首页 > 最新文献

IEEE Transactions on Information Forensics and Security最新文献

英文 中文
Building Trust Beyond Update Divergence: Dual-Refined Aggregation for Byzantine-Robust Federated Learning 超越更新分歧建立信任:拜占庭鲁棒联邦学习的双精炼聚合
IF 6.8 1区 计算机科学 Q1 COMPUTER SCIENCE, THEORY & METHODS Pub Date : 2026-01-01 DOI: 10.1109/tifs.2025.3650413
Heyi Zhang, Xinlei He, Jun Wu, Qian Wang
{"title":"Building Trust Beyond Update Divergence: Dual-Refined Aggregation for Byzantine-Robust Federated Learning","authors":"Heyi Zhang, Xinlei He, Jun Wu, Qian Wang","doi":"10.1109/tifs.2025.3650413","DOIUrl":"https://doi.org/10.1109/tifs.2025.3650413","url":null,"abstract":"","PeriodicalId":13492,"journal":{"name":"IEEE Transactions on Information Forensics and Security","volume":"44 1","pages":"1-1"},"PeriodicalIF":6.8,"publicationDate":"2026-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"145893723","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":1,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Fast Jamming Strategy Optimization Method With Imperfect Experience 基于不完全经验的快速干扰策略优化方法
IF 8 1区 计算机科学 Q1 COMPUTER SCIENCE, THEORY & METHODS Pub Date : 2026-01-01 DOI: 10.1109/TIFS.2025.3650410
Jianxin Li;Tian Tian;Jingjing Cai;Weiwei Fan;Yunan Sun;Feng Zhou
The primary objective of jamming strategy optimization is to ensure that a jammer timely finds an effective jamming strategy against the multifunction radar (MFR), thereby ensuring the safety of targets. Deep reinforcement learning (DRL) has been widely applied in solving the problem of jamming strategy optimization. However, the process still faces challenges such as low learning efficiency and a heavy memory burden. Therefore, we propose a fast jamming strategy optimization method with imperfect experience. Firstly, we model the radar countermeasure process as a Markov decision process (MDP), and formulate the jamming reward function by combining the jamming effectiveness and the jammer’s operational intent. Secondly, we design a novel hybrid jamming strategy choice module, which uses imperfect experience to improve the optimization efficiency of jamming strategy. Furthermore, to improve sample efficiency and reduce forgetting caused by a small replay buffer, we respectively employ a mixed replay buffer strategy and a knowledge consolidation technique. Finally, extensive experiments demonstrate that under the guidance of imperfect experience, our proposed method achieves faster convergence speed and higher strategy accuracy compared with existing DRL-based methods.
干扰策略优化的首要目标是确保干扰者及时找到针对多功能雷达的有效干扰策略,从而保证目标的安全。深度强化学习(DRL)在解决干扰策略优化问题中得到了广泛的应用。然而,该过程仍然面临着学习效率低、内存负担重等挑战。因此,我们提出了一种不完全经验下的快速干扰策略优化方法。首先,将雷达对抗过程建模为马尔可夫决策过程(MDP),结合干扰效能和干扰者的作战意图,建立干扰奖励函数;其次,设计了一种新的混合干扰策略选择模块,利用不完全经验提高了干扰策略的优化效率。此外,为了提高样本效率和减少小的重放缓冲造成的遗忘,我们分别采用了混合重放缓冲策略和知识巩固技术。最后,大量实验表明,在不完全经验的指导下,与现有基于drl的方法相比,我们的方法具有更快的收敛速度和更高的策略精度。
{"title":"A Fast Jamming Strategy Optimization Method With Imperfect Experience","authors":"Jianxin Li;Tian Tian;Jingjing Cai;Weiwei Fan;Yunan Sun;Feng Zhou","doi":"10.1109/TIFS.2025.3650410","DOIUrl":"10.1109/TIFS.2025.3650410","url":null,"abstract":"The primary objective of jamming strategy optimization is to ensure that a jammer timely finds an effective jamming strategy against the multifunction radar (MFR), thereby ensuring the safety of targets. Deep reinforcement learning (DRL) has been widely applied in solving the problem of jamming strategy optimization. However, the process still faces challenges such as low learning efficiency and a heavy memory burden. Therefore, we propose a fast jamming strategy optimization method with imperfect experience. Firstly, we model the radar countermeasure process as a Markov decision process (MDP), and formulate the jamming reward function by combining the jamming effectiveness and the jammer’s operational intent. Secondly, we design a novel hybrid jamming strategy choice module, which uses imperfect experience to improve the optimization efficiency of jamming strategy. Furthermore, to improve sample efficiency and reduce forgetting caused by a small replay buffer, we respectively employ a mixed replay buffer strategy and a knowledge consolidation technique. Finally, extensive experiments demonstrate that under the guidance of imperfect experience, our proposed method achieves faster convergence speed and higher strategy accuracy compared with existing DRL-based methods.","PeriodicalId":13492,"journal":{"name":"IEEE Transactions on Information Forensics and Security","volume":"21 ","pages":"992-1005"},"PeriodicalIF":8.0,"publicationDate":"2026-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"145893720","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":1,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
FSAT: A Faster Secure Convolutional Neural Network Inference Framework With Adversarial Training in Resource-Constrained Scenarios FSAT:资源受限场景下具有对抗性训练的更快安全卷积神经网络推理框架
