


default search action
IEEE Transactions on Information Forensics and Security, Volume 19
Volume 19, 2024
- Xu Song, Saihui Hou
, Yan Huang
, Chunshui Cao
, Xu Liu
, Yongzhen Huang
, Caifeng Shan
:
Gait Attribute Recognition: A New Benchmark for Learning Richer Attributes From Human Gait Patterns. 1-14 - Dongxia Huang
, Weiqi Luo
, Minglin Liu
, Weixuan Tang
, Jiwu Huang
:
Steganography Embedding Cost Learning With Generative Multi-Adversarial Network. 15-29 - Qiang Zhou
, Liangmin Wang
, Huijuan Zhu
, Tong Lu, Victor S. Sheng
:
WF-Transformer: Learning Temporal Features for Accurate Anonymous Traffic Identification by Using Transformer Networks. 30-43 - Ju Jia
, Siqi Ma
, Yang Liu
, Lina Wang
, Robert H. Deng
:
A Causality-Aligned Structure Rationalization Scheme Against Adversarial Biased Perturbations for Graph Neural Networks. 59-73 - Guoxin Sun
, Tansu Alpcan
, Benjamin I. P. Rubinstein
, Seyit Camtepe
:
To Act or Not to Act: An Adversarial Game for Securing Vehicle Platoons. 163-177 - Jiangyi Deng
, Xiaoyu Ji
, Beibei Wang
, Bin Wang, Wenyuan Xu:
Dr. Defender: Proactive Detection of Autopilot Drones Based on CSI. 194-206 - Xinyu Tang
, Cheng Guo
, Kim-Kwang Raymond Choo
, Yi-Ning Liu
:
An Efficient and Dynamic Privacy-Preserving Federated Learning System for Edge Computing. 207-220 - Yi Ding
, Zi Wang, Zhen Qin
, Erqiang Zhou, Guobin Zhu, Zhiguang Qin
, Kim-Kwang Raymond Choo
:
Backdoor Attack on Deep Learning-Based Medical Image Encryption and Decryption Network. 280-292 - Dandan Xu
, Kai Chen
, Miaoqian Lin, Chaoyang Lin, Xiaofeng Wang:
AutoPwn: Artifact-Assisted Heap Exploit Generation for CTF PWN Competitions. 293-306 - Xiangye Wei
, Liming Xiu
, Yimao Cai
:
A Perspective of Using Frequency-Mixing as Entropy in Random Number Generation for Portable Hardware Cybersecurity IP. 320-333 - Xiao Sui
, Sisi Duan
, Haibin Zhang:
BG: A Modular Treatment of BFT Consensus Toward a Unified Theory of BFT Replication. 44-58 - Rui Xue, Kaiping Xue
, Bin Zhu
, Xinyi Luo, Tianwei Zhang
, Qibin Sun, Jun Lu:
Differentially Private Federated Learning With an Adaptive Noise Mechanism. 74-87 - Qian Ren
, Yue Li
, Yingjun Wu
, Yuchen Wu
, Hong Lei
, Lei Wang
, Bangdao Chen
:
DeCloak: Enable Secure and Cheap Multi-Party Transactions on Legacy Blockchains by a Minimally Trusted TEE Network. 88-103 - Yinshan Li, Hua Ma, Zhi Zhang
, Yansong Gao
, Alsharif Abuadbba, Minhui Xue
, Anmin Fu
, Yifeng Zheng
, Said F. Al-Sarawi
, Derek Abbott
:
NTD: Non-Transferability Enabled Deep Learning Backdoor Detection. 104-119 - Shuting He
, Weihua Chen
, Kai Wang
, Hao Luo
, Fan Wang
, Wei Jiang
, Henghui Ding
:
Region Generation and Assessment Network for Occluded Person Re-Identification. 120-132 - Qingjun Yuan
, Gaopeng Gou, Yanbei Zhu, Yuefei Zhu
, Gang Xiong, Yongjuan Wang
:
MCRe: A Unified Framework for Handling Malicious Traffic With Noise Labels Based on Multidimensional Constraint Representation. 133-147 - Haiwei Wu
, Jiantao Zhou
, Xinyu Zhang
, Jinyu Tian
, Weiwei Sun
:
Robust Camera Model Identification Over Online Social Network Shared Images via Multi-Scenario Learning. 148-162 - Haoheng Yuan, Yanghe Feng
, Chuanchuan Yang
, Zhuojun Zhuang, Bin Dai
:
Two-User Gaussian Broadcast Wiretap Channel With Common Message and Feedback: Revisit. 178-193 - Chen Zhang
, Yulong Ming
, Mingyue Wang
, Yu Guo
, Xiaohua Jia
:
Encrypted and Compressed Key-Value Store With Pattern-Analysis Security in Cloud Systems. 221-234 - Weize Quan
, Pengfei Deng
, Kai Wang
, Dong-Ming Yan
:
CGFormer: ViT-Based Network for Identifying Computer-Generated Images With Token Labeling. 235-250 - Ningbin Yang
, Chunming Tang
, Debiao He
:
A Lightweight Certificateless Multi-User Matchmaking Encryption for Mobile Devices: Enhancing Security and Performance. 251-264 - Weisong Zhao
, Xiangyu Zhu
, Kaiwen Guo, Haichao Shi
, Xiaoyu Zhang
, Zhen Lei
:
Masked Face Transformer. 265-279 - Wenli Sun
, Xinyang Jiang, Shuguang Dou
, Dongsheng Li
, Duoqian Miao
, Cheng Deng
, Cairong Zhao
:
Invisible Backdoor Attack With Dynamic Triggers Against Person Re-Identification. 307-319 - Meng Li
, Zheng Pei
, Yong Chen
, Zhenhai Miao:
Fuzzy Linguistic Knowledge Reasoning-Based Secure Control for Connected Nonlinear Servosystem. 334-343 - Yuankun Xie
, Haonan Cheng
, Yutian Wang
, Long Ye
:
Domain Generalization via Aggregation and Separation for Audio Deepfake Detection. 344-358 - Saeed Abdolinezhad
, Lukas Zimmermann, Axel Sikora
:
Output Positioning to Derive Maximum Entropy From Physical Unclonable Functions. 359-371 - Min Xu
, Ximiao Zhang
, Xiuzhuang Zhou
:
Confidence-Calibrated Face and Kinship Verification. 372-384 - Andrea Montibeller
, Fernando Pérez-González
:
An Adaptive Method for Camera Attribution Under Complex Radial Distortion Corrections. 385-400 - Zhiqing Guo
, Zhenhong Jia
, Liejun Wang
, Dewang Wang
, Gaobo Yang
, Nikola K. Kasabov
:
Constructing New Backbone Networks via Space-Frequency Interactive Convolution for Deepfake Detection. 401-413 - Youwen Zhu
, Yiran Cao, Qiao Xue
, Qihui Wu, Yushu Zhang
:
Heavy Hitter Identification Over Large-Domain Set-Valued Data With Local Differential Privacy. 414-426 - Gaoyang Liu
, Tianlong Xu, Rui Zhang
, Zixiong Wang, Chen Wang
, Ling Liu
:
Gradient-Leaks: Enabling Black-Box Membership Inference Attacks Against Machine Learning Models. 427-440 - Zhenyu Zhou
, Ajay Kumar
:
Finger-Knuckle Assisted Slap Fingerprint Identification System for Higher Security and Convenience. 441-454 - Huming Qiu
, Hua Ma, Zhi Zhang
, Alsharif Abuadbba, Wei Kang
, Anmin Fu
, Yansong Gao
:
Toward a Critical Evaluation of Robustness for Deep Learning Backdoor Countermeasures. 455-468 - Yaqing Song, Chunxiang Xu
, Yuan Zhang
, Shiyu Li
:
Hardening Password-Based Credential Databases. 469-484 - Junjiang He
, Cong Tang
, Wenshan Li, Tao Li, Li Chen, Xiaolong Lan
:
BR-HIDF: An Anti-Sparsity and Effective Host Intrusion Detection Framework Based on Multi-Granularity Feature Extraction. 485-499 - Chao Liu, Xue Fu
, Yu Wang, Lantu Guo, Yuchao Liu, Yun Lin, Haitao Zhao, Guan Gui:
Overcoming Data Limitations: A Few-Shot Specific Emitter Identification Method Using Self-Supervised Learning and Adversarial Augmentation. 500-513 - Suvadeep Hajra
, Manaar Alam
, Sayandeep Saha
, Stjepan Picek
, Debdeep Mukhopadhyay
:
On the Instability of Softmax Attention-Based Deep Learning Models in Side-Channel Analysis. 514-528 - Dinu Coltuc
, Henri George Coanda:
Reversible Contrast Enhancement by Histogram Specification and Very Low Distortion Data Hiding. 529-539 - Yunfei Ge
, Quanyan Zhu
:
GAZETA: GAme-Theoretic ZEro-Trust Authentication for Defense Against Lateral Movement in 5G IoT Networks. 540-554 - Baihao Peng
, Junfeng Liu
, Jun Zeng
:
Dynamic Analysis of Multiplex Networks With Hybrid Maintenance Strategies. 555-570 - Sheema Madhusudhanan
, Arun Cyril Jose
, Jayakrushna Sahoo
, Reza Malekian
:
PRIMϵ: Novel Privacy-Preservation Model With Pattern Mining and Genetic Algorithm. 571-585 - Milos Grujic
, Ingrid Verbauwhede
:
Optimizing Linear Correctors: A Tight Output Min-Entropy Bound and Selection Technique. 586-600 - Hanbiao Du
, Zheng Che
, Meng Shen
, Liehuang Zhu
, Jiankun Hu
:
Breaking the Anonymity of Ethereum Mixing Services Using Graph Feature Learning. 616-631 - Ali Asghar Beigizad, Hadi Soleimany
, Sara Zarei
, Hamed Ramzanipour:
Linked Fault Analysis. 632-645 - William Briguglio
, Waleed A. Yousef
, Issa Traoré
, Mohammad Mamun
:
Federated Supervised Principal Component Analysis. 646-660 - Zhouyan Deng
, Jiajia Liu
, Yijie Xun
, Junman Qin
:
IdentifierIDS: A Practical Voltage-Based Intrusion Detection System for Real In-Vehicle Networks. 661-676 - Qi Xia
, Isaac Amankona Obiri
, Jianbin Gao
, Hu Xia
, Xiaosong Zhang
, Kwame Omono Asamoah
, Sandro Amofa
:
PRIDN: A Privacy Preserving Data Sharing on Named Data Networking. 677-692 - Zekai Chen
, Shengxing Yu, Mingyuan Fan
, Ximeng Liu
, Robert H. Deng
:
Privacy-Enhancing and Robust Backdoor Defense for Federated Learning on Heterogeneous Data. 693-707 - Yu Guo
, Yu Zhao
, Saihui Hou
, Cong Wang
, Xiaohua Jia
:
Verifying in the Dark: Verifiable Machine Unlearning by Using Invisible Backdoor Triggers. 708-721 - Ruidong Han
, Huihui Gong, Siqi Ma
, Juanru Li, Chang Xu
, Elisa Bertino
, Surya Nepal
, Zhuo Ma
, Jianfeng Ma
:
A Credential Usage Study: Flow-Aware Leakage Detection in Open-Source Projects. 722-734 - Decheng Liu
, Xinbo Gao
, Chunlei Peng
, Nannan Wang
, Jie Li
:
Universal Heterogeneous Face Analysis via Multi-Domain Feature Disentanglement. 735-747 - Ying He
, Zhili Shen
, Jingyu Hua
, Qixuan Dong
, Jiacheng Niu, Wei Tong
, Xu Huang
, Chen Li
, Sheng Zhong
:
Backdoor Attack Against Split Neural Network-Based Vertical Federated Learning. 748-763 - Menghao Zhang
, Guanyu Li
, Cheng Guo, Han Bao, Mingwei Xu
, Hongxin Hu
, Fenghua Li:
IMap: Toward a Fast, Scalable and Reconfigurable In-Network Scanner With Programmable Switches. 601-615 - Xiaohan Yuan
, Jiqiang Liu
, Bin Wang, Wei Wang
, Bin Wang, Tao Li
, Xiaobo Ma, Witold Pedrycz:
FedComm: A Privacy-Enhanced and Efficient Authentication Protocol for Federated Learning in Vehicular Ad-Hoc Networks. 777-792 - Hui Liu
, Wenya Wang
, Hao Sun, Anderson Rocha, Haoliang Li
:
Robust Domain Misinformation Detection via Multi-Modal Feature Alignment. 793-806 - Elahe Vedadi
, Yasaman Keshtkarjahromi
, Hulya Seferoglu
:
Efficient Coded Multi-Party Computation at Edge Networks. 807-820 - Yuqing Zhang
, Zhaofeng Ma
, Shoushan Luo, Pengfei Duan
:
Dynamic Trust-Based Redactable Blockchain Supporting Update and Traceability. 821-834 - Qiuhua Wang
, Chengyu Li, Tianyu Xia
, Yizhi Ren
, Dong Wang, Guoyan Zhang
, Kim-Kwang Raymond Choo
:
Optimal Selfish Mining-Based Denial-of-Service Attack. 835-850 - Xingming Long
, Jie Zhang
, Shuzhe Wu, Xin Jin
, Shiguang Shan
:
Dual Sampling Based Causal Intervention for Face Anti-Spoofing With Identity Debiasing. 851-862 - Huikai Shao
, Chengcheng Liu
, Xiaojiang Li
, Dexing Zhong
:
Privacy Preserving Palmprint Recognition via Federated Metric Learning. 878-891 - Yunchao Yang
, Miao Hu
, Yipeng Zhou
, Xuezheng Liu
, Di Wu
:
CSRA: Robust Incentive Mechanism Design for Differentially Private Federated Learning. 892-906 - Yiming Xue
, Jiaxuan Wu
, Ronghua Ji, Ping Zhong
, Juan Wen
, Wanli Peng
:
Adaptive Domain-Invariant Feature Extraction for Cross-Domain Linguistic Steganalysis. 920-933 - Jingwei Xin
, Zikai Wei, Nannan Wang
, Jie Li
, Xinbo Gao
:
Large Pose Face Recognition via Facial Representation Learning. 934-946 - Rossano Gaeta
:
An Accurate and Efficient Algorithm to Identify Malicious Nodes of a Graph. 947-958 - Shuyi Li
, Ruijun Ma
, Jianhang Zhou
, Bob Zhang
, Lifang Wu
:
Joint Discriminative Analysis With Low-Rank Projection for Finger Vein Feature Extraction. 959-969 - Wei Guo
, Benedetta Tondi
, Mauro Barni
:
Universal Detection of Backdoor Attacks via Density-Based Clustering and Centroids Analysis. 970-984 - Haodi Wang
, Yu Guo
, Rongfang Bie
, Xiaohua Jia
:
Verifiable Arbitrary Queries With Zero Knowledge Confidentiality in Decentralized Storage. 1071-1085 - Anwei Luo
, Chenqi Kong
, Jiwu Huang
, Yongjian Hu
, Xiangui Kang
, Alex C. Kot
:
Beyond the Prior Forgery Knowledge: Mining Critical Clues for General Face Forgery Detection. 1168-1182 - Xiao Mei Zeng
, Qing Liu
, Chee Lip Gan
:
A Comprehensive Data Retrieval and Correction Approach From 40-nm Flash Memory With Selective Chemical Engraving. 1031-1040 - Xinyu Qi
, Aiqun Hu
, Tianshu Chen
:
Lightweight Radio Frequency Fingerprint Identification Scheme for V2X Based on Temporal Correlation. 1056-1070 - Chen Chen
, Junqing Zhang
, Tianyu Lu
, Magnus Sandell
, Liquan Chen
:
Secret Key Generation for IRS-Assisted Multi-Antenna Systems: A Machine Learning-Based Approach. 1086-1098 - Weiqi Wang
, Chenhan Zhang
, Zhiyi Tian
, Shui Yu
:
Machine Unlearning via Representation Forgetting With Parameter Self-Sharing. 1099-1111 - Yuewang He
, Xiangui Kang
, Qiben Yan
, Enping Li
:
ResNeXt+: Attention Mechanisms Based on ResNeXt for Malware Detection and Classification. 1142-1155 - Guo-Wei Wong
, Yi-Ting Huang
, Ying-Ren Guo
, Yeali S. Sun, Meng Chang Chen
:
Attention-Based API Locating for Malware Techniques. 1199-1212 - Mingyue Wang
, Zizhuo Chen
, Yinbin Miao
, Hejiao Huang
, Cong Wang
, Xiaohua Jia
:
Cross-User Leakage Mitigation for Authorized Multi-User Encrypted Data Sharing. 1213-1226 - Shao-Chuan Zhao
, Tianyang Xu
, Xiaojun Wu
, Josef Kittler
:
Pluggable Attack for Visual Object Tracking. 1227-1240 - Mengqi Zhan
, Yang Li
, Bo Li, Jinchao Zhang, Chuanrong Li, Weiping Wang:
Toward Automated Field Semantics Inference for Binary Protocol Reverse Engineering. 764-776 - Roberto Casula, Giulia Orrù
, Stefano Marrone
, Umberto Gagliardini
, Gian Luca Marcialis
, Carlo Sansone
:
Realistic Fingerprint Presentation Attacks Based on an Adversarial Approach. 863-877 - Yuni Lai
, Yulin Zhu
, Wenqi Fan, Xiaoge Zhang
, Kai Zhou
:
Toward Adversarially Robust Recommendation From Adaptive Fraudster Detection. 907-919 - Peng Xu
, Jun Yang
, Gaojie Chen
, Zheng Yang
, Yong Li
, Moe Z. Win
:
Physical-Layer Secret and Private Key Generation in Wireless Relay Networks With Correlated Eavesdropping Channels. 985-1000 - Wenze Mao, Peng Jiang
, Liehuang Zhu
:
Locally Verifiable Batch Authentication in IoMT. 1001-1014 - Taiyu Wang, Qinglin Yang
, Kaiming Zhu, Junbo Wang
, Chunhua Su
, Kento Sato
:
LDS-FL: Loss Differential Strategy Based Federated Learning for Privacy Preserving. 1015-1030 - Aakarsh Malhotra
, Mayank Vatsa
, Richa Singh
, Keith B. Morris
, Afzel Noore
:
Multi-Surface Multi-Technique (MUST) Latent Fingerprint Database. 1041-1055 - Weiwei Feng
, Nanqing Xu
, Tianzhu Zhang
, Baoyuan Wu, Yongdong Zhang
:
Robust and Generalized Physical Adversarial Attacks via Meta-GAN. 1112-1125 - Durba Chatterjee
, Kuheli Pratihar
, Aritra Hazra
, Ulrich Rührmair, Debdeep Mukhopadhyay
:
Systematically Quantifying Cryptanalytic Nonlinearities in Strong PUFs. 1126-1141 - Hongwei Ding
, Yu Sun
, Nana Huang, Zhidong Shen
, Xiaohui Cui
:
TMG-GAN: Generative Adversarial Networks-Based Imbalanced Learning for Network Intrusion Detection. 1156-1167 - Dazhi Zhan
, Yexin Duan, Yue Hu, Weili Li
, Shize Guo, Zhisong Pan
:
MalPatch: Evading DNN-Based Malware Detection With Adversarial Patches. 1183-1198 - Yuanchao Chen
, Yuwei Li
, Zulie Pan
, Yuliang Lu
, Juxing Chen
, Shouling Ji
:
URadar: Discovering Unrestricted File Upload Vulnerabilities via Adaptive Dynamic Testing. 1251-1266 - Changsheng Chen
, Bokang Li, Rizhao Cai
, Jishen Zeng, Jiwu Huang
:
Distortion Model-Based Spectral Augmentation for Generalized Recaptured Document Detection. 1283-1298 - Bei Gong, Chong Guo, Chong Guo, Chen Guo, Yao Sun, Muhammad Waqas, Sheng Chen:
SLIM: A Secure and Lightweight Multi-Authority Attribute-Based Signcryption Scheme for IoT. 1299-1312 - Yunhao Du
, Cheng Lei
, Zhicheng Zhao
, Yuan Dong
, Fei Su
:
Video-Based Visible-Infrared Person Re-Identification With Auxiliary Samples. 1313-1325 - Elias N. Zois
, Dimitrios Tsourounis
, Dimitrios Kalivas
:
Similarity Distance Learning on SPD Manifold for Writer Independent Offline Signature Verification. 1342-1356 - Zirui Gong
, Liyue Shen, Yanjun Zhang
, Leo Yu Zhang
, Jingwei Wang
, Guangdong Bai, Yong Xiang
:
AgrAmplifier: Defending Federated Learning Against Poisoning Attacks Through Local Update Amplification. 1241-1250 - Kuofeng Gao
, Jiawang Bai
, Baoyuan Wu
, Mengxi Ya, Shu-Tao Xia
:
Imperceptible and Robust Backdoor Attack in 3D Point Cloud. 1267-1282 - Zhi Li, Hao Wang
, Songnian Zhang
, Wenying Zhang
, Rongxing Lu
:
SecKNN: FSS-Based Secure Multi-Party KNN Classification Under General Distance Functions. 1326-1341 - Jiajun Gong
, Wuqi Zhang
, Charles Zhang
, Tao Wang
:
WFDefProxy: Real World Implementation and Evaluation of Website Fingerprinting Defenses. 1357-1371 - Qige Song
, Yafei Sang, Yongzheng Zhang, Shuhao Li
, Xiaolin Xu:
SepBIN: Binary Feature Separation for Better Semantic Comparison and Authorship Verification. 1372-1387 - Leixiao Cheng
, Fei Meng
:
Server-Aided Public Key Authenticated Searchable Encryption With Constant Ciphertext and Constant Trapdoor. 1388-1400 - Yong Dong
, Yinfei Xu
, Tong Zhang
, Yili Xia
:
Optimality of the Proper Gaussian Signal in Complex MIMO Wiretap Channels. 1401-1414 - Yinfei Xu
, Jian Lu
, Xuan Guang
, Wei Xu
:
Information Embedding With Stegotext Reconstruction. 1415-1428 - Amir Mahdi Sadeghzadeh
, Amir Mohammad Sobhanian, Faezeh Dehghan, Rasool Jalili
:
HODA: Hardness-Oriented Detection of Model Extraction Attacks. 1429-1439 - Xiaoguo Li
, Zixi Huang
, Bowen Zhao
, Guomin Yang
, Tao Xiang
, Robert H. Deng
:
STDA: Secure Time Series Data Analytics With Practical Efficiency in Wide-Area Network. 1440-1454 - Tingting Lu
, Junfeng Wang
:
DOMR: Toward Deep Open-World Malware Recognition. 1455-1468 - Jinyoung Lee
, Hyeonsik Yeom
, Si-Hyeon Lee
, Jeongseok Ha
:
Channel Correlation in Multi-User Covert Communication: Friend or Foe? 1469-1482 - Niusen Chen
, Bo Chen
:
HiPDS: A Storage Hardware-Independent Plausibly Deniable Storage System. 1483-1495 - Hengmin Zhang
, Jian Yang, Jianjun Qian
, Guangwei Gao
, Xiangyuan Lan, Zhiyuan Zha
, Bihan Wen
:
Efficient Image Classification via Structured Low-Rank Matrix Factorization Regression. 1496-1509 - Yang Liu
, Guangbo Liang
, Xi Wang
, Peican Zhu
, Zhen Wang
:
Diffusion Containment in Complex Networks Through Collective Influence of Connections. 1510-1524 - Ni Yang
, Ruiyi Gao
, Youzhi Feng
, Huan Su
:
Event-Triggered Impulsive Control for Complex Networks Under Stochastic Deception Attacks. 1525-1534 - Hao Fang
, Ajian Liu
, Jun Wan
, Sergio Escalera
, Chenxu Zhao, Xu Zhang, Stan Z. Li
, Zhen Lei
:
Surveillance Face Anti-Spoofing. 1535-1546 - Jiefu Chen
, Tong Chen, Xing Xu
, Jingran Zhang
, Yang Yang
, Heng Tao Shen
:
Coreset Learning-Based Sparse Black-Box Adversarial Attack for Video Recognition. 1547-1560 - Ashkan Esmaeili
, Marzieh Edraki
, Nazanin Rahnavard, Ajmal Mian
, Mubarak Shah
:
Low-Rank and Sparse Decomposition for Low-Query Decision-Based Adversarial Attacks. 1561-1575 - Xiaohan Hao
, Chao Lin
, Wenhan Dong
, Xinyi Huang
, Hui Xiong
:
Robust and Secure Federated Learning Against Hybrid Attacks: A Generic Architecture. 1576-1588 - Peng Jiang
, Qi Liu, Liehuang Zhu
:
SanIdea: Exploiting Secure Blockchain-Based Access Control via Sanitizable Encryption. 1589-1600 - Houssem Jmal
, Firas Ben Hmida
, Nardine Basta
, Muhammad Ikram
, Mohamad Ali Kâafar
, Andy Walker:
SPGNN-API: A Transferable Graph Neural Network for Attack Paths Identification and Autonomous Mitigation. 1601-1613 - Xinjun Pei
, Xiaoheng Deng
, Shengwei Tian
, Jianqing Liu
, Kaiping Xue
:
Privacy-Enhanced Graph Neural Network for Decentralized Local Graphs. 1614-1629 - Adam Gronowski
, William Paul
, Fady Alajaji
, Bahman Gharesifard
, Philippe Burlina:
Classification Utility, Fairness, and Compactness via Tunable Information Bottleneck and Rényi Measures. 1630-1645 - Weihang Tan
, Sin-Wei Chiu
, Antian Wang
, Yingjie Lao
, Keshab K. Parhi
:
PaReNTT: Low-Latency Parallel Residue Number System and NTT-Based Long Polynomial Modular Multiplication for Homomorphic Encryption. 1646-1659 - Kai Feng
, Marco M. Cook
, Angelos K. Marnerides
:
Sizzler: Sequential Fuzzing in Ladder Diagrams for Vulnerability Detection and Discovery in Programmable Logic Controllers. 1660-1671 - Hodong Kim
, Changhee Hahn
, Hyunwoo J. Kim
, Youngjoo Shin
, Junbeom Hur
:
Deep Learning-Based Detection for Multiple Cache Side-Channel Attacks. 1672-1686 - Junyu Quan, Qin Li
, Lvzhou Li
:
Verifiable Blind Quantum Computation With Identity Authentication for Multi-Type Clients. 1687-1698 - Huafeng Qin
, Chao Fan, Shaojiang Deng
, Yantao Li
, Mounim A. El-Yacoubi
, Gang Zhou
:
AG-NAS: An Attention GRU-Based Neural Architecture Search for Finger-Vein Recognition. 1699-1713 - Dingzhao Li, Jie Qi
, Shaohua Hong
, Pengfei Deng
, Haixin Sun
:
A Class-Incremental Approach With Self-Training and Prototype Augmentation for Specific Emitter Identification. 1714-1727 - Mohammadhadi Shateri
, Francisco Messina
, Fabrice Labeau
, Pablo Piantanida
:
Preserving Privacy in GANs Against Membership Inference Attack. 1728-1743 - Chandra Sharma
, George T. Amariucai
, Shuangqing Wei
:
The Economics of Privacy and Utility: Investment Strategies. 1744-1755 - Yangguang Tian
, Bowen Liu, Yingjiu Li
, Pawel Szalachowski
, Jianying Zhou:
Accountable Fine-Grained Blockchain Rewriting in the Permissionless Setting. 1756-1766 - Bin Yang
, Jun Chen
, Cuiqun Chen, Mang Ye
:
Dual Consistency-Constrained Learning for Unsupervised Visible-Infrared Person Re-Identification. 1767-1779 - Qiongxiu Li
, Jaron Skovsted Gundersen
, Milan Lopuhaä-Zwakenberg
, Richard Heusdens
:
Adaptive Differentially Quantized Subspace Perturbation (ADQSP): A Unified Framework for Privacy-Preserving Distributed Average Consensus. 1780-1793 - Nusrat Farzana Dipu
, Avinash Ayalasomayajula
, Mark M. Tehranipoor, Farimah Farahmandi:
AGILE: Automated Assertion Generation to Detect Information Leakage Vulnerabilities. 1794-1809 - Boyu Zhu
, Changyu Dong, Yuan Zhang
, Yunlong Mao
, Sheng Zhong
:
Toward Universal Detection of Adversarial Examples via Pseudorandom Classifiers. 1810-1825 - Maoguo Gong
, Yuanqiao Zhang
, Yuan Gao
, A. Kai Qin
, Yue Wu
, Shanfeng Wang, Yihong Zhang:
A Multi-Modal Vertical Federated Learning Framework Based on Homomorphic Encryption. 1826-1839 - Ishan Karunanayake
, Jiaojiao Jiang
, Nadeem Ahmed
, Sanjay K. Jha
:
Exploring Uncharted Waters of Website Fingerprinting. 1840-1854 - Xuan Yang
, Dongming Li
:
LED-RFF: LTE DMRS-Based Channel Robust Radio Frequency Fingerprint Identification Scheme. 1855-1869 - Zhenqin Yin
, Xinmin Zhang
, Zhihuan Song
, Zhiqiang Ge
:
Adversarial Learning From Imbalanced Data: A Robust Industrial Fault Classification Method. 1870-1882 - Siguo Bi
, Kai Li
, Shuyan Hu
, Wei Ni
, Cong Wang, Xin Wang
:
Detection and Mitigation of Position Spoofing Attacks on Cooperative UAV Swarm Formations. 1883-1895 - Tao Jing, Hongyan Huang, Qinghe Gao, Yue Wu, Yan Huo, Yawei Wang:
Multi-User Physical Layer Authentication Based on CSI Using ResNet in Mobile IIoT. 1896-1907 - Yuhan Suo
, Senchun Chai
, Runqi Chai
, Zhong-Hua Pang
, Yuanqing Xia
, Guo-Ping Liu
:
Security Defense of Large-Scale Networks Under False Data Injection Attacks: An Attack Detection Scheduling Approach. 1908-1921 - Jiawei Liu
, Jingyi Xie
, Yang Wang
, Zheng-Jun Zha
:
Adaptive Texture and Spectrum Clue Mining for Generalizable Face Forgery Detection. 1922-1934 - Junlong Mao, Huiyi Tang, Shanxiang Lyu
, Zhengchun Zhou
, Xiaochun Cao
:
Content-Aware Quantization Index Modulation: Leveraging Data Statistics for Enhanced Image Watermarking. 1935-1947 - Meng Chen
, Li Lu
, Jiadi Yu
, Zhongjie Ba
, Feng Lin
, Kui Ren
:
AdvReverb: Rethinking the Stealthiness of Audio Adversarial Examples to Human Perception. 1948-1962 - Yuntao Wang
, Zhou Su
, Abderrahim Benslimane
, Qichao Xu
, Minghui Dai
, Ruidong Li
:
Collaborative Honeypot Defense in UAV Networks: A Learning-Based Game Approach. 1963-1978 - Chuan Zhang
, Haojun Xuan
, Tong Wu
, Ximeng Liu
, Guomin Yang
, Liehuang Zhu
:
Blockchain-Based Dynamic Time-Encapsulated Data Auditing for Outsourcing Storage. 1979-1993 - Jiajing Wu
, Dan Lin
, Qishuang Fu
, Shuo Yang
, Ting Chen
, Zibin Zheng
, Bowen Song:
Toward Understanding Asset Flows in Crypto Money Laundering Through the Lenses of Ethereum Heists. 1994-2009 - Kerem Ozfatura
, Emre Ozfatura
, Alptekin Küpçü
, Deniz Gündüz
:
Byzantines Can Also Learn From History: Fall of Centered Clipping in Federated Learning. 2010-2022 - Chen Liu
, Bo Li
, Jun Zhao
, Weiwei Feng, Xudong Liu, Chunpei Li
:
A2-CLM: Few-Shot Malware Detection Based on Adversarial Heterogeneous Graph Augmentation. 2023-2038 - Laura Crosara
, Francesco Ardizzon
, Stefano Tomasin
, Nicola Laurenti:
Worst-Case Spoofing Attack and Robust Countermeasure in Satellite Navigation Systems. 2039-2050 - Fanliang Hu
, Jian Shen
, Pandi Vijayakumar
:
Side-Channel Attacks Based on Multi-Loss Regularized Denoising AutoEncoder. 2051-2065 - Erez Danieli, Menachem Goldzweig, Moshe Avital
, Itamar Levi
:
Revealing the Secrets of Radio Embedded Systems: Extraction of Raw Information via RF. 2066-2081 - Ahmad Bazzi
, Marwa Chafii
:
Secure Full Duplex Integrated Sensing and Communications. 2082-2097 - Kutub Uddin
, Yoonmo Yang, Tae Hyun Jeong, Byung Tae Oh
:
A Robust Open-Set Multi-Instance Learning for Defending Adversarial Attacks in Digital Image. 2098-2111 - Yiming Yang
, Weipeng Hu
, Haifeng Hu
:
Unsupervised NIR-VIS Face Recognition via Homogeneous-to-Heterogeneous Learning and Residual-Invariant Enhancement. 2112-2126 - Linkun Fan
, Fazhi He
, Tongzhen Si
, Rubin Fan, Chuanlong Ye
, Bing Li
:
MBA: Backdoor Attacks Against 3D Mesh Classifier. 2127-2142 - Shengbang Fang
, Matthew C. Stamm
:
Attacking Image Splicing Detection and Localization Algorithms Using Synthetic Traces. 2143-2156 - Wenbing Tang
, Yuan Zhou
, Yang Liu
, Zuohua Ding
, Jing Liu
:
Robust Motion Planning for Multi-Robot Systems Against Position Deception Attacks. 2157-2170 - Yuexin Xiang
, Yuchen Lei
, Ding Bao
, Tiantian Li
, Qingqing Yang, Wenmao Liu
, Wei Ren
, Kim-Kwang Raymond Choo
:
BABD: A Bitcoin Address Behavior Dataset for Pattern Analysis. 2171-2185 - Ziyu Wei
, Xi Yang
, Nannan Wang
, Xinbo Gao
:
Dual-Adversarial Representation Disentanglement for Visible Infrared Person Re-Identification. 2186-2200 - Guowei Ling
, Fei Tang
, Chaochao Cai, Jinyong Shan
, Haiyang Xue
, Wulu Li, Peng Tang
, Xinyi Huang
, Weidong Qiu
:
P²FRPSI: Privacy-Preserving Feature Retrieved Private Set Intersection. 2201-2216 - Meng Li
, Hanni Ding, Qing Wang, Mingwei Zhang, Weizhi Meng
, Liehuang Zhu
, Zijian Zhang
, Xiaodong Lin
:
Decentralized Threshold Signatures With Dynamically Private Accountability. 2217-2230 - Jinguang Han
, Willy Susilo
, Nan Li
, Xinyi Huang
:
OLBS: Oblivious Location-Based Services. 2231-2243 - Zhenyu Guo
, Xin Li
, Jiamou Liu
, Zijian Zhang
, Meng Li
, Jingjing Hu
, Liehuang Zhu
:
Graph-Based Covert Transaction Detection and Protection in Blockchain. 2244-2257 - Fahong Zhang, Chen Yang
, Rui Zong
, Xinran Zheng, Jianfei Wang
, Yishuo Meng
:
An Efficient and Scalable FHE-Based PDQ Scheme: Utilizing FFT to Design a Low Multiplication Depth Large-Integer Comparison Algorithm. 2258-2272 - Zongkun Sun
, Yanzhen Ren
, Yihuan Huang, Wuyang Liu
, Hongcheng Zhu
:
AFPM: A Low-Cost and Universal Adversarial Defense for Speaker Recognition Systems. 2273-2287 - Jianchang Lai
, Willy Susilo
, Robert H. Deng
, Fuchun Guo
:
SDSS: Sequential Data Sharing System in IoT. 2288-2299 - Liang Guo
, Jie Jia
, Jian Chen
, Xingwei Wang
:
Secure Communication Optimization in NOMA Systems With UAV-Mounted STAR-RIS. 2300-2314 - Rui Gao
, Jiangshuai Huang
, Xiaojie Su
, Ling Zhao
:
Adaptive Control of Strict-Feedback Nonlinear Systems Under Denial-of-Service: A Synthetic Analysis. 2315-2327 - Weidong Liu
, Xiaojun Mao
, Xiaofei Zhang
, Xin Zhang
:
Efficient Sparse Least Absolute Deviation Regression With Differential Privacy. 2328-2339 - Yanbin Li
, Jiajie Zhu
, Zhe Liu
, Ming Tang
, Shougang Ren:
Deep Learning Gradient Visualization-Based Pre-Silicon Side-Channel Leakage Location. 2340-2355 - Haochen Dou
, Zhenwu Dan, Peng Xu
, Wei Wang
, Shuning Xu, Tianyang Chen, Hai Jin
:
Dynamic Searchable Symmetric Encryption With Strong Security and Robustness. 2370-2384 - Ting Cui
, Yiming Mao, Yang Yang, Yi Zhang, Jiyan Zhang
, Chenhui Jin
:
Congruent Differential Cluster for Binary SPN Ciphers. 2385-2397 - Xiaoxue Hu, Geling Liu, Baolin Zheng, Lingchen Zhao
, Qian Wang
, Yufei Zhang, Minxin Du
:
FastTextDodger: Decision-Based Adversarial Attack Against Black-Box NLP Models With Extremely High Efficiency. 2398-2411 - Jian Chen
, Yuan Gao, Gaoyang Liu
, Ahmed M. Abdelmoniem
, Chen Wang
:
Manipulating Pre-Trained Encoder for Targeted Poisoning Attacks in Contrastive Learning. 2412-2424 - Weiqi Dai
, Jinkai Liu, Yang Zhou, Kim-Kwang Raymond Choo
, Xia Xie, Deqing Zou
, Hai Jin
:
PRBFPT: A Practical Redactable Blockchain Framework With a Public Trapdoor. 2425-2437 - Xiaohu Wang
, Chao Lin
, Xinyi Huang
, Debiao He
:
Anonymity-Enhancing Multi-Hop Locks for Monero-Enabled Payment Channel Networks. 2438-2453 - Na Wang
, Wen Zhou, Jingjing Wang, Yifan Guo, Junsong Fu
, Jianwei Liu:
Secure and Efficient Similarity Retrieval in Cloud Computing Based on Homomorphic Encryption. 2454-2469 - Jiajun Li
, Pu Wang
, Zheng Yan
, Yishan Yang
, Kai Zeng
:
BGKey: Group Key Generation for Backscatter Communications Among Multiple Devices. 2470-2486 - Jueun Jeon
, Byeonghui Jeong
, Seungyeon Baek
, Young-Sik Jeong
:
Static Multi Feature-Based Malware Detection Using Multi SPP-net in Smart IoT Environments. 2487-2500 - Yu Wei
, Jingyu Jia
, Yuduo Wu
, Changhui Hu, Changyu Dong
, Zheli Liu
, Xiaofeng Chen
, Yun Peng, Shaowei Wang
:
Distributed Differential Privacy via Shuffling Versus Aggregation: A Curious Study. 2501-2516 - Xiaoli Zhang
, Wenxiang Sun, Zhicheng Xu, Hongbing Cheng
, Chengjun Cai, Helei Cui
, Qi Li
:
EVM-Shield: In-Contract State Access Control for Fast Vulnerability Detection and Prevention. 2517-2532 - Huaibing Peng
, Huming Qiu
, Hua Ma, Shuo Wang, Anmin Fu
, Said F. Al-Sarawi
, Derek Abbott
, Yansong Gao
:
On Model Outsourcing Adaptive Attacks to Deep Learning Backdoor Defenses. 2356-2369 - Tianyu Zhaolu
, Zhiguo Wan
, Huaqun Wang
:
Division of Regulatory Power: Collaborative Regulation for Privacy-Preserving Blockchains. 2533-2548 - Meng Jia
, Jing Chen
, Kun He
, Min Shi
, Yuanzheng Wang, Ruiying Du:
Generic Construction of Threshold Credential Management With User-Autonomy Aggregation. 2549-2564 - Lifeng Huang
, Qiong Huang
, Peichao Qiu
, Shuxin Wei
, Chengying Gao
:
FASTEN: Fast Ensemble Learning for Improved Adversarial Robustness. 2565-2580 - Guoyuan Lin
, Weiqi Luo
, Da Luo
, Jiwu Huang
:
One-Class Neural Network With Directed Statistics Pooling for Spoofing Speech Detection. 2581-2593 - Jianhao Li
, Jiabei Wang
, Rui Zhang
, Yansen Xin
, Wenhan Xu
:
NEMO: Practical Distributed Boolean Queries With Minimal Leakage. 2594-2608 - Jian Liu
, Jiachen Ke
, Jinliang Liu
, Xiangpeng Xie
, Engang Tian
:
Outlier-Resistant Non-Fragile Control of Nonlinear Networked Systems Under DoS Attacks and Multi-Variable Event-Triggered SC Protocol. 2609-2622 - Zhenqing Qu
, Xiang Ling, Ting Wang
, Xiang Chen
, Shouling Ji
, Chunming Wu
:
AdvSQLi: Generating Adversarial SQL Injections Against Real-World WAF-as-a-Service. 2623-2638 - Yibin Zhang
, Qianyun Zhang
, Haitao Zhao
, Yun Lin
, Guan Gui
, Hikmet Sari
:
Multisource Heterogeneous Specific Emitter Identification Using Attention Mechanism-Based RFF Fusion Method. 2639-2650 - Barak Amihood
, Asaf Cohen
:
Covertly Controlling a Linear System. 2651-2663 - Janith Kavindu Dassanayake
, Dulaj Gunasinghe
, Gayan Amarasuriya Aruma Baduge
:
