IEEE Transactions on Information Forensics and Security

IEEE Transactions on Information Forensics and Security

ISSNs: 1556-6013

Additional searchable ISSN (Electronic): 1556-6021

IEEE-INST ELECTRICAL ELECTRONICS ENGINEERS INC, United States

Scopus rating (2021): CiteScore 14.9 SJR 3.299 SNIP 3.244

Journal

Journal Metrics

Research Output

  1. 2019
  2. Published

    PROST: Privacy-Preserving and Truthful Online Double Auction for Spectrum Allocation

    Wang, Q., Huang , J., Chen, Y., Wang, C., Xiao, F. & Luo, X., Feb 2019, In: IEEE Transactions on Information Forensics and Security. 14, 2, p. 374-386

    Research output: Journal Publications and Reviews (RGC: 21, 22, 62)21_Publication in refereed journalpeer-review

    Scopus citations: 34
    Check@CityULib
  3. 2018
  4. Published

    Secure Hashing-Based Verifiable Pattern Matching

    Chen, F., Wang, D., Li, R., Chen, J., Ming, Z., Liu, A. X., Duan, H. & 2 others, Wang, C. & Qin, J., Nov 2018, In: IEEE Transactions on Information Forensics and Security. 13, 11, p. 2677-2690

    Research output: Journal Publications and Reviews (RGC: 21, 22, 62)21_Publication in refereed journalpeer-review

    Scopus citations: 8
    Check@CityULib
  5. Published

    Learning Generalized Deep Feature Representation for Face Anti-Spoofing

    Li, H., He, P., Wang, S., Rocha, A., Jiang, X. & Kot, A. C., Oct 2018, In: IEEE Transactions on Information Forensics and Security. 13, 10, p. 2639-2652

    Research output: Journal Publications and Reviews (RGC: 21, 22, 62)21_Publication in refereed journalpeer-review

    Scopus citations: 109
    Check@CityULib
  6. Published

    Learning the Truth Privately and Confidently: Encrypted Confidence-Aware Truth Discovery in Mobile Crowdsensing

    Zheng, Y., Duan, H. & Wang, C., Oct 2018, In: IEEE Transactions on Information Forensics and Security. 13, 10, p. 2475-2489

    Research output: Journal Publications and Reviews (RGC: 21, 22, 62)21_Publication in refereed journalpeer-review

    Scopus citations: 79
    Check@CityULib
  7. Published

    Outsourced Biometric Identification With Privacy

    Hu, S., Li, M., Wang, Q., Chow, S. S. M. & Du, M., Oct 2018, In: IEEE Transactions on Information Forensics and Security. 13, 10, p. 2448-2463

    Research output: Journal Publications and Reviews (RGC: 21, 22, 62)21_Publication in refereed journalpeer-review

    Scopus citations: 30
    Check@CityULib
  8. Published

    A Zigzag-Decodable Ramp Secret Sharing Scheme

    Gong, X., Hu, P., Shum, K. W. & Sung, C. W., Aug 2018, In: IEEE Transactions on Information Forensics and Security. 13, 8, p. 1906-1916

    Research output: Journal Publications and Reviews (RGC: 21, 22, 62)21_Publication in refereed journalpeer-review

    Scopus citations: 7
    Check@CityULib
  9. Published

    Unsupervised Domain Adaptation for Face Anti-Spoofing

    Li, H., Li, W., Cao, H., Wang, S., Huang, F. & Kot, A. C., Jul 2018, In: IEEE Transactions on Information Forensics and Security. 13, 7, p. 1794-1809

    Research output: Journal Publications and Reviews (RGC: 21, 22, 62)21_Publication in refereed journalpeer-review

    Scopus citations: 120
    Check@CityULib
  10. 2017
  11. Near-Optimal and Practical Jamming-Resistant Energy-Efficient Cognitive Radio Communications

    Zhou, P., Wang, Q., Wang, W., Hu, Y. & Wu, D., 1 Nov 2017, In: IEEE Transactions on Information Forensics and Security. 12, 11, p. 2807-2822 7962233.

    Research output: Journal Publications and Reviews (RGC: 21, 22, 62)21_Publication in refereed journalpeer-review

    Scopus citations: 11
    Check@CityULib
  12. Published

    Privacy-Preserving Similarity Joins over Encrypted Data

    Yuan, X., Wang, X., Wang, C., Yu, C. & Nutanong, S., Nov 2017, In: IEEE Transactions on Information Forensics and Security. 12, 11, p. 2763-2775 7961214.

    Research output: Journal Publications and Reviews (RGC: 21, 22, 62)21_Publication in refereed journalpeer-review

    Scopus citations: 23
    Check@CityULib
  13. Accelerometer and Fuzzy Vault-Based Secure Group Key Generation and Sharing Protocol for Smart Wearables

    Revadigar, G., Javali, C., Xu, W., Vasilakos, A. V., Hu, W. & Jha, S., Oct 2017, In: IEEE Transactions on Information Forensics and Security. 12, 10, p. 2467-2482 16 p., 7934407.

