Sign in
IEEE Trans. Dependable Secur. Comput.
2004
2011
2017
2024
2004
2024
Keyphrases
Publications
volume 21, number 1, 2024
Peng Cheng
,
Yuexin Wu
,
Yuan Hong
,
Zhongjie Ba
,
Feng Lin
,
Li Lu
,
Kui Ren
UniAP: Protecting Speech Privacy With Non-Targeted Universal Adversarial Perturbations.
IEEE Trans. Dependable Secur. Comput.
21 (1) (2024)
Jie Wang
,
Kun Sun
,
Lingguang Lei
,
Yuewu Wang
,
Jiwu Jing
,
Shengye Wan
,
Qi Li
CacheIEE: Cache-Assisted Isolated Execution Environment on ARM Multi-Core Platforms.
IEEE Trans. Dependable Secur. Comput.
21 (1) (2024)
Benyuan Yang
,
Hesuan Hu
Delegation Security Analysis in Workflow Systems.
IEEE Trans. Dependable Secur. Comput.
21 (1) (2024)
Kaushik Madala
,
Hyunsook Do
,
Bastian Tenbergen
ADSA - Association-Driven Safety Analysis to Expose Unknown Safety Issues.
IEEE Trans. Dependable Secur. Comput.
21 (1) (2024)
Urvashi Bansal
,
Geeta Sikka
,
Lalit Kumar Awasthi
,
Bharat K. Bhargava
Quantitative Evaluation of Extensive Vulnerability Set Using Cost Benefit Analysis.
IEEE Trans. Dependable Secur. Comput.
21 (1) (2024)
Alberto Huertas Celdrán
,
Pedro Miguel Sánchez Sánchez
,
Gérôme Bovet
,
Gregorio Martínez Pérez
,
Burkhard Stiller
CyberSpec: Behavioral Fingerprinting for Intelligent Attacks Detection on Crowdsensing Spectrum Sensors.
IEEE Trans. Dependable Secur. Comput.
21 (1) (2024)
Shlomi Dolev
,
Bingyong Guo
,
Jianyu Niu
,
Ziyu Wang
SodsBC: A Post-Quantum by Design Asynchronous Blockchain Framework.
IEEE Trans. Dependable Secur. Comput.
21 (1) (2024)
Ke Huang
,
Yi Mu
,
Fatemeh Rezaeibagha
,
Xiaosong Zhang
,
Xiong Li
,
Sheng Cao
Monero With Multi-Grained Redaction.
IEEE Trans. Dependable Secur. Comput.
21 (1) (2024)
Alireza Sarmadi
,
Hao Fu
,
Prashanth Krishnamurthy
,
Siddharth Garg
,
Farshad Khorrami
Privacy-Preserving Collaborative Learning Through Feature Extraction.
IEEE Trans. Dependable Secur. Comput.
21 (1) (2024)
Yi-Fan Li
,
Yang Gao
,
Gbadebo Ayoade
,
Latifur Khan
,
Anoop Singhal
,
Bhavani Thuraisingham
Heterogeneous Domain Adaptation for Multistream Classification on Cyber Threat Data.
IEEE Trans. Dependable Secur. Comput.
21 (1) (2024)
Meng Luo
,
Bo Feng
,
Long Lu
,
Engin Kirda
,
Kui Ren
On the Complexity of the Web's PKI: Evaluating Certificate Validation of Mobile Browsers.
IEEE Trans. Dependable Secur. Comput.
21 (1) (2024)
Tianyu Yang
,
Hanzhou Wu
,
Biao Yi
,
Guorui Feng
,
Xinpeng Zhang
Semantic-Preserving Linguistic Steganography by Pivot Translation and Semantic-Aware Bins Coding.
IEEE Trans. Dependable Secur. Comput.
21 (1) (2024)
Moslem Didehban
,
Hwisoo So
,
Prudhvi Gali
,
Aviral Shrivastava
,
Kyoungwoo Lee
Generic Soft Error Data and Control Flow Error Detection by Instruction Duplication.
