IEEE Transactions on Information Forensics and Security

Papers
(The H4-Index of IEEE Transactions on Information Forensics and Security is 65. The table below lists those papers that are above that threshold based on CrossRef citation counts [max. 250 papers]. The publications cover those that have been published in the past four years, i.e., from 2022-01-01 to 2026-01-01.)
ArticleCitations
Attention-SA: Exploiting Model-Approximated Data Semantics for Adversarial Attack275
CR-DAP: A Comprehensive and Regulatory Decentralized Anonymous Payment System245
A Note on “Secure and Efficient Outsourcing of PCA-Based Face Recognition”224
A Decentralized Threshold Credential Management With Fine-Grained Authentication for VANETs216
Reinforcement Learning-Based Personalized Differentially Private Federated Learning148
Learnable Prompts With Neighbor-Aware Correction for Text-Based Person Search145
PCSR: Enabling Cross-Modal Semantic Retrieval With Privacy Preservation130
SF2Net: Sequence Feature Fusion Network for Palmprint Verification124
Low Complexity Byzantine-Resilient Federated Learning123
sBugChecker: A Systematic Framework for Detecting Solidity Compiler-Introduced Bugs121
Toward Automatic Heap Exploit Generation by Using Heap Layout Constraints on Binary Programs120
Minipatch: Undermining DNN-Based Website Fingerprinting With Adversarial Patches117
Owner-Enabled Secure Authorized Keyword Search Over Encrypted Data With Flexible Metadata112
Uncoordinated Syntactic Privacy: A New Composable Metric for Multiple, Independent Data Publishing106
SSME: A Semi-Supervised Specific Emitter Identification Method With Manifold Enhancement104
Multi-User Beam Training and Transmission Design for Covert Millimeter-Wave Communication102
BatchAuth: A Physical Layer Batch Authentication Scheme for Multiple Backscatter Devices102
Traceable and Collision-Resilient Differential Privacy99
Enhancing Federated Learning With Differentially Private Continuous Data Release via k -Ary Trees98
High Resolution Fingerprint Retrieval Based on Pore Indexing and Graph Comparison97
Beyond Access Pattern: Efficient Volume-Hiding Multi-Range Queries Over Outsourced Data Services95
CleanerCLIP: Fine-Grained Counterfactual Semantic Augmentation for Backdoor Defense in Contrastive Learning95
On Message Authentication Channel Capacity Over a Wiretap Channel94
Outlier-Resistant Non-Fragile Control of Nonlinear Networked Systems Under DoS Attacks and Multi-Variable Event-Triggered SC Protocol94
Double-Layered Dual-Syndrome Trellis Codes Utilizing Channel Knowledge for Robust Steganography94
Citywide Multi-Step Crime Prediction via Context-Aware Bayesian Tensor Decomposition94
M 3 -ReID: Unifying Multi-View, Granularity, and Modality for Video-Based Visible-Infrared Person Re-Identification93
Across-Platform Detection of Malicious Cryptocurrency Accounts via Interaction Feature Learning92
ROBY: A Byzantine-Robust and Privacy-Preserving Serverless Federated Learning Framework91
A Secure Encoding Mechanism Against Deception Attacks on Multisensor Remote State Estimation90
TCPP: Achieving Privacy-Preserving Trajectory Correlation With Differential Privacy90
Exploring Fine-Grained Representation and Recomposition for Cloth-Changing Person Re-Identification89
PUF-Phenotype: A Robust and Noise-Resilient Approach to Aid Group-Based Authentication With DRAM-PUFs Using Machine Learning87
FADE: A Dataset for Detecting Falling Objects Around Buildings in Video85
Exploiting the Adversarial Example Vulnerability of Transfer Learning of Source Code84
Transformer Based Defense GAN Against Palm-Vein Adversarial Attacks83
Practical Multi-Party Private Set Intersection Protocols82
BDMMT: Backdoor Sample Detection for Language Models Through Model Mutation Testing82
Stealthy Backdoors as Compression Artifacts82
Multisource Heterogeneous Specific Emitter Identification Using Attention Mechanism-Based RFF Fusion Method81
FVFSNet: Frequency-Spatial Coupling Network for Finger Vein Authentication79
Resource Allocation for STAR-RIS-Assisted MIMO Physical-Layer Key Generation79
Decision-Based Adversarial Attack With Frequency Mixup79
Seeing Traffic Paths: Encrypted Traffic Classification With Path Signature Features78
Robust Duality Learning for Unsupervised Visible-Infrared Person Re-Identification78
No Time for Remodulation: A PHY Steganographic Symbiotic Channel Over Constant Envelope76
SecBNN: Efficient Secure Inference on Binary Neural Networks75
Unknown Cyber Threat Discovery Empowered by Genetic Evolution Without Prior Knowledge75
Attackers Are Not the Same! Unveiling the Impact of Feature Distribution on Label Inference Attacks75
Bidirectional Stackable Recurrent Generative Adversarial Imputation Network for Specific Emitter Missing Data Imputation75
Revisiting the Masking Strategy: A Side-Channel Attack on CRYSTALS-Kyber75
The Implications of Insecure Use of Fonts Against PDF Documents and Web Pages74
Implicit Alignment-Based Cross-Modal Symbiotic Network for Text-to-Image Person Re-Identification74
On the Impact of Pollution Attacks on Coding-Based Distributed Storage Systems74
Turritopsis: Practical Dynamic Asynchronous BFT72
G2V2former: Graph Guided Video Vision Transformer for Face Anti-Spoofing71
Hamster: A Fast Synchronous Byzantine Fault Tolerant Protocol69
Enhancing Model Generalization for Efficient Cross-Device Side-Channel Analysis69
Generalized Autonomous Path Proxy Re-Encryption Scheme to Support Branch Functionality67
Mixed-Bit Sampling Marking: Toward Unifying Document Authentication in Copy-Sensitive Graphical Codes67
Corrections to “On the Security of a Revocable Cross-Domain Anonymous Authentication in IIoT”66
Authentication of Copy Detection Patterns: A Pattern Reliability Based Approach66
MOJO: MOtion Pattern Learning and JOint-Based Fine-Grained Mining for Person Re-Identification Based on 4D LiDAR Point Clouds65
GuessFuse: Hybrid Password Guessing With Multi-View65
CMXsafe: A Proxy Layer for Securing Internet-of-Things Communications65
Dangers Behind Charging VR Devices: Hidden Side Channel Attacks via Charging Cables65
0.17730188369751