IEEE Transactions on Information Forensics and Security

Papers
(The H4-Index of IEEE Transactions on Information Forensics and Security is 61. The table below lists those papers that are above that threshold based on CrossRef citation counts [max. 250 papers]. The publications cover those that have been published in the past four years, i.e., from 2021-11-01 to 2025-11-01.)
ArticleCitations
Beyond Access Pattern: Efficient Volume-Hiding Multi-Range Queries Over Outsourced Data Services253
Attention-SA: Exploiting Model-Approximated Data Semantics for Adversarial Attack216
CR-DAP: A Comprehensive and Regulatory Decentralized Anonymous Payment System212
A Note on “Secure and Efficient Outsourcing of PCA-Based Face Recognition”179
A Decentralized Threshold Credential Management With Fine-Grained Authentication for VANETs134
High Resolution Fingerprint Retrieval Based on Pore Indexing and Graph Comparison124
Learnable Prompts With Neighbor-Aware Correction for Text-Based Person Search113
On Message Authentication Channel Capacity Over a Wiretap Channel113
PCSR: Enabling Cross-Modal Semantic Retrieval With Privacy Preservation112
Enhancing Federated Learning with Differentially Private Continuous Data Release via k-Ary Trees108
SF2Net: Sequence Feature Fusion Network for Palmprint Verification107
Across-Platform Detection of Malicious Cryptocurrency Accounts via Interaction Feature Learning106
Towards Automatic Heap Exploit Generation by Using Heap Layout Constraints on Binary Programs105
Double-Layered Dual-Syndrome Trellis Codes Utilizing Channel Knowledge for Robust Steganography103
Stealthy Backdoors as Compression Artifacts95
TCPP: Achieving Privacy-Preserving Trajectory Correlation With Differential Privacy94
Decision-Based Adversarial Attack With Frequency Mixup91
A Secure Encoding Mechanism Against Deception Attacks on Multisensor Remote State Estimation90
Transformer Based Defense GAN Against Palm-Vein Adversarial Attacks90
ROBY: A Byzantine-Robust and Privacy-Preserving Serverless Federated Learning Framework89
BatchAuth: A Physical Layer Batch Authentication Scheme for Multiple Backscatter Devices88
PUF-Phenotype: A Robust and Noise-Resilient Approach to Aid Group-Based Authentication With DRAM-PUFs Using Machine Learning88
Low Complexity Byzantine-Resilient Federated Learning87
Outlier-Resistant Non-Fragile Control of Nonlinear Networked Systems Under DoS Attacks and Multi-Variable Event-Triggered SC Protocol86
sBugChecker: A Systematic Framework for Detecting Solidity Compiler-Introduced Bugs86
FADE: A Dataset for Detecting Falling Objects Around Buildings in Video86
Multi-User Beam Training and Transmission Design for Covert Millimeter-Wave Communication85
Uncoordinated Syntactic Privacy: A New Composable Metric for Multiple, Independent Data Publishing84
Owner-Enabled Secure Authorized Keyword Search Over Encrypted Data With Flexible Metadata84
SSME: A Semi-Supervised Specific Emitter Identification Method With Manifold Enhancement82
Multisource Heterogeneous Specific Emitter Identification Using Attention Mechanism-Based RFF Fusion Method82
FVFSNet: Frequency-Spatial Coupling Network for Finger Vein Authentication82
Resource Allocation for STAR-RIS-Assisted MIMO Physical-Layer Key Generation81
BDMMT: Backdoor Sample Detection for Language Models Through Model Mutation Testing78
Robust Duality Learning for Unsupervised Visible-Infrared Person Re-Identification77
Exploiting the Adversarial Example Vulnerability of Transfer Learning of Source Code76
Seeing Traffic Paths: Encrypted Traffic Classification With Path Signature Features74
Minipatch: Undermining DNN-Based Website Fingerprinting With Adversarial Patches74
Traceable and Collision-Resilient Differential Privacy73
Reinforcement Learning-Based Personalized Differentially Private Federated Learning73
Citywide Multi-Step Crime Prediction via Context-Aware Bayesian Tensor Decomposition73
Practical Multi-Party Private Set Intersection Protocols73
Exploring Fine-Grained Representation and Recomposition for Cloth-Changing Person Re-Identification73
CleanerCLIP: Fine-grained Counterfactual Semantic Augmentation for Backdoor Defense in Contrastive Learning73
Bidirectional Stackable Recurrent Generative Adversarial Imputation Network for Specific Emitter Missing Data Imputation72
No Time for Remodulation: A PHY Steganographic Symbiotic Channel Over Constant Envelope72
BABD: A Bitcoin Address Behavior Dataset for Pattern Analysis71
EARVP: Efficient Aggregation for Federated Learning With Robustness, Verifiability, and Privacy71
Unknown Cyber Threat Discovery Empowered by Genetic Evolution Without Prior Knowledge70
A General Purpose Data and Query Privacy Preserving Protocol for Wireless Sensor Networks70
Revisiting the Masking Strategy: A Side-Channel Attack on CRYSTALS-Kyber67
Customized Transformer Adapter With Frequency Masking for Deepfake Detection66
Attackers Are Not the Same! Unveiling the Impact of Feature Distribution on Label Inference Attacks66
The Effect of Inverse Square Law of Light on ENF in Videos Exposed by Rolling Shutter66
SecBNN: Efficient Secure Inference on Binary Neural Networks65
Analyze and Improve Differentially Private Federated Learning: A Model Robustness Perspective64
Optimal Privacy-Aware Stochastic Sampling63
On Covert Communication Performance With Outdated CSI in Wireless Greedy Relay Systems62
On the Impact of Pollution Attacks on Coding-Based Distributed Storage Systems62
Implicit Alignment-Based Cross-Modal Symbiotic Network for Text-to-Image Person Re-Identification61
The Implications of Insecure Use of Fonts Against PDF Documents and Web Pages61
GuessFuse: Hybrid Password Guessing With Multi-View61
SIa-CBc: Sensitive Intent-Assisted and Crucial Behavior-Cognized Malware Detection Based on Human Brain Cognitive Theory61
Adversarial Examples Against WiFi Fingerprint-Based Localization in the Physical World61
0.1017689704895