IEEE Transactions on Information Forensics and Security
短名 | IEEE Trans.Inform.Forensic Secur. |
Journal Impact | 6.17 |
国际分区 | ENGINEERING, ELECTRICAL & ELECTRONIC(Q1) |
期刊索引 | SCI Q1中科院 1 区 |
ISSN | 1556-6013, 1556-6021 |
h-index | 167 |
国内分区 | 计算机科学(1区)计算机科学计算机理论方法(1区)计算机科学工程电子与电气(2区) |
Top期刊 | 是 |
IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY 涵盖与信息取证、信息安全、生物识别、监控和包含这些功能的系统应用相关的科学、技术和应用
期刊主页投稿网址涉及主题 | 计算机科学计算机安全数学操作系统人工智能工程类计算机网络计算机视觉算法心理学物理政治学法学统计电信程序设计语言电气工程认知心理学生物模式识别(心理学) |
出版信息 | 出版商: Institute of Electrical and Electronics Engineers Inc.,出版周期: Quarterly,期刊类型: journal |
基本数据 | 创刊年份: 2006,原创研究文献占比: 99.64%,自引率:11.10%, Gold OA占比: 11.31% |
平均审稿周期 | 网友分享经验:平均6.8个月 |
平均录用比例 | 网友分享经验:较易 |
期刊引文格式
这些示例是对学术期刊文章的引用,以及它们应该如何出现在您的参考文献中。
并非所有期刊都按卷和期组织其已发表的文章,因此这些字段是可选的。有些电子期刊不提供页面范围,而是列出文章标识符。在这种情况下,使用文章标识符而不是页面范围是安全的。
只有1位作者的期刊
有2位作者的期刊
有3位作者的期刊
有5位以上作者的期刊
书籍引用格式
以下是创作和编辑的书籍的参考文献的示例。
学位论文引用格式
网页引用格式
这些示例是对网页的引用,以及它们应该如何出现在您的参考文献中。
专利引用格式
最新文章
Backdoor Attack on Deep Learning-Based Medical Image Encryption and Decryption Network
2024-1-1
SepBIN: Binary Feature Separation for Better Semantic Comparison and Authorship Verification
2024-1-1
Confidence-Calibrated Face and Kinship Verification
2024-1-1
Cross-Scenario Unknown-Aware Face Anti-Spoofing with Evidential Semantic Consistency Learning
2024-1-1
Identifying Cross-User Privacy Leakage in Mobile Mini-Apps at A Large Scale
2024-1-1
Similarity-based Label Inference Attack against Training and Inference of Split Learning
2024-1-1
Vulnerabilities of Data Protection in Vertical Federated Learning Training and Countermeasures
2024-1-1
An Efficient and Scalable FHE-Based PDQ Scheme: Utilizing FFT to Design a Low Multiplication Depth Large-Integer Comparison Algorithm
2024-1-1
SDSS: Sequential Data Sharing System in IoT
2024-1-1
Analysis of a Programmable Quantum Annealer as a Random Number Generator
2024-1-1
PPGloVe: Privacy-Preserving GloVe for Training Word Vectors in the Dark
2024-1-1
UltraVCS: Ultra-fine-grained Variable-based Code Slicing for Automated Vulnerability Detection
2024-1-1
Privacy-Preserving Approximate Minimum Community Search on Large Networks
2024-1-1
Efficient Verifiably Encrypted ECDSA Schemes from Castagnos-Laguillaumie and Joye-Libert Encryptions
2024-1-1
Privacy-Preserving and Trusted Keyword Search for Multi-Tenancy Cloud
2024-1-1
<i>FLPurifier</i>: Backdoor Defense in Federated Learning via Decoupled Contrastive Training
2024-1-1
Balancing Privacy and Regulation of Cross-Chain Transaction Systems via SoK-Assisted Policy Enhancement
2024-1-1
DARD: Deceptive Approaches for Robust Defense Against IP Theft
2024-1-1
Generic Construction of Conditional Privacy-Preserving Certificateless Signatures with Efficient Instantiations for VANETs
2024-1-1
Split Aggregation: Lightweight Privacy-Preserving Federated Learning Resistant to Byzantine Attacks
2024-1-1
<i>Ambusher</i>: Exploring the Security of Distributed SDN Controllers through Protocol State Fuzzing
2024-1-1
Pilot Spoofing Attack on the Downlink of Cell-Free Massive MIMO: From the Perspective of Adversaries
2024-1-1
Human-in-the-loop Cyber Intrusion Detection Using Active Learning
2024-1-1
Extremal Mechanisms for Pointwise Maximal Leakage
2024-1-1
SAMCU: Secure and Anonymous Multi-Channel Updates in Payment-Channel Networks
2024-1-1
Imperceptible and Robust Backdoor Attack in 3D Point Cloud
2024-1-1
Event-Triggered Impulsive Control for Complex Networks Under Stochastic Deception Attacks
2024-1-1
URadar: Discovering Unrestricted File Upload Vulnerabilities via Adaptive Dynamic Testing
2024-1-1
(Security) Assertions by Large Language Models
2024-1-1
Cross-modal Learning based Flexible Bimodal Biometric Authentication with Template Protection
2024-1-1
Breaking the Anonymity of Ethereum Mixing Services Using Graph Feature Learning
2024-1-1
AgrAmplifier: Defending Federated Learning Against Poisoning Attacks Through Local Update Amplification
2024-1-1
MalPatch: Evading DNN-Based Malware Detection With Adversarial Patches
2024-1-1
AGILE: Automated Assertion Generation to Detect Information Leakage Vulnerabilities
2024-1-1
Exploring Unobservable Blockchain-based Covert Channel for Censorship-Resistant Systems
2024-1-1
Secure Similarity Queries over Vertically Distributed Data via TEE-Enhanced Cloud Computing
2024-1-1
Audio Multi-view Spoofing Detection Framework Based on Audio-Text-Emotion Correlations
2024-1-1
Data-Driven Dynamic Periodic Event-Triggered Control of Cyber-Physical Systems Under Packet Dropouts and DoS Attacks
2024-1-1
Device-Side Lightweight Mutual Authentication and Key Agreement Scheme based on Chameleon Hashing for Industrial Internet of Things
2024-1-1
Proof of Finalization: A Self-Fulfilling Function of Blockchain
2024-1-1
P²FRPSI: Privacy-Preserving Feature Retrieved Private Set Intersection
2024-1-1
Self-Attentive Contrastive Learning for Conditioned Periocular and Face Biometrics
2024-1-1
Fast Propagation Is Better: Accelerating Single-Step Adversarial Training via Sampling Subnetworks
2024-1-1
VGGM: Variational Graph Gaussian Mixture Model for Unsupervised Change Point Detection in Dynamic Networks
2024-1-1
Covert Transmission in Water-to-Air Optical Wireless Communication Systems
2024-1-1
Optimal Signaling for Covert Communications under Peak Power Constraint
2024-1-1
On the Privacy of Adaptive Cuckoo Filters: Analysis and Protection
2024-1-1
EGST: An Efficient Solution for Human Gaits Recognition Using Neuromorphic Vision Sensor
2024-1-1
On the Unforgeability of “Privacy-Preserving Aggregation-Authentication Scheme for Safety Warning System in Fog-Cloud Based VANET”
2024-1-1
Self-Supervised Recovery and Guide for Low-Resolution Person Re-Identification
2024-1-1
帮你贴心管理全部的文献
研飞ivySCI,高效的论文管理
投稿经验分享
分享我的经验,帮你走得更远