IF 8 1区 计算机科学 Q1 COMPUTER SCIENCE, THEORY & METHODS Pub Date : 2026-01-01 DOI: 10.1109/TIFS.2025.3650384
Dong Li;Anupam Chattopadhyay;Qingguo Lü;Jiahui Wu;Tao Xiang;Xiaofeng Liao
Existing CNN inference frameworks based on FHE often suffer from reduced efficiency and accuracy due to the polynomial approximation of activation functions, and they lack effective mechanisms to prevent sensitive information leakage during the final classification stage. To address these limitations, we propose FSAT, a fast and secure inference framework enhanced with adversarial training. Specifically, FSAT employs a private CNN model architecture, where linear layers are computed through an optimized homomorphic ciphertext convolution operation, while non-linear layer operations are efficiently realized using a secure searchable index and an encrypted look-up table, which replace polynomial activation approximations and significantly improve inference accuracy and latency performance. To further mitigate information leakage, we introduce a dual-constraint adversarial training scheme that makes it substantially more difficult for an adversary to infer sensitive attributes of the input data. Experimental results demonstrate that FSAT achieves high inference accuracy and efficiency while substantially reducing the risk of sensitive data leakage.
现有的基于FHE的CNN推理框架往往由于激活函数的多项式逼近导致效率和准确性降低,并且缺乏有效的机制来防止敏感信息在最终分类阶段泄露。为了解决这些限制,我们提出了FSAT,这是一个快速安全的推理框架,经过对抗性训练增强。具体而言,FSAT采用私有CNN模型架构,其中线性层通过优化的同态密文卷积运算计算,而非线性层操作通过安全可搜索索引和加密查找表高效实现,取代了多项式激活近似,显著提高了推理精度和延迟性能。为了进一步减少信息泄露,我们引入了一种双约束对抗训练方案,使攻击者更难以推断输入数据的敏感属性。实验结果表明,FSAT在显著降低敏感数据泄露风险的同时,获得了较高的推理精度和效率。
{"title":"FSAT: A Faster Secure Convolutional Neural Network Inference Framework With Adversarial Training in Resource-Constrained Scenarios","authors":"Dong Li;Anupam Chattopadhyay;Qingguo Lü;Jiahui Wu;Tao Xiang;Xiaofeng Liao","doi":"10.1109/TIFS.2025.3650384","DOIUrl":"10.1109/TIFS.2025.3650384","url":null,"abstract":"Existing CNN inference frameworks based on FHE often suffer from reduced efficiency and accuracy due to the polynomial approximation of activation functions, and they lack effective mechanisms to prevent sensitive information leakage during the final classification stage. To address these limitations, we propose FSAT, a fast and secure inference framework enhanced with adversarial training. Specifically, FSAT employs a private CNN model architecture, where linear layers are computed through an optimized homomorphic ciphertext convolution operation, while non-linear layer operations are efficiently realized using a secure searchable index and an encrypted look-up table, which replace polynomial activation approximations and significantly improve inference accuracy and latency performance. To further mitigate information leakage, we introduce a dual-constraint adversarial training scheme that makes it substantially more difficult for an adversary to infer sensitive attributes of the input data. Experimental results demonstrate that FSAT achieves high inference accuracy and efficiency while substantially reducing the risk of sensitive data leakage.","PeriodicalId":13492,"journal":{"name":"IEEE Transactions on Information Forensics and Security","volume":"21 ","pages":"798-811"},"PeriodicalIF":8.0,"publicationDate":"2026-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"145893721","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":1,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
STKPS-Net: Spatio-Temporal Key Patch Selection Network for Few Shot Anomalous Action Recognition STKPS-Net:基于多镜头异常动作识别的时空按键选择网络
IF 8 1区 计算机科学 Q1 COMPUTER SCIENCE, THEORY & METHODS Pub Date : 2026-01-01 DOI: 10.1109/TIFS.2025.3650396
Jinsheng Xiao;Hao Ma;Ruidi Chen;Xingyu Gao;Hailong Shi;Zhongyuan Wang
For providing timely warnings and preventing potential damages, it is crucial to detect anomalous actions that threaten public safety through surveillance cameras. Compared to normal actions, anomalous actions often occupy only a small portion of surveillance videos and exhibit more complex manifestations in terms of time and space. Considering that normal action recognition methods fail to highlight crucial information from small-sized patches, we propose the Spatio-temporal Key Patch Selection Network(STKPS-Net). It includes a Spatially Adaptive Key Patch Selection(SAKPS) module to select small but informative patches, and a Long-short Feature Map Spatio-temporal Relation(LFMSR) module to capture dynamic changes in anomalous actions. Additionally, a spatio-temporal refined loss is introduced to enhance fine-grained feature learning. Experimental results on the HMDB51, Kinetics, and UCF-Crime v2 datasets show that our STKPS-Net achieves state-of-the-art performance in few-shot anomalous action recognition, outperforming the most competitive methods by 1.2% on the anomalous action dataset UCF-Crime v2. More details can be found at https://github.com/xiaojs18/STKPS-Net.
