Journal of Information Security and Applications

Papers
(The H4-Index of Journal of Information Security and Applications is 24. The table below lists those papers that are above that threshold based on CrossRef citation counts [max. 250 papers]. The publications cover those that have been published in the past four years, i.e., from 2022-01-01 to 2026-01-01.)
ArticleCitations
Editorial Board123
Robust zero-watermarking algorithm via multi-scale feature analysis for medical images87
SBRAC: Blockchain-based sealed-bid auction with bidding price privacy and public verifiability56
Refined statistical attacks against searchable symmetric encryption using non-indexed documents52
Synergistic compensation for RGB-based blind color image watermarking to withstand JPEG compression45
The reality of backdoored S-Boxes—An eye opener43
Distinguishing and key recovery attacks on the reduced-round SNOW-V and SNOW-Vi42
Bane or Boon: Measuring the effect of evasive malware on system call classifiers41
Impossible differential cryptanalysis of FBC-12840
Plaintext recovery and tag guessing attacks on authenticated encryption algorithm COLM37
DRAC: A dynamic fine-grained access control scheme for cloud storage with censorship-coerced resistance34
Detection of Evasive Android Malware Using EigenGCN33
Understanding practitioner perspectives on using privacy harm categories for privacy risk assessment33
Improving data extraction accuracy for median filter-based data hiding method32
Incorporating deep learning into capacitive images for smartphone user authentication30
Merkle multi-branch hash tree-based dynamic data integrity auditing for B5G network cloud storage29
Statistical privacy protection for secure data access control in cloud29
Editorial Board29
PVO-based reversible data hiding using bit plane segmentation and pixel expansion26
A lightweight intrusion detection system for connected autonomous vehicles based on ECANet and image encoding25
PGAN framework for synthesizing sensor data privately25
Smart contracts vulnerability detection model based on adversarial multi-task learning24
A deep learning assisted personalized deception system for countering web application attacks24
Robust watermarking based on optimal synchronization signal24
Lightweight privacy-preserving authenticated key agreements using physically unclonable functions for internet of drones24
0.10578298568726