样式: 排序: IF: - GO 导出 标记为已读
-
Towards Robust Adversarial Purification for Face Recognition under Intensity-Unknown Attacks IEEE Trans. Inform. Forensics Secur. (IF 6.3) Pub Date : 2024-10-03 Keyizhi Xu, Zhan Chen, Zhongyuan Wang, Chunxia Xiao, Chao Liang
-
A Proxy Attack-Free Strategy for Practically Improving the Poisoning Efficiency in Backdoor Attacks IEEE Trans. Inform. Forensics Secur. (IF 6.3) Pub Date : 2024-10-03 Ziqiang Li, Hong Sun, Pengfei Xia, Beihao Xia, Xue Rui, Wei Zhang, Qinglang Guo, Zhangjie Fu, Bin Li
-
rDefender: A Lightweight and Robust Defense Against Flow Table Overflow Attacks in SDN IEEE Trans. Inform. Forensics Secur. (IF 6.3) Pub Date : 2024-10-03 Dezhang Kong, Xiang Chen, Chunming Wu, Yi Shen, Zhengyan Zhou, Qiumei Cheng, Xuan Liu, Mingliang Yang, Yubing Qiu, Dong Zhang, Muhammad Khurram Khan
-
BatchAuth: A Physical Layer Batch Authentication Scheme for Multiple Backscatter Devices IEEE Trans. Inform. Forensics Secur. (IF 6.3) Pub Date : 2024-10-03 Yishan Yang, Jiajun Li, Niya Luo, Zheng Yan, Yifan Zhang, Kai Zeng
-
Voltran: Unlocking Trust and Confidentiality in Decentralized Federated Learning Aggregation IEEE Trans. Inform. Forensics Secur. (IF 6.3) Pub Date : 2024-10-02 Hao Wang, Yichen Cai, Jun Wang, Chuan Ma, Chunpeng Ge, Xiangmou Qu, Lu Zhou
-
Towards Personal Data Sharing Autonomy: A Task-driven Data Capsule Sharing System IEEE Trans. Inform. Forensics Secur. (IF 6.3) Pub Date : 2024-10-02 Qiuyun Lyu, Yilong Zhou, Yizhi Ren, Zheng Wang, Yunchuan Guo
-
Power Allocation and Decoding Order Selection for Secrecy Fairness in Downlink Cooperative NOMA with Untrusted Receivers under Imperfect SIC IEEE Trans. Inform. Forensics Secur. (IF 6.3) Pub Date : 2024-09-30 Insha Amin, Deepak Mishra, Ravikant Saini, Sonia Aïssa
-
Finding Incompatible Blocks for Reliable JPEG Steganalysis IEEE Trans. Inform. Forensics Secur. (IF 6.3) Pub Date : 2024-09-30 Etienne Levecque, Jan Butora, Patrick Bas
-
Cryptanalysis on “NTRU+: Compact Construction of NTRU Using Simple Encoding Method" IEEE Trans. Inform. Forensics Secur. (IF 6.3) Pub Date : 2024-09-30 Joohee Lee, Hansol Ryu, Minju Lee, Jaehui Park
-
Constructing An Intrinsically Robust Steganalyzer via Learning Neighboring Feature Relationships and Self-adversarial Adjustment IEEE Trans. Inform. Forensics Secur. (IF 6.3) Pub Date : 2024-09-30 Kaiqing Lin, Bin Li, Weixiang Li, Mauro Barni, Benedetta Tondi, Xulong Liu
-
iTieProbe: How Vulnerable Your IoT Provisioning via Wi-Fi AP mode or EZ Mode? IEEE Trans. Inform. Forensics Secur. (IF 6.3) Pub Date : 2024-09-30 Anand Agrawal, Rajib Ranjan Maiti
-
Analysis of Challenge-Response Authentication With Reconfigurable Intelligent Surfaces IEEE Trans. Inform. Forensics Secur. (IF 6.3) Pub Date : 2024-09-30 Stefano Tomasin, Tarek N. M. M. Elwakeel, Anna V. Guglielmi, Robin Maes, Nele Noels, Marc Moeneclaey
-
Federated Radio Frequency Fingerprint Identification Powered by Unsupervised Contrastive Learning IEEE Trans. Inform. Forensics Secur. (IF 6.3) Pub Date : 2024-09-27 Guanxiong Shen, Junqing Zhang, Xuyu Wang, Shiwen Mao
-
The Last Mile of Attack Investigation: Audit Log Analysis towards Software Vulnerability Location IEEE Trans. Inform. Forensics Secur. (IF 6.3) Pub Date : 2024-09-26 Changhua Chen, TingZhen Yan, ChenXuan Shi, Hao Xi, ZhiRui Fan, Hai Wan, Xibin Zhao
-
Sensitive Behavioral Chain-focused Android Malware Detection Fused with AST Semantics IEEE Trans. Inform. Forensics Secur. (IF 6.3) Pub Date : 2024-09-26 Jiacheng Gong, Weina Niu, Song Li, Mingxue Zhang, Xiaosong Zhang
