IEEE Transactions on Information Forensics and Security

Papers
(The median citation count of IEEE Transactions on Information Forensics and Security is 4. The table below lists those papers that are above that threshold based on CrossRef citation counts [max. 250 papers]. The publications cover those that have been published in the past four years, i.e., from 2021-10-01 to 2025-10-01.)
ArticleCitations
Citywide Multi-Step Crime Prediction via Context-Aware Bayesian Tensor Decomposition246
Beyond Access Pattern: Efficient Volume-Hiding Multi-Range Queries Over Outsourced Data Services210
Attention-SA: Exploiting Model-Approximated Data Semantics for Adversarial Attack203
CR-DAP: A Comprehensive and Regulatory Decentralized Anonymous Payment System164
Uncoordinated Syntactic Privacy: A New Composable Metric for Multiple, Independent Data Publishing128
Reinforcement Learning-Based Personalized Differentially Private Federated Learning115
A Note on “Secure and Efficient Outsourcing of PCA-Based Face Recognition”110
High Resolution Fingerprint Retrieval Based on Pore Indexing and Graph Comparison106
A Decentralized Threshold Credential Management With Fine-Grained Authentication for VANETs106
Outlier-Resistant Non-Fragile Control of Nonlinear Networked Systems Under DoS Attacks and Multi-Variable Event-Triggered SC Protocol104
Transformer Based Defense GAN Against Palm-Vein Adversarial Attacks103
Exploiting the Adversarial Example Vulnerability of Transfer Learning of Source Code99
ROBY: A Byzantine-Robust and Privacy-Preserving Serverless Federated Learning Framework96
BatchAuth: A Physical Layer Batch Authentication Scheme for Multiple Backscatter Devices95
TCPP: Achieving Privacy-Preserving Trajectory Correlation With Differential Privacy92
PUF-Phenotype: A Robust and Noise-Resilient Approach to Aid Group-Based Authentication With DRAM-PUFs Using Machine Learning90
Low Complexity Byzantine-Resilient Federated Learning89
FADE: A Dataset for Detecting Falling Objects Around Buildings in Video87
SSME: A Semi-Supervised Specific Emitter Identification Method with Manifold Enhancement87
sBugChecker: A Systematic Framework for Detecting Solidity Compiler-Introduced Bugs86
Multi-User Beam Training and Transmission Design for Covert Millimeter-Wave Communication85
Decision-Based Adversarial Attack With Frequency Mixup84
PCSR: Enabling Cross-Modal Semantic Retrieval With Privacy Preservation83
Resource Allocation for STAR-RIS-Assisted MIMO Physical-Layer Key Generation83
Double-Layered Dual-Syndrome Trellis Codes Utilizing Channel Knowledge for Robust Steganography82
BDMMT: Backdoor Sample Detection for Language Models Through Model Mutation Testing82
Stealthy Backdoors as Compression Artifacts81
Exploring Fine-Grained Representation and Recomposition for Cloth-Changing Person Re-Identification80
A Secure Encoding Mechanism Against Deception Attacks on Multisensor Remote State Estimation80
On Message Authentication Channel Capacity Over a Wiretap Channel79
Seeing Traffic Paths: Encrypted Traffic Classification With Path Signature Features79
Learnable Prompts With Neighbor-Aware Correction for Text-Based Person Search79
Practical Multi-Party Private Set Intersection Protocols78
Owner-Enabled Secure Authorized Keyword Search Over Encrypted Data With Flexible Metadata76
Robust Duality Learning for Unsupervised Visible-Infrared Person Re-Identification75
SF2Net: Sequence Feature Fusion Network for Palmprint Verification74
Multisource Heterogeneous Specific Emitter Identification Using Attention Mechanism-Based RFF Fusion Method73
Enhancing Federated Learning with Differentially Private Continuous Data Release via k-Ary Trees73
FVFSNet: Frequency-Spatial Coupling Network for Finger Vein Authentication72
