Journal: IEEE Trans. Dependable Sec. Comput.

Volume 21, Issue 2

501 -- 514Jianwei Liu 0008, Xiang Zou, Leqi Zhao, Yusheng Tao, Sideng Hu, Jinsong Han, Kui Ren 0001. Privacy Leakage in Wireless Charging
515 -- 529Yinxing Xue, Jiaming Ye, Wei Zhang, Jun Sun 0001, Lei Ma 0003, Haijun Wang, Jianjun Zhao 0001. xFuzz: Machine Learning Guided Cross-Contract Fuzzing
530 -- 541Qian Li 0024, Chao Shen 0001, Qingyuan Hu, Chenhao Lin, Xiang Ji, Saiyu Qi. Towards Gradient-Based Saliency Consensus Training for Adversarial Robustness
542 -- 558Xiao Cheng 0002, Xu Nie, Ningke Li, Haoyu Wang 0001, Zheng Zheng 0001, Yulei Sui. How About Bug-Triggering Paths? - Understanding and Characterizing Learning-Based Vulnerability Detectors
559 -- 572Wenbo Jiang, Tianwei Zhang 0004, Han Qiu 0001, Hongwei Li 0001, Guowen Xu. Incremental Learning, Incremental Backdoor Threats
573 -- 584Pedro Miguel Sánchez Sánchez, Alberto Huertas Celdrán, Timo Schenk, Adrian Lars Benjamin Iten, Gérôme Bovet, Gregorio Martínez Pérez, Burkhard Stiller. Studying the Robustness of Anti-Adversarial Federated Learning Models Detecting Cyberattacks in IoT Spectrum Sensors
585 -- 599Qun Song 0001, Rui Tan 0001, Chao Ren 0006, Yan Xu 0005, Yang Lou, Jianping Wang 0001, Hoay Beng Gooi. On Credibility of Adversarial Examples Against Learning-Based Grid Voltage Stability Assessment
600 -- 617Ge Ren, Jun Wu 0001, Gaolei Li, Shenghong Li 0001, Mohsen Guizani. Protecting Intellectual Property With Reliable Availability of Learning Models in AI-Based Cybersecurity Services
618 -- 635Prithwiraj Roy, Shameek Bhattacharjee, Sahar Abedzadeh, Sajal K. Das 0001. Noise Resilient Learning for Attack Detection in Smart Grid PMU Infrastructure
636 -- 649Han Fang, Yupeng Qiu, Guorui Qin, Jiyi Zhang, Kejiang Chen, Weiming Zhang 0001, Ee-Chien Chang. 2Dataset Protection by Data Poisoning
650 -- 667Ping Wang, Haichang Gao, Xiaoyan Guo, Zhongni Yuan, Jiawei Nian. Improving the Security of Audio CAPTCHAs With Adversarial Examples
668 -- 684Wenhan Xu, Hui Ma 0002, Zishuai Song, Jianhao Li, Rui Zhang 0002. Gringotts: An Encrypted Version Control System With Less Trust on Servers
685 -- 700Wenbo Jiang, Hongwei Li 0001, Guowen Xu, Tianwei Zhang 0004, Rongxing Lu. A Comprehensive Defense Framework Against Model Extraction Attacks
701 -- 716Shahid Khan 0002, Joost-Pieter Katoen, Marc Bouissou. A Compositional Semantics of Boolean-Logic Driven Markov Processes
717 -- 731Di Zhang, Junqing Le, Xinyu Lei, Tao Xiang 0001, Xiaofeng Liao. Secure Redactable Blockchain With Dynamic Support
732 -- 745Insup Lee 0002, Wonjun Lee 0001. UniQGAN: Towards Improved Modulation Classification With Adversarial Robustness Using Scalable Generator Design
746 -- 763Cheng Guo 0001, Wenfeng Li, Xinyu Tang, Kim-Kwang Raymond Choo, Yining Liu 0002. Forward Private Verifiable Dynamic Searchable Symmetric Encryption With Efficient Conjunctive Query
