IEEE Transactions on Dependable and Secure Computing

Papers
(The TQCC of IEEE Transactions on Dependable and Secure Computing is 11. The table below lists those papers that are above that threshold based on CrossRef citation counts [max. 250 papers]. The publications cover those that have been published in the past four years, i.e., from 2022-05-01 to 2026-05-01.)
ArticleCitations
Sharing Can be Threatening: Uncovering Security Flaws of RBAC Model on Smart Home Platforms554
Window Canaries: Re-Thinking Stack Canaries for Architectures With Register Windows203
Provably-Secure One-Message Unilateral Entity Authentication Schemes174
SwiftParade: Anti-Burst Multipath Validation148
R2E: A Decentralized Scheme for Rewarding Tor Relays With Cryptocurrencies148
Differentially Oblivious Two-Party Pattern Matching With Sublinear Round Complexity135
CoinLayering: An Efficient Coin Mixing Scheme for Large Scale Bitcoin Transactions132
Ensuring State Continuity for Confidential Computing: A Blockchain-Based Approach126
iQuery: A Trustworthy and Scalable Blockchain Analytics Platform118
The Perils of Wi-Fi Spoofing Attack Via Geolocation API and Its Defense117
Pre-Trained Model-Based Automated Software Vulnerability Repair: How Far are We?106
Constructing Immune-Cover for Improving Holistic Security of Spatial Adaptive Steganography104
Semantic-Preserving Linguistic Steganography by Pivot Translation and Semantic-Aware Bins Coding100
Design Principles for Orthogonal Moments in Video Watermarking99
RDP-GAN: A Rényi-Differential Privacy Based Generative Adversarial Network99
An Effective and Resilient Backdoor Attack Framework Against Deep Neural Networks and Vision Transformers96
ABATe: Automatic Behavioral Abstraction Technique to Detect Anomalies in Smart Cyber-Physical Systems95
Enhancing Sybil Detection via Social-Activity Networks: A Random Walk Approach92
A Comparative Analysis of Software Aging in Image Classifiers on Cloud and Edge90
RMAAC: Joint Markov Games and Robust Multiagent Actor-Critic for Explainable Malware Defense in Social IoT89
When Unknown Threat Meets Label Noise: A Self-Correcting Framework86
Malicious-Resistant Non-Interactive Verifiable Aggregation for Federated Learning82
Towards Privacy-Preserving Top-k Location-Based Dominating Queries over Encrypted Data81
FedPA: Generator-Based Heterogeneous Federated Prototype Adversarial Learning81
Heterogeneous Domain Adaptation for Multistream Classification on Cyber Threat Data78
Split Learning Without Local Weight Sharing to Enhance Client-Side Data Privacy76
BOMAP: A Round-Efficient Construction of Oblivious Maps75
A Secure and Reliable Privacy-Preserving Authentication Protocol for UAV–UAV Communications in IoT Systems74
DBFT: A Byzantine Fault Tolerance Protocol With Graceful Performance Degradation74
Steganography With Generated Images: Leveraging Volatility to Enhance Security73
FedTracker: Furnishing Ownership Verification and Traceability for Federated Learning Model73
Securely Outsourcing Neural Network Inference to the Cloud With Lightweight Techniques70
pSafety: Privacy-Preserving Safety Monitoring in Online Ride Hailing Services70
EdgeGuard: Blockchain-Enhanced Secure Data Circulation via Aggregatable Distributed Key Generation69
Secure and Scalable Cross-Domain Data Sharing in Zero-Trust Cloud-Edge-End Environment Based on Sharding Blockchain68
Perceptual Image Hashing With Locality Preserving Projection for Copy Detection66
Model Backdoor Attack on Federated Learning Based on Parameter Analysis65
Caught-in-Translation (CiT): Detecting Cross-Level Inconsistency Attacks in Network Functions Virtualization (NFV)65