Across-Platform Detection of Malicious Cryptocurrency Accounts via Interaction Feature Learning71
Minipatch: Undermining DNN-Based Website Fingerprinting With Adversarial Patches71
No Time for Remodulation: A PHY Steganographic Symbiotic Channel Over Constant Envelope70
Bidirectional Stackable Recurrent Generative Adversarial Imputation Network for Specific Emitter Missing Data Imputation69
SGBoost: An Efficient and Privacy-Preserving Vertical Federated Tree Boosting Framework69
Adversarial RL-Based IDS for Evolving Data Environment in 6LoWPAN68
BABD: A Bitcoin Address Behavior Dataset for Pattern Analysis68
EARVP: Efficient Aggregation for Federated Learning With Robustness, Verifiability, and Privacy67
A General Purpose Data and Query Privacy Preserving Protocol for Wireless Sensor Networks66
Authentication of Copy Detection Patterns: A Pattern Reliability Based Approach66
Unknown Cyber Threat Discovery Empowered by Genetic Evolution Without Prior Knowledge65
Revisiting the Masking Strategy: A Side-Channel Attack on CRYSTALS-Kyber64
Enhancing Resilience in Website Fingerprinting: Novel Adversary Strategies for Noisy Traffic Environments63
Corrections to “On the Security of a Revocable Cross-Domain Anonymous Authentication in IIoT”63
Efficient Streaming Voice Steganalysis in Challenging Detection Scenarios63
Attackers Are Not the Same! Unveiling the Impact of Feature Distribution on Label Inference Attacks62
Detection of Unknown Attacks Through Encrypted Traffic: A Gaussian Prototype-Aided Variational Autoencoder Framework61
Detecting Locally, Patching Globally: An End-to-End Framework for High Speed and Accurate Detection of Fingerprint Minutiae61
Dangers Behind Charging VR Devices: Hidden Side Channel Attacks via Charging Cables61
The Effect of Inverse Square Law of Light on ENF in Videos Exposed by Rolling Shutter60
Customized Transformer Adapter With Frequency Masking for Deepfake Detection60
SecBNN: Efficient Secure Inference on Binary Neural Networks59
Analyze and Improve Differentially Private Federated Learning: A Model Robustness Perspective58
Online Two-Stage Channel-Based Lightweight Authentication Method for Time-Varying Scenarios57
Fed-UGI: Federated Undersampling Learning Framework With Gini Impurity for Imbalanced Network Intrusion Detection57
Optimal Privacy-Aware Stochastic Sampling56
Hamster: A Fast Synchronous Byzantine Fault Tolerant Protocol56
CMXsafe: A Proxy Layer for Securing Internet-of-Things Communications56
On Covert Communication Performance With Outdated CSI in Wireless Greedy Relay Systems56
On the Impact of Pollution Attacks on Coding-Based Distributed Storage Systems56
Boosting Black-Box Attack to Deep Neural Networks With Conditional Diffusion Models55
Reinforcement Learning Enabled Intelligent Energy Attack in Green IoT Networks55
SIa-CBc: Sensitive Intent-Assisted and Crucial Behavior-Cognized Malware Detection Based on Human Brain Cognitive Theory55
Thwarting GNN-Based Attacks Against Logic Locking54
Assessing Text Classification Methods for Cyberbullying Detection on Social Media Platforms54
The Implications of Insecure Use of Fonts Against PDF Documents and Web Pages54
Adversarial Examples Against WiFi Fingerprint-Based Localization in the Physical World54
Palm Vein Recognition Under Unconstrained and Weak-Cooperative Conditions53
Privacy-Preserving Vertical Federated Learning With Tensor Decomposition for Data Missing Features53
Implicit Alignment-Based Cross-Modal Symbiotic Network for Text-to-Image Person Re-Identification53
Turritopsis: Practical Dynamic Asynchronous BFT53
GuessFuse: Hybrid Password Guessing With Multi-View53
NoLeaks: Differentially Private Causal Discovery Under Functional Causal Model52
