IEEE Transactions on Information Forensics and Security

IEEE Transactions on Information Forensics and Security

ISSNs: 1556-6013

Additional searchable ISSN (Electronic): 1556-6021

IEEE-INST ELECTRICAL ELECTRONICS ENGINEERS INC, United States

Scopus rating (2022): CiteScore 14.7 SJR 2.652 SNIP 2.664

Journal

Journal Metrics

Research Output

  1. 2020
  2. Published

    Lightweight and Privacy-Preserving Template Generation for Palm-Vein-Based Human Recognition

    Ahmad, F., Cheng, L. & Khan, A., 2020, In: IEEE Transactions on Information Forensics and Security. 15, p. 184-194

    Research output: Journal Publications and Reviews (RGC: 21, 22, 62)21_Publication in refereed journalpeer-review

    Scopus citations: 35
    Check@CityULib
  3. 2019
  4. Published

    CReam: A Smart Contract Enabled Collusion-Resistant e-Auction

    Wu, S., Chen, Y., Wang, Q., Li, M., Wang, C. & Luo, X., Jul 2019, In: IEEE Transactions on Information Forensics and Security. 14, 7, p. 1687-1701

    Research output: Journal Publications and Reviews (RGC: 21, 22, 62)21_Publication in refereed journalpeer-review

    Scopus citations: 70
    Check@CityULib
  5. Published

    pRide: Privacy-preserving Ride-matching over Road Networks for Online Ride Hailing Service

    Luo, Y., Jia, X., Fu, S. & Xu, M., Jul 2019, In: IEEE Transactions on Information Forensics and Security. 14, 7, p. 1791-1802

    Research output: Journal Publications and Reviews (RGC: 21, 22, 62)21_Publication in refereed journalpeer-review

    Scopus citations: 62
    Check@CityULib
  6. Published

    RNN-Stega: Linguistic Steganography Based on Recurrent Neural Networks

    Yang, Z., Guo, X., Chen, Z., Huang, Y. & Zhang, Y., May 2019, In: IEEE Transactions on Information Forensics and Security. 14, 5, p. 1280-1295 8470163.

    Research output: Journal Publications and Reviews (RGC: 21, 22, 62)21_Publication in refereed journalpeer-review

    Scopus citations: 161
    Check@CityULib
  7. Published

    PROST: Privacy-Preserving and Truthful Online Double Auction for Spectrum Allocation

    Wang, Q., Huang , J., Chen, Y., Wang, C., Xiao, F. & Luo, X., Feb 2019, In: IEEE Transactions on Information Forensics and Security. 14, 2, p. 374-386

    Research output: Journal Publications and Reviews (RGC: 21, 22, 62)21_Publication in refereed journalpeer-review

    Scopus citations: 40
    Check@CityULib
  8. 2018
  9. Published

    Secure Hashing-Based Verifiable Pattern Matching

    Chen, F., Wang, D., Li, R., Chen, J., Ming, Z., Liu, A. X., Duan, H., & 2 othersWang, C. & Qin, J., Nov 2018, In: IEEE Transactions on Information Forensics and Security. 13, 11, p. 2677-2690

    Research output: Journal Publications and Reviews (RGC: 21, 22, 62)21_Publication in refereed journalpeer-review

    Scopus citations: 9
    Check@CityULib
  10. Published

    Learning Generalized Deep Feature Representation for Face Anti-Spoofing

    Li, H., He, P., Wang, S., Rocha, A., Jiang, X. & Kot, A. C., Oct 2018, In: IEEE Transactions on Information Forensics and Security. 13, 10, p. 2639-2652

    Research output: Journal Publications and Reviews (RGC: 21, 22, 62)21_Publication in refereed journalpeer-review

    Scopus citations: 131
    Check@CityULib
  11. Published

    Learning the Truth Privately and Confidently: Encrypted Confidence-Aware Truth Discovery in Mobile Crowdsensing

    Zheng, Y., Duan, H. & Wang, C., Oct 2018, In: IEEE Transactions on Information Forensics and Security. 13, 10, p. 2475-2489

    Research output: Journal Publications and Reviews (RGC: 21, 22, 62)21_Publication in refereed journalpeer-review

    Scopus citations: 97
    Check@CityULib
  12. Published

    Outsourced Biometric Identification With Privacy

    Hu, S., Li, M., Wang, Q., Chow, S. S. M. & Du, M., Oct 2018, In: IEEE Transactions on Information Forensics and Security. 13, 10, p. 2448-2463

    Research output: Journal Publications and Reviews (RGC: 21, 22, 62)21_Publication in refereed journalpeer-review

    Scopus citations: 36
    Check@CityULib
  13. Published

    A Zigzag-Decodable Ramp Secret Sharing Scheme

    Gong, X., Hu, P., Shum, K. W. & Sung, C. W., Aug 2018, In: IEEE Transactions on Information Forensics and Security. 13, 8, p. 1906-1916

