IEEE Transactions on Information Forensics and Security

Papers
(The median citation count of IEEE Transactions on Information Forensics and Security is 5. The table below lists those papers that are above that threshold based on CrossRef citation counts [max. 250 papers]. The publications cover those that have been published in the past four years, i.e., from 2022-01-01 to 2026-01-01.)
ArticleCitations
Attention-SA: Exploiting Model-Approximated Data Semantics for Adversarial Attack275
CR-DAP: A Comprehensive and Regulatory Decentralized Anonymous Payment System245
A Note on “Secure and Efficient Outsourcing of PCA-Based Face Recognition”224
A Decentralized Threshold Credential Management With Fine-Grained Authentication for VANETs216
Reinforcement Learning-Based Personalized Differentially Private Federated Learning148
Learnable Prompts With Neighbor-Aware Correction for Text-Based Person Search145
PCSR: Enabling Cross-Modal Semantic Retrieval With Privacy Preservation130
SF2Net: Sequence Feature Fusion Network for Palmprint Verification124
Low Complexity Byzantine-Resilient Federated Learning123
sBugChecker: A Systematic Framework for Detecting Solidity Compiler-Introduced Bugs121
Toward Automatic Heap Exploit Generation by Using Heap Layout Constraints on Binary Programs120
Minipatch: Undermining DNN-Based Website Fingerprinting With Adversarial Patches117
Owner-Enabled Secure Authorized Keyword Search Over Encrypted Data With Flexible Metadata112
Uncoordinated Syntactic Privacy: A New Composable Metric for Multiple, Independent Data Publishing106
SSME: A Semi-Supervised Specific Emitter Identification Method With Manifold Enhancement104
Multi-User Beam Training and Transmission Design for Covert Millimeter-Wave Communication102
BatchAuth: A Physical Layer Batch Authentication Scheme for Multiple Backscatter Devices102
Traceable and Collision-Resilient Differential Privacy99
Enhancing Federated Learning With Differentially Private Continuous Data Release via k -Ary Trees98
High Resolution Fingerprint Retrieval Based on Pore Indexing and Graph Comparison97
CleanerCLIP: Fine-Grained Counterfactual Semantic Augmentation for Backdoor Defense in Contrastive Learning95
Beyond Access Pattern: Efficient Volume-Hiding Multi-Range Queries Over Outsourced Data Services95
Citywide Multi-Step Crime Prediction via Context-Aware Bayesian Tensor Decomposition94
On Message Authentication Channel Capacity Over a Wiretap Channel94
Outlier-Resistant Non-Fragile Control of Nonlinear Networked Systems Under DoS Attacks and Multi-Variable Event-Triggered SC Protocol94
Double-Layered Dual-Syndrome Trellis Codes Utilizing Channel Knowledge for Robust Steganography94
M 3 -ReID: Unifying Multi-View, Granularity, and Modality for Video-Based Visible-Infrared Person Re-Identification93
Across-Platform Detection of Malicious Cryptocurrency Accounts via Interaction Feature Learning92
ROBY: A Byzantine-Robust and Privacy-Preserving Serverless Federated Learning Framework91
TCPP: Achieving Privacy-Preserving Trajectory Correlation With Differential Privacy90
A Secure Encoding Mechanism Against Deception Attacks on Multisensor Remote State Estimation90
Exploring Fine-Grained Representation and Recomposition for Cloth-Changing Person Re-Identification89
PUF-Phenotype: A Robust and Noise-Resilient Approach to Aid Group-Based Authentication With DRAM-PUFs Using Machine Learning87
FADE: A Dataset for Detecting Falling Objects Around Buildings in Video85
Exploiting the Adversarial Example Vulnerability of Transfer Learning of Source Code84
Transformer Based Defense GAN Against Palm-Vein Adversarial Attacks83
Stealthy Backdoors as Compression Artifacts82
Practical Multi-Party Private Set Intersection Protocols82
BDMMT: Backdoor Sample Detection for Language Models Through Model Mutation Testing82
