


default search action
IEEE Transactions on Information Forensics and Security, Volume 20
Volume 20, 2025
- Tong Fu

, Liquan Chen
, Yinghua Jiang, Ju Jia
, Zhangjie Fu
:
Image Steganalysis Based on Dual-Path Enhancement and Fractal Downsampling. 1-16 - Chong Xiao

, Ming Tang
, Sengim Karayalcin
, Wei Cheng
:
LD-PA: Distilling Univariate Leakage for Deep Learning-Based Profiling Attacks. 17-30 - Xin Xie

, Jianan Hong
, Cunqing Hua
, Yanhong Xu
:
Communication Efficient Ciphertext-Field Aggregation in Wireless Networks via Over-the-Air Computation. 31-45 - Jitendra Bhandari

, Jayanth Gopinath, Mohammed Ashraf, Johann Knechtel
, Ozgur Sinanoglu
, Ramesh Karri
:
DEFending Integrated Circuit Layouts. 46-59 - Hong Niu

, Xia Lei
, Jiancheng An
, Lechen Zhang
, Chau Yuen
:
On the Efficient Design of Stacked Intelligent Metasurfaces for Secure SISO Transmission. 60-70 - Yige Liu

, Che Wang, Yiwei Lou
, Yongzhi Cao
, Hanpin Wang:
Attackers Are Not the Same! Unveiling the Impact of Feature Distribution on Label Inference Attacks. 71-86 - Jiachen Yang

, Jipeng Zhang
:
LHADRO: A Robust Control Framework for Autonomous Vehicles Under Cyber-Physical Attacks. 87-100 - Shuping Zhao

, Lunke Fei
, Bob Zhang
, Jie Wen
, Jinrong Cui:
Toward Mobile Palmprint Recognition via Multi-View Hierarchical Graph Learning. 101-113 - Yibiao Lu

, Bingsheng Zhang
, Kui Ren
:
Load-Balanced Server-Aided MPC in Heterogeneous Computing. 114-128 - Liang Xie

, Zhou Su
, Yuntao Wang
, Zhendong Li
:
A Practical Federated Learning Framework With Truthful Incentive in UAV-Assisted Crowdsensing. 129-144 - Weihan Li

, Zongyang Zhang
, Yanpei Guo
, Sherman S. M. Chow
, Zhiguo Wan
:
Succinct Hash-Based Arbitrary-Range Proofs. 145-158 - Rujia Li

, Qin Wang
, Yuanzhao Li, Sisi Duan
, Qi Wang
, David Galindo:
Bringing Smart Contract Confidentiality via Trusted Hardware: Fact and Fiction. 159-174 - Xiaodong Wu

, Henry Yuan
, Xiangman Li, Jianbing Ni
, Rongxing Lu
:
Evaluating Security and Robustness for Split Federated Learning Against Poisoning Attacks. 175-190 - Cheng Wei

, Yang Wang, Kuofeng Gao
, Shuo Shao
, Yiming Li
, Zhibo Wang
, Zhan Qin
:
PointNCBW: Toward Dataset Ownership Verification for Point Clouds via Negative Clean-Label Backdoor Watermark. 191-206 - Naiyu Wang

, Shen Wang
, Meng Li
, Longfei Wu
, Zijian Zhang
, Zhitao Guan
, Liehuang Zhu
:
Balancing Differential Privacy and Utility: A Relevance-Based Adaptive Private Fine-Tuning Framework for Language Models. 207-220 - Jianghong Wei

, Guohua Tian
, Xiaofeng Chen
, Willy Susilo
:
Lightweight 0-RTT Session Resumption Protocol for Constrained Devices. 221-233 - Ruikang Chen, Yan Yan

, Jing-Hao Xue
, Yang Lu
, Hanzi Wang
:
Augmentation Matters: A Mix-Paste Method for X-Ray Prohibited Item Detection Under Noisy Annotations. 234-248 - Xiongjun Guan

, Zhiyu Pan
, Jianjiang Feng
, Jie Zhou
:
Joint Identity Verification and Pose Alignment for Partial Fingerprints. 249-263 - Ruiqi Kong

, He Henry Chen
:
DeepCRF: Deep Learning-Enhanced CSI-Based RF Fingerprinting for Channel-Resilient WiFi Device Identification. 264-278 - Haorui Yan

, Xi Lin
, Shenghong Li
, Hao Peng
, Bo Zhang:
Global or Local Adaptation? Client-Sampled Federated Meta-Learning for Personalized IoT Intrusion Detection. 279-293 - Jing Bai

, Chang Ge
, Zhu Xiao
, Hongbo Jiang
, Tong Li
, Huaji Zhou, Licheng Jiao
:
A Multiscale Discriminative Attack Method for Automatic Modulation Classification. 294-308 - Yue Huang

, Huizhong Li, Yi Sun
, Sisi Duan
:
Byzantine Fault Tolerance With Non-Determinism, Revisited. 309-322 - Pengfei Duan

, Zhaofeng Ma
, Hongmin Gao
, Tian Tian
, Yuqing Zhang
:
Multi-Authority Attribute-Based Encryption Scheme With Access Delegation for Cross Blockchain Data Sharing. 323-337 - Haochen Wang

, Qidi You, Sisi Duan
:
Synchronous Byzantine Agreement With O(n) Messages and O(1) Expected Time. 338-349 - Chenhao Lin

, Xiang Ji, Yulong Yang
, Qian Li
, Zhengyu Zhao
, Zhe Peng
, Run Wang
, Liming Fang
, Chao Shen
:
Hard Adversarial Example Mining for Improving Robust Fairness. 350-363 - Liang Xi

, Runze Li, Menghan Li
, Dehua Miao
, Ruidong Wang
, Zygmunt J. Haas
:
NMFAD: Neighbor-Aware Mask-Filling Attributed Network Anomaly Detection. 364-374 - Shouxu Han

, Jie Liu
, Yi Luo
, Hongping Gan
:
LCMA: A Novel Lightweight Continuous Message Authentication for Cyber-Physical System. 375-390 - Jie Song

, Sijia Zhang, Pengyi Zhang
, Junghoon Park, Yu Gu
, Ge Yu
:
Illicit Social Accounts? Anti-Money Laundering for Transactional Blockchains. 391-404 - Zhiyang Dai, Yansong Gao

, Chunyi Zhou
, Anmin Fu
, Zhi Zhang
, Minhui Xue
, Yifeng Zheng
, Yuqing Zhang
:
Decaf: Data Distribution Decompose Attack Against Federated Learning. 405-420 - Tingting Chai

, Xin Wang
, Ru Li
, Wei Jia
, Xiangqian Wu
:
Joint Finger Valley Points-Free ROI Detection and Recurrent Layer Aggregation for Palmprint Recognition in Open Environment. 421-435 - Ke Li

, Di Wang
, Wenxuan Zhu
, Shaofeng Li
, Quan Wang
, Xinbo Gao
:
Physical Adversarial Patch Attack for Optical Fine-Grained Aircraft Recognition. 436-448 - Roozbeh Sarenche

, Ren Zhang
, Svetla Nikova
, Bart Preneel
:
Selfish Mining Time-Averaged Analysis in Bitcoin: Is Orphan Reporting an Effective Countermeasure? 449-464 - Xiaozhen Lu

, Zihan Liu
, Liang Xiao
, Huaiyu Dai
:
Reinforcement Learning-Based Personalized Differentially Private Federated Learning. 465-477 - K. Naveen Kumar

, C. Krishna Mohan
, Linga Reddy Cenkeramaddi
:
Federated Learning Minimal Model Replacement Attack Using Optimal Transport: An Attacker Perspective. 478-487 - Zeyu Zhao

, Yueneng Wang
, Ke Xu
, Tanfeng Sun
, Xinghao Jiang
:
HEVC Video Adversarial Samples Detection via Joint Features of Compression and Pixel Domains. 488-503 - Decheng Liu

, Tao Chen, Chunlei Peng
, Nannan Wang
, Ruimin Hu, Xinbo Gao
:
Attention Consistency Refined Masked Frequency Forgery Representation for Generalizing Face Forgery Detection. 504-515 - Yinan Hu

, Juntao Chen
, Quanyan Zhu
:
Game-Theoretic Neyman-Pearson Detection to Combat Strategic Evasion. 516-530 - Xueluan Gong

, Shuaike Li
, Yanjiao Chen
, Mingzhe Li
, Rubin Wei, Qian Wang
, Kwok-Yan Lam
:
Augmenting Model Extraction Attacks Against Disruption-Based Defenses. 531-546 - Weiqi Wang

, Zhiyi Tian
, Chenhan Zhang
, Shui Yu
:
SCU: An Efficient Machine Unlearning Scheme for Deep Learning Enabled Semantic Communications. 547-558 - Yuhang Qiu

, Honghui Chen, Xingbo Dong
, Zheng Lin, Iman Yi Liao
, Massimo Tistarelli, Zhe Jin
:
IFViT: Interpretable Fixed-Length Representation for Fingerprint Matching via Vision Transformer. 559-573 - Jianmin Dong

, Datian Peng
, Zhongmin Cai
, Bo Zeng
:
Bilevel Optimized Collusion Attacks Against Gait Recognizer. 574-588 - Shuyu Jiang, Yunxiang Qiu, Xian Mo

, Rui Tang
, Wei Wang
:
An Effective Node Injection Approach for Attacking Social Network Alignment. 589-604 - Yiping Zhang

, Yuntao Shou
, Wei Ai
, Tao Meng
, Keqin Li
:
GroupFace: Imbalanced Age Estimation Based on Multi-Hop Attention Graph Convolutional Network and Group-Aware Margin Optimization. 605-619 - Rujia Li

, Yuanzhao Li, Qin Wang
, Sisi Duan
, Qi Wang
, Mark Ryan:
Accountable Decryption Made Formal and Practical. 620-635 - Xue Chen

, Cheng Wang
, Qing Yang
, Teng Hu
, Changjun Jiang
:
Privacy Passport: Privacy-Preserving Cross-Domain Data Sharing. 636-650 - Yuli Liu

:
Signed Latent Factors for Spamming Activity Detection. 651-664 - Xiaoping Liang

, Zhenjun Tang
, Xianquan Zhang
, Xinpeng Zhang
, Ching-Nung Yang
:
Robust Image Hashing With Weighted Saliency Map and Laplacian Eigenmaps. 665-676 - Jianjin Zhao

, Qi Li
, Zewei Han
, Junsong Fu
, Guoshun Nan
, Meng Shen
, Bharat K. Bhargava
:
ReTrial: Robust Encrypted Malicious Traffic Detection via Discriminative Relation Incorporation and Misleading Relation Correction. 677-692 - Bo Gao

, Weiwei Liu
, Guangjie Liu
, Fengyuan Nie
, Jianan Huang
:
Multi-Level Resource-Coherented Graph Learning for Website Fingerprinting Attacks. 693-708 - Kaiyao Miao, Meng Zhang

, Fanghong Guo
, Rongxing Lu
, Xiaohong Guan
:
Detection of False Data Injection Attacks in Smart Grids: An Optimal Transport-Based Reliable Self-Training Approach. 709-723 - Luqing Wang

, Luyao Guo
, Shaofu Yang
, Xinli Shi
:
Differentially Private Decentralized Optimization With Relay Communication. 724-736 - Jing Yan

, Yuhan Zheng, Xian Yang
, Cailian Chen
, Xinping Guan
:
Privacy-Preserving Localization for Underwater Acoustic Sensor Networks: A Differential Privacy-Based Deep Learning Approach. 737-752 - Tanzim Mahfuz

, Swarup Bhunia
, Prabuddha Chakraborty
:
X-DFS: Explainable Artificial Intelligence Guided Design-for-Security Solution Space Exploration. 753-766 - Xue Gong, Fan Zhang

, Xin-jie Zhao, Jie Xiao
, Shize Guo
:
Key Schedule Guided Persistent Fault Attack. 767-780 - Yuhong Xue

, Zhutian Yang
, Zhilu Wu
, Hu Wang, Guan Gui
:
Online Two-Stage Channel-Based Lightweight Authentication Method for Time-Varying Scenarios. 781-795 - Wenfeng Huang

, Axin Wu
, Shengmin Xu
, Guowen Xu
, Wei Wu
:
EASNs: Efficient Anonymous Social Networks With Enhanced Security and High Scalability. 796-806 - Shuaishuai Zhang

, Jie Huang, Peihao Li
:
Analyze and Improve Differentially Private Federated Learning: A Model Robustness Perspective. 807-821 - Wenrui Yu

, Qiongxiu Li
, Milan Lopuhaä-Zwakenberg
, Mads Græsbøll Christensen
, Richard Heusdens
:
Provable Privacy Advantages of Decentralized Federated Learning via Distributed Optimization. 822-838 - Chengxiang Jin, Jiajun Zhou

, Chenxuan Xie, Shanqing Yu
, Qi Xuan
, Xiaoniu Yang
:
Enhancing Ethereum Fraud Detection via Generative and Contrastive Self-Supervision. 839-853 - Xirong Zhuang

, Lan Zhang
, Chen Tang
, Yaliang Li
:
DeepReg: A Trustworthy and Privacy-Friendly Ownership Regulatory Framework for Deep Learning Models. 854-870 - Kuiyuan Zhang

, Zhongyun Hua
, Yushu Zhang
, Yifang Guo, Tao Xiang
:
Robust AI-Synthesized Speech Detection Using Feature Decomposition Learning and Synthesizer Feature Augmentation. 871-885 - Apollo Albright

, Boris Gelfand
, Michael Dixon
:
Learnability of Optical Physical Unclonable Functions Through the Lens of Learning With Errors. 886-897 - Hangcheng Liu

, Yuan Zhou
, Ying Yang
, Qingchuan Zhao
, Tianwei Zhang
, Tao Xiang
:
Stealthiness Assessment of Adversarial Perturbation: From a Visual Perspective. 898-913 - Haochen Sun

, Tonghe Bai
, Jason Li, Hongyang Zhang
:
zkDL: Efficient Zero-Knowledge Proofs of Deep Learning Training. 914-927 - Zipeng Ye

, Wenjian Luo
, Qi Zhou, Yubo Tang, Zhenqian Zhu, Yuhui Shi
, Yan Jia:
Gradient Inversion of Text-Modal Data in Distributed Learning. 928-943 - Jiancun Wu

, Engang Tian
, Chen Peng
, Zhiru Cao
:
Data-Importance-Aware Attack Strategy Design and Secure Control Countermeasure. 944-954 - Fei Meng

, Leixiao Cheng
:
TSR-ABE: Traceable and Server-Aided Revocable Ciphertext-Policy Attribute-Based Encryption Under Static Assumptions. 955-967 - Chaowei Sun

, Qingyu Su
, Jian Li
:
Secure Tracking Control and Attack Detection for Power Cyber-Physical Systems Based on Integrated Control Decision. 968-979 - Pingyu Wang

, Xingjian Zheng
, Linbo Qing
, Bonan Li, Fei Su
, Zhicheng Zhao
, Honggang Chen
:
DRFormer: A Discriminable and Reliable Feature Transformer for Person Re-Identification. 980-995 - Mingwei Zeng, Jie Cui

, Qingyang Zhang
, Hong Zhong
, Debiao He
:
Efficient Revocable Cross-Domain Anonymous Authentication Scheme for IIoT. 996-1010 - Ziniu Liu

, Han Yu
, Kai Chen
, Aiping Li
:
Privacy-Preserving Generative Modeling With Sliced Wasserstein Distance. 1011-1022 - Yixiao Xu

, Binxing Fang, Mohan Li
, Xiaolei Liu
, Zhihong Tian
:
Query-Efficient Model Inversion Attacks: An Information Flow View. 1023-1036 - Zhenxin Cai, Yu Wang

, Guan Gui
, Jin Sha
:
Toward Robust Radio Frequency Fingerprint Identification via Adaptive Semantic Augmentation. 1037-1048 - Yipeng Liu

, Zhanqing Li
, Xuan Yang
, Xiao Lu, Jing Li, Peng Chen
, Ronghua Liang
:
Test-Time Image Reconstruction for Cross-Device OCT Fingerprint Extraction. 1049-1064 - Shahnewaz Karim Sakib

, George T. Amariucai
, Yong Guan
:
Information Leakage Measures for Imperfect Statistical Information: Application to Non-Bayesian Framework. 1065-1080 - Anmol Kumar

, Mayank Agarwal
:
Reducing Internal Collateral Damage From DDoS Attacks Through Micro-Service Cloud Architecture. 1081-1091 - Yibin Zhang

, Yuchao Liu
, Juzhen Wang, Qi Xuan
, Yun Lin
, Guan Gui
:
Enhancing Specific Emitter Identification: A Semi-Supervised Approach With Deep Cloud and Broad Edge Integration. 1092-1105 - Jia Sun

, Yanfeng Li
, Luyifu Chen
, Houjin Chen
, Minjun Wang
:
Dualistic Disentangled Meta-Learning Model for Generalizable Person Re-Identification. 1106-1118 - Shiyuan Xu

, Xue Chen
, Yu Guo
, Siu-Ming Yiu
, Shang Gao, Bin Xiao
:
Efficient and Secure Post-Quantum Certificateless Signcryption With Linkability for IoMT. 1119-1134 - Qiang Zhang

, Xiongwei Zhang
, Meng Sun
, Jibin Yang
:
A Soft-Contrastive Pseudo Learning Approach Toward Open-World Forged Speech Attribution. 1135-1148 - Jun Feng

, Yefan Wu
, Hong Sun
, Shunli Zhang
, Debin Liu
:
Panther: Practical Secure Two-Party Neural Network Inference. 1149-1162 - Wei Wang

, Haipeng Peng
, Junke Duan
, Licheng Wang
, Xiaoya Hu
, Zilin Zhao:
Resilient and Redactable Blockchain With Two-Level Rewriting and Version Detection. 1163-1175 - Lingyan Xue

, Haiping Huang
, Fu Xiao
, Qi Li
, Zhiwei Wang
:
A Privacy-Enhanced Traceable Anonymous Transaction Scheme for Blockchain. 1176-1191 - Yu Tian

, Kunbo Zhang
, Yalin Huang
, Leyuan Wang
, Yue Liu
, Zhenan Sun
:
Cross-Optical Property Image Translation for Face Anti-Spoofing: From Visible to Polarization. 1192-1205 - Bei Li

, Hong Zhong
, Jie Cui
, Chengjie Gu
, Debiao He
:
RRMAC: A Multi-Data Owner Access Control Scheme With Robust Revocation for Co-Owned Data Sharing. 1206-1221 - Kai Liang

, Songze Li, Ming Ding
, Feng Tian
, Youlong Wu
:
Privacy-Preserving Coded Schemes for Multi-Server Federated Learning With Straggling Links. 1222-1236 - Chenhao Wang

, Yang Ming
, Hang Liu
, Yutong Deng, Yi Zhao
, Songnian Zhang
:
Security-Enhanced Data Transmission With Fine-Grained and Flexible Revocation for DTWNs. 1237-1250 - Yuxian Li

, Jian Weng
, Junzuo Lai
, Yingjiu Li
, Jiahe Wu, Ming Li
, Jianfei Sun, Pengfei Wu
, Robert H. Deng
:
AuditPCH: Auditable Payment Channel Hub With Privacy Protection. 1251-1261 - Ming Zheng

, Xiaowen Hu
, Ying Hu
, Xiaoyao Zheng
, Yonglong Luo
:
Fed-UGI: Federated Undersampling Learning Framework With Gini Impurity for Imbalanced Network Intrusion Detection. 1262-1277 - Yingkun Wen

, Yan Huo
, Junhuai Li
, Jin Qian
, Kan Wang
:
Generative Adversarial Network-Aided Covert Communication for Cooperative Jammers in CCRNs. 1278-1289 - Yiming Yang

, Weipeng Hu
, Haifeng Hu
:
Progressive Cross-Modal Association Learning for Unsupervised Visible-Infrared Person Re-Identification. 1290-1304 - Andong Lu

, Chenglong Li
, Tianrui Zha, Xiaofeng Wang
, Jin Tang
, Bin Luo
:
Nighttime Person Re-Identification via Collaborative Enhancement Network With Multi-Domain Learning. 1305-1319 - Licheng Ji

, Jiguo Li
, Yichen Zhang, Yang Lu
:
Verifiable Searchable Symmetric Encryption Over Additive Homomorphism. 1320-1332 - Qi Guo

, Shanmin Pang
, Xiaojun Jia
, Yang Liu
, Qing Guo
:
Efficient Generation of Targeted and Transferable Adversarial Examples for Vision-Language Models via Diffusion Models. 1333-1348 - Huixian Li

, Wenyu Mo
, Chun Shen
, Liaojun Pang
:
EvalComp: Bootstrapping Based on Homomorphic Comparison Function for CKKS. 1349-1361 - Wenjing An, Derui Ding

, Hongli Dong
, Bo Shen
, Lei Sun
:
Privacy-Preserving Distributed Optimization for Economic Dispatch Over Balanced Directed Networks. 1362-1373 - Ying Miao, Keke Gai

, Jing Yu
, Yu-an Tan
, Liehuang Zhu
, Weizhi Meng
:
Blockchain-Empowered Keyword Searchable Provable Data Possession for Large Similar Data. 1374-1389 - Jingwei Chen

, Linhan Yang, Wenyuan Wu, Yang Liu, Yong Feng:
Homomorphic Matrix Operations Under Bicyclic Encoding. 1390-1404 - Changsong Jiang

, Chunxiang Xu
, Xinfeng Dong, Kefei Chen
, Guomin Yang
:
An Efficient Privacy-Preserving Scheme for Weak Password Collection in Internet of Things Against Perpetual Leakage. 1405-1420 - Pengwen Dai

