IEEE Transactions on Information Forensics and Security

Papers
(The median citation count of IEEE Transactions on Information Forensics and Security is 1. The table below lists those papers that are above that threshold based on CrossRef citation counts [max. 250 papers]. The publications cover those that have been published in the past four years, i.e., from 2021-02-01 to 2025-02-01.)
ArticleCitations
Selective Staining on Non-Volatile Memory Cells for Data Retrieval134
Quantum-Safe HIBE: Does It Cost a Latte?104
Adversarial Attacks on Scene Graph Generation98
A Machine Learning-Based Digital Twin for Anti-Counterfeiting Applications With Copy Detection Patterns82
Query Correlation Attack against Searchable Symmetric Encryption with Supporting for Conjunctive Queries70
SMSSE: Size-pattern Mitigation Searchable Symmetric Encryption66
Semantic Entropy Can Simultaneously Benefit Transmission Efficiency and Channel Security of Wireless Semantic Communications61
Panther: Practical Secure Two-Party Neural Network Inference60
Physical-Layer Key Generation Efficient Beamspace Adaptations in 5G New Radio59
Parameter Interpolation Adversarial Training for Robust Image Classification58
Homomorphic Matrix Operations Under Bicyclic Encoding56
Enhancing Leakage Prevention for MapReduce53
Lattice-Based Group Signatures With Time-Bound Keys via Redactable Signatures52
Component-Based Attention for Large-Scale Trademark Retrieval51
Attacking Delay-Based PUFs With Minimal Adversarial Knowledge50
Attention-SA: Exploiting Model-Approximated Data Semantics for Adversarial Attack49
Indelible “Footprints” of Inaudible Command Injection48
Scalable Universal Adversarial Watermark Defending Against Facial Forgery48
SAMCU: Secure and Anonymous Multi-Channel Updates in Payment Channel Networks47
Privacy-Preserving Byzantine-Robust Federated Learning via Blockchain Systems46
One Parameter Defense—Defending Against Data Inference Attacks via Differential Privacy46
ForgeryNIR: Deep Face Forgery and Detection in Near-Infrared Scenario45
Improving Generalization by Commonality Learning in Face Forgery Detection45
Debiasing Android Malware Datasets: How Can I Trust Your Results If Your Dataset Is Biased?45
RL and Fingerprinting to Select Moving Target Defense Mechanisms for Zero-Day Attacks in IoT44
Multisource Heterogeneous Specific Emitter Identification Using Attention Mechanism-Based RFF Fusion Method44
A Residual-Driven Secure Transmission and Detection Approach Against Stealthy Cyber-Physical Attacks for Accident Prevention43
Efficient Audio Steganography Using Generalized Audio Intrinsic Energy With Micro-Amplitude Modification Suppression42
Seeing Traffic Paths: Encrypted Traffic Classification With Path Signature Features41
Client-Side Embedding of Screen-Shooting Resilient Image Watermarking41
Invisible Geolocation Signature Extraction From a Single Image40
Two-Factor Authenticated Key Exchange From Biometrics With Low Entropy Rates40
Solving Small Exponential ECDLP in EC-Based Additively Homomorphic Encryption and Applications40
AutoPwn: Artifact-Assisted Heap Exploit Generation for CTF PWN Competitions39
Owner-Enabled Secure Authorized Keyword Search Over Encrypted Data With Flexible Metadata38
GAZETA: GAme-Theoretic ZEro-Trust Authentication for Defense Against Lateral Movement in 5G IoT Networks38
PERCE: A Permissioned Redactable Credentials Scheme for a Period of Membership37
Holistic Feature Reconstruction-Based 3-D Attention Mechanism for Cross-Spectral Periocular Recognition37
Secure Transmission in NOMA-Aided Multiuser Visible Light Communication Broadcasting Network With Cooperative Precoding Design36
Enhancing Malware Classification via Self-Similarity Techniques36
