IEEE Transactions on Dependable and Secure Computing

Papers
(The TQCC of IEEE Transactions on Dependable and Secure Computing is 8. The table below lists those papers that are above that threshold based on CrossRef citation counts [max. 250 papers]. The publications cover those that have been published in the past four years, i.e., from 2020-03-01 to 2024-03-01.)
ArticleCitations
Secure Remote User Authenticated Key Establishment Protocol for Smart Home Environment221
PA-CRT: Chinese Remainder Theorem Based Conditional Privacy-Preserving Authentication Scheme in Vehicular Ad-Hoc Networks177
Cloud Centric Authentication for Wearable Healthcare Monitoring System173
SySeVR: A Framework for Using Deep Learning to Detect Software Vulnerabilities158
Adaptive Payload Distribution in Multiple Images Steganography Based on Image Texture Features124
Anonymous Lightweight Chaotic Map-Based Authenticated Key Agreement Protocol for Industrial Internet of Things123
LVBS: Lightweight Vehicular Blockchain for Secure Data Sharing in Disaster Rescue122
Searchable Symmetric Encryption with Forward Search Privacy122
Revocable Identity-Based Broadcast Proxy Re-Encryption for Data Sharing in Clouds112
Privacy-Preserving Attribute-Based Keyword Search in Shared Multi-owner Setting103
A Traceable and Revocable Ciphertext-Policy Attribute-based Encryption Scheme Based on Privacy Protection102
Detecting Adversarial Image Examples in Deep Neural Networks with Adaptive Noise Reduction98
Providing Task Allocation and Secure Deduplication for Mobile Crowdsensing via Fog Computing98
Efficient and Secure Decision Tree Classification for Cloud-Assisted Online Diagnosis Services92
ASAP: An Anonymous Smart-Parking and Payment Scheme in Vehicular Networks82
Forward Private Searchable Symmetric Encryption with Optimized I/O Efficiency81
Understanding Node Capture Attacks in User Authentication Schemes for Wireless Sensor Networks80
Distributed Attack Detection in a Water Treatment Plant: Method and Case Study75
Robust and Universal Seamless Handover Authentication in 5G HetNets72
Efficient Cyber Attack Detection in Industrial Control Systems Using Lightweight Neural Networks and PCA68
Towards Achieving Keyword Search over Dynamic Encrypted Cloud Data with Symmetric-Key Based Verification67
Traceable Monero: Anonymous Cryptocurrency with Enhanced Accountability66
A Game-Theoretical Approach for Mitigating Edge DDoS Attack65
Enabling Reliable Keyword Search in Encrypted Decentralized Storage with Fairness62
Anonymity Services Tor, I2P, JonDonym: Classifying in the Dark (Web)61
EC2: Ensemble Clustering and Classification for Predicting Android Malware Families60
Revocable Attribute-Based Encryption With Data Integrity in Clouds59
Deep Learning and Visualization for Identifying Malware Families58
Multi-authority Attribute-Based Keyword Search over Encrypted Cloud Data57
Privacy-Preserving Tensor Decomposition Over Encrypted Data in a Federated Cloud Environment57
Quantum2FA: Efficient Quantum-Resistant Two-Factor Authentication Scheme for Mobile Devices56
Blockchain-Based Certificate Transparency and Revocation Transparency55
VulDeeLocator: A Deep Learning-Based Fine-Grained Vulnerability Detector54
Detecting Sybil Attacks Using Proofs of Work and Location in VANETs51
Multi-User Verifiable Searchable Symmetric Encryption for Cloud Storage51
Software Vulnerability Discovery via Learning Multi-Domain Knowledge Bases51
Privacy-Preserving Data Processing with Flexible Access Control50
A Blockchain-Based Self-Tallying Voting Protocol in Decentralized IoT50
Immersive Virtual Reality Attacks and the Human Joystick49
A Verifiable and Fair Attribute-Based Proxy Re-Encryption Scheme for Data Sharing in Clouds48
