IEEE Transactions on Dependable and Secure Computing

Papers
(The TQCC of IEEE Transactions on Dependable and Secure Computing is 11. The table below lists those papers that are above that threshold based on CrossRef citation counts [max. 250 papers]. The publications cover those that have been published in the past four years, i.e., from 2021-06-01 to 2025-06-01.)
ArticleCitations
Defeating Data Plane Attacks With Program Obfuscation349
AnoPay: Anonymous Payment for Vehicle Parking With Updatable Credential187
Provably-Secure One-Message Unilateral Entity Authentication Schemes174
Mules and Permission Laundering in Android: Dissecting Custom Permissions in the Wild132
Caught-in-Translation (CiT): Detecting Cross-Level Inconsistency Attacks in Network Functions Virtualization (NFV)126
SwiftParade: Anti-Burst Multipath Validation126
The Perils of Wi-Fi Spoofing Attack Via Geolocation API and Its Defense114
Towards a New Thermal Monitoring Based Framework for Embedded CPS Device Security111
R2E: A Decentralized Scheme for Rewarding Tor Relays With Cryptocurrencies105
Enhancing Sybil Detection via Social-Activity Networks: A Random Walk Approach101
On the Detection of Smart, Self-Propagating Internet Worms94
Differentially Oblivious Two-Party Pattern Matching With Sublinear Round Complexity85
Window Canaries: Re-Thinking Stack Canaries for Architectures With Register Windows81
iQuery: A Trustworthy and Scalable Blockchain Analytics Platform78
Sharing Can be Threatening: Uncovering Security Flaws of RBAC Model on Smart Home Platforms76
FedPA: Generator-Based Heterogeneous Federated Prototype Adversarial Learning75
Optimization-Time Analysis for Cybersecurity74
pSafety: Privacy-Preserving Safety Monitoring in Online Ride Hailing Services74
Chained HotStuff Under Performance Attack74
An Effective and Resilient Backdoor Attack Framework against Deep Neural Networks and Vision Transformers72
Heterogeneous Domain Adaptation for Multistream Classification on Cyber Threat Data72
MTD-AD: Moving Target Defense as Adversarial Defense70
A Comparative Analysis of Software Aging in Image Classifiers on Cloud and Edge69
A Temporal Chrominance Trigger for Clean-Label Backdoor Attack Against Anti-Spoof Rebroadcast Detection65
Semantic-Preserving Linguistic Steganography by Pivot Translation and Semantic-Aware Bins Coding64
OFIDS : Online Learning-Enabled and Fingerprint-Based Intrusion Detection System in Controller Area Networks64
ABATe: Automatic Behavioral Abstraction Technique to Detect Anomalies in Smart Cyber-Physical Systems60
Split Learning without Local Weight Sharing To Enhance Client-side Data Privacy60
Perceptual Image Hashing With Locality Preserving Projection for Copy Detection59
Steganography With Generated Images: Leveraging Volatility to Enhance Security59
Ensuring State Continuity for Confidential Computing: A Blockchain-Based Approach59
Constructing Immune-Cover for Improving Holistic Security of Spatial Adaptive Steganography58
CoinLayering: An Efficient Coin Mixing Scheme for Large Scale Bitcoin Transactions57
Proactive Anti-Eavesdropping With Trap Deployment in Wireless Networks55
Design Principles for Orthogonal Moments in Video Watermarking54
Harnessing Policy Authenticity for Hidden Ciphertext Policy Attribute-Based Encryption53
Feature Reconstruction Attacks and Countermeasures of DNN Training in Vertical Federated Learning53
SG-Audit: An Efficient and Robust Cloud Auditing Scheme for Smart Grid53
DBFT: A Byzantine Fault Tolerance Protocol With Graceful Performance Degradation51
Malicious-Resistant Non-Interactive Verifiable Aggregation for Federated Learning51
Speech Sanitizer: Speech Content Desensitization and Voice Anonymization50
RDP-GAN: A Rényi-Differential Privacy Based Generative Adversarial Network47
RiskProp: Account Risk Rating on Ethereum via De-anonymous Score and Network Propagation47
Fully Accountable Data Sharing for Pay-as-You-Go Cloud Scenes46
Adaptive HEVC Steganography Based on Steganographic Compression Efficiency Degradation Model46
BIOWISH: Biometric Recognition Using Wearable Inertial Sensors Detecting Heart Activity45
Securely Outsourcing Neural Network Inference to the Cloud With Lightweight Techniques45
Secure and Scalable Cross-Domain Data Sharing in Zero-Trust Cloud-Edge-End Environment Based on Sharding Blockchain45