, Jingyu Li
, Dayan Wu
, Peijia Zheng
, Xiaochun Cao
:
TextSafety: Visual Text Vanishing via Hierarchical Context-Aware Interaction Reconstruction. 1421-1433 - Hao Zhang

, Wenqi Shao, Hong Liu, Yongqiang Ma, Ping Luo, Yu Qiao, Nanning Zheng
, Kaipeng Zhang
:
B-AVIBench: Toward Evaluating the Robustness of Large Vision-Language Model on Black-Box Adversarial Visual-Instructions. 1434-1446 - Meng Zhang

, Li Lu
, Yuhan Wu, Zheng Yan, Jiaqi Sun, Feng Lin
, Kui Ren
:
DroneAudioID: A Lightweight Acoustic Fingerprint-Based Drone Authentication System for Secure Drone Delivery. 1447-1461 - Desheng Zheng

, Wuping Ke
, Xiao-Yu Li
, Yaoxin Duan
, Guangqiang Yin
, Fan Min
:
Enhancing the Transferability of Adversarial Attacks via Multi-Feature Attention. 1462-1474 - Cong Wu

, Jianfei Sun
, Jing Chen
, Mamoun Alazab
, Yang Liu
, Yang Xiang
:
$\mathsf{TCG}\text{-}\mathsf{IDS}$ : Robust Network Intrusion Detection via Temporal Contrastive Graph Learning. 1475-1486 - Xiaoyuan Liu

, Hongwei Li
, Guowen Xu
, Xilin Zhang
, Tianwei Zhang
, Jianying Zhou
:
Secure and Lightweight Feature Selection for Horizontal Federated Learning. 1487-1502 - Manlin Wang

, Yao Yao
, Haiyang Ding
, Shihai Shao
, Bin Xia
, Jiangzhou Wang
:
Angle and Distance Discrimination by Utilizing Frequency Conversion Capability of STC-IRS for Covert Communications. 1503-1518 - Zhichao You

, Xuewen Dong
, Shujun Li
, Ximeng Liu, Siqi Ma
, Yulong Shen
:
Local Differential Privacy Is Not Enough: A Sample Reconstruction Attack Against Federated Learning With Local Differential Privacy. 1519-1534 - Dongming Li

, Wanting Ma
, Fuhui Zhou
, Qihui Wu, Derrick Wing Kwan Ng
:
Physical-Layer Key Generation Efficient Beamspace Adaptations in 5G New Radio. 1535-1550 - Aruna Jayasena

, Richard Bachmann
, Prabhat Mishra
:
CiseLeaks: Information Leakage Assessment of Cryptographic Instruction Set Extension Prototypes. 1551-1565 - Vamoua Yachongka

, Hideki Yagi
, Hideki Ochiai
:
Outer Bounds on the CEO Problem With Privacy Constraints. 1566-1581 - Xin Liu

, Yichen Yang
, Kun He
, John E. Hopcroft
:
Parameter Interpolation Adversarial Training for Robust Image Classification. 1613-1623 - Qing Li

, Shanxiang Lyu
, Jinming Wen
:
Optimal Client Selection of Federated Learning Based on Compressed Sensing. 1679-1694 - Rongxin Tu

, Xiangui Kang
, Chee-Wei Tan
, Chi-Hung Chi
, Kwok-Yan Lam
:
All Points Guided Adversarial Generator for Targeted Attack Against Deep Hashing Retrieval. 1695-1709 - Yamei Wang

, Yuexin Zhang
, Ayong Ye
, Jian Shen
, Derui Wang
, Yang Xiang
:
Anonymous and Efficient (t, n)-Threshold Ownership Transfer for Cloud EMRs Auditing. 1710-1723 - Zhaoyang Li

, Zhu Teng
, Baopeng Zhang
, Jianping Fan
:
Bi-Stream Coteaching Network for Weakly-Supervised Deepfake Localization in Videos. 1724-1738 - Junpeng He

, Xiong Li
, Xiaosong Zhang
, Weina Niu
, Fagen Li
:
A Synthetic Data-Assisted Satellite Terrestrial Integrated Network Intrusion Detection Framework. 1739-1754 - Hao Wang

, Zhichao Chen
, Zhaoran Liu
, Haozhe Li
, Degui Yang
, Xinggao Liu, Haoxuan Li:
Entire Space Counterfactual Learning for Reliable Content Recommendations. 1755-1764 - Satyabrat Rath

, Jothi Ramalingam
, Sohham Seal:
A Note on "Secure and Efficient Outsourcing of PCA-Based Face Recognition". 1765-1766 - Kaiyi Pang

, Tao Qi
, Chuhan Wu, Minhao Bai
, Minghu Jiang, Yongfeng Huang
:
ModelShield: Adaptive and Robust Watermark Against Model Extraction Attack. 1767-1782 - Qiaofeng Zhang, Meng Li, Yong Chen, Meng Zhang:

Non-Fragile Robust Security Control Based on Dynamic Threshold Cryptographic Detector for Remote Motor Under Stealthy FDI Attacks. 1783-1793 - Wei Peng, Lei Cui, Wei Cai, Wei Wang, Xiaoyu Cui, Zhiyu Hao, Xiaochun Yun:

Bottom Aggregating, Top Separating: An Aggregator and Separator Network for Encrypted Traffic Understanding. 1794-1806 - You Li, Yan Huo

, Tianhui Zhang
, Zhongguo Zhou, Qinghe Gao
, Tao Yan, Yongning Yang, Tao Jing
:
Distributed Physical Layer Authentication With Dynamic Soft Voting for Smart Distribution Grids. 1807-1821 - Qihua Hu

, Weiping Wang
, Hong Song
, Song Guo
, Jian Zhang
, Shigeng Zhang
:
ASDroid: Resisting Evolving Android Malware With API Clusters Derived From Source Code. 1822-1835 - Xinyue Zhang

, Jiahuan Zhou
, Luxin Yan
, Sheng Zhong
, Xu Zou
:
Hunt Camouflaged Objects via Revealing Mutation Regions. 1836-1851 - Mingzhi Hu

, Hongxia Wang
:
Mutual Information-Optimized Steganalysis for Generative Steganography. 1852-1865 - Xiaofu Chen

, Jiangyi Deng
, Yanjiao Chen
, Chaohao Li, Xin Fang, Cong Liu
, Wenyuan Xu
:
Imprints: Mitigating Watermark Removal Attacks With Defensive Watermarks. 1866-1881 - Bo Yang

, Hengwei Zhang
, Jindong Wang, Yulong Yang
, Chenhao Lin
, Chao Shen
, Zhengyu Zhao
:
Adversarial Example Soups: Improving Transferability and Stealthiness for Free. 1882-1894 - Jie Zhang

, Zhifan Wan
, Lanqing Hu
, Stephen Lin, Shuzhe Wu, Shiguang Shan
:
Collaboratively Self-Supervised Video Representation Learning for Action Recognition. 1895-1907 - Guoying Qiu

, Tiecheng Bai
, Guoming Tang
, Deke Guo
, Chuandong Li
, Yan Gan
, Baoping Zhou, Yulong Shen
:
Quantifying Privacy Risks of Behavioral Semantics in Mobile Communication Services. 1908-1923 - Hanyong Liu

, Lei Xu
, Xiaoning Liu
, Lin Mei
, Chungen Xu
:
Query Correlation Attack Against Searchable Symmetric Encryption With Supporting for Conjunctive Queries. 1924-1936 - Yongxiang Li

, Yuan Sun
, Yang Qin
, Dezhong Peng
, Xi Peng
, Peng Hu
:
Robust Duality Learning for Unsupervised Visible-Infrared Person Re-Identification. 1937-1948 - Jinhao Zhou

, Jun Wu
, Jianbing Ni
, Yuntao Wang
, Yanghe Pan
, Zhou Su
:
Protecting Your Attention During Distributed Graph Learning: Efficient Privacy-Preserving Federated Graph Attention Network. 1949-1964 - Yixuan Wu

, Long Zhang
, Lin Yang
, Feng Yang, Linru Ma
, Zhoumin Lu
, Wen Jiang
:
Intrusion Detection for Internet of Things: An Anchor Graph Clustering Approach. 1965-1980 - Xintao Pei

, Yuling Chen
, Yangyang Long
, Haiwei Sang, Yun Luo:
Einocchio: Efficiently Outsourcing Polynomial Computation With Verifiable Computation and Optimized Newton Interpolation. 1981-1992 - Likai Wang

, Xiangqun Zhang
, Ruize Han
, Yanjie Wei
, Song Wang
, Wei Feng
:
A New Benchmark and Algorithm for Clothes-Changing Video Person Re-Identification. 1993-2005 - Changsong Jiang

, Chunxiang Xu
, Guomin Yang
, Zhao Zhang
, Jie Chen
:
Device-Enhanced Password-Based Threshold Single-Sign-On Authentication. 2006-2021 - Anlin Chen

, Shengling Wang
, Hongwei Shi
, Yu Guo
, Xiuzhen Cheng
:
Reconnaissance-Strike Complex: A Network-Layer Solution to the Natural Forking in Blockchain. 2022-2034 - Zhong Li

, Xueting Yang
, Changjun Jiang
:
Multi-View Graph-Based Hierarchical Representation Learning for Money Laundering Group Detection. 2035-2050 - Ala Gouissem

, Shaimaa Hassanein
, Khalid Abualsaud
, Elias Yaacoub
, M. Mabrok, M. Abdallah, Tamer Khattab
, Mohsen Guizani
:
Low Complexity Byzantine-Resilient Federated Learning. 2051-2066 - Yankai Rong

, Guoshun Nan
, Minwei Zhang
, Sihan Chen
, Songtao Wang, Xuefei Zhang
, Nan Ma
, Shixun Gong
, Zhaohui Yang
, Qimei Cui
, Xiaofeng Tao
, Tony Q. S. Quek
:
Semantic Entropy Can Simultaneously Benefit Transmission Efficiency and Channel Security of Wireless Semantic Communications. 2067-2082 - Rama Krishna Koppanati

, Monika Santra
, Sateesh Kumar Peddoju
:
D24D: Dynamic Deep 4-Dimensional Analysis for Malware Detection. 2083-2095 - Zhuoran Ma

, Xinyi Huang, Zhuzhu Wang
, Zhan Qin
, Xiangyu Wang
, Jianfeng Ma
:
FedGhost: Data-Free Model Poisoning Enhancement in Federated Learning. 2096-2108 - Sisung Liu

, Jeong Gyu Park
, Hyeongsik Kim
, Je Hyeong Hong
:
A Cross-Attention Multi-Scale Performer With Gaussian Bit-Flips for File Fragment Classification. 2109-2121 - Mingping Qi

, Chi Chen
:
HPQKE: Hybrid Post-Quantum Key Exchange Protocol for SSH Transport Layer From CSIDH. 2122-2131 - Huazhong Zhao, Lei Qi

, Xin Geng
:
CILP-FGDI: Exploiting Vision-Language Model for Generalizable Person Re-Identification. 2132-2142 - Huajie Chen

, Tianqing Zhu
, Lefeng Zhang
, Bo Liu
, Derui Wang
, Wanlei Zhou
, Minhui Xue
:
QUEEN: Query Unlearning Against Model Extraction. 2143-2156 - Ruichao Liang

, Jing Chen
, Cong Wu
, Kun He
, Yueming Wu
, Ruochen Cao, Ruiying Du
, Ziming Zhao, Yang Liu
:
Vulseye: Detect Smart Contract Vulnerabilities via Stateful Directed Graybox Fuzzing. 2157-2170 - Yongluo Liu

, Zun Li, Lifang Wu
:
Dual Consistency Regularization for Generalized Face Anti-Spoofing. 2171-2183 - Yuxuan Qiu

, Liyang Wang
, Wei Song
, Jiawei Liu
, Zhi-Ping Shi
, Na Jiang
:
Advancing Visible-Infrared Person Re-Identification: Synergizing Visual-Textual Reasoning and Cross-Modal Feature Alignment. 2184-2196 - Jiahao Liu

, Caihui Du, Jihong Yu
, Jiangchuan Liu
, Huan Qi:
No Time for Remodulation: A PHY Steganographic Symbiotic Channel Over Constant Envelope. 2197-2211 - Fucai Luo

, Xingfu Yan
, Haining Yang
, Xiaofan Zheng
:
PAEWS: Public-Key Authenticated Encryption With Wildcard Search Over Outsourced Encrypted Data. 2212-2223 - Kai Zhang

, Pei-Wei Tsai
, Jiao Tian, Wenyu Zhao, Ke Yu, Hongwang Xiao, Xinyi Cai, Longxiang Gao
, Jinjun Chen
:
DPNM: A Differential Private Notary Mechanism for Privacy Preservation in Cross-Chain Transactions. 2224-2236 - Lifan Hu, Yu Wang

, Xue Fu
, Lantu Guo
, Yun Lin
, Guan Gui
:
Energy-Efficient Wireless Technology Recognition Method Using Time-Frequency Feature Fusion Spiking Neural Networks. 2252-2265 - Qinghua Mao

, Xi Lin
, Wenchao Xu
, Yuxin Qi
, Xiu Su
, Gaolei Li
, Jianhua Li
:
FeCoGraph: Label-Aware Federated Graph Contrastive Learning for Few-Shot Network Intrusion Detection. 2266-2280 - Denise Moussa

, Germans Hirsch
, Christian Riess
:
EnvId: A Metric Learning Approach for Forensic Few-Shot Identification of Unseen Environments. 2281-2296 - Ya-Ting Yang

, Tao Zhang
, Quanyan Zhu
:
Herd Accountability of Privacy-Preserving Algorithms: A Stackelberg Game Approach. 2237-2251 - Shuangrui Zhao

, Jia Liu
, Yulong Shen
, Xiaohong Jiang
, Tarik Taleb
, Norio Shiratori
:
On the Impact of Warden Collusion on Covert Communication in Wireless Networks. 2297-2312 - Xueman Wang

, Yipeng Wang
, Yingxu Lai
, Zhiyu Hao
, Alex X. Liu
:
Reliable Open-Set Network Traffic Classification. 2313-2328 - Zijie Lou, Gang Cao

, Kun Guo, Lifang Yu
, Shaowei Weng
:
Exploring Multi-View Pixel Contrast for General and Robust Image Forgery Localization. 2329-2341 - Qi Liu, Chengcheng Zhao

, Mengxiang Liu
, Ruilong Deng
, Peng Cheng
:
Submodularity-Based False Data Injection Attack Strategy in DC Microgrids. 2342-2356 - Huafeng Li

, Yaoxin Liu, Yafei Zhang
, Jinxing Li
, Zhengtao Yu
:
Breaking the Paired Sample Barrier in Person Re-Identification: Leveraging Unpaired Samples for Domain Generalization. 2357-2371 - Mingtian Zhang

, Anjia Yang
, Jian Weng
, Min-Rong Chen
, Huang Zeng, Yi Liu
, Xiaoli Liu
, Zhihua Xia
:
Efficient and Privacy-Preserving Ride Matching Over Road Networks Against Malicious ORH Server. 2372-2386 - Xiao Li

, Hang Chen
, Xiaolin Hu
:
On the Importance of Backbone to the Adversarial Robustness of Object Detectors. 2387-2398 - Marios Aristodemou

, Xiaolan Liu
, Yuan Wang
, Konstantinos G. Kyriakopoulos, Sangarapillai Lambotharan
, Qingsong Wei
:
Maximizing Uncertainty for Federated Learning via Bayesian Optimization-Based Model Poisoning. 2399-2411 - Ying Zhao

, Kai Zhang
, Longxiang Gao
, Jinjun Chen
:
Privacy and Fairness Analysis in the Post-Processed Differential Privacy Framework. 2412-2423 - S. V. Dilip Kumar

, Josep Balasch
, Benedikt Gierlichs
, Ingrid Verbauwhede
:
Low-Cost First-Order Secure Boolean Masking in Glitchy Hardware. 2437-2449 - Jingjing Xue

, Sheng Sun
, Min Liu
, Qi Li
, Ke Xu
:
Enhancing Federated Learning Robustness Using Locally Benignity-Assessable Bayesian Dropout. 2464-2479 - Boan Yu

, Jun Zhao
, Kai Zhang
, Junqing Gong
, Haifeng Qian
:
Lightweight and Dynamic Privacy-Preserving Federated Learning via Functional Encryption. 2496-2508 - Haoyang Wang

, Kai Fan
, Chong Yu
, Kuan Zhang
, Fenghua Li
, Haojin Zhu:
Beyond Access Pattern: Efficient Volume-Hiding Multi-Range Queries Over Outsourced Data Services. 2509-2522 - Marc Dib

, Samuel Pierre:
HSM-Based Architecture to Detect Insider Attacks on Server-Side Data. 2538-2549 - Chaohao Fu

, Hongbin Chen
, Na Ruan
:
Privacy for Free: Spy Attack in Vertical Federated Learning by Both Active and Passive Parties. 2550-2563 - Tao Wang

, Wenying Wen
, Xiangli Xiao
, Zhongyun Hua
, Yushu Zhang
, Yuming Fang
:
Beyond Privacy: Generating Privacy-Preserving Faces Supporting Robust Image Authentication. 2564-2576 - Marvin Xhemrishi

, Johan Östman
, Antonia Wachter-Zeh
, Alexandre Graell i Amat
:
FedGT: Identification of Malicious Clients in Federated Learning With Secure Aggregation. 2577-2592 - Shuoyi Chen

, Mang Ye
, Yan Huang, Bo Du
:
Towards Effective Rotation Generalization in UAV Object Re-Identification. 2593-2606 - Runwen Hu

, Yuhong Wu, Shijun Xiang
, Xiaolong Li
, Yao Zhao
:
Deep Prediction and Efficient 3D Mapping of Color Images for Reversible Data Hiding. 2607-2620 - Zhenhua Chen

, Kaili Long, Junrui Xie
, Qiqi Lai, Yilei Wang, Ni Li
, Luqi Huang
, Aijun Ge:
A New Functional Encryption Scheme Supporting Privacy-Preserving Maximum Similarity for Web Service Platforms. 2621-2631 - Lingzhi Zhao, Jianquan Lu

, Yang Liu
, Jungang Lou
:
Dynamic Event-Triggered Control for Leader-Following Consensus of Nonlinear Multi-Agent Systems Against Malicious Attacks. 2424-2436 - Ali Nikkhah

, Morteza Shoushtari
, Bahareh Akhbari
, Willie K. Harrison
:
Secrecy Coding for the Binary Symmetric Wiretap Channel via Linear Programming. 2450-2463 - Bichen Kang

, Neng Ye
, Jianping An
:
Achieving Positive Rate of Covert Communications Covered by Randomly Activated Overt Users. 2480-2495 - Huici Wu

, Yi Fang
, Na Li
, Xin Yuan
, Zhiqing Wei
, Guoshun Nan
, Xiaofeng Tao
:
Secret Key Generation With Untrusted Internal Eavesdropper: Token-Based Anti-Eavesdropping. 2523-2537 - Guangyong Gao

, Xiaoan Chen
, Li Li
, Zhihua Xia
, Jianwei Fei
, Yun Qing Shi:
Screen-Shooting Robust Watermark Based on Style Transfer and Structural Re-Parameterization. 2648-2663 - Ximing Fu

, Mo Li
, Qingming Zeng, Tianyang Li, Shenghao Yang
, Yonghui Guan, Chuanyi Liu
:
Hamster: A Fast Synchronous Byzantine Fault Tolerant Protocol. 2664-2676 - Yuanchao Chen, Yuwei Li, Yuliang Lu, Zulie Pan, Yuan Chen, Shouling Ji, Yu Chen, Yang Li, Yi Shen:

Understanding the Security Risks of Websites Using Cloud Storage for Direct User File Uploads. 2677-2692 - Shuo Wang

, Keke Gai
, Jing Yu
, Zijian Zhang
, Liehuang Zhu
:
PraVFed: Practical Heterogeneous Vertical Federated Learning via Representation Learning. 2693-2705 - Ying Gao

, Huanghao Deng
, Zukun Zhu
, Xiaofeng Chen
, Yuxin Xie
, Pei Duan
, Peixuan Chen:
Peafowl: Private Entity Alignment in Multi-Party Privacy-Preserving Machine Learning. 2706-2720 - Keke Gai

, Zijun Wang, Jing Yu
, Liehuang Zhu
:
MUFTI: Multi-Domain Distillation-Based Heterogeneous Federated Continuous Learning. 2721-2733 - Dacan Luo

, Junduan Huang
, Weili Yang
, M. Saad Shakeel
, Wenxiong Kang
:
RSNet: Region-Specific Network for Contactless Palm Vein Authentication. 2734-2747 - Yu Jiang

, Jiyuan Shen, Ziyao Liu
, Chee-Wei Tan
, Kwok-Yan Lam
:
Toward Efficient and Certified Recovery From Poisoning Attacks in Federated Learning. 2632-2647 - Luyang Ying

, Cheng Xiong, Chuan Qin
, Xiangyang Luo
, Zhenxing Qian
, Xinpeng Zhang
:
Generative Collision Attack on Deep Image Hashing. 2748-2762 - Fatih Emre Tosun

, André M. H. Teixeira
, Jingwei Dong
, Anders Ahlén
, Subhrakanti Dey
:
Kullback-Leibler Divergence-Based Observer Design Against Sensor Bias Injection Attacks in Single-Output Systems. 2763-2777 - Lijuan Huo

, Libing Wu
, Enshu Wang, Jinfei Liu
, Chunshuo Li, Zemei Liu, Zhuangzhuang Zhang
:
NTTproofs: A Maintainable and Aggregatable Vector Commitment With Fast Openings and Updates. 2778-2792 - Yu Fu

