IEEE Transactions on Information Forensics and Security

Papers
(The TQCC of IEEE Transactions on Information Forensics and Security is 11. The table below lists those papers that are above that threshold based on CrossRef citation counts [max. 250 papers]. The publications cover those that have been published in the past four years, i.e., from 2021-08-01 to 2025-08-01.)
ArticleCitations
High Resolution Fingerprint Retrieval Based on Pore Indexing and Graph Comparison225
CR-DAP: A Comprehensive and Regulatory Decentralized Anonymous Payment System193
Uncoordinated Syntactic Privacy: A New Composable Metric for Multiple, Independent Data Publishing185
Reinforcement Learning-Based Personalized Differentially Private Federated Learning120
Robust Duality Learning for Unsupervised Visible-Infrared Person Re-Identification118
Attention-SA: Exploiting Model-Approximated Data Semantics for Adversarial Attack104
A Decentralized Threshold Credential Management With Fine-Grained Authentication for VANETs97
A Note on “Secure and Efficient Outsourcing of PCA-Based Face Recognition”97
Beyond Access Pattern: Efficient Volume-Hiding Multi-Range Queries Over Outsourced Data Services96
Owner-Enabled Secure Authorized Keyword Search Over Encrypted Data With Flexible Metadata93
Decision-Based Adversarial Attack With Frequency Mixup92
Resource Allocation for STAR-RIS-Assisted MIMO Physical-Layer Key Generation89
BDMMT: Backdoor Sample Detection for Language Models Through Model Mutation Testing89
FVFSNet: Frequency-Spatial Coupling Network for Finger Vein Authentication85
Across-Platform Detection of Malicious Cryptocurrency Accounts via Interaction Feature Learning83
Transformer Based Defense GAN Against Palm-Vein Adversarial Attacks83
Exploring Fine-Grained Representation and Recomposition for Cloth-Changing Person Re-Identification82
A Secure Encoding Mechanism Against Deception Attacks on Multisensor Remote State Estimation81
Stealthy Backdoors as Compression Artifacts80
Multi-User Beam Training and Transmission Design for Covert Millimeter-Wave Communication79
TCPP: Achieving Privacy-Preserving Trajectory Correlation With Differential Privacy78
On Message Authentication Channel Capacity Over a Wiretap Channel77
Practical Multi-Party Private Set Intersection Protocols75
Minipatch: Undermining DNN-Based Website Fingerprinting With Adversarial Patches74
Seeing Traffic Paths: Encrypted Traffic Classification With Path Signature Features74
Outlier-Resistant Non-Fragile Control of Nonlinear Networked Systems Under DoS Attacks and Multi-Variable Event-Triggered SC Protocol74
Double-Layered Dual-Syndrome Trellis Codes Utilizing Channel Knowledge for Robust Steganography73
PUF-Phenotype: A Robust and Noise-Resilient Approach to Aid Group-Based Authentication With DRAM-PUFs Using Machine Learning72
Low Complexity Byzantine-Resilient Federated Learning72
Multisource Heterogeneous Specific Emitter Identification Using Attention Mechanism-Based RFF Fusion Method71
ROBY: A Byzantine-robust and Privacy-preserving Serverless Federated Learning Framework70
Citywide Multi-Step Crime Prediction via Context-Aware Bayesian Tensor Decomposition70
Exploiting the Adversarial Example Vulnerability of Transfer Learning of Source Code70
BatchAuth: A Physical Layer Batch Authentication Scheme for Multiple Backscatter Devices69
On the Impact of Pollution Attacks on Coding-Based Distributed Storage Systems68
Privacy-Enhancing Face Obfuscation Guided by Semantic-Aware Attribution Maps67
Bidirectional Stackable Recurrent Generative Adversarial Imputation Network for Specific Emitter Missing Data Imputation67
SGBoost: An Efficient and Privacy-Preserving Vertical Federated Tree Boosting Framework67
Palm Vein Recognition Under Unconstrained and Weak-Cooperative Conditions66
