


default search action
IEEE Transactions on Dependable and Secure Computing, Volume 21
Volume 21, Number 1, January - February 2024
- Yi-Fan Li
, Yang Gao
, Gbadebo Ayoade, Latifur Khan
, Anoop Singhal
, Bhavani Thuraisingham:
Heterogeneous Domain Adaptation for Multistream Classification on Cyber Threat Data. 1-11 - Xugui Zhou
, Bulbul Ahmed, James H. Aylor, Philip Asare, Homa Alemzadeh
:
Hybrid Knowledge and Data Driven Synthesis of Runtime Monitors for Cyber-Physical Systems. 12-30 - Peng Cheng
, Yuexin Wu, Yuan Hong
, Zhongjie Ba
, Feng Lin
, Li Lu
, Kui Ren
:
UniAP: Protecting Speech Privacy With Non-Targeted Universal Adversarial Perturbations. 31-46 - Shlomi Dolev
, Bingyong Guo, Jianyu Niu
, Ziyu Wang
:
SodsBC: A Post-Quantum by Design Asynchronous Blockchain Framework. 47-62 - Lin Mei
, Chungen Xu
, Lei Xu
, Xingliang Yuan
, Joseph K. Liu
:
Practical Multi-Source Multi-Client Searchable Encryption With Forward Privacy: Refined Security Notion and New Constructions. 63-77 - Moslem Didehban
, Hwisoo So
, Prudhvi Gali, Aviral Shrivastava
, Kyoungwoo Lee
:
Generic Soft Error Data and Control Flow Error Detection by Instruction Duplication. 78-92 - Ziqin Liu, Zhenpeng Lin, Yueqi Chen, Yuhang Wu, Yalong Zou, Dongliang Mu
, Xinyu Xing:
Towards Unveiling Exploitation Potential With Multiple Error Behaviors for Kernel Bugs. 93-109 - Gao Liu, Zheng Yan
, Dongliang Wang, Haiguang Wang, Tieyan Li
:
DePTVM: Decentralized Pseudonym and Trust Value Management for Integrated Networks. 110-124 - Ruixuan Li
, Zhenyong Zhang, Jun Shao
, Rongxing Lu
, Xiaoqi Jia, Guiyi Wei
:
The Potential Harm of Email Delivery: Investigating the HTTPS Configurations of Webmail Services. 125-138 - Tianyu Yang
, Hanzhou Wu
, Biao Yi
, Guorui Feng
, Xinpeng Zhang
:
Semantic-Preserving Linguistic Steganography by Pivot Translation and Semantic-Aware Bins Coding. 139-152 - Haonan Yan
, Xiaoguang Li
, Wenjing Zhang
, Rui Wang, Hui Li, Xingwen Zhao, Fenghua Li, Xiaodong Lin
:
Automatic Evasion of Machine Learning-Based Network Intrusion Detection Systems. 153-167 - Yuwei Li
, Yuan Chen
, Shouling Ji
, Xuhong Zhang
, Guanglu Yan, Alex X. Liu, Chunming Wu
, Zulie Pan
, Peng Lin:
G-Fuzz: A Directed Fuzzing Framework for gVisor. 168-185 - Xabier Sáez de Cámara
, Jose Luis Flores
, Cristóbal Arellano
, Aitor Urbieta
, Urko Zurutuza
:
Gotham Testbed: A Reproducible IoT Testbed for Security Experiments and Dataset Generation. 186-203 - Hongyang Yan
, Anli Yan
, Li Hu
, Jiaming Liang, Haibo Hu
:
MTL-Leak: Privacy Risk Assessment in Multi-Task Learning. 204-215 - Kaushik Madala
, Hyunsook Do, Bastian Tenbergen
:
ADSA - Association-Driven Safety Analysis to Expose Unknown Safety Issues. 216-228 - Benyuan Yang
, Hesuan Hu
:
Delegation Security Analysis in Workflow Systems. 229-240 - Ke Huang
, Yi Mu
, Fatemeh Rezaeibagha
, Xiaosong Zhang
, Xiong Li
, Sheng Cao
:
Monero With Multi-Grained Redaction. 241-253 - Jie Wang
, Kun Sun
