


default search action
IEEE Transactions on Dependable and Secure Computing, Volume 19
Volume 19, Number 1, January - February 2022
- Ayyoob Hamza
, Dinesha Ranathunga
, Hassan Habibi Gharakheili
, Theophilus A. Benson
, Matthew Roughan
, Vijay Sivaraman
:
Verifying and Monitoring IoTs Network Behavior Using MUD Profiles. 1-18 - Zhou Su
, Yuntao Wang
, Qichao Xu
, Ning Zhang
:
LVBS: Lightweight Vehicular Blockchain for Secure Data Sharing in Disaster Rescue. 19-32 - Dan Brownstein
, Shlomi Dolev
, Muni Venkateswarlu Kumaramangalam
:
Self-Stabilizing Secure Computation. 33-38 - Mohamed Baza, Mahmoud Nabil, Mohamed M. E. A. Mahmoud, Niclas Bewermeier, Kemal Fidan, Waleed Alasmary, Mohamed Abdallah:
Detecting Sybil Attacks Using Proofs of Work and Location in VANETs. 39-53 - Gurjit Singh Walia
, Kartik Aggarwal
, Kuldeep Singh
, Kunwar Singh:
Design and Analysis of Adaptive Graph-Based Cancelable Multi-Biometrics Approach. 54-66 - Jin Li
, Heng Ye
, Tong Li
, Wei Wang
, Wenjing Lou
, Y. Thomas Hou
, Jiqiang Liu
, Rongxing Lu
:
Efficient and Secure Outsourcing of Differentially Private Data Publishing With Multiple Evaluators. 67-76 - Yao Cheng
, Chang Xu
, Zhen Hai
, Yingjiu Li
:
DeepMnemonic: Password Mnemonic Generation via Deep Attentive Encoder-Decoder Model. 77-90 - Rui Li
, Alex X. Liu
, Huanle Xu
, Ying Liu, Huaqiang Yuan:
Adaptive Secure Nearest Neighbor Query Processing Over Encrypted Data. 91-106 - Guillermo Suarez-Tangil
, Gianluca Stringhini:
Eight Years of Rider Measurement in the Android Malware Ecosystem. 107-118 - Yannan Li
, Willy Susilo
, Guomin Yang
, Yong Yu
, Dongxi Liu, Xiaojiang Du
, Mohsen Guizani
:
A Blockchain-Based Self-Tallying Voting Protocol in Decentralized IoT. 119-130 - Qingyu Yang, Donghe Li, Dou An, Wei Yu
, Xinwen Fu
, Xinyu Yang, Wei Zhao
:
Towards Incentive for Electrical Vehicles Demand Response With Location Privacy Guaranteeing in Microgrids. 131-148 - Jinhua Ma
, Xinyi Huang
, Yi Mu
, Robert H. Deng
:
Authenticated Data Redaction With Accountability and Transparency. 149-160 - Mohamad Chehab
, Azzam Mourad
:
LP-SBA-XACML: Lightweight Semantics Based Scheme Enabling Intelligent Behavior-Aware Privacy for IoT. 161-175 - Sateesh Kumar Awasthi
, Yatindra Nath Singh
:
AbsoluteTrust: Algorithm for Aggregation of Trust in Peer-to-Peer Networks. 176-189 - Yanhua Du
, Yang Wang, Benyuan Yang
, Hesuan Hu
:
Analyzing Security Requirements in Timed Workflow Processes. 190-207 - Xing Gao
, Guannan Liu
, Zhang Xu, Haining Wang
, Li Li, Xiaorui Wang
:
Investigating Security Vulnerabilities in a Hot Data Center with Reduced Cooling Redundancy. 208-226 - Ahmad Samer Wazan
, Romain Laborde
, David W. Chadwick
, Rémi Venant, Abdelmalek Benzekri, Eddie Billoir
, Omar Alfandi
:
On the Validation of Web X.509 Certificates by TLS Interception Products. 227-242 - Lucas Palazzi
, Guanpeng Li
, Bo Fang, Karthik Pattabiraman
:
Improving the Accuracy of IR-Level Fault Injection. 243-258 - Yuchen Zhao
, Isabel Wagner
:
Using Metrics Suites to Improve the Measurement of Privacy in Graphs. 259-274 - Kyungmin Go
, Il-Gu Lee, Sungwon Kang
, Myungchul Kim
:
Secure Video Transmission Framework for Battery-Powered Video Devices. 275-287 - Fritz Previlon
, Charu Kalra
, Devesh Tiwari, David R. Kaeli
:
Characterizing and Exploiting Soft Error Vulnerability Phase Behavior in GPU Applications. 288-300 - Cheng Wang
, Hangyu Zhu
:
Representing Fine-Grained Co-Occurrences for Behavior-Based Fraud Detection in Online Payment Services. 301-315 - Dezhi Han
, Nannan Pan
, Kuan-Ching Li
:
A Traceable and Revocable Ciphertext-Policy Attribute-based Encryption Scheme Based on Privacy Protection. 316-327 - Cong Zuo
, Shifeng Sun
, Joseph K. Liu
, Jun Shao
, Josef Pieprzyk
, Lei Xu
:
Forward and Backward Private DSSE for Range Queries. 328-338 - Rajorshi Biswas
, Jie Wu
:
Optimal Filter Assignment Policy Against Distributed Denial-of-Service Attack. 339-352 - Ruimin Sun
, Marcus Botacin
, Nikolaos Sapountzis, Xiaoyong Yuan
, Matt Bishop
, Donald E. Porter, Xiaolin Li
, Andre Gregio
, Daniela Oliveira
:
A Praise for Defensive Programming: Leveraging Uncertainty for Effective Malware Mitigation. 353-369 - Yunqing Sun, Jin Cao
, Maode Ma
, Yinghui Zhang
, Hui Li
, Ben Niu
:
EAP-DDBA: Efficient Anonymity Proximity Device Discovery and Batch Authentication Mechanism for Massive D2D Communication Devices in 3GPP 5G HetNet. 370-387 - Yanguo Peng
, Long Wang
, Jiangtao Cui
, Ximeng Liu
, Hui Li
, Jianfeng Ma:
LS-RQ: A Lightweight and Forward-Secure Range Query on Geographically Encrypted Data. 388-401 - Sadegh Torabi
, Elias Bou-Harb
, Chadi Assi
, ElMouatez Billah Karbab, Amine Boukhtouta, Mourad Debbabi
:
Inferring and Investigating IoT-Generated Scanning Campaigns Targeting a Large Network Telescope. 402-418 - Yansong Gao
, Marten van Dijk, Lei Xu
, Wei Yang
, Surya Nepal
, Damith C. Ranasinghe
:
TREVERSE: TRial-and-Error Lightweight Secure ReVERSE Authentication With Simulatable PUFs. 419-437 - Shigang Liu
, Guanjun Lin
, Lizhen Qu, Jun Zhang
, Olivier Y. de Vel, Paul Montague, Yang Xiang
:
CD-VulD: Cross-Domain Vulnerability Discovery Based on Deep Domain Adaptation. 438-451 - Shifeng Sun
, Cong Zuo
, Joseph K. Liu
, Amin Sakzad
, Ron Steinfeld, Tsz Hon Yuen
, Xingliang Yuan
, Dawu Gu
:
Non-Interactive Multi-Client Searchable Encryption: Realization and Implementation. 452-467 - Lotfi Ben Othmane
, Lalitha Dhulipala, Moataz AbdelKhalek, Nicholas J. Multari
, Manimaran Govindarasu:
On the Performance of Detecting Injection of Fabricated Messages into the CAN Bus. 468-481 - Dinesha Ranathunga
, Matthew Roughan
, Hung X. Nguyen
:
Verifiable Policy-Defined Networking Using Metagraphs. 482-494 - Felix Erlacher
, Falko Dressler
:
On High-Speed Flow-Based Intrusion Detection Using Snort-Compatible Signatures. 495-506 - Chenyu Wang, Ding Wang
, Yi Tu
, Guoai Xu
, Huaxiong Wang
:
Understanding Node Capture Attacks in User Authentication Schemes for Wireless Sensor Networks. 507-523 - Naman Patel
, Prashanth Krishnamurthy
, Hussam Amrouch