On Covert Communication Performance With Outdated CSI in Wireless Greedy Relay Systems65
Verifying in the Dark: Verifiable Machine Unlearning by Using Invisible Backdoor Triggers64
Adversarial RL-Based IDS for Evolving Data Environment in 6LoWPAN64
Attacking Mouse Dynamics Authentication Using Novel Wasserstein Conditional DCGAN63
Optimal Privacy-Aware Stochastic Sampling63
Fed-UGI: Federated Undersampling Learning Framework With Gini Impurity for Imbalanced Network Intrusion Detection63
Occlusion-Aware Human Mesh Model-Based Gait Recognition60
SIa-CBc: Sensitive Intent-Assisted and Crucial Behavior-Cognized Malware Detection Based on Human Brain Cognitive Theory59
The Effect of Inverse Square Law of Light on ENF in Videos Exposed by Rolling Shutter59
CMXsafe: A Proxy Layer for Securing Internet-of-Things Communications58
Attackers Are Not the Same! Unveiling the Impact of Feature Distribution on Label Inference Attacks58
SecBNN: Efficient Secure Inference on Binary Neural Networks58
Analyze and Improve Differentially Private Federated Learning: A Model Robustness Perspective57
Hamster: A Fast Synchronous Byzantine Fault Tolerant Protocol56
No Time for Remodulation: A PHY Steganographic Symbiotic Channel Over Constant Envelope56
Online Two-Stage Channel-Based Lightweight Authentication Method for Time-Varying Scenarios56
Privacy-Preserving Vertical Federated Learning With Tensor Decomposition for Data Missing Features55
Turritopsis: Practical Dynamic Asynchronous BFT55
FACOS: Enabling Privacy Protection Through Fine-Grained Access Control With On-Chain and Off-Chain System55
Anonymous and Efficient (t, n)-Threshold Ownership Transfer for Cloud EMRs Auditing55
FLGuardian: Defending Against Model Poisoning Attacks via Fine-Grained Detection in Federated Learning54
Multi-Key Similar Data Search on Encrypted Storage With Secure Pay-Per-Query53
EARVP: Efficient Aggregation for Federated Learning With Robustness, Verifiability, and Privacy52
Reinforcement Learning Enabled Intelligent Energy Attack in Green IoT Networks52
BABD: A Bitcoin Address Behavior Dataset for Pattern Analysis52
Enhancing Resilience in Website Fingerprinting: Novel Adversary Strategies for Noisy Traffic Environments52
Thwarting GNN-Based Attacks Against Logic Locking51
Efficient Streaming Voice Steganalysis in Challenging Detection Scenarios50
Revisiting the Masking Strategy: A Side-Channel Attack on CRYSTALS-Kyber50
Customized Transformer Adapter With Frequency Masking for Deepfake Detection50
Corrections to “On the Security of a Revocable Cross-Domain Anonymous Authentication in IIoT”50
A General Purpose Data and Query Privacy Preserving Protocol for Wireless Sensor Networks49
Generalized Autonomous Path Proxy Re-Encryption Scheme to Support Branch Functionality49
Authentication of Copy Detection Patterns: A Pattern Reliability Based Approach49
G2V2former: Graph Guided Video Vision Transformer for Face Anti-Spoofing48
Using Graph Neural Networks to Improve Generalization Capability of the Models for Deepfake Detection48
Semantic-Aware Adversarial Training for Reliable Deep Hashing Retrieval47
Assessing Text Classification Methods for Cyberbullying Detection on Social Media Platforms47
Privacy-Aware and Security-Enhanced Efficient Matchmaking Encryption47
NoLeaks: Differentially Private Causal Discovery Under Functional Causal Model47
Data Quality Detection Mechanism Against Label Flipping Attacks in Federated Learning47
Group-Wise Verifiable Coded Computing Under Byzantine Attacks and Stragglers47
LSFL: A Lightweight and Secure Federated Learning Scheme for Edge Computing46
GuessFuse: Hybrid Password Guessing With Multi-View46
Robust Visible-Infrared Person Re-Identification Based on Polymorphic Mask and Wavelet Graph Convolutional Network46
