


default search action
IEEE Transactions on Dependable and Secure Computing, Volume 18
Volume 18, Number 1, January - February 2021
- Yuchang Mo

, Liudong Xing
, Yi-Kuei Lin
, Wenzhong Guo
:
Efficient Analysis of Repairable Computing Systems Subject to Scheduled Checkpointing. 1-14 - Jing Chen

, Chiheng Wang
, Kun He
, Ziming Zhao, Min Chen
, Ruiying Du, Gail-Joon Ahn
:
Semantics-Aware Privacy Risk Assessment Using Self-Learning Weight Assignment for Mobile Apps. 15-29 - Julian L. Rrushi

:
DNIC Architectural Developments for 0-Knowledge Detection of OPC Malware. 30-44 - Qiao Hu

, Yuanzhen Liu
, Anjia Yang
, Gerhard P. Hancke
:
Preventing Overshadowing Attacks in Self-Jamming Audio Channels. 45-57 - Yen-Lung Lai

, Jung Yeon Hwang
, Zhe Jin
, Soohyong Kim, Sangrae Cho, Andrew Beng Jin Teoh
:
Secure Secret Sharing Enabled b-band Mini Vaults Bio-Cryptosystem for Vectorial Biometrics. 58-71 - Bin Liang

, Hongcheng Li, Miaoqiang Su, Xirong Li
, Wenchang Shi
, Xiaofeng Wang:
Detecting Adversarial Image Examples in Deep Neural Networks with Adaptive Noise Reduction. 72-85 - Sridhar Adepu

, Aditya Mathur
:
Distributed Attack Detection in a Water Treatment Plant: Method and Case Study. 86-99 - Donghui Hu

, Chunya Hu, Yuqi Fan
, Xintao Wu
:
oGBAC - A Group Based Access Control Framework for Information Sharing in Online Social Networks. 100-116 - Jiangang Shu

, Kan Yang
, Xiaohua Jia
, Ximeng Liu
, Cong Wang
, Robert H. Deng
:
Proxy-Free Privacy-Preserving Task Matching with Efficient Revocation in Crowdsourcing. 117-130 - Chengjun Cai

, Jian Weng
, Xingliang Yuan
, Cong Wang
:
Enabling Reliable Keyword Search in Encrypted Decentralized Storage with Fairness. 131-144 - Hui Guo

, Zhenfeng Zhang, Jing Xu, Ningyu An, Xiao Lan:
Accountable Proxy Re-Encryption for Secure Data Sharing. 145-159 - Kangjie Lu

, Meng Xu, Chengyu Song
, Taesoo Kim
, Wenke Lee:
Stopping Memory Disclosures via Diversification and Replicated Execution. 160-173 - Xing Gao

, Benjamin Steenkamer
, Zhongshu Gu, Mehmet Kayaalp, Dimitrios Pendarakis, Haining Wang
:
A Study on the Security Implications of Information Leakages in Container Clouds. 174-191 - Chang Liu

, Liehuang Zhu
, Xiangjian He
, Jinjun Chen
:
Enabling Privacy-Preserving Shortest Distance Queries on Encrypted Graph Data. 192-204 - Warren Connell, Daniel A. Menascé

, Massimiliano Albanese
:
Performance Modeling of Moving Target Defenses with Reconfiguration Limits. 205-219 - Bin Lian

, Gongliang Chen, Jialin Cui, Maode Ma
:
Compact E-Cash with Efficient Coin-Tracing. 220-234 - Bikash Poudel, Arslan Munir

:
Design and Evaluation of a Reconfigurable ECU Architecture for Secure and Dependable Automotive CPS. 235-252 - Ning Xie

, Changsheng Chen
, Zhong Ming
:
Security Model of Authentication at the Physical Layer and Performance Analysis over Fading Channels. 253-268 - Sophie Cerf

, Sara Bouchenak, Bogdan Robu
, Nicolas Marchand
, Vincent Primault, Sonia Ben Mokhtar
, Antoine Boutet, Lydia Y. Chen
:
Automatic Privacy and Utility Preservation for Mobility Data: A Nonlinear Model-Based Approach. 269-282 - Guosong Sun

, Quan Qian
:
Deep Learning and Visualization for Identifying Malware Families. 283-295 - Adam Bowers, Cong Liao, Douglas Steiert

, Dan Lin
, Anna Cinzia Squicciarini, Ali R. Hurson
:
Detecting Suspicious File Migration or Replication in the Cloud. 296-309 - Mengyuan Zhang

, Lingyu Wang
, Sushil Jajodia
, Anoop Singhal:
Network Attack Surface: Lifting the Concept of Attack Surface to the Network Level for Evaluating Networks' Resilience Against Zero-Day Attacks. 310-324 - Jasper Bogaerts

, Bert Lagaisse
, Wouter Joosen:
SEQUOIA: A Middleware Supporting Policy-Based Access Control for Search and Aggregation in Data-Driven Applications. 325-339 - Shaoyong Du

, Pengxiong Zhu, Jingyu Hua
, Zhiyun Qian
, Zhao Zhang, Xiaoyu Chen, Sheng Zhong
:
An Empirical Analysis of Hazardous Uses of Android Shared Storage. 340-355 - Shameek Bhattacharjee

, Sajal K. Das
:
Detection and Forensics against Stealthy Data Falsification in Smart Metering Infrastructure. 356-371 - Montida Pattaranantakul, Ruan He, Zonghua Zhang

, Ahmed Meddahi
, Ping Wang
:
Leveraging Network Functions Virtualization Orchestrators to Achieve Software-Defined Access Control in the Clouds. 372-383 - Xiaojie Zhu

, Erman Ayday
, Roman Vitenberg:
A Privacy-Preserving Framework for Outsourcing Location-Based Services to the Cloud. 384-399 - Kazi Md. Rokibul Alam

