Journal: IEEE Trans. Dependable Sec. Comput.

Volume 21, Issue 2

501 -- 514Jianwei Liu 0008, Xiang Zou, Leqi Zhao, Yusheng Tao, Sideng Hu, Jinsong Han, Kui Ren 0001. Privacy Leakage in Wireless Charging
515 -- 529Yinxing Xue, Jiaming Ye, Wei Zhang, Jun Sun 0001, Lei Ma 0003, Haijun Wang, Jianjun Zhao 0001. xFuzz: Machine Learning Guided Cross-Contract Fuzzing
530 -- 541Qian Li 0024, Chao Shen 0001, Qingyuan Hu, Chenhao Lin, Xiang Ji, Saiyu Qi. Towards Gradient-Based Saliency Consensus Training for Adversarial Robustness
542 -- 558Xiao Cheng 0002, Xu Nie, Ningke Li, Haoyu Wang 0001, Zheng Zheng 0001, Yulei Sui. How About Bug-Triggering Paths? - Understanding and Characterizing Learning-Based Vulnerability Detectors
559 -- 572Wenbo Jiang, Tianwei Zhang 0004, Han Qiu 0001, Hongwei Li 0001, Guowen Xu. Incremental Learning, Incremental Backdoor Threats
573 -- 584Pedro Miguel Sánchez Sánchez, Alberto Huertas Celdrán, Timo Schenk, Adrian Lars Benjamin Iten, Gérôme Bovet, Gregorio Martínez Pérez, Burkhard Stiller. Studying the Robustness of Anti-Adversarial Federated Learning Models Detecting Cyberattacks in IoT Spectrum Sensors
585 -- 599Qun Song 0001, Rui Tan 0001, Chao Ren 0006, Yan Xu 0005, Yang Lou, Jianping Wang 0001, Hoay Beng Gooi. On Credibility of Adversarial Examples Against Learning-Based Grid Voltage Stability Assessment
600 -- 617Ge Ren, Jun Wu 0001, Gaolei Li, Shenghong Li 0001, Mohsen Guizani. Protecting Intellectual Property With Reliable Availability of Learning Models in AI-Based Cybersecurity Services
618 -- 635Prithwiraj Roy, Shameek Bhattacharjee, Sahar Abedzadeh, Sajal K. Das 0001. Noise Resilient Learning for Attack Detection in Smart Grid PMU Infrastructure
636 -- 649Han Fang, Yupeng Qiu, Guorui Qin, Jiyi Zhang, Kejiang Chen, Weiming Zhang 0001, Ee-Chien Chang. 2Dataset Protection by Data Poisoning
650 -- 667Ping Wang, Haichang Gao, Xiaoyan Guo, Zhongni Yuan, Jiawei Nian. Improving the Security of Audio CAPTCHAs With Adversarial Examples
668 -- 684Wenhan Xu, Hui Ma 0002, Zishuai Song, Jianhao Li, Rui Zhang 0002. Gringotts: An Encrypted Version Control System With Less Trust on Servers
685 -- 700Wenbo Jiang, Hongwei Li 0001, Guowen Xu, Tianwei Zhang 0004, Rongxing Lu. A Comprehensive Defense Framework Against Model Extraction Attacks
701 -- 716Shahid Khan 0002, Joost-Pieter Katoen, Marc Bouissou. A Compositional Semantics of Boolean-Logic Driven Markov Processes
717 -- 731Di Zhang, Junqing Le, Xinyu Lei, Tao Xiang 0001, Xiaofeng Liao. Secure Redactable Blockchain With Dynamic Support
732 -- 745Insup Lee 0002, Wonjun Lee 0001. UniQGAN: Towards Improved Modulation Classification With Adversarial Robustness Using Scalable Generator Design
746 -- 763Cheng Guo 0001, Wenfeng Li, Xinyu Tang, Kim-Kwang Raymond Choo, Yining Liu 0002. Forward Private Verifiable Dynamic Searchable Symmetric Encryption With Efficient Conjunctive Query
