Journal: IEEE Trans. Dependable Sec. Comput.

Volume 19, Issue 6

3579 -- 3591Hanan Hibshi, Stephanie T. Jones, Travis D. Breaux. A Systemic Approach for Natural Language Scenario Elicitation of Security Requirements
3592 -- 3606Jiabei Wang, Rui Zhang 0002, Jianhao Li, Yuting Xiao, Hui Ma 0002. SeUpdate: Secure Encrypted Data Update for Multi-User Environments
3607 -- 3620Xinyu Zhang, Bingsheng Zhang, Aggelos Kiayias, Thomas Zacharias 0001, Kui Ren 0001. An Efficient E2E Crowd Verifiable E-Voting System
3621 -- 3639Xiaoqin Feng, Jianfeng Ma 0001, Yinbin Miao, Ximeng Liu, Kim-Kwang Raymond Choo. Social Characteristic-Based Propagation-Efficient PBFT Protocol to Broadcast in Unstructured Overlay Networks
3640 -- 3655Chengjun Cai, Lei Xu 0019, Anxin Zhou, Cong Wang 0001. Toward a Secure, Rich, and Fair Query Service for Light Clients on Public Blockchains
3656 -- 3670Qilei Yin, Zhuotao Liu, Qi Li 0002, Tao Wang, Qian Wang 0002, Chao Shen 0001, Yixiao Xu. An Automated Multi-Tab Website Fingerprinting Attack
3671 -- 3685Yang Liu 0118, Zhuo Ma, Yilong Yang 0004, Ximeng Liu, Jianfeng Ma 0001, Kui Ren 0001. RevFRF: Enabling Cross-Domain Random Forest Training With Revocable Federated Learning
3686 -- 3698Jianan Gu, Yukun Ma, Beilei Zheng, Chuliang Weng. Outlier: Enabling Effective Measurement of Hypervisor Code Integrity With Group Detection
3699 -- 3710Yuchang Mo, Liudong Xing. Efficient Analysis of Resource Availability for Cloud Computing Systems to Reduce SLA Violations
3711 -- 3727Eunsang Lee, Joon-Woo Lee, Jong-Seon No, Young-Sik Kim. Minimax Approximation of Sign Function by Composite Polynomial for Homomorphic Comparison
3728 -- 3740Vlasis Koutsos, Dimitrios Papadopoulos 0001, Dimitris Chatzopoulos, Sasu Tarkoma, Pan Hui 0001. Agora: A Privacy-Aware Data Marketplace
3741 -- 3758Pengfei Wu, Qi Li 0002, Jianting Ning, Xinyi Huang 0001, Wei Wu 0001. Differentially Oblivious Data Analysis With Intel SGX: Design, Optimization, and Evaluation
3759 -- 3773Shengmin Xu, Jianting Ning, Xinyi Huang 0001, Yingjiu Li, Guowen Xu. Untouchable Once Revoking: A Practical and Secure Dynamic EHR Sharing System via Cloud
3774 -- 3789Xiang Gao, Jia Yu 0005, Yan Chang, Huaqun Wang, Jianxi Fan. Checking Only When It Is Necessary: Enabling Integrity Auditing Based on the Keyword With Sensitive Information Privacy for Encrypted Cloud Data
3790 -- 3803Sazzadur Rahaman, Haipeng Cai, Omar Chowdhury, Danfeng Yao. From Theory to Code: Identifying Logical Flaws in Cryptographic Implementations in C/C++
3804 -- 3821Huashan Chen, Hasan Cam, Shouhuai Xu. Quantifying Cybersecurity Effectiveness of Dynamic Network Diversity
3822 -- 3836Jordan Samhi, Alexandre Bartel. On The (In)Effectiveness of Static Logic Bomb Detection for Android Apps
3837 -- 3854Yi Wang 0055, Rongmao Chen, Xinyi Huang 0001, Baosheng Wang. Secure Anonymous Communication on Corrupted Machines With Reverse Firewalls
3855 -- 3872Yongyi Cao, Hao Jiang 0010, Yuchuan Deng, Jing Wu 0016, Pan Zhou, Wei Luo. Detecting and Mitigating DDoS Attacks in SDN Using Spatial-Temporal Graph Convolutional Network
3873 -- 3886Lin Yao 0001, Zhenyu Chen, Haipeng Dai, Guowei Wu. Exploiting Non-Cooperative Game Against Cache Pollution Attack in Vehicular Content Centric Network
3887 -- 3898Federico Daidone, Barbara Carminati, Elena Ferrari. Blockchain-Based Privacy Enforcement in the IoT Domain
3899 -- 3912Pei Huang 0005, Xiaonan Zhang, Sihan Yu, Linke Guo. IS-WARS: Intelligent and Stealthy Adversarial Attack to Wi-Fi-Based Human Activity Recognition Systems
3913 -- 3924Xuyang Jing, Zheng Yan 0002, Hui Han, Witold Pedrycz. ExtendedSketch: Fusing Network Traffic for Super Host Identification With a Memory Efficient Sketch
3925 -- 3940Lingyuan Yin, Jing Xu 0002, Qiang Tang 0005. Sidechains With Fast Cross-Chain Transfers
3941 -- 3954Guohua Tian, Yunhan Hu, Jianghong Wei, Zheli Liu, Xinyi Huang 0001, Xiaofeng Chen 0001, Willy Susilo. Blockchain-Based Secure Deduplication and Shared Auditing in Decentralized Storage
3955 -- 3970Mazen Azzam, Liliana Pasquale, Gregory M. Provan, Bashar Nuseibeh. Grounds for Suspicion: Physics-Based Early Warnings for Stealthy Attacks on Industrial Control Systems
3971 -- 3986Mohammad M. Jalalzai, Chen Feng 0001, Costas Busch, Golden G. Richard III, Jianyu Niu. The Hermes BFT for Blockchains
3987 -- 4001Changjiang Li, Shouling Ji, Haiqin Weng, Bo Li 0026, Jie Shi, Raheem Beyah, Shanqing Guo, Zonghui Wang, Ting Wang 0006. Towards Certifying the Asymmetric Robustness for Neural Networks: Quantification and Applications
4002 -- 4018Cong Wu 0003, Kun He 0008, Jing Chen 0003, Ziming Zhao 0001, RuiYing Du. Toward Robust Detection of Puppet Attacks via Characterizing Fingertip-Touch Behaviors
4019 -- 4031Damu Ding, Marco Savi, Domenico Siracusa. Tracking Normalized Network Traffic Entropy to Detect DDoS Attacks in P4
4032 -- 4038Rachid Guerraoui, Alexandre Maurer. Byzantine-Resilient Multi-Agent System
4039 -- 4051Berk Gülmezoglu. XAI-Based Microarchitectural Side-Channel Analysis for Website Fingerprinting Attacks and Defenses
4052 -- 4067Amir Rezapour, Wen-Guey Tzeng. RL-Shield: Mitigating Target Link-Flooding Attacks Using SDN and Deep Reinforcement Learning Routing Algorithm
4068 -- 4081Maryam Farajzadeh Zanjani, Ehsan Hallaji, Roozbeh Razavi-Far, Mehrdad Saif. Generative-Adversarial Class-Imbalance Learning for Classifying Cyber-Attacks and Faults - A Cyber-Physical Power System
4082 -- 4098Danilo Bruschi, Andrea Di Pasquale, Silvio Ghilardi, Andrea Lanzi, Elena Pagani. A Formal Verification of ArpON - A Tool for Avoiding Man-in-the-Middle Attacks in Ethernet Networks
