IEEE Transactions on Dependable and Secure Computing

Papers
(The TQCC of IEEE Transactions on Dependable and Secure Computing is 12. The table below lists those papers that are above that threshold based on CrossRef citation counts [max. 250 papers]. The publications cover those that have been published in the past four years, i.e., from 2021-12-01 to 2025-12-01.)
ArticleCitations
Sharing Can be Threatening: Uncovering Security Flaws of RBAC Model on Smart Home Platforms460
Window Canaries: Re-Thinking Stack Canaries for Architectures With Register Windows208
Provably-Secure One-Message Unilateral Entity Authentication Schemes202
R2E: A Decentralized Scheme for Rewarding Tor Relays With Cryptocurrencies170
AnoPay: Anonymous Payment for Vehicle Parking With Updatable Credential154
SwiftParade: Anti-Burst Multipath Validation134
iQuery: A Trustworthy and Scalable Blockchain Analytics Platform132
PSA: Private Set Alignment for Secure and Collaborative Analytics on Large-Scale Data125
RiskProp: Account Risk Rating on Ethereum via De-anonymous Score and Network Propagation117
Steganography With Generated Images: Leveraging Volatility to Enhance Security114
Differentially Oblivious Two-Party Pattern Matching With Sublinear Round Complexity111
Mules and Permission Laundering in Android: Dissecting Custom Permissions in the Wild100
A Controllable, Publicly Auditable, and Redactable Blockchain with a Main-Auxiliary Architecture96
Split Learning Without Local Weight Sharing to Enhance Client-Side Data Privacy94
pSafety: Privacy-Preserving Safety Monitoring in Online Ride Hailing Services94
MTD-AD: Moving Target Defense as Adversarial Defense87
Heterogeneous Domain Adaptation for Multistream Classification on Cyber Threat Data87
BOMAP: A Round-Efficient Construction of Oblivious Maps86
An Effective and Resilient Backdoor Attack Framework Against Deep Neural Networks and Vision Transformers85
Novel Bribery Mining Attacks: Impacts on Mining Ecosystem and the “Bribery Miner's Dilemma” in the Nakamoto-style Blockchain System84
Malicious-Resistant Non-Interactive Verifiable Aggregation for Federated Learning81
Ensuring State Continuity for Confidential Computing: A Blockchain-Based Approach81
Proactive Anti-Eavesdropping With Trap Deployment in Wireless Networks79
When Unknown Threat Meets Label Noise: A Self-Correcting Framework77
Design Principles for Orthogonal Moments in Video Watermarking76
Optimization-Time Analysis for Cybersecurity75
The Perils of Wi-Fi Spoofing Attack Via Geolocation API and Its Defense74
ABATe: Automatic Behavioral Abstraction Technique to Detect Anomalies in Smart Cyber-Physical Systems72
CoinLayering: An Efficient Coin Mixing Scheme for Large Scale Bitcoin Transactions72
Constructing Immune-Cover for Improving Holistic Security of Spatial Adaptive Steganography71
Defeating Data Plane Attacks With Program Obfuscation69
Caught-in-Translation (CiT): Detecting Cross-Level Inconsistency Attacks in Network Functions Virtualization (NFV)69
OFIDS : Online Learning-Enabled and Fingerprint-Based Intrusion Detection System in Controller Area Networks69
Towards a New Thermal Monitoring Based Framework for Embedded CPS Device Security68
DBFT: A Byzantine Fault Tolerance Protocol With Graceful Performance Degradation68
SG-Audit: An Efficient and Robust Cloud Auditing Scheme for Smart Grid63
Adaptive HEVC Steganography Based on Steganographic Compression Efficiency Degradation Model63
Harnessing Policy Authenticity for Hidden Ciphertext Policy Attribute-Based Encryption61
Chained HotStuff Under Performance Attack59
MERCURY: Practical Cross-Chain Exchange via Trusted Hardware59
Feature Reconstruction Attacks and Countermeasures of DNN Training in Vertical Federated Learning59
FedPA: Generator-Based Heterogeneous Federated Prototype Adversarial Learning58
SVOC: Secure Aggregatable and Extractable System for Outsourced Cloud Computation58
RMAAC: Joint Markov Games and Robust Multiagent Actor-Critic for Explainable Malware Defense in Social IoT58
FishboneChain: A Scalable and Liquidity-Guaranteed Crowdsourcing Platform Based on Multiple Child Chains57
Secure and Scalable Cross-Domain Data Sharing in Zero-Trust Cloud-Edge-End Environment Based on Sharding Blockchain56
Enhancing Online Transaction Fraud Detection via Heterogeneous Source Models54