-
Attention BLSTM-Based Temporal-Spatial Vein Transformer for Multi-View Finger-Vein Recognition IEEE Trans. Inform. Forensics Secur. (IF 6.3) Pub Date : 2024-09-26 Huafeng Qin, Zhipeng Xiong, Yantao Li, Mounim A. El-Yacoubi, Jun Wang
-
DOEPatch: Dynamically Optimized Ensemble Model for Adversarial Patches Generation IEEE Trans. Inform. Forensics Secur. (IF 6.3) Pub Date : 2024-09-26 Wenyi Tan, Yang Li, Chenxing Zhao, Zhunga Liu, Quan Pan
Object detection is a fundamental task in various applications ranging from autonomous driving to intelligent security systems. However, recognition of a person can be hindered when their clothing is decorated with carefully designed graffiti patterns, leading to the failure of object detection. To achieve greater attack potential against unknown black-box models, adversarial patches capable of affecting
-
Biometrics-Based Authenticated Key Exchange with Multi-Factor Fuzzy Extractor IEEE Trans. Inform. Forensics Secur. (IF 6.3) Pub Date : 2024-09-26 Hong Yen Tran, Jiankun Hu, Wen Hu
-
iCoding: Countermeasure against Interference and Eavesdropping in Wireless Communications IEEE Trans. Inform. Forensics Secur. (IF 6.3) Pub Date : 2024-09-26 Yicheng Liu, Zhao Li, Kang G. Shin, Zheng Yan, Jia Liu
-
Cost-effective hybrid control strategies for dynamical propaganda war game IEEE Trans. Inform. Forensics Secur. (IF 6.3) Pub Date : 2024-09-26 Xiaojuan Cheng, Lu-Xing Yang, Qingyi Zhu, Chenquan Gan, Xiaofan Yang, Gang Li
-
Cyber-AnDe: Cybersecurity Framework with Adaptive Distributed Sampling for Anomaly Detection on SDNs IEEE Trans. Inform. Forensics Secur. (IF 6.3) Pub Date : 2024-09-26 Nadia Niknami, Avinash Srinivasan, Jie Wu
-
Pairwise Physical Layer Secret Key Generation for FDD Systems IEEE Trans. Inform. Forensics Secur. (IF 6.3) Pub Date : 2024-09-25 Ehsan Olyaei Torshizi, Werner Henkel
-
LASERBEAK: Evolving Website Fingerprinting Attacks with Attention and Multi-Channel Feature Representation IEEE Trans. Inform. Forensics Secur. (IF 6.3) Pub Date : 2024-09-25 Nate Mathews, James K. Holland, Nicholas Hopper, Matthew Wright
-
Coupled-Space Attacks Against Random-Walk-based Anomaly Detection IEEE Trans. Inform. Forensics Secur. (IF 6.3) Pub Date : 2024-09-25 Yuni Lai, Marcin Waniek, Liying Li, Jingwen Wu, Yulin Zhu, Tomasz P. Michalak, Talal Rahwan, Kai Zhou
-
Privacy-Preserving Probabilistic Data Encoding for IoT Data Analysis IEEE Trans. Inform. Forensics Secur. (IF 6.3) Pub Date : 2024-09-25 Zakia Zaman, Wanli Xue, Praveen Gauravaram, Wen Hu, Jiaojiao Jiang, Sanjay Jha
-
Fingerprint Extraction through Distortion Reconstruction (FEDR): A CNN-based Approach to RF Fingerprinting IEEE Trans. Inform. Forensics Secur. (IF 6.3) Pub Date : 2024-09-24 Jose A. Gutierrez del Arroyo, Brett J. Borghetti, Michael A. Temple
-
Efficient and Privacy-Preserving Encode-Based Range Query Over Encrypted Cloud Data IEEE Trans. Inform. Forensics Secur. (IF 6.3) Pub Date : 2024-09-23 Yanrong Liang, Jianfeng Ma, Yinbin Miao, Yuan Su, Robert H. Deng
Privacy-preserving range query, which allows the server to implement secure and efficient range query on encrypted data, has been widely studied in recent years. Existing privacy-preserving range query schemes can realize effective range query, but usually suffer from the low efficiency and security. In order to solve the above issues, we propose an Efficient and Privacy-preserving encode-based Range
-
