<rss version="2.0"><channel>
	<title>IEEE Transactions on Dependable and Secure Computing</title>
	<link>https://www.computer.org/csdl/journal/tq</link>
	<description>The IEEE Transactions on Dependable and Secure Computing is a new quarterly that will publish archival research results focusing on research into foundations, methodologies, and mechanisms that support the achievement_through design, modeling, and evaluation_of systems and networks that are dependable and secure to the desired degree without compromising performance. The focus also includes measurement, modeling, and simulation techniques, and foundations for jointly evaluating, verifying, and designing for performance, security, and dependability constraints.</description>
	<language>en-us</language>
	<image>
		<url>https://s3.amazonaws.com/ieeecs.cdn.common/images/computer.org/CSLogo_dark.png</url>
		<title>IEEE Computer Society Digital Library</title>
		<description>List of 100 recently published journal articles.</description>
		<link>https://www.computer.org/csdl</link>
	</image>
	<item>
		<title>Accou2vec: A Social Bot Detection Model Based on Community Walk</title>
		<link>https://www.computer.org/csdl/journal/tq/2026/02/10373940/1TaDTqVQVd6</link>
		<description></description>
		<pubDate>03/18/2026 1:50 am PST</pubDate>
		<guid isPermaLink="true">http://doi.ieeecomputersociety.org/10.1109/TDSC.2023.3347040</guid>
	</item>
	<item>
		<title>Toward Model-Contrastive Federated Learning With Lightweight Privacy Preservation and Poisoning Attack Detection</title>
		<link>https://www.computer.org/csdl/journal/tq/2026/02/11202428/2aOjHxXWlnq</link>
		<description></description>
		<pubDate>03/17/2026 11:28 pm PST</pubDate>
		<guid isPermaLink="true">http://doi.ieeecomputersociety.org/10.1109/TDSC.2025.3620529</guid>
	</item>
	<item>
		<title>Universal and Quality-Preserving Watermark Removal Based on Unpaired Learning</title>
		<link>https://www.computer.org/csdl/journal/tq/2026/02/11202556/2aMEKf613Fe</link>
		<description></description>
		<pubDate>03/18/2026 12:03 am PST</pubDate>
		<guid isPermaLink="true">http://doi.ieeecomputersociety.org/10.1109/TDSC.2025.3621004</guid>
	</item>
	<item>
		<title>A Controllable, Publicly Auditable, and Redactable Blockchain With a Main&amp;#x2013;Auxiliary Architecture</title>
		<link>https://www.computer.org/csdl/journal/tq/2026/02/11202624/2aOjHE8RdQs</link>
		<description></description>
		<pubDate>03/17/2026 11:38 pm PST</pubDate>
		<guid isPermaLink="true">http://doi.ieeecomputersociety.org/10.1109/TDSC.2025.3620854</guid>
	</item>
	<item>
		<title>SParse: Semantic Tracking and Path Analysis for Attack Investigation in Real-Time</title>
		<link>https://www.computer.org/csdl/journal/tq/2026/02/11202708/2aOjIoHm9yw</link>
		<description></description>
		<pubDate>03/18/2026 3:02 am PST</pubDate>
		<guid isPermaLink="true">http://doi.ieeecomputersociety.org/10.1109/TDSC.2025.3621434</guid>
	</item>
	<item>
		<title>Sub-Pixel Hardware Trojan Detection With Enhanced Accuracy, Robustness, and Efficiency via Noise-Informed Thermal Radiation Analysis</title>
		<link>https://www.computer.org/csdl/journal/tq/2026/02/11202711/2aOjHRDn6aA</link>
		<description></description>
		<pubDate>03/18/2026 12:26 am PST</pubDate>
		<guid isPermaLink="true">http://doi.ieeecomputersociety.org/10.1109/TDSC.2025.3621287</guid>
	</item>
	<item>
		<title>HACEC: Efficient and Auditable Anonymous Access Control for Edge Computing Services</title>
		<link>https://www.computer.org/csdl/journal/tq/2026/02/11202724/2aOjIbAGA9O</link>
		<description></description>
		<pubDate>03/18/2026 2:39 am PST</pubDate>
		<guid isPermaLink="true">http://doi.ieeecomputersociety.org/10.1109/TDSC.2025.3621286</guid>
	</item>
	<item>
		<title>Let the Blocks Fly (Flying Blocks): A Highly Efficient and Practical Consensus Protocol for Authoritative Blockchains</title>
		<link>https://www.computer.org/csdl/journal/tq/2026/02/11202733/2aOjHXQyLG8</link>
		<description></description>
		<pubDate>03/18/2026 1:11 am PST</pubDate>
		<guid isPermaLink="true">http://doi.ieeecomputersociety.org/10.1109/TDSC.2025.3621228</guid>
	</item>
	<item>
		<title>A Decentralized Blockchain Transaction Verification Scheme in the Weighted Setting</title>
		<link>https://www.computer.org/csdl/journal/tq/2026/02/11202737/2aOjHL7rU4M</link>
		<description></description>
		<pubDate>03/18/2026 12:05 am PST</pubDate>
		<guid isPermaLink="true">http://doi.ieeecomputersociety.org/10.1109/TDSC.2025.3621238</guid>
	</item>
	<item>
		<title>FPTD: Super Fast Privacy-Preserving and Reliable Truth Discovery for Crowdsensing</title>
		<link>https://www.computer.org/csdl/journal/tq/2026/02/11203975/2aPDbqYY6kM</link>
		<description></description>
		<pubDate>03/18/2026 1:33 am PST</pubDate>
		<guid isPermaLink="true">http://doi.ieeecomputersociety.org/10.1109/TDSC.2025.3621682</guid>
	</item>
	<item>
