


default search action
IEEE Transactions on Information Forensics and Security, Volume 19
Volume 19, 2024
- Xu Song, Saihui Hou

, Yan Huang
, Chunshui Cao
, Xu Liu
, Yongzhen Huang
, Caifeng Shan
:
Gait Attribute Recognition: A New Benchmark for Learning Richer Attributes From Human Gait Patterns. 1-14 - Dongxia Huang

, Weiqi Luo
, Minglin Liu
, Weixuan Tang
, Jiwu Huang
:
Steganography Embedding Cost Learning With Generative Multi-Adversarial Network. 15-29 - Qiang Zhou

, Liangmin Wang
, Huijuan Zhu
, Tong Lu, Victor S. Sheng
:
WF-Transformer: Learning Temporal Features for Accurate Anonymous Traffic Identification by Using Transformer Networks. 30-43 - Ju Jia

, Siqi Ma
, Yang Liu
, Lina Wang
, Robert H. Deng
:
A Causality-Aligned Structure Rationalization Scheme Against Adversarial Biased Perturbations for Graph Neural Networks. 59-73 - Guoxin Sun

, Tansu Alpcan
, Benjamin I. P. Rubinstein
, Seyit Camtepe
:
To Act or Not to Act: An Adversarial Game for Securing Vehicle Platoons. 163-177 - Jiangyi Deng

, Xiaoyu Ji
, Beibei Wang
, Bin Wang, Wenyuan Xu:
Dr. Defender: Proactive Detection of Autopilot Drones Based on CSI. 194-206 - Xinyu Tang

, Cheng Guo
, Kim-Kwang Raymond Choo
, Yi-Ning Liu
:
An Efficient and Dynamic Privacy-Preserving Federated Learning System for Edge Computing. 207-220 - Yi Ding

, Zi Wang, Zhen Qin
, Erqiang Zhou, Guobin Zhu, Zhiguang Qin
, Kim-Kwang Raymond Choo
:
Backdoor Attack on Deep Learning-Based Medical Image Encryption and Decryption Network. 280-292 - Dandan Xu

, Kai Chen
, Miaoqian Lin, Chaoyang Lin, Xiaofeng Wang:
AutoPwn: Artifact-Assisted Heap Exploit Generation for CTF PWN Competitions. 293-306 - Xiangye Wei

, Liming Xiu
, Yimao Cai
:
A Perspective of Using Frequency-Mixing as Entropy in Random Number Generation for Portable Hardware Cybersecurity IP. 320-333 - Xiao Sui

, Sisi Duan
, Haibin Zhang:
BG: A Modular Treatment of BFT Consensus Toward a Unified Theory of BFT Replication. 44-58 - Rui Xue, Kaiping Xue

, Bin Zhu
, Xinyi Luo, Tianwei Zhang
, Qibin Sun, Jun Lu:
Differentially Private Federated Learning With an Adaptive Noise Mechanism. 74-87 - Qian Ren

, Yue Li
, Yingjun Wu
, Yuchen Wu
, Hong Lei
, Lei Wang
, Bangdao Chen
:
DeCloak: Enable Secure and Cheap Multi-Party Transactions on Legacy Blockchains by a Minimally Trusted TEE Network. 88-103 - Yinshan Li, Hua Ma, Zhi Zhang

, Yansong Gao
, Alsharif Abuadbba, Minhui Xue
, Anmin Fu
, Yifeng Zheng
, Said F. Al-Sarawi
, Derek Abbott
:
NTD: Non-Transferability Enabled Deep Learning Backdoor Detection. 104-119 - Shuting He

, Weihua Chen
, Kai Wang
, Hao Luo
, Fan Wang
, Wei Jiang
, Henghui Ding
:
Region Generation and Assessment Network for Occluded Person Re-Identification. 120-132 - Qingjun Yuan

, Gaopeng Gou, Yanbei Zhu, Yuefei Zhu
, Gang Xiong, Yongjuan Wang
:
MCRe: A Unified Framework for Handling Malicious Traffic With Noise Labels Based on Multidimensional Constraint Representation. 133-147 - Haiwei Wu

, Jiantao Zhou
, Xinyu Zhang
, Jinyu Tian
, Weiwei Sun
:
Robust Camera Model Identification Over Online Social Network Shared Images via Multi-Scenario Learning. 148-162 - Haoheng Yuan, Yanghe Feng

, Chuanchuan Yang
, Zhuojun Zhuang, Bin Dai
:
Two-User Gaussian Broadcast Wiretap Channel With Common Message and Feedback: Revisit. 178-193 - Chen Zhang

, Yulong Ming
, Mingyue Wang
, Yu Guo
, Xiaohua Jia
:
Encrypted and Compressed Key-Value Store With Pattern-Analysis Security in Cloud Systems. 221-234 - Weize Quan

, Pengfei Deng
, Kai Wang
, Dong-Ming Yan
:
CGFormer: ViT-Based Network for Identifying Computer-Generated Images With Token Labeling. 235-250 - Ningbin Yang

, Chunming Tang
, Debiao He
:
A Lightweight Certificateless Multi-User Matchmaking Encryption for Mobile Devices: Enhancing Security and Performance. 251-264 - Weisong Zhao

, Xiangyu Zhu
, Kaiwen Guo, Haichao Shi
, Xiaoyu Zhang
, Zhen Lei
:
Masked Face Transformer. 265-279 - Wenli Sun

, Xinyang Jiang, Shuguang Dou
, Dongsheng Li
, Duoqian Miao
, Cheng Deng
, Cairong Zhao
:
Invisible Backdoor Attack With Dynamic Triggers Against Person Re-Identification. 307-319 - Meng Li

, Zheng Pei
, Yong Chen
, Zhenhai Miao:
Fuzzy Linguistic Knowledge Reasoning-Based Secure Control for Connected Nonlinear Servosystem. 334-343 - Yuankun Xie

, Haonan Cheng
, Yutian Wang
, Long Ye
:
Domain Generalization via Aggregation and Separation for Audio Deepfake Detection. 344-358 - Saeed Abdolinezhad

, Lukas Zimmermann, Axel Sikora
:
Output Positioning to Derive Maximum Entropy From Physical Unclonable Functions. 359-371 - Min Xu

, Ximiao Zhang
, Xiuzhuang Zhou
:
Confidence-Calibrated Face and Kinship Verification. 372-384 - Andrea Montibeller

, Fernando Pérez-González
:
An Adaptive Method for Camera Attribution Under Complex Radial Distortion Corrections. 385-400 - Zhiqing Guo

, Zhenhong Jia
, Liejun Wang
, Dewang Wang
, Gaobo Yang
, Nikola K. Kasabov
:
Constructing New Backbone Networks via Space-Frequency Interactive Convolution for Deepfake Detection. 401-413 - Youwen Zhu

, Yiran Cao, Qiao Xue
, Qihui Wu, Yushu Zhang
:
Heavy Hitter Identification Over Large-Domain Set-Valued Data With Local Differential Privacy. 414-426 - Gaoyang Liu

, Tianlong Xu
, Rui Zhang
, Zixiong Wang, Chen Wang
, Ling Liu
:
Gradient-Leaks: Enabling Black-Box Membership Inference Attacks Against Machine Learning Models. 427-440 - Zhenyu Zhou

, Ajay Kumar
:
Finger-Knuckle Assisted Slap Fingerprint Identification System for Higher Security and Convenience. 441-454 - Huming Qiu

, Hua Ma, Zhi Zhang
, Alsharif Abuadbba, Wei Kang
, Anmin Fu
, Yansong Gao
:
Toward a Critical Evaluation of Robustness for Deep Learning Backdoor Countermeasures. 455-468 - Yaqing Song, Chunxiang Xu

, Yuan Zhang
, Shiyu Li
:
Hardening Password-Based Credential Databases. 469-484 - Junjiang He

, Cong Tang
, Wenshan Li, Tao Li, Li Chen, Xiaolong Lan
:
BR-HIDF: An Anti-Sparsity and Effective Host Intrusion Detection Framework Based on Multi-Granularity Feature Extraction. 485-499 - Chao Liu, Xue Fu

, Yu Wang, Lantu Guo, Yuchao Liu, Yun Lin, Haitao Zhao, Guan Gui:
Overcoming Data Limitations: A Few-Shot Specific Emitter Identification Method Using Self-Supervised Learning and Adversarial Augmentation. 500-513 - Suvadeep Hajra

, Manaar Alam
, Sayandeep Saha
, Stjepan Picek
, Debdeep Mukhopadhyay
:
On the Instability of Softmax Attention-Based Deep Learning Models in Side-Channel Analysis. 514-528 - Dinu Coltuc

, Henri George Coanda:
Reversible Contrast Enhancement by Histogram Specification and Very Low Distortion Data Hiding. 529-539 - Yunfei Ge

, Quanyan Zhu
:
GAZETA: GAme-Theoretic ZEro-Trust Authentication for Defense Against Lateral Movement in 5G IoT Networks. 540-554 - Baihao Peng

, Junfeng Liu
, Jun Zeng
:
Dynamic Analysis of Multiplex Networks With Hybrid Maintenance Strategies. 555-570 - Sheema Madhusudhanan

, Arun Cyril Jose
, Jayakrushna Sahoo
, Reza Malekian
:
PRIMϵ: Novel Privacy-Preservation Model With Pattern Mining and Genetic Algorithm. 571-585 - Milos Grujic

, Ingrid Verbauwhede
:
Optimizing Linear Correctors: A Tight Output Min-Entropy Bound and Selection Technique. 586-600 - Hanbiao Du

, Zheng Che
, Meng Shen
, Liehuang Zhu
, Jiankun Hu
:
Breaking the Anonymity of Ethereum Mixing Services Using Graph Feature Learning. 616-631 - Ali Asghar Beigizad, Hadi Soleimany

, Sara Zarei
, Hamed Ramzanipour:
Linked Fault Analysis. 632-645 - William Briguglio

, Waleed A. Yousef
, Issa Traoré
, Mohammad Mamun
:
Federated Supervised Principal Component Analysis. 646-660 - Zhouyan Deng

, Jiajia Liu
, Yijie Xun
, Junman Qin
:
IdentifierIDS: A Practical Voltage-Based Intrusion Detection System for Real In-Vehicle Networks. 661-676 - Qi Xia

, Isaac Amankona Obiri
, Jianbin Gao
, Hu Xia
, Xiaosong Zhang
, Kwame Omono Asamoah
, Sandro Amofa
:
PRIDN: A Privacy Preserving Data Sharing on Named Data Networking. 677-692 - Zekai Chen

, Shengxing Yu, Mingyuan Fan
, Ximeng Liu
, Robert H. Deng
:
Privacy-Enhancing and Robust Backdoor Defense for Federated Learning on Heterogeneous Data. 693-707 - Yu Guo

, Yu Zhao
, Saihui Hou
, Cong Wang
, Xiaohua Jia
:
Verifying in the Dark: Verifiable Machine Unlearning by Using Invisible Backdoor Triggers. 708-721 - Ruidong Han

, Huihui Gong, Siqi Ma
, Juanru Li, Chang Xu
, Elisa Bertino
, Surya Nepal
, Zhuo Ma
, Jianfeng Ma
:
A Credential Usage Study: Flow-Aware Leakage Detection in Open-Source Projects. 722-734 - Decheng Liu

, Xinbo Gao
, Chunlei Peng
, Nannan Wang
, Jie Li
:
Universal Heterogeneous Face Analysis via Multi-Domain Feature Disentanglement. 735-747 - Ying He

, Zhili Shen
, Jingyu Hua
, Qixuan Dong
, Jiacheng Niu, Wei Tong
, Xu Huang
, Chen Li
, Sheng Zhong
:
Backdoor Attack Against Split Neural Network-Based Vertical Federated Learning. 748-763 - Menghao Zhang

, Guanyu Li
, Cheng Guo, Han Bao, Mingwei Xu
, Hongxin Hu
, Fenghua Li:
IMap: Toward a Fast, Scalable and Reconfigurable In-Network Scanner With Programmable Switches. 601-615 - Xiaohan Yuan

, Jiqiang Liu
, Bin Wang, Wei Wang
, Bin Wang, Tao Li
, Xiaobo Ma, Witold Pedrycz:
FedComm: A Privacy-Enhanced and Efficient Authentication Protocol for Federated Learning in Vehicular Ad-Hoc Networks. 777-792 - Hui Liu

, Wenya Wang
, Hao Sun, Anderson Rocha, Haoliang Li
:
Robust Domain Misinformation Detection via Multi-Modal Feature Alignment. 793-806 - Elahe Vedadi

, Yasaman Keshtkarjahromi
, Hulya Seferoglu
:
Efficient Coded Multi-Party Computation at Edge Networks. 807-820 - Yuqing Zhang

, Zhaofeng Ma
, Shoushan Luo, Pengfei Duan
:
Dynamic Trust-Based Redactable Blockchain Supporting Update and Traceability. 821-834 - Qiuhua Wang

, Chengyu Li, Tianyu Xia
, Yizhi Ren
, Dong Wang, Guoyan Zhang
, Kim-Kwang Raymond Choo
:
Optimal Selfish Mining-Based Denial-of-Service Attack. 835-850 - Xingming Long

, Jie Zhang
, Shuzhe Wu, Xin Jin
, Shiguang Shan
:
Dual Sampling Based Causal Intervention for Face Anti-Spoofing With Identity Debiasing. 851-862 - Huikai Shao

, Chengcheng Liu
, Xiaojiang Li
, Dexing Zhong
:
Privacy Preserving Palmprint Recognition via Federated Metric Learning. 878-891 - Yunchao Yang

, Miao Hu
, Yipeng Zhou
, Xuezheng Liu
, Di Wu
:
CSRA: Robust Incentive Mechanism Design for Differentially Private Federated Learning. 892-906 - Yiming Xue

, Jiaxuan Wu
, Ronghua Ji, Ping Zhong
, Juan Wen
, Wanli Peng
:
Adaptive Domain-Invariant Feature Extraction for Cross-Domain Linguistic Steganalysis. 920-933 - Jingwei Xin

, Zikai Wei, Nannan Wang
, Jie Li
, Xinbo Gao
:
Large Pose Face Recognition via Facial Representation Learning. 934-946 - Rossano Gaeta

:
An Accurate and Efficient Algorithm to Identify Malicious Nodes of a Graph. 947-958 - Shuyi Li

, Ruijun Ma
, Jianhang Zhou
, Bob Zhang
, Lifang Wu
:
Joint Discriminative Analysis With Low-Rank Projection for Finger Vein Feature Extraction. 959-969 - Wei Guo

, Benedetta Tondi
, Mauro Barni
:
Universal Detection of Backdoor Attacks via Density-Based Clustering and Centroids Analysis. 970-984 - Haodi Wang

, Yu Guo
, Rongfang Bie
, Xiaohua Jia
:
Verifiable Arbitrary Queries With Zero Knowledge Confidentiality in Decentralized Storage. 1071-1085 - Anwei Luo

, Chenqi Kong
, Jiwu Huang
, Yongjian Hu
, Xiangui Kang
, Alex C. Kot
:
Beyond the Prior Forgery Knowledge: Mining Critical Clues for General Face Forgery Detection. 1168-1182 - Xiao Mei Zeng

, Qing Liu
, Chee Lip Gan
:
A Comprehensive Data Retrieval and Correction Approach From 40-nm Flash Memory With Selective Chemical Engraving. 1031-1040 - Xinyu Qi

, Aiqun Hu
, Tianshu Chen
:
Lightweight Radio Frequency Fingerprint Identification Scheme for V2X Based on Temporal Correlation. 1056-1070 - Chen Chen

, Junqing Zhang
, Tianyu Lu
, Magnus Sandell
, Liquan Chen
:
Secret Key Generation for IRS-Assisted Multi-Antenna Systems: A Machine Learning-Based Approach. 1086-1098 - Weiqi Wang

, Chenhan Zhang
, Zhiyi Tian
, Shui Yu
:
Machine Unlearning via Representation Forgetting With Parameter Self-Sharing. 1099-1111 - Yuewang He

, Xiangui Kang
, Qiben Yan
, Enping Li
:
ResNeXt+: Attention Mechanisms Based on ResNeXt for Malware Detection and Classification. 1142-1155 - Guo-Wei Wong

, Yi-Ting Huang
, Ying-Ren Guo
, Yeali S. Sun, Meng Chang Chen
:
Attention-Based API Locating for Malware Techniques. 1199-1212 - Mingyue Wang

, Zizhuo Chen
, Yinbin Miao
, Hejiao Huang
, Cong Wang
, Xiaohua Jia
:
Cross-User Leakage Mitigation for Authorized Multi-User Encrypted Data Sharing. 1213-1226 - Shao-Chuan Zhao

, Tianyang Xu
, Xiaojun Wu
, Josef Kittler
:
Pluggable Attack for Visual Object Tracking. 1227-1240 - Mengqi Zhan

, Yang Li
, Bo Li, Jinchao Zhang, Chuanrong Li, Weiping Wang
:
Toward Automated Field Semantics Inference for Binary Protocol Reverse Engineering. 764-776 - Roberto Casula, Giulia Orrù

, Stefano Marrone
, Umberto Gagliardini
, Gian Luca Marcialis
, Carlo Sansone
:
Realistic Fingerprint Presentation Attacks Based on an Adversarial Approach. 863-877 - Yuni Lai

, Yulin Zhu
, Wenqi Fan, Xiaoge Zhang
, Kai Zhou
:
Toward Adversarially Robust Recommendation From Adaptive Fraudster Detection. 907-919 - Peng Xu

, Jun Yang
, Gaojie Chen
, Zheng Yang
, Yong Li
, Moe Z. Win
:
Physical-Layer Secret and Private Key Generation in Wireless Relay Networks With Correlated Eavesdropping Channels. 985-1000 - Wenze Mao, Peng Jiang

, Liehuang Zhu
:
Locally Verifiable Batch Authentication in IoMT. 1001-1014 - Taiyu Wang, Qinglin Yang

, Kaiming Zhu
, Junbo Wang
, Chunhua Su
, Kento Sato
:
LDS-FL: Loss Differential Strategy Based Federated Learning for Privacy Preserving. 1015-1030 - Aakarsh Malhotra

, Mayank Vatsa
, Richa Singh
, Keith B. Morris
, Afzel Noore
:
Multi-Surface Multi-Technique (MUST) Latent Fingerprint Database. 1041-1055 - Weiwei Feng

, Nanqing Xu
, Tianzhu Zhang
, Baoyuan Wu, Yongdong Zhang
:
Robust and Generalized Physical Adversarial Attacks via Meta-GAN. 1112-1125 - Durba Chatterjee

, Kuheli Pratihar
, Aritra Hazra
, Ulrich Rührmair, Debdeep Mukhopadhyay
:
Systematically Quantifying Cryptanalytic Nonlinearities in Strong PUFs. 1126-1141 - Hongwei Ding

, Yu Sun
, Nana Huang, Zhidong Shen
, Xiaohui Cui
:
TMG-GAN: Generative Adversarial Networks-Based Imbalanced Learning for Network Intrusion Detection. 1156-1167 - Dazhi Zhan

, Yexin Duan, Yue Hu, Weili Li
, Shize Guo, Zhisong Pan
:
MalPatch: Evading DNN-Based Malware Detection With Adversarial Patches. 1183-1198 - Yuanchao Chen

, Yuwei Li
, Zulie Pan
, Yuliang Lu
, Juxing Chen
, Shouling Ji
:
URadar: Discovering Unrestricted File Upload Vulnerabilities via Adaptive Dynamic Testing. 1251-1266 - Changsheng Chen

, Bokang Li, Rizhao Cai
, Jishen Zeng, Jiwu Huang
:
Distortion Model-Based Spectral Augmentation for Generalized Recaptured Document Detection. 1283-1298 - Bei Gong, Chong Guo, Chong Guo, Chen Guo, Yao Sun, Muhammad Waqas, Sheng Chen:

SLIM: A Secure and Lightweight Multi-Authority Attribute-Based Signcryption Scheme for IoT. 1299-1312 - Yunhao Du

, Cheng Lei
, Zhicheng Zhao
, Yuan Dong
, Fei Su
:
Video-Based Visible-Infrared Person Re-Identification With Auxiliary Samples. 1313-1325 - Elias N. Zois

, Dimitrios Tsourounis
, Dimitrios Kalivas
:
Similarity Distance Learning on SPD Manifold for Writer Independent Offline Signature Verification. 1342-1356 - Zirui Gong

, Liyue Shen, Yanjun Zhang
, Leo Yu Zhang
, Jingwei Wang
, Guangdong Bai
, Yong Xiang
:
AgrAmplifier: Defending Federated Learning Against Poisoning Attacks Through Local Update Amplification. 1241-1250 - Kuofeng Gao

, Jiawang Bai
, Baoyuan Wu
, Mengxi Ya, Shu-Tao Xia
:
Imperceptible and Robust Backdoor Attack in 3D Point Cloud. 1267-1282 - Zhi Li, Hao Wang

, Songnian Zhang
, Wenying Zhang
, Rongxing Lu
:
SecKNN: FSS-Based Secure Multi-Party KNN Classification Under General Distance Functions. 1326-1341 - Jiajun Gong

