首页 > 最新文献

IEEE Transactions on Information Forensics and Security最新文献

英文 中文
ProSan: Utility-based Prompt Privacy Sanitizer ProSan:基于实用程序的提示隐私消毒程序
IF 6.8 1区 计算机科学 Q1 COMPUTER SCIENCE, THEORY & METHODS Pub Date : 2026-01-14 DOI: 10.1109/tifs.2026.3654397
Zhili Shen, Zihang Xi, Ying He, Wei Tong, Jingyu Hua, Sheng Zhong
{"title":"ProSan: Utility-based Prompt Privacy Sanitizer","authors":"Zhili Shen, Zihang Xi, Ying He, Wei Tong, Jingyu Hua, Sheng Zhong","doi":"10.1109/tifs.2026.3654397","DOIUrl":"https://doi.org/10.1109/tifs.2026.3654397","url":null,"abstract":"","PeriodicalId":13492,"journal":{"name":"IEEE Transactions on Information Forensics and Security","volume":"30 1","pages":""},"PeriodicalIF":6.8,"publicationDate":"2026-01-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"145972218","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":1,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
RIS-Assisted Integrated Communication and Secret Key Generation in Quasi-Static Environments 准静态环境下ris辅助集成通信与密钥生成
IF 6.8 1区 计算机科学 Q1 COMPUTER SCIENCE, THEORY & METHODS Pub Date : 2026-01-14 DOI: 10.1109/tifs.2026.3654398
Zheyuan Deng, Xiaoyan Hu, Keming Ma, Liang Jin, Boming Li, Jinghua Qu
{"title":"RIS-Assisted Integrated Communication and Secret Key Generation in Quasi-Static Environments","authors":"Zheyuan Deng, Xiaoyan Hu, Keming Ma, Liang Jin, Boming Li, Jinghua Qu","doi":"10.1109/tifs.2026.3654398","DOIUrl":"https://doi.org/10.1109/tifs.2026.3654398","url":null,"abstract":"","PeriodicalId":13492,"journal":{"name":"IEEE Transactions on Information Forensics and Security","volume":"267 1","pages":""},"PeriodicalIF":6.8,"publicationDate":"2026-01-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"145972226","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":1,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
DySec: A Machine Learning-based Dynamic Analysis for Detecting Malicious Packages in PyPI Ecosystem DySec:基于机器学习的PyPI生态系统恶意包检测动态分析
IF 6.8 1区 计算机科学 Q1 COMPUTER SCIENCE, THEORY & METHODS Pub Date : 2026-01-14 DOI: 10.1109/tifs.2026.3654388
Sk Tanzir Mehedi, Chadni Islam, Gowri Ramachandran, Raja Jurdak
{"title":"DySec: A Machine Learning-based Dynamic Analysis for Detecting Malicious Packages in PyPI Ecosystem","authors":"Sk Tanzir Mehedi, Chadni Islam, Gowri Ramachandran, Raja Jurdak","doi":"10.1109/tifs.2026.3654388","DOIUrl":"https://doi.org/10.1109/tifs.2026.3654388","url":null,"abstract":"","PeriodicalId":13492,"journal":{"name":"IEEE Transactions on Information Forensics and Security","volume":"5 1","pages":""},"PeriodicalIF":6.8,"publicationDate":"2026-01-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"145972220","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":1,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Casper: A Causality-Inspired Defense With Confounder Against Label Inference Attacks in Vertical Split Federated Learning Casper:在垂直分裂联邦学习中,一种带有混杂物的因果关系启发防御标签推理攻击
IF 8 1区 计算机科学 Q1 COMPUTER SCIENCE, THEORY & METHODS Pub Date : 2026-01-12 DOI: 10.1109/TIFS.2026.3652013
Meng Shen;Jin Meng;Bohan Peng;Xiangyun Tang;Wei Wang;Dusit Niyato;Liehuang Zhu
Vertical Split Federated Learning (VSFL) allows participants to collaboratively train a better model with different features vertically partitioned in the same sample space, where the model is divided into bottom model and top model by the cut layer, trained by passive and active participants respectively. However, in the process, the labels owned by the active participant will still be inferred or stolen by curious or malicious passive participants. In this paper, we propose Casper, a causality-inspired defense mechanism with a confounder against label inference attacks in VSFL. Casper first analyzes the feasibility of optimizing the training process in VSFL at the intervention level from a causal perspective. It then introduces a confounder consisting of cut layer output reconstruction and label obfuscation to disrupt the direct causality between cut layer outputs and labels. Additionally, we integrate selective discrepancy training to further ensure model utility by strategically balancing training between active and passive participants. Extensive experiments conducted on four datasets across different tasks demonstrate that Casper effectively preserves label privacy while maintaining model performance, significantly outperforming current advanced defending methods in VSFL.
