


default search action
IEEE Transactions on Dependable and Secure Computing, Volume 19
Volume 19, Number 1, January - February 2022
- Ayyoob Hamza

, Dinesha Ranathunga
, Hassan Habibi Gharakheili
, Theophilus A. Benson
, Matthew Roughan
, Vijay Sivaraman
:
Verifying and Monitoring IoTs Network Behavior Using MUD Profiles. 1-18 - Zhou Su

, Yuntao Wang
, Qichao Xu
, Ning Zhang
:
LVBS: Lightweight Vehicular Blockchain for Secure Data Sharing in Disaster Rescue. 19-32 - Dan Brownstein

, Shlomi Dolev
, Muni Venkateswarlu Kumaramangalam
:
Self-Stabilizing Secure Computation. 33-38 - Mohamed Baza, Mahmoud Nabil, Mohamed M. E. A. Mahmoud, Niclas Bewermeier, Kemal Fidan, Waleed Alasmary, Mohamed Abdallah:

Detecting Sybil Attacks Using Proofs of Work and Location in VANETs. 39-53 - Gurjit Singh Walia

, Kartik Aggarwal
, Kuldeep Singh
, Kunwar Singh:
Design and Analysis of Adaptive Graph-Based Cancelable Multi-Biometrics Approach. 54-66 - Jin Li

, Heng Ye
, Tong Li
, Wei Wang
, Wenjing Lou
, Y. Thomas Hou
, Jiqiang Liu
, Rongxing Lu
:
Efficient and Secure Outsourcing of Differentially Private Data Publishing With Multiple Evaluators. 67-76 - Yao Cheng

, Chang Xu
, Zhen Hai
, Yingjiu Li
:
DeepMnemonic: Password Mnemonic Generation via Deep Attentive Encoder-Decoder Model. 77-90 - Rui Li

, Alex X. Liu
, Huanle Xu
, Ying Liu, Huaqiang Yuan:
Adaptive Secure Nearest Neighbor Query Processing Over Encrypted Data. 91-106 - Guillermo Suarez-Tangil

, Gianluca Stringhini:
Eight Years of Rider Measurement in the Android Malware Ecosystem. 107-118 - Yannan Li

, Willy Susilo
, Guomin Yang
, Yong Yu
, Dongxi Liu, Xiaojiang Du
, Mohsen Guizani
:
A Blockchain-Based Self-Tallying Voting Protocol in Decentralized IoT. 119-130 - Qingyu Yang, Donghe Li, Dou An, Wei Yu

, Xinwen Fu
, Xinyu Yang, Wei Zhao
:
Towards Incentive for Electrical Vehicles Demand Response With Location Privacy Guaranteeing in Microgrids. 131-148 - Jinhua Ma

, Xinyi Huang
, Yi Mu
, Robert H. Deng
:
Authenticated Data Redaction With Accountability and Transparency. 149-160 - Mohamad Chehab

, Azzam Mourad
:
LP-SBA-XACML: Lightweight Semantics Based Scheme Enabling Intelligent Behavior-Aware Privacy for IoT. 161-175 - Sateesh Kumar Awasthi

, Yatindra Nath Singh
:
AbsoluteTrust: Algorithm for Aggregation of Trust in Peer-to-Peer Networks. 176-189 - Yanhua Du

, Yang Wang, Benyuan Yang
, Hesuan Hu
:
Analyzing Security Requirements in Timed Workflow Processes. 190-207 - Xing Gao

, Guannan Liu
, Zhang Xu, Haining Wang
, Li Li, Xiaorui Wang
:
Investigating Security Vulnerabilities in a Hot Data Center with Reduced Cooling Redundancy. 208-226 - Ahmad Samer Wazan

, Romain Laborde
, David W. Chadwick
, Rémi Venant, Abdelmalek Benzekri, Eddie Billoir
, Omar Alfandi
:
On the Validation of Web X.509 Certificates by TLS Interception Products. 227-242 - Lucas Palazzi

, Guanpeng Li
, Bo Fang, Karthik Pattabiraman
:
Improving the Accuracy of IR-Level Fault Injection. 243-258 - Yuchen Zhao

, Isabel Wagner
:
Using Metrics Suites to Improve the Measurement of Privacy in Graphs. 259-274 - Kyungmin Go

, Il-Gu Lee, Sungwon Kang
, Myungchul Kim
:
Secure Video Transmission Framework for Battery-Powered Video Devices. 275-287 - Fritz Previlon

, Charu Kalra
, Devesh Tiwari, David R. Kaeli
:
Characterizing and Exploiting Soft Error Vulnerability Phase Behavior in GPU Applications. 288-300 - Cheng Wang

, Hangyu Zhu
:
Representing Fine-Grained Co-Occurrences for Behavior-Based Fraud Detection in Online Payment Services. 301-315 - Dezhi Han

, Nannan Pan
, Kuan-Ching Li
:
A Traceable and Revocable Ciphertext-Policy Attribute-based Encryption Scheme Based on Privacy Protection. 316-327 - Cong Zuo

, Shifeng Sun
, Joseph K. Liu
, Jun Shao
, Josef Pieprzyk
, Lei Xu
:
Forward and Backward Private DSSE for Range Queries. 328-338 - Rajorshi Biswas

, Jie Wu
:
Optimal Filter Assignment Policy Against Distributed Denial-of-Service Attack. 339-352 - Ruimin Sun

, Marcus Botacin
, Nikolaos Sapountzis, Xiaoyong Yuan
, Matt Bishop
, Donald E. Porter, Xiaolin Li
, Andre Gregio
, Daniela Oliveira
:
A Praise for Defensive Programming: Leveraging Uncertainty for Effective Malware Mitigation. 353-369 - Yunqing Sun, Jin Cao

, Maode Ma
, Yinghui Zhang
, Hui Li
, Ben Niu
:
EAP-DDBA: Efficient Anonymity Proximity Device Discovery and Batch Authentication Mechanism for Massive D2D Communication Devices in 3GPP 5G HetNet. 370-387 - Yanguo Peng

, Long Wang
, Jiangtao Cui
, Ximeng Liu
, Hui Li
, Jianfeng Ma:
LS-RQ: A Lightweight and Forward-Secure Range Query on Geographically Encrypted Data. 388-401 - Sadegh Torabi

, Elias Bou-Harb
, Chadi Assi
, ElMouatez Billah Karbab, Amine Boukhtouta, Mourad Debbabi
:
Inferring and Investigating IoT-Generated Scanning Campaigns Targeting a Large Network Telescope. 402-418 - Yansong Gao

, Marten van Dijk, Lei Xu
, Wei Yang
, Surya Nepal
, Damith C. Ranasinghe
:
TREVERSE: TRial-and-Error Lightweight Secure ReVERSE Authentication With Simulatable PUFs. 419-437 - Shigang Liu

, Guanjun Lin
, Lizhen Qu, Jun Zhang
, Olivier Y. de Vel, Paul Montague, Yang Xiang
:
CD-VulD: Cross-Domain Vulnerability Discovery Based on Deep Domain Adaptation. 438-451 - Shifeng Sun

, Cong Zuo
, Joseph K. Liu
, Amin Sakzad
, Ron Steinfeld, Tsz Hon Yuen
, Xingliang Yuan
, Dawu Gu
:
Non-Interactive Multi-Client Searchable Encryption: Realization and Implementation. 452-467 - Lotfi Ben Othmane

, Lalitha Dhulipala, Moataz AbdelKhalek, Nicholas J. Multari
, Manimaran Govindarasu:
On the Performance of Detecting Injection of Fabricated Messages into the CAN Bus. 468-481 - Dinesha Ranathunga

, Matthew Roughan
, Hung X. Nguyen
:
Verifiable Policy-Defined Networking Using Metagraphs. 482-494 - Felix Erlacher

, Falko Dressler
:
On High-Speed Flow-Based Intrusion Detection Using Snort-Compatible Signatures. 495-506 - Chenyu Wang, Ding Wang

, Yi Tu
, Guoai Xu
, Huaxiong Wang
:
Understanding Node Capture Attacks in User Authentication Schemes for Wireless Sensor Networks. 507-523 - Naman Patel

