Search dblp for Publications

export results for "toc:db/journals/tdsc/tdsc21.bht:"

 download as .bib file

@article{DBLP:journals/tdsc/BacisVFPRS24,
  author       = {Enrico Bacis and
                  Sabrina De Capitani di Vimercati and
                  Sara Foresti and
                  Stefano Paraboschi and
                  Marco Rosa and
                  Pierangela Samarati},
  title        = {Mix{\&}Slice for Efficient Access Revocation on Outsourced Data},
  journal      = {{IEEE} Trans. Dependable Secur. Comput.},
  volume       = {21},
  number       = {3},
  pages        = {1390--1405},
  year         = {2024},
  url          = {https://doi.org/10.1109/TDSC.2023.3280590},
  doi          = {10.1109/TDSC.2023.3280590},
  timestamp    = {Fri, 31 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tdsc/BacisVFPRS24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/BansalSAB24,
  author       = {Urvashi Bansal and
                  Geeta Sikka and
                  Lalit Kumar Awasthi and
                  Bharat K. Bhargava},
  title        = {Quantitative Evaluation of Extensive Vulnerability Set Using Cost
                  Benefit Analysis},
  journal      = {{IEEE} Trans. Dependable Secur. Comput.},
  volume       = {21},
  number       = {1},
  pages        = {298--308},
  year         = {2024},
  url          = {https://doi.org/10.1109/TDSC.2023.3253121},
  doi          = {10.1109/TDSC.2023.3253121},
  timestamp    = {Sat, 10 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tdsc/BansalSAB24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/BlackS24,
  author       = {Conor Black and
                  Sandra Scott{-}Hayward},
  title        = {Defeating Data Plane Attacks With Program Obfuscation},
  journal      = {{IEEE} Trans. Dependable Secur. Comput.},
  volume       = {21},
  number       = {3},
  pages        = {1317--1330},
  year         = {2024},
  url          = {https://doi.org/10.1109/TDSC.2023.3277939},
  doi          = {10.1109/TDSC.2023.3277939},
  timestamp    = {Fri, 31 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tdsc/BlackS24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/CaiLLC24,
  author       = {Jianping Cai and
                  Ximeng Liu and
                  Jiayin Li and
                  Kim{-}Kwang Raymond Choo},
  title        = {Differentially Private Non-Negative Consistent Release for Large-Scale
                  Hierarchical Trees},
  journal      = {{IEEE} Trans. Dependable Secur. Comput.},
  volume       = {21},
  number       = {1},
  pages        = {388--402},
  year         = {2024},
  url          = {https://doi.org/10.1109/TDSC.2023.3253520},
  doi          = {10.1109/TDSC.2023.3253520},
  timestamp    = {Sat, 10 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tdsc/CaiLLC24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/CamaraFAUZ24,
  author       = {Xabier S{\'{a}}ez de C{\'{a}}mara and
                  Jose Luis Flores and
                  Crist{\'{o}}bal Arellano and
                  Aitor Urbieta and
                  Urko Zurutuza},
  title        = {Gotham Testbed: {A} Reproducible IoT Testbed for Security Experiments
                  and Dataset Generation},
  journal      = {{IEEE} Trans. Dependable Secur. Comput.},
  volume       = {21},
  number       = {1},
  pages        = {186--203},
  year         = {2024},
  url          = {https://doi.org/10.1109/TDSC.2023.3247166},
  doi          = {10.1109/TDSC.2023.3247166},
  timestamp    = {Fri, 08 Mar 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tdsc/CamaraFAUZ24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/CeldranSBPS24,
  author       = {Alberto Huertas Celdr{\'{a}}n and
                  Pedro Miguel S{\'{a}}nchez S{\'{a}}nchez and
                  G{\'{e}}r{\^{o}}me Bovet and
                  Gregorio Mart{\'{\i}}nez P{\'{e}}rez and
                  Burkhard Stiller},
  title        = {CyberSpec: Behavioral Fingerprinting for Intelligent Attacks Detection
                  on Crowdsensing Spectrum Sensors},
  journal      = {{IEEE} Trans. Dependable Secur. Comput.},
  volume       = {21},
  number       = {1},
  pages        = {284--297},
  year         = {2024},
  url          = {https://doi.org/10.1109/TDSC.2023.3252918},
  doi          = {10.1109/TDSC.2023.3252918},
  timestamp    = {Thu, 29 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tdsc/CeldranSBPS24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/ChengNLWZS24,
  author       = {Xiao Cheng and
                  Xu Nie and
                  Ningke Li and
                  Haoyu Wang and
                  Zheng Zheng and
                  Yulei Sui},
  title        = {How About Bug-Triggering Paths? - Understanding and Characterizing
                  Learning-Based Vulnerability Detectors},
  journal      = {{IEEE} Trans. Dependable Secur. Comput.},
  volume       = {21},
  number       = {2},
  pages        = {542--558},
  year         = {2024},
  url          = {https://doi.org/10.1109/TDSC.2022.3192419},
  doi          = {10.1109/TDSC.2022.3192419},
  timestamp    = {Mon, 01 Apr 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tdsc/ChengNLWZS24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/ChengWHBLLR24,
  author       = {Peng Cheng and
                  Yuexin Wu and
                  Yuan Hong and
                  Zhongjie Ba and
                  Feng Lin and
                  Li Lu and
                  Kui Ren},
  title        = {UniAP: Protecting Speech Privacy With Non-Targeted Universal Adversarial
                  Perturbations},
  journal      = {{IEEE} Trans. Dependable Secur. Comput.},
  volume       = {21},
  number       = {1},
  pages        = {31--46},
  year         = {2024},
  url          = {https://doi.org/10.1109/TDSC.2023.3242292},
  doi          = {10.1109/TDSC.2023.3242292},
  timestamp    = {Sat, 10 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tdsc/ChengWHBLLR24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/DidehbanSGSL24,
  author       = {Moslem Didehban and
                  Hwisoo So and
                  Prudhvi Gali and
                  Aviral Shrivastava and
                  Kyoungwoo Lee},
  title        = {Generic Soft Error Data and Control Flow Error Detection by Instruction
                  Duplication},
  journal      = {{IEEE} Trans. Dependable Secur. Comput.},
  volume       = {21},
  number       = {1},
  pages        = {78--92},
  year         = {2024},
  url          = {https://doi.org/10.1109/TDSC.2023.3245842},
  doi          = {10.1109/TDSC.2023.3245842},
  timestamp    = {Fri, 22 Mar 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tdsc/DidehbanSGSL24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/DingHQLGCC24,
  author       = {Zikang Ding and
                  Daojing He and
                  Qi Qiao and
                  Xuru Li and
                  Yun Gao and
                  Sammy Chan and
                  Kim{-}Kwang Raymond Choo},
  title        = {A Lightweight and Secure Communication Protocol for the IoT Environment},
  journal      = {{IEEE} Trans. Dependable Secur. Comput.},
  volume       = {21},
  number       = {3},
  pages        = {1050--1067},
  year         = {2024},
  url          = {https://doi.org/10.1109/TDSC.2023.3267979},
  doi          = {10.1109/TDSC.2023.3267979},
  timestamp    = {Fri, 31 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tdsc/DingHQLGCC24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/DolevGNW24,
  author       = {Shlomi Dolev and
                  Bingyong Guo and
                  Jianyu Niu and
                  Ziyu Wang},
  title        = {SodsBC: {A} Post-Quantum by Design Asynchronous Blockchain Framework},
  journal      = {{IEEE} Trans. Dependable Secur. Comput.},
  volume       = {21},
  number       = {1},
  pages        = {47--62},
  year         = {2024},
  url          = {https://doi.org/10.1109/TDSC.2023.3243588},
  doi          = {10.1109/TDSC.2023.3243588},
  timestamp    = {Sat, 10 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tdsc/DolevGNW24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/DongWLLLCY24,
  author       = {Caiqin Dong and
                  Jian Weng and
                  Ming Li and
                  Jia{-}Nan Liu and
                  Zhiquan Liu and
                  Yudan Cheng and
                  Shui Yu},
  title        = {Privacy-Preserving and Byzantine-Robust Federated Learning},
  journal      = {{IEEE} Trans. Dependable Secur. Comput.},
  volume       = {21},
  number       = {2},
  pages        = {889--904},
  year         = {2024},
  url          = {https://doi.org/10.1109/TDSC.2023.3264697},
  doi          = {10.1109/TDSC.2023.3264697},
  timestamp    = {Mon, 01 Apr 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tdsc/DongWLLLCY24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/DumanBEK24,
  author       = {Sevtap Duman and
                  Matthias B{\"{u}}chler and
                  Manuel Egele and
                  Engin Kirda},
  title        = {PellucidAttachment: Protecting Users From Attacks via E-Mail Attachments},
  journal      = {{IEEE} Trans. Dependable Secur. Comput.},
  volume       = {21},
  number       = {3},
  pages        = {1342--1354},
