IEEE Transactions on Information Forensics and Security

Papers
(The TQCC of IEEE Transactions on Information Forensics and Security is 11. The table below lists those papers that are above that threshold based on CrossRef citation counts [max. 250 papers]. The publications cover those that have been published in the past four years, i.e., from 2020-04-01 to 2024-04-01.)
ArticleCitations
Visible-Infrared Person Re-Identification via Homogeneous Augmented Tri-Modal Learning167
Combining Graph-Based Learning With Automated Data Collection for Code Vulnerability Detection114
VAE-Stega: Linguistic Steganography Based on Variational Auto-Encoder113
Smart and Practical Privacy-Preserving Data Aggregation for Fog-Based Smart Grids108
Accurate Decentralized Application Identification via Encrypted Traffic Analysis Using Graph Neural Networks105
Towards Scalable and Channel-Robust Radio Frequency Fingerprint Identification for LoRa100
Improving Physical Layer Security of Uplink NOMA via Energy Harvesting Jammers99
A Siamese CNN for Image Steganalysis99
Privacy-Enhanced Federated Learning Against Poisoning Adversaries91
VeriFL: Communication-Efficient and Fast Verifiable Aggregation for Federated Learning89
An Automatic Cost Learning Framework for Image Steganography Using Deep Reinforcement Learning86
MTD-Net: Learning to Detect Deepfakes Images by Multi-Scale Texture Difference77
Towards Transferable Adversarial Attack Against Deep Face Recognition75
Unsupervised Adversarial Domain Adaptation for Cross-Domain Face Presentation Attack Detection74
Functionality-Preserving Black-Box Optimization of Adversarial Windows Malware74
Secure and Lightweight Conditional Privacy-Preserving Authentication for Securing Traffic Emergency Messages in VANETs70
A Performance-Sensitive Malware Detection System Using Deep Learning on Mobile Devices66
Radio Frequency Fingerprint Identification for Narrowband Systems, Modelling and Classification64
Privacy–Enhancing Face Biometrics: A Comprehensive Survey64
Secrecy Rate Optimization for Intelligent Reflecting Surface Assisted MIMO System62
Attribute-Aligned Domain-Invariant Feature Learning for Unsupervised Domain Adaptation Person Re-Identification61
Privacy-Preserving Object Detection for Medical Images With Faster R-CNN60
Privacy-Preserving Localization for Underwater Sensor Networks via Deep Reinforcement Learning59
PolyShard: Coded Sharding Achieves Linearly Scaling Efficiency and Security Simultaneously58
ShieldFL: Mitigating Model Poisoning Attacks in Privacy-Preserving Federated Learning58
Face Anti-Spoofing via Adversarial Cross-Modality Translation56
Covert Wireless Communications Under Quasi-Static Fading With Channel Uncertainty55
Image Tampering Localization Using a Dense Fully Convolutional Network54
Privacy-Preserving Aggregation-Authentication Scheme for Safety Warning System in Fog-Cloud Based VANET53
Fine-Grained Webpage Fingerprinting Using Only Packet Length Information of Encrypted Traffic53
Physical Layer Security Enhancement With Reconfigurable Intelligent Surface-Aided Networks53
Privacy-Preserving Byzantine-Robust Federated Learning via Blockchain Systems53
Dynamic Tri-Level Relation Mining With Attentive Graph for Visible Infrared Re-Identification52
Learning One Class Representations for Face Presentation Attack Detection Using Multi-Channel Convolutional Neural Networks52
Specific Emitter Identification Based on Multi-Level Sparse Representation in Automatic Identification System51
Self-Configurable Cyber-Physical Intrusion Detection for Smart Homes Using Reinforcement Learning50
