IEEE Transactions on Dependable and Secure Computing

Papers
(The median citation count of IEEE Transactions on Dependable and Secure Computing is 2. The table below lists those papers that are above that threshold based on CrossRef citation counts [max. 250 papers]. The publications cover those that have been published in the past four years, i.e., from 2020-04-01 to 2024-04-01.)
ArticleCitations
PA-CRT: Chinese Remainder Theorem Based Conditional Privacy-Preserving Authentication Scheme in Vehicular Ad-Hoc Networks181
Cloud Centric Authentication for Wearable Healthcare Monitoring System173
SySeVR: A Framework for Using Deep Learning to Detect Software Vulnerabilities172
Adaptive Payload Distribution in Multiple Images Steganography Based on Image Texture Features126
Searchable Symmetric Encryption with Forward Search Privacy125
LVBS: Lightweight Vehicular Blockchain for Secure Data Sharing in Disaster Rescue124
Anonymous Lightweight Chaotic Map-Based Authenticated Key Agreement Protocol for Industrial Internet of Things123
Revocable Identity-Based Broadcast Proxy Re-Encryption for Data Sharing in Clouds121
A Traceable and Revocable Ciphertext-Policy Attribute-based Encryption Scheme Based on Privacy Protection106
Privacy-Preserving Attribute-Based Keyword Search in Shared Multi-owner Setting104
Detecting Adversarial Image Examples in Deep Neural Networks with Adaptive Noise Reduction102
Providing Task Allocation and Secure Deduplication for Mobile Crowdsensing via Fog Computing100
Efficient and Secure Decision Tree Classification for Cloud-Assisted Online Diagnosis Services98
ASAP: An Anonymous Smart-Parking and Payment Scheme in Vehicular Networks84
Forward Private Searchable Symmetric Encryption with Optimized I/O Efficiency82
Understanding Node Capture Attacks in User Authentication Schemes for Wireless Sensor Networks80
Distributed Attack Detection in a Water Treatment Plant: Method and Case Study77
Robust and Universal Seamless Handover Authentication in 5G HetNets72
Efficient Cyber Attack Detection in Industrial Control Systems Using Lightweight Neural Networks and PCA70
A Game-Theoretical Approach for Mitigating Edge DDoS Attack70
Traceable Monero: Anonymous Cryptocurrency with Enhanced Accountability68
Towards Achieving Keyword Search over Dynamic Encrypted Cloud Data with Symmetric-Key Based Verification68
Revocable Attribute-Based Encryption With Data Integrity in Clouds65
Enabling Reliable Keyword Search in Encrypted Decentralized Storage with Fairness63
Anonymity Services Tor, I2P, JonDonym: Classifying in the Dark (Web)62
Privacy-Preserving Tensor Decomposition Over Encrypted Data in a Federated Cloud Environment61
Deep Learning and Visualization for Identifying Malware Families60
VulDeeLocator: A Deep Learning-Based Fine-Grained Vulnerability Detector60
Multi-authority Attribute-Based Keyword Search over Encrypted Cloud Data59
Quantum2FA: Efficient Quantum-Resistant Two-Factor Authentication Scheme for Mobile Devices57
Blockchain-Based Certificate Transparency and Revocation Transparency56
Software Vulnerability Discovery via Learning Multi-Domain Knowledge Bases54
A Verifiable and Fair Attribute-Based Proxy Re-Encryption Scheme for Data Sharing in Clouds53
A Blockchain-Based Self-Tallying Voting Protocol in Decentralized IoT52
Immersive Virtual Reality Attacks and the Human Joystick52
Multi-User Verifiable Searchable Symmetric Encryption for Cloud Storage51
Detecting Sybil Attacks Using Proofs of Work and Location in VANETs51
BlockMaze: An Efficient Privacy-Preserving Account-Model Blockchain Based on zk-SNARKs48
Lattice-Based Public Key Searchable Encryption from Experimental Perspectives48