Secrecy Rate Analysis and Active Pilot Attack Detection for IRS-Aided Massive MIMO Systems. 2664-2679 - Raymond K. Zhao
, Sarah McCarthy, Ron Steinfeld
, Amin Sakzad
, Máire O'Neill
:
Quantum-Safe HIBE: Does It Cost a Latte? 2680-2695 - Zhenyu Cui
, Jiahuan Zhou
, Yuxin Peng
:
DMA: Dual Modality-Aware Alignment for Visible-Infrared Person Re-Identification. 2696-2708 - Shuyi Li
, Bob Zhang
, Lifang Wu
, Ruijun Ma
, Xin Ning
:
Robust and Sparse Least Square Regression for Finger Vein and Finger Knuckle Print Recognition. 2709-2719 - Haotian Wang
, Jun Tao
, Dingwen Chi
, Yu Gao
, Zuyan Wang
, Dika Zou
, Yifan Xu
:
A Preference-Driven Malicious Platform Detection Mechanism for Users in Mobile Crowdsensing. 2720-2731 - Jun Zhao
, Kai Zhang
, Junqing Gong
, Haifeng Qian
:
Lavida: Large-Universe, Verifiable, and Dynamic Fine-Grained Access Control for E-Health Cloud. 2732-2745 - Qiuyun Tong
, Xinghua Li
, Yinbin Miao
, Yunwei Wang
, Ximeng Liu
, Robert H. Deng
:
Beyond Result Verification: Efficient Privacy-Preserving Spatial Keyword Query With Suppressed Leakage. 2746-2760 - Mei Jiang
, Yannan Li
, Willy Susilo
, Dung Hoang Duong
:
Quantum-Safe Puncturable Signatures With Their Application in Blockchain. 2761-2770 - Kimia Zamiri Azar, Hadi Mardani Kamali
, Farimah Farahmandi, Mark M. Tehranipoor:
Improving Bounded Model Checkers Scalability for Circuit De-Obfuscation: An Exploration. 2771-2785 - Alejandro Cohen
, Asaf Cohen
, Omer Gurewitz
:
Secure Adaptive Group Testing. 2786-2799 - Rui Sun
, Long Chen
, Lei Zhang, Ruirui Xie, Jun Gao
:
Robust Visible-Infrared Person Re-Identification Based on Polymorphic Mask and Wavelet Graph Convolutional Network. 2800-2813 - Weixuan Tang
, Zhili Zhou
, Bin Li
, Kim-Kwang Raymond Choo
, Jiwu Huang
:
Joint Cost Learning and Payload Allocation With Image-Wise Attention for Batch Steganography. 2826-2839 - Mang Ye
, Wei Shen
, Junwu Zhang
, Yao Yang, Bo Du
:
SecureReID: Privacy-Preserving Anonymization for Person Re-Identification. 2840-2853 - Adrián Tobar Nicolau
, Javier Parra-Arnau, Jordi Forné
, Esteve Pallarès
:
m-Eligibility With Minimum Counterfeits and Deletions for Privacy Protection in Continuous Data Publishing. 2854-2864 - Rui Zhang, Lei Zhang, Qian Wu, Jianying Zhou:
Secure Channel Establishment Scheme for Task Delivery in Vehicular Cloud Computing. 2865-2880 - Junlin Liu
, Xinchen Lyu
, Qimei Cui
, Xiaofeng Tao
:
Similarity-Based Label Inference Attack Against Training and Inference of Split Learning. 2881-2895 - Huy Nguyen
, Kien Nguyen Thanh
, Sridha Sridharan
, Clinton Fookes
:
AG-ReID.v2: Bridging Aerial and Ground Views for Person Re-Identification. 2896-2908 - Enas E. Abulibdeh
, Leen Younes
, Baker Mohammad
, Khaled Humood
, Hani H. Saleh
, Mahmoud Al-Qutayri
:
DRAM-Based PUF Utilizing the Variation of Adjacent Cells. 2909-2918 - Fucai Luo
, Haiyan Wang
, Willy Susilo
, Xingfu Yan
, Xiaofan Zheng:
Public Trace-and-Revoke Proxy Re-Encryption for Secure Data Sharing in Clouds. 2919-2934 - Runmeng Du
, Xuru Li
, Daojing He
, Kim-Kwang Raymond Choo
:
Toward Secure and Verifiable Hybrid Federated Learning. 2935-2950 - He Yang
, Wei Xi
, Yuhao Shen, Canhui Wu, Jizhong Zhao:
RoseAgg: Robust Defense Against Targeted Collusion Attacks in Federated Learning. 2951-2966 - Haozhe Li
, Yilin Liao
, Zijian Tian, Zhaoran Liu
, Jiaqi Liu
, Xinggao Liu
:
Bidirectional Stackable Recurrent Generative Adversarial Imputation Network for Specific Emitter Missing Data Imputation. 2967-2980 - Norbert Tihanyi
, Tamás Bisztray
, Bertalan Borsos
, Sebastien Raveau
:
Privacy-Preserving Password Cracking: How a Third Party Can Crack Our Password Hash Without Learning the Hash Value or the Cleartext. 2981-2996 - Ying Liang, Wenjie Wu, Haobo Li, Xiaojun Chang, Xiaojiang Chen, Jinye Peng, Pengfei Xu:
DCS-Gait: A Class-Level Domain Adaptation Approach for Cross-Scene and Cross-State Gait Recognition Using Wi-Fi CSI. 2997-3007 - Mingxing Duan
, Kailun Jiao, Siyang Yu, Zhibang Yang
, Bin Xiao
, Kenli Li
:
MC-Net: Realistic Sample Generation for Black-Box Attacks. 3008-3022 - Jieli Liu
, Jinze Chen
, Jiajing Wu
, Zhiying Wu
, Junyuan Fang
, Zibin Zheng
:
Fishing for Fraudsters: Uncovering Ethereum Phishing Gangs With Blockchain Data. 3038-3050 - Min Long
, Quantao Yao
, Le-Bing Zhang
, Fei Peng
:
Face De-Morphing Based on Diffusion Autoencoders. 3051-3063 - Yuanyuan Qing
, Tao Bai
, Zhuotao Liu, Pierre Moulin, Bihan Wen
:
Detection of Adversarial Attacks via Disentangling Natural Images and Perturbations. 2814-2825 - Zhankai Li
, Weiping Wang
, Jie Li
, Kai Chen
, Shigeng Zhang
:
UCG: A Universal Cross-Domain Generator for Transferable Adversarial Examples. 3023-3037 - Yun Wen
, Gaojie Chen
, Sisai Fang
, Miaowen Wen
, Stefano Tomasin
, Marco Di Renzo
:
RIS-Assisted UAV Secure Communications With Artificial Noise-Aware Trajectory Design Against Multiple Colluding Curious Users. 3064-3076 - Chuan Sheng
, Yu Yao
, Lianxiang Zhao, Peng Zeng
, Jianming Zhao
:
Scanner-Hunter: An Effective ICS Scanning Group Identification System. 3077-3092 - Fangling Jiang
, Yunfan Liu
, Haolin Si, Jingjing Meng, Qi Li
:
Cross-Scenario Unknown-Aware Face Anti-Spoofing With Evidential Semantic Consistency Learning. 3093-3108 - Baojin Huang
, Zhongyuan Wang
, Jifan Yang
, Zhen Han
, Chao Liang
:
Unlabeled Data Assistant: Improving Mask Robustness for Face Recognition. 3109-3123 - Joakim Tutt
, Olga Taran
, Roman Chaban
, Brian Pulfer
, Yury Belousov
, Taras Holotyak, Slava Voloshynovskiy
:
Authentication of Copy Detection Patterns: A Pattern Reliability Based Approach. 3124-3134 - Shuai Li, Zhemin Yang
, Yunteng Yang, Dingyi Liu
, Min Yang:
Identifying Cross-User Privacy Leakage in Mobile Mini-Apps at a Large Scale. 3135-3147 - Xin Zhang, Kejiang Chen
, Jinyang Ding
, Yuqi Yang, Weiming Zhang
, Nenghai Yu
:
Provably Secure Public-Key Steganography Based on Elliptic Curve Cryptography. 3148-3163 - Shenyi Zhang
, Baolin Zheng, Peipei Jiang
, Lingchen Zhao
, Chao Shen
, Qian Wang
:
Perception-Driven Imperceptible Adversarial Attack Against Decision-Based Black-Box Models. 3164-3177 - Andi Liu
, Yizhong Liu
, Qianhong Wu
, Boyu Zhao
, Dongyu Li
, Yuan Lu
, Rongxing Lu
, Willy Susilo
:
CHERUBIM: A Secure and Highly Parallel Cross-Shard Consensus Using Quadruple Pipelined Two-Phase Commit for Sharding Blockchains. 3178-3193 - Mohamed K. M. Fadul
, Donald R. Reising
, Lakmali P. Weerasena, T. Daniel Loveless
, Mina Sartipi, Joshua H. Tyler
:
Improving RF-DNA Fingerprinting Performance in an Indoor Multipath Environment Using Semi-Supervised Learning. 3194-3209 - Mengnan Zhao
, Lihe Zhang
, Wei Wang
, Yuqiu Kong
, Baocai Yin
:
Adversarial Attacks on Scene Graph Generation. 3210-3225 - Daolin Wen
, Xiaowu Mu
:
Secure Dual Asynchronous Tracking Control for Markov Jump Systems Under Hybrid Cyberattacks. 3226-3236 - Kai Zeng
, Kejiang Chen
, Jiansong Zhang
, Weiming Zhang
, Nenghai Yu
:
Toward Secure and Robust Steganography for Black-Box Generated Images. 3237-3250 - Tiong-Sik Ng
, Jacky Chen Long Chai, Cheng-Yaw Low
, Andrew Beng Jin Teoh
:
Self-Attentive Contrastive Learning for Conditioned Periocular and Face Biometrics. 3251-3264 - Yulong Yang
, Chenhao Lin
, Qian Li
, Zhengyu Zhao
, Haoran Fan, Dawei Zhou, Nannan Wang
, Tongliang Liu
, Chao Shen
:
Quantization Aware Attack: Enhancing Transferable Adversarial Attacks by Model Quantization. 3265-3278 - Peng Xu
, Gaojie Chen
, Zheng Yang
, Yong Li
, Stefano Tomasin
:
Multiple Access Wiretap Channel With Partial Rate-Limited Feedback. 3279-3294 - Dayong Ye
, Tianqing Zhu
, Kun Gao, Wanlei Zhou
:
Defending Against Label-Only Attacks via Meta-Reinforcement Learning. 3295-3308 - Jia-Si Weng
, Shenglong Yao, Yuefeng Du
, Junjie Huang, Jian Weng
, Cong Wang
:
Proof of Unlearning: Definitions and Instantiation. 3309-3323 - Xingyu Chen
, Huici Wu
, Xiaofeng Tao
, Haowei Wang
:
Polar Coding for Wiretap Channels With Random States Non-Causally Available at the Encoder. 3324-3338 - Qing Yang
, Cheng Wang
, Haifeng Yuan, Jipeng Cui
, Teng Hu, Xue Chen
, Changjun Jiang
:
Approaching the Information-Theoretic Limit of Privacy Disclosure With Utility Guarantees. 3339-3352 - Tolun Tosun
, Erkay Savas
:
Zero-Value Filtering for Accelerating Non-Profiled Side-Channel Attack on Incomplete NTT-Based Implementations of Lattice-Based Cryptography. 3353-3365 - Xiaoyu Ji
, Qinhong Jiang
, Chaohao Li
, Zhuoyang Shi, Wenyuan Xu
:
Watch Your Speed: Injecting Malicious Voice Commands via Time-Scale Modification. 3366-3379 - Zhuo Chen
, Liehuang Zhu
, Peng Jiang
, Can Zhang
, Feng Gao
, Fuchun Guo
:
Exploring Unobservable Blockchain-Based Covert Channel for Censorship-Resistant Systems. 3380-3394 - Yury Belousov
, Guillaume Quétant
, Brian Pulfer
, Roman Chaban
, Joakim Tutt
, Olga Taran
, Taras Holotyak, Slava Voloshynovskiy
:
A Machine Learning-Based Digital Twin for Anti-Counterfeiting Applications With Copy Detection Patterns. 3395-3408 - Ruiyang Xia, Decheng Liu
, Jie Li
, Lin Yuan
, Nannan Wang
, Xinbo Gao
:
MMNet: Multi-Collaboration and Multi-Supervision Network for Sequential Deepfake Detection. 3409-3422 - Songlin Hu
, Xiaohua Ge
, Wei Zhang, Dong Yue
:
DoS-Resilient Load Frequency Control of Multi-Area Power Systems: An Attack-Parameter-Dependent Approach. 3423-3434 - Pengyu Qiu
, Xuhong Zhang
, Shouling Ji
, Chong Fu
, Xing Yang, Ting Wang
:
HashVFL: Defending Against Data Reconstruction Attacks in Vertical Federated Learning. 3435-3450 - Dong Xie
, Jinghua Yang, Bin Wu, Weixin Bian
, Fulong Chen
, Taochun Wang
:
An Effectively Applicable to Resource Constrained Devices and Semi-Trusted Servers Authenticated Key Agreement Scheme. 3451-3464 - Kai Li
, Jingjing Zheng
, Xin Yuan
, Wei Ni
, Özgür B. Akan, H. Vincent Poor
:
Data-Agnostic Model Poisoning Against Federated Learning: A Graph Autoencoder Approach. 3465-3480 - Jiahui Wu
, Weizhe Zhang
, Fucai Luo
:
On the Security of "LSFL: A Lightweight and Secure Federated Learning Scheme for Edge Computing". 3481-3482 - Xingquan Fu
, Guanghui Wen
, Mengfei Niu
, Wei Xing Zheng
:
Distributed Secure Filtering Against Eavesdropping Attacks in SINR-Based Sensor Networks. 3483-3494 - Jingzhe Ma
, Xiaoqing Zhang
, Shiqi Yu
:
An Identity-Preserved Framework for Human Motion Transfer. 3495-3509 - Fenghong Yang, Runqing Jiang, Yan Yan
, Jing-Hao Xue
, Biao Wang, Hanzi Wang
:
Dual-Mode Learning for Multi-Dataset X-Ray Security Image Detection. 3510-3524 - Wei Liang
, Siqi Xie, Kuan-Ching Li
, Xiong Li
, Xiaoyan Kui
, Albert Y. Zomaya
:
MC-DSC: A Dynamic Secure Resource Configuration Scheme Based on Medical Consortium Blockchain. 3525-3538 - Anton Wahrstätter
, Matthew Solomon, Ben DiFrancesco, Vitalik Buterin, Davor Svetinovic
:
BaseSAP: Modular Stealth Address Protocol for Programmable Blockchains. 3539-3553 - Simon Mandlík
, Tomás Pevný
, Václav Smídl
, Lukás Bajer
:
Malicious Internet Entity Detection Using Local Graph Inference. 3554-3566 - Yulin Zhu
, Tomasz P. Michalak
, Xiapu Luo
, Xiaoge Zhang
, Kai Zhou
:
Toward Secrecy-Aware Attacks Against Trust Prediction in Signed Social Networks. 3567-3580 - Hao Yang
, Shiyu Shen
, Zhe Liu
, Yunlei Zhao
:
cuXCMP: CUDA-Accelerated Private Comparison Based on Homomorphic Encryption. 3581-3592 - Qi Jiang
, Guichuan Zhao
, Xindi Ma
, Meng Li
, Youliang Tian
, Xinghua Li
:
Cross-Modal Learning Based Flexible Bimodal Biometric Authentication With Template Protection. 3593-3607 - Farah Ferdaus
, Bashir M. Sabquat Bahar Talukder
, Md. Tauhidur Rahman
:
Hiding Information for Secure and Covert Data Storage in Commercial ReRAM Chips. 3608-3619 - Huanran Wang
, Wu Yang
, Dapeng Man
, Jiguang Lv
, Shuai Han
, Jingwen Tan, Tao Liu
:
Anchor Link Prediction for Cross-Network Digital Forensics From Local and Global Perspectives. 3620-3635 - Elijah Pelofske
:
Analysis of a Programmable Quantum Annealer as a Random Number Generator. 3636-3643 - Zhongyun Hua
, Yan Tong, Yifeng Zheng
, Yuhong Li
, Yushu Zhang
:
PPGloVe: Privacy-Preserving GloVe for Training Word Vectors in the Dark. 3644-3658 - Huafeng Kuang
, Hong Liu
, Xianming Lin
, Rongrong Ji
:
Defense Against Adversarial Attacks Using Topology Aligning Adversarial Training. 3659-3673 - Derui Zhu
, Jinfu Chen
, Xuebing Zhou, Weiyi Shang, Ahmed E. Hassan
, Jens Grossklags
:
Vulnerabilities of Data Protection in Vertical Federated Learning Training and Countermeasures. 3674-3689 - Zhuangzhi Chen
, Zhangwei Wang
, Dongwei Xu
, Jiawei Zhu, Weiguo Shen
, Shilian Zheng
, Qi Xuan
, Xiaoniu Yang
:
Learn to Defend: Adversarial Multi-Distillation for Automatic Modulation Recognition Models. 3690-3702 - Xinwei Liu
, Kiran B. Raja
, Renfang Wang
, Hong Qiu
, Hucheng Wu
, Dechao Sun
, Qiguang Zheng, Nian Liu, Xiaoxia Wang, Gehang Huang, Raghavendra Ramachandra
, Christoph Busch
:
A Latent Fingerprint in the Wild Database. 3703-3718 - Hao-Tian Wu
, Yiu-Ming Cheung
, Zhihong Tian
, Dingcai Liu, Xiangyang Luo
, Jiankun Hu
:
Lossless Data Hiding in NTRU Cryptosystem by Polynomial Encoding and Modulation. 3719-3732 - Xiaogang Zhu
, Siyu Zhang
, Chaoran Li
, Sheng Wen
, Yang Xiang
:
Fuzzing Android Native System Libraries via Dynamic Data Dependency Graph. 3733-3744 - Min Wang
, Xuefei Yin
, Jiankun Hu
:
Cancellable Deep Learning Framework for EEG Biometrics. 3745-3757 - Xingjian Zhang
, Haochen Gong
, Rui Chang
, Yajin Zhou
:
RECAST: Mitigating Conflict-Based Cache Attacks Through Fine-Grained Dynamic Mapping. 3758-3771 - Wael Issa
, Nour Moustafa
, Benjamin P. Turnbull
, Kim-Kwang Raymond Choo
:
RVE-PFL: Robust Variational Encoder-Based Personalized Federated Learning Against Model Inversion Attacks. 3772-3787 - Huikai Shao
, Yuchen Zou
, Chengcheng Liu
, Qiang Guo
, Dexing Zhong
:
Learning to Generalize Unseen Dataset for Cross-Dataset Palmprint Recognition. 3788-3799 - Junhao Huang
, Haosong Zhao
, Jipeng Zhang
, Wangchen Dai
, Lu Zhou, Ray C. C. Cheung
, Çetin Kaya Koç
, Donglong Chen
:
Yet Another Improvement of Plantard Arithmetic for Faster Kyber on Low-End 32-bit IoT Devices. 3800-3813 - Jiahe Tian
, Peng Chen, Cai Yu
, Xiaomeng Fu
, Xi Wang
, Jiao Dai
, Jizhong Han:
Learning to Discover Forgery Cues for Face Forgery Detection. 3814-3828 - Wenhan Ge
, Zeyuan Cui
, Junfeng Wang
, Binhui Tang
, Xiaohui Li
:
MetaCluster: A Universal Interpretable Classification Framework for Cybersecurity. 3829-3843 - Changsong Jiang
, Chunxiang Xu
, Yunxia Han
, Zhao Zhang
, Kefei Chen
:
Two-Factor Authenticated Key Exchange From Biometrics With Low Entropy Rates. 3844-3856 - Xiao Cai
, Kaibo Shi
, Yanbin Sun
, Jinde Cao
, Shiping Wen
, Cheng Qiao
, Zhihong Tian
:
Stability Analysis of Networked Control Systems Under DoS Attacks and Security Controller Design With Mini-Batch Machine Learning Supervision. 3857-3865 - Bowen Ma
, Tong Jia
, Mingyuan Li, Songsheng Wu, Hao Wang
, Dongyue Chen
:
Toward Dual-View X-Ray Baggage Inspection: A Large-Scale Benchmark and Adaptive Hierarchical Cross Refinement for Prohibited Item Discovery. 3866-3878 - Sicheng Zhang
, Yandie Yang
, Ziyao Zhou
, Zhi Sun
, Yun Lin
:
DIBAD: A Disentangled Information Bottleneck Adversarial Defense Method Using Hilbert-Schmidt Independence Criterion for Spectrum Security. 3879-3891 - Fengqun Wang
, Jie Cui
, Qingyang Zhang
, Debiao He
, Hong Zhong
:
Blockchain-Based Secure Cross-Domain Data Sharing for Edge-Assisted Industrial Internet of Things. 3892-3905 - Mingping Qi
, Wei Hu
, Yu Tai:
SAE+: One-Round Provably Secure Asymmetric SAE Protocol for Client-Server Model. 3906-3913 - Sree Ranjani Rajendran
