IEEE Transactions on Information Forensics and Security

Papers
(The TQCC of IEEE Transactions on Information Forensics and Security is 11. The table below lists those papers that are above that threshold based on CrossRef citation counts [max. 250 papers]. The publications cover those that have been published in the past four years, i.e., from 2020-05-01 to 2024-05-01.)
ArticleCitations
Visible-Infrared Person Re-Identification via Homogeneous Augmented Tri-Modal Learning170
Combining Graph-Based Learning With Automated Data Collection for Code Vulnerability Detection119
VAE-Stega: Linguistic Steganography Based on Variational Auto-Encoder117
Smart and Practical Privacy-Preserving Data Aggregation for Fog-Based Smart Grids113
Accurate Decentralized Application Identification via Encrypted Traffic Analysis Using Graph Neural Networks112
Privacy-Enhanced Federated Learning Against Poisoning Adversaries105
Towards Scalable and Channel-Robust Radio Frequency Fingerprint Identification for LoRa102
Improving Physical Layer Security of Uplink NOMA via Energy Harvesting Jammers102
VeriFL: Communication-Efficient and Fast Verifiable Aggregation for Federated Learning100
A Siamese CNN for Image Steganalysis100
An Automatic Cost Learning Framework for Image Steganography Using Deep Reinforcement Learning89
Towards Transferable Adversarial Attack Against Deep Face Recognition79
Functionality-Preserving Black-Box Optimization of Adversarial Windows Malware79
MTD-Net: Learning to Detect Deepfakes Images by Multi-Scale Texture Difference78
Unsupervised Adversarial Domain Adaptation for Cross-Domain Face Presentation Attack Detection76
Secure and Lightweight Conditional Privacy-Preserving Authentication for Securing Traffic Emergency Messages in VANETs71
ShieldFL: Mitigating Model Poisoning Attacks in Privacy-Preserving Federated Learning69
Radio Frequency Fingerprint Identification for Narrowband Systems, Modelling and Classification68
Privacy–Enhancing Face Biometrics: A Comprehensive Survey68
A Performance-Sensitive Malware Detection System Using Deep Learning on Mobile Devices67
Attribute-Aligned Domain-Invariant Feature Learning for Unsupervised Domain Adaptation Person Re-Identification64
Secrecy Rate Optimization for Intelligent Reflecting Surface Assisted MIMO System64
Privacy-Preserving Byzantine-Robust Federated Learning via Blockchain Systems63
PolyShard: Coded Sharding Achieves Linearly Scaling Efficiency and Security Simultaneously61
Privacy-Preserving Object Detection for Medical Images With Faster R-CNN61
Privacy-Preserving Localization for Underwater Sensor Networks via Deep Reinforcement Learning60
Image Tampering Localization Using a Dense Fully Convolutional Network60
Physical Layer Security Enhancement With Reconfigurable Intelligent Surface-Aided Networks57
Face Anti-Spoofing via Adversarial Cross-Modality Translation57
Covert Wireless Communications Under Quasi-Static Fading With Channel Uncertainty56
Fine-Grained Webpage Fingerprinting Using Only Packet Length Information of Encrypted Traffic55
Privacy-Preserving Aggregation-Authentication Scheme for Safety Warning System in Fog-Cloud Based VANET55
Dynamic Tri-Level Relation Mining With Attentive Graph for Visible Infrared Re-Identification53
Learning One Class Representations for Face Presentation Attack Detection Using Multi-Channel Convolutional Neural Networks53
Specific Emitter Identification Based on Multi-Level Sparse Representation in Automatic Identification System52
Self-Configurable Cyber-Physical Intrusion Detection for Smart Homes Using Reinforcement Learning51