, Shinsuke Tamura
, S. M. Saifur Rahman, Yasuhiko Morimoto
:
An Electronic Voting Scheme Based on Revised-SVRM and Confirmation Numbers. 400-410 - Ye Zhu

, Nicholas Ruffing, Jonathan Gurary
, Yong Guan
, Riccardo Bettati
:
Towards Smartphone Operating System Identification. 411-425 - Manoranjan Mohanty

, Ming Zhang, Muhammad Rizwan Asghar
, Giovanni Russello:
e-PRNU: Encrypted Domain PRNU-Based Camera Attribution for Preserving Privacy. 426-437 - Jingyi Wang

, Xinyue Zhang
, Qixun Zhang
, Ming Li
, Yuanxiong Guo
, Zhiyong Feng
, Miao Pan
:
Data-Driven Spectrum Trading with Secondary Users' Differential Privacy Preservation. 438-447 - Jianghua Liu

, Jinhua Ma
, Yang Xiang
, Wanlei Zhou
, Xinyi Huang
:
Authenticated Medical Documents Releasing with Privacy Protection and Release Control. 448-459 - Jin Li

, Yanyu Huang
, Yu Wei
, Siyi Lv, Zheli Liu
, Changyu Dong
, Wenjing Lou
:
Searchable Symmetric Encryption with Forward Search Privacy. 460-474 - Rong Jin

, Kai Zeng
:
Manipulative Attack Against Physical Layer Key Agreement and Countermeasure. 475-489 - Xinrui Ge

, Jia Yu
, Hanlin Zhang
, Chengyu Hu
, Zengpeng Li
, Zhan Qin
, Rong Hao
:
Towards Achieving Keyword Search over Dynamic Encrypted Cloud Data with Symmetric-Key Based Verification. 490-504
Volume 18, Number 2, March - April 2021
- Khaled Al-Naami, Amir El-Ghamry

, Md Shihabul Islam
, Latifur Khan, Bhavani Thuraisingham, Kevin W. Hamlen, Mohammed F. Alrahmawy
, Magdi Zakria Rashad
:
BiMorphing: A Bi-Directional Bursting Defense against Website Fingerprinting Attacks. 505-517 - Tanmoy Chakraborty

, Sushil Jajodia
, Jonathan Katz, Antonio Picariello, Giancarlo Sperlì
, V. S. Subrahmanian
:
A Fake Online Repository Generation Engine for Cyber Deception. 518-533 - Furkan Alaca

, AbdelRahman Abdou
, Paul C. van Oorschot
:
Comparative Analysis and Framework Evaluating Mimicry-Resistant and Invisible Web Authentication Schemes. 534-549 - Peter Casey

, Ibrahim M. Baggili
, Ananya Yarramreddy:
Immersive Virtual Reality Attacks and the Human Joystick. 550-562 - Tong Wu

, Guomin Yang
, Yi Mu
, Fuchun Guo
, Robert H. Deng
:
Privacy-Preserving Proof of Storage for the Pay-As-You-Go Business Model. 563-575 - Suvadeep Banerjee

, Balavinayagam Samynathan
, Jacob A. Abraham
, Abhijit Chatterjee
:
Real-Time Error Detection in Nonlinear Control Systems Using Machine Learning Assisted State-Space Encoding. 576-592 - Muhammad E. S. Elrabaa

, Mohammed Alasli
, Marwan H. Abu-Amara
:
Secure Computing Enclaves Using FPGAs. 593-604 - Omar Abdel Wahab

, Jamal Bentahar
, Hadi Otrok
, Azzam Mourad
:
Resource-Aware Detection and Defense System against Multi-Type Attacks in the Cloud: Repeated Bayesian Stackelberg Game. 605-622 - Jan Z. Konczak

, Pawel T. Wojciechowski
, Nuno Santos, Tomasz Zurkowski
, André Schiper:
Recovery Algorithms for Paxos-Based State Machine Replication. 623-640 - Shunli Ma

, Yi Deng, Debiao He
, Jiang Zhang
, Xiang Xie
:
An Efficient NIZK Scheme for Privacy-Preserving Transactions Over Account-Model Blockchain. 641-651 - Yue Zhang

, Jian Weng
, Jiasi Weng
, Lin Hou, Anjia Yang
, Ming Li, Yang Xiang
, Robert H. Deng
:
Looking Back! Using Early Versions of Android Apps as Attack Vectors. 652-666 - Sujit Rokka Chhetri

, Anomadarshi Barua
, Sina Faezi
, Francesco Regazzoni
, Arquimedes Canedo, Mohammad Abdullah Al Faruque
:
Tool of Spies: Leaking your IP by Altering the 3D Printer Compiler. 667-678 - Yannan Li

, Guomin Yang
, Willy Susilo
, Yong Yu
, Man Ho Au
, Dongxi Liu:
Traceable Monero: Anonymous Cryptocurrency with Enhanced Accountability. 679-691 - Shuli Zheng, Yuzhao Wang, Donghui Hu

:
Lossless Data Hiding Based on Homomorphic Cryptosystem. 692-705 - Runhua Xu

, James Joshi
, Prashant Krishnamurthy:
An Integrated Privacy Preserving Attribute-Based Access Control Framework Supporting Secure Deduplication. 706-721 - Jing Zhang

, Jie Cui
, Hong Zhong
, Zhili Chen
, Lu Liu
:
PA-CRT: Chinese Remainder Theorem Based Conditional Privacy-Preserving Authentication Scheme in Vehicular Ad-Hoc Networks. 722-735 - Mojan Javaheripi

, Mohammad Samragh
, Bita Darvish Rouhani
, Tara Javidi
, Farinaz Koushanfar
:
CuRTAIL: ChaRacterizing and Thwarting AdversarIal Deep Learning. 736-752 - Muhammad Siddiqi

