IEEE Transactions on Information Forensics and Security

Papers
(The median citation count of IEEE Transactions on Information Forensics and Security is 4. The table below lists those papers that are above that threshold based on CrossRef citation counts [max. 250 papers]. The publications cover those that have been published in the past four years, i.e., from 2022-05-01 to 2026-05-01.)
ArticleCitations
CR-DAP: A Comprehensive and Regulatory Decentralized Anonymous Payment System302
sBugChecker: A Systematic Framework for Detecting Solidity Compiler-Introduced Bugs186
Toward Automatic Heap Exploit Generation by Using Heap Layout Constraints on Binary Programs161
Learnable Prompts With Neighbor-Aware Correction for Text-Based Person Search150
Double-Layered Dual-Syndrome Trellis Codes Utilizing Channel Knowledge for Robust Steganography148
Uncoordinated Syntactic Privacy: A New Composable Metric for Multiple, Independent Data Publishing146
Enhancing Federated Learning With Differentially Private Continuous Data Release via k -Ary Trees146
Analytical and Experimental Validation of Wireless Authentication Through Enhanced RF Fingerprints of Chaotic Antenna Arrays134
SSME: A Semi-Supervised Specific Emitter Identification Method With Manifold Enhancement125
Reinforcement Learning-Based Personalized Differentially Private Federated Learning121
Exploiting the Adversarial Example Vulnerability of Transfer Learning of Source Code121
M 3 -ReID: Unifying Multi-View, Granularity, and Modality for Video-Based Visible-Infrared Person Re-Identification119
DySec: A Machine Learning-Based Dynamic Analysis for Detecting Malicious Packages in PyPI Ecosystem117
Refining Positive and Toxic Samples for Dual Safety Self-Alignment of LLMs With Minimal Human Interventions112
Attention-SA: Exploiting Model-Approximated Data Semantics for Adversarial Attack111
Across-Platform Detection of Malicious Cryptocurrency Accounts via Interaction Feature Learning110
PCSR: Enabling Cross-Modal Semantic Retrieval With Privacy Preservation108
Citywide Multi-Step Crime Prediction via Context-Aware Bayesian Tensor Decomposition105
CleanerCLIP: Fine-Grained Counterfactual Semantic Augmentation for Backdoor Defense in Contrastive Learning102
Experimental Validation of Information-Theoretic Physical Layer Security102
A Decentralized Threshold Credential Management With Fine-Grained Authentication for VANETs99
Learning Corruption-Invariant Components and Cross-Modal Correspondence for Unsupervised Visible-Infrared Person Re-Identification99
Beyond Access Pattern: Efficient Volume-Hiding Multi-Range Queries Over Outsourced Data Services96
BatchAuth: A Physical Layer Batch Authentication Scheme for Multiple Backscatter Devices95
Low Complexity Byzantine-Resilient Federated Learning93
STMWF: Multi-Tab Website Fingerprinting via Spatial–Temporal Sequence Analysis92
A Note on “Secure and Efficient Outsourcing of PCA-Based Face Recognition”86
Resource Allocation for STAR-RIS-Assisted MIMO Physical-Layer Key Generation86
FADE: A Dataset for Detecting Falling Objects Around Buildings in Video86
FVFSNet: Frequency-Spatial Coupling Network for Finger Vein Authentication85
TCPP: Achieving Privacy-Preserving Trajectory Correlation With Differential Privacy85
Traceable and Collision-Resilient Differential Privacy84
SF2Net: Sequence Feature Fusion Network for Palmprint Verification84
ROBY: A Byzantine-Robust and Privacy-Preserving Serverless Federated Learning Framework82
Outlier-Resistant Non-Fragile Control of Nonlinear Networked Systems Under DoS Attacks and Multi-Variable Event-Triggered SC Protocol79
Transformer Based Defense GAN Against Palm-Vein Adversarial Attacks79
Early-Stage Detection of Encrypted Malware Traffic via Multi-flow Temporal Graph Learning77
Multisource Heterogeneous Specific Emitter Identification Using Attention Mechanism-Based RFF Fusion Method76
