Year Year arrow
arrow-active-down-0
Publisher Publisher arrow
arrow-active-down-1
Journal
1
Journal arrow
arrow-active-down-2
Institution Institution arrow
arrow-active-down-3
Institution Country Institution Country arrow
arrow-active-down-4
Publication Type Publication Type arrow
arrow-active-down-5
Field Of Study Field Of Study arrow
arrow-active-down-6
Topics Topics arrow
arrow-active-down-7
Open Access Open Access arrow
arrow-active-down-8
Language Language arrow
arrow-active-down-9
Filter Icon Filter 1
Year Year arrow
arrow-active-down-0
Publisher Publisher arrow
arrow-active-down-1
Journal
1
Journal arrow
arrow-active-down-2
Institution Institution arrow
arrow-active-down-3
Institution Country Institution Country arrow
arrow-active-down-4
Publication Type Publication Type arrow
arrow-active-down-5
Field Of Study Field Of Study arrow
arrow-active-down-6
Topics Topics arrow
arrow-active-down-7
Open Access Open Access arrow
arrow-active-down-8
Language Language arrow
arrow-active-down-9
Filter Icon Filter 1
Export
Sort by: Relevance
  • New
  • Research Article
  • 10.1109/tdsc.2026.3651107
Robust Privacy-Preserving Federated Learning for Edge Computing With New Client Integration
  • Jan 1, 2026
  • IEEE Transactions on Dependable and Secure Computing
  • Hao Zhou + 3 more

  • Research Article
  • 10.1109/tdsc.2025.3584826
CRUcialG: Reconstruct Integrated Attack Scenario Graphs by Cyber Threat Intelligence Reports
  • Nov 1, 2025
  • IEEE Transactions on Dependable and Secure Computing
  • Wenrui Cheng + 9 more

  • Research Article
  • 10.1109/tdsc.2025.3599004
Prompt Engineering-Assisted Malware Dynamic Analysis Using GPT-4
  • Nov 1, 2025
  • IEEE Transactions on Dependable and Secure Computing
  • Pei Yan + 3 more

  • Research Article
  • Cite Count Icon 1
  • 10.1109/tdsc.2025.3579969
Securing Virtual Reality Experiences: Unveiling and Tackling Cybersickness Attacks With Explainable AI
  • Nov 1, 2025
  • IEEE Transactions on Dependable and Secure Computing
  • Ripan Kumar Kundu + 4 more

  • Research Article
  • 10.1109/tdsc.2025.3595711
DIDO+: Data Provenance From Restricted TLS 1.3 Websites With Selective Disclosure
  • Nov 1, 2025
  • IEEE Transactions on Dependable and Secure Computing
  • Kwan Yin Chan + 3 more

  • Open Access Icon
  • Research Article
  • 10.1109/tdsc.2025.3589584
Parallel Maude-NPA for Cryptographic Protocol Analysis
  • Nov 1, 2025
  • IEEE Transactions on Dependable and Secure Computing
  • Canh Minh Do + 3 more

  • Research Article
  • 10.1109/tdsc.2025.3598985
I Know Who Clones Your Code: Interpretable Smart Contract Similarity Detection
  • Nov 1, 2025
  • IEEE Transactions on Dependable and Secure Computing
  • Zhenguang Liu + 6 more

  • Research Article
  • 10.1109/tdsc.2025.3596652
$\mathtt {Antelope}$: Fast and Secure Neural Network Inference
  • Nov 1, 2025
  • IEEE Transactions on Dependable and Secure Computing
  • Xiaoyuan Liu + 7 more

  • Research Article
  • 10.1109/tdsc.2025.3600181
PatchFuzz: An Efficient Way to Incorporate Patching With Hybrid Fuzzing
  • Nov 1, 2025
  • IEEE Transactions on Dependable and Secure Computing
  • Letian Sha + 5 more

  • Research Article
  • 10.1109/tdsc.2025.3579887
Accuracy-Enabling Differential Privacy-Preserving Truth Discovery
  • Nov 1, 2025
  • IEEE Transactions on Dependable and Secure Computing
  • Man Zhang + 5 more