  year         = {2024},
  url          = {https://doi.org/10.1109/TDSC.2023.3279032},
  doi          = {10.1109/TDSC.2023.3279032},
  timestamp    = {Fri, 31 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tdsc/DumanBEK24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/FangQQZCZC24,
  author       = {Han Fang and
                  Yupeng Qiu and
                  Guorui Qin and
                  Jiyi Zhang and
                  Kejiang Chen and
                  Weiming Zhang and
                  Ee{-}Chien Chang},
  title        = {DP\({}^{\mbox{2}}\)Dataset Protection by Data Poisoning},
  journal      = {{IEEE} Trans. Dependable Secur. Comput.},
  volume       = {21},
  number       = {2},
  pages        = {636--649},
  year         = {2024},
  url          = {https://doi.org/10.1109/TDSC.2022.3227945},
  doi          = {10.1109/TDSC.2022.3227945},
  timestamp    = {Tue, 07 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tdsc/FangQQZCZC24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/FerreroM24,
  author       = {Renato Ferrero and
                  Bartolomeo Montrucchio},
  title        = {Banknote Identification Through Unique Fluorescent Properties},
  journal      = {{IEEE} Trans. Dependable Secur. Comput.},
  volume       = {21},
  number       = {2},
  pages        = {975--986},
  year         = {2024},
  url          = {https://doi.org/10.1109/TDSC.2023.3267166},
  doi          = {10.1109/TDSC.2023.3267166},
  timestamp    = {Mon, 01 Apr 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tdsc/FerreroM24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/GangulyKB24,
  author       = {Ritam Ganguly and
                  Shokufeh Kazemloo and
                  Borzoo Bonakdarpour},
  title        = {Crash-Resilient Decentralized Synchronous Runtime Verification},
  journal      = {{IEEE} Trans. Dependable Secur. Comput.},
  volume       = {21},
  number       = {3},
  pages        = {1017--1031},
  year         = {2024},
  url          = {https://doi.org/10.1109/TDSC.2023.3265566},
  doi          = {10.1109/TDSC.2023.3265566},
  timestamp    = {Fri, 31 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tdsc/GangulyKB24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/GeLSFW24,
  author       = {Chunpeng Ge and
                  Zhe Liu and
                  Willy Susilo and
                  Liming Fang and
                  Hao Wang},
  title        = {Attribute-Based Encryption With Reliable Outsourced Decryption in
                  Cloud Computing Using Smart Contract},
  journal      = {{IEEE} Trans. Dependable Secur. Comput.},
  volume       = {21},
  number       = {2},
  pages        = {937--948},
  year         = {2024},
  url          = {https://doi.org/10.1109/TDSC.2023.3265932},
  doi          = {10.1109/TDSC.2023.3265932},
  timestamp    = {Tue, 16 Apr 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tdsc/GeLSFW24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/GeSLBLF24,
  author       = {Chunpeng Ge and
                  Willy Susilo and
                  Zhe Liu and
                  Joonsang Baek and
                  Xiapu Luo and
                  Liming Fang},
  title        = {Attribute-Based Proxy Re-Encryption With Direct Revocation Mechanism
                  for Data Sharing in Clouds},
  journal      = {{IEEE} Trans. Dependable Secur. Comput.},
  volume       = {21},
  number       = {2},
  pages        = {949--960},
  year         = {2024},
  url          = {https://doi.org/10.1109/TDSC.2023.3265979},
  doi          = {10.1109/TDSC.2023.3265979},
  timestamp    = {Sat, 27 Apr 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tdsc/GeSLBLF24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/GeYH24,
  author       = {Xinrui Ge and
                  Jia Yu and
                  Rong Hao},
  title        = {Privacy-Preserving Graph Matching Query Supporting Quick Subgraph
                  Extraction},
  journal      = {{IEEE} Trans. Dependable Secur. Comput.},
  volume       = {21},
  number       = {3},
  pages        = {1286--1300},
  year         = {2024},
  url          = {https://doi.org/10.1109/TDSC.2023.3276360},
  doi          = {10.1109/TDSC.2023.3276360},
  timestamp    = {Fri, 31 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tdsc/GeYH24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/GuiZZX24,
  author       = {Linqing Gui and
                  Weihao Zhou and
                  Pinchang Zhang and
                  Fu Xiao},
  title        = {Cooperative Jamming-Aided Secure Communication in Wireless Powered
                  Sensor Networks},
  journal      = {{IEEE} Trans. Dependable Secur. Comput.},
  volume       = {21},
  number       = {2},
  pages        = {764--774},
  year         = {2024},
  url          = {https://doi.org/10.1109/TDSC.2023.3262040},
  doi          = {10.1109/TDSC.2023.3262040},
  timestamp    = {Mon, 01 Apr 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tdsc/GuiZZX24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/GuoLTCL24,
  author       = {Cheng Guo and
                  Wenfeng Li and
                  Xinyu Tang and
                  Kim{-}Kwang Raymond Choo and
                  Yining Liu},
  title        = {Forward Private Verifiable Dynamic Searchable Symmetric Encryption
                  With Efficient Conjunctive Query},
  journal      = {{IEEE} Trans. Dependable Secur. Comput.},
  volume       = {21},
  number       = {2},
  pages        = {746--763},
  year         = {2024},
  url          = {https://doi.org/10.1109/TDSC.2023.3262060},
  doi          = {10.1109/TDSC.2023.3262060},
  timestamp    = {Mon, 01 Apr 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tdsc/GuoLTCL24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/HaJHCLJ24,
  author       = {Guanxiong Ha and
                  Chunfu Jia and
                  Yixuan Huang and
                  Hang Chen and
                  Ruiqi Li and
                  Qiaowen Jia},
  title        = {Scalable and Popularity-Based Secure Deduplication Schemes With Fully
                  Random Tags},
  journal      = {{IEEE} Trans. Dependable Secur. Comput.},
  volume       = {21},
  number       = {3},
  pages        = {1484--1500},
  year         = {2024},
  url          = {https://doi.org/10.1109/TDSC.2023.3285173},
  doi          = {10.1109/TDSC.2023.3285173},
  timestamp    = {Fri, 31 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tdsc/HaJHCLJ24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/HanYWW24,
  author       = {Xiao Han and
                  Yuncong Yang and
                  Leye Wang and
                  Junjie Wu},
  title        = {Privacy-Preserving Network Embedding Against Private Link Inference
                  Attacks},
  journal      = {{IEEE} Trans. Dependable Secur. Comput.},
  volume       = {21},
  number       = {2},
  pages        = {847--859},
  year         = {2024},
  url          = {https://doi.org/10.1109/TDSC.2023.3264110},
  doi          = {10.1109/TDSC.2023.3264110},
  timestamp    = {Mon, 01 Apr 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tdsc/HanYWW24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/HeWZWZLY24,
  author       = {Yongzhong He and
                  Yiming Wang and
                  Sencun Zhu and
                  Wei Wang and
                  Yunjia Zhang and
                  Qiang Li and
                  Aimin Yu},
  title        = {Automatically Identifying {CVE} Affected Versions With Patches and
                  Developer Logs},
  journal      = {{IEEE} Trans. Dependable Secur. Comput.},
  volume       = {21},
  number       = {2},
  pages        = {905--919},
  year         = {2024},
  url          = {https://doi.org/10.1109/TDSC.2023.3264567},
  doi          = {10.1109/TDSC.2023.3264567},
  timestamp    = {Sat, 27 Apr 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tdsc/HeWZWZLY24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/HuangCSYZ24,
  author       = {Heqing Huang and
                  Hung{-}Chun Chiu and
                  Qingkai Shi and
                  Peisen Yao and
                  Charles Zhang},
  title        = {Balance Seed Scheduling via Monte Carlo Planning},
  journal      = {{IEEE} Trans. Dependable Secur. Comput.},
  volume       = {21},
  number       = {3},
  pages        = {1469--1483},
  year         = {2024},
  url          = {https://doi.org/10.1109/TDSC.2023.3285293},
  doi          = {10.1109/TDSC.2023.3285293},
  timestamp    = {Fri, 31 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tdsc/HuangCSYZ24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/HuangLYLS24,
  author       = {Cheng Huang and
                  Dongxiao Liu and
                  Anjia Yang and
                  Rongxing Lu and
                  Xuemin Shen},
  title        = {Multi-Client Secure and Efficient DPF-Based Keyword Search for Cloud
                  Storage},
  journal      = {{IEEE} Trans. Dependable Secur. Comput.},
  volume       = {21},
  number       = {1},
  pages        = {353--371},
  year         = {2024},
  url          = {https://doi.org/10.1109/TDSC.2023.3253786},
  doi          = {10.1109/TDSC.2023.3253786},
  timestamp    = {Sat, 10 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tdsc/HuangLYLS24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/HuangMRZLC24,