Lattice-Based Public Key Searchable Encryption from Experimental Perspectives48
Quantum-Safe Round-Optimal Password Authentication for Mobile Devices47
BlockMaze: An Efficient Privacy-Preserving Account-Model Blockchain Based on zk-SNARKs46
Multi-User Multi-Keyword Rank Search Over Encrypted Data in Arbitrary Language46
An Efficient NIZK Scheme for Privacy-Preserving Transactions Over Account-Model Blockchain46
Locally Differentially Private Heavy Hitter Identification45
Efficient and Privacy-Preserving Similarity Range Query Over Encrypted Time Series Data44
A Risk Management Approach to Defending Against the Advanced Persistent Threat44
Attribute-Based Hybrid Boolean Keyword Search over Outsourced Encrypted Data43
A Privacy-Preserving and Untraceable Group Data Sharing Scheme in Cloud Computing43
Efficient and Secure Outsourcing of Differentially Private Data Publishing With Multiple Evaluators43
PUF-RAKE: A PUF-Based Robust and Lightweight Authentication and Key Establishment Protocol43
Releasing Correlated Trajectories: Towards High Utility and Optimal Differential Privacy42
Attacking Deep Reinforcement Learning With Decoupled Adversarial Policy41
Privacy Leakage via De-Anonymization and Aggregation in Heterogeneous Social Networks40
Physical Layer based Message Authentication with Secure Channel Codes37
Privacy-Preserving Outsourced Calculation Toolkit in the Cloud37
Secure and Efficient Two-Party Signing Protocol for the Identity-Based Signature Scheme in the IEEE P1363 Standard for Public Key Cryptography36
Proxy-Free Privacy-Preserving Task Matching with Efficient Revocation in Crowdsourcing34
Mobile Crowdsourcing Task Allocation with Differential-and-Distortion Geo-Obfuscation34
Pattern-Growth Based Mining Mouse-Interaction Behavior for an Active User Authentication System33
Conditional Privacy-Preserving Authentication Protocol With Dynamic Membership Updating for VANETs32
Generating Fake Documents Using Probabilistic Logic Graphs32
Resource-Aware Detection and Defense System against Multi-Type Attacks in the Cloud: Repeated Bayesian Stackelberg Game31
Make Web3.0 Connected31
Trust Assessment in Online Social Networks31
A Study on the Security Implications of Information Leakages in Container Clouds30
Checking Only When It Is Necessary: Enabling Integrity Auditing Based on the Keyword With Sensitive Information Privacy for Encrypted Cloud Data29
Lossless Data Hiding Based on Homomorphic Cryptosystem29
A Practical Real-Time APT Detection System With High Accuracy and Efficiency29
SEAR: Secure and Efficient Aggregation for Byzantine-Robust Federated Learning29
Performance Modeling of Moving Target Defenses with Reconfiguration Limits29
Achieving Efficient Secure Deduplication With User-Defined Access Control in Cloud28
Accountable Proxy Re-Encryption for Secure Data Sharing28
Blockchain-Based Secure Deduplication and Shared Auditing in Decentralized Storage28
Achieving Efficient and Privacy-Preserving Neural Network Training and Prediction in Cloud Environments28
Design of Secure Authenticated Key Management Protocol for Cloud Computing Environments28
Optimizing Privacy-Preserving Outsourced Convolutional Neural Network Predictions27
Secure Password-Protected Encryption Key for Deduplicated Cloud Storage Systems27
Pagoda: A Hybrid Approach to Enable Efficient Real-Time Provenance Based Intrusion Detection in Big Data Environments27
One-to-N & N-to-One: Two Advanced Backdoor Attacks Against Deep Learning Models27
Timely Detection and Mitigation of Stealthy DDoS Attacks via IoT Networks27
CD-VulD: Cross-Domain Vulnerability Discovery Based on Deep Domain Adaptation26
