IEEE Transactions on Information Forensics and Security

Technical Co-Sponsors:

  • IEEE Communications Society
  • IEEE Computational Intelligence Society
  • IEEE Computer Society
  • IEEE Engineering in Medicine and Biology Society
  • IEEE Information Theory Society

Scope

The IEEE Transactions on Information Forensics and Security (TIFS) covers the sciences, technologies, and applications relating to information forensics, information security, biometrics, surveillance and systems applications that incorporate these features.

For new submissions, go to Scholar One.

Reproducible research

The Transactions encourages authors to make their publications reproducible by making all information needed to reproduce the presented results available online. This typically requires publishing the code and data used to produce the publication`s figures and tables on a website; see the supplemental materials section of the information for authors. It gives other researchers easier access to the work, and facilitates fair comparisons. Recognizing the peculiarities of papers presenting deep learning techniques, the editorial board of T-IFS drafted a document with specific instructions about the information to be provided to allow research reproducibility in this kind of papers.

Multimedia content

It is now possible to submit for review and publish in Xplore supporting multimedia material such as speech samples, images, movies, matlab code etc. A multimedia graphical abstract can also be displayed along with the traditional text. More information is available under Multimedia Materials at the IEEE Author Center.


TIFS Volume 20 | 2025

LD-PA: Distilling Univariate Leakage for Deep Learning-Based Profiling Attacks

The deep learning-based profiling attacks have received significant attention for their potential against masking-protected devices. Currently, additional capabilities like exploiting only a segment of the side-channel traces or having knowledge of the specific countermeasure scheme have been granted to attackers during the profiling phase. In case either capability is removed, a practical profiling attack faces great difficulty and complexity.

Read more

On the Efficient Design of Stacked Intelligent Metasurfaces for Secure SISO Transmission

Recently, stacked intelligent metasurfaces (SIMs) have aroused widespread discussions as an innovative technology for directly processing electromagnetic (EM) wave signals. By stacking multiple programmable metasurface layers, an SIM has the ability to provide additional spatial degrees of freedom without the introduction of expensive radio-frequency chains, which may outperform reconfigurable intelligent surfaces (RISs) with single-layer structures.

Read more

Communication Efficient Ciphertext-Field Aggregation in Wireless Networks via Over-the-Air Computation

Aggregating metadata in the ciphertext field is an attractive property brought by homomorphic encryption (HE) for privacy-sensitive computing tasks, therefore, research on the next-generation wireless networks has treated it as one of the promising cryptographic techniques for various scenarios. However, existing schemes are far from being deployed in various computing scenarios due to their high computational complexity and ciphertext expansion, especially for bandwidth-limited and latency-sensitive wireless scenarios.

Read more

DEFending Integrated Circuit Layouts

Modern integrated circuits (ICs) require a complex, outsourced supply-chain, involving computer-aided design (CAD) tools, expert knowledge, and advanced foundries. This complexity has led to various security threats, such as Trojans inserted by adversaries during outsourcing, but also run-time threats like physical probing. Our proposed design-time solution, DEFense , is an extensible CAD framework for holistic assessment and proactive mitigation of multiple prominent threats.

Read more

TIFS Volume 19 | 2024

WF-Transformer: Learning Temporal Features for Accurate Anonymous Traffic Identification by Using Transformer Networks

Website Fingerprinting (WF) is a network traffic mining technique for anonymous traffic identification, which enables a local adversary to identify the target website that an anonymous network user is browsing. WF attacks based on deep convolutional neural networks (CNN) get the state-of-the-art anonymous traffic classification performance. However, due to the locality restriction of CNN architecture for feature extraction on sequence data, these methods ignore the temporal feature extraction in the anonymous traffic analysis.

Read more