, Nusrat Farzana Dipu
, Shams Tarek
, Hadi Mardani Kamali
, Farimah Farahmandi, Mark M. Tehranipoor:
Exploring the Abyss? Unveiling Systems-on-Chip Hardware Vulnerabilities Beneath Software. 3914-3926 - Chongyao Xu
, Litao Zhang, Pui-In Mak
, Rui Paulo Martins
, Man-Kay Law
:
Fully Symmetrical Obfuscated Interconnection and Weak-PUF-Assisted Challenge Obfuscation Strong PUFs Against Machine-Learning Modeling Attacks. 3927-3942 - Zuomin Qu
, Zuping Xi
, Wei Lu
, Xiangyang Luo, Qian Wang
, Bin Li
:
DF-RAP: A Robust Adversarial Perturbation for Defending Against Deepfakes in Real-World Social Network Scenarios. 3943-3957 - Rongke Liu
, Dong Wang
, Yizhi Ren
, Zhen Wang
, Kaitian Guo, Qianqian Qin, Xiaolei Liu
:
Unstoppable Attack: Label-Only Model Inversion Via Conditional Diffusion Model. 3958-3973 - Hongyan Fei
, Chuanwei Huang, Song Wu
, Zheng Wang
, Zexi Jia
, Jufu Feng
:
Fingerprint Presentation Attack Detection by Region Decomposition. 3974-3985 - Tongshuai Wu
, Liwei Chen
, Gewangzi Du
, Dan Meng, Gang Shi
:
UltraVCS: Ultra-Fine-Grained Variable-Based Code Slicing for Automated Vulnerability Detection. 3986-4000 - Da Ke
, Xiang Wang
, Zhitao Huang
:
Frequency-Selective Adversarial Attack Against Deep Learning-Based Wireless Signal Classifiers. 4001-4011 - Xiangming Wang
, Yang Liu
, Kexin Jiao
, Pengfei Liu, Xiapu Luo
, Ting Liu
:
Intrusion Device Detection in Fieldbus Networks Based on Channel-State Group Fingerprint. 4012-4027 - Mengxue Yang
, Huaqun Wang
, Debiao He
:
Puncturable Attribute-Based Encryption From Lattices for Classified Document Sharing. 4028-4042 - Baleegh Ahmad
, Shailja Thakur
, Benjamin Tan
, Ramesh Karri
, Hammond Pearce
:
On Hardware Security Bug Code Fixes by Prompting Large Language Models. 4043-4057 - Tianyi Zheng
, Bo Li
, Shuang Wu
, Ben Wan, Guodong Mu
, Shice Liu
, Shouhong Ding, Jia Wang
:
MFAE: Masked Frequency Autoencoders for Domain Generalization Face Anti-Spoofing. 4058-4069 - Xinchen Lyu
, Xinyun Hou, Chenshan Ren, Xin Ge, Penglin Yang, Qimei Cui
, Xiaofeng Tao
:
Secure and Efficient Federated Learning With Provable Performance Guarantees via Stochastic Quantization. 4070-4085 - Samuel N. Eshun
, Paolo Palmieri
:
A Cryptographic Protocol for Efficient Mutual Location Privacy Through Outsourcing in Indoor Wi-Fi Localization. 4086-4099 - Ce Gao, Kang Zhang, Weiwei Wang, Zhicheng X. Cao
, Liaojun Pang, Eryun Liu
, Heng Zhao
:
Protected Face Templates Generation Based on Multiple Partial Walsh Transformations and Simhash. 4100-4113 - Yichao Tang
, Chuntao Wang
, Shijun Xiang
, Yiu-Ming Cheung
:
A Robust Reversible Watermarking Scheme Using Attack-Simulation-Based Adaptive Normalization and Embedding. 4114-4129 - Shuai Zhou
, Tianqing Zhu
, Dayong Ye
, Wanlei Zhou
, Wei Zhao:
Inversion-Guided Defense: Detecting Model Stealing Attacks by Output Inverting. 4130-4145 - Fangyuan Sun
, Jia Yu
, Jiankun Hu
:
Privacy-Preserving Approximate Minimum Community Search on Large Networks. 4146-4160 - Xiao Yang, Chengru Zhang
, Haiyang Xue
, Man Ho Au
:
Efficient Verifiably Encrypted ECDSA Schemes From Castagnos-Laguillaumie and Joye-Libert Encryptions. 4161-4173 - Jinling Tang
, Haixia Xu
, Mingsheng Wang, Tao Tang
, Chunying Peng, Huimei Liao:
A Flexible and Scalable Malicious Secure Aggregation Protocol for Federated Learning. 4174-4187 - Jinliang Liu
, Yanhui Dong, Lijuan Zha
, Xiangpeng Xie
, Engang Tian
:
Reinforcement Learning-Based Tracking Control for Networked Control Systems With DoS Attacks. 4188-4197 - Feng Lin
, Hao Yan
, Jin Li
, Ziwei Liu
, Li Lu
, Zhongjie Ba
, Kui Ren
:
PhaDe: Practical Phantom Spoofing Attack Detection for Autonomous Vehicles. 4199-4214 - Jingwei Jiang
, Ding Wang
:
QPASE: Quantum-Resistant Password-Authenticated Searchable Encryption for Cloud Storage. 4231-4246 - Tai Yue
, Fengwei Zhang
, Zhenyu Ning
, Pengfei Wang
, Xu Zhou
, Kai Lu, Lei Zhou
:
Armor: Protecting Software Against Hardware Tracing Techniques. 4247-4262 - Rahul Kande
, Hammond Pearce
, Benjamin Tan
, Brendan Dolan-Gavitt
, Shailja Thakur
, Ramesh Karri
, Jeyavijayan Rajendran:
(Security) Assertions by Large Language Models. 4374-4389 - Hatef Otroshi-Shahreza
, Vedrana Krivokuca Hahn
, Sébastien Marcel
:
Vulnerability of State-of-the-Art Face Recognition Models to Template Inversion Attack. 4585-4600 - Dacan Luo
, Yitao Qiao, Di Xie
, Shifeng Zhang
, Wenxiong Kang
:
Palm Vein Recognition Under Unconstrained and Weak-Cooperative Conditions. 4601-4614 - Yimin Guo
, Yajun Guo
, Ping Xiong
, Fan Yang
, Chengde Zhang
:
Deeper Insight Into Why Authentication Schemes in IoT Environments Fail to Achieve the Desired Security. 4615-4627 - Yunming Zhang
, Dengpan Ye
, Caiyun Xie, Long Tang
, Xin Liao
, Ziyi Liu
, Chuanxi Chen
, Jiacheng Deng:
Dual Defense: Adversarial, Traceable, and Invisible Robust Watermarking Against Face Swapping. 4628-4641 - Yulin Teng
, Pinchang Zhang
, Xiao Chen, Xiaohong Jiang
, Fu Xiao
:
PHY-Layer Authentication Exploiting Channel Sparsity in MmWave MIMO UAV-Ground Systems. 4642-4657 - Yanyan Ni
, Zhen Wang
, Yingjie Fan
, Xia Huang
, Hao Shen
:
Secure Stabilization of Networked Lur'e Systems Suffering From DoS Attacks: A Resilient Memory-Based Event-Trigger Mechanism. 4658-4669 - Florian Merkle
, Maximilian Samsinger
, Pascal Schöttle
, Tomás Pevný
:
On the Economics of Adversarial Machine Learning. 4670-4685 - Xiao Li
, Qiongxiu Li
, Zhanhao Hu
, Xiaolin Hu
:
On the Privacy Effect of Data Enhancement via the Lens of Memorization. 4686-4699 - Mingyang Song
, Zhongyun Hua
, Yifeng Zheng
, Tao Xiang
, Xiaohua Jia
:
SimLESS: A Secure Deduplication System Over Similar Data in Cloud Media Sharing. 4700-4715 - Panjian Huang
, Saihui Hou
, Chunshui Cao
, Xu Liu
, Xuecai Hu, Yongzhen Huang
:
Integral Pose Learning via Appearance Transfer for Gait Recognition. 4716-4727 - Lijun Gao
, Wenjun Liu
, Kai Liu
, Jiehong Wu:
AugSteal: Advancing Model Steal With Data Augmentation in Active Learning Frameworks. 4728-4740 - Daojing He
, Xin Lv, Xueqian Xu, Sammy Chan
, Kim-Kwang Raymond Choo
:
Double-Layer Detection of Internal Threat in Enterprise Systems Based on Deep Learning. 4741-4751 - Jiale Zhang
, Chengcheng Zhu, Xiaobing Sun
, Chunpeng Ge
, Bing Chen
, Willy Susilo
, Shui Yu
:
FLPurifier: Backdoor Defense in Federated Learning via Decoupled Contrastive Training. 4752-4766 - Daniel Gilkarov
, Ran Dubin
:
Steganalysis of AI Models LSB Attacks. 4767-4779 - Beibei Li
, Youtong Chen
, Lei Zhang
, Licheng Wang
, Yanyu Cheng:
HomeSentinel: Intelligent Anti-Fingerprinting for IoT Traffic in Smart Homes. 4780-4793 - Nanqing Xu
, Weiwei Feng
, Tianzhu Zhang
, Yongdong Zhang
:
A Unified Optimization Framework for Feature-Based Transferable Attacks. 4794-4808 - Liwang Zhu
, Xiaotian Zhou, Jiahe Tian
, Wei Li
, Zhongzhi Zhang
:
Defending Against Malicious Influence Control in Online Leader-Follower Social Networks. 4809-4819 - Rongxuan Peng
, Shunquan Tan
, Xianbo Mo
, Bin Li
, Jiwu Huang
:
Employing Reinforcement Learning to Construct a Decision-Making Environment for Image Forgery Localization. 4820-4834 - Dailé Osorio Roig
, Lázaro Janier González-Soler
, Christian Rathgeb
, Christoph Busch
:
Privacy-Preserving Multi-Biometric Indexing Based on Frequent Binary Patterns. 4835-4850 - Guanghan Duan
, Hongwu Lv
, Huiqiang Wang
, Guangsheng Feng
, Xiaoli Li
:
Practical Cyber Attack Detection With Continuous Temporal Graph in Dynamic Network System. 4851-4864 - Jordan Vice
, Naveed Akhtar
, Richard I. Hartley
, Ajmal Mian
:
BAGM: A Backdoor Attack for Manipulating Text-to-Image Generative Models. 4865-4880 - Hao Peng, Jieshuai Yang, Dandan Zhao
, Xiaogang Xu
, Yuwen Pu
, Jianmin Han, Xing Yang
, Ming Zhong
, Shouling Ji
:
MalGNE: Enhancing the Performance and Efficiency of CFG-Based Malware Detector by Graph Node Embedding in Low Dimension Space. 4881-4896 - Marcelo Luís Francisco Abbade
, Welerson Santos Souza, Melissa de Oliveira Santos, Ivan Eduardo Lage Rodrigues, Ivan Aldaya
, Luiz H. Bonani
, Murilo Araújo Romero
:
Discrete Spectral Encryption of Single-Carrier Signals With Pseudo Random Dynamic Keys. 4914-4929 - Lin Yuan
, Wu Chen
, Xiao Pu
, Yan Zhang
, Hongbo Li, Yushu Zhang
, Xinbo Gao
, Touradj Ebrahimi
:
PRO-Face C: Privacy-Preserving Recognition of Obfuscated Face via Feature Compensation. 4930-4944 - Beiyuan Liu
, Jinjing Jiang, Qian Liu, Jiajia Liu
, Sai Xu
:
An Intelligent Reflecting Surface-Based Attack Scheme Against Dual-Functional Radar and Communication Systems. 4945-4956 - Shuyu Chang
, Zhenqi Shi, Fu Xiao
, Haiping Huang
, Xingchen Liu
, Chaorun Sun:
Privacy-Enhanced Frequent Sequence Mining and Retrieval for Personalized Behavior Prediction. 4957-4969 - Hong Zhu
, Yue Zhao, Shengzhi Zhang, Kai Chen
:
NeuralSanitizer: Detecting Backdoors in Neural Networks. 4970-4985 - Jiaxiang Wang
, Aihua Zheng
, Yan Yan, Ran He
, Jin Tang
:
Attribute-Guided Cross-Modal Interaction and Enhancement for Audio-Visual Matching. 4986-4998 - Zhihuang Liu
, Ling Hu
, Zhiping Cai
, Ximeng Liu
, Yanhua Liu
:
SeCoSe: Toward Searchable and Communicable Healthcare Service Seeking in Flexible and Secure EHR Sharing. 4999-5014 - Yuepei Li
, Kai Xu
, Junqing Zhang
, Chongyan Gu
, Yuan Ding
, George Goussetis
, Symon K. Podilchak
:
PUF-Assisted Radio Frequency Fingerprinting Exploiting Power Amplifier Active Load-Pulling. 5015-5029 - Bichen Kang
, Neng Ye
, Jianping An
:
Optimal Signaling for Covert Communications Under Peak Power Constraint. 5030-5045 - Yushu Zhang
, Junhao Ji
, Wenying Wen
, Youwen Zhu
, Zhihua Xia
, Jian Weng
:
Understanding Visual Privacy Protection: A Generalized Framework With an Instance on Facial Privacy. 5046-5059 - Ge Gao, Yuan Zhang
, Yaqing Song
, Shiyu Li
:
PrivSSO: Practical Single-Sign-On Authentication Against Subscription/Access Pattern Leakage. 5075-5089 - Guyue Li
, Paul Staat, Haoyu Li
, Markus Heinrichs
, Christian T. Zenger, Rainer Kronberger, Harald Elders-Boll
, Christof Paar, Aiqun Hu
:
RIS-Jamming: Breaking Key Consistency in Channel Reciprocity-Based Key Generation. 5090-5105 - Jiucui Lu, Jiaran Zhou
, Junyu Dong
, Bin Li
, Siwei Lyu, Yuezun Li
:
ForensicsForest Family: A Series of Multi-Scale Hierarchical Cascade Forests for Detecting GAN-Generated Faces. 5106-5119 - Yi Zhu
, Mohamed Imoussaïne-Aïkous, Carolyn Côté-Lussier
, Tiago H. Falk
:
On the Impact of Voice Anonymization on Speech Diagnostic Applications: A Case Study on COVID-19 Detection. 5151-5165 - Zhirui Zeng, Tao Xiang
, Shangwei Guo
, Jialing He
, Qiao Zhang
, Guowen Xu
, Tianwei Zhang
:
Contrast-Then-Approximate: Analyzing Keyword Leakage of Generative Language Models. 5166-5180 - Zheng Xing
, Chan-Tong Lam
, Xiaochen Yuan
, Sio Kei Im
, Penousal Machado
:
MMQW: Multi-Modal Quantum Watermarking Scheme. 5181-5195 - Peng Jiang
, Qi Liu, Liehuang Zhu
:
Purified Authorization Service With Encrypted Message Moderation. 5196-5206 - Çagdas Gül, Orhun Kara
:
Correction to "A New Construction Method for Keystream Generators". 4198 - Zhijie Xie
, Fan Shi
, Min Zhang, Huimin Ma, Huaixi Wang, Zhenhan Li
, Yunyi Zhang
:
GuessFuse: Hybrid Password Guessing With Multi-View. 4215-4230 - Xinxun Zhang
, Pengfei Jiao
, Mengzhou Gao
, Tianpeng Li
, Yiming Wu
, Huaming Wu
, Zhidong Zhao
:
VGGM: Variational Graph Gaussian Mixture Model for Unsupervised Change Point Detection in Dynamic Networks. 4272-4284 - Jiali Wei
, Ming Fan
, Wenjing Jiao
, Wuxia Jin
, Ting Liu
:
BDMMT: Backdoor Sample Detection for Language Models Through Model Mutation Testing. 4285-4300 - Hai Lu
, Yan Zhu
, Cecilia E. Chen
, Di Ma
:
Toward Efficient Key Extraction of LBC Over Ring: Fast Non-Spherical G-Lattice Sampler and Optimized Perturbation Generation. 4301-4315 - Xiaojie Zhu
, Peisong Shen
, Yueyue Dai
, Lei Xu
, Jiankun Hu
:
Privacy-Preserving and Trusted Keyword Search for Multi-Tenancy Cloud. 4316-4330 - Yun Wen
, Gaojie Chen
, Sisai Fang
, Zheng Chu
, Pei Xiao
, Rahim Tafazolli
:
STAR-RIS-Assisted-Full-Duplex Jamming Design for Secure Wireless Communications System. 4331-4343 - Sangwoo Hong
, Heecheol Yang
, Youngseok Yoon, Jungwoo Lee
:
Group-Wise Verifiable Coded Computing Under Byzantine Attacks and Stragglers. 4344-4357 - Xue-Yang Li
, Xue Yang
, Zhengchun Zhou
, Rongxing Lu
:
Efficiently Achieving Privacy Preservation and Poisoning Attack Resistance in Federated Learning. 4358-4373 - Bo Jiang
, Ming Li
, Ravi Tandon
:
Online Context-Aware Streaming Data Release With Sequence Information Privacy. 4390-4405 - Ye Yao
, Chen Wang, Hui Wang
, Ke Wang
, Yizhi Ren
, Weizhi Meng
:
Embedding Secret Message in Chinese Characters via Glyph Perturbation and Style Transfer. 4406-4419 - Jan Butora
, Patrick Bas
:
Size-Independent Reliable CNN for RJCA Steganalysis. 4420-4431 - Qingqing Hu
, Tianrui Lin
, Tianjian Wei, Nuo Huang
, Yi-Jun Zhu
, Chen Gong
:
Covert Transmission in Water-to-Air Optical Wireless Communication Systems. 4432-4447 - Chuang Tian
, Jianfeng Ma
, Teng Li
, Junwei Zhang
, Chengyan Ma
, Ning Xi
:
Provably and Physically Secure UAV-Assisted Authentication Protocol for IoT Devices in Unattended Settings. 4448-4463 - Ning Wang
, Jixuan Duan, Biwen Chen
, Shangwei Guo
, Tao Xiang
, Kai Zeng
:
Efficient Group Key Generation Based on Satellite Cluster State Information for Drone Swarm. 4464-4479 - Francesco Ardizzon
, Laura Crosara
, Stefano Tomasin
, Nicola Laurenti
:
On Mixing Authenticated and Non-Authenticated Signals Against GNSS Spoofing. 4480-4493 - Zehu Zhang
, Yanping Li
:
NSPFL: A Novel Secure and Privacy-Preserving Federated Learning With Data Integrity Auditing. 4494-4506 - Chunlei Peng
, Zimin Miao
, Decheng Liu
, Nannan Wang
, Ruimin Hu, Xinbo Gao
:
Where Deepfakes Gaze at? Spatial-Temporal Gaze Inconsistency Analysis for Video Face Forgery Detection. 4507-4517 - Xuejiao Luo
, Xiaohui Han
, Wenbo Zuo, Xiaoming Wu, Wenyin Liu
:
MLaD²: A Semi-Supervised Money Laundering Detection Framework Based on Decoupling Training. 4518-4533 - Guoyu Yang
, Chang Chen
, Qi Chen
, Jianan Jiang, Jin Li
, Debiao He
:
Sweeper: Breaking the Validity-Latency Tradeoff in Asynchronous Common Subset. 4534-4546 - Xiaojun Jia
, Jianshu Li, Jindong Gu
, Yang Bai
, Xiaochun Cao
:
Fast Propagation Is Better: Accelerating Single-Step Adversarial Training via Sampling Subnetworks. 4547-4559 - Yuan Xun
, Xiaojun Jia
, Jindong Gu
, Xinwei Liu, Qing Guo
, Xiaochun Cao
:
Minimalism is King! High-Frequency Energy-Based Screening for Data-Efficient Backdoor Attacks. 4560-4571 - Lipeng Wang
, Mingsheng Hu, Zhijuan Jia
, Zhi Guan, Zhong Chen
:
SStore: An Efficient and Secure Provable Data Auditing Platform for Cloud. 4572-4584 - Xuelian Cao
, Zheng Yang
, Jianting Ning
, Chenglu Jin
, Rongxing Lu
, Zhiming Liu
, Jianying Zhou
:
Dynamic Group Time-Based One-Time Passwords. 4897-4913 - Mingzhe Zhai
, Qianhong Wu
, Yizhong Liu
, Bo Qin
, Xiaopeng Dai
, Qiyuan Gao
, Willy Susilo
:
Secret Multiple Leaders & Committee Election With Application to Sharding Blockchain. 5060-5074 - Peng Xiao
, Qibin Xiao
, Xusheng Zhang
, Yumei Wu
, Fengyu Yang
:
Vulnerability Detection Based on Enhanced Graph Representation Learning. 5120-5135 - Rawad Bitar
, Maximilian Egger
, Antonia Wachter-Zeh
, Marvin Xhemrishi
:
Sparsity and Privacy in Secret Sharing: A Fundamental Trade-Off. 5136-5150 - Renyang Liu
, Wei Zhou
, Tianwei Zhang
, Kangjie Chen
, Jun Zhao
, Kwok-Yan Lam
:
Boosting Black-Box Attack to Deep Neural Networks With Conditional Diffusion Models. 5207-5219 - Taesik Nam
, Dong-Hoon Choi
, Euibum Lee
, Han-Shin Jo