EnsembleHMD: Accurate Hardware Malware Detectors with Specialized Ensemble Classifiers26
A Fake Online Repository Generation Engine for Cyber Deception26
SSHC: A Secure and Scalable Hybrid Consensus Protocol for Sharding Blockchains With a Formal Security Framework26
Enabling Secure and Efficient Decentralized Storage Auditing With Blockchain25
Efficient Certificateless Multi-Copy Integrity Auditing Scheme Supporting Data Dynamics25
Aggregation Service for Federated Learning: An Efficient, Secure, and More Resilient Realization25
An Automatic Attribute-Based Access Control Policy Extraction From Access Logs25
A Privacy-Preserving Framework for Outsourcing Location-Based Services to the Cloud24
Enabling Privacy-Preserving Shortest Distance Queries on Encrypted Graph Data24
Dynamic Group-Oriented Provable Data Possession in the Cloud24
Efficient Fine-Grained Data Sharing Mechanism for Electronic Medical Record Systems with Mobile Devices24
Denoising in the Dark: Privacy-Preserving Deep Neural Network-Based Image Denoising24
You Can Access but You Cannot Leak: Defending Against Illegal Content Redistribution in Encrypted Cloud Media Center24
Making Convolutions Resilient Via Algorithm-Based Error Detection Techniques23
Non-Interactive Multi-Client Searchable Encryption: Realization and Implementation23
Detection and Defense of Cache Pollution Attacks Using Clustering in Named Data Networks23
Multi-Client Sub-Linear Boolean Keyword Searching for Encrypted Cloud Storage with Owner-Enforced Authorization23
Efficient and Privacy-Preserving Ridesharing Organization for Transferable and Non-Transferable Services23
A Machine Learning-Based Intrusion Detection System for Securing Remote Desktop Connections to Electronic Flight Bag Servers23
Detection and Forensics against Stealthy Data Falsification in Smart Metering Infrastructure23
I Sense You by Breath: Speaker Recognition via Breath Biometrics22
Anomaly Detection in Operating System Logs with Deep Learning-Based Sentiment Analysis22
Achieving Efficient and Privacy-Preserving Exact Set Similarity Search over Encrypted Data22
DiLSe: Lattice-Based Secure and Dependable Data Dissemination Scheme for Social Internet of Vehicles22
Lightweight and Certificateless Multi-Receiver Secure Data Transmission Protocol for Wireless Body Area Networks22
Design and Evaluation of a Reconfigurable ECU Architecture for Secure and Dependable Automotive CPS22
Security Model of Authentication at the Physical Layer and Performance Analysis over Fading Channels21
On High-Speed Flow-Based Intrusion Detection Using Snort-Compatible Signatures21
BPPS:Blockchain-Enabled Privacy-Preserving Scheme for Demand-Response Management in Smart Grid Environments21
DDCA: A Distortion Drift-Based Cost Assignment Method for Adaptive Video Steganography in the Transform Domain21
Design and Analysis of Secure and Dependable Automotive CPS: A Steer-by-Wire Case Study20
Inferring and Investigating IoT-Generated Scanning Campaigns Targeting a Large Network Telescope20
Efficient and Secure Attribute-Based Access Control With Identical Sub-Policies Frequently Used in Cloud Storage20
Linguistic Steganography Based on Adaptive Probability Distribution20
Safe is the New Smart: PUF-Based Authentication for Load Modification-Resistant Smart Meters20
Checking is Believing: Event-Aware Program Anomaly Detection in Cyber-Physical Systems20
Eunomia: Anonymous and Secure Vehicular Digital Forensics Based on Blockchain20
LoMar: A Local Defense Against Poisoning Attack on Federated Learning20
Secret-to-Image Reversible Transformation for Generative Steganography19
MADneSs: A Multi-Layer Anomaly Detection Framework for Complex Dynamic Systems19