4099 -- 4112Qiang Li 0007, Dawei Tan, Xin Ge, Haining Wang, Zhi Li 0018, Jiqiang Liu. Understanding Security Risks of Embedded Devices Through Fine-Grained Firmware Fingerprinting
4113 -- 4126Bin Xie, Tao Xiang, Xiaofeng Liao 0001, Jiahui Wu. Achieving Privacy-Preserving Online Diagnosis With Outsourced SVM in Internet of Medical Things Environment
4127 -- 4144Samaikya Valluripally, Aniket Gulhane, Khaza Anuarul Hoque, Prasad Calyam. Modeling and Defense of Social Virtual Reality Attacks Inducing Cybersickness
4145 -- 4155Pengfei Tang, Wenjie Wang, Jian Lou 0001, Li Xiong 0001. Generating Adversarial Examples With Distance Constrained Adversarial Imitation Networks
4156 -- 4171Zihan Sha, Hui Shu, Xiaobing Xiong, Fei Kang. Model of Execution Trace Obfuscation Between Threads
4172 -- 4186Anas Daghistani, Mosab Khayat, Muhamad Felemban, Walid G. Aref, Arif Ghafoor. Guard: Attack-Resilient Adaptive Load Balancing in Distributed Streaming Systems
4187 -- 4203Saeid Mofrad, Ishtiaq Ahmed, Fengwei Zhang, Shiyong Lu, Ping Yang 0002, Heming Cui. Securing Big Data Scientific Workflows via Trusted Heterogeneous Environments
4204 -- 4224Haibin Zheng, Jinyin Chen, Hang Du, WeiPeng Zhu, Shouling Ji, Xuhong Zhang 0005. GRIP-GAN: An Attack-Free Defense Through General Robust Inverse Perturbation
4225 -- 4239Xiaojun Zhang, Chao Huang 0012, Yuan Zhang 0006, Sheng Cao. Enabling Verifiable Privacy-Preserving Multi-Type Data Aggregation in Smart Grids
4240 -- 4254Zhijian Shao, Jian Weng 0001, Yue Zhang 0025, Yongdong Wu, Ming Li 0049, Jia-Si Weng, Weiqi Luo 0002, Shui Yu. Peripheral-Free Device Pairing by Randomly Switching Power
4255 -- 4269Afsah Anwar, Ahmed Abusnaina, Songqing Chen, Frank Li 0001, David Mohaisen. Cleaning the NVD: Comprehensive Quality Assessment, Improvements, and Analyses
4270 -- 4284Jiahui Hou, Huiqi Liu, Yunxin Liu, Yu Wang 0003, Peng-Jun Wan, Xiang-Yang Li 0001. Model Protection: Real-Time Privacy-Preserving Inference Service for Model Privacy at the Edge
4285 -- 4293Albert Guan, Chia-Mei Chen. A Novel Verification Scheme to Resist Online Password Guessing Attacks

Volume 19, Issue 5

2864 -- 2872Chunpeng Ge, Willy Susilo, Joonsang Baek, Zhe Liu 0001, Jinyue Xia, Liming Fang 0001. Revocable Attribute-Based Encryption With Data Integrity in Clouds
2873 -- 2889Jun Qiu, Xuewu Yang, Huamao Wu, Yajin Zhou, Jinku Li, Jianfeng Ma 0001. LibCapsule: Complete Confinement of Third-Party Libraries in Android Applications
2890 -- 2906Ankur Chowdhary, Abdulhakim Sabur, Dijiang Huang, Myong H. Kang, James Kirby. Object Oriented Policy Conflict Checking Framework in Cloud Networks (OOPC)
2907 -- 2919Chunpeng Ge, Willy Susilo, Joonsang Baek, Zhe Liu 0001, Jinyue Xia, Liming Fang 0001. A Verifiable and Fair Attribute-Based Proxy Re-Encryption Scheme for Data Sharing in Clouds
2920 -- 2933Seema Kumar, Patrick Eugster, Silvia Santini. Software-Based Remote Network Attestation
2934 -- 2951Zhen Liu 0008, Guomin Yang, Duncan S. Wong, Khoa Nguyen, Huaxiong Wang, Xiaorong Ke, Yining Liu. Secure Deterministic Wallet and Stealth Address: Key-Insulated and Privacy-Preserving Signature Scheme With Publicly Derived Public Key
2952 -- 2964Cláudio Correia, Miguel Correia 0001, Luís Rodrigues 0001. Omega: A Secure Event Ordering Service for the Edge
2965 -- 2981Zhuotao Liu, Yangxi Xiang, Jian Shi, Peng Gao 0008, Haoyu Wang 0001, Xusheng Xiao, Bihan Wen, Qi Li 0002, Yih-Chun Hu. Make Web3.0 Connected
2982 -- 2997Xuejing Zhou, Wanli Peng, Boya Yang, Juan Wen, Yiming Xue, Ping Zhong. Linguistic Steganography Based on Adaptive Probability Distribution
2998 -- 3010Bowen Wang, Kangjie Lu, Qiushi Wu, Aditya Pakki. Unleashing Coveraged-Based Fuzzing Through Comprehensive, Efficient, and Faithful Exploitable-Bug Exposing
3011 -- 3023Chen Chen 0008, Roman Vitenberg, Hans-Arno Jacobsen. Building Fault-Tolerant Overlays With Low Node Degrees for Topic-Based Publish/Subscribe
3024 -- 3037Hua Deng, Jixin Zhang, Zheng Qin 0001, Qianhong Wu, Hui Yin, Aniello Castiglione. Policy-Based Broadcast Access Authorization for Flexible Data Sharing in Clouds
3038 -- 3054Yuefeng Du 0001, Huayi Duan, Anxin Zhou, Cong Wang 0001, Man Ho Au, Qian Wang 0002. Enabling Secure and Efficient Decentralized Storage Auditing With Blockchain
3055 -- 3070Xinyu Wang 0007, Yuefeng Du 0001, Cong Wang 0001, Qian Wang 0002, Liming Fang 0001. WebEnclave: Protect Web Secrets From Browser Extensions With Software Enclave
3071 -- 3086Mario Di Mauro, Giovanni Galatro, Fabio Postiglione, Marco Tambasco. Performability of Network Service Chains: Stochastic Modeling and Assessment of Softwarized IP Multimedia Subsystem
3087 -- 3100Meng Ma, Weilan Lin, Disheng Pan, Ping Wang 0003. ServiceRank: Root Cause Identification of Anomaly in Large-Scale Microservice Architectures
3101 -- 3112Jing Lei, Qingqi Pei, Yao Wang, Wenhai Sun, Xuefeng Liu 0002. PrivFace: Fast Privacy-Preserving Face Authentication With Revocable and Reusable Biometric Credentials
3113 -- 3124Hwimin Kim, Dae-Kyoo Kim, Alaa S. Alaerjan. ABAC-Based Security Model for DDS
3125 -- 3135Zhangjie Fu, Yueyan Zhi, Shouling Ji, Xingming Sun. Remote Attacks on Drones Vision Sensors: An Empirical Study
3136 -- 3148Yinjin Fu, Nong Xiao, Tao Chen, Jian Wang. Fog-to-MultiCloud Cooperative Ehealth Data Management With Application-Aware Secure Deduplication
3149 -- 3167Jiasi Weng, Jian Weng 0001, Chengjun Cai, Hongwei Huang, Cong Wang 0001. Golden Grain: Building a Secure and Decentralized Model Marketplace for MLaaS
3168 -- 3182Jinrong Chen, Lin Liu, Rongmao Chen, Wei Peng 0005, Xinyi Huang 0001. SecRec: A Privacy-Preserving Method for the Context-Aware Recommendation System
3183 -- 3199Hongwei Huang, Weiqi Luo, Guoqiang Zeng, Jian Weng 0001, Yue Zhang 0025, Anjia Yang. DAMIA: Leveraging Domain Adaptation as a Defense Against Membership Inference Attacks
