IEEE Transactions on Dependable and Secure Computing

Papers
(The median citation count of IEEE Transactions on Dependable and Secure Computing is 3. The table below lists those papers that are above that threshold based on CrossRef citation counts [max. 250 papers]. The publications cover those that have been published in the past four years, i.e., from 2021-09-01 to 2025-09-01.)
ArticleCitations
Provably-Secure One-Message Unilateral Entity Authentication Schemes403
SwiftParade: Anti-Burst Multipath Validation195
Towards a New Thermal Monitoring Based Framework for Embedded CPS Device Security191
Enhancing Sybil Detection via Social-Activity Networks: A Random Walk Approach145
R2E: A Decentralized Scheme for Rewarding Tor Relays With Cryptocurrencies145
Differentially Oblivious Two-Party Pattern Matching With Sublinear Round Complexity122
Window Canaries: Re-Thinking Stack Canaries for Architectures With Register Windows118
iQuery: A Trustworthy and Scalable Blockchain Analytics Platform116
Sharing Can be Threatening: Uncovering Security Flaws of RBAC Model on Smart Home Platforms107
FedPA: Generator-Based Heterogeneous Federated Prototype Adversarial Learning103
An Effective and Resilient Backdoor Attack Framework against Deep Neural Networks and Vision Transformers99
SVOC: Secure Aggregatable and Extractable System for Outsourced Cloud Computation91
ABATe: Automatic Behavioral Abstraction Technique to Detect Anomalies in Smart Cyber-Physical Systems90
Steganography With Generated Images: Leveraging Volatility to Enhance Security87
Ensuring State Continuity for Confidential Computing: A Blockchain-Based Approach87
Chained HotStuff Under Performance Attack81
Constructing Immune-Cover for Improving Holistic Security of Spatial Adaptive Steganography81
FishboneChain: A Scalable and Liquidity-Guaranteed Crowdsourcing Platform based on Multiple Child Chains79
OFIDS : Online Learning-Enabled and Fingerprint-Based Intrusion Detection System in Controller Area Networks79
Caught-in-Translation (CiT): Detecting Cross-Level Inconsistency Attacks in Network Functions Virtualization (NFV)78
Defeating Data Plane Attacks With Program Obfuscation73
DBFT: A Byzantine Fault Tolerance Protocol With Graceful Performance Degradation72
pSafety: Privacy-Preserving Safety Monitoring in Online Ride Hailing Services70
Perceptual Image Hashing With Locality Preserving Projection for Copy Detection70
Design Principles for Orthogonal Moments in Video Watermarking68
Adaptive HEVC Steganography Based on Steganographic Compression Efficiency Degradation Model67
Proactive Anti-Eavesdropping With Trap Deployment in Wireless Networks66
Heterogeneous Domain Adaptation for Multistream Classification on Cyber Threat Data66
Optimization-Time Analysis for Cybersecurity65
Online Streaming Sampling Publication Method Over Sliding Windows With Differential Privacy65
SG-Audit: An Efficient and Robust Cloud Auditing Scheme for Smart Grid65
SpADe: Multi-Stage Spam Account Detection for Online Social Networks64
Harnessing Policy Authenticity for Hidden Ciphertext Policy Attribute-Based Encryption64
AnoPay: Anonymous Payment for Vehicle Parking With Updatable Credential62
The Perils of Wi-Fi Spoofing Attack Via Geolocation API and Its Defense59
RMAAC: Joint Markov Games and Robust Multiagent Actor-Critic for Explainable Malware Defense in Social IoT58
Semantic-Preserving Linguistic Steganography by Pivot Translation and Semantic-Aware Bins Coding57
BIOWISH: Biometric Recognition Using Wearable Inertial Sensors Detecting Heart Activity56
Malicious-Resistant Non-Interactive Verifiable Aggregation for Federated Learning56
Pre-Trained Model-Based Automated Software Vulnerability Repair: How Far are We?55
Feature Reconstruction Attacks and Countermeasures of DNN Training in Vertical Federated Learning55
RiskProp: Account Risk Rating on Ethereum via De-anonymous Score and Network Propagation54
Enhancing Online Transaction Fraud Detection via Heterogeneous Source Models53
RDP-GAN: A Rényi-Differential Privacy Based Generative Adversarial Network53
Speech Sanitizer: Speech Content Desensitization and Voice Anonymization52
Split Learning without Local Weight Sharing To Enhance Client-side Data Privacy51
Securely Outsourcing Neural Network Inference to the Cloud With Lightweight Techniques49
