


Остановите войну!
for scientists:


default search action
IEEE Transactions on Dependable and Secure Computing, Volume 18
Volume 18, Number 1, January - February 2021
- Yuchang Mo
, Liudong Xing
, Yi-Kuei Lin
, Wenzhong Guo
:
Efficient Analysis of Repairable Computing Systems Subject to Scheduled Checkpointing. 1-14 - Jing Chen
, Chiheng Wang
, Kun He
, Ziming Zhao, Min Chen
, Ruiying Du, Gail-Joon Ahn
:
Semantics-Aware Privacy Risk Assessment Using Self-Learning Weight Assignment for Mobile Apps. 15-29 - Julian L. Rrushi
:
DNIC Architectural Developments for 0-Knowledge Detection of OPC Malware. 30-44 - Qiao Hu
, Yuanzhen Liu
, Anjia Yang
, Gerhard P. Hancke
:
Preventing Overshadowing Attacks in Self-Jamming Audio Channels. 45-57 - Yen-Lung Lai, Jung Yeon Hwang
, Zhe Jin
, Soohyong Kim, Sangrae Cho, Andrew Beng Jin Teoh
:
Secure Secret Sharing Enabled b-band Mini Vaults Bio-Cryptosystem for Vectorial Biometrics. 58-71 - Bin Liang
, Hongcheng Li, Miaoqiang Su, Xirong Li, Wenchang Shi
, Xiaofeng Wang:
Detecting Adversarial Image Examples in Deep Neural Networks with Adaptive Noise Reduction. 72-85 - Sridhar Adepu
, Aditya Mathur
:
Distributed Attack Detection in a Water Treatment Plant: Method and Case Study. 86-99 - Donghui Hu
, Chunya Hu, Yuqi Fan
, Xintao Wu
:
oGBAC - A Group Based Access Control Framework for Information Sharing in Online Social Networks. 100-116 - Jiangang Shu
, Kan Yang
, Xiaohua Jia
, Ximeng Liu
, Cong Wang
, Robert H. Deng
:
Proxy-Free Privacy-Preserving Task Matching with Efficient Revocation in Crowdsourcing. 117-130 - Chengjun Cai
, Jian Weng
, Xingliang Yuan
, Cong Wang
:
Enabling Reliable Keyword Search in Encrypted Decentralized Storage with Fairness. 131-144 - Hui Guo
, Zhenfeng Zhang, Jing Xu, Ningyu An, Xiao Lan:
Accountable Proxy Re-Encryption for Secure Data Sharing. 145-159 - Kangjie Lu
, Meng Xu, Chengyu Song
, Taesoo Kim
, Wenke Lee:
Stopping Memory Disclosures via Diversification and Replicated Execution. 160-173 - Xing Gao
, Benjamin Steenkamer
, Zhongshu Gu, Mehmet Kayaalp, Dimitrios Pendarakis, Haining Wang
:
A Study on the Security Implications of Information Leakages in Container Clouds. 174-191 - Chang Liu
, Liehuang Zhu
, Xiangjian He
, Jinjun Chen
:
Enabling Privacy-Preserving Shortest Distance Queries on Encrypted Graph Data. 192-204 - Warren Connell, Daniel A. Menascé
, Massimiliano Albanese
:
Performance Modeling of Moving Target Defenses with Reconfiguration Limits. 205-219 - Bin Lian
, Gongliang Chen, Jialin Cui, Maode Ma
:
Compact E-Cash with Efficient Coin-Tracing. 220-234 - Bikash Poudel, Arslan Munir
:
Design and Evaluation of a Reconfigurable ECU Architecture for Secure and Dependable Automotive CPS. 235-252 - Ning Xie
, Changsheng Chen
, Zhong Ming
:
Security Model of Authentication at the Physical Layer and Performance Analysis over Fading Channels. 253-268 - Sophie Cerf
, Sara Bouchenak, Bogdan Robu
, Nicolas Marchand
, Vincent Primault, Sonia Ben Mokhtar
, Antoine Boutet, Lydia Y. Chen
