


default search action
IEEE Transactions on Dependable and Secure Computing, Volume 20
Volume 20, Number 1, January - February 2023
- Abdulrahman Abu Elkhail

, Nada Lachtar
, Duha Ibdah
, Rustam Aslam, Hamza Khan, Anys Bacha
, Hafiz Malik
:
Seamlessly Safeguarding Data Against Ransomware Attacks. 1-16 - Qingqing Ye

, Haibo Hu
, Xiaofeng Meng, Huadi Zheng
, Kai Huang
, Chengfang Fang, Jie Shi:
PrivKVM*: Revisiting Key-Value Statistics Estimation With Local Differential Privacy. 17-35 - Changhee Hahn

, Hodong Kim
, Minjae Kim
, Junbeom Hur
:
VerSA: Verifiable Secure Aggregation for Cross-Device Federated Learning. 36-52 - Shengmin Xu

, Jianting Ning
, Yingjiu Li
, Yinghui Zhang
, Guowen Xu
, Xinyi Huang
, Robert H. Deng
:
A Secure EMR Sharing System With Tamper Resistance and Expressive Access Control. 53-67 - Weibei Fan

, Fu Xiao
, Jianxi Fan
, Zhijie Han
, Lijuan Sun, Ruchuan Wang:
Fault-Tolerant Routing With Load Balancing in LeTQ Networks. 68-82 - Yan Zhou

, Murat Kantarcioglu
, Bowei Xi
:
Exploring the Effect of Randomness on Transferability of Adversarial Samples Against Deep Neural Networks. 83-99 - Yanhua Du

, Zijian Sun, Hesuan Hu
:
Security-Aware Collaboration Plan Recommendation for Dynamic Multiple Workflow Processes. 100-113 - Javad Ghareh Chamani

, Yun Wang
, Dimitrios Papadopoulos
, Mingyang Zhang, Rasool Jalili
:
Multi-User Dynamic Searchable Symmetric Encryption With Corrupted Participants. 114-130 - Md. Mamunur Rashid Akand

, Reihaneh Safavi-Naini, Marc Kneppers, Matthieu Giraud, Pascal Lafourcade
:
Privacy-Preserving Proof-of-Location With Security Against Geo-Tampering. 131-146 - Jiqiang Gao

, Boyu Hou
, Xiaojie Guo
, Zheli Liu
, Ying Zhang
, Kai Chen
, Jin Li
:
Secure Aggregation is Insecure: Category Inference Attack on Federated Learning. 147-160 - Jide S. Edu

, Xavier Ferrer Aran
, Jose M. Such
, Guillermo Suarez-Tangil
:
SkillVet: Automated Traceability Analysis of Amazon Alexa Skills. 161-175 - Saiyu Qi

, Jianfeng Wang
, Meixia Miao, Meng Zhang, Xiaofeng Chen
:
TinyEnc: Enabling Compressed and Encrypted Big Data Stores With Rich Query Support. 176-192 - Qingxuan Wang

, Ding Wang
, Chi Cheng, Debiao He
:
Quantum2FA: Efficient Quantum-Resistant Two-Factor Authentication Scheme for Mobile Devices. 193-208 - Haining Yu

, Hongli Zhang
, Xiaohua Jia
, Xiao Chen, Xiangzhan Yu:
pSafety: Privacy-Preserving Safety Monitoring in Online Ride Hailing Services. 209-224 - Meng Li

, Yifei Chen
, Chhagan Lal
, Mauro Conti
, Mamoun Alazab
, Donghui Hu
:
Eunomia: Anonymous and Secure Vehicular Digital Forensics Based on Blockchain. 225-241 - Mohammad Reza Nosouhi

, Shui Yu
, Keshav Sood
, Marthie Grobler
, Raja Jurdak
, Ali Dorri
, Shigen Shen
:
UCoin: An Efficient Privacy Preserving Scheme for Cryptocurrencies. 242-255 - Riccardo Pinciroli

, Lishan Yang
, Jacob Alter, Evgenia Smirni
:
Lifespan and Failures of SSDs and HDDs: Similarities, Differences, and Prediction Models. 256-272 - Dan Tang

, Xiyin Wang
, Xiong Li
, Pandi Vijayakumar
, Neeraj Kumar
:
AKN-FGD: Adaptive Kohonen Network Based Fine-Grained Detection of LDoS Attacks. 273-287 - Keshav Sood

, Mohammad Reza Nosouhi
, Neeraj Kumar
, Anuroop Gaddam, Bohao Feng
, Shui Yu
:
Accurate Detection of IoT Sensor Behaviors in Legitimate, Faulty and Compromised Scenarios. 288-300 - Joshua Morris

, Sara Newman
, Kannappan Palaniappan, Jianping Fan
, Dan Lin
:
"Do You Know You Are Tracked by Photos That You Didn't Take": Large-Scale Location-Aware Multi-Party Image Privacy Protection. 301-312 - Mordechai Guri

:
POWER-SUPPLaY: Leaking Sensitive Data From Air-Gapped, Audio-Gapped Systems by Turning the Power Supplies into Speakers. 313-330 - Dahuin Jung

, Ho Bae
, Hyun-Soo Choi
, Sungroh Yoon
:
PixelSteganalysis: Pixel-Wise Hidden Information Removal With Low Visual Degradation. 331-342 - Jian Lin

, Dingding Wang
, Rui Chang
, Lei Wu
, Yajin Zhou
, Kui Ren
:
EnBinDiff: Identifying Data-Only Patches for Binaries. 343-359 - Wei Liu

, Zhiguo Wan
, Jun Shao
, Yong Yu
:
HyperMaze: Towards Privacy-Preserving and Scalable Permissioned Blockchain. 360-376 - Xinliang Miao

, Rui Chang
, Jianhong Zhao
, Yongwang Zhao, Shuang Cao, Tao Wei, Liehui Jiang, Kui Ren
:
CVTEE: A Compatible Verified TEE Architecture With Enhanced Security. 377-391 - Daniele Cono D'Elia, Simone Nicchi, Matteo Mariani, Matteo Marini, Federico Palmaro

:
Designing Robust API Monitoring Solutions. 392-406 - Jingjing Zhang

, Yongjie Ye, Weigang Wu
, Xiapu Luo
:
Boros: Secure and Efficient Off-Blockchain Transactions via Payment Channel Hub. 407-421 - Lu Wei

, Jie Cui
, Hong Zhong
, Irina Bolodurina
, Lu Liu
:
A Lightweight and Conditional Privacy-Preserving Authenticated Key Agreement Scheme With Multi-TA Model for Fog-Based VANETs. 422-436 - Xingyu Li

, Zhe Qu
, Shangqing Zhao
, Bo Tang
, Zhuo Lu
, Yao Liu
:
LoMar: A Local Defense Against Poisoning Attack on Federated Learning. 437-450 - Miguel Villarreal-Vasquez

, Gaspar Modelo-Howard
, Simant Dube
, Bharat K. Bhargava
:
Hunting for Insider Threats Using LSTM-Based Anomaly Detection. 451-462 - Ziqing Huang, Zhenjun Tang

, Xianquan Zhang
, Linlin Ruan, Xinpeng Zhang
:
Perceptual Image Hashing With Locality Preserving Projection for Copy Detection. 463-477 - Zongpu Zhang

, Hubin Zhang
, Junyuan Wang, Xiaokang Hu
, Jian Li
, Wenqian Yu, Ping Yu, Weigang Li, Bo Cui, Guodong Zhu, Kapil Sood
, Brian Will
, Haibing Guan
:
QKPT: Securing Your Private Keys in Cloud With Performance, Scalability and Transparency. 478-491 - Rui Zhang, Lei Zhang, Kim-Kwang Raymond Choo

, Tong Chen
:
Dynamic Authenticated Asymmetric Group Key Agreement With Sender Non-Repudiation and Privacy for Group-Oriented Applications. 492-505 - Farzaneh Abazari

, Enrico Branca
, Norah Ridley
, Natalia Stakhanova
, Mila Dalla Preda
:
Dataset Characteristics for Reliable Code Authorship Attribution. 506-521 - Wenhao Wang

, Weijie Liu
, Hongbo Chen
, XiaoFeng Wang, Hongliang Tian, Dongdai Lin
:
Trust Beyond Border: Lightweight, Verifiable User Isolation for Protecting In-Enclave Services. 522-538 - Josep Domingo-Ferrer

, Jesús A. Manjón:
Circuit-Free General-Purpose Multi-Party Computation via Co-Utile Unlinkable Outsourcing. 539-550 - Zhicong Huang

, Cheng Hong
, Chenkai Weng
, Wen-jie Lu, Hunter Qu:
More Efficient Secure Matrix Multiplication for Unbalanced Recommender Systems. 551-562 - Ermeson C. Andrade

, Roberto Pietrantuono
, Fumio Machida
, Domenico Cotroneo
:
A Comparative Analysis of Software Aging in Image Classifiers on Cloud and Edge. 563-573 - Zhenyu Ning

, Chenxu Wang
, Yinhua Chen, Fengwei Zhang
, Jiannong Cao
:
Revisiting ARM Debugging Features: Nailgun and its Defense. 574-589 - David R. Matos

, Miguel L. Pardal
, Miguel Correia
:
Sanare: Pluggable Intrusion Recovery for Web Applications. 590-605 - Zhonghao Li

, Xinghao Jiang
, Yi Dong
, Laijin Meng
, Tanfeng Sun
:
An Anti-Steganalysis HEVC Video Steganography With High Performance Based on CNN and PU Partition Modes. 606-619 - Xiaoning Liu

, Yifeng Zheng
, Xingliang Yuan
, Xun Yi
:
Securely Outsourcing Neural Network Inference to the Cloud With Lightweight Techniques. 620-636 - Qiuye He

, Song Fang
, Tao Wang
, Yao Liu
, Shangqing Zhao
, Zhuo Lu
:
Proactive Anti-Eavesdropping With Trap Deployment in Wireless Networks. 637-649 - Ling Jin

, Yinzhi Cao
, Yan Chen
, Di Zhang, Simone Campanoni
:
ExGen: Cross-platform, Automated Exploit Generation for Smart Contract Vulnerabilities. 650-664 - Yanzhen Ren

