Loading…
Timely Detection and Mitigation of Stealthy DDoS Attacks Via IoT Networks
Doshi, Keval, Yilmaz, Yasin, Uludag, Suleyman
Published in IEEE transactions on dependable and secure computing (01.09.2021)
Published in IEEE transactions on dependable and secure computing (01.09.2021)
Get full text
Journal Article
Loading…
Towards an Interpretable Autoencoder: A Decision-Tree-Based Autoencoder and its Application in Anomaly Detection
Aguilar, Diana Laura, Medina-Perez, Miguel Angel, Loyola-Gonzalez, Octavio, Choo, Kim-Kwang Raymond, Bucheli-Susarrey, Edoardo
Published in IEEE transactions on dependable and secure computing (01.03.2023)
Published in IEEE transactions on dependable and secure computing (01.03.2023)
Get full text
Journal Article
Loading…
Loading…
One-to-N & N-to-One: Two Advanced Backdoor Attacks Against Deep Learning Models
Xue, Mingfu, He, Can, Wang, Jian, Liu, Weiqiang
Published in IEEE transactions on dependable and secure computing (01.05.2022)
Published in IEEE transactions on dependable and secure computing (01.05.2022)
Get full text
Journal Article
Loading…
FABRIC: Fast and Secure Unbounded Cross-System Encrypted Data Sharing in Cloud Computing
Wang, Lili, Lin, Ye, Yao, Ting, Xiong, Hu, Liang, Kaitai
Published in IEEE transactions on dependable and secure computing (01.11.2023)
Published in IEEE transactions on dependable and secure computing (01.11.2023)
Get full text
Journal Article
Loading…
DL-FHMC: Deep Learning-Based Fine-Grained Hierarchical Learning Approach for Robust Malware Classification
Abusnaina, Ahmed, Abuhamad, Mohammed, Alasmary, Hisham, Anwar, Afsah, Jang, Rhongho, Salem, Saeed, Nyang, DaeHun, Mohaisen, David
Published in IEEE transactions on dependable and secure computing (01.09.2022)
Published in IEEE transactions on dependable and secure computing (01.09.2022)
Get full text
Journal Article
Loading…
PUF-Based Mutual Authentication and Key Exchange Protocol for Peer-to-Peer IoT Applications
Zheng, Yue, Liu, Wenye, Gu, Chongyan, Chang, Chip-Hong
Published in IEEE transactions on dependable and secure computing (01.07.2023)
Published in IEEE transactions on dependable and secure computing (01.07.2023)
Get full text
Journal Article
Loading…
Secret Sharing Based Reversible Data Hiding in Encrypted Images With Multiple Data-Hiders
Chen, Bing, Lu, Wei, Huang, Jiwu, Weng, Jian, Zhou, Yicong
Published in IEEE transactions on dependable and secure computing (01.03.2022)
Published in IEEE transactions on dependable and secure computing (01.03.2022)
Get full text
Journal Article
Loading…
Releasing Correlated Trajectories: Towards High Utility and Optimal Differential Privacy
Ou, Lu, Qin, Zheng, Liao, Shaolin, Hong, Yuan, Jia, Xiaohua
Published in IEEE transactions on dependable and secure computing (01.09.2020)
Published in IEEE transactions on dependable and secure computing (01.09.2020)
Get full text
Journal Article
Loading…
Deep Learning and Visualization for Identifying Malware Families
Sun, Guosong, Qian, Quan
Published in IEEE transactions on dependable and secure computing (01.01.2021)
Published in IEEE transactions on dependable and secure computing (01.01.2021)
Get full text
Journal Article
Loading…
Checking Only When It Is Necessary: Enabling Integrity Auditing Based on the Keyword With Sensitive Information Privacy for Encrypted Cloud Data
Gao, Xiang, Yu, Jia, Chang, Yan, Wang, Huaqun, Fan, Jianxi
Published in IEEE transactions on dependable and secure computing (01.11.2022)
Published in IEEE transactions on dependable and secure computing (01.11.2022)
Get full text
Journal Article
Loading…
PrivHome: Privacy-Preserving Authenticated Communication in Smart Home Environment
Poh, Geong Sen, Gope, Prosanta, Ning, Jianting
Published in IEEE transactions on dependable and secure computing (01.05.2021)
Published in IEEE transactions on dependable and secure computing (01.05.2021)
Get full text
Journal Article
Loading…
Loading…
Oracle-Supported Dynamic Exploit Generation for Smart Contracts
Wang, Haijun, Liu, Ye, Li, Yi, Lin, Shang-Wei, Artho, Cyrille, Ma, Lei, Liu, Yang
Published in IEEE Transactions on Dependable and Secure Computing (01.05.2022)
Published in IEEE Transactions on Dependable and Secure Computing (01.05.2022)
Get full text
Journal Article
Loading…
Loading…
Loading…
Loading…
Efficient and Secure Outsourcing of Differentially Private Data Publishing With Multiple Evaluators
Li, Jin, Ye, Heng, Li, Tong, Wang, Wei, Lou, Wenjing, Hou, Y. Thomas, Liu, Jiqiang, Lu, Rongxing
Published in IEEE transactions on dependable and secure computing (01.01.2022)
Published in IEEE transactions on dependable and secure computing (01.01.2022)
Get full text
Journal Article
Loading…
Design and Evaluation of a Multi-Domain Trojan Detection Method on Deep Neural Networks
Gao, Yansong, Kim, Yeonjae, Doan, Bao Gia, Zhang, Zhi, Zhang, Gongxuan, Nepal, Surya, Ranasinghe, Damith C., Kim, Hyoungshick
Published in IEEE transactions on dependable and secure computing (01.07.2022)
Published in IEEE transactions on dependable and secure computing (01.07.2022)
Get full text
Journal Article
Loading…