Grained Domain Alignment for Face Anti-Spoofing with Asymmetric Pseudo-Labels (FGDA-APL). In this approach, we initially employ traditional domain alignment methods to achieve preliminary domain alignment, which can be considered as coarse-grained domain alignment. Subsequently, we introduce the Multi-Graph Convolutional Network (MGCN) module, which is utilized to generate asymmetric feature spaces and facilitate cross-supervised pseudo-labels for asymmetric pseudo-labels utilization. Within the MGCN module, features extracted by the feature extractor are guided to achieve feature aggregation, resulting in multiple distinct feature spaces. We hypothesize that pseudo-labels with high confidence in these asymmetric feature spaces can be regarded as reliable pseudo-labels. By cross-supervising the pseudo-labels generated by both the classifier and the MGCN, we ultimately achieve alignment and classification of real and spoofing features within both the source and target domains. Consequently, we achieve superior classification performance on target domain data. Our proposed method has demonstrated state-of-the-art performance across multiple public datasets through extensive experiments.
随着人脸识别系统的日益普及和各种表示攻击的不断出现,人脸反欺骗(FAS)的重要性不断提升。在现实场景中,我们既可以利用已有的标记样本集,也可以得到大量未标记的人脸样本,这些样本就是我们需要分类的目标样本。然而,现有的跨域FAS方法并没有充分利用目标域的数据。也就是说,它们只对齐源域和目标域共享的特征的总体分布,而不能完成源域和目标域中与分类相关的活特征和欺骗特征的对齐,导致跨域场景下的泛化性能不太好,特别是当目标域比源域更复杂时。为了解决这个问题,我们提出了一种新的领域自适应方法,称为非对称伪标签面部抗欺骗的细粒度领域对齐(FGDA-APL)。在该方法中,我们首先采用传统的领域对齐方法来实现初步的领域对齐,这可以被认为是粗粒度的领域对齐。随后,我们引入了多图卷积网络(Multi-Graph Convolutional Network, MGCN)模块,利用该模块生成非对称特征空间,并为非对称伪标签的利用提供交叉监督伪标签。在MGCN模块中,引导特征提取器提取的特征进行特征聚合,形成多个不同的特征空间。我们假设在这些非对称特征空间中具有高置信度的伪标签可以视为可靠的伪标签。通过交叉监督由分类器和MGCN生成的伪标签,我们最终实现了源和目标域中真实特征和欺骗特征的对齐和分类。因此,我们在目标域数据上取得了优异的分类性能。通过广泛的实验,我们提出的方法在多个公共数据集上展示了最先进的性能。
{"title":"Fine-Grained Domain Alignment for Face Anti-Spoofing With Asymmetric Pseudo-Labels","authors":"Jing Yang;Xusheng Cui;Yuehai Chen;Shaoyi Du;Badong Chen;Yuewen Liu","doi":"10.1109/TIFS.2026.3657032","DOIUrl":"10.1109/TIFS.2026.3657032","url":null,"abstract":"As face recognition systems become more prevalent and various presentation attacks continue to surface, the significance of face anti-spoofing (FAS) has escalated. In real-world scenarios, we can utilize the existing labeled sample sets, and we can also obtain a wide range of unlabeled face samples, which are the target samples that we need to classify. However, the existing cross-domain FAS methods do not fully utilize the target domain data. That is, they only align the overall distribution of features shared by the source and target domains, but cannot complete the alignment of live and spoof features relevant to classification within the source and target domains, resulting in not so good generalization performance in cross-domain scenarios, especially when the target domain is more complex compared to the source domain. To address this issue, we propose a novel domain adaptation approach called Fine-Grained Domain Alignment for Face Anti-Spoofing with Asymmetric Pseudo-Labels (FGDA-APL). In this approach, we initially employ traditional domain alignment methods to achieve preliminary domain alignment, which can be considered as coarse-grained domain alignment. Subsequently, we introduce the Multi-Graph Convolutional Network (MGCN) module, which is utilized to generate asymmetric feature spaces and facilitate cross-supervised pseudo-labels for asymmetric pseudo-labels utilization. Within the MGCN module, features extracted by the feature extractor are guided to achieve feature aggregation, resulting in multiple distinct feature spaces. We hypothesize that pseudo-labels with high confidence in these asymmetric feature spaces can be regarded as reliable pseudo-labels. By cross-supervising the pseudo-labels generated by both the classifier and the MGCN, we ultimately achieve