


default search action
IEEE Transactions on Dependable and Secure Computing, Volume 22
Volume 22, Number 1, January - February 2025
- Shaowei Wang, Shiyu Yu

, Xiaojun Ren, Jin Li, Yuntong Li, Wei Yang, Hongyang Yan, Jin Li:
Differentially Private Numerical Vector Analyses in the Local and Shuffle Model. 1-15 - Zeyu Yang

, Liang He
, Peng Cheng
, Jiming Chen
:
Mismatched Control and Monitoring Frequencies: Vulnerability, Attack, and Mitigation. 16-33 - Yunyi Zhang

, Chengxi Xu
, Fan Shi
, Miao Hu
, Min Zhang
, Yuwei Li
, Zhijie Xie
:
Understanding and Characterizing the Adoption of Internationalized Domain Names in Practice. 34-48 - Awaneesh Kumar Yadav

, Manoj Misra
, Pradumn Kumar Pandey
, Pasika Ranaweera
, Madhusanka Liyanage
, Neeraj Kumar
:
A Secure Authentication Protocol for IoT-WLAN Using EAP Framework. 49-65 - Antonino Rullo

, Carmelo Felicetti
, Massimo Vatalaro
, Raffaele De Rose
, Marco Lanuzza
, Felice Crupi
, Domenico Saccà
:
PUF-Based Authentication-Oriented Architecture for Identification Tags. 66-83 - Lan Zhang

, Xinben Gao
, Yaliang Li
, Yunhao Liu
:
Functionality and Data Stealing by Pseudo-Client Attack and Target Defenses in Split Learning. 84-100 - Shougang Yuan

, Amro Awad
, Huiyang Zhou
:
Delta Counter: Bandwidth-Efficient Encryption Counter Representation for Secure GPU Memory. 101-113 - Shuo Shao

, Wenyuan Yang
, Hanlin Gu
, Zhan Qin
, Lixin Fan, Qiang Yang, Kui Ren
:
FedTracker: Furnishing Ownership Verification and Traceability for Federated Learning Model. 114-131 - Haomiao Yang

, Dongyun Xue
, Mengyu Ge, Jingwei Li
, Guowen Xu
, Hongwei Li
, Rongxing Lu
:
Fast Generation-Based Gradient Leakage Attacks: An Approach to Generate Training Data Directly From the Gradient. 132-145 - Matthew Nance Hall

, Zaoxing Liu
, Vyas Sekar, Ramakrishnan Durairajan
:
Analyzing the Benefits of Optical Topology Programming for Mitigating Link-Flood DDoS Attacks. 146-163 - Xiaopeng Dai

, Qianhong Wu
, Bingyu Li
, Bo Qin
, Jialiang Fan
, Fuyang Deng
, Mingzhe Zhai
:
R2E: A Decentralized Scheme for Rewarding Tor Relays With Cryptocurrencies. 164-178 - Kai Ye

, Xiaogang Zhu
, Xi Xiao
, Sheng Wen
, Minhui Xue
, Yang Xiang
:
BazzAFL: Moving Fuzzing Campaigns Towards Bugs via Grouping Bug-Oriented Seeds. 179-191 - Jiliang Li

, Yuan Su
, Rongxing Lu
, Zhou Su
, Weizhi Meng
, Meng Shen
:
StealthPath: Privacy-Preserving Path Validation in the Data Plane of Path-Aware Networks. 192-204 - Songtao Fu

, Qi Li
, Xiaoliang Wang
, Su Yao
, Xuewei Feng
, Ziqiang Wang
, Xinle Du
, Kao Wan, Ke Xu
:
Secure Fault Localization in Path Aware Networking. 205-220 - Chenghao Hu

, Baochun Li
:
MaskCrypt: Federated Learning With Selective Homomorphic Encryption. 221-233 - Alian Yu

, Jian Kang
, Wei Jiang
, Dan Lin
:
Highly Efficient and Scalable Access Control Mechanism for IoT Devices in Pervasive Environments. 234-245 - Byoungjin Seok

, Changhoon Lee
:
A Novel Approach to Construct a Good Dataset for Differential-Neural Cryptanalysis. 246-262 - Erzhuo Chen

, Vladislav Dubrovenski, Dianxiang Xu
:
Detecting Errors in NGAC Policies via Fault-Based Testing. 263-278 - Jaeyoon Jeong

, Insung Baek
, Byungwoo Bang
, Jun-Yeon Lee
, Uiseok Song
, Seoung Bum Kim
:
FALL: Prior Failure Detection in Large Scale System Based on Language Model. 279-291 - Liangliang Wang

, Jiangwei Xu
, Baodong Qin
, Mi Wen
, Kefei Chen
:
An Efficient Fuzzy Certificateless Signature-Based Authentication Scheme Using Anonymous Biometric Identities for VANETs. 292-307 - Fiorella Artuso

, Marco Mormando
, Giuseppe Antonio Di Luna
, Leonardo Querzoni
:
BinBert: Binary Code Understanding With a Fine-Tunable and Execution-Aware Transformer. 308-326 - Daren Fadolalkarim

, Elisa Bertino
:
DCAFixer: An Automatic Tool for Bug Detection and Repair for Database Java Client Applications. 327-342 - Dongliang Fang

, Anni Peng
, Le Guan
, Erik van der Kouwe
, Klaus von Gleissenthall
, Wenwen Wang
, Yuqing Zhang
, Limin Sun
:
InvisiGuard: Data Integrity for Microcontroller-Based Devices via Hardware-Triggered Write Monitoring. 343-358 - Xu Yang

, Fei Zhu
, Xuechao Yang
, Junwei Luo
, Xun Yi
, Jianting Ning
, Xinyi Huang
:
Secure Reputation-Based Authentication With Malicious Detection in VANETs. 359-372 - Vikram Kanth

, Britta Hale
:
Blockchain-Based Authenticated Stego-Channels and Application to Ethereum. 373-387 - Wisam Abbasi

, Paolo Mori
, Andrea Saracino
:
Trading-Off Privacy, Utility, and Explainability in Deep Learning-Based Image Data Analysis. 388-405 - Vlasis Koutsos

, Sankarshan Damle
, Dimitrios Papadopoulos
, Sujit Gujar
, Dimitris Chatzopoulos
:
$\mathsf {AVeCQ}$AVeCQ: Anonymous Verifiable Crowdsourcing With Worker Qualities. 406-423 - Hengzhi Wang

, Laizhong Cui
, En Wang
, Jiangchuan Liu
:
A Differentially Private Approach for Budgeted Combinatorial Multi-Armed Bandits. 424-439 - Guorui Xie

, Qing Li
, Chupeng Cui, Ruoyu Li
, Lianbo Ma
, Zhuyun Qi, Yong Jiang
:
Intelligent In-Network Attack Detection on Programmable Switches With Soterv2. 440-456 - Xue Rao

, Cong Sun
, Dongrui Zeng
, Yongzhe Huang
, Gang Tan
:
Sliver: A Scalable Slicing-Based Verification for Information Flow Security. 457-473 - Wenbo Shen

, Yifei Wu
, Yutian Yang
, Qirui Liu
, Nanzi Yang
, Jinku Li
, Kangjie Lu
, Jianfeng Ma
:
Towards Understanding and Defeating Abstract Resource Attacks for Container Platforms. 474-490 - Chenchen Cao

, Chunxiang Xu
, Changsong Jiang
, Zhao Zhang
, Xinfeng Dong
, Kefei Chen
:
LPbT-SSO: Password-Based Threshold Single-Sign-On Authentication From LWE. 491-504 - Yongshuo Wan

, Cuiying Feng
, Kui Wu
, Jianping Wang
:
RZDD: Risk Zone-Diversified Network Design for Disaster Resilience. 505-517 - Sareena Karapoola

, Nikhilesh Singh
, Chester Rebeiro
, Kamakoti Veezhinathan
:
SUNDEW: A Case-Sensitive Detection Engine to Counter Malware Diversity. 518-533 - Yandong Zheng

, Hui Zhu
, Rongxing Lu
, Songnian Zhang
, Fengwei Wang
, Jun Shao
, Hui Li
:
Efficient and Privacy-Preserving Weighted Range Set Sampling in Cloud. 534-548 - Dylan Zapzalka, Saeed Salem

, David Mohaisen
:
Semantics-Preserving Node Injection Attacks Against GNN-Based ACFG Malware Classifiers. 549-560 - Daniele Bringhenti

, Riccardo Sisto
, Fulvio Valenza
:
Automating VPN Configuration in Computer Networks. 561-578 - Shaoquan Jiang

, Dima Alhadidi
, Hamid Fazli Khojir
:
Key-and-Signature Compact Multi-Signatures for Blockchain: A Compiler With Realizations. 579-596 - Guanglin Duan

, Qing Li
, Zhengxin Zhang
, Dan Zhao
, Guorui Xie
, Yuan Yang
, Zhenhui Yuan
, Yong Jiang
, Mingwei Xu
:
DNSGuard: In-Network Defense Against DNS Attacks. 597-613 - Steffen Wendzel

, Tobias Schmidbauer
, Sebastian Zillien
, Jörg Keller
:
DYST (Did You See That?): An Amplified Covert Channel That Points To Previously Seen Data. 614-631 - Chenxiang Luo

, Wenyi Tang
, Qixu Wang
, Danyang Zheng
:
Few-Shot Website Fingerprinting With Distribution Calibration. 632-648 - Xinyi Luo, Kaiping Xue

, Qibin Sun
, Jun Lu
:
CrossChannel: Efficient and Scalable Cross-Chain Transactions Through Cross-and-Off-Blockchain Micropayment Channel. 649-663 - Guodong Cao

, Zhibo Wang
, Xiaowei Dong
, Zhifei Zhang, Hengchang Guo, Zhan Qin
, Kui Ren
:
Vanilla Feature Distillation for Improving the Accuracy-Robustness Trade-Off in Adversarial Training. 664-676 - Zixuan Ma

, Chen Li
, Yuqi Zhang
, Ruibang You
, Bibo Tu
:
IMS: Towards Computability and Dynamicity for Intent-Driven Micro-Segmentation. 677-694 - Sirui Hao, Junjiang He

, Wenshan Li, Tao Li
, Geying Yang
, Wenbo Fang
, Wanying Chen
:
CSCAD: An Adaptive LightGBM Algorithm to Detect Cache Side-Channel Attacks. 695-709 - Xiaoning Liu

, Yifeng Zheng
, Xingliang Yuan
, Xun Yi
:
${\sf GoCrowd}$GoCrowd: Obliviously Aggregating Crowd Wisdom With Quality Awareness in Crowdsourcing. 710-722 - Weikang Liu

, Bin Cao
, Mugen Peng
, Bo Li
:
Distributed and Parallel Blockchain: Towards a Multi-Chain System With Enhanced Security. 723-739 - Xinjun Pei

, Xiaoheng Deng
, Shengwei Tian
, Ping Jiang
, Yunlong Zhao, Kaiping Xue
:
A Privacy-Preserving Graph Neural Network for Network Intrusion Detection. 740-756 - Yanlong Qiu

, Jiaxi Zhang
, Tao Sun
, Yanjiao Chen
, Jin Zhang
, Bo Ji
:
WASTON: Inferring Critical Information to Enable Spoofing Attacks Using COTS mmWave Radar. 757-770 - Xinyi Luo, Kaiping Xue

, Zhuo Xu, Mingrui Ai, Jianan Hong
, Xianchao Zhang
, Qibin Sun
, Jun Lu
:
EtherCloak: Enabling Multi-Level and Customized Privacy on Account-Model Blockchains. 771-786 - Jieying An

, Yanbing Ren
, Xinghua Li
, Man Zhang
, Bin Luo
, Yinbin Miao
, Ximeng Liu
, Robert H. Deng
:
Privacy-Preserving User Recruitment With Sensing Quality Evaluation in Mobile Crowdsensing. 787-803 - Xindi Ma

, Xinfu Li, Junying Zhang
, Zhuo Ma
, Qi Jiang
, Ximeng Liu
, Jianfeng Ma
:
Repairing Backdoor Model With Dynamic Gradient Clipping for Intelligent Vehicles. 804-818 - Shan Chang

, Luo Zhou
, Wei Liu
, Hongzi Zhu
, Xinggang Hu, Lei Yang
:
Combating Voice Spoofing Attacks on Wearables via Speech Movement Sequences. 819-832 - Huige Wang

, Kefei Chen
, Qi Xie
, Qian Meng:
Post-Quantum Secure Identity-Based Matchmaking Encryption. 833-844
Volume 22, Number 2, March - April 2025
- Long Zhuo

, Shenghai Luo, Shunquan Tan
, Han Chen, Bin Li
, Jiwu Huang
:
Evading Detection Actively: Toward Anti-Forensics Against Forgery Localization. 852-869 - Wei Luo, Guoqi Xie

, Yao Liu, Xiongren Xiao, Renfa Li
:
Fast Game Verification for Safety- and Security-Critical Distributed Applications. 870-887 - Shaoyu Dou

, Kai Yang
, Yang Jiao
, Chengbo Qiu
, Kui Ren
:
Anomaly Detection in Event-Triggered Traffic Time Series via Similarity Learning. 888-902 - HeeWon Chung

, Myungsun Kim
, Patrick Chulsoon Yang
:
Multiparty Delegated Private Set Union With Efficient Updates on Outsourced Datasets. 903-918 - Hugo Kermabon-Bobinnec

, Sima Bagheri, Mahmood Gholipourchoubeh
, Suryadipta Majumdar
, Yosr Jarraya
, Lingyu Wang
, Makan Pourzandi:
PerfSPEC: Performance Profiling-Based Proactive Security Policy Enforcement for Containers. 919-938 - Lei Jiang

, Xiaoding Wang
, Xu Yang
, Jiwu Shu, Hui Lin
, Xun Yi
:
FedPA: Generator-Based Heterogeneous Federated Prototype Adversarial Learning. 939-949 - Yiyu Yang

, Jiayu Zhao
, Yilian Li, Xiaowei Li
, Peng Liu
, Yuqing Zhang
:
Sharing Can be Threatening: Uncovering Security Flaws of RBAC Model on Smart Home Platforms. 950-966 - Wanyu Lin

, Hao Lan
, Jiannong Cao
:
Graph Privacy Funnel: A Variational Approach for Privacy-Preserving Representation Learning on Graphs. 967-978 - Meng Sun

, Junzuo Lai
, Wei Wu
, Ye Yang
, Cheng-Kang Chu
, Robert H. Deng
:
How to Securely Delegate and Revoke Partial Authorization Credentials. 979-996 - Mingfeng Huang, Zhetao Li, Anfeng Liu

, Xinglin Zhang, Zhemin Yang
, Min Yang:
A Proactive Trust Evaluation System for Secure Data Collection Based on Sequence Extraction. 997-1010 - Xinle Cao

, Jian Liu
, Hao Lu, Yan Liu
, Weixin Liu, Tao Wei, Kui Ren
:
On the Interoperability of Encrypted Databases. 1011-1023 - Yuxia Sun

, Shiqi Chen
, Song Lin, Aoxiang Sun, Saiqin Long
, Zhetao Li
:
$MGAP^{3}$MGAP3: Malware Group Attribution Based on PerceiverIO and Polytype Pre-Training. 1024-1039 - Dongdong Lin

