IEEE Transactions on Dependable and Secure Computing

Papers
(The H4-Index of IEEE Transactions on Dependable and Secure Computing is 45. The table below lists those papers that are above that threshold based on CrossRef citation counts [max. 250 papers]. The publications cover those that have been published in the past four years, i.e., from 2020-11-01 to 2024-11-01.)
ArticleCitations
SySeVR: A Framework for Using Deep Learning to Detect Software Vulnerabilities243
PA-CRT: Chinese Remainder Theorem Based Conditional Privacy-Preserving Authentication Scheme in Vehicular Ad-Hoc Networks203
LVBS: Lightweight Vehicular Blockchain for Secure Data Sharing in Disaster Rescue145
Anonymous Lightweight Chaotic Map-Based Authenticated Key Agreement Protocol for Industrial Internet of Things139
Adaptive Payload Distribution in Multiple Images Steganography Based on Image Texture Features136
Revocable Identity-Based Broadcast Proxy Re-Encryption for Data Sharing in Clouds135
Searchable Symmetric Encryption with Forward Search Privacy132
A Traceable and Revocable Ciphertext-Policy Attribute-based Encryption Scheme Based on Privacy Protection132
Privacy-Preserving Attribute-Based Keyword Search in Shared Multi-owner Setting118
Detecting Adversarial Image Examples in Deep Neural Networks with Adaptive Noise Reduction115
Efficient and Secure Decision Tree Classification for Cloud-Assisted Online Diagnosis Services109
Understanding Node Capture Attacks in User Authentication Schemes for Wireless Sensor Networks96
Efficient Cyber Attack Detection in Industrial Control Systems Using Lightweight Neural Networks and PCA95
VulDeeLocator: A Deep Learning-Based Fine-Grained Vulnerability Detector89
Quantum2FA: Efficient Quantum-Resistant Two-Factor Authentication Scheme for Mobile Devices86
Revocable Attribute-Based Encryption With Data Integrity in Clouds85
Robust and Universal Seamless Handover Authentication in 5G HetNets83
A Game-Theoretical Approach for Mitigating Edge DDoS Attack82
Distributed Attack Detection in a Water Treatment Plant: Method and Case Study81
Towards Achieving Keyword Search over Dynamic Encrypted Cloud Data with Symmetric-Key Based Verification78
Traceable Monero: Anonymous Cryptocurrency with Enhanced Accountability76
A Verifiable and Fair Attribute-Based Proxy Re-Encryption Scheme for Data Sharing in Clouds70
Immersive Virtual Reality Attacks and the Human Joystick69
Deep Learning and Visualization for Identifying Malware Families68
Enabling Reliable Keyword Search in Encrypted Decentralized Storage with Fairness68
Multi-authority Attribute-Based Keyword Search over Encrypted Cloud Data63
Blockchain-Based Certificate Transparency and Revocation Transparency62
A Blockchain-Based Self-Tallying Voting Protocol in Decentralized IoT61
A Privacy-Preserving and Untraceable Group Data Sharing Scheme in Cloud Computing61
Software Vulnerability Discovery via Learning Multi-Domain Knowledge Bases61
BlockMaze: An Efficient Privacy-Preserving Account-Model Blockchain Based on zk-SNARKs60
PUF-RAKE: A PUF-Based Robust and Lightweight Authentication and Key Establishment Protocol58
Locally Differentially Private Heavy Hitter Identification57
Aggregation Service for Federated Learning: An Efficient, Secure, and More Resilient Realization56
Detecting Sybil Attacks Using Proofs of Work and Location in VANETs56
Efficient and Privacy-Preserving Similarity Range Query Over Encrypted Time Series Data56
Quantum-Safe Round-Optimal Password Authentication for Mobile Devices55
Lattice-Based Public Key Searchable Encryption from Experimental Perspectives55
Multi-User Verifiable Searchable Symmetric Encryption for Cloud Storage51
An Efficient NIZK Scheme for Privacy-Preserving Transactions Over Account-Model Blockchain51
Attribute-Based Hybrid Boolean Keyword Search over Outsourced Encrypted Data50
A Risk Management Approach to Defending Against the Advanced Persistent Threat49
Efficient and Secure Outsourcing of Differentially Private Data Publishing With Multiple Evaluators47
SEAR: Secure and Efficient Aggregation for Byzantine-Robust Federated Learning47
Attacking Deep Reinforcement Learning With Decoupled Adversarial Policy47
Blockchain-Based Secure Deduplication and Shared Auditing in Decentralized Storage45
Secure Password-Protected Encryption Key for Deduplicated Cloud Storage Systems45
Make Web3.0 Connected45
Achieving Efficient and Privacy-Preserving Neural Network Training and Prediction in Cloud Environments45
0.071952819824219