IEEE Transactions on Dependable and Secure Computing

Papers
(The TQCC of IEEE Transactions on Dependable and Secure Computing is 11. The table below lists those papers that are above that threshold based on CrossRef citation counts [max. 250 papers]. The publications cover those that have been published in the past four years, i.e., from 2021-05-01 to 2025-05-01.)
ArticleCitations
Defeating Data Plane Attacks With Program Obfuscation340
AnoPay: Anonymous Payment for Vehicle Parking With Updatable Credential182
Provably-Secure One-Message Unilateral Entity Authentication Schemes171
Mules and Permission Laundering in Android: Dissecting Custom Permissions in the Wild147
Caught-in-Translation (CiT): Detecting Cross-Level Inconsistency Attacks in Network Functions Virtualization (NFV)135
SwiftParade: Anti-Burst Multipath Validation128
Constructing Immune-Cover for Improving Holistic Security of Spatial Adaptive Steganography122
SG-Audit: An Efficient and Robust Cloud Auditing Scheme for Smart Grid121
The Perils of Wi-Fi Spoofing Attack Via Geolocation API and Its Defense114
Towards a New Thermal Monitoring Based Framework for Embedded CPS Device Security110
R2E: A Decentralized Scheme for Rewarding Tor Relays With Cryptocurrencies102
Feature Reconstruction Attacks and Countermeasures of DNN Training in Vertical Federated Learning97
Proactive Anti-Eavesdropping With Trap Deployment in Wireless Networks91
Enhancing Sybil Detection via Social-Activity Networks: A Random Walk Approach82
On the Detection of Smart, Self-Propagating Internet Worms78
Differentially Oblivious Two-Party Pattern Matching With Sublinear Round Complexity76
iQuery: A Trustworthy and Scalable Blockchain Analytics Platform74
Window Canaries: Re-Thinking Stack Canaries for Architectures With Register Windows74
FedPA: Generator-Based Heterogeneous Federated Prototype Adversarial Learning73
Sharing Can be Threatening: Uncovering Security Flaws of RBAC Model on Smart Home Platforms73
Optimization-Time Analysis for Cybersecurity72
BIOWISH: Biometric Recognition Using Wearable Inertial Sensors Detecting Heart Activity69
Adaptive HEVC Steganography Based on Steganographic Compression Efficiency Degradation Model69
Chained HotStuff Under Performance Attack67
pSafety: Privacy-Preserving Safety Monitoring in Online Ride Hailing Services67
RDP-GAN: A Rényi-Differential Privacy Based Generative Adversarial Network64
An Effective and Resilient Backdoor Attack Framework against Deep Neural Networks and Vision Transformers64
Mimosa: Protecting Private Keys Against Memory Disclosure Attacks Using Hardware Transactional Memory62
Steganography With Generated Images: Leveraging Volatility to Enhance Security59
Ensuring State Continuity for Confidential Computing: A Blockchain-Based Approach58
Heterogeneous Domain Adaptation for Multistream Classification on Cyber Threat Data57
FedTracker: Furnishing Ownership Verification and Traceability for Federated Learning Model56
MTD-AD: Moving Target Defense as Adversarial Defense56
Harnessing Policy Authenticity for Hidden Ciphertext Policy Attribute-Based Encryption55
RiskProp: Account Risk Rating on Ethereum via De-anonymous Score and Network Propagation53
CoinLayering: An Efficient Coin Mixing Scheme for Large Scale Bitcoin Transactions51
Malicious-Resistant Non-Interactive Verifiable Aggregation for Federated Learning51
SpADe: Multi-Stage Spam Account Detection for Online Social Networks50
Secure and Scalable Cross-Domain Data Sharing in Zero-Trust Cloud-Edge-End Environment Based on Sharding Blockchain49
A Temporal Chrominance Trigger for Clean-Label Backdoor Attack Against Anti-Spoof Rebroadcast Detection49
A Comparative Analysis of Software Aging in Image Classifiers on Cloud and Edge49
Pre-Trained Model-Based Automated Software Vulnerability Repair: How Far are We?48
OFIDS : Online Learning-Enabled and Fingerprint-Based Intrusion Detection System in Controller Area Networks47
DBFT: A Byzantine Fault Tolerance Protocol With Graceful Performance Degradation47
Speech Sanitizer: Speech Content Desensitization and Voice Anonymization45
Securely Outsourcing Neural Network Inference to the Cloud With Lightweight Techniques44
Perceptual Image Hashing With Locality Preserving Projection for Copy Detection44
