default search action
IEEE Transactions on Dependable and Secure Computing, Volume 22
Volume 22, Number 1, January - February 2025
- Shaowei Wang, Shiyu Yu
, Xiaojun Ren, Jin Li, Yuntong Li, Wei Yang, Hongyang Yan, Jin Li:
Differentially Private Numerical Vector Analyses in the Local and Shuffle Model. 1-15 - Zeyu Yang
, Liang He
, Peng Cheng
, Jiming Chen
:
Mismatched Control and Monitoring Frequencies: Vulnerability, Attack, and Mitigation. 16-33 - Yunyi Zhang
, Chengxi Xu
, Fan Shi
, Miao Hu
, Min Zhang
, Yuwei Li
, Zhijie Xie
:
Understanding and Characterizing the Adoption of Internationalized Domain Names in Practice. 34-48 - Awaneesh Kumar Yadav
, Manoj Misra
, Pradumn Kumar Pandey
, Pasika Ranaweera
, Madhusanka Liyanage
, Neeraj Kumar
:
A Secure Authentication Protocol for IoT-WLAN Using EAP Framework. 49-65 - Antonino Rullo
, Carmelo Felicetti
, Massimo Vatalaro
, Raffaele De Rose
, Marco Lanuzza
, Felice Crupi
, Domenico Saccà
:
PUF-Based Authentication-Oriented Architecture for Identification Tags. 66-83 - Lan Zhang
, Xinben Gao
, Yaliang Li
, Yunhao Liu
:
Functionality and Data Stealing by Pseudo-Client Attack and Target Defenses in Split Learning. 84-100 - Shougang Yuan
, Amro Awad
, Huiyang Zhou
:
Delta Counter: Bandwidth-Efficient Encryption Counter Representation for Secure GPU Memory. 101-113 - Shuo Shao
, Wenyuan Yang
, Hanlin Gu
, Zhan Qin
, Lixin Fan
, Qiang Yang, Kui Ren
:
FedTracker: Furnishing Ownership Verification and Traceability for Federated Learning Model. 114-131 - Haomiao Yang
, Dongyun Xue
, Mengyu Ge, Jingwei Li
, Guowen Xu
, Hongwei Li
, Rongxing Lu
:
Fast Generation-Based Gradient Leakage Attacks: An Approach to Generate Training Data Directly From the Gradient. 132-145 - Matthew Nance Hall
, Zaoxing Liu
, Vyas Sekar, Ramakrishnan Durairajan
:
Analyzing the Benefits of Optical Topology Programming for Mitigating Link-Flood DDoS Attacks. 146-163 - Xiaopeng Dai
, Qianhong Wu
, Bingyu Li
, Bo Qin
, Jialiang Fan
, Fuyang Deng
, Mingzhe Zhai
:
R2E: A Decentralized Scheme for Rewarding Tor Relays With Cryptocurrencies. 164-178 - Kai Ye
, Xiaogang Zhu
, Xi Xiao
, Sheng Wen
, Minhui Xue
, Yang Xiang
:
BazzAFL: Moving Fuzzing Campaigns Towards Bugs via Grouping Bug-Oriented Seeds. 179-191 - Jiliang Li
, Yuan Su
, Rongxing Lu
, Zhou Su
, Weizhi Meng
, Meng Shen
:
StealthPath: Privacy-Preserving Path Validation in the Data Plane of Path-Aware Networks. 192-204 - Songtao Fu
, Qi Li
, Xiaoliang Wang
, Su Yao
, Xuewei Feng
, Ziqiang Wang
, Xinle Du
, Kao Wan, Ke Xu
:
Secure Fault Localization in Path Aware Networking. 205-220 - Chenghao Hu
, Baochun Li
:
MaskCrypt: Federated Learning With Selective Homomorphic Encryption. 221-233 - Alian Yu
, Jian Kang
, Wei Jiang
, Dan Lin
:
Highly Efficient and Scalable Access Control Mechanism for IoT Devices in Pervasive Environments. 234-245 - Byoungjin Seok
, Changhoon Lee
:
A Novel Approach to Construct a Good Dataset for Differential-Neural Cryptanalysis. 246-262 - Erzhuo Chen
, Vladislav Dubrovenski, Dianxiang Xu
:
Detecting Errors in NGAC Policies via Fault-Based Testing. 263-278 - Jaeyoon Jeong
, Insung Baek
, Byungwoo Bang
, Jun-Yeon Lee
, Uiseok Song
, Seoung Bum Kim
:
FALL: Prior Failure Detection in Large Scale System Based on Language Model. 279-291 - Liangliang Wang
, Jiangwei Xu
, Baodong Qin
, Mi Wen
, Kefei Chen
:
An Efficient Fuzzy Certificateless Signature-Based Authentication Scheme Using Anonymous Biometric Identities for VANETs. 292-307 - Fiorella Artuso
, Marco Mormando
, Giuseppe Antonio Di Luna
, Leonardo Querzoni
:
BinBert: Binary Code Understanding With a Fine-Tunable and Execution-Aware Transformer. 308-326 - Daren Fadolalkarim
, Elisa Bertino
:
DCAFixer: An Automatic Tool for Bug Detection and Repair for Database Java Client Applications. 327-342 - Dongliang Fang
, Anni Peng
, Le Guan
, Erik van der Kouwe
, Klaus von Gleissenthall
, Wenwen Wang
, Yuqing Zhang
, Limin Sun
:
InvisiGuard: Data Integrity for Microcontroller-Based Devices via Hardware-Triggered Write Monitoring. 343-358 - Xu Yang
, Fei Zhu
, Xuechao Yang
, Junwei Luo
, Xun Yi
, Jianting Ning
, Xinyi Huang
:
Secure Reputation-Based Authentication With Malicious Detection in VANETs. 359-372 - Vikram Kanth
, Britta Hale
:
Blockchain-Based Authenticated Stego-Channels and Application to Ethereum. 373-387 - Wisam Abbasi
, Paolo Mori
, Andrea Saracino
:
Trading-Off Privacy, Utility, and Explainability in Deep Learning-Based Image Data Analysis. 388-405 - Vlasis Koutsos
, Sankarshan Damle
, Dimitrios Papadopoulos
, Sujit Gujar
, Dimitris Chatzopoulos
:
$\mathsf {AVeCQ}$AVeCQ: Anonymous Verifiable Crowdsourcing With Worker Qualities. 406-423 - Hengzhi Wang
, Laizhong Cui
, En Wang
, Jiangchuan Liu
:
A Differentially Private Approach for Budgeted Combinatorial Multi-Armed Bandits. 424-439 - Guorui Xie
, Qing Li
, Chupeng Cui, Ruoyu Li
, Lianbo Ma
, Zhuyun Qi, Yong Jiang
:
Intelligent In-Network Attack Detection on Programmable Switches With Soterv2. 440-456 - Xue Rao
, Cong Sun
, Dongrui Zeng
, Yongzhe Huang
, Gang Tan
:
Sliver: A Scalable Slicing-Based Verification for Information Flow Security. 457-473 - Wenbo Shen
, Yifei Wu
, Yutian Yang
, Qirui Liu
, Nanzi Yang
, Jinku Li
, Kangjie Lu
, Jianfeng Ma
:
Towards Understanding and Defeating Abstract Resource Attacks for Container Platforms. 474-490 - Chenchen Cao
, Chunxiang Xu
, Changsong Jiang
, Zhao Zhang
, Xinfeng Dong
, Kefei Chen
:
LPbT-SSO: Password-Based Threshold Single-Sign-On Authentication From LWE. 491-504 - Yongshuo Wan
, Cuiying Feng
, Kui Wu
, Jianping Wang
:
RZDD: Risk Zone-Diversified Network Design for Disaster Resilience. 505-517 - Sareena Karapoola
, Nikhilesh Singh
, Chester Rebeiro
, Kamakoti Veezhinathan
:
SUNDEW: A Case-Sensitive Detection Engine to Counter Malware Diversity. 518-533 - Yandong Zheng
, Hui Zhu
, Rongxing Lu
, Songnian Zhang
, Fengwei Wang
, Jun Shao
, Hui Li
:
Efficient and Privacy-Preserving Weighted Range Set Sampling in Cloud. 534-548 - Dylan Zapzalka, Saeed Salem
, David Mohaisen
:
Semantics-Preserving Node Injection Attacks Against GNN-Based ACFG Malware Classifiers. 549-560 - Daniele Bringhenti
, Riccardo Sisto
, Fulvio Valenza
:
Automating VPN Configuration in Computer Networks. 561-578 - Shaoquan Jiang
, Dima Alhadidi
, Hamid Fazli Khojir
:
Key-and-Signature Compact Multi-Signatures for Blockchain: A Compiler With Realizations. 579-596 - Guanglin Duan
, Qing Li
, Zhengxin Zhang
, Dan Zhao
, Guorui Xie
, Yuan Yang
, Zhenhui Yuan
, Yong Jiang
, Mingwei Xu
:
DNSGuard: In-Network Defense Against DNS Attacks. 597-613 - Steffen Wendzel
, Tobias Schmidbauer
, Sebastian Zillien
, Jörg Keller
:
DYST (Did You See That?): An Amplified Covert Channel That Points To Previously Seen Data. 614-631 - Chenxiang Luo
, Wenyi Tang
, Qixu Wang
, Danyang Zheng
:
Few-Shot Website Fingerprinting With Distribution Calibration. 632-648 - Xinyi Luo, Kaiping Xue
, Qibin Sun
, Jun Lu
:
CrossChannel: Efficient and Scalable Cross-Chain Transactions Through Cross-and-Off-Blockchain Micropayment Channel. 649-663 - Guodong Cao
, Zhibo Wang
, Xiaowei Dong
, Zhifei Zhang, Hengchang Guo, Zhan Qin
, Kui Ren
:
Vanilla Feature Distillation for Improving the Accuracy-Robustness Trade-Off in Adversarial Training. 664-676 - Zixuan Ma
, Chen Li
, Yuqi Zhang
, Ruibang You
, Bibo Tu
:
IMS: Towards Computability and Dynamicity for Intent-Driven Micro-Segmentation. 677-694 - Sirui Hao, Junjiang He
, Wenshan Li, Tao Li
, Geying Yang
, Wenbo Fang
, Wanying Chen
:
CSCAD: An Adaptive LightGBM Algorithm to Detect Cache Side-Channel Attacks. 695-709 - Xiaoning Liu
, Yifeng Zheng
, Xingliang Yuan
, Xun Yi
:
${\sf GoCrowd}$GoCrowd: Obliviously Aggregating Crowd Wisdom With Quality Awareness in Crowdsourcing. 710-722 - Weikang Liu
, Bin Cao
, Mugen Peng
, Bo Li
:
Distributed and Parallel Blockchain: Towards a Multi-Chain System With Enhanced Security. 723-739 - Xinjun Pei
, Xiaoheng Deng
, Shengwei Tian
, Ping Jiang
, Yunlong Zhao
, Kaiping Xue
:
A Privacy-Preserving Graph Neural Network for Network Intrusion Detection. 740-756 - Yanlong Qiu
, Jiaxi Zhang
, Tao Sun
, Yanjiao Chen
, Jin Zhang
, Bo Ji
:
WASTON: Inferring Critical Information to Enable Spoofing Attacks Using COTS mmWave Radar. 757-770 - Xinyi Luo, Kaiping Xue
, Zhuo Xu, Mingrui Ai, Jianan Hong
, Xianchao Zhang
, Qibin Sun
, Jun Lu
:
EtherCloak: Enabling Multi-Level and Customized Privacy on Account-Model Blockchains. 771-786 - Jieying An
, Yanbing Ren
, Xinghua Li
, Man Zhang
, Bin Luo
, Yinbin Miao
, Ximeng Liu
, Robert H. Deng
:
Privacy-Preserving User Recruitment With Sensing Quality Evaluation in Mobile Crowdsensing. 787-803 - Xindi Ma
, Xinfu Li, Junying Zhang
, Zhuo Ma
, Qi Jiang
, Ximeng Liu
, Jianfeng Ma
:
Repairing Backdoor Model With Dynamic Gradient Clipping for Intelligent Vehicles. 804-818 - Shan Chang
, Luo Zhou
, Wei Liu
, Hongzi Zhu
, Xinggang Hu, Lei Yang
:
Combating Voice Spoofing Attacks on Wearables via Speech Movement Sequences. 819-832 - Huige Wang
, Kefei Chen
, Qi Xie
, Qian Meng:
Post-Quantum Secure Identity-Based Matchmaking Encryption. 833-844
Volume 22, Number 2, March - April 2025
- Long Zhuo
, Shenghai Luo, Shunquan Tan
, Han Chen, Bin Li
, Jiwu Huang
:
Evading Detection Actively: Toward Anti-Forensics Against Forgery Localization. 852-869 - Wei Luo, Guoqi Xie
, Yao Liu, Xiongren Xiao, Renfa Li
:
Fast Game Verification for Safety- and Security-Critical Distributed Applications. 870-887 - Shaoyu Dou
, Kai Yang
, Yang Jiao
, Chengbo Qiu
, Kui Ren
:
Anomaly Detection in Event-Triggered Traffic Time Series via Similarity Learning. 888-902 - HeeWon Chung
, Myungsun Kim
, Patrick Chulsoon Yang
:
Multiparty Delegated Private Set Union With Efficient Updates on Outsourced Datasets. 903-918 - Hugo Kermabon-Bobinnec
, Sima Bagheri, Mahmood Gholipourchoubeh
, Suryadipta Majumdar
, Yosr Jarraya
, Lingyu Wang
, Makan Pourzandi:
PerfSPEC: Performance Profiling-Based Proactive Security Policy Enforcement for Containers. 919-938 - Lei Jiang
, Xiaoding Wang
, Xu Yang
, Jiwu Shu, Hui Lin
, Xun Yi
:
FedPA: Generator-Based Heterogeneous Federated Prototype Adversarial Learning. 939-949 - Yiyu Yang
, Jiayu Zhao
, Yilian Li, Xiaowei Li
, Peng Liu
, Yuqing Zhang
:
Sharing Can be Threatening: Uncovering Security Flaws of RBAC Model on Smart Home Platforms. 950-966 - Wanyu Lin
, Hao Lan
, Jiannong Cao
:
Graph Privacy Funnel: A Variational Approach for Privacy-Preserving Representation Learning on Graphs. 967-978 - Meng Sun
, Junzuo Lai
, Wei Wu
, Ye Yang
, Cheng-Kang Chu
, Robert H. Deng
:
How to Securely Delegate and Revoke Partial Authorization Credentials. 979-996 - Mingfeng Huang, Zhetao Li, Anfeng Liu
, Xinglin Zhang, Zhemin Yang
, Min Yang:
A Proactive Trust Evaluation System for Secure Data Collection Based on Sequence Extraction. 997-1010 - Xinle Cao
, Jian Liu
, Hao Lu, Yan Liu
, Weixin Liu, Tao Wei, Kui Ren
:
On the Interoperability of Encrypted Databases. 1011-1023 - Yuxia Sun
, Shiqi Chen
, Song Lin, Aoxiang Sun, Saiqin Long
, Zhetao Li
:
$MGAP^{3}$MGAP3: Malware Group Attribution Based on PerceiverIO and Polytype Pre-Training. 1024-1039 - Dongdong Lin
, Benedetta Tondi
, Bin Li
, Mauro Barni
:
A CycleGAN Watermarking Method for Ownership Verification. 1040-1054 - Shahryar Baki
, Fatima Zahra Qachfar
, Rakesh M. Verma
, Ryan Kennedy
, Daniel Jones:
Real-Time, Evidence-Based Alerts for Protection From Phishing Attacks. 1055-1069 - Mohammad Shamim Ahsan
, Md. Shariful Islam
, Md. Shohrab Hossain, Anupam Das
:
Detecting Smart Home Device Activities Using Packet-Level Signatures From Encrypted Traffic. 1070-1081 - Benedetta Tondi
, Andrea Costanzo
, Mauro Barni
:
Robust and Large-Payload DNN Watermarking via Fixed, Distribution-Optimized, Weights. 1082-1097 - Xiangwan Fu
, Saiqin Long
, Anfeng Liu
, Ju Ren
, Bin Guo
, Zhetao Li
:
Truthful and Dual-Direction Combinatorial Multi-Armed Bandit Scheme to Maximize Profit for Mobile Crowd Sensing. 1098-1117 - Cong Wu
, Jing Chen
, Simeng Zhu, Wenqi Feng, Kun He
, Ruiying Du
, Yang Xiang
:
WAFBooster: Automatic Boosting of WAF Security Against Mutated Malicious Payloads. 1118-1131 - Ming Zhang
, Wenhai Sun
, Hui Li
, Xiaofeng Wang, Zihao Yang, Chao Qu, Xiaoguang Li
:
Manipulated Transaction Collision Attack on Execute-Order-Validate Blockchain. 1132-1149 - Xiaolin Chai
, Hang Zhang, Jue Zhang, Yan Sun
, Sajal K. Das
:
Log Sequence Anomaly Detection Based on Template and Parameter Parsing via BERT. 1150-1167 - Martina Camaioni, Rachid Guerraoui
, Jovan Komatovic
, Matteo Monti
, Pierre-Louis Roman
, Manuel Vidigueira
, Gauthier Voron
:
Carbon: Scaling Trusted Payments With Untrusted machines. 1168-1180 - Shuo Wang
, Keke Gai
, Jing Yu
, Liehuang Zhu
, Hanghang Wu
, Changzheng Wei
, Ying Yan
, Hui Zhang
, Kim-Kwang Raymond Choo
:
RAFLS: RDP-Based Adaptive Federated Learning With Shuffle Model. 1181-1194 - Yetong Cao
, Chao Cai
, Fan Li
, Zhe Chen
, Jun Luo
:
Enabling Passive User Authentication via Heart Sounds on In-Ear Microphones. 1195-1209 - Mengxue Yang
, Huaqun Wang
, Debiao He
:
PM-ABE: Puncturable Bilateral Fine-Grained Access Control From Lattices for Secret Sharing. 1210-1223 - Yufeng Hu
, Yingshi Sun, Yuan Chen
, Zhuo Chen
, Bowen He
, Lei Wu
, Yajin Zhou
, Rui Chang
:
MFGSCOPE: A Lightweight Framework for Efficient Graph-Based Analysis on Blockchain. 1224-1238 - Jingwei Liu
, Yating Li
, Mengjiao Zhao, Lei Liu
, Neeraj Kumar
:
EPFFL: Enhancing Privacy and Fairness in Federated Learning for Distributed E-Healthcare Data Sharing Services. 1239-1252 - Li Hu
, Hongyang Yan
, Yun Peng, Haibo Hu
, Shaowei Wang
, Jin Li
:
VAE-Based Membership Cleanser Against Membership Inference Attacks. 1253-1264 - Yu Lin
, Tianling Zhang, Yunlong Mao
, Sheng Zhong
:
CrossNet: A Low-Latency MLaaS Framework for Privacy-Preserving Neural Network Inference on Resource-Limited Devices. 1265-1280 - Zhonghui Ge
, Chenke Wang
, Yu Long
, Dawu Gu
:
Shaduf++: Non-Cycle and Privacy-Preserving Payment Channel Rebalancing. 1281-1298 - Boyu Zhang
, Wenjie Yang
, Futai Zhang
, Jianting Ning
:
Efficient Attribute-Based Searchable Encryption With Policy Hiding Over Personal Health Records. 1299-1312 - Heng Xu, Tianqing Zhu
, Wanlei Zhou
, Wei Zhao
:
Don't Forget Too Much: Towards Machine Unlearning on Feature Level. 1313-1328 - Jianfei Sun
, Yangyang Bao
, Weidong Qiu
, Rongxing Lu
, Songnian Zhang
, Yunguo Guan
, Xiaochun Cheng
:
Privacy-Preserving Fine-Grained Data Sharing With Dynamic Service for the Cloud-Edge IoT. 1329-1346 - Haodi Wang
, Rongfang Bie
, Thang Hoang
:
An Efficient and Zero-Knowledge Classical Machine Learning Inference Pipeline. 1347-1364 - Xiaokang Yin
, Ruijie Cai, Xiaoya Zhu
, Qichao Yang
, Enzhou Song
, Shengli Liu
:
Precise Discovery of More Taint-Style Vulnerabilities in Embedded Firmware. 1365-1382 - Ryohei Sato
, Hidetoshi Kawaguchi
, Yuichi Nakatani
:
Malcoda: Practical and Stochastic Security Risk Assessment for Enterprise Networks. 1383-1399 - Zeyu Yang
, Liang He
, Yucheng Ruan
, Peng Cheng
, Jiming Chen
:
Unveiling Physical Semantics of PLC Variables Using Control Invariants. 1400-1417 - Abdulaziz Alghamdi
, Ali Al Kinoon
, Ahod Alghuried
, David Mohaisen
:
xr-droid: A Benchmark Dataset for AR/VR and Security Applications. 1418-1430 - Tiantian Zhu
, Jie Ying
, Tieming Chen
, Chunlin Xiong
, Wenrui Cheng
, Qixuan Yuan
, Aohan Zheng, Mingqi Lv
, Yan Chen
:
Nip in the Bud: Forecasting and Interpreting Post- Exploitation Attacks in Real-Time Through Cyber Threat Intelligence Reports. 1431-1447 - Qian Wu
, Lei Zhang
, Yafang Yang
, Kim-Kwang Raymond Choo
:
Certificateless Signature Scheme With Batch Verification for Secure and Privacy-Preserving V2V Communications in VANETs. 1448-1459 - Ning Xi
, Yuchen Zhang
, Pengbin Feng
, Siqi Ma
, Jianfeng Ma
, Yulong Shen
, Yale Yang:
GNNDroid: Graph-Learning Based Malware Detection for Android Apps With Native Code. 1460-1476 - Shiqi Liu
, Xiang Li
, Jie Wang
, Yongpeng Gao
, Jiajin Hu
:
MaTEE: Efficiently Bridging the Semantic Gap in TrustZone via Arm Pointer Authentication. 1491-1505 - Xiaoting Lyu
, Yufei Han
, Wei Wang
, Jingkai Liu
, Bin Wang
, Kai Chen
, Yidong Li
, Jiqiang Liu
, Xiangliang Zhang
:
CoBA: Collusive Backdoor Attacks With Optimized Trigger to Federated Learning. 1506-1518 - Minze Xu
, Yuan Zhang
, Sheng Zhong
:
Towards Payment Channel Watchtowers With Collateral-Free Security and Robustness. 1519-1536 - Xiangrui Xu
, Wei Wang
, Zheng Chen, Bin Wang
, Chao Li, Li Duan
, Zhen Han, Yufei Han:
Finding the PISTE: Towards Understanding Privacy Leaks in Vertical Federated Learning Systems. 1537-1550 - Zhihao Wu
, Yushi Cheng
, Xiaoyu Ji
, Wenyuan Xu
:
Multi-Modal Spoofing Attacks on 3D Face Liveness Detection via a Single 2D Photo. 1551-1566 - Hanbo Yu
, Sudipta Acharya
, Steven H. H. Ding
, Mohammad Zulkernine
:
PulseAnomaly: Unsupervised Anomaly Detection on Avionic Platforms With Seasonality and Trend Modeling in Transformer Networks. 1567-1581 - Ruoxi Chen
, Haibo Jin
, Haibin Zheng
, Jinyin Chen
, Zhenguang Liu
:
Fight Perturbations With Perturbations: Defending Adversarial Attacks via Neuron Influence. 1582-1595 - Meiqi Li, Kaiping Xue
, Xinyi Luo, Wentuo Sun, David S. L. Wei
, Qibin Sun
, Jun Lu
:
$S^{3}$S3Voting: A Blockchain Sharding Based E-Voting Approach With Security and Scalability. 1596-1611 - Guorong Chen
, Chao Li
, Wei Wang
, Li Duan
, Bin Wang
, Zhen Han
, Xiangliang Zhang
:
FairReward: Towards Fair Reward Distribution Using Equity Theory in Blockchain-Based Federated Learning. 1612-1626 - Hassan Ali
, Rana Tallal Javed, Adnan Qayyum
, Amer AlGhadhban
, Meshari Alazmi
, Ahmad Alzamil
, Khaled Al-Utaibi
, Junaid Qadir
:
Robust Encrypted Inference in Deep Learning: A Pathway to Secure Misinformation Detection. 1627-1639 - Xingkai Wang
, Zhenfu Cao
, Zhen Liu
, Kaitai Liang
:
MVOC: A Lighter Multi-Client Verifiable Outsourced Computation for Malicious Lightweight Clients. 1640-1654 - Xiaoyu Zhang
, Chao Shen
, Shiqing Ma
, Juan Zhai
, Chenhao Lin
:
An Automated Monitoring and Repairing System for DNN Training. 1655-1673 - Jung Hee Cheon
, Minsik Kang
, Taeseong Kim
, Junyoung Jung
, Yongdong Yeo
:
Batch Inference on Deep Convolutional Neural Networks With Fully Homomorphic Encryption Using Channel-By-Channel Convolutions. 1674-1685 - Jie Gan
, Chaochao Luo
, Wei Shi
, Yuan Liu
, Ximeng Liu
, Zhihong Tian
:
An Attack Exploiting Cyber-Arm Industry. 1686-1702 - Sadegh Torabi
, Dorde Klisura
, Joseph Khoury
, Elias Bou-Harb
, Chadi Assi
, Mourad Debbabi
:
Internet-Wide Analysis, Characterization, and Family Attribution of IoT Malware: A Comprehensive Longitudinal Study. 1703-1716 - Xiaoyu Zhang
, Chenyang Zhang
, Jian Lou
, Kai Wu
, Zilong Wang
, Xiaofeng Chen
:
DuplexGuard: Safeguarding Deletion Right in Machine Unlearning via Duplex Watermarking. 1717-1731 - Xia Zhou
, Yujie Bu, Meng Xu
, Yajin Zhou
, Lei Wu
:
uBOX: A Lightweight and Hardware-Assisted Sandbox for Multicore Embedded Systems. 1732-1746 - Ziad Mansour
, Weihan Ou
, Steven H. H. Ding
, Mohammad Zulkernine
, Philippe Charland
:
NeuroYara: Learning to Rank for Yara Rules Generation Through Deep Language Modeling and Discriminative N-Gram Encoding. 1747-1762 - Rong Du
, Qingqing Ye
, Yue Fu, Haibo Hu
, Kai Huang
:
Top-k Discovery Under Local Differential Privacy: An Adaptive Sampling Approach. 1763-1780 - Meng Xue
, Zhixian Wang
, Qian Zhang
, Xueluan Gong
, Zhihang Liu, Yanjiao Chen
:
Artemis: Defending Against Backdoor Attacks via Distribution Shift. 1781-1795 - Bolin Zhang
, Qilin Yin, Wei Lu
, Xiangyang Luo
:
Deepfake Detection and Localization Using Multi-View Inconsistency Measurement. 1796-1809 - Yulin Wu, Lanxiang Chen
, Gaolin Chen
, Yi Mu
, Robert H. Deng
:
Private Reachability Queries on Structured Encrypted Temporal Bipartite Graphs. 1810-1826 - Hanrui Wang
, Ruoxi Sun
, Cunjian Chen
, Minhui Xue
, Lay-Ki Soon, Shuo Wang, Zhe Jin
:
Iterative Window Mean Filter: Thwarting Diffusion-Based Adversarial Purification. 1827-1844 - Yushan Siriwardhana
, Pawani Porambage
, Madhusanka Liyanage
, Samuel Marchal
, Mika Ylianttila
:
SHIELD - Secure Aggregation Against Poisoning in Hierarchical Federated Learning. 1845-1863
Volume 22, Number 3, May - June 2025
- Yingjiu Li
, Binanda Sengupta
, Yangguang Tian
, Jiaming Yuan
, Tsz Hon Yuen
:
Message Control for Blockchain Rewriting. 1864-1876 - Zhichao You
, Xuewen Dong
, Ximeng Liu
, Sheng Gao
, Yongzhi Wang
, Yulong Shen
:
Location Privacy Preservation Crowdsensing With Federated Reinforcement Learning. 1877-1894 - Jinjiang Yang
, Kaiping Xue
, Feng Liu
, Bin Zhu
, Ruidong Li
, Qibin Sun
, Jun Lu
:
SSE-CTC: Search Over Encrypted Data With Owner-Enforced and Complete Time Constraints. 1895-1907 - Mingming Hu
, Ding Wang
, Chen Li
, Yang Xu, Bibo Tu
:
Behavioral Biometrics-Based Continuous Authentication Using a Lightweight Latent Representation Masked One-Class Autoencoder. 1908-1923 - Peng Huang, Yao Wei, Peng Cheng, Zhongjie Ba, Li Lu
, Feng Lin, Yang Wang, Kui Ren
:
Phoneme-Based Proactive Anti-Eavesdropping With Controlled Recording Privilege. 1924-1940 - Yang Xu
, Shanshan Zhang, Chen Lyu
, Jia Liu
, Yulong Shen
, Norio Shiratori
:
Mitigating Distributed DoS Attacks on Bandwidth Allocation for Federated Learning in Mobile Edge Networks. 1941-1960 - Sijiang Xie, Rui Shi
, Yang Yang
, Huiqin Xie
, Yingjiu Li
, Robert H. Deng
:
AccCred: Improved Accountable Anonymous Credentials With Dynamic Triple-Hiding Committees. 1961-1975 - Quinn Burke
, Yohan Beugin
, Blaine Hoak
, Rachel King
, Eric Pauley, Ryan Sheatsley
, Mingli Yu
, Ting He
, Thomas F. La Porta
, Patrick D. McDaniel
:
Securing Cloud File Systems With Trusted Execution. 1976-1992 - Syh-Yuan Tan
, Thomas Groß
:
MoniPoly - An Expressive $q$q-SDH-Based Anonymous Attribute-Based Credential System With Constant-Size Proofs. 1993-2010 - Wenli Shang
, Jiayue Lu
, Zhong Cao
, Lei Ding
, Man Zhang, Sha Huan
:
A Tree-Based Scheme to Assess the Safety and Security for Industrial Control Systems. 2011-2021 - Rui Gao
, Zhiguo Wan
, Huaqun Wang
, Shaoteng Luo
:
Invisible Warning Line: Efficient and Generic Regulation for Anonymous Cryptocurrencies. 2022-2036 - Guanxiong Ha
, Xiaowei Ge
, Chunfu Jia
, Yuchen Chen
, Zhen Su
:
Revisiting SGX-Based Encrypted Deduplication via PoW-Before-Encryption and Eliminating Redundant Computations. 2037-2053 - Xiuting Ge, Chunrong Fang
, Xuanye Li, Qirui Zheng, Jia Liu
, Zhihong Zhao, Zhenyu Chen
:
A Large-Scale Empirical Study of Actionable Warning Distribution Within Projects. 2054-2071 - Ziyao Liu
, Yu Jiang
, Weifeng Jiang
, Jiale Guo, Jun Zhao
, Kwok-Yan Lam
:
Guaranteeing Data Privacy in Federated Unlearning With Dynamic User Participation. 2072-2085 - Reza Ebrahimi