, Dengkai Liu, Chenyu Liu
, Qiaochu Xiong, Jianming Fu
, Lina Wang:
A Universal Audio Steganalysis Scheme Based on Multiscale Spectrograms and DeepResNet. 665-679 - Xixun Yu

, Hui Bai, Zheng Yan
, Rui Zhang
:
VeriDedup: A Verifiable Cloud Data Deduplication Scheme With Integrity and Duplication Proof. 680-694 - Alexei Iliasov, Dominic Taylor

, Linas Laibinis
, Alexander B. Romanovsky
:
Practical Verification of Railway Signalling Programs. 695-707 - Huayi Duan

, Yuefeng Du
, Leqian Zheng
, Cong Wang
, Man Ho Au
, Qian Wang
:
Towards Practical Auditing of Dynamic Data in Decentralized Storage. 708-723 - Abdullah Alsaedi

, Zahir Tari
, Md. Redowan Mahmud
, Nour Moustafa
, Abdun Mahmood
, Adnan Anwar
:
USMD: UnSupervised Misbehaviour Detection for Multi-Sensor Data. 724-739 - Teng Li

, Ya Jiang
, Chi Lin
, Mohammad S. Obaidat
, Yulong Shen
, Jianfeng Ma
:
DeepAG: Attack Graph Construction and Threats Prediction With Bi-Directional Deep Learning. 740-757 - Kanghua Mo

, Weixuan Tang
, Jin Li
, Xu Yuan
:
Attacking Deep Reinforcement Learning With Decoupled Adversarial Policy. 758-768 - Yi Dong

, Xinghao Jiang
, Zhaohong Li
, Tanfeng Sun
, Peisong He
:
Adaptive HEVC Steganography Based on Steganographic Compression Efficiency Degradation Model. 769-783 - Jianwei Liu

, Chaowei Xiao, Kaiyan Cui
, Jinsong Han
, Xian Xu, Kui Ren
:
Behavior Privacy Preserving in RF Sensing. 784-796 - Kaustabha Ray

, Ansuman Banerjee
:
Prioritized Fault Recovery Strategies for Multi-Access Edge Computing Using Probabilistic Model Checking. 797-812 - Wenxin Chen

, Yingfei Dong
, Zhenhai Duan
:
DPM: Towards Accurate Drone Position Manipulation. 813-826 - Bowen Tang

, Chenggang Wu
, Zhe Wang
, Lichen Jia, Pen-Chung Yew
, Yueqiang Cheng
, Yinqian Zhang, Chenxi Wang, Guoqing Harry Xu
:
SpecBox: A Label-Based Transparent Speculation Scheme Against Transient Execution Attacks. 827-840 - Maanak Gupta

, Ravi S. Sandhu
, Tanjila Mawla, James O. Benson
:
Reachability Analysis for Attributes in ABAC With Group Hierarchy. 841-858 - Ashima Anand

, Amit Kumar Singh
:
Dual Watermarking for Security of COVID-19 Patient Record. 859-866 - Chuntao Dong

, Qingni Shen
, Xuhua Ding
, Daoqing Yu, Wu Luo, Pengfei Wu
, Zhonghai Wu:
T-Counter: Trustworthy and Efficient CPU Resource Measurement Using SGX in the Cloud. 867-885
Volume 20, Number 2, March - April 2023
- Bang Wu

, Shuo Wang
, Xingliang Yuan
, Cong Wang
, Carsten Rudolph
, Xiangwen Yang:
Defeating Misclassification Attacks Against Transfer Learning. 886-901 - Xiaohan Zhang

, Mi Zhang
, Yuan Zhang
, Ming Zhong
, Xin Zhang
, Yinzhi Cao
, Min Yang
:
Slowing Down the Aging of Learning-Based Malware Detectors With API Knowledge. 902-916 - Lei Zhao

, Keyang Jiang, Yuncong Zhu, Lina Wang
, Jiang Ming
:
Capturing Invalid Input Manipulations for Memory Corruption Diagnosis. 917-930 - Liang Xue

, Dongxiao Liu
, Jianbing Ni
, Xiaodong Lin
, Xuemin Sherman Shen
:
Enabling Regulatory Compliance and Enforcement in Decentralized Anonymous Payment. 931-943 - Barnana Baruah

, Subhasish Dhal
:
A Security and Privacy Preserved Intelligent Vehicle Navigation System. 944-959 - Xiaoguang Li

, Haonan Yan
, Zelei Cheng
, Wenhai Sun
, Hui Li
:
Protecting Regression Models With Personalized Local Differential Privacy. 960-974 - Davide Caputo

, Francesco Pagano
, Giovanni Bottino, Luca Verderame
, Alessio Merlo
:
You Can't Always Get What You Want: Towards User-Controlled Privacy on Android. 975-987 - Yifeng Zheng

, Shangqi Lai
, Yi Liu
, Xingliang Yuan
, Xun Yi
, Cong Wang
:
Aggregation Service for Federated Learning: An Efficient, Secure, and More Resilient Realization. 988-1001 - Rui Zhang

, Zheng Yan
, Xuerui Wang, Robert H. Deng
:
VOLERE: Leakage Resilient User Authentication Based on Personal Voice Challenges. 1002-1016 - Yinhao Xiao

, Yizhen Jia
, Xiuzhen Cheng
, Shengling Wang
, Jian Mao
, Zhenkai Liang
:
I Know Your Social Network Accounts: A Novel Attack Architecture for Device-Identity Association. 1017-1030 - Anum Khurshid

, Sileshi Demesie Yalew, Mudassar Aslam
, Shahid Raza
:
ShieLD: Shielding Cross-Zone Communication Within Limited-Resourced IoT Devices Running Vulnerable Software Stack. 1031-1047 - Diana Laura Aguilar

, Miguel Angel Medina-Pérez
, Octavio Loyola-González
, Kim-Kwang Raymond Choo
, Edoardo Bucheli-Susarrey
:
Towards an Interpretable Autoencoder: A Decision-Tree-Based Autoencoder and its Application in Anomaly Detection. 1048-1059 - Subhra Mazumdar

, Sushmita Ruj
:
CryptoMaze: Privacy-Preserving Splitting of Off-Chain Payments. 1060-1073 - Hicham Hammouchi

, Narjisse Nejjari, Ghita Mezzour
, Mounir Ghogho
, Houda Benbrahim
:
STRisk: A Socio-Technical Approach to Assess Hacking Breaches Risk. 1074-1087 - Xuru Li

, Daojing He
, Yun Gao
, Ximeng Liu
, Sammy Chan
, Manghan Pan
, Kim-Kwang Raymond Choo
:
LIGHT: Lightweight Authentication for Intra Embedded Integrated Electronic Systems. 1088-1103 - Tao Xue

, Yu Wen
, Bo Luo
, Gang Li
, Yingjiu Li
, Boyang Zhang, Yang Zheng, Yanfei Hu, Dan Meng:
SparkAC: Fine-Grained Access Control in Spark for Secure Data Sharing and Analytics. 1104-1123 - Majid Salehi

, Luca Degani
, Marco Roveri
, Danny Hughes, Bruno Crispo
:
Discovery and Identification of Memory Corruption Vulnerabilities on Bare-Metal Embedded Devices. 1124-1138 - Ning Wang

, Yimin Chen
, Yang Xiao
, Yang Hu
, Wenjing Lou
, Y. Thomas Hou
:
MANDA: On Adversarial Example Detection for Network Intrusion Detection System. 1139-1153 - Jukka Soikkeli

, Giuliano Casale
, Luis Muñoz-González
, Emil C. Lupu
:
Redundancy Planning for Cost Efficient Resilience to Cyber Attacks. 1154-1168 - Yiming Wu

, Zhiyuan Xie, Shouling Ji
, Zhenguang Liu
, Xuhong Zhang, Changting Lin
, Shuiguang Deng
, Jun Zhou, Ting Wang
, Raheem Beyah:
Fraud-Agents Detection in Online Microfinance: A Large-Scale Empirical Study. 1169-1185 - Nan Sun

, Jun Zhang
, Shang Gao
, Leo Yu Zhang
, Seyit Camtepe
, Yang Xiang
:
Cyber Information Retrieval Through Pragmatics Understanding and Visualization. 1186-1199 - Shahryar Baki

, Rakesh M. Verma
:
Sixteen Years of Phishing User Studies: What Have We Learned? 1200-1212 - Xiaoying Zhang, Hong Xie

, Pei Yi, John C. S. Lui
:
Enhancing Sybil Detection via Social-Activity Networks: A Random Walk Approach. 1213-1227 - Man Zhou

, Qian Wang
, Xiu Lin, Yi Zhao
, Peipei Jiang
, Qi Li
, Chao Shen
, Cong Wang
:
PressPIN: Enabling Secure PIN Authentication on Mobile Devices via Structure-Borne Sounds. 1228-1242 - Caiqin Dong

, Jian Weng
, Jia-Nan Liu
, Anjia Yang
, Zhiquan Liu
, Yaxi Yang, Jianfeng Ma
:
Maliciously Secure and Efficient Large-Scale Genome-Wide Association Study With Multi-Party Computation. 1243-1257 - Omar Basem

, Abrar Ullah
, Hani Ragab Hassen
:
Stick: An End-to-End Encryption Protocol Tailored for Social Network Platforms. 1258-1269 - Soumyadeep Hore, Fariha Moomtaheen

, Ankit Shah
, Xinming Ou:
Towards Optimal Triage and Mitigation of Context-Sensitive Cyber Vulnerabilities. 1270-1285 - Zhiguo Wan

, Wei Liu
, Hui Cui
:
HIBEChain: A Hierarchical Identity-Based Blockchain System for Large-Scale IoT. 1286-1301 - Wenjun Fan

, Hsiang-Jen Hong
, Jinoh Kim
, Simeon Wuthier
, Makiya Nakashima, Xiaobo Zhou
, Ching-Hua Chow, Sang-Yoon Chang
:
Lightweight and Identifier-Oblivious Engine for Cryptocurrency Networking Anomaly Detection. 1302-1318 - Songnian Zhang