Locally Differentially Private Heavy Hitter Identification47
Quantum-Safe Round-Optimal Password Authentication for Mobile Devices47
An Efficient NIZK Scheme for Privacy-Preserving Transactions Over Account-Model Blockchain46
A Risk Management Approach to Defending Against the Advanced Persistent Threat46
A Privacy-Preserving and Untraceable Group Data Sharing Scheme in Cloud Computing46
Attribute-Based Hybrid Boolean Keyword Search over Outsourced Encrypted Data45
Efficient and Privacy-Preserving Similarity Range Query Over Encrypted Time Series Data44
PUF-RAKE: A PUF-Based Robust and Lightweight Authentication and Key Establishment Protocol44
Efficient and Secure Outsourcing of Differentially Private Data Publishing With Multiple Evaluators44
Attacking Deep Reinforcement Learning With Decoupled Adversarial Policy43
Releasing Correlated Trajectories: Towards High Utility and Optimal Differential Privacy43
Physical Layer based Message Authentication with Secure Channel Codes38
Privacy-Preserving Outsourced Calculation Toolkit in the Cloud37
Secure and Efficient Two-Party Signing Protocol for the Identity-Based Signature Scheme in the IEEE P1363 Standard for Public Key Cryptography36
Proxy-Free Privacy-Preserving Task Matching with Efficient Revocation in Crowdsourcing35
Mobile Crowdsourcing Task Allocation with Differential-and-Distortion Geo-Obfuscation34
Conditional Privacy-Preserving Authentication Protocol With Dynamic Membership Updating for VANETs34
Resource-Aware Detection and Defense System against Multi-Type Attacks in the Cloud: Repeated Bayesian Stackelberg Game33
SEAR: Secure and Efficient Aggregation for Byzantine-Robust Federated Learning32
Make Web3.0 Connected32
Aggregation Service for Federated Learning: An Efficient, Secure, and More Resilient Realization32
Generating Fake Documents Using Probabilistic Logic Graphs31
One-to-N & N-to-One: Two Advanced Backdoor Attacks Against Deep Learning Models31
Trust Assessment in Online Social Networks31
Secure Password-Protected Encryption Key for Deduplicated Cloud Storage Systems31
Blockchain-Based Secure Deduplication and Shared Auditing in Decentralized Storage30
Accountable Proxy Re-Encryption for Secure Data Sharing30
A Practical Real-Time APT Detection System With High Accuracy and Efficiency30
Achieving Efficient and Privacy-Preserving Neural Network Training and Prediction in Cloud Environments30
A Study on the Security Implications of Information Leakages in Container Clouds30
Performance Modeling of Moving Target Defenses with Reconfiguration Limits29
Achieving Efficient Secure Deduplication With User-Defined Access Control in Cloud29
Lossless Data Hiding Based on Homomorphic Cryptosystem29
Checking Only When It Is Necessary: Enabling Integrity Auditing Based on the Keyword With Sensitive Information Privacy for Encrypted Cloud Data29
CD-VulD: Cross-Domain Vulnerability Discovery Based on Deep Domain Adaptation28
Design of Secure Authenticated Key Management Protocol for Cloud Computing Environments28
Enabling Secure and Efficient Decentralized Storage Auditing With Blockchain28
LoMar: A Local Defense Against Poisoning Attack on Federated Learning28
Pagoda: A Hybrid Approach to Enable Efficient Real-Time Provenance Based Intrusion Detection in Big Data Environments27
Timely Detection and Mitigation of Stealthy DDoS Attacks via IoT Networks27
Optimizing Privacy-Preserving Outsourced Convolutional Neural Network Predictions27
EnsembleHMD: Accurate Hardware Malware Detectors with Specialized Ensemble Classifiers26
SSHC: A Secure and Scalable Hybrid Consensus Protocol for Sharding Blockchains With a Formal Security Framework26
You Can Access but You Cannot Leak: Defending Against Illegal Content Redistribution in Encrypted Cloud Media Center26