Semantic-Preserving Linguistic Steganography by Pivot Translation and Semantic-Aware Bins Coding44
Split Learning without Local Weight Sharing To Enhance Client-side Data Privacy44
Fully Accountable Data Sharing for Pay-as-You-Go Cloud Scenes43
Decentralized and Fair Trading via Blockchain: The Journey So Far and the Road Ahead43
ABATe: Automatic Behavioral Abstraction Technique to Detect Anomalies in Smart Cyber-Physical Systems43
SAFE: A General Secure and Fair Auction Framework for Wireless Markets With Privacy Preservation42
SHIELD: Thwarting Code Authorship Attribution41
Decentralized Self-Auditing Multiple Cloud Storage in Compressed Provable Data Possession41
On the Security of Secure Keyword Search and Data Sharing Mechanism for Cloud Computing40
Artemis: Defending Against Backdoor Attacks via Distribution Shift39
MRSA: Mask Random Array Protocol for Efficient Secure Handover Authentication in 5G HetNets39
Nip in the Bud: Forecasting and Interpreting Post- Exploitation Attacks in Real-Time Through Cyber Threat Intelligence Reports39
Matrix-Based Secret Sharing for Reversible Data Hiding in Encrypted Images39
Evolutionary Dynamic Database Partitioning Optimization for Privacy and Utility39
A Systematic Methodology to Compute the Quantum Vulnerability Factors for Quantum Circuits38
Holistic Implicit Factor Evaluation of Model Extraction Attacks38
Software Vulnerability Discovery via Learning Multi-Domain Knowledge Bases38
A Full Lifecycle Authentication Scheme for Large-scale Smart IoT Applications38
Denoising in the Dark: Privacy-Preserving Deep Neural Network-Based Image Denoising37
CMI: Client-Targeted Membership Inference in Federated Learning37
Studying the Robustness of Anti-Adversarial Federated Learning Models Detecting Cyberattacks in IoT Spectrum Sensors37
HDWSA$^{2}$: A Secure Hierarchical Deterministic Wallet Supporting Stealth Address and Signature Aggregation36
On-the-Fly Privacy for Location Histograms36
Physical Layer Authentication Utilizing Beam Pattern Features in Millimeter-Wave MIMO Systems36
LocGuard: A Location Privacy Defender for Image Sharing36
Anomaly Detection in Industrial Control Systems Based on Cross-Domain Representation Learning36
An Adaptive IPM-Based HEVC Video Steganography via Minimizing Non-Additive Distortion35
Verifiable Homomorphic Secret Sharing for Low Degree Polynomials35
Towards Neural Network-Based Communication System: Attack and Defense35
Privacy Leakage in Wireless Charging35
Smaug: A TEE-Assisted Secured SQLite for Embedded Systems34
srTLS: Secure TLS Handshake on Corrupted Machines34
A Privacy-Preserving Graph Neural Network for Network Intrusion Detection34
A Scheme of Robust Privacy-Preserving Multi-Party Computation Via Public Verification33
Membership Inference Attacks Against Machine Learning Models via Prediction Sensitivity33
VeriCache: Formally Verified Fine-Grained Partitioned Cache for Side-Channel-Secure Enclaves33
Attacking Deep Reinforcement Learning With Decoupled Adversarial Policy33
Efficient and Privacy-Preserving Weighted Range Set Sampling in Cloud32
UC Secure Private Branching Program and Decision Tree Evaluation32
MISP: An Efficient Quantum-resistant Misbehavior Preventing Scheme with Self-enforcement for Vehicle-to-Everything32
CryptoRec: Novel Collaborative Filtering Recommender Made Privacy-Preserving Easy32
Decentralized Self-Auditing Scheme With Errors Localization for Multi-Cloud Storage31
Enabling Secure and Efficient Decentralized Storage Auditing With Blockchain31
Weaknesses of Popular and Recent Covert Channel Detection Methods and a Remedy31
Spotting Anomalies at the Edge: Outlier Exposure-Based Cross-Silo Federated Learning for DDoS Detection31
Cover Selection for Steganography Using Image Similarity30
Automated Firewall Configuration in Virtual Networks30
ZeroProKeS: A Secure Zeroconf Key Establishment Protocol for Large-Scale Low-Cost Applications30
ValidCNN: A Large-Scale CNN Predictive Integrity Verification Scheme Based on zk-SNARK29
Mitigating Distributed DoS Attacks on Bandwidth Allocation for Federated Learning in Mobile Edge Networks29
Effectively Improving Data Diversity of Substitute Training for Data-Free Black-Box Attack29
Message Control for Blockchain Rewriting29
DE-Sword: Incentivized Verifiable Tag Path Query in RFID-Enabled Supply Chain Systems29