Replay-Resistant Few-Shot Disk Authentication Using Electromagnetic Fingerprint54
Semantic-Preserving Linguistic Steganography by Pivot Translation and Semantic-Aware Bins Coding53
BIOWISH: Biometric Recognition Using Wearable Inertial Sensors Detecting Heart Activity53
Securely Outsourcing Neural Network Inference to the Cloud With Lightweight Techniques52
Pre-Trained Model-Based Automated Software Vulnerability Repair: How Far are We?52
Enhancing Sybil Detection via Social-Activity Networks: A Random Walk Approach52
A Temporal Chrominance Trigger for Clean-Label Backdoor Attack Against Anti-Spoof Rebroadcast Detection52
FedTracker: Furnishing Ownership Verification and Traceability for Federated Learning Model51
Online Streaming Sampling Publication Method Over Sliding Windows With Differential Privacy51
On the Detection of Smart, Self-Propagating Internet Worms51
RDP-GAN: A Rényi-Differential Privacy Based Generative Adversarial Network51
Perceptual Image Hashing With Locality Preserving Projection for Copy Detection50
srTLS: Secure TLS Handshake on Corrupted Machines49
SpADe: Multi-Stage Spam Account Detection for Online Social Networks49
Artemis: Defending Against Backdoor Attacks via Distribution Shift49
VeriCache: Formally Verified Fine-Grained Partitioned Cache for Side-Channel-Secure Enclaves49
A Comparative Analysis of Software Aging in Image Classifiers on Cloud and Edge49
SHIELD: Thwarting Code Authorship Attribution48
From Isolation to Integration: A Reputation-Backed Auditable Model for Cohort Data Sharing48
MISP: An Efficient Quantum-Resistant Misbehavior Preventing Scheme With Self-Enforcement for Vehicle-to-Everything48
Untargeted Poisoning Membership Inference with Sample Selection and Enhancement48
A Systematic Methodology to Compute the Quantum Vulnerability Factors for Quantum Circuits48
HDWSA2: A Secure Hierarchical Deterministic Wallet Supporting Stealth Address and Signature Aggregation47
LocGuard: A Location Privacy Defender for Image Sharing47
Physical Layer Authentication Utilizing Beam Pattern Features in Millimeter-Wave MIMO Systems47
Decentralized Self-Auditing Multiple Cloud Storage in Compressed Provable Data Possession47
How to Defend Against Large-scale Model Poisoning Attacks in Federated Learning: A Vertical Solution46
Incentive Mechanism Design for Collaborative Physical Layer Authentication: A Centralized Governance Approach46
Nip in the Bud: Forecasting and Interpreting Post- Exploitation Attacks in Real-Time Through Cyber Threat Intelligence Reports46
Membership Inference Attacks Against Machine Learning Models via Prediction Sensitivity46
Decentralized and Fair Trading Via Blockchain: The Journey So Far and the Road Ahead46
Automated Analysis of Security Policy Violations in Helm Charts45
On the Security of Secure Keyword Search and Data Sharing Mechanism for Cloud Computing45
AttMark: Attention Based Model Watermarking Against Stealing Attacks44
Verifiable Homomorphic Secret Sharing for Low Degree Polynomials44
Evolutionary Dynamic Database Partitioning Optimization for Privacy and Utility44
Design for Assurance: Employing Functional Verification Tools for Thwarting Hardware Trojan Threat in 3PIPs44
Towards Neural Network-Based Communication System: Attack and Defense43
SAFE: A General Secure and Fair Auction Framework for Wireless Markets With Privacy Preservation43
Resisting Compromise in Remote Swarm Attestation: Dependable and Secure Key Computation for Prover and Verifier43
Holistic Implicit Factor Evaluation of Model Extraction Attacks42
A Full Lifecycle Authentication Scheme for Large-scale Smart IoT Applications41
Anomaly Detection in Industrial Control Systems Based on Cross-Domain Representation Learning41
Enhancing Secure Cloud Data Sharing: Dynamic User Groups and Outsourced Decryption40
On-the-Fly Privacy for Location Histograms40
MRSA: Mask Random Array Protocol for Efficient Secure Handover Authentication in 5G HetNets40
Smaug: A TEE-Assisted Secured SQLite for Embedded Systems39
Studying the Robustness of Anti-Adversarial Federated Learning Models Detecting Cyberattacks in IoT Spectrum Sensors39
Attacking Deep Reinforcement Learning With Decoupled Adversarial Policy39
Privacy Leakage in Wireless Charging39
CryptoRec: Novel Collaborative Filtering Recommender Made Privacy-Preserving Easy39
