IEEE Transactions on Dependable and Secure Computing

Papers
(The TQCC of IEEE Transactions on Dependable and Secure Computing is 10. The table below lists those papers that are above that threshold based on CrossRef citation counts [max. 250 papers]. The publications cover those that have been published in the past four years, i.e., from 2021-04-01 to 2025-04-01.)
ArticleCitations
DNSGuard: In-Network Defense Against DNS Attacks327
IMS: Towards Computability and Dynamicity for Intent-Driven Micro-Segmentation177
Repairing Backdoor Model With Dynamic Gradient Clipping for Intelligent Vehicles165
Enabling Accurate and Efficient Privacy-Preserving Truth Discovery for Sparse Crowdsensing144
ASDIA: An Adversarial Sample to Preserve Privacy Program in Federated Learning132
Backdoored Sample Cleansing for Unlabeled Datasets Via Bootstrapped Dual Set Purification124
CuckooAttack: Towards Practical Backdoor Attack against Automatic Speech Recognition Systems122
An Effective and Resilient Backdoor Attack Framework against Deep Neural Networks and Vision Transformers116
On Detecting Route Hijacking Attack in Opportunistic Mobile Networks109
Guaranteeing Data Privacy in Federated Unlearning with Dynamic User Participation106
A Traceable and Revocable Ciphertext-Policy Attribute-based Encryption Scheme Based on Privacy Protection95
TreasureCache: Hiding Cache Evictions Against Side-Channel Attacks94
Adversarial Robustness of Deep Neural Networks: A Survey from a Formal Verification Perspective89
SwissLog: Robust Anomaly Detection and Localization for Interleaved Unstructured Logs79
Blockchain-Assisted Privacy-Preserving and Synchronized Key Agreement for VDTNs74
Differential Area Analysis for Ransomware: Attacks, Countermeasures, and Limitations73
Linguistic Steganalysis Based on Few-shot Adversarial Training72
MagShadow: Physical Adversarial Example Attacks via Electromagnetic Injection72
Using Parallel Techniques to Accelerate PCFG-based Password Cracking Attacks72
2021 Index IEEE Transactions on Dependable and Secure Computing Vol. 1871
Detecting Inaudible Voice Commands via Acoustic Attenuation by Multi-channel Microphones68
CacheIEE: Cache-Assisted Isolated Execution Environment on ARM Multi-Core Platforms68
Secure and Scalable Cross-Domain Data Sharing in Zero-Trust Cloud-Edge-End Environment Based on Sharding Blockchain68
Efficient Identity-Based Data Integrity Auditing With Key-Exposure Resistance for Cloud Storage66
ACA: Anonymous, Confidential and Auditable Transaction Systems for Blockchain63
Defending Against Membership Inference Attacks With High Utility by GAN62
OPRE: Towards Better Availability of PCNs Through Recovering61
FLAD: Byzantine-Robust Federated Learning Based on Gradient Feature Anomaly Detection59
Chained HotStuff Under Performance Attack59
RobustPFL: Robust Personalized Federated Learning55
TMT-FL: Enabling Trustworthy Model Training of Federated Learning with Malicious Participants55
PriDM: Effective and Universal Private Data Recovery via Diffusion Models54
Poisoning Attacks and Defenses to Learned Bloom Filters for Malicious URL Detection53
Highly Robust and Diverse Coverless Image Steganography Against Passive and Active Steganalysis52
FineBID: Fine-grained Protocol Reverse Engineering for Bit-level Field IDentification51
SSHC: A Secure and Scalable Hybrid Consensus Protocol for Sharding Blockchains With a Formal Security Framework49
Achieving Efficient and Privacy-Preserving Neural Network Training and Prediction in Cloud Environments49
RevFRF: Enabling Cross-Domain Random Forest Training With Revocable Federated Learning49
Preview Helps Selection: Previewable Image Watermarking with Client-Side Embedding48
Inferring and Investigating IoT-Generated Scanning Campaigns Targeting a Large Network Telescope46
Optimal Filter Assignment Policy Against Distributed Denial-of-Service Attack45
Cooperative Jamming-Aided Secure Communication in Wireless Powered Sensor Networks45
Extended Research on the Security of Visual Reasoning CAPTCHA43
Generative Pre-Trained Transformer-Based Reinforcement Learning for Testing Web Application Firewalls43
ABATe: Automatic Behavioral Abstraction Technique to Detect Anomalies in Smart Cyber-Physical Systems43
Eurus: Towards an Efficient Searchable Symmetric Encryption With Size Pattern Protection42
