IEEE Transactions on Information Forensics and Security

Papers
(The median citation count of IEEE Transactions on Information Forensics and Security is 3. The table below lists those papers that are above that threshold based on CrossRef citation counts [max. 250 papers]. The publications cover those that have been published in the past four years, i.e., from 2020-11-01 to 2024-11-01.)
ArticleCitations
Visible-Infrared Person Re-Identification via Homogeneous Augmented Tri-Modal Learning190
Combining Graph-Based Learning With Automated Data Collection for Code Vulnerability Detection148
Accurate Decentralized Application Identification via Encrypted Traffic Analysis Using Graph Neural Networks147
Privacy-Enhanced Federated Learning Against Poisoning Adversaries141
Towards Scalable and Channel-Robust Radio Frequency Fingerprint Identification for LoRa134
VAE-Stega: Linguistic Steganography Based on Variational Auto-Encoder130
VeriFL: Communication-Efficient and Fast Verifiable Aggregation for Federated Learning128
A Siamese CNN for Image Steganalysis124
Smart and Practical Privacy-Preserving Data Aggregation for Fog-Based Smart Grids122
Improving Physical Layer Security of Uplink NOMA via Energy Harvesting Jammers117
An Automatic Cost Learning Framework for Image Steganography Using Deep Reinforcement Learning106
ShieldFL: Mitigating Model Poisoning Attacks in Privacy-Preserving Federated Learning104
Towards Transferable Adversarial Attack Against Deep Face Recognition99
Privacy-Preserving Byzantine-Robust Federated Learning via Blockchain Systems98
Radio Frequency Fingerprint Identification for Narrowband Systems, Modelling and Classification97
MTD-Net: Learning to Detect Deepfakes Images by Multi-Scale Texture Difference97
Privacy–Enhancing Face Biometrics: A Comprehensive Survey92
Unsupervised Adversarial Domain Adaptation for Cross-Domain Face Presentation Attack Detection87
Functionality-Preserving Black-Box Optimization of Adversarial Windows Malware86
Secure and Lightweight Conditional Privacy-Preserving Authentication for Securing Traffic Emergency Messages in VANETs82
Image Tampering Localization Using a Dense Fully Convolutional Network79
Secrecy Rate Optimization for Intelligent Reflecting Surface Assisted MIMO System79
A Performance-Sensitive Malware Detection System Using Deep Learning on Mobile Devices74
Attribute-Aligned Domain-Invariant Feature Learning for Unsupervised Domain Adaptation Person Re-Identification72
Privacy-Preserving Aggregation-Authentication Scheme for Safety Warning System in Fog-Cloud Based VANET71
Privacy-Preserving Object Detection for Medical Images With Faster R-CNN70
Physical Layer Security Enhancement With Reconfigurable Intelligent Surface-Aided Networks70
Fine-Grained Webpage Fingerprinting Using Only Packet Length Information of Encrypted Traffic70
Face Anti-Spoofing via Adversarial Cross-Modality Translation69
Privacy-Preserving Localization for Underwater Sensor Networks via Deep Reinforcement Learning68
Covert Wireless Communications Under Quasi-Static Fading With Channel Uncertainty67
Dynamic Tri-Level Relation Mining With Attentive Graph for Visible Infrared Re-Identification66
PolyShard: Coded Sharding Achieves Linearly Scaling Efficiency and Security Simultaneously64
An Explainable AI-Based Intrusion Detection System for DNS Over HTTPS (DoH) Attacks61
Specific Emitter Identification Based on Multi-Level Sparse Representation in Automatic Identification System61
Learning One Class Representations for Face Presentation Attack Detection Using Multi-Channel Convolutional Neural Networks60
Self-Configurable Cyber-Physical Intrusion Detection for Smart Homes Using Reinforcement Learning58
