Stop the war!
Остановите войну!
for scientists:
default search action
Search dblp for Publications
export results for "toc:db/journals/tdsc/tdsc21.bht:"
@article{DBLP:journals/tdsc/BacisVFPRS24, author = {Enrico Bacis and Sabrina De Capitani di Vimercati and Sara Foresti and Stefano Paraboschi and Marco Rosa and Pierangela Samarati}, title = {Mix{\&}Slice for Efficient Access Revocation on Outsourced Data}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {21}, number = {3}, pages = {1390--1405}, year = {2024}, url = {https://doi.org/10.1109/TDSC.2023.3280590}, doi = {10.1109/TDSC.2023.3280590}, timestamp = {Fri, 31 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tdsc/BacisVFPRS24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/BansalSAB24, author = {Urvashi Bansal and Geeta Sikka and Lalit Kumar Awasthi and Bharat K. Bhargava}, title = {Quantitative Evaluation of Extensive Vulnerability Set Using Cost Benefit Analysis}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {21}, number = {1}, pages = {298--308}, year = {2024}, url = {https://doi.org/10.1109/TDSC.2023.3253121}, doi = {10.1109/TDSC.2023.3253121}, timestamp = {Sat, 10 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tdsc/BansalSAB24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/BlackS24, author = {Conor Black and Sandra Scott{-}Hayward}, title = {Defeating Data Plane Attacks With Program Obfuscation}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {21}, number = {3}, pages = {1317--1330}, year = {2024}, url = {https://doi.org/10.1109/TDSC.2023.3277939}, doi = {10.1109/TDSC.2023.3277939}, timestamp = {Fri, 31 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tdsc/BlackS24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/CaiLLC24, author = {Jianping Cai and Ximeng Liu and Jiayin Li and Kim{-}Kwang Raymond Choo}, title = {Differentially Private Non-Negative Consistent Release for Large-Scale Hierarchical Trees}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {21}, number = {1}, pages = {388--402}, year = {2024}, url = {https://doi.org/10.1109/TDSC.2023.3253520}, doi = {10.1109/TDSC.2023.3253520}, timestamp = {Sat, 10 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tdsc/CaiLLC24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/CamaraFAUZ24, author = {Xabier S{\'{a}}ez de C{\'{a}}mara and Jose Luis Flores and Crist{\'{o}}bal Arellano and Aitor Urbieta and Urko Zurutuza}, title = {Gotham Testbed: {A} Reproducible IoT Testbed for Security Experiments and Dataset Generation}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {21}, number = {1}, pages = {186--203}, year = {2024}, url = {https://doi.org/10.1109/TDSC.2023.3247166}, doi = {10.1109/TDSC.2023.3247166}, timestamp = {Fri, 08 Mar 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tdsc/CamaraFAUZ24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/CeldranSBPS24, author = {Alberto Huertas Celdr{\'{a}}n and Pedro Miguel S{\'{a}}nchez S{\'{a}}nchez and G{\'{e}}r{\^{o}}me Bovet and Gregorio Mart{\'{\i}}nez P{\'{e}}rez and Burkhard Stiller}, title = {CyberSpec: Behavioral Fingerprinting for Intelligent Attacks Detection on Crowdsensing Spectrum Sensors}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {21}, number = {1}, pages = {284--297}, year = {2024}, url = {https://doi.org/10.1109/TDSC.2023.3252918}, doi = {10.1109/TDSC.2023.3252918}, timestamp = {Thu, 29 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tdsc/CeldranSBPS24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/ChengNLWZS24, author = {Xiao Cheng and Xu Nie and Ningke Li and Haoyu Wang and Zheng Zheng and Yulei Sui}, title = {How About Bug-Triggering Paths? - Understanding and Characterizing Learning-Based Vulnerability Detectors}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {21}, number = {2}, pages = {542--558}, year = {2024}, url = {https://doi.org/10.1109/TDSC.2022.3192419}, doi = {10.1109/TDSC.2022.3192419}, timestamp = {Mon, 01 Apr 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tdsc/ChengNLWZS24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/ChengWHBLLR24, author = {Peng Cheng and Yuexin Wu and Yuan Hong and Zhongjie Ba and Feng Lin and Li Lu and Kui Ren}, title = {UniAP: Protecting Speech Privacy With Non-Targeted Universal Adversarial Perturbations}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {21}, number = {1}, pages = {31--46}, year = {2024}, url = {https://doi.org/10.1109/TDSC.2023.3242292}, doi = {10.1109/TDSC.2023.3242292}, timestamp = {Sat, 10 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tdsc/ChengWHBLLR24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/DidehbanSGSL24, author = {Moslem Didehban and Hwisoo So and Prudhvi Gali and Aviral Shrivastava and Kyoungwoo Lee}, title = {Generic Soft Error Data and Control Flow Error Detection by Instruction Duplication}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {21}, number = {1}, pages = {78--92}, year = {2024}, url = {https://doi.org/10.1109/TDSC.2023.3245842}, doi = {10.1109/TDSC.2023.3245842}, timestamp = {Fri, 22 Mar 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tdsc/DidehbanSGSL24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/DingHQLGCC24, author = {Zikang Ding and Daojing He and Qi Qiao and Xuru Li and Yun Gao and Sammy Chan and Kim{-}Kwang Raymond Choo}, title = {A Lightweight and Secure Communication Protocol for the IoT Environment}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {21}, number = {3}, pages = {1050--1067}, year = {2024}, url = {https://doi.org/10.1109/TDSC.2023.3267979}, doi = {10.1109/TDSC.2023.3267979}, timestamp = {Fri, 31 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tdsc/DingHQLGCC24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/DolevGNW24, author = {Shlomi Dolev and Bingyong Guo and Jianyu Niu and Ziyu Wang}, title = {SodsBC: {A} Post-Quantum by Design Asynchronous Blockchain Framework}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {21}, number = {1}, pages = {47--62}, year = {2024}, url = {https://doi.org/10.1109/TDSC.2023.3243588}, doi = {10.1109/TDSC.2023.3243588}, timestamp = {Sat, 10 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tdsc/DolevGNW24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/DongWLLLCY24, author = {Caiqin Dong and Jian Weng and Ming Li and Jia{-}Nan Liu and Zhiquan Liu and Yudan Cheng and Shui Yu}, title = {Privacy-Preserving and Byzantine-Robust Federated Learning}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {21}, number = {2}, pages = {889--904}, year = {2024}, url = {https://doi.org/10.1109/TDSC.2023.3264697}, doi = {10.1109/TDSC.2023.3264697}, timestamp = {Mon, 01 Apr 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tdsc/DongWLLLCY24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/DumanBEK24, author = {Sevtap Duman and Matthias B{\"{u}}chler and Manuel Egele and Engin Kirda}, title = {PellucidAttachment: Protecting Users From