IEEE Transactions on Dependable and Secure Computing

Papers
(The median citation count of IEEE Transactions on Dependable and Secure Computing is 2. The table below lists those papers that are above that threshold based on CrossRef citation counts [max. 250 papers]. The publications cover those that have been published in the past four years, i.e., from 2021-02-01 to 2025-02-01.)
ArticleCitations
Joint Biological ID : A Secure and Efficient Lightweight Biometric Authentication Scheme268
Secure and Scalable Cross-Domain Data Sharing in Zero-Trust Cloud-Edge-End Environment Based on Sharding Blockchain203
An Efficient Fuzzy Certificateless Signature-Based Authentication Scheme Using Anonymous Biometric Identities for VANETs156
DNSGuard: In-Network Defense Against DNS Attacks138
IMS: Towards Computability and Dynamicity for Intent-Driven Micro-Segmentation132
FedTracker: Furnishing Ownership Verification and Traceability for Federated Learning Model118
Fast Generation-Based Gradient Leakage Attacks: An Approach to Generate Training Data Directly From the Gradient109
Privacy-Preserving User Recruitment With Sensing Quality Evaluation in Mobile Crowdsensing104
Blockchain-Assisted Privacy-Preserving and Synchronized Key Agreement for VDTNs97
Differential Area Analysis for Ransomware: Attacks, Countermeasures, and Limitations96
Using Parallel Techniques to Accelerate PCFG-based Password Cracking Attacks90
Linguistic Steganalysis Based on Few-shot Adversarial Training86
MagShadow: Physical Adversarial Example Attacks via Electromagnetic Injection83
Security-Aware Collaboration Plan Recommendation for Dynamic Multiple Workflow Processes82
Detection of Generative Linguistic Steganography Based on Explicit and Latent Text Word Relation Mining Using Deep Learning76
Reducing Privacy of CoinJoin Transactions: Quantitative Bitcoin Network Analysis74
Protecting Multi-Level Memories From Jamming Using Q-ary Expurgated Robust Codes69
PolyCosGraph: A Privacy-Preserving Cancelable EEG Biometric System64
Reliability and Robustness analysis of Machine Learning based Phishing URL Detectors62
Eunomia: Anonymous and Secure Vehicular Digital Forensics Based on Blockchain61
Anomaly Detection in Operating System Logs with Deep Learning-Based Sentiment Analysis61
SlimBox: Lightweight Packet Inspection over Encrypted Traffic61
Freshness Authentication for Outsourced Multi-Version Key-Value Stores58
Adaptive HEVC Steganography Based on Steganographic Compression Efficiency Degradation Model58
Analyzing Security Requirements in Timed Workflow Processes57
TAPFed: Threshold Secure Aggregation for Privacy-Preserving Federated Learning56
Improving Logic Bomb Identification in Android Apps via Context-Aware Anomaly Detection56
AVPMIR: Adaptive Verifiable Privacy-Preserving Medical Image Retrieval56
Solution Probing Attack Against Coin Mixing Based Privacy-Preserving Crowdsourcing Platforms51
A Verifiable and Privacy-Preserving Federated Learning Training Framework50
A Blockchain-Based Privacy-Preserving Scheme for Sealed-Bid Auction50
Demystifying the Evolution of Android Malware Variants47
Caught-in-Translation (CiT): Detecting Cross-Level Inconsistency Attacks in Network Functions Virtualization (NFV)47
AnotherMe: A Location Privacy Protection System Based on Online Virtual Trajectory Generation47
Vogue: Faster Computation of Private Heavy Hitters45
: A More Lightweight Model for Multi-Client Delegatable Computation45
Mules and Permission Laundering in Android: Dissecting Custom Permissions in the Wild45
SwiftParade: Anti-Burst Multipath Validation43
Understanding Node Capture Attacks in User Authentication Schemes for Wireless Sensor Networks42
μDep: Mutation-Based Dependency Generation for Precise Taint Analysis on Android Native Code40
2021 Index IEEE Transactions on Dependable and Secure Computing Vol. 1839
Extended Research on the Security of Visual Reasoning CAPTCHA39
VerifyTL: Secure and Verifiable Collaborative Transfer Learning38
Designing Robust API Monitoring Solutions37
A Privacy-Preserving State Estimation Scheme for Smart Grids37
Implicit Hammer: Cross-Privilege-Boundary Rowhammer Through Implicit Accesses37
iQuery: A Trustworthy and Scalable Blockchain Analytics Platform37
AnoPay: Anonymous Payment for Vehicle Parking With Updatable Credential36