为了提供及时的预警和预防潜在的损害,通过监控摄像头发现威胁公共安全的异常行为至关重要。与正常行为相比,异常行为往往只占监控视频的一小部分,在时间和空间上表现出更复杂的表现。考虑到常规动作识别方法无法从小尺度斑块中突出关键信息,我们提出了时空关键斑块选择网络(STKPS-Net)。它包括一个空间自适应关键补丁选择(SAKPS)模块,用于选择小但信息丰富的补丁,以及一个长-短特征映射时空关系(LFMSR)模块,用于捕获异常行为的动态变化。此外,还引入了一种时空精细损失来增强细粒度特征学习。在HMDB51、Kinetics和UCF-Crime v2数据集上的实验结果表明,我们的STKPS-Net在少量异常动作识别方面达到了最先进的性能,在异常动作数据集UCF-Crime v2上的性能优于最具竞争力的方法1.2%。更多详细信息请访问https://github.com/xiaojs18/STKPS-Net。
{"title":"STKPS-Net: Spatio-Temporal Key Patch Selection Network for Few Shot Anomalous Action Recognition","authors":"Jinsheng Xiao;Hao Ma;Ruidi Chen;Xingyu Gao;Hailong Shi;Zhongyuan Wang","doi":"10.1109/TIFS.2025.3650396","DOIUrl":"10.1109/TIFS.2025.3650396","url":null,"abstract":"For providing timely warnings and preventing potential damages, it is crucial to detect anomalous actions that threaten public safety through surveillance cameras. Compared to normal actions, anomalous actions often occupy only a small portion of surveillance videos and exhibit more complex manifestations in terms of time and space. Considering that normal action recognition methods fail to highlight crucial information from small-sized patches, we propose the Spatio-temporal Key Patch Selection Network(STKPS-Net). It includes a Spatially Adaptive Key Patch Selection(SAKPS) module to select small but informative patches, and a Long-short Feature Map Spatio-temporal Relation(LFMSR) module to capture dynamic changes in anomalous actions. Additionally, a spatio-temporal refined loss is introduced to enhance fine-grained feature learning. Experimental results on the HMDB51, Kinetics, and UCF-Crime v2 datasets show that our STKPS-Net achieves state-of-the-art performance in few-shot anomalous action recognition, outperforming the most competitive methods by 1.2% on the anomalous action dataset UCF-Crime v2. More details can be found at <uri>https://github.com/xiaojs18/STKPS-Net</uri>.","PeriodicalId":13492,"journal":{"name":"IEEE Transactions on Information Forensics and Security","volume":"21 ","pages":"827-838"},"PeriodicalIF":8.0,"publicationDate":"2026-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"145893722","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":1,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Secure Rational Delegation Federated Learning 安全合理委托联邦学习
IF 8 1区 计算机科学 Q1 COMPUTER SCIENCE, THEORY & METHODS Pub Date : 2026-01-01 DOI: 10.1109/TIFS.2025.3650379
Mengqian Li;Youliang Tian;Junpeng Zhang;Ze Yang;Jinbo Xiong;Jianfeng Ma
Federated learning (FL) allows multiple distributed clients with local datasets to train a global model collaboratively. Due to the potential privacy risk of the training process, differential privacy (DP) is introduced into FL to protect clients’ sensitive information by perturbing the model updates. However, the probability density function of the Laplace mechanism has a long-tail effect, which may generate large noise to induce the model to deviate from the normal result. Moreover, as the cloud is not fully trusted, there is no guarantee that the server follows the aggregation protocol correctly. To address these issues, in this paper, we propose a secure rational delegation FL scheme, namely SRDFL, and analyze its protection and convergence performance. Specifically, we first utilize the zero-determinant strategy to construct a FL rational model. It delegates tasks to multiple servers and encourages them to perform correct aggregation. Then, we design a bounded DP protection mechanism to achieve a fixed universe of perturbation outputs in a threshold-constrained manner. Finally, based on Shamir’s secret sharing, we propose a trusted verification algorithm of DP to validate servers for correct aggregation. Detailed theoretical analysis and extensive performance evaluations demonstrate that our proposed scheme is effective. Compared to existing works, SRDFL is able to improve 2.72%–47.92% model accuracy.