		<title>&lt;inline-formula>&lt;tex-math notation="LaTeX">$\mathsf {Trident}$&lt;/tex-math>&lt;alternatives>&lt;mml:math>&lt;mml:mi mathvariant="sans-serif">Trident&lt;/mml:mi>&lt;/mml:math>&lt;inline-graphic xlink:href="zhang-ieq1-3621865.gif"/>&lt;/alternatives>&lt;/inline-formula>: A Secure Framework for Flexible Artificial Intelligence Model Lifecycle Management in Public Clouds</title>
		<link>https://www.computer.org/csdl/journal/tq/2026/02/11204181/2aPDbfRuro4</link>
		<description></description>
		<pubDate>03/18/2026 12:43 am PST</pubDate>
		<guid isPermaLink="true">http://doi.ieeecomputersociety.org/10.1109/TDSC.2025.3621865</guid>
	</item>
	<item>
		<title>Performance-Lossless Black-Box Model Watermarking</title>
		<link>https://www.computer.org/csdl/journal/tq/2026/02/11205307/2aRi98OsrcI</link>
		<description></description>
		<pubDate>03/18/2026 2:19 am PST</pubDate>
		<guid isPermaLink="true">http://doi.ieeecomputersociety.org/10.1109/TDSC.2025.3622253</guid>
	</item>
	<item>
		<title>Unveiling the Centralized Security Risks in Decentralized Ecosystems</title>
		<link>https://www.computer.org/csdl/journal/tq/2026/02/11205310/2aRi9fy0nxC</link>
		<description></description>
		<pubDate>03/18/2026 3:04 pm PST</pubDate>
		<guid isPermaLink="true">http://doi.ieeecomputersociety.org/10.1109/TDSC.2025.3622304</guid>
	</item>
	<item>
		<title>SCBIR-PE: Secure Content-Based Image Retrieval With Perceptual Encryption</title>
		<link>https://www.computer.org/csdl/journal/tq/2026/02/11205316/2aRi8WZgye4</link>
		<description></description>
		<pubDate>03/18/2026 12:56 am PST</pubDate>
		<guid isPermaLink="true">http://doi.ieeecomputersociety.org/10.1109/TDSC.2025.3622246</guid>
	</item>
	<item>
		<title>A Multi-Resolution End-to-End Universal Point Cloud Steganalysis Algorithm Based on Key Point Selection and Feature Mining Block</title>
		<link>https://www.computer.org/csdl/journal/tq/2026/02/11206430/2aTirx5y4W4</link>
		<description></description>
		<pubDate>03/18/2026 1:11 am PST</pubDate>
		<guid isPermaLink="true">http://doi.ieeecomputersociety.org/10.1109/TDSC.2025.3622745</guid>
	</item>
	<item>
		<title>Distributed Cooperative Control for Heterogeneous Connected Systems With Uncertainty and Cyber-Attacks</title>
		<link>https://www.computer.org/csdl/journal/tq/2026/02/11206498/2aTirkCTWSs</link>
		<description></description>
		<pubDate>03/18/2026 12:16 am PST</pubDate>
		<guid isPermaLink="true">http://doi.ieeecomputersociety.org/10.1109/TDSC.2025.3622697</guid>
	</item>
	<item>
		<title>When Machine Unlearning Meets Retrieval-Augmented Generation (RAG): Keep Secret or Forget Knowledge?</title>
		<link>https://www.computer.org/csdl/journal/tq/2026/02/11207222/2aYh7eoFisU</link>
		<description></description>
		<pubDate>03/18/2026 12:51 am PST</pubDate>
		<guid isPermaLink="true">http://doi.ieeecomputersociety.org/10.1109/TDSC.2025.3620832</guid>
	</item>
	<item>
		<title>Web Page Tampering Detection Based on Dynamic Temporal Graph Pre-Training</title>
		<link>https://www.computer.org/csdl/journal/tq/2026/02/11207234/2aYh78Q4gyA</link>
		<description></description>
		<pubDate>03/18/2026 12:42 am PST</pubDate>
		<guid isPermaLink="true">http://doi.ieeecomputersociety.org/10.1109/TDSC.2025.3623257</guid>
	</item>
	<item>
		<title>Hierarchical GNN Message Passing for Node-Level Anomaly Detection in Industrial Control Systems</title>
		<link>https://www.computer.org/csdl/journal/tq/2026/02/11207528/2aYh89Vh7Py</link>
		<description></description>
		<pubDate>03/18/2026 1:51 am PST</pubDate>
		<guid isPermaLink="true">http://doi.ieeecomputersociety.org/10.1109/TDSC.2025.3623299</guid>
	</item>
	<item>
		<title>Adaptive Attractors: A Defense Strategy Against Adversarial Collusion Attacks in Machine Learning</title>
		<link>https://www.computer.org/csdl/journal/tq/2026/02/11208795/2aYh71OVc9G</link>
		<description></description>
		<pubDate>03/18/2026 12:35 am PST</pubDate>
		<guid isPermaLink="true">http://doi.ieeecomputersociety.org/10.1109/TDSC.2025.3621213</guid>
	</item>
	<item>
		<title>PSA: Private Set Alignment for Secure and Collaborative Analytics on Large-Scale Data</title>
		<link>https://www.computer.org/csdl/journal/tq/2026/02/11214235/2b1fmcolrKo</link>
		<description></description>
		<pubDate>03/18/2026 1:08 am PST</pubDate>
		<guid isPermaLink="true">http://doi.ieeecomputersociety.org/10.1109/TDSC.2025.3624428</guid>
	</item>
	<item>
		<title>An Empirical Analysis of Information Leakage of File Operations on Android External Storage</title>
		<link>https://www.computer.org/csdl/journal/tq/2026/02/11214260/2b1fmvF56dW</link>
		<description></description>
		<pubDate>03/18/2026 2:20 am PST</pubDate>
		<guid isPermaLink="true">http://doi.ieeecomputersociety.org/10.1109/TDSC.2025.3624461</guid>
	</item>
	<item>
		<title>Alert-ME: An Explainability-Driven Defense Against Adversarial Examples in Transformer-Based Text Classification</title>