Secure Dynamic Searchable Symmetric Encryption With Constant Client Storage Cost58
DRL-FAS: A Novel Framework Based on Deep Reinforcement Learning for Face Anti-Spoofing58
Joint Optimization of Trajectory, Propulsion, and Thrust Powers for Covert UAV-on-UAV Video Tracking and Surveillance58
Robust Image Forgery Detection Against Transmission Over Online Social Networks58
Jamming and Eavesdropping Defense Scheme Based on Deep Reinforcement Learning in Autonomous Vehicle Networks58
Random Partitioning Forest for Point-Wise and Collective Anomaly Detection—Application to Network Intrusion Detection57
APMSA: Adversarial Perturbation Against Model Stealing Attacks57
SMAKA: Secure Many-to-Many Authentication and Key Agreement Scheme for Vehicular Networks56
Contrastive Context-Aware Learning for 3D High-Fidelity Mask Face Presentation Attack Detection56
Physical-Layer Authentication Using Multiple Channel-Based Features55
A Generalizable Model-and-Data Driven Approach for Open-Set RFF Authentication55
De-Pois: An Attack-Agnostic Defense against Data Poisoning Attacks54
Learning Meta Pattern for Face Anti-Spoofing53
Multi-Agent Reinforcement Learning-Based Buffer-Aided Relay Selection in IRS-Assisted Secure Cooperative Networks52
Enabling Cross-Chain Transactions: A Decentralized Cryptocurrency Exchange Protocol52
Improving Generalization by Commonality Learning in Face Forgery Detection52
Fingerprint Spoof Detector Generalization52
Deep Hashing for Secure Multimodal Biometrics51
Hunting Vulnerable Smart Contracts via Graph Embedding Based Bytecode Matching50
Mockingbird: Defending Against Deep-Learning-Based Website Fingerprinting Attacks With Adversarial Traces50
Adversarial XAI Methods in Cybersecurity50
Who Is in Control? Practical Physical Layer Attack and Defense for mmWave-Based Sensing in Autonomous Vehicles49
Public-Key Authenticated Encryption With Keyword Search Supporting Constant Trapdoor Generation and Fast Search49
K-Time Modifiable and Epoch-Based Redactable Blockchain48
PVD-FL: A Privacy-Preserving and Verifiable Decentralized Federated Learning Framework47
Evaluation of the Time Stability and Uniqueness in PPG-Based Biometric System46
Beam-Domain Anti-Jamming Transmission for Downlink Massive MIMO Systems: A Stackelberg Game Perspective46
Reinforcement Learning-Based Physical-Layer Authentication for Controller Area Networks46
Preventing DeepFake Attacks on Speaker Authentication by Dynamic Lip Movement Analysis46
OBFP: Optimized Blockchain-Based Fair Payment for Outsourcing Computations in Cloud Computing46
SecureFace: Face Template Protection46
Gini-Impurity Index Analysis46
Self-Adversarial Training Incorporating Forgery Attention for Image Forgery Localization45
Person Re-Identification by Context-Aware Part Attention and Multi-Head Collaborative Learning45
Conditional Variational Auto-Encoder and Extreme Value Theory Aided Two-Stage Learning Approach for Intelligent Fine-Grained Known/Unknown Intrusion Detection45
Explicit Optimization of min max Steganographic Game45
Everybody’s Talkin’: Let Me Talk as You Want44
Dynamic Multi-Key FHE in Asymmetric Key Setting From LWE44
An SDN-Enabled Proactive Defense Framework for DDoS Mitigation in IoT Networks44
The P-DESTRE: A Fully Annotated Dataset for Pedestrian Detection, Tracking, and Short/Long-Term Re-Identification From Aerial Devices44
Fine-Grained Facial Expression Recognition in the Wild43
On Maximizing the Sum Secret Key Rate for Reconfigurable Intelligent Surface-Assisted Multiuser Systems42
The Best Defense Is a Good Offense: Adversarial Attacks to Avoid Modulation Detection42
