default search action
IEEE Transactions on Dependable and Secure Computing, Volume 21
Volume 21, Number 1, January - February 2024
- Yi-Fan Li, Yang Gao, Gbadebo Ayoade, Latifur Khan, Anoop Singhal, Bhavani Thuraisingham:
Heterogeneous Domain Adaptation for Multistream Classification on Cyber Threat Data. 1-11 - Xugui Zhou, Bulbul Ahmed, James H. Aylor, Philip Asare, Homa Alemzadeh:
Hybrid Knowledge and Data Driven Synthesis of Runtime Monitors for Cyber-Physical Systems. 12-30 - Peng Cheng, Yuexin Wu, Yuan Hong, Zhongjie Ba, Feng Lin, Li Lu, Kui Ren:
UniAP: Protecting Speech Privacy With Non-Targeted Universal Adversarial Perturbations. 31-46 - Shlomi Dolev, Bingyong Guo, Jianyu Niu, Ziyu Wang:
SodsBC: A Post-Quantum by Design Asynchronous Blockchain Framework. 47-62 - Lin Mei, Chungen Xu, Lei Xu, Xingliang Yuan, Joseph K. Liu:
Practical Multi-Source Multi-Client Searchable Encryption With Forward Privacy: Refined Security Notion and New Constructions. 63-77 - Moslem Didehban, Hwisoo So, Prudhvi Gali, Aviral Shrivastava, Kyoungwoo Lee:
Generic Soft Error Data and Control Flow Error Detection by Instruction Duplication. 78-92 - Ziqin Liu, Zhenpeng Lin, Yueqi Chen, Yuhang Wu, Yalong Zou, Dongliang Mu, Xinyu Xing:
Towards Unveiling Exploitation Potential With Multiple Error Behaviors for Kernel Bugs. 93-109 - Gao Liu, Zheng Yan, Dongliang Wang, Haiguang Wang, Tieyan Li:
DePTVM: Decentralized Pseudonym and Trust Value Management for Integrated Networks. 110-124 - Ruixuan Li, Zhenyong Zhang, Jun Shao, Rongxing Lu, Xiaoqi Jia, Guiyi Wei:
The Potential Harm of Email Delivery: Investigating the HTTPS Configurations of Webmail Services. 125-138 - Tianyu Yang, Hanzhou Wu, Biao Yi, Guorui Feng, Xinpeng Zhang:
Semantic-Preserving Linguistic Steganography by Pivot Translation and Semantic-Aware Bins Coding. 139-152 - Haonan Yan, Xiaoguang Li, Wenjing Zhang, Rui Wang, Hui Li, Xingwen Zhao, Fenghua Li, Xiaodong Lin:
Automatic Evasion of Machine Learning-Based Network Intrusion Detection Systems. 153-167 - Yuwei Li, Yuan Chen, Shouling Ji, Xuhong Zhang, Guanglu Yan, Alex X. Liu, Chunming Wu, Zulie Pan, Peng Lin:
G-Fuzz: A Directed Fuzzing Framework for gVisor. 168-185 - Xabier Sáez de Cámara, Jose Luis Flores, Cristóbal Arellano, Aitor Urbieta, Urko Zurutuza:
Gotham Testbed: A Reproducible IoT Testbed for Security Experiments and Dataset Generation. 186-203 - Hongyang Yan, Anli Yan, Li Hu, Jiaming Liang, Haibo Hu:
MTL-Leak: Privacy Risk Assessment in Multi-Task Learning. 204-215 - Kaushik Madala, Hyunsook Do, Bastian Tenbergen:
ADSA - Association-Driven Safety Analysis to Expose Unknown Safety Issues. 216-228 - Benyuan Yang, Hesuan Hu:
Delegation Security Analysis in Workflow Systems. 229-240 - Ke Huang, Yi Mu, Fatemeh Rezaeibagha, Xiaosong Zhang, Xiong Li, Sheng Cao:
Monero With Multi-Grained Redaction. 241-253 - Jie Wang, Kun Sun, Lingguang Lei, Yuewu Wang, Jiwu Jing, Shengye Wan, Qi Li:
CacheIEE: Cache-Assisted Isolated Execution Environment on ARM Multi-Core Platforms. 254-269 - Liqiang Wu, Shaojing Fu, Yuchuan Luo, Hongyang Yan, Heyuan Shi, Ming Xu:
A Robust and Lightweight Privacy-Preserving Data Aggregation Scheme for Smart Grid. 270-283 - Alberto Huertas Celdrán, Pedro Miguel Sánchez Sánchez, Gérôme Bovet, Gregorio Martínez Pérez, Burkhard Stiller:
CyberSpec: Behavioral Fingerprinting for Intelligent Attacks Detection on Crowdsensing Spectrum Sensors. 284-297 - Urvashi Bansal, Geeta Sikka, Lalit Kumar Awasthi, Bharat K. Bhargava:
Quantitative Evaluation of Extensive Vulnerability Set Using Cost Benefit Analysis. 298-308 - Hongliang Liang, Xiangyu Li, Da Xiao, Jie Liu, Yanjie Zhou, Aibo Wang, Jin Li:
Generative Pre-Trained Transformer-Based Reinforcement Learning for Testing Web Application Firewalls. 309-324 - Hongliang Liang, Xinglin Yu, Xianglin Cheng, Jie Liu, Jin Li:
Multiple Targets Directed Greybox Fuzzing. 325-339 - Sheng Li, Zichi Wang, Xiudong Zhang, Xinpeng Zhang:
Robust Image Steganography Against General Downsampling Operations With Lossless Secret Recovery. 340-352 - Cheng Huang, Dongxiao Liu, Anjia Yang, Rongxing Lu, Xuemin Shen:
Multi-Client Secure and Efficient DPF-Based Keyword Search for Cloud Storage. 353-371 - Yijie Shen, Feng Lin, Chao Wang, Tiantian Liu, Zhongjie Ba, Li Lu, Wenyao Xu, Kui Ren:
MotoPrint: Reconfigurable Vibration Motor Fingerprint via Homologous Signals Learning. 372-387 - Jianping Cai, Ximeng Liu, Jiayin Li, Kim-Kwang Raymond Choo:
Differentially Private Non-Negative Consistent Release for Large-Scale Hierarchical Trees. 388-402 - Ziyue Pan, Wenbo Shen, Xingkai Wang, Yutian Yang, Rui Chang, Yao Liu, Chengwei Liu, Yang Liu, Kui Ren:
Ambush From All Sides: Understanding Security Threats in Open-Source Software CI/CD Pipelines. 403-418 - Meng Luo, Bo Feng, Long Lu, Engin Kirda, Kui Ren:
On the Complexity of the Web's PKI: Evaluating Certificate Validation of Mobile Browsers. 419-433 - Roberto De Prisco, Alfredo De Santis, Francesco Palmieri:
Bounds and Protocols for Graph-Based Distributed Secret Sharing. 434-448 - Jianwei Liu, Yinghui He, Chaowei Xiao, Jinsong Han, Kui Ren:
Time to Think the Security of WiFi-Based Behavior Recognition Systems. 449-462 - Runnan Zhang, Gang Liu, Hongzhaoning Kang, Quan Wang, Bo Wan, Nan Luo:
Anonymity in Attribute-Based Access Control: Framework and Metric. 463-475 - Yi Zhang, Xiaofeng Jia, Bianjing Pan, Jun Shao, Liming Fang, Rongxing Lu, Guiyi Wei:
Anonymous Multi-Hop Payment for Payment Channel Networks. 476-485 - Alireza Sarmadi, Hao Fu, Prashanth Krishnamurthy, Siddharth Garg, Farshad Khorrami:
Privacy-Preserving Collaborative Learning Through Feature Extraction. 486-498 - Fucai Luo, Haiyan Wang, Xingfu Yan:
Comments on "VERSA: Verifiable Secure Aggregation for Cross-Device Federated Learning". 499-500