Hardware-Assisted Live Kernel Function Updating on Intel Platforms36
FedPA: Generator-Based Heterogeneous Federated Prototype Adversarial Learning36
Understanding Security Risks of Embedded Devices Through Fine-Grained Firmware Fingerprinting36
Blockchain-Based Compact Verifiable Data Streaming With Self-Auditing36
On the Privacy of Elementary Matrices Masking-Based Verifiable (Outsourced) Computation35
SG-Audit: An Efficient and Robust Cloud Auditing Scheme for Smart Grid35
Forward Private Verifiable Dynamic Searchable Symmetric Encryption With Efficient Conjunctive Query34
Taking Care of the Discretization Problem: A Comprehensive Study of the Discretization Problem and a Black-Box Adversarial Attack in Discrete Integer Domain34
vCNN: Verifiable Convolutional Neural Network Based on zk-SNARKs32
On Detecting Route Hijacking Attack in Opportunistic Mobile Networks32
SpreadMeNot: A Provably Secure and Privacy-Preserving Contact Tracing Protocol32
SSHC: A Secure and Scalable Hybrid Consensus Protocol for Sharding Blockchains With a Formal Security Framework31
A Reversible Watermarking for 2D Engineering Graphics Based on Difference Expansion With Adaptive Interval Partitioning31
Cure-GNN: A Robust Curvature-Enhanced Graph Neural Network Against Adversarial Attacks31
A Variational AutoEncoder-Based Relational Model for Cost-Effective Automatic Medical Fraud Detection29
Securing TEEs With Verifiable Execution Contracts29
CoinLayering: An Efficient Coin Mixing Scheme for Large Scale Bitcoin Transactions29
Automatic Integer Error Repair by Proper-Type Inference29
Window Canaries: Re-Thinking Stack Canaries for Architectures With Register Windows29
ABATe: Automatic Behavioral Abstraction Technique to Detect Anomalies in Smart Cyber-Physical Systems29
Mimosa: Protecting Private Keys Against Memory Disclosure Attacks Using Hardware Transactional Memory28
Speech Sanitizer: Speech Content Desensitization and Voice Anonymization28
AGAPECert: An Auditable, Generalized, Automated, Privacy-Enabling Certification Framework With Oblivious Smart Contracts28
EBCPA: Efficient Blockchain-based Conditional Privacy-preserving Authentication for VANETs28
CBA-Detector: A Self-Feedback Detector Against Cache-Based Attacks28
Efficient Verifiable Unbounded-Size Database From Authenticated Matrix Commitment28
Cross-VM Network Channel Attacks and Countermeasures Within Cloud Computing Environments28
Detecting Inaudible Voice Commands via Acoustic Attenuation by Multi-channel Microphones27
Towards a New Thermal Monitoring Based Framework for Embedded CPS Device Security27
Does OpenBSD and Firefox’s Security Improve With Time?27
A Formal Verification of ArpON – A Tool for Avoiding Man-in-the-Middle Attacks in Ethernet Networks27
QKPT: Securing Your Private Keys in Cloud With Performance, Scalability and Transparency27
Cooperative Jamming-Aided Secure Communication in Wireless Powered Sensor Networks26
Outlier: Enabling Effective Measurement of Hypervisor Code Integrity With Group Detection26
Function Interaction Risks in Robot Apps: Analysis and Policy-Based Solution26
RiskProp: Account Risk Rating on Ethereum via De-anonymous Score and Network Propagation25
BiMorphing: A Bi-Directional Bursting Defense against Website Fingerprinting Attacks25
MuEOC: Efficient SGX-based Multi-key Homomorphic Outsourcing Computation for E-health System25
PRISM: A Hierarchical Intrusion Detection Architecture for Large-Scale Cyber Networks25
Tool of Spies: Leaking your IP by Altering the 3D Printer Compiler25
SeUpdate: Secure Encrypted Data Update for Multi-User Environments25
Enabling Passive User Authentication via Heart Sounds on In-Ear Microphones25
Modeling and Defense of Social Virtual Reality Attacks Inducing Cybersickness25
Sharing can be Threatening: Uncovering Security Flaws of RBAC Model on Smart Home Platforms24
Semantic-Preserving Linguistic Steganography by Pivot Translation and Semantic-Aware Bins Coding24
Unveiling Physical Semantics of PLC Variables Using Control Invariants24
Snoopy: A Webpage Fingerprinting Framework With Finite Query Model for Mass-Surveillance24
Optimization-Time Analysis for Cybersecurity24
Recovery Algorithms for Paxos-Based State Machine Replication24
Using Metrics Suites to Improve the Measurement of Privacy in Graphs23
