首页 > 最新文献

IEEE Transactions on Information Forensics and Security最新文献

英文 中文
Risk-Aware Privacy Preservation for LLM Inference LLM推理的风险意识隐私保护
IF 6.8 1区 计算机科学 Q1 COMPUTER SCIENCE, THEORY & METHODS Pub Date : 2026-02-24 DOI: 10.1109/tifs.2026.3667458
Zhihuang Liu, Zhangdong Wang, Tongqing Zhou, Yonghao Tang, Yuchuan Luo, Zhiping Cai
{"title":"Risk-Aware Privacy Preservation for LLM Inference","authors":"Zhihuang Liu, Zhangdong Wang, Tongqing Zhou, Yonghao Tang, Yuchuan Luo, Zhiping Cai","doi":"10.1109/tifs.2026.3667458","DOIUrl":"https://doi.org/10.1109/tifs.2026.3667458","url":null,"abstract":"","PeriodicalId":13492,"journal":{"name":"IEEE Transactions on Information Forensics and Security","volume":"51 1","pages":""},"PeriodicalIF":6.8,"publicationDate":"2026-02-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"147279430","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":1,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
VoIP Call Identification via a Dual-Level 1D-CNN With Frame and Utterance Features 基于帧和语音特征的双级1D-CNN语音识别
IF 8 1区 计算机科学 Q1 COMPUTER SCIENCE, THEORY & METHODS Pub Date : 2026-02-24 DOI: 10.1109/TIFS.2026.3667459
Guoyuan Lin;Weiqi Luo;Peijia Zheng;Jiwu Huang
The increasing use of Voice over Internet Protocol (VoIP) technology in telecom fraud has become a serious global concern. Its ability to spoof caller IDs and IP addresses, and the use of overseas or anonymized servers make VoIP-based scams difficult to trace and regulate. As a result, distinguishing VoIP calls from conventional mobile phone calls based on voice signal characteristics is crucial for enhancing anti-fraud measures. However, existing forensic techniques often struggle to accurately identify speech transmitted via VoIP. To address this challenge, we propose a dual-level 1D-CNN that leverages both frame and utterance features for effective VoIP detection. After evaluating a range of acoustic features, we primarily focus on short-frame Mel-Frequency Cepstral Coefficients (MFCCs) due to their effectiveness in capturing VoIP characteristics. Given the frame-based processing and transmission nature of VoIP, we employ a 1D-CNN, rather than the more commonly used 2D-CNN that treats spectrograms as image, to extract frame-level codec features. Finally, we propose a dual-level classification strategy: the frame-level classifier captures encoding discrepancies within individual frames, while the utterance-level classifier aggregates these frame-level features to learn global encoding patterns through global covariance pooling. Experimental results on the VoIP Phone Call Identification Database (VPCID) demonstrate that the proposed method consistently outperforms existing approaches, delivering superior accuracy and robustness across a wide range of challenging scenarios. Moreover, comprehensive ablation studies validate the effectiveness and rationale behind the design of the proposed model architecture.
网络语音协议(VoIP)技术在电信诈骗中的应用日益广泛,已成为全球普遍关注的问题。它能够欺骗来电显示和IP地址,以及使用海外或匿名服务器,这使得基于voip的诈骗难以追踪和监管。因此,根据语音信号特征区分VoIP呼叫和传统移动电话呼叫对于加强反欺诈措施至关重要。然而,现有的法医技术往往难以准确识别通过VoIP传输的语音。为了解决这一挑战,我们提出了一种双级1D-CNN,它利用帧和话语特征进行有效的VoIP检测。在评估了一系列声学特征之后,我们主要关注短帧Mel-Frequency倒谱系数(MFCCs),因为它们在捕获VoIP特征方面很有效。考虑到VoIP基于帧的处理和传输性质,我们采用1D-CNN,而不是更常用的将频谱图视为图像的2D-CNN,来提取帧级编解码器特征。最后,我们提出了一种双级分类策略:帧级分类器捕获单个帧内的编码差异,而话语级分类器通过全局协方差池聚合这些帧级特征来学习全局编码模式。在VoIP电话呼叫识别数据库(VPCID)上的实验结果表明,所提出的方法始终优于现有方法,在各种具有挑战性的场景中提供卓越的准确性和鲁棒性。此外,综合消融研究验证了所提出模型架构设计的有效性和合理性。
{"title":"VoIP Call Identification via a Dual-Level 1D-CNN With Frame and Utterance Features","authors":"Guoyuan Lin;Weiqi Luo;Peijia Zheng;Jiwu Huang","doi":"10.1109/TIFS.2026.3667459","DOIUrl":"10.1109/TIFS.2026.3667459","url":null,"abstract":"The increasing use of Voice over Internet Protocol (VoIP) technology in telecom fraud has become a serious global concern. Its ability to spoof caller IDs and IP addresses, and the use of overseas or anonymized servers make VoIP-based scams difficult to trace and regulate. As a result, distinguishing VoIP calls from conventional mobile phone calls based on voice signal characteristics is crucial for enhancing anti-fraud measures. However, existing forensic techniques often struggle to accurately identify speech transmitted via VoIP. To address this challenge, we propose a dual-level 1D-CNN that leverages both frame and utterance features for effective VoIP detection. After evaluating a range of acoustic features, we primarily focus on short-frame Mel-Frequency Cepstral Coefficients (MFCCs) due to their effectiveness in capturing VoIP characteristics. Given the frame-based processing and transmission nature of VoIP, we employ a 1D-CNN, rather than the more commonly