IEEE Transactions on Information Forensics and Security
IEEE Transactions on Information Forensics and Security
ISSNs: 1556-6013
Additional searchable ISSN (electronic): 1556-6021
Institute of Electrical and Electronics Engineers, Inc., United States
Scopus rating (2023): CiteScore 14.4 SJR 2.89 SNIP 2.546
Journal
Research Output
- 2021
- Published
Enabling Efficient Spatial Keyword Queries on Encrypted Data with Strong Security Guarantees
Wang, X., Ma, J., Li, F., Liu, X., Miao, Y. & Deng, R. H., 2021, In: IEEE Transactions on Information Forensics and Security. 16, p. 4909-4923Research output: Journal Publications and Reviews › RGC 21 - Publication in refereed journal › peer-review
Scopus citations: 30 - Published
Interpreting and Mitigating Leakage-abuse Attacks in Searchable Symmetric Encryption
Xu, L., Duan, H., Zhou, A., Yuan, X. & Wang, C., 2021, In: IEEE Transactions on Information Forensics and Security. 16, p. 5310-5325Research output: Journal Publications and Reviews › RGC 21 - Publication in refereed journal › peer-review
Scopus citations: 23 - Published
SAP-SSE: Protecting Search Patterns and Access Patterns in Searchable Symmetric Encryption
Song, Q., Liu, Z., Cao, J., Sun, K., Li, Q. & Wang, C., 2021, In: IEEE Transactions on Information Forensics and Security. 16, p. 1795-1809Research output: Journal Publications and Reviews › RGC 21 - Publication in refereed journal › peer-review
Scopus citations: 35 - 2020
Deep Learning-Based Gait Recognition Using Smartphones in the Wild
Zou, Q., Wang, Y., Wang, Q., Zhao, Y. & Li, Q., 2020, In: IEEE Transactions on Information Forensics and Security. 15, p. 3197-3212Research output: Journal Publications and Reviews › RGC 21 - Publication in refereed journal › peer-review
Scopus citations: 192- Published
How to Securely Outsource Finding the Min-Cut of Undirected Edge-Weighted Graphs
Zhao, P., Yu, J., Zhang, H., Qin, Z. & Wang, C., 2020, In: IEEE Transactions on Information Forensics and Security. 15, p. 315-328 8735830.Research output: Journal Publications and Reviews › RGC 21 - Publication in refereed journal › peer-review
Scopus citations: 31 - Published
Lightweight and Privacy-Preserving Template Generation for Palm-Vein-Based Human Recognition
Ahmad, F., Cheng, L.-M. & Khan, A., 2020, In: IEEE Transactions on Information Forensics and Security. 15, p. 184-194Research output: Journal Publications and Reviews › RGC 21 - Publication in refereed journal › peer-review
Scopus citations: 44 - 2019
Universally Composable Key Bootstrapping and Secure Communication Protocols for the Energy Internet
Sani, A. S., Yuan, D., Bao, W., Dong, Z. Y., Vucetic, B. & Bertino, E., Aug 2019, In: IEEE Transactions on Information Forensics and Security. 14, 8, p. 2113-2127Research output: Journal Publications and Reviews › RGC 21 - Publication in refereed journal › peer-review
Scopus citations: 1- Published
CReam: A Smart Contract Enabled Collusion-Resistant e-Auction
Wu, S., Chen, Y., Wang, Q., Li, M., Wang, C. & Luo, X., Jul 2019, In: IEEE Transactions on Information Forensics and Security. 14, 7, p. 1687-1701Research output: Journal Publications and Reviews › RGC 21 - Publication in refereed journal › peer-review
Scopus citations: 88 - Published
pRide: Privacy-preserving Ride-matching over Road Networks for Online Ride Hailing Service
Luo, Y., Jia, X., Fu, S. & Xu, M., Jul 2019, In: IEEE Transactions on Information Forensics and Security. 14, 7, p. 1791-1802Research output: Journal Publications and Reviews › RGC 21 - Publication in refereed journal › peer-review
Scopus citations: 91 - Published
RNN-Stega: Linguistic Steganography Based on Recurrent Neural Networks