Multisource Heterogeneous Specific Emitter Identification Using Attention Mechanism-Based RFF Fusion Method81
FVFSNet: Frequency-Spatial Coupling Network for Finger Vein Authentication79
Resource Allocation for STAR-RIS-Assisted MIMO Physical-Layer Key Generation79
Decision-Based Adversarial Attack With Frequency Mixup79
Seeing Traffic Paths: Encrypted Traffic Classification With Path Signature Features78
Robust Duality Learning for Unsupervised Visible-Infrared Person Re-Identification78
No Time for Remodulation: A PHY Steganographic Symbiotic Channel Over Constant Envelope76
SecBNN: Efficient Secure Inference on Binary Neural Networks75
Unknown Cyber Threat Discovery Empowered by Genetic Evolution Without Prior Knowledge75
Attackers Are Not the Same! Unveiling the Impact of Feature Distribution on Label Inference Attacks75
Bidirectional Stackable Recurrent Generative Adversarial Imputation Network for Specific Emitter Missing Data Imputation75
Revisiting the Masking Strategy: A Side-Channel Attack on CRYSTALS-Kyber75
On the Impact of Pollution Attacks on Coding-Based Distributed Storage Systems74
The Implications of Insecure Use of Fonts Against PDF Documents and Web Pages74
Implicit Alignment-Based Cross-Modal Symbiotic Network for Text-to-Image Person Re-Identification74
Turritopsis: Practical Dynamic Asynchronous BFT72
G2V2former: Graph Guided Video Vision Transformer for Face Anti-Spoofing71
Enhancing Model Generalization for Efficient Cross-Device Side-Channel Analysis69
Hamster: A Fast Synchronous Byzantine Fault Tolerant Protocol69
Mixed-Bit Sampling Marking: Toward Unifying Document Authentication in Copy-Sensitive Graphical Codes67
Generalized Autonomous Path Proxy Re-Encryption Scheme to Support Branch Functionality67
Corrections to “On the Security of a Revocable Cross-Domain Anonymous Authentication in IIoT”66
Authentication of Copy Detection Patterns: A Pattern Reliability Based Approach66
CMXsafe: A Proxy Layer for Securing Internet-of-Things Communications65
Dangers Behind Charging VR Devices: Hidden Side Channel Attacks via Charging Cables65
MOJO: MOtion Pattern Learning and JOint-Based Fine-Grained Mining for Person Re-Identification Based on 4D LiDAR Point Clouds65
GuessFuse: Hybrid Password Guessing With Multi-View65
Efficient Streaming Voice Steganalysis in Challenging Detection Scenarios64
ABP-DKM: An Efficient Decentralized Key Management Scheme Based on Asymmetric Bivariate Polynomial64
Online Two-Stage Channel-Based Lightweight Authentication Method for Time-Varying Scenarios64
Palm Vein Recognition Under Unconstrained and Weak-Cooperative Conditions64
TrackPhish: A Multi-Embedding Attention-Enhanced 1D CNN Model for Phishing URL Detection63
Group-Wise Verifiable Coded Computing Under Byzantine Attacks and Stragglers63
Multi-Key Similar Data Search on Encrypted Storage With Secure Pay-Per-Query63
Thwarting GNN-Based Attacks Against Logic Locking62
EARVP: Efficient Aggregation for Federated Learning With Robustness, Verifiability, and Privacy62
Generative Adversarial Attacks Against Deep- Learning-Based Camera Model Identification62
Optimal Privacy-Aware Stochastic Sampling61
Attacking Mouse Dynamics Authentication Using Novel Wasserstein Conditional DCGAN61
Anonymous and Efficient (t, n)-Threshold Ownership Transfer for Cloud EMRs Auditing61
Customized Transformer Adapter With Frequency Masking for Deepfake Detection60
Enhancing Resilience in Website Fingerprinting: Novel Adversary Strategies for Noisy Traffic Environments60
SIa-CBc: Sensitive Intent-Assisted and Crucial Behavior-Cognized Malware Detection Based on Human Brain Cognitive Theory60
The Lives of Others: Snooping on Smartphone Usage Behaviors via Attention-Enabled Multi-Channel Spatiotemporal Information Fusion59