, Suprio Ray
, Rongxing Lu
, Yandong Zheng
, Yunguo Guan
, Jun Shao
:
Towards Efficient and Privacy-Preserving User-Defined Skyline Query Over Single Cloud. 1319-1334 - Zhiguo Wan

, Yan Zhou, Kui Ren:
zk-AuthFeed: Protecting Data Feed to Smart Contracts With Authenticated Zero Knowledge Proof. 1335-1347 - Songnian Zhang

, Suprio Ray
, Rongxing Lu
, Yandong Zheng
, Yunguo Guan
, Jun Shao
:
Towards Efficient and Privacy-Preserving Interval Skyline Queries Over Time Series Data. 1348-1363 - Hua Deng

, Zheng Qin
, Qianhong Wu, Robert H. Deng
, Zhenyu Guan
, Yupeng Hu
, Fangmin Li
:
Achieving Fine-Grained Data Sharing for Hierarchical Organizations in Clouds. 1364-1377 - Radu Ciucanu

, Anatole Delabrouille
, Pascal Lafourcade
, Marta Soare
:
Secure Protocols for Best Arm Identification in Federated Stochastic Multi-Armed Bandits. 1378-1389 - Lan Zhang

, Peng Liu, Yoon-Ho Choi
, Ping Chen
:
Semantics-Preserving Reinforcement Learning Attack Against Graph Neural Networks for Malware Detection. 1390-1402 - David Megías

, Daniel Lerch-Hostalot
:
Subsequent Embedding in Targeted Image Steganalysis: Theoretical Framework and Practical Applications. 1403-1421 - Jin Cao

, Tong Zhu, Ruhui Ma
, Zhenyang Guo
, Yinghui Zhang
, Hui Li
:
A Software-Based Remote Attestation Scheme for Internet of Things Devices. 1422-1434 - Guangsheng Zhang

, Bo Liu
, Tianqing Zhu
, Ming Ding
, Wanlei Zhou:
Label-Only Membership Inference Attacks and Defenses in Semantic Segmentation Models. 1435-1449 - Chunyan Mu

, David Clark
:
Verifying Opacity Properties in Security Systems. 1450-1460 - Cong Sun

, Yuwan Ma, Dongrui Zeng, Gang Tan, Siqi Ma
, Yafei Wu:
μDep: Mutation-Based Dependency Generation for Precise Taint Analysis on Android Native Code. 1461-1475 - Songbin Li

, Jingang Wang
, Peng Liu
:
Detection of Generative Linguistic Steganography Based on Explicit and Latent Text Word Relation Mining Using Deep Learning. 1476-1487 - Pedro Reviriego

, Alfonso Sánchez-Macián
, Stefan Walzer
, Elena Merino Gómez
, Shanshan Liu
, Fabrizio Lombardi
:
On the Privacy of Counting Bloom Filters. 1488-1499 - Madhukrishna Priyadarsini

, Padmalochan Bera
, Sajal K. Das
, Mohammad Ashiqur Rahman
:
A Security Enforcement Framework for SDN Controller Using Game Theoretic Approach. 1500-1515 - Samaneh Hosseini Moghaddam

, Maghsoud Abbaspour
:
Friendship Preference: Scalable and Robust Category of Features for Social Bot Detection. 1516-1528 - Patrik Rusnak

, Elena Zaitseva
, Frank P. A. Coolen
, Miroslav Kvassay
, Vitaly G. Levashenko
:
Logic Differential Calculus for Reliability Analysis Based on Survival Signature. 1529-1540 - Pietro Tedeschi

, Savio Sciancalepore
, Roberto Di Pietro
:
PPCA - Privacy-Preserving Collision Avoidance for Autonomous Unmanned Aerial Vehicles. 1541-1558 - Daniele Bringhenti

, Guido Marchetto
, Riccardo Sisto
, Fulvio Valenza
, Jalolliddin Yusupov
:
Automated Firewall Configuration in Virtual Networks. 1559-1576 - Tuba Yavuz

, Farhaan Fowze
, Grant Hernandez, Ken Yihang Bai
, Kevin R. B. Butler
, Dave Jing Tian:
ENCIDER: Detecting Timing and Cache Side Channels in SGX Enclaves and Cryptographic APIs. 1577-1595 - Hannes Holm

:
Lore a Red Team Emulation Tool. 1596-1608 - Yi He, Yacong Gu, Purui Su

, Kun Sun
, Yajin Zhou
, Zhi Wang, Qi Li
:
A Systematic Study of Android Non-SDK (Hidden) Service API Security. 1609-1623 - Yafeng Wu, Yulai Xie

, Xuelong Liao, Pan Zhou
, Dan Feng
, Lin Wu, Xuan Li, Avani Wildani, Darrell D. E. Long
:
Paradise: Real-Time, Generalized, and Distributed Provenance-Based Intrusion Detection. 1624-1640 - Menghao Zhang

, Guanyu Li
, Xiao Kong
, Chang Liu, Mingwei Xu
, Guofei Gu
, Jianping Wu:
NetHCF: Filtering Spoofed IP Traffic With Programmable Switches. 1641-1655 - Bin Yuan

, Yuhan Wu, Maogen Yang, Luyi Xing, Xuchang Wang, Deqing Zou
, Hai Jin
:
SmartPatch: Verifying the Authenticity of the Trigger-Event in the IoT Platform. 1656-1674 - Pengfei Xia

, Hongjing Niu
, Ziqiang Li
, Bin Li
:
Enhancing Backdoor Attacks With Multi-Level MMD Regularization. 1675-1686 - Dan Liu, Qian Wang

, Man Zhou
, Peipei Jiang
, Qi Li
, Chao Shen
, Cong Wang
:
SoundID: Securing Mobile Two-Factor Authentication via Acoustic Signals. 1687-1701 - Peipei Jiang

, Qian Wang
, Xiu Lin, Man Zhou
, Wenbing Ding, Cong Wang
, Chao Shen
, Qi Li
:
Securing Liveness Detection for Voice Authentication via Pop Noises. 1702-1718 - Kisung Park

, JoonYoung Lee
, Ashok Kumar Das
, Youngho Park
:
BPPS:Blockchain-Enabled Privacy-Preserving Scheme for Demand-Response Management in Smart Grid Environments. 1719-1729 - Shangyu Xie

, Yan Yan, Yuan Hong
:
Stealthy 3D Poisoning Attack on Video Recognition Models. 1730-1743 - Yongdong Wu

, Jian Weng
, Zhengxia Wang
, Kaimin Wei, Jinming Wen
, Junzuo Lai, Xin Li:
Attacks and Countermeasures on Privacy-Preserving Biometric Authentication Schemes. 1744-1755 - Mingxuan Liu

, Zihan Zhang
, Yiming Zhang, Chao Zhang
, Zhou Li
, Qi Li
, Haixin Duan
, Donghong Sun:
Automatic Generation of Adversarial Readable Chinese Texts. 1756-1770
Volume 20, Number 3, May - June 2023
- Yudan Cheng

, Jianfeng Ma, Zhiquan Liu
, Yongdong Wu, Kaimin Wei, Caiqin Dong
:
A Lightweight Privacy Preservation Scheme With Efficient Reputation Management for Mobile Crowdsensing in Vehicular Networks. 1771-1788 - Yajie Wang

, Kongyang Chen
, Yu-an Tan
, Shuxin Huang, Wencong Ma, Yuanzhang Li
:
Stealthy and Flexible Trojan in Deep Learning Framework. 1789-1798 - Mir Ali Rezazadeh Baee

, Leonie Simpson
, Xavier Boyen, Ernest Foo
, Josef Pieprzyk
:
ALI: Anonymous Lightweight Inter-Vehicle Broadcast Authentication With Encryption. 1799-1817 - Chao Lin

, Xinyi Huang
, Debiao He
:
EBCPA: Efficient Blockchain-Based Conditional Privacy-Preserving Authentication for VANETs. 1818-1832 - Junchang Jing, Zhiyong Zhang

, Kim-Kwang Raymond Choo
, Kefeng Fan, Bin Song, Lili Zhang:
Inference of User Desires to Spread Disinformation Based on Social Situation Analytics and Group Effect. 1833-1848 - Jinmeng Zhou

, Tong Zhang
, Wenbo Shen
, Dongyoon Lee
, Changhee Jung
, Ahmed M. Azab, Ruowen Wang
, Peng Ning, Kui Ren:
Automatic Permission Check Analysis for Linux Kernel. 1849-1866 - Fei Peng

, Wenyan Jiang
, Min Long
, Keqin Li
:
A Reversible Watermarking for 2D Engineering Graphics Based on Difference Expansion With Adaptive Interval Partitioning. 1867-1881 - Chen Chen

, Jingfeng Zhang
, Xilie Xu
, Lingjuan Lyu
, Chaochao Chen
, Tianlei Hu, Gang Chen
:
Decision Boundary-Aware Data Augmentation for Adversarial Training. 1882-1894 - Jakub Breier

, Xiaolu Hou
, Martín Ochoa
, Jesus Solano:
FooBaR: Fault Fooling Backdoor Attack on Neural Network Training. 1895-1908 - Alexander V. Outkin

, Patricia V. Schulz
, Timothy Schulz, Thomas D. Tarman
, Ali Pinar:
Defender Policy Evaluation and Resource Allocation With MITRE ATT&CK Evaluations Data. 1909-1926 - Lokendra Birla

, Puneet Gupta
, Shravan Kumar:
SUNRISE: Improving 3D Mask Face Anti-Spoofing for Short Videos Using Pre-Emptive Split and Merge. 1927-1940 - Jun Zhou

, Nan Wu, Yisong Wang
, Shouzhen Gu
, Zhenfu Cao
, Xiaolei Dong
, Kim-Kwang Raymond Choo
:
A Differentially Private Federated Learning Model Against Poisoning Attacks in Edge Computing. 1941-1958 - Chenggang Wu

, Mengyao Xie
, Zhe Wang
, Yinqian Zhang, Kangjie Lu
, Xiaofeng Zhang, Yuanming Lai
, Yan Kang, Min Yang
, Tao Li
:
Dancing With Wolves: An Intra-Process Isolation Technique With Privileged Hardware. 1959-1978 - Yunguo Guan

