IEEE Transactions on Dependable and Secure Computing

Papers
(The H4-Index of IEEE Transactions on Dependable and Secure Computing is 47. The table below lists those papers that are above that threshold based on CrossRef citation counts [max. 250 papers]. The publications cover those that have been published in the past four years, i.e., from 2021-08-01 to 2025-08-01.)
ArticleCitations
Provably-Secure One-Message Unilateral Entity Authentication Schemes391
SwiftParade: Anti-Burst Multipath Validation192
Towards a New Thermal Monitoring Based Framework for Embedded CPS Device Security188
R2E: A Decentralized Scheme for Rewarding Tor Relays With Cryptocurrencies142
Enhancing Sybil Detection via Social-Activity Networks: A Random Walk Approach140
On the Detection of Smart, Self-Propagating Internet Worms120
Differentially Oblivious Two-Party Pattern Matching With Sublinear Round Complexity116
Window Canaries: Re-Thinking Stack Canaries for Architectures With Register Windows114
iQuery: A Trustworthy and Scalable Blockchain Analytics Platform102
Sharing Can be Threatening: Uncovering Security Flaws of RBAC Model on Smart Home Platforms101
FedPA: Generator-Based Heterogeneous Federated Prototype Adversarial Learning97
A Comparative Analysis of Software Aging in Image Classifiers on Cloud and Edge90
Mules and Permission Laundering in Android: Dissecting Custom Permissions in the Wild88
An Effective and Resilient Backdoor Attack Framework against Deep Neural Networks and Vision Transformers85
Semantic-Preserving Linguistic Steganography by Pivot Translation and Semantic-Aware Bins Coding83
SVOC: Secure Aggregatable and Extractable System for Outsourced Cloud Computation81
Feature Reconstruction Attacks and Countermeasures of DNN Training in Vertical Federated Learning80
MTD-AD: Moving Target Defense as Adversarial Defense77
A Temporal Chrominance Trigger for Clean-Label Backdoor Attack Against Anti-Spoof Rebroadcast Detection76
Split Learning without Local Weight Sharing To Enhance Client-side Data Privacy74
ABATe: Automatic Behavioral Abstraction Technique to Detect Anomalies in Smart Cyber-Physical Systems73
Ensuring State Continuity for Confidential Computing: A Blockchain-Based Approach70
Steganography With Generated Images: Leveraging Volatility to Enhance Security69
Chained HotStuff Under Performance Attack66
Constructing Immune-Cover for Improving Holistic Security of Spatial Adaptive Steganography66
FishboneChain: A Scalable and Liquidity-Guaranteed Crowdsourcing Platform based on Multiple Child Chains65
Caught-in-Translation (CiT): Detecting Cross-Level Inconsistency Attacks in Network Functions Virtualization (NFV)65
OFIDS : Online Learning-Enabled and Fingerprint-Based Intrusion Detection System in Controller Area Networks65
Defeating Data Plane Attacks With Program Obfuscation64
DBFT: A Byzantine Fault Tolerance Protocol With Graceful Performance Degradation64
Perceptual Image Hashing With Locality Preserving Projection for Copy Detection63
pSafety: Privacy-Preserving Safety Monitoring in Online Ride Hailing Services62
AnoPay: Anonymous Payment for Vehicle Parking With Updatable Credential60
The Perils of Wi-Fi Spoofing Attack Via Geolocation API and Its Defense59
CoinLayering: An Efficient Coin Mixing Scheme for Large Scale Bitcoin Transactions58
Online Streaming Sampling Publication Method Over Sliding Windows With Differential Privacy58
FedTracker: Furnishing Ownership Verification and Traceability for Federated Learning Model56
Secure and Scalable Cross-Domain Data Sharing in Zero-Trust Cloud-Edge-End Environment Based on Sharding Blockchain55
Design Principles for Orthogonal Moments in Video Watermarking55
SG-Audit: An Efficient and Robust Cloud Auditing Scheme for Smart Grid54
Adaptive HEVC Steganography Based on Steganographic Compression Efficiency Degradation Model53
BIOWISH: Biometric Recognition Using Wearable Inertial Sensors Detecting Heart Activity52
Proactive Anti-Eavesdropping With Trap Deployment in Wireless Networks51
Heterogeneous Domain Adaptation for Multistream Classification on Cyber Threat Data51
Optimization-Time Analysis for Cybersecurity50
SpADe: Multi-Stage Spam Account Detection for Online Social Networks50
Pre-Trained Model-Based Automated Software Vulnerability Repair: How Far are We?48
Harnessing Policy Authenticity for Hidden Ciphertext Policy Attribute-Based Encryption47
Securely Outsourcing Neural Network Inference to the Cloud With Lightweight Techniques47
0.4520890712738