    Research output: Journal Publications and Reviews (RGC: 21, 22, 62)21_Publication in refereed journalpeer-review

    Scopus citations: 9
    Check@CityULib
  14. Published

    Unsupervised Domain Adaptation for Face Anti-Spoofing

    Li, H., Li, W., Cao, H., Wang, S., Huang, F. & Kot, A. C., Jul 2018, In: IEEE Transactions on Information Forensics and Security. 13, 7, p. 1794-1809

    Research output: Journal Publications and Reviews (RGC: 21, 22, 62)21_Publication in refereed journalpeer-review

    Scopus citations: 153
    Check@CityULib
  15. 2017
  16. Near-Optimal and Practical Jamming-Resistant Energy-Efficient Cognitive Radio Communications

    Zhou, P., Wang, Q., Wang, W., Hu, Y. & Wu, D., 1 Nov 2017, In: IEEE Transactions on Information Forensics and Security. 12, 11, p. 2807-2822 7962233.

    Research output: Journal Publications and Reviews (RGC: 21, 22, 62)21_Publication in refereed journalpeer-review

    Scopus citations: 16
    Check@CityULib
  17. Published

    Privacy-Preserving Similarity Joins over Encrypted Data

    Yuan, X., Wang, X., Wang, C., Yu, C. & Nutanong, S., Nov 2017, In: IEEE Transactions on Information Forensics and Security. 12, 11, p. 2763-2775 7961214.

    Research output: Journal Publications and Reviews (RGC: 21, 22, 62)21_Publication in refereed journalpeer-review

    Scopus citations: 25
    Check@CityULib
  18. Accelerometer and Fuzzy Vault-Based Secure Group Key Generation and Sharing Protocol for Smart Wearables

    Revadigar, G., Javali, C., Xu, W., Vasilakos, A. V., Hu, W. & Jha, S., Oct 2017, In: IEEE Transactions on Information Forensics and Security. 12, 10, p. 2467-2482 16 p., 7934407.

    Research output: Journal Publications and Reviews (RGC: 21, 22, 62)21_Publication in refereed journalpeer-review

    Scopus citations: 35
    Check@CityULib
  19. Published

    Privacy-Preserving Smart Semantic Search Based on Conceptual Graphs over Encrypted Outsourced Data

    Fu, Z., Huang, F., Ren, K., Weng, J. & Wang, C., 1 Aug 2017, In: IEEE Transactions on Information Forensics and Security. 12, 8, p. 1874-1884 7895156.

    Research output: Journal Publications and Reviews (RGC: 21, 22, 62)21_Publication in refereed journalpeer-review

    Scopus citations: 147
    Check@CityULib
  20. Published

    Privacy-Preserving Image Denoising from External Cloud Databases

    Zheng, Y., Cui, H., Wang, C. & Zhou, J., Jun 2017, In: IEEE Transactions on Information Forensics and Security. 12, 6, p. 1285-1298 7833136.

    Research output: Journal Publications and Reviews (RGC: 21, 22, 62)21_Publication in refereed journalpeer-review

    Scopus citations: 36
    Check@CityULib
  21. 2016
  22. Published

    Enabling Cloud Storage Auditing With Verifiable Outsourcing of Key Updates

    Yu, J., Ren, K. & Wang, C., Jun 2016, In: IEEE Transactions on Information Forensics and Security. 11, 6, p. 1362-1375

    Research output: Journal Publications and Reviews (RGC: 21, 22, 62)21_Publication in refereed journalpeer-review

    Scopus citations: 130
    Check@CityULib
  23. Published

    Optimal Coding and Allocation for Perfect Secrecy in Multiple Clouds

    Hu, P., Sung, C. W., Ho, S. & Chan, T. H., Feb 2016, In: IEEE Transactions on Information Forensics and Security. 11, 2, p. 388-399

    Research output: Journal Publications and Reviews (RGC: 21, 22, 62)21_Publication in refereed journalpeer-review

    Scopus citations: 10
    Check@CityULib
  24. 2015
  25. Published

    Enabling Cloud Storage Auditing With Key-Exposure Resistance

    Yu, J., Ren, K., Wang, C. & Varadharajan, V., Jun 2015, In: IEEE Transactions on Information Forensics and Security. 10, 6, p. 1167-1179 7031921.

    Research output: Journal Publications and Reviews (RGC: 21, 22, 62)21_Publication in refereed journalpeer-review

    Scopus citations: 167
    Check@CityULib
  26. Blurred image splicing localization by exposing blur type inconsistency

    Bahrami, K., Kot, A. C., Li, L. & Li, H., 1 May 2015, In: IEEE Transactions on Information Forensics and Security. 10, 5, p. 999-1009 7015579.

    Research output: Journal Publications and Reviews (RGC: 21, 22, 62)21_Publication in refereed journalpeer-review

    Scopus citations: 100
    Check@CityULib