, Rongxing Lu
, Yandong Zheng
, Songnian Zhang
, Jun Shao
, Guiyi Wei
:
Achieving Efficient and Privacy-Preserving ($\alpha,\beta$α,β)-Core Query Over Bipartite Graphs in Cloud. 1979-1993 - Waleed A. Yousef

, Issa Traoré
, William Briguglio:
Classifier Calibration: With Application to Threat Scores in Cybersecurity. 1994-2010 - Girraj Kumar Verma

, Prosanta Gope
, Neetesh Saxena
, Neeraj Kumar
:
CB-DA: Lightweight and Escrow-Free Certificate-Based Data Aggregation for Smart Grid. 2011-2024 - Yiling He

, Yiping Li, Lei Wu
, Ziqi Yang, Kui Ren, Zhan Qin
:
MsDroid: Identifying Malicious Snippets for Android Malware Detection. 2025-2039 - Xiaonan Zhang

, Sihan Yu
, Hansong Zhou
, Pei Huang
, Linke Guo
, Ming Li
:
Signal Emulation Attack and Defense for Smart Home IoT. 2040-2057 - Yanli Ren

, Zhuhuan Song
, Shifeng Sun
, Joseph K. Liu
, Guorui Feng
:
Outsourcing LDA-Based Face Recognition to an Untrusted Cloud. 2058-2070 - Yidan Hu

, Xin Yao
, Rui Zhang
, Yanchao Zhang
:
Freshness Authentication for Outsourced Multi-Version Key-Value Stores. 2071-2084 - Puneet Gill

, Werner Dietl, Mahesh Tripunitara
:
Least-Privilege Calls to Amazon Web Services. 2085-2096 - Yunguo Guan

, Rongxing Lu
, Yandong Zheng
, Songnian Zhang
, Jun Shao
, Guiyi Wei
:
Achieving Privacy-Preserving Discrete Fréchet Distance Range Queries. 2097-2110 - Yu Guo

, Chen Zhang
, Cong Wang
, Xiaohua Jia
:
Towards Public Verifiable and Forward-Privacy Encrypted Search by Using Blockchain. 2111-2126 - Xinjun Pei

, Xiaoheng Deng
, Shengwei Tian
, Lan Zhang
, Kaiping Xue
:
A Knowledge Transfer-Based Semi-Supervised Federated Learning for IoT Malware Detection. 2127-2143 - Li Hu

, Jin Li
, Guanbiao Lin
, Shiyu Peng, Zhenxin Zhang, Yingying Zhang, Changyu Dong
:
Defending Against Membership Inference Attacks With High Utility by GAN. 2144-2157 - Yuichi Sei

, J. Andrew Onesimu
, Hiroshi Okumura, Akihiko Ohsuga
:
Privacy-Preserving Collaborative Data Collection and Analysis With Many Missing Values. 2158-2173 - Zahraa Jawad Al Jady

, Mehmet Hakan Karaata
:
Possibility and Impossibility of Propagation Safety and Reliability: A 1-Safe and Reliable Snap-Stabilizing Broadcast Algorithm. 2174-2187 - Yang Su

, Michael Chesser
, Yansong Gao
, Alanson P. Sample
, Damith C. Ranasinghe
:
Wisecr: Secure Simultaneous Code Dissemination to Many Batteryless Computational RFID Devices. 2188-2207 - Ta-Ching Yu, Chin-Hsien Wu

, Yan-Qi Liao:
CRRC: Coordinating Retention Errors, Read Disturb Errors and Huffman Coding on TLC NAND Flash Memory. 2208-2220 - Fei Chen

, Zixing Xiao
, Tao Xiang
, Junfeng Fan, Hong Linh Truong
:
A Full Lifecycle Authentication Scheme for Large-Scale Smart IoT Applications. 2221-2237 - Lihong Tang

, Tingmin Wu
, Xiao Chen
, Sheng Wen
, Li Li
, Xin Xia
, Marthie Grobler
, Yang Xiang
:
How Does Visualisation Help App Practitioners Analyse Android Apps? 2238-2255 - Elvira Albert, Shelly Grossman, Noam Rinetzky, Clara Rodríguez-Núñez

, Albert Rubio, Mooly Sagiv:
Relaxed Effective Callback Freedom: A Parametric Correctness Condition for Sequential Modules With Callbacks. 2256-2273 - Simone Soderi

, Riccardo Colelli
, Federico Turrin
, Federica Pascucci
, Mauro Conti
:
SENECAN: Secure KEy DistributioN OvEr CAN Through Watermarking and Jamming. 2274-2288 - Shang Gao

, Zhe Peng
, Feng Tan, Yuanqing Zheng
, Bin Xiao
:
SymmeProof: Compact Zero-Knowledge Argument for Blockchain Confidential Transactions. 2289-2301 - Runhua Xu

, Chao Li
, James Joshi
:
Blockchain-Based Transparency Framework for Privacy Preserving Third-Party Services. 2302-2313 - Chenhao Lin

, Jingyi He
, Chao Shen
, Qi Li
, Qian Wang
:
CrossBehaAuth: Cross-Scenario Behavioral Biometrics Authentication Using Keystroke Dynamics. 2314-2327 - Zichi Wang

, Guorui Feng
, Liquan Shen
, Xinpeng Zhang
:
Cover Selection for Steganography Using Image Similarity. 2328-2340 - Lan Liu

, Yi Wang
, Gaoyang Liu
, Kai Peng
, Chen Wang
:
Membership Inference Attacks Against Machine Learning Models via Prediction Sensitivity. 2341-2347 - Peng Zhang

, Teng Huang
, Xiaoqiang Sun, Wei Zhao, Hongwei Liu, Shangqi Lai
, Joseph K. Liu
:
Privacy-Preserving and Outsourced Multi-Party K-Means Clustering Based on Multi-Key Fully Homomorphic Encryption. 2348-2359 - Yi Chen

, Zoran Salcic
, Hongxia Wang, Kim-Kwang Raymond Choo
, Xuyun Zhang
:
NACA: A Joint Distortion-Based Non-Additive Cost Assignment Method for Video Steganography. 2360-2374 - Minglin Liu

, Tingting Song, Weiqi Luo
, Peijia Zheng, Jiwu Huang
:
Adversarial Steganography Embedding via Stego Generation and Selection. 2375-2389 - Xiaojie Zhu

, Erman Ayday, Roman Vitenberg
:
A Privacy-Preserving Framework for Conducting Genome-Wide Association Studies Over Outsourced Patient Data. 2390-2405 - Matthew Rogers

, Phillip Weigand, Jassim Happa
, Kasper Rasmussen
:
Detecting CAN Attacks on J1939 and NMEA 2000 Networks. 2406-2420 - Xiaoyi Pang

, Zhibo Wang
, Zeqing He, Peng Sun
, Meng Luo
, Ju Ren
, Kui Ren:
Towards Class-Balanced Privacy Preserving Heterogeneous Model Aggregation. 2421-2432 - Wei Tong

, Yinggang Tong, Chang Xia
, Jingyu Hua
, Qun Li
, Sheng Zhong
:
Understanding Location Privacy of the Point-of-Interest Aggregate Data via Practical Attacks and Defenses. 2433-2449 - Yinhao Xiao, Yizhen Jia, Qin Hu

, Xiuzhen Cheng
, Bei Gong
, Jiguo Yu
:
CommandFence: A Novel Digital-Twin-Based Preventive Framework for Securing Smart Home Systems. 2450-2465 - Tao Jiang

, Xu Yuan
, Yuan Chen, Ke Cheng
, Liangmin Wang
, Xiaofeng Chen
, Jianfeng Ma
:
FuzzyDedup: Secure Fuzzy Deduplication for Cloud Storage. 2466-2483 - Heng Pan

, Zhenyu Li
, Penghao Zhang
, Penglai Cui, Kavé Salamatian
, Gaogang Xie:
Misconfiguration-Free Compositional SDN for Cloud Networks. 2484-2499 - Pietro Tedeschi

, Spiridon Bakiras
, Roberto Di Pietro
:
SpreadMeNot: A Provably Secure and Privacy-Preserving Contact Tracing Protocol. 2500-2515 - Ala Altaweel

, Radu Stoleru
, Guofei Gu
, Arnab Kumar Maity, Suman Bhunia
:
On Detecting Route Hijacking Attack in Opportunistic Mobile Networks. 2516-2532 - Hengzhi Wang

, Yongjian Yang
, En Wang
, Xiulong Liu
, Jingxiao Wei, Jie Wu
:
Bilateral Privacy-Preserving Worker Selection in Spatial Crowdsourcing. 2533-2546 - Mordechai Guri

:
AIR-FI: Leaking Data From Air-Gapped Computers Using Wi-Fi Frequencies. 2547-2564 - Cheng Wang

, Songyao Chai, Hangyu Zhu
, Changjun Jiang
:
CAeSaR: An Online Payment Anti-Fraud Integration System With Decision Explainability. 2565-2577 - Haoyang Wang, Kai Fan

, Hongyan Chen
, Qi Chen, Kuan Zhang, Fenghua Li, Hui Li, Yintang Yang
:
Joint Biological ID : A Secure and Efficient Lightweight Biometric Authentication Scheme. 2578-2592 - Shenghong He

, Ruxin Wang
, Tongliang Liu
, Chao Yi, Xin Jin
, Renyang Liu
, Wei Zhou
:
Type-I Generative Adversarial Attack. 2593-2606 - Yu Liang, Yi Xie

, Shensheng Tang
, Shunzheng Yu
, Xingcheng Liu
, Jiankun Hu
:
Network Traffic Content Identification Based on Time-Scale Signal Modeling. 2607-2624 - Qian Mei

, Minghao Yang, Jinhao Chen
, Lili Wang, Hu Xiong
:
Expressive Data Sharing and Self-Controlled Fine-Grained Data Deletion in Cloud-Assisted IoT. 2625-2640 - Xindi Ma

, Qi Jiang
, Ximeng Liu
, Qingqi Pei
, Jianfeng Ma
, Wenjing Lou
:
Learning in Your "Pocket": Secure Collaborative Deep Learning With Membership Privacy. 2641-2656 - Shunquan Tan

