


default search action
IEEE Transactions on Information Forensics and Security, Volume 18
Volume 18, 2023
- Zehua Qiao
, Yuejun Liu
, Yongbin Zhou, Jingdian Ming
, Chengbin Jin, Huizhong Li
:
Practical Public Template Attack Attacks on CRYSTALS-Dilithium With Randomness Leakages. 1-14 - Tianshan Liu
, Cong Zhang
, Kin-Man Lam
, Jun Kong
:
Decouple and Resolve: Transformer-Based Models for Online Anomaly Detection From Weakly Labeled Videos. 15-28 - Wangkun Xu
, Imad M. Jaimoukha
, Fei Teng
:
Robust Moving Target Defence Against False Data Injection Attacks in Power Grids. 29-40 - Xianting Huang
, Jing Liu
, Yingxu Lai
, Beifeng Mao
, Hongshuo Lyu
:
EEFED: Personalized Federated Learning of Execution&Evaluation Dual Network for CPS Intrusion Detection. 41-56 - Jianze Wei
, Yunlong Wang, Huaibo Huang
, Ran He
, Zhenan Sun
, Xingyu Gao
:
Contextual Measures for Iris Recognition. 57-70 - Kan Yang
, Jiangang Shu
, Ruitao Xie
:
Efficient and Provably Secure Data Selective Sharing and Acquisition in Cloud-Based Systems. 71-84 - Yucheng Yao, Nan Liu
, Wei Kang
, Chunguo Li
:
Secure Distributed Matrix Multiplication Under Arbitrary Collusion Pattern. 85-100 - Shengmin Xu
, Xinyi Huang
, Jiaming Yuan
, Yingjiu Li
, Robert H. Deng
:
Accountable and Fine-Grained Controllable Rewriting in Blockchains. 101-116 - Rémi A. Chou
:
Explicit Wiretap Channel Codes via Source Coding, Universal Hashing, and Distribution Approximation, When the Channels' Statistics are Uncertain. 117-132 - Anjith George
, Amir Mohammadi, Sébastien Marcel
:
Prepended Domain Transformer: Heterogeneous Face Recognition Without Bells and Whistles. 133-146 - Shujuan Wang, Run Liu
, Huafeng Li
, Guanqiu Qi
, Zhengtao Yu
:
Occluded Person Re-Identification via Defending Against Attacks From Obstacles. 147-161 - Baojin Ding
, Haixia Wang
, Ronghua Liang
, Yilong Zhang
, Peng Chen
:
End-to-End Surface and Internal Fingerprint Reconstruction From Optical Coherence Tomography Based on Contour Regression. 162-176 - (Withdrawn) Robust and Efficient Finger Vein Recognition Using Binarized Difference of Gabor Jet on Grid. 177-189
- Matej Vitek
, Abhijit Das, Diego Rafael Lucio
, Luiz A. Zanlorensi
, David Menotti
, Jalil Nourmohammadi-Khiarak
, Mohsen Akbari Shahpar, Meysam Asgari-Chenaghlu, Farhang Jaryani, Juan E. Tapia
, Andres Valenzuela
, Caiyong Wang
, Yunlong Wang, Zhaofeng He, Zhenan Sun
, Fadi Boutros
, Naser Damer
, Jonas Henry Grebe, Arjan Kuijper
, Kiran B. Raja
, Gourav Gupta
, Georgios Zampoukis, Lazaros T. Tsochatzidis, Ioannis Pratikakis, S. V. Aruna Kumar, B. S. Harish, Umapada Pal
, Peter Peer
, Vitomir Struc
:
Exploring Bias in Sclera Segmentation Models: A Group Evaluation Approach. 190-205 - Xiaoyan Yin
, Wanyu Lin, Kexin Sun, Chun Wei, Yanjiao Chen
:
A2S2-GNN: Rigging GNN-Based Social Status by Adversarial Attacks in Signed Social Networks. 206-220 - Zenghao Bao
, Zichang Tan
, Jun Wan
, Xibo Ma
, Guodong Guo, Zhen Lei
:
Divergence-Driven Consistency Training for Semi-Supervised Facial Age Estimation. 221-232 - Qingyang Zhang
, Jing Wu
, Hong Zhong
, Debiao He
, Jie Cui
:
Efficient Anonymous Authentication Based on Physically Unclonable Function in Industrial Internet of Things. 233-247 - Saffet Vatansever
, Ahmet Emir Dirik
, Nasir D. Memon
:
The Effect of Inverse Square Law of Light on ENF in Videos Exposed by Rolling Shutter. 248-260 - Bar Sadeh, Yujie Gu
, Itzhak Tamo
:
Bounds on the Capacity of Private Information Retrieval Over Graphs. 261-273 - Gabriele Oligeri
, Savio Sciancalepore
, Simone Raponi
, Roberto Di Pietro
:
PAST-AI: Physical-Layer Authentication of Satellite Transmitters via Deep Learning. 274-289 - Xiaotong Zhou, Debiao He
, Jianting Ning
, Min Luo
, Xinyi Huang
:
AADEC: Anonymous and Auditable Distributed Access Control for Edge Computing Services. 290-303 - Likhitha Mankali
, Lilas Alrahis
, Satwik Patnaik
, Johann Knechtel
, Ozgur Sinanoglu
:
Titan: Security Analysis of Large-Scale Hardware Obfuscation Using Graph Neural Networks. 304-318 - Mohammad Wazid
, Ashok Kumar Das
, Sachin Shetty
, Joel J. P. C. Rodrigues
, Mohsen Guizani
:
AISCM-FH: AI-Enabled Secure Communication Mechanism in Fog Computing-Based Healthcare. 319-334 - Qian Chen
, Zilong Wang
, Hongbo Wang
, Xiaodong Lin
:
FedDual: Pair-Wise Gossip Helps Federated Learning in Large Decentralized Networks. 335-350 - Shen Wang
, Zhaoyang Zhang, Guopu Zhu
, Xinpeng Zhang
, Yicong Zhou
, Jiwu Huang
:
Query-Efficient Adversarial Attack With Low Perturbation Against End-to-End Speech Recognition Systems. 351-364 - Zhuangzhuang Zhang
, Libing Wu, Chuanguo Ma, Jianxin Li
, Jing Wang, Qian Wang
, Shui Yu
:
LSFL: A Lightweight and Secure Federated Learning Scheme for Edge Computing. 365-379 - Xinliang Zhang
, Tianyun Li, Pei Gong, Xiong Zha
, Renwei Liu:
Variable-Modulation Specific Emitter Identification With Domain Adaptation. 380-395 - Hongbo Li
, Qiong Huang
, Jianye Huang
, Willy Susilo
:
Public-Key Authenticated Encryption With Keyword Search Supporting Constant Trapdoor Generation and Fast Search. 396-410 - Mee Lan Han
, Byung Il Kwak
, Huy Kang Kim
:
TOW-IDS: Intrusion Detection System Based on Three Overlapped Wavelets for Automotive Ethernet. 411-422 - Yang You
, Zuxing Li
, Tobias J. Oechtering
:
Non-Cooperative Games for Privacy-Preserving and Cost-Efficient Smart Grid Energy Management. 423-434 - Niladri B. Puhan
, Sushree Sangeeta Behera:
Holistic Feature Reconstruction-Based 3-D Attention Mechanism for Cross-Spectral Periocular Recognition. 435-448 - Kai Zhang
, Xiwen Wang
, Jianting Ning
, Xinyi Huang
:
Dual-Server Boolean Data Retrieval for Highly-Scalable Secure File Sharing Services. 449-462 - Li-Wei Chen
, Ziang Chen
, Werner Schindler
, Xianyue Zhao, Heidemarie Schmidt, Nan Du
, Ilia Polian
:
On Side-Channel Analysis of Memristive Cryptographic Circuits. 463-476 - Liad Dekel, Ilia Leybovich, Polina Zilberman, Rami Puzis
:
MABAT: A Multi-Armed Bandit Approach for Threat-Hunting. 477-490 - Yaroslav Sovyn, Volodymyr Khoma, Michal Podpora
:
Bitsliced Implementation of Non-Algebraic 8×8 Cryptographic S-Boxes Using ×86-64 Processor SIMD Instructions. 491-500 - Qingxiao Guan
, Peng Liu
, Weiming Zhang
, Wei Lu
, Xinpeng Zhang
:
Double-Layered Dual-Syndrome Trellis Codes Utilizing Channel Knowledge for Robust Steganography. 501-516 - Zhenduo Hou
, Ding Wang
:
New Observations on Zipf's Law in Passwords. 517-532 - Danjun Liu
, Pengfei Wang
, Xu Zhou
, Wei Xie
, Gen Zhang, Zhenhao Luo
, Tai Yue
, Baosheng Wang:
From Release to Rebirth: Exploiting Thanos Objects in Linux Kernel. 533-548 - Georg Maringer
, Sven Puchinger
, Antonia Wachter-Zeh
:
Information- and Coding-Theoretic Analysis of the RLWE/MLWE Channel. 549-564 - Hao Zhou
, Geng Yang
, Yuxian Huang
, Hua Dai
, Yang Xiang:
Privacy-Preserving and Verifiable Federated Learning Framework for Edge Computing. 565-580 - Zhenyong Zhang
, Ruilong Deng
, Youliang Tian
, Peng Cheng
, Jianfeng Ma
:
SPMA: Stealthy Physics-Manipulated Attack and Countermeasures in Cyber-Physical Smart Grid. 581-596 - Qingxuan Wang
, Ding Wang
:
Understanding Failures in Security Proofs of Multi-Factor Authentication for Mobile Devices. 597-612 - Antonio M. Larriba
, Damián López
:
How to Grant Anonymous Access. 613-625 - Nayyer Aafaq
, Naveed Akhtar
, Wei Liu
, Mubarak Shah
, Ajmal Mian
:
Language Model Agnostic Gray-Box Adversarial Attack on Image Captioning. 626-638 - Vedrana Krivokuca Hahn
, Sébastien Marcel
:
Biometric Template Protection for Neural-Network-Based Face Recognition Systems: A Survey of Methods and Evaluation Techniques. 639-666 - Amir Javadpour
, Forough Ja'fari
, Tarik Taleb
, Mohammad Shojafar
, Bin Yang
:
SCEMA: An SDN-Oriented Cost-Effective Edge-Based MTD Approach. 667-682 - Jianfei Sun
, Guowen Xu
, Tianwei Zhang
, Xuehuan Yang, Mamoun Alazab
, Robert H. Deng
:
Verifiable, Fair and Privacy-Preserving Broadcast Authorization for Flexible Data Sharing in Clouds. 683-698 - Guanghan Duan
, Hongwu Lv
, Huiqiang Wang
, Guangsheng Feng
:
Application of a Dynamic Line Graph Neural Network for Intrusion Detection With Semisupervised Learning. 699-714 - Donghoon Jeong
, Joseph H. T. Kim, Jongho Im
:
A New Global Measure to Simultaneously Evaluate Data Utility and Privacy Risk. 715-729 - Steven A. Grosz
, Anil K. Jain
:
SpoofGAN: Synthetic Fingerprint Spoof Images. 730-743 - Kanishka P. Wijewardena
, Steven A. Grosz
, Kai Cao
, Anil K. Jain
:
Fingerprint Template Invertibility: Minutiae vs. Deep Templates. 744-757 - Thao M. Dang
, Thuc Dinh Nguyen, Thang Hoang, Hyunseok Kim, Andrew Beng Jin Teoh
, Deokjai Choi
:
AVET: A Novel Transform Function to Improve Cancellable Biometrics Security. 758-772 - Mirko Marras