  author       = {Ke Huang and
                  Yi Mu and
                  Fatemeh Rezaeibagha and
                  Xiaosong Zhang and
                  Xiong Li and
                  Sheng Cao},
  title        = {Monero With Multi-Grained Redaction},
  journal      = {{IEEE} Trans. Dependable Secur. Comput.},
  volume       = {21},
  number       = {1},
  pages        = {241--253},
  year         = {2024},
  url          = {https://doi.org/10.1109/TDSC.2023.3251735},
  doi          = {10.1109/TDSC.2023.3251735},
  timestamp    = {Sat, 10 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tdsc/HuangMRZLC24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/JiangLXZL24,
  author       = {Wenbo Jiang and
                  Hongwei Li and
                  Guowen Xu and
                  Tianwei Zhang and
                  Rongxing Lu},
  title        = {A Comprehensive Defense Framework Against Model Extraction Attacks},
  journal      = {{IEEE} Trans. Dependable Secur. Comput.},
  volume       = {21},
  number       = {2},
  pages        = {685--700},
  year         = {2024},
  url          = {https://doi.org/10.1109/TDSC.2023.3261327},
  doi          = {10.1109/TDSC.2023.3261327},
  timestamp    = {Mon, 01 Apr 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tdsc/JiangLXZL24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/JiangXLYBGC24,
  author       = {Peng Jiang and
                  Jifan Xiao and
                  Ding Li and
                  Hongyi Yu and
                  Yu Bai and
                  Yao Guo and
                  Xiangqun Chen},
  title        = {Detecting Malicious Websites From the Perspective of System Provenance
                  Analysis},
  journal      = {{IEEE} Trans. Dependable Secur. Comput.},
  volume       = {21},
  number       = {3},
  pages        = {1406--1423},
  year         = {2024},
  url          = {https://doi.org/10.1109/TDSC.2023.3277613},
  doi          = {10.1109/TDSC.2023.3277613},
  timestamp    = {Fri, 31 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tdsc/JiangXLYBGC24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/JiangZQLX24,
  author       = {Wenbo Jiang and
                  Tianwei Zhang and
                  Han Qiu and
                  Hongwei Li and
                  Guowen Xu},
  title        = {Incremental Learning, Incremental Backdoor Threats},
  journal      = {{IEEE} Trans. Dependable Secur. Comput.},
  volume       = {21},
  number       = {2},
  pages        = {559--572},
  year         = {2024},
  url          = {https://doi.org/10.1109/TDSC.2022.3201234},
  doi          = {10.1109/TDSC.2022.3201234},
  timestamp    = {Mon, 01 Apr 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tdsc/JiangZQLX24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/KhanKB24,
  author       = {Shahid Khan and
                  Joost{-}Pieter Katoen and
                  Marc Bouissou},
  title        = {A Compositional Semantics of Boolean-Logic Driven Markov Processes},
  journal      = {{IEEE} Trans. Dependable Secur. Comput.},
  volume       = {21},
  number       = {2},
  pages        = {701--716},
  year         = {2024},
  url          = {https://doi.org/10.1109/TDSC.2023.3261270},
  doi          = {10.1109/TDSC.2023.3261270},
  timestamp    = {Mon, 01 Apr 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tdsc/KhanKB24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/LeeL24,
  author       = {Insup Lee and
                  Wonjun Lee},
  title        = {UniQGAN: Towards Improved Modulation Classification With Adversarial
                  Robustness Using Scalable Generator Design},
  journal      = {{IEEE} Trans. Dependable Secur. Comput.},
  volume       = {21},
  number       = {2},
  pages        = {732--745},
  year         = {2024},
  url          = {https://doi.org/10.1109/TDSC.2023.3261983},
  doi          = {10.1109/TDSC.2023.3261983},
  timestamp    = {Mon, 01 Apr 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tdsc/LeeL24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/LeeSNCC24,
  author       = {Younho Lee and
                  Jinyeong Seo and
                  Yujin Nam and
                  Jiseok Chae and
                  Jung Hee Cheon},
  title        = {HEaaN-STAT: {A} Privacy-Preserving Statistical Analysis Toolkit for
                  Large-Scale Numerical, Ordinal, and Categorical Data},
  journal      = {{IEEE} Trans. Dependable Secur. Comput.},
  volume       = {21},
  number       = {3},
  pages        = {1224--1241},
  year         = {2024},
  url          = {https://doi.org/10.1109/TDSC.2023.3275649},
  doi          = {10.1109/TDSC.2023.3275649},
  timestamp    = {Fri, 31 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tdsc/LeeSNCC24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/LiCJZYLWPL24,
  author       = {Yuwei Li and
                  Yuan Chen and
                  Shouling Ji and
                  Xuhong Zhang and
                  Guanglu Yan and
                  Alex X. Liu and
                  Chunming Wu and
                  Zulie Pan and
                  Peng Lin},
  title        = {G-Fuzz: {A} Directed Fuzzing Framework for gVisor},
  journal      = {{IEEE} Trans. Dependable Secur. Comput.},
  volume       = {21},
  number       = {1},
  pages        = {168--185},
  year         = {2024},
  url          = {https://doi.org/10.1109/TDSC.2023.3244825},
  doi          = {10.1109/TDSC.2023.3244825},
  timestamp    = {Sat, 10 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tdsc/LiCJZYLWPL24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/LiCLXXX24,
  author       = {Deqiang Li and
                  Shicheng Cui and
                  Yun Li and
                  Jia Xu and
                  Fu Xiao and
                  Shouhuai Xu},
  title        = {{PAD:} Towards Principled Adversarial Malware Detection Against Evasion
                  Attacks},
  journal      = {{IEEE} Trans. Dependable Secur. Comput.},
  volume       = {21},
  number       = {2},
  pages        = {920--936},
  year         = {2024},
  url          = {https://doi.org/10.1109/TDSC.2023.3265665},
  doi          = {10.1109/TDSC.2023.3265665},
  timestamp    = {Mon, 01 Apr 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tdsc/LiCLXXX24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/LiGAKST24,
  author       = {Yi{-}Fan Li and
                  Yang Gao and
                  Gbadebo Ayoade and
                  Latifur Khan and
                  Anoop Singhal and
                  Bhavani Thuraisingham},
  title        = {Heterogeneous Domain Adaptation for Multistream Classification on
                  Cyber Threat Data},
  journal      = {{IEEE} Trans. Dependable Secur. Comput.},
  volume       = {21},
  number       = {1},
  pages        = {1--11},
  year         = {2024},
  url          = {https://doi.org/10.1109/TDSC.2022.3181682},
  doi          = {10.1109/TDSC.2022.3181682},
  timestamp    = {Sat, 10 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tdsc/LiGAKST24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/LiLFHHLRQ24,
  author       = {Xiaochen Li and
                  Weiran Liu and
                  Hanwen Feng and
                  Kunzhe Huang and
                  Yuke Hu and
                  Jinfei Liu and
                  Kui Ren and
                  Zhan Qin},
  title        = {Privacy Enhancement Via Dummy Points in the Shuffle Model},
  journal      = {{IEEE} Trans. Dependable Secur. Comput.},
  volume       = {21},
  number       = {3},
  pages        = {1001--1016},
  year         = {2024},
  url          = {https://doi.org/10.1109/TDSC.2023.3263162},
  doi          = {10.1109/TDSC.2023.3263162},
  timestamp    = {Fri, 31 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tdsc/LiLFHHLRQ24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/LiLQZSM24,
  author       = {Teng Li and
                  Ximeng Liu and
                  Wei Qiao and
                  Xiongjie Zhu and
                  Yulong Shen and
                  Jianfeng Ma},
  title        = {T-Trace: Constructing the APTs Provenance Graphs Through Multiple
                  Syslogs Correlation},
  journal      = {{IEEE} Trans. Dependable Secur. Comput.},
  volume       = {21},
  number       = {3},
  pages        = {1179--1195},
  year         = {2024},
  url          = {https://doi.org/10.1109/TDSC.2023.3273918},
  doi          = {10.1109/TDSC.2023.3273918},
  timestamp    = {Fri, 31 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tdsc/LiLQZSM24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/LiSHLJQ24,
  author       = {Qian Li and
                  Chao Shen and
                  Qingyuan Hu and
                  Chenhao Lin and
                  Xiang Ji and
                  Saiyu Qi},
  title        = {Towards Gradient-Based Saliency Consensus Training for Adversarial
                  Robustness},
  journal      = {{IEEE} Trans. Dependable Secur. Comput.},
  volume       = {21},
  number       = {2},
  pages        = {530--541},
  year         = {2024},
  url          = {https://doi.org/10.1109/TDSC.2022.3184594},
  doi          = {10.1109/TDSC.2022.3184594},