used 2D-CNN that treats spectrograms as image, to extract frame-level codec features. Finally, we propose a dual-level classification strategy: the frame-level classifier captures encoding discrepancies within individual frames, while the utterance-level classifier aggregates these frame-level features to learn global encoding patterns through global covariance pooling. Experimental results on the VoIP Phone Call Identification Database (VPCID) demonstrate that the proposed method consistently outperforms existing approaches, delivering superior accuracy and robustness across a wide range of challenging scenarios. Moreover, comprehensive ablation studies validate the effectiveness and rationale behind the design of the proposed model architecture.","PeriodicalId":13492,"journal":{"name":"IEEE Transactions on Information Forensics and Security","volume":"21 ","pages":"2389-2402"},"PeriodicalIF":8.0,"publicationDate":"2026-02-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"147279429","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":1,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Novel Perspective on Gradient Defense: Layer-Specific Protection Against Privacy Leakage 梯度防御的新视角:针对隐私泄露的分层保护
IF 6.8 1区 计算机科学 Q1 COMPUTER SCIENCE, THEORY & METHODS Pub Date : 2026-02-24 DOI: 10.1109/tifs.2026.3667457
Zhihao Liu, Guanghua Liu, Jia Zhang, Chenlong Wang, Tao Jiang
{"title":"A Novel Perspective on Gradient Defense: Layer-Specific Protection Against Privacy Leakage","authors":"Zhihao Liu, Guanghua Liu, Jia Zhang, Chenlong Wang, Tao Jiang","doi":"10.1109/tifs.2026.3667457","DOIUrl":"https://doi.org/10.1109/tifs.2026.3667457","url":null,"abstract":"","PeriodicalId":13492,"journal":{"name":"IEEE Transactions on Information Forensics and Security","volume":"17 1","pages":""},"PeriodicalIF":6.8,"publicationDate":"2026-02-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"147279426","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":1,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
GUARD: A Unified Open-Set and Closed-Set Gait Recognition Framework via Feature Reconstruction on Wi-Fi CSI 基于Wi-Fi CSI特征重构的统一开集和闭集步态识别框架
IF 6.8 1区 计算机科学 Q1 COMPUTER SCIENCE, THEORY & METHODS Pub Date : 2026-02-24 DOI: 10.1109/tifs.2026.3667485
Ying Liang, Wenjie Wu, Haobo Li, Lijun Cui, Jianguo Ju, Pengfei Xu
{"title":"GUARD: A Unified Open-Set and Closed-Set Gait Recognition Framework via Feature Reconstruction on Wi-Fi CSI","authors":"Ying Liang, Wenjie Wu, Haobo Li, Lijun Cui, Jianguo Ju, Pengfei Xu","doi":"10.1109/tifs.2026.3667485","DOIUrl":"https://doi.org/10.1109/tifs.2026.3667485","url":null,"abstract":"","PeriodicalId":13492,"journal":{"name":"IEEE Transactions on Information Forensics and Security","volume":"5 1","pages":""},"PeriodicalIF":6.8,"publicationDate":"2026-02-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"147279428","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":1,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Secure and Efficient Model Training Framework for Multiuser Semantic Communications via Over-the-Air Mixup 基于空中混频的多用户语义通信安全高效模型训练框架
IF 8 1区 计算机科学 Q1 COMPUTER SCIENCE, THEORY & METHODS Pub Date : 2026-02-23 DOI: 10.1109/TIFS.2026.3666908
Xun Ma;Xinchen Lyu;Chenshan Ren;Guoshun Nan;Qimei Cui
Online model training is pivotal for enabling multiuser semantic communication systems to adapt to dynamic channel conditions. However, conventional frameworks suffer from prohibitive communication overhead and vulnerabilities to privacy attacks, hindering practical deployment. This paper proposes semantic information mixup (SIMix), a secure and efficient training framework that integrates Over-the-Air Mixup (OAM) with label-aware user grouping to jointly optimize spectral efficiency and semantic security. The OAM mixes semantic features of multiple users via wireless channels, inherently obfuscating sensitive data while reducing communication overhead. A closed-form Tx-Rx scaling optimization minimizes the mean square error (MSE) of over-the-air computation under channel noise, ensuring stable convergence in low-SNR regimes. Furthermore, an extended max-clique algorithm dynamically partitions users into groups with minimal intra-label similarity, reducing model inversion attack success rates. Experiments on CIFAR-10 and Tiny ImageNet demonstrate that the proposed approach is superior in terms of communication efficiency and security, reducing communication overhead by up to 25% and attaining 17.58 dB PSNR (20.98 dB reduction) under inversion attack and reducing 13.44% attack success rate under label inference attack, while achieving comparable transmission accuracy.