Lightweight Attribute-Based Matchmaking Encryption Scheme for Healthcare IoT65
Defeating Data Plane Attacks With Program Obfuscation65
Replay-Resistant Few-Shot Disk Authentication Using Electromagnetic Fingerprint64
Enhancing Online Transaction Fraud Detection via Heterogeneous Source Models64
FishboneChain: A Scalable and Liquidity-Guaranteed Crowdsourcing Platform Based on Multiple Child Chains64
On the Detection of Smart, Self-Propagating Internet Worms63
Optimization-Time Analysis for Cybersecurity63
Chained HotStuff Under Performance Attack62
Novel Bribery Mining Attacks: Impacts on Mining Ecosystem and the “Bribery Miner's Dilemma” in the Nakamoto-Style Blockchain System61
Proactive Anti-Eavesdropping With Trap Deployment in Wireless Networks61
AnoPay: Anonymous Payment for Vehicle Parking With Updatable Credential60
SG-Audit: An Efficient and Robust Cloud Auditing Scheme for Smart Grid60
MTD-AD: Moving Target Defense as Adversarial Defense60
SeVoAuth: Secure Voiceprint Authentication with Hash-based Feature Transformation59
BIOWISH: Biometric Recognition Using Wearable Inertial Sensors Detecting Heart Activity59
From Pixels to Trajectory: Universal Adversarial Example Detection via Temporal Imprints58
RiskProp: Account Risk Rating on Ethereum via De-anonymous Score and Network Propagation58
Coded Computing Meets Differential Privacy: Privacy-Preserving and Straggler-Resilient Distributed Machine Learning57
Harnessing Policy Authenticity for Hidden Ciphertext Policy Attribute-Based Encryption57
Feature Reconstruction Attacks and Countermeasures of DNN Training in Vertical Federated Learning57
Online Streaming Sampling Publication Method Over Sliding Windows With Differential Privacy57
Mules and Permission Laundering in Android: Dissecting Custom Permissions in the Wild57
A Temporal Chrominance Trigger for Clean-Label Backdoor Attack Against Anti-Spoof Rebroadcast Detection57
SpADe: Multi-Stage Spam Account Detection for Online Social Networks57
M&M: Secure Two-Party Machine Learning Through Modulus Conversion and Mixed-Mode Protocols56
PSA: Private Set Alignment for Secure and Collaborative Analytics on Large-Scale Data55
SVOC: Secure Aggregatable and Extractable System for Outsourced Cloud Computation54
A Controllable, Publicly Auditable, and Redactable Blockchain With a Main–Auxiliary Architecture53
OFIDS : Online Learning-Enabled and Fingerprint-Based Intrusion Detection System in Controller Area Networks53
Adaptive HEVC Steganography Based on Steganographic Compression Efficiency Degradation Model53
Mercury: Practical Cross-Chain Exchange via Trusted Hardware53
On the Security of Secure Keyword Search and Data Sharing Mechanism for Cloud Computing52
CryptoRec: Novel Collaborative Filtering Recommender Made Privacy-Preserving Easy52
HDWSA2: A Secure Hierarchical Deterministic Wallet Supporting Stealth Address and Signature Aggregation52
SHIELD: Thwarting Code Authorship Attribution51
VeriCache: Formally Verified Fine-Grained Partitioned Cache for Side-Channel-Secure Enclaves51
MISP: An Efficient Quantum-Resistant Misbehavior Preventing Scheme With Self-Enforcement for Vehicle-to-Everything51
Enhancing Secure Cloud Data Sharing: Dynamic User Groups and Outsourced Decryption51
srTLS: Secure TLS Handshake on Corrupted Machines50
PriDFL: Computation-optimized Secure Aggregation with Byzantine-resilient in Decentralized Federated Learning50
Smaug: A TEE-Assisted Secured SQLite for Embedded Systems50
LocGuard: A Location Privacy Defender for Image Sharing49
A Comprehensive Study on GDPR-Oriented Analysis of Privacy Policies: Taxonomy, Corpus and GDPR Concept Classifiers49
