Yes, Machine Learning Can Be More Secure! A Case Study on Android Malware Detection
来源期刊:IEEE Transactions on Dependable and Secure ComputingDOI:10.1109/TDSC.2017.2700270
Social Network De-Anonymization and Privacy Inference with Knowledge Graph Model
来源期刊:IEEE Transactions on Dependable and Secure ComputingDOI:10.1109/TDSC.2017.2697854
Brew: A Security Policy Analysis Framework for Distributed SDN-Based Cloud Environments
来源期刊:IEEE Transactions on Dependable and Secure ComputingDOI:10.1109/TDSC.2017.2726066
Privacy-Preserving Attribute-Based Keyword Search in Shared Multi-owner Setting
来源期刊:IEEE Transactions on Dependable and Secure ComputingDOI:10.1109/TDSC.2019.2897675
Exact Inference Techniques for the Analysis of Bayesian Attack Graphs
来源期刊:IEEE Transactions on Dependable and Secure ComputingDOI:10.1109/TDSC.2016.2627033
AccConF: An Access Control Framework for Leveraging In-Network Cached Data in the ICN-Enabled Wireless Edge
来源期刊:IEEE Transactions on Dependable and Secure ComputingDOI:10.1109/TDSC.2017.2672991
Privacy-Aware Caching in Information-Centric Networking
来源期刊:IEEE Transactions on Dependable and Secure ComputingDOI:10.1109/TDSC.2017.2679711
A Lightweight Privacy-Preserving CNN Feature Extraction Framework for Mobile Sensing
来源期刊:IEEE Transactions on Dependable and Secure ComputingDOI:10.1109/TDSC.2019.2913362
FS-PEKS: Lattice-based Forward Secure Public-key Encryption with Keyword Search for Cloud-assisted Industrial Internet of Things
来源期刊:IEEE Transactions on Dependable and Secure ComputingDOI:10.1109/TDSC.2019.2914117
Security Pricing as Enabler of Cyber-Insurance A First Look at Differentiated Pricing Markets
来源期刊:IEEE Transactions on Dependable and Secure ComputingDOI:10.1109/TDSC.2017.2684801
GaitLock: Protect Virtual and Augmented Reality Headsets Using Gait
来源期刊:IEEE Transactions on Dependable and Secure ComputingDOI:10.1109/TDSC.2018.2800048
Invisible Backdoor Attacks on Deep Neural Networks via Steganography and Regularization
来源期刊:IEEE Transactions on Dependable and Secure ComputingDOI:10.1109/tdsc.2020.3021407
Efficient and Secure Decision Tree Classification for Cloud-Assisted Online Diagnosis Services
来源期刊:IEEE Transactions on Dependable and Secure ComputingDOI:10.1109/TDSC.2019.2922958
Resource-Aware Detection and Defense System Against Multi-Type Attacks in the Cloud: Repeated Bayesian Stackelberg Game
来源期刊:IEEE Transactions on Dependable and Secure ComputingDOI:10.1109/TDSC.2019.2907946
Robust and Universal Seamless Handover Authentication in 5G HetNets
来源期刊:IEEE Transactions on Dependable and Secure ComputingDOI:10.1109/TDSC.2019.2927664
Memory-Efficient Implementation of Elliptic Curve Cryptography for the Internet-of-Things
来源期刊:IEEE Transactions on Dependable and Secure ComputingDOI:10.1109/TDSC.2018.2825449
Design and Implementation of the Ascend Secure Processor
来源期刊:IEEE Transactions on Dependable and Secure ComputingDOI:10.1109/TDSC.2017.2687463
De-SAG: On the De-Anonymization of Structure-Attribute Graph Data
来源期刊:IEEE Transactions on Dependable and Secure ComputingDOI:10.1109/TDSC.2017.2712150
PrivHome: Privacy-Preserving Authenticated Communication in Smart Home Environment
来源期刊:IEEE Transactions on Dependable and Secure ComputingDOI:10.1109/TDSC.2019.2914911
Efficient Multi-Factor Authenticated Key Exchange Scheme for Mobile Communications
来源期刊:IEEE Transactions on Dependable and Secure ComputingDOI:10.1109/TDSC.2017.2700305
G-SIR: An Insider Attack Resilient Geo-Social Access Control Framework
来源期刊:IEEE Transactions on Dependable and Secure ComputingDOI:10.1109/TDSC.2017.2654438
PersonaIA: A Lightweight Implicit Authentication System Based on Customized User Behavior Selection
来源期刊:IEEE Transactions on Dependable and Secure ComputingDOI:10.1109/TDSC.2016.2645208
Lossless Data Hiding Based on Homomorphic Cryptosystem
来源期刊:IEEE Transactions on Dependable and Secure ComputingDOI:10.1109/TDSC.2019.2913422
IDEA: Intrusion Detection through Electromagnetic-Signal Analysis for Critical Embedded and Cyber-Physical Systems
来源期刊:IEEE Transactions on Dependable and Secure ComputingDOI:10.1109/TDSC.2019.2932736
RACOON++: A Semi-Automatic Framework for the Selfishness-Aware Design of Cooperative Systems