DRL-FAS: A Novel Framework Based on Deep Reinforcement Learning for Face Anti-Spoofing50
APMSA: Adversarial Perturbation Against Model Stealing Attacks49
SMAKA: Secure Many-to-Many Authentication and Key Agreement Scheme for Vehicular Networks48
Secure Dynamic Searchable Symmetric Encryption With Constant Client Storage Cost48
Random Partitioning Forest for Point-Wise and Collective Anomaly Detection—Application to Network Intrusion Detection47
Multi-Agent Reinforcement Learning-Based Buffer-Aided Relay Selection in IRS-Assisted Secure Cooperative Networks47
Jamming and Eavesdropping Defense Scheme Based on Deep Reinforcement Learning in Autonomous Vehicle Networks47
Physical-Layer Authentication Using Multiple Channel-Based Features46
Joint Optimization of Trajectory, Propulsion, and Thrust Powers for Covert UAV-on-UAV Video Tracking and Surveillance46
Beam-Domain Anti-Jamming Transmission for Downlink Massive MIMO Systems: A Stackelberg Game Perspective45
A Generalizable Model-and-Data Driven Approach for Open-Set RFF Authentication44
Fingerprint Spoof Detector Generalization44
De-Pois: An Attack-Agnostic Defense against Data Poisoning Attacks44
Deep Hashing for Secure Multimodal Biometrics44
Reinforcement Learning-Based Physical-Layer Authentication for Controller Area Networks43
Robust Image Forgery Detection Against Transmission Over Online Social Networks43
Dynamic Multi-Key FHE in Asymmetric Key Setting From LWE42
Learning Meta Pattern for Face Anti-Spoofing42
Enabling Cross-Chain Transactions: A Decentralized Cryptocurrency Exchange Protocol41
Explicit Optimization of min max Steganographic Game41
Evaluation of the Time Stability and Uniqueness in PPG-Based Biometric System41
Contrastive Context-Aware Learning for 3D High-Fidelity Mask Face Presentation Attack Detection40
Improving Generalization by Commonality Learning in Face Forgery Detection40
Fine-Grained Facial Expression Recognition in the Wild40
OBFP: Optimized Blockchain-Based Fair Payment for Outsourcing Computations in Cloud Computing40
Gini-Impurity Index Analysis40
Mockingbird: Defending Against Deep-Learning-Based Website Fingerprinting Attacks With Adversarial Traces40
SecureFace: Face Template Protection40
An Explainable AI-Based Intrusion Detection System for DNS Over HTTPS (DoH) Attacks39
Block-Wise Image Transformation With Secret Key for Adversarially Robust Defense39
The P-DESTRE: A Fully Annotated Dataset for Pedestrian Detection, Tracking, and Short/Long-Term Re-Identification From Aerial Devices39
K-Time Modifiable and Epoch-Based Redactable Blockchain39
Who Is in Control? Practical Physical Layer Attack and Defense for mmWave-Based Sensing in Autonomous Vehicles38
PFA-GAN: Progressive Face Aging With Generative Adversarial Network38
Person Re-Identification by Context-Aware Part Attention and Multi-Head Collaborative Learning38
Comparison of Statistical and Machine Learning Techniques for Physical Layer Authentication38
Model Inversion Attack by Integration of Deep Generative Models: Privacy-Sensitive Face Generation From a Face Recognition System38
Multi-Scale and Multi-Direction GAN for CNN-Based Single Palm-Vein Identification37
DOReN: Toward Efficient Deep Convolutional Neural Networks with Fully Homomorphic Encryption36
Morphing Attack Detection-Database, Evaluation Platform, and Benchmarking36
DeepSBD: A Deep Neural Network Model With Attention Mechanism for SocialBot Detection36
Hunting Vulnerable Smart Contracts via Graph Embedding Based Bytecode Matching36
FA-GAN: Face Augmentation GAN for Deformation-Invariant Face Recognition35
P2BA: A Privacy-Preserving Protocol With Batch Authentication Against Semi-Trusted RSUs in Vehicular Ad Hoc Networks35