, Jason Pacheco
, James Hu, Hsinchun Chen:
Learning Contextualized Action Representations in Sequential Decision Making for Adversarial Malware Optimization. 2086-2102 - Yisong Wang
, Jun Zhou
, Zhenfu Cao
, Xiaolei Dong
, Kim-Kwang Raymond Choo
:
MuEOC: Efficient SGX-Based Multi-Key Homomorphic Outsourcing Computation for E-Health System. 2103-2118 - Anh-Tu Hoang
, Barbara Carminati
, Elena Ferrari
:
ProMark: Ensuring Transparency and Privacy-Awareness in Proximity Marketing Advertising Campaigns. 2119-2131 - Dan Lin
, Jiajing Wu
, Qishuang Fu
, Zibin Zheng
, Ting Chen
:
RiskProp: Account Risk Rating on Ethereum via De-anonymous Score and Network Propagation. 2132-2145 - Hao Ren
, Guowen Xu
, Tianwei Zhang
, Jianting Ning
, Xinyi Huang
, Hongwei Li
, Rongxing Lu
:
Efficiency Boosting of Secure Cross-Platform Recommender Systems Over Sparse Data. 2146-2160 - Xi Xiao
, Shuo Wang
, Guangwu Hu
, Qing Li
, Kelong Mao, Xiapu Luo
, Bin Zhang, Shutao Xia
:
RBLJAN: Robust Byte-Label Joint Attention Network for Network Traffic Classification. 2161-2178 - Youngkwang Han
, Zhenyu Hu, Jongouk Choi
, Kazi Abu Zubair, Amro Awad
, Changhee Jung
, Brent ByungHoon Kang
:
A Novel Efficient Crash Consistency Solution Enabling Rollback Recovery for Secure NVM in Low-Power Energy Harvesting Systems. 2179-2196 - Yanmei Cao
, Jianghong Wei
, Xinyi Huang
, Xiaofeng Chen
, Yang Xiang
:
Deniable Identity-Based Matchmaking Encryption for Anonymous Messaging. 2197-2210 - Xuankai Zhang
, Jianhua Li
, Jun Wu
, Guoxing Chen
, Yan Meng
, Haojin Zhu
, Xiaosong Zhang
:
Binary-Level Formal Verification Based Automatic Security Ensurement for PLC in Industrial IoT. 2211-2226 - Xiuhua Wang
, Mengyang Yu, Yaohui Wang
, Yinjia Pi, Peng Xu
, Shuai Wang
, Hai Jin
, Min Han:
Attribute-Based Access Control Encryption. 2227-2242 - Zhongzheng Lai
, Huaming Chen
, Ruoxi Sun
, Yu Zhang
, Minhui Xue, Dong Yuan
:
On Security Weaknesses and Vulnerabilities in Deep Learning Systems. 2243-2257 - Dimitry Solet
, Jean-Luc Béchennec
, Mikaël Briday
, Sébastien Faucou
, Sébastien Pillement
:
A Study in Specification and Hardware Runtime Verification of Critical Embedded Software. 2258-2269 - Pemma Reiter
, Hui Jun Tay, Westley Weimer
, Adam Doupé
, Ruoyu Wang
, Stephanie Forrest
:
Automatically Mitigating Vulnerabilities in Binary Programs via Partially Recompilable Decompilation. 2270-2282 - Benjamin Dowling
, Bhagya Wimalasiri
:
Quantum-Secure Hybrid Communication for Aviation Infrastructures. 2283-2294 - Shiyu Shen
, Hao Yang
, Wenqian Li, Yunlei Zhao
:
cuML-DSA: Optimized Signing Procedure and Server-Oriented GPU Design for ML-DSA. 2295-2307 - Daniele Bringhenti
, Simone Bussa
, Riccardo Sisto
, Fulvio Valenza
:
Atomizing Firewall Policies for Anomaly Analysis and Resolution. 2308-2325 - Yang Liu
, Debiao He
, Min Luo
, Lianhai Wang
, Cong Peng
:
$k$k-TEVS: A $ k$k-Times E-Voting Scheme on Blockchain With Supervision. 2326-2337 - Yihuai Liang
, Yan Li
, Byeong-Seok Shin
:
Privacy-Preserving and Reliable Truth Discovery for Heterogeneous Fog-Based Crowdsensing. 2338-2351 - Haiyang Luo
, Zhe Sun
, Yunqing Sun, Ang Li, Binghui Wang
, Jin Cao
, Ben Niu:
Recipient-Aware Photo Automatic Deletion Control Policy Recommendation Scheme in Online Social Networks. 2352-2366 - Lei Xue
, Yuxiao Yan, Qiyi Tang, Le Yu, Xiapu Luo
, Zhiqiang Cai, Sen Nie, Shi Wu, Guofei Gu
, Chenxu Wang
:
Update If You Dare: Demystifying Bare-Metal Device Firmware Update Security of Appified IoT Systems. 2367-2384 - Arash Mirzaei
, Amin Sakzad
, Jiangshan Yu
, Ron Steinfeld
:
Formal Treatment of Watchtowers and FPPW: A Fair and Privacy-Preserving Bitcoin Watchtower. 2385-2397 - Shuoyao Zhao
, Yu Yu
, Hanlin Liu
, Jiang Zhang
, Wenling Liu, Zhenkai Hu
:
Improving the Efficiency of Private Function Evaluation via Optimized Universal Circuits. 2398-2412 - Yuang Qi
, Kejiang Chen
, Kai Zeng
, Weiming Zhang
, Nenghai Yu
:
Provably Secure Disambiguating Neural Linguistic Steganography. 2430-2442 - Shicheng Zhou
, Jingju Liu
, Yuliang Lu
, Jiahai Yang
, Dongdong Hou
, Yue Zhang
, Shulong Hu:
APRIL: Towards Scalable and Transferable Autonomous Penetration Testing in Large Action Space via Action Embedding. 2443-2459 - Yang Gao
, Jun Tao
, Yifan Xu
, Rujie Chen:
Efficient Privacy-Preserving Routing in OppNets With Probability Model and Discrete Optimization. 2460-2477 - Beining Wang
, Kun He
, Yingying Huang
, Jing Chen
, Chenbin Zhao
, Ruiying Du
:
Forward Secure Similarity Search Over Encrypted Data for Hamming Distance. 2478-2491 - Surudhi Asokraj
, Tommaso Bianchi
, Alessandro Brighente
, Mauro Conti
, Radha Poovendran
:
Identity-Based Authentication for On-Demand Charging of Electric Vehicles. 2492-2504 - Dongyang Zhan
, Wenqi Zhang
, Lin Ye
, Xiangzhan Yu, Hongli Zhang
, Zheng He:
Anomaly Detection in Industrial Control Systems Based on Cross-Domain Representation Learning. 2505-2518 - Xinyi Sheng
, Zhengjie Yang
, Wei Bao
:
FairGuard: A Fairness Attack and Defense Framework in Federated Learning. 2519-2532 - Xinxin Xing
, Yizhong Liu
, Qianhong Wu
, Zhenyu Guan
, Dongyu Li
, Dawei Li
, Yuan Lu
, Willy Susilo
:
Multi-Committee ABE Based Decentralized Access Control With Sharding Blockchain for Web 3.0. 2533-2549 - Weiqi Wang
, Chenhan Zhang
, Zhiyi Tian
, Shui Yu
:
FedU: Federated Unlearning via User-Side Influence Approximation Forgetting. 2550-2562 - Pinchang Zhang
, Yulin Teng
, Mu Niu, Xiaohong Jiang
, Fu Xiao
:
Physical Layer Authentication Utilizing Beam Pattern Features in Millimeter-Wave MIMO Systems. 2563-2578 - Tianyuan Hu
, Jingyue Li
, Bixin Li
, André Storhaug
:
Why Smart Contracts Reported as Vulnerable Were Not Exploited? 2579-2596 - Zitong Yu
, Rizhao Cai
, Yawen Cui
, Ajian Liu
, Changsheng Chen
:
Visual Prompt Flexible-Modal Face Anti-Spoofing. 2597-2606 - Ning Wang
, Chaoyu Zhang
, Yang Xiao
, Yimin Chen
, Wenjing Lou
, Y. Thomas Hou
:
FLARE: Defending Federated Learning Against Model Poisoning Attacks via Latent Space Representations. 2607-2623 - Xin Yin
, Zhen Liu
, Guomin Yang
, Guoxing Chen
, Haojin Zhu
:
HDWSA$^{2}$2: A Secure Hierarchical Deterministic Wallet Supporting Stealth Address and Signature Aggregation. 2624-2641 - Meng Li
, Yifei Chen
, Jianbo Gao
, Jingyu Wu, Zijian Zhang
, Jialing He
, Liehuang Zhu
, Mauro Conti
, Xiaodong Lin
:
Accurate, Secure, and Efficient Semi-Constrained Navigation Over Encrypted City Maps. 2642-2658 - Peng Ye
, Zhifeng Jiang
, Wei Wang
, Bo Li
, Baochun Li
:
Feature Reconstruction Attacks and Countermeasures of DNN Training in Vertical Federated Learning. 2659-2669 - Tao Huang
, Yansong Gao
, Yifeng Zheng
, Zhanfeng Wang, Chao Hu, Anmin Fu
:
FineBID: Fine-Grained Protocol Reverse Engineering for Bit-Level Field IDentification. 2670-2686 - Ziqi Yang
, Yiran Zhu, Jie Wan
, ChuXiao Xiang, Tong Tang, Yilin Wang, Ruite Xu, Lijin Wang, Fan Zhang
, Jiarong Xu
, Zhan Qin
:
Defending Data Inference Attacks Against Machine Learning Models by Mitigating Prediction Distinguishability. 2687-2704 - Yizhong Liu
, Peiyuan Li, Dongyu Li
, Chengqi Wu, Nan Jiang, Qianhong Wu
, Ankit Gangwal
, Prayag Tiwari
, Mauro Conti
:
SharHSC: A Sharding-Based Hybrid State Channel to Realize Blockchain Scalability and Security. 2705-2722 - Zhongkai Lu
, Lingling Wang
, Zhengyin Zhang
, Mei Huang
, Jingjing Wang
, Meng Li
:
TMT-FL: Enabling Trustworthy Model Training of Federated Learning With Malicious Participants. 2723-2740 - Xiaojie Zhu
, Jiancong Zhou
, Yueyue Dai
, Peisong Shen
, Shabnam Kasra Kermanshahi, Jiankun Hu
:
A Verifiable and Efficient Symmetric Searchable Encryption Scheme for Dynamic Dataset With Forward and Backward Privacy. 2741-2755 - Jiaqi Li
, Yajin Zhou
, Lei Wu
:
Improving Multitasking DBMS Fuzzing With More Accurate Coverage and Testcase Trimming. 2756-2770 - Bobiao Guo
, Ping Ping
, Feng Xu
:
Highly Robust and Diverse Coverless Image Steganography Against Passive and Active Steganalysis. 2771-2787 - Yuke Hu
, Yang Wang, Jian Lou, Wei Liang
, Ruofan Wu, Weiqiang Wang, Xiaochen Li
, Jinfei Liu
, Zhan Qin
:
Privacy Risks of Federated Knowledge Graph Embedding: New Membership Inference Attacks and Personalized Differential Privacy Defense. 2788-2805 - Gao Liu
, Hao Li
, Ning Wang
, Biwen Chen
, Junqing Le
, Yining Liu
, Tao Xiang
:
PECHA: Privacy-Preserving and Efficient Cross-Domain Handover Authentication for Heterogeneous Networks. 2806-2822 - Wenbo Jiang
, Hongwei Li
, Guowen Xu
, Hao Ren
, Haomiao Yang
, Tianwei Zhang
, Shui Yu
:
Rethinking the Design of Backdoor Triggers and Adversarial Perturbations: A Color Space Perspective. 2823-2840 - Ziqi Sheng, Zuomin Qu
, Wei Lu
, Xiaochun Cao
, Jiwu Huang
:
DiRLoc: Disentanglement Representation Learning for Robust Image Forgery Localization. 2841-2854 - Dan Tang
, Boru Liu
, Keqin Li
, Sheng Xiao
, Wei Liang
, Jiliang Zhang
:
PLUTO: A Robust LDoS Attack Defense System Executing at Line Speed. 2855-2872 - Tolga O. Atalay
, Sudip Maitra, Dragoslav Stojadinovic, Angelos Stavrou
, Haining Wang
:
An OpenRAN Security Framework for Scalable Authentication, Authorization, and Discovery of xApps With Isolated Critical Services. 2873-2890 - Wei Yang
, Weilin Chen
, Lide Xue
, Wenjie Zou, Liusheng Huang
:
EZchain: A Secure Scalable Blockchain Protocol via Passive Sharding. 2891-2908 - Xiongpeng Ren
, Jin Cao
, Ben Niu
, Lu Gan, Yinghui Zhang
, Lihui Xiong
, Yurong Luo
, Hui Li
:
A Formal Analysis of 5G ProSe AKA Protocols for U2N Relay Communication. 2909-2924 - Liu Liu
, Xinwen Fu
, Xiaodong Chen, Jianpeng Wang, Zhongjie Ba
, Feng Lin
, Li Lu
, Kui Ren
:
ACL: Account Linking in Online Social Networks With Robust Camera Fingerprint Matching. 2925-2942 - Jiachun Li
, Yan Meng
, Le Zhang, Guoxing Chen
, Yuan Tian
, Haojin Zhu
:
A Magnetic Signal Based Device Fingerprinting Scheme in Wireless Charging. 2943-2958 - Rui Duan
, Zhe Qu
, Shangqing Zhao
, Leah Ding
, Yao Liu
, Zhuo Lu
:
Perception-Aware Attack Against Music Copyright Detection: Impacts and Defenses. 2959-2977 - Xiaozhen Lu
, Liang Xiao
, Yilin Xiao
, Zehui Xiong
, Zhe Liu
, Yanyong Zhang
, Weihua Zhuang
:
Blockchain-Enabled Secure Offloading for VEC: A Multi-Agent Reinforcement Learning Approach. 2978-2995 - Ke Wang
, Ye Yao
, Yanzhao Shen
, Fengjun Xiao
, Yizhi Ren
, Weizhi Meng
:
High Capacity Reversible Data Hiding in Encrypted 3D Mesh Models Based on Dynamic Prediction and Virtual Connection. 2996-3010 - Juan Hu
, Jinwen Liang
, Zheng Qin
, Xin Liao
, Wenbo Zhou
, Xiaodong Lin
:
ADA-FInfer: Inferring Face Representations From Adaptive Select Frames for High-Visual-Quality Deepfake Detection. 3011-3027 - Mingkuan Wei
, Jigang Wen
, Shiming He
, Kun Xie
, Wei Liang
, Gaogang Xie
, Kenli Li
, Ziyu Zhu:
TCMS: A Multi-Sequence Log Parsing Method Based on Token Conversion. 3028-3045 - Ding Li
, Jifan Xiao
, Peng Jiang, Jiaping Gui
, Dongjin Song
, Yun Ma
, Gang Huang
, Xuanzhe Liu
:
ProvAudit: Enhance High-Level Privacy Inference Through System Provenance Data. 3046-3062 - Mariano López-García
, David G. Farouk-Marei
, Enrique F. Cantó-Navarro
:
Converting Fixed-Length Binary Strings Into Constant Weight Words: Application on Post-Quantum Cryptography. 3063-3074 - Chenkai Guo
, Tianhong Wang
, Qianlu Wang
, Naipeng Dong
, Xiangyang Luo
, Zheli Liu
:
Fratricide! Hijacking in Android Multi-Window. 3075-3092 - Rui Zhang
, Xiaoyang Hou
, Zhihua Tian
, Yan He, Enchao Gong, Jian Liu