垂直分割联邦学习(Vertical Split Federated Learning, VSFL)允许参与者在同一样本空间中协同训练不同特征垂直分割的更好的模型,其中模型被切割层分为底部模型和顶部模型,分别由被动参与者和主动参与者训练。然而,在这个过程中,主动参与者所拥有的标签仍然会被好奇或恶意的被动参与者推断或窃取。在本文中,我们提出了Casper,这是一种基于因果关系的防御机制,具有针对VSFL中标签推理攻击的混淆。Casper首先从因果关系的角度分析了在干预层面优化VSFL训练过程的可行性。然后,它引入了一个由切割层输出重建和标签混淆组成的混杂器,以破坏切割层输出和标签之间的直接因果关系。此外,我们整合了选择性差异训练,通过战略性地平衡主动和被动参与者之间的训练,进一步确保模型的实用性。在不同任务的四个数据集上进行的大量实验表明,Casper在保持模型性能的同时有效地保护了标签隐私,显著优于当前VSFL中的高级防御方法。
{"title":"Casper: A Causality-Inspired Defense With Confounder Against Label Inference Attacks in Vertical Split Federated Learning","authors":"Meng Shen;Jin Meng;Bohan Peng;Xiangyun Tang;Wei Wang;Dusit Niyato;Liehuang Zhu","doi":"10.1109/TIFS.2026.3652013","DOIUrl":"https://doi.org/10.1109/TIFS.2026.3652013","url":null,"abstract":"Vertical Split Federated Learning (VSFL) allows participants to collaboratively train a better model with different features vertically partitioned in the same sample space, where the model is divided into bottom model and top model by the cut layer, trained by passive and active participants respectively. However, in the process, the labels owned by the active participant will still be inferred or stolen by curious or malicious passive participants. In this paper, we propose Casper, a causality-inspired defense mechanism with a confounder against label inference attacks in VSFL. Casper first analyzes the feasibility of optimizing the training process in VSFL at the intervention level from a causal perspective. It then introduces a confounder consisting of cut layer output reconstruction and label obfuscation to disrupt the direct causality between cut layer outputs and labels. Additionally, we integrate selective discrepancy training to further ensure model utility by strategically balancing training between active and passive participants. Extensive experiments conducted on four datasets across different tasks demonstrate that Casper effectively preserves label privacy while maintaining model performance, significantly outperforming current advanced defending methods in VSFL.","PeriodicalId":13492,"journal":{"name":"IEEE Transactions on Information Forensics and Security","volume":"21 ","pages":"1050-1064"},"PeriodicalIF":8.0,"publicationDate":"2026-01-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"146026471","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":1,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Portability of Profiling Side-Channel Analysis: A Case Study Using Adjustable Implementations of Block Ciphers 侧信道分析的可移植性:使用分组密码的可调实现的案例研究
IF 8 1区 计算机科学 Q1 COMPUTER SCIENCE, THEORY & METHODS Pub Date : 2026-01-12 DOI: 10.1109/TIFS.2026.3651997
Di Li;Chun Li;Yufeng Tang;Yupeng Zhang;Zheng Gong
Inconsistencies in manufacturing features, sampling settings, and cryptographic implementations amongst the profiling and target devices can lead to the failure of profiling side-channel analysis (SCA). Various techniques, such as preprocessing, multi-device training, and transfer learning, have been proposed to mitigate this portability problem in profiling SCA. However, many techniques of block ciphers, such as tweaks, key-dependent components, and customized elements, might have uncertain effects from the perspective of cryptographic implementations, requiring further insightful analysis on their impact on portability. This paper investigates the portability of profiling SCA from a case study using adjustable implementations of block ciphers. First, we theoretically analyze the variation in leakage distribution under adjustable implementations. To support our theoretical results, a dataset of deep-learning SCA is built from AES, Pilsung, and Skinny. Specifically, we reveal how to reverse the parameterized components and recover the key from these adjustable implementations. According to our experiment on an 8-bit AVR microcontroller, the computational complexities of the attacks based on our model are less than $9times 2^{16}$ within 4500 traces. Moreover, the effectiveness of our proposed method is demonstrated under the combinatorial effect with adjustable implementations and device characteristics. Our case study provides insights into the results of adjustable implementations of block ciphers, which strengthens both the theoretical and practical understanding of the portability of profiling SCA.
