Export Citations
Save this search
Please login to be able to save your searches and receive alerts for new content matching your search criteria.
- research-articleJanuary 2024
Quantization Aware Attack: Enhancing Transferable Adversarial Attacks by Model Quantization
- Yulong Yang,
- Chenhao Lin,
- Qian Li,
- Zhengyu Zhao,
- Haoran Fan,
- Dawei Zhou,
- Nannan Wang,
- Tongliang Liu,
- Chao Shen
IEEE Transactions on Information Forensics and Security (TIFS), Volume 192024, pp 3265–3278https://doi.org/10.1109/TIFS.2024.3360891Quantized neural networks (QNNs) have received increasing attention in resource-constrained scenarios due to their exceptional generalizability. However, their robustness against realistic black-box adversarial attacks has not been extensively studied. In ...
- research-articleJanuary 2024
Secure Dual Asynchronous Tracking Control for Markov Jump Systems Under Hybrid Cyberattacks
IEEE Transactions on Information Forensics and Security (TIFS), Volume 192024, pp 3226–3236https://doi.org/10.1109/TIFS.2024.3359459In this paper, the secure dual asynchronous tracking control problem is studied for Markov jump systems (MJSs) under hybrid cyberattacks via memory-based event-triggered mechanisms (ETMs). For the first time, both the tracking system (TS) and the ...
- research-articleJanuary 2024
Perception-Driven Imperceptible Adversarial Attack Against Decision-Based Black-Box Models
IEEE Transactions on Information Forensics and Security (TIFS), Volume 192024, pp 3164–3177https://doi.org/10.1109/TIFS.2024.3359441Adversarial examples (AEs) pose significant threats to deep neural networks (DNNs), as they can deceive models into making wrong predictions through craftily-designed perturbations. The emergence of decision-based attacks, which rely solely on the top-1 ...
- research-articleJanuary 2024
Proof of Unlearning: Definitions and Instantiation
IEEE Transactions on Information Forensics and Security (TIFS), Volume 192024, pp 3309–3323https://doi.org/10.1109/TIFS.2024.3358993The “Right to be Forgotten” rule in machine learning (ML) practice enables some individual data to be deleted from a trained model, as pursued by recently developed machine unlearning techniques. To truly comply with the rule, a natural and ...
- research-articleJanuary 2024
Multiple Access Wiretap Channel With Partial Rate-Limited Feedback
IEEE Transactions on Information Forensics and Security (TIFS), Volume 192024, pp 3279–3294https://doi.org/10.1109/TIFS.2024.3359071This paper investigates the problem of secure transmission over a two-user discrete memoryless multiple-access wiretap channel with partial rate-limited feedback (MAC-WT-PLF). The receiver can causally and securely transmit feedback to one of the ...
-
- research-articleJanuary 2024
Polar Coding for Wiretap Channels With Random States Non-Causally Available at the Encoder
IEEE Transactions on Information Forensics and Security (TIFS), Volume 192024, pp 3324–3338https://doi.org/10.1109/TIFS.2024.3358992Channel state information (CSI) is differently available at each terminal in state-dependent wiretap channels (SD-WTCs). Considering a random channel state non-causally available only at the encoder, this paper investigates an explicit polar coding scheme ...
- research-articleJanuary 2024
CHERUBIM: A Secure and Highly Parallel Cross-Shard Consensus Using Quadruple Pipelined Two-Phase Commit for Sharding Blockchains
IEEE Transactions on Information Forensics and Security (TIFS), Volume 192024, pp 3178–3193https://doi.org/10.1109/TIFS.2024.3358990Due to the promising scalability property, sharding technology has gained widespread attention. It improves the transaction throughput of blockchain systems but also introduces cross-shard transactions. Current two-phase commit (2PC) protocols process ...
- research-articleJanuary 2024
Toward Secure and Verifiable Hybrid Federated Learning
IEEE Transactions on Information Forensics and Security (TIFS), Volume 192024, pp 2935–2950https://doi.org/10.1109/TIFS.2024.3357288Reducing computation cost and ensuring update integrity, are key challenges in federated learning (FL). In this paper, we present a secure and verifiable hybrid FL system for training, namely SVHFL. SVHFL enables training models on both plaintext and ...
- research-articleJanuary 2024
MC-Net: Realistic Sample Generation for Black-Box Attacks
IEEE Transactions on Information Forensics and Security (TIFS), Volume 192024, pp 3008–3022https://doi.org/10.1109/TIFS.2024.3356812One area of current research on adversarial attacks is how to generate plausible adversarial examples when only a small number of datasets are available. Current adversarial attack algorithms used to attack these black-box systems face a number of ...