联邦学习(FL)允许具有本地数据集的多个分布式客户端协同训练全局模型。由于训练过程中存在潜在的隐私风险,将差分隐私(DP)引入到FL中,通过干扰模型更新来保护客户的敏感信息。然而,拉普拉斯机制的概率密度函数具有长尾效应,可能产生较大的噪声,导致模型偏离正常结果。此外,由于云不是完全可信的,因此不能保证服务器正确地遵循聚合协议。针对这些问题,本文提出了一种安全的合理委托FL方案SRDFL,并分析了其防护性能和收敛性能。具体而言,我们首先利用零行列式策略构造FL有理模型。它将任务委托给多个服务器,并鼓励它们执行正确的聚合。然后,我们设计了一个有界DP保护机制,以阈值约束的方式实现固定的扰动输出域。最后,在Shamir秘密共享的基础上,提出了一种DP可信验证算法来验证服务器的正确聚合。详细的理论分析和广泛的性能评估表明,我们提出的方案是有效的。与现有工作相比,SRDFL能够将模型精度提高2.72%-47.92%。
{"title":"Secure Rational Delegation Federated Learning","authors":"Mengqian Li;Youliang Tian;Junpeng Zhang;Ze Yang;Jinbo Xiong;Jianfeng Ma","doi":"10.1109/TIFS.2025.3650379","DOIUrl":"10.1109/TIFS.2025.3650379","url":null,"abstract":"Federated learning (FL) allows multiple distributed clients with local datasets to train a global model collaboratively. Due to the potential privacy risk of the training process, differential privacy (DP) is introduced into FL to protect clients’ sensitive information by perturbing the model updates. However, the probability density function of the Laplace mechanism has a long-tail effect, which may generate large noise to induce the model to deviate from the normal result. Moreover, as the cloud is not fully trusted, there is no guarantee that the server follows the aggregation protocol correctly. To address these issues, in this paper, we propose a secure rational delegation FL scheme, namely SRDFL, and analyze its protection and convergence performance. Specifically, we first utilize the zero-determinant strategy to construct a FL rational model. It delegates tasks to multiple servers and encourages them to perform correct aggregation. Then, we design a bounded DP protection mechanism to achieve a fixed universe of perturbation outputs in a threshold-constrained manner. Finally, based on Shamir’s secret sharing, we propose a trusted verification algorithm of DP to validate servers for correct aggregation. Detailed theoretical analysis and extensive performance evaluations demonstrate that our proposed scheme is effective. Compared to existing works, SRDFL is able to improve 2.72%–47.92% model accuracy.","PeriodicalId":13492,"journal":{"name":"IEEE Transactions on Information Forensics and Security","volume":"21 ","pages":"839-853"},"PeriodicalIF":8.0,"publicationDate":"2026-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"145893719","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":1,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Outsourced Cloud Storage and Dynamic Sharing: Efficient Time-Bound Access Control 外包云存储与动态共享:高效限时访问控制
IF 8 1区 计算机科学 Q1 COMPUTER SCIENCE, THEORY & METHODS Pub Date : 2026-01-01 DOI: 10.1109/TIFS.2025.3650373
Willy Susilo;Jianchang Lai;Fuchun Guo;Yudi Zhang
Cloud storage has become the most attractive way to achieve data sharing by setting flexible access policies. Cryptographic tools are considered the most popular approach to protecting the privacy of data stored on the cloud. Dividing data into different classes plays a significant role in cloud storage, making data organization more methodical and data sharing more expressive and efficient. Unfortunately, current data sharing solutions either neglect data classification or suffer from data leakage. Specifically, shared keys can decrypt newly added encrypted data within the same class, and have key abuse issues where shared keys are untraceable once sold. In this work, we propose a time-bound data sharing system that addresses all these issues simultaneously. In our scheme, data is divided into different classes and encrypted according to its class and associated time period. Decryption keys for a set of chosen data classes can be aggregated into a single key, allowing users to decrypt multiple ciphertexts whose classes are within the set; while other encrypted data with classes outside the set remain confidential. Moreover, the aggregate key is time-bound which can only decrypt the ciphertexts generated before the embedded time period, ensuring it cannot access newly added encrypted data. The key size is independent of the chosen class set size and is only logarithmic in the bit length of the time period used. For each sharing, the shared aggregate key is different. In the event of data leakage or key selling, the data provider can identify the responsible users. We provide formal security analysis of our system and evaluate its performance through experiments. The results demonstrate that our system is highly efficient in terms of shared keys. It provides a practical solution for achieving efficient and dynamic data sharing in cloud storage.