, Jörg Henkel
, Michael Shamouilian
, Ramesh Karri
, Farshad Khorrami
:
Towards a New Thermal Monitoring Based Framework for Embedded CPS Device Security. 524-536 - Klaus-Tycho Foerster
, Andrzej Kamisinski
, Yvonne-Anne Pignolet
, Stefan Schmid
, Gilles Trédan:
Improved Fast Rerouting Using Postprocessing. 537-550 - Chunlin Xiong
, Tiantian Zhu
, Weihao Dong
, Linqi Ruan
, Runqing Yang
, Yueqiang Cheng
, Yan Chen, Shuai Cheng, Xutong Chen
:
Conan: A Practical Real-Time APT Detection System With High Accuracy and Efficiency. 551-565 - George Theodorakopoulos
, Emmanouil Panaousis
, Kaitai Liang
, George Loukas
:
On-the-Fly Privacy for Location Histograms. 566-578 - Ruiyu Zhu
, Yan Huang
:
Efficient and Precise Secure Generalized Edit Distance and Beyond. 579-590 - Xue Yang
, Rongxing Lu
, Jun Shao
, Xiaohu Tang
, Ali A. Ghorbani
:
Achieving Efficient Secure Deduplication With User-Defined Access Control in Cloud. 591-606 - Yi He, Yuan Zhou, Yajin Zhou, Qi Li, Kun Sun
, Yacong Gu, Yong Jiang:
JNI Global References Are Still Vulnerable: Attacks and Defenses. 607-619 - Yue Li
, Zeyu Chen, Haining Wang
, Kun Sun
, Sushil Jajodia
:
Understanding Account Recovery in the Wild and its Security Implications. 620-634 - Kaiping Xue
, Na Gai, Jianan Hong, David S. L. Wei, Peilin Hong
, Nenghai Yu
:
Efficient and Secure Attribute-Based Access Control With Identical Sub-Policies Frequently Used in Cloud Storage. 635-646 - Yanxue Jia
, Shifeng Sun
, Yuncong Zhang
, Qingzhao Zhang, Ning Ding, Zhiqiang Liu
, Joseph K. Liu
, Dawu Gu
:
${\sf PBT}$PBT: A New Privacy-Preserving Payment Protocol for Blockchain Transactions. 647-662 - Harishma Boyapally
, Paulson Mathew
, Sikhar Patranabis
, Urbi Chatterjee
, Umang Agarwal, Manu Maheshwari, Soumyajit Dey
, Debdeep Mukhopadhyay:
Safe is the New Smart: PUF-Based Authentication for Load Modification-Resistant Smart Meters. 663-680 - Ze Wang, Jingqiang Lin
, Quanwei Cai
, Qiongxiao Wang, Daren Zha, Jiwu Jing:
Blockchain-Based Certificate Transparency and Revocation Transparency. 681-697 - Shabnam Kasra Kermanshahi
, Shifeng Sun
, Joseph K. Liu
, Ron Steinfeld, Surya Nepal
, Wang Fat Lau, Man Ho Allen Au
:
Geometric Range Search on Encrypted Data With Forward/Backward Security. 698-716
Volume 19, Number 2, March - April 2022
- Yunji Liang
, Qiushi Wang
, Kang Xiong, Xiaolong Zheng
, Zhiwen Yu
, Daniel Zeng:
Robust Detection of Malicious URLs With Self-Paced Wide & Deep Learning. 717-730 - Azqa Nadeem
, Sicco Verwer
, Stephen Moskal, Shanchieh Jay Yang:
Alert-Driven Attack Graph Generation Using S-PDFA. 731-746 - Rohit Valecha
, Pranali Mandaokar, H. Raghav Rao
:
Phishing Email Detection Using Persuasion Cues. 747-756 - Huiling Li
, Jun Wu
, Hansong Xu
, Gaolei Li
, Mohsen Guizani
:
Explainable Intelligence-Driven Defense Mechanism Against Advanced Persistent Threats: A Joint Edge Game and AI Approach. 757-775 - Yi-Ting Huang
, Chi Yu Lin
, Ying-Ren Guo
, Kai-Chieh Lo, Yeali S. Sun, Meng Chang Chen
:
Open Source Intelligence for Malicious Behavior Discovery and Interpretation. 776-789 - Yidong Chai
, Yonghang Zhou, Weifeng Li
, Yuanchun Jiang
:
An Explainable Multi-Modal Hierarchical Attention Model for Developing Phishing Threat Intelligence. 790-803 - Md Shihabul Islam
, Bo Dong, Swarup Chandra, Latifur Khan, Bhavani Thuraisingham:
GCI: A GPU-Based Transfer Learning Approach for Detecting Cheats of Computer Game. 804-816 - Matheus E. Garbelini
, Chundong Wang
, Sudipta Chattopadhyay
:
Greyhound: Directed Greybox Wi-Fi Fuzzing. 817-834 - Osman Biçer, Muhammed Ali Bingöl
, Mehmet Sabir Kiraz
, Albert Levi
:
Highly Efficient and Re-Executable Private Function Evaluation With Linear Complexity. 835-847 - Eduardo Chielle
, Nektarios Georgios Tsoutsos
, Oleg Mazonka
, Michail Maniatakos
:
E3X: Encrypt-Everything-Everywhere ISA eXtensions for Private Computation. 848-861 - Guangquan Xu
, Xiaofei Xie
, Shuhan Huang
, Jun Zhang
, Lei Pan
, Wei Lou
, Kaitai Liang
:
JSCSP: A Novel Policy-Based XSS Defense Mechanism for Browsers. 862-878 - Zhihai Yang
, Qindong Sun, Yaling Zhang:
Probabilistic Inference and Trustworthiness Evaluation of Associative Links Toward Malicious Attack Detection for Online Recommendations. 879-896 - Xin Liao
, Jiaojiao Yin, Mingliang Chen
, Zheng Qin
:
Adaptive Payload Distribution in Multiple Images Steganography Based on Image Texture Features. 897-911 - Xiaogang Zhu
, Xiaotao Feng, Xiaozhu Meng, Sheng Wen
, Seyit Camtepe
, Yang Xiang
, Kui Ren:
CSI-Fuzz: Full-Speed Edge Tracing Using Coverage Sensitive Instrumentation. 912-923 - Vlad Craciun
, Pascal Felber
, Andrei Mogage
, Emanuel Onica
, Rafael Pires
:
Malware in the SGX Supply Chain: Be Careful When Signing Enclaves! 924-935 - Longxia Huang
, Junlong Zhou
, Gongxuan Zhang, Jin Sun
, Tongquan Wei
, Shui Yu
, Shiyan Hu
:
IPANM: Incentive Public Auditing Scheme for Non-Manager Groups in Clouds. 936-952 - Derui Wang
, Chaoran Li
, Sheng Wen
, Surya Nepal
, Yang Xiang
:
Defending Against Adversarial Attack Towards Deep Neural Networks Via Collaborative Multi-Task Training. 953-965 - Pedro Reviriego
, Jorge Martínez
, Ori Rottenstreich
, Shanshan Liu
, Fabrizio Lombardi
:
Remove Minimum (RM): An Error-Tolerant Scheme for Cardinality Estimate by HyperLogLog. 966-977 - Bing Chen, Wei Lu
, Jiwu Huang
, Jian Weng
, Yicong Zhou
:
Secret Sharing Based Reversible Data Hiding in Encrypted Images With Multiple Data-Hiders. 978-991 - Zhaoxia Yin
, Yinyin Peng
, Youzhi Xiang
:
Reversible Data Hiding in Encrypted Images Based on Pixel Prediction and Bit-Plane Compression. 992-1002 - Lingjuan Lyu
, Yitong Li
, Karthik Nandakumar
, Jiangshan Yu
, Xingjun Ma
:
How to Democratise and Protect AI: Fair and Differentially Private Decentralised Deep Learning. 1003-1017 - Onur Duman
, Mengyuan Zhang, Lingyu Wang
, Mourad Debbabi
, Ribal F. Atallah, Bernard Lebel
:
Factor of Security (FoS): Quantifying the Security Effectiveness of Redundant Smart Grid Subsystems. 1018-1035 - Jianting Ning
, Xinyi Huang
, Willy Susilo
, Kaitai Liang
, Ximeng Liu