, Benedetta Tondi
, Bin Li
, Mauro Barni
:
A CycleGAN Watermarking Method for Ownership Verification. 1040-1054 - Shahryar Baki

, Fatima Zahra Qachfar
, Rakesh M. Verma
, Ryan Kennedy
, Daniel Jones:
Real-Time, Evidence-Based Alerts for Protection From Phishing Attacks. 1055-1069 - Mohammad Shamim Ahsan

, Md. Shariful Islam
, Md. Shohrab Hossain, Anupam Das
:
Detecting Smart Home Device Activities Using Packet-Level Signatures From Encrypted Traffic. 1070-1081 - Benedetta Tondi

, Andrea Costanzo
, Mauro Barni
:
Robust and Large-Payload DNN Watermarking via Fixed, Distribution-Optimized, Weights. 1082-1097 - Xiangwan Fu

, Saiqin Long
, Anfeng Liu
, Ju Ren
, Bin Guo
, Zhetao Li
:
Truthful and Dual-Direction Combinatorial Multi-Armed Bandit Scheme to Maximize Profit for Mobile Crowd Sensing. 1098-1117 - Cong Wu

, Jing Chen
, Simeng Zhu, Wenqi Feng, Kun He
, Ruiying Du
, Yang Xiang
:
WAFBooster: Automatic Boosting of WAF Security Against Mutated Malicious Payloads. 1118-1131 - Ming Zhang

, Wenhai Sun
, Hui Li
, Xiaofeng Wang, Zihao Yang, Chao Qu, Xiaoguang Li
:
Manipulated Transaction Collision Attack on Execute-Order-Validate Blockchain. 1132-1149 - Xiaolin Chai

, Hang Zhang, Jue Zhang, Yan Sun
, Sajal K. Das
:
Log Sequence Anomaly Detection Based on Template and Parameter Parsing via BERT. 1150-1167 - Martina Camaioni, Rachid Guerraoui

, Jovan Komatovic
, Matteo Monti
, Pierre-Louis Roman
, Manuel Vidigueira
, Gauthier Voron
:
Carbon: Scaling Trusted Payments With Untrusted machines. 1168-1180 - Shuo Wang

, Keke Gai
, Jing Yu
, Liehuang Zhu
, Hanghang Wu
, Changzheng Wei
, Ying Yan
, Hui Zhang
, Kim-Kwang Raymond Choo
:
RAFLS: RDP-Based Adaptive Federated Learning With Shuffle Model. 1181-1194 - Yetong Cao

, Chao Cai
, Fan Li
, Zhe Chen
, Jun Luo
:
Enabling Passive User Authentication via Heart Sounds on In-Ear Microphones. 1195-1209 - Mengxue Yang

, Huaqun Wang
, Debiao He
:
PM-ABE: Puncturable Bilateral Fine-Grained Access Control From Lattices for Secret Sharing. 1210-1223 - Yufeng Hu

, Yingshi Sun, Yuan Chen
, Zhuo Chen
, Bowen He
, Lei Wu
, Yajin Zhou
, Rui Chang
:
MFGSCOPE: A Lightweight Framework for Efficient Graph-Based Analysis on Blockchain. 1224-1238 - Jingwei Liu

, Yating Li
, Mengjiao Zhao, Lei Liu
, Neeraj Kumar
:
EPFFL: Enhancing Privacy and Fairness in Federated Learning for Distributed E-Healthcare Data Sharing Services. 1239-1252 - Li Hu

, Hongyang Yan
, Yun Peng, Haibo Hu
, Shaowei Wang
, Jin Li
:
VAE-Based Membership Cleanser Against Membership Inference Attacks. 1253-1264 - Yu Lin

, Tianling Zhang, Yunlong Mao
, Sheng Zhong
:
CrossNet: A Low-Latency MLaaS Framework for Privacy-Preserving Neural Network Inference on Resource-Limited Devices. 1265-1280 - Zhonghui Ge

, Chenke Wang
, Yu Long
, Dawu Gu
:
Shaduf++: Non-Cycle and Privacy-Preserving Payment Channel Rebalancing. 1281-1298 - Boyu Zhang

, Wenjie Yang
, Futai Zhang
, Jianting Ning
:
Efficient Attribute-Based Searchable Encryption With Policy Hiding Over Personal Health Records. 1299-1312 - Heng Xu, Tianqing Zhu

, Wanlei Zhou
, Wei Zhao
:
Don't Forget Too Much: Towards Machine Unlearning on Feature Level. 1313-1328 - Jianfei Sun

, Yangyang Bao
, Weidong Qiu
, Rongxing Lu
, Songnian Zhang
, Yunguo Guan
, Xiaochun Cheng
:
Privacy-Preserving Fine-Grained Data Sharing With Dynamic Service for the Cloud-Edge IoT. 1329-1346 - Haodi Wang

, Rongfang Bie
, Thang Hoang
:
An Efficient and Zero-Knowledge Classical Machine Learning Inference Pipeline. 1347-1364 - Xiaokang Yin

, Ruijie Cai, Xiaoya Zhu
, Qichao Yang
, Enzhou Song
, Shengli Liu
:
Precise Discovery of More Taint-Style Vulnerabilities in Embedded Firmware. 1365-1382 - Ryohei Sato

, Hidetoshi Kawaguchi
, Yuichi Nakatani
:
Malcoda: Practical and Stochastic Security Risk Assessment for Enterprise Networks. 1383-1399 - Zeyu Yang

, Liang He
, Yucheng Ruan
, Peng Cheng
, Jiming Chen
:
Unveiling Physical Semantics of PLC Variables Using Control Invariants. 1400-1417 - Abdulaziz Alghamdi

, Ali Al Kinoon
, Ahod Alghuried
, David Mohaisen
:
xr-droid: A Benchmark Dataset for AR/VR and Security Applications. 1418-1430 - Tiantian Zhu

, Jie Ying
, Tieming Chen
, Chunlin Xiong
, Wenrui Cheng
, Qixuan Yuan
, Aohan Zheng, Mingqi Lv
, Yan Chen
:
Nip in the Bud: Forecasting and Interpreting Post- Exploitation Attacks in Real-Time Through Cyber Threat Intelligence Reports. 1431-1447 - Qian Wu

, Lei Zhang
, Yafang Yang
, Kim-Kwang Raymond Choo
:
Certificateless Signature Scheme With Batch Verification for Secure and Privacy-Preserving V2V Communications in VANETs. 1448-1459 - Ning Xi

, Yuchen Zhang
, Pengbin Feng
, Siqi Ma
, Jianfeng Ma
, Yulong Shen
, Yale Yang:
GNNDroid: Graph-Learning Based Malware Detection for Android Apps With Native Code. 1460-1476 - Shiqi Liu

, Xiang Li, Jie Wang
, Yongpeng Gao
, Jiajin Hu
:
MaTEE: Efficiently Bridging the Semantic Gap in TrustZone via Arm Pointer Authentication. 1491-1505 - Xiaoting Lyu

, Yufei Han
, Wei Wang
, Jingkai Liu
, Bin Wang
, Kai Chen
, Yidong Li
, Jiqiang Liu
, Xiangliang Zhang
:
CoBA: Collusive Backdoor Attacks With Optimized Trigger to Federated Learning. 1506-1518 - Minze Xu

, Yuan Zhang
, Sheng Zhong
:
Towards Payment Channel Watchtowers With Collateral-Free Security and Robustness. 1519-1536 - Xiangrui Xu

, Wei Wang
, Zheng Chen, Bin Wang
, Chao Li, Li Duan
, Zhen Han, Yufei Han:
Finding the PISTE: Towards Understanding Privacy Leaks in Vertical Federated Learning Systems. 1537-1550 - Zhihao Wu

, Yushi Cheng
, Xiaoyu Ji
, Wenyuan Xu
:
Multi-Modal Spoofing Attacks on 3D Face Liveness Detection via a Single 2D Photo. 1551-1566 - Hanbo Yu

, Sudipta Acharya
, Steven H. H. Ding
, Mohammad Zulkernine
:
PulseAnomaly: Unsupervised Anomaly Detection on Avionic Platforms With Seasonality and Trend Modeling in Transformer Networks. 1567-1581 - Ruoxi Chen

, Haibo Jin
, Haibin Zheng
, Jinyin Chen
, Zhenguang Liu
:
Fight Perturbations With Perturbations: Defending Adversarial Attacks via Neuron Influence. 1582-1595 - Meiqi Li, Kaiping Xue

, Xinyi Luo, Wentuo Sun, David S. L. Wei
, Qibin Sun
, Jun Lu
:
$S^{3}$S3Voting: A Blockchain Sharding Based E-Voting Approach With Security and Scalability. 1596-1611 - Guorong Chen

, Chao Li
, Wei Wang
, Li Duan
, Bin Wang
, Zhen Han
, Xiangliang Zhang
:
FairReward: Towards Fair Reward Distribution Using Equity Theory in Blockchain-Based Federated Learning. 1612-1626 - Hassan Ali

, Rana Tallal Javed, Adnan Qayyum
, Amer AlGhadhban
, Meshari Alazmi
, Ahmad Alzamil
, Khaled Al-Utaibi
, Junaid Qadir
:
Robust Encrypted Inference in Deep Learning: A Pathway to Secure Misinformation Detection. 1627-1639 - Xingkai Wang

, Zhenfu Cao
, Zhen Liu
, Kaitai Liang
:
MVOC: A Lighter Multi-Client Verifiable Outsourced Computation for Malicious Lightweight Clients. 1640-1654 - Xiaoyu Zhang

, Chao Shen
, Shiqing Ma
, Juan Zhai
, Chenhao Lin
:
An Automated Monitoring and Repairing System for DNN Training. 1655-1673 - Jung Hee Cheon

, Minsik Kang
, Taeseong Kim
, Junyoung Jung
, Yongdong Yeo
:
Batch Inference on Deep Convolutional Neural Networks With Fully Homomorphic Encryption Using Channel-By-Channel Convolutions. 1674-1685 - Jie Gan

, Chaochao Luo
, Wei Shi
, Yuan Liu
, Ximeng Liu
, Zhihong Tian
:
An Attack Exploiting Cyber-Arm Industry. 1686-1702 - Sadegh Torabi

, Dorde Klisura
, Joseph Khoury
, Elias Bou-Harb
, Chadi Assi
, Mourad Debbabi
:
Internet-Wide Analysis, Characterization, and Family Attribution of IoT Malware: A Comprehensive Longitudinal Study. 1703-1716 - Xiaoyu Zhang

, Chenyang Zhang
, Jian Lou
, Kai Wu
, Zilong Wang
, Xiaofeng Chen
:
DuplexGuard: Safeguarding Deletion Right in Machine Unlearning via Duplex Watermarking. 1717-1731 - Xia Zhou

, Yujie Bu, Meng Xu
, Yajin Zhou
, Lei Wu
:
uBOX: A Lightweight and Hardware-Assisted Sandbox for Multicore Embedded Systems. 1732-1746 - Ziad Mansour

, Weihan Ou
, Steven H. H. Ding
, Mohammad Zulkernine
, Philippe Charland
:
NeuroYara: Learning to Rank for Yara Rules Generation Through Deep Language Modeling and Discriminative N-Gram Encoding. 1747-1762 - Rong Du

, Qingqing Ye
, Yue Fu, Haibo Hu
, Kai Huang
:
Top-k Discovery Under Local Differential Privacy: An Adaptive Sampling Approach. 1763-1780 - Meng Xue

, Zhixian Wang
, Qian Zhang
, Xueluan Gong
, Zhihang Liu, Yanjiao Chen
:
Artemis: Defending Against Backdoor Attacks via Distribution Shift. 1781-1795 - Bolin Zhang

, Qilin Yin, Wei Lu
, Xiangyang Luo
:
Deepfake Detection and Localization Using Multi-View Inconsistency Measurement. 1796-1809 - Yulin Wu, Lanxiang Chen

, Gaolin Chen
, Yi Mu
, Robert H. Deng
:
Private Reachability Queries on Structured Encrypted Temporal Bipartite Graphs. 1810-1826 - Hanrui Wang

, Ruoxi Sun
, Cunjian Chen
, Minhui Xue
, Lay-Ki Soon, Shuo Wang, Zhe Jin
:
Iterative Window Mean Filter: Thwarting Diffusion-Based Adversarial Purification. 1827-1844 - Yushan Siriwardhana

, Pawani Porambage
, Madhusanka Liyanage
, Samuel Marchal
, Mika Ylianttila
:
SHIELD - Secure Aggregation Against Poisoning in Hierarchical Federated Learning. 1845-1863
Volume 22, Number 3, May - June 2025
- Yingjiu Li

, Binanda Sengupta
, Yangguang Tian
, Jiaming Yuan
, Tsz Hon Yuen
:
Message Control for Blockchain Rewriting. 1864-1876 - Zhichao You

, Xuewen Dong
, Ximeng Liu
, Sheng Gao
, Yongzhi Wang
, Yulong Shen
:
Location Privacy Preservation Crowdsensing With Federated Reinforcement Learning. 1877-1894 - Jinjiang Yang

, Kaiping Xue
, Feng Liu
, Bin Zhu
, Ruidong Li
, Qibin Sun
, Jun Lu
:
SSE-CTC: Search Over Encrypted Data With Owner-Enforced and Complete Time Constraints. 1895-1907 - Mingming Hu

, Ding Wang
, Chen Li
, Yang Xu, Bibo Tu
:
Behavioral Biometrics-Based Continuous Authentication Using a Lightweight Latent Representation Masked One-Class Autoencoder. 1908-1923 - Peng Huang, Yao Wei, Peng Cheng, Zhongjie Ba, Li Lu, Feng Lin, Yang Wang, Kui Ren:

Phoneme-Based Proactive Anti-Eavesdropping With Controlled Recording Privilege. 1924-1940 - Yang Xu

, Shanshan Zhang, Chen Lyu
, Jia Liu
, Yulong Shen
, Norio Shiratori
:
Mitigating Distributed DoS Attacks on Bandwidth Allocation for Federated Learning in Mobile Edge Networks. 1941-1960 - Sijiang Xie, Rui Shi

, Yang Yang
, Huiqin Xie
, Yingjiu Li
, Robert H. Deng
:
AccCred: Improved Accountable Anonymous Credentials With Dynamic Triple-Hiding Committees. 1961-1975 - Quinn Burke

, Yohan Beugin
, Blaine Hoak
, Rachel King
, Eric Pauley, Ryan Sheatsley
, Mingli Yu
, Ting He
, Thomas F. La Porta
, Patrick D. McDaniel
:
Securing Cloud File Systems With Trusted Execution. 1976-1992 - Syh-Yuan Tan

, Thomas Groß
:
MoniPoly - An Expressive $q$q-SDH-Based Anonymous Attribute-Based Credential System With Constant-Size Proofs. 1993-2010 - Wenli Shang

, Jiayue Lu
, Zhong Cao
, Lei Ding
, Man Zhang, Sha Huan
:
A Tree-Based Scheme to Assess the Safety and Security for Industrial Control Systems. 2011-2021 - Rui Gao

, Zhiguo Wan
, Huaqun Wang
, Shaoteng Luo
:
Invisible Warning Line: Efficient and Generic Regulation for Anonymous Cryptocurrencies. 2022-2036 - Guanxiong Ha

