


default search action
IEEE Transactions on Dependable and Secure Computing, Volume 20
Volume 20, Number 1, January - February 2023
- Abdulrahman Abu Elkhail
, Nada Lachtar
, Duha Ibdah
, Rustam Aslam, Hamza Khan, Anys Bacha
, Hafiz Malik
:
Seamlessly Safeguarding Data Against Ransomware Attacks. 1-16 - Qingqing Ye
, Haibo Hu
, Xiaofeng Meng, Huadi Zheng
, Kai Huang
, Chengfang Fang, Jie Shi:
PrivKVM*: Revisiting Key-Value Statistics Estimation With Local Differential Privacy. 17-35 - Changhee Hahn
, Hodong Kim
, Minjae Kim
, Junbeom Hur
:
VerSA: Verifiable Secure Aggregation for Cross-Device Federated Learning. 36-52 - Shengmin Xu
, Jianting Ning
, Yingjiu Li
, Yinghui Zhang
, Guowen Xu
, Xinyi Huang
, Robert H. Deng
:
A Secure EMR Sharing System With Tamper Resistance and Expressive Access Control. 53-67 - Weibei Fan
, Fu Xiao
, Jianxi Fan
, Zhijie Han
, Lijuan Sun, Ruchuan Wang:
Fault-Tolerant Routing With Load Balancing in LeTQ Networks. 68-82 - Yan Zhou
, Murat Kantarcioglu
, Bowei Xi
:
Exploring the Effect of Randomness on Transferability of Adversarial Samples Against Deep Neural Networks. 83-99 - Yanhua Du
, Zijian Sun, Hesuan Hu
:
Security-Aware Collaboration Plan Recommendation for Dynamic Multiple Workflow Processes. 100-113 - Javad Ghareh Chamani
, Yun Wang
, Dimitrios Papadopoulos
, Mingyang Zhang, Rasool Jalili
:
Multi-User Dynamic Searchable Symmetric Encryption With Corrupted Participants. 114-130 - Md. Mamunur Rashid Akand
, Reihaneh Safavi-Naini, Marc Kneppers, Matthieu Giraud, Pascal Lafourcade
:
Privacy-Preserving Proof-of-Location With Security Against Geo-Tampering. 131-146 - Jiqiang Gao
, Boyu Hou
, Xiaojie Guo
, Zheli Liu
, Ying Zhang
, Kai Chen
, Jin Li
:
Secure Aggregation is Insecure: Category Inference Attack on Federated Learning. 147-160 - Jide S. Edu
, Xavier Ferrer Aran
, Jose M. Such
, Guillermo Suarez-Tangil
:
SkillVet: Automated Traceability Analysis of Amazon Alexa Skills. 161-175 - Saiyu Qi
, Jianfeng Wang
, Meixia Miao, Meng Zhang, Xiaofeng Chen
:
TinyEnc: Enabling Compressed and Encrypted Big Data Stores With Rich Query Support. 176-192 - Qingxuan Wang
, Ding Wang
, Chi Cheng, Debiao He
:
Quantum2FA: Efficient Quantum-Resistant Two-Factor Authentication Scheme for Mobile Devices. 193-208 - Haining Yu
, Hongli Zhang
, Xiaohua Jia
, Xiao Chen, Xiangzhan Yu:
pSafety: Privacy-Preserving Safety Monitoring in Online Ride Hailing Services. 209-224 - Meng Li
, Yifei Chen
, Chhagan Lal
, Mauro Conti
, Mamoun Alazab
, Donghui Hu
:
Eunomia: Anonymous and Secure Vehicular Digital Forensics Based on Blockchain. 225-241 - Mohammad Reza Nosouhi
, Shui Yu
, Keshav Sood
, Marthie Grobler
, Raja Jurdak
, Ali Dorri
, Shigen Shen
:
UCoin: An Efficient Privacy Preserving Scheme for Cryptocurrencies. 242-255 - Riccardo Pinciroli
, Lishan Yang
, Jacob Alter, Evgenia Smirni
:
Lifespan and Failures of SSDs and HDDs: Similarities, Differences, and Prediction Models. 256-272 - Dan Tang
, Xiyin Wang
, Xiong Li
, Pandi Vijayakumar