, Pawel Korus
, Anubhav Jain, Nasir D. Memon
:
Dictionary Attacks on Speaker Verification. 773-788 - Wei Liu
, Youwei Zhang, Yonghe Tang, Huanwei Wang, Qiang Wei
:
ALScA: A Framework for Using Auxiliary Learning Side-Channel Attacks to Model PUFs. 804-817 - Haomiao Yang
, Mengyu Ge, Kunlan Xiang, Jingwei Li
:
Using Highly Compressed Gradients in Federated Learning for Data Reconstruction Attacks. 818-830 - Jiachun Pan
, Yonglong Li, Vincent Y. F. Tan
:
Asymptotic Nash Equilibrium for the M-Ary Sequential Adversarial Hypothesis Testing Game. 831-845 - Jinshuai Yang
, Zhongliang Yang
, Jiajun Zou, Haoqin Tu
, Yongfeng Huang
:
Linguistic Steganalysis Toward Social Network. 859-871 - Hyeon-Seong Im
, Si-Hyeon Lee
:
Anti-Jamming Games in Multi-Band Wireless Ad Hoc Networks. 872-887 - Yandong Zheng
, Rongxing Lu
, Hui Zhu
, Songnian Zhang, Yunguo Guan
, Jun Shao
, Fengwei Wang, Hui Li
:
SetRkNN: Efficient and Privacy-Preserving Set Reverse kNN Query in Cloud. 888-903 - Anusha Vangala
, Ashok Kumar Das
, Ankush Mitra, Sajal K. Das
, Youngho Park
:
Blockchain-Enabled Authenticated Key Agreement Scheme for Mobile Vehicles-Assisted Precision Agricultural IoT Networks. 904-919 - Zuan Wang
, Liang Zhang
, Xiaofeng Ding
, Kim-Kwang Raymond Choo
, Hai Jin
:
A Dynamic-Efficient Structure for Secure and Verifiable Location-Based Skyline Queries. 920-935 - Songlin Hu
, Xiaohua Ge
, Yu Li, Xiaoli Chen, Xiangpeng Xie
, Dong Yue
:
Resilient Load Frequency Control of Multi-Area Power Systems Under DoS Attacks. 936-947 - Jiajun Li
, Pu Wang
, Long Jiao
, Zheng Yan
, Kai Zeng
, Yishan Yang
:
Security Analysis of Triangle Channel-Based Physical Layer Key Generation in Wireless Backscatter Communications. 948-964 - Keshav Sood
, Mohammad Reza Nosouhi
, Dinh Duc Nha Nguyen
, Frank Jiang, Morshed Chowdhury
, Robin Doss
:
Intrusion Detection Scheme With Dimensionality Reduction in Next Generation Networks. 965-979 - Jiacheng Tang
, Shiping Shao
, Jiguo Song, Abhishek Gupta
:
Nash Equilibrium Control Policy Against Bus-off Attacks in CAN Networks. 980-990 - Tianqing Zhu
, Dayong Ye
, Shuai Zhou, Bo Liu
, Wanlei Zhou:
Label-Only Model Inversion Attacks: Attack With the Least Information. 991-1005 - Hanxiao Chen
, Hongwei Li
, Yingzhe Wang, Meng Hao
, Guowen Xu
, Tianwei Zhang
:
PriVDT: An Efficient Two-Party Cryptographic Framework for Vertical Decision Trees. 1006-1021 - Jiaqi Zhao
, Hui Zhu
, Wei Xu
, Fengwei Wang
, Rongxing Lu
, Hui Li
:
SGBoost: An Efficient and Privacy-Preserving Vertical Federated Tree Boosting Framework. 1022-1036 - Jianhong Zhang
, Qijia Zhang
:
Comment on "Secure and Lightweight Conditional Privacy-Preserving Authentication for Securing Traffic Emergency Messages in VANETs". 1037-1038 - Changtao Miao
, Zichang Tan
, Qi Chu
, Huan Liu
, Honggang Hu, Nenghai Yu
:
F2Trans: High-Frequency Fine-Grained Transformer for Face Forgery Detection. 1039-1051 - Chengru Zhang, Xinyu Li
, Man Ho Au
:
ePoSt: Practical and Client-Friendly Proof of Storage-Time. 1052-1063 - Zhifan Xu
, Melike Baykal-Gürsoy
:
Power Allocation for Cooperative Jamming Against a Strategic Eavesdropper Over Parallel Channels. 846-858 - Chao Wang
, Zhiqiu Huang
, Shuren Qi
, Yaoshen Yu
, Guohua Shen
, Yushu Zhang
:
Shrinking the Semantic Gap: Spatial Pooling of Local Moment Invariants for Copy-Move Forgery Detection. 1064-1079 - Chenglu Jin
, Zheng Yang
, Tao Xiang
, Sridhar Adepu, Jianying Zhou:
HMACCE: Establishing Authenticated and Confidential Channel From Historical Data for Industrial Internet of Things. 1080-1094 - Gen Li
, Xianfeng Zhao
, Yun Cao
:
Forensic Symmetry for DeepFakes. 1095-1110 - Ding Xu
, Hongbo Zhu
:
Proactive Eavesdropping of Physical Layer Security Aided Suspicious Communications in Fading Channels. 1111-1126 - Zezheng Wang
, Zitong Yu
, Xun Wang, Yunxiao Qin
, Jiahong Li, Chenxu Zhao, Xin Liu
, Zhen Lei
:
Consistency Regularization for Deep Face Anti-Spoofing. 1127-1140 - Nikolay Ivanov
, Qiben Yan
, Anurag Kompalli
:
TxT: Real-Time Transaction Encapsulation for Ethereum Smart Contracts. 1141-1155 - Jiayan Shen, Peng Zeng
, Kim-Kwang Raymond Choo
, Chengju Li
:
A Certificateless Provable Data Possession Scheme for Cloud-Based EHRs. 1156-1168 - Changhee Hahn
, Hyundo Yoon
, Junbeom Hur
:
Multi-Key Similar Data Search on Encrypted Storage With Secure Pay-Per-Query. 1169-1181 - Guofu Zhang
, Lulu Zheng, Zhaopin Su
, Yifei Zeng, Guoquan Wang:
M-Sequences and Sliding Window Based Audio Watermarking Robust Against Large-Scale Cropping Attacks. 1182-1195 - Weiting Li
, Liyao Xiang
, Bin Guo
, Zhetao Li
, Xinbing Wang
:
DPlanner: A Privacy Budgeting System for Utility. 1196-1210 - Yu Yao
, Junhui Zhao
, Zeqing Li
, Xu Cheng, Lenan Wu:
Jamming and Eavesdropping Defense Scheme Based on Deep Reinforcement Learning in Autonomous Vehicle Networks. 1211-1224 - Satoshi Furutani
, Toshiki Shibahara
, Mitsuaki Akiyama
, Masaki Aida
:
Interpreting Graph-Based Sybil Detection Methods as Low-Pass Filtering. 1225-1236 - Zhenguang Liu
, Peng Qian
, Jiaxu Yang, Lingfeng Liu, Xiaojun Xu, Qinming He, Xiaosong Zhang
:
Rethinking Smart Contract Fuzzing: Fuzzing With Invocation Ordering and Important Branch Revisiting. 1237-1251 - Keyu Ji
, Bingsheng Zhang
, Tianpei Lu, Kui Ren
:
Multi-Party Private Function Evaluation for RAM. 1252-1267 - Tsung-Hsien Lin
, Ying-Shuo Lee, Fu-Chieh Chang
, J. Morris Chang, Pei-Yuan Wu
:
Protecting Sensitive Attributes by Adversarial Training Through Class-Overlapping Techniques. 1283-1294 - Zheng Zheng
, Qian Wang
, Cong Wang
, Man Zhou, Yi Zhao
, Qi Li
, Chao Shen
:
Where Are the Dots: Hardening Face Authentication on Smartphones With Unforgeable Eye Movement Patterns. 1295-1308 - Chi Xu
, Yasushi Makihara, Xiang Li
, Yasushi Yagi
:
Occlusion-Aware Human Mesh Model-Based Gait Recognition. 1309-1321 - Ziming Zhao
, Zhaoxuan Li
, Fan Zhang
, Ziqi Yang, Shuang Luo, Tingting Li, Rui Zhang
, Kui Ren
:
SAGE: Steering the Adversarial Generation of Examples With Accelerations. 789-803 - Anxiao He, Xiang Li, Jiandong Fu, Haoyu Hu, Kai Bu
, Chenlu Miao, Kui Ren
:
Hummingbird: Dynamic Path Validation With Hidden Equal-Probability Sampling. 1268-1282 - Junduan Huang
, An Zheng
, M. Saad Shakeel
, Weili Yang
, Wenxiong Kang
:
FVFSNet: Frequency-Spatial Coupling Network for Finger Vein Authentication. 1322-1334 - Cairong Zhao
, Chutian Wang, Guosheng Hu
, Haonan Chen, Chun Liu
, Jinhui Tang
:
ISTVT: Interpretable Spatial-Temporal Video Transformer for Deepfake Detection. 1335-1348 - Lefeng Zhang
, Tianqing Zhu
, Farookh Khadeer Hussain, Dayong Ye
, Wanlei Zhou:
A Game-Theoretic Method for Defending Against Advanced Persistent Threats in Cyber Systems. 1349-1364 - Haocheng Ma
, Max Panoff
, Jiaji He
, Yiqiang Zhao, Yier Jin
:
EMSim: A Fast Layout Level Electromagnetic Emanation Simulation Framework for High Accuracy Pre-Silicon Verification. 1365-1379 - Peilun Du
, Xiaolong Zheng
, Mengshi Qi, Huadong Ma
:
GaitReload: A Reloading Framework for Defending Against On-Manifold Adversarial Gait Sequences. 1380-1392 - Bin Qiu
, Wenchi Cheng
, Wei Zhang
:
Robust Multi-Beam Secure mmWave Wireless Communication for Hybrid Wiretapping Systems. 1393-1406 - Thomas Schneider
, Ajith Suresh
, Hossein Yalame
:
Comments on "Privacy-Enhanced Federated Learning Against Poisoning Adversaries". 1407-1409 - Haohao Li, Jianguo Zhang
, Zhihu Li, Juan Liu, Yuncai Wang
:
Improvement of Min-Entropy Evaluation Based on Pruning and Quantized Deep Neural Network. 1410-1420 - Shervin Rahimzadeh Arashloo
:
Unknown Face Presentation Attack Detection via Localized Learning of Multiple Kernels. 1421-1432 - Gaddisa Olani Ganfure
, Chun-Feng Wu
, Yuan-Hao Chang
, Wei-Kuan Shih
:
RTrap: Trapping and Containing Ransomware With Machine Learning. 1433-1448 - Xuhui Bu
, Wei Yu
, Yanling Yin
, Zhongsheng Hou
:
Event-Triggered Data-Driven Control for Nonlinear Systems Under Frequency-Duration-Constrained DoS Attacks. 1449-1460 - Ran Dubin
:
Content Disarm and Reconstruction of RTF Files a Zero File Trust Methodology. 1461-1472 - Haitian Zhang, Guang Hua
, Xinya Wang, Hao Jiang
, Wen Yang
:
Categorical Inference Poisoning: Verifiable Defense Against Black-Box DNN Model Stealing Without Constraining Surrogate Data and Query Times. 1473-1486 - Wei Li
, Chun Liu, Dawu Gu
, Jianning Gao, Wenqian Sun:
Statistical Differential Fault Analysis of the Saturnin Lightweight Cryptosystem in the Mobile Wireless Sensor Networks. 1487-1496 - Harishma Boyapally
, Sikhar Patranabis
, Debdeep Mukhopadhyay
:
Commitments via Physically Related Functions. 1497-1508 - Yantao Li
, Song Ruan
, Huafeng Qin
, Shaojiang Deng
