Loading…
Mobile Crowdsourcing Task Allocation with Differential-and-Distortion Geo-Obfuscation
Wang, Leye, Yang, Dingqi, Han, Xiao, Zhang, Daqing, Ma, Xiaojuan
Published in IEEE transactions on dependable and secure computing (01.03.2021)
Published in IEEE transactions on dependable and secure computing (01.03.2021)
Get full text
Journal Article
Loading…
Dynamic Group-Oriented Provable Data Possession in the Cloud
He, Kun, Chen, Jing, Yuan, Quan, Ji, Shouling, He, Debiao, Du, Ruiying
Published in IEEE transactions on dependable and secure computing (01.05.2021)
Published in IEEE transactions on dependable and secure computing (01.05.2021)
Get full text
Journal Article
Loading…
PSRide: Privacy-Preserving Shared Ride Matching for Online Ride Hailing Systems
Yu, Haining, Jia, Xiaohua, Zhang, Hongli, Yu, Xiangzhan, Shu, Jiangang
Published in IEEE transactions on dependable and secure computing (01.05.2021)
Published in IEEE transactions on dependable and secure computing (01.05.2021)
Get full text
Journal Article
Loading…
Enabling Verifiable Privacy-Preserving Multi-Type Data Aggregation in Smart Grids
Zhang, Xiaojun, Huang, Chao, Zhang, Yuan, Cao, Sheng
Published in IEEE transactions on dependable and secure computing (01.11.2022)
Published in IEEE transactions on dependable and secure computing (01.11.2022)
Get full text
Journal Article
Loading…
VOSA: Verifiable and Oblivious Secure Aggregation for Privacy-Preserving Federated Learning
Wang, Yong, Zhang, Aiqing, Wu, Shu, Yu, Shui
Published in IEEE transactions on dependable and secure computing (01.09.2023)
Published in IEEE transactions on dependable and secure computing (01.09.2023)
Get full text
Journal Article
Loading…
A Credibility Analysis System for Assessing Information on Twitter
Alrubaian, Majed, Al-Qurishi, Muhammad, Hassan, Mohammad Mehedi, Alamri, Atif
Published in IEEE transactions on dependable and secure computing (01.07.2018)
Published in IEEE transactions on dependable and secure computing (01.07.2018)
Get full text
Journal Article
Loading…
Perceptual Image Hashing With Locality Preserving Projection for Copy Detection
Huang, Ziqing, Tang, Zhenjun, Zhang, Xianquan, Ruan, Linlin, Zhang, Xinpeng
Published in IEEE transactions on dependable and secure computing (01.01.2023)
Published in IEEE transactions on dependable and secure computing (01.01.2023)
Get full text
Journal Article
Loading…
GTID: A Technique for Physical Device and Device Type Fingerprinting
Radhakrishnan, Sakthi Vignesh, Uluagac, A. Selcuk, Beyah, Raheem
Published in IEEE transactions on dependable and secure computing (01.09.2015)
Published in IEEE transactions on dependable and secure computing (01.09.2015)
Get full text
Journal Article
Loading…
BadCleaner: Defending Backdoor Attacks in Federated Learning via Attention-Based Multi-Teacher Distillation
Zhang, Jiale, Zhu, Chengcheng, Ge, Chunpeng, Ma, Chuan, Zhao, Yanchao, Sun, Xiaobing, Chen, Bing
Published in IEEE transactions on dependable and secure computing (01.09.2024)
Published in IEEE transactions on dependable and secure computing (01.09.2024)
Get full text
Journal Article
Loading…
Loading…
GaitLock: Protect Virtual and Augmented Reality Headsets Using Gait
Shen, Yiran, Wen, Hongkai, Luo, Chengwen, Xu, Weitao, Zhang, Tao, Hu, Wen, Rus, Daniela
Published in IEEE transactions on dependable and secure computing (01.05.2019)
Published in IEEE transactions on dependable and secure computing (01.05.2019)
Get full text
Journal Article
Loading…
Attack Hypotheses Generation Based on Threat Intelligence Knowledge Graph
Kaiser, Florian Klaus, Dardik, Uriel, Elitzur, Aviad, Zilberman, Polina, Daniel, Nir, Wiens, Marcus, Schultmann, Frank, Elovici, Yuval, Puzis, Rami
Published in IEEE transactions on dependable and secure computing (01.11.2023)
Published in IEEE transactions on dependable and secure computing (01.11.2023)
Get full text
Journal Article
Loading…
Blockchain-Based Deduplication and Integrity Auditing over Encrypted Cloud Storage
Song, Mingyang, Hua, Zhongyun, Zheng, Yifeng, Huang, Hejiao, Jia, Xiaohua
Published in IEEE transactions on dependable and secure computing (01.11.2023)
Published in IEEE transactions on dependable and secure computing (01.11.2023)
Get full text
Journal Article
Loading…
vCNN: Verifiable Convolutional Neural Network Based on zk-SNARKs
Lee, Seunghwa, Ko, Hankyung, Kim, Jihye, Oh, Hyunok
Published in IEEE transactions on dependable and secure computing (01.07.2024)
Published in IEEE transactions on dependable and secure computing (01.07.2024)
Get full text
Journal Article
Loading…
Pre-Trained Model-Based Automated Software Vulnerability Repair: How Far are We?
Zhang, Quanjun, Fang, Chunrong, Yu, Bowen, Sun, Weisong, Zhang, Tongke, Chen, Zhenyu
Published in IEEE transactions on dependable and secure computing (01.07.2024)
Published in IEEE transactions on dependable and secure computing (01.07.2024)
Get full text
Journal Article
Loading…
Secure and Efficient Two-Party Signing Protocol for the Identity-Based Signature Scheme in the IEEE P1363 Standard for Public Key Cryptography
He, Debiao, Zhang, Yudi, Wang, Ding, Choo, Kim-Kwang Raymond
Published in IEEE transactions on dependable and secure computing (01.09.2020)
Published in IEEE transactions on dependable and secure computing (01.09.2020)
Get full text
Journal Article
Loading…
RevFRF: Enabling Cross-Domain Random Forest Training With Revocable Federated Learning
Liu, Yang, Ma, Zhuo, Yang, Yilong, Liu, Ximeng, Ma, Jianfeng, Ren, Kui
Published in IEEE transactions on dependable and secure computing (01.11.2022)
Published in IEEE transactions on dependable and secure computing (01.11.2022)
Get full text
Journal Article
Loading…
Blockchain-Based Private Provable Data Possession
Wang, Huaqun, Wang, Qihua, He, Debiao
Published in IEEE transactions on dependable and secure computing (01.09.2021)
Published in IEEE transactions on dependable and secure computing (01.09.2021)
Get full text
Journal Article
Loading…
Pagoda: A Hybrid Approach to Enable Efficient Real-Time Provenance Based Intrusion Detection in Big Data Environments
Xie, Yulai, Feng, Dan, Hu, Yuchong, Li, Yan, Sample, Staunton, Long, Darrell Long
Published in IEEE transactions on dependable and secure computing (01.11.2020)
Published in IEEE transactions on dependable and secure computing (01.11.2020)
Get full text
Journal Article
Loading…
Alert-Driven Attack Graph Generation Using S-PDFA
Nadeem, Azqa, Verwer, Sicco, Moskal, Stephen, Yang, Shanchieh Jay
Published in IEEE transactions on dependable and secure computing (01.03.2022)
Published in IEEE transactions on dependable and secure computing (01.03.2022)
Get full text
Journal Article