, Syed Taha Ali
, Vijay Sivaraman
:
Secure Opportunistic Contextual Logging for Wearable Healthcare Sensing Devices. 753-764 - Saiyu Qi

, Yuanqing Zheng
:
Crypt-DAC: Cryptographically Enforced Dynamic Access Control in the Cloud. 765-779 - Peng Tang

, Xiang Cheng, Sen Su
, Rui Chen, Huaxi Shao:
Differentially Private Publication of Vertically Partitioned Data. 780-795 - Tommaso Zoppi

, Andrea Ceccarelli
, Andrea Bondavalli
:
MADneSs: A Multi-Layer Anomaly Detection Framework for Complex Dynamic Systems. 796-809 - Chen Luo

, Fei He
, Fei Peng, Dong Yan, Dan Zhang, Xin Zhou:
PSpec-SQL: Enabling Fine-Grained Control for Distributed Data Analytics. 810-824 - Long Cheng

, Ke Tian
, Danfeng Daphne Yao, Lui Sha, Raheem A. Beyah:
Checking is Believing: Event-Aware Program Anomaly Detection in Cyber-Physical Systems. 825-842 - Xiaokang Hu

, Jian Li
, Changzheng Wei, Weigang Li, Xin Zeng, Ping Yu, Haibing Guan
:
STYX: A Hierarchical Key Management System for Elastic Content Delivery Networks on Public Clouds. 843-857 - Yinghui Zhang

, Robert H. Deng
, Elisa Bertino
, Dong Zheng
:
Robust and Universal Seamless Handover Authentication in 5G HetNets. 858-874 - Hassan Chizari

, Emil Lupu
:
Extracting Randomness from the Trend of IPI for Cryptographic Operations in Implantable Medical Devices. 875-888 - Bikash Chandra Singh

, Barbara Carminati, Elena Ferrari
:
Privacy-Aware Personal Data Storage (P-PDS): Learning how to Protect User Privacy from External Applications. 889-903 - Lin Yao

, Zhenyu Chen, Xin Wang
, Dong Liu, Guowei Wu
:
Sensitive Label Privacy Preservation with Anatomization for Data Publishing. 904-917 - Xi Cheng

, Min Zhou
, Xiaoyu Song, Ming Gu, Jiaguang Sun:
Automatic Integer Error Repair by Proper-Type Inference. 918-935 - Yaara Neumeier

, Osnat Keren
:
Protecting Multi-Level Memories From Jamming Using Q-ary Expurgated Robust Codes. 936-948 - Rajkumar Das

, Gour C. Karmakar
, Joarder Kamruzzaman
:
How Much I Can Rely on You: Measuring Trustworthiness of a Twitter User. 949-966 - Leye Wang

, Dingqi Yang
, Xiao Han
, Daqing Zhang, Xiaojuan Ma
:
Mobile Crowdsourcing Task Allocation with Differential-and-Distortion Geo-Obfuscation. 967-981 - Tianhao Wang

, Ninghui Li, Somesh Jha:
Locally Differentially Private Heavy Hitter Identification. 982-993 - Guangchi Liu

, Qing Yang
, Honggang Wang
, Alex X. Liu
:
Trust Assessment in Online Social Networks. 994-1007
Volume 18, Number 3, May - June 2021
- Yuan Zhang

, Yunlong Mao
, Minze Xu
, Fengyuan Xu, Sheng Zhong
:
Towards Thwarting Template Side-Channel Attacks in Secure Cloud Deduplications. 1008-1018 - Xiaojun Zhang, Chunxiang Xu

, Huaxiong Wang
, Yuan Zhang
, Shixiong Wang:
FS-PEKS: Lattice-Based Forward Secure Public-Key Encryption with Keyword Search for Cloud-Assisted Industrial Internet of Things. 1019-1032 - Yangyu Hu

, Haoyu Wang, Yajin Zhou
, Yao Guo
, Li Li
, Bingxuan Luo
, Fangren Xu:
Dating with Scambots: Understanding the Ecosystem of Fraudulent Dating Applications. 1033-1050 - Shujie Cui

, Sana Belguith
, Pramodya De Alwis, Muhammad Rizwan Asghar
, Giovanni Russello:
Collusion Defender: Preserving Subscribers' Privacy in Publish and Subscribe Systems. 1051-1064 - Jakub Breier

, Xiaolu Hou
, Yang Liu
:
On Evaluating Fault Resilient Encoding Schemes in Software. 1065-1079 - Yinbin Miao

, Ximeng Liu, Kim-Kwang Raymond Choo
, Robert H. Deng
, Jiguo Li, Hongwei Li, Jian-Feng Ma:
Privacy-Preserving Attribute-Based Keyword Search in Shared Multi-owner Setting. 1080-1094 - Geong Sen Poh, Prosanta Gope

, Jianting Ning
:
PrivHome: Privacy-Preserving Authenticated Communication in Smart Home Environment. 1095-1107 - Chen Yan

, Guoming Zhang, Xiaoyu Ji
, Tianchen Zhang, Taimin Zhang, Wenyuan Xu
:
The Feasibility of Injecting Inaudible Voice Commands to Voice Assistants. 1108-1124 - Hai Jin

, Zhi Li
, Deqing Zou
, Bin Yuan
:
DSEOM: A Framework for Dynamic Security Evaluation and Optimization of MTD in Container-Based Cloud. 1125-1136 - Wei Lu

, Yingjie Xue, Yuileong Yeung, Hongmei Liu, Jiwu Huang
, Yun Q. Shi:
Secure Halftone Image Steganography Based on Pixel Density Transition. 1137-1149 - Haider Adnan Khan