IEEE Trans. Dependable Secur. Comput.
21 (1) (2024)
Sheng Li
,
Zichi Wang
,
Xiudong Zhang
,
Xinpeng Zhang
Robust Image Steganography Against General Downsampling Operations With Lossless Secret Recovery.
IEEE Trans. Dependable Secur. Comput.
21 (1) (2024)
Ziyue Pan
,
Wenbo Shen
,
Xingkai Wang
,
Yutian Yang
,
Rui Chang
,
Yao Liu
,
Chengwei Liu
,
Yang Liu
,
Kui Ren
Ambush From All Sides: Understanding Security Threats in Open-Source Software CI/CD Pipelines.
IEEE Trans. Dependable Secur. Comput.
21 (1) (2024)
Yijie Shen
,
Feng Lin
,
Chao Wang
,
Tiantian Liu
,
Zhongjie Ba
,
Li Lu
,
Wenyao Xu
,
Kui Ren
MotoPrint: Reconfigurable Vibration Motor Fingerprint via Homologous Signals Learning.
IEEE Trans. Dependable Secur. Comput.
21 (1) (2024)
Xugui Zhou
,
Bulbul Ahmed
,
James H. Aylor
,
Philip Asare
,
Homa Alemzadeh
Hybrid Knowledge and Data Driven Synthesis of Runtime Monitors for Cyber-Physical Systems.
IEEE Trans. Dependable Secur. Comput.
21 (1) (2024)
Lin Mei
,
Chungen Xu
,
Lei Xu
,
Xingliang Yuan
,
Joseph K. Liu
Practical Multi-Source Multi-Client Searchable Encryption With Forward Privacy: Refined Security Notion and New Constructions.
IEEE Trans. Dependable Secur. Comput.
21 (1) (2024)
Jianping Cai
,
Ximeng Liu
,
Jiayin Li
,
Kim-Kwang Raymond Choo
Differentially Private Non-Negative Consistent Release for Large-Scale Hierarchical Trees.
IEEE Trans. Dependable Secur. Comput.
21 (1) (2024)
Haonan Yan
,
Xiaoguang Li
,
Wenjing Zhang
,
Rui Wang
,
Hui Li
,
Xingwen Zhao
,
Fenghua Li
,
Xiaodong Lin
Automatic Evasion of Machine Learning-Based Network Intrusion Detection Systems.
IEEE Trans. Dependable Secur. Comput.
21 (1) (2024)
Gao Liu
,
Zheng Yan
,
Dongliang Wang
,
Haiguang Wang
,
Tieyan Li
DePTVM: Decentralized Pseudonym and Trust Value Management for Integrated Networks.
IEEE Trans. Dependable Secur. Comput.
21 (1) (2024)
Hongliang Liang
,
Xiangyu Li
,
Da Xiao
,
Jie Liu
,
Yanjie Zhou
,
Aibo Wang
,
Jin Li
Generative Pre-Trained Transformer-Based Reinforcement Learning for Testing Web Application Firewalls.
IEEE Trans. Dependable Secur. Comput.
21 (1) (2024)
Hongyang Yan
,
Anli Yan
,
Li Hu
,
Jiaming Liang
,
Haibo Hu
MTL-Leak: Privacy Risk Assessment in Multi-Task Learning.
IEEE Trans. Dependable Secur. Comput.
21 (1) (2024)
Yuwei Li
,
Yuan Chen
,
Shouling Ji
,
Xuhong Zhang
,
Guanglu Yan
,
Alex X. Liu
,
Chunming Wu
,
Zulie Pan
,
Peng Lin
G-Fuzz: A Directed Fuzzing Framework for gVisor.
IEEE Trans. Dependable Secur. Comput.
