IEEE Transactions on Dependable and Secure Computing

Papers
(The median citation count of IEEE Transactions on Dependable and Secure Computing is 3. The table below lists those papers that are above that threshold based on CrossRef citation counts [max. 250 papers]. The publications cover those that have been published in the past four years, i.e., from 2020-11-01 to 2024-11-01.)
ArticleCitations
SySeVR: A Framework for Using Deep Learning to Detect Software Vulnerabilities243
PA-CRT: Chinese Remainder Theorem Based Conditional Privacy-Preserving Authentication Scheme in Vehicular Ad-Hoc Networks203
LVBS: Lightweight Vehicular Blockchain for Secure Data Sharing in Disaster Rescue145
Anonymous Lightweight Chaotic Map-Based Authenticated Key Agreement Protocol for Industrial Internet of Things139
Adaptive Payload Distribution in Multiple Images Steganography Based on Image Texture Features136
Revocable Identity-Based Broadcast Proxy Re-Encryption for Data Sharing in Clouds135
A Traceable and Revocable Ciphertext-Policy Attribute-based Encryption Scheme Based on Privacy Protection132
Searchable Symmetric Encryption with Forward Search Privacy132
Privacy-Preserving Attribute-Based Keyword Search in Shared Multi-owner Setting118
Detecting Adversarial Image Examples in Deep Neural Networks with Adaptive Noise Reduction115
Efficient and Secure Decision Tree Classification for Cloud-Assisted Online Diagnosis Services109
Understanding Node Capture Attacks in User Authentication Schemes for Wireless Sensor Networks96
Efficient Cyber Attack Detection in Industrial Control Systems Using Lightweight Neural Networks and PCA95
VulDeeLocator: A Deep Learning-Based Fine-Grained Vulnerability Detector89
Quantum2FA: Efficient Quantum-Resistant Two-Factor Authentication Scheme for Mobile Devices86
Revocable Attribute-Based Encryption With Data Integrity in Clouds85
Robust and Universal Seamless Handover Authentication in 5G HetNets83
A Game-Theoretical Approach for Mitigating Edge DDoS Attack82
Distributed Attack Detection in a Water Treatment Plant: Method and Case Study81
Towards Achieving Keyword Search over Dynamic Encrypted Cloud Data with Symmetric-Key Based Verification78
Traceable Monero: Anonymous Cryptocurrency with Enhanced Accountability76
A Verifiable and Fair Attribute-Based Proxy Re-Encryption Scheme for Data Sharing in Clouds70
Immersive Virtual Reality Attacks and the Human Joystick69
Enabling Reliable Keyword Search in Encrypted Decentralized Storage with Fairness68
Deep Learning and Visualization for Identifying Malware Families68
Multi-authority Attribute-Based Keyword Search over Encrypted Cloud Data63
Blockchain-Based Certificate Transparency and Revocation Transparency62
A Privacy-Preserving and Untraceable Group Data Sharing Scheme in Cloud Computing61
Software Vulnerability Discovery via Learning Multi-Domain Knowledge Bases61
A Blockchain-Based Self-Tallying Voting Protocol in Decentralized IoT61
BlockMaze: An Efficient Privacy-Preserving Account-Model Blockchain Based on zk-SNARKs60
PUF-RAKE: A PUF-Based Robust and Lightweight Authentication and Key Establishment Protocol58
Locally Differentially Private Heavy Hitter Identification57
Detecting Sybil Attacks Using Proofs of Work and Location in VANETs56
Efficient and Privacy-Preserving Similarity Range Query Over Encrypted Time Series Data56
Aggregation Service for Federated Learning: An Efficient, Secure, and More Resilient Realization56
Lattice-Based Public Key Searchable Encryption from Experimental Perspectives55
Quantum-Safe Round-Optimal Password Authentication for Mobile Devices55
An Efficient NIZK Scheme for Privacy-Preserving Transactions Over Account-Model Blockchain51