FLGuardian: Defending Against Model Poisoning Attacks via Fine-Grained Detection in Federated Learning52
Fast Propagation Is Better: Accelerating Single-Step Adversarial Training via Sampling Subnetworks52
LSFL: A Lightweight and Secure Federated Learning Scheme for Edge Computing51
Privacy-Preserved Distributed Learning With Zeroth-Order Optimization50
G2V2former: Graph Guided Video Vision Transformer for Face Anti-Spoofing50
Group-Wise Verifiable Coded Computing Under Byzantine Attacks and Stragglers49
Using Graph Neural Networks to Improve Generalization Capability of the Models for Deepfake Detection49
Anonymous and Efficient (t, n)-Threshold Ownership Transfer for Cloud EMRs Auditing49
Data Quality Detection Mechanism Against Label Flipping Attacks in Federated Learning49
Event-Triggered Data-Driven Control for Nonlinear Systems Under Frequency-Duration-Constrained DoS Attacks49
Everybody’s Talkin’: Let Me Talk as You Want49
Efficiently Achieving Privacy Preservation and Poisoning Attack Resistance in Federated Learning48
Enhancing Model Generalization for Efficient Cross-Device Side-Channel Analysis48
MOJO: MOtion Pattern Learning and JOint-based Fine-grained Mining for Person Re-identification Based on 4D LiDAR Point Clouds47
BESA: Boosting Encoder Stealing Attack With Perturbation Recovery46
Privacy-Aware and Security-Enhanced Efficient Matchmaking Encryption46
FACOS: Enabling Privacy Protection Through Fine-Grained Access Control With On-Chain and Off-Chain System46
Attacking Mouse Dynamics Authentication Using Novel Wasserstein Conditional DCGAN45
Generative Adversarial Attacks Against Deep- Learning-Based Camera Model Identification45
Privacy-Enhancing Face Obfuscation Guided by Semantic-Aware Attribution Maps45
Privacy-Enhancing and Robust Backdoor Defense for Federated Learning on Heterogeneous Data44
Verifying in the Dark: Verifiable Machine Unlearning by Using Invisible Backdoor Triggers44
Occlusion-Aware Human Mesh Model-Based Gait Recognition44
Robust Visible-Infrared Person Re-Identification Based on Polymorphic Mask and Wavelet Graph Convolutional Network44
K-GetNID: Knowledge-Guided Graphs for Early and Transferable Network Intrusion Detection43
Generalized Autonomous Path Proxy Re-Encryption Scheme to Support Branch Functionality43
Semantic-Aware Adversarial Training for Reliable Deep Hashing Retrieval43
Multi-Key Similar Data Search on Encrypted Storage With Secure Pay-Per-Query43
Lightweight Multi-User Public-Key Authenticated Encryption With Keyword Search43
Secure Model Aggregation Against Poisoning Attacks for Cross-Silo Federated Learning With Robustness and Fairness43
Mixed-Bit Sampling Marking: Towards Unifying Document Authentication in Copy-Sensitive Graphical Codes43
Exploring Bias in Sclera Segmentation Models: A Group Evaluation Approach42
Scanner-Hunter: An Effective ICS Scanning Group Identification System42
Three-in-One: Robust Enhanced Universal Transferable Anti-Facial Retrieval in Online Social Networks42
ETD: An Efficient Time Delay Attack Detection Framework for UAV Networks40
An Interpretable Generalization Mechanism for Accurately Detecting Anomaly and Identifying Networking Intrusion Techniques40
LiSiam: Localization Invariance Siamese Network for Deepfake Detection39
PCSF: Privacy-Preserving Content-Based Spam Filter39
iCoding: Countermeasure Against Interference and Eavesdropping in Wireless Communications39
Proactively Verifying Quantitative Network Policy Across Unsafe and Unreliable Environments39
Succinct Hash-Based Arbitrary-Range Proofs39
Game-Theoretic Neyman-Pearson Detection to Combat Strategic Evasion39
AuthScatter: Accurate, Robust, and Scalable Mutual Authentication in Physical Layer for Backscatter Communications38