BASS: A Blockchain-Based Asynchronous SignSGD Architecture for Efficient and Secure Federated Learning29
DeepMnemonic: Password Mnemonic Generation via Deep Attentive Encoder-Decoder Model29
DAENet: Making Strong Anonymity Scale in a Fully Decentralized Network28
Performability of Network Service Chains: Stochastic Modeling and Assessment of Softwarized IP Multimedia Subsystem28
EtherCloak: Enabling Multi-Level and Customized Privacy on Account-Model Blockchains28
Privacy-Preserving Decision-Making Over Blockchain27
A Magnetic Signal Based Device Fingerprinting Scheme in Wireless Charging27
PPCA - Privacy-Preserving Collision Avoidance for Autonomous Unmanned Aerial Vehicles27
Threshold Delegatable Anonymous Credentials With Controlled and Fine-Grained Delegation27
UniQGAN: Towards Improved Modulation Classification With Adversarial Robustness Using Scalable Generator Design27
SHIELD - Secure Aggregation Against Poisoning in Hierarchical Federated Learning27
Anomaly Detection in Event-Triggered Traffic Time Series via Similarity Learning27
Delegation Security Analysis in Workflow Systems27
Attacks and Countermeasures on Privacy-Preserving Biometric Authentication Schemes27
SE#PCFG: Semantically Enhanced PCFG for Password Analysis and Cracking26
Chebyshev Polynomial Based Emergency Conditions with Authentication Scheme for 5G-Assisted Vehicular Fog Computing26
CherryPicker: A Parallel Solving and State Sharing Hybrid Fuzzing System26
SkillVet: Automated Traceability Analysis of Amazon Alexa Skills26
Practical Encrypted Network Traffic Pattern Matching for Secure Middleboxes26
Accurate and Efficient Privacy-Preserving Feature Extraction on Encrypted Images25
Generalized Local Optimality for Video Steganalysis in Motion Vector Domain25
Privacy-Preserving Network Embedding Against Private Link Inference Attacks25
Low-overhead Reversible Coherence Protocol25
Practical Two-Factor Authentication Protocol for Real-Time Data Access in WSNs25
Diff-ID: An Explainable Identity Difference Quantification Framework for DeepFake Detection25
Rethinking the Design of Backdoor Triggers and Adversarial Perturbations: A Color Space Perspective24
EZchain: A Secure Scalable Blockchain Protocol Via Passive Sharding24
Handling Labeled Data Insufficiency: Semi-supervised Learning with Self-Training Mixup Decision Tree for Classification of Network Attacking Traffic24
Comments on “VERSA: Verifiable Secure Aggregation for Cross-Device Federated Learning”24
Privacy-Preserving Anomaly Detection of Encrypted Smart Contract for Blockchain-Based Data Trading24
Trust Beyond Border: Lightweight, Verifiable User Isolation for Protecting In-Enclave Services24
A Secure Computing System With Hardware-Efficient Lazy Bonsai Merkle Tree for FPGA-Attached Embedded Memory24
SecDR: Enabling Secure, Efficient, and Accurate Data Recovery for Mobile Crowdsensing24
Collaborative Prediction in Anti-Fraud System Over Multiple Credit Loan Platforms24
Model of Execution Trace Obfuscation Between Threads24
Price TAG: Towards Semi-Automatically Discovery Tactics, Techniques and Procedures OF E-Commerce Cyber Threat Intelligence23
SuperSketch: A Multi-Dimensional Reversible Data Structure for Super Host Identification23
PKVIC: Supplement Missing Software Package Information in Security Vulnerability Reports23
Threat-Event Detection for Distributed Networks Based on Spatiotemporal Markov Random Field23
Exploiting Deep Neural Networks as Covert Channels23
ACL: Account Linking in Online Social Networks with Robust Camera Fingerprint Matching23
Building a Secure Knowledge Marketplace Over Crowdsensed Data Streams23
Making Information Hiding Effective Again23
kTCQ: Achieving Privacy-Preserving k-Truss Community Queries Over Outsourced Data23
Cooperating or Kicking Out: Defending against Poisoning Attacks in Federated Learning via the Evolution of Cooperation23
Decentralized Multi-Client Functional Encryption for Inner Product With Applications to Federated Learning23
Precise Discovery of More Taint-Style Vulnerabilities in Embedded Firmware22
FedDMC: Efficient and Robust Federated Learning via Detecting Malicious Clients22
Attributed Graph Clustering in Collaborative Settings22
Attack Hypotheses Generation Based on Threat Intelligence Knowledge Graph22