在分析和目标设备之间的制造特性、采样设置和加密实现中的不一致可能导致分析侧信道分析(SCA)的失败。已经提出了各种技术,如预处理、多设备训练和迁移学习,以缓解SCA分析中的这种可移植性问题。然而,从加密实现的角度来看,许多块密码技术(如微调、依赖密钥的组件和定制元素)可能具有不确定的影响,因此需要对其对可移植性的影响进行进一步深入的分析。本文通过一个使用分组密码的可调实现的案例研究来研究分析SCA的可移植性。首先,我们从理论上分析了可调实现下泄漏分布的变化。为了支持我们的理论结果,我们使用AES、Pilsung和Skinny构建了一个深度学习SCA数据集。具体来说,我们揭示了如何反转参数化组件并从这些可调实现中恢复密钥。根据我们在8位AVR微控制器上的实验,基于我们模型的攻击的计算复杂性在4500次跟踪内小于$9乘以2^{16}$。此外,在具有可调实现和器件特性的组合效应下,验证了所提方法的有效性。我们的案例研究提供了对分组密码的可调实现结果的深入了解,从而加强了对分析SCA的可移植性的理论和实践理解。
{"title":"Portability of Profiling Side-Channel Analysis: A Case Study Using Adjustable Implementations of Block Ciphers","authors":"Di Li;Chun Li;Yufeng Tang;Yupeng Zhang;Zheng Gong","doi":"10.1109/TIFS.2026.3651997","DOIUrl":"https://doi.org/10.1109/TIFS.2026.3651997","url":null,"abstract":"Inconsistencies in manufacturing features, sampling settings, and cryptographic implementations amongst the profiling and target devices can lead to the failure of profiling side-channel analysis (SCA). Various techniques, such as preprocessing, multi-device training, and transfer learning, have been proposed to mitigate this portability problem in profiling SCA. However, many techniques of block ciphers, such as tweaks, key-dependent components, and customized elements, might have uncertain effects from the perspective of cryptographic implementations, requiring further insightful analysis on their impact on portability. This paper investigates the portability of profiling SCA from a case study using adjustable implementations of block ciphers. First, we theoretically analyze the variation in leakage distribution under adjustable implementations. To support our theoretical results, a dataset of deep-learning SCA is built from AES, Pilsung, and Skinny. Specifically, we reveal how to reverse the parameterized components and recover the key from these adjustable implementations. According to our experiment on an 8-bit AVR microcontroller, the computational complexities of the attacks based on our model are less than <inline-formula> <tex-math>$9times 2^{16}$ </tex-math></inline-formula> within 4500 traces. Moreover, the effectiveness of our proposed method is demonstrated under the combinatorial effect with adjustable implementations and device characteristics. Our case study provides insights into the results of adjustable implementations of block ciphers, which strengthens both the theoretical and practical understanding of the portability of profiling SCA.","PeriodicalId":13492,"journal":{"name":"IEEE Transactions on Information Forensics and Security","volume":"21 ","pages":"1021-1035"},"PeriodicalIF":8.0,"publicationDate":"2026-01-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"145982335","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":1,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Lightweight Blockchain-Assisted Certificateless Cloud Data Integrity Auditing Scheme Without Third-Party Auditor 一种轻量级区块链辅助无证书云数据完整性审计方案,无需第三方审计员
IF 8 1区 计算机科学 Q1 COMPUTER SCIENCE, THEORY & METHODS Pub Date : 2026-01-12 DOI: 10.1109/TIFS.2026.3652010
Chen Zhu;Yang Lu;Nian Xia;Jiguo Li;Yinxia Sun
Data Integrity Auditing (DIA) enables users to remotely verify whether their data saved in third-party clouds has been maliciously tampered with or compromised. As an extension of DIA in certificateless cryptography, certificateless DIA (CL-DIA) integrates the merits of conventional public-key cryptography (no key escrow) and identity-based cryptography (no certificates). However, CL-DIA schemes depend on a reliable third-party auditor (TPA) to perform integrity audits, inevitably suffering from performance bottleneck and single-point failure problems. Moreover, almost all current CL-DIA schemes were designed with computationally expensive bilinear pairings. Cryptanalysis demonstrates that the existing unique pairing-free CL-DIA scheme fails to achieve the unforgeable security of auditing proofs. In this work, we put forward a lightweight blockchain-assisted CL-DIA scheme. The scheme achieves DIA through the blockchain instead of a single TPA, thereby overcoming the problems caused by the TPA-based centralized auditing model. Then, by avoiding time-consuming pairing operations and employing edge servers in generating verifiable tags for the uploaded data of users, its performance surpasses previous pairing-based CL-DIA schemes, particularly in terms of computation efficiency. Furthermore, we provide formal proofs in the random oracle model demonstrating that our scheme achieves unforgeability of verifiable tags and auditing proofs, ensures data privacy secrity, and is resistant to collusion attacks between the EN and the CSP. Finally, experimental results show that when auditing 25 file blocks, our scheme only costs 0.29s, which reduces the total time cost of integrity auditing phase by 48.2%-85.5% compared to current pairing-based CL-DIA schemes.