, Yinghui Zhang
:
Dual Access Control for Cloud-Based Data Storage and Sharing. 1036-1048 - Mazen Al-Wadi, Kazi Abu Zubair, David Mohaisen
, Amro Awad
:
Phoenix: Towards Ultra-Low Overhead, Recoverable, and Persistently Secure NVM. 1049-1063 - Shengmin Xu
, Jianting Ning
, Yingjiu Li
, Yinghui Zhang
, Guowen Xu
, Xinyi Huang
, Robert H. Deng
:
Match in My Way: Fine-Grained Bilateral Access Control for Secure Cloud-Fog Computing. 1064-1077 - Shahram Khazaei, Mojtaba Rafiee
:
Towards More Secure Constructions of Adjustable Join Schemes. 1078-1089 - Yandong Zheng
, Rongxing Lu
, Yunguo Guan
, Jun Shao
, Hui Zhu
:
Achieving Efficient and Privacy-Preserving Exact Set Similarity Search over Encrypted Data. 1090-1103 - Ning Xie
, Zhuoyuan Li, Jie Tan, Alex X. Liu
:
Detection of Information Hiding at Physical Layer in Wireless Communications. 1104-1117 - Lei Zhou, Anmin Fu
, Guomin Yang
, Huaqun Wang
, Yuqing Zhang
:
Efficient Certificateless Multi-Copy Integrity Auditing Scheme Supporting Data Dynamics. 1118-1132 - Meng Li
, Yifei Chen
, Shuli Zheng, Donghui Hu
, Chhagan Lal
, Mauro Conti
:
Privacy-Preserving Navigation Supporting Similar Queries in Vehicular Networks. 1133-1148 - Jiayun Xu
, Yingjiu Li
, Robert H. Deng
, Ke Xu
:
SDAC: A Slow-Aging Solution for Android Malware Detection Using Semantic Distance Based API Clustering. 1149-1163 - Jianting Ning
, Geong Sen Poh
, Xinyi Huang
, Robert H. Deng
, Shuwei Cao, Ee-Chien Chang:
Update Recovery Attacks on Encrypted Database Within Two Updates Using Range Queries Leakage. 1164-1180 - Yazdan Movahedi
, Michel Cukier
, Ilir Gashi
:
Predicting the Discovery Pattern of Publically Known Exploited Vulnerabilities. 1181-1193 - Harshan Jagadeesh
, Amogh Vithalkar, Naman Jhunjhunwala
, Manthan Kabra
, Prafull Manav
, Yih-Chun Hu
:
Double-Edge Embedding Based Provenance Recovery for Low-Latency Applications in Wireless Networks. 1194-1211 - Dayong Ye
, Tianqing Zhu
, Sheng Shen
, Wanlei Zhou
, Philip S. Yu
:
Differentially Private Multi-Agent Planning for Logistic-Like Problems. 1212-1226 - Dariush Abbasinezhad-Mood
, Sayyed Majid Mazinani
, Morteza Nikooghadam
, Arezou Ostad-Sharif
:
Efficient Provably-Secure Dynamic ID-Based Authenticated Key Agreement Scheme With Enhanced Security Provision. 1227-1238 - Fabrizio Cicala
, Elisa Bertino
:
Analysis of Encryption Key Generation in Modern Crypto Ransomware. 1239-1253 - Mandrita Banerjee
, Carlo Borges, Kim-Kwang Raymond Choo
, Junghee Lee
, Chrysostomos Nicopoulos
:
A Hardware-Assisted Heartbeat Mechanism for Fault Identification in Large-Scale IoT Systems. 1254-1265 - Yang Liu
, Tong Feng, Mugen Peng
, Jianfeng Guan
, Yu Wang
:
DREAM: Online Control Mechanisms for Data Aggregation Error Minimization in Privacy-Preserving Crowdsensing. 1266-1279 - Jianye Huang
, Willy Susilo
, Fuchun Guo
, Ge Wu
, Zhen Zhao
, Qiong Huang
:
An Anonymous Authentication System for Pay-As-You-Go Cloud Computing$^*$*. 1280-1291 - Djamel Eddine Kouicem, Youcef Imine
, Abdelmadjid Bouabdallah, Hicham Lakhlef
:
Decentralized Blockchain-Based Trust Management Protocol for the Internet of Things. 1292-1306 - Bernardo Ferreira
, Bernardo Portela
, Tiago Oliveira
, Guilherme Borges
, Henrique João L. Domingos
, João Leitão
:
Boolean Searchable Symmetric Encryption With Filters on Trusted Hardware. 1307-1319 - Haining Yang
, Ye Su
, Jing Qin
, Huaxiong Wang
:
Privacy-Preserving Outsourced Inner Product Computation on Encrypted Database. 1320-1337 - Shuming Qiu
, Ding Wang
, Guoai Xu
, Saru Kumari
:
Practical and Provably Secure Three-Factor Authentication Protocol Based on Extended Chaotic-Maps for Mobile Lightweight Devices. 1338-1351 - Benyuan Yang
, Hesuan Hu
:
Dynamic Implementation of Security Requirements in Business Processes. 1352-1363 - Guowen Xu
, Hongwei Li
, Yun Zhang, Shengmin Xu, Jianting Ning
, Robert H. Deng
:
Privacy-Preserving Federated Deep Learning With Irregular Users. 1364-1381 - Zi-Long Liu
, Chi-Man Pun
:
Reversible Data Hiding in Encrypted Images using Chunk Encryption and Redundancy Matrix Representation. 1382-1394 - Wenlong Tian
, Ruixuan Li
, Zhiyong Xu, Weijun Xiao:
Loco-Store: Locality-Based Oblivious Data Storage. 1395-1406 - Maryam Zarezadeh, Hamid Mala
, Behrouz Tork Ladani
:
Efficient Secure Pattern Matching With Malicious Adversaries. 1407-1419 - Yang Du
, Zhaoxia Yin
, Xinpeng Zhang
:
High Capacity Lossless Data Hiding in JPEG Bitstream Based on General VLC Mapping. 1420-1433
Volume 19, Number 3, May - June 2022
- Yanhai Xiong
, Giridhar Ramachandran, Rajesh Ganesan
, Sushil Jajodia
, V. S. Subrahmanian
:
Generating Realistic Fake Equations in Order to Reduce Intellectual Property Theft. 1434-1445 - Zhangshuang Guan
, Zhiguo Wan
, Yang Yang
, Yan Zhou, Butian Huang:
BlockMaze: An Efficient Privacy-Preserving Account-Model Blockchain Based on zk-SNARKs. 1446-1463 - Jian Shen
, Ziyuan Gui
, Xiaofeng Chen
, Jun Zhang
, Yang Xiang
:
Lightweight and Certificateless Multi-Receiver Secure Data Transmission Protocol for Wireless Body Area Networks. 1464-1475 - Domenico Cotroneo
, Luigi De Simone
, Pietro Liguori
, Roberto Natella
:
Fault Injection Analytics: A Novel Approach to Discover Failure Modes in Cloud-Computing Systems. 1476-1491 - Fengwei Wang
, Hui Zhu
, Rongxing Lu
, Yandong Zheng
, Hui Li
:
Achieve Efficient and Privacy-Preserving Disease Risk Assessment Over Multi-Outsourced Vertical Datasets. 1492-1504 - Saiyu Qi
, Yuanqing Zheng
, Xiaofeng Chen
, Wei Wei
:
Ants can Carry Cheese: Secure and Private RFID-Enabled Third-Party Distribution. 1505-1517 - Jia-Nan Liu
, Xizhao Luo
, Jian Weng
, Anjia Yang
, Xu An Wang
, Ming Li
, Xiaodong Lin
:
Enabling Efficient, Secure and Privacy-Preserving Mobile Cloud Storage. 1518-1531 - Hongbo Li
, Qiong Huang
, Willy Susilo
:
A Secure Cloud Data Sharing Protocol for Enterprise Supporting Hierarchical Keyword Search. 1532-1543 - Shuitao Gan
, Chao Zhang
, Xiaojun Qin, Xuwen Tu, Kang Li
, Zhongyu Pei, Zuoning Chen:
Path Sensitive Fuzzing for Native Applications. 1544-1561 - Mingfu Xue
