μVulDeePecker: A Deep Learning-Based System for Multiclass Vulnerability Detection
Zou, Deqing, Wang, Sujuan, Xu, Shouhuai, Li, Zhen, Jin, Hai
Published in IEEE transactions on dependable and secure computing (01.09.2021)
Published in IEEE transactions on dependable and secure computing (01.09.2021)
Get full text
Journal Article
Searchable Symmetric Encryption with Forward Search Privacy
Li, Jin, Huang, Yanyu, Wei, Yu, Lv, Siyi, Liu, Zheli, Dong, Changyu, Lou, Wenjing
Published in IEEE transactions on dependable and secure computing (01.01.2021)
Published in IEEE transactions on dependable and secure computing (01.01.2021)
Get full text
Journal Article
Trust-Based Service Management for Social Internet of Things Systems
Chen, Ing-Ray, Bao, Fenye, Guo, Jia
Published in IEEE transactions on dependable and secure computing (01.11.2016)
Published in IEEE transactions on dependable and secure computing (01.11.2016)
Get full text
Journal Article
A Lightweight Privacy-Preserving CNN Feature Extraction Framework for Mobile Sensing
Huang, Kai, Liu, Ximeng, Fu, Shaojing, Guo, Deke, Xu, Ming
Published in IEEE transactions on dependable and secure computing (01.05.2021)
Published in IEEE transactions on dependable and secure computing (01.05.2021)
Get full text
Journal Article
FS-PEKS: Lattice-Based Forward Secure Public-Key Encryption with Keyword Search for Cloud-Assisted Industrial Internet of Things
Zhang, Xiaojun, Xu, Chunxiang, Wang, Huaxiong, Zhang, Yuan, Wang, Shixiong
Published in IEEE transactions on dependable and secure computing (01.05.2021)
Published in IEEE transactions on dependable and secure computing (01.05.2021)
Get full text
Journal Article
Privacy-Preserving Federated Deep Learning With Irregular Users
Xu, Guowen, Li, Hongwei, Zhang, Yun, Xu, Shengmin, Ning, Jianting, Deng, Robert H.
Published in IEEE transactions on dependable and secure computing (01.03.2022)
Published in IEEE transactions on dependable and secure computing (01.03.2022)
Get full text
Journal Article
Dependable Structural Health Monitoring Using Wireless Sensor Networks
Bhuiyan, Md Zakirul Alam, Guojun Wang, Jie Wu, Jiannong Cao, Xuefeng Liu, Tian Wang
Published in IEEE transactions on dependable and secure computing (01.07.2017)
Published in IEEE transactions on dependable and secure computing (01.07.2017)
Get full text
Journal Article
Traceable Monero: Anonymous Cryptocurrency with Enhanced Accountability
Li, Yannan, Yang, Guomin, Susilo, Willy, Yu, Yong, Au, Man Ho, Liu, Dongxi
Published in IEEE transactions on dependable and secure computing (01.03.2021)
Published in IEEE transactions on dependable and secure computing (01.03.2021)
Get full text
Journal Article
Robust and Universal Seamless Handover Authentication in 5G HetNets
Zhang, Yinghui, Deng, Robert H., Bertino, Elisa, Zheng, Dong
Published in IEEE transactions on dependable and secure computing (01.03.2021)
Published in IEEE transactions on dependable and secure computing (01.03.2021)
Get full text
Journal Article
Efficient and Privacy-Preserving Outsourced Calculation of Rational Numbers
Ximeng Liu, Choo, Kim-Kwang Raymond, Deng, Robert H., Rongxing Lu, Jian Weng
Published in IEEE transactions on dependable and secure computing (01.01.2018)
Published in IEEE transactions on dependable and secure computing (01.01.2018)
Get full text
Journal Article
Forward Private Searchable Symmetric Encryption with Optimized I/O Efficiency
Song, Xiangfu, Dong, Changyu, Yuan, Dandan, Xu, Qiuliang, Zhao, Minghao
Published in IEEE transactions on dependable and secure computing (01.09.2020)
Published in IEEE transactions on dependable and secure computing (01.09.2020)
Get full text
Journal Article
A Blockchain-Based Self-Tallying Voting Protocol in Decentralized IoT
Li, Yannan, Susilo, Willy, Yang, Guomin, Yu, Yong, Liu, Dongxi, Du, Xiaojiang, Guizani, Mohsen
Published in IEEE transactions on dependable and secure computing (01.01.2022)
Published in IEEE transactions on dependable and secure computing (01.01.2022)
Get full text
Journal Article
Timely Detection and Mitigation of Stealthy DDoS Attacks Via IoT Networks
Doshi, Keval, Yilmaz, Yasin, Uludag, Suleyman
Published in IEEE transactions on dependable and secure computing (01.09.2021)
Published in IEEE transactions on dependable and secure computing (01.09.2021)
Get full text
Journal Article