数据完整性审计(Data Integrity Auditing, DIA)使用户能够远程验证其保存在第三方云上的数据是否被恶意篡改或泄露。作为DIA在无证书密码学中的扩展,无证书DIA (CL-DIA)集成了传统公钥密码学(无密钥托管)和基于身份的密码学(无证书)的优点。但是,CL-DIA方案依赖可靠的第三方审计员(TPA)来执行完整性审计,因此不可避免地会遇到性能瓶颈和单点故障问题。此外,目前几乎所有的CL-DIA方案都设计了计算代价昂贵的双线性对。密码分析表明,现有的唯一无配对CL-DIA方案无法实现审计证明的不可伪造安全性。在这项工作中,我们提出了一种轻量级的区块链辅助CL-DIA方案。该方案通过区块链而不是单一的TPA来实现DIA,从而克服了基于TPA的集中式审计模型带来的问题。然后,通过避免耗时的配对操作,并使用边缘服务器为用户上传的数据生成可验证的标签,其性能优于以往基于配对的CL-DIA方案,特别是在计算效率方面。此外,我们在随机oracle模型中提供了形式化的证明,证明我们的方案实现了可验证标签和审计证明的不可伪造性,保证了数据隐私安全性,并且能够抵抗EN和CSP之间的共谋攻击。最后,实验结果表明,当审计25个文件块时,我们的方案仅花费0.29秒,与目前基于配对的CL-DIA方案相比,完整性审计阶段的总时间成本降低了48.2% ~ 85.5%。
{"title":"A Lightweight Blockchain-Assisted Certificateless Cloud Data Integrity Auditing Scheme Without Third-Party Auditor","authors":"Chen Zhu;Yang Lu;Nian Xia;Jiguo Li;Yinxia Sun","doi":"10.1109/TIFS.2026.3652010","DOIUrl":"https://doi.org/10.1109/TIFS.2026.3652010","url":null,"abstract":"Data Integrity Auditing (DIA) enables users to remotely verify whether their data saved in third-party clouds has been maliciously tampered with or compromised. As an extension of DIA in certificateless cryptography, certificateless DIA (CL-DIA) integrates the merits of conventional public-key cryptography (no key escrow) and identity-based cryptography (no certificates). However, CL-DIA schemes depend on a reliable third-party auditor (TPA) to perform integrity audits, inevitably suffering from performance bottleneck and single-point failure problems. Moreover, almost all current CL-DIA schemes were designed with computationally expensive bilinear pairings. Cryptanalysis demonstrates that the existing unique pairing-free CL-DIA scheme fails to achieve the unforgeable security of auditing proofs. In this work, we put forward a lightweight blockchain-assisted CL-DIA scheme. The scheme achieves DIA through the blockchain instead of a single TPA, thereby overcoming the problems caused by the TPA-based centralized auditing model. Then, by avoiding time-consuming pairing operations and employing edge servers in generating verifiable tags for the uploaded data of users, its performance surpasses previous pairing-based CL-DIA schemes, particularly in terms of computation efficiency. Furthermore, we provide formal proofs in the random oracle model demonstrating that our scheme achieves unforgeability of verifiable tags and auditing proofs, ensures data privacy secrity, and is resistant to collusion attacks between the EN and the CSP. Finally, experimental results show that when auditing 25 file blocks, our scheme only costs 0.29s, which reduces the total time cost of integrity auditing phase by 48.2%-85.5% compared to current pairing-based CL-DIA schemes.","PeriodicalId":13492,"journal":{"name":"IEEE Transactions on Information Forensics and Security","volume":"21 ","pages":"976-991"},"PeriodicalIF":8.0,"publicationDate":"2026-01-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"146026561","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":1,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Dual-Granularity Contrastive Learning for DeepFake Detection 深度伪造检测的双粒度对比学习
IF 8 1区 计算机科学 Q1 COMPUTER SCIENCE, THEORY & METHODS Pub Date : 2026-01-12 DOI: 10.1109/TIFS.2026.3653569
Fan Zhang;Chen Shao;Kangning Du;Yanan Guo;Peiran Song;Lin Cao;Xin Yuan
In recent years, contrastive learning has made significant progress in DeepFake detection. However, existing methods emphasize class granularity, and it is difficult to distinguish between the real instance and its forgery counterparts effectively. Furthermore, the diversity of forgery cues produced by different manipulation methods cannot be effectively clustered by class granularity alone. Thus, the model’s generalization capability is limited. To tackle the above problems, a Dual-Granularity Contrastive Learning (DGCL) for DeepFake detection is proposed in this paper. Specifically, Class Granularity Contrastive Learning (CGCL) and Instance Granularity Contrastive Learning (IGCL) are designed. Firstly, for semantic aggregation at the class level, CGCL incorporates the class prototype, which encourages anchor approaches to the prototype of the positive class, thereby pulling the intra-class features closer. Secondly, for distinguishing between real and fake instances, Real Instance Granularity Contrastive Learning (RIGCL) and Fake Instance Granularity Contrastive Learning (FIGCL) are proposed based on the instance characteristics. RIGCL endeavors to distinguish fake instances from original real instances by expanding the differentiation in the feature space. Meanwhile, FIGCL extracts consistent forgery features from various manipulation methods using cosine similarity constraints. Finally, the superiority and generalizability of DGCL are validated by the experimental results on CELEBDF, DFD, and DFDC datasets.