BASUV: A Blockchain-Enabled UAV Authentication Scheme for Internet of Vehicles IEEE Trans. Inform. Forensics Secur. (IF 6.3) Pub Date : 2024-09-23 Mingyue Xie, Zheng Chang, Hongwei Li, Geyong Min
Unmanned aerial vehicles (UAVs) have emerged as pivotal roles within internet of vehicles (IoV), serving as mobile base stations. However, while expanding coverage and improving mobility, the deployment of UAVs also poses a threat to the integrity and privacy of sensitive data due to open wireless communication channels in IoV. Therefore, preventing unauthorized access and data tampering is critically
-
Adversarial Perturbation Prediction for Real-Time Protection of Speech Privacy IEEE Trans. Inform. Forensics Secur. (IF 6.3) Pub Date : 2024-09-23 Zhaoyang Zhang, Shen Wang, Guopu Zhu, Dechen Zhan, Jiwu Huang
The widespread collection and analysis of private speech signals have become increasingly prevalent, raising significant privacy concerns. To protect speech signals from unauthorized analysis, adversarial attack methods for deceiving speaker recognition models have been proposed. While a few of these methods are specifically designed for real-time protection of speech signals, they introduce significant
-
IFAST: Weakly Supervised Interpretable Face Anti-Spoofing from Single-Shot Binocular NIR Images IEEE Trans. Inform. Forensics Secur. (IF 6.3) Pub Date : 2024-09-23 Jiancheng Huang, Donghao Zhou, Jianzhuang Liu, Linxiao Shi, Shifeng Chen
-
Exploiting Facial Relationships and Feature Aggregation for Multi-Face Forgery Detection IEEE Trans. Inform. Forensics Secur. (IF 6.3) Pub Date : 2024-09-23 Chenhao Lin, Fangbin Yi, Hang Wang, Jingyi Deng, Zhengyu Zhao, Qian Li, Chao Shen
The emergence of advanced Deepfake technologies has gradually raised concerns in society, prompting significant attention to Deepfake detection. However, in real-world scenarios, Deepfakes often involve multiple faces. Despite this, most existing detection methods still detect these faces individually, overlooking the informative correlation between them and the relationship between the global information
-
Neighbor Consistency and Global-Local Interaction: A Novel Pseudo-Label Refinement Approach for Unsupervised Person Re-Identification IEEE Trans. Inform. Forensics Secur. (IF 6.3) Pub Date : 2024-09-20 De Cheng, Haichun Tai, Nannan Wang, Chaowei Fang, Xinbo Gao
Unsupervised person re-identification (ReID) aims at learning discriminative identity features for person retrieval without any annotations. Recent advances accomplish this task by leveraging clustering-based pseudo labels, but these pseudo labels are inevitably noisy, which deteriorates model performance. In this paper, we propose a Neighbour Consistency guided Pseudo Label Refinement (NCPLR) framework
-
Boosting Adversarial Transferability via Logits Mixup With Dominant Decomposed Feature IEEE Trans. Inform. Forensics Secur. (IF 6.3) Pub Date : 2024-09-20 Juanjuan Weng, Zhiming Luo, Shaozi Li, Dazhen Lin, Zhun Zhong
Recent research has shown that adversarial samples are highly transferable and can be used to attack other unknown black-box Deep Neural Networks (DNNs). To improve the transferability of adversarial samples, several feature-based adversarial attack methods have been proposed to disrupt neuron activation in the middle layers. However, current state-of-the-art feature-based attack methods typically
-
Dangers Behind Charging VR Devices: Hidden Side Channel Attacks via Charging Cables IEEE Trans. Inform. Forensics Secur. (IF 6.3) Pub Date : 2024-09-20 Jiachun Li, Yan Meng, Yuxia Zhan, Le Zhang, Haojin Zhu