Block-Wise Image Transformation With Secret Key for Adversarially Robust Defense42
Co-Design of Observer-Based Fault Detection Filter and Dynamic Event-Triggered Controller for Wind Power System Under Dual Alterable DoS Attacks42
Morphing Attack Detection-Database, Evaluation Platform, and Benchmarking42
Comparison of Statistical and Machine Learning Techniques for Physical Layer Authentication42
Injecting Reliable Radio Frequency Fingerprints Using Metasurface for the Internet of Things42
PFA-GAN: Progressive Face Aging With Generative Adversarial Network42
Multi-Scale and Multi-Direction GAN for CNN-Based Single Palm-Vein Identification41
Redactable Blockchain in Decentralized Setting41
Blockchain-Enabled Authenticated Key Agreement Scheme for Mobile Vehicles-Assisted Precision Agricultural IoT Networks41
DeepSBD: A Deep Neural Network Model With Attention Mechanism for SocialBot Detection41
P2BA: A Privacy-Preserving Protocol With Batch Authentication Against Semi-Trusted RSUs in Vehicular Ad Hoc Networks41
Model Inversion Attack by Integration of Deep Generative Models: Privacy-Sensitive Face Generation From a Face Recognition System41
Detect and Locate: Exposing Face Manipulation by Semantic- and Noise-Level Telltales40
Towards Query-Efficient Adversarial Attacks Against Automatic Speech Recognition Systems40
Efficient Dropout-Resilient Aggregation for Privacy-Preserving Machine Learning40
ISTVT: Interpretable Spatial-Temporal Video Transformer for Deepfake Detection40
DOReN: Toward Efficient Deep Convolutional Neural Networks with Fully Homomorphic Encryption40
Understanding Failures in Security Proofs of Multi-Factor Authentication for Mobile Devices40
CruParamer: Learning on Parameter-Augmented API Sequences for Malware Detection39
FA-GAN: Face Augmentation GAN for Deformation-Invariant Face Recognition39
RF Impairment Model-Based IoT Physical-Layer Identification for Enhanced Domain Generalization39
Achieving Privacy-Preserving and Verifiable Support Vector Machine Training in the Cloud38
Cooperative Assurance of Cache Data Integrity for Mobile Edge Computing38
PAST-AI: Physical-Layer Authentication of Satellite Transmitters via Deep Learning38
FakeLocator: Robust Localization of GAN-Based Face Manipulations38
Efficient Steganography in JPEG Images by Minimizing Performance of Optimal Detector37
AVoiD-DF: Audio-Visual Joint Learning for Detecting Deepfake37
Stealing Neural Network Structure Through Remote FPGA Side-Channel Analysis37
Rethinking Smart Contract Fuzzing: Fuzzing With Invocation Ordering and Important Branch Revisiting37
Copy Move Source-Target Disambiguation Through Multi-Branch CNNs37
PFLF: Privacy-Preserving Federated Learning Framework for Edge Computing36
Look Locally Infer Globally: A Generalizable Face Anti-Spoofing Approach36
Efficient Quantum Blockchain With a Consensus Mechanism QDPoS36
Event-Triggered Interval-Based Anomaly Detection and Attack Identification Methods for an In-Vehicle Network36
Can We Trust Your Explanations? Sanity Checks for Interpreters in Android Malware Analysis36
LSFL: A Lightweight and Secure Federated Learning Scheme for Edge Computing36
F2Trans: High-Frequency Fine-Grained Transformer for Face Forgery Detection36
Log-Based Anomaly Detection With Robust Feature Extraction and Online Learning36
Hierarchical Frequency-Assisted Interactive Networks for Face Manipulation Detection36
Masked Relation Learning for DeepFake Detection36
Behavior-Aware Account De-Anonymization on Ethereum Interaction Graph35
Relational Deep Feature Learning for Heterogeneous Face Recognition35
Application of a Dynamic Line Graph Neural Network for Intrusion Detection With Semisupervised Learning35