Multi-User Verifiable Searchable Symmetric Encryption for Cloud Storage51
Attribute-Based Hybrid Boolean Keyword Search over Outsourced Encrypted Data50
A Risk Management Approach to Defending Against the Advanced Persistent Threat49
SEAR: Secure and Efficient Aggregation for Byzantine-Robust Federated Learning47
Attacking Deep Reinforcement Learning With Decoupled Adversarial Policy47
Efficient and Secure Outsourcing of Differentially Private Data Publishing With Multiple Evaluators47
Achieving Efficient and Privacy-Preserving Neural Network Training and Prediction in Cloud Environments45
Blockchain-Based Secure Deduplication and Shared Auditing in Decentralized Storage45
Secure Password-Protected Encryption Key for Deduplicated Cloud Storage Systems45
Make Web3.0 Connected45
Proxy-Free Privacy-Preserving Task Matching with Efficient Revocation in Crowdsourcing44
LoMar: A Local Defense Against Poisoning Attack on Federated Learning43
Secret-to-Image Reversible Transformation for Generative Steganography42
Conditional Privacy-Preserving Authentication Protocol With Dynamic Membership Updating for VANETs40
A Study on the Security Implications of Information Leakages in Container Clouds39
Mobile Crowdsourcing Task Allocation with Differential-and-Distortion Geo-Obfuscation39
BPPS:Blockchain-Enabled Privacy-Preserving Scheme for Demand-Response Management in Smart Grid Environments37
Conan: A Practical Real-Time APT Detection System With High Accuracy and Efficiency37
One-to-N & N-to-One: Two Advanced Backdoor Attacks Against Deep Learning Models37
Trust Assessment in Online Social Networks36
Detecting and Mitigating DDoS Attacks in SDN Using Spatial-Temporal Graph Convolutional Network36
Optimizing Privacy-Preserving Outsourced Convolutional Neural Network Predictions36
Enabling Secure and Efficient Decentralized Storage Auditing With Blockchain36
Checking Only When It Is Necessary: Enabling Integrity Auditing Based on the Keyword With Sensitive Information Privacy for Encrypted Cloud Data36
Design of Secure Authenticated Key Management Protocol for Cloud Computing Environments36
Achieving Efficient Secure Deduplication With User-Defined Access Control in Cloud35
SSHC: A Secure and Scalable Hybrid Consensus Protocol for Sharding Blockchains With a Formal Security Framework35
Timely Detection and Mitigation of Stealthy DDoS Attacks via IoT Networks35
Lightweight and Certificateless Multi-Receiver Secure Data Transmission Protocol for Wireless Body Area Networks35
Generating Fake Documents Using Probabilistic Logic Graphs35
CD-VulD: Cross-Domain Vulnerability Discovery Based on Deep Domain Adaptation34
Accountable Proxy Re-Encryption for Secure Data Sharing34
Making Convolutions Resilient Via Algorithm-Based Error Detection Techniques34
Resource-Aware Detection and Defense System against Multi-Type Attacks in the Cloud: Repeated Bayesian Stackelberg Game32
On High-Speed Flow-Based Intrusion Detection Using Snort-Compatible Signatures31
Lossless Data Hiding Based on Homomorphic Cryptosystem31
An Automatic Attribute-Based Access Control Policy Extraction From Access Logs31
A Machine Learning-Based Intrusion Detection System for Securing Remote Desktop Connections to Electronic Flight Bag Servers31
A Lightweight and Conditional Privacy-Preserving Authenticated Key Agreement Scheme With Multi-TA Model for Fog-Based VANETs30
Enabling Privacy-Preserving Shortest Distance Queries on Encrypted Graph Data30
Pagoda: A Hybrid Approach to Enable Efficient Real-Time Provenance Based Intrusion Detection in Big Data Environments30
VerSA: Verifiable Secure Aggregation for Cross-Device Federated Learning30
Detection and Forensics against Stealthy Data Falsification in Smart Metering Infrastructure30
