IEEE Transactions on Information Forensics and Security

短名IEEE Trans.Inform.Forensic Secur.
Journal Impact6.17
国际分区ENGINEERING, ELECTRICAL & ELECTRONIC(Q1)
期刊索引SCI Q1中科院 1 区
ISSN1556-6013, 1556-6021
h-index167
国内分区计算机科学(1区)计算机科学计算机理论方法(1区)计算机科学工程电子与电气(2区)
Top期刊

IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY 涵盖与信息取证、信息安全、生物识别、监控和包含这些功能的系统应用相关的科学、技术和应用

期刊主页投稿网址
涉及主题计算机科学计算机安全数学操作系统人工智能工程类计算机网络计算机视觉算法心理学物理政治学法学统计电信程序设计语言电气工程认知心理学生物模式识别(心理学)
出版信息出版商: Institute of Electrical and Electronics Engineers Inc.出版周期: Quarterly期刊类型: journal
基本数据创刊年份: 2006原创研究文献占比99.64%自引率:11.10%Gold OA占比: 11.31%
平均审稿周期 网友分享经验:平均6.8个月
平均录用比例网友分享经验:较易

期刊引文格式

这些示例是对学术期刊文章的引用,以及它们应该如何出现在您的参考文献中。

并非所有期刊都按卷和期组织其已发表的文章,因此这些字段是可选的。有些电子期刊不提供页面范围,而是列出文章标识符。在这种情况下,使用文章标识符而不是页面范围是安全的。

只有1位作者的期刊

有2位作者的期刊

有3位作者的期刊

有5位以上作者的期刊

书籍引用格式

以下是创作和编辑的书籍的参考文献的示例。

学位论文引用格式

网页引用格式

这些示例是对网页的引用,以及它们应该如何出现在您的参考文献中。

专利引用格式

最新文章

Backdoor Attack on Deep Learning-Based Medical Image Encryption and Decryption Network

2024-1-1

SepBIN: Binary Feature Separation for Better Semantic Comparison and Authorship Verification

2024-1-1

Confidence-Calibrated Face and Kinship Verification

2024-1-1

Cross-Scenario Unknown-Aware Face Anti-Spoofing with Evidential Semantic Consistency Learning

2024-1-1

Identifying Cross-User Privacy Leakage in Mobile Mini-Apps at A Large Scale

2024-1-1

Similarity-based Label Inference Attack against Training and Inference of Split Learning

2024-1-1

Vulnerabilities of Data Protection in Vertical Federated Learning Training and Countermeasures

2024-1-1

An Efficient and Scalable FHE-Based PDQ Scheme: Utilizing FFT to Design a Low Multiplication Depth Large-Integer Comparison Algorithm

2024-1-1

SDSS: Sequential Data Sharing System in IoT

2024-1-1

Analysis of a Programmable Quantum Annealer as a Random Number Generator

2024-1-1

PPGloVe: Privacy-Preserving GloVe for Training Word Vectors in the Dark

2024-1-1

UltraVCS: Ultra-fine-grained Variable-based Code Slicing for Automated Vulnerability Detection

2024-1-1

Privacy-Preserving Approximate Minimum Community Search on Large Networks

2024-1-1

Efficient Verifiably Encrypted ECDSA Schemes from Castagnos-Laguillaumie and Joye-Libert Encryptions

2024-1-1

Privacy-Preserving and Trusted Keyword Search for Multi-Tenancy Cloud

2024-1-1

<i>FLPurifier</i>: Backdoor Defense in Federated Learning via Decoupled Contrastive Training

2024-1-1

Balancing Privacy and Regulation of Cross-Chain Transaction Systems via SoK-Assisted Policy Enhancement

2024-1-1

DARD: Deceptive Approaches for Robust Defense Against IP Theft

2024-1-1

Generic Construction of Conditional Privacy-Preserving Certificateless Signatures with Efficient Instantiations for VANETs

2024-1-1

Split Aggregation: Lightweight Privacy-Preserving Federated Learning Resistant to Byzantine Attacks

2024-1-1

<i>Ambusher</i>: Exploring the Security of Distributed SDN Controllers through Protocol State Fuzzing

2024-1-1

Pilot Spoofing Attack on the Downlink of Cell-Free Massive MIMO: From the Perspective of Adversaries

2024-1-1

Human-in-the-loop Cyber Intrusion Detection Using Active Learning

2024-1-1

Extremal Mechanisms for Pointwise Maximal Leakage

2024-1-1

SAMCU: Secure and Anonymous Multi-Channel Updates in Payment-Channel Networks

2024-1-1

Imperceptible and Robust Backdoor Attack in 3D Point Cloud

2024-1-1

Event-Triggered Impulsive Control for Complex Networks Under Stochastic Deception Attacks

2024-1-1

URadar: Discovering Unrestricted File Upload Vulnerabilities via Adaptive Dynamic Testing

2024-1-1

(Security) Assertions by Large Language Models

2024-1-1

Cross-modal Learning based Flexible Bimodal Biometric Authentication with Template Protection

2024-1-1

Breaking the Anonymity of Ethereum Mixing Services Using Graph Feature Learning

2024-1-1

AgrAmplifier: Defending Federated Learning Against Poisoning Attacks Through Local Update Amplification

2024-1-1

MalPatch: Evading DNN-Based Malware Detection With Adversarial Patches

2024-1-1

AGILE: Automated Assertion Generation to Detect Information Leakage Vulnerabilities

2024-1-1

Exploring Unobservable Blockchain-based Covert Channel for Censorship-Resistant Systems

2024-1-1

Secure Similarity Queries over Vertically Distributed Data via TEE-Enhanced Cloud Computing

2024-1-1

Audio Multi-view Spoofing Detection Framework Based on Audio-Text-Emotion Correlations

2024-1-1

Data-Driven Dynamic Periodic Event-Triggered Control of Cyber-Physical Systems Under Packet Dropouts and DoS Attacks

2024-1-1

Device-Side Lightweight Mutual Authentication and Key Agreement Scheme based on Chameleon Hashing for Industrial Internet of Things

2024-1-1

Proof of Finalization: A Self-Fulfilling Function of Blockchain

2024-1-1

P²FRPSI: Privacy-Preserving Feature Retrieved Private Set Intersection

2024-1-1

Self-Attentive Contrastive Learning for Conditioned Periocular and Face Biometrics

2024-1-1

Fast Propagation Is Better: Accelerating Single-Step Adversarial Training via Sampling Subnetworks

2024-1-1

VGGM: Variational Graph Gaussian Mixture Model for Unsupervised Change Point Detection in Dynamic Networks

2024-1-1

Covert Transmission in Water-to-Air Optical Wireless Communication Systems

2024-1-1

Optimal Signaling for Covert Communications under Peak Power Constraint

2024-1-1

On the Privacy of Adaptive Cuckoo Filters: Analysis and Protection

2024-1-1

EGST: An Efficient Solution for Human Gaits Recognition Using Neuromorphic Vision Sensor

2024-1-1

On the Unforgeability of “Privacy-Preserving Aggregation-Authentication Scheme for Safety Warning System in Fog-Cloud Based VANET”

2024-1-1

Self-Supervised Recovery and Guide for Low-Resolution Person Re-Identification

2024-1-1

帮你贴心管理全部的文献

研飞ivySCI,高效的论文管理

投稿经验分享

分享我的经验,帮你走得更远

Built withby Ivy Science
Copyright © 2020-2024
版权所有:南京青藤格致信息科技有限公司