21 (1) (2024)
Liqiang Wu
,
Shaojing Fu
,
Yuchuan Luo
,
Hongyang Yan
,
Heyuan Shi
,
Ming Xu
A Robust and Lightweight Privacy-Preserving Data Aggregation Scheme for Smart Grid.
IEEE Trans. Dependable Secur. Comput.
21 (1) (2024)
Roberto De Prisco
,
Alfredo De Santis
,
Francesco Palmieri
Bounds and Protocols for Graph-Based Distributed Secret Sharing.
IEEE Trans. Dependable Secur. Comput.
21 (1) (2024)
Fucai Luo
,
Haiyan Wang
,
Xingfu Yan
Comments on "VERSA: Verifiable Secure Aggregation for Cross-Device Federated Learning".
IEEE Trans. Dependable Secur. Comput.
21 (1) (2024)
Yi Zhang
,
Xiaofeng Jia
,
Bianjing Pan
,
Jun Shao
,
Liming Fang
,
Rongxing Lu
,
Guiyi Wei
Anonymous Multi-Hop Payment for Payment Channel Networks.
IEEE Trans. Dependable Secur. Comput.
21 (1) (2024)
Xabier Sáez de Cámara
,
Jose Luis Flores
,
Cristóbal Arellano
,
Aitor Urbieta
,
Urko Zurutuza
Gotham Testbed: A Reproducible IoT Testbed for Security Experiments and Dataset Generation.
IEEE Trans. Dependable Secur. Comput.
21 (1) (2024)
Ruixuan Li
,
Zhenyong Zhang
,
Jun Shao
,
Rongxing Lu
,
Xiaoqi Jia
,
Guiyi Wei
The Potential Harm of Email Delivery: Investigating the HTTPS Configurations of Webmail Services.
IEEE Trans. Dependable Secur. Comput.
21 (1) (2024)
Runnan Zhang
,
Gang Liu
,
Hongzhaoning Kang
,
Quan Wang
,
Bo Wan
,
Nan Luo
Anonymity in Attribute-Based Access Control: Framework and Metric.
IEEE Trans. Dependable Secur. Comput.
21 (1) (2024)
Hongliang Liang
,
Xinglin Yu
,
Xianglin Cheng
,
Jie Liu
,
Jin Li
Multiple Targets Directed Greybox Fuzzing.
IEEE Trans. Dependable Secur. Comput.
21 (1) (2024)
Jianwei Liu
,
Yinghui He
,
Chaowei Xiao
,
Jinsong Han
,
Kui Ren
Time to Think the Security of WiFi-Based Behavior Recognition Systems.
IEEE Trans. Dependable Secur. Comput.
21 (1) (2024)
Ziqin Liu
,
Zhenpeng Lin
,
Yueqi Chen
,
Yuhang Wu
,
Yalong Zou
,
Dongliang Mu
,
Xinyu Xing
Towards Unveiling Exploitation Potential With Multiple Error Behaviors for Kernel Bugs.
IEEE Trans. Dependable Secur. Comput.
21 (1) (2024)
Cheng Huang
,
Dongxiao Liu
,
Anjia Yang
,
Rongxing Lu
,
Xuemin Shen
Multi-Client Secure and Efficient DPF-Based Keyword Search for Cloud Storage.
IEEE Trans. Dependable Secur. Comput.
21 (1) (2024)
volume 20, number 6, 2023
Hongwei Shi
,
Shengling Wang
,
Qin Hu
,
Xiuzhen Cheng
Black Swan in Blockchain: Micro Analysis of Natural Forking.
IEEE Trans. Dependable Secur. Comput.
20 (6) (2023)
Mingze He
,
Hongxia Wang
,
Fei Zhang
,
Sani M. Abdullahi
,
Ling Yang
Robust Blind Video Watermarking Against Geometric Deformations and Online Video Sharing Platform Processing.
IEEE Trans. Dependable Secur. Comput.