  timestamp    = {Mon, 01 Apr 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tdsc/LiSHLJQ24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/LiWZZ24,
  author       = {Sheng Li and
                  Zichi Wang and
                  Xiudong Zhang and
                  Xinpeng Zhang},
  title        = {Robust Image Steganography Against General Downsampling Operations
                  With Lossless Secret Recovery},
  journal      = {{IEEE} Trans. Dependable Secur. Comput.},
  volume       = {21},
  number       = {1},
  pages        = {340--352},
  year         = {2024},
  url          = {https://doi.org/10.1109/TDSC.2023.3253691},
  doi          = {10.1109/TDSC.2023.3253691},
  timestamp    = {Mon, 25 Mar 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tdsc/LiWZZ24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/LiZSLJW24,
  author       = {Ruixuan Li and
                  Zhenyong Zhang and
                  Jun Shao and
                  Rongxing Lu and
                  Xiaoqi Jia and
                  Guiyi Wei},
  title        = {The Potential Harm of Email Delivery: Investigating the {HTTPS} Configurations
                  of Webmail Services},
  journal      = {{IEEE} Trans. Dependable Secur. Comput.},
  volume       = {21},
  number       = {1},
  pages        = {125--138},
  year         = {2024},
  url          = {https://doi.org/10.1109/TDSC.2023.3246600},
  doi          = {10.1109/TDSC.2023.3246600},
  timestamp    = {Sat, 10 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tdsc/LiZSLJW24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/LiangLXLZWL24,
  author       = {Hongliang Liang and
                  Xiangyu Li and
                  Da Xiao and
                  Jie Liu and
                  Yanjie Zhou and
                  Aibo Wang and
                  Jin Li},
  title        = {Generative Pre-Trained Transformer-Based Reinforcement Learning for
                  Testing Web Application Firewalls},
  journal      = {{IEEE} Trans. Dependable Secur. Comput.},
  volume       = {21},
  number       = {1},
  pages        = {309--324},
  year         = {2024},
  url          = {https://doi.org/10.1109/TDSC.2023.3252523},
  doi          = {10.1109/TDSC.2023.3252523},
  timestamp    = {Sat, 10 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tdsc/LiangLXLZWL24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/LiangYCLL24,
  author       = {Hongliang Liang and
                  Xinglin Yu and
                  Xianglin Cheng and
                  Jie Liu and
                  Jin Li},
  title        = {Multiple Targets Directed Greybox Fuzzing},
  journal      = {{IEEE} Trans. Dependable Secur. Comput.},
  volume       = {21},
  number       = {1},
  pages        = {325--339},
  year         = {2024},
  url          = {https://doi.org/10.1109/TDSC.2023.3253120},
  doi          = {10.1109/TDSC.2023.3253120},
  timestamp    = {Sat, 10 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tdsc/LiangYCLL24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/LiuHXHR24,
  author       = {Jianwei Liu and
                  Yinghui He and
                  Chaowei Xiao and
                  Jinsong Han and
                  Kui Ren},
  title        = {Time to Think the Security of WiFi-Based Behavior Recognition Systems},
  journal      = {{IEEE} Trans. Dependable Secur. Comput.},
  volume       = {21},
  number       = {1},
  pages        = {449--462},
  year         = {2024},
  url          = {https://doi.org/10.1109/TDSC.2023.3261328},
  doi          = {10.1109/TDSC.2023.3261328},
  timestamp    = {Sat, 10 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tdsc/LiuHXHR24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/LiuLCWZMX24,
  author       = {Ziqin Liu and
                  Zhenpeng Lin and
                  Yueqi Chen and
                  Yuhang Wu and
                  Yalong Zou and
                  Dongliang Mu and
                  Xinyu Xing},
  title        = {Towards Unveiling Exploitation Potential With Multiple Error Behaviors
                  for Kernel Bugs},
  journal      = {{IEEE} Trans. Dependable Secur. Comput.},
  volume       = {21},
  number       = {1},
  pages        = {93--109},
  year         = {2024},
  url          = {https://doi.org/10.1109/TDSC.2023.3246170},
  doi          = {10.1109/TDSC.2023.3246170},
  timestamp    = {Tue, 02 Apr 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tdsc/LiuLCWZMX24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/LiuYWWL24,
  author       = {Gao Liu and
                  Zheng Yan and
                  Dongliang Wang and
                  Haiguang Wang and
                  Tieyan Li},
  title        = {DePTVM: Decentralized Pseudonym and Trust Value Management for Integrated
                  Networks},
  journal      = {{IEEE} Trans. Dependable Secur. Comput.},
  volume       = {21},
  number       = {1},
  pages        = {110--124},
  year         = {2024},
  url          = {https://doi.org/10.1109/TDSC.2023.3246799},
  doi          = {10.1109/TDSC.2023.3246799},
  timestamp    = {Sat, 10 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tdsc/LiuYWWL24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/LiuZZTHHR24,
  author       = {Jianwei Liu and
                  Xiang Zou and
                  Leqi Zhao and
                  Yusheng Tao and
                  Sideng Hu and
                  Jinsong Han and
                  Kui Ren},
  title        = {Privacy Leakage in Wireless Charging},
  journal      = {{IEEE} Trans. Dependable Secur. Comput.},
  volume       = {21},
  number       = {2},
  pages        = {501--514},
  year         = {2024},
  url          = {https://doi.org/10.1109/TDSC.2022.3173063},
  doi          = {10.1109/TDSC.2022.3173063},
  timestamp    = {Mon, 01 Apr 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tdsc/LiuZZTHHR24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/LuZR24,
  author       = {Tianpei Lu and
                  Bingsheng Zhang and
                  Kui Ren},
  title        = {PrivData Network: {A} Privacy-Preserving On-Chain Data Factory and
                  Trading Market},
  journal      = {{IEEE} Trans. Dependable Secur. Comput.},
  volume       = {21},
  number       = {3},
  pages        = {1424--1436},
  year         = {2024},
  url          = {https://doi.org/10.1109/TDSC.2023.3284565},
  doi          = {10.1109/TDSC.2023.3284565},
  timestamp    = {Fri, 31 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tdsc/LuZR24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/LuoFLKR24,
  author       = {Meng Luo and
                  Bo Feng and
                  Long Lu and
                  Engin Kirda and
                  Kui Ren},
  title        = {On the Complexity of the Web's {PKI:} Evaluating Certificate Validation
                  of Mobile Browsers},
  journal      = {{IEEE} Trans. Dependable Secur. Comput.},
  volume       = {21},
  number       = {1},
  pages        = {419--433},
  year         = {2024},
  url          = {https://doi.org/10.1109/TDSC.2023.3255869},
  doi          = {10.1109/TDSC.2023.3255869},
  timestamp    = {Sat, 10 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tdsc/LuoFLKR24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/LuoWY24,
  author       = {Fucai Luo and
                  Haiyan Wang and
                  Xingfu Yan},
  title        = {Comments on "VERSA: Verifiable Secure Aggregation for Cross-Device
                  Federated Learning"},
  journal      = {{IEEE} Trans. Dependable Secur. Comput.},
  volume       = {21},
  number       = {1},
  pages        = {499--500},
  year         = {2024},
  url          = {https://doi.org/10.1109/TDSC.2023.3253082},
  doi          = {10.1109/TDSC.2023.3253082},
  timestamp    = {Sat, 10 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tdsc/LuoWY24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/LvWSWQC24,
  author       = {Chunyang Lv and
                  Jianfeng Wang and
                  Shifeng Sun and
                  Yunling Wang and
                  Saiyu Qi and
                  Xiaofeng Chen},
  title        = {Towards Practical Multi-Client Order-Revealing Encryption: Improvement
                  and Application},
  journal      = {{IEEE} Trans. Dependable Secur. Comput.},
  volume       = {21},
  number       = {3},
  pages        = {1111--1126},
  year         = {2024},
  url          = {https://doi.org/10.1109/TDSC.2023.3268652},
  doi          = {10.1109/TDSC.2023.3268652},
  timestamp    = {Fri, 31 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tdsc/LvWSWQC24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/MaQGZAXFZAA24,
  author       = {Hua Ma and
                  Huming Qiu and
                  Yansong Gao and
                  Zhi Zhang and
                  Alsharif Abuadbba and
                  Minhui Xue and
                  Anmin Fu and
                  Jiliang Zhang and
                  Said F. Al{-}Sarawi and
                  Derek Abbott},
  title        = {Quantization Backdoors to Deep Learning Commercial Frameworks},
  journal      = {{IEEE} Trans. Dependable Secur. Comput.},
  volume       = {21},
  number       = {3},
  pages        = {1155--1172},
  year         = {2024},
