


default search action
IEEE Transactions on Dependable and Secure Computing, Volume 21
Volume 21, Number 1, January - February 2024
- Yi-Fan Li

, Yang Gao
, Gbadebo Ayoade, Latifur Khan
, Anoop Singhal
, Bhavani Thuraisingham:
Heterogeneous Domain Adaptation for Multistream Classification on Cyber Threat Data. 1-11 - Xugui Zhou

, Bulbul Ahmed, James H. Aylor, Philip Asare, Homa Alemzadeh
:
Hybrid Knowledge and Data Driven Synthesis of Runtime Monitors for Cyber-Physical Systems. 12-30 - Peng Cheng

, Yuexin Wu, Yuan Hong
, Zhongjie Ba
, Feng Lin
, Li Lu
, Kui Ren
:
UniAP: Protecting Speech Privacy With Non-Targeted Universal Adversarial Perturbations. 31-46 - Shlomi Dolev

, Bingyong Guo, Jianyu Niu
, Ziyu Wang
:
SodsBC: A Post-Quantum by Design Asynchronous Blockchain Framework. 47-62 - Lin Mei

, Chungen Xu
, Lei Xu
, Xingliang Yuan
, Joseph K. Liu
:
Practical Multi-Source Multi-Client Searchable Encryption With Forward Privacy: Refined Security Notion and New Constructions. 63-77 - Moslem Didehban

, Hwisoo So
, Prudhvi Gali, Aviral Shrivastava
, Kyoungwoo Lee
:
Generic Soft Error Data and Control Flow Error Detection by Instruction Duplication. 78-92 - Ziqin Liu, Zhenpeng Lin, Yueqi Chen, Yuhang Wu, Yalong Zou, Dongliang Mu

, Xinyu Xing:
Towards Unveiling Exploitation Potential With Multiple Error Behaviors for Kernel Bugs. 93-109 - Gao Liu, Zheng Yan

, Dongliang Wang
, Haiguang Wang, Tieyan Li
:
DePTVM: Decentralized Pseudonym and Trust Value Management for Integrated Networks. 110-124 - Ruixuan Li

, Zhenyong Zhang, Jun Shao
, Rongxing Lu
, Xiaoqi Jia, Guiyi Wei
:
The Potential Harm of Email Delivery: Investigating the HTTPS Configurations of Webmail Services. 125-138 - Tianyu Yang

, Hanzhou Wu
, Biao Yi
, Guorui Feng
, Xinpeng Zhang
:
Semantic-Preserving Linguistic Steganography by Pivot Translation and Semantic-Aware Bins Coding. 139-152 - Haonan Yan

, Xiaoguang Li
, Wenjing Zhang
, Rui Wang, Hui Li, Xingwen Zhao, Fenghua Li, Xiaodong Lin
:
Automatic Evasion of Machine Learning-Based Network Intrusion Detection Systems. 153-167 - Yuwei Li

, Yuan Chen
, Shouling Ji
, Xuhong Zhang
, Guanglu Yan, Alex X. Liu, Chunming Wu
, Zulie Pan
, Peng Lin:
G-Fuzz: A Directed Fuzzing Framework for gVisor. 168-185 - Xabier Sáez de Cámara

, Jose Luis Flores
, Cristóbal Arellano
, Aitor Urbieta
, Urko Zurutuza
:
Gotham Testbed: A Reproducible IoT Testbed for Security Experiments and Dataset Generation. 186-203 - Hongyang Yan

, Anli Yan
, Li Hu
, Jiaming Liang, Haibo Hu
:
MTL-Leak: Privacy Risk Assessment in Multi-Task Learning. 204-215 - Kaushik Madala

, Hyunsook Do
, Bastian Tenbergen
:
ADSA - Association-Driven Safety Analysis to Expose Unknown Safety Issues. 216-228 - Benyuan Yang

, Hesuan Hu
:
Delegation Security Analysis in Workflow Systems. 229-240 - Ke Huang

, Yi Mu
, Fatemeh Rezaeibagha
, Xiaosong Zhang
, Xiong Li
, Sheng Cao
:
Monero With Multi-Grained Redaction. 241-253 - Jie Wang

, Kun Sun
, Lingguang Lei
, Yuewu Wang
, Jiwu Jing
, Shengye Wan
, Qi Li
:
CacheIEE: Cache-Assisted Isolated Execution Environment on ARM Multi-Core Platforms. 254-269 - Liqiang Wu

, Shaojing Fu
, Yuchuan Luo
, Hongyang Yan
, Heyuan Shi
, Ming Xu:
A Robust and Lightweight Privacy-Preserving Data Aggregation Scheme for Smart Grid. 270-283 - Alberto Huertas Celdrán

, Pedro Miguel Sánchez Sánchez
, Gérôme Bovet
, Gregorio Martínez Pérez
, Burkhard Stiller
:
CyberSpec: Behavioral Fingerprinting for Intelligent Attacks Detection on Crowdsensing Spectrum Sensors. 284-297 - Urvashi Bansal

, Geeta Sikka
, Lalit Kumar Awasthi
, Bharat K. Bhargava
:
Quantitative Evaluation of Extensive Vulnerability Set Using Cost Benefit Analysis. 298-308 - Hongliang Liang

, Xiangyu Li, Da Xiao
, Jie Liu, Yanjie Zhou, Aibo Wang, Jin Li:
Generative Pre-Trained Transformer-Based Reinforcement Learning for Testing Web Application Firewalls. 309-324 - Hongliang Liang

, Xinglin Yu
, Xianglin Cheng, Jie Liu, Jin Li:
Multiple Targets Directed Greybox Fuzzing. 325-339 - Sheng Li

, Zichi Wang
, Xiudong Zhang, Xinpeng Zhang
:
Robust Image Steganography Against General Downsampling Operations With Lossless Secret Recovery. 340-352 - Cheng Huang

, Dongxiao Liu
, Anjia Yang
, Rongxing Lu
, Xuemin Shen
:
Multi-Client Secure and Efficient DPF-Based Keyword Search for Cloud Storage. 353-371 - Yijie Shen

, Feng Lin
, Chao Wang
, Tiantian Liu
, Zhongjie Ba
, Li Lu
, Wenyao Xu
, Kui Ren
:
MotoPrint: Reconfigurable Vibration Motor Fingerprint via Homologous Signals Learning. 372-387 - Jianping Cai

, Ximeng Liu
, Jiayin Li
, Kim-Kwang Raymond Choo
:
Differentially Private Non-Negative Consistent Release for Large-Scale Hierarchical Trees. 388-402 - Ziyue Pan

, Wenbo Shen
, Xingkai Wang, Yutian Yang
, Rui Chang
, Yao Liu
, Chengwei Liu
, Yang Liu
, Kui Ren
:
Ambush From All Sides: Understanding Security Threats in Open-Source Software CI/CD Pipelines. 403-418 - Meng Luo

, Bo Feng
, Long Lu, Engin Kirda, Kui Ren
:
On the Complexity of the Web's PKI: Evaluating Certificate Validation of Mobile Browsers. 419-433 - Roberto De Prisco

, Alfredo De Santis
, Francesco Palmieri
:
Bounds and Protocols for Graph-Based Distributed Secret Sharing. 434-448 - Jianwei Liu

, Yinghui He
, Chaowei Xiao
, Jinsong Han
, Kui Ren
:
Time to Think the Security of WiFi-Based Behavior Recognition Systems. 449-462 - Runnan Zhang

, Gang Liu
, Hongzhaoning Kang
, Quan Wang
, Bo Wan
, Nan Luo
:
Anonymity in Attribute-Based Access Control: Framework and Metric. 463-475 - Yi Zhang

, Xiaofeng Jia
, Bianjing Pan
, Jun Shao
, Liming Fang
, Rongxing Lu
, Guiyi Wei
:
Anonymous Multi-Hop Payment for Payment Channel Networks. 476-485 - Alireza Sarmadi

, Hao Fu
, Prashanth Krishnamurthy
, Siddharth Garg
, Farshad Khorrami
:
Privacy-Preserving Collaborative Learning Through Feature Extraction. 486-498 - Fucai Luo

, Haiyan Wang
, Xingfu Yan
:
Comments on "VERSA: Verifiable Secure Aggregation for Cross-Device Federated Learning". 499-500
Volume 21, Number 2, March - April 2024
- Jianwei Liu

, Xiang Zou
, Leqi Zhao
, Yusheng Tao, Sideng Hu
, Jinsong Han
, Kui Ren:
Privacy Leakage in Wireless Charging. 501-514 - Yinxing Xue

, Jiaming Ye
, Wei Zhang, Jun Sun
, Lei Ma, Haijun Wang, Jianjun Zhao
:
xFuzz: Machine Learning Guided Cross-Contract Fuzzing. 515-529 - Qian Li

, Chao Shen
, Qingyuan Hu, Chenhao Lin
, Xiang Ji, Saiyu Qi
:
Towards Gradient-Based Saliency Consensus Training for Adversarial Robustness. 530-541 - Xiao Cheng

, Xu Nie
, Ningke Li
, Haoyu Wang, Zheng Zheng
, Yulei Sui:
How About Bug-Triggering Paths? - Understanding and Characterizing Learning-Based Vulnerability Detectors. 542-558 - Wenbo Jiang

, Tianwei Zhang
, Han Qiu
, Hongwei Li
, Guowen Xu
:
Incremental Learning, Incremental Backdoor Threats. 559-572 - Pedro Miguel Sánchez Sánchez

, Alberto Huertas Celdrán
, Timo Schenk, Adrian Lars Benjamin Iten, Gérôme Bovet
, Gregorio Martínez Pérez
, Burkhard Stiller
:
Studying the Robustness of Anti-Adversarial Federated Learning Models Detecting Cyberattacks in IoT Spectrum Sensors. 573-584 - Qun Song

, Rui Tan
, Chao Ren
, Yan Xu
, Yang Lou
, Jianping Wang
, Hoay Beng Gooi
:
On Credibility of Adversarial Examples Against Learning-Based Grid Voltage Stability Assessment. 585-599 - Ge Ren

, Jun Wu
, Gaolei Li
, Shenghong Li
, Mohsen Guizani
:
Protecting Intellectual Property With Reliable Availability of Learning Models in AI-Based Cybersecurity Services. 600-617 - Prithwiraj Roy, Shameek Bhattacharjee

, Sahar Abedzadeh
, Sajal K. Das
:
Noise Resilient Learning for Attack Detection in Smart Grid PMU Infrastructure. 618-635 - Han Fang

, Yupeng Qiu
, Guorui Qin, Jiyi Zhang, Kejiang Chen
, Weiming Zhang
, Ee-Chien Chang
:
DP2Dataset Protection by Data Poisoning. 636-649 - Ping Wang

, Haichang Gao
, Xiaoyan Guo
, Zhongni Yuan
, Jiawei Nian
:
Improving the Security of Audio CAPTCHAs With Adversarial Examples. 650-667 - Wenhan Xu

, Hui Ma
, Zishuai Song
, Jianhao Li
, Rui Zhang
:
Gringotts: An Encrypted Version Control System With Less Trust on Servers. 668-684 - Wenbo Jiang

, Hongwei Li
, Guowen Xu
, Tianwei Zhang
, Rongxing Lu
:
A Comprehensive Defense Framework Against Model Extraction Attacks. 685-700 - Shahid Khan