在线模型训练是使多用户语义通信系统适应动态信道条件的关键。然而,传统框架受到通信开销过大和易受隐私攻击的影响,阻碍了实际部署。本文提出了一种安全高效的训练框架——语义信息混合(SIMix),该框架将空中混合(OAM)与标签感知用户分组相结合,共同优化频谱效率和语义安全。OAM通过无线信道混合了多个用户的语义特征,在减少通信开销的同时,固有地混淆了敏感数据。封闭形式的Tx-Rx缩放优化最小化了信道噪声下空中计算的均方误差(MSE),确保了低信噪比条件下的稳定收敛。此外,扩展的最大团算法将用户动态划分为标签内相似度最小的组,降低了模型反演攻击的成功率。在ci远-10和Tiny ImageNet上进行的实验表明,该方法在通信效率和安全性方面具有优势,通信开销降低了25%,在反向攻击下达到17.58 dB的PSNR(降低20.98 dB),在标签推理攻击下降低13.44%的攻击成功率,同时达到相当的传输精度。
{"title":"Secure and Efficient Model Training Framework for Multiuser Semantic Communications via Over-the-Air Mixup","authors":"Xun Ma;Xinchen Lyu;Chenshan Ren;Guoshun Nan;Qimei Cui","doi":"10.1109/TIFS.2026.3666908","DOIUrl":"https://doi.org/10.1109/TIFS.2026.3666908","url":null,"abstract":"Online model training is pivotal for enabling multiuser semantic communication systems to adapt to dynamic channel conditions. However, conventional frameworks suffer from prohibitive communication overhead and vulnerabilities to privacy attacks, hindering practical deployment. This paper proposes semantic information mixup (SIMix), a secure and efficient training framework that integrates Over-the-Air Mixup (OAM) with label-aware user grouping to jointly optimize spectral efficiency and semantic security. The OAM mixes semantic features of multiple users via wireless channels, inherently obfuscating sensitive data while reducing communication overhead. A closed-form Tx-Rx scaling optimization minimizes the mean square error (MSE) of over-the-air computation under channel noise, ensuring stable convergence in low-SNR regimes. Furthermore, an extended max-clique algorithm dynamically partitions users into groups with minimal intra-label similarity, reducing model inversion attack success rates. Experiments on CIFAR-10 and Tiny ImageNet demonstrate that the proposed approach is superior in terms of communication efficiency and security, reducing communication overhead by up to 25% and attaining 17.58 dB PSNR (20.98 dB reduction) under inversion attack and reducing 13.44% attack success rate under label inference attack, while achieving comparable transmission accuracy.","PeriodicalId":13492,"journal":{"name":"IEEE Transactions on Information Forensics and Security","volume":"21 ","pages":"2358-2372"},"PeriodicalIF":8.0,"publicationDate":"2026-02-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"147299681","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":1,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Decoupled and Privacy-Preserving Key Generation in ABE Under the Minimal Disclosure Principle 最小披露原则下的ABE解耦和保密密钥生成
IF 8 1区 计算机科学 Q1 COMPUTER SCIENCE, THEORY & METHODS Pub Date : 2026-02-23 DOI: 10.1109/TIFS.2026.3666910
Zhiqiang Zhang;Youwen Zhu;Xiaodong Yang;Xiaohui Ding;Changhee Hahn;Jian Wang;Junbeom Hur
Attribute-Based Encryption (ABE) enables fine-grained access control over outsourced data, but its key generation process typically requires users to disclose their complete attribute sets, introducing significant privacy risks. Existing privacy-preserving approaches—such as those based on zero-knowledge proofs or tightly coupled interactive protocols—suffer from limited scalability, high communication costs, and insufficient support for selective attribute disclosure. To address these limitations, we propose a privacy-enhancing key generation protocol guided by the principle of Minimal Disclosure, which ensures that users disclose only the minimally necessary subset of attributes required for authorization. Our protocol decouples attribute verification from key issuance: users first obtain cryptographically verifiable attribute tokens, and later issue blinded key requests over selectively chosen attributes. This design enables selective disclosure, supports reusable attribute credentials, and enhances user autonomy. To improve scalability, we introduce a lightweight batch verification mechanism that reduces computation and communication overhead for the attribute authority. We prove that our protocol achieves the binding and hiding properties under standard cryptographic assumptions, and we formally verify these guarantees in the symbolic model using the ProVerif tool. In addition, we propose two privacy metrics—Attribute Inference Gain (AIG) and Privacy Gain (PG)—alongside an entropy-based analysis to quantify resistance against attribute inference attacks. Experimental results show that our scheme effectively mitigates inference leakage while offering substantial efficiency gains compared to existing schemes.