:
Automatic Privacy and Utility Preservation for Mobility Data: A Nonlinear Model-Based Approach. 269-282 - Guosong Sun, Quan Qian
:
Deep Learning and Visualization for Identifying Malware Families. 283-295 - Adam Bowers, Cong Liao, Douglas Steiert
, Dan Lin
, Anna Cinzia Squicciarini, Ali R. Hurson
:
Detecting Suspicious File Migration or Replication in the Cloud. 296-309 - Mengyuan Zhang
, Lingyu Wang
, Sushil Jajodia
, Anoop Singhal:
Network Attack Surface: Lifting the Concept of Attack Surface to the Network Level for Evaluating Networks' Resilience Against Zero-Day Attacks. 310-324 - Jasper Bogaerts
, Bert Lagaisse
, Wouter Joosen:
SEQUOIA: A Middleware Supporting Policy-Based Access Control for Search and Aggregation in Data-Driven Applications. 325-339 - Shaoyong Du
, Pengxiong Zhu, Jingyu Hua
, Zhiyun Qian
, Zhao Zhang, Xiaoyu Chen, Sheng Zhong
:
An Empirical Analysis of Hazardous Uses of Android Shared Storage. 340-355 - Shameek Bhattacharjee
, Sajal K. Das
:
Detection and Forensics against Stealthy Data Falsification in Smart Metering Infrastructure. 356-371 - Montida Pattaranantakul, Ruan He, Zonghua Zhang
, Ahmed Meddahi
, Ping Wang
:
Leveraging Network Functions Virtualization Orchestrators to Achieve Software-Defined Access Control in the Clouds. 372-383 - Xiaojie Zhu
, Erman Ayday
, Roman Vitenberg:
A Privacy-Preserving Framework for Outsourcing Location-Based Services to the Cloud. 384-399 - Kazi Md. Rokibul Alam
, Shinsuke Tamura
, S. M. Saifur Rahman, Yasuhiko Morimoto
:
An Electronic Voting Scheme Based on Revised-SVRM and Confirmation Numbers. 400-410 - Ye Zhu
, Nicholas Ruffing, Jonathan Gurary
, Yong Guan
, Riccardo Bettati
:
Towards Smartphone Operating System Identification. 411-425 - Manoranjan Mohanty
, Ming Zhang, Muhammad Rizwan Asghar
, Giovanni Russello:
e-PRNU: Encrypted Domain PRNU-Based Camera Attribution for Preserving Privacy. 426-437 - Jingyi Wang
, Xinyue Zhang
, Qixun Zhang
, Ming Li
, Yuanxiong Guo
, Zhiyong Feng
, Miao Pan
:
Data-Driven Spectrum Trading with Secondary Users' Differential Privacy Preservation. 438-447 - Jianghua Liu
, Jinhua Ma
, Yang Xiang
, Wanlei Zhou
, Xinyi Huang
:
Authenticated Medical Documents Releasing with Privacy Protection and Release Control. 448-459 - Jin Li
, Yanyu Huang
, Yu Wei
, Siyi Lv, Zheli Liu
, Changyu Dong
, Wenjing Lou
:
Searchable Symmetric Encryption with Forward Search Privacy. 460-474 - Rong Jin
, Kai Zeng
:
Manipulative Attack Against Physical Layer Key Agreement and Countermeasure. 475-489 - Xinrui Ge
, Jia Yu
, Hanlin Zhang
, Chengyu Hu
, Zengpeng Li
, Zhan Qin, Rong Hao
:
Towards Achieving Keyword Search over Dynamic Encrypted Cloud Data with Symmetric-Key Based Verification. 490-504
Volume 18, Number 2, March - April 2021
- Khaled Al-Naami, Amir El-Ghamry
, Md Shihabul Islam
, Latifur Khan, Bhavani Thuraisingham, Kevin W. Hamlen, Mohammed F. Alrahmawy
, Magdi Zakria Rashad
:
BiMorphing: A Bi-Directional Bursting Defense against Website Fingerprinting Attacks. 505-517 - Tanmoy Chakraborty