, Yu Tong, Yijing Ning
, Tianshi Xu
, Meng Li
, Jingqiang Lin
, Dengguo Feng
:
Swift: Fast Secure Neural Network Inference With Fully Homomorphic Encryption. 2793-2806 - Stanislav Kruglik

, Han Mao Kiah
, Son Hoang Dau
, Eitan Yaakobi
:
Recovering Reed-Solomon Codes Privately. 2807-2821 - Charles Gouert

, Dimitris Mouris
, Nektarios Georgios Tsoutsos
:
HELM: Navigating Homomorphic Encryption Through Gates and Lookup Tables. 2822-2835 - Gokularam Muthukrishnan

, Sheetal Kalyani
:
Differential Privacy With Higher Utility by Exploiting Coordinate-Wise Disparity: Laplace Mechanism Can Beat Gaussian in High Dimensions. 2836-2851 - Tinghan Wang, Chenhao Ying

, Jia Wang
, Yuan Luo
:
Information-Theoretic Security Problem in Cluster Distributed Storage Systems: Regenerating Code Against Two General Types of Eavesdroppers. 2852-2867 - Md. Mamunur Rashid

, Yong Xiang
, Md. Palash Uddin
, Jine Tang
, Keshav Sood
, Longxiang Gao
:
Trustworthy and Fair Federated Learning via Reputation-Based Consensus and Adaptive Incentives. 2868-2882 - Shuai Tang

, Peisong He
, Haoliang Li
, Wei Wang, Xinghao Jiang
, Yao Zhao
:
Towards Extensible Detection of AI-Generated Images via Content-Agnostic Adapter-Based Category-Aware Incremental Learning. 2883-2898 - Tianyu Zhaolu

, Zhiguo Wan
, Huaqun Wang
:
Post-Quantum Rollup: Falcon Signature Aggregation Based on SNARG With Enhanced Gates. 2899-2914 - Zhaoyi Meng

, Jiale Zhang, Jiaqi Guo, Wansen Wang
, Wenchao Huang
, Jie Cui
, Hong Zhong
, Yan Xiong
:
Detecting Android Malware by Visualizing App Behaviors From Multiple Complementary Views. 2915-2929 - Xueji Yang

, Fei Tong
, Fang Jiang, Guang Cheng
:
A Lightweight and Dynamic Open-Set Intrusion Detection for Industrial Internet of Things. 2930-2943 - Zhiqi Pang

, Lingling Zhao, Yang Liu
, Gaurav Sharma, Chunyu Wang
:
Joint Augmentation and Part Learning for Unsupervised Clothing Change Person Re-Identification. 2944-2956 - Weijie Xiong

, Jingran Lin
, Zhiling Xiao
, Qiang Li
:
Constant-Modulus Secure Analog Beamforming for an IRS-Assisted Communication System With Large-Scale Antenna Array. 2957-2969 - Qi Liu

, Xiaojie Guo
, Kang Yang
, Yu Yu
:
Labeled Private Set Intersection From Distributed Point Function. 2970-2983 - Ruonan Chen

, Yang Zhang, Dawei Li
, Yizhong Liu
, Jianwei Liu
, Qianhong Wu
, Jianying Zhou
, Willy Susilo
:
Bitcoin-Compatible Privacy-Preserving Multi-Party Payment Channels Supporting Variable Amounts. 2984-2998 - Yuhan Chai

, Ximing Chen
, Jing Qiu
, Lei Du
, Yanjun Xiao, Qiying Feng, Shouling Ji
, Zhihong Tian
:
MalFSCIL: A Few-Shot Class-Incremental Learning Approach for Malware Detection. 2999-3014 - Chenyang Wang, Yan Yan

, Jing-Hao Xue
, Hanzi Wang
:
I2OL-Net: Intra-Inter Objectness Learning Network for Point-Supervised X-Ray Prohibited Item Detection. 3045-3059 - Kaixiang Liu

, Yongfang Xie
, Shiwen Xie
, Yuqi Chen, Xin Chen
, Limin Sun
, Zhiwen Pan:
SecureSIS: Securing SIS Safety Functions With Safety Attributes and BPCS Information. 3060-3073 - Yansen Xin

, Hui Ma
, Rui Zhang
:
Hodor: Robust Fine-Grained Information Flow Control With Full Data Traffic Protection for Cloud-Edge Computing. 3074-3087 - Daniel Günther

, Marco Holz, Benjamin Judkewitz, Helen Möllering
, Benny Pinkas, Thomas Schneider
, Ajith Suresh
:
Privacy-Preserving Epidemiological Modeling on Mobile Graphs. 3088-3101 - Jiaxin Mi

, Qi Li
, Zewei Han
, Weilue Liao, Junsong Fu
:
Graph Learning on Instruction Stream-Augmented CFG for Malware Variant Detection. 3015-3030 - Mehedi Hassan

, Mehmet Engin Tozal
, Vipin Swarup
, Steven Noel
, Raju Gottumukkala
, Vijay Raghavan
:
Detecting Anomalous Communication Behaviors in Dynamically Evolving Networked Systems. 3031-3044 - Xiangyun Tang

, Luyao Peng
, Yu Weng
, Meng Shen
, Liehuang Zhu
, Robert H. Deng
:
Enforcing Differential Privacy in Federated Learning via Long-Term Contribution Incentives. 3102-3115 - Jiajun Chen

, Chunqiang Hu
, Weihong Sheng
, Tao Xiang
, Pengfei Hu
, Jiguo Yu
:
Sensitivity-Aware Personalized Differential Privacy Guarantees for Online Social Networks. 3116-3130 - Zhixuan Zhang

, Xingjian Zheng
, Linbo Qing
, Qi Liu
, Pingyu Wang, Yu Liu
, Jiyang Liao
:
A Stable and Efficient Data-Free Model Attack With Label-Noise Data Generation. 3131-3145 - Kuan Liu

, Jianting Ning
, Pengfei Wu
, Shengmin Xu
, Rongmao Chen
:
TLARDA: Threshold Label-Aggregating Remote Data Auditing in Decentralized Environment. 3146-3160 - Xin Zhang, Kejiang Chen

, Na Zhao, Weiming Zhang
, Nenghai Yu
:
Provably Secure Public-Key Steganography Based on Admissible Encoding. 3161-3175 - Yang Yang

, Haihui Fan
, Jinchao Zhang
, Bo Li, Hui Ma
, Xiaoyan Gu
:
SMSSE: Size-Pattern Mitigation Searchable Symmetric Encryption. 3176-3189 - Serhat Bakirtas

, Elza Erkip
:
Distribution-Agnostic Database De-Anonymization Under Obfuscation and Synchronization Errors. 3190-3203 - Chao Zha

, Zhiyu Wang
, Yifei Fan, Bing Bai
, Yinjie Zhang
, Sainan Shi
, Ruyun Zhang
:
A-NIDS: Adaptive Network Intrusion Detection System Based on Clustering and Stacked CTGAN. 3204-3219 - Jie Zhang

, Futai Zhang
, Xinyi Huang
:
Theory and Applications of Sequentially Threshold Public-Key Cryptography: Practical Private Key Safeguarding and Secure Use for Individual Users. 3220-3233 - Yongliang Xu

, Hang Cheng
, Jiguo Li
, Ximeng Liu
, Xinpeng Zhang
, Meiqing Wang
:
Lightweight Multi-User Public-Key Authenticated Encryption With Keyword Search. 3234-3246 - Minhong Sun

, Jiazhong Teng
, Xinyuan Liu
, Wei Wang
, Xingru Huang
:
Few-Shot Specific Emitter Identification: A Knowledge, Data, and Model-Driven Fusion Framework. 3247-3259 - Junpeng Zhang

, Hui Zhu
, Jiaqi Zhao
, Rongxing Lu
, Yandong Zheng
, Jiezhen Tang
, Hui Li
:
COKV: Key-Value Data Collection With Condensed Local Differential Privacy. 3260-3273 - Weiqi Dai

, Yang Zhou, Xiaohai Dai
, Kim-Kwang Raymond Choo
, Xia Xie, Deqing Zou
, Hai Jin
:
CR-DAP: A Comprehensive and Regulatory Decentralized Anonymous Payment System. 3274-3286 - Chao Pan

, Donghui Hu
, Yaofei Wang
, Kejiang Chen
, Yinyin Peng, Xianjin Rong, Chen Gu
, Meng Li
:
Rethinking Prefix-Based Steganography for Enhanced Security and Efficiency. 3287-3301 - Siquan Huang

, Yijiang Li, Xingfu Yan
, Ying Gao
, Chong Chen
, Leyu Shi
, Biao Chen, Wing W. Y. Ng
:
Scope: On Detecting Constrained Backdoor Attacks in Federated Learning. 3302-3315 - Xiao-Yu Yue

, Jiang-Wen Xiao
, Xiaokang Liu
, Yan-Wu Wang
:
Differentially Private Linearized ADMM Algorithm for Decentralized Nonconvex Optimization. 3316-3329 - Luming Yang

, Yongjun Wang, Lin Liu
, Junjie Huang
, Jiangyong Shi
, Shaojing Fu
, Shize Guo
:
unFlowS: An Unsupervised Construction Scheme of Flow Spectrum for Network Traffic Detection. 3330-3345 - Yan Zhang

, Chunsheng Gu
, Peizhong Shi
, Zhengjun Jing
, Bing Li
, Bo Liu
:
Bring Your Device Group (BYDG): Efficient and Privacy-Preserving User-Device Authentication Protocol in Multi-Access Edge Computing. 3346-3361 - Adrián Tobar Nicolau

, Javier Parra-Arnau, Jordi Forné
, Vicenç Torra
:
Uncoordinated Syntactic Privacy: A New Composable Metric for Multiple, Independent Data Publishing. 3362-3373 - Hongliang He

, Nengcheng Chen
:
Parallel PAM for Secure Transmission. 3374-3386 - Jianfeng Du

, Zhu Wang
, Aimin Yu
:
Revisiting the Masking Strategy: A Side-Channel Attack on CRYSTALS-Kyber. 3387-3399 - Mahdi Alehdaghi

, Arthur Josi
, Rafael M. O. Cruz
, Pourya Shamsolmoali
, Eric Granger
:
Adaptive Generation of Privileged Intermediate Information for Visible-Infrared Person Re-Identification. 3400-3413 - Tingxu Han

, Weisong Sun
, Ziqi Ding
, Chunrong Fang
, Hanwei Qian
, Jiaxun Li
, Zhenyu Chen
, Xiangyu Zhang
:
Mutual Information Guided Backdoor Mitigation for Pre-Trained Encoders. 3414-3428 - Haoran Zha

, Hanhong Wang, Yu Wang
, Zhi Sun
, Guan Gui
, Yun Lin
:
Enhancing Security in 5G NR With Channel-Robust RF Fingerprinting Leveraging SRS for Cross-Domain Stability. 3429-3444 - Tianchi Liao

, Lele Fu
, Lei Zhang
, Lei Yang
, Chuan Chen
, Michael Kwok-Po Ng
, Huawei Huang
, Zibin Zheng
:
Privacy-Preserving Vertical Federated Learning With Tensor Decomposition for Data Missing Features. 3445-3460 - Wenke Huang

, Mang Ye
, Zekun Shi, He Li
, Bo Du
:
Kindle Federated Generalization With Domain Specialized and Invariant Knowledge. 3461-3474 - Yunlong He

, Jia Yu
:
Toward Secure Weighted Aggregation for Privacy-Preserving Federated Learning. 3475-3488 - Jian-Wei Li

, Wen-Ze Shao
, Yubao Sun
, Li-Qian Wang
, Qi Ge
, Liang Xiao:
Boosting Adversarial Transferability via Relative Feature Importance-Aware Attacks. 3489-3504 - Luyao Wang

, Hao Guo, Weibin Wu
, Lu Zhou
:
Efficient and Privacy-Preserving Feature Selection Based on Multiparty Computation. 3505-3518 - Xiaoyu Shen

, Tao Zhang
, Hao Wu
, Xiaoqiang Qiao
, Yihang Du
, Guan Gui
:
An Adaptive Domain-Incremental Framework With Knowledge Replay and Domain Alignment for Specific Emitter Identification. 3519-3533 - Yansong Zhang

, Xiaojun Chen
, Ye Dong
, Qinghui Zhang
, Rui Hou
, Qiang Liu
, Xudong Chen
:
MD-SONIC: Maliciously-Secure Outsourcing Neural Network Inference With Reduced Online Communication. 3534-3549 - Marco Spanghero

, Filip Geib, Ronny Panier, Panos Papadimitratos
:
GNSS Jammer Localization and Identification With Airborne Commercial GNSS Receivers. 3550-3565 - Shuyi Li

, Bob Zhang
, Qinghua Hu
:
Dual-Cohesion Metric Learning for Few-Shot Hand-Based Multimodal Recognition. 3566-3575 - Teddy Furon

:
On the Vulnerability of Retrieval in High Intrinsic Dimensionality Neighborhood. 3576-3586 - Zekun Sun

, Na Ruan
, Jianhua Li
:
DDL: Effective and Comprehensible Interpretation Framework for Diverse Deepfake Detectors. 3601-3615 - Yuanyuan Ma

, Lige Xu, Qianqian Zhang, Yi Zhang
, Xianwei Xin, Xiangyang Luo
:
EIS-OBEA: Enhanced Image Steganalysis via Opposition-Based Evolutionary Algorithm. 3616-3631 - Xue Chen

, Shang Gao
, Shiyuan Xu
, Liquan Chen
, Siu-Ming Yiu
, Bin Xiao
:
From Σ-Protocol-Based Signatures to Ring Signatures: General Construction and Applications. 3646-3661 - Tianhua Xu

, Sheng-hua Zhong
, Zhi Zhang
, Yan Liu:
Intellectual Property Protection for Deep Models: Pioneering Cross-Domain Fingerprinting Solutions. 3587-3600 - Jiayi Chen, Zhufang Kuang

, Yuhao Zhang
, Siyu Lin
, Anfeng Liu
:
Blockchain-Enabled Computing Offloading and Resource Allocation in Multi-UAVs MEC Network: A Stackelberg Game Learning Approach. 3632-3645 - Jie Cai

, Jiachi Chen
, Tao Zhang
, Xiapu Luo
, Xiaobing Sun
, Bin Li:
Detecting Reentrancy Vulnerabilities for Solidity Smart Contracts With Contract Standards-Based Rules. 3662-3676 - Syed Shafiulla

, Manas Kumar Jena
:
A Dynamic State Estimation-Based Cyberattack Detection Scheme to Supervise Legacy Pilot Protection Operation. 3677-3688 - Xin Zhao

, Mu Zhang, Xiaopeng Ke
, Yu Pan
, Yue Duan, Sheng Zhong
, Fengyuan Xu
:
DeepVMUnProtect: Neural Network-Based Recovery of VM-Protected Android Apps for Semantics-Aware Malware Detection. 3689-3704 - Le Cheng

, Peican Zhu
, Keke Tang
, Chao Gao
, Zhen Wang
:
Efficient Source Detection in Incomplete Networks via Sensor Deployment and Source Approaching. 3705-3716 - Jianhua Liu

, Xin Wang
, Kui Ren
, Yiyi Zhou, Minglu Li
:
Secure Service Function Chain Provisioning for Task Offloading in Device-Edge-Cloud Computing. 3717-3730 - Yongchao Meng

, Peihan Qi
, Shilian Zheng
, Zihao Cai, Xiaoyu Zhou
, Tao Jiang
:
Adversarial Attack and Reliable Defense Based on Frequency Domain Feature Enhancement for Automatic Modulation Classification. 3731-3744 - Zhilin Wang

, Qin Hu
, Xukai Zou, Pengfei Hu
, Xiuzhen Cheng
:
Can We Trust the Similarity Measurement in Federated Learning? 3758-3771 - Chengze Jiang

, Junkai Wang, Minjing Dong
, Jie Gui
, Xinli Shi
, Yuan Cao
, Yuan Yan Tang
, James Tin-Yau Kwok
:
Improving Fast Adversarial Training via Self-Knowledge Guidance. 3772-3787 - Zhihao Wang

, Lei Xue
, Xiapu Luo
, Xiaobo Ma
, Guofei Gu
:
Driving State-Aware Anomaly Detection for Autonomous Vehicles. 3788-3803 - Euibum Lee

, Dong-Hoon Choi
, Taesik Nam
, Inhwan Kim
, Youngjae Yu
, Jong-Gwan Yook
:
Complete Coherent Demodulation and Recovery of Spread Spectrum Clocking-Based Electromagnetic Information Leakage: Theory and Demonstration. 3804-3818 - Xiaoxiao Miao

, Ruijie Tao
, Chang Zeng
, Xin Wang
:
A Benchmark for Multi-Speaker Anonymization. 3819-3833 - Yuxin Xi, Yu Guo

, Shiyuan Xu
, Chengjun Cai
, Xiaohua Jia
:
Private Sample Alignment for Vertical Federated Learning: An Efficient and Reliable Realization. 3834-3848 - Cong Li

, Xiaoyu Jiao, Xinyu Feng
, Anyang Hu, Qingni Shen
, Zhonghai Wu
:
Identity-Based Chameleon Hashes in the Standard Model for Mobile Devices. 3849-3861 - Mengxiang Liu

, Zhongda Chu
, Fei Teng
:
Cyber Recovery From Dynamic Load Altering Attacks: Linking Electricity, Transportation, and Cyber Networks. 3862-3876 - Li Yang

, Yinbin Miao
, Ziteng Liu
, Zhiquan Liu
, Xinghua Li
, Da Kuang
, Hongwei Li
, Robert H. Deng
:
Enhanced Model Poisoning Attack and Multi-Strategy Defense in Federated Learning. 3877-3892 - Andrey V. Galichin, Mikhail Pautov

, Alexey Zhavoronkin, Oleg Y. Rogov
, Ivan V. Oseledets:
GLiRA: Closed-Box Membership Inference Attack via Knowledge Distillation. 3893-3906 - Jiahui Wu

, Fucai Luo
, Tiecheng Sun
, Weizhe Zhang
:
Vulnerabilities of NSPFL: Privacy-Preserving Federated Learning With Data Integrity Auditing. 3907-3908 - Yihao Huang

, Xin Luo
, Qing Guo
, Felix Juefei-Xu
, Xiaojun Jia
, Weikai Miao, Geguang Pu
, Yang Liu
:
Scale-Invariant Adversarial Attack Against Arbitrary-Scale Super-Resolution. 3909-3924 - Miaomiao Tian

, Chuang Gao, Long Chen
, Hong Zhong
, Jie Chen
:
Proofs of Retrievability With Public Verifiability From Lattices. 3925-3935 - Jingdan Kang, Haoxin Yang

, Yan Cai
, Huaidong Zhang
, Xuemiao Xu
, Yong Du
, Shengfeng He
:
SITA: Structurally Imperceptible and Transferable Adversarial Attacks for Stylized Image Generation. 3936-3949 - Yi Yu

, Song Xia, Xun Lin
, Chenqi Kong
, Wenhan Yang
, Shijian Lu
, Yap-Peng Tan, Alex C. Kot
:
Toward Model Resistant to Transferable Adversarial Examples via Trigger Activation. 3745-3757 - Jianfei Sun

, Guowen Xu
, Yang Yang
, Xuehuan Yang, Xiaoguo Li
, Cong Wu
, Zhen Liu
, Guomin Yang
, Robert H. Deng
:
Forward-Secure Hierarchical Delegable Signature for Smart Homes. 3950-3965 - Ziyao Liu

, Huanyi Ye
, Yu Jiang
, Jiyuan Shen
, Jiale Guo
, Ivan Tjuawinata
, Kwok-Yan Lam
:
Privacy-Preserving Federated Unlearning With Certified Client Removal. 3966-3978 - Aishan Liu

, Yuguang Zhou
, Xianglong Liu
, Tianyuan Zhang
, Siyuan Liang, Jiakai Wang, Yanjun Pu
, Tianlin Li
, Junqi Zhang
, Wenbo Zhou
, Qing Guo
, Dacheng Tao
:
Compromising LLM Driven Embodied Agents With Contextual Backdoor Attacks. 3979-3994 - Zhaosen Shi

, Fagen Li
, Dong Hao
, Qinshuo Sun
:
Handwritten Signature Verification via Multimodal Consistency Learning. 3995-4007 - Qianmei Wu

, Wei Cheng
, Fan Zhang
, Sylvain Guilley
:
Statistical Analysis of Non-Profiling Higher-Order Distinguishers Against Inner Product Masking. 4008-4023 - Zhuoqun Yan

, Wenfang Zhang
, Xiaomin Wang
, Muhammad Khurram Khan
:
Comments on "VCD-FL: Verifiable, Collusion-Resistant, and Dynamic Federated Learning". 4024-4025 - Jalal Ghadermazi

, Soumyadeep Hore
, Ankit Shah
, Nathaniel D. Bastian
:
GTAE-IDS: Graph Transformer-Based Autoencoder Framework for Real-Time Network Intrusion Detection. 4026-4041 - Shuai Zhao

, Junying Zhang
, Xindi Ma
, Qi Jiang
, Zhuo Ma
, Sheng Gao
, Zuobin Ying
, Jianfeng Ma
:
FedWiper: Federated Unlearning via Universal Adapter. 4042-4054 - Kim Hammar

, Tao Li
, Rolf Stadler
, Quanyan Zhu
:
Adaptive Security Response Strategies Through Conjectural Online Learning. 4055-4070 - Yuying Liao

, Xuechen Zhao
, Bin Zhou
, Yanyi Huang:
CapsuleBD: A Backdoor Attack Method Against Federated Learning Under Heterogeneous Models. 4071-4086 - Xin Liu