Adversarial XAI Methods in Cybersecurity35
An SDN-Enabled Proactive Defense Framework for DDoS Mitigation in IoT Networks34
Redactable Blockchain in Decentralized Setting34
Everybody’s Talkin’: Let Me Talk as You Want34
Preventing DeepFake Attacks on Speaker Authentication by Dynamic Lip Movement Analysis34
Towards Query-Efficient Adversarial Attacks Against Automatic Speech Recognition Systems34
PVD-FL: A Privacy-Preserving and Verifiable Decentralized Federated Learning Framework33
Look Locally Infer Globally: A Generalizable Face Anti-Spoofing Approach33
Conditional Variational Auto-Encoder and Extreme Value Theory Aided Two-Stage Learning Approach for Intelligent Fine-Grained Known/Unknown Intrusion Detection33
Co-Design of Observer-Based Fault Detection Filter and Dynamic Event-Triggered Controller for Wind Power System Under Dual Alterable DoS Attacks33
Public-Key Authenticated Encryption With Keyword Search Supporting Constant Trapdoor Generation and Fast Search33
FakeLocator: Robust Localization of GAN-Based Face Manipulations33
Self-Adversarial Training Incorporating Forgery Attention for Image Forgery Localization32
Relational Deep Feature Learning for Heterogeneous Face Recognition32
Can We Trust Your Explanations? Sanity Checks for Interpreters in Android Malware Analysis32
The Best Defense Is a Good Offense: Adversarial Attacks to Avoid Modulation Detection32
Copy Move Source-Target Disambiguation Through Multi-Branch CNNs31
On the Security of Reversible Data Hiding in Encrypted Images by MSB Prediction31
C2CL: Contact to Contactless Fingerprint Matching31
Injecting Reliable Radio Frequency Fingerprints Using Metasurface for the Internet of Things31
Cooperative Assurance of Cache Data Integrity for Mobile Edge Computing31
Nowhere to Hide: Efficiently Identifying Probabilistic Cloning Attacks in Large-Scale RFID Systems31
On Maximizing the Sum Secret Key Rate for Reconfigurable Intelligent Surface-Assisted Multiuser Systems30
Stealing Neural Network Structure Through Remote FPGA Side-Channel Analysis30
Log-Based Anomaly Detection With Robust Feature Extraction and Online Learning30
A Differentially Private Game Theoretic Approach for Deceiving Cyber Adversaries29
Walking on the Edge: Fast, Low-Distortion Adversarial Examples29
Stealthy MTD Against Unsupervised Learning-Based Blind FDI Attacks in Power Systems29
Sum Secret Key Rate Maximization for TDD Multi-User Massive MIMO Wireless Networks29
Brain-Inspired Golden Chip Free Hardware Trojan Detection29
High-Fidelity Face Manipulation With Extreme Poses and Expressions29
Joint Discriminative Sparse Coding for Robust Hand-Based Multimodal Recognition28
Surface and Internal Fingerprint Reconstruction From Optical Coherence Tomography Through Convolutional Neural Network28
Camera Invariant Feature Learning for Generalized Face Anti-Spoofing28
Finger Vein Recognition via Sparse Reconstruction Error Constrained Low-Rank Representation28
CALPA-NET: Channel-Pruning-Assisted Deep Residual Network for Steganalysis of Digital Images28
Modelling Behavioural Dynamics for Asymmetric Application Layer DDoS Detection28
Detect and Locate: Exposing Face Manipulation by Semantic- and Noise-Level Telltales28
VulDetector: Detecting Vulnerabilities Using Weighted Feature Graph Comparison27
3PAA: A Private PUF Protocol for Anonymous Authentication27
Deep Neural Backdoor in Semi-Supervised Learning: Threats and Countermeasures27
CruParamer: Learning on Parameter-Augmented API Sequences for Malware Detection27
RF Impairment Model-Based IoT Physical-Layer Identification for Enhanced Domain Generalization27