, Qingbiao Wu
, Kui Ren
:
Attributed Graph Clustering in Collaborative Settings. 3093-3104 - Jie Yin
, Yang Xiao
, Jie Feng
, Mengmeng Yang
, Qingqi Pei
, Xun Yi
:
DidTrust: Privacy-Preserving Trust Management for Decentralized Identity. 3105-3120 - Weiyuan Tong
, Zhanyong Tang
, Zixu Wang, Huanting Wang
, Guixin Ye
, Shuangjiao Zhai, Zheng Wang
:
Scenario: User-Device Authentication on Smart IoTs Using Commodity RFID. 3121-3136 - Josep Domingo-Ferrer
, Krishnamurty Muralidhar
, Sergio Martínez
:
Synthetic Data Generation via the Permutation Paradigm With Optional $k$k-Anonymity. 3155-3165 - Yijian Zhang
, Jie Chen
, Jianting Ning
, Qiaohan Chu
, Luping Wang
, Guang Zhang
:
Flexible Privacy-Preserving Data Computing With Bilateral Access Control for Cloud-Assisted IoT. 3166-3178 - Yuhui Li
, Wei Liang
, Kun Xie
, Da-Fang Zhang
, Kuanching Li
, Neal N. Xiong
:
EventMon: Real-Time Event-Based Streaming Network Monitoring Data Recovery. 2413-2429 - Jiahao Liu, Yi Wang
, Xincheng Tang, Rongmao Chen
, Xinyi Huang
, Jinshu Su
:
srTLS: Secure TLS Handshake on Corrupted Machines. 3137-3154
Volume 22, Number 4, July - August 2025
- Hongwei Yao
, Zheng Li, Haiqin Weng, Feng Xue, Zhan Qin
, Kui Ren
:
FDINet: Protecting Against DNN Model Extraction Using Feature Distortion Index. 3179-3191 - Peijia Zheng
, Xiongjie Fang, Zhipeng Zhou, Rui Yang, Wei Lu
, Xiaochun Cao
, Jiwu Huang
:
Accurate and Efficient Privacy-Preserving Feature Extraction on Encrypted Images. 3192-3207 - Xiaohan Zhang, Zhiyuan Yu
, Xinghua Li
, Cen Zhang
, Cong Sun
, Ning Zhang
, Robert H. Deng
:
Understanding the Bad Development Practices of Android Custom Permissions in the Wild. 3208-3223 - Guorong Chen
, Wei Wang
, Yufang Wu, Chao Li
, Guangquan Xu
, Shouling Ji
, Tao Li
, Meng Shen
, Yufei Han
:
RobustPFL: Robust Personalized Federated Learning. 3224-3239 - Alaa Oqaily
, Mohammad Ekramul Kabir
, Lingyu Wang
, Yosr Jarraya
, Suryadipta Majumdar
, Makan Pourzandi
, Mourad Debbabi
, Sudershan Lakshmanan Thirunavukkarasu
, Mengyuan Zhang
:
Cross-Level Security Verification for Network Functions Virtualization (NFV). 3240-3258 - Shuchao Pang
, Yihang Rao, Zhigang Lu
, Haichen Wang, Yongbin Zhou
, Minhui Xue
:
PriDM: Effective and Universal Private Data Recovery via Diffusion Models. 3259-3274 - Fangming Dong
, Pinghui Wang
, Rundong Li
, Xueyao Cui, Junzhou Zhao
, Jing Tao, Chen Zhang
, Xiaohong Guan
:
Poisoning Attacks and Defenses to Learned Bloom Filters for Malicious URL Detection. 3275-3288 - Petar Paradzik
, Ante Derek
, Marko Horvat
:
Formal Security Analysis of the AMD SEV-SNP Software Interface. 3289-3306 - Ziwei Liu
, Feng Lin
, Zhongjie Ba
, Li Lu
, Kui Ren
:
MagShadow: Physical Adversarial Example Attacks via Electromagnetic Injection. 3307-3323 - Qingyu Zhang
, Jiayi Lin, Chenxin Sun
, Chenxiong Qian
, Xiapu Luo
:
CherryPicker: A Parallel Solving and State Sharing Hybrid Fuzzing System. 3324-3336 - Yi Zhao
, Bingyang Liu
, Weiyu Jiang, Ke Xu
, Qi Li
, Chuang Wang, Zongxin Dou, Yanjun Liu:
Pisces: In-Path Distributed Denial-of-Service Defense via Efficient Authentication Code Embedded in IP Address. 3337-3353 - Boyang Ma
, Linxuan Zhou
, Chong Liao
, Yajin Zhou
, Jinku Li
, Jianfeng Ma
:
RansomSentry: Runtime Detection of Android Ransomware With Compiler-Based Instrumentation. 3354-3370 - Yuxian Huang
, Geng Yang
, Dong Yuan
, Shui Yu
:
DBSSL: A Scheme to Detect Backdoor Attacks in Self-Supervised Learning Models. 3371-3382 - Bowen Li
, Hanlin Gu
, Ruoxin Chen
, Jie Li
, Chentao Wu
, Na Ruan
, Xueming Si, Lixin Fan
:
Temporal Gradient Inversion Attacks With Robust Optimization. 3383-3397 - Dayong Ye
, Tianqing Zhu
, Kun Gao, Congcong Zhu
, Wanlei Zhou
:
Cooperating or Kicking Out: Defending Against Poisoning Attacks in Federated Learning via the Evolution of Cooperation. 3398-3414 - Chenhao Wang
, Yang Ming
, Hang Liu
, Jie Feng
, Mengmeng Yang
, Yang Xiang
:
Blockchain-Assisted Privacy-Preserving and Synchronized Key Agreement for VDTNs. 3415-3430 - Laura Carnevali
, Stefania Cerboni
, Leonardo Montecchi
, Enrico Vicario
:
FaultFlow: An MDE Library for Dependability Evaluation of Component-Based Systems. 3431-3448 - Marco Venturini, Francesco Freda, Emanuele Miotto
, Mauro Conti
, Alberto Giaretta
:
Differential Area Analysis for Ransomware: Attacks, Countermeasures, and Limitations. 3449-3464 - Jinghao Hu
, Jinsong Guo
, Chen Luo
, Yang Hu
, Matthias Lanzinger
, Zhanshan Li
:
Enabling Generalized Zero-Shot Vulnerability Classification. 3465-3482 - Ming Xu
, Shenghao Zhang, Kai Zhang
, Haodong Zhang, Junjie Zhang
, Jitao Yu, Luwei Cheng, Weili Han
:
Using Parallel Techniques to Accelerate PCFG-Based Password Cracking Attacks. 3483-3496 - Zhirun Zheng
, Zhetao Li
, Saiqin Long
, Suiming Guo
, Chao Chen
, Ke Xu
:
Pricing Utility vs. Location Privacy: A Differentially Private Data Sharing Framework for Ride-on-Demand Services. 3497-3513 - Ziwei Zhang
, Juan Wen
, Liting Gao
, Wanli Peng
, Yiming Xue
:
Linguistic Steganalysis Based on Few-Shot Adversarial Training. 3514-3528 - Haonan Yan
, Chengbo Zheng
, Qian Chen
, Xiaoguang Li
, Bin Wang
, Hui Li
, Xiaodong Lin
:
A Proactive Defense Against Model Poisoning Attacks in Federated Learning. 3529-3543 - R. Vaitheeshwari
, Eric Hsiao-Kuang Wu
, Ying-Dar Lin
, Ren-Hung Hwang
, Po-Ching Lin
, Yuan-Cheng Lai
, Asad Ali
:
TRACE: Relationship Analysis and Causal Factor Extraction in Cyber Threat Intelligence Reports. 3544-3560 - Amirhossein Taherpour
, Xiaodong Wang
:
A High-Throughput and Secure Coded Blockchain for IoT. 3561-3579 - Wenjie Xiong
, Liu Ke
, Maxim Ostapenko
, Yongmin Tai
, Yeongon Cho
, Joon-Ho Song
, Jinin So
, Kyungsoo Kim
, Yongsuk Kwon
, Jin Jung, Jieun Lee, Byeongho Kim, Shinhaeng Kang
, Sukhan Lee, Jeonghyeon Cho, Kyomin Sohn
, Xuan Zhang
, Hsien-Hsin S. Lee
, G. Edward Suh
:
Accelerating Confidential Recommendation Model Inference With Near-Memory Processing. 3580-3586 - Hengzhi Wang
, Minghe Ma, Laizhong Cui
, Jiangchuan Liu
:
Towards Integrated Spatial Crowdsourcing: Online Privacy-Preserving Selection. 3587-3601 - Soohyeon Choi
, David Mohaisen
:
Attributing ChatGPT-Generated Source Codes. 3602-3615 - Jiajia Jiang
, Yushu Zhang
, Jiahao Zhao
, Longxiang Gao
, Liehuang Zhu
, Zhihong Tian
:
Towards Efficient Consistency Auditing of Dynamic Data in Cross-Chain Interaction. 3616-3628 - Ju Jia
, Renjie Li, Cong Wu
, Siqi Ma
, Lina Wang
, Robert H. Deng
:
SIGFinger: A Subtle and Interactive GNN Fingerprinting Scheme Via Spatial Structure Inference Perturbation. 3629-3646 - You Wu
, Xuehai Qian:
Low-Overhead Reversible Coherence Protocol. 3647-3660 - Zehang Deng
, Ruoxi Sun
, Minhui Xue
, Sheng Wen
, Seyit Camtepe
, Surya Nepal
, Yang Xiang
:
Leakage-Resilient and Carbon-Neutral Aggregation Featuring the Federated AI-Enabled Critical Infrastructure. 3661-3675 - Elvira Albert
, Samir Genaim
, Daniel Kirchner
, Enrique Martin-Martin
:
Secure Optimizations on Ethereum Bytecode Jump-Free Sequences. 3676-3691 - Mojtaba Zaheri
, Yossi Oren, Reza Curtmola
:
Contention-Based Side Channels Enable Faster and Stealthier Browsing History Sniffing. 3692-3707 - Luoyu Chen
, Weiqi Wang
, Zhiyi Tian
, Chenhan Zhang
, Shui Yu
:
Backdoored Sample Cleansing for Unlabeled Datasets via Bootstrapped Dual Set Purification. 3708-3722 - Chenyang Chen
, Xiaoyu Zhang
, Shen Lin
, Xiaofeng Chen
:
MPGStack: Membership Privacy Protection on Graph Data via Model Stacking. 3723-3736 - Minjie Wang, Jianyu Niu
, Fangyu Gai
, Mohammad M. Jalalzai
, Yinqian Zhang
, Chen Feng
:
Chained HotStuff Under Performance Attack. 3737-3750 - Haotian Wu
, Zhe Peng
, Jiang Xiao
, Lei Xue
, Chenhao Lin
, Sai-Ho Chung
:
HeX: Encrypted Rich Queries With Forward and Backward Privacy Using Trusted Hardware. 3751-3765 - Xiaoyu Zhang
, Hong Zhong
, Jie Cui
, Irina Bolodurina
, Chengjie Gu
, Debiao He
:
LSHSC: Lightweight and Secure Handover Scheme With Conditional Privacy-Preserving for Group-Based SDVN. 3766-3779 - Honghong Zeng
, Jiong Lou
, Kailai Li
, Chentao Wu
, Guangtao Xue
, Yuan Luo
, Fan Cheng
, Wei Zhao
, Jie Li
:
ESFL: Accelerating Poisonous Model Detection in Privacy-Preserving Federated Learning. 3780-3794 - Zeqing He
, Zhibo Wang
, Xiaowei Dong
, Peng Sun
, Ju Ren
, Kui Ren
:
Towards Fair Federated Learning via Unbiased Feature Aggregation. 3795-3807 - Jione Choi
, Junghee Lee
, Gyuho Lee, Jaegwan Yu, Aran Park, Chrysostomos Nicopoulos
:
MultiFile View: File-View-Based Isolation in a Single-User Environment to Protect User Data Files. 3808-3823 - Shigen Shen
, Chenpeng Cai
, Yizhou Shen
, Xiaoping Wu
, Wenlong Ke
, Shui Yu
:
Joint Mean-Field Game and Multiagent Asynchronous Advantage Actor-Critic for Edge Intelligence-Based IoT Malware Propagation Defense. 3824-3838 - Minze Xu
, Yue Li, Chenglu Shi, Yuan Zhang
, Yongchuan Niu
, Fengyuan Xu
, Sheng Zhong
:
OPRE: Towards Better Availability of PCNs Through Recovering. 3839-3855 - Ruidong Han
, Juanru Li
, Zhuo Ma
, David Lo
, Arash Shaghaghi
, Jianfeng Ma
, Siqi Ma
:
Hotpatching on the Fly - Mitigating Drone Incidents Arising From Incorrect Configuration. 3856-3867 - Jiahui Wu
, Weizhe Zhang
, Fucai Luo
:
ESAFL: Efficient Secure Additively Homomorphic Encryption for Cross-Silo Federated Learning. 3868-3884 - Aqib Rashid
, Jose Such
:
Effectiveness of Moving Target Defenses for Adversarial Attacks in ML-Based Malware Detection. 3885-3900 - Yang Yang
, Yanjiao Chen
, Ping Xiong
, Fei Chen
, Jing Chen
:
Decentralized Self-Auditing Multiple Cloud Storage in Compressed Provable Data Possession. 3901-3915 - Weiqi Wang
, Chenhan Zhang
, Zhiyi Tian
, Shushu Liu
, Shui Yu
:
CRFU: Compressive Representation Forgetting Against Privacy Leakage on Machine Unlearning. 3916-3929 - Zhiwei Wang
, Siu-Ming Yiu
, Longwen Lan
:
Multi-Signature and Game Based Blockchain Interoperability Oracle. 3930-3943 - Lizhi Xiong
, Wenhao Zhou, Zhihua Xia
, Jian Weng
:
A Universal Framework for Reversible Data Hiding in Encrypted Images With Multiple Hiders. 3944-3959 - Man Zhang
, Xinghua Li
, Bin Luo
, Yanbing Ren
, Yinbin Miao
, Ximeng Liu
, Robert H. Deng
:
An Incentive Mechanism for Privacy Preserved Data Trading With Verifiable Data Disturbance. 3960-3976 - Keke Gai
, Yunwei Guo, Jing Yu
, Weilin Chan, Liehuang Zhu
, Yinqian Zhang
, Weizhi Meng
:
CAPE: Commitment-Based Privacy-Preserving Payment Channel Scheme in Blockchain. 3977-3992 - Peng Tang
, Xiaoyu Zhu
, Weidong Qiu
, Zheng Huang, Zhenyu Mu, Shujun Li
:
FLAD: Byzantine-Robust Federated Learning Based on Gradient Feature Anomaly Detection. 3993-4009 - Ruoyu Zhao
, Yushu Zhang
, Jun Mou
, William Puech
, Jian Weng
:
Lossless and Universal 3D Object Encryption With Differentiated Visual Effects Upon Decryption: A Novel Paradigm. 4010-4021 - Mauro Conti
, Jiaxin Li
, Stjepan Picek
:
On the Vulnerability of Data Points Under Multiple Membership Inference Attacks and Target Models. 4022-4039 - Guowen Xu
, Shengmin Xu
, Jianting Ning
, Xinyi Huang
, Hongwei Li
, Rongxing Lu
:
New Secure Sparse Inner Product With Applications to Machine Learning. 4040-4052 - Xuewen Dong
, Jiachen Li, Shujun Li
, Zhichao You
, Qiang Qu
, Yaroslav Kholodov, Yulong Shen
:
Adaptive Backdoor Attacks With Reasonable Constraints on Graph Neural Networks. 4053-4069 - Yuyang Zhou
, Liang Zhao
, Fagen Li
, Tsuyoshi Takagi:
Exfiltration-Resistant Proxy Re-Encryption for IoT Data Sharing in Unreliable Clouds. 4070-4085 - Zhenyu Chen
, Lin Yao
, Haibo Hu
, Guowei Wu
:
$\eta$η-Inference: A Data-Aware and High-Utility Privacy Model for Relational Data Publishing. 4086-4102 - Lei Zhang
, Jianfeng Wang
, Jiaojiao Wu
, Yunling Wang
, Shifeng Sun
:
Violin: Powerful Volumetric Injection Attack Against Searchable Encryption With Optimal Injection Size. 4103-4115 - Jordan Ortega-Rodríguez
, José Francisco Gómez González
, Ernesto Pereda de Pablo
:
Biometric Identification Based on EEG Using Fuzzy Logic: A Novel Approach with Metaheuristic Optimization. 4116-4125 - Jianfei Sun
, Guowen Xu
, Hongwei Li
, Tianwei Zhang
, Cong Wu
, Xuehuan Yang, Robert H. Deng
:
Sanitizable Cross-Domain Access Control With Policy-Driven Dynamic Authorization. 4126-4142 - Xiangli Xiao
, Yushu Zhang
, Zhongyun Hua
, Zhihua Xia
, Jian Weng
:
Preview Helps Selection: Previewable Image Watermarking With Client-Side Embedding. 4143-4159 - Abdulrahman Abu Elkhail
, Anys Bacha
, Hafiz Malik
:
Sniper: Countering Locker Ransomware Attacks Through Natural Language Processing. 4160-4175 - Yilong Yang
, Zhuo Ma
, Yihua Li, Yang Liu
, Xinjing Liu
, Jianfeng Ma
:
S-Teapot: Swift and Efficient Defense Against Patch-Based Backdoor Attack. 4176-4188 - Xinjian Chen
, Jianye Huang
, Kaifeng Xiao
, Hongbo Li
, Qiong Huang
:
A Non-Interactive Identity-Based Multi-Signature Scheme on Lattices With Public Key Aggregation. 4189-4199 - Shenshen Chen
, Jian Luo
, Dong Guo, Kai Gao
, Yang Richard Yang
:
Fast Inverse Model Transformation: An Algebraic Framework for Fast Data Plane Verification. 4200-4214 - Ning Wang
, Shanghao Shi
, Yimin Chen
, Wenjing Lou
, Y. Thomas Hou
:
FeCo: Boosting Intrusion Detection Capability in IoT Networks via Contrastive Learning. 4215-4230 - Liming Zhai
, Lina Wang
, Yanzhen Ren
, Yang Liu
:
Generalized Local Optimality for Video Steganalysis in Motion Vector Domain. 4231-4247 - Wassim Itani
, Maha Shamseddine
, Auday Al-Dulaimy
, Thomas Nolte, Alessandro V. Papadopoulos
:
dcGuard: A Holistic Approach for Detecting and Isolating Malicious Nodes in Cloud Data Centers. 4248-4265 - Kang-Di Lu
, Jia-Cheng Huang
, Guo-Qiang Zeng
, Min-Rong Chen
, Guang-Gang Geng
, Jian Weng
:
Multi-Objective Discrete Extremal Optimization of Variable-Length Blocks-Based CNN by Joint NAS and HPO for Intrusion Detection in IIoT. 4266-4283 - Shaoxian Yuan
, Kaiping Xue
, Bin Zhu
, Jingcheng Zhao
, Yaxuan Huang, Yuandong Xie, David S. L. Wei
:
Enabling Accurate and Efficient Privacy-Preserving Truth Discovery for Sparse Crowdsensing. 4284-4299 - Dongpeng Hou
, Chao Gao
, Zhen Wang
, Xuelong Li
:
FGSSI: A Feature-Enhanced Framework With Transferability for Sequential Source Identification. 4300-4314 - Ali Aljofey
, Saifullahi Aminu Bello
, Jian Lu
, Chen Xu
:
BERT-PhishFinder: A Robust Model for Accurate Phishing URL Detection With Optimized DistilBERT. 4315-4329 - Shujuan Tian
, Yi Tan
, Han Wang
, Haolin Liu
, Zhetao Li
:
ASDIA: An Adversarial Sample to Preserve Privacy Program in Federated Learning. 4330-4343 - Hui Sun
, Tianqing Zhu
, Jie Li
, Wanlei Zhou
:
Average and Strict GAN-Based Reconstruction for Adversarial Example Detection. 4344-4361 - Keke Gai
, Guolei Zhang, Peng Jiang
, Liehuang Zhu
, Kim-Kwang Raymond Choo
:
A Moving Target DDoS Defense Approach in Consortium Blockchain. 4362-4378 - Hao Zeng
, Helei Cui
, Man Li
, Bo Zhang
, Chengjun Cai
, Zhiwen Yu
, Bin Guo
:
Decentralized and Fair Trading Via Blockchain: The Journey So Far and the Road Ahead. 4379-4397 - Chao Feng
, Alberto Huertas Celdrán
, Pedro Miguel Sánchez Sánchez
, Jan Kreischer
, Jan von der Assen, Gérôme Bovet
, Gregorio Martínez Pérez
, Burkhard Stiller
:
CyberForce: A Federated Reinforcement Learning Framework for Malware Mitigation. 4398-4411 - Longfei Chen
, Hao Wang
, Yuchen Zhou
, Taiyu Wong
, Jialai Wang
, Chao Zhang
:
SmartTrans: Advanced Similarity Analysis for Detecting Vulnerabilities in Ethereum Smart Contracts. 4412-4427 - Yangde Wang
, Weidong Qiu
, Peng Tang
, Hao Tian, Shujun Li
:
SE#PCFG: Semantically Enhanced PCFG for Password Analysis and Cracking. 4428-4441 - Zhaoxia Yin
, Shaowei Zhu
, Hang Su
, Jianteng Peng, Wanli Lyu, Bin Luo
:
Adversarial Examples Detection With Enhanced Image Difference Features Based on Local Histogram Equalization. 4442-4455 - Junwei Zhou
, Shaowen Ying
, Shulan Wang
, Dongdong Zhao
, Jianwen Xiang
, Kaitai Liang
, Peng Liu
:
LogDLR: Unsupervised Cross-System Log Anomaly Detection Through Domain-Invariant Latent Representation. 4456-4471 - Dayong Ye
, Huiqiang Chen
, Shuai Zhou
, Tianqing Zhu
, Wanlei Zhou
, Shouling Ji
:
Model Inversion Attack Against Transfer Learning: Inverting a Model Without Querying It. 4472-4487
Volume 22, Number 5, September - October 2025
- Bowen Li
, Yunjie Ge
, Zheng Fang
, Tao Wang
, Lingchen Zhao
, Quan Lu, Ning Jiang, Qian Wang
:
CuckooAttack: Towards Practical Backdoor Attack against Automatic Speech Recognition Systems. 4488-4502 - Xiaoming Liu
, Hang Pu, Zhuo Chen, Zhanwei Zhang, Yu Lan
, Chao Shen
:
EvolGCN: A Co-Evolutionary Graph Convolutional Network Model for Dynamically Spatio-Temporal Anomaly Event Inference. 4503-4515 - Jianan Huang
, Weiwei Liu
, Guangjie Liu
, Bo Gao
, Fengyuan Nie
:
QuicCourier: Leveraging the Dynamics of QUIC- Based Website Browsing Behaviors Through Proxy for Covert Communication. 4516-4533 - Jinwen Liang
, Song Guo
, Zicong Hong
, Enyuan Zhou
, Chuan Zhang
, Bin Xiao
:
SecPQ: Secure Prediction Queries on Encrypted Outsourced Databases. 4534-4548 - Xueluan Gong
, Bowei Tian, Meng Xue
, Yuan Wu
, Yanjiao Chen
, Qian Wang
:
An Effective and Resilient Backdoor Attack Framework Against Deep Neural Networks and Vision Transformers. 4549-4564 - Zhili Zhou
, Ching-Nung Yang
, Shaowei Wang
, Guoshun Nan
, Stelvio Cimato
, Yifeng Zheng
, Qian Wang
:
Google Map-Based Password Authentication Systems Using Tolerant Distance and Homomorphic Encryption. 4565-4579 - Raffaele Giannessi
, Fabrizio Tronci
, Alessandro Biondi
:
Hazardous Behavior Analysis for Complex Pre-Existing Software in Safety-Critical Context: Approach and Application to the Linux Dynamic Memory Allocator. 4580-4592 - Ru Li, Jie Cui
, Jing Zhang
, Lu Wei
, Hong Zhong
, Debiao He
:
Blockchain-Assisted Revocable Cross-Domain Authentication for Vehicular Ad-Hoc Networks. 4593-4606 - Xiyue Zhang
, Xiaoyong Xue, Xiaoning Du
, Xiaofei Xie
, Yang Liu
, Meng Sun
:
Runtime Backdoor Detection for Federated Learning via Representational Dissimilarity Analysis. 4607-4624 - Meng Tong
, Kejiang Chen
, Jie Zhang
, Yuang Qi
, Weiming Zhang
, Nenghai Yu
, Tianwei Zhang
, Zhikun Zhang
:
InferDPT: Privacy-Preserving Inference for Closed-Box Large Language Models. 4625-4640 - She Tang
, Jian Wang
, Zhe Chen, Shize Guo:
A Covert and Efficient Attack on FPGA Cloud Based on Adaptive RON. 4641-4653 - Huan Tian
, Guangsheng Zhang
, Bo Liu
, Tianqing Zhu
, Ming Ding
, Wanlei Zhou
:
Do Fairness Interventions Come at the Cost of Privacy: Evaluations for Binary Classifiers. 4654-4670 - Lujia Shen
, Yuwen Pu
, Xuhong Zhang
, Chunpeng Ge
, Xing Yang
, Hao Peng
, Wei Wang
, Shouling Ji
:
TextDefense: Adversarial Text Detection Based on Word Importance Score Dispersion. 4671-4684 - Mingyan Zhu
, Yiming Li
, Junfeng Guo, Tao Wei, Shu-Tao Xia
, Zhan Qin
:
Towards Sample-Specific Backdoor Attack With Clean Labels via Attribute Trigger. 4685-4698 - Li Bai
, Haibo Hu
, Qingqing Ye
, Jianliang Xu
, Jin Li
, Chengfang Fang, Jie Shi:
RMR: A Relative Membership Risk Measure for Machine Learning Models. 4699-4710 - Lamya Abdullah
, Felix C. Freiling
, Dominique Schröder:
Increasing the Resilience of Secure Multiparty Computation Using Security Modules. 4711-4721 - Ding Wang
, Xuan Shan
, Yuxuan Wu
, Chunfu Jia
:
Understanding User Passwords Through Parsing Tree. 4722-4736 - Jianwen Tian
, Haoyu Ma
, Debin Gao
, Xiaohui Kuang
:
CacheAlarm: Monitoring Sensitive Behaviors of Android Apps Using Cache Side Channel. 4737-4752 - Mohammed Abuhamad
, Changhun Jung
, David Mohaisen
, DaeHun Nyang
:
SHIELD: Thwarting Code Authorship Attribution. 4753-4767 - Chanyoung Park
, Yeongjun Kwak
, Hyungon Moon
:
Efficient Use-After-Free Prevention With Pooling, OS-Assisted, and Opportunistic Page-Level Sweeping. 4768-4782 - Sergei Chuprov
, Leon Reznik
, Raman Zatsarenko
:
KISS: Knowledge Integration System Service for ML End Attacks Detection and Classification. 4783-4794 - Wei Yi
, Yulong Fu
, Jin Cao
, Yinghui Zhang
, Ben Niu
, Hui Li
:
AotmAuth: Atomic Function Module-Based 6G Authentication Protocol Combination Framework. 4813-4828 - Wanling Lin
, Xiao-Yan Li
, Jou-Ming Chang
, Dong Xiang
, Xiaohua Jia
:
Link/Switch Fault-Tolerant Hamiltonian Path Embedding in BCube Networks for Deadlock-Free Routing. 4829-4846 - Yanling Li
, Junzuo Lai
, Meng Sun
, Beibei Song, Robert H. Deng
:
Privacy-Preserving Ridge Regression Over Encrypted Data Under Multiple Keys. 4847-4860 - Jinhuan Wang
, Pengtao Chen
, Xinyao Xu, Jiajing Wu
, Meng Shen
, Qi Xuan
, Xiaoniu Yang
:
TSGN: Transaction Subgraph Networks Assisting Phishing Detection in Ethereum. 4861-4876 - Zuchao Ma
, Muhui Jiang
, Xiapu Luo
, Haoyu Wang
, Yajin Zhou:
Uncovering NFT Domain-Specific Defects on Smart Contract Bytecode. 4877-4895 - Keke Gai
, Dongjue Wang
, Jing Yu
, Liehuang Zhu
, Weizhi Meng
:
A Scheme of Robust Privacy-Preserving Multi-Party Computation via Public Verification. 4896-4910 - Riccardo Spolaor
, Yi Xu
, Veelasha Moonsamy
, Mauro Conti
, Xiuzhen Cheng
:
CovertPower: A Covert Channel on Android Devices Through USB Power Line. 4911-4926 - Yan Ke
, Minqing Zhang, Jia Liu
, Yiliang Han, Wenchao Liu
:
Federated Learning With Security Authentication and Traceability of Poisoning by Embedded Message Authentication Code. 4927-4941 - Esau Bermudez
, Luan Lins
, Paulo Pereira
, Paulo Maciel
:
A Stochastic Model for Evaluating the Aging Impact on Satellite Systems' Availability. 4942-4953 - Pengfei Wu
, Jianting Ning
, Xinyi Huang
, Rongmao Chen
, Kai Zhang
, Kaitai Liang
:
PrivBox: Privacy-Preserving Deep Packet Inspection With Dual Double-Masking Obfuscated Rule Generation. 4954-4970 - Wei Wang
, Junke Duan
, Licheng Wang
, Haipeng Peng
, Liehuang Zhu
, Lixiang Li
:
Redactable Blockchain Supporting Rewriting Authorization Without Trapdoor Exposure. 4971-4987 - Long Chen
, Yanting Wang, Qiaojuan Wang, Yanqing Song
, Jianguo Chen
:
Cybersecurity Multi-Dimensional Few-Shot Data Generation on Malicious Enhancement. 4988-4997 - Guowei Ling
, Peng Tang
, Fei Tang
, Shifeng Sun
, Shouling Ji
, Weidong Qiu
:
Ultra-Fast Private Set Intersection From Efficient Oblivious Key-Value Stores. 4998-5014 - Weihao Huang
, Chaoyang Lin
, Lu Xiang
, Zhiyu Zhang
, Guozhu Meng
, Lei Xue
, Kai Chen
, Lei Meng, Zongming Zhang:
MalFocus: Locating Malicious Modules in Malware Based on Hybrid Deep Learning. 5060-5076 - Lin Huang
, Chuan Qin
, Guorui Feng
, Xinpeng Zhang
:
Neural Network Watermarking With Hierarchical Recoverability. 5077-5089 - Hangsheng Zhang
, Dongqi Han
, Shangyuan Zhuang
, Zhiliang Wang
, Jiyan Sun, Yinlong Liu
, Jiqiang Liu
, Jinsong Dong
:
Explainable and Transferable Adversarial Attack for ML-Based Network Intrusion Detectors. 5090-5107 - Yushu Zhang
, Zixuan Yang
, Tao Wang
, Zhongyun Hua
, Jian Weng
:
Tailor-Made Face Privacy Protection via Class-Wise Targeted Universal Adversarial Perturbations. 5108-5120 - Ferhat Karakoç