Anomaly Detection in Industrial Control Systems Based on Cross-Domain Representation Learning49
Towards Neural Network-Based Communication System: Attack and Defense48
Resisting Compromise in Remote Swarm Attestation: Dependable and Secure Key Computation for Prover and Verifier48
Design for Assurance: Employing Functional Verification Tools for Thwarting Hardware Trojan Threat in 3PIPs47
AttMark: Attention Based Model Watermarking Against Stealing Attacks47
Untargeted Poisoning Membership Inference With Sample Selection and Enhancement46
Artemis: Defending Against Backdoor Attacks via Distribution Shift46
A Systematic Methodology to Compute the Quantum Vulnerability Factors for Quantum Circuits45
CMI: Client-Targeted Membership Inference in Federated Learning45
Collusion-Resistant and Time-Aware Co-Verification for Edge Data Integrity44
Efficient Cross-chain Framework for Privacy-Preserving and Auditable Data Retrieval44
Decentralized and Fair Trading Via Blockchain: The Journey So Far and the Road Ahead44
Nip in the Bud: Forecasting and Interpreting Post- Exploitation Attacks in Real-Time Through Cyber Threat Intelligence Reports44
Security-Enhanced Decentralized Conditional Privacy-Preserving Authentication in VANETs44
Attacking Deep Reinforcement Learning With Decoupled Adversarial Policy43
UC Secure Private Branching Program and Decision Tree Evaluation43
Studying the Robustness of Anti-Adversarial Federated Learning Models Detecting Cyberattacks in IoT Spectrum Sensors43
Matrix-Based Secret Sharing for Reversible Data Hiding in Encrypted Images43
From Isolation to Integration: A Reputation-Backed Auditable Model for Cohort Data Sharing43
Estimating Channel Knowledge for Robust Steganography42
Robust and Diversified Image Steganography Without Embedding Through a Disentanglement Autoencoder42
Holistic Implicit Factor Evaluation of Model Extraction Attacks42
SFI: A Practical and Efficient Backdoor Attack Framework against Split Learning42
Automated Analysis of Security Policy Violations in Helm Charts41
Incentive Mechanism Design for Collaborative Physical Layer Authentication: A Centralized Governance Approach41
Verifiable Homomorphic Secret Sharing for Low Degree Polynomials41
SAGA: Synthetic Audit Log Generation for APT Campaigns41
Two-Dimensional Privacy-Preserving Federated Learning Scheme Against Poisoning Attacks41
Decentralized Self-Auditing Multiple Cloud Storage in Compressed Provable Data Possession40
A Privacy-Preserving Graph Neural Network for Network Intrusion Detection40
How to Defend Against Large-Scale Model Poisoning Attacks in Federated Learning: A Vertical Solution40
Physical Layer Authentication Utilizing Beam Pattern Features in Millimeter-Wave MIMO Systems40
An Adaptive IPM-Based HEVC Video Steganography via Minimizing Non-Additive Distortion40
Privacy-Preserving Proxy Bilateral Access Control for Secure Data Forwarding40
MRSA: Mask Random Array Protocol for Efficient Secure Handover Authentication in 5G HetNets40
Model Reuse Through Retargeted-Architecture Binary Code Analysis40
Privacy Leakage in Wireless Charging40
A Scheme of Robust Privacy-Preserving Multi-Party Computation via Public Verification39
Message Control for Blockchain Rewriting39
SAFE: A General Secure and Fair Auction Framework for Wireless Markets With Privacy Preservation39
Privacy-Preserving Decision-Making Over Blockchain39
CherryPicker: A Parallel Solving and State Sharing Hybrid Fuzzing System39
Evolutionary Dynamic Database Partitioning Optimization for Privacy and Utility39
DE-Sword: Incentivized Verifiable Tag Path Query in RFID-Enabled Supply Chain Systems39
