IEEE Transactions on Dependable and Secure Computing

Papers
(The H4-Index of IEEE Transactions on Dependable and Secure Computing is 45. The table below lists those papers that are above that threshold based on CrossRef citation counts [max. 250 papers]. The publications cover those that have been published in the past four years, i.e., from 2021-06-01 to 2025-06-01.)
ArticleCitations
Defeating Data Plane Attacks With Program Obfuscation349
AnoPay: Anonymous Payment for Vehicle Parking With Updatable Credential187
Provably-Secure One-Message Unilateral Entity Authentication Schemes174
Mules and Permission Laundering in Android: Dissecting Custom Permissions in the Wild132
SwiftParade: Anti-Burst Multipath Validation126
Caught-in-Translation (CiT): Detecting Cross-Level Inconsistency Attacks in Network Functions Virtualization (NFV)126
The Perils of Wi-Fi Spoofing Attack Via Geolocation API and Its Defense114
Towards a New Thermal Monitoring Based Framework for Embedded CPS Device Security111
R2E: A Decentralized Scheme for Rewarding Tor Relays With Cryptocurrencies105
Enhancing Sybil Detection via Social-Activity Networks: A Random Walk Approach101
On the Detection of Smart, Self-Propagating Internet Worms94
Differentially Oblivious Two-Party Pattern Matching With Sublinear Round Complexity85
Window Canaries: Re-Thinking Stack Canaries for Architectures With Register Windows81
iQuery: A Trustworthy and Scalable Blockchain Analytics Platform78
Sharing Can be Threatening: Uncovering Security Flaws of RBAC Model on Smart Home Platforms76
FedPA: Generator-Based Heterogeneous Federated Prototype Adversarial Learning75
pSafety: Privacy-Preserving Safety Monitoring in Online Ride Hailing Services74
Chained HotStuff Under Performance Attack74
Optimization-Time Analysis for Cybersecurity74
Heterogeneous Domain Adaptation for Multistream Classification on Cyber Threat Data72
An Effective and Resilient Backdoor Attack Framework against Deep Neural Networks and Vision Transformers72
MTD-AD: Moving Target Defense as Adversarial Defense70
A Comparative Analysis of Software Aging in Image Classifiers on Cloud and Edge69
A Temporal Chrominance Trigger for Clean-Label Backdoor Attack Against Anti-Spoof Rebroadcast Detection65
OFIDS : Online Learning-Enabled and Fingerprint-Based Intrusion Detection System in Controller Area Networks64
Semantic-Preserving Linguistic Steganography by Pivot Translation and Semantic-Aware Bins Coding64
Split Learning without Local Weight Sharing To Enhance Client-side Data Privacy60
ABATe: Automatic Behavioral Abstraction Technique to Detect Anomalies in Smart Cyber-Physical Systems60
Ensuring State Continuity for Confidential Computing: A Blockchain-Based Approach59
Perceptual Image Hashing With Locality Preserving Projection for Copy Detection59
Steganography With Generated Images: Leveraging Volatility to Enhance Security59
Constructing Immune-Cover for Improving Holistic Security of Spatial Adaptive Steganography58
CoinLayering: An Efficient Coin Mixing Scheme for Large Scale Bitcoin Transactions57
Proactive Anti-Eavesdropping With Trap Deployment in Wireless Networks55
Design Principles for Orthogonal Moments in Video Watermarking54
Feature Reconstruction Attacks and Countermeasures of DNN Training in Vertical Federated Learning53
SG-Audit: An Efficient and Robust Cloud Auditing Scheme for Smart Grid53
Harnessing Policy Authenticity for Hidden Ciphertext Policy Attribute-Based Encryption53
Malicious-Resistant Non-Interactive Verifiable Aggregation for Federated Learning51
DBFT: A Byzantine Fault Tolerance Protocol With Graceful Performance Degradation51
Speech Sanitizer: Speech Content Desensitization and Voice Anonymization50
RiskProp: Account Risk Rating on Ethereum via De-anonymous Score and Network Propagation47
RDP-GAN: A Rényi-Differential Privacy Based Generative Adversarial Network47
Fully Accountable Data Sharing for Pay-as-You-Go Cloud Scenes46
Adaptive HEVC Steganography Based on Steganographic Compression Efficiency Degradation Model46
Securely Outsourcing Neural Network Inference to the Cloud With Lightweight Techniques45
Secure and Scalable Cross-Domain Data Sharing in Zero-Trust Cloud-Edge-End Environment Based on Sharding Blockchain45
BIOWISH: Biometric Recognition Using Wearable Inertial Sensors Detecting Heart Activity45
0.83585906028748