FedTracker: Furnishing Ownership Verification and Traceability for Federated Learning Model44
SpADe: Multi-Stage Spam Account Detection for Online Social Networks44
Decentralized and Fair Trading via Blockchain: The Journey So Far and the Road Ahead43
Pre-Trained Model-Based Automated Software Vulnerability Repair: How Far are We?43
SAFE: A General Secure and Fair Auction Framework for Wireless Markets With Privacy Preservation43
Decentralized Self-Auditing Multiple Cloud Storage in Compressed Provable Data Possession42
SHIELD: Thwarting Code Authorship Attribution41
CryptoRec: Novel Collaborative Filtering Recommender Made Privacy-Preserving Easy40
Nip in the Bud: Forecasting and Interpreting Post- Exploitation Attacks in Real-Time Through Cyber Threat Intelligence Reports40
MISP: An Efficient Quantum-resistant Misbehavior Preventing Scheme with Self-enforcement for Vehicle-to-Everything40
Software Vulnerability Discovery via Learning Multi-Domain Knowledge Bases40
Membership Inference Attacks Against Machine Learning Models via Prediction Sensitivity40
UC Secure Private Branching Program and Decision Tree Evaluation40
A Systematic Methodology to Compute the Quantum Vulnerability Factors for Quantum Circuits40
Artemis: Defending Against Backdoor Attacks via Distribution Shift40
On-the-Fly Privacy for Location Histograms39
LocGuard: A Location Privacy Defender for Image Sharing39
Privacy Leakage in Wireless Charging39
CMI: Client-Targeted Membership Inference in Federated Learning39
Verifiable Homomorphic Secret Sharing for Low Degree Polynomials39
An Adaptive IPM-Based HEVC Video Steganography via Minimizing Non-Additive Distortion38
Towards Neural Network-Based Communication System: Attack and Defense38
VeriCache: Formally Verified Fine-Grained Partitioned Cache for Side-Channel-Secure Enclaves37
A Privacy-Preserving Graph Neural Network for Network Intrusion Detection37
Matrix-Based Secret Sharing for Reversible Data Hiding in Encrypted Images37
Evolutionary Dynamic Database Partitioning Optimization for Privacy and Utility36
Physical Layer Authentication Utilizing Beam Pattern Features in Millimeter-Wave MIMO Systems35
Smaug: A TEE-Assisted Secured SQLite for Embedded Systems35
HDWSA2: A Secure Hierarchical Deterministic Wallet Supporting Stealth Address and Signature Aggregation35
On the Security of Secure Keyword Search and Data Sharing Mechanism for Cloud Computing35
A Scheme of Robust Privacy-Preserving Multi-Party Computation Via Public Verification34
Holistic Implicit Factor Evaluation of Model Extraction Attacks34
MRSA: Mask Random Array Protocol for Efficient Secure Handover Authentication in 5G HetNets34
Attacking Deep Reinforcement Learning With Decoupled Adversarial Policy34
Efficient and Privacy-Preserving Weighted Range Set Sampling in Cloud33
srTLS: Secure TLS Handshake on Corrupted Machines33
Studying the Robustness of Anti-Adversarial Federated Learning Models Detecting Cyberattacks in IoT Spectrum Sensors33
A Full Lifecycle Authentication Scheme for Large-scale Smart IoT Applications33
Anomaly Detection in Industrial Control Systems Based on Cross-Domain Representation Learning33
Privacy-Preserving Network Embedding Against Private Link Inference Attacks32
Decentralized Self-Auditing Scheme With Errors Localization for Multi-Cloud Storage32
Spotting Anomalies at the Edge: Outlier Exposure-Based Cross-Silo Federated Learning for DDoS Detection32
Practical Two-Factor Authentication Protocol for Real-Time Data Access in WSNs32
BASS: A Blockchain-Based Asynchronous SignSGD Architecture for Efficient and Secure Federated Learning31
Effectively Improving Data Diversity of Substitute Training for Data-Free Black-Box Attack31
Enabling Secure and Efficient Decentralized Storage Auditing With Blockchain31
ValidCNN: A Large-Scale CNN Predictive Integrity Verification Scheme Based on zk-SNARK31
DE-Sword: Incentivized Verifiable Tag Path Query in RFID-Enabled Supply Chain Systems30
Performability of Network Service Chains: Stochastic Modeling and Assessment of Softwarized IP Multimedia Subsystem30
Attacks and Countermeasures on Privacy-Preserving Biometric Authentication Schemes30
DeepMnemonic: Password Mnemonic Generation via Deep Attentive Encoder-Decoder Model30