		<link>https://www.computer.org/csdl/journal/tq/2026/02/11214428/2b1fm0wjzt6</link>
		<description></description>
		<pubDate>03/18/2026 12:14 am PST</pubDate>
		<guid isPermaLink="true">http://doi.ieeecomputersociety.org/10.1109/TDSC.2025.3624268</guid>
	</item>
	<item>
		<title>Attribute-Based Sanitizable Signature With Key-Exposure Resistance for Mobile Cloud Data</title>
		<link>https://www.computer.org/csdl/journal/tq/2026/02/11214431/2b1fminlaKI</link>
		<description></description>
		<pubDate>03/18/2026 1:40 am PST</pubDate>
		<guid isPermaLink="true">http://doi.ieeecomputersociety.org/10.1109/TDSC.2025.3623729</guid>
	</item>
	<item>
		<title>Touch to Pair: Secure and Usable IoT Pairing Without Information Loss</title>
		<link>https://www.computer.org/csdl/journal/tq/2026/02/11214445/2b1fmoYEKjK</link>
		<description></description>
		<pubDate>03/18/2026 3:04 pm PST</pubDate>
		<guid isPermaLink="true">http://doi.ieeecomputersociety.org/10.1109/TDSC.2025.3624057</guid>
	</item>
	<item>
		<title>Ultrasound-Assisted Tamper-Proof Detection Against Speech Editing, Tampering, and Forgery in Real-Time Voice Applications</title>
		<link>https://www.computer.org/csdl/journal/tq/2026/02/11215989/2b3fRd4slhe</link>
		<description></description>
		<pubDate>03/18/2026 12:27 am PST</pubDate>
		<guid isPermaLink="true">http://doi.ieeecomputersociety.org/10.1109/TDSC.2025.3624801</guid>
	</item>
	<item>
		<title>Critical Information Only: A Content Privacy-Preserving Framework for Detecting Audio Deepfakes</title>
		<link>https://www.computer.org/csdl/journal/tq/2026/02/11216043/2b3fRWSYfUQ</link>
		<description></description>
		<pubDate>03/18/2026 2:30 am PST</pubDate>
		<guid isPermaLink="true">http://doi.ieeecomputersociety.org/10.1109/TDSC.2025.3624972</guid>
	</item>
	<item>
		<title>&lt;inline-formula>&lt;tex-math notation="LaTeX">$\mathsf {DisIMS}$&lt;/tex-math>&lt;alternatives>&lt;mml:math>&lt;mml:mi mathvariant="sans-serif">DisIMS&lt;/mml:mi>&lt;/mml:math>&lt;inline-graphic xlink:href="li-ieq1-3624710.gif"/>&lt;/alternatives>&lt;/inline-formula>: A Distributed Identity Management System via Blockchain</title>
		<link>https://www.computer.org/csdl/journal/tq/2026/02/11216046/2b3fRsf90l2</link>
		<description></description>
		<pubDate>03/18/2026 1:29 am PST</pubDate>
		<guid isPermaLink="true">http://doi.ieeecomputersociety.org/10.1109/TDSC.2025.3624710</guid>
	</item>
	<item>
		<title>Secure and Trustworthy Cooperation Framework for Multi-Vendor Autonomous Systems</title>
		<link>https://www.computer.org/csdl/journal/tq/2026/02/11217193/2b4USJe8Rnq</link>
		<description></description>
		<pubDate>03/18/2026 2:01 am PST</pubDate>
		<guid isPermaLink="true">http://doi.ieeecomputersociety.org/10.1109/TDSC.2025.3625435</guid>
	</item>
	<item>
		<title>On the Reduction of Error Space for Model-Implemented Fault- and Attack Injection</title>
		<link>https://www.computer.org/csdl/journal/tq/2026/02/11217205/2b4URW86yty</link>
		<description></description>
		<pubDate>03/17/2026 11:59 pm PST</pubDate>
		<guid isPermaLink="true">http://doi.ieeecomputersociety.org/10.1109/TDSC.2025.3625383</guid>
	</item>
	<item>
		<title>AHGT-DFD: Adaptive Hierarchical Graph Transformer for Dynamic Fraud Detection in Blockchain Networks</title>
		<link>https://www.computer.org/csdl/journal/tq/2026/02/11217214/2b4URQKzSDK</link>
		<description></description>
		<pubDate>03/17/2026 11:43 pm PST</pubDate>
		<guid isPermaLink="true">http://doi.ieeecomputersociety.org/10.1109/TDSC.2025.3625268</guid>
	</item>
	<item>
		<title>Gradient Pruning Interactive Attack for Vision-Language Pre-Training Models</title>
		<link>https://www.computer.org/csdl/journal/tq/2026/02/11217326/2b4USjkFDGw</link>
		<description></description>
		<pubDate>03/18/2026 1:17 am PST</pubDate>
		<guid isPermaLink="true">http://doi.ieeecomputersociety.org/10.1109/TDSC.2025.3625576</guid>
	</item>
	<item>
		<title>AuthGraph: Authorized Search Over Encrypted Social Graph Database With Trusted Hardware</title>
		<link>https://www.computer.org/csdl/journal/tq/2026/02/11217342/2b4UT27jO3C</link>
		<description></description>
		<pubDate>03/18/2026 2:44 am PST</pubDate>
		<guid isPermaLink="true">http://doi.ieeecomputersociety.org/10.1109/TDSC.2025.3625560</guid>
	</item>
	<item>
		<title>Scaling Blockchain via Dynamic Sharding</title>
		<link>https://www.computer.org/csdl/journal/tq/2026/02/11218168/2b9TxdUaRAA</link>
		<description></description>
		<pubDate>03/18/2026 2:25 am PST</pubDate>
		<guid isPermaLink="true">http://doi.ieeecomputersociety.org/10.1109/TDSC.2025.3621057</guid>
	</item>
	<item>
		<title>The Communication-Friendly Privacy-Preserving Machine Learning Against Malicious Adversaries</title>
		<link>https://www.computer.org/csdl/journal/tq/2026/02/11219180/2bbyu941AEE</link>
		<description></description>
		<pubDate>03/18/2026 1:03 am PST</pubDate>