764 -- 774Linqing Gui, Weihao Zhou, Pinchang Zhang, Fu Xiao 0001. Cooperative Jamming-Aided Secure Communication in Wireless Powered Sensor Networks
775 -- 788Zijian Zhang 0001, Xuyang Liu, Meng Li 0006, Hao Yin, Liehuang Zhu, Bakh Khoussainov, Keke Gai. HCA: Hashchain-Based Consensus Acceleration Via Re-Voting
789 -- 803Yifeng Zheng, Menglun Zhou, Songlei Wang, Hejiao Huang, Xiaohua Jia, Xun Yi, Cong Wang 0001. SecDR: Enabling Secure, Efficient, and Accurate Data Recovery for Mobile Crowdsensing
804 -- 818Roberto Pietrantuono, Massimo Ficco, Francesco Palmieri 0002. Testing the Resilience of MEC-Based IoT Applications Against Resource Exhaustion Attacks
819 -- 827Jayson Sia, Edmond A. Jonckheere, Laith Shalalfeh, Paul Bogdan. Phasor Measurement Unit Change-Point Detection of Frequency Hurst Exponent Anomaly With Time-to-Event
828 -- 846Cavit Özbay, Albert Levi. Blacklisting Based Anonymous Authentication Scheme for Sharing Economy
847 -- 859Xiao Han 0001, Yuncong Yang, Leye Wang, Junjie Wu. Privacy-Preserving Network Embedding Against Private Link Inference Attacks
860 -- 875Dan Zhu, Hui Zhu 0001, Cheng Huang 0001, Rongxing Lu, Dengguo Feng, Xuemin Shen. Efficient and Accurate Cloud-Assisted Medical Pre-Diagnosis With Privacy Preservation
876 -- 888Jungang Yang 0002, Liyao Xiang, Pengzhi Chu, Xinbing Wang, Chenghu Zhou. Certified Distributional Robustness on Smoothed Classifiers
889 -- 904Caiqin Dong, Jian Weng 0001, Ming Li 0049, Jia-Nan Liu, Zhiquan Liu, Yudan Cheng, Shui Yu 0001. Privacy-Preserving and Byzantine-Robust Federated Learning
905 -- 919Yongzhong He, Yiming Wang, Sencun Zhu, Wei Wang, Yunjia Zhang, Qiang Li, Aimin Yu. Automatically Identifying CVE Affected Versions With Patches and Developer Logs
920 -- 936Deqiang Li, Shicheng Cui, Yun Li 0009, Jia Xu 0003, Fu Xiao 0001, Shouhuai Xu. PAD: Towards Principled Adversarial Malware Detection Against Evasion Attacks
937 -- 948Chunpeng Ge, Zhe Liu 0001, Willy Susilo, Liming Fang 0001, Hao Wang. Attribute-Based Encryption With Reliable Outsourced Decryption in Cloud Computing Using Smart Contract
949 -- 960Chunpeng Ge, Willy Susilo, Zhe Liu 0001, Joonsang Baek, Xiapu Luo, Liming Fang 0001. Attribute-Based Proxy Re-Encryption With Direct Revocation Mechanism for Data Sharing in Clouds
961 -- 974Yaxi Yang, Jian Weng 0001, Yao Tong, Jia-Nan Liu, Zhenghao Wu, Leo Yu Zhang, Anjia Yang. PriGenX: Privacy-Preserving Query With Anonymous Access Control for Genomic Data
975 -- 986Renato Ferrero, Bartolomeo Montrucchio. Banknote Identification Through Unique Fluorescent Properties
987 -- 1000Emanuele Maiorana, Chiara Romano, Emiliano Schena, Carlo Massaroni. BIOWISH: Biometric Recognition Using Wearable Inertial Sensors Detecting Heart Activity

Volume 21, Issue 1