- research-articleJanuary 2024
RIS-Assisted UAV Secure Communications With Artificial Noise-Aware Trajectory Design Against Multiple Colluding Curious Users
IEEE Transactions on Information Forensics and Security (TIFS), Volume 192024, pp 3064–3076https://doi.org/10.1109/TIFS.2024.3356166In this paper, we propose a secure unmanned aerial vehicle (UAV) communication system with the assistance of a reconfigurable intelligent surface (RIS), where the design of the UAV trajectory and artificial noise are incorporated to prevent eavesdropping ...
- research-articleJanuary 2024
m-Eligibility With Minimum Counterfeits and Deletions for Privacy Protection in Continuous Data Publishing
IEEE Transactions on Information Forensics and Security (TIFS), Volume 192024, pp 2854–2864https://doi.org/10.1109/TIFS.2024.3354557Continuous data publishing consists in the republication of updating microdata. The most relevant syntactic notions in continuous data publishing are based on m-invariance. This notion enforces that no user can be distinguished among, at least, <inline-...
- research-articleJanuary 2024
Beyond Result Verification: Efficient Privacy-Preserving Spatial Keyword Query With Suppressed Leakage
IEEE Transactions on Information Forensics and Security (TIFS), Volume 192024, pp 2746–2760https://doi.org/10.1109/TIFS.2024.3354414Boolean range query (BRQ) is a typical type of spatial keyword query that is widely used in geographic information systems, location-based services and other applications. It retrieves the objects inside the query range and containing all query keywords. ...
- research-articleJanuary 2024
Approaching the Information-Theoretic Limit of Privacy Disclosure With Utility Guarantees
IEEE Transactions on Information Forensics and Security (TIFS), Volume 192024, pp 3339–3352https://doi.org/10.1109/TIFS.2024.3354412The possibility for public attributes to disclose private information has caused widespread concern. Traditional privacy-preserving approaches have two limitations: 1) Approaches based on data anonymization or distortion often lead to poor utility-privacy ...
- research-articleJanuary 2024
Secure Adaptive Group Testing
IEEE Transactions on Information Forensics and Security (TIFS), Volume 192024, pp 2786–2799https://doi.org/10.1109/TIFS.2024.3354188Group Testing (GT) addresses the problem of identifying a small subset of defective items from a large population, by grouping items into as few test pools as possible. In Adaptive GT (AGT), outcomes of previous tests can influence the makeup of future ...
- research-articleJanuary 2024
Quantum-Safe Puncturable Signatures With Their Application in Blockchain
IEEE Transactions on Information Forensics and Security (TIFS), Volume 192024, pp 2761–2770https://doi.org/10.1109/TIFS.2024.3353074Energy-efficient proof-of-stake (PoS) consensus protocols in blockchain have gained much attention from academia and industry recently. Despite their potential advantages, PoS protocols have not been extensively deployed in the existing digital currency ...
- research-articleJanuary 2024
NEMO: Practical Distributed Boolean Queries With Minimal Leakage
IEEE Transactions on Information Forensics and Security (TIFS), Volume 192024, pp 2594–2608https://doi.org/10.1109/TIFS.2024.3351433Searchable symmetric encryption (SSE) schemes allow a client to store encrypted data with a storage provider and retrieve corresponding documents without revealing the content or search keywords to the provider. However, achieving efficient SSE schemes ...
- research-articleJanuary 2024
FastTextDodger: Decision-Based Adversarial Attack Against Black-Box NLP Models With Extremely High Efficiency
IEEE Transactions on Information Forensics and Security (TIFS), Volume 192024, pp 2398–2411https://doi.org/10.1109/TIFS.2024.3350376Recently, achieving query-efficient adversarial example attacks targeting black-box natural language models has attracted widespread attention from researchers. This task is considered difficult due to the discrete nature of texts, limited knowledge of ...
- research-articleJanuary 2024
Congruent Differential Cluster for Binary SPN Ciphers
IEEE Transactions on Information Forensics and Security (TIFS), Volume 192024, pp 2385–2397https://doi.org/10.1109/TIFS.2024.3350374This study is focused on the differential clustering effect of the SPN block cipher, which employs a binary matrix as its diffusion layer. We present a novel strategy for differential estimation, named the congruent differential cluster. This method does ...
- research-articleJanuary 2024
Dynamic Searchable Symmetric Encryption With Strong Security and Robustness
IEEE Transactions on Information Forensics and Security (TIFS), Volume 192024, pp 2370–2384https://doi.org/10.1109/TIFS.2024.3350330Dynamic Searchable Symmetric Encryption (DSSE) is a prospective technique in the field of cloud storage for secure search over encrypted data. A DSSE client can issue <monospace>update</monospace> queries to an honest-but-curious server for adding or ...
- research-articleJanuary 2024
Efficient Sparse Least Absolute Deviation Regression With Differential Privacy
IEEE Transactions on Information Forensics and Security (TIFS), Volume 192024, pp 2328–2339https://doi.org/10.1109/TIFS.2023.3349054In recent years, privacy-preserving machine learning algorithms have attracted increasing attention because of their important applications in many scientific fields. However, in the literature, most privacy-preserving algorithms demand learning ...