198(top 1%)
papers
12.8K(top 1%)
citations
49(top 1%)
h-index
112(top 1%)
g-index
403
all documents
14.9K
doc citations
1.4K
citing journals

Top Articles

#TitleJournalYearCitations
1Rich Models for Steganalysis of Digital ImagesIEEE Transactions on Information Forensics and Security20121,396
2Analogue signal and image processing with large memristor crossbarsNature Electronics2018879
3Ensemble Classifiers for Steganalysis of Digital MediaIEEE Transactions on Information Forensics and Security2012863
4Steganalysis by Subtractive Pixel Adjacency MatrixIEEE Transactions on Information Forensics and Security2010806
5Universal distortion function for steganography in an arbitrary domainEurasip Journal on Information Security2014729
6Minimizing Additive Distortion in Steganography Using Syndrome-Trellis CodesIEEE Transactions on Information Forensics and Security2011653
7Deep Residual Network for Steganalysis of Digital ImagesIEEE Transactions on Information Forensics and Security2019496
8Content-Adaptive Steganography by Minimizing Statistical DetectabilityIEEE Transactions on Information Forensics and Security2016384
9Low-Complexity Features for JPEG Steganalysis Using Undecimated DCTIEEE Transactions on Information Forensics and Security2015322
10Incremental Welfare Consensus Algorithm for Cooperative Distributed Generation/Demand Response in Smart GridIEEE Transactions on Smart Grid2014242
11Detection of Double-Compression in JPEG Images for Applications in SteganographyIEEE Transactions on Information Forensics and Security2008236
12Matrix Embedding for Large PayloadsIEEE Transactions on Information Forensics and Security2006227
13Characterization of a CZTS thin film solar cell grown by sputtering methodSolar Energy2014224
14Gibbs Construction in SteganographyIEEE Transactions on Information Forensics and Security2010219
15Collaborative Detection of DDoS Attacks over Multiple Network DomainsIEEE Transactions on Parallel and Distributed Systems2007207
16Random Projections of Residuals for Digital Image SteganalysisIEEE Transactions on Information Forensics and Security2013203
17In situ training of feed-forward and recurrent convolutional memristor networksNature Machine Intelligence2019201
18Microscale microbial fuel cells: Advances and challengesBiosensors and Bioelectronics2015197
19Dynamic State Estimation of a Synchronous Machine Using PMU Data: A Comparative StudyIEEE Transactions on Smart Grid2015191
20Steganalysis Features for Content-Adaptive JPEG SteganographyIEEE Transactions on Information Forensics and Security2016137
21A Fully Reconfigurable Low-Noise Biopotential Sensing Amplifier With 1.96 Noise Efficiency FactorIEEE Transactions on Biomedical Circuits and Systems2014135
22Quantitative steganalysis of digital images: estimating the secret message lengthMultimedia Systems2003134
23A paper-based microbial fuel cell: Instant battery for disposable diagnostic devicesBiosensors and Bioelectronics2013128
24Brainprint: Assessing the uniqueness, collectability, and permanence of a novel method for ERP biometricsNeurocomputing2015124
25A Broadband and Stable Method for Unique Complex Permittivity Determination of Low-Loss MaterialsIEEE Transactions on Microwave Theory and Techniques2009116
26Wet Paper Codes With Improved Embedding EfficiencyIEEE Transactions on Information Forensics and Security2006111
27A Floating-Gate-Based Field-Programmable Analog ArrayIEEE Journal of Solid-State Circuits2010109
28BlendCAC: A Smart Contract Enabled Decentralized Capability-Based Access Control Mechanism for the IoTComputers2018108
29CEREBRE: A Novel Method for Very High Accuracy Event-Related Potential Biometric IdentificationIEEE Transactions on Information Forensics and Security2016106
30A spectral/temporal method for robust fundamental frequency trackingJournal of the Acoustical Society of America2008104
31Energy efficient wireless sensor networks with transmission diversityElectronics Letters2003103
32Capacity Limits of Pseudorandom Channels in Deception ProblemsIEEE Transactions on Information Forensics and Security201594
33Information fusion in a cloud computing era: A systems-level perspectiveIEEE Aerospace and Electronic Systems Magazine201493
34Using sensor pattern noise for camera model identification200889
35Cryptanalysis of the Yeung–Mintzer fragile watermarking techniqueJournal of Electronic Imaging200278
36Coverage in fault-tolerant controlAutomatica200478
37Electric load forecasting in smart grids using Long-Short-Term-Memory based Recurrent Neural Network201778
38Comparison of Orthogonality Estimation Methods for the Two-Dimensional Separations of PeptidesAnalytical Chemistry201277
39Ultra-lightweight deep packet anomaly detection for Internet of Things devices201577
40Multiclass Detector of Current Steganographic Methods for JPEG FormatIEEE Transactions on Information Forensics and Security200876
41Integrated Modular Avionics - Past, present, and futureIEEE Aerospace and Electronic Systems Magazine201572
42Combinatorial Reactive Sputtering of In2S3 as an Alternative Contact Layer for Thin Film Solar CellsACS Applied Materials & Interfaces201667
43Constructing Good Covering Codes for Applications in Steganography200866
44From Blind to Quantitative SteganalysisIEEE Transactions on Information Forensics and Security201266
45A direct comparison of active and passive amplification electrodes in the same amplifier systemJournal of Neuroscience Methods201460
46My Privacy My Decision: Control of Photo Sharing on Online Social NetworksIEEE Transactions on Dependable and Secure Computing201760
47Real-Time Human Objects Tracking for Smart Surveillance at the Edge201860
48Fabrication of Cu2ZnSnS4 solar cell on a flexible glass substrateThin Solid Films201459
49Privacy-Preserving Machine Learning Algorithms for Big Data Systems201557
50Exploration of blockchain-enabled decentralized capability-based access control strategy for space situation awarenessOptical Engineering201955