Loading…
Dynamic Security Risk Management Using Bayesian Attack Graphs
Poolsappasit, N., Dewri, R., Ray, I.
Published in IEEE transactions on dependable and secure computing (01.01.2012)
Published in IEEE transactions on dependable and secure computing (01.01.2012)
Get full text
Journal Article
Loading…
Loading…
xFuzz: Machine Learning Guided Cross-Contract Fuzzing
Xue, Yinxing, Ye, Jiaming, Zhang, Wei, Sun, Jun, Ma, Lei, Wang, Haijun, Zhao, Jianjun
Published in IEEE transactions on dependable and secure computing (01.03.2024)
Published in IEEE transactions on dependable and secure computing (01.03.2024)
Get full text
Journal Article
Loading…
Loading…
Dual Access Control for Cloud-Based Data Storage and Sharing
Ning, Jianting, Huang, Xinyi, Susilo, Willy, Liang, Kaitai, Liu, Ximeng, Zhang, Yinghui
Published in IEEE transactions on dependable and secure computing (01.03.2022)
Published in IEEE transactions on dependable and secure computing (01.03.2022)
Get full text
Journal Article
Loading…
Securely Outsourcing Neural Network Inference to the Cloud With Lightweight Techniques
Liu, Xiaoning, Zheng, Yifeng, Yuan, Xingliang, Yi, Xun
Published in IEEE transactions on dependable and secure computing (01.01.2023)
Published in IEEE transactions on dependable and secure computing (01.01.2023)
Get full text
Journal Article
Loading…
EBSNN: Extended Byte Segment Neural Network for Network Traffic Classification
Xiao, Xi, Xiao, Wentao, Li, Rui, Luo, Xiapu, Zheng, Haitao, Xia, Shutao
Published in IEEE transactions on dependable and secure computing (01.09.2022)
Published in IEEE transactions on dependable and secure computing (01.09.2022)
Get full text
Journal Article
Loading…
Distribution-Preserving Steganography Based on Text-to-Speech Generative Models
Chen, Kejiang, Zhou, Hang, Zhao, Hanqing, Chen, Dongdong, Zhang, Weiming, Yu, Nenghai
Published in IEEE transactions on dependable and secure computing (01.09.2022)
Published in IEEE transactions on dependable and secure computing (01.09.2022)
Get full text
Journal Article
Loading…
Secure and Utility-Aware Data Collection with Condensed Local Differential Privacy
Gursoy, Mehmet Emre, Tamersoy, Acar, Truex, Stacey, Wei, Wenqi, Liu, Ling
Published in IEEE transactions on dependable and secure computing (01.09.2021)
Published in IEEE transactions on dependable and secure computing (01.09.2021)
Get full text
Journal Article
Loading…
FuzzyDedup: Secure Fuzzy Deduplication for Cloud Storage
Jiang, Tao, Yuan, Xu, Chen, Yuan, Cheng, Ke, Wang, Liangmin, Chen, Xiaofeng, Ma, Jianfeng
Published in IEEE transactions on dependable and secure computing (01.05.2023)
Published in IEEE transactions on dependable and secure computing (01.05.2023)
Get full text
Journal Article
Loading…
Privacy-Aware and Efficient Mobile Crowdsensing with Truth Discovery
Zheng, Yifeng, Duan, Huayi, Yuan, Xingliang, Wang, Cong
Published in IEEE transactions on dependable and secure computing (01.01.2020)
Published in IEEE transactions on dependable and secure computing (01.01.2020)
Get full text
Journal Article
Loading…
Loading…
A Differentially Private Federated Learning Model Against Poisoning Attacks in Edge Computing
Zhou, Jun, Wu, Nan, Wang, Yisong, Gu, Shouzhen, Cao, Zhenfu, Dong, Xiaolei, Choo, Kim-Kwang Raymond
Published in IEEE transactions on dependable and secure computing (01.05.2023)
Published in IEEE transactions on dependable and secure computing (01.05.2023)
Get full text
Journal Article
Loading…
Efficient Identity-Based Data Integrity Auditing with Key-Exposure Resistance for Cloud Storage
Shen, Wenting, Yu, Jia, Yang, Ming, Hu, Jiankun
Published in IEEE transactions on dependable and secure computing (01.11.2023)
Published in IEEE transactions on dependable and secure computing (01.11.2023)
Get full text
Journal Article
Loading…
Loading…
CD-VulD: Cross-Domain Vulnerability Discovery Based on Deep Domain Adaptation
Liu, Shigang, Lin, Guanjun, Qu, Lizhen, Zhang, Jun, De Vel, Olivier, Montague, Paul, Xiang, Yang
Published in IEEE transactions on dependable and secure computing (01.01.2022)
Published in IEEE transactions on dependable and secure computing (01.01.2022)
Get full text
Journal Article
Loading…
Loading…
Detecting and Mitigating Target Link-Flooding Attacks Using SDN
Wang, Juan, Wen, Ru, Li, Jiangqi, Yan, Fei, Zhao, Bo, Yu, Fajiang
Published in IEEE transactions on dependable and secure computing (01.11.2019)
Published in IEEE transactions on dependable and secure computing (01.11.2019)
Get full text
Journal Article
Loading…
Privacy-Preserving and Byzantine-Robust Federated Learning
Dong, Caiqin, Weng, Jian, Li, Ming, Liu, Jia-Nan, Liu, Zhiquan, Cheng, Yudan, Yu, Shui
Published in IEEE transactions on dependable and secure computing (01.03.2024)
Published in IEEE transactions on dependable and secure computing (01.03.2024)
Get full text
Journal Article
Loading…
Relating Extra Connectivity and Extra Conditional Diagnosability in Regular Networks
Lin, Limei, Xu, Li, Chen, Riqing, Hsieh, Sun-Yuan, Wang, Dajin
Published in IEEE transactions on dependable and secure computing (01.11.2019)
Published in IEEE transactions on dependable and secure computing (01.11.2019)
Get full text
Journal Article