Detecting Overlapped Objects in X-Ray Security Imagery by a Label-Aware Mechanism34
Sum Secret Key Rate Maximization for TDD Multi-User Massive MIMO Wireless Networks34
C2CL: Contact to Contactless Fingerprint Matching34
One Parameter Defense—Defending Against Data Inference Attacks via Differential Privacy34
Modelling Behavioural Dynamics for Asymmetric Application Layer DDoS Detection34
Detection of Message Injection Attacks Onto the CAN Bus Using Similarities of Successive Messages-Sequence Graphs34
Camera Invariant Feature Learning for Generalized Face Anti-Spoofing33
Finger Vein Recognition via Sparse Reconstruction Error Constrained Low-Rank Representation33
Nowhere to Hide: Efficiently Identifying Probabilistic Cloning Attacks in Large-Scale RFID Systems33
Synchronized Provable Data Possession Based on Blockchain for Digital Twin33
On the Security of Reversible Data Hiding in Encrypted Images by MSB Prediction33
Learning Multi-Granularity Temporal Characteristics for Face Anti-Spoofing32
Robust Beamforming Design for Covert Communications32
VulDetector: Detecting Vulnerabilities Using Weighted Feature Graph Comparison32
Data-Driven Decision Support for Optimizing Cyber Forensic Investigations32
Walking on the Edge: Fast, Low-Distortion Adversarial Examples32
Surface and Internal Fingerprint Reconstruction From Optical Coherence Tomography Through Convolutional Neural Network32
Brain-Inspired Golden Chip Free Hardware Trojan Detection32
Stealthy MTD Against Unsupervised Learning-Based Blind FDI Attacks in Power Systems32
LiSiam: Localization Invariance Siamese Network for Deepfake Detection32
Stop-and-Go: Exploring Backdoor Attacks on Deep Reinforcement Learning-Based Traffic Congestion Control Systems32
Secure and Lightweight User Authentication Scheme for Cloud-Assisted Internet of Things31
Zero-Forcing Beamforming for Active and Passive Eavesdropper Mitigation in Visible Light Communication Systems31
Practical Multi-Party Private Set Intersection Protocols31
A Differentially Private Game Theoretic Approach for Deceiving Cyber Adversaries31
Joint Discriminative Sparse Coding for Robust Hand-Based Multimodal Recognition31
3PAA: A Private PUF Protocol for Anonymous Authentication31
Pilot Contamination Attack Detection for 5G MmWave Grant-Free IoT Networks31
A Dataset and Benchmark for Multimodal Biometric Recognition Based on Fingerprint and Finger Vein31
CALPA-NET: Channel-Pruning-Assisted Deep Residual Network for Steganalysis of Digital Images31
Neural Network Modeling Attacks on Arbiter-PUF-Based Designs30
Server-Aided Bilateral Access Control for Secure Data Sharing With Dynamic User Groups30
High-Fidelity Face Manipulation With Extreme Poses and Expressions30
PulseEdit: Editing Physiological Signals in Facial Videos for Privacy Protection30
Deep Neural Backdoor in Semi-Supervised Learning: Threats and Countermeasures29
Multi-Level Reversible Data Anonymization via Compressive Sensing and Data Hiding29
Joint Differential Game and Double Deep Q-Networks for Suppressing Malware Spread in Industrial Internet of Things29
On Pilot Spoofing Attack in Massive MIMO Systems: Detection and Countermeasure29
Secure Frequency Control of Hybrid Power System Under DoS Attacks via Lie Algebra29
Overcoming Data Limitations: A Few-Shot Specific Emitter Identification Method Using Self-Supervised Learning and Adversarial Augmentation29
Multiuser MIMO Concept for Physical Layer Security in Multibeam Satellite Systems29
Privacy-Aware Time-Series Data Sharing With Deep Reinforcement Learning28
Enabling Efficient and Strong Privacy-Preserving Truth Discovery in Mobile Crowdsensing28