, Willy Susilo
, Joonsang Baek
:
How to Terminate Service Requests in Outsourcing: A Seamless Solution From Withdrawable Signatures. 4087-4099 - Xiao Cai

, Yanbin Sun
, Xiangpeng Xie
, Nan Wei
, Kaibo Shi
, Huaicheng Yan
, Zhihong Tian
:
Enhancing Networked Control Systems Resilience Against DoS Attacks: A Data-Driven Approach With Adaptive Sampled-Data and Compression. 4100-4109 - Kun Zhang

, Huaguang Zhang
, Yanlong Zhao
, Huai-Ning Wu
, Rong Su
:
Synchronization Learning Scheme of Hybrid Order Adaptive Dynamic Optimizations for Secure Communication. 4110-4120 - Wenrui Cheng

, Qixuan Yuan
, Tiantian Zhu
, Tieming Chen
, Jie Ying
, Aohan Zheng, Mingjun Ma, Chunlin Xiong
, Mingqi Lv
, Yan Chen
:
TAGAPT: Toward Automatic Generation of APT Samples With Provenance-Level Granularity. 4137-4151 - Shihua Sun

, Shridatt Sugrim, Angelos Stavrou
, Haining Wang
:
Partner in Crime: Boosting Targeted Poisoning Attacks Against Federated Learning. 4152-4166 - Cong Zhang

, Liqiang Peng
, Weiran Liu
, Shuaishuai Li
, Meng Hao
, Lei Zhang, Dongdai Lin
:
Charge Your Clients: Payable Secure Computation and Its Applications. 4183-4195 - Rui Yang

, Qindong Sun
, Han Cao
, Chao Shen
, Jiaming Cai
, Dongzhu Rong
:
1+1>2: A Dual-Function Defense Framework for Adversarial Example Mitigation. 4121-4136 - Wenyi Xue

, Yang Yang
, Minming Huang, Yingjiu Li
, HweeHwa Pang
, Robert H. Deng
:
DkvSSO: Delegatable Keyed-Verification Credentials for Efficient Anonymous Single Sign-On. 4196-4211 - Zhaopin Su

, Zhaofang Weng, Guofu Zhang
, Chensi Lian, Niansong Wang
:
LightGBM-Based Audio Watermarking Robust to Recapturing and Hybrid Attacks. 4212-4227 - Meng Shen

, Jinhe Wu, Ke Ye, Ke Xu
, Gang Xiong, Liehuang Zhu
:
Robust Detection of Malicious Encrypted Traffic via Contrastive Learning. 4228-4242 - Tianming Xie

, Wenxiong Kang
:
A Random-Binding-Based Bio-Hashing Template Protection Method for Palm Vein Recognition. 4243-4255 - Guangjie Han

, Weitao Wang
, Zhengwei Xu
:
A Multi-Granularity Deep Signal Shrinkage Network for Noise-Robust Specific Emitter Identification. 4256-4264 - Xinyu He, Yuan Zhang

, Yaqing Song
, Weidong Qiu
, Hongwei Li
, Qiang Tang:
What Makes a Good Exchange? Privacy-Preserving and Fair Contract Agreement in Data Trading. 4265-4279 - Lingling Wang

, Mei Huang
, Zhengyin Zhang
, Meng Li
, Jingjing Wang
, Keke Gai
:
RaSA: Robust and Adaptive Secure Aggregation for Edge-Assisted Hierarchical Federated Learning. 4280-4295 - Changshuo Wang

, Xingyu Gao
, Meiqing Wu
, Siew-Kei Lam
, Shuting He, Prayag Tiwari
:
Looking Clearer With Text: A Hierarchical Context Blending Network for Occluded Person Re-Identification. 4296-4307 - Zaiyu Pan

, Shuangtian Jiang, Xiao Yang, Hai Yuan, Jun Wang
:
Hierarchical Cross-Modal Image Generation for Multimodal Biometric Recognition With Missing Modality. 4308-4321 - Zixuan Ma

, Chen Li
, Kun Zhang
, Bibo Tu
:
Towards Unsupervised Time-Series Anomaly Detection for Virtual Cloud Networks. 4322-4337 - Tao Zheng

, Qiyu Hou
, Xingshu Chen
, Hao Ren
, Meng Li
, Hongwei Li
, Changxiang Shen:
Gupacker: Generalized Unpacking Framework for Android Malware. 4338-4352 - Muneeba Asif

, Mohammad Kumail Kazmi
, Mohammad Ashiqur Rahman
, Syed Rafay Hasan
, Soamar Homsi:
SHEATH: Defending Horizontal Collaboration for Distributed CNNs Against Adversarial Noise. 4353-4368 - Gaojie Jin

, Ronghui Mu
, Xinping Yi
, Xiaowei Huang
, Lijun Zhang
:
Invariant Correlation of Representation With Label. 4369-4381 - Jingcheng Zhao

, Kaiping Xue
, Yingjie Xue
, Meng Li
, Bin Zhu
, Shaoxian Yuan
:
Privacy-Preserving Statistical Analysis With Low Redundancy Over Task-Relevant Microdata. 4382-4395 - Jingyi Li

, Wenzhong Ou, Bei Ouyang
, Shengyuan Ye
, Liekang Zeng
, Lin Chen, Xu Chen
:
Revisiting Location Privacy in MEC-Enabled Computation Offloading. 4396-4407 - Yunna Lv

, Long Tang
, Dengpan Ye
, Caiyun Xie
, Jiacheng Deng, Yiheng He
, Sipeng Shen:
Three-in-One: Robust Enhanced Universal Transferable Anti-Facial Retrieval in Online Social Networks. 4408-4421 - Keyang Zhang

, Chenqi Kong
, Shiqi Wang
, Anderson Rocha
, Haoliang Li
:
Image Provenance Analysis via Graph Encoding With Vision Transformer. 4422-4437 - Zixuan Ding

, Ding Wang
:
HTOTP: Honey Time-Based One-Time Passwords. 4438-4453 - Yiyao Wan

, Jiahuan Ji
, Fuhui Zhou
, Qihui Wu
, Tony Q. S. Quek
:
From Static Dense to Dynamic Sparse: Vision-Radar Fusion-Based UAV Detection. 4454-4468 - Wanlun Ma

, Derui Wang
, Yiliao Song
, Minhui Xue
, Sheng Wen
, Zhengdao Li
, Yang Xiang
:
TrapNet: Model Inversion Defense via Trapdoor. 4469-4483 - Xu Han

, Haocong Li, Wei Wang
, Haining Wang
, Xiaobo Ma
, Shouling Ji
, Qiang Li
:
SoFi: Spoofing OS Fingerprints Against Network Reconnaissance. 4484-4497 - Chengkun Wei

, Weixian Li, Chen Gong, Wenzhi Chen
:
DC-SGD: Differentially Private SGD With Dynamic Clipping Through Gradient Norm Distribution Estimation. 4498-4511 - Mian Zou

, Baosheng Yu, Yibing Zhan
, Siwei Lyu
, Kede Ma
:
Semantic Contextualization of Face Forgery: A New Definition, Dataset, and Detection Method. 4512-4524 - Jiaheng Wei, Yanjun Zhang, Leo Yu Zhang, Chao Chen, Shirui Pan, Kok-Leong Ong, Jun Zhang, Yang Xiang:

Extracting Private Training Data in Federated Learning From Clients. 4525-4540 - Song Bian

, Yunhao Fu
, Dongxu Zhao, Haowen Pan, Yuexiang Jin, Jiayue Sun, Hui Qiao, Zhenyu Guan
:
FHECAP: An Encrypted Control System With Piecewise Continuous Actuation. 4551-4566 - Feng Liu

, Jinjiang Yang
, Jingcheng Zhao
, Yingjie Xue
, Kaiping Xue
:
Structurally-Encrypted Databases Combined With Filters: Enhanced Security and Rich Queries. 4567-4580 - Xiangkun Wang, Kejiang Chen

, Yuang Qi
, Ruiheng Liu, Weiming Zhang
, Nenghai Yu
:
GIFDL: Generated Image Fluctuation Distortion Learning for Enhancing Steganographic Security. 4581-4594 - Juanjuan Weng

, Zhiming Luo
, Shaozi Li
:
Improving Transferable Targeted Adversarial Attack via Normalized Logit Calibration and Truncated Feature Mixing. 4595-4609 - Tiong-Sik Ng

, Jihyeon Kim
, Andrew Beng Jin Teoh
:
Flexible Secure Biometrics: A Protected Modality-Invariant Face-Periocular Recognition System. 4610-4621 - Zheng Chu

, David Chieng
, Chiew Foong Kwong
, Huan Jin, Zhengyu Zhu, Chongwen Huang
, Chau Yuen
:
Throughput Improvement for RIS-Empowered Wireless Powered Anti-Jamming Communication Networks (WPAJCN). 4622-4637 - Jitao Xing

, Dan Ye
, Pengyu Li
:
Stealthy Attacks With Historical Data on Distributed State Estimation. 4541-4550 - Xiaomeng Fu

, Xi Wang
, Qiao Li
, Jin Liu
, Jiao Dai
, Jizhong Han
, Xingyu Gao
:
Unlocking Generative Priors: A New Membership Inference Framework for Diffusion Models. 4638-4650 - Hang Yu

, Jiahao Wen
, Zhedong Zheng
:
CAMeL: Cross-Modality Adaptive Meta-Learning for Text-Based Person Retrieval. 4651-4663 - Xinzhong Liu

, Jie Cui
, Jing Zhang
, Rongwang Yin, Hong Zhong
, Lu Wei
, Irina Bolodurina
, Debiao He
:
BAST: Blockchain-Assisted Secure and Traceable Data Sharing Scheme for Vehicular Networks. 4664-4678 - Xiao Ma

, Wu-Jun Li
:
Grey-Box Adversarial Attack on Communication in Communicative Multi-Agent Reinforcement Learning. 4679-4693 - Xuan Yang

, Dongming Li
:
Loop-Back Mechanism-Based Physical-Layer Secret Key Generation in FDD System Under Hardware Impairments. 4694-4709 - Yang Yang

, Bingyu Li
, Qianhong Wu
, Bo Qin
, Qin Wang
, Shihong Xiong
, Willy Susilo
:
RandFlash: Breaking the Quadratic Barrier in Large-Scale Distributed Randomness Beacons. 4710-4725 - Xingyu Yang

, Lei Xu
, Liehuang Zhu
:
De-Anonymizing Monero: A Maximum Weighted Matching-Based Approach. 4726-4738 - Jianan Huang

, Weiwei Liu
, Guangjie Liu
, Bo Gao
, Fengyuan Nie
:
WF-A2D: Enhancing Privacy With Asymmetric Adversarial Defense Against Website Fingerprinting. 4739-4754 - Shenhao Shi, Yan Wo

:
Defending Against Model Inversion Attack via Feature Purification. 4755-4768 - Zhijun Li

, Kuizhi Liu
, Minghui Xu
, Xiangyu Wang, Yinbin Miao
, Jianfeng Ma
, Xiuzhen Cheng
:
Trinity: A Scalable and Forward-Secure DSSE for Spatio-Temporal Range Query. 4769-4782 - Zheng Che

, Meng Shen
, Zhehui Tan, Hanbiao Du
, Wei Wang
, Ting Chen
, Qinglin Zhao
, Yong Xie
, Liehuang Zhu
:
Across-Platform Detection of Malicious Cryptocurrency Accounts via Interaction Feature Learning. 4783-4798 - Changsong Jiang

, Chunxiang Xu
, Zhen Liu, Xinfeng Dong
, Wenzheng Zhang
:
Threshold Password-Hardening Updatable Oblivious Key Management. 4799-4814 - Guowei Ling

, Peng Tang
, Jinyong Shan
, Fei Tang
, Weidong Qiu
:
More Efficient, Privacy-Enhanced, and Powerful Privacy-Preserving Feature Retrieval Private Set Intersection. 4815-4827 - Xiangrui Xu

, Yiwen Zhao
, Yufei Han
, Yongsheng Zhu, Zhen Han
, Guangquan Xu
, Bin Wang, Shouling Ji
, Wei Wang
:
VFLMonitor: Defending One-Party Hijacking Attacks in Vertical Federated Learning. 4828-4843 - Chunyi Zhou

, Yansong Gao
, Anmin Fu
, Kai Chen
, Zhi Zhang
, Minhui Xue
, Zhiyang Dai, Shouling Ji
, Yuqing Zhang
:
TruVRF: Toward Triple-Granularity Verification on Machine Unlearning. 4844-4859 - Wentao Dong

, Lei Xu
, Leqian Zheng
, Huayi Duan
, Cong Wang
, Qian Wang
:
Do Not Skip Over the Offline: Verifiable Silent Preprocessing From Small Security Hardware. 4860-4873 - Hangcheng Cao

, Guowen Xu
, Ziyang He
, Shaoqing Shi, Shengmin Xu
, Cong Wu
, Jianting Ning
:
Unveiling the Superiority of Unsupervised Learning on GPU Cryptojacking Detection: Practice on Magnetic Side Channel-Based Mechanism. 4874-4889 - Mattia Piana

, Francesco Ardizzon
, Stefano Tomasin
:
Challenge-Response to Authenticate Drone Communications: A Game Theoretic Approach. 4890-4903 - Chunlei Peng

, Xiaoyi Luo, Decheng Liu
, Nannan Wang
, Ruimin Hu, Xinbo Gao
:
Semantic Token Transformer for Face Forgery Detection. 4904-4914 - Yue Chen, Xiaohui Li

, Junfeng Wang
, Wenhan Ge
, Lingfeng Tan:
CorreFlow: A Covert Fingerprinting Modulation for Flow Correlation in Open Heterogeneous Networks. 4915-4928 - Qingjiang Xiao

, Guyue Li
, Zi Long Liu
, Aiqun Hu
:
Optimal Subcarrier Allocation Scheme for Physical-Layer Key Generation in an OFDMA Network. 4929-4942 - Yifan Wang

, Jie Gui
, Xinli Shi
, Linqing Gui
, Yuan Yan Tang
, James Tin-Yau Kwok
:
ColorVein: Colorful Cancelable Vein Biometrics. 4943-4955 - Pei-Kai Huang

, Tzu-Hsien Chen
, Ya-Ting Chan
, Kuan-Wen Chen
, Chiou-Ting Hsu
:
DD-rPPGNet: De-Interfering and Descriptive Feature Learning for Unsupervised rPPG Estimation. 4956-4970 - Niloufar Sayadi

, Phuong Ha Nguyen
, Marten van Dijk
, Chenglu Jin
:
Breaking XOR Arbiter PUFs With Chosen Challenge Attack. 4971-4984 - Rong Huang

, Yuancheng Li
, Peidong Yin
, Xingyu Shang
, Yuanyuan Wang:
Transferable Attention-Distracting Adversarial Attack on Data-Driven Models for Power Systems. 4985-4998 - Jie Yin

, Yang Xiao
, Qian Chen
, Yong Zhi Lim
, Xuefeng Liu
, Qingqi Pei
, Jianying Zhou
:
DP-DID: A Dynamic and Proactive Decentralized Identity System. 4999-5014 - Tingting Wang

, Zan Li
, Jiangbo Si
, Zihao Cheng
, Yang Gao
, Naofal Al-Dhahir
:
Use a Little Force to Move a Great Mass: A Jamming Leverage Strategy for Covert Communications. 5015-5024 - Xiaorong Jing, Rui Wang, Hongjiang Lei, Hongqing Liu, Qianbin Chen:

Multi-Agent Discrete Soft Actor-Critic Algorithm-Based Multi-User Collaborative Anti-Jamming Strategy. 5025-5038 - Qingran Miao

, Haixia Wang
, Jianru Zhou
, Yilong Zhang
, Peng Chen
, Ronghua Liang
, Yuanjing Feng
:
Supervised Enhancement for Fingertip OCT Images Based on Paired Dataset Generation Strategy. 5039-5053 - Guangquan Xu

, Shicheng Feng
, Hao Xi
, Qingyang Yan, Wenshan Li
, Cong Wang
, Wei Wang
, Shaoying Liu
, Zhihong Tian
, James Xi Zheng
:
Differential-Trust-Mechanism-Based Trade-Off Method Between Privacy and Accuracy in Recommender Systems. 5054-5068 - Xinghan Shao

, C. Chang
, John Q. Gan
, Haixian Wang
:
An Interpretable Contrastive Learning Transformer for EEG-Based Person Identification. 5069-5082 - Xingming Long

, Jie Zhang
, Shiguang Shan
:
Confidence Aware Learning for Reliable Face Anti-Spoofing. 5083-5093 - Shaoxian Yuan

, Kaiping Xue
, Jingcheng Zhao
, David S. L. Wei
:
Private, Accurate and Communication Efficient Clustering Over Vertically Distributed Dataset. 5094-5108 - Annyu Liu

, An Wang, Shaofei Sun, Congming Wei, Yaoling Ding, Yongjuan Wang, Liehuang Zhu:
CL-SCA: A Contrastive Learning Approach for Profiled Side-Channel Analysis. 5109-5122 - Yingzhe Hou

, Yue Cao
, Hu Xiong
, Debiao He
, Chi-Hung Chi
, Kwok-Yan Lam
:
Heterogeneous Parallel Key-Insulated Multi-Receiver Signcryption Scheme for IoV. 5123-5137 - Pengfei Zhang

, Xiang Cheng
, Zhikun Zhang
, Youwen Zhu
, Ji Zhang:
Maximizing Area Coverage in Privacy-Preserving Worker Recruitment: A Prior Knowledge-Enhanced Geo-Indistinguishable Approach. 5138-5151 - Yihuan Huang

, Yanzhen Ren
, Zongkun Sun
, Liming Zhai
, Jingmin Wang, Wuyang Liu
:
APFT: Adaptive Phoneme Filter Template to Generate Anti-Compression Speech Adversarial Example in Real-Time. 5152-5165 - Maximilian Egger

, Rüdiger L. Urbanke
, Rawad Bitar
:
Federated One-Shot Learning With Data Privacy and Objective-Hiding. 5166-5180 - Zhen Yang

, Yufei Luo
, Jinshuai Yang
, Xin Xu
, Ru Zhang
, Yongfeng Huang
:
Class-Aware Adversarial Unsupervised Domain Adaptation for Linguistic Steganalysis. 5181-5194 - Weiqi Wang

, Chenhan Zhang
, Zhiyi Tian
, Shui Yu
, Zhou Su
:
Evaluation of Machine Unlearning Through Model Difference. 5211-5223 - Fupei Chen

, Liyao Xiang
, Haoxiang Sun, Hei Victor Cheng, Kaiming Shen
:
Shuffling for Semantic Secrecy. 5240-5255 - Weinan Guan

, Wei Wang
, Bo Peng
, Ziwen He
, Jing Dong
, Haonan Cheng
:
Noise-Informed Diffusion-Generated Image Detection With Anomaly Attention. 5256-5268 - Zhenyuan Zhang

, Xingqun Qi
, Zhenbo Song
, Zhiqin Yang
, Jianfeng Lu
, Muyi Sun, Man Zhang
, Zhenan Sun
:
Multi-Scale Semantic-Guidance Networks: Robust Blind Face Restoration Against Adversarial Attacks. 5269-5281 - Jiacheng Wang

, Hongyang Du
, Yinqiu Liu
, Geng Sun
, Dusit Niyato
, Shiwen Mao
, Dong In Kim
, Xuemin Shen
:
Generative AI Based Secure Wireless Sensing for ISAC Networks. 5195-5210 - Meng Pang

, Wenjun Zhang
, Yang Lu
, Yiu-ming Cheung
, Nanrun Zhou
:
A Unified Multi-Domain Face Normalization Framework for Cross-Domain Prototype Learning and Heterogeneous Face Recognition. 5282-5295 - Junqing Zhang

, Francesco Ardizzon
, Mattia Piana
, Guanxiong Shen
, Stefano Tomasin
:
Physical Layer-Based Device Fingerprinting for Wireless Security: From Theory to Practice. 5296-5325 - Susu Cui

, Xueying Han
, Dongqi Han
, Zhiliang Wang
, Weihang Wang, Bo Jiang
, Baoxu Liu, Zhigang Lu:
FG-SAT: Efficient Flow Graph for Encrypted Traffic Classification Under Environment Shifts. 5326-5339 - Ruixu Geng

, Dongheng Zhang
, Yadong Li, Zhi Wu, Jiamu Li
, Qi Chen, Yang Hu
, Yan Chen
:
Attacking mmWave Imaging With Neural Meta-Material Rendering. 5340-5355 - Jingcheng Yang

, Shuo Shao
, Futai Zou
, Yue Wu
:
Dictionary Learning-Enabled Privacy Preserving Semantic Communication System. 5356-5371 - Zhimao Gong

, Jiapeng Zhang
, Haotian Wang
, Mingxing Duan
, Keqin Li
, Kenli Li
:
A Privacy-Preserving Scheme With High Utility Over Data Streams in Mobile Crowdsensing. 5372-5385 - Alfonso Rodriguez Barredo-Valenzuela

, Sergio Pastrana
, Guillermo Suarez-Tangil
:
Snorkeling in Dark Waters: A Longitudinal Surface Exploration of Unique Tor Hidden Services. 5386-5395 - Xingjie Zhou

, Xianzhang Chen
, Shukan Liu
, Xuehong Fan
, Qiao Sun
, Lin Chen
, Meikang Qiu
, Tao Xiang
:
FLGuardian: Defending Against Model Poisoning Attacks via Fine-Grained Detection in Federated Learning. 5396-5410 - Yukang Zhang

, Hanzi Wang
, Yang Lu
, Yan Yan
, Xuelong Li
:
Frequency Domain Nuances Mining for Visible-Infrared Person Re-Identification. 5411-5424 - Huan Bao