基于属性的加密(ABE)支持对外包数据进行细粒度的访问控制,但其密钥生成过程通常要求用户公开其完整的属性集,从而引入了重大的隐私风险。现有的隐私保护方法(例如基于零知识证明或紧密耦合交互协议的方法)存在可扩展性有限、通信成本高以及对选择性属性披露支持不足的问题。为了解决这些限制,我们提出了一种以最小披露原则为指导的增强隐私的密钥生成协议,该协议确保用户仅披露授权所需的最小必要属性子集。我们的协议将属性验证与密钥发布解耦:用户首先获得可加密验证的属性令牌,然后对选择性选择的属性发出盲法密钥请求。这种设计支持选择性公开,支持可重用的属性凭证,并增强用户自主权。为了提高可伸缩性,我们引入了一种轻量级的批验证机制,以减少属性权限的计算和通信开销。我们证明了我们的协议在标准密码学假设下实现了绑定和隐藏属性,并使用ProVerif工具在符号模型中正式验证了这些保证。此外,我们提出了两个隐私指标-属性推理增益(AIG)和隐私增益(PG) -以及基于熵的分析来量化对属性推理攻击的抵抗力。实验结果表明,与现有方案相比,我们的方案有效地减轻了推理泄漏,同时提供了可观的效率提升。
{"title":"Decoupled and Privacy-Preserving Key Generation in ABE Under the Minimal Disclosure Principle","authors":"Zhiqiang Zhang;Youwen Zhu;Xiaodong Yang;Xiaohui Ding;Changhee Hahn;Jian Wang;Junbeom Hur","doi":"10.1109/TIFS.2026.3666910","DOIUrl":"https://doi.org/10.1109/TIFS.2026.3666910","url":null,"abstract":"Attribute-Based Encryption (ABE) enables fine-grained access control over outsourced data, but its key generation process typically requires users to disclose their complete attribute sets, introducing significant privacy risks. Existing privacy-preserving approaches—such as those based on zero-knowledge proofs or tightly coupled interactive protocols—suffer from limited scalability, high communication costs, and insufficient support for selective attribute disclosure. To address these limitations, we propose a privacy-enhancing key generation protocol guided by the principle of Minimal Disclosure, which ensures that users disclose only the minimally necessary subset of attributes required for authorization. Our protocol decouples attribute verification from key issuance: users first obtain cryptographically verifiable attribute tokens, and later issue blinded key requests over selectively chosen attributes. This design enables selective disclosure, supports reusable attribute credentials, and enhances user autonomy. To improve scalability, we introduce a lightweight batch verification mechanism that reduces computation and communication overhead for the attribute authority. We prove that our protocol achieves the binding and hiding properties under standard cryptographic assumptions, and we formally verify these guarantees in the symbolic model using the ProVerif tool. In addition, we propose two privacy metrics—Attribute Inference Gain (AIG) and Privacy Gain (PG)—alongside an entropy-based analysis to quantify resistance against attribute inference attacks. Experimental results show that our scheme effectively mitigates inference leakage while offering substantial efficiency gains compared to existing schemes.","PeriodicalId":13492,"journal":{"name":"IEEE Transactions on Information Forensics and Security","volume":"21 ","pages":"2478-2491"},"PeriodicalIF":8.0,"publicationDate":"2026-02-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"147362497","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":1,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
PPOM-Attack: A Substitute Model-Free Perturbation Prediction and Optimization Method for Black-Box Adversarial Attack Against Face Recognition ppom攻击:一种替代无模型摄动预测和优化方法的黑盒对抗攻击人脸识别
IF 8 1区 计算机科学 Q1 COMPUTER SCIENCE, THEORY & METHODS Pub Date : 2026-02-23 DOI: 10.1109/TIFS.2026.3666853
Ke Cheng;Jixin Zhang;Haiyun Li;Zipeng Zhong;Mingwu Zhang;Zheng Qin
Face recognition (FR) brings convenience to people’s lives while also posing security risks. Some malicious users employ FR attacks to impersonate the identity of a target. To reveal the security risks, recent work has attacked black-box FR models by utilizing substitute models to generate adversarial face images that are misclassified as the target individual due to the attack transferability of substitute models. However, the substitute models cannot accurately approximate the target model that leads to a decrease in FR attack success rate and adversarial face image quality. To address the issue, we propose the PPOM-Attack, a substitute model-free Perturbation Prediction and Optimization Method for black-box adversarial Attack against face recognition. PPOM-Attack directly obtains feedback from the target model instead of using substitute models, it avoids any discrepancy with the attack objective. To achieve this goal, we design a proximal policy optimization (PPO)-based agent to predict the perturbation regions in the face image and self-adaptively disturb the regions. To maintain high-quality adversarial face images, we further propose a minimum brightness offsets method specifically designed to generate perturbations that minimize the feature embedding difference between the adversarial and targeted face images. The experimental results show that our approach outperforms state-of-the-art FR attack methods by an average of 21.7% in terms of attack success rate, while achieving better image quality on seven FR models.