		<guid isPermaLink="true">http://doi.ieeecomputersociety.org/10.1109/TDSC.2025.3625999</guid>
	</item>
	<item>
		<title>NarAdv: Natural-Style Physical Adversarial Attack on Traffic Sign Detection for Autonomous Vehicles</title>
		<link>https://www.computer.org/csdl/journal/tq/2026/02/11219287/2bbyufa7hUA</link>
		<description></description>
		<pubDate>03/18/2026 1:23 am PST</pubDate>
		<guid isPermaLink="true">http://doi.ieeecomputersociety.org/10.1109/TDSC.2025.3626196</guid>
	</item>
	<item>
		<title>SXGB: Secure and Efficient Vertical Federated XGBoost via Trusted Execution Environments</title>
		<link>https://www.computer.org/csdl/journal/tq/2026/02/11219316/2bbyu2vPBwk</link>
		<description></description>
		<pubDate>03/18/2026 12:57 am PST</pubDate>
		<guid isPermaLink="true">http://doi.ieeecomputersociety.org/10.1109/TDSC.2025.3626379</guid>
	</item>
	<item>
		<title>DeepSanitizer: Combining Heuristic Rules and Deep Learning Models to Spot Silent Buffer Overflows in Binary</title>
		<link>https://www.computer.org/csdl/journal/tq/2026/02/11220180/2bbyukWCFc4</link>
		<description></description>
		<pubDate>03/18/2026 1:33 am PST</pubDate>
		<guid isPermaLink="true">http://doi.ieeecomputersociety.org/10.1109/TDSC.2025.3626483</guid>
	</item>
	<item>
		<title>MSTest: A Property-Oriented, Comprehensive, and Cross-Platform Test Suite of Memory Safety</title>
		<link>https://www.computer.org/csdl/journal/tq/2026/02/11222740/2beSbQRHe6s</link>
		<description></description>
		<pubDate>03/17/2026 11:59 pm PST</pubDate>
		<guid isPermaLink="true">http://doi.ieeecomputersociety.org/10.1109/TDSC.2025.3626811</guid>
	</item>
	<item>
		<title>Toward High-Fidelity and Trustworthy Digital Twins for Fault Diagnosis in Grid Connected Inverters</title>
		<link>https://www.computer.org/csdl/journal/tq/2026/02/11222746/2beSbYOsRUs</link>
		<description></description>
		<pubDate>03/18/2026 2:12 am PST</pubDate>
		<guid isPermaLink="true">http://doi.ieeecomputersociety.org/10.1109/TDSC.2025.3626846</guid>
	</item>
	<item>
		<title>Fuzzy Vault Revisited &amp;#x2013; Enabling Privacy-Preserving Multi-Modal Biometric Authentication</title>
		<link>https://www.computer.org/csdl/journal/tq/2026/02/11222772/2bgxbADGW9a</link>
		<description></description>
		<pubDate>03/18/2026 12:52 am PST</pubDate>
		<guid isPermaLink="true">http://doi.ieeecomputersociety.org/10.1109/TDSC.2025.3627218</guid>
	</item>
	<item>
		<title>MIRAGE: Multi-Binary Image Risk Assessment With Attack Graph Employment</title>
		<link>https://www.computer.org/csdl/journal/tq/2026/02/11222866/2beSbJyX1Dy</link>
		<description></description>
		<pubDate>03/17/2026 11:51 pm PST</pubDate>
		<guid isPermaLink="true">http://doi.ieeecomputersociety.org/10.1109/TDSC.2025.3626996</guid>
	</item>
	<item>
		<title>Unified Attribute-Based Data Access Control With Hiding Attribute Value Under PINet</title>
		<link>https://www.computer.org/csdl/journal/tq/2026/02/11222931/2beSc6wKY5a</link>
		<description></description>
		<pubDate>03/18/2026 2:54 am PST</pubDate>
		<guid isPermaLink="true">http://doi.ieeecomputersociety.org/10.1109/TDSC.2025.3627278</guid>
	</item>
	<item>
		<title>Robust Coverless Image Steganography Against Geometric Attacks via Deep Unsupervised Hashing</title>
		<link>https://www.computer.org/csdl/journal/tq/2026/02/11222938/2bgxcY1giSk</link>
		<description></description>
		<pubDate>03/18/2026 3:02 am PST</pubDate>
		<guid isPermaLink="true">http://doi.ieeecomputersociety.org/10.1109/TDSC.2025.3626810</guid>
	</item>
	<item>
		<title>Blockchain-Based Secure Federated Learning With Improved Consensus Protocol and Personalized Differential Privacy</title>
		<link>https://www.computer.org/csdl/journal/tq/2026/02/11222972/2bgxbIQm7eM</link>
		<description></description>
		<pubDate>03/18/2026 1:19 am PST</pubDate>
		<guid isPermaLink="true">http://doi.ieeecomputersociety.org/10.1109/TDSC.2025.3626847</guid>
	</item>
	<item>
		<title>MPDA-HPR: Multi-Dimensional Privacy-Preserving Data Aggregation Based on Homomorphic Proxy Re-Encryption for Industrial Internet of Things</title>
		<link>https://www.computer.org/csdl/journal/tq/2026/02/11223034/2bgxbPaVm80</link>
		<description></description>
		<pubDate>03/18/2026 1:24 am PST</pubDate>
		<guid isPermaLink="true">http://doi.ieeecomputersociety.org/10.1109/TDSC.2025.3626895</guid>
	</item>
	<item>
		<title>MPC-FH: Privately Estimating Frequency Histogram for Advertising Measurement</title>
		<link>https://www.computer.org/csdl/journal/tq/2026/02/11223082/2bgxcbkcHq8</link>
		<description></description>
		<pubDate>03/18/2026 2:12 am PST</pubDate>
		<guid isPermaLink="true">http://doi.ieeecomputersociety.org/10.1109/TDSC.2025.3626789</guid>
	</item>
	<item>
		<title>HTCNN: High-Throughput Batch CNN Inference With Homomorphic Encryption</title>
		<link>https://www.computer.org/csdl/journal/tq/2026/02/11223652/2bgxbXafo6A</link>
		<description></description>
