IEEE Transactions on Information Forensics and Security

Papers
(The TQCC of IEEE Transactions on Information Forensics and Security is 10. The table below lists those papers that are above that threshold based on CrossRef citation counts [max. 250 papers]. The publications cover those that have been published in the past four years, i.e., from 2021-06-01 to 2025-06-01.)
ArticleCitations
High Resolution Fingerprint Retrieval Based on Pore Indexing and Graph Comparison199
Low Complexity Byzantine-Resilient Federated Learning172
CR-DAP: A Comprehensive and Regulatory Decentralized Anonymous Payment System167
Uncoordinated Syntactic Privacy: A New Composable Metric for Multiple, Independent Data Publishing107
Reinforcement Learning-Based Personalized Differentially Private Federated Learning95
Robust Duality Learning for Unsupervised Visible-Infrared Person Re-Identification91
Attention-SA: Exploiting Model-Approximated Data Semantics for Adversarial Attack88
BatchAuth: A Physical Layer Batch Authentication Scheme for Multiple Backscatter Devices86
A Note on “Secure and Efficient Outsourcing of PCA-Based Face Recognition”85
Exploiting the Adversarial Example Vulnerability of Transfer Learning of Source Code84
Beyond Access Pattern: Efficient Volume-Hiding Multi-Range Queries Over Outsourced Data Services79
A Secure Encoding Mechanism Against Deception Attacks on Multisensor Remote State Estimation78
Across-Platform Detection of Malicious Cryptocurrency Accounts via Interaction Feature Learning76
Multi-User Beam Training and Transmission Design for Covert Millimeter-Wave Communication76
Owner-Enabled Secure Authorized Keyword Search Over Encrypted Data With Flexible Metadata76
On Message Authentication Channel Capacity Over a Wiretap Channel75
Double-Layered Dual-Syndrome Trellis Codes Utilizing Channel Knowledge for Robust Steganography74
TCPP: Achieving Privacy-Preserving Trajectory Correlation With Differential Privacy72
PUF-Phenotype: A Robust and Noise-Resilient Approach to Aid Group-Based Authentication With DRAM-PUFs Using Machine Learning72
Decision-Based Adversarial Attack With Frequency Mixup71
Transformer Based Defense GAN Against Palm-Vein Adversarial Attacks69
Practical Multi-Party Private Set Intersection Protocols68
Seeing Traffic Paths: Encrypted Traffic Classification With Path Signature Features68
Resource Allocation for STAR-RIS-Assisted MIMO Physical-Layer Key Generation68
Multisource Heterogeneous Specific Emitter Identification Using Attention Mechanism-Based RFF Fusion Method67
FVFSNet: Frequency-Spatial Coupling Network for Finger Vein Authentication66
Outlier-Resistant Non-Fragile Control of Nonlinear Networked Systems Under DoS Attacks and Multi-Variable Event-Triggered SC Protocol66
BDMMT: Backdoor Sample Detection for Language Models Through Model Mutation Testing66
Minipatch: Undermining DNN-Based Website Fingerprinting With Adversarial Patches65
Exploring Fine-Grained Representation and Recomposition for Cloth-Changing Person Re-Identification65
Stealthy Backdoors as Compression Artifacts65
Attacking Mouse Dynamics Authentication Using Novel Wasserstein Conditional DCGAN64
On the Impact of Pollution Attacks on Coding-Based Distributed Storage Systems63
Bidirectional Stackable Recurrent Generative Adversarial Imputation Network for Specific Emitter Missing Data Imputation63
Efficiently Achieving Privacy Preservation and Poisoning Attack Resistance in Federated Learning61
Occlusion-Aware Human Mesh Model-Based Gait Recognition61
On Covert Communication Performance With Outdated CSI in Wireless Greedy Relay Systems61
Generative Adversarial Attacks Against Deep-Learning-Based Camera Model Identification61
SGBoost: An Efficient and Privacy-Preserving Vertical Federated Tree Boosting Framework60