EtherCloak: Enabling Multi-Level and Customized Privacy on Account-Model Blockchains30
Practical Encrypted Network Traffic Pattern Matching for Secure Middleboxes29
Privacy-Preserving Decision-Making Over Blockchain29
Threshold Delegatable Anonymous Credentials With Controlled and Fine-Grained Delegation29
Delegation Security Analysis in Workflow Systems29
Anomaly Detection in Event-Triggered Traffic Time Series via Similarity Learning29
UniQGAN: Towards Improved Modulation Classification With Adversarial Robustness Using Scalable Generator Design29
SHIELD - Secure Aggregation Against Poisoning in Hierarchical Federated Learning29
SE#PCFG: Semantically Enhanced PCFG for Password Analysis and Cracking28
Generalized Local Optimality for Video Steganalysis in Motion Vector Domain28
CherryPicker: A Parallel Solving and State Sharing Hybrid Fuzzing System28
SkillVet: Automated Traceability Analysis of Amazon Alexa Skills28
$\mathsf {JUMBO}$: Fully Asynchronous BFT Consensus Made Truly Scalable27
Mitigating Distributed DoS Attacks on Bandwidth Allocation for Federated Learning in Mobile Edge Networks27
Accurate and Efficient Privacy-Preserving Feature Extraction on Encrypted Images27
Diff-ID: An Explainable Identity Difference Quantification Framework for DeepFake Detection27
Automated Firewall Configuration in Virtual Networks27
Low-overhead Reversible Coherence Protocol27
Message Control for Blockchain Rewriting27
Cover Selection for Steganography Using Image Similarity27
DAENet: Making Strong Anonymity Scale in a Fully Decentralized Network27
A Magnetic Signal Based Device Fingerprinting Scheme in Wireless Charging26
Comments on “VERSA: Verifiable Secure Aggregation for Cross-Device Federated Learning”26
Privacy-Preserving Anomaly Detection of Encrypted Smart Contract for Blockchain-Based Data Trading26
Trust Beyond Border: Lightweight, Verifiable User Isolation for Protecting In-Enclave Services26
PPCA - Privacy-Preserving Collision Avoidance for Autonomous Unmanned Aerial Vehicles26
Weaknesses of Popular and Recent Covert Channel Detection Methods and a Remedy26
Chebyshev Polynomial Based Emergency Conditions with Authentication Scheme for 5G-Assisted Vehicular Fog Computing26
Handling Labeled Data Insufficiency: Semi-supervised Learning with Self-Training Mixup Decision Tree for Classification of Network Attacking Traffic26
ZeroProKeS: A Secure Zeroconf Key Establishment Protocol for Large-Scale Low-Cost Applications26
Building a Secure Knowledge Marketplace Over Crowdsensed Data Streams25
Price TAG: Towards Semi-Automatically Discovery Tactics, Techniques and Procedures OF E-Commerce Cyber Threat Intelligence25
A Secure Computing System With Hardware-Efficient Lazy Bonsai Merkle Tree for FPGA-Attached Embedded Memory25
Threat-Event Detection for Distributed Networks Based on Spatiotemporal Markov Random Field25
PKVIC: Supplement Missing Software Package Information in Security Vulnerability Reports25
Cooperating or Kicking Out: Defending against Poisoning Attacks in Federated Learning via the Evolution of Cooperation25
Deep Learning for Coverage-Guided Fuzzing: How Far are We?24
Understanding User Passwords through Parsing Tree24
Exploiting Deep Neural Networks as Covert Channels24
An Efficient and Zero-Knowledge Classical Machine Learning Inference Pipeline24
Precise Discovery of More Taint-Style Vulnerabilities in Embedded Firmware24
Multi-label Classification for Android Malware Based on Active Learning24
BadCleaner: Defending Backdoor Attacks in Federated Learning via Attention-Based Multi-Teacher Distillation24
kTCQ: Achieving Privacy-Preserving k-Truss Community Queries Over Outsourced Data24
Online Failure Prediction for Complex Systems: Methodology and Case Studies23
Facial Data Minimization: Shallow Model as Your Privacy Filter23
Model of Execution Trace Obfuscation Between Threads23
Improving the Accuracy of IR-Level Fault Injection23
FedDMC: Efficient and Robust Federated Learning via Detecting Malicious Clients23
Man-in-the-Middle Attacks Against Machine Learning Classifiers Via Malicious Generative Models23
CPAKA: Mutual Authentication and Key Agreement Scheme Based on Conditional PUF in Space-Air-Ground Integrated Network23
Membership Inference Attacks Against Deep Learning Models via Logits Distribution23