  url          = {https://doi.org/10.1109/TDSC.2023.3271956},
  doi          = {10.1109/TDSC.2023.3271956},
  timestamp    = {Fri, 31 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tdsc/MaQGZAXFZAA24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/MadalaDT24,
  author       = {Kaushik Madala and
                  Hyunsook Do and
                  Bastian Tenbergen},
  title        = {{ADSA} - Association-Driven Safety Analysis to Expose Unknown Safety
                  Issues},
  journal      = {{IEEE} Trans. Dependable Secur. Comput.},
  volume       = {21},
  number       = {1},
  pages        = {216--228},
  year         = {2024},
  url          = {https://doi.org/10.1109/TDSC.2023.3248606},
  doi          = {10.1109/TDSC.2023.3248606},
  timestamp    = {Sat, 10 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tdsc/MadalaDT24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/MaioranaRSM24,
  author       = {Emanuele Maiorana and
                  Chiara Romano and
                  Emiliano Schena and
                  Carlo Massaroni},
  title        = {{BIOWISH:} Biometric Recognition Using Wearable Inertial Sensors Detecting
                  Heart Activity},
  journal      = {{IEEE} Trans. Dependable Secur. Comput.},
  volume       = {21},
  number       = {2},
  pages        = {987--1000},
  year         = {2024},
  url          = {https://doi.org/10.1109/TDSC.2023.3268360},
  doi          = {10.1109/TDSC.2023.3268360},
  timestamp    = {Mon, 01 Apr 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tdsc/MaioranaRSM24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/MeiXXYL24,
  author       = {Lin Mei and
                  Chungen Xu and
                  Lei Xu and
                  Xingliang Yuan and
                  Joseph K. Liu},
  title        = {Practical Multi-Source Multi-Client Searchable Encryption With Forward
                  Privacy: Refined Security Notion and New Constructions},
  journal      = {{IEEE} Trans. Dependable Secur. Comput.},
  volume       = {21},
  number       = {1},
  pages        = {63--77},
  year         = {2024},
  url          = {https://doi.org/10.1109/TDSC.2023.3245638},
  doi          = {10.1109/TDSC.2023.3245638},
  timestamp    = {Sat, 10 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tdsc/MeiXXYL24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/OzbayL24,
  author       = {Cavit {\"{O}}zbay and
                  Albert Levi},
  title        = {Blacklisting Based Anonymous Authentication Scheme for Sharing Economy},
  journal      = {{IEEE} Trans. Dependable Secur. Comput.},
  volume       = {21},
  number       = {2},
  pages        = {828--846},
  year         = {2024},
  url          = {https://doi.org/10.1109/TDSC.2023.3263742},
  doi          = {10.1109/TDSC.2023.3263742},
  timestamp    = {Mon, 01 Apr 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tdsc/OzbayL24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/PanSWYCLLLR24,
  author       = {Ziyue Pan and
                  Wenbo Shen and
                  Xingkai Wang and
                  Yutian Yang and
                  Rui Chang and
                  Yao Liu and
                  Chengwei Liu and
                  Yang Liu and
                  Kui Ren},
  title        = {Ambush From All Sides: Understanding Security Threats in Open-Source
                  Software {CI/CD} Pipelines},
  journal      = {{IEEE} Trans. Dependable Secur. Comput.},
  volume       = {21},
  number       = {1},
  pages        = {403--418},
  year         = {2024},
  url          = {https://doi.org/10.1109/TDSC.2023.3253572},
  doi          = {10.1109/TDSC.2023.3253572},
  timestamp    = {Sat, 10 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tdsc/PanSWYCLLLR24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/Pandith24,
  author       = {Omais Shafi Pandith},
  title        = {SGXFault: An Efficient Page Fault Handling Mechanism for {SGX} Enclaves},
  journal      = {{IEEE} Trans. Dependable Secur. Comput.},
  volume       = {21},
  number       = {3},
  pages        = {1173--1178},
  year         = {2024},
  url          = {https://doi.org/10.1109/TDSC.2023.3268169},
  doi          = {10.1109/TDSC.2023.3268169},
  timestamp    = {Fri, 31 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tdsc/Pandith24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/PietrantuonoFP24,
  author       = {Roberto Pietrantuono and
                  Massimo Ficco and
                  Francesco Palmieri},
  title        = {Testing the Resilience of MEC-Based IoT Applications Against Resource
                  Exhaustion Attacks},
  journal      = {{IEEE} Trans. Dependable Secur. Comput.},
  volume       = {21},
  number       = {2},
  pages        = {804--818},
  year         = {2024},
  url          = {https://doi.org/10.1109/TDSC.2023.3263137},
  doi          = {10.1109/TDSC.2023.3263137},
  timestamp    = {Mon, 01 Apr 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tdsc/PietrantuonoFP24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/PriscoSP24,
  author       = {Roberto De Prisco and
                  Alfredo De Santis and
                  Francesco Palmieri},
  title        = {Bounds and Protocols for Graph-Based Distributed Secret Sharing},
  journal      = {{IEEE} Trans. Dependable Secur. Comput.},
  volume       = {21},
  number       = {1},
  pages        = {434--448},
  year         = {2024},
  url          = {https://doi.org/10.1109/TDSC.2023.3261239},
  doi          = {10.1109/TDSC.2023.3261239},
  timestamp    = {Sat, 10 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tdsc/PriscoSP24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/RenWLLG24,
  author       = {Ge Ren and
                  Jun Wu and
                  Gaolei Li and
                  Shenghong Li and
                  Mohsen Guizani},
  title        = {Protecting Intellectual Property With Reliable Availability of Learning
                  Models in AI-Based Cybersecurity Services},
  journal      = {{IEEE} Trans. Dependable Secur. Comput.},
  volume       = {21},
  number       = {2},
  pages        = {600--617},
  year         = {2024},
  url          = {https://doi.org/10.1109/TDSC.2022.3222972},
  doi          = {10.1109/TDSC.2022.3222972},
  timestamp    = {Tue, 07 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tdsc/RenWLLG24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/RoyBAD24,
  author       = {Prithwiraj Roy and
                  Shameek Bhattacharjee and
                  Sahar Abedzadeh and
                  Sajal K. Das},
  title        = {Noise Resilient Learning for Attack Detection in Smart Grid {PMU}
                  Infrastructure},
  journal      = {{IEEE} Trans. Dependable Secur. Comput.},
  volume       = {21},
  number       = {2},
  pages        = {618--635},
  year         = {2024},
  url          = {https://doi.org/10.1109/TDSC.2022.3223288},
  doi          = {10.1109/TDSC.2022.3223288},
  timestamp    = {Mon, 01 Apr 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tdsc/RoyBAD24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/SanchezCSIBPS24,
  author       = {Pedro Miguel S{\'{a}}nchez S{\'{a}}nchez and
                  Alberto Huertas Celdr{\'{a}}n and
                  Timo Schenk and
                  Adrian Lars Benjamin Iten and
                  G{\'{e}}r{\^{o}}me Bovet and
                  Gregorio Mart{\'{\i}}nez P{\'{e}}rez and
                  Burkhard Stiller},
  title        = {Studying the Robustness of Anti-Adversarial Federated Learning Models
                  Detecting Cyberattacks in IoT Spectrum Sensors},
  journal      = {{IEEE} Trans. Dependable Secur. Comput.},
  volume       = {21},
  number       = {2},
  pages        = {573--584},
  year         = {2024},
  url          = {https://doi.org/10.1109/TDSC.2022.3204535},
  doi          = {10.1109/TDSC.2022.3204535},
  timestamp    = {Mon, 15 Apr 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tdsc/SanchezCSIBPS24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/SarmadiFKGK24,
  author       = {Alireza Sarmadi and
                  Hao Fu and
                  Prashanth Krishnamurthy and
                  Siddharth Garg and
                  Farshad Khorrami},
  title        = {Privacy-Preserving Collaborative Learning Through Feature Extraction},
  journal      = {{IEEE} Trans. Dependable Secur. Comput.},
  volume       = {21},
  number       = {1},
  pages        = {486--498},
  year         = {2024},
  url          = {https://doi.org/10.1109/TDSC.2023.3263507},
  doi          = {10.1109/TDSC.2023.3263507},
  timestamp    = {Sat, 10 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tdsc/SarmadiFKGK24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/SharmaLMPGG24,
  author       = {Shantanu Sharma and
                  Yin Li and
                  Sharad Mehrotra and
                  Nisha Panwar and
                  Peeyush Gupta and
                  Dhrubajyoti Ghosh},
  title        = {Prism: Privacy-Preserving and Verifiable Set Computation Over Multi-Owner
                  Secret Shared Outsourced Databases},
  journal      = {{IEEE} Trans. Dependable Secur. Comput.},
  volume       = {21},
  number       = {3},
  pages        = {1355--1371},
  year         = {2024},