, Prashanth Krishnamurthy
, Hussam Amrouch
, Jörg Henkel
, Michael Shamouilian
, Ramesh Karri
, Farshad Khorrami
:
Towards a New Thermal Monitoring Based Framework for Embedded CPS Device Security. 524-536 - Klaus-Tycho Foerster

, Andrzej Kamisinski
, Yvonne-Anne Pignolet
, Stefan Schmid
, Gilles Trédan:
Improved Fast Rerouting Using Postprocessing. 537-550 - Chunlin Xiong

, Tiantian Zhu
, Weihao Dong
, Linqi Ruan
, Runqing Yang
, Yueqiang Cheng
, Yan Chen, Shuai Cheng, Xutong Chen
:
Conan: A Practical Real-Time APT Detection System With High Accuracy and Efficiency. 551-565 - George Theodorakopoulos

, Emmanouil Panaousis
, Kaitai Liang
, George Loukas
:
On-the-Fly Privacy for Location Histograms. 566-578 - Ruiyu Zhu

, Yan Huang
:
Efficient and Precise Secure Generalized Edit Distance and Beyond. 579-590 - Xue Yang

, Rongxing Lu
, Jun Shao
, Xiaohu Tang
, Ali A. Ghorbani
:
Achieving Efficient Secure Deduplication With User-Defined Access Control in Cloud. 591-606 - Yi He, Yuan Zhou, Yajin Zhou, Qi Li, Kun Sun

, Yacong Gu, Yong Jiang:
JNI Global References Are Still Vulnerable: Attacks and Defenses. 607-619 - Yue Li

, Zeyu Chen, Haining Wang
, Kun Sun
, Sushil Jajodia
:
Understanding Account Recovery in the Wild and its Security Implications. 620-634 - Kaiping Xue

, Na Gai, Jianan Hong, David S. L. Wei, Peilin Hong
, Nenghai Yu
:
Efficient and Secure Attribute-Based Access Control With Identical Sub-Policies Frequently Used in Cloud Storage. 635-646 - Yanxue Jia

, Shifeng Sun
, Yuncong Zhang
, Qingzhao Zhang, Ning Ding, Zhiqiang Liu
, Joseph K. Liu
, Dawu Gu
:
${\sf PBT}$PBT: A New Privacy-Preserving Payment Protocol for Blockchain Transactions. 647-662 - Harishma Boyapally

, Paulson Mathew
, Sikhar Patranabis
, Urbi Chatterjee
, Umang Agarwal, Manu Maheshwari, Soumyajit Dey
, Debdeep Mukhopadhyay:
Safe is the New Smart: PUF-Based Authentication for Load Modification-Resistant Smart Meters. 663-680 - Ze Wang, Jingqiang Lin

, Quanwei Cai
, Qiongxiao Wang, Daren Zha, Jiwu Jing:
Blockchain-Based Certificate Transparency and Revocation Transparency. 681-697 - Shabnam Kasra Kermanshahi

, Shifeng Sun
, Joseph K. Liu
, Ron Steinfeld, Surya Nepal
, Wang Fat Lau, Man Ho Allen Au
:
Geometric Range Search on Encrypted Data With Forward/Backward Security. 698-716
Volume 19, Number 2, March - April 2022
- Yunji Liang

, Qiushi Wang
, Kang Xiong, Xiaolong Zheng
, Zhiwen Yu
, Daniel Zeng:
Robust Detection of Malicious URLs With Self-Paced Wide & Deep Learning. 717-730 - Azqa Nadeem

, Sicco Verwer
, Stephen Moskal, Shanchieh Jay Yang:
Alert-Driven Attack Graph Generation Using S-PDFA. 731-746 - Rohit Valecha

, Pranali Mandaokar, H. Raghav Rao
:
Phishing Email Detection Using Persuasion Cues. 747-756 - Huiling Li

, Jun Wu
, Hansong Xu
, Gaolei Li
, Mohsen Guizani
:
Explainable Intelligence-Driven Defense Mechanism Against Advanced Persistent Threats: A Joint Edge Game and AI Approach. 757-775 - Yi-Ting Huang

, Chi Yu Lin
, Ying-Ren Guo
, Kai-Chieh Lo, Yeali S. Sun, Meng Chang Chen
:
Open Source Intelligence for Malicious Behavior Discovery and Interpretation. 776-789 - Yidong Chai

, Yonghang Zhou, Weifeng Li
, Yuanchun Jiang
:
An Explainable Multi-Modal Hierarchical Attention Model for Developing Phishing Threat Intelligence. 790-803 - Md Shihabul Islam

, Bo Dong, Swarup Chandra, Latifur Khan, Bhavani Thuraisingham:
GCI: A GPU-Based Transfer Learning Approach for Detecting Cheats of Computer Game. 804-816 - Matheus E. Garbelini

, Chundong Wang
, Sudipta Chattopadhyay
:
Greyhound: Directed Greybox Wi-Fi Fuzzing. 817-834 - Osman Biçer, Muhammed Ali Bingöl

, Mehmet Sabir Kiraz
, Albert Levi
:
Highly Efficient and Re-Executable Private Function Evaluation With Linear Complexity. 835-847 - Eduardo Chielle

, Nektarios Georgios Tsoutsos
, Oleg Mazonka
, Michail Maniatakos
:
E3X: Encrypt-Everything-Everywhere ISA eXtensions for Private Computation. 848-861 - Guangquan Xu

, Xiaofei Xie
, Shuhan Huang
, Jun Zhang
, Lei Pan
, Wei Lou
, Kaitai Liang
:
JSCSP: A Novel Policy-Based XSS Defense Mechanism for Browsers. 862-878 - Zhihai Yang

, Qindong Sun, Yaling Zhang:
Probabilistic Inference and Trustworthiness Evaluation of Associative Links Toward Malicious Attack Detection for Online Recommendations. 879-896 - Xin Liao

, Jiaojiao Yin, Mingliang Chen
, Zheng Qin
:
Adaptive Payload Distribution in Multiple Images Steganography Based on Image Texture Features. 897-911 - Xiaogang Zhu

, Xiaotao Feng, Xiaozhu Meng, Sheng Wen
, Seyit Camtepe
, Yang Xiang
, Kui Ren:
CSI-Fuzz: Full-Speed Edge Tracing Using Coverage Sensitive Instrumentation. 912-923 - Vlad Craciun

, Pascal Felber
, Andrei Mogage
, Emanuel Onica
, Rafael Pires
:
Malware in the SGX Supply Chain: Be Careful When Signing Enclaves! 924-935 - Longxia Huang

, Junlong Zhou
, Gongxuan Zhang, Jin Sun
, Tongquan Wei
, Shui Yu
, Shiyan Hu
:
IPANM: Incentive Public Auditing Scheme for Non-Manager Groups in Clouds. 936-952 - Derui Wang

, Chaoran Li
, Sheng Wen
, Surya Nepal
, Yang Xiang
:
Defending Against Adversarial Attack Towards Deep Neural Networks Via Collaborative Multi-Task Training. 953-965 - Pedro Reviriego

, Jorge Martínez
, Ori Rottenstreich
, Shanshan Liu
, Fabrizio Lombardi
:
Remove Minimum (RM): An Error-Tolerant Scheme for Cardinality Estimate by HyperLogLog. 966-977 - Bing Chen, Wei Lu

, Jiwu Huang
, Jian Weng
, Yicong Zhou
:
Secret Sharing Based Reversible Data Hiding in Encrypted Images With Multiple Data-Hiders. 978-991 - Zhaoxia Yin

, Yinyin Peng
, Youzhi Xiang
:
Reversible Data Hiding in Encrypted Images Based on Pixel Prediction and Bit-Plane Compression. 992-1002 - Lingjuan Lyu

, Yitong Li
, Karthik Nandakumar
, Jiangshan Yu
, Xingjun Ma
:
How to Democratise and Protect AI: Fair and Differentially Private Decentralised Deep Learning. 1003-1017 - Onur Duman

, Mengyuan Zhang, Lingyu Wang
, Mourad Debbabi
, Ribal F. Atallah, Bernard Lebel
:
Factor of Security (FoS): Quantifying the Security Effectiveness of Redundant Smart Grid Subsystems. 1018-1035 - Jianting Ning

