IEEE Transactions on Information Forensics and Security

Papers
(The H4-Index of IEEE Transactions on Information Forensics and Security is 55. The table below lists those papers that are above that threshold based on CrossRef citation counts [max. 250 papers]. The publications cover those that have been published in the past four years, i.e., from 2021-08-01 to 2025-08-01.)
ArticleCitations
High Resolution Fingerprint Retrieval Based on Pore Indexing and Graph Comparison225
CR-DAP: A Comprehensive and Regulatory Decentralized Anonymous Payment System193
Uncoordinated Syntactic Privacy: A New Composable Metric for Multiple, Independent Data Publishing185
Reinforcement Learning-Based Personalized Differentially Private Federated Learning120
Robust Duality Learning for Unsupervised Visible-Infrared Person Re-Identification118
Attention-SA: Exploiting Model-Approximated Data Semantics for Adversarial Attack104
A Note on “Secure and Efficient Outsourcing of PCA-Based Face Recognition”97
A Decentralized Threshold Credential Management With Fine-Grained Authentication for VANETs97
Beyond Access Pattern: Efficient Volume-Hiding Multi-Range Queries Over Outsourced Data Services96
Owner-Enabled Secure Authorized Keyword Search Over Encrypted Data With Flexible Metadata93
Decision-Based Adversarial Attack With Frequency Mixup92
Resource Allocation for STAR-RIS-Assisted MIMO Physical-Layer Key Generation89
BDMMT: Backdoor Sample Detection for Language Models Through Model Mutation Testing89
FVFSNet: Frequency-Spatial Coupling Network for Finger Vein Authentication85
Transformer Based Defense GAN Against Palm-Vein Adversarial Attacks83
Across-Platform Detection of Malicious Cryptocurrency Accounts via Interaction Feature Learning83
Exploring Fine-Grained Representation and Recomposition for Cloth-Changing Person Re-Identification82
A Secure Encoding Mechanism Against Deception Attacks on Multisensor Remote State Estimation81
Stealthy Backdoors as Compression Artifacts80
Multi-User Beam Training and Transmission Design for Covert Millimeter-Wave Communication79
TCPP: Achieving Privacy-Preserving Trajectory Correlation With Differential Privacy78
On Message Authentication Channel Capacity Over a Wiretap Channel77
Practical Multi-Party Private Set Intersection Protocols75
Outlier-Resistant Non-Fragile Control of Nonlinear Networked Systems Under DoS Attacks and Multi-Variable Event-Triggered SC Protocol74
Minipatch: Undermining DNN-Based Website Fingerprinting With Adversarial Patches74
Seeing Traffic Paths: Encrypted Traffic Classification With Path Signature Features74
Double-Layered Dual-Syndrome Trellis Codes Utilizing Channel Knowledge for Robust Steganography73
PUF-Phenotype: A Robust and Noise-Resilient Approach to Aid Group-Based Authentication With DRAM-PUFs Using Machine Learning72
Low Complexity Byzantine-Resilient Federated Learning72
Multisource Heterogeneous Specific Emitter Identification Using Attention Mechanism-Based RFF Fusion Method71
Exploiting the Adversarial Example Vulnerability of Transfer Learning of Source Code70
ROBY: A Byzantine-robust and Privacy-preserving Serverless Federated Learning Framework70
Citywide Multi-Step Crime Prediction via Context-Aware Bayesian Tensor Decomposition70
BatchAuth: A Physical Layer Batch Authentication Scheme for Multiple Backscatter Devices69
On the Impact of Pollution Attacks on Coding-Based Distributed Storage Systems68
SGBoost: An Efficient and Privacy-Preserving Vertical Federated Tree Boosting Framework67
Privacy-Enhancing Face Obfuscation Guided by Semantic-Aware Attribution Maps67
Bidirectional Stackable Recurrent Generative Adversarial Imputation Network for Specific Emitter Missing Data Imputation67
Palm Vein Recognition Under Unconstrained and Weak-Cooperative Conditions66
On Covert Communication Performance With Outdated CSI in Wireless Greedy Relay Systems65
Adversarial RL-Based IDS for Evolving Data Environment in 6LoWPAN64
Verifying in the Dark: Verifiable Machine Unlearning by Using Invisible Backdoor Triggers64
Optimal Privacy-Aware Stochastic Sampling63
Fed-UGI: Federated Undersampling Learning Framework With Gini Impurity for Imbalanced Network Intrusion Detection63
Attacking Mouse Dynamics Authentication Using Novel Wasserstein Conditional DCGAN63
Occlusion-Aware Human Mesh Model-Based Gait Recognition60
The Effect of Inverse Square Law of Light on ENF in Videos Exposed by Rolling Shutter59
SIa-CBc: Sensitive Intent-Assisted and Crucial Behavior-Cognized Malware Detection Based on Human Brain Cognitive Theory59
SecBNN: Efficient Secure Inference on Binary Neural Networks58
CMXsafe: A Proxy Layer for Securing Internet-of-Things Communications58
Attackers Are Not the Same! Unveiling the Impact of Feature Distribution on Label Inference Attacks58
Analyze and Improve Differentially Private Federated Learning: A Model Robustness Perspective57
Online Two-Stage Channel-Based Lightweight Authentication Method for Time-Varying Scenarios56
Hamster: A Fast Synchronous Byzantine Fault Tolerant Protocol56
No Time for Remodulation: A PHY Steganographic Symbiotic Channel Over Constant Envelope56
FACOS: Enabling Privacy Protection Through Fine-Grained Access Control With On-Chain and Off-Chain System55
Anonymous and Efficient (t, n)-Threshold Ownership Transfer for Cloud EMRs Auditing55
Privacy-Preserving Vertical Federated Learning With Tensor Decomposition for Data Missing Features55
Turritopsis: Practical Dynamic Asynchronous BFT55
0.041137933731079