Self-Stabilizing Secure Computation23
HCA: Hashchain-Based Consensus Acceleration Via Re-Voting23
Differentially Oblivious Two-Party Pattern Matching With Sublinear Round Complexity23
Quantization Backdoors to Deep Learning Commercial Frameworks23
On the Security of the K Minimum Values (KMV) Sketch23
Pre-Trained Model-Based Automated Software Vulnerability Repair: How Far are We?23
Privacy-Preserving Search for a Similar Genomic Makeup in the Cloud22
Defeating Misclassification Attacks Against Transfer Learning22
Monero With Multi-Grained Redaction22
CacheIEE: Cache-Assisted Isolated Execution Environment on ARM Multi-Core Platforms22
A Secure EMR Sharing System With Tamper Resistance and Expressive Access Control22
JNI Global References Are Still Vulnerable: Attacks and Defenses22
Generative Pre-Trained Transformer-Based Reinforcement Learning for Testing Web Application Firewalls22
AXI Hardware Accelerator for McEliece on FPGA Embedded Systems21
Collusion Defender: Preserving Subscribers’ Privacy in Publish and Subscribe Systems21
Practical Multi-Source Multi-Client Searchable Encryption With Forward Privacy: Refined Security Notion and New Constructions21
Defeating Data Plane Attacks With Program Obfuscation21
A Systemic Approach for Natural Language Scenario Elicitation of Security Requirements21
A Temporal Chrominance Trigger for Clean-Label Backdoor Attack Against Anti-Spoof Rebroadcast Detection21
A Compositional Semantics of Boolean-Logic Driven Markov Processes20
Adaptive Secure Nearest Neighbor Query Processing Over Encrypted Data20
Exploring Handwritten Signature Image Features for Hardware Security20
EnBinDiff: Identifying Data-Only Patches for Binaries20
Gringotts: An Encrypted Version Control System With Less Trust on Servers20
Fault Injection Analytics: A Novel Approach to Discover Failure Modes in Cloud-Computing Systems19
pSafety: Privacy-Preserving Safety Monitoring in Online Ride Hailing Services19
Characterizing and Exploiting Soft Error Vulnerability Phase Behavior in GPU Applications19
A Comparative Analysis of Software Aging in Image Classifiers on Cloud and Edge19
A Novel Authentication Scheme Supporting Multiple User Access for 5G and Beyond19
Optimal Filter Assignment Policy Against Distributed Denial-of-Service Attack19
SwissLog: Robust Anomaly Detection and Localization for Interleaved Unstructured Logs19
Deep Hashing Based Cancelable Multi-Biometric Template Protection19
How Much I Can Rely on You: Measuring Trustworthiness of a Twitter User19
RDP-GAN: A Rényi-Differential Privacy Based Generative Adversarial Network19
Incremental Learning, Incremental Backdoor Threats19
CAeSaR: An Online Payment Anti-Fraud Integration System With Decision Explainability19
PSpec-SQL: Enabling Fine-Grained Control for Distributed Data Analytics18
Covert Model Poisoning Against Federated Learning: Algorithm Design and Optimization18
ProSAS: Proactive Security Auditing System for Clouds18
Covert Channel-Based Transmitter Authentication in Controller Area Networks18
Fully Accountable Data Sharing for Pay-as-You-Go Cloud Scenes18
MVOC: A Lighter Multi-Client Verifiable Outsourced Computation for Malicious Lightweight Clients18
xr-droid: A Benchmark Dataset for AR/VR and Security Applications18
Forward Secure Similarity Search Over Encrypted Data for Hamming Distance17
DBFT: A Byzantine Fault Tolerance Protocol With Graceful Performance Degradation17
Quantum-Safe Round-Optimal Password Authentication for Mobile Devices17
Protecting Intellectual Property With Reliable Availability of Learning Models in AI-Based Cybersecurity Services17
Highly Robust and Diverse Coverless Image Steganography Against Passive and Active Steganalysis17
RevFRF: Enabling Cross-Domain Random Forest Training With Revocable Federated Learning17
Identity-Based Provable Data Possession From RSA Assumption for Secure Cloud Storage17
MFGSCOPE: A Lightweight Framework for Efficient Graph-based Analysis on Blockchain17
FineBID: Fine-grained Protocol Reverse Engineering for Bit-level Field IDentification17
Feature Reconstruction Attacks and Countermeasures of DNN Training in Vertical Federated Learning17
Towards Practical and Privacy-Preserving Multi-Dimensional Range Query Over Cloud17
On the Privacy of Multi-Versioned Approximate Membership Check Filters16