FakeBench: Probing Explainable Fake Image Detection via Large Multimodal Models38
A Federated Learning-Based Lightweight Network With Zero Trust for UAV Authentication38
Type2Branch: Keystroke Biometrics Based on a Dual-Branch Architecture With Attention Mechanisms and Set2set Loss38
SepBIN: Binary Feature Separation for Better Semantic Comparison and Authorship Verification38
Building and Testing a Hidden-Password Online Password Manager38
Progressive Sub-Domain Information Mining for Single-Source Generalizable Gait Recognition38
LtRFT: Mitigate the Low-Rate Data Plane DDoS Attack With Learning-To-Rank Enabled Flow Tables38
SCAFinder: Formal Verification of Cache Fine-Grained Features for Side Channel Detection38
Regression of Dense Distortion Field From a Single Fingerprint Image37
An Opportunistic Power Control Scheme for Mitigating User Location Tracking Attacks in Cellular Networks37
Beyond Result Verification: Efficient Privacy-Preserving Spatial Keyword Query With Suppressed Leakage37
Revisiting Gradient Regularization: Inject Robust Saliency-Aware Weight Bias for Adversarial Defense37
Secret Cracking and Security Enhancement for the Image Application of CRT-Based Secret Sharing37
Pilot Spoofing Attack on the Downlink of Cell-Free Massive MIMO: From the Perspective of Adversaries37
Dual Sampling Based Causal Intervention for Face Anti-Spoofing With Identity Debiasing37
Fault Detection and Robust Security Control for Implicit Jump Systems Against Random FDI Attacks and Packet Loss Under Memorized Output-Perceptive Event-Triggered Protocol37
Anti-Backdoor Model: A Novel Algorithm to Remove Backdoors in a Non-Invasive Way37
Extracting Private Training Data in Federated Learning From Clients36
RegPalm: Toward Large-Scale Open-Set Palmprint Recognition by Reducing Pattern Variance36
HELM: Navigating Homomorphic Encryption Through Gates and Lookup Tables36
ColorVein: Colorful Cancelable Vein Biometrics36
A Precoding Perturbation Method in Geometric Optimization: Exploring Manifold Structure for Privacy and Efficiency35
CELEST: Federated Learning for Globally Coordinated Threat Detection35
Data-Driven Dynamic Periodic Event-Triggered Control of Cyber-Physical Systems Under Packet Dropouts and DoS Attacks35
Lavida: Large-Universe, Verifiable, and Dynamic Fine-Grained Access Control for E-Health Cloud35
EVM-Shield: In-Contract State Access Control for Fast Vulnerability Detection and Prevention35
GTAE-IDS: Graph Transformer-Based Autoencoder Framework for Real-Time Network Intrusion Detection35
An Intelligent Reflecting Surface-Based Attack Scheme Against Dual-Functional Radar and Communication Systems34
Logit Margin Matters: Improving Transferable Targeted Adversarial Attack by Logit Calibration34
BPVSE: Publicly Verifiable Searchable Encryption for Cloud-Assisted Electronic Health Records34
SeIoT: Detecting Anomalous Semantics in Smart Homes via Knowledge Graph34
A Multi-Scale Contrast Preserving Encoder-Decoder Architecture for Local Change Detection From Thermal Video Scenes34
Wolverine: A Scalable and Transaction-Consistent Redactable Permissionless Blockchain34
Revisiting Prediction-Based Min-Entropy Estimation: Toward Interpretability, Reliability, and Applicability34
PriVDT: An Efficient Two-Party Cryptographic Framework for Vertical Decision Trees34
A Canonical Data Transformation for Achieving Inter- and Within-Group Fairness34
Reinforcement Learning-Based Tracking Control for Networked Control Systems With DoS Attacks34
Synchronized Provable Data Possession Based on Blockchain for Digital Twin33
ISTVT: Interpretable Spatial-Temporal Video Transformer for Deepfake Detection33
Blockchain-Enabled Computing Offloading and Resource Allocation in Multi-UAVs MEC Network: A Stackelberg Game Learning Approach33