, Wuqi Zhang
, Charles Zhang
, Tao Wang
:
WFDefProxy: Real World Implementation and Evaluation of Website Fingerprinting Defenses. 1357-1371 - Qige Song

, Yafei Sang, Yongzheng Zhang, Shuhao Li
, Xiaolin Xu:
SepBIN: Binary Feature Separation for Better Semantic Comparison and Authorship Verification. 1372-1387 - Leixiao Cheng

, Fei Meng
:
Server-Aided Public Key Authenticated Searchable Encryption With Constant Ciphertext and Constant Trapdoor. 1388-1400 - Yong Dong

, Yinfei Xu
, Tong Zhang
, Yili Xia
:
Optimality of the Proper Gaussian Signal in Complex MIMO Wiretap Channels. 1401-1414 - Yinfei Xu

, Jian Lu
, Xuan Guang
, Wei Xu
:
Information Embedding With Stegotext Reconstruction. 1415-1428 - Amir Mahdi Sadeghzadeh

, Amir Mohammad Sobhanian, Faezeh Dehghan, Rasool Jalili
:
HODA: Hardness-Oriented Detection of Model Extraction Attacks. 1429-1439 - Xiaoguo Li

, Zixi Huang
, Bowen Zhao
, Guomin Yang
, Tao Xiang
, Robert H. Deng
:
STDA: Secure Time Series Data Analytics With Practical Efficiency in Wide-Area Network. 1440-1454 - Tingting Lu

, Junfeng Wang
:
DOMR: Toward Deep Open-World Malware Recognition. 1455-1468 - Jinyoung Lee

, Hyeonsik Yeom
, Si-Hyeon Lee
, Jeongseok Ha
:
Channel Correlation in Multi-User Covert Communication: Friend or Foe? 1469-1482 - Niusen Chen

, Bo Chen
:
HiPDS: A Storage Hardware-Independent Plausibly Deniable Storage System. 1483-1495 - Hengmin Zhang

, Jian Yang, Jianjun Qian
, Guangwei Gao
, Xiangyuan Lan, Zhiyuan Zha
, Bihan Wen
:
Efficient Image Classification via Structured Low-Rank Matrix Factorization Regression. 1496-1509 - Yang Liu

, Guangbo Liang
, Xi Wang
, Peican Zhu
, Zhen Wang
:
Diffusion Containment in Complex Networks Through Collective Influence of Connections. 1510-1524 - Ni Yang

, Ruiyi Gao
, Youzhi Feng
, Huan Su
:
Event-Triggered Impulsive Control for Complex Networks Under Stochastic Deception Attacks. 1525-1534 - Hao Fang

, Ajian Liu
, Jun Wan
, Sergio Escalera
, Chenxu Zhao, Xu Zhang, Stan Z. Li
, Zhen Lei
:
Surveillance Face Anti-Spoofing. 1535-1546 - Jiefu Chen

, Tong Chen, Xing Xu
, Jingran Zhang
, Yang Yang
, Heng Tao Shen
:
Coreset Learning-Based Sparse Black-Box Adversarial Attack for Video Recognition. 1547-1560 - Ashkan Esmaeili

, Marzieh Edraki
, Nazanin Rahnavard, Ajmal Mian
, Mubarak Shah
:
Low-Rank and Sparse Decomposition for Low-Query Decision-Based Adversarial Attacks. 1561-1575 - Xiaohan Hao

, Chao Lin
, Wenhan Dong
, Xinyi Huang
, Hui Xiong
:
Robust and Secure Federated Learning Against Hybrid Attacks: A Generic Architecture. 1576-1588 - Peng Jiang

, Qi Liu, Liehuang Zhu
:
SanIdea: Exploiting Secure Blockchain-Based Access Control via Sanitizable Encryption. 1589-1600 - Houssem Jmal

, Firas Ben Hmida
, Nardine Basta
, Muhammad Ikram
, Mohamad Ali Kâafar
, Andy Walker:
SPGNN-API: A Transferable Graph Neural Network for Attack Paths Identification and Autonomous Mitigation. 1601-1613 - Xinjun Pei

, Xiaoheng Deng
, Shengwei Tian
, Jianqing Liu
, Kaiping Xue
:
Privacy-Enhanced Graph Neural Network for Decentralized Local Graphs. 1614-1629 - Adam Gronowski

, William Paul
, Fady Alajaji
, Bahman Gharesifard
, Philippe Burlina:
Classification Utility, Fairness, and Compactness via Tunable Information Bottleneck and Rényi Measures. 1630-1645 - Weihang Tan

, Sin-Wei Chiu
, Antian Wang
, Yingjie Lao
, Keshab K. Parhi
:
PaReNTT: Low-Latency Parallel Residue Number System and NTT-Based Long Polynomial Modular Multiplication for Homomorphic Encryption. 1646-1659 - Kai Feng

, Marco M. Cook
, Angelos K. Marnerides
:
Sizzler: Sequential Fuzzing in Ladder Diagrams for Vulnerability Detection and Discovery in Programmable Logic Controllers. 1660-1671 - Hodong Kim

, Changhee Hahn
, Hyunwoo J. Kim
, Youngjoo Shin
, Junbeom Hur
:
Deep Learning-Based Detection for Multiple Cache Side-Channel Attacks. 1672-1686 - Junyu Quan, Qin Li

, Lvzhou Li
:
Verifiable Blind Quantum Computation With Identity Authentication for Multi-Type Clients. 1687-1698 - Huafeng Qin

, Chao Fan, Shaojiang Deng
, Yantao Li
, Mounim A. El-Yacoubi
, Gang Zhou
:
AG-NAS: An Attention GRU-Based Neural Architecture Search for Finger-Vein Recognition. 1699-1713 - Dingzhao Li, Jie Qi

, Shaohua Hong
, Pengfei Deng
, Haixin Sun
:
A Class-Incremental Approach With Self-Training and Prototype Augmentation for Specific Emitter Identification. 1714-1727 - Mohammadhadi Shateri

, Francisco Messina
, Fabrice Labeau
, Pablo Piantanida
:
Preserving Privacy in GANs Against Membership Inference Attack. 1728-1743 - Chandra Sharma

, George T. Amariucai
, Shuangqing Wei
:
The Economics of Privacy and Utility: Investment Strategies. 1744-1755 - Yangguang Tian

, Bowen Liu, Yingjiu Li
, Pawel Szalachowski
, Jianying Zhou:
Accountable Fine-Grained Blockchain Rewriting in the Permissionless Setting. 1756-1766 - Bin Yang

, Jun Chen
, Cuiqun Chen, Mang Ye
:
Dual Consistency-Constrained Learning for Unsupervised Visible-Infrared Person Re-Identification. 1767-1779 - Qiongxiu Li

, Jaron Skovsted Gundersen
, Milan Lopuhaä-Zwakenberg
, Richard Heusdens
:
Adaptive Differentially Quantized Subspace Perturbation (ADQSP): A Unified Framework for Privacy-Preserving Distributed Average Consensus. 1780-1793 - Nusrat Farzana Dipu

, Avinash Ayalasomayajula
, Mark Tehranipoor, Farimah Farahmandi:
AGILE: Automated Assertion Generation to Detect Information Leakage Vulnerabilities. 1794-1809 - Boyu Zhu

, Changyu Dong, Yuan Zhang
, Yunlong Mao
, Sheng Zhong
:
Toward Universal Detection of Adversarial Examples via Pseudorandom Classifiers. 1810-1825 - Maoguo Gong

, Yuanqiao Zhang
, Yuan Gao
, A. Kai Qin
, Yue Wu
, Shanfeng Wang
, Yihong Zhang:
A Multi-Modal Vertical Federated Learning Framework Based on Homomorphic Encryption. 1826-1839 - Ishan Karunanayake

, Jiaojiao Jiang
, Nadeem Ahmed
, Sanjay K. Jha
:
Exploring Uncharted Waters of Website Fingerprinting. 1840-1854 - Xuan Yang

, Dongming Li
:
LED-RFF: LTE DMRS-Based Channel Robust Radio Frequency Fingerprint Identification Scheme. 1855-1869 - Zhenqin Yin

, Xinmin Zhang
, Zhihuan Song
, Zhiqiang Ge
:
Adversarial Learning From Imbalanced Data: A Robust Industrial Fault Classification Method. 1870-1882 - Siguo Bi

, Kai Li
, Shuyan Hu
, Wei Ni
, Cong Wang, Xin Wang
:
Detection and Mitigation of Position Spoofing Attacks on Cooperative UAV Swarm Formations. 1883-1895 - Tao Jing, Hongyan Huang, Qinghe Gao, Yue Wu, Yan Huo, Yawei Wang:

Multi-User Physical Layer Authentication Based on CSI Using ResNet in Mobile IIoT. 1896-1907 - Yuhan Suo

, Senchun Chai
, Runqi Chai
, Zhong-Hua Pang
, Yuanqing Xia
, Guo-Ping Liu
:
Security Defense of Large-Scale Networks Under False Data Injection Attacks: An Attack Detection Scheduling Approach. 1908-1921 - Jiawei Liu

, Jingyi Xie
, Yang Wang
, Zheng-Jun Zha
:
Adaptive Texture and Spectrum Clue Mining for Generalizable Face Forgery Detection. 1922-1934 - Junlong Mao, Huiyi Tang, Shanxiang Lyu

, Zhengchun Zhou
, Xiaochun Cao
:
Content-Aware Quantization Index Modulation: Leveraging Data Statistics for Enhanced Image Watermarking. 1935-1947 - Meng Chen

, Li Lu
, Jiadi Yu
, Zhongjie Ba
, Feng Lin
, Kui Ren
:
AdvReverb: Rethinking the Stealthiness of Audio Adversarial Examples to Human Perception. 1948-1962 - Yuntao Wang

, Zhou Su
, Abderrahim Benslimane
, Qichao Xu
, Minghui Dai
, Ruidong Li
:
Collaborative Honeypot Defense in UAV Networks: A Learning-Based Game Approach. 1963-1978 - Chuan Zhang

, Haojun Xuan
, Tong Wu
, Ximeng Liu
, Guomin Yang
, Liehuang Zhu
:
Blockchain-Based Dynamic Time-Encapsulated Data Auditing for Outsourcing Storage. 1979-1993 - Jiajing Wu

, Dan Lin
, Qishuang Fu
, Shuo Yang
, Ting Chen
, Zibin Zheng
, Bowen Song:
Toward Understanding Asset Flows in Crypto Money Laundering Through the Lenses of Ethereum Heists. 1994-2009 - Kerem Ozfatura

, Emre Ozfatura
, Alptekin Küpçü
, Deniz Gündüz
:
Byzantines Can Also Learn From History: Fall of Centered Clipping in Federated Learning. 2010-2022 - Chen Liu

, Bo Li
, Jun Zhao
, Weiwei Feng, Xudong Liu, Chunpei Li
:
A2-CLM: Few-Shot Malware Detection Based on Adversarial Heterogeneous Graph Augmentation. 2023-2038 - Laura Crosara

, Francesco Ardizzon
, Stefano Tomasin
, Nicola Laurenti:
Worst-Case Spoofing Attack and Robust Countermeasure in Satellite Navigation Systems. 2039-2050 - Fanliang Hu

, Jian Shen
, Pandi Vijayakumar
:
Side-Channel Attacks Based on Multi-Loss Regularized Denoising AutoEncoder. 2051-2065 - Erez Danieli, Menachem Goldzweig, Moshe Avital

, Itamar Levi
:
Revealing the Secrets of Radio Embedded Systems: Extraction of Raw Information via RF. 2066-2081 - Ahmad Bazzi

, Marwa Chafii
:
Secure Full Duplex Integrated Sensing and Communications. 2082-2097 - Kutub Uddin

, Yoonmo Yang, Tae Hyun Jeong, Byung Tae Oh
:
A Robust Open-Set Multi-Instance Learning for Defending Adversarial Attacks in Digital Image. 2098-2111 - Yiming Yang

, Weipeng Hu
, Haifeng Hu
:
Unsupervised NIR-VIS Face Recognition via Homogeneous-to-Heterogeneous Learning and Residual-Invariant Enhancement. 2112-2126 - Linkun Fan

, Fazhi He
, Tongzhen Si
, Rubin Fan
, Chuanlong Ye
, Bing Li
:
MBA: Backdoor Attacks Against 3D Mesh Classifier. 2127-2142 - Shengbang Fang

, Matthew C. Stamm
:
Attacking Image Splicing Detection and Localization Algorithms Using Synthetic Traces. 2143-2156 - Wenbing Tang

, Yuan Zhou
, Yang Liu
, Zuohua Ding
, Jing Liu
:
Robust Motion Planning for Multi-Robot Systems Against Position Deception Attacks. 2157-2170 - Yuexin Xiang

, Yuchen Lei
, Ding Bao
, Tiantian Li
, Qingqing Yang, Wenmao Liu
, Wei Ren
, Kim-Kwang Raymond Choo
:
BABD: A Bitcoin Address Behavior Dataset for Pattern Analysis. 2171-2185 - Ziyu Wei

, Xi Yang
, Nannan Wang
, Xinbo Gao
:
Dual-Adversarial Representation Disentanglement for Visible Infrared Person Re-Identification. 2186-2200 - Guowei Ling

, Fei Tang
, Chaochao Cai, Jinyong Shan
, Haiyang Xue
, Wulu Li, Peng Tang
, Xinyi Huang
, Weidong Qiu
:
P²FRPSI: Privacy-Preserving Feature Retrieved Private Set Intersection. 2201-2216 - Meng Li

, Hanni Ding, Qing Wang, Mingwei Zhang, Weizhi Meng
, Liehuang Zhu
, Zijian Zhang
, Xiaodong Lin
:
Decentralized Threshold Signatures With Dynamically Private Accountability. 2217-2230 - Jinguang Han

, Willy Susilo
, Nan Li
, Xinyi Huang
:
OLBS: Oblivious Location-Based Services. 2231-2243 - Zhenyu Guo

, Xin Li
, Jiamou Liu
, Zijian Zhang
, Meng Li
, Jingjing Hu
, Liehuang Zhu
:
Graph-Based Covert Transaction Detection and Protection in Blockchain. 2244-2257 - Fahong Zhang, Chen Yang

, Rui Zong
, Xinran Zheng, Jianfei Wang
, Yishuo Meng
:
An Efficient and Scalable FHE-Based PDQ Scheme: Utilizing FFT to Design a Low Multiplication Depth Large-Integer Comparison Algorithm. 2258-2272 - Zongkun Sun

, Yanzhen Ren
, Yihuan Huang, Wuyang Liu
, Hongcheng Zhu
:
AFPM: A Low-Cost and Universal Adversarial Defense for Speaker Recognition Systems. 2273-2287 - Jianchang Lai

, Willy Susilo
, Robert H. Deng
, Fuchun Guo
:
SDSS: Sequential Data Sharing System in IoT. 2288-2299 - Liang Guo

, Jie Jia
, Jian Chen
, Xingwei Wang
:
Secure Communication Optimization in NOMA Systems With UAV-Mounted STAR-RIS. 2300-2314 - Rui Gao

, Jiangshuai Huang
, Xiaojie Su
, Ling Zhao
:
Adaptive Control of Strict-Feedback Nonlinear Systems Under Denial-of-Service: A Synthetic Analysis. 2315-2327 - Weidong Liu

, Xiaojun Mao
, Xiaofei Zhang
, Xin Zhang
:
Efficient Sparse Least Absolute Deviation Regression With Differential Privacy. 2328-2339 - Yanbin Li

, Jiajie Zhu
, Zhe Liu
, Ming Tang
, Shougang Ren:
Deep Learning Gradient Visualization-Based Pre-Silicon Side-Channel Leakage Location. 2340-2355 - Haochen Dou

, Zhenwu Dan, Peng Xu
, Wei Wang
, Shuning Xu, Tianyang Chen, Hai Jin
:
Dynamic Searchable Symmetric Encryption With Strong Security and Robustness. 2370-2384 - Ting Cui

, Yiming Mao, Yang Yang, Yi Zhang, Jiyan Zhang
, Chenhui Jin
:
Congruent Differential Cluster for Binary SPN Ciphers. 2385-2397 - Xiaoxue Hu, Geling Liu, Baolin Zheng, Lingchen Zhao

, Qian Wang
, Yufei Zhang, Minxin Du
:
FastTextDodger: Decision-Based Adversarial Attack Against Black-Box NLP Models With Extremely High Efficiency. 2398-2411 - Jian Chen

, Yuan Gao, Gaoyang Liu
, Ahmed M. Abdelmoniem
, Chen Wang
:
Manipulating Pre-Trained Encoder for Targeted Poisoning Attacks in Contrastive Learning. 2412-2424 - Weiqi Dai

, Jinkai Liu, Yang Zhou, Kim-Kwang Raymond Choo
, Xia Xie, Deqing Zou
, Hai Jin
:
PRBFPT: A Practical Redactable Blockchain Framework With a Public Trapdoor. 2425-2437 - Xiaohu Wang

, Chao Lin
, Xinyi Huang
, Debiao He
:
Anonymity-Enhancing Multi-Hop Locks for Monero-Enabled Payment Channel Networks. 2438-2453 - Na Wang

, Wen Zhou, Jingjing Wang, Yifan Guo, Junsong Fu
, Jianwei Liu:
Secure and Efficient Similarity Retrieval in Cloud Computing Based on Homomorphic Encryption. 2454-2469 - Jiajun Li

, Pu Wang
, Zheng Yan
, Yishan Yang
, Kai Zeng
:
BGKey: Group Key Generation for Backscatter Communications Among Multiple Devices. 2470-2486 - Jueun Jeon

, Byeonghui Jeong
, Seungyeon Baek
, Young-Sik Jeong
:
Static Multi Feature-Based Malware Detection Using Multi SPP-net in Smart IoT Environments. 2487-2500 - Yu Wei

, Jingyu Jia
, Yuduo Wu
, Changhui Hu, Changyu Dong
, Zheli Liu
, Xiaofeng Chen
, Yun Peng, Shaowei Wang
:
Distributed Differential Privacy via Shuffling Versus Aggregation: A Curious Study. 2501-2516 - Xiaoli Zhang

, Wenxiang Sun, Zhicheng Xu, Hongbing Cheng
, Chengjun Cai
, Helei Cui
, Qi Li
:
EVM-Shield: In-Contract State Access Control for Fast Vulnerability Detection and Prevention. 2517-2532 - Huaibing Peng

, Huming Qiu
, Hua Ma, Shuo Wang, Anmin Fu
, Said F. Al-Sarawi
, Derek Abbott
, Yansong Gao
:
On Model Outsourcing Adaptive Attacks to Deep Learning Backdoor Defenses. 2356-2369 - Tianyu Zhaolu

, Zhiguo Wan
, Huaqun Wang
:
Division of Regulatory Power: Collaborative Regulation for Privacy-Preserving Blockchains. 2533-2548 - Meng Jia

, Jing Chen
, Kun He
, Min Shi
, Yuanzheng Wang, Ruiying Du:
Generic Construction of Threshold Credential Management With User-Autonomy Aggregation. 2549-2564 - Lifeng Huang

, Qiong Huang
, Peichao Qiu
, Shuxin Wei
, Chengying Gao
:
FASTEN: Fast Ensemble Learning for Improved Adversarial Robustness. 2565-2580 - Guoyuan Lin

, Weiqi Luo
, Da Luo
, Jiwu Huang
:
One-Class Neural Network With Directed Statistics Pooling for Spoofing Speech Detection. 2581-2593 - Jianhao Li

, Jiabei Wang
, Rui Zhang
, Yansen Xin
, Wenhan Xu
:
NEMO: Practical Distributed Boolean Queries With Minimal Leakage. 2594-2608 - Jian Liu

, Jiachen Ke
, Jinliang Liu
, Xiangpeng Xie
, Engang Tian
:
Outlier-Resistant Non-Fragile Control of Nonlinear Networked Systems Under DoS Attacks and Multi-Variable Event-Triggered SC Protocol. 2609-2622 - Zhenqing Qu

, Xiang Ling, Ting Wang
, Xiang Chen
, Shouling Ji
, Chunming Wu
:
AdvSQLi: Generating Adversarial SQL Injections Against Real-World WAF-as-a-Service. 2623-2638 - Yibin Zhang

, Qianyun Zhang
, Haitao Zhao
, Yun Lin
, Guan Gui
, Hikmet Sari
:
Multisource Heterogeneous Specific Emitter Identification Using Attention Mechanism-Based RFF Fusion Method. 2639-2650 - Barak Amihood

, Asaf Cohen
:
Covertly Controlling a Linear System. 2651-2663 - Janith Kavindu Dassanayake

, Dulaj Gunasinghe
, Gayan Amarasuriya Aruma Baduge
:
Secrecy Rate Analysis and Active Pilot Attack Detection for IRS-Aided Massive MIMO Systems. 2664-2679 - Raymond K. Zhao

, Sarah McCarthy, Ron Steinfeld
, Amin Sakzad
, Máire O'Neill
:
Quantum-Safe HIBE: Does It Cost a Latte? 2680-2695 - Zhenyu Cui