A New Adversarial Embedding Method for Enhancing Image Steganography28
Redactable Blockchain From Decentralized Chameleon Hash Functions28
Effective and Robust Physical-World Attacks on Deep Learning Face Recognition Systems28
Attack-Resilient Optimal PMU Placement via Reinforcement Learning Guided Tree Search in Smart Grids28
Generalized Likelihood Ratio Test for GNSS Spoofing Detection in Devices With IMU28
Joint Beam Training and Data Transmission Design for Covert Millimeter-Wave Communication28
Gendered Differences in Face Recognition Accuracy Explained by Hairstyles, Makeup, and Facial Morphology27
Physical Layer Secure MIMO Communications Against Eavesdroppers With Arbitrary Number of Antennas27
Exploiting Channel Gain and Phase Noise for PHY-Layer Authentication in Massive MIMO Systems27
Safe Exploration in Wireless Security: A Safe Reinforcement Learning Algorithm With Hierarchical Structure27
UNSAIL: Thwarting Oracle-Less Machine Learning Attacks on Logic Locking27
THREATRACE: Detecting and Tracing Host-Based Threats in Node Level Through Provenance Graph Learning27
Copula-Based Analysis of Physical Layer Security Performances Over Correlated Rayleigh Fading Channels27
Study of Pre-Processing Defenses Against Adversarial Attacks on State-of-the-Art Speaker Recognition Systems27
Personalized Federated Learning With Differential Privacy and Convergence Guarantee27
Robust Secure Beamforming for Intelligent Reflecting Surface Assisted Full-Duplex MISO Systems27
Valkyrie: Vulnerability Assessment Tool and Attack for Provably-Secure Logic Locking Techniques26
A Transfer Learning Approach for Securing Resource-Constrained IoT Devices26
An Efficient Identity-Based Provable Data Possession Protocol With Compressed Cloud Storage26
Occlusion-Aware Human Mesh Model-Based Gait Recognition26
Secure and Efficient Multi-Signature Schemes for Fabric: An Enterprise Blockchain Platform26
Intrusion Detection Scheme With Dimensionality Reduction in Next Generation Networks26
Generative Steganography via Auto-Generation of Semantic Object Contours26
FLCert: Provably Secure Federated Learning Against Poisoning Attacks26
Transform Domain-Based Invertible and Lossless Secret Image Sharing With Authentication26
SAP-SSE: Protecting Search Patterns and Access Patterns in Searchable Symmetric Encryption26
Nelder-Mead Simplex Channel Estimation for the RF-DNA Fingerprinting of OFDM Transmitters Under Rayleigh Fading Conditions26
TRACE: Enterprise-Wide Provenance Tracking for Real-Time APT Detection26
Semi-Supervised Natural Face De-Occlusion26
Modulation Classification Based on Fourth-Order Cumulants of Superposed Signal in NOMA Systems26
Gradient Leakage Attack Resilient Deep Learning26
MAAD-Face: A Massively Annotated Attribute Dataset for Face Images25
One Cycle Attack: Fool Sensor-Based Personal Gait Authentication With Clustering25
Federated Graph Neural Network for Fast Anomaly Detection in Controller Area Networks25
Treating Interference as Noise Is Optimal for Covert Communication Over Interference Channels25
Adaptive Multi-Trace Carving for Robust Frequency Tracking in Forensic Applications25
Towards Private Learning on Decentralized Graphs With Local Differential Privacy25
Artificial Noise-Aided MIMO Physical Layer Authentication With Imperfect CSI25
Personal Privacy Protection via Irrelevant Faces Tracking and Pixelation in Video Live Streaming25
Robust Iris Presentation Attack Detection Fusing 2D and 3D Information25
FiFTy: Large-Scale File Fragment Type Identification Using Convolutional Neural Networks25
PriScore: Blockchain-Based Self-Tallying Election System Supporting Score Voting25
