IEEE Transactions on Information Forensics and Security

Papers
(The H4-Index of IEEE Transactions on Information Forensics and Security is 58. The table below lists those papers that are above that threshold based on CrossRef citation counts [max. 250 papers]. The publications cover those that have been published in the past four years, i.e., from 2021-09-01 to 2025-09-01.)
ArticleCitations
High Resolution Fingerprint Retrieval Based on Pore Indexing and Graph Comparison232
CR-DAP: A Comprehensive and Regulatory Decentralized Anonymous Payment System198
Uncoordinated Syntactic Privacy: A New Composable Metric for Multiple, Independent Data Publishing191
Reinforcement Learning-Based Personalized Differentially Private Federated Learning147
Attention-SA: Exploiting Model-Approximated Data Semantics for Adversarial Attack124
A Note on “Secure and Efficient Outsourcing of PCA-Based Face Recognition”106
A Decentralized Threshold Credential Management With Fine-Grained Authentication for VANETs105
Beyond Access Pattern: Efficient Volume-Hiding Multi-Range Queries Over Outsourced Data Services101
Resource Allocation for STAR-RIS-Assisted MIMO Physical-Layer Key Generation99
Owner-Enabled Secure Authorized Keyword Search Over Encrypted Data With Flexible Metadata98
Across-Platform Detection of Malicious Cryptocurrency Accounts via Interaction Feature Learning95
Minipatch: Undermining DNN-Based Website Fingerprinting With Adversarial Patches94
BatchAuth: A Physical Layer Batch Authentication Scheme for Multiple Backscatter Devices93
Low Complexity Byzantine-Resilient Federated Learning92
PUF-Phenotype: A Robust and Noise-Resilient Approach to Aid Group-Based Authentication With DRAM-PUFs Using Machine Learning91
Exploiting the Adversarial Example Vulnerability of Transfer Learning of Source Code85
ROBY: A Byzantine-Robust and Privacy-Preserving Serverless Federated Learning Framework85
Multi-User Beam Training and Transmission Design for Covert Millimeter-Wave Communication84
On Message Authentication Channel Capacity Over a Wiretap Channel83
TCPP: Achieving Privacy-Preserving Trajectory Correlation With Differential Privacy82
Double-Layered Dual-Syndrome Trellis Codes Utilizing Channel Knowledge for Robust Steganography79
Robust Duality Learning for Unsupervised Visible-Infrared Person Re-Identification79
Multisource Heterogeneous Specific Emitter Identification Using Attention Mechanism-Based RFF Fusion Method79
Seeing Traffic Paths: Encrypted Traffic Classification With Path Signature Features79
Outlier-Resistant Non-Fragile Control of Nonlinear Networked Systems Under DoS Attacks and Multi-Variable Event-Triggered SC Protocol78
Citywide Multi-Step Crime Prediction via Context-Aware Bayesian Tensor Decomposition77
A Secure Encoding Mechanism Against Deception Attacks on Multisensor Remote State Estimation74
FVFSNet: Frequency-Spatial Coupling Network for Finger Vein Authentication74
Stealthy Backdoors as Compression Artifacts74
Transformer Based Defense GAN Against Palm-Vein Adversarial Attacks74
BDMMT: Backdoor Sample Detection for Language Models Through Model Mutation Testing73
Practical Multi-Party Private Set Intersection Protocols73
Exploring Fine-Grained Representation and Recomposition for Cloth-Changing Person Re-Identification73
Decision-Based Adversarial Attack With Frequency Mixup73
Learnable Prompts With Neighbor-Aware Correction for Text-Based Person Search72
On the Impact of Pollution Attacks on Coding-Based Distributed Storage Systems72
Bidirectional Stackable Recurrent Generative Adversarial Imputation Network for Specific Emitter Missing Data Imputation70
On Covert Communication Performance With Outdated CSI in Wireless Greedy Relay Systems70
Fed-UGI: Federated Undersampling Learning Framework With Gini Impurity for Imbalanced Network Intrusion Detection69
Optimal Privacy-Aware Stochastic Sampling68
Attacking Mouse Dynamics Authentication Using Novel Wasserstein Conditional DCGAN68
Verifying in the Dark: Verifiable Machine Unlearning by Using Invisible Backdoor Triggers67
CMXsafe: A Proxy Layer for Securing Internet-of-Things Communications67
Detecting Locally, Patching Globally: An End-to-End Framework for High Speed and Accurate Detection of Fingerprint Minutiae66
Privacy-Enhancing Face Obfuscation Guided by Semantic-Aware Attribution Maps65
Dangers Behind Charging VR Devices: Hidden Side Channel Attacks via Charging Cables64
Customized Transformer Adapter With Frequency Masking for Deepfake Detection64
Occlusion-Aware Human Mesh Model-Based Gait Recognition62
Using Graph Neural Networks to Improve Generalization Capability of the Models for Deepfake Detection62
Robust Visible-Infrared Person Re-Identification Based on Polymorphic Mask and Wavelet Graph Convolutional Network61
Boosting Black-Box Attack to Deep Neural Networks With Conditional Diffusion Models61
SGBoost: An Efficient and Privacy-Preserving Vertical Federated Tree Boosting Framework61
Event-Triggered Data-Driven Control for Nonlinear Systems Under Frequency-Duration-Constrained DoS Attacks60
Adversarial RL-Based IDS for Evolving Data Environment in 6LoWPAN60
Adversarial Examples Against WiFi Fingerprint-Based Localization in the Physical World60
The Effect of Inverse Square Law of Light on ENF in Videos Exposed by Rolling Shutter59
Thwarting GNN-Based Attacks Against Logic Locking59
SIa-CBc: Sensitive Intent-Assisted and Crucial Behavior-Cognized Malware Detection Based on Human Brain Cognitive Theory58
0.16050004959106