An Adaptive IPM-Based HEVC Video Steganography via Minimizing Non-Additive Distortion38
A Privacy-Preserving Graph Neural Network for Network Intrusion Detection38
EtherCloak: Enabling Multi-Level and Customized Privacy on Account-Model Blockchains38
A Scheme of Robust Privacy-Preserving Multi-Party Computation via Public Verification38
UC Secure Private Branching Program and Decision Tree Evaluation38
Matrix-Based Secret Sharing for Reversible Data Hiding in Encrypted Images38
CMI: Client-Targeted Membership Inference in Federated Learning38
Privacy-Preserving Proxy Bilateral Access Control for Secure Data Forwarding38
AVOID: Automated Void Detection in STL Files37
Efficient and Privacy-Preserving Weighted Range Set Sampling in Cloud37
DE-Sword: Incentivized Verifiable Tag Path Query in RFID-Enabled Supply Chain Systems37
Privacy-Preserving Decision-Making Over Blockchain37
DeepMnemonic: Password Mnemonic Generation via Deep Attentive Encoder-Decoder Model37
Fine-Grained Poisoning Framework Against Federated Learning36
Leveraging CVAE Encoding for Backdoor Attacks in Few-Shot Learning with Prototypical Networks36
UniQGAN: Towards Improved Modulation Classification With Adversarial Robustness Using Scalable Generator Design36
Message Control for Blockchain Rewriting35
Accurate and Efficient Privacy-Preserving Feature Extraction on Encrypted Images35
CherryPicker: A Parallel Solving and State Sharing Hybrid Fuzzing System35
Generalized Local Optimality for Video Steganalysis in Motion Vector Domain35
Low-Overhead Reversible Coherence Protocol35
AWDP-Automated Windows Domain Penetration Framework With Deep Reinforcement Learning34
Threshold Delegatable Anonymous Credentials With Controlled and Fine-Grained Delegation34
Weaknesses of Popular and Recent Covert Channel Detection Methods and a Remedy34
Anomaly Detection in Event-Triggered Traffic Time Series via Similarity Learning34
Delegation Security Analysis in Workflow Systems34
NarAdv: Natural-Style Physical Adversarial Attack on Traffic Sign Detection for Autonomous Vehicles34
Hierarchical GNN Message Passing for Node-level Anomaly Detection in Industrial Control Systems34
SE#PCFG: Semantically Enhanced PCFG for Password Analysis and Cracking34
Spotting Anomalies at the Edge: Outlier Exposure-Based Cross-Silo Federated Learning for DDoS Detection34
A Magnetic Signal Based Device Fingerprinting Scheme in Wireless Charging34
ZeroProKeS: A Secure Zeroconf Key Establishment Protocol for Large-Scale Low-Cost Applications34
SHIELD - Secure Aggregation Against Poisoning in Hierarchical Federated Learning33
Privacy-Preserving Anomaly Detection of Encrypted Smart Contract for Blockchain-Based Data Trading33
SkillVet: Automated Traceability Analysis of Amazon Alexa Skills33
Performability of Network Service Chains: Stochastic Modeling and Assessment of Softwarized IP Multimedia Subsystem33
PPCA - Privacy-Preserving Collision Avoidance for Autonomous Unmanned Aerial Vehicles33
Quantitative Frequency-Based Framework for Interpreting Adversarial Examples33
Attacks and Countermeasures on Privacy-Preserving Biometric Authentication Schemes33
Practical Encrypted Network Traffic Pattern Matching for Secure Middleboxes33
DAENet: Making Strong Anonymity Scale in a Fully Decentralized Network33
2PCLGA: Privacy-Preserving and Provable-Secure Certificateless Group Key Agreement Scheme for the Distributed Learning-Based MEC Networks32
Diff-ID: An Explainable Identity Difference Quantification Framework for DeepFake Detection32
Decentralized Self-Auditing Scheme With Errors Localization for Multi-Cloud Storage32
Cover Selection for Steganography Using Image Similarity32
Effectively Improving Data Diversity of Substitute Training for Data-Free Black-Box Attack32
$\mathsf {JUMBO}$JUMBO: Fully Asynchronous BFT Consensus Made Truly Scalable32
Chebyshev Polynomial Based Emergency Conditions With Authentication Scheme for 5G-Assisted Vehicular Fog Computing32
Automated Firewall Configuration in Virtual Networks31
PPTD: A Path Profiling-based Threat Detection Method Towards Deployed Smart Contracts31
ValidCNN: A Large-Scale CNN Predictive Integrity Verification Scheme Based on zk-SNARK31
Enabling Secure and Efficient Decentralized Storage Auditing With Blockchain31
Mitigating Distributed DoS Attacks on Bandwidth Allocation for Federated Learning in Mobile Edge Networks31