  url          = {https://doi.org/10.1109/TDSC.2023.3279356},
  doi          = {10.1109/TDSC.2023.3279356},
  timestamp    = {Fri, 31 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tdsc/SharmaLMPGG24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/ShenLWLBLXR24,
  author       = {Yijie Shen and
                  Feng Lin and
                  Chao Wang and
                  Tiantian Liu and
                  Zhongjie Ba and
                  Li Lu and
                  Wenyao Xu and
                  Kui Ren},
  title        = {MotoPrint: Reconfigurable Vibration Motor Fingerprint via Homologous
                  Signals Learning},
  journal      = {{IEEE} Trans. Dependable Secur. Comput.},
  volume       = {21},
  number       = {1},
  pages        = {372--387},
  year         = {2024},
  url          = {https://doi.org/10.1109/TDSC.2023.3253507},
  doi          = {10.1109/TDSC.2023.3253507},
  timestamp    = {Sat, 10 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tdsc/ShenLWLBLXR24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/SiaJSB24,
  author       = {Jayson Sia and
                  Edmond A. Jonckheere and
                  Laith Shalalfeh and
                  Paul Bogdan},
  title        = {Phasor Measurement Unit Change-Point Detection of Frequency Hurst
                  Exponent Anomaly With Time-to-Event},
  journal      = {{IEEE} Trans. Dependable Secur. Comput.},
  volume       = {21},
  number       = {2},
  pages        = {819--827},
  year         = {2024},
  url          = {https://doi.org/10.1109/TDSC.2023.3262825},
  doi          = {10.1109/TDSC.2023.3262825},
  timestamp    = {Mon, 01 Apr 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tdsc/SiaJSB24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/SongTRXLWG24,
  author       = {Qun Song and
                  Rui Tan and
                  Chao Ren and
                  Yan Xu and
                  Yang Lou and
                  Jianping Wang and
                  Hoay Beng Gooi},
  title        = {On Credibility of Adversarial Examples Against Learning-Based Grid
                  Voltage Stability Assessment},
  journal      = {{IEEE} Trans. Dependable Secur. Comput.},
  volume       = {21},
  number       = {2},
  pages        = {585--599},
  year         = {2024},
  url          = {https://doi.org/10.1109/TDSC.2022.3213012},
  doi          = {10.1109/TDSC.2022.3213012},
  timestamp    = {Sat, 27 Apr 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tdsc/SongTRXLWG24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/TanYLHC24,
  author       = {Shuaishuai Tan and
                  Shui Yu and
                  Wenyin Liu and
                  Daojing He and
                  Sammy Chan},
  title        = {You Can Glimpse but You Cannot Identify: Protect IoT Devices From
                  Being Fingerprinted},
  journal      = {{IEEE} Trans. Dependable Secur. Comput.},
  volume       = {21},
  number       = {3},
  pages        = {1210--1223},
  year         = {2024},
  url          = {https://doi.org/10.1109/TDSC.2023.3275850},
  doi          = {10.1109/TDSC.2023.3275850},
  timestamp    = {Fri, 31 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tdsc/TanYLHC24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/TianZHLZLR24,
  author       = {Zhihua Tian and
                  Rui Zhang and
                  Xiaoyang Hou and
                  Lingjuan Lyu and
                  Tianyi Zhang and
                  Jian Liu and
                  Kui Ren},
  title        = {{\textdollar}\{{\textbackslash}sf FederBoost\}{\textdollar}: Private
                  Federated Learning for {GBDT}},
  journal      = {{IEEE} Trans. Dependable Secur. Comput.},
  volume       = {21},
  number       = {3},
  pages        = {1274--1285},
  year         = {2024},
  url          = {https://doi.org/10.1109/TDSC.2023.3276365},
  doi          = {10.1109/TDSC.2023.3276365},
  timestamp    = {Fri, 31 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tdsc/TianZHLZLR24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/Tripathi24,
  author       = {Nikhil Tripathi},
  title        = {Delays Have Dangerous Ends: Slow {HTTP/2} DoS Attacks Into the Wild
                  and Their Real-Time Detection Using Event Sequence Analysis},
  journal      = {{IEEE} Trans. Dependable Secur. Comput.},
  volume       = {21},
  number       = {3},
  pages        = {1244--1256},
  year         = {2024},
  url          = {https://doi.org/10.1109/TDSC.2023.3276062},
  doi          = {10.1109/TDSC.2023.3276062},
  timestamp    = {Fri, 31 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tdsc/Tripathi24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/VhaduriCD24,
  author       = {Sudip Vhaduri and
                  William Cheung and
                  Sayanton V. Dibbo},
  title        = {Bag of On-Phone ANNs to Secure IoT Objects Using Wearable and Smartphone
                  Biometrics},
  journal      = {{IEEE} Trans. Dependable Secur. Comput.},
  volume       = {21},
  number       = {3},
  pages        = {1127--1138},
  year         = {2024},
  url          = {https://doi.org/10.1109/TDSC.2023.3269037},
  doi          = {10.1109/TDSC.2023.3269037},
  timestamp    = {Fri, 31 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tdsc/VhaduriCD24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/VugrinHCGTP24,
  author       = {Eric D. Vugrin and
                  Seth Hanson and
                  Jerry Cruz and
                  Casey Glatter and
                  Thomas D. Tarman and
                  Ali Pinar},
  title        = {Experimental Validation of a Command and Control Traffic Detection
                  Model},
  journal      = {{IEEE} Trans. Dependable Secur. Comput.},
  volume       = {21},
  number       = {3},
  pages        = {1084--1097},
  year         = {2024},
  url          = {https://doi.org/10.1109/TDSC.2023.3266139},
  doi          = {10.1109/TDSC.2023.3266139},
  timestamp    = {Fri, 31 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tdsc/VugrinHCGTP24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/WangGGYN24,
  author       = {Ping Wang and
                  Haichang Gao and
                  Xiaoyan Guo and
                  Zhongni Yuan and
                  Jiawei Nian},
  title        = {Improving the Security of Audio CAPTCHAs With Adversarial Examples},
  journal      = {{IEEE} Trans. Dependable Secur. Comput.},
  volume       = {21},
  number       = {2},
  pages        = {650--667},
  year         = {2024},
  url          = {https://doi.org/10.1109/TDSC.2023.3236367},
  doi          = {10.1109/TDSC.2023.3236367},
  timestamp    = {Sat, 27 Apr 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tdsc/WangGGYN24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/WangLYML24,
  author       = {Yuchen Wang and
                  Xiaoguang Li and
                  Li Yang and
                  Jianfeng Ma and
                  Hui Li},
  title        = {{ADDITION:} Detecting Adversarial Examples With Image-Dependent Noise
                  Reduction},
  journal      = {{IEEE} Trans. Dependable Secur. Comput.},
  volume       = {21},
  number       = {3},
  pages        = {1139--1154},
  year         = {2024},
  url          = {https://doi.org/10.1109/TDSC.2023.3269012},
  doi          = {10.1109/TDSC.2023.3269012},
  timestamp    = {Fri, 31 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tdsc/WangLYML24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/WangSLWJWL24,
  author       = {Jie Wang and
                  Kun Sun and
                  Lingguang Lei and
                  Yuewu Wang and
                  Jiwu Jing and
                  Shengye Wan and
                  Qi Li},
  title        = {CacheIEE: Cache-Assisted Isolated Execution Environment on {ARM} Multi-Core
                  Platforms},
  journal      = {{IEEE} Trans. Dependable Secur. Comput.},
  volume       = {21},
  number       = {1},
  pages        = {254--269},
  year         = {2024},
  url          = {https://doi.org/10.1109/TDSC.2023.3251418},
  doi          = {10.1109/TDSC.2023.3251418},
  timestamp    = {Sat, 10 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tdsc/WangSLWJWL24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/WeiLDMJP24,
  author       = {Kang Wei and
                  Jun Li and
                  Ming Ding and
                  Chuan Ma and
                  Yo{-}Seb Jeon and
                  H. Vincent Poor},
  title        = {Covert Model Poisoning Against Federated Learning: Algorithm Design
                  and Optimization},
  journal      = {{IEEE} Trans. Dependable Secur. Comput.},
  volume       = {21},
  number       = {3},
  pages        = {1196--1209},
  year         = {2024},
  url          = {https://doi.org/10.1109/TDSC.2023.3274119},
  doi          = {10.1109/TDSC.2023.3274119},
  timestamp    = {Fri, 31 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tdsc/WeiLDMJP24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/WuFLYSX24,
  author       = {Liqiang Wu and
                  Shaojing Fu and
                  Yuchuan Luo and
                  Hongyang Yan and
                  Heyuan Shi and
                  Ming Xu},