1 -- 11Yi-Fan Li, Yang Gao 0027, Gbadebo Ayoade, Latifur Khan, Anoop Singhal, Bhavani Thuraisingham. Heterogeneous Domain Adaptation for Multistream Classification on Cyber Threat Data
12 -- 30Xugui Zhou, Bulbul Ahmed, James H. Aylor, Philip Asare, Homa Alemzadeh. Hybrid Knowledge and Data Driven Synthesis of Runtime Monitors for Cyber-Physical Systems
31 -- 46Peng Cheng 0007, Yuexin Wu, Yuan Hong, Zhongjie Ba, Feng Lin 0004, Li Lu 0008, Kui Ren 0001. UniAP: Protecting Speech Privacy With Non-Targeted Universal Adversarial Perturbations
47 -- 62Shlomi Dolev, Bingyong Guo, Jianyu Niu, Ziyu Wang 0009. SodsBC: A Post-Quantum by Design Asynchronous Blockchain Framework
63 -- 77Lin Mei, Chungen Xu, Lei Xu 0019, Xingliang Yuan, Joseph K. Liu. Practical Multi-Source Multi-Client Searchable Encryption With Forward Privacy: Refined Security Notion and New Constructions
78 -- 92Moslem Didehban, Hwisoo So, Prudhvi Gali, Aviral Shrivastava, Kyoungwoo Lee. Generic Soft Error Data and Control Flow Error Detection by Instruction Duplication
93 -- 109Ziqin Liu, Zhenpeng Lin, Yueqi Chen 0001, Yuhang Wu, Yalong Zou, Dongliang Mu, Xinyu Xing. Towards Unveiling Exploitation Potential With Multiple Error Behaviors for Kernel Bugs
110 -- 124Gao Liu, Zheng Yan 0002, Dongliang Wang, Haiguang Wang, Tieyan Li. DePTVM: Decentralized Pseudonym and Trust Value Management for Integrated Networks
125 -- 138Ruixuan Li 0008, Zhenyong Zhang, Jun Shao 0001, Rongxing Lu, Xiaoqi Jia, Guiyi Wei. The Potential Harm of Email Delivery: Investigating the HTTPS Configurations of Webmail Services
139 -- 152Tianyu Yang, Hanzhou Wu, Biao Yi, Guorui Feng, Xinpeng Zhang 0001. Semantic-Preserving Linguistic Steganography by Pivot Translation and Semantic-Aware Bins Coding
153 -- 167Haonan Yan, Xiaoguang Li, Wenjing Zhang, Rui Wang, Hui Li, Xingwen Zhao, FengHua Li, Xiaodong Lin 0001. Automatic Evasion of Machine Learning-Based Network Intrusion Detection Systems
168 -- 185Yuwei Li, Yuan Chen, Shouling Ji, Xuhong Zhang 0002, Guanglu Yan, Alex X. Liu, Chunming Wu, Zulie Pan, Peng Lin. G-Fuzz: A Directed Fuzzing Framework for gVisor
186 -- 203Xabier Sáez de Cámara, Jose Luis Flores 0001, Cristóbal Arellano, Aitor Urbieta, Urko Zurutuza. Gotham Testbed: A Reproducible IoT Testbed for Security Experiments and Dataset Generation
204 -- 215Hongyang Yan, Anli Yan, Li Hu, Jiaming Liang, Haibo Hu 0001. MTL-Leak: Privacy Risk Assessment in Multi-Task Learning
216 -- 228Kaushik Madala, Hyunsook Do, Bastian Tenbergen. ADSA - Association-Driven Safety Analysis to Expose Unknown Safety Issues
229 -- 240Benyuan Yang, HeSuan Hu. Delegation Security Analysis in Workflow Systems
241 -- 253Ke Huang 0002, Yi Mu 0001, Fatemeh Rezaeibagha, Xiaosong Zhang 0001, Xiong Li 0002, Sheng Cao. Monero With Multi-Grained Redaction
254 -- 269Jie Wang, Kun Sun 0001, Lingguang Lei, Yuewu Wang, Jiwu Jing, Shengye Wan, Qi Li 0002. CacheIEE: Cache-Assisted Isolated Execution Environment on ARM Multi-Core Platforms