Universal Low Bit-Rate Speech Steganalysis Integrating Domain-specific and Domain-shared Knowledge23
Decentralized Multi-Client Functional Encryption for Inner Product With Applications to Federated Learning22
EZchain: A Secure Scalable Blockchain Protocol via Passive Sharding22
ACL: Account Linking in Online Social Networks With Robust Camera Fingerprint Matching22
Data Protection: Privacy-Preserving Data Collection With Validation22
Making Information Hiding Effective Again22
Multiple Targets Directed Greybox Fuzzing22
Non-Interactive Multi-Client Searchable Encryption: Realization and Implementation22
An Empirical Study of Fault Triggers in Deep Learning Frameworks22
Attack Hypotheses Generation Based on Threat Intelligence Knowledge Graph22
Attributed Graph Clustering in Collaborative Settings22
Sine: Similarity is Not Enough for Mitigating Local Model Poisoning Attacks in Federated Learning22
DID We Miss Anything?: Towards Privacy-Preserving Decentralized ID Architecture22
Collaborative Prediction in Anti-Fraud System Over Multiple Credit Loan Platforms22
Public Proofs of Data Replication and Retrievability With User-Friendly Replication22
Rethinking the Design of Backdoor Triggers and Adversarial Perturbations: A Color Space Perspective22
SuperSketch: A Multi-Dimensional Reversible Data Structure for Super Host Identification22
SecDR: Enabling Secure, Efficient, and Accurate Data Recovery for Mobile Crowdsensing22
T-Trace: Constructing the APTs Provenance Graphs Through Multiple Syslogs Correlation22
HyperPS: A Virtual-Machine Memory Protection Approach Through Hypervisor's Privilege Separation21
Private Reachability Queries on Structured Encrypted Temporal Bipartite Graphs21
An Optimized Sparse Response Mechanism for Differentially Private Federated Learning21
Highly Efficient and Scalable Access Control Mechanism for IoT Devices in Pervasive Environments21
$\eta$-Inference: A Data-Aware and High-Utility Privacy Model for Relational Data Publishing21
Automatically Identifying CVE Affected Versions With Patches and Developer Logs21
Sorald: Automatic Patch Suggestions for SonarQube Static Analysis Violations21
Blockchain-Based Shared Data Integrity Auditing and Deduplication21
Towards Robust Fingerprinting of Relational Databases by Mitigating Correlation Attacks21
Personalized 3D Location Privacy Protection With Differential and Distortion Geo-Perturbation21
Pricing Utility vs. Location Privacy: A Differentially Private Data Sharing Framework for Ride-on-Demand Services21
Possibility and Impossibility of Propagation Safety and Reliability: A 1-Safe and Reliable Snap-Stabilizing Broadcast Algorithm21
IoVCom: Reliable Comprehensive Communication System for Internet of Vehicles21
Design and Analysis of Adaptive Graph-Based Cancelable Multi-Biometrics Approach21
Checking Only When It Is Necessary: Enabling Integrity Auditing Based on the Keyword With Sensitive Information Privacy for Encrypted Cloud Data20
Fault Injection for TensorFlow Applications20
A Blockchain-Based Secure Covert Communication Method via Shamir Threshold and STC Mapping20
Privacy-Preserving and Reliable Truth Discovery for Heterogeneous Fog-Based Crowdsensing20
PellucidAttachment: Protecting Users From Attacks via E-Mail Attachments20
Robust Audio Copy-Move Forgery Detection Using Constant Q Spectral Sketches and GA-SVM20
EBSNN: Extended Byte Segment Neural Network for Network Traffic Classification20
Friendship Preference: Scalable and Robust Category of Features for Social Bot Detection20
Quantify Co-Residency Risks in the Cloud Through Deep Learning20
Detecting Adversarial Examples on Deep Neural Networks With Mutual Information Neural Estimation20
The “Code” of Ethics: A Holistic Audit of AI Code Generators20
An OpenRAN Security Framework for Scalable Authentication, Authorization, and Discovery of xApps With Isolated Critical Services20
Mitigating Adversarial Attacks on Data-Driven Invariant Checkers for Cyber-Physical Systems19
ALI: Anonymous Lightweight Inter-Vehicle Broadcast Authentication with Encryption19
Evaluating the Robustness of Trigger Set-Based Watermarks Embedded in Deep Neural Networks19
VeriFi: Towards Verifiable Federated Unlearning19
MARS: Enabling Verifiable Range-Aggregate Queries in Multi-Source Environments19