Palm Vein Recognition Under Unconstrained and Weak-Cooperative Conditions60
Semantic-Aware Adversarial Training for Reliable Deep Hashing Retrieval60
Group-Wise Verifiable Coded Computing Under Byzantine Attacks and Stragglers59
Authentication of Copy Detection Patterns: A Pattern Reliability Based Approach57
BABD: A Bitcoin Address Behavior Dataset for Pattern Analysis57
The Effect of Inverse Square Law of Light on ENF in Videos Exposed by Rolling Shutter56
GuessFuse: Hybrid Password Guessing With Multi-View56
SIa-CBc: Sensitive Intent-Assisted and Crucial Behavior-Cognized Malware Detection Based on Human Brain Cognitive Theory56
Adversarial Examples Against WiFi Fingerprint-Based Localization in the Physical World55
CMXsafe: A Proxy Layer for Securing Internet-of-Things Communications55
Adversarial RL-Based IDS for Evolving Data Environment in 6LoWPAN55
SecBNN: Efficient Secure Inference on Binary Neural Networks52
Generalized Autonomous Path Proxy Re-Encryption Scheme to Support Branch Functionality52
Attackers Are Not the Same! Unveiling the Impact of Feature Distribution on Label Inference Attacks51
Online Two-Stage Channel-Based Lightweight Authentication Method for Time-Varying Scenarios51
Analyze and Improve Differentially Private Federated Learning: A Model Robustness Perspective51
Fed-UGI: Federated Undersampling Learning Framework With Gini Impurity for Imbalanced Network Intrusion Detection50
Hamster: A Fast Synchronous Byzantine Fault Tolerant Protocol50
No Time for Remodulation: A PHY Steganographic Symbiotic Channel Over Constant Envelope50
Privacy-Preserving Vertical Federated Learning With Tensor Decomposition for Data Missing Features49
FACOS: Enabling Privacy Protection Through Fine-Grained Access Control With On-Chain and Off-Chain System49
Revisiting the Masking Strategy: A Side-Channel Attack on CRYSTALS-Kyber49
Anonymous and Efficient (t, n)-Threshold Ownership Transfer for Cloud EMRs Auditing48
Enhancing Resilience in Website Fingerprinting: Novel Adversary Strategies for Noisy Traffic Environments47
Privacy-Preserved Distributed Learning With Zeroth-Order Optimization46
Secure Model Aggregation Against Poisoning Attacks for Cross-Silo Federated Learning With Robustness and Fairness46
NoLeaks: Differentially Private Causal Discovery Under Functional Causal Model46
Privacy-Enhancing and Robust Backdoor Defense for Federated Learning on Heterogeneous Data46
Thwarting GNN-Based Attacks Against Logic Locking45
Boosting Black-Box Attack to Deep Neural Networks With Conditional Diffusion Models45
Fast Propagation Is Better: Accelerating Single-Step Adversarial Training via Sampling Subnetworks45
Dangers Behind Charging VR Devices: Hidden Side Channel Attacks via Charging Cables44
Reinforcement Learning Enabled Intelligent Energy Attack in Green IoT Networks44
Data Quality Detection Mechanism Against Label Flipping Attacks in Federated Learning44
Turritopsis: Practical Dynamic Asynchronous BFT44
Event-Triggered Data-Driven Control for Nonlinear Systems Under Frequency-Duration-Constrained DoS Attacks44
Verifying in the Dark: Verifiable Machine Unlearning by Using Invisible Backdoor Triggers43
A General Purpose Data and Query Privacy Preserving Protocol for Wireless Sensor Networks43
Privacy-Aware and Security-Enhanced Efficient Matchmaking Encryption43
FLGuardian: Defending against Model Poisoning Attacks via Fine-grained Detection in Federated Learning43
Everybody’s Talkin’: Let Me Talk as You Want42
Multi-Key Similar Data Search on Encrypted Storage With Secure Pay-Per-Query42
LSFL: A Lightweight and Secure Federated Learning Scheme for Edge Computing42
Privacy-Enhancing Face Obfuscation Guided by Semantic-Aware Attribution Maps42