, Jiahuan Zhou
, Yuxin Peng
:
DMA: Dual Modality-Aware Alignment for Visible-Infrared Person Re-Identification. 2696-2708 - Shuyi Li

, Bob Zhang
, Lifang Wu
, Ruijun Ma
, Xin Ning
:
Robust and Sparse Least Square Regression for Finger Vein and Finger Knuckle Print Recognition. 2709-2719 - Haotian Wang

, Jun Tao
, Dingwen Chi
, Yu Gao
, Zuyan Wang
, Dika Zou
, Yifan Xu
:
A Preference-Driven Malicious Platform Detection Mechanism for Users in Mobile Crowdsensing. 2720-2731 - Jun Zhao

, Kai Zhang
, Junqing Gong
, Haifeng Qian
:
Lavida: Large-Universe, Verifiable, and Dynamic Fine-Grained Access Control for E-Health Cloud. 2732-2745 - Qiuyun Tong

, Xinghua Li
, Yinbin Miao
, Yunwei Wang
, Ximeng Liu
, Robert H. Deng
:
Beyond Result Verification: Efficient Privacy-Preserving Spatial Keyword Query With Suppressed Leakage. 2746-2760 - Mei Jiang

, Yannan Li
, Willy Susilo
, Dung Hoang Duong
:
Quantum-Safe Puncturable Signatures With Their Application in Blockchain. 2761-2770 - Kimia Zamiri Azar, Hadi Mardani Kamali

, Farimah Farahmandi, Mark Tehranipoor:
Improving Bounded Model Checkers Scalability for Circuit De-Obfuscation: An Exploration. 2771-2785 - Alejandro Cohen

, Asaf Cohen
, Omer Gurewitz
:
Secure Adaptive Group Testing. 2786-2799 - Rui Sun

, Long Chen
, Lei Zhang, Ruirui Xie, Jun Gao
:
Robust Visible-Infrared Person Re-Identification Based on Polymorphic Mask and Wavelet Graph Convolutional Network. 2800-2813 - Weixuan Tang

, Zhili Zhou
, Bin Li
, Kim-Kwang Raymond Choo
, Jiwu Huang
:
Joint Cost Learning and Payload Allocation With Image-Wise Attention for Batch Steganography. 2826-2839 - Mang Ye

, Wei Shen
, Junwu Zhang
, Yao Yang, Bo Du
:
SecureReID: Privacy-Preserving Anonymization for Person Re-Identification. 2840-2853 - Adrián Tobar Nicolau

, Javier Parra-Arnau, Jordi Forné
, Esteve Pallarès
:
m-Eligibility With Minimum Counterfeits and Deletions for Privacy Protection in Continuous Data Publishing. 2854-2864 - Rui Zhang, Lei Zhang, Qian Wu, Jianying Zhou:

Secure Channel Establishment Scheme for Task Delivery in Vehicular Cloud Computing. 2865-2880 - Junlin Liu

, Xinchen Lyu
, Qimei Cui
, Xiaofeng Tao
:
Similarity-Based Label Inference Attack Against Training and Inference of Split Learning. 2881-2895 - Huy Nguyen

, Kien Nguyen Thanh
, Sridha Sridharan
, Clinton Fookes
:
AG-ReID.v2: Bridging Aerial and Ground Views for Person Re-Identification. 2896-2908 - Enas E. Abulibdeh

, Leen Younes
, Baker Mohammad
, Khaled Humood
, Hani H. Saleh
, Mahmoud Al-Qutayri
:
DRAM-Based PUF Utilizing the Variation of Adjacent Cells. 2909-2918 - Fucai Luo

, Haiyan Wang
, Willy Susilo
, Xingfu Yan
, Xiaofan Zheng
:
Public Trace-and-Revoke Proxy Re-Encryption for Secure Data Sharing in Clouds. 2919-2934 - Runmeng Du

, Xuru Li
, Daojing He
, Kim-Kwang Raymond Choo
:
Toward Secure and Verifiable Hybrid Federated Learning. 2935-2950 - He Yang

, Wei Xi
, Yuhao Shen, Canhui Wu, Jizhong Zhao:
RoseAgg: Robust Defense Against Targeted Collusion Attacks in Federated Learning. 2951-2966 - Haozhe Li

, Yilin Liao
, Zijian Tian, Zhaoran Liu
, Jiaqi Liu
, Xinggao Liu
:
Bidirectional Stackable Recurrent Generative Adversarial Imputation Network for Specific Emitter Missing Data Imputation. 2967-2980 - Norbert Tihanyi

, Tamás Bisztray
, Bertalan Borsos
, Sebastien Raveau
:
Privacy-Preserving Password Cracking: How a Third Party Can Crack Our Password Hash Without Learning the Hash Value or the Cleartext. 2981-2996 - Ying Liang, Wenjie Wu, Haobo Li, Xiaojun Chang, Xiaojiang Chen, Jinye Peng, Pengfei Xu:

DCS-Gait: A Class-Level Domain Adaptation Approach for Cross-Scene and Cross-State Gait Recognition Using Wi-Fi CSI. 2997-3007 - Mingxing Duan

, Kailun Jiao, Siyang Yu, Zhibang Yang
, Bin Xiao
, Kenli Li
:
MC-Net: Realistic Sample Generation for Black-Box Attacks. 3008-3022 - Jieli Liu

, Jinze Chen
, Jiajing Wu
, Zhiying Wu
, Junyuan Fang
, Zibin Zheng
:
Fishing for Fraudsters: Uncovering Ethereum Phishing Gangs With Blockchain Data. 3038-3050 - Min Long

, Quantao Yao
, Le-Bing Zhang
, Fei Peng
:
Face De-Morphing Based on Diffusion Autoencoders. 3051-3063 - Yuanyuan Qing

, Tao Bai
, Zhuotao Liu
, Pierre Moulin, Bihan Wen
:
Detection of Adversarial Attacks via Disentangling Natural Images and Perturbations. 2814-2825 - Zhankai Li

, Weiping Wang
, Jie Li
, Kai Chen
, Shigeng Zhang
:
UCG: A Universal Cross-Domain Generator for Transferable Adversarial Examples. 3023-3037 - Yun Wen

, Gaojie Chen
, Sisai Fang
, Miaowen Wen
, Stefano Tomasin
, Marco Di Renzo
:
RIS-Assisted UAV Secure Communications With Artificial Noise-Aware Trajectory Design Against Multiple Colluding Curious Users. 3064-3076 - Chuan Sheng

, Yu Yao
, Lianxiang Zhao, Peng Zeng
, Jianming Zhao
:
Scanner-Hunter: An Effective ICS Scanning Group Identification System. 3077-3092 - Fangling Jiang

, Yunfan Liu
, Haolin Si, Jingjing Meng, Qi Li
:
Cross-Scenario Unknown-Aware Face Anti-Spoofing With Evidential Semantic Consistency Learning. 3093-3108 - Baojin Huang

, Zhongyuan Wang
, Jifan Yang
, Zhen Han
, Chao Liang
:
Unlabeled Data Assistant: Improving Mask Robustness for Face Recognition. 3109-3123 - Joakim Tutt

, Olga Taran
, Roman Chaban
, Brian Pulfer
, Yury Belousov
, Taras Holotyak, Slava Voloshynovskiy
:
Authentication of Copy Detection Patterns: A Pattern Reliability Based Approach. 3124-3134 - Shuai Li, Zhemin Yang

, Yunteng Yang, Dingyi Liu
, Min Yang:
Identifying Cross-User Privacy Leakage in Mobile Mini-Apps at a Large Scale. 3135-3147 - Xin Zhang, Kejiang Chen

, Jinyang Ding
, Yuqi Yang, Weiming Zhang
, Nenghai Yu
:
Provably Secure Public-Key Steganography Based on Elliptic Curve Cryptography. 3148-3163 - Shenyi Zhang

, Baolin Zheng, Peipei Jiang
, Lingchen Zhao
, Chao Shen
, Qian Wang
:
Perception-Driven Imperceptible Adversarial Attack Against Decision-Based Black-Box Models. 3164-3177 - Andi Liu

, Yizhong Liu
, Qianhong Wu
, Boyu Zhao
, Dongyu Li
, Yuan Lu
, Rongxing Lu
, Willy Susilo
:
CHERUBIM: A Secure and Highly Parallel Cross-Shard Consensus Using Quadruple Pipelined Two-Phase Commit for Sharding Blockchains. 3178-3193 - Mohamed K. M. Fadul

, Donald R. Reising
, Lakmali P. Weerasena
, T. Daniel Loveless
, Mina Sartipi, Joshua H. Tyler
:
Improving RF-DNA Fingerprinting Performance in an Indoor Multipath Environment Using Semi-Supervised Learning. 3194-3209 - Mengnan Zhao

, Lihe Zhang
, Wei Wang
, Yuqiu Kong
, Baocai Yin
:
Adversarial Attacks on Scene Graph Generation. 3210-3225 - Daolin Wen

, Xiaowu Mu
:
Secure Dual Asynchronous Tracking Control for Markov Jump Systems Under Hybrid Cyberattacks. 3226-3236 - Kai Zeng

, Kejiang Chen
, Jiansong Zhang
, Weiming Zhang
, Nenghai Yu
:
Toward Secure and Robust Steganography for Black-Box Generated Images. 3237-3250 - Tiong-Sik Ng

, Jacky Chen Long Chai, Cheng-Yaw Low
, Andrew Beng Jin Teoh
:
Self-Attentive Contrastive Learning for Conditioned Periocular and Face Biometrics. 3251-3264 - Yulong Yang

, Chenhao Lin
, Qian Li
, Zhengyu Zhao
, Haoran Fan, Dawei Zhou
, Nannan Wang
, Tongliang Liu
, Chao Shen
:
Quantization Aware Attack: Enhancing Transferable Adversarial Attacks by Model Quantization. 3265-3278 - Peng Xu

, Gaojie Chen
, Zheng Yang
, Yong Li
, Stefano Tomasin
:
Multiple Access Wiretap Channel With Partial Rate-Limited Feedback. 3279-3294 - Dayong Ye

, Tianqing Zhu
, Kun Gao, Wanlei Zhou
:
Defending Against Label-Only Attacks via Meta-Reinforcement Learning. 3295-3308 - Jia-Si Weng

, Shenglong Yao, Yuefeng Du
, Junjie Huang, Jian Weng
, Cong Wang
:
Proof of Unlearning: Definitions and Instantiation. 3309-3323 - Xingyu Chen

, Huici Wu
, Xiaofeng Tao
, Haowei Wang
:
Polar Coding for Wiretap Channels With Random States Non-Causally Available at the Encoder. 3324-3338 - Qing Yang

, Cheng Wang
, Haifeng Yuan, Jipeng Cui
, Teng Hu, Xue Chen
, Changjun Jiang
:
Approaching the Information-Theoretic Limit of Privacy Disclosure With Utility Guarantees. 3339-3352 - Tolun Tosun

, Erkay Savas
:
Zero-Value Filtering for Accelerating Non-Profiled Side-Channel Attack on Incomplete NTT-Based Implementations of Lattice-Based Cryptography. 3353-3365 - Xiaoyu Ji

, Qinhong Jiang
, Chaohao Li
, Zhuoyang Shi, Wenyuan Xu
:
Watch Your Speed: Injecting Malicious Voice Commands via Time-Scale Modification. 3366-3379 - Zhuo Chen

, Liehuang Zhu
, Peng Jiang
, Can Zhang
, Feng Gao
, Fuchun Guo
:
Exploring Unobservable Blockchain-Based Covert Channel for Censorship-Resistant Systems. 3380-3394 - Yury Belousov

, Guillaume Quétant
, Brian Pulfer
, Roman Chaban
, Joakim Tutt
, Olga Taran
, Taras Holotyak, Slava Voloshynovskiy
:
A Machine Learning-Based Digital Twin for Anti-Counterfeiting Applications With Copy Detection Patterns. 3395-3408 - Ruiyang Xia, Decheng Liu

, Jie Li
, Lin Yuan
, Nannan Wang
, Xinbo Gao
:
MMNet: Multi-Collaboration and Multi-Supervision Network for Sequential Deepfake Detection. 3409-3422 - Songlin Hu

, Xiaohua Ge
, Wei Zhang, Dong Yue
:
DoS-Resilient Load Frequency Control of Multi-Area Power Systems: An Attack-Parameter-Dependent Approach. 3423-3434 - Pengyu Qiu

, Xuhong Zhang
, Shouling Ji
, Chong Fu
, Xing Yang, Ting Wang
:
HashVFL: Defending Against Data Reconstruction Attacks in Vertical Federated Learning. 3435-3450 - Dong Xie

, Jinghua Yang, Bin Wu, Weixin Bian
, Fulong Chen
, Taochun Wang
:
An Effectively Applicable to Resource Constrained Devices and Semi-Trusted Servers Authenticated Key Agreement Scheme. 3451-3464 - Kai Li

, Jingjing Zheng
, Xin Yuan
, Wei Ni
, Özgür B. Akan, H. Vincent Poor
:
Data-Agnostic Model Poisoning Against Federated Learning: A Graph Autoencoder Approach. 3465-3480 - Jiahui Wu

, Weizhe Zhang
, Fucai Luo
:
On the Security of "LSFL: A Lightweight and Secure Federated Learning Scheme for Edge Computing". 3481-3482 - Xingquan Fu

, Guanghui Wen
, Mengfei Niu
, Wei Xing Zheng
:
Distributed Secure Filtering Against Eavesdropping Attacks in SINR-Based Sensor Networks. 3483-3494 - Jingzhe Ma

, Xiaoqing Zhang
, Shiqi Yu
:
An Identity-Preserved Framework for Human Motion Transfer. 3495-3509 - Fenghong Yang, Runqing Jiang, Yan Yan

, Jing-Hao Xue
, Biao Wang, Hanzi Wang
:
Dual-Mode Learning for Multi-Dataset X-Ray Security Image Detection. 3510-3524 - Wei Liang

, Siqi Xie, Kuan-Ching Li
, Xiong Li
, Xiaoyan Kui
, Albert Y. Zomaya
:
MC-DSC: A Dynamic Secure Resource Configuration Scheme Based on Medical Consortium Blockchain. 3525-3538 - Anton Wahrstätter

, Matthew Solomon, Ben DiFrancesco, Vitalik Buterin, Davor Svetinovic
:
BaseSAP: Modular Stealth Address Protocol for Programmable Blockchains. 3539-3553 - Simon Mandlík

, Tomás Pevný
, Václav Smídl
, Lukás Bajer
:
Malicious Internet Entity Detection Using Local Graph Inference. 3554-3566 - Yulin Zhu

, Tomasz P. Michalak
, Xiapu Luo
, Xiaoge Zhang
, Kai Zhou
:
Toward Secrecy-Aware Attacks Against Trust Prediction in Signed Social Networks. 3567-3580 - Hao Yang

, Shiyu Shen
, Zhe Liu
, Yunlei Zhao
:
cuXCMP: CUDA-Accelerated Private Comparison Based on Homomorphic Encryption. 3581-3592 - Qi Jiang

, Guichuan Zhao
, Xindi Ma
, Meng Li
, Youliang Tian
, Xinghua Li
:
Cross-Modal Learning Based Flexible Bimodal Biometric Authentication With Template Protection. 3593-3607 - Farah Ferdaus

, Bashir M. Sabquat Bahar Talukder
, Md. Tauhidur Rahman
:
Hiding Information for Secure and Covert Data Storage in Commercial ReRAM Chips. 3608-3619 - Huanran Wang

, Wu Yang
, Dapeng Man
, Jiguang Lv
, Shuai Han
, Jingwen Tan, Tao Liu
:
Anchor Link Prediction for Cross-Network Digital Forensics From Local and Global Perspectives. 3620-3635 - Elijah Pelofske

:
Analysis of a Programmable Quantum Annealer as a Random Number Generator. 3636-3643 - Zhongyun Hua

, Yan Tong, Yifeng Zheng
, Yuhong Li
, Yushu Zhang
:
PPGloVe: Privacy-Preserving GloVe for Training Word Vectors in the Dark. 3644-3658 - Huafeng Kuang

, Hong Liu
, Xianming Lin
, Rongrong Ji
:
Defense Against Adversarial Attacks Using Topology Aligning Adversarial Training. 3659-3673 - Derui Zhu

, Jinfu Chen
, Xuebing Zhou, Weiyi Shang, Ahmed E. Hassan
, Jens Grossklags
:
Vulnerabilities of Data Protection in Vertical Federated Learning Training and Countermeasures. 3674-3689 - Zhuangzhi Chen

, Zhangwei Wang
, Dongwei Xu
, Jiawei Zhu, Weiguo Shen
, Shilian Zheng
, Qi Xuan
, Xiaoniu Yang
:
Learn to Defend: Adversarial Multi-Distillation for Automatic Modulation Recognition Models. 3690-3702 - Xinwei Liu

, Kiran B. Raja
, Renfang Wang
, Hong Qiu
, Hucheng Wu
, Dechao Sun
, Qiguang Zheng, Nian Liu, Xiaoxia Wang, Gehang Huang, Raghavendra Ramachandra
, Christoph Busch
:
A Latent Fingerprint in the Wild Database. 3703-3718 - Hao-Tian Wu

, Yiu-Ming Cheung
, Zhihong Tian
, Dingcai Liu, Xiangyang Luo
, Jiankun Hu
:
Lossless Data Hiding in NTRU Cryptosystem by Polynomial Encoding and Modulation. 3719-3732 - Xiaogang Zhu

, Siyu Zhang
, Chaoran Li
, Sheng Wen
, Yang Xiang
:
Fuzzing Android Native System Libraries via Dynamic Data Dependency Graph. 3733-3744 - Min Wang

, Xuefei Yin
, Jiankun Hu
:
Cancellable Deep Learning Framework for EEG Biometrics. 3745-3757 - Xingjian Zhang

, Haochen Gong
, Rui Chang
, Yajin Zhou
:
RECAST: Mitigating Conflict-Based Cache Attacks Through Fine-Grained Dynamic Mapping. 3758-3771 - Wael Issa

, Nour Moustafa
, Benjamin P. Turnbull
, Kim-Kwang Raymond Choo
:
RVE-PFL: Robust Variational Encoder-Based Personalized Federated Learning Against Model Inversion Attacks. 3772-3787 - Huikai Shao

, Yuchen Zou
, Chengcheng Liu
, Qiang Guo
, Dexing Zhong
:
Learning to Generalize Unseen Dataset for Cross-Dataset Palmprint Recognition. 3788-3799 - Junhao Huang

, Haosong Zhao
, Jipeng Zhang
, Wangchen Dai
, Lu Zhou, Ray C. C. Cheung
, Çetin Kaya Koç
, Donglong Chen
:
Yet Another Improvement of Plantard Arithmetic for Faster Kyber on Low-End 32-bit IoT Devices. 3800-3813 - Jiahe Tian

, Peng Chen, Cai Yu
, Xiaomeng Fu
, Xi Wang
, Jiao Dai
, Jizhong Han
:
Learning to Discover Forgery Cues for Face Forgery Detection. 3814-3828 - Wenhan Ge

, Zeyuan Cui
, Junfeng Wang
, Binhui Tang
, Xiaohui Li
:
MetaCluster: A Universal Interpretable Classification Framework for Cybersecurity. 3829-3843 - Changsong Jiang

, Chunxiang Xu
, Yunxia Han
, Zhao Zhang
, Kefei Chen
:
Two-Factor Authenticated Key Exchange From Biometrics With Low Entropy Rates. 3844-3856 - Xiao Cai

, Kaibo Shi
, Yanbin Sun
, Jinde Cao
, Shiping Wen
, Cheng Qiao
, Zhihong Tian
:
Stability Analysis of Networked Control Systems Under DoS Attacks and Security Controller Design With Mini-Batch Machine Learning Supervision. 3857-3865 - Bowen Ma

, Tong Jia
, Mingyuan Li, Songsheng Wu, Hao Wang
, Dongyue Chen
:
Toward Dual-View X-Ray Baggage Inspection: A Large-Scale Benchmark and Adaptive Hierarchical Cross Refinement for Prohibited Item Discovery. 3866-3878 - Sicheng Zhang

, Yandie Yang
, Ziyao Zhou
, Zhi Sun
, Yun Lin
:
DIBAD: A Disentangled Information Bottleneck Adversarial Defense Method Using Hilbert-Schmidt Independence Criterion for Spectrum Security. 3879-3891 - Fengqun Wang

, Jie Cui
, Qingyang Zhang
, Debiao He
, Hong Zhong
:
Blockchain-Based Secure Cross-Domain Data Sharing for Edge-Assisted Industrial Internet of Things. 3892-3905 - Mingping Qi

, Wei Hu
, Yu Tai:
SAE+: One-Round Provably Secure Asymmetric SAE Protocol for Client-Server Model. 3906-3913 - Sree Ranjani Rajendran

, Nusrat Farzana Dipu
, Shams Tarek
, Hadi Mardani Kamali
, Farimah Farahmandi, Mark Tehranipoor:
Exploring the Abyss? Unveiling Systems-on-Chip Hardware Vulnerabilities Beneath Software. 3914-3926 - Chongyao Xu