Generalized Local Optimality for Video Steganalysis in Motion Vector Domain39
Securing Symmetric Encryption Based on Substitution-Permutation Network Against White-Box Attacks38
AWDP-Automated Windows Domain Penetration Framework With Deep Reinforcement Learning38
Delegation Security Analysis in Workflow Systems38
Decentralized Self-Auditing Scheme With Errors Localization for Multi-Cloud Storage38
Weaknesses of Popular and Recent Covert Channel Detection Methods and a Remedy38
Leveraging CVAE Encoding for Backdoor Attacks in Few-Shot Learning With Prototypical Networks38
Accurate and Efficient Privacy-Preserving Feature Extraction on Encrypted Images38
Enabling Secure and Efficient Decentralized Storage Auditing With Blockchain38
Effectively Improving Data Diversity of Substitute Training for Data-Free Black-Box Attack38
Fine-Grained Poisoning Framework Against Federated Learning38
Efficient and Privacy-Preserving Weighted Range Set Sampling in Cloud38
SE#PCFG: Semantically Enhanced PCFG for Password Analysis and Cracking38
A Magnetic Signal Based Device Fingerprinting Scheme in Wireless Charging38
$\mathsf {JUMBO}$JUMBO: Fully Asynchronous BFT Consensus Made Truly Scalable38
Generative Image Steganography with Minimum-Distance Guidance37
Calibrated Uncertainty Estimation for Trustworthy Deep IoT Attack Detection37
Zoomer: An APT TTP Recognition System Via Deep & Wide Provenance Graph Learning37
ZeroProKeS: A Secure Zeroconf Key Establishment Protocol for Large-Scale Low-Cost Applications37
DAENet: Making Strong Anonymity Scale in a Fully Decentralized Network37
Low-Overhead Reversible Coherence Protocol37
Hierarchical GNN Message Passing for Node-Level Anomaly Detection in Industrial Control Systems36
AIIP-Chain: Fair Copyright Sharing With Credible Ownership Verification in AI Model Trading36
PPCA - Privacy-Preserving Collision Avoidance for Autonomous Unmanned Aerial Vehicles36
Sphinx: Certificateless Conditional Privacy-Preserving Authentication With Secure Transmission for VANETs36
UniQGAN: Towards Improved Modulation Classification With Adversarial Robustness Using Scalable Generator Design36
Rethinking Query Choices for Differential Privacy Auditing36
Anomaly Detection in Event-Triggered Traffic Time Series via Similarity Learning36
NarAdv: Natural-Style Physical Adversarial Attack on Traffic Sign Detection for Autonomous Vehicles35
EtherCloak: Enabling Multi-Level and Customized Privacy on Account-Model Blockchains35
PPTD: A Path Profiling-Based Threat Detection Method Toward Deployed Smart Contracts35
SHIELD - Secure Aggregation Against Poisoning in Hierarchical Federated Learning35
BASS: A Blockchain-Based Asynchronous SignSGD Architecture for Efficient and Secure Federated Learning34
Performability of Network Service Chains: Stochastic Modeling and Assessment of Softwarized IP Multimedia Subsystem34
2PCLGA: Privacy-Preserving and Provable-Secure Certificateless Group Key Agreement Scheme for the Distributed Learning-Based MEC Networks34
Quantitative Frequency-Based Framework for Interpreting Adversarial Examples34
Privacy-Preserving Network Embedding Against Private Link Inference Attacks34
TAFA: Blockchain-Based Integrating Genetic Algorithm and DQN for Secure File Allocation33
Mitigating Distributed DoS Attacks on Bandwidth Allocation for Federated Learning in Mobile Edge Networks33
Practical Encrypted Network Traffic Pattern Matching for Secure Middleboxes33
UniFLE: Uniform Fusion of Multiple LoRA Experts for Backdoor Defense in Large Language Models33
Semi-Supervised and Transfer Learning-Based Smart Contract Vulnerability Detection33
