Loading…
Efficient and Expressive Keyword Search Over Encrypted Data in Cloud
Cui, Hui, Wan, Zhiguo, Deng, Robert H., Wang, Guilin, Li, Yingjiu
Published in IEEE transactions on dependable and secure computing (01.05.2018)
Published in IEEE transactions on dependable and secure computing (01.05.2018)
Get full text
Journal Article
Loading…
Loading…
A Robust and Lightweight Privacy-Preserving Data Aggregation Scheme for Smart Grid
Wu, Liqiang, Fu, Shaojing, Luo, Yuchuan, Yan, Hongyang, Shi, Heyuan, Xu, Ming
Published in IEEE transactions on dependable and secure computing (01.01.2024)
Published in IEEE transactions on dependable and secure computing (01.01.2024)
Get full text
Journal Article
Loading…
SwissLog: Robust Anomaly Detection and Localization for Interleaved Unstructured Logs
Li, Xiaoyun, Chen, Pengfei, Jing, Linxiao, He, Zilong, Yu, Guangba
Published in IEEE transactions on dependable and secure computing (01.07.2023)
Published in IEEE transactions on dependable and secure computing (01.07.2023)
Get full text
Journal Article
Loading…
Verifiable Outsourced Attribute-Based Encryption Scheme for Cloud-Assisted Mobile E-Health System
Miao, Yinbin, Li, Feng, Li, Xinghua, Ning, Jianting, Li, Hongwei, Choo, Kim-Kwang Raymond, Deng, Robert H.
Published in IEEE transactions on dependable and secure computing (01.07.2024)
Published in IEEE transactions on dependable and secure computing (01.07.2024)
Get full text
Journal Article
Loading…
Multi-User Verifiable Searchable Symmetric Encryption for Cloud Storage
Liu, Xueqiao, Yang, Guomin, Mu, Yi, Deng, Robert H.
Published in IEEE transactions on dependable and secure computing (01.11.2020)
Published in IEEE transactions on dependable and secure computing (01.11.2020)
Get full text
Journal Article
Loading…
Supersingular Isogeny Diffie-Hellman Key Exchange on 64-Bit ARM
Jalali, Amir, Azarderakhsh, Reza, Kermani, Mehran Mozaffari, Jao, David
Published in IEEE transactions on dependable and secure computing (01.09.2019)
Published in IEEE transactions on dependable and secure computing (01.09.2019)
Get full text
Journal Article
Loading…
Towards Understanding and Mitigating Audio Adversarial Examples for Speaker Recognition
Chen, Guangke, Zhao, Zhe, Song, Fu, Chen, Sen, Fan, Lingling, Wang, Feng, Wang, Jiashui
Published in IEEE transactions on dependable and secure computing (01.09.2023)
Published in IEEE transactions on dependable and secure computing (01.09.2023)
Get full text
Journal Article
Loading…
Loading…
zk-AuthFeed: Protecting Data Feed to Smart Contracts With Authenticated Zero Knowledge Proof
Wan, Zhiguo, Zhou, Yan, Ren, Kui
Published in IEEE transactions on dependable and secure computing (01.03.2023)
Published in IEEE transactions on dependable and secure computing (01.03.2023)
Get full text
Journal Article
Loading…
Loading…
Efficient Delegated Private Set Intersection on Outsourced Private Datasets
Abadi, Aydin, Terzis, Sotirios, Metere, Roberto, Dong, Changyu
Published in IEEE transactions on dependable and secure computing (01.07.2019)
Published in IEEE transactions on dependable and secure computing (01.07.2019)
Get full text
Journal Article
Loading…
Loading…
Evolutionary Dynamic Database Partitioning Optimization for Privacy and Utility
Ge, Yong-Feng, Wang, Hua, Bertino, Elisa, Zhan, Zhi-Hui, Cao, Jinli, Zhang, Yanchun, Zhang, Jun
Published in IEEE transactions on dependable and secure computing (01.07.2024)
Published in IEEE transactions on dependable and secure computing (01.07.2024)
Get full text
Journal Article
Loading…
Backdoor Attack on Machine Learning Based Android Malware Detectors
Li, Chaoran, Chen, Xiao, Wang, Derui, Wen, Sheng, Ahmed, Muhammad Ejaz, Camtepe, Seyit, Xiang, Yang
Published in IEEE transactions on dependable and secure computing (01.09.2022)
Published in IEEE transactions on dependable and secure computing (01.09.2022)
Get full text
Journal Article
Loading…
A Large-Scale Empirical Study on the Vulnerability of Deployed IoT Devices
Zhao, Binbin, Ji, Shouling, Lee, Wei-Han, Lin, Changting, Weng, Haiqin, Wu, Jingzheng, Zhou, Pan, Fang, Liming, Beyah, Raheem
Published in IEEE transactions on dependable and secure computing (01.05.2022)
Published in IEEE transactions on dependable and secure computing (01.05.2022)
Get full text
Journal Article
Loading…
Malware Detection in Cloud Computing Infrastructures
Watson, Michael R., Shirazi, Noor-ul-hassan, Marnerides, Angelos K., Mauthe, Andreas, Hutchison, David
Published in IEEE transactions on dependable and secure computing (01.03.2016)
Published in IEEE transactions on dependable and secure computing (01.03.2016)
Get full text
Journal Article
Loading…
Sidechains With Fast Cross-Chain Transfers
Yin, Lingyuan, Xu, Jing, Tang, Qiang
Published in IEEE transactions on dependable and secure computing (01.11.2022)
Published in IEEE transactions on dependable and secure computing (01.11.2022)
Get full text
Journal Article
Loading…
Loading…
APTSHIELD: A Stable, Efficient and Real-Time APT Detection System for Linux Hosts
Zhu, Tiantian, Yu, Jinkai, Xiong, Chunlin, Cheng, Wenrui, Yuan, Qixuan, Ying, Jie, Chen, Tieming, Zhang, Jiabo, Lv, Mingqi, Chen, Yan, Wang, Ting, Fan, Yuan
Published in IEEE transactions on dependable and secure computing (01.11.2023)
Published in IEEE transactions on dependable and secure computing (01.11.2023)
Get full text
Journal Article