Loading…
Loading…
Towards Automated Log Parsing for Large-Scale Log Data Analysis
He, Pinjia, Zhu, Jieming, He, Shilin, Li, Jian, Lyu, Michael R.
Published in IEEE transactions on dependable and secure computing (01.11.2018)
Published in IEEE transactions on dependable and secure computing (01.11.2018)
Get full text
Journal Article
Loading…
Detecting Automation of Twitter Accounts: Are You a Human, Bot, or Cyborg?
Zi Chu, Gianvecchio, S., Haining Wang, Jajodia, S.
Published in IEEE transactions on dependable and secure computing (01.11.2012)
Published in IEEE transactions on dependable and secure computing (01.11.2012)
Get full text
Journal Article
Loading…
A Robustness-Assured White-Box Watermark in Neural Networks
Lv, Peizhuo, Li, Pan, Zhang, Shengzhi, Chen, Kai, Liang, Ruigang, Ma, Hualong, Zhao, Yue, Li, Yingjiu
Published in IEEE transactions on dependable and secure computing (01.11.2023)
Published in IEEE transactions on dependable and secure computing (01.11.2023)
Get full text
Journal Article
Loading…
VeriFi: Towards Verifiable Federated Unlearning
Gao, Xiangshan, Ma, Xingjun, Wang, Jingyi, Sun, Youcheng, Li, Bo, Ji, Shouling, Cheng, Peng, Chen, Jiming
Published in IEEE transactions on dependable and secure computing (01.11.2024)
Published in IEEE transactions on dependable and secure computing (01.11.2024)
Get full text
Journal Article
Loading…
New Publicly Verifiable Databases with Efficient Updates
Chen, Xiaofeng, Li, Jin, Huang, Xinyi, Ma, Jianfeng, Lou, Wenjing
Published in IEEE transactions on dependable and secure computing (01.09.2015)
Published in IEEE transactions on dependable and secure computing (01.09.2015)
Get full text
Journal Article
Loading…
Towards Detecting Compromised Accounts on Social Networks
Egele, Manuel, Stringhini, Gianluca, Kruegel, Christopher, Vigna, Giovanni
Published in IEEE transactions on dependable and secure computing (01.07.2017)
Published in IEEE transactions on dependable and secure computing (01.07.2017)
Get full text
Journal Article
Loading…
Linguistic Steganography Based on Adaptive Probability Distribution
Zhou, Xuejing, Peng, Wanli, Yang, Boya, Wen, Juan, Xue, Yiming, Zhong, Ping
Published in IEEE transactions on dependable and secure computing (01.09.2022)
Published in IEEE transactions on dependable and secure computing (01.09.2022)
Get full text
Journal Article
Loading…
Lightweight Sharable and Traceable Secure Mobile Health System
Yang, Yang, Liu, Ximeng, Deng, Robert H., Li, Yingjiu
Published in IEEE transactions on dependable and secure computing (01.01.2020)
Published in IEEE transactions on dependable and secure computing (01.01.2020)
Get full text
Journal Article
Loading…
Blockchain-Based Certificate Transparency and Revocation Transparency
Wang, Ze, Lin, Jingqiang, Cai, Quanwei, Wang, Qiongxiao, Zha, Daren, Jing, Jiwu
Published in IEEE transactions on dependable and secure computing (01.01.2022)
Published in IEEE transactions on dependable and secure computing (01.01.2022)
Get full text
Journal Article
Loading…
Enabling Reliable Keyword Search in Encrypted Decentralized Storage with Fairness
Cai, Chengjun, Weng, Jian, Yuan, Xingliang, Wang, Cong
Published in IEEE transactions on dependable and secure computing (01.01.2021)
Published in IEEE transactions on dependable and secure computing (01.01.2021)
Get full text
Journal Article
Loading…
Efficient and Private Scoring of Decision Trees, Support Vector Machines and Logistic Regression Models Based on Pre-Computation
De Cock, Martine, Dowsley, Rafael, Horst, Caleb, Katti, Raj, Nascimento, Anderson C. A., Poon, Wing-Sea, Truex, Stacey
Published in IEEE transactions on dependable and secure computing (01.03.2019)
Published in IEEE transactions on dependable and secure computing (01.03.2019)
Get full text
Journal Article
Loading…
Efficient and Secure Federated Learning Against Backdoor Attacks
Miao, Yinbin, Xie, Rongpeng, Li, Xinghua, Liu, Zhiquan, Choo, Kim-Kwang Raymond, Deng, Robert H.
Published in IEEE transactions on dependable and secure computing (01.09.2024)
Published in IEEE transactions on dependable and secure computing (01.09.2024)
Get full text
Journal Article
Loading…
Poisoning-Assisted Property Inference Attack Against Federated Learning
Wang, Zhibo, Huang, Yuting, Song, Mengkai, Wu, Libing, Xue, Feng, Ren, Kui
Published in IEEE transactions on dependable and secure computing (01.07.2023)
Published in IEEE transactions on dependable and secure computing (01.07.2023)
Get full text
Journal Article
Loading…
Distributed Attack Detection in a Water Treatment Plant: Method and Case Study
Adepu, Sridhar, Mathur, Aditya
Published in IEEE transactions on dependable and secure computing (01.01.2021)
Published in IEEE transactions on dependable and secure computing (01.01.2021)
Get full text
Journal Article
Loading…
Detecting and Mitigating DDoS Attacks in SDN Using Spatial-Temporal Graph Convolutional Network
Cao, Yongyi, Jiang, Hao, Deng, Yuchuan, Wu, Jing, Zhou, Pan, Luo, Wei
Published in IEEE transactions on dependable and secure computing (01.11.2022)
Published in IEEE transactions on dependable and secure computing (01.11.2022)
Get full text
Journal Article
Loading…
Loading…
PILE: Robust Privacy-Preserving Federated Learning Via Verifiable Perturbations
Tang, Xiangyun, Shen, Meng, Li, Qi, Zhu, Liehuang, Xue, Tengfei, Qu, Qiang
Published in IEEE transactions on dependable and secure computing (01.11.2023)
Published in IEEE transactions on dependable and secure computing (01.11.2023)
Get full text
Journal Article
Loading…
Secure Fine-Grained Encrypted Keyword Search for E-Healthcare Cloud
Wang, Haijiang, Ning, Jianting, Huang, Xinyi, Wei, Guiyi, Poh, Geong Sen, Liu, Ximeng
Published in IEEE transactions on dependable and secure computing (01.05.2021)
Published in IEEE transactions on dependable and secure computing (01.05.2021)
Get full text
Journal Article
Loading…
A Provably-Secure Cross-Domain Handshake Scheme with Symptoms-Matching for Mobile Healthcare Social Network
He, Debiao, Kumar, Neeraj, Wang, Huaqun, Wang, Lina, Choo, Kim-Kwang Raymond, Vinel, Alexey
Published in IEEE transactions on dependable and secure computing (01.07.2018)
Published in IEEE transactions on dependable and secure computing (01.07.2018)
Get full text
Journal Article