Pub Date : 2026-04-13DOI: 10.1109/tifs.2026.3683292
Meiwen Ding, Song Xia, Yi Yu, Shuting He, Xudong Jiang
{"title":"Transferable Adversarial Attack on Referring Video Object Segmentation","authors":"Meiwen Ding, Song Xia, Yi Yu, Shuting He, Xudong Jiang","doi":"10.1109/tifs.2026.3683292","DOIUrl":"https://doi.org/10.1109/tifs.2026.3683292","url":null,"abstract":"","PeriodicalId":13492,"journal":{"name":"IEEE Transactions on Information Forensics and Security","volume":"8 1","pages":""},"PeriodicalIF":6.8,"publicationDate":"2026-04-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"147684437","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":1,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2026-04-13DOI: 10.1109/tifs.2026.3683528
Mehr un Nisa, Adnan Noor Mian, Mubashir Husain Rehmani
{"title":"LitCVit: A Lightweight Self-Supervised Contrastive Vision Transformer for Encrypted Malicious Traffic Detection","authors":"Mehr un Nisa, Adnan Noor Mian, Mubashir Husain Rehmani","doi":"10.1109/tifs.2026.3683528","DOIUrl":"https://doi.org/10.1109/tifs.2026.3683528","url":null,"abstract":"","PeriodicalId":13492,"journal":{"name":"IEEE Transactions on Information Forensics and Security","volume":"196 1","pages":""},"PeriodicalIF":6.8,"publicationDate":"2026-04-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"147684443","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":1,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2026-04-13DOI: 10.1109/tifs.2026.3683276
Jiawei Zhang, Hao Wang, Hao Wu, Bin Li, Xiangyang Luo, Bin Ma, Jinwei Wang
{"title":"HENet: A Heterogeneous Encoding Network for General and Robust Adversarial Example Generation","authors":"Jiawei Zhang, Hao Wang, Hao Wu, Bin Li, Xiangyang Luo, Bin Ma, Jinwei Wang","doi":"10.1109/tifs.2026.3683276","DOIUrl":"https://doi.org/10.1109/tifs.2026.3683276","url":null,"abstract":"","PeriodicalId":13492,"journal":{"name":"IEEE Transactions on Information Forensics and Security","volume":"44 1","pages":""},"PeriodicalIF":6.8,"publicationDate":"2026-04-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"147684446","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":1,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2026-04-13DOI: 10.1109/tifs.2026.3683279
Shide Zhou, Kailong Wang, Ling Shi, Haoyu Wang
{"title":"Exposing the Ghost in the Transformer: Abnormal Detection for Large Language Models via Hidden State Forensics","authors":"Shide Zhou, Kailong Wang, Ling Shi, Haoyu Wang","doi":"10.1109/tifs.2026.3683279","DOIUrl":"https://doi.org/10.1109/tifs.2026.3683279","url":null,"abstract":"","PeriodicalId":13492,"journal":{"name":"IEEE Transactions on Information Forensics and Security","volume":"2 1","pages":""},"PeriodicalIF":6.8,"publicationDate":"2026-04-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"147684532","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":1,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"TFMD: General and Fast Secure Neural Network Inference Framework with Threshold FHE","authors":"Yu Fu, Yu Tong, Yijing Ning, Jingqiang Lin, Dengguo Feng","doi":"10.1109/tifs.2026.3683269","DOIUrl":"https://doi.org/10.1109/tifs.2026.3683269","url":null,"abstract":"","PeriodicalId":13492,"journal":{"name":"IEEE Transactions on Information Forensics and Security","volume":"133 1","pages":""},"PeriodicalIF":6.8,"publicationDate":"2026-04-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"147684447","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":1,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2026-04-09DOI: 10.1109/tifs.2026.3682606
Yingjie Lyu, Zengpeng Li, Hong-Sheng Zhou, Haiyang Xue, Mei Wang, Shuchao Wang, Mengling Liu
{"title":"Bandwidth-Efficient Robust Threshold ECDSA in Three Rounds","authors":"Yingjie Lyu, Zengpeng Li, Hong-Sheng Zhou, Haiyang Xue, Mei Wang, Shuchao Wang, Mengling Liu","doi":"10.1109/tifs.2026.3682606","DOIUrl":"https://doi.org/10.1109/tifs.2026.3682606","url":null,"abstract":"","PeriodicalId":13492,"journal":{"name":"IEEE Transactions on Information Forensics and Security","volume":"131 1","pages":""},"PeriodicalIF":6.8,"publicationDate":"2026-04-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"147664407","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":1,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"CShard: Blockchain Sharding via Repairable Fountain Codes and the Paradigm for Sharding Design","authors":"Sheng Cao, Yifan Tian, Junjie Peng, Butian Huang, Xiaosong Zhang","doi":"10.1109/tifs.2026.3679943","DOIUrl":"https://doi.org/10.1109/tifs.2026.3679943","url":null,"abstract":"","PeriodicalId":13492,"journal":{"name":"IEEE Transactions on Information Forensics and Security","volume":"23 1","pages":""},"PeriodicalIF":6.8,"publicationDate":"2026-04-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"147599092","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":1,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"AtomXross: Towards General Cross-Chain Transaction","authors":"Yanran Zhang, Yifu Geng, Qin Wang, Bo Qin, Qianhong Wu, Wei Huang, Wenchang Shi, Willy Susilo","doi":"10.1109/tifs.2026.3680056","DOIUrl":"https://doi.org/10.1109/tifs.2026.3680056","url":null,"abstract":"","PeriodicalId":13492,"journal":{"name":"IEEE Transactions on Information Forensics and Security","volume":"5 1","pages":""},"PeriodicalIF":6.8,"publicationDate":"2026-04-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"147599094","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":1,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Differentially Private Zeroth-Order Methods for Scalable Large Language Model Fine-tuning","authors":"Zhihao Liu, Jian Lou, Wenjie Bao, Yuke Hu, Wenli Wang, Zhan Qin, Kui Ren","doi":"10.1109/tifs.2026.3679194","DOIUrl":"https://doi.org/10.1109/tifs.2026.3679194","url":null,"abstract":"","PeriodicalId":13492,"journal":{"name":"IEEE Transactions on Information Forensics and Security","volume":"31 1","pages":""},"PeriodicalIF":6.8,"publicationDate":"2026-03-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"147577843","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":1,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}