IEEE Transactions on Information Forensics and Security
Published by IEEE
ISSN : 1556-6013
Abbreviation : IEEE Trans. Inf. Forensics Secur.
Aims & Scope
The IEEE Transactions on Information Forensics and Security covers the sciences, technologies, and applications relating to information forensics, information security, biometrics, surveillance and systems applications that incorporate these features.
View Aims & ScopeMetrics & Ranking
Impact Factor
Year | Value |
---|---|
2025 | 8 |
Journal Rank
Year | Value |
---|---|
2024 | 1276 |
Journal Citation Indicator
Year | Value |
---|---|
2024 | 11032 |
SJR (SCImago Journal Rank)
Year | Value |
---|---|
2024 | 2.135 |
Quartile
Year | Value |
---|---|
2024 | Q1 |
h-index
Year | Value |
---|---|
2024 | 182 |
Impact Factor Trend
Abstracting & Indexing
Journal is indexed in leading academic databases, ensuring global visibility and accessibility of our peer-reviewed research.
Subjects & Keywords
Journal’s research areas, covering key disciplines and specialized sub-topics in Computer Science and Engineering, designed to support cutting-edge academic discovery.
Most Cited Articles
The Most Cited Articles section features the journal's most impactful research, based on citation counts. These articles have been referenced frequently by other researchers, indicating their significant contribution to their respective fields.
-
Federated Learning With Differential Privacy: Algorithms and Performance Analysis
Citation: 1665
Authors: Kang, Jun, Ming, Chuan, Howard H., Farhad, Shi, Tony Q. S., H.
-
Privacy-Preserving Deep Learning via Additively Homomorphic Encryption
Citation: 982
Authors: Le Trieu, Yoshinori, Takuya, Lihua, Shiho
-
Ensemble Classifiers for Steganalysis of Digital Media
Citation: 877
Authors: Jan, Jessica, Vojtěch
-
A SIFT-Based Forensic Method for Copy–Move Attack Detection and Transformation Recovery
Citation: 821
Authors: I., L., R., A., G.
-
A Light CNN for Deep Face Representation With Noisy Labels
Citation: 808
Authors: Xiang, Ran, Zhenan, Tieniu
-
An Efficient Identity-Based Conditional Privacy-Preserving Authentication Scheme for Vehicular Ad Hoc Networks
Citation: 764
Authors: Debiao, Sherali, Baowen, Xinyi
-
Minimizing Additive Distortion in Steganography Using Syndrome-Trellis Codes
Citation: 760
Authors: T., J., J.