, Sushil Jajodia
, Jonathan Katz, Antonio Picariello, Giancarlo Sperlì
, V. S. Subrahmanian
:
A Fake Online Repository Generation Engine for Cyber Deception. 518-533 - Furkan Alaca
, AbdelRahman Abdou
, Paul C. van Oorschot
:
Comparative Analysis and Framework Evaluating Mimicry-Resistant and Invisible Web Authentication Schemes. 534-549 - Peter Casey
, Ibrahim M. Baggili
, Ananya Yarramreddy:
Immersive Virtual Reality Attacks and the Human Joystick. 550-562 - Tong Wu
, Guomin Yang
, Yi Mu
, Fuchun Guo
, Robert H. Deng
:
Privacy-Preserving Proof of Storage for the Pay-As-You-Go Business Model. 563-575 - Suvadeep Banerjee
, Balavinayagam Samynathan
, Jacob A. Abraham
, Abhijit Chatterjee
:
Real-Time Error Detection in Nonlinear Control Systems Using Machine Learning Assisted State-Space Encoding. 576-592 - Muhammad E. S. Elrabaa
, Mohammed Alasli
, Marwan H. Abu-Amara
:
Secure Computing Enclaves Using FPGAs. 593-604 - Omar Abdel Wahab
, Jamal Bentahar
, Hadi Otrok
, Azzam Mourad
:
Resource-Aware Detection and Defense System against Multi-Type Attacks in the Cloud: Repeated Bayesian Stackelberg Game. 605-622 - Jan Z. Konczak
, Pawel T. Wojciechowski
, Nuno Santos, Tomasz Zurkowski
, André Schiper:
Recovery Algorithms for Paxos-Based State Machine Replication. 623-640 - Shunli Ma
, Yi Deng, Debiao He
, Jiang Zhang
, Xiang Xie
:
An Efficient NIZK Scheme for Privacy-Preserving Transactions Over Account-Model Blockchain. 641-651 - Yue Zhang
, Jian Weng, Jia-Si Weng
, Lin Hou, Anjia Yang
, Ming Li, Yang Xiang
, Robert H. Deng
:
Looking Back! Using Early Versions of Android Apps as Attack Vectors. 652-666 - Sujit Rokka Chhetri
, Anomadarshi Barua
, Sina Faezi
, Francesco Regazzoni
, Arquimedes Canedo, Mohammad Abdullah Al Faruque
:
Tool of Spies: Leaking your IP by Altering the 3D Printer Compiler. 667-678 - Yannan Li
, Guomin Yang
, Willy Susilo
, Yong Yu
, Man Ho Au
, Dongxi Liu:
Traceable Monero: Anonymous Cryptocurrency with Enhanced Accountability. 679-691 - Shuli Zheng, Yuzhao Wang, Donghui Hu
:
Lossless Data Hiding Based on Homomorphic Cryptosystem. 692-705 - Runhua Xu
, James Joshi
, Prashant Krishnamurthy:
An Integrated Privacy Preserving Attribute-Based Access Control Framework Supporting Secure Deduplication. 706-721 - Jing Zhang
, Jie Cui
, Hong Zhong
, Zhili Chen
, Lu Liu
:
PA-CRT: Chinese Remainder Theorem Based Conditional Privacy-Preserving Authentication Scheme in Vehicular Ad-Hoc Networks. 722-735 - Mojan Javaheripi
, Mohammad Samragh
, Bita Darvish Rouhani
, Tara Javidi
, Farinaz Koushanfar
:
CuRTAIL: ChaRacterizing and Thwarting AdversarIal Deep Learning. 736-752 - Muhammad Siddiqi
, Syed Taha Ali
, Vijay Sivaraman
:
Secure Opportunistic Contextual Logging for Wearable Healthcare Sensing Devices. 753-764 - Saiyu Qi
, Yuanqing Zheng
:
Crypt-DAC: Cryptographically Enforced Dynamic Access Control in the Cloud. 765-779 - Peng Tang
, Xiang Cheng, Sen Su
, Rui Chen, Huaxi Shao:
Differentially Private Publication of Vertically Partitioned Data. 780-795 - Tommaso Zoppi
, Andrea Ceccarelli
, Andrea Bondavalli
:
MADneSs: A Multi-Layer Anomaly Detection Framework for Complex Dynamic Systems. 796-809 - Chen Luo
, Fei He
, Fei Peng, Dong Yan, Dan Zhang, Xin Zhou:
PSpec-SQL: Enabling Fine-Grained Control for Distributed Data Analytics. 810-824 - Long Cheng
, Ke Tian
, Danfeng Daphne Yao, Lui Sha, Raheem A. Beyah:
Checking is Believing: Event-Aware Program Anomaly Detection in Cyber-Physical Systems. 825-842 - Xiaokang Hu
, Jian Li
, Changzheng Wei, Weigang Li, Xin Zeng, Ping Yu, Haibing Guan:
STYX: A Hierarchical Key Management System for Elastic Content Delivery Networks on Public Clouds. 843-857 - Yinghui Zhang
, Robert H. Deng
, Elisa Bertino
, Dong Zheng
:
Robust and Universal Seamless Handover Authentication in 5G HetNets. 858-874 - Hassan Chizari
, Emil Lupu
:
Extracting Randomness from the Trend of IPI for Cryptographic Operations in Implantable Medical Devices. 875-888 - Bikash Chandra Singh
, Barbara Carminati, Elena Ferrari
:
Privacy-Aware Personal Data Storage (P-PDS): Learning how to Protect User Privacy from External Applications. 889-903 - Lin Yao
, Zhenyu Chen, Xin Wang
, Dong Liu, Guowei Wu
:
Sensitive Label Privacy Preservation with Anatomization for Data Publishing. 904-917 - Xi Cheng
, Min Zhou
, Xiaoyu Song, Ming Gu, Jiaguang Sun:
Automatic Integer Error Repair by Proper-Type Inference. 918-935 - Yaara Neumeier
, Osnat Keren
:
Protecting Multi-Level Memories From Jamming Using Q-ary Expurgated Robust Codes. 936-948 - Rajkumar Das
, Gour C. Karmakar
, Joarder Kamruzzaman
:
How Much I Can Rely on You: Measuring Trustworthiness of a Twitter User. 949-966 - Leye Wang
, Dingqi Yang
, Xiao Han
, Daqing Zhang, Xiaojuan Ma
:
Mobile Crowdsourcing Task Allocation with Differential-and-Distortion Geo-Obfuscation. 967-981 - Tianhao Wang
, Ninghui Li, Somesh Jha:
Locally Differentially Private Heavy Hitter Identification. 982-993 - Guangchi Liu
, Qing Yang
, Honggang Wang
, Alex X. Liu
:
Trust Assessment in Online Social Networks. 994-1007
Volume 18, Number 3, May - June 2021
- Yuan Zhang
, Yunlong Mao
, Minze Xu
, Fengyuan Xu, Sheng Zhong
:
Towards Thwarting Template Side-Channel Attacks in Secure Cloud Deduplications. 1008-1018 - Xiaojun Zhang, Chunxiang Xu
, Huaxiong Wang
, Yuan Zhang
, Shixiong Wang:
FS-PEKS: Lattice-Based Forward Secure Public-Key Encryption with Keyword Search for Cloud-Assisted Industrial Internet of Things. 1019-1032 - Yangyu Hu
, Haoyu Wang, Yajin Zhou
, Yao Guo
, Li Li
, Bingxuan Luo
, Fangren Xu:
Dating with Scambots: Understanding the Ecosystem of Fraudulent Dating Applications. 1033-1050 - Shujie Cui
, Sana Belguith
, Pramodya De Alwis, Muhammad Rizwan Asghar
, Giovanni Russello:
Collusion Defender: Preserving Subscribers' Privacy in Publish and Subscribe Systems. 1051-1064 - Jakub Breier
, Xiaolu Hou
, Yang Liu
:
On Evaluating Fault Resilient Encoding Schemes in Software. 1065-1079 - Yinbin Miao