Attacks on Acceleration-Based Secure Device Pairing With Automatic Visual Tracking36
A Differentially Private Framework for Deep Learning With Convexified Loss Functions36
AG-NAS: An Attention GRU-Based Neural Architecture Search for Finger-Vein Recognition36
Toward Dual-View X-Ray Baggage Inspection: A Large-Scale Benchmark and Adaptive Hierarchical Cross Refinement for Prohibited Item Discovery35
List of Reviewers35
On the Impact of Voice Anonymization on Speech Diagnostic Applications: A Case Study on COVID-19 Detection35
Detection of Spoofing Attacks in Aeronautical Ad-Hoc Networks Using Deep Autoencoders34
FCD-Net: Learning to Detect Multiple Types of Homologous Deepfake Face Images34
Eddystone-EID: Secure and Private Infrastructural Protocol for BLE Beacons34
Estimating Fingerprint Pose via Dense Voting34
Quaternary Quantized Gaussian Modulation With Optimal Polarity Map Selection for JPEG Steganography34
On Message Authentication Channel Capacity Over a Wiretap Channel32
Privacy-Preserving Split Learning for Large-Scaled Vision Pre-Training31
FVFSNet: Frequency-Spatial Coupling Network for Finger Vein Authentication31
Learning Compact Multirepresentation Feature Descriptor for Finger-Vein Recognition31
Minimalism is King! High-Frequency Energy-Based Screening for Data-Efficient Backdoor Attacks30
Causal Learning for Robust Specific Emitter Identification Over Unknown Channel Statistics30
Fuzzy Linguistic Knowledge Reasoning-Based Secure Control for Connected Nonlinear Servosystem30
Prototype Correction via Contrastive Augmentation for Few-Shot Unconstrained Palmprint Recognition29
TMG-GAN: Generative Adversarial Networks-Based Imbalanced Learning for Network Intrusion Detection29
Generative Imperceptible Attack With Feature Learning Bias Reduction and Multi-Scale Variance Regularization29
Safe Multi-Agent Reinforcement Learning for Wireless Applications Against Adversarial Communications28
On the Limits of Covert Backscatter Communication Over Undecodable Ambient Signals28
Secure and Efficient User-Centric V2C Communication for Intelligent Cyber-Physical Transportation System27
EC-SVC: Secure CAN Bus In-Vehicle Communications With Fine-Grained Access Control Based on Edge Computing27
Using Highly Compressed Gradients in Federated Learning for Data Reconstruction Attacks27
PVD-FL: A Privacy-Preserving and Verifiable Decentralized Federated Learning Framework27
CSI-RFF: Leveraging Micro-Signals on CSI for RF Fingerprinting of Commodity WiFi26
Mobile Contactless Palmprint Recognition: Use of Multiscale, Multimodel Embeddings26
Noncoherent Massive MIMO With Embedded One-Way Function Physical Layer Security26
Fregata: Fast Private Inference With Unified Secure Two-Party Protocols26
A Deep Reinforcement Learning-Based Deception Asset Selection Algorithm in Differential Games26
Identity-Based Encryption With Disjunctive, Conjunctive and Range Keyword Search From Lattices26
STDA: Secure Time Series Data Analytics With Practical Efficiency in Wide-Area Network25
Information Embedding With Stegotext Reconstruction25
Divergence-Driven Consistency Training for Semi-Supervised Facial Age Estimation25
Height and Punishment: Toward Accountable IoT Blockchain With Network Sanitization24
BAGM: A Backdoor Attack for Manipulating Text-to-Image Generative Models24
Transfer-Path-Based Hardware-Reuse Strong PUF Achieving Modeling Attack Resilience With200 Million Training CRPs24
Anchor Link Prediction for Cross-Network Digital Forensics From Local and Global Perspectives24
Fair and Secure 5G and Wi-Fi Coexistence Using Robust Implicit Channel Coordination24
On the Security of Privacy-Enhanced Authentication Protocol for Federated Learning in VANETs23