AIIP-Chain: Fair Copyright Sharing With Credible Ownership Verification in AI Model Trading31
Calibrated Uncertainty Estimation for Trustworthy Deep IoT Attack Detection30
Practical Two-Factor Authentication Protocol for Real-Time Data Access in WSNs30
Universal Low Bit-Rate Speech Steganalysis Integrating Domain-Specific and Domain-Shared Knowledge30
Sphinx: Certificateless Conditional Privacy-Preserving Authentication With Secure Transmission for VANETs30
Handling Labeled Data Insufficiency: Semi-supervised Learning with Self-Training Mixup Decision Tree for Classification of Network Attacking Traffic30
Multi-label Classification for Android Malware Based on Active Learning30
Privacy-Preserving Network Embedding Against Private Link Inference Attacks30
BASS: A Blockchain-Based Asynchronous SignSGD Architecture for Efficient and Secure Federated Learning30
An Efficient and Zero-Knowledge Classical Machine Learning Inference Pipeline30
Model of Execution Trace Obfuscation Between Threads29
EZchain: A Secure Scalable Blockchain Protocol via Passive Sharding29
SecDR: Enabling Secure, Efficient, and Accurate Data Recovery for Mobile Crowdsensing29
Improving the Accuracy of IR-Level Fault Injection29
PKVIC: Supplement Missing Software Package Information in Security Vulnerability Reports29
Attributed Graph Clustering in Collaborative Settings29
Online Failure Prediction for Complex Systems: Methodology and Case Studies29
ACL: Account Linking in Online Social Networks With Robust Camera Fingerprint Matching29
No-Proof Consensus-based Light Blockchain for Distributed Computing Scenarios28
Threat-Event Detection for Distributed Networks Based on Spatiotemporal Markov Random Field28
Deep Learning for Coverage-Guided Fuzzing: How Far are We?28
On Spatial-Provenance Recovery in Wireless Networks With Relaxed-Privacy Constraints28
Attack Hypotheses Generation Based on Threat Intelligence Knowledge Graph28
DID We Miss Anything?: Towards Privacy-Preserving Decentralized ID Architecture28
Trust Beyond Border: Lightweight, Verifiable User Isolation for Protecting In-Enclave Services28
kTCQ: Achieving Privacy-Preserving k-Truss Community Queries Over Outsourced Data28
Membership Inference Attacks Against Deep Learning Models via Logits Distribution28
Sine: Similarity is Not Enough for Mitigating Local Model Poisoning Attacks in Federated Learning27
Understanding User Passwords Through Parsing Tree27
Making Information Hiding Effective Again27
Blockchain-Based Secure Federated Learning With Improved Consensus Protocol and Personalized Differential Privacy27
Building Confidential Accelerator Computing Environment for Arm CCA27
Facial Data Minimization: Shallow Model as Your Privacy Filter27
PrivESD: A Privacy-Preserving Cloud-Edge Collaborative Logistic Regression Model over Encrypted Streaming Data27
BitBatSPIR: Efficient Batch Symmetric Private Information Retrieval From PSI26
Comments on “VERSA: Verifiable Secure Aggregation for Cross-Device Federated Learning”26
Developing Attack Detection Models for Microservice Applications: A Comprehensive Framework and Its Illustration and Validation on DoS Attacks26
SuperSketch: A Multi-Dimensional Reversible Data Structure for Super Host Identification26
Trusted Video Inpainting Localization via Deep Attentive Noise Learning26
Cooperating or Kicking Out: Defending Against Poisoning Attacks in Federated Learning via the Evolution of Cooperation26
An Analytical and Empirical Investigation of Tag Partitioning for Energy-Efficient Reliable Cache26
Price TAG: Towards Semi-Automatically Discovery Tactics, Techniques and Procedures OF E-Commerce Cyber Threat Intelligence26
Rethinking the Design of Backdoor Triggers and Adversarial Perturbations: A Color Space Perspective26
DIDO+: Data Provenance From Restricted TLS 1.3 Websites With Selective Disclosure26
Decentralized Multi-Client Functional Encryption for Inner Product With Applications to Federated Learning26
Public Proofs of Data Replication and Retrievability With User-Friendly Replication25
Multiple Targets Directed Greybox Fuzzing25
A Secure Computing System With Hardware-Efficient Lazy Bonsai Merkle Tree for FPGA-Attached Embedded Memory25
Precise Discovery of More Taint-Style Vulnerabilities in Embedded Firmware25
Exploiting Deep Neural Networks as Covert Channels25