Virtual reality (VR), offering 3D visuals and stereophonic sounds, significantly enhances users’ immersive experiences and has become a milestone in the era of the metaverse. However, due to the limited battery capacity of VR devices, it is common for users to rely on charging cables, which serve the dual purpose of power supply and audio output, to recharge their VR devices while in use. In this study
-
Open Set Learning for RF-based Drone Recognition via Signal Semantics IEEE Trans. Inform. Forensics Secur. (IF 6.3) Pub Date : 2024-09-20 Ningning Yu, Jiajun Wu, Chengwei Zhou, Zhiguo Shi, Jiming Chen
-
Themis: Robust and Light-Client Dynamic Searchable Symmetric Encryption IEEE Trans. Inform. Forensics Secur. (IF 6.3) Pub Date : 2024-09-19 Yubo Zheng, Peng Xu, Miao Wang, Wanying Xu, Wei Wang, Tianyang Chen, Hai Jin
Dynamic searchable symmetric encryption (DSSE), as one of the promising cryptographic tools in cloud-based services, faces two crying needs at the age of multi-device. One is a lightweight client, and the other is robustness. A lightweight client facilitates seamless synchronization among multiple devices allowing users to feel as if they are operating on a single device, even on resource-constrained
-
A Wavelet-Based Memory Autoencoder for Noncontact Fingerprint Presentation Attack Detection IEEE Trans. Inform. Forensics Secur. (IF 6.3) Pub Date : 2024-09-19 Yi-Peng Liu, Hangtao Yu, Haonan Fang, Zhanqing Li, Peng Chen, Ronghua Liang
Fingerprint presentation attack detection (FPAD) is essential in fingerprint identification systems. Noncontact methods such as fingerprint biometrics are becoming popular because they are not affected by skin conditions and there are no hygiene issues. However, most of the existing noncontact FPAD methods are supervised methods with poor generalizability and poor performance during events such as
-
Minimizing Malware Propagation in Internet of Things Networks: An Optimal Control Using Feedback Loop Approach IEEE Trans. Inform. Forensics Secur. (IF 6.3) Pub Date : 2024-09-19 Mousa Tayseer Jafar, Lu-Xing Yang, Gang Li, Qingyi Zhu, Chenquan Gan
-
LiDiNet: A Lightweight Deep Invertible Network for Image-in-Image Steganography IEEE Trans. Inform. Forensics Secur. (IF 6.3) Pub Date : 2024-09-18 Fengyong Li, Yang Sheng, Kui Wu, Chuan Qin, Xinpeng Zhang
This paper introduces a novel, lightweight deep invertible steganography network (LiDiNet) for image-in-image steganography. Traditional methods, while hiding a secret image within a cover image, often suffer from contour shadows or color distortion, making the secret image easily detectable. Additionally, the superposition of multiple invertible networks may complicate network structures and introduce
-
Who Stole My NFT? Investigating Web3 NFT Phishing Scams on Ethereum IEEE Trans. Inform. Forensics Secur. (IF 6.3) Pub Date : 2024-09-18 Jingjing Yang, Jieli Liu, Dan Lin, Jiajing Wu, Baoying Huang, Quanzhong Li, Zibin Zheng
-
FS-LLRS: Lattice-Based Linkable Ring Signature With Forward Security for Cloud-Assisted Electronic Medical Records IEEE Trans. Inform. Forensics Secur. (IF 6.3) Pub Date : 2024-09-18 Xue Chen, Shiyuan Xu, Shang Gao, Yu Guo, Siu-Ming Yiu, Bin Xiao
Ring signatures have been extensively researched for Cloud-assisted Electronic Medical Records (EMRs) sharing, aiming to address the challenge of “medical information silos” while safeguarding the privacy of patients’ personal information and the security of EMRs. However, most existing EMRs sharing systems that utilize ring signatures are vulnerable to quantum attacks, posing a severe challenge for