, Xiaowei Ge
, Chunfu Jia
, Yuchen Chen
, Zhen Su
:
Revisiting SGX-Based Encrypted Deduplication via PoW-Before-Encryption and Eliminating Redundant Computations. 2037-2053 - Xiuting Ge, Chunrong Fang

, Xuanye Li, Qirui Zheng, Jia Liu
, Zhihong Zhao, Zhenyu Chen
:
A Large-Scale Empirical Study of Actionable Warning Distribution Within Projects. 2054-2071 - Ziyao Liu

, Yu Jiang
, Weifeng Jiang
, Jiale Guo, Jun Zhao
, Kwok-Yan Lam
:
Guaranteeing Data Privacy in Federated Unlearning With Dynamic User Participation. 2072-2085 - Reza Ebrahimi

, Jason Pacheco
, James Hu, Hsinchun Chen:
Learning Contextualized Action Representations in Sequential Decision Making for Adversarial Malware Optimization. 2086-2102 - Yisong Wang

, Jun Zhou
, Zhenfu Cao
, Xiaolei Dong
, Kim-Kwang Raymond Choo
:
MuEOC: Efficient SGX-Based Multi-Key Homomorphic Outsourcing Computation for E-Health System. 2103-2118 - Anh-Tu Hoang

, Barbara Carminati
, Elena Ferrari
:
ProMark: Ensuring Transparency and Privacy-Awareness in Proximity Marketing Advertising Campaigns. 2119-2131 - Dan Lin

, Jiajing Wu
, Qishuang Fu
, Zibin Zheng
, Ting Chen
:
RiskProp: Account Risk Rating on Ethereum via De-anonymous Score and Network Propagation. 2132-2145 - Hao Ren

, Guowen Xu
, Tianwei Zhang
, Jianting Ning
, Xinyi Huang
, Hongwei Li
, Rongxing Lu
:
Efficiency Boosting of Secure Cross-Platform Recommender Systems Over Sparse Data. 2146-2160 - Xi Xiao

, Shuo Wang
, Guangwu Hu
, Qing Li
, Kelong Mao, Xiapu Luo
, Bin Zhang, Shutao Xia
:
RBLJAN: Robust Byte-Label Joint Attention Network for Network Traffic Classification. 2161-2178 - Youngkwang Han

, Zhenyu Hu, Jongouk Choi
, Kazi Abu Zubair, Amro Awad
, Changhee Jung
, Brent ByungHoon Kang
:
A Novel Efficient Crash Consistency Solution Enabling Rollback Recovery for Secure NVM in Low-Power Energy Harvesting Systems. 2179-2196 - Yanmei Cao

, Jianghong Wei
, Xinyi Huang
, Xiaofeng Chen
, Yang Xiang
:
Deniable Identity-Based Matchmaking Encryption for Anonymous Messaging. 2197-2210 - Xuankai Zhang

, Jianhua Li
, Jun Wu
, Guoxing Chen
, Yan Meng
, Haojin Zhu
, Xiaosong Zhang
:
Binary-Level Formal Verification Based Automatic Security Ensurement for PLC in Industrial IoT. 2211-2226 - Xiuhua Wang

, Mengyang Yu, Yaohui Wang
, Yinjia Pi, Peng Xu
, Shuai Wang
, Hai Jin
, Min Han:
Attribute-Based Access Control Encryption. 2227-2242 - Zhongzheng Lai

, Huaming Chen
, Ruoxi Sun
, Yu Zhang
, Minhui Xue, Dong Yuan
:
On Security Weaknesses and Vulnerabilities in Deep Learning Systems. 2243-2257 - Dimitry Solet

, Jean-Luc Béchennec
, Mikaël Briday
, Sébastien Faucou
, Sébastien Pillement
:
A Study in Specification and Hardware Runtime Verification of Critical Embedded Software. 2258-2269 - Pemma Reiter

, Hui Jun Tay, Westley Weimer
, Adam Doupé
, Ruoyu Wang
, Stephanie Forrest
:
Automatically Mitigating Vulnerabilities in Binary Programs via Partially Recompilable Decompilation. 2270-2282 - Benjamin Dowling

, Bhagya Wimalasiri
:
Quantum-Secure Hybrid Communication for Aviation Infrastructures. 2283-2294 - Shiyu Shen

, Hao Yang
, Wenqian Li, Yunlei Zhao
:
cuML-DSA: Optimized Signing Procedure and Server-Oriented GPU Design for ML-DSA. 2295-2307 - Daniele Bringhenti

, Simone Bussa
, Riccardo Sisto
, Fulvio Valenza
:
Atomizing Firewall Policies for Anomaly Analysis and Resolution. 2308-2325 - Yang Liu

, Debiao He
, Min Luo
, Lianhai Wang
, Cong Peng
:
$k$k-TEVS: A $ k$k-Times E-Voting Scheme on Blockchain With Supervision. 2326-2337 - Yihuai Liang

, Yan Li
, Byeong-Seok Shin
:
Privacy-Preserving and Reliable Truth Discovery for Heterogeneous Fog-Based Crowdsensing. 2338-2351 - Haiyang Luo

, Zhe Sun
, Yunqing Sun, Ang Li, Binghui Wang
, Jin Cao
, Ben Niu:
Recipient-Aware Photo Automatic Deletion Control Policy Recommendation Scheme in Online Social Networks. 2352-2366 - Lei Xue

, Yuxiao Yan, Qiyi Tang, Le Yu, Xiapu Luo
, Zhiqiang Cai, Sen Nie, Shi Wu, Guofei Gu
, Chenxu Wang
:
Update If You Dare: Demystifying Bare-Metal Device Firmware Update Security of Appified IoT Systems. 2367-2384 - Arash Mirzaei

, Amin Sakzad
, Jianhshan Yu
, Ron Steinfeld
:
Formal Treatment of Watchtowers and FPPW: A Fair and Privacy-Preserving Bitcoin Watchtower. 2385-2397 - Shuoyao Zhao

, Yu Yu
, Hanlin Liu
, Jiang Zhang
, Wenling Liu, Zhenkai Hu
:
Improving the Efficiency of Private Function Evaluation via Optimized Universal Circuits. 2398-2412 - Yuang Qi

, Kejiang Chen
, Kai Zeng
, Weiming Zhang
, Nenghai Yu
:
Provably Secure Disambiguating Neural Linguistic Steganography. 2430-2442 - Shicheng Zhou

, Jingju Liu
, Yuliang Lu
, Jiahai Yang
, Dongdong Hou
, Yue Zhang
, Shulong Hu:
APRIL: Towards Scalable and Transferable Autonomous Penetration Testing in Large Action Space via Action Embedding. 2443-2459 - Yang Gao

, Jun Tao
, Yifan Xu
, Rujie Chen:
Efficient Privacy-Preserving Routing in OppNets With Probability Model and Discrete Optimization. 2460-2477 - Beining Wang

, Kun He
, Yingying Huang
, Jing Chen
, Chenbin Zhao
, Ruiying Du
:
Forward Secure Similarity Search Over Encrypted Data for Hamming Distance. 2478-2491 - Surudhi Asokraj

, Tommaso Bianchi
, Alessandro Brighente
, Mauro Conti
, Radha Poovendran
:
Identity-Based Authentication for On-Demand Charging of Electric Vehicles. 2492-2504 - Dongyang Zhan

, Wenqi Zhang, Lin Ye
, Xiangzhan Yu, Hongli Zhang
, Zheng He:
Anomaly Detection in Industrial Control Systems Based on Cross-Domain Representation Learning. 2505-2518 - Xinyi Sheng

, Zhengjie Yang
, Wei Bao
:
FairGuard: A Fairness Attack and Defense Framework in Federated Learning. 2519-2532 - Xinxin Xing

, Yizhong Liu
, Qianhong Wu
, Zhenyu Guan
, Dongyu Li
, Dawei Li
, Yuan Lu
, Willy Susilo
:
Multi-Committee ABE Based Decentralized Access Control With Sharding Blockchain for Web 3.0. 2533-2549 - Weiqi Wang

, Chenhan Zhang
, Zhiyi Tian
, Shui Yu
:
FedU: Federated Unlearning via User-Side Influence Approximation Forgetting. 2550-2562 - Pinchang Zhang

, Yulin Teng
, Mu Niu, Xiaohong Jiang
, Fu Xiao
:
Physical Layer Authentication Utilizing Beam Pattern Features in Millimeter-Wave MIMO Systems. 2563-2578 - Tianyuan Hu

, Jingyue Li
, Bixin Li
, André Storhaug
:
Why Smart Contracts Reported as Vulnerable Were Not Exploited? 2579-2596 - Zitong Yu

, Rizhao Cai
, Yawen Cui
, Ajian Liu
, Changsheng Chen
:
Visual Prompt Flexible-Modal Face Anti-Spoofing. 2597-2606 - Ning Wang

, Chaoyu Zhang
, Yang Xiao
, Yimin Chen
, Wenjing Lou
, Y. Thomas Hou
:
FLARE: Defending Federated Learning Against Model Poisoning Attacks via Latent Space Representations. 2607-2623 - Xin Yin

, Zhen Liu
, Guomin Yang
, Guoxing Chen
, Haojin Zhu
:
HDWSA$^{2}$2: A Secure Hierarchical Deterministic Wallet Supporting Stealth Address and Signature Aggregation. 2624-2641 - Meng Li

, Yifei Chen
, Jianbo Gao
, Jingyu Wu, Zijian Zhang
, Jialing He
, Liehuang Zhu
, Mauro Conti
, Xiaodong Lin
:
Accurate, Secure, and Efficient Semi-Constrained Navigation Over Encrypted City Maps. 2642-2658 - Peng Ye

, Zhifeng Jiang
, Wei Wang
, Bo Li
, Baochun Li
:
Feature Reconstruction Attacks and Countermeasures of DNN Training in Vertical Federated Learning. 2659-2669 - Tao Huang

, Yansong Gao
, Yifeng Zheng
, Zhanfeng Wang, Chao Hu, Anmin Fu
:
FineBID: Fine-Grained Protocol Reverse Engineering for Bit-Level Field IDentification. 2670-2686 - Ziqi Yang

, Yiran Zhu, Jie Wan
, ChuXiao Xiang, Tong Tang, Yilin Wang, Ruite Xu, Lijin Wang, Fan Zhang
, Jiarong Xu
, Zhan Qin
:
Defending Data Inference Attacks Against Machine Learning Models by Mitigating Prediction Distinguishability. 2687-2704 - Yizhong Liu

, Peiyuan Li, Dongyu Li
, Chengqi Wu, Nan Jiang, Qianhong Wu
, Ankit Gangwal
, Prayag Tiwari
, Mauro Conti
:
SharHSC: A Sharding-Based Hybrid State Channel to Realize Blockchain Scalability and Security. 2705-2722 - Zhongkai Lu

, Lingling Wang
, Zhengyin Zhang
, Mei Huang
, Jingjing Wang
, Meng Li
:
TMT-FL: Enabling Trustworthy Model Training of Federated Learning With Malicious Participants. 2723-2740 - Xiaojie Zhu

, Jiancong Zhou
, Yueyue Dai
, Peisong Shen
, Shabnam Kasra Kermanshahi, Jiankun Hu
:
A Verifiable and Efficient Symmetric Searchable Encryption Scheme for Dynamic Dataset With Forward and Backward Privacy. 2741-2755 - Jiaqi Li

, Yajin Zhou
, Lei Wu
:
Improving Multitasking DBMS Fuzzing With More Accurate Coverage and Testcase Trimming. 2756-2770 - Bobiao Guo

, Ping Ping
, Feng Xu
:
Highly Robust and Diverse Coverless Image Steganography Against Passive and Active Steganalysis. 2771-2787 - Yuke Hu

, Yang Wang, Jian Lou, Wei Liang
, Ruofan Wu, Weiqiang Wang, Xiaochen Li
, Jinfei Liu
, Zhan Qin
:
Privacy Risks of Federated Knowledge Graph Embedding: New Membership Inference Attacks and Personalized Differential Privacy Defense. 2788-2805 - Gao Liu

, Hao Li
, Ning Wang
, Biwen Chen
, Junqing Le
, Yining Liu
, Tao Xiang
:
PECHA: Privacy-Preserving and Efficient Cross-Domain Handover Authentication for Heterogeneous Networks. 2806-2822 - Wenbo Jiang

, Hongwei Li
, Guowen Xu
, Hao Ren
, Haomiao Yang
, Tianwei Zhang
, Shui Yu
:
Rethinking the Design of Backdoor Triggers and Adversarial Perturbations: A Color Space Perspective. 2823-2840 - Ziqi Sheng, Zuomin Qu

, Wei Lu
, Xiaochun Cao
, Jiwu Huang
:
DiRLoc: Disentanglement Representation Learning for Robust Image Forgery Localization. 2841-2854 - Dan Tang

, Boru Liu
, Keqin Li
, Sheng Xiao
, Wei Liang
, Jiliang Zhang
:
PLUTO: A Robust LDoS Attack Defense System Executing at Line Speed. 2855-2872 - Tolga O. Atalay

, Sudip Maitra, Dragoslav Stojadinovic, Angelos Stavrou
, Haining Wang
:
An OpenRAN Security Framework for Scalable Authentication, Authorization, and Discovery of xApps With Isolated Critical Services. 2873-2890 - Wei Yang

, Weilin Chen
, Lide Xue
, Wenjie Zou, Liusheng Huang
:
EZchain: A Secure Scalable Blockchain Protocol via Passive Sharding. 2891-2908 - Xiongpeng Ren

, Jin Cao
, Ben Niu
, Lu Gan, Yinghui Zhang
, Lihui Xiong
, Yurong Luo
, Hui Li
:
A Formal Analysis of 5G ProSe AKA Protocols for U2N Relay Communication. 2909-2924 - Liu Liu

, Xinwen Fu
, Xiaodong Chen, Jianpeng Wang, Zhongjie Ba
, Feng Lin
, Li Lu
, Kui Ren
:
ACL: Account Linking in Online Social Networks With Robust Camera Fingerprint Matching. 2925-2942 - Jiachun Li

, Yan Meng
, Le Zhang, Guoxing Chen
, Yuan Tian
, Haojin Zhu
:
A Magnetic Signal Based Device Fingerprinting Scheme in Wireless Charging. 2943-2958 - Rui Duan

, Zhe Qu
, Shangqing Zhao
, Leah Ding
, Yao Liu
, Zhuo Lu
:
Perception-Aware Attack Against Music Copyright Detection: Impacts and Defenses. 2959-2977 - Xiaozhen Lu

, Liang Xiao
, Yilin Xiao
, Zehui Xiong
, Zhe Liu
, Yanyong Zhang
, Weihua Zhuang
:
Blockchain-Enabled Secure Offloading for VEC: A Multi-Agent Reinforcement Learning Approach. 2978-2995 - Ke Wang

, Ye Yao
, Yanzhao Shen
, Fengjun Xiao
, Yizhi Ren
, Weizhi Meng
:
High Capacity Reversible Data Hiding in Encrypted 3D Mesh Models Based on Dynamic Prediction and Virtual Connection. 2996-3010 - Juan Hu

