default search action
IEEE Transactions on Dependable and Secure Computing, Volume 19
Volume 19, Number 1, January - February 2022
- Ayyoob Hamza, Dinesha Ranathunga, Hassan Habibi Gharakheili, Theophilus A. Benson, Matthew Roughan, Vijay Sivaraman:
Verifying and Monitoring IoTs Network Behavior Using MUD Profiles. 1-18 - Zhou Su, Yuntao Wang, Qichao Xu, Ning Zhang:
LVBS: Lightweight Vehicular Blockchain for Secure Data Sharing in Disaster Rescue. 19-32 - Dan Brownstein, Shlomi Dolev, Muni Venkateswarlu Kumaramangalam:
Self-Stabilizing Secure Computation. 33-38 - Mohamed Baza, Mahmoud Nabil, Mohamed M. E. A. Mahmoud, Niclas Bewermeier, Kemal Fidan, Waleed Alasmary, Mohamed Abdallah:
Detecting Sybil Attacks Using Proofs of Work and Location in VANETs. 39-53 - Gurjit Singh Walia, Kartik Aggarwal, Kuldeep Singh, Kunwar Singh:
Design and Analysis of Adaptive Graph-Based Cancelable Multi-Biometrics Approach. 54-66 - Jin Li, Heng Ye, Tong Li, Wei Wang, Wenjing Lou, Y. Thomas Hou, Jiqiang Liu, Rongxing Lu:
Efficient and Secure Outsourcing of Differentially Private Data Publishing With Multiple Evaluators. 67-76 - Yao Cheng, Chang Xu, Zhen Hai, Yingjiu Li:
DeepMnemonic: Password Mnemonic Generation via Deep Attentive Encoder-Decoder Model. 77-90 - Rui Li, Alex X. Liu, Huanle Xu, Ying Liu, Huaqiang Yuan:
Adaptive Secure Nearest Neighbor Query Processing Over Encrypted Data. 91-106 - Guillermo Suarez-Tangil, Gianluca Stringhini:
Eight Years of Rider Measurement in the Android Malware Ecosystem. 107-118 - Yannan Li, Willy Susilo, Guomin Yang, Yong Yu, Dongxi Liu, Xiaojiang Du, Mohsen Guizani:
A Blockchain-Based Self-Tallying Voting Protocol in Decentralized IoT. 119-130 - Qingyu Yang, Donghe Li, Dou An, Wei Yu, Xinwen Fu, Xinyu Yang, Wei Zhao:
Towards Incentive for Electrical Vehicles Demand Response With Location Privacy Guaranteeing in Microgrids. 131-148 - Jinhua Ma, Xinyi Huang, Yi Mu, Robert H. Deng:
Authenticated Data Redaction With Accountability and Transparency. 149-160 - Mohamad Chehab, Azzam Mourad:
LP-SBA-XACML: Lightweight Semantics Based Scheme Enabling Intelligent Behavior-Aware Privacy for IoT. 161-175 - Sateesh Kumar Awasthi, Yatindra Nath Singh:
AbsoluteTrust: Algorithm for Aggregation of Trust in Peer-to-Peer Networks. 176-189 - Yanhua Du, Yang Wang, Benyuan Yang, Hesuan Hu:
Analyzing Security Requirements in Timed Workflow Processes. 190-207 - Xing Gao, Guannan Liu, Zhang Xu, Haining Wang, Li Li, Xiaorui Wang:
Investigating Security Vulnerabilities in a Hot Data Center with Reduced Cooling Redundancy. 208-226 - Ahmad Samer Wazan, Romain Laborde, David W. Chadwick, Rémi Venant, Abdelmalek Benzekri, Eddie Billoir, Omar Alfandi:
On the Validation of Web X.509 Certificates by TLS Interception Products. 227-242 - Lucas Palazzi, Guanpeng Li, Bo Fang, Karthik Pattabiraman:
Improving the Accuracy of IR-Level Fault Injection. 243-258 - Yuchen Zhao, Isabel Wagner:
Using Metrics Suites to Improve the Measurement of Privacy in Graphs. 259-274 - Kyungmin Go, Il-Gu Lee, Sungwon Kang, Myungchul Kim:
Secure Video Transmission Framework for Battery-Powered Video Devices. 275-287 - Fritz Previlon, Charu Kalra, Devesh Tiwari, David R. Kaeli:
Characterizing and Exploiting Soft Error Vulnerability Phase Behavior in GPU Applications. 288-300 - Cheng Wang, Hangyu Zhu:
Representing Fine-Grained Co-Occurrences for Behavior-Based Fraud Detection in Online Payment Services. 301-315 - Dezhi Han, Nannan Pan, Kuan-Ching Li:
A Traceable and Revocable Ciphertext-Policy Attribute-based Encryption Scheme Based on Privacy Protection. 316-327 - Cong Zuo, Shifeng Sun, Joseph K. Liu, Jun Shao, Josef Pieprzyk, Lei Xu:
Forward and Backward Private DSSE for Range Queries. 328-338 - Rajorshi Biswas, Jie Wu:
Optimal Filter Assignment Policy Against Distributed Denial-of-Service Attack. 339-352 - Ruimin Sun, Marcus Botacin, Nikolaos Sapountzis, Xiaoyong Yuan, Matt Bishop, Donald E. Porter, Xiaolin Li, Andre Gregio, Daniela Oliveira:
A Praise for Defensive Programming: Leveraging Uncertainty for Effective Malware Mitigation. 353-369 - Yunqing Sun, Jin Cao, Maode Ma, Yinghui Zhang, Hui Li, Ben Niu:
EAP-DDBA: Efficient Anonymity Proximity Device Discovery and Batch Authentication Mechanism for Massive D2D Communication Devices in 3GPP 5G HetNet. 370-387 - Yanguo Peng, Long Wang, Jiangtao Cui, Ximeng Liu, Hui Li, Jianfeng Ma:
LS-RQ: A Lightweight and Forward-Secure Range Query on Geographically Encrypted Data. 388-401 - Sadegh Torabi, Elias Bou-Harb, Chadi Assi, ElMouatez Billah Karbab, Amine Boukhtouta, Mourad Debbabi:
Inferring and Investigating IoT-Generated Scanning Campaigns Targeting a Large Network Telescope. 402-418 - Yansong Gao, Marten van Dijk, Lei Xu, Wei Yang, Surya Nepal, Damith C. Ranasinghe:
TREVERSE: TRial-and-Error Lightweight Secure ReVERSE Authentication With Simulatable PUFs. 419-437 - Shigang Liu, Guanjun Lin, Lizhen Qu, Jun Zhang, Olivier Y. de Vel, Paul Montague, Yang Xiang:
CD-VulD: Cross-Domain Vulnerability Discovery Based on Deep Domain Adaptation. 438-451 - Shifeng Sun, Cong Zuo, Joseph K. Liu, Amin Sakzad, Ron Steinfeld, Tsz Hon Yuen, Xingliang Yuan, Dawu Gu:
Non-Interactive Multi-Client Searchable Encryption: Realization and Implementation. 452-467 - Lotfi Ben Othmane, Lalitha Dhulipala, Moataz AbdelKhalek, Nicholas J. Multari, Manimaran Govindarasu:
On the Performance of Detecting Injection of Fabricated Messages into the CAN Bus. 468-481 - Dinesha Ranathunga, Matthew Roughan, Hung X. Nguyen:
Verifiable Policy-Defined Networking Using Metagraphs. 482-494 - Felix Erlacher, Falko Dressler:
On High-Speed Flow-Based Intrusion Detection Using Snort-Compatible Signatures. 495-506 - Chenyu Wang, Ding Wang, Yi Tu, Guoai Xu, Huaxiong Wang:
Understanding Node Capture Attacks in User Authentication Schemes for Wireless Sensor Networks. 507-523 - Naman Patel, Prashanth Krishnamurthy, Hussam Amrouch, Jörg Henkel, Michael Shamouilian, Ramesh Karri, Farshad Khorrami:
Towards a New Thermal Monitoring Based Framework for Embedded CPS Device Security. 524-536 - Klaus-Tycho Foerster, Andrzej Kamisinski, Yvonne-Anne Pignolet, Stefan Schmid, Gilles Trédan:
Improved Fast Rerouting Using Postprocessing. 537-550 - Chunlin Xiong, Tiantian Zhu, Weihao Dong, Linqi Ruan, Runqing Yang, Yueqiang Cheng, Yan Chen, Shuai Cheng, Xutong Chen:
Conan: A Practical Real-Time APT Detection System With High Accuracy and Efficiency. 551-565 - George Theodorakopoulos, Emmanouil Panaousis, Kaitai Liang, George Loukas:
On-the-Fly Privacy for Location Histograms. 566-578 - Ruiyu Zhu, Yan Huang:
Efficient and Precise Secure Generalized Edit Distance and Beyond. 579-590 - Xue Yang, Rongxing Lu, Jun Shao, Xiaohu Tang, Ali A. Ghorbani:
Achieving Efficient Secure Deduplication With User-Defined Access Control in Cloud. 591-606 - Yi He, Yuan Zhou, Yajin Zhou, Qi Li, Kun Sun, Yacong Gu, Yong Jiang:
JNI Global References Are Still Vulnerable: Attacks and Defenses. 607-619 - Yue Li, Zeyu Chen, Haining Wang, Kun Sun, Sushil Jajodia:
Understanding Account Recovery in the Wild and its Security Implications. 620-634 - Kaiping Xue, Na Gai, Jianan Hong, David S. L. Wei, Peilin Hong, Nenghai Yu:
Efficient and Secure Attribute-Based Access Control With Identical Sub-Policies Frequently Used in Cloud Storage. 635-646 - Yanxue Jia, Shifeng Sun, Yuncong Zhang, Qingzhao Zhang, Ning Ding, Zhiqiang Liu, Joseph K. Liu, Dawu Gu:
${\sf PBT}$PBT: A New Privacy-Preserving Payment Protocol for Blockchain Transactions. 647-662 - Harishma Boyapally, Paulson Mathew, Sikhar Patranabis, Urbi Chatterjee, Umang Agarwal, Manu Maheshwari, Soumyajit Dey, Debdeep Mukhopadhyay:
Safe is the New Smart: PUF-Based Authentication for Load Modification-Resistant Smart Meters. 663-680 - Ze Wang, Jingqiang Lin, Quanwei Cai, Qiongxiao Wang, Daren Zha, Jiwu Jing:
Blockchain-Based Certificate Transparency and Revocation Transparency. 681-697 - Shabnam Kasra Kermanshahi, Shifeng Sun, Joseph K. Liu, Ron Steinfeld, Surya Nepal, Wang Fat Lau, Man Ho Allen Au:
Geometric Range Search on Encrypted Data With Forward/Backward Security. 698-716
Volume 19, Number 2, March - April 2022
- Yunji Liang, Qiushi Wang, Kang Xiong, Xiaolong Zheng, Zhiwen Yu, Daniel Zeng:
Robust Detection of Malicious URLs With Self-Paced Wide & Deep Learning. 717-730 - Azqa Nadeem, Sicco Verwer, Stephen Moskal, Shanchieh Jay Yang:
Alert-Driven Attack Graph Generation Using S-PDFA. 731-746 - Rohit Valecha, Pranali Mandaokar, H. Raghav Rao:
Phishing Email Detection Using Persuasion Cues. 747-756 - Huiling Li, Jun Wu, Hansong Xu, Gaolei Li, Mohsen Guizani:
Explainable Intelligence-Driven Defense Mechanism Against Advanced Persistent Threats: A Joint Edge Game and AI Approach. 757-775 - Yi-Ting Huang, Chi Yu Lin, Ying-Ren Guo, Kai-Chieh Lo, Yeali S. Sun, Meng Chang Chen:
Open Source Intelligence for Malicious Behavior Discovery and Interpretation. 776-789 - Yidong Chai, Yonghang Zhou, Weifeng Li, Yuanchun Jiang:
An Explainable Multi-Modal Hierarchical Attention Model for Developing Phishing Threat Intelligence. 790-803 - Md Shihabul Islam, Bo Dong, Swarup Chandra, Latifur Khan, Bhavani Thuraisingham:
GCI: A GPU-Based Transfer Learning Approach for Detecting Cheats of Computer Game. 804-816 - Matheus E. Garbelini, Chundong Wang, Sudipta Chattopadhyay:
Greyhound: Directed Greybox Wi-Fi Fuzzing. 817-834 - Osman Biçer, Muhammed Ali Bingöl, Mehmet Sabir Kiraz, Albert Levi:
Highly Efficient and Re-Executable Private Function Evaluation With Linear Complexity. 835-847 - Eduardo Chielle, Nektarios Georgios Tsoutsos, Oleg Mazonka, Michail Maniatakos:
E3X: Encrypt-Everything-Everywhere ISA eXtensions for Private Computation. 848-861 - Guangquan Xu, Xiaofei Xie, Shuhan Huang, Jun Zhang, Lei Pan, Wei Lou, Kaitai Liang:
JSCSP: A Novel Policy-Based XSS Defense Mechanism for Browsers. 862-878 - Zhihai Yang, Qindong Sun, Yaling Zhang:
Probabilistic Inference and Trustworthiness Evaluation of Associative Links Toward Malicious Attack Detection for Online Recommendations. 879-896 - Xin Liao, Jiaojiao Yin, Mingliang Chen, Zheng Qin:
Adaptive Payload Distribution in Multiple Images Steganography Based on Image Texture Features. 897-911 - Xiaogang Zhu, Xiaotao Feng, Xiaozhu Meng, Sheng Wen, Seyit Camtepe, Yang Xiang, Kui Ren:
CSI-Fuzz: Full-Speed Edge Tracing Using Coverage Sensitive Instrumentation. 912-923 - Vlad Craciun, Pascal Felber, Andrei Mogage, Emanuel Onica, Rafael Pires:
Malware in the SGX Supply Chain: Be Careful When Signing Enclaves! 924-935 - Longxia Huang, Junlong Zhou, Gongxuan Zhang, Jin Sun, Tongquan Wei, Shui Yu, Shiyan Hu:
IPANM: Incentive Public Auditing Scheme for Non-Manager Groups in Clouds. 936-952 - Derui Wang, Chaoran Li, Sheng Wen, Surya Nepal, Yang Xiang:
Defending Against Adversarial Attack Towards Deep Neural Networks Via Collaborative Multi-Task Training. 953-965 - Pedro Reviriego, Jorge Martínez, Ori Rottenstreich, Shanshan Liu, Fabrizio Lombardi:
Remove Minimum (RM): An Error-Tolerant Scheme for Cardinality Estimate by HyperLogLog. 966-977 - Bing Chen, Wei Lu, Jiwu Huang, Jian Weng, Yicong Zhou:
Secret Sharing Based Reversible Data Hiding in Encrypted Images With Multiple Data-Hiders. 978-991 - Zhaoxia Yin, Yinyin Peng, Youzhi Xiang:
Reversible Data Hiding in Encrypted Images Based on Pixel Prediction and Bit-Plane Compression. 992-1002 - Lingjuan Lyu, Yitong Li, Karthik Nandakumar, Jiangshan Yu, Xingjun Ma:
How to Democratise and Protect AI: Fair and Differentially Private Decentralised Deep Learning. 1003-1017 - Onur Duman, Mengyuan Zhang, Lingyu Wang, Mourad Debbabi, Ribal F. Atallah, Bernard Lebel:
Factor of Security (FoS): Quantifying the Security Effectiveness of Redundant Smart Grid Subsystems. 1018-1035 - Jianting Ning, Xinyi Huang, Willy Susilo, Kaitai Liang, Ximeng Liu, Yinghui Zhang:
Dual Access Control for Cloud-Based Data Storage and Sharing. 1036-1048 - Mazen Al-Wadi, Kazi Abu Zubair, David Mohaisen, Amro Awad:
Phoenix: Towards Ultra-Low Overhead, Recoverable, and Persistently Secure NVM. 1049-1063 - Shengmin Xu, Jianting Ning, Yingjiu Li, Yinghui Zhang, Guowen Xu, Xinyi Huang, Robert H. Deng:
Match in My Way: Fine-Grained Bilateral Access Control for Secure Cloud-Fog Computing. 1064-1077 - Shahram Khazaei, Mojtaba Rafiee:
Towards More Secure Constructions of Adjustable Join Schemes. 1078-1089 - Yandong Zheng, Rongxing Lu, Yunguo Guan, Jun Shao, Hui Zhu:
Achieving Efficient and Privacy-Preserving Exact Set Similarity Search over Encrypted Data. 1090-1103 - Ning Xie, Zhuoyuan Li, Jie Tan, Alex X. Liu:
Detection of Information Hiding at Physical Layer in Wireless Communications. 1104-1117 - Lei Zhou, Anmin Fu, Guomin Yang, Huaqun Wang, Yuqing Zhang:
Efficient Certificateless Multi-Copy Integrity Auditing Scheme Supporting Data Dynamics. 1118-1132 - Meng Li, Yifei Chen, Shuli Zheng, Donghui Hu, Chhagan Lal, Mauro Conti:
Privacy-Preserving Navigation Supporting Similar Queries in Vehicular Networks. 1133-1148 - Jiayun Xu, Yingjiu Li, Robert H. Deng, Ke Xu:
SDAC: A Slow-Aging Solution for Android Malware Detection Using Semantic Distance Based API Clustering. 1149-1163 - Jianting Ning, Geong Sen Poh, Xinyi Huang, Robert H. Deng, Shuwei Cao, Ee-Chien Chang:
Update Recovery Attacks on Encrypted Database Within Two Updates Using Range Queries Leakage. 1164-1180 - Yazdan Movahedi, Michel Cukier, Ilir Gashi:
Predicting the Discovery Pattern of Publically Known Exploited Vulnerabilities. 1181-1193 - Harshan Jagadeesh, Amogh Vithalkar, Naman Jhunjhunwala, Manthan Kabra, Prafull Manav, Yih-Chun Hu:
Double-Edge Embedding Based Provenance Recovery for Low-Latency Applications in Wireless Networks. 1194-1211 - Dayong Ye, Tianqing Zhu, Sheng Shen, Wanlei Zhou, Philip S. Yu:
Differentially Private Multi-Agent Planning for Logistic-Like Problems. 1212-1226 - Dariush Abbasinezhad-Mood, Sayyed Majid Mazinani, Morteza Nikooghadam, Arezou Ostad-Sharif:
Efficient Provably-Secure Dynamic ID-Based Authenticated Key Agreement Scheme With Enhanced Security Provision. 1227-1238 - Fabrizio Cicala, Elisa Bertino:
Analysis of Encryption Key Generation in Modern Crypto Ransomware. 1239-1253 - Mandrita Banerjee, Carlo Borges, Kim-Kwang Raymond Choo, Junghee Lee, Chrysostomos Nicopoulos:
A Hardware-Assisted Heartbeat Mechanism for Fault Identification in Large-Scale IoT Systems. 1254-1265 - Yang Liu, Tong Feng, Mugen Peng, Jianfeng Guan, Yu Wang:
DREAM: Online Control Mechanisms for Data Aggregation Error Minimization in Privacy-Preserving Crowdsensing. 1266-1279 - Jianye Huang, Willy Susilo, Fuchun Guo, Ge Wu, Zhen Zhao, Qiong Huang:
An Anonymous Authentication System for Pay-As-You-Go Cloud Computing$^*$*. 1280-1291 - Djamel Eddine Kouicem, Youcef Imine, Abdelmadjid Bouabdallah, Hicham Lakhlef:
Decentralized Blockchain-Based Trust Management Protocol for the Internet of Things. 1292-1306 - Bernardo Ferreira, Bernardo Portela, Tiago Oliveira, Guilherme Borges, Henrique João L. Domingos, João Leitão:
Boolean Searchable Symmetric Encryption With Filters on Trusted Hardware. 1307-1319 - Haining Yang, Ye Su, Jing Qin, Huaxiong Wang:
Privacy-Preserving Outsourced Inner Product Computation on Encrypted Database. 1320-1337 - Shuming Qiu, Ding Wang, Guoai Xu, Saru Kumari:
Practical and Provably Secure Three-Factor Authentication Protocol Based on Extended Chaotic-Maps for Mobile Lightweight Devices. 1338-1351 - Benyuan Yang, Hesuan Hu:
Dynamic Implementation of Security Requirements in Business Processes. 1352-1363 - Guowen Xu, Hongwei Li, Yun Zhang, Shengmin Xu, Jianting Ning, Robert H. Deng:
Privacy-Preserving Federated Deep Learning With Irregular Users. 1364-1381 - Zi-Long Liu, Chi-Man Pun:
Reversible Data Hiding in Encrypted Images using Chunk Encryption and Redundancy Matrix Representation. 1382-1394 - Wenlong Tian, Ruixuan Li, Zhiyong Xu, Weijun Xiao:
Loco-Store: Locality-Based Oblivious Data Storage. 1395-1406 - Maryam Zarezadeh, Hamid Mala, Behrouz Tork Ladani:
Efficient Secure Pattern Matching With Malicious Adversaries. 1407-1419 - Yang Du, Zhaoxia Yin, Xinpeng Zhang:
High Capacity Lossless Data Hiding in JPEG Bitstream Based on General VLC Mapping. 1420-1433
Volume 19, Number 3, May - June 2022
- Yanhai Xiong, Giridhar Ramachandran, Rajesh Ganesan, Sushil Jajodia, V. S. Subrahmanian:
Generating Realistic Fake Equations in Order to Reduce Intellectual Property Theft. 1434-1445 - Zhangshuang Guan, Zhiguo Wan, Yang Yang, Yan Zhou, Butian Huang:
BlockMaze: An Efficient Privacy-Preserving Account-Model Blockchain Based on zk-SNARKs. 1446-1463 - Jian Shen, Ziyuan Gui, Xiaofeng Chen, Jun Zhang, Yang Xiang:
Lightweight and Certificateless Multi-Receiver Secure Data Transmission Protocol for Wireless Body Area Networks. 1464-1475 - Domenico Cotroneo, Luigi De Simone, Pietro Liguori, Roberto Natella:
Fault Injection Analytics: A Novel Approach to Discover Failure Modes in Cloud-Computing Systems. 1476-1491 - Fengwei Wang, Hui Zhu, Rongxing Lu, Yandong Zheng, Hui Li:
Achieve Efficient and Privacy-Preserving Disease Risk Assessment Over Multi-Outsourced Vertical Datasets. 1492-1504 - Saiyu Qi, Yuanqing Zheng, Xiaofeng Chen, Wei Wei:
Ants can Carry Cheese: Secure and Private RFID-Enabled Third-Party Distribution. 1505-1517 - Jia-Nan Liu, Xizhao Luo, Jian Weng, Anjia Yang, Xu An Wang, Ming Li, Xiaodong Lin:
Enabling Efficient, Secure and Privacy-Preserving Mobile Cloud Storage. 1518-1531 - Hongbo Li, Qiong Huang, Willy Susilo:
A Secure Cloud Data Sharing Protocol for Enterprise Supporting Hierarchical Keyword Search. 1532-1543 - Shuitao Gan, Chao Zhang, Xiaojun Qin, Xuwen Tu, Kang Li, Zhongyu Pei, Zuoning Chen:
Path Sensitive Fuzzing for Native Applications. 1544-1561 - Mingfu Xue, Can He, Jian Wang, Weiqiang Liu:
One-to-N & N-to-One: Two Advanced Backdoor Attacks Against Deep Learning Models. 1562-1578 - Zheli Liu, Siyi Lv, Jin Li, Yanyu Huang, Liang Guo, Yali Yuan, Changyu Dong:
EncodeORE: Reducing Leakage and Preserving Practicality in Order-Revealing Encryption. 1579-1591 - Minghui Li, Sherman S. M. Chow, Shengshan Hu, Yuejing Yan, Chao Shen, Qian Wang:
Optimizing Privacy-Preserving Outsourced Convolutional Neural Network Predictions. 1592-1604 - Christian Berger, Hans P. Reiser, João Sousa, Alysson Bessani:
AWARE: Adaptive Wide-Area Replication for Fast and Resilient Byzantine Consensus. 1605-1620 - Runqing Yang,