-
Privacy-Preserving Federated Learning With Improved Personalization and Poison Rectification of Client Models IEEE Trans. Inform. Forensics Secur. (IF 6.3) Pub Date : 2024-09-18 Yihao Cao, Jianbiao Zhang, Yaru Zhao, Hong Shen, Haoxiang Huang
Federated Learning (FL), a secure and emerging distributed learning paradigm, has garnered significant interest in the Internet of Things (IoT) domain. However, it remains vulnerable to adversaries who may compromise privacy and integrity. Previous studies on privacy-preserving FL (PPFL) have demonstrated limitations in client model personalization and resistance to poisoning attacks, including Byzantine
-
Reinventing Multi-User Authentication Security from Cross-Chain Perspective IEEE Trans. Inform. Forensics Secur. (IF 6.3) Pub Date : 2024-09-18 Yongyang Lv, Ruitao Feng, Maode Ma, Manqing Zhu, Hanwei Wu, Xiaohong Li
-
DynPen: Automated Penetration Testing in Dynamic Network Scenarios Using Deep Reinforcement Learning IEEE Trans. Inform. Forensics Secur. (IF 6.3) Pub Date : 2024-09-16 Qianyu Li, Ruipeng Wang, Dong Li, Fan Shi, Min Zhang, Anupam Chattopadhyay, Yi Shen, Yang Li
Penetration testing, a crucial industrial practice for securing networked systems and infrastructures, has traditionally depended on the extensive expertise of human professionals. Addressing the scarcity of human experts, the development of automated penetration testing tools emerges as a promising avenue. Against the backdrop of rapid advancements in artificial intelligence technologies, reinforcement
-
HeVulD: A Static Vulnerability Detection Method Using Heterogeneous Graph Code Representation IEEE Trans. Inform. Forensics Secur. (IF 6.3) Pub Date : 2024-09-16 Yuanming Huang, Mingshu He, Xiaojuan Wang, Jie Zhang
Vulnerability detection in source code has been a focal point of research in recent years. Traditional rule-based methods fail to identify complex and unknown vulnerabilities, leading to poor performance. While deep learning (DL)-based methods have improved these shortcomings, there is still room for enhancement. For C/C++ source code, effective vulnerability detection requires considering both the
-
MODEL: A Model Poisoning Defense Framework for Federated Learning via Truth Discovery IEEE Trans. Inform. Forensics Secur. (IF 6.3) Pub Date : 2024-09-16 Minzhe Wu, Bowen Zhao, Yang Xiao, Congjian Deng, Yuan Liu, Ximeng Liu
Federated learning (FL) is an emerging paradigm for privacy-preserving machine learning, in which multiple clients collaborate to generate a global model through training individual models with local data. However, FL is vulnerable to model poisoning attacks (MPAs) as malicious clients are able to destroy the global model by modifying local models. Although numerous model poisoning defense methods
-
Updatable Private Set Intersection With Forward Privacy IEEE Trans. Inform. Forensics Secur. (IF 6.3) Pub Date : 2024-09-16 Ruochen Wang, Jun Zhou, Zhenfu Cao, Xiaolei Dong, Kim-Kwang Raymond Choo
Private set intersection (PSI) facilitates the computation of intersection between the private sets of two parties, ensuring that no additional information beyond the intersection itself is revealed. However, most state-of-the-art are limited to static PSI, leaving updatable PSI untouched. Existing PSI protocols will cost huge computational resources to compute intersection on updated sets. More seriously
