首页 > 最新文献

IEEE Transactions on Information Forensics and Security最新文献

英文 中文
MT-DEGCL: Multi-Task Encrypted Traffic Classification With Dual Embedding and Graph Contrastive Learning 基于双嵌入和图对比学习的多任务加密流量分类
IF 8 1区 计算机科学 Q1 COMPUTER SCIENCE, THEORY & METHODS Pub Date : 2026-02-12 DOI: 10.1109/TIFS.2026.3664007
Xiaolan Zhu;Junfeng Wang;Wenhan Ge;Xinbo Han
Although encryption offers strong anonymity, it also facilitates the concealment of malicious activities, allowing adversaries to evade detection, and posing a great challenge to cybersecurity surveillance. Many existing encrypted traffic classification methods struggle to integrate flow- and packet-level tasks effectively, as they are trained independently, which is redundancy. Additionally, packet header and payload are treated equally, leading to the rich information in raw bytes remains fully unexplored, particularly in the abundant payload data. Moreover, they neglect the semantic invariance and common features between data samples, which ultimately results in suboptimal performance. To address these challenges, we propose an effective Multi-Task model using Dual Embedding and Graph Contrastive Learning (MT-DEGCL). Based on the byte-packet-flow structure of network traffic, a parallel dual embedding embeds the header and payload separately, followed by a cross-gated feature fusion strategy to capture the strong local packet-level representation. Then, we construct the traffic interaction graph and further utilize graph contrastive learning to extract the robust global flow-level representation. Finally, a multi-task model is trained for joint flow- and packet-level classification, leveraging the complementary learning between tasks to enhance overall performance. The experimental results on four real datasets highlight the effectiveness of MT-DEGCL, demonstrating superior performance in both tasks. Specifically, on the ISCX-Tor dataset, MT-DEGCL achieves F1 scores of 98.63% for flow-level classification and 98.10% at the packet level, surpassing the state-of-the-art (i.e., DE-GNN) by 2.03% and 83.21%, respectively. Furthermore, MT-DEGCL maximizes the rich information in raw payload bytes, significantly reducing or even nearly eliminating classification loss when using only payload data.
虽然加密提供了强大的匿名性,但它也有助于隐藏恶意活动,使对手能够逃避检测,并对网络安全监控提出了巨大挑战。许多现有的加密流分类方法都是独立训练的,难以有效地整合流级和包级任务,存在冗余。此外,数据包头和有效负载被平等对待,导致原始字节中的丰富信息仍然完全未被探索,特别是在丰富的有效负载数据中。此外,它们忽略了数据样本之间的语义不变性和共同特征,最终导致性能次优。为了解决这些挑战,我们提出了一种使用双嵌入和图对比学习(MT-DEGCL)的有效多任务模型。基于网络流量的字节包流结构,采用并行双嵌入方法分别嵌入报头和有效负载,然后采用交叉门控特征融合策略捕获强本地包级表示。然后,构建交通交互图,并进一步利用图对比学习提取鲁棒的全局流级表示。最后,训练多任务模型进行流级和包级联合分类,利用任务之间的互补学习来提高整体性能。在四个真实数据集上的实验结果突出了MT-DEGCL的有效性,在两个任务上都表现出优异的性能。具体来说,在ISCX-Tor数据集上,MT-DEGCL在流级分类上达到了98.63%的F1分数,在包级分类上达到了98.10%的F1分数,分别超过了最先进的(即DE-GNN) 2.03%和83.21%。此外,MT-DEGCL在原始有效载荷字节中最大化了丰富的信息,在仅使用有效载荷数据时显著减少甚至几乎消除了分类损失。
{"title":"MT-DEGCL: Multi-Task Encrypted Traffic Classification With Dual Embedding and Graph Contrastive Learning","authors":"Xiaolan Zhu;Junfeng Wang;Wenhan Ge;Xinbo Han","doi":"10.1109/TIFS.2026.3664007","DOIUrl":"10.1109/TIFS.2026.3664007","url":null,"abstract":"Although encryption offers strong anonymity, it also facilitates the concealment of malicious activities, allowing adversaries to evade detection, and posing a great challenge to cybersecurity surveillance. Many existing encrypted traffic classification methods struggle to integrate flow- and packet-level tasks effectively, as they are trained independently, which is redundancy. Additionally, packet header and payload are treated equally, leading to the rich information in raw bytes remains fully unexplored, particularly in the abundant payload data. Moreover, they neglect the semantic invariance and common features between data samples, which ultimately results in suboptimal performance. To address these challenges, we propose an effective Multi-Task model using Dual Embedding and Graph Contrastive Learning (MT-DEGCL). Based on the byte-packet-flow structure of network traffic, a parallel dual embedding embeds the header and payload separately, followed by a cross-gated feature fusion strategy to capture the strong local packet-level representation. Then, we construct the traffic interaction graph and further utilize graph contrastive learning to extract the robust global flow-level representation. Finally, a multi-task model is trained for joint flow- and packet-level classification, leveraging the complementary learning between tasks to enhance overall performance. The experimental results on four real datasets highlight the effectiveness of MT-DEGCL, demonstrating superior performance in both tasks. Specifically, on the ISCX-Tor dataset, MT-DEGCL achieves F1 scores of 98.63% for flow-level classification and 98.10% at the packet level, surpassing the state-of-the-art (i.e., DE-GNN) by 2.03% and 83.21%, respectively. Furthermore, MT-DEGCL maximizes the rich information in raw payload bytes, significantly reducing or even nearly eliminating classification loss when using only payload data.","PeriodicalId":13492,"journal":{"name":"IEEE Transactions on Information Forensics and Security","volume":"21 ","pages":"2220-2235"},"PeriodicalIF":8.0,"publicationDate":"2026-02-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"146169663","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":1,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Expressive and Fully Policy-Hidden Attribute-Based Searchable Encryption Scheme for Multi-Owner 基于表达性和完全策略隐藏属性的多所有者可搜索加密方案