Efficient Certificateless Multi-Copy Integrity Auditing Scheme Supporting Data Dynamics30
Performance Modeling of Moving Target Defenses with Reconfiguration Limits30
Dual Watermarking for Security of COVID-19 Patient Record29
Anomaly Detection in Operating System Logs with Deep Learning-Based Sentiment Analysis29
Linguistic Steganography Based on Adaptive Probability Distribution29
MANDA: On Adversarial Example Detection for Network Intrusion Detection System29
WF-MTD: Evolutionary Decision Method for Moving Target Defense Based on Wright-Fisher Process28
A Privacy-Preserving Framework for Outsourcing Location-Based Services to the Cloud28
Eunomia: Anonymous and Secure Vehicular Digital Forensics Based on Blockchain28
DeepAG: Attack Graph Construction and Threats Prediction With Bi-Directional Deep Learning28
Representing Fine-Grained Co-Occurrences for Behavior-Based Fraud Detection in Online Payment Services28
Non-Interactive Multi-Client Searchable Encryption: Realization and Implementation28
You Can Access but You Cannot Leak: Defending Against Illegal Content Redistribution in Encrypted Cloud Media Center28
An Integrated Privacy Preserving Attribute-Based Access Control Framework Supporting Secure Deduplication27
Efficient and Secure Attribute-Based Access Control With Identical Sub-Policies Frequently Used in Cloud Storage27
Towards Public Verifiable and Forward-Privacy Encrypted Search by Using Blockchain27
Dynamic Group-Oriented Provable Data Possession in the Cloud27
DiLSe: Lattice-Based Secure and Dependable Data Dissemination Scheme for Social Internet of Vehicles27
Automated Security Risk Identification Using AutomationML-Based Engineering Data27
Multi-Client Sub-Linear Boolean Keyword Searching for Encrypted Cloud Storage with Owner-Enforced Authorization27
Design and Evaluation of a Reconfigurable ECU Architecture for Secure and Dependable Automotive CPS27
Detection and Defense of Cache Pollution Attacks Using Clustering in Named Data Networks26
DDCA: A Distortion Drift-Based Cost Assignment Method for Adaptive Video Steganography in the Transform Domain26
A Large-Scale Empirical Study on the Vulnerability of Deployed IoT Devices26
zk-AuthFeed: Protecting Data Feed to Smart Contracts With Authenticated Zero Knowledge Proof25
Towards Incentive for Electrical Vehicles Demand Response With Location Privacy Guaranteeing in Microgrids25
Inferring and Investigating IoT-Generated Scanning Campaigns Targeting a Large Network Telescope25
Safe is the New Smart: PUF-Based Authentication for Load Modification-Resistant Smart Meters25
MADneSs: A Multi-Layer Anomaly Detection Framework for Complex Dynamic Systems25
Achieving Efficient and Privacy-Preserving Exact Set Similarity Search over Encrypted Data25
A Lightweight Privacy Preservation Scheme with Efficient Reputation Management for Mobile Crowdsensing in Vehicular Networks25
Denoising in the Dark: Privacy-Preserving Deep Neural Network-Based Image Denoising25
A Knowledge Transfer-based Semi-Supervised Federated Learning for IoT Malware Detection25
DL-FHMC: Deep Learning-Based Fine-Grained Hierarchical Learning Approach for Robust Malware Classification25
Backdoor Attack on Machine Learning Based Android Malware Detectors24
Verifying and Monitoring IoTs Network Behavior Using MUD Profiles24
Achieving Privacy-Preserving Online Diagnosis With Outsourced SVM in Internet of Medical Things Environment24
Modeling and Defense of Social Virtual Reality Attacks Inducing Cybersickness24
Towards an Interpretable Autoencoder: A Decision-Tree-Based Autoencoder and its Application in Anomaly Detection24
Generating Adversarial Examples Against Machine Learning-Based Intrusion Detector in Industrial Control Systems24