To Act or Not to Act: An Adversarial Game for Securing Vehicle Platoons23
Analysis of Challenge-Response Authentication With Reconfigurable Intelligent Surfaces23
High Resolution Fingerprint Retrieval Based on Pore Indexing and Graph Comparison23
Split Aggregation: Lightweight Privacy-Preserving Federated Learning Resistant to Byzantine Attacks23
IEEE Transactions on Information Forensics and Security publication information23
Identifying Cross-User Privacy Leakage in Mobile Mini-Apps at a Large Scale23
A Case-Control Study to Measure Behavioral Risks of Malware Encounters in Organizations22
Unstoppable Attack: Label-Only Model Inversion Via Conditional Diffusion Model22
BDMMT: Backdoor Sample Detection for Language Models Through Model Mutation Testing22
Cyber-AnDe: Cybersecurity Framework With Adaptive Distributed Sampling for Anomaly Detection on SDNs22
DeCloak: Enable Secure and Cheap Multi-Party Transactions on Legacy Blockchains by a Minimally Trusted TEE Network22
ReLOAD: Using Reinforcement Learning to Optimize Asymmetric Distortion for Additive Steganography21
Optimal False Data Injection Attack Against Load-Frequency Control in Power Systems21
Compact Provenance Scheme Through Packet Path Index Differences in WSNs21
Similarity Distance Learning on SPD Manifold for Writer Independent Offline Signature Verification21
Content-Aware Detection of Temporal Metadata Manipulation21
Cross-Modal Learning Based Flexible Bimodal Biometric Authentication With Template Protection21
CBSeq: A Channel-Level Behavior Sequence for Encrypted Malware Traffic Detection21
Detection and Mitigation of Position Spoofing Attacks on Cooperative UAV Swarm Formations21
Space-Time Line Code Hopping for Physical-Layer Secure Communications21
Collecting Partial Ordered Data With Local Differential Privacy21
Polarization Fingerprint-Based LoRaWAN Physical Layer Authentication20
Classification Utility, Fairness, and Compactness via Tunable Information Bottleneck and Rényi Measures20
Vulnerability Analysis of Distributed State Estimator Under False Data Injection Attacks20
SecKNN: FSS-Based Secure Multi-Party KNN Classification Under General Distance Functions20
A Manifold Consistency Interpolation Method of Poisoning Attacks Against Semi-Supervised Model20
Multi-Domain Virtual Network Embedding Algorithm Based on Horizontal Federated Learning20
Self-Supervised Recovery and Guide for Low-Resolution Person Re-Identification20
Screening Least Square Technique Assisted Multivariate Template Attack Against the Random Polynomial Generation of Dilithium20
A Low-Calculation Contactless Continuous Authentication Based on Postural Transition20
Double-Layered Dual-Syndrome Trellis Codes Utilizing Channel Knowledge for Robust Steganography20
Verifiable Arbitrary Queries With Zero Knowledge Confidentiality in Decentralized Storage19
TCPP: Achieving Privacy-Preserving Trajectory Correlation With Differential Privacy19
TANTRA: Timing-Based Adversarial Network Traffic Reshaping Attack19
Optimal Selfish Mining-Based Denial-of-Service Attack19
A Practical Deceptive Jamming Method Based on Vulnerable Location Awareness Adversarial Attack for Radar HRRP Target Recognition19
Universal Heterogeneous Face Analysis via Multi-Domain Feature Disentanglement19
Physical Layer Authentication Based on Channel Polarization Response in Dual-Polarized Antenna Communication Systems19
A Novel Earprint: Stimulus-Frequency Otoacoustic Emission for Biometric Recognition19
Audio Splicing Detection and Localization Based on Acquisition Device Traces18
HODA: Hardness-Oriented Detection of Model Extraction Attacks18
Phase-Aggregated Dual-Branch Network for Efficient Fingerprint Dense Registration18