IF 8 1区 计算机科学 Q1 COMPUTER SCIENCE, THEORY & METHODS Pub Date : 2026-02-12 DOI: 10.1109/TIFS.2026.3663992
Qing Miao;Jiguo Li;Yang Lu;Hang Cheng;Yichen Zhang;Jian Shen
As cloud computing advances, data owners increasingly upload large volumes of data to the cloud. Attribute-based searchable encryption (ABSE) empowers data owners to manage fine-grained access over encrypted cloud files, and supports keyword-based search for authorized users. However, current multi-owner searchable encryption schemes often suffer from efficiency limitations and vulnerabilities to keyword guessing attacks. Furthermore, access policies are typically stored in plain form, exposing confidential details about data owners and authorized users. To tackle the aforementioned issues, we put forward an expressive attribute-based searchable encryption scheme with full policy concealment. Our design leverages the reduced ordered binary decision diagram (ROBDD) for access control targeting multi-user and multi-owner environments. In our scheme, users can flexibly select data owners and utilize a single trapdoor to search across shared datasets. The integration of a warrant server that signs obfuscated keywords prevents the cloud server from launching effective keyword guessing attacks. The adoption of ROBDD enables complex access policies via boolean operations, thereby significantly enhancing the efficiency and flexibility of access control. Full policy hiding is achieved by mapping ROBDD paths to an improved bloom filter, preventing access policy leakage. We present formal definitions and security models of the proposed approach, along with rigorous security proofs. Performance evaluation is conducted through theoretical analysis and simulations. Experimental indicate that our scheme achieves superior efficiency over state-of-the-art alternatives, offering a robust solution for secure and flexible cloud data management.
随着云计算的发展,数据所有者越来越多地将大量数据上传到云端。基于属性的可搜索加密(ABSE)使数据所有者能够管理对加密云文件的细粒度访问,并支持对授权用户进行基于关键字的搜索。然而,目前的多所有者可搜索加密方案往往存在效率限制和易受关键字猜测攻击的问题。此外,访问策略通常以普通形式存储,暴露有关数据所有者和授权用户的机密详细信息。为了解决上述问题,我们提出了一种基于表达性属性的全策略隐藏可搜索加密方案。我们的设计利用了简化有序二进制决策图(ROBDD)来进行针对多用户和多所有者环境的访问控制。在我们的方案中,用户可以灵活地选择数据所有者,并利用单个陷阱门在共享数据集之间进行搜索。集成对模糊关键字进行签名的授权服务器,可以防止云服务器发起有效的关键字猜测攻击。ROBDD的采用通过布尔运算实现了复杂的访问策略,从而大大提高了访问控制的效率和灵活性。通过将ROBDD路径映射到改进的bloom过滤器来实现完整的策略隐藏,从而防止访问策略泄漏。我们给出了所建议方法的正式定义和安全模型,以及严格的安全性证明。通过理论分析和仿真进行了性能评估。实验表明,我们的方案比最先进的方案具有更高的效率,为安全灵活的云数据管理提供了强大的解决方案。
{"title":"Expressive and Fully Policy-Hidden Attribute-Based Searchable Encryption Scheme for Multi-Owner","authors":"Qing Miao;Jiguo Li;Yang Lu;Hang Cheng;Yichen Zhang;Jian Shen","doi":"10.1109/TIFS.2026.3663992","DOIUrl":"10.1109/TIFS.2026.3663992","url":null,"abstract":"As cloud computing advances, data owners increasingly upload large volumes of data to the cloud. Attribute-based searchable encryption (ABSE) empowers data owners to manage fine-grained access over encrypted cloud files, and supports keyword-based search for authorized users. However, current multi-owner searchable encryption schemes often suffer from efficiency limitations and vulnerabilities to keyword guessing attacks. Furthermore, access policies are typically stored in plain form, exposing confidential details about data owners and authorized users. To tackle the aforementioned issues, we put forward an expressive attribute-based searchable encryption scheme with full policy concealment. Our design leverages the reduced ordered binary decision diagram (ROBDD) for access control targeting multi-user and multi-owner environments. In our scheme, users can flexibly select data owners and utilize a single trapdoor to search across shared datasets. The integration of a warrant server that signs obfuscated keywords prevents the cloud server from launching effective keyword guessing attacks. The adoption of ROBDD enables complex access policies via boolean operations, thereby significantly enhancing the efficiency and flexibility of access control. Full policy hiding is achieved by mapping ROBDD paths to an improved bloom filter, preventing access policy leakage. We present formal definitions and security models of the proposed approach, along with rigorous security proofs. Performance evaluation is conducted through theoretical analysis and simulations. Experimental indicate that our scheme achieves superior efficiency over state-of-the-art alternatives, offering a robust solution for secure and flexible cloud data management.","PeriodicalId":13492,"journal":{"name":"IEEE Transactions on Information Forensics and Security","volume":"21 ","pages":"2416-2429"},"PeriodicalIF":8.0,"publicationDate":"2026-02-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"146169661","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":1,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