An Automated Multi-Tab Website Fingerprinting Attack23
Security Model of Authentication at the Physical Layer and Performance Analysis over Fading Channels23
Perceptual Image Hashing With Locality Preserving Projection for Copy Detection23
Efficient and Privacy-Preserving Ridesharing Organization for Transferable and Non-Transferable Services23
Design and Evaluation of a Multi-Domain Trojan Detection Method on Deep Neural Networks23
BiMorphing: A Bi-Directional Bursting Defense against Website Fingerprinting Attacks23
A Differentially Private Federated Learning Model against Poisoning Attacks in Edge Computing23
EBCPA: Efficient Blockchain-based Conditional Privacy-preserving Authentication for VANETs23
Extending Attack Graphs to Represent Cyber-Attacks in Communication Protocols and Modern IT Networks22
Adaptive Steganalysis Based on Statistical Model of Quantized DCT Coefficients for JPEG Images22
XAuth: Efficient Privacy-Preserving Cross-Domain Authentication22
Forward and Backward Private DSSE for Range Queries22
Securely Outsourcing Neural Network Inference to the Cloud With Lightweight Techniques22
A Fake Online Repository Generation Engine for Cyber Deception22
Securely and Efficiently Outsourcing Decision Tree Inference22
Harnessing Policy Authenticity for Hidden Ciphertext Policy Attribute-Based Encryption22
Minimax Approximation of Sign Function by Composite Polynomial for Homomorphic Comparison21
Poisoning-Assisted Property Inference Attack Against Federated Learning21
Sanitizable Access Control System for Secure Cloud Storage Against Malicious Data Publishers21
Decision Tree Evaluation on Sensitive Datasets for Secure e-Healthcare Systems21
Tracking Normalized Network Traffic Entropy to Detect DDoS Attacks in P421
Toward Verifiable and Privacy Preserving Machine Learning Prediction21
Monitoring-Based Differential Privacy Mechanism Against Query Flooding-Based Model Extraction Attack21
Checking is Believing: Event-Aware Program Anomaly Detection in Cyber-Physical Systems20
Building a Secure Knowledge Marketplace Over Crowdsensed Data Streams20
PrivKVM*: Revisiting Key-Value Statistics Estimation With Local Differential Privacy20
Design, Analysis and Application of Embedded Resistive RAM Based Strong Arbiter PUF20
Network Attack Surface: Lifting the Concept of Attack Surface to the Network Level for Evaluating Networks’ Resilience Against Zero-Day Attacks19
Sidechains With Fast Cross-Chain Transfers19
Sensitive Label Privacy Preservation with Anatomization for Data Publishing19
DatingSec: Detecting Malicious Accounts in Dating Apps Using a Content-Based Attention Network19
Oracle-Supported Dynamic Exploit Generation for Smart Contracts19
EncodeORE: Reducing Leakage and Preserving Practicality in Order-Revealing Encryption19
Crypt-DAC: Cryptographically Enforced Dynamic Access Control in the Cloud19
Decentralized Self-Auditing Scheme With Errors Localization for Multi-Cloud Storage19
On the Performance of Detecting Injection of Fabricated Messages into the CAN Bus19
AWARE: Adaptive Wide-Area Replication for Fast and Resilient Byzantine Consensus19
Eight Years of Rider Measurement in the Android Malware Ecosystem19
Towards Practical and Privacy-Preserving Multi-Dimensional Range Query Over Cloud19
Design and Analysis of Adaptive Graph-Based Cancelable Multi-Biometrics Approach18
Enabling Privacy-Preserving Geographic Range Query in Fog-Enhanced IoT Services18
EAP-DDBA: Efficient Anonymity Proximity Device Discovery and Batch Authentication Mechanism for Massive D2D Communication Devices in 3GPP 5G HetNet18
USMD: UnSupervised Misbehaviour Detection for Multi-Sensor Data18