Replay-resistant Few-shot Disk Authentication using Electromagnetic Fingerprint49
Mules and Permission Laundering in Android: Dissecting Custom Permissions in the Wild48
FedTracker: Furnishing Ownership Verification and Traceability for Federated Learning Model48
Secure and Scalable Cross-Domain Data Sharing in Zero-Trust Cloud-Edge-End Environment Based on Sharding Blockchain48
A Comparative Analysis of Software Aging in Image Classifiers on Cloud and Edge48
On the Detection of Smart, Self-Propagating Internet Worms47
CoinLayering: An Efficient Coin Mixing Scheme for Large Scale Bitcoin Transactions46
MTD-AD: Moving Target Defense as Adversarial Defense46
A Temporal Chrominance Trigger for Clean-Label Backdoor Attack Against Anti-Spoof Rebroadcast Detection46
UC Secure Private Branching Program and Decision Tree Evaluation45
Nip in the Bud: Forecasting and Interpreting Post- Exploitation Attacks in Real-Time Through Cyber Threat Intelligence Reports45
Artemis: Defending Against Backdoor Attacks via Distribution Shift45
Verifiable Homomorphic Secret Sharing for Low Degree Polynomials44
A Privacy-Preserving Graph Neural Network for Network Intrusion Detection44
MISP: An Efficient Quantum-resistant Misbehavior Preventing Scheme with Self-enforcement for Vehicle-to-Everything44
Decentralized Self-Auditing Multiple Cloud Storage in Compressed Provable Data Possession43
Decentralized and Fair Trading Via Blockchain: The Journey So Far and the Road Ahead43
An Adaptive IPM-Based HEVC Video Steganography via Minimizing Non-Additive Distortion42
A Scheme of Robust Privacy-Preserving Multi-Party Computation Via Public Verification42
Studying the Robustness of Anti-Adversarial Federated Learning Models Detecting Cyberattacks in IoT Spectrum Sensors42
LocGuard: A Location Privacy Defender for Image Sharing42
Software Vulnerability Discovery via Learning Multi-Domain Knowledge Bases41
Privacy Leakage in Wireless Charging41
Towards Neural Network-Based Communication System: Attack and Defense41
Matrix-Based Secret Sharing for Reversible Data Hiding in Encrypted Images41
On-the-Fly Privacy for Location Histograms41
Holistic Implicit Factor Evaluation of Model Extraction Attacks41
VeriCache: Formally Verified Fine-Grained Partitioned Cache for Side-Channel-Secure Enclaves41
Membership Inference Attacks Against Machine Learning Models via Prediction Sensitivity40
CMI: Client-Targeted Membership Inference in Federated Learning39
A Full Lifecycle Authentication Scheme for Large-scale Smart IoT Applications39
Evolutionary Dynamic Database Partitioning Optimization for Privacy and Utility38
MRSA: Mask Random Array Protocol for Efficient Secure Handover Authentication in 5G HetNets38
Attacking Deep Reinforcement Learning With Decoupled Adversarial Policy38
On the Security of Secure Keyword Search and Data Sharing Mechanism for Cloud Computing37
A Systematic Methodology to Compute the Quantum Vulnerability Factors for Quantum Circuits37
Physical Layer Authentication Utilizing Beam Pattern Features in Millimeter-Wave MIMO Systems37
srTLS: Secure TLS Handshake on Corrupted Machines37
HDWSA2: A Secure Hierarchical Deterministic Wallet Supporting Stealth Address and Signature Aggregation37
Anomaly Detection in Industrial Control Systems Based on Cross-Domain Representation Learning37
SHIELD: Thwarting Code Authorship Attribution36
Smaug: A TEE-Assisted Secured SQLite for Embedded Systems36
Design for Assurance: Employing Functional Verification Tools for Thwarting Hardware Trojan Threat in 3PIPs36
Enhancing Secure Cloud Data Sharing: Dynamic User Groups and Outsourced Decryption36
SAFE: A General Secure and Fair Auction Framework for Wireless Markets With Privacy Preservation36
CryptoRec: Novel Collaborative Filtering Recommender Made Privacy-Preserving Easy36
Effectively Improving Data Diversity of Substitute Training for Data-Free Black-Box Attack35
AWDP-Automated Windows Domain Penetration Framework with Deep Reinforcement Learning35
Practical Two-Factor Authentication Protocol for Real-Time Data Access in WSNs35
AVOID: Automated Void Detection in STL files35
DE-Sword: Incentivized Verifiable Tag Path Query in RFID-Enabled Supply Chain Systems34
EtherCloak: Enabling Multi-Level and Customized Privacy on Account-Model Blockchains34
