Login / Signup
IEEE Trans. Dependable Secur. Comput.
2004
2010
2018
2024
2004
2024
Keyphrases
Publications
volume 21, number 4, 2024
Lihong Tang
,
Xiao Chen
,
Sheng Wen
,
Li Li
,
Marthie Grobler
,
Yang Xiang
Demystifying the Evolution of Android Malware Variants.
IEEE Trans. Dependable Secur. Comput.
21 (4) (2024)
Yibiao Lu
,
Bingsheng Zhang
,
Kui Ren
Maliciously Secure MPC From Semi-Honest 2PC in the Server-Aided Model.
IEEE Trans. Dependable Secur. Comput.
21 (4) (2024)
Jiansong Zhang
,
Kejiang Chen
,
Chuan Qin
,
Weiming Zhang
,
Nenghai Yu
AAS: Automatic Virtual Data Augmentation for Deep Image Steganalysis.
IEEE Trans. Dependable Secur. Comput.
21 (4) (2024)
Hongwei Yao
,
Zheng Li
,
Kunzhe Huang
,
Jian Lou
,
Zhan Qin
,
Kui Ren
RemovalNet: DNN Fingerprint Removal Attacks.
IEEE Trans. Dependable Secur. Comput.
21 (4) (2024)
Chuan Yu
,
Shuhui Chen
,
Ziling Wei
,
Fei Wang
Toward a Truly Secure Telecom Network: Analyzing and Exploiting Vulnerable Security Configurations/ Implementations in Commercial LTE/IMS Networks.
IEEE Trans. Dependable Secur. Comput.
21 (4) (2024)
Dola Das
,
Kazi Md. Rokibul Alam
,
Yasuhiko Morimoto
An Anonymity Retaining Framework for Multi-party Skyline Queries Based on Unique Tags.
IEEE Trans. Dependable Secur. Comput.
21 (4) (2024)
Lo-Yao Yeh
,
Wan-Hsin Hsu
,
Chih-Ya Shen
GDPR-Compliant Personal Health Record Sharing Mechanism With Redactable Blockchain and Revocable IPFS.
IEEE Trans. Dependable Secur. Comput.
21 (4) (2024)
Pranav Jangir
,
Nishat Koti
,
Varsha Bhat Kukkala
,
Arpita Patra
,
Bhavish Raj Gopal
,
Somya Sangal
Vogue: Faster Computation of Private Heavy Hitters.
IEEE Trans. Dependable Secur. Comput.
21 (4) (2024)
Feng Lin
,
Chao Wang
,
Tiantian Liu
,
Ziwei Liu
,
Yijie Shen
,
Zhongjie Ba
,
Li Lu
,
Wenyao Xu
,
Kui Ren
High-Quality Speech Recovery Through Soundproof Protections via mmWave Sensing.
IEEE Trans. Dependable Secur. Comput.
21 (4) (2024)
Qin Liu
,
Yu Peng
,
Qian Xu
,
Hongbo Jiang
,
Jie Wu
,
Tian Wang
,
Tao Peng
,
Guojun Wang
,
Shaobo Zhang
$\mathsf{MARS}$MARS: Enabling Verifiable Range-Aggregate Queries in Multi-Source Environments.
IEEE Trans. Dependable Secur. Comput.
21 (4) (2024)
Yebo Feng
,
Jun Li
,
Devkishen Sisodia
,
Peter L. Reiher
On Explainable and Adaptable Detection of Distributed Denial-of-Service Traffic.
IEEE Trans. Dependable Secur. Comput.
21 (4) (2024)
Yang Yang
,
Wenyi Xue
,
Yonghua Zhan
,
Minming Huang
,
Yingjiu Li
,
Robert H. Deng
AnoPay: Anonymous Payment for Vehicle Parking With Updatable Credential.
IEEE Trans. Dependable Secur. Comput.
21 (4) (2024)
Chun-I Fan
,
Arijit Karati
,
Shou-Li Wu
A Privacy-Aware Provably Secure Smart Card Authentication Protocol Based on Physically Unclonable Functions.