		<pubDate>03/18/2026 1:37 am PST</pubDate>
		<guid isPermaLink="true">http://doi.ieeecomputersociety.org/10.1109/TDSC.2025.3627562</guid>
	</item>
	<item>
		<title>Ownership Verification of Your NLG Models With Semantic Combination Watermarks</title>
		<link>https://www.computer.org/csdl/journal/tq/2026/02/11223712/2bgxciM2436</link>
		<description></description>
		<pubDate>03/18/2026 2:37 am PST</pubDate>
		<guid isPermaLink="true">http://doi.ieeecomputersociety.org/10.1109/TDSC.2025.3627978</guid>
	</item>
	<item>
		<title>Invisible Trails? An Identity Alignment Scheme Based on Online Tracking</title>
		<link>https://www.computer.org/csdl/journal/tq/2026/02/11223773/2blA8S7qUCc</link>
		<description></description>
		<pubDate>03/18/2026 1:18 am PST</pubDate>
		<guid isPermaLink="true">http://doi.ieeecomputersociety.org/10.1109/TDSC.2025.3627604</guid>
	</item>
	<item>
		<title>Multi-Writer/Reader Forward and Backward Private DSSE With Bilateral Selection</title>
		<link>https://www.computer.org/csdl/journal/tq/2026/02/11223794/2bgxcprBCz6</link>
		<description></description>
		<pubDate>03/18/2026 2:51 am PST</pubDate>
		<guid isPermaLink="true">http://doi.ieeecomputersociety.org/10.1109/TDSC.2025.3627926</guid>
	</item>
	<item>
		<title>Automated Analysis of Security Policy Violations in Helm Charts</title>
		<link>https://www.computer.org/csdl/journal/tq/2026/02/11223885/2bgxbqV4x0c</link>
		<description></description>
		<pubDate>03/18/2026 12:30 am PST</pubDate>
		<guid isPermaLink="true">http://doi.ieeecomputersociety.org/10.1109/TDSC.2025.3628213</guid>
	</item>
	<item>
		<title>An Insider Attack Resistant Threshold Anonymous Traffic Violation Reporting Scheme for Fog-Assisted VANETs</title>
		<link>https://www.computer.org/csdl/journal/tq/2026/02/11224441/2blA9BzO76M</link>
		<description></description>
		<pubDate>03/18/2026 2:59 am PST</pubDate>
		<guid isPermaLink="true">http://doi.ieeecomputersociety.org/10.1109/TDSC.2025.3628257</guid>
	</item>
	<item>
		<title>Content Subversion Against Information-Based Systems</title>
		<link>https://www.computer.org/csdl/journal/tq/2026/02/11224473/2blA8yxG8qk</link>
		<description></description>
		<pubDate>03/17/2026 11:56 pm PST</pubDate>
		<guid isPermaLink="true">http://doi.ieeecomputersociety.org/10.1109/TDSC.2025.3628309</guid>
	</item>
	<item>
		<title>SecOIR: Enhancing Privacy and Accuracy in Outsourced Image Retrieval via Function Secret Sharing and Deep Hashing</title>
		<link>https://www.computer.org/csdl/journal/tq/2026/02/11224540/2blA8reEkPm</link>
		<description></description>
		<pubDate>03/17/2026 11:46 pm PST</pubDate>
		<guid isPermaLink="true">http://doi.ieeecomputersociety.org/10.1109/TDSC.2025.3628356</guid>
	</item>
	<item>
		<title>ERINYES: Request-Level Provenance Analysis for Serverless Attacks</title>
		<link>https://www.computer.org/csdl/journal/tq/2026/02/11224542/2blA8lh4Btm</link>
		<description></description>
		<pubDate>03/17/2026 11:30 pm PST</pubDate>
		<guid isPermaLink="true">http://doi.ieeecomputersociety.org/10.1109/TDSC.2025.3628339</guid>
	</item>
	<item>
		<title>Multi-View Few-Shot Malware Classification With Support-Query Prototypes</title>
		<link>https://www.computer.org/csdl/journal/tq/2026/02/11224637/2blA9fnGMw0</link>
		<description></description>
		<pubDate>03/18/2026 2:02 am PST</pubDate>
		<guid isPermaLink="true">http://doi.ieeecomputersociety.org/10.1109/TDSC.2025.3627810</guid>
	</item>
	<item>
		<title>HGAFA: Heterogeneous Graph Attention-Based Featureless Aggregation for IoC Joint Identification</title>
		<link>https://www.computer.org/csdl/journal/tq/2026/02/11224803/2bmTrvR7fdC</link>
		<description></description>
		<pubDate>03/18/2026 2:30 am PST</pubDate>
		<guid isPermaLink="true">http://doi.ieeecomputersociety.org/10.1109/TDSC.2025.3628879</guid>
	</item>
	<item>
		<title>Bilinear Pairing and Deffie-Hellman Based Anonymous Authentication Protocol for the Internet of Vehicles</title>
		<link>https://www.computer.org/csdl/journal/tq/2026/02/11226849/2bmTr6ntwmA</link>
		<description></description>
		<pubDate>03/18/2026 12:17 am PST</pubDate>
		<guid isPermaLink="true">http://doi.ieeecomputersociety.org/10.1109/TDSC.2025.3628710</guid>
	</item>
	<item>
		<title>Blockchain-Assisted Conditional Anonymous Authentication and Adaptive Tree-Based Group Key Agreement for VANETs</title>
		<link>https://www.computer.org/csdl/journal/tq/2026/02/11226963/2boUdCLhKKY</link>
		<description></description>
		<pubDate>03/17/2026 11:41 pm PST</pubDate>
		<guid isPermaLink="true">http://doi.ieeecomputersociety.org/10.1109/TDSC.2025.3628884</guid>
	</item>
	<item>
		<title>Efficient Edge Immunization Strategies for Diffusion Containment in Social Networks</title>
		<link>https://www.computer.org/csdl/journal/tq/2026/02/11229949/2boUdOycQH6</link>
		<description></description>
		<pubDate>03/18/2026 2:07 am PST</pubDate>
