IEEE Transactions on Information Forensics and Security

Papers
(The H4-Index of IEEE Transactions on Information Forensics and Security is 55. The table below lists those papers that are above that threshold based on CrossRef citation counts [max. 250 papers]. The publications cover those that have been published in the past four years, i.e., from 2021-08-01 to 2025-08-01.)
ArticleCitations
High Resolution Fingerprint Retrieval Based on Pore Indexing and Graph Comparison225
CR-DAP: A Comprehensive and Regulatory Decentralized Anonymous Payment System193
Uncoordinated Syntactic Privacy: A New Composable Metric for Multiple, Independent Data Publishing185
Reinforcement Learning-Based Personalized Differentially Private Federated Learning120
Robust Duality Learning for Unsupervised Visible-Infrared Person Re-Identification118
Attention-SA: Exploiting Model-Approximated Data Semantics for Adversarial Attack104
A Note on “Secure and Efficient Outsourcing of PCA-Based Face Recognition”97
A Decentralized Threshold Credential Management With Fine-Grained Authentication for VANETs97
Beyond Access Pattern: Efficient Volume-Hiding Multi-Range Queries Over Outsourced Data Services96
Owner-Enabled Secure Authorized Keyword Search Over Encrypted Data With Flexible Metadata93
Decision-Based Adversarial Attack With Frequency Mixup92
Resource Allocation for STAR-RIS-Assisted MIMO Physical-Layer Key Generation89
BDMMT: Backdoor Sample Detection for Language Models Through Model Mutation Testing89
FVFSNet: Frequency-Spatial Coupling Network for Finger Vein Authentication85
Across-Platform Detection of Malicious Cryptocurrency Accounts via Interaction Feature Learning83
Transformer Based Defense GAN Against Palm-Vein Adversarial Attacks83
Exploring Fine-Grained Representation and Recomposition for Cloth-Changing Person Re-Identification82
A Secure Encoding Mechanism Against Deception Attacks on Multisensor Remote State Estimation81
Stealthy Backdoors as Compression Artifacts80
Multi-User Beam Training and Transmission Design for Covert Millimeter-Wave Communication79
TCPP: Achieving Privacy-Preserving Trajectory Correlation With Differential Privacy78
On Message Authentication Channel Capacity Over a Wiretap Channel77
Practical Multi-Party Private Set Intersection Protocols75
Seeing Traffic Paths: Encrypted Traffic Classification With Path Signature Features74
Outlier-Resistant Non-Fragile Control of Nonlinear Networked Systems Under DoS Attacks and Multi-Variable Event-Triggered SC Protocol74
Minipatch: Undermining DNN-Based Website Fingerprinting With Adversarial Patches74
Double-Layered Dual-Syndrome Trellis Codes Utilizing Channel Knowledge for Robust Steganography73
PUF-Phenotype: A Robust and Noise-Resilient Approach to Aid Group-Based Authentication With DRAM-PUFs Using Machine Learning72
Low Complexity Byzantine-Resilient Federated Learning72
Multisource Heterogeneous Specific Emitter Identification Using Attention Mechanism-Based RFF Fusion Method71
Exploiting the Adversarial Example Vulnerability of Transfer Learning of Source Code70
ROBY: A Byzantine-robust and Privacy-preserving Serverless Federated Learning Framework70
Citywide Multi-Step Crime Prediction via Context-Aware Bayesian Tensor Decomposition70
BatchAuth: A Physical Layer Batch Authentication Scheme for Multiple Backscatter Devices69
On the Impact of Pollution Attacks on Coding-Based Distributed Storage Systems68
SGBoost: An Efficient and Privacy-Preserving Vertical Federated Tree Boosting Framework67
Privacy-Enhancing Face Obfuscation Guided by Semantic-Aware Attribution Maps67
Bidirectional Stackable Recurrent Generative Adversarial Imputation Network for Specific Emitter Missing Data Imputation67
Palm Vein Recognition Under Unconstrained and Weak-Cooperative Conditions66
On Covert Communication Performance With Outdated CSI in Wireless Greedy Relay Systems65
Adversarial RL-Based IDS for Evolving Data Environment in 6LoWPAN64
Verifying in the Dark: Verifiable Machine Unlearning by Using Invisible Backdoor Triggers64
Optimal Privacy-Aware Stochastic Sampling63
Fed-UGI: Federated Undersampling Learning Framework With Gini Impurity for Imbalanced Network Intrusion Detection63
Attacking Mouse Dynamics Authentication Using Novel Wasserstein Conditional DCGAN63
Occlusion-Aware Human Mesh Model-Based Gait Recognition60
SIa-CBc: Sensitive Intent-Assisted and Crucial Behavior-Cognized Malware Detection Based on Human Brain Cognitive Theory59
The Effect of Inverse Square Law of Light on ENF in Videos Exposed by Rolling Shutter59
Attackers Are Not the Same! Unveiling the Impact of Feature Distribution on Label Inference Attacks58
SecBNN: Efficient Secure Inference on Binary Neural Networks58
CMXsafe: A Proxy Layer for Securing Internet-of-Things Communications58
Analyze and Improve Differentially Private Federated Learning: A Model Robustness Perspective57
No Time for Remodulation: A PHY Steganographic Symbiotic Channel Over Constant Envelope56
Online Two-Stage Channel-Based Lightweight Authentication Method for Time-Varying Scenarios56
Hamster: A Fast Synchronous Byzantine Fault Tolerant Protocol56
Turritopsis: Practical Dynamic Asynchronous BFT55
FACOS: Enabling Privacy Protection Through Fine-Grained Access Control With On-Chain and Off-Chain System55
Anonymous and Efficient (t, n)-Threshold Ownership Transfer for Cloud EMRs Auditing55
Privacy-Preserving Vertical Federated Learning With Tensor Decomposition for Data Missing Features55
0.095526933670044