, Mounim A. El-Yacoubi
:
Transformer Based Defense GAN Against Palm-Vein Adversarial Attacks. 1509-1523 - Xianbo Mo
, Shunquan Tan
, Weixuan Tang
, Bin Li
, Jiwu Huang
:
ReLOAD: Using Reinforcement Learning to Optimize Asymmetric Distortion for Additive Steganography. 1524-1538 - Zhousheng Wang
, Geng Yang
, Hua Dai
, Chunming Rong
:
Privacy-Preserving Split Learning for Large-Scaled Vision Pre-Training. 1539-1553 - Yiyuan Zhang
, Yuhao Kang
, Sanyuan Zhao
, Jianbing Shen
:
Dual-Semantic Consistency Learning for Visible-Infrared Person Re-Identification. 1554-1565 - Hengrun Zhang
, Kai Zeng
, Shuai Lin:
Federated Graph Neural Network for Fast Anomaly Detection in Controller Area Networks. 1566-1579 - Yikun Xu
, Pengwen Dai
, Zekun Li, Hongjun Wang
, Xiaochun Cao
:
The Best Protection is Attack: Fooling Scene Text Recognition With Minimal Pixels. 1580-1595 - Wenting Li
, Ping Wang
, Kaitai Liang
:
HPAKE: Honey Password-Authenticated Key Exchange for Fast and Safer Online Authentication. 1596-1609 - Tianbo Wang
, Huacheng Li, Chunhe Xia
, Han Zhang
, Pei Zhang
:
From the Dialectical Perspective: Modeling and Exploiting of Hybrid Worm Propagation. 1610-1624 - Yifeng Jiang
, Weiwen Zhang
, Yanxi Chen:
Data Quality Detection Mechanism Against Label Flipping Attacks in Federated Learning. 1625-1637 - Ximing Li
, Xiaoyong Li
, Jia Jia
, Linghui Li, Jie Yuan
, Yali Gao, Shui Yu
:
A High Accuracy and Adaptive Anomaly Detection Model With Dual-Domain Graph Convolutional Network for Insider Threat Detection. 1638-1652 - Jianhao Li
, Hui Ma
, Jiabei Wang
, Zishuai Song
, Wenhan Xu
, Rui Zhang
:
Wolverine: A Scalable and Transaction-Consistent Redactable Permissionless Blockchain. 1653-1666 - Jiliang Zhang
, Shuang Peng, Yansong Gao
, Zhi Zhang
, Qinghui Hong
:
APMSA: Adversarial Perturbation Against Model Stealing Attacks. 1667-1679 - Jinbao Zhu
, Songze Li
, Jie Li
:
Information-Theoretically Private Matrix Multiplication From MDS-Coded Storage. 1680-1695 - Ziming Yang
, Jian Liang
, Yuting Xu
, Xiaoyu Zhang
, Ran He
:
Masked Relation Learning for DeepFake Detection. 1696-1708 - Lei Ma
, Zhong Chu
, Chunyu Yang
, Guoqing Wang
, Wei Dai
:
Recursive Watermarking-Based Transient Covert Attack Detection for the Industrial CPS. 1709-1719 - Yulin Feng, Ajay Kumar
:
Detecting Locally, Patching Globally: An End-to-End Framework for High Speed and Accurate Detection of Fingerprint Minutiae. 1720-1733 - Xinjin Lu
, Jing Lei
, Yuxin Shi
, Wei Li:
Physical-Layer Authentication Based on Channel Phase Responses for Multi-Carriers Transmission. 1734-1748 - Kathrin Grosse
, Lukas Bieringer
, Tarek R. Besold
, Battista Biggio
, Katharina Krombholz:
Machine Learning Security in Industry: A Quantitative Survey. 1749-1762 - Efe Arin
, Mücahid Kutlu
:
Deep Learning Based Social Bot Detection on Twitter. 1763-1772 - Yongliang Chen
, Xiaole Cui
, Yun Liu
, Xiaoxin Cui
:
An Evaluation Method of the Anti-Modeling-Attack Capability of PUFs. 1773-1788 - Qi Zhu
, Yuze Zhou
, Lunke Fei
, Daoqiang Zhang
, David Zhang
:
Multi-Spectral Palmprints Joint Attack and Defense With Adversarial Examples Learning. 1789-1799 - Lanxiang Chen
, Yi Mu
, Lingfang Zeng
, Fatemeh Rezaeibagha
, Robert H. Deng
:
Authenticable Data Analytics Over Encrypted Data in the Cloud. 1800-1813 - Daniel P. Benalcazar, Juan E. Tapia
, Sebastian Gonzalez, Christoph Busch
:
Synthetic ID Card Image Generation for Improving Presentation Attack Detection. 1814-1824 - Xiaolong Xu
, Zexuan Fan, Marcello Trovati
, Francesco Palmieri
:
MLPKV: A Local Differential Multi-Layer Private Key-Value Data Collection Scheme for Edge Computing Environments. 1825-1838 - Ziyao Liu
, Jiale Guo
, Kwok-Yan Lam
, Jun Zhao
:
Efficient Dropout-Resilient Aggregation for Privacy-Preserving Machine Learning. 1839-1854 - Yansong Chang
, Kai Zhang
, Junqing Gong
, Haifeng Qian
:
Privacy-Preserving Federated Learning via Functional Encryption, Revisited. 1855-1869 - Wenwei Song
, Wenxiong Kang
:
Depthwise Temporal Non-Local Network for Faster and Better Dynamic Hand Gesture Authentication. 1870-1883 - Xin Yuan
, Wei Ni
, Ming Ding
, Kang Wei
, Jun Li, H. Vincent Poor
:
Amplitude-Varying Perturbation for Balancing Privacy and Utility in Federated Learning. 1884-1897 - Rabiah Alnashwan
, Prosanta Gope
, Benjamin Dowling
:
Privacy-Aware Secure Region-Based Handover for Small Cell Networks in 5G-Enabled Mobile Communication. 1898-1913 - Lu Yang, Xing Liu, Gongping Yang
, Jun Wang
, Yilong Yin
:
Small-Area Finger Vein Recognition. 1914-1925 - Annamaria Ficara
, Francesco Curreri
, Giacomo Fiumara
, Pasquale De Meo
:
Human and Social Capital Strategies for Mafia Network Disruption. 1926-1936 - Qi Feng
, Kang Yang
, Mimi Ma
, Debiao He
:
Efficient Multi-Party EdDSA Signature With Identifiable Aborts and its Applications to Blockchain. 1937-1950 - Mohammad Borhani
, Ioannis Avgouleas
, Madhusanka Liyanage
, Andrei V. Gurtov
:
KDC Placement Problem in Secure VPLS Networks. 1951-1962 - Fang-Qi Li
, Shi-Lin Wang
, Alan Wee-Chung Liew
:
Linear Functionality Equivalence Attack Against Deep Neural Network Watermarks and a Defense Method by Neuron Mapping. 1963-1977 - René Bødker Christensen
, Shashi Raj Pandey
, Petar Popovski
:
Semi-Private Computation of Data Similarity With Applications to Data Valuation and Pricing. 1978-1988 - Zefeng Lu
, Ronghao Lin
, Haifeng Hu
:
Modality and Camera Factors Bi-Disentanglement for NIR-VIS Object Re-Identification. 1989-2004 - Meysam Ghahramani
:
Find It With A Pencil: An Efficient Approach for Vulnerability Detection in Authentication Protocols. 2005-2014 - Wenyuan Yang
, Xiaoyu Zhou, Zhikai Chen, Bofei Guo, Zhongjie Ba
, Zhihua Xia
, Xiaochun Cao
, Kui Ren
:
AVoiD-DF: Audio-Visual Joint Learning for Detecting Deepfake. 2015-2029 - Yandong Zheng
, Hui Zhu
, Rongxing Lu
, Yunguo Guan
, Songnian Zhang, Fengwei Wang
, Jun Shao
, Hui Li
:
PGSim: Efficient and Privacy-Preserving Graph Similarity Query Over Encrypted Data in Cloud. 2030-2045 - Pei Zhang
, Fangzhou He, Han Zhang
, Jiankun Hu
, Xiaohong Huang
, Jilong Wang
, Xia Yin, Huahong Zhu
, Yahui Li:
Real-Time Malicious Traffic Detection With Online Isolation Forest Over SD-WAN. 2076-2090 - Yao Zhu
, Yuefeng Chen
, Xiaodan Li
, Rong Zhang
, Xiang Tian
, Bolun Zheng
, Yaowu Chen
:
Information-Containing Adversarial Perturbation for Combating Facial Manipulation Systems. 2046-2059 - Behrooz Razeghi
, Flávio P. Calmon
, Deniz Gündüz
, Slava Voloshynovskiy
:
Bottlenecks CLUB: Unifying Information-Theoretic Trade-Offs Among Complexity, Leakage, and Utility. 2060-2075 - He Fang
, Zhenlong Xiao
, Xianbin Wang
, Li Xu
, Lajos Hanzo
:
Collaborative Authentication for 6G Networks: An Edge Intelligence Based Autonomous Approach. 2091-2103 - Honghu Pan, Yongyong Chen
, Tingyang Xu
, Yunqi He, Zhenyu He
:
Toward Complete-View and High-Level Pose-Based Gait Recognition. 2104-2118 - Jia-Li Yin
, Bin Chen
, Wanqing Zhu, Bo-Hao Chen
, Ximeng Liu
:
Push Stricter to Decide Better: A Class-Conditional Feature Adaptive Framework for Improving Adversarial Robustness. 2119-2131 - Florimond Houssiau
, Thibaut Liénart, Julien M. Hendrickx
, Yves-Alexandre de Montjoye
:
Web Privacy: A Formal Adversarial Model for Query Obfuscation. 2132-2143 - Yuemei Wu
, Dong Wei
, Caili Guo
, Weiqing Huang:
Physical Layer Authentication Based on Channel Polarization Response in Dual-Polarized Antenna Communication Systems. 2144-2159 - Mohammad Reza Nosouhi
, Syed W. Shah, Lei Pan
, Yevhen Zolotavkin
, Ashish Nanda
, Praveen Gauravaram
, Robin Doss
:
Weak-Key Analysis for BIKE Post-Quantum Key Encapsulation Mechanism. 2160-2174 - Dongwoo Kim
, Cyril Guyot
:
Optimized Privacy-Preserving CNN Inference With Fully Homomorphic Encryption. 2175-2187 - Chongyao Xu
, Jieyun Zhang, Man-Kay Law
, Xiaojin Zhao
, Pui-In Mak
, Rui Paulo Martins
:
Transfer-Path-Based Hardware-Reuse Strong PUF Achieving Modeling Attack Resilience With200 Million Training CRPs. 2188-2203 - Son Dinh-Van
, Tiep Minh Hoang
, Berna Bulut Cebecioglu, Daniel S. Fowler
, Yuen Kwan Mo
, Matthew D. Higgins
:
A Defensive Strategy Against Beam Training Attack in 5G mmWave Networks for Manufacturing. 2204-2217 - Jiasi Weng
, Jian Weng
, Gui Tang, Anjia Yang
, Ming Li
, Jia-Nan Liu
:
pvCNN: Privacy-Preserving and Verifiable Convolutional Neural Network Testing. 2218-2233 - Zishuai Song
, Hui Ma
, Rui Zhang
, Wenhan Xu
, Jianhao Li
:
Everything Under Control: Secure Data Sharing Mechanism for Cloud-Edge Computing. 2234-2249 - Jiayu Zhou
, Yue Luo, Yun Liu, Wen Yang
:
Eavesdropping Strategies for Remote State Estimation Under Communication Constraints. 2250-2261 - Hatef Otroshi-Shahreza
