2024年6月最新影响因子数据已经更新,欢迎查询! 如果您对期刊系统有任何需求或者问题,欢迎
反馈给我们。出版社推荐: | 热 Springer Nature特刊征稿 | 新 Springer Nature新刊推荐 |
基本信息 | 登录收藏 | |||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
期刊名字 | IEEE Transactions on Information Forensics and Security IEEE T INF FOREN SEC (此期刊被最新的JCR期刊SCIE收录) LetPub评分 8.8
169人评分
我要评分
声誉 9.1 影响力 8.6 速度 7.5 | |||||||||||||||||||||||||||||||
期刊ISSN | 1556-6013 | 微信扫码收藏此期刊 | ||||||||||||||||||||||||||||||
2023-2024最新影响因子 (数据来源于搜索引擎) | 6.3 点击查看影响因子趋势图 | |||||||||||||||||||||||||||||||
实时影响因子 | 截止2024年10月29日:5.474 | |||||||||||||||||||||||||||||||
2023-2024自引率 | 11.10%点击查看自引率趋势图 | |||||||||||||||||||||||||||||||
五年影响因子 | 7.3 | |||||||||||||||||||||||||||||||
JCI期刊引文指标 | 1.77 | |||||||||||||||||||||||||||||||
h-index | 95 | |||||||||||||||||||||||||||||||
CiteScore ( 2024年最新版) |
| |||||||||||||||||||||||||||||||
期刊简介 |
| |||||||||||||||||||||||||||||||
期刊官方网站 | http://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=10206 | |||||||||||||||||||||||||||||||
期刊投稿网址 | https://mc.manuscriptcentral.com/tifs-ieee | |||||||||||||||||||||||||||||||
期刊语言要求 | 经LetPub语言功底雄厚的美籍native English speaker精心编辑的稿件,不仅能满足IEEE Transactions on Information Forensics and Security的语言要求,还能让IEEE Transactions on Information Forensics and Security编辑和审稿人得到更好的审稿体验,让稿件最大限度地被IEEE Transactions on Information Forensics and Security编辑和审稿人充分理解和公正评估。LetPub的专业SCI论文编辑服务(包括SCI论文英语润色,同行资深专家修改润色,SCI论文专业翻译,SCI论文格式排版,专业学术制图等)帮助作者准备稿件,已助力全球15万+作者顺利发表论文。部分发表范例可查看:服务好评 论文致谢 。
提交文稿 | |||||||||||||||||||||||||||||||
是否OA开放访问 | No | |||||||||||||||||||||||||||||||
通讯方式 | IEEE-INST ELECTRICAL ELECTRONICS ENGINEERS INC, 445 HOES LANE, PISCATAWAY, USA, NJ, 08855-4141 | |||||||||||||||||||||||||||||||
出版商 | Institute of Electrical and Electronics Engineers Inc. | |||||||||||||||||||||||||||||||
涉及的研究方向 | 工程技术-工程:电子与电气 | |||||||||||||||||||||||||||||||
出版国家或地区 | UNITED STATES | |||||||||||||||||||||||||||||||
出版语言 | English | |||||||||||||||||||||||||||||||
出版周期 | Quarterly | |||||||||||||||||||||||||||||||
出版年份 | 0 | |||||||||||||||||||||||||||||||
年文章数 | 420点击查看年文章数趋势图 | |||||||||||||||||||||||||||||||
Gold OA文章占比 | 11.31% | |||||||||||||||||||||||||||||||
研究类文章占比: 文章 ÷(文章 + 综述) | 100.00% | |||||||||||||||||||||||||||||||
WOS期刊SCI分区 ( 2023-2024年最新版) | WOS分区等级:1区
| |||||||||||||||||||||||||||||||
中国科学院《国际期刊预警 名单(试行)》名单 | 2024年02月发布的2024版:不在预警名单中 2023年01月发布的2023版:不在预警名单中 2021年12月发布的2021版:不在预警名单中 2020年12月发布的2020版:不在预警名单中 | |||||||||||||||||||||||||||||||
中国科学院SCI期刊分区 ( 2023年12月最新升级版) | 点击查看中国科学院SCI期刊分区趋势图
| |||||||||||||||||||||||||||||||
中国科学院SCI期刊分区 ( 2022年12月升级版) |
| |||||||||||||||||||||||||||||||
中国科学院SCI期刊分区 ( 2021年12月旧的升级版) |
| |||||||||||||||||||||||||||||||
SCI期刊收录coverage | Science Citation Index Expanded (SCIE) (2020年1月,原SCI撤销合并入SCIE,统称SCIE) Scopus (CiteScore) | |||||||||||||||||||||||||||||||
PubMed Central (PMC)链接 | http://www.ncbi.nlm.nih.gov/nlmcatalog?term=1556-6013%5BISSN%5D | |||||||||||||||||||||||||||||||
平均审稿速度 | 网友分享经验: 平均6.8个月 | |||||||||||||||||||||||||||||||
平均录用比例 | 网友分享经验: 较易 | |||||||||||||||||||||||||||||||
LetPub助力发表 | 经LetPub编辑的稿件平均录用比例是未经润色的稿件的1.5倍,平均审稿时间缩短40%。众多作者在使用LetPub的专业SCI论文编辑服务(包括SCI论文英语润色,同行资深专家修改润色,SCI论文专业翻译,SCI论文格式排版,专业学术制图等)后论文在IEEE Transactions on Information Forensics and Security顺利发表。
快看看作者怎么说吧:服务好评 论文致谢 | |||||||||||||||||||||||||||||||
期刊常用信息链接 |
|