3200 -- 3217Lei Bu, Zhe Zhao, Yuchao Duan, Fu Song. Taking Care of the Discretization Problem: A Comprehensive Study of the Discretization Problem and a Black-Box Adversarial Attack in Discrete Integer Domain
3218 -- 3230Qinchen Gu, David Formby, Shouling Ji, Brendan Saltaformaggio, Anu G. Bourgeois, Raheem Beyah. This Hacker Knows Physics: Device Physics Aware Mimicry Attacks in Cyber-Physical Systems
3231 -- 3243Beilei Zheng, Jianan Gu, Jialun Wang, Chuliang Weng. CBA-Detector: A Self-Feedback Detector Against Cache-Based Attacks
3244 -- 3256Himani Sikarwar, Debasis Das 0001. Towards Lightweight Authentication and Batch Verification Scheme in IoV
3257 -- 3270Haoyu Ma, Jianwen Tian, Debin Gao, Chunfu Jia. On the Effectiveness of Using Graphics Interrupt as a Side Channel for User Behavior Snooping
3271 -- 3285Haoyu Ma, Shijia Li, Debin Gao, Chunfu Jia. Secure Repackage-Proofing Framework for Android Apps Using Collatz Conjecture
3286 -- 3300Jing Chen 0003, Xin Chen, Kun He 0008, RuiYing Du, Weihang Chen, Yang Xiang 0001. DELIA: Distributed Efficient Log Integrity Audit Based on Hierarchal Multi-Party State Channel
3301 -- 3311Jing Chen 0003, Zeyi Zhan, Kun He 0008, RuiYing Du, Donghui Wang, Fei Liu. XAuth: Efficient Privacy-Preserving Cross-Domain Authentication
3312 -- 3328Shaharyar Khan, Stuart E. Madnick. Cybersafety: A System-Theoretic Approach to Identify Cyber-Vulnerabilities & Mitigation Requirements in Industrial Control Systems
3329 -- 3342Lingchen Zhao, Jianlin Jiang, Bo Feng, Qian Wang 0002, Chao Shen 0001, Qi Li 0002. SEAR: Secure and Efficient Aggregation for Byzantine-Robust Federated Learning
3343 -- 3356Kejiang Chen, Hang Zhou 0007, Hanqing Zhao, Dongdong Chen 0001, Weiming Zhang, Nenghai Yu. Distribution-Preserving Steganography Based on Text-to-Speech Generative Models
3357 -- 3370Chaoran Li, Xiao Chen 0002, Derui Wang, Sheng Wen, Muhammad Ejaz Ahmed, Seyit Camtepe, Yang Xiang 0001. Backdoor Attack on Machine Learning Based Android Malware Detectors
3371 -- 3386Mohammadhossein Amouei, Mohsen Rezvani, Mansoor Fateh. RAT: Reinforcement-Learning-Driven and Adaptive Testing for Vulnerability Discovery in Web Application Firewalls
3387 -- 3400Jingjing Zhang, Yingyao Rong, Jiannong Cao 0001, Chunming Rong, Jing Bian, Weigang Wu. DBFT: A Byzantine Fault Tolerance Protocol With Graceful Performance Degradation
3401 -- 3416Yu Guo 0003, Hongcheng Xie, Cong Wang 0001, Xiaohua Jia. Enabling Privacy-Preserving Geographic Range Query in Fog-Enhanced IoT Services
3417 -- 3431Sara Mohammadi, Frank Eliassen, Yan Zhang 0002, Hans-Arno Jacobsen. Detecting False Data Injection Attacks in Peer to Peer Energy Trading Using Machine Learning
3432 -- 3447Ahmed Abusnaina, Mohammed Abuhamad, Hisham Alasmary, Afsah Anwar, RhongHo Jang, Saeed Salem, DaeHun Nyang, David Mohaisen. DL-FHMC: Deep Learning-Based Fine-Grained Hierarchical Learning Approach for Robust Malware Classification
3448 -- 3463Huiying Hou, Jianting Ning, Yunlei Zhao, Robert H. Deng. Fine-Grained and Controllably Editable Data Sharing With Accountability in Cloud Storage
3464 -- 3477Yen-Lin Lee, Deron Liang, Wei-Jen Wang. Optimal Online Liveness Fault Detection for Multilayer Cloud Computing Systems
3478 -- 3493Yandong Zheng, Rongxing Lu, Yunguo Guan, Jun Shao, Hui Zhu 0001. Towards Practical and Privacy-Preserving Multi-Dimensional Range Query Over Cloud
3494 -- 3507Shijie Jia 0001, Qionglu Zhang, Luning Xia, Jiwu Jing, Peng Liu 0005. MDEFTL: Incorporating Multi-Snapshot Plausible Deniability into Flash Translation Layer
3508 -- 3520Haoyu Ma, Shijia Li, Debin Gao, Daoyuan Wu, Qiaowen Jia, Chunfu Jia. Active Warden Attack: On the (In)Effectiveness of Android App Repackage-Proofing
3521 -- 3538Xi Xiao, Wentao Xiao, Rui Li 0042, Xiapu Luo, Haitao Zheng 0002, Shutao Xia. EBSNN: Extended Byte Segment Neural Network for Network Traffic Classification
3539 -- 3545Pedro Reviriego, Alfonso Sánchez-Macián, Shanshan Liu, Fabrizio Lombardi. On the Security of the K Minimum Values (KMV) Sketch
3546 -- 3563Jian Yang 0014, Qi Zhang, Xiaofeng Jiang, Shuangwu Chen, Feng Yang. Poirot: Causal Correlation Aided Semantic Analysis for Advanced Persistent Threat Detection
3564 -- 3578Liming Fang 0001, Minghui Li, Zhe Liu 0001, Changting Lin, Shouling Ji, Anni Zhou, Willy Susilo, Chunpeng Ge. A Secure and Authenticated Mobile Payment Protocol Against Off-Site Attack Strategy

Volume 19, Issue 4

2149 -- 2150Sagar Samtani, Hsinchun Chen, Murat Kantarcioglu, Bhavani Thuraisingham. Explainable Artificial Intelligence for Cyber Threat Intelligence (XAI-CTI)
2151 -- 2164Miquel Martínez, Juan Carlos Ruiz, Nuno Antunes, David de Andrés, Marco Vieira. A Multi-Criteria Analysis of Benchmark Results With Expert Support for Security Tools
2165 -- 2178Siqi Ma, Juanru Li, Surya Nepal, Diethelm Ostry, David Lo 0001, Sanjay K. Jha, Robert H. Deng, Elisa Bertino. Orchestration or Automation: Authentication Flaw Detection in Android Apps
2179 -- 2197Moshe Kravchik, Asaf Shabtai. Efficient Cyber Attack Detection in Industrial Control Systems Using Lightweight Neural Networks and PCA
2198 -- 2210Jian Shen 0001, Huijie Yang, Pandi Vijayakumar, Neeraj Kumar 0001. A Privacy-Preserving and Untraceable Group Data Sharing Scheme in Cloud Computing
2211 -- 2225Satendra Pal Singh, Gaurav Bhatnagar, Amit Kumar Singh 0001. A New Robust Reference Image Hashing System
2226 -- 2243Mohamed Baza, Marbin Pazos-Revilla, Ahmed B. T. Sherif, Mahmoud Nabil, Abdulah Jeza Aljohani, Mohamed Mahmoud 0001, Waleed Alasmary. Privacy-Preserving and Collusion-Resistant Charging Coordination Schemes for Smart Grids