通过设置灵活的访问策略,云存储成为实现数据共享的最具吸引力的方式。加密工具被认为是保护存储在云上的数据隐私的最流行的方法。将数据划分为不同的类在云存储中发挥着重要作用,使数据组织更有条理,数据共享更具表现力和效率。不幸的是,目前的数据共享解决方案要么忽略了数据分类,要么存在数据泄露的问题。具体来说,共享密钥可以解密同一类中新添加的加密数据,并且存在密钥滥用问题,即共享密钥一旦出售就无法追踪。在这项工作中,我们提出了一个有时限的数据共享系统,同时解决所有这些问题。在我们的方案中,数据被划分为不同的类,并根据其类和关联的时间段进行加密。一组所选数据类的解密密钥可以聚合成一个密钥,允许用户解密在该集合内的多个类的密文;而其他类以外的加密数据仍然是保密的。而且聚合密钥是有时间限制的,只能对嵌入时间之前生成的密文进行解密,不能访问新增的加密数据。密钥大小与所选择的类集大小无关,并且仅在所使用的时间段的位长度上是对数的。对于每个共享,共享的聚合键是不同的。在发生数据泄露或密钥销售时,数据提供商可以识别责任用户。我们对系统进行了正式的安全分析,并通过实验对其性能进行了评估。结果表明,我们的系统在共享密钥方面是高效的。它为实现云存储中高效、动态的数据共享提供了一种实用的解决方案。
{"title":"Outsourced Cloud Storage and Dynamic Sharing: Efficient Time-Bound Access Control","authors":"Willy Susilo;Jianchang Lai;Fuchun Guo;Yudi Zhang","doi":"10.1109/TIFS.2025.3650373","DOIUrl":"10.1109/TIFS.2025.3650373","url":null,"abstract":"Cloud storage has become the most attractive way to achieve data sharing by setting flexible access policies. Cryptographic tools are considered the most popular approach to protecting the privacy of data stored on the cloud. Dividing data into different classes plays a significant role in cloud storage, making data organization more methodical and data sharing more expressive and efficient. Unfortunately, current data sharing solutions either neglect data classification or suffer from data leakage. Specifically, shared keys can decrypt newly added encrypted data within the same class, and have key abuse issues where shared keys are untraceable once sold. In this work, we propose a time-bound data sharing system that addresses all these issues simultaneously. In our scheme, data is divided into different classes and encrypted according to its class and associated time period. Decryption keys for a set of chosen data classes can be aggregated into a single key, allowing users to decrypt multiple ciphertexts whose classes are within the set; while other encrypted data with classes outside the set remain confidential. Moreover, the aggregate key is time-bound which can only decrypt the ciphertexts generated before the embedded time period, ensuring it cannot access newly added encrypted data. The key size is independent of the chosen class set size and is only logarithmic in the bit length of the time period used. For each sharing, the shared aggregate key is different. In the event of data leakage or key selling, the data provider can identify the responsible users. We provide formal security analysis of our system and evaluate its performance through experiments. The results demonstrate that our system is highly efficient in terms of shared keys. It provides a practical solution for achieving efficient and dynamic data sharing in cloud storage.","PeriodicalId":13492,"journal":{"name":"IEEE Transactions on Information Forensics and Security","volume":"21 ","pages":"900-912"},"PeriodicalIF":8.0,"publicationDate":"2026-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"145893718","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":1,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
SolPhishHunter: Toward Detecting and Understanding Phishing on Solana SolPhishHunter:在Solana上检测和理解网络钓鱼
IF 8 1区 计算机科学 Q1 COMPUTER SCIENCE, THEORY & METHODS Pub Date : 2025-12-31 DOI: 10.1109/TIFS.2025.3649957
Ziwei Li;Zigui Jiang;Ming Fang;Jiaxin Chen;Zhiying Wu;Jiajing Wu;Lun Zhang;Zibin Zheng
Solana is a rapidly evolving blockchain platform that has attracted an increasing number of users. However, this growth has also drawn the attention of malicious actors, with some phishers extending their reach into the Solana ecosystem. Unlike platforms such as Ethereum, Solana has distinct designs of accounts and transactions, leading to the emergence of new types of phishing transactions that we term SolPhish. We define three types of SolPhish and develop a detection tool called SolPhishHunter. Utilizing SolPhishHunter, we detect a total of 8,058 instances of SolPhish and conduct an empirical analysis of these detected cases. Our analysis explores the distribution and impact of SolPhish, the characteristics of the phishers, and the relationships among phishing gangs. Particularly, the detected SolPhish transactions have resulted in nearly ${$}$ 1.1 million in losses for victims. We report our detection results to the community and construct SolPhishDataset, the first Solana phishing-related dataset in academia.