TrapFlow: Controllable Website Fingerprinting Defense via Dynamic Backdoor Learning TrapFlow:基于动态后门学习的可控网站指纹防御
IF 8 1区 计算机科学 Q1 COMPUTER SCIENCE, THEORY & METHODS Pub Date : 2026-02-12 DOI: 10.1109/TIFS.2026.3663989
Siyuan Liang;Jiajun Gong;Tianmeng Fang;Aishan Liu;Tao Wang;Xiaochun Cao;Dacheng Tao;Ee-Chien Chang
Website fingerprinting (WF) attacks, which covertly monitor user communications to identify the web pages they visit, pose a serious threat to user privacy. Existing WF defenses attempt to reduce attack accuracy by disrupting traffic patterns, but attackers can retrain their models to adapt, making these defenses ineffective. Meanwhile, their high overhead limits deployability. To overcome these limitations, we introduce a novel controllable website fingerprinting defense called TrapFlow based on backdoor learning. TrapFlow exploits the tendency of neural networks to memorize subtle patterns by injecting crafted trigger sequences into targeted website traffic, causing the attacker’s model to build incorrect associations during training. If the attacker attempts to adapt by training on such noisy data, TrapFlow ensures that the model internalizes the trigger as a dominant feature, leading to widespread misclassification across unrelated websites. Conversely, if the attacker ignores these patterns and trains only on clean data, the trigger behaves as an adversarial patch at inference time, causing model misclassification. To achieve this dual effect, we optimize the trigger using the Fast Levenshtein-like distance to maximize both its learnability and distinctiveness from normal traffic. Experiments show that TrapFlow significantly reduces the accuracy of the RF attack from 99% to 6% with 74% data overhead. This compares favorably against two SOTA defenses: FRONT reduces accuracy by only 2% at a similar overhead, while Palette achieves 32% accuracy, but with 48% more overhead. We further validate the practicality of our method in a real Tor network environment.
网站指纹(web fingerprinting, WF)攻击是一种通过秘密监控用户通信来识别用户访问的网页的攻击,对用户隐私构成了严重威胁。现有的WF防御试图通过破坏流量模式来降低攻击的准确性,但是攻击者可以重新训练他们的模型来适应,从而使这些防御无效。同时,它们的高开销限制了可部署性。为了克服这些限制,我们引入了一种新的基于后门学习的可控网站指纹防御,称为TrapFlow。TrapFlow通过向目标网站流量注入精心制作的触发序列,利用神经网络记忆微妙模式的倾向,导致攻击者的模型在训练期间建立错误的关联。如果攻击者试图通过训练这些嘈杂的数据来适应,TrapFlow确保模型将触发器内化为主要特征,从而导致不相关网站之间广泛的错误分类。相反,如果攻击者忽略这些模式,只在干净的数据上进行训练,则触发器在推理时表现为对抗补丁,从而导致模型错误分类。为了实现这一双重效果,我们使用Fast Levenshtein-like距离来优化触发器,以最大限度地提高其可学习性和与正常交通的区别。实验表明,TrapFlow将射频攻击的准确率从99%显著降低到6%,数据开销为74%。这与两种SOTA防御相比是有利的:FRONT在类似的开销下只降低了2%的精度,而Palette达到32%的精度,但开销增加了48%。在一个真实的Tor网络环境中进一步验证了该方法的实用性。
{"title":"TrapFlow: Controllable Website Fingerprinting Defense via Dynamic Backdoor Learning","authors":"Siyuan Liang;Jiajun Gong;Tianmeng Fang;Aishan Liu;Tao Wang;Xiaochun Cao;Dacheng Tao;Ee-Chien Chang","doi":"10.1109/TIFS.2026.3663989","DOIUrl":"10.1109/TIFS.2026.3663989","url":null,"abstract":"Website fingerprinting (WF) attacks, which covertly monitor user communications to identify the web pages they visit, pose a serious threat to user privacy. Existing WF defenses attempt to reduce attack accuracy by disrupting traffic patterns, but attackers can retrain their models to adapt, making these defenses ineffective. Meanwhile, their high overhead limits deployability. To overcome these limitations, we introduce a novel controllable website fingerprinting defense called TrapFlow based on backdoor learning. TrapFlow exploits the tendency of neural networks to memorize subtle patterns by injecting crafted trigger sequences into targeted website traffic, causing the attacker’s model to build incorrect associations during training. If the attacker attempts to adapt by training on such noisy data, TrapFlow ensures that the model internalizes the trigger as a dominant feature, leading to widespread misclassification across unrelated websites. Conversely, if the attacker ignores these patterns and trains only on clean data, the trigger behaves as an adversarial patch at inference time, causing model misclassification. To achieve this dual effect, we optimize the trigger using the Fast Levenshtein-like distance to