20 (6) (2023)
Sanoop Mallissery
,
Kun-Yi Chiang
,
Chun-An Bau
,
Yu-Sung Wu
Pervasive Micro Information Flow Tracking.
IEEE Trans. Dependable Secur. Comput.
20 (6) (2023)
Anli Yan
,
Hongyang Yan
,
Li Hu
,
Xiaozhang Liu
,
Teng Huang
Holistic Implicit Factor Evaluation of Model Extraction Attacks.
IEEE Trans. Dependable Secur. Comput.
20 (6) (2023)
Yue Sun
,
Zhi Li
,
Shichao Lv
,
Limin Sun
Spenny: Extensive ICS Protocol Reverse Analysis via Field Guided Symbolic Execution.
IEEE Trans. Dependable Secur. Comput.
20 (6) (2023)
Lili Wang
,
Ye Lin
,
Ting Yao
,
Hu Xiong
,
Kaitai Liang
FABRIC: Fast and Secure Unbounded Cross-System Encrypted Data Sharing in Cloud Computing.
IEEE Trans. Dependable Secur. Comput.
20 (6) (2023)
Zhuoran Ma
,
Jianfeng Ma
,
Yinbin Miao
,
Ximeng Liu
,
Wei Zheng
,
Kim-Kwang Raymond Choo
,
Robert H. Deng
VerifyTL: Secure and Verifiable Collaborative Transfer Learning.
IEEE Trans. Dependable Secur. Comput.
20 (6) (2023)
Yansong Gao
,
Yang Su
,
Surya Nepal
,
Damith C. Ranasinghe
NoisFre: Noise-Tolerant Memory Fingerprints from Commodity Devices for Security Functions.
IEEE Trans. Dependable Secur. Comput.
20 (6) (2023)
Zhuo Ma
,
Xinjing Liu
,
Yang Liu
,
Ximeng Liu
,
Zhan Qin
,
Kui Ren
DivTheft: An Ensemble Model Stealing Attack by Divide-and-Conquer.
IEEE Trans. Dependable Secur. Comput.
20 (6) (2023)
Florian Klaus Kaiser
,
Uriel Dardik
,
Aviad Elitzur
,
Polina Zilberman
,
Nir Daniel
,
Marcus Wiens
,
Frank Schultmann
,
Yuval Elovici
,
Rami Puzis
Attack Hypotheses Generation Based on Threat Intelligence Knowledge Graph.
IEEE Trans. Dependable Secur. Comput.
20 (6) (2023)
Sebastian Zillien
,
Steffen Wendzel
Weaknesses of Popular and Recent Covert Channel Detection Methods and a Remedy.
IEEE Trans. Dependable Secur. Comput.
20 (6) (2023)
Anand Agrawal
,
Urbi Chatterjee
,
Rajib Ranjan Maiti
CheckShake: Passively Detecting Anomaly in Wi-Fi Security Handshake Using Gradient Boosting Based Ensemble Learning.
IEEE Trans. Dependable Secur. Comput.
20 (6) (2023)
Zhongyu Pei
,
Xingman Chen
,
Songtao Yang
,
Haixin Duan
,
Chao Zhang
TAICHI: Transform Your Secret Exploits Into Mine From a Victim's Perspective.
IEEE Trans. Dependable Secur. Comput.
20 (6) (2023)
Tao Zhang
,
Changqiao Xu
,
Bingchi Zhang
,
Xinran Li
,
Xiaohui Kuang
,
Luigi Alfredo Grieco
Towards Attack-Resistant Service Function Chain Migration: A Model-Based Adaptive Proximal Policy Optimization Approach.
IEEE Trans. Dependable Secur. Comput.
20 (6) (2023)
Yehua Wei
,
Can Cheng
,
Guoqi Xie
OFIDS : Online Learning-Enabled and Fingerprint-Based Intrusion Detection System in Controller Area Networks.
IEEE Trans. Dependable Secur. Comput.
20 (6) (2023)