, Nader Sehatbakhsh
, Luong N. Nguyen, Robert Locke Callan, Arie Yeredor
, Milos Prvulovic
, Alenka G. Zajic
:
IDEA: Intrusion Detection through Electromagnetic-Signal Analysis for Critical Embedded and Cyber-Physical Systems. 1150-1163 - Ron Bitton

, Asaf Shabtai
:
A Machine Learning-Based Intrusion Detection System for Securing Remote Desktop Connections to Electronic Flight Bag Servers. 1164-1181 - Jin Cao

, Maode Ma
, Yulong Fu, Hui Li
, Yinghui Zhang
:
CPPHA: Capability-Based Privacy-Protection Handover Authentication Mechanism for SDN-Based 5G HetNets. 1182-1195 - Congwu Li, Le Guan

, Jingqiang Lin
, Bo Luo
, Quanwei Cai
, Jiwu Jing, Jing Wang:
Mimosa: Protecting Private Keys Against Memory Disclosure Attacks Using Hardware Transactional Memory. 1196-1213 - Chunpeng Ge

, Zhe Liu
, Jinyue Xia
, Liming Fang
:
Revocable Identity-Based Broadcast Proxy Re-Encryption for Data Sharing in Clouds. 1214-1226 - Louise Axon

, Jassim Happa
, Alastair Janse van Rensburg
, Michael Goldsmith
, Sadie Creese:
Sonification to Support the Monitoring Tasks of Security Operations Centres. 1227-1244 - Chuan Zhang

, Liehuang Zhu
, Chang Xu
, Ximeng Liu
, Kashif Sharif
:
Reliable and Privacy-Preserving Truth Discovery for Mobile Crowdsensing Systems. 1245-1260 - Yifeng Zheng

, Huayi Duan
, Xiaoting Tang, Cong Wang
, Jiantao Zhou
:
Denoising in the Dark: Privacy-Preserving Deep Neural Network-Based Image Denoising. 1261-1275 - Wei Li

, Xuelian Li
, Juntao Gao
, Haiyu Wang
:
Design of Secure Authenticated Key Management Protocol for Cloud Computing Environments. 1276-1290 - Mahmoud Nabil

, Ahmed B. T. Sherif
, Mohamed Mahmoud
, Ahmad Alsharif
, Mohamed M. Abdallah
:
Efficient and Privacy-Preserving Ridesharing Organization for Transferable and Non-Transferable Services. 1291-1306 - Haijiang Wang

, Jianting Ning
, Xinyi Huang
, Guiyi Wei
, Geong Sen Poh
, Ximeng Liu
:
Secure Fine-Grained Encrypted Keyword Search for E-Healthcare Cloud. 1307-1319 - Yanli Chen

, Hongxia Wang, Hanzhou Wu
, Zhiqiang Wu
, Tao Li
, Asad Malik
:
Adaptive Video Data Hiding through Cost Assignment and STCs. 1320-1335 - María Isabel González Vasco

, Angel L. Pérez del Pozo, Claudio Soriente
:
A Key for John Doe: Modeling and Designing Anonymous Password-Authenticated Key Exchange Protocols. 1336-1353 - Shengshan Hu

, Leo Yu Zhang
, Qian Wang
, Zhan Qin
, Cong Wang:
Towards Private and Scalable Cross-Media Retrieval. 1354-1368 - Brian Belleville

, Wenbo Shen
, Stijn Volckaert
, Ahmed M. Azab, Michael Franz:
KALD: Detecting Direct Pointer Disclosure Vulnerabilities. 1369-1377 - Chongyang Bai

, Qian Han
, Ghita Mezzour
, Fabio Pierazzi
, V. S. Subrahmanian
:
$\sf {DBank}$DBank: Predictive Behavioral Analysis of Recent Android Banking Trojans. 1378-1393 - Kun He

, Jing Chen
, Quan Yuan, Shouling Ji
, Debiao He
, Ruiying Du:
Dynamic Group-Oriented Provable Data Possession in the Cloud. 1394-1408 - SeungSeob Lee

, Hang Shi
, Kun Tan, Yunxin Liu
, SuKyoung Lee
, Yong Cui
:
S2Net: Preserving Privacy in Smart Home Routers. 1409-1424 - Haining Yu

, Xiaohua Jia
, Hongli Zhang
, Xiangzhan Yu, Jiangang Shu
:
PSRide: Privacy-Preserving Shared Ride Matching for Online Ride Hailing Systems. 1425-1440 - Kai Huang

, Ximeng Liu
, Shaojing Fu
, Deke Guo, Ming Xu:
A Lightweight Privacy-Preserving CNN Feature Extraction Framework for Mobile Sensing. 1441-1455 - Hang Cheng

, Huaxiong Wang
, Ximeng Liu
, Yan Fang, Meiqing Wang
, Xiaojun Zhang
:
Person Re-Identification over Encrypted Outsourced Surveillance Videos. 1456-1473 - Zhibo Wang

, Mengkai Song
, Siyan Zheng
, Zhifei Zhang
, Yang Song
, Qian Wang
:
Invisible Adversarial Attack against Deep Neural Networks: An Adaptive Penalization Approach. 1474-1488 - Xiaoning Du

, Alwen Tiu
, Kun Cheng
, Yang Liu
:
Trace-Length Independent Runtime Monitoring of Quantitative Policies. 1489-1510
Volume 18, Number 4, July - August 2021
- Yuan Hong

, Valérie Issarny
, Surya Nepal
, Mudhakar Srivatsa:
Guest Editors' Introduction to the Joint Special Section on Secure and Emerging Collaborative Computing and Intelligent Systems. 1511-1512 - Wenqi Wei

, Ling Liu
:
Robust Deep Learning Ensemble Against Deception. 1513-1527 - Lu Ou

, Zheng Qin
, Shaolin Liao
, Jian Weng
, Xiaohua Jia
:
An Optimal Noise Mechanism for Cross-Correlated IoT Data Releasing. 1528-1540 - Zhigang Lu