-
GenFace: A Large-Scale Fine-Grained Face Forgery Benchmark and Cross Appearance-Edge Learning IEEE Trans. Inform. Forensics Secur. (IF 6.3) Pub Date : 2024-09-16 Yaning Zhang, Zitong Yu, Tianyi Wang, Xiaobin Huang, Linlin Shen, Zan Gao, Jianfeng Ren
The rapid advancement of photorealistic generators has reached a critical juncture where the discrepancy between authentic and manipulated images is increasingly indistinguishable. Thus, benchmarking and advancing techniques detecting digital manipulation become an urgent issue. Although there have been a number of publicly available face forgery datasets, the forgery faces are mostly generated using
-
A Dual-Level Cancelable Framework for Palmprint Verification and Hack-Proof Data Storage IEEE Trans. Inform. Forensics Secur. (IF 6.3) Pub Date : 2024-09-16 Ziyuan Yang, Ming Kang, Andrew Beng Jin Teoh, Chengrui Gao, Wen Chen, Bob Zhang, Yi Zhang
In recent years, palmprints have been extensively utilized for individual verification. The abundance of sensitive information in palmprint data necessitates robust protection to ensure security and privacy without compromising system performance. Existing systems frequently use cancelable transformations to protect palmprint templates. However, if an adversary gains access to the stored database,
-
A Novel PHY-Layer Spoofing Attack Detection Scheme Based on WGAN-Encoder Model IEEE Trans. Inform. Forensics Secur. (IF 6.3) Pub Date : 2024-09-13 Wei Xie, Hongjun Wang, Zimo Feng, Chunlai Ma
PHY-layer spoofing attack is a potential critical issue in wireless network communication security, which could lead to catastrophic consequences for critical mission and applications, especially in Industrial Internet of Things scenarios with enormous number of devices. In this paper, we propose a novel spoofing attack detection scheme exploiting Channel State Information (CSI) phase difference. Firstly
-
Scalable Universal Adversarial Watermark Defending Against Facial Forgery IEEE Trans. Inform. Forensics Secur. (IF 6.3) Pub Date : 2024-09-13 Tong Qiao, Bin Zhao, Ran Shi, Meng Han, Mahmoud Hassaballah, Florent Retraint, Xiangyang Luo
The illegal use of facial forgery models, such as Generative Adversarial Networks (GAN) synthesized contents, has been on the rise, thereby posing great threats to personal reputation and national security. To mitigate these threats, recent studies have proposed the use of adversarial watermarks as countermeasures against GAN, effectively disrupting their outputs. However, the majority of these adversarial
-
What Is Now Possible? Security Evaluation on Univariate DPA Attacks With Inaccurate Leakage Models IEEE Trans. Inform. Forensics Secur. (IF 6.3) Pub Date : 2024-09-12 Jiangshan Long, Changhai Ou, Chenxu Wang, Zhu Wang, Yongbin Zhou
Success Rate (SR) is one of the most popular side-channel security metrics measuring the efficiency of key recovery. Theoretical expression of success rate reveals the functional dependency between relevant parameters such as number of measurements and Signal-to-Noise Ratio (SNR), helping researchers understand the resistance of a given implementation rapidly. However so far, existing works have exposed
-
A Video Visual Security Metric Based on Spatiotemporal Self-Attention IEEE Trans. Inform. Forensics Secur. (IF 6.3) Pub Date : 2024-09-12 Bo Tang, Fengdong Li, Jianbo Liu, Cheng Yang
-
