IEEE Transactions on Information Forensics and Security
ISSN:1556-6013

IEEE Transactions on Information Forensics and Security

IEEE T INF FOREN SEC
学科领域:计算机科学
是否预警:不在预警名单内
是否OA:
录用周期:约6.8个月
新锐分区:计算机科学1区
年发文量:730
影响因子:8
JCR分区:Q1

基本信息

IEEE信息取证与安全会刊》涵盖了与信息取证、信息安全、生物识别、监控以及包含这些功能的系统应用相关的科学、技术和应用
1556-6013SCIE/Scopus收录
8
7.5
2026年3月发布
点击查看历史分区趋势    >
大类学科小类学科Top期刊综述期刊
计算机科学1区
COMPUTER SCIENCE, THEORY & METHODS 计算机:理论方法
1区
ENGINEERING, ELECTRICAL & ELECTRONIC 工程:电子与电气
1区
N/A
WOS期刊SCI分区  2024-2025最新升级版
按JIF指标学科分区收集子录JIF分区JIF排名百分位
学科:COMPUTER SCIENCE, THEORY & METHODS
SCIE
Q1
12/147
学科:ENGINEERING, ELECTRICAL & ELECTRONIC
SCIE
Q1
31/368
按JCR指标学科分区收集子录JCR分区JCR排名百分位
学科:COMPUTER SCIENCE, THEORY & METHODS
SCIE
Q1
9/147
学科:ENGINEERING, ELECTRICAL & ELECTRONIC
SCIE
Q1
24/368
95
730
28%较易约6.8个月-工程技术-工程:电子与电气
13.8%
时间预警情况
2026年03月发布的新锐学术版不在预警名单中
2025年03月发布的2025版不在预警名单中
2024年02月发布的2024版不在预警名单中
2023年01月发布的2023版不在预警名单中
2021年12月发布的2021版不在预警名单中
2020年12月发布的2020版不在预警名单中
100.00%5.31%-
CiteScore:12.50
SJR:2.135
SNIP:2.669
学科类别分区排名百分位
大类:Engineering
小类:Safety, Risk, Reliability and Quality
Q1
9 / 235
大类:Engineering
小类:Computer Networks and Communications
Q1
35 / 507