DRL-FAS: A Novel Framework Based on Deep Reinforcement Learning for Face Anti-Spoofing49
APMSA: Adversarial Perturbation Against Model Stealing Attacks47
SMAKA: Secure Many-to-Many Authentication and Key Agreement Scheme for Vehicular Networks46
Secure Dynamic Searchable Symmetric Encryption With Constant Client Storage Cost45
Joint Optimization of Trajectory, Propulsion, and Thrust Powers for Covert UAV-on-UAV Video Tracking and Surveillance45
Multi-Agent Reinforcement Learning-Based Buffer-Aided Relay Selection in IRS-Assisted Secure Cooperative Networks44
Beam-Domain Anti-Jamming Transmission for Downlink Massive MIMO Systems: A Stackelberg Game Perspective43
De-Pois: An Attack-Agnostic Defense against Data Poisoning Attacks43
Deep Hashing for Secure Multimodal Biometrics43
Reinforcement Learning-Based Physical-Layer Authentication for Controller Area Networks42
Fingerprint Spoof Detector Generalization42
Physical-Layer Authentication Using Multiple Channel-Based Features42
Random Partitioning Forest for Point-Wise and Collective Anomaly Detection—Application to Network Intrusion Detection42
A Generalizable Model-and-Data Driven Approach for Open-Set RFF Authentication42
Jamming and Eavesdropping Defense Scheme Based on Deep Reinforcement Learning in Autonomous Vehicle Networks42
Dynamic Multi-Key FHE in Asymmetric Key Setting From LWE41
Learning Meta Pattern for Face Anti-Spoofing40
Evaluation of the Time Stability and Uniqueness in PPG-Based Biometric System39
Improving Generalization by Commonality Learning in Face Forgery Detection39
Fine-Grained Facial Expression Recognition in the Wild39
Contrastive Context-Aware Learning for 3D High-Fidelity Mask Face Presentation Attack Detection39
Enabling Cross-Chain Transactions: A Decentralized Cryptocurrency Exchange Protocol39
Mockingbird: Defending Against Deep-Learning-Based Website Fingerprinting Attacks With Adversarial Traces39
Person Re-Identification by Context-Aware Part Attention and Multi-Head Collaborative Learning38
Gini-Impurity Index Analysis38
Robust Image Forgery Detection Against Transmission Over Online Social Networks38
Block-Wise Image Transformation With Secret Key for Adversarially Robust Defense38
Explicit Optimization of min max Steganographic Game38
PFA-GAN: Progressive Face Aging With Generative Adversarial Network37
An Explainable AI-Based Intrusion Detection System for DNS Over HTTPS (DoH) Attacks37
Multi-Scale and Multi-Direction GAN for CNN-Based Single Palm-Vein Identification37
Who Is in Control? Practical Physical Layer Attack and Defense for mmWave-Based Sensing in Autonomous Vehicles37
Comparison of Statistical and Machine Learning Techniques for Physical Layer Authentication36
OBFP: Optimized Blockchain-Based Fair Payment for Outsourcing Computations in Cloud Computing36
SecureFace: Face Template Protection36
K-Time Modifiable and Epoch-Based Redactable Blockchain36
Model Inversion Attack by Integration of Deep Generative Models: Privacy-Sensitive Face Generation From a Face Recognition System35
Hunting Vulnerable Smart Contracts via Graph Embedding Based Bytecode Matching35
DOReN: Toward Efficient Deep Convolutional Neural Networks with Fully Homomorphic Encryption35
Morphing Attack Detection-Database, Evaluation Platform, and Benchmarking35
Towards Query-Efficient Adversarial Attacks Against Automatic Speech Recognition Systems34
The P-DESTRE: A Fully Annotated Dataset for Pedestrian Detection, Tracking, and Short/Long-Term Re-Identification From Aerial Devices34
Preventing DeepFake Attacks on Speaker Authentication by Dynamic Lip Movement Analysis34
Adversarial XAI Methods in Cybersecurity33