, Xinyi Huang
, Willy Susilo
, Kaitai Liang
, Ximeng Liu
, Yinghui Zhang
:
Dual Access Control for Cloud-Based Data Storage and Sharing. 1036-1048 - Mazen Al-Wadi, Kazi Abu Zubair, David Mohaisen

, Amro Awad
:
Phoenix: Towards Ultra-Low Overhead, Recoverable, and Persistently Secure NVM. 1049-1063 - Shengmin Xu

, Jianting Ning
, Yingjiu Li
, Yinghui Zhang
, Guowen Xu
, Xinyi Huang
, Robert H. Deng
:
Match in My Way: Fine-Grained Bilateral Access Control for Secure Cloud-Fog Computing. 1064-1077 - Shahram Khazaei, Mojtaba Rafiee

:
Towards More Secure Constructions of Adjustable Join Schemes. 1078-1089 - Yandong Zheng

, Rongxing Lu
, Yunguo Guan
, Jun Shao
, Hui Zhu
:
Achieving Efficient and Privacy-Preserving Exact Set Similarity Search over Encrypted Data. 1090-1103 - Ning Xie

, Zhuoyuan Li, Jie Tan, Alex X. Liu
:
Detection of Information Hiding at Physical Layer in Wireless Communications. 1104-1117 - Lei Zhou, Anmin Fu

, Guomin Yang
, Huaqun Wang
, Yuqing Zhang
:
Efficient Certificateless Multi-Copy Integrity Auditing Scheme Supporting Data Dynamics. 1118-1132 - Meng Li

, Yifei Chen
, Shuli Zheng, Donghui Hu
, Chhagan Lal
, Mauro Conti
:
Privacy-Preserving Navigation Supporting Similar Queries in Vehicular Networks. 1133-1148 - Jiayun Xu

, Yingjiu Li
, Robert H. Deng
, Ke Xu
:
SDAC: A Slow-Aging Solution for Android Malware Detection Using Semantic Distance Based API Clustering. 1149-1163 - Jianting Ning

, Geong Sen Poh
, Xinyi Huang
, Robert H. Deng
, Shuwei Cao, Ee-Chien Chang:
Update Recovery Attacks on Encrypted Database Within Two Updates Using Range Queries Leakage. 1164-1180 - Yazdan Movahedi

, Michel Cukier
, Ilir Gashi
:
Predicting the Discovery Pattern of Publically Known Exploited Vulnerabilities. 1181-1193 - Harshan Jagadeesh

, Amogh Vithalkar, Naman Jhunjhunwala
, Manthan Kabra
, Prafull Manav
, Yih-Chun Hu
:
Double-Edge Embedding Based Provenance Recovery for Low-Latency Applications in Wireless Networks. 1194-1211 - Dayong Ye

, Tianqing Zhu
, Sheng Shen
, Wanlei Zhou
, Philip S. Yu
:
Differentially Private Multi-Agent Planning for Logistic-Like Problems. 1212-1226 - Dariush Abbasinezhad-Mood

, Sayyed Majid Mazinani
, Morteza Nikooghadam
, Arezou Ostad-Sharif
:
Efficient Provably-Secure Dynamic ID-Based Authenticated Key Agreement Scheme With Enhanced Security Provision. 1227-1238 - Fabrizio Cicala

, Elisa Bertino
:
Analysis of Encryption Key Generation in Modern Crypto Ransomware. 1239-1253 - Mandrita Banerjee

, Carlo Borges, Kim-Kwang Raymond Choo
, Junghee Lee
, Chrysostomos Nicopoulos
:
A Hardware-Assisted Heartbeat Mechanism for Fault Identification in Large-Scale IoT Systems. 1254-1265 - Yang Liu

, Tong Feng, Mugen Peng
, Jianfeng Guan
, Yu Wang
:
DREAM: Online Control Mechanisms for Data Aggregation Error Minimization in Privacy-Preserving Crowdsensing. 1266-1279 - Jianye Huang

, Willy Susilo
, Fuchun Guo
, Ge Wu
, Zhen Zhao
, Qiong Huang
:
An Anonymous Authentication System for Pay-As-You-Go Cloud Computing$^*$*. 1280-1291 - Djamel Eddine Kouicem, Youcef Imine

, Abdelmadjid Bouabdallah, Hicham Lakhlef
:
Decentralized Blockchain-Based Trust Management Protocol for the Internet of Things. 1292-1306 - Bernardo Ferreira

, Bernardo Portela
, Tiago Oliveira
, Guilherme Borges
, Henrique João L. Domingos
, João Leitão
:
Boolean Searchable Symmetric Encryption With Filters on Trusted Hardware. 1307-1319 - Haining Yang

, Ye Su
, Jing Qin
, Huaxiong Wang
:
Privacy-Preserving Outsourced Inner Product Computation on Encrypted Database. 1320-1337 - Shuming Qiu

, Ding Wang
, Guoai Xu
, Saru Kumari
:
Practical and Provably Secure Three-Factor Authentication Protocol Based on Extended Chaotic-Maps for Mobile Lightweight Devices. 1338-1351 - Benyuan Yang

, Hesuan Hu
:
Dynamic Implementation of Security Requirements in Business Processes. 1352-1363 - Guowen Xu

, Hongwei Li
, Yun Zhang, Shengmin Xu, Jianting Ning
, Robert H. Deng
:
Privacy-Preserving Federated Deep Learning With Irregular Users. 1364-1381 - Zi-Long Liu

, Chi-Man Pun
:
Reversible Data Hiding in Encrypted Images using Chunk Encryption and Redundancy Matrix Representation. 1382-1394 - Wenlong Tian

, Ruixuan Li
, Zhiyong Xu, Weijun Xiao:
Loco-Store: Locality-Based Oblivious Data Storage. 1395-1406 - Maryam Zarezadeh, Hamid Mala

, Behrouz Tork Ladani
:
Efficient Secure Pattern Matching With Malicious Adversaries. 1407-1419 - Yang Du

, Zhaoxia Yin
, Xinpeng Zhang
:
High Capacity Lossless Data Hiding in JPEG Bitstream Based on General VLC Mapping. 1420-1433
Volume 19, Number 3, May - June 2022
- Yanhai Xiong

, Giridhar Ramachandran, Rajesh Ganesan
, Sushil Jajodia
, V. S. Subrahmanian
:
Generating Realistic Fake Equations in Order to Reduce Intellectual Property Theft. 1434-1445 - Zhangshuang Guan

, Zhiguo Wan
, Yang Yang
, Yan Zhou, Butian Huang:
BlockMaze: An Efficient Privacy-Preserving Account-Model Blockchain Based on zk-SNARKs. 1446-1463 - Jian Shen

, Ziyuan Gui
, Xiaofeng Chen
, Jun Zhang
, Yang Xiang
:
Lightweight and Certificateless Multi-Receiver Secure Data Transmission Protocol for Wireless Body Area Networks. 1464-1475 - Domenico Cotroneo

, Luigi De Simone
, Pietro Liguori
, Roberto Natella
:
Fault Injection Analytics: A Novel Approach to Discover Failure Modes in Cloud-Computing Systems. 1476-1491 - Fengwei Wang

, Hui Zhu
, Rongxing Lu
, Yandong Zheng
, Hui Li
:
Achieve Efficient and Privacy-Preserving Disease Risk Assessment Over Multi-Outsourced Vertical Datasets. 1492-1504 - Saiyu Qi

, Yuanqing Zheng
, Xiaofeng Chen
, Wei Wei
:
Ants can Carry Cheese: Secure and Private RFID-Enabled Third-Party Distribution. 1505-1517 - Jia-Nan Liu

, Xizhao Luo
, Jian Weng
, Anjia Yang
, Xu An Wang
, Ming Li
, Xiaodong Lin
:
Enabling Efficient, Secure and Privacy-Preserving Mobile Cloud Storage. 1518-1531 - Hongbo Li

, Qiong Huang
, Willy Susilo
:
A Secure Cloud Data Sharing Protocol for Enterprise Supporting Hierarchical Keyword Search. 1532-1543 - Shuitao Gan

, Chao Zhang
, Xiaojun Qin, Xuwen Tu, Kang Li
, Zhongyu Pei, Zuoning Chen:
Path Sensitive Fuzzing for Native Applications. 1544-1561 - Mingfu Xue