期刊高被引文献

Multi-Task GANs for View-Specific Feature Learning in Gait Recognition
来源期刊:IEEE Transactions on Information Forensics and SecurityDOI:10.1109/TIFS.2018.2844819
CNN-Based Adversarial Embedding for Image Steganography
来源期刊:IEEE Transactions on Information Forensics and SecurityDOI:10.1109/TIFS.2019.2891237
ADMM Based Privacy-Preserving Decentralized Optimization
来源期刊:IEEE Transactions on Information Forensics and SecurityDOI:10.1109/TIFS.2018.2855169
Secure Key Agreement and Key Protection for Mobile Device User Authentication
来源期刊:IEEE Transactions on Information Forensics and SecurityDOI:10.1109/TIFS.2018.2850299
AnomalyNet: An Anomaly Detection Network for Video Surveillance
来源期刊:IEEE Transactions on Information Forensics and SecurityDOI:10.1109/TIFS.2019.2900907
Joint Discriminative Learning of Deep Dynamic Textures for 3D Mask Face Anti-Spoofing
来源期刊:IEEE Transactions on Information Forensics and SecurityDOI:10.1109/TIFS.2018.2868230
Real-Time Detection of Hybrid and Stealthy Cyber-Attacks in Smart Grid
来源期刊:IEEE Transactions on Information Forensics and SecurityDOI:10.1109/TIFS.2018.2854745
Passive Attacks Against Searchable Encryption
来源期刊:IEEE Transactions on Information Forensics and SecurityDOI:10.1109/TIFS.2018.2866321
Ensemble of Multi-View Learning Classifiers for Cross-Domain Iris Presentation Attack Detection
来源期刊:IEEE Transactions on Information Forensics and SecurityDOI:10.1109/TIFS.2018.2878542
Lightweight and Privacy-Friendly Spatial Data Aggregation for Secure Power Supply and Demand Management in Smart Grids
来源期刊:IEEE Transactions on Information Forensics and SecurityDOI:10.1109/TIFS.2018.2881730
$PROST$ : Privacy-Preserving and Truthful Online Double Auction for Spectrum Allocation
来源期刊:IEEE Transactions on Information Forensics and SecurityDOI:10.1109/TIFS.2018.2850330
Why Botnets Work: Distributed Brute-Force Attacks Need No Synchronization
来源期刊:IEEE Transactions on Information Forensics and SecurityDOI:10.1109/TIFS.2019.2895955
Face-Based Multiple User Active Authentication on Mobile Devices
来源期刊:IEEE Transactions on Information Forensics and SecurityDOI:10.1109/TIFS.2018.2876748
Iris Recognition After Death
来源期刊:IEEE Transactions on Information Forensics and SecurityDOI:10.1109/TIFS.2018.2881671
Finger Vein Code: From Indexing to Matching
来源期刊:IEEE Transactions on Information Forensics and SecurityDOI:10.1109/TIFS.2018.2871778
Privacy-Preserving Deep Learning via Weight Transmission
来源期刊:IEEE Transactions on Information Forensics and SecurityDOI:10.1109/TIFS.2019.2911169
Recurrent Adaptation Networks for Online Signature Verification
来源期刊:IEEE Transactions on Information Forensics and SecurityDOI:10.1109/TIFS.2018.2883152
Jamming-Assisted Eavesdropping Over Parallel Fading Channels
来源期刊:IEEE Transactions on Information Forensics and SecurityDOI:10.1109/TIFS.2019.2901821
Cancelable Biometric Recognition With ECGs: Subspace-Based Approaches
来源期刊:IEEE Transactions on Information Forensics and SecurityDOI:10.1109/TIFS.2018.2876838
Digital Audio Signature for 3D Printing Integrity
来源期刊:IEEE Transactions on Information Forensics and SecurityDOI:10.1109/TIFS.2018.2851584
Patchwork-Based Audio Watermarking Robust Against De-Synchronization and Recapturing Attacks
来源期刊:IEEE Transactions on Information Forensics and SecurityDOI:10.1109/TIFS.2018.2871748
Energy-Constrained SWIPT Networks: Enhancing Physical Layer Security With FD Self-Jamming
来源期刊:IEEE Transactions on Information Forensics and SecurityDOI:10.1109/TIFS.2018.2848630
Robust Beamforming and Jamming for Enhancing the Physical Layer Security of Full Duplex Radios
来源期刊:IEEE Transactions on Information Forensics and SecurityDOI:10.1109/TIFS.2019.2908481
Towards Efficient Fine-Grained Access Control and Trustworthy Data Processing for Remote Monitoring Services in IoT
来源期刊:IEEE Transactions on Information Forensics and SecurityDOI:10.1109/TIFS.2018.2885287
Multi-Beam Directional Modulation Synthesis Scheme Based on Frequency Diverse Array
来源期刊:IEEE Transactions on Information Forensics and SecurityDOI:10.1109/TIFS.2019.2900942
From Noise to Feature: Exploiting Intensity Distribution as a Novel Soft Biometric Trait for Finger Vein Recognition
来源期刊:IEEE Transactions on Information Forensics and SecurityDOI:10.1109/TIFS.2018.2866330
The MalSource Dataset: Quantifying Complexity and Code Reuse in Malware Development
来源期刊:IEEE Transactions on Information Forensics and SecurityDOI:10.1109/TIFS.2018.2885512