, Jinwen Liang
, Zheng Qin
, Xin Liao
, Wenbo Zhou
, Xiaodong Lin
:
ADA-FInfer: Inferring Face Representations From Adaptive Select Frames for High-Visual-Quality Deepfake Detection. 3011-3027 - Mingkuan Wei

, Jigang Wen
, Shiming He
, Kun Xie
, Wei Liang
, Gaogang Xie
, Kenli Li
, Ziyu Zhu:
TCMS: A Multi-Sequence Log Parsing Method Based on Token Conversion. 3028-3045 - Ding Li

, Jifan Xiao
, Peng Jiang, Jiaping Gui
, Dongjin Song
, Yun Ma
, Gang Huang
, Xuanzhe Liu
:
ProvAudit: Enhance High-Level Privacy Inference Through System Provenance Data. 3046-3062 - Mariano López-García

, David G. Farouk-Marei
, Enrique F. Cantó-Navarro
:
Converting Fixed-Length Binary Strings Into Constant Weight Words: Application on Post-Quantum Cryptography. 3063-3074 - Chenkai Guo

, Tianhong Wang
, Qianlu Wang
, Naipeng Dong
, Xiangyang Luo
, Zheli Liu
:
Fratricide! Hijacking in Android Multi-Window. 3075-3092 - Rui Zhang

, Xiaoyang Hou
, Zhihua Tian
, Yan He, Enchao Gong, Jian Liu
, Qingbiao Wu
, Kui Ren
:
Attributed Graph Clustering in Collaborative Settings. 3093-3104 - Jie Yin

, Yang Xiao
, Jie Feng
, Mengmeng Yang
, Qingqi Pei
, Xun Yi
:
DidTrust: Privacy-Preserving Trust Management for Decentralized Identity. 3105-3120 - Weiyuan Tong

, Zhanyong Tang
, Zixu Wang, Huanting Wang
, Guixin Ye
, Shuangjiao Zhai, Zheng Wang
:
Scenario: User-Device Authentication on Smart IoTs Using Commodity RFID. 3121-3136 - Josep Domingo-Ferrer

, Krishnamurty Muralidhar
, Sergio Martínez
:
Synthetic Data Generation via the Permutation Paradigm With Optional $k$k-Anonymity. 3155-3165 - Yijian Zhang

, Jie Chen
, Jianting Ning
, Qiaohan Chu
, Luping Wang
, Guang Zhang
:
Flexible Privacy-Preserving Data Computing With Bilateral Access Control for Cloud-Assisted IoT. 3166-3178 - Yuhui Li

, Wei Liang
, Kun Xie
, Da-Fang Zhang
, Kuanching Li, Neal N. Xiong
:
EventMon: Real-Time Event-Based Streaming Network Monitoring Data Recovery. 2413-2429 - Jiahao Liu, Yi Wang

, Xincheng Tang, Rongmao Chen
, Xinyi Huang
, Jinshu Su
:
srTLS: Secure TLS Handshake on Corrupted Machines. 3137-3154
Volume 22, Number 4, July - August 2025
- Hongwei Yao

, Zheng Li, Haiqin Weng, Feng Xue, Zhan Qin
, Kui Ren
:
FDINet: Protecting Against DNN Model Extraction Using Feature Distortion Index. 3179-3191 - Peijia Zheng

, Xiongjie Fang, Zhipeng Zhou, Rui Yang, Wei Lu
, Xiaochun Cao
, Jiwu Huang
:
Accurate and Efficient Privacy-Preserving Feature Extraction on Encrypted Images. 3192-3207 - Xiaohan Zhang, Zhiyuan Yu

, Xinghua Li
, Cen Zhang
, Cong Sun
, Ning Zhang
, Robert H. Deng
:
Understanding the Bad Development Practices of Android Custom Permissions in the Wild. 3208-3223 - Guorong Chen

, Wei Wang
, Yufang Wu, Chao Li
, Guangquan Xu
, Shouling Ji
, Tao Li
, Meng Shen
, Yufei Han
:
RobustPFL: Robust Personalized Federated Learning. 3224-3239 - Alaa Oqaily

, Mohammad Ekramul Kabir
, Lingyu Wang
, Yosr Jarraya
, Suryadipta Majumdar
, Makan Pourzandi
, Mourad Debbabi
, Sudershan Lakshmanan Thirunavukkarasu
, Mengyuan Zhang
:
Cross-Level Security Verification for Network Functions Virtualization (NFV). 3240-3258 - Shuchao Pang

, Yihang Rao, Zhigang Lu
, Haichen Wang, Yongbin Zhou
, Minhui Xue
:
PriDM: Effective and Universal Private Data Recovery via Diffusion Models. 3259-3274 - Fangming Dong

, Pinghui Wang
, Rundong Li
, Xueyao Cui, Junzhou Zhao
, Jing Tao, Chen Zhang
, Xiaohong Guan
:
Poisoning Attacks and Defenses to Learned Bloom Filters for Malicious URL Detection. 3275-3288 - Petar Paradzik

, Ante Derek
, Marko Horvat
:
Formal Security Analysis of the AMD SEV-SNP Software Interface. 3289-3306 - Ziwei Liu

, Feng Lin
, Zhongjie Ba
, Li Lu
, Kui Ren
:
MagShadow: Physical Adversarial Example Attacks via Electromagnetic Injection. 3307-3323 - Qingyu Zhang

, Jiayi Lin, Chenxin Sun
, Chenxiong Qian
, Xiapu Luo
:
CherryPicker: A Parallel Solving and State Sharing Hybrid Fuzzing System. 3324-3336 - Yi Zhao

, Bingyang Liu
, Weiyu Jiang, Ke Xu
, Qi Li
, Chuang Wang, Zongxin Dou, Yanjun Liu:
Pisces: In-Path Distributed Denial-of-Service Defense via Efficient Authentication Code Embedded in IP Address. 3337-3353 - Boyang Ma

, Linxuan Zhou
, Chong Liao
, Yajin Zhou
, Jinku Li
, Jianfeng Ma
:
RansomSentry: Runtime Detection of Android Ransomware With Compiler-Based Instrumentation. 3354-3370 - Yuxian Huang

, Geng Yang
, Dong Yuan
, Shui Yu
:
DBSSL: A Scheme to Detect Backdoor Attacks in Self-Supervised Learning Models. 3371-3382 - Bowen Li

, Hanlin Gu
, Ruoxin Chen
, Jie Li
, Chentao Wu
, Na Ruan
, Xueming Si, Lixin Fan
:
Temporal Gradient Inversion Attacks With Robust Optimization. 3383-3397 - Dayong Ye

, Tianqing Zhu
, Kun Gao, Congcong Zhu
, Wanlei Zhou
:
Cooperating or Kicking Out: Defending Against Poisoning Attacks in Federated Learning via the Evolution of Cooperation. 3398-3414 - Chenhao Wang

, Yang Ming
, Hang Liu
, Jie Feng
, Mengmeng Yang
, Yang Xiang
:
Blockchain-Assisted Privacy-Preserving and Synchronized Key Agreement for VDTNs. 3415-3430 - Laura Carnevali

, Stefania Cerboni
, Leonardo Montecchi
, Enrico Vicario
:
FaultFlow: An MDE Library for Dependability Evaluation of Component-Based Systems. 3431-3448 - Marco Venturini, Francesco Freda, Emanuele Miotto

, Mauro Conti
, Alberto Giaretta
:
Differential Area Analysis for Ransomware: Attacks, Countermeasures, and Limitations. 3449-3464 - Jinghao Hu

, Jinsong Guo
, Chen Luo
, Yang Hu
, Matthias Lanzinger
, Zhanshan Li
:
Enabling Generalized Zero-Shot Vulnerability Classification. 3465-3482 - Ming Xu

, Shenghao Zhang, Kai Zhang
, Haodong Zhang, Junjie Zhang
, Jitao Yu, Luwei Cheng, Weili Han
:
Using Parallel Techniques to Accelerate PCFG-Based Password Cracking Attacks. 3483-3496 - Zhirun Zheng

, Zhetao Li
, Saiqin Long
, Suiming Guo
, Chao Chen
, Ke Xu
:
Pricing Utility vs. Location Privacy: A Differentially Private Data Sharing Framework for Ride-on-Demand Services. 3497-3513 - Ziwei Zhang

, Juan Wen
, Liting Gao
, Wanli Peng
, Yiming Xue
:
Linguistic Steganalysis Based on Few-Shot Adversarial Training. 3514-3528 - Haonan Yan

, Chengbo Zheng
, Qian Chen
, Xiaoguang Li
, Bin Wang
, Hui Li
, Xiaodong Lin
:
A Proactive Defense Against Model Poisoning Attacks in Federated Learning. 3529-3543 - R. Vaitheeshwari

, Eric Hsiao-Kuang Wu
, Ying-Dar Lin
, Ren-Hung Hwang
, Po-Ching Lin
, Yuan-Cheng Lai
, Asad Ali
:
TRACE: Relationship Analysis and Causal Factor Extraction in Cyber Threat Intelligence Reports. 3544-3560 - Amirhossein Taherpour

, Xiaodong Wang
:
A High-Throughput and Secure Coded Blockchain for IoT. 3561-3579 - Wenjie Xiong

, Liu Ke
, Maxim Ostapenko
, Yongmin Tai
, Yeongon Cho
, Joon-Ho Song
, Jinin So
, Kyungsoo Kim
, Yongsuk Kwon
, Jin Jung, Jieun Lee, Byeongho Kim, Shinhaeng Kang
, Sukhan Lee, Jeonghyeon Cho, Kyomin Sohn
, Xuan Zhang
, Hsien-Hsin S. Lee
, G. Edward Suh
:
Accelerating Confidential Recommendation Model Inference With Near-Memory Processing. 3580-3586 - Hengzhi Wang

, Minghe Ma, Laizhong Cui
, Jiangchuan Liu
:
Towards Integrated Spatial Crowdsourcing: Online Privacy-Preserving Selection. 3587-3601 - Soohyeon Choi

, David Mohaisen
:
Attributing ChatGPT-Generated Source Codes. 3602-3615 - Jiajia Jiang

, Yushu Zhang
, Jiahao Zhao
, Longxiang Gao
, Liehuang Zhu
, Zhihong Tian
:
Towards Efficient Consistency Auditing of Dynamic Data in Cross-Chain Interaction. 3616-3628 - Ju Jia

, Renjie Li, Cong Wu
, Siqi Ma
, Lina Wang
, Robert H. Deng
:
SIGFinger: A Subtle and Interactive GNN Fingerprinting Scheme Via Spatial Structure Inference Perturbation. 3629-3646 - You Wu

, Xuehai Qian:
Low-Overhead Reversible Coherence Protocol. 3647-3660 - Zehang Deng

, Ruoxi Sun
, Minhui Xue
, Sheng Wen
, Seyit Camtepe
, Surya Nepal
, Yang Xiang
:
Leakage-Resilient and Carbon-Neutral Aggregation Featuring the Federated AI-Enabled Critical Infrastructure. 3661-3675 - Elvira Albert

, Samir Genaim
, Daniel Kirchner
, Enrique Martin-Martin
:
Secure Optimizations on Ethereum Bytecode Jump-Free Sequences. 3676-3691 - Mojtaba Zaheri

, Yossi Oren, Reza Curtmola
:
Contention-Based Side Channels Enable Faster and Stealthier Browsing History Sniffing. 3692-3707 - Luoyu Chen

, Weiqi Wang
, Zhiyi Tian
, Chenhan Zhang
, Shui Yu
:
Backdoored Sample Cleansing for Unlabeled Datasets via Bootstrapped Dual Set Purification. 3708-3722 - Chenyang Chen

, Xiaoyu Zhang
, Shen Lin
, Xiaofeng Chen
:
MPGStack: Membership Privacy Protection on Graph Data via Model Stacking. 3723-3736 - Minjie Wang, Jianyu Niu

, Fangyu Gai
, Mohammad M. Jalalzai
, Yinqian Zhang
, Chen Feng
:
Chained HotStuff Under Performance Attack. 3737-3750 - Haotian Wu

, Zhe Peng
, Jiang Xiao
, Lei Xue
, Chenhao Lin
, Sai-Ho Chung
:
HeX: Encrypted Rich Queries With Forward and Backward Privacy Using Trusted Hardware. 3751-3765 - Xiaoyu Zhang

, Hong Zhong
, Jie Cui
, Irina Bolodurina
, Chengjie Gu
, Debiao He
:
LSHSC: Lightweight and Secure Handover Scheme With Conditional Privacy-Preserving for Group-Based SDVN. 3766-3779 - Honghong Zeng

, Jiong Lou
, Kailai Li
, Chentao Wu
, Guangtao Xue
, Yuan Luo
, Fan Cheng
, Wei Zhao
, Jie Li
:
ESFL: Accelerating Poisonous Model Detection in Privacy-Preserving Federated Learning. 3780-3794 - Zeqing He

, Zhibo Wang
, Xiaowei Dong
, Peng Sun
, Ju Ren
, Kui Ren
:
Towards Fair Federated Learning via Unbiased Feature Aggregation. 3795-3807 - Jione Choi

, Junghee Lee
, Gyuho Lee, Jaegwan Yu, Aran Park, Chrysostomos Nicopoulos
:
MultiFile View: File-View-Based Isolation in a Single-User Environment to Protect User Data Files. 3808-3823 - Shigen Shen

, Chenpeng Cai
, Yizhou Shen, Xiaoping Wu
, Wenlong Ke
, Shui Yu
:
Joint Mean-Field Game and Multiagent Asynchronous Advantage Actor-Critic for Edge Intelligence-Based IoT Malware Propagation Defense. 3824-3838 - Minze Xu

, Yue Li, Chenglu Shi, Yuan Zhang
, Yongchuan Niu
, Fengyuan Xu
, Sheng Zhong
:
OPRE: Towards Better Availability of PCNs Through Recovering. 3839-3855 - Ruidong Han

, Juanru Li
, Zhuo Ma
, David Lo
, Arash Shaghaghi
, Jianfeng Ma
, Siqi Ma
:
Hotpatching on the Fly - Mitigating Drone Incidents Arising From Incorrect Configuration. 3856-3867 - Jiahui Wu

, Weizhe Zhang
, Fucai Luo
:
ESAFL: Efficient Secure Additively Homomorphic Encryption for Cross-Silo Federated Learning. 3868-3884 - Aqib Rashid

, Jose Such
:
Effectiveness of Moving Target Defenses for Adversarial Attacks in ML-Based Malware Detection. 3885-3900 - Yang Yang

, Yanjiao Chen
, Ping Xiong
, Fei Chen
, Jing Chen
:
Decentralized Self-Auditing Multiple Cloud Storage in Compressed Provable Data Possession. 3901-3915 - Weiqi Wang

, Chenhan Zhang
, Zhiyi Tian
, Shushu Liu
, Shui Yu
:
CRFU: Compressive Representation Forgetting Against Privacy Leakage on Machine Unlearning. 3916-3929 - Zhiwei Wang

, Siu-Ming Yiu
, Longwen Lan
:
Multi-Signature and Game Based Blockchain Interoperability Oracle. 3930-3943 - Lizhi Xiong