, Qiushi Li
, Laiyuan Li
, Bin Li
, Jiwu Huang
:
STD-NET: Search of Image Steganalytic Deep-Learning Architecture via Hierarchical Tensor Decomposition. 2657-2673
Volume 20, Number 4, July - August 2023
- Zheng Zheng

, Lorenzo Strigini, Nuno Antunes
, Kishor S. Trivedi
:
Editorial: Software Reliability and Dependability Engineering. 2674-2676 - Niranjhana Narayanan

, Zitao Chen
, Bo Fang, Guanpeng Li, Karthik Pattabiraman
, Nathan DeBardeleben
:
Fault Injection for TensorFlow Applications. 2677-2695 - Xiaoting Du

, Yulei Sui, Zhihao Liu
, Jun Ai
:
An Empirical Study of Fault Triggers in Deep Learning Frameworks. 2696-2712 - Xiao-Yi Zhang

, Paolo Arcaini
, Fuyuki Ishikawa
:
An Incremental Approach for Understanding Collision Avoidance of an Industrial Path Planner. 2713-2730 - Andrea Ceccarelli

, Francesco Secci:
RGB Cameras Failures and Their Effects in Autonomous Driving Applications. 2731-2745 - Guoping Rong

, Hao Wang, Shenghui Gu
, Yangchen Xu, Jialin Sun, Dong Shao, He Zhang
:
Locating Anomaly Clues for Atypical Anomalous Services: An Industrial Exploration. 2746-2761 - Xiaoyun Li

, Pengfei Chen
, Linxiao Jing, Zilong He
, Guangba Yu
:
SwissLog: Robust Anomaly Detection and Localization for Interleaved Unstructured Logs. 2762-2780 - Jian Shi

, Deqing Zou
, Shouhuai Xu
, Xianjun Deng
, Hai Jin
:
Does OpenBSD and Firefox's Security Improve With Time? 2781-2793 - Khashayar Etemadi

, Nicolas Harrand
, Simon Larsén
, Haris Adzemovic
, Henry Luong Phu, Ashutosh Verma, Fernanda Madeiral
, Douglas Wikström, Martin Monperrus
:
Sorald: Automatic Patch Suggestions for SonarQube Static Analysis Violations. 2794-2810 - Jing Bai

, Xiaolin Chang
, Fumio Machida
, Lili Jiang
, Zhen Han
, Kishor S. Trivedi
:
Impact of Service Function Aging on the Dependability for MEC Service Function Chain. 2811-2824 - Hongfang Shi

, Wenying Zhang
, Zimin Zhang
, Dewen Ding:
Vulnerability Analysis of Chinese Digital Passwords Related to ATM PIN Using Deep Learning. 2825-2835 - Keyu Ji

, Bingsheng Zhang
, Tianpei Lu
, Lichun Li, Kui Ren
:
UC Secure Private Branching Program and Decision Tree Evaluation. 2836-2848 - Meng Li

, Yifei Chen
, Chhagan Lal
, Mauro Conti
, Fabio Martinelli, Mamoun Alazab
:
Nereus: Anonymous and Secure Ride-Hailing Service Based on Private Smart Contracts. 2849-2866 - Kaidi Jin

, Tianwei Zhang
, Chao Shen
, Yufei Chen
, Ming Fan
, Chenhao Lin
, Ting Liu
:
Can We Mitigate Backdoor Attack Using Adversarial Detection Methods? 2867-2881 - Xin Chen

, Liang Feng Zhang
, Jing Liu
:
Verifiable Homomorphic Secret Sharing for Low Degree Polynomials. 2882-2895 - Jie Wang

, Xuemei Yin, Yifang Chen
, Jiwu Huang
, Xiangui Kang
:
An Adaptive IPM-Based HEVC Video Steganography via Minimizing Non-Additive Distortion. 2896-2912 - Weiwei Li, Mi Wen

, Zhou Su
, Kuan Zhang
:
Collusion Detection and Trust Management for Indoor Navigation System With Crowdsourcing. 2913-2924 - Kunli Lin

, Wenqing Liu, Kun Zhang
, Bibo Tu
:
HyperPS: A Virtual-Machine Memory Protection Approach Through Hypervisor's Privilege Separation. 2925-2938 - Tianxi Ji

, Erman Ayday, Emre Yilmaz
, Pan Li
:
Towards Robust Fingerprinting of Relational Databases by Mitigating Correlation Attacks. 2939-2953 - Boyu Kuang

, Anmin Fu
, Yansong Gao
, Yuqing Zhang
, Jianying Zhou, Robert H. Deng
:
FeSA: Automatic Federated Swarm Attestation on Dynamic Large-Scale IoT Devices. 2954-2969 - Chengzhe Lai

, Yixiao Ma, Rongxing Lu
, Yinghui Zhang
, Dong Zheng
:
A Novel Authentication Scheme Supporting Multiple User Access for 5G and Beyond. 2970-2987 - Jie Cui

, Bei Li
, Hong Zhong
, Yan Xu
, Lu Liu
:
Achieving Revocable Attribute Group-Based Encryption for Mobile Cloud Data: A Multi-Proxy Assisted Approach. 2988-3001 - Meng Li

, Yifei Chen, Liehuang Zhu
, Zijian Zhang
, Jianbing Ni
, Chhagan Lal
, Mauro Conti
:
Astraea: Anonymous and Secure Auditing Based on Private Smart Contracts for Donation Systems. 3002-3018 - Mengfei Xie

, Yan Lin
, Chenke Luo
, Guojun Peng
, Jianming Fu
:
PointerScope: Understanding Pointer Patching for Code Randomization. 3019-3036 - Yunji Liang

, Yuchen Qin, Qi Li
, Xiaokai Yan, Luwen Huangfu
, Sagar Samtani
, Bin Guo
, Zhiwen Yu
:
An Escalated Eavesdropping Attack on Mobile Devices via Low-Resolution Vibration Signals. 3037-3050 - Jun Li

, Devkishen Sisodia
, Shad Stafford
:
On the Detection of Smart, Self-Propagating Internet Worms. 3051-3063 - Yong Xie

, Gang Zeng
, Ryo Kurachi
, Fu Xiao
, Hiroaki Takada
, Shiyan Hu
:
Timing Analysis of CAN FD for Security-Aware Automotive Cyber-Physical Systems. 3064-3078 - Yifeng Zheng

, Cong Wang
, Ruochen Wang, Huayi Duan
, Surya Nepal
:
Optimizing Secure Decision Tree Inference Outsourcing. 3079-3092 - Devon Callahan, Timothy Curry

, Hazel Davidson, Heytem Zitoun
, Benjamin Fuller
, Laurent Michel
:
FASHION: Functional and Attack Graph Secured HybrId Optimization of Virtualized Networks. 3093-3109 - Keerthi Nelaturu

, Anastasia Mavridou, Emmanouela Stachtiari, Andreas G. Veneris, Aron Laszka
:
Correct-by-Design Interacting Smart Contracts and a Systematic Approach for Verifying ERC20 and ERC721 Contracts With VeriSolid. 3110-3127 - Federico Concone

, Giuseppe Lo Re
, Marco Morana
, Sajal K. Das
:
SpADe: Multi-Stage Spam Account Detection for Online Social Networks. 3128-3143 - Ming Gao

, Yajie Liu
, Yike Chen
, Yimin Li, Zhongjie Ba
, Xian Xu, Jinsong Han
, Kui Ren
:
Device-Independent Smartphone Eavesdropping Jointly Using Accelerometer and Gyroscope. 3144-3157 - Florian Skopik

, Markus Wurzenberger
, Georg Höld
, Max Landauer
, Walter Kuhn
:
Behavior-Based Anomaly Detection in Log Data of Physical Access Control Systems. 3158-3175 - Victor Youdom Kemmoe

, Yongseok Kwon
, Rasheed Hussain
, Sunghyun Cho
, Junggab Son
:
Leveraging Smart Contracts for Secure and Asynchronous Group Key Exchange Without Trusted Third Party. 3176-3193 - Zhuo Ma

, Yang Liu
, Ximeng Liu
, Jian Liu, Jianfeng Ma
, Kui Ren:
Learn to Forget: Machine Unlearning via Neuron Masking. 3194-3207 - Zeyu Mi

, Zhi Guo, Fuqian Huang, Haibo Chen
:
Hawkeye: Eliminating Kernel Address Leakage in Normal Data Flows. 3208-3221 - Guoxing Chen

, Yinqian Zhang:
Securing TEEs With Verifiable Execution Contracts. 3222-3237 - Zuobin Xiong

, Zhipeng Cai
, Chunqiang Hu, Daniel Takabi
, Wei Li
:
Towards Neural Network-Based Communication System: Attack and Defense. 3238-3250 - Hojoon Lee

, Chihyun Song, Brent ByungHoon Kang:
Harnessing the x86 Intermediate Rings for Intra-Process Isolation. 3251-3268 - Servio Palacios

, Aaron Ault, James V. Krogmeier
, Bharat K. Bhargava
, Christopher G. Brinton
:
AGAPECert: An Auditable, Generalized, Automated, Privacy-Enabling Certification Framework With Oblivious Smart Contracts. 3269-3286 - Lin Yao

, Zhaolong Zheng, Xin Wang
, Yujie Zeng, Guowei Wu
:
Detection of Cache Pollution Attack Based on Ensemble Learning in ICN-Based VANET. 3287-3298 - Yue Zheng

, Wenye Liu
, Chongyan Gu
, Chip-Hong Chang
:
PUF-Based Mutual Authentication and Key Exchange Protocol for Peer-to-Peer IoT Applications. 3299-3316 - Lisandro Arturo Jimenez-Roa

, Tom Heskes
, Tiedo Tinga
, Mariëlle Stoelinga
:
Automatic Inference of Fault Tree Models Via Multi-Objective Evolutionary Algorithms. 3317-3327 - Zhibo Wang

, Yuting Huang
, Mengkai Song
, Libing Wu, Feng Xue, Kui Ren:
Poisoning-Assisted Property Inference Attack Against Federated Learning. 3328-3340 - Yanjun Zhang

