Home
Research Trends
Scientific Articles
Journals
Scientific Journals
Open Access Journals
Journals Search
Contact
Sign Up
Login
Language
English
German
IEEE Transactions on Dependable and Secure Computing
Title
Publication Date
Language
Citations
Functionality and Data Stealing by Pseudo-Client Attack and Target Defenses in Split Learning
2024/01/01
A Secure Authentication Protocol for IoT-WLAN using EAP framework
2024/01/01
R2E: A Decentralized Scheme for Rewarding Tor Relays with Cryptocurrencies
2024/01/01
Fast Generation-Based Gradient Leakage Attacks: An Approach to Generate Training Data Directly From the Gradient
2024/01/01
StealthPath: Privacy-preserving Path Validation in the Data Plane of Path-Aware Networks
2024/01/01
MASKCRYPT: Federated Learning with Selective Homomorphic Encryption
2024/01/01
BazzAFL: Moving Fuzzing Campaigns Towards Bugs Via Grouping Bug-Oriented Seeds
2024/01/01
Highly Efficient and Scalable Access Control Mechanism for IoT Devices in Pervasive Environments
2024/01/01
Secure Fault Localization in Path Aware Networking
2024/01/01
Room-scale Voice Liveness Detection for Smart Devices
2024/01/01
The “Code” of Ethics: A Holistic Audit of AI Code Generators
2024/01/01
Concise RingCT Protocol Based on Linkable Threshold Ring Signature
2024/01/01
PrivacyProber: Assessment and Detection of Soft–Biometric Privacy–Enhancing Techniques
2024/01/01
FortisEDoS: A Deep Transfer Learning-empowered Economical Denial of Sustainability Detection Framework for Cloud-Native Network Slicing
2024/01/01
Securing Reusable IP Cores using Voice Biometric based Watermark
2024/01/01
Double Issuer-Hiding Attribute-Based Credentials from Tag-Based Aggregatable Mercurial Signatures
2024/01/01
Secure and Scalable Cross-Domain Data Sharing in Zero-Trust Cloud-Edge-End Environment Based on Sharding Blockchain
2024/01/01
AnotherMe: A Location Privacy Protection System based on Online Virtual Trajectory Generation
2024/01/01
Vulnerabilities in SDN Topology Discovery Mechanism: Novel Attacks and Countermeasures
2024/01/01
Robust Asynchronous Federated Learning with Time-weighted and Stale Model Aggregation
2024/01/01
An Automatic XSS Attack Vector Generation Method Based on the Improved Dueling DDQN Algorithm
2024/01/01
Which Attacks Lead to Hazards? Combining Safety and Security Analysis for Cyber-Physical Systems
2024/01/01
VeriDIP: Verifying Ownership of Deep Neural Networks through Privacy Leakage Fingerprints
2024/01/01
Fast-HotStuff: A Fast and Robust BFT Protocol for Blockchains
2024/01/01
Pre-Trained Model-Based Automated Software Vulnerability Repair: How Far are We?
2024/01/01
PolyScope: Multi-Policy Access Control Analysis to Triage Android Scoped Storage
2024/01/01
Scalable Differentially Private Model Publishing via Private Iterative Sample Selection
2024/01/01
Threshold Delegatable Anonymous Credentials with Controlled and Fine-Grained Delegation
2024/01/01
Practical EMI Attacks on Smartphones with Users' Commands Cancelled
2024/01/01
A Lattice-Based Embedding Method for Reversible Audio Watermarking
2024/01/01
«
‹ Pervious
Next ›
»