, Can He
, Jian Wang, Weiqiang Liu
:
One-to-N & N-to-One: Two Advanced Backdoor Attacks Against Deep Learning Models. 1562-1578 - Zheli Liu

, Siyi Lv, Jin Li
, Yanyu Huang
, Liang Guo
, Yali Yuan, Changyu Dong
:
EncodeORE: Reducing Leakage and Preserving Practicality in Order-Revealing Encryption. 1579-1591 - Minghui Li

, Sherman S. M. Chow
, Shengshan Hu
, Yuejing Yan, Chao Shen, Qian Wang
:
Optimizing Privacy-Preserving Outsourced Convolutional Neural Network Predictions. 1592-1604 - Christian Berger

, Hans P. Reiser
, João Sousa, Alysson Bessani
:
AWARE: Adaptive Wide-Area Replication for Fast and Resilient Byzantine Consensus. 1605-1620 - Runqing Yang

, Xutong Chen
, Haitao Xu
, Yueqiang Cheng
, Chunlin Xiong
, Linqi Ruan
, Mohammad Kavousi
, Zhenyuan Li
, Liheng Xu, Yan Chen
:
RATScope: Recording and Reconstructing Missing RAT Semantic Behaviors for Forensic Analysis on Windows. 1621-1638 - Qiang Wang

, Fucai Zhou
, Boyang Zhou
, Jian Xu
, Chunyu Chen, Qi Wang:
Privacy-Preserving Publicly Verifiable Databases. 1639-1654 - Matthias Eckhart

, Andreas Ekelhart
, Edgar R. Weippl
:
Automated Security Risk Identification Using AutomationML-Based Engineering Data. 1655-1672 - Sandeep Nair Narayanan

, Anupam Joshi
, Ranjan Bose:
ABATe: Automatic Behavioral Abstraction Technique to Detect Anomalies in Smart Cyber-Physical Systems. 1673-1686 - Xiaoning Liu

, Yifeng Zheng
, Xun Yi
, Surya Nepal
:
Privacy-Preserving Collaborative Analytics on Medical Time Series Data. 1687-1702 - Chaoyue Niu

, Fan Wu
, Shaojie Tang
, Shuai Ma
, Guihai Chen:
Toward Verifiable and Privacy Preserving Machine Learning Prediction. 1703-1721 - Milan Stute

, Florian Kohnhäuser, Lars Baumgärtner
, Lars Almon
, Matthias Hollick
, Stefan Katzenbeisser, Bernd Freisleben
:
RESCUE: A Resilient and Secure Device-to-Device Communication Framework for Emergencies. 1722-1734 - Haishou Ma, Yi Xie

, Shensheng Tang
, Jiankun Hu
, Xingcheng Liu
:
Threat-Event Detection for Distributed Networks Based on Spatiotemporal Markov Random Field. 1735-1752 - Jianbing Ni

, Kuan Zhang
, Yong Yu
, Tingting Yang
:
Identity-Based Provable Data Possession From RSA Assumption for Secure Cloud Storage. 1753-1769 - Anomadarshi Barua

, Deepan Muthirayan
, Pramod P. Khargonekar
, Mohammad Abdullah Al Faruque
:
Hierarchical Temporal Memory-Based One-Pass Learning for Real-Time Anomaly Detection and Simultaneous Data Prediction in Smart Grids. 1770-1782 - Atif Saeed

, Peter Garraghan
, Syed Asad Hussain
:
Cross-VM Network Channel Attacks and Countermeasures Within Cloud Computing Environments. 1783-1794 - Haijun Wang, Ye Liu

, Yi Li
, Shangwei Lin
, Cyrille Artho
, Lei Ma
, Yang Liu
:
Oracle-Supported Dynamic Exploit Generation for Smart Contracts. 1795-1809 - Ji-Ming Chen

, Xiangshan Gao, Ruilong Deng
, Yang He, Chongrong Fang
, Peng Cheng
:
Generating Adversarial Examples Against Machine Learning-Based Intrusion Detector in Industrial Control Systems. 1810-1825 - Binbin Zhao

, Shouling Ji
, Wei-Han Lee, Changting Lin
, Haiqin Weng, Jingzheng Wu, Pan Zhou
, Liming Fang
, Raheem Beyah:
A Large-Scale Empirical Study on the Vulnerability of Deployed IoT Devices. 1826-1840 - Yifeng Zheng

, Huayi Duan
, Cong Wang
, Ruochen Wang, Surya Nepal
:
Securely and Efficiently Outsourcing Decision Tree Inference. 1841-1855 - Intae Kim

, Willy Susilo
, Joonsang Baek
, Jongkil Kim:
Harnessing Policy Authenticity for Hidden Ciphertext Policy Attribute-Based Encryption. 1856-1870 - Shuzhou Sun

, Hui Ma
, Zishuai Song, Rui Zhang
:
WebCloud: Web-Based Cloud Storage for Secure Data Sharing Across Platforms. 1871-1884 - Zengpeng Li

, Ding Wang
, Eduardo Morais:
Quantum-Safe Round-Optimal Password Authentication for Mobile Devices. 1885-1899 - Huaijin Wang

, Shuai Wang
, Dongpeng Xu, Xiangyu Zhang
, Xiao Liu:
Generating Effective Software Obfuscation Sequences With Reinforcement Learning. 1900-1917 - Bo Jiang

, Ming Li
, Ravi Tandon
:
Local Information Privacy and Its Application to Privacy-Preserving Data Aggregation. 1918-1935 - Orly Stan

, Ron Bitton
, Michal Ezrets, Moran Dadon, Masaki Inokuchi, Yoshinobu Ohta, Tomohiko Yagyu, Yuval Elovici
, Asaf Shabtai
:
Extending Attack Graphs to Represent Cyber-Attacks in Communication Protocols and Modern IT Networks. 1936-1954 - Lei Zhao

, Pengcheng Cao, Yue Duan
, Heng Yin
, Jifeng Xuan
:
Probabilistic Path Prioritization for Hybrid Fuzzing. 1955-1973 - Ning Lu

, Yuan Chang
, Wenbo Shi, Kim-Kwang Raymond Choo
:
CoinLayering: An Efficient Coin Mixing Scheme for Large Scale Bitcoin Transactions. 1974-1987 - Behrooz Sangchoolie

, Karthik Pattabiraman
, Johan Karlsson
:
An Empirical Study of the Impact of Single and Multiple Bit-Flip Errors in Programs. 1988-2006 - Huadi Zheng

, Qingqing Ye
, Haibo Hu
, Chengfang Fang, Jie Shi:
Protecting Decision Boundary of Machine Learning Model With Differentially Private Perturbation. 2007-2022 - Zheli Liu

, Yanyu Huang
, Xiangfu Song
, Bo Li, Jin Li
, Yali Yuan
, Changyu Dong
:
Eurus: Towards an Efficient Searchable Symmetric Encryption With Size Pattern Protection. 2023-2037 - Yanjiao Chen

, Xin Tian, Qian Wang
, Jianlin Jiang
, Minghui Li
, Qian Zhang
:
SAFE: A General Secure and Fair Auction Framework for Wireless Markets With Privacy Preservation. 2038-2053 - Junjiao Liu

, Xiaodong Lin
, Xin Chen, Hui Wen, Hong Li
, Yan Hu, Jiawei Sun, Zhiqiang Shi, Limin Sun:
ShadowPLCs: A Novel Scheme for Remote Detection of Industrial Process Control Attacks. 2054-2069 - Yizhong Liu

, Jianwei Liu
, Qianhong Wu
, Hui Yu, Yiming Hei
, Ziyu Zhou:
SSHC: A Secure and Scalable Hybrid Consensus Protocol for Sharding Blockchains With a Formal Security Framework. 2070-2088 - Hu Xiong

, Jinhao Chen
, Qian Mei
, Yanan Zhao
:
Conditional Privacy-Preserving Authentication Protocol With Dynamic Membership Updating for VANETs. 2089-2104 - Reem M. Albarrak, Daniel A. Menascé

:
Trust But Verify: A Framework for the Trustworthiness of Distributed Systems. 2105-2121 - Saiyu Qi

, Yuanqing Zheng
, Yue Li, Xiaofeng Chen
, Jianfeng Ma
, Dongyi Yang, Yong Qi:
DE-Sword: Incentivized Verifiable Tag Path Query in RFID-Enabled Supply Chain Systems. 2122-2137 - Willy Susilo