Using Graph Neural Networks to Improve Generalization Capability of the Models for Deepfake Detection42
Robust Visible-Infrared Person Re-Identification Based on Polymorphic Mask and Wavelet Graph Convolutional Network41
Detecting Locally, Patching Globally: An End-to-End Framework for High Speed and Accurate Detection of Fingerprint Minutiae40
Lavida: Large-Universe, Verifiable, and Dynamic Fine-Grained Access Control for E-Health Cloud39
Optimal Privacy-Aware Stochastic Sampling39
Beyond Result Verification: Efficient Privacy-Preserving Spatial Keyword Query With Suppressed Leakage39
Fault Detection and Robust Security Control for Implicit Jump Systems Against Random FDI Attacks and Packet Loss Under Memorized Output-Perceptive Event-Triggered Protocol39
Customized Transformer Adapter with Frequency Masking for Deepfake Detection39
On the Security of a Revocable Cross-Domain Anonymous Authentication in IIoT39
Blockchain-Enabled Computing Offloading and Resource Allocation in Multi-UAVs MEC Network: A Stackelberg Game Learning Approach38
K-GetNID: Knowledge-Guided Graphs for Early and Transferable Network Intrusion Detection38
Lightweight Multi-User Public-Key Authenticated Encryption With Keyword Search38
An Intelligent Reflecting Surface-Based Attack Scheme Against Dual-Functional Radar and Communication Systems38
Data-Driven Dynamic Periodic Event-Triggered Control of Cyber-Physical Systems Under Packet Dropouts and DoS Attacks37
EVM-Shield: In-Contract State Access Control for Fast Vulnerability Detection and Prevention37
Exploring Bias in Sclera Segmentation Models: A Group Evaluation Approach37
GTAE-IDS: Graph Transformer-Based Autoencoder Framework for Real-Time Network Intrusion Detection37
An Interpretable Generalization Mechanism for Accurately Detecting Anomaly and Identifying Networking Intrusion Techniques36
SeIoT: Detecting Anomalous Semantics in Smart Homes via Knowledge Graph36
Fast Privacy-Preserving Text Classification Based on Secure Multiparty Computation36
PCSF: Privacy-Preserving Content-Based Spam Filter36
An Opportunistic Power Control Scheme for Mitigating User Location Tracking Attacks in Cellular Networks36
SepBIN: Binary Feature Separation for Better Semantic Comparison and Authorship Verification35
Scanner-Hunter: An Effective ICS Scanning Group Identification System35
Wolverine: A Scalable and Transaction-Consistent Redactable Permissionless Blockchain35
Three-in-One: Robust Enhanced Universal Transferable Anti-Facial Retrieval in Online Social Networks35
Regression of Dense Distortion Field From a Single Fingerprint Image34
SCAFinder: Formal Verification of Cache Fine-Grained Features for Side Channel Detection34
iCoding: Countermeasure Against Interference and Eavesdropping in Wireless Communications33
Three Birds With One Stone: User Intention Understanding and Influential Neighbor Disclosure for Injection Attack Detection33
Progressive Sub-Domain Information Mining for Single-Source Generalizable Gait Recognition33
Secret Cracking and Security Enhancement for the Image Application of CRT-Based Secret Sharing32
HELM: Navigating Homomorphic Encryption Through Gates and Lookup Tables32
Proactively Verifying Quantitative Network Policy Across Unsafe and Unreliable Environments32
Pilot Spoofing Attack on the Downlink of Cell-Free Massive MIMO: From the Perspective of Adversaries32
Game-Theoretic Neyman-Pearson Detection to Combat Strategic Evasion32
Succinct Hash-Based Arbitrary-Range Proofs32
A Canonical Data Transformation for Achieving Inter- and Within-Group Fairness32
BPVSE: Publicly Verifiable Searchable Encryption for Cloud-Assisted Electronic Health Records31
PriVDT: An Efficient Two-Party Cryptographic Framework for Vertical Decision Trees31