Efficient and Privacy-Preserving Multi-Party Skyline Queries Over Encrypted Data25
Integrating Part-Object Relationship and Contrast for Camouflaged Object Detection25
ForgeryNIR: Deep Face Forgery and Detection in Near-Infrared Scenario25
Securing Reconfigurable Intelligent Surface-Aided Cell-Free Networks24
A Privacy-Preserving Online Ride-Hailing System Without Involving a Third Trusted Server24
Enhanced Secrecy Performance of Multihop IoT Networks With Cooperative Hybrid-Duplex Jamming24
A Practical Fog-Based Privacy-Preserving Online Car-Hailing Service System24
Learning Joint and Specific Patterns: A Unified Sparse Representation for Off-the-Person ECG Biometric Recognition24
On the Physical Layer Security of Untrusted Millimeter Wave Relaying Networks: A Stochastic Geometry Approach24
Enabling Efficient Spatial Keyword Queries on Encrypted Data With Strong Security Guarantees24
Multi-Channel Remote Photoplethysmography Correspondence Feature for 3D Mask Face Presentation Attack Detection24
Dual-Branch Meta-Learning Network With Distribution Alignment for Face Anti-Spoofing24
Secure Automatic Speaker Verification (SASV) System Through sm-ALTP Features and Asymmetric Bagging23
TnT Attacks! Universal Naturalistic Adversarial Patches Against Deep Neural Network Systems23
A3GAN: An Attribute-Aware Attentive Generative Adversarial Network for Face Aging23
Memory-Modulated Transformer Network for Heterogeneous Face Recognition23
Physical-Layer Secret Key Generation via CQI-Mapped Spatial Modulation in Multi-Hop Wiretap Ad-Hoc Networks23
Periocular-Assisted Multi-Feature Collaboration for Dynamic Iris Recognition23
Privacy-Preserving Distributed Processing: Metrics, Bounds and Algorithms23
Eye Know You Too: Toward Viable End-to-End Eye Movement Biometrics for User Authentication23
Iris Liveness Detection Using a Cascade of Dedicated Deep Learning Networks23
Achieving Covert Wireless Communication With a Multi-Antenna Relay23
Dual Adversarial Disentanglement and Deep Representation Decorrelation for NIR-VIS Face Recognition23
Multi-Scale Gradients Self-Attention Residual Learning for Face Photo-Sketch Transformation23
Secure Millimeter-Wave Ad Hoc Communications Using Physical Layer Security23
On the Physical Layer Security of the Cooperative Rate-Splitting-Aided Downlink in UAV Networks23
Single-Leader-Multiple-Followers Stackelberg Security Game With Hypergame Framework22
Source Camera Verification for Strongly Stabilized Videos22
Defending Support Vector Machines Against Data Poisoning Attacks22
Amplitude-Varying Perturbation for Balancing Privacy and Utility in Federated Learning22
A Flexible Sharding Blockchain Protocol Based on Cross-Shard Byzantine Fault Tolerance22
Rate-Splitting Multiple Access for Communications and Jamming in Multi-Antenna Multi-Carrier Cognitive Radio Systems22
Modern Privacy-Preserving Record Linkage Techniques: An Overview22
From RGB to Depth: Domain Transfer Network for Face Anti-Spoofing22
Private Set Intersection With Authorization Over Outsourced Encrypted Datasets22
On Joint Optimization of Automatic Speaker Verification and Anti-Spoofing in the Embedding Space22
Natural Steganography in JPEG Domain With a Linear Development Pipeline21
Toward Length-Versatile and Noise-Robust Radio Frequency Fingerprint Identification21
A Multi-Filter Fingerprint Matching Framework for Cancelable Template Design21
Seeing Traffic Paths: Encrypted Traffic Classification With Path Signature Features21
Generative Adversarial Attacks Against Deep-Learning-Based Camera Model Identification21
CBACS: A Privacy-Preserving and Efficient Cache-Based Access Control Scheme for Software Defined Vehicular Networks21
0.025053024291992