maximize both its learnability and distinctiveness from normal traffic. Experiments show that TrapFlow significantly reduces the accuracy of the RF attack from 99% to 6% with 74% data overhead. This compares favorably against two SOTA defenses: FRONT reduces accuracy by only 2% at a similar overhead, while Palette achieves 32% accuracy, but with 48% more overhead. We further validate the practicality of our method in a real Tor network environment.","PeriodicalId":13492,"journal":{"name":"IEEE Transactions on Information Forensics and Security","volume":"21 ","pages":"2610-2625"},"PeriodicalIF":8.0,"publicationDate":"2026-02-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"146169659","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":1,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Data Flipping Attack and Defense in Web Edge Caching Systems Web边缘缓存系统中的数据翻转攻击与防御
IF 6.8 1区 计算机科学 Q1 COMPUTER SCIENCE, THEORY & METHODS Pub Date : 2026-02-09 DOI: 10.1109/tifs.2026.3663056
Mengsha Kou, Xiaoyu Xia, Ibrahim Khalil, Ziqi Wang, Xiuzhen Zhang, Lin Yao, Minhui Xue
{"title":"Data Flipping Attack and Defense in Web Edge Caching Systems","authors":"Mengsha Kou, Xiaoyu Xia, Ibrahim Khalil, Ziqi Wang, Xiuzhen Zhang, Lin Yao, Minhui Xue","doi":"10.1109/tifs.2026.3663056","DOIUrl":"https://doi.org/10.1109/tifs.2026.3663056","url":null,"abstract":"","PeriodicalId":13492,"journal":{"name":"IEEE Transactions on Information Forensics and Security","volume":"60 25 1","pages":""},"PeriodicalIF":6.8,"publicationDate":"2026-02-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"146160269","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":1,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Practical and Flexible Backdoor Attack Against Deep Learning Models via Shell Code Injection 通过Shell代码注入对深度学习模型进行实用灵活的后门攻击
IF 8 1区 计算机科学 Q1 COMPUTER SCIENCE, THEORY & METHODS Pub Date : 2026-02-09 DOI: 10.1109/TIFS.2026.3662587
Jiakai Wang;Hao Liu;Renshuai Tao;Jian Sun;Xianglong Liu;Yao Zhao
Recently, backdoor attack, which aims to implant malicious logic into deep learning models (DLMs), has attracted so extensive research attention. Among them, the non-poisoning-based backdoor attack appears considerable development prospects owing to the posed threats against the DLMs-based artificial intelligence applications in cyberspace. However, previous non-poisoning-based backdoor attacks for DLMs are limited to the impractical attacking forms, resulting in certain weaknesses in both attacking complexity and attacking adaptability. To tackle the mentioned issues, this paper proposes a novel backdoor attack framework, namely the shell code injection (SCI), to perform backdoor attacks against DLMs with lower complexity and higher adaptability. Specifically, for alleviating the attacking complexity, we elaborate the logic-driven stealthy backdoor shell motivated by the biological behavior in nature, e.g., the camouflage and attack strategy of crabs. By introducing the trigger consistency verification and short-circuit code packaging strategies, the SCI misleads the victim models to output wrong predictions without training requirements according to the preset poisonous decision logic. For enhancing the attacking adaptability, we design the LLM-assisted adaptive attacking target code generation that consists of the model concept detection module and the attack target adjusting module. Since the attacking goals could be generated dynamically according to the aware victim model information and appointed attacker preset instructions, the SCI could achieve more flexible attacking performance. Extensive experiments are conducted to demonstrate that the proposed backdoor attack framework appears awesome attacking ability (almost 100% ASR) under various settings. Additionally, we provide a case study on combining the cyber attack with SCI, which also exhibits certain space for imagination of new-type backdoor attacks. The code is released at https://github.com/WDQhello/Shell_attack/
最近,旨在将恶意逻辑植入深度学习模型(dlm)的后门攻击引起了广泛的研究关注。其中,基于非投毒的后门攻击由于对基于dlms的人工智能在网络空间的应用构成威胁,显得具有相当大的发展前景。然而,以往针对dlm的非毒化后门攻击仅限于不切实际的攻击形式,在攻击复杂性和攻击适应性方面都存在一定的弱点。针对上述问题,本文提出了一种新的后门攻击框架,即shell code injection (SCI),以较低的复杂度和较高的适应性对dlm进行后门攻击。具体来说,为了减轻攻击的复杂性,我们根据螃蟹的伪装和攻击策略等自然生物行为,精心设计了逻辑驱动的隐身后门壳。SCI通过引入触发一致性验证和短路码封装策略,误导受害者模型根据预设的有毒决策逻辑输出不需要训练的错误预测。为了增强攻击的适应性,设计了llm辅助的自适应攻击目标代码生成方法,该方法由模型概念检测模块和攻击目标调整模块组成。由于可以根据感知受害者模型信息和指定攻击者预设指令动态生成攻击目标,因此SCI可以实现更灵活的攻击性能。大量的实验表明,所提出的后门攻击框架在各种设置下表现出惊人的攻击能力(几乎100% ASR)。此外,我们还提供了将网络攻击与SCI相结合的案例研究,这也为新型后门攻击提供了一定的想象空间。该代码发布在https://github.com/WDQhello/Shell_attack/