, Ximeng Liu, Kim-Kwang Raymond Choo
, Robert H. Deng
, Jiguo Li, Hongwei Li, Jian-Feng Ma:
Privacy-Preserving Attribute-Based Keyword Search in Shared Multi-owner Setting. 1080-1094 - Geong Sen Poh, Prosanta Gope
, Jianting Ning
:
PrivHome: Privacy-Preserving Authenticated Communication in Smart Home Environment. 1095-1107 - Chen Yan
, Guoming Zhang, Xiaoyu Ji
, Tianchen Zhang, Taimin Zhang, Wenyuan Xu
:
The Feasibility of Injecting Inaudible Voice Commands to Voice Assistants. 1108-1124 - Hai Jin
, Zhi Li
, Deqing Zou
, Bin Yuan
:
DSEOM: A Framework for Dynamic Security Evaluation and Optimization of MTD in Container-Based Cloud. 1125-1136 - Wei Lu
, Yingjie Xue, Yuileong Yeung, Hongmei Liu, Jiwu Huang
, Yun Q. Shi:
Secure Halftone Image Steganography Based on Pixel Density Transition. 1137-1149 - Haider Adnan Khan
, Nader Sehatbakhsh
, Luong N. Nguyen, Robert Locke Callan, Arie Yeredor
, Milos Prvulovic
, Alenka G. Zajic
:
IDEA: Intrusion Detection through Electromagnetic-Signal Analysis for Critical Embedded and Cyber-Physical Systems. 1150-1163 - Ron Bitton
, Asaf Shabtai
:
A Machine Learning-Based Intrusion Detection System for Securing Remote Desktop Connections to Electronic Flight Bag Servers. 1164-1181 - Jin Cao
, Maode Ma
, Yulong Fu, Hui Li
, Yinghui Zhang
:
CPPHA: Capability-Based Privacy-Protection Handover Authentication Mechanism for SDN-Based 5G HetNets. 1182-1195 - Congwu Li, Le Guan
, Jingqiang Lin
, Bo Luo
, Quanwei Cai, Jiwu Jing, Jing Wang:
Mimosa: Protecting Private Keys Against Memory Disclosure Attacks Using Hardware Transactional Memory. 1196-1213 - Chunpeng Ge
, Zhe Liu
, Jinyue Xia
, Liming Fang
:
Revocable Identity-Based Broadcast Proxy Re-Encryption for Data Sharing in Clouds. 1214-1226 - Louise Axon
, Jassim Happa
, Alastair Janse van Rensburg
, Michael Goldsmith
, Sadie Creese:
Sonification to Support the Monitoring Tasks of Security Operations Centres. 1227-1244 - Chuan Zhang
, Liehuang Zhu
, Chang Xu
, Ximeng Liu
, Kashif Sharif
:
Reliable and Privacy-Preserving Truth Discovery for Mobile Crowdsensing Systems. 1245-1260 - Yifeng Zheng
, Huayi Duan
, Xiaoting Tang, Cong Wang
, Jiantao Zhou
:
Denoising in the Dark: Privacy-Preserving Deep Neural Network-Based Image Denoising. 1261-1275 - Wei Li
, Xuelian Li
, Juntao Gao
, Haiyu Wang
:
Design of Secure Authenticated Key Management Protocol for Cloud Computing Environments. 1276-1290 - Mahmoud Nabil
, Ahmed B. T. Sherif
, Mohamed Mahmoud
, Ahmad Alsharif
, Mohamed M. Abdallah
:
Efficient and Privacy-Preserving Ridesharing Organization for Transferable and Non-Transferable Services. 1291-1306 - Haijiang Wang
, Jianting Ning
, Xinyi Huang
, Guiyi Wei
, Geong Sen Poh
, Ximeng Liu
:
Secure Fine-Grained Encrypted Keyword Search for E-Healthcare Cloud. 1307-1319 - Yanli Chen
, Hongxia Wang
, Hanzhou Wu
, Zhiqiang Wu
, Tao Li
, Asad Malik
:
Adaptive Video Data Hiding through Cost Assignment and STCs. 1320-1335 - María Isabel González Vasco
, Angel L. Pérez del Pozo, Claudio Soriente:
A Key for John Doe: Modeling and Designing Anonymous Password-Authenticated Key Exchange Protocols. 1336-1353 - Shengshan Hu
, Leo Yu Zhang
, Qian Wang
, Zhan Qin, Cong Wang:
Towards Private and Scalable Cross-Media Retrieval. 1354-1368 - Brian Belleville
, Wenbo Shen
, Stijn Volckaert
, Ahmed M. Azab, Michael Franz:
KALD: Detecting Direct Pointer Disclosure Vulnerabilities. 1369-1377 - Chongyang Bai
, Qian Han
, Ghita Mezzour
, Fabio Pierazzi
, V. S. Subrahmanian
:
$\sf {DBank}$DBank: Predictive Behavioral Analysis of Recent Android Banking Trojans. 1378-1393 - Kun He
, Jing Chen
, Quan Yuan, Shouling Ji
, Debiao He
, Ruiying Du:
Dynamic Group-Oriented Provable Data Possession in the Cloud. 1394-1408 - SeungSeob Lee, Hang Shi
, Kun Tan, Yunxin Liu
, SuKyoung Lee
, Yong Cui
:
S2Net: Preserving Privacy in Smart Home Routers. 1409-1424 - Haining Yu
, Xiaohua Jia
, Hongli Zhang
, Xiangzhan Yu, Jiangang Shu
:
PSRide: Privacy-Preserving Shared Ride Matching for Online Ride Hailing Systems. 1425-1440 - Kai Huang
, Ximeng Liu
, Shaojing Fu
, Deke Guo, Ming Xu:
A Lightweight Privacy-Preserving CNN Feature Extraction Framework for Mobile Sensing. 1441-1455 - Hang Cheng
, Huaxiong Wang
, Ximeng Liu
, Yan Fang, Meiqing Wang
, Xiaojun Zhang
:
Person Re-Identification over Encrypted Outsourced Surveillance Videos. 1456-1473 - Zhibo Wang
, Mengkai Song
, Siyan Zheng
, Zhifei Zhang
, Yang Song
, Qian Wang
:
Invisible Adversarial Attack against Deep Neural Networks: An Adaptive Penalization Approach. 1474-1488 - Xiaoning Du
, Alwen Tiu
, Kun Cheng
, Yang Liu
:
Trace-Length Independent Runtime Monitoring of Quantitative Policies. 1489-1510
Volume 18, Number 4, July - August 2021
- Yuan Hong
, Valérie Issarny
, Surya Nepal
, Mudhakar Srivatsa:
Guest Editors' Introduction to the Joint Special Section on Secure and Emerging Collaborative Computing and Intelligent Systems. 1511-1512 - Wenqi Wei
, Ling Liu
:
Robust Deep Learning Ensemble Against Deception. 1513-1527 - Lu Ou
, Zheng Qin
, Shaolin Liao
, Jian Weng
, Xiaohua Jia
:
An Optimal Noise Mechanism for Cross-Correlated IoT Data Releasing. 1528-1540 - Zhigang Lu
, Hong Shen
:
Differentially Private $k$k-Means Clustering With Convergence Guarantee. 1541-1552 - Gagandeep Singh Chawla, Mengyuan Zhang
, Suryadipta Majumdar
, Yosr Jarraya, Makan Pourzandi, Lingyu Wang
, Mourad Debbabi
:
VMGuard: State-Based Proactive Verification of Virtual Network Isolation With Application to NFV. 1553-1567 - Jin Han
, Wanyu Zang, Meng Yu, Ravi S. Sandhu:
Quantify Co-Residency Risks in the Cloud Through Deep Learning. 1568-1579 - Hongwei Shi
, Shengling Wang
, Qin Hu, Xiuzhen Cheng
, Junshan Zhang
, Jiguo Yu
:
Fee-Free Pooled Mining for Countering Pool-Hopping Attack in Blockchain. 1580-1590 - Xinghua Li
, Mengyao Zhu
, Laurence T. Yang
, Mengfan Xu
, Zhuo Ma
, Cheng Zhong, Hui Li
, Yang Xiang
:
Sustainable Ensemble Learning Driving Intrusion Detection Model. 1591-1604 - Haibing Lu
, Xi Chen
, Qi Liu, Michele Samorani
, Guojie Song
,