270 -- 283Liqiang Wu, Shaojing Fu, Yuchuan Luo, Hongyang Yan, Heyuan Shi, Ming Xu 0002. A Robust and Lightweight Privacy-Preserving Data Aggregation Scheme for Smart Grid
284 -- 297Alberto Huertas Celdrán, Pedro Miguel Sánchez Sánchez, Gérôme Bovet, Gregorio Martínez Pérez, Burkhard Stiller. CyberSpec: Behavioral Fingerprinting for Intelligent Attacks Detection on Crowdsensing Spectrum Sensors
298 -- 308Urvashi Bansal, Geeta Sikka, Lalit Kumar Awasthi, Bharat K. Bhargava. Quantitative Evaluation of Extensive Vulnerability Set Using Cost Benefit Analysis
309 -- 324Hongliang Liang, Xiangyu Li, Da Xiao, Jie Liu, Yanjie Zhou, Aibo Wang, Jin Li. Generative Pre-Trained Transformer-Based Reinforcement Learning for Testing Web Application Firewalls
325 -- 339Hongliang Liang, Xinglin Yu, Xianglin Cheng, Jie Liu, Jin Li. Multiple Targets Directed Greybox Fuzzing
340 -- 352Sheng Li 0006, Zichi Wang, Xiudong Zhang, Xinpeng Zhang. Robust Image Steganography Against General Downsampling Operations With Lossless Secret Recovery
353 -- 371Cheng Huang 0001, Dongxiao Liu, Anjia Yang, Rongxing Lu, Xuemin Shen. Multi-Client Secure and Efficient DPF-Based Keyword Search for Cloud Storage
372 -- 387Yijie Shen, Feng Lin 0004, Chao Wang 0097, Tiantian Liu 0002, Zhongjie Ba, Li Lu 0008, Wenyao Xu, Kui Ren 0001. MotoPrint: Reconfigurable Vibration Motor Fingerprint via Homologous Signals Learning
388 -- 402Jianping Cai, Ximeng Liu, Jiayin Li, Kim-Kwang Raymond Choo. Differentially Private Non-Negative Consistent Release for Large-Scale Hierarchical Trees
403 -- 418Ziyue Pan, Wenbo Shen, Xingkai Wang, Yutian Yang, Rui Chang, Yao Liu 0007, Chengwei Liu, Yang Liu 0003, Kui Ren 0001. Ambush From All Sides: Understanding Security Threats in Open-Source Software CI/CD Pipelines
419 -- 433Meng Luo 0002, Bo Feng 0002, Long Lu, Engin Kirda, Kui Ren 0001. On the Complexity of the Web's PKI: Evaluating Certificate Validation of Mobile Browsers
434 -- 448Roberto De Prisco, Alfredo De Santis, Francesco Palmieri 0002. Bounds and Protocols for Graph-Based Distributed Secret Sharing
449 -- 462Jianwei Liu 0008, Yinghui He, Chaowei Xiao, Jinsong Han, Kui Ren 0001. Time to Think the Security of WiFi-Based Behavior Recognition Systems
463 -- 475Runnan Zhang, Gang Liu 0006, Hongzhaoning Kang, Quan Wang 0006, Bo Wan, Nan Luo. Anonymity in Attribute-Based Access Control: Framework and Metric
476 -- 485Yi Zhang, Xiaofeng Jia, Bianjing Pan, Jun Shao 0001, Liming Fang 0001, Rongxing Lu, Guiyi Wei. Anonymous Multi-Hop Payment for Payment Channel Networks
486 -- 498Alireza Sarmadi, Hao Fu, Prashanth Krishnamurthy, Siddharth Garg, Farshad Khorrami. Privacy-Preserving Collaborative Learning Through Feature Extraction
499 -- 500Fucai Luo, Haiyan Wang 0009, Xingfu Yan. Comments on "VERSA: Verifiable Secure Aggregation for Cross-Device Federated Learning"