DBFT: A Byzantine Fault Tolerance Protocol With Graceful Performance Degradation41
Forward Secure Similarity Search Over Encrypted Data for Hamming Distance41
cuML-DSA: Optimized Signing Procedure and Server-Oriented GPU Design for ML-DSA41
High Capacity Reversible Data Hiding in Encrypted 3D Mesh Models Based on Dynamic Prediction and Virtual Connection40
Feature Reconstruction Attacks and Countermeasures of DNN Training in Vertical Federated Learning40
Update If You Dare: Demystifying Bare-Metal Device Firmware Update Security of Appified IoT Systems40
Outlier: Enabling Effective Measurement of Hypervisor Code Integrity With Group Detection39
CBA-Detector: A Self-Feedback Detector Against Cache-Based Attacks39
Modeling and Defense of Social Virtual Reality Attacks Inducing Cybersickness38
Proactive Anti-Eavesdropping With Trap Deployment in Wireless Networks38
A Systemic Approach for Natural Language Scenario Elicitation of Security Requirements38
A Comparative Analysis of Software Aging in Image Classifiers on Cloud and Edge38
Freshness Authentication for Outsourced Multi-Version Key-Value Stores37
QKPT: Securing Your Private Keys in Cloud With Performance, Scalability and Transparency37
Discovery and Identification of Memory Corruption Vulnerabilities on Bare-Metal Embedded Devices37
xFuzz: Machine Learning Guided Cross-Contract Fuzzing37
Does OpenBSD and Firefox’s Security Improve With Time?37
Defeating Misclassification Attacks Against Transfer Learning37
Enhancing Sybil Detection via Social-Activity Networks: A Random Walk Approach37
ENCIDER: Detecting Timing and Cache Side Channels in SGX Enclaves and Cryptographic APIs36
μDep: Mutation-Based Dependency Generation for Precise Taint Analysis on Android Native Code36
Privacy-Preserving and Outsourced Multi-Party K-Means Clustering Based on Multi-Key Fully Homomorphic Encryption36
CAeSaR: An Online Payment Anti-Fraud Integration System With Decision Explainability35
Misconfiguration-Free Compositional SDN for Cloud Networks35
Heterogeneous Domain Adaptation for Multistream Classification on Cyber Threat Data35
Joint Biological ID : A Secure and Efficient Lightweight Biometric Authentication Scheme34
${{\sf PEBA}}$: Enhancing User Privacy and Coverage of Safe Browsing Services33
Incremental Learning, Incremental Backdoor Threats33
AGAPECert: An Auditable, Generalized, Automated, Privacy-Enabling Certification Framework With Oblivious Smart Contracts33
Forward/Backward and Content Private DSSE for Spatial Keyword Queries32
On the Detection of Smart, Self-Propagating Internet Worms32
Cure-GNN: A Robust Curvature-Enhanced Graph Neural Network Against Adversarial Attacks31
A Variational AutoEncoder-Based Relational Model for Cost-Effective Automatic Medical Fraud Detection31
Reliability and Robustness analysis of Machine Learning based Phishing URL Detectors31
SpADe: Multi-Stage Spam Account Detection for Online Social Networks31
Differentially Oblivious Two-Party Pattern Matching With Sublinear Round Complexity31
SlimBox: Lightweight Packet Inspection over Encrypted Traffic31
SpreadMeNot: A Provably Secure and Privacy-Preserving Contact Tracing Protocol31
Snoopy: A Webpage Fingerprinting Framework With Finite Query Model for Mass-Surveillance31
Solution Probing Attack Against Coin Mixing Based Privacy-Preserving Crowdsourcing Platforms30
Reducing Privacy of CoinJoin Transactions: Quantitative Bitcoin Network Analysis30
AVPMIR: Adaptive Verifiable Privacy-Preserving Medical Image Retrieval30
Towards a New Thermal Monitoring Based Framework for Embedded CPS Device Security29
An Efficient Fuzzy Certificateless Signature-Based Authentication Scheme Using Anonymous Biometric Identities for VANETs29
Constructing Immune-Cover for Improving Holistic Security of Spatial Adaptive Steganography29
A Verifiable and Privacy-Preserving Federated Learning Training Framework29
PrivacyAsst: Safeguarding User Privacy in Tool-Using Large Language Model Agents28
Efficient and Secure Outsourcing of Differentially Private Data Publishing With Multiple Evaluators28
Using Metrics Suites to Improve the Measurement of Privacy in Graphs28
Analyzing Security Requirements in Timed Workflow Processes28
Representing Fine-Grained Co-Occurrences for Behavior-Based Fraud Detection in Online Payment Services27