, Litao Zhang, Pui-In Mak
, Rui Paulo Martins
, Man-Kay Law
:
Fully Symmetrical Obfuscated Interconnection and Weak-PUF-Assisted Challenge Obfuscation Strong PUFs Against Machine-Learning Modeling Attacks. 3927-3942 - Zuomin Qu

, Zuping Xi
, Wei Lu
, Xiangyang Luo, Qian Wang
, Bin Li
:
DF-RAP: A Robust Adversarial Perturbation for Defending Against Deepfakes in Real-World Social Network Scenarios. 3943-3957 - Rongke Liu

, Dong Wang
, Yizhi Ren
, Zhen Wang
, Kaitian Guo, Qianqian Qin, Xiaolei Liu
:
Unstoppable Attack: Label-Only Model Inversion Via Conditional Diffusion Model. 3958-3973 - Hongyan Fei

, Chuanwei Huang, Song Wu
, Zheng Wang
, Zexi Jia
, Jufu Feng
:
Fingerprint Presentation Attack Detection by Region Decomposition. 3974-3985 - Tongshuai Wu

, Liwei Chen
, Gewangzi Du
, Dan Meng, Gang Shi
:
UltraVCS: Ultra-Fine-Grained Variable-Based Code Slicing for Automated Vulnerability Detection. 3986-4000 - Da Ke

, Xiang Wang
, Zhitao Huang
:
Frequency-Selective Adversarial Attack Against Deep Learning-Based Wireless Signal Classifiers. 4001-4011 - Xiangming Wang

, Yang Liu
, Kexin Jiao
, Pengfei Liu, Xiapu Luo
, Ting Liu
:
Intrusion Device Detection in Fieldbus Networks Based on Channel-State Group Fingerprint. 4012-4027 - Mengxue Yang

, Huaqun Wang
, Debiao He
:
Puncturable Attribute-Based Encryption From Lattices for Classified Document Sharing. 4028-4042 - Baleegh Ahmad

, Shailja Thakur
, Benjamin Tan
, Ramesh Karri
, Hammond Pearce
:
On Hardware Security Bug Code Fixes by Prompting Large Language Models. 4043-4057 - Tianyi Zheng

, Bo Li
, Shuang Wu
, Ben Wan, Guodong Mu
, Shice Liu
, Shouhong Ding, Jia Wang
:
MFAE: Masked Frequency Autoencoders for Domain Generalization Face Anti-Spoofing. 4058-4069 - Xinchen Lyu

, Xinyun Hou, Chenshan Ren, Xin Ge, Penglin Yang, Qimei Cui
, Xiaofeng Tao
:
Secure and Efficient Federated Learning With Provable Performance Guarantees via Stochastic Quantization. 4070-4085 - Samuel N. Eshun

, Paolo Palmieri
:
A Cryptographic Protocol for Efficient Mutual Location Privacy Through Outsourcing in Indoor Wi-Fi Localization. 4086-4099 - Ce Gao, Kang Zhang, Weiwei Wang, Zhicheng X. Cao

, Liaojun Pang, Eryun Liu
, Heng Zhao
:
Protected Face Templates Generation Based on Multiple Partial Walsh Transformations and Simhash. 4100-4113 - Yichao Tang

, Chuntao Wang
, Shijun Xiang
, Yiu-Ming Cheung
:
A Robust Reversible Watermarking Scheme Using Attack-Simulation-Based Adaptive Normalization and Embedding. 4114-4129 - Shuai Zhou

, Tianqing Zhu
, Dayong Ye
, Wanlei Zhou
, Wei Zhao:
Inversion-Guided Defense: Detecting Model Stealing Attacks by Output Inverting. 4130-4145 - Fangyuan Sun

, Jia Yu
, Jiankun Hu
:
Privacy-Preserving Approximate Minimum Community Search on Large Networks. 4146-4160 - Xiao Yang, Chengru Zhang

, Haiyang Xue
, Man Ho Au
:
Efficient Verifiably Encrypted ECDSA Schemes From Castagnos-Laguillaumie and Joye-Libert Encryptions. 4161-4173 - Jinling Tang

, Haixia Xu
, Mingsheng Wang, Tao Tang
, Chunying Peng, Huimei Liao:
A Flexible and Scalable Malicious Secure Aggregation Protocol for Federated Learning. 4174-4187 - Jinliang Liu

, Yanhui Dong, Lijuan Zha
, Xiangpeng Xie
, Engang Tian
:
Reinforcement Learning-Based Tracking Control for Networked Control Systems With DoS Attacks. 4188-4197 - Feng Lin

, Hao Yan
, Jin Li
, Ziwei Liu
, Li Lu
, Zhongjie Ba
, Kui Ren
:
PhaDe: Practical Phantom Spoofing Attack Detection for Autonomous Vehicles. 4199-4214 - Jingwei Jiang

, Ding Wang
:
QPASE: Quantum-Resistant Password-Authenticated Searchable Encryption for Cloud Storage. 4231-4246 - Tai Yue

, Fengwei Zhang
, Zhenyu Ning
, Pengfei Wang
, Xu Zhou
, Kai Lu, Lei Zhou
:
Armor: Protecting Software Against Hardware Tracing Techniques. 4247-4262 - Rahul Kande

, Hammond Pearce
, Benjamin Tan
, Brendan Dolan-Gavitt
, Shailja Thakur
, Ramesh Karri
, Jeyavijayan Rajendran:
(Security) Assertions by Large Language Models. 4374-4389 - Hatef Otroshi-Shahreza

, Vedrana Krivokuca Hahn
, Sébastien Marcel
:
Vulnerability of State-of-the-Art Face Recognition Models to Template Inversion Attack. 4585-4600 - Dacan Luo

, Yitao Qiao, Di Xie
, Shifeng Zhang
, Wenxiong Kang
:
Palm Vein Recognition Under Unconstrained and Weak-Cooperative Conditions. 4601-4614 - Yimin Guo

, Yajun Guo
, Ping Xiong
, Fan Yang
, Chengde Zhang
:
Deeper Insight Into Why Authentication Schemes in IoT Environments Fail to Achieve the Desired Security. 4615-4627 - Yunming Zhang

, Dengpan Ye
, Caiyun Xie
, Long Tang
, Xin Liao
, Ziyi Liu
, Chuanxi Chen
, Jiacheng Deng:
Dual Defense: Adversarial, Traceable, and Invisible Robust Watermarking Against Face Swapping. 4628-4641 - Yulin Teng

, Pinchang Zhang
, Xiao Chen, Xiaohong Jiang
, Fu Xiao
:
PHY-Layer Authentication Exploiting Channel Sparsity in MmWave MIMO UAV-Ground Systems. 4642-4657 - Yanyan Ni

, Zhen Wang
, Yingjie Fan
, Xia Huang
, Hao Shen
:
Secure Stabilization of Networked Lur'e Systems Suffering From DoS Attacks: A Resilient Memory-Based Event-Trigger Mechanism. 4658-4669 - Florian Merkle

, Maximilian Samsinger
, Pascal Schöttle
, Tomás Pevný
:
On the Economics of Adversarial Machine Learning. 4670-4685 - Xiao Li

, Qiongxiu Li
, Zhanhao Hu
, Xiaolin Hu
:
On the Privacy Effect of Data Enhancement via the Lens of Memorization. 4686-4699 - Mingyang Song

, Zhongyun Hua
, Yifeng Zheng
, Tao Xiang
, Xiaohua Jia
:
SimLESS: A Secure Deduplication System Over Similar Data in Cloud Media Sharing. 4700-4715 - Panjian Huang

, Saihui Hou
, Chunshui Cao
, Xu Liu
, Xuecai Hu, Yongzhen Huang
:
Integral Pose Learning via Appearance Transfer for Gait Recognition. 4716-4727 - Lijun Gao

, Wenjun Liu
, Kai Liu
, Jiehong Wu:
AugSteal: Advancing Model Steal With Data Augmentation in Active Learning Frameworks. 4728-4740 - Daojing He

, Xin Lv, Xueqian Xu, Sammy Chan
, Kim-Kwang Raymond Choo
:
Double-Layer Detection of Internal Threat in Enterprise Systems Based on Deep Learning. 4741-4751 - Jiale Zhang

, Chengcheng Zhu
, Xiaobing Sun
, Chunpeng Ge
, Bing Chen
, Willy Susilo
, Shui Yu
:
FLPurifier: Backdoor Defense in Federated Learning via Decoupled Contrastive Training. 4752-4766 - Daniel Gilkarov

, Ran Dubin
:
Steganalysis of AI Models LSB Attacks. 4767-4779 - Beibei Li

, Youtong Chen
, Lei Zhang
, Licheng Wang
, Yanyu Cheng
:
HomeSentinel: Intelligent Anti-Fingerprinting for IoT Traffic in Smart Homes. 4780-4793 - Nanqing Xu

, Weiwei Feng
, Tianzhu Zhang
, Yongdong Zhang
:
A Unified Optimization Framework for Feature-Based Transferable Attacks. 4794-4808 - Liwang Zhu

, Xiaotian Zhou, Jiahe Tian
, Wei Li
, Zhongzhi Zhang
:
Defending Against Malicious Influence Control in Online Leader-Follower Social Networks. 4809-4819 - Rongxuan Peng

, Shunquan Tan
, Xianbo Mo
, Bin Li
, Jiwu Huang
:
Employing Reinforcement Learning to Construct a Decision-Making Environment for Image Forgery Localization. 4820-4834 - Dailé Osorio Roig

, Lázaro Janier González-Soler
, Christian Rathgeb
, Christoph Busch
:
Privacy-Preserving Multi-Biometric Indexing Based on Frequent Binary Patterns. 4835-4850 - Guanghan Duan

, Hongwu Lv
, Huiqiang Wang
, Guangsheng Feng
, Xiaoli Li
:
Practical Cyber Attack Detection With Continuous Temporal Graph in Dynamic Network System. 4851-4864 - Jordan Vice

, Naveed Akhtar
, Richard I. Hartley
, Ajmal Mian
:
BAGM: A Backdoor Attack for Manipulating Text-to-Image Generative Models. 4865-4880 - Hao Peng, Jieshuai Yang

, Dandan Zhao
, Xiaogang Xu
, Yuwen Pu
, Jianmin Han, Xing Yang
, Ming Zhong
, Shouling Ji
:
MalGNE: Enhancing the Performance and Efficiency of CFG-Based Malware Detector by Graph Node Embedding in Low Dimension Space. 4881-4896 - Marcelo Luís Francisco Abbade

, Welerson Santos Souza, Melissa de Oliveira Santos, Ivan Eduardo Lage Rodrigues, Ivan Aldaya
, Luiz H. Bonani
, Murilo Araújo Romero
:
Discrete Spectral Encryption of Single-Carrier Signals With Pseudo Random Dynamic Keys. 4914-4929 - Lin Yuan

, Wu Chen
, Xiao Pu
, Yan Zhang
, Hongbo Li, Yushu Zhang
, Xinbo Gao
, Touradj Ebrahimi
:
PRO-Face C: Privacy-Preserving Recognition of Obfuscated Face via Feature Compensation. 4930-4944 - Beiyuan Liu

, Jinjing Jiang, Qian Liu, Jiajia Liu
, Sai Xu
:
An Intelligent Reflecting Surface-Based Attack Scheme Against Dual-Functional Radar and Communication Systems. 4945-4956 - Shuyu Chang

, Zhenqi Shi, Fu Xiao
, Haiping Huang
, Xingchen Liu
, Chaorun Sun:
Privacy-Enhanced Frequent Sequence Mining and Retrieval for Personalized Behavior Prediction. 4957-4969 - Hong Zhu

, Yue Zhao, Shengzhi Zhang
, Kai Chen
:
NeuralSanitizer: Detecting Backdoors in Neural Networks. 4970-4985 - Jiaxiang Wang

, Aihua Zheng
, Yan Yan, Ran He
, Jin Tang
:
Attribute-Guided Cross-Modal Interaction and Enhancement for Audio-Visual Matching. 4986-4998 - Zhihuang Liu

, Ling Hu
, Zhiping Cai
, Ximeng Liu
, Yanhua Liu
:
SeCoSe: Toward Searchable and Communicable Healthcare Service Seeking in Flexible and Secure EHR Sharing. 4999-5014 - Yuepei Li

, Kai Xu
, Junqing Zhang
, Chongyan Gu
, Yuan Ding
, George Goussetis
, Symon K. Podilchak
:
PUF-Assisted Radio Frequency Fingerprinting Exploiting Power Amplifier Active Load-Pulling. 5015-5029 - Bichen Kang

, Neng Ye
, Jianping An
:
Optimal Signaling for Covert Communications Under Peak Power Constraint. 5030-5045 - Yushu Zhang

, Junhao Ji
, Wenying Wen
, Youwen Zhu
, Zhihua Xia
, Jian Weng
:
Understanding Visual Privacy Protection: A Generalized Framework With an Instance on Facial Privacy. 5046-5059 - Ge Gao, Yuan Zhang

, Yaqing Song
, Shiyu Li
:
PrivSSO: Practical Single-Sign-On Authentication Against Subscription/Access Pattern Leakage. 5075-5089 - Guyue Li

, Paul Staat, Haoyu Li
, Markus Heinrichs
, Christian T. Zenger
, Rainer Kronberger, Harald Elders-Boll
, Christof Paar, Aiqun Hu
:
RIS-Jamming: Breaking Key Consistency in Channel Reciprocity-Based Key Generation. 5090-5105 - Jiucui Lu, Jiaran Zhou

, Junyu Dong
, Bin Li
, Siwei Lyu, Yuezun Li
:
ForensicsForest Family: A Series of Multi-Scale Hierarchical Cascade Forests for Detecting GAN-Generated Faces. 5106-5119 - Yi Zhu

, Mohamed Imoussaïne-Aïkous, Carolyn Côté-Lussier
, Tiago H. Falk
:
On the Impact of Voice Anonymization on Speech Diagnostic Applications: A Case Study on COVID-19 Detection. 5151-5165 - Zhirui Zeng, Tao Xiang

, Shangwei Guo
, Jialing He
, Qiao Zhang
, Guowen Xu
, Tianwei Zhang
:
Contrast-Then-Approximate: Analyzing Keyword Leakage of Generative Language Models. 5166-5180 - Zheng Xing

, Chan-Tong Lam
, Xiaochen Yuan
, Sio Kei Im
, Penousal Machado
:
MMQW: Multi-Modal Quantum Watermarking Scheme. 5181-5195 - Peng Jiang

, Qi Liu, Liehuang Zhu
:
Purified Authorization Service With Encrypted Message Moderation. 5196-5206 - Çagdas Gül, Orhun Kara

:
Correction to "A New Construction Method for Keystream Generators". 4198 - Zhijie Xie

, Fan Shi
, Min Zhang, Huimin Ma, Huaixi Wang, Zhenhan Li
, Yunyi Zhang
:
GuessFuse: Hybrid Password Guessing With Multi-View. 4215-4230 - Xinxun Zhang

, Pengfei Jiao
, Mengzhou Gao
, Tianpeng Li
, Yiming Wu
, Huaming Wu
, Zhidong Zhao
:
VGGM: Variational Graph Gaussian Mixture Model for Unsupervised Change Point Detection in Dynamic Networks. 4272-4284 - Jiali Wei

, Ming Fan
, Wenjing Jiao
, Wuxia Jin
, Ting Liu
:
BDMMT: Backdoor Sample Detection for Language Models Through Model Mutation Testing. 4285-4300 - Hai Lu

, Yan Zhu
, Cecilia E. Chen
, Di Ma
:
Toward Efficient Key Extraction of LBC Over Ring: Fast Non-Spherical G-Lattice Sampler and Optimized Perturbation Generation. 4301-4315 - Xiaojie Zhu

, Peisong Shen
, Yueyue Dai
, Lei Xu
, Jiankun Hu
:
Privacy-Preserving and Trusted Keyword Search for Multi-Tenancy Cloud. 4316-4330 - Yun Wen

, Gaojie Chen
, Sisai Fang
, Zheng Chu
, Pei Xiao
, Rahim Tafazolli
:
STAR-RIS-Assisted-Full-Duplex Jamming Design for Secure Wireless Communications System. 4331-4343 - Sangwoo Hong

, Heecheol Yang
, Youngseok Yoon, Jungwoo Lee
:
Group-Wise Verifiable Coded Computing Under Byzantine Attacks and Stragglers. 4344-4357 - Xue-Yang Li

, Xue Yang
, Zhengchun Zhou
, Rongxing Lu
:
Efficiently Achieving Privacy Preservation and Poisoning Attack Resistance in Federated Learning. 4358-4373 - Bo Jiang

, Ming Li
, Ravi Tandon
:
Online Context-Aware Streaming Data Release With Sequence Information Privacy. 4390-4405 - Ye Yao

, Chen Wang, Hui Wang
, Ke Wang
, Yizhi Ren
, Weizhi Meng
:
Embedding Secret Message in Chinese Characters via Glyph Perturbation and Style Transfer. 4406-4419 - Jan Butora

, Patrick Bas
:
Size-Independent Reliable CNN for RJCA Steganalysis. 4420-4431 - Qingqing Hu

, Tianrui Lin
, Tianjian Wei, Nuo Huang
, Yi-Jun Zhu
, Chen Gong
:
Covert Transmission in Water-to-Air Optical Wireless Communication Systems. 4432-4447 - Chuang Tian

, Jianfeng Ma
, Teng Li
, Junwei Zhang
, Chengyan Ma
, Ning Xi
:
Provably and Physically Secure UAV-Assisted Authentication Protocol for IoT Devices in Unattended Settings. 4448-4463 - Ning Wang

, Jixuan Duan, Biwen Chen
, Shangwei Guo
, Tao Xiang
, Kai Zeng
:
Efficient Group Key Generation Based on Satellite Cluster State Information for Drone Swarm. 4464-4479 - Francesco Ardizzon

, Laura Crosara
, Stefano Tomasin
, Nicola Laurenti
:
On Mixing Authenticated and Non-Authenticated Signals Against GNSS Spoofing. 4480-4493 - Zehu Zhang

, Yanping Li
:
NSPFL: A Novel Secure and Privacy-Preserving Federated Learning With Data Integrity Auditing. 4494-4506 - Chunlei Peng

, Zimin Miao
, Decheng Liu
, Nannan Wang
, Ruimin Hu, Xinbo Gao
:
Where Deepfakes Gaze at? Spatial-Temporal Gaze Inconsistency Analysis for Video Face Forgery Detection. 4507-4517 - Xuejiao Luo

, Xiaohui Han
, Wenbo Zuo, Xiaoming Wu, Wenyin Liu
:
MLaD²: A Semi-Supervised Money Laundering Detection Framework Based on Decoupling Training. 4518-4533 - Guoyu Yang

, Chang Chen
, Qi Chen
, Jianan Jiang, Jin Li
, Debiao He
:
Sweeper: Breaking the Validity-Latency Tradeoff in Asynchronous Common Subset. 4534-4546 - Xiaojun Jia

, Jianshu Li, Jindong Gu
, Yang Bai
, Xiaochun Cao
:
Fast Propagation Is Better: Accelerating Single-Step Adversarial Training via Sampling Subnetworks. 4547-4559 - Yuan Xun

, Xiaojun Jia
, Jindong Gu
, Xinwei Liu, Qing Guo
, Xiaochun Cao
:
Minimalism is King! High-Frequency Energy-Based Screening for Data-Efficient Backdoor Attacks. 4560-4571 - Lipeng Wang

, Mingsheng Hu, Zhijuan Jia
, Zhi Guan, Zhong Chen
:
SStore: An Efficient and Secure Provable Data Auditing Platform for Cloud. 4572-4584 - Xuelian Cao

, Zheng Yang
, Jianting Ning
, Chenglu Jin
, Rongxing Lu
, Zhiming Liu
, Jianying Zhou
:
Dynamic Group Time-Based One-Time Passwords. 4897-4913 - Mingzhe Zhai

, Qianhong Wu
, Yizhong Liu
, Bo Qin
, Xiaopeng Dai
, Qiyuan Gao
, Willy Susilo
:
Secret Multiple Leaders & Committee Election With Application to Sharding Blockchain. 5060-5074 - Peng Xiao

, Qibin Xiao
, Xusheng Zhang
, Yumei Wu
, Fengyu Yang
:
Vulnerability Detection Based on Enhanced Graph Representation Learning. 5120-5135 - Rawad Bitar

, Maximilian Egger
, Antonia Wachter-Zeh
, Marvin Xhemrishi
:
Sparsity and Privacy in Secret Sharing: A Fundamental Trade-Off. 5136-5150 - Renyang Liu

, Wei Zhou
, Tianwei Zhang
, Kangjie Chen
, Jun Zhao
, Kwok-Yan Lam
:
Boosting Black-Box Attack to Deep Neural Networks With Conditional Diffusion Models. 5207-5219 - Taesik Nam