人脸识别在给人们的生活带来便利的同时,也带来了安全隐患。一些恶意用户使用FR攻击来冒充目标的身份。为了揭示安全风险,最近的研究利用替代模型来攻击黑盒FR模型,利用替代模型生成对抗的人脸图像,由于替代模型的攻击可转移性,这些人脸图像被错误地分类为目标个体。然而,替代模型不能准确地逼近目标模型,导致FR攻击成功率和对抗人脸图像质量下降。为了解决这个问题,我们提出了一种替代无模型摄动预测和优化方法,用于人脸识别的黑盒对抗性攻击。PPOM-Attack不使用替代模型,直接从目标模型中获取反馈,避免了与攻击目标的不一致。为了实现这一目标,我们设计了一个基于近端策略优化(PPO)的智能体来预测人脸图像中的扰动区域并自适应干扰这些区域。为了保持高质量的对抗人脸图像,我们进一步提出了一种最小亮度偏移方法,该方法专门用于产生扰动,使对抗人脸图像和目标人脸图像之间的特征嵌入差异最小化。实验结果表明,我们的方法在攻击成功率方面比目前最先进的FR攻击方法平均高出21.7%,同时在7个FR模型上获得了更好的图像质量。
{"title":"PPOM-Attack: A Substitute Model-Free Perturbation Prediction and Optimization Method for Black-Box Adversarial Attack Against Face Recognition","authors":"Ke Cheng;Jixin Zhang;Haiyun Li;Zipeng Zhong;Mingwu Zhang;Zheng Qin","doi":"10.1109/TIFS.2026.3666853","DOIUrl":"https://doi.org/10.1109/TIFS.2026.3666853","url":null,"abstract":"Face recognition (FR) brings convenience to people’s lives while also posing security risks. Some malicious users employ FR attacks to impersonate the identity of a target. To reveal the security risks, recent work has attacked black-box FR models by utilizing substitute models to generate adversarial face images that are misclassified as the target individual due to the attack transferability of substitute models. However, the substitute models cannot accurately approximate the target model that leads to a decrease in FR attack success rate and adversarial face image quality. To address the issue, we propose the <sc>PPOM-Attack</small>, a substitute model-free Perturbation Prediction and Optimization Method for black-box adversarial Attack against face recognition. <sc>PPOM-Attack</small> directly obtains feedback from the target model instead of using substitute models, it avoids any discrepancy with the attack objective. To achieve this goal, we design a proximal policy optimization (PPO)-based agent to predict the perturbation regions in the face image and self-adaptively disturb the regions. To maintain high-quality adversarial face images, we further propose a minimum brightness offsets method specifically designed to generate perturbations that minimize the feature embedding difference between the adversarial and targeted face images. The experimental results show that our approach outperforms state-of-the-art FR attack methods by an average of 21.7% in terms of attack success rate, while achieving better image quality on seven FR models.","PeriodicalId":13492,"journal":{"name":"IEEE Transactions on Information Forensics and Security","volume":"21 ","pages":"2580-2595"},"PeriodicalIF":8.0,"publicationDate":"2026-02-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"147440514","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":1,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Model Inversion Attack Against Federated Unlearning 针对联邦学习的模型反转攻击
IF 8 1区 计算机科学 Q1 COMPUTER SCIENCE, THEORY & METHODS Pub Date : 2026-02-19 DOI: 10.1109/TIFS.2026.3666295
Lei Zhou;Youwen Zhu;Rongke Liu
In response to emerging regulations on the “right to be forgotten”, federated unlearning (FU) has been proposed to ensure privacy compliance by efficiently eliminating the influence of specific data from federated learning (FL) models. However, existing FU studies primarily focus on improving unlearning efficiency, with little attention given to the potential privacy risks introduced by FU itself. To bridge this research gap, we propose a novel federated unlearning inversion attack (FUIA) to expose potential privacy leakage in FU. This work represents the first systematic study on the privacy vulnerabilities inherent in FU. FUIA can be applied to three major FU scenarios: sample unlearning, client unlearning, and class unlearning, demonstrating broad applicability and threat potential. Specifically, the server, acting as an honest-but-curious attacker, continuously records model parameter changes throughout the unlearning process and analyzes the differences before and after unlearning to infer the gradient information of forgotten data, enabling the reconstruction of its features or labels. FUIA directly undermines the goal of FU to eliminate the influence of specific data, exploiting vulnerabilities in the FU process to reconstruct forgotten data, thereby revealing flaws in privacy protection. Moreover, we explore two potential defense strategies that introduce a trade-off between privacy protection and model performance. Extensive experiments on multiple benchmark datasets and various FU methods demonstrate that FUIA effectively reveals private information of forgotten data.