Secure Model Aggregation Against Poisoning Attacks for Cross-Silo Federated Learning With Robustness and Fairness46
Efficiently Achieving Privacy Preservation and Poisoning Attack Resistance in Federated Learning46
Privacy-Enhancing and Robust Backdoor Defense for Federated Learning on Heterogeneous Data45
Detecting Locally, Patching Globally: An End-to-End Framework for High Speed and Accurate Detection of Fingerprint Minutiae45
Unknown Cyber Threat Discovery Empowered by Genetic Evolution without Prior Knowledge44
Implicit Alignment-Based Cross-Modal Symbiotic Network for Text-to-Image Person Re-Identification44
Dangers Behind Charging VR Devices: Hidden Side Channel Attacks via Charging Cables43
Fast Propagation Is Better: Accelerating Single-Step Adversarial Training via Sampling Subnetworks43
Generative Adversarial Attacks Against Deep- Learning-Based Camera Model Identification43
Privacy-Preserved Distributed Learning With Zeroth-Order Optimization43
Boosting Black-Box Attack to Deep Neural Networks With Conditional Diffusion Models42
Event-Triggered Data-Driven Control for Nonlinear Systems Under Frequency-Duration-Constrained DoS Attacks42
Adversarial Examples Against WiFi Fingerprint-Based Localization in the Physical World42
Everybody’s Talkin’: Let Me Talk as You Want41
Blockchain-Enabled Computing Offloading and Resource Allocation in Multi-UAVs MEC Network: A Stackelberg Game Learning Approach41
Lightweight Multi-User Public-Key Authenticated Encryption With Keyword Search41
An Interpretable Generalization Mechanism for Accurately Detecting Anomaly and Identifying Networking Intrusion Techniques40
Exploring Bias in Sclera Segmentation Models: A Group Evaluation Approach40
K-GetNID: Knowledge-Guided Graphs for Early and Transferable Network Intrusion Detection40
An Intelligent Reflecting Surface-Based Attack Scheme Against Dual-Functional Radar and Communication Systems40
An Opportunistic Power Control Scheme for Mitigating User Location Tracking Attacks in Cellular Networks40
Scanner-Hunter: An Effective ICS Scanning Group Identification System39
Three-in-One: Robust Enhanced Universal Transferable Anti-Facial Retrieval in Online Social Networks39
Lavida: Large-Universe, Verifiable, and Dynamic Fine-Grained Access Control for E-Health Cloud39
Secret Cracking and Security Enhancement for the Image Application of CRT-Based Secret Sharing38
SeIoT: Detecting Anomalous Semantics in Smart Homes via Knowledge Graph37
Toward Mobile Palmprint Recognition via Multi-View Hierarchical Graph Learning37
LtRFT: Mitigate the Low-Rate Data Plane DDoS Attack With Learning-To-Rank Enabled Flow Tables37
Fast Privacy-Preserving Text Classification Based on Secure Multiparty Computation37
EVM-Shield: In-Contract State Access Control for Fast Vulnerability Detection and Prevention37
Regression of Dense Distortion Field From a Single Fingerprint Image37
Building and Testing a Hidden-Password Online Password Manager36
BPVSE: Publicly Verifiable Searchable Encryption for Cloud-Assisted Electronic Health Records36
Dual Sampling Based Causal Intervention for Face Anti-Spoofing With Identity Debiasing36
Anti-Backdoor Model: A Novel Algorithm to Remove Backdoors in a Non-Invasive Way36
A Federated Learning-Based Lightweight Network With Zero Trust for UAV Authentication36
Logit Margin Matters: Improving Transferable Targeted Adversarial Attack by Logit Calibration36
SCAFinder: Formal Verification of Cache Fine-Grained Features for Side Channel Detection35
iCoding: Countermeasure Against Interference and Eavesdropping in Wireless Communications35
RegPalm: Towards Large-Scale Open-Set Palmprint Recognition by Reducing Pattern Variance35