{"title":"Practical and Flexible Backdoor Attack Against Deep Learning Models via Shell Code Injection","authors":"Jiakai Wang;Hao Liu;Renshuai Tao;Jian Sun;Xianglong Liu;Yao Zhao","doi":"10.1109/TIFS.2026.3662587","DOIUrl":"10.1109/TIFS.2026.3662587","url":null,"abstract":"Recently, backdoor attack, which aims to implant malicious logic into deep learning models (DLMs), has attracted so extensive research attention. Among them, the non-poisoning-based backdoor attack appears considerable development prospects owing to the posed threats against the DLMs-based artificial intelligence applications in cyberspace. However, previous non-poisoning-based backdoor attacks for DLMs are limited to the impractical attacking forms, resulting in certain weaknesses in both attacking complexity and attacking adaptability. To tackle the mentioned issues, this paper proposes a novel backdoor attack framework, namely the shell code injection (SCI), to perform backdoor attacks against DLMs with lower complexity and higher adaptability. Specifically, for alleviating the attacking complexity, we elaborate the logic-driven stealthy backdoor shell motivated by the biological behavior in nature, e.g., the camouflage and attack strategy of crabs. By introducing the trigger consistency verification and short-circuit code packaging strategies, the SCI misleads the victim models to output wrong predictions without training requirements according to the preset poisonous decision logic. For enhancing the attacking adaptability, we design the LLM-assisted adaptive attacking target code generation that consists of the model concept detection module and the attack target adjusting module. Since the attacking goals could be generated dynamically according to the aware victim model information and appointed attacker preset instructions, the SCI could achieve more flexible attacking performance. Extensive experiments are conducted to demonstrate that the proposed backdoor attack framework appears awesome attacking ability (almost 100% ASR) under various settings. Additionally, we provide a case study on combining the cyber attack with SCI, which also exhibits certain space for imagination of new-type backdoor attacks. The code is released at <uri>https://github.com/WDQhello/Shell_attack/</uri>","PeriodicalId":13492,"journal":{"name":"IEEE Transactions on Information Forensics and Security","volume":"21 ","pages":"2268-2283"},"PeriodicalIF":8.0,"publicationDate":"2026-02-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"146160270","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":1,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Privacy-Preserving, Efficient and Accurate Dimensionality Reduction 隐私保护,高效和准确的降维
IF 6.8 1区 计算机科学 Q1 COMPUTER SCIENCE, THEORY & METHODS Pub Date : 2026-02-09 DOI: 10.1109/tifs.2026.3662200
Haonan Yuan, Wenyuan Wu, Jingwei Chen
{"title":"Privacy-Preserving, Efficient and Accurate Dimensionality Reduction","authors":"Haonan Yuan, Wenyuan Wu, Jingwei Chen","doi":"10.1109/tifs.2026.3662200","DOIUrl":"https://doi.org/10.1109/tifs.2026.3662200","url":null,"abstract":"","PeriodicalId":13492,"journal":{"name":"IEEE Transactions on Information Forensics and Security","volume":"16 1","pages":""},"PeriodicalIF":6.8,"publicationDate":"2026-02-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"146160271","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":1,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
ZKVeil: A Privacy-Preserving Compliance Verification Scheme for Blockchain-Enabled Supply Chain Transactions ZKVeil:支持区块链的供应链交易的隐私保护合规性验证方案
IF 8 1区 计算机科学 Q1 COMPUTER SCIENCE, THEORY & METHODS Pub Date : 2026-02-03 DOI: 10.1109/TIFS.2026.3660595
Dongyu Cao;Bixin Li;Huijie Zhang;Yong Wang;Lulu Wang
Blockchain technology improves supply chain management by ensuring the immutability of transaction records and facilitating process tracking. However, the transparency of blockchain raises significant privacy concerns, as sensitive information such as buyer and supplier qualifications, product specifications, and transaction amounts is often exposed. Compliance verification, which needs access to specific sensitive data for compliance checks, becomes challenging in blockchain-based privacy-preserving supply chains. This paper introduces ZKVeil, an innovative scheme utilizing zero-knowledge proof technology to maintain the confidentiality of sensitive information while ensuring compliance verification. Additionally, ZKVeil uses decentralized identifiers and verifiable credentials to ensure the authenticity of transaction data. A theoretical security analysis demonstrates the effectiveness of ZKVeil in safeguarding real sensitive data and ensuring compliance with regulations. To evaluate the performance of our scheme, we implement ZKVeil on a private blockchain of 100 nodes. Taking the shipbuilding supply chain transaction as an example, the experimental results demonstrate that ZKVeil incurs low gas consumption, execution time, and memory overhead.