BDMMT: Backdoor Sample Detection for Language Models Through Model Mutation Testing76
PUF-Phenotype: A Robust and Noise-Resilient Approach to Aid Group-Based Authentication With DRAM-PUFs Using Machine Learning76
Robust Duality Learning for Unsupervised Visible-Infrared Person Re-Identification75
MPA: Lightweight and Updatable Integrity Auditing for Decentralized Storage Using Merkle Trees and Polynomial Commitments74
No Time for Remodulation: A PHY Steganographic Symbiotic Channel Over Constant Envelope72
Exploring Fine-Grained Representation and Recomposition for Cloth-Changing Person Re-Identification72
FACOS: Enabling Privacy Protection Through Fine-Grained Access Control With On-Chain and Off-Chain System71
Bidirectional Stackable Recurrent Generative Adversarial Imputation Network for Specific Emitter Missing Data Imputation70
Detecting Locally, Patching Globally: An End-to-End Framework for High Speed and Accurate Detection of Fingerprint Minutiae70
A General Purpose Data and Query Privacy Preserving Protocol for Wireless Sensor Networks69
Breaking the Trilemma: Toward Efficient, Privacy-Preserving, and Forward-Secure Data Sharing in the Post-Quantum Era69
Patronus : Plug-and-Play and Near-Lossless Facial Privacy Enhancement Against Reconstruction Attacks67
The Effect of Inverse Square Law of Light on ENF in Videos Exposed by Rolling Shutter65
SecBNN: Efficient Secure Inference on Binary Neural Networks65
Robustness Over Time: Understanding Adversarial Examples’ Effectiveness on Longitudinal Versions of Large Language Models64
Hamster: A Fast Synchronous Byzantine Fault Tolerant Protocol63
Attacking Mouse Dynamics Authentication Using Novel Wasserstein Conditional DCGAN63
MOJO: MOtion Pattern Learning and JOint-Based Fine-Grained Mining for Person Re-Identification Based on 4D LiDAR Point Clouds63
Corrections to “On the Security of a Revocable Cross-Domain Anonymous Authentication in IIoT”61
Optimal Privacy-Aware Stochastic Sampling61
SGBoost: An Efficient and Privacy-Preserving Vertical Federated Tree Boosting Framework61
Enhancing Model Generalization for Efficient Cross-Device Side-Channel Analysis60
Implicit Alignment-Based Cross-Modal Symbiotic Network for Text-to-Image Person Re-Identification60
Unknown Cyber Threat Discovery Empowered by Genetic Evolution Without Prior Knowledge60
Analyze and Improve Differentially Private Federated Learning: A Model Robustness Perspective59
Casper: A Causality-Inspired Defense With Confounder Against Label Inference Attacks in Vertical Split Federated Learning58
Mixed-Bit Sampling Marking: Toward Unifying Document Authentication in Copy-Sensitive Graphical Codes57
TrackPhish: A Multi-Embedding Attention-Enhanced 1D CNN Model for Phishing URL Detection56
Anonymous and Efficient (t, n)-Threshold Ownership Transfer for Cloud EMRs Auditing55
Fed-UGI: Federated Undersampling Learning Framework With Gini Impurity for Imbalanced Network Intrusion Detection55
The Lives of Others: Snooping on Smartphone Usage Behaviors via Attention-Enabled Multi-Channel Spatiotemporal Information Fusion55
The Implications of Insecure Use of Fonts Against PDF Documents and Web Pages55
Turritopsis: Practical Dynamic Asynchronous BFT55
G2V2former: Graph Guided Video Vision Transformer for Face Anti-Spoofing54
Multi-Key Similar Data Search on Encrypted Storage With Secure Pay-Per-Query54
Authentication of Copy Detection Patterns: A Pattern Reliability Based Approach54
Rethinking Cross-Table Quantization Step Estimation: From Global and Local Perspectives53
N Truths and a Lie: Consistency-Based Backdoor Defense for Vertical Federated Learning52
EARVP: Efficient Aggregation for Federated Learning With Robustness, Verifiability, and Privacy52
Semantic-Aware Adversarial Training for Reliable Deep Hashing Retrieval52
Revisiting the Masking Strategy: A Side-Channel Attack on CRYSTALS-Kyber52