Detection of Unknown Attacks Through Encrypted Traffic: A Gaussian Prototype-Aided Variational Autoencoder Framework59
Analyze and Improve Differentially Private Federated Learning: A Model Robustness Perspective59
BABD: A Bitcoin Address Behavior Dataset for Pattern Analysis59
Privacy-Enhancing and Robust Backdoor Defense for Federated Learning on Heterogeneous Data59
Privacy-Preserving Vertical Federated Learning With Tensor Decomposition for Data Missing Features58
Boosting Black-Box Attack to Deep Neural Networks With Conditional Diffusion Models58
Everybody’s Talkin’: Let Me Talk as You Want58
Event-Triggered Data-Driven Control for Nonlinear Systems Under Frequency-Duration-Constrained DoS Attacks58
Fed-UGI: Federated Undersampling Learning Framework With Gini Impurity for Imbalanced Network Intrusion Detection58
Detecting Locally, Patching Globally: An End-to-End Framework for High Speed and Accurate Detection of Fingerprint Minutiae57
A General Purpose Data and Query Privacy Preserving Protocol for Wireless Sensor Networks57
Adversarial RL-Based IDS for Evolving Data Environment in 6LoWPAN56
NoLeaks: Differentially Private Causal Discovery Under Functional Causal Model56
Semantic-Aware Adversarial Training for Reliable Deep Hashing Retrieval56
SGBoost: An Efficient and Privacy-Preserving Vertical Federated Tree Boosting Framework55
Breaking the Illusion: A Critical Study of Backdoor Defense in Federated Learning With Non-IID Data55
Fast Propagation Is Better: Accelerating Single-Step Adversarial Training via Sampling Subnetworks54
Occlusion-Aware Human Mesh Model-Based Gait Recognition54
Privacy-Enhancing Face Obfuscation Guided by Semantic-Aware Attribution Maps53
Adversarial Examples Against WiFi Fingerprint-Based Localization in the Physical World53
FACOS: Enabling Privacy Protection Through Fine-Grained Access Control With On-Chain and Off-Chain System53
Privacy-Aware and Security-Enhanced Efficient Matchmaking Encryption53
Breaking the Trilemma: Toward Efficient, Privacy-Preserving, and Forward-Secure Data Sharing in the Post-Quantum Era52
Using Graph Neural Networks to Improve Generalization Capability of the Models for Deepfake Detection51
Patronus : Plug-and-Play and Near-Lossless Facial Privacy Enhancement Against Reconstruction Attacks50
Robust Visible-Infrared Person Re-Identification Based on Polymorphic Mask and Wavelet Graph Convolutional Network50
The Effect of Inverse Square Law of Light on ENF in Videos Exposed by Rolling Shutter50
FLGuardian: Defending Against Model Poisoning Attacks via Fine-Grained Detection in Federated Learning50
On Covert Communication Performance With Outdated CSI in Wireless Greedy Relay Systems49
Privacy-Preserved Distributed Learning With Zeroth-Order Optimization48
Secure Model Aggregation Against Poisoning Attacks for Cross-Silo Federated Learning With Robustness and Fairness48
Efficiently Achieving Privacy Preservation and Poisoning Attack Resistance in Federated Learning48
Data Quality Detection Mechanism Against Label Flipping Attacks in Federated Learning48
Verifying in the Dark: Verifiable Machine Unlearning by Using Invisible Backdoor Triggers48
LSFL: A Lightweight and Secure Federated Learning Scheme for Edge Computing47
BESA: Boosting Encoder Stealing Attack With Perturbation Recovery47
Reinforcement Learning Enabled Intelligent Energy Attack in Green IoT Networks47
PCSF: Privacy-Preserving Content-Based Spam Filter47
Assessing Text Classification Methods for Cyberbullying Detection on Social Media Platforms47
Three-in-One: Robust Enhanced Universal Transferable Anti-Facial Retrieval in Online Social Networks47
SCAFinder: Formal Verification of Cache Fine-Grained Features for Side Channel Detection46
Proactively Verifying Quantitative Network Policy Across Unsafe and Unreliable Environments46