, Jong-Gwan Yook
:
Data Generation and Augmentation Method for Deep Learning-Based VDU Leakage Signal Restoration Algorithm. 5220-5234 - Pengyu Li
, Dan Ye
:
Vulnerability Analysis of Distributed State Estimator Under False Data Injection Attacks. 5235-5244 - Peng Tang
, Guoru Ding
, Yitao Xu
, Yutao Jiao
, Yehui Song, Guofeng Wei
:
Causal Learning for Robust Specific Emitter Identification Over Unknown Channel Statistics. 5316-5329 - Weinan Guan
, Wei Wang
, Jing Dong
, Bo Peng
:
Improving Generalization of Deepfake Detectors by Imposing Gradient Regularization. 5345-5356 - Mohammad Moltafet
, Hamid R. Sadjadpour
, Zouheir Rezki
:
On the Semantic Security in the General Bounded Storage Model: A New Proof. 4263-4271 - Xixi Zhang, Qin Wang
, Maoyang Qin, Yu Wang
, Tomoaki Ohtsuki
, Bamidele Adebisi
, Hikmet Sari
, Guan Gui
:
Enhanced Few-Shot Malware Traffic Classification via Integrating Knowledge Transfer With Neural Architecture Search. 5245-5256 - Ahmed Aly
, Shahrear Iqbal
, Amr M. Youssef
, Essam Mansour:
MEGR-APT: A Memory-Efficient APT Hunting System Based on Attack Representation Learning. 5257-5271 - Songnian Zhang
, Rongxing Lu
, Hui Zhu
, Yandong Zheng
, Yunguo Guan, Fengwei Wang
, Jun Shao
, Hui Li
:
Performance Enhanced Secure Spatial Keyword Similarity Query With Arbitrary Spatial Ranges. 5272-5285 - Zhankai Li
, Weiping Wang
, Jie Li
, Kai Chen
, Shigeng Zhang
:
Foolmix: Strengthen the Transferability of Adversarial Examples by Dual-Blending and Direction Update Strategy. 5286-5300 - Ruiqi Kong
, He Henry Chen
:
CSI-RFF: Leveraging Micro-Signals on CSI for RF Fingerprinting of Commodity WiFi. 5301-5315 - Gehui Xu
, Guanpu Chen
, Zhaoyang Cheng
, Yiguang Hong
, Hongsheng Qi
:
Consistency of Stackelberg and Nash Equilibria in Three-Player Leader-Follower Games. 5330-5344 - Xiangli Xiao
, Yushu Zhang
, Zhongyun Hua
, Zhihua Xia
, Jian Weng
:
Client-Side Embedding of Screen-Shooting Resilient Image Watermarking. 5357-5372 - Tianyu Lu
, Liquan Chen
, Junqing Zhang
, Chen Chen
, Trung Q. Duong
:
Reconfigurable Intelligent Surface-Assisted Key Generation for Millimeter-Wave Multi-User Systems. 5373-5388 - Mingyang Zhao
, Chuan Zhang
, Tong Wu
, Jianbing Ni
, Ximeng Liu
, Liehuang Zhu
:
Revocable and Privacy-Preserving Bilateral Access Control for Cloud Data Sharing. 5389-5404 - Jianrong Lu
, Shengshan Hu
, Wei Wan
, Minghui Li
, Leo Yu Zhang
, Lulu Xue, Hai Jin
:
Depriving the Survival Space of Adversaries Against Poisoned Gradients in Federated Learning. 5405-5418 - Haoxuan Yang
, Changgen Peng
:
CP-IPFE: Ciphertext-Policy Based Inner Product Functional Encryption. 5419-5433 - Zhibo Zhang
, Lei Zhang
, Guangliang Yang
, Yanjun Chen
, Jiahao Xu, Min Yang
:
The Dark Forest: Understanding Security Risks of Cross-Party Delegated Resources in Mobile App-in-App Ecosystems. 5434-5448 - Ziad Tariq Muhammad Ali
, Ameer Mohammed
, Imtiaz Ahmad
:
Vulnerability of Deep Forest to Adversarial Attacks. 5464-5475 - Minxiao Wang, Ning Yang, Nicolas J. Forcade-Perkins, Ning Weng:
ProGen: Projection-Based Adversarial Attack Generation Against Network Intrusion Detection. 5476-5491 - Feng Liu
, Wenfeng Zeng
, Yin Li
, Linlin Shen
:
A Lightweight and Noise-Robust Method for Internal OCT Fingerprint Reconstruction. 5492-5505 - Cong Hu
, Yuanbo Li
, Zhenhua Feng
, Xiaojun Wu
:
Toward Transferable Attack via Adversarial Diffusion in Face Recognition. 5506-5519 - Alberto Huertas Celdrán
, Pedro Miguel Sánchez Sánchez
, Jan von der Assen, Timo Schenk, Gérôme Bovet
, Gregorio Martínez Pérez
, Burkhard Stiller
:
RL and Fingerprinting to Select Moving Target Defense Mechanisms for Zero-Day Attacks in IoT. 5520-5529 - Man Zhang
, Xinghua Li
, Yinbin Miao
, Bin Luo
, Wanyun Xu, Yanbing Ren
, Robert H. Deng
:
Privacy-Preserved Data Disturbance and Truthfulness Verification for Data Trading. 5545-5560 - Lang Pu
, Chao Lin
, Jingjing Gu
, Xinyi Huang
, Debiao He
:
Generic Construction of Conditional Privacy-Preserving Certificateless Signatures With Efficient Instantiations for VANETs. 5449-5463 - Erik Pohle
, Aysajan Abidin
, Bart Preneel
:
Fast Evaluation of S-Boxes With Garbled Circuits. 5530-5544 - Xun Chen
, Fujun Gao
, Min Qiu
, Jia Zhang
, Feng Shu
, Shihao Yan
:
Achieving Covert Communication With a Probabilistic Jamming Strategy. 5561-5574 - Zhi Lu
, Songfeng Lu
, Yongquan Cui
, Xueming Tang
, Junjun Wu
:
Split Aggregation: Lightweight Privacy-Preserving Federated Learning Resistant to Byzantine Attacks. 5575-5590 - Alberto Maria Mongardini
, Massimo La Morgia
, Sushil Jajodia
, Luigi Vincenzo Mancini
, Alessandro Mei:
DARD: Deceptive Approaches for Robust Defense Against IP Theft. 5591-5606 - Bowen Zhao
, Weiquan Deng
, Xiaoguo Li
, Ximeng Liu
, Qingqi Pei
, Robert H. Deng
:
SOCI+: An Enhanced Toolkit for Secure Outsourced Computation on Integers. 5607-5619 - Peng Jiang
, Jun Zhu, Liehuang Zhu
:
Balancing Privacy and Regulation of Cross-Chain Transaction Systems via SoK-Assisted Policy Enhancement. 5620-5629 - Ni Ding
:
Approximation of Pufferfish Privacy for Gaussian Priors. 5630-5640 - Weiyang Xu
, Ruiguang Wang, Yuan Zhang, Hien Quoc Ngo
, Wei Xiang
:
Pilot Spoofing Attack on the Downlink of Cell-Free Massive MIMO: From the Perspective of Adversaries. 5641-5654 - Wenshu Fan
, Hongwei Li
, Wenbo Jiang
, Meng Hao
, Shui Yu
, Xiao Zhang
:
Stealthy Targeted Backdoor Attacks Against Image Captioning. 5655-5667 - Mert Nakip
, Erol Gelenbe
:
Online Self-Supervised Deep Learning for Intrusion Detection Systems. 5668-5683 - Fan Yang
, Hao Cheng, Shanxiang Lyu
, Jinming Wen, Hao Chen:
Lattice-Aided Extraction of Spread-Spectrum Hidden Data. 5684-5695 - Yu Zhang
, Shuangrui Zhao
, Yulong Shen
, Xiaohong Jiang
, Norio Shiratori
:
Enhancing the Physical Layer Security of Two-Way Relay Systems With RIS and Beamforming. 5696-5711 - Xiongjun Guan
, Jianjiang Feng
, Jie Zhou
:
Phase-Aggregated Dual-Branch Network for Efficient Fingerprint Dense Registration. 5712-5724 - Lijuan Huo
, Libing Wu
, Zhuangzhuang Zhang
, Chunshuo Li, Debiao He
, Jing Wang:
Libras: A Fair, Secure, Verifiable, and Scalable Outsourcing Computation Scheme Based on Blockchain. 5725-5737 - Wenke Huang
, Yuxia Liu
, Mang Ye
, Jun Chen
, Bo Du
:
Federated Learning With Long-Tailed Data via Representation Unification and Classifier Rectification. 5738-5750 - Guanhong Miao
, Samuel S. Wu:
Efficient Privacy-Preserving Logistic Model With Malicious Security. 5751-5766 - Jorge David de Hoz Diego
, Taous Madi, Charalambos Konstantinou
:
CMXsafe: A Proxy Layer for Securing Internet-of-Things Communications. 5767-5782 - Takumi Fukami
, Tomoya Murata
, Kenta Niwa
, Iifan Tyou
:
DP-Norm: Differential Privacy Primal-Dual Algorithm for Decentralized Federated Learning. 5783-5797 - Yudi Zhou, Yan Huo
, Qinghe Gao
, Yue Wu, Tao Jing
, Jian Mao
:
Securing Collaborative Authentication: A Weighted Voting Strategy to Counter Unreliable Cooperators. 5798-5813 - Yinbin Miao
, Xinru Yan
, Xinghua Li
, Shujiang Xu
, Ximeng Liu
, Hongwei Li
, Robert H. Deng
:
RFed: Robustness-Enhanced Privacy-Preserving Federated Learning Against Poisoning Attack. 5814-5827 - Yinbin Miao
, Da Kuang
, Xinghua Li
, Shujiang Xu
, Hongwei Li
, Kim-Kwang Raymond Choo
, Robert H. Deng
:
Privacy-Preserving Asynchronous Federated Learning Under Non-IID Settings. 5828-5841 - Lingjie Zhang
, Hai Zhang
:
Shuffle Private Decentralized Convex Optimization. 5842-5851 - Hanbo Cai
, Pengcheng Zhang
, Hai Dong
, Yan Xiao
, Stefanos Koffas
, Yiming Li
:
Toward Stealthy Backdoor Attacks Against Speech Recognition via Elements of Sound. 5852-5866 - Pedro Reviriego
, Jim Apple
, David Larrabeiti
, Shanshan Liu
, Fabrizio Lombardi
:
On the Privacy of Adaptive Cuckoo Filters: Analysis and Protection. 5867-5879 - Yulong Yang
, Haoran Fan
, Chenhao Lin
, Qian Li
, Zhengyu Zhao
, Chao Shen
:
Exploiting the Adversarial Example Vulnerability of Transfer Learning of Source Code. 5880-5894 - Ying Zhong
, Zhiliang Wang
, Xingang Shi
, Jiahai Yang
, Keqin Li
:
RFG-HELAD: A Robust Fine-Grained Network Traffic Anomaly Detection Model Based on Heterogeneous Ensemble Learning. 5895-5910 - Meiqi Li, Xinyi Luo, Kaiping Xue
, Yingjie Xue
, Wentuo Sun, Jian Li
:
A Secure and Efficient Blockchain Sharding Scheme via Hybrid Consensus and Dynamic Management. 5911-5924 - Ronghua Li
, Haibo Hu
, Qingqing Ye
:
RFTrack: Stealthy Location Inference and Tracking Attack on Wi-Fi Devices. 5925-5939 - Datian Peng
, Jianmin Dong
, Mingjiang Zhang, Jungang Yang, Zhen Wang
:
CSFAdv: Critical Semantic Fusion Guided Least-Effort Adversarial Example Attacks. 5940-5955 - Chit-Jie Chew
, Wei-Bin Lee, Tzu-Li Sung, Ying-Chin Chen, Shiuh-Jeng Wang, Jung-San Lee
:
Lawful Remote Forensics Mechanism With Admissibility of Evidence in Stochastic and Unpredictable Transnational Crime. 5956-5970 - Tairong Shi
, Wenling Wu
, Bin Hu, Jie Guan
, Han Sui, Senpeng Wang
, Mengyuan Zhang
:
Dedicated Quantum Attacks on XOR-Type Function With Applications to Beyond-Birthday- Bound MACs. 5971-5984 - Eldor Abdukhamidov
, Mohammed Abuhamad
, George K. Thiruvathukal
, Hyoungshick Kim
, Tamer Abuhmed
:
SingleADV: Single-Class Target-Specific Attack Against Interpretable Deep Learning Systems. 5985-5998 - Songlei Wang
, Yifeng Zheng
, Xiaohua Jia
, Cong Wang
:
eGrass: An Encrypted Attributed Subgraph Matching System With Malicious Security. 5999-6014 - Jianze Wei
, Yunlong Wang, Xingyu Gao
, Ran He
, Zhenan Sun
:
Multi-Faceted Knowledge-Driven Graph Neural Network for Iris Segmentation. 6015-6027 - Hengye Zhu
, Mengxiang Liu
, Binbin Chen
, Xin Che, Peng Cheng
, Ruilong Deng
:
HoneyJudge: A PLC Honeypot Identification Framework Based on Device Memory Testing. 6028-6043 - Dengke Guo
, Dongtang Ma
, Jun Xiong
, Xiaoran Liu
, Jibo Wei
:
On the Secret-Key Capacity Over Multipath Fading Channel. 6044-6054 - Yijing Chen
, Hongxia Wang
, Wanjie Li
, Wenshan Li:
A Steganography Immunoprocessing Framework Against CNN-Based and Handcrafted Steganalysis. 6055-6069 - Chengxin Li
, Saiqin Long, Haolin Liu
, Youngjune Choi, Hiroo Sekiya, Zhetao Li
:
Enhancing Sparse Mobile CrowdSensing With Manifold Optimization and Differential Privacy. 6070-6083 - Yang Yang
, Wenyi Xue
, Jianfei Sun
, Guomin Yang
, Yingjiu Li
, HweeHwa Pang
, Robert H. Deng
:
PkT-SIN: A Secure Communication Protocol for Space Information Networks With Periodic k-Time Anonymous Authentication. 6097-6112 - Huan Zhang
, Lixin Zhao
, Aimin Yu
, Lijun Cai, Dan Meng:
Ranker: Early Ransomware Detection Through Kernel-Level Behavioral Analysis. 6113-6127 - Chao Jing
, Chaoyuan Cui
, Yun Wu:
SIa-CBc: Sensitive Intent-Assisted and Crucial Behavior-Cognized Malware Detection Based on Human Brain Cognitive Theory. 6128-6143 - Liaogehao Chen
, Zhenjun Zhang
, Yang Xiao
, Yaonan Wang
:
EGST: An Efficient Solution for Human Gaits Recognition Using Neuromorphic Vision Sensor. 6144-6154 - Dmitrijs Trizna
, Luca Demetrio
, Battista Biggio
, Fabio Roli
:
Nebula: Self-Attention for Dynamic Malware Analysis. 6155-6167 - Shouyin Xu
, Yuewu Wang
, Lingguang Lei
, Kun Sun
, Jiwu Jing
, Siyuan Ma, Jie Wang
, Heqing Huang:
Condo: Enhancing Container Isolation Through Kernel Permission Data Protection. 6168-6183 - Jingwei Hu
, Yongjun Zhao
, Benjamin Hong Meng Tan
, Khin Mi Mi Aung
, Huaxiong Wang
:
Enabling Threshold Functionality for Private Set Intersection Protocols in Cloud Computing. 6184-6196 - Mi Song
, Ding Wang
:
AB-PAKE: Achieving Fine-Grained Access Control and Flexible Authentication. 6197-6212 - Davide Alessandro Coccomini
, Giorgos Kordopatis-Zilos, Giuseppe Amato
, Roberto Caldelli
, Fabrizio Falchi
, Symeon Papadopoulos
, Claudio Gennaro:
MINTIME: Multi-Identity Size-Invariant Video Deepfake Detection. 6084-6096 - Ángeles Vázquez-Castro
, Andreas J. Winter
, Hugo Zbinden:
Quantum Keyless Private Communication With Decoy States for Space Channels. 6213-6224 - Yiran Wang
, Jing Bai
, Zhu Xiao
, Zheng Chen, Yong Xiong
, Hongbo Jiang
, Licheng Jiao
:
AutoSMC: An Automated Machine Learning Framework for Signal Modulation Classification. 6225-6236 - Yandong Zheng
, Hui Zhu
, Rongxing Lu
, Songnian Zhang
, Yunguo Guan, Fengwei Wang
, Jun Shao
, Hui Li
:
Secure Similarity Queries Over Vertically Distributed Data via TEE-Enhanced Cloud Computing. 6237-6251 - Ke Han
, Yan Huang
, Liang Wang
, Zikun Liu
:
Self-Supervised Recovery and Guide for Low-Resolution Person Re-Identification. 6252-6263 - Jinwoo Kim
, Minjae Seo
, Eduard Marin
, Seungsoo Lee
, Jaehyun Nam
, Seungwon Shin
:
Ambusher: Exploring the Security of Distributed SDN Controllers Through Protocol State Fuzzing. 6264-6279 - Qizao Wang
, Xuelin Qian
, Bin Li
, Xiangyang Xue
, Yanwei Fu
:
Exploring Fine-Grained Representation and Recomposition for Cloth-Changing Person Re-Identification. 6280-6292 - Yajie Wang
, Yi Wu
, Shangbo Wu, Ximeng Liu
, Wanlei Zhou
, Liehuang Zhu
, Chuan Zhang
:
Boosting the Transferability of Adversarial Attacks With Frequency-Aware Perturbation. 6293-6304 - Yuwei Wang
, Li Sun
, Qinghe Du
:
Multi-Antenna Signal Masking and Round-Trip Transmission for Privacy-Preserving Wireless Sensing. 6305-6320 - Yunlong Mao
, Zhujing Ye, Xinyu Yuan, Sheng Zhong
:
Secure Model Aggregation Against Poisoning Attacks for Cross-Silo Federated Learning With Robustness and Fairness. 6321-6336 - Zihou Zhang, Jiangtao Li
, Yufeng Li
, Chenhong Cao
, Zhenfu Cao
:
Hardware Secure Module Based Lightweight Conditional Privacy-Preserving Authentication for VANETs. 6337-6350 - Mengdi Hu, Lanxiang Chen
, Gaolin Chen
, Yi Mu
, Robert H. Deng
:
A Pruned Pendant Vertex Based Index for Shortest Distance Query Under Structured Encrypted Graph. 6351-6363 - Yinghua Gao
, Yiming Li
, Xueluan Gong
, Zhifeng Li
, Shu-Tao Xia
, Qian Wang
:
Backdoor Attack With Sparse and Invisible Trigger. 6364-6376 - Yuyang Zhou
, Guang Cheng
, Shui Yu
, Zongyao Chen
, Yujia Hu
:
MTDroid: A Moving Target Defense-Based Android Malware Detector Against Evasion Attacks. 6377-6392 - Zhenyong Zhang
, Kedi Yang
, Youliang Tian
, Jianfeng Ma
:
An Anti-Disguise Authentication System Using the First Impression of Avatar in Metaverse. 6393-6408 - Zefeng Lu
, Ronghao Lin
, Haifeng Hu
:
Mind the Inconsistent Semantics in Positive Pairs: Semantic Aligning and Multimodal Contrastive Learning for Text-Based Pedestrian Search. 6409-6424 - Shiyu Li
, Yuan Zhang
, Yaqing Song
, Hongbo Liu
, Nan Cheng
, Dahai Tao, Hongwei Li
, Kan Yang
:
Beyond Security: Achieving Fairness in Mailmen-Assisted Timed Data Delivery. 6425-6440 - Cong Wu
, Jing Chen
, Qianru Fang, Kun He
, Ziming Zhao, Hao Ren, Guowen Xu
, Yang Liu
, Yang Xiang
:
Rethinking Membership Inference Attacks Against Transfer Learning. 6441-6454 - Ahmed Abd Elaziz Elsayed
, Hadi Khani
, Hany Essa Zidan Farag
:
A Feasibility Area Approach for Early Stage Detection of Stealthy Infiltrated Cyberattacks in Power Systems. 6455-6470 - Yunqi Miao
, Jiankang Deng
, Guiguang Ding
, Jungong Han
:
Confidence-Guided Centroids for Unsupervised Person Re-Identification. 6471-6483 - Haoran Gao
, Hua Zhang
, Jiahui Wang
, Xin Zhang
, Huawei Wang
, Wenmin Li, Tengfei Tu
:
NUAT-GAN: Generating Black-Box Natural Universal Adversarial Triggers for Text Classifiers Using Generative Adversarial Networks. 6484-6498 - Meiyan Xiao
, Qiong Huang
, Wenya Chen
, Chuan Lyu, Willy Susilo
:
Domain-Specific Fine-Grained Access Control for Cloud-Edge Collaborative IoT. 6499-6513 - Seung-Hyun Nam
, Vincent Y. F. Tan
, Si-Hyeon Lee
:
Optimal Private Discrete Distribution Estimation With 1-bit Communication. 6514-6528 - Bin Li
, Jincheng Chen, Yuxiong Xu
, Weixiang Li
, Zhenghui Liu
:
DRAW: Dual-Decoder-Based Robust Audio Watermarking Against Desynchronization and Replay Attacks. 6529-6544 - Ruohan Meng
, Chenyu Yi
, Yi Yu
, Siyuan Yang
, Bingquan Shen
, Alex C. Kot
:
Semantic Deep Hiding for Robust Unlearnable Examples. 6545-6558 - Wenkang Su
, Jiangqun Ni
, Xianglei Hu
, Bin Li
:
Efficient Audio Steganography Using Generalized Audio Intrinsic Energy With Micro-Amplitude Modification Suppression. 6559-6572 - Peiqi Jiang
, Hongtao Xie
, Lingyun Yu
, Guoqing Jin
, Yongdong Zhang
:
Exploring Bi-Level Inconsistency via Blended Images for Generalizable Face Forgery Detection. 6573-6588 - Seungkwang Lee
, Jeong-Nyeo Kim:
Balanced Encoding of Near-Zero Correlation for an AES Implementation. 6589-6603 - Zizhen Liu, Weiyang He, Chip-Hong Chang
, Jing Ye
, Huawei Li
, Xiaowei Li
:
SPFL: A Self-Purified Federated Learning Method Against Poisoning Attacks. 6604-6619 - Zhao Zhang
, Chunxiang Xu
, Yunxia Han
:
Privacy-Preserving Cryptocurrency With Threshold Authentication and Regulation. 6620-6635 - Zexin Fan
, Kejiang Chen
, Kai Zeng
, Jiansong Zhang
, Weiming Zhang
, Nenghai Yu
:
Natias: Neuron Attribution-Based Transferable Image Adversarial Steganography. 6636-6649 - Zhiwei Li
, Min Ren
, Qi Li
, Fangling Jiang
, Zhenan Sun
:
Improving Transferability of Adversarial Samples via Critical Region-Oriented Feature-Level Attack. 6650-6664 - Weifeng Yin, Lifeng Yuan
, Yizhi Ren
, Weizhi Meng
, Dong Wang
, Qiuhua Wang
:
Differential Cryptanalysis of Bloom Filters for Privacy-Preserving Record Linkage. 6665-6678 - Siddharth Dongre
, Hanif Rahbari
:
Fair and Secure 5G and Wi-Fi Coexistence Using Robust Implicit Channel Coordination. 6679-6692 - Abbas Yazdinejad
, Ali Dehghantanha
, Hadis Karimipour
, Gautam Srivastava
, Reza M. Parizi
:
A Robust Privacy-Preserving Federated Learning Model Against Model Poisoning Attacks. 6693-6708 - Julio César Pérez García
, An Braeken
, Abderrahim Benslimane
:
Blockchain-Based Group Key Management Scheme for IoT With Anonymity of Group Members. 6709-6721 - Renwan Bi
, Jinbo Xiong
, Changqing Luo
, Jianting Ning
, Ximeng Liu
, Youliang Tian
, Yan Zhang
:
Communication-Efficient Privacy-Preserving Neural Network Inference via Arithmetic Secret Sharing. 6722-6737 - Ali Shahidinejad
, Jemal H. Abawajy
, Shamsul Huda
:
Highly-Secure Yet Efficient Blockchain-Based CRL-Free Key Management Protocol for IoT-Enabled Smart Grid Environments. 6738-6750 - Chenhan Zhang
, Weiqi Wang
, Zhiyi Tian
, Shui Yu
:
Forgetting and Remembering Are Both You Need: Balanced Graph Structure Unlearning. 6751-6763 - Wenxi Liu
, Hao Zhang
, Xinyang Lin
, Qing Zhang
, Qi Li
, Xiaoxiang Liu
, Ying Cao
:
Attentive and Contrastive Image Manipulation Localization With Boundary Guidance. 6764-6778 - Yong Chen
, Xuedong Li, Peng Hu
, Dezhong Peng
, Xu Wang
:
DifFilter: Defending Against Adversarial Perturbations With Diffusion Filter. 6779-6794 - Man Zhou
, Wenyu Zhou
, Jie Huang, Junhui Yang, Minxin Du, Qi Li
:
Stealthy and Effective Physical Adversarial Attacks in Autonomous Driving. 6795-6809 - Zefang Lv
, Liang Xiao
, Yifan Chen, Haoyu Chen
, Xiangyang Ji
:
Safe Multi-Agent Reinforcement Learning for Wireless Applications Against Adversarial Communications. 6824-6839 - Jinyang Huang
, Jia-Xuan Bai, Xiang Zhang
, Zhi Liu
, Yuanhao Feng, Jianchun Liu
, Xiao Sun
, Mianxiong Dong
, Meng Li
:
KeystrokeSniffer: An Off-the-Shelf Smartphone Can Eavesdrop on Your Privacy From Anywhere. 6840-6855 - Jing Lei
, Le Wang
, Qingqi Pei
, Wenhai Sun
, Xiaodong Lin
, Xuefeng Liu
:
PrivGrid: Privacy-Preserving Individual Load Forecasting Service for Smart Grid. 6856-6870 - Linbo Luo
, Shangwei Xie
, Haiyan Yin
, Chunlei Peng
, Yew-Soon Ong
:
Detecting and Quantifying Crowd-Level Abnormal Behaviors in Crowd Events. 6810-6823 - Xueying Han
, Song Liu, Junrong Liu, Bo Jiang
, Zhigang Lu, Baoxu Liu:
ECNet: Robust Malicious Network Traffic Detection With Multi-View Feature and Confidence Mechanism. 6871-6885 - Yahan Deng
, Hao Yu
, Yuzhe Li
:
Stealthy Insider Attack on Stochastic Event-Triggered Scheduler: Dealing With Non-Gaussian Components. 6886-6895 - Haiyang Yu
, Hui Zhang, Zhen Yang
, Shui Yu
:
Edasvic: Enabling Efficient and Dynamic Storage Verification for Clouds of Industrial Internet Platforms. 6896-6909 - Yimin Liu
, Meibin Qi
, Yongle Zhang
, Qiang Wu
, Jingjing Wu
, Shuo Zhuang
:
Improving Consistency of Proxy-Level Contrastive Learning for Unsupervised Person Re-Identification. 6910-6922 - Honglong Chen
, Yudong Gao
, Anqing Zhang
, Peng Sun
, Nan Jiang
, Weifeng Liu
, Xingang Wang:
Investigating the Backdoor on DNNs Based on Recolorization and Reconstruction: From a Multi-Channel Perspective. 6923-6934 - Jie Deng
, Bin Wu
:
A Practical Data Trading Protocol for Sudoku Solutions. 6935-6948 - Min Ren
, Yuhao Zhu
, Yunlong Wang, Yongzhen Huang
, Zhenan Sun
:
Understanding Deep Face Representation via Attribute Recovery. 6949-6961 - Donghyun Yu
, Sungho Lee
, Ruei-Hau Hsu
, Jemin Lee
:
Ensuring End-to-End Security With Fine-Grained Access Control for Connected and Autonomous Vehicles. 6962-6977 - Yizhou Shen
, Carlton Shepherd
, Chuadhry Mujeeb Ahmed
, Shigen Shen
, Shui Yu
:
SGD3QN: Joint Stochastic Games and Dueling Double Deep Q-Networks for Defending Malware Propagation in Edge Intelligence-Enabled Internet of Things. 6978-6990 - Yubo Kong
, Zhong Li
, Changjun Jiang
:
ASIA: A Federated Boosting Tree Model Against Sequence Inference Attacks in Financial Networks. 6991-7004 - Ruoyu Li
, Qing Li
, Yucheng Huang, Qingsong Zou
, Dan Zhao
, Zhengxin Zhang
, Yong Jiang
, Fa Zhu
, Athanasios V. Vasilakos
:
SeIoT: Detecting Anomalous Semantics in Smart Homes via Knowledge Graph. 7005-7018 - Zhusen Liu
, Weizheng Wang
, Yutong Ye, Nan Min, Zhenfu Cao
, Lu Zhou
, Zhe Liu:
Collusion-Resilient and Maliciously Secure Cloud- Assisted Two-Party Computation Scheme in Mobile Cloud Computing. 7019-7032 - Justin Kong
, Fikadu T. Dagefu
, Terrence J. Moore
:
Covert Routing in Heterogeneous Networks. 7047-7059 - Chao Liu
, Cankun Hou
, Tianyu Jiang
, Jianting Ning
, Hui Qiao
, Yusen Wu
:
FACOS: Enabling Privacy Protection Through Fine-Grained Access Control With On-Chain and Off-Chain System. 7060-7074 - Yumeng Xie
, Qing Fan
, Chuan Zhang
, Tong Wu
, Yuao Zhou, Debiao He
, Liehuang Zhu
:
Accountable and Secure Threshold EdDSA Signature and Its Applications. 7033-7046 - Hualiang Luo
, Quanzhong Li
, Qi Zhang
:
Joint Secure Beamforming and Power Splitting Design for MIMO Relay Assisted Over-the-Air Computation Networks With Imperfect CSI. 7075-7090 - Yige Chen
, Yipeng Wang
:
MPAF: Encrypted Traffic Classification With Multi-Phase Attribute Fingerprint. 7091-7105 - Yaxuan Huang, Kaiping Xue
, Bin Zhu
, David S. L. Wei
, Qibin Sun
, Jun Lu
:
Joint Distribution Analysis for Set-Valued Data With Local Differential Privacy. 7106-7117 - Haopeng Fan
, Hailong Zhang
, Yongjuan Wang
, Wenhao Wang
, Yanbei Zhu
, Haojin Zhang, Qingjun Yuan
:
Screening Least Square Technique Assisted Multivariate Template Attack Against the Random Polynomial Generation of Dilithium. 7118-7132 - Junyan Wu
, Qilin Yin
, Ziqi Sheng, Wei Lu
, Jiwu Huang, Bin Li
:
Audio Multi-View Spoofing Detection Framework Based on Audio-Text-Emotion Correlations. 7133-7146 - Minxiao Wang, Ning Yang, Ning Weng:
K-GetNID: Knowledge-Guided Graphs for Early and Transferable Network Intrusion Detection. 7147-7160 - Ximing Li
, Linghui Li
, Xiaoyong Li
, Binsi Cai
, Jia Jia
, Yali Gao
, Shui Yu
:
GMFITD: Graph Meta-Learning for Effective Few-Shot Insider Threat Detection. 7161-7175 - Kyeongjin Ahn, SeungEon Lee
, Sungwon Han, Cheng-Yaw Low
, Meeyoung Cha:
Uncertainty-Aware Face Embedding With Contrastive Learning for Open-Set Evaluation. 7176-7186 - Chengchao Li
, Fengde Xu
, Yuhan Wang
, Xudong Zhao
:
Data-Driven Dynamic Periodic Event-Triggered Control of Cyber-Physical Systems Under Packet Dropouts and DoS Attacks. 7187-7199 - Armin Darjani
, Nima Kavand
, Shubham Rai
, Akash Kumar
:
Thwarting GNN-Based Attacks Against Logic Locking. 7200-7215 - Yuwen Qian
, Guodong Huang, Chuan Ma
, Ming Ding
, Long Yuan
, Zi Chen
, Kai Wang
:
Enhancing Resilience in Website Fingerprinting: Novel Adversary Strategies for Noisy Traffic Environments. 7216-7231 - Fucai Luo
, Haiyan Wang
, Xingfu Yan
, Jiahui Wu
:
Key-Policy Attribute-Based Encryption With Switchable Attributes for Fine-Grained Access Control of Encrypted Data. 7245-7258 - Fangtian Zhong
, Qin Hu
, Yili Jiang
, Jiaqi Huang
, Cheng Zhang
, Dinghao Wu:
Enhancing Malware Classification via Self-Similarity Techniques. 7232-7244 - Hongming Fei, Owen Millwood, Prosanta Gope
, Jack Miskelly, Biplab Sikdar
:
Attacking Delay-Based PUFs With Minimal Adversarial Knowledge. 7259-7274 - Qingxuan Lv
, Yuezun Li
, Junyu Dong
, Sheng Chen
, Hui Yu
, Huiyu Zhou
, Shu Zhang
:
DomainForensics: Exposing Face Forgery Across Domains via Bi-Directional Adaptation. 7275-7289 - Saihui Hou
, Xuecai Hu
, Chunshui Cao
, Xu Liu
, Yongzhen Huang
:
Adaptive Knowledge Transfer for Weak-Shot Gait Recognition. 7290-7303 - Stefan Rass
, Sandra König
, Shahzad Ahmad
, Maksim Goman
:
Metricizing the Euclidean Space Toward Desired Distance Relations in Point Clouds. 7304-7319 - Loukas Ilias
, Ioannis Michail Kazelidis, Dimitris Askounis
:
Multimodal Detection of Bots on X (Twitter) Using Transformers. 7320-7334 - Wei Xu
, Hui Zhu
, Yandong Zheng
, Fengwei Wang
, Jiafeng Hua, Dengguo Feng, Hui Li
:
ToNN: An Oblivious Neural Network Prediction Scheme With Semi-Honest TEE. 7335-7348 - Zhisheng Yao
, Yang Peng
, Yu Wang
, Congan Xu
, Juzhen Wang
, Yun Lin
, Guan Gui
:
A Novel Radio Frequency Fingerprint Concealment Method Based on IQ Imbalance Compensation and Digital Pre-Distortion. 7349-7361 - Yujing Pang
, Guangming Zhuang
, Jianwei Xia
, Xiangpeng Xie
:
Fault Detection and Robust Security Control for Implicit Jump Systems Against Random FDI Attacks and Packet Loss Under Memorized Output-Perceptive Event-Triggered Protocol. 7362-7373 - Qing Wang
, Donghui Hu
, Meng Li
, Guomin Yang
:
Secure and Flexible Wildcard Queries. 7374-7388 - Mingyu Wang
, Fangyu Zheng
, Jingqiang Lin
, Fangjie Jiang, Yuan Ma
:
ZeroShield: Transparently Mitigating Code Page Sharing Attacks With Zero-Cost Stand-By. 7389-7403 - Zekai Chen
, Shengxing Yu, Farong Chen, Fuyi Wang
, Ximeng Liu
, Robert H. Deng
:
Lightweight Privacy-Preserving Cross-Cluster Federated Learning With Heterogeneous Data. 7404-7419 - Xiao Sun
, Haining Yu
, Zhichao Liu, Xiaohua Jia
:
MI-VFDNN: An Efficient Vertical Federated Deep Neural Network With Multi-Layer Interaction. 7435-7448 - Zachary McBride Lazri
, Ivan Brugere, Xin Tian
, Dana Dachman-Soled
, Antigoni Polychroniadou, Danial Dervovic
, Min Wu
:
A Canonical Data Transformation for Achieving Inter- and Within-Group Fairness. 7449-7464 - Chen Chen, Haibo Hong
, Tao Xiang
, Mande Xie:
Anti-Backdoor Model: A Novel Algorithm to Remove Backdoors in a Non-Invasive Way. 7420-7434 - Atefeh Zareh Chahoki
, Hamid Reza Shahriari
, Marco Roveri
:
CryptojackingTrap: An Evasion Resilient Nature-Inspired Algorithm to Detect Cryptojacking Malware. 7465-7477 - Raphael Alper
, Mordechai Guri
:
TrueWatch: Polygraph Examination With Smartwatches. 7478-7491 - Wei Wang
, Licheng Wang
, Junke Duan
, Xiaofei Tong, Haipeng Peng
:
Redactable Blockchain Based on Decentralized Trapdoor Verifiable Delay Functions. 7492-7507 - Xiaohai Dai
, Zhaonan Zhang, Zhengxuan Guo
, Chaozheng Ding
, Jiang Xiao
, Xia Xie, Rui Hao
, Hai Jin
:
Wahoo: A DAG-Based BFT Consensus With Low Latency and Low Communication Overhead. 7508-7522 - Yu-Chi Chen
, Jhe-Kai Yang
, Hsin-Chan Yen, Pei-Wen Lin:
Dual-Cloud Multi-Secret Sharing Architecture for Privacy Preserving Persistent Computation. 7523-7535 - Xinye Zhou
, Hu Han
, Shiguang Shan
, Xilin Chen
:
Fine-Grained Open-Set Deepfake Detection via Unsupervised Domain Adaptation. 7536-7547 - Lan Yao
, Xia Huang
, Zhen Wang
, Hao Shen
:
A Multi-Sensor-Based Switching Event-Triggered Mechanism for Synchronization Control of Markovian Jump Neural Networks Under DoS Attacks. 7548-7559 - Junke Duan
, Wei Wang
, Licheng Wang
, Lize Gu
:
Controlled Redactable Blockchain Based on T-Times Chameleon Hash and Signature. 7560-7572 - Ning Gao
, Yuze Yao, Shi Jin
, Cen Li, Michail Matthaiou
:
Integrated Communications and Security: RIS-Assisted Simultaneous Transmission and Generation of Secret Keys. 7573-7587 - Yicheng Cai
, Haizhou Wang
, Hao Cao, Wenxian Wang, Lei Zhang
, Xingshu Chen
:
Detecting Spam Movie Review Under Coordinated Attack With Multi-View Explicit and Implicit Relations Semantics Fusion. 7588-7603 - Lunke Fei
, Le Su, Bob Zhang
, Shuping Zhao
, Jie Wen
, Xiaoping Li
:
Learning Frequency-Aware Common Feature for VIS-NIR Heterogeneous Palmprint Recognition. 7604-7618 - Xiaobin Tan
, Chuang Peng
, Peng Xie, Hao Wang, Mengxiang Li, Shuangwu Chen
, Cliff C. Zou:
Inter-Flow Spatio-Temporal Correlation Analysis Based Website Fingerprinting Using Graph Neural Network. 7619-7632 - Yaguan Qian
, Kecheng Chen
, Bin Wang, Zhaoquan Gu
, Shouling Ji
, Wei Wang
, Yanchun Zhang
:
Enhancing Transferability of Adversarial Examples Through Mixed-Frequency Inputs. 7633-7645 - Yaxuan Huang, Kaiping Xue
, Bin Zhu
, Jingcheng Zhao, Ruidong Li
:
Collecting Partial Ordered Data With Local Differential Privacy. 7646-7658 - Renjie Xie
, Jiahao Cao
, Yuxi Zhu
, Yixiang Zhang
, Yi He
, Hanyi Peng, Yixiao Wang
, Mingwei Xu
, Kun Sun
, Enhuan Dong
, Qi Li
, Menghao Zhang
, Jiang Li:
Cactus: Obfuscating Bidirectional Encrypted TCP Traffic at Client Side. 7659-7673 - Jing Zhang
, Ruonan Ying
, Jie Cui
, Hong Zhong
, Irina Bolodurina
, Debiao He
:
Secure and Efficient User-Centric V2C Communication for Intelligent Cyber-Physical Transportation System. 7674-7689 - Xinlong Yang
, Haixin Wang
, Jinan Sun
, Yijia Xiao, Wei Xiang
, Chong Chen, Xian-Sheng Hua
, Xiao Luo
:
ROSE: Relational and Prototypical Structure Learning for Universal Domain Adaptive Hashing. 7690-7704 - Guangyuan Gao, Weina Niu
, Jiacheng Gong
, Dujuan Gu, Song Li, Mingxue Zhang
, Xiaosong Zhang
:
GraphTunnel: Robust DNS Tunnel Detection Based on DNS Recursive Resolution Graph. 7705-7719 - Jingon Joung
, Chau Yuen
:
Space-Time Line Code Hopping for Physical-Layer Secure Communications. 7720-7729 - Yujie Song
, Yue Cao
, Chaklam Cheong
, Debiao He
, Kim-Kwang Raymond Choo
, Juan Wang
:
CAT: A Consensus-Adaptive Trust Management Based on the Group Decision Making in IoVs. 7730-7743 - Chen Li
, Jianting Ning
, Shengmin Xu
, Chao Lin
, Jiguo Li
, Jian Shen
:
DTACB: Dynamic Threshold Anonymous Credentials With Batch-Showing. 7744-7758 - Jiaxuan Fu
, Ke Cheng
, Anxiao Song
, Yuheng Xia, Zhao Chang
, Yulong Shen
:
FSS-DBSCAN: Outsourced Private Density-Based Clustering via Function Secret Sharing. 7759-7773 - Denley Lam
, Letitia W. Li, Cory Anderson:
PDF Investigation With Parser Differentials and Ontology. 7774-7782 - Taki Eddine Toufik Djaidja
, Bouziane Brik
, Sidi Mohammed Senouci
, Abdelwahab Boualouache, Yacine Ghamri-Doudane:
Early Network Intrusion Detection Enabled by Attention Mechanisms and RNNs. 7783-7793 - Meiyi Jiang
, Baojiang Cui
, Junsong Fu
, Tao Wang
, Lu Yao, Bharat K. Bhargava
:
RUDOLF: An Efficient and Adaptive Defense Approach Against Website Fingerprinting Attacks Based on Soft Actor-Critic Algorithm. 7794-7809 - Yifan Wang
, Jie Gui