近年来,对比学习在DeepFake检测中取得了重大进展。然而,现有的方法强调类粒度,难以有效区分真实实例和伪造实例。此外,不同操作方法产生的伪造线索的多样性不能仅通过类粒度有效地聚类。因此,模型的泛化能力受到限制。为了解决上述问题,本文提出了一种用于DeepFake检测的双粒度对比学习(DGCL)方法。具体来说,设计了类粒度对比学习(CGCL)和实例粒度对比学习(IGCL)。首先,对于类级别的语义聚合,CGCL包含了类原型,这鼓励锚点方法接近正向类的原型,从而将类内特征拉得更近。其次,为了区分真假实例,提出了基于实例特征的真实实例粒度对比学习(RIGCL)和假实例粒度对比学习(FIGCL)方法。RIGCL通过扩展特征空间的区分,努力将虚假实例与原始真实实例区分开来。同时,FIGCL利用余弦相似度约束从各种伪造方法中提取出一致的伪造特征。最后,在CELEBDF、DFD和DFDC数据集上的实验结果验证了DGCL的优越性和通用性。
{"title":"Dual-Granularity Contrastive Learning for DeepFake Detection","authors":"Fan Zhang;Chen Shao;Kangning Du;Yanan Guo;Peiran Song;Lin Cao;Xin Yuan","doi":"10.1109/TIFS.2026.3653569","DOIUrl":"https://doi.org/10.1109/TIFS.2026.3653569","url":null,"abstract":"In recent years, contrastive learning has made significant progress in DeepFake detection. However, existing methods emphasize class granularity, and it is difficult to distinguish between the real instance and its forgery counterparts effectively. Furthermore, the diversity of forgery cues produced by different manipulation methods cannot be effectively clustered by class granularity alone. Thus, the model’s generalization capability is limited. To tackle the above problems, a Dual-Granularity Contrastive Learning (DGCL) for DeepFake detection is proposed in this paper. Specifically, Class Granularity Contrastive Learning (CGCL) and Instance Granularity Contrastive Learning (IGCL) are designed. Firstly, for semantic aggregation at the class level, CGCL incorporates the class prototype, which encourages anchor approaches to the prototype of the positive class, thereby pulling the intra-class features closer. Secondly, for distinguishing between real and fake instances, Real Instance Granularity Contrastive Learning (RIGCL) and Fake Instance Granularity Contrastive Learning (FIGCL) are proposed based on the instance characteristics. RIGCL endeavors to distinguish fake instances from original real instances by expanding the differentiation in the feature space. Meanwhile, FIGCL extracts consistent forgery features from various manipulation methods using cosine similarity constraints. Finally, the superiority and generalizability of DGCL are validated by the experimental results on CELEBDF, DFD, and DFDC datasets.","PeriodicalId":13492,"journal":{"name":"IEEE Transactions on Information Forensics and Security","volume":"21 ","pages":"1552-1565"},"PeriodicalIF":8.0,"publicationDate":"2026-01-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"146082152","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":1,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Distributionally Robust Game for Proof-of-Work Blockchain Mining Under Resource Uncertainties 资源不确定性下工作量证明区块链挖矿的分布鲁棒博弈
IF 8 1区 计算机科学 Q1 COMPUTER SCIENCE, THEORY & METHODS Pub Date : 2026-01-12 DOI: 10.1109/TIFS.2026.3653580
Xunqiang Lan;Xiao Tang;Ruonan Zhang;Bin Li;Qinghe Du;Dusit Niyato;Zhu Han
Blockchain plays a crucial role in ensuring the security and integrity of decentralized systems, with the proof-of-work (PoW) mechanism being fundamental for achieving distributed consensus. As PoW blockchains see broader adoption, an increasingly diverse set of miners with varying computing capabilities participate in the network. In this paper, we consider the PoW blockchain mining, where the miners are associated with resource uncertainties. To characterize the uncertainty computing resources at different mining participants, we establish an ambiguous set representing uncertainty of resource distributions. Then, the networked mining is formulated as a non-cooperative game, where distributionally robust performance is calculated for each individual miner to tackle the resource uncertainties. We prove the existence of the equilibrium of the distributionally robust mining game. To derive the equilibrium, we propose the conditional value-at-risk (CVaR)-based reinterpretation of the best response of each miner. We then solve the individual strategy with alternating optimization, which facilitates the iteration among miners towards the game equilibrium. Furthermore, we consider the case that the ambiguity of resource distribution reduces to Gaussian distribution and the case that another uncertainties vanish, and then characterize the properties of the equilibrium therein along with a distributed algorithm to achieve the equilibrium. Simulation results show that the proposed approaches effectively converge to the equilibrium, and effectively tackle the uncertainties in blockchain mining to achieve a robust performance guarantee.