, Guangdong Bai
, Xue Li
, Surya Nepal
, Marthie Grobler
, Chen Chen
, Ryan K. L. Ko
:
Preserving Privacy for Distributed Genome-Wide Analysis Against Identity Tracing Attacks. 3341-3357 - Xiangyu Wang

, Jianfeng Ma
, Ximeng Liu
, Yinbin Miao
, Yang Liu
, Robert H. Deng
:
Forward/Backward and Content Private DSSE for Spatial Keyword Queries. 3358-3370 - Zhiyuan Lin, Mahesh Tripunitara

:
A Comparison of Four Notions of Isomorphism-Based Security for Graphs. 3371-3377 - Rajib Ranjan Maiti

, Cheah Huei Yoong
, Venkata Reddy Palleti, Arlindo Silva
, Christopher M. Poskitt
:
Mitigating Adversarial Attacks on Data-Driven Invariant Checkers for Cyber-Physical Systems. 3378-3391 - Yi Ding

, Fuyuan Tan
, Ji Geng, Zhen Qin
, Mingsheng Cao
, Kim-Kwang Raymond Choo
, Zhiguang Qin
:
Interpreting Universal Adversarial Example Attacks on Image Classification Models. 3392-3407 - Jie Chen

, Xiaonan Hu, Dongyi Yi, Mamoun Alazab
, Jianqiang Li
:
A Variational AutoEncoder-Based Relational Model for Cost-Effective Automatic Medical Fraud Detection. 3408-3420 - Sean W. Caldwell, Ye Zhu

, Yong Guan
, Riccardo Bettati
:
On Account Association With Assistance From Mobile Networks. 3421-3433 - Suyoung Lee

, Wonho Song
, Suman Jana, Meeyoung Cha
, Sooel Son
:
Evaluating the Robustness of Trigger Set-Based Watermarks Embedded in Deep Neural Networks. 3434-3448 - Zhiwei Xu

, Xin Wang
, Yujun Zhang
:
Towards Persistent Detection of DDoS Attacks in NDN: A Sketch-Based Approach. 3449-3465 - Max Landauer

, Florian Skopik
, Maximilian Frank, Wolfgang Hotwagner
, Markus Wurzenberger
, Andreas Rauber:
Maintainable Log Datasets for Evaluation of Intrusion Detection Systems. 3466-3482 - Heng Ye

, Qiang Zeng
, Jiqiang Liu
, Xiaojiang Du, Wei Wang
:
Easy Peasy: A New Handy Method for Pairing Multiple COTS IoT Devices. 3483-3494 - Maribel Fernández

, Jenjira Jaimunk
, Bhavani Thuraisingham:
A Privacy-Preserving Architecture and Data-Sharing Model for Cloud-IoT Applications. 3495-3507 - Yuan-Yu Tsai

, Hong-Lin Liu:
Integrating Coordinate Transformation and Random Sampling Into High-Capacity Reversible Data Hiding in Encrypted Polygonal Models. 3508-3519 - João R. Campos

, Ernesto Costa
, Marco Vieira
:
Online Failure Prediction for Complex Systems: Methodology and Case Studies. 3520-3534 - Linyan Bai, Ching-Fang Hsu

, Lein Harn
, Jianqun Cui
, Zhuo Zhao
:
A Practical Lightweight Anonymous Authentication and Key Establishment Scheme for Resource-Asymmetric Smart Environments. 3535-3545 - Wenbing Zhao

:
On Nxt Proof of Stake Algorithm: A Simulation Study. 3546-3557
Volume 20, Number 5, September - October 2023
- Roberto De Prisco

, Alfredo De Santis
, Francesco Palmieri
:
Improved Protocols for Distributed Secret Sharing. 3558-3571 - Ming Zhang

, Zhe Sun
, Hui Li, Ben Niu, Fenghua Li, Zixu Zhang
, Yuhang Xie, Chunhao Zheng:
Go-Sharing: A Blockchain-Based Privacy-Preserving Framework for Cross-Social Network Photo Sharing. 3572-3587 - Shunbin Li

, Zhiyu Wang
, Ruyun Zhang
, Chunming Wu
, Hanguang Luo:
Mangling Rules Generation With Density-Based Clustering for Password Guessing. 3588-3600 - Yong Wang

, Aiqing Zhang
, Shu Wu, Shui Yu
:
VOSA: Verifiable and Oblivious Secure Aggregation for Privacy-Preserving Federated Learning. 3601-3616 - Di Lu

, Minqiang Shi
, Xindi Ma
, Ximeng Liu
, Rui Guo, Tianfang Zheng, Yulong Shen
, Xuewen Dong
, Jianfeng Ma
:
Smaug: A TEE-Assisted Secured SQLite for Embedded Systems. 3617-3635 - Shahnewaz Karim Sakib

, George T. Amariucai
, Yong Guan
:
ZeroProKeS: A Secure Zeroconf Key Establishment Protocol for Large-Scale Low-Cost Applications. 3636-3652 - Pengyu Qiu

, Xuhong Zhang, Shouling Ji
, Tianyu Du
, Yuwen Pu, Jun Zhou, Ting Wang
:
Your Labels are Selling You Out: Relation Leaks in Vertical Federated Learning. 3653-3668 - Zhongyun Hua

, Yanxiang Wang, Shuang Yi
, Yifeng Zheng
, Xingyu Liu
, Yongyong Chen
, Xinpeng Zhang
:
Matrix-Based Secret Sharing for Reversible Data Hiding in Encrypted Images. 3669-3686 - Mahendra Rathor

, Anirban Sengupta
, Rahul Chaurasia
, Aditya Anshul
:
Exploring Handwritten Signature Image Features for Hardware Security. 3687-3698 - Xinyu Li

, Jing Xu
, Lingyuan Yin
, Yuan Lu
, Qiang Tang
, Zhenfeng Zhang:
Escaping From Consensus: Instantly Redactable Blockchain Protocols in Permissionless Setting. 3699-3715 - Zhi Zhang

, Wei He
, Yueqiang Cheng, Wenhao Wang
, Yansong Gao
, Dongxi Liu, Kang Li
, Surya Nepal
, Anmin Fu
, Yi Zou
:
Implicit Hammer: Cross-Privilege-Boundary Rowhammer Through Implicit Accesses. 3716-3733 - Gargi Mitra

, Prasanna Karthik Vairam, Sandip Saha, Nitin Chandrachoodan
, V. Kamakoti
:
Snoopy: A Webpage Fingerprinting Framework With Finite Query Model for Mass-Surveillance. 3734-3752 - Giovanni Apruzzese

, V. S. Subrahmanian
:
Mitigating Adversarial Gray-Box Attacks Against Phishing Detectors. 3753-3769 - Songnian Zhang

, Suprio Ray
, Rongxing Lu
, Yunguo Guan
, Yandong Zheng
, Jun Shao
:
Efficient and Privacy-Preserving Spatial Keyword Similarity Query Over Encrypted Data. 3770-3786 - Kejiang Chen

, Hang Zhou
, Yaofei Wang
, Menghan Li, Weiming Zhang
, Nenghai Yu
:
Cover Reproducible Steganography via Deep Generative Models. 3787-3798 - Hongyang Yan, Shuhao Li

, Yajie Wang
, Yaoyuan Zhang, Kashif Sharif
, Haibo Hu
, Yuanzhang Li
:
Membership Inference Attacks Against Deep Learning Models via Logits Distribution. 3799-3808 - Yibing Liu

, Lijun Huo
, Jun Wu
, Mohsen Guizani
:
MRSA: Mask Random Array Protocol for Efficient Secure Handover Authentication in 5G HetNets. 3809-3827 - Sani M. Abdullahi

, Ke Lv
, Shuifa Sun
, Hongxia Wang:
Cancelable Fingerprint Template Construction Using Vector Permutation and Shift-Ordering. 3828-3844 - Alán Rodrigo Díaz Rizo

, Hassan Aboushady
, Haralampos-G. Stratigopoulos
:
Leaking Wireless ICs via Hardware Trojan-Infected Synchronization. 3845-3859 - Hyunsoo Kwon

, Sangtae Lee, Minjae Kim
, Changhee Hahn
, Junbeom Hur
:
Certificate Transparency With Enhanced Privacy. 3860-3872 - Haining Yang

, Dengguo Feng, Jing Qin
:
Efficient Verifiable Unbounded-Size Database From Authenticated Matrix Commitment. 3873-3889 - Zhaoteng Yan

, Zhi Li
, Hong Li
, Shouguo Yang, Hongsong Zhu
, Limin Sun:
Internet-Scale Fingerprinting the Reusing and Rebranding IoT Devices in the Cyberspace. 3890-3909 - Mengmeng Yang

, Ivan Tjuawinata
, Kwok-Yan Lam
, Tianqing Zhu
, Jun Zhao
:
Differentially Private Distributed Frequency Estimation. 3910-3926 - Fang Liu

, Xingyuan Zhao
:
Disclosure Risk From Homogeneity Attack in Differentially Privately Sanitized Frequency Distribution. 3927-3939 - Hong-Yen Tran

, Jiankun Hu
, Hemanshu R. Pota
:
A Privacy-Preserving State Estimation Scheme for Smart Grids. 3940-3956 - Khandakar Ashrafi Akbar

, Yigong Wang
, Gbadebo Ayoade, Yang Gao
, Anoop Singhal
, Latifur Khan
, Bhavani Thuraisingham, Kangkook Jee:
Advanced Persistent Threat Detection Using Data Provenance and Metric Learning. 3957-3969 - Guangke Chen

, Zhe Zhao
, Fu Song
, Sen Chen
, Lingling Fan
, Feng Wang, Jiashui Wang:
Towards Understanding and Mitigating Audio Adversarial Examples for Speaker Recognition. 3970-3987 - Mingwu Zhang

, Yu Chen
, Willy Susilo
:
Decision Tree Evaluation on Sensitive Datasets for Secure e-Healthcare Systems. 3988-4001 - Vahid Pourahmadi

, Hyame Assem Alameddine
, Mohammad Ali Salahuddin
, Raouf Boutaba
:
Spotting Anomalies at the Edge: Outlier Exposure-Based Cross-Silo Federated Learning for DDoS Detection. 4002-4015 - Zhaopin Su