Game-Theoretic Neyman-Pearson Detection to Combat Strategic Evasion46
FakeBench: Probing Explainable Fake Image Detection via Large Multimodal Models45
Building and Testing a Hidden-Password Online Password Manager45
Type2Branch: Keystroke Biometrics Based on a Dual-Branch Architecture With Attention Mechanisms and Set2set Loss45
AuthScatter: Accurate, Robust, and Scalable Mutual Authentication in Physical Layer for Backscatter Communications45
A Canonical Data Transformation for Achieving Inter- and Within-Group Fairness45
Revisiting Prediction-Based Min-Entropy Estimation: Toward Interpretability, Reliability, and Applicability45
Succinct Hash-Based Arbitrary-Range Proofs44
Regression of Dense Distortion Field From a Single Fingerprint Image44
Anti-Backdoor Model: A Novel Algorithm to Remove Backdoors in a Non-Invasive Way44
False-Positive-Free Wildcard Queries With Dual Wildcard Flexibility and Enhanced Efficiency43
Two-Round Certificateless Multi-Signatures With Key Aggregation in Smart Contracts43
PriVDT: An Efficient Two-Party Cryptographic Framework for Vertical Decision Trees43
Toward Mobile Palmprint Recognition via Multi-View Hierarchical Graph Learning42
XIPHOS: Adaptive In-Vehicle Intrusion Detection via Unsupervised Graph Contrastive Learning42
A Hierarchical Cooperative Authentication Protocol for Attack-Resilient UAV Swarms With Ultra-Low Overhead42
Data-Driven Dynamic Periodic Event-Triggered Control of Cyber-Physical Systems Under Packet Dropouts and DoS Attacks42
Three-Player Game Theory and p-PCPSO for Defense Resource Allocation in Wireless Sensor Networks42
ColorVein: Colorful Cancelable Vein Biometrics42
CELEST: Federated Learning for Globally Coordinated Threat Detection42
Smart App Attack: Hacking Deep Learning Models in Android Apps42
RegPalm: Toward Large-Scale Open-Set Palmprint Recognition by Reducing Pattern Variance42
iCoding: Countermeasure Against Interference and Eavesdropping in Wireless Communications42
A Precoding Perturbation Method in Geometric Optimization: Exploring Manifold Structure for Privacy and Efficiency42
Revisiting Gradient Regularization: Inject Robust Saliency-Aware Weight Bias for Adversarial Defense42
An Opportunistic Power Control Scheme for Mitigating User Location Tracking Attacks in Cellular Networks42
Beyond Result Verification: Efficient Privacy-Preserving Spatial Keyword Query With Suppressed Leakage41
An Intelligent Reflecting Surface-Based Attack Scheme Against Dual-Functional Radar and Communication Systems41
LiSiam: Localization Invariance Siamese Network for Deepfake Detection41
ADIS: Detecting and Identifying Manipulated PLC Program Variables Using State-Aware Dependency Graph41
Logit Margin Matters: Improving Transferable Targeted Adversarial Attack by Logit Calibration41
More Granular, Less Trust: Enforcing Intra-Process Isolation With Arm CCA in an Untrusted Management Environment41
HELM: Navigating Homomorphic Encryption Through Gates and Lookup Tables40
BPVSE: Publicly Verifiable Searchable Encryption for Cloud-Assisted Electronic Health Records40
Secret Cracking and Security Enhancement for the Image Application of CRT-Based Secret Sharing40
A Federated Learning-Based Lightweight Network With Zero Trust for UAV Authentication40
Lightweight Multi-User Public-Key Authenticated Encryption With Keyword Search40
Fault Detection and Robust Security Control for Implicit Jump Systems Against Random FDI Attacks and Packet Loss Under Memorized Output-Perceptive Event-Triggered Protocol40
Synchronized Provable Data Possession Based on Blockchain for Digital Twin40
Blockchain-Enabled Computing Offloading and Resource Allocation in Multi-UAVs MEC Network: A Stackelberg Game Learning Approach39