2244 -- 2258Zhen Li 0027, Deqing Zou, Shouhuai Xu, Hai Jin 0001, Yawei Zhu, Zhaoxuan Chen. SySeVR: A Framework for Using Deep Learning to Detect Software Vulnerabilities
2259 -- 2273Luca Massarelli, Giuseppe Antonio Di Luna, Fabio Petroni, Leonardo Querzoni, Roberto Baldoni. Function Representations for Binary Similarity
2274 -- 2285Soroush Aalibagi, Hamidreza Mahyar, Ali Movaghar 0001, Harry Eugene Stanley. A Matrix Factorization Model for Hellinger-Based Trust Management in Social Internet of Things
2286 -- 2303Tianxiang Shen, Jianyu Jiang, Yunpeng Jiang, Xusheng Chen, Ji Qi, Shixiong Zhao, Fengwei Zhang, Xiapu Luo, Heming Cui. DAENet: Making Strong Anonymity Scale in a Fully Decentralized Network
2304 -- 2317Leila Karimi, Maryam Aldairi, James Joshi, Mai Abdelhakim. An Automatic Attribute-Based Access Control Policy Extraction From Access Logs
2318 -- 2332Jianghong Wei, Xiaofeng Chen 0001, Jianfeng Wang, Xuexian Hu, Jianfeng Ma 0001. Enabling (End-to-End) Encrypted Cloud Emails With Practical Forward Secrecy
2333 -- 2348Qiang He 0001, Cheng Wang, Guangming Cui, Bo Li 0103, Rui Zhou, Qingguo Zhou, Yang Xiang 0001, Hai Jin 0001, Yun Yang 0001. A Game-Theoretical Approach for Mitigating Edge DDoS Attack
2349 -- 2364Yansong Gao, Yeonjae Kim, Bao Gia Doan, Zhi Zhang 0001, Gongxuan Zhang, Surya Nepal, Damith C. Ranasinghe, Hyoungshick Kim. Design and Evaluation of a Multi-Domain Trojan Detection Method on Deep Neural Networks
2365 -- 2383Yunxiao Zhang, Pasquale Malacaria. Optimization-Time Analysis for Cybersecurity
2384 -- 2395Ferucio Laurentiu Tiplea. Lessons to be Learned for a Good Design of Private RFID Schemes
2396 -- 2404Mateus Martínez De Lucena, Antônio Augusto Fröhlich. Security and Effectiveness Analysis of the Gateway Integrity Checking Protocol
2405 -- 2420Yi Chen 0008, Hongxia Wang 0001, Kim-Kwang Raymond Choo, Peisong He, Zoran Salcic, Dali Kaafar, Xuyun Zhang. DDCA: A Distortion Drift-Based Cost Assignment Method for Adaptive Video Steganography in the Transform Domain
2421 -- 2427Pedro Reviriego, Daniel Ting. Breaking Cuckoo Hash: Black Box Attacks
2428 -- 2441Qian Han, Cristian Molinaro, Antonio Picariello, Giancarlo Sperlì, V. S. Subrahmanian, Yanhai Xiong. Generating Fake Documents Using Probabilistic Logic Graphs
2442 -- 2456Zhiguo Wan, Tong Zhang, Weizhuang Liu, Mingqiang Wang, Liehuang Zhu. Decentralized Privacy-Preserving Fair Exchange Scheme for V2G Based on Blockchain
2457 -- 2475Mahmood Azhar Qureshi, Arslan Munir. PUF-RAKE: A PUF-Based Robust and Lightweight Authentication and Key Establishment Protocol
2476 -- 2487Hassan Nasiraee, Maede Ashouri-Talouki. Privacy-Preserving Distributed Data Access Control for CloudIoT
2488 -- 2500Essam Soliman Debie, Nour Moustafa, Athanasios V. Vasilakos. Session Invariant EEG Signatures using Elicitation Protocol Fusion and Convolutional Neural Network
2501 -- 2516Yandong Zheng, Rongxing Lu, Yunguo Guan, Jun Shao, Hui Zhu 0001. Efficient and Privacy-Preserving Similarity Range Query Over Encrypted Time Series Data
2517 -- 2534Suryadipta Majumdar, Gagandeep Singh Chawla, Amir Alimohammadifar, Taous Madi, Yosr Jarraya, Makan Pourzandi, Lingyu Wang 0001, Mourad Debbabi. ProSAS: Proactive Security Auditing System for Clouds
2535 -- 2545Mojtaba Rafiee, Shahram Khazaei. Security of Multi-Adjustable Join Schemes: Separations and Implications
2546 -- 2558Siva Kumar Sastry Hari, Michael B. Sullivan 0001, Timothy Tsai 0002, Stephen W. Keckler. Making Convolutions Resilient Via Algorithm-Based Error Detection Techniques
2559 -- 2575Seongman Lee, Hyeonwoo Kang, Jinsoo Jang, Brent ByungHoon Kang. SaVioR: Thwarting Stack-Based Memory Safety Violations by Randomizing Stack Layout
2576 -- 2594Zhe Wang 0017, Chenggang Wu 0002, Yinqian Zhang, Bowen Tang, Pen-Chung Yew, Mengyao Xie, Yuanming Lai, Yan Kang, Yueqiang Cheng, Zhiping Shi 0002. Making Information Hiding Effective Again
2595 -- 2608Giovanni Mazzeo, Sergei Arnautov, Christof Fetzer, Luigi Romano. SGXTuner: Performance Enhancement of Intel SGX Applications Via Stochastic Optimization
2609 -- 2621Shangqi Lai, Xingliang Yuan, Shi-Feng Sun, Joseph K. Liu, Ron Steinfeld, Amin Sakzad, Dongxi Liu. Practical Encrypted Network Traffic Pattern Matching for Secure Middleboxes
2622 -- 2634Jun Wang 0020, Chao Jin, Qiang Tang 0001, Zhe Liu 0001, Khin Mi Mi Aung. CryptoRec: Novel Collaborative Filtering Recommender Made Privacy-Preserving Easy
2635 -- 2647Dalton Cole, Sara Newman, Dan Lin 0001. A New Facial Authentication Pitfall and Remedy in Web Services
2648 -- 2664Shaoyong Du, Minrui Zhao, Jingyu Hua, Hang Zhang, Xiaoyu Chen, Zhiyun Qian, Sheng Zhong 0002. Who Moves My App Promotion Investment? A Systematic Study About App Distribution Fraud
2665 -- 2679Xuhang Ying, Giuseppe Bernieri, Mauro Conti, Linda Bushnell, Radha Poovendran. Covert Channel-Based Transmitter Authentication in Controller Area Networks
2680 -- 2694Haonan Yan, Xiaoguang Li, Hui Li 0006, Jiamin Li, Wenhai Sun, FengHua Li. Monitoring-Based Differential Privacy Mechanism Against Query Flooding-Based Model Extraction Attack
2695 -- 2708Long Zhang, Brice Morin, Benoit Baudry, Martin Monperrus. Maximizing Error Injection Realism for Chaos Engineering With System Calls
2709 -- 2726Savio Sciancalepore, Pietro Tedeschi, Ahmed Aziz, Roberto Di Pietro. Auth-AIS: Secure, Flexible, and Backward-Compatible Authentication of Vessels AIS Broadcasts
2727 -- 2740Shunrong Jiang, Jianqing Liu, Yong Zhou 0003, Yuguang Fang. FVC-Dedup: A Secure Report Deduplication Scheme in a Fog-Assisted Vehicular Crowdsensing System
2741 -- 2754Xuyang Jing, Hui Han, Zheng Yan 0002, Witold Pedrycz. SuperSketch: A Multi-Dimensional Reversible Data Structure for Super Host Identification