DeepMnemonic: Password Mnemonic Generation via Deep Attentive Encoder-Decoder Model34
Privacy-Preserving Decision-Making Over Blockchain34
Generalized Local Optimality for Video Steganalysis in Motion Vector Domain33
Performability of Network Service Chains: Stochastic Modeling and Assessment of Softwarized IP Multimedia Subsystem33
Anomaly Detection in Event-Triggered Traffic Time Series via Similarity Learning33
CherryPicker: A Parallel Solving and State Sharing Hybrid Fuzzing System33
SHIELD - Secure Aggregation Against Poisoning in Hierarchical Federated Learning33
Delegation Security Analysis in Workflow Systems33
Low-Overhead Reversible Coherence Protocol33
Message Control for Blockchain Rewriting33
Mitigating Distributed DoS Attacks on Bandwidth Allocation for Federated Learning in Mobile Edge Networks32
Accurate and Efficient Privacy-Preserving Feature Extraction on Encrypted Images32
ZeroProKeS: A Secure Zeroconf Key Establishment Protocol for Large-Scale Low-Cost Applications32
A Magnetic Signal Based Device Fingerprinting Scheme in Wireless Charging32
Practical Encrypted Network Traffic Pattern Matching for Secure Middleboxes32
UniQGAN: Towards Improved Modulation Classification With Adversarial Robustness Using Scalable Generator Design31
Spotting Anomalies at the Edge: Outlier Exposure-Based Cross-Silo Federated Learning for DDoS Detection31
SE#PCFG: Semantically Enhanced PCFG for Password Analysis and Cracking31
BASS: A Blockchain-Based Asynchronous SignSGD Architecture for Efficient and Secure Federated Learning31
Cover Selection for Steganography Using Image Similarity31
ValidCNN: A Large-Scale CNN Predictive Integrity Verification Scheme Based on zk-SNARK31
Threshold Delegatable Anonymous Credentials With Controlled and Fine-Grained Delegation31
Decentralized Self-Auditing Scheme With Errors Localization for Multi-Cloud Storage31
Enabling Secure and Efficient Decentralized Storage Auditing With Blockchain30
PPCA - Privacy-Preserving Collision Avoidance for Autonomous Unmanned Aerial Vehicles30
Calibrated Uncertainty Estimation for Trustworthy Deep IoT Attack Detection30
DAENet: Making Strong Anonymity Scale in a Fully Decentralized Network30
Automated Firewall Configuration in Virtual Networks30
$\mathsf {JUMBO}$: Fully Asynchronous BFT Consensus Made Truly Scalable30
Weaknesses of Popular and Recent Covert Channel Detection Methods and a Remedy30
Diff-ID: An Explainable Identity Difference Quantification Framework for DeepFake Detection30
Privacy-Preserving Anomaly Detection of Encrypted Smart Contract for Blockchain-Based Data Trading29
Privacy-Preserving Network Embedding Against Private Link Inference Attacks29
Chebyshev Polynomial Based Emergency Conditions with Authentication Scheme for 5G-Assisted Vehicular Fog Computing29
Attacks and Countermeasures on Privacy-Preserving Biometric Authentication Schemes29
Trust Beyond Border: Lightweight, Verifiable User Isolation for Protecting In-Enclave Services29
Sphinx: Certificateless Conditional Privacy-Preserving Authentication with Secure Transmission for VANETs29
SkillVet: Automated Traceability Analysis of Amazon Alexa Skills29
Efficient and Privacy-Preserving Weighted Range Set Sampling in Cloud29
An Empirical Study of Fault Triggers in Deep Learning Frameworks28
Precise Discovery of More Taint-Style Vulnerabilities in Embedded Firmware28
An Efficient and Zero-Knowledge Classical Machine Learning Inference Pipeline28
A Secure Computing System With Hardware-Efficient Lazy Bonsai Merkle Tree for FPGA-Attached Embedded Memory28
Handling Labeled Data Insufficiency: Semi-supervised Learning with Self-Training Mixup Decision Tree for Classification of Network Attacking Traffic28
Understanding User Passwords through Parsing Tree28
Comments on “VERSA: Verifiable Secure Aggregation for Cross-Device Federated Learning”28
Membership Inference Attacks Against Deep Learning Models via Logits Distribution27
Rethinking the Design of Backdoor Triggers and Adversarial Perturbations: A Color Space Perspective27
Attributed Graph Clustering in Collaborative Settings27
PKVIC: Supplement Missing Software Package Information in Security Vulnerability Reports27
Decentralized Multi-Client Functional Encryption for Inner Product With Applications to Federated Learning27
