IEEE Transactions on Dependable and Secure Computing

Papers
(The H4-Index of IEEE Transactions on Dependable and Secure Computing is 50. The table below lists those papers that are above that threshold based on CrossRef citation counts [max. 250 papers]. The publications cover those that have been published in the past four years, i.e., from 2021-11-01 to 2025-11-01.)
ArticleCitations
Sharing Can be Threatening: Uncovering Security Flaws of RBAC Model on Smart Home Platforms439
Provably-Secure One-Message Unilateral Entity Authentication Schemes201
Window Canaries: Re-Thinking Stack Canaries for Architectures With Register Windows201
R2E: A Decentralized Scheme for Rewarding Tor Relays With Cryptocurrencies159
RMAAC: Joint Markov Games and Robust Multiagent Actor-Critic for Explainable Malware Defense in Social IoT150
Replay-resistant Few-shot Disk Authentication using Electromagnetic Fingerprint128
Online Streaming Sampling Publication Method Over Sliding Windows With Differential Privacy124
AnoPay: Anonymous Payment for Vehicle Parking With Updatable Credential123
FedPA: Generator-Based Heterogeneous Federated Prototype Adversarial Learning112
On the Detection of Smart, Self-Propagating Internet Worms107
SpADe: Multi-Stage Spam Account Detection for Online Social Networks107
Optimization-Time Analysis for Cybersecurity95
RiskProp: Account Risk Rating on Ethereum via De-anonymous Score and Network Propagation93
Enhancing Sybil Detection via Social-Activity Networks: A Random Walk Approach92
BIOWISH: Biometric Recognition Using Wearable Inertial Sensors Detecting Heart Activity92
Mules and Permission Laundering in Android: Dissecting Custom Permissions in the Wild86
A Comparative Analysis of Software Aging in Image Classifiers on Cloud and Edge86
Feature Reconstruction Attacks and Countermeasures of DNN Training in Vertical Federated Learning82
Chained HotStuff Under Performance Attack82
Steganography With Generated Images: Leveraging Volatility to Enhance Security80
Differentially Oblivious Two-Party Pattern Matching With Sublinear Round Complexity78
A Controllable, Publicly Auditable, and Redactable Blockchain with a Main-Auxiliary Architecture76
SG-Audit: An Efficient and Robust Cloud Auditing Scheme for Smart Grid76
Securely Outsourcing Neural Network Inference to the Cloud With Lightweight Techniques75
Adaptive HEVC Steganography Based on Steganographic Compression Efficiency Degradation Model74
pSafety: Privacy-Preserving Safety Monitoring in Online Ride Hailing Services74
Split Learning Without Local Weight Sharing to Enhance Client-Side Data Privacy71
Semantic-Preserving Linguistic Steganography by Pivot Translation and Semantic-Aware Bins Coding69
Secure and Scalable Cross-Domain Data Sharing in Zero-Trust Cloud-Edge-End Environment Based on Sharding Blockchain69
Heterogeneous Domain Adaptation for Multistream Classification on Cyber Threat Data69
Perceptual Image Hashing With Locality Preserving Projection for Copy Detection69
MTD-AD: Moving Target Defense as Adversarial Defense68
BOMAP: A Round-Efficient Construction of Oblivious Maps68
An Effective and Resilient Backdoor Attack Framework Against Deep Neural Networks and Vision Transformers64
Novel Bribery Mining Attacks: Impacts on Mining Ecosystem and the “Bribery Miner's Dilemma” in the Nakamoto-style Blockchain System63
Proactive Anti-Eavesdropping With Trap Deployment in Wireless Networks60
Ensuring State Continuity for Confidential Computing: A Blockchain-Based Approach60
Malicious-Resistant Non-Interactive Verifiable Aggregation for Federated Learning60
When Unknown Threat Meets Label Noise: A Self-Correcting Framework58
A Temporal Chrominance Trigger for Clean-Label Backdoor Attack Against Anti-Spoof Rebroadcast Detection57
ABATe: Automatic Behavioral Abstraction Technique to Detect Anomalies in Smart Cyber-Physical Systems57
Design Principles for Orthogonal Moments in Video Watermarking57
Constructing Immune-Cover for Improving Holistic Security of Spatial Adaptive Steganography56
OFIDS : Online Learning-Enabled and Fingerprint-Based Intrusion Detection System in Controller Area Networks54
SVOC: Secure Aggregatable and Extractable System for Outsourced Cloud Computation54
Enhancing Online Transaction Fraud Detection via Heterogeneous Source Models54
Caught-in-Translation (CiT): Detecting Cross-Level Inconsistency Attacks in Network Functions Virtualization (NFV)52
Defeating Data Plane Attacks With Program Obfuscation51
FishboneChain: A Scalable and Liquidity-Guaranteed Crowdsourcing Platform based on Multiple Child Chains51
Harnessing Policy Authenticity for Hidden Ciphertext Policy Attribute-Based Encryption50
DBFT: A Byzantine Fault Tolerance Protocol With Graceful Performance Degradation50
Pre-Trained Model-Based Automated Software Vulnerability Repair: How Far are We?50
Towards a New Thermal Monitoring Based Framework for Embedded CPS Device Security50
1.1821517944336