IEEE Transactions on Information Forensics and Security

IEEE Transactions on Information Forensics and Security

IEEE T INF FOREN SEC
影响因子:8
是否综述期刊:
是否预警:不在预警名单内
是否OA:
出版国家/地区:UNITED STATES
出版社:Institute of Electrical and Electronics Engineers Inc.
发刊时间:0
发刊频率:Quarterly
收录数据库:SCIE/Scopus收录
ISSN:1556-6013

期刊介绍

The IEEE Transactions on Information Forensics and Security covers the sciences, technologies, and applications relating to information forensics, information security, biometrics, surveillance and systems applications that incorporate these features
IEEE信息取证与安全会刊》涵盖了与信息取证、信息安全、生物识别、监控以及包含这些功能的系统应用相关的科学、技术和应用
年发文量 730
国人发稿量 511
国人发文占比 0.7%
自引率 -
平均录取率0
平均审稿周期 平均6.8个月
版面费 US$2195
偏重研究方向 工程技术-工程:电子与电气
期刊官网 http://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=10206
投稿链接 https://mc.manuscriptcentral.com/tifs-ieee

期刊高被引文献

Multi-Task GANs for View-Specific Feature Learning in Gait Recognition
来源期刊:IEEE Transactions on Information Forensics and SecurityDOI:10.1109/TIFS.2018.2844819
CNN-Based Adversarial Embedding for Image Steganography
来源期刊:IEEE Transactions on Information Forensics and SecurityDOI:10.1109/TIFS.2019.2891237
ADMM Based Privacy-Preserving Decentralized Optimization
来源期刊:IEEE Transactions on Information Forensics and SecurityDOI:10.1109/TIFS.2018.2855169
Secure Key Agreement and Key Protection for Mobile Device User Authentication
来源期刊:IEEE Transactions on Information Forensics and SecurityDOI:10.1109/TIFS.2018.2850299
AnomalyNet: An Anomaly Detection Network for Video Surveillance
来源期刊:IEEE Transactions on Information Forensics and SecurityDOI:10.1109/TIFS.2019.2900907
Joint Discriminative Learning of Deep Dynamic Textures for 3D Mask Face Anti-Spoofing
来源期刊:IEEE Transactions on Information Forensics and SecurityDOI:10.1109/TIFS.2018.2868230
Real-Time Detection of Hybrid and Stealthy Cyber-Attacks in Smart Grid
来源期刊:IEEE Transactions on Information Forensics and SecurityDOI:10.1109/TIFS.2018.2854745
Passive Attacks Against Searchable Encryption
来源期刊:IEEE Transactions on Information Forensics and SecurityDOI:10.1109/TIFS.2018.2866321
Ensemble of Multi-View Learning Classifiers for Cross-Domain Iris Presentation Attack Detection
来源期刊:IEEE Transactions on Information Forensics and SecurityDOI:10.1109/TIFS.2018.2878542
Lightweight and Privacy-Friendly Spatial Data Aggregation for Secure Power Supply and Demand Management in Smart Grids
来源期刊:IEEE Transactions on Information Forensics and SecurityDOI:10.1109/TIFS.2018.2881730
$PROST$ : Privacy-Preserving and Truthful Online Double Auction for Spectrum Allocation
来源期刊:IEEE Transactions on Information Forensics and SecurityDOI:10.1109/TIFS.2018.2850330
Why Botnets Work: Distributed Brute-Force Attacks Need No Synchronization
来源期刊:IEEE Transactions on Information Forensics and SecurityDOI:10.1109/TIFS.2019.2895955
Face-Based Multiple User Active Authentication on Mobile Devices
来源期刊:IEEE Transactions on Information Forensics and SecurityDOI:10.1109/TIFS.2018.2876748
Iris Recognition After Death
来源期刊:IEEE Transactions on Information Forensics and SecurityDOI:10.1109/TIFS.2018.2881671
Finger Vein Code: From Indexing to Matching
来源期刊:IEEE Transactions on Information Forensics and SecurityDOI:10.1109/TIFS.2018.2871778
Privacy-Preserving Deep Learning via Weight Transmission
来源期刊:IEEE Transactions on Information Forensics and SecurityDOI:10.1109/TIFS.2019.2911169
Recurrent Adaptation Networks for Online Signature Verification
来源期刊:IEEE Transactions on Information Forensics and SecurityDOI:10.1109/TIFS.2018.2883152
Jamming-Assisted Eavesdropping Over Parallel Fading Channels
来源期刊:IEEE Transactions on Information Forensics and SecurityDOI:10.1109/TIFS.2019.2901821
Cancelable Biometric Recognition With ECGs: Subspace-Based Approaches
来源期刊:IEEE Transactions on Information Forensics and SecurityDOI:10.1109/TIFS.2018.2876838
Digital Audio Signature for 3D Printing Integrity
来源期刊:IEEE Transactions on Information Forensics and SecurityDOI:10.1109/TIFS.2018.2851584
Patchwork-Based Audio Watermarking Robust Against De-Synchronization and Recapturing Attacks
来源期刊:IEEE Transactions on Information Forensics and SecurityDOI:10.1109/TIFS.2018.2871748
Energy-Constrained SWIPT Networks: Enhancing Physical Layer Security With FD Self-Jamming
来源期刊:IEEE Transactions on Information Forensics and SecurityDOI:10.1109/TIFS.2018.2848630
Robust Beamforming and Jamming for Enhancing the Physical Layer Security of Full Duplex Radios
来源期刊:IEEE Transactions on Information Forensics and SecurityDOI:10.1109/TIFS.2019.2908481
Towards Efficient Fine-Grained Access Control and Trustworthy Data Processing for Remote Monitoring Services in IoT