Detection of Jamming Attack in Non-Coherent Massive SIMO Systems
来源期刊:IEEE Transactions on Information Forensics and SecurityDOI:10.1109/TIFS.2019.2899484
Improving the Robustness of Adaptive Steganographic Algorithms Based on Transport Channel Matching
来源期刊:IEEE Transactions on Information Forensics and SecurityDOI:10.1109/TIFS.2018.2885438
Accurate and Scalable Image Clustering Based on Sparse Representation of Camera Fingerprint
来源期刊:IEEE Transactions on Information Forensics and SecurityDOI:10.1109/TIFS.2018.2886929
Differentially Private Double Spectrum Auction With Approximate Social Welfare Maximization
来源期刊:IEEE Transactions on Information Forensics and SecurityDOI:10.1109/TIFS.2019.2908070
Securing Android App Markets via Modeling and Predicting Malware Spread Between Markets
来源期刊:IEEE Transactions on Information Forensics and SecurityDOI:10.1109/TIFS.2018.2889924
ABSI: An Adaptive Binary Splitting Algorithm for Malicious Meter Inspection in Smart Grid
来源期刊:IEEE Transactions on Information Forensics and SecurityDOI:10.1109/TIFS.2018.2854703
Information-Theoretic Bounds for the Forensic Detection of Downscaled Signals
来源期刊:IEEE Transactions on Information Forensics and SecurityDOI:10.1109/TIFS.2018.2889259
Retrieving Hidden Friends: A Collusion Privacy Attack Against Online Friend Search Engine
来源期刊:IEEE Transactions on Information Forensics and SecurityDOI:10.1109/TIFS.2018.2866309
$LiveForen$ : Ensuring Live Forensic Integrity in the Cloud
来源期刊:IEEE Transactions on Information Forensics and SecurityDOI:10.1109/TIFS.2019.2898841
Secure Communication in Relay-Assisted Massive MIMO Downlink With Active Pilot Attacks
来源期刊:IEEE Transactions on Information Forensics and SecurityDOI:10.1109/TIFS.2019.2901825
A Scalable Architecture for Uncompressed-Domain Watermarked Videos
来源期刊:IEEE Transactions on Information Forensics and SecurityDOI:10.1109/TIFS.2018.2879301
Every Shred Helps: Assembling Evidence From Orphaned JPEG Fragments
来源期刊:IEEE Transactions on Information Forensics and SecurityDOI:10.1109/TIFS.2019.2897912
Attended Relation Feature Representation of Facial Dynamics for Facial Authentication
来源期刊:IEEE Transactions on Information Forensics and SecurityDOI:10.1109/TIFS.2018.2885276
Impact of Prior Knowledge and Data Correlation on Privacy Leakage: A Unified Analysis
来源期刊:IEEE Transactions on Information Forensics and SecurityDOI:10.1109/TIFS.2019.2895970
Cost-Sensitive Label Propagation for Semi-Supervised Face Recognition
来源期刊:IEEE Transactions on Information Forensics and SecurityDOI:10.1109/TIFS.2018.2885252
$\\alpha$ -Trimmed Weber Representation and Cross Section Asymmetrical Coding for Human Identification Using Finger Images
来源期刊:IEEE Transactions on Information Forensics and SecurityDOI:10.1109/TIFS.2018.2844803
Shortlisting the Influential Members of Criminal Organizations and Identifying Their Important Communication Channels
来源期刊:IEEE Transactions on Information Forensics and SecurityDOI:10.1109/TIFS.2018.2890811
Exploring Character Shapes for Unsupervised Reconstruction of Strip-Shredded Text Documents
来源期刊:IEEE Transactions on Information Forensics and SecurityDOI:10.1109/TIFS.2018.2885253
Securing Network Coding Architectures Against Pollution Attacks With Band Codes
来源期刊:IEEE Transactions on Information Forensics and SecurityDOI:10.1109/TIFS.2018.2859583
A Synergistic Concealed Information Test With Novel Approach for EEG Channel Selection and SVM Parameter Optimization
来源期刊:IEEE Transactions on Information Forensics and SecurityDOI:10.1109/TIFS.2019.2913798
Secrecy Amplification of Distributed Encrypted Sources With Correlated Keys Using Post-Encryption-Compression
来源期刊:IEEE Transactions on Information Forensics and SecurityDOI:10.1109/TIFS.2019.2907464
Detection of Speech Smoothing on Very Short Clips
来源期刊:IEEE Transactions on Information Forensics and SecurityDOI:10.1109/TIFS.2019.2900935
Detection of Counterfeit ICs Using Public Identification Sequences and Side-Channel Leakage
来源期刊:IEEE Transactions on Information Forensics and SecurityDOI:10.1109/TIFS.2018.2866333

相关文章

2026年3月发布(新锐分区)
大类学科小类学科Top期刊综述期刊
计算机科学1区
COMPUTER SCIENCE, THEORY & METHODS 计算机:理论方法
1区
ENGINEERING, ELECTRICAL & ELECTRONIC 工程:电子与电气
1区
N/A
2025年3月升级版
大类学科小类学科Top期刊综述期刊
计算机科学1区
COMPUTER SCIENCE, THEORY & METHODS 计算机:理论方法
1区
ENGINEERING, ELECTRICAL & ELECTRONIC 工程:电子与电气
1区
2023年12月旧的升级版
大类学科小类学科Top期刊综述期刊
计算机科学1区
COMPUTER SCIENCE, THEORY & METHODS 计算机:理论方法
1区
ENGINEERING, ELECTRICAL & ELECTRONIC 工程:电子与电气
2区