, Peng Jiang
, Jianchang Lai
, Fuchun Guo
, Guomin Yang
, Robert H. Deng
:
Sanitizable Access Control System for Secure Cloud Storage Against Malicious Data Publishers. 2138-2148
Volume 19, Number 4, July - August 2022
- Sagar Samtani

, Hsinchun Chen
, Murat Kantarcioglu
, Bhavani Thuraisingham:
Explainable Artificial Intelligence for Cyber Threat Intelligence (XAI-CTI). 2149-2150 - Miquel Martínez

, Juan Carlos Ruiz
, Nuno Antunes
, David de Andrés
, Marco Vieira
:
A Multi-Criteria Analysis of Benchmark Results With Expert Support for Security Tools. 2151-2164 - Siqi Ma

, Juanru Li, Surya Nepal
, Diethelm Ostry, David Lo
, Sanjay K. Jha
, Robert H. Deng
, Elisa Bertino
:
Orchestration or Automation: Authentication Flaw Detection in Android Apps. 2165-2178 - Moshe Kravchik

, Asaf Shabtai
:
Efficient Cyber Attack Detection in Industrial Control Systems Using Lightweight Neural Networks and PCA. 2179-2197 - Jian Shen

, Huijie Yang, Pandi Vijayakumar
, Neeraj Kumar
:
A Privacy-Preserving and Untraceable Group Data Sharing Scheme in Cloud Computing. 2198-2210 - Satendra Pal Singh, Gaurav Bhatnagar

, Amit Kumar Singh
:
A New Robust Reference Image Hashing System. 2211-2225 - Mohamed Baza

, Marbin Pazos-Revilla, Ahmed B. T. Sherif
, Mahmoud Nabil
, Abdulah Jeza Aljohani
, Mohamed Mahmoud
, Waleed Alasmary
:
Privacy-Preserving and Collusion-Resistant Charging Coordination Schemes for Smart Grids. 2226-2243 - Zhen Li

, Deqing Zou
, Shouhuai Xu
, Hai Jin
, Yawei Zhu, Zhaoxuan Chen:
SySeVR: A Framework for Using Deep Learning to Detect Software Vulnerabilities. 2244-2258 - Luca Massarelli

, Giuseppe Antonio Di Luna, Fabio Petroni, Leonardo Querzoni
, Roberto Baldoni:
Function Representations for Binary Similarity. 2259-2273 - Soroush Aalibagi

, Hamidreza Mahyar
, Ali Movaghar
, Harry Eugene Stanley
:
A Matrix Factorization Model for Hellinger-Based Trust Management in Social Internet of Things. 2274-2285 - Tianxiang Shen

, Jianyu Jiang
, Yunpeng Jiang, Xusheng Chen
, Ji Qi
, Shixiong Zhao
, Fengwei Zhang
, Xiapu Luo
, Heming Cui
:
DAENet: Making Strong Anonymity Scale in a Fully Decentralized Network. 2286-2303 - Leila Karimi

, Maryam Aldairi
, James Joshi
, Mai Abdelhakim
:
An Automatic Attribute-Based Access Control Policy Extraction From Access Logs. 2304-2317 - Jianghong Wei

, Xiaofeng Chen
, Jianfeng Wang
, Xuexian Hu
, Jianfeng Ma:
Enabling (End-to-End) Encrypted Cloud Emails With Practical Forward Secrecy. 2318-2332 - Qiang He

, Cheng Wang
, Guangming Cui
, Bo Li
, Rui Zhou, Qingguo Zhou
, Yang Xiang
, Hai Jin
, Yun Yang
:
A Game-Theoretical Approach for Mitigating Edge DDoS Attack. 2333-2348 - Yansong Gao

, Yeonjae Kim, Bao Gia Doan
, Zhi Zhang
, Gongxuan Zhang, Surya Nepal
, Damith C. Ranasinghe
, Hyoungshick Kim
:
Design and Evaluation of a Multi-Domain Trojan Detection Method on Deep Neural Networks. 2349-2364 - Yunxiao Zhang

, Pasquale Malacaria
:
Optimization-Time Analysis for Cybersecurity. 2365-2383 - Ferucio Laurentiu Tiplea

:
Lessons to be Learned for a Good Design of Private RFID Schemes. 2384-2395 - Mateus Martínez De Lucena

, Antônio Augusto Fröhlich
:
Security and Effectiveness Analysis of the Gateway Integrity Checking Protocol. 2396-2404 - Yi Chen

, Hongxia Wang, Kim-Kwang Raymond Choo
, Peisong He
, Zoran Salcic
, Dali Kaafar
, Xuyun Zhang
:
DDCA: A Distortion Drift-Based Cost Assignment Method for Adaptive Video Steganography in the Transform Domain. 2405-2420 - Pedro Reviriego

, Daniel Ting:
Breaking Cuckoo Hash: Black Box Attacks. 2421-2427 - Qian Han

, Cristian Molinaro, Antonio Picariello, Giancarlo Sperlì
, V. S. Subrahmanian, Yanhai Xiong
:
Generating Fake Documents Using Probabilistic Logic Graphs. 2428-2441 - Zhiguo Wan

, Tong Zhang, Weizhuang Liu, Mingqiang Wang
, Liehuang Zhu
:
Decentralized Privacy-Preserving Fair Exchange Scheme for V2G Based on Blockchain. 2442-2456 - Mahmood Azhar Qureshi

, Arslan Munir
:
PUF-RAKE: A PUF-Based Robust and Lightweight Authentication and Key Establishment Protocol. 2457-2475 - Hassan Nasiraee

, Maede Ashouri-Talouki
:
Privacy-Preserving Distributed Data Access Control for CloudIoT. 2476-2487 - Essam Soliman Debie, Nour Moustafa

, Athanasios V. Vasilakos
:
Session Invariant EEG Signatures using Elicitation Protocol Fusion and Convolutional Neural Network. 2488-2500 - Yandong Zheng

, Rongxing Lu
, Yunguo Guan
, Jun Shao
, Hui Zhu
:
Efficient and Privacy-Preserving Similarity Range Query Over Encrypted Time Series Data. 2501-2516 - Suryadipta Majumdar

, Gagandeep Singh Chawla, Amir Alimohammadifar, Taous Madi, Yosr Jarraya, Makan Pourzandi, Lingyu Wang
, Mourad Debbabi
:
ProSAS: Proactive Security Auditing System for Clouds. 2517-2534 - Mojtaba Rafiee

, Shahram Khazaei
:
Security of Multi-Adjustable Join Schemes: Separations and Implications. 2535-2545 - Siva Kumar Sastry Hari

, Michael B. Sullivan
, Timothy Tsai, Stephen W. Keckler:
Making Convolutions Resilient Via Algorithm-Based Error Detection Techniques. 2546-2558 - Seongman Lee

, Hyeonwoo Kang
, Jinsoo Jang
, Brent ByungHoon Kang
:
SaVioR: Thwarting Stack-Based Memory Safety Violations by Randomizing Stack Layout. 2559-2575 - Zhe Wang

, Chenggang Wu
, Yinqian Zhang
, Bowen Tang
, Pen-Chung Yew
, Mengyao Xie
, Yuanming Lai
, Yan Kang, Yueqiang Cheng
, Zhiping Shi
:
Making Information Hiding Effective Again. 2576-2594 - Giovanni Mazzeo

, Sergei Arnautov, Christof Fetzer, Luigi Romano
:
SGXTuner: Performance Enhancement of Intel SGX Applications Via Stochastic Optimization. 2595-2608 - Shangqi Lai

, Xingliang Yuan
, Shifeng Sun
, Joseph K. Liu
, Ron Steinfeld, Amin Sakzad
, Dongxi Liu:
Practical Encrypted Network Traffic Pattern Matching for Secure Middleboxes. 2609-2621 - Jun Wang

, Chao Jin
, Qiang Tang
, Zhe Liu
, Khin Mi Mi Aung
:
CryptoRec: Novel Collaborative Filtering Recommender Made Privacy-Preserving Easy. 2622-2634 - Dalton Cole

, Sara Newman
, Dan Lin
:
A New Facial Authentication Pitfall and Remedy in Web Services. 2635-2647 - Shaoyong Du