Logit Margin Matters: Improving Transferable Targeted Adversarial Attack by Logit Calibration31
Anti-Backdoor Model: A Novel Algorithm to Remove Backdoors in a Non-Invasive Way31
Toward Automated Field Semantics Inference for Binary Protocol Reverse Engineering31
Extracting Private Training Data in Federated Learning From Clients31
LiSiam: Localization Invariance Siamese Network for Deepfake Detection30
LtRFT: Mitigate the Low-Rate Data Plane DDoS Attack With Learning-To-Rank Enabled Flow Tables30
A Multi-Scale Contrast Preserving Encoder-Decoder Architecture for Local Change Detection From Thermal Video Scenes30
Synchronized Provable Data Possession Based on Blockchain for Digital Twin30
Binarizing Split Learning for Data Privacy Enhancement and Computation Reduction30
Reinforcement Learning-Based Tracking Control for Networked Control Systems With DoS Attacks30
ETD: An Efficient Time Delay Attack Detection Framework for UAV Networks30
Dual Sampling Based Causal Intervention for Face Anti-Spoofing With Identity Debiasing29
Toward Mobile Palmprint Recognition via Multi-View Hierarchical Graph Learning29
Type2Branch: Keystroke Biometrics based on a Dual-branch Architecture with Attention Mechanisms and Set2set Loss29
ColorVein: Colorful Cancelable Vein Biometrics29
Smart App Attack: Hacking Deep Learning Models in Android Apps29
Revisiting Gradient Regularization: Inject Robust Saliency-Aware Weight Bias for Adversarial Defense29
Online Writer Retrieval With Chinese Handwritten Phrases: A Synergistic Temporal-Frequency Representation Learning Approach28
DOEPatch: Dynamically Optimized Ensemble Model for Adversarial Patches Generation28
Enabling Fraud Prediction on Preliminary Data Through Information Density Booster28
The Dark Forest: Understanding Security Risks of Cross-Party Delegated Resources in Mobile App-in-App Ecosystems28
ISTVT: Interpretable Spatial-Temporal Video Transformer for Deepfake Detection28
PPGloVe: Privacy-Preserving GloVe for Training Word Vectors in the Dark28
Analog Secret Sharing With Applications to Private Distributed Learning28
Joint Transmissive and Reflective RIS-Aided Secure MIMO Systems Design Under Spatially-Correlated Angular Uncertainty and Coupled PSEs28
AuditPCH: Auditable Payment Channel Hub With Privacy Protection28
Signed Latent Factors for Spamming Activity Detection28
Balanced Encoding of Near-Zero Correlation for an AES Implementation27
Optimal Client Selection of Federated Learning Based on Compressed Sensing27
Libras: A Fair, Secure, Verifiable, and Scalable Outsourcing Computation Scheme Based on Blockchain27
Bitcoin-Compatible Privacy-Preserving Multi-Party Payment Channels Supporting Variable Amounts27
Multi-Antenna Signal Masking and Round-Trip Transmission for Privacy-Preserving Wireless Sensing27
Bi-Stream Coteaching Network for Weakly-Supervised Deepfake Localization in Videos27
Healthcare Security: Post-Quantum Continuous Authentication With Behavioral Biometrics Using Vector Similarity Search27
Data-Agnostic Model Poisoning Against Federated Learning: A Graph Autoencoder Approach27
Titan: Security Analysis of Large-Scale Hardware Obfuscation Using Graph Neural Networks27
An Efficient and Verifiable Encrypted Data Filtering Framework Over Large-Scale Storage in Cloud Edge27
A Synthetic Data-Assisted Satellite Terrestrial Integrated Network Intrusion Detection Framework27
Angle and Distance Discrimination by Utilizing Frequency Conversion Capability of STC-IRS for Covert Communications27
Joint Holistic and Masked Face Recognition26
DP-Norm: Differential Privacy Primal-Dual Algorithm for Decentralized Federated Learning26
TRacer: Scalable Graph-Based Transaction Tracing for Account-Based Blockchain Trading Systems26