Toward Mobile Palmprint Recognition via Multi-View Hierarchical Graph Learning33
Smart App Attack: Hacking Deep Learning Models in Android Apps33
Toward Automated Field Semantics Inference for Binary Protocol Reverse Engineering33
Binarizing Split Learning for Data Privacy Enhancement and Computation Reduction33
Three Birds With One Stone: User Intention Understanding and Influential Neighbor Disclosure for Injection Attack Detection33
Fast Privacy-Preserving Text Classification Based on Secure Multiparty Computation33
The Dark Forest: Understanding Security Risks of Cross-Party Delegated Resources in Mobile App-in-App Ecosystems32
AuditPCH: Auditable Payment Channel Hub With Privacy Protection32
Disentangled Representation Learning for Robust Brainprint Recognition32
Optimal Client Selection of Federated Learning Based on Compressed Sensing32
Joint Transmissive and Reflective RIS-Aided Secure MIMO Systems Design Under Spatially-Correlated Angular Uncertainty and Coupled PSEs32
Enabling Fraud Prediction on Preliminary Data Through Information Density Booster32
Healthcare Security: Post-Quantum Continuous Authentication With Behavioral Biometrics Using Vector Similarity Search32
Online Writer Retrieval With Chinese Handwritten Phrases: A Synergistic Temporal-Frequency Representation Learning Approach32
An Efficient and Verifiable Encrypted Data Filtering Framework Over Large-Scale Storage in Cloud Edge32
Balanced Encoding of Near-Zero Correlation for an AES Implementation32
Intra-Domain Knowledge Reuse Assisted Reinforcement Learning for Fast Anti-Jamming Communication32
Multi-Antenna Signal Masking and Round-Trip Transmission for Privacy-Preserving Wireless Sensing31
Comparing Different Membership Inference Attacks With a Comprehensive Benchmark31
PowerGuard: Using Power Side-Channel Signals to Secure Motion Controllers in ICS31
Specific Emitter Identification via Sparse Bayesian Learning Versus Model-Agnostic Meta-Learning31
Libras: A Fair, Secure, Verifiable, and Scalable Outsourcing Computation Scheme Based on Blockchain31
ProVFL: Property Inference Attacks Against Vertical Federated Learning31
Leveraging Ensembles and Self-Supervised Learning for Fully-Unsupervised Person Re-Identification and Text Authorship Attribution30
RTrap: Trapping and Containing Ransomware With Machine Learning30
Joint Holistic and Masked Face Recognition30
DOEPatch: Dynamically Optimized Ensemble Model for Adversarial Patches Generation30
Revealing the Secrets of Radio Embedded Systems: Extraction of Raw Information via RF30
Nighttime Person Re-Identification via Collaborative Enhancement Network With Multi-Domain Learning30
CoSwinVIT: A Vision Transformer for Enhanced Uniform Spectrum Response in Specific Emitter Identification30
Lightweight Dynamic Conjunctive Keyword Searchable Encryption With Result Pattern Hiding30
CHERUBIM: A Secure and Highly Parallel Cross-Shard Consensus Using Quadruple Pipelined Two-Phase Commit for Sharding Blockchains30
Quantization Noise as an Asset: Optimizing Physical Layer Security With Sigma-Delta Modulation29
Bi-Stream Coteaching Network for Weakly-Supervised Deepfake Localization in Videos29
Collaborative Honeypot Defense in UAV Networks: A Learning-Based Game Approach29
Enabling Efficient and Strong Privacy-Preserving Truth Discovery in Mobile Crowdsensing29
A Synthetic Data-Assisted Satellite Terrestrial Integrated Network Intrusion Detection Framework29
Analog Secret Sharing With Applications to Private Distributed Learning29
APIVADS: A Novel Privacy-Preserving Pivot Attack Detection Scheme Based on Statistical Pattern Recognition29
An Efficient Identity-Based Provable Data Possession Protocol With Compressed Cloud Storage29