FA-GAN: Face Augmentation GAN for Deformation-Invariant Face Recognition33
Look Locally Infer Globally: A Generalizable Face Anti-Spoofing Approach33
DeepSBD: A Deep Neural Network Model With Attention Mechanism for SocialBot Detection32
Relational Deep Feature Learning for Heterogeneous Face Recognition32
P2BA: A Privacy-Preserving Protocol With Batch Authentication Against Semi-Trusted RSUs in Vehicular Ad Hoc Networks32
An SDN-Enabled Proactive Defense Framework for DDoS Mitigation in IoT Networks32
Redactable Blockchain in Decentralized Setting31
Conditional Variational Auto-Encoder and Extreme Value Theory Aided Two-Stage Learning Approach for Intelligent Fine-Grained Known/Unknown Intrusion Detection31
Injecting Reliable Radio Frequency Fingerprints Using Metasurface for the Internet of Things31
C2CL: Contact to Contactless Fingerprint Matching31
On the Security of Reversible Data Hiding in Encrypted Images by MSB Prediction31
Everybody’s Talkin’: Let Me Talk as You Want31
Log-Based Anomaly Detection With Robust Feature Extraction and Online Learning30
FakeLocator: Robust Localization of GAN-Based Face Manipulations30
A Differentially Private Game Theoretic Approach for Deceiving Cyber Adversaries29
Co-Design of Observer-Based Fault Detection Filter and Dynamic Event-Triggered Controller for Wind Power System Under Dual Alterable DoS Attacks29
Walking on the Edge: Fast, Low-Distortion Adversarial Examples29
Can We Trust Your Explanations? Sanity Checks for Interpreters in Android Malware Analysis29
Nowhere to Hide: Efficiently Identifying Probabilistic Cloning Attacks in Large-Scale RFID Systems29
High-Fidelity Face Manipulation With Extreme Poses and Expressions29
Copy Move Source-Target Disambiguation Through Multi-Branch CNNs29
Sum Secret Key Rate Maximization for TDD Multi-User Massive MIMO Wireless Networks29
Self-Adversarial Training Incorporating Forgery Attention for Image Forgery Localization29
On Maximizing the Sum Secret Key Rate for Reconfigurable Intelligent Surface-Assisted Multiuser Systems29
The Best Defense Is a Good Offense: Adversarial Attacks to Avoid Modulation Detection29
Stealthy MTD Against Unsupervised Learning-Based Blind FDI Attacks in Power Systems28
CALPA-NET: Channel-Pruning-Assisted Deep Residual Network for Steganalysis of Digital Images28
Stealing Neural Network Structure Through Remote FPGA Side-Channel Analysis28
Cooperative Assurance of Cache Data Integrity for Mobile Edge Computing28
Public-Key Authenticated Encryption With Keyword Search Supporting Constant Trapdoor Generation and Fast Search28
Finger Vein Recognition via Sparse Reconstruction Error Constrained Low-Rank Representation27
Brain-Inspired Golden Chip Free Hardware Trojan Detection27
Joint Discriminative Sparse Coding for Robust Hand-Based Multimodal Recognition27
Modelling Behavioural Dynamics for Asymmetric Application Layer DDoS Detection27
CruParamer: Learning on Parameter-Augmented API Sequences for Malware Detection27
Camera Invariant Feature Learning for Generalized Face Anti-Spoofing26
Deep Neural Backdoor in Semi-Supervised Learning: Threats and Countermeasures26
Multi-Level Reversible Data Anonymization via Compressive Sensing and Data Hiding26
PVD-FL: A Privacy-Preserving and Verifiable Decentralized Federated Learning Framework26
RF Impairment Model-Based IoT Physical-Layer Identification for Enhanced Domain Generalization26
Pilot Contamination Attack Detection for 5G MmWave Grant-Free IoT Networks26
Surface and Internal Fingerprint Reconstruction From Optical Coherence Tomography Through Convolutional Neural Network26