Increasing the Resilience of Secure Multiparty Computation Using Security Modules19
Integrating Coordinate Transformation and Random Sampling Into High-Capacity Reversible Data Hiding in Encrypted Polygonal Models19
Minimax Approximation of Sign Function by Composite Polynomial for Homomorphic Comparison19
TAICHI: Transform Your Secret Exploits Into Mine From a Victim's Perspective19
SaVioR: Thwarting Stack-Based Memory Safety Violations by Randomizing Stack Layout18
Privacy-Preserving Liveness Detection for Securing Smart Voice Interfaces18
Circuit-Free General-Purpose Multi-Party Computation via Co-Utile Unlinkable Outsourcing18
RAT: Reinforcement-Learning-Driven and Adaptive Testing for Vulnerability Discovery in Web Application Firewalls18
Attribute-Based Membership Inference Attacks and Defenses on GANs18
An Evolutionary Attack for Revealing Training Data of DNNs With Higher Feature Fidelity18
Efficient Noise Generation Protocols for Differentially Private Multiparty Computation18
Blacklisting Based Anonymous Authentication Scheme for Sharing Economy18
Private Electronic Road Pricing Using Bulletproofs With Vector Commitments18
Detecting Errors in NGAC Policies via Fault-Based Testing18
Revisiting Privacy-Preserving Min and k-th Min Protocols for Mobile Sensing18
FewM-HGCL : Few-Shot Malware Variants Detection Via Heterogeneous Graph Contrastive Learning17
Delta Counter: Bandwidth-Efficient Encryption Counter Representation for Secure GPU Memory17
Trojan Detection in Digital Microfluidic Biochips via Image Classification: A Deep-Learning Based Approach17
Accountable Many-to-One Signature with Short Verification Key for Self-Sovereign Identity17
Object Oriented Policy Conflict Checking Framework in Cloud Networks (OOPC)17
MicroFI: Non-Intrusive and Prioritized Request-Level Fault Injection for Microservice Applications17
Optimizing Secure Decision Tree Inference Outsourcing17
Detecting Smart Home Device Activities Using Packet-Level Signatures From Encrypted Traffic17
Iterative Window Mean Filter: Thwarting Diffusion-Based Adversarial Purification17
Detecting Malicious Websites From the Perspective of System Provenance Analysis17
FeCo: Boosting Intrusion Detection Capability in IoT Networks via Contrastive Learning17
On Credibility of Adversarial Examples Against Learning-Based Grid Voltage Stability Assessment17
DiRLoc: Disentanglement Representation Learning for Robust Image Forgery Localization17
Nereus: Anonymous and Secure Ride-Hailing Service Based on Private Smart Contracts17
Leakage-Resilient and Carbon-Neutral Aggregation Featuring the Federated AI-enabled Critical Infrastructure17
D-LNBot: A Scalable, Cost-Free and Covert Hybrid Botnet on Bitcoin's Lightning Network17
On the Validation of Web X.509 Certificates by TLS Interception Products17
BazzAFL: Moving Fuzzing Campaigns Towards Bugs via Grouping Bug-Oriented Seeds17
V-Digger: An Efficient and Secure Vulnerability Assessment for Large-Scale ISP Network17
Fratricide! Hijacking in Android Multi-Window17
CAeSaR: An Online Payment Anti-Fraud Integration System With Decision Explainability16
Blockchain-Assisted Revocable Cross-Domain Authentication for Vehicular Ad-Hoc Networks16
Violin: Powerful Volumetric Injection Attack Against Searchable Encryption With Optimal Injection Size16
An Automated Monitoring and Repairing System for DNN Training16
VerifyTL: Secure and Verifiable Collaborative Transfer Learning16
AGAPECert: An Auditable, Generalized, Automated, Privacy-Enabling Certification Framework With Oblivious Smart Contracts16
CuckooAttack: Towards Practical Backdoor Attack against Automatic Speech Recognition Systems16
CRFU: Compressive Representation Forgetting Against Privacy Leakage on Machine Unlearning16
MVOC: A Lighter Multi-Client Verifiable Outsourced Computation for Malicious Lightweight Clients16
Towards an Interpretable Autoencoder: A Decision-Tree-Based Autoencoder and its Application in Anomaly Detection16
Gringotts: An Encrypted Version Control System With Less Trust on Servers16
Securing TEEs With Verifiable Execution Contracts16
A Covert and Efficient Attack on FPGA Cloud Based on Adaptive RON16
PRISM: A Hierarchical Intrusion Detection Architecture for Large-Scale Cyber Networks16
0.11678194999695