, Joost-Pieter Katoen
, Marc Bouissou
:
A Compositional Semantics of Boolean-Logic Driven Markov Processes. 701-716 - Di Zhang

, Junqing Le
, Xinyu Lei
, Tao Xiang
, Xiaofeng Liao
:
Secure Redactable Blockchain With Dynamic Support. 717-731 - Insup Lee

, Wonjun Lee
:
UniQGAN: Towards Improved Modulation Classification With Adversarial Robustness Using Scalable Generator Design. 732-745 - Cheng Guo

, Wenfeng Li
, Xinyu Tang
, Kim-Kwang Raymond Choo
, Yining Liu
:
Forward Private Verifiable Dynamic Searchable Symmetric Encryption With Efficient Conjunctive Query. 746-763 - Linqing Gui

, Weihao Zhou
, Pinchang Zhang
, Fu Xiao
:
Cooperative Jamming-Aided Secure Communication in Wireless Powered Sensor Networks. 764-774 - Zijian Zhang

, Xuyang Liu
, Meng Li
, Hao Yin
, Liehuang Zhu
, Bakh Khoussainov
, Keke Gai
:
HCA: Hashchain-Based Consensus Acceleration Via Re-Voting. 775-788 - Yifeng Zheng

, Menglun Zhou
, Songlei Wang
, Hejiao Huang
, Xiaohua Jia
, Xun Yi
, Cong Wang
:
SecDR: Enabling Secure, Efficient, and Accurate Data Recovery for Mobile Crowdsensing. 789-803 - Roberto Pietrantuono

, Massimo Ficco
, Francesco Palmieri
:
Testing the Resilience of MEC-Based IoT Applications Against Resource Exhaustion Attacks. 804-818 - Jayson Sia

, Edmond A. Jonckheere
, Laith Shalalfeh
, Paul Bogdan
:
Phasor Measurement Unit Change-Point Detection of Frequency Hurst Exponent Anomaly With Time-to-Event. 819-827 - Cavit Özbay

, Albert Levi
:
Blacklisting Based Anonymous Authentication Scheme for Sharing Economy. 828-846 - Xiao Han

, Yuncong Yang
, Leye Wang
, Junjie Wu
:
Privacy-Preserving Network Embedding Against Private Link Inference Attacks. 847-859 - Dan Zhu

, Hui Zhu
, Cheng Huang
, Rongxing Lu
, Dengguo Feng, Xuemin Shen
:
Efficient and Accurate Cloud-Assisted Medical Pre-Diagnosis With Privacy Preservation. 860-875 - Jungang Yang

, Liyao Xiang
, Pengzhi Chu
, Xinbing Wang
, Chenghu Zhou
:
Certified Distributional Robustness on Smoothed Classifiers. 876-888 - Caiqin Dong

, Jian Weng
, Ming Li
, Jia-Nan Liu
, Zhiquan Liu
, Yudan Cheng
, Shui Yu
:
Privacy-Preserving and Byzantine-Robust Federated Learning. 889-904 - Yongzhong He

, Yiming Wang
, Sencun Zhu
, Wei Wang
, Yunjia Zhang, Qiang Li
, Aimin Yu
:
Automatically Identifying CVE Affected Versions With Patches and Developer Logs. 905-919 - Deqiang Li

, Shicheng Cui
, Yun Li
, Jia Xu
, Fu Xiao
, Shouhuai Xu
:
PAD: Towards Principled Adversarial Malware Detection Against Evasion Attacks. 920-936 - Chunpeng Ge

, Zhe Liu
, Willy Susilo
, Liming Fang
, Hao Wang
:
Attribute-Based Encryption With Reliable Outsourced Decryption in Cloud Computing Using Smart Contract. 937-948 - Chunpeng Ge

, Willy Susilo
, Zhe Liu
, Joonsang Baek
, Xiapu Luo
, Liming Fang
:
Attribute-Based Proxy Re-Encryption With Direct Revocation Mechanism for Data Sharing in Clouds. 949-960 - Yaxi Yang

, Jian Weng
, Yao Tong
, Jia-Nan Liu
, Zhenghao Wu
, Leo Yu Zhang
, Anjia Yang
:
PriGenX: Privacy-Preserving Query With Anonymous Access Control for Genomic Data. 961-974 - Renato Ferrero

, Bartolomeo Montrucchio
:
Banknote Identification Through Unique Fluorescent Properties. 975-986 - Emanuele Maiorana

, Chiara Romano
, Emiliano Schena
, Carlo Massaroni
:
BIOWISH: Biometric Recognition Using Wearable Inertial Sensors Detecting Heart Activity. 987-1000
Volume 21, Number 3, May - June 2024
- Xiaochen Li

, Weiran Liu
, Hanwen Feng
, Kunzhe Huang
, Yuke Hu
, Jinfei Liu
, Kui Ren
, Zhan Qin
:
Privacy Enhancement Via Dummy Points in the Shuffle Model. 1001-1016 - Ritam Ganguly

, Shokufeh Kazemloo
, Borzoo Bonakdarpour
:
Crash-Resilient Decentralized Synchronous Runtime Verification. 1017-1031 - Xiaokuan Zhang

, Yang Zhang
, Yinqian Zhang
:
VeriTrain: Validating MLaaS Training Efforts via Anomaly Detection. 1032-1049 - Zikang Ding

, Daojing He
, Qi Qiao
, Xuru Li
, Yun Gao
, Sammy Chan
, Kim-Kwang Raymond Choo
:
A Lightweight and Secure Communication Protocol for the IoT Environment. 1050-1067 - Yunlong Xing

, Xinda Wang
, Sadegh Torabi
, Zeyu Zhang, Lingguang Lei
, Kun Sun
:
A Hybrid System Call Profiling Approach for Container Protection. 1068-1083 - Eric D. Vugrin

, Seth Hanson
, Jerry Cruz
, Casey Glatter
, Thomas D. Tarman
, Ali Pinar
:
Experimental Validation of a Command and Control Traffic Detection Model. 1084-1097 - Jian Zheng

, Huawei Huang
, Zibin Zheng
, Song Guo
:
Adaptive Double-Spending Attacks on PoW-Based Blockchains. 1098-1110 - Chunyang Lv

, Jianfeng Wang
, Shifeng Sun
, Yunling Wang
, Saiyu Qi
, Xiaofeng Chen
:
Towards Practical Multi-Client Order-Revealing Encryption: Improvement and Application. 1111-1126 - Sudip Vhaduri

, William Cheung, Sayanton V. Dibbo
:
Bag of On-Phone ANNs to Secure IoT Objects Using Wearable and Smartphone Biometrics. 1127-1138 - Yuchen Wang

, Xiaoguang Li
, Li Yang
, Jianfeng Ma
, Hui Li
:
ADDITION: Detecting Adversarial Examples With Image-Dependent Noise Reduction. 1139-1154 - Hua Ma

, Huming Qiu
, Yansong Gao
, Zhi Zhang
, Alsharif Abuadbba
, Minhui Xue
, Anmin Fu
, Jiliang Zhang
, Said F. Al-Sarawi
, Derek Abbott
:
Quantization Backdoors to Deep Learning Commercial Frameworks. 1155-1172 - Omais Shafi Pandith

:
SGXFault: An Efficient Page Fault Handling Mechanism for SGX Enclaves. 1173-1178 - Teng Li

, Ximeng Liu
, Wei Qiao
, Xiongjie Zhu
, Yulong Shen
, Jianfeng Ma
:
T-Trace: Constructing the APTs Provenance Graphs Through Multiple Syslogs Correlation. 1179-1195 - Kang Wei

, Jun Li
, Ming Ding
, Chuan Ma
, Yo-Seb Jeon
, H. Vincent Poor
:
Covert Model Poisoning Against Federated Learning: Algorithm Design and Optimization. 1196-1209 - Shuaishuai Tan

, Shui Yu
, Wenyin Liu
, Daojing He
, Sammy Chan
:
You Can Glimpse but You Cannot Identify: Protect IoT Devices From Being Fingerprinted. 1210-1223 - Younho Lee

, Jinyeong Seo
, Yujin Nam
, Jiseok Chae
, Jung Hee Cheon
:
HEaaN-STAT: A Privacy-Preserving Statistical Analysis Toolkit for Large-Scale Numerical, Ordinal, and Categorical Data. 1224-1241 - Jianhong Zhang

, Chenghe Dong
:
On the Security of Lightweight and Escrow-Free Certificate-Based Data Aggregation for Smart Grid. 1242-1243 - Nikhil Tripathi

:
Delays Have Dangerous Ends: Slow HTTP/2 DoS Attacks Into the Wild and Their Real-Time Detection Using Event Sequence Analysis. 1244-1256 - Uwe Zdun

, Pierre-Jean Queval
, Georg Simhandl
, Riccardo Scandariato
, Somik Chakravarty
, Marjan Jelic
, Aleksandar S. Jovanovic
:
Detection Strategies for Microservice Security Tactics. 1257-1273 - Zhihua Tian

, Rui Zhang
, Xiaoyang Hou
, Lingjuan Lyu
, Tianyi Zhang
, Jian Liu
, Kui Ren
:
${\sf FederBoost}$: Private Federated Learning for GBDT. 1274-1285 - Xinrui Ge

, Jia Yu
, Rong Hao
:
Privacy-Preserving Graph Matching Query Supporting Quick Subgraph Extraction. 1286-1300 - Xingfu Yan

, Wing W. Y. Ng
, Bowen Zhao
, Yuxian Liu
, Ying Gao
, Xiumin Wang
:
Fog-Enabled Privacy-Preserving Multi-Task Data Aggregation for Mobile Crowdsensing. 1301-1316 - Conor Black

, Sandra Scott-Hayward
:
Defeating Data Plane Attacks With Program Obfuscation. 1317-1330 - Lichao Wu

, Yoo-Seung Won
, Dirmanto Jap
, Guilherme Perin
, Shivam Bhasin
, Stjepan Picek
:
Ablation Analysis for Multi-Device Deep Learning-Based Physical Side-Channel Analysis. 1331-1341 - Sevtap Duman

, Matthias Büchler
, Manuel Egele
, Engin Kirda
:
PellucidAttachment: Protecting Users From Attacks via E-Mail Attachments. 1342-1354 - Shantanu Sharma

, Yin Li
, Sharad Mehrotra
, Nisha Panwar
, Peeyush Gupta
, Dhrubajyoti Ghosh
:
Prism: Privacy-Preserving and Verifiable Set Computation Over Multi-Owner Secret Shared Outsourced Databases. 1355-1371 - Binbin Zhao

, Shouling Ji
, Jiacheng Xu
, Yuan Tian
, Qiuyang Wei
, Qinying Wang
, Chenyang Lyu
, Xuhong Zhang
, Changting Lin
, Jingzheng Wu
, Raheem Beyah
:
One Bad Apple Spoils the Barrel: Understanding the Security Risks Introduced by Third-Party Components in IoT Firmware. 1372-1389 - Enrico Bacis

, Sabrina De Capitani di Vimercati
, Sara Foresti
, Stefano Paraboschi
, Marco Rosa
, Pierangela Samarati
:
Mix&Slice for Efficient Access Revocation on Outsourced Data. 1390-1405 - Peng Jiang

, Jifan Xiao, Ding Li
, Hongyi Yu, Yu Bai
, Yao Guo
, Xiangqun Chen:
Detecting Malicious Websites From the Perspective of System Provenance Analysis. 1406-1423 - Tianpei Lu