, Minrui Zhao
, Jingyu Hua
, Hang Zhang, Xiaoyu Chen, Zhiyun Qian
, Sheng Zhong
:
Who Moves My App Promotion Investment? A Systematic Study About App Distribution Fraud. 2648-2664 - Xuhang Ying

, Giuseppe Bernieri, Mauro Conti
, Linda Bushnell
, Radha Poovendran
:
Covert Channel-Based Transmitter Authentication in Controller Area Networks. 2665-2679 - Haonan Yan, Xiaoguang Li

, Hui Li, Jiamin Li, Wenhai Sun
, Fenghua Li:
Monitoring-Based Differential Privacy Mechanism Against Query Flooding-Based Model Extraction Attack. 2680-2694 - Long Zhang

, Brice Morin
, Benoit Baudry
, Martin Monperrus
:
Maximizing Error Injection Realism for Chaos Engineering With System Calls. 2695-2708 - Savio Sciancalepore

, Pietro Tedeschi
, Ahmed Aziz, Roberto Di Pietro
:
Auth-AIS: Secure, Flexible, and Backward-Compatible Authentication of Vessels AIS Broadcasts. 2709-2726 - Shunrong Jiang

, Jianqing Liu
, Yong Zhou
, Yuguang Fang
:
FVC-Dedup: A Secure Report Deduplication Scheme in a Fog-Assisted Vehicular Crowdsensing System. 2727-2740 - Xuyang Jing, Hui Han, Zheng Yan

, Witold Pedrycz
:
SuperSketch: A Multi-Dimensional Reversible Data Structure for Super Host Identification. 2741-2754 - Lumin Shi

, Jun Li
, Mingwei Zhang
, Peter L. Reiher
:
On Capturing DDoS Traffic Footprints on the Internet. 2755-2770 - Xiaojie Zhu

, Erman Ayday, Roman Vitenberg
, Narasimha Raghavan Veeraragavan:
Privacy-Preserving Search for a Similar Genomic Makeup in the Cloud. 2771-2788 - Yuan Zhang

, Chunxiang Xu
, Nan Cheng
, Xuemin Shen
:
Secure Password-Protected Encryption Key for Deduplicated Cloud Storage Systems. 2789-2806 - Runhua Xu

, James Joshi
, Chao Li
:
NN-EMD: Efficiently Training Neural Networks Using Encrypted Multi-Sourced Datasets. 2807-2820 - Zhen Li, Deqing Zou

, Shouhuai Xu
, Zhaoxuan Chen, Yawei Zhu, Hai Jin
:
VulDeeLocator: A Deep Learning-Based Fine-Grained Vulnerability Detector. 2821-2837 - Yuan Su

, Yanping Li
, Bo Yang, Yong Ding
:
Decentralized Self-Auditing Scheme With Errors Localization for Multi-Cloud Storage. 2838-2850 - Fatemah Alharbi

, Yuchen Zhou
, Feng Qian, Zhiyun Qian
, Nael B. Abu-Ghazaleh
:
DNS Poisoning of Operating System Caches: Attacks and Mitigations. 2851-2863
Volume 19, Number 5, September - October 2022
- Chunpeng Ge

, Willy Susilo
, Joonsang Baek
, Zhe Liu, Jinyue Xia, Liming Fang
:
Revocable Attribute-Based Encryption With Data Integrity in Clouds. 2864-2872 - Jun Qiu

, Xuewu Yang
, Huamao Wu
, Yajin Zhou
, Jinku Li
, Jianfeng Ma
:
LibCapsule: Complete Confinement of Third-Party Libraries in Android Applications. 2873-2889 - Ankur Chowdhary

, Abdulhakim Sabur
, Dijiang Huang
, Myong H. Kang, James Kirby:
Object Oriented Policy Conflict Checking Framework in Cloud Networks (OOPC). 2890-2906 - Chunpeng Ge

, Willy Susilo
, Joonsang Baek
, Zhe Liu, Jinyue Xia
, Liming Fang
:
A Verifiable and Fair Attribute-Based Proxy Re-Encryption Scheme for Data Sharing in Clouds. 2907-2919 - Seema Kumar

, Patrick Eugster, Silvia Santini:
Software-Based Remote Network Attestation. 2920-2933 - Zhen Liu

, Guomin Yang
, Duncan S. Wong, Khoa Nguyen
, Huaxiong Wang
, Xiaorong Ke, Yining Liu:
Secure Deterministic Wallet and Stealth Address: Key-Insulated and Privacy-Preserving Signature Scheme With Publicly Derived Public Key. 2934-2951 - Cláudio Correia

, Miguel Correia
, Luís Rodrigues:
Omega: A Secure Event Ordering Service for the Edge. 2952-2964 - Zhuotao Liu

, Yangxi Xiang, Jian Shi, Peng Gao, Haoyu Wang, Xusheng Xiao
, Bihan Wen
, Qi Li
, Yih-Chun Hu:
Make Web3.0 Connected. 2965-2981 - Xuejing Zhou

, Wanli Peng
, Boya Yang
, Juan Wen
, Yiming Xue
, Ping Zhong
:
Linguistic Steganography Based on Adaptive Probability Distribution. 2982-2997 - Bowen Wang

, Kangjie Lu
, Qiushi Wu, Aditya Pakki
:
Unleashing Coveraged-Based Fuzzing Through Comprehensive, Efficient, and Faithful Exploitable-Bug Exposing. 2998-3010 - Chen Chen

, Roman Vitenberg
, Hans-Arno Jacobsen
:
Building Fault-Tolerant Overlays With Low Node Degrees for Topic-Based Publish/Subscribe. 3011-3023 - Hua Deng

, Jixin Zhang
, Zheng Qin
, Qianhong Wu, Hui Yin
, Aniello Castiglione
:
Policy-Based Broadcast Access Authorization for Flexible Data Sharing in Clouds. 3024-3037 - Yuefeng Du

, Huayi Duan
, Anxin Zhou
, Cong Wang
, Man Ho Au
, Qian Wang
:
Enabling Secure and Efficient Decentralized Storage Auditing With Blockchain. 3038-3054 - Xinyu Wang

, Yuefeng Du
, Cong Wang
, Qian Wang
, Liming Fang
:
WebEnclave: Protect Web Secrets From Browser Extensions With Software Enclave. 3055-3070 - Mario Di Mauro

, Giovanni Galatro
, Fabio Postiglione
, Marco Tambasco
:
Performability of Network Service Chains: Stochastic Modeling and Assessment of Softwarized IP Multimedia Subsystem. 3071-3086 - Meng Ma

, Weilan Lin, Disheng Pan, Ping Wang
:
ServiceRank: Root Cause Identification of Anomaly in Large-Scale Microservice Architectures. 3087-3100 - Jing Lei

, Qingqi Pei
, Yao Wang
, Wenhai Sun
, Xuefeng Liu
:
PrivFace: Fast Privacy-Preserving Face Authentication With Revocable and Reusable Biometric Credentials. 3101-3112 - Hwimin Kim

, Dae-Kyoo Kim
, Alaa S. Alaerjan:
ABAC-Based Security Model for DDS. 3113-3124 - Zhangjie Fu

, Yueyan Zhi, Shouling Ji
, Xingming Sun:
Remote Attacks on Drones Vision Sensors: An Empirical Study. 3125-3135 - Yinjin Fu

, Nong Xiao, Tao Chen, Jian Wang:
Fog-to-MultiCloud Cooperative Ehealth Data Management With Application-Aware Secure Deduplication. 3136-3148 - Jiasi Weng

, Jian Weng
, Chengjun Cai
, Hongwei Huang, Cong Wang
:
Golden Grain: Building a Secure and Decentralized Model Marketplace for MLaaS. 3149-3167 - Jinrong Chen

, Lin Liu
, Rongmao Chen
, Wei Peng
, Xinyi Huang
:
SecRec: A Privacy-Preserving Method for the Context-Aware Recommendation System. 3168-3182 - Hongwei Huang

, Weiqi Luo
, Guoqiang Zeng
, Jian Weng
, Yue Zhang
, Anjia Yang
:
DAMIA: Leveraging Domain Adaptation as a Defense Against Membership Inference Attacks. 3183-3199 - Lei Bu