区块链技术通过确保交易记录的不变性和促进过程跟踪来改善供应链管理。然而,区块链的透明度引起了严重的隐私问题,因为买方和供应商资格、产品规格和交易金额等敏感信息经常被暴露。合规性验证需要访问特定的敏感数据以进行合规性检查,这在基于区块链的隐私保护供应链中变得具有挑战性。本文介绍了一种利用零知识证明技术来保持敏感信息机密性同时确保合规性验证的创新方案ZKVeil。此外,ZKVeil使用分散的标识符和可验证的凭证来确保交易数据的真实性。理论安全性分析证明了ZKVeil在保护真实敏感数据和确保合规方面的有效性。为了评估方案的性能,我们在100个节点的私有区块链上实现了ZKVeil。以船舶供应链交易为例,实验结果表明,ZKVeil具有较低的gas消耗、执行时间和内存开销。
{"title":"ZKVeil: A Privacy-Preserving Compliance Verification Scheme for Blockchain-Enabled Supply Chain Transactions","authors":"Dongyu Cao;Bixin Li;Huijie Zhang;Yong Wang;Lulu Wang","doi":"10.1109/TIFS.2026.3660595","DOIUrl":"10.1109/TIFS.2026.3660595","url":null,"abstract":"Blockchain technology improves supply chain management by ensuring the immutability of transaction records and facilitating process tracking. However, the transparency of blockchain raises significant privacy concerns, as sensitive information such as buyer and supplier qualifications, product specifications, and transaction amounts is often exposed. Compliance verification, which needs access to specific sensitive data for compliance checks, becomes challenging in blockchain-based privacy-preserving supply chains. This paper introduces ZKVeil, an innovative scheme utilizing zero-knowledge proof technology to maintain the confidentiality of sensitive information while ensuring compliance verification. Additionally, ZKVeil uses decentralized identifiers and verifiable credentials to ensure the authenticity of transaction data. A theoretical security analysis demonstrates the effectiveness of ZKVeil in safeguarding real sensitive data and ensuring compliance with regulations. To evaluate the performance of our scheme, we implement ZKVeil on a private blockchain of 100 nodes. Taking the shipbuilding supply chain transaction as an example, the experimental results demonstrate that ZKVeil incurs low gas consumption, execution time, and memory overhead.","PeriodicalId":13492,"journal":{"name":"IEEE Transactions on Information Forensics and Security","volume":"21 ","pages":"1858-1873"},"PeriodicalIF":8.0,"publicationDate":"2026-02-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"146110445","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":1,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
HiveTEE: Scalable and Fine-Grained Isolated Domains With RME and MTE Co-Assisted HiveTEE: RME和MTE协同辅助的可扩展和细粒度隔离域
IF 8 1区 计算机科学 Q1 COMPUTER SCIENCE, THEORY & METHODS Pub Date : 2026-02-03 DOI: 10.1109/TIFS.2026.3660599
Haoyang Huang;Fengwei Zhang
Confidential Compute Architecture (CCA) is the latest Trusted Execution Environment (TEE) system on Arm. It offers a VM-level execution environment designed to host applications that manage security-sensitive tasks and safeguard them from malicious system software. Although this VM-level design simplifies TEE adoption, it introduces a large attack surface. Attackers can break isolation by exploiting vulnerabilities in any component of the VM. In this paper, we present HiveTEE, a scalable intra-TEE isolation architecture that leverages Realm Management Extension (RME) and Memory Tagging Extension (MTE). HiveTEE allows developers to partition applications into multiple isolated domains (SDoms), preventing a compromise in one part of the application from propagating across the entire TEE. To evaluate the performance overhead introduced by HiveTEE, we apply it to three real-world applications: OpenSSL, SQLite, and Memcached. The evaluation results show that HiveTEE incurs a small performance overhead (<3%).