, Bingsheng Zhang
, Kui Ren
:
PrivData Network: A Privacy-Preserving On-Chain Data Factory and Trading Market. 1424-1436 - Zipeng Ye

, Wenjian Luo
, Muhammad Luqman Naseem
, Xiangkai Yang, Yuhui Shi
, Yan Jia:
C2FMI: Corse-to-Fine Black-Box Model Inversion Attack. 1437-1450 - Shuai Zhou

, Tianqing Zhu
, Dayong Ye
, Xin Yu
, Wanlei Zhou
:
Boosting Model Inversion Attacks With Adversarial Examples. 1451-1468 - Heqing Huang

, Hung-Chun Chiu
, Qingkai Shi
, Peisen Yao
, Charles Zhang
:
Balance Seed Scheduling via Monte Carlo Planning. 1469-1483 - Guanxiong Ha

, Chunfu Jia
, Yixuan Huang
, Hang Chen
, Ruiqi Li
, Qiaowen Jia
:
Scalable and Popularity-Based Secure Deduplication Schemes With Fully Random Tags. 1484-1500
Volume 21, Number 4, July - August 2024
- Hui Cui

, Zhiguo Wan
, Rui Gao, Huaqun Wang
:
Outsourced Privately Verifiable Proofs of Retrievability via Blockchain. 1501-1514 - Zhao Zhang

, Chunxiang Xu
, Changsong Jiang
, Kefei Chen
:
TSAPP: Threshold Single-Sign-On Authentication Preserving Privacy. 1515-1527 - Hao Zhou

, Zhiheng Niu, Gang Wang
, Xiaoguang Liu
, Dongshi Liu
, Bingnan Kang, Zheng Hu, Yong Zhang:
Proactive Drive Failure Prediction for Cloud Storage System Through Semi-Supervised Learning. 1528-1543 - Yiwei Zhang

, Siqi Ma
, Tiancheng Chen, Juanru Li
, Robert H. Deng
, Elisa Bertino
:
EvilScreen Attack: Smart TV Hijacking via Multi-Channel Remote Control Mimicry. 1544-1556 - Fengyong Li

, Zongliang Yu
, Kui Wu
, Chuan Qin
, Xinpeng Zhang
:
Multi-Modality Ensemble Distortion for Spatial Steganography With Dynamic Cost Correction. 1557-1571 - Zhibo Wang

, Wenxin Liu
, Jiahui Hu
, Hengchang Guo
, Zhan Qin
, Jian Liu
, Kui Ren
:
Label-Free Poisoning Attack Against Deep Unsupervised Domain Adaptation. 1572-1586 - Fengqun Wang

, Jie Cui
, Qingyang Zhang
, Debiao He
, Chengjie Gu
, Hong Zhong
:
Blockchain-Based Lightweight Message Authentication for Edge-Assisted Cross-Domain Industrial Internet of Things. 1587-1604 - Xueluan Gong

, Yanjiao Chen
, Huayang Huang
, Weihan Kong
, Ziyao Wang, Chao Shen
, Qian Wang
:
KerbNet: A QoE-Aware Kernel-Based Backdoor Attack Framework. 1605-1620 - Yang Yang

, Wenyi Xue
, Yonghua Zhan
, Minming Huang
, Yingjiu Li
, Robert H. Deng
:
AnoPay: Anonymous Payment for Vehicle Parking With Updatable Credential. 1621-1638 - Mingfeng Huang

, Zhetao Li
, Fu Xiao
, Saiqin Long
, Anfeng Liu
:
Trust Mechanism-Based Multi-Tier Computing System for Service-Oriented Edge-Cloud Networks. 1639-1651 - Kun-Chang Li

, Run-Hua Shi
, Wan-Peng Guo
, Pengbo Wang
, Bo-Shen Shao
:
Dynamic Range Query Privacy-Preserving Scheme for Blockchain-Enhanced Smart Grid Based on Lattice. 1652-1664 - Alfredo De Santis

, Anna Lisa Ferrara
, Manuela Flores
, Barbara Masucci
:
Provably-Secure One-Message Unilateral Entity Authentication Schemes. 1665-1679 - Jinguang Han

, Liqun Chen, Aiqun Hu, Liquan Chen, Jiguo Li:
Privacy-Preserving Decentralized Functional Encryption for Inner Product. 1680-1694 - Dorjan Hitaj

, Giulio Pagnotta
, Briland Hitaj
, Fernando Pérez-Cruz
, Luigi V. Mancini
:
FedComm: Federated Learning as a Medium for Covert Communication. 1695-1707 - Guowen Xu

, Xingshuo Han
, Tianwei Zhang
, Shengmin Xu
, Jianting Ning
, Xinyi Huang
, Hongwei Li
, Robert H. Deng
:
SIMC 2.0: Improved Secure ML Inference Against Malicious Clients. 1708-1723 - Jia-Ju Bai

, Zi-Xuan Fu
, Kai-Tao Xie
, Zu-Ming Jiang
:
Testing Error Handling Code With Software Fault Injection and Error-Coverage-Guided Fuzzing. 1724-1739 - Meng Shen

, Changyue Li
, Hao Yu
, Qi Li
, Liehuang Zhu
, Ke Xu
:
Decision-Based Query Efficient Adversarial Attack via Adaptive Boundary Learning. 1740-1753 - Ke Li

, Cameron Baird
, Dan Lin
:
Defend Data Poisoning Attacks on Voice Authentication. 1754-1769 - Kuo-Chun Lin

, Yen-Ming Chen
:
A High-security-level Iris Cryptosystem Based on Fuzzy Commitment and Soft Reliability Extraction. 1770-1784 - Guowen Xu

, Xingshuo Han
, Gelei Deng
, Tianwei Zhang
, Shengmin Xu
, Jianting Ning
, Anjia Yang
, Hongwei Li
:
VerifyML: Obliviously Checking Model Fairness Resilient to Malicious Model Holder. 1785-1800 - Julien Gamba

, Álvaro Feal
, Eduardo Blázquez
, Vinuri Bandara
, Abbas Razaghpanah
, Juan Tapiador
, Narseo Vallina-Rodriguez
:
Mules and Permission Laundering in Android: Dissecting Custom Permissions in the Wild. 1801-1816 - Kazi Abu Zubair

, Rahaf Abdullah
, David Mohaisen
, Amro Awad
:
RC-NVM: Recovery-Aware Reliability-Security Co-Design for Non-Volatile Memories. 1817-1830 - Yandong Zheng

, Hui Zhu
, Rongxing Lu
, Yunguo Guan
, Songnian Zhang
, Fengwei Wang
, Jun Shao
, Hui Li
:
PHRkNN: Efficient and Privacy-Preserving Reverse kNN Query Over High-Dimensional Data in Cloud. 1831-1844 - Yinbin Miao

, Feng Li
, Xinghua Li
, Jianting Ning
, Hongwei Li
, Kim-Kwang Raymond Choo
, Robert H. Deng
:
Verifiable Outsourced Attribute-Based Encryption Scheme for Cloud-Assisted Mobile E-Health System. 1845-1862 - José María Jorquera Valero

, Vasileios Theodorou
, Manuel Gil Pérez
, Gregorio Martínez Pérez
:
SLA-Driven Trust and Reputation Management Framework for 5G Distributed Service Marketplaces. 1863-1875 - Jiangming Li

, Huasen He
, Shuangwu Chen
, Dong Jin
, Jian Yang
:
LogGraph: Log Event Graph Learning Aided Robust Fine-Grained Anomaly Diagnosis. 1876-1889 - Zhen Zeng

, Dijiang Huang
, Guoliang Xue
, Yuli Deng
, Neha Vadnere
, Liguang Xie
:
ILLATION: Improving Vulnerability Risk Prioritization by Learning From Network. 1890-1901 - Shimin Li

, Xin Wang
, Rui Xue
:
$\mathsf {moKHS}$moKHS: A More Lightweight Model for Multi-Client Delegatable Computation. 1902-1917 - Lei Xu

, Anxin Zhou
, Huayi Duan
, Cong Wang
, Qian Wang
, Xiaohua Jia
:
Toward Full Accounting for Leakage Exploitation and Mitigation in Dynamic Encrypted Databases. 1918-1934 - Marco Pernpruner

, Roberto Carbone
, Giada Sciarretta
, Silvio Ranise
:
An Automated Multi-Layered Methodology to Assist the Secure and Risk-Aware Design of Multi-Factor Authentication Protocols. 1935-1950 - Chen Liu

, Bo Li
, Jun Zhao
, Xudong Liu
, Chunpei Li
:
MalAF : Malware Attack Foretelling From Run-Time Behavior Graph Sequence. 1951-1966 - Youzhi Zhang

, Dongkai Chen
, Sushil Jajodia
, Andrea Pugliese
, V. S. Subrahmanian
, Yanhai Xiong
:
GAIT: A Game-Theoretic Defense Against Intellectual Property Theft. 1967-1980 - Pedro Reviriego

, Alfonso Sánchez-Macián
, Peter C. Dillinger
, Stefan Walzer
:
On the Privacy of Multi-Versioned Approximate Membership Check Filters. 1981-1993 - Qin Liu

, Yu Peng
, Qian Xu
, Hongbo Jiang
, Jie Wu
, Tian Wang
, Tao Peng
, Guojun Wang
, Shaobo Zhang
:
$\mathsf{MARS}$MARS: Enabling Verifiable Range-Aggregate Queries in Multi-Source Environments. 1994-2011 - H. O. Sai Varshith

, Shamik Sural
, Jaideep Vaidya
, Vijayalakshmi Atluri
:
Efficiently Supporting Attribute-Based Access Control in Linux. 2012-2026 - Ahmed Shafee

, Mohamed Mahmoud
, Jerry W. Bruce
, Gautam Srivastava
, Abdullah Balamsh, Abdulah Jeza Aljohani
:
False Data Detector for Electrical Vehicles Temporal-Spatial Charging Coordination Secure Against Evasion and Privacy Adversarial Attacks. 2027-2044 - Lin Yao

, Xue Wang
, Haibo Hu
, Guowei Wu
:
A Utility-Aware Anonymization Model for Multiple Sensitive Attributes Based on Association Concealment. 2045-2056 - Jun Shen

, Xiaofeng Chen
, Xinyi Huang
, Yang Xiang
:
Public Proofs of Data Replication and Retrievability With User-Friendly Replication. 2057-2067 - Wenyuan Xu

, Yushi Cheng
, Xiaoyu Ji
, Yi-Chao Chen
:
On Tracing Screen Photos - A Moiré Pattern-Based Approach. 2068-2084 - Lei Zhou

, Fengwei Zhang
, Kevin Leach
, Xuhua Ding
, Zhenyu Ning
, Guojun Wang
, Jidong Xiao
:
Hardware-Assisted Live Kernel Function Updating on Intel Platforms. 2085-2098 - Wei Li

, Borui Yang
, Hangyu Ye
, Liyao Xiang
, Qingxiao Tao
, Xinbing Wang
, Chenghu Zhou
:
MiniTracker: Large-Scale Sensitive Information Tracking in Mini Apps. 2099-2114 - Hora Saadaat Pishbin

, Amir Jalaly Bidgoly
:
Exploiting Deep Neural Networks as Covert Channels. 2115-2126 - Mordechai Guri

:
Air-Gap Electromagnetic Covert Channel. 2127-2144 - Chunqiang Hu

, Zewei Liu
, Ruinian Li
, Pengfei Hu
, Tao Xiang
, Meng Han
:
Smart Contract Assisted Privacy-Preserving Data Aggregation and Management Scheme for Smart Grid. 2145-2161 - Ahmet Kurt