为了应对关于“被遗忘权”的新法规,提出了联邦学习(FU),通过有效消除联邦学习(FL)模型中特定数据的影响来确保隐私合规性。然而,现有的FU研究主要侧重于提高遗忘效率,很少关注FU本身带来的潜在隐私风险。为了弥补这一研究空白,我们提出了一种新的联合反学习攻击(FUIA)来暴露FU中潜在的隐私泄露。这项工作代表了对FU固有的隐私漏洞的第一个系统研究。FUIA可以应用于三种主要的FU场景:样本遗忘、客户端遗忘和类遗忘,具有广泛的适用性和潜在的威胁。具体来说,服务器作为一个诚实但好奇的攻击者,在整个学习过程中不断记录模型参数的变化,并分析学习前后的差异,推断被遗忘数据的梯度信息,从而重建其特征或标签。FUIA直接破坏了FU消除特定数据影响的目标,利用FU过程中的漏洞重构被遗忘的数据,从而暴露出隐私保护的缺陷。此外,我们还探讨了两种潜在的防御策略,它们在隐私保护和模型性能之间引入了权衡。在多个基准数据集和各种FU方法上的大量实验表明,FUIA可以有效地揭示被遗忘数据的私有信息。
{"title":"Model Inversion Attack Against Federated Unlearning","authors":"Lei Zhou;Youwen Zhu;Rongke Liu","doi":"10.1109/TIFS.2026.3666295","DOIUrl":"10.1109/TIFS.2026.3666295","url":null,"abstract":"In response to emerging regulations on the “right to be forgotten”, federated unlearning (FU) has been proposed to ensure privacy compliance by efficiently eliminating the influence of specific data from federated learning (FL) models. However, existing FU studies primarily focus on improving unlearning efficiency, with little attention given to the potential privacy risks introduced by FU itself. To bridge this research gap, we propose a novel federated unlearning inversion attack (FUIA) to expose potential privacy leakage in FU. This work represents the first systematic study on the privacy vulnerabilities inherent in FU. FUIA can be applied to three major FU scenarios: sample unlearning, client unlearning, and class unlearning, demonstrating broad applicability and threat potential. Specifically, the server, acting as an honest-but-curious attacker, continuously records model parameter changes throughout the unlearning process and analyzes the differences before and after unlearning to infer the gradient information of forgotten data, enabling the reconstruction of its features or labels. FUIA directly undermines the goal of FU to eliminate the influence of specific data, exploiting vulnerabilities in the FU process to reconstruct forgotten data, thereby revealing flaws in privacy protection. Moreover, we explore two potential defense strategies that introduce a trade-off between privacy protection and model performance. Extensive experiments on multiple benchmark datasets and various FU methods demonstrate that FUIA effectively reveals private information of forgotten data.","PeriodicalId":13492,"journal":{"name":"IEEE Transactions on Information Forensics and Security","volume":"21 ","pages":"2342-2357"},"PeriodicalIF":8.0,"publicationDate":"2026-02-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"146231164","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":1,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
LLMBA: Efficient Behavior Analytics via Large Pretrained Models in Zero Trust Networks LLMBA:零信任网络中基于大型预训练模型的高效行为分析
IF 8 1区 计算机科学 Q1 COMPUTER SCIENCE, THEORY & METHODS Pub Date : 2026-02-19 DOI: 10.1109/TIFS.2026.3666459
Senming Yan;Lei Shi;Wei Wang;Jing Ren;Ying Li;Limin Sun
Guided by the principle of “Never Trust, Always Verify”, Zero Trust Architecture (ZTA) mandates continuous monitoring and analysis of users and entities, highlighting the critical role of behavior analytics. However, the growing volume of audit data and its complex contextual information render many existing behavior analytics methods insufficient. Moreover, most approaches rely on high-quality labeled data for supervised training, limiting their effectiveness against previously unseen malicious behaviors. To address these challenges, we propose the Large Language Model for Behavior Analytics (LLMBA) framework. LLMBA leverages a Large Language Model (LLM) to analyze behavioral patterns of internal users and entities, capitalizing on the LLM’s strong ability to model sequential data. We introduce a multi-level behavior encoding scheme to capture both contextual and temporal information from behavior records, producing rich input representations for the LLM-enhanced model. The LLM is fine-tuned using self-supervised learning, enabling the detection of unknown malicious behaviors. To reduce the computational and storage overhead inherent in LLMs, we apply knowledge distillation to compress the model while maintaining high detection performance. Extensive experiments on the CERT Insider Threat dataset demonstrate that LLMBA outperforms state-of-the-art baselines in detection accuracy. Furthermore, the compressed student model achieves superior performance compared with existing methods under comparable runtime constraints, making LLMBA highly suitable for real-world deployment.