		<guid isPermaLink="true">http://doi.ieeecomputersociety.org/10.1109/TDSC.2025.3629028</guid>
	</item>
	<item>
		<title>Sound Eavesdropping on Mobile Device Via Audio-Induced EMR</title>
		<link>https://www.computer.org/csdl/journal/tq/2026/02/11230074/2boUeayGCXe</link>
		<description></description>
		<pubDate>03/18/2026 2:48 am PST</pubDate>
		<guid isPermaLink="true">http://doi.ieeecomputersociety.org/10.1109/TDSC.2025.3629163</guid>
	</item>
	<item>
		<title>Obfuscated Location Disclosure for Remote ID Enabled Drones</title>
		<link>https://www.computer.org/csdl/journal/tq/2026/02/11230512/2bqzl9rMTKM</link>
		<description></description>
		<pubDate>03/18/2026 12:27 am PST</pubDate>
		<guid isPermaLink="true">http://doi.ieeecomputersociety.org/10.1109/TDSC.2025.3629749</guid>
	</item>
	<item>
		<title>Epass: Efficient and Privacy-Preserving Asynchronous Payment on Blockchain</title>
		<link>https://www.computer.org/csdl/journal/tq/2026/02/11230534/2bqzlHogW76</link>
		<description></description>
		<pubDate>03/18/2026 1:59 am PST</pubDate>
		<guid isPermaLink="true">http://doi.ieeecomputersociety.org/10.1109/TDSC.2025.3629834</guid>
	</item>
	<item>
		<title>Detecting Obligation Races in NGAC Systems</title>
		<link>https://www.computer.org/csdl/journal/tq/2026/02/11230539/2bqzl3r5zY4</link>
		<description></description>
		<pubDate>03/18/2026 12:00 am PST</pubDate>
		<guid isPermaLink="true">http://doi.ieeecomputersociety.org/10.1109/TDSC.2025.3630095</guid>
	</item>
	<item>
		<title>One&lt;sup>2&lt;/sup>: An Intrusion Detection System for Both Internal and External Vehicular Network From Weak Labeled Data</title>
		<link>https://www.computer.org/csdl/journal/tq/2026/02/11230566/2bqzlsw2cvu</link>
		<description></description>
		<pubDate>03/18/2026 12:42 am PST</pubDate>
		<guid isPermaLink="true">http://doi.ieeecomputersociety.org/10.1109/TDSC.2025.3629862</guid>
	</item>
	<item>
		<title>Approx-PSI: Efficient Differentially Private Set Intersection-Based Analysis</title>
		<link>https://www.computer.org/csdl/journal/tq/2026/02/11230584/2bqzkQYJ32w</link>
		<description></description>
		<pubDate>03/17/2026 11:49 pm PST</pubDate>
		<guid isPermaLink="true">http://doi.ieeecomputersociety.org/10.1109/TDSC.2025.3629820</guid>
	</item>
	<item>
		<title>Incentive Mechanism Design for Collaborative Physical Layer Authentication: A Centralized Governance Approach</title>
		<link>https://www.computer.org/csdl/journal/tq/2026/02/11230685/2bqzllMLRiE</link>
		<description></description>
		<pubDate>03/18/2026 12:40 am PST</pubDate>
		<guid isPermaLink="true">http://doi.ieeecomputersociety.org/10.1109/TDSC.2025.3629675</guid>
	</item>
	<item>
		<title>PIEDChecker: Uncover Permissions-Independent Emulation-Detection Methods in Android System</title>
		<link>https://www.computer.org/csdl/journal/tq/2026/02/11230837/2bqzlfNcW2c</link>
		<description></description>
		<pubDate>03/18/2026 12:28 am PST</pubDate>
		<guid isPermaLink="true">http://doi.ieeecomputersociety.org/10.1109/TDSC.2025.3629678</guid>
	</item>
	<item>
		<title>How to Defend Against Large-Scale Model Poisoning Attacks in Federated Learning: A Vertical Solution</title>
		<link>https://www.computer.org/csdl/journal/tq/2026/02/11231098/2bqzkWE8s4o</link>
		<description></description>
		<pubDate>03/17/2026 11:55 pm PST</pubDate>
		<guid isPermaLink="true">http://doi.ieeecomputersociety.org/10.1109/TDSC.2025.3630175</guid>
	</item>
	<item>
		<title>Coeus: Secure Similarity-Aware Data Integrity Verification for Secure Memories</title>
		<link>https://www.computer.org/csdl/journal/tq/2026/02/11231112/2bqzlz35N7y</link>
		<description></description>
		<pubDate>03/18/2026 1:33 am PST</pubDate>
		<guid isPermaLink="true">http://doi.ieeecomputersociety.org/10.1109/TDSC.2025.3630054</guid>
	</item>
	<item>
		<title>&lt;monospace>ICSFuzz&lt;/monospace>: Collision Detector Bug Discovery in Autonomous Driving Simulators</title>
		<link>https://www.computer.org/csdl/journal/tq/2026/02/11231334/2bsdVwI1chW</link>
		<description></description>
		<pubDate>03/18/2026 2:18 am PST</pubDate>
		<guid isPermaLink="true">http://doi.ieeecomputersociety.org/10.1109/TDSC.2025.3630192</guid>
	</item>
	<item>
		<title>SecChain: A Secure Stateless Sharded Blockchain via a Novel State Commitment</title>
		<link>https://www.computer.org/csdl/journal/tq/2026/02/11231341/2bsdVosw1TG</link>
		<description></description>
		<pubDate>03/18/2026 2:06 am PST</pubDate>
		<guid isPermaLink="true">http://doi.ieeecomputersociety.org/10.1109/TDSC.2025.3630265</guid>
	</item>
	<item>
		<title>FEAC: A New Construction of Fast and Expressive Anonymous Credential for Cloud Service</title>
		<link>https://www.computer.org/csdl/journal/tq/2026/02/11231395/2bsdUzLYURq</link>
		<description></description>
		<pubDate>03/18/2026 12:07 am PST</pubDate>
		<guid isPermaLink="true">http://doi.ieeecomputersociety.org/10.1109/TDSC.2025.3630137</guid>