, Hong Shen
:
Differentially Private $k$k-Means Clustering With Convergence Guarantee. 1541-1552 - Gagandeep Singh Chawla, Mengyuan Zhang

, Suryadipta Majumdar
, Yosr Jarraya, Makan Pourzandi, Lingyu Wang
, Mourad Debbabi
:
VMGuard: State-Based Proactive Verification of Virtual Network Isolation With Application to NFV. 1553-1567 - Jin Han

, Wanyu Zang, Meng Yu, Ravi S. Sandhu:
Quantify Co-Residency Risks in the Cloud Through Deep Learning. 1568-1579 - Hongwei Shi

, Shengling Wang
, Qin Hu, Xiuzhen Cheng
, Junshan Zhang
, Jiguo Yu
:
Fee-Free Pooled Mining for Countering Pool-Hopping Attack in Blockchain. 1580-1590 - Xinghua Li

, Mengyao Zhu
, Laurence T. Yang
, Mengfan Xu
, Zhuo Ma
, Cheng Zhong, Hui Li
, Yang Xiang
:
Sustainable Ensemble Learning Driving Intrusion Detection Model. 1591-1604 - Haibing Lu

, Xi Chen
, Qi Liu, Michele Samorani
, Guojie Song
, Yanjiang Yang:
Stochastic Workflow Authorizations With Queueing Constraints. 1605-1619 - Yongjun Zhao

, Sherman S. M. Chow
:
Updatable Block-Level Message-Locked Encryption. 1620-1631 - Jinwen Liang

, Zheng Qin
, Sheng Xiao, Lu Ou
, Xiaodong Lin
:
Efficient and Secure Decision Tree Classification for Cloud-Assisted Online Diagnosis Services. 1632-1644 - Shlomi Dolev

, Peeyush Gupta
, Yin Li
, Sharad Mehrotra, Shantanu Sharma
:
Privacy-Preserving Secret Shared Computations Using MapReduce. 1645-1666 - Yinbin Miao

, Robert H. Deng
, Ximeng Liu
, Kim-Kwang Raymond Choo
, Hongjun Wu
, Hongwei Li
:
Multi-Authority Attribute-Based Keyword Search over Encrypted Cloud Data. 1667-1680 - Savio Sciancalepore

, Roberto Di Pietro
:
SOS: Standard-Compliant and Packet Loss Tolerant Security Framework for ADS-B Communications. 1681-1698 - Yang Su

, Yansong Gao
, Michael Chesser
, Omid Kavehei
, Alanson P. Sample
, Damith C. Ranasinghe
:
SecuCode: Intrinsic PUF Entangled Secure Wireless Code Dissemination for Computational RFID Devices. 1699-1717 - Piyoosh Purushothaman Nair

, Arnab Sarkar, Santosh Biswas
:
Fault-Tolerant Real-Time Fair Scheduling on Multiprocessor Systems with Cold-Standby. 1718-1732 - Huan Chang

, Lingguang Lei
, Kun Sun
, Yuewu Wang, Jiwu Jing, Yi He, Pingjian Wang:
Vulnerable Service Invocation and Countermeasures. 1733-1750 - Fu-Hau Hsu

, Nien-Chi Liu
, Yanling Hwang, Che-Hao Liu, Chuan-Sheng Wang
, Chang-Yi Chen:
DPC: A Dynamic Permission Control Mechanism for Android Third-Party Libraries. 1751-1761 - Helei Cui

, Yajin Zhou
, Cong Wang
, Xinyu Wang
, Yuefeng Du
, Qian Wang
:
PPSB: An Open and Flexible Platform for Privacy-Preserving Safe Browsing. 1762-1778 - Shaikh Mostafa, Bridgette Findley, Na Meng, Xiaoyin Wang

:
Sais: Self-Adaptive Identification of Security Bug Reports. 1779-1792 - Ruiyang Xiao

, Wei Ren
, Tianqing Zhu, Kim-Kwang Raymond Choo
:
A Mixing Scheme Using a Decentralized Signature Protocol for Privacy Protection in Bitcoin Blockchain. 1793-1803 - Yinbin Miao

, Robert H. Deng
, Kim-Kwang Raymond Choo
, Ximeng Liu
, Jianting Ning
, Hongwei Li
:
Optimized Verifiable Fine-Grained Keyword Search in Dynamic Multi-Owner Settings. 1804-1820 - Asma Aloufi

, Peizhao Hu
, Harry W. H. Wong
, Sherman S. M. Chow
:
Blindfolded Evaluation of Random Forests with Multi-Key Homomorphic Encryption. 1821-1835 - Jinguang Han

, Liqun Chen
, Steve Schneider
, Helen Treharne
, Stephan Wesemeyer
:
Privacy-Preserving Electronic Ticket Scheme with Attribute-Based Credentials. 1836-1849 - Mao Ye

, Kazi Abu Zubair, Aziz Mohaisen
, Amro Awad
:
Towards Low-Cost Mechanisms to Enable Restoration of Encrypted Non-Volatile Memories. 1850-1867 - Berk Bekiroglu

, Bogdan Korel
:
Survivability Analysis of K-Variant Architecture for Different Memory Attacks and Defense Strategies. 1868-1881 - Borui Cai

, Guangyan Huang
, Chi-Hung Chi, Ran Liu
, Yanfeng Shu:
An Accurate Negative Survey Using Answer Confidence Level. 1882-1892 - Chengjun Cai

, Yifeng Zheng
, Yuefeng Du
, Zhan Qin
, Cong Wang
:
Towards Private, Robust, and Verifiable Crowdsensing Systems via Public Blockchains. 1893-1907 - Henning Kopp

, David Mödinger
, Franz J. Hauck
, Frank Kargl
:
Cryptographic Design of PriCloud, a Privacy-Preserving Decentralized Storage with Remuneration. 1908-1919 - Lei Zhou, Fengwei Zhang