Accountable Secret Committee Election and Anonymous Sharding Blockchain Consensus IEEE Trans. Inform. Forensics Secur. (IF 6.3) Pub Date : 2024-09-12 Mingzhe Zhai, Yizhong Liu, Qianhong Wu, Bo Qin, Haibin Zheng, Xiaopeng Dai, Zhenyang Ding, Willy Susilo
-
Fusion Graph Structure Learning-Based Multivariate Time Series Anomaly Detection With Structured Prior Knowledge IEEE Trans. Inform. Forensics Secur. (IF 6.3) Pub Date : 2024-09-12 Shiming He, Genxin Li, Kun Xie, Pradip Kumar Sharma
Multivariate time series anomaly detection (MTSAD) plays a crucial role in the Internet of Things (IoT) to identify device malfunction or system attacks. Graph neural networks (GNN) are widely applied in MTSAD to capture the spatial features among sensors. However, GNNs depend on a graph structure and explicit graph structures are not always available. To solve the problem of missing explicit graph
-
DWare: Cost-Efficient Decentralized Storage With Adaptive Middleware IEEE Trans. Inform. Forensics Secur. (IF 6.3) Pub Date : 2024-09-12 Yuefeng Du, Anxin Zhou, Cong Wang
Distributed Outsourced Storage systems, exemplified by the InterPlanetary File System (IPFS), offer compelling alternatives to traditional centralized cloud storage by emphasizing resilience and openness. Advancing this paradigm, Decentralized Storage (DS) markets leverage distributed ledgers to facilitate the monetization of outsourced storage. However, these markets often prioritize security over
-
Identity-Based Encryption With Disjunctive, Conjunctive and Range Keyword Search From Lattices IEEE Trans. Inform. Forensics Secur. (IF 6.3) Pub Date : 2024-09-12 Zesheng Lin, Hongbo Li, Xinjian Chen, Meiyan Xiao, Qiong Huang
To reduce data storage costs, more individuals are using cloud servers for reliable, scalable, cost-effective, and globally accessible solutions. However, storing data in plaintext on cloud servers can lead to data leakage risks. Moreover, the advancement of quantum computing poses a threat to traditional encryption algorithms. To counter quantum computing attacks and enable searches over encrypted
-
Indelible “Footprints” of Inaudible Command Injection IEEE Trans. Inform. Forensics Secur. (IF 6.3) Pub Date : 2024-09-12 Zhongjie Ba, Bin Gong, Yuwei Wang, Yuxuan Liu, Peng Cheng, Feng Lin, Li Lu, Kui Ren
Inaudible command injection transmits inaudible ultrasounds to inject adversarial speech commands into a voice assistant, therefore manipulating voice control systems (e.g., a garage door or a security camera) for illegitimate purposes. Although the attack is inaudible, we find it does leave visible “footprints”. Such attack “footprints” are the side product due to the interaction between the attack
-
A Case-Control Study to Measure Behavioral Risks of Malware Encounters in Organizations IEEE Trans. Inform. Forensics Secur. (IF 6.3) Pub Date : 2024-09-10 Marcello Meschini, Giorgio Di Tizio, Marco Balduzzi, Fabio Massacci
-
An Efficient and Verifiable Encrypted Data Filtering Framework Over Large-Scale Storage in Cloud Edge IEEE Trans. Inform. Forensics Secur. (IF 6.3) Pub Date : 2024-09-09 Qinlong Huang, Chao Wang, Boyu Lu
The rapid growth of edge computing is accelerating data subscriptions between cloud platforms and mobile subscribers, but sensitive information in these data faces security and privacy concerns. Fortunately, matchmaking attribute-based encryption (MABE) as a new type of encrypted data filtering mechanism has been introduced in cloud edge, which not only enforces fine-grained access control over the