机密计算架构(CCA)是Arm上最新的可信执行环境(TEE)系统。它提供了一个虚拟机级别的执行环境,用于托管管理安全敏感任务的应用程序,并保护它们免受恶意系统软件的攻击。尽管这种vm级别的设计简化了TEE的采用,但它引入了较大的攻击面。攻击者可以利用虚拟机任何组件中的漏洞来破坏隔离。在本文中,我们提出了HiveTEE,一个可扩展的内部tee隔离架构,它利用了领域管理扩展(RME)和内存标记扩展(MTE)。HiveTEE允许开发人员将应用程序划分到多个孤立的域(sdom)中,从而防止应用程序的一部分中的漏洞传播到整个TEE中。为了评估HiveTEE带来的性能开销,我们将其应用于三个实际应用程序:OpenSSL、SQLite和Memcached。评估结果表明,HiveTEE的性能开销很小(<3%)。
{"title":"HiveTEE: Scalable and Fine-Grained Isolated Domains With RME and MTE Co-Assisted","authors":"Haoyang Huang;Fengwei Zhang","doi":"10.1109/TIFS.2026.3660599","DOIUrl":"10.1109/TIFS.2026.3660599","url":null,"abstract":"Confidential Compute Architecture (CCA) is the latest Trusted Execution Environment (TEE) system on Arm. It offers a VM-level execution environment designed to host applications that manage security-sensitive tasks and safeguard them from malicious system software. Although this VM-level design simplifies TEE adoption, it introduces a large attack surface. Attackers can break isolation by exploiting vulnerabilities in any component of the VM. In this paper, we present HiveTEE, a scalable intra-TEE isolation architecture that leverages Realm Management Extension (RME) and Memory Tagging Extension (MTE). HiveTEE allows developers to partition applications into multiple isolated domains (SDoms), preventing a compromise in one part of the application from propagating across the entire TEE. To evaluate the performance overhead introduced by HiveTEE, we apply it to three real-world applications: <monospace>OpenSSL</monospace>, <monospace>SQLite</monospace>, and <monospace>Memcached</monospace>. The evaluation results show that HiveTEE incurs a small performance overhead (<3%).","PeriodicalId":13492,"journal":{"name":"IEEE Transactions on Information Forensics and Security","volume":"21 ","pages":"2300-2312"},"PeriodicalIF":8.0,"publicationDate":"2026-02-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"146110444","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":1,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Secure Acceleration of Aggregation Queries over Homomorphically Encrypted Databases 同态加密数据库上聚合查询的安全加速
IF 6.8 1区 计算机科学 Q1 COMPUTER SCIENCE, THEORY & METHODS Pub Date : 2026-02-03 DOI: 10.1109/tifs.2026.3658997
Jinjiang Yang, Chunyi Zhang, Feng Liu, Yingjie Xue, Feng Wang, Kaiping Xue
{"title":"Secure Acceleration of Aggregation Queries over Homomorphically Encrypted Databases","authors":"Jinjiang Yang, Chunyi Zhang, Feng Liu, Yingjie Xue, Feng Wang, Kaiping Xue","doi":"10.1109/tifs.2026.3658997","DOIUrl":"https://doi.org/10.1109/tifs.2026.3658997","url":null,"abstract":"","PeriodicalId":13492,"journal":{"name":"IEEE Transactions on Information Forensics and Security","volume":"19 1","pages":""},"PeriodicalIF":6.8,"publicationDate":"2026-02-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"146110446","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":1,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
MACHANet: Memory-Augmented Cross Modal Hybrid Alignment Network for Unsupervised Visible-Infrared Person Re-Identification 基于记忆增强交叉模态混合对准网络的无监督可见红外人再识别
IF 8 1区 计算机科学 Q1 COMPUTER SCIENCE, THEORY & METHODS Pub Date : 2026-02-03 DOI: 10.1109/TIFS.2026.3660597
Tingyu Yang;Weiqing Yan;Guanghui Yue;Wujie Zhou;Chang Tang
Unsupervised Visible-Infrared Person Re-Identification (USL-VI-ReID) aims to match person images across visible and infrared modalities without identity annotations, addressing challenges such as cross-modal discrepancy and unlabeled data. Existing methods, however, often suffer from excessive sub-clusters, identity mixing, and unreliable cross-modal associations, which degrade matching performance. To overcome these issues, we propose MACHANet, a novel framework. The Memory Learning via Progressive Hybrid Clustering (MLPHC) module reduces excessive sub-clustering and enhances memory representations by first applying Harmonic Discrepancy Clustering with harmonic constraints and a core-edge mechanism, then gradually transitioning to DBSCAN as features become more discriminative. The Global Cross-Modal Positive Sample Alignment (GCPSA) module constructs a global set of cross-modal positive pairs, selecting the most similar visible–infrared samples of the same identity and computing alignment losses across intra- and inter-modalities. By maximizing mutual information and minimizing cross-modal distribution gaps, GCPSA effectively reduces modality discrepancies and suppresses noisy identity associations. Finally, the Multi-Modal Support Sample Expansion Alignment (MSSEA) module dynamically expands multi-modal support samples and incorporates residual-based representations to refine clusters, separate mixed identities, and progressively merge sub-identities. Extensive experiments on SYSU-MM01 and RegDB show that MACHANet outperforms existing state-of-the-art methods, including some supervised approaches. The source code will be publicly released.