  title        = {A Robust and Lightweight Privacy-Preserving Data Aggregation Scheme
                  for Smart Grid},
  journal      = {{IEEE} Trans. Dependable Secur. Comput.},
  volume       = {21},
  number       = {1},
  pages        = {270--283},
  year         = {2024},
  url          = {https://doi.org/10.1109/TDSC.2023.3252593},
  doi          = {10.1109/TDSC.2023.3252593},
  timestamp    = {Fri, 22 Mar 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tdsc/WuFLYSX24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/WuWJPBP24,
  author       = {Lichao Wu and
                  Yoo{-}Seung Won and
                  Dirmanto Jap and
                  Guilherme Perin and
                  Shivam Bhasin and
                  Stjepan Picek},
  title        = {Ablation Analysis for Multi-Device Deep Learning-Based Physical Side-Channel
                  Analysis},
  journal      = {{IEEE} Trans. Dependable Secur. Comput.},
  volume       = {21},
  number       = {3},
  pages        = {1331--1341},
  year         = {2024},
  url          = {https://doi.org/10.1109/TDSC.2023.3278857},
  doi          = {10.1109/TDSC.2023.3278857},
  timestamp    = {Fri, 31 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tdsc/WuWJPBP24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/XingWTZLS24,
  author       = {Yunlong Xing and
                  Xinda Wang and
                  Sadegh Torabi and
                  Zeyu Zhang and
                  Lingguang Lei and
                  Kun Sun},
  title        = {A Hybrid System Call Profiling Approach for Container Protection},
  journal      = {{IEEE} Trans. Dependable Secur. Comput.},
  volume       = {21},
  number       = {3},
  pages        = {1068--1083},
  year         = {2024},
  url          = {https://doi.org/10.1109/TDSC.2023.3268124},
  doi          = {10.1109/TDSC.2023.3268124},
  timestamp    = {Fri, 31 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tdsc/XingWTZLS24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/XuMSLZ24,
  author       = {Wenhan Xu and
                  Hui Ma and
                  Zishuai Song and
                  Jianhao Li and
                  Rui Zhang},
  title        = {Gringotts: An Encrypted Version Control System With Less Trust on
                  Servers},
  journal      = {{IEEE} Trans. Dependable Secur. Comput.},
  volume       = {21},
  number       = {2},
  pages        = {668--684},
  year         = {2024},
  url          = {https://doi.org/10.1109/TDSC.2023.3251365},
  doi          = {10.1109/TDSC.2023.3251365},
  timestamp    = {Mon, 01 Apr 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tdsc/XuMSLZ24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/XueYZSMWZ24,
  author       = {Yinxing Xue and
                  Jiaming Ye and
                  Wei Zhang and
                  Jun Sun and
                  Lei Ma and
                  Haijun Wang and
                  Jianjun Zhao},
  title        = {xFuzz: Machine Learning Guided Cross-Contract Fuzzing},
  journal      = {{IEEE} Trans. Dependable Secur. Comput.},
  volume       = {21},
  number       = {2},
  pages        = {515--529},
  year         = {2024},
  url          = {https://doi.org/10.1109/TDSC.2022.3182373},
  doi          = {10.1109/TDSC.2022.3182373},
  timestamp    = {Mon, 01 Apr 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tdsc/XueYZSMWZ24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/YanLZWLZLL24,
  author       = {Haonan Yan and
                  Xiaoguang Li and
                  Wenjing Zhang and
                  Rui Wang and
                  Hui Li and
                  Xingwen Zhao and
                  Fenghua Li and
                  Xiaodong Lin},
  title        = {Automatic Evasion of Machine Learning-Based Network Intrusion Detection
                  Systems},
  journal      = {{IEEE} Trans. Dependable Secur. Comput.},
  volume       = {21},
  number       = {1},
  pages        = {153--167},
  year         = {2024},
  url          = {https://doi.org/10.1109/TDSC.2023.3247585},
  doi          = {10.1109/TDSC.2023.3247585},
  timestamp    = {Tue, 07 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tdsc/YanLZWLZLL24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/YanNZLGW24,
  author       = {Xingfu Yan and
                  Wing W. Y. Ng and
                  Bowen Zhao and
                  Yuxian Liu and
                  Ying Gao and
                  Xiumin Wang},
  title        = {Fog-Enabled Privacy-Preserving Multi-Task Data Aggregation for Mobile
                  Crowdsensing},
  journal      = {{IEEE} Trans. Dependable Secur. Comput.},
  volume       = {21},
  number       = {3},
  pages        = {1301--1316},
  year         = {2024},
  url          = {https://doi.org/10.1109/TDSC.2023.3277831},
  doi          = {10.1109/TDSC.2023.3277831},
  timestamp    = {Fri, 31 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tdsc/YanNZLGW24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/YanYHLH24,
  author       = {Hongyang Yan and
                  Anli Yan and
                  Li Hu and
                  Jiaming Liang and
                  Haibo Hu},
  title        = {MTL-Leak: Privacy Risk Assessment in Multi-Task Learning},
  journal      = {{IEEE} Trans. Dependable Secur. Comput.},
  volume       = {21},
  number       = {1},
  pages        = {204--215},
  year         = {2024},
  url          = {https://doi.org/10.1109/TDSC.2023.3247869},
  doi          = {10.1109/TDSC.2023.3247869},
  timestamp    = {Sat, 10 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tdsc/YanYHLH24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/YangH24,
  author       = {Benyuan Yang and
                  Hesuan Hu},
  title        = {Delegation Security Analysis in Workflow Systems},
  journal      = {{IEEE} Trans. Dependable Secur. Comput.},
  volume       = {21},
  number       = {1},
  pages        = {229--240},
  year         = {2024},
  url          = {https://doi.org/10.1109/TDSC.2023.3248602},
  doi          = {10.1109/TDSC.2023.3248602},
  timestamp    = {Sat, 10 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tdsc/YangH24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/YangWTLWZY24,
  author       = {Yaxi Yang and
                  Jian Weng and
                  Yao Tong and
                  Jia{-}Nan Liu and
                  Zhenghao Wu and
                  Leo Yu Zhang and
                  Anjia Yang},
  title        = {PriGenX: Privacy-Preserving Query With Anonymous Access Control for
                  Genomic Data},
  journal      = {{IEEE} Trans. Dependable Secur. Comput.},
  volume       = {21},
  number       = {2},
  pages        = {961--974},
  year         = {2024},
  url          = {https://doi.org/10.1109/TDSC.2023.3266292},
  doi          = {10.1109/TDSC.2023.3266292},
  timestamp    = {Mon, 01 Apr 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tdsc/YangWTLWZY24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/YangWYFZ24,
  author       = {Tianyu Yang and
                  Hanzhou Wu and
                  Biao Yi and
                  Guorui Feng and
                  Xinpeng Zhang},
  title        = {Semantic-Preserving Linguistic Steganography by Pivot Translation
                  and Semantic-Aware Bins Coding},
  journal      = {{IEEE} Trans. Dependable Secur. Comput.},
  volume       = {21},
  number       = {1},
  pages        = {139--152},
  year         = {2024},
  url          = {https://doi.org/10.1109/TDSC.2023.3247493},
  doi          = {10.1109/TDSC.2023.3247493},
  timestamp    = {Sat, 10 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tdsc/YangWYFZ24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/YangXCWZ24,
  author       = {Jungang Yang and
                  Liyao Xiang and
                  Pengzhi Chu and
                  Xinbing Wang and
                  Chenghu Zhou},
  title        = {Certified Distributional Robustness on Smoothed Classifiers},
  journal      = {{IEEE} Trans. Dependable Secur. Comput.},
  volume       = {21},
  number       = {2},
  pages        = {876--888},
  year         = {2024},
  url          = {https://doi.org/10.1109/TDSC.2023.3264850},
  doi          = {10.1109/TDSC.2023.3264850},
  timestamp    = {Mon, 01 Apr 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tdsc/YangXCWZ24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/YeLNYSJ24,
  author       = {Zipeng Ye and
                  Wenjian Luo and
                  Muhammad Luqman Naseem and
                  Xiangkai Yang and
                  Yuhui Shi and
                  Yan Jia},
  title        = {{C2FMI:} Corse-to-Fine Black-Box Model Inversion Attack},
  journal      = {{IEEE} Trans. Dependable Secur. Comput.},
  volume       = {21},
  number       = {3},
  pages        = {1437--1450},
  year         = {2024},
  url          = {https://doi.org/10.1109/TDSC.2023.3285071},
  doi          = {10.1109/TDSC.2023.3285071},
  timestamp    = {Fri, 31 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tdsc/YeLNYSJ24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/ZdunQSSCJJ24,
  author       = {Uwe Zdun and
                  Pierre{-}Jean Queval and
                  Georg Simhandl and
                  Riccardo Scandariato and
                  Somik Chakravarty and
