IEEE Transactions on Dependable and Secure Computing

Title Publication Date Language Citations
Functionality and Data Stealing by Pseudo-Client Attack and Target Defenses in Split Learning2024/01/01
A Secure Authentication Protocol for IoT-WLAN using EAP framework2024/01/01
R2E: A Decentralized Scheme for Rewarding Tor Relays with Cryptocurrencies2024/01/01
Fast Generation-Based Gradient Leakage Attacks: An Approach to Generate Training Data Directly From the Gradient2024/01/01
StealthPath: Privacy-preserving Path Validation in the Data Plane of Path-Aware Networks2024/01/01
MASKCRYPT: Federated Learning with Selective Homomorphic Encryption2024/01/01
BazzAFL: Moving Fuzzing Campaigns Towards Bugs Via Grouping Bug-Oriented Seeds2024/01/01
Highly Efficient and Scalable Access Control Mechanism for IoT Devices in Pervasive Environments2024/01/01
Secure Fault Localization in Path Aware Networking2024/01/01
Room-scale Voice Liveness Detection for Smart Devices2024/01/01
The “Code” of Ethics: A Holistic Audit of AI Code Generators2024/01/01
Concise RingCT Protocol Based on Linkable Threshold Ring Signature2024/01/01
PrivacyProber: Assessment and Detection of Soft–Biometric Privacy–Enhancing Techniques2024/01/01
FortisEDoS: A Deep Transfer Learning-empowered Economical Denial of Sustainability Detection Framework for Cloud-Native Network Slicing2024/01/01
Securing Reusable IP Cores using Voice Biometric based Watermark2024/01/01
Double Issuer-Hiding Attribute-Based Credentials from Tag-Based Aggregatable Mercurial Signatures2024/01/01
Secure and Scalable Cross-Domain Data Sharing in Zero-Trust Cloud-Edge-End Environment Based on Sharding Blockchain2024/01/01
AnotherMe: A Location Privacy Protection System based on Online Virtual Trajectory Generation2024/01/01
Vulnerabilities in SDN Topology Discovery Mechanism: Novel Attacks and Countermeasures2024/01/01
Robust Asynchronous Federated Learning with Time-weighted and Stale Model Aggregation2024/01/01
An Automatic XSS Attack Vector Generation Method Based on the Improved Dueling DDQN Algorithm2024/01/01
Which Attacks Lead to Hazards? Combining Safety and Security Analysis for Cyber-Physical Systems2024/01/01
VeriDIP: Verifying Ownership of Deep Neural Networks through Privacy Leakage Fingerprints2024/01/01
Fast-HotStuff: A Fast and Robust BFT Protocol for Blockchains2024/01/01
Pre-Trained Model-Based Automated Software Vulnerability Repair: How Far are We?2024/01/01
PolyScope: Multi-Policy Access Control Analysis to Triage Android Scoped Storage2024/01/01
Scalable Differentially Private Model Publishing via Private Iterative Sample Selection2024/01/01
Threshold Delegatable Anonymous Credentials with Controlled and Fine-Grained Delegation2024/01/01
Practical EMI Attacks on Smartphones with Users' Commands Cancelled2024/01/01
A Lattice-Based Embedding Method for Reversible Audio Watermarking2024/01/01