, Wenhao Zhou, Zhihua Xia
, Jian Weng
:
A Universal Framework for Reversible Data Hiding in Encrypted Images With Multiple Hiders. 3944-3959 - Man Zhang

, Xinghua Li
, Bin Luo
, Yanbing Ren
, Yinbin Miao
, Ximeng Liu
, Robert H. Deng
:
An Incentive Mechanism for Privacy Preserved Data Trading With Verifiable Data Disturbance. 3960-3976 - Keke Gai

, Yunwei Guo, Jing Yu
, Weilin Chan, Liehuang Zhu
, Yinqian Zhang
, Weizhi Meng
:
CAPE: Commitment-Based Privacy-Preserving Payment Channel Scheme in Blockchain. 3977-3992 - Peng Tang

, Xiaoyu Zhu
, Weidong Qiu
, Zheng Huang, Zhenyu Mu, Shujun Li
:
FLAD: Byzantine-Robust Federated Learning Based on Gradient Feature Anomaly Detection. 3993-4009 - Ruoyu Zhao

, Yushu Zhang
, Jun Mou
, William Puech
, Jian Weng
:
Lossless and Universal 3D Object Encryption With Differentiated Visual Effects Upon Decryption: A Novel Paradigm. 4010-4021 - Mauro Conti

, Jiaxin Li
, Stjepan Picek
:
On the Vulnerability of Data Points Under Multiple Membership Inference Attacks and Target Models. 4022-4039 - Guowen Xu

, Shengmin Xu
, Jianting Ning
, Xinyi Huang
, Hongwei Li
, Rongxing Lu
:
New Secure Sparse Inner Product With Applications to Machine Learning. 4040-4052 - Xuewen Dong

, Jiachen Li, Shujun Li
, Zhichao You
, Qiang Qu
, Yaroslav Kholodov, Yulong Shen
:
Adaptive Backdoor Attacks With Reasonable Constraints on Graph Neural Networks. 4053-4069 - Yuyang Zhou

, Liang Zhao
, Fagen Li
, Tsuyoshi Takagi:
Exfiltration-Resistant Proxy Re-Encryption for IoT Data Sharing in Unreliable Clouds. 4070-4085 - Zhenyu Chen

, Lin Yao
, Haibo Hu
, Guowei Wu
:
$\eta$η-Inference: A Data-Aware and High-Utility Privacy Model for Relational Data Publishing. 4086-4102 - Lei Zhang

, Jianfeng Wang
, Jiaojiao Wu
, Yunling Wang
, Shifeng Sun
:
Violin: Powerful Volumetric Injection Attack Against Searchable Encryption With Optimal Injection Size. 4103-4115 - Jordan Ortega-Rodríguez

, José Francisco Gómez González
, Ernesto Pereda de Pablo
:
Biometric Identification Based on EEG Using Fuzzy Logic: A Novel Approach with Metaheuristic Optimization. 4116-4125 - Jianfei Sun

, Guowen Xu
, Hongwei Li
, Tianwei Zhang
, Cong Wu
, Xuehuan Yang, Robert H. Deng
:
Sanitizable Cross-Domain Access Control With Policy-Driven Dynamic Authorization. 4126-4142 - Xiangli Xiao

, Yushu Zhang
, Zhongyun Hua
, Zhihua Xia
, Jian Weng
:
Preview Helps Selection: Previewable Image Watermarking With Client-Side Embedding. 4143-4159 - Abdulrahman Abu Elkhail

, Anys Bacha
, Hafiz Malik
:
Sniper: Countering Locker Ransomware Attacks Through Natural Language Processing. 4160-4175 - Yilong Yang

, Zhuo Ma
, Yihua Li, Yang Liu
, Xinjing Liu
, Jianfeng Ma
:
S-Teapot: Swift and Efficient Defense Against Patch-Based Backdoor Attack. 4176-4188 - Xinjian Chen

, Jianye Huang
, Kaifeng Xiao
, Hongbo Li
, Qiong Huang
:
A Non-Interactive Identity-Based Multi-Signature Scheme on Lattices With Public Key Aggregation. 4189-4199 - Shenshen Chen

, Jian Luo
, Dong Guo, Kai Gao
, Yang Richard Yang
:
Fast Inverse Model Transformation: An Algebraic Framework for Fast Data Plane Verification. 4200-4214 - Ning Wang

, Shanghao Shi
, Yimin Chen
, Wenjing Lou
, Y. Thomas Hou
:
FeCo: Boosting Intrusion Detection Capability in IoT Networks via Contrastive Learning. 4215-4230 - Liming Zhai

, Lina Wang
, Yanzhen Ren
, Yang Liu
:
Generalized Local Optimality for Video Steganalysis in Motion Vector Domain. 4231-4247 - Wassim Itani

, Maha Shamseddine
, Auday Al-Dulaimy
, Thomas Nolte, Alessandro V. Papadopoulos
:
dcGuard: A Holistic Approach for Detecting and Isolating Malicious Nodes in Cloud Data Centers. 4248-4265 - Kang-Di Lu

, Jia-Cheng Huang
, Guo-Qiang Zeng
, Min-Rong Chen
, Guang-Gang Geng
, Jian Weng
:
Multi-Objective Discrete Extremal Optimization of Variable-Length Blocks-Based CNN by Joint NAS and HPO for Intrusion Detection in IIoT. 4266-4283 - Shaoxian Yuan

, Kaiping Xue
, Bin Zhu
, Jingcheng Zhao
, Yaxuan Huang, Yuandong Xie, David S. L. Wei
:
Enabling Accurate and Efficient Privacy-Preserving Truth Discovery for Sparse Crowdsensing. 4284-4299 - Dongpeng Hou

, Chao Gao
, Zhen Wang
, Xuelong Li
:
FGSSI: A Feature-Enhanced Framework With Transferability for Sequential Source Identification. 4300-4314 - Ali Aljofey

, Saifullahi Aminu Bello
, Jian Lu
, Chen Xu
:
BERT-PhishFinder: A Robust Model for Accurate Phishing URL Detection With Optimized DistilBERT. 4315-4329 - Shujuan Tian

, Yi Tan
, Han Wang
, Haolin Liu
, Zhetao Li
:
ASDIA: An Adversarial Sample to Preserve Privacy Program in Federated Learning. 4330-4343 - Hui Sun

, Tianqing Zhu
, Jie Li
, Wanlei Zhou
:
Average and Strict GAN-Based Reconstruction for Adversarial Example Detection. 4344-4361 - Keke Gai

, Guolei Zhang, Peng Jiang
, Liehuang Zhu
, Kim-Kwang Raymond Choo
:
A Moving Target DDoS Defense Approach in Consortium Blockchain. 4362-4378 - Hao Zeng

, Helei Cui
, Man Li
, Bo Zhang
, Chengjun Cai
, Zhiwen Yu
, Bin Guo
:
Decentralized and Fair Trading Via Blockchain: The Journey So Far and the Road Ahead. 4379-4397 - Chao Feng

, Alberto Huertas Celdrán
, Pedro Miguel Sánchez Sánchez
, Jan Kreischer
, Jan von der Assen, Gérôme Bovet
, Gregorio Martínez Pérez
, Burkhard Stiller
:
CyberForce: A Federated Reinforcement Learning Framework for Malware Mitigation. 4398-4411 - Longfei Chen

, Hao Wang
, Yuchen Zhou
, Taiyu Wong
, Jialai Wang
, Chao Zhang
:
SmartTrans: Advanced Similarity Analysis for Detecting Vulnerabilities in Ethereum Smart Contracts. 4412-4427 - Yangde Wang

, Weidong Qiu
, Peng Tang
, Hao Tian, Shujun Li
:
SE#PCFG: Semantically Enhanced PCFG for Password Analysis and Cracking. 4428-4441 - Zhaoxia Yin

, Shaowei Zhu
, Hang Su
, Jianteng Peng, Wanli Lyu, Bin Luo
:
Adversarial Examples Detection With Enhanced Image Difference Features Based on Local Histogram Equalization. 4442-4455 - Junwei Zhou

, Shaowen Ying
, Shulan Wang
, Dongdong Zhao
, Jianwen Xiang
, Kaitai Liang
, Peng Liu
:
LogDLR: Unsupervised Cross-System Log Anomaly Detection Through Domain-Invariant Latent Representation. 4456-4471 - Dayong Ye

, Huiqiang Chen
, Shuai Zhou
, Tianqing Zhu
, Wanlei Zhou
, Shouling Ji
:
Model Inversion Attack Against Transfer Learning: Inverting a Model Without Querying It. 4472-4487
Volume 22, Number 5, September - October 2025
- Bowen Li

, Yunjie Ge
, Zheng Fang
, Tao Wang
, Lingchen Zhao
, Quan Lu, Ning Jiang, Qian Wang
:
CuckooAttack: Towards Practical Backdoor Attack against Automatic Speech Recognition Systems. 4488-4502 - Xiaoming Liu

, Hang Pu, Zhuo Chen, Zhanwei Zhang, Yu Lan
, Chao Shen
:
EvolGCN: A Co-Evolutionary Graph Convolutional Network Model for Dynamically Spatio-Temporal Anomaly Event Inference. 4503-4515 - Jianan Huang

, Weiwei Liu
, Guangjie Liu
, Bo Gao
, Fengyuan Nie
:
QuicCourier: Leveraging the Dynamics of QUIC- Based Website Browsing Behaviors Through Proxy for Covert Communication. 4516-4533 - Jinwen Liang

, Song Guo
, Zicong Hong
, Enyuan Zhou
, Chuan Zhang
, Bin Xiao
:
SecPQ: Secure Prediction Queries on Encrypted Outsourced Databases. 4534-4548 - Xueluan Gong

, Bowei Tian, Meng Xue
, Yuan Wu
, Yanjiao Chen
, Qian Wang
:
An Effective and Resilient Backdoor Attack Framework Against Deep Neural Networks and Vision Transformers. 4549-4564 - Zhili Zhou

, Ching-Nung Yang
, Shaowei Wang
, Guoshun Nan
, Stelvio Cimato
, Yifeng Zheng
, Qian Wang
:
Google Map-Based Password Authentication Systems Using Tolerant Distance and Homomorphic Encryption. 4565-4579 - Raffaele Giannessi

, Fabrizio Tronci
, Alessandro Biondi
:
Hazardous Behavior Analysis for Complex Pre-Existing Software in Safety-Critical Context: Approach and Application to the Linux Dynamic Memory Allocator. 4580-4592 - Ru Li, Jie Cui

, Jing Zhang
, Lu Wei
, Hong Zhong
, Debiao He
:
Blockchain-Assisted Revocable Cross-Domain Authentication for Vehicular Ad-Hoc Networks. 4593-4606 - Xiyue Zhang

, Xiaoyong Xue, Xiaoning Du
, Xiaofei Xie
, Yang Liu
, Meng Sun
:
Runtime Backdoor Detection for Federated Learning via Representational Dissimilarity Analysis. 4607-4624 - Meng Tong

, Kejiang Chen
, Jie Zhang
, Yuang Qi
, Weiming Zhang
, Nenghai Yu
, Tianwei Zhang
, Zhikun Zhang
:
InferDPT: Privacy-Preserving Inference for Closed-Box Large Language Models. 4625-4640 - She Tang

, Jian Wang
, Zhe Chen, Shize Guo:
A Covert and Efficient Attack on FPGA Cloud Based on Adaptive RON. 4641-4653 - Huan Tian

, Guangsheng Zhang
, Bo Liu
, Tianqing Zhu
, Ming Ding
, Wanlei Zhou
:
Do Fairness Interventions Come at the Cost of Privacy: Evaluations for Binary Classifiers. 4654-4670 - Lujia Shen

, Yuwen Pu
, Xuhong Zhang
, Chunpeng Ge
, Xing Yang
, Hao Peng
, Wei Wang
, Shouling Ji
:
TextDefense: Adversarial Text Detection Based on Word Importance Score Dispersion. 4671-4684 - Mingyan Zhu

, Yiming Li
, Junfeng Guo, Tao Wei, Shu-Tao Xia
, Zhan Qin
:
Towards Sample-Specific Backdoor Attack With Clean Labels via Attribute Trigger. 4685-4698 - Li Bai

, Haibo Hu
, Qingqing Ye
, Jianliang Xu
, Jin Li
, Chengfang Fang, Jie Shi:
RMR: A Relative Membership Risk Measure for Machine Learning Models. 4699-4710 - Lamya Abdullah

, Felix C. Freiling
, Dominique Schröder:
Increasing the Resilience of Secure Multiparty Computation Using Security Modules. 4711-4721 - Ding Wang

, Xuan Shan
, Yuxuan Wu
, Chunfu Jia
:
Understanding User Passwords Through Parsing Tree. 4722-4736 - Jianwen Tian

, Haoyu Ma
, Debin Gao
, Xiaohui Kuang
:
CacheAlarm: Monitoring Sensitive Behaviors of Android Apps Using Cache Side Channel. 4737-4752 - Mohammed Abuhamad

, Changhun Jung
, David Mohaisen
, DaeHun Nyang
:
SHIELD: Thwarting Code Authorship Attribution. 4753-4767 - Chanyoung Park

, Yeongjun Kwak
, Hyungon Moon
:
Efficient Use-After-Free Prevention With Pooling, OS-Assisted, and Opportunistic Page-Level Sweeping. 4768-4782 - Sergei Chuprov

, Leon Reznik
, Raman Zatsarenko
:
KISS: Knowledge Integration System Service for ML End Attacks Detection and Classification. 4783-4794 - Wei Yi

, Yulong Fu
, Jin Cao
, Yinghui Zhang
, Ben Niu
, Hui Li
:
AotmAuth: Atomic Function Module-Based 6G Authentication Protocol Combination Framework. 4813-4828 - Wanling Lin

, Xiao-Yan Li
, Jou-Ming Chang
, Dong Xiang
, Xiaohua Jia
:
Link/Switch Fault-Tolerant Hamiltonian Path Embedding in BCube Networks for Deadlock-Free Routing. 4829-4846 - Yanling Li

, Junzuo Lai
, Meng Sun
, Beibei Song, Robert H. Deng
:
Privacy-Preserving Ridge Regression Over Encrypted Data Under Multiple Keys. 4847-4860 - Jinhuan Wang

, Pengtao Chen
, Xinyao Xu, Jiajing Wu
, Meng Shen
, Qi Xuan
, Xiaoniu Yang
:
TSGN: Transaction Subgraph Networks Assisting Phishing Detection in Ethereum. 4861-4876 - Zuchao Ma

, Muhui Jiang
, Xiapu Luo
, Haoyu Wang
, Yajin Zhou:
Uncovering NFT Domain-Specific Defects on Smart Contract Bytecode. 4877-4895 - Keke Gai

, Dongjue Wang
, Jing Yu
, Liehuang Zhu
, Weizhi Meng
:
A Scheme of Robust Privacy-Preserving Multi-Party Computation via Public Verification. 4896-4910 - Riccardo Spolaor

, Yi Xu
, Veelasha Moonsamy
, Mauro Conti
, Xiuzhen Cheng
:
CovertPower: A Covert Channel on Android Devices Through USB Power Line. 4911-4926 - Yan Ke

, Minqing Zhang, Jia Liu
, Yiliang Han, Wenchao Liu
:
Federated Learning With Security Authentication and Traceability of Poisoning by Embedded Message Authentication Code. 4927-4941 - Esau Bermudez