, Yanina Y. Shkel
, Sébastien Marcel
:
Measuring Linkability of Protected Biometric Templates Using Maximal Leakage. 2262-2275 - Yizhong Liu
, Xinxin Xing
, Haosu Cheng
, Dawei Li
, Zhenyu Guan
, Jianwei Liu
, Qianhong Wu
:
A Flexible Sharding Blockchain Protocol Based on Cross-Shard Byzantine Fault Tolerance. 2276-2291 - Dongyeong Kim
, Dongweon Yoon
:
Novel Algorithm for Blind Estimation of Scramblers in DSSS Systems. 2292-2302 - Pengfei Deng
, Shaohua Hong
, Jie Qi
, Lin Wang
, Haixin Sun
:
A Lightweight Transformer-Based Approach of Specific Emitter Identification for the Automatic Identification System. 2303-2317 - Guanxiong Shen
, Junqing Zhang
, Alan Marshall
, Mikko Valkama
, Joseph R. Cavallaro
:
Toward Length-Versatile and Noise-Robust Radio Frequency Fingerprint Identification. 2355-2367 - Yiming Li
, Mingyan Zhu
, Xue Yang
, Yong Jiang
, Tao Wei, Shu-Tao Xia
:
Black-Box Dataset Ownership Verification via Backdoor Watermarking. 2318-2332 - Weihang Wang
, Peilin Liu
, Haoyuan Zheng
, Rendong Ying
, Fei Wen
:
Domain Generalization for Face Anti-Spoofing via Negative Data Augmentation. 2333-2344 - Vikram S. Chundawat
, Ayush K. Tarun
, Murari Mandal
, Mohan S. Kankanhalli
:
Zero-Shot Machine Unlearning. 2345-2354 - Zhuangkun Wei
, Bin Li
, Weisi Guo
:
Adversarial Reconfigurable Intelligent Surface Against Physical Layer Key Generation. 2368-2381 - Mengqi Zhan
, Yang Li
, Guangxi Yu, Yan Zhang, Bo Li
, Weiping Wang:
GuardBox: A High-Performance Middlebox Providing Confidentiality and Integrity for Packets. 2413-2426 - Mengqi Zhan
, Yang Li
, Yongchun Zhu
, Guangxi Yu, Yan Zhang, Bo Li
, Weiping Wang:
Website-Aware Protocol Confusion Network for Emergent HTTP/3 Website Fingerprinting. 2427-2439 - Jeferson González-Gómez
, Lars Bauer
, Jörg Henkel
:
Cache-Based Side-Channel Attack Mitigation for Many-Core Distributed Systems via Dynamic Task Migration. 2440-2450 - Benedikt Lorch
, Franziska Schirrmacher
, Anatol Maier
, Christian Riess
:
On the Security of the One-and-a-Half-Class Classifier for SPAM Feature-Based Image Forensics. 2466-2479 - Yongjie Duan
, Jianjiang Feng
, Jiwen Lu
, Jie Zhou
:
Estimating Fingerprint Pose via Dense Voting. 2493-2507 - Wenhao Li
, Xiaoyu Zhang
, Huaifeng Bao
, Binbin Yang
, Zhaoxuan Li
, Haichao Shi
, Qiang Wang
:
Prism: Real-Time Privacy Protection Against Temporal Network Traffic Analyzers. 2524-2537 - Hong-Yen Tran
, Jiankun Hu
, Xuefei Yin
, Hemanshu R. Pota
:
An Efficient Privacy-Enhancing Cross-Silo Federated Learning and Applications for False Data Injection Attack Detection in Smart Grids. 2538-2552 - Xiaofang Xia
, Jian Lin, Qiannan Jia, Xiaoluan Wang, Chaofan Ma
, Jiangtao Cui
, Wei Liang
:
ETD-ConvLSTM: A Deep Learning Approach for Electricity Theft Detection in Smart Grids. 2553-2568 - Meng Hao
, Hongwei Li
, Hanxiao Chen
, Pengzhi Xing
, Tianwei Zhang
:
FastSecNet: An Efficient Cryptographic Framework for Private Neural Network Inference. 2569-2582 - Ye Dong
, Xiaojun Chen
, Xiangfu Song
, Kaiyun Li
:
FlexBNN: Fast Private Binary Neural Network Inference With Flexible Bit-Width. 2382-2397 - Ziyao Liu
, Hsiao-Ying Lin
, Yamin Liu:
Long-Term Privacy-Preserving Aggregation With User-Dynamics for Federated Learning. 2398-2412 - Owen Millwood
, Jack Miskelly, Bohao Yang, Prosanta Gope
, Elif Bilge Kavun, Chenghua Lin
:
PUF-Phenotype: A Robust and Noise-Resilient Approach to Aid Group-Based Authentication With DRAM-PUFs Using Machine Learning. 2451-2465 - Qichao Xu
, Zhou Su
, Jianbing Ni
:
Incentivizing Secure Edge Caching for Scalable Coded Videos in Heterogeneous Networks. 2480-2492 - Hualiang Luo
, Quanzhong Li
, Qi Zhang
, Jiayin Qin:
Joint Secure Transceiver Design for an Untrusted MIMO Relay Assisted Over-the-Air Computation Networks With Perfect and Imperfect CSI. 2508-2523 - Yan Yu
, Wen Yang
, Wenjie Ding
, Jiayu Zhou
:
Reinforcement Learning Solution for Cyber-Physical Systems Security Against Replay Attacks. 2583-2595 - Junhao Dong
, Yuan Wang
, Jianhuang Lai
, Xiaohua Xie
:
Restricted Black-Box Adversarial Attack Against DeepFake Face Swapping. 2596-2608 - Zhiying Wu
, Jieli Liu
, Jiajing Wu
, Zibin Zheng
, Ting Chen
:
TRacer: Scalable Graph-Based Transaction Tracing for Account-Based Blockchain Trading Systems. 2609-2621 - Da Li
, Zhang Zhang
, Caifeng Shan
, Liang Wang
:
Incremental Pedestrian Attribute Recognition via Dual Uncertainty-Aware Pseudo-Labeling. 2622-2636 - Hua Shen
, Ge Wu
, Zhe Xia
, Willy Susilo
, Mingwu Zhang
:
A Privacy-Preserving and Verifiable Statistical Analysis Scheme for an E-Commerce Platform. 2637-2652 - Ruidong Han
, Xiaofeng Wang
, Ningning Bai
, Qin Wang, Zinian Liu, Jianru Xue:
FCD-Net: Learning to Detect Multiple Types of Homologous Deepfake Face Images. 2653-2666 - Yuyu Zhao
, Guang Cheng
, Yongning Tang:
SINT: Toward a Blockchain-Based Secure In-Band Network Telemetry Architecture. 2667-2682 - Jan Butora
, Patrick Bas
:
Side-Informed Steganography for JPEG Images by Modeling Decompressed Images. 2683-2695 - Yongli Tang
, Yuanhong Li
, Qing Ye
, Debiao He
:
Lattice-Based Group Signatures With Time-Bound Keys via Redactable Signatures. 2696-2708 - Cenk Albayrak
, Sinasi Cetinkaya
, Kadir Türk
, Huseyin Arslan:
Physical Layer Security for Visible Light Communication in Reflected Indoor Environments With Inter-Symbol Interference. 2709-2722 - Jawad Muhammad
, Caiyong Wang
, Yunlong Wang, Kunbo Zhang
, Zhenan Sun
:
IrisGuideNet: Guided Localization and Segmentation Network for Unconstrained Iris Biometrics. 2723-2736 - Zhili Zhou
, Xiaohua Dong, Ruohan Meng
, Meimin Wang, Hongyang Yan, Keping Yu
, Kim-Kwang Raymond Choo
:
Generative Steganography via Auto-Generation of Semantic Object Contours. 2751-2765 - Yiqin Qiu
, Hui Tian
, Haizhou Li
, Chin-Chen Chang
, Athanasios V. Vasilakos
:
Separable Convolution Network With Dual-Stream Pyramid Enhanced Strategy for Speech Steganalysis. 2737-2750 - Hengye Zhu
, Mengxiang Liu
, Chongrong Fang
, Ruilong Deng
, Peng Cheng
:
Detection-Performance Tradeoff for Watermarking in Industrial Control Systems. 2780-2793 - Sungmin Hong
, Lei Xu
, Jianwei Huang, Hongda Li
, Hongxin Hu
, Guofei Gu
:
SysFlow: Toward a Programmable Zero Trust Framework for System Security. 2794-2809 - Xueyuan Wang
, Mustafa Cenk Gursoy
:
Resilient Path Planning for UAVs in Data Collection Under Adversarial Attacks. 2766-2779 - Yanlong Qiu
, Jiaxi Zhang
, Yanjiao Chen
, Jin Zhang
, Bo Ji
:
Radar2: Passive Spy Radar Detection and Localization Using COTS mmWave Radar. 2810-2825 - Xiangjun Ma
, Xianfu Lei
, Xiangyun Zhou
, Xiaohu Tang
:
Secrecy Performance Evaluation of Scalable Cell-Free Massive MIMO Systems: A Stochastic Geometry Approach. 2826-2841 - Yogendra Sao
, Sk Subidh Ali
:
Security Analysis of Scan Obfuscation Techniques. 2842-2855 - Intae Kim
, Willy Susilo
, Joonsang Baek
, Jongkil Kim
, Yang-Wai Chow
:
PCSF: Privacy-Preserving Content-Based Spam Filter. 2856-2869 - Zirui Yuan
, Minglai Shao
, Qiben Yan
:
Motif-Level Anomaly Detection in Dynamic Graphs. 2870-2882 - Bin Wang
, Chao Yang
, Jianfeng Ma
:
IAFDroid: Demystifying Collusion Attacks in Android Ecosystem via Precise Inter-App Analysis. 2883-2898 - Sen Qiao
, Daming Cao
, Qiaosheng Eric Zhang
, Yinfei Xu
, Guangjie Liu
:
Covert Communication Gains From Adversary's Uncertainty of Phase Angles. 2899-2912 - Wenbin Zhai
, Liang Liu
, Youwei Ding, Shanshan Sun, Ying Gu
:
ETD: An Efficient Time Delay Attack Detection Framework for UAV Networks. 2913-2928 - Songlei Wang
, Yifeng Zheng
, Xiaohua Jia
, Qian Wang
, Cong Wang
:
MAGO: Maliciously Secure Subgraph Counting on Decentralized Social Graphs. 2929-2944 - Deeb Tubail
, Malek M. Alsmadi
, Salama Ikki
:
Physical Layer Security in Downlink of Cell-Free Massive MIMO With Imperfect CSI. 2945-2960 - Chenyu Wang
, Ding Wang
, Yihe Duan
, Xiaofeng Tao
:
Secure and Lightweight User Authentication Scheme for Cloud-Assisted Internet of Things. 2961-2976 - Tamer Eltaras, Farida Sabry
, Wadha Labda
, Khawla Alzoubi
, Qutaibah Ahmedeltaras
:
Efficient Verifiable Protocol for Privacy-Preserving Aggregation in Federated Learning. 2977-2990 - Florian Frank
, Wenjie Xiong, Nikolaos Athanasios Anagnostopoulos
, André Schaller, Tolga Arul
, Farinaz Koushanfar
, Stefan Katzenbeisser
, Ulrich Rührmair, Jakub Szefer
:
Abusing Commodity DRAMs in IoT Devices to Remotely Spy on Temperature. 2991-3005 - Debopriya Roy Dipta
, Berk Gülmezoglu
:
MAD-EN: Microarchitectural Attack Detection Through System-Wide Energy Consumption. 3006-3017 - Ziyue Zhang
, A. Adam Ding
, Yunsi Fei
:
A Guessing Entropy-Based Framework for Deep Learning-Assisted Side-Channel Analysis. 3018-3030 - Eli Dworetzky
