IEEE Transactions on Information Forensics and Security

Papers
(The H4-Index of IEEE Transactions on Information Forensics and Security is 43. The table below lists those papers that are above that threshold based on CrossRef citation counts [max. 250 papers]. The publications cover those that have been published in the past four years, i.e., from 2020-03-01 to 2024-03-01.)
ArticleCitations
Visible-Infrared Person Re-Identification via Homogeneous Augmented Tri-Modal Learning162
VAE-Stega: Linguistic Steganography Based on Variational Auto-Encoder112
Combining Graph-Based Learning With Automated Data Collection for Code Vulnerability Detection106
Smart and Practical Privacy-Preserving Data Aggregation for Fog-Based Smart Grids106
Accurate Decentralized Application Identification via Encrypted Traffic Analysis Using Graph Neural Networks100
Improving Physical Layer Security of Uplink NOMA via Energy Harvesting Jammers99
A Siamese CNN for Image Steganalysis96
Towards Scalable and Channel-Robust Radio Frequency Fingerprint Identification for LoRa94
VeriFL: Communication-Efficient and Fast Verifiable Aggregation for Federated Learning84
An Automatic Cost Learning Framework for Image Steganography Using Deep Reinforcement Learning84
Privacy-Enhanced Federated Learning Against Poisoning Adversaries83
MTD-Net: Learning to Detect Deepfakes Images by Multi-Scale Texture Difference75
Unsupervised Adversarial Domain Adaptation for Cross-Domain Face Presentation Attack Detection74
Towards Transferable Adversarial Attack Against Deep Face Recognition72
Functionality-Preserving Black-Box Optimization of Adversarial Windows Malware70
Secure and Lightweight Conditional Privacy-Preserving Authentication for Securing Traffic Emergency Messages in VANETs68
A Performance-Sensitive Malware Detection System Using Deep Learning on Mobile Devices66
Radio Frequency Fingerprint Identification for Narrowband Systems, Modelling and Classification62
Privacy–Enhancing Face Biometrics: A Comprehensive Survey61
Secrecy Rate Optimization for Intelligent Reflecting Surface Assisted MIMO System60
Attribute-Aligned Domain-Invariant Feature Learning for Unsupervised Domain Adaptation Person Re-Identification59
Privacy-Preserving Localization for Underwater Sensor Networks via Deep Reinforcement Learning58
Privacy-Preserving Object Detection for Medical Images With Faster R-CNN58
PolyShard: Coded Sharding Achieves Linearly Scaling Efficiency and Security Simultaneously57
Face Anti-Spoofing via Adversarial Cross-Modality Translation55
Image Tampering Localization Using a Dense Fully Convolutional Network53
Covert Wireless Communications Under Quasi-Static Fading With Channel Uncertainty53
Learning One Class Representations for Face Presentation Attack Detection Using Multi-Channel Convolutional Neural Networks52
Fine-Grained Webpage Fingerprinting Using Only Packet Length Information of Encrypted Traffic51
Physical Layer Security Enhancement With Reconfigurable Intelligent Surface-Aided Networks51
Self-Configurable Cyber-Physical Intrusion Detection for Smart Homes Using Reinforcement Learning50
Specific Emitter Identification Based on Multi-Level Sparse Representation in Automatic Identification System50
Privacy-Preserving Byzantine-Robust Federated Learning via Blockchain Systems49
Dynamic Tri-Level Relation Mining With Attentive Graph for Visible Infrared Re-Identification48
Privacy-Preserving Aggregation-Authentication Scheme for Safety Warning System in Fog-Cloud Based VANET47
ShieldFL: Mitigating Model Poisoning Attacks in Privacy-Preserving Federated Learning47
SMAKA: Secure Many-to-Many Authentication and Key Agreement Scheme for Vehicular Networks45
APMSA: Adversarial Perturbation Against Model Stealing Attacks45
Secure Dynamic Searchable Symmetric Encryption With Constant Client Storage Cost45
DRL-FAS: A Novel Framework Based on Deep Reinforcement Learning for Face Anti-Spoofing45
Multi-Agent Reinforcement Learning-Based Buffer-Aided Relay Selection in IRS-Assisted Secure Cooperative Networks44
Joint Optimization of Trajectory, Propulsion, and Thrust Powers for Covert UAV-on-UAV Video Tracking and Surveillance43
Deep Hashing for Secure Multimodal Biometrics43
Beam-Domain Anti-Jamming Transmission for Downlink Massive MIMO Systems: A Stackelberg Game Perspective43
0.041800975799561