, Luan Lins
, Paulo Pereira
, Paulo Maciel
:
A Stochastic Model for Evaluating the Aging Impact on Satellite Systems' Availability. 4942-4953 - Pengfei Wu

, Jianting Ning
, Xinyi Huang
, Rongmao Chen
, Kai Zhang
, Kaitai Liang
:
PrivBox: Privacy-Preserving Deep Packet Inspection With Dual Double-Masking Obfuscated Rule Generation. 4954-4970 - Wei Wang

, Junke Duan
, Licheng Wang
, Haipeng Peng
, Liehuang Zhu
, Lixiang Li
:
Redactable Blockchain Supporting Rewriting Authorization Without Trapdoor Exposure. 4971-4987 - Long Chen

, Yanting Wang, Qiaojuan Wang, Yanqing Song
, Jianguo Chen
:
Cybersecurity Multi-Dimensional Few-Shot Data Generation on Malicious Enhancement. 4988-4997 - Guowei Ling

, Peng Tang
, Fei Tang
, Shifeng Sun
, Shouling Ji
, Weidong Qiu
:
Ultra-Fast Private Set Intersection From Efficient Oblivious Key-Value Stores. 4998-5014 - Weihao Huang

, Chaoyang Lin
, Lu Xiang
, Zhiyu Zhang
, Guozhu Meng
, Lei Xue
, Kai Chen
, Lei Meng, Zongming Zhang:
MalFocus: Locating Malicious Modules in Malware Based on Hybrid Deep Learning. 5060-5076 - Lin Huang

, Chuan Qin
, Guorui Feng
, Xinpeng Zhang
:
Neural Network Watermarking With Hierarchical Recoverability. 5077-5089 - Hangsheng Zhang

, Dongqi Han
, Shangyuan Zhuang
, Zhiliang Wang
, Jiyan Sun, Yinlong Liu
, Jiqiang Liu
, Jinsong Dong
:
Explainable and Transferable Adversarial Attack for ML-Based Network Intrusion Detectors. 5090-5107 - Yushu Zhang

, Zixuan Yang
, Tao Wang
, Zhongyun Hua
, Jian Weng
:
Tailor-Made Face Privacy Protection via Class-Wise Targeted Universal Adversarial Perturbations. 5108-5120 - Ferhat Karakoç

, Alptekin Küpçü
:
Enabling Two-Party Secure Computation on Set Intersection. 5121-5133 - Hongcheng Zou

, Jinshu Su
, Ziling Wei
, Shuhui Chen
, Chunfang Yang
, Mantun Chen:
Toward an Effective Few-Shot Website Fingerprinting Attack With Quadruplet Networks and Deep Local Fingerprinting Features. 5152-5169 - Xinrui Ge

, Jia Yu
, Wenting Shen
, Jiankun Hu
:
Light-Weight Graph Matching Query Over Encrypted Graphs. 5170-5185 - Ying Chen

, Debiao He
, Zijian Bao
, Huaqun Wang
, Min Luo
:
MISP: An Efficient Quantum-Resistant Misbehavior Preventing Scheme With Self-Enforcement for Vehicle-to-Everything. 5203-5214 - Cong Wu

, Kun He
, Jing Chen
, Ruiying Du
, Ran Yan
, Ziming Zhao
:
High Accuracy and Presentation Attack Resistant Hand Authentication via Acoustic Sensing for Commodity Mobile Devices. 5231-5247 - Jinguang Han

, Liqun Chen
, Willy Susilo
:
Privacy-Preserving Decentralized Signature-Based Access Control. 5248-5264 - Shunrong Jiang

, Yingjie Liu
, Zhi Wang, Yonggang Li, Haotian Chi
, Xiaojiang Du:
Hybrid Makes Better: Hybrid Differential Privacy Medical Image Classification Based on Federated Learning. 5265-5276 - Gaoyang Liu

, Tianlong Xu
, Yang Yang
, Ahmed M. Abdelmoniem
, Chen Wang
, Jiangchuan Liu
:
Poisoning as a Post-Protection: Mitigating Membership Privacy Leakage From Gradient and Prediction of Federated Models. 5277-5290 - Yong Yu

, Haochen Yang
, Yannan Li, Xiaojiang Du
:
Accountable Many-to-One Signature With Short Verification Key for Self-Sovereign Identity. 5291-5302 - Hui Sun

, Tianqing Zhu
, Wenhan Chang
, Wanlei Zhou
:
Generative Adversarial Networks Unlearning. 5303-5320 - Zhangshuang Guan

, Yulin Zhao
, Zhiguo Wan
, Jinsong Han
:
OPSA: Efficient and Verifiable One-Pass Secure Aggregation With TEE for Federated Learning. 5321-5334 - Mingyue Xie

, Jun Liu
, Shuyu Chen, Mingwei Lin
, Guangxia Xu
, Zeshui Xu
, Zheng Chang
:
Traceability and Identity Protection in Smart Agricultural IoT System Framework Based on Blockchains. 5335-5351 - Ngoc Duy Pham

, Khoa Tran Phan
, Alsharif Abuadbba
, Yansong Gao
, Van-Doan Nguyen
, Naveen Chilamkurti
:
Split Learning Without Local Weight Sharing to Enhance Client-Side Data Privacy. 5352-5365 - Hui Tian

, Yiqin Qiu
, Haizhou Li
, Xinpeng Zhang
, Athanasios V. Vasilakos
:
Universal Low Bit-Rate Speech Steganalysis Integrating Domain-Specific and Domain-Shared Knowledge. 5382-5396 - Ningbin Yang

, Chunming Tang
, Zhihong Deng
, Debiao He
:
A Gaussian Reputation-Based Hybrid BFT Consensus With a Formal Security Framework. 5397-5414 - Song Han, Hongxin Ding, Shuai Zhao

, Siqi Ren, Shengke Zeng
, Mengqi Xue, Ruili Wang
:
Fed-GAN: Federated Generative Adversarial Network With Privacy-Preserving for Cross-Device Scenarios. 5415-5430 - Dazhi Zhan

, Xin Liu
, Wei Bai, Wei Li, Shize Guo, Zhisong Pan
:
GAME-RL: Generating Adversarial Malware Examples Against API Call Based Detection via Reinforcement Learning. 5431-5447 - Yuqing Li

, Nan Yan
, Jing Chen
, Xiong Wang
, Jianan Hong
, Kun He
, Wei Wang
, Bo Li
:
FedPHE: A Secure and Efficient Federated Learning via Packed Homomorphic Encryption. 5448-5463 - Yueming Wu

, Wenqi Suo
, Siyue Feng
, Deqing Zou
, Wei Yang, Yang Liu
, Hai Jin
:
MalScan: Android Malware Detection Based on Social-Network Centrality Analysis. 5464-5479 - Lefeng Zhang, Tianqing Zhu

, Ping Xiong
, Wanlei Zhou
:
Trojan Attack on Machine Unlearning: Security Risk of the Right to be Forgotten. 5480-5493 - Daniele Gorla

, Louis Jalouzot, Federica Granese
, Catuscia Palamidessi
, Pablo Piantanida
:
On Estimating the Strength of Differentially Private Mechanisms in a Black-Box Setting. 5494-5507 - Chao Liu

, Sisi Duan
, Haibin Zhang
:
MiB: Asynchronous BFT With More Replicas. 5508-5524 - Debasis Gountia

, Rakesh Ranjan Behera
, Pravas Ranjan Bal
, Swarna Lata Pati
:
Trojan Detection in Digital Microfluidic Biochips via Image Classification: A Deep-Learning Based Approach. 5525-5536 - Xiaoping Lou

, Huiru Zan
, Zidong Wang
, Jinjing Shi
, Shichao Zhang
:
Privacy-Preserving Bidirectional Data Transmission of Smart Grid Via Semi-Quantum Computation: On Mutual Identity and Message Authentication. 5537-5548 - Bin Xu

, Dongdong Zhao
, Junwei Zhou, Wenzhi Xie, Kai Jia, Jing Tian, Jianwen Xiang
:
Cross-Project Aging-Related Bug Prediction Based on Transfer Learning and Class Imbalance Learning. 5549-5566 - Yiwei Zhang

, Rouzbeh Behnia
, Attila Altay Yavuz
, Reza Ebrahimi
, Elisa Bertino
:
Efficient Full-Stack Private Federated Deep Learning With Post-Quantum Security. 5567-5583 - Hao Cheng, Yuan Lu

, Zhenliang Lu
, Qiang Tang, Yuxuan Zhang, Zhenfeng Zhang:
$\mathsf {JUMBO}$JUMBO: Fully Asynchronous BFT Consensus Made Truly Scalable. 5584-5602 - Mingze He

, Hongxia Wang
, Fei Zhang
, Heng Wang
:
Design Principles for Orthogonal Moments in Video Watermarking. 5603-5616 - Gang Wang

, Qingming Li
, Ximeng Liu
, Xiaoran Yan
, Qingkuan Dong
, Huiwen Wu
, Xiangjie Kong
, Li Zhou
:
VFGCN: A Vertical Federated Learning Framework With Privacy Preserving for Graph Convolutional Network. 5617-5631 - Qing Zhou

, Ping Wei
, Zhenxing Qian
, Xinpeng Zhang
, Sheng Li
, Chuan Qin
:
Conditional Flow-Based Generative Steganography. 5632-5647 - Kevin Hu

, Retsef Levi
, Raphael Yahalom
, El Ghali Zerhouni
:
Supply Chain Characteristics as Predictors of Cyber Risk: A Machine-Learning Assessment. 5648-5657 - Jordan Vice

, Naveed Akhtar
, Richard Hartley
, Ajmal Mian
:
Quantifying Bias in Text-to-Image Generative Models. 5658-5671 - Jiating Ma

, Yipeng Zhou
, Qi Li
, Quan Z. Sheng
, Laizhong Cui
, Jiangchuan Liu
:
The Power of Bias: Optimizing Client Selection in Federated Learning With Heterogeneous Differential Privacy. 5672-5687 - Dawei Zhou

, Zhigang Su, Decheng Liu
, Tongliang Liu
, Nannan Wang
, Xinbo Gao
:
A Knowledge-Guided Adversarial Defense for Resisting Malicious Visual Manipulation. 5688-5700 - Dawei Li

, Yangkun Ren
, Di Liu
, Song Bian
, Zhenyu Guan
, Willy Susilo
, Jianwei Liu
, Qianhong Wu
:
LOGO-Based Intellectual Property Right Protection Scheme for GANs on FPGA. 5701-5712 - Chushan Zhang

, Jian Weng
, Jiasi Weng
, Yijian Zhong
, Jia-Nan Liu
, Cunle Deng:
Robust and Secure Federated Learning With Verifiable Differential Privacy. 5713-5729 - Jieyu Zheng

, Haoliang Zhu
, Zhenyu Song
, Zheng Wang
, Yunlei Zhao
:
Optimized Vectorization Implementation of CRYSTALS-Dilithium. 5730-5743 - Letian Sha

, Xingpeng Huo
, Fu Xiao
, Jiankuo Dong
, Jianwen Liu
, Shang Wu
, Ziyue Su
:
AWDP-Automated Windows Domain Penetration Framework With Deep Reinforcement Learning. 5744-5759 - Sarah Roscoe

, Logan Hellbusch, Chamath Gunawardena, Jitender S. Deogun
, Witawas Srisa-an
, Yi Qian
, Gabriela F. Ciocarlie:
AVOID: Automated Void Detection in STL Files. 5760-5772 - Wanyu Lin

, Hao Lan
, Hao He, Baochun Li
:
Graph-Relational Federated Learning: Enhanced Personalization and Robustness. 5773-5785 - Yamin Li

, Jianghong Wei
, Fuchun Guo
, Yang Xiang
, Xiaofeng Chen
:
Function-Hiding Multi-Client Inner-Product Functional Encryption Without Pairings for Large Space. 5786-5797 - Zequan Zhou

, Xiling Luo
, Xiaohai Ji, Jian Mao
, Ting He
, Junjun Wang
, Qianhong Wu
:
BridgeGuard: Checking External Interaction Vulnerabilities in Cross-Chain Bridge Router Contracts Based on Symbolic Dataflow Analysis. 5798-5812 - Minghao Xu

, Fengrui Hao
, Tianlong Gu
, Ming Liu
:
FBA: Fairness Backdoor Attack on Graph Neural Networks. 5813-5820
Volume 22, Number 6, November - December 2025
- Jingwen Liu, Yuanyuan Zhang, Zilin Wang, Yi Ren, Liangyin Chen, Yanru Chen:

HTM-CDFK: An Online Industrial Control Anomaly Detection Algorithm Based on Hierarchical Time Memory. 5821-5836 - Oussama Trabelsi, Lilia Sfaxi, Riadh Robbana:

DCC: A High-Performance Distributed Encryption Framework for Large Volumes of Data. 5837-5848 - Jemal H. Abawajy, Sara Ghanavati, Davood Izadi:

Enhancing Dependability of Fog Computing Using Learning-Based Task Scheduling. 5849-5860 - Chunpeng Wang, Qinghua Zhang, Xiaoyu Wang, Linna Zhou, Qi Li, Zhiqiu Xia, Bin Ma, Yun Qing Shi:

Light-Field Image Multiple Reversible Robust Watermarking Against Geometric Attacks. 5861-5875 - Willy Susilo, Yumei Li, Fuchun Guo, Zhen Zhao, Yannan Li, Chunpeng Ge:

SVOC: Secure Aggregatable and Extractable System for Outsourced Cloud Computation. 5876-5887 - Pradip Kunwar, Kshitiz Aryal, Maanak Gupta, Mahmoud Abdelsalam, Elisa Bertino:

SoK: Leveraging Transformers for Malware Analysis. 5888-5905 - Xiaoqiang Gui, Guoxian Yu, Jun Wang, Zhongmin Yan, Wei Wang, Carlotta Domeniconi, Lizhen Cui:

Sophon: Byzantine-Robust Federated Learning via Dual Trust Mechanism. 5906-5917 - Nan Gao, Kai Fan, Haoyang Wang, Yintang Yang, Kan Yang, Hui Li:

Dynamic Multi-User Authorization in Ciphertext Retrieval With Proxy Re-Encryption. 5918-5930 - Jiguo Li, Ninghai Xie, Yichen Zhang, Huaqun Wang:

TERCT: A Traceable and Editable Ring Confidential Transaction for Blockchain. 5931-5942 - Runze Wang, Yipeng Zhou, Jiahao Liu, Xuezheng Liu, Miao Hu, Di Wu, Quan Z. Sheng, Song Guo:

CODP: Improving Differentially Private Federated Learning by Cascading and Offsetting Noises Between Iterations. 5943-5955 - Chengsheng Yuan, Zhaonan Ji, Xinting Li, Zhili Zhou, Zhihua Xia, Q. M. Jonathan Wu:

DGADM-GIS: Deterministic Guided Additive Diffusion Model for Generative Image Steganography. 5956-5969 - Janine Schneider, Aya Fukami, Immanuel Lautner, Maximilian Eichhorn, Denise Moussa, Julian Wolf, Nicole Scheler, Dominic Deuber, Felix C. Freiling, Jaap Haasnoot, Hans Henseler, Simon Malik, Holger Morgenstern, Martin Westman:

Poor Sanitization Practices and Questionable Digital Evidence: A Comprehensive Study of Scope and Impact of Recycled NAND Flash Chips. 5970-5984 - Beining Wang, Jing Chen, Kun He, Bei Shen, Sicheng Nian, Ruiying Du:

Practical Multi-User Dynamic Searchable Symmetric Encryption With Hierarchical Authorization. 5985-5997 - Chenhao Wang, Yang Ming, Hang Liu, Yutong Deng, Mengmeng Yang, Jie Feng:

Puncturable Registered ABE for Vehicular Social Networks: Enhancing Security and Practicality. 5998-6011 - Ying Miao, Keke Gai, Yu-An Tan, Liehuang Zhu, Weizhi Meng:

Blockchain-Assisted Searchable Integrity Auditing for Large-Scale Similarity Data With Arbitration. 6012-6027 - Shuaishuai Li, Liqiang Peng, Weiran Liu, Cong Zhang, Zhen Gu, Dongdai Lin:

BitBatSPIR: Efficient Batch Symmetric Private Information Retrieval From PSI. 6028-6039 - Ripan Kumar Kundu, Matthew Denton, Genova Mongalo, Prasad Calyam, Khaza Anuarul Hoque:

Securing Virtual Reality Experiences: Unveiling and Tackling Cybersickness Attacks With Explainable AI. 6040-6057 - Chen Gong, Xiangyu Wang, Dan Zhu, Cheng Huang, Zhuoran Ma, Jian Feng Ma:

Enabling Efficient and Privacy-Preserving Sequence Similarity Query on Encrypted Genomes. 6058-6073 - Xi Yang, Jie Zhang, Chang Liu, Han Fang, Zehua Ma, Kejiang Chen, Weiming Zhang, Nenghai Yu:

Synthesizing Glyph Vectors for Practical Information Hiding in Documents. 6074-6087 - Anxiao Song, Ke Cheng, Jiaxuan Fu, Shujie Cui, Tao Zhang, Zhao Chang, Yulong Shen:

Private Learning for Vertical Decision Trees: A Secure, Accurate, and Fast Realization. 6088-6103 - Bin Zhu, Kaiping Xue, Jingcheng Zhao, Xianchao Zhang, David S. L. Wei, Qibin Sun, Jun Lu:

PSAC: Privacy-Preserving Statistical Analysis Framework for Crowdsourcing Using Histograms. 6104-6120 - Zahra Seyedi, Farhad Rahmati, Mohammad Ali, Ximeng Liu:

A Fully Decentralized Auditing Approach for Edge Computing: A Game-Theoretic Perspective. 6121-6132 - Man Zhang, Xinghua Li, Yinbin Miao, Bin Luo, Siqi Ma, Robert H. Deng:

Accuracy-Enabling Differential Privacy-Preserving Truth Discovery. 6133-6146 - Haitao Wang, Bingsheng Zhang, Kui Ren:

EncDB-FR$^{3}$3: An Encrypted Database With Fault Recovery and Rollback Resistance. 6147-6162 - Gnanambikai Krishnakumar, Chester Rebeiro:

Systematic Analysis of Moving Target Defenses for Branch Prediction Attacks. 6163-6178 - Daipeng Cao, Yang Hong, Qianqian Pan, Jun Wu:

Program Interoperable Large Language Model Software Testing Scheme: A Case Study on JavaScript Engine Fuzzing. 6179-6195 - Mengfei Xie, Yan Lin, Jianming Fu, Chenke Luo, Guojun Peng:

Egalitarian Randomization for Multi-Language Applications on ARM64. 6196-6213 - Tianyou Zhang, Haiyang Yu, Zhen Yang, Yuwen Chen, Shui Yu:

LaVFL: Efficient Verifiable Federated Learning for Large Language Models. 6214-6229 - Matheus E. Garbelini, Zewen Shang, Shijie Luo, Sudipta Chattopadhyay, Sumei Sun, Ernest Kurniawan:

5Ghoul: Unleashing Chaos on 5G Edge Devices via Stateful Multi-Layer Fuzzing. 6230-6247 - Duohe Ma, Junye Jiang, Xiaoyan Sun, Zhimin Tang, Zhenchao Zhang, Kai Chen, Jun Dai:

Got My "Invisibility" Patch: Towards Physical Evasion Attacks on Black-Box Face Detection Systems. 6248-6265 - Zhenbo Shi, Zhidong Yu, Yuxuan Zhang, Wei Yang, Liusheng Huang:

A Unified Perspective From Diffuse Deviation to Target Hijacking. 6266-6280 - Hao Zeng, Helei Cui, Xiaoli Zhang, Bo Zhang, Yuefeng Du, Bin Guo, Zhiwen Yu:

DCrowd: Decentralized Mobile Crowdsensing Via Proof of Task Assignment Blockchain. 6281-6295 - Haiwei Wu, Yiming Chen, Jiantao Zhou, Yuanman Li:

Rethinking Image Forgery Detection via Soft Contrastive Learning and Unsupervised Clustering. 6296-6308 - Xuyang Liu, Zijian Zhang, Zhen Li, Xin Lu, Meng Li, Lei Xu, Meng Ao, Liehuang Zhu:

Group BFT: Two-Round BFT Protocols Via Replica Grouping. 6309-6326 - Yang Zheng, Yu Wen, Ruoyu Wang, Yanna Wu, Boyang Zhang, Dan Meng:

InstPro: Provenance-Based Transient Execution Attack Detection and Investigation on Instruction Execution Traces. 6327-6344 - Wenrui Cheng, Tiantian Zhu, Tieming Chen, Qixuan Yuan, Jie Ying, Hongmei Li, Chunlin Xiong, Mingda Li, Mingqi Lv, Yan Chen:

CRUcialG: Reconstruct Integrated Attack Scenario Graphs by Cyber Threat Intelligence Reports. 6345-6360 - Xuyang Jing, Qinghua Cao, Zheng Yan, Witold Pedrycz, Pu Wang:

LocalSketch: An Accurate and Efficient Sketch for Range Spread Estimation. 6361-6375 - Shuhua Deng, Zhangping Yin, Xieping Gao:

Investigating Vulnerabilities in OpenFlow Discovery Protocol: Novel Attacks and Their Defense. 6376-6388 - Xugui Zhou, Maxfield Kouzel, Chloe Smith, Homa Alemzadeh:

KnowSafe: Combined Knowledge and Data Driven Hazard Mitigation in Artificial Pancreas Systems. 6389-6405 - Jingcheng Zhao, Kaiping Xue, Ruidong Li, Bin Zhu, Meng Li, Qibin Sun, Jun Lu:

Privacy-Preserving Truth Discovery of Evolving Truths for Mobile Crowdsensing Systems. 6406-6421 - Guanjie Li, Tom H. Luan, Chengzhe Lai, Jinkai Zheng, Rongxing Lu:

DTHA: A Digital Twin-Assisted Handover Authentication Scheme for 5G and Beyond. 6422-6440 - Ling Chen, Chaodu Song, Xu Wang, Dachao Fu, Wenchao Zhou:

CSCLog: A Component Subsequence Correlation-Aware Log Anomaly Detection Method. 6441-6453 - Nan Gao, Kai Fan, Kan Yang, Hui Li, Yintang Yang:

Deniable Time Signature Forward Secure Searchable Encryption With Flexible Retrieval and Traceable Authorization in Sharable EHR. 6454-6468 - Faqian Guan, Tianqing Zhu, Hanjin Tong, Wanlei Zhou:

Attention-Based Membership Inference Attacks on Graph Neural Network Through Topological Features. 6469-6486 - Asif Iqbal, Prosanta Gope, Biplab Sikdar:

Privacy-Preserving Collaborative Split Learning Framework for Smart Grid Load Forecasting. 6487-6503 - Dorjan Hitaj, Giulio Pagnotta, Fabio De Gaspari, Sediola Ruko, Briland Hitaj, Luigi V. Mancini, Fernando Pérez-Cruz:

Do You Trust Your Model? Emerging Malware Threats in the Deep Learning Ecosystem. 6504-6521 - Xiaobing Sun, Mingxuan Zhou, Sicong Cao, Xiaoxue Wu, Lili Bo, Di Wu, Bin Li, Yang Xiang:

HgtJIT: Just-in-Time Vulnerability Detection Based on Heterogeneous Graph Transformer. 6522-6538 - Youssef Sellami, Youcef Imine, Antoine Gallais:

Fog-Blockchain Fusion for Event Evaluation and Trust Management. 6539-6553 - Deepika Saxena, Ashutosh Kumar Singh:

An Intelligent Secure and Reliable Cloud Services Management Model With Toffoli Gate-Embedded Quantum Adam Neural Network. 6554-6565 - Wentuo Sun, Kaiping Xue, Meiqi Li, Xinyi Luo:

FishboneChain: A Scalable and Liquidity-Guaranteed Crowdsourcing Platform Based on Multiple Child Chains. 6566-6579 - Ruiqi Dong, Fanke Tong, He Huang, Xiaogang Zhu, Xi Xiao, Shaohua Wang, Sheng Wen, Yang Xiang:

One Mutation Fits All: Exploring Universal Library Fuzzing Based on Exogenous Mutation. 6580-6591 - Jaouhara Bouamama, Yahya Benkaouz, Mohammed Ouzzif:

VeSAFL: Verifiable Secure Aggregation for Privacy-Preserving Federated Learning. 6592-6609 - Chaofan Ma, Peng Jiang, Keke Gai, Liehuang Zhu:

Toward High-Performance Privacy-Preserving Fuzzy Search Over Encrypted Data. 6610-6621 - Yaxin Xiao, Haibo Hu, Qingqing Ye, Li Tang, Zi Liang, Huadi Zheng:

Unlocking High-Fidelity Learning: Towards Neuron-Grained Model Extraction. 6622-6635 - Yuxin Sun, Zhiquan Liu, Yingjie Xia, Zhen Guo, Gao Liu, Leping Li, Jianfeng Ma:

PPDR: A Privacy-Preserving Dual Reputation Management Scheme in Vehicle Platoon. 6636-6652 - Zhongyun Hua, Zizheng Wang, Mingyang Song, Yifeng Zheng, Guangxia Xu, Xiaohua Jia:

Enabling Secure Auditing and Deduplication in Multi-Replica Cloud Storage. 6653-6670 - Tongfei Yan, Jian Wang, Zi-Han Cheng:

Hardware Trojan Detection for Incomplete Gate-Level Reverse Netlist. 6671-6684 - Zhixiong Xie, Wenlong Tian, Ruixuan Li, Jianfeng Lu, Weijun Xiao, Zhiyong Xu:

Horse-MinHash: High-Performance and Secure Jaccard Similarity Estimation for Cloud Storage. 6685-6697 - Liang Xie, Zhou Su, Yuntao Wang, Nan Chen, Yiliang Liu, Rui Wang, Xin Liu, Donglan Liu, Hao Zhang:

A Privacy-Preserving Incentive Scheme for UAV-Aided Federated Learning: A Contract Method With Prospect Theory. 6698-6713 - Canh Minh Do, Adrián Riesco, Santiago Escobar, Kazuhiro Ogata:

Parallel Maude-NPA for Cryptographic Protocol Analysis. 6714-6731 - Haiyan Zhang, Xinghua Li, Yinbin Miao, Shunjie Yuan, Mengyao Zhu, Ximeng Liu, Robert H. Deng:

FL-CDF: Collaborative Defense Framework for Backdoor Mitigation in Federated Learning. 6732-6747 - Jessica Castro, Nuno Laranjeiro, Katerina Goseva-Popstojanova, Marco Vieira:

Developing Attack Detection Models for Microservice Applications: A Comprehensive Framework and Its Illustration and Validation on DoS Attacks. 6748-6766 - Chunqiang Yu, Xianquan Zhang, Guoxiang Li, Peng Liu, Xinpeng Zhang, Zhenjun Tang:

Reversible Data Hiding in Encrypted Images With Secret Sharing and Multivariate Linear Equation. 6767-6780 - Wenyu Zhu, Yuanda Wang, Yuxin Cui, Chao Zhang, Xinhui Han:

CALLEE: Recovering Call Graphs for Binaries With Transfer and Contrastive Learning. 6781-6796 - Yu Chen, Jiguo Li, Yang Lu, Yichen Zhang:

Pairing-Free Attribute-Based Signature With Message Recovery for Industrial Internet of Things. 6797-6808 - Faqian Guan, Tianqing Zhu, Wenhan Chang, Wei Ren, Wanlei Zhou:

Large Language Models Merging for Enhancing the Link Stealing Attack on Graph Neural Networks. 6809-6825 - Guorui Xu, Qianmei Wu, Fan Zhang, Xinjie Zhao, Yuan Chen, Shize Guo:

Exploring the Internals of Fault-Induced Data-Level Vulnerabilities in Cryptographic Libraries. 6826-6843 - Kaimeng Chen, Qingxiao Guan, Weiming Zhang, Nenghai Yu, Wei Lu:

Separable Reversible Data Hiding in Encrypted Images Based on Systematic Polar Code and Flag Bit Transmission Channel Model. 6844-6861 - Chong Xiao Wang, Wee Peng Tay:

Data-Driven Regularized Inference Privacy. 6862-6877 - Tao Wang, Keyong Hong, Bo Yang, Qiliang Yang, Haiyu Li, Wenzheng Zhang:

Towards Authorization and Batch Validation for NFTs: A Cryptographic Generic Framework. 6878-6895 - Xiujun Wang, Lei Mo, Longkun Guo, Zhigang Lu, Zhi Liu, Minhui Xue:

Online Streaming Sampling Publication Method Over Sliding Windows With Differential Privacy. 6896-6912 - Yeongwoo Kim, György Dán:

Dynamic Alert Prioritization for Real-Time Situational Awareness: A Hidden Markov Model Framework With Active Learning. 6913-6928 - Minyeong Choe, Cheolhee Park, Changho Seo, Hyunil Kim:

SDBA: A Stealthy and Long-Lasting Durable Backdoor Attack in Federated Learning. 6929-6942 - Weizheng Wang, Qipeng Xie, Yongzhi Huang, Yong Ding, Lejun Zhang, Demin Gao, Chunhua Su, Joel J. P. C. Rodrigues:

Attack Analysis and Enhanced Authentication Protocol Design for Vehicle Networks. 6943-6954 - Futai Zou, Zehui Zhang, Yuzong Hu:

OTP-Hunter: An App-Based Fuzzing Framework to Discover One Time Password Vulnerabilities. 6955-6967 - Changhee Hahn:

Towards Secure and Efficient Wildcard Search for Cloud Storage. 6968-6982 - Jilin Hu, Yongwang Zhao, Shuangquan Pan, Zuohua Ding, Kui Ren:

Tacco: A Framework for Ensuring the Security of Real-World TEEs via Formal Verification. 6983-6997 - Pinchang Zhang, Huangwenqing Shi, Jiankuo Dong, Ji He, Xiaohong Jiang, Fu Xiao:

Enhanced Two-Way Privacy-Preserving PHY-Layer Authentication for UAV-Assisted MIMO Systems. 6998-7009 - Delong Zhu, Yuezun Li, Baoyuan Wu, Jiaran Zhou, Zhibo Wang, Siwei Lyu:

Hiding Faces in Plain Sight: Defending DeepFakes by Disrupting Face Detection. 7010-7024 - Yun Shen, Jie Cui, Hong Zhong, Jing Zhang, Qingyang Zhang, Lu Wei, Debiao He:

DBCSec: DBC File-Guided Secure Communication Mechanism for CAN-FD Bus. 7025-7042 - Yirui Huang, Ximeng Liu, Yinbin Miao, Jing Zhang, Dong Cheng:

LDPTRec: A Differential Privacy Based Transformer Framework for Next POI Recommendation. 7043-7059 - Zheyu Chen, Zhiqiang Yao, Biao Jin, Jianting Ning, Mingwei Lin:

Face-CPFNet: Leveraging Disentangled Representations for Dual-Level Soft- Biometric Privacy-Enhancement. 7060-7076 - Wei Li, Borui Yang, Yujie Sun, Suyu Chen, Yuting Chen, Liyao Xiang:

CodeMark: Contextual and Natural Watermarking for Tracing Code Snippet Provenance. 7077-7090 - Shigen Shen, Tao Hong, Yizhou Shen, Xiaoping Wu, Jingnan Dong, Jie Wu:

RMAAC: Joint Markov Games and Robust Multiagent Actor-Critic for Explainable Malware Defense in Social IoT. 7091-7106 - Kwan Yin Chan, Handong Cui, Tsz Hon Yuen, Siu Ming Yiu:

DIDO+: Data Provenance From Restricted TLS 1.3 Websites With Selective Disclosure. 7107-7124 - Di Wu, Qi Guo, Yong Qi, Saiyu Qi, Qian Li:

AMA: Adaptive Model Poisoning Attacks Towards Federated Learning. 7125-7138 - Siman Wu, Hui Sun, Tianqing Zhu, Wanlei Zhou:

Backdoor Defense for Text Encoders in Text-to-Image Generative Models. 7139-7156 - Shunjie Yuan, Xinghua Li, Xuelin Cao, Haiyan Zhang, Robert H. Deng:

General Test-Time Backdoor Detection in Split Neural Network-Based Vertical Federated Learning. 7157-7171 - Ye Liu, Chengxuan Zhang, Yi Li:

Automated Invariant Generation for Solidity Smart Contracts. 7172-7188 - Mengjie Zhou, Chao Lin, Shengmin Xu, Wei Wu:

Sphinx: Certificateless Conditional Privacy-Preserving Authentication With Secure Transmission for VANETs. 7189-7202 - Kavya Balasubramanian, Adithya Gowda Baragur, Denis Donadel, Dinuka Sahabandu, Alessandro Brighente, Bhaskar Ramasubramanian, Mauro Conti, Radha Poovendran:

CANLP: Intrusion Detection for Controller Area Networks Using Natural Language Processing and Embedded Machine Learning. 7203-7214 - Zijie Lou, Gang Cao, Man Lin, Lifang Yu, Shaowei Weng:

Trusted Video Inpainting Localization via Deep Attentive Noise Learning. 7215-7228 - Guohao Li, Li Yang, Lu Zhou, Hongbin Huang, Hao Zhang, Jianfeng Ma:

Practical and Collusion-Resistant Privacy-Preserving Aggregation for Edge Intelligence. 7229-7243 - Lihe Hou, Weiwei Ni, Nan Fu, Dongyue Zhang, Ruyu Zhang, Sen Zhang:

Diffusion-Based Heterogeneous Graph Synthesis Under Local Differential Privacy. 7244-7255 - Tianlong Yu, Gaoyang Liu, Chen Wang, Yang Yang:

LLMGraph: Label-Free Detection Against APTs in Edge Networks via LLM and GCN. 7256-7271 - Jiawei Zhou, Linye Lyu, Daojing He, Yu Li:

Toward Robust and Accurate Adversarial Camouflage Generation Against Vehicle Detectors. 7272-7286 - Naureen Hoque, Hanif Rahbari:

Locking Down Relay and Spoofing Attacks During Concurrent Connection Establishments in 802.11ax. 7287-7301 - Stefano Cecconello, Matteo Cardaioli, Luca Pasa, Stjepan Picek, Georgios Smaragdakis:

Your PIN is Mine: Uncovering Users' PINs at Point of Sale Machines. 7302-7318 - Lichun Li, Yuan Zhao, Zhijie Liu, Kai Bu, Linfeng Cheng, Shan Yin:

Privacy-Preserving Decision Graph Inference From Homomorphic Lookup Table. 7319-7333 - Xiaoyuan Liu, Hongwei Li, Guowen Xu, Shengmin Xu, Xinyi Huang, Tianwei Zhang, Yijing Lin, Jianying Zhou:

$\mathtt {Antelope}$: Fast and Secure Neural Network Inference. 7334-7347 - Qi Feng, Lingyan Han, Min Luo, Wei Zhao, Debiao He:

QuickNLP: Faster Protocol of Secure Natural Language Processing for Edge Computing. 7348-7359 - Victorine Clotilde Wakam Younang, Amartya Sen:

Security Risk Assessment Using Bayesian Attack Graphs and Complex Probabilities for Large Scale IoT Applications. 7360-7371 - Jiachun Li, Jianan Feng, Jianjun Huang, Bin Liang:

We Can Always Catch You: Detecting Adversarial Patched Objects WITH or WITHOUT Signature. 7372-7388 - Hao Li, Xiangyang Luo, Yi Zhang, Qianqian Zhang, Chunfang Yang:

A Convolutional Neural Network Steganalysis Method Based on ShuffleBottleneck and Attention Mechanism. 7389-7402 - Binghui Zou, Chunjie Cao, Fangjian Tao, Yang Sun, Longjuan Wang, Yuqing Zhang, Jingzhang Sun:

JPEG-Domain Malware Detection With Pretrained Lightweight Vision Transformer Model. 7403-7417 - Elham Cheshmikhani, Hamed Farbeh:

An Analytical and Empirical Investigation of Tag Partitioning for Energy-Efficient Reliable Cache. 7418-7429 - Ziqiang Li, Pengfei Xia, Hong Sun, Yueqi Zeng, Wei Zhang, Bin Li:

Explore the Effect of Data Selection on Poison Efficiency in Backdoor Attacks. 7430-7447 - Marcello Cinque, Domenico Cotroneo, Giuseppe De Rosa, Luigi De Simone, Giorgio Farina:

COSMOS: A Fault Injection Framework to Assess Hardware-Assisted Hypervisors. 7448-7462 - Hao Bai, Kun He, Yuqing Li, Jing Chen, Haowei Li, Zhongmou Liu, Xuanang Yang, Ruiying Du:

GetFed: Accurate, Differentially Private Federated Learning With GAN-Based Data Generation. 7463-7478 - Qifan Wang, Shujie Cui, Lei Zhou, Ye Dong, Jianli Bai, Yun Sing Koh, Giovanni Russello:

XGT: Fast and Secure Decision Tree Training and Inference on GPUs. 7479-7494 - Daoqing Yang, Yu Yao, Yao Shan, Yunfeng Wu, Xiaoli Lin, Wei Yang, Licheng Yang:

InSyfer: Industrial Control Protocols Syntax Inference via Graph Representation Learning. 7495-7507 - Bei Gong, Yong Wu, Akhtar Badshah, Muhammad Waqas:

Privacy-Preserving and Traceable Certificateless Anonymous Mutual Authentication Scheme for IoT. 7508-7520 - Kaiping Xue, Yutao Guo, Jingjiang Yang, Feng Liu, Chunyi Zhang, Feng Wang, Qibin Sun, Jun Lu:

Dynamic Structurally-Encrypted Database Solutions for Large-Scale Data Management. 7521-7534 - Junlin Liu, Xinchen Lyu, Chenshan Ren, Qimei Cui:

Targeted Poisoning Attacks Against Vertical Federated Learning via Embedding Manipulation. 7535-7551 - Hao Pan, Yongjian Fu, Yu Lu, Feitong Tan, Yi-Chao Chen, Ju Ren:

MoiréComm: Secure Screen-Camera Communication Based on Moiré Cryptography. 7552-7570 - Biprodip Pal, Md. Saiful Islam, Alan Wee-Chung Liew:

Calibrated Uncertainty Estimation for Trustworthy Deep IoT Attack Detection. 7571-7584 - Ying Miao, Keke Gai, Jing Yu, Liehuang Zhu, Dusit Niyato:

Collaborative and Searchable Integrity Auditing for Multi-Copy Data in Decentralized Storage. 7585-7599 - Chen Wang, Qian Yang, Jian Shen, Q. M. Jonathan Wu, Debiao He:

BM-PDA: Blockchain Based Multifunctional Private-Preserving Data Aggregation for e-Health Systems. 7600-7613 - Guowei Ling, Peng Tang, Fei Tang, Shifeng Sun, Jinyong Shan, Liyao Xiang, Weidong Qiu:

Privacy-Preserving Authorized Set Matching via Dishonest Majority Multiparty Computation. 7614-7631 - Shuo Yang, Xinran Zheng, Jinze Li, Jinfeng Xu, Xinchen Zhang, Edith C. H. Ngai:

Self-Supervised Adaptation Method to Concept Drift for Network Intrusion Detection. 7632-7646 - Zhenguang Liu, Lixun Ma, Zhongzheng Mu, Chengkun Wei, Xiaojun Xu, Yingying Jiao, Kui Ren:

I Know Who Clones Your Code: Interpretable Smart Contract Similarity Detection. 7647-7664 - Jie Pan, Jintao Wu, Yiwen Zhang:

An Online Game-Integrated Auction Scheme for DDoS Mitigation in Mobile Edge Computing. 7665-7679 - Sen Zhao, Haibo Hu, Zheli Liu, Xiaofeng Chen:

SARAs: Substitution and Replay Attacks in the Maintenance Mode of Encrypted Databases. 7680-7693 - Letian Sha, Luheng Zhang, Yifei Huang, Yan Lin, Fu Xiao, Jiaye Pan:

PatchFuzz: An Efficient Way to Incorporate Patching With Hybrid Fuzzing. 7694-7711 - Pei Yan, Shunquan Tan, Miaohui Wang, Jiwu Huang:

Prompt Engineering-Assisted Malware Dynamic Analysis Using GPT-4. 7712-7728 - Anyuan Sang, Yuchen Wang, Junbo Jia, Li Yang, Pengbin Feng, Lu Zhou, Jianfeng Ma:

Resist Dependency Explosion in Attack Investigation With Splittable Tag Propagation and Aggregation. 7729-7745 - Yudong Gao, Honglong Chen, Peng Sun, Junjian Li, Yangxu Yin, Zhibo Wang, Weifeng Liu:

A Triple Stealthy Backdoor: Hidden in Spatial, Frequency, and Feature Domains. 7746-7758 - Lulu Wang, Lei Zhang, Kim-Kwang Raymond Choo, Josep Domingo-Ferrer, Mauro Conti, Yuanyuan Gao:

Dual-Server Privacy-Preserving Collaborative Deep Learning: A Round-Efficient, Dynamic and Lossless Approach. 7759-7772 - Chun-I Fan, Si-Jing Wu, Yi-Fan Tseng, Arijit Karati:

Attribute-Based Encryption Supporting Multi-Keyword Search With Effective User Revocation in Public Cloud Storage. 7790-7801 - Jiaojiao Wu, Jianfeng Wang, Shifeng Sun, Xiaofeng Chen:

Flash: Practical Volume-Hiding Encrypted Conjunctive Multi-Map With Optimal Overhead. 7802-7817 - Hao Tang, Cheng Wang, Hongzi Zhu:

Enhancing Online Transaction Fraud Detection via Heterogeneous Source Models. 7818-7834 - Xiaohan Hao, Chao Lin, Xuan He, Xinyi Huang:

GAMC: Generic and Anti-MDA Model Certification for Intellectual Property Protection in MLaaS. 7835-7848 - Xia Du, Jiajie Zhu, Jizhe Zhou, Chi-Man Pun, Zheng Lin, Cong Wu, Zhe Chen, Jun Luo:

DP-TRAE: A Dual-Phase Merging Transferable Reversible Adversarial Example for Image Privacy Protection. 7849-7861 - Yang Li, Minghui Li, Hao Han, Liming Fang:

MACO: Model Anti-Extraction via Compiler Obfuscation. 7862-7876 - Yaguan Qian, Qinqin Yu, Qiqi Bao, Shouling Ji, Wei Wang, Bin Wang, Zhaoquan Gu, Zhen Lei:

A Multimodal Adversarial Attack Method via Frequency Domain Enhancement and Fine-Grained Cross-Modal Guidance. 7877-7889 - Jixian Zhang, Qingfeng Du, Sheng Li, Zhongda Lu, Ting He, Chengwei Liu:

Real-World Code Vulnerability Detection Framework: From Data Preprocessing to Multi-Feature Fusion Detection. 7890-7907 - Jiewei Du, Qiqi Zhang, Ning Xie:

STAC: Superimposed-Tag Anti-Copying Two-Dimensional Barcodes. 7908-7922 - Cheng Guo, Ling Li, Ximeng Liu, Kim-Kwang Raymond Choo, Yi-Ning Liu:

SAMK: Secure Aggregation for Federated Learning Under Multiple Keys With Low Communication Rounds. 7923-7937 - Jianwei Liu, Wenfan Song, Yajie Liu, Jiantao Yuan, Guanding Yu, Jinsong Han:

Replay-Resistant Few-Shot Disk Authentication Using Electromagnetic Fingerprint. 7938-7955 - Rongqiang Fang, Yongqi Sun, Jidong Yuan, Hongbo Cao:

DMIA: A Disentangled-Based Method for Graph Convolutional Network Against Membership Inference Attack. 7956-7970 - Shengmin Xu, Guomin Yang, Xiaoguo Li, Xingshuo Han, Xiaotian Yan, Xinyi Huang:

Enhancing Secure Cloud Data Sharing: Dynamic User Groups and Outsourced Decryption. 7971-7984 - Muhidul Islam Khan, Gianfranco Nencioni:

Revenue-Model Learning for a Slice Broker by Considering Security and Dependability. 7985-7995 - Wenbo Jiang, Hongwei Li, Jiaming He, Rui Zhang, Guowen Xu, Tianwei Zhang, Rongxing Lu:

I2I Backdoor: Backdoor Attacks Against Image-to-Image Tasks. 7996-8010 - Suo Gao, Zheyi Zhang, Qi Li, Siqi Ding, Herbert Ho-Ching Iu, Yinghong Cao, Xianying Xu, Chunpeng Wang, Jun Mou:

Encrypt a Story: A Video Segment Encryption Method Based on the Discrete Sinusoidal Memristive Rulkov Neuron. 8011-8024 - Xiaotian Wu, Yuyang Xiong, Bing Chen, Ching-Nung Yang, Wei Qi Yan, Qing-Yu Peng:

On the Design of Distributed Multi-User Secret Image Sharing for General Access Structures. 8025-8042 - Hao-Tian Wu, Yingqing Chen, Yiu-ming Cheung, Jiankun Hu, Zhihong Tian:

BGN Encryption Based Lossless Data Hiding by Random Number Replacement and Partitioning. 8043-8055

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