, Enes Erdin
, Kemal Akkaya
, A. Selcuk Uluagac
, Mumin Cebe
:
D-LNBot: A Scalable, Cost-Free and Covert Hybrid Botnet on Bitcoin's Lightning Network. 2162-2180 - Anh-Tu Hoang

, Barbara Carminati
, Elena Ferrari
:
Protecting Privacy in Knowledge Graphs With Personalized Anonymization. 2181-2193 - Peter Kietzmann

, Thomas C. Schmidt
, Matthias Wählisch
:
PUF for the Commons: Enhancing Embedded Security on the OS Level. 2194-2210 - Yebo Feng

, Jun Li
, Devkishen Sisodia
, Peter L. Reiher
:
On Explainable and Adaptable Detection of Distributed Denial-of-Service Traffic. 2211-2226 - Shashank Arora

, Pradeep K. Atrey
:
SecureC2Edit: A Framework for Secure Collaborative and Concurrent Document Editing. 2227-2241 - Yuan Gao

, Liquan Chen
, Jinguang Han
, Shui Yu
, Huiyu Fang
:
Similarity-Based Secure Deduplication for IIoT Cloud Management System. 2242-2256 - Chenhao Lin

, Tianle Song
, Yingmao Miao
, Jingyi He
, Minghui Yang
, Huan Wang
, Chao Shen
:
ChildShield: An Implicit and Continuous Child Identification System on Smartphones. 2257-2272 - Fendy Santoso

, Anthony Finn
:
Trusted Operations of a Military Ground Robot in the Face of Man-in-the-Middle Cyberattacks Using Deep Learning Convolutional Neural Networks: Real-Time Experimental Outcomes. 2273-2284 - Jiating Ma

, Yipeng Zhou
, Laizhong Cui
, Song Guo
:
An Optimized Sparse Response Mechanism for Differentially Private Federated Learning. 2285-2295 - Yong-Feng Ge

, Hua Wang
, Elisa Bertino
, Zhi-Hui Zhan
, Jinli Cao
, Yanchun Zhang
, Jun Zhang
:
Evolutionary Dynamic Database Partitioning Optimization for Privacy and Utility. 2296-2311 - Omid Mir

, Daniel Slamanig
, René Mayrhofer
:
Threshold Delegatable Anonymous Credentials With Controlled and Fine-Grained Delegation. 2312-2326 - Ming Gao

, Fu Xiao
, Wentao Guo
, Zixin Lin
, Weiran Liu
, Jinsong Han
:
Practical EMI Attacks on Smartphones With Users' Commands Cancelled. 2327-2343 - Yongquan Fu

, Weihong Han
, Dong Yuan
:
Disentangled Orchestration on Cyber Ranges. 2344-2360 - Yinbin Miao, Ziteng Liu

, Xinghua Li
, Meng Li
, Hongwei Li
, Kim-Kwang Raymond Choo
, Robert H. Deng
:
Robust Asynchronous Federated Learning With Time-Weighted and Stale Model Aggregation. 2361-2375 - Hui Sun

, Tianqing Zhu
, Jie Li
, Shouling Ji
, Wanlei Zhou
:
Attribute-Based Membership Inference Attacks and Defenses on GANs. 2376-2393 - Jan Butora

, Pauline Puteaux
, Patrick Bas
:
Errorless Robust JPEG Steganography Using Outputs of JPEG Coders. 2394-2406 - Zhiyi Tian

, Lei Cui
, Chenhan Zhang
, Shuaishuai Tan
, Shui Yu
, Yonghong Tian
:
The Role of Class Information in Model Inversion Attacks Against Image Deep Learning Classifiers. 2407-2420 - Libo Chen

, Yanhao Wang
, Jiaqi Linghu
, Qinsheng Hou
, Quanpu Cai
, Shanqing Guo
, Zhi Xue
:
SaTC: Shared-Keyword Aware Taint Checking for Detecting Bugs in Embedded Systems. 2421-2433 - Shengyu Li

, Songfan Li
, Qingqing Liu, Yihang Song, Chong Zhang
, Li Lu
:
Watch Out Your Thumb Drive: Covert Data Theft From Portable Data Storage via Backscatter. 2434-2447 - Xiaoping Liang

, Zhenjun Tang
, Xianquan Zhang
, Mengzhu Yu
, Xinpeng Zhang
:
Robust Hashing With Local Tangent Space Alignment for Image Copy Detection. 2448-2460 - Ganapathy Mani

, Myeongsu Kim
, Bharat K. Bhargava
, Pelin Angin
, Ayça Deniz
, Vikram Pasumarti
:
Malware Speaks! Deep Learning Based Assembly Code Processing for Detecting Evasive Cryptojacking. 2461-2477 - Mohammad M. Jalalzai

, Jianyu Niu
, Chen Feng
, Fangyu Gai
:
Fast-HotStuff: A Fast and Robust BFT Protocol for Blockchains. 2478-2493 - Wei Tong

, Jiacheng Niu
, Jingyu Hua
, Qun Li
, Sheng Zhong
:
Scalable Differentially Private Model Publishing Via Private Iterative Sample Selection. 2494-2506 - Quanjun Zhang

, Chunrong Fang
, Bowen Yu
, Weisong Sun
, Tongke Zhang
, Zhenyu Chen
:
Pre-Trained Model-Based Automated Software Vulnerability Repair: How Far are We? 2507-2525 - Luca Maria Castiglione

, Emil C. Lupu
:
Which Attacks Lead to Hazards? Combining Safety and Security Analysis for Cyber-Physical Systems. 2526-2540 - Shuhua Deng

, Wenjie Dai
, Xian Qing
, Xieping Gao
:
Vulnerabilities in SDN Topology Discovery Mechanism: Novel Attacks and Countermeasures. 2541-2551 - Yuanfei Li

, Xiong Li
, Xiangyang Luo
, Zhetao Li
, Hongwei Li
, Xiaosong Zhang
:
AnotherMe: A Location Privacy Protection System Based on Online Virtual Trajectory Generation. 2552-2567 - Aoting Hu

, Zhigang Lu
, Renjie Xie
, Minhui Xue
:
${\sf VeriDIP}$VeriDIP: Verifying Ownership of Deep Neural Networks Through Privacy Leakage Fingerprints. 2568-2584 - Rui Shi

, Yang Yang
, Yingjiu Li
, Huamin Feng
, Guozhen Shi
, HweeHwa Pang
, Robert H. Deng
:
Double Issuer-Hiding Attribute-Based Credentials From Tag-Based Aggregatable Mercurial Signatures. 2585-2602 - Yizhong Liu

, Xinxin Xing
, Ziheng Tong
, Xun Lin
, Jing Chen
, Zhenyu Guan
, Qianhong Wu
, Willy Susilo
:
Secure and Scalable Cross-Domain Data Sharing in Zero-Trust Cloud-Edge-End Environment Based on Sharding Blockchain. 2603-2618 - Junren Qin

, Shanxiang Lyu
, Jiarui Deng
, Xingyuan Liang
, Shijun Xiang
, Hao Chen
:
A Lattice-Based Embedding Method for Reversible Audio Watermarking. 2619-2630 - Daniel Oliveira

, Edoardo Giusto
, Betis Baheri
, Qiang Guan
, Bartolomeo Montrucchio
, Paolo Rech
:
A Systematic Methodology to Compute the Quantum Vulnerability Factors for Quantum Circuits. 2631-2644 - Hongwei Yao

, Zheng Li, Kunzhe Huang
, Jian Lou, Zhan Qin
, Kui Ren
:
RemovalNet: DNN Fingerprint Removal Attacks. 2645-2658 - Ruben de Smet

, Kris Steenhaut
, An Braeken
:
Private Electronic Road Pricing Using Bulletproofs With Vector Commitments. 2659-2671 - Xueluan Gong

, Zheng Fang
, Bowen Li
, Tao Wang
, Yanjiao Chen
, Qian Wang
:
Palette: Physically-Realizable Backdoor Attacks Against Video Recognition Models. 2672-2685 - Dohyun Ryu

, Yerim Kim
, Junbeom Hur
:
$\gamma$γ-Knife: Extracting Neural Network Architecture Through Software-Based Power Side-Channel. 2686-2703 - Ruiqi Lu

, Guoqi Xie
, Renfa Li
, Wei Xu
, Jianmei Lei
:
TrinitySec: Trinity-Enabled and Lightweight Security Framework for CAN-FD Communication. 2704-2719 - Anxiao He

, Kai Bu
, Jiongrui Huang
, Yifei Pang
, Qianping Gu
, Kui Ren
:
SwiftParade: Anti-Burst Multipath Validation. 2720-2734 - Mahendra Rathor

, Aditya Anshul
, Anirban Sengupta
:
Securing Reusable IP Cores Using Voice Biometric Based Watermark. 2735-2749 - Yunguo Guan

, Rongxing Lu
, Songnian Zhang
, Yandong Zheng
, Jun Shao
, Guiyi Wei
:
$k$kTCQ: Achieving Privacy-Preserving $k$k-Truss Community Queries Over Outsourced Data. 2750-2765 - Chun-I Fan

, Arijit Karati
, Shou-Li Wu:
A Privacy-Aware Provably Secure Smart Card Authentication Protocol Based on Physically Unclonable Functions. 2766-2778 - Junsong Fu

, Shuai Xiong
, Na Wang
, Ruiping Ren
, Ang Zhou
, Bharat K. Bhargava
:
A Framework of High-Speed Network Protocol Fuzzing Based on Shared Memory. 2779-2798 - Momen Oqaily

, Mohammad Ekramul Kabir
, Suryadipta Majumdar
, Yosr Jarraya
, Mengyuan Zhang
, Makan Pourzandi, Lingyu Wang
, Mourad Debbabi
:
iCAT+: An Interactive Customizable Anonymization Tool Using Automated Translation Through Deep Learning. 2799-2817 - Chafika Benzaïd

, Tarik Taleb
, Ashkan Sami
, Othmane Hireche
:
FortisEDoS: A Deep Transfer Learning-Empowered Economical Denial of Sustainability Detection Framework for Cloud-Native Network Slicing. 2818-2835 - Xianhao Tian

, Peijia Zheng
, Jiwu Huang
:
Secure Deep Learning Framework for Moving Object Detection in Compressed Video. 2836-2851 - Yuan Yao

, Junjiang He
, Tao Li, Yunpeng Wang, Xiaolong Lan, Yuan Li:
An Automatic XSS Attack Vector Generation Method Based on the Improved Dueling DDQN Algorithm. 2852-2868 - Peter Rot

, Klemen Grm
, Peter Peer
, Vitomir Struc
:
PrivacyProber: Assessment and Detection of Soft-Biometric Privacy-Enhancing Techniques. 2869-2887 - Liang Xi

, Dehua Miao
, Menghan Li
, Ruidong Wang
, Han Liu
, Xunhua Huang
:
Adaptive-Correlation-Aware Unsupervised Deep Learning for Anomaly Detection in Cyber-Physical Systems. 2888-2899 - Yan Meng

, Jiachun Li
, Haojin Zhu
, Yuan Tian
, Jiming Chen
:
Privacy-Preserving Liveness Detection for Securing Smart Voice Interfaces. 2900-2916 - Haider Abbas