Breaking the Illusion: A Critical Study of Backdoor Defense in Federated Learning With Non-IID Data52
Assessing Text Classification Methods for Cyberbullying Detection on Social Media Platforms52
Privacy-Preserving Vertical Federated Learning With Tensor Decomposition for Data Missing Features52
Group-Wise Verifiable Coded Computing Under Byzantine Attacks and Stragglers52
Generative Adversarial Attacks Against Deep- Learning-Based Camera Model Identification52
Privacy-Enhancing Face Obfuscation Guided by Semantic-Aware Attribution Maps52
Using Graph Neural Networks to Improve Generalization Capability of the Models for Deepfake Detection51
Secure Model Aggregation Against Poisoning Attacks for Cross-Silo Federated Learning With Robustness and Fairness50
Verifying in the Dark: Verifiable Machine Unlearning by Using Invisible Backdoor Triggers50
BESA: Boosting Encoder Stealing Attack With Perturbation Recovery50
Data Quality Detection Mechanism Against Label Flipping Attacks in Federated Learning50
Privacy-Enhancing and Robust Backdoor Defense for Federated Learning on Heterogeneous Data49
Privacy-Aware and Security-Enhanced Efficient Matchmaking Encryption49
Efficient Streaming Voice Steganalysis in Challenging Detection Scenarios49
Customized Transformer Adapter With Frequency Masking for Deepfake Detection49
Robust Visible-Infrared Person Re-Identification Based on Polymorphic Mask and Wavelet Graph Convolutional Network48
Secure Acceleration of Aggregation Queries Over Homomorphically Encrypted Databases48
CMXsafe: A Proxy Layer for Securing Internet-of-Things Communications48
BABD: A Bitcoin Address Behavior Dataset for Pattern Analysis48
Thwarting GNN-Based Attacks Against Logic Locking48
Event-Triggered Model-Free Adaptive Predictive Control for Networked Wind-Power Microgrids Subject to Aperiodic DoS Attacks47
Adversarial Examples Against WiFi Fingerprint-Based Localization in the Physical World47
Bridging Lab and Industry: Practical SPA-GPT on Cryptosystems Boosted by LSTM and Simulated Annealing47
Attackers Are Not the Same! Unveiling the Impact of Feature Distribution on Label Inference Attacks47
GuessFuse: Hybrid Password Guessing With Multi-View46
Dangers Behind Charging VR Devices: Hidden Side Channel Attacks via Charging Cables46
Enhancing Resilience in Website Fingerprinting: Novel Adversary Strategies for Noisy Traffic Environments45
Online Two-Stage Channel-Based Lightweight Authentication Method for Time-Varying Scenarios45
FLGuardian: Defending Against Model Poisoning Attacks via Fine-Grained Detection in Federated Learning45
Detection of Unknown Attacks Through Encrypted Traffic: A Gaussian Prototype-Aided Variational Autoencoder Framework45
ABP-DKM: An Efficient Decentralized Key Management Scheme Based on Asymmetric Bivariate Polynomial45
Boosting Black-Box Attack to Deep Neural Networks With Conditional Diffusion Models44
Fast Propagation Is Better: Accelerating Single-Step Adversarial Training via Sampling Subnetworks44
Generalized Autonomous Path Proxy Re-Encryption Scheme to Support Branch Functionality44
Event-Triggered Data-Driven Control for Nonlinear Systems Under Frequency-Duration-Constrained DoS Attacks44
Secure Off-chain Payment Protocol from Ciphertext Unlinkable Autonomous Path Proxy Re-encryption in Blockchain44
Efficiently Achieving Privacy Preservation and Poisoning Attack Resistance in Federated Learning44
LSFL: A Lightweight and Secure Federated Learning Scheme for Edge Computing44
Palm Vein Recognition Under Unconstrained and Weak-Cooperative Conditions43
Occlusion-Aware Human Mesh Model-Based Gait Recognition43
SIa-CBc: Sensitive Intent-Assisted and Crucial Behavior-Cognized Malware Detection Based on Human Brain Cognitive Theory43
Building and Testing a Hidden-Password Online Password Manager42
Two-Round Certificateless Multi-Signatures With Key Aggregation in Smart Contracts42
Three-in-One: Robust Enhanced Universal Transferable Anti-Facial Retrieval in Online Social Networks42
