IEEE Transactions on Information Forensics and Security

Papers
(The H4-Index of IEEE Transactions on Information Forensics and Security is 50. The table below lists those papers that are above that threshold based on CrossRef citation counts [max. 250 papers]. The publications cover those that have been published in the past four years, i.e., from 2021-05-01 to 2025-05-01.)
ArticleCitations
PUF-Phenotype: A Robust and Noise-Resilient Approach to Aid Group-Based Authentication With DRAM-PUFs Using Machine Learning190
High Resolution Fingerprint Retrieval Based on Pore Indexing and Graph Comparison163
Low Complexity Byzantine-Resilient Federated Learning161
CR-DAP: A Comprehensive and Regulatory Decentralized Anonymous Payment System101
Uncoordinated Syntactic Privacy: A New Composable Metric for Multiple, Independent Data Publishing93
Double-Layered Dual-Syndrome Trellis Codes Utilizing Channel Knowledge for Robust Steganography87
Reinforcement Learning-Based Personalized Differentially Private Federated Learning85
Robust Duality Learning for Unsupervised Visible-Infrared Person Re-Identification84
Attention-SA: Exploiting Model-Approximated Data Semantics for Adversarial Attack80
BatchAuth: A Physical Layer Batch Authentication Scheme for Multiple Backscatter Devices80
A Note on “Secure and Efficient Outsourcing of PCA-Based Face Recognition”78
Resource Allocation for STAR-RIS-Assisted MIMO Physical-Layer Key Generation74
Exploiting the Adversarial Example Vulnerability of Transfer Learning of Source Code73
Beyond Access Pattern: Efficient Volume-Hiding Multi-Range Queries Over Outsourced Data Services72
Outlier-Resistant Non-Fragile Control of Nonlinear Networked Systems Under DoS Attacks and Multi-Variable Event-Triggered SC Protocol70
BDMMT: Backdoor Sample Detection for Language Models Through Model Mutation Testing70
Decision-Based Adversarial Attack With Frequency Mixup69
Practical Multi-Party Private Set Intersection Protocols68
FVFSNet: Frequency-Spatial Coupling Network for Finger Vein Authentication68
Transformer Based Defense GAN Against Palm-Vein Adversarial Attacks67
Stealthy Backdoors as Compression Artifacts66
Owner-Enabled Secure Authorized Keyword Search Over Encrypted Data With Flexible Metadata66
A Secure Encoding Mechanism Against Deception Attacks on Multisensor Remote State Estimation65
On Message Authentication Channel Capacity Over a Wiretap Channel64
Seeing Traffic Paths: Encrypted Traffic Classification With Path Signature Features64
Exploring Fine-Grained Representation and Recomposition for Cloth-Changing Person Re-Identification64
Multisource Heterogeneous Specific Emitter Identification Using Attention Mechanism-Based RFF Fusion Method62
TCPP: Achieving Privacy-Preserving Trajectory Correlation With Differential Privacy62
Minipatch: Undermining DNN-Based Website Fingerprinting With Adversarial Patches61
SGBoost: An Efficient and Privacy-Preserving Vertical Federated Tree Boosting Framework61
Across-Platform Detection of Malicious Cryptocurrency Accounts via Interaction Feature Learning61
Multi-User Beam Training and Transmission Design for Covert Millimeter-Wave Communication61
Attacking Mouse Dynamics Authentication Using Novel Wasserstein Conditional DCGAN61
Group-Wise Verifiable Coded Computing Under Byzantine Attacks and Stragglers60
On the Impact of Pollution Attacks on Coding-Based Distributed Storage Systems60
Boosting Black-Box Attack to Deep Neural Networks With Conditional Diffusion Models59
Verifying in the Dark: Verifiable Machine Unlearning by Using Invisible Backdoor Triggers58
Semantic-Aware Adversarial Training for Reliable Deep Hashing Retrieval57
Occlusion-Aware Human Mesh Model-Based Gait Recognition57
Generative Adversarial Attacks Against Deep-Learning-Based Camera Model Identification56
Data Quality Detection Mechanism Against Label Flipping Attacks in Federated Learning56
GuessFuse: Hybrid Password Guessing With Multi-View55
Authentication of Copy Detection Patterns: A Pattern Reliability Based Approach55
The Effect of Inverse Square Law of Light on ENF in Videos Exposed by Rolling Shutter55
On Covert Communication Performance With Outdated CSI in Wireless Greedy Relay Systems55
SIa-CBc: Sensitive Intent-Assisted and Crucial Behavior-Cognized Malware Detection Based on Human Brain Cognitive Theory54
Adversarial RL-Based IDS for Evolving Data Environment in 6LoWPAN52
Secure Model Aggregation Against Poisoning Attacks for Cross-Silo Federated Learning With Robustness and Fairness52
CMXsafe: A Proxy Layer for Securing Internet-of-Things Communications52
Detecting Locally, Patching Globally: An End-to-End Framework for High Speed and Accurate Detection of Fingerprint Minutiae51
Thwarting GNN-Based Attacks Against Logic Locking50
0.1609890460968