, Zhe Zhao
, Yuchao Duan, Fu Song
:
Taking Care of the Discretization Problem: A Comprehensive Study of the Discretization Problem and a Black-Box Adversarial Attack in Discrete Integer Domain. 3200-3217 - Qinchen Gu

, David Formby
, Shouling Ji
, Brendan Saltaformaggio, Anu G. Bourgeois, Raheem Beyah:
This Hacker Knows Physics: Device Physics Aware Mimicry Attacks in Cyber-Physical Systems. 3218-3230 - Beilei Zheng

, Jianan Gu
, Jialun Wang
, Chuliang Weng
:
CBA-Detector: A Self-Feedback Detector Against Cache-Based Attacks. 3231-3243 - Himani Sikarwar

, Debasis Das
:
Towards Lightweight Authentication and Batch Verification Scheme in IoV. 3244-3256 - Haoyu Ma

, Jianwen Tian, Debin Gao
, Chunfu Jia
:
On the Effectiveness of Using Graphics Interrupt as a Side Channel for User Behavior Snooping. 3257-3270 - Haoyu Ma

, Shijia Li
, Debin Gao
, Chunfu Jia
:
Secure Repackage-Proofing Framework for Android Apps Using Collatz Conjecture. 3271-3285 - Jing Chen

, Xin Chen
, Kun He
, Ruiying Du, Weihang Chen, Yang Xiang
:
DELIA: Distributed Efficient Log Integrity Audit Based on Hierarchal Multi-Party State Channel. 3286-3300 - Jing Chen

, Zeyi Zhan, Kun He
, Ruiying Du, Donghui Wang
, Fei Liu:
XAuth: Efficient Privacy-Preserving Cross-Domain Authentication. 3301-3311 - Shaharyar Khan

, Stuart E. Madnick
:
Cybersafety: A System-Theoretic Approach to Identify Cyber-Vulnerabilities & Mitigation Requirements in Industrial Control Systems. 3312-3328 - Lingchen Zhao

, Jianlin Jiang
, Bo Feng
, Qian Wang
, Chao Shen
, Qi Li
:
SEAR: Secure and Efficient Aggregation for Byzantine-Robust Federated Learning. 3329-3342 - Kejiang Chen

, Hang Zhou
, Hanqing Zhao, Dongdong Chen
, Weiming Zhang
, Nenghai Yu
:
Distribution-Preserving Steganography Based on Text-to-Speech Generative Models. 3343-3356 - Chaoran Li

, Xiao Chen
, Derui Wang
, Sheng Wen
, Muhammad Ejaz Ahmed, Seyit Camtepe
, Yang Xiang
:
Backdoor Attack on Machine Learning Based Android Malware Detectors. 3357-3370 - Mohammadhossein Amouei

, Mohsen Rezvani
, Mansoor Fateh
:
RAT: Reinforcement-Learning-Driven and Adaptive Testing for Vulnerability Discovery in Web Application Firewalls. 3371-3386 - Jingjing Zhang

, Yingyao Rong, Jiannong Cao
, Chunming Rong, Jing Bian
, Weigang Wu
:
DBFT: A Byzantine Fault Tolerance Protocol With Graceful Performance Degradation. 3387-3400 - Yu Guo

, Hongcheng Xie
, Cong Wang
, Xiaohua Jia
:
Enabling Privacy-Preserving Geographic Range Query in Fog-Enhanced IoT Services. 3401-3416 - Sara Mohammadi

, Frank Eliassen
, Yan Zhang
, Hans-Arno Jacobsen
:
Detecting False Data Injection Attacks in Peer to Peer Energy Trading Using Machine Learning. 3417-3431 - Ahmed Abusnaina

, Mohammed Abuhamad
, Hisham Alasmary
, Afsah Anwar, Rhongho Jang
, Saeed Salem, DaeHun Nyang
, David Mohaisen
:
DL-FHMC: Deep Learning-Based Fine-Grained Hierarchical Learning Approach for Robust Malware Classification. 3432-3447 - Huiying Hou

, Jianting Ning
, Yunlei Zhao
, Robert H. Deng
:
Fine-Grained and Controllably Editable Data Sharing With Accountability in Cloud Storage. 3448-3463 - Yen-Lin Lee

, Deron Liang, Wei-Jen Wang
:
Optimal Online Liveness Fault Detection for Multilayer Cloud Computing Systems. 3464-3477 - Yandong Zheng

, Rongxing Lu
, Yunguo Guan
, Jun Shao
, Hui Zhu
:
Towards Practical and Privacy-Preserving Multi-Dimensional Range Query Over Cloud. 3478-3493 - Shijie Jia

, Qionglu Zhang
, Luning Xia, Jiwu Jing
, Peng Liu
:
MDEFTL: Incorporating Multi-Snapshot Plausible Deniability into Flash Translation Layer. 3494-3507 - Haoyu Ma

, Shijia Li
, Debin Gao
, Daoyuan Wu
, Qiaowen Jia, Chunfu Jia
:
Active Warden Attack: On the (In)Effectiveness of Android App Repackage-Proofing. 3508-3520 - Xi Xiao

, Wentao Xiao
, Rui Li, Xiapu Luo
, Haitao Zheng
, Shutao Xia
:
EBSNN: Extended Byte Segment Neural Network for Network Traffic Classification. 3521-3538 - Pedro Reviriego

, Alfonso Sánchez-Macián
, Shanshan Liu
, Fabrizio Lombardi
:
On the Security of the K Minimum Values (KMV) Sketch. 3539-3545 - Jian Yang

, Qi Zhang, Xiaofeng Jiang
, Shuangwu Chen
, Feng Yang
:
Poirot: Causal Correlation Aided Semantic Analysis for Advanced Persistent Threat Detection. 3546-3563 - Liming Fang

, Minghui Li
, Zhe Liu
, Changting Lin
, Shouling Ji
, Anni Zhou
, Willy Susilo
, Chunpeng Ge
:
A Secure and Authenticated Mobile Payment Protocol Against Off-Site Attack Strategy. 3564-3578
Volume 19, Number 6, November - December 2022
- Hanan Hibshi

, Stephanie T. Jones, Travis D. Breaux:
A Systemic Approach for Natural Language Scenario Elicitation of Security Requirements. 3579-3591 - Jiabei Wang

, Rui Zhang
, Jianhao Li
, Yuting Xiao
, Hui Ma
:
SeUpdate: Secure Encrypted Data Update for Multi-User Environments. 3592-3606 - Xinyu Zhang

, Bingsheng Zhang
, Aggelos Kiayias
, Thomas Zacharias
, Kui Ren
:
An Efficient E2E Crowd Verifiable E-Voting System. 3607-3620 - Xiaoqin Feng

, Jianfeng Ma
, Yinbin Miao
, Ximeng Liu
, Kim-Kwang Raymond Choo
:
Social Characteristic-Based Propagation-Efficient PBFT Protocol to Broadcast in Unstructured Overlay Networks. 3621-3639 - Chengjun Cai

, Lei Xu
, Anxin Zhou
, Cong Wang
:
Toward a Secure, Rich, and Fair Query Service for Light Clients on Public Blockchains. 3640-3655 - Qilei Yin

, Zhuotao Liu
, Qi Li
, Tao Wang, Qian Wang
, Chao Shen
, Yixiao Xu:
An Automated Multi-Tab Website Fingerprinting Attack. 3656-3670 - Yang Liu

, Zhuo Ma
, Yilong Yang
, Ximeng Liu
, Jianfeng Ma
, Kui Ren
:
RevFRF: Enabling Cross-Domain Random Forest Training With Revocable Federated Learning. 3671-3685 - Jianan Gu

, Yukun Ma
, Beilei Zheng
, Chuliang Weng
:
Outlier: Enabling Effective Measurement of Hypervisor Code Integrity With Group Detection. 3686-3698 - Yuchang Mo

, Liudong Xing
:
Efficient Analysis of Resource Availability for Cloud Computing Systems to Reduce SLA Violations. 3699-3710 - Eunsang Lee

, Joon-Woo Lee
, Jong-Seon No
, Young-Sik Kim
:
Minimax Approximation of Sign Function by Composite Polynomial for Homomorphic Comparison. 3711-3727 - Vlasis Koutsos

