Loading…
Loading…
Revocable Identity-Based Broadcast Proxy Re-Encryption for Data Sharing in Clouds
Ge, Chunpeng, Liu, Zhe, Xia, Jinyue, Fang, Liming
Published in IEEE transactions on dependable and secure computing (01.05.2021)
Published in IEEE transactions on dependable and secure computing (01.05.2021)
Get full text
Journal Article
Loading…
Revocable Attribute-Based Encryption With Data Integrity in Clouds
Ge, Chunpeng, Susilo, Willy, Baek, Joonsang, Liu, Zhe, Xia, Jinyue, Fang, Liming
Published in IEEE transactions on dependable and secure computing (01.09.2022)
Published in IEEE transactions on dependable and secure computing (01.09.2022)
Get full text
Journal Article
Loading…
Loading…
A Lightweight Privacy-Preserving CNN Feature Extraction Framework for Mobile Sensing
Huang, Kai, Liu, Ximeng, Fu, Shaojing, Guo, Deke, Xu, Ming
Published in IEEE transactions on dependable and secure computing (01.05.2021)
Published in IEEE transactions on dependable and secure computing (01.05.2021)
Get full text
Journal Article
Loading…
Loading…
Quantum2FA: Efficient Quantum-Resistant Two-Factor Authentication Scheme for Mobile Devices
Wang, Qingxuan, Wang, Ding, Cheng, Chi, He, Debiao
Published in IEEE transactions on dependable and secure computing (01.01.2023)
Published in IEEE transactions on dependable and secure computing (01.01.2023)
Get full text
Journal Article
Loading…
Loading…
Loading…
Secure Keyword Search and Data Sharing Mechanism for Cloud Computing
Ge, Chunpeng, Susilo, Willy, Liu, Zhe, Xia, Jinyue, Szalachowski, Pawel, Fang, Liming
Published in IEEE transactions on dependable and secure computing (01.11.2021)
Published in IEEE transactions on dependable and secure computing (01.11.2021)
Get full text
Journal Article
Loading…
Privacy-Preserving Federated Deep Learning With Irregular Users
Xu, Guowen, Li, Hongwei, Zhang, Yun, Xu, Shengmin, Ning, Jianting, Deng, Robert H.
Published in IEEE transactions on dependable and secure computing (01.03.2022)
Published in IEEE transactions on dependable and secure computing (01.03.2022)
Get full text
Journal Article
Loading…
Searchable Symmetric Encryption with Forward Search Privacy
Li, Jin, Huang, Yanyu, Wei, Yu, Lv, Siyi, Liu, Zheli, Dong, Changyu, Lou, Wenjing
Published in IEEE transactions on dependable and secure computing (01.01.2021)
Published in IEEE transactions on dependable and secure computing (01.01.2021)
Get full text
Journal Article
Loading…
A Game-Theoretical Approach for Mitigating Edge DDoS Attack
He, Qiang, Wang, Cheng, Cui, Guangming, Li, Bo, Zhou, Rui, Zhou, Qingguo, Xiang, Yang, Jin, Hai, Yang, Yun
Published in IEEE transactions on dependable and secure computing (01.07.2022)
Published in IEEE transactions on dependable and secure computing (01.07.2022)
Get full text
Journal Article
Loading…
Loading…
Yes, Machine Learning Can Be More Secure! A Case Study on Android Malware Detection
Demontis, Ambra, Melis, Marco, Biggio, Battista, Maiorca, Davide, Arp, Daniel, Rieck, Konrad, Corona, Igino, Giacinto, Giorgio, Roli, Fabio
Published in IEEE transactions on dependable and secure computing (01.07.2019)
Published in IEEE transactions on dependable and secure computing (01.07.2019)
Get full text
Journal Article
Loading…
SEAR: Secure and Efficient Aggregation for Byzantine-Robust Federated Learning
Zhao, Lingchen, Jiang, Jianlin, Feng, Bo, Wang, Qian, Shen, Chao, Li, Qi
Published in IEEE transactions on dependable and secure computing (01.09.2022)
Published in IEEE transactions on dependable and secure computing (01.09.2022)
Get full text
Journal Article
Loading…
Block Design-Based Key Agreement for Group Data Sharing in Cloud Computing
Shen, Jian, Zhou, Tianqi, He, Debiao, Zhang, Yuexin, Sun, Xingming, Xiang, Yang
Published in IEEE transactions on dependable and secure computing (01.11.2019)
Published in IEEE transactions on dependable and secure computing (01.11.2019)
Get full text
Journal Article
Loading…
Conan: A Practical Real-Time APT Detection System With High Accuracy and Efficiency
Xiong, Chunlin, Zhu, Tiantian, Dong, Weihao, Ruan, Linqi, Yang, Runqing, Cheng, Yueqiang, Chen, Yan, Cheng, Shuai, Chen, Xutong
Published in IEEE transactions on dependable and secure computing (01.01.2022)
Published in IEEE transactions on dependable and secure computing (01.01.2022)
Get full text
Journal Article
Loading…
Trust-Based Service Management for Social Internet of Things Systems
Chen, Ing-Ray, Bao, Fenye, Guo, Jia
Published in IEEE transactions on dependable and secure computing (01.11.2016)
Published in IEEE transactions on dependable and secure computing (01.11.2016)
Get full text
Journal Article
Loading…
LoMar: A Local Defense Against Poisoning Attack on Federated Learning
Li, Xingyu, Qu, Zhe, Zhao, Shangqing, Tang, Bo, Lu, Zhuo, Liu, Yao
Published in IEEE transactions on dependable and secure computing (01.01.2023)
Published in IEEE transactions on dependable and secure computing (01.01.2023)
Get full text
Journal Article