Understanding User Passwords through Parsing Tree22
Data Protection: Privacy-Preserving Data Collection With Validation22
DID We Miss Anything?: Towards Privacy-Preserving Decentralized ID Architecture22
Multi-label Classification for Android Malware Based on Active Learning22
BadCleaner: Defending Backdoor Attacks in Federated Learning via Attention-Based Multi-Teacher Distillation22
T-Trace: Constructing the APTs Provenance Graphs Through Multiple Syslogs Correlation22
CPAKA: Mutual Authentication and Key Agreement Scheme Based on Conditional PUF in Space-Air-Ground Integrated Network22
An Efficient and Zero-Knowledge Classical Machine Learning Inference Pipeline22
Non-Interactive Multi-Client Searchable Encryption: Realization and Implementation21
Multiple Targets Directed Greybox Fuzzing21
Facial Data Minimization: Shallow Model as Your Privacy Filter21
Man-in-the-Middle Attacks Against Machine Learning Classifiers Via Malicious Generative Models21
Public Proofs of Data Replication and Retrievability With User-Friendly Replication21
An Empirical Study of Fault Triggers in Deep Learning Frameworks21
Membership Inference Attacks Against Deep Learning Models via Logits Distribution21
Sine: Similarity is Not Enough for Mitigating Local Model Poisoning Attacks in Federated Learning21
Deep Learning for Coverage-Guided Fuzzing: How Far are We?21
Online Failure Prediction for Complex Systems: Methodology and Case Studies21
Improving the Accuracy of IR-Level Fault Injection21
Blockchain-Based Shared Data Integrity Auditing and Deduplication21
Possibility and Impossibility of Propagation Safety and Reliability: A 1-Safe and Reliable Snap-Stabilizing Broadcast Algorithm21
Towards Robust Fingerprinting of Relational Databases by Mitigating Correlation Attacks20
Private Reachability Queries on Structured Encrypted Temporal Bipartite Graphs20
Privacy-Preserving and Reliable Truth Discovery for Heterogeneous Fog-based Crowdsensing20
Mitigating Adversarial Attacks on Data-Driven Invariant Checkers for Cyber-Physical Systems20
Automatically Identifying CVE Affected Versions With Patches and Developer Logs20
$\eta$-Inference: A Data-Aware and High-Utility Privacy Model for Relational Data Publishing20
IoVCom: Reliable Comprehensive Communication System for Internet of Vehicles20
Detecting Adversarial Examples on Deep Neural Networks With Mutual Information Neural Estimation20
Highly Efficient and Scalable Access Control Mechanism for IoT Devices in Pervasive Environments20
Robust Audio Copy-Move Forgery Detection Using Constant Q Spectral Sketches and GA-SVM20
An OpenRAN Security Framework for Scalable Authentication, Authorization, and Discovery of xApps with Isolated Critical Services20
Pricing Utility vs. Location Privacy: A Differentially Private Data Sharing Framework for Ride-on-Demand Services20
VeriFi: Towards Verifiable Federated Unlearning20
Sorald: Automatic Patch Suggestions for SonarQube Static Analysis Violations20
An Optimized Sparse Response Mechanism for Differentially Private Federated Learning20
Minimax Approximation of Sign Function by Composite Polynomial for Homomorphic Comparison20
HyperPS: A Virtual-Machine Memory Protection Approach Through Hypervisor's Privilege Separation19
Checking Only When It Is Necessary: Enabling Integrity Auditing Based on the Keyword With Sensitive Information Privacy for Encrypted Cloud Data19
Fault Injection for TensorFlow Applications19
Design and Analysis of Adaptive Graph-Based Cancelable Multi-Biometrics Approach19
MARS: Enabling Verifiable Range-Aggregate Queries in Multi-Source Environments19
A Blockchain-Based Secure Covert Communication Method via Shamir Threshold and STC Mapping19
ALI: Anonymous Lightweight Inter-Vehicle Broadcast Authentication with Encryption19
EBSNN: Extended Byte Segment Neural Network for Network Traffic Classification19
PellucidAttachment: Protecting Users From Attacks via E-Mail Attachments19
Personalized 3D Location Privacy Protection With Differential and Distortion Geo-Perturbation19
Quantify Co-Residency Risks in the Cloud Through Deep Learning19
Friendship Preference: Scalable and Robust Category of Features for Social Bot Detection19
The “Code” of Ethics: A Holistic Audit of AI Code Generators18