Efficient Fine-Grained Data Sharing Mechanism for Electronic Medical Record Systems with Mobile Devices26
A Fake Online Repository Generation Engine for Cyber Deception26
Enabling Privacy-Preserving Shortest Distance Queries on Encrypted Graph Data26
Detection and Forensics against Stealthy Data Falsification in Smart Metering Infrastructure26
Lightweight and Certificateless Multi-Receiver Secure Data Transmission Protocol for Wireless Body Area Networks25
Non-Interactive Multi-Client Searchable Encryption: Realization and Implementation25
A Privacy-Preserving Framework for Outsourcing Location-Based Services to the Cloud25
Making Convolutions Resilient Via Algorithm-Based Error Detection Techniques25
A Machine Learning-Based Intrusion Detection System for Securing Remote Desktop Connections to Electronic Flight Bag Servers25
Efficient Certificateless Multi-Copy Integrity Auditing Scheme Supporting Data Dynamics25
An Automatic Attribute-Based Access Control Policy Extraction From Access Logs25
Dynamic Group-Oriented Provable Data Possession in the Cloud24
Denoising in the Dark: Privacy-Preserving Deep Neural Network-Based Image Denoising24
Multi-Client Sub-Linear Boolean Keyword Searching for Encrypted Cloud Storage with Owner-Enforced Authorization23
Efficient and Privacy-Preserving Ridesharing Organization for Transferable and Non-Transferable Services23
Achieving Efficient and Privacy-Preserving Exact Set Similarity Search over Encrypted Data23
Detection and Defense of Cache Pollution Attacks Using Clustering in Named Data Networks23
BPPS:Blockchain-Enabled Privacy-Preserving Scheme for Demand-Response Management in Smart Grid Environments23
On High-Speed Flow-Based Intrusion Detection Using Snort-Compatible Signatures22
Eunomia: Anonymous and Secure Vehicular Digital Forensics Based on Blockchain22
Design and Evaluation of a Reconfigurable ECU Architecture for Secure and Dependable Automotive CPS22
DDCA: A Distortion Drift-Based Cost Assignment Method for Adaptive Video Steganography in the Transform Domain22
Anomaly Detection in Operating System Logs with Deep Learning-Based Sentiment Analysis22
Secret-to-Image Reversible Transformation for Generative Steganography22
Efficient and Secure Attribute-Based Access Control With Identical Sub-Policies Frequently Used in Cloud Storage22
DiLSe: Lattice-Based Secure and Dependable Data Dissemination Scheme for Social Internet of Vehicles22
Security Model of Authentication at the Physical Layer and Performance Analysis over Fading Channels21
Inferring and Investigating IoT-Generated Scanning Campaigns Targeting a Large Network Telescope20
Securely and Efficiently Outsourcing Decision Tree Inference20
Dual Watermarking for Security of COVID-19 Patient Record20
Generating Adversarial Examples Against Machine Learning-Based Intrusion Detector in Industrial Control Systems20
Linguistic Steganography Based on Adaptive Probability Distribution20
Automated Security Risk Identification Using AutomationML-Based Engineering Data20
MADneSs: A Multi-Layer Anomaly Detection Framework for Complex Dynamic Systems20
Checking is Believing: Event-Aware Program Anomaly Detection in Cyber-Physical Systems20
BiMorphing: A Bi-Directional Bursting Defense against Website Fingerprinting Attacks20
WF-MTD: Evolutionary Decision Method for Moving Target Defense Based on Wright-Fisher Process20
Safe is the New Smart: PUF-Based Authentication for Load Modification-Resistant Smart Meters20
An Integrated Privacy Preserving Attribute-Based Access Control Framework Supporting Secure Deduplication20
Design and Analysis of Secure and Dependable Automotive CPS: A Steer-by-Wire Case Study20