, Jessica J. Fridrich:
Explaining the Bag Gain in Batch Steganography. 3031-3043 - Lin Wan
, Qianyan Jing
, Zongyuan Sun, Chuang Zhang
, Zhihang Li, Yehansen Chen
:
Self-Supervised Modality-Aware Multiple Granularity Pre-Training for RGB-Infrared Person Re-Identification. 3044-3057 - Xiao Lan
, Hongjian Jin, Hui Guo
, Xiao Wang:
Efficient and Secure Quantile Aggregation of Private Data Streams. 3058-3073 - Yushu Zhang
, Tao Wang
, Ruoyu Zhao
, Wenying Wen
, Youwen Zhu
:
RAPP: Reversible Privacy Preservation for Various Face Attributes. 3074-3087 - Ngoc Duy Pham
, Alsharif Abuadbba, Yansong Gao
, Khoa Tran Phan
, Naveen K. Chilamkurti
:
Binarizing Split Learning for Data Privacy Enhancement and Computation Reduction. 3088-3100 - Yen-Lung Lai
, Xingbo Dong
, Zhe Jin
, Massimo Tistarelli
, Wun-She Yap
, Bok-Min Goi
:
Breaking Free From Entropy's Shackles: Cosine Distance-Sensitive Error Correction for Reliable Biometric Cryptography. 3101-3115 - Qianlan Bai
, Yuedong Xu
, Nianyi Liu, Xin Wang:
Blockchain Mining With Multiple Selfish Miners. 3116-3131 - Yang Liu
, Debiao He
, Qi Feng, Min Luo
, Kim-Kwang Raymond Choo
:
PERCE: A Permissioned Redactable Credentials Scheme for a Period of Membership. 3132-3142 - Dan Tang
, Yudong Yan
, Chenjun Gao
, Wei Liang, Wenqiang Jin
:
LtRFT: Mitigate the Low-Rate Data Plane DDoS Attack With Learning-To-Rank Enabled Flow Tables. 3143-3157 - Biwen Chen, Tao Xiang
, Debiao He
, Hongwei Li
, Kim-Kwang Raymond Choo
:
BPVSE: Publicly Verifiable Searchable Encryption for Cloud-Assisted Electronic Health Records. 3171-3184 - Zhengyu Zhao
, Zhuoran Liu
, Martha A. Larson
:
Adversarial Image Color Transformations in Explicit Color Filter Space. 3185-3197 - Yuma Katsuki
, Giuseppe Thadeu Freitas de Abreu
, Koji Ishibashi
, Naoki Ishikawa
:
Noncoherent Massive MIMO With Embedded One-Way Function Physical Layer Security. 3158-3170 - Bai Shi
, Huaizong Shao
, Jingran Lin
, Shenglan Zhao, Shafei Wang:
Jamming the Relay-Assisted Multi-User Wireless Communication System: A Zero-Sum Game Approach. 3198-3211 - Chandrakanth Gudavalli
, Michael Goebel, Tejaswi Nanjundaswamy
, Lakshmanan Nataraj
, Shivkumar Chandrasekaran, B. S. Manjunath:
Resampling Estimation Based RPC Metadata Verification in Satellite Imagery. 3212-3221 - Haijian Wang
, Meng Yang
, Jialu Liu, Wei-Shi Zheng
:
Pseudo-Label Noise Prevention, Suppression and Softening for Unsupervised Person Re-Identification. 3222-3237 - Aidan Boyd
, Jeremy Speth, Lucas Parzianello
, Kevin W. Bowyer
, Adam Czajka
:
Comprehensive Study in Open-Set Iris Presentation Attack Detection. 3238-3250 - Tianyu Lu
, Liquan Chen
, Junqing Zhang
, Chen Chen
, Aiqun Hu
:
Joint Precoding and Phase Shift Design in Reconfigurable Intelligent Surfaces-Assisted Secret Key Generation. 3251-3266 - Jinlai Zhang
, Yinpeng Dong, Minchi Kuang, Binbin Liu
, Bo Ouyang, Jihong Zhu
, Houqing Wang, Yanmei Meng:
The Art of Defense: Letting Networks Fool the Attacker. 3267-3276 - Roberto Pietrantuono
, Massimo Ficco
, Francesco Palmieri
:
Survivability Analysis of IoT Systems Under Resource Exhausting Attacks. 3277-3288 - Zhuosheng Zhang
, Jiarui Li, Shucheng Yu
, Christian Makaya:
SAFELearning: Secure Aggregation in Federated Learning With Backdoor Detectability. 3289-3304 - Jiheon Woo
, Chanhee Yoo, Young-Sik Kim
, Yuval Cassuto
, Yongjune Kim
:
Generalized LRS Estimator for Min-Entropy Estimation. 3305-3317 - Roee Diamant
, Stefano Tomasin
, Francesco Ardizzon
, Davide Eccher, Paolo Casari
:
Secret Key Generation From Route Propagation Delays for Underwater Acoustic Networks. 3318-3333 - Yushu Zhang
, Xi Ye
, Xiangli Xiao
, Tao Xiang
, Hongwei Li
, Xiaochun Cao
:
A Reversible Framework for Efficient and Secure Visual Privacy Protection. 3334-3349 - Liwang Zhu
, Qi Bao
, Zhongzhi Zhang
:
Measures and Optimization for Robustness and Vulnerability in Disconnected Networks. 3350-3362 - Peiying Zhang
, Ning Chen
, Shibao Li
, Kim-Kwang Raymond Choo
, Chunxiao Jiang
, Sheng Wu
:
Multi-Domain Virtual Network Embedding Algorithm Based on Horizontal Federated Learning. 3363-3375 - Marco M. Cook
, Angelos K. Marnerides
, Dimitrios Pezaros
:
PLCPrint: Fingerprinting Memory Attacks in Programmable Logic Controllers. 3376-3387 - Yuhao Zhu
, Min Ren
, Hui Jing, Linlin Dai, Zhenan Sun
, Ping Li
:
Joint Holistic and Masked Face Recognition. 3388-3400 - Xiaofeng Jia
, Zhe Yu, Jun Shao
, Rongxing Lu
, Guiyi Wei
, Zhenguang Liu
:
Cross-Chain Virtual Payment Channels. 3401-3413 - Fengwei Wang
, Hui Zhu
, Guozhang He, Rongxing Lu
, Yandong Zheng, Hui Li
:
Efficient and Privacy-Preserving Arbitrary Polygon Range Query Scheme Over Dynamic and Time-Series Location Data. 3414-3429 - Yinbin Miao
, Wei Zheng
, Xinghua Li
, Hongwei Li
, Kim-Kwang Raymond Choo
, Robert H. Deng
:
Secure Model-Contrastive Federated Learning With Improved Compressive Sensing. 3430-3444 - Yiming Jiang, Jiangfan Zhang
:
Distributed Detection Over Blockchain-Aided Internet of Things in the Presence of Attacks. 3445-3460 - Yi-Peng Liu
, Wangyang Zuo
, Ronghua Liang
, Haohao Sun
, Zhanqing Li
:
Prototype-Guided Autoencoder for OCT-Based Fingerprint Presentation Attack Detection. 3461-3475 - Chenfei Hu
, Chuan Zhang
, Dian Lei
, Tong Wu
, Ximeng Liu
, Liehuang Zhu
:
Achieving Privacy-Preserving and Verifiable Support Vector Machine Training in the Cloud. 3476-3491 - Gabriel Emile Hine
, Ridvan Salih Kuzu
, Emanuele Maiorana
, Patrizio Campisi
:
Unlinkable Zero-Leakage Biometric Cryptosystem: Theoretical Evaluation and Experimental Validation. 3492-3505 - Hao Sun, Xiaofan Yang
, Lu-Xing Yang
, Kaifan Huang
, Gang Li
:
Impulsive Artificial Defense Against Advanced Persistent Threat. 3506-3516 - Fei Tang
, Guowei Ling
, Chaochao Cai, Jinyong Shan
, Xuanqi Liu
, Peng Tang
, Weidong Qiu:
Solving Small Exponential ECDLP in EC-Based Additively Homomorphic Encryption and Applications. 3517-3530 - Xiaochen Wang
, Xuefei Zhang
, Shengfeng Wang, Jinghua Xiao, Xiaofeng Tao
:
Modeling, Critical Threshold, and Lowest-Cost Patching Strategy of Malware Propagation in Heterogeneous IoT Networks. 3531-3545 - Chia-Yi Yeh
, Alejandro Cohen
, Rafael G. L. D'Oliveira
, Muriel Médard
, Daniel M. Mittleman
, Edward W. Knightly
:
Securing Angularly Dispersive Terahertz Links With Coding. 3546-3560 - Juanjuan Weng
, Zhiming Luo
, Shaozi Li
, Nicu Sebe
, Zhun Zhong
:
Logit Margin Matters: Improving Transferable Targeted Adversarial Attack by Logit Calibration. 3561-3574 - Giacomo Longo
, Enrico Russo
, Alessandro Armando, Alessio Merlo
:
Attacking (and Defending) the Maritime Radar System. 3575-3589 - Huifeng Zhu
, Haoqi Shan, Dean Sullivan, Xiaolong Guo
, Yier Jin
, Xuan Zhang
:
PDNPulse: Sensing PCB Anomaly With the Intrinsic Power Delivery Network. 3590-3605 - Yifu Sun
, Kang An
, Cheng Li, Zhi Lin
, Hehao Niu
, Derrick Wing Kwan Ng
, Jiangzhou Wang
, Naofal Al-Dhahir
:
Joint Transmissive and Reflective RIS-Aided Secure MIMO Systems Design Under Spatially-Correlated Angular Uncertainty and Coupled PSEs. 3606-3621 - Arunava Roy
, KokSheik Wong
, Raphaël C.-W. Phan
:
Attacking Mouse Dynamics Authentication Using Novel Wasserstein Conditional DCGAN. 3622-3631 - Jingzhi Li
, Hua Zhang
, Siyuan Liang, Pengwen Dai
, Xiaochun Cao
:
Privacy-Enhancing Face Obfuscation Guided by Semantic-Aware Attribution Maps. 3632-3646 - Yunjie Ge
, Lingchen Zhao
, Qian Wang
, Yiheng Duan, Minxin Du
:
AdvDDoS: Zero-Query Adversarial Attacks Against Commercial Speech Recognition Systems. 3647-3661 - Lipeng Wang
, Zhi Guan, Zhong Chen, Mingsheng Hu:
sChain: An Efficient and Secure Solution for Improving Blockchain Storage. 3662-3676 - Boxiang He
, Fanggang Wang
:
Specific Emitter Identification via Sparse Bayesian Learning Versus Model-Agnostic Meta-Learning. 3677-3691 - Lin Hu
, Shuai Tan, Hong Wen
, Jinsong Wu
, Jiabing Fan, Songlin Chen, Jie Tang
:
Interference Alignment for Physical Layer Security in Multi-User Networks With Passive Eavesdroppers. 3692-3705 - Lei Zhang, Wendie Han, Rui Zhang, Lulu Wang
, Xinyu Meng
:
Identity-Based Key Management Scheme for Secure Discussion Group Establishment in DOSNs. 3706-3719 - Wenyi Xue, Yang Yang
, Yingjiu Li
, HweeHwa Pang
, Robert H. Deng
:
ACB-Vote: Efficient, Flexible, and Privacy- Preserving Blockchain-Based Score Voting With Anonymously Convertible Ballots. 3720-3734 - Çagdas Gül, Orhun Kara
:
A New Construction Method for Keystream Generators. 3735-3744 - Dongyu Chen
, Hua Chen
, Limin Fan
, Kai Luo:
Error Analysis of NIST SP 800-22 Test Suite. 3745-3759 - Sheng Gao
, Jingjie Luo, Jianming Zhu
, Xuewen Dong
, Weisong Shi
:
VCD-FL: Verifiable, Collusion-Resistant, and Dynamic Federated Learning. 3760-3773 - Hong Zhong
, Li Wang, Jie Cui
, Jing Zhang, Irina Bolodurina
:
Secure Edge Computing-Assisted Video Reporting Service in 5G-Enabled Vehicular Networks. 3774-3786 - Jun Shen
, Xiaofeng Chen
, Zheli Liu
, Willy Susilo
:
Verifiable and Redactable Blockchains With Fully Editing Operations. 3787-3802 - Onur Günlü
, Rafael F. Schaefer
, Holger Boche
, H. Vincent Poor
:
Secure and Private Distributed Source Coding With Private Keys and Decoder Side Information. 3803-3816 - Kedi Yang
, Zhenyong Zhang
, Youliang Tian
, Jianfeng Ma
:
A Secure Authentication Framework to Guarantee the Traceability of Avatars in Metaverse. 3817-3832 - Shimao Yao
, Ralph Voltaire J. Dayot
, In-Ho Ra
, Liya Xu, Zhuolin Mei, Jiaoli Shi
:
An Identity-Based Proxy Re-Encryption Scheme With Single-Hop Conditional Delegation and Multi-Hop Ciphertext Evolution for Secure Cloud Data Sharing. 3833-3848 - Lichao Wu
, Léo Weissbart, Marina Krcek
, Huimin Li, Guilherme Perin, Lejla Batina
, Stjepan Picek
:
Label Correlation in Deep Learning-Based Side-Channel Analysis. 3849-3861 - Bo Jiang
, Mohamed Seif
, Ravi Tandon
, Ming Li
:
Answering Count Queries for Genomic Data With Perfect Privacy. 3862-3875 - Gabriel Bertocco
, Antonio Theophilo
, Fernanda A. Andaló
, Anderson de Rezende Rocha
:
Leveraging Ensembles and Self-Supervised Learning for Fully-Unsupervised Person Re-Identification and Text Authorship Attribution. 3876-3890 - Chenke Luo
, Jiang Ming
, Jianming Fu
, Guojun Peng
, Zhetao Li
:
Reverse Engineering of Obfuscated Lua Bytecode via Interpreter Semantics Testing. 3891-3905 - Haohua Duan
, Liyao Xiang
, Xinbing Wang
, Pengzhi Chu
, Chenghu Zhou:
A New Zero Knowledge Argument for General Circuits and Its Application. 3906-3920 - Yinbin Miao
, Yutao Yang
, Xinghua Li
, Zhiquan Liu
, Hongwei Li
, Kim-Kwang Raymond Choo
, Robert H. Deng
:
Efficient Privacy-Preserving Spatial Range Query Over Outsourced Encrypted Data. 3921-3933 - Lidong Han
, Guangwu Xu
, Qi Xie
:
Comments on "An Efficient Identity-Based Provable Data Possession Protocol with Compressed Cloud Storage". 3934-3935 - Qiongqiong Wang
, Koji Okabe, Kong Aik Lee
, Takafumi Koshinaka
:
Generalized Domain Adaptation Framework for Parametric Back-End in Speaker Recognition. 3936-3947 - Qiuyu Qian
, Qingqing Ye
, Haibo Hu
, Kai Huang, Tom Tak-Lam Chan, Jin Li
:
Collaborative Sampling for Partial Multi-Dimensional Value Collection Under Local Differential Privacy. 3948-3961 - Yibiao Lu
, Bingsheng Zhang
, Kui Ren
:
Low Communication Secure Computation From Semi-Trusted Hardware. 3962-3976 - Wenbo Fang
, Junjiang He, Wenshan Li, Xiaolong Lan
, Yang Chen, Tao Li
, Jiwu Huang
, Linlin Zhang:
Comprehensive Android Malware Detection Based on Federated Learning Architecture. 3977-3990 - Hongshuang Hu
, Yongdong Wu
, Jian Weng
, Kaimin Wei
, Zhiquan Liu
, Feiran Huang
, Yinyan Zhang
:
Attacks on Acceleration-Based Secure Device Pairing With Automatic Visual Tracking. 3991-4005 - Lei Wu
, Chengyi Qin, Zihui Xu
, Yunguo Guan
, Rongxing Lu
:
TCPP: Achieving Privacy-Preserving Trajectory Correlation With Differential Privacy. 4006-4020 - Hong Joo Lee
, Yong Man Ro
:
Robust Proxy: Improving Adversarial Robustness by Robust Proxy Learning. 4021-4033 - Yu-Guang Yang
, Bing-Xin Liu
, Guang-Bao Xu, Yi-Hua Zhou, Wei-Min Shi:
Practical Quantum Anonymous Private Information Retrieval Based on Quantum Key Distribution. 4034-4045 - Qilin Yin
, Wei Lu
, Bin Li
, Jiwu Huang
:
Dynamic Difference Learning With Spatio-Temporal Correlation for Deepfake Video Detection. 4046-4058 - Yangyang Liu
, Pinchang Zhang
, Jun Liu
, Yulong Shen
, Xiaohong Jiang
:
Exploiting Fine-Grained Channel/Hardware Features for PHY-Layer Authentication in MmWave MIMO Systems. 4059-4074 - Furen Zhuang
, Pierre Moulin:
Label-Consistent Generalizable Hash Codes. 4075-4085 - Dinuka Sahabandu
, J. Sukarno Mertoguno
, Radha Poovendran
:
A Natural Language Processing Approach for Instruction Set Architecture Identification. 4086-4099 - Alireza Mohammadi
, Hafiz Malik
, Masoud Abbaszadeh
:
Vehicle Lateral Motion Dynamics Under Braking/ABS Cyber-Physical Attacks. 4100-4115 - Zehao Tian, Zixiong Wang, Ahmed M. Abdelmoniem
, Gaoyang Liu
, Chen Wang
:
Knowledge Representation of Training Data With Adversarial Examples Supporting Decision Boundary. 4116-4127 - Yi-Hsien Chen
, Si-Chen Lin, Szu-Chun Huang, Chin-Laung Lei
, Chun-Ying Huang
:
Guided Malware Sample Analysis Based on Graph Neural Networks. 4128-4143 - Xiaoqin Feng
, Jianfeng Ma
, Huaxiong Wang
, Yinbin Miao
, Ximeng Liu
, Zhongyuan Jiang
:
An Accessional Signature Scheme With Unmalleable Transaction Implementation to Securely Redeem Cryptocurrencies. 4144-4156 - Daniele Ugo Leonzio
, Luca Cuccovillo
, Paolo Bestagini
, Marco Marcon
, Patrick Aichroth
, Stefano Tubaro
:
Audio Splicing Detection and Localization Based on Acquisition Device Traces. 4157-4172 - Guofeng Tang
, Bo Pang
, Long Chen
, Zhenfeng Zhang:
Efficient Lattice-Based Threshold Signatures With Functional Interchangeability. 4173-4187 - Bart Mennink
:
Secure Distributed Modular Exponentiation: Systematic Analysis and New Results. 4188-4197 - Weiyu Chen
, Haiyang Ding
, Shilian Wang
, Fengkui Gong
, Guojiang Xia:
On the Limits of Covert Backscatter Communication Over Undecodable Ambient Signals. 4198-4213 - Weibin Wu
, Jun Wang
, Yangpan Zhang, Zhe Liu
, Lu Zhou, Xiaodong Lin:
VPiP: Values Packing in Paillier for Communication Efficient Oblivious Linear Computations. 4214-4228 - Jisoo Choi
, Chau-Wai Wong
, Hui Su, Min Wu
:
Analysis of ENF Signal Extraction From Videos Acquired by Rolling Shutters. 4229-4242 - Haohao Sun
, Yilong Zhang
, Peng Chen
, Haixia Wang
, Yi-Peng Liu
, Ronghua Liang
:
A New Approach in Automated Fingerprint Presentation Attack Detection Using Optical Coherence Tomography. 4243-4257 - Pengchao Deng
, Chenyang Ge
, Xin Qiao
, Hao Wei
, Yuan Sun
:
Attention-Aware Dual-Stream Network for Multimodal Face Anti-Spoofing. 4258-4271 - Decheng Liu
, Zhan Dang, Chunlei Peng
, Yu Zheng, Shuang Li, Nannan Wang
, Xinbo Gao
:
FedForgery: Generalized Face Forgery Detection With Residual Federated Learning. 4272-4284 - Yandong Zheng, Hui Zhu
, Rongxing Lu
, Yunguo Guan
, Songnian Zhang, Fengwei Wang
, Jun Shao
, Hui Li
:
Efficient and Privacy-Preserving Aggregated Reverse kNN Query Over Crowd-Sensed Data. 4285-4299 - Yang Liu
, Bingsheng Zhang
, Yuxiang Ma, Zhuo Ma
, Zecheng Wu
:
iPrivJoin: An ID-Private Data Join Framework for Privacy-Preserving Machine Learning. 4300-4312 - Chenglin Yao
, Jianfeng Ren
, Ruibin Bai
, Heshan Du
, Jiang Liu
, Xudong Jiang
:
Mask Attack Detection Using Vascular-Weighted Motion-Robust rPPG Signals. 4313-4328 - Junqing Le, Di Zhang
, Xinyu Lei
, Long Jiao
, Kai Zeng
, Xiaofeng Liao
:
Privacy-Preserving Federated Learning With Malicious Clients and Honest-but-Curious Servers. 4329-4344 - Jianfei Sun
, Guowen Xu
, Tianwei Zhang
, Xuehuan Yang, Mamoun Alazab
, Robert H. Deng
:
Privacy-Aware and Security-Enhanced Efficient Matchmaking Encryption. 4345-4360 - Aqib Rashid
, Jose M. Such
:
MalProtect: Stateful Defense Against Adversarial Query Attacks in ML-Based Malware Detection. 4361-4376 - Xiongjun Guan
, Yongjie Duan
, Jianjiang Feng
, Jie Zhou
:
Regression of Dense Distortion Field From a Single Fingerprint Image. 4377-4390 - Junke Duan
, Licheng Wang
, Wei Wang
, Lize Gu:
TRCT: A Traceable Anonymous Transaction Protocol for Blockchain. 4391-4405 - Xiaoyan Hu
, Hao Chen, Miao Li, Guang Cheng
, Ruidong Li
, Hua Wu
, Yali Yuan
:
ReplaceDGA: BiLSTM-Based Adversarial DGA With High Anti-Detection Ability. 4406-4421 - Lin Chen
, Danyang Yue, Xiaofeng Ding
, Zuan Wang
, Kim-Kwang Raymond Choo
, Hai Jin
:
Differentially Private Deep Learning With Dynamic Privacy Budget Allocation and Adaptive Optimization. 4422-4435 - Quentin Giboulot
, Tomás Pevný, Andrew D. Ker
:
The Non-Zero-Sum Game of Steganography in Heterogeneous Environments. 4436-4448 - Zeping Zhang
, Xiaowen Wang
, Jie Huang, Shuaishuai Zhang
:
Analysis and Utilization of Hidden Information in Model Inversion Attacks. 4449-4462 - Jinlei Xu
, Zhengyu Zhu
, Zheng Chu
, Hehao Niu
, Pei Xiao
, Inkyu Lee
:
Sum Secrecy Rate Maximization for IRS-Aided Multi-Cluster MIMO-NOMA Terahertz Systems. 4463-4474 - Xueluan Gong
, Ziyao Wang, Shuaike Li
, Yanjiao Chen
, Qian Wang
:
A GAN-Based Defense Framework Against Model Inversion Attacks. 4475-4487 - Kang Wei
, Jun Li, Chuan Ma
, Ming Ding
, Wen Chen
, Jun Wu
, Meixia Tao
, H. Vincent Poor
:
Personalized Federated Learning With Differential Privacy and Convergence Guarantee. 4488-4503 - Yu-Chi Chen
, Kuan-Chun Huang:
JEDI: Joint and Effective Privacy Preserving Outsourced Set Intersection and Data Integration Protocols. 4504-4514 - Sha Ma
, Pan Zhou, Qiong Huang
, Jiajun Wang:
MTER: An Efficient Multi-User Threshold Equality Retrieval for Double Auction in Smart Grid Market. 4515-4529 - Antonio Coscia, Vincenzo Dentamaro
, Stefano Galantucci
, Antonio Maci, Giuseppe Pirlo:
YAMME: a YAra-byte-signatures Metamorphic Mutation Engine. 4530-4545 - Xin Yuan
, Shuyan Hu
, Wei Ni
, Xin Wang
, Abbas Jamalipour
:
Deep Reinforcement Learning-Driven Reconfigurable Intelligent Surface-Assisted Radio Surveillance With a Fixed-Wing UAV. 4546-4560 - Jiahui Chen
, Yi Zhao
, Qi Li
, Xuewei Feng, Ke Xu
:
FedDef: Defense Against Gradient Leakage in Federated Learning-Based Network Intrusion Detection Systems. 4561-4576 - Chao Wang
, Chengcai Wang
, Zan Li
, Derrick Wing Kwan Ng
, Kai-Kit Wong
, Naofal Al-Dhahir
, Dusit Niyato
:
STAR-RIS-Enabled Secure Dual-Functional Radar-Communications: Joint Waveform and Reflective Beamforming Optimization. 4577-4592 - Jinlong Xu
, Dong Wei
:
Polarization Fingerprint-Based LoRaWAN Physical Layer Authentication. 4593-4608 - Xin Chen
, Liang Feng Zhang
:
Publicly Verifiable Homomorphic Secret Sharing for Polynomial Evaluation. 4609-4624 - Jinyoung Lee
, Duc Trung Dinh, Hyeonsik Yeom, Si-Hyeon Lee
, Jeongseok Ha
:
Multiuser Cooperation for Covert Communication Under Quasi-Static Fading. 4625-4639 - Tian Li
, Huaqun Wang
, Debiao He
, Jia Yu
:
Designated-Verifier Aggregate Signature Scheme With Sensitive Data Privacy Protection for Permissioned Blockchain-Assisted IIoT. 4640-4651 - Na Wang
, Shancheng Zhang
, Zheng Zhang, Jiawen Qiao, Junsong Fu
, Jianwei Liu
, Bharat K. Bhargava
:
Lightweight and Secure Data Transmission Scheme Against Malicious Nodes in Heterogeneous Wireless Sensor Networks. 4652-4667 - Hao Fu
, Prashanth Krishnamurthy
, Siddharth Garg
, Farshad Khorrami
:
Differential Analysis of Triggers and Benign Features for Black-Box DNN Backdoor Detection. 4668-4680 - Xu Yuan
, Zheng Zhang
, Xunguang Wang
, Lin Wu:
Semantic-Aware Adversarial Training for Reliable Deep Hashing Retrieval. 4681-4694 - Hoang Duong Tuan
, Ali A. Nasir
, Yufeng Chen
, Eryk Dutkiewicz
, H. Vincent Poor
:
Quantized RIS-Aided Multi-User Secure Beamforming Against Multiple Eavesdroppers. 4695-4706 - Quan Zhou
, Yingtao Niu
, Peng Xiang, Yonggui Li
:
Intra-Domain Knowledge Reuse Assisted Reinforcement Learning for Fast Anti-Jamming Communication. 4707-4720 - Zhou Li
, Hua Sun:
On Extremal Rates of Secure Storage Over Graphs. 4721-4731 - Chenwei Huang
, Zhongliang Yang
, Zhiwen Hu
, Jinshuai Yang
, Haochen Qi, Jian Zhang, Lei Zheng:
DNA Synthetic Steganography Based on Conditional Probability Adaptive Coding. 4747-4759 - Jonghyun Kim
, Jong Hwan Park
:
NTRU++: Compact Construction of NTRU Using Simple Encoding Method. 4760-4774 - Ajian Liu
, Zichang Tan
, Zitong Yu
, Chenxu Zhao, Jun Wan
, Yanyan Liang
, Zhen Lei
, Du Zhang, Stan Z. Li
, Guodong Guo:
FM-ViT: Flexible Modal Vision Transformers for Face Anti-Spoofing. 4775-4786 - Xuanang Yang
, Jing Chen
, Kun He
, Hao Bai
, Cong Wu
, Ruiying Du:
Efficient Privacy-Preserving Inference Outsourcing for Convolutional Neural Networks. 4815-4829 - Jing Zhang
, Shuangshuang Su, Hong Zhong
, Jie Cui
, Debiao He
:
Identity-Based Broadcast Proxy Re-Encryption for Flexible Data Sharing in VANETs. 4830-4842 - Lefeng Zhang
, Tianqing Zhu
, Haibin Zhang, Ping Xiong
, Wanlei Zhou
:
FedRecovery: Differentially Private Machine Unlearning for Federated Learning Frameworks. 4732-4746 - Yang Wang
, Yan Huang
, Caifeng Shan
, Liang Wang
:
Progressive Sub-Domain Information Mining for Single-Source Generalizable Gait Recognition. 4787-4799 - Efrat Levy
, Asaf Shabtai
, Bogdan Groza
, Pal-Stefan Murvay, Yuval Elovici
:
CAN-LOC: Spoofing Detection and Physical Intrusion Localization on an In-Vehicle CAN Bus Based on Deep Features of Voltage Signals. 4800-4814 - Yucheng Liu
, Yonggang Huang
, Shoujin Wang
, Wenpeng Lu, Huiyan Wu:
Modality Coupling for Privacy Image Classification. 4843-4853 - Lihai Nie
, Xiaoyang Shan, Laiping Zhao
, Keqiu Li:
PKDGA: A Partial Knowledge-Based Domain Generation Algorithm for Botnets. 4854-4869 - Huili Wang
, Zhongliang Yang
, Jinshuai Yang
, Cheng Chen, Yongfeng Huang
:
Linguistic Steganalysis in Few-Shot Scenario. 4870-4882 - Niki Hrovatin
, Aleksandar Tosic
, Michael Mrissa
, Jernej Vicic
:
A General Purpose Data and Query Privacy Preserving Protocol for Wireless Sensor Networks. 4883-4898 - Lijia Xie
, Shuai Meng
, Wang Yao
, Xiao Zhang
:
Differential Pricing Strategies for Bandwidth Allocation With LFA Resilience: A Stackelberg Game Approach. 4899-4914 - Jiwon Seo
, Junseung You
, Donghyun Kwon
, Yeongpil Cho
, Yunheung Paek
:
ZOMETAG: Zone-Based Memory Tagging for Fast, Deterministic Detection of Spatial Memory Violations on ARM. 4915-4928 - Xueqiao Liu
, Guomin Yang
, Willy Susilo
, Kai He
, Robert H. Deng
, Jian Weng
:
Privacy-Preserving Multi-User Outsourced Computation for Boolean Circuits. 4929-4943 - Qi Zhu
, Guangnan Xin
, Lunke Fei
, Dong Liang
, Zheng Zhang
, Daoqiang Zhang
, David Zhang
:
Contactless Palmprint Image Recognition Across Smartphones With Self-Paced CycleGAN. 4944-4954 - Guang Yu
, Siqi Wang
, Zhiping Cai
, Xinwang Liu
, En Zhu
, Jianping Yin
:
Video Anomaly Detection via Visual Cloze Tests. 4955-4969 - Fucai Luo
, Haiyan Wang
, Changlu Lin
, Xingfu Yan
:
ABAEKS: Attribute-Based Authenticated Encryption With Keyword Search Over Outsourced Encrypted Data. 4970-4983 - Haotian Liang
, Youqi Li
, Chuan Zhang
, Ximeng Liu
, Liehuang Zhu
:
EGIA: An External Gradient Inversion Attack in Federated Learning. 4984-4995 - Gaoyang Liu
, Zehao Tian, Jian Chen
, Chen Wang
, Jiangchuan Liu
:
TEAR: Exploring Temporal Evolution of Adversarial Robustness for Membership Inference Attacks Against Federated Learning. 4996-5010 - Susu Cui
, Cong Dong
, Meng Shen
, Yuling Liu
, Bo Jiang
, Zhigang Lu:
CBSeq: A Channel-Level Behavior Sequence for Encrypted Malware Traffic Detection. 5011-5025 - Weixiang Li
, Bin Li
, Weiming Zhang
, Shengli Zhang
:
Quaternary Quantized Gaussian Modulation With Optimal Polarity Map Selection for JPEG Steganography. 5026-5040 - Baoling Shan
, Xin Yuan
, Wei Ni
, Xin Wang
, Ren Ping Liu
, Eryk Dutkiewicz
:
Preserving the Privacy of Latent Information for Graph-Structured Data. 5041-5055 - Cuiying Gao
, Minghui Cai
, Shuijun Yin
, Gaozhun Huang, Heng Li
, Wei Yuan
, Xiapu Luo
:
Obfuscation-Resilient Android Malware Analysis Based on Complementary Features. 5056-5068 - Haodong Jiang
, Jiang Han, Zhenfeng Zhang, Zhi Ma
, Hong Wang
:
Practical Algorithm Substitution Attacks on Real-World Public-Key Cryptosystems. 5069-5081 - Zhiwei Cui
, Baojiang Cui
, Junsong Fu
, Bharat K. Bhargava
:
An Attack to One-Tap Authentication Services in Cellular Networks. 5082-5095 - Raksha Ramakrishna
, Anna Scaglione
, Tong Wu
, Nikhil Ravi
, Sean Peisert
:
Differential Privacy for Class-Based Data: A Practical Gaussian Mechanism. 5096-5108 - Shigeng Zhang
, Shuxin Chen, Chengyao Hua, Zhetao Li
, Yanchun Li
, Xuan Liu
, Kai Chen
, Zhankai Li
, Weiping Wang
:
LSD: Adversarial Examples Detection Based on Label Sequences Discrepancy. 5133-5147 - Wenyu Li
, Pengyu Li
, Tianchu Guo, Binghui Chen
, Biao Wang
, Wangmeng Zuo
, Lei Zhang
:
VirFace∞: A Semi-Supervised Method for Enhancing Face Recognition via Unlabeled Shallow Data. 5148-5159 - Wenzheng Zeng
, Yang Xiao
, Guilei Hu, Zhiguo Cao
, Sicheng Wei, Zhiwen Fang
, Joey Tianyi Zhou, Junsong Yuan
:
Eyelid's Intrinsic Motion-Aware Feature Learning for Real-Time Eyeblink Detection in the Wild. 5109-5121 - Anne Hartebrodt
, Richard Röttger
:
Privacy of Federated QR Decomposition Using Additive Secure Multiparty Computation. 5122-5132 - Guowen Xu
, Shengmin Xu
, Jinhua Ma
, Jianting Ning
, Xinyi Huang
:
An Adaptively Secure and Efficient Data Sharing System for Dynamic User Groups in Cloud. 5171-5185 - Ningbin Yang
, Chunming Tang
, Quan Zhou
, Debiao He
:
Dynamic Consensus Committee-Based for Secure Data Sharing With Authorized Multi-Receiver Searchable Encryption. 5186-5199 - Mohamadsaleh Jafari
, Mohammad Ashiqur Rahman
, Sumit Paudyal
:
Optimal False Data Injection Attack Against Load-Frequency Control in Power Systems. 5200-5212 - Yuntao Wang
, Zhou Su
, Tom H. Luan
, Jiliang Li
, Qichao Xu
, Ruidong Li
:
SEAL: A Strategy-Proof and Privacy-Preserving UAV Computation Offloading Framework. 5213-5228 - Hangcheng Liu
, Tao Xiang
, Shangwei Guo
, Han Li
, Tianwei Zhang
, Xiaofeng Liao
:
Erase and Repair: An Efficient Box-Free Removal Attack on High-Capacity Deep Hiding. 5229-5242 - Peiyu Zhuang