Attacks via E-Mail Attachments}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {21}, number = {3}, pages = {1342--1354}, year = {2024}, url = {https://doi.org/10.1109/TDSC.2023.3279032}, doi = {10.1109/TDSC.2023.3279032}, timestamp = {Fri, 31 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tdsc/DumanBEK24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/FangQQZCZC24, author = {Han Fang and Yupeng Qiu and Guorui Qin and Jiyi Zhang and Kejiang Chen and Weiming Zhang and Ee{-}Chien Chang}, title = {DP\({}^{\mbox{2}}\)Dataset Protection by Data Poisoning}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {21}, number = {2}, pages = {636--649}, year = {2024}, url = {https://doi.org/10.1109/TDSC.2022.3227945}, doi = {10.1109/TDSC.2022.3227945}, timestamp = {Tue, 07 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tdsc/FangQQZCZC24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/FerreroM24, author = {Renato Ferrero and Bartolomeo Montrucchio}, title = {Banknote Identification Through Unique Fluorescent Properties}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {21}, number = {2}, pages = {975--986}, year = {2024}, url = {https://doi.org/10.1109/TDSC.2023.3267166}, doi = {10.1109/TDSC.2023.3267166}, timestamp = {Mon, 01 Apr 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tdsc/FerreroM24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/GangulyKB24, author = {Ritam Ganguly and Shokufeh Kazemloo and Borzoo Bonakdarpour}, title = {Crash-Resilient Decentralized Synchronous Runtime Verification}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {21}, number = {3}, pages = {1017--1031}, year = {2024}, url = {https://doi.org/10.1109/TDSC.2023.3265566}, doi = {10.1109/TDSC.2023.3265566}, timestamp = {Fri, 31 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tdsc/GangulyKB24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/GeLSFW24, author = {Chunpeng Ge and Zhe Liu and Willy Susilo and Liming Fang and Hao Wang}, title = {Attribute-Based Encryption With Reliable Outsourced Decryption in Cloud Computing Using Smart Contract}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {21}, number = {2}, pages = {937--948}, year = {2024}, url = {https://doi.org/10.1109/TDSC.2023.3265932}, doi = {10.1109/TDSC.2023.3265932}, timestamp = {Tue, 16 Apr 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tdsc/GeLSFW24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/GeSLBLF24, author = {Chunpeng Ge and Willy Susilo and Zhe Liu and Joonsang Baek and Xiapu Luo and Liming Fang}, title = {Attribute-Based Proxy Re-Encryption With Direct Revocation Mechanism for Data Sharing in Clouds}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {21}, number = {2}, pages = {949--960}, year = {2024}, url = {https://doi.org/10.1109/TDSC.2023.3265979}, doi = {10.1109/TDSC.2023.3265979}, timestamp = {Sat, 27 Apr 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tdsc/GeSLBLF24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/GeYH24, author = {Xinrui Ge and Jia Yu and Rong Hao}, title = {Privacy-Preserving Graph Matching Query Supporting Quick Subgraph Extraction}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {21}, number = {3}, pages = {1286--1300}, year = {2024}, url = {https://doi.org/10.1109/TDSC.2023.3276360}, doi = {10.1109/TDSC.2023.3276360}, timestamp = {Fri, 31 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tdsc/GeYH24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/GuiZZX24, author = {Linqing Gui and Weihao Zhou and Pinchang Zhang and Fu Xiao}, title = {Cooperative Jamming-Aided Secure Communication in Wireless Powered Sensor Networks}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {21}, number = {2}, pages = {764--774}, year = {2024}, url = {https://doi.org/10.1109/TDSC.2023.3262040}, doi = {10.1109/TDSC.2023.3262040}, timestamp = {Mon, 01 Apr 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tdsc/GuiZZX24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/GuoLTCL24, author = {Cheng Guo and Wenfeng Li and Xinyu Tang and Kim{-}Kwang Raymond Choo and Yining Liu}, title = {Forward Private Verifiable Dynamic Searchable Symmetric Encryption With Efficient Conjunctive Query}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {21}, number = {2}, pages = {746--763}, year = {2024}, url = {https://doi.org/10.1109/TDSC.2023.3262060}, doi = {10.1109/TDSC.2023.3262060}, timestamp = {Mon, 01 Apr 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tdsc/GuoLTCL24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/HaJHCLJ24, author = {Guanxiong Ha and Chunfu Jia and Yixuan Huang and Hang Chen and Ruiqi Li and Qiaowen Jia}, title = {Scalable and Popularity-Based Secure Deduplication Schemes With Fully Random Tags}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {21}, number = {3}, pages = {1484--1500}, year = {2024}, url = {https://doi.org/10.1109/TDSC.2023.3285173}, doi = {10.1109/TDSC.2023.3285173}, timestamp = {Fri, 31 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tdsc/HaJHCLJ24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/HanYWW24, author = {Xiao Han and Yuncong Yang and Leye Wang and Junjie Wu}, title = {Privacy-Preserving Network Embedding Against Private Link Inference Attacks}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {21}, number = {2}, pages = {847--859}, year = {2024}, url = {https://doi.org/10.1109/TDSC.2023.3264110}, doi = {10.1109/TDSC.2023.3264110}, timestamp = {Mon, 01 Apr 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tdsc/HanYWW24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/HeWZWZLY24, author = {Yongzhong He and Yiming Wang and Sencun Zhu and Wei Wang and Yunjia Zhang and Qiang Li and Aimin Yu}, title = {Automatically Identifying {CVE} Affected Versions With Patches and Developer Logs}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {21}, number = {2}, pages = {905--919}, year = {2024}, url = {https://doi.org/10.1109/TDSC.2023.3264567}, doi = {10.1109/TDSC.2023.3264567}, timestamp = {Sat, 27 Apr 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tdsc/HeWZWZLY24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/HuangCSYZ24, author = {Heqing Huang and Hung{-}Chun Chiu and Qingkai Shi and Peisen Yao and Charles Zhang}, title = {Balance Seed Scheduling via Monte Carlo Planning}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {21}, number = {3}, pages = {1469--1483}, year = {2024}, url = {https://doi.org/10.1109/TDSC.2023.3285293}, doi = {10.1109/TDSC.2023.3285293}, timestamp = {Fri, 31 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tdsc/HuangCSYZ24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/HuangLYLS24, author = {Cheng Huang and Dongxiao Liu and Anjia Yang and Rongxing Lu and Xuemin Shen}, title = {Multi-Client Secure and Efficient DPF-Based Keyword Search for Cloud Storage}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {21}, number = {1}, pages = {353--371}, year = {2024}, url = {https://doi.org/10.1109/TDSC.2023.3253786}, doi = {10.1109/TDSC.2023.3253786}, timestamp = {Sat, 10 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tdsc/HuangLYLS24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/HuangMRZLC24, author = {Ke Huang and Yi Mu and Fatemeh Rezaeibagha and Xiaosong Zhang and Xiong Li and Sheng Cao}, title = {Monero With Multi-Grained Redaction}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {21}, number = {1}, pages = {241--253}, year = {2024}, url = {https://doi.org/10.1109/TDSC.2023.3251735}, doi = {10.1109/TDSC.2023.3251735}, timestamp = {Sat, 10 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tdsc/HuangMRZLC24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/JiangLXZL24, author = {Wenbo Jiang and Hongwei Li and Guowen Xu and Tianwei Zhang and Rongxing Lu}, title = {A Comprehensive Defense Framework Against Model Extraction Attacks}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {21}, number = {2}, pages = {685--700}, year = {2024}, url = {https://doi.org/10.1109/TDSC.2023.3261327}, doi = {10.1109/TDSC.2023.3261327}, timestamp = {Mon, 01 Apr 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tdsc/JiangLXZL24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/JiangXLYBGC24, author = {Peng Jiang and Jifan Xiao and Ding Li and Hongyi Yu and Yu Bai and Yao Guo and Xiangqun Chen}, title = {Detecting Malicious Websites From the Perspective of System Provenance Analysis}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {21}, number = {3}, pages = {1406--1423}, year = {2024}, url = {https://doi.org/10.1109/TDSC.2023.3277613}, doi = {10.1109/TDSC.2023.3277613}, timestamp = {Fri, 31 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tdsc/JiangXLYBGC24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/JiangZQLX24, author = {Wenbo Jiang and Tianwei Zhang and Han Qiu and Hongwei Li and Guowen Xu}, title = {Incremental Learning, Incremental Backdoor Threats}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {21}, number = {2}, pages = {559--572}, year = {2024}, url = {https://doi.org/10.1109/TDSC.2022.3201234}, doi = {10.1109/TDSC.2022.3201234}, timestamp = {Mon, 01 Apr 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tdsc/JiangZQLX24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/KhanKB24, author = {Shahid Khan and Joost{-}Pieter Katoen and Marc Bouissou}, title = {A Compositional Semantics of Boolean-Logic Driven Markov Processes}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {21}, number = {2}, pages = {701--716}, year = {2024}, url = {https://doi.org/10.1109/TDSC.2023.3261270}, doi = {10.1109/TDSC.2023.3261270}, timestamp = {Mon, 01 Apr 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tdsc/KhanKB24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/LeeL24, author = {Insup Lee and Wonjun Lee}, title = {UniQGAN: Towards Improved Modulation Classification With Adversarial Robustness Using Scalable Generator Design}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {21}, number = {2}, pages = {732--745}, year = {2024}, url = {https://doi.org/10.1109/TDSC.2023.3261983}, doi = {10.1109/TDSC.2023.3261983}, timestamp = {Mon, 01 Apr 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tdsc/LeeL24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/LeeSNCC24, author = {Younho Lee and Jinyeong Seo and Yujin Nam and Jiseok Chae and Jung Hee Cheon}, title = {HEaaN-STAT: {A} Privacy-Preserving Statistical Analysis Toolkit for Large-Scale Numerical, Ordinal, and Categorical Data}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {21}, number = {3}, pages = {1224--1241}, year = {2024}, url = {https://doi.org/10.1109/TDSC.2023.3275649}, doi = {10.1109/TDSC.2023.3275649}, timestamp = {Fri, 31 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tdsc/LeeSNCC24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/LiCJZYLWPL24, author = {Yuwei Li and Yuan Chen and Shouling Ji and Xuhong Zhang and Guanglu Yan and Alex X. Liu and Chunming Wu and Zulie Pan and Peng Lin}, title = {G-Fuzz: {A} Directed Fuzzing Framework for gVisor}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {21}, number = {1}, pages = {168--185}, year = {2024}, url = {https://doi.org/10.1109/TDSC.2023.3244825}, doi = {10.1109/TDSC.2023.3244825}, timestamp = {Sat, 10 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tdsc/LiCJZYLWPL24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/LiCLXXX24, author = {Deqiang Li and Shicheng Cui and Yun Li and Jia Xu and Fu Xiao and Shouhuai Xu}, title = {{PAD:} Towards Principled Adversarial Malware Detection Against Evasion Attacks}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {21}, number = {2}, pages = {920--936}, year = {2024}, url = {https://doi.org/10.1109/TDSC.2023.3265665}, doi = {10.1109/TDSC.2023.3265665}, timestamp = {Mon, 01 Apr 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tdsc/LiCLXXX24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/LiGAKST24, author = {Yi{-}Fan Li and Yang Gao and Gbadebo Ayoade and Latifur Khan and Anoop Singhal and Bhavani Thuraisingham}, title = {Heterogeneous Domain Adaptation for Multistream Classification on Cyber Threat Data}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {21}, number = {1}, pages = {1--11}, year = {2024}, url = {https://doi.org/10.1109/TDSC.2022.3181682}, doi = {10.1109/TDSC.2022.3181682}, timestamp = {Sat, 10 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tdsc/LiGAKST24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/LiLFHHLRQ24, author = {Xiaochen Li and Weiran Liu and Hanwen Feng and Kunzhe Huang and Yuke Hu and Jinfei Liu and Kui Ren and Zhan Qin}, title = {Privacy Enhancement Via Dummy Points in the Shuffle Model}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {21}, number = {3}, pages = {1001--1016}, year = {2024}, url = {https://doi.org/10.1109/TDSC.2023.3263162}, doi = {10.1109/TDSC.2023.3263162}, timestamp = {Fri, 31 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tdsc/LiLFHHLRQ24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/LiLQZSM24, author = {Teng Li and Ximeng Liu and Wei Qiao and Xiongjie Zhu and Yulong Shen and Jianfeng Ma}, title = {T-Trace: Constructing the APTs Provenance Graphs Through Multiple Syslogs Correlation}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {21}, number = {3}, pages = {1179--1195}, year = {2024}, url = {https://doi.org/10.1109/TDSC.2023.3273918}, doi = {10.1109/TDSC.2023.3273918}, timestamp = {Fri, 31 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tdsc/LiLQZSM24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/LiSHLJQ24, author = {Qian Li and Chao Shen and Qingyuan Hu and Chenhao Lin and Xiang Ji and Saiyu Qi}, title = {Towards Gradient-Based Saliency Consensus Training for Adversarial Robustness}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {21}, number = {2}, pages = {530--541}, year = {2024}, url = {https://doi.org/10.1109/TDSC.2022.3184594}, doi = {10.1109/TDSC.2022.3184594}, timestamp = {Mon, 01 Apr 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tdsc/LiSHLJQ24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/LiWZZ24, author = {Sheng Li and Zichi Wang and Xiudong Zhang and Xinpeng Zhang}, title = {Robust Image Steganography Against General Downsampling Operations With Lossless Secret Recovery}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {21}, number = {1}, pages = {340--352}, year = {2024}, url = {https://doi.org/10.1109/TDSC.2023.3253691}, doi = {10.1109/TDSC.2023.3253691}, timestamp = {Mon, 25 Mar 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tdsc/LiWZZ24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/LiZSLJW24, author = {Ruixuan Li and Zhenyong Zhang and Jun Shao and Rongxing Lu and Xiaoqi Jia and Guiyi Wei}, title = {The Potential Harm of Email Delivery: Investigating the {HTTPS} Configurations of Webmail Services}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {21}, number = {1}, pages = {125--138}, year = {2024}, url = {https://doi.org/10.1109/TDSC.2023.3246600}, doi = {10.1109/TDSC.2023.3246600}, timestamp = {Sat, 10 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tdsc/LiZSLJW24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/LiangLXLZWL24, author = {Hongliang Liang and Xiangyu Li and Da Xiao and Jie Liu and Yanjie Zhou and Aibo Wang and Jin Li}, title = {Generative Pre-Trained Transformer-Based Reinforcement Learning for Testing Web Application Firewalls}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {21}, number = {1}, pages = {309--324}, year = {2024}, url = {https://doi.org/10.1109/TDSC.2023.3252523}, doi = {10.1109/TDSC.2023.3252523}, timestamp = {Sat, 10 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tdsc/LiangLXLZWL24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/LiangYCLL24, author = {Hongliang Liang and Xinglin Yu and Xianglin Cheng and Jie Liu and Jin Li}, title = {Multiple Targets Directed Greybox Fuzzing}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {21}, number = {1}, pages = {325--339}, year = {2024}, url = {https://doi.org/10.1109/TDSC.2023.3253120}, doi = {10.1109/TDSC.2023.3253120}, timestamp = {Sat, 10 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tdsc/LiangYCLL24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/LiuHXHR24, author = {Jianwei Liu and Yinghui He and Chaowei Xiao and Jinsong Han and Kui Ren}, title = {Time to Think the Security of WiFi-Based Behavior Recognition Systems}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {21}, number = {1}, pages = {449--462}, year = {2024}, url = {https://doi.org/10.1109/TDSC.2023.3261328}, doi = {10.1109/TDSC.2023.3261328}, timestamp = {Sat, 10 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tdsc/LiuHXHR24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/LiuLCWZMX24, author = {Ziqin Liu and Zhenpeng Lin and Yueqi Chen and Yuhang Wu and Yalong Zou and Dongliang Mu and Xinyu Xing}, title = {Towards Unveiling Exploitation Potential With Multiple Error Behaviors for Kernel Bugs}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {21}, number = {1}, pages = {93--109}, year = {2024}, url = {https://doi.org/10.1109/TDSC.2023.3246170}, doi = {10.1109/TDSC.2023.3246170}, timestamp = {Tue, 02 Apr 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tdsc/LiuLCWZMX24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/LiuYWWL24, author = {Gao Liu and Zheng Yan and Dongliang Wang and Haiguang Wang and Tieyan Li}, title = {DePTVM: Decentralized Pseudonym and Trust Value Management for Integrated Networks}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {21}, number = {1}, pages = {110--124}, year = {2024}, url = {https://doi.org/10.1109/TDSC.2023.3246799}, doi = {10.1109/TDSC.2023.3246799}, timestamp = {Sat, 10 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tdsc/LiuYWWL24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/LiuZZTHHR24, author = {Jianwei Liu and Xiang Zou and Leqi Zhao and Yusheng Tao and Sideng Hu and Jinsong Han and Kui Ren}, title = {Privacy Leakage in Wireless Charging}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {21}, number = {2}, pages = {501--514}, year = {2024}, url = {https://doi.org/10.1109/TDSC.2022.3173063}, doi = {10.1109/TDSC.2022.3173063}, timestamp = {Mon, 01 Apr 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tdsc/LiuZZTHHR24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/LuZR24, author = {Tianpei Lu and Bingsheng Zhang and Kui Ren}, title = {PrivData Network: {A} Privacy-Preserving On-Chain Data Factory and Trading Market}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {21}, number = {3}, pages = {1424--1436}, year = {2024}, url = {https://doi.org/10.1109/TDSC.2023.3284565}, doi = {10.1109/TDSC.2023.3284565}, timestamp = {Fri, 31 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tdsc/LuZR24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/LuoFLKR24, author = {Meng Luo and Bo Feng and Long Lu and Engin Kirda and Kui Ren}, title = {On the Complexity of the Web's {PKI:} Evaluating Certificate Validation of Mobile Browsers}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {21}, number = {1}, pages = {419--433}, year = {2024}, url = {https://doi.org/10.1109/TDSC.2023.3255869}, doi = {10.1109/TDSC.2023.3255869}, timestamp = {Sat, 10 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tdsc/LuoFLKR24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/LuoWY24, author = {Fucai Luo and Haiyan Wang and Xingfu Yan}, title = {Comments on "VERSA: Verifiable Secure Aggregation for Cross-Device Federated Learning"}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {21}, number = {1}, pages = {499--500}, year = {2024}, url = {https://doi.org/10.1109/TDSC.2023.3253082}, doi = {10.1109/TDSC.2023.3253082}, timestamp = {Sat, 10 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tdsc/LuoWY24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/LvWSWQC24, author = {Chunyang Lv and Jianfeng Wang and Shifeng Sun and Yunling Wang and Saiyu Qi and Xiaofeng Chen}, title = {Towards Practical Multi-Client Order-Revealing Encryption: Improvement and Application}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {21}, number = {3}, pages = {1111--1126}, year = {2024}, url = {https://doi.org/10.1109/TDSC.2023.3268652}, doi = {10.1109/TDSC.2023.3268652}, timestamp = {Fri, 31 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tdsc/LvWSWQC24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/MaQGZAXFZAA24, author = {Hua Ma and Huming Qiu and Yansong Gao and Zhi Zhang and Alsharif Abuadbba and Minhui Xue and Anmin Fu and Jiliang Zhang and Said F. Al{-}Sarawi and Derek Abbott}, title = {Quantization Backdoors to Deep Learning Commercial Frameworks}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {21}, number = {3}, pages = {1155--1172}, year = {2024}, url = {https://doi.org/10.1109/TDSC.2023.3271956}, doi = {10.1109/TDSC.2023.3271956}, timestamp = {Fri, 31 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tdsc/MaQGZAXFZAA24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/MadalaDT24, author = {Kaushik Madala and Hyunsook Do and Bastian Tenbergen}, title = {{ADSA} - Association-Driven Safety Analysis to Expose Unknown Safety Issues}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {21}, number = {1}, pages = {216--228}, year = {2024}, url = {https://doi.org/10.1109/TDSC.2023.3248606}, doi = {10.1109/TDSC.2023.3248606}, timestamp = {Sat, 10 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tdsc/MadalaDT24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/MaioranaRSM24, author = {Emanuele Maiorana and Chiara Romano and Emiliano Schena and Carlo Massaroni}, title = {{BIOWISH:} Biometric Recognition Using Wearable Inertial Sensors Detecting Heart Activity}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {21}, number = {2}, pages = {987--1000}, year = {2024}, url = {https://doi.org/10.1109/TDSC.2023.3268360}, doi = {10.1109/TDSC.2023.3268360}, timestamp = {Mon, 01 Apr 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tdsc/MaioranaRSM24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/MeiXXYL24, author = {Lin Mei and Chungen Xu and Lei Xu and Xingliang Yuan and Joseph K. Liu}, title = {Practical Multi-Source Multi-Client Searchable Encryption With Forward Privacy: Refined Security Notion and New Constructions}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {21}, number = {1}, pages = {63--77}, year = {2024}, url = {https://doi.org/10.1109/TDSC.2023.3245638}, doi = {10.1109/TDSC.2023.3245638}, timestamp = {Sat, 10 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tdsc/MeiXXYL24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/OzbayL24, author = {Cavit {\"{O}}zbay and Albert Levi}, title = {Blacklisting Based Anonymous Authentication Scheme for Sharing Economy}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {21}, number = {2}, pages = {828--846}, year = {2024}, url = {https://doi.org/10.1109/TDSC.2023.3263742}, doi = {10.1109/TDSC.2023.3263742}, timestamp = {Mon, 01 Apr 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tdsc/OzbayL24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/PanSWYCLLLR24, author = {Ziyue Pan and Wenbo Shen and Xingkai Wang and Yutian Yang and Rui Chang and Yao Liu and Chengwei Liu and Yang Liu and Kui Ren}, title = {Ambush From All Sides: Understanding Security Threats in Open-Source Software {CI/CD} Pipelines}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {21}, number = {1}, pages = {403--418}, year = {2024}, url = {https://doi.org/10.1109/TDSC.2023.3253572}, doi = {10.1109/TDSC.2023.3253572}, timestamp = {Sat, 10 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tdsc/PanSWYCLLLR24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/Pandith24, author = {Omais Shafi Pandith}, title = {SGXFault: An Efficient Page Fault Handling Mechanism for {SGX} Enclaves}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {21}, number = {3}, pages = {1173--1178}, year = {2024}, url = {https://doi.org/10.1109/TDSC.2023.3268169}, doi = {10.1109/TDSC.2023.3268169}, timestamp = {Fri, 31 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tdsc/Pandith24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/PietrantuonoFP24, author = {Roberto Pietrantuono and Massimo Ficco and Francesco Palmieri}, title = {Testing the Resilience of MEC-Based IoT Applications Against Resource Exhaustion Attacks}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {21}, number = {2}, pages = {804--818}, year = {2024}, url = {https://doi.org/10.1109/TDSC.2023.3263137}, doi = {10.1109/TDSC.2023.3263137}, timestamp = {Mon, 01 Apr 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tdsc/PietrantuonoFP24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/PriscoSP24, author = {Roberto De Prisco and Alfredo De Santis and Francesco Palmieri}, title = {Bounds and Protocols for Graph-Based Distributed Secret Sharing}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {21}, number = {1}, pages = {434--448}, year = {2024}, url = {https://doi.org/10.1109/TDSC.2023.3261239}, doi = {10.1109/TDSC.2023.3261239}, timestamp = {Sat, 10 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tdsc/PriscoSP24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/RenWLLG24, author = {Ge Ren and Jun Wu and Gaolei Li and Shenghong Li and Mohsen Guizani}, title = {Protecting Intellectual Property With Reliable Availability of Learning Models in AI-Based Cybersecurity Services}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {21}, number = {2}, pages = {600--617}, year = {2024}, url = {https://doi.org/10.1109/TDSC.2022.3222972}, doi = {10.1109/TDSC.2022.3222972}, timestamp = {Tue, 07 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tdsc/RenWLLG24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/RoyBAD24, author = {Prithwiraj Roy and Shameek Bhattacharjee and Sahar Abedzadeh and Sajal K. Das}, title = {Noise Resilient Learning for Attack Detection in Smart Grid {PMU} Infrastructure}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {21}, number = {2}, pages = {618--635}, year = {2024}, url = {https://doi.org/10.1109/TDSC.2022.3223288}, doi = {10.1109/TDSC.2022.3223288}, timestamp = {Mon, 01 Apr 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tdsc/RoyBAD24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/SanchezCSIBPS24, author = {Pedro Miguel S{\'{a}}nchez S{\'{a}}nchez and Alberto Huertas Celdr{\'{a}}n and Timo Schenk and Adrian Lars Benjamin Iten and G{\'{e}}r{\^{o}}me Bovet and Gregorio Mart{\'{\i}}nez P{\'{e}}rez and Burkhard Stiller}, title = {Studying the Robustness of Anti-Adversarial Federated Learning Models Detecting Cyberattacks in IoT Spectrum Sensors}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {21}, number = {2}, pages = {573--584}, year = {2024}, url = {https://doi.org/10.1109/TDSC.2022.3204535}, doi = {10.1109/TDSC.2022.3204535}, timestamp = {Mon, 15 Apr 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tdsc/SanchezCSIBPS24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/SarmadiFKGK24, author = {Alireza Sarmadi and Hao Fu and Prashanth Krishnamurthy and Siddharth Garg and Farshad Khorrami}, title = {Privacy-Preserving Collaborative Learning Through Feature Extraction}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {21}, number = {1}, pages = {486--498}, year = {2024}, url = {https://doi.org/10.1109/TDSC.2023.3263507}, doi = {10.1109/TDSC.2023.3263507}, timestamp = {Sat, 10 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tdsc/SarmadiFKGK24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/SharmaLMPGG24, author = {Shantanu Sharma and Yin Li and Sharad Mehrotra and Nisha Panwar and Peeyush Gupta and Dhrubajyoti Ghosh}, title = {Prism: Privacy-Preserving and Verifiable Set Computation