, Dimitrios Papadopoulos
, Dimitris Chatzopoulos
, Sasu Tarkoma
, Pan Hui:
Agora: A Privacy-Aware Data Marketplace. 3728-3740 - Pengfei Wu

, Qi Li
, Jianting Ning
, Xinyi Huang
, Wei Wu
:
Differentially Oblivious Data Analysis With Intel SGX: Design, Optimization, and Evaluation. 3741-3758 - Shengmin Xu

, Jianting Ning
, Xinyi Huang
, Yingjiu Li
, Guowen Xu
:
Untouchable Once Revoking: A Practical and Secure Dynamic EHR Sharing System via Cloud. 3759-3773 - Xiang Gao

, Jia Yu
, Yan Chang, Huaqun Wang
, Jianxi Fan
:
Checking Only When It Is Necessary: Enabling Integrity Auditing Based on the Keyword With Sensitive Information Privacy for Encrypted Cloud Data. 3774-3789 - Sazzadur Rahaman

, Haipeng Cai
, Omar Chowdhury, Danfeng Yao
:
From Theory to Code: Identifying Logical Flaws in Cryptographic Implementations in C/C++. 3790-3803 - Huashan Chen, Hasan Cam, Shouhuai Xu

:
Quantifying Cybersecurity Effectiveness of Dynamic Network Diversity. 3804-3821 - Jordan Samhi

, Alexandre Bartel
:
On The (In)Effectiveness of Static Logic Bomb Detection for Android Apps. 3822-3836 - Yi Wang, Rongmao Chen

, Xinyi Huang
, Baosheng Wang:
Secure Anonymous Communication on Corrupted Machines With Reverse Firewalls. 3837-3854 - Yongyi Cao

, Hao Jiang
, Yuchuan Deng
, Jing Wu
, Pan Zhou
, Wei Luo:
Detecting and Mitigating DDoS Attacks in SDN Using Spatial-Temporal Graph Convolutional Network. 3855-3872 - Lin Yao

, Zhenyu Chen
, Haipeng Dai
, Guowei Wu
:
Exploiting Non-Cooperative Game Against Cache Pollution Attack in Vehicular Content Centric Network. 3873-3886 - Federico Daidone

, Barbara Carminati
, Elena Ferrari
:
Blockchain-Based Privacy Enforcement in the IoT Domain. 3887-3898 - Pei Huang

, Xiaonan Zhang
, Sihan Yu
, Linke Guo
:
IS-WARS: Intelligent and Stealthy Adversarial Attack to Wi-Fi-Based Human Activity Recognition Systems. 3899-3912 - Xuyang Jing, Zheng Yan

, Hui Han, Witold Pedrycz
:
ExtendedSketch: Fusing Network Traffic for Super Host Identification With a Memory Efficient Sketch. 3913-3924 - Lingyuan Yin

, Jing Xu
, Qiang Tang
:
Sidechains With Fast Cross-Chain Transfers. 3925-3940 - Guohua Tian

, Yunhan Hu, Jianghong Wei
, Zheli Liu
, Xinyi Huang
, Xiaofeng Chen
, Willy Susilo
:
Blockchain-Based Secure Deduplication and Shared Auditing in Decentralized Storage. 3941-3954 - Mazen Azzam

, Liliana Pasquale
, Gregory M. Provan
, Bashar Nuseibeh
:
Grounds for Suspicion: Physics-Based Early Warnings for Stealthy Attacks on Industrial Control Systems. 3955-3970 - Mohammad M. Jalalzai

, Chen Feng
, Costas Busch, Golden G. Richard III
, Jianyu Niu
:
The Hermes BFT for Blockchains. 3971-3986 - Changjiang Li

, Shouling Ji
, Haiqin Weng, Bo Li, Jie Shi, Raheem Beyah, Shanqing Guo
, Zonghui Wang
, Ting Wang
:
Towards Certifying the Asymmetric Robustness for Neural Networks: Quantification and Applications. 3987-4001 - Cong Wu

, Kun He
, Jing Chen
, Ziming Zhao
, Ruiying Du:
Toward Robust Detection of Puppet Attacks via Characterizing Fingertip-Touch Behaviors. 4002-4018 - Damu Ding

, Marco Savi
, Domenico Siracusa
:
Tracking Normalized Network Traffic Entropy to Detect DDoS Attacks in P4. 4019-4031 - Rachid Guerraoui, Alexandre Maurer

:
Byzantine-Resilient Multi-Agent System. 4032-4038 - Berk Gülmezoglu

:
XAI-Based Microarchitectural Side-Channel Analysis for Website Fingerprinting Attacks and Defenses. 4039-4051 - Amir Rezapour

, Wen-Guey Tzeng
:
RL-Shield: Mitigating Target Link-Flooding Attacks Using SDN and Deep Reinforcement Learning Routing Algorithm. 4052-4067 - Maryam Farajzadeh-Zanjani

, Ehsan Hallaji
, Roozbeh Razavi-Far
, Mehrdad Saif
:
Generative-Adversarial Class-Imbalance Learning for Classifying Cyber-Attacks and Faults - A Cyber-Physical Power System. 4068-4081 - Danilo Bruschi, Andrea Di Pasquale

, Silvio Ghilardi
, Andrea Lanzi, Elena Pagani
:
A Formal Verification of ArpON - A Tool for Avoiding Man-in-the-Middle Attacks in Ethernet Networks. 4082-4098 - Qiang Li, Dawei Tan, Xin Ge, Haining Wang, Zhi Li, Jiqiang Liu:

Understanding Security Risks of Embedded Devices Through Fine-Grained Firmware Fingerprinting. 4099-4112 - Bin Xie

, Tao Xiang
, Xiaofeng Liao
, Jiahui Wu
:
Achieving Privacy-Preserving Online Diagnosis With Outsourced SVM in Internet of Medical Things Environment. 4113-4126 - Samaikya Valluripally

, Aniket Gulhane, Khaza Anuarul Hoque
, Prasad Calyam
:
Modeling and Defense of Social Virtual Reality Attacks Inducing Cybersickness. 4127-4144 - Pengfei Tang

, Wenjie Wang
, Jian Lou
, Li Xiong
:
Generating Adversarial Examples With Distance Constrained Adversarial Imitation Networks. 4145-4155 - Zihan Sha

, Hui Shu
, Xiaobing Xiong, Fei Kang:
Model of Execution Trace Obfuscation Between Threads. 4156-4171 - Anas Daghistani

, Mosab Khayat
, Muhamad Felemban, Walid G. Aref
, Arif Ghafoor
:
Guard: Attack-Resilient Adaptive Load Balancing in Distributed Streaming Systems. 4172-4186 - Saeid Mofrad

, Ishtiaq Ahmed
, Fengwei Zhang
, Shiyong Lu
, Ping Yang
, Heming Cui
:
Securing Big Data Scientific Workflows via Trusted Heterogeneous Environments. 4187-4203 - Haibin Zheng

, Jinyin Chen
, Hang Du, Weipeng Zhu, Shouling Ji
, Xuhong Zhang:
GRIP-GAN: An Attack-Free Defense Through General Robust Inverse Perturbation. 4204-4224 - Xiaojun Zhang

, Chao Huang
, Yuan Zhang
, Sheng Cao
:
Enabling Verifiable Privacy-Preserving Multi-Type Data Aggregation in Smart Grids. 4225-4239 - Zhijian Shao

, Jian Weng
, Yue Zhang
, Yongdong Wu
, Ming Li
, Jiasi Weng
, Weiqi Luo
, Shui Yu
:
Peripheral-Free Device Pairing by Randomly Switching Power. 4240-4254 - Afsah Anwar, Ahmed Abusnaina

, Songqing Chen
, Frank Li, David Mohaisen
:
Cleaning the NVD: Comprehensive Quality Assessment, Improvements, and Analyses. 4255-4269 - Jiahui Hou

, Huiqi Liu
, Yunxin Liu
, Yu Wang
, Peng-Jun Wan, Xiang-Yang Li
:
Model Protection: Real-Time Privacy-Preserving Inference Service for Model Privacy at the Edge. 4270-4284 - Albert Guan

, Chia-Mei Chen
:
A Novel Verification Scheme to Resist Online Password Guessing Attacks. 4285-4293

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