A Multi-Scale Contrast Preserving Encoder-Decoder Architecture for Local Change Detection From Thermal Video Scenes39
GTAE-IDS: Graph Transformer-Based Autoencoder Framework for Real-Time Network Intrusion Detection39
ETD: An Efficient Time Delay Attack Detection Framework for UAV Networks39
Scanner-Hunter: An Effective ICS Scanning Group Identification System39
Extracting Private Training Data in Federated Learning From Clients39
ISTVT: Interpretable Spatial-Temporal Video Transformer for Deepfake Detection39
Fast Privacy-Preserving Text Classification Based on Secure Multiparty Computation38
Progressive Sub-Domain Information Mining for Single-Source Generalizable Gait Recognition38
Exploring Bias in Sclera Segmentation Models: A Group Evaluation Approach38
SeIoT: Detecting Anomalous Semantics in Smart Homes via Knowledge Graph38
EVM-Shield: In-Contract State Access Control for Fast Vulnerability Detection and Prevention38
SepBIN: Binary Feature Separation for Better Semantic Comparison and Authorship Verification38
GC-DRQN: Enhancing Radar Anti-Jamming Performance With Supervised Auxiliary Tasks and Deterministic Rewards38
Dual Sampling Based Causal Intervention for Face Anti-Spoofing With Identity Debiasing38
An Interpretable Generalization Mechanism for Accurately Detecting Anomaly and Identifying Networking Intrusion Techniques37
Toward Automated Field Semantics Inference for Binary Protocol Reverse Engineering37
K-GetNID: Knowledge-Guided Graphs for Early and Transferable Network Intrusion Detection37
Reinforcement Learning-Based Tracking Control for Networked Control Systems With DoS Attacks37
Three Birds With One Stone: User Intention Understanding and Influential Neighbor Disclosure for Injection Attack Detection37
General Backdoor-Resilient Federated Learning via Multi-Armed Bandit-based Knowledge Distillation37
Wolverine: A Scalable and Transaction-Consistent Redactable Permissionless Blockchain37
Binarizing Split Learning for Data Privacy Enhancement and Computation Reduction37
Multi-Antenna Signal Masking and Round-Trip Transmission for Privacy-Preserving Wireless Sensing36
AuditPCH: Auditable Payment Channel Hub With Privacy Protection36
LtRFT: Mitigate the Low-Rate Data Plane DDoS Attack With Learning-To-Rank Enabled Flow Tables36
Optimal Client Selection of Federated Learning Based on Compressed Sensing36
Balanced Encoding of Near-Zero Correlation for an AES Implementation36
Pilot Spoofing Attack on the Downlink of Cell-Free Massive MIMO: From the Perspective of Adversaries36
ProVFL: Property Inference Attacks Against Vertical Federated Learning36
Disentangled Representation Learning for Robust Brainprint Recognition36
Lavida: Large-Universe, Verifiable, and Dynamic Fine-Grained Access Control for E-Health Cloud36
Lightweight Dynamic Conjunctive Keyword Searchable Encryption With Result Pattern Hiding35
Angle and Distance Discrimination by Utilizing Frequency Conversion Capability of STC-IRS for Covert Communications35
Titan: Security Analysis of Large-Scale Hardware Obfuscation Using Graph Neural Networks35
Joint Holistic and Masked Face Recognition35
Quantization Noise as an Asset: Optimizing Physical Layer Security With Sigma-Delta Modulation35
MalPacDetector: An LLM-Based Malicious NPM Package Detector35
Reinforcement Learning-Based Efficient Multi-Exit Neural Networks Against Side-Channel Attacks35
CoSwinVIT: A Vision Transformer for Enhanced Uniform Spectrum Response in Specific Emitter Identification35
Detecting Lifecycle-Related Concurrency Bugs in ROS Programs via Coverage-Guided Fuzzing35
Enabling Fraud Prediction on Preliminary Data Through Information Density Booster35
Joint Transmissive and Reflective RIS-Aided Secure MIMO Systems Design Under Spatially-Correlated Angular Uncertainty and Coupled PSEs34