A Canonical Data Transformation for Achieving Inter- and Within-Group Fairness42
Proactively Verifying Quantitative Network Policy Across Unsafe and Unreliable Environments42
Revisiting Prediction-Based Min-Entropy Estimation: Toward Interpretability, Reliability, and Applicability42
GTAE-IDS: Graph Transformer-Based Autoencoder Framework for Real-Time Network Intrusion Detection41
False-Positive-Free Wildcard Queries With Dual Wildcard Flexibility and Enhanced Efficiency41
Succinct Hash-Based Arbitrary-Range Proofs41
A Hierarchical Cooperative Authentication Protocol for Attack-Resilient UAV Swarms With Ultra-Low Overhead41
LtRFT: Mitigate the Low-Rate Data Plane DDoS Attack With Learning-To-Rank Enabled Flow Tables40
MaliVD: Source Code Vulnerability Localization via Attention-Based Multi-Modal Learning40
RegPalm: Toward Large-Scale Open-Set Palmprint Recognition by Reducing Pattern Variance40
K-GetNID: Knowledge-Guided Graphs for Early and Transferable Network Intrusion Detection40
Data-Driven Dynamic Periodic Event-Triggered Control of Cyber-Physical Systems Under Packet Dropouts and DoS Attacks40
CLIP-ADA: CLIP-Guided Artifact-Invariant Generalizable Synthetic Image Detection40
SCAFinder: Formal Verification of Cache Fine-Grained Features for Side Channel Detection40
Three-Player Game Theory and p-PCPSO for Defense Resource Allocation in Wireless Sensor Networks39
Secret Cracking and Security Enhancement for the Image Application of CRT-Based Secret Sharing39
Extracting Private Training Data in Federated Learning From Clients39
General Backdoor-Resilient Federated Learning via Multi-Armed Bandit-Based Knowledge Distillation39
ADIS: Detecting and Identifying Manipulated PLC Program Variables Using State-Aware Dependency Graph39
An Intelligent Reflecting Surface-Based Attack Scheme Against Dual-Functional Radar and Communication Systems39
SeIoT: Detecting Anomalous Semantics in Smart Homes via Knowledge Graph38
A Precoding Perturbation Method in Geometric Optimization: Exploring Manifold Structure for Privacy and Efficiency38
Dual-Granularity Contrastive Learning for DeepFake Detection38
GC-DRQN: Enhancing Radar Anti-Jamming Performance With Supervised Auxiliary Tasks and Deterministic Rewards38
Regression of Dense Distortion Field From a Single Fingerprint Image38
XIPHOS: Adaptive In-Vehicle Intrusion Detection via Unsupervised Graph Contrastive Learning38
Anti-Backdoor Model: A Novel Algorithm to Remove Backdoors in a Non-Invasive Way38
iCoding: Countermeasure Against Interference and Eavesdropping in Wireless Communications38
An Interpretable Generalization Mechanism for Accurately Detecting Anomaly and Identifying Networking Intrusion Techniques37
Wolverine: A Scalable and Transaction-Consistent Redactable Permissionless Blockchain37
Beyond Result Verification: Efficient Privacy-Preserving Spatial Keyword Query With Suppressed Leakage37
SepBIN: Binary Feature Separation for Better Semantic Comparison and Authorship Verification37
PCSF: Privacy-Preserving Content-Based Spam Filter37
Adversarial Semantic and Label Perturbation Attack for Pedestrian Attribute Recognition37
EVM-Shield: In-Contract State Access Control for Fast Vulnerability Detection and Prevention36
Revisiting Gradient Regularization: Inject Robust Saliency-Aware Weight Bias for Adversarial Defense36
Pilot Spoofing Attack on the Downlink of Cell-Free Massive MIMO: From the Perspective of Adversaries36
HELM: Navigating Homomorphic Encryption Through Gates and Lookup Tables36
BrainprintNet: A Multiscale Cross-Band Fusion Network for EEG-Based Brainprint Recognition36
Progressive Sub-Domain Information Mining for Single-Source Generalizable Gait Recognition35
A Federated Learning-Based Lightweight Network With Zero Trust for UAV Authentication35
Type2Branch: Keystroke Biometrics Based on a Dual-Branch Architecture With Attention Mechanisms and Set2set Loss35
