IEEE Transactions on Information Forensics and Security

Papers
(The H4-Index of IEEE Transactions on Information Forensics and Security is 60. The table below lists those papers that are above that threshold based on CrossRef citation counts [max. 250 papers]. The publications cover those that have been published in the past four years, i.e., from 2022-05-01 to 2026-05-01.)
ArticleCitations
CR-DAP: A Comprehensive and Regulatory Decentralized Anonymous Payment System302
sBugChecker: A Systematic Framework for Detecting Solidity Compiler-Introduced Bugs186
Toward Automatic Heap Exploit Generation by Using Heap Layout Constraints on Binary Programs161
Learnable Prompts With Neighbor-Aware Correction for Text-Based Person Search150
Double-Layered Dual-Syndrome Trellis Codes Utilizing Channel Knowledge for Robust Steganography148
Uncoordinated Syntactic Privacy: A New Composable Metric for Multiple, Independent Data Publishing146
Enhancing Federated Learning With Differentially Private Continuous Data Release via k -Ary Trees146
Analytical and Experimental Validation of Wireless Authentication Through Enhanced RF Fingerprints of Chaotic Antenna Arrays134
SSME: A Semi-Supervised Specific Emitter Identification Method With Manifold Enhancement125
Exploiting the Adversarial Example Vulnerability of Transfer Learning of Source Code121
Reinforcement Learning-Based Personalized Differentially Private Federated Learning121
M 3 -ReID: Unifying Multi-View, Granularity, and Modality for Video-Based Visible-Infrared Person Re-Identification119
DySec: A Machine Learning-Based Dynamic Analysis for Detecting Malicious Packages in PyPI Ecosystem117
Refining Positive and Toxic Samples for Dual Safety Self-Alignment of LLMs With Minimal Human Interventions112
Attention-SA: Exploiting Model-Approximated Data Semantics for Adversarial Attack111
Across-Platform Detection of Malicious Cryptocurrency Accounts via Interaction Feature Learning110
PCSR: Enabling Cross-Modal Semantic Retrieval With Privacy Preservation108
Citywide Multi-Step Crime Prediction via Context-Aware Bayesian Tensor Decomposition105
Experimental Validation of Information-Theoretic Physical Layer Security102
CleanerCLIP: Fine-Grained Counterfactual Semantic Augmentation for Backdoor Defense in Contrastive Learning102
A Decentralized Threshold Credential Management With Fine-Grained Authentication for VANETs99
Learning Corruption-Invariant Components and Cross-Modal Correspondence for Unsupervised Visible-Infrared Person Re-Identification99
Beyond Access Pattern: Efficient Volume-Hiding Multi-Range Queries Over Outsourced Data Services96
BatchAuth: A Physical Layer Batch Authentication Scheme for Multiple Backscatter Devices95
Low Complexity Byzantine-Resilient Federated Learning93
STMWF: Multi-Tab Website Fingerprinting via Spatial–Temporal Sequence Analysis92
FADE: A Dataset for Detecting Falling Objects Around Buildings in Video86
A Note on “Secure and Efficient Outsourcing of PCA-Based Face Recognition”86
Resource Allocation for STAR-RIS-Assisted MIMO Physical-Layer Key Generation86
TCPP: Achieving Privacy-Preserving Trajectory Correlation With Differential Privacy85
FVFSNet: Frequency-Spatial Coupling Network for Finger Vein Authentication85
Traceable and Collision-Resilient Differential Privacy84
SF2Net: Sequence Feature Fusion Network for Palmprint Verification84
ROBY: A Byzantine-Robust and Privacy-Preserving Serverless Federated Learning Framework82
Outlier-Resistant Non-Fragile Control of Nonlinear Networked Systems Under DoS Attacks and Multi-Variable Event-Triggered SC Protocol79
Transformer Based Defense GAN Against Palm-Vein Adversarial Attacks79
Early-Stage Detection of Encrypted Malware Traffic via Multi-flow Temporal Graph Learning77
PUF-Phenotype: A Robust and Noise-Resilient Approach to Aid Group-Based Authentication With DRAM-PUFs Using Machine Learning76
Multisource Heterogeneous Specific Emitter Identification Using Attention Mechanism-Based RFF Fusion Method76
BDMMT: Backdoor Sample Detection for Language Models Through Model Mutation Testing76
Robust Duality Learning for Unsupervised Visible-Infrared Person Re-Identification75
MPA: Lightweight and Updatable Integrity Auditing for Decentralized Storage Using Merkle Trees and Polynomial Commitments74
Exploring Fine-Grained Representation and Recomposition for Cloth-Changing Person Re-Identification72
No Time for Remodulation: A PHY Steganographic Symbiotic Channel Over Constant Envelope72
FACOS: Enabling Privacy Protection Through Fine-Grained Access Control With On-Chain and Off-Chain System71
Detecting Locally, Patching Globally: An End-to-End Framework for High Speed and Accurate Detection of Fingerprint Minutiae70
Bidirectional Stackable Recurrent Generative Adversarial Imputation Network for Specific Emitter Missing Data Imputation70
Breaking the Trilemma: Toward Efficient, Privacy-Preserving, and Forward-Secure Data Sharing in the Post-Quantum Era69
A General Purpose Data and Query Privacy Preserving Protocol for Wireless Sensor Networks69
Patronus : Plug-and-Play and Near-Lossless Facial Privacy Enhancement Against Reconstruction Attacks67
SecBNN: Efficient Secure Inference on Binary Neural Networks65
The Effect of Inverse Square Law of Light on ENF in Videos Exposed by Rolling Shutter65
Robustness Over Time: Understanding Adversarial Examples’ Effectiveness on Longitudinal Versions of Large Language Models64
MOJO: MOtion Pattern Learning and JOint-Based Fine-Grained Mining for Person Re-Identification Based on 4D LiDAR Point Clouds63
Hamster: A Fast Synchronous Byzantine Fault Tolerant Protocol63
Attacking Mouse Dynamics Authentication Using Novel Wasserstein Conditional DCGAN63
Corrections to “On the Security of a Revocable Cross-Domain Anonymous Authentication in IIoT”61
Optimal Privacy-Aware Stochastic Sampling61
SGBoost: An Efficient and Privacy-Preserving Vertical Federated Tree Boosting Framework61
Unknown Cyber Threat Discovery Empowered by Genetic Evolution Without Prior Knowledge60
Enhancing Model Generalization for Efficient Cross-Device Side-Channel Analysis60
Implicit Alignment-Based Cross-Modal Symbiotic Network for Text-to-Image Person Re-Identification60
0.074115991592407