, Neeraj Kumar
:
AKN-FGD: Adaptive Kohonen Network Based Fine-Grained Detection of LDoS Attacks. 273-287 - Keshav Sood
, Mohammad Reza Nosouhi
, Neeraj Kumar
, Anuroop Gaddam, Bohao Feng
, Shui Yu
:
Accurate Detection of IoT Sensor Behaviors in Legitimate, Faulty and Compromised Scenarios. 288-300 - Joshua Morris
, Sara Newman
, Kannappan Palaniappan, Jianping Fan
, Dan Lin
:
"Do You Know You Are Tracked by Photos That You Didn't Take": Large-Scale Location-Aware Multi-Party Image Privacy Protection. 301-312 - Mordechai Guri
:
POWER-SUPPLaY: Leaking Sensitive Data From Air-Gapped, Audio-Gapped Systems by Turning the Power Supplies into Speakers. 313-330 - Dahuin Jung
, Ho Bae
, Hyun-Soo Choi
, Sungroh Yoon
:
PixelSteganalysis: Pixel-Wise Hidden Information Removal With Low Visual Degradation. 331-342 - Jian Lin
, Dingding Wang
, Rui Chang
, Lei Wu
, Yajin Zhou
, Kui Ren
:
EnBinDiff: Identifying Data-Only Patches for Binaries. 343-359 - Wei Liu
, Zhiguo Wan
, Jun Shao
, Yong Yu
:
HyperMaze: Towards Privacy-Preserving and Scalable Permissioned Blockchain. 360-376 - Xinliang Miao
, Rui Chang
, Jianhong Zhao, Yongwang Zhao, Shuang Cao, Tao Wei, Liehui Jiang, Kui Ren
:
CVTEE: A Compatible Verified TEE Architecture With Enhanced Security. 377-391 - Daniele Cono D'Elia, Simone Nicchi, Matteo Mariani, Matteo Marini, Federico Palmaro
:
Designing Robust API Monitoring Solutions. 392-406 - Jingjing Zhang
, Yongjie Ye, Weigang Wu
, Xiapu Luo
:
Boros: Secure and Efficient Off-Blockchain Transactions via Payment Channel Hub. 407-421 - Lu Wei
, Jie Cui
, Hong Zhong
, Irina Bolodurina
, Lu Liu
:
A Lightweight and Conditional Privacy-Preserving Authenticated Key Agreement Scheme With Multi-TA Model for Fog-Based VANETs. 422-436 - Xingyu Li
, Zhe Qu
, Shangqing Zhao
, Bo Tang
, Zhuo Lu
, Yao Liu
:
LoMar: A Local Defense Against Poisoning Attack on Federated Learning. 437-450 - Miguel Villarreal-Vasquez
, Gaspar Modelo-Howard
, Simant Dube
, Bharat K. Bhargava
:
Hunting for Insider Threats Using LSTM-Based Anomaly Detection. 451-462 - Ziqing Huang, Zhenjun Tang
, Xianquan Zhang
, Linlin Ruan, Xinpeng Zhang
:
Perceptual Image Hashing With Locality Preserving Projection for Copy Detection. 463-477 - Zongpu Zhang
, Hubin Zhang
, Junyuan Wang, Xiaokang Hu
, Jian Li
, Wenqian Yu, Ping Yu, Weigang Li, Bo Cui, Guodong Zhu, Kapil Sood
, Brian Will
, Haibing Guan
:
QKPT: Securing Your Private Keys in Cloud With Performance, Scalability and Transparency. 478-491 - Rui Zhang, Lei Zhang, Kim-Kwang Raymond Choo
, Tong Chen:
Dynamic Authenticated Asymmetric Group Key Agreement With Sender Non-Repudiation and Privacy for Group-Oriented Applications. 492-505 - Farzaneh Abazari
, Enrico Branca
, Norah Ridley
, Natalia Stakhanova
, Mila Dalla Preda
:
Dataset Characteristics for Reliable Code Authorship Attribution. 506-521 - Wenhao Wang
, Weijie Liu
, Hongbo Chen
, XiaoFeng Wang, Hongliang Tian, Dongdai Lin
:
Trust Beyond Border: Lightweight, Verifiable User Isolation for Protecting In-Enclave Services. 522-538 - Josep Domingo-Ferrer
, Jesús A. Manjón:
Circuit-Free General-Purpose Multi-Party Computation via Co-Utile Unlinkable Outsourcing. 539-550 - Zhicong Huang
, Cheng Hong, Chenkai Weng
, Wen-jie Lu, Hunter Qu:
More Efficient Secure Matrix Multiplication for Unbalanced Recommender Systems. 551-562 - Ermeson C. Andrade
, Roberto Pietrantuono
, Fumio Machida
, Domenico Cotroneo
:
A Comparative Analysis of Software Aging in Image Classifiers on Cloud and Edge. 563-573 - Zhenyu Ning
, Chenxu Wang
, Yinhua Chen, Fengwei Zhang
, Jiannong Cao
:
Revisiting ARM Debugging Features: Nailgun and its Defense. 574-589 - David R. Matos
, Miguel L. Pardal
, Miguel Correia
:
Sanare: Pluggable Intrusion Recovery for Web Applications. 590-605 - Zhonghao Li
, Xinghao Jiang
, Yi Dong
, Laijin Meng
, Tanfeng Sun
:
An Anti-Steganalysis HEVC Video Steganography With High Performance Based on CNN and PU Partition Modes. 606-619 - Xiaoning Liu
, Yifeng Zheng
, Xingliang Yuan
, Xun Yi
:
Securely Outsourcing Neural Network Inference to the Cloud With Lightweight Techniques. 620-636 - Qiuye He, Song Fang
, Tao Wang
, Yao Liu
, Shangqing Zhao
, Zhuo Lu
:
Proactive Anti-Eavesdropping With Trap Deployment in Wireless Networks. 637-649 - Ling Jin
, Yinzhi Cao
, Yan Chen
, Di Zhang, Simone Campanoni
:
ExGen: Cross-platform, Automated Exploit Generation for Smart Contract Vulnerabilities. 650-664 - Yanzhen Ren
, Dengkai Liu, Chenyu Liu
, Qiaochu Xiong, Jianming Fu
, Lina Wang:
A Universal Audio Steganalysis Scheme Based on Multiscale Spectrograms and DeepResNet. 665-679 - Xixun Yu
, Hui Bai, Zheng Yan
, Rui Zhang
:
VeriDedup: A Verifiable Cloud Data Deduplication Scheme With Integrity and Duplication Proof. 680-694 - Alexei Iliasov, Dominic Taylor
, Linas Laibinis
, Alexander B. Romanovsky
:
Practical Verification of Railway Signalling Programs. 695-707 - Huayi Duan
, Yuefeng Du
, Leqian Zheng
, Cong Wang
, Man Ho Au
, Qian Wang
:
Towards Practical Auditing of Dynamic Data in Decentralized Storage. 708-723 - Abdullah Alsaedi
, Zahir Tari
, Md. Redowan Mahmud
, Nour Moustafa
, Abdun Mahmood
, Adnan Anwar
:
USMD: UnSupervised Misbehaviour Detection for Multi-Sensor Data. 724-739 - Teng Li
, Ya Jiang
, Chi Lin
, Mohammad S. Obaidat
, Yulong Shen
, Jianfeng Ma
:
DeepAG: Attack Graph Construction and Threats Prediction With Bi-Directional Deep Learning. 740-757 - Kanghua Mo
, Weixuan Tang
, Jin Li
, Xu Yuan
:
Attacking Deep Reinforcement Learning With Decoupled Adversarial Policy. 758-768 - Yi Dong
, Xinghao Jiang
, Zhaohong Li
, Tanfeng Sun
, Peisong He
:
Adaptive HEVC Steganography Based on Steganographic Compression Efficiency Degradation Model. 769-783 - Jianwei Liu
, Chaowei Xiao, Kaiyan Cui
, Jinsong Han
, Xian Xu, Kui Ren
:
Behavior Privacy Preserving in RF Sensing. 784-796 - Kaustabha Ray
, Ansuman Banerjee
:
Prioritized Fault Recovery Strategies for Multi-Access Edge Computing Using Probabilistic Model Checking. 797-812 - Wenxin Chen
