IEEE Transactions on Dependable and Secure Computing

Papers
(The H4-Index of IEEE Transactions on Dependable and Secure Computing is 43. The table below lists those papers that are above that threshold based on CrossRef citation counts [max. 250 papers]. The publications cover those that have been published in the past four years, i.e., from 2021-04-01 to 2025-04-01.)
ArticleCitations
DNSGuard: In-Network Defense Against DNS Attacks327
IMS: Towards Computability and Dynamicity for Intent-Driven Micro-Segmentation177
Repairing Backdoor Model With Dynamic Gradient Clipping for Intelligent Vehicles165
Enabling Accurate and Efficient Privacy-Preserving Truth Discovery for Sparse Crowdsensing144
ASDIA: An Adversarial Sample to Preserve Privacy Program in Federated Learning132
Backdoored Sample Cleansing for Unlabeled Datasets Via Bootstrapped Dual Set Purification124
CuckooAttack: Towards Practical Backdoor Attack against Automatic Speech Recognition Systems122
An Effective and Resilient Backdoor Attack Framework against Deep Neural Networks and Vision Transformers116
On Detecting Route Hijacking Attack in Opportunistic Mobile Networks109
Guaranteeing Data Privacy in Federated Unlearning with Dynamic User Participation106
A Traceable and Revocable Ciphertext-Policy Attribute-based Encryption Scheme Based on Privacy Protection95
TreasureCache: Hiding Cache Evictions Against Side-Channel Attacks94
Adversarial Robustness of Deep Neural Networks: A Survey from a Formal Verification Perspective89
SwissLog: Robust Anomaly Detection and Localization for Interleaved Unstructured Logs79
Blockchain-Assisted Privacy-Preserving and Synchronized Key Agreement for VDTNs74
Differential Area Analysis for Ransomware: Attacks, Countermeasures, and Limitations73
MagShadow: Physical Adversarial Example Attacks via Electromagnetic Injection72
Using Parallel Techniques to Accelerate PCFG-based Password Cracking Attacks72
Linguistic Steganalysis Based on Few-shot Adversarial Training72
2021 Index IEEE Transactions on Dependable and Secure Computing Vol. 1871
CacheIEE: Cache-Assisted Isolated Execution Environment on ARM Multi-Core Platforms68
Secure and Scalable Cross-Domain Data Sharing in Zero-Trust Cloud-Edge-End Environment Based on Sharding Blockchain68
Detecting Inaudible Voice Commands via Acoustic Attenuation by Multi-channel Microphones68
Efficient Identity-Based Data Integrity Auditing With Key-Exposure Resistance for Cloud Storage66
ACA: Anonymous, Confidential and Auditable Transaction Systems for Blockchain63
Defending Against Membership Inference Attacks With High Utility by GAN62
OPRE: Towards Better Availability of PCNs Through Recovering61
FLAD: Byzantine-Robust Federated Learning Based on Gradient Feature Anomaly Detection59
Chained HotStuff Under Performance Attack59
TMT-FL: Enabling Trustworthy Model Training of Federated Learning with Malicious Participants55
RobustPFL: Robust Personalized Federated Learning55
PriDM: Effective and Universal Private Data Recovery via Diffusion Models54
Poisoning Attacks and Defenses to Learned Bloom Filters for Malicious URL Detection53
Highly Robust and Diverse Coverless Image Steganography Against Passive and Active Steganalysis52
FineBID: Fine-grained Protocol Reverse Engineering for Bit-level Field IDentification51
Achieving Efficient and Privacy-Preserving Neural Network Training and Prediction in Cloud Environments49
RevFRF: Enabling Cross-Domain Random Forest Training With Revocable Federated Learning49
SSHC: A Secure and Scalable Hybrid Consensus Protocol for Sharding Blockchains With a Formal Security Framework49
Preview Helps Selection: Previewable Image Watermarking with Client-Side Embedding48
Inferring and Investigating IoT-Generated Scanning Campaigns Targeting a Large Network Telescope46
Cooperative Jamming-Aided Secure Communication in Wireless Powered Sensor Networks45
Optimal Filter Assignment Policy Against Distributed Denial-of-Service Attack45
Generative Pre-Trained Transformer-Based Reinforcement Learning for Testing Web Application Firewalls43
ABATe: Automatic Behavioral Abstraction Technique to Detect Anomalies in Smart Cyber-Physical Systems43
Extended Research on the Security of Visual Reasoning CAPTCHA43
0.034273862838745