alignment and classification of real and spoofing features within both the source and target domains. Consequently, we achieve superior classification performance on target domain data. Our proposed method has demonstrated state-of-the-art performance across multiple public datasets through extensive experiments.","PeriodicalId":13492,"journal":{"name":"IEEE Transactions on Information Forensics and Security","volume":"21 ","pages":"1973-1986"},"PeriodicalIF":8.0,"publicationDate":"2026-01-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"146043083","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":1,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
SALUS: Large-Scale Homomorphic Circuit Synthesis via Logic-Aware LUT Optimization 基于逻辑感知LUT优化的大规模同态电路合成
IF 8 1区 计算机科学 Q1 COMPUTER SCIENCE, THEORY & METHODS Pub Date : 2026-01-22 DOI: 10.1109/TIFS.2026.3657090
Ran Mao;Zhou Zhang;Zian Zhao;Zhenyu Guan;Peng Yin;Song Bian
Recently, growing interests are developed in optimizing fully homomorphic encryption (FHE) circuits to enable Boolean function evaluations over ciphertexts. While existing works utilize functional bootstrapping (FBS) to efficiently evaluate logic gates, the evaluation efficiency for large-scale circuits remains limited. Recent advances introduce a fast ciphertext conversion method, making it feasible to evaluate look-up tables (LUTs) over homomorphic multiplexer operation. In this work, we propose a new circuit synthesis framework, SALUS, which automatically generates and evaluates gate-level graphs over homomorphic LUTs given an input Boolean circuit. We apply the binary decision diagram (BDD) reordering method and multi-value refresh techniques to efficiently evaluate complex LUTs. Additionally, we propose a heuristic algorithm to merge LUTs in a given circuit into multi-output LUTs. In the experiments, we examine the efficiency of SALUS using a wide range of benchmark suites, including the EPFL and ISCAS benchmark circuits. We show that SALUS achieves a maximum reduction of up to $26times $ in computational latency compared to state-of-the-art homomorphic circuit synthesis method. Furthermore, we evaluate real-world applications, e.g., image filtering and matrix multiplication, and achieve an average speedup of $8.6times $ (with a maximum speedup of $24times $ ) compared to the FBS-based method.
近年来,人们对优化完全同态加密(FHE)电路以实现对密文的布尔函数求值越来越感兴趣。虽然现有的工作利用功能自举(FBS)来有效地评估逻辑门,但大规模电路的评估效率仍然有限。最近的进展引入了一种快速的密文转换方法,使得对同态多路复用器操作的查找表(lut)进行评估成为可能。在这项工作中,我们提出了一个新的电路合成框架,SALUS,它在给定输入布尔电路的同态lut上自动生成和评估门级图。我们应用二元决策图(BDD)重排序方法和多值刷新技术对复杂lut进行高效的评估。此外,我们提出了一种启发式算法,将给定电路中的lut合并为多输出lut。在实验中,我们使用广泛的基准套件来检查SALUS的效率,包括EPFL和ISCAS基准电路。我们表明,与最先进的同态电路合成方法相比,SALUS在计算延迟方面最大减少了26倍。此外,我们评估了现实世界的应用,例如图像滤波和矩阵乘法,与基于fbs的方法相比,实现了8.6倍的平均加速(最大加速为24倍)。
{"title":"SALUS: Large-Scale Homomorphic Circuit Synthesis via Logic-Aware LUT Optimization","authors":"Ran Mao;Zhou Zhang;Zian Zhao;Zhenyu Guan;Peng Yin;Song Bian","doi":"10.1109/TIFS.2026.3657090","DOIUrl":"10.1109/TIFS.2026.3657090","url":null,"abstract":"Recently, growing interests are developed in optimizing fully homomorphic encryption (FHE) circuits to enable Boolean function evaluations over ciphertexts. While existing works utilize functional bootstrapping (FBS) to efficiently evaluate logic gates, the evaluation efficiency for large-scale circuits remains limited. Recent advances introduce a fast ciphertext conversion method, making it feasible to evaluate look-up tables (LUTs) over homomorphic multiplexer operation. In this work, we propose a new circuit synthesis framework, SALUS, which automatically generates and evaluates gate-level graphs over homomorphic LUTs given an input Boolean circuit. We apply the binary decision diagram (BDD) reordering method and multi-value refresh techniques to efficiently evaluate complex LUTs. Additionally, we propose a heuristic