Self-Stabilizing Secure Computation27
Fast Generation-Based Gradient Leakage Attacks: An Approach to Generate Training Data Directly From the Gradient27
Towards Understanding and Defeating Abstract Resource Attacks for Container Platforms27
R2E: A Decentralized Scheme for Rewarding Tor Relays With Cryptocurrencies27
Adaptive Secure Nearest Neighbor Query Processing Over Encrypted Data27
Characterizing and Exploiting Soft Error Vulnerability Phase Behavior in GPU Applications26
Harnessing Policy Authenticity for Hidden Ciphertext Policy Attribute-Based Encryption26
Malicious-Resistant Non-Interactive Verifiable Aggregation for Federated Learning26
Privacy-Preserving User Recruitment With Sensing Quality Evaluation in Mobile Crowdsensing26
Hierarchical Temporal Memory-Based One-Pass Learning for Real-Time Anomaly Detection and Simultaneous Data Prediction in Smart Grids26
JNI Global References Are Still Vulnerable: Attacks and Defenses26
Cross-VM Network Channel Attacks and Countermeasures Within Cloud Computing Environments26
CSCAD: An Adaptive LightGBM Algorithm to Detect Cache Side-Channel Attacks26
Fault Injection Analytics: A Novel Approach to Discover Failure Modes in Cloud-Computing Systems25
FLARE: Defending Federated Learning Against Model Poisoning Attacks Via Latent Space Representations25
Security of Multi-Adjustable Join Schemes: Separations and Implications25
SGXTuner: Performance Enhancement of Intel SGX Applications Via Stochastic Optimization24
RiskProp: Account Risk Rating on Ethereum via De-anonymous Score and Network Propagation24
On the Security of the K Minimum Values (KMV) Sketch24
Covert Channel-Based Transmitter Authentication in Controller Area Networks24
A Formal Verification of ArpON – A Tool for Avoiding Man-in-the-Middle Attacks in Ethernet Networks24
Privacy-Preserving Search for a Similar Genomic Makeup in the Cloud24
Towards Practical and Privacy-Preserving Multi-Dimensional Range Query Over Cloud24
XAI-Based Microarchitectural Side-Channel Analysis for Website Fingerprinting Attacks and Defenses24
MuEOC: Efficient SGX-based Multi-key Homomorphic Outsourcing Computation for E-health System23
EnBinDiff: Identifying Data-Only Patches for Binaries23
Fine-Grained and Controllably Editable Data Sharing With Accountability in Cloud Storage23
A Secure EMR Sharing System With Tamper Resistance and Expressive Access Control23
Security-Aware Collaboration Plan Recommendation for Dynamic Multiple Workflow Processes23
Dating with Scambots: Understanding the Ecosystem of Fraudulent Dating Applications22
Caught-in-Translation (CiT): Detecting Cross-Level Inconsistency Attacks in Network Functions Virtualization (NFV)22
Vogue: Faster Computation of Private Heavy Hitters22
Marionette: Manipulate Your Touchscreen via a Charging Cable22
Steganography With Generated Images: Leveraging Volatility to Enhance Security22
Function Interaction Risks in Robot Apps: Analysis and Policy-Based Solution22
Improving Logic Bomb Identification in Android Apps via Context-Aware Anomaly Detection22
Privacy-Preserving Transformation Used in Verifiable (Outsourced) Computation, Revisited22
Understanding Security Risks of Embedded Devices Through Fine-Grained Firmware Fingerprinting22
SwiftParade: Anti-Burst Multipath Validation22
Mimosa: Protecting Private Keys Against Memory Disclosure Attacks Using Hardware Transactional Memory22
SG-Audit: An Efficient and Robust Cloud Auditing Scheme for Smart Grid22
A Blockchain-Based Privacy-Preserving Scheme for Sealed-Bid Auction22
Deep Hashing Based Cancelable Multi-Biometric Template Protection22
Demystifying the Evolution of Android Malware Variants22
Collusion Defender: Preserving Subscribers’ Privacy in Publish and Subscribe Systems22
Designing Robust API Monitoring Solutions22
DiLSe: Lattice-Based Secure and Dependable Data Dissemination Scheme for Social Internet of Vehicles22
The Perils of Wi-Fi Spoofing Attack Via Geolocation API and Its Defense22
Trusted Hardware-Assisted Leaderless Byzantine Fault Tolerance Consensus21
Achieving Efficient and Privacy-Preserving Location-Based Task Recommendation in Spatial Crowdsourcing21
Blockchain-Based Compact Verifiable Data Streaming With Self-Auditing21
On the Privacy of Elementary Matrices Masking-Based Verifiable (Outsourced) Computation21