, Dong-Hoon Choi
, Euibum Lee
, Han-Shin Jo
, Jong-Gwan Yook
:
Data Generation and Augmentation Method for Deep Learning-Based VDU Leakage Signal Restoration Algorithm. 5220-5234 - Pengyu Li

, Dan Ye
:
Vulnerability Analysis of Distributed State Estimator Under False Data Injection Attacks. 5235-5244 - Peng Tang

, Guoru Ding
, Yitao Xu
, Yutao Jiao
, Yehui Song, Guofeng Wei
:
Causal Learning for Robust Specific Emitter Identification Over Unknown Channel Statistics. 5316-5329 - Weinan Guan

, Wei Wang
, Jing Dong
, Bo Peng
:
Improving Generalization of Deepfake Detectors by Imposing Gradient Regularization. 5345-5356 - Mohammad Moltafet

, Hamid R. Sadjadpour
, Zouheir Rezki
:
On the Semantic Security in the General Bounded Storage Model: A New Proof. 4263-4271 - Xixi Zhang, Qin Wang

, Maoyang Qin, Yu Wang
, Tomoaki Ohtsuki
, Bamidele Adebisi
, Hikmet Sari
, Guan Gui
:
Enhanced Few-Shot Malware Traffic Classification via Integrating Knowledge Transfer With Neural Architecture Search. 5245-5256 - Ahmed Aly

, Shahrear Iqbal
, Amr M. Youssef
, Essam Mansour:
MEGR-APT: A Memory-Efficient APT Hunting System Based on Attack Representation Learning. 5257-5271 - Songnian Zhang

, Rongxing Lu
, Hui Zhu
, Yandong Zheng
, Yunguo Guan, Fengwei Wang
, Jun Shao
, Hui Li
:
Performance Enhanced Secure Spatial Keyword Similarity Query With Arbitrary Spatial Ranges. 5272-5285 - Zhankai Li

, Weiping Wang
, Jie Li
, Kai Chen
, Shigeng Zhang
:
Foolmix: Strengthen the Transferability of Adversarial Examples by Dual-Blending and Direction Update Strategy. 5286-5300 - Ruiqi Kong

, He Henry Chen
:
CSI-RFF: Leveraging Micro-Signals on CSI for RF Fingerprinting of Commodity WiFi. 5301-5315 - Gehui Xu

, Guanpu Chen
, Zhaoyang Cheng
, Yiguang Hong
, Hongsheng Qi
:
Consistency of Stackelberg and Nash Equilibria in Three-Player Leader-Follower Games. 5330-5344 - Xiangli Xiao

, Yushu Zhang
, Zhongyun Hua
, Zhihua Xia
, Jian Weng
:
Client-Side Embedding of Screen-Shooting Resilient Image Watermarking. 5357-5372 - Tianyu Lu

, Liquan Chen
, Junqing Zhang
, Chen Chen
, Trung Q. Duong
:
Reconfigurable Intelligent Surface-Assisted Key Generation for Millimeter-Wave Multi-User Systems. 5373-5388 - Mingyang Zhao

, Chuan Zhang
, Tong Wu
, Jianbing Ni
, Ximeng Liu
, Liehuang Zhu
:
Revocable and Privacy-Preserving Bilateral Access Control for Cloud Data Sharing. 5389-5404 - Jianrong Lu

, Shengshan Hu
, Wei Wan
, Minghui Li
, Leo Yu Zhang
, Lulu Xue, Hai Jin
:
Depriving the Survival Space of Adversaries Against Poisoned Gradients in Federated Learning. 5405-5418 - Haoxuan Yang

, Changgen Peng
:
CP-IPFE: Ciphertext-Policy Based Inner Product Functional Encryption. 5419-5433 - Zhibo Zhang

, Lei Zhang
, Guangliang Yang
, Yanjun Chen
, Jiahao Xu, Min Yang
:
The Dark Forest: Understanding Security Risks of Cross-Party Delegated Resources in Mobile App-in-App Ecosystems. 5434-5448 - Ziad Tariq Muhammad Ali

, Ameer Mohammed
, Imtiaz Ahmad
:
Vulnerability of Deep Forest to Adversarial Attacks. 5464-5475 - Minxiao Wang, Ning Yang, Nicolas J. Forcade-Perkins, Ning Weng:

ProGen: Projection-Based Adversarial Attack Generation Against Network Intrusion Detection. 5476-5491 - Feng Liu

, Wenfeng Zeng
, Yin Li
, Linlin Shen
:
A Lightweight and Noise-Robust Method for Internal OCT Fingerprint Reconstruction. 5492-5505 - Cong Hu

, Yuanbo Li
, Zhenhua Feng
, Xiaojun Wu
:
Toward Transferable Attack via Adversarial Diffusion in Face Recognition. 5506-5519 - Alberto Huertas Celdrán

, Pedro Miguel Sánchez Sánchez
, Jan von der Assen, Timo Schenk, Gérôme Bovet
, Gregorio Martínez Pérez
, Burkhard Stiller
:
RL and Fingerprinting to Select Moving Target Defense Mechanisms for Zero-Day Attacks in IoT. 5520-5529 - Man Zhang

, Xinghua Li
, Yinbin Miao
, Bin Luo
, Wanyun Xu, Yanbing Ren
, Robert H. Deng
:
Privacy-Preserved Data Disturbance and Truthfulness Verification for Data Trading. 5545-5560 - Lang Pu

, Chao Lin
, Jingjing Gu
, Xinyi Huang
, Debiao He
:
Generic Construction of Conditional Privacy-Preserving Certificateless Signatures With Efficient Instantiations for VANETs. 5449-5463 - Erik Pohle

, Aysajan Abidin
, Bart Preneel
:
Fast Evaluation of S-Boxes With Garbled Circuits. 5530-5544 - Xun Chen

, Fujun Gao
, Min Qiu
, Jia Zhang
, Feng Shu
, Shihao Yan
:
Achieving Covert Communication With a Probabilistic Jamming Strategy. 5561-5574 - Zhi Lu

, Songfeng Lu
, Yongquan Cui
, Xueming Tang
, Junjun Wu
:
Split Aggregation: Lightweight Privacy-Preserving Federated Learning Resistant to Byzantine Attacks. 5575-5590 - Alberto Maria Mongardini

, Massimo La Morgia
, Sushil Jajodia
, Luigi Vincenzo Mancini
, Alessandro Mei
:
DARD: Deceptive Approaches for Robust Defense Against IP Theft. 5591-5606 - Bowen Zhao

, Weiquan Deng
, Xiaoguo Li
, Ximeng Liu
, Qingqi Pei
, Robert H. Deng
:
SOCI+: An Enhanced Toolkit for Secure Outsourced Computation on Integers. 5607-5619 - Peng Jiang

, Jun Zhu, Liehuang Zhu
:
Balancing Privacy and Regulation of Cross-Chain Transaction Systems via SoK-Assisted Policy Enhancement. 5620-5629 - Ni Ding

:
Approximation of Pufferfish Privacy for Gaussian Priors. 5630-5640 - Weiyang Xu

, Ruiguang Wang, Yuan Zhang, Hien Quoc Ngo
, Wei Xiang
:
Pilot Spoofing Attack on the Downlink of Cell-Free Massive MIMO: From the Perspective of Adversaries. 5641-5654 - Wenshu Fan

, Hongwei Li
, Wenbo Jiang
, Meng Hao
, Shui Yu
, Xiao Zhang
:
Stealthy Targeted Backdoor Attacks Against Image Captioning. 5655-5667 - Mert Nakip

, Erol Gelenbe
:
Online Self-Supervised Deep Learning for Intrusion Detection Systems. 5668-5683 - Fan Yang

, Hao Cheng, Shanxiang Lyu
, Jinming Wen, Hao Chen:
Lattice-Aided Extraction of Spread-Spectrum Hidden Data. 5684-5695 - Yu Zhang

, Shuangrui Zhao
, Yulong Shen
, Xiaohong Jiang
, Norio Shiratori
:
Enhancing the Physical Layer Security of Two-Way Relay Systems With RIS and Beamforming. 5696-5711 - Xiongjun Guan

, Jianjiang Feng
, Jie Zhou
:
Phase-Aggregated Dual-Branch Network for Efficient Fingerprint Dense Registration. 5712-5724 - Lijuan Huo

, Libing Wu
, Zhuangzhuang Zhang
, Chunshuo Li, Debiao He
, Jing Wang:
Libras: A Fair, Secure, Verifiable, and Scalable Outsourcing Computation Scheme Based on Blockchain. 5725-5737 - Wenke Huang

, Yuxia Liu
, Mang Ye
, Jun Chen
, Bo Du
:
Federated Learning With Long-Tailed Data via Representation Unification and Classifier Rectification. 5738-5750 - Guanhong Miao

, Samuel S. Wu:
Efficient Privacy-Preserving Logistic Model With Malicious Security. 5751-5766 - Jorge David de Hoz Diego

, Taous Madi, Charalambos Konstantinou
:
CMXsafe: A Proxy Layer for Securing Internet-of-Things Communications. 5767-5782 - Takumi Fukami

, Tomoya Murata
, Kenta Niwa
, Iifan Tyou
:
DP-Norm: Differential Privacy Primal-Dual Algorithm for Decentralized Federated Learning. 5783-5797 - Yudi Zhou, Yan Huo

, Qinghe Gao
, Yue Wu, Tao Jing
, Jian Mao
:
Securing Collaborative Authentication: A Weighted Voting Strategy to Counter Unreliable Cooperators. 5798-5813 - Yinbin Miao

, Xinru Yan
, Xinghua Li
, Shujiang Xu
, Ximeng Liu
, Hongwei Li
, Robert H. Deng
:
RFed: Robustness-Enhanced Privacy-Preserving Federated Learning Against Poisoning Attack. 5814-5827 - Yinbin Miao

, Da Kuang
, Xinghua Li
, Shujiang Xu
, Hongwei Li
, Kim-Kwang Raymond Choo
, Robert H. Deng
:
Privacy-Preserving Asynchronous Federated Learning Under Non-IID Settings. 5828-5841 - Lingjie Zhang

, Hai Zhang
:
Shuffle Private Decentralized Convex Optimization. 5842-5851 - Hanbo Cai

, Pengcheng Zhang
, Hai Dong
, Yan Xiao
, Stefanos Koffas
, Yiming Li
:
Toward Stealthy Backdoor Attacks Against Speech Recognition via Elements of Sound. 5852-5866 - Pedro Reviriego

, Jim Apple
, David Larrabeiti
, Shanshan Liu
, Fabrizio Lombardi
:
On the Privacy of Adaptive Cuckoo Filters: Analysis and Protection. 5867-5879 - Yulong Yang

, Haoran Fan
, Chenhao Lin
, Qian Li
, Zhengyu Zhao
, Chao Shen
:
Exploiting the Adversarial Example Vulnerability of Transfer Learning of Source Code. 5880-5894 - Ying Zhong

, Zhiliang Wang
, Xingang Shi
, Jiahai Yang
, Keqin Li
:
RFG-HELAD: A Robust Fine-Grained Network Traffic Anomaly Detection Model Based on Heterogeneous Ensemble Learning. 5895-5910 - Meiqi Li, Xinyi Luo, Kaiping Xue

, Yingjie Xue
, Wentuo Sun, Jian Li
:
A Secure and Efficient Blockchain Sharding Scheme via Hybrid Consensus and Dynamic Management. 5911-5924 - Ronghua Li

, Haibo Hu
, Qingqing Ye
:
RFTrack: Stealthy Location Inference and Tracking Attack on Wi-Fi Devices. 5925-5939 - Datian Peng

, Jianmin Dong
, Mingjiang Zhang, Jungang Yang, Zhen Wang
:
CSFAdv: Critical Semantic Fusion Guided Least-Effort Adversarial Example Attacks. 5940-5955 - Chit-Jie Chew

, Wei-Bin Lee, Tzu-Li Sung, Ying-Chin Chen, Shiuh-Jeng Wang, Jung-San Lee
:
Lawful Remote Forensics Mechanism With Admissibility of Evidence in Stochastic and Unpredictable Transnational Crime. 5956-5970 - Tairong Shi

, Wenling Wu
, Bin Hu
, Jie Guan
, Han Sui, Senpeng Wang
, Mengyuan Zhang
:
Dedicated Quantum Attacks on XOR-Type Function With Applications to Beyond-Birthday- Bound MACs. 5971-5984 - Eldor Abdukhamidov

, Mohammed Abuhamad
, George K. Thiruvathukal
, Hyoungshick Kim
, Tamer Abuhmed
:
SingleADV: Single-Class Target-Specific Attack Against Interpretable Deep Learning Systems. 5985-5998 - Songlei Wang

, Yifeng Zheng
, Xiaohua Jia
, Cong Wang
:
eGrass: An Encrypted Attributed Subgraph Matching System With Malicious Security. 5999-6014 - Jianze Wei

, Yunlong Wang, Xingyu Gao
, Ran He
, Zhenan Sun
:
Multi-Faceted Knowledge-Driven Graph Neural Network for Iris Segmentation. 6015-6027 - Hengye Zhu

, Mengxiang Liu
, Binbin Chen
, Xin Che, Peng Cheng
, Ruilong Deng
:
HoneyJudge: A PLC Honeypot Identification Framework Based on Device Memory Testing. 6028-6043 - Dengke Guo

, Dongtang Ma
, Jun Xiong
, Xiaoran Liu
, Jibo Wei
:
On the Secret-Key Capacity Over Multipath Fading Channel. 6044-6054 - Yijing Chen

, Hongxia Wang
, Wanjie Li
, Wenshan Li:
A Steganography Immunoprocessing Framework Against CNN-Based and Handcrafted Steganalysis. 6055-6069 - Chengxin Li

, Saiqin Long, Haolin Liu
, Youngjune Choi, Hiroo Sekiya, Zhetao Li
:
Enhancing Sparse Mobile CrowdSensing With Manifold Optimization and Differential Privacy. 6070-6083 - Yang Yang

, Wenyi Xue
, Jianfei Sun
, Guomin Yang
, Yingjiu Li
, HweeHwa Pang
, Robert H. Deng
:
PkT-SIN: A Secure Communication Protocol for Space Information Networks With Periodic k-Time Anonymous Authentication. 6097-6112 - Huan Zhang

, Lixin Zhao
, Aimin Yu
, Lijun Cai, Dan Meng:
Ranker: Early Ransomware Detection Through Kernel-Level Behavioral Analysis. 6113-6127 - Chao Jing

, Chaoyuan Cui
, Yun Wu:
SIa-CBc: Sensitive Intent-Assisted and Crucial Behavior-Cognized Malware Detection Based on Human Brain Cognitive Theory. 6128-6143 - Liaogehao Chen

, Zhenjun Zhang
, Yang Xiao
, Yaonan Wang
:
EGST: An Efficient Solution for Human Gaits Recognition Using Neuromorphic Vision Sensor. 6144-6154 - Dmitrijs Trizna

, Luca Demetrio
, Battista Biggio
, Fabio Roli
:
Nebula: Self-Attention for Dynamic Malware Analysis. 6155-6167 - Shouyin Xu

, Yuewu Wang
, Lingguang Lei
, Kun Sun
, Jiwu Jing
, Siyuan Ma, Jie Wang
, Heqing Huang:
Condo: Enhancing Container Isolation Through Kernel Permission Data Protection. 6168-6183 - Jingwei Hu

, Yongjun Zhao
, Benjamin Hong Meng Tan
, Khin Mi Mi Aung
, Huaxiong Wang
:
Enabling Threshold Functionality for Private Set Intersection Protocols in Cloud Computing. 6184-6196 - Mi Song

, Ding Wang
:
AB-PAKE: Achieving Fine-Grained Access Control and Flexible Authentication. 6197-6212 - Davide Alessandro Coccomini

, Giorgos Kordopatis-Zilos, Giuseppe Amato
, Roberto Caldelli
, Fabrizio Falchi
, Symeon Papadopoulos
, Claudio Gennaro:
MINTIME: Multi-Identity Size-Invariant Video Deepfake Detection. 6084-6096 - Ángeles Vázquez-Castro

, Andreas J. Winter
, Hugo Zbinden:
Quantum Keyless Private Communication With Decoy States for Space Channels. 6213-6224 - Yiran Wang

, Jing Bai
, Zhu Xiao
, Zheng Chen, Yong Xiong
, Hongbo Jiang
, Licheng Jiao
:
AutoSMC: An Automated Machine Learning Framework for Signal Modulation Classification. 6225-6236 - Yandong Zheng

, Hui Zhu
, Rongxing Lu
, Songnian Zhang
, Yunguo Guan, Fengwei Wang
, Jun Shao
, Hui Li
:
Secure Similarity Queries Over Vertically Distributed Data via TEE-Enhanced Cloud Computing. 6237-6251 - Ke Han

, Yan Huang
, Liang Wang
, Zikun Liu
:
Self-Supervised Recovery and Guide for Low-Resolution Person Re-Identification. 6252-6263 - Jinwoo Kim

, Minjae Seo
, Eduard Marin
, Seungsoo Lee
, Jaehyun Nam
, Seungwon Shin
:
Ambusher: Exploring the Security of Distributed SDN Controllers Through Protocol State Fuzzing. 6264-6279 - Qizao Wang

, Xuelin Qian
, Bin Li
, Xiangyang Xue
, Yanwei Fu
:
Exploring Fine-Grained Representation and Recomposition for Cloth-Changing Person Re-Identification. 6280-6292 - Yajie Wang

, Yi Wu
, Shangbo Wu, Ximeng Liu
, Wanlei Zhou
, Liehuang Zhu
, Chuan Zhang
:
Boosting the Transferability of Adversarial Attacks With Frequency-Aware Perturbation. 6293-6304 - Yuwei Wang

, Li Sun
, Qinghe Du
:
Multi-Antenna Signal Masking and Round-Trip Transmission for Privacy-Preserving Wireless Sensing. 6305-6320 - Yunlong Mao

, Zhujing Ye, Xinyu Yuan, Sheng Zhong
:
Secure Model Aggregation Against Poisoning Attacks for Cross-Silo Federated Learning With Robustness and Fairness. 6321-6336 - Zihou Zhang, Jiangtao Li

, Yufeng Li
, Chenhong Cao
, Zhenfu Cao
:
Hardware Secure Module Based Lightweight Conditional Privacy-Preserving Authentication for VANETs. 6337-6350 - Mengdi Hu, Lanxiang Chen

, Gaolin Chen
, Yi Mu
, Robert H. Deng
:
A Pruned Pendant Vertex Based Index for Shortest Distance Query Under Structured Encrypted Graph. 6351-6363 - Yinghua Gao

, Yiming Li
, Xueluan Gong
, Zhifeng Li
, Shu-Tao Xia
, Qian Wang
:
Backdoor Attack With Sparse and Invisible Trigger. 6364-6376 - Yuyang Zhou

, Guang Cheng
, Shui Yu
, Zongyao Chen
, Yujia Hu
:
MTDroid: A Moving Target Defense-Based Android Malware Detector Against Evasion Attacks. 6377-6392 - Zhenyong Zhang

, Kedi Yang
, Youliang Tian
, Jianfeng Ma
:
An Anti-Disguise Authentication System Using the First Impression of Avatar in Metaverse. 6393-6408 - Zefeng Lu

, Ronghao Lin
, Haifeng Hu
:
Mind the Inconsistent Semantics in Positive Pairs: Semantic Aligning and Multimodal Contrastive Learning for Text-Based Pedestrian Search. 6409-6424 - Shiyu Li

, Yuan Zhang
, Yaqing Song
, Hongbo Liu
, Nan Cheng
, Dahai Tao, Hongwei Li
, Kan Yang
:
Beyond Security: Achieving Fairness in Mailmen-Assisted Timed Data Delivery. 6425-6440 - Cong Wu

, Jing Chen
, Qianru Fang, Kun He
, Ziming Zhao, Hao Ren, Guowen Xu
, Yang Liu
, Yang Xiang
:
Rethinking Membership Inference Attacks Against Transfer Learning. 6441-6454 - Ahmed Abd Elaziz Elsayed

, Hadi Khani
, Hany Essa Zidan Farag
:
A Feasibility Area Approach for Early Stage Detection of Stealthy Infiltrated Cyberattacks in Power Systems. 6455-6470 - Yunqi Miao

, Jiankang Deng
, Guiguang Ding
, Jungong Han
:
Confidence-Guided Centroids for Unsupervised Person Re-Identification. 6471-6483 - Haoran Gao

, Hua Zhang
, Jiahui Wang
, Xin Zhang
, Huawei Wang
, Wenmin Li, Tengfei Tu
:
NUAT-GAN: Generating Black-Box Natural Universal Adversarial Triggers for Text Classifiers Using Generative Adversarial Networks. 6484-6498 - Meiyan Xiao

, Qiong Huang
, Wenya Chen
, Chuan Lyu, Willy Susilo
:
Domain-Specific Fine-Grained Access Control for Cloud-Edge Collaborative IoT. 6499-6513 - Seung-Hyun Nam

, Vincent Y. F. Tan
, Si-Hyeon Lee
:
Optimal Private Discrete Distribution Estimation With 1-bit Communication. 6514-6528 - Bin Li