2755 -- 2770Lumin Shi, Jun Li 0001, Mingwei Zhang 0004, Peter L. Reiher. On Capturing DDoS Traffic Footprints on the Internet
2771 -- 2788Xiaojie Zhu, Erman Ayday, Roman Vitenberg, Narasimha Raghavan Veeraragavan. Privacy-Preserving Search for a Similar Genomic Makeup in the Cloud
2789 -- 2806Yuan Zhang 0006, Chunxiang Xu, Nan Cheng, Xuemin Shen. Secure Password-Protected Encryption Key for Deduplicated Cloud Storage Systems
2807 -- 2820Runhua Xu, James Joshi, Chao Li 0023. NN-EMD: Efficiently Training Neural Networks Using Encrypted Multi-Sourced Datasets
2821 -- 2837Zhen Li, Deqing Zou, Shouhuai Xu, Zhaoxuan Chen, Yawei Zhu, Hai Jin 0001. VulDeeLocator: A Deep Learning-Based Fine-Grained Vulnerability Detector
2838 -- 2850Yuan Su, Yanping Li 0001, Bo Yang, Yong Ding 0005. Decentralized Self-Auditing Scheme With Errors Localization for Multi-Cloud Storage
2851 -- 2863Fatemah Alharbi, Yuchen Zhou, Feng Qian, Zhiyun Qian, Nael B. Abu-Ghazaleh. DNS Poisoning of Operating System Caches: Attacks and Mitigations

Volume 19, Issue 3

1434 -- 1445Yanhai Xiong, Giridhar Ramachandran, Rajesh Ganesan, Sushil Jajodia, V. S. Subrahmanian. Generating Realistic Fake Equations in Order to Reduce Intellectual Property Theft
1446 -- 1463Zhangshuang Guan, Zhiguo Wan, Yang Yang 0026, Yan Zhou, Butian Huang. BlockMaze: An Efficient Privacy-Preserving Account-Model Blockchain Based on zk-SNARKs
1464 -- 1475Jian Shen 0001, Ziyuan Gui, Xiaofeng Chen 0001, Jun Zhang 0010, Yang Xiang 0001. Lightweight and Certificateless Multi-Receiver Secure Data Transmission Protocol for Wireless Body Area Networks
1476 -- 1491Domenico Cotroneo, Luigi De Simone, Pietro Liguori, Roberto Natella. Fault Injection Analytics: A Novel Approach to Discover Failure Modes in Cloud-Computing Systems
1492 -- 1504Fengwei Wang, Hui Zhu 0001, Rongxing Lu, Yandong Zheng, Hui Li 0006. Achieve Efficient and Privacy-Preserving Disease Risk Assessment Over Multi-Outsourced Vertical Datasets
1505 -- 1517Saiyu Qi, Yuanqing Zheng, Xiaofeng Chen 0001, Wei Wei 0006. Ants can Carry Cheese: Secure and Private RFID-Enabled Third-Party Distribution
1518 -- 1531Jia-Nan Liu, Xizhao Luo, Jian Weng 0001, Anjia Yang, Xu an Wang, Ming Li 0049, Xiaodong Lin 0001. Enabling Efficient, Secure and Privacy-Preserving Mobile Cloud Storage
1532 -- 1543Hongbo Li, Qiong Huang, Willy Susilo. A Secure Cloud Data Sharing Protocol for Enterprise Supporting Hierarchical Keyword Search
1544 -- 1561Shuitao Gan, Chao Zhang 0008, Xiaojun Qin, Xuwen Tu, Kang Li, Zhongyu Pei, Zuoning Chen. Path Sensitive Fuzzing for Native Applications
1562 -- 1578Mingfu Xue, Can He, Jian Wang 0038, Weiqiang Liu. One-to-N & N-to-One: Two Advanced Backdoor Attacks Against Deep Learning Models
1579 -- 1591Zheli Liu, Siyi Lv, Jin Li 0002, Yanyu Huang, Liang Guo, Yali Yuan, Changyu Dong. EncodeORE: Reducing Leakage and Preserving Practicality in Order-Revealing Encryption
1592 -- 1604Minghui Li, Sherman S. M. Chow, Shengshan Hu, Yuejing Yan, Chao Shen 0001, Qian Wang 0002. Optimizing Privacy-Preserving Outsourced Convolutional Neural Network Predictions
1605 -- 1620Christian Berger 0006, Hans P. Reiser, João Sousa 0002, Alysson Bessani. AWARE: Adaptive Wide-Area Replication for Fast and Resilient Byzantine Consensus
1621 -- 1638Runqing Yang, Xutong Chen, Haitao Xu 0002, Yueqiang Cheng, Chunlin Xiong, Linqi Ruan, Mohammad Kavousi, Zhenyuan Li, Liheng Xu, Yan Chen 0004. RATScope: Recording and Reconstructing Missing RAT Semantic Behaviors for Forensic Analysis on Windows
1639 -- 1654Qiang Wang 0005, Fucai Zhou, Boyang Zhou, Jian Xu 0004, Chunyu Chen, Qi Wang. Privacy-Preserving Publicly Verifiable Databases
1655 -- 1672Matthias Eckhart, Andreas Ekelhart, Edgar R. Weippl. Automated Security Risk Identification Using AutomationML-Based Engineering Data
1673 -- 1686Sandeep Nair Narayanan, Anupam Joshi, Ranjan Bose. ABATe: Automatic Behavioral Abstraction Technique to Detect Anomalies in Smart Cyber-Physical Systems
1687 -- 1702Xiaoning Liu, Yifeng Zheng, Xun Yi, Surya Nepal. Privacy-Preserving Collaborative Analytics on Medical Time Series Data
1703 -- 1721Chaoyue Niu, Fan Wu 0006, ShaoJie Tang, Shuai Ma 0001, Guihai Chen. Toward Verifiable and Privacy Preserving Machine Learning Prediction
1722 -- 1734Milan Stute, Florian Kohnhäuser, Lars Baumgärtner, Lars Almon, Matthias Hollick, Stefan Katzenbeisser 0001, Bernd Freisleben. RESCUE: A Resilient and Secure Device-to-Device Communication Framework for Emergencies
1735 -- 1752Haishou Ma, Yi Xie 0002, Shensheng Tang, Jiankun Hu, Xingcheng Liu. Threat-Event Detection for Distributed Networks Based on Spatiotemporal Markov Random Field
1753 -- 1769Jianbing Ni, Kuan Zhang, Yong Yu 0002, Tingting Yang 0001. Identity-Based Provable Data Possession From RSA Assumption for Secure Cloud Storage
1770 -- 1782Anomadarshi Barua, Deepan Muthirayan, Pramod P. Khargonekar, Mohammad Abdullah Al Faruque. Hierarchical Temporal Memory-Based One-Pass Learning for Real-Time Anomaly Detection and Simultaneous Data Prediction in Smart Grids
1783 -- 1794Atif Saeed, Peter Garraghan, Syed Asad Hussain. Cross-VM Network Channel Attacks and Countermeasures Within Cloud Computing Environments
1795 -- 1809Haijun Wang, Ye Liu, Yi Li 0008, Shangwei Lin 0001, Cyrille Artho, Lei Ma 0003, Yang Liu 0003. Oracle-Supported Dynamic Exploit Generation for Smart Contracts
1810 -- 1825Ji-Ming Chen 0001, Xiangshan Gao, Ruilong Deng, Yang He, Chongrong Fang, Peng Cheng 0001. Generating Adversarial Examples Against Machine Learning-Based Intrusion Detector in Industrial Control Systems
1826 -- 1840Binbin Zhao, Shouling Ji, Wei-Han Lee, Changting Lin, Haiqin Weng, JingZheng Wu, Pan Zhou, Liming Fang 0001, Raheem Beyah. A Large-Scale Empirical Study on the Vulnerability of Deployed IoT Devices
