IEEE Transactions on Dependable and Secure Computing

Title Publication Date Language Citations
Reliable and Privacy-Preserving Truth Discovery for Mobile Crowdsensing Systems2019/01/012
Updatable Block-Level Message-Locked Encryption2019/01/012
VulDeeLocator: A Deep Learning-Based Fine-Grained Vulnerability Detector2022/07/012
Adaptive Steganalysis Based on Statistical Model of Quantized DCT Coefficients for JPEG Images2021/11/012
An Immunization Framework for Social Networks Through Big Data Based Influence Modeling2019/11/012
Verifiable and Exculpable Outsourced Attribute-Based Encryption for Access Control in Cloud Computing2017/11/012
Zero-Sum Password Cracking Game: A Large-Scale Empirical Study on the Crackability, Correlation, and Security of Passwords2017/09/012
Separable Reversible Data Hiding in Encrypted JPEG Bitstreams2018/11/012
Segregating Spammers and Unsolicited Bloggers from Genuine Experts on Twitter2016/01/012
BlockMaze: An Efficient Privacy-Preserving Account-Model Blockchain Based on zk-SNARKs2022/05/012
Achieving Efficient and Privacy-Preserving Exact Set Similarity Search over Encrypted Data2022/03/012
Shielding Collaborative Learning: Mitigating Poisoning Attacks through Client-Side Detection2020/01/012
Towards Incentive for Electrical Vehicles Demand Response With Location Privacy Guaranteeing in Microgrids2022/01/012
EAP-DDBA: Efficient Anonymity Proximity Device Discovery and Batch Authentication Mechanism for Massive D2D Communication Devices in 3GPP 5G HetNet2022/01/012
Privacy-Preserving Secret Shared Computations using MapReduce2019/01/012
PrivHome: Privacy-Preserving Authenticated Communication in Smart Home Environment2019/01/012
Secure Fine-grained Encrypted Keyword Search for e-Healthcare Cloud2019/01/012
Privacy-Preserving Proof of Storage for the Pay-As-You-Go Business Model2021/03/012
Sustainable Ensemble Learning Driving Intrusion Detection Model2021/01/012
DDCA: A Distortion Drift-Based Cost Assignment Method for Adaptive Video Steganography in the Transform Domain2022/07/012
Enabling Reliable Keyword Search in Encrypted Decentralized Storage with Fairness2021/01/012
RS-HABE: Revocable-storage and Hierarchical Attribute-based Access Scheme for Secure Sharing of e-Health Records in Public Cloud2019/01/012
Cloud Centric Authentication for Wearable Healthcare Monitoring System2020/09/012
Providing Task Allocation and Secure Deduplication for Mobile Crowdsensing via Fog Computing2020/05/012
Invisible Backdoor Attacks on Deep Neural Networks via Steganography and Regularization2020/01/012
How to Democratise and Protect AI: Fair and Differentially Private Decentralised Deep Learning2020/01/012
Releasing Correlated Trajectories: Towards High Utility and Optimal Differential Privacy2020/09/012
Efficient Analysis of Repairable Computing Systems Subject to Scheduled Checkpointing2021/01/012
Design, Analysis and Application of Embedded Resistive RAM Based Strong Arbiter PUF2020/11/012
Learning from the Ones that Got Away: Detecting New Forms of Phishing Attacks2018/11/012