IEEE Trans. Dependable Secur. Comput.
21 (4) (2024)
Haider Abbas
,
Muhammad Shahzad
,
Maliha Safdar
,
Ahmed Hemani
DUDE: Decryption, Unpacking, Deobfuscation, and Endian Conversion Framework for Embedded Devices Firmware.
IEEE Trans. Dependable Secur. Comput.
21 (4) (2024)
Shashank Arora
,
Pradeep K. Atrey
SecureC2Edit: A Framework for Secure Collaborative and Concurrent Document Editing.
IEEE Trans. Dependable Secur. Comput.
21 (4) (2024)
Shengyu Li
,
Songfan Li
,
Qingqing Liu
,
Yihang Song
,
Chong Zhang
,
Li Lu
Watch Out Your Thumb Drive: Covert Data Theft From Portable Data Storage via Backscatter.
IEEE Trans. Dependable Secur. Comput.
21 (4) (2024)
Ruben de Smet
,
Kris Steenhaut
,
An Braeken
Private Electronic Road Pricing Using Bulletproofs With Vector Commitments.
IEEE Trans. Dependable Secur. Comput.
21 (4) (2024)
Yizhong Liu
,
Xinxin Xing
,
Ziheng Tong
,
Xun Lin
,
Jing Chen
,
Zhenyu Guan
,
Qianhong Wu
,
Willy Susilo
Secure and Scalable Cross-Domain Data Sharing in Zero-Trust Cloud-Edge-End Environment Based on Sharding Blockchain.
IEEE Trans. Dependable Secur. Comput.
21 (4) (2024)
José María Jorquera Valero
,
Vasileios Theodorou
,
Manuel Gil Pérez
,
Gregorio Martínez Pérez
SLA-Driven Trust and Reputation Management Framework for 5G Distributed Service Marketplaces.
IEEE Trans. Dependable Secur. Comput.
21 (4) (2024)
Yinbin Miao
,
Feng Li
,
Xiaohua Jia
,
Huaxiong Wang
,
Ximeng Liu
,
Kim-Kwang Raymond Choo
,
Robert H. Deng
REKS: Role-Based Encrypted Keyword Search With Enhanced Access Control for Outsourced Cloud Data.
IEEE Trans. Dependable Secur. Comput.
21 (4) (2024)
Lei Zhou
,
Fengwei Zhang
,
Kevin Leach
,
Xuhua Ding
,
Zhenyu Ning
,
Guojun Wang
,
Jidong Xiao
Hardware-Assisted Live Kernel Function Updating on Intel Platforms.
IEEE Trans. Dependable Secur. Comput.
21 (4) (2024)
Zhiyi Tian
,
Lei Cui
,
Chenhan Zhang
,
Shuaishuai Tan
,
Shui Yu
,
Yonghong Tian
The Role of Class Information in Model Inversion Attacks Against Image Deep Learning Classifiers.
IEEE Trans. Dependable Secur. Comput.
21 (4) (2024)
Junren Qin
,
Shanxiang Lyu
,
Jiarui Deng
,
Xingyuan Liang
,
Shijun Xiang
,
Hao Chen
A Lattice-Based Embedding Method for Reversible Audio Watermarking.
IEEE Trans. Dependable Secur. Comput.
21 (4) (2024)
Youzhi Zhang
,
Dongkai Chen
,
Sushil Jajodia
,
Andrea Pugliese
,
V. S. Subrahmanian
,
Yanhai Xiong
GAIT: A Game-Theoretic Defense Against Intellectual Property Theft.
IEEE Trans. Dependable Secur. Comput.
21 (4) (2024)
Bin Yuan
,
Maogen Yang
,
Zheng Xu
,
Qunjinming Chen
,
Zhanxiang Song
,
Zhen Li
,
Deqing Zou
,
Hai Jin
Leakage of Authorization-Data in IoT Device Sharing: New Attacks and Countermeasure.