RAPP: Reversible Privacy Preservation for Various Face Attributes18
A Lightweight Certificateless Multi-User Matchmaking Encryption for Mobile Devices: Enhancing Security and Performance18
Adaptive Differentially Quantized Subspace Perturbation (ADQSP): A Unified Framework for Privacy-Preserving Distributed Average Consensus18
Verifiable and Redactable Blockchains With Fully Editing Operations18
Secure-Reliable Transmission Designs for Full-Duplex Receiver With Finite-Alphabet Inputs18
CP-IPFE: Ciphertext-Policy Based Inner Product Functional Encryption18
PRIDN: A Privacy Preserving Data Sharing on Named Data Networking18
OblivGM: Oblivious Attributed Subgraph Matching as a Cloud Service18
Efficient Privacy-Preserving Logistic Model With Malicious Security18
Attribute-Based Hierarchical Access Control With Extendable Policy18
ASIA: A Federated Boosting Tree Model Against Sequence Inference Attacks in Financial Networks18
Robust Motion Planning for Multi-Robot Systems Against Position Deception Attacks18
A Multi-Sensor-Based Switching Event-Triggered Mechanism for Synchronization Control of Markovian Jump Neural Networks Under DoS Attacks17
PFLF: Privacy-Preserving Federated Learning Framework for Edge Computing17
Multi-User Beam Training and Transmission Design for Covert Millimeter-Wave Communication17
Fully Symmetrical Obfuscated Interconnection and Weak-PUF-Assisted Challenge Obfuscation Strong PUFs Against Machine-Learning Modeling Attacks17
Combing Multiple Visual Stimuli to Enhance the Performance of VEP-Based Biometrics17
Identity-Based Group Encryption With Keyword Search Against Keyword Guessing Attack17
Fine-Grained Open-Set Deepfake Detection via Unsupervised Domain Adaptation17
Comments on “PassBio: Privacy-Preserving User-Centric Biometric Authentication”17
Extremal Mechanisms for Pointwise Maximal Leakage17
Controlled Redactable Blockchain Based on T-Times Chameleon Hash and Signature17
Backdoor Attack With Sparse and Invisible Trigger16
Differential Pricing Strategies for Bandwidth Allocation With LFA Resilience: A Stackelberg Game Approach16
PUF-Phenotype: A Robust and Noise-Resilient Approach to Aid Group-Based Authentication With DRAM-PUFs Using Machine Learning16
Gradient Leakage Attack Resilient Deep Learning16
Secure Multiantenna Transmission With an Unknown Eavesdropper: Power Allocation and Secrecy Outage Analysis16
Vulnerability of State-of-the-Art Face Recognition Models to Template Inversion Attack16
Audio Multi-View Spoofing Detection Framework Based on Audio-Text-Emotion Correlations16
A Smart Digital Twin Enabled Security Framework for Vehicle-to-Grid Cyber-Physical Systems16
PRBFPT: A Practical Redactable Blockchain Framework With a Public Trapdoor16
Survivability Analysis of IoT Systems Under Resource Exhausting Attacks16
MalPatch: Evading DNN-Based Malware Detection With Adversarial Patches16
Uncertainty-Aware Face Embedding With Contrastive Learning for Open-Set Evaluation16
CBACS: A Privacy-Preserving and Efficient Cache-Based Access Control Scheme for Software Defined Vehicular Networks15
Mutual Adversarial Training: Learning Together is Better Than Going Alone15
A Secure Encoding Mechanism Against Deception Attacks on Multisensor Remote State Estimation15
Circumferential Local Ternary Pattern: New and Efficient Feature Descriptors for Anti-Counterfeiting Pattern Identification15
A Multi-Modal Vertical Federated Learning Framework Based on Homomorphic Encryption15
Secure Cloud-Assisted Data Pub/Sub Service With Fine-Grained Bilateral Access Control15
Heavy Hitter Identification Over Large-Domain Set-Valued Data With Local Differential Privacy15
