IEEE Transactions on Dependable and Secure Computing

Papers
(The H4-Index of IEEE Transactions on Dependable and Secure Computing is 57. The table below lists those papers that are above that threshold based on CrossRef citation counts [max. 250 papers]. The publications cover those that have been published in the past four years, i.e., from 2022-05-01 to 2026-05-01.)
ArticleCitations
Sharing Can be Threatening: Uncovering Security Flaws of RBAC Model on Smart Home Platforms554
Window Canaries: Re-Thinking Stack Canaries for Architectures With Register Windows203
Provably-Secure One-Message Unilateral Entity Authentication Schemes174
SwiftParade: Anti-Burst Multipath Validation148
R2E: A Decentralized Scheme for Rewarding Tor Relays With Cryptocurrencies148
Differentially Oblivious Two-Party Pattern Matching With Sublinear Round Complexity135
CoinLayering: An Efficient Coin Mixing Scheme for Large Scale Bitcoin Transactions132
Ensuring State Continuity for Confidential Computing: A Blockchain-Based Approach126
iQuery: A Trustworthy and Scalable Blockchain Analytics Platform118
The Perils of Wi-Fi Spoofing Attack Via Geolocation API and Its Defense117
Pre-Trained Model-Based Automated Software Vulnerability Repair: How Far are We?106
Constructing Immune-Cover for Improving Holistic Security of Spatial Adaptive Steganography104
Semantic-Preserving Linguistic Steganography by Pivot Translation and Semantic-Aware Bins Coding100
Design Principles for Orthogonal Moments in Video Watermarking99
RDP-GAN: A Rényi-Differential Privacy Based Generative Adversarial Network99
An Effective and Resilient Backdoor Attack Framework Against Deep Neural Networks and Vision Transformers96
ABATe: Automatic Behavioral Abstraction Technique to Detect Anomalies in Smart Cyber-Physical Systems95
Enhancing Sybil Detection via Social-Activity Networks: A Random Walk Approach92
A Comparative Analysis of Software Aging in Image Classifiers on Cloud and Edge90
RMAAC: Joint Markov Games and Robust Multiagent Actor-Critic for Explainable Malware Defense in Social IoT89
When Unknown Threat Meets Label Noise: A Self-Correcting Framework86
Malicious-Resistant Non-Interactive Verifiable Aggregation for Federated Learning82
Towards Privacy-Preserving Top-k Location-Based Dominating Queries over Encrypted Data81
FedPA: Generator-Based Heterogeneous Federated Prototype Adversarial Learning81
Heterogeneous Domain Adaptation for Multistream Classification on Cyber Threat Data78
Split Learning Without Local Weight Sharing to Enhance Client-Side Data Privacy76
BOMAP: A Round-Efficient Construction of Oblivious Maps75
DBFT: A Byzantine Fault Tolerance Protocol With Graceful Performance Degradation74
A Secure and Reliable Privacy-Preserving Authentication Protocol for UAV–UAV Communications in IoT Systems74
Steganography With Generated Images: Leveraging Volatility to Enhance Security73
FedTracker: Furnishing Ownership Verification and Traceability for Federated Learning Model73
pSafety: Privacy-Preserving Safety Monitoring in Online Ride Hailing Services70
Securely Outsourcing Neural Network Inference to the Cloud With Lightweight Techniques70
EdgeGuard: Blockchain-Enhanced Secure Data Circulation via Aggregatable Distributed Key Generation69
Secure and Scalable Cross-Domain Data Sharing in Zero-Trust Cloud-Edge-End Environment Based on Sharding Blockchain68
Perceptual Image Hashing With Locality Preserving Projection for Copy Detection66
Defeating Data Plane Attacks With Program Obfuscation65
Model Backdoor Attack on Federated Learning Based on Parameter Analysis65
Caught-in-Translation (CiT): Detecting Cross-Level Inconsistency Attacks in Network Functions Virtualization (NFV)65
Lightweight Attribute-Based Matchmaking Encryption Scheme for Healthcare IoT65
FishboneChain: A Scalable and Liquidity-Guaranteed Crowdsourcing Platform Based on Multiple Child Chains64
Replay-Resistant Few-Shot Disk Authentication Using Electromagnetic Fingerprint64
Enhancing Online Transaction Fraud Detection via Heterogeneous Source Models64
On the Detection of Smart, Self-Propagating Internet Worms63
Optimization-Time Analysis for Cybersecurity63
Chained HotStuff Under Performance Attack62
Novel Bribery Mining Attacks: Impacts on Mining Ecosystem and the “Bribery Miner's Dilemma” in the Nakamoto-Style Blockchain System61
Proactive Anti-Eavesdropping With Trap Deployment in Wireless Networks61
AnoPay: Anonymous Payment for Vehicle Parking With Updatable Credential60
SG-Audit: An Efficient and Robust Cloud Auditing Scheme for Smart Grid60
MTD-AD: Moving Target Defense as Adversarial Defense60
SeVoAuth: Secure Voiceprint Authentication with Hash-based Feature Transformation59
BIOWISH: Biometric Recognition Using Wearable Inertial Sensors Detecting Heart Activity59
From Pixels to Trajectory: Universal Adversarial Example Detection via Temporal Imprints58
RiskProp: Account Risk Rating on Ethereum via De-anonymous Score and Network Propagation58
A Temporal Chrominance Trigger for Clean-Label Backdoor Attack Against Anti-Spoof Rebroadcast Detection57
SpADe: Multi-Stage Spam Account Detection for Online Social Networks57
Coded Computing Meets Differential Privacy: Privacy-Preserving and Straggler-Resilient Distributed Machine Learning57
Harnessing Policy Authenticity for Hidden Ciphertext Policy Attribute-Based Encryption57
Feature Reconstruction Attacks and Countermeasures of DNN Training in Vertical Federated Learning57
Online Streaming Sampling Publication Method Over Sliding Windows With Differential Privacy57
Mules and Permission Laundering in Android: Dissecting Custom Permissions in the Wild57
0.061758995056152