Over Multi-Owner Secret Shared Outsourced Databases}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {21}, number = {3}, pages = {1355--1371}, year = {2024}, url = {https://doi.org/10.1109/TDSC.2023.3279356}, doi = {10.1109/TDSC.2023.3279356}, timestamp = {Fri, 31 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tdsc/SharmaLMPGG24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/ShenLWLBLXR24, author = {Yijie Shen and Feng Lin and Chao Wang and Tiantian Liu and Zhongjie Ba and Li Lu and Wenyao Xu and Kui Ren}, title = {MotoPrint: Reconfigurable Vibration Motor Fingerprint via Homologous Signals Learning}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {21}, number = {1}, pages = {372--387}, year = {2024}, url = {https://doi.org/10.1109/TDSC.2023.3253507}, doi = {10.1109/TDSC.2023.3253507}, timestamp = {Sat, 10 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tdsc/ShenLWLBLXR24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/SiaJSB24, author = {Jayson Sia and Edmond A. Jonckheere and Laith Shalalfeh and Paul Bogdan}, title = {Phasor Measurement Unit Change-Point Detection of Frequency Hurst Exponent Anomaly With Time-to-Event}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {21}, number = {2}, pages = {819--827}, year = {2024}, url = {https://doi.org/10.1109/TDSC.2023.3262825}, doi = {10.1109/TDSC.2023.3262825}, timestamp = {Mon, 01 Apr 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tdsc/SiaJSB24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/SongTRXLWG24, author = {Qun Song and Rui Tan and Chao Ren and Yan Xu and Yang Lou and Jianping Wang and Hoay Beng Gooi}, title = {On Credibility of Adversarial Examples Against Learning-Based Grid Voltage Stability Assessment}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {21}, number = {2}, pages = {585--599}, year = {2024}, url = {https://doi.org/10.1109/TDSC.2022.3213012}, doi = {10.1109/TDSC.2022.3213012}, timestamp = {Sat, 27 Apr 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tdsc/SongTRXLWG24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/TanYLHC24, author = {Shuaishuai Tan and Shui Yu and Wenyin Liu and Daojing He and Sammy Chan}, title = {You Can Glimpse but You Cannot Identify: Protect IoT Devices From Being Fingerprinted}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {21}, number = {3}, pages = {1210--1223}, year = {2024}, url = {https://doi.org/10.1109/TDSC.2023.3275850}, doi = {10.1109/TDSC.2023.3275850}, timestamp = {Fri, 31 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tdsc/TanYLHC24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/TianZHLZLR24, author = {Zhihua Tian and Rui Zhang and Xiaoyang Hou and Lingjuan Lyu and Tianyi Zhang and Jian Liu and Kui Ren}, title = {{\textdollar}\{{\textbackslash}sf FederBoost\}{\textdollar}: Private Federated Learning for {GBDT}}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {21}, number = {3}, pages = {1274--1285}, year = {2024}, url = {https://doi.org/10.1109/TDSC.2023.3276365}, doi = {10.1109/TDSC.2023.3276365}, timestamp = {Fri, 31 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tdsc/TianZHLZLR24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/Tripathi24, author = {Nikhil Tripathi}, title = {Delays Have Dangerous Ends: Slow {HTTP/2} DoS Attacks Into the Wild and Their Real-Time Detection Using Event Sequence Analysis}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {21}, number = {3}, pages = {1244--1256}, year = {2024}, url = {https://doi.org/10.1109/TDSC.2023.3276062}, doi = {10.1109/TDSC.2023.3276062}, timestamp = {Fri, 31 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tdsc/Tripathi24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/VhaduriCD24, author = {Sudip Vhaduri and William Cheung and Sayanton V. Dibbo}, title = {Bag of On-Phone ANNs to Secure IoT Objects Using Wearable and Smartphone Biometrics}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {21}, number = {3}, pages = {1127--1138}, year = {2024}, url = {https://doi.org/10.1109/TDSC.2023.3269037}, doi = {10.1109/TDSC.2023.3269037}, timestamp = {Fri, 31 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tdsc/VhaduriCD24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/VugrinHCGTP24, author = {Eric D. Vugrin and Seth Hanson and Jerry Cruz and Casey Glatter and Thomas D. Tarman and Ali Pinar}, title = {Experimental Validation of a Command and Control Traffic Detection Model}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {21}, number = {3}, pages = {1084--1097}, year = {2024}, url = {https://doi.org/10.1109/TDSC.2023.3266139}, doi = {10.1109/TDSC.2023.3266139}, timestamp = {Fri, 31 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tdsc/VugrinHCGTP24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/WangGGYN24, author = {Ping Wang and Haichang Gao and Xiaoyan Guo and Zhongni Yuan and Jiawei Nian}, title = {Improving the Security of Audio CAPTCHAs With Adversarial Examples}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {21}, number = {2}, pages = {650--667}, year = {2024}, url = {https://doi.org/10.1109/TDSC.2023.3236367}, doi = {10.1109/TDSC.2023.3236367}, timestamp = {Sat, 27 Apr 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tdsc/WangGGYN24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/WangLYML24, author = {Yuchen Wang and Xiaoguang Li and Li Yang and Jianfeng Ma and Hui Li}, title = {{ADDITION:} Detecting Adversarial Examples With Image-Dependent Noise Reduction}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {21}, number = {3}, pages = {1139--1154}, year = {2024}, url = {https://doi.org/10.1109/TDSC.2023.3269012}, doi = {10.1109/TDSC.2023.3269012}, timestamp = {Fri, 31 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tdsc/WangLYML24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/WangSLWJWL24, author = {Jie Wang and Kun Sun and Lingguang Lei and Yuewu Wang and Jiwu Jing and Shengye Wan and Qi Li}, title = {CacheIEE: Cache-Assisted Isolated Execution Environment on {ARM} Multi-Core Platforms}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {21}, number = {1}, pages = {254--269}, year = {2024}, url = {https://doi.org/10.1109/TDSC.2023.3251418}, doi = {10.1109/TDSC.2023.3251418}, timestamp = {Sat, 10 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tdsc/WangSLWJWL24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/WeiLDMJP24, author = {Kang Wei and Jun Li and Ming Ding and Chuan Ma and Yo{-}Seb Jeon and H. Vincent Poor}, title = {Covert Model Poisoning Against Federated Learning: Algorithm Design and Optimization}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {21}, number = {3}, pages = {1196--1209}, year = {2024}, url = {https://doi.org/10.1109/TDSC.2023.3274119}, doi = {10.1109/TDSC.2023.3274119}, timestamp = {Fri, 31 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tdsc/WeiLDMJP24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/WuFLYSX24, author = {Liqiang Wu and Shaojing Fu and Yuchuan Luo and Hongyang Yan and Heyuan Shi and Ming Xu}, title = {A Robust and Lightweight Privacy-Preserving Data Aggregation Scheme for Smart Grid}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {21}, number = {1}, pages = {270--283}, year = {2024}, url = {https://doi.org/10.1109/TDSC.2023.3252593}, doi = {10.1109/TDSC.2023.3252593}, timestamp = {Fri, 22 Mar 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tdsc/WuFLYSX24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/WuWJPBP24, author = {Lichao Wu and Yoo{-}Seung Won and Dirmanto Jap and Guilherme Perin and Shivam Bhasin and Stjepan Picek}, title = {Ablation Analysis for Multi-Device Deep Learning-Based Physical Side-Channel Analysis}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {21}, number = {3}, pages = {1331--1341}, year = {2024}, url = {https://doi.org/10.1109/TDSC.2023.3278857}, doi = {10.1109/TDSC.2023.3278857}, timestamp = {Fri, 31 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tdsc/WuWJPBP24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/XingWTZLS24, author = {Yunlong Xing and Xinda Wang and Sadegh Torabi and Zeyu Zhang and Lingguang Lei and Kun Sun}, title = {A Hybrid System Call Profiling Approach for Container Protection}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {21}, number = {3}, pages = {1068--1083}, year = {2024}, url = {https://doi.org/10.1109/TDSC.2023.3268124}, doi = {10.1109/TDSC.2023.3268124}, timestamp = {Fri, 31 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tdsc/XingWTZLS24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/XuMSLZ24, author = {Wenhan Xu and Hui Ma and Zishuai Song and Jianhao Li and Rui Zhang}, title = {Gringotts: An Encrypted Version Control System With Less Trust on Servers}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {21}, number = {2}, pages = {668--684}, year = {2024}, url = {https://doi.org/10.1109/TDSC.2023.3251365}, doi = {10.1109/TDSC.2023.3251365}, timestamp = {Mon, 01 Apr 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tdsc/XuMSLZ24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/XueYZSMWZ24, author = {Yinxing Xue and Jiaming Ye and Wei Zhang and Jun Sun and Lei Ma and Haijun Wang and Jianjun Zhao}, title = {xFuzz: Machine Learning Guided Cross-Contract Fuzzing}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {21}, number = {2}, pages = {515--529}, year = {2024}, url = {https://doi.org/10.1109/TDSC.2022.3182373}, doi = {10.1109/TDSC.2022.3182373}, timestamp = {Mon, 01 Apr 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tdsc/XueYZSMWZ24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/YanLZWLZLL24, author = {Haonan Yan and Xiaoguang Li and Wenjing Zhang and Rui Wang and Hui Li and Xingwen Zhao and Fenghua Li and Xiaodong Lin}, title = {Automatic Evasion of Machine Learning-Based Network Intrusion Detection Systems}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {21}, number = {1}, pages = {153--167}, year = {2024}, url = {https://doi.org/10.1109/TDSC.2023.3247585}, doi = {10.1109/TDSC.2023.3247585}, timestamp = {Tue, 07 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tdsc/YanLZWLZLL24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/YanNZLGW24, author = {Xingfu Yan and Wing W. Y. Ng and Bowen Zhao and Yuxian Liu and Ying Gao and Xiumin Wang}, title = {Fog-Enabled Privacy-Preserving Multi-Task Data Aggregation for Mobile Crowdsensing}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {21}, number = {3}, pages = {1301--1316}, year = {2024}, url = {https://doi.org/10.1109/TDSC.2023.3277831}, doi = {10.1109/TDSC.2023.3277831}, timestamp = {Fri, 31 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tdsc/YanNZLGW24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/YanYHLH24, author = {Hongyang Yan and Anli Yan and Li Hu and Jiaming Liang and Haibo Hu}, title = {MTL-Leak: Privacy Risk Assessment in Multi-Task Learning}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {21}, number = {1}, pages = {204--215}, year = {2024}, url = {https://doi.org/10.1109/TDSC.2023.3247869}, doi = {10.1109/TDSC.2023.3247869}, timestamp = {Sat, 10 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tdsc/YanYHLH24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/YangH24, author = {Benyuan Yang and Hesuan Hu}, title = {Delegation Security Analysis in Workflow Systems}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {21}, number = {1}, pages = {229--240}, year = {2024}, url = {https://doi.org/10.1109/TDSC.2023.3248602}, doi = {10.1109/TDSC.2023.3248602}, timestamp = {Sat, 10 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tdsc/YangH24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/YangWTLWZY24, author = {Yaxi Yang and Jian Weng and Yao Tong and Jia{-}Nan Liu and Zhenghao Wu and Leo Yu Zhang and Anjia Yang}, title = {PriGenX: Privacy-Preserving Query With Anonymous Access Control for Genomic Data}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {21}, number = {2}, pages = {961--974}, year = {2024}, url = {https://doi.org/10.1109/TDSC.2023.3266292}, doi = {10.1109/TDSC.2023.3266292}, timestamp = {Mon, 01 Apr 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tdsc/YangWTLWZY24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/YangWYFZ24, author = {Tianyu Yang and Hanzhou Wu and Biao Yi and Guorui Feng and Xinpeng Zhang}, title = {Semantic-Preserving Linguistic Steganography by Pivot Translation and Semantic-Aware Bins Coding}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {21}, number = {1}, pages = {139--152}, year = {2024}, url = {https://doi.org/10.1109/TDSC.2023.3247493}, doi = {10.1109/TDSC.2023.3247493}, timestamp = {Sat, 10 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tdsc/YangWYFZ24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/YangXCWZ24, author = {Jungang Yang and Liyao Xiang and Pengzhi Chu and Xinbing Wang and Chenghu Zhou}, title = {Certified Distributional Robustness on Smoothed Classifiers}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {21}, number = {2}, pages = {876--888}, year = {2024}, url = {https://doi.org/10.1109/TDSC.2023.3264850}, doi = {10.1109/TDSC.2023.3264850}, timestamp = {Mon, 01 Apr 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tdsc/YangXCWZ24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/YeLNYSJ24, author = {Zipeng Ye and Wenjian Luo and Muhammad Luqman Naseem and Xiangkai Yang and Yuhui Shi and Yan Jia}, title = {{C2FMI:} Corse-to-Fine Black-Box Model Inversion Attack}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {21}, number = {3}, pages = {1437--1450}, year = {2024}, url = {https://doi.org/10.1109/TDSC.2023.3285071}, doi = {10.1109/TDSC.2023.3285071}, timestamp = {Fri, 31 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tdsc/YeLNYSJ24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/ZdunQSSCJJ24, author = {Uwe Zdun and Pierre{-}Jean Queval and Georg