, Can He
, Jian Wang, Weiqiang Liu
:
One-to-N & N-to-One: Two Advanced Backdoor Attacks Against Deep Learning Models. 1562-1578 - Zheli Liu
, Siyi Lv, Jin Li
, Yanyu Huang
, Liang Guo
, Yali Yuan, Changyu Dong
:
EncodeORE: Reducing Leakage and Preserving Practicality in Order-Revealing Encryption. 1579-1591 - Minghui Li
, Sherman S. M. Chow
, Shengshan Hu
, Yuejing Yan, Chao Shen, Qian Wang
:
Optimizing Privacy-Preserving Outsourced Convolutional Neural Network Predictions. 1592-1604 - Christian Berger
, Hans P. Reiser
, João Sousa, Alysson Bessani
:
AWARE: Adaptive Wide-Area Replication for Fast and Resilient Byzantine Consensus. 1605-1620 - Runqing Yang
, Xutong Chen
, Haitao Xu
, Yueqiang Cheng
, Chunlin Xiong
, Linqi Ruan
, Mohammad Kavousi, Zhenyuan Li
, Liheng Xu, Yan Chen
:
RATScope: Recording and Reconstructing Missing RAT Semantic Behaviors for Forensic Analysis on Windows. 1621-1638 - Qiang Wang
, Fucai Zhou
, Boyang Zhou
, Jian Xu
, Chunyu Chen, Qi Wang:
Privacy-Preserving Publicly Verifiable Databases. 1639-1654 - Matthias Eckhart
, Andreas Ekelhart
, Edgar R. Weippl
:
Automated Security Risk Identification Using AutomationML-Based Engineering Data. 1655-1672 - Sandeep Nair Narayanan
, Anupam Joshi
, Ranjan Bose:
ABATe: Automatic Behavioral Abstraction Technique to Detect Anomalies in Smart Cyber-Physical Systems. 1673-1686 - Xiaoning Liu
, Yifeng Zheng
, Xun Yi
, Surya Nepal
:
Privacy-Preserving Collaborative Analytics on Medical Time Series Data. 1687-1702 - Chaoyue Niu
, Fan Wu
, Shaojie Tang
, Shuai Ma
, Guihai Chen:
Toward Verifiable and Privacy Preserving Machine Learning Prediction. 1703-1721 - Milan Stute
, Florian Kohnhäuser, Lars Baumgärtner
, Lars Almon
, Matthias Hollick
, Stefan Katzenbeisser, Bernd Freisleben
:
RESCUE: A Resilient and Secure Device-to-Device Communication Framework for Emergencies. 1722-1734 - Haishou Ma, Yi Xie
, Shensheng Tang
, Jiankun Hu
, Xingcheng Liu
:
Threat-Event Detection for Distributed Networks Based on Spatiotemporal Markov Random Field. 1735-1752 - Jianbing Ni
, Kuan Zhang
, Yong Yu
, Tingting Yang
:
Identity-Based Provable Data Possession From RSA Assumption for Secure Cloud Storage. 1753-1769 - Anomadarshi Barua
, Deepan Muthirayan
, Pramod P. Khargonekar
, Mohammad Abdullah Al Faruque
:
Hierarchical Temporal Memory-Based One-Pass Learning for Real-Time Anomaly Detection and Simultaneous Data Prediction in Smart Grids. 1770-1782 - Atif Saeed
, Peter Garraghan
, Syed Asad Hussain
:
Cross-VM Network Channel Attacks and Countermeasures Within Cloud Computing Environments. 1783-1794 - Haijun Wang, Ye Liu
, Yi Li
, Shangwei Lin
, Cyrille Artho
, Lei Ma
, Yang Liu
:
Oracle-Supported Dynamic Exploit Generation for Smart Contracts. 1795-1809 - Ji-Ming Chen
, Xiangshan Gao, Ruilong Deng
, Yang He, Chongrong Fang
, Peng Cheng
:
Generating Adversarial Examples Against Machine Learning-Based Intrusion Detector in Industrial Control Systems. 1810-1825 - Binbin Zhao
, Shouling Ji
, Wei-Han Lee, Changting Lin
, Haiqin Weng, Jingzheng Wu, Pan Zhou
, Liming Fang
, Raheem Beyah:
A Large-Scale Empirical Study on the Vulnerability of Deployed IoT Devices. 1826-1840 - Yifeng Zheng
, Huayi Duan
, Cong Wang
, Ruochen Wang, Surya Nepal
:
Securely and Efficiently Outsourcing Decision Tree Inference. 1841-1855 - Intae Kim
, Willy Susilo
, Joonsang Baek, Jongkil Kim:
Harnessing Policy Authenticity for Hidden Ciphertext Policy Attribute-Based Encryption. 1856-1870 - Shuzhou Sun
, Hui Ma
, Zishuai Song, Rui Zhang
:
WebCloud: Web-Based Cloud Storage for Secure Data Sharing Across Platforms. 1871-1884 - Zengpeng Li
, Ding Wang
, Eduardo Morais:
Quantum-Safe Round-Optimal Password Authentication for Mobile Devices. 1885-1899 - Huaijin Wang
, Shuai Wang
, Dongpeng Xu, Xiangyu Zhang
, Xiao Liu:
Generating Effective Software Obfuscation Sequences With Reinforcement Learning. 1900-1917 - Bo Jiang
, Ming Li
, Ravi Tandon
:
Local Information Privacy and Its Application to Privacy-Preserving Data Aggregation. 1918-1935 - Orly Stan
, Ron Bitton
, Michal Ezrets, Moran Dadon, Masaki Inokuchi, Yoshinobu Ohta, Tomohiko Yagyu, Yuval Elovici
, Asaf Shabtai
:
Extending Attack Graphs to Represent Cyber-Attacks in Communication Protocols and Modern IT Networks. 1936-1954 - Lei Zhao
, Pengcheng Cao, Yue Duan
, Heng Yin
, Jifeng Xuan
:
Probabilistic Path Prioritization for Hybrid Fuzzing. 1955-1973 - Ning Lu
, Yuan Chang
, Wenbo Shi, Kim-Kwang Raymond Choo
:
CoinLayering: An Efficient Coin Mixing Scheme for Large Scale Bitcoin Transactions. 1974-1987 - Behrooz Sangchoolie
, Karthik Pattabiraman
, Johan Karlsson
:
An Empirical Study of the Impact of Single and Multiple Bit-Flip Errors in Programs. 1988-2006 - Huadi Zheng
, Qingqing Ye
, Haibo Hu
, Chengfang Fang, Jie Shi:
Protecting Decision Boundary of Machine Learning Model With Differentially Private Perturbation. 2007-2022 - Zheli Liu
, Yanyu Huang
, Xiangfu Song
, Bo Li, Jin Li
, Yali Yuan
, Changyu Dong
:
Eurus: Towards an Efficient Searchable Symmetric Encryption With Size Pattern Protection. 2023-2037 - Yanjiao Chen
, Xin Tian, Qian Wang
, Jianlin Jiang
, Minghui Li
, Qian Zhang
:
SAFE: A General Secure and Fair Auction Framework for Wireless Markets With Privacy Preservation. 2038-2053 - Junjiao Liu
, Xiaodong Lin
, Xin Chen, Hui Wen, Hong Li
, Yan Hu, Jiawei Sun, Zhiqiang Shi, Limin Sun:
ShadowPLCs: A Novel Scheme for Remote Detection of Industrial Process Control Attacks. 2054-2069 - Yizhong Liu
, Jianwei Liu
, Qianhong Wu
, Hui Yu, Yiming Hei
, Ziyu Zhou:
SSHC: A Secure and Scalable Hybrid Consensus Protocol for Sharding Blockchains With a Formal Security Framework. 2070-2088 - Hu Xiong
, Jinhao Chen
, Qian Mei
, Yanan Zhao
:
Conditional Privacy-Preserving Authentication Protocol With Dynamic Membership Updating for VANETs. 2089-2104 - Reem M. Albarrak, Daniel A. Menascé
:
Trust But Verify: A Framework for the Trustworthiness of Distributed Systems. 2105-2121 - Saiyu Qi
, Yuanqing Zheng
, Yue Li, Xiaofeng Chen
, Jianfeng Ma
, Dongyi Yang, Yong Qi:
DE-Sword: Incentivized Verifiable Tag Path Query in RFID-Enabled Supply Chain Systems. 2122-2137 - Willy Susilo
, Peng Jiang
, Jianchang Lai
, Fuchun Guo
, Guomin Yang
, Robert H. Deng
:
Sanitizable Access Control System for Secure Cloud Storage Against Malicious Data Publishers. 2138-2148
Volume 19, Number 4, July - August 2022
- Sagar Samtani
, Hsinchun Chen, Murat Kantarcioglu
, Bhavani Thuraisingham:
Explainable Artificial Intelligence for Cyber Threat Intelligence (XAI-CTI). 2149-2150 - Miquel Martínez
, Juan Carlos Ruiz
, Nuno Antunes
, David de Andrés
, Marco Vieira
:
A Multi-Criteria Analysis of Benchmark Results With Expert Support for Security Tools. 2151-2164 - Siqi Ma
, Juanru Li, Surya Nepal
, Diethelm Ostry, David Lo
, Sanjay K. Jha
, Robert H. Deng
, Elisa Bertino
:
Orchestration or Automation: Authentication Flaw Detection in Android Apps. 2165-2178 - Moshe Kravchik
, Asaf Shabtai
:
Efficient Cyber Attack Detection in Industrial Control Systems Using Lightweight Neural Networks and PCA. 2179-2197 - Jian Shen
, Huijie Yang, Pandi Vijayakumar
, Neeraj Kumar
:
A Privacy-Preserving and Untraceable Group Data Sharing Scheme in Cloud Computing. 2198-2210 - Satendra Pal Singh, Gaurav Bhatnagar
, Amit Kumar Singh
:
A New Robust Reference Image Hashing System. 2211-2225 - Mohamed Baza
, Marbin Pazos-Revilla, Ahmed B. T. Sherif
, Mahmoud Nabil
, Abdulah Jeza Aljohani
, Mohamed Mahmoud
, Waleed Alasmary
:
Privacy-Preserving and Collusion-Resistant Charging Coordination Schemes for Smart Grids. 2226-2243 - Zhen Li
, Deqing Zou
, Shouhuai Xu
, Hai Jin
, Yawei Zhu, Zhaoxuan Chen:
SySeVR: A Framework for Using Deep Learning to Detect Software Vulnerabilities. 2244-2258 - Luca Massarelli
, Giuseppe Antonio Di Luna, Fabio Petroni, Leonardo Querzoni
, Roberto Baldoni:
Function Representations for Binary Similarity. 2259-2273 - Soroush Aalibagi
, Hamidreza Mahyar
, Ali Movaghar
, Harry Eugene Stanley
:
A Matrix Factorization Model for Hellinger-Based Trust Management in Social Internet of Things. 2274-2285 - Tianxiang Shen
, Jianyu Jiang
, Yunpeng Jiang, Xusheng Chen
, Ji Qi
, Shixiong Zhao
, Fengwei Zhang
, Xiapu Luo
, Heming Cui
:
DAENet: Making Strong Anonymity Scale in a Fully Decentralized Network. 2286-2303 - Leila Karimi
, Maryam Aldairi
, James Joshi
, Mai Abdelhakim
:
An Automatic Attribute-Based Access Control Policy Extraction From Access Logs. 2304-2317 - Jianghong Wei
, Xiaofeng Chen
, Jianfeng Wang
, Xuexian Hu
, Jianfeng Ma:
Enabling (End-to-End) Encrypted Cloud Emails With Practical Forward Secrecy. 2318-2332 - Qiang He
, Cheng Wang
, Guangming Cui
, Bo Li
, Rui Zhou, Qingguo Zhou
, Yang Xiang
, Hai Jin
, Yun Yang
:
A Game-Theoretical Approach for Mitigating Edge DDoS Attack. 2333-2348 - Yansong Gao
, Yeonjae Kim, Bao Gia Doan
, Zhi Zhang
, Gongxuan Zhang, Surya Nepal
, Damith C. Ranasinghe
, Hyoungshick Kim
:
Design and Evaluation of a Multi-Domain Trojan Detection Method on Deep Neural Networks. 2349-2364 - Yunxiao Zhang
, Pasquale Malacaria
:
Optimization-Time Analysis for Cybersecurity. 2365-2383 - Ferucio Laurentiu Tiplea
:
Lessons to be Learned for a Good Design of Private RFID Schemes. 2384-2395 - Mateus Martínez De Lucena
, Antônio Augusto Fröhlich
:
Security and Effectiveness Analysis of the Gateway Integrity Checking Protocol. 2396-2404 - Yi Chen
, Hongxia Wang, Kim-Kwang Raymond Choo
, Peisong He
, Zoran Salcic
, Dali Kaafar
, Xuyun Zhang
:
DDCA: A Distortion Drift-Based Cost Assignment Method for Adaptive Video Steganography in the Transform Domain. 2405-2420 - Pedro Reviriego
, Daniel Ting:
Breaking Cuckoo Hash: Black Box Attacks. 2421-2427 - Qian Han
, Cristian Molinaro, Antonio Picariello, Giancarlo Sperlì
, V. S. Subrahmanian, Yanhai Xiong
:
Generating Fake Documents Using Probabilistic Logic Graphs. 2428-2441 - Zhiguo Wan
, Tong Zhang, Weizhuang Liu, Mingqiang Wang
, Liehuang Zhu
:
Decentralized Privacy-Preserving Fair Exchange Scheme for V2G Based on Blockchain. 2442-2456 - Mahmood Azhar Qureshi
, Arslan Munir
:
PUF-RAKE: A PUF-Based Robust and Lightweight Authentication and Key Establishment Protocol. 2457-2475 - Hassan Nasiraee
, Maede Ashouri-Talouki
:
Privacy-Preserving Distributed Data Access Control for CloudIoT. 2476-2487 - Essam Soliman Debie, Nour Moustafa
, Athanasios V. Vasilakos
:
Session Invariant EEG Signatures using Elicitation Protocol Fusion and Convolutional Neural Network. 2488-2500 - Yandong Zheng
, Rongxing Lu
, Yunguo Guan
, Jun Shao
, Hui Zhu
:
Efficient and Privacy-Preserving Similarity Range Query Over Encrypted Time Series Data. 2501-2516 - Suryadipta Majumdar
, Gagandeep Singh Chawla, Amir Alimohammadifar, Taous Madi, Yosr Jarraya, Makan Pourzandi, Lingyu Wang
, Mourad Debbabi
:
ProSAS: Proactive Security Auditing System for Clouds. 2517-2534 - Mojtaba Rafiee
, Shahram Khazaei
:
Security of Multi-Adjustable Join Schemes: Separations and Implications. 2535-2545 - Siva Kumar Sastry Hari
, Michael B. Sullivan
, Timothy Tsai, Stephen W. Keckler:
Making Convolutions Resilient Via Algorithm-Based Error Detection Techniques. 2546-2558 - Seongman Lee
, Hyeonwoo Kang
, Jinsoo Jang
, Brent ByungHoon Kang
:
SaVioR: Thwarting Stack-Based Memory Safety Violations by Randomizing Stack Layout. 2559-2575 - Zhe Wang
, Chenggang Wu
, Yinqian Zhang
, Bowen Tang
, Pen-Chung Yew
, Mengyao Xie
, Yuanming Lai
, Yan Kang, Yueqiang Cheng
, Zhiping Shi
:
Making Information Hiding Effective Again. 2576-2594 - Giovanni Mazzeo
, Sergei Arnautov, Christof Fetzer, Luigi Romano
:
SGXTuner: Performance Enhancement of Intel SGX Applications Via Stochastic Optimization. 2595-2608 - Shangqi Lai
, Xingliang Yuan
, Shifeng Sun
, Joseph K. Liu
, Ron Steinfeld, Amin Sakzad
, Dongxi Liu:
Practical Encrypted Network Traffic Pattern Matching for Secure Middleboxes. 2609-2621 - Jun Wang
, Chao Jin
, Qiang Tang
, Zhe Liu
, Khin Mi Mi Aung
:
CryptoRec: Novel Collaborative Filtering Recommender Made Privacy-Preserving Easy. 2622-2634 - Dalton Cole
, Sara Newman
, Dan Lin
:
A New Facial Authentication Pitfall and Remedy in Web Services. 2635-2647 - Shaoyong Du
, Minrui Zhao
, Jingyu Hua
, Hang Zhang, Xiaoyu Chen, Zhiyun Qian
, Sheng Zhong
:
Who Moves My App Promotion Investment? A Systematic Study About App Distribution Fraud. 2648-2664 - Xuhang Ying
, Giuseppe Bernieri, Mauro Conti
, Linda Bushnell
, Radha Poovendran
:
Covert Channel-Based Transmitter Authentication in Controller Area Networks. 2665-2679 - Haonan Yan, Xiaoguang Li
, Hui Li, Jiamin Li, Wenhai Sun
, Fenghua Li:
Monitoring-Based Differential Privacy Mechanism Against Query Flooding-Based Model Extraction Attack. 2680-2694 - Long Zhang
, Brice Morin
, Benoit Baudry
, Martin Monperrus
:
Maximizing Error Injection Realism for Chaos Engineering With System Calls. 2695-2708 - Savio Sciancalepore
, Pietro Tedeschi
, Ahmed Aziz, Roberto Di Pietro
:
Auth-AIS: Secure, Flexible, and Backward-Compatible Authentication of Vessels AIS Broadcasts. 2709-2726 - Shunrong Jiang
, Jianqing Liu
, Yong Zhou
, Yuguang Fang
:
FVC-Dedup: A Secure Report Deduplication Scheme in a Fog-Assisted Vehicular Crowdsensing System. 2727-2740 - Xuyang Jing, Hui Han, Zheng Yan
, Witold Pedrycz
:
SuperSketch: A Multi-Dimensional Reversible Data Structure for Super Host Identification. 2741-2754 - Lumin Shi
, Jun Li
, Mingwei Zhang
, Peter L. Reiher
:
On Capturing DDoS Traffic Footprints on the Internet. 2755-2770 - Xiaojie Zhu
, Erman Ayday, Roman Vitenberg
, Narasimha Raghavan Veeraragavan:
Privacy-Preserving Search for a Similar Genomic Makeup in the Cloud. 2771-2788 - Yuan Zhang
, Chunxiang Xu
, Nan Cheng
, Xuemin Shen
:
Secure Password-Protected Encryption Key for Deduplicated Cloud Storage Systems. 2789-2806 - Runhua Xu
, James Joshi
, Chao Li
:
NN-EMD: Efficiently Training Neural Networks Using Encrypted Multi-Sourced Datasets. 2807-2820 - Zhen Li, Deqing Zou
, Shouhuai Xu
, Zhaoxuan Chen, Yawei Zhu, Hai Jin
:
VulDeeLocator: A Deep Learning-Based Fine-Grained Vulnerability Detector. 2821-2837 - Yuan Su
, Yanping Li
, Bo Yang, Yong Ding
:
Decentralized Self-Auditing Scheme With Errors Localization for Multi-Cloud Storage. 2838-2850 - Fatemah Alharbi
, Yuchen Zhou
, Feng Qian, Zhiyun Qian
, Nael B. Abu-Ghazaleh
:
DNS Poisoning of Operating System Caches: Attacks and Mitigations. 2851-2863
Volume 19, Number 5, September - October 2022
- Chunpeng Ge
, Willy Susilo
, Joonsang Baek, Zhe Liu, Jinyue Xia, Liming Fang
:
Revocable Attribute-Based Encryption With Data Integrity in Clouds. 2864-2872 - Jun Qiu
, Xuewu Yang
, Huamao Wu
, Yajin Zhou
, Jinku Li
, Jianfeng Ma
:
LibCapsule: Complete Confinement of Third-Party Libraries in Android Applications. 2873-2889 - Ankur Chowdhary
, Abdulhakim Sabur
, Dijiang Huang
, Myong H. Kang, James Kirby:
Object Oriented Policy Conflict Checking Framework in Cloud Networks (OOPC). 2890-2906 - Chunpeng Ge
, Willy Susilo
, Joonsang Baek, Zhe Liu, Jinyue Xia
, Liming Fang
:
A Verifiable and Fair Attribute-Based Proxy Re-Encryption Scheme for Data Sharing in Clouds. 2907-2919 - Seema Kumar
, Patrick Eugster, Silvia Santini:
Software-Based Remote Network Attestation. 2920-2933 - Zhen Liu
, Guomin Yang
, Duncan S. Wong, Khoa Nguyen
, Huaxiong Wang
, Xiaorong Ke, Yining Liu:
Secure Deterministic Wallet and Stealth Address: Key-Insulated and Privacy-Preserving Signature Scheme With Publicly Derived Public Key. 2934-2951 - Cláudio Correia
, Miguel Correia
, Luís Rodrigues:
Omega: A Secure Event Ordering Service for the Edge. 2952-2964 - Zhuotao Liu
, Yangxi Xiang, Jian Shi, Peng Gao, Haoyu Wang, Xusheng Xiao
, Bihan Wen
, Qi Li
, Yih-Chun Hu:
Make Web3.0 Connected. 2965-2981 - Xuejing Zhou
, Wanli Peng
, Boya Yang
, Juan Wen
, Yiming Xue
, Ping Zhong
:
Linguistic Steganography Based on Adaptive Probability Distribution. 2982-2997 - Bowen Wang
, Kangjie Lu
, Qiushi Wu, Aditya Pakki
:
Unleashing Coveraged-Based Fuzzing Through Comprehensive, Efficient, and Faithful Exploitable-Bug Exposing. 2998-3010 - Chen Chen
, Roman Vitenberg
, Hans-Arno Jacobsen
:
Building Fault-Tolerant Overlays With Low Node Degrees for Topic-Based Publish/Subscribe. 3011-3023 - Hua Deng
, Jixin Zhang
, Zheng Qin
, Qianhong Wu, Hui Yin
, Aniello Castiglione
:
Policy-Based Broadcast Access Authorization for Flexible Data Sharing in Clouds. 3024-3037 - Yuefeng Du
, Huayi Duan
, Anxin Zhou
, Cong Wang
, Man Ho Au
, Qian Wang
:
Enabling Secure and Efficient Decentralized Storage Auditing With Blockchain. 3038-3054 - Xinyu Wang
, Yuefeng Du
, Cong Wang
, Qian Wang
, Liming Fang
:
WebEnclave: Protect Web Secrets From Browser Extensions With Software Enclave. 3055-3070 - Mario Di Mauro
, Giovanni Galatro
, Fabio Postiglione
, Marco Tambasco
:
Performability of Network Service Chains: Stochastic Modeling and Assessment of Softwarized IP Multimedia Subsystem. 3071-3086 - Meng Ma
, Weilan Lin, Disheng Pan, Ping Wang
:
ServiceRank: Root Cause Identification of Anomaly in Large-Scale Microservice Architectures. 3087-3100 - Jing Lei
, Qingqi Pei
, Yao Wang
, Wenhai Sun
, Xuefeng Liu
:
PrivFace: Fast Privacy-Preserving Face Authentication With Revocable and Reusable Biometric Credentials. 3101-3112 - Hwimin Kim
, Dae-Kyoo Kim
, Alaa S. Alaerjan:
ABAC-Based Security Model for DDS. 3113-3124 - Zhangjie Fu
, Yueyan Zhi, Shouling Ji
, Xingming Sun:
Remote Attacks on Drones Vision Sensors: An Empirical Study. 3125-3135 - Yinjin Fu
, Nong Xiao, Tao Chen, Jian Wang:
Fog-to-MultiCloud Cooperative Ehealth Data Management With Application-Aware Secure Deduplication. 3136-3148 - Jiasi Weng
, Jian Weng
, Chengjun Cai
, Hongwei Huang, Cong Wang
:
Golden Grain: Building a Secure and Decentralized Model Marketplace for MLaaS. 3149-3167 - Jinrong Chen
, Lin Liu
, Rongmao Chen
, Wei Peng
, Xinyi Huang
:
SecRec: A Privacy-Preserving Method for the Context-Aware Recommendation System. 3168-3182 - Hongwei Huang
, Weiqi Luo
, Guoqiang Zeng
, Jian Weng
, Yue Zhang
, Anjia Yang
:
DAMIA: Leveraging Domain Adaptation as a Defense Against Membership Inference Attacks. 3183-3199 - Lei Bu
, Zhe Zhao
, Yuchao Duan, Fu Song