${{\sf PEBA}}$: Enhancing User Privacy and Coverage of Safe Browsing Services16
Secure Redactable Blockchain With Dynamic Support16
Achieving Efficient and Privacy-Preserving Location-Based Task Recommendation in Spatial Crowdsourcing16
Misconfiguration-Free Compositional SDN for Cloud Networks16
On the Detection of Smart, Self-Propagating Internet Worms16
Steganography With Generated Images: Leveraging Volatility to Enhance Security16
SGXTuner: Performance Enhancement of Intel SGX Applications Via Stochastic Optimization16
SaTC: Shared-Keyword Aware Taint Checking for Detecting Bugs in Embedded Systems16
Proactive Drive Failure Prediction for Cloud Storage System Through Semi-Supervised Learning16
Malware Speaks! Deep Learning Based Assembly Code Processing for Detecting Evasive Cryptojacking16
Efficient and Secure Outsourcing of Differentially Private Data Publishing With Multiple Evaluators16
False Data Detector for Electrical Vehicles Temporal-Spatial Charging Coordination Secure Against Evasion and Privacy Adversarial Attacks16
Provably-Secure One-Message Unilateral Entity Authentication Schemes16
Security of Multi-Adjustable Join Schemes: Separations and Implications16
An Automated Monitoring and Repairing System for DNN Training15
Privacy-Preserving and Outsourced Multi-Party K-Means Clustering Based on Multi-Key Fully Homomorphic Encryption15
Sixteen Years of Phishing User Studies: What Have We Learned?15
Smart Contract Assisted Privacy-Preserving Data Aggregation and Management Scheme for Smart Grid15
Phasor Measurement Unit Change-Point Detection of Frequency Hurst Exponent Anomaly With Time-to-Event15
XAI-Based Microarchitectural Side-Channel Analysis for Website Fingerprinting Attacks and Defenses15
Forward/Backward and Content Private DSSE for Spatial Keyword Queries15
Perceptual Image Hashing With Locality Preserving Projection for Copy Detection15
Privacy-Preserving Transformation Used in Verifiable (Outsourced) Computation, Revisited15
Achieving Efficient and Privacy-Preserving Neural Network Training and Prediction in Cloud Environments15
BPPS:Blockchain-Enabled Privacy-Preserving Scheme for Demand-Response Management in Smart Grid Environments15
Differentially Private Distributed Frequency Estimation15
UCoin: An Efficient Privacy Preserving Scheme for Cryptocurrencies14
Blockchain-Based Lightweight Message Authentication for Edge-Assisted Cross-Domain Industrial Internet of Things14
Securely Outsourcing Neural Network Inference to the Cloud With Lightweight Techniques14
The Perils of Wi-Fi Spoofing Attack Via Geolocation API and Its Defense14
Certificateless Signature Scheme with Batch Verification for Secure and Privacy-Preserving V2V Communications in VANETs14
Defending Against Membership Inference Attacks With High Utility by GAN14
Eurus: Towards an Efficient Searchable Symmetric Encryption With Size Pattern Protection14
TreasureCache: Hiding Cache Evictions Against Side-Channel Attacks14
PrivKVM*: Revisiting Key-Value Statistics Estimation With Local Differential Privacy14
Marionette: Manipulate Your Touchscreen via a Charging Cable14
A Secure and Authenticated Mobile Payment Protocol Against Off-Site Attack Strategy14
A Secure Cloud Data Sharing Protocol for Enterprise Supporting Hierarchical Keyword Search14
PulseAnomaly: Unsupervised Anomaly Detection on Avionic Platforms with Seasonality and Trend Modeling in Transformer Networks14
cuML-DSA: Optimized Signing Procedure and Server-Oriented GPU Design for ML-DSA14
ENCIDER: Detecting Timing and Cache Side Channels in SGX Enclaves and Cryptographic APIs14
Enhancing Sybil Detection via Social-Activity Networks: A Random Walk Approach14
Efficient Identity-Based Data Integrity Auditing With Key-Exposure Resistance for Cloud Storage14
Heterogeneous Domain Adaptation for Multistream Classification on Cyber Threat Data14
FABRIC: Fast and Secure Unbounded Cross-System Encrypted Data Sharing in Cloud Computing14
Deepfake Detection and Localization Using Multi-View Inconsistency Measurement13
xFuzz: Machine Learning Guided Cross-Contract Fuzzing13
OFIDS : Online Learning-Enabled and Fingerprint-Based Intrusion Detection System in Controller Area Networks13
Secure Password-Protected Encryption Key for Deduplicated Cloud Storage Systems13