Towards Public Verifiable and Forward-Privacy Encrypted Search by Using Blockchain19
Towards Incentive for Electrical Vehicles Demand Response With Location Privacy Guaranteeing in Microgrids19
Crypt-DAC: Cryptographically Enforced Dynamic Access Control in the Cloud19
Verifying and Monitoring IoTs Network Behavior Using MUD Profiles19
Design, Analysis and Application of Embedded Resistive RAM Based Strong Arbiter PUF19
Network Attack Surface: Lifting the Concept of Attack Surface to the Network Level for Evaluating Networks’ Resilience Against Zero-Day Attacks18
A Large-Scale Empirical Study on the Vulnerability of Deployed IoT Devices18
Adaptive Steganalysis Based on Statistical Model of Quantized DCT Coefficients for JPEG Images18
Extending Attack Graphs to Represent Cyber-Attacks in Communication Protocols and Modern IT Networks18
AWARE: Adaptive Wide-Area Replication for Fast and Resilient Byzantine Consensus18
Achieving Privacy-Preserving Online Diagnosis With Outsourced SVM in Internet of Medical Things Environment18
Decision Tree Evaluation on Sensitive Datasets for Secure e-Healthcare Systems18
Forward and Backward Private DSSE for Range Queries18
Representing Fine-Grained Co-Occurrences for Behavior-Based Fraud Detection in Online Payment Services18
MANDA: On Adversarial Example Detection for Network Intrusion Detection System17
EBCPA: Efficient Blockchain-based Conditional Privacy-preserving Authentication for VANETs17
zk-AuthFeed: Protecting Data Feed to Smart Contracts With Authenticated Zero Knowledge Proof17
Backdoor Attack on Machine Learning Based Android Malware Detectors17
Detecting and Mitigating DDoS Attacks in SDN Using Spatial-Temporal Graph Convolutional Network17
Towards Practical and Privacy-Preserving Multi-Dimensional Range Query Over Cloud17
DL-FHMC: Deep Learning-Based Fine-Grained Hierarchical Learning Approach for Robust Malware Classification17
Enabling Privacy-Preserving Geographic Range Query in Fog-Enhanced IoT Services17
VerSA: Verifiable Secure Aggregation for Cross-Device Federated Learning17
Modeling and Defense of Social Virtual Reality Attacks Inducing Cybersickness17
DatingSec: Detecting Malicious Accounts in Dating Apps Using a Content-Based Attention Network17
Toward Verifiable and Privacy Preserving Machine Learning Prediction17
Multi-CDN: Towards Privacy in Content Delivery Networks17
DeepAG: Attack Graph Construction and Threats Prediction With Bi-Directional Deep Learning16
EncodeORE: Reducing Leakage and Preserving Practicality in Order-Revealing Encryption16
A Knowledge Transfer-based Semi-Supervised Federated Learning for IoT Malware Detection16
Towards an Interpretable Autoencoder: A Decision-Tree-Based Autoencoder and its Application in Anomaly Detection16
A Differentially Private Federated Learning Model against Poisoning Attacks in Edge Computing16
Adaptive Performance Anomaly Detection in Distributed Systems Using Online SVMs16
Exploiting an HMAC-SHA-1 Optimization to Speed up PBKDF216
Tracking Normalized Network Traffic Entropy to Detect DDoS Attacks in P416
Oracle-Supported Dynamic Exploit Generation for Smart Contracts15
A Lightweight Privacy Preservation Scheme with Efficient Reputation Management for Mobile Crowdsensing in Vehicular Networks15
Sensitive Label Privacy Preservation with Anatomization for Data Publishing15
Harnessing Policy Authenticity for Hidden Ciphertext Policy Attribute-Based Encryption15
Minimax Approximation of Sign Function by Composite Polynomial for Homomorphic Comparison15
IoVCom: Reliable Comprehensive Communication System for Internet of Vehicles15
Design and Evaluation of a Multi-Domain Trojan Detection Method on Deep Neural Networks15