, Kaimin Wei
, Yongdong Wu
, Jin Qian
, Robert H. Deng
:
Distributional Black-Box Model Inversion Attack With Multi-Agent Reinforcement Learning. 5425-5437 - Xiangqun Zhang

, Ruize Han
, Likai Wang
, Linqi Song
, Junhui Hou
, Wei Feng
:
Synthetic-to-Real Video Person Re-ID. 5438-5450 - Lvpan Cai

, Haowei Wang, Jiayi Ji
, Xiaoshuai Sun
, Liujuan Cao
, Rongrong Ji
:
ME-FAS: Multimodal Text Enhancement for Cross-Domain Face Anti-Spoofing. 5451-5464 - Shuai You

, Cuiqun Chen
, Yujian Feng
, Hai Liu
, Yimu Ji
, Mang Ye
:
Diverse Co-Saliency Feature Learning for Text-Based Person Retrieval. 5465-5477 - Daoqing Yang

, Yu Yao
, Yao Shan
, Licheng Yang
, Wei Yang
, Fuyi Liu, Yunfeng Wu:
Patty: Pattern Series-Based Semantics Analysis for Agnostic Industrial Control Protocols. 5478-5491 - Tianchong Gao

, Zeyu Xia, Yongming Pan
:
Affinity Backdoor Attacks in Point Clouds: A Novel Method Resilient to Corruption. 5492-5504 - Shuang Li

, Jiaxu Leng
, Changjiang Kuang, Mingpi Tan
, Xinbo Gao
:
Video-Level Language-Driven Video-Based Visible-Infrared Person Re-Identification. 5505-5520 - Qiuyun Tong

, Junyi Deng
, Xinghua Li
, Yinbin Miao
, Yunwei Wang
, Robert H. Deng
:
Oblivious Encrypted Keyword Search With Fine-Grained Access Control for Cloud Storage. 5521-5533 - Hao Huang

, Xiaofen Wang
, Man Ho Au
, Sheng Cao
, Qinglin Zhao
, Jiguo Yu
:
An Enhanced Linearly Homomorphic Network Coding Signature Scheme for Secure Data Delivery in IoT Networks. 5534-5548 - Shengnan Zhao

, Shimeng Lu, Yu Meng
, Chuan Zhao
, Shan Jing, Zhenxiang Chen
, Qiuliang Xu
:
Multi-Party Private Set Intersection With One-Round Online Interaction. 5549-5562 - Fuquan Gan

, Yan Wo
:
Boosting the Transferability of Adversarial Examples Through Gradient Aggregation. 5563-5576 - Yuan Bian

, Min Liu
, Yunqi Yi, Xueping Wang
, Yunfeng Ma
, Yaonan Wang
:
Modality Unified Attack for Omni-Modality Person Re-Identification. 5577-5587 - Yingzi Gao

, Yuan Lu
, Zhenliang Lu
, Qiang Tang, Yuyi Wang
, Jing Xu
:
Turritopsis: Practical Dynamic Asynchronous BFT. 5588-5603 - Rukhsana Ruby

, Basem M. ElHalawany
, Quoc-Viet Pham
, Kaishun Wu
, Lu Wang
:
Impact of UAV-Based Transmitter Mobility on Physical Layer Security. 5604-5619 - Junxi Chen, Junhao Dong, Xiaohua Xie

, Jianhuang Lai
:
Releasing Inequality Phenomenon in ℓ∞-Norm Adversarial Training via Input Gradient Distillation. 5632-5646 - Gang Xu

, Xinyu Fan, Shiyuan Xu
, Yibo Cao
, Xiubo Chen
, Tao Shang
, Shui Yu
:
Anonymity-Enhanced Sequential Multi-Signer Ring Signature for Secure Medical Data Sharing in IoMT. 5647-5662 - Haiqi Zhang

, Hao Tang
, Yanpeng Sun
, Shengfeng He
, Zechao Li
:
Modality-Specific Interactive Attack for Vision-Language Pre-Training Models. 5663-5677 - Decheng Liu

, Tao Chen, Chunlei Peng
, Nannan Wang
, Ruimin Hu, Xinbo Gao
:
Improving Adversarial Robustness via Decoupled Visual Representation Masking. 5678-5689 - Sizai Hou

, Songze Li
, Tayyebeh Jahani-Nezhad
, Giuseppe Caire
:
PriRoAgg: Achieving Robust Model Aggregation With Minimum Privacy Leakage for Federated Learning. 5690-5704 - Yipeng Liu

, Zhanqing Li
, Xiao Lu, Jiajin Qi
, Qi Zhong
, Hangtao Yu
, Peng Chen
, Ronghua Liang
:
Orthogonal View-Based Attention Network for Layer Segmentation of 3D OCT Fingerprints. 5705-5717 - Mupei Li

, Yunlong Wang, Kunbo Zhang
, Zhaofeng He
, Zhenan Sun
:
Exploring Near-Infrared Iris Image Sequences for High Throughput Iris Recognition. 5718-5731 - Zhisheng Yao

, Guan Gui
:
Backdoor Attack on Self-Supervised Learning-Based RFF Identification Using Spectrum Enhanced Insensitive Perturbation Trigger. 5732-5744 - Chenghuan Qi

, Xi Yang
, Nannan Wang
, Xinbo Gao
:
Granularity-Aware Hyperbolic Representation for Text-Based Person Search. 5745-5757 - Xinjie Lin

, Gang Xiong, Gaopeng Gou, Wenqi Dong
, Jing Yu
, Zhen Li, Wei Xia:
Respond to Change With Constancy: Instruction-Tuning With LLM for Non-I.I.D. Network Traffic Classification. 5758-5773 - Chengxi Li

, Ming Xiao
, Mikael Skoglund
:
Sign-Based Distributed Learning With Byzantine Resilience Based on Audit Mechanism. 5774-5788 - Mingfu Xue

, Kewei Chen
, Leo Yu Zhang
, Yushu Zhang
, Weiqiang Liu
:
An Active Authorization Control Method for Deep Reinforcement Learning Model Based on GANs and Adaptive Trigger. 5789-5801 - Zhiwei Li

, Qi Li
, Min Ren
, Yiwei Ru
, Zhenan Sun
:
Enhancing Adversarial Transferability With Alignment Network. 5802-5817 - Jing Zhang

, Xin Wang
, Jie Cui
, Ru Li, Hong Zhong
:
A Decentralized Threshold Credential Management With Fine-Grained Authentication for VANETs. 5818-5831 - Jianjun Lei

, Menglei Zhao, Bo Peng
, Jiahui Song
, Chao Xue, Qingming Huang
:
Cross-Modal Aligned Identity-Discriminative Feature Learning Network for Face Sketch Recognition. 5832-5842 - Nahuel González

, Giuseppe Stragapede
, Rubén Vera-Rodríguez
, Ruben Tolosana
:
Type2Branch: Keystroke Biometrics Based on a Dual-Branch Architecture With Attention Mechanisms and Set2set Loss. 5859-5871 - Yu Chen

, Yuanchao Chen
, Ruipeng Wang
, Taiyan Wang
, Shouling Ji
, Hong Shan, Dan Xu, Zulie Pan
:
Whiskey: Large-Scale Identification of Mobile Mini-App Session Key Leakage With LLMs. 5872-5887 - Yaning Zhang

, Tianyi Wang
, Zitong Yu
, Zan Gao
, Linlin Shen
, Shengyong Chen
:
MFCLIP: Multi-Modal Fine-Grained CLIP for Generalizable Diffusion Face Forgery Detection. 5888-5903 - Zenan Shi

, Haipeng Chen
, Yixin Jia, Dong Zhang
, Wei Lu
, Xun Yang
:
Customized Transformer Adapter With Frequency Masking for Deepfake Detection. 5904-5918 - Jianze Wei

, Xingyu Gao
, Yunlong Wang, Ran He
, Zhenan Sun
:
Uncertainty-Aware Bilateral Transformer for Accurate and Reliable Iris Segmentation. 5919-5933 - Jianhong Zhang

, Chuming Shi:
Corrections to "On the Security of a Revocable Cross-Domain Anonymous Authentication in IIoT". 5934-5935 - Caihong Yan

, Xiaofeng Lu
, Pietro Lio
, Pan Hui
:
EARVP: Efficient Aggregation for Federated Learning With Robustness, Verifiability, and Privacy. 5936-5951 - Liyan Chen

, Bingwen Feng
, Zhihua Xia
, Wei Lu
, Jian Weng
:
Robust Generative Steganography for Image Hiding Using Concatenated Mappings. 5952-5965 - Pengcheng Zhou

, Zhengyang Fang
, Zhongliang Yang
, Zhili Zhou
, Linna Zhou:
Efficient Streaming Voice Steganalysis in Challenging Detection Scenarios. 5966-5977 - Yiming Li

, Kejiang Chen
, Yaofei Wang
, Xin Zhang, Guanjie Wang, Weiming Zhang
, Nenghai Yu
:
CoAS: Composite Audio Steganography Based on Text and Speech Synthesis. 5978-5991 - Guang Li

, Yangtian Mi, Jieying Zhou, Xianghan Zheng, Weigang Wu
:
Group-Based Detection of Cryptocurrency Laundering Using Multi-Persona Analysis. 5992-6004 - Qian Li

, Di Wu
, Dawei Zhou
, Chenhao Lin
, Shuai Liu
, Cong Wang
, Chao Shen
:
Robust Adversarial Defenses in Federated Learning: Exploring the Impact of Data Heterogeneity. 6005-6018 - Tiewei Qin, Bingwen Feng

, Bingbing Zhou, Jilian Zhang
, Zhihua Xia
, Jian Weng
, Wei Lu
:
JPEG Compression-Resistant Generative Image Hiding Utilizing Cascaded Invertible Networks. 6019-6032 - Liqing Chen

, Shiyu Chen, Hao Zhang, Jian Weng
:
Fair and Verifiable Identity-Based Broadcast Proxy Re-Encryption With Designated Sender Feasible for Medical Internet of Things. 6033-6045 - Yeshanew Ale Wubet

, Kuang-Yow Lian
:
Speaker Anonymization for Voice Biometrics Protection Using Voice Conversion and Multi-Target Speaker Voice Fusion. 6046-6057 - Zinan Zhou

, Guangyu Li
, Teng Wang, Deguo Zeng, Xuanpeng Li
, Qing Wang
:
A Robust Open-Set Specific Emitter Identification for Complex Signals With Class-Irrelevant Features. 6058-6073 - Xixi Zhang

, Yu Wang
, Tomoaki Ohtsuki
, Guan Gui
, Chau Yuen
, Marco Di Renzo
, Hikmet Sari
:
Malware Traffic Classification via Expandable Class Incremental Learning With Architecture Search. 6074-6085 - Thrassos K. Oikonomou

, George K. Karagiannidis
:
Elliptic Curve Modulation (ECM) for Extremely Robust Physical Layer Encryption. 5620-5631 - Xin Zhang

, Dongfang Xu
, Jingjing Wang
, Chunxiao Jiang
, Shenghui Song
, Marco Di Renzo
:
RIS-Aided Secure Communications With Regularized Zero-Forcing Precoding. 5843-5858 - Haiyan Zhang

, Xinghua Li
, Mengfan Xu, Shunjie Yuan
, Mengyao Zhu, Robert H. Deng
:
Robust Federated Learning Client Selection With Combinatorial Class Representations and Data Augmentation. 6086-6100 - Yong Yang

, Changjiang Li
, Yi Jiang
, Jinbao Li
, Xuhong Zhang
, Zonghui Wang
, Shouling Ji
, Wenzhi Chen
:
Invisible-Face: Rethinking Facial Attribute Privacy in Social Media Photo Sharing. 6101-6116 - Jie Chen

, Liangmin Wang
, Huijuan Zhu
:
SmartGuard: Making Prediction Verifiable Through Transaction Sequences for Smart Contract Vulnerability Detection. 6117-6132 - Jinhao Zhou

, Zhou Su
, Yuntao Wang
, Jun Wu
:
DM-DPL: Toward Discrete Matrixing Differentially Private Learning. 6149-6161 - Insup Lee

, Changhee Choi
:
MuCamp: Generating Cyber Campaign Variants via TTP Synonym Replacement for Group Attribution. 6162-6174 - Jia Wang

, Pei-Pei Li
, Liuyu Xiang, Rui Wang, Zhili Zhang, Qing Tian, Zhaofeng He
:
FDNet: A Frequency-Aware Decomposition Network for Robust Face Super-Resolution Against Adversarial Attacks. 6175-6189 - Anastasia Tsiota, Dionysis Xenakis

, Nikos I. Passas, Lazaros F. Merakos
:
Multi-Tier HetNets With Random DDoS Attacks: Service Probability and User Load Analysis. 6190-6204 - Zhuoran Liu

, Zhengyu Zhao
, Martha A. Larson
:
Resisting Bag-Based Attribute Profiling by Adding Adversarial Items to Existing Media Profiles. 6205-6219 - Azadeh Pourkabirian, Wei Ni

, Xiaolin Zhou
, Kai Li
, Mohammad Hossein Anisi
:
A Precoding Perturbation Method in Geometric Optimization: Exploring Manifold Structure for Privacy and Efficiency. 6220-6235 - Bin Wei

, Junyong Zhai
, Ju H. Park
:
Remote State Estimation Under Strategic DoS Attack Policy: Tackling Joint Constraints. 6252-6262 - Weicai Li

, Tiejun Lv
, Xiyu Zhao
, Xin Yuan, Wei Ni:
Free Privacy Protection for Wireless Federated Learning: Enjoy It or Suffer From It? 6263-6278 - Jian Wang

, Zhen Li
, Jixiang Qu, Deqing Zou
, Shouhuai Xu
, Ziteng Xu, Zhenwei Wang, Hai Jin
:
MalPacDetector: An LLM-Based Malicious NPM Package Detector. 6279-6291 - Fengpeng Li

, Kemou Li
, Haiwei Wu
, Jinyu Tian
, Jiantao Zhou
:
Toward Robust Learning via Core Feature-Aware Adversarial Training. 6236-6251 - Meiyi Zhu

, Caili Guo
, Chunyan Feng
, Osvaldo Simeone
:
On the Impact of Uncertainty and Calibration on Likelihood-Ratio Membership Inference Attacks. 6292-6307 - Zhenbang Peng

, Jianqi Chen
, Zhenwei Shi
, Zhengxia Zou
:
Physical Adversarial Camouflage Generation in Optical Remote Sensing Images. 6308-6323 - Guiyun Liu

, Haozhe Xu
, Jiayue Zhang
, Zhongwei Liang
, Xiaojing Zhong
:
Spatiotemporal Control Optimization of Malware Propagation in Internet of Underwater Things. 6324-6339 - Xiaolan Zhu

, Junfeng Wang
, Wenhan Ge
, Yizhao Huang
, Tingting Lu
:
WF-TFC: An Open-World Few-Shot Anonymous Website Fingerprinting via Time-Frequency Consistency. 6340-6355 - Jiaqi Feng

, Libing Wu
, Xing Fan, Lijuan Huo
, Enshu Wang
, Zhuangzhuang Zhang
:
Ascina: Efficient Proof of Retrievability for Industrial Cloud Storage Systems. 6356-6370 - Pengfei Liu

, Wei Wang, Ziqin Feng, Yang Peng
, Hikmet Sari
, Guan Gui
:
Data-Efficient Few-Shot Specific Emitter Identification Using Bi-Interpolative Metric Learning. 6371-6382 - Sifan Li

, Yue Cao
, Guojun Peng
, Meng Li
, Wei Sun, Luan Chen
:
Efficient Intrusion Detection for In-Vehicle Networks Using Knowledge Distillation From BERT to CNN-BiLSTM. 6398-6412 - Lu Wei

, Yongjuan Zhang, Jie Cui
, Hong Zhong
, Irina Bolodurina
, Debiao He
:
A Blockchain-Driven Hierarchical Authentication and Key Agreement Scheme for VANETs With Cloud-Edge Collaboration. 6413-6428 - Renshuai Tao

, Chuangchuang Tan
, Huan Liu
, Jiakai Wang
, Haotong Qin
, Yakun Chang
, Wei Wang
, Rongrong Ni
, Yao Zhao
:
SAGNet: Decoupling Semantic-Agnostic Artifacts From Limited Training Data for Robust Generalization in Deepfake Detection. 6429-6442 - Lin Wang

, Yuan Zhang
, Xiaoting Chen
, Min Yang
:
Locating Security Patch Variants With Two-Dimensional Code Commit Features. 6383-6397 - Yang Liu

, Gaofei Ruan
, Zian Luo
, Shilong Zhang, Donghao Liu, Xin Fan, Yadong Zhou
, Ting Liu
:
DeepDRAC: Disposition Recommendation for Alert Clusters Based on Security Event Patterns. 6443-6458 - Linshan Hou

, Wei Luo
, Zhongyun Hua
, Songhua Chen, Leo Yu Zhang
, Yiming Li
:
FLARE: Toward Universal Dataset Purification Against Backdoor Attacks. 6459-6473 - Ruiteng Zhang

, Jianguo Wei
, Xugang Lu
, Lin Zhang
, Di Jin
, Junhai Xu
, Wenhuan Lu
:
SHDA: Sinkhorn Domain Attention for Cross-Domain Audio Anti-Spoofing. 6474-6489 - Guyue Hu

, Siyuan Song, Yukun Kang
, Zhu Yin, Gangming Zhao, Chenglong Li
, Jin Tang
:
Federated Client-Tailored Adapter for Medical Image Segmentation. 6490-6501 - Yang Cao

, Lingjie Duan
:
Sensing for Jamming in ISAC: Beam Scanning and Beamforming Optimization. 6502-6514 - Shaowei Wang, Jin Li, Changyu Dong, Jin Li, Zhili Zhou, Di Wang, Zikai Wen:

Side-Channel Attacks and New Principles in the Shuffle Model of Differential Privacy. 6515-6528 - Xingwei Li

, Yan Kang
, Chenggang Wu
, Danjun Liu, Jiming Wang
, Yue Sun
, Zehui Wu, Yunchao Wang, Rongkuan Ma
, Qiang Wei
:
Yesterday Once MorE: Facilitating Linux Kernel Bug Reproduction via Reverse Fuzzing. 5224-5239 - Soroush Oshnoei

, Jalal Heidari
, Esmaeil Mahboubi Moghaddam, Meysam Gheisarnejad
, Mohammad Hassan Khooban:
Identification and Mitigation of Data Integrity Stealth Attacks in Frequency Regulation of Power Systems. 6133-6148 - Li Bai

, Xinwei Zhang
, Sen Zhang
, Qingqing Ye
, Haibo Hu
:
ProVFL: Property Inference Attacks Against Vertical Federated Learning. 6529-6543 - Chuanghong Weng

, Ehsan Nekouei
:
Optimal Privacy-Aware Stochastic Sampling. 6544-6559 - Xiaohan Yuan

, Jiqiang Liu
, Bin Wang
, Guorong Chen
, Xiangrui Xu
, Junyong Wang
, Tao Li
, Wei Wang
:
FedEditor: Efficient and Effective Federated Unlearning in Cooperative Intelligent Transportation Systems. 6560-6575 - Bingliang Jiao

, Lingqiao Liu
, Liying Gao
, Dapeng Oliver Wu
, Guosheng Lin
, Peng Wang
, Yanning Zhang
:
Generalizable Person Re-Identification From a 3D Perspective: Addressing Unpredictable Viewpoint Changes. 6576-6591 - Jun Niu

, Xiaoyan Zhu
, Moxuan Zeng
, Ge Zhang, Qingyang Zhao, Chunhui Huang
, Yangming Zhang, Suyu An, Yangzhong Wang, Xinghui Yue, Zhipeng He, Weihao Guo
, Kuo Shen
, Peng Liu
, Lan Zhang
, Jianfeng Ma
, Yuqing Zhang
:
Comparing Different Membership Inference Attacks With a Comprehensive Benchmark. 6592-6606 - Jiyu Tian

, Mingchu Li
, Li-Ming Chen, Zumin Wang
, Xiaoyu Nie, Jing Qin:
SSDALog: Semi-Supervised Domain Adaptation for Incremental Log-Based Anomaly Detection. 6607-6619 - Hongli Liu, Qiang Li

, Mingjie Shao
, Yanlong Zhao
, A. Lee Swindlehurst
:
Quantization Noise as an Asset: Optimizing Physical Layer Security With Sigma-Delta Modulation. 6620-6634 - Xiao Liu

, Mingyuan Li, Guangsheng Yu
, Xu Wang
, Wei Ni, Lixiang Li
, Haipeng Peng
, Ren Ping Liu
:
BlockFUL: Enabling Unlearning in Blockchained Federated Learning. 6635-6650 - Jiaquan Liang

, Zhiyu Chen
, Qi Luo
, Zhenzhen Xie
, Gang Liu
, Zhipeng Cai
:
Hypergraph Unlearning: A Size-Based Hyperedge Selection and Coverage Aggregation Approach. 6651-6661 - Fangyuan Sun, Jia Yu

, Jiankun Hu
:
Privacy-Preserving Closest Similar Community Search on Attributed Graphs. 6662-6677 - Haeung Choi

, Seungmin Kim, Heung-No Lee
:
Error Correction Code Verifiable Computation Consensus. 6678-6692 - Giuseppe Floris, Christian Scano, Biagio Montaruli, Luca Demetrio

, Andrea Valenza, Luca Compagna, Davide Ariu, Luca Piras, Davide Balzarotti, Battista Biggio
:
ModSec-AdvLearn: Countering Adversarial SQL Injections With Robust Machine Learning. 6693-6705 - Hao Yang