, Jincheng Chen, Yuxiong Xu
, Weixiang Li
, Zhenghui Liu
:
DRAW: Dual-Decoder-Based Robust Audio Watermarking Against Desynchronization and Replay Attacks. 6529-6544 - Ruohan Meng

, Chenyu Yi
, Yi Yu
, Siyuan Yang
, Bingquan Shen
, Alex C. Kot
:
Semantic Deep Hiding for Robust Unlearnable Examples. 6545-6558 - Wenkang Su

, Jiangqun Ni
, Xianglei Hu
, Bin Li
:
Efficient Audio Steganography Using Generalized Audio Intrinsic Energy With Micro-Amplitude Modification Suppression. 6559-6572 - Peiqi Jiang

, Hongtao Xie
, Lingyun Yu
, Guoqing Jin
, Yongdong Zhang
:
Exploring Bi-Level Inconsistency via Blended Images for Generalizable Face Forgery Detection. 6573-6588 - Seungkwang Lee

, Jeong-Nyeo Kim:
Balanced Encoding of Near-Zero Correlation for an AES Implementation. 6589-6603 - Zizhen Liu, Weiyang He, Chip-Hong Chang

, Jing Ye
, Huawei Li
, Xiaowei Li
:
SPFL: A Self-Purified Federated Learning Method Against Poisoning Attacks. 6604-6619 - Zhao Zhang

, Chunxiang Xu
, Yunxia Han
:
Privacy-Preserving Cryptocurrency With Threshold Authentication and Regulation. 6620-6635 - Zexin Fan

, Kejiang Chen
, Kai Zeng
, Jiansong Zhang
, Weiming Zhang
, Nenghai Yu
:
Natias: Neuron Attribution-Based Transferable Image Adversarial Steganography. 6636-6649 - Zhiwei Li

, Min Ren
, Qi Li
, Fangling Jiang
, Zhenan Sun
:
Improving Transferability of Adversarial Samples via Critical Region-Oriented Feature-Level Attack. 6650-6664 - Weifeng Yin, Lifeng Yuan

, Yizhi Ren
, Weizhi Meng
, Dong Wang
, Qiuhua Wang
:
Differential Cryptanalysis of Bloom Filters for Privacy-Preserving Record Linkage. 6665-6678 - Siddharth Dongre

, Hanif Rahbari
:
Fair and Secure 5G and Wi-Fi Coexistence Using Robust Implicit Channel Coordination. 6679-6692 - Abbas Yazdinejad

, Ali Dehghantanha
, Hadis Karimipour
, Gautam Srivastava
, Reza M. Parizi
:
A Robust Privacy-Preserving Federated Learning Model Against Model Poisoning Attacks. 6693-6708 - Julio César Pérez García

, An Braeken
, Abderrahim Benslimane
:
Blockchain-Based Group Key Management Scheme for IoT With Anonymity of Group Members. 6709-6721 - Renwan Bi

, Jinbo Xiong
, Changqing Luo
, Jianting Ning
, Ximeng Liu
, Youliang Tian
, Yan Zhang
:
Communication-Efficient Privacy-Preserving Neural Network Inference via Arithmetic Secret Sharing. 6722-6737 - Ali Shahidinejad

, Jemal H. Abawajy
, Shamsul Huda
:
Highly-Secure Yet Efficient Blockchain-Based CRL-Free Key Management Protocol for IoT-Enabled Smart Grid Environments. 6738-6750 - Chenhan Zhang

, Weiqi Wang
, Zhiyi Tian
, Shui Yu
:
Forgetting and Remembering Are Both You Need: Balanced Graph Structure Unlearning. 6751-6763 - Wenxi Liu

, Hao Zhang
, Xinyang Lin
, Qing Zhang
, Qi Li
, Xiaoxiang Liu
, Ying Cao
:
Attentive and Contrastive Image Manipulation Localization With Boundary Guidance. 6764-6778 - Yong Chen

, Xuedong Li, Peng Hu
, Dezhong Peng
, Xu Wang
:
DifFilter: Defending Against Adversarial Perturbations With Diffusion Filter. 6779-6794 - Man Zhou

, Wenyu Zhou
, Jie Huang, Junhui Yang, Minxin Du, Qi Li
:
Stealthy and Effective Physical Adversarial Attacks in Autonomous Driving. 6795-6809 - Zefang Lv

, Liang Xiao
, Yifan Chen, Haoyu Chen
, Xiangyang Ji
:
Safe Multi-Agent Reinforcement Learning for Wireless Applications Against Adversarial Communications. 6824-6839 - Jinyang Huang

, Jia-Xuan Bai, Xiang Zhang
, Zhi Liu
, Yuanhao Feng, Jianchun Liu
, Xiao Sun
, Mianxiong Dong
, Meng Li
:
KeystrokeSniffer: An Off-the-Shelf Smartphone Can Eavesdrop on Your Privacy From Anywhere. 6840-6855 - Jing Lei

, Le Wang
, Qingqi Pei
, Wenhai Sun
, Xiaodong Lin
, Xuefeng Liu
:
PrivGrid: Privacy-Preserving Individual Load Forecasting Service for Smart Grid. 6856-6870 - Linbo Luo

, Shangwei Xie
, Haiyan Yin
, Chunlei Peng
, Yew-Soon Ong
:
Detecting and Quantifying Crowd-Level Abnormal Behaviors in Crowd Events. 6810-6823 - Xueying Han

, Song Liu, Junrong Liu, Bo Jiang
, Zhigang Lu, Baoxu Liu:
ECNet: Robust Malicious Network Traffic Detection With Multi-View Feature and Confidence Mechanism. 6871-6885 - Yahan Deng

, Hao Yu
, Yuzhe Li
:
Stealthy Insider Attack on Stochastic Event-Triggered Scheduler: Dealing With Non-Gaussian Components. 6886-6895 - Haiyang Yu

, Hui Zhang, Zhen Yang
, Shui Yu
:
Edasvic: Enabling Efficient and Dynamic Storage Verification for Clouds of Industrial Internet Platforms. 6896-6909 - Yimin Liu

, Meibin Qi
, Yongle Zhang
, Qiang Wu
, Jingjing Wu
, Shuo Zhuang
:
Improving Consistency of Proxy-Level Contrastive Learning for Unsupervised Person Re-Identification. 6910-6922 - Honglong Chen

, Yudong Gao
, Anqing Zhang
, Peng Sun
, Nan Jiang
, Weifeng Liu
, Xingang Wang:
Investigating the Backdoor on DNNs Based on Recolorization and Reconstruction: From a Multi-Channel Perspective. 6923-6934 - Jie Deng

, Bin Wu
:
A Practical Data Trading Protocol for Sudoku Solutions. 6935-6948 - Min Ren

, Yuhao Zhu
, Yunlong Wang, Yongzhen Huang
, Zhenan Sun
:
Understanding Deep Face Representation via Attribute Recovery. 6949-6961 - Donghyun Yu

, Sungho Lee
, Ruei-Hau Hsu
, Jemin Lee
:
Ensuring End-to-End Security With Fine-Grained Access Control for Connected and Autonomous Vehicles. 6962-6977 - Yizhou Shen

, Carlton Shepherd
, Chuadhry Mujeeb Ahmed
, Shigen Shen
, Shui Yu
:
SGD3QN: Joint Stochastic Games and Dueling Double Deep Q-Networks for Defending Malware Propagation in Edge Intelligence-Enabled Internet of Things. 6978-6990 - Yubo Kong

, Zhong Li
, Changjun Jiang
:
ASIA: A Federated Boosting Tree Model Against Sequence Inference Attacks in Financial Networks. 6991-7004 - Ruoyu Li

, Qing Li
, Yucheng Huang, Qingsong Zou
, Dan Zhao
, Zhengxin Zhang
, Yong Jiang
, Fa Zhu
, Athanasios V. Vasilakos
:
SeIoT: Detecting Anomalous Semantics in Smart Homes via Knowledge Graph. 7005-7018 - Zhusen Liu

, Weizheng Wang
, Yutong Ye, Nan Min, Zhenfu Cao
, Lu Zhou
, Zhe Liu:
Collusion-Resilient and Maliciously Secure Cloud- Assisted Two-Party Computation Scheme in Mobile Cloud Computing. 7019-7032 - Justin Kong

, Fikadu T. Dagefu
, Terrence J. Moore
:
Covert Routing in Heterogeneous Networks. 7047-7059 - Chao Liu

, Cankun Hou
, Tianyu Jiang
, Jianting Ning
, Hui Qiao
, Yusen Wu
:
FACOS: Enabling Privacy Protection Through Fine-Grained Access Control With On-Chain and Off-Chain System. 7060-7074 - Yumeng Xie

, Qing Fan
, Chuan Zhang
, Tong Wu
, Yuao Zhou, Debiao He
, Liehuang Zhu
:
Accountable and Secure Threshold EdDSA Signature and Its Applications. 7033-7046 - Hualiang Luo

, Quanzhong Li
, Qi Zhang
:
Joint Secure Beamforming and Power Splitting Design for MIMO Relay Assisted Over-the-Air Computation Networks With Imperfect CSI. 7075-7090 - Yige Chen

, Yipeng Wang
:
MPAF: Encrypted Traffic Classification With Multi-Phase Attribute Fingerprint. 7091-7105 - Yaxuan Huang, Kaiping Xue

, Bin Zhu
, David S. L. Wei
, Qibin Sun
, Jun Lu
:
Joint Distribution Analysis for Set-Valued Data With Local Differential Privacy. 7106-7117 - Haopeng Fan

, Hailong Zhang
, Yongjuan Wang
, Wenhao Wang
, Yanbei Zhu
, Haojin Zhang
, Qingjun Yuan
:
Screening Least Square Technique Assisted Multivariate Template Attack Against the Random Polynomial Generation of Dilithium. 7118-7132 - Junyan Wu

, Qilin Yin
, Ziqi Sheng, Wei Lu
, Jiwu Huang, Bin Li
:
Audio Multi-View Spoofing Detection Framework Based on Audio-Text-Emotion Correlations. 7133-7146 - Minxiao Wang, Ning Yang, Ning Weng:

K-GetNID: Knowledge-Guided Graphs for Early and Transferable Network Intrusion Detection. 7147-7160 - Ximing Li

, Linghui Li
, Xiaoyong Li
, Binsi Cai
, Jia Jia
, Yali Gao
, Shui Yu
:
GMFITD: Graph Meta-Learning for Effective Few-Shot Insider Threat Detection. 7161-7175 - Kyeongjin Ahn, SeungEon Lee

, Sungwon Han, Cheng-Yaw Low
, Meeyoung Cha:
Uncertainty-Aware Face Embedding With Contrastive Learning for Open-Set Evaluation. 7176-7186 - Chengchao Li

, Fengde Xu
, Yuhan Wang
, Xudong Zhao
:
Data-Driven Dynamic Periodic Event-Triggered Control of Cyber-Physical Systems Under Packet Dropouts and DoS Attacks. 7187-7199 - Armin Darjani

, Nima Kavand
, Shubham Rai
, Akash Kumar
:
Thwarting GNN-Based Attacks Against Logic Locking. 7200-7215 - Yuwen Qian

, Guodong Huang, Chuan Ma
, Ming Ding
, Long Yuan
, Zi Chen
, Kai Wang
:
Enhancing Resilience in Website Fingerprinting: Novel Adversary Strategies for Noisy Traffic Environments. 7216-7231 - Fucai Luo

, Haiyan Wang
, Xingfu Yan
, Jiahui Wu
:
Key-Policy Attribute-Based Encryption With Switchable Attributes for Fine-Grained Access Control of Encrypted Data. 7245-7258 - Fangtian Zhong

, Qin Hu
, Yili Jiang
, Jiaqi Huang
, Cheng Zhang
, Dinghao Wu:
Enhancing Malware Classification via Self-Similarity Techniques. 7232-7244 - Hongming Fei, Owen Millwood, Prosanta Gope

, Jack Miskelly
, Biplab Sikdar
:
Attacking Delay-Based PUFs With Minimal Adversarial Knowledge. 7259-7274 - Qingxuan Lv

, Yuezun Li
, Junyu Dong
, Sheng Chen
, Hui Yu
, Huiyu Zhou
, Shu Zhang
:
DomainForensics: Exposing Face Forgery Across Domains via Bi-Directional Adaptation. 7275-7289 - Saihui Hou

, Xuecai Hu
, Chunshui Cao
, Xu Liu
, Yongzhen Huang
:
Adaptive Knowledge Transfer for Weak-Shot Gait Recognition. 7290-7303 - Stefan Rass

, Sandra König
, Shahzad Ahmad
, Maksim Goman
:
Metricizing the Euclidean Space Toward Desired Distance Relations in Point Clouds. 7304-7319 - Loukas Ilias

, Ioannis Michail Kazelidis
, Dimitris Askounis
:
Multimodal Detection of Bots on X (Twitter) Using Transformers. 7320-7334 - Wei Xu

, Hui Zhu
, Yandong Zheng
, Fengwei Wang
, Jiafeng Hua, Dengguo Feng, Hui Li
:
ToNN: An Oblivious Neural Network Prediction Scheme With Semi-Honest TEE. 7335-7348 - Zhisheng Yao

, Yang Peng
, Yu Wang
, Congan Xu
, Juzhen Wang
, Yun Lin
, Guan Gui
:
A Novel Radio Frequency Fingerprint Concealment Method Based on IQ Imbalance Compensation and Digital Pre-Distortion. 7349-7361 - Yujing Pang

, Guangming Zhuang
, Jianwei Xia
, Xiangpeng Xie
:
Fault Detection and Robust Security Control for Implicit Jump Systems Against Random FDI Attacks and Packet Loss Under Memorized Output-Perceptive Event-Triggered Protocol. 7362-7373 - Qing Wang

, Donghui Hu
, Meng Li
, Guomin Yang
:
Secure and Flexible Wildcard Queries. 7374-7388 - Mingyu Wang

, Fangyu Zheng
, Jingqiang Lin
, Fangjie Jiang, Yuan Ma
:
ZeroShield: Transparently Mitigating Code Page Sharing Attacks With Zero-Cost Stand-By. 7389-7403 - Zekai Chen

, Shengxing Yu, Farong Chen, Fuyi Wang
, Ximeng Liu
, Robert H. Deng
:
Lightweight Privacy-Preserving Cross-Cluster Federated Learning With Heterogeneous Data. 7404-7419 - Xiao Sun

, Haining Yu
, Zhichao Liu, Xiaohua Jia
:
MI-VFDNN: An Efficient Vertical Federated Deep Neural Network With Multi-Layer Interaction. 7435-7448 - Zachary McBride Lazri

, Ivan Brugere, Xin Tian
, Dana Dachman-Soled
, Antigoni Polychroniadou, Danial Dervovic
, Min Wu
:
A Canonical Data Transformation for Achieving Inter- and Within-Group Fairness. 7449-7464 - Chen Chen, Haibo Hong

, Tao Xiang
, Mande Xie:
Anti-Backdoor Model: A Novel Algorithm to Remove Backdoors in a Non-Invasive Way. 7420-7434 - Atefeh Zareh Chahoki

, Hamid Reza Shahriari
, Marco Roveri
:
CryptojackingTrap: An Evasion Resilient Nature-Inspired Algorithm to Detect Cryptojacking Malware. 7465-7477 - Raphael Alper

, Mordechai Guri
:
TrueWatch: Polygraph Examination With Smartwatches. 7478-7491 - Wei Wang

, Licheng Wang
, Junke Duan
, Xiaofei Tong, Haipeng Peng
:
Redactable Blockchain Based on Decentralized Trapdoor Verifiable Delay Functions. 7492-7507 - Xiaohai Dai

, Zhaonan Zhang, Zhengxuan Guo
, Chaozheng Ding
, Jiang Xiao
, Xia Xie, Rui Hao
, Hai Jin
:
Wahoo: A DAG-Based BFT Consensus With Low Latency and Low Communication Overhead. 7508-7522 - Yu-Chi Chen

, Jhe-Kai Yang
, Hsin-Chan Yen, Pei-Wen Lin:
Dual-Cloud Multi-Secret Sharing Architecture for Privacy Preserving Persistent Computation. 7523-7535 - Xinye Zhou

, Hu Han
, Shiguang Shan
, Xilin Chen
:
Fine-Grained Open-Set Deepfake Detection via Unsupervised Domain Adaptation. 7536-7547 - Lan Yao

, Xia Huang
, Zhen Wang
, Hao Shen
:
A Multi-Sensor-Based Switching Event-Triggered Mechanism for Synchronization Control of Markovian Jump Neural Networks Under DoS Attacks. 7548-7559 - Junke Duan

, Wei Wang
, Licheng Wang
, Lize Gu
:
Controlled Redactable Blockchain Based on T-Times Chameleon Hash and Signature. 7560-7572 - Ning Gao

, Yuze Yao, Shi Jin
, Cen Li, Michail Matthaiou
:
Integrated Communications and Security: RIS-Assisted Simultaneous Transmission and Generation of Secret Keys. 7573-7587 - Yicheng Cai

, Haizhou Wang
, Hao Cao, Wenxian Wang, Lei Zhang
, Xingshu Chen
:
Detecting Spam Movie Review Under Coordinated Attack With Multi-View Explicit and Implicit Relations Semantics Fusion. 7588-7603 - Lunke Fei

, Le Su
, Bob Zhang
, Shuping Zhao
, Jie Wen
, Xiaoping Li
:
Learning Frequency-Aware Common Feature for VIS-NIR Heterogeneous Palmprint Recognition. 7604-7618 - Xiaobin Tan

, Chuang Peng
, Peng Xie, Hao Wang, Mengxiang Li, Shuangwu Chen
, Cliff C. Zou:
Inter-Flow Spatio-Temporal Correlation Analysis Based Website Fingerprinting Using Graph Neural Network. 7619-7632 - Yaguan Qian

, Kecheng Chen
, Bin Wang, Zhaoquan Gu
, Shouling Ji
, Wei Wang
, Yanchun Zhang
:
Enhancing Transferability of Adversarial Examples Through Mixed-Frequency Inputs. 7633-7645 - Yaxuan Huang, Kaiping Xue

, Bin Zhu
, Jingcheng Zhao
, Ruidong Li
:
Collecting Partial Ordered Data With Local Differential Privacy. 7646-7658 - Renjie Xie

, Jiahao Cao
, Yuxi Zhu
, Yixiang Zhang
, Yi He
, Hanyi Peng, Yixiao Wang
, Mingwei Xu
, Kun Sun
, Enhuan Dong
, Qi Li
, Menghao Zhang
, Jiang Li:
Cactus: Obfuscating Bidirectional Encrypted TCP Traffic at Client Side. 7659-7673 - Jing Zhang

, Ruonan Ying
, Jie Cui
, Hong Zhong
, Irina Bolodurina
, Debiao He
:
Secure and Efficient User-Centric V2C Communication for Intelligent Cyber-Physical Transportation System. 7674-7689 - Xinlong Yang

, Haixin Wang
, Jinan Sun
, Yijia Xiao, Wei Xiang
, Chong Chen, Xian-Sheng Hua
, Xiao Luo
:
ROSE: Relational and Prototypical Structure Learning for Universal Domain Adaptive Hashing. 7690-7704 - Guangyuan Gao, Weina Niu

, Jiacheng Gong
, Dujuan Gu, Song Li, Mingxue Zhang
, Xiaosong Zhang
:
GraphTunnel: Robust DNS Tunnel Detection Based on DNS Recursive Resolution Graph. 7705-7719 - Jingon Joung

, Chau Yuen
:
Space-Time Line Code Hopping for Physical-Layer Secure Communications. 7720-7729 - Yujie Song

, Yue Cao
, Chaklam Cheong
, Debiao He
, Kim-Kwang Raymond Choo
, Juan Wang
:
CAT: A Consensus-Adaptive Trust Management Based on the Group Decision Making in IoVs. 7730-7743 - Chen Li

, Jianting Ning
, Shengmin Xu
, Chao Lin
, Jiguo Li
, Jian Shen
:
DTACB: Dynamic Threshold Anonymous Credentials With Batch-Showing. 7744-7758 - Jiaxuan Fu

, Ke Cheng
, Anxiao Song
, Yuheng Xia, Zhao Chang
, Yulong Shen
:
FSS-DBSCAN: Outsourced Private Density-Based Clustering via Function Secret Sharing. 7759-7773 - Denley Lam

, Letitia W. Li, Cory Anderson:
PDF Investigation With Parser Differentials and Ontology. 7774-7782 - Taki Eddine Toufik Djaidja

, Bouziane Brik
, Sidi Mohammed Senouci
, Abdelwahab Boualouache
, Yacine Ghamri-Doudane:
Early Network Intrusion Detection Enabled by Attention Mechanisms and RNNs. 7783-7793 - Meiyi Jiang

, Baojiang Cui
, Junsong Fu
, Tao Wang
, Lu Yao, Bharat K. Bhargava
:
RUDOLF: An Efficient and Adaptive Defense Approach Against Website Fingerprinting Attacks Based on Soft Actor-Critic Algorithm. 7794-7809 - Yifan Wang