, Muhammad Shahzad
, Maliha Safdar
, Ahmed Hemani
:
DUDE: Decryption, Unpacking, Deobfuscation, and Endian Conversion Framework for Embedded Devices Firmware. 2917-2929 - Pasika Ranaweera

, Awaneesh Kumar Yadav
, Madhusanka Liyanage
, Anca Delia Jurcut
:
A Novel Authentication Protocol for 5G gNodeBs in Service Migration Scenarios of MEC. 2930-2948 - Kane Walter

, Meisam Mohammady
, Surya Nepal
, Salil S. Kanhere
:
Optimally Mitigating Backdoor Attacks in Federated Learning. 2949-2963 - Yang Shi

, Tianyuan Luo
, Jingwen Liang
, Man Ho Au
, Xiapu Luo
:
Obfuscating Verifiable Random Functions for Proof-of-Stake Blockchains. 2982-2996 - Hao Huang

, Patrick Wlazlo, Abhijeet Sahu
, Adele Walker, Ana E. Goulart
, Katherine R. Davis
, Laura P. Swiler
, Thomas D. Tarman
, Eric D. Vugrin
:
Validating an Emulation-Based Cybersecurity Model With a Physical Testbed. 2997-3011 - Hongsheng Hu

, Xuyun Zhang
, Zoran Salcic
, Lichao Sun
, Kim-Kwang Raymond Choo
, Gillian Dobbie
:
Source Inference Attacks: Beyond Membership Inference Attacks in Federated Learning. 3012-3029 - Tara Salman

, Ali Ghubaish
, Roberto Di Pietro
, Mohamed Baza
, Hani Alshahrani
, Raj Jain
, Kim-Kwang Raymond Choo
:
CrowdFAB: Intelligent Crowd-Forecasting Using Blockchains and its Use in Security. 3030-3047 - Chuan Yu

, Shuhui Chen
, Ziling Wei
, Fei Wang
:
Toward a Truly Secure Telecom Network: Analyzing and Exploiting Vulnerable Security Configurations/ Implementations in Commercial LTE/IMS Networks. 3048-3064 - Feng Lin

, Chao Wang
, Tiantian Liu
, Ziwei Liu
, Yijie Shen
, Zhongjie Ba
, Li Lu
, Wenyao Xu
, Kui Ren
:
High-Quality Speech Recovery Through Soundproof Protections via mmWave Sensing. 3065-3081 - Giorgos Vasiliadis

, Apostolos Karampelas, Alexandros Shevtsov
, Panagiotis Papadopoulos
, Sotiris Ioannidis, Alexandros Kapravelos
:
WRIT: Web Request Integrity and Attestation Against Malicious Browser Extensions. 3082-3095 - Pranav Jangir

, Nishat Koti
, Varsha Bhat Kukkala
, Arpita Patra
, Bhavish Raj Gopal
, Somya Sangal
:
Vogue: Faster Computation of Private Heavy Hitters. 3096-3108 - Yibiao Lu

, Bingsheng Zhang
, Kui Ren
:
Maliciously Secure MPC From Semi-Honest 2PC in the Server-Aided Model. 3109-3125 - Man Zhang

, Xinghua Li
, Yanbing Ren
, Bin Luo
, Yinbin Miao, Ximeng Liu
, Robert H. Deng
:
Privacy-Preserved Data Trading Via Verifiable Data Disturbance. 3126-3140 - Carlton Shepherd

, Jan Kalbantner
, Benjamin Semal
, Konstantinos Markantonakis
:
A Side-Channel Analysis of Sensor Multiplexing for Covert Channels and Application Profiling on Mobile Devices. 3141-3152 - Mayana Pereira

, Rahul Dodhia
, Hyrum S. Anderson
, Richard Brown
:
Metadata-Based Detection of Child Sexual Abuse Material. 3153-3164 - Zhan Shu

, Guanhua Yan
:
EAGLE: Evasion Attacks Guided by Local Explanations Against Android Malware Classification. 3165-3182 - Dola Das

, Kazi Md. Rokibul Alam
, Yasuhiko Morimoto
:
An Anonymity Retaining Framework for Multi-party Skyline Queries Based on Unique Tags. 3183-3195 - Bin Yuan

, Maogen Yang
, Zhen Xu
, Qunjinming Chen
, Zhanxiang Song
, Zhen Li
, Deqing Zou
, Hai Jin
:
Leakage of Authorization-Data in IoT Device Sharing: New Attacks and Countermeasure. 3196-3210 - Jiacheng Gao

, Yuan Zhang
, Sheng Zhong
:
Revisiting Privacy-Preserving Min and k-th Min Protocols for Mobile Sensing. 3211-3226 - Ning Lu

, Ruxiao Huang
, Mingliang Yao
, Wenbo Shi
, Kim-Kwang Raymond Choo
:
V-Digger: An Efficient and Secure Vulnerability Assessment for Large-Scale ISP Network. 3227-3246 - Yinbin Miao

, Feng Li
, Xiaohua Jia
, Huaxiong Wang
, Ximeng Liu
, Kim-Kwang Raymond Choo
, Robert H. Deng
:
REKS: Role-Based Encrypted Keyword Search With Enhanced Access Control for Outsourced Cloud Data. 3247-3261 - Rakin Muhammad Shadab

, Yu Zou
, Sanjay Gandham
, Amro Awad
, Mingjie Lin
:
A Secure Computing System With Hardware-Efficient Lazy Bonsai Merkle Tree for FPGA-Attached Embedded Memory. 3262-3279 - Yipeng Zhou

, Runze Wang
, Jiahao Liu
, Di Wu
, Shui Yu
, Yonggang Wen
:
Exploring the Practicality of Differentially Private Federated Learning: A Local Iteration Tuning Approach. 3280-3294 - Yan Jiang

, Xiaoyu Ji
, Juchuan Zhang
, Yancheng Jiang
, Shui Jiang
, Wenyuan Xu
:
CapSpeaker: Injecting Commands to Voice Assistants Via Capacitors. 3295-3308 - Yan Jiang

, Xiaoyu Ji
, Kai Wang
, Chen Yan
, Richard Mitev
, Ahmad-Reza Sadeghi
, Wenyuan Xu:
Marionette: Manipulate Your Touchscreen via a Charging Cable. 3309-3323 - Lihong Tang

, Xiao Chen
, Sheng Wen
, Li Li
, Marthie Grobler
, Yang Xiang
:
Demystifying the Evolution of Android Malware Variants. 3324-3341 - Lo-Yao Yeh

, Wan-Hsin Hsu
, Chih-Ya Shen
:
GDPR-Compliant Personal Health Record Sharing Mechanism With Redactable Blockchain and Revocable IPFS. 3342-3356 - Mohammed Alsadi

, Matthew Casey
, Constantin Catalin Dragan
, François Dupressoir
, Luke Riley
, Muntadher Sallal
, Steve Schneider
, Helen Treharne
, Joe Wadsworth, Phil Wright:
Towards End-to-End Verifiable Online Voting: Adding Verifiability to Established Voting Systems. 3357-3374 - Lingyuan Yin

, Jing Xu
, Kaitai Liang
, Zhenfeng Zhang:
Sidechains With Optimally Succinct Proof. 3375-3389 - Guodong Cao

, Zhibo Wang
, Yunhe Feng
, Xiaowei Dong
, Zhifei Zhang
, Zhan Qin
, Kui Ren
:
Task-Free Fairness-Aware Bias Mitigation for Black-Box Deployed Models. 3390-3405 - Zhuo Chen

, Lei Wu
, Yubo Hu
, Jing Cheng
, Yufeng Hu
, Yajin Zhou
, Zhushou Tang
, Yexuan Chen
, Jinku Li
, Kui Ren
:
Lifting the Grey Curtain: Analyzing the Ecosystem of Android Scam Apps. 3406-3421 - Jiahui Hou

, Dongxiao Liu
, Cheng Huang
, Weihua Zhuang
, Xuemin Shen
, Rob Sun, Bidi Ying:
Data Protection: Privacy-Preserving Data Collection With Validation. 3422-3438 - Chuan Zhang

, Mingyang Zhao
, Jinwen Liang
, Qing Fan
, Liehuang Zhu
, Song Guo
:
NANO: Cryptographic Enforcement of Readability and Editability Governance in Blockchain Databases. 3439-3452 - Tingting Yin

, Zicong Gao
, Zhenghang Xiao
, Zheyu Ma
, Min Zheng
, Chao Zhang
:
KextFuzz: A Practical Fuzzer for macOS Kernel EXTensions on Apple Silicon. 3453-3468 - Chun Liu

, Xuexian Hu
, Xiaofeng Chen
, Jianghong Wei
, Wenfen Liu
:
SDIM: A Subtly Designed Invertible Matrix for Enhanced Privacy-Preserving Outsourcing Matrix Multiplication and Related Tasks. 3469-3486 - Dawei Li

, Di Liu
, Yangkun Ren, Yu Sun
, Zhenyu Guan
, Qianhong Wu
, Jiankun Hu
, Jianwei Liu
:
CPAKA: Mutual Authentication and Key Agreement Scheme Based on Conditional PUF in Space-Air-Ground Integrated Network. 3487-3500 - Dingding Wang

, Muhui Jiang
, Rui Chang
, Yajin Zhou
, Hexiang Wang
, Baolei Hou
, Lei Wu
, Xiapu Luo
:
An Empirical Study on the Insecurity of End-of-Life (EoL) IoT Devices. 3501-3514 - Jiansong Zhang

, Kejiang Chen
, Chuan Qin
, Weiming Zhang
, Nenghai Yu
:
AAS: Automatic Virtual Data Augmentation for Deep Image Steganalysis. 3515-3527 - Tao Jiang

, Xu Yuan
, Qiong Cheng
, Yulong Shen
, Liangmin Wang
, Jianfeng Ma
:
FairECom: Towards Proof of E-Commerce Fairness Against Price Discrimination. 3528-3544 - Mingyang Song

, Zhongyun Hua
, Yifeng Zheng
, Tao Xiang
, Xiaohua Jia
:
Enabling Transparent Deduplication and Auditing for Encrypted Data in Cloud. 3545-3561 - Jämes Ménétrey

, Marcelo Pasin
, Pascal Felber
, Valerio Schiavoni
, Giovanni Mazzeo
, Arne Hollum
, Darshan Vaydia
:
A Comprehensive Trusted Runtime for WebAssembly With Intel SGX. 3562-3579 - Cheng Wang

, Hao Tang
, Hangyu Zhu
, Changjun Jiang
:
Collaborative Prediction in Anti-Fraud System Over Multiple Credit Loan Platforms. 3580-3596 - Feng Liu

, Kaiping Xue
, Jinjiang Yang
, Jing Zhang
, Zixuan Huang
, Jian Li
, David S. L. Wei
:
Volume-Hiding Range Searchable Symmetric Encryption for Large-Scale Datasets. 3597-3609 - Zheng Yang

, Chenglu Jin
, Xuelian Cao
, Marten van Dijk
, Jianying Zhou
:
Optimizing Proof of Aliveness in Cyber-Physical Systems. 3610-3628 - Minghui Min

, Haopeng Zhu
, Jiahao Ding
, Shiyin Li
, Liang Xiao
, Miao Pan
, Zhu Han
:
Personalized 3D Location Privacy Protection With Differential and Distortion Geo-Perturbation. 3629-3643 - Lunzhi Deng