                  Marjan Jelic and
                  Aleksandar S. Jovanovic},
  title        = {Detection Strategies for Microservice Security Tactics},
  journal      = {{IEEE} Trans. Dependable Secur. Comput.},
  volume       = {21},
  number       = {3},
  pages        = {1257--1273},
  year         = {2024},
  url          = {https://doi.org/10.1109/TDSC.2023.3276487},
  doi          = {10.1109/TDSC.2023.3276487},
  timestamp    = {Fri, 31 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tdsc/ZdunQSSCJJ24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/ZhangD24,
  author       = {Jianhong Zhang and
                  Chenghe Dong},
  title        = {On the Security of Lightweight and Escrow-Free Certificate-Based Data
                  Aggregation for Smart Grid},
  journal      = {{IEEE} Trans. Dependable Secur. Comput.},
  volume       = {21},
  number       = {3},
  pages        = {1242--1243},
  year         = {2024},
  url          = {https://doi.org/10.1109/TDSC.2023.3275972},
  doi          = {10.1109/TDSC.2023.3275972},
  timestamp    = {Fri, 31 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tdsc/ZhangD24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/ZhangJPSFLW24,
  author       = {Yi Zhang and
                  Xiaofeng Jia and
                  Bianjing Pan and
                  Jun Shao and
                  Liming Fang and
                  Rongxing Lu and
                  Guiyi Wei},
  title        = {Anonymous Multi-Hop Payment for Payment Channel Networks},
  journal      = {{IEEE} Trans. Dependable Secur. Comput.},
  volume       = {21},
  number       = {1},
  pages        = {476--485},
  year         = {2024},
  url          = {https://doi.org/10.1109/TDSC.2023.3262681},
  doi          = {10.1109/TDSC.2023.3262681},
  timestamp    = {Sat, 10 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tdsc/ZhangJPSFLW24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/ZhangLKWWL24,
  author       = {Runnan Zhang and
                  Gang Liu and
                  Hongzhaoning Kang and
                  Quan Wang and
                  Bo Wan and
                  Nan Luo},
  title        = {Anonymity in Attribute-Based Access Control: Framework and Metric},
  journal      = {{IEEE} Trans. Dependable Secur. Comput.},
  volume       = {21},
  number       = {1},
  pages        = {463--475},
  year         = {2024},
  url          = {https://doi.org/10.1109/TDSC.2023.3261309},
  doi          = {10.1109/TDSC.2023.3261309},
  timestamp    = {Sat, 10 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tdsc/ZhangLKWWL24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/ZhangLLXL24,
  author       = {Di Zhang and
                  Junqing Le and
                  Xinyu Lei and
                  Tao Xiang and
                  Xiaofeng Liao},
  title        = {Secure Redactable Blockchain With Dynamic Support},
  journal      = {{IEEE} Trans. Dependable Secur. Comput.},
  volume       = {21},
  number       = {2},
  pages        = {717--731},
  year         = {2024},
  url          = {https://doi.org/10.1109/TDSC.2023.3261343},
  doi          = {10.1109/TDSC.2023.3261343},
  timestamp    = {Sat, 27 Apr 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tdsc/ZhangLLXL24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/ZhangLLYZKG24,
  author       = {Zijian Zhang and
                  Xuyang Liu and
                  Meng Li and
                  Hao Yin and
                  Liehuang Zhu and
                  Bakh Khoussainov and
                  Keke Gai},
  title        = {{HCA:} Hashchain-Based Consensus Acceleration Via Re-Voting},
  journal      = {{IEEE} Trans. Dependable Secur. Comput.},
  volume       = {21},
  number       = {2},
  pages        = {775--788},
  year         = {2024},
  url          = {https://doi.org/10.1109/TDSC.2023.3262283},
  doi          = {10.1109/TDSC.2023.3262283},
  timestamp    = {Mon, 01 Apr 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tdsc/ZhangLLYZKG24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/ZhangZZ24,
  author       = {Xiaokuan Zhang and
                  Yang Zhang and
                  Yinqian Zhang},
  title        = {VeriTrain: Validating MLaaS Training Efforts via Anomaly Detection},
  journal      = {{IEEE} Trans. Dependable Secur. Comput.},
  volume       = {21},
  number       = {3},
  pages        = {1032--1049},
  year         = {2024},
  url          = {https://doi.org/10.1109/TDSC.2023.3266427},
  doi          = {10.1109/TDSC.2023.3266427},
  timestamp    = {Fri, 31 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tdsc/ZhangZZ24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/ZhaoJXTWWLZLWB24,
  author       = {Binbin Zhao and
                  Shouling Ji and
                  Jiacheng Xu and
                  Yuan Tian and
                  Qiuyang Wei and
                  Qinying Wang and
                  Chenyang Lyu and
                  Xuhong Zhang and
                  Changting Lin and
                  Jingzheng Wu and
                  Raheem Beyah},
  title        = {One Bad Apple Spoils the Barrel: Understanding the Security Risks
                  Introduced by Third-Party Components in IoT Firmware},
  journal      = {{IEEE} Trans. Dependable Secur. Comput.},
  volume       = {21},
  number       = {3},
  pages        = {1372--1389},
  year         = {2024},
  url          = {https://doi.org/10.1109/TDSC.2023.3279846},
  doi          = {10.1109/TDSC.2023.3279846},
  timestamp    = {Fri, 31 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tdsc/ZhaoJXTWWLZLWB24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/ZhengHZG24,
  author       = {Jian Zheng and
                  Huawei Huang and
                  Zibin Zheng and
                  Song Guo},
  title        = {Adaptive Double-Spending Attacks on PoW-Based Blockchains},
  journal      = {{IEEE} Trans. Dependable Secur. Comput.},
  volume       = {21},
  number       = {3},
  pages        = {1098--1110},
  year         = {2024},
  url          = {https://doi.org/10.1109/TDSC.2023.3268668},
  doi          = {10.1109/TDSC.2023.3268668},
  timestamp    = {Fri, 31 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tdsc/ZhengHZG24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/ZhengZWHJYW24,
  author       = {Yifeng Zheng and
                  Menglun Zhou and
                  Songlei Wang and
                  Hejiao Huang and
                  Xiaohua Jia and
                  Xun Yi and
                  Cong Wang},
  title        = {SecDR: Enabling Secure, Efficient, and Accurate Data Recovery for
                  Mobile Crowdsensing},
  journal      = {{IEEE} Trans. Dependable Secur. Comput.},
  volume       = {21},
  number       = {2},
  pages        = {789--803},
  year         = {2024},
  url          = {https://doi.org/10.1109/TDSC.2023.3262268},
  doi          = {10.1109/TDSC.2023.3262268},
  timestamp    = {Mon, 01 Apr 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tdsc/ZhengZWHJYW24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/ZhouAAAA24,
  author       = {Xugui Zhou and
                  Bulbul Ahmed and
                  James H. Aylor and
                  Philip Asare and
                  Homa Alemzadeh},
  title        = {Hybrid Knowledge and Data Driven Synthesis of Runtime Monitors for
                  Cyber-Physical Systems},
  journal      = {{IEEE} Trans. Dependable Secur. Comput.},
  volume       = {21},
  number       = {1},
  pages        = {12--30},
  year         = {2024},
  url          = {https://doi.org/10.1109/TDSC.2023.3242653},
  doi          = {10.1109/TDSC.2023.3242653},
  timestamp    = {Sat, 10 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tdsc/ZhouAAAA24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/ZhouZYYZ24,
  author       = {Shuai Zhou and
                  Tianqing Zhu and
                  Dayong Ye and
                  Xin Yu and
                  Wanlei Zhou},
  title        = {Boosting Model Inversion Attacks With Adversarial Examples},
  journal      = {{IEEE} Trans. Dependable Secur. Comput.},
  volume       = {21},
  number       = {3},
  pages        = {1451--1468},
  year         = {2024},
  url          = {https://doi.org/10.1109/TDSC.2023.3285015},
  doi          = {10.1109/TDSC.2023.3285015},
  timestamp    = {Fri, 31 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tdsc/ZhouZYYZ24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/ZhuZHLFS24,
  author       = {Dan Zhu and
                  Hui Zhu and
                  Cheng Huang and
                  Rongxing Lu and
                  Dengguo Feng and
                  Xuemin Shen},
  title        = {Efficient and Accurate Cloud-Assisted Medical Pre-Diagnosis With Privacy
                  Preservation},
  journal      = {{IEEE} Trans. Dependable Secur. Comput.},
  volume       = {21},
  number       = {2},
  pages        = {860--875},
  year         = {2024},
  url          = {https://doi.org/10.1109/TDSC.2023.3263974},
  doi          = {10.1109/TDSC.2023.3263974},
  timestamp    = {Mon, 01 Apr 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tdsc/ZhuZHLFS24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
a service of  Schloss Dagstuhl - Leibniz Center for Informatics