Three Birds With One Stone: User Intention Understanding and Influential Neighbor Disclosure for Injection Attack Detection35
Revisiting Gradient Regularization: Inject Robust Saliency-Aware Weight Bias for Adversarial Defense35
Succinct Hash-Based Arbitrary-Range Proofs34
Pilot Spoofing Attack on the Downlink of Cell-Free Massive MIMO: From the Perspective of Adversaries34
Extracting Private Training Data in Federated Learning From Clients34
Game-Theoretic Neyman-Pearson Detection to Combat Strategic Evasion34
Type2Branch: Keystroke Biometrics Based on a Dual-Branch Architecture With Attention Mechanisms and Set2set Loss34
Proactively Verifying Quantitative Network Policy Across Unsafe and Unreliable Environments34
ColorVein: Colorful Cancelable Vein Biometrics34
Smart App Attack: Hacking Deep Learning Models in Android Apps32
Binarizing Split Learning for Data Privacy Enhancement and Computation Reduction32
Data-Driven Dynamic Periodic Event-Triggered Control of Cyber-Physical Systems Under Packet Dropouts and DoS Attacks32
LiSiam: Localization Invariance Siamese Network for Deepfake Detection32
AuthScatter: Accurate, Robust, and Scalable Mutual Authentication in Physical Layer for Backscatter Communications32
A Precoding Perturbation Method in Geometric Optimization: Exploring Manifold Structure for Privacy and Efficiency32
A Canonical Data Transformation for Achieving Inter- and Within-Group Fairness32
Toward Automated Field Semantics Inference for Binary Protocol Reverse Engineering32
PriVDT: An Efficient Two-Party Cryptographic Framework for Vertical Decision Trees32
ETD: An Efficient Time Delay Attack Detection Framework for UAV Networks32
PCSF: Privacy-Preserving Content-Based Spam Filter32
Beyond Result Verification: Efficient Privacy-Preserving Spatial Keyword Query With Suppressed Leakage31
SepBIN: Binary Feature Separation for Better Semantic Comparison and Authorship Verification31
GTAE-IDS: Graph Transformer-Based Autoencoder Framework for Real-Time Network Intrusion Detection31
Fault Detection and Robust Security Control for Implicit Jump Systems Against Random FDI Attacks and Packet Loss Under Memorized Output-Perceptive Event-Triggered Protocol31
A Multi-Scale Contrast Preserving Encoder-Decoder Architecture for Local Change Detection From Thermal Video Scenes31
Synchronized Provable Data Possession Based on Blockchain for Digital Twin31
HELM: Navigating Homomorphic Encryption Through Gates and Lookup Tables31
Wolverine: A Scalable and Transaction-Consistent Redactable Permissionless Blockchain31
Joint Transmissive and Reflective RIS-Aided Secure MIMO Systems Design Under Spatially-Correlated Angular Uncertainty and Coupled PSEs30
Progressive Sub-Domain Information Mining for Single-Source Generalizable Gait Recognition30
AuditPCH: Auditable Payment Channel Hub With Privacy Protection30
Signed Latent Factors for Spamming Activity Detection30
Enabling Fraud Prediction on Preliminary Data Through Information Density Booster30
ISTVT: Interpretable Spatial-Temporal Video Transformer for Deepfake Detection30
DOEPatch: Dynamically Optimized Ensemble Model for Adversarial Patches Generation30
Balanced Encoding of Near-Zero Correlation for an AES Implementation30
The Dark Forest: Understanding Security Risks of Cross-Party Delegated Resources in Mobile App-in-App Ecosystems30
Analog Secret Sharing With Applications to Private Distributed Learning30
Reinforcement Learning-Based Tracking Control for Networked Control Systems With DoS Attacks30
Online Writer Retrieval With Chinese Handwritten Phrases: A Synergistic Temporal-Frequency Representation Learning Approach30
An Efficient and Verifiable Encrypted Data Filtering Framework Over Large-Scale Storage in Cloud Edge30
