{"title":"LFS: A Locally Private Framework for Degree Statistic Estimation with Laplace Mechanism","authors":"Jiayu Li, Yuke Hu, Xiaoguang Li, Shiqi Zhou, Yuxiang Wang, Fenghua Li, Ben Niu","doi":"10.1109/tifs.2026.3655155","DOIUrl":"https://doi.org/10.1109/tifs.2026.3655155","url":null,"abstract":"","PeriodicalId":13492,"journal":{"name":"IEEE Transactions on Information Forensics and Security","volume":"41 1","pages":""},"PeriodicalIF":6.8,"publicationDate":"2026-01-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"146001326","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":1,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2026-01-19DOI: 10.1109/tifs.2026.3654445
Min Du, Xin Zhang, Jinning Zhang, Siqi Bu
{"title":"Bilevel Cyber-Induced Overloads Mechanism for False Data Injection Attacks Considering Post-Attack Economic Dispatch","authors":"Min Du, Xin Zhang, Jinning Zhang, Siqi Bu","doi":"10.1109/tifs.2026.3654445","DOIUrl":"https://doi.org/10.1109/tifs.2026.3654445","url":null,"abstract":"","PeriodicalId":13492,"journal":{"name":"IEEE Transactions on Information Forensics and Security","volume":"61 1","pages":""},"PeriodicalIF":6.8,"publicationDate":"2026-01-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"146001317","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":1,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2026-01-19DOI: 10.1109/tifs.2026.3655520
Shuai Gong, Chaoran Cui, Chunyun Zhang, Wenna Wang, Xiushan Nie, Lei Zhu
{"title":"Federated Domain Generalization via Prompt Learning and Aggregation","authors":"Shuai Gong, Chaoran Cui, Chunyun Zhang, Wenna Wang, Xiushan Nie, Lei Zhu","doi":"10.1109/tifs.2026.3655520","DOIUrl":"https://doi.org/10.1109/tifs.2026.3655520","url":null,"abstract":"","PeriodicalId":13492,"journal":{"name":"IEEE Transactions on Information Forensics and Security","volume":"50 1","pages":""},"PeriodicalIF":6.8,"publicationDate":"2026-01-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"146001315","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":1,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2026-01-19DOI: 10.1109/tifs.2026.3655900
Xuechi Chen, Mande Xie, Xiangji Meng, Bochang Yang, Tian Wang, Anfeng Liu, Houbing Herbert Song
{"title":"CPRPS: A Cross-Platform Reputation Privacy Sharing for Speed-up Quality Data Collection in Mobile Crowdsensing","authors":"Xuechi Chen, Mande Xie, Xiangji Meng, Bochang Yang, Tian Wang, Anfeng Liu, Houbing Herbert Song","doi":"10.1109/tifs.2026.3655900","DOIUrl":"https://doi.org/10.1109/tifs.2026.3655900","url":null,"abstract":"","PeriodicalId":13492,"journal":{"name":"IEEE Transactions on Information Forensics and Security","volume":"37 1","pages":""},"PeriodicalIF":6.8,"publicationDate":"2026-01-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"146001319","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":1,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"The Chosen-Object Attack: Exploiting the Hungarian Matching Loss in Detection Transformers for Fun and Profit","authors":"Tianyi Wang, Cong Wang, Zhenyu Wen, Ruilong Deng, Yuanchao Shu, Peng Cheng, Jiming Chen","doi":"10.1109/tifs.2026.3654868","DOIUrl":"https://doi.org/10.1109/tifs.2026.3654868","url":null,"abstract":"","PeriodicalId":13492,"journal":{"name":"IEEE Transactions on Information Forensics and Security","volume":"35 1","pages":""},"PeriodicalIF":6.8,"publicationDate":"2026-01-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"145993331","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":1,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Privacy-preserving Joint Distribution Analysis for Set-Valued Data via Local Differential Privacy","authors":"Yilin Wang, Xiong Li, Shuai Shang, Wei Liang, Jinjun Chen, Xiaosong Zhang, Keqin Li","doi":"10.1109/tifs.2026.3654799","DOIUrl":"https://doi.org/10.1109/tifs.2026.3654799","url":null,"abstract":"","PeriodicalId":13492,"journal":{"name":"IEEE Transactions on Information Forensics and Security","volume":"742 1","pages":""},"PeriodicalIF":6.8,"publicationDate":"2026-01-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"145993468","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":1,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"CCPA via Load Redistribution: Sequential Strategies and Vulnerability Analysis in Power Systems","authors":"Huihui Huang, YunKai Song, Qiang Wei, Ruilong Deng, Yangyang Geng, Haowen Chen","doi":"10.1109/tifs.2026.3654777","DOIUrl":"https://doi.org/10.1109/tifs.2026.3654777","url":null,"abstract":"","PeriodicalId":13492,"journal":{"name":"IEEE Transactions on Information Forensics and Security","volume":"38 1","pages":""},"PeriodicalIF":6.8,"publicationDate":"2026-01-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"145993469","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":1,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}