	</item>
	<item>
		<title>STEED: Space and Time-Efficient Encrypted Database Using FHE</title>
		<link>https://www.computer.org/csdl/journal/tq/2026/02/11234898/2bsdVEEMQ5W</link>
		<description></description>
		<pubDate>03/18/2026 2:34 am PST</pubDate>
		<guid isPermaLink="true">http://doi.ieeecomputersociety.org/10.1109/TDSC.2025.3630273</guid>
	</item>
	<item>
		<title>Graph-Based Malicious Domain Name Detection: How to Use the Heuristic Relations</title>
		<link>https://www.computer.org/csdl/journal/tq/2026/02/11235613/2bsdV3wJZcI</link>
		<description></description>
		<pubDate>03/18/2026 1:33 am PST</pubDate>
		<guid isPermaLink="true">http://doi.ieeecomputersociety.org/10.1109/TDSC.2025.3630625</guid>
	</item>
	<item>
		<title>Mercury: Practical Cross-Chain Exchange via Trusted Hardware</title>
		<link>https://www.computer.org/csdl/journal/tq/2026/02/11235977/2bxck4h4RUI</link>
		<description></description>
		<pubDate>03/17/2026 11:39 pm PST</pubDate>
		<guid isPermaLink="true">http://doi.ieeecomputersociety.org/10.1109/TDSC.2025.3630656</guid>
	</item>
	<item>
		<title>Hidden Threats in Federated Unlearning: Camouflaged Poisoning Attacks and Their Unlearning Consequences</title>
		<link>https://www.computer.org/csdl/journal/tq/2026/02/11235980/2bxckmD2Knm</link>
		<description></description>
		<pubDate>03/18/2026 1:32 am PST</pubDate>
		<guid isPermaLink="true">http://doi.ieeecomputersociety.org/10.1109/TDSC.2025.3630811</guid>
	</item>
	<item>
		<title>A Traceable and Revocable Ciphertext Policy Attribute-Based Encryption With Policy Authentication</title>
		<link>https://www.computer.org/csdl/journal/tq/2026/02/11239416/2byRbxqE3XG</link>
		<description></description>
		<pubDate>03/18/2026 1:15 am PST</pubDate>
		<guid isPermaLink="true">http://doi.ieeecomputersociety.org/10.1109/TDSC.2025.3631722</guid>
	</item>
	<item>
		<title>PPTD: A Path Profiling-Based Threat Detection Method Toward Deployed Smart Contracts</title>
		<link>https://www.computer.org/csdl/journal/tq/2026/02/11239431/2byRbazEuDC</link>
		<description></description>
		<pubDate>03/17/2026 11:52 pm PST</pubDate>
		<guid isPermaLink="true">http://doi.ieeecomputersociety.org/10.1109/TDSC.2025.3631494</guid>
	</item>
	<item>
		<title>AIIP-Chain: Fair Copyright Sharing With Credible Ownership Verification in AI Model Trading</title>
		<link>https://www.computer.org/csdl/journal/tq/2026/02/11239438/2byRbr0oQta</link>
		<description></description>
		<pubDate>03/18/2026 3:04 pm PST</pubDate>
		<guid isPermaLink="true">http://doi.ieeecomputersociety.org/10.1109/TDSC.2025.3631447</guid>
	</item>
	<item>
		<title>Analysis on the Feasibility of D-FACTS Devices for Localizing FDI Attacks in Smart Grids</title>
		<link>https://www.computer.org/csdl/journal/tq/2026/02/11241143/2byRbh8YSic</link>
		<description></description>
		<pubDate>03/18/2026 12:59 am PST</pubDate>
		<guid isPermaLink="true">http://doi.ieeecomputersociety.org/10.1109/TDSC.2025.3631688</guid>
	</item>
	<item>
		<title>Mix&lt;sup>2&lt;/sup>Aug: Revisiting Mixing-Based Augmentations for Improving Robust Generalization of Adversarial Training</title>
		<link>https://www.computer.org/csdl/journal/tq/2026/02/11242025/2bBPWGeXbNK</link>
		<description></description>
		<pubDate>03/18/2026 1:14 am PST</pubDate>
		<guid isPermaLink="true">http://doi.ieeecomputersociety.org/10.1109/TDSC.2025.3632109</guid>
	</item>
	<item>
		<title>HDSIW: Vector FSM-HMT Based Hybrid Domain Statistical Image Watermarking</title>
		<link>https://www.computer.org/csdl/journal/tq/2026/02/11244169/2bBPWukEwtW</link>
		<description></description>
		<pubDate>03/18/2026 12:07 am PST</pubDate>
		<guid isPermaLink="true">http://doi.ieeecomputersociety.org/10.1109/TDSC.2025.3631966</guid>
	</item>
	<item>
		<title>A Parallel Feedback Obfuscation Strong PUF Against Machine-Learning Modeling Attacks and Lightweight Authentication Protocol</title>
		<link>https://www.computer.org/csdl/journal/tq/2026/02/11247831/2bBPWRTmjPW</link>
		<description></description>
		<pubDate>03/18/2026 2:01 am PST</pubDate>
		<guid isPermaLink="true">http://doi.ieeecomputersociety.org/10.1109/TDSC.2025.3632835</guid>
	</item>
	<item>
		<title>2PCLGA: Privacy-Preserving and Provable-Secure Certificateless Group Key Agreement Scheme for the Distributed Learning-Based MEC Networks</title>
		<link>https://www.computer.org/csdl/journal/tq/2026/02/11248939/2bDPXdpkLzW</link>
		<description></description>
		<pubDate>03/18/2026 1:05 am PST</pubDate>
		<guid isPermaLink="true">http://doi.ieeecomputersociety.org/10.1109/TDSC.2025.3632556</guid>
	</item>
	<item>
		<title>Feed-Forward Controller-Based Recovery for Robotic Vehicles From Physical Attacks</title>
		<link>https://www.computer.org/csdl/journal/tq/2026/02/11248953/2bDPX63KzOo</link>
		<description></description>
		<pubDate>03/18/2026 12:54 am PST</pubDate>
		<guid isPermaLink="true">http://doi.ieeecomputersociety.org/10.1109/TDSC.2025.3632657</guid>