Simhandl and Riccardo Scandariato and Somik Chakravarty and Marjan Jelic and Aleksandar S. Jovanovic}, title = {Detection Strategies for Microservice Security Tactics}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {21}, number = {3}, pages = {1257--1273}, year = {2024}, url = {https://doi.org/10.1109/TDSC.2023.3276487}, doi = {10.1109/TDSC.2023.3276487}, timestamp = {Fri, 31 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tdsc/ZdunQSSCJJ24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/ZhangD24, author = {Jianhong Zhang and Chenghe Dong}, title = {On the Security of Lightweight and Escrow-Free Certificate-Based Data Aggregation for Smart Grid}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {21}, number = {3}, pages = {1242--1243}, year = {2024}, url = {https://doi.org/10.1109/TDSC.2023.3275972}, doi = {10.1109/TDSC.2023.3275972}, timestamp = {Fri, 31 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tdsc/ZhangD24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/ZhangJPSFLW24, author = {Yi Zhang and Xiaofeng Jia and Bianjing Pan and Jun Shao and Liming Fang and Rongxing Lu and Guiyi Wei}, title = {Anonymous Multi-Hop Payment for Payment Channel Networks}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {21}, number = {1}, pages = {476--485}, year = {2024}, url = {https://doi.org/10.1109/TDSC.2023.3262681}, doi = {10.1109/TDSC.2023.3262681}, timestamp = {Sat, 10 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tdsc/ZhangJPSFLW24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/ZhangLKWWL24, author = {Runnan Zhang and Gang Liu and Hongzhaoning Kang and Quan Wang and Bo Wan and Nan Luo}, title = {Anonymity in Attribute-Based Access Control: Framework and Metric}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {21}, number = {1}, pages = {463--475}, year = {2024}, url = {https://doi.org/10.1109/TDSC.2023.3261309}, doi = {10.1109/TDSC.2023.3261309}, timestamp = {Sat, 10 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tdsc/ZhangLKWWL24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/ZhangLLXL24, author = {Di Zhang and Junqing Le and Xinyu Lei and Tao Xiang and Xiaofeng Liao}, title = {Secure Redactable Blockchain With Dynamic Support}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {21}, number = {2}, pages = {717--731}, year = {2024}, url = {https://doi.org/10.1109/TDSC.2023.3261343}, doi = {10.1109/TDSC.2023.3261343}, timestamp = {Sat, 27 Apr 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tdsc/ZhangLLXL24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/ZhangLLYZKG24, author = {Zijian Zhang and Xuyang Liu and Meng Li and Hao Yin and Liehuang Zhu and Bakh Khoussainov and Keke Gai}, title = {{HCA:} Hashchain-Based Consensus Acceleration Via Re-Voting}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {21}, number = {2}, pages = {775--788}, year = {2024}, url = {https://doi.org/10.1109/TDSC.2023.3262283}, doi = {10.1109/TDSC.2023.3262283}, timestamp = {Mon, 01 Apr 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tdsc/ZhangLLYZKG24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/ZhangZZ24, author = {Xiaokuan Zhang and Yang Zhang and Yinqian Zhang}, title = {VeriTrain: Validating MLaaS Training Efforts via Anomaly Detection}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {21}, number = {3}, pages = {1032--1049}, year = {2024}, url = {https://doi.org/10.1109/TDSC.2023.3266427}, doi = {10.1109/TDSC.2023.3266427}, timestamp = {Fri, 31 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tdsc/ZhangZZ24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/ZhaoJXTWWLZLWB24, author = {Binbin Zhao and Shouling Ji and Jiacheng Xu and Yuan Tian and Qiuyang Wei and Qinying Wang and Chenyang Lyu and Xuhong Zhang and Changting Lin and Jingzheng Wu and Raheem Beyah}, title = {One Bad Apple Spoils the Barrel: Understanding the Security Risks Introduced by Third-Party Components in IoT Firmware}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {21}, number = {3}, pages = {1372--1389}, year = {2024}, url = {https://doi.org/10.1109/TDSC.2023.3279846}, doi = {10.1109/TDSC.2023.3279846}, timestamp = {Fri, 31 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tdsc/ZhaoJXTWWLZLWB24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/ZhengHZG24, author = {Jian Zheng and Huawei Huang and Zibin Zheng and Song Guo}, title = {Adaptive Double-Spending Attacks on PoW-Based Blockchains}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {21}, number = {3}, pages = {1098--1110}, year = {2024}, url = {https://doi.org/10.1109/TDSC.2023.3268668}, doi = {10.1109/TDSC.2023.3268668}, timestamp = {Fri, 31 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tdsc/ZhengHZG24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/ZhengZWHJYW24, author = {Yifeng Zheng and Menglun Zhou and Songlei Wang and Hejiao Huang and Xiaohua Jia and Xun Yi and Cong Wang}, title = {SecDR: Enabling Secure, Efficient, and Accurate Data Recovery for Mobile Crowdsensing}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {21}, number = {2}, pages = {789--803}, year = {2024}, url = {https://doi.org/10.1109/TDSC.2023.3262268}, doi = {10.1109/TDSC.2023.3262268}, timestamp = {Mon, 01 Apr 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tdsc/ZhengZWHJYW24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/ZhouAAAA24, author = {Xugui Zhou and Bulbul Ahmed and James H. Aylor and Philip Asare and Homa Alemzadeh}, title = {Hybrid Knowledge and Data Driven Synthesis of Runtime Monitors for Cyber-Physical Systems}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {21}, number = {1}, pages = {12--30}, year = {2024}, url = {https://doi.org/10.1109/TDSC.2023.3242653}, doi = {10.1109/TDSC.2023.3242653}, timestamp = {Sat, 10 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tdsc/ZhouAAAA24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/ZhouZYYZ24, author = {Shuai Zhou and Tianqing Zhu and Dayong Ye and Xin Yu and Wanlei Zhou}, title = {Boosting Model Inversion Attacks With Adversarial Examples}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {21}, number = {3}, pages = {1451--1468}, year = {2024}, url = {https://doi.org/10.1109/TDSC.2023.3285015}, doi = {10.1109/TDSC.2023.3285015}, timestamp = {Fri, 31 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tdsc/ZhouZYYZ24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/ZhuZHLFS24, author = {Dan Zhu and Hui Zhu and Cheng Huang and Rongxing Lu and Dengguo Feng and Xuemin Shen}, title = {Efficient and Accurate Cloud-Assisted Medical Pre-Diagnosis With Privacy Preservation}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {21}, number = {2}, pages = {860--875}, year = {2024}, url = {https://doi.org/10.1109/TDSC.2023.3263974}, doi = {10.1109/TDSC.2023.3263974}, timestamp = {Mon, 01 Apr 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tdsc/ZhuZHLFS24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.