IEEE Transactions on Dependable and Secure Computing

Papers
(The H4-Index of IEEE Transactions on Dependable and Secure Computing is 40. The table below lists those papers that are above that threshold based on CrossRef citation counts [max. 250 papers]. The publications cover those that have been published in the past four years, i.e., from 2021-02-01 to 2025-02-01.)
ArticleCitations
Joint Biological ID : A Secure and Efficient Lightweight Biometric Authentication Scheme268
Secure and Scalable Cross-Domain Data Sharing in Zero-Trust Cloud-Edge-End Environment Based on Sharding Blockchain203
An Efficient Fuzzy Certificateless Signature-Based Authentication Scheme Using Anonymous Biometric Identities for VANETs156
DNSGuard: In-Network Defense Against DNS Attacks138
IMS: Towards Computability and Dynamicity for Intent-Driven Micro-Segmentation132
FedTracker: Furnishing Ownership Verification and Traceability for Federated Learning Model118
Fast Generation-Based Gradient Leakage Attacks: An Approach to Generate Training Data Directly From the Gradient109
Privacy-Preserving User Recruitment With Sensing Quality Evaluation in Mobile Crowdsensing104
Blockchain-Assisted Privacy-Preserving and Synchronized Key Agreement for VDTNs97
Differential Area Analysis for Ransomware: Attacks, Countermeasures, and Limitations96
Using Parallel Techniques to Accelerate PCFG-based Password Cracking Attacks90
Linguistic Steganalysis Based on Few-shot Adversarial Training86
MagShadow: Physical Adversarial Example Attacks via Electromagnetic Injection83
Security-Aware Collaboration Plan Recommendation for Dynamic Multiple Workflow Processes82
Detection of Generative Linguistic Steganography Based on Explicit and Latent Text Word Relation Mining Using Deep Learning76
Reducing Privacy of CoinJoin Transactions: Quantitative Bitcoin Network Analysis74
Protecting Multi-Level Memories From Jamming Using Q-ary Expurgated Robust Codes69
PolyCosGraph: A Privacy-Preserving Cancelable EEG Biometric System64
Reliability and Robustness analysis of Machine Learning based Phishing URL Detectors62
SlimBox: Lightweight Packet Inspection over Encrypted Traffic61
Eunomia: Anonymous and Secure Vehicular Digital Forensics Based on Blockchain61
Anomaly Detection in Operating System Logs with Deep Learning-Based Sentiment Analysis61
Adaptive HEVC Steganography Based on Steganographic Compression Efficiency Degradation Model58
Freshness Authentication for Outsourced Multi-Version Key-Value Stores58
Analyzing Security Requirements in Timed Workflow Processes57
AVPMIR: Adaptive Verifiable Privacy-Preserving Medical Image Retrieval56
TAPFed: Threshold Secure Aggregation for Privacy-Preserving Federated Learning56
Improving Logic Bomb Identification in Android Apps via Context-Aware Anomaly Detection56
Solution Probing Attack Against Coin Mixing Based Privacy-Preserving Crowdsourcing Platforms51
A Verifiable and Privacy-Preserving Federated Learning Training Framework50
A Blockchain-Based Privacy-Preserving Scheme for Sealed-Bid Auction50
Demystifying the Evolution of Android Malware Variants47
Caught-in-Translation (CiT): Detecting Cross-Level Inconsistency Attacks in Network Functions Virtualization (NFV)47
AnotherMe: A Location Privacy Protection System Based on Online Virtual Trajectory Generation47
Vogue: Faster Computation of Private Heavy Hitters45
: A More Lightweight Model for Multi-Client Delegatable Computation45
Mules and Permission Laundering in Android: Dissecting Custom Permissions in the Wild45
SwiftParade: Anti-Burst Multipath Validation43
Understanding Node Capture Attacks in User Authentication Schemes for Wireless Sensor Networks42
μDep: Mutation-Based Dependency Generation for Precise Taint Analysis on Android Native Code40
0.02434515953064