    Research output: Journal Publications and Reviews (RGC: 21, 22, 62)21_Publication in refereed journalpeer-review

    Scopus citations: 30
    Check@CityULib
  14. Published

    Privacy-Preserving Smart Semantic Search Based on Conceptual Graphs over Encrypted Outsourced Data

    Fu, Z., Huang, F., Ren, K., Weng, J. & Wang, C., 1 Aug 2017, In: IEEE Transactions on Information Forensics and Security. 12, 8, p. 1874-1884 7895156.

    Research output: Journal Publications and Reviews (RGC: 21, 22, 62)21_Publication in refereed journalpeer-review

    Scopus citations: 141
    Check@CityULib
  15. Published

    Privacy-Preserving Image Denoising from External Cloud Databases

    Zheng, Y., Cui, H., Wang, C. & Zhou, J., Jun 2017, In: IEEE Transactions on Information Forensics and Security. 12, 6, p. 1285-1298 7833136.

    Research output: Journal Publications and Reviews (RGC: 21, 22, 62)21_Publication in refereed journalpeer-review

    Scopus citations: 33
    Check@CityULib
  16. 2016
  17. Published

    Enabling Cloud Storage Auditing With Verifiable Outsourcing of Key Updates

    Yu, J., Ren, K. & Wang, C., Jun 2016, In: IEEE Transactions on Information Forensics and Security. 11, 6, p. 1362-1375

    Research output: Journal Publications and Reviews (RGC: 21, 22, 62)21_Publication in refereed journalpeer-review

    Scopus citations: 125
    Check@CityULib
  18. Published

    Optimal Coding and Allocation for Perfect Secrecy in Multiple Clouds

    Hu, P., Sung, C. W., Ho, S. & Chan, T. H., Feb 2016, In: IEEE Transactions on Information Forensics and Security. 11, 2, p. 388-399

    Research output: Journal Publications and Reviews (RGC: 21, 22, 62)21_Publication in refereed journalpeer-review

    Scopus citations: 9
    Check@CityULib
  19. 2015
  20. Published

    Enabling Cloud Storage Auditing With Key-Exposure Resistance

    Yu, J., Ren, K., Wang, C. & Varadharajan, V., Jun 2015, In: IEEE Transactions on Information Forensics and Security. 10, 6, p. 1167-1179 7031921.

    Research output: Journal Publications and Reviews (RGC: 21, 22, 62)21_Publication in refereed journalpeer-review

    Scopus citations: 154
    Check@CityULib
  21. Blurred image splicing localization by exposing blur type inconsistency

    Bahrami, K., Kot, A. C., Li, L. & Li, H., 1 May 2015, In: IEEE Transactions on Information Forensics and Security. 10, 5, p. 999-1009 7015579.

    Research output: Journal Publications and Reviews (RGC: 21, 22, 62)21_Publication in refereed journalpeer-review

    Scopus citations: 90
    Check@CityULib
  22. Published

    New algorithms for secure outsourcing of large-scale systems of linear equations

    Chen, X., Huang, X., Li, J., Ma, J., Lou, W. & Wong, D. S., Jan 2015, In: IEEE Transactions on Information Forensics and Security. 10, 1, p. 69-78 6926792.

    Research output: Journal Publications and Reviews (RGC: 21, 22, 62)21_Publication in refereed journalpeer-review

    Scopus citations: 198
    Check@CityULib
  23. Published

    Traceable CP-ABE: How to trace decryption devices found in the wild

    Liu, Z., Cao, Z. & Wong, D. S., Jan 2015, In: IEEE Transactions on Information Forensics and Security. 10, 1, p. 55-68 6926830.

    Research output: Journal Publications and Reviews (RGC: 21, 22, 62)21_Publication in refereed journalpeer-review

    Scopus citations: 57
    Check@CityULib
  24. 2014
  25. Published

    An effective method for detecting double JPEG compression with the same quantization matrix

    Yang, J., Xie, J., Zhu, G., Kwong, S. & Shi, Y., Nov 2014, In: IEEE Transactions on Information Forensics and Security. 9, 11, p. 1933-1942 6905821.

    Research output: Journal Publications and Reviews (RGC: 21, 22, 62)21_Publication in refereed journalpeer-review

    Scopus citations: 90
    Check@CityULib
  26. Published

    Proof-Carrying Cloud Computation: The Case of Convex Optimization

    Xu, Z., Wang, C., Ren, K., Wang, L. & Zhang, B., Nov 2014, In: IEEE Transactions on Information Forensics and Security. 9, 11, p. 1790-1803

    Research output: Journal Publications and Reviews (RGC: 21, 22, 62)21_Publication in refereed journalpeer-review

    Scopus citations: 15
    Check@CityULib