Multi-Level Reversible Data Anonymization via Compressive Sensing and Data Hiding27
Data-Driven Decision Support for Optimizing Cyber Forensic Investigations26
Stop-and-Go: Exploring Backdoor Attacks on Deep Reinforcement Learning-Based Traffic Congestion Control Systems26
Achieving Privacy-Preserving and Verifiable Support Vector Machine Training in the Cloud26
Pilot Contamination Attack Detection for 5G MmWave Grant-Free IoT Networks26
Detecting Overlapped Objects in X-Ray Security Imagery by a Label-Aware Mechanism26
One Parameter Defense—Defending Against Data Inference Attacks via Differential Privacy25
Learning Multi-Granularity Temporal Characteristics for Face Anti-Spoofing25
Efficient Quantum Blockchain With a Consensus Mechanism QDPoS25
Multiuser MIMO Concept for Physical Layer Security in Multibeam Satellite Systems25
Event-Triggered Interval-Based Anomaly Detection and Attack Identification Methods for an In-Vehicle Network25
Semi-Supervised Natural Face De-Occlusion25
Gendered Differences in Face Recognition Accuracy Explained by Hairstyles, Makeup, and Facial Morphology25
Joint Beam Training and Data Transmission Design for Covert Millimeter-Wave Communication25
Blockchain-Enabled Authenticated Key Agreement Scheme for Mobile Vehicles-Assisted Precision Agricultural IoT Networks25
Exploiting Channel Gain and Phase Noise for PHY-Layer Authentication in Massive MIMO Systems25
On Pilot Spoofing Attack in Massive MIMO Systems: Detection and Countermeasure25
Nelder-Mead Simplex Channel Estimation for the RF-DNA Fingerprinting of OFDM Transmitters Under Rayleigh Fading Conditions24
Secure Frequency Control of Hybrid Power System Under DoS Attacks via Lie Algebra24
Efficient Steganography in JPEG Images by Minimizing Performance of Optimal Detector24
ISTVT: Interpretable Spatial-Temporal Video Transformer for Deepfake Detection24
Practical Multi-Party Private Set Intersection Protocols24
Privacy-Aware Time-Series Data Sharing With Deep Reinforcement Learning24
Physical Layer Secure MIMO Communications Against Eavesdroppers With Arbitrary Number of Antennas24
Robust Beamforming Design for Covert Communications24
Synchronized Provable Data Possession Based on Blockchain for Digital Twin24
PFLF: Privacy-Preserving Federated Learning Framework for Edge Computing24
Rethinking Smart Contract Fuzzing: Fuzzing With Invocation Ordering and Important Branch Revisiting24
Adaptive Multi-Trace Carving for Robust Frequency Tracking in Forensic Applications24
Generalized Likelihood Ratio Test for GNSS Spoofing Detection in Devices With IMU24
Copula-Based Analysis of Physical Layer Security Performances Over Correlated Rayleigh Fading Channels24
SAP-SSE: Protecting Search Patterns and Access Patterns in Searchable Symmetric Encryption24
Robust Secure Beamforming for Intelligent Reflecting Surface Assisted Full-Duplex MISO Systems23
Zero-Forcing Beamforming for Active and Passive Eavesdropper Mitigation in Visible Light Communication Systems23
Generative Adversarial Attacks Against Deep-Learning-Based Camera Model Identification23
Valkyrie: Vulnerability Assessment Tool and Attack for Provably-Secure Logic Locking Techniques23
Transform Domain-Based Invertible and Lossless Secret Image Sharing With Authentication23
Artificial Noise-Aided MIMO Physical Layer Authentication With Imperfect CSI23
Understanding Failures in Security Proofs of Multi-Factor Authentication for Mobile Devices23
UNSAIL: Thwarting Oracle-Less Machine Learning Attacks on Logic Locking23
Learning Joint and Specific Patterns: A Unified Sparse Representation for Off-the-Person ECG Biometric Recognition23