DsDTW: Local Representation Learning With Deep soft-DTW for Dynamic Signature Verification15
SOCI: A Toolkit for Secure Outsourced Computation on Integers15
Outlier-Resistant Non-Fragile Control of Nonlinear Networked Systems Under DoS Attacks and Multi-Variable Event-Triggered SC Protocol15
SAGE: Steering the Adversarial Generation of Examples With Accelerations15
Reconfigurable Intelligent Surface-Assisted Passive Beamforming Attack15
Distortion Model-Based Spectral Augmentation for Generalized Recaptured Document Detection15
TrueWatch: Polygraph Examination With Smartwatches15
Fast Locally Optimal Detection of Targeted Universal Adversarial Perturbations15
Decision-Based Adversarial Attack With Frequency Mixup15
PhishSim: Aiding Phishing Website Detection With a Feature-Free Tool15
Secure Full Duplex Integrated Sensing and Communications15
Exploring Fine-Grained Representation and Recomposition for Cloth-Changing Person Re-Identification15
Bool Network: An Open, Distributed, Secure Cross-Chain Notary Platform15
How to Disturb Network Reconnaissance: A Moving Target Defense Approach Based on Deep Reinforcement Learning14
Practical Multi-Party Private Set Intersection Protocols14
LSFM: Light Style and Feature Matching for Efficient Cross-Domain Palmprint Recognition14
ADVERT: An Adaptive and Data-Driven Attention Enhancement Mechanism for Phishing Prevention14
Toward a Critical Evaluation of Robustness for Deep Learning Backdoor Countermeasures14
Optimized Privacy-Preserving CNN Inference With Fully Homomorphic Encryption14
Stealthy Backdoors as Compression Artifacts14
Minipatch: Undermining DNN-Based Website Fingerprinting With Adversarial Patches14
BatchAuth: A Physical Layer Batch Authentication Scheme for Multiple Backscatter Devices14
Differentially Private Federated Learning With an Adaptive Noise Mechanism14
Enhanced Few-Shot Malware Traffic Classification via Integrating Knowledge Transfer With Neural Architecture Search14
Radar 2: Passive Spy Radar Detection and Localization Using COTS mmWave Radar14
Query-Efficient Adversarial Attack With Low Perturbation Against End-to-End Speech Recognition Systems14
Verifiable Blind Quantum Computation With Identity Authentication for Multi-Type Clients14
Attack-Resilient Optimal PMU Placement via Reinforcement Learning Guided Tree Search in Smart Grids14
STAR-RIS-Assisted-Full-Duplex Jamming Design for Secure Wireless Communications System13
Privacy Passport: Privacy-Preserving Cross-Domain Data Sharing13
LCMA: A Novel Lightweight Continuous Message Authentication for Cyber-Physical System13
Write+Sync: Software Cache Write Covert Channels Exploiting Memory-Disk Synchronization13
Variable-Modulation Specific Emitter Identification With Domain Adaptation13
Hard Adversarial Example Mining for Improving Robust Fairness13
A New Global Measure to Simultaneously Evaluate Data Utility and Privacy Risk13
Multi-Level Resource-Coherented Graph Learning for Website Fingerprinting Attacks13
Reconnaissance-Strike Complex: A Network-layer Solution to the Natural Forking in Blockchain13
A Unified Framework for Biphasic Facial Age Translation With Noisy-Semantic Guided Generative Adversarial Networks13
Amplitude-Varying Perturbation for Balancing Privacy and Utility in Federated Learning13
IdentifierIDS: A Practical Voltage-Based Intrusion Detection System for Real In-Vehicle Networks13
A Note on “Secure and Efficient Outsourcing of PCA-Based Face Recognition”13
Privacy-Preserving Localization for Underwater Acoustic Sensor Networks: A Differential Privacy-Based Deep Learning Approach13
Learning Temporal Similarity of Remote Photoplethysmography for Fast 3D Mask Face Presentation Attack Detection13