Speech Sanitizer: Speech Content Desensitization and Voice Anonymization21
Fully Accountable Data Sharing for Pay-as-You-Go Cloud Scenes21
Mules and Permission Laundering in Android: Dissecting Custom Permissions in the Wild20
Malware Speaks! Deep Learning Based Assembly Code Processing for Detecting Evasive Cryptojacking20
Protecting Intellectual Property With Reliable Availability of Learning Models in AI-Based Cybersecurity Services20
Hardware-Assisted Live Kernel Function Updating on Intel Platforms20
Provably-Secure One-Message Unilateral Entity Authentication Schemes20
PrivData Network: A Privacy-Preserving On-Chain Data Factory and Trading Market20
On the Privacy of Multi-Versioned Approximate Membership Check Filters20
SaTC: Shared-Keyword Aware Taint Checking for Detecting Bugs in Embedded Systems20
Differentially Private Distributed Frequency Estimation20
RDP-GAN: A Rényi-Differential Privacy Based Generative Adversarial Network20
Defeating Data Plane Attacks With Program Obfuscation20
Proactive Drive Failure Prediction for Cloud Storage System Through Semi-Supervised Learning20
False Data Detector for Electrical Vehicles Temporal-Spatial Charging Coordination Secure Against Evasion and Privacy Adversarial Attacks20
AnotherMe: A Location Privacy Protection System Based on Online Virtual Trajectory Generation20
OFIDS : Online Learning-Enabled and Fingerprint-Based Intrusion Detection System in Controller Area Networks20
iQuery: A Trustworthy and Scalable Blockchain Analytics Platform20
: A More Lightweight Model for Multi-Client Delegatable Computation20
AnoPay: Anonymous Payment for Vehicle Parking With Updatable Credential20
FABRIC: Fast and Secure Unbounded Cross-System Encrypted Data Sharing in Cloud Computing19
A Temporal Chrominance Trigger for Clean-Label Backdoor Attack Against Anti-Spoof Rebroadcast Detection19
Monero With Multi-Grained Redaction19
Secure Redactable Blockchain With Dynamic Support19
Efficient Verifiable Unbounded-Size Database From Authenticated Matrix Commitment19
A Compositional Semantics of Boolean-Logic Driven Markov Processes19
HCA: Hashchain-Based Consensus Acceleration Via Re-Voting19
CAPE: Commitment-based Privacy-Preserving Payment Channel Scheme in Blockchain19
Comments on “VERSA: Verifiable Secure Aggregation for Cross-Device Federated Learning”19
PRISM: A Hierarchical Intrusion Detection Architecture for Large-Scale Cyber Networks19
Phasor Measurement Unit Change-Point Detection of Frequency Hurst Exponent Anomaly With Time-to-Event19
Gringotts: An Encrypted Version Control System With Less Trust on Servers19
Window Canaries: Re-Thinking Stack Canaries for Architectures With Register Windows19
Violin: Powerful Volumetric Injection Attack Against Searchable Encryption With Optimal Injection Size18
CRFU: Compressive Representation Forgetting Against Privacy Leakage on Machine Unlearning18
PrivKVM*: Revisiting Key-Value Statistics Estimation With Local Differential Privacy18
Reverse Backdoor Distillation: Towards Online Backdoor Attack Detection for Deep Neural Network Models18
A Universal Framework for Reversible Data Hiding in Encrypted Images with Multiple Hiders18
Anomaly Detection in Operating System Logs with Deep Learning-Based Sentiment Analysis18
Blockchain-Assisted Revocable Cross-Domain Authentication for Vehicular Ad-Hoc Networks18
An Incentive Mechanism for Privacy Preserved Data Trading with Verifiable Data Disturbance18
Secure Password-Protected Encryption Key for Deduplicated Cloud Storage Systems18
VerifyTL: Secure and Verifiable Collaborative Transfer Learning18
Quantization Backdoors to Deep Learning Commercial Frameworks18
Deepfake Detection and Localization Using Multi-View Inconsistency Measurement17
Unveiling Physical Semantics of PLC Variables Using Control Invariants17
A Covert and Efficient Attack on FPGA Cloud Based on Adaptive RON17
One-to-N & N-to-One: Two Advanced Backdoor Attacks Against Deep Learning Models17
FedPA: Generator-Based Heterogeneous Federated Prototype Adversarial Learning17
An Automated Monitoring and Repairing System for DNN Training17
PulseAnomaly: Unsupervised Anomaly Detection on Avionic Platforms With Seasonality and Trend Modeling in Transformer Networks17
ProSAS: Proactive Security Auditing System for Clouds17
Sharing Can be Threatening: Uncovering Security Flaws of RBAC Model on Smart Home Platforms17