A New Adversarial Embedding Method for Enhancing Image Steganography23
FiFTy: Large-Scale File Fragment Type Identification Using Convolutional Neural Networks22
A Transfer Learning Approach for Securing Resource-Constrained IoT Devices22
Hierarchical Frequency-Assisted Interactive Networks for Face Manipulation Detection22
PulseEdit: Editing Physiological Signals in Facial Videos for Privacy Protection22
Study of Pre-Processing Defenses Against Adversarial Attacks on State-of-the-Art Speaker Recognition Systems22
A Practical Fog-Based Privacy-Preserving Online Car-Hailing Service System22
Effective and Robust Physical-World Attacks on Deep Learning Face Recognition Systems22
PAST-AI: Physical-Layer Authentication of Satellite Transmitters via Deep Learning22
One Cycle Attack: Fool Sensor-Based Personal Gait Authentication With Clustering22
On the Physical Layer Security of Untrusted Millimeter Wave Relaying Networks: A Stochastic Geometry Approach22
Robust Iris Presentation Attack Detection Fusing 2D and 3D Information22
TRACE: Enterprise-Wide Provenance Tracking for Real-Time APT Detection22
Efficient Dropout-Resilient Aggregation for Privacy-Preserving Machine Learning22
LiSiam: Localization Invariance Siamese Network for Deepfake Detection22
Periocular-Assisted Multi-Feature Collaboration for Dynamic Iris Recognition22
Dual Adversarial Disentanglement and Deep Representation Decorrelation for NIR-VIS Face Recognition22
Enhanced Secrecy Performance of Multihop IoT Networks With Cooperative Hybrid-Duplex Jamming22
FLCert: Provably Secure Federated Learning Against Poisoning Attacks21
A Dataset and Benchmark for Multimodal Biometric Recognition Based on Fingerprint and Finger Vein21
A Privacy-Preserving Online Ride-Hailing System Without Involving a Third Trusted Server21
Integrating Part-Object Relationship and Contrast for Camouflaged Object Detection21
Secure Automatic Speaker Verification (SASV) System Through sm-ALTP Features and Asymmetric Bagging21
Occlusion-Aware Human Mesh Model-Based Gait Recognition21
F2Trans: High-Frequency Fine-Grained Transformer for Face Forgery Detection21
Server-Aided Bilateral Access Control for Secure Data Sharing With Dynamic User Groups21
Redactable Blockchain From Decentralized Chameleon Hash Functions21
Efficient and Privacy-Preserving Multi-Party Skyline Queries Over Encrypted Data21
Masked Relation Learning for DeepFake Detection21
A3GAN: An Attribute-Aware Attentive Generative Adversarial Network for Face Aging21
Multi-Channel Remote Photoplethysmography Correspondence Feature for 3D Mask Face Presentation Attack Detection20
ForgeryNIR: Deep Face Forgery and Detection in Near-Infrared Scenario20
Rate-Splitting Multiple Access for Communications and Jamming in Multi-Antenna Multi-Carrier Cognitive Radio Systems20
Personal Privacy Protection via Irrelevant Faces Tracking and Pixelation in Video Live Streaming20
Attack-Resilient Optimal PMU Placement via Reinforcement Learning Guided Tree Search in Smart Grids20
Secure and Efficient Multi-Signature Schemes for Fabric: An Enterprise Blockchain Platform20
Secure Millimeter-Wave Ad Hoc Communications Using Physical Layer Security20
Source Camera Verification for Strongly Stabilized Videos20
Detection of Message Injection Attacks Onto the CAN Bus Using Similarities of Successive Messages-Sequence Graphs20
Treating Interference as Noise Is Optimal for Covert Communication Over Interference Channels20
On the Physical Layer Security of the Cooperative Rate-Splitting-Aided Downlink in UAV Networks20
Achieving Covert Wireless Communication With a Multi-Antenna Relay20