TAICHI: Transform Your Secret Exploits Into Mine From a Victim's Perspective18
Blacklisting Based Anonymous Authentication Scheme for Sharing Economy18
Private Electronic Road Pricing Using Bulletproofs With Vector Commitments18
Evaluating the Robustness of Trigger Set-Based Watermarks Embedded in Deep Neural Networks18
RAT: Reinforcement-Learning-Driven and Adaptive Testing for Vulnerability Discovery in Web Application Firewalls18
SaVioR: Thwarting Stack-Based Memory Safety Violations by Randomizing Stack Layout18
Privacy-Preserving Liveness Detection for Securing Smart Voice Interfaces18
Integrating Coordinate Transformation and Random Sampling Into High-Capacity Reversible Data Hiding in Encrypted Polygonal Models18
Increasing the Resilience of Secure Multiparty Computation Using Security Modules18
Multi-Modal Side Channel Data Driven Golden-Free Detection of Software and Firmware Trojans18
Attribute-Based Membership Inference Attacks and Defenses on GANs18
Circuit-Free General-Purpose Multi-Party Computation via Co-Utile Unlinkable Outsourcing17
EventMon: Real-Time Event-based Streaming Network Monitoring Data Recovery17
Fratricide! Hijacking in Android Multi-window17
D-LNBot: A Scalable, Cost-Free and Covert Hybrid Botnet on Bitcoin's Lightning Network17
An Evolutionary Attack for Revealing Training Data of DNNs With Higher Feature Fidelity17
Delta Counter: Bandwidth-Efficient Encryption Counter Representation for Secure GPU Memory17
Detecting Smart Home Device Activities Using Packet-Level Signatures From Encrypted Traffic17
Efficient Noise Generation Protocols for Differentially Private Multiparty Computation17
Revisiting Privacy-Preserving Min and k-th Min Protocols for Mobile Sensing17
Detecting Errors in NGAC Policies via Fault-Based Testing17
FewM-HGCL : Few-Shot Malware Variants Detection Via Heterogeneous Graph Contrastive Learning17
Leakage-Resilient and Carbon-Neutral Aggregation Featuring the Federated AI-enabled Critical Infrastructure17
DiRLoc: Disentanglement Representation Learning for Robust Image Forgery Localization17
MicroFI: Non-Intrusive and Prioritized Request-Level Fault Injection for Microservice Applications17
Iterative Window Mean Filter: Thwarting Diffusion-Based Adversarial Purification16
On the Validation of Web X.509 Certificates by TLS Interception Products16
BazzAFL: Moving Fuzzing Campaigns Towards Bugs via Grouping Bug-Oriented Seeds16
CrossChannel: Efficient and Scalable Cross-Chain Transactions Through Cross-and-Off-Blockchain Micropayment Channel16
PILE: Robust Privacy-Preserving Federated Learning Via Verifiable Perturbations16
SySeVR: A Framework for Using Deep Learning to Detect Software Vulnerabilities16
Detecting Malicious Websites From the Perspective of System Provenance Analysis16
Optimizing Secure Decision Tree Inference Outsourcing16
Object Oriented Policy Conflict Checking Framework in Cloud Networks (OOPC)16
HyperMaze: Towards Privacy-Preserving and Scalable Permissioned Blockchain16
Accountable Many-to-One Signature with Short Verification Key for Self-Sovereign Identity16
V-Digger: An Efficient and Secure Vulnerability Assessment for Large-Scale ISP Network16
Nereus: Anonymous and Secure Ride-Hailing Service Based on Private Smart Contracts16
FeCo: Boosting Intrusion Detection Capability in IoT Networks via Contrastive Learning16
On Credibility of Adversarial Examples Against Learning-Based Grid Voltage Stability Assessment16
Towards an Interpretable Autoencoder: A Decision-Tree-Based Autoencoder and its Application in Anomaly Detection16
DeepAG: Attack Graph Construction and Threats Prediction With Bi-Directional Deep Learning16
Gringotts: An Encrypted Version Control System With Less Trust on Servers15
An Automated Monitoring and Repairing System for DNN Training15
Cooperative Jamming-Aided Secure Communication in Wireless Powered Sensor Networks15
PRISM: A Hierarchical Intrusion Detection Architecture for Large-Scale Cyber Networks15
VerifyTL: Secure and Verifiable Collaborative Transfer Learning15
Using Metrics Suites to Improve the Measurement of Privacy in Graphs15
MVOC: A Lighter Multi-Client Verifiable Outsourced Computation for Malicious Lightweight Clients15
Cure-GNN: A Robust Curvature-Enhanced Graph Neural Network Against Adversarial Attacks15
0.081761121749878