764 -- 774Linqing Gui, Weihao Zhou, Pinchang Zhang, Fu Xiao 0001. Cooperative Jamming-Aided Secure Communication in Wireless Powered Sensor Networks
775 -- 788Zijian Zhang 0001, Xuyang Liu, Meng Li 0006, Hao Yin, Liehuang Zhu, Bakh Khoussainov, Keke Gai. HCA: Hashchain-Based Consensus Acceleration Via Re-Voting
789 -- 803Yifeng Zheng, Menglun Zhou, Songlei Wang, Hejiao Huang, Xiaohua Jia, Xun Yi, Cong Wang 0001. SecDR: Enabling Secure, Efficient, and Accurate Data Recovery for Mobile Crowdsensing
804 -- 818Roberto Pietrantuono, Massimo Ficco, Francesco Palmieri 0002. Testing the Resilience of MEC-Based IoT Applications Against Resource Exhaustion Attacks
819 -- 827Jayson Sia, Edmond A. Jonckheere, Laith Shalalfeh, Paul Bogdan. Phasor Measurement Unit Change-Point Detection of Frequency Hurst Exponent Anomaly With Time-to-Event
828 -- 846Cavit Özbay, Albert Levi. Blacklisting Based Anonymous Authentication Scheme for Sharing Economy
847 -- 859Xiao Han 0001, Yuncong Yang, Leye Wang, Junjie Wu. Privacy-Preserving Network Embedding Against Private Link Inference Attacks
860 -- 875Dan Zhu, Hui Zhu 0001, Cheng Huang 0001, Rongxing Lu, Dengguo Feng, Xuemin Shen. Efficient and Accurate Cloud-Assisted Medical Pre-Diagnosis With Privacy Preservation
876 -- 888Jungang Yang 0002, Liyao Xiang, Pengzhi Chu, Xinbing Wang, Chenghu Zhou. Certified Distributional Robustness on Smoothed Classifiers
889 -- 904Caiqin Dong, Jian Weng 0001, Ming Li 0049, Jia-Nan Liu, Zhiquan Liu, Yudan Cheng, Shui Yu 0001. Privacy-Preserving and Byzantine-Robust Federated Learning
905 -- 919Yongzhong He, Yiming Wang, Sencun Zhu, Wei Wang, Yunjia Zhang, Qiang Li, Aimin Yu. Automatically Identifying CVE Affected Versions With Patches and Developer Logs
920 -- 936Deqiang Li, Shicheng Cui, Yun Li 0009, Jia Xu 0003, Fu Xiao 0001, Shouhuai Xu. PAD: Towards Principled Adversarial Malware Detection Against Evasion Attacks
937 -- 948Chunpeng Ge, Zhe Liu 0001, Willy Susilo, Liming Fang 0001, Hao Wang. Attribute-Based Encryption With Reliable Outsourced Decryption in Cloud Computing Using Smart Contract
949 -- 960Chunpeng Ge, Willy Susilo, Zhe Liu 0001, Joonsang Baek, Xiapu Luo, Liming Fang 0001. Attribute-Based Proxy Re-Encryption With Direct Revocation Mechanism for Data Sharing in Clouds
961 -- 974Yaxi Yang, Jian Weng 0001, Yao Tong, Jia-Nan Liu, Zhenghao Wu, Leo Yu Zhang, Anjia Yang. PriGenX: Privacy-Preserving Query With Anonymous Access Control for Genomic Data
975 -- 986Renato Ferrero, Bartolomeo Montrucchio. Banknote Identification Through Unique Fluorescent Properties
987 -- 1000Emanuele Maiorana, Chiara Romano, Emiliano Schena, Carlo Massaroni. BIOWISH: Biometric Recognition Using Wearable Inertial Sensors Detecting Heart Activity