Enabling Efficient Spatial Keyword Queries on Encrypted Data With Strong Security Guarantees19
Memory-Modulated Transformer Network for Heterogeneous Face Recognition19
PriScore: Blockchain-Based Self-Tallying Election System Supporting Score Voting19
On Joint Optimization of Automatic Speaker Verification and Anti-Spoofing in the Embedding Space19
AVoiD-DF: Audio-Visual Joint Learning for Detecting Deepfake19
MAAD-Face: A Massively Annotated Attribute Dataset for Face Images19
Behavior-Aware Account De-Anonymization on Ethereum Interaction Graph19
Reversible Data Hiding Based on Adaptive Multiple Histograms Modification19
Insider Threat Modeling: An Adversarial Risk Analysis Approach19
UGaitNet: Multimodal Gait Recognition With Missing Input Modalities19
Multi-Scale Gradients Self-Attention Residual Learning for Face Photo-Sketch Transformation19
A Framework for Predicting Data Breach Risk: Leveraging Dependence to Cope With Sparsity18
Natural Steganography in JPEG Domain With a Linear Development Pipeline18
Optimizing Inner Product Masking Scheme by a Coding Theory Approach18
Designing Leakage-Resilient Password Entry on Head-Mounted Smart Wearable Glass Devices18
Privacy-Preserving Distributed Processing: Metrics, Bounds and Algorithms18
Intrusion Detection Scheme With Dimensionality Reduction in Next Generation Networks18
Physical-Layer Secret Key Generation via CQI-Mapped Spatial Modulation in Multi-Hop Wiretap Ad-Hoc Networks18
Duplicity Games for Deception Design With an Application to Insider Threat Mitigation18
Modern Privacy-Preserving Record Linkage Techniques: An Overview18
Soft Semantic Representation for Cross-Domain Face Recognition18
GapFinder: Finding Inconsistency of Security Information From Unstructured Text18
Application of a Dynamic Line Graph Neural Network for Intrusion Detection With Semisupervised Learning18
Iris Liveness Detection Using a Cascade of Dedicated Deep Learning Networks18
Overcoming Data Limitations: A Few-Shot Specific Emitter Identification Method Using Self-Supervised Learning and Adversarial Augmentation18
Safe Exploration in Wireless Security: A Safe Reinforcement Learning Algorithm With Hierarchical Structure18
Depth as Attention for Face Representation Learning18
On Addressing the Impact of ISO Speed Upon PRNU and Forgery Detection18
Neural Network Modeling Attacks on Arbiter-PUF-Based Designs18
Single-Leader-Multiple-Followers Stackelberg Security Game With Hypergame Framework17
From RGB to Depth: Domain Transfer Network for Face Anti-Spoofing17
Modulation Classification Based on Fourth-Order Cumulants of Superposed Signal in NOMA Systems17
Automatic Segmentation and Enhancement of Latent Fingerprints Using Deep Nested UNets17
Dual-Branch Meta-Learning Network With Distribution Alignment for Face Anti-Spoofing17
Detection of Electric Network Frequency in Audio Recordings–From Theory to Practical Detectors17
Achievable Rate Region of Energy-Harvesting Based Secure Two-Way Buffer-Aided Relay Networks17
Text Backdoor Detection Using an Interpretable RNN Abstract Model17
Gradient Leakage Attack Resilient Deep Learning17
Eye Know You Too: Toward Viable End-to-End Eye Movement Biometrics for User Authentication17
An Efficient Identity-Based Provable Data Possession Protocol With Compressed Cloud Storage17
Secure Active and Passive Beamforming in IRS-Aided MIMO Systems17
Long Short-Term Memory With Gate and State Level Fusion for Light Field-Based Face Recognition17
Attribute-Based Hierarchical Access Control With Extendable Policy16
Covert MIMO Communications Under Variational Distance Constraint16
0.11474680900574