Loading…
MANDA: On Adversarial Example Detection for Network Intrusion Detection System
Wang, Ning, Chen, Yimin, Xiao, Yang, Hu, Yang, Lou, Wenjing, Hou, Y. Thomas
Published in IEEE transactions on dependable and secure computing (01.03.2023)
Published in IEEE transactions on dependable and secure computing (01.03.2023)
Get full text
Journal Article
Loading…
Do as I Do: Pose Guided Human Motion Copy
Wu, Sifan, Liu, Zhenguang, Zhang, Beibei, Zimmermann, Roger, Ba, Zhongjie, Zhang, Xiaosong, Ren, Kui
Published in IEEE transactions on dependable and secure computing (01.11.2024)
Published in IEEE transactions on dependable and secure computing (01.11.2024)
Get full text
Journal Article
Loading…
An Efficient NIZK Scheme for Privacy-Preserving Transactions Over Account-Model Blockchain
Ma, Shunli, Deng, Yi, He, Debiao, Zhang, Jiang, Xie, Xiang
Published in IEEE transactions on dependable and secure computing (01.03.2021)
Published in IEEE transactions on dependable and secure computing (01.03.2021)
Get full text
Journal Article
Loading…
Dual Watermarking for Security of COVID-19 Patient Record
Anand, Ashima, Singh, Amit Kumar
Published in IEEE transactions on dependable and secure computing (01.01.2023)
Published in IEEE transactions on dependable and secure computing (01.01.2023)
Get full text
Journal Article
Loading…
Eunomia: Anonymous and Secure Vehicular Digital Forensics Based on Blockchain
Li, Meng, Chen, Yifei, Lal, Chhagan, Conti, Mauro, Alazab, Mamoun, Hu, Donghui
Published in IEEE transactions on dependable and secure computing (01.01.2023)
Published in IEEE transactions on dependable and secure computing (01.01.2023)
Get full text
Journal Article
Loading…
Loading…
Can the Common Vulnerability Scoring System be Trusted? A Bayesian Analysis
Johnson, Pontus, Lagerstrom, Robert, Ekstedt, Mathias, Franke, Ulrik
Published in IEEE transactions on dependable and secure computing (01.11.2018)
Published in IEEE transactions on dependable and secure computing (01.11.2018)
Get full text
Journal Article
Loading…
RGB Cameras Failures and Their Effects in Autonomous Driving Applications
Ceccarelli, Andrea, Secci, Francesco
Published in IEEE transactions on dependable and secure computing (01.07.2023)
Published in IEEE transactions on dependable and secure computing (01.07.2023)
Get full text
Journal Article
Loading…
Loading…
Loading…
Lattice-Based Public Key Searchable Encryption from Experimental Perspectives
Behnia, Rouzbeh, Ozmen, Muslum Ozgur, Yavuz, Attila Altay
Published in IEEE transactions on dependable and secure computing (01.11.2020)
Published in IEEE transactions on dependable and secure computing (01.11.2020)
Get full text
Journal Article
Loading…
Loading…
On Emerging Family of Elliptic Curves to Secure Internet of Things: ECC Comes of Age
Liu, Zhe, Huang, Xinyi, Hu, Zhi, Khan, Muhammad Khurram, Seo, Hwajeong, Zhou, Lu
Published in IEEE transactions on dependable and secure computing (01.05.2017)
Published in IEEE transactions on dependable and secure computing (01.05.2017)
Get full text
Journal Article
Loading…
Loading…
HIBEChain: A Hierarchical Identity-Based Blockchain System for Large-Scale IoT
Wan, Zhiguo, Liu, Wei, Cui, Hui
Published in IEEE transactions on dependable and secure computing (01.03.2023)
Published in IEEE transactions on dependable and secure computing (01.03.2023)
Get full text
Journal Article
Loading…
An Automated Multi-Tab Website Fingerprinting Attack
Yin, Qilei, Liu, Zhuotao, Li, Qi, Wang, Tao, Wang, Qian, Shen, Chao, Xu, Yixiao
Published in IEEE transactions on dependable and secure computing (01.11.2022)
Published in IEEE transactions on dependable and secure computing (01.11.2022)
Get full text
Journal Article
Loading…
Privacy-Preserving Graph Matching Query Supporting Quick Subgraph Extraction
Ge, Xinrui, Yu, Jia, Hao, Rong
Published in IEEE transactions on dependable and secure computing (01.05.2024)
Published in IEEE transactions on dependable and secure computing (01.05.2024)
Get full text
Journal Article
Loading…
A Risk Management Approach to Defending Against the Advanced Persistent Threat
Yang, Lu-Xing, Li, Pengdeng, Yang, Xiaofan, Tang, Yuan Yan
Published in IEEE transactions on dependable and secure computing (01.11.2020)
Published in IEEE transactions on dependable and secure computing (01.11.2020)
Get full text
Journal Article
Loading…
High Capacity Lossless Data Hiding in JPEG Bitstream Based on General VLC Mapping
Du, Yang, Yin, Zhaoxia, Zhang, Xinpeng
Published in IEEE transactions on dependable and secure computing (01.03.2022)
Published in IEEE transactions on dependable and secure computing (01.03.2022)
Get full text
Journal Article
Loading…
TAPFed: Threshold Secure Aggregation for Privacy-Preserving Federated Learning
Xu, Runhua, Li, Bo, Li, Chao, Joshi, James B. D., Ma, Shuai, Li, Jianxin
Published in IEEE transactions on dependable and secure computing (01.09.2024)
Published in IEEE transactions on dependable and secure computing (01.09.2024)
Get full text
Journal Article