, Alptekin Küpçü
:
Enabling Two-Party Secure Computation on Set Intersection. 5121-5133 - Hongcheng Zou
, Jinshu Su
, Ziling Wei
, Shuhui Chen
, Chunfang Yang
, Mantun Chen:
Toward an Effective Few-Shot Website Fingerprinting Attack With Quadruplet Networks and Deep Local Fingerprinting Features. 5152-5169 - Xinrui Ge
, Jia Yu
, Wenting Shen
, Jiankun Hu
:
Light-Weight Graph Matching Query Over Encrypted Graphs. 5170-5185 - Ying Chen
, Debiao He
, Zijian Bao
, Huaqun Wang
, Min Luo
:
MISP: An Efficient Quantum-Resistant Misbehavior Preventing Scheme With Self-Enforcement for Vehicle-to-Everything. 5203-5214 - Cong Wu
, Kun He
, Jing Chen
, Ruiying Du
, Ran Yan
, Ziming Zhao
:
High Accuracy and Presentation Attack Resistant Hand Authentication via Acoustic Sensing for Commodity Mobile Devices. 5231-5247 - Jinguang Han
, Liqun Chen
, Willy Susilo
:
Privacy-Preserving Decentralized Signature-Based Access Control. 5248-5264 - Shunrong Jiang
, Yingjie Liu
, Zhi Wang, Yonggang Li, Haotian Chi
, Xiaojiang Du:
Hybrid Makes Better: Hybrid Differential Privacy Medical Image Classification Based on Federated Learning. 5265-5276 - Gaoyang Liu
, Tianlong Xu
, Yang Yang
, Ahmed M. Abdelmoniem
, Chen Wang
, Jiangchuan Liu
:
Poisoning as a Post-Protection: Mitigating Membership Privacy Leakage From Gradient and Prediction of Federated Models. 5277-5290 - Yong Yu
, Haochen Yang
, Yannan Li, Xiaojiang Du
:
Accountable Many-to-One Signature With Short Verification Key for Self-Sovereign Identity. 5291-5302 - Hui Sun
, Tianqing Zhu
, Wenhan Chang
, Wanlei Zhou
:
Generative Adversarial Networks Unlearning. 5303-5320 - Zhangshuang Guan
, Yulin Zhao
, Zhiguo Wan
, Jinsong Han
:
OPSA: Efficient and Verifiable One-Pass Secure Aggregation With TEE for Federated Learning. 5321-5334 - Mingyue Xie
, Jun Liu
, Shuyu Chen, Mingwei Lin
, Guangxia Xu
, Zeshui Xu
, Zheng Chang
:
Traceability and Identity Protection in Smart Agricultural IoT System Framework Based on Blockchains. 5335-5351 - Ngoc Duy Pham
, Khoa Tran Phan
, Alsharif Abuadbba
, Yansong Gao
, Van-Doan Nguyen
, Naveen Chilamkurti
:
Split Learning Without Local Weight Sharing to Enhance Client-Side Data Privacy. 5352-5365 - Hui Tian
, Yiqin Qiu
, Haizhou Li
, Xinpeng Zhang
, Athanasios V. Vasilakos
:
Universal Low Bit-Rate Speech Steganalysis Integrating Domain-Specific and Domain-Shared Knowledge. 5382-5396 - Ningbin Yang
, Chunming Tang
, Zhihong Deng
, Debiao He
:
A Gaussian Reputation-Based Hybrid BFT Consensus With a Formal Security Framework. 5397-5414 - Song Han, Hongxin Ding, Shuai Zhao
, Siqi Ren, Shengke Zeng
, Mengqi Xue, Ruili Wang
:
Fed-GAN: Federated Generative Adversarial Network With Privacy-Preserving for Cross-Device Scenarios. 5415-5430 - Dazhi Zhan
, Xin Liu
, Wei Bai, Wei Li, Shize Guo, Zhisong Pan
:
GAME-RL: Generating Adversarial Malware Examples Against API Call Based Detection via Reinforcement Learning. 5431-5447 - Yuqing Li
, Nan Yan
, Jing Chen
, Xiong Wang
, Jianan Hong
, Kun He
, Wei Wang
, Bo Li
:
FedPHE: A Secure and Efficient Federated Learning via Packed Homomorphic Encryption. 5448-5463 - Yueming Wu
, Wenqi Suo
, Siyue Feng
, Deqing Zou
, Wei Yang, Yang Liu
, Hai Jin
:
MalScan: Android Malware Detection Based on Social-Network Centrality Analysis. 5464-5479 - Lefeng Zhang, Tianqing Zhu
, Ping Xiong
, Wanlei Zhou
:
Trojan Attack on Machine Unlearning: Security Risk of the Right to be Forgotten. 5480-5493 - Daniele Gorla
, Louis Jalouzot, Federica Granese
, Catuscia Palamidessi
, Pablo Piantanida
:
On Estimating the Strength of Differentially Private Mechanisms in a Black-Box Setting. 5494-5507 - Chao Liu
, Sisi Duan
, Haibin Zhang
:
MiB: Asynchronous BFT With More Replicas. 5508-5524 - Debasis Gountia
, Rakesh Ranjan Behera
, Pravas Ranjan Bal
, Swarna Lata Pati
:
Trojan Detection in Digital Microfluidic Biochips via Image Classification: A Deep-Learning Based Approach. 5525-5536 - Xiaoping Lou
, Huiru Zan
, Zidong Wang
, Jinjing Shi
, Shichao Zhang
:
Privacy-Preserving Bidirectional Data Transmission of Smart Grid Via Semi-Quantum Computation: On Mutual Identity and Message Authentication. 5537-5548 - Bin Xu
, Dongdong Zhao
, Junwei Zhou, Wenzhi Xie, Kai Jia, Jing Tian, Jianwen Xiang
:
Cross-Project Aging-Related Bug Prediction Based on Transfer Learning and Class Imbalance Learning. 5549-5566 - Yiwei Zhang
, Rouzbeh Behnia
, Attila Altay Yavuz
, Reza Ebrahimi
, Elisa Bertino
:
Efficient Full-Stack Private Federated Deep Learning With Post-Quantum Security. 5567-5583 - Hao Cheng, Yuan Lu
, Zhenliang Lu
, Qiang Tang, Yuxuan Zhang, Zhenfeng Zhang:
$\mathsf {JUMBO}$JUMBO: Fully Asynchronous BFT Consensus Made Truly Scalable. 5584-5602 - Mingze He
, Hongxia Wang
, Fei Zhang
, Heng Wang
:
Design Principles for Orthogonal Moments in Video Watermarking. 5603-5616 - Gang Wang
, Qingming Li
, Ximeng Liu
, Xiaoran Yan
, Qingkuan Dong
, Huiwen Wu
, Xiangjie Kong
, Li Zhou
:
VFGCN: A Vertical Federated Learning Framework With Privacy Preserving for Graph Convolutional Network. 5617-5631 - Qing Zhou
, Ping Wei
, Zhenxing Qian
, Xinpeng Zhang
, Sheng Li
, Chuan Qin
:
Conditional Flow-Based Generative Steganography. 5632-5647 - Kevin Hu
, Retsef Levi
, Raphael Yahalom
, El Ghali Zerhouni
:
Supply Chain Characteristics as Predictors of Cyber Risk: A Machine-Learning Assessment. 5648-5657 - Jordan Vice
, Naveed Akhtar
, Richard Hartley
, Ajmal Mian
:
Quantifying Bias in Text-to-Image Generative Models. 5658-5671 - Jiating Ma
, Yipeng Zhou
, Qi Li
, Quan Z. Sheng
, Laizhong Cui
, Jiangchuan Liu
:
The Power of Bias: Optimizing Client Selection in Federated Learning With Heterogeneous Differential Privacy. 5672-5687 - Dawei Zhou
, Zhigang Su, Decheng Liu
, Tongliang Liu
, Nannan Wang
, Xinbo Gao
:
A Knowledge-Guided Adversarial Defense for Resisting Malicious Visual Manipulation. 5688-5700 - Dawei Li
, Yangkun Ren
, Di Liu
, Song Bian
, Zhenyu Guan
, Willy Susilo
, Jianwei Liu
, Qianhong Wu
:
LOGO-Based Intellectual Property Right Protection Scheme for GANs on FPGA. 5701-5712 - Chushan Zhang
, Jian Weng
, Jiasi Weng
, Yijian Zhong
, Jia-Nan Liu
, Cunle Deng:
Robust and Secure Federated Learning With Verifiable Differential Privacy. 5713-5729 - Jieyu Zheng
, Haoliang Zhu
, Zhenyu Song
, Zheng Wang
, Yunlei Zhao
:
Optimized Vectorization Implementation of CRYSTALS-Dilithium. 5730-5743 - Letian Sha
, Xingpeng Huo
, Fu Xiao
, Jiankuo Dong
, Jianwen Liu
, Shang Wu
, Ziyue Su
:
AWDP-Automated Windows Domain Penetration Framework With Deep Reinforcement Learning. 5744-5759 - Sarah Roscoe
, Logan Hellbusch, Chamath Gunawardena, Jitender S. Deogun
, Witawas Srisa-an
, Yi Qian
, Gabriela F. Ciocarlie:
AVOID: Automated Void Detection in STL Files. 5760-5772 - Wanyu Lin
, Hao Lan
, Hao He, Baochun Li
:
Graph-Relational Federated Learning: Enhanced Personalization and Robustness. 5773-5785 - Yamin Li
, Jianghong Wei
, Fuchun Guo
, Yang Xiang
, Xiaofeng Chen
:
Function-Hiding Multi-Client Inner-Product Functional Encryption Without Pairings for Large Space. 5786-5797 - Zequan Zhou
, Xiling Luo
, Xiaohai Ji, Jian Mao
, Ting He
, Junjun Wang
, Qianhong Wu
:
BridgeGuard: Checking External Interaction Vulnerabilities in Cross-Chain Bridge Router Contracts Based on Symbolic Dataflow Analysis. 5798-5812 - Minghao Xu
, Fengrui Hao
, Tianlong Gu
, Ming Liu
:
FBA: Fairness Backdoor Attack on Graph Neural Networks. 5813-5820
Volume 22, Number 6, November - December 2025
- Jingwen Liu
, Yuanyuan Zhang
, Zilin Wang, Yi Ren
, Liangyin Chen
, Yanru Chen
:
HTM-CDFK: An Online Industrial Control Anomaly Detection Algorithm Based on Hierarchical Time Memory. 5821-5836 - Oussama Trabelsi
, Lilia Sfaxi
, Riadh Robbana:
DCC: A High-Performance Distributed Encryption Framework for Large Volumes of Data. 5837-5848 - Jemal H. Abawajy
, Sara Ghanavati
, Davood Izadi:
Enhancing Dependability of Fog Computing Using Learning-Based Task Scheduling. 5849-5860 - Chunpeng Wang
, Qinghua Zhang
, Xiaoyu Wang
, Linna Zhou, Qi Li
, Zhiqiu Xia
, Bin Ma
, Yun Qing Shi:
Light-Field Image Multiple Reversible Robust Watermarking Against Geometric Attacks. 5861-5875 - Willy Susilo
, Yumei Li
, Fuchun Guo
, Zhen Zhao
, Yannan Li, Chunpeng Ge
:
SVOC: Secure Aggregatable and Extractable System for Outsourced Cloud Computation. 5876-5887 - Pradip Kunwar
, Kshitiz Aryal
, Maanak Gupta
, Mahmoud Abdelsalam
, Elisa Bertino
:
SoK: Leveraging Transformers for Malware Analysis. 5888-5905 - Xiaoqiang Gui
, Guoxian Yu
, Jun Wang
, Zhongmin Yan
, Wei Wang
, Carlotta Domeniconi
, Lizhen Cui
:
Sophon: Byzantine-Robust Federated Learning via Dual Trust Mechanism. 5906-5917 - Nan Gao
, Kai Fan
, Haoyang Wang
, Yintang Yang
, Kan Yang
, Hui Li
:
Dynamic Multi-User Authorization in Ciphertext Retrieval With Proxy Re-Encryption. 5918-5930 - Jiguo Li
, Ninghai Xie, Yichen Zhang
, Huaqun Wang
:
TERCT: A Traceable and Editable Ring Confidential Transaction for Blockchain. 5931-5942 - Runze Wang
, Yipeng Zhou
, Jiahao Liu
, Xuezheng Liu
, Miao Hu
, Di Wu
, Quan Z. Sheng
, Song Guo
:
CODP: Improving Differentially Private Federated Learning by Cascading and Offsetting Noises Between Iterations. 5943-5955 - Chengsheng Yuan
, Zhaonan Ji
, Xinting Li, Zhili Zhou
, Zhihua Xia
, Q. M. Jonathan Wu
:
DGADM-GIS: Deterministic Guided Additive Diffusion Model for Generative Image Steganography. 5956-5969 - Janine Schneider
, Aya Fukami
, Immanuel Lautner
, Maximilian Eichhorn
, Denise Moussa
, Julian Wolf
, Nicole Scheler, Dominic Deuber, Felix C. Freiling
, Jaap Haasnoot, Hans Henseler, Simon Malik, Holger Morgenstern
, Martin Westman
:
Poor Sanitization Practices and Questionable Digital Evidence: A Comprehensive Study of Scope and Impact of Recycled NAND Flash Chips. 5970-5984 - Beining Wang
, Jing Chen
, Kun He
, Bei Shen, Sicheng Nian, Ruiying Du
:
Practical Multi-User Dynamic Searchable Symmetric Encryption With Hierarchical Authorization. 5985-5997 - Chenhao Wang
, Yang Ming
, Hang Liu
, Yutong Deng, Mengmeng Yang
, Jie Feng
:
Puncturable Registered ABE for Vehicular Social Networks: Enhancing Security and Practicality. 5998-6011 - Ying Miao
, Keke Gai
, Yu-An Tan
, Liehuang Zhu
, Weizhi Meng
:
Blockchain-Assisted Searchable Integrity Auditing for Large-Scale Similarity Data With Arbitration. 6012-6027 - Shuaishuai Li
, Liqiang Peng
, Weiran Liu
, Cong Zhang
, Zhen Gu
, Dongdai Lin
:
BitBatSPIR: Efficient Batch Symmetric Private Information Retrieval From PSI. 6028-6039 - Ripan Kumar Kundu, Matthew Denton, Genova Mongalo, Prasad Calyam
, Khaza Anuarul Hoque
:
Securing Virtual Reality Experiences: Unveiling and Tackling Cybersickness Attacks With Explainable AI. 6040-6057 - Chen Gong
, Xiangyu Wang
, Dan Zhu
, Cheng Huang
, Zhuoran Ma
, Jian Feng Ma
:
Enabling Efficient and Privacy-Preserving Sequence Similarity Query on Encrypted Genomes. 6058-6073 - Xi Yang
, Jie Zhang
, Chang Liu
, Han Fang, Zehua Ma
, Kejiang Chen
, Weiming Zhang
, Nenghai Yu
:
Synthesizing Glyph Vectors for Practical Information Hiding in Documents. 6074-6087 - Anxiao Song
, Ke Cheng
, Jiaxuan Fu, Shujie Cui
, Tao Zhang
, Zhao Chang
, Yulong Shen
:
Private Learning for Vertical Decision Trees: A Secure, Accurate, and Fast Realization. 6088-6103 - Bin Zhu
, Kaiping Xue
, Jingcheng Zhao
, Xianchao Zhang
, David S. L. Wei
, Qibin Sun
, Jun Lu
:
PSAC: Privacy-Preserving Statistical Analysis Framework for Crowdsourcing Using Histograms. 6104-6120 - Zahra Seyedi
, Farhad Rahmati
, Mohammad Ali
, Ximeng Liu
:
A Fully Decentralized Auditing Approach for Edge Computing: A Game-Theoretic Perspective. 6121-6132 - Man Zhang
, Xinghua Li
, Yinbin Miao
, Bin Luo, Siqi Ma
, Robert H. Deng
:
Accuracy-Enabling Differential Privacy-Preserving Truth Discovery. 6133-6146 - Haitao Wang
, Bingsheng Zhang
, Kui Ren
:
EncDB-FR$^{3}$3: An Encrypted Database With Fault Recovery and Rollback Resistance. 6147-6162 - Gnanambikai Krishnakumar
, Chester Rebeiro
:
Systematic Analysis of Moving Target Defenses for Branch Prediction Attacks. 6163-6178 - Daipeng Cao
, Yang Hong
, Qianqian Pan
, Jun Wu
:
Program Interoperable Large Language Model Software Testing Scheme: A Case Study on JavaScript Engine Fuzzing. 6179-6195 - Mengfei Xie
, Yan Lin
, Jianming Fu
, Chenke Luo
, Guojun Peng
:
Egalitarian Randomization for Multi-Language Applications on ARM64. 6196-6213 - Tianyou Zhang
, Haiyang Yu
, Zhen Yang
, Yuwen Chen
, Shui Yu
:
LaVFL: Efficient Verifiable Federated Learning for Large Language Models. 6214-6229 - Matheus E. Garbelini
, Zewen Shang
, Shijie Luo
, Sudipta Chattopadhyay
, Sumei Sun
, Ernest Kurniawan
:
5Ghoul: Unleashing Chaos on 5G Edge Devices via Stateful Multi-Layer Fuzzing. 6230-6247 - Duohe Ma
, Junye Jiang
, Xiaoyan Sun
, Zhimin Tang
, Zhenchao Zhang
, Kai Chen
, Jun Dai
:
Got My "Invisibility" Patch: Towards Physical Evasion Attacks on Black-Box Face Detection Systems. 6248-6265 - Zhenbo Shi
, Zhidong Yu
, Yuxuan Zhang, Wei Yang
, Liusheng Huang
:
A Unified Perspective From Diffuse Deviation to Target Hijacking. 6266-6280 - Hao Zeng
, Helei Cui
, Xiaoli Zhang
, Bo Zhang
, Yuefeng Du
, Bin Guo
, Zhiwen Yu
:
DCrowd: Decentralized Mobile Crowdsensing Via Proof of Task Assignment Blockchain. 6281-6295 - Haiwei Wu
, Yiming Chen
, Jiantao Zhou
, Yuanman Li
:
Rethinking Image Forgery Detection via Soft Contrastive Learning and Unsupervised Clustering. 6296-6308 - Xuyang Liu
, Zijian Zhang
, Zhen Li
, Xin Lu
, Meng Li
, Lei Xu
, Meng Ao, Liehuang Zhu
:
Group BFT: Two-Round BFT Protocols Via Replica Grouping. 6309-6326 - Yang Zheng, Yu Wen, Ruoyu Wang, Yanna Wu, Boyang Zhang, Dan Meng:
InstPro: Provenance-Based Transient Execution Attack Detection and Investigation on Instruction Execution Traces. 6327-6344 - Wenrui Cheng
, Tiantian Zhu
, Tieming Chen
, Qixuan Yuan
, Jie Ying
, Hongmei Li, Chunlin Xiong
, Mingda Li, Mingqi Lv
, Yan Chen
:
CRUcialG: Reconstruct Integrated Attack Scenario Graphs by Cyber Threat Intelligence Reports. 6345-6360 - Xuyang Jing, Qinghua Cao, Zheng Yan
, Witold Pedrycz
, Pu Wang
:
LocalSketch: An Accurate and Efficient Sketch for Range Spread Estimation. 6361-6375 - Shuhua Deng
, Zhangping Yin, Xieping Gao
:
Investigating Vulnerabilities in OpenFlow Discovery Protocol: Novel Attacks and Their Defense. 6376-6388 - Xugui Zhou
, Maxfield Kouzel
, Chloe Smith, Homa Alemzadeh
:
KnowSafe: Combined Knowledge and Data Driven Hazard Mitigation in Artificial Pancreas Systems. 6389-6405 - Jingcheng Zhao
, Kaiping Xue
, Ruidong Li
, Bin Zhu
, Meng Li
, Qibin Sun, Jun Lu
:
Privacy-Preserving Truth Discovery of Evolving Truths for Mobile Crowdsensing Systems. 6406-6421 - Guanjie Li
, Tom H. Luan
, Chengzhe Lai
, Jinkai Zheng
, Rongxing Lu
:
DTHA: A Digital Twin-Assisted Handover Authentication Scheme for 5G and Beyond. 6422-6440 - Ling Chen
, Chaodu Song, Xu Wang, Dachao Fu, Wenchao Zhou:
CSCLog: A Component Subsequence Correlation-Aware Log Anomaly Detection Method. 6441-6453 - Nan Gao
, Kai Fan
, Kan Yang
, Hui Li
, Yintang Yang
:
Deniable Time Signature Forward Secure Searchable Encryption With Flexible Retrieval and Traceable Authorization in Sharable EHR. 6454-6468 - Faqian Guan
, Tianqing Zhu
, Hanjin Tong, Wanlei Zhou
:
Attention-Based Membership Inference Attacks on Graph Neural Network Through Topological Features. 6469-6486 - Asif Iqbal
, Prosanta Gope
, Biplab Sikdar
:
Privacy-Preserving Collaborative Split Learning Framework for Smart Grid Load Forecasting. 6487-6503 - Dorjan Hitaj
, Giulio Pagnotta
, Fabio De Gaspari
, Sediola Ruko, Briland Hitaj
, Luigi V. Mancini
, Fernando Pérez-Cruz
:
Do You Trust Your Model? Emerging Malware Threats in the Deep Learning Ecosystem. 6504-6521 - Xiaobing Sun
, Mingxuan Zhou, Sicong Cao
, Xiaoxue Wu
, Lili Bo
, Di Wu
, Bin Li, Yang Xiang
:
HgtJIT: Just-in-Time Vulnerability Detection Based on Heterogeneous Graph Transformer. 6522-6538 - Youssef Sellami
, Youcef Imine
, Antoine Gallais
:
Fog-Blockchain Fusion for Event Evaluation and Trust Management. 6539-6553 - Deepika Saxena
, Ashutosh Kumar Singh:
An Intelligent Secure and Reliable Cloud Services Management Model With Toffoli Gate-Embedded Quantum Adam Neural Network. 6554-6565 - Wentuo Sun, Kaiping Xue
, Meiqi Li, Xinyi Luo:
FishboneChain: A Scalable and Liquidity-Guaranteed Crowdsourcing Platform Based on Multiple Child Chains. 6566-6579 - Ruiqi Dong
, Fanke Tong, He Huang
, Xiaogang Zhu
, Xi Xiao
, Shaohua Wang
, Sheng Wen
, Yang Xiang
:
One Mutation Fits All: Exploring Universal Library Fuzzing Based on Exogenous Mutation. 6580-6591 - Jaouhara Bouamama
, Yahya Benkaouz
, Mohammed Ouzzif
:
VeSAFL: Verifiable Secure Aggregation for Privacy-Preserving Federated Learning. 6592-6609 - Chaofan Ma
, Peng Jiang
, Keke Gai
, Liehuang Zhu
:
Toward High-Performance Privacy-Preserving Fuzzy Search Over Encrypted Data. 6610-6621 - Yaxin Xiao
, Haibo Hu
, Qingqing Ye
, Li Tang
, Zi Liang
, Huadi Zheng
:
Unlocking High-Fidelity Learning: Towards Neuron-Grained Model Extraction. 6622-6635 - Yuxin Sun
, Zhiquan Liu
, Yingjie Xia
, Zhen Guo, Gao Liu
, Leping Li, Jianfeng Ma
:
PPDR: A Privacy-Preserving Dual Reputation Management Scheme in Vehicle Platoon. 6636-6652 - Zhongyun Hua
, Zizheng Wang, Mingyang Song
, Yifeng Zheng
, Guangxia Xu
, Xiaohua Jia
:
Enabling Secure Auditing and Deduplication in Multi-Replica Cloud Storage. 6653-6670 - Tongfei Yan
, Jian Wang
, Zi-Han Cheng:
Hardware Trojan Detection for Incomplete Gate-Level Reverse Netlist. 6671-6684 - Zhixiong Xie
, Wenlong Tian
, Ruixuan Li
, Jianfeng Lu
, Weijun Xiao
, Zhiyong Xu
:
Horse-MinHash: High-Performance and Secure Jaccard Similarity Estimation for Cloud Storage. 6685-6697 - Liang Xie
, Zhou Su
, Yuntao Wang
, Nan Chen
, Yiliang Liu
, Rui Wang, Xin Liu, Donglan Liu, Hao Zhang:
A Privacy-Preserving Incentive Scheme for UAV-Aided Federated Learning: A Contract Method With Prospect Theory. 6698-6713 - Canh Minh Do
, Adrián Riesco
, Santiago Escobar
, Kazuhiro Ogata
:
Parallel Maude-NPA for Cryptographic Protocol Analysis. 6714-6731 - Haiyan Zhang
, Xinghua Li
, Yinbin Miao
, Shunjie Yuan
, Mengyao Zhu, Ximeng Liu
, Robert H. Deng
:
FL-CDF: Collaborative Defense Framework for Backdoor Mitigation in Federated Learning. 6732-6747 - Jessica Castro
, Nuno Laranjeiro
, Katerina Goseva-Popstojanova
, Marco Vieira
:
Developing Attack Detection Models for Microservice Applications: A Comprehensive Framework and Its Illustration and Validation on DoS Attacks. 6748-6766 - Chunqiang Yu
, Xianquan Zhang
, Guoxiang Li, Peng Liu
, Xinpeng Zhang
, Zhenjun Tang
:
Reversible Data Hiding in Encrypted Images With Secret Sharing and Multivariate Linear Equation. 6767-6780 - Wenyu Zhu
, Yuanda Wang
, Yuxin Cui
, Chao Zhang
, Xinhui Han
:
CALLEE: Recovering Call Graphs for Binaries With Transfer and Contrastive Learning. 6781-6796 - Yu Chen
, Jiguo Li
, Yang Lu
, Yichen Zhang
:
Pairing-Free Attribute-Based Signature With Message Recovery for Industrial Internet of Things. 6797-6808 - Faqian Guan
, Tianqing Zhu
, Wenhan Chang, Wei Ren
, Wanlei Zhou
:
Large Language Models Merging for Enhancing the Link Stealing Attack on Graph Neural Networks. 6809-6825 - Guorui Xu
, Qianmei Wu
, Fan Zhang
, Xinjie Zhao, Yuan Chen
, Shize Guo
:
Exploring the Internals of Fault-Induced Data-Level Vulnerabilities in Cryptographic Libraries. 6826-6843 - Kaimeng Chen
, Qingxiao Guan
, Weiming Zhang
, Nenghai Yu
, Wei Lu
:
Separable Reversible Data Hiding in Encrypted Images Based on Systematic Polar Code and Flag Bit Transmission Channel Model. 6844-6861 - Chong Xiao Wang
, Wee Peng Tay
:
Data-Driven Regularized Inference Privacy. 6862-6877 - Tao Wang
, Keyong Hong
, Bo Yang
, Qiliang Yang
, Haiyu Li, Wenzheng Zhang
:
Towards Authorization and Batch Validation for NFTs: A Cryptographic Generic Framework. 6878-6895 - Xiujun Wang
, Lei Mo
, Longkun Guo
, Zhigang Lu
, Zhi Liu
, Minhui Xue
:
Online Streaming Sampling Publication Method Over Sliding Windows With Differential Privacy. 6896-6912 - Yeongwoo Kim
, György Dán
:
Dynamic Alert Prioritization for Real-Time Situational Awareness: A Hidden Markov Model Framework With Active Learning. 6913-6928 - Minyeong Choe
, Cheolhee Park
, Changho Seo
, Hyunil Kim
:
SDBA: A Stealthy and Long-Lasting Durable Backdoor Attack in Federated Learning. 6929-6942 - Weizheng Wang
, Qipeng Xie
, Yongzhi Huang
, Yong Ding
, Lejun Zhang
, Demin Gao
, Chunhua Su
, Joel J. P. C. Rodrigues
:
Attack Analysis and Enhanced Authentication Protocol Design for Vehicle Networks. 6943-6954 - Futai Zou
, Zehui Zhang
, Yuzong Hu:
OTP-Hunter: An App-Based Fuzzing Framework to Discover One Time Password Vulnerabilities. 6955-6967 - Changhee Hahn
:
Towards Secure and Efficient Wildcard Search for Cloud Storage. 6968-6982 - Jilin Hu
, Yongwang Zhao
, Shuangquan Pan, Zuohua Ding
, Kui Ren
:
Tacco: A Framework for Ensuring the Security of Real-World TEEs via Formal Verification. 6983-6997 - Pinchang Zhang
, Huangwenqing Shi
, Jiankuo Dong
, Ji He
, Xiaohong Jiang
, Fu Xiao
:
Enhanced Two-Way Privacy-Preserving PHY-Layer Authentication for UAV-Assisted MIMO Systems. 6998-7009 - Delong Zhu
, Yuezun Li
, Baoyuan Wu
, Jiaran Zhou
, Zhibo Wang
, Siwei Lyu
:
Hiding Faces in Plain Sight: Defending DeepFakes by Disrupting Face Detection. 7010-7024 - Yun Shen
, Jie Cui
, Hong Zhong
, Jing Zhang
, Qingyang Zhang
, Lu Wei
, Debiao He
:
DBCSec: DBC File-Guided Secure Communication Mechanism for CAN-FD Bus. 7025-7042 - Yirui Huang
, Ximeng Liu
, Yinbin Miao
, Jing Zhang
, Dong Cheng
:
LDPTRec: A Differential Privacy Based Transformer Framework for Next POI Recommendation. 7043-7059 - Zheyu Chen
, Zhiqiang Yao
, Biao Jin
, Jianting Ning
, Mingwei Lin
:
Face-CPFNet: Leveraging Disentangled Representations for Dual-Level Soft- Biometric Privacy-Enhancement. 7060-7076 - Wei Li
, Borui Yang
, Yujie Sun
, Suyu Chen
, Yuting Chen, Liyao Xiang
:
CodeMark: Contextual and Natural Watermarking for Tracing Code Snippet Provenance. 7077-7090 - Shigen Shen
, Tao Hong
, Yizhou Shen
, Xiaoping Wu
, Jingnan Dong
, Jie Wu
:
RMAAC: Joint Markov Games and Robust Multiagent Actor-Critic for Explainable Malware Defense in Social IoT. 7091-7106 - Kwan Yin Chan
, Handong Cui
, Tsz Hon Yuen
, Siu Ming Yiu
:
DIDO+: Data Provenance From Restricted TLS 1.3 Websites With Selective Disclosure. 7107-7124 - Di Wu
, Qi Guo
, Yong Qi
, Saiyu Qi
, Qian Li
:
AMA: Adaptive Model Poisoning Attacks Towards Federated Learning. 7125-7138 - Siman Wu
, Hui Sun, Tianqing Zhu
, Wanlei Zhou
:
Backdoor Defense for Text Encoders in Text-to-Image Generative Models. 7139-7156 - Shunjie Yuan
, Xinghua Li
, Xuelin Cao
, Haiyan Zhang
, Robert H. Deng
:
General Test-Time Backdoor Detection in Split Neural Network-Based Vertical Federated Learning. 7157-7171 - Ye Liu