	</item>
	<item>
		<title>M1Pecker: A Dynamic Analysis Framework for Pointer Authentication in Apple M1 Chips</title>
		<link>https://www.computer.org/csdl/journal/tq/2026/02/11248954/2bDPWZp1OGA</link>
		<description></description>
		<pubDate>03/17/2026 11:43 pm PST</pubDate>
		<guid isPermaLink="true">http://doi.ieeecomputersociety.org/10.1109/TDSC.2025.3632885</guid>
	</item>
	<item>
		<title>A Novel Framework of Semantic-Based Text Steganography</title>
		<link>https://www.computer.org/csdl/journal/tq/2026/02/11249432/2bDPXpf5QOI</link>
		<description></description>
		<pubDate>03/18/2026 2:36 am PST</pubDate>
		<guid isPermaLink="true">http://doi.ieeecomputersociety.org/10.1109/TDSC.2025.3632510</guid>
	</item>
	<item>
		<title>Leakage-Resilient Data Transmission Protocol With Multi-Receiver for Internet of Things</title>
		<link>https://www.computer.org/csdl/journal/tq/2026/02/11249437/2bDPWSQyeqc</link>
		<description></description>
		<pubDate>03/17/2026 11:32 pm PST</pubDate>
		<guid isPermaLink="true">http://doi.ieeecomputersociety.org/10.1109/TDSC.2025.3632800</guid>
	</item>
	<item>
		<title>Protecting Your Powerpoint Presentations: Camera Shooting Resilient Watermarking</title>
		<link>https://www.computer.org/csdl/journal/tq/2026/02/11250708/2bIODT91uWk</link>
		<description></description>
		<pubDate>03/18/2026 1:54 am PST</pubDate>
		<guid isPermaLink="true">http://doi.ieeecomputersociety.org/10.1109/TDSC.2025.3633289</guid>
	</item>
	<item>
		<title>When Deepfake Meets Backdoor: Leveraging GAN Fingerprints for Data Poisoning Attack</title>
		<link>https://www.computer.org/csdl/journal/tq/2026/02/11250710/2bIOE5B6qJO</link>
		<description></description>
		<pubDate>03/18/2026 2:48 am PST</pubDate>
		<guid isPermaLink="true">http://doi.ieeecomputersociety.org/10.1109/TDSC.2025.3633381</guid>
	</item>
	<item>
		<title>CASPER: Contrastive Approach for Smart Ponzi Scheme Detecter With More Negative Samples</title>
		<link>https://www.computer.org/csdl/journal/tq/2026/02/11250715/2bIODBDR0FG</link>
		<description></description>
		<pubDate>03/18/2026 12:02 am PST</pubDate>
		<guid isPermaLink="true">http://doi.ieeecomputersociety.org/10.1109/TDSC.2025.3633167</guid>
	</item>
	<item>
		<title>UniForensics: Face Forgery Detection via General Facial Representation</title>
		<link>https://www.computer.org/csdl/journal/tq/2026/02/11250851/2bIOEeWJkly</link>
		<description></description>
		<pubDate>03/18/2026 3:04 pm PST</pubDate>
		<guid isPermaLink="true">http://doi.ieeecomputersociety.org/10.1109/TDSC.2025.3627420</guid>
	</item>
	<item>
		<title>CtrlFuzz: Control Field Aware Greybox Fuzzing for Public ICS Protocols Based on Expert System</title>
		<link>https://www.computer.org/csdl/journal/tq/2026/02/11251129/2bKtv7VzPGM</link>
		<description></description>
		<pubDate>03/18/2026 12:41 am PST</pubDate>
		<guid isPermaLink="true">http://doi.ieeecomputersociety.org/10.1109/TDSC.2025.3634366</guid>
	</item>
	<item>
		<title>Fed-EHP: Efficient and Heterogeneous Privacy-Preserving Personalized Federated Learning</title>
		<link>https://www.computer.org/csdl/journal/tq/2026/02/11251336/2bKtvdZ78M8</link>
		<description></description>
		<pubDate>03/18/2026 2:10 am PST</pubDate>
		<guid isPermaLink="true">http://doi.ieeecomputersociety.org/10.1109/TDSC.2025.3634446</guid>
	</item>
	<item>
		<title>Characterizing Contactless Side-Channel Eavesdropping on Wireless Chargers</title>
		<link>https://www.computer.org/csdl/journal/tq/2026/02/11258601/2bM8tIQ6csU</link>
		<description></description>
		<pubDate>03/18/2026 1:43 am PST</pubDate>
		<guid isPermaLink="true">http://doi.ieeecomputersociety.org/10.1109/TDSC.2025.3631748</guid>
	</item>
	<item>
		<title>Enhancing Redactable Blockchain With Robust and Efficient Threshold Redaction</title>
		<link>https://www.computer.org/csdl/journal/tq/2026/02/11260636/2bM8trwzgwU</link>
		<description></description>
		<pubDate>03/18/2026 12:30 am PST</pubDate>
		<guid isPermaLink="true">http://doi.ieeecomputersociety.org/10.1109/TDSC.2025.3634512</guid>
	</item>
	<item>
		<title>ESVPH: Efficient Searchable and Verifiable Data Sharing Scheme With Partial Hidden Policy for IoT</title>
		<link>https://www.computer.org/csdl/journal/tq/2026/02/11260966/2bM8tlocMes</link>
		<description></description>
		<pubDate>03/17/2026 11:52 pm PST</pubDate>
		<guid isPermaLink="true">http://doi.ieeecomputersociety.org/10.1109/TDSC.2025.3634588</guid>
	</item>
	<item>
		<title>FOOLSDEDIT: Deceptively Steering Your Edits Towards Targeted Attribute-Aware Distribution</title>
		<link>https://www.computer.org/csdl/journal/tq/2026/02/11261390/2bNrXqDGIKc</link>
		<description></description>
		<pubDate>03/18/2026 1:39 am PST</pubDate>
		<guid isPermaLink="true">http://doi.ieeecomputersociety.org/10.1109/TDSC.2025.3621435</guid>
	</item>
	<totalTime>50</totalTime>
</channel></rss>