, Jidong Xiao
, Kevin Leach
, Westley Weimer, Xuhua Ding
, Guojun Wang
:
A Coprocessor-Based Introspection Framework Via Intel Management Engine. 1920-1932 - Xurong Li

, Shouling Ji
, Meng Han
, Juntao Ji, Zhenyu Ren
, Yushan Liu, Chunming Wu
:
Adversarial Examples versus Cloud-Based Detectors: A Black-Box Empirical Study. 1933-1949 - Hoda Naghibijouybari

, Ajaya Neupane, Zhiyun Qian
, Nael B. Abu-Ghazaleh
:
Side Channel Attacks on GPUs. 1950-1961 - Jinghui Peng

, Yijing Jiang
, Shanyu Tang
, Farid Meziane
:
Security of Streaming Media Communications with Logistic Map and Self-Adaptive Detection-Based Steganography. 1962-1973 - Ohmin Kwon

, Yonggon Kim
, Jaehyuk Huh
, Hyunsoo Yoon
:
ZeroKernel: Secure Context-Isolated Execution on Commodity GPUs. 1974-1988 - Yueqiang Cheng

, Zhi Zhang
, Surya Nepal
, Zhi Wang:
CATTmew: Defeating Software-Only Physical Kernel Isolation. 1989-2004 - Ti Wang

, Hui Ma
, Yongbin Zhou
, Rui Zhang
, Zishuai Song:
Fully Accountable Data Sharing for Pay-as-You-Go Cloud Scenes. 2005-2016
Volume 18, Number 5, September - October 2021
- Yufei Chen

, Chao Shen
, Cong Wang
, Qixue Xiao, Kang Li
, Yu Chen:
Scaling Camouflage: Content Disguising Attack Against Computer Vision Applications. 2017-2028 - Lingchen Zhao

, Shengshan Hu
, Qian Wang
, Jianlin Jiang
, Chao Shen, Xiangyang Luo
, Pengfei Hu
:
Shielding Collaborative Learning: Mitigating Poisoning Attacks Through Client-Side Detection. 2029-2041 - Anatoly Shusterman

, Zohar Avraham, Eliezer Croitoru, Yarden Haskal, Lachlan Kang, Dvir Levi, Yosef Meltser, Prateek Mittal, Yossi Oren
, Yuval Yarom
:
Website Fingerprinting Through the Cache Occupancy Channel and its Real World Practicality. 2042-2060 - Yasmeen Alufaisan

, Murat Kantarcioglu
, Yan Zhou
:
Robust Transparency Against Model Inversion Attacks. 2061-2073 - Shaofeng Li

, Minhui Xue
, Benjamin Zi Hao Zhao, Haojin Zhu
, Xinpeng Zhang
:
Invisible Backdoor Attacks on Deep Neural Networks Via Steganography and Regularization. 2088-2105 - Akshay Agarwal

, Richa Singh
, Mayank Vatsa
, Nalini K. Ratha
:
Image Transformation-Based Defense Against Adversarial Perturbation on Deep Learning Models. 2106-2121 - Cheng Wang

, Changqi Wang, Hangyu Zhu
, Jipeng Cui
:
LAW: Learning Automatic Windows for Online Payment Fraud Detection. 2122-2135 - Hudan Studiawan

, Ferdous Sohel
, Christian Payne:
Anomaly Detection in Operating System Logs with Deep Learning-Based Sentiment Analysis. 2136-2148 - Yebo Feng

, Jun Li
, Lei Jiao
, Xintao Wu
:
Towards Learning-Based, Content-Agnostic Detection of Social Bot Traffic. 2149-2163 - Keval Doshi

, Yasin Yilmaz
, Suleyman Uludag
:
Timely Detection and Mitigation of Stealthy DDoS Attacks Via IoT Networks. 2164-2176 - Zilong Zhao

, Robert Birke, Rui Han
, Bogdan Robu
, Sara Bouchenak, Sonia Ben Mokhtar, Lydia Y. Chen
:
Enhancing Robustness of On-Line Learning Models on Highly Noisy Data. 2177-2192 - Xinlei He

, Qingyuan Gong, Yang Chen
, Yang Zhang
, Xin Wang, Xiaoming Fu
:
DatingSec: Detecting Malicious Accounts in Dating Apps Using a Content-Based Attention Network. 2193-2208 - Jinshan Liu

, Jung-Min Park
:
"Seeing is Not Always Believing": Detecting Perception Error Attacks Against Autonomous Vehicles. 2209-2223 - Deqing Zou

, Sujuan Wang, Shouhuai Xu
, Zhen Li
, Hai Jin
:
$\mu$μVulDeePecker: A Deep Learning-Based System for Multiclass Vulnerability Detection. 2224-2236 - DaeHee Jang

, Jonghwan Kim, Hojoon Lee
, Minjoon Park, Yunjong Jung, Minsu Kim, Brent ByungHoon Kang
:
On the Analysis of Byte-Granularity Heap Randomization. 2237-2252 - Jun Zhou

, Kim-Kwang Raymond Choo
, Zhenfu Cao
, Xiaolei Dong:
PVOPM: Verifiable Privacy-Preserving Pattern Matching with Efficient Outsourcing in the Malicious Setting. 2253-2270 - Francesco Palmieri

:
A Distributed Flow Correlation Attack to Anonymizing Overlay Networks Based on Wavelet Multi-Resolution Analysis. 2271-2284 - Meng Yue

, Minxiao Wang
, Zhijun Wu:
Low-High Burst: A Double Potency Varying-RTT Based Full-Buffer Shrew Attack Model. 2285-2300 - Jianghong Wei

