Loading…
Heterogeneous Differential-Private Federated Learning: Trading Privacy for Utility Truthfully
Lin, Xi, Wu, Jun, Li, Jianhua, Sang, Chao, Hu, Shiyan, Deen, M. Jamal
Published in IEEE transactions on dependable and secure computing (01.11.2023)
Published in IEEE transactions on dependable and secure computing (01.11.2023)
Get full text
Journal Article
Loading…
Comment on "Remote Physical Device Fingerprinting"
Polcak, Libor, Jirasek, Jakub, Matousek, Petr
Published in IEEE transactions on dependable and secure computing (01.09.2014)
Published in IEEE transactions on dependable and secure computing (01.09.2014)
Get full text
Journal Article
Loading…
SySeVR: A Framework for Using Deep Learning to Detect Software Vulnerabilities
Li, Zhen, Zou, Deqing, Xu, Shouhuai, Jin, Hai, Zhu, Yawei, Chen, Zhaoxuan
Published in IEEE transactions on dependable and secure computing (01.07.2022)
Published in IEEE transactions on dependable and secure computing (01.07.2022)
Get full text
Journal Article
Loading…
Loading…
DeepChain: Auditable and Privacy-Preserving Deep Learning with Blockchain-Based Incentive
Weng, Jiasi, Weng, Jian, Zhang, Jilian, Li, Ming, Zhang, Yue, Luo, Weiqi
Published in IEEE transactions on dependable and secure computing (01.09.2021)
Published in IEEE transactions on dependable and secure computing (01.09.2021)
Get full text
Journal Article
Loading…
Secret-to-Image Reversible Transformation for Generative Steganography
Zhou, Zhili, Su, Yuecheng, Li, Jin, Yu, Keping, Jonathan Wu, Q. M., Fu, Zhangjie, Shi, Yunqing
Published in IEEE transactions on dependable and secure computing (01.09.2023)
Published in IEEE transactions on dependable and secure computing (01.09.2023)
Get full text
Journal Article
Loading…
Loading…
LVBS: Lightweight Vehicular Blockchain for Secure Data Sharing in Disaster Rescue
Su, Zhou, Wang, Yuntao, Xu, Qichao, Zhang, Ning
Published in IEEE transactions on dependable and secure computing (01.01.2022)
Published in IEEE transactions on dependable and secure computing (01.01.2022)
Get full text
Journal Article
Loading…
Loading…
Loading…
Loading…
VulDeeLocator: A Deep Learning-based Fine-grained Vulnerability Detector
Li, Zhen, Zou, Deqing, Xu, Shouhuai, Chen, Zhaoxuan, Zhu, Yawei, Jin, Hai
Published in IEEE transactions on dependable and secure computing (01.07.2022)
Published in IEEE transactions on dependable and secure computing (01.07.2022)
Get full text
Journal Article
Loading…
Loading…
Loading…
Loading…
Loading…
Two Birds with One Stone: Two-Factor Authentication with Security Beyond Conventional Bound
Wang, Ding, Wang, Ping
Published in IEEE transactions on dependable and secure computing (01.07.2018)
Get full text
Published in IEEE transactions on dependable and secure computing (01.07.2018)
Journal Article
Loading…
Loading…
μVulDeePecker: A Deep Learning-Based System for Multiclass Vulnerability Detection
Zou, Deqing, Wang, Sujuan, Xu, Shouhuai, Li, Zhen, Jin, Hai
Published in IEEE transactions on dependable and secure computing (01.09.2021)
Published in IEEE transactions on dependable and secure computing (01.09.2021)
Get full text
Journal Article