Aim & Scope
The IEEE Transactions on Information Forensics and Security covers the sciences, technologies, and applications relating to information forensics, information security, biometrics, surveillance and systems applications that incorporate these features. [1]
2024
Accountable and Secure Threshold EdDSA Signature and Its Applications
Y Xie , Q Fan , C Zhang , ... , L Zhu
IEEE Transactions on Information Forensics and Security , 2024 , p 1.
Ensuring End-to-End Security with Fine-grained Access Control for Connected and Autonomous Vehicles
IEEE Transactions on Information Forensics and Security , 2024 , p 1.
Z Liu , W Wang , Y Ye , ... , Z Liu
IEEE Transactions on Information Forensics and Security , 2024 , p 1.
GMFITD: Graph Meta-Learning for Effective Few-Shot Insider Threat Detection
X Li , L Li , X Li , ... , S Yu
IEEE Transactions on Information Forensics and Security , 2024 , p 1.
MPAF: Encrypted Traffic Classification with Multi-Phase Attribute Fingerprint
IEEE Transactions on Information Forensics and Security , 2024 , p 1.
Secure and Lightweight Feature Selection for Horizontal Federated Learning
X Liu , H Li , G Xu , ... , J Zhou
IEEE Transactions on Information Forensics and Security , 2024 , p 1.
ASIA: A Federated Boosting Tree Model Against Sequence Inference Attacks in Financial Networks
IEEE Transactions on Information Forensics and Security , 2024 , p 1.
SeIoT: Detecting Anomalous Semantics in Smart Homes via Knowledge Graph
R Li , Q Li , Y Huang , ... , A Vasilakos
IEEE Transactions on Information Forensics and Security , 2024 , p 1.
Adaptive Knowledge Transfer for Weak-Shot Gait Recognition
S Hou , X Hu , C Cao , ... , Y Huang
IEEE Transactions on Information Forensics and Security , 2024 , p 1.
Toward Robust and Effective Behavior Based User Authentication With Off-the-shelf Wi-Fi
L Zhang , Y Jiang , Y Ma , ... , C Dong
IEEE Transactions on Information Forensics and Security , 2024 , p 1.