, Xiaofeng Chen
, Xinyi Huang
, Xuexian Hu
, Willy Susilo
:
RS-HABE: Revocable-Storage and Hierarchical Attribute-Based Access Scheme for Secure Sharing of e-Health Records in Public Cloud. 2301-2315 - Tawfeeq A. Shawly

, Ali A. Elghariani
, Jason Kobes, Arif Ghafoor
:
Architectures for Detecting Interleaved Multi-Stage Network Attacks Using Hidden Markov Models. 2316-2330 - Pengfei Wu

, Robert H. Deng
, Qingni Shen
, Ximeng Liu
, Qi Li
, Zhonghai Wu
:
ObliComm: Towards Building an Efficient Oblivious Communication System. 2331-2348 - Jonathan Shahen

, Jianwei Niu
, Mahesh Tripunitara
:
Cree: A Performant Tool for Safety Analysis of Administrative Temporal Role-Based Access Control (ATRBAC) Policies. 2349-2364 - Mehmet Emre Gursoy

, Acar Tamersoy, Stacey Truex
, Wenqi Wei
, Ling Liu
:
Secure and Utility-Aware Data Collection with Condensed Local Differential Privacy. 2365-2378 - Huaqun Wang

, Qihua Wang
, Debiao He
:
Blockchain-Based Private Provable Data Possession. 2379-2389 - Yeonjoon Lee

, Xueqiang Wang
, Xiaojing Liao, XiaoFeng Wang:
Understanding Illicit UI in iOS Apps Through Hidden UI Analysis. 2390-2402 - Tao Wang

, Jian Weng
, Jay Ligatti, Yao Liu
:
Far Proximity Identification in Wireless Systems. 2403-2418 - Shabnam Kasra Kermanshahi

, Joseph K. Liu
, Ron Steinfeld, Surya Nepal
, Shangqi Lai
, Randolph Loh, Cong Zuo
:
Multi-Client Cloud-Based Symmetric Searchable Encryption. 2419-2437 - Jiasi Weng, Jian Weng, Jilian Zhang, Ming Li, Yue Zhang

, Weiqi Luo:
DeepChain: Auditable and Privacy-Preserving Deep Learning with Blockchain-Based Incentive. 2438-2455 - Sabrina De Capitani di Vimercati

, Sara Foresti
, Giovanni Livraga
, Vincenzo Piuri
, Pierangela Samarati
:
Security-Aware Data Allocation in Multicloud Scenarios. 2456-2468 - Guanjun Lin

, Jun Zhang
, Wei Luo
, Lei Pan
, Olivier Y. de Vel
, Paul Montague, Yang Xiang
:
Software Vulnerability Discovery via Learning Multi-Domain Knowledge Bases. 2469-2485 - Momen Oqaily

, Yosr Jarraya, Meisam Mohammady
, Suryadipta Majumdar
, Makan Pourzandi, Lingyu Wang
, Mourad Debbabi
:
SegGuard: Segmentation-Based Anonymization of Network Data in Clouds for Privacy-Preserving Security Auditing. 2486-2505 - Josep Domingo-Ferrer

, Krishnamurty Muralidhar
, Maria Bras-Amorós
:
General Confidentiality and Utility Metrics for Privacy-Preserving Data Publishing Based on the Permutation Model. 2506-2517 - Jianfei Sun

, Hu Xiong
, Xuyun Nie
, Yinghui Zhang
, Pengfei Wu
:
On the Security of Privacy-Preserving Attribute-Based Keyword Search in Shared Multi-Owner Setting. 2518-2519 - Derui Wang

, Chaoran Li
, Sheng Wen
, Surya Nepal
, Yang Xiang
:
Man-in-the-Middle Attacks Against Machine Learning Classifiers Via Malicious Generative Models. 2074-2087
Volume 18, Number 6, November - December 2021
- Amuleen Gulati

, Gagangeet Singh Aujla
, Rajat Chaudhary
, Neeraj Kumar
, Mohammad S. Obaidat
, Abderrahim Benslimane
:
DiLSe: Lattice-Based Secure and Dependable Data Dissemination Scheme for Social Internet of Vehicles. 2520-2534 - Shagufta Mehnaz

, Elisa Bertino
:
A Fine-Grained Approach for Anomaly Detection in File System Accesses With Enhanced Temporal User Profiles. 2535-2550 - Sen Chen

, Lingling Fan
, Chunyang Chen
, Minhui Xue
, Yang Liu
, Lihua Xu:
GUI-Squatting Attack: Automated Generation of Android Phishing Apps. 2551-2568 - Shengshan Hu, Chengjun Cai

, Qian Wang
, Cong Wang
, Zhibo Wang
, Dengpan Ye
:
Augmenting Encrypted Search: A Decentralized Service Realization with Enforced Execution. 2569-2581 - Qiang Zeng, Lannan Luo

, Zhiyun Qian
, Xiaojiang Du
, Zhoujun Li
, Chin-Tser Huang
, Csilla Farkas:
Resilient User-Side Android Application Repackaging and Tampering Detection Using Cryptographically Obfuscated Logic Bombs. 2582-2600 - Chengjun Cai

, Yifeng Zheng
, Anxin Zhou
, Cong Wang
:
Building a Secure Knowledge Marketplace Over Crowdsensed Data Streams. 2601-2616 - Shangqing Zhao

, Zhuo Lu
, Cliff Wang:
Measurement Integrity Attacks Against Network Tomography: Feasibility and Defense. 2617-2630 - Jianwei Qian

, Haohua Du
, Jiahui Hou
, Linlin Chen
, Taeho Jung
, Xiang-Yang Li
:
Speech Sanitizer: Speech Content Desensitization and Voice Anonymization. 2631-2642 - Bingyu Liu, Shangyu Xie

, Han Wang
, Yuan Hong
, Xuegang Ban
, Meisam Mohammady
:
VTDP: Privately Sanitizing Fine-Grained Vehicle Trajectory Data With Boosted Utility. 2643-2657 - Yulai Xie