:
Taking Care of the Discretization Problem: A Comprehensive Study of the Discretization Problem and a Black-Box Adversarial Attack in Discrete Integer Domain. 3200-3217 - Qinchen Gu
, David Formby
, Shouling Ji
, Brendan Saltaformaggio, Anu G. Bourgeois, Raheem Beyah:
This Hacker Knows Physics: Device Physics Aware Mimicry Attacks in Cyber-Physical Systems. 3218-3230 - Beilei Zheng
, Jianan Gu
, Jialun Wang
, Chuliang Weng
:
CBA-Detector: A Self-Feedback Detector Against Cache-Based Attacks. 3231-3243 - Himani Sikarwar
, Debasis Das
:
Towards Lightweight Authentication and Batch Verification Scheme in IoV. 3244-3256 - Haoyu Ma
, Jianwen Tian, Debin Gao
, Chunfu Jia
:
On the Effectiveness of Using Graphics Interrupt as a Side Channel for User Behavior Snooping. 3257-3270 - Haoyu Ma
, Shijia Li
, Debin Gao
, Chunfu Jia
:
Secure Repackage-Proofing Framework for Android Apps Using Collatz Conjecture. 3271-3285 - Jing Chen
, Xin Chen
, Kun He
, Ruiying Du, Weihang Chen, Yang Xiang
:
DELIA: Distributed Efficient Log Integrity Audit Based on Hierarchal Multi-Party State Channel. 3286-3300 - Jing Chen
, Zeyi Zhan, Kun He
, Ruiying Du, Donghui Wang
, Fei Liu:
XAuth: Efficient Privacy-Preserving Cross-Domain Authentication. 3301-3311 - Shaharyar Khan
, Stuart E. Madnick
:
Cybersafety: A System-Theoretic Approach to Identify Cyber-Vulnerabilities & Mitigation Requirements in Industrial Control Systems. 3312-3328 - Lingchen Zhao
, Jianlin Jiang
, Bo Feng
, Qian Wang
, Chao Shen
, Qi Li
:
SEAR: Secure and Efficient Aggregation for Byzantine-Robust Federated Learning. 3329-3342 - Kejiang Chen
, Hang Zhou
, Hanqing Zhao, Dongdong Chen
, Weiming Zhang
, Nenghai Yu
:
Distribution-Preserving Steganography Based on Text-to-Speech Generative Models. 3343-3356 - Chaoran Li
, Xiao Chen
, Derui Wang
, Sheng Wen
, Muhammad Ejaz Ahmed, Seyit Camtepe
, Yang Xiang
:
Backdoor Attack on Machine Learning Based Android Malware Detectors. 3357-3370 - Mohammadhossein Amouei
, Mohsen Rezvani
, Mansoor Fateh
:
RAT: Reinforcement-Learning-Driven and Adaptive Testing for Vulnerability Discovery in Web Application Firewalls. 3371-3386 - Jingjing Zhang
, Yingyao Rong, Jiannong Cao
, Chunming Rong, Jing Bian
, Weigang Wu
:
DBFT: A Byzantine Fault Tolerance Protocol With Graceful Performance Degradation. 3387-3400 - Yu Guo
, Hongcheng Xie
, Cong Wang
, Xiaohua Jia
:
Enabling Privacy-Preserving Geographic Range Query in Fog-Enhanced IoT Services. 3401-3416 - Sara Mohammadi
, Frank Eliassen
, Yan Zhang
, Hans-Arno Jacobsen
:
Detecting False Data Injection Attacks in Peer to Peer Energy Trading Using Machine Learning. 3417-3431 - Ahmed Abusnaina
, Mohammed Abuhamad
, Hisham Alasmary
, Afsah Anwar, Rhongho Jang
, Saeed Salem, DaeHun Nyang
, David Mohaisen
:
DL-FHMC: Deep Learning-Based Fine-Grained Hierarchical Learning Approach for Robust Malware Classification. 3432-3447 - Huiying Hou
, Jianting Ning
, Yunlei Zhao
, Robert H. Deng
:
Fine-Grained and Controllably Editable Data Sharing With Accountability in Cloud Storage. 3448-3463 - Yen-Lin Lee
, Deron Liang, Wei-Jen Wang
:
Optimal Online Liveness Fault Detection for Multilayer Cloud Computing Systems. 3464-3477 - Yandong Zheng
, Rongxing Lu
, Yunguo Guan
, Jun Shao
, Hui Zhu
:
Towards Practical and Privacy-Preserving Multi-Dimensional Range Query Over Cloud. 3478-3493 - Shijie Jia
, Qionglu Zhang
, Luning Xia, Jiwu Jing
, Peng Liu
:
MDEFTL: Incorporating Multi-Snapshot Plausible Deniability into Flash Translation Layer. 3494-3507 - Haoyu Ma
, Shijia Li
, Debin Gao
, Daoyuan Wu
, Qiaowen Jia, Chunfu Jia
:
Active Warden Attack: On the (In)Effectiveness of Android App Repackage-Proofing. 3508-3520 - Xi Xiao
, Wentao Xiao
, Rui Li, Xiapu Luo
, Haitao Zheng
, Shutao Xia
:
EBSNN: Extended Byte Segment Neural Network for Network Traffic Classification. 3521-3538 - Pedro Reviriego
, Alfonso Sánchez-Macián
, Shanshan Liu
, Fabrizio Lombardi
:
On the Security of the K Minimum Values (KMV) Sketch. 3539-3545 - Jian Yang
, Qi Zhang, Xiaofeng Jiang
, Shuangwu Chen
, Feng Yang
:
Poirot: Causal Correlation Aided Semantic Analysis for Advanced Persistent Threat Detection. 3546-3563 - Liming Fang
, Minghui Li
, Zhe Liu
, Changting Lin
, Shouling Ji
, Anni Zhou, Willy Susilo
, Chunpeng Ge
:
A Secure and Authenticated Mobile Payment Protocol Against Off-Site Attack Strategy. 3564-3578
Volume 19, Number 6, November - December 2022
- Hanan Hibshi
, Stephanie T. Jones, Travis D. Breaux:
A Systemic Approach for Natural Language Scenario Elicitation of Security Requirements. 3579-3591 - Jiabei Wang
, Rui Zhang
, Jianhao Li
, Yuting Xiao
, Hui Ma
:
SeUpdate: Secure Encrypted Data Update for Multi-User Environments. 3592-3606 - Xinyu Zhang
, Bingsheng Zhang
, Aggelos Kiayias
, Thomas Zacharias
, Kui Ren
:
An Efficient E2E Crowd Verifiable E-Voting System. 3607-3620 - Xiaoqin Feng
, Jianfeng Ma
, Yinbin Miao
, Ximeng Liu
, Kim-Kwang Raymond Choo
:
Social Characteristic-Based Propagation-Efficient PBFT Protocol to Broadcast in Unstructured Overlay Networks. 3621-3639 - Chengjun Cai
, Lei Xu
, Anxin Zhou
, Cong Wang
:
Toward a Secure, Rich, and Fair Query Service for Light Clients on Public Blockchains. 3640-3655 - Qilei Yin
, Zhuotao Liu
, Qi Li
, Tao Wang, Qian Wang
, Chao Shen
, Yixiao Xu:
An Automated Multi-Tab Website Fingerprinting Attack. 3656-3670 - Yang Liu
, Zhuo Ma
, Yilong Yang
, Ximeng Liu
, Jianfeng Ma
, Kui Ren
:
RevFRF: Enabling Cross-Domain Random Forest Training With Revocable Federated Learning. 3671-3685 - Jianan Gu
, Yukun Ma
, Beilei Zheng
, Chuliang Weng
:
Outlier: Enabling Effective Measurement of Hypervisor Code Integrity With Group Detection. 3686-3698 - Yuchang Mo
, Liudong Xing
:
Efficient Analysis of Resource Availability for Cloud Computing Systems to Reduce SLA Violations. 3699-3710 - Eunsang Lee
, Joon-Woo Lee
, Jong-Seon No
, Young-Sik Kim
:
Minimax Approximation of Sign Function by Composite Polynomial for Homomorphic Comparison. 3711-3727 - Vlasis Koutsos
, Dimitrios Papadopoulos
, Dimitris Chatzopoulos
