IEEE Transactions on Information Forensics and Security

Papers
(The H4-Index of IEEE Transactions on Information Forensics and Security is 49. The table below lists those papers that are above that threshold based on CrossRef citation counts [max. 250 papers]. The publications cover those that have been published in the past four years, i.e., from 2021-04-01 to 2025-04-01.)
ArticleCitations
Reliable Open-Set Network Traffic Classification182
Beyond Access Pattern: Efficient Volume-Hiding Multi-Range Queries Over Outsourced Data Services153
Low-Cost First-Order Secure Boolean Masking in Glitchy Hardware153
Peafowl: Private Entity Alignment in Multi-Party Privacy-Preserving Machine Learning98
Screen-Shooting Robust Watermark Based on Style Transfer and Structural Re-Parameterization86
Heavy Hitter Identification Over Large-Domain Set-Valued Data With Local Differential Privacy86
Enhancing Malware Classification via Self-Similarity Techniques84
Panther: Practical Secure Two-Party Neural Network Inference79
FedMUA: Exploring the Vulnerabilities of Federated Learning to Malicious Unlearning Attacks77
Physical-Layer Key Generation Efficient Beamspace Adaptations in 5G New Radio76
Reconnaissance-Strike Complex: A Network-Layer Solution to the Natural Forking in Blockchain72
List of Reviewers71
Low Complexity Byzantine-Resilient Federated Learning71
Robust Moving Target Defence Against False Data Injection Attacks in Power Grids70
STAR-RIS-Assisted-Full-Duplex Jamming Design for Secure Wireless Communications System66
Outlier-Resistant Non-Fragile Control of Nonlinear Networked Systems Under DoS Attacks and Multi-Variable Event-Triggered SC Protocol66
Practical Multi-Party Private Set Intersection Protocols66
FVFSNet: Frequency-Spatial Coupling Network for Finger Vein Authentication64
A Practical Deceptive Jamming Method Based on Vulnerable Location Awareness Adversarial Attack for Radar HRRP Target Recognition63
AG-NAS: An Attention GRU-Based Neural Architecture Search for Finger-Vein Recognition63
Scalable Universal Adversarial Watermark Defending Against Facial Forgery63
How to Disturb Network Reconnaissance: A Moving Target Defense Approach Based on Deep Reinforcement Learning63
Write+Sync: Software Cache Write Covert Channels Exploiting Memory-Disk Synchronization63
A Smart Digital Twin Enabled Security Framework for Vehicle-to-Grid Cyber-Physical Systems62
DPNM: A Differential Private Notary Mechanism for Privacy Preservation in Cross-Chain Transactions61
On the Vulnerability of Retrieval in High Intrinsic Dimensionality Neighborhood59
SecureSIS: Securing SIS Safety Functions With Safety Attributes and BPCS Information59
Proofs of Retrievability with Public Verifiability from Lattices58
A Dynamic State Estimation based Cyberattack Detection Scheme to Supervise Legacy Pilot Protection Operation57
DDL: Effective and Comprehensible Interpretation Framework for Diverse Deepfake Detectors57
Can We Trust the Similarity Measurement in Federated Learning?57
CP-IPFE: Ciphertext-Policy Based Inner Product Functional Encryption56
IEEE Transactions on Information Forensics and Security publication information56
Attack-Resilient Optimal PMU Placement via Reinforcement Learning Guided Tree Search in Smart Grids56
Variable-Modulation Specific Emitter Identification With Domain Adaptation56
Robust Duality Learning for Unsupervised Visible-Infrared Person Re-Identification54
A Note on “Secure and Efficient Outsourcing of PCA-Based Face Recognition”54
Safe Multi-Agent Reinforcement Learning for Wireless Applications Against Adversarial Communications53
PRIDN: A Privacy Preserving Data Sharing on Named Data Networking53
Swift: Fast Secure Neural Network Inference With Fully Homomorphic Encryption53
A Unified Framework for Biphasic Facial Age Translation With Noisy-Semantic Guided Generative Adversarial Networks53
Dynamic Event-Triggered Control for Leader-Following Consensus of Nonlinear Multi-Agent Systems Against Malicious Attacks53
Homomorphic Matrix Operations Under Bicyclic Encoding52
A Manifold Consistency Interpolation Method of Poisoning Attacks Against Semi-Supervised Model51
Vulnerability of State-of-the-Art Face Recognition Models to Template Inversion Attack51
Circumferential Local Ternary Pattern: New and Efficient Feature Descriptors for Anti-Counterfeiting Pattern Identification50
Reconfigurable Intelligent Surface-Assisted Passive Beamforming Attack49
Semantic Entropy Can Simultaneously Benefit Transmission Efficiency and Channel Security of Wireless Semantic Communications49
Trustworthy and Fair Federated Learning via Reputation-Based Consensus and Adaptive Incentives49
0.1502799987793