RRFuzzer: A Fuzzing Framework for Proprietary Industrial Control System Protocols using a Combination Strategy32
Practical Two-Factor Authentication Protocol for Real-Time Data Access in WSNs32
Spotting Anomalies at the Edge: Outlier Exposure-Based Cross-Silo Federated Learning for DDoS Detection32
Attacks and Countermeasures on Privacy-Preserving Biometric Authentication Schemes32
AVOID: Automated Void Detection in STL Files31
ValidCNN: A Large-Scale CNN Predictive Integrity Verification Scheme Based on zk-SNARK31
Diff-ID: An Explainable Identity Difference Quantification Framework for DeepFake Detection31
Multi-label Classification for Android Malware Based on Active Learning31
Is There A Bottom Line for Poisoning? Detecting High-Concealed Injection Attacks for Recommendation31
Privacy-Preserving Anomaly Detection of Encrypted Smart Contract for Blockchain-Based Data Trading31
Threshold Delegatable Anonymous Credentials With Controlled and Fine-Grained Delegation31
Automated Firewall Configuration in Virtual Networks31
SkillVet: Automated Traceability Analysis of Amazon Alexa Skills31
Chebyshev Polynomial Based Emergency Conditions With Authentication Scheme for 5G-Assisted Vehicular Fog Computing31
Attributed Graph Clustering in Collaborative Settings30
Building Confidential Accelerator Computing Environment for Arm CCA30
An Empirical Study of Fault Triggers in Deep Learning Frameworks30
Chuchu: A Hashlock Group Protocol for Cross-Chain Swaps29
PKVIC: Supplement Missing Software Package Information in Security Vulnerability Reports29
Exploiting Deep Neural Networks as Covert Channels29
Price TAG: Towards Semi-Automatically Discovery Tactics, Techniques and Procedures OF E-Commerce Cyber Threat Intelligence29
Public Proofs of Data Replication and Retrievability With User-Friendly Replication29
On Spatial-Provenance Recovery in Wireless Networks With Relaxed-Privacy Constraints29
Deep Learning for Coverage-Guided Fuzzing: How Far are We?29
Making Information Hiding Effective Again29
Universal Low Bit-Rate Speech Steganalysis Integrating Domain-Specific and Domain-Shared Knowledge28
BitBatSPIR: Efficient Batch Symmetric Private Information Retrieval From PSI28
Multiple Targets Directed Greybox Fuzzing28
Developing Attack Detection Models for Microservice Applications: A Comprehensive Framework and Its Illustration and Validation on DoS Attacks28
Comments on “VERSA: Verifiable Secure Aggregation for Cross-Device Federated Learning”28
DID We Miss Anything?: Towards Privacy-Preserving Decentralized ID Architecture27
Model of Execution Trace Obfuscation Between Threads27
Facial Data Minimization: Shallow Model as Your Privacy Filter27
An Efficient and Zero-Knowledge Classical Machine Learning Inference Pipeline27
Online Failure Prediction for Complex Systems: Methodology and Case Studies27
An Analytical and Empirical Investigation of Tag Partitioning for Energy-Efficient Reliable Cache27
Optimizing the Adversarial Perturbation with a Momentum-based Adaptive Matrix27
A Secure Computing System With Hardware-Efficient Lazy Bonsai Merkle Tree for FPGA-Attached Embedded Memory27
JANUS: A Difference-Oriented Analyzer for Financial Centralized Risks in Smart Contracts26
Trust Beyond Border: Lightweight, Verifiable User Isolation for Protecting In-Enclave Services26
Membership Inference Attacks Against Deep Learning Models via Logits Distribution26
Password-based Outsourced Data Protection for Cloud Storage Against Backdoor Attacks26
Precise Discovery of More Taint-Style Vulnerabilities in Embedded Firmware26
Privacy-Accountable Distributed Collaborative Authentication for Malicious Node Resistance in Vehicular Ad Hoc Networks26