, Lingguang Lei
, Yuewu Wang
, Jiwu Jing
, Shengye Wan
, Qi Li
:
CacheIEE: Cache-Assisted Isolated Execution Environment on ARM Multi-Core Platforms. 254-269 - Liqiang Wu
, Shaojing Fu
, Yuchuan Luo
, Hongyang Yan
, Heyuan Shi
, Ming Xu:
A Robust and Lightweight Privacy-Preserving Data Aggregation Scheme for Smart Grid. 270-283 - Alberto Huertas Celdrán
, Pedro Miguel Sánchez Sánchez
, Gérôme Bovet
, Gregorio Martínez Pérez
, Burkhard Stiller
:
CyberSpec: Behavioral Fingerprinting for Intelligent Attacks Detection on Crowdsensing Spectrum Sensors. 284-297 - Urvashi Bansal
, Geeta Sikka
, Lalit Kumar Awasthi
, Bharat K. Bhargava
:
Quantitative Evaluation of Extensive Vulnerability Set Using Cost Benefit Analysis. 298-308 - Hongliang Liang
, Xiangyu Li, Da Xiao
, Jie Liu, Yanjie Zhou, Aibo Wang, Jin Li:
Generative Pre-Trained Transformer-Based Reinforcement Learning for Testing Web Application Firewalls. 309-324 - Hongliang Liang
, Xinglin Yu
, Xianglin Cheng, Jie Liu, Jin Li:
Multiple Targets Directed Greybox Fuzzing. 325-339 - Sheng Li
, Zichi Wang
, Xiudong Zhang, Xinpeng Zhang
:
Robust Image Steganography Against General Downsampling Operations With Lossless Secret Recovery. 340-352 - Cheng Huang
, Dongxiao Liu
, Anjia Yang
, Rongxing Lu
, Xuemin Shen
:
Multi-Client Secure and Efficient DPF-Based Keyword Search for Cloud Storage. 353-371 - Yijie Shen
, Feng Lin
, Chao Wang
, Tiantian Liu
, Zhongjie Ba
, Li Lu
, Wenyao Xu
, Kui Ren
:
MotoPrint: Reconfigurable Vibration Motor Fingerprint via Homologous Signals Learning. 372-387 - Jianping Cai
, Ximeng Liu
, Jiayin Li
, Kim-Kwang Raymond Choo
:
Differentially Private Non-Negative Consistent Release for Large-Scale Hierarchical Trees. 388-402 - Ziyue Pan
, Wenbo Shen
, Xingkai Wang, Yutian Yang
, Rui Chang
, Yao Liu
, Chengwei Liu
, Yang Liu
, Kui Ren
:
Ambush From All Sides: Understanding Security Threats in Open-Source Software CI/CD Pipelines. 403-418 - Meng Luo
, Bo Feng
, Long Lu, Engin Kirda, Kui Ren
:
On the Complexity of the Web's PKI: Evaluating Certificate Validation of Mobile Browsers. 419-433 - Roberto De Prisco
, Alfredo De Santis
, Francesco Palmieri
:
Bounds and Protocols for Graph-Based Distributed Secret Sharing. 434-448 - Jianwei Liu
, Yinghui He
, Chaowei Xiao
, Jinsong Han
, Kui Ren
:
Time to Think the Security of WiFi-Based Behavior Recognition Systems. 449-462 - Runnan Zhang
, Gang Liu
, Hongzhaoning Kang
, Quan Wang
, Bo Wan
, Nan Luo
:
Anonymity in Attribute-Based Access Control: Framework and Metric. 463-475 - Yi Zhang
, Xiaofeng Jia
, Bianjing Pan
, Jun Shao
, Liming Fang
, Rongxing Lu
, Guiyi Wei
:
Anonymous Multi-Hop Payment for Payment Channel Networks. 476-485 - Alireza Sarmadi
, Hao Fu
, Prashanth Krishnamurthy
, Siddharth Garg
, Farshad Khorrami
:
Privacy-Preserving Collaborative Learning Through Feature Extraction. 486-498 - Fucai Luo
, Haiyan Wang
, Xingfu Yan
:
Comments on "VERSA: Verifiable Secure Aggregation for Cross-Device Federated Learning". 499-500
Volume 21, Number 2, March - April 2024
- Jianwei Liu
, Xiang Zou
, Leqi Zhao
, Yusheng Tao, Sideng Hu
, Jinsong Han
, Kui Ren:
Privacy Leakage in Wireless Charging. 501-514 - Yinxing Xue
, Jiaming Ye
, Wei Zhang, Jun Sun
, Lei Ma, Haijun Wang, Jianjun Zhao
:
xFuzz: Machine Learning Guided Cross-Contract Fuzzing. 515-529 - Qian Li
, Chao Shen
, Qingyuan Hu, Chenhao Lin
, Xiang Ji, Saiyu Qi
:
Towards Gradient-Based Saliency Consensus Training for Adversarial Robustness. 530-541 - Xiao Cheng
, Xu Nie
, Ningke Li
, Haoyu Wang, Zheng Zheng
, Yulei Sui:
How About Bug-Triggering Paths? - Understanding and Characterizing Learning-Based Vulnerability Detectors. 542-558 - Wenbo Jiang
, Tianwei Zhang
, Han Qiu
, Hongwei Li
, Guowen Xu
:
Incremental Learning, Incremental Backdoor Threats. 559-572 - Pedro Miguel Sánchez Sánchez
, Alberto Huertas Celdrán
, Timo Schenk, Adrian Lars Benjamin Iten, Gérôme Bovet
, Gregorio Martínez Pérez
, Burkhard Stiller
:
Studying the Robustness of Anti-Adversarial Federated Learning Models Detecting Cyberattacks in IoT Spectrum Sensors. 573-584 - Qun Song
, Rui Tan
, Chao Ren
, Yan Xu
, Yang Lou
, Jianping Wang
, Hoay Beng Gooi
:
On Credibility of Adversarial Examples Against Learning-Based Grid Voltage Stability Assessment. 585-599 - Ge Ren
, Jun Wu
, Gaolei Li
, Shenghong Li
, Mohsen Guizani
:
Protecting Intellectual Property With Reliable Availability of Learning Models in AI-Based Cybersecurity Services. 600-617 - Prithwiraj Roy, Shameek Bhattacharjee
, Sahar Abedzadeh
, Sajal K. Das
:
Noise Resilient Learning for Attack Detection in Smart Grid PMU Infrastructure. 618-635 - Han Fang
, Yupeng Qiu
, Guorui Qin, Jiyi Zhang, Kejiang Chen
, Weiming Zhang
, Ee-Chien Chang
:
DP2Dataset Protection by Data Poisoning. 636-649 - Ping Wang
, Haichang Gao
, Xiaoyan Guo
, Zhongni Yuan
, Jiawei Nian
:
Improving the Security of Audio CAPTCHAs With Adversarial Examples. 650-667 - Wenhan Xu
, Hui Ma
, Zishuai Song
, Jianhao Li
, Rui Zhang
:
Gringotts: An Encrypted Version Control System With Less Trust on Servers. 668-684 - Wenbo Jiang
, Hongwei Li
, Guowen Xu
, Tianwei Zhang
, Rongxing Lu
:
A Comprehensive Defense Framework Against Model Extraction Attacks. 685-700 - Shahid Khan
, Joost-Pieter Katoen
, Marc Bouissou
:
A Compositional Semantics of Boolean-Logic Driven Markov Processes. 701-716 - Di Zhang
, Junqing Le
, Xinyu Lei
, Tao Xiang
, Xiaofeng Liao
:
Secure Redactable Blockchain With Dynamic Support. 717-731 - Insup Lee
, Wonjun Lee
:
UniQGAN: Towards Improved Modulation Classification With Adversarial Robustness Using Scalable Generator Design. 732-745 - Cheng Guo
, Wenfeng Li
, Xinyu Tang
, Kim-Kwang Raymond Choo
, Yining Liu
:
Forward Private Verifiable Dynamic Searchable Symmetric Encryption With Efficient Conjunctive Query. 746-763 - Linqing Gui
, Weihao Zhou
, Pinchang Zhang
, Fu Xiao
:
Cooperative Jamming-Aided Secure Communication in Wireless Powered Sensor Networks. 764-774 - Zijian Zhang
, Xuyang Liu
, Meng Li
, Hao Yin
, Liehuang Zhu
, Bakh Khoussainov
, Keke Gai
:
HCA: Hashchain-Based Consensus Acceleration Via Re-Voting. 775-788 - Yifeng Zheng
, Menglun Zhou
, Songlei Wang
, Hejiao Huang
, Xiaohua Jia
, Xun Yi
, Cong Wang
:
SecDR: Enabling Secure, Efficient, and Accurate Data Recovery for Mobile Crowdsensing. 789-803 - Roberto Pietrantuono
, Massimo Ficco
, Francesco Palmieri
:
Testing the Resilience of MEC-Based IoT Applications Against Resource Exhaustion Attacks. 804-818 - Jayson Sia
, Edmond A. Jonckheere
, Laith Shalalfeh
, Paul Bogdan
:
Phasor Measurement Unit Change-Point Detection of Frequency Hurst Exponent Anomaly With Time-to-Event. 819-827 - Cavit Özbay
, Albert Levi
:
Blacklisting Based Anonymous Authentication Scheme for Sharing Economy. 828-846 - Xiao Han
, Yuncong Yang
, Leye Wang
, Junjie Wu
:
Privacy-Preserving Network Embedding Against Private Link Inference Attacks. 847-859 - Dan Zhu
, Hui Zhu
, Cheng Huang
, Rongxing Lu
, Dengguo Feng, Xuemin Shen
:
Efficient and Accurate Cloud-Assisted Medical Pre-Diagnosis With Privacy Preservation. 860-875 - Jungang Yang
, Liyao Xiang
, Pengzhi Chu
, Xinbing Wang
, Chenghu Zhou
:
Certified Distributional Robustness on Smoothed Classifiers. 876-888 - Caiqin Dong
, Jian Weng
, Ming Li
, Jia-Nan Liu
, Zhiquan Liu
, Yudan Cheng
, Shui Yu
:
Privacy-Preserving and Byzantine-Robust Federated Learning. 889-904 - Yongzhong He
, Yiming Wang
, Sencun Zhu
, Wei Wang
, Yunjia Zhang, Qiang Li
, Aimin Yu
:
Automatically Identifying CVE Affected Versions With Patches and Developer Logs. 905-919 - Deqiang Li
, Shicheng Cui
, Yun Li
, Jia Xu
, Fu Xiao
, Shouhuai Xu
:
PAD: Towards Principled Adversarial Malware Detection Against Evasion Attacks. 920-936 - Chunpeng Ge
, Zhe Liu
, Willy Susilo
, Liming Fang
, Hao Wang
:
Attribute-Based Encryption With Reliable Outsourced Decryption in Cloud Computing Using Smart Contract. 937-948 - Chunpeng Ge
, Willy Susilo
, Zhe Liu
, Joonsang Baek
, Xiapu Luo
, Liming Fang
:
Attribute-Based Proxy Re-Encryption With Direct Revocation Mechanism for Data Sharing in Clouds. 949-960 - Yaxi Yang
, Jian Weng
, Yao Tong
, Jia-Nan Liu
, Zhenghao Wu
, Leo Yu Zhang
, Anjia Yang
:
PriGenX: Privacy-Preserving Query With Anonymous Access Control for Genomic Data. 961-974 - Renato Ferrero
, Bartolomeo Montrucchio
:
Banknote Identification Through Unique Fluorescent Properties. 975-986 - Emanuele Maiorana
, Chiara Romano
, Emiliano Schena
, Carlo Massaroni
:
BIOWISH: Biometric Recognition Using Wearable Inertial Sensors Detecting Heart Activity. 987-1000
Volume 21, Number 3, May - June 2024
- Xiaochen Li
, Weiran Liu
, Hanwen Feng
, Kunzhe Huang
, Yuke Hu
, Jinfei Liu
, Kui Ren
, Zhan Qin
:
Privacy Enhancement Via Dummy Points in the Shuffle Model. 1001-1016 - Ritam Ganguly
, Shokufeh Kazemloo
, Borzoo Bonakdarpour
:
Crash-Resilient Decentralized Synchronous Runtime Verification. 1017-1031 - Xiaokuan Zhang
, Yang Zhang
, Yinqian Zhang
:
VeriTrain: Validating MLaaS Training Efforts via Anomaly Detection. 1032-1049 - Zikang Ding
, Daojing He
, Qi Qiao
, Xuru Li
, Yun Gao
, Sammy Chan
, Kim-Kwang Raymond Choo
:
A Lightweight and Secure Communication Protocol for the IoT Environment. 1050-1067 - Yunlong Xing
, Xinda Wang
, Sadegh Torabi
, Zeyu Zhang, Lingguang Lei
, Kun Sun
:
A Hybrid System Call Profiling Approach for Container Protection. 1068-1083 - Eric D. Vugrin
, Seth Hanson
, Jerry Cruz
, Casey Glatter
, Thomas D. Tarman
, Ali Pinar
:
Experimental Validation of a Command and Control Traffic Detection Model. 1084-1097 - Jian Zheng
, Huawei Huang
, Zibin Zheng
, Song Guo
:
Adaptive Double-Spending Attacks on PoW-Based Blockchains. 1098-1110 - Chunyang Lv
, Jianfeng Wang
, Shifeng Sun
, Yunling Wang
, Saiyu Qi
, Xiaofeng Chen
:
Towards Practical Multi-Client Order-Revealing Encryption: Improvement and Application. 1111-1126 - Sudip Vhaduri
, William Cheung, Sayanton V. Dibbo
:
Bag of On-Phone ANNs to Secure IoT Objects Using Wearable and Smartphone Biometrics. 1127-1138 - Yuchen Wang
, Xiaoguang Li
, Li Yang
, Jianfeng Ma
, Hui Li
:
ADDITION: Detecting Adversarial Examples With Image-Dependent Noise Reduction. 1139-1154 - Hua Ma
, Huming Qiu
, Yansong Gao
, Zhi Zhang
, Alsharif Abuadbba
, Minhui Xue
, Anmin Fu
, Jiliang Zhang
, Said F. Al-Sarawi
, Derek Abbott
:
Quantization Backdoors to Deep Learning Commercial Frameworks. 1155-1172 - Omais Shafi Pandith
:
SGXFault: An Efficient Page Fault Handling Mechanism for SGX Enclaves. 1173-1178 - Teng Li
, Ximeng Liu
, Wei Qiao
, Xiongjie Zhu
, Yulong Shen
, Jianfeng Ma
:
T-Trace: Constructing the APTs Provenance Graphs Through Multiple Syslogs Correlation. 1179-1195 - Kang Wei
, Jun Li, Ming Ding
, Chuan Ma
, Yo-Seb Jeon
, H. Vincent Poor
:
Covert Model Poisoning Against Federated Learning: Algorithm Design and Optimization. 1196-1209 - Shuaishuai Tan
, Shui Yu
, Wenyin Liu
, Daojing He
, Sammy Chan
:
You Can Glimpse but You Cannot Identify: Protect IoT Devices From Being Fingerprinted. 1210-1223 - Younho Lee
, Jinyeong Seo
, Yujin Nam
, Jiseok Chae
, Jung Hee Cheon
:
HEaaN-STAT: A Privacy-Preserving Statistical Analysis Toolkit for Large-Scale Numerical, Ordinal, and Categorical Data. 1224-1241 - Jianhong Zhang
, Chenghe Dong
:
On the Security of Lightweight and Escrow-Free Certificate-Based Data Aggregation for Smart Grid. 1242-1243 - Nikhil Tripathi
:
Delays Have Dangerous Ends: Slow HTTP/2 DoS Attacks Into the Wild and Their Real-Time Detection Using Event Sequence Analysis. 1244-1256 - Uwe Zdun
, Pierre-Jean Queval
, Georg Simhandl
, Riccardo Scandariato
, Somik Chakravarty
, Marjan Jelic
, Aleksandar S. Jovanovic
:
Detection Strategies for Microservice Security Tactics. 1257-1273 - Zhihua Tian
, Rui Zhang
, Xiaoyang Hou
, Lingjuan Lyu
, Tianyi Zhang
, Jian Liu
, Kui Ren
