IEEE Transactions on Dependable and Secure Computing

Papers
(The H4-Index of IEEE Transactions on Dependable and Secure Computing is 45. The table below lists those papers that are above that threshold based on CrossRef citation counts [max. 250 papers]. The publications cover those that have been published in the past four years, i.e., from 2021-06-01 to 2025-06-01.)
ArticleCitations
Defeating Data Plane Attacks With Program Obfuscation349
AnoPay: Anonymous Payment for Vehicle Parking With Updatable Credential187
Provably-Secure One-Message Unilateral Entity Authentication Schemes174
Mules and Permission Laundering in Android: Dissecting Custom Permissions in the Wild132
SwiftParade: Anti-Burst Multipath Validation126
Caught-in-Translation (CiT): Detecting Cross-Level Inconsistency Attacks in Network Functions Virtualization (NFV)126
The Perils of Wi-Fi Spoofing Attack Via Geolocation API and Its Defense114
Towards a New Thermal Monitoring Based Framework for Embedded CPS Device Security111
R2E: A Decentralized Scheme for Rewarding Tor Relays With Cryptocurrencies105
Enhancing Sybil Detection via Social-Activity Networks: A Random Walk Approach101
On the Detection of Smart, Self-Propagating Internet Worms94
Differentially Oblivious Two-Party Pattern Matching With Sublinear Round Complexity85
Window Canaries: Re-Thinking Stack Canaries for Architectures With Register Windows81
iQuery: A Trustworthy and Scalable Blockchain Analytics Platform78
Sharing Can be Threatening: Uncovering Security Flaws of RBAC Model on Smart Home Platforms76
FedPA: Generator-Based Heterogeneous Federated Prototype Adversarial Learning75
Chained HotStuff Under Performance Attack74
Optimization-Time Analysis for Cybersecurity74
pSafety: Privacy-Preserving Safety Monitoring in Online Ride Hailing Services74
Heterogeneous Domain Adaptation for Multistream Classification on Cyber Threat Data72
An Effective and Resilient Backdoor Attack Framework against Deep Neural Networks and Vision Transformers72
MTD-AD: Moving Target Defense as Adversarial Defense70
A Comparative Analysis of Software Aging in Image Classifiers on Cloud and Edge69
A Temporal Chrominance Trigger for Clean-Label Backdoor Attack Against Anti-Spoof Rebroadcast Detection65
Semantic-Preserving Linguistic Steganography by Pivot Translation and Semantic-Aware Bins Coding64
OFIDS : Online Learning-Enabled and Fingerprint-Based Intrusion Detection System in Controller Area Networks64
Split Learning without Local Weight Sharing To Enhance Client-side Data Privacy60
ABATe: Automatic Behavioral Abstraction Technique to Detect Anomalies in Smart Cyber-Physical Systems60
Ensuring State Continuity for Confidential Computing: A Blockchain-Based Approach59
Perceptual Image Hashing With Locality Preserving Projection for Copy Detection59
Steganography With Generated Images: Leveraging Volatility to Enhance Security59
Constructing Immune-Cover for Improving Holistic Security of Spatial Adaptive Steganography58
CoinLayering: An Efficient Coin Mixing Scheme for Large Scale Bitcoin Transactions57
Proactive Anti-Eavesdropping With Trap Deployment in Wireless Networks55
Design Principles for Orthogonal Moments in Video Watermarking54
SG-Audit: An Efficient and Robust Cloud Auditing Scheme for Smart Grid53
Harnessing Policy Authenticity for Hidden Ciphertext Policy Attribute-Based Encryption53
Feature Reconstruction Attacks and Countermeasures of DNN Training in Vertical Federated Learning53
DBFT: A Byzantine Fault Tolerance Protocol With Graceful Performance Degradation51
Malicious-Resistant Non-Interactive Verifiable Aggregation for Federated Learning51
Speech Sanitizer: Speech Content Desensitization and Voice Anonymization50
RDP-GAN: A Rényi-Differential Privacy Based Generative Adversarial Network47
RiskProp: Account Risk Rating on Ethereum via De-anonymous Score and Network Propagation47
Adaptive HEVC Steganography Based on Steganographic Compression Efficiency Degradation Model46
Fully Accountable Data Sharing for Pay-as-You-Go Cloud Scenes46
Secure and Scalable Cross-Domain Data Sharing in Zero-Trust Cloud-Edge-End Environment Based on Sharding Blockchain45
BIOWISH: Biometric Recognition Using Wearable Inertial Sensors Detecting Heart Activity45
Securely Outsourcing Neural Network Inference to the Cloud With Lightweight Techniques45
0.23540997505188