区块链在确保去中心化系统的安全性和完整性方面发挥着至关重要的作用,工作量证明(PoW)机制是实现分布式共识的基础。随着PoW区块链的广泛采用,越来越多具有不同计算能力的矿工参与到网络中。在本文中,我们考虑PoW区块链采矿,其中矿工与资源不确定性相关联。为了描述不同采矿参与者的不确定性计算资源,我们建立了一个表示资源分布不确定性的模糊集。然后,将网络采矿制定为非合作博弈,其中每个矿工计算分布式鲁棒性能以解决资源不确定性。证明了分布式鲁棒挖矿博弈均衡的存在性。为了导出均衡,我们提出了基于条件风险值(CVaR)的对每个矿工最佳响应的重新解释。然后,我们用交替优化的方法求解个体策略,这有利于矿工之间朝着博弈均衡的迭代。在此基础上,考虑了资源分布模糊性降为高斯分布和其他不确定性消失的情况,并对其中的均衡特性进行了刻画,提出了实现均衡的分布式算法。仿真结果表明,所提方法有效地收敛于平衡态,有效地解决了区块链开采中的不确定性,实现了鲁棒性性能保证。
{"title":"Distributionally Robust Game for Proof-of-Work Blockchain Mining Under Resource Uncertainties","authors":"Xunqiang Lan;Xiao Tang;Ruonan Zhang;Bin Li;Qinghe Du;Dusit Niyato;Zhu Han","doi":"10.1109/TIFS.2026.3653580","DOIUrl":"https://doi.org/10.1109/TIFS.2026.3653580","url":null,"abstract":"Blockchain plays a crucial role in ensuring the security and integrity of decentralized systems, with the proof-of-work (PoW) mechanism being fundamental for achieving distributed consensus. As PoW blockchains see broader adoption, an increasingly diverse set of miners with varying computing capabilities participate in the network. In this paper, we consider the PoW blockchain mining, where the miners are associated with resource uncertainties. To characterize the uncertainty computing resources at different mining participants, we establish an ambiguous set representing uncertainty of resource distributions. Then, the networked mining is formulated as a non-cooperative game, where distributionally robust performance is calculated for each individual miner to tackle the resource uncertainties. We prove the existence of the equilibrium of the distributionally robust mining game. To derive the equilibrium, we propose the conditional value-at-risk (CVaR)-based reinterpretation of the best response of each miner. We then solve the individual strategy with alternating optimization, which facilitates the iteration among miners towards the game equilibrium. Furthermore, we consider the case that the ambiguity of resource distribution reduces to Gaussian distribution and the case that another uncertainties vanish, and then characterize the properties of the equilibrium therein along with a distributed algorithm to achieve the equilibrium. Simulation results show that the proposed approaches effectively converge to the equilibrium, and effectively tackle the uncertainties in blockchain mining to achieve a robust performance guarantee.","PeriodicalId":13492,"journal":{"name":"IEEE Transactions on Information Forensics and Security","volume":"21 ","pages":"1036-1049"},"PeriodicalIF":8.0,"publicationDate":"2026-01-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"145982203","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":1,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
MsgFilter: Proactive Anti-Harassment Sender-Anonymous Messaging System MsgFilter:主动反骚扰发送者匿名消息系统
IF 8 1区 计算机科学 Q1 COMPUTER SCIENCE, THEORY & METHODS Pub Date : 2026-01-02 DOI: 10.1109/TIFS.2025.3650417
Siqin Li;Kun He;Min Shi;Yajing Huang;Ruiying Du;Jing Chen
Anonymous submissions inspire people to speak up since hiding their identities can protect them from negative influence by their own words. However, the abuse of anonymity may bring harassment to those public submission callers. Existing works only handle DoS attacks or block harassment senders in an active manner, which behave poorly in the early prevention of uncharacterized harassment. In this paper, we propose MsgFliter, a sender-anonymous messaging system with proactive anti-harassment mechanism. Our core idea is to prevent unanswered senders from sending messages continually while keeping their identities, messages, and sender types secret. To meet the functionality and security requirements of MsgFliter, we propose the Anti-Harassment Anonymous Authentication (AHAA) protocol. We associate messages from the same sender through linkable tags and invalidate linkability when a message is replied to. To achieve session indistinguishability, we further combine the proposed anonymous authentication with zero-knowledge proofs of disjunctive relations. We implement MsgFliter and compare its performance with related solutions. Experimental results show that our solution is practicable.