Data-Driven Decision Support for Optimizing Cyber Forensic Investigations26
Detect and Locate: Exposing Face Manipulation by Semantic- and Noise-Level Telltales26
Stop-and-Go: Exploring Backdoor Attacks on Deep Reinforcement Learning-Based Traffic Congestion Control Systems26
On Pilot Spoofing Attack in Massive MIMO Systems: Detection and Countermeasure25
Joint Beam Training and Data Transmission Design for Covert Millimeter-Wave Communication25
VulDetector: Detecting Vulnerabilities Using Weighted Feature Graph Comparison25
3PAA: A Private PUF Protocol for Anonymous Authentication25
Physical Layer Secure MIMO Communications Against Eavesdroppers With Arbitrary Number of Antennas24
SAP-SSE: Protecting Search Patterns and Access Patterns in Searchable Symmetric Encryption24
Generalized Likelihood Ratio Test for GNSS Spoofing Detection in Devices With IMU24
One Parameter Defense—Defending Against Data Inference Attacks via Differential Privacy24
Adaptive Multi-Trace Carving for Robust Frequency Tracking in Forensic Applications24
Robust Beamforming Design for Covert Communications24
Multiuser MIMO Concept for Physical Layer Security in Multibeam Satellite Systems23
UNSAIL: Thwarting Oracle-Less Machine Learning Attacks on Logic Locking23
Blockchain-Enabled Authenticated Key Agreement Scheme for Mobile Vehicles-Assisted Precision Agricultural IoT Networks23
Learning Joint and Specific Patterns: A Unified Sparse Representation for Off-the-Person ECG Biometric Recognition23
Event-Triggered Interval-Based Anomaly Detection and Attack Identification Methods for an In-Vehicle Network23
Nelder-Mead Simplex Channel Estimation for the RF-DNA Fingerprinting of OFDM Transmitters Under Rayleigh Fading Conditions23
Semi-Supervised Natural Face De-Occlusion23
Synchronized Provable Data Possession Based on Blockchain for Digital Twin23
Rethinking Smart Contract Fuzzing: Fuzzing With Invocation Ordering and Important Branch Revisiting23
Privacy-Aware Time-Series Data Sharing With Deep Reinforcement Learning23
Exploiting Channel Gain and Phase Noise for PHY-Layer Authentication in Massive MIMO Systems23
Learning Multi-Granularity Temporal Characteristics for Face Anti-Spoofing22
Detecting Overlapped Objects in X-Ray Security Imagery by a Label-Aware Mechanism22
Transform Domain-Based Invertible and Lossless Secret Image Sharing With Authentication22
Artificial Noise-Aided MIMO Physical Layer Authentication With Imperfect CSI22
Generative Adversarial Attacks Against Deep-Learning-Based Camera Model Identification22
Achieving Privacy-Preserving and Verifiable Support Vector Machine Training in the Cloud22
A Transfer Learning Approach for Securing Resource-Constrained IoT Devices22
Efficient Steganography in JPEG Images by Minimizing Performance of Optimal Detector22
Zero-Forcing Beamforming for Active and Passive Eavesdropper Mitigation in Visible Light Communication Systems22
One Cycle Attack: Fool Sensor-Based Personal Gait Authentication With Clustering22
Robust Iris Presentation Attack Detection Fusing 2D and 3D Information22
Efficient Dropout-Resilient Aggregation for Privacy-Preserving Machine Learning22
Copula-Based Analysis of Physical Layer Security Performances Over Correlated Rayleigh Fading Channels22
Effective and Robust Physical-World Attacks on Deep Learning Face Recognition Systems22
Efficient Quantum Blockchain With a Consensus Mechanism QDPoS22
Gendered Differences in Face Recognition Accuracy Explained by Hairstyles, Makeup, and Facial Morphology22
On the Physical Layer Security of Untrusted Millimeter Wave Relaying Networks: A Stochastic Geometry Approach21