无监督可见红外人员再识别(USL-VI-ReID)旨在在没有身份注释的情况下匹配可见光和红外模式下的人员图像,解决跨模式差异和未标记数据等挑战。然而,现有的方法往往存在过多的子聚类、身份混合和不可靠的跨模态关联,从而降低了匹配性能。为了克服这些问题,我们提出了一个新的框架MACHANet。基于渐进式混合聚类(MLPHC)的记忆学习模块首先采用调和约束和核心边缘机制的调和差异聚类,然后随着特征的判别性增强,逐渐过渡到DBSCAN,从而减少过多的子聚类并增强记忆表征。Global Cross-Modal Positive Sample Alignment (GCPSA)模块构建了一组全局的Cross-Modal Positive pairs,选择最相似的具有相同身份的可见-红外样本,并计算跨模内和模间的校准损失。通过最大化互信息和最小化跨模态分布差距,GCPSA有效地减少了模态差异和抑制了噪声身份关联。最后,多模态支持样本扩展对齐(MSSEA)模块动态扩展多模态支持样本,并结合基于残差的表示来细化聚类,分离混合身份,逐步合并子身份。在SYSU-MM01和RegDB上进行的大量实验表明,MACHANet优于现有的最先进的方法,包括一些监督方法。源代码将被公开发布。
{"title":"MACHANet: Memory-Augmented Cross Modal Hybrid Alignment Network for Unsupervised Visible-Infrared Person Re-Identification","authors":"Tingyu Yang;Weiqing Yan;Guanghui Yue;Wujie Zhou;Chang Tang","doi":"10.1109/TIFS.2026.3660597","DOIUrl":"10.1109/TIFS.2026.3660597","url":null,"abstract":"Unsupervised Visible-Infrared Person Re-Identification (USL-VI-ReID) aims to match person images across visible and infrared modalities without identity annotations, addressing challenges such as cross-modal discrepancy and unlabeled data. Existing methods, however, often suffer from excessive sub-clusters, identity mixing, and unreliable cross-modal associations, which degrade matching performance. To overcome these issues, we propose MACHANet, a novel framework. The Memory Learning via Progressive Hybrid Clustering (MLPHC) module reduces excessive sub-clustering and enhances memory representations by first applying Harmonic Discrepancy Clustering with harmonic constraints and a core-edge mechanism, then gradually transitioning to DBSCAN as features become more discriminative. The Global Cross-Modal Positive Sample Alignment (GCPSA) module constructs a global set of cross-modal positive pairs, selecting the most similar visible–infrared samples of the same identity and computing alignment losses across intra- and inter-modalities. By maximizing mutual information and minimizing cross-modal distribution gaps, GCPSA effectively reduces modality discrepancies and suppresses noisy identity associations. Finally, the Multi-Modal Support Sample Expansion Alignment (MSSEA) module dynamically expands multi-modal support samples and incorporates residual-based representations to refine clusters, separate mixed identities, and progressively merge sub-identities. Extensive experiments on SYSU-MM01 and RegDB show that MACHANet outperforms existing state-of-the-art methods, including some supervised approaches. The source code will be publicly released.","PeriodicalId":13492,"journal":{"name":"IEEE Transactions on Information Forensics and Security","volume":"21 ","pages":"1914-1925"},"PeriodicalIF":8.0,"publicationDate":"2026-02-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"146110443","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":1,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
IEEE Transactions on Information Forensics and Security
全部 Geobiology Appl. Clay Sci. Geochim. Cosmochim. Acta J. Hydrol. Org. Geochem. Carbon Balance Manage. Contrib. Mineral. Petrol. Int. J. Biometeorol. IZV-PHYS SOLID EART+ J. Atmos. Chem. Acta Oceanolog. Sin. Acta Geophys. ACTA GEOL POL ACTA PETROL SIN ACTA GEOL SIN-ENGL AAPG Bull. Acta Geochimica Adv. Atmos. Sci. Adv. Meteorol. Am. J. Phys. Anthropol. Am. J. Sci. Am. Mineral. Annu. Rev. Earth Planet. Sci. Appl. Geochem. Aquat. Geochem. Ann. Glaciol. Archaeol. Anthropol. Sci. ARCHAEOMETRY ARCT ANTARCT ALP RES Asia-Pac. J. Atmos. Sci. ATMOSPHERE-BASEL Atmos. Res. Aust. J. Earth Sci. Atmos. Chem. Phys. Atmos. Meas. Tech. Basin Res. Big Earth Data BIOGEOSCIENCES Geostand. Geoanal. Res. GEOLOGY Geosci. J. Geochem. J. Geochem. Trans. Geosci. Front. Geol. Ore Deposits Global Biogeochem. Cycles Gondwana Res. Geochem. Int. Geol. J. Geophys. Prospect. Geosci. Model Dev. GEOL BELG GROUNDWATER Hydrogeol. J. Hydrol. Earth Syst. Sci. Hydrol. Processes Int. J. Climatol. Int. J. Earth Sci. Int. Geol. Rev. Int. J. Disaster Risk Reduct. Int. J. Geomech. Int. J. Geog. Inf. Sci. Isl. Arc J. Afr. Earth. Sci. J. Adv. Model. Earth Syst. J APPL METEOROL CLIM J. Atmos. Oceanic Technol. J. Atmos. Sol. Terr. Phys. J. Clim. J. Earth Sci. J. Earth Syst. Sci. J. Environ. Eng. Geophys. J. Geog. Sci. Mineral. Mag. Miner. Deposita Mon. Weather Rev. Nat. Hazards Earth Syst. Sci. Nat. Clim. Change Nat. Geosci. Ocean Dyn. Ocean and Coastal Research npj Clim. Atmos. Sci. Ocean Modell. Ocean Sci. Ore Geol. Rev. OCEAN SCI J Paleontol. J. PALAEOGEOGR PALAEOCL PERIOD MINERAL PETROLOGY+ Phys. Chem. Miner. Polar Sci. Prog. Oceanogr. Quat. Sci. Rev. Q. J. Eng. Geol. Hydrogeol. RADIOCARBON Pure Appl. Geophys. Resour. Geol. Rev. Geophys. Sediment. Geol.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1