, Haodong Li
, Rui Yang, Jiwu Huang
:
ReLoc: A Restoration-Assisted Framework for Robust Image Tampering Localization. 5243-5257 - Mansoor Ali
, Georges Kaddoum
, Wen-Tai Li
, Chau Yuen
, Muhammad Tariq
, H. Vincent Poor
:
A Smart Digital Twin Enabled Security Framework for Vehicle-to-Grid Cyber-Physical Systems. 5258-5271 - Xinlei Wang
, Xiaojuan Wang
, Mingshu He
, Min Zhang, Zhao Zhang
:
A Manifold Consistency Interpolation Method of Poisoning Attacks Against Semi-Supervised Model. 5272-5285 - Kai Zhang
, Xiwen Wang
, Jianting Ning
, Junqing Gong
, Xinyi Huang:
Secure Cloud-Assisted Data Pub/Sub Service With Fine-Grained Bilateral Access Control. 5286-5301 - Shigen Shen
, Lanlan Xie, Yanchun Zhang, Guowen Wu
, Hong Zhang, Shui Yu
:
Joint Differential Game and Double Deep Q-Networks for Suppressing Malware Spread in Industrial Internet of Things. 5302-5315 - Vamoua Yachongka
, Hideki Yagi
, Hideki Ochiai
:
Key Agreement Using Physical Identifiers for Degraded and Less Noisy Authentication Channels. 5316-5331 - Sungwook Kim
, Gwangwoon Lee, Hyeonbum Lee
, Jae Hong Seo
:
Leopard: Sublinear Verifier Inner Product Argument Under Discrete Logarithm Assumption. 5332-5344 - Xiaotong Zhou
, Debiao He
, Jianting Ning
, Min Luo
, Xinyi Huang
:
Efficient Construction of Verifiable Timed Signatures and Its Application in Scalable Payments. 5345-5358 - Gokularam Muthukrishnan
, Sheetal Kalyani
:
Grafting Laplace and Gaussian Distributions: A New Noise Mechanism for Differential Privacy. 5359-5374 - Litao Qiao, Bang Wu
, Shuijun Yin
, Heng Li
, Wei Yuan
, Xiapu Luo
:
Resisting DNN-Based Website Fingerprinting Attacks Enhanced by Adversarial Training. 5375-5386 - Zhongyun Lin
, Jun Zhou
, Zhenfu Cao
, Xiaolei Dong
, Kim-Kwang Raymond Choo
:
Generalized Autonomous Path Proxy Re-Encryption Scheme to Support Branch Functionality. 5387-5400 - Yu'e Jiang
, Liangmin Wang
, Hsiao-Hwa Chen
:
Covert Communications With Randomly Distributed Adversaries in Wireless Energy Harvesting Enabled D2D Underlaying Cellular Networks. 5401-5415 - Kunlei Jing
, Xinman Zhang, Chen Zhang
, Wanyu Lin, Hebo Ma
, Meng Pang
, Bihan Wen
:
Prototype Correction via Contrastive Augmentation for Few-Shot Unconstrained Palmprint Recognition. 5431-5446 - Yangyang Li
, Yuhua Xu
, Guoxin Li
, Yuping Gong, Xin Liu
, Hao Wang, Wen Li
:
Dynamic Spectrum Anti-Jamming Access With Fast Convergence: A Labeled Deep Reinforcement Learning Approach. 5447-5458 - Bowen Zhao
, Xiaoguo Li
, Ximeng Liu
, Qingqi Pei
, Yingjiu Li
, Robert H. Deng
:
CrowdFA: A Privacy-Preserving Mobile Crowdsensing Paradigm via Federated Analytics. 5416-5430 - Thibault Maho
, Teddy Furon
, Erwan Le Merrer:
Fingerprinting Classifiers With Benign Inputs. 5459-5472 - Giorgio Di Tizio
, Gilberto Atondo Siu, Alice Hutchings
, Fabio Massacci
:
A Graph-Based Stratified Sampling Methodology for the Analysis of (Underground) Forums. 5473-5483 - Yin Liu
, Borui Jiang, Hongqing Liu
, Yu Zhao, Fen Xiong, Yi Zhou
:
A Novel Earprint: Stimulus-Frequency Otoacoustic Emission for Biometric Recognition. 5484-5494 - Yutian Lin
, Xiaoyang Guo, Zheng Wang
, Bo Du:
Privacy-Protected Person Re-Identification via Virtual Samples. 5495-5505 - Shaorui Song
, Lei Xu
, Liehuang Zhu
:
Efficient Defenses Against Output Poisoning Attacks on Local Differential Privacy. 5506-5521 - Zhaoyu Chen
, Bo Li
, Shuang Wu
, Shouhong Ding, Wenqiang Zhang
:
Query-Efficient Decision-Based Black-Box Patch Attack. 5522-5536 - Wei Wang
, Dongli Liu
, Peng Xu
, Laurence Tianruo Yang
, Kaitai Liang
:
Keyword Search Shareable Encryption for Fast and Secure Data Replication. 5537-5552 - Zhiwei Wang
, Feng Liu, Siu-Ming Yiu
, Longwen Lan:
Online/Offline and History Indexing Identity-Based Fuzzy Message Detection. 5553-5566 - Nektaria Kaloudi
, Jingyue Li
:
AST-SafeSec: Adaptive Stress Testing for Safety and Security Co-Analysis of Cyber-Physical Systems. 5567-5579 - Shuyi Gu
, Zhenghua Luo, Yingjun Chu, Yanghui Xu, Ying Jiang, Junxiong Guo
:
Trace Alignment Preprocessing in Side-Channel Analysis Using the Adaptive Filter. 5580-5591 - Axin Wu
, Weiqi Luo
, Jian Weng
, Anjia Yang
, Jinghang Wen
:
Fuzzy Identity-Based Matchmaking Encryption and Its Application. 5592-5607 - Huafeng Kuang
, Hong Liu
, Yongjian Wu, Rongrong Ji
:
Semantically Consistent Visual Representation for Adversarial Robustness. 5608-5622 - Junyi Wu
, Yan Huang
, Min Gao
, Zhipeng Gao, Jianqiang Zhao, Jieming Shi
, Anguo Zhang
:
Exponential Information Bottleneck Theory Against Intra-Attribute Variations for Pedestrian Attribute Recognition. 5623-5635 - Haotian Ma
, Ke Xu
, Xinghao Jiang
, Zeyu Zhao
, Tanfeng Sun
:
Transferable Black-Box Attack Against Face Recognition With Spatial Mutable Adversarial Patch. 5636-5650 - Yu Tian
, Yalin Huang, Kunbo Zhang
, Yue Liu
, Zhenan Sun
:
Polarized Image Translation From Nonpolarized Cameras for Multimodal Face Anti-Spoofing. 5651-5664 - Varesh Mishra
, Debanjan Sadhya
:
Height and Punishment: Toward Accountable IoT Blockchain With Network Sanitization. 5665-5677 - Chenyang Wang
, Zhendong Li, Xian Mo, Xiaofen Tang, Hao Liu
:
Exploiting Unfairness With Meta-Set Learning for Chronological Age Estimation. 5678-5690 - Steven A. Grosz
, Anil K. Jain
:
Latent Fingerprint Recognition: Fusion of Local and Global Embeddings. 5691-5705 - Hangyu Zhu
, Cheng Wang
:
Enabling Fraud Prediction on Preliminary Data Through Information Density Booster. 5706-5720 - Zhisheng Yin
, Nan Cheng
, Tom H. Luan
, Yunchao Song
, Wei Wang
:
DT-Assisted Multi-Point Symbiotic Security in Space-Air-Ground Integrated Networks. 5721-5734 - Tao Zhang
, Changqiao Xu
, Jiahao Shen
, Xiaohui Kuang, Luigi Alfredo Grieco
:
How to Disturb Network Reconnaissance: A Moving Target Defense Approach Based on Deep Reinforcement Learning. 5735-5748 - Xiao Chen
, Haining Yu
, Xiaohua Jia
, Xiangzhan Yu:
APFed: Anti-Poisoning Attacks in Privacy-Preserving Heterogeneous Federated Learning. 5749-5761 - Shimeng Wu
, Hao Luo
, Shen Yin
, Kuan Li
, Yuchen Jiang
:
A Residual-Driven Secure Transmission and Detection Approach Against Stealthy Cyber-Physical Attacks for Accident Prevention. 5762-5771 - Tengfei Zheng
, Tongqing Zhou
, Kai Lu
, Zhiping Cai
:
Inspecting End-to-End Encrypted Communication Differentially for the Efficient Identification of Harmful Media. 5772-5787 - Yanbo Zhang, Zheng Yang
, Jingjing Cui
, Peng Xu
, Gaojie Chen
, Yi Wu
, Marco Di Renzo
:
STAR-RIS Assisted Secure Transmission for Downlink Multi-Carrier NOMA Networks. 5788-5803 - Mingwu Zhang
, Shijin Chen, Jian Shen
, Willy Susilo
:
PrivacyEAFL: Privacy-Enhanced Aggregation for Federated Learning in Mobile Crowdsensing. 5804-5816 - Xiaoyan Hu
, Wenjie Gao, Guang Cheng
, Ruidong Li
, Yuyang Zhou
, Hua Wu
:
Toward Early and Accurate Network Intrusion Detection Using Graph Embedding. 5817-5831 - Xiang Chen
, Hongyan Liu
, Qun Huang
, Dong Zhang
, Haifeng Zhou
, Chunming Wu
, Xuan Liu
, Muhammad Khurram Khan
:
Stalker Attacks: Imperceptibly Dropping Sketch Measurement Accuracy on Programmable Switches. 5832-5847 - Yimin Liu
, Peng Jiang
, Liehuang Zhu
:
Subject-Level Membership Inference Attack via Data Augmentation and Model Discrepancy. 5848-5859 - Hongfu Liu
, Bin Li
, Changlong Gao, Pei Xie, Chenglin Zhao
:
Privacy-Encoded Federated Learning Against Gradient-Based Data Reconstruction Attacks. 5860-5875 - Yuqian Ma
, Qingfeng Cheng
, Xiangyang Luo
:
2PCLA: Provable Secure and Privacy Preserving Enhanced Certificateless Authentication Scheme for Distributed Learning. 5876-5889 - Giulio Pagnotta
, Fabio De Gaspari
, Dorjan Hitaj
, Mauro Andreolini
, Michele Colajanni
, Luigi V. Mancini
:
DOLOS: A Novel Architecture for Moving Target Defense. 5890-5905 - Harshit Kumar
, Biswadeep Chakraborty
, Sudarshan Sharma, Saibal Mukhopadhyay
:
XMD: An Expansive Hardware-Telemetry-Based Mobile Malware Detector for Endpoint Detection. 5906-5919 - Jingya Dong
, Chunhe Song
, Yong Sun
, Tao Zhang
:
DAON: A Decentralized Autonomous Oracle Network to Provide Secure Data for Smart Contracts. 5920-5935 - Qian Li
, Qingyuan Hu, Chenhao Lin
, Di Wu
, Chao Shen
:
Revisiting Gradient Regularization: Inject Robust Saliency-Aware Weight Bias for Adversarial Defense. 5936-5949 - Xiaoheng Deng
, Haowen Tang, Xinjun Pei
, Deng Li
, Kaiping Xue
:
MDHE: A Malware Detection System Based on Trust Hybrid User-Edge Evaluation in IoT Network. 5950-5963 - Zixuan Wang
, Jiliang Li
, Yuntao Wang, Zhou Su
, Shui Yu
, Weizhi Meng
:
Optimal Repair Strategy Against Advanced Persistent Threats Under Time-Varying Networks. 5964-5979

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.