BiMorphing: A Bi-Directional Bursting Defense against Website Fingerprinting Attacks19
Securely and Efficiently Outsourcing Decision Tree Inference19
Design, Analysis and Application of Embedded Resistive RAM Based Strong Arbiter PUF19
WF-MTD: Evolutionary Decision Method for Moving Target Defense Based on Wright-Fisher Process19
Automated Security Risk Identification Using AutomationML-Based Engineering Data19
An Integrated Privacy Preserving Attribute-Based Access Control Framework Supporting Secure Deduplication19
AWARE: Adaptive Wide-Area Replication for Fast and Resilient Byzantine Consensus18
Representing Fine-Grained Co-Occurrences for Behavior-Based Fraud Detection in Online Payment Services18
Dual Watermarking for Security of COVID-19 Patient Record18
Group Signatures with Time-Bound Keys Revisited: A New Model, an Efficient Construction, and its Implementation18
Crypt-DAC: Cryptographically Enforced Dynamic Access Control in the Cloud18
Verifying and Monitoring IoTs Network Behavior Using MUD Profiles18
Towards Public Verifiable and Forward-Privacy Encrypted Search by Using Blockchain17
A Large-Scale Empirical Study on the Vulnerability of Deployed IoT Devices17
Enabling Privacy-Preserving Geographic Range Query in Fog-Enhanced IoT Services17
Generating Adversarial Examples Against Machine Learning-Based Intrusion Detector in Industrial Control Systems17
Extending Attack Graphs to Represent Cyber-Attacks in Communication Protocols and Modern IT Networks17
zk-AuthFeed: Protecting Data Feed to Smart Contracts With Authenticated Zero Knowledge Proof17
VerSA: Verifiable Secure Aggregation for Cross-Device Federated Learning17
DatingSec: Detecting Malicious Accounts in Dating Apps Using a Content-Based Attention Network17
Forward and Backward Private DSSE for Range Queries17
Backdoor Attack on Machine Learning Based Android Malware Detectors17
Adaptive Steganalysis Based on Statistical Model of Quantized DCT Coefficients for JPEG Images17
EncodeORE: Reducing Leakage and Preserving Practicality in Order-Revealing Encryption16
DeepAG: Attack Graph Construction and Threats Prediction With Bi-Directional Deep Learning16
Adaptive Performance Anomaly Detection in Distributed Systems Using Online SVMs16
Multi-CDN: Towards Privacy in Content Delivery Networks16
Network Attack Surface: Lifting the Concept of Attack Surface to the Network Level for Evaluating Networks’ Resilience Against Zero-Day Attacks16
Decision Tree Evaluation on Sensitive Datasets for Secure e-Healthcare Systems16
Towards Incentive for Electrical Vehicles Demand Response With Location Privacy Guaranteeing in Microgrids16
Exploiting Dissent: Towards Fuzzing-Based Differential Black-Box Testing of TLS Implementations16
DL-FHMC: Deep Learning-Based Fine-Grained Hierarchical Learning Approach for Robust Malware Classification15
Exploiting an HMAC-SHA-1 Optimization to Speed up PBKDF215
Detecting and Mitigating DDoS Attacks in SDN Using Spatial-Temporal Graph Convolutional Network15
Cross-Rack-Aware Single Failure Recovery for Clustered File Systems15
IoVCom: Reliable Comprehensive Communication System for Internet of Vehicles15
Toward Verifiable and Privacy Preserving Machine Learning Prediction15
MANDA: On Adversarial Example Detection for Network Intrusion Detection System15
Towards Practical and Privacy-Preserving Multi-Dimensional Range Query Over Cloud15
Towards an Interpretable Autoencoder: A Decision-Tree-Based Autoencoder and its Application in Anomaly Detection15
Decentralized Privacy-Preserving Fair Exchange Scheme for V2G Based on Blockchain15
Achieving Privacy-Preserving Online Diagnosis With Outsourced SVM in Internet of Medical Things Environment15