Perceptual Image Hashing With Locality Preserving Projection for Copy Detection15
Design and Analysis of Adaptive Graph-Based Cancelable Multi-Biometrics Approach15
Decentralized Privacy-Preserving Fair Exchange Scheme for V2G Based on Blockchain15
Enabling (End-to-End) Encrypted Cloud Emails With Practical Forward Secrecy15
A Lightweight and Conditional Privacy-Preserving Authenticated Key Agreement Scheme With Multi-TA Model for Fog-Based VANETs14
Monitoring-Based Differential Privacy Mechanism Against Query Flooding-Based Model Extraction Attack14
On the Performance of Detecting Injection of Fabricated Messages into the CAN Bus14
Ants can Carry Cheese: Secure and Private RFID-Enabled Third-Party Distribution14
Applying Chaos Theory for Runtime Hardware Trojan Monitoring and Detection14
Stopping Memory Disclosures via Diversification and Replicated Execution14
An Automated Multi-Tab Website Fingerprinting Attack14
MARP: A Distributed MAC Layer Attack Resistant Pseudonym Scheme for VANET14
Eight Years of Rider Measurement in the Android Malware Ecosystem14
Towards a New Thermal Monitoring Based Framework for Embedded CPS Device Security14
Efficient Private Comparison Queries Over Encrypted Databases Using Fully Homomorphic Encryption With Finite Fields14
LP-SBA-XACML: Lightweight Semantics Based Scheme Enabling Intelligent Behavior-Aware Privacy for IoT13
Data-Driven Spectrum Trading with Secondary Users’ Differential Privacy Preservation13
Decentralized Self-Auditing Scheme With Errors Localization for Multi-Cloud Storage13
Sanitizable Access Control System for Secure Cloud Storage Against Malicious Data Publishers13
Disclose More and Risk Less: Privacy Preserving Online Social Network Data Sharing13
Fog-to-MultiCloud Cooperative Ehealth Data Management With Application-Aware Secure Deduplication13
Multi-User Dynamic Searchable Symmetric Encryption With Corrupted Participants13
Achieve Efficient and Privacy-Preserving Disease Risk Assessment Over Multi-Outsourced Vertical Datasets13
Novel Protocols to Mitigate Network Slice Topology Learning Attacks and Protect Privacy of Users’ Service Access Behavior in Softwarized 5G Networks13
A New Robust Reference Image Hashing System13
Service Outsourcing in F2C Architecture with Attribute-based Anonymous Access Control and Bounded Service Number13
ExGen: Cross-platform, Automated Exploit Generation for Smart Contract Vulnerabilities13
Building a Secure Knowledge Marketplace Over Crowdsensed Data Streams13
Performability of Network Service Chains: Stochastic Modeling and Assessment of Softwarized IP Multimedia Subsystem13
Fee-Free Pooled Mining for Countering Pool-Hopping Attack in Blockchain13
"Seeing is not Always Believing": Detecting Perception Error Attacks Against Autonomous Vehicles13
XAuth: Efficient Privacy-Preserving Cross-Domain Authentication13
Protecting Decision Boundary of Machine Learning Model With Differentially Private Perturbation12
Poirot: Causal Correlation Aided Semantic Analysis for Advanced Persistent Threat Detection12
Enabling Efficient, Secure and Privacy-Preserving Mobile Cloud Storage12
Identity-Based Provable Data Possession From RSA Assumption for Secure Cloud Storage12
UCoin: An Efficient Privacy Preserving Scheme for Cryptocurrencies12
Enabling Verifiable Privacy-Preserving Multi-Type Data Aggregation in Smart Grids12
ALI: Anonymous Lightweight Inter-Vehicle Broadcast Authentication with Encryption12
SuperSketch: A Multi-Dimensional Reversible Data Structure for Super Host Identification12
Adversarial Robustness of Deep Neural Networks: A Survey from a Formal Verification Perspective12
USMD: UnSupervised Misbehaviour Detection for Multi-Sensor Data12