Decentralized Privacy-Preserving Fair Exchange Scheme for V2G Based on Blockchain18
Secure Aggregation is Insecure: Category Inference Attack on Federated Learning17
Enabling (End-to-End) Encrypted Cloud Emails With Practical Forward Secrecy17
Adversarial Robustness of Deep Neural Networks: A Survey from a Formal Verification Perspective17
IoVCom: Reliable Comprehensive Communication System for Internet of Vehicles17
Model Protection: Real-Time Privacy-Preserving Inference Service for Model Privacy at the Edge17
Cleaning the NVD: Comprehensive Quality Assessment, Improvements, and Analyses17
A Matrix Factorization Model for Hellinger-Based Trust Management in Social Internet of Things17
"Seeing is not Always Believing": Detecting Perception Error Attacks Against Autonomous Vehicles17
Stopping Memory Disclosures via Diversification and Replicated Execution17
Generative-Adversarial Class-Imbalance Learning for Classifying Cyber-Attacks and Faults - A Cyber-Physical Power System17
Automated Firewall Configuration in Virtual Networks17
RevFRF: Enabling Cross-Domain Random Forest Training With Revocable Federated Learning17
PUF-Based Mutual Authentication and Key Exchange Protocol for Peer-to-Peer IoT Applications17
Towards Understanding and Mitigating Audio Adversarial Examples for Speaker Recognition16
How About Bug-Triggering Paths? - Understanding and Characterizing Learning-Based Vulnerability Detectors16
Achieve Efficient and Privacy-Preserving Disease Risk Assessment Over Multi-Outsourced Vertical Datasets16
Evolutionary Dynamic Database Partitioning Optimization for Privacy and Utility16
xFuzz: Machine Learning Guided Cross-Contract Fuzzing16
PILE: Robust Privacy-Preserving Federated Learning Via Verifiable Perturbations16
Prioritized Fault Recovery Strategies for Multi-Access Edge Computing Using Probabilistic Model Checking16
LP-SBA-XACML: Lightweight Semantics Based Scheme Enabling Intelligent Behavior-Aware Privacy for IoT16
FVC-Dedup: A Secure Report Deduplication Scheme in a Fog-Assisted Vehicular Crowdsensing System16
Identity-Based Provable Data Possession From RSA Assumption for Secure Cloud Storage16
Efficient Private Comparison Queries Over Encrypted Databases Using Fully Homomorphic Encryption With Finite Fields16
ExGen: Cross-platform, Automated Exploit Generation for Smart Contract Vulnerabilities16
Semantics-Preserving Reinforcement Learning Attack Against Graph Neural Networks for Malware Detection16
Attack Hypotheses Generation Based on Threat Intelligence Knowledge Graph16
A Secure EMR Sharing System With Tamper Resistance and Expressive Access Control16
Towards Lightweight Authentication and Batch Verification Scheme in IoV15
Multi-Client Secure and Efficient DPF-Based Keyword Search for Cloud Storage15
An Anti-Steganalysis HEVC Video Steganography With High Performance Based on CNN and PU Partition Modes15
Disclose More and Risk Less: Privacy Preserving Online Social Network Data Sharing15
Impact of Service Function Aging on the Dependability for MEC Service Function Chain15
Protecting Decision Boundary of Machine Learning Model With Differentially Private Perturbation15
Detection and Classification of Botnet Traffic using Deep Learning with Model Explanation15
Defending Against Adversarial Attack Towards Deep Neural Networks Via Collaborative Multi-Task Training15
Enabling Verifiable Privacy-Preserving Multi-Type Data Aggregation in Smart Grids15
EBSNN: Extended Byte Segment Neural Network for Network Traffic Classification15
Circom: A Circuit Description Language for Building Zero-Knowledge Applications15
SwissLog: Robust Anomaly Detection and Localization for Interleaved Unstructured Logs15
Sixteen Years of Phishing User Studies: What Have We Learned?14
