IEEE Transactions on Information Forensics and Security

Papers
(The H4-Index of IEEE Transactions on Information Forensics and Security is 52. The table below lists those papers that are above that threshold based on CrossRef citation counts [max. 250 papers]. The publications cover those that have been published in the past four years, i.e., from 2020-11-01 to 2024-11-01.)
ArticleCitations
Visible-Infrared Person Re-Identification via Homogeneous Augmented Tri-Modal Learning190
Combining Graph-Based Learning With Automated Data Collection for Code Vulnerability Detection148
Accurate Decentralized Application Identification via Encrypted Traffic Analysis Using Graph Neural Networks147
Privacy-Enhanced Federated Learning Against Poisoning Adversaries141
Towards Scalable and Channel-Robust Radio Frequency Fingerprint Identification for LoRa134
VAE-Stega: Linguistic Steganography Based on Variational Auto-Encoder130
VeriFL: Communication-Efficient and Fast Verifiable Aggregation for Federated Learning128
A Siamese CNN for Image Steganalysis124
Smart and Practical Privacy-Preserving Data Aggregation for Fog-Based Smart Grids122
Improving Physical Layer Security of Uplink NOMA via Energy Harvesting Jammers117
An Automatic Cost Learning Framework for Image Steganography Using Deep Reinforcement Learning106
ShieldFL: Mitigating Model Poisoning Attacks in Privacy-Preserving Federated Learning104
Towards Transferable Adversarial Attack Against Deep Face Recognition99
Privacy-Preserving Byzantine-Robust Federated Learning via Blockchain Systems98
Radio Frequency Fingerprint Identification for Narrowband Systems, Modelling and Classification97
MTD-Net: Learning to Detect Deepfakes Images by Multi-Scale Texture Difference97
Privacy–Enhancing Face Biometrics: A Comprehensive Survey92
Unsupervised Adversarial Domain Adaptation for Cross-Domain Face Presentation Attack Detection87
Functionality-Preserving Black-Box Optimization of Adversarial Windows Malware86
Secure and Lightweight Conditional Privacy-Preserving Authentication for Securing Traffic Emergency Messages in VANETs82
Image Tampering Localization Using a Dense Fully Convolutional Network79
Secrecy Rate Optimization for Intelligent Reflecting Surface Assisted MIMO System79
A Performance-Sensitive Malware Detection System Using Deep Learning on Mobile Devices74
Attribute-Aligned Domain-Invariant Feature Learning for Unsupervised Domain Adaptation Person Re-Identification72
Privacy-Preserving Aggregation-Authentication Scheme for Safety Warning System in Fog-Cloud Based VANET71
Physical Layer Security Enhancement With Reconfigurable Intelligent Surface-Aided Networks70
Fine-Grained Webpage Fingerprinting Using Only Packet Length Information of Encrypted Traffic70
Privacy-Preserving Object Detection for Medical Images With Faster R-CNN70
Face Anti-Spoofing via Adversarial Cross-Modality Translation69
Privacy-Preserving Localization for Underwater Sensor Networks via Deep Reinforcement Learning68
Covert Wireless Communications Under Quasi-Static Fading With Channel Uncertainty67
Dynamic Tri-Level Relation Mining With Attentive Graph for Visible Infrared Re-Identification66
PolyShard: Coded Sharding Achieves Linearly Scaling Efficiency and Security Simultaneously64
An Explainable AI-Based Intrusion Detection System for DNS Over HTTPS (DoH) Attacks61
Specific Emitter Identification Based on Multi-Level Sparse Representation in Automatic Identification System61
Learning One Class Representations for Face Presentation Attack Detection Using Multi-Channel Convolutional Neural Networks60
DRL-FAS: A Novel Framework Based on Deep Reinforcement Learning for Face Anti-Spoofing58
Joint Optimization of Trajectory, Propulsion, and Thrust Powers for Covert UAV-on-UAV Video Tracking and Surveillance58
Robust Image Forgery Detection Against Transmission Over Online Social Networks58
Jamming and Eavesdropping Defense Scheme Based on Deep Reinforcement Learning in Autonomous Vehicle Networks58
Self-Configurable Cyber-Physical Intrusion Detection for Smart Homes Using Reinforcement Learning58
Secure Dynamic Searchable Symmetric Encryption With Constant Client Storage Cost58
APMSA: Adversarial Perturbation Against Model Stealing Attacks57
Random Partitioning Forest for Point-Wise and Collective Anomaly Detection—Application to Network Intrusion Detection57
Contrastive Context-Aware Learning for 3D High-Fidelity Mask Face Presentation Attack Detection56
SMAKA: Secure Many-to-Many Authentication and Key Agreement Scheme for Vehicular Networks56
Physical-Layer Authentication Using Multiple Channel-Based Features55
A Generalizable Model-and-Data Driven Approach for Open-Set RFF Authentication55
De-Pois: An Attack-Agnostic Defense against Data Poisoning Attacks54
Learning Meta Pattern for Face Anti-Spoofing53
Enabling Cross-Chain Transactions: A Decentralized Cryptocurrency Exchange Protocol52
Improving Generalization by Commonality Learning in Face Forgery Detection52
Fingerprint Spoof Detector Generalization52
Multi-Agent Reinforcement Learning-Based Buffer-Aided Relay Selection in IRS-Assisted Secure Cooperative Networks52
0.059087038040161