MFGSCOPE: A Lightweight Framework for Efficient Graph-Based Analysis on Blockchain17
xr-droid: A Benchmark Dataset for AR/VR and Security Applications17
AXI Hardware Accelerator for McEliece on FPGA Embedded Systems17
FedTracker: Furnishing Ownership Verification and Traceability for Federated Learning Model17
MVOC: A Lighter Multi-Client Verifiable Outsourced Computation for Malicious Lightweight Clients17
Exploring Handwritten Signature Image Features for Hardware Security16
Understanding Node Capture Attacks in User Authentication Schemes for Wireless Sensor Networks16
Certificateless Signature Scheme With Batch Verification for Secure and Privacy-Preserving V2V Communications in VANETs16
Implicit Hammer: Cross-Privilege-Boundary Rowhammer Through Implicit Accesses16
BPPS:Blockchain-Enabled Privacy-Preserving Scheme for Demand-Response Management in Smart Grid Environments16
Improving Cryptocurrency Crime Detection: CoinJoin Community Detection Approach16
Eunomia: Anonymous and Secure Vehicular Digital Forensics Based on Blockchain16
Adaptive HEVC Steganography Based on Steganographic Compression Efficiency Degradation Model16
Securing TEEs With Verifiable Execution Contracts16
Quantum-Safe Round-Optimal Password Authentication for Mobile Devices16
EBCPA: Efficient Blockchain-based Conditional Privacy-preserving Authentication for VANETs16
pSafety: Privacy-Preserving Safety Monitoring in Online Ride Hailing Services16
A Secure Cloud Data Sharing Protocol for Enterprise Supporting Hierarchical Keyword Search16
Perceptual Image Hashing With Locality Preserving Projection for Copy Detection15
Semantic-Preserving Linguistic Steganography by Pivot Translation and Semantic-Aware Bins Coding15
Taking Care of the Discretization Problem: A Comprehensive Study of the Discretization Problem and a Black-Box Adversarial Attack in Discrete Integer Domain15
Optimization-Time Analysis for Cybersecurity15
SeUpdate: Secure Encrypted Data Update for Multi-User Environments15
UCoin: An Efficient Privacy Preserving Scheme for Cryptocurrencies15
Smart Contract Assisted Privacy-Preserving Data Aggregation and Management Scheme for Smart Grid15
A Privacy-Preserving Incentive Mechanism for Mobile Crowdsensing Based on Blockchain15
BIOWISH: Biometric Recognition Using Wearable Inertial Sensors Detecting Heart Activity15
PolyCosGraph: A Privacy-Preserving Cancelable EEG Biometric System15
Enabling Passive User Authentication via Heart Sounds on In-Ear Microphones15
Forward Private Verifiable Dynamic Searchable Symmetric Encryption With Efficient Conjunctive Query15
Source Inference Attacks: Beyond Membership Inference Attacks in Federated Learning15
Practical Multi-Source Multi-Client Searchable Encryption With Forward Privacy: Refined Security Notion and New Constructions15
Pre-Trained Model-Based Automated Software Vulnerability Repair: How Far are We?15
AotmAuth: Atomic Function Module-Based 6 G Authentication Protocol Combination Framework15
Blockchain-Based Lightweight Message Authentication for Edge-Assisted Cross-Domain Industrial Internet of Things14
CoinLayering: An Efficient Coin Mixing Scheme for Large Scale Bitcoin Transactions14
SPT: Security Policy Translator for Network Security Functions in Cloud-Based Security Services14
Detection of Generative Linguistic Steganography Based on Explicit and Latent Text Word Relation Mining Using Deep Learning14
Identity-Based Provable Data Possession From RSA Assumption for Secure Cloud Storage14
Sixteen Years of Phishing User Studies: What Have We Learned?14
TAPFed: Threshold Secure Aggregation for Privacy-Preserving Federated Learning14
A Secure and Authenticated Mobile Payment Protocol Against Off-Site Attack Strategy14
A Full Lifecycle Authentication Scheme for Large-scale Smart IoT Applications14
A Novel Authentication Scheme Supporting Multiple User Access for 5G and Beyond14
A Reversible Watermarking for 2D Engineering Graphics Based on Difference Expansion With Adaptive Interval Partitioning14
Securely Outsourcing Neural Network Inference to the Cloud With Lightweight Techniques14
Ensuring State Continuity for Confidential Computing: A Blockchain-Based Approach14
Do Fairness Interventions Come at the Cost of Privacy: Evaluations for Binary Classifiers14
0.18248605728149