CoSwinVIT: A Vision Transformer for Enhanced Uniform Spectrum Response in Specific Emitter Identification26
Specific Emitter Identification via Sparse Bayesian Learning Versus Model-Agnostic Meta-Learning26
PowerGuard: Using Power Side-Channel Signals to Secure Motion Controllers in ICS26
SecureReID: Privacy-Preserving Anonymization for Person Re-Identification26
Everything Under Control: Secure Data Sharing Mechanism for Cloud-Edge Computing26
Encrypted and Compressed Key-Value Store With Pattern-Analysis Security in Cloud Systems26
APIVADS: A Novel Privacy-Preserving Pivot Attack Detection Scheme Based on Statistical Pattern Recognition26
Collaborative Honeypot Defense in UAV Networks: A Learning-Based Game Approach26
RTrap: Trapping and Containing Ransomware With Machine Learning26
Nighttime Person Re-Identification via Collaborative Enhancement Network With Multi-Domain Learning26
Leveraging Ensembles and Self-Supervised Learning for Fully-Unsupervised Person Re-Identification and Text Authorship Attribution26
Intrusion Detection for Internet of Things: An Anchor Graph Clustering Approach25
Enabling Efficient and Strong Privacy-Preserving Truth Discovery in Mobile Crowdsensing25
Privacy-Preserving Aggregation-Authentication Scheme for Safety Warning System in Fog-Cloud Based VANET25
Comments on “Privacy-Enhanced Federated Learning Against Poisoning Adversaries”25
Intra-Domain Knowledge Reuse Assisted Reinforcement Learning for Fast Anti-Jamming Communication25
An Efficient Identity-Based Provable Data Possession Protocol With Compressed Cloud Storage25
Efficient Verifiable Protocol for Privacy-Preserving Aggregation in Federated Learning25
Revealing the Secrets of Radio Embedded Systems: Extraction of Raw Information via RF25
Comparing Different Membership Inference Attacks with a Comprehensive Benchmark25
Breaking XOR Arbiter PUFs With Chosen Challenge Attack25
CHERUBIM: A Secure and Highly Parallel Cross-Shard Consensus Using Quadruple Pipelined Two-Phase Commit for Sharding Blockchains24
Key Agreement Using Physical Identifiers for Degraded and Less Noisy Authentication Channels24
ASRL: Adaptive Swarm Reinforcement Learning for Enhanced OSN Intrusion Detection24
Robust Proxy: Improving Adversarial Robustness by Robust Proxy Learning24
GuardBox: A High-Performance Middlebox Providing Confidentiality and Integrity for Packets24
From the Dialectical Perspective: Modeling and Exploiting of Hybrid Worm Propagation24
Evaluating Security and Robustness for Split Federated Learning Against Poisoning Attacks24
Low Communication Secure Computation From Semi-Trusted Hardware24
DeepCRF: Deep Learning-Enhanced CSI-Based RF Fingerprinting for Channel-Resilient WiFi Device Identification24
TIM: Enabling Large-Scale White-Box Testing on In-App Deep Learning Models24
GaitReload: A Reloading Framework for Defending Against On-Manifold Adversarial Gait Sequences24
ECO-BIKE: Bridging the Gap Between PQC BIKE and GPU Acceleration24
Dynamic Analysis of Multiplex Networks With Hybrid Maintenance Strategies24
Device-Enhanced Password-Based Threshold Single-Sign-On Authentication23
Systematically Quantifying Cryptanalytic Nonlinearities in Strong PUFs23
Self-Secure Capacity-Achieving Feedback Schemes of Gaussian Multiple-Access Wiretap Channels With Degraded Message Sets23
Towards Effective Rotation Generalization in UAV Object Re-Identification23
Parallel PAM for Secure Transmission23
Secure Stabilization of Networked Lur’e Systems Suffering From DoS Attacks: A Resilient Memory-Based Event-Trigger Mechanism23
Discrete Spectral Encryption of Single-Carrier Signals With Pseudo Random Dynamic Keys22
Online/Offline and History Indexing Identity-Based Fuzzy Message Detection22
Information- and Coding-Theoretic Analysis of the RLWE/MLWE Channel22