EZchain: A Secure Scalable Blockchain Protocol via Passive Sharding27
Model of Execution Trace Obfuscation Between Threads27
ACL: Account Linking in Online Social Networks With Robust Camera Fingerprint Matching27
Universal Low Bit-Rate Speech Steganalysis Integrating Domain-specific and Domain-shared Knowledge26
CPAKA: Mutual Authentication and Key Agreement Scheme Based on Conditional PUF in Space-Air-Ground Integrated Network26
Data Protection: Privacy-Preserving Data Collection With Validation26
Price TAG: Towards Semi-Automatically Discovery Tactics, Techniques and Procedures OF E-Commerce Cyber Threat Intelligence26
Improving the Accuracy of IR-Level Fault Injection26
Deep Learning for Coverage-Guided Fuzzing: How Far are We?26
Sine: Similarity is Not Enough for Mitigating Local Model Poisoning Attacks in Federated Learning26
BitBatSPIR: Efficient Batch Symmetric Private Information Retrieval from PSI26
Online Failure Prediction for Complex Systems: Methodology and Case Studies26
Building a Secure Knowledge Marketplace Over Crowdsensed Data Streams26
SecDR: Enabling Secure, Efficient, and Accurate Data Recovery for Mobile Crowdsensing25
Multi-label Classification for Android Malware Based on Active Learning25
Developing Attack Detection Models for Microservice Applications: A Comprehensive Framework and Its Illustration and Validation on DoS Attacks25
Multiple Targets Directed Greybox Fuzzing25
Public Proofs of Data Replication and Retrievability With User-Friendly Replication25
DID We Miss Anything?: Towards Privacy-Preserving Decentralized ID Architecture25
kTCQ: Achieving Privacy-Preserving k-Truss Community Queries Over Outsourced Data25
Man-in-the-Middle Attacks Against Machine Learning Classifiers Via Malicious Generative Models25
Trusted Video Inpainting Localization Via Deep Attentive Noise Learning24
Collaborative Prediction in Anti-Fraud System Over Multiple Credit Loan Platforms24
Cooperating or Kicking Out: Defending Against Poisoning Attacks in Federated Learning via the Evolution of Cooperation24
Making Information Hiding Effective Again24
Exploiting Deep Neural Networks as Covert Channels24
SuperSketch: A Multi-Dimensional Reversible Data Structure for Super Host Identification24
An Analytical and Empirical Investigation of Tag Partitioning for Energy-Efficient Reliable Cache24
Threat-Event Detection for Distributed Networks Based on Spatiotemporal Markov Random Field24
DIDO+: Data Provenance from Restricted TLS 1.3 Websites with Selective Disclosure24
Facial Data Minimization: Shallow Model as Your Privacy Filter24
T-Trace: Constructing the APTs Provenance Graphs Through Multiple Syslogs Correlation24
Group BFT: Two-Round BFT Protocols via Replica Grouping23
Private Reachability Queries on Structured Encrypted Temporal Bipartite Graphs23
Attack Hypotheses Generation Based on Threat Intelligence Knowledge Graph23
Non-Interactive Multi-Client Searchable Encryption: Realization and Implementation23
FedDMC: Efficient and Robust Federated Learning via Detecting Malicious Clients23
IoVCom: Reliable Comprehensive Communication System for Internet of Vehicles23
Robust Audio Copy-Move Forgery Detection Using Constant Q Spectral Sketches and GA-SVM23
Blockchain-Based Shared Data Integrity Auditing and Deduplication23
HyperPS: A Virtual-Machine Memory Protection Approach Through Hypervisor's Privilege Separation23
Towards Robust Fingerprinting of Relational Databases by Mitigating Correlation Attacks23
Possibility and Impossibility of Propagation Safety and Reliability: A 1-Safe and Reliable Snap-Stabilizing Broadcast Algorithm23
BadCleaner: Defending Backdoor Attacks in Federated Learning via Attention-Based Multi-Teacher Distillation23
ALI: Anonymous Lightweight Inter-Vehicle Broadcast Authentication with Encryption22
Design and Analysis of Adaptive Graph-Based Cancelable Multi-Biometrics Approach22
Detecting Adversarial Examples on Deep Neural Networks With Mutual Information Neural Estimation22
Highly Efficient and Scalable Access Control Mechanism for IoT Devices in Pervasive Environments22
Pricing Utility vs. Location Privacy: A Differentially Private Data Sharing Framework for Ride-on-Demand Services22
A Blockchain-Based Secure Covert Communication Method via Shamir Threshold and STC Mapping22
Sorald: Automatic Patch Suggestions for SonarQube Static Analysis Violations22