Volume 21, Number 2, March - April 2024
- Jianwei Liu, Xiang Zou, Leqi Zhao, Yusheng Tao, Sideng Hu, Jinsong Han, Kui Ren:
Privacy Leakage in Wireless Charging. 501-514 - Yinxing Xue, Jiaming Ye, Wei Zhang, Jun Sun, Lei Ma, Haijun Wang, Jianjun Zhao:
xFuzz: Machine Learning Guided Cross-Contract Fuzzing. 515-529 - Qian Li, Chao Shen, Qingyuan Hu, Chenhao Lin, Xiang Ji, Saiyu Qi:
Towards Gradient-Based Saliency Consensus Training for Adversarial Robustness. 530-541 - Xiao Cheng, Xu Nie, Ningke Li, Haoyu Wang, Zheng Zheng, Yulei Sui:
How About Bug-Triggering Paths? - Understanding and Characterizing Learning-Based Vulnerability Detectors. 542-558 - Wenbo Jiang, Tianwei Zhang, Han Qiu, Hongwei Li, Guowen Xu:
Incremental Learning, Incremental Backdoor Threats. 559-572 - Pedro Miguel Sánchez Sánchez, Alberto Huertas Celdrán, Timo Schenk, Adrian Lars Benjamin Iten, Gérôme Bovet, Gregorio Martínez Pérez, Burkhard Stiller:
Studying the Robustness of Anti-Adversarial Federated Learning Models Detecting Cyberattacks in IoT Spectrum Sensors. 573-584 - Qun Song, Rui Tan, Chao Ren, Yan Xu, Yang Lou, Jianping Wang, Hoay Beng Gooi:
On Credibility of Adversarial Examples Against Learning-Based Grid Voltage Stability Assessment. 585-599 - Ge Ren, Jun Wu, Gaolei Li, Shenghong Li, Mohsen Guizani:
Protecting Intellectual Property With Reliable Availability of Learning Models in AI-Based Cybersecurity Services. 600-617 - Prithwiraj Roy, Shameek Bhattacharjee, Sahar Abedzadeh, Sajal K. Das:
Noise Resilient Learning for Attack Detection in Smart Grid PMU Infrastructure. 618-635 - Han Fang, Yupeng Qiu, Guorui Qin, Jiyi Zhang, Kejiang Chen, Weiming Zhang, Ee-Chien Chang:
DP2Dataset Protection by Data Poisoning. 636-649 - Ping Wang, Haichang Gao, Xiaoyan Guo, Zhongni Yuan, Jiawei Nian:
Improving the Security of Audio CAPTCHAs With Adversarial Examples. 650-667 - Wenhan Xu, Hui Ma, Zishuai Song, Jianhao Li, Rui Zhang:
Gringotts: An Encrypted Version Control System With Less Trust on Servers. 668-684 - Wenbo Jiang, Hongwei Li, Guowen Xu, Tianwei Zhang, Rongxing Lu:
A Comprehensive Defense Framework Against Model Extraction Attacks. 685-700 - Shahid Khan, Joost-Pieter Katoen, Marc Bouissou:
A Compositional Semantics of Boolean-Logic Driven Markov Processes. 701-716 - Di Zhang, Junqing Le, Xinyu Lei, Tao Xiang, Xiaofeng Liao:
Secure Redactable Blockchain With Dynamic Support. 717-731 - Insup Lee, Wonjun Lee:
UniQGAN: Towards Improved Modulation Classification With Adversarial Robustness Using Scalable Generator Design. 732-745 - Cheng Guo, Wenfeng Li, Xinyu Tang, Kim-Kwang Raymond Choo, Yining Liu:
Forward Private Verifiable Dynamic Searchable Symmetric Encryption With Efficient Conjunctive Query. 746-763 - Linqing Gui, Weihao Zhou, Pinchang Zhang, Fu Xiao:
Cooperative Jamming-Aided Secure Communication in Wireless Powered Sensor Networks. 764-774 - Zijian Zhang, Xuyang Liu, Meng Li, Hao Yin, Liehuang Zhu, Bakh Khoussainov, Keke Gai:
HCA: Hashchain-Based Consensus Acceleration Via Re-Voting. 775-788 - Yifeng Zheng, Menglun Zhou, Songlei Wang, Hejiao Huang, Xiaohua Jia, Xun Yi, Cong Wang:
SecDR: Enabling Secure, Efficient, and Accurate Data Recovery for Mobile Crowdsensing. 789-803 - Roberto Pietrantuono, Massimo Ficco, Francesco Palmieri:
Testing the Resilience of MEC-Based IoT Applications Against Resource Exhaustion Attacks. 804-818 - Jayson Sia, Edmond A. Jonckheere, Laith Shalalfeh, Paul Bogdan:
Phasor Measurement Unit Change-Point Detection of Frequency Hurst Exponent Anomaly With Time-to-Event. 819-827 - Cavit Özbay, Albert Levi:
Blacklisting Based Anonymous Authentication Scheme for Sharing Economy. 828-846 - Xiao Han, Yuncong Yang, Leye Wang, Junjie Wu:
Privacy-Preserving Network Embedding Against Private Link Inference Attacks. 847-859 - Dan Zhu, Hui Zhu, Cheng Huang, Rongxing Lu, Dengguo Feng, Xuemin Shen:
Efficient and Accurate Cloud-Assisted Medical Pre-Diagnosis With Privacy Preservation. 860-875 - Jungang Yang, Liyao Xiang, Pengzhi Chu, Xinbing Wang, Chenghu Zhou:
Certified Distributional Robustness on Smoothed Classifiers. 876-888 - Caiqin Dong, Jian Weng, Ming Li, Jia-Nan Liu, Zhiquan Liu, Yudan Cheng, Shui Yu:
Privacy-Preserving and Byzantine-Robust Federated Learning. 889-904 - Yongzhong He, Yiming Wang, Sencun Zhu, Wei Wang, Yunjia Zhang, Qiang Li, Aimin Yu:
Automatically Identifying CVE Affected Versions With Patches and Developer Logs. 905-919 - Deqiang Li, Shicheng Cui, Yun Li, Jia Xu, Fu Xiao, Shouhuai Xu:
PAD: Towards Principled Adversarial Malware Detection Against Evasion Attacks. 920-936 - Chunpeng Ge, Zhe Liu, Willy Susilo, Liming Fang, Hao Wang:
Attribute-Based Encryption With Reliable Outsourced Decryption in Cloud Computing Using Smart Contract. 937-948 - Chunpeng Ge, Willy Susilo, Zhe Liu, Joonsang Baek, Xiapu Luo, Liming Fang:
Attribute-Based Proxy Re-Encryption With Direct Revocation Mechanism for Data Sharing in Clouds. 949-960 - Yaxi Yang, Jian Weng, Yao Tong, Jia-Nan Liu, Zhenghao Wu, Leo Yu Zhang, Anjia Yang:
PriGenX: Privacy-Preserving Query With Anonymous Access Control for Genomic Data. 961-974 - Renato Ferrero, Bartolomeo Montrucchio:
Banknote Identification Through Unique Fluorescent Properties. 975-986 - Emanuele Maiorana, Chiara Romano, Emiliano Schena, Carlo Massaroni:
BIOWISH: Biometric Recognition Using Wearable Inertial Sensors Detecting Heart Activity. 987-1000
Volume 21, Number 3, May - June 2024
- Xiaochen Li, Weiran Liu, Hanwen Feng, Kunzhe Huang, Yuke Hu, Jinfei Liu, Kui Ren, Zhan Qin:
Privacy Enhancement Via Dummy Points in the Shuffle Model. 1001-1016 - Ritam Ganguly, Shokufeh Kazemloo, Borzoo Bonakdarpour:
Crash-Resilient Decentralized Synchronous Runtime Verification. 1017-1031 - Xiaokuan Zhang, Yang Zhang, Yinqian Zhang:
VeriTrain: Validating MLaaS Training Efforts via Anomaly Detection. 1032-1049 - Zikang Ding, Daojing He, Qi Qiao, Xuru Li, Yun Gao, Sammy Chan, Kim-Kwang Raymond Choo:
A Lightweight and Secure Communication Protocol for the IoT Environment. 1050-1067 - Yunlong Xing, Xinda Wang, Sadegh Torabi, Zeyu Zhang, Lingguang Lei, Kun Sun:
A Hybrid System Call Profiling Approach for Container Protection. 1068-1083 - Eric D. Vugrin, Seth Hanson, Jerry Cruz, Casey Glatter, Thomas D. Tarman, Ali Pinar:
Experimental Validation of a Command and Control Traffic Detection Model. 1084-1097 - Jian Zheng, Huawei Huang, Zibin Zheng, Song Guo:
Adaptive Double-Spending Attacks on PoW-Based Blockchains. 1098-1110 - Chunyang Lv, Jianfeng Wang, Shifeng Sun, Yunling Wang, Saiyu Qi, Xiaofeng Chen:
Towards Practical Multi-Client Order-Revealing Encryption: Improvement and Application. 1111-1126 - Sudip Vhaduri, William Cheung, Sayanton V. Dibbo:
Bag of On-Phone ANNs to Secure IoT Objects Using Wearable and Smartphone Biometrics. 1127-1138 - Yuchen Wang, Xiaoguang Li, Li Yang, Jianfeng Ma, Hui Li:
ADDITION: Detecting Adversarial Examples With Image-Dependent Noise Reduction. 1139-1154 - Hua Ma, Huming Qiu, Yansong Gao, Zhi Zhang, Alsharif Abuadbba, Minhui Xue, Anmin Fu, Jiliang Zhang, Said F. Al-Sarawi, Derek Abbott:
Quantization Backdoors to Deep Learning Commercial Frameworks. 1155-1172 - Omais Shafi Pandith:
SGXFault: An Efficient Page Fault Handling Mechanism for SGX Enclaves. 1173-1178 - Teng Li, Ximeng Liu, Wei Qiao, Xiongjie Zhu, Yulong Shen, Jianfeng Ma:
T-Trace: Constructing the APTs Provenance Graphs Through Multiple Syslogs Correlation. 1179-1195 - Kang Wei, Jun Li, Ming Ding, Chuan Ma, Yo-Seb Jeon, H. Vincent Poor:
Covert Model Poisoning Against Federated Learning: Algorithm Design and Optimization. 1196-1209 - Shuaishuai Tan, Shui Yu, Wenyin Liu, Daojing He, Sammy Chan:
You Can Glimpse but You Cannot Identify: Protect IoT Devices From Being Fingerprinted. 1210-1223 - Younho Lee, Jinyeong Seo, Yujin Nam, Jiseok Chae, Jung Hee Cheon:
HEaaN-STAT: A Privacy-Preserving Statistical Analysis Toolkit for Large-Scale Numerical, Ordinal, and Categorical Data. 1224-1241 - Jianhong Zhang, Chenghe Dong:
On the Security of Lightweight and Escrow-Free Certificate-Based Data Aggregation for Smart Grid. 1242-1243 - Nikhil Tripathi:
Delays Have Dangerous Ends: Slow HTTP/2 DoS Attacks Into the Wild and Their Real-Time Detection Using Event Sequence Analysis. 1244-1256 - Uwe Zdun, Pierre-Jean Queval, Georg Simhandl, Riccardo Scandariato, Somik Chakravarty, Marjan Jelic, Aleksandar S. Jovanovic:
Detection Strategies for Microservice Security Tactics. 1257-1273 - Zhihua Tian, Rui Zhang, Xiaoyang Hou, Lingjuan Lyu, Tianyi Zhang, Jian Liu, Kui Ren:
${\sf FederBoost}$: Private Federated Learning for GBDT. 1274-1285 - Xinrui Ge, Jia Yu, Rong Hao:
Privacy-Preserving Graph Matching Query Supporting Quick Subgraph Extraction. 1286-1300 - Xingfu Yan, Wing W. Y. Ng, Bowen Zhao, Yuxian Liu, Ying Gao, Xiumin Wang:
Fog-Enabled Privacy-Preserving Multi-Task Data Aggregation for Mobile Crowdsensing. 1301-1316 - Conor Black, Sandra Scott-Hayward:
Defeating Data Plane Attacks With Program Obfuscation. 1317-1330 - Lichao Wu, Yoo-Seung Won, Dirmanto Jap, Guilherme Perin, Shivam Bhasin, Stjepan Picek:
Ablation Analysis for Multi-Device Deep Learning-Based Physical Side-Channel Analysis. 1331-1341 - Sevtap Duman, Matthias Büchler, Manuel Egele, Engin Kirda:
PellucidAttachment: Protecting Users From Attacks via E-Mail Attachments. 1342-1354 - Shantanu Sharma, Yin Li, Sharad Mehrotra, Nisha Panwar, Peeyush Gupta, Dhrubajyoti Ghosh:
Prism: Privacy-Preserving and Verifiable Set Computation Over Multi-Owner Secret Shared Outsourced Databases. 1355-1371 - Binbin Zhao, Shouling Ji, Jiacheng Xu, Yuan Tian, Qiuyang Wei, Qinying Wang, Chenyang Lyu, Xuhong Zhang, Changting Lin, Jingzheng Wu, Raheem Beyah:
One Bad Apple Spoils the Barrel: Understanding the Security Risks Introduced by Third-Party Components in IoT Firmware. 1372-1389 - Enrico Bacis, Sabrina De Capitani di Vimercati, Sara Foresti, Stefano Paraboschi, Marco Rosa, Pierangela Samarati:
Mix&Slice for Efficient Access Revocation on Outsourced Data. 1390-1405 - Peng Jiang, Jifan Xiao, Ding Li, Hongyi Yu, Yu Bai, Yao Guo, Xiangqun Chen:
Detecting Malicious Websites From the Perspective of System Provenance Analysis. 1406-1423 - Tianpei Lu, Bingsheng Zhang, Kui Ren:
PrivData Network: A Privacy-Preserving On-Chain Data Factory and Trading Market. 1424-1436 - Zipeng Ye, Wenjian Luo, Muhammad Luqman Naseem, Xiangkai Yang, Yuhui Shi, Yan Jia:
C2FMI: Corse-to-Fine Black-Box Model Inversion Attack. 1437-1450 - Shuai Zhou, Tianqing Zhu, Dayong Ye, Xin Yu, Wanlei Zhou:
Boosting Model Inversion Attacks With Adversarial Examples. 1451-1468 - Heqing Huang, Hung-Chun Chiu, Qingkai Shi, Peisen Yao, Charles Zhang:
Balance Seed Scheduling via Monte Carlo Planning. 1469-1483 - Guanxiong Ha, Chunfu Jia, Yixuan Huang, Hang Chen, Ruiqi Li, Qiaowen Jia:
Scalable and Popularity-Based Secure Deduplication Schemes With Fully Random Tags. 1484-1500
Volume 21, Number 4, July - August 2024
- Hui Cui, Zhiguo Wan, Rui Gao, Huaqun Wang:
Outsourced Privately Verifiable Proofs of Retrievability via Blockchain. 1501-1514 - Zhao Zhang, Chunxiang Xu, Changsong Jiang, Kefei Chen:
TSAPP: Threshold Single-Sign-On Authentication Preserving Privacy. 1515-1527 - Hao Zhou, Zhiheng Niu, Gang Wang, Xiaoguang Liu, Dongshi Liu, Bingnan Kang, Zheng Hu, Yong Zhang:
Proactive Drive Failure Prediction for Cloud Storage System Through Semi-Supervised Learning. 1528-1543 - Yiwei Zhang, Siqi Ma, Tiancheng Chen, Juanru Li, Robert H. Deng, Elisa Bertino:
EvilScreen Attack: Smart TV Hijacking via Multi-Channel Remote Control Mimicry. 1544-1556