PPGloVe: Privacy-Preserving GloVe for Training Word Vectors in the Dark28
Angle and Distance Discrimination by Utilizing Frequency Conversion Capability of STC-IRS for Covert Communications28
DP-Norm: Differential Privacy Primal-Dual Algorithm for Decentralized Federated Learning28
MalPacDetector: An LLM-Based Malicious NPM Package Detector28
Detecting Lifecycle-Related Concurrency Bugs in ROS Programs via Coverage-Guided Fuzzing28
SecureReID: Privacy-Preserving Anonymization for Person Re-Identification28
Everything Under Control: Secure Data Sharing Mechanism for Cloud-Edge Computing28
Comments on “Privacy-Enhanced Federated Learning Against Poisoning Adversaries”28
Bitcoin-Compatible Privacy-Preserving Multi-Party Payment Channels Supporting Variable Amounts28
Titan: Security Analysis of Large-Scale Hardware Obfuscation Using Graph Neural Networks28
Encrypted and Compressed Key-Value Store With Pattern-Analysis Security in Cloud Systems28
Data-Agnostic Model Poisoning Against Federated Learning: A Graph Autoencoder Approach27
Efficient Verifiable Protocol for Privacy-Preserving Aggregation in Federated Learning27
Signed Latent Factors for Spamming Activity Detection27
Intrusion Detection for Internet of Things: An Anchor Graph Clustering Approach27
TRacer: Scalable Graph-Based Transaction Tracing for Account-Based Blockchain Trading Systems27
Parallel PAM for Secure Transmission27
TIM: Enabling Large-Scale White-Box Testing on In-App Deep Learning Models27
Privacy-Preserving Aggregation-Authentication Scheme for Safety Warning System in Fog-Cloud Based VANET27
Breaking XOR Arbiter PUFs With Chosen Challenge Attack27
Privacy-Preserving Authentication for Unlinkable Avatars in the Metaverse27
Towards Effective Rotation Generalization in UAV Object Re-Identification26
Systematically Quantifying Cryptanalytic Nonlinearities in Strong PUFs26
Toward Secure and Verifiable Hybrid Federated Learning26
Device-Enhanced Password-Based Threshold Single-Sign-On Authentication26
Perception-Driven Imperceptible Adversarial Attack Against Decision-Based Black-Box Models26
Dispersed Pixel Perturbation-Based Imperceptible Backdoor Trigger for Image Classifier Models26
Redactable Blockchain From Decentralized Chameleon Hash Functions26
ALScA: A Framework for Using Auxiliary Learning Side-Channel Attacks to Model PUFs26
Information- and Coding-Theoretic Analysis of the RLWE/MLWE Channel26
Dynamic Analysis of Multiplex Networks With Hybrid Maintenance Strategies26
DeepCRF: Deep Learning-Enhanced CSI-Based RF Fingerprinting for Channel-Resilient WiFi Device Identification26
ASRL: Adaptive Swarm Reinforcement Learning for Enhanced OSN Intrusion Detection25
Adversarial Waveform Design for Wireless Transceivers Toward Intelligent Eavesdropping25
Minimizing Adversarial Training Samples for Robust Image Classifiers: Analysis and Adversarial Example Generator Design25
Query-Efficient Decision-Based Black-Box Patch Attack25
Secure and Privacy-Preserving Distributed Kalman Filtering for Sensor Networks With Event-Triggered Mechanism25
Supervised Enhancement for Fingertip OCT Images Based on Paired Dataset Generation Strategy25
From the Dialectical Perspective: Modeling and Exploiting of Hybrid Worm Propagation25
SStore: An Efficient and Secure Provable Data Auditing Platform for Cloud25
Attention Consistency Refined Masked Frequency Forgery Representation for Generalizing Face Forgery Detection24
Dual Consistency-Constrained Learning for Unsupervised Visible-Infrared Person Re-Identification24
Scale-Invariant Adversarial Attack Against Arbitrary-Scale Super-Resolution24
A GAN-Based Defense Framework Against Model Inversion Attacks24
Multi-Temporal Partitioned Graph Attention Networks for Financial Fraud Detection24
0.23827314376831