, Yafeng Wu, Dan Feng, Darrell D. E. Long
:
P-Gaussian: Provenance-Based Gaussian Distribution for Detecting Intrusion Behavior Variants Using High Efficient and Real Time Memory Databases. 2658-2674 - Jie Liang

, Yu Jiang
, Mingzhe Wang
, Xun Jiao, Yuanliang Chen, Houbing Song
, Kim-Kwang Raymond Choo
:
DeepFuzzer: Accelerated Deep Greybox Fuzzing. 2675-2688 - Bassam Jamil Mohd

, Sa'ed Abed
, Thaier Hayajneh
, Mohammad H. Alshayeji
:
Run-Time Monitoring and Validation Using Reverse Function (RMVRF) for Hardware Trojans Detection. 2689-2704 - Weili Han

, Chang Cao
, Zhe Zhou
, Shize Chen
, Lingqi Huang, X. Sean Wang
:
A Smart Framework for Fine-Grained Microphone Acoustic Permission Management. 2705-2718 - Chengkun Wei

, Qinchen Gu
, Shouling Ji
, Wenzhi Chen
, Zonghui Wang, Raheem Beyah
:
OB-WSPES: A Uniform Evaluation System for Obfuscation-Based Web Search Privacy. 2719-2735 - Tong Qiao

, Xiangyang Luo
, Ting Wu, Ming Xu
, Zhenxing Qian
:
Adaptive Steganalysis Based on Statistical Model of Quantized DCT Coefficients for JPEG Images. 2736-2751 - Trupil Limbasiya

, Debasis Das
:
IoVCom: Reliable Comprehensive Communication System for Internet of Vehicles. 2752-2766 - Yisroel Mirsky

, Mordechai Guri
:
DDoS Attacks on 9-1-1 Emergency Services. 2767-2786 - Chunpeng Ge

, Willy Susilo
, Zhe Liu, Jinyue Xia
, Pawel Szalachowski
, Liming Fang
:
Secure Keyword Search and Data Sharing Mechanism for Cloud Computing. 2787-2800 - Nitish M. Uplavikar

, Bradley A. Malin
, Wei Jiang
:
Lucene-P$^2$2: A Distributed Platform for Privacy-Preserving Text-Based Search. 2801-2819 - Yulin Wu

, Xuan Wang
, Willy Susilo
, Guomin Yang
, Zoe Lin Jiang
, Qian Chen
, Peng Xu
:
Efficient Server-Aided Secure Two-Party Computation in Heterogeneous Mobile Cloud Computing. 2820-2834 - Jie Zhang

, Futai Zhang
, Xin Huang, Xin Liu
:
Leakage-Resilient Authenticated Key Exchange for Edge Artificial Intelligence. 2835-2847 - Lin Yao

, Yujie Zeng, Xin Wang
, Ailun Chen, Guowei Wu
:
Detection and Defense of Cache Pollution Based on Popularity Prediction in Named Data Networking. 2848-2860 - Benjamin Hong Meng Tan

, Hyung Tae Lee
, Huaxiong Wang
, Shu Qin Ren, Khin Mi Mi Aung
:
Efficient Private Comparison Queries Over Encrypted Databases Using Fully Homomorphic Encryption With Finite Fields. 2861-2874 - Kai Zhang

, Mi Wen
, Rongxing Lu
, Kefei Chen
:
Multi-Client Sub-Linear Boolean Keyword Searching for Encrypted Cloud Storage with Owner-Enforced Authorization. 2875-2887 - Vipin N. Sathi

, Manikantan Srinivasan
, Prabhu K. Thiruvasagam
, C. Siva Ram Murthy
:
Novel Protocols to Mitigate Network Slice Topology Learning Attacks and Protect Privacy of Users' Service Access Behavior in Softwarized 5G Networks. 2888-2906 - Balaji Arun

, Sebastiano Peluso, Roberto Palmieri
, Giuliano Losa, Binoy Ravindran
:
Taming the Contention in Consensus-Based Distributed Systems. 2907-2925 - Rajshekar Kalayappan

, Smruti R. Sarangi
:
A Formal Approach to Accountability in Heterogeneous Systems-on-Chip. 2926-2940 - Lingling Xu

, Xiaofeng Chen
, Fangguo Zhang
, Wanhua Li
, Hao-Tian Wu
, Shaohua Tang, Yang Xiang
:
ASBKS: Towards Attribute Set Based Keyword Search Over Encrypted Personal Health Records. 2941-2952 - Ping Wang

, Haichang Gao
, Qingxun Rao
, Sainan Luo, Zhongni Yuan
, Ziyu Shi
:
A Security Analysis of Captchas With Large Character Sets. 2953-2968 - Tong Li

, Jin Li
, Xiaofeng Chen
, Zheli Liu
, Wenjing Lou
, Y. Thomas Hou
:
NPMML: A Framework for Non-Interactive Privacy-Preserving Multi-Party Machine Learning. 2969-2982 - Minglai Shao

, Jianxin Li
, Qiben Yan
, Feng Chen
, Hongyi Huang
, Xunxun Chen
:
Structured Sparsity Model Based Trajectory Tracking Using Private Location Data Release. 2983-2995 - Yan Meng

, Haojin Zhu
, Jinlei Li
, Jin Li
, Yao Liu
:
Liveness Detection for Voice User Interface via Wireless Signals in IoT Environment. 2996-3011 - Sajeda Akter

, Sriram Chellappan
, Tusher Chakraborty
, Taslim Arefin Khan, Ashikur Rahman
, A. B. M. Alim Al Islam:
Man-in-the-Middle Attack on Contactless Payment over NFC Communications: Design, Implementation, Experiments and Detection. 3012-3023

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