, Mengke Li
, Guofu Zhang
, Qinfang Wu, Miqing Li
, Weiming Zhang
, Xin Yao
:
Robust Audio Copy-Move Forgery Detection Using Constant Q Spectral Sketches and GA-SVM. 4016-4031 - Safwa Ameer

, James O. Benson
, Ravi S. Sandhu
:
Hybrid Approaches (ABAC and RBAC) Toward Secure Access Control in Smart Home IoT. 4032-4051 - Dan Liu, Zheng Yan

, Wenxiu Ding
, Yuxuan Cai, Yaxing Chen, Zhiguo Wan
:
ESMAC: Efficient and Secure Multi-Owner Access Control With TEE in Multi-Level Data Processing. 4052-4069 - Zhen Liu

, Changzhen Hu, Chun Shan
, Zheng Yan
:
ADCaDeM: A Novel Method of Calculating Attack Damage Based on Differential Manifolds. 4070-4084 - Haozhi Li

, Tian Song
, Yating Yang
:
Generic and Sensitive Anomaly Detection of Network Covert Timing Channels. 4085-4100 - Pengfei Wu

, Jianting Ning
, Xinyi Huang
, Joseph K. Liu
:
Differentially Oblivious Two-Party Pattern Matching With Sublinear Round Complexity. 4101-4117 - Zhili Zhou

, Yuecheng Su, Jin Li
, Keping Yu
, Q. M. Jonathan Wu
, Zhangjie Fu
, Yunqing Shi:
Secret-to-Image Reversible Transformation for Generative Steganography. 4118-4134 - Ardavan Bozorgi

, Alireza Bahramali, Fatemeh Rezaei, Amirhossein Ghafari, Amir Houmansadr
, Ramin Soltani, Dennis Goeckel
, Don Towsley
:
I Still Know What You Did Last Summer: Inferring Sensitive User Activities on Messaging Applications Through Traffic Analysis. 4135-4153 - Jianyu Niu

, Fangyu Gai, Runchao Han
, Ren Zhang
, Yinqian Zhang, Chen Feng
:
Crystal: Enhancing Blockchain Mining Transparency With Quorum Certificate. 4154-4168 - Milan Lopuhaä-Zwakenberg

, Carlos E. Budde
, Mariëlle Stoelinga
:
Efficient and Generic Algorithms for Quantitative Attack Tree Analysis. 4169-4187 - Yanjiao Chen

, Zhicong Zheng
, Xueluan Gong
:
MARNet: Backdoor Attacks Against Cooperative Multi-Agent Reinforcement Learning. 4188-4198 - Shuying Xu, Ji-Hwei Horng, Ching-Chun Chang, Chin-Chen Chang:

Reversible Data Hiding With Hierarchical Block Variable Length Coding for Cloud Security. 4199-4213 - Yang Xiao

, Zhuolin Xing, Alex X. Liu
, Lei Bai
, Qingqi Pei
, Lina Yao
:
Cure-GNN: A Robust Curvature-Enhanced Graph Neural Network Against Adversarial Attacks. 4214-4229 - Zan Zhou

, Changqiao Xu
, Ming-Ze Wang, Xiaohui Kuang, Yirong Zhuang, Shui Yu
:
A Multi-Shuffler Framework to Establish Mutual Confidence for Secure Federated Learning. 4230-4244 - Chuan Zhang

, Chenfei Hu
, Tong Wu
, Liehuang Zhu
, Ximeng Liu
:
Achieving Efficient and Privacy-Preserving Neural Network Training and Prediction in Cloud Environments. 4245-4257 - Min Wang

, Song Wang
, Jiankun Hu
:
PolyCosGraph: A Privacy-Preserving Cancelable EEG Biometric System. 4258-4272 - Soumya Purohit, Roshan Neupane, Naga Ramya Bhamidipati, Varsha Vakkavanthula, Songjie Wang

, Matthew Rockey, Prasad Calyam
:
Cyber Threat Intelligence Sharing for Co-Operative Defense in Multi-Domain Entities. 4273-4290 - Haonan Feng, Jingjing Guan

, Hui Li
, Xuesong Pan, Ziming Zhao
:
FIDO Gets Verified: A Formal Analysis of the Universal Authentication Framework Protocol. 4291-4310 - Haomeng Xie, Shufan Fei

, Zheng Yan
, Yang Xiao
:
SofitMix: A Secure Offchain-Supported Bitcoin-Compatible Mixing Protocol. 4311-4324 - Lei Zhou

, Anmin Fu
, Guomin Yang
, Yansong Gao
, Shui Yu
, Robert H. Deng
:
Fair Cloud Auditing Based on Blockchain for Resource-Constrained IoT Devices. 4325-4342 - Yuefeng Du

, Huayi Duan
, Lei Xu
, Helei Cui
, Cong Wang
, Qian Wang
:
${{\sf PEBA}}$: Enhancing User Privacy and Coverage of Safe Browsing Services. 4343-4358 - Qin Liu

, Yu Peng
, Hongbo Jiang
, Jie Wu
, Tian Wang
, Tao Peng
, Guojun Wang
:
SlimBox: Lightweight Packet Inspection over Encrypted Traffic. 4359-4371 - Xiaoyu Qiu

, Wuhui Chen
, Bingxin Tang
, Junyuan Liang
, Hong-Ning Dai
, Zibin Zheng
:
A Distributed and Privacy-Aware High-Throughput Transaction Scheduling Approach for Scaling Blockchain. 4372-4386 - Yandong Zheng

, Rongxing Lu
, Songnian Zhang
, Yunguo Guan
, Fengwei Wang
, Jun Shao
, Hui Zhu
:
PRkNN: Efficient and Privacy-Preserving Reverse kNN Query Over Encrypted Data. 4387-4402 - Fulvio Valenza

, Erisa Karafili
, Rodrigo Vieira Steiner, Emil C. Lupu
:
A Hybrid Threat Model for Smart Systems. 4403-4417 - Guowen Xu

, Xingshuo Han
, Shengmin Xu
, Tianwei Zhang
, Hongwei Li
, Xinyi Huang
, Robert H. Deng
:
Hercules: Boosting the Performance of Privacy-Preserving Federated Learning. 4418-4433 - Sergio Galán

, Pedro Reviriego
, Stefan Walzer
, Alfonso Sánchez-Macián
, Shanshan Liu
, Fabrizio Lombardi
:
On the Privacy of Counting Bloom Filters Under a Black-Box Attacker. 4434-4440 - Zhichao Yang

, Debiao He
, Longjiang Qu
, Jianqiao Xu
:
On the Security of a Lattice-Based Multi-Stage Secret Sharing Scheme. 4441-4442
Volume 20, Number 6, November - December 2023
- Hongwei Shi

, Shengling Wang
, Qin Hu, Xiuzhen Cheng
:
Black Swan in Blockchain: Micro Analysis of Natural Forking. 4443-4454 - Yansong Gao

, Yang Su
, Surya Nepal
, Damith C. Ranasinghe
:
NoisFre: Noise-Tolerant Memory Fingerprints from Commodity Devices for Security Functions. 4455-4473 - Daniel Karapetyan

, Gregory Z. Gutin
:
Solving the Workflow Satisfiability Problem Using General Purpose Solvers. 4474-4485 - Reo Eriguchi

, Atsunori Ichikawa, Noboru Kunihiro
, Koji Nuida
:
Efficient Noise Generation Protocols for Differentially Private Multiparty Computation. 4486-4501 - Yue Sun

, Zhi Li
, Shichao Lv
, Limin Sun:
Spenny: Extensive ICS Protocol Reverse Analysis via Field Guided Symbolic Execution. 4502-4518 - Kaimeng Chen

, Qingxiao Guan
, Weiming Zhang
, Nenghai Yu
:
Reversible Data Hiding in Encrypted Images Based on Binary Symmetric Channel Model and Polar Code. 4519-4535 - Chao Lin

, Xinyi Huang
, Jianting Ning
, Debiao He
:
ACA: Anonymous, Confidential and Auditable Transaction Systems for Blockchain. 4536-4550 - Xiangrui Xu

, Pengrui Liu, Wei Wang
, Hongliang Ma, Bin Wang
, Zhen Han
, Yufei Han:
CGIR: Conditional Generative Instance Reconstruction Attacks Against Federated Learning. 4551-4563 - Guojun Chu

, Jingyu Wang
, Qi Qi
, Haifeng Sun
, Shimin Tao, Hao Yang
, Jianxin Liao
, Zhu Han
:
Exploiting Spatial-Temporal Behavior Patterns for Fraud Detection in Telecom Networks. 4564-4577 - Lingling Lu

, Zhenyu Wen
, Ye Yuan
, Binru Dai, Peng Qian
, Changting Lin, Qinming He, Zhenguang Liu
, Jianhai Chen, Rajiv Ranjan:
iQuery: A Trustworthy and Scalable Blockchain Analytics Platform. 4578-4592 - Wenting Shen

, Jia Yu
, Ming Yang
, Jiankun Hu
:
Efficient Identity-Based Data Integrity Auditing With Key-Exposure Resistance for Cloud Storage. 4593-4606 - Yehua Wei

, Can Cheng
, Guoqi Xie
:
OFIDS : Online Learning-Enabled and Fingerprint-Based Intrusion Detection System in Controller Area Networks. 4607-4620 - Kai Zhang

, Xiwen Wang
, Jianting Ning
, Mi Wen
, Rongxing Lu
:
Multi-Client Boolean File Retrieval With Adaptable Authorization Switching for Secure Cloud Search Services. 4621-4636 - Kai Lehniger

, Peter Langendörfer
:
Window Canaries: Re-Thinking Stack Canaries for Architectures With Register Windows. 4637-4647 - Jiajie Zhang

, Bingsheng Zhang
, Andrii Nastenko
, Hamed Balogun
, Roman Oliynykov:
Privacy-Preserving Decision-Making Over Blockchain. 4648-4663 - Prashanth Krishnamurthy

, Virinchi Roy Surabhi
, Hammond Pearce
, Ramesh Karri
, Farshad Khorrami
:
Multi-Modal Side Channel Data Driven Golden-Free Detection of Software and Firmware Trojans. 4664-4677 - Anli Yan

