IEEE Transactions on Dependable and Secure Computing

Papers
(The H4-Index of IEEE Transactions on Dependable and Secure Computing is 48. The table below lists those papers that are above that threshold based on CrossRef citation counts [max. 250 papers]. The publications cover those that have been published in the past four years, i.e., from 2021-09-01 to 2025-09-01.)
ArticleCitations
Provably-Secure One-Message Unilateral Entity Authentication Schemes403
SwiftParade: Anti-Burst Multipath Validation195
Towards a New Thermal Monitoring Based Framework for Embedded CPS Device Security191
Enhancing Sybil Detection via Social-Activity Networks: A Random Walk Approach145
R2E: A Decentralized Scheme for Rewarding Tor Relays With Cryptocurrencies145
Differentially Oblivious Two-Party Pattern Matching With Sublinear Round Complexity122
Window Canaries: Re-Thinking Stack Canaries for Architectures With Register Windows118
iQuery: A Trustworthy and Scalable Blockchain Analytics Platform116
Sharing Can be Threatening: Uncovering Security Flaws of RBAC Model on Smart Home Platforms107
FedPA: Generator-Based Heterogeneous Federated Prototype Adversarial Learning103
An Effective and Resilient Backdoor Attack Framework against Deep Neural Networks and Vision Transformers99
SVOC: Secure Aggregatable and Extractable System for Outsourced Cloud Computation91
ABATe: Automatic Behavioral Abstraction Technique to Detect Anomalies in Smart Cyber-Physical Systems90
Steganography With Generated Images: Leveraging Volatility to Enhance Security87
Ensuring State Continuity for Confidential Computing: A Blockchain-Based Approach87
Constructing Immune-Cover for Improving Holistic Security of Spatial Adaptive Steganography81
Chained HotStuff Under Performance Attack81
OFIDS : Online Learning-Enabled and Fingerprint-Based Intrusion Detection System in Controller Area Networks79
FishboneChain: A Scalable and Liquidity-Guaranteed Crowdsourcing Platform based on Multiple Child Chains79
Caught-in-Translation (CiT): Detecting Cross-Level Inconsistency Attacks in Network Functions Virtualization (NFV)78
Defeating Data Plane Attacks With Program Obfuscation73
DBFT: A Byzantine Fault Tolerance Protocol With Graceful Performance Degradation72
pSafety: Privacy-Preserving Safety Monitoring in Online Ride Hailing Services70
Perceptual Image Hashing With Locality Preserving Projection for Copy Detection70
Design Principles for Orthogonal Moments in Video Watermarking68
Adaptive HEVC Steganography Based on Steganographic Compression Efficiency Degradation Model67
Heterogeneous Domain Adaptation for Multistream Classification on Cyber Threat Data66
Proactive Anti-Eavesdropping With Trap Deployment in Wireless Networks66
Online Streaming Sampling Publication Method Over Sliding Windows With Differential Privacy65
SG-Audit: An Efficient and Robust Cloud Auditing Scheme for Smart Grid65
Optimization-Time Analysis for Cybersecurity65
Harnessing Policy Authenticity for Hidden Ciphertext Policy Attribute-Based Encryption64
SpADe: Multi-Stage Spam Account Detection for Online Social Networks64
AnoPay: Anonymous Payment for Vehicle Parking With Updatable Credential62
The Perils of Wi-Fi Spoofing Attack Via Geolocation API and Its Defense59
RMAAC: Joint Markov Games and Robust Multiagent Actor-Critic for Explainable Malware Defense in Social IoT58
Semantic-Preserving Linguistic Steganography by Pivot Translation and Semantic-Aware Bins Coding57
Malicious-Resistant Non-Interactive Verifiable Aggregation for Federated Learning56
BIOWISH: Biometric Recognition Using Wearable Inertial Sensors Detecting Heart Activity56
Pre-Trained Model-Based Automated Software Vulnerability Repair: How Far are We?55
Feature Reconstruction Attacks and Countermeasures of DNN Training in Vertical Federated Learning55
RiskProp: Account Risk Rating on Ethereum via De-anonymous Score and Network Propagation54
Enhancing Online Transaction Fraud Detection via Heterogeneous Source Models53
RDP-GAN: A Rényi-Differential Privacy Based Generative Adversarial Network53
Speech Sanitizer: Speech Content Desensitization and Voice Anonymization52
Split Learning without Local Weight Sharing To Enhance Client-side Data Privacy51
Replay-resistant Few-shot Disk Authentication using Electromagnetic Fingerprint49
Securely Outsourcing Neural Network Inference to the Cloud With Lightweight Techniques49
A Comparative Analysis of Software Aging in Image Classifiers on Cloud and Edge48
Mules and Permission Laundering in Android: Dissecting Custom Permissions in the Wild48
FedTracker: Furnishing Ownership Verification and Traceability for Federated Learning Model48
Secure and Scalable Cross-Domain Data Sharing in Zero-Trust Cloud-Edge-End Environment Based on Sharding Blockchain48
0.048779964447021