Solana是一个快速发展的区块链平台,吸引了越来越多的用户。然而,这种增长也引起了恶意行为者的注意,一些网络钓鱼者将他们的触角延伸到索拉纳生态系统。与以太坊等平台不同,Solana有独特的账户和交易设计,导致了新型网络钓鱼交易的出现,我们称之为SolPhish。我们定义了三种类型的SolPhish,并开发了一种名为SolPhishHunter的检测工具。利用SolPhishHunter,我们共检测到8058个SolPhish实例,并对这些检测到的案例进行了实证分析。我们的分析探讨了SolPhish的分布和影响,钓鱼者的特征,以及钓鱼团伙之间的关系。特别是,被发现的SolPhish交易给受害者造成了近110万美元的损失。我们向社区报告了我们的检测结果,并构建了学术界第一个与索拉纳网络钓鱼相关的数据集SolPhishDataset。
{"title":"SolPhishHunter: Toward Detecting and Understanding Phishing on Solana","authors":"Ziwei Li;Zigui Jiang;Ming Fang;Jiaxin Chen;Zhiying Wu;Jiajing Wu;Lun Zhang;Zibin Zheng","doi":"10.1109/TIFS.2025.3649957","DOIUrl":"10.1109/TIFS.2025.3649957","url":null,"abstract":"Solana is a rapidly evolving blockchain platform that has attracted an increasing number of users. However, this growth has also drawn the attention of malicious actors, with some phishers extending their reach into the Solana ecosystem. Unlike platforms such as Ethereum, Solana has distinct designs of accounts and transactions, leading to the emergence of new types of phishing transactions that we term SolPhish. We define three types of SolPhish and develop a detection tool called SolPhishHunter. Utilizing SolPhishHunter, we detect a total of 8,058 instances of SolPhish and conduct an empirical analysis of these detected cases. Our analysis explores the distribution and impact of SolPhish, the characteristics of the phishers, and the relationships among phishing gangs. Particularly, the detected SolPhish transactions have resulted in nearly <inline-formula> <tex-math>${$}$ </tex-math></inline-formula>1.1 million in losses for victims. We report our detection results to the community and construct SolPhishDataset, the first Solana phishing-related dataset in academia.","PeriodicalId":13492,"journal":{"name":"IEEE Transactions on Information Forensics and Security","volume":"21 ","pages":"757-771"},"PeriodicalIF":8.0,"publicationDate":"2025-12-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"145893725","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":1,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Hybrid Password Hardening Encryption 混合密码加固加密
IF 6.8 1区 计算机科学 Q1 COMPUTER SCIENCE, THEORY & METHODS Pub Date : 2025-12-31 DOI: 10.1109/tifs.2025.3650025
Zixuan Ding, Ding Wang
{"title":"Hybrid Password Hardening Encryption","authors":"Zixuan Ding, Ding Wang","doi":"10.1109/tifs.2025.3650025","DOIUrl":"https://doi.org/10.1109/tifs.2025.3650025","url":null,"abstract":"","PeriodicalId":13492,"journal":{"name":"IEEE Transactions on Information Forensics and Security","volume":"94 1","pages":"1-1"},"PeriodicalIF":6.8,"publicationDate":"2025-12-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"145893724","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":1,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Glint: Localization of Gray Violations in Untrusted and Unreliable SRv6 Networks Glint:不可信和不可靠SRv6网络中灰色违规的定位
IF 8 1区 计算机科学 Q1 COMPUTER SCIENCE, THEORY & METHODS Pub Date : 2025-12-31 DOI: 10.1109/TIFS.2025.3649962
Kaiyang Zhao;Han Zhang;Yahui Li;Xingang Shi;Zhiliang Wang;Xia Yin;Jiankun Hu;Jianping Wu
In the Segment Routing over IPv6 (SRv6) network, a wide range of network events (e.g., attacks, intrusions, violations, malicious route announcements) may occur. Network management requires real-time monitoring of untrusted and unreliable environments (e.g., unsafe components and devices). Early localization of abnormal links causing violations in the SRv6 network helps minimize the compensation required for service unavailability. However, the overhead of the state-of-the-art methods does not scale efficiently to large-scale SRv6 networks and exhibit poor robustness to addressing various disturbances from unreliable networks. To cope with these challenges, we propose $textsf {Glint}$ , an in-band network telemetry framework to localize abnormal links in SRv6 networks. The key idea of $textsf {Glint}$ is sampling part of the information while the overall information is known. $textsf {Glint}$ provides probabilistic in-band collection to gather segment-level telemetry data, reducing overhead and improving efficiency. $textsf {Glint}$ also proposes distributed verification-based detection to enhance the trustworthiness of security assessments, further improving robustness against disturbances. In addition, we design selective telemetry that reduces telemetry reports while preserving security-relevant visibility. Our evaluations demonstrate that, compared to the state-of-the-art frameworks, $textsf {Glint}$ significantly reduces header bandwidth overhead by 75.6% and memory overhead by 48.7% while reducing false positives. We also implement $textsf {Glint}$ on the Intel Tofino switch, achieving over a 50% reduction in hardware resource consumption compared to existing methods.
