IEEE Transactions on Information Forensics and Security

Papers
(The H4-Index of IEEE Transactions on Information Forensics and Security is 52. The table below lists those papers that are above that threshold based on CrossRef citation counts [max. 250 papers]. The publications cover those that have been published in the past four years, i.e., from 2021-06-01 to 2025-06-01.)
ArticleCitations
High Resolution Fingerprint Retrieval Based on Pore Indexing and Graph Comparison199
Low Complexity Byzantine-Resilient Federated Learning172
CR-DAP: A Comprehensive and Regulatory Decentralized Anonymous Payment System167
Uncoordinated Syntactic Privacy: A New Composable Metric for Multiple, Independent Data Publishing107
Reinforcement Learning-Based Personalized Differentially Private Federated Learning95
Robust Duality Learning for Unsupervised Visible-Infrared Person Re-Identification91
Attention-SA: Exploiting Model-Approximated Data Semantics for Adversarial Attack88
BatchAuth: A Physical Layer Batch Authentication Scheme for Multiple Backscatter Devices86
A Note on “Secure and Efficient Outsourcing of PCA-Based Face Recognition”85
Exploiting the Adversarial Example Vulnerability of Transfer Learning of Source Code84
Beyond Access Pattern: Efficient Volume-Hiding Multi-Range Queries Over Outsourced Data Services79
A Secure Encoding Mechanism Against Deception Attacks on Multisensor Remote State Estimation78
Across-Platform Detection of Malicious Cryptocurrency Accounts via Interaction Feature Learning76
Multi-User Beam Training and Transmission Design for Covert Millimeter-Wave Communication76
Owner-Enabled Secure Authorized Keyword Search Over Encrypted Data With Flexible Metadata76
On Message Authentication Channel Capacity Over a Wiretap Channel75
Double-Layered Dual-Syndrome Trellis Codes Utilizing Channel Knowledge for Robust Steganography74
TCPP: Achieving Privacy-Preserving Trajectory Correlation With Differential Privacy72
PUF-Phenotype: A Robust and Noise-Resilient Approach to Aid Group-Based Authentication With DRAM-PUFs Using Machine Learning72
Decision-Based Adversarial Attack With Frequency Mixup71
Transformer Based Defense GAN Against Palm-Vein Adversarial Attacks69
Seeing Traffic Paths: Encrypted Traffic Classification With Path Signature Features68
Resource Allocation for STAR-RIS-Assisted MIMO Physical-Layer Key Generation68
Practical Multi-Party Private Set Intersection Protocols68
Multisource Heterogeneous Specific Emitter Identification Using Attention Mechanism-Based RFF Fusion Method67
Outlier-Resistant Non-Fragile Control of Nonlinear Networked Systems Under DoS Attacks and Multi-Variable Event-Triggered SC Protocol66
BDMMT: Backdoor Sample Detection for Language Models Through Model Mutation Testing66
FVFSNet: Frequency-Spatial Coupling Network for Finger Vein Authentication66
Exploring Fine-Grained Representation and Recomposition for Cloth-Changing Person Re-Identification65
Stealthy Backdoors as Compression Artifacts65
Minipatch: Undermining DNN-Based Website Fingerprinting With Adversarial Patches65
Attacking Mouse Dynamics Authentication Using Novel Wasserstein Conditional DCGAN64
Bidirectional Stackable Recurrent Generative Adversarial Imputation Network for Specific Emitter Missing Data Imputation63
On the Impact of Pollution Attacks on Coding-Based Distributed Storage Systems63
Efficiently Achieving Privacy Preservation and Poisoning Attack Resistance in Federated Learning61
Occlusion-Aware Human Mesh Model-Based Gait Recognition61
On Covert Communication Performance With Outdated CSI in Wireless Greedy Relay Systems61
Generative Adversarial Attacks Against Deep-Learning-Based Camera Model Identification61
SGBoost: An Efficient and Privacy-Preserving Vertical Federated Tree Boosting Framework60
Palm Vein Recognition Under Unconstrained and Weak-Cooperative Conditions60
Semantic-Aware Adversarial Training for Reliable Deep Hashing Retrieval60
Group-Wise Verifiable Coded Computing Under Byzantine Attacks and Stragglers59
Authentication of Copy Detection Patterns: A Pattern Reliability Based Approach57
BABD: A Bitcoin Address Behavior Dataset for Pattern Analysis57
The Effect of Inverse Square Law of Light on ENF in Videos Exposed by Rolling Shutter56
GuessFuse: Hybrid Password Guessing With Multi-View56
SIa-CBc: Sensitive Intent-Assisted and Crucial Behavior-Cognized Malware Detection Based on Human Brain Cognitive Theory56
Adversarial Examples Against WiFi Fingerprint-Based Localization in the Physical World55
CMXsafe: A Proxy Layer for Securing Internet-of-Things Communications55
Adversarial RL-Based IDS for Evolving Data Environment in 6LoWPAN55
SecBNN: Efficient Secure Inference on Binary Neural Networks52
Generalized Autonomous Path Proxy Re-Encryption Scheme to Support Branch Functionality52
0.33656096458435