Server-Aided Bilateral Access Control for Secure Data Sharing With Dynamic User Groups21
Enhanced Secrecy Performance of Multihop IoT Networks With Cooperative Hybrid-Duplex Jamming21
FiFTy: Large-Scale File Fragment Type Identification Using Convolutional Neural Networks21
ISTVT: Interpretable Spatial-Temporal Video Transformer for Deepfake Detection21
PulseEdit: Editing Physiological Signals in Facial Videos for Privacy Protection21
Dual Adversarial Disentanglement and Deep Representation Decorrelation for NIR-VIS Face Recognition21
Study of Pre-Processing Defenses Against Adversarial Attacks on State-of-the-Art Speaker Recognition Systems21
Valkyrie: Vulnerability Assessment Tool and Attack for Provably-Secure Logic Locking Techniques21
Secure Automatic Speaker Verification (SASV) System Through sm-ALTP Features and Asymmetric Bagging21
Periocular-Assisted Multi-Feature Collaboration for Dynamic Iris Recognition21
A Privacy-Preserving Online Ride-Hailing System Without Involving a Third Trusted Server21
Practical Multi-Party Private Set Intersection Protocols21
A3GAN: An Attribute-Aware Attentive Generative Adversarial Network for Face Aging21
TRACE: Enterprise-Wide Provenance Tracking for Real-Time APT Detection21
Robust Secure Beamforming for Intelligent Reflecting Surface Assisted Full-Duplex MISO Systems21
A New Adversarial Embedding Method for Enhancing Image Steganography21
Redactable Blockchain From Decentralized Chameleon Hash Functions20
Efficient and Privacy-Preserving Multi-Party Skyline Queries Over Encrypted Data20
Multi-Channel Remote Photoplethysmography Correspondence Feature for 3D Mask Face Presentation Attack Detection20
Secure and Efficient Multi-Signature Schemes for Fabric: An Enterprise Blockchain Platform20
On the Physical Layer Security of the Cooperative Rate-Splitting-Aided Downlink in UAV Networks20
Hierarchical Frequency-Assisted Interactive Networks for Face Manipulation Detection20
Treating Interference as Noise Is Optimal for Covert Communication Over Interference Channels20
PAST-AI: Physical-Layer Authentication of Satellite Transmitters via Deep Learning20
LiSiam: Localization Invariance Siamese Network for Deepfake Detection20
Personal Privacy Protection via Irrelevant Faces Tracking and Pixelation in Video Live Streaming20
ForgeryNIR: Deep Face Forgery and Detection in Near-Infrared Scenario20
Secure Frequency Control of Hybrid Power System Under DoS Attacks via Lie Algebra19
MAAD-Face: A Massively Annotated Attribute Dataset for Face Images19
A Dataset and Benchmark for Multimodal Biometric Recognition Based on Fingerprint and Finger Vein19
PFLF: Privacy-Preserving Federated Learning Framework for Edge Computing19
Enabling Efficient Spatial Keyword Queries on Encrypted Data With Strong Security Guarantees19
Memory-Modulated Transformer Network for Heterogeneous Face Recognition19
FLCert: Provably Secure Federated Learning Against Poisoning Attacks19
Understanding Failures in Security Proofs of Multi-Factor Authentication for Mobile Devices19
Integrating Part-Object Relationship and Contrast for Camouflaged Object Detection19
UGaitNet: Multimodal Gait Recognition With Missing Input Modalities19
Insider Threat Modeling: An Adversarial Risk Analysis Approach19
Achieving Covert Wireless Communication With a Multi-Antenna Relay19
Masked Relation Learning for DeepFake Detection19
Secure Millimeter-Wave Ad Hoc Communications Using Physical Layer Security19
Iris Liveness Detection Using a Cascade of Dedicated Deep Learning Networks18
Rate-Splitting Multiple Access for Communications and Jamming in Multi-Antenna Multi-Carrier Cognitive Radio Systems18