IEEE Trans. Dependable Secur. Comput.
21 (4) (2024)
H. O. Sai Varshith
,
Shamik Sural
,
Jaideep Vaidya
,
Vijayalakshmi Atluri
Efficiently Supporting Attribute-Based Access Control in Linux.
IEEE Trans. Dependable Secur. Comput.
21 (4) (2024)
Mingyang Song
,
Zhongyun Hua
,
Yifeng Zheng
,
Tao Xiang
,
Xiaohua Jia
Enabling Transparent Deduplication and Auditing for Encrypted Data in Cloud.
IEEE Trans. Dependable Secur. Comput.
21 (4) (2024)
Chen Liu
,
Bo Li
,
Jun Zhao
,
Xudong Liu
,
Chunpei Li
MalAF : Malware Attack Foretelling From Run-Time Behavior Graph Sequence.
IEEE Trans. Dependable Secur. Comput.
21 (4) (2024)
Yadong Xie
,
Fan Li
,
Yue Wu
,
Yu Wang
User Authentication on Earable Devices via Bone-Conducted Occlusion Sounds.
IEEE Trans. Dependable Secur. Comput.
21 (4) (2024)
Hao Huang
,
Patrick Wlazlo
,
Abhijeet Sahu
,
Adele Walker
,
Ana E. Goulart
,
Katherine R. Davis
,
Laura P. Swiler
,
Thomas D. Tarman
,
Eric D. Vugrin
Validating an Emulation-Based Cybersecurity Model With a Physical Testbed.
IEEE Trans. Dependable Secur. Comput.
21 (4) (2024)
Wei Li
,
Borui Yang
,
Hangyu Ye
,
Liyao Xiang
,
Qingxiao Tao
,
Xinbing Wang
,
Chenghu Zhou
MiniTracker: Large-Scale Sensitive Information Tracking in Mini Apps.
IEEE Trans. Dependable Secur. Comput.
21 (4) (2024)
Chuan Zhang
,
Mingyang Zhao
,
Jinwen Liang
,
Qing Fan
,
Liehuang Zhu
,
Song Guo
NANO: Cryptographic Enforcement of Readability and Editability Governance in Blockchain Databases.
IEEE Trans. Dependable Secur. Comput.
21 (4) (2024)
Zhao Zhang
,
Chunxiang Xu
,
Changsong Jiang
,
Kefei Chen
TSAPP: Threshold Single-Sign-On Authentication Preserving Privacy.
IEEE Trans. Dependable Secur. Comput.
21 (4) (2024)
Alfredo De Santis
,
Anna Lisa Ferrara
,
Manuela Flores
,
Barbara Masucci
Provably-Secure One-Message Unilateral Entity Authentication Schemes.
IEEE Trans. Dependable Secur. Comput.
21 (4) (2024)
Mingfeng Huang
,
Zhetao Li
,
Fu Xiao
,
Saiqin Long
,
Anfeng Liu
Trust Mechanism-Based Multi-Tier Computing System for Service-Oriented Edge-Cloud Networks.
IEEE Trans. Dependable Secur. Comput.
21 (4) (2024)
Junsong Fu
,
Shuai Xiong
,
Na Wang
,
Ruiping Ren
,
Ang Zhou
,
Bharat K. Bhargava
A Framework of High-Speed Network Protocol Fuzzing Based on Shared Memory.
IEEE Trans. Dependable Secur. Comput.
21 (4) (2024)
Fendy Santoso
,
Anthony Finn
Trusted Operations of a Military Ground Robot in the Face of Man-in-the-Middle Cyberattacks Using Deep Learning Convolutional Neural Networks: Real-Time Experimental Outcomes.
IEEE Trans. Dependable Secur. Comput.
21 (4) (2024)
Yan Jiang
,
Xiaoyu Ji
,
Juchuan Zhang
,
Yancheng Jiang
,
Shui Jiang
,
Wenyuan Xu
CapSpeaker: Injecting Commands to Voice Assistants Via Capacitors.