, Yuan Yan Tang
, James Tin-Yau Kwok
:
CFVNet: An End-to-End Cancelable Finger Vein Network for Recognition. 7810-7823 - Mengxiang Liu
, Xin Zhang
, Hengye Zhu
, Zhenyong Zhang
, Ruilong Deng
:
Physics-Aware Watermarking Embedded in Unknown Input Observers for False Data Injection Attack Detection in Cyber-Physical Microgrids. 7824-7840 - Jian Cao
, Minghui Zhang, Weiqi Liu
, Lin Wang
, Jinye Peng
:
Deep Learning-Based Security Analysis of Quantum Random Numbers Generated by Imperfect Devices. 7841-7852 - Siqin Li
, Kun He
, Jing Chen
, Min Shi
, Meng Jia
, Ruiying Du
, Ling Han
:
MaskAuct: Seller-Autonomous Auction With Bidder Anonymity and Bidding Confidentiality. 7853-7865 - Min Wang, Jia Yu
, Wenting Shen
, Rong Hao
:
Privacy-Preserving Time-Based Auditing for Secure Cloud Storage. 7866-7878 - Yilong Huang
, Fan Fan, Chaofeng Huang, Haomiao Yang
, Min Gu
:
MA-DG: Learning Features of Sequences in Different Dimensions for Min-Entropy Evaluation via 2D-CNN and Multi-Head Self-Attention. 7879-7894 - Qingyang Zhang
, Xiaolong Zhou, Hong Zhong
, Jie Cui
, Jiaxin Li, Debiao He
:
Device-Side Lightweight Mutual Authentication and Key Agreement Scheme Based on Chameleon Hashing for Industrial Internet of Things. 7895-7907 - Yuhao Yan
, Bo Lang
, Xiaoyuan Meng
, Nan Xiao
:
Toward Generating Communication Graph Datasets for Botnet Detection in Autonomous Systems. 7908-7923 - Weicheng Xie, Zenghao Niu
, Qinliang Lin, Siyang Song
, Linlin Shen
:
Generative Imperceptible Attack With Feature Learning Bias Reduction and Multi-Scale Variance Regularization. 7924-7938 - Yang Peng
, Pengfei Liu, Qianyun Zhang
, Lantu Guo
, Yuchao Liu, Yu Wang
, Yun Lin
, Guan Gui
:
Dynamic Adaptation RFF Identification Method Leveraging Cognitive Representation Learning. 7939-7951 - Manoj Kumar Panda
, Badri Narayan Subudhi
, Thangaraj Veerakumar
, Vinit Jakhetiya
, Thierry Bouwmans
:
A Multi-Scale Contrast Preserving Encoder-Decoder Architecture for Local Change Detection From Thermal Video Scenes. 7968-7981 - Leonhard Grosse
, Sara Saeidian
, Tobias J. Oechtering
:
Extremal Mechanisms for Pointwise Maximal Leakage. 7952-7967 - Haomin Qu
, Hongze Zhao
, Qingguo Wei
, Weihua Pei
, Xiaorong Gao
, Yijun Wang
:
Combing Multiple Visual Stimuli to Enhance the Performance of VEP-Based Biometrics. 7982-7993 - Yuhao Bian
, Shengjing Tian
, Xiuping Liu
:
iBA: Backdoor Attack on 3D Point Cloud via Reconstructing Itself. 7994-8008 - Wilton Kim
, Stanislav Kruglik
, Han Mao Kiah
:
Verifiable Coded Computation of Multiple Functions. 8009-8022 - Wei Wang
, Dongli Liu
, Zilin Zheng, Peng Xu
, Laurence Tianruo Yang
:
Identity-Based Group Encryption With Keyword Search Against Keyword Guessing Attack. 8023-8036 - Xiuwen Liu
, Yanjiao Chen
, Shanchen Pang
:
Defending Against Membership Inference Attack for Counterfactual Federated Recommendation With Differentially Private Representation Learning. 8037-8051 - Aixian Deng
, Qian Ren
, Yingjun Wu
, Hong Lei
, Bangdao Chen
:
Proof of Finalization: A Self-Fulfilling Function of Blockchain. 8052-8065 - Congcong Chen, Jinhua Cui
, Gang Qu
, Jiliang Zhang
:
Write+Sync: Software Cache Write Covert Channels Exploiting Memory-Disk Synchronization. 8066-8078 - Shixuan Zhang
, Haixia Wang, Pengfei Qiu
, Yongqiang Lyu
, Hongpeng Wang
, Dongsheng Wang:
SCAFinder: Formal Verification of Cache Fine-Grained Features for Side Channel Detection. 8079-8093 - Xiaoxiao Hu
, Sheng Li
, Qichao Ying
, Wanli Peng
, Xinpeng Zhang
, Zhenxing Qian
:
Establishing Robust Generative Image Steganography via Popular Stable Diffusion. 8094-8108 - Xinjian Luo
, Yangfan Jiang
, Fei Wei
, Yuncheng Wu
, Xiaokui Xiao
, Beng Chin Ooi
:
Exploring Privacy and Fairness Risks in Sharing Diffusion Models: An Adversarial Perspective. 8109-8124 - Xiaojun Jia
, Yuefeng Chen
, Xiaofeng Mao, Ranjie Duan, Jindong Gu
, Rong Zhang
, Hui Xue
, Yang Liu
, Xiaochun Cao
:
Revisiting and Exploring Efficient Fast Adversarial Training via LAW: Lipschitz Regularization and Auto Weight Averaging. 8125-8139 - Zhe Chen
, Haiyan Zhang
, Xinghua Li
, Yinbin Miao
, Xiaohan Zhang, Man Zhang
, Siqi Ma
, Robert H. Deng
:
FDFL: Fair and Discrepancy-Aware Incentive Mechanism for Federated Learning. 8140-8154 - Yiming Jiang, Jiangfan Zhang
:
Profitability Analysis of Time-Restricted Double-Spending Attack on PoW-Based Large Scale Blockchain With the Aid of Multiple Types of Attacks. 8155-8171 - Stanislav Kruglik
, Son Hoang Dau
, Han Mao Kiah
, Huaxiong Wang
, Liang Feng Zhang
:
Querying Twice to Achieve Information-Theoretic Verifiability in Private Information Retrieval. 8172-8187 - Hao Wu
, Yuhang Gong
, Xiaopeng Ke
, Hanzhong Liang
, Fengyuan Xu
, Yunxin Liu
, Sheng Zhong
:
TIM: Enabling Large-Scale White-Box Testing on In-App Deep Learning Models. 8188-8203 - Sima Bagheri
, Hugo Kermabon-Bobinnec
, Mohammad Ekramul Kabir
, Suryadipta Majumdar
, Lingyu Wang
, Yosr Jarraya
, Boubakr Nour
, Makan Pourzandi
:
ACE-WARP: A Cost-Effective Approach to Proactive and Non-Disruptive Incident Response in Kubernetes Clusters. 8204-8219 - Jingwen Tan
, Huanran Wang
, Shuai Han
, Dapeng Man
, Wu Yang
:
An Adaptability-Enhanced Few-Shot Website Fingerprinting Attack Based on Collusion. 8220-8235 - Hong Niu
, Yue Xiao
, Xia Lei
, Lilin Dan
, Wei Xiang
, Chau Yuen
:
Reconfigurable Intelligent Surface-Assisted Passive Beamforming Attack. 8236-8247 - Qinlong Huang
, Chao Wang, Boyu Lu:
An Efficient and Verifiable Encrypted Data Filtering Framework Over Large-Scale Storage in Cloud Edge. 8248-8262 - Yanru Chen
, Fengming Yin
, Bing Guo
, Zhiwen Pan, Liangyin Chen
:
Cross-Layer AKA Protocol for Industrial Control Based on Channel State Information. 8263-8274 - Shijie Li
, Yuqi Chen, Xin Chen, Zedong Li
, Dongliang Fang
, Kaixiang Liu
, Shichao Lv
, Limin Sun
:
PowerGuard: Using Power Side-Channel Signals to Secure Motion Controllers in ICS. 8275-8290 - Yihao Huang
, Qing Guo
, Felix Juefei-Xu
, Ming Hu
, Xiaojun Jia
, Xiaochun Cao
, Geguang Pu
, Yang Liu
:
Texture Re-Scalable Universal Adversarial Perturbation. 8291-8305 - Shunsheng Zhang
, Youwen Zhu
, Ao Zeng:
Collusion-Resilient Privacy-Preserving Database Fingerprinting. 8306-8321 - Jianwei Fei
, Zhihua Xia
, Benedetta Tondi
, Mauro Barni
:
Wide Flat Minimum Watermarking for Robust Ownership Verification of GANs. 8322-8337 - Jingyu Jia
, Xinhao Li
, Tong Li
, Zhewei Liu, Chang Tan
, Siyi Lv
, Liang Guo, Changyu Dong, Zheli Liu
:
ABSyn: An Accurate Differentially Private Data Synthesis Scheme With Adaptive Selection and Batch Processes. 8338-8352 - Weizhen He
, Jinglei Tan
, Yunfei Guo, Ke Shang
, Hengwei Zhang
:
A Deep Reinforcement Learning-Based Deception Asset Selection Algorithm in Differential Games. 8353-8368 - Tim Van hamme
, Giuseppe Garofalo
, Enrique Argones-Rúa
, Davy Preuveneers
, Wouter Joosen:
A Novel Evaluation Framework for Biometric Security: Assessing Guessing Difficulty as a Metric. 8369-8384 - Rizhao Cai
, Zitong Yu
, Chenqi Kong
, Haoliang Li
, Changsheng Chen
, Yongjian Hu
, Alex C. Kot
:
S-Adapter: Generalizing Vision Transformer for Face Anti-Spoofing With Statistical Tokens. 8385-8397 - Liufu Zhu
, Ding Wang
:
Robust Multi-Factor Authentication for WSNs With Dynamic Password Recovery. 8398-8413 - Huimin She
, Yongjian Hu
, Beibei Liu
, Jicheng Li
, Chang-Tsun Li
:
Using Graph Neural Networks to Improve Generalization Capability of the Models for Deepfake Detection. 8414-8427 - Steven A. Grosz
, Akash Godbole
, Anil K. Jain
:
Mobile Contactless Palmprint Recognition: Use of Multiscale, Multimodel Embeddings. 8428-8440 - Jiangshan Long
, Changhai Ou
, Chenxu Wang, Zhu Wang
, Yongbin Zhou
:
What Is Now Possible? Security Evaluation on Univariate DPA Attacks With Inaccurate Leakage Models. 8441-8456 - Jiakai Wang
, Ye Tao, Yichi Zhang, Wanting Liu
, Yusheng Kong, Shaolin Tan
, Rongen Yan, Xianglong Liu
:
Adversarial Examples Against WiFi Fingerprint-Based Localization in the Physical World. 8457-8471 - Xuanang Yang
, Jing Chen
, Yuqing Li
, Kun He
, Xiaojie Huang
, Zikuan Jiang, Hao Bai
, Ruiying Du
:
Fregata: Fast Private Inference With Unified Secure Two-Party Protocols. 8472-8484 - Zhongjie Ba
, Bin Gong
, Yuwei Wang
, Yuxuan Liu
, Peng Cheng
, Feng Lin
, Li Lu
, Kui Ren
:
Indelible "Footprints" of Inaudible Command Injection. 8485-8499 - Buwei Tian, Junyong Jiang, Zichen He, Xin Yuan
, Lu Dong
, Changyin Sun
:
Functionality-Verification Attack Framework Based on Reinforcement Learning Against Static Malware Detectors. 8500-8514 - Junning Zhang
, Yicen Liu
, Guoru Ding, Bo Tang, Yanlong Chen:
Adaptive Decomposition and Extraction Network of Individual Fingerprint Features for Specific Emitter Identification. 8515-8528 - Yuefeng Du
, Anxin Zhou
, Cong Wang
:
DWare: Cost-Efficient Decentralized Storage With Adaptive Middleware. 8529-8543 - Congming Wei
, Guangze Hong
, An Wang
, Jing Wang, Shaofei Sun
, Yaoling Ding
, Liehuang Zhu
, Wenrui Ma
:
Time Is Not Enough: Timing Leakage Analysis on Cryptographic Chips via Plaintext-Ciphertext Correlation in Non-Timing Channel. 8544-8558 - Yaning Zhang
, Zitong Yu
, Tianyi Wang
, Xiaobin Huang, Linlin Shen
, Zan Gao
, Jianfeng Ren:
GenFace: A Large-Scale Fine-Grained Face Forgery Benchmark and Cross Appearance-Edge Learning. 8559-8572 - Ruochen Wang
, Jun Zhou
, Zhenfu Cao
, Xiaolei Dong
, Kim-Kwang Raymond Choo
:
Updatable Private Set Intersection With Forward Privacy. 8573-8586 - Ziyuan Yang
, Ming Kang
, Andrew Beng Jin Teoh
, Chengrui Gao, Wen Chen
, Bob Zhang
, Yi Zhang
:
A Dual-Level Cancelable Framework for Palmprint Verification and Hack-Proof Data Storage. 8587-8599 - Jiawei Zhao
, Kejiang Chen
, Xiaojian Yuan, Yuang Qi, Weiming Zhang
, Nenghai Yu
:
Silent Guardian: Protecting Text From Malicious Exploitation by Large Language Models. 8600-8615 - Wei Xie
, Hongjun Wang, Zimo Feng
, Chunlai Ma
:
A Novel PHY-Layer Spoofing Attack Detection Scheme Based on WGAN-Encoder Model. 8616-8629 - Yufeng Zhang
, Wenxiong Kang
, Wenwei Song
:
Robust and Accurate Hand Gesture Authentication With Cross-Modality Local-Global Behavior Analysis. 8630-8643 - Zesheng Lin
, Hongbo Li
, Xinjian Chen
, Meiyan Xiao
, Qiong Huang
:
Identity-Based Encryption With Disjunctive, Conjunctive and Range Keyword Search From Lattices. 8644-8657 - Yeongwoo Kim
, György Dán
, Quanyan Zhu
:
Human-in-the-Loop Cyber Intrusion Detection Using Active Learning. 8658-8672 - Qian Li
, Qingyuan Hu, Haoran Fan
, Chenhao Lin
, Chao Shen
, Libing Wu
:
Attention-SA: Exploiting Model-Approximated Data Semantics for Adversarial Attack. 8673-8684 - Chao Sang
, Jun Wu
, Jianhua Li
, Mohsen Guizani
:
From Control Application to Control Logic: PLC Decompile Framework for Industrial Control System. 8685-8700 - Zhaoyang Zhang
, Shen Wang
, Guopu Zhu
, Dechen Zhan, Jiwu Huang
:
Adversarial Perturbation Prediction for Real-Time Protection of Speech Privacy. 8701-8716 - Yipeng Liu
, Hangtao Yu
, Haonan Fang, Zhanqing Li
, Peng Chen
, Ronghua Liang
:
A Wavelet-Based Memory Autoencoder for Noncontact Fingerprint Presentation Attack Detection. 8717-8730 - Lei Zhang
, Yunzhe Jiang
, Yazhou Ma
, Shiwen Mao
, Wenyuan Huang, Zhiyong Yu
, Xiao Zheng
, Lin Shu
, Xiaochen Fan
, Guangquan Xu
, Changyu Dong
:
Toward Robust and Effective Behavior Based User Authentication With Off-the-Shelf Wi-Fi. 8731-8746 - Minzhe Wu, Bowen Zhao
, Yang Xiao
, Congjian Deng, Yuan Liu
, Ximeng Liu
:
MODEL: A Model Poisoning Defense Framework for Federated Learning via Truth Discovery. 8747-8759 - Shiming He
, GenXin Li
, Kun Xie
, Pradip Kumar Sharma
:
Fusion Graph Structure Learning-Based Multivariate Time Series Anomaly Detection With Structured Prior Knowledge. 8760-8772 - Haoxin Yang
, Xuemiao Xu
, Cheng Xu
, Huaidong Zhang
, Jing Qin
, Yi Wang
, Pheng-Ann Heng
, Shengfeng He
:
G²Face: High-Fidelity Reversible Face Anonymization via Generative and Geometric Priors. 8773-8785 - Zheyu Chen
, Zhiqiang Yao
, Biao Jin
, Mingwei Lin
, Jianting Ning
:
FIBNet: Privacy-Enhancing Approach for Face Biometrics Based on the Information Bottleneck Principle. 8786-8801 - Yubo Zheng
, Peng Xu
, Miao Wang, Wanying Xu, Wei Wang
, Tianyang Chen, Hai Jin
:
Themis: Robust and Light-Client Dynamic Searchable Symmetric Encryption. 8802-8816 - Fengyong Li
, Yang Sheng
, Kui Wu
, Chuan Qin
, Xinpeng Zhang
:
LiDiNet: A Lightweight Deep Invertible Network for Image-in-Image Steganography. 8817-8831 - Chenhao Lin
, Fangbin Yi, Hang Wang, Jingyi Deng
, Zhengyu Zhao
, Qian Li
, Chao Shen
:
Exploiting Facial Relationships and Feature Aggregation for Multi-Face Forgery Detection. 8832-8844 - Yihao Cao
, Jianbiao Zhang
, Yaru Zhao
, Hong Shen
, Haoxiang Huang
:
Privacy-Preserving Federated Learning With Improved Personalization and Poison Rectification of Client Models. 8845-8859 - Zexi Jia
, Chuanwei Huang, Zheng Wang
, Hongyan Fei
, Song Wu
, Jufu Feng
:
Finger Recovery Transformer: Toward Better Incomplete Fingerprint Identification. 8860-8874 - Xue Chen
, Shiyuan Xu
, Shang Gao, Yu Guo
, Siu-Ming Yiu
, Bin Xiao
:
FS-LLRS: Lattice-Based Linkable Ring Signature With Forward Security for Cloud-Assisted Electronic Medical Records. 8875-8891 - Jiachun Li
, Yan Meng
, Yuxia Zhan
, Le Zhang, Haojin Zhu
:
Dangers Behind Charging VR Devices: Hidden Side Channel Attacks via Charging Cables. 8892-8907 - Jeyakumar Samantha Tharani
, Zhé Hóu
, Eugene Yugarajah Andrew Charles
, Punit Rathore
, Marimuthu Palaniswami
, Vallipuram Muthukkumarasamy
:
Unified Feature Engineering for Detection of Malicious Entities in Blockchain Networks. 8924-8938 - Juanjuan Weng
, Zhiming Luo
, Shaozi Li
, Dazhen Lin
, Zhun Zhong
:
Boosting Adversarial Transferability via Logits Mixup With Dominant Decomposed Feature. 8939-8951 - Jiankuo Dong
, Yusheng Fu, Xusheng Qin, Zhenjiang Dong
, Fu Xiao
, Jingqiang Lin
:
ECO-BIKE: Bridging the Gap Between PQC BIKE and GPU Acceleration. 8952-8965 - Qianyu Li
, Ruipeng Wang
, Dong Li
, Fan Shi
, Min Zhang
, Anupam Chattopadhyay
, Yi Shen, Yang Li
:
DynPen: Automated Penetration Testing in Dynamic Network Scenarios Using Deep Reinforcement Learning. 8966-8981 - Wanying Dai
, Beibei Li
, Qingyun Du
, Ziqing Zhu
, Ao Liu
:
Chaos-Based Index-of-Min Hashing Scheme for Cancellable Biometrics Security. 8982-8997 - Tong Qiao
, Bin Zhao
, Ran Shi
, Meng Han
, Mahmoud Hassaballah
, Florent Retraint
, Xiangyang Luo
:
Scalable Universal Adversarial Watermark Defending Against Facial Forgery. 8998-9011 - Yongyang Lv
, Ruitao Feng
, Maode Ma
, Manqing Zhu
, Hanwei Wu
, Xiaohong Li
:
Reinventing Multi-User Authentication Security From Cross-Chain Perspective. 8908-8923 - Parhat Abla
, Taotao Li
, Debiao He
, Huawei Huang
, Songsen Yu, Yan Zhang
:
Fair and Privacy-Preserved Data Trading Protocol by Exploiting Blockchain. 9012-9025 - Honghu Pan, Wenjie Pei
, Xin Li
, Zhenyu He
:
Unified Conditional Image Generation for Visible-Infrared Person Re-Identification. 9026-9038 - Wenyi Tan
, Yang Li
, Chenxing Zhao
, Zhunga Liu
, Quan Pan
:
DOEPatch: Dynamically Optimized Ensemble Model for Adversarial Patches Generation. 9039-9054 - Mingyue Xie
, Zheng Chang
, Hongwei Li
, Geyong Min
:
BASUV: A Blockchain-Enabled UAV Authentication Scheme for Internet of Vehicles. 9055-9069 - De Cheng
, Haichun Tai
, Nannan Wang
, Chaowei Fang
, Xinbo Gao
:
Neighbor Consistency and Global-Local Interaction: A Novel Pseudo-Label Refinement Approach for Unsupervised Person Re-Identification. 9070-9084 - Yanrong Liang
, Jianfeng Ma
, Yinbin Miao
, Yuan Su
