IEEE Transactions on Information Forensics and Security
IEEE Transactions on Information Forensics and Security
ISSNs: 1556-6013
Additional searchable ISSN (Electronic): 1556-6021
IEEE-INST ELECTRICAL ELECTRONICS ENGINEERS INC, United States
Scopus rating (2022): CiteScore 14.7 SJR 2.652 SNIP 2.664
Journal
Research Output
- 2020
- Published
Lightweight and Privacy-Preserving Template Generation for Palm-Vein-Based Human Recognition
Ahmad, F., Cheng, L. & Khan, A., 2020, In: IEEE Transactions on Information Forensics and Security. 15, p. 184-194Research output: Journal Publications and Reviews (RGC: 21, 22, 62) › 21_Publication in refereed journal › peer-review
Scopus citations: 35 - 2019
- Published
CReam: A Smart Contract Enabled Collusion-Resistant e-Auction
Wu, S., Chen, Y., Wang, Q., Li, M., Wang, C. & Luo, X., Jul 2019, In: IEEE Transactions on Information Forensics and Security. 14, 7, p. 1687-1701Research output: Journal Publications and Reviews (RGC: 21, 22, 62) › 21_Publication in refereed journal › peer-review
Scopus citations: 70 - Published
pRide: Privacy-preserving Ride-matching over Road Networks for Online Ride Hailing Service
Luo, Y., Jia, X., Fu, S. & Xu, M., Jul 2019, In: IEEE Transactions on Information Forensics and Security. 14, 7, p. 1791-1802Research output: Journal Publications and Reviews (RGC: 21, 22, 62) › 21_Publication in refereed journal › peer-review
Scopus citations: 62 - Published
RNN-Stega: Linguistic Steganography Based on Recurrent Neural Networks
Yang, Z., Guo, X., Chen, Z., Huang, Y. & Zhang, Y., May 2019, In: IEEE Transactions on Information Forensics and Security. 14, 5, p. 1280-1295 8470163.Research output: Journal Publications and Reviews (RGC: 21, 22, 62) › 21_Publication in refereed journal › peer-review
Scopus citations: 161 - Published
PROST: Privacy-Preserving and Truthful Online Double Auction for Spectrum Allocation
Wang, Q., Huang , J., Chen, Y., Wang, C., Xiao, F. & Luo, X., Feb 2019, In: IEEE Transactions on Information Forensics and Security. 14, 2, p. 374-386Research output: Journal Publications and Reviews (RGC: 21, 22, 62) › 21_Publication in refereed journal › peer-review
Scopus citations: 40 - 2018
- Published
Secure Hashing-Based Verifiable Pattern Matching
Chen, F., Wang, D., Li, R., Chen, J., Ming, Z., Liu, A. X., Duan, H., & 2 others , Nov 2018, In: IEEE Transactions on Information Forensics and Security. 13, 11, p. 2677-2690Research output: Journal Publications and Reviews (RGC: 21, 22, 62) › 21_Publication in refereed journal › peer-review
Scopus citations: 9 - Published
Learning Generalized Deep Feature Representation for Face Anti-Spoofing
Li, H., He, P., Wang, S., Rocha, A., Jiang, X. & Kot, A. C., Oct 2018, In: IEEE Transactions on Information Forensics and Security. 13, 10, p. 2639-2652Research output: Journal Publications and Reviews (RGC: 21, 22, 62) › 21_Publication in refereed journal › peer-review
Scopus citations: 131 - Published
Learning the Truth Privately and Confidently: Encrypted Confidence-Aware Truth Discovery in Mobile Crowdsensing
Zheng, Y., Duan, H. & Wang, C., Oct 2018, In: IEEE Transactions on Information Forensics and Security. 13, 10, p. 2475-2489Research output: Journal Publications and Reviews (RGC: 21, 22, 62) › 21_Publication in refereed journal › peer-review
Scopus citations: 97 - Published
Outsourced Biometric Identification With Privacy
Hu, S., Li, M., Wang, Q., Chow, S. S. M. & Du, M., Oct 2018, In: IEEE Transactions on Information Forensics and Security. 13, 10, p. 2448-2463Research output: Journal Publications and Reviews (RGC: 21, 22, 62) › 21_Publication in refereed journal › peer-review
Scopus citations: 36 - Published
A Zigzag-Decodable Ramp Secret Sharing Scheme
