Intrusion Detection Scheme With Dimensionality Reduction in Next Generation Networks Nash Equilibrium Control Policy Against Bus-off Attacks in CAN Networks Label-Only Model Inversion Attacks: Attack With the Least Information An Efficient Two-Party Cryptographic Framework for Vertical Decision Trees SGBoost: An Efficient and Privacy-Preserving Vertical Federated Tree Boosting Framework Comment on " Secure and Lightweight Conditional Privacy-Preserving Authentication for Securing Traffic Emergency Messages in VANETs " FTrans: High-Frequency Fine-Grained Transformer for Face Forgery Detection ePoSt: Practical and Client-Friendly Proof of Storage-Time Shrinking the Semantic Gap: Spatial Pooling of Local Moment Invariants for Copy-Move Forgery Detection HMACCE: Establishing Authenticated and Confidential Channel From Historical Data for Industrial Internet of Things EDICS Information for Authors 965-979 980-990 991-1005 1006-1021 1022-1036 1037-1038 1039-1051 1052-1063 1064-1079 1080-1094 www.signalprocessingsociety.org [19] FEBRUARY 2023https://dx.doi.org/10.1109/TIFS.2022.3233777 https://dx.doi.org/10.1109/TIFS.2022.3233186 https://dx.doi.org/10.1109/TIFS.2022.3233190 https://dx.doi.org/10.1109/TIFS.2022.3231784 https://dx.doi.org/10.1109/TIFS.2022.3232955 https://dx.doi.org/10.1109/TIFS.2021.3066277 https://dx.doi.org/10.1109/TIFS.2021.3066277 https://dx.doi.org/10.1109/TIFS.2022.3233774 https://dx.doi.org/10.1109/TIFS.2022.3233780 https://dx.doi.org/10.1109/TIFS.2023.3234861 https://dx.doi.org/10.1109/TIFS.2023.3234861 https://dx.doi.org/10.1109/TIFS.2023.3234873 https://dx.doi.org/10.1109/TIFS.2023.3234873 https://signalprocessingsociety.org/publications-resources/ieee-transactions-information-forensics-and-security/edics https://signalprocessingsociety.org/publications-resources/information-authors http://www.signalprocessingsociety.org