, Shuai Feng
, Tao Wang
, Zhenyu Hu
, Siwei Li
:
Identity-Based Data Auditing Scheme With Provable Security in the Standard Model Suitable for Cloud Storage. 3644-3655 - Zongyang Zhang

, Weihan Li
, Ximeng Liu
, Xin Chen
, Qihang Peng
:
Ligerolight: Optimized IOP-Based Zero-Knowledge Argument for Blockchain Scalability. 3656-3670 - Liang Zhao

, Liqun Chen
:
Privacy-Preserving Transformation Used in Verifiable (Outsourced) Computation, Revisited. 3671-3687 - Ying Miao

, Keke Gai
, Liehuang Zhu
, Kim-Kwang Raymond Choo
, Jaideep Vaidya
:
Blockchain-Based Shared Data Integrity Auditing and Deduplication. 3688-3703 - Yadong Xie

, Fan Li
, Yue Wu
, Yu Wang
:
User Authentication on Earable Devices via Bone-Conducted Occlusion Sounds. 3704-3718 - Sajid Hussain

, Hui Guo
, Tuo Li
, Sri Parameswaran
:
MP-ORAM: A Novel ORAM Design for Multicore Processor Systems. 3719-3733 - Yushi Cheng

, Xiaoyu Ji
, Wenjun Zhu
, Shibo Zhang
, Kevin Fu
, Wenyuan Xu
:
Adversarial Computer Vision via Acoustic Manipulation of Camera Sensors. 3734-3750 - Guichuan Zhao

, Qi Jiang
, Ding Wang
, Xindi Ma
, Xinghua Li
:
Deep Hashing Based Cancelable Multi-Biometric Template Protection. 3751-3767 - Yutian Yang

, Jinjiang Tu, Wenbo Shen
, Songbo Zhu, Rui Chang
, Yajin Zhou
:
kCPA: Towards Sensitive Pointer Full Life Cycle Authentication for OS Kernels. 3768-3784 - Jinke Song, Qiang Li, Haining Wang, Jiqiang Liu:

PKVIC: Supplement Missing Software Package Information in Security Vulnerability Reports. 3785-3800 - Chenxu Wang

, Yunjie Deng, Zhenyu Ning
, Kevin Leach
, Jin Li
, Shoumeng Yan
, Zhengyu He
, Jiannong Cao
, Fengwei Zhang
:
Building a Lightweight Trusted Execution Environment for Arm GPUs. 3801-3816 - Yuxuan Cai, Wenxiu Ding

, Yuxuan Xiao, Zheng Yan
, Ximeng Liu
, Zhiguo Wan
:
SecFed: A Secure and Efficient Federated Learning Based on Multi-Key Homomorphic Encryption. 3817-3833 - Hazem M. Soliman

, Dusan Sovilj
, Geoff Salmon
, Mohan Rao
, Niranjan Mayya
:
RANK: AI-Assisted End-to-End Architecture for Detecting Persistent Attacks in Enterprise Networks. 3834-3850 - Silvio Ereno Quincozes

, Célio Albuquerque
, Diego G. Passos
, Daniel Mossé
:
ERENO: A Framework for Generating Realistic IEC-61850 Intrusion Detection Datasets for Smart Grids. 3851-3865 - Bo Feng

, Meng Luo
, Changming Liu
, Long Lu, Engin Kirda:
AIM: Automatic Interrupt Modeling for Dynamic Firmware Analysis. 3866-3882 - Shun Hu

, Ming Li
, Jiasi Weng
, Jia-Nan Liu
, Jian Weng
, Zhi Li
:
IvyRedaction: Enabling Atomic, Consistent and Accountable Cross-Chain Rewriting. 3883-3900 - Hao Peng

, Shixin Guo
, Dandan Zhao
, Xuhong Zhang
, Jianmin Han
, Shouling Ji
, Xing Yang
, Ming Zhong
:
TextCheater: A Query-Efficient Textual Adversarial Attack in the Hard-Label Setting. 3901-3916 - Guohua Tian

, Jianghong Wei
, Meixia Miao
, Fuchun Guo
, Willy Susilo
, Xiaofeng Chen
:
Blockchain-Based Compact Verifiable Data Streaming With Self-Auditing. 3917-3930 - Chenxin Duan

, Sainan Li
, Hai Lin
, Wenqi Chen
, Guanglei Song
, Chenglong Li
, Jiahai Yang
, Zhiliang Wang
:
IoTa: Fine-Grained Traffic Monitoring for IoT Devices via Fully Packet-Level Models. 3931-3947 - Thomas Hutzelmann

, Dominik Mauksch, Ana Petrovska
, Alexander Pretschner
:
Generation of Tailored and Confined Datasets for IDS Evaluation in Cyber-Physical Systems. 3948-3962 - Eldor Abdukhamidov

, Mohammed Abuhamad
, Simon S. Woo
, Eric Chan-Tin
, Tamer Abuhmed
:
Hardening Interpretable Deep Learning Systems: Investigating Adversarial Threats and Defenses. 3963-3976 - Jie Cui

, Yatao Li
, Qingyang Zhang
, Hong Zhong
, Chengjie Gu
, Debiao He
:
DSChain: A Blockchain System for Complete Lifecycle Security of Data in Internet of Things. 3977-3993 - Jiansong Zhang

, Kejiang Chen
, Weixiang Li
, Weiming Zhang
, Nenghai Yu
:
Steganography With Generated Images: Leveraging Volatility to Enhance Security. 3994-4005 - Fuyuan Song

, Jinwen Liang
, Chuan Zhang
, Zhangjie Fu
, Zheng Qin
, Song Guo
:
Achieving Efficient and Privacy-Preserving Location-Based Task Recommendation in Spatial Crowdsourcing. 4006-4023 - Mojtaba Rafiee

:
Multi-Adjustable Join Schemes With Adaptive Indistinguishably Security. 4024-4034 - Zhenxiao Zhang

, Yuanxiong Guo
, Yuguang Fang
, Yanmin Gong
:
Communication and Energy Efficient Wireless Federated Learning With Intrinsic Privacy. 4035-4047 - Marie Farrell

, Matthew Bradbury
, Rafael C. Cardoso
, Michael Fisher
, Louise A. Dennis
, Clare Dixon
, Al Tariq Sheik
, Hu Yuan
, Carsten Maple
:
Security-Minded Verification of Cooperative Awareness Messages. 4048-4065 - Mir Ali Rezazadeh Baee

, Leonie Simpson
, Xavier Boyen, Ernest Foo
, Josef Pieprzyk
:
A Provably Secure and Efficient Cryptographic-Key Update Protocol for Connected Vehicles. 4066-4083 - Javier Ron

, César Soto-Valero
, Long Zhang
, Benoit Baudry
, Martin Monperrus
:
Highly Available Blockchain Nodes With N-Version Design. 4084-4097 - Xiangping Kang

, Guoxian Yu
, Lanju Kong
, Carlotta Domeniconi
, Xiangliang Zhang
, Qingzhong Li
:
FedTA: Federated Worthy Task Assignment for Crowd Workers. 4098-4109 - Hong Joo Lee

, Yong Man Ro
:
Defending Video Recognition Model Against Adversarial Perturbations via Defense Patterns. 4110-4121 - Tianhang Zheng

, Baochun Li
:
CMI: Client-Targeted Membership Inference in Federated Learning. 4122-4132 - Michael Sandborn

, Zach Stoebner, Westley Weimer
, Stephanie Forrest
, Ryan E. Dougherty
, Jules White, Kevin Leach
:
Reducing Malware Analysis Overhead With Coverings. 4133-4146 - Siwei Wu

, Zhou Yu
, Dabao Wang
, Yajin Zhou
, Lei Wu
, Haoyu Wang
, Xingliang Yuan
:
DeFiRanger: Detecting DeFi Price Manipulation Attacks. 4147-4161 - Ning Lu

, Mingxi Liu
, Wenbo Shi
, Ximeng Liu
, Kim-Kwang Raymond Choo
:
SG-Audit: An Efficient and Robust Cloud Auditing Scheme for Smart Grid. 4162-4179 - Sona Alex

, Dhanaraj Kakkanattu Jagalchandran
, Deepthi P. Pattathil
:
Privacy-Preserving and Energy-Saving Random Forest-Based Disease Detection Framework for Green Internet of Things in Mobile Healthcare Networks. 4180-4192 - Zipeng Ye

, Wenjian Luo
, Ruizhuo Zhang, Hongwei Zhang, Yuhui Shi
, Yan Jia:
An Evolutionary Attack for Revealing Training Data of DNNs With Higher Feature Fidelity. 4193-4205 - Yang Wei

, Zhuo Ma, Zhuoran Ma, Zhan Qin
, Yang Liu, Bin Xiao, Xiuli Bi
, Jianfeng Ma:
Effectively Improving Data Diversity of Substitute Training for Data-Free Black-Box Attack. 4206-4219 - Xiaoyu Zhang

, Shen Lin
, Chao Chen
, Xiaofeng Chen
:
MODA: Model Ownership Deprivation Attack in Asynchronous Federated Learning. 4220-4235 - Yuan Xu

, Yungang Bao
, Sa Wang
, Tianwei Zhang
:
Function Interaction Risks in Robot Apps: Analysis and Policy-Based Solution. 4236-4253 - Seunghwa Lee

, Hankyung Ko
, Jihye Kim
, Hyunok Oh
:
vCNN: Verifiable Convolutional Neural Network Based on zk-SNARKs. 4254-4270 - Ziming Zhao

, Zhuotao Liu
, Huan Chen
, Fan Zhang
, Zhuoxue Song
, Zhaoxuan Li
:
Effective DDoS Mitigation via ML-Driven In-Network Traffic Shaping. 4271-4289 - Georg Pichler

, Marco Romanelli
, Leonardo Rey Vega
, Pablo Piantanida
:
Perfectly Accurate Membership Inference by a Dishonest Central Server in Federated Learning. 4290-4296 - Yanxin Xu

, Hua Zhang
, Shaohua Zhao
, Xin Zhang
, Wenmin Li
, Fei Gao
, Kaixuan Li
:
Comments on "VERSA: Verifiable Secure Aggregation for Cross-Device Federated Learning". 4297-4298 - Liang Zhao

, Jie Yu
, Yiheng Zhang
, Liqun Chen
:
On the Privacy of Elementary Matrices Masking-Based Verifiable (Outsourced) Computation. 4299-4301 - Chenghe Dong

, Jianhong Zhang
:
On the Security of Multi-Receiver Certificateless Generalized Signcryption Scheme for WBANs. 4302-4303 - Zhengjun Cao

:
Corrections to "Efficient Provably-Secure Dynamic ID-Based Authenticated Key Agreement Scheme With Enhanced Security Provision". 4304-4305 - Cong Li

, Xinyu Feng
, Qingni Shen
, Zhonghai Wu
:
On the Security of Secure Keyword Search and Data Sharing Mechanism for Cloud Computing. 4306-4308
Volume 21, Number 5, September - October 2024
- Runhua Xu

, Bo Li
, Chao Li
, James B. D. Joshi
, Shuai Ma
, Jianxin Li
:
TAPFed: Threshold Secure Aggregation for Privacy-Preserving Federated Learning. 4309-4323 - Jiahui Wu

, Weizhe Zhang
:
On the Security of Verifiable and Oblivious Secure Aggregation for Privacy-Preserving Federated Learning. 4324-4326 - Zitong Yu