1841 -- 1855Yifeng Zheng, Huayi Duan, Cong Wang 0001, Ruochen Wang, Surya Nepal. Securely and Efficiently Outsourcing Decision Tree Inference
1856 -- 1870Intae Kim, Willy Susilo, Joonsang Baek, Jongkil Kim. Harnessing Policy Authenticity for Hidden Ciphertext Policy Attribute-Based Encryption
1871 -- 1884Shuzhou Sun, Hui Ma 0002, Zishuai Song, Rui Zhang 0002. WebCloud: Web-Based Cloud Storage for Secure Data Sharing Across Platforms
1885 -- 1899Zengpeng Li, Ding Wang 0002, Eduardo Morais. Quantum-Safe Round-Optimal Password Authentication for Mobile Devices
1900 -- 1917Huaijin Wang, Shuai Wang 0011, Dongpeng Xu 0001, Xiangyu Zhang, Xiao Liu 0025. Generating Effective Software Obfuscation Sequences With Reinforcement Learning
1918 -- 1935Bo Jiang, Ming Li 0003, Ravi Tandon. Local Information Privacy and Its Application to Privacy-Preserving Data Aggregation
1936 -- 1954Orly Stan, Ron Bitton, Michal Ezrets, Moran Dadon, Masaki Inokuchi, Yoshinobu Ohta, Tomohiko Yagyu, Yuval Elovici, Asaf Shabtai. Extending Attack Graphs to Represent Cyber-Attacks in Communication Protocols and Modern IT Networks
1955 -- 1973Lei Zhao, Pengcheng Cao, Yue Duan, Heng Yin, Jifeng Xuan. Probabilistic Path Prioritization for Hybrid Fuzzing
1974 -- 1987Ning Lu 0005, Yuan Chang, Wenbo Shi, Kim-Kwang Raymond Choo. CoinLayering: An Efficient Coin Mixing Scheme for Large Scale Bitcoin Transactions
1988 -- 2006Behrooz Sangchoolie, Karthik Pattabiraman, Johan Karlsson. An Empirical Study of the Impact of Single and Multiple Bit-Flip Errors in Programs
2007 -- 2022Huadi Zheng, Qingqing Ye 0001, Haibo Hu 0001, Chengfang Fang, Jie Shi. Protecting Decision Boundary of Machine Learning Model With Differentially Private Perturbation
2023 -- 2037Zheli Liu, Yanyu Huang, Xiangfu Song, Bo Li, Jin Li 0002, Yali Yuan, Changyu Dong. Eurus: Towards an Efficient Searchable Symmetric Encryption With Size Pattern Protection
2038 -- 2053Yanjiao Chen, Xin Tian, Qian Wang 0002, Jianlin Jiang, Minghui Li, Qian Zhang 0001. SAFE: A General Secure and Fair Auction Framework for Wireless Markets With Privacy Preservation
2054 -- 2069Junjiao Liu, Xiaodong Lin 0001, Xin Chen, Hui-Wen, Hong Li 0004, Yan Hu, Jiawei Sun, Zhiqiang Shi, Limin Sun. ShadowPLCs: A Novel Scheme for Remote Detection of Industrial Process Control Attacks
2070 -- 2088Yizhong Liu, Jianwei Liu 0001, Qianhong Wu, Hui Yu, Yiming Hei, Ziyu Zhou. SSHC: A Secure and Scalable Hybrid Consensus Protocol for Sharding Blockchains With a Formal Security Framework
2089 -- 2104Hu Xiong, Jinhao Chen, Qian Mei, Yanan Zhao. Conditional Privacy-Preserving Authentication Protocol With Dynamic Membership Updating for VANETs
2105 -- 2121Reem M. Albarrak, Daniel A. Menascé. Trust But Verify: A Framework for the Trustworthiness of Distributed Systems
2122 -- 2137Saiyu Qi, Yuanqing Zheng, Yue Li, Xiaofeng Chen 0001, Jianfeng Ma 0001, Dongyi Yang, Yong Qi. DE-Sword: Incentivized Verifiable Tag Path Query in RFID-Enabled Supply Chain Systems
2138 -- 2148Willy Susilo, Peng Jiang, Jianchang Lai, Fuchun Guo, Guomin Yang, Robert H. Deng. Sanitizable Access Control System for Secure Cloud Storage Against Malicious Data Publishers

Volume 19, Issue 2

717 -- 730Yunji Liang, Qiushi Wang, Kang Xiong, Xiaolong Zheng 0001, Zhiwen Yu 0001, Daniel Zeng. Robust Detection of Malicious URLs With Self-Paced Wide & Deep Learning
731 -- 746Azqa Nadeem, Sicco Verwer, Stephen Moskal, Shanchieh Jay Yang. Alert-Driven Attack Graph Generation Using S-PDFA
747 -- 756Rohit Valecha, Pranali Mandaokar, H. Raghav Rao. Phishing Email Detection Using Persuasion Cues
757 -- 775Huiling Li, Jun Wu 0001, Hansong Xu, Gaolei Li, Mohsen Guizani. Explainable Intelligence-Driven Defense Mechanism Against Advanced Persistent Threats: A Joint Edge Game and AI Approach
776 -- 789Yi-Ting Huang, Chi-Yu Lin, Ying-Ren Guo, Kai-Chieh Lo, Yeali S. Sun, Meng Chang Chen. Open Source Intelligence for Malicious Behavior Discovery and Interpretation
790 -- 803Yidong Chai, Yonghang Zhou, Weifeng Li 0002, Yuanchun Jiang. An Explainable Multi-Modal Hierarchical Attention Model for Developing Phishing Threat Intelligence
804 -- 816Md Shihabul Islam, Bo Dong, Swarup Chandra, Latifur Khan, Bhavani M. Thuraisingham. GCI: A GPU-Based Transfer Learning Approach for Detecting Cheats of Computer Game
817 -- 834Matheus E. Garbelini, Chundong Wang 0001, Sudipta Chattopadhyay 0001. Greyhound: Directed Greybox Wi-Fi Fuzzing
835 -- 847Osman Biçer, Muhammed Ali Bingöl, Mehmet Sabir Kiraz, Albert Levi. Highly Efficient and Re-Executable Private Function Evaluation With Linear Complexity
848 -- 861Eduardo Chielle, Nektarios Georgios Tsoutsos, Oleg Mazonka, Michail Maniatakos. E3X: Encrypt-Everything-Everywhere ISA eXtensions for Private Computation
862 -- 878Guangquan Xu, Xiaofei Xie, Shuhan Huang, Jun Zhang 0010, Lei Pan 0002, Wei Lou, Kaitai Liang. JSCSP: A Novel Policy-Based XSS Defense Mechanism for Browsers
879 -- 896Zhihai Yang, Qindong Sun, Yaling Zhang. Probabilistic Inference and Trustworthiness Evaluation of Associative Links Toward Malicious Attack Detection for Online Recommendations
897 -- 911Xin Liao, Jiaojiao Yin, Mingliang Chen, Zheng Qin. Adaptive Payload Distribution in Multiple Images Steganography Based on Image Texture Features
912 -- 923Xiaogang Zhu, Xiaotao Feng, Xiaozhu Meng, Sheng Wen, Seyit Camtepe, Yang Xiang 0001, Kui Ren 0001. CSI-Fuzz: Full-Speed Edge Tracing Using Coverage Sensitive Instrumentation
924 -- 935Vlad Craciun, Pascal Felber, Andrei Mogage, Emanuel Onica, Rafael Pires. Malware in the SGX Supply Chain: Be Careful When Signing Enclaves!