, Yingfei Dong
, Zhenhai Duan
:
DPM: Towards Accurate Drone Position Manipulation. 813-826 - Bowen Tang
, Chenggang Wu
, Zhe Wang
, Lichen Jia, Pen-Chung Yew
, Yueqiang Cheng
, Yinqian Zhang, Chenxi Wang, Guoqing Harry Xu:
SpecBox: A Label-Based Transparent Speculation Scheme Against Transient Execution Attacks. 827-840 - Maanak Gupta
, Ravi S. Sandhu
, Tanjila Mawla, James O. Benson
:
Reachability Analysis for Attributes in ABAC With Group Hierarchy. 841-858 - Ashima Anand
, Amit Kumar Singh
:
Dual Watermarking for Security of COVID-19 Patient Record. 859-866 - Chuntao Dong
, Qingni Shen
, Xuhua Ding
, Daoqing Yu, Wu Luo, Pengfei Wu
, Zhonghai Wu:
T-Counter: Trustworthy and Efficient CPU Resource Measurement Using SGX in the Cloud. 867-885
Volume 20, Number 2, March - April 2023
- Bang Wu
, Shuo Wang
, Xingliang Yuan
, Cong Wang
, Carsten Rudolph
, Xiangwen Yang:
Defeating Misclassification Attacks Against Transfer Learning. 886-901 - Xiaohan Zhang
, Mi Zhang
, Yuan Zhang
, Ming Zhong
, Xin Zhang
, Yinzhi Cao
, Min Yang
:
Slowing Down the Aging of Learning-Based Malware Detectors With API Knowledge. 902-916 - Lei Zhao
, Keyang Jiang, Yuncong Zhu, Lina Wang
, Jiang Ming
:
Capturing Invalid Input Manipulations for Memory Corruption Diagnosis. 917-930 - Liang Xue
, Dongxiao Liu
, Jianbing Ni
, Xiaodong Lin
, Xuemin Sherman Shen
:
Enabling Regulatory Compliance and Enforcement in Decentralized Anonymous Payment. 931-943 - Barnana Baruah
, Subhasish Dhal
:
A Security and Privacy Preserved Intelligent Vehicle Navigation System. 944-959 - Xiaoguang Li
, Haonan Yan
, Zelei Cheng
, Wenhai Sun
, Hui Li
:
Protecting Regression Models With Personalized Local Differential Privacy. 960-974 - Davide Caputo
, Francesco Pagano
, Giovanni Bottino, Luca Verderame
, Alessio Merlo
:
You Can't Always Get What You Want: Towards User-Controlled Privacy on Android. 975-987 - Yifeng Zheng
, Shangqi Lai
, Yi Liu
, Xingliang Yuan
, Xun Yi
, Cong Wang
:
Aggregation Service for Federated Learning: An Efficient, Secure, and More Resilient Realization. 988-1001 - Rui Zhang
, Zheng Yan
, Xuerui Wang, Robert H. Deng
:
VOLERE: Leakage Resilient User Authentication Based on Personal Voice Challenges. 1002-1016 - Yinhao Xiao
, Yizhen Jia
, Xiuzhen Cheng
, Shengling Wang
, Jian Mao
, Zhenkai Liang
:
I Know Your Social Network Accounts: A Novel Attack Architecture for Device-Identity Association. 1017-1030 - Anum Khurshid
, Sileshi Demesie Yalew, Mudassar Aslam, Shahid Raza
:
ShieLD: Shielding Cross-Zone Communication Within Limited-Resourced IoT Devices Running Vulnerable Software Stack. 1031-1047 - Diana Laura Aguilar
, Miguel Angel Medina-Pérez
, Octavio Loyola-González
, Kim-Kwang Raymond Choo
, Edoardo Bucheli-Susarrey
:
Towards an Interpretable Autoencoder: A Decision-Tree-Based Autoencoder and its Application in Anomaly Detection. 1048-1059 - Subhra Mazumdar
, Sushmita Ruj
:
CryptoMaze: Privacy-Preserving Splitting of Off-Chain Payments. 1060-1073 - Hicham Hammouchi