An Adaptability-Enhanced Few-Shot Website Fingerprinting Attack Based on Collusion22
Joint Secure Beamforming and Power Splitting Design for MIMO Relay Assisted Over-the-Air Computation Networks With Imperfect CSI22
Scale-Invariant Adversarial Attack Against Arbitrary-Scale Super-Resolution22
Perception-Driven Imperceptible Adversarial Attack Against Decision-Based Black-Box Models22
Minimizing Adversarial Training Samples for Robust Image Classifiers: Analysis and Adversarial Example Generator Design22
Dispersed Pixel Perturbation-Based Imperceptible Backdoor Trigger for Image Classifier Models22
Dual-Server Boolean Data Retrieval for Highly-Scalable Secure File Sharing Services22
A Stream Learning Approach for Real-Time Identification of False Data Injection Attacks in Cyber-Physical Power Systems21
A GAN-Based Defense Framework Against Model Inversion Attacks21
SStore: An Efficient and Secure Provable Data Auditing Platform for Cloud21
Cancellable Template Design for Privacy-Preserving EEG Biometric Authentication Systems21
On the Unbearable Lightness of FIPS 140–2 Randomness Tests21
Redactable Blockchain From Decentralized Chameleon Hash Functions21
Comprehensive Android Malware Detection Based on Federated Learning Architecture21
Subversion-Resistant and Consistent Attribute-Based Keyword Search for Secure Cloud Storage21
ALScA: A Framework for Using Auxiliary Learning Side-Channel Attacks to Model PUFs21
PkT-SIN: A Secure Communication Protocol for Space Information Networks With Periodic k-Time Anonymous Authentication21
Query-Efficient Decision-Based Black-Box Patch Attack20
Dual Consistency-Constrained Learning for Unsupervised Visible-Infrared Person Re-Identification20
Robust Generative Steganography for Image Hiding Using Concatenated Mappings20
Nebula: Self-Attention for Dynamic Malware Analysis20
Unified Performance Evaluation Method for Perceptual Image Hashing20
Attention Consistency Refined Masked Frequency Forgery Representation for Generalizing Face Forgery Detection20
A Lightweight Transformer-Based Approach of Specific Emitter Identification for the Automatic Identification System20
MDHE: A Malware Detection System Based on Trust Hybrid User-Edge Evaluation in IoT Network20
Fine-Grained Question-Level Deception Detection via Graph-Based Learning and Cross-Modal Fusion20
Supervised Enhancement for Fingertip OCT Images Based on Paired Dataset Generation Strategy20
Toward Secure and Verifiable Hybrid Federated Learning20
Efficient Dropout-Resilient Aggregation for Privacy-Preserving Machine Learning20
Maximizing Uncertainty for Federated Learning via Bayesian Optimization-Based Model Poisoning19
Malicious Internet Entity Detection Using Local Graph Inference19
ReTrial: Robust Encrypted Malicious Traffic Detection via Discriminative Relation Incorporation and Misleading Relation Correction19
Embedding Secret Message in Chinese Characters via Glyph Perturbation and Style Transfer19
On the Impact of Warden Collusion on Covert Communication in Wireless Networks19
Accountable Secret Committee Election and Anonymous Sharding Blockchain Consensus19
Lightweight Privacy-Preserving GAN Framework for Model Training and Image Synthesis19
Erase and Repair: An Efficient Box-Free Removal Attack on High-Capacity Deep Hiding19
Hodor: Robust Fine-Grained Information Flow Control With Full Data Traffic Protection for Cloud-Edge Computing19
MC-Net: Realistic Sample Generation for Black-Box Attacks19
Efficient and Privacy-Preserving Encode-Based Range Query Over Encrypted Cloud Data19
UltraVCS: Ultra-Fine-Grained Variable-Based Code Slicing for Automated Vulnerability Detection19
SLIM: A Secure and Lightweight Multi-Authority Attribute-Based Signcryption Scheme for IoT18
0.085502862930298