A Knowledge Transfer-based Semi-Supervised Federated Learning for IoT Malware Detection15
Perceptual Image Hashing With Locality Preserving Projection for Copy Detection15
Efficient Private Comparison Queries Over Encrypted Databases Using Fully Homomorphic Encryption With Finite Fields14
Tracking Normalized Network Traffic Entropy to Detect DDoS Attacks in P414
An Automated Multi-Tab Website Fingerprinting Attack14
Enabling (End-to-End) Encrypted Cloud Emails With Practical Forward Secrecy14
Eight Years of Rider Measurement in the Android Malware Ecosystem14
Modeling and Defense of Social Virtual Reality Attacks Inducing Cybersickness14
On the Performance of Detecting Injection of Fabricated Messages into the CAN Bus14
Monitoring-Based Differential Privacy Mechanism Against Query Flooding-Based Model Extraction Attack14
Design and Analysis of Adaptive Graph-Based Cancelable Multi-Biometrics Approach14
Applying Chaos Theory for Runtime Hardware Trojan Monitoring and Detection14
Sensitive Label Privacy Preservation with Anatomization for Data Publishing14
EBCPA: Efficient Blockchain-based Conditional Privacy-preserving Authentication for VANETs14
Stopping Memory Disclosures via Diversification and Replicated Execution14
Design and Evaluation of a Multi-Domain Trojan Detection Method on Deep Neural Networks14
Oracle-Supported Dynamic Exploit Generation for Smart Contracts14
Bilateral Privacy-Preserving Utility Maximization Protocol in Database-Driven Cognitive Radio Networks14
MARP: A Distributed MAC Layer Attack Resistant Pseudonym Scheme for VANET14
Towards a New Thermal Monitoring Based Framework for Embedded CPS Device Security14
Ants can Carry Cheese: Secure and Private RFID-Enabled Third-Party Distribution14
Novel Protocols to Mitigate Network Slice Topology Learning Attacks and Protect Privacy of Users’ Service Access Behavior in Softwarized 5G Networks13
A New Robust Reference Image Hashing System13
Minimax Approximation of Sign Function by Composite Polynomial for Homomorphic Comparison13
LP-SBA-XACML: Lightweight Semantics Based Scheme Enabling Intelligent Behavior-Aware Privacy for IoT13
A Differentially Private Federated Learning Model against Poisoning Attacks in Edge Computing13
Fee-Free Pooled Mining for Countering Pool-Hopping Attack in Blockchain13
Harnessing Policy Authenticity for Hidden Ciphertext Policy Attribute-Based Encryption13
Service Outsourcing in F2C Architecture with Attribute-based Anonymous Access Control and Bounded Service Number13
A Lightweight Privacy Preservation Scheme with Efficient Reputation Management for Mobile Crowdsensing in Vehicular Networks13
How About Bug-Triggering Paths? - Understanding and Characterizing Learning-Based Vulnerability Detectors13
Building a Secure Knowledge Marketplace Over Crowdsensed Data Streams13
Sanitizable Access Control System for Secure Cloud Storage Against Malicious Data Publishers13
Fog-to-MultiCloud Cooperative Ehealth Data Management With Application-Aware Secure Deduplication13
Multi-User Dynamic Searchable Symmetric Encryption With Corrupted Participants13
Achieve Efficient and Privacy-Preserving Disease Risk Assessment Over Multi-Outsourced Vertical Datasets13
USMD: UnSupervised Misbehaviour Detection for Multi-Sensor Data12
ALI: Anonymous Lightweight Inter-Vehicle Broadcast Authentication with Encryption12
Detection and Classification of Botnet Traffic using Deep Learning with Model Explanation12
Performability of Network Service Chains: Stochastic Modeling and Assessment of Softwarized IP Multimedia Subsystem12
Identity-Based Provable Data Possession From RSA Assumption for Secure Cloud Storage12
xFuzz: Machine Learning Guided Cross-Contract Fuzzing12
