IEEE Transactions on Dependable and Secure Computing

Papers
(The H4-Index of IEEE Transactions on Dependable and Secure Computing is 53. The table below lists those papers that are above that threshold based on CrossRef citation counts [max. 250 papers]. The publications cover those that have been published in the past four years, i.e., from 2022-01-01 to 2026-01-01.)
ArticleCitations
Sharing Can be Threatening: Uncovering Security Flaws of RBAC Model on Smart Home Platforms473
Window Canaries: Re-Thinking Stack Canaries for Architectures With Register Windows211
Provably-Secure One-Message Unilateral Entity Authentication Schemes203
R2E: A Decentralized Scheme for Rewarding Tor Relays With Cryptocurrencies175
AnoPay: Anonymous Payment for Vehicle Parking With Updatable Credential160
SwiftParade: Anti-Burst Multipath Validation135
iQuery: A Trustworthy and Scalable Blockchain Analytics Platform134
PSA: Private Set Alignment for Secure and Collaborative Analytics on Large-Scale Data128
RiskProp: Account Risk Rating on Ethereum via De-anonymous Score and Network Propagation120
Steganography With Generated Images: Leveraging Volatility to Enhance Security117
Differentially Oblivious Two-Party Pattern Matching With Sublinear Round Complexity115
Mules and Permission Laundering in Android: Dissecting Custom Permissions in the Wild102
A Controllable, Publicly Auditable, and Redactable Blockchain with a Main-Auxiliary Architecture101
Heterogeneous Domain Adaptation for Multistream Classification on Cyber Threat Data100
MTD-AD: Moving Target Defense as Adversarial Defense97
BOMAP: A Round-Efficient Construction of Oblivious Maps91
An Effective and Resilient Backdoor Attack Framework Against Deep Neural Networks and Vision Transformers90
Novel Bribery Mining Attacks: Impacts on Mining Ecosystem and the “Bribery Miner's Dilemma” in the Nakamoto-style Blockchain System89
Ensuring State Continuity for Confidential Computing: A Blockchain-Based Approach86
Optimization-Time Analysis for Cybersecurity86
Malicious-Resistant Non-Interactive Verifiable Aggregation for Federated Learning86
Design Principles for Orthogonal Moments in Video Watermarking86
The Perils of Wi-Fi Spoofing Attack Via Geolocation API and Its Defense83
CoinLayering: An Efficient Coin Mixing Scheme for Large Scale Bitcoin Transactions80
On the Detection of Smart, Self-Propagating Internet Worms79
SpADe: Multi-Stage Spam Account Detection for Online Social Networks78
A Comparative Analysis of Software Aging in Image Classifiers on Cloud and Edge77
Online Streaming Sampling Publication Method Over Sliding Windows With Differential Privacy75
Perceptual Image Hashing With Locality Preserving Projection for Copy Detection73
Enhancing Sybil Detection via Social-Activity Networks: A Random Walk Approach72
Constructing Immune-Cover for Improving Holistic Security of Spatial Adaptive Steganography71
OFIDS : Online Learning-Enabled and Fingerprint-Based Intrusion Detection System in Controller Area Networks70
Caught-in-Translation (CiT): Detecting Cross-Level Inconsistency Attacks in Network Functions Virtualization (NFV)70
Defeating Data Plane Attacks With Program Obfuscation69
Towards a New Thermal Monitoring Based Framework for Embedded CPS Device Security68
SG-Audit: An Efficient and Robust Cloud Auditing Scheme for Smart Grid68
Adaptive HEVC Steganography Based on Steganographic Compression Efficiency Degradation Model66
Harnessing Policy Authenticity for Hidden Ciphertext Policy Attribute-Based Encryption63
Chained HotStuff Under Performance Attack62
Feature Reconstruction Attacks and Countermeasures of DNN Training in Vertical Federated Learning61
MERCURY: Practical Cross-Chain Exchange via Trusted Hardware61
FishboneChain: A Scalable and Liquidity-Guaranteed Crowdsourcing Platform Based on Multiple Child Chains59
SVOC: Secure Aggregatable and Extractable System for Outsourced Cloud Computation59
Enhancing Online Transaction Fraud Detection via Heterogeneous Source Models59
BIOWISH: Biometric Recognition Using Wearable Inertial Sensors Detecting Heart Activity58
Replay-Resistant Few-Shot Disk Authentication Using Electromagnetic Fingerprint58
FedPA: Generator-Based Heterogeneous Federated Prototype Adversarial Learning57
Proactive Anti-Eavesdropping With Trap Deployment in Wireless Networks57
A Temporal Chrominance Trigger for Clean-Label Backdoor Attack Against Anti-Spoof Rebroadcast Detection57
M&M: Secure Two-Party Machine Learning through M odulus Conversion and M ixed-Mode Protocols56
Split Learning Without Local Weight Sharing to Enhance Client-Side Data Privacy56
RMAAC: Joint Markov Games and Robust Multiagent Actor-Critic for Explainable Malware Defense in Social IoT55
DBFT: A Byzantine Fault Tolerance Protocol With Graceful Performance Degradation54
When Unknown Threat Meets Label Noise: A Self-Correcting Framework53
pSafety: Privacy-Preserving Safety Monitoring in Online Ride Hailing Services53
FedTracker: Furnishing Ownership Verification and Traceability for Federated Learning Model53
0.22142100334167