Mitigating Adversarial Attacks on Data-Driven Invariant Checkers for Cyber-Physical Systems22
-Inference: A Data-Aware and High-Utility Privacy Model for Relational Data Publishing22
Minimax Approximation of Sign Function by Composite Polynomial for Homomorphic Comparison22
An Optimized Sparse Response Mechanism for Differentially Private Federated Learning22
Automatically Identifying CVE Affected Versions With Patches and Developer Logs21
VeriFi: Towards Verifiable Federated Unlearning21
SaVioR: Thwarting Stack-Based Memory Safety Violations by Randomizing Stack Layout21
An OpenRAN Security Framework for Scalable Authentication, Authorization, and Discovery of xApps With Isolated Critical Services21
Towards Secure and Efficient Wildcard Search for Cloud Storage21
Personalized 3D Location Privacy Protection With Differential and Distortion Geo-Perturbation21
EBSNN: Extended Byte Segment Neural Network for Network Traffic Classification21
Increasing the Resilience of Secure Multiparty Computation Using Security Modules21
Integrating Coordinate Transformation and Random Sampling Into High-Capacity Reversible Data Hiding in Encrypted Polygonal Models21
Fault Injection for TensorFlow Applications21
Friendship Preference: Scalable and Robust Category of Features for Social Bot Detection21
Privacy-Preserving and Reliable Truth Discovery for Heterogeneous Fog-Based Crowdsensing21
Checking Only When It Is Necessary: Enabling Integrity Auditing Based on the Keyword With Sensitive Information Privacy for Encrypted Cloud Data21
TAICHI: Transform Your Secret Exploits Into Mine From a Victim's Perspective21
The “Code” of Ethics: A Holistic Audit of AI Code Generators21
PellucidAttachment: Protecting Users From Attacks via E-Mail Attachments21
MARS: Enabling Verifiable Range-Aggregate Queries in Multi-Source Environments21
Attribute-Based Membership Inference Attacks and Defenses on GANs20
Efficient Noise Generation Protocols for Differentially Private Multiparty Computation20
Flash: Practical Volume-Hiding Encrypted Conjunctive Multi-Map with Optimal Overhead20
Leakage-Resilient and Carbon-Neutral Aggregation Featuring the Federated AI-Enabled Critical Infrastructure20
Object Oriented Policy Conflict Checking Framework in Cloud Networks (OOPC)20
Revisiting Privacy-Preserving Min and k-th Min Protocols for Mobile Sensing20
Delta Counter: Bandwidth-Efficient Encryption Counter Representation for Secure GPU Memory20
Private Electronic Road Pricing Using Bulletproofs With Vector Commitments20
Security Risk Assessment Using Bayesian Attack Graphs and Complex Probabilities for Large Scale IoT Applications20
Towards an Interpretable Autoencoder: A Decision-Tree-Based Autoencoder and its Application in Anomaly Detection20
Circuit-Free General-Purpose Multi-Party Computation via Co-Utile Unlinkable Outsourcing20
Evaluating the Robustness of Trigger Set-Based Watermarks Embedded in Deep Neural Networks20
An Evolutionary Attack for Revealing Training Data of DNNs With Higher Feature Fidelity20
Nereus: Anonymous and Secure Ride-Hailing Service Based on Private Smart Contracts20
On the Validation of Web X.509 Certificates by TLS Interception Products19
FeCo: Boosting Intrusion Detection Capability in IoT Networks via Contrastive Learning19
HyperMaze: Towards Privacy-Preserving and Scalable Permissioned Blockchain19
FewM-HGCL : Few-Shot Malware Variants Detection Via Heterogeneous Graph Contrastive Learning19
Accountable Many-to-One Signature with Short Verification Key for Self-Sovereign Identity19
Detecting Errors in NGAC Policies via Fault-Based Testing19
Trojan Detection in Digital Microfluidic Biochips via Image Classification: A Deep-Learning Based Approach19
Privacy-Preserving Liveness Detection for Securing Smart Voice Interfaces19
Detecting Smart Home Device Activities Using Packet-Level Signatures From Encrypted Traffic19
Blacklisting Based Anonymous Authentication Scheme for Sharing Economy19
BazzAFL: Moving Fuzzing Campaigns Towards Bugs via Grouping Bug-Oriented Seeds19
D-LNBot: A Scalable, Cost-Free and Covert Hybrid Botnet on Bitcoin's Lightning Network19
Optimizing Secure Decision Tree Inference Outsourcing19
DeepAG: Attack Graph Construction and Threats Prediction With Bi-Directional Deep Learning19
0.46584010124207