:
${\sf FederBoost}$: Private Federated Learning for GBDT. 1274-1285 - Xinrui Ge
, Jia Yu
, Rong Hao
:
Privacy-Preserving Graph Matching Query Supporting Quick Subgraph Extraction. 1286-1300 - Xingfu Yan
, Wing W. Y. Ng
, Bowen Zhao
, Yuxian Liu
, Ying Gao
, Xiumin Wang
:
Fog-Enabled Privacy-Preserving Multi-Task Data Aggregation for Mobile Crowdsensing. 1301-1316 - Conor Black
, Sandra Scott-Hayward
:
Defeating Data Plane Attacks With Program Obfuscation. 1317-1330 - Lichao Wu
, Yoo-Seung Won
, Dirmanto Jap
, Guilherme Perin
, Shivam Bhasin
, Stjepan Picek
:
Ablation Analysis for Multi-Device Deep Learning-Based Physical Side-Channel Analysis. 1331-1341 - Sevtap Duman
, Matthias Büchler
, Manuel Egele
, Engin Kirda
:
PellucidAttachment: Protecting Users From Attacks via E-Mail Attachments. 1342-1354 - Shantanu Sharma
, Yin Li
, Sharad Mehrotra
, Nisha Panwar
, Peeyush Gupta
, Dhrubajyoti Ghosh
:
Prism: Privacy-Preserving and Verifiable Set Computation Over Multi-Owner Secret Shared Outsourced Databases. 1355-1371 - Binbin Zhao
, Shouling Ji
, Jiacheng Xu
, Yuan Tian
, Qiuyang Wei
, Qinying Wang
, Chenyang Lyu
, Xuhong Zhang
, Changting Lin
, Jingzheng Wu
, Raheem Beyah
:
One Bad Apple Spoils the Barrel: Understanding the Security Risks Introduced by Third-Party Components in IoT Firmware. 1372-1389 - Enrico Bacis
, Sabrina De Capitani di Vimercati
, Sara Foresti
, Stefano Paraboschi
, Marco Rosa
, Pierangela Samarati
:
Mix&Slice for Efficient Access Revocation on Outsourced Data. 1390-1405 - Peng Jiang
, Jifan Xiao, Ding Li
, Hongyi Yu, Yu Bai
, Yao Guo
, Xiangqun Chen:
Detecting Malicious Websites From the Perspective of System Provenance Analysis. 1406-1423 - Tianpei Lu
, Bingsheng Zhang
, Kui Ren
:
PrivData Network: A Privacy-Preserving On-Chain Data Factory and Trading Market. 1424-1436 - Zipeng Ye
, Wenjian Luo
, Muhammad Luqman Naseem
, Xiangkai Yang, Yuhui Shi
, Yan Jia:
C2FMI: Corse-to-Fine Black-Box Model Inversion Attack. 1437-1450 - Shuai Zhou
, Tianqing Zhu
, Dayong Ye
, Xin Yu
, Wanlei Zhou
:
Boosting Model Inversion Attacks With Adversarial Examples. 1451-1468 - Heqing Huang
, Hung-Chun Chiu
, Qingkai Shi
, Peisen Yao
, Charles Zhang
:
Balance Seed Scheduling via Monte Carlo Planning. 1469-1483 - Guanxiong Ha
, Chunfu Jia
, Yixuan Huang
, Hang Chen
, Ruiqi Li
, Qiaowen Jia
:
Scalable and Popularity-Based Secure Deduplication Schemes With Fully Random Tags. 1484-1500
Volume 21, Number 4, July - August 2024
- Hui Cui
, Zhiguo Wan
, Rui Gao, Huaqun Wang
:
Outsourced Privately Verifiable Proofs of Retrievability via Blockchain. 1501-1514 - Zhao Zhang
, Chunxiang Xu
, Changsong Jiang
, Kefei Chen
:
TSAPP: Threshold Single-Sign-On Authentication Preserving Privacy. 1515-1527 - Hao Zhou
, Zhiheng Niu, Gang Wang
, Xiaoguang Liu
, Dongshi Liu
, Bingnan Kang, Zheng Hu, Yong Zhang:
Proactive Drive Failure Prediction for Cloud Storage System Through Semi-Supervised Learning. 1528-1543