IEEE Transactions on Information Forensics and Security

Papers
(The H4-Index of IEEE Transactions on Information Forensics and Security is 63. The table below lists those papers that are above that threshold based on CrossRef citation counts [max. 250 papers]. The publications cover those that have been published in the past four years, i.e., from 2021-12-01 to 2025-12-01.)
ArticleCitations
Attention-SA: Exploiting Model-Approximated Data Semantics for Adversarial Attack263
CR-DAP: A Comprehensive and Regulatory Decentralized Anonymous Payment System230
A Note on “Secure and Efficient Outsourcing of PCA-Based Face Recognition”216
A Decentralized Threshold Credential Management With Fine-Grained Authentication for VANETs197
Exploiting the Adversarial Example Vulnerability of Transfer Learning of Source Code139
Reinforcement Learning-Based Personalized Differentially Private Federated Learning134
Learnable Prompts With Neighbor-Aware Correction for Text-Based Person Search124
SF2Net: Sequence Feature Fusion Network for Palmprint Verification120
PCSR: Enabling Cross-Modal Semantic Retrieval With Privacy Preservation120
Across-Platform Detection of Malicious Cryptocurrency Accounts via Interaction Feature Learning116
PUF-Phenotype: A Robust and Noise-Resilient Approach to Aid Group-Based Authentication With DRAM-PUFs Using Machine Learning115
Low Complexity Byzantine-Resilient Federated Learning111
sBugChecker: A Systematic Framework for Detecting Solidity Compiler-Introduced Bugs110
Toward Automatic Heap Exploit Generation by Using Heap Layout Constraints on Binary Programs105
Outlier-Resistant Non-Fragile Control of Nonlinear Networked Systems Under DoS Attacks and Multi-Variable Event-Triggered SC Protocol100
Owner-Enabled Secure Authorized Keyword Search Over Encrypted Data With Flexible Metadata98
Uncoordinated Syntactic Privacy: A New Composable Metric for Multiple, Independent Data Publishing98
BDMMT: Backdoor Sample Detection for Language Models Through Model Mutation Testing93
SSME: A Semi-Supervised Specific Emitter Identification Method With Manifold Enhancement93
BatchAuth: A Physical Layer Batch Authentication Scheme for Multiple Backscatter Devices92
Multi-User Beam Training and Transmission Design for Covert Millimeter-Wave Communication92
Stealthy Backdoors as Compression Artifacts92
Traceable and Collision-Resilient Differential Privacy91
Multisource Heterogeneous Specific Emitter Identification Using Attention Mechanism-Based RFF Fusion Method91
High Resolution Fingerprint Retrieval Based on Pore Indexing and Graph Comparison89
Enhancing Federated Learning With Differentially Private Continuous Data Release via k -Ary Trees89
On Message Authentication Channel Capacity Over a Wiretap Channel89
Double-Layered Dual-Syndrome Trellis Codes Utilizing Channel Knowledge for Robust Steganography88
Beyond Access Pattern: Efficient Volume-Hiding Multi-Range Queries Over Outsourced Data Services88
Robust Duality Learning for Unsupervised Visible-Infrared Person Re-Identification86
Seeing Traffic Paths: Encrypted Traffic Classification With Path Signature Features85
Minipatch: Undermining DNN-Based Website Fingerprinting With Adversarial Patches83
TCPP: Achieving Privacy-Preserving Trajectory Correlation With Differential Privacy83
CleanerCLIP: Fine-Grained Counterfactual Semantic Augmentation for Backdoor Defense in Contrastive Learning81
Citywide Multi-Step Crime Prediction via Context-Aware Bayesian Tensor Decomposition81
ROBY: A Byzantine-Robust and Privacy-Preserving Serverless Federated Learning Framework80
Practical Multi-Party Private Set Intersection Protocols79
FADE: A Dataset for Detecting Falling Objects Around Buildings in Video78
Transformer Based Defense GAN Against Palm-Vein Adversarial Attacks78
A Secure Encoding Mechanism Against Deception Attacks on Multisensor Remote State Estimation78
FVFSNet: Frequency-Spatial Coupling Network for Finger Vein Authentication77
Decision-Based Adversarial Attack With Frequency Mixup76
Resource Allocation for STAR-RIS-Assisted MIMO Physical-Layer Key Generation75
Exploring Fine-Grained Representation and Recomposition for Cloth-Changing Person Re-Identification75
Bidirectional Stackable Recurrent Generative Adversarial Imputation Network for Specific Emitter Missing Data Imputation74
No Time for Remodulation: A PHY Steganographic Symbiotic Channel Over Constant Envelope74
A General Purpose Data and Query Privacy Preserving Protocol for Wireless Sensor Networks73
Unknown Cyber Threat Discovery Empowered by Genetic Evolution Without Prior Knowledge73
Attackers Are Not the Same! Unveiling the Impact of Feature Distribution on Label Inference Attacks72
Revisiting the Masking Strategy: A Side-Channel Attack on CRYSTALS-Kyber72
SecBNN: Efficient Secure Inference on Binary Neural Networks71
On the Impact of Pollution Attacks on Coding-Based Distributed Storage Systems70
The Effect of Inverse Square Law of Light on ENF in Videos Exposed by Rolling Shutter69
SIa-CBc: Sensitive Intent-Assisted and Crucial Behavior-Cognized Malware Detection Based on Human Brain Cognitive Theory69
Fast Propagation Is Better: Accelerating Single-Step Adversarial Training via Sampling Subnetworks69
The Implications of Insecure Use of Fonts Against PDF Documents and Web Pages68
Adversarial Examples Against WiFi Fingerprint-Based Localization in the Physical World68
Implicit Alignment-Based Cross-Modal Symbiotic Network for Text-to-Image Person Re-Identification66
Turritopsis: Practical Dynamic Asynchronous BFT65
FLGuardian: Defending Against Model Poisoning Attacks via Fine-Grained Detection in Federated Learning65
Privacy-Preserved Distributed Learning With Zeroth-Order Optimization64
G2V2former: Graph Guided Video Vision Transformer for Face Anti-Spoofing64
Hamster: A Fast Synchronous Byzantine Fault Tolerant Protocol63
Enhancing Model Generalization for Efficient Cross-Device Side-Channel Analysis63
0.10353207588196