XAuth: Efficient Privacy-Preserving Cross-Domain Authentication12
ExGen: Cross-platform, Automated Exploit Generation for Smart Contract Vulnerabilities12
A Lightweight and Conditional Privacy-Preserving Authenticated Key Agreement Scheme With Multi-TA Model for Fog-Based VANETs12
"Seeing is not Always Believing": Detecting Perception Error Attacks Against Autonomous Vehicles12
UCoin: An Efficient Privacy Preserving Scheme for Cryptocurrencies12
Protecting Decision Boundary of Machine Learning Model With Differentially Private Perturbation12
Enabling Verifiable Privacy-Preserving Multi-Type Data Aggregation in Smart Grids12
SuperSketch: A Multi-Dimensional Reversible Data Structure for Super Host Identification12
Data-Driven Spectrum Trading with Secondary Users’ Differential Privacy Preservation12
A Secure Cloud Data Sharing Protocol for Enterprise Supporting Hierarchical Keyword Search12
Adversarial Robustness of Deep Neural Networks: A Survey from a Formal Verification Perspective12
Sustainable Ensemble Learning Driving Intrusion Detection Model11
Eurus: Towards an Efficient Searchable Symmetric Encryption With Size Pattern Protection11
Towards Lightweight Authentication and Batch Verification Scheme in IoV11
Randomized Security Patrolling for Link Flooding Attack Detection11
NN-EMD: Efficiently Training Neural Networks Using Encrypted Multi-Sourced Datasets11
Leveraging Network Functions Virtualization Orchestrators to Achieve Software-Defined Access Control in the Clouds11
Efficient Analysis of Repairable Computing Systems Subject to Scheduled Checkpointing11
Decentralized Self-Auditing Scheme With Errors Localization for Multi-Cloud Storage11
Differentially Private Publication of Vertically Partitioned Data11
Defending Against Membership Inference Attacks With High Utility by GAN11
Disclose More and Risk Less: Privacy Preserving Online Social Network Data Sharing11
AS2T: Arbitrary Source-To-Target Adversarial Attack on Speaker Recognition Systems11
HIBEChain: A Hierarchical Identity-Based Blockchain System for Large-Scale IoT11
Poirot: Causal Correlation Aided Semantic Analysis for Advanced Persistent Threat Detection11
SecRec: A Privacy-Preserving Method for the Context-Aware Recommendation System11
Authenticated Medical Documents Releasing with Privacy Protection and Release Control11
Automated Firewall Configuration in Virtual Networks11
Leakage-Resilient Authenticated Key Exchange for Edge Artificial Intelligence11
RevFRF: Enabling Cross-Domain Random Forest Training With Revocable Federated Learning11
POWER-SUPPLaY: Leaking Sensitive Data From Air-Gapped, Audio-Gapped Systems by Turning the Power Supplies into Speakers11
Impact of Service Function Aging on the Dependability for MEC Service Function Chain11
Enabling Efficient, Secure and Privacy-Preserving Mobile Cloud Storage11
Man-in-the-Middle Attack on Contactless Payment over NFC Communications: Design, Implementation, Experiments and Detection11
Session Invariant EEG Signatures using Elicitation Protocol Fusion and Convolutional Neural Network11
Practical Encrypted Network Traffic Pattern Matching for Secure Middleboxes11
Golden Grain: Building a Secure and Decentralized Model Marketplace for MLaaS10
Toward a Secure, Rich, and Fair Query Service for Light Clients on Public Blockchains10
Privacy-Preserving Location-Based Services Query Scheme Against Quantum Attacks10
Using Metrics Suites to Improve the Measurement of Privacy in Graphs10
An Electronic Voting Scheme Based on Revised-SVRM and Confirmation Numbers10
Agora: A Privacy-Aware Data Marketplace10
Speech Sanitizer: Speech Content Desensitization and Voice Anonymization10
0.02993106842041