匿名投稿激励人们发声,因为隐藏自己的身份可以保护他们免受自己言论的负面影响。然而,滥用匿名可能会给那些公开提交的呼叫者带来骚扰。现有的工作只处理DoS攻击或以积极的方式阻止骚扰发送者,这在早期预防非特征骚扰方面表现不佳。在本文中,我们提出了MsgFliter,一个具有主动反骚扰机制的发送者匿名消息系统。我们的核心思想是防止未回复的发送者持续发送消息,同时对其身份、消息和发送者类型保密。为了满足MsgFliter的功能和安全要求,我们提出了反骚扰匿名认证(AHAA)协议。我们通过可链接标签将来自同一发送者的消息关联起来,并在回复消息时使可链接性无效。为了实现会话不可区分性,我们进一步将提出的匿名认证与析取关系的零知识证明结合起来。我们实现了MsgFliter,并将其性能与相关解决方案进行了比较。实验结果表明,该方法是可行的。
{"title":"MsgFilter: Proactive Anti-Harassment Sender-Anonymous Messaging System","authors":"Siqin Li;Kun He;Min Shi;Yajing Huang;Ruiying Du;Jing Chen","doi":"10.1109/TIFS.2025.3650417","DOIUrl":"10.1109/TIFS.2025.3650417","url":null,"abstract":"Anonymous submissions inspire people to speak up since hiding their identities can protect them from negative influence by their own words. However, the abuse of anonymity may bring harassment to those public submission callers. Existing works only handle DoS attacks or block harassment senders in an active manner, which behave poorly in the early prevention of uncharacterized harassment. In this paper, we propose MsgFliter, a sender-anonymous messaging system with proactive anti-harassment mechanism. Our core idea is to prevent unanswered senders from sending messages continually while keeping their identities, messages, and sender types secret. To meet the functionality and security requirements of MsgFliter, we propose the Anti-Harassment Anonymous Authentication (AHAA) protocol. We associate messages from the same sender through linkable tags and invalidate linkability when a message is replied to. To achieve session indistinguishability, we further combine the proposed anonymous authentication with zero-knowledge proofs of disjunctive relations. We implement MsgFliter and compare its performance with related solutions. Experimental results show that our solution is practicable.","PeriodicalId":13492,"journal":{"name":"IEEE Transactions on Information Forensics and Security","volume":"21 ","pages":"741-756"},"PeriodicalIF":8.0,"publicationDate":"2026-01-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"145893717","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":1,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Comprehensive Framework for Palm Vein Anti-Spoofing With Preprocessing Pipeline, Dataset, and Benchmark 基于预处理管道、数据集和基准的手掌静脉防欺骗综合框架
IF 8 1区 计算机科学 Q1 COMPUTER SCIENCE, THEORY & METHODS Pub Date : 2026-01-02 DOI: 10.1109/TIFS.2025.3650391
Caiping Yan;Zhi Lan;Hong Li;Yuqi Li;Zonglin Meng
Non-contact palm-vein recognition has been widely adopted in security-critical applications owing to its contact-free acquisition paradigm and exceptional discriminative power. However, these systems remain susceptible to a spectrum of presentation attacks (PAs), creating significant security risks that require urgent mitigation. Progress on palm-vein anti-spoofing is currently impeded by three fundamental gaps: 1) the absence of an open-source, end-to-end pipeline for preprocessing liveness-detection data; 2) a lack of publicly available datasets specifically tailored to anti-spoofing evaluation; and 3) the unavailability of benchmark studies employing standardized protocols and reference implementations. In light of these key issues, we make the following four contributions. Firstly, we propose a new open-source preprocessing pipeline that can significantly improve model performance, reducing errors by up to 53.3%. Secondly, we introduce PVASD, a new largest known dataset comprised of 1,187,519 images belonging to 5,515 subjects, which consists of 880,241 live palm vein images along with 307,278 spoof attack images including 16 different attack types–both 2d (printed stuff) and 3d (gloves and prosthesis models) attacks captured under a variety of environments using off-the-shelf commercial-grade sensors at five resolutions. Lastly, comprehensive benchmarks are also created by evaluating three types of representative methods namely classical image classification models, face anti-spoofing methods adapted from face domain and anomaly-detection-based approaches, while our experimental results reveal unique characteristics intrinsic only to palm vein spoof attacks, which will hopefully provide valuable guidance to researchers for further investigation. Furthermore, we also expanded PVASD by adding 20,000 spoof samples generated by artificial intelligence, and evaluated the vulnerability of the existing models to deepfake attacks. We will release our preprocessing pipeline, dataset, and benchmark codes at https://github.com/valhongli/PVASD to advance future reproducible studies and accelerate palm-vein anti-spoofing algorithmic research.
