Journal Information
IEEE Transactions on Dependable and Secure Computing (TDSC)
https://www.computer.org/csdl/journal/tqImpact Factor: |
7.5 |
Publisher: |
IEEE |
ISSN: |
1545-5971 |
Viewed: |
103910 |
Tracked: |
126 |
Call For Papers
Topics include, but are not limited to, the following:
I. Design for Dependability and Security
Architectures
Fault-tolerant, secure, and safe middleware
Intrusion detection and tolerance
Firewall technologies; authentication and authorization of users, systems, and applications
Network technologies, including protocols, routers, and switches
On-line detection and recovery
System Management and Administration
Cryptography
Application of cryptography techniques
Key management
Cryptographic protocols and algorithms, and their security
Use of COTS components
II. Evaluation
Modeling and Prediction
Threat-assessment and intrusion-detection models
Availability, performability, and survivability
Intrusion tolerance; attack models
Modeling methods, including Markov chains, queuing/fluid flow, Stochastic Petri Nets (SPN), SAN models
Experimental Methods
Monitoring and measurement
Workload characterization
Benchmarking
Test-bed design, including fault, error, attack, and workload generation
Field monitoring and measurement, including failures, security violations and break-ins, and intrusion detection
Statistical methods
Formal Specification and Verification
Quality of Service (encompassing performability, security, and safety)
III. Application-Specific Areas
Survivable Database Design and Transaction Processing
Electronic Commerce
Embedded Systems
File and File System Security
Distributed and Pervasive Systems
Smartcards and Biometrics
Real-Time Systems
Safety-Critical Systems (e.g., aerospace computing)
Internet Applications
Multimedia Applications and Signal-Processing
IV. Software Design
Operating System Support (for error/intrusion detection and/or tolerance)
Self-Checking Software Systems
Dependable, Secure Protocols and Network Interfaces
Software Testing, Validation, and Verification
Software Aging and Rejuvenation
Software Security and Reliability Engineering
V. New Technologies (problems and opportunities)
Nanoscale Computing
Ad Hoc Networks
Pervasive and Embedded Computing
Networks of Satellites
Data Mining
Wearable Computers and Associated Networks
Quantum Computing
Cyber-Physical Systems (e.g., mobile health, Smart Grid, and ITS)
Last updated by Dou Sun in 2025-09-26
Special Issues
Special Issue on Security and Privacy in Federated Learning and UnlearningSubmission Date: 2026-03-31Important dates
Submission Deadline: 31 March 2026
First Review Due: May 31, 2026
Revision Due: June 30, 2026
Second Review Due / Notification: July 31, 2026
Final Manuscript Due: August 31, 2026
Publication Date: To be determined
The rise of distributed systems and pervasive computing has transformed how devices, systems, and services interact, creating a highly interconnected ecosystem. As the scale and complexity of these systems grow, issues related to security, privacy, and efficient management of decentralized resources become more pronounced. Addressing these challenges is critical to ensuring the security and privacy of user data, as well as compliance with regulatory standards in sensitive domains such as healthcare, finance, and beyond.
Federated Learning, a cutting-edge distributed learning paradigm, has emerged as a powerful tool for decentralized model training, enabling data privacy and reducing the need for central data aggregation. This method is pivotal in scenarios where data security and privacy are paramount.
Furthermore, Federated Unlearning—an innovative approach in the privacy-preserving space—focuses on the selective removal of data from models, which is essential for complying with data protection regulations and adapting to evolving privacy laws.
This special issue invites original contributions that explore the advanced technologies in Federated Learning and Unlearning, with an emphasis on their applications in security-sensitive environments. We welcome research papers that present novel methodologies, architectures, and strategies for enhancing the security, privacy, and efficiency of federated systems. All submissions will undergo peer review to ensure relevance and quality in line with the theme of this special issue.Last updated by Dou Sun in 2025-11-18
Special Issue on AI Content Generation and DetectionSubmission Date: 2026-04-30Important dates
Submission deadline: 30 April 2026
First-round decision notification: 20 July 2026
Revised manuscript due: 30 August 2026
Final decision notification: 20 October 2026
AI-generated contents have taken the world by storm. AI-generated contents now spans a wide range, including AI-generated videos, images, audios, and texts. Fueled by the accessibility of large-scale media datasets and the maturity of AI generation technologies, currently one may effortlessly create massive forgery images, videos, audios, and texts beyond human discernibility. These medias play important roles in filmmaking, electronic games, image editing, and education. It is thus not surprising that generative AI is redefining the video industry and many other industries. However, despite their positive widespread use, malicious actors can leverage advances in AI generation technologies for nefarious purposes. They may forge high-quality artifacts to perform scam, generate and propagate fake pornography, and challenge face recognition systems, to name a few. To alleviate the abuse of AI generation technologies, it is of paramount importance to develop sound detection and tracking approaches.
This special issue aims to bring together the cutting-edge advancements in AI content generation and detection, diving deeper into AI image generation, AI video generation, AI audio generation, AI text generation, and AI generated content detection tasks. We are interested in AI-Generated data covering a wide scope, from images, audios, texts, to videos. We expect the contributions focusing on innovative techniques for AI content generation and detection, including methodologies and algorithmic approaches to solve theoretical and practical problems. We also encourage the research on potentially impactful and related technologies.