A Multi-Scale Contrast Preserving Encoder-Decoder Architecture for Local Change Detection From Thermal Video Scenes35
Dual Sampling Based Causal Intervention for Face Anti-Spoofing With Identity Debiasing35
Game-Theoretic Neyman-Pearson Detection to Combat Strategic Evasion34
ColorVein: Colorful Cancelable Vein Biometrics34
Scanner-Hunter: An Effective ICS Scanning Group Identification System34
Balancing Wireless Sensing Performance and Privacy Protection With Multi-Antenna Systems34
ETD: An Efficient Time Delay Attack Detection Framework for UAV Networks34
FakeBench: Probing Explainable Fake Image Detection via Large Multimodal Models34
CELEST: Federated Learning for Globally Coordinated Threat Detection34
Exploring Bias in Sclera Segmentation Models: A Group Evaluation Approach34
Anchor-Based Multimodal Verification: A Dynamic Query Framework for Fake News Forensics in Short Videos34
Toward Automated Field Semantics Inference for Binary Protocol Reverse Engineering34
Lightweight Multi-User Public-Key Authenticated Encryption With Keyword Search34
Reinforcement Learning-Based Tracking Control for Networked Control Systems With DoS Attacks33
Lavida: Large-Universe, Verifiable, and Dynamic Fine-Grained Access Control for E-Health Cloud33
Binarizing Split Learning for Data Privacy Enhancement and Computation Reduction33
PriVDT: An Efficient Two-Party Cryptographic Framework for Vertical Decision Trees33
Blockchain-Enabled Computing Offloading and Resource Allocation in Multi-UAVs MEC Network: A Stackelberg Game Learning Approach33
BPVSE: Publicly Verifiable Searchable Encryption for Cloud-Assisted Electronic Health Records33
Fault Detection and Robust Security Control for Implicit Jump Systems Against Random FDI Attacks and Packet Loss Under Memorized Output-Perceptive Event-Triggered Protocol33
AuthScatter: Accurate, Robust, and Scalable Mutual Authentication in Physical Layer for Backscatter Communications33
More Granular, Less Trust: Enforcing Intra-Process Isolation With Arm CCA in an Untrusted Management Environment33
Leveraging Ensembles and Self-Supervised Learning for Fully-Unsupervised Person Re-Identification and Text Authorship Attribution32
Enabling Fraud Prediction on Preliminary Data Through Information Density Booster32
Privacy-Preserving Authentication for Unlinkable Avatars in the Metaverse32
Toward Mobile Palmprint Recognition via Multi-View Hierarchical Graph Learning32
ISTVT: Interpretable Spatial-Temporal Video Transformer for Deepfake Detection32
Logit Margin Matters: Improving Transferable Targeted Adversarial Attack by Logit Calibration32
Detecting Lifecycle-Related Concurrency Bugs in ROS Programs via Coverage-Guided Fuzzing31
Towards Patch-Based Noise Compression for Adversarial Attack Against Transformer-Based Visual Tracking31
One Trigger, Multiple Victims: Clean-Label Neighborhood Backdoor Attacks on Graph Neural Networks31
Quantization Noise as an Asset: Optimizing Physical Layer Security With Sigma-Delta Modulation31
Online Writer Retrieval With Chinese Handwritten Phrases: A Synergistic Temporal-Frequency Representation Learning Approach31
Joint Holistic and Masked Face Recognition31
PowerGuard: Using Power Side-Channel Signals to Secure Motion Controllers in ICS31
Encrypted and Compressed Key-Value Store With Pattern-Analysis Security in Cloud Systems31
Breaking XOR Arbiter PUFs With Chosen Challenge Attack31
DOEPatch: Dynamically Optimized Ensemble Model for Adversarial Patches Generation30
Reinforcement Learning-Based Efficient Multi-Exit Neural Networks Against Side-Channel Attacks30
Balanced Encoding of Near-Zero Correlation for an AES Implementation30
AuditPCH: Auditable Payment Channel Hub With Privacy Protection30
PPGloVe: Privacy-Preserving GloVe for Training Word Vectors in the Dark30
RTrap: Trapping and Containing Ransomware With Machine Learning30