来源期刊:IEEE Transactions on Information Forensics and SecurityDOI:10.1109/TIFS.2018.2885287
Multi-Beam Directional Modulation Synthesis Scheme Based on Frequency Diverse Array
来源期刊:IEEE Transactions on Information Forensics and SecurityDOI:10.1109/TIFS.2019.2900942
From Noise to Feature: Exploiting Intensity Distribution as a Novel Soft Biometric Trait for Finger Vein Recognition
来源期刊:IEEE Transactions on Information Forensics and SecurityDOI:10.1109/TIFS.2018.2866330
The MalSource Dataset: Quantifying Complexity and Code Reuse in Malware Development
来源期刊:IEEE Transactions on Information Forensics and SecurityDOI:10.1109/TIFS.2018.2885512
Detection of Jamming Attack in Non-Coherent Massive SIMO Systems
来源期刊:IEEE Transactions on Information Forensics and SecurityDOI:10.1109/TIFS.2019.2899484
Improving the Robustness of Adaptive Steganographic Algorithms Based on Transport Channel Matching
来源期刊:IEEE Transactions on Information Forensics and SecurityDOI:10.1109/TIFS.2018.2885438
Accurate and Scalable Image Clustering Based on Sparse Representation of Camera Fingerprint
来源期刊:IEEE Transactions on Information Forensics and SecurityDOI:10.1109/TIFS.2018.2886929
Differentially Private Double Spectrum Auction With Approximate Social Welfare Maximization
来源期刊:IEEE Transactions on Information Forensics and SecurityDOI:10.1109/TIFS.2019.2908070
Securing Android App Markets via Modeling and Predicting Malware Spread Between Markets
来源期刊:IEEE Transactions on Information Forensics and SecurityDOI:10.1109/TIFS.2018.2889924
ABSI: An Adaptive Binary Splitting Algorithm for Malicious Meter Inspection in Smart Grid
来源期刊:IEEE Transactions on Information Forensics and SecurityDOI:10.1109/TIFS.2018.2854703
Information-Theoretic Bounds for the Forensic Detection of Downscaled Signals
来源期刊:IEEE Transactions on Information Forensics and SecurityDOI:10.1109/TIFS.2018.2889259
Retrieving Hidden Friends: A Collusion Privacy Attack Against Online Friend Search Engine
来源期刊:IEEE Transactions on Information Forensics and SecurityDOI:10.1109/TIFS.2018.2866309
$LiveForen$ : Ensuring Live Forensic Integrity in the Cloud
来源期刊:IEEE Transactions on Information Forensics and SecurityDOI:10.1109/TIFS.2019.2898841
Secure Communication in Relay-Assisted Massive MIMO Downlink With Active Pilot Attacks
来源期刊:IEEE Transactions on Information Forensics and SecurityDOI:10.1109/TIFS.2019.2901825
A Scalable Architecture for Uncompressed-Domain Watermarked Videos
来源期刊:IEEE Transactions on Information Forensics and SecurityDOI:10.1109/TIFS.2018.2879301
Every Shred Helps: Assembling Evidence From Orphaned JPEG Fragments
来源期刊:IEEE Transactions on Information Forensics and SecurityDOI:10.1109/TIFS.2019.2897912
Attended Relation Feature Representation of Facial Dynamics for Facial Authentication
来源期刊:IEEE Transactions on Information Forensics and SecurityDOI:10.1109/TIFS.2018.2885276
Impact of Prior Knowledge and Data Correlation on Privacy Leakage: A Unified Analysis
来源期刊:IEEE Transactions on Information Forensics and SecurityDOI:10.1109/TIFS.2019.2895970
Cost-Sensitive Label Propagation for Semi-Supervised Face Recognition
来源期刊:IEEE Transactions on Information Forensics and SecurityDOI:10.1109/TIFS.2018.2885252
$\\alpha$ -Trimmed Weber Representation and Cross Section Asymmetrical Coding for Human Identification Using Finger Images
来源期刊:IEEE Transactions on Information Forensics and SecurityDOI:10.1109/TIFS.2018.2844803
Shortlisting the Influential Members of Criminal Organizations and Identifying Their Important Communication Channels
来源期刊:IEEE Transactions on Information Forensics and SecurityDOI:10.1109/TIFS.2018.2890811
Exploring Character Shapes for Unsupervised Reconstruction of Strip-Shredded Text Documents
来源期刊:IEEE Transactions on Information Forensics and SecurityDOI:10.1109/TIFS.2018.2885253
Securing Network Coding Architectures Against Pollution Attacks With Band Codes
来源期刊:IEEE Transactions on Information Forensics and SecurityDOI:10.1109/TIFS.2018.2859583
A Synergistic Concealed Information Test With Novel Approach for EEG Channel Selection and SVM Parameter Optimization
来源期刊:IEEE Transactions on Information Forensics and SecurityDOI:10.1109/TIFS.2019.2913798
Secrecy Amplification of Distributed Encrypted Sources With Correlated Keys Using Post-Encryption-Compression
来源期刊:IEEE Transactions on Information Forensics and SecurityDOI:10.1109/TIFS.2019.2907464
Detection of Speech Smoothing on Very Short Clips
来源期刊:IEEE Transactions on Information Forensics and SecurityDOI:10.1109/TIFS.2019.2900935
Detection of Counterfeit ICs Using Public Identification Sequences and Side-Channel Leakage
来源期刊:IEEE Transactions on Information Forensics and SecurityDOI:10.1109/TIFS.2018.2866333