936 -- 952Longxia Huang, Junlong Zhou, Gongxuan Zhang, Jin Sun, Tongquan Wei, Shui Yu, Shiyan Hu. IPANM: Incentive Public Auditing Scheme for Non-Manager Groups in Clouds
953 -- 965Derui Wang, Chaoran Li, Sheng Wen, Surya Nepal, Yang Xiang 0001. Defending Against Adversarial Attack Towards Deep Neural Networks Via Collaborative Multi-Task Training
966 -- 977Pedro Reviriego, Jorge Martínez 0001, Ori Rottenstreich, Shanshan Liu, Fabrizio Lombardi. Remove Minimum (RM): An Error-Tolerant Scheme for Cardinality Estimate by HyperLogLog
978 -- 991Bing Chen, Wei Lu 0001, Jiwu Huang, Jian Weng 0001, Yicong Zhou. Secret Sharing Based Reversible Data Hiding in Encrypted Images With Multiple Data-Hiders
992 -- 1002Zhaoxia Yin, Yinyin Peng, Youzhi Xiang. Reversible Data Hiding in Encrypted Images Based on Pixel Prediction and Bit-Plane Compression
1003 -- 1017Lingjuan Lyu, Yitong Li, Karthik Nandakumar, Jiangshan Yu, Xingjun Ma. How to Democratise and Protect AI: Fair and Differentially Private Decentralised Deep Learning
1018 -- 1035Onur Duman, Mengyuan Zhang, Lingyu Wang 0001, Mourad Debbabi, Ribal F. Atallah, Bernard Lebel. Factor of Security (FoS): Quantifying the Security Effectiveness of Redundant Smart Grid Subsystems
1036 -- 1048Jianting Ning, Xinyi Huang 0001, Willy Susilo, Kaitai Liang, Ximeng Liu, Yinghui Zhang 0002. Dual Access Control for Cloud-Based Data Storage and Sharing
1049 -- 1063Mazen Al-Wadi, Kazi Abu Zubair, David Mohaisen, Amro Awad. Phoenix: Towards Ultra-Low Overhead, Recoverable, and Persistently Secure NVM
1064 -- 1077Shengmin Xu, Jianting Ning, Yingjiu Li, Yinghui Zhang 0002, Guowen Xu, Xinyi Huang 0001, Robert H. Deng. Match in My Way: Fine-Grained Bilateral Access Control for Secure Cloud-Fog Computing
1078 -- 1089Shahram Khazaei, Mojtaba Rafiee. Towards More Secure Constructions of Adjustable Join Schemes
1090 -- 1103Yandong Zheng, Rongxing Lu, Yunguo Guan, Jun Shao, Hui Zhu 0001. Achieving Efficient and Privacy-Preserving Exact Set Similarity Search over Encrypted Data
1104 -- 1117Ning Xie 0007, Zhuoyuan Li, Jie Tan, Alex X. Liu. Detection of Information Hiding at Physical Layer in Wireless Communications
1118 -- 1132Lei Zhou, Anmin Fu, Guomin Yang, Huaqun Wang, Yuqing Zhang. Efficient Certificateless Multi-Copy Integrity Auditing Scheme Supporting Data Dynamics
1133 -- 1148Meng Li 0006, Yifei Chen, Shuli Zheng, Donghui Hu, Chhagan Lal, Mauro Conti. Privacy-Preserving Navigation Supporting Similar Queries in Vehicular Networks
1149 -- 1163Jiayun Xu, Yingjiu Li, Robert H. Deng, Ke Xu. SDAC: A Slow-Aging Solution for Android Malware Detection Using Semantic Distance Based API Clustering
1164 -- 1180Jianting Ning, Geong Sen Poh, Xinyi Huang 0001, Robert H. Deng, Shuwei Cao 0002, Ee-Chien Chang. Update Recovery Attacks on Encrypted Database Within Two Updates Using Range Queries Leakage
1181 -- 1193Yazdan Movahedi, Michel Cukier, Ilir Gashi. Predicting the Discovery Pattern of Publically Known Exploited Vulnerabilities
1194 -- 1211Harshan Jagadeesh, Amogh Vithalkar, Naman Jhunjhunwala, Manthan Kabra, Prafull Manav, Yih-Chun Hu. Double-Edge Embedding Based Provenance Recovery for Low-Latency Applications in Wireless Networks
1212 -- 1226Dayong Ye, Tianqing Zhu, Sheng Shen, Wanlei Zhou, Philip S. Yu. Differentially Private Multi-Agent Planning for Logistic-Like Problems
1227 -- 1238Dariush Abbasinezhad-Mood, Sayyed Majid Mazinani, Morteza Nikooghadam, Arezou Ostad-Sharif. Efficient Provably-Secure Dynamic ID-Based Authenticated Key Agreement Scheme With Enhanced Security Provision
1239 -- 1253Fabrizio Cicala, Elisa Bertino. Analysis of Encryption Key Generation in Modern Crypto Ransomware
1254 -- 1265Mandrita Banerjee, Carlo Borges, Kim-Kwang Raymond Choo, JungHee Lee, Chrysostomos Nicopoulos. A Hardware-Assisted Heartbeat Mechanism for Fault Identification in Large-Scale IoT Systems
1266 -- 1279Yang Liu 0038, Tong Feng, Mugen Peng, Jianfeng Guan, Yu Wang 0003. DREAM: Online Control Mechanisms for Data Aggregation Error Minimization in Privacy-Preserving Crowdsensing
1280 -- 1291Jianye Huang, Willy Susilo, Fuchun Guo, Ge Wu 0001, Zhen Zhao 0005, Qiong Huang. An Anonymous Authentication System for Pay-As-You-Go Cloud Computing$^*$*
1292 -- 1306Djamel Eddine Kouicem, Youcef Imine, Abdelmadjid Bouabdallah, Hicham Lakhlef. Decentralized Blockchain-Based Trust Management Protocol for the Internet of Things
1307 -- 1319Bernardo Ferreira, Bernardo Portela, Tiago Oliveira 0004, Guilherme Borges, Henrique Domingos, João Leitão 0001. Boolean Searchable Symmetric Encryption With Filters on Trusted Hardware
1320 -- 1337Haining Yang, Ye Su, Jing Qin 0002, Huaxiong Wang. Privacy-Preserving Outsourced Inner Product Computation on Encrypted Database
1338 -- 1351Shuming Qiu, Ding Wang 0002, Guoai Xu, Saru Kumari. Practical and Provably Secure Three-Factor Authentication Protocol Based on Extended Chaotic-Maps for Mobile Lightweight Devices
1352 -- 1363Benyuan Yang, HeSuan Hu. Dynamic Implementation of Security Requirements in Business Processes
1364 -- 1381Guowen Xu, Hongwei Li 0001, Yun Zhang, Shengmin Xu, Jianting Ning, Robert H. Deng. Privacy-Preserving Federated Deep Learning With Irregular Users
1382 -- 1394Zi-Long Liu, Chi-Man Pun. Reversible Data Hiding in Encrypted Images using Chunk Encryption and Redundancy Matrix Representation
1395 -- 1406Wenlong Tian, Ruixuan Li, Zhiyong Xu, Weijun Xiao. Loco-Store: Locality-Based Oblivious Data Storage
1407 -- 1419Maryam Zarezadeh, Hamid Mala, Behrouz Tork Ladani. Efficient Secure Pattern Matching With Malicious Adversaries
1420 -- 1433Yang Du, Zhaoxia Yin, Xinpeng Zhang 0001. High Capacity Lossless Data Hiding in JPEG Bitstream Based on General VLC Mapping

Volume 19, Issue 1

1 -- 18Ayyoob Hamza, Dinesha Ranathunga, Hassan Habibi Gharakheili, Theophilus A. Benson, Matthew Roughan, Vijay Sivaraman. Verifying and Monitoring IoTs Network Behavior Using MUD Profiles
19 -- 32Zhou Su, Yuntao Wang 0004, Qichao Xu, Ning Zhang 0007. LVBS: Lightweight Vehicular Blockchain for Secure Data Sharing in Disaster Rescue
33 -- 38Dan Brownstein, Shlomi Dolev, Muni Venkateswarlu Kumaramangalam. Self-Stabilizing Secure Computation
39 -- 53Mohamed Baza, Mahmoud Nabil, Mohamed M. E. A. Mahmoud, Niclas Bewermeier, Kemal Fidan, Waleed Alasmary, Mohamed Abdallah 0001. Detecting Sybil Attacks Using Proofs of Work and Location in VANETs
54 -- 66Gurjit Singh Walia, Kartik Aggarwal, Kuldeep Singh 0002, Kunwar Singh. Design and Analysis of Adaptive Graph-Based Cancelable Multi-Biometrics Approach
67 -- 76Jin Li 0002, Heng Ye, Tong Li 0011, Wei Wang 0012, Wenjing Lou, Y. Thomas Hou, Jiqiang Liu, Rongxing Lu. Efficient and Secure Outsourcing of Differentially Private Data Publishing With Multiple Evaluators
77 -- 90Yao Cheng, Chang Xu, Zhen Hai, Yingjiu Li. DeepMnemonic: Password Mnemonic Generation via Deep Attentive Encoder-Decoder Model