The Dark Forest: Understanding Security Risks of Cross-Party Delegated Resources in Mobile App-in-App Ecosystems34
Bitcoin-Compatible Privacy-Preserving Multi-Party Payment Channels Supporting Variable Amounts34
Data-Agnostic Model Poisoning Against Federated Learning: A Graph Autoencoder Approach34
DOEPatch: Dynamically Optimized Ensemble Model for Adversarial Patches Generation34
Enabling Efficient and Strong Privacy-Preserving Truth Discovery in Mobile Crowdsensing34
PPGloVe: Privacy-Preserving GloVe for Training Word Vectors in the Dark34
Bi-Stream Coteaching Network for Weakly-Supervised Deepfake Localization in Videos33
Intrusion Detection for Internet of Things: An Anchor Graph Clustering Approach33
Nighttime Person Re-Identification via Collaborative Enhancement Network With Multi-Domain Learning33
Comparing Different Membership Inference Attacks With a Comprehensive Benchmark33
PowerGuard: Using Power Side-Channel Signals to Secure Motion Controllers in ICS33
Privacy-Preserving Authentication for Unlinkable Avatars in the Metaverse33
Specific Emitter Identification via Sparse Bayesian Learning Versus Model-Agnostic Meta-Learning32
Online Writer Retrieval With Chinese Handwritten Phrases: A Synergistic Temporal-Frequency Representation Learning Approach32
Analog Secret Sharing With Applications to Private Distributed Learning32
Leveraging Ensembles and Self-Supervised Learning for Fully-Unsupervised Person Re-Identification and Text Authorship Attribution32
An Efficient and Verifiable Encrypted Data Filtering Framework Over Large-Scale Storage in Cloud Edge32
Libras: A Fair, Secure, Verifiable, and Scalable Outsourcing Computation Scheme Based on Blockchain32
Revealing the Secrets of Radio Embedded Systems: Extraction of Raw Information via RF32
Words Strip Wardrobe: Learning Invariant Textual Prompts for Cloth-Changing Person Re-Identification32
Everything Under Control: Secure Data Sharing Mechanism for Cloud-Edge Computing32
Collaborative Honeypot Defense in UAV Networks: A Learning-Based Game Approach32
A Synthetic Data-Assisted Satellite Terrestrial Integrated Network Intrusion Detection Framework32
Encrypted and Compressed Key-Value Store With Pattern-Analysis Security in Cloud Systems32
Signed Latent Factors for Spamming Activity Detection32
Copyright Protection of General Information via Simulation Task Supervision32
Towards Patch-based Noise Compression for Adversarial Attack against Transformer-based Visual Tracking31
Efficient Verifiable Protocol for Privacy-Preserving Aggregation in Federated Learning31
An Efficient Identity-Based Provable Data Possession Protocol With Compressed Cloud Storage31
RTrap: Trapping and Containing Ransomware With Machine Learning31
TRacer: Scalable Graph-Based Transaction Tracing for Account-Based Blockchain Trading Systems31
APIVADS: A Novel Privacy-Preserving Pivot Attack Detection Scheme Based on Statistical Pattern Recognition31
Breaking XOR Arbiter PUFs With Chosen Challenge Attack31
Privacy-Preserving Aggregation-Authentication Scheme for Safety Warning System in Fog-Cloud Based VANET31
Healthcare Security: Post-Quantum Continuous Authentication With Behavioral Biometrics Using Vector Similarity Search31
DP-Norm: Differential Privacy Primal-Dual Algorithm for Decentralized Federated Learning31
Divide and Conquer: Frequency-Aware Contrastive Adversarial Training for Robust Point Cloud Classification30
SecureReID: Privacy-Preserving Anonymization for Person Re-Identification30
Toward Secure and Verifiable Hybrid Federated Learning30
GraphBGP: BGP Anomaly Detection Based on Dynamic Graph Learning30
TIM: Enabling Large-Scale White-Box Testing on In-App Deep Learning Models30
Parallel PAM for Secure Transmission30
Fine-Grained Question-Level Deception Detection via Graph-Based Learning and Cross-Modal Fusion30
0.16560792922974