Ieee Transactions On Information Forensics And Security

Ieee Transactions On Information Forensics And Security

关于信息取证和安全的 Ieee Transactions

  • 1区 中科院分区
  • Q1 JCR分区

高引用文章

文章名称 引用次数
A Light CNN for Deep Face Representation With Noisy Labels 91
Leveraging Content Sensitiveness and User Trustworthiness to Recommend Fine-Grained Privacy Settings for Social Image Sharing 68
Privacy-Preserving Deep Learning via Additively Homomorphic Encryption 55
Deep Residual Network for Steganalysis of Digital Images 41
An Efficient MSB Prediction-Based Method for High-Capacity Reversible Data Hiding in Encrypted Images 38
Depreciating Motivation and Empirical Security Analysis of Chaos-Based Image and Video Encryption 38
Enabling Efficient and Geometric Range Query With Access Control Over Encrypted Spatial Data 37
Cloud-Based Approximate Constrained Shortest Distance Queries Over Encrypted Graphs With Privacy Protection 37
Using Deep Convolutional Neural Network Architectures for Object Classification and Detection Within X-Ray Baggage Security Imagery 36
Enabling Identity-Based Integrity Auditing and Data Sharing With Sensitive Information Hiding for Secure Cloud Storage 32
Constrained Convolutional Neural Networks: A New Approach Towards General Purpose Image Manipulation Detection 32
A Secure Mobile Crowdsensing Game With Deep Reinforcement Learning 30
Anonymous and Traceable Group Data Sharing in Cloud Computing 28
Specific Emitter Identification Based on Variational Mode Decomposition and Spectral Features in Single Hop and Relaying Scenarios 28
Convolutional Neural Network for Finger-Vein-Based Biometric Identification 28
Robust Smartphone App Identification via Encrypted Network Traffic Analysis 26
Android Malware Familial Classification and Representative Sample Selection via Frequent Subgraph Analysis 26
Unsupervised Domain Adaptation for Face Anti-Spoofing 25
Large-Scale JPEG Image Steganalysis Using Hybrid Deep-Learning Framework 25
Learning Generalized Deep Feature Representation for Face Anti-Spoofing 24
Performance Analysis of Multi-Motion Sensor Behavior for Active Smartphone Authentication 23
A Multimodal Deep Learning Method for Android Malware Detection Using Various Features 23
Deep Abstraction and Weighted Feature Selection for Wi-Fi Impersonation Detection 21
AnomalyNet: An Anomaly Detection Network for Video Surveillance 21
Encryption-Then-Compression Systems Using Grayscale-Based Image Encryption for JPEG Images 19
Uncovering the Face of Android Ransomware: Characterization and Real-Time Detection 19
LoPub: High-Dimensional Crowdsourced Data Publication With Local Differential Privacy 19
Multi-Task GANs for View-Specific Feature Learning in Gait Recognition 18
CNN-Based Adversarial Embedding for Image Steganography 18
Fingerprint Spoof Buster: Use of Minutiae-Centered Patches 18
Joint Relay Selection and Power Allocation in Large-Scale MIMO Systems With Untrusted Relays and Passive Eavesdroppers 18
Secure Key Agreement and Key Protection for Mobile Device User Authentication 18
Two-Stage Relay Selection for Enhancing Physical Layer Security in Non-Orthogonal Multiple Access 18
VoltageIDS: Low-Level Communication Characteristics for Automotive Intrusion Detection System 17
Learning the Truth Privately and Confidently: Encrypted Confidence-Aware Truth Discovery in Mobile Crowdsensing 17
Secure Cooperative Communications With an Untrusted Relay: A NOMA-Inspired Jamming and Relaying Approach 17
Image to Video Person Re-Identification by Learning Heterogeneous Dictionary Pair With Feature Projection Matrix 17
Physical-Layer Security for Proximal Legitimate User and Eavesdropper: A Frequency Diverse Array Beamforming Approach 16
Deep-PRWIS: Periocular Recognition Without the Iris and Sclera Using Deep Learning Frameworks 16
Lightweight and Practical Anonymous Authentication Protocol for RFID Systems Using Physically Unclonable Functions 16
General Framework to Evaluate Unlinkability in Biometric Template Protection Systems 16
Ranking-Based Locality Sensitive Hashing-Enabled Cancelable Biometrics: Index-of-Max Hashing 16
Distributed Quickest Detection of Cyber-Attacks in Smart Grid 16
Lightweight and Privacy-Friendly Spatial Data Aggregation for Secure Power Supply and Demand Management in Smart Grids 15
Realtime DDoS Defense Using COTS SDN Switches via Adaptive Correlation Analysis 15
SkyShield: A Sketch-Based Defense System Against Application Layer DDoS Attacks 15
Constructive Interference Based Secure Precoding: A New Dimension in Physical Layer Security 14
An Ensemble CNN2ELM for Age Estimation 14
Secure Transmissions in Wireless Information and Power Transfer Millimeter-Wave Ultra-Dense Networks 14
Auditable sigma-Time Outsourced Attribute-Based Encryption for Access Control in Cloud Computing 14