, Chengxuan Zhang
, Yi Li
:
Automated Invariant Generation for Solidity Smart Contracts. 7172-7188 - Mengjie Zhou
, Chao Lin
, Shengmin Xu
, Wei Wu
:
Sphinx: Certificateless Conditional Privacy-Preserving Authentication With Secure Transmission for VANETs. 7189-7202 - Kavya Balasubramanian, Adithya Gowda Baragur
, Denis Donadel, Dinuka Sahabandu
, Alessandro Brighente
, Bhaskar Ramasubramanian
, Mauro Conti
, Radha Poovendran
:
CANLP: Intrusion Detection for Controller Area Networks Using Natural Language Processing and Embedded Machine Learning. 7203-7214 - Zijie Lou, Gang Cao
, Man Lin, Lifang Yu
, Shaowei Weng
:
Trusted Video Inpainting Localization via Deep Attentive Noise Learning. 7215-7228 - Guohao Li
, Li Yang
, Lu Zhou
, Hongbin Huang
, Hao Zhang
, Jianfeng Ma
:
Practical and Collusion-Resistant Privacy-Preserving Aggregation for Edge Intelligence. 7229-7243 - Lihe Hou
, Weiwei Ni
, Nan Fu
, Dongyue Zhang
, Ruyu Zhang
, Sen Zhang
:
Diffusion-Based Heterogeneous Graph Synthesis Under Local Differential Privacy. 7244-7255 - Tianlong Yu
, Gaoyang Liu
, Chen Wang
, Yang Yang
:
LLMGraph: Label-Free Detection Against APTs in Edge Networks via LLM and GCN. 7256-7271 - Jiawei Zhou
, Linye Lyu
, Daojing He
, Yu Li
:
Toward Robust and Accurate Adversarial Camouflage Generation Against Vehicle Detectors. 7272-7286 - Naureen Hoque
, Hanif Rahbari
:
Locking Down Relay and Spoofing Attacks During Concurrent Connection Establishments in 802.11ax. 7287-7301 - Stefano Cecconello
, Matteo Cardaioli
, Luca Pasa
, Stjepan Picek
, Georgios Smaragdakis
:
Your PIN is Mine: Uncovering Users' PINs at Point of Sale Machines. 7302-7318 - Lichun Li
, Yuan Zhao
, Zhijie Liu, Kai Bu
, Linfeng Cheng, Shan Yin:
Privacy-Preserving Decision Graph Inference From Homomorphic Lookup Table. 7319-7333 - Xiaoyuan Liu
, Hongwei Li
, Guowen Xu
, Shengmin Xu
, Xinyi Huang
, Tianwei Zhang
, Yijing Lin
, Jianying Zhou
:
$\mathtt {Antelope}$: Fast and Secure Neural Network Inference. 7334-7347 - Qi Feng
, Lingyan Han, Min Luo
, Wei Zhao
, Debiao He
:
QuickNLP: Faster Protocol of Secure Natural Language Processing for Edge Computing. 7348-7359 - Victorine Clotilde Wakam Younang
, Amartya Sen
:
Security Risk Assessment Using Bayesian Attack Graphs and Complex Probabilities for Large Scale IoT Applications. 7360-7371 - Jiachun Li
, Jianan Feng
, Jianjun Huang
, Bin Liang
:
We Can Always Catch You: Detecting Adversarial Patched Objects WITH or WITHOUT Signature. 7372-7388 - Hao Li
, Xiangyang Luo
, Yi Zhang
, Qianqian Zhang
, Chunfang Yang
:
A Convolutional Neural Network Steganalysis Method Based on ShuffleBottleneck and Attention Mechanism. 7389-7402 - Binghui Zou
, Chunjie Cao
, Fangjian Tao, Yang Sun
, Longjuan Wang
, Yuqing Zhang, Jingzhang Sun
:
JPEG-Domain Malware Detection With Pretrained Lightweight Vision Transformer Model. 7403-7417 - Elham Cheshmikhani
, Hamed Farbeh
:
An Analytical and Empirical Investigation of Tag Partitioning for Energy-Efficient Reliable Cache. 7418-7429 - Ziqiang Li
, Pengfei Xia
, Hong Sun
, Yueqi Zeng, Wei Zhang
, Bin Li
:
Explore the Effect of Data Selection on Poison Efficiency in Backdoor Attacks. 7430-7447 - Marcello Cinque
, Domenico Cotroneo
, Giuseppe De Rosa
, Luigi De Simone
, Giorgio Farina
:
COSMOS: A Fault Injection Framework to Assess Hardware-Assisted Hypervisors. 7448-7462 - Hao Bai
, Kun He
, Yuqing Li
, Jing Chen
, Haowei Li
, Zhongmou Liu, Xuanang Yang
, Ruiying Du
:
GetFed: Accurate, Differentially Private Federated Learning With GAN-Based Data Generation. 7463-7478 - Qifan Wang
, Shujie Cui
, Lei Zhou
, Ye Dong
, Jianli Bai
, Yun Sing Koh
, Giovanni Russello
:
XGT: Fast and Secure Decision Tree Training and Inference on GPUs. 7479-7494 - Daoqing Yang
, Yu Yao
, Yao Shan
, Yunfeng Wu, Xiaoli Lin
, Wei Yang
, Licheng Yang
:
InSyfer: Industrial Control Protocols Syntax Inference via Graph Representation Learning. 7495-7507 - Bei Gong
, Yong Wu, Akhtar Badshah
, Muhammad Waqas
:
Privacy-Preserving and Traceable Certificateless Anonymous Mutual Authentication Scheme for IoT. 7508-7520 - Kaiping Xue
, Yutao Guo, Jingjiang Yang
, Feng Liu
, Chunyi Zhang, Feng Wang, Qibin Sun
, Jun Lu
:
Dynamic Structurally-Encrypted Database Solutions for Large-Scale Data Management. 7521-7534 - Junlin Liu
, Xinchen Lyu
, Chenshan Ren
, Qimei Cui
:
Targeted Poisoning Attacks Against Vertical Federated Learning via Embedding Manipulation. 7535-7551 - Hao Pan
, Yongjian Fu
, Yu Lu, Feitong Tan
, Yi-Chao Chen
, Ju Ren
:
MoiréComm: Secure Screen-Camera Communication Based on Moiré Cryptography. 7552-7570 - Biprodip Pal
, Md. Saiful Islam
, Alan Wee-Chung Liew
:
Calibrated Uncertainty Estimation for Trustworthy Deep IoT Attack Detection. 7571-7584 - Ying Miao
, Keke Gai
, Jing Yu
, Liehuang Zhu
, Dusit Niyato
:
Collaborative and Searchable Integrity Auditing for Multi-Copy Data in Decentralized Storage. 7585-7599 - Chen Wang
, Qian Yang, Jian Shen
, Q. M. Jonathan Wu
, Debiao He
:
BM-PDA: Blockchain Based Multifunctional Private-Preserving Data Aggregation for e-Health Systems. 7600-7613 - Guowei Ling
, Peng Tang
, Fei Tang
, Shifeng Sun
, Jinyong Shan
, Liyao Xiang
, Weidong Qiu
:
Privacy-Preserving Authorized Set Matching via Dishonest Majority Multiparty Computation. 7614-7631 - Shuo Yang
, Xinran Zheng, Jinze Li
, Jinfeng Xu
, Xinchen Zhang
, Edith C. H. Ngai
:
Self-Supervised Adaptation Method to Concept Drift for Network Intrusion Detection. 7632-7646 - Zhenguang Liu
, Lixun Ma
, Zhongzheng Mu
, Chengkun Wei
, Xiaojun Xu
, Yingying Jiao
, Kui Ren
:
I Know Who Clones Your Code: Interpretable Smart Contract Similarity Detection. 7647-7664 - Jie Pan
, Jintao Wu
, Yiwen Zhang
:
An Online Game-Integrated Auction Scheme for DDoS Mitigation in Mobile Edge Computing. 7665-7679 - Sen Zhao
, Haibo Hu
, Zheli Liu
, Xiaofeng Chen
:
SARAs: Substitution and Replay Attacks in the Maintenance Mode of Encrypted Databases. 7680-7693 - Letian Sha
, Luheng Zhang
, Yifei Huang
, Yan Lin
, Fu Xiao
, Jiaye Pan:
PatchFuzz: An Efficient Way to Incorporate Patching With Hybrid Fuzzing. 7694-7711 - Pei Yan, Shunquan Tan
, Miaohui Wang
, Jiwu Huang
:
Prompt Engineering-Assisted Malware Dynamic Analysis Using GPT-4. 7712-7728 - Anyuan Sang
, Yuchen Wang
, Junbo Jia, Li Yang
, Pengbin Feng
, Lu Zhou
, Jianfeng Ma
:
Resist Dependency Explosion in Attack Investigation With Splittable Tag Propagation and Aggregation. 7729-7745 - Yudong Gao
, Honglong Chen
, Peng Sun
, Junjian Li
, Yangxu Yin, Zhibo Wang
, Weifeng Liu
:
A Triple Stealthy Backdoor: Hidden in Spatial, Frequency, and Feature Domains. 7746-7758 - Lulu Wang
, Lei Zhang
, Kim-Kwang Raymond Choo
, Josep Domingo-Ferrer
, Mauro Conti
, Yuanyuan Gao:
Dual-Server Privacy-Preserving Collaborative Deep Learning: A Round-Efficient, Dynamic and Lossless Approach. 7759-7772 - Chun-I Fan
, Si-Jing Wu, Yi-Fan Tseng
, Arijit Karati
:
Attribute-Based Encryption Supporting Multi-Keyword Search With Effective User Revocation in Public Cloud Storage. 7790-7801 - Jiaojiao Wu
, Jianfeng Wang
, Shifeng Sun
, Xiaofeng Chen
:
Flash: Practical Volume-Hiding Encrypted Conjunctive Multi-Map With Optimal Overhead. 7802-7817 - Hao Tang
, Cheng Wang
, Hongzi Zhu
:
Enhancing Online Transaction Fraud Detection via Heterogeneous Source Models. 7818-7834 - Xiaohan Hao
, Chao Lin
, Xuan He, Xinyi Huang
:
GAMC: Generic and Anti-MDA Model Certification for Intellectual Property Protection in MLaaS. 7835-7848 - Xia Du
, Jiajie Zhu, Ji-Zhe Zhou
, Chi-Man Pun
, Zheng Lin
, Cong Wu
, Zhe Chen
, Jun Luo
:
DP-TRAE: A Dual-Phase Merging Transferable Reversible Adversarial Example for Image Privacy Protection. 7849-7861 - Yang Li
, Minghui Li
, Hao Han
, Liming Fang
:
MACO: Model Anti-Extraction via Compiler Obfuscation. 7862-7876 - Yaguan Qian
, Qinqin Yu, Qiqi Bao
, Shouling Ji
, Wei Wang
, Bin Wang, Zhaoquan Gu
, Zhen Lei
:
A Multimodal Adversarial Attack Method via Frequency Domain Enhancement and Fine-Grained Cross-Modal Guidance. 7877-7889 - Jixian Zhang
, Qingfeng Du
, Sheng Li, Zhongda Lu, Ting He, Chengwei Liu:
Real-World Code Vulnerability Detection Framework: From Data Preprocessing to Multi-Feature Fusion Detection. 7890-7907 - Jiewei Du, Qiqi Zhang, Ning Xie
:
STAC: Superimposed-Tag Anti-Copying Two-Dimensional Barcodes. 7908-7922 - Cheng Guo
, Ling Li
, Ximeng Liu
, Kim-Kwang Raymond Choo
, Yi-Ning Liu
:
SAMK: Secure Aggregation for Federated Learning Under Multiple Keys With Low Communication Rounds. 7923-7937 - Jianwei Liu
, Wenfan Song
, Yajie Liu
, Jiantao Yuan
, Guanding Yu
, Jinsong Han
:
Replay-Resistant Few-Shot Disk Authentication Using Electromagnetic Fingerprint. 7938-7955 - Rongqiang Fang
, Yongqi Sun
, Jidong Yuan
, Hongbo Cao
:
DMIA: A Disentangled-Based Method for Graph Convolutional Network Against Membership Inference Attack. 7956-7970 - Shengmin Xu
, Guomin Yang
, Xiaoguo Li
, Xingshuo Han
, Xiaotian Yan
, Xinyi Huang
:
Enhancing Secure Cloud Data Sharing: Dynamic User Groups and Outsourced Decryption. 7971-7984 - Muhidul Islam Khan
, Gianfranco Nencioni
:
Revenue-Model Learning for a Slice Broker by Considering Security and Dependability. 7985-7995 - Wenbo Jiang
, Hongwei Li
, Jiaming He
, Rui Zhang, Guowen Xu
, Tianwei Zhang
, Rongxing Lu
:
I2I Backdoor: Backdoor Attacks Against Image-to-Image Tasks. 7996-8010 - Suo Gao
, Zheyi Zhang
, Qi Li
, Siqi Ding
, Herbert Ho-Ching Iu
, Yinghong Cao
, Xianying Xu
, Chunpeng Wang
, Jun Mou
:
Encrypt a Story: A Video Segment Encryption Method Based on the Discrete Sinusoidal Memristive Rulkov Neuron. 8011-8024 - Xiaotian Wu
, Yuyang Xiong, Bing Chen
, Ching-Nung Yang
, Wei Qi Yan
, Qing-Yu Peng:
On the Design of Distributed Multi-User Secret Image Sharing for General Access Structures. 8025-8042 - Hao-Tian Wu
, Yingqing Chen, Yiu-ming Cheung
, Jiankun Hu
, Zhihong Tian
:
BGN Encryption Based Lossless Data Hiding by Random Number Replacement and Partitioning. 8043-8055 - Haoyang Wang
, Kai Fan
, Kuan Zhang
, Fenghua Li
, Hui Li
, Yintang Yang
:
MU-MRQ: Enabling Multi-User Verifiable and Secure Multi-Dimensional Range Query Over Encrypted Data. 7773-7789 - Zan Zhou
, Jun Zhao
, Shujie Yang, Hongjing Li, Tengchao Ma, Changqiao Xu:
Community-Oriented Duplex Privacy Amplification and Active Poisoning Resistance for Heterogeneous Federated Learning. 5015-5032 - Yuepeng Hu
, Minghong Fang, Yuqi Jia
, Hongbin Liu, Neil Zhenqiang Gong:
Periodic Recovery From Poisoning Attacks in Machine Learning. 5033-5046 - Ke He
, Dan Dongseong Kim
, Muhammad Rizwan Asghar
:
MTD-AD: Moving Target Defense as Adversarial Defense. 5047-5059 - Mengdie Huang
, Yingjun Lin, Ninghui Li
, Xiaofeng Chen
, Elisa Bertino:
CARD: Robustness-Preserving Transfer Learning for Network Intrusion Detection via Contrastive Adversarial Representation Distillation. 5134-5151 - Yuwen Pu, Jiahao Chen
, Jiayu Pan
, Diqun Yan
, Xuhong Zhang, Shouling Ji:
Facial Data Minimization: Shallow Model as Your Privacy Filter. 5186-5202 - Meijia Xu
, Ding Wang
:
Practical Two-Factor Authentication Protocol for Real-Time Data Access in WSNs. 5215-5230 - Changsheng Chen
, Youjie Li
, Bokang Li, Weifan Yu, Baoying Chen
, Bin Li, Jiwu Huang:
Moiré Spectral Augmentation and Masked Frequency Modeling for Document Presentation Attack Detection. 5366-5381
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.