91 -- 106Rui Li 0020, Alex X. Liu, Huanle Xu, Ying Liu, Huaqiang Yuan. Adaptive Secure Nearest Neighbor Query Processing Over Encrypted Data
107 -- 118Guillermo Suarez-Tangil, Gianluca Stringhini. Eight Years of Rider Measurement in the Android Malware Ecosystem
119 -- 130Yannan Li, Willy Susilo, Guomin Yang, Yong Yu 0002, Dongxi Liu, Xiaojiang Du, Mohsen Guizani. A Blockchain-Based Self-Tallying Voting Protocol in Decentralized IoT
131 -- 148Qingyu Yang, Donghe Li, Dou An, Wei Yu 0002, Xinwen Fu, Xinyu Yang, Wei Zhao 0001. Towards Incentive for Electrical Vehicles Demand Response With Location Privacy Guaranteeing in Microgrids
149 -- 160Jinhua Ma, Xinyi Huang, Yi Mu 0001, Robert H. Deng. Authenticated Data Redaction With Accountability and Transparency
161 -- 175Mohamad Chehab, Azzam Mourad. LP-SBA-XACML: Lightweight Semantics Based Scheme Enabling Intelligent Behavior-Aware Privacy for IoT
176 -- 189Sateesh Kumar Awasthi, Yatindra Nath Singh. AbsoluteTrust: Algorithm for Aggregation of Trust in Peer-to-Peer Networks
190 -- 207Yanhua Du, Yang Wang, Benyuan Yang, HeSuan Hu. Analyzing Security Requirements in Timed Workflow Processes
208 -- 226Xing Gao 0001, Guannan Liu, Zhang Xu, Haining Wang, Li Li, Xiaorui Wang. Investigating Security Vulnerabilities in a Hot Data Center with Reduced Cooling Redundancy
227 -- 242Ahmad Samer Wazan, Romain Laborde, David W. Chadwick, Rémi Venant, Abdelmalek Benzekri, Eddie Billoir, Omar Alfandi. On the Validation of Web X.509 Certificates by TLS Interception Products
243 -- 258Lucas Palazzi, Guanpeng Li, Bo Fang, Karthik Pattabiraman. Improving the Accuracy of IR-Level Fault Injection
259 -- 274Yuchen Zhao, Isabel Wagner. Using Metrics Suites to Improve the Measurement of Privacy in Graphs
275 -- 287Kyungmin Go, Il-Gu Lee, Sungwon Kang, Myungchul Kim 0001. Secure Video Transmission Framework for Battery-Powered Video Devices
288 -- 300Fritz Previlon, Charu Kalra, Devesh Tiwari, David R. Kaeli. Characterizing and Exploiting Soft Error Vulnerability Phase Behavior in GPU Applications
301 -- 315Cheng Wang 0001, Hangyu Zhu. Representing Fine-Grained Co-Occurrences for Behavior-Based Fraud Detection in Online Payment Services
316 -- 327Dezhi Han, Nannan Pan, Kuan-Ching Li. A Traceable and Revocable Ciphertext-Policy Attribute-based Encryption Scheme Based on Privacy Protection
328 -- 338Cong Zuo, Shifeng Sun, Joseph K. Liu, Jun Shao, Josef Pieprzyk, Lei Xu 0019. Forward and Backward Private DSSE for Range Queries
339 -- 352Rajorshi Biswas, Jie Wu 0001. Optimal Filter Assignment Policy Against Distributed Denial-of-Service Attack
353 -- 369Ruimin Sun, Marcus Botacin, Nikolaos Sapountzis, Xiaoyong Yuan, Matt Bishop, Donald E. Porter, Xiaolin Li 0001, Andre Gregio, Daniela Oliveira 0001. A Praise for Defensive Programming: Leveraging Uncertainty for Effective Malware Mitigation
370 -- 387Yunqing Sun, Jin Cao, Maode Ma, Yinghui Zhang 0002, Hui Li 0006, Ben Niu 0001. EAP-DDBA: Efficient Anonymity Proximity Device Discovery and Batch Authentication Mechanism for Massive D2D Communication Devices in 3GPP 5G HetNet
388 -- 401Yanguo Peng, Long Wang, JiangTao Cui, Ximeng Liu, Hui Li 0005, Jianfeng Ma 0001. LS-RQ: A Lightweight and Forward-Secure Range Query on Geographically Encrypted Data
402 -- 418Sadegh Torabi, Elias Bou-Harb, Chadi Assi, ElMouatez Billah Karbab, Amine Boukhtouta, Mourad Debbabi. Inferring and Investigating IoT-Generated Scanning Campaigns Targeting a Large Network Telescope
419 -- 437Yansong Gao, Marten van Dijk, Lei Xu 0015, Wei Yang 0008, Surya Nepal, Damith C. Ranasinghe. TREVERSE: TRial-and-Error Lightweight Secure ReVERSE Authentication With Simulatable PUFs
438 -- 451Shigang Liu, Guanjun Lin, Lizhen Qu, Jun Zhang 0010, Olivier Y. de Vel, Paul Montague, Yang Xiang 0001. CD-VulD: Cross-Domain Vulnerability Discovery Based on Deep Domain Adaptation
452 -- 467Shifeng Sun, Cong Zuo, Joseph K. Liu, Amin Sakzad, Ron Steinfeld, Tsz Hon Yuen, Xingliang Yuan, Dawu Gu. Non-Interactive Multi-Client Searchable Encryption: Realization and Implementation
468 -- 481Lotfi Ben Othmane, Lalitha Dhulipala, Moataz AbdelKhalek, Nicholas Multari, Manimaran Govindarasu. On the Performance of Detecting Injection of Fabricated Messages into the CAN Bus
482 -- 494Dinesha Ranathunga, Matthew Roughan, Hung X. Nguyen. Verifiable Policy-Defined Networking Using Metagraphs
495 -- 506Felix Erlacher, Falko Dressler. On High-Speed Flow-Based Intrusion Detection Using Snort-Compatible Signatures
507 -- 523Chenyu Wang, Ding Wang 0002, Yi Tu, Guoai Xu, Huaxiong Wang. Understanding Node Capture Attacks in User Authentication Schemes for Wireless Sensor Networks
524 -- 536Naman Patel, Prashanth Krishnamurthy, Hussam Amrouch, Jörg Henkel, Michael Shamouilian, Ramesh Karri, Farshad Khorrami. Towards a New Thermal Monitoring Based Framework for Embedded CPS Device Security
537 -- 550Klaus-Tycho Foerster, Andrzej Kamisinski, Yvonne Anne Pignolet, Stefan Schmid 0001, Gilles Trédan. Improved Fast Rerouting Using Postprocessing
551 -- 565Chunlin Xiong, Tiantian Zhu, Weihao Dong, Linqi Ruan, Runqing Yang, Yueqiang Cheng, Yan Chen, Shuai Cheng, Xutong Chen. Conan: A Practical Real-Time APT Detection System With High Accuracy and Efficiency
566 -- 578George Theodorakopoulos 0001, Emmanouil Panaousis, Kaitai Liang, George Loukas. On-the-Fly Privacy for Location Histograms
579 -- 590Ruiyu Zhu, Yan Huang 0001. Efficient and Precise Secure Generalized Edit Distance and Beyond
591 -- 606Xue Yang 0003, Rongxing Lu, Jun Shao, Xiaohu Tang, Ali A. Ghorbani 0001. Achieving Efficient Secure Deduplication With User-Defined Access Control in Cloud
607 -- 619Yi He, Yuan Zhou, Yajin Zhou, Qi Li 0002, Kun Sun 0001, Yacong Gu, Yong Jiang. JNI Global References Are Still Vulnerable: Attacks and Defenses
620 -- 634Yue Li 0002, Zeyu Chen, Haining Wang, Kun Sun 0001, Sushil Jajodia. Understanding Account Recovery in the Wild and its Security Implications
635 -- 646Kaiping Xue, Na Gai, Jianan Hong, David S. L. Wei, Peilin Hong, Nenghai Yu. Efficient and Secure Attribute-Based Access Control With Identical Sub-Policies Frequently Used in Cloud Storage
647 -- 662Yanxue Jia, Shifeng Sun, Yuncong Zhang, Qingzhao Zhang, Ning Ding, Zhiqiang Liu 0001, Joseph K. Liu, Dawu Gu. ${\sf PBT}$PBT: A New Privacy-Preserving Payment Protocol for Blockchain Transactions
663 -- 680Harishma Boyapally, Paulson Mathew, Sikhar Patranabis, Urbi Chatterjee, Umang Agarwal, Manu Maheshwari, Soumyajit Dey, Debdeep Mukhopadhyay. Safe is the New Smart: PUF-Based Authentication for Load Modification-Resistant Smart Meters
681 -- 697Ze Wang, Jingqiang Lin, Quanwei Cai 0001, Qiongxiao Wang, Daren Zha, Jiwu Jing. Blockchain-Based Certificate Transparency and Revocation Transparency
698 -- 716Shabnam Kasra Kermanshahi, Shifeng Sun, Joseph K. Liu, Ron Steinfeld, Surya Nepal, Wang Fat Lau, Man Ho Allen Au. Geometric Range Search on Encrypted Data With Forward/Backward Security