, Robert H. Deng
:
Efficient and Privacy-Preserving Encode-Based Range Query Over Encrypted Cloud Data. 9085-9099 - Xutong Mu
, Ke Cheng
, Teng Liu
, Tao Zhang
, Xueli Geng
, Yulong Shen
:
FedPTA: Prior-Based Tensor Approximation for Detecting Malicious Clients in Federated Learning. 9100-9114 - Jianhuan Wang
, Shang Gao, Guyue Li
, Keke Gai
, Bin Xiao
:
SAMCU: Secure and Anonymous Multi-Channel Updates in Payment Channel Networks. 9115-9128 - Yuanming Huang
, Mingshu He
, Xiaojuan Wang
, Jie Zhang
:
HeVulD: A Static Vulnerability Detection Method Using Heterogeneous Graph Code Representation. 9129-9144 - Qian Zhang
, Qing Guo
, Ruijun Gao, Felix Juefei-Xu
, Hongkai Yu
, Wei Feng
:
Adversarial Relighting Against Face Recognition. 9145-9157 - Mingzhe Zhai
, Yizhong Liu
, Qianhong Wu
, Bo Qin
, Haibin Zheng
, Xiaopeng Dai
, Zhenyang Ding
, Willy Susilo
:
Accountable Secret Committee Election and Anonymous Sharding Blockchain Consensus. 9158-9172 - Zakia Zaman
, Wanli Xue
, Praveen Gauravaram
, Wen Hu
, Jiaojiao Jiang
, Sanjay K. Jha
:
Privacy-Preserving Probabilistic Data Encoding for IoT Data Analysis. 9173-9187 - Yicheng Liu, Zhao Li
, Kang G. Shin
, Zheng Yan
, Jia Liu
:
iCoding: Countermeasure Against Interference and Eavesdropping in Wireless Communications. 9188-9203 - Guanxiong Shen
, Junqing Zhang
, Xuyu Wang
, Shiwen Mao
:
Federated Radio Frequency Fingerprint Identification Powered by Unsupervised Contrastive Learning. 9204-9215 - Jiacheng Gong
, Weina Niu
, Song Li
, Mingxue Zhang
, Xiaosong Zhang
:
Sensitive Behavioral Chain-Focused Android Malware Detection Fused With AST Semantics. 9216-9229 - Bo Tang
, Fengdong Li
, Jianbo Liu
, Cheng Yang
:
A Video Visual Security Metric Based on Spatiotemporal Self-Attention. 9230-9244 - Nadia Niknami
, Avinash Srinivasan
, Jie Wu:
Cyber-AnDe: Cybersecurity Framework With Adaptive Distributed Sampling for Anomaly Detection on SDNs. 9245-9257 - Jose A. Gutierrez del Arroyo
, Brett J. Borghetti
, Michael A. Temple
:
Fingerprint Extraction Through Distortion Reconstruction (FEDR): A CNN-Based Approach to RF Fingerprinting. 9258-9269 - Jiancheng Huang
, Donghao Zhou
, Jianzhuang Liu
, Linxiao Shi, Shifeng Chen
:
IFAST: Weakly Supervised Interpretable Face Anti-Spoofing From Single-Shot Binocular NIR Images. 9270-9284 - Nate Mathews
, James K. Holland
, Nicholas Hopper
, Matthew Wright
:
Laserbeak: Evolving Website Fingerprinting Attacks With Attention and Multi-Channel Feature Representation. 9285-9300 - Jingjing Yang
, Jieli Liu
, Dan Lin
, Jiajing Wu
, Baoying Huang, Quanzhong Li
, Zibin Zheng
:
Who Stole My NFT? Investigating Web3 NFT Phishing Scams on Ethereum. 9301-9314 - Yuni Lai
, Marcin Waniek
, Liying Li
, Jingwen Wu
, Yulin Zhu
, Tomasz P. Michalak
, Talal Rahwan
, Kai Zhou
:
Coupled-Space Attacks Against Random-Walk-Based Anomaly Detection. 9315-9329 - Huafeng Qin
, Zhipeng Xiong, Yantao Li
, Mounim A. El-Yacoubi
, Jun Wang:
Attention BLSTM-Based Temporal-Spatial Vein Transformer for Multi-View Finger-Vein Recognition. 9330-9343 - Hong-Yen Tran, Jiankun Hu
, Wen Hu
:
Biometrics-Based Authenticated Key Exchange With Multi-Factor Fuzzy Extractor. 9344-9358 - Shiqi Gao, Haoyi Zhou
, Tianyu Chen, Mingrui He, Runhua Xu
, Jianxin Li
:
PE-Attack: On the Universal Positional Embedding Vulnerability in Transformer-Based Models. 9359-9373 - Ya Liu
, Xiao Wang
, Bo Qu
, Fengyu Zhao
:
ATVITSC: A Novel Encrypted Traffic Classification Method Based on Deep Learning. 9374-9389 - Kaiqing Lin
, Bin Li
, Weixiang Li
, Mauro Barni
, Benedetta Tondi
, Xulong Liu
:
Constructing an Intrinsically Robust Steganalyzer via Learning Neighboring Feature Relationships and Self-Adversarial Adjustment. 9390-9405 - Insha Amin
, Deepak Mishra
, Ravikant Saini
, Sonia Aïssa
:
Power Allocation and Decoding Order Selection for Secrecy Fairness in Downlink Cooperative NOMA With Untrusted Receivers Under Imperfect SIC. 9406-9418 - Marcello Meschini
, Giorgio Di Tizio
, Marco Balduzzi, Fabio Massacci
:
A Case-Control Study to Measure Behavioral Risks of Malware Encounters in Organizations. 9419-9432 - Dezhang Kong
, Xiang Chen
, Chunming Wu
, Yi Shen, Zhengyan Zhou
, Qiumei Cheng
, Xuan Liu
, Mingliang Yang, Yubing Qiu, Dong Zhang
, Muhammad Khurram Khan
:
rDefender: A Lightweight and Robust Defense Against Flow Table Overflow Attacks in SDN. 9436-9451 - Jianhong Zhang
, Jie Wei
:
On the Security of Privacy-Enhanced Authentication Protocol for Federated Learning in VANETs. 9433-9435 - Yishan Yang
, Jiajun Li
, Niya Luo, Zheng Yan
, Yifan Zhang
, Kai Zeng
:
BatchAuth: A Physical Layer Batch Authentication Scheme for Multiple Backscatter Devices. 9452-9466 - Etienne Levecque
, Jan Butora
, Patrick Bas:
Finding Incompatible Blocks for Reliable JPEG Steganalysis. 9467-9479 - Chenkai Zeng
, Debiao He
, Qi Feng
, Xiaolin Yang, Qingcai Luo:
SecureGPT: A Framework for Multi-Party Privacy-Preserving Transformer Inference in GPT. 9480-9493 - Stefano Tomasin
, Tarek N. M. M. Elwakeel, Anna V. Guglielmi
, Robin Maes, Nele Noels
, Marc Moeneclaey
:
Analysis of Challenge-Response Authentication With Reconfigurable Intelligent Surfaces. 9494-9507 - Joohee Lee
, Hansol Ryu, Minju Lee, Jaehui Park
:
Cryptanalysis on "NTRU+: Compact Construction of NTRU Using Simple Encoding Method". 9508-9517 - Ehsan Olyaei Torshizi
, Werner Henkel
:
Pairwise Physical Layer Secret Key Generation for FDD Systems. 9518-9533 - Xinyu Zhang
, Qingyu Liu
, Zhongjie Ba
, Yuan Hong
, Tianhang Zheng, Feng Lin
, Li Lu
, Kui Ren
:
FLTracer: Accurate Poisoning Attack Provenance in Federated Learning. 9534-9549 - Keyizhi Xu
, Zhan Chen, Zhongyuan Wang
, Chunxia Xiao
, Chao Liang
:
Toward Robust Adversarial Purification for Face Recognition Under Intensity-Unknown Attacks. 9550-9565 - Changhua Chen
, Tingzhen Yan
, Chenxuan Shi, Hao Xi
, Zhirui Fan, Hai Wan
, Xibin Zhao
:
The Last Mile of Attack Investigation: Audit Log Analysis Toward Software Vulnerability Location. 9566-9581 - Hang Liu
, Yang Ming
, Chenhao Wang
, Yi Zhao
:
Flexible Selective Data Sharing With Fine-Grained Erasure in VANETs. 9582-9597 - Song Ruan
, Yantao Li
, Huafeng Qin
:
LSFM: Light Style and Feature Matching for Efficient Cross-Domain Palmprint Recognition. 9598-9612 - Yunbo Yang
, Xiang Chen
, Yuhao Pan, Jiachen Shen
, Zhenfu Cao
, Xiaolei Dong
, Xiaoguo Li, Jianfei Sun, Guomin Yang
, Robert H. Deng
:
OpenVFL: A Vertical Federated Learning Framework With Stronger Privacy-Preserving. 9670-9681 - Mousa Tayseer Jafar
, Lu-Xing Yang
, Gang Li
, Qingyi Zhu
, Chenquan Gan
:
Minimizing Malware Propagation in Internet of Things Networks: An Optimal Control Using Feedback Loop Approach. 9682-9697 - Zhuo Chen
, Liehuang Zhu
, Peng Jiang
, Zijian Zhang
, Chengxiang Si:
Blockchain-Based Covert Communication: A Detection Attack and Efficient Improvement. 9698-9713 - Qihao Dong
, Shengyuan Yang, Zhiyang Dai, Yansong Gao
, Shang Wang, Yuan Cao
, Anmin Fu
, Willy Susilo
:
CareFL: Contribution Guided Byzantine-Robust Federated Learning. 9714-9729 - Ziqiang Li
, Hong Sun
, Pengfei Xia
, Beihao Xia
, Xue Rui, Wei Zhang
, Qinglang Guo
, Zhangjie Fu
, Bin Li
:
A Proxy Attack-Free Strategy for Practically Improving the Poisoning Efficiency in Backdoor Attacks. 9730-9743 - Hao Wang
, Yichen Cai, Jun Wang
, Chuan Ma, Chunpeng Ge
, Xiangmou Qu, Lu Zhou
:
Voltran: Unlocking Trust and Confidentiality in Decentralized Federated Learning Aggregation. 9744-9759 - Qiuyun Lyu
, Yilong Zhou
, Yizhi Ren
, Zhen Wang
, Yunchuan Guo
:
Toward Personal Data Sharing Autonomy: A Task-Driven Data Capsule Sharing System. 9760-9774 - Xiaopeng Ji
, Ruizhi Zhu
, Qiaosheng Eric Zhang
, Chunguo Li
, Daming Cao
:
Enhancing Covert Communication in OOK Schemes by Phase Deflection. 9775-9788 - Xiaojuan Cheng, Lu-Xing Yang
, Qingyi Zhu
, Chenquan Gan
, Xiaofan Yang
, Gang Li
:
Cost-Effective Hybrid Control Strategies for Dynamical Propaganda War Game. 9789-9802 - Ningping Mou
, Binqing Guo
, Lingchen Zhao
, Cong Wang
, Yue Zhao
, Qian Wang
:
No-Box Universal Adversarial Perturbations Against Image Classifiers via Artificial Textures. 9803-9818 - Rui Wang
, Longlong Li, Guozheng Yang, Xuehu Yan
, Wei Yan
:
Secret Cracking and Security Enhancement for the Image Application of CRT-Based Secret Sharing. 9819-9834 - Fei Chen
, Haohui Zhang
, Tao Xiang
, Joseph K. Liu
:
A Two-Stage Approach for Fair Data Trading Based on Blockchain. 9835-9849 - Xinyue Sun
, Qingqing Ye
, Haibo Hu
, Jiawei Duan
, Qiao Xue
, Tianyu Wo
, Weizhe Zhang
, Jie Xu
:
Generating Location Traces With Semantic- Constrained Local Differential Privacy. 9850-9865 - Caiqun Shi, Qinlong Huang
, Rui Jian, Genghui Chi:
Cross-Domain Inner-Product Access Control Encryption for Secure EMR Flow in Cloud Edge. 9866-9880 - Ya Gao
, Haocheng Ma
, Qizhi Zhang
, Xintong Song, Yier Jin, Jiaji He
, Yiqiang Zhao
:
EMSim+: Accelerating Electromagnetic Security Evaluation With Generative Adversarial Network and Transfer Learning. 9881-9893 - Ningning Yu
, Jiajun Wu
, Chengwei Zhou
, Zhiguo Shi
, Jiming Chen
:
Open Set Learning for RF-Based Drone Recognition via Signal Semantics. 9894-9909 - Liqing Chen
, Jiayi Li
, Jiguo Li
, Jian Weng
:
PAESS: Public-Key Authentication Encryption With Similar Data Search for Pay-Per-Query. 9910-9923 - Jingjing Yang
, Wenjia Yu, Jiajing Wu
, Dan Lin
, Zhiying Wu
, Zibin Zheng
:
2DynEthNet: A Two-Dimensional Streaming Framework for Ethereum Phishing Scam Detection. 9924-9937 - Xiaofang Chen
, Xue Fu
, Wenbo Xu
, Yue Wang
, Guan Gui
:
Joint Variational Modal Decomposition for Specific Emitter Identification With Multiple Sensors. 9938-9953 - Jiahong Wu
, Nan Liu
, Wei Kang
:
The Capacity Region of Distributed Multi-User Secret Sharing Under Perfect Secrecy. 9954-9969 - Kangkang Wei
, Weiqi Luo
, Jiwu Huang
:
Color Image Steganalysis Based on Pixel Difference Convolution and Enhanced Transformer With Selective Pooling. 9970-9983 - Hamed Sarjan
, Mohammadmahdi Asghari
, Amir Ameli
, Mohsen Ghafouri
:
Mitigating Propagation of Cyber-Attacks in Wide-Area Measurement Systems. 9984-9999 - Jiajia Li
, Qian Yi
, Ming Kim Lim
, Shuping Yi
, Pengxing Zhu
, Xingjun Huang:
MBBFAuth: Multimodal Behavioral Biometrics Fusion for Continuous Authentication on Non-Portable Devices. 10000-10015 - Minyu Hua, Yibin Zhang
, Qianyun Zhang
, Huaiyu Tang, Lantu Guo
, Yun Lin
, Hikmet Sari
, Guan Gui
:
KG-IBL: Knowledge Graph Driven Incremental Broad Learning for Few-Shot Specific Emitter Identification. 10016-10028 - Shuming Xiong
, Pengchao Chen
, Shusheng Ge, Qiang Ni
:
SFOM-DT: A Secure and Fair One-to-Many Data Trading Scheme Based on Blockchain. 10029-10042 - Hang Liu
, Anna Scaglione
, Sean Peisert
:
Graph-Signal-to-Graph Matching for Network De-Anonymization Attacks. 10043-10057 - Anand Agrawal
, Rajib Ranjan Maiti:
iTieProbe: How Vulnerable Your IoT Provisioning via Wi-Fi AP Mode or EZ Mode? 10058-10070 - Yan He
, Fei Peng
, Rizhao Cai
, Zitong Yu
, Min Long
, Kwok-Yan Lam
:
Category-Conditional Gradient Alignment for Domain Adaptive Face Anti-Spoofing. 10071-10085 - Jiawen Wu
, Kai Zhang
, Lifei Wei
, Junqing Gong
, Jianting Ning
:
Practical Searchable Symmetric Encryption for Arbitrary Boolean Query-Join in Cloud Storage. 10086-10098 - Shinimol Salim
, Waquar Ahmad
:
Advancing Voice Biometrics for Dysarthria Speakers Using Multitaper LFCC and Voice Conversion Data Augmentation. 10114-10129 - Zhengmin Kong
, Jing Song, Shaoshi Yang
, Li Gan
, Weizhi Meng
, Tao Huang
, Sheng Chen
:
Distributed Robust Artificial-Noise-Aided Secure Precoding for Wiretap MIMO Interference Channels. 10130-10140 - Yahui Li
, Han Zhang
, Jilong Wang
, Xingang Shi
, Xia Yin, Zhiliang Wang
, Jiankun Hu
, Congcong Miao
, Jianping Wu:
Proactively Verifying Quantitative Network Policy Across Unsafe and Unreliable Environments. 10099-10113 - Lvjun Chen
, Di Xiao
, Xiangli Xiao
, Yushu Zhang
:
Secure and Efficient Federated Learning via Novel Authenticable Multi-Party Computation and Compressed Sensing. 10141-10156 - Xiangrui Cai
, Yang Wang
, Sihan Xu
, Hao Li
, Ying Zhang
, Zheli Liu
, Xiaojie Yuan
:
LAN: Learning Adaptive Neighbors for Real-Time Insider Threat Detection. 10157-10172 - Yurong Hao
, Xihui Chen
, Wei Wang
, Jiqiang Liu
, Tao Li
, Junyong Wang
, Witold Pedrycz
:
Eyes on Federated Recommendation: Targeted Poisoning With Competition and Its Mitigation. 10173-10188 - Aymar Le Père Tchimwa Bouom
, Jean-Pierre Lienou, Wilson Ejuh Geh, Frederica Free-Nelson, Sachin Shetty
, Charles A. Kamhoua
:
TriAssetRank: Ranking Vulnerabilities, Exploits, and Privileges for Countermeasures Prioritization. 10189-10205 - Guanjie Cheng
, Junqin Huang
, Yewei Wang, Jun Zhao
, Linghe Kong
, Shuiguang Deng
, Xueqiang Yan:
Conditional Privacy-Preserving Multi-Domain Authentication and Pseudonym Management for 6G-Enabled IoV. 10206-10220 - Jiajun Chen
, Yichen Shen
, Chi Wan Sung
:
A New Shift-Add Secret Sharing Scheme for Partial Data Protection With Parallel Zigzag Decoding. 10221-10232 - Kaiyan He
, Yikun Hu
, Xuehui Li, Yunhao Song, Yubo Zhao, Dawu Gu
:
Strtune: Data Dependence-Based Code Slicing for Binary Similarity Detection With Fine-Tuned Representation. 10233-10245 - Liang Guo
, Jie Jia
, Jian Chen
, Shuhui Yang, Xingwei Wang
:
Secure Beamforming and Radar Association in CoMP-NOMA Empowered Integrated Sensing and Communication Systems. 10246-10257 - Edward Kwadwo Boahen
, Rexford Nii Ayitey Sosu
, Selasi Kwame Ocansey
, Qinbao Xu
, Changda Wang
:
ASRL: Adaptive Swarm Reinforcement Learning for Enhanced OSN Intrusion Detection. 10258-10272 - Hanxiao Chen
, Hongwei Li
, Meng Hao
, Jia Hu, Guowen Xu
, Xilin Zhang
, Tianwei Zhang
:
SecBNN: Efficient Secure Inference on Binary Neural Networks. 10273-10286 - Jianping Cai
, Qingqing Ye
, Haibo Hu
, Ximeng Liu
, Yanggeng Fu
:
Boosting Accuracy of Differentially Private Continuous Data Release for Federated Learning. 10287-10301 - Hao-Ting Pai
, Yu-Hsuan Kang, Wen-Cheng Chung:
An Interpretable Generalization Mechanism for Accurately Detecting Anomaly and Identifying Networking Intrusion Techniques. 10302-10313 - Chengyu Jia
, Jinyin Chen
, Shouling Ji
, Yao Cheng
, Haibin Zheng
, Qi Xuan
:
Backdoor Online Tracing With Evolving Graphs. 10314-10327 - Zheng Wan
, Kexin Liu
, Yajun Chen
, Kaizhi Huang
, Hui-Ming Wang
, Zheng Chu
, Ming Yi, Liang Jin
:
Resource Allocation for STAR-RIS-Assisted MIMO Physical-Layer Key Generation. 10328-10338 - Zihang Zhen
, Xiaoding Wang
, Xu Yang
, Jiwu Shu, Jia Hu
, Hui Lin
, Xun Yi
:
SemantiChain: A Trust Retrieval Blockchain Based on Semantic Sharding. 10339-10354 - Lushan Song
, Zhexuan Wang
, Guopeng Lin
, Weili Han
:
Ruyi: A Configurable and Efficient Secure Multi-Party Learning Framework With Privileged Parties. 10355-10370 - Xi Jun Lin
:
On the Unforgeability of "Privacy-Preserving Aggregation-Authentication Scheme for Safety Warning System in Fog-Cloud Based VANET". 10371-10372 - Yafang Yang
, Lei Zhang
, Yunlei Zhao
, Kim-Kwang Raymond Choo
, Yan Zhang
:
Rebuttal to "On the Unforgeability of 'Privacy-Preserving Aggregation-Authentication Scheme for Safety Warning System in Fog-Cloud Based VANET"'. 10373-10374 - Liza Afeef
, Haji M. Furqan
, Hüseyin Arslan
:
Robust Tracking-Based PHY-Authentication in mmWave MIMO Systems. 10375-10386 - Peirong Zhang
, Lianwen Jin
:
Online Writer Retrieval With Chinese Handwritten Phrases: A Synergistic Temporal-Frequency Representation Learning Approach. 10387-10399

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.