Towards Lightweight Authentication and Batch Verification Scheme in IoV12
Detection and Classification of Botnet Traffic using Deep Learning with Model Explanation12
xFuzz: Machine Learning Guided Cross-Contract Fuzzing12
A Secure Cloud Data Sharing Protocol for Enterprise Supporting Hierarchical Keyword Search12
Man-in-the-Middle Attack on Contactless Payment over NFC Communications: Design, Implementation, Experiments and Detection11
Automated Firewall Configuration in Virtual Networks11
SkillVet: Automated Traceability Analysis of Amazon Alexa Skills11
Securely Outsourcing Neural Network Inference to the Cloud With Lightweight Techniques11
Defending Against Membership Inference Attacks With High Utility by GAN11
Explainable Intelligence-Driven Defense Mechanism against Advanced Persistent Threats: A Joint Edge Game and AI Approach11
Randomized Security Patrolling for Link Flooding Attack Detection11
SecRec: A Privacy-Preserving Method for the Context-Aware Recommendation System11
Efficient Analysis of Repairable Computing Systems Subject to Scheduled Checkpointing11
Session Invariant EEG Signatures using Elicitation Protocol Fusion and Convolutional Neural Network11
Leakage-Resilient Authenticated Key Exchange for Edge Artificial Intelligence11
RevFRF: Enabling Cross-Domain Random Forest Training With Revocable Federated Learning11
Eurus: Towards an Efficient Searchable Symmetric Encryption With Size Pattern Protection11
Impact of Service Function Aging on the Dependability for MEC Service Function Chain11
HIBEChain: A Hierarchical Identity-Based Blockchain System for Large-Scale IoT11
EAP-DDBA: Efficient Anonymity Proximity Device Discovery and Batch Authentication Mechanism for Massive D2D Communication Devices in 3GPP 5G HetNet11
Leveraging Network Functions Virtualization Orchestrators to Achieve Software-Defined Access Control in the Clouds11
Authenticated Medical Documents Releasing with Privacy Protection and Release Control11
Differentially Private Publication of Vertically Partitioned Data11
Sustainable Ensemble Learning Driving Intrusion Detection Model11
Speech Sanitizer: Speech Content Desensitization and Voice Anonymization11
NN-EMD: Efficiently Training Neural Networks Using Encrypted Multi-Sourced Datasets11
AS2T: Arbitrary Source-To-Target Adversarial Attack on Speaker Recognition Systems11
How About Bug-Triggering Paths? - Understanding and Characterizing Learning-Based Vulnerability Detectors11
Privacy-Preserving Proof of Storage for the Pay-As-You-Go Business Model10
An Electronic Voting Scheme Based on Revised-SVRM and Confirmation Numbers10
Generating Adversarial Examples With Distance Constrained Adversarial Imitation Networks10
Defending Against Adversarial Attack Towards Deep Neural Networks Via Collaborative Multi-Task Training10
Using Metrics Suites to Improve the Measurement of Privacy in Graphs10
POWER-SUPPLaY: Leaking Sensitive Data From Air-Gapped, Audio-Gapped Systems by Turning the Power Supplies into Speakers10
ABAC-Based Security Model for DDS10
Golden Grain: Building a Secure and Decentralized Model Marketplace for MLaaS10
Practical Encrypted Network Traffic Pattern Matching for Secure Middleboxes10
Agora: A Privacy-Aware Data Marketplace10
Multi-Client Secure and Efficient DPF-Based Keyword Search for Cloud Storage10
Extracting Randomness from the Trend of IPI for Cryptographic Operations in Implantable Medical Devices10
Privacy-Preserving Location-Based Services Query Scheme Against Quantum Attacks10
Privacy-Aware Personal Data Storage (P-PDS): Learning how to Protect User Privacy from External Applications10
Toward a Secure, Rich, and Fair Query Service for Light Clients on Public Blockchains10
0.026833057403564