MalPacDetector: An LLM-Based Malicious NPM Package Detector30
Copyright Protection of General Information via Simulation Task Supervision30
Titan: Security Analysis of Large-Scale Hardware Obfuscation Using Graph Neural Networks30
Lightweight Dynamic Conjunctive Keyword Searchable Encryption With Result Pattern Hiding30
Nighttime Person Re-Identification via Collaborative Enhancement Network With Multi-Domain Learning30
TRacer: Scalable Graph-Based Transaction Tracing for Account-Based Blockchain Trading Systems30
Bitcoin-Compatible Privacy-Preserving Multi-Party Payment Channels Supporting Variable Amounts30
An Efficient and Verifiable Encrypted Data Filtering Framework Over Large-Scale Storage in Cloud Edge30
Angle and Distance Discrimination by Utilizing Frequency Conversion Capability of STC-IRS for Covert Communications30
CoSwinVIT: A Vision Transformer for Enhanced Uniform Spectrum Response in Specific Emitter Identification30
Signed Latent Factors for Spamming Activity Detection30
SecureReID: Privacy-Preserving Anonymization for Person Re-Identification29
Bi-Stream Coteaching Network for Weakly-Supervised Deepfake Localization in Videos29
Comments on “Privacy-Enhanced Federated Learning Against Poisoning Adversaries”29
Intrusion Detection for Internet of Things: An Anchor Graph Clustering Approach29
Joint Transmissive and Reflective RIS-Aided Secure MIMO Systems Design Under Spatially-Correlated Angular Uncertainty and Coupled PSEs29
Comparing Different Membership Inference Attacks With a Comprehensive Benchmark29
Consensus Labeling: Prompt-Guided Clustering Refinement for Weakly Supervised Text-Based Person Re-Identification29
Everything Under Control: Secure Data Sharing Mechanism for Cloud-Edge Computing29
The Chosen-Object Attack: Exploiting the Hungarian Matching Loss in Detection Transformers for Fun and Profit29
TFMD: General and Fast Secure Neural Network Inference Framework with Threshold FHE29
Multi-Antenna Signal Masking and Round-Trip Transmission for Privacy-Preserving Wireless Sensing29
Optimal Client Selection of Federated Learning Based on Compressed Sensing29
Words Strip Wardrobe: Learning Invariant Textual Prompts for Cloth-Changing Person Re-Identification29
Privacy-Preserving, Efficient, and Accurate Dimensionality Reduction29
Specific Emitter Identification via Sparse Bayesian Learning Versus Model-Agnostic Meta-Learning28
A Synthetic Data-Assisted Satellite Terrestrial Integrated Network Intrusion Detection Framework28
Efficient Verifiable Protocol for Privacy-Preserving Aggregation in Federated Learning28
The Dark Forest: Understanding Security Risks of Cross-Party Delegated Resources in Mobile App-in-App Ecosystems28
Data-Agnostic Model Poisoning Against Federated Learning: A Graph Autoencoder Approach28
Healthcare Security: Post-Quantum Continuous Authentication With Behavioral Biometrics Using Vector Similarity Search28
ProVFL: Property Inference Attacks Against Vertical Federated Learning28
Disentangled Representation Learning for Robust Brainprint Recognition28
Intra-Domain Knowledge Reuse Assisted Reinforcement Learning for Fast Anti-Jamming Communication28
DP-Norm: Differential Privacy Primal-Dual Algorithm for Decentralized Federated Learning28
TMVS: Threshold-based Majority Voting Scheme for Robust SRAM PUFs28
GuardBox: A High-Performance Middlebox Providing Confidentiality and Integrity for Packets27
Multi-Temporal Partitioned Graph Attention Networks for Financial Fraud Detection27
ASRL: Adaptive Swarm Reinforcement Learning for Enhanced OSN Intrusion Detection27
Divide and Conquer: Frequency-Aware Contrastive Adversarial Training for Robust Point Cloud Classification27
DUAP: Disentanglement-Based Universal Adversarial Perturbations for Robust Multilingual Speech Privacy Protection27
Secure and Privacy-Preserving Distributed Kalman Filtering for Sensor Networks With Event-Triggered Mechanism27
0.14060997962952