中国学者近期发表的论文 | |
1. | Information-Containing Adversarial Perturbation for Combating Facial Manipulation Systems Author: Zhu, Yao; Chen, Yuefeng; Li, Xiaodan; Zhang, Rong; Tian, Xiang; Zheng, Bolun; Chen, Yaowu Journal: IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY. 2023; Vol. 18, Issue , pp. 2046-2059. DOI: 10.1109/TIFS.2023.3262156 DOI |
2. | Label-Only Model Inversion Attacks: Attack With the Least Information Author: Zhu, Tianqing; Ye, Dayong; Zhou, Shuai; Liu, Bo; Zhou, Wanlei Journal: IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY. 2023; Vol. 18, Issue , pp. 991-1005. DOI: 10.1109/TIFS.2022.3233190 DOI |
3. | Multi-Spectral Palmprints Joint Attack and Defense With Adversarial Examples Learning Author: Zhu, Qi; Zhou, Yuze; Fei, Lunke; Zhang, Daoqiang; Zhang, David Journal: IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY. 2023; Vol. 18, Issue , pp. 1789-1799. DOI: 10.1109/TIFS.2023.3254432 DOI |
4. | Information-Theoretically Private Matrix Multiplication From MDS-Coded Storage Author: Zhu, Jinbao; Li, Songze; Li, Jie Journal: IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY. 2023; Vol. 18, Issue , pp. 1680-1695. DOI: 10.1109/TIFS.2023.3249565 DOI |
5. | AADEC: Anonymous and Auditable Distributed Access Control for Edge Computing Services Author: Zhou, Xiaotong; He, Debiao; Ning, Jianting; Luo, Min; Huang, Xinyi Journal: IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY. 2023; Vol. 18, Issue , pp. 290-303. DOI: 10.1109/TIFS.2022.3220030 DOI |
6. | Eavesdropping Strategies for Remote State Estimation Under Communication Constraints Author: Zhou, Jiayu; Luo, Yue; Liu, Yun; Yang, Wen Journal: IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY. 2023; Vol. 18, Issue , pp. 2250-2261. DOI: 10.1109/TIFS.2023.3265343 DOI |
7. | Privacy-Preserving and Verifiable Federated Learning Framework for Edge Computing Author: Zhou, Hao; Yang, Geng; Huang, Yuxian; Dai, Hua; Xiang, Yang Journal: IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY. 2023; Vol. 18, Issue , pp. 565-580. DOI: 10.1109/TIFS.2022.3227435 DOI |
8. | Where Are the Dots: Hardening Face Authentication on Smartphones With Unforgeable Eye Movement Patterns Author: Zheng, Zheng; Wang, Qian; Wang, Cong; Zhou, Man; Zhao, Yi; Li, Qi; Shen, Chao Journal: IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY. 2023; Vol. 18, Issue , pp. 1295-1308. DOI: 10.1109/TIFS.2022.3232957 DOI |
9. | PGSim: Efficient and Privacy-Preserving Graph Similarity Query Over Encrypted Data in Cloud Author: Zheng, Yandong; Zhu, Hui; Lu, Rongxing; Guan, Yunguo; Zhang, Songnian; Wang, Fengwei; Shao, Jun; Li, Hui Journal: IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY. 2023; Vol. 18, Issue , pp. 2030-2045. DOI: 10.1109/TIFS.2023.3262147 DOI |
10. | SetRkNN: Efficient and Privacy-Preserving Set Reverse kNN Query in Cloud Author: Zheng, Yandong; Lu, Rongxing; Zhu, Hui; Zhang, Songnian; Guan, Yunguo; Shao, Jun; Wang, Fengwei; Li, Hui Journal: IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY. 2023; Vol. 18, Issue , pp. 888-903. DOI: 10.1109/TIFS.2022.3231785 DOI |
|
|
|
联系我们 | 站点地图 | 友情链接 | 授权代理商 | 加入我们
© 2010-2024 中国: LetPub上海 网站备案号:沪ICP备10217908号-1 沪公网安备号:31010402006960 (网站)31010405000484 (蝌蝌APP)
增值电信业务经营许可证:沪B2-20211595 网络文化经营许可证:沪网文[2023]2004-152号
礼翰商务信息咨询(上海)有限公司 办公地址:上海市徐汇区漕溪北路88号圣爱大厦1803室