Yang, Z.-L., Guo, X.-Q., Chen, Z.-M., Huang, Y.-F. & Zhang, Y.-J., May 2019, In: IEEE Transactions on Information Forensics and Security. 14, 5, p. 1280-1295 8470163.Research output: Journal Publications and Reviews › RGC 21 - Publication in refereed journal › peer-review
Scopus citations: 236 - Published
PROST: Privacy-Preserving and Truthful Online Double Auction for Spectrum Allocation
Wang, Q., Huang , J., Chen, Y., Wang, C., Xiao, F. & Luo, X., Feb 2019, In: IEEE Transactions on Information Forensics and Security. 14, 2, p. 374-386Research output: Journal Publications and Reviews › RGC 21 - Publication in refereed journal › peer-review
Scopus citations: 48 - 2018
- Published
Secure Hashing-Based Verifiable Pattern Matching
Chen, F., Wang, D., Li, R., Chen, J., Ming, Z., Liu, A. X. & Duan, H. & 2 others, , Nov 2018, In: IEEE Transactions on Information Forensics and Security. 13, 11, p. 2677-2690Research output: Journal Publications and Reviews › RGC 21 - Publication in refereed journal › peer-review
Scopus citations: 9 - Published
Learning Generalized Deep Feature Representation for Face Anti-Spoofing
Li, H., He, P., Wang, S., Rocha, A., Jiang, X. & Kot, A. C., Oct 2018, In: IEEE Transactions on Information Forensics and Security. 13, 10, p. 2639-2652Research output: Journal Publications and Reviews › RGC 21 - Publication in refereed journal › peer-review
Scopus citations: 163 - Published
Learning the Truth Privately and Confidently: Encrypted Confidence-Aware Truth Discovery in Mobile Crowdsensing
Zheng, Y., Duan, H. & Wang, C., Oct 2018, In: IEEE Transactions on Information Forensics and Security. 13, 10, p. 2475-2489Research output: Journal Publications and Reviews › RGC 21 - Publication in refereed journal › peer-review
Scopus citations: 135 - Published
Outsourced Biometric Identification With Privacy
Hu, S., Li, M., Wang, Q., Chow, S. S. M. & Du, M., Oct 2018, In: IEEE Transactions on Information Forensics and Security. 13, 10, p. 2448-2463Research output: Journal Publications and Reviews › RGC 21 - Publication in refereed journal › peer-review
Scopus citations: 44 - Published
A Zigzag-Decodable Ramp Secret Sharing Scheme
Gong, X., Hu, P., Shum, K. W. & Sung, C. W., Aug 2018, In: IEEE Transactions on Information Forensics and Security. 13, 8, p. 1906-1916Research output: Journal Publications and Reviews › RGC 21 - Publication in refereed journal › peer-review
Scopus citations: 12 - Published
Unsupervised Domain Adaptation for Face Anti-Spoofing
Li, H., Li, W., Cao, H., Wang, S., Huang, F. & Kot, A. C., Jul 2018, In: IEEE Transactions on Information Forensics and Security. 13, 7, p. 1794-1809Research output: Journal Publications and Reviews › RGC 21 - Publication in refereed journal › peer-review
Scopus citations: 215 - 2017
Near-Optimal and Practical Jamming-Resistant Energy-Efficient Cognitive Radio Communications
Zhou, P., Wang, Q., Wang, W., Hu, Y. & Wu, D., 1 Nov 2017, In: IEEE Transactions on Information Forensics and Security. 12, 11, p. 2807-2822 7962233.Research output: Journal Publications and Reviews › RGC 21 - Publication in refereed journal › peer-review
Scopus citations: 20- Published
Privacy-Preserving Similarity Joins over Encrypted Data
Yuan, X., Wang, X., Wang, C., Yu, C. & Nutanong, S., Nov 2017, In: IEEE Transactions on Information Forensics and Security. 12, 11, p. 2763-2775 7961214.Research output: Journal Publications and Reviews › RGC 21 - Publication in refereed journal › peer-review
Scopus citations: 30 Accelerometer and Fuzzy Vault-Based Secure Group Key Generation and Sharing Protocol for Smart Wearables
Revadigar, G., Javali, C., Xu, W., Vasilakos, A. V., Hu, W. & Jha, S., Oct 2017, In: IEEE Transactions on Information Forensics and Security. 12, 10, p. 2467-2482 16 p., 7934407.Research output: Journal Publications and Reviews › RGC 21 - Publication in refereed journal › peer-review
Scopus citations: 42