非接触手掌静脉识别由于其非接触获取模式和卓越的判别能力,在安全关键应用中得到了广泛的应用。然而,这些系统仍然容易受到一系列表示攻击(pa)的影响,产生了重大的安全风险,需要紧急缓解。目前,掌静脉反欺骗的进展受到三个基本缺陷的阻碍:1)缺乏一个开源的端到端管道来预处理活跃度检测数据;2)缺乏专门针对反欺骗评估的公开可用数据集;3)缺乏采用标准化协议和参考实现的基准研究。针对这些关键问题,我们作出以下四点贡献:首先,我们提出了一种新的开源预处理管道,可以显著提高模型性能,将误差降低高达53.3%。其次,我们介绍了PVASD,这是一个新的最大的已知数据集,由属于5,515个主题的1,187,519张图像组成,其中包括880,241张活手掌静脉图像以及307,278张欺骗攻击图像,包括16种不同的攻击类型- 2d(打印材料)和3d(手套和假肢模型)攻击,这些攻击使用现成的商业级传感器在各种环境下以五种分辨率捕获。最后,通过对经典图像分类模型、基于人脸域的人脸抗欺骗方法和基于异常检测的方法三种具有代表性的方法进行评估,建立了综合基准,同时我们的实验结果揭示了掌纹欺骗攻击所固有的独特特征,希望为研究人员的进一步研究提供有价值的指导。此外,我们还通过增加人工智能生成的20,000个欺骗样本来扩展PVASD,并评估了现有模型对深度伪造攻击的脆弱性。我们将在https://github.com/valhongli/PVASD上发布我们的预处理管道、数据集和基准代码,以推进未来的可重复研究,并加速掌静脉反欺骗算法的研究。
{"title":"A Comprehensive Framework for Palm Vein Anti-Spoofing With Preprocessing Pipeline, Dataset, and Benchmark","authors":"Caiping Yan;Zhi Lan;Hong Li;Yuqi Li;Zonglin Meng","doi":"10.1109/TIFS.2025.3650391","DOIUrl":"10.1109/TIFS.2025.3650391","url":null,"abstract":"Non-contact palm-vein recognition has been widely adopted in security-critical applications owing to its contact-free acquisition paradigm and exceptional discriminative power. However, these systems remain susceptible to a spectrum of presentation attacks (PAs), creating significant security risks that require urgent mitigation. Progress on palm-vein anti-spoofing is currently impeded by three fundamental gaps: 1) the absence of an open-source, end-to-end pipeline for preprocessing liveness-detection data; 2) a lack of publicly available datasets specifically tailored to anti-spoofing evaluation; and 3) the unavailability of benchmark studies employing standardized protocols and reference implementations. In light of these key issues, we make the following four contributions. Firstly, we propose a new open-source preprocessing pipeline that can significantly improve model performance, reducing errors by up to 53.3%. Secondly, we introduce PVASD, a new largest known dataset comprised of 1,187,519 images belonging to 5,515 subjects, which consists of 880,241 live palm vein images along with 307,278 spoof attack images including 16 different attack types–both 2d (printed stuff) and 3d (gloves and prosthesis models) attacks captured under a variety of environments using off-the-shelf commercial-grade sensors at five resolutions. Lastly, comprehensive benchmarks are also created by evaluating three types of representative methods namely classical image classification models, face anti-spoofing methods adapted from face domain and anomaly-detection-based approaches, while our experimental results reveal unique characteristics intrinsic only to palm vein spoof attacks, which will hopefully provide valuable guidance to researchers for further investigation. Furthermore, we also expanded PVASD by adding 20,000 spoof samples generated by artificial intelligence, and evaluated the vulnerability of the existing models to deepfake attacks. We will release our preprocessing pipeline, dataset, and benchmark codes at <uri>https://github.com/valhongli/PVASD</uri> to advance future reproducible studies and accelerate palm-vein anti-spoofing algorithmic research.","PeriodicalId":13492,"journal":{"name":"IEEE Transactions on Information Forensics and Security","volume":"21 ","pages":"945-959"},"PeriodicalIF":8.0,"publicationDate":"2026-01-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"145893716","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":1,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
IEEE Transactions on Information Forensics and Security
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1