Source Inference Attacks: Beyond Membership Inference Attacks in Federated Learning13
Improving Cryptocurrency Crime Detection: CoinJoin Community Detection Approach13
A Traceable and Revocable Ciphertext-Policy Attribute-based Encryption Scheme Based on Privacy Protection13
An Efficient NIZK Scheme for Privacy-Preserving Transactions Over Account-Model Blockchain13
Harnessing Policy Authenticity for Hidden Ciphertext Policy Attribute-Based Encryption13
High Capacity Reversible Data Hiding in Encrypted 3D Mesh Models Based on Dynamic Prediction and Virtual Connection13
Dating with Scambots: Understanding the Ecosystem of Fraudulent Dating Applications13
Fine-Grained and Controllably Editable Data Sharing With Accountability in Cloud Storage13
Proactive Anti-Eavesdropping With Trap Deployment in Wireless Networks13
DiLSe: Lattice-Based Secure and Dependable Data Dissemination Scheme for Social Internet of Vehicles13
FLARE: Defending Federated Learning Against Model Poisoning Attacks Via Latent Space Representations13
SpADe: Multi-Stage Spam Account Detection for Online Social Networks13
Inferring and Investigating IoT-Generated Scanning Campaigns Targeting a Large Network Telescope13
Discovery and Identification of Memory Corruption Vulnerabilities on Bare-Metal Embedded Devices13
Adversarial Robustness of Deep Neural Networks: A Survey from a Formal Verification Perspective13
Comments on “VERSA: Verifiable Secure Aggregation for Cross-Device Federated Learning”13
Hierarchical Temporal Memory-Based One-Pass Learning for Real-Time Anomaly Detection and Simultaneous Data Prediction in Smart Grids13
Update If You Dare: Demystifying Bare-Metal Device Firmware Update Security of Appified IoT Systems12
VulDeeLocator: A Deep Learning-Based Fine-Grained Vulnerability Detector12
One-to-N & N-to-One: Two Advanced Backdoor Attacks Against Deep Learning Models12
PrivData Network: A Privacy-Preserving On-Chain Data Factory and Trading Market12
PrivacyAsst: Safeguarding User Privacy in Tool-Using Large Language Model Agents12
PriDM: Effective and Universal Private Data Recovery via Diffusion Models12
Trusted Hardware-Assisted Leaderless Byzantine Fault Tolerance Consensus12
Ensuring State Continuity for Confidential Computing: A Blockchain-Based Approach12
BIOWISH: Biometric Recognition Using Wearable Inertial Sensors Detecting Heart Activity12
A Knowledge Transfer-based Semi-Supervised Federated Learning for IoT Malware Detection12
Representing Fine-Grained Co-Occurrences for Behavior-Based Fraud Detection in Online Payment Services12
Constructing Immune-Cover for Improving Holistic Security of Spatial Adaptive Steganography12
TMT-FL: Enabling Trustworthy Model Training of Federated Learning with Malicious Participants12
Malicious-Resistant Non-Interactive Verifiable Aggregation for Federated Learning12
A Privacy-Preserving Incentive Mechanism for Mobile Crowdsensing Based on Blockchain12
Efficient and Secure Federated Learning Against Backdoor Attacks12
ACA: Anonymous, Confidential and Auditable Transaction Systems for Blockchain12
Secure Data Integrity Check Based on Verified Public Key Encryption With Equality Test for Multi-Cloud Storage12
Reverse Backdoor Distillation: Towards Online Backdoor Attack Detection for Deep Neural Network Models12
Guaranteeing Data Privacy in Federated Unlearning with Dynamic User Participation12
SPT: Security Policy Translator for Network Security Functions in Cloud-Based Security Services12
FeSA: Automatic Federated Swarm Attestation on Dynamic Large-Scale IoT Devices11
Aggregation Service for Federated Learning: An Efficient, Secure, and More Resilient Realization11
Matrix-Based Secret Sharing for Reversible Data Hiding in Encrypted Images11
Lossless Data Hiding Based on Homomorphic Cryptosystem11
Label-Free Poisoning Attack Against Deep Unsupervised Domain Adaptation11
Relaxed Effective Callback Freedom: A Parametric Correctness Condition for Sequential Modules With Callbacks11
TextCheater: A Query-Efficient Textual Adversarial Attack in the Hard-Label Setting11
Orchestration or Automation: Authentication Flaw Detection in Android Apps11
A Full Lifecycle Authentication Scheme for Large-scale Smart IoT Applications11
A Security and Privacy Preserved Intelligent Vehicle Navigation System11
0.084973096847534