, Narjisse Nejjari, Ghita Mezzour
, Mounir Ghogho
, Houda Benbrahim
:
STRisk: A Socio-Technical Approach to Assess Hacking Breaches Risk. 1074-1087 - Xuru Li
, Daojing He
, Yun Gao
, Ximeng Liu
, Sammy Chan
, Manghan Pan
, Kim-Kwang Raymond Choo
:
LIGHT: Lightweight Authentication for Intra Embedded Integrated Electronic Systems. 1088-1103 - Tao Xue
, Yu Wen
, Bo Luo
, Gang Li
, Yingjiu Li
, Boyang Zhang, Yang Zheng, Yanfei Hu, Dan Meng:
SparkAC: Fine-Grained Access Control in Spark for Secure Data Sharing and Analytics. 1104-1123 - Majid Salehi
, Luca Degani
, Marco Roveri
, Danny Hughes, Bruno Crispo
:
Discovery and Identification of Memory Corruption Vulnerabilities on Bare-Metal Embedded Devices. 1124-1138 - Ning Wang
, Yimin Chen
, Yang Xiao
, Yang Hu
, Wenjing Lou
, Y. Thomas Hou
:
MANDA: On Adversarial Example Detection for Network Intrusion Detection System. 1139-1153 - Jukka Soikkeli
, Giuliano Casale
, Luis Muñoz-González
, Emil C. Lupu
:
Redundancy Planning for Cost Efficient Resilience to Cyber Attacks. 1154-1168 - Yiming Wu
, Zhiyuan Xie, Shouling Ji
, Zhenguang Liu
, Xuhong Zhang, Changting Lin
, Shuiguang Deng
, Jun Zhou, Ting Wang
, Raheem Beyah:
Fraud-Agents Detection in Online Microfinance: A Large-Scale Empirical Study. 1169-1185 - Nan Sun
, Jun Zhang
, Shang Gao
, Leo Yu Zhang
, Seyit Camtepe
, Yang Xiang
:
Cyber Information Retrieval Through Pragmatics Understanding and Visualization. 1186-1199 - Shahryar Baki
, Rakesh M. Verma
:
Sixteen Years of Phishing User Studies: What Have We Learned? 1200-1212 - Xiaoying Zhang, Hong Xie
, Pei Yi, John C. S. Lui
:
Enhancing Sybil Detection via Social-Activity Networks: A Random Walk Approach. 1213-1227 - Man Zhou
, Qian Wang
, Xiu Lin, Yi Zhao
, Peipei Jiang
, Qi Li
, Chao Shen
, Cong Wang
:
PressPIN: Enabling Secure PIN Authentication on Mobile Devices via Structure-Borne Sounds. 1228-1242 - Caiqin Dong
, Jian Weng
, Jia-Nan Liu
, Anjia Yang
, Zhiquan Liu
, Yaxi Yang, Jianfeng Ma
:
Maliciously Secure and Efficient Large-Scale Genome-Wide Association Study With Multi-Party Computation. 1243-1257 - Omar Basem
, Abrar Ullah
, Hani Ragab Hassen
:
Stick: An End-to-End Encryption Protocol Tailored for Social Network Platforms. 1258-1269 - Soumyadeep Hore, Fariha Moomtaheen, Ankit Shah
, Xinming Ou:
Towards Optimal Triage and Mitigation of Context-Sensitive Cyber Vulnerabilities. 1270-1285 - Zhiguo Wan
, Wei Liu
, Hui Cui
:
HIBEChain: A Hierarchical Identity-Based Blockchain System for Large-Scale IoT. 1286-1301 - Wenjun Fan
, Hsiang-Jen Hong
, Jinoh Kim
, Simeon Wuthier
, Makiya Nakashima, Xiaobo Zhou
, Ching-Hua Chow, Sang-Yoon Chang
:
Lightweight and Identifier-Oblivious Engine for Cryptocurrency Networking Anomaly Detection. 1302-1318 - Songnian Zhang
, Suprio Ray
, Rongxing Lu
, Yandong Zheng
, Yunguo Guan
, Jun Shao
:
Towards Efficient and Privacy-Preserving User-Defined Skyline Query Over Single Cloud. 1319-1334 - Zhiguo Wan
, Yan Zhou, Kui Ren:
zk-AuthFeed: Protecting Data Feed to Smart Contracts With Authenticated Zero Knowledge Proof. 1335-1347 - Songnian Zhang
, Suprio Ray
, Rongxing Lu
, Yandong Zheng
, Yunguo Guan
, Jun Shao
:
Towards Efficient and Privacy-Preserving Interval Skyline Queries Over Time Series Data. 1348-1363 - Hua Deng
, Zheng Qin
, Qianhong Wu, Robert H. Deng
, Zhenyu Guan
, Yupeng Hu
, Fangmin Li
:
Achieving Fine-Grained Data Sharing for Hierarchical Organizations in Clouds. 1364-1377 - Radu Ciucanu
, Anatole Delabrouille
, Pascal Lafourcade
, Marta Soare
:
Secure Protocols for Best Arm Identification in Federated Stochastic Multi-Armed Bandits. 1378-1389 - Lan Zhang
, Peng Liu, Yoon-Ho Choi
, Ping Chen:
Semantics-Preserving Reinforcement Learning Attack Against Graph Neural Networks for Malware Detection. 1390-1402 - David Megías
, Daniel Lerch-Hostalot
:
Subsequent Embedding in Targeted Image Steganalysis: Theoretical Framework and Practical Applications. 1403-1421 - Jin Cao
, Tong Zhu, Ruhui Ma
, Zhenyang Guo
, Yinghui Zhang
, Hui Li
:
A Software-Based Remote Attestation Scheme for Internet of Things Devices. 1422-1434 - Guangsheng Zhang
, Bo Liu
, Tianqing Zhu
, Ming Ding
, Wanlei Zhou:
Label-Only Membership Inference Attacks and Defenses in Semantic Segmentation Models. 1435-1449 - Chunyan Mu
, David Clark
:
Verifying Opacity Properties in Security Systems. 1450-1460 - Cong Sun
, Yuwan Ma, Dongrui Zeng, Gang Tan, Siqi Ma, Yafei Wu:
μDep: Mutation-Based Dependency Generation for Precise Taint Analysis on Android Native Code. 1461-1475 - Songbin Li
, Jingang Wang
, Peng Liu
:
Detection of Generative Linguistic Steganography Based on Explicit and Latent Text Word Relation Mining Using Deep Learning. 1476-1487 - Pedro Reviriego
, Alfonso Sánchez-Macián
, Stefan Walzer, Elena Merino Gómez
, Shanshan Liu
, Fabrizio Lombardi
:
On the Privacy of Counting Bloom Filters. 1488-1499 - Madhukrishna Priyadarsini
, Padmalochan Bera
, Sajal K. Das
, Mohammad Ashiqur Rahman
:
A Security Enforcement Framework for SDN Controller Using Game Theoretic Approach. 1500-1515 - Samaneh Hosseini Moghaddam
, Maghsoud Abbaspour
:
Friendship Preference: Scalable and Robust Category of Features for Social Bot Detection. 1516-1528 - Patrik Rusnak
, Elena Zaitseva
, Frank P. A. Coolen
, Miroslav Kvassay
, Vitaly G. Levashenko
:
Logic Differential Calculus for Reliability Analysis Based on Survival Signature. 1529-1540 - Pietro Tedeschi
, Savio Sciancalepore
, Roberto Di Pietro
:
PPCA - Privacy-Preserving Collision Avoidance for Autonomous Unmanned Aerial Vehicles. 1541-1558 - Daniele Bringhenti
, Guido Marchetto
, Riccardo Sisto
, Fulvio Valenza
, Jalolliddin Yusupov
:
Automated Firewall Configuration in Virtual Networks. 1559-1576 - Tuba Yavuz
, Farhaan Fowze
, Grant Hernandez, Ken Yihang Bai
, Kevin R. B. Butler
, Dave Jing Tian:
ENCIDER: Detecting Timing and Cache Side Channels in SGX Enclaves and Cryptographic APIs. 1577-1595 - Hannes Holm
:
Lore a Red Team Emulation Tool. 1596-1608