, Jie Gui
, Yuan Yan Tang
, James Tin-Yau Kwok
:
CFVNet: An End-to-End Cancelable Finger Vein Network for Recognition. 7810-7823 - Mengxiang Liu

, Xin Zhang
, Hengye Zhu
, Zhenyong Zhang
, Ruilong Deng
:
Physics-Aware Watermarking Embedded in Unknown Input Observers for False Data Injection Attack Detection in Cyber-Physical Microgrids. 7824-7840 - Jian Cao

, Minghui Zhang, Weiqi Liu
, Lin Wang
, Jinye Peng
:
Deep Learning-Based Security Analysis of Quantum Random Numbers Generated by Imperfect Devices. 7841-7852 - Siqin Li

, Kun He
, Jing Chen
, Min Shi
, Meng Jia
, Ruiying Du
, Ling Han
:
MaskAuct: Seller-Autonomous Auction With Bidder Anonymity and Bidding Confidentiality. 7853-7865 - Min Wang, Jia Yu

, Wenting Shen
, Rong Hao
:
Privacy-Preserving Time-Based Auditing for Secure Cloud Storage. 7866-7878 - Yilong Huang

, Fan Fan, Chaofeng Huang, Haomiao Yang
, Min Gu
:
MA-DG: Learning Features of Sequences in Different Dimensions for Min-Entropy Evaluation via 2D-CNN and Multi-Head Self-Attention. 7879-7894 - Qingyang Zhang

, Xiaolong Zhou, Hong Zhong
, Jie Cui
, Jiaxin Li, Debiao He
:
Device-Side Lightweight Mutual Authentication and Key Agreement Scheme Based on Chameleon Hashing for Industrial Internet of Things. 7895-7907 - Yuhao Yan

, Bo Lang
, Xiaoyuan Meng
, Nan Xiao
:
Toward Generating Communication Graph Datasets for Botnet Detection in Autonomous Systems. 7908-7923 - Weicheng Xie, Zenghao Niu

, Qinliang Lin, Siyang Song
, Linlin Shen
:
Generative Imperceptible Attack With Feature Learning Bias Reduction and Multi-Scale Variance Regularization. 7924-7938 - Yang Peng

, Pengfei Liu
, Qianyun Zhang
, Lantu Guo
, Yuchao Liu, Yu Wang
, Yun Lin
, Guan Gui
:
Dynamic Adaptation RFF Identification Method Leveraging Cognitive Representation Learning. 7939-7951 - Manoj Kumar Panda

, Badri Narayan Subudhi
, Thangaraj Veerakumar
, Vinit Jakhetiya
, Thierry Bouwmans
:
A Multi-Scale Contrast Preserving Encoder-Decoder Architecture for Local Change Detection From Thermal Video Scenes. 7968-7981 - Leonhard Grosse

, Sara Saeidian
, Tobias J. Oechtering
:
Extremal Mechanisms for Pointwise Maximal Leakage. 7952-7967 - Haomin Qu

, Hongze Zhao
, Qingguo Wei
, Weihua Pei
, Xiaorong Gao
, Yijun Wang
:
Combing Multiple Visual Stimuli to Enhance the Performance of VEP-Based Biometrics. 7982-7993 - Yuhao Bian

, Shengjing Tian
, Xiuping Liu
:
iBA: Backdoor Attack on 3D Point Cloud via Reconstructing Itself. 7994-8008 - Wilton Kim

, Stanislav Kruglik
, Han Mao Kiah
:
Verifiable Coded Computation of Multiple Functions. 8009-8022 - Wei Wang

, Dongli Liu
, Zilin Zheng, Peng Xu
, Laurence Tianruo Yang
:
Identity-Based Group Encryption With Keyword Search Against Keyword Guessing Attack. 8023-8036 - Xiuwen Liu

, Yanjiao Chen
, Shanchen Pang
:
Defending Against Membership Inference Attack for Counterfactual Federated Recommendation With Differentially Private Representation Learning. 8037-8051 - Aixian Deng

, Qian Ren
, Yingjun Wu
, Hong Lei
, Bangdao Chen
:
Proof of Finalization: A Self-Fulfilling Function of Blockchain. 8052-8065 - Congcong Chen

, Jinhua Cui
, Gang Qu
, Jiliang Zhang
:
Write+Sync: Software Cache Write Covert Channels Exploiting Memory-Disk Synchronization. 8066-8078 - Shixuan Zhang

, Haixia Wang, Pengfei Qiu
, Yongqiang Lyu
, Hongpeng Wang
, Dongsheng Wang:
SCAFinder: Formal Verification of Cache Fine-Grained Features for Side Channel Detection. 8079-8093 - Xiaoxiao Hu

, Sheng Li
, Qichao Ying
, Wanli Peng
, Xinpeng Zhang
, Zhenxing Qian
:
Establishing Robust Generative Image Steganography via Popular Stable Diffusion. 8094-8108 - Xinjian Luo

, Yangfan Jiang
, Fei Wei
, Yuncheng Wu
, Xiaokui Xiao
, Beng Chin Ooi
:
Exploring Privacy and Fairness Risks in Sharing Diffusion Models: An Adversarial Perspective. 8109-8124 - Xiaojun Jia

, Yuefeng Chen
, Xiaofeng Mao, Ranjie Duan, Jindong Gu
, Rong Zhang
, Hui Xue
, Yang Liu
, Xiaochun Cao
:
Revisiting and Exploring Efficient Fast Adversarial Training via LAW: Lipschitz Regularization and Auto Weight Averaging. 8125-8139 - Zhe Chen

, Haiyan Zhang
, Xinghua Li
, Yinbin Miao
, Xiaohan Zhang, Man Zhang
, Siqi Ma
, Robert H. Deng
:
FDFL: Fair and Discrepancy-Aware Incentive Mechanism for Federated Learning. 8140-8154 - Yiming Jiang, Jiangfan Zhang

:
Profitability Analysis of Time-Restricted Double-Spending Attack on PoW-Based Large Scale Blockchain With the Aid of Multiple Types of Attacks. 8155-8171 - Stanislav Kruglik

, Son Hoang Dau
, Han Mao Kiah
, Huaxiong Wang
, Liang Feng Zhang
:
Querying Twice to Achieve Information-Theoretic Verifiability in Private Information Retrieval. 8172-8187 - Hao Wu

, Yuhang Gong
, Xiaopeng Ke
, Hanzhong Liang
, Fengyuan Xu
, Yunxin Liu
, Sheng Zhong
:
TIM: Enabling Large-Scale White-Box Testing on In-App Deep Learning Models. 8188-8203 - Sima Bagheri

, Hugo Kermabon-Bobinnec
, Mohammad Ekramul Kabir
, Suryadipta Majumdar
, Lingyu Wang
, Yosr Jarraya
, Boubakr Nour
, Makan Pourzandi
:
ACE-WARP: A Cost-Effective Approach to Proactive and Non-Disruptive Incident Response in Kubernetes Clusters. 8204-8219 - Jingwen Tan

, Huanran Wang
, Shuai Han
, Dapeng Man
, Wu Yang
:
An Adaptability-Enhanced Few-Shot Website Fingerprinting Attack Based on Collusion. 8220-8235 - Hong Niu

, Yue Xiao
, Xia Lei
, Lilin Dan
, Wei Xiang
, Chau Yuen
:
Reconfigurable Intelligent Surface-Assisted Passive Beamforming Attack. 8236-8247 - Qinlong Huang

, Chao Wang, Boyu Lu:
An Efficient and Verifiable Encrypted Data Filtering Framework Over Large-Scale Storage in Cloud Edge. 8248-8262 - Yanru Chen

, Fengming Yin
, Bing Guo
, Zhiwen Pan, Liangyin Chen
:
Cross-Layer AKA Protocol for Industrial Control Based on Channel State Information. 8263-8274 - Shijie Li

, Yuqi Chen, Xin Chen, Zedong Li
, Dongliang Fang
, Kaixiang Liu
, Shichao Lv
, Limin Sun
:
PowerGuard: Using Power Side-Channel Signals to Secure Motion Controllers in ICS. 8275-8290 - Yihao Huang

, Qing Guo
, Felix Juefei-Xu
, Ming Hu
, Xiaojun Jia
, Xiaochun Cao
, Geguang Pu
, Yang Liu
:
Texture Re-Scalable Universal Adversarial Perturbation. 8291-8305 - Shunsheng Zhang

, Youwen Zhu
, Ao Zeng:
Collusion-Resilient Privacy-Preserving Database Fingerprinting. 8306-8321 - Jianwei Fei

, Zhihua Xia
, Benedetta Tondi
, Mauro Barni
:
Wide Flat Minimum Watermarking for Robust Ownership Verification of GANs. 8322-8337 - Jingyu Jia

, Xinhao Li
, Tong Li
, Zhewei Liu, Chang Tan
, Siyi Lv
, Liang Guo, Changyu Dong, Zheli Liu
:
ABSyn: An Accurate Differentially Private Data Synthesis Scheme With Adaptive Selection and Batch Processes. 8338-8352 - Weizhen He

, Jinglei Tan
, Yunfei Guo, Ke Shang
, Hengwei Zhang
:
A Deep Reinforcement Learning-Based Deception Asset Selection Algorithm in Differential Games. 8353-8368 - Tim Van hamme

, Giuseppe Garofalo
, Enrique Argones-Rúa
, Davy Preuveneers
, Wouter Joosen:
A Novel Evaluation Framework for Biometric Security: Assessing Guessing Difficulty as a Metric. 8369-8384 - Rizhao Cai

, Zitong Yu
, Chenqi Kong
, Haoliang Li
, Changsheng Chen
, Yongjian Hu
, Alex C. Kot
:
S-Adapter: Generalizing Vision Transformer for Face Anti-Spoofing With Statistical Tokens. 8385-8397 - Liufu Zhu

, Ding Wang
:
Robust Multi-Factor Authentication for WSNs With Dynamic Password Recovery. 8398-8413 - Huimin She

, Yongjian Hu
, Beibei Liu
, Jicheng Li
, Chang-Tsun Li
:
Using Graph Neural Networks to Improve Generalization Capability of the Models for Deepfake Detection. 8414-8427 - Steven A. Grosz

, Akash Godbole
, Anil K. Jain
:
Mobile Contactless Palmprint Recognition: Use of Multiscale, Multimodel Embeddings. 8428-8440 - Jiangshan Long

, Changhai Ou
, Chenxu Wang, Zhu Wang
, Yongbin Zhou
:
What Is Now Possible? Security Evaluation on Univariate DPA Attacks With Inaccurate Leakage Models. 8441-8456 - Jiakai Wang

, Ye Tao
, Yichi Zhang, Wanting Liu
, Yusheng Kong, Shaolin Tan
, Rongen Yan, Xianglong Liu
:
Adversarial Examples Against WiFi Fingerprint-Based Localization in the Physical World. 8457-8471 - Xuanang Yang

, Jing Chen
, Yuqing Li
, Kun He
, Xiaojie Huang
, Zikuan Jiang, Hao Bai
, Ruiying Du
:
Fregata: Fast Private Inference With Unified Secure Two-Party Protocols. 8472-8484 - Zhongjie Ba

, Bin Gong
, Yuwei Wang
, Yuxuan Liu
, Peng Cheng
, Feng Lin
, Li Lu
, Kui Ren
:
Indelible "Footprints" of Inaudible Command Injection. 8485-8499 - Buwei Tian

, Junyong Jiang
, Zichen He, Xin Yuan
, Lu Dong
, Changyin Sun
:
Functionality-Verification Attack Framework Based on Reinforcement Learning Against Static Malware Detectors. 8500-8514 - Junning Zhang

, Yicen Liu
, Guoru Ding, Bo Tang, Yanlong Chen:
Adaptive Decomposition and Extraction Network of Individual Fingerprint Features for Specific Emitter Identification. 8515-8528 - Yuefeng Du

, Anxin Zhou
, Cong Wang
:
DWare: Cost-Efficient Decentralized Storage With Adaptive Middleware. 8529-8543 - Congming Wei

, Guangze Hong
, An Wang
, Jing Wang, Shaofei Sun
, Yaoling Ding
, Liehuang Zhu
, Wenrui Ma
:
Time Is Not Enough: Timing Leakage Analysis on Cryptographic Chips via Plaintext-Ciphertext Correlation in Non-Timing Channel. 8544-8558 - Yaning Zhang

, Zitong Yu
, Tianyi Wang
, Xiaobin Huang, Linlin Shen
, Zan Gao
, Jianfeng Ren:
GenFace: A Large-Scale Fine-Grained Face Forgery Benchmark and Cross Appearance-Edge Learning. 8559-8572 - Ruochen Wang

, Jun Zhou
, Zhenfu Cao
, Xiaolei Dong
, Kim-Kwang Raymond Choo
:
Updatable Private Set Intersection With Forward Privacy. 8573-8586 - Ziyuan Yang

, Ming Kang
, Andrew Beng Jin Teoh
, Chengrui Gao, Wen Chen
, Bob Zhang
, Yi Zhang
:
A Dual-Level Cancelable Framework for Palmprint Verification and Hack-Proof Data Storage. 8587-8599 - Jiawei Zhao

, Kejiang Chen
, Xiaojian Yuan, Yuang Qi, Weiming Zhang
, Nenghai Yu
:
Silent Guardian: Protecting Text From Malicious Exploitation by Large Language Models. 8600-8615 - Wei Xie

, Hongjun Wang, Zimo Feng
, Chunlai Ma
:
A Novel PHY-Layer Spoofing Attack Detection Scheme Based on WGAN-Encoder Model. 8616-8629 - Yufeng Zhang

, Wenxiong Kang
, Wenwei Song
:
Robust and Accurate Hand Gesture Authentication With Cross-Modality Local-Global Behavior Analysis. 8630-8643 - Zesheng Lin

, Hongbo Li
, Xinjian Chen
, Meiyan Xiao
, Qiong Huang
:
Identity-Based Encryption With Disjunctive, Conjunctive and Range Keyword Search From Lattices. 8644-8657 - Yeongwoo Kim

, György Dán
, Quanyan Zhu
:
Human-in-the-Loop Cyber Intrusion Detection Using Active Learning. 8658-8672 - Qian Li

, Qingyuan Hu, Haoran Fan
, Chenhao Lin
, Chao Shen
, Libing Wu
:
Attention-SA: Exploiting Model-Approximated Data Semantics for Adversarial Attack. 8673-8684 - Chao Sang

, Jun Wu
, Jianhua Li
, Mohsen Guizani
:
From Control Application to Control Logic: PLC Decompile Framework for Industrial Control System. 8685-8700 - Zhaoyang Zhang

, Shen Wang
, Guopu Zhu
, Dechen Zhan, Jiwu Huang
:
Adversarial Perturbation Prediction for Real-Time Protection of Speech Privacy. 8701-8716 - Yipeng Liu

, Hangtao Yu
, Haonan Fang, Zhanqing Li
, Peng Chen
, Ronghua Liang
:
A Wavelet-Based Memory Autoencoder for Noncontact Fingerprint Presentation Attack Detection. 8717-8730 - Lei Zhang

, Yunzhe Jiang
, Yazhou Ma
, Shiwen Mao
, Wenyuan Huang, Zhiyong Yu
, Xiao Zheng
, Lin Shu
, Xiaochen Fan
, Guangquan Xu
, Changyu Dong
:
Toward Robust and Effective Behavior Based User Authentication With Off-the-Shelf Wi-Fi. 8731-8746 - Minzhe Wu, Bowen Zhao

, Yang Xiao
, Congjian Deng, Yuan Liu
, Ximeng Liu
:
MODEL: A Model Poisoning Defense Framework for Federated Learning via Truth Discovery. 8747-8759 - Shiming He

, GenXin Li
, Kun Xie
, Pradip Kumar Sharma
:
Fusion Graph Structure Learning-Based Multivariate Time Series Anomaly Detection With Structured Prior Knowledge. 8760-8772 - Haoxin Yang

, Xuemiao Xu
, Cheng Xu
, Huaidong Zhang
, Jing Qin
, Yi Wang
, Pheng-Ann Heng
, Shengfeng He
:
G²Face: High-Fidelity Reversible Face Anonymization via Generative and Geometric Priors. 8773-8785 - Zheyu Chen

, Zhiqiang Yao
, Biao Jin
, Mingwei Lin
, Jianting Ning
:
FIBNet: Privacy-Enhancing Approach for Face Biometrics Based on the Information Bottleneck Principle. 8786-8801 - Yubo Zheng

, Peng Xu
, Miao Wang, Wanying Xu, Wei Wang
, Tianyang Chen, Hai Jin
:
Themis: Robust and Light-Client Dynamic Searchable Symmetric Encryption. 8802-8816 - Fengyong Li

, Yang Sheng
, Kui Wu
, Chuan Qin
, Xinpeng Zhang
:
LiDiNet: A Lightweight Deep Invertible Network for Image-in-Image Steganography. 8817-8831 - Chenhao Lin

, Fangbin Yi, Hang Wang
, Jingyi Deng
, Zhengyu Zhao
, Qian Li
, Chao Shen
:
Exploiting Facial Relationships and Feature Aggregation for Multi-Face Forgery Detection. 8832-8844 - Yihao Cao

, Jianbiao Zhang
, Yaru Zhao
, Hong Shen
, Haoxiang Huang
:
Privacy-Preserving Federated Learning With Improved Personalization and Poison Rectification of Client Models. 8845-8859 - Zexi Jia

, Chuanwei Huang, Zheng Wang
, Hongyan Fei
, Song Wu
, Jufu Feng
:
Finger Recovery Transformer: Toward Better Incomplete Fingerprint Identification. 8860-8874 - Xue Chen

, Shiyuan Xu
, Shang Gao, Yu Guo
, Siu-Ming Yiu
, Bin Xiao
:
FS-LLRS: Lattice-Based Linkable Ring Signature With Forward Security for Cloud-Assisted Electronic Medical Records. 8875-8891 - Jiachun Li

, Yan Meng
, Yuxia Zhan
, Le Zhang, Haojin Zhu
:
Dangers Behind Charging VR Devices: Hidden Side Channel Attacks via Charging Cables. 8892-8907 - Jeyakumar Samantha Tharani

, Zhé Hóu
, Eugene Yugarajah Andrew Charles
, Punit Rathore
, Marimuthu Palaniswami
, Vallipuram Muthukkumarasamy
:
Unified Feature Engineering for Detection of Malicious Entities in Blockchain Networks. 8924-8938 - Juanjuan Weng

, Zhiming Luo
, Shaozi Li
, Dazhen Lin
, Zhun Zhong
:
Boosting Adversarial Transferability via Logits Mixup With Dominant Decomposed Feature. 8939-8951 - Jiankuo Dong

, Yusheng Fu, Xusheng Qin, Zhenjiang Dong
, Fu Xiao
, Jingqiang Lin
:
ECO-BIKE: Bridging the Gap Between PQC BIKE and GPU Acceleration. 8952-8965 - Qianyu Li

, Ruipeng Wang
, Dong Li
, Fan Shi
, Min Zhang
, Anupam Chattopadhyay
, Yi Shen, Yang Li
:
DynPen: Automated Penetration Testing in Dynamic Network Scenarios Using Deep Reinforcement Learning. 8966-8981 - Wanying Dai

, Beibei Li
, Qingyun Du
, Ziqing Zhu
, Ao Liu
:
Chaos-Based Index-of-Min Hashing Scheme for Cancellable Biometrics Security. 8982-8997 - Tong Qiao

, Bin Zhao
, Ran Shi
, Meng Han
, Mahmoud Hassaballah
, Florent Retraint
, Xiangyang Luo
:
Scalable Universal Adversarial Watermark Defending Against Facial Forgery. 8998-9011 - Yongyang Lv

, Ruitao Feng
, Maode Ma
, Manqing Zhu
, Hanwei Wu
, Xiaohong Li
:
Reinventing Multi-User Authentication Security From Cross-Chain Perspective. 8908-8923 - Parhat Abla

, Taotao Li
, Debiao He
, Huawei Huang
, Songsen Yu, Yan Zhang
:
Fair and Privacy-Preserved Data Trading Protocol by Exploiting Blockchain. 9012-9025 - Honghu Pan, Wenjie Pei

, Xin Li
, Zhenyu He
:
Unified Conditional Image Generation for Visible-Infrared Person Re-Identification. 9026-9038 - Wenyi Tan

, Yang Li
, Chenxing Zhao
, Zhunga Liu
, Quan Pan
:
DOEPatch: Dynamically Optimized Ensemble Model for Adversarial Patches Generation. 9039-9054 - Mingyue Xie

, Zheng Chang
, Hongwei Li
, Geyong Min
:
BASUV: A Blockchain-Enabled UAV Authentication Scheme for Internet of Vehicles. 9055-9069 - De Cheng

, Haichun Tai
, Nannan Wang
, Chaowei Fang
, Xinbo Gao
:
Neighbor Consistency and Global-Local Interaction: A Novel Pseudo-Label Refinement Approach for Unsupervised Person Re-Identification. 9070-9084 - Yanrong Liang