Specific Emitter Identification via Sparse Bayesian Learning Versus Model-Agnostic Meta-Learning29
Leveraging Ensembles and Self-Supervised Learning for Fully-Unsupervised Person Re-Identification and Text Authorship Attribution29
Healthcare Security: Post-Quantum Continuous Authentication With Behavioral Biometrics Using Vector Similarity Search29
PowerGuard: Using Power Side-Channel Signals to Secure Motion Controllers in ICS29
Bitcoin-Compatible Privacy-Preserving Multi-Party Payment Channels Supporting Variable Amounts29
Bi-Stream Coteaching Network for Weakly-Supervised Deepfake Localization in Videos29
A Synthetic Data-Assisted Satellite Terrestrial Integrated Network Intrusion Detection Framework29
Data-Agnostic Model Poisoning Against Federated Learning: A Graph Autoencoder Approach29
MalPacDetector: An LLM-Based Malicious NPM Package Detector29
Optimal Client Selection of Federated Learning Based on Compressed Sensing29
Encrypted and Compressed Key-Value Store With Pattern-Analysis Security in Cloud Systems28
ProVFL: Property Inference Attacks Against Vertical Federated Learning28
Collaborative Honeypot Defense in UAV Networks: A Learning-Based Game Approach28
Libras: A Fair, Secure, Verifiable, and Scalable Outsourcing Computation Scheme Based on Blockchain28
Quantization Noise as an Asset: Optimizing Physical Layer Security With Sigma-Delta Modulation28
Titan: Security Analysis of Large-Scale Hardware Obfuscation Using Graph Neural Networks28
Multi-Antenna Signal Masking and Round-Trip Transmission for Privacy-Preserving Wireless Sensing28
CoSwinVIT: A Vision Transformer for Enhanced Uniform Spectrum Response in Specific Emitter Identification28
Angle and Distance Discrimination by Utilizing Frequency Conversion Capability of STC-IRS for Covert Communications28
Comparing Different Membership Inference Attacks With a Comprehensive Benchmark28
Nighttime Person Re-Identification via Collaborative Enhancement Network With Multi-Domain Learning27
Intra-Domain Knowledge Reuse Assisted Reinforcement Learning for Fast Anti-Jamming Communication27
Enabling Efficient and Strong Privacy-Preserving Truth Discovery in Mobile Crowdsensing27
Revealing the Secrets of Radio Embedded Systems: Extraction of Raw Information via RF27
Breaking XOR Arbiter PUFs With Chosen Challenge Attack27
DP-Norm: Differential Privacy Primal-Dual Algorithm for Decentralized Federated Learning27
Intrusion Detection for Internet of Things: An Anchor Graph Clustering Approach27
APIVADS: A Novel Privacy-Preserving Pivot Attack Detection Scheme Based on Statistical Pattern Recognition27
RTrap: Trapping and Containing Ransomware With Machine Learning27
CHERUBIM: A Secure and Highly Parallel Cross-Shard Consensus Using Quadruple Pipelined Two-Phase Commit for Sharding Blockchains26
PPGloVe: Privacy-Preserving GloVe for Training Word Vectors in the Dark26
Privacy-Preserving Aggregation-Authentication Scheme for Safety Warning System in Fog-Cloud Based VANET26
Comments on “Privacy-Enhanced Federated Learning Against Poisoning Adversaries”26
TRacer: Scalable Graph-Based Transaction Tracing for Account-Based Blockchain Trading Systems26
Efficient Verifiable Protocol for Privacy-Preserving Aggregation in Federated Learning26
SecureReID: Privacy-Preserving Anonymization for Person Re-Identification26
Detecting Lifecycle-Related Concurrency Bugs in ROS Programs via Coverage-Guided Fuzzing26
Everything Under Control: Secure Data Sharing Mechanism for Cloud-Edge Computing26
Joint Holistic and Masked Face Recognition26
An Efficient Identity-Based Provable Data Possession Protocol With Compressed Cloud Storage26
A GAN-Based Defense Framework Against Model Inversion Attacks25
Systematically Quantifying Cryptanalytic Nonlinearities in Strong PUFs25