IEEE Trans. Dependable Secur. Comput.
21 (4) (2024)
Mohammed Alsadi
,
Matthew Casey
,
Constantin Catalin Dragan
,
François Dupressoir
,
Luke Riley
,
Muntadher Sallal
,
Steve Schneider
,
Helen Treharne
,
Joe Wadsworth
,
Phil Wright
Towards End-to-End Verifiable Online Voting: Adding Verifiability to Established Voting Systems.
IEEE Trans. Dependable Secur. Comput.
21 (4) (2024)
Dorjan Hitaj
,
Giulio Pagnotta
,
Briland Hitaj
,
Fernando Pérez-Cruz
,
Luigi V. Mancini
FedComm: Federated Learning as a Medium for Covert Communication.
IEEE Trans. Dependable Secur. Comput.
21 (4) (2024)
Meng Shen
,
Changyue Li
,
Hao Yu
,
Qi Li
,
Liehuang Zhu
,
Ke Xu
Decision-Based Query Efficient Adversarial Attack via Adaptive Boundary Learning.
IEEE Trans. Dependable Secur. Comput.
21 (4) (2024)
Chun Liu
,
Xuexian Hu
,
Xiaofeng Chen
,
Jianghong Wei
,
Wenfen Liu
SDIM: A Subtly Designed Invertible Matrix for Enhanced Privacy-Preserving Outsourcing Matrix Multiplication and Related Tasks.
IEEE Trans. Dependable Secur. Comput.
21 (4) (2024)
Yunguo Guan
,
Rongxing Lu
,
Songnian Zhang
,
Yandong Zheng
,
Jun Shao
,
Guiyi Wei
$k$kTCQ: Achieving Privacy-Preserving $k$k-Truss Community Queries Over Outsourced Data.
IEEE Trans. Dependable Secur. Comput.
21 (4) (2024)
Chafika Benzaïd
,
Tarik Taleb
,
Ashkan Sami
,
Othmane Hireche
FortisEDoS: A Deep Transfer Learning-Empowered Economical Denial of Sustainability Detection Framework for Cloud-Native Network Slicing.
IEEE Trans. Dependable Secur. Comput.
21 (4) (2024)
Yang Shi
,
Tianyuan Luo
,
Jingwen Liang
,
Man Ho Au
,
Xiapu Luo
Obfuscating Verifiable Random Functions for Proof-of-Stake Blockchains.
IEEE Trans. Dependable Secur. Comput.
21 (4) (2024)
Jinke Song
,
Qiang Li
,
Haining Wang
,
Jiqiang Liu
PKVIC: Supplement Missing Software Package Information in Security Vulnerability Reports.
IEEE Trans. Dependable Secur. Comput.
21 (4) (2024)
Fengqun Wang
,
Jie Cui
,
Qingyang Zhang
,
Debiao He
,
Chengjie Gu
,
Hong Zhong
Blockchain-Based Lightweight Message Authentication for Edge-Assisted Cross-Domain Industrial Internet of Things.
IEEE Trans. Dependable Secur. Comput.
21 (4) (2024)
Aoting Hu
,
Zhigang Lu
,
Renjie Xie
,
Minhui Xue
${\sf VeriDIP}$VeriDIP: Verifying Ownership of Deep Neural Networks Through Privacy Leakage Fingerprints.
IEEE Trans. Dependable Secur. Comput.
21 (4) (2024)
Lingyuan Yin
,
Jing Xu
,
Kaitai Liang
,
Zhenfeng Zhang
Sidechains With Optimally Succinct Proof.
IEEE Trans. Dependable Secur. Comput.
21 (4) (2024)
Cheng Wang
,
Hao Tang
,
Hangyu Zhu
,
Changjun Jiang
Collaborative Prediction in Anti-Fraud System Over Multiple Credit Loan Platforms.
IEEE Trans. Dependable Secur. Comput.
21 (4) (2024)