, Jianfeng Ma
, Yinbin Miao
, Yuan Su
, Robert H. Deng
:
Efficient and Privacy-Preserving Encode-Based Range Query Over Encrypted Cloud Data. 9085-9099 - Xutong Mu

, Ke Cheng
, Teng Liu
, Tao Zhang
, Xueli Geng
, Yulong Shen
:
FedPTA: Prior-Based Tensor Approximation for Detecting Malicious Clients in Federated Learning. 9100-9114 - Jianhuan Wang

, Shang Gao, Guyue Li
, Keke Gai
, Bin Xiao
:
SAMCU: Secure and Anonymous Multi-Channel Updates in Payment Channel Networks. 9115-9128 - Yuanming Huang

, Mingshu He
, Xiaojuan Wang
, Jie Zhang
:
HeVulD: A Static Vulnerability Detection Method Using Heterogeneous Graph Code Representation. 9129-9144 - Qian Zhang

, Qing Guo
, Ruijun Gao, Felix Juefei-Xu
, Hongkai Yu
, Wei Feng
:
Adversarial Relighting Against Face Recognition. 9145-9157 - Mingzhe Zhai

, Yizhong Liu
, Qianhong Wu
, Bo Qin
, Haibin Zheng
, Xiaopeng Dai
, Zhenyang Ding
, Willy Susilo
:
Accountable Secret Committee Election and Anonymous Sharding Blockchain Consensus. 9158-9172 - Zakia Zaman

, Wanli Xue
, Praveen Gauravaram
, Wen Hu
, Jiaojiao Jiang
, Sanjay K. Jha
:
Privacy-Preserving Probabilistic Data Encoding for IoT Data Analysis. 9173-9187 - Yicheng Liu, Zhao Li

, Kang G. Shin
, Zheng Yan
, Jia Liu
:
iCoding: Countermeasure Against Interference and Eavesdropping in Wireless Communications. 9188-9203 - Guanxiong Shen

, Junqing Zhang
, Xuyu Wang
, Shiwen Mao
:
Federated Radio Frequency Fingerprint Identification Powered by Unsupervised Contrastive Learning. 9204-9215 - Jiacheng Gong

, Weina Niu
, Song Li
, Mingxue Zhang
, Xiaosong Zhang
:
Sensitive Behavioral Chain-Focused Android Malware Detection Fused With AST Semantics. 9216-9229 - Bo Tang

, Fengdong Li
, Jianbo Liu
, Cheng Yang
:
A Video Visual Security Metric Based on Spatiotemporal Self-Attention. 9230-9244 - Nadia Niknami

, Avinash Srinivasan
, Jie Wu:
Cyber-AnDe: Cybersecurity Framework With Adaptive Distributed Sampling for Anomaly Detection on SDNs. 9245-9257 - Jose A. Gutierrez del Arroyo

, Brett J. Borghetti
, Michael A. Temple
:
Fingerprint Extraction Through Distortion Reconstruction (FEDR): A CNN-Based Approach to RF Fingerprinting. 9258-9269 - Jiancheng Huang

, Donghao Zhou
, Jianzhuang Liu
, Linxiao Shi
, Shifeng Chen
:
IFAST: Weakly Supervised Interpretable Face Anti-Spoofing From Single-Shot Binocular NIR Images. 9270-9284 - Nate Mathews

, James K. Holland
, Nicholas Hopper
, Matthew Wright
:
Laserbeak: Evolving Website Fingerprinting Attacks With Attention and Multi-Channel Feature Representation. 9285-9300 - Jingjing Yang

, Jieli Liu
, Dan Lin
, Jiajing Wu
, Baoying Huang, Quanzhong Li
, Zibin Zheng
:
Who Stole My NFT? Investigating Web3 NFT Phishing Scams on Ethereum. 9301-9314 - Yuni Lai

, Marcin Waniek
, Liying Li
, Jingwen Wu
, Yulin Zhu
, Tomasz P. Michalak
, Talal Rahwan
, Kai Zhou
:
Coupled-Space Attacks Against Random-Walk-Based Anomaly Detection. 9315-9329 - Huafeng Qin

, Zhipeng Xiong, Yantao Li
, Mounim A. El-Yacoubi
, Jun Wang:
Attention BLSTM-Based Temporal-Spatial Vein Transformer for Multi-View Finger-Vein Recognition. 9330-9343 - Hong-Yen Tran

, Jiankun Hu
, Wen Hu
:
Biometrics-Based Authenticated Key Exchange With Multi-Factor Fuzzy Extractor. 9344-9358 - Shiqi Gao, Haoyi Zhou

, Tianyu Chen, Mingrui He, Runhua Xu
, Jianxin Li
:
PE-Attack: On the Universal Positional Embedding Vulnerability in Transformer-Based Models. 9359-9373 - Ya Liu

, Xiao Wang
, Bo Qu
, Fengyu Zhao
:
ATVITSC: A Novel Encrypted Traffic Classification Method Based on Deep Learning. 9374-9389 - Kaiqing Lin

, Bin Li
, Weixiang Li
, Mauro Barni
, Benedetta Tondi
, Xulong Liu
:
Constructing an Intrinsically Robust Steganalyzer via Learning Neighboring Feature Relationships and Self-Adversarial Adjustment. 9390-9405 - Insha Amin

, Deepak Mishra
, Ravikant Saini
, Sonia Aïssa
:
Power Allocation and Decoding Order Selection for Secrecy Fairness in Downlink Cooperative NOMA With Untrusted Receivers Under Imperfect SIC. 9406-9418 - Marcello Meschini

, Giorgio Di Tizio
, Marco Balduzzi, Fabio Massacci
:
A Case-Control Study to Measure Behavioral Risks of Malware Encounters in Organizations. 9419-9432 - Dezhang Kong

, Xiang Chen
, Chunming Wu
, Yi Shen, Zhengyan Zhou
, Qiumei Cheng
, Xuan Liu
, Mingliang Yang, Yubing Qiu, Dong Zhang
, Muhammad Khurram Khan
:
rDefender: A Lightweight and Robust Defense Against Flow Table Overflow Attacks in SDN. 9436-9451 - Jianhong Zhang

, Jie Wei
:
On the Security of Privacy-Enhanced Authentication Protocol for Federated Learning in VANETs. 9433-9435 - Yishan Yang

, Jiajun Li
, Niya Luo, Zheng Yan
, Yifan Zhang
, Kai Zeng
:
BatchAuth: A Physical Layer Batch Authentication Scheme for Multiple Backscatter Devices. 9452-9466 - Etienne Levecque

, Jan Butora
, Patrick Bas:
Finding Incompatible Blocks for Reliable JPEG Steganalysis. 9467-9479 - Chenkai Zeng

, Debiao He
, Qi Feng
, Xiaolin Yang, Qingcai Luo:
SecureGPT: A Framework for Multi-Party Privacy-Preserving Transformer Inference in GPT. 9480-9493 - Stefano Tomasin

, Tarek N. M. M. Elwakeel, Anna V. Guglielmi
, Robin Maes, Nele Noels
, Marc Moeneclaey
:
Analysis of Challenge-Response Authentication With Reconfigurable Intelligent Surfaces. 9494-9507 - Joohee Lee

, Hansol Ryu, Minju Lee, Jaehui Park
:
Cryptanalysis on "NTRU+: Compact Construction of NTRU Using Simple Encoding Method". 9508-9517 - Ehsan Olyaei Torshizi

, Werner Henkel
:
Pairwise Physical Layer Secret Key Generation for FDD Systems. 9518-9533 - Xinyu Zhang

, Qingyu Liu
, Zhongjie Ba
, Yuan Hong
, Tianhang Zheng, Feng Lin
, Li Lu
, Kui Ren
:
FLTracer: Accurate Poisoning Attack Provenance in Federated Learning. 9534-9549 - Keyizhi Xu

, Zhan Chen, Zhongyuan Wang
, Chunxia Xiao
, Chao Liang
:
Toward Robust Adversarial Purification for Face Recognition Under Intensity-Unknown Attacks. 9550-9565 - Changhua Chen

, Tingzhen Yan
, Chenxuan Shi, Hao Xi
, Zhirui Fan, Hai Wan
, Xibin Zhao
:
The Last Mile of Attack Investigation: Audit Log Analysis Toward Software Vulnerability Location. 9566-9581 - Hang Liu

, Yang Ming
, Chenhao Wang
, Yi Zhao
:
Flexible Selective Data Sharing With Fine-Grained Erasure in VANETs. 9582-9597 - Song Ruan

, Yantao Li
, Huafeng Qin
:
LSFM: Light Style and Feature Matching for Efficient Cross-Domain Palmprint Recognition. 9598-9612 - Yunbo Yang

, Xiang Chen
, Yuhao Pan, Jiachen Shen
, Zhenfu Cao
, Xiaolei Dong
, Xiaoguo Li, Jianfei Sun, Guomin Yang
, Robert H. Deng
:
OpenVFL: A Vertical Federated Learning Framework With Stronger Privacy-Preserving. 9670-9681 - Mousa Tayseer Jafar

, Lu-Xing Yang
, Gang Li
, Qingyi Zhu
, Chenquan Gan
:
Minimizing Malware Propagation in Internet of Things Networks: An Optimal Control Using Feedback Loop Approach. 9682-9697 - Zhuo Chen

, Liehuang Zhu
, Peng Jiang
, Zijian Zhang
, Chengxiang Si:
Blockchain-Based Covert Communication: A Detection Attack and Efficient Improvement. 9698-9713 - Qihao Dong

, Shengyuan Yang, Zhiyang Dai, Yansong Gao
, Shang Wang, Yuan Cao
, Anmin Fu
, Willy Susilo
:
CareFL: Contribution Guided Byzantine-Robust Federated Learning. 9714-9729 - Ziqiang Li

, Hong Sun
, Pengfei Xia
, Beihao Xia
, Xue Rui, Wei Zhang
, Qinglang Guo
, Zhangjie Fu
, Bin Li
:
A Proxy Attack-Free Strategy for Practically Improving the Poisoning Efficiency in Backdoor Attacks. 9730-9743 - Hao Wang

, Yichen Cai, Jun Wang
, Chuan Ma, Chunpeng Ge
, Xiangmou Qu
, Lu Zhou
:
Voltran: Unlocking Trust and Confidentiality in Decentralized Federated Learning Aggregation. 9744-9759 - Qiuyun Lyu

, Yilong Zhou
, Yizhi Ren
, Zhen Wang
, Yunchuan Guo
:
Toward Personal Data Sharing Autonomy: A Task-Driven Data Capsule Sharing System. 9760-9774 - Xiaopeng Ji

, Ruizhi Zhu
, Qiaosheng Eric Zhang
, Chunguo Li
, Daming Cao
:
Enhancing Covert Communication in OOK Schemes by Phase Deflection. 9775-9788 - Xiaojuan Cheng

, Lu-Xing Yang
, Qingyi Zhu
, Chenquan Gan
, Xiaofan Yang
, Gang Li
:
Cost-Effective Hybrid Control Strategies for Dynamical Propaganda War Game. 9789-9802 - Ningping Mou

, Binqing Guo
, Lingchen Zhao
, Cong Wang
, Yue Zhao
, Qian Wang
:
No-Box Universal Adversarial Perturbations Against Image Classifiers via Artificial Textures. 9803-9818 - Rui Wang

, Longlong Li, Guozheng Yang, Xuehu Yan
, Wei Yan
:
Secret Cracking and Security Enhancement for the Image Application of CRT-Based Secret Sharing. 9819-9834 - Fei Chen

, Haohui Zhang
, Tao Xiang
, Joseph K. Liu
:
A Two-Stage Approach for Fair Data Trading Based on Blockchain. 9835-9849 - Xinyue Sun

, Qingqing Ye
, Haibo Hu
, Jiawei Duan
, Qiao Xue
, Tianyu Wo
, Weizhe Zhang
, Jie Xu
:
Generating Location Traces With Semantic- Constrained Local Differential Privacy. 9850-9865 - Caiqun Shi, Qinlong Huang

, Rui Jian, Genghui Chi:
Cross-Domain Inner-Product Access Control Encryption for Secure EMR Flow in Cloud Edge. 9866-9880 - Ya Gao

, Haocheng Ma
, Qizhi Zhang
, Xintong Song, Yier Jin, Jiaji He
, Yiqiang Zhao
:
EMSim+: Accelerating Electromagnetic Security Evaluation With Generative Adversarial Network and Transfer Learning. 9881-9893 - Ningning Yu

, Jiajun Wu
, Chengwei Zhou
, Zhiguo Shi
, Jiming Chen
:
Open Set Learning for RF-Based Drone Recognition via Signal Semantics. 9894-9909 - Liqing Chen

, Jiayi Li
, Jiguo Li
, Jian Weng
:
PAESS: Public-Key Authentication Encryption With Similar Data Search for Pay-Per-Query. 9910-9923 - Jingjing Yang

, Wenjia Yu, Jiajing Wu
, Dan Lin
, Zhiying Wu
, Zibin Zheng
:
2DynEthNet: A Two-Dimensional Streaming Framework for Ethereum Phishing Scam Detection. 9924-9937 - Xiaofang Chen

, Xue Fu
, Wenbo Xu
, Yue Wang
, Guan Gui
:
Joint Variational Modal Decomposition for Specific Emitter Identification With Multiple Sensors. 9938-9953 - Jiahong Wu

, Nan Liu
, Wei Kang
:
The Capacity Region of Distributed Multi-User Secret Sharing Under Perfect Secrecy. 9954-9969 - Kangkang Wei

, Weiqi Luo
, Jiwu Huang
:
Color Image Steganalysis Based on Pixel Difference Convolution and Enhanced Transformer With Selective Pooling. 9970-9983 - Hamed Sarjan

, Mohammadmahdi Asghari
, Amir Ameli
, Mohsen Ghafouri
:
Mitigating Propagation of Cyber-Attacks in Wide-Area Measurement Systems. 9984-9999 - Jiajia Li

, Qian Yi
, Ming Kim Lim
, Shuping Yi
, Pengxing Zhu
, Xingjun Huang:
MBBFAuth: Multimodal Behavioral Biometrics Fusion for Continuous Authentication on Non-Portable Devices. 10000-10015 - Minyu Hua, Yibin Zhang

, Qianyun Zhang
, Huaiyu Tang, Lantu Guo
, Yun Lin
, Hikmet Sari
, Guan Gui
:
KG-IBL: Knowledge Graph Driven Incremental Broad Learning for Few-Shot Specific Emitter Identification. 10016-10028 - Shuming Xiong

, Pengchao Chen
, Shusheng Ge, Qiang Ni
:
SFOM-DT: A Secure and Fair One-to-Many Data Trading Scheme Based on Blockchain. 10029-10042 - Hang Liu

, Anna Scaglione
, Sean Peisert
:
Graph-Signal-to-Graph Matching for Network De-Anonymization Attacks. 10043-10057 - Anand Agrawal

, Rajib Ranjan Maiti:
iTieProbe: How Vulnerable Your IoT Provisioning via Wi-Fi AP Mode or EZ Mode? 10058-10070 - Yan He

, Fei Peng
, Rizhao Cai
, Zitong Yu
, Min Long
, Kwok-Yan Lam
:
Category-Conditional Gradient Alignment for Domain Adaptive Face Anti-Spoofing. 10071-10085 - Jiawen Wu

, Kai Zhang
, Lifei Wei
, Junqing Gong
, Jianting Ning
:
Practical Searchable Symmetric Encryption for Arbitrary Boolean Query-Join in Cloud Storage. 10086-10098 - Shinimol Salim

, Waquar Ahmad
:
Advancing Voice Biometrics for Dysarthria Speakers Using Multitaper LFCC and Voice Conversion Data Augmentation. 10114-10129 - Zhengmin Kong

, Jing Song, Shaoshi Yang
, Li Gan
, Weizhi Meng
, Tao Huang
, Sheng Chen
:
Distributed Robust Artificial-Noise-Aided Secure Precoding for Wiretap MIMO Interference Channels. 10130-10140 - Yahui Li

, Han Zhang
, Jilong Wang
, Xingang Shi
, Xia Yin, Zhiliang Wang
, Jiankun Hu
, Congcong Miao
, Jianping Wu:
Proactively Verifying Quantitative Network Policy Across Unsafe and Unreliable Environments. 10099-10113 - Lvjun Chen

, Di Xiao
, Xiangli Xiao
, Yushu Zhang
:
Secure and Efficient Federated Learning via Novel Authenticable Multi-Party Computation and Compressed Sensing. 10141-10156 - Xiangrui Cai

, Yang Wang
, Sihan Xu
, Hao Li
, Ying Zhang
, Zheli Liu
, Xiaojie Yuan
:
LAN: Learning Adaptive Neighbors for Real-Time Insider Threat Detection. 10157-10172 - Yurong Hao

, Xihui Chen
, Wei Wang
, Jiqiang Liu
, Tao Li
, Junyong Wang
, Witold Pedrycz
:
Eyes on Federated Recommendation: Targeted Poisoning With Competition and Its Mitigation. 10173-10188 - Aymar Le Père Tchimwa Bouom

, Jean-Pierre Lienou, Wilson Ejuh Geh, Frederica Free-Nelson, Sachin Shetty
, Charles A. Kamhoua
:
TriAssetRank: Ranking Vulnerabilities, Exploits, and Privileges for Countermeasures Prioritization. 10189-10205 - Guanjie Cheng

, Junqin Huang
, Yewei Wang, Jun Zhao
, Linghe Kong
, Shuiguang Deng
, Xueqiang Yan:
Conditional Privacy-Preserving Multi-Domain Authentication and Pseudonym Management for 6G-Enabled IoV. 10206-10220 - Jiajun Chen

, Yichen Shen
, Chi Wan Sung
:
A New Shift-Add Secret Sharing Scheme for Partial Data Protection With Parallel Zigzag Decoding. 10221-10232 - Kaiyan He

, Yikun Hu
, Xuehui Li, Yunhao Song, Yubo Zhao, Dawu Gu
:
Strtune: Data Dependence-Based Code Slicing for Binary Similarity Detection With Fine-Tuned Representation. 10233-10245 - Liang Guo

, Jie Jia
, Jian Chen
, Shuhui Yang, Xingwei Wang
:
Secure Beamforming and Radar Association in CoMP-NOMA Empowered Integrated Sensing and Communication Systems. 10246-10257 - Edward Kwadwo Boahen

, Rexford Nii Ayitey Sosu
, Selasi Kwame Ocansey
, Qinbao Xu
, Changda Wang
:
ASRL: Adaptive Swarm Reinforcement Learning for Enhanced OSN Intrusion Detection. 10258-10272 - Hanxiao Chen

, Hongwei Li
, Meng Hao
, Jia Hu
, Guowen Xu
, Xilin Zhang
, Tianwei Zhang
:
SecBNN: Efficient Secure Inference on Binary Neural Networks. 10273-10286 - Jianping Cai

, Qingqing Ye
, Haibo Hu
, Ximeng Liu
, Yanggeng Fu
:
Boosting Accuracy of Differentially Private Continuous Data Release for Federated Learning. 10287-10301 - Hao-Ting Pai

, Yu-Hsuan Kang, Wen-Cheng Chung:
An Interpretable Generalization Mechanism for Accurately Detecting Anomaly and Identifying Networking Intrusion Techniques. 10302-10313 - Chengyu Jia

, Jinyin Chen
, Shouling Ji
, Yao Cheng
, Haibin Zheng
, Qi Xuan
:
Backdoor Online Tracing With Evolving Graphs. 10314-10327 - Zheng Wan

, Kexin Liu
, Yajun Chen
, Kaizhi Huang
, Hui-Ming Wang
, Zheng Chu
, Ming Yi, Liang Jin
:
Resource Allocation for STAR-RIS-Assisted MIMO Physical-Layer Key Generation. 10328-10338 - Zihang Zhen

, Xiaoding Wang
, Xu Yang
, Jiwu Shu, Jia Hu
, Hui Lin
, Xun Yi
:
SemantiChain: A Trust Retrieval Blockchain Based on Semantic Sharding. 10339-10354 - Lushan Song

, Zhexuan Wang
, Guopeng Lin
, Weili Han
:
Ruyi: A Configurable and Efficient Secure Multi-Party Learning Framework With Privileged Parties. 10355-10370 - Xi Jun Lin

:
On the Unforgeability of "Privacy-Preserving Aggregation-Authentication Scheme for Safety Warning System in Fog-Cloud Based VANET". 10371-10372 - Yafang Yang

, Lei Zhang
, Yunlei Zhao
, Kim-Kwang Raymond Choo
, Yan Zhang
:
Rebuttal to "On the Unforgeability of 'Privacy-Preserving Aggregation-Authentication Scheme for Safety Warning System in Fog-Cloud Based VANET"'. 10373-10374 - Liza Afeef

, Haji M. Furqan
, Hüseyin Arslan
:
Robust Tracking-Based PHY-Authentication in mmWave MIMO Systems. 10375-10386 - Peirong Zhang

, Lianwen Jin
:
Online Writer Retrieval With Chinese Handwritten Phrases: A Synergistic Temporal-Frequency Representation Learning Approach. 10387-10399

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














