![](https://dblp.uni-trier.de./img/logo.320x120.png)
![search dblp search dblp](https://dblp.uni-trier.de./img/search.dark.16x16.png)
![search dblp](https://dblp.uni-trier.de./img/search.dark.16x16.png)
default search action
IEEE Transactions on Dependable and Secure Computing, Volume 22
Volume 22, Number 1, January - February 2025
- Shaowei Wang, Shiyu Yu, Xiaojun Ren, Jin Li, Yuntong Li, Wei Yang, Hongyang Yan, Jin Li:
Differentially Private Numerical Vector Analyses in the Local and Shuffle Model. 1-15 - Zeyu Yang, Liang He, Peng Cheng, Jiming Chen:
Mismatched Control and Monitoring Frequencies: Vulnerability, Attack, and Mitigation. 16-33 - Yunyi Zhang, Chengxi Xu, Fan Shi, Miao Hu, Min Zhang, Yuwei Li, Zhijie Xie:
Understanding and Characterizing the Adoption of Internationalized Domain Names in Practice. 34-48 - Awaneesh Kumar Yadav, Manoj Misra, Pradumn Kumar Pandey, Pasika Ranaweera, Madhusanka Liyanage, Neeraj Kumar:
A Secure Authentication Protocol for IoT-WLAN Using EAP Framework. 49-65 - Antonino Rullo, Carmelo Felicetti, Massimo Vatalaro, Raffaele De Rose, Marco Lanuzza, Felice Crupi, Domenico Saccà:
PUF-Based Authentication-Oriented Architecture for Identification Tags. 66-83 - Lan Zhang, Xinben Gao, Yaliang Li, Yunhao Liu:
Functionality and Data Stealing by Pseudo-Client Attack and Target Defenses in Split Learning. 84-100 - Shougang Yuan, Amro Awad, Huiyang Zhou:
Delta Counter: Bandwidth-Efficient Encryption Counter Representation for Secure GPU Memory. 101-113 - Shuo Shao, Wenyuan Yang, Hanlin Gu, Zhan Qin, Lixin Fan, Qiang Yang, Kui Ren:
FedTracker: Furnishing Ownership Verification and Traceability for Federated Learning Model. 114-131 - Haomiao Yang, Dongyun Xue, Mengyu Ge, Jingwei Li, Guowen Xu, Hongwei Li, Rongxing Lu:
Fast Generation-Based Gradient Leakage Attacks: An Approach to Generate Training Data Directly From the Gradient. 132-145 - Matthew Nance Hall, Zaoxing Liu, Vyas Sekar, Ramakrishnan Durairajan:
Analyzing the Benefits of Optical Topology Programming for Mitigating Link-Flood DDoS Attacks. 146-163 - Xiaopeng Dai, Qianhong Wu, Bingyu Li, Bo Qin, Jialiang Fan, Fuyang Deng, Mingzhe Zhai:
R2E: A Decentralized Scheme for Rewarding Tor Relays With Cryptocurrencies. 164-178 - Kai Ye, Xiaogang Zhu, Xi Xiao, Sheng Wen, Minhui Xue, Yang Xiang:
BazzAFL: Moving Fuzzing Campaigns Towards Bugs via Grouping Bug-Oriented Seeds. 179-191 - Jiliang Li, Yuan Su, Rongxing Lu, Zhou Su, Weizhi Meng, Meng Shen:
StealthPath: Privacy-Preserving Path Validation in the Data Plane of Path-Aware Networks. 192-204 - Songtao Fu, Qi Li, Xiaoliang Wang, Su Yao, Xuewei Feng, Ziqiang Wang, Xinle Du, Kao Wan, Ke Xu:
Secure Fault Localization in Path Aware Networking. 205-220 - Chenghao Hu, Baochun Li:
MaskCrypt: Federated Learning With Selective Homomorphic Encryption. 221-233 - Alian Yu, Jian Kang, Wei Jiang, Dan Lin:
Highly Efficient and Scalable Access Control Mechanism for IoT Devices in Pervasive Environments. 234-245 - Byoungjin Seok, Changhoon Lee:
A Novel Approach to Construct a Good Dataset for Differential-Neural Cryptanalysis. 246-262 - Erzhuo Chen, Vladislav Dubrovenski, Dianxiang Xu:
Detecting Errors in NGAC Policies via Fault-Based Testing. 263-278 - Jaeyoon Jeong, Insung Baek, Byungwoo Bang, Junyeon Lee, Uiseok Song, Seoung Bum Kim:
FALL: Prior Failure Detection in Large Scale System Based on Language Model. 279-291 - Liangliang Wang, Jiangwei Xu, Baodong Qin, Mi Wen, Kefei Chen:
An Efficient Fuzzy Certificateless Signature-Based Authentication Scheme Using Anonymous Biometric Identities for VANETs. 292-307 - Fiorella Artuso, Marco Mormando, Giuseppe Antonio Di Luna, Leonardo Querzoni:
BinBert: Binary Code Understanding With a Fine-Tunable and Execution-Aware Transformer. 308-326 - Daren Fadolalkarim, Elisa Bertino:
DCAFixer: An Automatic Tool for Bug Detection and Repair for Database Java Client Applications. 327-342 - Dongliang Fang, Anni Peng, Le Guan, Erik van der Kouwe, Klaus von Gleissenthall, Wenwen Wang, Yuqing Zhang, Limin Sun:
InvisiGuard: Data Integrity for Microcontroller-Based Devices via Hardware-Triggered Write Monitoring. 343-358 - Xu Yang, Fei Zhu, Xuechao Yang, Junwei Luo, Xun Yi, Jianting Ning, Xinyi Huang:
Secure Reputation-Based Authentication With Malicious Detection in VANETs. 359-372 - Vikram Kanth, Britta Hale:
Blockchain-Based Authenticated Stego-Channels and Application to Ethereum. 373-387 - Wisam Abbasi, Paolo Mori, Andrea Saracino:
Trading-Off Privacy, Utility, and Explainability in Deep Learning-Based Image Data Analysis. 388-405 - Vlasis Koutsos, Sankarshan Damle, Dimitrios Papadopoulos, Sujit Gujar, Dimitris Chatzopoulos:
$\mathsf {AVeCQ}$AVeCQ: Anonymous Verifiable Crowdsourcing With Worker Qualities. 406-423 - Hengzhi Wang, Laizhong Cui, En Wang, Jiangchuan Liu:
A Differentially Private Approach for Budgeted Combinatorial Multi-Armed Bandits. 424-439 - Guorui Xie, Qing Li, Chupeng Cui, Ruoyu Li, Lianbo Ma, Zhuyun Qi, Yong Jiang:
Intelligent In-Network Attack Detection on Programmable Switches With Soterv2. 440-456 - Xue Rao, Cong Sun, Dongrui Zeng, Yongzhe Huang, Gang Tan:
Sliver: A Scalable Slicing-Based Verification for Information Flow Security. 457-473 - Wenbo Shen, Yifei Wu, Yutian Yang, Qirui Liu, Nanzi Yang, Jinku Li, Kangjie Lu, Jianfeng Ma:
Towards Understanding and Defeating Abstract Resource Attacks for Container Platforms. 474-490 - Chenchen Cao, Chunxiang Xu, Changsong Jiang, Zhao Zhang, Xinfeng Dong, Kefei Chen:
LPbT-SSO: Password-Based Threshold Single-Sign-On Authentication From LWE. 491-504 - Yongshuo Wan, Cuiying Feng, Kui Wu, Jianping Wang:
RZDD: Risk Zone-Diversified Network Design for Disaster Resilience. 505-517 - Sareena Karapoola, Nikhilesh Singh, Chester Rebeiro, Kamakoti Veezhinathan:
SUNDEW: A Case-Sensitive Detection Engine to Counter Malware Diversity. 518-533 - Yandong Zheng, Hui Zhu, Rongxing Lu, Songnian Zhang, Fengwei Wang, Jun Shao, Hui Li:
Efficient and Privacy-Preserving Weighted Range Set Sampling in Cloud. 534-548 - Dylan Zapzalka, Saeed Salem, David Mohaisen:
Semantics-Preserving Node Injection Attacks Against GNN-Based ACFG Malware Classifiers. 549-560 - Daniele Bringhenti, Riccardo Sisto, Fulvio Valenza:
Automating VPN Configuration in Computer Networks. 561-578 - Shaoquan Jiang, Dima Alhadidi, Hamid Fazli Khojir:
Key-and-Signature Compact Multi-Signatures for Blockchain: A Compiler With Realizations. 579-596 - Guanglin Duan, Qing Li, Zhengxin Zhang, Dan Zhao, Guorui Xie, Yuan Yang, Zhenhui Yuan, Yong Jiang, Mingwei Xu:
DNSGuard: In-Network Defense Against DNS Attacks. 597-613 - Steffen Wendzel, Tobias Schmidbauer, Sebastian Zillien, Jörg Keller:
DYST (Did You See That?): An Amplified Covert Channel That Points To Previously Seen Data. 614-631 - Chenxiang Luo, Wenyi Tang, Qixu Wang, Danyang Zheng:
Few-Shot Website Fingerprinting With Distribution Calibration. 632-648 - Xinyi Luo, Kaiping Xue, Qibin Sun, Jun Lu:
CrossChannel: Efficient and Scalable Cross-Chain Transactions Through Cross-and-Off-Blockchain Micropayment Channel. 649-663 - Guodong Cao, Zhibo Wang, Xiaowei Dong, Zhifei Zhang, Hengchang Guo, Zhan Qin, Kui Ren:
Vanilla Feature Distillation for Improving the Accuracy-Robustness Trade-Off in Adversarial Training. 664-676 - Zixuan Ma, Chen Li, Yuqi Zhang, Ruibang You, Bibo Tu:
IMS: Towards Computability and Dynamicity for Intent-Driven Micro-Segmentation. 677-694 - Sirui Hao, Junjiang He, Wenshan Li, Tao Li, Geying Yang, Wenbo Fang, Wanying Chen:
CSCAD: An Adaptive LightGBM Algorithm to Detect Cache Side-Channel Attacks. 695-709 - Xiaoning Liu, Yifeng Zheng, Xingliang Yuan, Xun Yi:
${\sf GoCrowd}$GoCrowd: Obliviously Aggregating Crowd Wisdom With Quality Awareness in Crowdsourcing. 710-722 - Weikang Liu, Bin Cao, Mugen Peng, Bo Li:
Distributed and Parallel Blockchain: Towards a Multi-Chain System With Enhanced Security. 723-739 - Xinjun Pei, Xiaoheng Deng, Shengwei Tian, Ping Jiang, Yunlong Zhao, Kaiping Xue:
A Privacy-Preserving Graph Neural Network for Network Intrusion Detection. 740-756 - Yanlong Qiu, Jiaxi Zhang, Tao Sun, Yanjiao Chen, Jin Zhang, Bo Ji:
WASTON: Inferring Critical Information to Enable Spoofing Attacks Using COTS mmWave Radar. 757-770 - Xinyi Luo, Kaiping Xue, Zhuo Xu, Mingrui Ai, Jianan Hong, Xianchao Zhang, Qibin Sun, Jun Lu:
EtherCloak: Enabling Multi-Level and Customized Privacy on Account-Model Blockchains. 771-786 - Jieying An, Yanbing Ren, Xinghua Li, Man Zhang, Bin Luo, Yinbin Miao, Ximeng Liu, Robert H. Deng:
Privacy-Preserving User Recruitment With Sensing Quality Evaluation in Mobile Crowdsensing. 787-803 - Xindi Ma, Xinfu Li, Junying Zhang, Zhuo Ma, Qi Jiang, Ximeng Liu, Jianfeng Ma:
Repairing Backdoor Model With Dynamic Gradient Clipping for Intelligent Vehicles. 804-818 - Shan Chang, Luo Zhou, Wei Liu, Hongzi Zhu, Xinggang Hu, Lei Yang:
Combating Voice Spoofing Attacks on Wearables via Speech Movement Sequences. 819-832 - Huige Wang, Kefei Chen, Qi Xie, Qian Meng:
Post-Quantum Secure Identity-Based Matchmaking Encryption. 833-844
![](https://dblp.uni-trier.de./img/cog.dark.24x24.png)
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.