Cooperating or Kicking Out: Defending Against Poisoning Attacks in Federated Learning via the Evolution of Cooperation26
Understanding User Passwords Through Parsing Tree26
Data Protection: Privacy-Preserving Data Collection With Validation26
PrivESD: A Privacy-Preserving Cloud-Edge Collaborative Logistic Regression Model Over Encrypted Streaming Data26
CPAKA: Mutual Authentication and Key Agreement Scheme Based on Conditional PUF in Space-Air-Ground Integrated Network26
kTCQ: Achieving Privacy-Preserving k-Truss Community Queries Over Outsourced Data26
EZchain: A Secure Scalable Blockchain Protocol via Passive Sharding26
Trusted Video Inpainting Localization via Deep Attentive Noise Learning26
Rethinking the Design of Backdoor Triggers and Adversarial Perturbations: A Color Space Perspective25
Blockchain-Based Secure Federated Learning With Improved Consensus Protocol and Personalized Differential Privacy25
An Efficient Multi-Level and Cross-Domain Conditional Anonymous Authentication Scheme in V2G25
Attack Hypotheses Generation Based on Threat Intelligence Knowledge Graph25
DIDO+: Data Provenance From Restricted TLS 1.3 Websites With Selective Disclosure25
Sine: Similarity is Not Enough for Mitigating Local Model Poisoning Attacks in Federated Learning25
SecDR: Enabling Secure, Efficient, and Accurate Data Recovery for Mobile Crowdsensing25
ACL: Account Linking in Online Social Networks With Robust Camera Fingerprint Matching25
No-Proof Consensus-Based Light Blockchain for Distributed Computing Scenarios25
SuperSketch: A Multi-Dimensional Reversible Data Structure for Super Host Identification25
Multivariate Time Series Anomaly Detection Using Learnable Spatial-Temporal Graph Ordinary Differential Equations Network25
FedDMC: Efficient and Robust Federated Learning via Detecting Malicious Clients25
SP $^{2}$ Join: Secure and Practical Multi-Table Pairwise Equi-Join Queries over Encrypted Databases25
T-Trace: Constructing the APTs Provenance Graphs Through Multiple Syslogs Correlation25
A Tor-based Anonymous Network Covert Channel25
Handling Labeled Data Insufficiency: Semi-supervised Learning with Self-Training Mixup Decision Tree for Classification of Network Attacking Traffic25
Decentralized Multi-Client Functional Encryption for Inner Product With Applications to Federated Learning25
Collaborative Prediction in Anti-Fraud System Over Multiple Credit Loan Platforms25
PIEDChecker: Uncover Permissions-Independent Emulation-Detection Methods in Android System25
Sorald: Automatic Patch Suggestions for SonarQube Static Analysis Violations24
Friendship Preference: Scalable and Robust Category of Features for Social Bot Detection24
Octopus: A Robust and Privacy-Preserving Scheme for Compressed Gradients in Federated Learning24
Mitigating Adversarial Attacks on Data-Driven Invariant Checkers for Cyber-Physical Systems24
HyperPS: A Virtual-Machine Memory Protection Approach Through Hypervisor's Privilege Separation24
An OpenRAN Security Framework for Scalable Authentication, Authorization, and Discovery of xApps With Isolated Critical Services24
An Unbounded Multi-Input Quadratic Functional Encryption Scheme for Secure Cloud-Based Machine Learning24
A Cloud-Assisted Multi-Dimensional Reputation Management Scheme with Privacy Preservation for Emergency Message Dissemination in VANETs24
Blockchain-Based Shared Data Integrity Auditing and Deduplication24
Private Reachability Queries on Structured Encrypted Temporal Bipartite Graphs24
Automatically Identifying CVE Affected Versions With Patches and Developer Logs24
Model Stability Defense Against Model Poisoning in Federated Learning24
0.15397191047668