Home
Research Trends
Scientific Articles
Journals
Scientific Journals
Open Access Journals
Journals Search
Contact
Sign Up
Login
Language
English
German
IEEE Transactions on Dependable and Secure Computing
Title
Publication Date
Language
Citations
Reliable and Privacy-Preserving Truth Discovery for Mobile Crowdsensing Systems
2019/01/01
2
Updatable Block-Level Message-Locked Encryption
2019/01/01
2
VulDeeLocator: A Deep Learning-Based Fine-Grained Vulnerability Detector
2022/07/01
2
Adaptive Steganalysis Based on Statistical Model of Quantized DCT Coefficients for JPEG Images
2021/11/01
2
An Immunization Framework for Social Networks Through Big Data Based Influence Modeling
2019/11/01
2
Verifiable and Exculpable Outsourced Attribute-Based Encryption for Access Control in Cloud Computing
2017/11/01
2
Zero-Sum Password Cracking Game: A Large-Scale Empirical Study on the Crackability, Correlation, and Security of Passwords
2017/09/01
2
Separable Reversible Data Hiding in Encrypted JPEG Bitstreams
2018/11/01
2
Segregating Spammers and Unsolicited Bloggers from Genuine Experts on Twitter
2016/01/01
2
BlockMaze: An Efficient Privacy-Preserving Account-Model Blockchain Based on zk-SNARKs
2022/05/01
2
Achieving Efficient and Privacy-Preserving Exact Set Similarity Search over Encrypted Data
2022/03/01
2
Shielding Collaborative Learning: Mitigating Poisoning Attacks through Client-Side Detection
2020/01/01
2
Towards Incentive for Electrical Vehicles Demand Response With Location Privacy Guaranteeing in Microgrids
2022/01/01
2
EAP-DDBA: Efficient Anonymity Proximity Device Discovery and Batch Authentication Mechanism for Massive D2D Communication Devices in 3GPP 5G HetNet
2022/01/01
2
Privacy-Preserving Secret Shared Computations using MapReduce
2019/01/01
2
PrivHome: Privacy-Preserving Authenticated Communication in Smart Home Environment
2019/01/01
2
Secure Fine-grained Encrypted Keyword Search for e-Healthcare Cloud
2019/01/01
2
Privacy-Preserving Proof of Storage for the Pay-As-You-Go Business Model
2021/03/01
2
Sustainable Ensemble Learning Driving Intrusion Detection Model
2021/01/01
2
DDCA: A Distortion Drift-Based Cost Assignment Method for Adaptive Video Steganography in the Transform Domain
2022/07/01
2
Enabling Reliable Keyword Search in Encrypted Decentralized Storage with Fairness
2021/01/01
2
RS-HABE: Revocable-storage and Hierarchical Attribute-based Access Scheme for Secure Sharing of e-Health Records in Public Cloud
2019/01/01
2
Cloud Centric Authentication for Wearable Healthcare Monitoring System
2020/09/01
2
Providing Task Allocation and Secure Deduplication for Mobile Crowdsensing via Fog Computing
2020/05/01
2
Invisible Backdoor Attacks on Deep Neural Networks via Steganography and Regularization
2020/01/01
2
How to Democratise and Protect AI: Fair and Differentially Private Decentralised Deep Learning
2020/01/01
2
Releasing Correlated Trajectories: Towards High Utility and Optimal Differential Privacy
2020/09/01
2
Efficient Analysis of Repairable Computing Systems Subject to Scheduled Checkpointing
2021/01/01
2
Design, Analysis and Application of Embedded Resistive RAM Based Strong Arbiter PUF
2020/11/01
2
Learning from the Ones that Got Away: Detecting New Forms of Phishing Attacks
2018/11/01
2
«
‹ Pervious
Next ›
»