TIM: Enabling Large-Scale White-Box Testing on In-App Deep Learning Models25
Secure and Privacy-Preserving Distributed Kalman Filtering for Sensor Networks With Event-Triggered Mechanism25
From the Dialectical Perspective: Modeling and Exploiting of Hybrid Worm Propagation25
Key Agreement Using Physical Identifiers for Degraded and Less Noisy Authentication Channels25
Parallel PAM for Secure Transmission25
Efficient Byzantine Broadcast from Succinct Erasure Coding Proof System25
GuardBox: A High-Performance Middlebox Providing Confidentiality and Integrity for Packets25
Evaluating Security and Robustness for Split Federated Learning Against Poisoning Attacks25
Efficient Dropout-Resilient Aggregation for Privacy-Preserving Machine Learning24
An Adaptability-Enhanced Few-Shot Website Fingerprinting Attack Based on Collusion24
Dynamic Analysis of Multiplex Networks With Hybrid Maintenance Strategies24
Perception-Driven Imperceptible Adversarial Attack Against Decision-Based Black-Box Models24
A Stream Learning Approach for Real-Time Identification of False Data Injection Attacks in Cyber-Physical Power Systems24
Towards Effective Rotation Generalization in UAV Object Re-Identification24
An SNR-Aware Feature Reconstruction Method in Radio Frequency Fingerprint Identification24
Comprehensive Android Malware Detection Based on Federated Learning Architecture24
ECO-BIKE: Bridging the Gap Between PQC BIKE and GPU Acceleration24
Robust Generative Steganography for Image Hiding Using Concatenated Mappings24
DeepCRF: Deep Learning-Enhanced CSI-Based RF Fingerprinting for Channel-Resilient WiFi Device Identification23
Online/Offline and History Indexing Identity-Based Fuzzy Message Detection23
Information- and Coding-Theoretic Analysis of the RLWE/MLWE Channel23
Robust Proxy: Improving Adversarial Robustness by Robust Proxy Learning23
Hypergraph Unlearning: A Size-Based Hyperedge Selection and Coverage Aggregation Approach23
Dual-Server Boolean Data Retrieval for Highly-Scalable Secure File Sharing Services23
ALScA: A Framework for Using Auxiliary Learning Side-Channel Attacks to Model PUFs23
Joint Secure Beamforming and Power Splitting Design for MIMO Relay Assisted Over-the-Air Computation Networks With Imperfect CSI23
Scale-Invariant Adversarial Attack Against Arbitrary-Scale Super-Resolution23
On the Unbearable Lightness of FIPS 140–2 Randomness Tests23
PkT-SIN: A Secure Communication Protocol for Space Information Networks With Periodic k-Time Anonymous Authentication22
Capacity-Achieving Coding Schemes of Gaussian Finite-State Markov Wiretap Channels With Delayed Feedback22
GaitReload: A Reloading Framework for Defending Against On-Manifold Adversarial Gait Sequences22
ASRL: Adaptive Swarm Reinforcement Learning for Enhanced OSN Intrusion Detection22
Unified Performance Evaluation Method for Perceptual Image Hashing22
Dual Consistency-Constrained Learning for Unsupervised Visible-Infrared Person Re-Identification22
Device-Enhanced Password-Based Threshold Single-Sign-On Authentication22
Cancellable Template Design for Privacy-Preserving EEG Biometric Authentication Systems22
Minimizing Adversarial Training Samples for Robust Image Classifiers: Analysis and Adversarial Example Generator Design22
Divide and Conquer: Frequency-Aware Contrastive Adversarial Training for Robust Point Cloud Classification21
Query-Efficient Decision-Based Black-Box Patch Attack21
A Lightweight Transformer-Based Approach of Specific Emitter Identification for the Automatic Identification System21
Redactable Blockchain From Decentralized Chameleon Hash Functions21
Toward Secure and Verifiable Hybrid Federated Learning21
Secure Stabilization of Networked Lur’e Systems Suffering From DoS Attacks: A Resilient Memory-Based Event-Trigger Mechanism21
0.057095050811768