ECUPrint—Physical Fingerprinting Electronic Control Units on CAN Buses Inside Cars and SAE J1939 Compliant Vehicles13
Detection of False Data Injection Attacks in Smart Grids: An Optimal Transport-Based Reliable Self-Training Approach13
Transformer Based Defense GAN Against Palm-Vein Adversarial Attacks12
STAR-RIS-Enabled Secure Dual-Functional Radar-Communications: Joint Waveform and Reflective Beamforming Optimization12
Privacy-Encoded Federated Learning Against Gradient-Based Data Reconstruction Attacks12
Resource Allocation for STAR-RIS-Assisted MIMO Physical-Layer Key Generation12
FlexBNN: Fast Private Binary Neural Network Inference With Flexible Bit-Width12
Synthetic ID Card Image Generation for Improving Presentation Attack Detection12
Robust Moving Target Defence Against False Data Injection Attacks in Power Grids12
Dual-Branch Meta-Learning Network With Distribution Alignment for Face Anti-Spoofing12
Exploiting the Adversarial Example Vulnerability of Transfer Learning of Source Code12
List of Reviewers12
Guided Adversarial Contrastive Distillation for Robust Students12
MFAE: Masked Frequency Autoencoders for Domain Generalization Face Anti-Spoofing12
F2Trans: High-Frequency Fine-Grained Transformer for Face Forgery Detection12
Reinforcement Learning Solution for Cyber-Physical Systems Security Against Replay Attacks12
Attentive and Contrastive Image Manipulation Localization With Boundary Guidance12
Graph-Signal-to-Graph Matching for Network De-Anonymization Attacks12
Toward Personal Data Sharing Autonomy: A Task-Driven Data Capsule Sharing System12
NTRU+: Compact Construction of NTRU Using Simple Encoding Method12
VCD-FL: Verifiable, Collusion-Resistant, and Dynamic Federated Learning12
Low Complexity Byzantine-Resilient Federated Learning11
Mean Estimation of Numerical Data Under (ϵ,δ) -Utility-Optimized Local Differential Privacy11
Learnability of Optical Physical Unclonable Functions Through the Lens of Learning With Errors11
DRFormer: A Discriminable and Reliable Feature Transformer for Person Re-Identification11
PointNCBW: Toward Dataset Ownership Verification for Point Clouds via Negative Clean-Label Backdoor Watermark11
Robust Duality Learning for Unsupervised Visible-Infrared Person Re-Identification11
Privacy-Preserving Probabilistic Data Encoding for IoT Data Analysis11
Jamming and Eavesdropping Defense Scheme Based on Deep Reinforcement Learning in Autonomous Vehicle Networks11
The Analysis of Encrypted Video Stream Based on Low-dimensional Embedding Method11
Enhancing Ethereum Fraud Detection via Generative and Contrastive Self-Supervision11
TSR-ABE: Traceable and Server-Aided Revocable Ciphertext-Policy Attribute-Based Encryption Under Static Assumptions11
FedMUA: Exploring the Vulnerabilities of Federated Learning to Malicious Unlearning Attacks11
Trace Alignment Preprocessing in Side-Channel Analysis Using the Adaptive Filter11
Reinforcement Learning-Based Personalized Differentially Private Federated Learning11
DPNM: A Differential Private Notary Mechanism for Privacy Preservation in Cross-chain Transactions11
MBBFAuth: Multimodal Behavioral Biometrics Fusion for Continuous Authentication on Non-Portable Devices11
Provable Privacy Advantages of Decentralized Federated Learning via Distributed Optimization11
Minimizing Malware Propagation in Internet of Things Networks: An Optimal Control Using Feedback Loop Approach11
Dynamic event-triggered control for leader-following consensus of nonlinear multi-agent systems against malicious attacks11
IMPRINTS: Mitigating Watermark Removal Attacks With Defensive Watermarks11
Federated Radio Frequency Fingerprint Identification Powered by Unsupervised Contrastive Learning11
0.13406991958618