Skip to main content

IEEE TIFS Article

On the Efficient Design of Stacked Intelligent Metasurfaces for Secure SISO Transmission

Recently, stacked intelligent metasurfaces (SIMs) have aroused widespread discussions as an innovative technology for directly processing electromagnetic (EM) wave signals. By stacking multiple programmable metasurface layers, an SIM has the ability to provide additional spatial degrees of freedom without the introduction of expensive radio-frequency chains, which may outperform reconfigurable intelligent surfaces (RISs) with single-layer structures. 

Read more

DEFending Integrated Circuit Layouts

Modern integrated circuits (ICs) require a complex, outsourced supply-chain, involving computer-aided design (CAD) tools, expert knowledge, and advanced foundries. This complexity has led to various security threats, such as Trojans inserted by adversaries during outsourcing, but also run-time threats like physical probing. Our proposed design-time solution, DEFense , is an extensible CAD framework for holistic assessment and proactive mitigation of multiple prominent threats.

Read more

Communication Efficient Ciphertext-Field Aggregation in Wireless Networks via Over-the-Air Computation

Aggregating metadata in the ciphertext field is an attractive property brought by homomorphic encryption (HE) for privacy-sensitive computing tasks, therefore, research on the next-generation wireless networks has treated it as one of the promising cryptographic techniques for various scenarios. However, existing schemes are far from being deployed in various computing scenarios due to their high computational complexity and ciphertext expansion, especially for bandwidth-limited and latency-sensitive wireless scenarios.

Read more

LD-PA: Distilling Univariate Leakage for Deep Learning-Based Profiling Attacks

The deep learning-based profiling attacks have received significant attention for their potential against masking-protected devices. Currently, additional capabilities like exploiting only a segment of the side-channel traces or having knowledge of the specific countermeasure scheme have been granted to attackers during the profiling phase. In case either capability is removed, a practical profiling attack faces great difficulty and complexity. 

Read more

BG: A Modular Treatment of BFT Consensus Toward a Unified Theory of BFT Replication

We provide an expressive framework that allows analyzing and generating provably secure, state-of-the-art Byzantine fault-tolerant (BFT) protocols over graph of nodes, a notion formalized in the HotStuff protocol. Our framework is hierarchical, including three layers. The top layer is used to model the message pattern and abstract core functions on which BFT algorithms can be built. 

Read more

WF-Transformer: Learning Temporal Features for Accurate Anonymous Traffic Identification by Using Transformer Networks

Website Fingerprinting (WF) is a network traffic mining technique for anonymous traffic identification, which enables a local adversary to identify the target website that an anonymous network user is browsing. WF attacks based on deep convolutional neural networks (CNN) get the state-of-the-art anonymous traffic classification performance. However, due to the locality restriction of CNN architecture for feature extraction on sequence data, these methods ignore the temporal feature extraction in the anonymous traffic analysis.

Read more

Steganography Embedding Cost Learning With Generative Multi-Adversarial Network

Since the generative adversarial network (GAN) was proposed by Ian Goodfellow et al. in 2014, it has been widely used in various fields. However, there are only a few works related to image steganography so far. Existing GAN-based steganographic methods mainly focus on the design of generator, and just assign a relatively poorer steganalyzer in discriminator, which inevitably limits the performances of their models.

Read more

Gait Attribute Recognition: A New Benchmark for Learning Richer Attributes From Human Gait Patterns

Compared to gait recognition, Gait Attribute Recognition (GAR) is a seldom-investigated problem. However, since gait attribute recognition can provide richer and finer semantic descriptions, it is an indispensable part of building intelligent gait analysis systems. Nonetheless, the types of attributes considered in the existing datasets are very limited.

Read more

EEFED: Personalized Federated Learning of Execution&Evaluation Dual Network for CPS Intrusion Detection

In the modern interconnected world, intelligent networks and computing technologies are increasingly being incorporated in industrial systems. However, this adoption of advanced technology has resulted in increased cyber threats to cyber-physical systems. Existing intrusion detection systems are continually challenged by constantly evolving cyber threats. Machine learning algorithms have been applied for intrusion detection. In these techniques, a classification model is trained by learning cyber behavior patterns.

Read more