IEEE Transactions on Dependable and Secure Computing

Title Publication Date Language Citations
Anonymity Services Tor, I2P, JonDonym: Classifying in the Dark (Web)2020/05/013
Design, Analysis, and Implementation of ARPKI: An Attack-Resilient Public-Key Infrastructure2018/05/013
Efficient and Private Scoring of Decision Trees, Support Vector Machines and Logistic Regression Models Based on Pre-Computation2019/03/013
AccConF: An Access Control Framework for Leveraging In-Network Cached Data in the ICN-Enabled Wireless Edge2019/01/013
Multi-CDN: Towards Privacy in Content Delivery Networks2020/09/013
Reversible Data Hiding in Encrypted Images using Chunk Encryption and Redundancy Matrix Representation2020/01/013
Traceable Monero: Anonymous Cryptocurrency with Enhanced Accountability2021/03/013
LVBS: Lightweight Vehicular Blockchain for Secure Data Sharing in Disaster Rescue2022/01/013
Efficient and Privacy-Preserving Similarity Range Query Over Encrypted Time Series Data2022/07/013
A Privacy-Preserving and Reputation-Based Truth Discovery Framework in Mobile Crowdsensing2023/11/012
Attribute-Based Proxy Re-Encryption With Direct Revocation Mechanism for Data Sharing in Clouds2024/03/012
Multi-Client Secure and Efficient DPF-Based Keyword Search for Cloud Storage2024/01/012
Subnetwork-Lossless Robust Watermarking for Hostile Theft Attacks in Deep Transfer Learning Models2024/01/012
Achieving Efficient and Privacy-Preserving Neural Network Training and Prediction in Cloud Environments2023/09/012
Your Labels are Selling You Out: Relation Leaks in Vertical Federated Learning2023/09/012
Collusion-Tolerable Privacy-Preserving Sum and Product Calculation without Secure Channel2015/01/012
Extending the Agile Development Process to Develop Acceptably Secure Software2014/11/012
Comment on “Remote Physical Device Fingerprinting”2014/09/012
Efficient and Privacy-Aware Data Aggregation in Mobile Sensing2014/03/012
Collaborative Search Log Sanitization: Toward Differential Privacy and Boosted Utility2015/09/012
Analysis of Computer Intrusions Using Sequences of Function Calls2007/04/012
Lattice-Based Public Key Searchable Encryption from Experimental Perspectives2020/11/012
Detecting and Mitigating Target Link-Flooding Attacks Using SDN2019/11/012
One-to-N & N-to-One: Two Advanced Backdoor Attacks Against Deep Learning Models2022/05/012
A Privacy-Preserving and Untraceable Group Data Sharing Scheme in Cloud Computing2022/07/012
Timely Detection and Mitigation of Stealthy DDoS Attacks via IoT Networks2021/01/012
Dynamic Group-Oriented Provable Data Possession in the Cloud2021/01/012
Efficient and Secure Decision Tree Classification for Cloud-Assisted Online Diagnosis Services2021/07/012
Sensitive Label Privacy Preservation with Anatomization for Data Publishing2021/03/012
The Feasibility of Injecting Inaudible Voice Commands to Voice Assistants2019/01/012