- Shahid Khan, Joost-Pieter Katoen, Marc Bouissou:
A Compositional Semantics of Boolean-Logic Driven Markov Processes. IEEE Trans. Dependable Secur. Comput. 21(2): 701-716 (2024) - Insup Lee, Wonjun Lee:
UniQGAN: Towards Improved Modulation Classification With Adversarial Robustness Using Scalable Generator Design. IEEE Trans. Dependable Secur. Comput. 21(2): 732-745 (2024) - Younho Lee, Jinyeong Seo, Yujin Nam, Jiseok Chae, Jung Hee Cheon:
HEaaN-STAT: A Privacy-Preserving Statistical Analysis Toolkit for Large-Scale Numerical, Ordinal, and Categorical Data. IEEE Trans. Dependable Secur. Comput. 21(3): 1224-1241 (2024) - Yuwei Li, Yuan Chen, Shouling Ji, Xuhong Zhang, Guanglu Yan, Alex X. Liu, Chunming Wu, Zulie Pan, Peng Lin:
G-Fuzz: A Directed Fuzzing Framework for gVisor. IEEE Trans. Dependable Secur. Comput. 21(1): 168-185 (2024) - Deqiang Li, Shicheng Cui, Yun Li, Jia Xu, Fu Xiao, Shouhuai Xu:
PAD: Towards Principled Adversarial Malware Detection Against Evasion Attacks. IEEE Trans. Dependable Secur. Comput. 21(2): 920-936 (2024) - Yi-Fan Li, Yang Gao, Gbadebo Ayoade, Latifur Khan, Anoop Singhal, Bhavani Thuraisingham:
Heterogeneous Domain Adaptation for Multistream Classification on Cyber Threat Data. IEEE Trans. Dependable Secur. Comput. 21(1): 1-11 (2024) - Xiaochen Li, Weiran Liu, Hanwen Feng, Kunzhe Huang, Yuke Hu, Jinfei Liu, Kui Ren, Zhan Qin:
Privacy Enhancement Via Dummy Points in the Shuffle Model. IEEE Trans. Dependable Secur. Comput. 21(3): 1001-1016 (2024) - Teng Li, Ximeng Liu, Wei Qiao, Xiongjie Zhu, Yulong Shen, Jianfeng Ma:
T-Trace: Constructing the APTs Provenance Graphs Through Multiple Syslogs Correlation. IEEE Trans. Dependable Secur. Comput. 21(3): 1179-1195 (2024) - Qian Li, Chao Shen, Qingyuan Hu, Chenhao Lin, Xiang Ji, Saiyu Qi:
Towards Gradient-Based Saliency Consensus Training for Adversarial Robustness. IEEE Trans. Dependable Secur. Comput. 21(2): 530-541 (2024) - Sheng Li, Zichi Wang, Xiudong Zhang, Xinpeng Zhang:
Robust Image Steganography Against General Downsampling Operations With Lossless Secret Recovery. IEEE Trans. Dependable Secur. Comput. 21(1): 340-352 (2024) - Ruixuan Li, Zhenyong Zhang, Jun Shao, Rongxing Lu, Xiaoqi Jia, Guiyi Wei:
The Potential Harm of Email Delivery: Investigating the HTTPS Configurations of Webmail Services. IEEE Trans. Dependable Secur. Comput. 21(1): 125-138 (2024) - Hongliang Liang, Xiangyu Li, Da Xiao, Jie Liu, Yanjie Zhou, Aibo Wang, Jin Li:
Generative Pre-Trained Transformer-Based Reinforcement Learning for Testing Web Application Firewalls. IEEE Trans. Dependable Secur. Comput. 21(1): 309-324 (2024) - Hongliang Liang, Xinglin Yu, Xianglin Cheng, Jie Liu, Jin Li:
Multiple Targets Directed Greybox Fuzzing. IEEE Trans. Dependable Secur. Comput. 21(1): 325-339 (2024) - Jianwei Liu, Yinghui He, Chaowei Xiao, Jinsong Han, Kui Ren:
Time to Think the Security of WiFi-Based Behavior Recognition Systems. IEEE Trans. Dependable Secur. Comput. 21(1): 449-462 (2024) - Ziqin Liu, Zhenpeng Lin, Yueqi Chen, Yuhang Wu, Yalong Zou, Dongliang Mu, Xinyu Xing:
Towards Unveiling Exploitation Potential With Multiple Error Behaviors for Kernel Bugs. IEEE Trans. Dependable Secur. Comput. 21(1): 93-109 (2024) - Gao Liu, Zheng Yan, Dongliang Wang, Haiguang Wang, Tieyan Li:
DePTVM: Decentralized Pseudonym and Trust Value Management for Integrated Networks. IEEE Trans. Dependable Secur. Comput. 21(1): 110-124 (2024) - Jianwei Liu, Xiang Zou, Leqi Zhao, Yusheng Tao, Sideng Hu, Jinsong Han, Kui Ren:
Privacy Leakage in Wireless Charging. IEEE Trans. Dependable Secur. Comput. 21(2): 501-514 (2024) - Tianpei Lu, Bingsheng Zhang, Kui Ren:
PrivData Network: A Privacy-Preserving On-Chain Data Factory and Trading Market. IEEE Trans. Dependable Secur. Comput. 21(3): 1424-1436 (2024) - Meng Luo, Bo Feng, Long Lu, Engin Kirda, Kui Ren:
On the Complexity of the Web's PKI: Evaluating Certificate Validation of Mobile Browsers. IEEE Trans. Dependable Secur. Comput. 21(1): 419-433 (2024) - Fucai Luo, Haiyan Wang, Xingfu Yan:
Comments on "VERSA: Verifiable Secure Aggregation for Cross-Device Federated Learning". IEEE Trans. Dependable Secur. Comput. 21(1): 499-500 (2024) - Chunyang Lv, Jianfeng Wang, Shifeng Sun, Yunling Wang, Saiyu Qi, Xiaofeng Chen:
Towards Practical Multi-Client Order-Revealing Encryption: Improvement and Application. IEEE Trans. Dependable Secur. Comput. 21(3): 1111-1126 (2024) - Hua Ma, Huming Qiu, Yansong Gao, Zhi Zhang, Alsharif Abuadbba, Minhui Xue, Anmin Fu, Jiliang Zhang, Said F. Al-Sarawi, Derek Abbott:
Quantization Backdoors to Deep Learning Commercial Frameworks. IEEE Trans. Dependable Secur. Comput. 21(3): 1155-1172 (2024) - Kaushik Madala, Hyunsook Do, Bastian Tenbergen:
ADSA - Association-Driven Safety Analysis to Expose Unknown Safety Issues. IEEE Trans. Dependable Secur. Comput. 21(1): 216-228 (2024) - Emanuele Maiorana, Chiara Romano, Emiliano Schena, Carlo Massaroni:
BIOWISH: Biometric Recognition Using Wearable Inertial Sensors Detecting Heart Activity. IEEE Trans. Dependable Secur. Comput. 21(2): 987-1000 (2024) - Lin Mei, Chungen Xu, Lei Xu, Xingliang Yuan, Joseph K. Liu:
Practical Multi-Source Multi-Client Searchable Encryption With Forward Privacy: Refined Security Notion and New Constructions. IEEE Trans. Dependable Secur. Comput. 21(1): 63-77 (2024) - Cavit Özbay, Albert Levi:
Blacklisting Based Anonymous Authentication Scheme for Sharing Economy. IEEE Trans. Dependable Secur. Comput. 21(2): 828-846 (2024) - Ziyue Pan, Wenbo Shen, Xingkai Wang, Yutian Yang, Rui Chang, Yao Liu, Chengwei Liu, Yang Liu, Kui Ren:
Ambush From All Sides: Understanding Security Threats in Open-Source Software CI/CD Pipelines. IEEE Trans. Dependable Secur. Comput. 21(1): 403-418 (2024) - Omais Shafi Pandith:
SGXFault: An Efficient Page Fault Handling Mechanism for SGX Enclaves. IEEE Trans. Dependable Secur. Comput. 21(3): 1173-1178 (2024) - Roberto Pietrantuono, Massimo Ficco, Francesco Palmieri:
Testing the Resilience of MEC-Based IoT Applications Against Resource Exhaustion Attacks. IEEE Trans. Dependable Secur. Comput. 21(2): 804-818 (2024) - Roberto De Prisco, Alfredo De Santis, Francesco Palmieri:
Bounds and Protocols for Graph-Based Distributed Secret Sharing. IEEE Trans. Dependable Secur. Comput. 21(1): 434-448 (2024)