, Hongyang Yan
, Li Hu
, Xiaozhang Liu
, Teng Huang
:
Holistic Implicit Factor Evaluation of Model Extraction Attacks. 4678-4689 - Yaru Liu

, Hongcheng Li
, Gang Huang
, Wei Hua
:
OPUPO: Defending Against Membership Inference Attacks With Order-Preserving and Utility-Preserving Obfuscation. 4690-4701 - Mingze He

, Hongxia Wang, Fei Zhang
, Sani M. Abdullahi
, Ling Yang
:
Robust Blind Video Watermarking Against Geometric Deformations and Online Video Sharing Platform Processing. 4702-4718 - Jinglei Tan

, Hui Jin, Hao Hu
, Ruiqin Hu, Hongqi Zhang, Hengwei Zhang
:
WF-MTD: Evolutionary Decision Method for Moving Target Defense Based on Wright-Fisher Process. 4719-4732 - Marta Bellés-Muñoz

, Miguel Isabel
, Jose Luis Muñoz-Tapia
, Albert Rubio, Jordi Baylina Melé:
Circom: A Circuit Description Language for Building Zero-Knowledge Applications. 4733-4751 - Wei Guo

, Benedetta Tondi
, Mauro Barni
:
A Temporal Chrominance Trigger for Clean-Label Backdoor Attack Against Anti-Spoof Rebroadcast Detection. 4752-4762 - Yicheng Pan

, Meng Ma
, Xinrui Jiang, Ping Wang
:
DyCause: Crowdsourcing to Diagnose Microservice Kernel Failure. 4763-4777 - Pinchang Zhang

, Yulin Teng
, Yulong Shen
, Xiaohong Jiang
, Fu Xiao
:
Tag-Based PHY-Layer Authentication for RIS-Assisted Communication Systems. 4778-4792 - Florian Klaus Kaiser, Uriel Dardik, Aviad Elitzur, Polina Zilberman

, Nir Daniel
, Marcus Wiens, Frank Schultmann
, Yuval Elovici
, Rami Puzis
:
Attack Hypotheses Generation Based on Threat Intelligence Knowledge Graph. 4793-4809 - Zhuo Ma

, Xinjing Liu
, Yang Liu
, Ximeng Liu
, Zhan Qin
, Kui Ren:
DivTheft: An Ensemble Model Stealing Attack by Divide-and-Conquer. 4810-4822 - Yipeng Zhou

, Xuezheng Liu
, Yao Fu, Di Wu
, Jessie Hui Wang
, Shui Yu
:
Optimizing the Numbers of Queries and Replies in Convex Federated Learning With Differential Privacy. 4823-4837 - Chuan Ma

, Jun Li
, Ming Ding
, Bo Liu
, Kang Wei
, Jian Weng
, H. Vincent Poor
:
RDP-GAN: A Rényi-Differential Privacy Based Generative Adversarial Network. 4838-4852 - Ganapathy Mani

, Marina Haliem
, Bharat K. Bhargava
, Indu Manickam, Kevin Kochpatcharin, Myeongsu Kim
, Eric D. Vugrin
, Weichao Wang
, Chris Jenkins, Pelin Angin
, Meng Yu
:
Machine Learning Based Resilience Testing of an Address Randomization Cyber Defense. 4853-4867 - Anand Agrawal

, Urbi Chatterjee, Rajib Ranjan Maiti:
CheckShake: Passively Detecting Anomaly in Wi-Fi Security Handshake Using Gradient Boosting Based Ensemble Learning. 4868-4880 - Siwon Huh

, Myungkyu Shim, Jihwan Lee, Simon S. Woo, Hyoungshick Kim
, Hojoon Lee
:
DID We Miss Anything?: Towards Privacy-Preserving Decentralized ID Architecture. 4881-4898 - Enrico Russo

, Gabriele Costa
, Giacomo Longo
, Alessandro Armando, Alessio Merlo
:
LiDiTE: A Full-Fledged and Featherweight Digital Twin Framework. 4899-4912 - Tao Zhang

, Changqiao Xu
, Bingchi Zhang, Xinran Li
, Xiaohui Kuang, Luigi Alfredo Grieco
:
Towards Attack-Resistant Service Function Chain Migration: A Model-Based Adaptive Proximal Policy Optimization Approach. 4913-4927 - Mingyang Song

, Zhongyun Hua
, Yifeng Zheng
, Hejiao Huang
, Xiaohua Jia
:
Blockchain-Based Deduplication and Integrity Auditing Over Encrypted Cloud Storage. 4928-4945 - Sanoop Mallissery

, Kun-Yi Chiang
, Chun-An Bau
, Yu-Sung Wu
:
Pervasive Micro Information Flow Tracking. 4957-4975 - Ping Wang

, Haichang Gao
, Chenxuan Xiao, Xiaoyan Guo
, Yipeng Gao, Yang Zi
:
Extended Research on the Security of Visual Reasoning CAPTCHA. 4976-4992 - Xueluan Gong

, Ziyao Wang, Yanjiao Chen
, Meng Xue
, Qian Wang
, Chao Shen
:
Kaleidoscope: Physical Backdoor Attacks Against Deep Neural Networks With RGB Filters. 4993-5004 - Xiangyun Tang

, Meng Shen
, Qi Li
, Liehuang Zhu
, Tengfei Xue, Qiang Qu
:
PILE: Robust Privacy-Preserving Federated Learning Via Verifiable Perturbations. 5005-5023 - Zhonghui Ge

, Yi Zhang, Yu Long
, Dawu Gu
:
Magma: Robust and Flexible Multi-Party Payment Channel. 5024-5042 - Mingyan Xiao

, Ming Li
, Jie Jennifer Zhang
:
Locally Differentially Private Personal Data Markets Using Contextual Dynamic Pricing Mechanism. 5043-5055 - Hui Zhang

, Xuejun Li
, Syh-Yuan Tan
, Ming Jie Lee
, Zhe Jin
:
Privacy-Preserving Biometric Authentication: Cryptanalysis and Countermeasures. 5056-5069 - Yahya Javed

, Mosab A. Khayat
, Ali A. Elghariani
, Arif Ghafoor
:
PRISM: A Hierarchical Intrusion Detection Architecture for Large-Scale Cyber Networks. 5070-5086 - Zhuoran Ma

, Jianfeng Ma
, Yinbin Miao
, Ximeng Liu
, Wei Zheng
, Kim-Kwang Raymond Choo
, Robert H. Deng
:
VerifyTL: Secure and Verifiable Collaborative Transfer Learning. 5087-5101 - Minxin Du

, Peipei Jiang
, Qian Wang
, Sherman S. M. Chow
, Lingchen Zhao
:
Shielding Graph for eXact Analytics With SGX. 5102-5112 - Xi Lin

, Jun Wu
, Jianhua Li, Chao Sang
, Shiyan Hu
, M. Jamal Deen
:
Heterogeneous Differential-Private Federated Learning: Trading Privacy for Utility Truthfully. 5113-5129 - Lili Wang

, Ye Lin, Ting Yao
, Hu Xiong
, Kaitai Liang
:
FABRIC: Fast and Secure Unbounded Cross-System Encrypted Data Sharing in Cloud Computing. 5130-5142 - Wen Cheng, Dazou Sang, Lingfang Zeng

, Yang Wang
, André Brinkmann:
Tianji: Securing a Practical Asynchronous Multi-User ORAM. 5143-5155 - Sebastian Zillien

, Steffen Wendzel
:
Weaknesses of Popular and Recent Covert Channel Detection Methods and a Remedy. 5156-5167 - Song Gao

, Ruxin Wang
, Xiaoxuan Wang, Shui Yu
, Yunyun Dong, Shaowen Yao
, Wei Zhou
:
Detecting Adversarial Examples on Deep Neural Networks With Mutual Information Neural Estimation. 5168-5181 - Chi Liu

, Huajie Chen
, Tianqing Zhu
, Jun Zhang
, Wanlei Zhou:
Making DeepFakes More Spurious: Evading Deep Face Forgery Detection via Trace Removal Attack. 5182-5196 - Huanran Wang

, Wu Yang
, Dapeng Man
, Wei Wang, Jiguang Lv
:
Anchor Link Prediction for Privacy Leakage via De-Anonymization in Multiple Social Networks. 5197-5213 - Peizhuo Lv

, Pan Li, Shengzhi Zhang
, Kai Chen
, Ruigang Liang
, Hualong Ma, Yue Zhao, Yingjiu Li
:
A Robustness-Assured White-Box Watermark in Neural Networks. 5214-5229 - Jun Zhou

, Guobin Gao, Zhenfu Cao
, Kim-Kwang Raymond Choo
, Xiaolei Dong
:
Lightweight Privacy-Preserving Distributed Recommender System Using Tag-Based Multikey Fully Homomorphic Data Encapsulation. 5230-5246 - Tiantian Zhu

, Jinkai Yu, Chunlin Xiong
, Wenrui Cheng
, Qixuan Yuan
, Jie Ying
, Tieming Chen
, Jiabo Zhang, Mingqi Lv
, Yan Chen
, Ting Wang
, Yuan Fan:
APTSHIELD: A Stable, Efficient and Real-Time APT Detection System for Linux Hosts. 5247-5264 - Hansong Du

, Jiu-fen Liu
, Xiangyang Luo
, Yi Zhang
:
Extraction Method of Secret Message Based on Optimal Hypothesis Test. 5265-5277 - Zhongyu Pei

, Xingman Chen
, Songtao Yang
, Haixin Duan
, Chao Zhang
:
TAICHI: Transform Your Secret Exploits Into Mine From a Victim's Perspective. 5278-5292 - Yudan Cheng

, Jianfeng Ma, Zhiquan Liu
, Zhetao Li, Yongdong Wu, Caiqin Dong
, Runchuan Li
:
A Privacy-Preserving and Reputation-Based Truth Discovery Framework in Mobile Crowdsensing. 5293-5311 - Anton Wahrstätter

, Jorão Gomes Jr.
, Sajjad Khan
, Davor Svetinovic
:
Improving Cryptocurrency Crime Detection: CoinJoin Community Detection Approach. 4946-4956

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