, Jing Chen
, Kewen Pan, Kun He
, Meng Jia
, Ruiying Du
:
Volia: An Efficient and Light Asynchronous BFT Protocol. 6706-6718 - Dongyue Zhang

, Weiwei Ni, Nan Fu
, Lihe Hou
, Ruyu Zhang
:
Locally Differentially Private Trajectory Publication Based on Regional Popularity Awareness. 6719-6732 - Haolang Lu

, Hongrui Peng
, Guoshun Nan
, Jiaoyang Cui, Cheng Wang, Weifei Jin, Songtao Wang, Shengli Pan
, Xiaofeng Tao
:
Malsight: Exploring Malicious Source Code and Benign Pseudocode for Iterative Binary Malware Summarization. 6733-6747 - Yang Yu, Haixia Wang

, Xu Tan
, Yilong Zhang
, Peng Chen
, Ronghua Liang
:
A Fingerprint Quality Driven Transformer-CNN Hybrid Model for External and Internal Fingerprint Fusion. 6748-6762 - Xiping Sun

, Jing Chen
, Kun He
, Zhixiang He
, Ruiying Du
, Yebo Feng
, Qingchuan Zhao
, Cong Wu
:
SCR-Auth: Secure Call Receiver Authentication on Smartphones Using Outer Ear Echoes. 6763-6777 - Rui Zhang, Jian Wang

, Nan Jiang
, Md. Armanuzzaman, Ziming Zhao:
Efficient and Secure Multi-Qubit Broadcast-Based Quantum Federated Learning. 6778-6793 - Hang Zhang

, Dong Wei
, Nan Jiang
, Meng Zhang
, Xiang Meng, Yang Yang
, Weiqing Huang:
Passive Multi-User Traffic Analysis Based on 5G NR/LTE Physical Layer. 6794-6809 - Songze Li

, Jiaxiang Tang, Jinbao Zhu
, Kai Zhang
, Lichao Sun
, Changyu Dong:
Secure Embedding Aggregation for Cross-Silo Federated Representation Learning. 6810-6825 - Xiaopu Ma

, Xiancong Li
, Yingyan He, Qinglei Qi
, He Li:
BDTM: Bidirectional Detection and Traceability Mitigation of LDoS Attacks in SDN. 6826-6839 - Mohammad Reza Kavianinia

, Abbas Mohammadi
, Vahid Meghdadi
:
Secrecy Rate Maximization in the Presence of Stacked Intelligent Metasurface. 6840-6853 - Shuaishuai Chang

, Hui Ma
, Jianting Ning
, Yuzhe Li
, Lin Su
, Bo Li, Weiping Wang
:
RevokAll: Hardware-Assisted Revocable Data Sharing Framework for Full Data Traffic With Rapid Deployment in Cloud-Edge. 6854-6867 - Guo-Qiang Zeng

, Jun-Min Shao, Kang-Di Lu
, Guang-Gang Geng
, Jian Weng
:
MoCC-BD-FID: Multi-Objective Clustering Combination-Based Backdoor Defense for Federated Intrusion Detection of Industrial Control Systems. 6868-6883 - Kaushik Mazumdar

, Suresh Sundaram
:
A Mouse Dynamics Authentication System With a Recurrence Plot Image Representation and a Vision Transformer Framework. 6895-6909 - Basker Palaniswamy

, Arijit Karati
, Ting-Yu Chen
, Ashok Kumar Das
, Bharat K. Bhargava
:
QPCASIN: A Quantum-Defended Privacy-Aware Preemptive Handover-Enabled Continuous Authentication in Space Information Networks. 6910-6922 - Haoyang Wang

, Kai Fan
, Chong Yu
, Kuan Zhang
, Fenghua Li
, Haojin Zhu:
Hide Yourself: Multi-Dimensional Range Queries for Responses-Hiding Over Outsourced Data. 6923-6936 - Yifan Zhang

, Boxuan Xie
, Yishan Yang
, Zheng Yan
, Riku Jäntti
, Zhu Han
:
AuthScatter: Accurate, Robust, and Scalable Mutual Authentication in Physical Layer for Backscatter Communications. 6937-6952 - Jingjing Wu

, Zhun Zhong
, Yanrong Guo
, Shejiao Hu, Richang Hong
:
Person Re-Identification With Arbitrary Modalities: A Multi-Modal Dataset and a Unified Framework. 6953-6967 - Junyu Chen

, Depeng Chen
, Jie Cui
, Hong Zhong
:
Backdoor Attack on Encryption-Protected Vertical Federated Learning. 6968-6983 - Zhisheng Yin

, Nan Cheng
, Mingjie Wang
, Changle Li
, Wei Xiang
:
Conceal Truth While Show Fake: T/F Frequency Multiplexing-Based Anti-Intercepting Transmission. 6884-6894 - Nay Myat Min

, Long H. Pham, Jun Sun
:
Unified Neural Backdoor Removal With Only Few Clean Samples Through Unlearning and Relearning. 6984-6998 - Aruna Jayasena

, Prabhat Mishra
:
FirmWall: Directed Symbolic Execution of Firmware Binaries for Defending Against Unauthorized System Calls. 6999-7012 - Jiaping Gui

, Ruiwen Ji
, Haishi Huang, Jianan Hong
, Cunqing Hua
:
Solving Data Contamination in DDoS Detection: A Method Based on Hierarchical Federated Learning. 7013-7028 - Dengfeng Xia

, Ke Li
, Han Deng
, Peng Xu
, Bin Dai
, Liuguo Yin
:
Capacity-Achieving Coding Schemes of Gaussian Finite-State Markov Wiretap Channels With Delayed Feedback. 7029-7044 - Asif Shahriar

, Syed Jarullah Hisham
, K. M. Asifur Rahman
, Ruhan Islam
, Md. Shohrab Hossain
, Ren-Hung Hwang
, Ying-Dar Lin
:
5GPT: 5G Vulnerability Detection by Combining Zero-Shot Capabilities of GPT-4 With Domain Aware Strategies Through Prompt Engineering. 7045-7060 - Xiaoyi Pang

, Zhibo Wang
, Defang Liu, Jiahui Hu, Peng Sun
, Meng Luo
, Kui Ren
:
Poisoning Attacks to Knowledge Distillation-Based Federated Learning Under Robust Aggregation Rules. 7061-7076 - Dongliang Zhu

, Chi Zhang
, Ruimin Hu
, Mei Wang, Liang Liao
, Mang Ye
:
Detecting Deceptive Behavior via Learning Relation-Aware Visual Representations. 7077-7090 - Cong Zhang

, Shuhui Wang
, Xiaodan Li
, Yao Zhu
, Honggang Qi
, Qingming Huang
:
Enhancing the Robustness of Vision-Language Foundation Models by Alignment Perturbation. 7091-7105 - Wenkai Huang

, Gaolei Li
, Mingzhe Chen
, Jianhua Li
, Haojin Zhu
:
Silent Penetrator: Breaching Cross-Domain Federated Fine-Tuning via Feature Shift-Induced Backdoor. 7106-7120 - Dan Lu

, Zhenxue Chen
, Chengyun Liu
, Yuchen Hu
, Lei Cai
, Q. M. Jonathan Wu
:
Few-Shot Facial Sketch Synthesis via Progressive Domain Gap Reduction. 7121-7136 - Tai Yue

, Kai Lu
, Zhenyu Ning
, Pengfei Wang
, Lei Zhou
, Xu Zhou
, Yaohua Wang, Fengwei Zhang
, Gen Zhang
:
Efficient Forward-Edge Control-Flow Integrity for COTS Binaries via Arm BTI. 7137-7152 - Zonghao Ying

, Aishan Liu
, Tianyuan Zhang
, Zhengmin Yu, Siyuan Liang
, Xianglong Liu
, Dacheng Tao
:
Jailbreak Vision Language Models via Bi-Modal Adversarial Prompt. 7153-7165 - Honggang Liu

, Han Yang, Dongjun Liu
, Hangjie Yi
, Bingfeng He
, Yong Peng
, Wanzeng Kong
:
DARN: A Dual Attention Refinement Network for Enhancing Feature Robustness in VEP-Based EEG Biometrics. 7166-7180 - Zefeng Lu

, Ronghao Lin
, Yap-Peng Tan, Haifeng Hu
:
Prompt-Guided Transformer and MLLM Interactive Learning for Text-Based Pedestrian Search. 7181-7196 - Chunxue Li, Weizhi Meng

, Wenjuan Li
:
Enhancing EEG-Based Authentication With Transformer in Internet of Things. 7197-7210 - Zehang Deng

, Ruoxi Sun
, Jason Xue
, Wanlun Ma
, Sheng Wen
, Surya Nepal
, Yang Xiang
:
Hardening LLM Fine-Tuning: From Differentially Private Data Selection to Trustworthy Model Quantization. 7211-7226 - Zhenhao Tian

, Yi He
, Nuo Zhang
, Qixiao Lin
, Hetian Shi
, Jianwei Zhuge
, Jian Mao
, Deliang Chang:
BLMProbe: Enhancing Internet-Connected Device Discovery by Automated Device Labeling and Label Migration. 7227-7242 - Tao Wang

, Zhi-Ping Shi
, Juan Yang
, Sha Liu
:
Reed-Solomon-Based Private and Secure Distributed Matrix Multiplication From MDS-Coded Storage. 7243-7256 - Shiyun Mao

, Huibin Li
:
Hyperbolic Metric Learning for Generalizable Face Anti-Spoofing. 7257-7271 - Xin Zhang

, Qingni Shen
, Zhi Zhang
, Yansong Gao
, Jiajun Zou
, Yi Yang
, Zhonghai Wu
:
Fantastic Interrupts and Where to Find Them: Exploiting Non-Movable Interrupts on x86. 7272-7285 - Xintao Huan

, Wen Chen, Yixuan Zou
, Shengkang Zhang, Han Hu
, Alan Marshall
:
SNICK: Secure Node Identification Based on Covert Clock Feature Extraction for Cross-Environment Wireless IoT. 7286-7301 - Jiyu Tian

, Mingchu Li
, Lingling Fang
, Li-Ming Chen
:
SSDCL: Semi-Supervised Denoising-Aware Contrastive Learning for Time Series Anomaly Detection in Cyber-Physical Systems. 7302-7316 - Su Wang

, Hongbin Sun
, Zhiliang Wang
, Tao Zhou, Xia Yin, Dongqi Han, Han Zhang
, Xingang Shi
, Jiahai Yang
:
End-to-End Attack Scene Reconstruction in a Host With Rules and Anomaly-Based Detection Models. 7317-7332 - Sara Ghasvarianjahromi

, Yauhen Yakimenka, Jörg Kliewer
:
Decentralized Sparse Matrix Multiplication Under Byzantine Attacks. 7333-7346 - Hao Fu

, Ming Liu
, Rongsheng Li
:
Contrastive Learning and Feature Space Tactics: A Dual Approach to Strengthen Backdoor Attacks. 7347-7361 - Ziyang Gao

, Xianglong Li, Guan Wang, Tianfan Peng, Jingjing Chang, Yixin Yang
, Hai-Bao Chen
:
CaS2M: A Calibrated Single-to-Multiple Framework for Real-World Partial Fingerprint Recognition. 7362-7377 - Alireza Khodaie, Mehmet Emre Gursoy

:
Learning Bayesian Networks Under Local Differential Privacy. 7378-7393 - Zhaoqi Wang, Zijian Zhang

, Zhen Li, Yan Wu
, Ye Liu, Meng Li
, Xin Li
, Yong Liu, Jincheng An
, Wei Liang
, Liehuang Zhu
:
Resisting Poisoning Attacks in Federated Learning via Dual-Domain Distance and Trust Assessment. 7394-7409 - Teng Huang

, Jiahui Huang
, Changyu Dong
, Sisi Duan
, Yan Pang
:
SAMamba: Structure-Aware Mamba for Ethereum Fraud Detection. 7410-7423 - Hao Zhang

, Fuhui Zhou
, Wei Wang
, Qihui Wu, Chau Yuen
:
A Federated Learning-Based Lightweight Network With Zero Trust for UAV Authentication. 7424-7437 - Kang Si

, Peng Li
, Zhi-Peng Yuan:
Secure and Privacy-Preserving Distributed Kalman Filtering for Sensor Networks With Event-Triggered Mechanism. 7438-7453 - Mohammed Jubur

, Christopher Robert Price
, Maliheh Shirvanian, Nitesh Saxena
, Stanislaw Jarecki
, Hugo Krawczyk
:
Building and Testing a Hidden-Password Online Password Manager. 7454-7468 - Shuyang Lin

, Tong Jia
, Hao Wang
, Bowen Ma
, Mingyuan Li
:
Open-Vocabulary Prohibited Item Detection for Real-World X-Ray Security Inspection. 7469-7481 - Yuntian Chen

, Zhanyong Tang
, Tianpei Lu
, Bingsheng Zhang
, Zhiying Shi
, Zheng Wang
:
Accelerating Private Large Transformers Inference Through Fine-Grained Collaborative Computation. 7482-7497 - Xiaoli Chen

, Songlin Hu
, Wei Zhang, Xiangpeng Xie
, Dong Yue
:
DoS-Resilient Time Varying Estimators and Controllers Co-Design for NCSs Under Sensor and Actuator Attacks. 7498-7511 - Jie Meng, Zhenyong Zhang

, Hengye Zhu
, Zeyu Yang
, Ruilong Deng
, Peng Cheng
, Jianying Zhou
:
SSTAF: Security Settings-Based Threat Assessment Framework of Programmable Logic Controllers. 7512-7527 - Jingyi Yang

, Zitong Yu
, Jia He, Xiuming Ni, Liepiao Zhang, Hui Li
, Xiaochun Cao
:
G2V2former: Graph Guided Video Vision Transformer for Face Anti-Spoofing. 7528-7541 - Wenhao Li

, Qiang Wang
, Huaifeng Bao, Xiaoyu Zhang
, Lingyun Ying
, Zhaoxuan Li
, Huamin Jin, Shuai Wang:
Magnifier: Detecting Network Access via Lightweight Traffic-Based Fingerprints. 7542-7557 - Jia-Xiang Wang

, Aihua Zheng
, Lei Liu
, Chenglong Li
, Ran He
, Jin Tang
:
Adaptive Interaction and Correction Attention Network for Audio-Visual Matching. 7558-7571 - Min Xie

, Peichen Ju, Yanqi Zhao, Zoe L. Jiang
, Man Ho Au
, Junbin Fang
, Yong Yu
, Xuan Wang
:
FDAAC-CR: Practical Delegatable Attribute-Based Anonymous Credentials With Fine-Grained Delegation Management and Chainable Revocation. 7572-7587 - Dan Lin

, Jiajing Wu
, Yuxin Su
, Ziye Zheng, Yuhong Nan
, Qinnan Zhang, Bowen Song, Zibin Zheng
:
Connector: Enhancing the Traceability of Decentralized Bridge Applications via Automatic Cross-Chain Transaction Association. 7588-7601 - Adamu Gaston Philipo

, Doreen Sebastian Sarwatt
, Jianguo Ding
, Mahmoud Daneshmand
, Huansheng Ning
:
Assessing Text Classification Methods for Cyberbullying Detection on Social Media Platforms. 7602-7616 - Zixuan Huang

, Yuanguo Bi
, Kuan Zhang
, Bing Hu
, Zhou Su
, Chong Tai
, Xukun Luan
:
PDSA-FL: A Poisoning-Defense Secure Aggregation in Federated Learning. 7617-7632 - Sang Wu Kim

:
Covert Message Authentication in MIMO Communications. 7633-7647 - Zeyu Li

, Yipeng Wang
, Xuebin Wang
, Haoting Liu
, Jiapeng Zhao
, Jinqiao Shi
:
Proxied Traffic Fingerprinting for Hidden Service De-Anonymization With Burst Reshaping. 7663-7678 - Chen Chen

, Xinwei Zhao
, Matthew C. Stamm
:
Generative Adversarial Attacks Against Deep- Learning-Based Camera Model Identification. 7679-7694 - Xiaowei Ge

, Guanxiong Ha
, Chunfu Jia
, Keyan Chen, Longwei Yang
, Qiaowen Jia
:
PopeDup: Popularity-Based Encrypted Deduplication With Privacy Learning Attacks Resistance and Protected Thresholds. 7695-7708 - Yu-Xin Zhang

, Jie Gui
, Minjing Dong
, Xiaofeng Cong
, Yuan Cao, Xin Gong
, Yuan Yan Tang
, James Tin-Yau Kwok
:
Divide and Conquer: Frequency-Aware Contrastive Adversarial Training for Robust Point Cloud Classification. 7709-7723 - Shurong Ren, Shuyuan Yang

, Mengyao Zhan, Zhuoyue Qi, Zhixi Feng
:
Knowledge Driven Signal Transformer for Emitter Recognition. 7724-7735 - Liping Chen

, Chenyang Guo, Rui Wang
, Kong Aik Lee
, Zhen-Hua Ling
:
Any-to-Any Speaker Attribute Perturbation for Asynchronous Voice Anonymization. 7736-7747 - Jiazhen Zhao

, Kailong Zhu
, Lu Yu
, Hui Huang
, Yuliang Lu
:
Yama: Precise Opcode-Based Data Flow Analysis for Detecting PHP Applications Vulnerabilities. 7748-7763 - Wenhong Huang

, Yunshu Dai, Jianwei Fei
, Fangjun Huang
:
New Visible Watermark Protection Mechanism Based on Information Hiding. 7764-7776 - Xuyang Liu

, Zijian Zhang
, Zhen Li
, Peng Jiang, Yajie Wang
, Meng Li
, Liehuang Zhu
:
The Deferred Byzantine Generals Problem. 7777-7792 - Zhenju Zhang

, Mingqian Liu
, Yunfei Chen
, Nan Zhao
, Jie Tang
, Kai-Kit Wong
, George K. Karagiannidis
:
Adversarial Waveform Design for Wireless Transceivers Toward Intelligent Eavesdropping. 7793-7807 - Yishan Yang

, Zheng Yan
, Niya Luo, Jiajun Li
, Mianxiong Dong, Kaoru Ota
:
HABC: A Mutual and Handover Authentication Scheme for Backscatter Communications With High Robustness. 7808-7823 - Xiangyun Tang

, Minyang Li, Meng Shen
, Jiawen Kang
, Liehuang Zhu
, Zhiquan Liu
, Guomin Yang
, Dusit Niyato
, Robert H. Deng
:
ROBY: A Byzantine-Robust and Privacy-Preserving Serverless Federated Learning Framework. 7824-7838 - Xiaoxiao Qiao, Man Zhou

, Hongwei Li, Xiaojing Zhu, Zhihao Yao
, Houzhen Wang, Xiaojing Ma:
NUSGuard: Smart Device Anti-Eavesdropping Protection Based on Near-Ultrasonic Interference. 7839-7852 - Jie Ying

, Tiantian Zhu
, Tieming Chen, Mingqi Lv
:
Dehydrator: Enhancing Provenance Graph Storage via Hierarchical Encoding and Sequence Generation. 7853-7866 - Yonggan Wu

, Hongrui Yuan
, Yuan Zichao
, Ling-Chao Meng
, Yueyi Bai
, Hongqiang Wang
:
An Asymmetric Siamese Transformer With Global-Local Alignment Attention for Visible-X-Ray Cross-Modality Package Re-Identification. 7881-7894 - Junxian Shi

, Linning Peng
, Lingnan Xie
, Hua Fu
, Aiqun Hu
:
An SNR-Aware Feature Reconstruction Method in Radio Frequency Fingerprint Identification. 7895-7910 - Huafeng Qin

, Yuming Fu
, Jing Chen
, Qun Song
, Yantao Li
, Mounim A. El-Yacoubi
, Dexing Zhong
:
WTxGRN: Wavelet Transform-Based Extended Gated Recurrent Network for Palm Vein Recognition. 7911-7926 - Si-Miao Gao

, Pengcheng Wang
, Jia-Ju Bai
, Jia-Wei Yu
, Haizhou Wang
:
Detecting Lifecycle-Related Concurrency Bugs in ROS Programs via Coverage-Guided Fuzzing. 7940-7953 - Yunming Zhang

, Dengpan Ye
, Sipeng Shen, Jun Wang, Caiyun Xie
:
StyleMark: Robust Style Watermarking for Artworks Against Black-Box Zero-Shot Style Transfer. 7867-7880 - Yongjun Ren

, Ziyuan Zhou, Zhaoyang Han
, Chunpeng Ge
, Huawei Huang
:
AdaptiveShard: Enhancing Throughput and Security of Sharded Blockchain With Adaptive Verifiable Coding. 7927-7939 - Chunlei Peng

, Tian Xu, Decheng Liu
, Nannan Wang
, Xinbo Gao
:
Within 3DMM Space: Exploring Inherent 3D Artifact for Video Forgery Detection. 7954-7965 - Yibo Zhang

, Weiguo Lin
, Zhihong Tian
, Geyong Min
, Junfeng Xu
, Yikun Xu:
Robust and Unstigmatized Imperceptible Perturbations for Rendering Face Manipulation Ineffective. 7966-7981 - Tianyu Lu

, Liquan Chen
, Junqing Zhang
, Trung Q. Duong
:
Multi-User Key Rate Optimization for Near-Field Extremely Large-Scale Antenna Array Communications. 7982-7997 - Yuxin Qi

, Xi Lin
, Jiani Zhu, Ningyi Liao
, Jianhua Li
:
Hiding in the Network: Attribute-Oriented Differential Privacy for Graph Neural Networks. 7998-8013 - Jiajun Gong

, Guotao Meng
, Wei Cai
, Siyuan Liang
, Tao Wang
, Ee-Chien Chang
:
FOADA: Toward Robust Open-World Mobile App Fingerprinting. 8014-8029 - Weichao Liang