algorithm to merge LUTs in a given circuit into multi-output LUTs. In the experiments, we examine the efficiency of SALUS using a wide range of benchmark suites, including the EPFL and ISCAS benchmark circuits. We show that SALUS achieves a maximum reduction of up to <inline-formula> <tex-math>$26times $ </tex-math></inline-formula> in computational latency compared to state-of-the-art homomorphic circuit synthesis method. Furthermore, we evaluate real-world applications, e.g., image filtering and matrix multiplication, and achieve an average speedup of <inline-formula> <tex-math>$8.6times $ </tex-math></inline-formula> (with a maximum speedup of <inline-formula> <tex-math>$24times $ </tex-math></inline-formula>) compared to the FBS-based method.","PeriodicalId":13492,"journal":{"name":"IEEE Transactions on Information Forensics and Security","volume":"21 ","pages":"2002-2016"},"PeriodicalIF":8.0,"publicationDate":"2026-01-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"146043077","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":1,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Adversarial Video Promotion Against Text-to-Video Retrieval 对抗性视频推广对抗文本到视频检索
IF 6.8 1区 计算机科学 Q1 COMPUTER SCIENCE, THEORY & METHODS Pub Date : 2026-01-22 DOI: 10.1109/tifs.2026.3657094
Qiwei Tian, Chenhao Lin, Zhengyu Zhao, Shuai Liu, Qian Li, Chao Shen
{"title":"Adversarial Video Promotion Against Text-to-Video Retrieval","authors":"Qiwei Tian, Chenhao Lin, Zhengyu Zhao, Shuai Liu, Qian Li, Chao Shen","doi":"10.1109/tifs.2026.3657094","DOIUrl":"https://doi.org/10.1109/tifs.2026.3657094","url":null,"abstract":"","PeriodicalId":13492,"journal":{"name":"IEEE Transactions on Information Forensics and Security","volume":"57 1","pages":""},"PeriodicalIF":6.8,"publicationDate":"2026-01-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"146043076","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":1,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Non-Transferable Anonymous Tokens with Decentralized Issuance by Blind Multisignatures 通过盲多重签名分散发行的不可转让匿名令牌
IF 6.8 1区 计算机科学 Q1 COMPUTER SCIENCE, THEORY & METHODS Pub Date : 2026-01-19 DOI: 10.1109/tifs.2026.3655949
Jingyuan Shen, Jianting Ning, Qi Feng, Debiao He, Xinyi Huang
{"title":"Non-Transferable Anonymous Tokens with Decentralized Issuance by Blind Multisignatures","authors":"Jingyuan Shen, Jianting Ning, Qi Feng, Debiao He, Xinyi Huang","doi":"10.1109/tifs.2026.3655949","DOIUrl":"https://doi.org/10.1109/tifs.2026.3655949","url":null,"abstract":"","PeriodicalId":13492,"journal":{"name":"IEEE Transactions on Information Forensics and Security","volume":"30 1","pages":""},"PeriodicalIF":6.8,"publicationDate":"2026-01-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"146001322","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":1,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Contextual Masking Distillation for Network Traffic Anomaly Detection 网络流量异常检测的上下文掩蔽蒸馏
IF 6.8 1区 计算机科学 Q1 COMPUTER SCIENCE, THEORY & METHODS Pub Date : 2026-01-19 DOI: 10.1109/tifs.2026.3655514
Xinglin Lian, Yu Zheng, Yan Liu, Fan Zhou, Chunlei Peng, Xinbo Gao
{"title":"Contextual Masking Distillation for Network Traffic Anomaly Detection","authors":"Xinglin Lian, Yu Zheng, Yan Liu, Fan Zhou, Chunlei Peng, Xinbo Gao","doi":"10.1109/tifs.2026.3655514","DOIUrl":"https://doi.org/10.1109/tifs.2026.3655514","url":null,"abstract":"","PeriodicalId":13492,"journal":{"name":"IEEE Transactions on Information Forensics and Security","volume":"181 1","pages":""},"PeriodicalIF":6.8,"publicationDate":"2026-01-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"146001351","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":1,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
IEEE Transactions on Information Forensics and Security
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1