在SRv6 (Segment Routing over IPv6)网络中,可能会发生各种各样的网络事件(如攻击、入侵、违规、恶意路由公告)。网络管理需要实时监控不可信和不可靠的环境(例如,不安全的组件和设备)。尽早定位SRv6网络中导致违规的异常链路,可以最大限度地减少业务不可用的补偿。然而,最先进的方法的开销不能有效地扩展到大规模的SRv6网络,并且在处理来自不可靠网络的各种干扰时表现出较差的鲁棒性。为了应对这些挑战,我们提出了$textsf {Glint}$,这是一个带内网络遥测框架,用于定位SRv6网络中的异常链路。$textsf {Glint}$的关键思想是在已知整体信息的情况下对部分信息进行采样。$textsf {Glint}$提供带内概率收集,以收集段级遥测数据,减少开销并提高效率。$textsf {Glint}$还提出了基于分布式验证的检测,以增强安全评估的可信度,进一步提高对干扰的鲁棒性。此外,我们设计了选择性遥测,减少遥测报告,同时保持与安全相关的可见性。我们的评估表明,与最先进的框架相比,$textsf {Glint}$显著降低了报头带宽开销75.6%和内存开销48.7%,同时减少了误报。我们还在Intel Tofino交换机上实现了$textsf {Glint}$,与现有方法相比,硬件资源消耗减少了50%以上。
{"title":"Glint: Localization of Gray Violations in Untrusted and Unreliable SRv6 Networks","authors":"Kaiyang Zhao;Han Zhang;Yahui Li;Xingang Shi;Zhiliang Wang;Xia Yin;Jiankun Hu;Jianping Wu","doi":"10.1109/TIFS.2025.3649962","DOIUrl":"10.1109/TIFS.2025.3649962","url":null,"abstract":"In the Segment Routing over IPv6 (SRv6) network, a wide range of network events (e.g., attacks, intrusions, violations, malicious route announcements) may occur. Network management requires real-time monitoring of untrusted and unreliable environments (e.g., unsafe components and devices). Early localization of abnormal links causing violations in the SRv6 network helps minimize the compensation required for service unavailability. However, the overhead of the state-of-the-art methods does not scale efficiently to large-scale SRv6 networks and exhibit poor robustness to addressing various disturbances from unreliable networks. To cope with these challenges, we propose <inline-formula> <tex-math>$textsf {Glint}$ </tex-math></inline-formula>, an in-band network telemetry framework to localize abnormal links in SRv6 networks. The key idea of <inline-formula> <tex-math>$textsf {Glint}$ </tex-math></inline-formula> is sampling part of the information while the overall information is known. <inline-formula> <tex-math>$textsf {Glint}$ </tex-math></inline-formula> provides probabilistic in-band collection to gather segment-level telemetry data, reducing overhead and improving efficiency. <inline-formula> <tex-math>$textsf {Glint}$ </tex-math></inline-formula> also proposes distributed verification-based detection to enhance the trustworthiness of security assessments, further improving robustness against disturbances. In addition, we design selective telemetry that reduces telemetry reports while preserving security-relevant visibility. Our evaluations demonstrate that, compared to the state-of-the-art frameworks, <inline-formula> <tex-math>$textsf {Glint}$ </tex-math></inline-formula> significantly reduces header bandwidth overhead by 75.6% and memory overhead by 48.7% while reducing false positives. We also implement <inline-formula> <tex-math>$textsf {Glint}$ </tex-math></inline-formula> on the Intel Tofino switch, achieving over a 50% reduction in hardware resource consumption compared to existing methods.","PeriodicalId":13492,"journal":{"name":"IEEE Transactions on Information Forensics and Security","volume":"21 ","pages":"812-826"},"PeriodicalIF":8.0,"publicationDate":"2025-12-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"145893726","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":1,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Semantic Entity Alignment and Non-Corresponding Reasoning for Text-to-Image Person Re-Identification 文本-图像人物再识别的语义实体对齐与非对应推理
IF 8 1区 计算机科学 Q1 COMPUTER SCIENCE, THEORY & METHODS Pub Date : 2025-12-29 DOI: 10.1109/TIFS.2025.3649361
Wanru Peng;Houjin Chen;Yanfeng Li;Jia Sun;Luyifu Chen