, Rizhao Cai
, Zhi Li, Wenhan Yang
, Jingang Shi
, Alex C. Kot
:
Benchmarking Joint Face Spoofing and Forgery Detection With Visual and Physiological Cues. 4327-4342 - Xiao Han

, Junjie Xiong
, Wenbo Shen
, Mingkui Wei
, Shangqing Zhao
, Zhuo Lu
, Yao Liu
:
The Perils of Wi-Fi Spoofing Attack Via Geolocation API and Its Defense. 4343-4359 - Kai Wang

, Richard Mitev
, Chen Yan
, Xiaoyu Ji
, Ahmad-Reza Sadeghi
, Wenyuan Xu
:
Analyzing and Defending GhostTouch Attack Against Capacitive Touchscreens. 4360-4375 - Yuhao Xie

, Xiong Luo
, Jiankun Sun
:
Toward Enhancing Sequence-Optimized Malware Representation With Context-Separated Bi-Directional Long Short-Term Memory and Proximal Policy Optimization. 4376-4387 - Dongxia Wang

, Tim Muller
, Jun Sun
:
Provably Secure Decisions Based on Potentially Malicious Information. 4388-4403 - Haomeng Xie

, Zheng Yan
:
SPCEX: Secure and Privacy-Preserving Cryptocurrency Exchange. 4404-4417 - Jiwei Tian

, Chao Shen
, Buhong Wang
, Xiaofang Xia
, Meng Zhang
, Chenhao Lin
, Qian Li
:
LESSON: Multi-Label Adversarial False Data Injection Attack for Deep Learning Locational Detection. 4418-4432 - Jie Wang

, Zheng Yan
, Jiahe Lan
, Elisa Bertino
, Witold Pedrycz
:
TrustGuard: GNN-Based Robust and Explainable Trust Evaluation With Dynamicity Support. 4433-4450 - Kwok-Yan Lam

, Xianhui Lu
, Linru Zhang
, Xiangning Wang
, Huaxiong Wang
, Si Qi Goh
:
Efficient FHE-Based Privacy-Enhanced Neural Network for Trustworthy AI-as-a-Service. 4451-4468 - Pei Zhang, Qingfeng Cheng

, Mingliang Zhang
, Xiangyang Luo
:
A Blockchain-Based Secure Covert Communication Method via Shamir Threshold and STC Mapping. 4469-4480 - Harsh Kasyap

, Somanath Tripathy
:
Sine: Similarity is Not Enough for Mitigating Local Model Poisoning Attacks in Federated Learning. 4481-4494 - Krishna Chandra Roy

, Guenevere Chen
:
GraphCH: A Deep Framework for Assessing Cyber-Human Aspects in Insider Threat Detection. 4495-4509 - Dajiang Chen

, Zeyu Liao
, Ruidong Chen
, Hao Wang
, Chong Yu
, Kuan Zhang
, Ning Zhang
, Xuemin Shen
:
Privacy-Preserving Anomaly Detection of Encrypted Smart Contract for Blockchain-Based Data Trading. 4510-4525 - Cui Li

, Rongmao Chen
, Yi Wang
, Qianqian Xing
, Baosheng Wang
:
REEDS: An Efficient Revocable End-to-End Encrypted Message Distribution System for IoT. 4526-4542 - Anton Wahrstätter

, Alfred Taudes
, Davor Svetinovic
:
Reducing Privacy of CoinJoin Transactions: Quantitative Bitcoin Network Analysis. 4543-4558 - Jiale Zhang

, Chengcheng Zhu
, Chunpeng Ge
, Chuan Ma
, Yanchao Zhao
, Xiaobing Sun
, Bing Chen
:
BadCleaner: Defending Backdoor Attacks in Federated Learning via Attention-Based Multi-Teacher Distillation. 4559-4573 - Mengming Li

, Kai Bu
, Chenlu Miao
, Kui Ren
:
TreasureCache: Hiding Cache Evictions Against Side-Channel Attacks. 4574-4588 - Thar Baker

, Tong Li
, Jingyu Jia
, Baolei Zhang
, Chang Tan
, Albert Y. Zomaya
:
Poison-Tolerant Collaborative Filtering Against Poisoning Attacks on Recommender Systems. 4589-4599 - Zongjie Li

, Zhibo Liu
, Wai Kin Wong
, Pingchuan Ma
, Shuai Wang
:
Evaluating C/C++ Vulnerability Detectability of Query-Based Static Application Security Testing Tools. 4600-4618 - Yinbin Miao, Rongpeng Xie

, Xinghua Li
, Zhiquan Liu
, Kim-Kwang Raymond Choo
, Robert H. Deng
:
Efficient and Secure Federated Learning Against Backdoor Attacks. 4619-4636 - Dong Li

, Qingguo Lü
, Xiaofeng Liao
, Tao Xiang
, Jiahui Wu
, Junqing Le
:
AVPMIR: Adaptive Verifiable Privacy-Preserving Medical Image Retrieval. 4637-4651 - Ping Ping

, Pan Wei
, Deyin Fu
, Bobiao Guo
, Olano Teah Bloh
, Feng Xu
:
IMIH: Imperceptible Medical Image Hiding for Secure Healthcare. 4652-4667 - Zijian Zhang

, Xin Lu
, Meng Li
, Jincheng An
, Yang Yu
, Hao Yin
, Liehuang Zhu
, Yong Liu
, Jiamou Liu
, Bakh Khoussainov
:
A Blockchain-Based Privacy-Preserving Scheme for Sealed-Bid Auction. 4668-4683 - Yunlong Mao

, Ziqin Dang
, Heng Wang
, Yuan Zhang
, Sheng Zhong
:
Solution Probing Attack Against Coin Mixing Based Privacy-Preserving Crowdsourcing Platforms. 4684-4698 - Ahmed Akhtar

, Masoud Barati
, Basit Shafiq
, Omer F. Rana
, Ayesha Afzal
, Jaideep Vaidya
, Shafay Shamail
:
Blockchain Based Auditable Access Control for Business Processes With Event Driven Policies. 4699-4716 - Francesco Buccafurri

, Vincenzo De Angelis
, Sara Lazzaro
:
MQTT-I: Achieving End-to-End Data Flow Integrity in MQTT. 4717-4734 - Marco Alecci

, Jordan Samhi
, Li Li
, Tegawendé F. Bissyandé
, Jacques Klein
:
Improving Logic Bomb Identification in Android Apps via Context-Aware Anomaly Detection. 4735-4753 - Javad Rafiei Asl

, Mohammad Hossein Rafiei
, Manar Alohaly
, Daniel Takabi
:
A Semantic, Syntactic, and Context-Aware Natural Language Adversarial Example Generator. 4754-4769 - Jian Liu

, Peilun Li, Fan Zhang
, Kui Ren:
$\mathsf {monoCash}$monoCash: A Channel-Free Payment Network via Trusted Monotonic Counters. 4770-4783 - Gao Liu

, Hao Li
, Ning Wang
, Tao Xiang
, Yi-Ning Liu
:
DeGKM: Decentralized Group Key Management for Content Push in Integrated Networks. 4784-4800 - Yiru Zhao

, Long Gao
, Qiang Wei
, Lei Zhao
:
Towards Tightly-Coupled Hybrid Fuzzing via Excavating Input Specifications. 4801-4814 - Wenlong Tian

, Jian Guo
, Zhiyong Xu
, Ruixuan Li
, Weijun Xiao
:
PEO-Store: Delegation-Proof Based Oblivious Storage With Secure Redundancy Elimination. 4815-4826 - Changhao Chenli

, Wenyi Tang
, Hyeonbum Lee
, Taeho Jung
:
Fair$^{2}$2Trade: Digital Trading Platform Ensuring Exchange and Distribution Fairness. 4827-4842 - Hanxi Guo

, Hao Wang
, Tao Song
, Yang Hua
, Ruhui Ma
, Xiulang Jin
, Zhengui Xue, Haibing Guan
:
Siren$^+$+: Robust Federated Learning With Proactive Alarming and Differential Privacy. 4843-4860 - Zhirun Zheng

, Zhetao Li
, Cheng Huang
, Saiqin Long
, Mushu Li
, Xuemin Shen
:
Data Poisoning Attacks and Defenses to LDP-Based Privacy-Preserving Crowdsensing. 4861-4878 - Jianping Cai

, Ximeng Liu
, Qingqing Ye
, Yang Liu
, Yuyang Wang
:
A Federated Learning Framework Based on Differentially Private Continuous Data Release. 4879-4894 - Hao Yang

, Shiyu Shen
, Wangchen Dai
, Lu Zhou
, Zhe Liu
, Yunlei Zhao
:
Phantom: A CUDA-Accelerated Word-Wise Homomorphic Encryption Library. 4895-4906 - Qi Cui

, Weixuan Tang
, Zhili Zhou
, Ruohan Meng
, Guoshun Nan
, Yun-Qing Shi:
Meta Security Metric Learning for Secure Deep Image Hiding. 4907-4920 - Hongyang Chen

, Pengfei Chen
, Guangba Yu
, Xiaoyun Li
, Zilong He
:
MicroFI: Non-Intrusive and Prioritized Request-Level Fault Injection for Microservice Applications. 4921-4938 - Xia Feng

, Haiyang Liu
, Haowei Yang
, Qingqing Xie
, Liangmin Wang
:
Batch-Aggregate: Efficient Aggregation for Private Federated Learning in VANETs. 4939-4952 - Alian Yu

, Jian Kang
, Joshua Morris
, Elisa Bertino
, Dan Lin
:
Fight Malware Like Malware: A New Defense Method Against Crypto Ransomware. 4953-4966 - Jinyin Chen

, Haibin Zheng
, Tao Liu
, Jiawei Liu
, Yao Cheng
, Xuhong Zhang
, Shouling Ji
:
EdgePro: Edge Deep Learning Model Protection via Neuron Authorization. 4967-4981 - Qiang Yang

, Kaiyan Cui
, Yuanqing Zheng
:
Room-Scale Voice Liveness Detection for Smart Devices. 4982-4996 - Wanlun Ma

, Yiliao Song
, Minhui Xue
, Sheng Wen
, Yang Xiang
:
The "Code" of Ethics: A Holistic Audit of AI Code Generators. 4997-5013 - Junke Duan

, Shihui Zheng
, Wei Wang
, Licheng Wang
, Xiaoya Hu
, Lize Gu
:
Concise RingCT Protocol Based on Linkable Threshold Ring Signature. 5014-5028 - Chuer Yu

, Xuhong Zhang
, Yuxuan Duan
, Senbo Yan
, Zonghui Wang
, Yang Xiang
, Shouling Ji
, Wenzhi Chen
:
Diff-ID: An Explainable Identity Difference Quantification Framework for DeepFake Detection. 5029-5045 - Haohua Duan

, Zedong Peng
, Liyao Xiang
, Yuncong Hu
, Bo Li
:
A Verifiable and Privacy-Preserving Federated Learning Training Framework. 5046-5058
Volume 21, Number 6, November - December 2024
- Wansen Wang

, Wenchao Huang
, Zhaoyi Meng
, Yan Xiong
, Cheng Su
:
Advancing the Automation Capability of Verifying Security Protocols. 5059-5070 - Fei Tong

, Yuanhang Zhou
, Kaiming Wang
, Guang Cheng
, Jianyu Niu
, Shibo He
:
A Privacy-Preserving Incentive Mechanism for Mobile Crowdsensing Based on Blockchain. 5071-5085 - Liangrong Zhao