The topics of interest for the Special Issue encompass, but are not limited to:
AI-Driven Content Generation
AI-Generated Content Detection
Face Forgery Detection and Localization
Cross-modal Content Generation
Human Motion Synthesis
Explainability and Interpretability in AI Content Generation
Privacy Preservation Techniques in AI-Generated Content
Bias and Fairness in AI Generated Content
Detection of Sensitive Elements in AI-Generated Content
Content Verification and Authenticity Detection
Safety Guardrails for Generative AI Models
Synthesis Attribution and Reasoning
Content Filtering and Moderation in Social Media Platforms
AI-Generated Content Transmission Tracking
Regulatory Frameworks and Legal Implications for AI Content Generation
AI-Generated Content Watermarking
AI-Generated Content Fingerprinting
Adversarial Multimedia Forensics
Multimedia Manipulation Detection
AI-Generated Content RetrievalLast updated by Dou Sun in 2025-11-18
Special Issue on Trustworthy and Private Decentralized Data CirculationSubmission Date: 2026-06-01Important dates
Submission deadline: 1 June 2026
First Review due: 1 September 2026
Revision due: 1 November 2026
Final decision notification: 1 December 2026
Publication: To be determined
Data has become a critical factor of production, yet its circulation and value realization face fundamental challenges in trustworthiness, privacy, security, and regulatory compliance. Isolated techniques like encryption or anonymization are insufficient for complex real-world scenarios involving multi-party collaborative computing, data sovereignty assurance, circulation traceability, auditing, and reliability in adversarial environments. Recent advancements in privacy computing, such as Homomorphic Encryption (HE), Secure Multi-Party Computation (SMPC), Differential Privacy (DP), Trusted Execution Environments (TEEs), and Federated Learning (FL)—combined with blockchain, offer novel paradigms and potentials for constructing next-generation trustworthy and private data circulation infrastructure.
This Special Issue aims to collate cutting-edge research on the deep integration of diverse privacy computing techniques with trustworthy computing mechanisms to address end-to-end trust and privacy preservation in cross-domain, cross-institutional data element circulation. We solicit high-quality original papers focusing on theoretical innovations, system building, practical deployment, and evaluation.
Topics of interest include:
Trustworthy data collection for blockchain systems
Privacy-preserving authentication for distributed systems
Privacy-preserving data sharing among distributed users
Privacy-preserving data computation between untrustworthy entities
Privacy-preserving data auditing
Secure and privacy-preserving data trading
Secure data access control
Secure and accurate data tracing
Secure and efficient data governance
Optimization of large-scale trustworthy and private data circulation systems
Analysis of malware and cyberattacks for blockchain systemsLast updated by Dou Sun in 2026-01-10
Related Journals
| CCF | Full Name | Impact Factor | Publisher | ISSN |
|---|---|---|---|---|
| a | IEEE Transactions on Mobile Computing | 9.2 | IEEE | 1536-1233 |
| a | IEEE Transactions on Dependable and Secure Computing | 7.5 | IEEE | 1545-5971 |
| a | IEEE Transactions on Services Computing | 5.8 | IEEE | 1939-1374 |
| Sustainable Computing | 5.7 | Elsevier | 2210-5379 | |
| ACM Transactions on Accessible Computing | 3.5 | ACM | 1936-7228 | |
| Memetic Computing | 2.3 | Springer | 1865-9284 | |
| b | Parallel Computing | 2.0 | Elsevier | 0167-8191 |
| International Journal of Reconfigurable Computing | 1.7 | Hindawi | 1687-7195 | |
| c | Natural Computing | 1.6 | Springer | 1567-7818 |
| ACM Transactions on Parallel Computing | 0.900 | ACM | 2329-4949 |
Related Conferences
| CCF | CORE | QUALIS | Short | Full Name | Submission | Notification | Conference |
|---|---|---|---|---|---|---|---|
| b2 | EDCC | European Dependable Computing Conference | 2025-09-30 | 2025-12-12 | 2026-04-07 | ||
| c | b3 | GPC | International Conference on Green, Pervasive and Cloud Computing | 2025-07-15 | 2025-12-09 | ||
| c | b3 | DASC | International Conference on Dependable, Autonomic and Secure Computing | 2025-06-10 | 2025-08-11 | 2025-10-21 | |
| b4 | IGSC | International Green and Sustainable Computing Conference | 2024-08-05 | 2024-09-13 | 2024-11-02 | ||
| c | a | b1 | SCC | International Conference on Services Computing | 2022-03-01 | 2022-04-15 | 2022-07-10 |
| b2 | ICSC | International Conference on Semantic Computing | 2020-10-12 | 2020-11-25 | 2021-01-27 | ||
| c | b3 | ParCo | International Conference on Parallel Computing | 2019-02-28 | 2019-05-15 | 2019-09-10 | |
| c | GrC | International Conference on Granular Computing | 2015-08-25 | 2015-09-04 | 2015-10-29 | ||
| c | c | a2 | P2P | International Conference on Peer-to-Peer Computing | 2015-05-11 | 2015-08-03 | 2015-09-21 |
| b | b1 | CEC | IEEE Conference on Commerce and Enterprise Computing | 2012-05-18 | 2012-06-25 | 2012-09-09 |