, Fengmao Lv
, Lei Chen
, Haicheng Tao
, Min Shi, Xingquan Zhu
, Jie Cao
:
Citywide Multi-Step Crime Prediction via Context-Aware Bayesian Tensor Decomposition. 8030-8042 - Jun Wang

, Benedetta Tondi
, Mauro Barni
:
BOSC: A Backdoor-Based Framework for Open Set Synthetic Image Attribution. 8043-8058 - Jun Cheng

, Hongjie Pang, Huaicheng Yan
, Dan Zhang
:
Protocol-Based PID Control of Switched Systems With DoS Attacks. 8059-8068 - Rui Sun

, Yun Du
, Guoxi Huang
, Xuebin Wang
, Jingjing Wu
:
Implicit Alignment-Based Cross-Modal Symbiotic Network for Text-to-Image Person Re-Identification. 8069-8082 - Mingyang Li

, Weina Niu
, Jiacheng Gong
, Song Li
, Mingxue Zhang
, Xiaosong Zhang
:
BPFDex: Enabling Robust Android Apps Unpacking via Android Kernel. 8083-8095 - Chunlong Xie

, Jialing He
, Ying Yang
, Shangwei Guo
, Tianwei Zhang
, Tao Xiang
:
Semantic and Precise Trigger Inversion: Detecting Backdoored Language Models. 8096-8108 - Zechao Hu, Zhengwei Yang

, Hao Li
, Zheng Wang:
Contrastive-Generative-Contrastive: Neutralize Subjectivity in Sketch Re-Identification. 8109-8123 - Weiliang Chen

, Qianqian Ren
, Yong Liu
, Jianguo Sun
, Feng Lin
:
Adversarial Self-Supervised Learning for Secure and Robust Urban Region Profiling. 8124-8138 - Ziqi Zhou

, Menghao Deng, Yufei Song
, Hangtao Zhang
, Wei Wan
, Shengshan Hu
, Minghui Li
, Leo Yu Zhang
, Dezhong Yao
:
DarkHash: A Data-Free Backdoor Attack Against Deep Hashing. 8139-8153 - Meng Jia

, Jing Chen
, Yuanzheng Wang, Kun He
, Min Shi
, Ruiying Du
:
Multi-Authority Anonymous Credentials With Efficient and Decentralized Supervision. 8154-8166 - Yongze Li

, Ning Li
, Ajian Liu
, Hui Ma
, Liying Yang
, Xihong Chen
, Zhiyao Liang
, Yanyan Liang
, Jun Wan
, Zhen Lei
:
FA3-CLIP: Frequency-Aware Cues Fusion and Attack-Agnostic Prompt Learning for Unified Face Attack Detection. 8167-8177 - Zhi Li

, Chaozhuo Li
, Feiran Huang
, Xi Zhang
, Jian Weng
, Philip S. Yu
:
LapGLP: Approximating Infinite-Layer Graph Convolutions With Laplacian for Federated Recommendation. 8178-8193 - Helin Yang

, Dayuan Huang, Kailong Lin, Chongwen Huang
, Zehui Xiong:
Aerial Hybrid Active-Passive Reconfigurable Intelligent Surface-Assisted Secure Communications for Integrated Satellite-Terrestrial Networks. 8194-8209 - Xiuju Huang

, Cong Zuo
, Jun Shao
, Junke Duan
, Wei Wang
, Yin Meng, Licheng Wang:
Timed Anonymous Ring Signature With Application to Bidding Systems. 8210-8223 - Beining Wang

, Yinuo Li, Jing Chen
, Kun He
, Meng Jia
, Ruiying Du
:
Forward and Backward Private Conjunctive Dynamic Searchable Symmetric Encryption With Refined Leakage Function and Low Communication. 8224-8236 - Kang Liu

, Qizhi Zhang, Yuan Zhang
, Yu Lin, Quanwei Cai, Jue Hong, Ye Wu, Sheng Zhong
:
Toward Efficient and Secure Collaborative SQL Analyses of Billion-Scale Datasets. 8237-8250 - Fei Luo

, Anna Li
, Jiguang He
, Zitong Yu
, Kaishun Wu
, Bin Jiang
, Lu Wang
:
Improved Multi-Task Radar Sensing via Attention-Based Feature Distillation and Contrastive Learning. 8251-8265 - Peng Tang

, Yitao Xu
, Yutao Jiao
, Maomao Zhang
, Yehui Song
, Guoru Ding
:
Similarity-Adaptive Framework for Semi-Supervised Open-World Specific Emitter Identification. 8266-8279 - Luming Yang

, Shaojing Fu
, Yongjun Wang, Lin Liu
, Yuchuan Luo
:
The Analysis of Encrypted Video Stream Based on Low-Dimensional Embedding Method. 8280-8295 - Aladin Djuhera

, Vlad-Costin Andrei
, Xinyang Li
, Ullrich J. Mönich
, Holger Boche
, Walid Saad
:
R-SFLLM: Jamming Resilient Framework for Split Federated Learning With Large Language Models. 8296-8311 - Mohamed Seif

, Liyan Xie, Andrea J. Goldsmith
, H. Vincent Poor
:
Differentially Private Online Community Detection for Censored Block Models: Algorithms and Fundamental Limits. 8312-8326 - Yucheng Wu

, Yuncong Yang
, Xiao Han
, Leye Wang
, Junjie Wu
:
Learning-Based Privacy-Preserving Graph Publishing Against Sensitive Link Inference Attacks. 8327-8340 - Menglin Zhang

, Xiaoxin Guo
, Xiaofeng Cao
, Shuifa Sun
, Huazhu Fu
, Qing Guo
:
Lighting is Unreliable: Adversarial Video Relighting Against rPPG Heart Rate Measurement. 8341-8356 - Shichang Guo

, Yuanyu Zhang
, Jiayi Guo, Shuangrui Zhao
, Ji He
, Yulong Shen
, Xiaohong Jiang
:
A High-Entropy Physical Layer Key Generation Scheme for 5G Systems. 8357-8372 - Zhiyuan Wang

, Yanxiang Chen
, Yuanzhi Yao
, Meng Han
, Wenpeng Xing
, Meng Li
:
IDCNet: Image Decomposition and Cross-View Distillation for Generalizable Deepfake Detection. 8373-8386 - Hongyu Han

, Sheng Zhang
, Hongyang Chen
, Ali H. Sayed
:
Masked Diffusion Strategy for Privacy-Preserving Distributed Learning. 8402-8416 - Shiquan Dong

, Zhi Li
, Jianshuo Liu
, Hong Li
, Dongliang Fang
, Shichao Lv
, Haining Wang
, Limin Sun
:
EMFuzz: Use Electromagnetic Fuzzing for Automated Attack Surface Assessment of Actuators. 8417-8432 - Joon Sik Kim

, Kwangsu Lee
, Jong Hwan Park
, Hyoseung Kim
:
Dynamic Threshold Key Encapsulation With Transparent Setup. 8433-8448 - Lanxiang Chen

, Yi Mu
, Jiahui Yang, Robert H. Deng
:
Keyword-Pair Result Pattern Hiding Structured Encryption for Boolean Queries. 8449-8461 - Fucai Luo

, Jiahui Wu
, Jinglong Luo
:
Vulnerabilities in SVHFL: Toward Secure and Verifiable Hybrid Federated Learning. 8462-8464 - Ye Lu

, Shen Wang
, Guopu Zhu
, Zhaoyang Zhang
, Jiwu Huang
:
FGMIA: Feature-Guided Model Inversion Attacks Against Face Recognition Models. 8465-8480 - Yang Luo

, Qingni Shen
, Zhonghai Wu
:
PERM: Streamlining Cloud Authorization With Flexible and Scalable Policy Enforcement. 8481-8496 - Fei Zhu, Lin You

, Jixiang Wang, Lei Li:
Short-HotStuff: Two-Chain BFT Algorithm With Linear Complexity and Optimistic Responsiveness. 8497-8508 - Erjun Zhou

, Jing Chen
, Min Shi
, Zhengdi Huang, Meng Jia
, Kun He
, Ruiying Du
:
Boreas: Fully Anonymous Sealed-Bid Auction. 8509-8524 - Haoyi Wang

, Victor Sanchez
, Chang-Tsun Li
, Nathan Clarke
:
From Age Estimation to Age-Invariant Face Recognition: Generalized Age Feature Extraction Using Order-Enhanced Contrastive Learning. 8525-8540 - Yaoyao Zhong

, Weilong Chai, Libin Wang, Dandan Zheng, Huiyuan Fu
, Huadong Ma
:
RegPalm: Toward Large-Scale Open-Set Palmprint Recognition by Reducing Pattern Variance. 8541-8554 - Rui Zheng

, Zhibo Wang
, Kui Ren
, Chun Chen
:
AV-Agent: A Bottom-Up Interpretable Malware Classifier Based on Large Language Models. 8555-8569 - Jiachun Li

, Yan Meng
, Fazhong Liu, Tian Dong
, Suguo Du
, Guoxing Chen
, Yuling Chen
, Haojin Zhu
:
Synergistic Multi-Modal Keystroke Eavesdropping in Virtual Reality With Vision and Wi-Fi. 8387-8401 - Haopeng Fan

, Hailong Zhang
, Yongjuan Wang
, Wenhao Wang
, Haojin Zhang, Qingjun Yuan
:
Multivariate Template Attack Against NTT-Based Polynomial Multiplication of Dilithium. 8570-8582 - Nicolas Alhaddad, Sisi Duan

, Mayank Varia
, Haochen Wang
, Haibin Zhang:
Efficient Byzantine Broadcast From Succinct Erasure Coding Proof System. 8583-8596 - Yan Wang, Ruiqi Liu

, Tong Gao
, Feng Shu
, Xuemei Lei, Yongpeng Wu
, Guan Gui
, Jiangzhou Wang
:
A Novel RFID Authentication Protocol Based on a Block-Order-Modulus Variable Matrix Encryption Algorithm. 8597-8612 - Ruonan Chen

, Dawei Li
, Yang Zhang, Yizhong Liu
, Jianwei Liu
, Zhenyu Guan
, Min Xie
, Qianhong Wu
, Jianying Zhou
, Willy Susilo
:
Dissecting Blockchain Network Partitioning Attacks and Novel Defense for Bitcoin and Ethereum. 8613-8627 - Junhao Wang

, Li Lu
, Hao Kong
, Feng Lin
, Zhongjie Ba
, Kui Ren
:
Liquid Crystal Mimics Your Heart: A Physical Spoofing Attack Against PPG-Based Systems. 8628-8642 - Lang Pu

, Jingjing Gu
, Chao Lin
, Xinyi Huang:
FedLG: Lightweight Generic Certificateless Authentication for Trustworthy Federated Learning in VANETs. 8643-8657 - Shuilong Wang

, Laurence T. Yang
, Debin Liu
, Ruonan Zhao
, Xianjun Deng
, Cannian Zou
, Xiaoxuan Fan
:
Improving Ethereum Mixing Address Linking With Tensor Computation, Neighbor Data Utilization, and Asymmetric Information Modeling. 8658-8671 - Ruida Xi

, Zhenyang Fu, Nianchang Huang
, Xiaowei Zhao, Qiang Zhang
, Jungong Han
:
CSANet: Cross-Modality Self-Paced Association Network for Unsupervised Visible-Infrared Person Re-Identification. 8672-8686 - Wei Xu

, Hui Zhu
, Jiaqi Zhao
, Yandong Zheng
, Fengwei Wang
, Baishun Sun
, Songnian Zhang
, Dengguo Feng
:
SGBoost+: Efficient and Privacy-Preserving Vertical Boosting Trees for Federated Outsourced Training and Inference. 8701-8714 - Jingting Xue

, Wenyi Li
, Fagen Li
, Wenzheng Zhang
, Yu Zhou, Xiaojun Zhang
:
Efficient Collaborative Data Cleaning Using Private Set Intersection and Encoding for Unbalanced Datasets. 8715-8729 - Yixuan Li

, Xuelin Liu
, Xiaoyang Wang
, Bu-Sung Lee
, Shiqi Wang
, Anderson Rocha
, Weisi Lin
:
FakeBench: Probing Explainable Fake Image Detection via Large Multimodal Models. 8730-8745 - Wen Wu

, Jiankuo Dong
, Zhen Xu
, Zhenjiang Dong
, Dung Hoang Duong
, Fu Xiao
, Jingqiang Lin
:
Symphony of Speeds: Harmonizing Classic McEliece Cryptography With GPU Innovation. 8746-8759 - Hua Shen

, Caigang Yu, Willy Susilo
, Yitao Chen, Mingwu Zhang
:
An Efficient Graph Encryption Scheme Supporting Shortest Path Fuzzy Queries. 8687-8700 - Pinchang Zhang

, Shuangrui Zhao
, Weibei Fan
, Yulong Shen
, Xiaohong Jiang
, Fu Xiao
:
Reliable PLA With Array Error Features and Two-Beam Transmission in Millimeter-Wave Communication Systems. 8760-8772 - Junjie Xiong

, Mingkui Wei
, Xiao Han
, Zhuo Lu
, Yao Liu:
The Implications of Insecure Use of Fonts Against PDF Documents and Web Pages. 8773-8787 - Chang Ma

, Jun Li, Yipeng Zhou
, Ming Ding
, Yiyang Ni
, Shi Jin
:
Differential Privacy for Multi-Modal Federated Learning With Modality Selection. 8788-8801 - Mingfeng Jiang

, Hua Dai
, Huaqun Wang
, Rui Gao
, Geng Yang
, Fu Xiao
:
EPSRQ: Efficient Privacy-Preserving Spatial-Keyword Range Query Processing in Cloud. 8802-8816 - Qiuyan Qian

, Jianping Zeng
:
FEPGuesser: Feedback-Information Enhanced Password Guesser Based on Natural Language Pre-Trained Model and VAE. 8817-8832 - Xiaoyu Cheng

, Fei Tong
, Zhe Zhou
, Fang Jiang, Hongyu Wang
, Guang Cheng
, Yuxing Mao
:
SCSGuardian: A Practical Hardware Defense Against Speculative Cache Side-Channel Attacks. 8833-8847 - Jintian Zhang

, Qingfeng Cheng
, Xiaofeng Chen
, Xiangyang Luo
:
CSAP-IoD: A Chaotic Map-Based Secure Authentication Protocol for Internet of Drones. 8848-8862 - Jianhui Li

, Bokang Zhang
, Youcheng Niu
, Shuang Wu
, Kemi Ding
, Junfeng Wu
:
Online Reward Poisoning in Reinforcement Learning With Convergence Guarantee. 8891-8905 - Junjie Hu

, Huan Yan
, Na Ruan
, Zhen Xiao
, Jianhua Li
:
The Halt Game: Sometimes Rewards Cannot Cover Expenses in the PoW-Based Blockchain. 8906-8921 - Gábor Fuchs

, Roland Nagy
, Levente Buttyán:
Targeted Attacks Against the TLSH Similarity Digest Scheme. 8922-8935 - Yuanyuan Wang

, Youwen Zhu
, Shaowei Wang
, Qiao Xue
, Jian Wang
:
GFD: An Effective Defense Against Targeted Poisoning Attacks for Local Differential Privacy Frequency Estimation. 8863-8875 - Xueping Wang

, Hao Wu
, Min Liu
, Yaonan Wang
:
Learnable Prompts With Neighbor-Aware Correction for Text-Based Person Search. 8951-8961 - Xiangyi Wang

, Jian Zhang
, Lingkai Xing
, Ming Yang, Zheng Meng, Lexin Jia
:
HyperMD: A Multi-Modal Malware Detection Method Using Performance Counters and Process Memory on Xen Platform. 8962-8977 - Jiangshan Long

, Changhai Ou
, Yukun Cheng
, Tingting Wang
, Zhu Wang
, Fan Zhang
:
The Mysteries of LRA: Roots and Progress in Side-Channel Applications. 8978-8993 - Cong Wu

, Jing Chen
, Jiahong Li, Jiahua Xu
, Ju Jia
, Yutao Hu
, Yebo Feng
, Yang Liu
, Yang Xiang
:
Profit or Deceit? Mitigating Pump and Dump in DeFi via Graph and Contrastive Learning. 8994-9008 - Mohamed Younis

, Mohammad Ebrahimabadi
, Suhee Sanjana Mehjabin
, Emily Pozniak
, Tamim Sookoor
, Naghmeh Karimi
:
LiSB: Lightweight Secure Boot and Attestation Scheme for IoT and Edge Devices. 9009-9024 - Yandong Zheng

, Hui Zhu
, Rongxing Lu
, Songnian Zhang
, Fengwei Wang
, Jun Shao
, Hui Li
:
Toward Efficient and Secure Hypercube Tree Building for Vertically Distributed Data in Cloud. 9025-9038 - Shiyu Zuo, Haijian Zhang

, Lexuan Xu
, Sijin Wu, Guang Hua
:
Robust ENF Estimation in Contaminated Audio. 9039-9053 - Lianghong Li

, Xiaorong Jing
, Hongjiang Lei
, Chengchao Liang, Qianbin Chen
:
Distributed Anti-Jamming Strategy Based on Local Knowledge Diffusion and Differential Weighted Fusion Mechanisms. 9054-9067 - Xin Zhao

, Hao Han
, Hao Wu
, Sheng Zhong
, Fengyuan Xu
:
UTRDCL: Stealthy DCL-Based Obfuscation and Its Attacks and Defenses in Android. 9068-9083 - Jiayun Yan

, Yunhao Ling
, Jie Chen
, Haifeng Qian
:
MuseME: Multi-User Secure and Efficient Matchmaking Encryption for Mobile Devices. 9084-9098 - Yulin Zhu

, Xing Ai
, Yevgeniy Vorobeychik
, Kai Zhou
:
Robust Graph Contrastive Learning With Information Restoration. 9151-9163 - Wenbin Huang

, Ju Ren
, Hangcheng Cao
, Hanyuan Chen, Hongbo Jiang
, Zhangjie Fu
:
Mitigating Voice Assistant Eavesdropping via Event Source Review on Mobile Devices. 9164-9179 - Jiaming Zhang

, Lingyu Qiu
, Qi Yi, Yige Li, Jitao Sang
, Changsheng Xu
, Dit-Yan Yeung
:
MF-CLIP: Leveraging CLIP as Surrogate Models for No-Box Adversarial Attacks. 9195-9206 - Zhiyuan Ning

, Juan He
, Zhanyong Tang
, Weihang Hu
, Xiaojiang Chen
:
A Portable and Stealthy Inaudible Voice Attack Based on Acoustic Metamaterials. 8876-8890 - Yuan Wu

, Shoudu Bai, Runmin Lv
, Xueluan Gong, Xiuwen Liu
, Lei Ding
, Yanjiao Chen
:
FingerVib: Fortifying Acoustic-Based Authentication With Finger Vibration Biometric on Smartphone. 8936-8950 - Meiyu Zhong

, Ravi Tandon
:
SPLITZ: Certifiable Robustness via Split Lipschitz Randomized Smoothing. 9099-9112 - Hatef Otroshi-Shahreza

, Sébastien Marcel
:
Foundation Models and Biometrics: A Survey and Outlook. 9113-9138 - Ming-Hao Wei

, Chih-Min Chao
, Chih-Yu Lin, Chun-Chao Yeh:
Fake Path Co-Construction Source Location Privacy Protection Scheme Design for UWSNs. 9139-9150 - Yun Luo, Yuling Chen

, Zhi Ouyang
, Weijie Tan
, Xiuzhang Yang:
Privacy-Enhanced High-Fidelity Separable Lossless Reversible Data Hiding. 9180-9194 - Shaopeng Yang

, Saihui Hou
, Xu Liu
, Chunshui Cao
, Kang Ma
, Yongzhen Huang
:
Multimodal Mutual Learning for Unsupervised Gait Recognition. 9207-9219 - Jianshu Zhang

, Xiaofu Wu
:
Cooperative Jamming Over DRL-Based Frequency Hopping Wireless Communications: A One-Leader Multi-Follower Stackelberg Game Approach. 9220-9234 - Anli Yan

, Huali Ren, Kanghua Mo
, Zhenxin Zhang, Shaowei Wang
, Jin Li
:
Enhancing Model Intellectual Property Protection With Robustness Fingerprint Technology. 9235-9249 - Jingxin Mao

, Zhiwei Wei
, Bing Li
, Rongqing Zhang
, Lingyang Song
:
FedIn-NID: A Federated Learning Framework for Network Intrusion Detection in Large-Scale Heterogeneous Industrial IoT. 9250-9262 - Chuhang Zheng

, Qi Zhu
, Lunke Fei
, Shengrong Li
, Xiangping Bryce Zhai
, David Zhang
, Daoqiang Zhang
:
Disentangled Representation Learning for Robust Brainprint Recognition. 9263-9274 - Zeyan Li

, Shengda Zhuo
, Jinchun He
, Wangjie Qiu
, Zhiming Zheng, Min Chen
, Yin Tang
:
Behavior-Enhanced Representation Learning for User Behavior Analysis. 9275-9288 - Jiang Xie

, Shuhao Li
, Xiaochun Yun
, Tao Yin
, Hongbo Xu, Peishuai Sun:
Traffic2Chain: Revealing Covert Multi-Step Attacks Through Unsupervised Traffic Behaviour Correlation. 9289-9304 - Yijia Guo

, Junqing Zhang
, Y.-W. Peter Hong
:
Practical Physical Layer Authentication for Mobile Scenarios Using a Synthetic Dataset Enhanced Deep Learning Approach. 9305-9317 - Xianwen He

, Xinglin Li, Yao Li
, Minhao Cheng:
Defense Against Syntactic Textual Backdoor Attacks With Token Substitution. 9318-9327 - Ruyu Zhang

