Home
Research Trends
Papers list
Open Access Journals
All Journals
Search in Journals
Contact us
IEEE Transactions on Information Forensics and Security
Title
Publication Date
Language
Citations
An Efficient Identity-Based Conditional Privacy-Preserving Authentication Scheme for Vehicular Ad Hoc Networks
2015/12/01
28
Zipf’s Law in Passwords
2017/11/01
25
Rich Models for Steganalysis of Digital Images
2012/06/01
22
Separable Reversible Data Hiding in Encrypted Image
2012/04/01
21
Federated Learning With Differential Privacy: Algorithms and Performance Analysis
2020/01/01
20
A Privacy-Preserving and Copy-Deterrence Content-Based Image Retrieval Scheme in Cloud Computing
2016/11/01
20
Toward Efficient Multi-Keyword Fuzzy Search Over Encrypted Outsourced Data With Accuracy Improvement
2016/12/01
19
Attribute-Based Encryption With Verifiable Outsourced Decryption
2013/08/01
18
Privacy-Preserving Deep Learning via Additively Homomorphic Encryption
2018/05/01
16
A Multimodal Deep Learning Method for Android Malware Detection Using Various Features
2019/03/01
15
VerifyNet: Secure and Verifiable Federated Learning
2020/01/01
14
DroidCat: Effective Android Malware Detection and Categorization via App-Level Profiling
2019/06/01
14
A Secure Biometrics-Based Multi-Server Authentication Protocol Using Smart Cards
2015/09/01
14
Reversible Data Hiding in Encrypted Images by Reserving Room Before Encryption
2013/03/01
13
Steganalysis by Subtractive Pixel Adjacency Matrix
2010/06/01
13
Deep Learning Hierarchical Representations for Image Steganalysis
2017/11/01
13
Identity-Based Remote Data Integrity Checking With Perfect Data Privacy Preserving for Cloud Storage
2017/04/01
12
A Light CNN for Deep Face Representation With Noisy Labels
2018/11/01
11
An Efficient Public Auditing Protocol With Novel Dynamic Structure for Cloud Data
2017/10/01
11
Enabling Identity-Based Integrity Auditing and Data Sharing With Sensitive Information Hiding for Secure Cloud Storage
2019/02/01
11
An Efficient MSB Prediction-Based Method for High-Capacity Reversible Data Hiding in Encrypted Images
2018/07/01
10
<inline-formula> <tex-math notation="LaTeX">$\textsf{LoPub}$ </tex-math> </inline-formula>: High-Dimensional Crowdsourced Data Publication With Local Differential Privacy
2018/09/01
10
Using Deep Convolutional Neural Network Architectures for Object Classification and Detection Within X-Ray Baggage Security Imagery
2018/09/01
10
Smart and Practical Privacy-Preserving Data Aggregation for Fog-Based Smart Grids
2021/01/01
10
ActiveTrust: Secure and Trustable Routing in Wireless Sensor Networks
2016/09/01
10
Segmentation-Based Image Copy-Move Forgery Detection Scheme
2015/03/01
10
Dynamic Multi-Key FHE in Asymmetric Key Setting From LWE
2021/01/01
10
An Efficient Privacy-Preserving Outsourced Calculation Toolkit With Multiple Keys
2016/11/01
10
Anonymous and Traceable Group Data Sharing in Cloud Computing
2018/04/01
9
Effective and Efficient Global Context Verification for Image Copy Detection
2017/01/01
9
«
‹ Pervious
Next ›
»