With the rapid development of intelligent surveillance technology, the massive amount of multimodal data (e.g., videos, images, and text) has imposed higher demands on efficient information retrieval and security. Traditional single-modal retrieval methods struggle to meet practical requirements, making multimodal image-text retrieval a research hotspot in this field. Existing approaches, however, still face challenges in fine-grained semantic alignment and suffer from rigid matching mechanisms. To address these issues, this paper introduces SeaNcr, a novel framework that integrates cross-modal semantic entity alignment with non-correspondence reasoning. Our method constructs class-level entity representations enhanced by saliency-guided masking to capture discriminative semantic features. A pseudo-frozen asynchronous optimization strategy is introduced to maintain semantic consistency across modalities by associating stable entity representations with dynamically updated encoder features. Moreover, to overcome rigid matching, we design a non-correspondence reasoning module that jointly leverages intra-modal similarity and cross-modal mutual nearest neighbor constraints, optimizing matching flexibility and generalization. Extensive experiments validate that SeaNcr significantly enhances cross-modal feature representation and retrieval robustness, achieving state-of-the-art performance on multiple person re-identification benchmarks.
随着智能监控技术的快速发展,海量的多模态数据(如视频、图像、文字等)对信息的高效检索和安全性提出了更高的要求。传统的单模态检索方法难以满足实际需求,使得多模态图像-文本检索成为该领域的研究热点。然而,现有的方法在细粒度语义对齐方面仍然面临挑战,并且受到严格匹配机制的影响。为了解决这些问题,本文引入了SeaNcr,这是一个集成了跨模态语义实体对齐和非对应推理的新框架。我们的方法构建了类级实体表示,通过显著性引导掩蔽来增强,以捕获判别语义特征。引入了一种伪冻结异步优化策略,通过将稳定的实体表示与动态更新的编码器特征相关联来保持模态之间的语义一致性。此外,为了克服刚性匹配,我们设计了一个非对应推理模块,该模块联合利用模态内相似性和跨模态相互近邻约束,优化了匹配的灵活性和泛化性。大量实验验证了SeaNcr显著增强了跨模态特征表示和检索鲁棒性,在多人再识别基准上实现了最先进的性能。
{"title":"Semantic Entity Alignment and Non-Corresponding Reasoning for Text-to-Image Person Re-Identification","authors":"Wanru Peng;Houjin Chen;Yanfeng Li;Jia Sun;Luyifu Chen","doi":"10.1109/TIFS.2025.3649361","DOIUrl":"https://doi.org/10.1109/TIFS.2025.3649361","url":null,"abstract":"With the rapid development of intelligent surveillance technology, the massive amount of multimodal data (e.g., videos, images, and text) has imposed higher demands on efficient information retrieval and security. Traditional single-modal retrieval methods struggle to meet practical requirements, making multimodal image-text retrieval a research hotspot in this field. Existing approaches, however, still face challenges in fine-grained semantic alignment and suffer from rigid matching mechanisms. To address these issues, this paper introduces SeaNcr, a novel framework that integrates cross-modal semantic entity alignment with non-correspondence reasoning. Our method constructs class-level entity representations enhanced by saliency-guided masking to capture discriminative semantic features. A pseudo-frozen asynchronous optimization strategy is introduced to maintain semantic consistency across modalities by associating stable entity representations with dynamically updated encoder features. Moreover, to overcome rigid matching, we design a non-correspondence reasoning module that jointly leverages intra-modal similarity and cross-modal mutual nearest neighbor constraints, optimizing matching flexibility and generalization. Extensive experiments validate that SeaNcr significantly enhances cross-modal feature representation and retrieval robustness, achieving state-of-the-art performance on multiple person re-identification benchmarks.","PeriodicalId":13492,"journal":{"name":"IEEE Transactions on Information Forensics and Security","volume":"21 ","pages":"772-783"},"PeriodicalIF":8.0,"publicationDate":"2025-12-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"145929599","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":1,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
IEEE Transactions on Information Forensics and Security
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1