Local Information Privacy and Its Application to Privacy-Preserving Data Aggregation14
Efficient and Privacy-Preserving Spatial Keyword Similarity Query Over Encrypted Data14
ALI: Anonymous Lightweight Inter-Vehicle Broadcast Authentication with Encryption14
Data-Driven Spectrum Trading with Secondary Users’ Differential Privacy Preservation14
Escaping From Consensus: Instantly Redactable Blockchain Protocols in Permissionless Setting14
Blockchain-Based Deduplication and Integrity Auditing Over Encrypted Cloud Storage14
Fault Injection Analytics: A Novel Approach to Discover Failure Modes in Cloud-Computing Systems14
HIBEChain: A Hierarchical Identity-Based Blockchain System for Large-Scale IoT14
Fog-to-MultiCloud Cooperative Ehealth Data Management With Application-Aware Secure Deduplication14
Poirot: Causal Correlation Aided Semantic Analysis for Advanced Persistent Threat Detection14
Attacks and Countermeasures on Privacy-Preserving Biometric Authentication Schemes14
Performability of Network Service Chains: Stochastic Modeling and Assessment of Softwarized IP Multimedia Subsystem14
A New Robust Reference Image Hashing System14
A Secure Cloud Data Sharing Protocol for Enterprise Supporting Hierarchical Keyword Search14
NN-EMD: Efficiently Training Neural Networks Using Encrypted Multi-Sourced Datasets14
Policy-Based Broadcast Access Authorization for Flexible Data Sharing in Clouds14
Enabling Efficient, Secure and Privacy-Preserving Mobile Cloud Storage14
Session Invariant EEG Signatures using Elicitation Protocol Fusion and Convolutional Neural Network14
Agora: A Privacy-Aware Data Marketplace14
Efficient Identity-Based Data Integrity Auditing With Key-Exposure Resistance for Cloud Storage14
Differentially Private Publication of Vertically Partitioned Data13
Attribute-Based Proxy Re-Encryption With Direct Revocation Mechanism for Data Sharing in Clouds13
Forward/Backward and Content Private DSSE for Spatial Keyword Queries13
Eurus: Towards an Efficient Searchable Symmetric Encryption With Size Pattern Protection13
FuzzyDedup: Secure Fuzzy Deduplication for Cloud Storage13
SuperSketch: A Multi-Dimensional Reversible Data Structure for Super Host Identification13
A Software-Based Remote Attestation Scheme for Internet of Things Devices13
Enabling Regulatory Compliance and Enforcement in Decentralized Anonymous Payment13
Novel Protocols to Mitigate Network Slice Topology Learning Attacks and Protect Privacy of Users’ Service Access Behavior in Softwarized 5G Networks13
Membership Inference Attacks Against Machine Learning Models via Prediction Sensitivity13
Privacy-Preserving and Outsourced Multi-Party K-Means Clustering Based on Multi-Key Fully Homomorphic Encryption13
Towards a New Thermal Monitoring Based Framework for Embedded CPS Device Security13
ExtendedSketch: Fusing Network Traffic for Super Host Identification With a Memory Efficient Sketch13
An Electronic Voting Scheme Based on Revised-SVRM and Confirmation Numbers13
Attribute-Based Encryption With Reliable Outsourced Decryption in Cloud Computing Using Smart Contract13
Ants can Carry Cheese: Secure and Private RFID-Enabled Third-Party Distribution13
Reachability Analysis for Attributes in ABAC With Group Hierarchy13
SAFE: A General Secure and Fair Auction Framework for Wireless Markets With Privacy Preservation13
UCoin: An Efficient Privacy Preserving Scheme for Cryptocurrencies13
Analyzing Security Requirements in Timed Workflow Processes13
Blockchain-Based Privacy Enforcement in the IoT Domain13
SecRec: A Privacy-Preserving Method for the Context-Aware Recommendation System13
Fee-Free Pooled Mining for Countering Pool-Hopping Attack in Blockchain13
0.055202007293701