来源期刊:IEEE Transactions on Dependable and Secure ComputingDOI:10.1109/TDSC.2017.2706286
Private Compound Wildcard Queries Using Fully Homomorphic Encryption
来源期刊:IEEE Transactions on Dependable and Secure ComputingDOI:10.1109/TDSC.2017.2763593
SDN-Based Privacy Preserving Cross Domain Routing
来源期刊:IEEE Transactions on Dependable and Secure ComputingDOI:10.1109/TDSC.2018.2811807
Immersive Virtual Reality Attacks and the Human Joystick
来源期刊:IEEE Transactions on Dependable and Secure ComputingDOI:10.1109/TDSC.2019.2907942
Empirical Analysis and Validation of Security Alerts Filtering Techniques
来源期刊:IEEE Transactions on Dependable and Secure ComputingDOI:10.1109/TDSC.2017.2714164
CATTmew: Defeating Software-only Physical Kernel Isolation
来源期刊:IEEE Transactions on Dependable and Secure ComputingDOI:10.1109/tdsc.2019.2946816
Refinement-Based Specification and Security Analysis of Separation Kernels
来源期刊:IEEE Transactions on Dependable and Secure ComputingDOI:10.1109/TDSC.2017.2672983
Denoising in the Dark: Privacy-Preserving Deep Neural Network Based Image Denoising
来源期刊:IEEE Transactions on Dependable and Secure ComputingDOI:10.1109/TDSC.2019.2907081
AP-PRE: Autonomous Path Proxy Re-Encryption and Its Applications
来源期刊:IEEE Transactions on Dependable and Secure ComputingDOI:10.1109/TDSC.2017.2714166
Tool of Spies: Leaking your IP by Altering the 3D Printer Compiler
来源期刊:IEEE Transactions on Dependable and Secure ComputingDOI:10.1109/TDSC.2019.2923215
Multitenant Access Control for Cloud-Aware Distributed Filesystems
来源期刊:IEEE Transactions on Dependable and Secure ComputingDOI:10.1109/TDSC.2017.2715839
DeepFuzzer: Accelerated Deep Greybox Fuzzing
来源期刊:IEEE Transactions on Dependable and Secure ComputingDOI:10.1109/tdsc.2019.2961339
Reducing Timing Side-Channel Information Leakage Using 3D Integration
来源期刊:IEEE Transactions on Dependable and Secure ComputingDOI:10.1109/TDSC.2017.2712156
A Mixing Scheme Using a Decentralized Signature Protocol for Privacy Protection in Bitcoin Blockchain
来源期刊:IEEE Transactions on Dependable and Secure ComputingDOI:10.1109/tdsc.2019.2938953
KALD: Detecting Direct Pointer Disclosure Vulnerabilities
来源期刊:IEEE Transactions on Dependable and Secure ComputingDOI:10.1109/TDSC.2019.2915829
Mobile Crowdsourcing Task Allocation with Differential-and-Distortion Geo-Obfuscation
来源期刊:IEEE Transactions on Dependable and Secure ComputingDOI:10.1109/TDSC.2019.2912886
Stochastic Model Checking for Predicting Component Failures and Service Availability
来源期刊:IEEE Transactions on Dependable and Secure ComputingDOI:10.1109/TDSC.2017.2650901
Looking Back! Using Early Versions of Android Apps as Attack Vectors
来源期刊:IEEE Transactions on Dependable and Secure ComputingDOI:10.1109/TDSC.2019.2914202
A Highly Efficient Side Channel Attack with Profiling through Relevance-Learning on Physical Leakage Information
来源期刊:IEEE Transactions on Dependable and Secure ComputingDOI:10.1109/TDSC.2018.2864727
PSpec-SQL: Enabling Fine-Grained Control for Distributed Data Analytics
来源期刊:IEEE Transactions on Dependable and Secure ComputingDOI:10.1109/TDSC.2019.2914209
SAIS: Self-Adaptive Identification of Security Bug Reports
来源期刊:IEEE Transactions on Dependable and Secure ComputingDOI:10.1109/tdsc.2019.2939132
An Integrated Privacy Preserving Attribute Based Access Control Framework Supporting Secure Deduplication
来源期刊:IEEE Transactions on Dependable and Secure ComputingDOI:10.1109/tdsc.2019.2946073
STYX: A Hierarchical Key Management System Oriented to Elastic Content Delivery Networks on Public Clouds
来源期刊:IEEE Transactions on Dependable and Secure ComputingDOI:10.1109/TDSC.2019.2918278
Security of streaming media communications with logistic map and self-adaptive detection-based steganography
来源期刊:IEEE Transactions on Dependable and Secure ComputingDOI:10.1109/tdsc.2019.2946138
Another Look at Anonymous Communication
来源期刊:IEEE Transactions on Dependable and Secure ComputingDOI:10.1109/TDSC.2018.2828002
PVOPM: Verifiable Privacy-preserving Pattern Matching with Efficient Outsourcing in the Malicious Setting
来源期刊:IEEE Transactions on Dependable and Secure ComputingDOI:10.1109/tdsc.2019.2947436