在“永不信任,永远验证”的原则指导下,零信任架构(Zero Trust Architecture,简称ZTA)要求对用户和实体进行持续监控和分析,突出了行为分析的关键作用。然而,不断增长的审计数据量及其复杂的上下文信息使得许多现有的行为分析方法不足。此外,大多数方法依赖于高质量的标记数据进行监督训练,限制了它们对以前未见过的恶意行为的有效性。为了应对这些挑战,我们提出了行为分析大语言模型(LLMBA)框架。LLMBA利用大型语言模型(LLM)来分析内部用户和实体的行为模式,利用LLM对顺序数据建模的强大能力。我们引入了一个多层次的行为编码方案,从行为记录中捕获上下文和时间信息,为llm增强模型生成丰富的输入表示。LLM使用自监督学习进行微调,从而能够检测未知的恶意行为。为了减少llm固有的计算和存储开销,我们应用知识蒸馏来压缩模型,同时保持较高的检测性能。在CERT内部威胁数据集上进行的大量实验表明,LLMBA在检测精度方面优于最先进的基线。此外,与现有方法相比,压缩的学生模型在可比较的运行时约束下具有更好的性能,使LLMBA非常适合实际部署。
{"title":"LLMBA: Efficient Behavior Analytics via Large Pretrained Models in Zero Trust Networks","authors":"Senming Yan;Lei Shi;Wei Wang;Jing Ren;Ying Li;Limin Sun","doi":"10.1109/TIFS.2026.3666459","DOIUrl":"10.1109/TIFS.2026.3666459","url":null,"abstract":"Guided by the principle of “Never Trust, Always Verify”, Zero Trust Architecture (ZTA) mandates continuous monitoring and analysis of users and entities, highlighting the critical role of behavior analytics. However, the growing volume of audit data and its complex contextual information render many existing behavior analytics methods insufficient. Moreover, most approaches rely on high-quality labeled data for supervised training, limiting their effectiveness against previously unseen malicious behaviors. To address these challenges, we propose the Large Language Model for Behavior Analytics (LLMBA) framework. LLMBA leverages a Large Language Model (LLM) to analyze behavioral patterns of internal users and entities, capitalizing on the LLM’s strong ability to model sequential data. We introduce a multi-level behavior encoding scheme to capture both contextual and temporal information from behavior records, producing rich input representations for the LLM-enhanced model. The LLM is fine-tuned using self-supervised learning, enabling the detection of unknown malicious behaviors. To reduce the computational and storage overhead inherent in LLMs, we apply knowledge distillation to compress the model while maintaining high detection performance. Extensive experiments on the CERT Insider Threat dataset demonstrate that LLMBA outperforms state-of-the-art baselines in detection accuracy. Furthermore, the compressed student model achieves superior performance compared with existing methods under comparable runtime constraints, making LLMBA highly suitable for real-world deployment.","PeriodicalId":13492,"journal":{"name":"IEEE Transactions on Information Forensics and Security","volume":"21 ","pages":"2403-2415"},"PeriodicalIF":8.0,"publicationDate":"2026-02-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"146231022","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":1,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Rethinking Cross-Table Quantization Step Estimation: From Global and Local Perspectives 重新思考跨表量化步长估计:从全局和局部的角度
IF 8 1区 计算机科学 Q1 COMPUTER SCIENCE, THEORY & METHODS Pub Date : 2026-02-19 DOI: 10.1109/TIFS.2026.3666307
Xin Cheng;Hao Wang;Xiangyang Luo;Bin Ma;Baowei Wang;Bin Li;Jinwei Wang
The quantization step is a crucial parameter in the JPEG compression process, and provides prior knowledge for JPEG image steganography and forensics. Existing neural network-based methods typically estimate the quantization steps for all discrete cosine transform (DCT) subbands jointly, by treating the entire quantization table as a unified input and leveraging the inter-subband relationships. However, subband relationships vary across different quantization tables, leading to poor generalization for methods that rely heavily on such relationships. To address the above issues, we depart from the strategy that relies on inter-subband relationships and instead train the model on a specific single subband. To compensate for the possible decrease in accuracy due to the lack of relationships between subbands, we extract the ranking features and histogram features from the DCT coefficient histograms of the subbands. Ranking features capture local patterns in DCT histograms by modeling the relative relationships between neighboring coefficients, thereby compensating for the absence of local detail. On the other hand, histogram features represent the overall distribution pattern of the DCT coefficient histograms and capture the global trends and statistical properties in the subbands. We subsequently employ convolutional groups and multilayer perceptron (MLP) structures to extract compression artifacts from these two features. Finally, we introduce a comprehensive evaluation metric, called GenAQt, to quantify the algorithm’s generalization ability across quantization tables. The experimental results demonstrate that our method maintains high accuracy across quantization tables, with RelGenAQt (relative accuracy decrease) exceeding 81% and AbsGenAQt (absolute accuracy decrease) being less than 0.38.