, Jérémie Decouchant
, Joseph K. Liu
, Qinghua Lu
, Jiangshan Yu
:
Trusted Hardware-Assisted Leaderless Byzantine Fault Tolerance Consensus. 5086-5097 - Zeming Yao

, Hangtao Zhang
, Yicheng Guo
, Xin Tian
, Wei Peng
, Yi Zou
, Leo Yu Zhang
, Chao Chen
:
Reverse Backdoor Distillation: Towards Online Backdoor Attack Detection for Deep Neural Network Models. 5098-5111 - Jingyi Deng

, Chenhao Lin
, Pengbin Hu
, Chao Shen
, Qian Wang
, Qi Li
, Qiming Li
:
Towards Benchmarking and Evaluating Deepfake Detection. 5112-5127 - Aurelien T. Mozipo

, John M. Acken
:
Analysis of Countermeasures Against Remote and Local Power Side Channel Attacks using Correlation Power Analysis. 5128-5142 - Siqi Lu

, Hanjie Dong
, Zhaoxuan Li
, Laurence T. Yang
:
Not Just Summing: The Identifier Leakage of Private-Join-and-Compute and its Improvement. 5143-5155 - Patrick Lingga

, Jaehoon Jeong
, Jinhyuk Yang
, Jeonghyeon Kim
:
SPT: Security Policy Translator for Network Security Functions in Cloud-Based Security Services. 5156-5169 - Man Zeng

, Xiaohong Huang
, Pei Zhang
, Dandan Li
, Kun Xie
:
Improving Prefix Hijacking Defense of RPKI From an Evolutionary Game Perspective. 5170-5184 - Yongkai Fan

, Kaile Ma, Linlin Zhang
, Xia Lei, Guangquan Xu
, Gang Tan
:
ValidCNN: A Large-Scale CNN Predictive Integrity Verification Scheme Based on zk-SNARK. 5185-5195 - Zhaopin Su

, Guofu Zhang
, Zhiyuan Shi
, Donghui Hu
, Weiming Zhang
:
Message-Driven Generative Music Steganography Using MIDI-GAN. 5196-5207 - Sepideh Avizheh

, Mahmudun Nabi
, Reihaneh Safavi-Naini
:
Refereed Delegation of Computation Using Smart Contracts. 5208-5227 - Zhixiang Zhang

, Hanlin Zhang
, Xiangfu Song
, Jie Lin
, Fanyu Kong
:
Secure Outsourcing Evaluation for Sparse Decision Trees. 5228-5241 - Xinyu Zhang

, Huiyu Xu
, Zhongjie Ba
, Zhibo Wang
, Yuan Hong
, Jian Liu
, Zhan Qin
, Kui Ren
:
PrivacyAsst: Safeguarding User Privacy in Tool-Using Large Language Model Agents. 5242-5258 - Xutong Mu

, Ke Cheng
, Yulong Shen
, Xiaoxiao Li
, Zhao Chang
, Tao Zhang
, Xindi Ma
:
FedDMC: Efficient and Robust Federated Learning via Detecting Malicious Clients. 5259-5274 - Fenglu Zhang

, Baojun Liu
, Chaoyi Lu
, Yunpeng Xing
, Haixin Duan
, Ying Liu
, Liyuan Chang
:
Investigating Deployment Issues of DNS Root Server Instances From a China-Wide View. 5275-5292 - Sifan Wu

, Zhenguang Liu
, Beibei Zhang
, Roger Zimmermann
, Zhongjie Ba
, Xiaosong Zhang
, Kui Ren
:
Do as I Do: Pose Guided Human Motion Copy. 5293-5307 - Hang Liu

, Yang Ming
, Chenhao Wang
, Yi Zhao
, Yabin Li
:
Comments on "Enabling Verifiable Privacy-Preserving Multi-Type Data Aggregation in Smart Grids". 5308-5310 - Dinh Duc Nha Nguyen

, Keshav Sood
, Yong Xiang
, Longxiang Gao
, Lianhua Chi
, Gurpreet Singh
, Shui Yu
:
Design and Robust Evaluation of Next Generation Node Authentication Approach. 5311-5323 - Jiaxuan Fu

, Ke Cheng
, Zhao Chang
, Yulong Shen
:
PPA-DBSCAN: Privacy-Preserving $\rho$ρ-Approximate Density-Based Clustering. 5324-5340 - Jilin Hu

, Fanlang Zeng
, Yongwang Zhao
, Zhuoruo Zhang
, Leping Zhang
, Jianhong Zhao
, Rui Chang
, Kui Ren
:
ProveriT: A Parameterized, Composable, and Verified Model of TEE Protection Profile. 5341-5358 - Wenchao Li

, Willy Susilo
, Chunhe Xia
, Luqi Huang
, Fuchun Guo
, Tianbo Wang
:
Secure Data Integrity Check Based on Verified Public Key Encryption With Equality Test for Multi-Cloud Storage. 5359-5373 - Vittorio Orbinato

, Marco Carlo Feliciano
, Domenico Cotroneo
, Roberto Natella
:
Laccolith: Hypervisor-Based Adversary Emulation With Anti-Detection. 5374-5387 - Chenhao Xu

, Jiaqi Ge
, Yao Deng
, Longxiang Gao
, Mengshi Zhang
, Yong Li
, Wanlei Zhou
, Xi Zheng
:
BASS: A Blockchain-Based Asynchronous SignSGD Architecture for Efficient and Secure Federated Learning. 5388-5402 - Yijing Chen

, Hongxia Wang
, Wanjie Li
:
Constructing Immune-Cover for Improving Holistic Security of Spatial Adaptive Steganography. 5403-5419 - Haonan Yan

, Xiaoguang Li
, Wenjing Zhang
, Qian Chen
, Bin Wang
, Hui Li
, Xiaodong Lin
:
CODER: Protecting Privacy in Image Retrieval With Differential Privacy. 5420-5430 - Chenghui Shi

, Shouling Ji
, Xudong Pan
, Xuhong Zhang
, Mi Zhang
, Min Yang
, Jun Zhou
, Jianwei Yin
, Ting Wang
:
Towards Practical Backdoor Attacks on Federated Learning Systems. 5431-5447 - Muhammad Saad

, David Mohaisen
:
Analyzing In-Browser Cryptojacking. 5448-5460 - Sagarika Ghosh

, Marzia Zaman
, Rohit Joshi
, Srinivas Sampalli
:
Multi-Phase Quantum Resistant Framework for Secure Communication in SCADA Systems. 5461-5478 - Yandong Zheng

, Rongxing Lu
, Songnian Zhang
, Jun Shao
, Hui Zhu
:
Achieving Practical and Privacy-Preserving kNN Query Over Encrypted Data. 5479-5492 - Xiao Chen

, Tiejun Ma
, Btissam Er-Rahmadi
, Jane Hillston
, Guanxu Yuan
:
Parallel Byzantine Consensus Based on Hierarchical Architecture and Trusted Hardware. 5493-5508 - Gaolei Fei

, Yang Liu, Guangmin Hu
, Sheng Wen
, Yang Xiang
:
Online Social Network User Home Location Inference Based on Heterogeneous Networks. 5509-5525 - Wanlun Ma

, Derui Wang
, Chao Chen
, Sheng Wen
, Gaolei Fei
, Yang Xiang
:
LocGuard: A Location Privacy Defender for Image Sharing. 5526-5537 - Mengxi Jiang

, Yulei Sui
, Yunqi Lei
, Xiaofei Xie
, Cuihua Li, Yang Liu
, Ivor W. Tsang
:
Adversarial Learning for Coordinate Regression Through $k$k-Layer Penetrating Representation. 5538-5552 - Chongyang Gao

, Sushil Jajodia
, Andrea Pugliese
, V. S. Subrahmanian
:
${\sf FakeDB}$FakeDB: Generating Fake Synthetic Databases. 5553-5564 - Kai-Fung Chu

, Weisi Guo
:
Multi-Agent Reinforcement Learning-Based Passenger Spoofing Attack on Mobility-as-a-Service. 5565-5581 - Ruiwen He

, Yushi Cheng
, Junning Ze
, Xinfeng Li
, Xiaoyu Ji
, Wenyuan Xu
:
Scoring Metrics of Assessing Voiceprint Distinctiveness Based on Speech Content and Rate. 5582-5599 - Yin Zhu

, Junqing Gong
, Kai Zhang
, Haifeng Qian
:
Malicious-Resistant Non-Interactive Verifiable Aggregation for Federated Learning. 5600-5616 - Yang Xu

, Jianbo Shao
, Jia Liu
, Yulong Shen
, Tarik Taleb
, Norio Shiratori
:
BWKA: A Blockchain-Based Wide-Area Knowledge Acquisition Ecosystem. 5617-5634 - Wei Peng

, Xiang Li
, Jianyu Niu
, Xiaokuan Zhang
, Yinqian Zhang
:
Ensuring State Continuity for Confidential Computing: A Blockchain-Based Approach. 5635-5649 - Chenqi Kong

, Kexin Zheng
, Yibing Liu
, Shiqi Wang
, Anderson Rocha
, Haoliang Li
:
M$^{3}$3FAS: An Accurate and Robust MultiModal Mobile Face Anti-Spoofing System. 5650-5666 - Lei Zhang

, Jiangtao Li
, Yafang Yang
:
Message Linkable Group Signature With Information Binding and Efficient Revocation for Privacy- Preserving Announcement in VANETs. 5667-5680 - Yunxia Han

, Chunxiang Xu
, Changsong Jiang
, Kefei Chen
:
A Secure Two-Factor Authentication Key Exchange Scheme. 5681-5693 - Rahul Saha

, Gulshan Kumar
, G. Geetha
, Mauro Conti
, William J. Buchanan
:
Application of Randomness for Security and Privacy in Multi-Party Computation. 5694-5705 - Jianqing Liu

, Na Gong
, Hritom Das
:
Two Birds With One Stone: Differential Privacy by Low-Power SRAM Memory. 5706-5719 - Xiangshan Gao

, Xingjun Ma
, Jingyi Wang
, Youcheng Sun
, Bo Li, Shouling Ji
, Peng Cheng
, Jiming Chen
:
VeriFi: Towards Verifiable Federated Unlearning. 5720-5736 - Yuming Feng

, Yu Zhang
, Hui He
, Weizhe Zhang
, Desheng Wang
:
An IoT Device Identification Method Using Extracted Fingerprint From Sequence of Traffic Grayscale Images. 5737-5754 - Mohammed Shujaa Aldeen

, Chuan Zhao
, Zhenxiang Chen
, Liming Fang
, Zhe Liu
:
Privacy-Preserving Collaborative Learning for Genome Analysis via Secure XGBoost. 5755-5765 - Yong Liu

, Hanzhou Wu
, Xinpeng Zhang
:
Robust and Imperceptible Black-Box DNN Watermarking Based on Fourier Perturbation Analysis and Frequency Sensitivity Clustering. 5766-5780 - Xinyuan Qian

, Hongwei Li
, Meng Hao
, Guowen Xu
, Haoyong Wang
, Yuguang Fang
:
Decentralized Multi-Client Functional Encryption for Inner Product With Applications to Federated Learning. 5781-5796 - Qingyang Zhang

, Yujie Fu
, Jie Cui
, Debiao He
, Hong Zhong
:
Efficient Fine-Grained Data Sharing Based on Proxy Re-Encryption in IIoT. 5797-5809

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