质量指标占比

研究类文章占比 OA被引用占比 撤稿占比 出版后修正文章占比
100.00%6.01%--

相关指数

影响因子
影响因子
年发文量
自引率
Cite Score

预警情况

查看说明
时间 预警情况
2025年03月发布的2025版不在预警名单中
2024年02月发布的2024版不在预警名单中
2023年01月发布的2023版不在预警名单中
2021年12月发布的2021版不在预警名单中
2020年12月发布的2020版不在预警名单中
*来源:中科院《 国际期刊预警名单》

JCR分区

WOS分区等级:Q1区
版本 按学科 分区
WOS期刊SCI分区
WOS期刊SCI分区
WOS期刊SCI分区是指SCI官方(Web of Science)为每个学科内的期刊按照IF数值排 序,将期刊按照四等分的方法划分的Q1-Q4等级,Q1代表质量最高,即常说的1区期刊。
(2024-2025年最新版)
COMPUTER SCIENCE, THEORY & METHODS
Q1

中科院分区

查看说明
版本 大类学科 小类学科 Top期刊 综述期刊
2025年3月最新升级版
计算机科学1区
COMPUTER SCIENCE, THEORY & METHODS 计算机:理论方法
1区
ENGINEERING, ELECTRICAL & ELECTRONIC 工程:电子与电气
1区
2023年12月升级版
计算机科学1区
COMPUTER SCIENCE, THEORY & METHODS 计算机:理论方法
1区
ENGINEERING, ELECTRICAL & ELECTRONIC 工程:电子与电气
2区
2022年12月旧的升级版
计算机科学1区
COMPUTER SCIENCE, THEORY & METHODS 计算机:理论方法
1区
ENGINEERING, ELECTRICAL & ELECTRONIC 工程:电子与电气
1区