量化步骤是JPEG压缩过程中的关键参数,为JPEG图像隐写和取证提供了先验知识。现有的基于神经网络的方法通常通过将整个量化表作为统一输入并利用子带间关系来联合估计所有离散余弦变换(DCT)子带的量化步长。然而,子带关系在不同的量化表中有所不同,导致严重依赖此类关系的方法泛化性差。为了解决上述问题,我们放弃了依赖于子带间关系的策略,而是在特定的单个子带上训练模型。为了弥补由于子带之间缺乏关系而可能导致的精度下降,我们从子带的DCT系数直方图中提取排序特征和直方图特征。排序特征通过建模相邻系数之间的相对关系来捕获DCT直方图中的局部模式,从而补偿局部细节的缺失。另一方面,直方图特征代表了DCT系数直方图的总体分布格局,并捕获了子带中的全局趋势和统计特性。随后,我们使用卷积群和多层感知器(MLP)结构从这两个特征中提取压缩伪像。最后,我们引入了一个称为GenAQt的综合评估指标来量化算法在量化表中的泛化能力。实验结果表明,该方法在各量化表间保持较高的精度,RelGenAQt(相对精度下降)超过81%,AbsGenAQt(绝对精度下降)小于0.38。
{"title":"Rethinking Cross-Table Quantization Step Estimation: From Global and Local Perspectives","authors":"Xin Cheng;Hao Wang;Xiangyang Luo;Bin Ma;Baowei Wang;Bin Li;Jinwei Wang","doi":"10.1109/TIFS.2026.3666307","DOIUrl":"10.1109/TIFS.2026.3666307","url":null,"abstract":"The quantization step is a crucial parameter in the JPEG compression process, and provides prior knowledge for JPEG image steganography and forensics. Existing neural network-based methods typically estimate the quantization steps for all discrete cosine transform (DCT) subbands jointly, by treating the entire quantization table as a unified input and leveraging the inter-subband relationships. However, subband relationships vary across different quantization tables, leading to poor generalization for methods that rely heavily on such relationships. To address the above issues, we depart from the strategy that relies on inter-subband relationships and instead train the model on a specific single subband. To compensate for the possible decrease in accuracy due to the lack of relationships between subbands, we extract the ranking features and histogram features from the DCT coefficient histograms of the subbands. Ranking features capture local patterns in DCT histograms by modeling the relative relationships between neighboring coefficients, thereby compensating for the absence of local detail. On the other hand, histogram features represent the overall distribution pattern of the DCT coefficient histograms and capture the global trends and statistical properties in the subbands. We subsequently employ convolutional groups and multilayer perceptron (MLP) structures to extract compression artifacts from these two features. Finally, we introduce a comprehensive evaluation metric, called GenAQt, to quantify the algorithm’s generalization ability across quantization tables. The experimental results demonstrate that our method maintains high accuracy across quantization tables, with RelGenAQt (relative accuracy decrease) exceeding 81% and AbsGenAQt (absolute accuracy decrease) being less than 0.38.","PeriodicalId":13492,"journal":{"name":"IEEE Transactions on Information Forensics and Security","volume":"21 ","pages":"2326-2341"},"PeriodicalIF":8.0,"publicationDate":"2026-02-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"146231018","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":1,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
IEEE Transactions on Information Forensics and Security
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1