, Weiwei Ni
, Nan Fu, Lihe Hou
, Dongyue Zhang, Yifan Zhang, Liang Zheng:
Principal Angle-Based Clustered Federated Learning With Local Differential Privacy for Heterogeneous Data. 9328-9342 - Pengyu Chen

, Long Jiao, Ning Wang
, Tao Xiang
:
MRIS-SAD: Malicious RIS Spoofing Attack Detection Based on Hybrid Deep Autoencoder. 9343-9356 - Bei Gong

, Mowei Gong
, Zhe Li
, Haotian Zhu
, Weizhi Meng
, Chong Guo
:
ECGSH: An Efficient Certificateless Group Signcryption-Based Homomorphic in Industrial IoT. 9357-9371 - Xiao Fang, Hui Cai

, Biyun Sheng
, Juan Li
, Jian Zhou
, Haiping Huang
, Mang Ye
, Fu Xiao
:
A Blockchain-Based Secure and Fair Online Incentive Mechanism for Crowdsensed Data Trading. 9372-9386 - Jianfeng Lu

, Tao Huang
, Shuqin Cao
, Shujun Yu, Riheng Jia
, Minglu Li
:
PIECE: Incentivizing Personalized Privacy-Preserving for Multi-Version Model Marketplace in Federated Learning. 9387-9398 - Mingjian Guang

, Zhong Li
, Chungang Yan, Yuhua Xu
, Junli Wang
, Dawei Cheng
, Changjun Jiang
:
Multi-Temporal Partitioned Graph Attention Networks for Financial Fraud Detection. 9399-9412 - Heng Li

, Bang Wu, Wei Zhou, Wei Yuan
, Cuiying Gao
, Xinge You
, Xiapu Luo
:
An Efficient Adversarial Attack on FCG-Based Android Malware Detection Systems. 9413-9426 - Yuanbo Li

, Cong Hu
, Xiaojun Wu
:
Transferable Stealthy Adversarial Example Generation via Dual-Latent Adaptive Diffusion for Facial Privacy Protection. 9427-9440 - Ruihao Dai

, Jiankuo Dong
, Mingrui Qiu, Zhenjiang Dong
, Fu Xiao
, Jingqiang Lin
:
GOLF: Unleashing GPU-Driven Acceleration for FALCON Post-Quantum Cryptography. 9441-9453 - Bin Liu

, Tiantian Yang, Wei Huang
, Chun-Yan Wei
, Nankun Mu
, Bingjie Xu
, Fei Gao
:
Measurement-Device-Independent Quantum Private Query With Weak Coherent Source. 9454-9462 - Xiaoxiang Li

, Xinyu Jiang, Hai Wan
, Xinbin Zhao
:
TeRed: Normal Behavior-Based Efficient Provenance Graph Reduction for Large-Scale Attack Forensics. 9463-9476 - Meng Li

, Hanni Ding, Yifei Chen
, Yan Qiao
, Zijian Zhang
, Liehuang Zhu
, Mauro Conti:
Threshold Signatures With Verifiably Timed Combining and Message-Dependent Tracing. 9477-9491 - Chenbin Zhao

, Ruiying Du
, Jing Chen
, Kun He
, Ximeng Liu
, Yang Xiang
:
Lightweight Dynamic Conjunctive Keyword Searchable Encryption With Result Pattern Hiding. 9492-9506 - Hailong Hu

, Jun Pang
, Yantao Li
, Huafeng Qin
:
Unveiling Privacy Risks in the Long Tail: Membership Inference in Class Skewness. 9507-9522 - Zhiyang Dai, Yansong Gao

, Boyu Kuang
, Yifeng Zheng
, Ajmal Mian
, Ruimin Wang, Anmin Fu
:
Division and Union: Latent Model Watermarking. 9523-9538 - Wenjing Cheng, Qi Feng

, Chenkai Zeng
, Yu Peng, Min Luo
, Xiaolin Yang, Qingcai Luo:
Efficient Three-Party ECDSA Signature Based on Replicated Secret Sharing With Identifiable Abort. 9539-9551 - Wenbo Fang

, Junjiang He
, Wenshan Li
, Wengang Ma
, Linlin Zhang
, Xiaolong Lan
, Geying Yang
, Jiangchuan Chen
, Tao Li
:
Unknown Cyber Threat Discovery Empowered by Genetic Evolution Without Prior Knowledge. 9552-9567 - Hanyue Dou

, Peifang Ni
, Jing Xu
:
Chitin: A Security-Enhanced Proof-of-Stake Protocol With View-Interference Resilience. 9568-9583 - Zhechao Lin

, Jiahao Cao
, Xinda Wang
, Renjie Xie, Yuxi Zhu
, Xiao Li, Qi Li
, Yangyang Wang, Mingwei Xu
:
VPGFuzz: Vulnerable Path-Guided Greybox Fuzzing. 9584-9599 - Luke Chen

, Youssef Gamal, Yanda Li
, Shih-Yuan Yu
, Ihsen Alouani
, Mohammad Abdullah Al Faruque
:
DART: Distribution-Aware Hardware Trojan Detection. 9600-9609 - Wenzhong Li

, Zhaoyang Xie
, Shengli Liu
, Yunxiao Zhou
, Haibin Zhang
:
Controllable Access Control in Permissioned Blockchains via Controllable Threshold Proxy Re-Encryption. 9625-9640 - Dongchi Han

, Yuan Ma
, Tianyu Chen
, Shijie Jia
, Na Lv
, Fangyu Zheng
, Xianhui Lu
:
Revisiting Prediction-Based Min-Entropy Estimation: Toward Interpretability, Reliability, and Applicability. 9641-9656 - Benlong Wu

, Guoqiang Chen, Kejiang Chen
, Xiuwei Shang
, Jiapeng Han, Yanru He
, Weiming Zhang
, Nenghai Yu
:
AutoPT: How Far Are We From the Fully Automated Web Penetration Testing? 9657-9672 - Boyuan Zhang, Jiaxu Li, Yucheng Shi

, Yahong Han
, Qinghua Hu
:
AdvNeRF: Generating 3D Adversarial Meshes With NeRF to Fool Driving Vehicles. 9673-9684 - Zheng Zhang

, Jingfeng Xue
, Weizhi Meng
, Xu Qiao, Yuanzhang Li
, Yu-an Tan
:
FlashAttest: Self-Attestation for Low-End Internet of Things via Flash Devices. 9685-9699 - Qianwen Gao

, Yuan Lu
, Kunpeng Bai, Zhenfeng Zhang, Yichi Tu
:
ThPlA: Threshold Passwordless Authentication Made Usable and Scalable. 9700-9715 - Guorong Lin, Shunzhi Yang

, Wei-Shi Zheng
, Zuoyong Li
, Zhenhua Huang
:
A Semantically Guided and Focused Network for Occluded Person Re-Identification. 9716-9731 - Edoardo Gabrielli

, Dimitri Belli
, Zoe Matrullo, Vittorio Miori
, Gabriele Tolomei
:
Securing Federated Learning Against Extreme Model Poisoning Attacks via Multidimensional Time Series Anomaly Detection on Local Updates. 9610-9624 - Yuanhang Huang

, Weiqi Luo
, Xiaochun Cao
, Jiwu Huang
:
A Forensic Framework With Diverse Data Generation for Generalizable Forgery Localization. 9732-9745 - Zhigang Tu

, Zhengbo Zhang
, Zitao Gao
, Chunluan Zhou
, Junsong Yuan
, Bo Du
:
FADE: A Dataset for Detecting Falling Objects Around Buildings in Video. 9746-9759 - Fei Tong

, Zihao Li
, Guang Cheng
, Yujian Zhang
, Heng Li
:
sBugChecker: A Systematic Framework for Detecting Solidity Compiler-Introduced Bugs. 9760-9775 - Yifan Zhou

, Jiang Xiao
, Xiaohai Dai
, Hai Jin
:
PlainDAG: A Low-Latency Asynchronous DAG BFT Protocol With Best-Effort Broadcast. 9792-9805 - Hao Wang

, Jian Liu, Qiang Xu
, Dong Wang
, Kaiju Li
:
ADDR: Anomaly Detection and Distortion Restoration for 3D Adversarial Point Cloud. 9776-9791 - Qingxia Li, Yuchen Jiang

, Ray Y. Zhong
, Xiaochun Cao
:
FedG3FA: Three-Stage GAN-Aided Target Feature Alignment for Secure Data Sharing in Federated Learning System. 9806-9817 - Xin Zhao, Xiumin Wang

, Weiwei Lin
, Wing W. Y. Ng
, Kai Liu
:
Fairness-Aware Client Selection and Payment Determination for Differentially Private Federated Learning. 9818-9831 - Lei Du

, Yuhan Chai
, Yan Jia, Binxing Fang
, Hao Li
, Zhaoquan Gu
:
Toward Open-World Network Intrusion Detection via Open Recognition and Inspection. 9832-9847 - Guanghua Liu

, Chenlong Wang
, Zhiguo Gong
, Jia Zhang, Shuqi Tang
, Huan Wang
:
Hypergraph-Driven Anomaly Detection in Dynamic Noisy Graphs. 9848-9863 - Zheng Wu

, Yanbiao Li
, Xin Wang
, Zulong Diao
, Weibei Fan
, Fu Xiao
, Gaogang Xie
:
GraphBGP: BGP Anomaly Detection Based on Dynamic Graph Learning. 9864-9877 - Junke Duan

, Wei Wang
, Licheng Wang
, Lize Gu
, Liehuang Zhu
:
CRCT: Compact Ring Confidential Transactions Based on Sum Arguments. 9878-9891 - Huan Teng

, Yuhui Quan
, Yong Xu
, Jun Huang, Hui Ji
:
Model Extraction for Image Denoising Networks. 9892-9904 - Hanqi Zhang, Yandong Zheng

, Chang Xu
, Liehuang Zhu
, Can Zhang
:
PCSR: Enabling Cross-Modal Semantic Retrieval With Privacy Preservation. 9905-9919 - Kun-Zhong Miao

, Chang Wang
, Yifeng Niu
, Hong Zhang
, Huangzhi Yu
:
Finite-Time Nonfragile H∞ Consensus Fuzzy Filtering for Multi-AAV Target Estimation Against Selective-Data-Based Network Attacks. 9920-9935 - Yunlong Liu

, Lu Leng
, Ziyuan Yang
, Andrew Beng Jin Teoh
, Bob Zhang
:
SF2Net: Sequence Feature Fusion Network for Palmprint Verification. 9936-9949 - Keke Gai

, Dongjue Wang
, Jing Yu, Liehuang Zhu
, Weizhi Meng
:
FedAMM: Federated Learning Against Majority Malicious Clients Using Robust Aggregation. 9950-9964 - Jun Yan

, Huan Hua, Weiquan Huang, Xi Fang, Wancheng Ge
, Jiancheng Yang
, Yongwei Wang:
Exploring Causal Information Bottleneck for Adversarial Defense. 9979-9992 - Wei Luo

, Qinghe Duan
, Chengzhe Lai
:
Traceable Access Control Encryption With Parallel Multiple Sanitizers. 9993-10006 - Xuhao Ren

, Haotian Liang, Yajie Wang
, Chuan Zhang
, Zehui Xiong
, Liehuang Zhu
:
BESA: Boosting Encoder Stealing Attack With Perturbation Recovery. 10007-10018 - Ying Jing

, Youguo Wang
, Qiqing Zhai
, Zhangfei Zhou
, Haojie Hou
:
Diffusion Prediction and Control of Negative Information on Simplicial Complexes Using Physics-Informed Neural Networks. 10019-10034 - Yuxuan Wang

, Jintong Yu
, Shipei Qu
, Xiaolin Zhang
, Xiaowei Li
, Chi Zhang
, Dawu Gu
:
Mind the Faulty Keccak: A Practical Fault Injection Attack Scheme Applied to All Phases of ML-KEM and ML-DSA. 10035-10050 - Fangtian Zhong

, Qin Hu
, Yili Jiang
, Jiaqi Huang
, Xiuzhen Cheng
:
Unveiling Malware Visual Patterns: A Self-Analysis Perspective. 9965-9978 - Wei Ma

, Junjie Shi, Jiaxi Qiu, Cong Wu
, Jing Chen
, Lingxiao Jiang
, Shangqing Liu
, Yang Liu
, Yang Xiang
:
Detecting DeFi Fraud With a Graph-Transformer Language Model. 10051-10065 - Huanyu Wang

, Dalin He
, Deng Tuo, Junnian Wang
:
Feature Reconstruction: Far Field EM Side-Channel Attacks in Complex Environment. 10066-10081 - Zhonghao Yang

, Cheng Luo, Daojing He
, Yiming Li
, Yu Li
:
ArcGen: Generalizing Neural Backdoor Detection Across Diverse Architectures. 10082-10097 - Yuchun Han, Weiping Wang

, Zhe Qu
, Shigeng Zhang
:
Tactics and Techniques Text Classification Based on Adversarial Contrastive Learning and Meta-Path. 10098-10113 - Yimeng Chen

, Bo Wang, Changshan Su, Ao Li, Yuxing Tang, Gen Li:
Enhancing Model Generalization for Efficient Cross-Device Side-Channel Analysis. 10114-10129 - Hanbiao Du

, Meng Shen
, Yang Liu, Zheng Che
, Jinhe Wu, Wei Wang
, Liehuang Zhu
:
Fine-Grained and Class-Incremental Malicious Account Detection in Ethereum via Dynamic Graph Learning. 10130-10145 - Zuxin Chen

, Yaowen Zheng
, Hong Li
, Siyuan Li
, Weijie Wang
, Dongliang Fang
, Zhiqiang Shi
, Limin Sun
:
PREXP: Uncovering and Exploiting Security-Sensitive Objects in the Linux Kernel. 10146-10160 - Hanlin Wang

, Shuyuan Yang
, Zhixi Feng
:
SSME: A Semi-Supervised Specific Emitter Identification Method With Manifold Enhancement. 10161-10172 - Haonan Yang

, Tianwei Zhang
, Zuobin Ying
, Runjie Yang
, Wanlei Zhou
:
SightCVC: An Efficient and Compatible Multi-Chain Transaction Protocol in Heterogeneous Blockchain Systems. 10203-10218 - Guoliang Chen

, Lingyu Wang, Te Yang
, Jianwei Xia
, Ju H. Park
:
Differentially Private Mean-Square Output Consensus for Heterogeneous Multiagent Systems: An Asynchronous Sampled-Data Interactions Scheme. 10189-10202 - Mengxue Yang

, Huaqun Wang
, Debiao He
, Jiankuo Dong
:
RLP-ABE: Puncturable CP-ABE for Efficient User Revocation From Lattices in Cloud Storage. 10219-10230 - Di Liu, Dawei Li

, Yuxiao Guo, Ying Guo, Ruinan Hu, Jianwei Liu
, Song Bian, Xuhua Ding, Yizhong Liu, Zhenyu Guan
:
Enhancing the Security of One-Tap Authentication Services via Dynamic Application Identification. 10231-10245 - Ellen Z. Zhang, Yunguo Guan, Rongxing Lu

, Harry Zhang:
Optimized Sparse Vector Aggregation Under Local Differential Privacy. 10246-10259 - Yifan Jia

, Yanbin Wang
, Jianguo Sun
, Ye Tian, Peng Qian
:
LMAE4Eth: Generalizable and Robust Ethereum Fraud Detection by Exploring Transaction Semantics and Masked Graph Embedding. 10260-10274 - Yulong Yang

, Ruiqi Cao, Xiang Ji, Qiwei Tian
, Chenhao Lin
, Zhengyu Zhao
, Qian Li
, Le Yang
, Hongshan Yang
, Chao Shen
:
Data-Centric Robust Training for Defending Against Transfer-Based Adversarial Attacks. 10275-10287 - Zhiyang Lu

, Chenglu Wen, Ming Cheng, Cheng Wang:
MOJO: MOtion Pattern Learning and JOint-Based Fine-Grained Mining for Person Re-Identification Based on 4D LiDAR Point Clouds. 10288-10300 - Yuchen Xie, Hengyi Ren

, Hanyu He, Shurui Fei, Jian Guo
, Lijuan Sun
:
FedRDA: Hierarchical Noise Detection for Federated Finger Vein Recognition. 10301-10314 - Changjie Hu

, Quanzhong Li
, Qi Zhang
, Qiang Li
:
Secure Beamforming for Integrated Sensing, NOMA Communication, and Over-the-Air Computation Networks. 10315-10331 - Lee T. Maccarone, Dennis M. Buede, Scott T. Bowman, Pawel Ambrozewicz, Charles D. Burdick, J. Connor Grady, Shaw X. Wen:

Identifying Adversarial Cyber-Activity in Operational Technology Environments Using Bayesian Networks. 10173-10188 - Nan Gao, Kai Fan, Zhen Zhao, Willy Susilo, Zhoutong Xiong, Hui Li:

Conjunctive Keyword Search With Dynamic Group-User. 10332-10345 - Muxue Liang, Chuan Wang, Siyuan Liang, Aishan Liu, Yanan Cao, Qingyong Li, Zeming Liu, Liang Yang, Xiaochun Cao:

Hard-Label Black-Box Adversarial Attacks for Implicit Scene Interactions. 10346-10360 - Jingjing Wang, Wei Long, Yizhong Liu, Xin Zhang, Zheng Zhang, Robert H. Deng:

A Lightweight Consensus Mechanism for Large-Scale UAV Networking. 10361-10375 - Jane Downer, Ren Wang, Binghui Wang:

Identifying Backdoored Graphs in Graph Neural Network Training: An Explanation-Based Approach With Novel Metrics. 10376-10390 - Weixin Zhao, Wen Huang, Zhishuo Zhang, Mingxuan Jia, Wenzheng Xu, Jian Peng, Yongjian Liao:

Improving Privacy Budget Auditing of Differentially Private Artificial Intelligence Models Through Variance of Model Parameters. 10391-10404 - Zihao Yang, Lin Wang, Yawen Zheng, Fan Dang, Xikai Sun, Zijuan Liu, Yunhao Liu:

Hinge: An Environment-Varying Adaptive Physical-Layer Key Generation Scheme. 10405-10418 - Qiguang Jiang, Kai Wang, Yuliang Wei, Hongri Liu, Bailing Wang:

XIPHOS: Adaptive In-Vehicle Intrusion Detection via Unsupervised Graph Contrastive Learning. 10419-10433 - Talha Ongun, Simona Boboila, Alina Oprea, Tina Eliassi-Rad, Jason Hiser, Jack W. Davidson:

CELEST: Federated Learning for Globally Coordinated Threat Detection. 10434-10448 - Tasneem Assaf, Mohammad Ahmad Al-Jarrah, Arafat Al-Dweik, Zhiguo Ding, Emad Alsusa, Anshul Pandey:

Two-Stage Jamming Detection and Channel Estimation for UAV-Based IoT Systems. 10449-10464 - Jieyi Deng, Congduan Li, Nanfeng Zhang, Jingfeng Yang, Jun Gao:

UDFed: A Universal Defense Scheme for Various Poisoning Attacks on Federated Learning. 10480-10494 - Yiqun Yue, Shaolin Tan, Ye Tao, Nian Liu, Jinhu Lü:

A Non-Markovian Game Approach on Labeled Attack Graphs for Security Decision-Making in Industrial Control Systems. 10511-10524 - Wenti Yang, Xuan Li, Meng Li, Zijian Zhang, Zhitao Guan, Liehuang Zhu:

VSecNN: Verifiable and Privacy-Preserving Neural Network Inference in Cloud Service. 10541-10555 - Jingwen Tan, Wei Zhao, Huanran Wang, Shuai Han, Mingzhu Lai, Wu Yang:

A Zero-Latency Website Identification for QUIC Traffic Based on Feature Alignment. 10556-10571 - Tianyu Lu, Liquan Chen, Junqing Zhang, Chen Chen, Trung Q. Duong, Michail Matthaiou:

Precoding Design for Key Generation in Extremely Large-Scale MIMO Near-Field Multi-User Systems. 10572-10587 - Luming Yang, Lin Liu, Junjie Huang, Jiangyong Shi, Shaojing Fu, Yongjun Wang, Jinshu Su:

Robustness Matters: Pre-Training Can Enhance the Performance of Encrypted Traffic Analysis. 10588-10603 - Hao Fu, Degang Sun, Jinxia Wei, Wei Wan, Chun Long:

Flow Microelement-Driven Traffic Relationship Analysis: Robust Detection of Malicious Encrypted Traffic. 10604-10619 - Ehsan Nekouei, Mohammad Pirani, Chuanghong Weng, Michaël Antonie van Wyk:

A Security Mechanism Against Inference Attacks on Networked Systems. 10465-10479 - Jiahui Wang, Hua Zhang, Yongji Wang, Haoran Gao, Qi Li, Huiyu Zhou:

F2Attack: Two-Factors Scoring Method for Query-Efficient Hard-Label Black-Box Textual Adversarial Attacks. 10495-10510 - Hongchao Jiang, Chen Dong, Haotai Liang, Xiaodong Xu, Yucheng Liu, Zhe Zheng, Ping Zhang:

Model-Hopping Semantic Communication System for a Reliable and Secure Transmission. 10525-10540 - Jiale Chen, Li Dong, Wei Wang, Rangding Wang, Weiwei Sun, Yushu Zhang, Jiantao Zhou:

Mixed-Bit Sampling Marking: Toward Unifying Document Authentication in Copy-Sensitive Graphical Codes. 10620-10635 - Wenjie Yu, Boyang Zhou:

Using Random Forests for Efficient Identification of Decoys Under Link Flooding Attacks in SDNs. 10636-10651

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