, Sasu Tarkoma
, Pan Hui:
Agora: A Privacy-Aware Data Marketplace. 3728-3740 - Pengfei Wu
, Qi Li
, Jianting Ning
, Xinyi Huang
, Wei Wu
:
Differentially Oblivious Data Analysis With Intel SGX: Design, Optimization, and Evaluation. 3741-3758 - Shengmin Xu
, Jianting Ning
, Xinyi Huang
, Yingjiu Li
, Guowen Xu
:
Untouchable Once Revoking: A Practical and Secure Dynamic EHR Sharing System via Cloud. 3759-3773 - Xiang Gao
, Jia Yu
, Yan Chang, Huaqun Wang
, Jianxi Fan
:
Checking Only When It Is Necessary: Enabling Integrity Auditing Based on the Keyword With Sensitive Information Privacy for Encrypted Cloud Data. 3774-3789 - Sazzadur Rahaman
, Haipeng Cai
, Omar Chowdhury, Danfeng Yao
:
From Theory to Code: Identifying Logical Flaws in Cryptographic Implementations in C/C++. 3790-3803 - Huashan Chen, Hasan Cam, Shouhuai Xu
:
Quantifying Cybersecurity Effectiveness of Dynamic Network Diversity. 3804-3821 - Jordan Samhi
, Alexandre Bartel
:
On The (In)Effectiveness of Static Logic Bomb Detection for Android Apps. 3822-3836 - Yi Wang, Rongmao Chen
, Xinyi Huang
, Baosheng Wang:
Secure Anonymous Communication on Corrupted Machines With Reverse Firewalls. 3837-3854 - Yongyi Cao
, Hao Jiang
, Yuchuan Deng
, Jing Wu
, Pan Zhou
, Wei Luo:
Detecting and Mitigating DDoS Attacks in SDN Using Spatial-Temporal Graph Convolutional Network. 3855-3872 - Lin Yao
, Zhenyu Chen
, Haipeng Dai
, Guowei Wu
:
Exploiting Non-Cooperative Game Against Cache Pollution Attack in Vehicular Content Centric Network. 3873-3886 - Federico Daidone
, Barbara Carminati
, Elena Ferrari
:
Blockchain-Based Privacy Enforcement in the IoT Domain. 3887-3898 - Pei Huang
, Xiaonan Zhang
, Sihan Yu
, Linke Guo
:
IS-WARS: Intelligent and Stealthy Adversarial Attack to Wi-Fi-Based Human Activity Recognition Systems. 3899-3912 - Xuyang Jing, Zheng Yan
, Hui Han, Witold Pedrycz
:
ExtendedSketch: Fusing Network Traffic for Super Host Identification With a Memory Efficient Sketch. 3913-3924 - Lingyuan Yin
, Jing Xu
, Qiang Tang
:
Sidechains With Fast Cross-Chain Transfers. 3925-3940 - Guohua Tian
, Yunhan Hu, Jianghong Wei
, Zheli Liu
, Xinyi Huang
, Xiaofeng Chen
, Willy Susilo
:
Blockchain-Based Secure Deduplication and Shared Auditing in Decentralized Storage. 3941-3954 - Mazen Azzam
, Liliana Pasquale
, Gregory M. Provan
, Bashar Nuseibeh:
Grounds for Suspicion: Physics-Based Early Warnings for Stealthy Attacks on Industrial Control Systems. 3955-3970 - Mohammad M. Jalalzai
, Chen Feng
, Costas Busch, Golden G. Richard III
, Jianyu Niu
:
The Hermes BFT for Blockchains. 3971-3986 - Changjiang Li
, Shouling Ji
, Haiqin Weng, Bo Li, Jie Shi, Raheem Beyah, Shanqing Guo
, Zonghui Wang
, Ting Wang
:
Towards Certifying the Asymmetric Robustness for Neural Networks: Quantification and Applications. 3987-4001 - Cong Wu
, Kun He
, Jing Chen
, Ziming Zhao
, Ruiying Du:
Toward Robust Detection of Puppet Attacks via Characterizing Fingertip-Touch Behaviors. 4002-4018 - Damu Ding
, Marco Savi
, Domenico Siracusa
:
Tracking Normalized Network Traffic Entropy to Detect DDoS Attacks in P4. 4019-4031 - Rachid Guerraoui, Alexandre Maurer
:
Byzantine-Resilient Multi-Agent System. 4032-4038 - Berk Gülmezoglu
:
XAI-Based Microarchitectural Side-Channel Analysis for Website Fingerprinting Attacks and Defenses. 4039-4051 - Amir Rezapour
, Wen-Guey Tzeng
:
RL-Shield: Mitigating Target Link-Flooding Attacks Using SDN and Deep Reinforcement Learning Routing Algorithm. 4052-4067 - Maryam Farajzadeh-Zanjani
, Ehsan Hallaji
, Roozbeh Razavi-Far
, Mehrdad Saif
:
Generative-Adversarial Class-Imbalance Learning for Classifying Cyber-Attacks and Faults - A Cyber-Physical Power System. 4068-4081 - Danilo Bruschi, Andrea Di Pasquale
, Silvio Ghilardi
, Andrea Lanzi, Elena Pagani
:
A Formal Verification of ArpON - A Tool for Avoiding Man-in-the-Middle Attacks in Ethernet Networks. 4082-4098 - Qiang Li, Dawei Tan, Xin Ge, Haining Wang, Zhi Li, Jiqiang Liu:
Understanding Security Risks of Embedded Devices Through Fine-Grained Firmware Fingerprinting. 4099-4112 - Bin Xie
, Tao Xiang
, Xiaofeng Liao
, Jiahui Wu
:
Achieving Privacy-Preserving Online Diagnosis With Outsourced SVM in Internet of Medical Things Environment. 4113-4126 - Samaikya Valluripally
, Aniket Gulhane, Khaza Anuarul Hoque
, Prasad Calyam
:
Modeling and Defense of Social Virtual Reality Attacks Inducing Cybersickness. 4127-4144 - Pengfei Tang
, Wenjie Wang
, Jian Lou
, Li Xiong
:
Generating Adversarial Examples With Distance Constrained Adversarial Imitation Networks. 4145-4155 - Zihan Sha
, Hui Shu
, Xiaobing Xiong, Fei Kang:
Model of Execution Trace Obfuscation Between Threads. 4156-4171 - Anas Daghistani
, Mosab Khayat
, Muhamad Felemban, Walid G. Aref
, Arif Ghafoor
:
Guard: Attack-Resilient Adaptive Load Balancing in Distributed Streaming Systems. 4172-4186 - Saeid Mofrad
, Ishtiaq Ahmed
, Fengwei Zhang
, Shiyong Lu
, Ping Yang
, Heming Cui
:
Securing Big Data Scientific Workflows via Trusted Heterogeneous Environments. 4187-4203 - Haibin Zheng
, Jinyin Chen
, Hang Du, Weipeng Zhu, Shouling Ji
, Xuhong Zhang:
GRIP-GAN: An Attack-Free Defense Through General Robust Inverse Perturbation. 4204-4224 - Xiaojun Zhang
, Chao Huang
, Yuan Zhang
, Sheng Cao
:
Enabling Verifiable Privacy-Preserving Multi-Type Data Aggregation in Smart Grids. 4225-4239 - Zhijian Shao
, Jian Weng
, Yue Zhang
, Yongdong Wu
, Ming Li
, Jiasi Weng
, Weiqi Luo
, Shui Yu
:
Peripheral-Free Device Pairing by Randomly Switching Power. 4240-4254 - Afsah Anwar, Ahmed Abusnaina
, Songqing Chen
, Frank Li, David Mohaisen
:
Cleaning the NVD: Comprehensive Quality Assessment, Improvements, and Analyses. 4255-4269 - Jiahui Hou
, Huiqi Liu
, Yunxin Liu
, Yu Wang
, Peng-Jun Wan, Xiang-Yang Li
:
Model Protection: Real-Time Privacy-Preserving Inference Service for Model Privacy at the Edge. 4270-4284 - Albert Guan
, Chia-Mei Chen
:
A Novel Verification Scheme to Resist Online Password Guessing Attacks. 4285-4293

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.