CPAKA: Mutual Authentication and Key Agreement Scheme Based on Conditional PUF in Space-Air-Ground Integrated Network25
Blockchain-Based Shared Data Integrity Auditing and Deduplication25
Data Protection: Privacy-Preserving Data Collection With Validation25
PIEDChecker: Uncover Permissions-independent Emulation-Detection Methods in Android System25
Collaborative Prediction in Anti-Fraud System Over Multiple Credit Loan Platforms25
Non-Interactive Multi-Client Searchable Encryption: Realization and Implementation25
Private Reachability Queries on Structured Encrypted Temporal Bipartite Graphs24
BadCleaner: Defending Backdoor Attacks in Federated Learning via Attention-Based Multi-Teacher Distillation24
FedDMC: Efficient and Robust Federated Learning via Detecting Malicious Clients24
Towards Robust Fingerprinting of Relational Databases by Mitigating Correlation Attacks24
T-Trace: Constructing the APTs Provenance Graphs Through Multiple Syslogs Correlation24
Possibility and Impossibility of Propagation Safety and Reliability: A 1-Safe and Reliable Snap-Stabilizing Broadcast Algorithm24
An Empirical Study of Fault Triggers in Deep Learning Frameworks24
Checking Only When It Is Necessary: Enabling Integrity Auditing Based on the Keyword With Sensitive Information Privacy for Encrypted Cloud Data23
Integrating Coordinate Transformation and Random Sampling Into High-Capacity Reversible Data Hiding in Encrypted Polygonal Models23
Robust Audio Copy-Move Forgery Detection Using Constant Q Spectral Sketches and GA-SVM23
Group BFT: Two-Round BFT Protocols Via Replica Grouping23
Model Stability Defense against Model Poisoning in Federated Learning23
-Inference: A Data-Aware and High-Utility Privacy Model for Relational Data Publishing23
Octopus: A Robust and Privacy-Preserving Scheme for Compressed Gradients in Federated Learning23
Towards Secure and Efficient Wildcard Search for Cloud Storage23
HyperPS: A Virtual-Machine Memory Protection Approach Through Hypervisor's Privilege Separation23
Sorald: Automatic Patch Suggestions for SonarQube Static Analysis Violations23
Privacy-Preserving and Reliable Truth Discovery for Heterogeneous Fog-Based Crowdsensing22
An Unbounded Multi-input Quadratic Functional Encryption Scheme for Secure Cloud-based Machine Learning22
Pricing Utility vs. Location Privacy: A Differentially Private Data Sharing Framework for Ride-on-Demand Services22
The “Code” of Ethics: A Holistic Audit of AI Code Generators22
Mitigating Adversarial Attacks on Data-Driven Invariant Checkers for Cyber-Physical Systems22
An OpenRAN Security Framework for Scalable Authentication, Authorization, and Discovery of xApps With Isolated Critical Services22
Highly Efficient and Scalable Access Control Mechanism for IoT Devices in Pervasive Environments22
Performance-lossless Black-box Model Watermarking22
An Optimized Sparse Response Mechanism for Differentially Private Federated Learning22
A Blockchain-Based Secure Covert Communication Method via Shamir Threshold and STC Mapping22
PellucidAttachment: Protecting Users From Attacks via E-Mail Attachments22
ALI: Anonymous Lightweight Inter-Vehicle Broadcast Authentication with Encryption22
Fault Injection for TensorFlow Applications22
Design and Analysis of Adaptive Graph-Based Cancelable Multi-Biometrics Approach22
Friendship Preference: Scalable and Robust Category of Features for Social Bot Detection21
Efficient Noise Generation Protocols for Differentially Private Multiparty Computation21
Revisiting Privacy-Preserving Min and k-th Min Protocols for Mobile Sensing21
An Evolutionary Attack for Revealing Training Data of DNNs With Higher Feature Fidelity21
Automatically Identifying CVE Affected Versions With Patches and Developer Logs21
TAICHI: Transform Your Secret Exploits Into Mine From a Victim's Perspective21
Circuit-Free General-Purpose Multi-Party Computation via Co-Utile Unlinkable Outsourcing21
NunChuck: A Two-Phase Chained BFT Protocol for Tolerating the Partitioning Attack21
VeriFi: Towards Verifiable Federated Unlearning21
EBSNN: Extended Byte Segment Neural Network for Network Traffic Classification21
Delta Counter: Bandwidth-Efficient Encryption Counter Representation for Secure GPU Memory21
SaVioR: Thwarting Stack-Based Memory Safety Violations by Randomizing Stack Layout21
0.084508180618286