Gong, X., Hu, P., Shum, K. W. & Sung, C. W., Aug 2018, In: IEEE Transactions on Information Forensics and Security. 13, 8, p. 1906-1916Research output: Journal Publications and Reviews (RGC: 21, 22, 62) › 21_Publication in refereed journal › peer-review
Scopus citations: 9 - Published
Unsupervised Domain Adaptation for Face Anti-Spoofing
Li, H., Li, W., Cao, H., Wang, S., Huang, F. & Kot, A. C., Jul 2018, In: IEEE Transactions on Information Forensics and Security. 13, 7, p. 1794-1809Research output: Journal Publications and Reviews (RGC: 21, 22, 62) › 21_Publication in refereed journal › peer-review
Scopus citations: 153 - 2017
Near-Optimal and Practical Jamming-Resistant Energy-Efficient Cognitive Radio Communications
Zhou, P., Wang, Q., Wang, W., Hu, Y. & Wu, D., 1 Nov 2017, In: IEEE Transactions on Information Forensics and Security. 12, 11, p. 2807-2822 7962233.Research output: Journal Publications and Reviews (RGC: 21, 22, 62) › 21_Publication in refereed journal › peer-review
Scopus citations: 16- Published
Privacy-Preserving Similarity Joins over Encrypted Data
Yuan, X., Wang, X., Wang, C., Yu, C. & Nutanong, S., Nov 2017, In: IEEE Transactions on Information Forensics and Security. 12, 11, p. 2763-2775 7961214.Research output: Journal Publications and Reviews (RGC: 21, 22, 62) › 21_Publication in refereed journal › peer-review
Scopus citations: 25 Accelerometer and Fuzzy Vault-Based Secure Group Key Generation and Sharing Protocol for Smart Wearables
Revadigar, G., Javali, C., Xu, W., Vasilakos, A. V., Hu, W. & Jha, S., Oct 2017, In: IEEE Transactions on Information Forensics and Security. 12, 10, p. 2467-2482 16 p., 7934407.Research output: Journal Publications and Reviews (RGC: 21, 22, 62) › 21_Publication in refereed journal › peer-review
Scopus citations: 35- Published
Privacy-Preserving Smart Semantic Search Based on Conceptual Graphs over Encrypted Outsourced Data
Fu, Z., Huang, F., Ren, K., Weng, J. & Wang, C., 1 Aug 2017, In: IEEE Transactions on Information Forensics and Security. 12, 8, p. 1874-1884 7895156.Research output: Journal Publications and Reviews (RGC: 21, 22, 62) › 21_Publication in refereed journal › peer-review
Scopus citations: 147 - Published
Privacy-Preserving Image Denoising from External Cloud Databases
Zheng, Y., Cui, H., Wang, C. & Zhou, J., Jun 2017, In: IEEE Transactions on Information Forensics and Security. 12, 6, p. 1285-1298 7833136.Research output: Journal Publications and Reviews (RGC: 21, 22, 62) › 21_Publication in refereed journal › peer-review
Scopus citations: 36 - 2016
- Published
Enabling Cloud Storage Auditing With Verifiable Outsourcing of Key Updates
Yu, J., Ren, K. & Wang, C., Jun 2016, In: IEEE Transactions on Information Forensics and Security. 11, 6, p. 1362-1375Research output: Journal Publications and Reviews (RGC: 21, 22, 62) › 21_Publication in refereed journal › peer-review
Scopus citations: 130 - Published
Optimal Coding and Allocation for Perfect Secrecy in Multiple Clouds
Hu, P., Sung, C. W., Ho, S. & Chan, T. H., Feb 2016, In: IEEE Transactions on Information Forensics and Security. 11, 2, p. 388-399Research output: Journal Publications and Reviews (RGC: 21, 22, 62) › 21_Publication in refereed journal › peer-review
Scopus citations: 10 - 2015
- Published
Enabling Cloud Storage Auditing With Key-Exposure Resistance
Yu, J., Ren, K., Wang, C. & Varadharajan, V., Jun 2015, In: IEEE Transactions on Information Forensics and Security. 10, 6, p. 1167-1179 7031921.Research output: Journal Publications and Reviews (RGC: 21, 22, 62) › 21_Publication in refereed journal › peer-review
Scopus citations: 167 Blurred image splicing localization by exposing blur type inconsistency
Bahrami, K., Kot, A. C., Li, L. & Li, H., 1 May 2015, In: IEEE Transactions on Information Forensics and Security. 10, 5, p. 999-1009 7015579.Research output: Journal Publications and Reviews (RGC: 21, 22, 62) › 21_Publication in refereed journal › peer-review
Scopus citations: 100