PriScore: Blockchain-Based Self-Tallying Election System Supporting Score Voting18
Depth as Attention for Face Representation Learning18
On Addressing the Impact of ISO Speed Upon PRNU and Forgery Detection18
A Framework for Predicting Data Breach Risk: Leveraging Dependence to Cope With Sparsity18
Physical-Layer Secret Key Generation via CQI-Mapped Spatial Modulation in Multi-Hop Wiretap Ad-Hoc Networks18
Optimizing Inner Product Masking Scheme by a Coding Theory Approach18
Detection of Message Injection Attacks Onto the CAN Bus Using Similarities of Successive Messages-Sequence Graphs18
Multi-Scale Gradients Self-Attention Residual Learning for Face Photo-Sketch Transformation18
Intrusion Detection Scheme With Dimensionality Reduction in Next Generation Networks18
Source Camera Verification for Strongly Stabilized Videos18
Duplicity Games for Deception Design With an Application to Insider Threat Mitigation18
Modern Privacy-Preserving Record Linkage Techniques: An Overview18
Attack-Resilient Optimal PMU Placement via Reinforcement Learning Guided Tree Search in Smart Grids18
A Practical Fog-Based Privacy-Preserving Online Car-Hailing Service System17
An Efficient Identity-Based Provable Data Possession Protocol With Compressed Cloud Storage17
Text Backdoor Detection Using an Interpretable RNN Abstract Model17
Dual-Branch Meta-Learning Network With Distribution Alignment for Face Anti-Spoofing17
GapFinder: Finding Inconsistency of Security Information From Unstructured Text17
Reversible Data Hiding Based on Adaptive Multiple Histograms Modification17
Detection of Electric Network Frequency in Audio Recordings–From Theory to Practical Detectors17
Modulation Classification Based on Fourth-Order Cumulants of Superposed Signal in NOMA Systems17
Behavior-Aware Account De-Anonymization on Ethereum Interaction Graph17
Designing Leakage-Resilient Password Entry on Head-Mounted Smart Wearable Glass Devices17
F2Trans: High-Frequency Fine-Grained Transformer for Face Forgery Detection17
AVoiD-DF: Audio-Visual Joint Learning for Detecting Deepfake17
Neural Network Modeling Attacks on Arbiter-PUF-Based Designs17
Natural Steganography in JPEG Domain With a Linear Development Pipeline17
Privacy-Preserving Distributed Processing: Metrics, Bounds and Algorithms17
On Joint Optimization of Automatic Speaker Verification and Anti-Spoofing in the Embedding Space17
Eye Know You Too: Toward Viable End-to-End Eye Movement Biometrics for User Authentication16
ROSE: Robust Searchable Encryption With Forward and Backward Security16
Secure Active and Passive Beamforming in IRS-Aided MIMO Systems16
Occlusion-Aware Human Mesh Model-Based Gait Recognition16
Automatic Segmentation and Enhancement of Latent Fingerprints Using Deep Nested UNets16
MBTree: Detecting Encryption RATs Communication Using Malicious Behavior Tree16
CPS Device-Class Identification via Behavioral Fingerprinting: From Theory to Practice16
Private Set Intersection With Authorization Over Outsourced Encrypted Datasets16
Intrapersonal Parameter Optimization for Offline Handwritten Signature Augmentation16
Soft Semantic Representation for Cross-Domain Face Recognition16
Single-Leader-Multiple-Followers Stackelberg Security Game With Hypergame Framework16
Towards Spoofing Resistant Next Generation IoT Networks16
Defending Support Vector Machines Against Data Poisoning Attacks16
Safe Exploration in Wireless Security: A Safe Reinforcement Learning Algorithm With Hierarchical Structure16
Long Short-Term Memory With Gate and State Level Fusion for Light Field-Based Face Recognition16
0.052340030670166